From 1732eff6bb00294b8d3c25245ed4fc29076b60b0 Mon Sep 17 00:00:00 2001 From: Catatonic Prime Date: Sat, 12 Nov 2016 08:38:39 +0000 Subject: [PATCH 001/531] Initial working radmin 2.x cracker. Lots of additional work still left to be done. --- Makefile.am | 6 +- hydra-radmin2.c | 325 +++++++++++++++++++++ hydra.c | 11 +- hydra.h | 1 + twofish.c | 704 +++++++++++++++++++++++++++++++++++++++++++++ twofish/aes.h | 268 +++++++++++++++++ twofish/debug.h | 77 +++++ twofish/platform.h | 75 +++++ twofish/table.h | 228 +++++++++++++++ 9 files changed, 1692 insertions(+), 3 deletions(-) create mode 100644 hydra-radmin2.c create mode 100644 twofish.c create mode 100644 twofish/aes.h create mode 100644 twofish/debug.h create mode 100644 twofish/platform.h create mode 100644 twofish/table.h diff --git a/Makefile.am b/Makefile.am index c904b09..43fa77a 100644 --- a/Makefile.am +++ b/Makefile.am @@ -19,7 +19,8 @@ SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ hydra-oracle.c hydra-vmauthd.c hydra-asterisk.c hydra-firebird.c hydra-afp.c hydra-ncp.c \ hydra-oracle-sid.c hydra-http-proxy.c hydra-http-form.c hydra-irc.c \ hydra-rdp.c hydra-s7-300.c hydra-redis.c hydra-adam6500.c \ - crc32.c d3des.c bfg.c ntlm.c sasl.c hmacmd5.c hydra-mod.c hydra-rtsp.c hydra-time.c hydra-rpcap.c + crc32.c d3des.c bfg.c ntlm.c sasl.c hmacmd5.c hydra-mod.c hydra-rtsp.c hydra-time.c hydra-rpcap.c \ + hydra-radmin2.c twofish.c OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ hydra-telnet.o hydra-cisco.o hydra-http.o hydra-ftp.o hydra-imap.o \ hydra-pop3.o hydra-smb.o hydra-icq.o hydra-cisco-enable.o hydra-ldap.o \ @@ -30,7 +31,8 @@ OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ hydra-oracle-sid.o hydra-oracle.o hydra-vmauthd.o hydra-asterisk.o hydra-firebird.o hydra-afp.o hydra-ncp.o \ hydra-http-proxy.o hydra-http-form.o hydra-irc.o hydra-redis.o \ hydra-rdp.o hydra-s7-300.c hydra-adam6500.o \ - crc32.o d3des.o bfg.o ntlm.o sasl.o hmacmd5.o hydra-mod.o hydra-rtsp.o hydra-time.o hydra-rpcap.o + crc32.o d3des.o bfg.o ntlm.o sasl.o hmacmd5.o hydra-mod.o hydra-rtsp.o hydra-time.o hydra-rpcap.o \ + hydra-radmin2.o twofish.o BINS = hydra pw-inspector EXTRA_DIST = README README.arm README.palm CHANGES TODO INSTALL LICENSE \ diff --git a/hydra-radmin2.c b/hydra-radmin2.c new file mode 100644 index 0000000..662a173 --- /dev/null +++ b/hydra-radmin2.c @@ -0,0 +1,325 @@ +#include "hydra-mod.h" +#include +#include +#include + +extern char *HYDRA_EXIT; + + +//Twofish references +#include "twofish/aes.h" +extern int makeKey(keyInstance *key, BYTE direction, int keyLen,CONST char *keyMaterial); +extern int cipherInit(cipherInstance *cipher, BYTE mode,CONST char *IV); +extern int blockEncrypt(cipherInstance *cipher, keyInstance *key,CONST BYTE *input, int inputLen, BYTE *outBuffer); +extern int blockDecrypt(cipherInstance *cipher, keyInstance *key,CONST BYTE *input, int inputLen, BYTE *outBuffer); + + +struct rmessage{ + char magic; //No touching! + unsigned int length; //Total message size of data. + unsigned int checksum; //Checksum from type to end of data. + char type; //Command type, table below. + unsigned char data[32]; //data to be sent. +}; + +void print_message(struct rmessage *msg) { + return; + int dlen = 0; + hydra_report(stderr, + "m:\t%02x\n" + "l:\t%08x\n" + "c:\t%08x\n" + "t:\t%02x\n", + msg->magic, + msg->length, + msg->checksum, + msg->type); + + hydra_report(stderr, "d:\t"); + for(dlen = 0; dlen < msg->length - 1; dlen++) { //-1 because of type. + hydra_report(stderr, "%02x", msg->data[dlen]); + } + hydra_report(stderr, "\n"); +} + +unsigned int checksum(struct rmessage *msg) { + int blen; + unsigned char *stream; + unsigned int sum; + blen = msg->length; //Get the real length. + blen += (4 - (blen % 4)); + stream = calloc(blen, sizeof(unsigned char)); + memcpy(stream, &msg->type, sizeof(unsigned char)); + memcpy(stream+1, msg->data, blen-1); + + sum = 0; + for(blen -= sizeof(unsigned int); blen > 0; blen -= sizeof(unsigned int)) { + sum += *(unsigned int *)(stream + blen); + } + sum += *(unsigned int *)stream; + + return sum; +} + + +void challenge_request(struct rmessage *msg) { + msg->magic = 0x01; + msg->length = 0x01; + msg->type = 0x1b; + msg->checksum = checksum(msg); + print_message(msg); +} + +void challenge_response(struct rmessage *msg, unsigned char *solution) { + msg->magic = 0x01; + msg->length = 0x21; + msg->type = 0x09; + memcpy(msg->data, solution, 0x20); + msg->checksum = checksum(msg); + print_message(msg); +} + + +unsigned char *message2buffer(struct rmessage *msg) { + unsigned char *data; + if(msg == NULL) { + hydra_report(stderr, "rmessage is null\n"); + hydra_child_exit(0); + return NULL; + } + + switch(msg->type) { + case 0x1b: //Challenge request + data = calloc (10, sizeof(unsigned char)); //TODO: check return + memcpy(data, &msg->magic, sizeof(char)); + *((int *)(data+1)) = htonl(msg->length); + *((int *)(data+5)) = htonl(msg->checksum); + memcpy((data+9), &msg->type, sizeof(char)); + break; + case 0x09: + data = calloc (42, sizeof(unsigned char)); //TODO: check return + memcpy(data, &msg->magic, sizeof(char)); + *((int *)(data+1)) = htonl(msg->length); + *((int *)(data+5)) = htonl(msg->checksum); + memcpy((data+9), &msg->type, sizeof(char)); + memcpy((data+10), msg->data, sizeof(char) * 32); + break; + default: + hydra_report(stderr, "unknown rmessage type\n"); + hydra_child_exit(0); + return NULL; + } + return data; +} + +struct rmessage *buffer2message(char *buffer) { + struct rmessage *msg; + msg = calloc(1, sizeof(struct rmessage)); + unsigned int sum = 0; + //TODO: check return + + //Start parsing... + msg->magic = buffer[0]; + buffer += sizeof(char); + msg->length = ntohl(*((unsigned int *)(buffer))); + buffer += sizeof(unsigned int); + msg->checksum = ntohl(*((unsigned int *)(buffer))); + buffer += sizeof(unsigned int); + msg->type = buffer[0]; + buffer += sizeof(char); + + //Verify known fields... + if(msg->magic != 0x01) { + hydra_report(stderr, "Bad magic\n"); + hydra_child_exit(0); + return NULL; + } + + switch(msg->type) { + case 0x1b: + if(msg->length != 0x21) { + hydra_report(stderr, "Bad length...%08x\n", msg->length); + hydra_child_exit(0); + return NULL; + } + memcpy(msg->data, buffer, 32); + break; + case 0x0a: + //Win! + case 0x0b: + //Lose! + break; + default: + hydra_report(stderr, "unknown rmessage type"); + hydra_child_exit(0); + return NULL; + } + return msg; +} + + +int start_radmin2(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +} + +void service_radmin2(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { + int sock = -1; + int index; + int count; + int bytecount; + unsigned char *request; + struct rmessage *msg; + int myport = PORT_RADMIN2; + char buffer[42]; + unsigned char password[101]; + unsigned char rawkey[16]; + unsigned char pkey[33]; + char *IV = "FEDCBA9876543210A39D4A18F85B4A52"; + unsigned char encrypted[32]; + + //Initialization nonsense. + MD5_CTX md5c; + keyInstance key; + cipherInstance cipher; + + if(port != 0) { + myport = port; + } + + memset(buffer, 0x00, sizeof(buffer)); + memset(pkey, 0x00, 33); + memset(encrypted, 0x00, 32); + memset(password, 0x00, 100); + + //Phone the mother ship + hydra_register_socket(sp); + if( memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) { + return; + } + + // Get a password to work with. + strncpy(password, hydra_get_next_password(), 101); + MD5_Init(&md5c); + MD5_Update(&md5c, password, 100); + MD5_Final(rawkey, &md5c); + //Copy raw md5 data into ASCIIZ string + for(index = 0; index < 16; index++) { + count = sprintf((pkey+index*2), "%02x", rawkey[index]); + } + + /* Typical conversation goes as follows... + 0) connect to server + 1) request challenge + 2) receive 32 byte challenge response + 3) send 32 byte challenge solution + 4) receive 1 byte auth success/fail message + */ + // 0) Connect to the server + sock = hydra_connect_tcp(ip, myport); + if(sock < 0) { + hydra_report(stderr, "Error: Child with pid %d terminating, can not connect\n", (int)getpid()); + hydra_child_exit(1); + } + + // 1) request challenge (working) + msg = calloc(1, sizeof(struct rmessage)); + challenge_request(msg); + hydra_send(sock, message2buffer(msg), 10, 0); + free(msg); //We're done with challenge request messagee. + + //2) receive response (working) + index = 0; + while(index < 42) { //We're always expecting back a 42 byte buffer from a challenge request. + switch(hydra_data_ready(sock)) { + case -1: + hydra_report(stderr, "Error: Child with pid %d terminating, receive error\nerror:\t%s\n", (int)getpid(), strerror(errno)); + hydra_child_exit(1); + break; + case 0: + //keep waiting... + break; + default: + bytecount = hydra_recv(sock, buffer+index, 42 - index); + if(bytecount < 0) { + hydra_report(stderr, "Error: Child with pid %d terminating, receive error\nerror:\t%s\n", (int)getpid(), strerror(errno)); + hydra_child_exit(1); + } + index += bytecount; + } + } + + //3) Send challenge solution. + + //3.a) generate a new message from the buffer + msg = buffer2message(buffer); + + //3.b) encrypt data received using pkey & known IV + index = makeKey(&key, DIR_ENCRYPT, 128, pkey); + if(index != TRUE) { + hydra_report(stderr, "Error: Child with pid %d terminating, make key error (%08x)\n", (int)getpid(), index); + hydra_child_exit(1); + } + + index = cipherInit(&cipher, MODE_CBC, IV); + if(index != TRUE) { + hydra_report(stderr, "Error: Child with pid %d terminating, cipher init error(%08x)\n", (int)getpid(), index); + hydra_child_exit(1); + } + + index = blockEncrypt(&cipher, &key, msg->data, 32 * 8, encrypted); + if(index <= 0) { + hydra_report(stderr, "Error: Child with pid %d terminating, encrypt error(%08x)\n", (int)getpid(), index); + hydra_child_exit(1); + } + + //3.c) half sum - this is the solution to the challenge. + for(index=0; index < 16; index++) { + *(encrypted+index) += *(encrypted+index+16); + } + memset((encrypted+16), 0x00, 16); + + //3.d) send half sum + challenge_response(msg, encrypted); + request = message2buffer(msg); + + hydra_send(sock, request, 42, 0); + //4) receive auth success/failure + index = 0; + while(index < 10) { //We're always expecting back a 42 byte buffer from a challenge request. + switch(hydra_data_ready(sock)) { + case -1: + hydra_report(stderr, "Error: Child with pid %d terminating, receive error\nerror:\t%s\n", (int)getpid(), strerror(errno)); + hydra_child_exit(1); + break; + case 0: + //keep waiting... + break; + default: + bytecount = hydra_recv(sock, buffer+index, 10 - index); + if(bytecount < 0) { + hydra_report(stderr, "Error: Child with pid %d terminating, receive error\nerror:\t%s\n", (int)getpid(), strerror(errno)); + hydra_child_exit(1); + } + index += bytecount; + } + } + msg = buffer2message(buffer); + if(msg->type == 0x0a) { + hydra_completed_pair_found(); + } + //5) Disconnect + hydra_disconnect(sock); +} + +int service_radmin2_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { + // called before the childrens are forked off, so this is the function + // which should be filled if initial connections and service setup has to be + // performed once only. + // + // fill if needed. + // + // return codes: + // 0 all OK + // -1 error, hydra will exit, so print a good error message here + + return 0; +} diff --git a/hydra.c b/hydra.c index 67f06fe..2061a31 100644 --- a/hydra.c +++ b/hydra.c @@ -57,6 +57,7 @@ extern void service_http_proxy_urlenum(char *ip, int sp, unsigned char options, extern void service_s7_300(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); extern void service_rtsp(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); extern void service_rpcap(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); +extern void service_radmin2(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); // ADD NEW SERVICES HERE @@ -147,13 +148,14 @@ extern int service_xmpp_init(char *ip, int sp, unsigned char options, char *misc extern int service_s7_300_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); extern int service_rtsp_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); extern int service_rpcap_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); +extern int service_radmin2_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); // ADD NEW SERVICES HERE // ADD NEW SERVICES HERE char *SERVICES = - "adam6500 asterisk afp cisco cisco-enable cvs firebird ftp ftps http[s]-{head|get|post} http[s]-{get|post}-form http-proxy http-proxy-urlenum icq imap[s] irc ldap2[s] ldap3[-{cram|digest}md5][s] mssql mysql ncp nntp oracle oracle-listener oracle-sid pcanywhere pcnfs pop3[s] postgres rdp redis rexec rlogin rpcap rsh rtsp s7-300 sapr3 sip smb smtp[s] smtp-enum snmp socks5 ssh sshkey svn teamspeak telnet[s] vmauthd vnc xmpp"; + "adam6500 asterisk afp cisco cisco-enable cvs firebird ftp ftps http[s]-{head|get|post} http[s]-{get|post}-form http-proxy http-proxy-urlenum icq imap[s] irc ldap2[s] ldap3[-{cram|digest}md5][s] mssql mysql ncp nntp oracle oracle-listener oracle-sid pcanywhere pcnfs pop3[s] postgres radmin2 rdp redis rexec rlogin rpcap rsh rtsp s7-300 sapr3 sip smb smtp[s] smtp-enum snmp socks5 ssh sshkey svn teamspeak telnet[s] vmauthd vnc xmpp"; #define MAXBUF 520 #define MAXLINESIZE ( ( MAXBUF / 2 ) - 4 ) @@ -1263,6 +1265,8 @@ void hydra_service_init(int target_no) { x = service_rtsp_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); if (strcmp(hydra_options.service, "rpcap") == 0) x = service_rpcap_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); + if (strcmp(hydra_options.service, "radmin2") == 0) + x = service_radmin2_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); // ADD NEW SERVICES HERE @@ -1469,6 +1473,8 @@ int hydra_spawn_head(int head_no, int target_no) { service_rtsp(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); if (strcmp(hydra_options.service, "rpcap") == 0) service_rpcap(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); + if (strcmp(hydra_options.service, "radmin2") == 0) + service_radmin2(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); // ADD NEW SERVICES HERE @@ -1569,6 +1575,7 @@ int hydra_lookup_port(char *service) { {"s7-300", PORT_S7_300, PORT_S7_300_SSL}, {"rtsp", PORT_RTSP, PORT_RTSP_SSL}, {"rpcap", PORT_RPCAP, PORT_RPCAP_SSL}, + {"radmin2", PORT_RADMIN2, PORT_RADMIN2}, // ADD NEW SERVICES HERE - add new port numbers to hydra.h {"", PORT_NOPORT, PORT_NOPORT} }; @@ -3267,6 +3274,8 @@ int main(int argc, char *argv[]) { // hydra_options.conwait = conwait = 1; i = 1; } + if (strcmp(hydra_options.service, "radmin2") == 0) + i = 1; // ADD NEW SERVICES HERE diff --git a/hydra.h b/hydra.h index 54373d4..f580e4b 100644 --- a/hydra.h +++ b/hydra.h @@ -136,6 +136,7 @@ #define PORT_RTSP_SSL 554 #define PORT_RPCAP 2002 #define PORT_RPCAP_SSL 2002 +#define PORT_RADMIN2 4899 #define False 0 #define True 1 diff --git a/twofish.c b/twofish.c new file mode 100644 index 0000000..841eb30 --- /dev/null +++ b/twofish.c @@ -0,0 +1,704 @@ +/*************************************************************************** + TWOFISH.C -- C API calls for TWOFISH AES submission + + Submitters: + Bruce Schneier, Counterpane Systems + Doug Whiting, Hi/fn + John Kelsey, Counterpane Systems + Chris Hall, Counterpane Systems + David Wagner, UC Berkeley + + Code Author: Doug Whiting, Hi/fn + + Version 1.00 April 1998 + + Copyright 1998, Hi/fn and Counterpane Systems. All rights reserved. + + Notes: + * Pedagogical version (non-optimized) + * Tab size is set to 4 characters in this file + +***************************************************************************/ + +#include "twofish/aes.h" +#include "twofish/table.h" + +/* ++***************************************************************************** +* Constants/Macros/Tables +-****************************************************************************/ + +#define VALIDATE_PARMS 1 /* nonzero --> check all parameters */ +#define FEISTEL 0 /* nonzero --> use Feistel version (slow) */ + +int tabEnable=0; /* are we gathering stats? */ +BYTE tabUsed[256]; /* one bit per table */ + +#if FEISTEL +CONST char *moduleDescription="Pedagogical C code (Feistel)"; +#else +CONST char *moduleDescription="Pedagogical C code"; +#endif +CONST char *modeString = ""; + +#define P0_USED 0x01 +#define P1_USED 0x02 +#define B0_USED 0x04 +#define B1_USED 0x08 +#define B2_USED 0x10 +#define B3_USED 0x20 +#define ALL_USED 0x3F + +/* number of rounds for various key sizes: 128, 192, 256 */ +int numRounds[4]= {0,ROUNDS_128,ROUNDS_192,ROUNDS_256}; + +#ifndef DEBUG +#ifdef GetCodeSize +#define DEBUG 1 /* force debug */ +#endif +#endif +#include "twofish/debug.h" /* debug display macros */ + +#ifdef GetCodeSize +extern DWORD Here(DWORD x); /* return caller's address! */ +DWORD TwofishCodeStart(void) { return Here(0); }; +#endif + +/* ++***************************************************************************** +* +* Function Name: TableOp +* +* Function: Handle table use checking +* +* Arguments: op = what to do (see TAB_* defns in AES.H) +* +* Return: TRUE --> done (for TAB_QUERY) +* +* Notes: This routine is for use in generating the tables KAT file. +* +-****************************************************************************/ +int TableOp(int op) + { + static int queryCnt=0; + int i; + switch (op) + { + case TAB_DISABLE: + tabEnable=0; + break; + case TAB_ENABLE: + tabEnable=1; + break; + case TAB_RESET: + queryCnt=0; + for (i=0;i<256;i++) + tabUsed[i]=0; + break; + case TAB_QUERY: + queryCnt++; + for (i=0;i<256;i++) + if (tabUsed[i] != ALL_USED) + return FALSE; + if (queryCnt < TAB_MIN_QUERY) /* do a certain minimum number */ + return FALSE; + break; + } + return TRUE; + } + + +/* ++***************************************************************************** +* +* Function Name: ParseHexDword +* +* Function: Parse ASCII hex nibbles and fill in key/iv dwords +* +* Arguments: bit = # bits to read +* srcTxt = ASCII source +* d = ptr to dwords to fill in +* dstTxt = where to make a copy of ASCII source +* (NULL ok) +* +* Return: Zero if no error. Nonzero --> invalid hex or length +* +* Notes: Note that the parameter d is a DWORD array, not a byte array. +* This routine is coded to work both for little-endian and big-endian +* architectures. The character stream is interpreted as a LITTLE-ENDIAN +* byte stream, since that is how the Pentium works, but the conversion +* happens automatically below. +* +-****************************************************************************/ +int ParseHexDword(int bits,CONST char *srcTxt,DWORD *d,char *dstTxt) + { + int i; + DWORD b; + char c; +#if ALIGN32 + char alignDummy[3]; /* keep dword alignment */ +#endif + + union /* make sure LittleEndian is defined correctly */ + { + BYTE b[4]; + DWORD d[1]; + } v; + v.d[0]=1; + if (v.b[0 ^ ADDR_XOR] != 1) /* sanity check on compile-time switch */ + return BAD_ENDIAN; + +#if VALIDATE_PARMS + #if ALIGN32 + if (((int)d) & 3) + return BAD_ALIGN32; + #endif +#endif + + for (i=0;i*32= '0') && (c <= '9')) + b=c-'0'; + else if ((c >= 'a') && (c <= 'f')) + b=c-'a'+10; + else if ((c >= 'A') && (c <= 'F')) + b=c-'A'+10; + else + return BAD_KEY_MAT; /* invalid hex character */ + /* works for big and little endian! */ + d[i/8] |= b << (4*((i^1)&7)); + } + + return 0; /* no error */ + } + + +/* ++***************************************************************************** +* +* Function Name: f32 +* +* Function: Run four bytes through keyed S-boxes and apply MDS matrix +* +* Arguments: x = input to f function +* k32 = pointer to key dwords +* keyLen = total key length (k32 --> keyLey/2 bits) +* +* Return: The output of the keyed permutation applied to x. +* +* Notes: +* This function is a keyed 32-bit permutation. It is the major building +* block for the Twofish round function, including the four keyed 8x8 +* permutations and the 4x4 MDS matrix multiply. This function is used +* both for generating round subkeys and within the round function on the +* block being encrypted. +* +* This version is fairly slow and pedagogical, although a smartcard would +* probably perform the operation exactly this way in firmware. For +* ultimate performance, the entire operation can be completed with four +* lookups into four 256x32-bit tables, with three dword xors. +* +* The MDS matrix is defined in TABLE.H. To multiply by Mij, just use the +* macro Mij(x). +* +-****************************************************************************/ +DWORD f32(DWORD x,CONST DWORD *k32,int keyLen) + { + BYTE b[4]; + + /* Run each byte thru 8x8 S-boxes, xoring with key byte at each stage. */ + /* Note that each byte goes through a different combination of S-boxes.*/ + + *((DWORD *)b) = Bswap(x); /* make b[0] = LSB, b[3] = MSB */ + switch (((keyLen + 63)/64) & 3) + { + case 0: /* 256 bits of key */ + b[0] = p8(04)[b[0]] ^ b0(k32[3]); + b[1] = p8(14)[b[1]] ^ b1(k32[3]); + b[2] = p8(24)[b[2]] ^ b2(k32[3]); + b[3] = p8(34)[b[3]] ^ b3(k32[3]); + /* fall thru, having pre-processed b[0]..b[3] with k32[3] */ + case 3: /* 192 bits of key */ + b[0] = p8(03)[b[0]] ^ b0(k32[2]); + b[1] = p8(13)[b[1]] ^ b1(k32[2]); + b[2] = p8(23)[b[2]] ^ b2(k32[2]); + b[3] = p8(33)[b[3]] ^ b3(k32[2]); + /* fall thru, having pre-processed b[0]..b[3] with k32[2] */ + case 2: /* 128 bits of key */ + b[0] = p8(00)[p8(01)[p8(02)[b[0]] ^ b0(k32[1])] ^ b0(k32[0])]; + b[1] = p8(10)[p8(11)[p8(12)[b[1]] ^ b1(k32[1])] ^ b1(k32[0])]; + b[2] = p8(20)[p8(21)[p8(22)[b[2]] ^ b2(k32[1])] ^ b2(k32[0])]; + b[3] = p8(30)[p8(31)[p8(32)[b[3]] ^ b3(k32[1])] ^ b3(k32[0])]; + } + + if (tabEnable) + { /* we could give a "tighter" bound, but this works acceptably well */ + tabUsed[b0(x)] |= (P_00 == 0) ? P0_USED : P1_USED; + tabUsed[b1(x)] |= (P_10 == 0) ? P0_USED : P1_USED; + tabUsed[b2(x)] |= (P_20 == 0) ? P0_USED : P1_USED; + tabUsed[b3(x)] |= (P_30 == 0) ? P0_USED : P1_USED; + + tabUsed[b[0] ] |= B0_USED; + tabUsed[b[1] ] |= B1_USED; + tabUsed[b[2] ] |= B2_USED; + tabUsed[b[3] ] |= B3_USED; + } + + /* Now perform the MDS matrix multiply inline. */ + return ((M00(b[0]) ^ M01(b[1]) ^ M02(b[2]) ^ M03(b[3])) ) ^ + ((M10(b[0]) ^ M11(b[1]) ^ M12(b[2]) ^ M13(b[3])) << 8) ^ + ((M20(b[0]) ^ M21(b[1]) ^ M22(b[2]) ^ M23(b[3])) << 16) ^ + ((M30(b[0]) ^ M31(b[1]) ^ M32(b[2]) ^ M33(b[3])) << 24) ; + } + +/* ++***************************************************************************** +* +* Function Name: RS_MDS_Encode +* +* Function: Use (12,8) Reed-Solomon code over GF(256) to produce +* a key S-box dword from two key material dwords. +* +* Arguments: k0 = 1st dword +* k1 = 2nd dword +* +* Return: Remainder polynomial generated using RS code +* +* Notes: +* Since this computation is done only once per reKey per 64 bits of key, +* the performance impact of this routine is imperceptible. The RS code +* chosen has "simple" coefficients to allow smartcard/hardware implementation +* without lookup tables. +* +-****************************************************************************/ +DWORD RS_MDS_Encode(DWORD k0,DWORD k1) + { + int i,j; + DWORD r; + + for (i=r=0;i<2;i++) + { + r ^= (i) ? k0 : k1; /* merge in 32 more key bits */ + for (j=0;j<4;j++) /* shift one byte at a time */ + RS_rem(r); + } + return r; + } + +/* ++***************************************************************************** +* +* Function Name: reKey +* +* Function: Initialize the Twofish key schedule from key32 +* +* Arguments: key = ptr to keyInstance to be initialized +* +* Return: TRUE on success +* +* Notes: +* Here we precompute all the round subkeys, although that is not actually +* required. For example, on a smartcard, the round subkeys can +* be generated on-the-fly using f32() +* +-****************************************************************************/ +int reKey(keyInstance *key) + { + int i,k64Cnt; + int keyLen = key->keyLen; + int subkeyCnt = ROUND_SUBKEYS + 2*key->numRounds; + DWORD A,B; + DWORD k32e[MAX_KEY_BITS/64],k32o[MAX_KEY_BITS/64]; /* even/odd key dwords */ + +#if VALIDATE_PARMS + #if ALIGN32 + if ((((int)key) & 3) || (((int)key->key32) & 3)) + return BAD_ALIGN32; + #endif + if ((key->keyLen % 64) || (key->keyLen < MIN_KEY_BITS)) + return BAD_KEY_INSTANCE; + if (subkeyCnt > TOTAL_SUBKEYS) + return BAD_KEY_INSTANCE; +#endif + + k64Cnt=(keyLen+63)/64; /* round up to next multiple of 64 bits */ + for (i=0;ikey32[2*i ]; + k32o[i]=key->key32[2*i+1]; + /* compute S-box keys using (12,8) Reed-Solomon code over GF(256) */ + key->sboxKeys[k64Cnt-1-i]=RS_MDS_Encode(k32e[i],k32o[i]); /* reverse order */ + } + + for (i=0;isubKeys[2*i ] = A+ B; /* combine with a PHT */ + key->subKeys[2*i+1] = ROL(A+2*B,SK_ROTL); + } + + DebugDumpKey(key); + + return TRUE; + } +/* ++***************************************************************************** +* +* Function Name: makeKey +* +* Function: Initialize the Twofish key schedule +* +* Arguments: key = ptr to keyInstance to be initialized +* direction = DIR_ENCRYPT or DIR_DECRYPT +* keyLen = # bits of key text at *keyMaterial +* keyMaterial = ptr to hex ASCII chars representing key bits +* +* Return: TRUE on success +* else error code (e.g., BAD_KEY_DIR) +* +* Notes: +* This parses the key bits from keyMaterial. No crypto stuff happens here. +* The function reKey() is called to actually build the key schedule after +* the keyMaterial has been parsed. +* +-****************************************************************************/ +int makeKey(keyInstance *key, BYTE direction, int keyLen,CONST char *keyMaterial) + { + int i; + +#if VALIDATE_PARMS /* first, sanity check on parameters */ + if (key == NULL) + return BAD_KEY_INSTANCE;/* must have a keyInstance to initialize */ + if ((direction != DIR_ENCRYPT) && (direction != DIR_DECRYPT)) + return BAD_KEY_DIR; /* must have valid direction */ + if ((keyLen > MAX_KEY_BITS) || (keyLen < 8)) + return BAD_KEY_MAT; /* length must be valid */ + key->keySig = VALID_SIG; /* show that we are initialized */ + #if ALIGN32 + if ((((int)key) & 3) || (((int)key->key32) & 3)) + return BAD_ALIGN32; + #endif +#endif + + key->direction = direction; /* set our cipher direction */ + key->keyLen = (keyLen+63) & ~63; /* round up to multiple of 64 */ + key->numRounds = numRounds[(keyLen-1)/64]; + for (i=0;ikey32[i]=0; + key->keyMaterial[MAX_KEY_SIZE]=0; /* terminate ASCII string */ + + if ((keyMaterial == NULL) || (keyMaterial[0]==0)) + return TRUE; /* allow a "dummy" call */ + + if (ParseHexDword(keyLen,keyMaterial,key->key32,key->keyMaterial)) + return BAD_KEY_MAT; + + return reKey(key); /* generate round subkeys */ + } + + +/* ++***************************************************************************** +* +* Function Name: cipherInit +* +* Function: Initialize the Twofish cipher in a given mode +* +* Arguments: cipher = ptr to cipherInstance to be initialized +* mode = MODE_ECB, MODE_CBC, or MODE_CFB1 +* IV = ptr to hex ASCII test representing IV bytes +* +* Return: TRUE on success +* else error code (e.g., BAD_CIPHER_MODE) +* +-****************************************************************************/ +int cipherInit(cipherInstance *cipher, BYTE mode,CONST char *IV) + { + int i; +#if VALIDATE_PARMS /* first, sanity check on parameters */ + if (cipher == NULL) + return BAD_PARAMS; /* must have a cipherInstance to initialize */ + if ((mode != MODE_ECB) && (mode != MODE_CBC) && (mode != MODE_CFB1)) + return BAD_CIPHER_MODE; /* must have valid cipher mode */ + cipher->cipherSig = VALID_SIG; + #if ALIGN32 + if ((((int)cipher) & 3) || (((int)cipher->IV) & 3) || (((int)cipher->iv32) & 3)) + return BAD_ALIGN32; + #endif +#endif + + if ((mode != MODE_ECB) && (IV)) /* parse the IV */ + { + if (ParseHexDword(BLOCK_SIZE,IV,cipher->iv32,NULL)) + return BAD_IV_MAT; + for (i=0;iIV)[i] = Bswap(cipher->iv32[i]); + } + + cipher->mode = mode; + + return TRUE; + } + +/* ++***************************************************************************** +* +* Function Name: blockEncrypt +* +* Function: Encrypt block(s) of data using Twofish +* +* Arguments: cipher = ptr to already initialized cipherInstance +* key = ptr to already initialized keyInstance +* input = ptr to data blocks to be encrypted +* inputLen = # bits to encrypt (multiple of blockSize) +* outBuffer = ptr to where to put encrypted blocks +* +* Return: # bits ciphered (>= 0) +* else error code (e.g., BAD_CIPHER_STATE, BAD_KEY_MATERIAL) +* +* Notes: The only supported block size for ECB/CBC modes is BLOCK_SIZE bits. +* If inputLen is not a multiple of BLOCK_SIZE bits in those modes, +* an error BAD_INPUT_LEN is returned. In CFB1 mode, all block +* sizes can be supported. +* +-****************************************************************************/ +int blockEncrypt(cipherInstance *cipher, keyInstance *key,CONST BYTE *input, + int inputLen, BYTE *outBuffer) + { + int i,n,r; /* loop variables */ + DWORD x[BLOCK_SIZE/32]; /* block being encrypted */ + DWORD t0,t1,tmp; /* temp variables */ + int rounds=key->numRounds; /* number of rounds */ + BYTE bit,ctBit,carry; /* temps for CFB */ +#if ALIGN32 + BYTE alignDummy; /* keep 32-bit variable alignment on stack */ +#endif + +#if VALIDATE_PARMS + if ((cipher == NULL) || (cipher->cipherSig != VALID_SIG)) + return BAD_CIPHER_STATE; + if ((key == NULL) || (key->keySig != VALID_SIG)) + return BAD_KEY_INSTANCE; + if ((rounds < 2) || (rounds > MAX_ROUNDS) || (rounds&1)) + return BAD_KEY_INSTANCE; + if ((cipher->mode != MODE_CFB1) && (inputLen % BLOCK_SIZE)) + return BAD_INPUT_LEN; + #if ALIGN32 + if ( (((int)cipher) & 3) || (((int)key ) & 3) || + (((int)input ) & 3) || (((int)outBuffer) & 3)) + return BAD_ALIGN32; + #endif +#endif + + if (cipher->mode == MODE_CFB1) + { /* use recursion here to handle CFB, one block at a time */ + cipher->mode = MODE_ECB; /* do encryption in ECB */ + for (n=0;nIV,BLOCK_SIZE,(BYTE *)x); + bit = 0x80 >> (n & 7);/* which bit position in byte */ + ctBit = (input[n/8] & bit) ^ ((((BYTE *) x)[0] & 0x80) >> (n&7)); + outBuffer[n/8] = (outBuffer[n/8] & ~ bit) | ctBit; + carry = ctBit >> (7 - (n&7)); + for (i=BLOCK_SIZE/8-1;i>=0;i--) + { + bit = cipher->IV[i] >> 7; /* save next "carry" from shift */ + cipher->IV[i] = (cipher->IV[i] << 1) ^ carry; + carry = bit; + } + } + cipher->mode = MODE_CFB1; /* restore mode for next time */ + return inputLen; + } + + /* here for ECB, CBC modes */ + for (n=0;nmode == MODE_CBC) + DebugDump(cipher->iv32,"",IV_ROUND,0,0,0,0); +#endif + for (i=0;isubKeys[INPUT_WHITEN+i]; + if (cipher->mode == MODE_CBC) + x[i] ^= Bswap(cipher->iv32[i]); + } + + DebugDump(x,"",0,0,0,0,0); + for (r=0;rsboxKeys,key->keyLen); + t1 = f32(ROL(x[1],8+(r+1)/2),key->sboxKeys,key->keyLen); + /* PHT, round keys */ + x[2]^= ROL(t0 + t1 + key->subKeys[ROUND_SUBKEYS+2*r ], r /2); + x[3]^= ROR(t0 + 2*t1 + key->subKeys[ROUND_SUBKEYS+2*r+1],(r+2) /2); + + DebugDump(x,"",r+1,2*(r&1),1,1,0); +#else + t0 = f32( x[0] ,key->sboxKeys,key->keyLen); + t1 = f32(ROL(x[1],8),key->sboxKeys,key->keyLen); + + x[3] = ROL(x[3],1); + x[2]^= t0 + t1 + key->subKeys[ROUND_SUBKEYS+2*r ]; /* PHT, round keys */ + x[3]^= t0 + 2*t1 + key->subKeys[ROUND_SUBKEYS+2*r+1]; + x[2] = ROR(x[2],1); + + DebugDump(x,"",r+1,2*(r&1),0,1,0);/* make format compatible with optimized code */ +#endif + if (r < rounds-1) /* swap for next round */ + { + tmp = x[0]; x[0]= x[2]; x[2] = tmp; + tmp = x[1]; x[1]= x[3]; x[3] = tmp; + } + } +#if FEISTEL + x[0] = ROR(x[0],8); /* "final permutation" */ + x[1] = ROL(x[1],8); + x[2] = ROR(x[2],8); + x[3] = ROL(x[3],8); +#endif + for (i=0;isubKeys[OUTPUT_WHITEN+i]); + if (cipher->mode == MODE_CBC) + cipher->iv32[i] = ((DWORD *)outBuffer)[i]; + } +#ifdef DEBUG + DebugDump(outBuffer,"",rounds+1,0,0,0,1); + if (cipher->mode == MODE_CBC) + DebugDump(cipher->iv32,"",IV_ROUND,0,0,0,0); +#endif + } + + return inputLen; + } + +/* ++***************************************************************************** +* +* Function Name: blockDecrypt +* +* Function: Decrypt block(s) of data using Twofish +* +* Arguments: cipher = ptr to already initialized cipherInstance +* key = ptr to already initialized keyInstance +* input = ptr to data blocks to be decrypted +* inputLen = # bits to encrypt (multiple of blockSize) +* outBuffer = ptr to where to put decrypted blocks +* +* Return: # bits ciphered (>= 0) +* else error code (e.g., BAD_CIPHER_STATE, BAD_KEY_MATERIAL) +* +* Notes: The only supported block size for ECB/CBC modes is BLOCK_SIZE bits. +* If inputLen is not a multiple of BLOCK_SIZE bits in those modes, +* an error BAD_INPUT_LEN is returned. In CFB1 mode, all block +* sizes can be supported. +* +-****************************************************************************/ +int blockDecrypt(cipherInstance *cipher, keyInstance *key,CONST BYTE *input, + int inputLen, BYTE *outBuffer) + { + int i,n,r; /* loop counters */ + DWORD x[BLOCK_SIZE/32]; /* block being encrypted */ + DWORD t0,t1; /* temp variables */ + int rounds=key->numRounds; /* number of rounds */ + BYTE bit,ctBit,carry; /* temps for CFB */ +#if ALIGN32 + BYTE alignDummy; /* keep 32-bit variable alignment on stack */ +#endif + +#if VALIDATE_PARMS + if ((cipher == NULL) || (cipher->cipherSig != VALID_SIG)) + return BAD_CIPHER_STATE; + if ((key == NULL) || (key->keySig != VALID_SIG)) + return BAD_KEY_INSTANCE; + if ((rounds < 2) || (rounds > MAX_ROUNDS) || (rounds&1)) + return BAD_KEY_INSTANCE; + if ((cipher->mode != MODE_CFB1) && (inputLen % BLOCK_SIZE)) + return BAD_INPUT_LEN; + #if ALIGN32 + if ( (((int)cipher) & 3) || (((int)key ) & 3) || + (((int)input) & 3) || (((int)outBuffer) & 3)) + return BAD_ALIGN32; + #endif +#endif + + if (cipher->mode == MODE_CFB1) + { /* use blockEncrypt here to handle CFB, one block at a time */ + cipher->mode = MODE_ECB; /* do encryption in ECB */ + for (n=0;nIV,BLOCK_SIZE,(BYTE *)x); + bit = 0x80 >> (n & 7); + ctBit = input[n/8] & bit; + outBuffer[n/8] = (outBuffer[n/8] & ~ bit) | + (ctBit ^ ((((BYTE *) x)[0] & 0x80) >> (n&7))); + carry = ctBit >> (7 - (n&7)); + for (i=BLOCK_SIZE/8-1;i>=0;i--) + { + bit = cipher->IV[i] >> 7; /* save next "carry" from shift */ + cipher->IV[i] = (cipher->IV[i] << 1) ^ carry; + carry = bit; + } + } + cipher->mode = MODE_CFB1; /* restore mode for next time */ + return inputLen; + } + + /* here for ECB, CBC modes */ + for (n=0;nsubKeys[OUTPUT_WHITEN+i]; + + for (r=rounds-1;r>=0;r--) /* main Twofish decryption loop */ + { + t0 = f32( x[0] ,key->sboxKeys,key->keyLen); + t1 = f32(ROL(x[1],8),key->sboxKeys,key->keyLen); + + DebugDump(x,"",r+1,2*(r&1),0,1,0);/* make format compatible with optimized code */ + x[2] = ROL(x[2],1); + x[2]^= t0 + t1 + key->subKeys[ROUND_SUBKEYS+2*r ]; /* PHT, round keys */ + x[3]^= t0 + 2*t1 + key->subKeys[ROUND_SUBKEYS+2*r+1]; + x[3] = ROR(x[3],1); + + if (r) /* unswap, except for last round */ + { + t0 = x[0]; x[0]= x[2]; x[2] = t0; + t1 = x[1]; x[1]= x[3]; x[3] = t1; + } + } + DebugDump(x,"",0,0,0,0,0);/* make final output match encrypt initial output */ + + for (i=0;isubKeys[INPUT_WHITEN+i]; + if (cipher->mode == MODE_CBC) + { + x[i] ^= Bswap(cipher->iv32[i]); + cipher->iv32[i] = ((DWORD *)input)[i]; + } + ((DWORD *)outBuffer)[i] = Bswap(x[i]); + } + DebugDump(outBuffer,"",-1,0,0,0,1); + } + + return inputLen; + } + + +#ifdef GetCodeSize +DWORD TwofishCodeSize(void) { return Here(0)-TwofishCodeStart(); }; +#endif diff --git a/twofish/aes.h b/twofish/aes.h new file mode 100644 index 0000000..570a95d --- /dev/null +++ b/twofish/aes.h @@ -0,0 +1,268 @@ +/* aes.h */ + +/* ---------- See examples at end of this file for typical usage -------- */ + +/* AES Cipher header file for ANSI C Submissions + Lawrence E. Bassham III + Computer Security Division + National Institute of Standards and Technology + + This sample is to assist implementers developing to the +Cryptographic API Profile for AES Candidate Algorithm Submissions. +Please consult this document as a cross-reference. + + ANY CHANGES, WHERE APPROPRIATE, TO INFORMATION PROVIDED IN THIS FILE +MUST BE DOCUMENTED. CHANGES ARE ONLY APPROPRIATE WHERE SPECIFIED WITH +THE STRING "CHANGE POSSIBLE". FUNCTION CALLS AND THEIR PARAMETERS +CANNOT BE CHANGED. STRUCTURES CAN BE ALTERED TO ALLOW IMPLEMENTERS TO +INCLUDE IMPLEMENTATION SPECIFIC INFORMATION. +*/ + +/* Includes: + Standard include files +*/ + +#include +#include "platform.h" /* platform-specific defines */ + +/* Defines: + Add any additional defines you need +*/ + +#define DIR_ENCRYPT 0 /* Are we encrpyting? */ +#define DIR_DECRYPT 1 /* Are we decrpyting? */ +#define MODE_ECB 1 /* Are we ciphering in ECB mode? */ +#define MODE_CBC 2 /* Are we ciphering in CBC mode? */ +#define MODE_CFB1 3 /* Are we ciphering in 1-bit CFB mode? */ + +#define TRUE 1 +#define FALSE 0 + +#define BAD_KEY_DIR -1 /* Key direction is invalid (unknown value) */ +#define BAD_KEY_MAT -2 /* Key material not of correct length */ +#define BAD_KEY_INSTANCE -3 /* Key passed is not valid */ +#define BAD_CIPHER_MODE -4 /* Params struct passed to cipherInit invalid */ +#define BAD_CIPHER_STATE -5 /* Cipher in wrong state (e.g., not initialized) */ + +/* CHANGE POSSIBLE: inclusion of algorithm specific defines */ +/* TWOFISH specific definitions */ +#define MAX_KEY_SIZE 64 /* # of ASCII chars needed to represent a key */ +#define MAX_IV_SIZE 16 /* # of bytes needed to represent an IV */ +#define BAD_INPUT_LEN -6 /* inputLen not a multiple of block size */ +#define BAD_PARAMS -7 /* invalid parameters */ +#define BAD_IV_MAT -8 /* invalid IV text */ +#define BAD_ENDIAN -9 /* incorrect endianness define */ +#define BAD_ALIGN32 -10 /* incorrect 32-bit alignment */ + +#define BLOCK_SIZE 128 /* number of bits per block */ +#define MAX_ROUNDS 16 /* max # rounds (for allocating subkey array) */ +#define ROUNDS_128 16 /* default number of rounds for 128-bit keys*/ +#define ROUNDS_192 16 /* default number of rounds for 192-bit keys*/ +#define ROUNDS_256 16 /* default number of rounds for 256-bit keys*/ +#define MAX_KEY_BITS 256 /* max number of bits of key */ +#define MIN_KEY_BITS 128 /* min number of bits of key (zero pad) */ +#define VALID_SIG 0x48534946 /* initialization signature ('FISH') */ +#define MCT_OUTER 400 /* MCT outer loop */ +#define MCT_INNER 10000 /* MCT inner loop */ +#define REENTRANT 1 /* nonzero forces reentrant code (slightly slower) */ + +#define INPUT_WHITEN 0 /* subkey array indices */ +#define OUTPUT_WHITEN ( INPUT_WHITEN + BLOCK_SIZE/32) +#define ROUND_SUBKEYS (OUTPUT_WHITEN + BLOCK_SIZE/32) /* use 2 * (# rounds) */ +#define TOTAL_SUBKEYS (ROUND_SUBKEYS + 2*MAX_ROUNDS) + +/* Typedefs: + Typedef'ed data storage elements. Add any algorithm specific + parameters at the bottom of the structs as appropriate. +*/ + +typedef unsigned char BYTE; +typedef unsigned long DWORD; /* 32-bit unsigned quantity */ +typedef DWORD fullSbox[4][256]; + +/* The structure for key information */ +typedef struct + { + BYTE direction; /* Key used for encrypting or decrypting? */ +#if ALIGN32 + BYTE dummyAlign[3]; /* keep 32-bit alignment */ +#endif + int keyLen; /* Length of the key */ + char keyMaterial[MAX_KEY_SIZE+4];/* Raw key data in ASCII */ + + /* Twofish-specific parameters: */ + DWORD keySig; /* set to VALID_SIG by makeKey() */ + int numRounds; /* number of rounds in cipher */ + DWORD key32[MAX_KEY_BITS/32]; /* actual key bits, in dwords */ + DWORD sboxKeys[MAX_KEY_BITS/64];/* key bits used for S-boxes */ + DWORD subKeys[TOTAL_SUBKEYS]; /* round subkeys, input/output whitening bits */ +#if REENTRANT + fullSbox sBox8x32; /* fully expanded S-box */ + #if defined(COMPILE_KEY) && defined(USE_ASM) +#undef VALID_SIG +#define VALID_SIG 0x504D4F43 /* 'COMP': C is compiled with -DCOMPILE_KEY */ + DWORD cSig1; /* set after first "compile" (zero at "init") */ + void *encryptFuncPtr; /* ptr to asm encrypt function */ + void *decryptFuncPtr; /* ptr to asm decrypt function */ + DWORD codeSize; /* size of compiledCode */ + DWORD cSig2; /* set after first "compile" */ + BYTE compiledCode[5000]; /* make room for the code itself */ + #endif +#endif + } keyInstance; + +/* The structure for cipher information */ +typedef struct + { + BYTE mode; /* MODE_ECB, MODE_CBC, or MODE_CFB1 */ +#if ALIGN32 + BYTE dummyAlign[3]; /* keep 32-bit alignment */ +#endif + BYTE IV[MAX_IV_SIZE]; /* CFB1 iv bytes (CBC uses iv32) */ + + /* Twofish-specific parameters: */ + DWORD cipherSig; /* set to VALID_SIG by cipherInit() */ + DWORD iv32[BLOCK_SIZE/32]; /* CBC IV bytes arranged as dwords */ + } cipherInstance; + +/* Function protoypes */ +int makeKey(keyInstance *key, BYTE direction, int keyLen, char *keyMaterial); + +int cipherInit(cipherInstance *cipher, BYTE mode, char *IV); + +int blockEncrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, + int inputLen, BYTE *outBuffer); + +int blockDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, + int inputLen, BYTE *outBuffer); + +int reKey(keyInstance *key); /* do key schedule using modified key.keyDwords */ + +/* API to check table usage, for use in ECB_TBL KAT */ +#define TAB_DISABLE 0 +#define TAB_ENABLE 1 +#define TAB_RESET 2 +#define TAB_QUERY 3 +#define TAB_MIN_QUERY 50 +int TableOp(int op); + + +#define CONST /* helpful C++ syntax sugar, NOP for ANSI C */ + +#if BLOCK_SIZE == 128 /* optimize block copies */ +#define Copy1(d,s,N) ((DWORD *)(d))[N] = ((DWORD *)(s))[N] +#define BlockCopy(d,s) { Copy1(d,s,0);Copy1(d,s,1);Copy1(d,s,2);Copy1(d,s,3); } +#else +#define BlockCopy(d,s) { memcpy(d,s,BLOCK_SIZE/8); } +#endif + + +#ifdef TEST_2FISH +/* ----- EXAMPLES ----- + +Unfortunately, the AES API is somewhat clumsy, and it is not entirely +obvious how to use the above functions. In particular, note that +makeKey() takes an ASCII hex nibble key string (e.g., 32 characters +for a 128-bit key), which is rarely the way that keys are internally +represented. The reKey() function uses instead the keyInstance.key32 +array of key bits and is the preferred method. In fact, makeKey() +initializes some internal keyInstance state, then parse the ASCII +string into the binary key32, and calls reKey(). To initialize the +keyInstance state, use a 'dummy' call to makeKey(); i.e., set the +keyMaterial parameter to NULL. Then use reKey() for all key changes. +Similarly, cipherInit takes an IV string in ASCII hex, so a dummy setup +call with a null IV string will skip the ASCII parse. + +Note that CFB mode is not well tested nor defined by AES, so using the +Twofish MODE_CFB it not recommended. If you wish to implement a CFB mode, +build it external to the Twofish code, using the Twofish functions only +in ECB mode. + +Below is a sample piece of code showing how the code is typically used +to set up a key, encrypt, and decrypt. Error checking is somewhat limited +in this example. Pseudorandom bytes are used for all key and text. + +If you compile TWOFISH2.C or TWOFISH.C as a DOS (or Windows Console) app +with this code enabled, the test will be run. For example, using +Borland C, you would compile using: + BCC32 -DTEST_2FISH twofish2.c +to run the test on the optimized code, or + BCC32 -DTEST_2FISH twofish.c +to run the test on the pedagogical code. + +*/ + +#include +#include +#include +#include + +#define MAX_BLK_CNT 4 /* max # blocks per call in TestTwofish */ +int TestTwofish(int mode,int keySize) /* keySize must be 128, 192, or 256 */ + { /* return 0 iff test passes */ + keyInstance ki; /* key information, including tables */ + cipherInstance ci; /* keeps mode (ECB, CBC) and IV */ + BYTE plainText[MAX_BLK_CNT*(BLOCK_SIZE/8)]; + BYTE cipherText[MAX_BLK_CNT*(BLOCK_SIZE/8)]; + BYTE decryptOut[MAX_BLK_CNT*(BLOCK_SIZE/8)]; + BYTE iv[BLOCK_SIZE/8]; + int i,byteCnt; + + if (makeKey(&ki,DIR_ENCRYPT,keySize,NULL) != TRUE) + return 1; /* 'dummy' setup for a 128-bit key */ + if (cipherInit(&ci,mode,NULL) != TRUE) + return 1; /* 'dummy' setup for cipher */ + + for (i=0;ikeyLen+63)/64; /* round up to next multiple of 64 bits */ + int subkeyCnt = ROUND_SUBKEYS + 2*key->numRounds; + + sprintf(line,";\n;makeKey: Input key --> S-box key [%s]\n", + (key->direction == DIR_ENCRYPT) ? "Encrypt" : "Decrypt"); + DebugIO(line); + for (i=0;i %08lX\n","", + key->key32[2*i+1],key->key32[2*i],key->sboxKeys[k64Cnt-1-i]); + DebugIO(line); + } + sprintf(line,";%11sSubkeys\n",""); + DebugIO(line); + for (i=0;isubKeys[2*i],key->subKeys[2*i+1], + (2*i == INPUT_WHITEN) ? " Input whiten" : + (2*i == OUTPUT_WHITEN) ? " Output whiten" : + (2*i == ROUND_SUBKEYS) ? " Round subkeys" : ""); + DebugIO(line); + } + DebugIO(";\n"); + } +#else +CONST int debugCompile = 0; +#define DebugDump(x,s,R,XOR,doRot,showT,needBswap) +#define DebugDumpKey(key) +#endif diff --git a/twofish/platform.h b/twofish/platform.h new file mode 100644 index 0000000..400ea28 --- /dev/null +++ b/twofish/platform.h @@ -0,0 +1,75 @@ +/*************************************************************************** + PLATFORM.H -- Platform-specific defines for TWOFISH code + + Submitters: + Bruce Schneier, Counterpane Systems + Doug Whiting, Hi/fn + John Kelsey, Counterpane Systems + Chris Hall, Counterpane Systems + David Wagner, UC Berkeley + + Code Author: Doug Whiting, Hi/fn + + Version 1.00 April 1998 + + Copyright 1998, Hi/fn and Counterpane Systems. All rights reserved. + + Notes: + * Tab size is set to 4 characters in this file + +***************************************************************************/ + +/* use intrinsic rotate if possible */ +#define ROL(x,n) (((x) << ((n) & 0x1F)) | ((x) >> (32-((n) & 0x1F)))) +#define ROR(x,n) (((x) >> ((n) & 0x1F)) | ((x) << (32-((n) & 0x1F)))) + +#if (0) && defined(__BORLANDC__) && (__BORLANDC__ >= 0x462) +#error "!!!This does not work for some reason!!!" +#include /* get prototype for _lrotl() , _lrotr() */ +#pragma inline __lrotl__ +#pragma inline __lrotr__ +#undef ROL /* get rid of inefficient definitions */ +#undef ROR +#define ROL(x,n) __lrotl__(x,n) /* use compiler intrinsic rotations */ +#define ROR(x,n) __lrotr__(x,n) +#endif + +#ifdef _MSC_VER +#include /* get prototypes for rotation functions */ +#undef ROL +#undef ROR +#pragma intrinsic(_lrotl,_lrotr) /* use intrinsic compiler rotations */ +#define ROL(x,n) _lrotl(x,n) +#define ROR(x,n) _lrotr(x,n) +#endif + +#if !defined(__i386__) && !defined(__x86_64__) +#ifdef __BORLANDC__ +#define __i386__ 300 /* make sure this is defined for Intel CPUs */ +#endif +#endif + +#if defined(__i386__) || defined(__x86_64__) || defined(__arm__) +#define LittleEndian 1 /* e.g., 1 for Pentium, 0 for 68K */ +#define ALIGN32 0 /* need dword alignment? (no for Pentium) */ +#else /* non-Intel platforms */ +#define LittleEndian 0 /* (assume big endian */ +#define ALIGN32 0 /* (assume need alignment for non-Intel) */ +#endif + +#if LittleEndian +#define Bswap(x) (x) /* NOP for little-endian machines */ +#define ADDR_XOR 0 /* NOP for little-endian machines */ +#else +#define Bswap(x) ((ROR(x,8) & 0xFF00FF00) | (ROL(x,8) & 0x00FF00FF)) +#define ADDR_XOR 3 /* convert byte address in dword */ +#endif + +/* Macros for extracting bytes from dwords (correct for endianness) */ +#define _b(x,N) (((BYTE *)&x)[((N) & 3) ^ ADDR_XOR]) /* pick bytes out of a dword */ + +#define b0(x) _b(x,0) /* extract LSB of DWORD */ +#define b1(x) _b(x,1) +#define b2(x) _b(x,2) +#define b3(x) _b(x,3) /* extract MSB of DWORD */ + diff --git a/twofish/table.h b/twofish/table.h new file mode 100644 index 0000000..5c3c590 --- /dev/null +++ b/twofish/table.h @@ -0,0 +1,228 @@ +/*************************************************************************** + TABLE.H -- Tables, macros, constants for Twofish S-boxes and MDS matrix + + Submitters: + Bruce Schneier, Counterpane Systems + Doug Whiting, Hi/fn + John Kelsey, Counterpane Systems + Chris Hall, Counterpane Systems + David Wagner, UC Berkeley + + Code Author: Doug Whiting, Hi/fn + + Version 1.00 April 1998 + + Copyright 1998, Hi/fn and Counterpane Systems. All rights reserved. + + Notes: + * Tab size is set to 4 characters in this file + * These definitions should be used in optimized and unoptimized + versions to insure consistency. + +***************************************************************************/ + +/* for computing subkeys */ +#define SK_STEP 0x02020202u +#define SK_BUMP 0x01010101u +#define SK_ROTL 9 + +/* Reed-Solomon code parameters: (12,8) reversible code + g(x) = x**4 + (a + 1/a) x**3 + a x**2 + (a + 1/a) x + 1 + where a = primitive root of field generator 0x14D */ +#define RS_GF_FDBK 0x14D /* field generator */ +#define RS_rem(x) \ + { BYTE b = (BYTE) (x >> 24); \ + DWORD g2 = ((b << 1) ^ ((b & 0x80) ? RS_GF_FDBK : 0 )) & 0xFF; \ + DWORD g3 = ((b >> 1) & 0x7F) ^ ((b & 1) ? RS_GF_FDBK >> 1 : 0 ) ^ g2 ; \ + x = (x << 8) ^ (g3 << 24) ^ (g2 << 16) ^ (g3 << 8) ^ b; \ + } + +/* Macros for the MDS matrix +* The MDS matrix is (using primitive polynomial 169): +* 01 EF 5B 5B +* 5B EF EF 01 +* EF 5B 01 EF +* EF 01 EF 5B +*---------------------------------------------------------------- +* More statistical properties of this matrix (from MDS.EXE output): +* +* Min Hamming weight (one byte difference) = 8. Max=26. Total = 1020. +* Prob[8]: 7 23 42 20 52 95 88 94 121 128 91 +* 102 76 41 24 8 4 1 3 0 0 0 +* Runs[8]: 2 4 5 6 7 8 9 11 +* MSBs[8]: 1 4 15 8 18 38 40 43 +* HW= 8: 05040705 0A080E0A 14101C14 28203828 50407050 01499101 A080E0A0 +* HW= 9: 04050707 080A0E0E 10141C1C 20283838 40507070 80A0E0E0 C6432020 07070504 +* 0E0E0A08 1C1C1410 38382820 70705040 E0E0A080 202043C6 05070407 0A0E080E +* 141C101C 28382038 50704070 A0E080E0 4320C620 02924B02 089A4508 +* Min Hamming weight (two byte difference) = 3. Max=28. Total = 390150. +* Prob[3]: 7 18 55 149 270 914 2185 5761 11363 20719 32079 +* 43492 51612 53851 52098 42015 31117 20854 11538 6223 2492 1033 +* MDS OK, ROR: 6+ 7+ 8+ 9+ 10+ 11+ 12+ 13+ 14+ 15+ 16+ +* 17+ 18+ 19+ 20+ 21+ 22+ 23+ 24+ 25+ 26+ +*/ +#define MDS_GF_FDBK 0x169 /* primitive polynomial for GF(256)*/ +#define LFSR1(x) ( ((x) >> 1) ^ (((x) & 0x01) ? MDS_GF_FDBK/2 : 0)) +#define LFSR2(x) ( ((x) >> 2) ^ (((x) & 0x02) ? MDS_GF_FDBK/2 : 0) \ + ^ (((x) & 0x01) ? MDS_GF_FDBK/4 : 0)) + +#define Mx_1(x) ((DWORD) (x)) /* force result to dword so << will work */ +#define Mx_X(x) ((DWORD) ((x) ^ LFSR2(x))) /* 5B */ +#define Mx_Y(x) ((DWORD) ((x) ^ LFSR1(x) ^ LFSR2(x))) /* EF */ + +#define M00 Mul_1 +#define M01 Mul_Y +#define M02 Mul_X +#define M03 Mul_X + +#define M10 Mul_X +#define M11 Mul_Y +#define M12 Mul_Y +#define M13 Mul_1 + +#define M20 Mul_Y +#define M21 Mul_X +#define M22 Mul_1 +#define M23 Mul_Y + +#define M30 Mul_Y +#define M31 Mul_1 +#define M32 Mul_Y +#define M33 Mul_X + +#define Mul_1 Mx_1 +#define Mul_X Mx_X +#define Mul_Y Mx_Y + +/* Define the fixed p0/p1 permutations used in keyed S-box lookup. + By changing the following constant definitions for P_ij, the S-boxes will + automatically get changed in all the Twofish source code. Note that P_i0 is + the "outermost" 8x8 permutation applied. See the f32() function to see + how these constants are to be used. +*/ +#define P_00 1 /* "outermost" permutation */ +#define P_01 0 +#define P_02 0 +#define P_03 (P_01^1) /* "extend" to larger key sizes */ +#define P_04 1 + +#define P_10 0 +#define P_11 0 +#define P_12 1 +#define P_13 (P_11^1) +#define P_14 0 + +#define P_20 1 +#define P_21 1 +#define P_22 0 +#define P_23 (P_21^1) +#define P_24 0 + +#define P_30 0 +#define P_31 1 +#define P_32 1 +#define P_33 (P_31^1) +#define P_34 1 + +#define p8(N) P8x8[P_##N] /* some syntax shorthand */ + +/* fixed 8x8 permutation S-boxes */ + +/*********************************************************************** +* 07:07:14 05/30/98 [4x4] TestCnt=256. keySize=128. CRC=4BD14D9E. +* maxKeyed: dpMax = 18. lpMax =100. fixPt = 8. skXor = 0. skDup = 6. +* log2(dpMax[ 6..18])= --- 15.42 1.33 0.89 4.05 7.98 12.05 +* log2(lpMax[ 7..12])= 9.32 1.01 1.16 4.23 8.02 12.45 +* log2(fixPt[ 0.. 8])= 1.44 1.44 2.44 4.06 6.01 8.21 11.07 14.09 17.00 +* log2(skXor[ 0.. 0]) +* log2(skDup[ 0.. 6])= --- 2.37 0.44 3.94 8.36 13.04 17.99 +***********************************************************************/ +CONST BYTE P8x8[2][256]= + { +/* p0: */ +/* dpMax = 10. lpMax = 64. cycleCnt= 1 1 1 0. */ +/* 817D6F320B59ECA4.ECB81235F4A6709D.BA5E6D90C8F32471.D7F4126E9B3085CA. */ +/* Karnaugh maps: +* 0111 0001 0011 1010. 0001 1001 1100 1111. 1001 1110 0011 1110. 1101 0101 1111 1001. +* 0101 1111 1100 0100. 1011 0101 0010 0000. 0101 1000 1100 0101. 1000 0111 0011 0010. +* 0000 1001 1110 1101. 1011 1000 1010 0011. 0011 1001 0101 0000. 0100 0010 0101 1011. +* 0111 0100 0001 0110. 1000 1011 1110 1001. 0011 0011 1001 1101. 1101 0101 0000 1100. +*/ + { + 0xA9, 0x67, 0xB3, 0xE8, 0x04, 0xFD, 0xA3, 0x76, + 0x9A, 0x92, 0x80, 0x78, 0xE4, 0xDD, 0xD1, 0x38, + 0x0D, 0xC6, 0x35, 0x98, 0x18, 0xF7, 0xEC, 0x6C, + 0x43, 0x75, 0x37, 0x26, 0xFA, 0x13, 0x94, 0x48, + 0xF2, 0xD0, 0x8B, 0x30, 0x84, 0x54, 0xDF, 0x23, + 0x19, 0x5B, 0x3D, 0x59, 0xF3, 0xAE, 0xA2, 0x82, + 0x63, 0x01, 0x83, 0x2E, 0xD9, 0x51, 0x9B, 0x7C, + 0xA6, 0xEB, 0xA5, 0xBE, 0x16, 0x0C, 0xE3, 0x61, + 0xC0, 0x8C, 0x3A, 0xF5, 0x73, 0x2C, 0x25, 0x0B, + 0xBB, 0x4E, 0x89, 0x6B, 0x53, 0x6A, 0xB4, 0xF1, + 0xE1, 0xE6, 0xBD, 0x45, 0xE2, 0xF4, 0xB6, 0x66, + 0xCC, 0x95, 0x03, 0x56, 0xD4, 0x1C, 0x1E, 0xD7, + 0xFB, 0xC3, 0x8E, 0xB5, 0xE9, 0xCF, 0xBF, 0xBA, + 0xEA, 0x77, 0x39, 0xAF, 0x33, 0xC9, 0x62, 0x71, + 0x81, 0x79, 0x09, 0xAD, 0x24, 0xCD, 0xF9, 0xD8, + 0xE5, 0xC5, 0xB9, 0x4D, 0x44, 0x08, 0x86, 0xE7, + 0xA1, 0x1D, 0xAA, 0xED, 0x06, 0x70, 0xB2, 0xD2, + 0x41, 0x7B, 0xA0, 0x11, 0x31, 0xC2, 0x27, 0x90, + 0x20, 0xF6, 0x60, 0xFF, 0x96, 0x5C, 0xB1, 0xAB, + 0x9E, 0x9C, 0x52, 0x1B, 0x5F, 0x93, 0x0A, 0xEF, + 0x91, 0x85, 0x49, 0xEE, 0x2D, 0x4F, 0x8F, 0x3B, + 0x47, 0x87, 0x6D, 0x46, 0xD6, 0x3E, 0x69, 0x64, + 0x2A, 0xCE, 0xCB, 0x2F, 0xFC, 0x97, 0x05, 0x7A, + 0xAC, 0x7F, 0xD5, 0x1A, 0x4B, 0x0E, 0xA7, 0x5A, + 0x28, 0x14, 0x3F, 0x29, 0x88, 0x3C, 0x4C, 0x02, + 0xB8, 0xDA, 0xB0, 0x17, 0x55, 0x1F, 0x8A, 0x7D, + 0x57, 0xC7, 0x8D, 0x74, 0xB7, 0xC4, 0x9F, 0x72, + 0x7E, 0x15, 0x22, 0x12, 0x58, 0x07, 0x99, 0x34, + 0x6E, 0x50, 0xDE, 0x68, 0x65, 0xBC, 0xDB, 0xF8, + 0xC8, 0xA8, 0x2B, 0x40, 0xDC, 0xFE, 0x32, 0xA4, + 0xCA, 0x10, 0x21, 0xF0, 0xD3, 0x5D, 0x0F, 0x00, + 0x6F, 0x9D, 0x36, 0x42, 0x4A, 0x5E, 0xC1, 0xE0 + }, +/* p1: */ +/* dpMax = 10. lpMax = 64. cycleCnt= 2 0 0 1. */ +/* 28BDF76E31940AC5.1E2B4C376DA5F908.4C75169A0ED82B3F.B951C3DE647F208A. */ +/* Karnaugh maps: +* 0011 1001 0010 0111. 1010 0111 0100 0110. 0011 0001 1111 0100. 1111 1000 0001 1100. +* 1100 1111 1111 1010. 0011 0011 1110 0100. 1001 0110 0100 0011. 0101 0110 1011 1011. +* 0010 0100 0011 0101. 1100 1000 1000 1110. 0111 1111 0010 0110. 0000 1010 0000 0011. +* 1101 1000 0010 0001. 0110 1001 1110 0101. 0001 0100 0101 0111. 0011 1011 1111 0010. +*/ + { + 0x75, 0xF3, 0xC6, 0xF4, 0xDB, 0x7B, 0xFB, 0xC8, + 0x4A, 0xD3, 0xE6, 0x6B, 0x45, 0x7D, 0xE8, 0x4B, + 0xD6, 0x32, 0xD8, 0xFD, 0x37, 0x71, 0xF1, 0xE1, + 0x30, 0x0F, 0xF8, 0x1B, 0x87, 0xFA, 0x06, 0x3F, + 0x5E, 0xBA, 0xAE, 0x5B, 0x8A, 0x00, 0xBC, 0x9D, + 0x6D, 0xC1, 0xB1, 0x0E, 0x80, 0x5D, 0xD2, 0xD5, + 0xA0, 0x84, 0x07, 0x14, 0xB5, 0x90, 0x2C, 0xA3, + 0xB2, 0x73, 0x4C, 0x54, 0x92, 0x74, 0x36, 0x51, + 0x38, 0xB0, 0xBD, 0x5A, 0xFC, 0x60, 0x62, 0x96, + 0x6C, 0x42, 0xF7, 0x10, 0x7C, 0x28, 0x27, 0x8C, + 0x13, 0x95, 0x9C, 0xC7, 0x24, 0x46, 0x3B, 0x70, + 0xCA, 0xE3, 0x85, 0xCB, 0x11, 0xD0, 0x93, 0xB8, + 0xA6, 0x83, 0x20, 0xFF, 0x9F, 0x77, 0xC3, 0xCC, + 0x03, 0x6F, 0x08, 0xBF, 0x40, 0xE7, 0x2B, 0xE2, + 0x79, 0x0C, 0xAA, 0x82, 0x41, 0x3A, 0xEA, 0xB9, + 0xE4, 0x9A, 0xA4, 0x97, 0x7E, 0xDA, 0x7A, 0x17, + 0x66, 0x94, 0xA1, 0x1D, 0x3D, 0xF0, 0xDE, 0xB3, + 0x0B, 0x72, 0xA7, 0x1C, 0xEF, 0xD1, 0x53, 0x3E, + 0x8F, 0x33, 0x26, 0x5F, 0xEC, 0x76, 0x2A, 0x49, + 0x81, 0x88, 0xEE, 0x21, 0xC4, 0x1A, 0xEB, 0xD9, + 0xC5, 0x39, 0x99, 0xCD, 0xAD, 0x31, 0x8B, 0x01, + 0x18, 0x23, 0xDD, 0x1F, 0x4E, 0x2D, 0xF9, 0x48, + 0x4F, 0xF2, 0x65, 0x8E, 0x78, 0x5C, 0x58, 0x19, + 0x8D, 0xE5, 0x98, 0x57, 0x67, 0x7F, 0x05, 0x64, + 0xAF, 0x63, 0xB6, 0xFE, 0xF5, 0xB7, 0x3C, 0xA5, + 0xCE, 0xE9, 0x68, 0x44, 0xE0, 0x4D, 0x43, 0x69, + 0x29, 0x2E, 0xAC, 0x15, 0x59, 0xA8, 0x0A, 0x9E, + 0x6E, 0x47, 0xDF, 0x34, 0x35, 0x6A, 0xCF, 0xDC, + 0x22, 0xC9, 0xC0, 0x9B, 0x89, 0xD4, 0xED, 0xAB, + 0x12, 0xA2, 0x0D, 0x52, 0xBB, 0x02, 0x2F, 0xA9, + 0xD7, 0x61, 0x1E, 0xB4, 0x50, 0x04, 0xF6, 0xC2, + 0x16, 0x25, 0x86, 0x56, 0x55, 0x09, 0xBE, 0x91 + } + }; From 44180b2c98aeb9e4dc214d874f58ce9ac43d843d Mon Sep 17 00:00:00 2001 From: Catatonic Prime Date: Sat, 12 Nov 2016 18:23:43 +0000 Subject: [PATCH 002/531] Adding documentation. Fixing memory leaks. --- hydra-radmin2.c | 62 +++++++++++++++++++++++++++---------------------- 1 file changed, 34 insertions(+), 28 deletions(-) diff --git a/hydra-radmin2.c b/hydra-radmin2.c index 662a173..e84d47e 100644 --- a/hydra-radmin2.c +++ b/hydra-radmin2.c @@ -13,41 +13,31 @@ extern int cipherInit(cipherInstance *cipher, BYTE mode,CONST char *IV); extern int blockEncrypt(cipherInstance *cipher, keyInstance *key,CONST BYTE *input, int inputLen, BYTE *outBuffer); extern int blockDecrypt(cipherInstance *cipher, keyInstance *key,CONST BYTE *input, int inputLen, BYTE *outBuffer); +//RAdmin 2.x struct rmessage{ - char magic; //No touching! + char magic; //Indicates version, probably? unsigned int length; //Total message size of data. unsigned int checksum; //Checksum from type to end of data. char type; //Command type, table below. unsigned char data[32]; //data to be sent. }; -void print_message(struct rmessage *msg) { - return; - int dlen = 0; - hydra_report(stderr, - "m:\t%02x\n" - "l:\t%08x\n" - "c:\t%08x\n" - "t:\t%02x\n", - msg->magic, - msg->length, - msg->checksum, - msg->type); - - hydra_report(stderr, "d:\t"); - for(dlen = 0; dlen < msg->length - 1; dlen++) { //-1 because of type. - hydra_report(stderr, "%02x", msg->data[dlen]); - } - hydra_report(stderr, "\n"); -} - +/* +* Usage: sum = checksum(message); +* Function: Returns a 4 byte little endian sum of the messages typecode+data. This data is zero padded for alignment. +* Example message (big endian): +* [01][00000021][0f43d461] sum([1b6e779a f37189bb c1b22982 c80d1f4d 66678ff9 4b10f0ce eabff6e8 f4fb8338 3b] + zeropad(3)]) +* Sum: is 0f43d461 (big endian) +*/ unsigned int checksum(struct rmessage *msg) { int blen; unsigned char *stream; unsigned int sum; blen = msg->length; //Get the real length. blen += (4 - (blen % 4)); + + //Allocate a worksapce. stream = calloc(blen, sizeof(unsigned char)); memcpy(stream, &msg->type, sizeof(unsigned char)); memcpy(stream+1, msg->data, blen-1); @@ -58,28 +48,40 @@ unsigned int checksum(struct rmessage *msg) { } sum += *(unsigned int *)stream; + //Free the workspace. + free(stream); + return sum; } - +/* +* Usage: challenge_request(message); +* Function: Modifies message to reflect a request for a challenge. Updates the checksum as appropriate. +*/ void challenge_request(struct rmessage *msg) { msg->magic = 0x01; msg->length = 0x01; msg->type = 0x1b; msg->checksum = checksum(msg); - print_message(msg); } +/* +* Usage: challenge_request(message); +* Function: Modifies message to reflect a response to a challenge. Updates the checksum as appropriate. +*/ void challenge_response(struct rmessage *msg, unsigned char *solution) { msg->magic = 0x01; msg->length = 0x21; msg->type = 0x09; memcpy(msg->data, solution, 0x20); msg->checksum = checksum(msg); - print_message(msg); } - +/* +* Usage: buffer = message2buffer(message); send(buffer, message->length + 10); free(buffer) +* Function: Allocates a buffer for transmission and fills the buffer with message data such that it is ready to transmit. +*/ +//TODO: conver to a sendMessage() function? unsigned char *message2buffer(struct rmessage *msg) { unsigned char *data; if(msg == NULL) { @@ -223,8 +225,10 @@ void service_radmin2(char *ip, int sp, unsigned char options, char *miscptr, FIL // 1) request challenge (working) msg = calloc(1, sizeof(struct rmessage)); challenge_request(msg); - hydra_send(sock, message2buffer(msg), 10, 0); - free(msg); //We're done with challenge request messagee. + request = message2buffer(msg); + hydra_send(sock, request, 10, 0); + free(msg); + free(request); //2) receive response (working) index = 0; @@ -280,8 +284,10 @@ void service_radmin2(char *ip, int sp, unsigned char options, char *miscptr, FIL //3.d) send half sum challenge_response(msg, encrypted); request = message2buffer(msg); - hydra_send(sock, request, 42, 0); + free(msg); + free(request); + //4) receive auth success/failure index = 0; while(index < 10) { //We're always expecting back a 42 byte buffer from a challenge request. From 756d8a631fae8ee472e193080af7960dd2174f41 Mon Sep 17 00:00:00 2001 From: Catatonic Prime Date: Sat, 12 Nov 2016 18:37:10 +0000 Subject: [PATCH 003/531] Fixing warnings --- hydra-radmin2.c | 13 ++++++------- 1 file changed, 6 insertions(+), 7 deletions(-) diff --git a/hydra-radmin2.c b/hydra-radmin2.c index e84d47e..aa870db 100644 --- a/hydra-radmin2.c +++ b/hydra-radmin2.c @@ -82,8 +82,8 @@ void challenge_response(struct rmessage *msg, unsigned char *solution) { * Function: Allocates a buffer for transmission and fills the buffer with message data such that it is ready to transmit. */ //TODO: conver to a sendMessage() function? -unsigned char *message2buffer(struct rmessage *msg) { - unsigned char *data; +char *message2buffer(struct rmessage *msg) { + char *data; if(msg == NULL) { hydra_report(stderr, "rmessage is null\n"); hydra_child_exit(0); @@ -117,7 +117,6 @@ unsigned char *message2buffer(struct rmessage *msg) { struct rmessage *buffer2message(char *buffer) { struct rmessage *msg; msg = calloc(1, sizeof(struct rmessage)); - unsigned int sum = 0; //TODO: check return //Start parsing... @@ -161,20 +160,20 @@ struct rmessage *buffer2message(char *buffer) { int start_radmin2(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { + return 0; } void service_radmin2(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { int sock = -1; int index; - int count; int bytecount; - unsigned char *request; + char *request; struct rmessage *msg; int myport = PORT_RADMIN2; char buffer[42]; - unsigned char password[101]; + char password[101]; unsigned char rawkey[16]; - unsigned char pkey[33]; + char pkey[33]; char *IV = "FEDCBA9876543210A39D4A18F85B4A52"; unsigned char encrypted[32]; From 3f73d1f16307d57f6fafe9715227d950e9cc8983 Mon Sep 17 00:00:00 2001 From: Catatonic Prime Date: Sat, 12 Nov 2016 18:38:42 +0000 Subject: [PATCH 004/531] Oops missed a reference. --- hydra-radmin2.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-radmin2.c b/hydra-radmin2.c index aa870db..2dcaee0 100644 --- a/hydra-radmin2.c +++ b/hydra-radmin2.c @@ -204,7 +204,7 @@ void service_radmin2(char *ip, int sp, unsigned char options, char *miscptr, FIL MD5_Final(rawkey, &md5c); //Copy raw md5 data into ASCIIZ string for(index = 0; index < 16; index++) { - count = sprintf((pkey+index*2), "%02x", rawkey[index]); + sprintf((pkey+index*2), "%02x", rawkey[index]); } /* Typical conversation goes as follows... From 2713a0d8168a1a268f432f44bef162d765d24a38 Mon Sep 17 00:00:00 2001 From: Catatonic Prime Date: Sat, 12 Nov 2016 18:47:21 +0000 Subject: [PATCH 005/531] Including memory checks --- hydra-radmin2.c | 17 ++++++++++++++--- 1 file changed, 14 insertions(+), 3 deletions(-) diff --git a/hydra-radmin2.c b/hydra-radmin2.c index 2dcaee0..74dd511 100644 --- a/hydra-radmin2.c +++ b/hydra-radmin2.c @@ -92,14 +92,22 @@ char *message2buffer(struct rmessage *msg) { switch(msg->type) { case 0x1b: //Challenge request - data = calloc (10, sizeof(unsigned char)); //TODO: check return + data = calloc (10, sizeof(unsigned char)); + if(data == NULL) { + hydra_report(stderr, "calloc failure\n"); + hydra_child_exit(0); + } memcpy(data, &msg->magic, sizeof(char)); *((int *)(data+1)) = htonl(msg->length); *((int *)(data+5)) = htonl(msg->checksum); memcpy((data+9), &msg->type, sizeof(char)); break; case 0x09: - data = calloc (42, sizeof(unsigned char)); //TODO: check return + data = calloc (42, sizeof(unsigned char)); + if(data == NULL) { + hydra_report(stderr, "calloc failure\n"); + hydra_child_exit(0); + } memcpy(data, &msg->magic, sizeof(char)); *((int *)(data+1)) = htonl(msg->length); *((int *)(data+5)) = htonl(msg->checksum); @@ -117,7 +125,10 @@ char *message2buffer(struct rmessage *msg) { struct rmessage *buffer2message(char *buffer) { struct rmessage *msg; msg = calloc(1, sizeof(struct rmessage)); - //TODO: check return + if(msg == NULL) { + hydra_report(stderr, "calloc failure\n"); + hydra_child_exit(0); + } //Start parsing... msg->magic = buffer[0]; From 0c2e02135d40f1922c7860c73d4f8d8759d3fb11 Mon Sep 17 00:00:00 2001 From: Catatonic Prime Date: Sun, 13 Nov 2016 20:37:35 +0000 Subject: [PATCH 006/531] Formatting --- hydra-radmin2.c | 250 +++++++++++++++++++++++++----------------------- 1 file changed, 130 insertions(+), 120 deletions(-) diff --git a/hydra-radmin2.c b/hydra-radmin2.c index 74dd511..c816b5c 100644 --- a/hydra-radmin2.c +++ b/hydra-radmin2.c @@ -15,7 +15,7 @@ extern int blockDecrypt(cipherInstance *cipher, keyInstance *key,CONST BYTE *inp //RAdmin 2.x -struct rmessage{ +struct rmessage { char magic; //Indicates version, probably? unsigned int length; //Total message size of data. unsigned int checksum; //Checksum from type to end of data. @@ -24,12 +24,12 @@ struct rmessage{ }; /* -* Usage: sum = checksum(message); -* Function: Returns a 4 byte little endian sum of the messages typecode+data. This data is zero padded for alignment. -* Example message (big endian): -* [01][00000021][0f43d461] sum([1b6e779a f37189bb c1b22982 c80d1f4d 66678ff9 4b10f0ce eabff6e8 f4fb8338 3b] + zeropad(3)]) -* Sum: is 0f43d461 (big endian) -*/ + * Usage: sum = checksum(message); + * Function: Returns a 4 byte little endian sum of the messages typecode+data. This data is zero padded for alignment. + * Example message (big endian): + * [01][00000021][0f43d461] sum([1b6e779a f37189bb c1b22982 c80d1f4d 66678ff9 4b10f0ce eabff6e8 f4fb8338 3b] + zeropad(3)]) + * Sum: is 0f43d461 (big endian) + */ unsigned int checksum(struct rmessage *msg) { int blen; unsigned char *stream; @@ -55,10 +55,10 @@ unsigned int checksum(struct rmessage *msg) { } /* -* Usage: challenge_request(message); -* Function: Modifies message to reflect a request for a challenge. Updates the checksum as appropriate. -*/ -void challenge_request(struct rmessage *msg) { + * Usage: challenge_request(message); + * Function: Modifies message to reflect a request for a challenge. Updates the checksum as appropriate. + */ +void challenge_request(struct rmessage *msg) { msg->magic = 0x01; msg->length = 0x01; msg->type = 0x1b; @@ -66,9 +66,9 @@ void challenge_request(struct rmessage *msg) { } /* -* Usage: challenge_request(message); -* Function: Modifies message to reflect a response to a challenge. Updates the checksum as appropriate. -*/ + * Usage: challenge_request(message); + * Function: Modifies message to reflect a response to a challenge. Updates the checksum as appropriate. + */ void challenge_response(struct rmessage *msg, unsigned char *solution) { msg->magic = 0x01; msg->length = 0x21; @@ -78,9 +78,9 @@ void challenge_response(struct rmessage *msg, unsigned char *solution) { } /* -* Usage: buffer = message2buffer(message); send(buffer, message->length + 10); free(buffer) -* Function: Allocates a buffer for transmission and fills the buffer with message data such that it is ready to transmit. -*/ + * Usage: buffer = message2buffer(message); send(buffer, message->length + 10); free(buffer) + * Function: Allocates a buffer for transmission and fills the buffer with message data such that it is ready to transmit. + */ //TODO: conver to a sendMessage() function? char *message2buffer(struct rmessage *msg) { char *data; @@ -207,123 +207,133 @@ void service_radmin2(char *ip, int sp, unsigned char options, char *miscptr, FIL if( memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) { return; } - - // Get a password to work with. - strncpy(password, hydra_get_next_password(), 101); - MD5_Init(&md5c); - MD5_Update(&md5c, password, 100); - MD5_Final(rawkey, &md5c); - //Copy raw md5 data into ASCIIZ string - for(index = 0; index < 16; index++) { - sprintf((pkey+index*2), "%02x", rawkey[index]); - } - /* Typical conversation goes as follows... - 0) connect to server - 1) request challenge - 2) receive 32 byte challenge response - 3) send 32 byte challenge solution - 4) receive 1 byte auth success/fail message - */ - // 0) Connect to the server - sock = hydra_connect_tcp(ip, myport); - if(sock < 0) { - hydra_report(stderr, "Error: Child with pid %d terminating, can not connect\n", (int)getpid()); - hydra_child_exit(1); - } + while(1) { + // Get a password to work with. + strncpy(password, hydra_get_next_password(), 101); + MD5_Init(&md5c); + MD5_Update(&md5c, password, 100); + MD5_Final(rawkey, &md5c); + //Copy raw md5 data into ASCIIZ string + for(index = 0; index < 16; index++) { + sprintf((pkey+index*2), "%02x", rawkey[index]); + } - // 1) request challenge (working) - msg = calloc(1, sizeof(struct rmessage)); - challenge_request(msg); - request = message2buffer(msg); - hydra_send(sock, request, 10, 0); - free(msg); - free(request); + /* Typical conversation goes as follows... + 0) connect to server + 1) request challenge + 2) receive 32 byte challenge response + 3) send 32 byte challenge solution + 4) receive 1 byte auth success/fail message + */ + // 0) Connect to the server + sock = hydra_connect_tcp(ip, myport); + if(sock < 0) { + hydra_report(stderr, "Error: Child with pid %d terminating, can not connect\n", (int)getpid()); + hydra_child_exit(1); + } - //2) receive response (working) - index = 0; - while(index < 42) { //We're always expecting back a 42 byte buffer from a challenge request. - switch(hydra_data_ready(sock)) { - case -1: - hydra_report(stderr, "Error: Child with pid %d terminating, receive error\nerror:\t%s\n", (int)getpid(), strerror(errno)); - hydra_child_exit(1); - break; - case 0: - //keep waiting... - break; - default: - bytecount = hydra_recv(sock, buffer+index, 42 - index); - if(bytecount < 0) { + // 1) request challenge (working) + msg = calloc(1, sizeof(struct rmessage)); + challenge_request(msg); + request = message2buffer(msg); + hydra_send(sock, request, 10, 0); + free(msg); + free(request); + + //2) receive response (working) + index = 0; + while(index < 42) { //We're always expecting back a 42 byte buffer from a challenge request. + switch(hydra_data_ready(sock)) { + case -1: hydra_report(stderr, "Error: Child with pid %d terminating, receive error\nerror:\t%s\n", (int)getpid(), strerror(errno)); hydra_child_exit(1); - } - index += bytecount; + break; + case 0: + //keep waiting... + break; + default: + bytecount = hydra_recv(sock, buffer+index, 42 - index); + if(bytecount < 0) { + hydra_report(stderr, "Error: Child with pid %d terminating, receive error\nerror:\t%s\n", (int)getpid(), strerror(errno)); + hydra_child_exit(1); + } + index += bytecount; + } } - } - - //3) Send challenge solution. - //3.a) generate a new message from the buffer - msg = buffer2message(buffer); + //3) Send challenge solution. - //3.b) encrypt data received using pkey & known IV - index = makeKey(&key, DIR_ENCRYPT, 128, pkey); - if(index != TRUE) { - hydra_report(stderr, "Error: Child with pid %d terminating, make key error (%08x)\n", (int)getpid(), index); - hydra_child_exit(1); - } + //3.a) generate a new message from the buffer + msg = buffer2message(buffer); - index = cipherInit(&cipher, MODE_CBC, IV); - if(index != TRUE) { - hydra_report(stderr, "Error: Child with pid %d terminating, cipher init error(%08x)\n", (int)getpid(), index); - hydra_child_exit(1); - } + //3.b) encrypt data received using pkey & known IV + index = makeKey(&key, DIR_ENCRYPT, 128, pkey); + if(index != TRUE) { + hydra_report(stderr, "Error: Child with pid %d terminating, make key error (%08x)\n", (int)getpid(), index); + hydra_child_exit(1); + } - index = blockEncrypt(&cipher, &key, msg->data, 32 * 8, encrypted); - if(index <= 0) { - hydra_report(stderr, "Error: Child with pid %d terminating, encrypt error(%08x)\n", (int)getpid(), index); - hydra_child_exit(1); - } - - //3.c) half sum - this is the solution to the challenge. - for(index=0; index < 16; index++) { - *(encrypted+index) += *(encrypted+index+16); - } - memset((encrypted+16), 0x00, 16); + index = cipherInit(&cipher, MODE_CBC, IV); + if(index != TRUE) { + hydra_report(stderr, "Error: Child with pid %d terminating, cipher init error(%08x)\n", (int)getpid(), index); + hydra_child_exit(1); + } - //3.d) send half sum - challenge_response(msg, encrypted); - request = message2buffer(msg); - hydra_send(sock, request, 42, 0); - free(msg); - free(request); + index = blockEncrypt(&cipher, &key, msg->data, 32 * 8, encrypted); + if(index <= 0) { + hydra_report(stderr, "Error: Child with pid %d terminating, encrypt error(%08x)\n", (int)getpid(), index); + hydra_child_exit(1); + } - //4) receive auth success/failure - index = 0; - while(index < 10) { //We're always expecting back a 42 byte buffer from a challenge request. - switch(hydra_data_ready(sock)) { - case -1: - hydra_report(stderr, "Error: Child with pid %d terminating, receive error\nerror:\t%s\n", (int)getpid(), strerror(errno)); - hydra_child_exit(1); - break; - case 0: - //keep waiting... - break; - default: - bytecount = hydra_recv(sock, buffer+index, 10 - index); - if(bytecount < 0) { + //3.c) half sum - this is the solution to the challenge. + for(index=0; index < 16; index++) { + *(encrypted+index) += *(encrypted+index+16); + } + memset((encrypted+16), 0x00, 16); + + //3.d) send half sum + challenge_response(msg, encrypted); + request = message2buffer(msg); + hydra_send(sock, request, 42, 0); + free(msg); + free(request); + + //4) receive auth success/failure + index = 0; + while(index < 10) { //We're always expecting back a 42 byte buffer from a challenge request. + switch(hydra_data_ready(sock)) { + case -1: hydra_report(stderr, "Error: Child with pid %d terminating, receive error\nerror:\t%s\n", (int)getpid(), strerror(errno)); hydra_child_exit(1); - } - index += bytecount; + break; + case 0: + //keep waiting... + break; + default: + bytecount = hydra_recv(sock, buffer+index, 10 - index); + if(bytecount < 0) { + hydra_report(stderr, "Error: Child with pid %d terminating, receive error\nerror:\t%s\n", (int)getpid(), strerror(errno)); + hydra_child_exit(1); + } + index += bytecount; + } } + msg = buffer2message(buffer); + switch(msg->type) { + case 0x0a: + hydra_completed_pair_found(); + break; + case 0x0b: + hydra_completed_pair(); + hydra_disconnect(sock); + break; + default: + hydra_report(stderr, "Error: Child with pid %d terminating, protocol error\n", (int)getpid()); + hydra_child_exit(2); + } + } - msg = buffer2message(buffer); - if(msg->type == 0x0a) { - hydra_completed_pair_found(); - } - //5) Disconnect - hydra_disconnect(sock); } int service_radmin2_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { @@ -334,8 +344,8 @@ int service_radmin2_init(char *ip, int sp, unsigned char options, char *miscptr, // fill if needed. // // return codes: - // 0 all OK - // -1 error, hydra will exit, so print a good error message here + // 0 all OK + // -1 error, hydra will exit, so print a good error message here return 0; } From 43e3040062223f7202b03179b96a7228b4b63ea2 Mon Sep 17 00:00:00 2001 From: Catatonic Prime Date: Sun, 25 Dec 2016 03:24:06 +0000 Subject: [PATCH 007/531] Basic libgcrypt usage... no idea if it works, but it has to be better than nothing right? --- Makefile.am | 6 +- hydra-radmin2.c | 65 +++-- twofish.c | 704 --------------------------------------------- twofish/aes.h | 268 ----------------- twofish/debug.h | 77 ----- twofish/platform.h | 75 ----- twofish/table.h | 228 --------------- 7 files changed, 43 insertions(+), 1380 deletions(-) delete mode 100644 twofish.c delete mode 100644 twofish/aes.h delete mode 100644 twofish/debug.h delete mode 100644 twofish/platform.h delete mode 100644 twofish/table.h diff --git a/Makefile.am b/Makefile.am index 43fa77a..843bac6 100644 --- a/Makefile.am +++ b/Makefile.am @@ -3,7 +3,7 @@ # OPTS=-I. -O3 # -Wall -g -pedantic -LIBS=-lm +LIBS=-lm -lgcrypt BINDIR = /bin MANDIR ?= /man/man1/ DATADIR ?= /etc @@ -20,7 +20,7 @@ SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ hydra-oracle-sid.c hydra-http-proxy.c hydra-http-form.c hydra-irc.c \ hydra-rdp.c hydra-s7-300.c hydra-redis.c hydra-adam6500.c \ crc32.c d3des.c bfg.c ntlm.c sasl.c hmacmd5.c hydra-mod.c hydra-rtsp.c hydra-time.c hydra-rpcap.c \ - hydra-radmin2.c twofish.c + hydra-radmin2.c OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ hydra-telnet.o hydra-cisco.o hydra-http.o hydra-ftp.o hydra-imap.o \ hydra-pop3.o hydra-smb.o hydra-icq.o hydra-cisco-enable.o hydra-ldap.o \ @@ -32,7 +32,7 @@ OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ hydra-http-proxy.o hydra-http-form.o hydra-irc.o hydra-redis.o \ hydra-rdp.o hydra-s7-300.c hydra-adam6500.o \ crc32.o d3des.o bfg.o ntlm.o sasl.o hmacmd5.o hydra-mod.o hydra-rtsp.o hydra-time.o hydra-rpcap.o \ - hydra-radmin2.o twofish.o + hydra-radmin2.o BINS = hydra pw-inspector EXTRA_DIST = README README.arm README.palm CHANGES TODO INSTALL LICENSE \ diff --git a/hydra-radmin2.c b/hydra-radmin2.c index c816b5c..c02f23c 100644 --- a/hydra-radmin2.c +++ b/hydra-radmin2.c @@ -2,17 +2,10 @@ #include #include #include +#include extern char *HYDRA_EXIT; - -//Twofish references -#include "twofish/aes.h" -extern int makeKey(keyInstance *key, BYTE direction, int keyLen,CONST char *keyMaterial); -extern int cipherInit(cipherInstance *cipher, BYTE mode,CONST char *IV); -extern int blockEncrypt(cipherInstance *cipher, keyInstance *key,CONST BYTE *input, int inputLen, BYTE *outBuffer); -extern int blockDecrypt(cipherInstance *cipher, keyInstance *key,CONST BYTE *input, int inputLen, BYTE *outBuffer); - //RAdmin 2.x struct rmessage { @@ -185,18 +178,20 @@ void service_radmin2(char *ip, int sp, unsigned char options, char *miscptr, FIL char password[101]; unsigned char rawkey[16]; char pkey[33]; - char *IV = "FEDCBA9876543210A39D4A18F85B4A52"; + char *IV = "\xFE\xDC\xBA\x98\x76\x54\x32\x10\xA3\x9D\x4A\x18\xF8\x5B\x4A\x52"; unsigned char encrypted[32]; + gcry_error_t err; + gcry_cipher_hd_t cipher; //Initialization nonsense. MD5_CTX md5c; - keyInstance key; - cipherInstance cipher; if(port != 0) { myport = port; } + gcry_check_version(NULL); + memset(buffer, 0x00, sizeof(buffer)); memset(pkey, 0x00, 33); memset(encrypted, 0x00, 32); @@ -263,28 +258,48 @@ void service_radmin2(char *ip, int sp, unsigned char options, char *miscptr, FIL } //3) Send challenge solution. - //3.a) generate a new message from the buffer msg = buffer2message(buffer); //3.b) encrypt data received using pkey & known IV - index = makeKey(&key, DIR_ENCRYPT, 128, pkey); - if(index != TRUE) { - hydra_report(stderr, "Error: Child with pid %d terminating, make key error (%08x)\n", (int)getpid(), index); + err= gcry_cipher_open(&cipher, GCRY_CIPHER_TWOFISH128, GCRY_CIPHER_MODE_CBC, 0); + if(err) { + hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_open error (%08x)\n", (int)getpid(), index); hydra_child_exit(1); } + err = gcry_cipher_setkey(cipher, pkey, 128); + if(err) { + hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_setkey error (%08x)\n", (int)getpid(), index); + hydra_child_exit(1); + } + err = gcry_cipher_setiv(cipher, IV, 128); + if(err) { + hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_setiv error (%08x)\n", (int)getpid(), index); + hydra_child_exit(1); + } + err = gcry_cipher_encrypt(cipher, encrypted, 32, msg->data, 32); + if(err) { + hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_encrypt error (%08x)\n", (int)getpid(), index); + hydra_child_exit(1); + } + gcry_cipher_close(cipher); +// index = makeKey(&key, DIR_ENCRYPT, 128, pkey); +// if(index != TRUE) { +// hydra_report(stderr, "Error: Child with pid %d terminating, make key error (%08x)\n", (int)getpid(), index); +// hydra_child_exit(1); +// } - index = cipherInit(&cipher, MODE_CBC, IV); - if(index != TRUE) { - hydra_report(stderr, "Error: Child with pid %d terminating, cipher init error(%08x)\n", (int)getpid(), index); - hydra_child_exit(1); - } +// index = cipherInit(&cipher, MODE_CBC, IV); +// if(index != TRUE) { +// hydra_report(stderr, "Error: Child with pid %d terminating, cipher init error(%08x)\n", (int)getpid(), index); +// hydra_child_exit(1); +// } - index = blockEncrypt(&cipher, &key, msg->data, 32 * 8, encrypted); - if(index <= 0) { - hydra_report(stderr, "Error: Child with pid %d terminating, encrypt error(%08x)\n", (int)getpid(), index); - hydra_child_exit(1); - } +// index = blockEncrypt(&cipher, &key, msg->data, 32 * 8, encrypted); +// if(index <= 0) { +// hydra_report(stderr, "Error: Child with pid %d terminating, encrypt error(%08x)\n", (int)getpid(), index); +// hydra_child_exit(1); +// } //3.c) half sum - this is the solution to the challenge. for(index=0; index < 16; index++) { diff --git a/twofish.c b/twofish.c deleted file mode 100644 index 841eb30..0000000 --- a/twofish.c +++ /dev/null @@ -1,704 +0,0 @@ -/*************************************************************************** - TWOFISH.C -- C API calls for TWOFISH AES submission - - Submitters: - Bruce Schneier, Counterpane Systems - Doug Whiting, Hi/fn - John Kelsey, Counterpane Systems - Chris Hall, Counterpane Systems - David Wagner, UC Berkeley - - Code Author: Doug Whiting, Hi/fn - - Version 1.00 April 1998 - - Copyright 1998, Hi/fn and Counterpane Systems. All rights reserved. - - Notes: - * Pedagogical version (non-optimized) - * Tab size is set to 4 characters in this file - -***************************************************************************/ - -#include "twofish/aes.h" -#include "twofish/table.h" - -/* -+***************************************************************************** -* Constants/Macros/Tables --****************************************************************************/ - -#define VALIDATE_PARMS 1 /* nonzero --> check all parameters */ -#define FEISTEL 0 /* nonzero --> use Feistel version (slow) */ - -int tabEnable=0; /* are we gathering stats? */ -BYTE tabUsed[256]; /* one bit per table */ - -#if FEISTEL -CONST char *moduleDescription="Pedagogical C code (Feistel)"; -#else -CONST char *moduleDescription="Pedagogical C code"; -#endif -CONST char *modeString = ""; - -#define P0_USED 0x01 -#define P1_USED 0x02 -#define B0_USED 0x04 -#define B1_USED 0x08 -#define B2_USED 0x10 -#define B3_USED 0x20 -#define ALL_USED 0x3F - -/* number of rounds for various key sizes: 128, 192, 256 */ -int numRounds[4]= {0,ROUNDS_128,ROUNDS_192,ROUNDS_256}; - -#ifndef DEBUG -#ifdef GetCodeSize -#define DEBUG 1 /* force debug */ -#endif -#endif -#include "twofish/debug.h" /* debug display macros */ - -#ifdef GetCodeSize -extern DWORD Here(DWORD x); /* return caller's address! */ -DWORD TwofishCodeStart(void) { return Here(0); }; -#endif - -/* -+***************************************************************************** -* -* Function Name: TableOp -* -* Function: Handle table use checking -* -* Arguments: op = what to do (see TAB_* defns in AES.H) -* -* Return: TRUE --> done (for TAB_QUERY) -* -* Notes: This routine is for use in generating the tables KAT file. -* --****************************************************************************/ -int TableOp(int op) - { - static int queryCnt=0; - int i; - switch (op) - { - case TAB_DISABLE: - tabEnable=0; - break; - case TAB_ENABLE: - tabEnable=1; - break; - case TAB_RESET: - queryCnt=0; - for (i=0;i<256;i++) - tabUsed[i]=0; - break; - case TAB_QUERY: - queryCnt++; - for (i=0;i<256;i++) - if (tabUsed[i] != ALL_USED) - return FALSE; - if (queryCnt < TAB_MIN_QUERY) /* do a certain minimum number */ - return FALSE; - break; - } - return TRUE; - } - - -/* -+***************************************************************************** -* -* Function Name: ParseHexDword -* -* Function: Parse ASCII hex nibbles and fill in key/iv dwords -* -* Arguments: bit = # bits to read -* srcTxt = ASCII source -* d = ptr to dwords to fill in -* dstTxt = where to make a copy of ASCII source -* (NULL ok) -* -* Return: Zero if no error. Nonzero --> invalid hex or length -* -* Notes: Note that the parameter d is a DWORD array, not a byte array. -* This routine is coded to work both for little-endian and big-endian -* architectures. The character stream is interpreted as a LITTLE-ENDIAN -* byte stream, since that is how the Pentium works, but the conversion -* happens automatically below. -* --****************************************************************************/ -int ParseHexDword(int bits,CONST char *srcTxt,DWORD *d,char *dstTxt) - { - int i; - DWORD b; - char c; -#if ALIGN32 - char alignDummy[3]; /* keep dword alignment */ -#endif - - union /* make sure LittleEndian is defined correctly */ - { - BYTE b[4]; - DWORD d[1]; - } v; - v.d[0]=1; - if (v.b[0 ^ ADDR_XOR] != 1) /* sanity check on compile-time switch */ - return BAD_ENDIAN; - -#if VALIDATE_PARMS - #if ALIGN32 - if (((int)d) & 3) - return BAD_ALIGN32; - #endif -#endif - - for (i=0;i*32= '0') && (c <= '9')) - b=c-'0'; - else if ((c >= 'a') && (c <= 'f')) - b=c-'a'+10; - else if ((c >= 'A') && (c <= 'F')) - b=c-'A'+10; - else - return BAD_KEY_MAT; /* invalid hex character */ - /* works for big and little endian! */ - d[i/8] |= b << (4*((i^1)&7)); - } - - return 0; /* no error */ - } - - -/* -+***************************************************************************** -* -* Function Name: f32 -* -* Function: Run four bytes through keyed S-boxes and apply MDS matrix -* -* Arguments: x = input to f function -* k32 = pointer to key dwords -* keyLen = total key length (k32 --> keyLey/2 bits) -* -* Return: The output of the keyed permutation applied to x. -* -* Notes: -* This function is a keyed 32-bit permutation. It is the major building -* block for the Twofish round function, including the four keyed 8x8 -* permutations and the 4x4 MDS matrix multiply. This function is used -* both for generating round subkeys and within the round function on the -* block being encrypted. -* -* This version is fairly slow and pedagogical, although a smartcard would -* probably perform the operation exactly this way in firmware. For -* ultimate performance, the entire operation can be completed with four -* lookups into four 256x32-bit tables, with three dword xors. -* -* The MDS matrix is defined in TABLE.H. To multiply by Mij, just use the -* macro Mij(x). -* --****************************************************************************/ -DWORD f32(DWORD x,CONST DWORD *k32,int keyLen) - { - BYTE b[4]; - - /* Run each byte thru 8x8 S-boxes, xoring with key byte at each stage. */ - /* Note that each byte goes through a different combination of S-boxes.*/ - - *((DWORD *)b) = Bswap(x); /* make b[0] = LSB, b[3] = MSB */ - switch (((keyLen + 63)/64) & 3) - { - case 0: /* 256 bits of key */ - b[0] = p8(04)[b[0]] ^ b0(k32[3]); - b[1] = p8(14)[b[1]] ^ b1(k32[3]); - b[2] = p8(24)[b[2]] ^ b2(k32[3]); - b[3] = p8(34)[b[3]] ^ b3(k32[3]); - /* fall thru, having pre-processed b[0]..b[3] with k32[3] */ - case 3: /* 192 bits of key */ - b[0] = p8(03)[b[0]] ^ b0(k32[2]); - b[1] = p8(13)[b[1]] ^ b1(k32[2]); - b[2] = p8(23)[b[2]] ^ b2(k32[2]); - b[3] = p8(33)[b[3]] ^ b3(k32[2]); - /* fall thru, having pre-processed b[0]..b[3] with k32[2] */ - case 2: /* 128 bits of key */ - b[0] = p8(00)[p8(01)[p8(02)[b[0]] ^ b0(k32[1])] ^ b0(k32[0])]; - b[1] = p8(10)[p8(11)[p8(12)[b[1]] ^ b1(k32[1])] ^ b1(k32[0])]; - b[2] = p8(20)[p8(21)[p8(22)[b[2]] ^ b2(k32[1])] ^ b2(k32[0])]; - b[3] = p8(30)[p8(31)[p8(32)[b[3]] ^ b3(k32[1])] ^ b3(k32[0])]; - } - - if (tabEnable) - { /* we could give a "tighter" bound, but this works acceptably well */ - tabUsed[b0(x)] |= (P_00 == 0) ? P0_USED : P1_USED; - tabUsed[b1(x)] |= (P_10 == 0) ? P0_USED : P1_USED; - tabUsed[b2(x)] |= (P_20 == 0) ? P0_USED : P1_USED; - tabUsed[b3(x)] |= (P_30 == 0) ? P0_USED : P1_USED; - - tabUsed[b[0] ] |= B0_USED; - tabUsed[b[1] ] |= B1_USED; - tabUsed[b[2] ] |= B2_USED; - tabUsed[b[3] ] |= B3_USED; - } - - /* Now perform the MDS matrix multiply inline. */ - return ((M00(b[0]) ^ M01(b[1]) ^ M02(b[2]) ^ M03(b[3])) ) ^ - ((M10(b[0]) ^ M11(b[1]) ^ M12(b[2]) ^ M13(b[3])) << 8) ^ - ((M20(b[0]) ^ M21(b[1]) ^ M22(b[2]) ^ M23(b[3])) << 16) ^ - ((M30(b[0]) ^ M31(b[1]) ^ M32(b[2]) ^ M33(b[3])) << 24) ; - } - -/* -+***************************************************************************** -* -* Function Name: RS_MDS_Encode -* -* Function: Use (12,8) Reed-Solomon code over GF(256) to produce -* a key S-box dword from two key material dwords. -* -* Arguments: k0 = 1st dword -* k1 = 2nd dword -* -* Return: Remainder polynomial generated using RS code -* -* Notes: -* Since this computation is done only once per reKey per 64 bits of key, -* the performance impact of this routine is imperceptible. The RS code -* chosen has "simple" coefficients to allow smartcard/hardware implementation -* without lookup tables. -* --****************************************************************************/ -DWORD RS_MDS_Encode(DWORD k0,DWORD k1) - { - int i,j; - DWORD r; - - for (i=r=0;i<2;i++) - { - r ^= (i) ? k0 : k1; /* merge in 32 more key bits */ - for (j=0;j<4;j++) /* shift one byte at a time */ - RS_rem(r); - } - return r; - } - -/* -+***************************************************************************** -* -* Function Name: reKey -* -* Function: Initialize the Twofish key schedule from key32 -* -* Arguments: key = ptr to keyInstance to be initialized -* -* Return: TRUE on success -* -* Notes: -* Here we precompute all the round subkeys, although that is not actually -* required. For example, on a smartcard, the round subkeys can -* be generated on-the-fly using f32() -* --****************************************************************************/ -int reKey(keyInstance *key) - { - int i,k64Cnt; - int keyLen = key->keyLen; - int subkeyCnt = ROUND_SUBKEYS + 2*key->numRounds; - DWORD A,B; - DWORD k32e[MAX_KEY_BITS/64],k32o[MAX_KEY_BITS/64]; /* even/odd key dwords */ - -#if VALIDATE_PARMS - #if ALIGN32 - if ((((int)key) & 3) || (((int)key->key32) & 3)) - return BAD_ALIGN32; - #endif - if ((key->keyLen % 64) || (key->keyLen < MIN_KEY_BITS)) - return BAD_KEY_INSTANCE; - if (subkeyCnt > TOTAL_SUBKEYS) - return BAD_KEY_INSTANCE; -#endif - - k64Cnt=(keyLen+63)/64; /* round up to next multiple of 64 bits */ - for (i=0;ikey32[2*i ]; - k32o[i]=key->key32[2*i+1]; - /* compute S-box keys using (12,8) Reed-Solomon code over GF(256) */ - key->sboxKeys[k64Cnt-1-i]=RS_MDS_Encode(k32e[i],k32o[i]); /* reverse order */ - } - - for (i=0;isubKeys[2*i ] = A+ B; /* combine with a PHT */ - key->subKeys[2*i+1] = ROL(A+2*B,SK_ROTL); - } - - DebugDumpKey(key); - - return TRUE; - } -/* -+***************************************************************************** -* -* Function Name: makeKey -* -* Function: Initialize the Twofish key schedule -* -* Arguments: key = ptr to keyInstance to be initialized -* direction = DIR_ENCRYPT or DIR_DECRYPT -* keyLen = # bits of key text at *keyMaterial -* keyMaterial = ptr to hex ASCII chars representing key bits -* -* Return: TRUE on success -* else error code (e.g., BAD_KEY_DIR) -* -* Notes: -* This parses the key bits from keyMaterial. No crypto stuff happens here. -* The function reKey() is called to actually build the key schedule after -* the keyMaterial has been parsed. -* --****************************************************************************/ -int makeKey(keyInstance *key, BYTE direction, int keyLen,CONST char *keyMaterial) - { - int i; - -#if VALIDATE_PARMS /* first, sanity check on parameters */ - if (key == NULL) - return BAD_KEY_INSTANCE;/* must have a keyInstance to initialize */ - if ((direction != DIR_ENCRYPT) && (direction != DIR_DECRYPT)) - return BAD_KEY_DIR; /* must have valid direction */ - if ((keyLen > MAX_KEY_BITS) || (keyLen < 8)) - return BAD_KEY_MAT; /* length must be valid */ - key->keySig = VALID_SIG; /* show that we are initialized */ - #if ALIGN32 - if ((((int)key) & 3) || (((int)key->key32) & 3)) - return BAD_ALIGN32; - #endif -#endif - - key->direction = direction; /* set our cipher direction */ - key->keyLen = (keyLen+63) & ~63; /* round up to multiple of 64 */ - key->numRounds = numRounds[(keyLen-1)/64]; - for (i=0;ikey32[i]=0; - key->keyMaterial[MAX_KEY_SIZE]=0; /* terminate ASCII string */ - - if ((keyMaterial == NULL) || (keyMaterial[0]==0)) - return TRUE; /* allow a "dummy" call */ - - if (ParseHexDword(keyLen,keyMaterial,key->key32,key->keyMaterial)) - return BAD_KEY_MAT; - - return reKey(key); /* generate round subkeys */ - } - - -/* -+***************************************************************************** -* -* Function Name: cipherInit -* -* Function: Initialize the Twofish cipher in a given mode -* -* Arguments: cipher = ptr to cipherInstance to be initialized -* mode = MODE_ECB, MODE_CBC, or MODE_CFB1 -* IV = ptr to hex ASCII test representing IV bytes -* -* Return: TRUE on success -* else error code (e.g., BAD_CIPHER_MODE) -* --****************************************************************************/ -int cipherInit(cipherInstance *cipher, BYTE mode,CONST char *IV) - { - int i; -#if VALIDATE_PARMS /* first, sanity check on parameters */ - if (cipher == NULL) - return BAD_PARAMS; /* must have a cipherInstance to initialize */ - if ((mode != MODE_ECB) && (mode != MODE_CBC) && (mode != MODE_CFB1)) - return BAD_CIPHER_MODE; /* must have valid cipher mode */ - cipher->cipherSig = VALID_SIG; - #if ALIGN32 - if ((((int)cipher) & 3) || (((int)cipher->IV) & 3) || (((int)cipher->iv32) & 3)) - return BAD_ALIGN32; - #endif -#endif - - if ((mode != MODE_ECB) && (IV)) /* parse the IV */ - { - if (ParseHexDword(BLOCK_SIZE,IV,cipher->iv32,NULL)) - return BAD_IV_MAT; - for (i=0;iIV)[i] = Bswap(cipher->iv32[i]); - } - - cipher->mode = mode; - - return TRUE; - } - -/* -+***************************************************************************** -* -* Function Name: blockEncrypt -* -* Function: Encrypt block(s) of data using Twofish -* -* Arguments: cipher = ptr to already initialized cipherInstance -* key = ptr to already initialized keyInstance -* input = ptr to data blocks to be encrypted -* inputLen = # bits to encrypt (multiple of blockSize) -* outBuffer = ptr to where to put encrypted blocks -* -* Return: # bits ciphered (>= 0) -* else error code (e.g., BAD_CIPHER_STATE, BAD_KEY_MATERIAL) -* -* Notes: The only supported block size for ECB/CBC modes is BLOCK_SIZE bits. -* If inputLen is not a multiple of BLOCK_SIZE bits in those modes, -* an error BAD_INPUT_LEN is returned. In CFB1 mode, all block -* sizes can be supported. -* --****************************************************************************/ -int blockEncrypt(cipherInstance *cipher, keyInstance *key,CONST BYTE *input, - int inputLen, BYTE *outBuffer) - { - int i,n,r; /* loop variables */ - DWORD x[BLOCK_SIZE/32]; /* block being encrypted */ - DWORD t0,t1,tmp; /* temp variables */ - int rounds=key->numRounds; /* number of rounds */ - BYTE bit,ctBit,carry; /* temps for CFB */ -#if ALIGN32 - BYTE alignDummy; /* keep 32-bit variable alignment on stack */ -#endif - -#if VALIDATE_PARMS - if ((cipher == NULL) || (cipher->cipherSig != VALID_SIG)) - return BAD_CIPHER_STATE; - if ((key == NULL) || (key->keySig != VALID_SIG)) - return BAD_KEY_INSTANCE; - if ((rounds < 2) || (rounds > MAX_ROUNDS) || (rounds&1)) - return BAD_KEY_INSTANCE; - if ((cipher->mode != MODE_CFB1) && (inputLen % BLOCK_SIZE)) - return BAD_INPUT_LEN; - #if ALIGN32 - if ( (((int)cipher) & 3) || (((int)key ) & 3) || - (((int)input ) & 3) || (((int)outBuffer) & 3)) - return BAD_ALIGN32; - #endif -#endif - - if (cipher->mode == MODE_CFB1) - { /* use recursion here to handle CFB, one block at a time */ - cipher->mode = MODE_ECB; /* do encryption in ECB */ - for (n=0;nIV,BLOCK_SIZE,(BYTE *)x); - bit = 0x80 >> (n & 7);/* which bit position in byte */ - ctBit = (input[n/8] & bit) ^ ((((BYTE *) x)[0] & 0x80) >> (n&7)); - outBuffer[n/8] = (outBuffer[n/8] & ~ bit) | ctBit; - carry = ctBit >> (7 - (n&7)); - for (i=BLOCK_SIZE/8-1;i>=0;i--) - { - bit = cipher->IV[i] >> 7; /* save next "carry" from shift */ - cipher->IV[i] = (cipher->IV[i] << 1) ^ carry; - carry = bit; - } - } - cipher->mode = MODE_CFB1; /* restore mode for next time */ - return inputLen; - } - - /* here for ECB, CBC modes */ - for (n=0;nmode == MODE_CBC) - DebugDump(cipher->iv32,"",IV_ROUND,0,0,0,0); -#endif - for (i=0;isubKeys[INPUT_WHITEN+i]; - if (cipher->mode == MODE_CBC) - x[i] ^= Bswap(cipher->iv32[i]); - } - - DebugDump(x,"",0,0,0,0,0); - for (r=0;rsboxKeys,key->keyLen); - t1 = f32(ROL(x[1],8+(r+1)/2),key->sboxKeys,key->keyLen); - /* PHT, round keys */ - x[2]^= ROL(t0 + t1 + key->subKeys[ROUND_SUBKEYS+2*r ], r /2); - x[3]^= ROR(t0 + 2*t1 + key->subKeys[ROUND_SUBKEYS+2*r+1],(r+2) /2); - - DebugDump(x,"",r+1,2*(r&1),1,1,0); -#else - t0 = f32( x[0] ,key->sboxKeys,key->keyLen); - t1 = f32(ROL(x[1],8),key->sboxKeys,key->keyLen); - - x[3] = ROL(x[3],1); - x[2]^= t0 + t1 + key->subKeys[ROUND_SUBKEYS+2*r ]; /* PHT, round keys */ - x[3]^= t0 + 2*t1 + key->subKeys[ROUND_SUBKEYS+2*r+1]; - x[2] = ROR(x[2],1); - - DebugDump(x,"",r+1,2*(r&1),0,1,0);/* make format compatible with optimized code */ -#endif - if (r < rounds-1) /* swap for next round */ - { - tmp = x[0]; x[0]= x[2]; x[2] = tmp; - tmp = x[1]; x[1]= x[3]; x[3] = tmp; - } - } -#if FEISTEL - x[0] = ROR(x[0],8); /* "final permutation" */ - x[1] = ROL(x[1],8); - x[2] = ROR(x[2],8); - x[3] = ROL(x[3],8); -#endif - for (i=0;isubKeys[OUTPUT_WHITEN+i]); - if (cipher->mode == MODE_CBC) - cipher->iv32[i] = ((DWORD *)outBuffer)[i]; - } -#ifdef DEBUG - DebugDump(outBuffer,"",rounds+1,0,0,0,1); - if (cipher->mode == MODE_CBC) - DebugDump(cipher->iv32,"",IV_ROUND,0,0,0,0); -#endif - } - - return inputLen; - } - -/* -+***************************************************************************** -* -* Function Name: blockDecrypt -* -* Function: Decrypt block(s) of data using Twofish -* -* Arguments: cipher = ptr to already initialized cipherInstance -* key = ptr to already initialized keyInstance -* input = ptr to data blocks to be decrypted -* inputLen = # bits to encrypt (multiple of blockSize) -* outBuffer = ptr to where to put decrypted blocks -* -* Return: # bits ciphered (>= 0) -* else error code (e.g., BAD_CIPHER_STATE, BAD_KEY_MATERIAL) -* -* Notes: The only supported block size for ECB/CBC modes is BLOCK_SIZE bits. -* If inputLen is not a multiple of BLOCK_SIZE bits in those modes, -* an error BAD_INPUT_LEN is returned. In CFB1 mode, all block -* sizes can be supported. -* --****************************************************************************/ -int blockDecrypt(cipherInstance *cipher, keyInstance *key,CONST BYTE *input, - int inputLen, BYTE *outBuffer) - { - int i,n,r; /* loop counters */ - DWORD x[BLOCK_SIZE/32]; /* block being encrypted */ - DWORD t0,t1; /* temp variables */ - int rounds=key->numRounds; /* number of rounds */ - BYTE bit,ctBit,carry; /* temps for CFB */ -#if ALIGN32 - BYTE alignDummy; /* keep 32-bit variable alignment on stack */ -#endif - -#if VALIDATE_PARMS - if ((cipher == NULL) || (cipher->cipherSig != VALID_SIG)) - return BAD_CIPHER_STATE; - if ((key == NULL) || (key->keySig != VALID_SIG)) - return BAD_KEY_INSTANCE; - if ((rounds < 2) || (rounds > MAX_ROUNDS) || (rounds&1)) - return BAD_KEY_INSTANCE; - if ((cipher->mode != MODE_CFB1) && (inputLen % BLOCK_SIZE)) - return BAD_INPUT_LEN; - #if ALIGN32 - if ( (((int)cipher) & 3) || (((int)key ) & 3) || - (((int)input) & 3) || (((int)outBuffer) & 3)) - return BAD_ALIGN32; - #endif -#endif - - if (cipher->mode == MODE_CFB1) - { /* use blockEncrypt here to handle CFB, one block at a time */ - cipher->mode = MODE_ECB; /* do encryption in ECB */ - for (n=0;nIV,BLOCK_SIZE,(BYTE *)x); - bit = 0x80 >> (n & 7); - ctBit = input[n/8] & bit; - outBuffer[n/8] = (outBuffer[n/8] & ~ bit) | - (ctBit ^ ((((BYTE *) x)[0] & 0x80) >> (n&7))); - carry = ctBit >> (7 - (n&7)); - for (i=BLOCK_SIZE/8-1;i>=0;i--) - { - bit = cipher->IV[i] >> 7; /* save next "carry" from shift */ - cipher->IV[i] = (cipher->IV[i] << 1) ^ carry; - carry = bit; - } - } - cipher->mode = MODE_CFB1; /* restore mode for next time */ - return inputLen; - } - - /* here for ECB, CBC modes */ - for (n=0;nsubKeys[OUTPUT_WHITEN+i]; - - for (r=rounds-1;r>=0;r--) /* main Twofish decryption loop */ - { - t0 = f32( x[0] ,key->sboxKeys,key->keyLen); - t1 = f32(ROL(x[1],8),key->sboxKeys,key->keyLen); - - DebugDump(x,"",r+1,2*(r&1),0,1,0);/* make format compatible with optimized code */ - x[2] = ROL(x[2],1); - x[2]^= t0 + t1 + key->subKeys[ROUND_SUBKEYS+2*r ]; /* PHT, round keys */ - x[3]^= t0 + 2*t1 + key->subKeys[ROUND_SUBKEYS+2*r+1]; - x[3] = ROR(x[3],1); - - if (r) /* unswap, except for last round */ - { - t0 = x[0]; x[0]= x[2]; x[2] = t0; - t1 = x[1]; x[1]= x[3]; x[3] = t1; - } - } - DebugDump(x,"",0,0,0,0,0);/* make final output match encrypt initial output */ - - for (i=0;isubKeys[INPUT_WHITEN+i]; - if (cipher->mode == MODE_CBC) - { - x[i] ^= Bswap(cipher->iv32[i]); - cipher->iv32[i] = ((DWORD *)input)[i]; - } - ((DWORD *)outBuffer)[i] = Bswap(x[i]); - } - DebugDump(outBuffer,"",-1,0,0,0,1); - } - - return inputLen; - } - - -#ifdef GetCodeSize -DWORD TwofishCodeSize(void) { return Here(0)-TwofishCodeStart(); }; -#endif diff --git a/twofish/aes.h b/twofish/aes.h deleted file mode 100644 index 570a95d..0000000 --- a/twofish/aes.h +++ /dev/null @@ -1,268 +0,0 @@ -/* aes.h */ - -/* ---------- See examples at end of this file for typical usage -------- */ - -/* AES Cipher header file for ANSI C Submissions - Lawrence E. Bassham III - Computer Security Division - National Institute of Standards and Technology - - This sample is to assist implementers developing to the -Cryptographic API Profile for AES Candidate Algorithm Submissions. -Please consult this document as a cross-reference. - - ANY CHANGES, WHERE APPROPRIATE, TO INFORMATION PROVIDED IN THIS FILE -MUST BE DOCUMENTED. CHANGES ARE ONLY APPROPRIATE WHERE SPECIFIED WITH -THE STRING "CHANGE POSSIBLE". FUNCTION CALLS AND THEIR PARAMETERS -CANNOT BE CHANGED. STRUCTURES CAN BE ALTERED TO ALLOW IMPLEMENTERS TO -INCLUDE IMPLEMENTATION SPECIFIC INFORMATION. -*/ - -/* Includes: - Standard include files -*/ - -#include -#include "platform.h" /* platform-specific defines */ - -/* Defines: - Add any additional defines you need -*/ - -#define DIR_ENCRYPT 0 /* Are we encrpyting? */ -#define DIR_DECRYPT 1 /* Are we decrpyting? */ -#define MODE_ECB 1 /* Are we ciphering in ECB mode? */ -#define MODE_CBC 2 /* Are we ciphering in CBC mode? */ -#define MODE_CFB1 3 /* Are we ciphering in 1-bit CFB mode? */ - -#define TRUE 1 -#define FALSE 0 - -#define BAD_KEY_DIR -1 /* Key direction is invalid (unknown value) */ -#define BAD_KEY_MAT -2 /* Key material not of correct length */ -#define BAD_KEY_INSTANCE -3 /* Key passed is not valid */ -#define BAD_CIPHER_MODE -4 /* Params struct passed to cipherInit invalid */ -#define BAD_CIPHER_STATE -5 /* Cipher in wrong state (e.g., not initialized) */ - -/* CHANGE POSSIBLE: inclusion of algorithm specific defines */ -/* TWOFISH specific definitions */ -#define MAX_KEY_SIZE 64 /* # of ASCII chars needed to represent a key */ -#define MAX_IV_SIZE 16 /* # of bytes needed to represent an IV */ -#define BAD_INPUT_LEN -6 /* inputLen not a multiple of block size */ -#define BAD_PARAMS -7 /* invalid parameters */ -#define BAD_IV_MAT -8 /* invalid IV text */ -#define BAD_ENDIAN -9 /* incorrect endianness define */ -#define BAD_ALIGN32 -10 /* incorrect 32-bit alignment */ - -#define BLOCK_SIZE 128 /* number of bits per block */ -#define MAX_ROUNDS 16 /* max # rounds (for allocating subkey array) */ -#define ROUNDS_128 16 /* default number of rounds for 128-bit keys*/ -#define ROUNDS_192 16 /* default number of rounds for 192-bit keys*/ -#define ROUNDS_256 16 /* default number of rounds for 256-bit keys*/ -#define MAX_KEY_BITS 256 /* max number of bits of key */ -#define MIN_KEY_BITS 128 /* min number of bits of key (zero pad) */ -#define VALID_SIG 0x48534946 /* initialization signature ('FISH') */ -#define MCT_OUTER 400 /* MCT outer loop */ -#define MCT_INNER 10000 /* MCT inner loop */ -#define REENTRANT 1 /* nonzero forces reentrant code (slightly slower) */ - -#define INPUT_WHITEN 0 /* subkey array indices */ -#define OUTPUT_WHITEN ( INPUT_WHITEN + BLOCK_SIZE/32) -#define ROUND_SUBKEYS (OUTPUT_WHITEN + BLOCK_SIZE/32) /* use 2 * (# rounds) */ -#define TOTAL_SUBKEYS (ROUND_SUBKEYS + 2*MAX_ROUNDS) - -/* Typedefs: - Typedef'ed data storage elements. Add any algorithm specific - parameters at the bottom of the structs as appropriate. -*/ - -typedef unsigned char BYTE; -typedef unsigned long DWORD; /* 32-bit unsigned quantity */ -typedef DWORD fullSbox[4][256]; - -/* The structure for key information */ -typedef struct - { - BYTE direction; /* Key used for encrypting or decrypting? */ -#if ALIGN32 - BYTE dummyAlign[3]; /* keep 32-bit alignment */ -#endif - int keyLen; /* Length of the key */ - char keyMaterial[MAX_KEY_SIZE+4];/* Raw key data in ASCII */ - - /* Twofish-specific parameters: */ - DWORD keySig; /* set to VALID_SIG by makeKey() */ - int numRounds; /* number of rounds in cipher */ - DWORD key32[MAX_KEY_BITS/32]; /* actual key bits, in dwords */ - DWORD sboxKeys[MAX_KEY_BITS/64];/* key bits used for S-boxes */ - DWORD subKeys[TOTAL_SUBKEYS]; /* round subkeys, input/output whitening bits */ -#if REENTRANT - fullSbox sBox8x32; /* fully expanded S-box */ - #if defined(COMPILE_KEY) && defined(USE_ASM) -#undef VALID_SIG -#define VALID_SIG 0x504D4F43 /* 'COMP': C is compiled with -DCOMPILE_KEY */ - DWORD cSig1; /* set after first "compile" (zero at "init") */ - void *encryptFuncPtr; /* ptr to asm encrypt function */ - void *decryptFuncPtr; /* ptr to asm decrypt function */ - DWORD codeSize; /* size of compiledCode */ - DWORD cSig2; /* set after first "compile" */ - BYTE compiledCode[5000]; /* make room for the code itself */ - #endif -#endif - } keyInstance; - -/* The structure for cipher information */ -typedef struct - { - BYTE mode; /* MODE_ECB, MODE_CBC, or MODE_CFB1 */ -#if ALIGN32 - BYTE dummyAlign[3]; /* keep 32-bit alignment */ -#endif - BYTE IV[MAX_IV_SIZE]; /* CFB1 iv bytes (CBC uses iv32) */ - - /* Twofish-specific parameters: */ - DWORD cipherSig; /* set to VALID_SIG by cipherInit() */ - DWORD iv32[BLOCK_SIZE/32]; /* CBC IV bytes arranged as dwords */ - } cipherInstance; - -/* Function protoypes */ -int makeKey(keyInstance *key, BYTE direction, int keyLen, char *keyMaterial); - -int cipherInit(cipherInstance *cipher, BYTE mode, char *IV); - -int blockEncrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, - int inputLen, BYTE *outBuffer); - -int blockDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, - int inputLen, BYTE *outBuffer); - -int reKey(keyInstance *key); /* do key schedule using modified key.keyDwords */ - -/* API to check table usage, for use in ECB_TBL KAT */ -#define TAB_DISABLE 0 -#define TAB_ENABLE 1 -#define TAB_RESET 2 -#define TAB_QUERY 3 -#define TAB_MIN_QUERY 50 -int TableOp(int op); - - -#define CONST /* helpful C++ syntax sugar, NOP for ANSI C */ - -#if BLOCK_SIZE == 128 /* optimize block copies */ -#define Copy1(d,s,N) ((DWORD *)(d))[N] = ((DWORD *)(s))[N] -#define BlockCopy(d,s) { Copy1(d,s,0);Copy1(d,s,1);Copy1(d,s,2);Copy1(d,s,3); } -#else -#define BlockCopy(d,s) { memcpy(d,s,BLOCK_SIZE/8); } -#endif - - -#ifdef TEST_2FISH -/* ----- EXAMPLES ----- - -Unfortunately, the AES API is somewhat clumsy, and it is not entirely -obvious how to use the above functions. In particular, note that -makeKey() takes an ASCII hex nibble key string (e.g., 32 characters -for a 128-bit key), which is rarely the way that keys are internally -represented. The reKey() function uses instead the keyInstance.key32 -array of key bits and is the preferred method. In fact, makeKey() -initializes some internal keyInstance state, then parse the ASCII -string into the binary key32, and calls reKey(). To initialize the -keyInstance state, use a 'dummy' call to makeKey(); i.e., set the -keyMaterial parameter to NULL. Then use reKey() for all key changes. -Similarly, cipherInit takes an IV string in ASCII hex, so a dummy setup -call with a null IV string will skip the ASCII parse. - -Note that CFB mode is not well tested nor defined by AES, so using the -Twofish MODE_CFB it not recommended. If you wish to implement a CFB mode, -build it external to the Twofish code, using the Twofish functions only -in ECB mode. - -Below is a sample piece of code showing how the code is typically used -to set up a key, encrypt, and decrypt. Error checking is somewhat limited -in this example. Pseudorandom bytes are used for all key and text. - -If you compile TWOFISH2.C or TWOFISH.C as a DOS (or Windows Console) app -with this code enabled, the test will be run. For example, using -Borland C, you would compile using: - BCC32 -DTEST_2FISH twofish2.c -to run the test on the optimized code, or - BCC32 -DTEST_2FISH twofish.c -to run the test on the pedagogical code. - -*/ - -#include -#include -#include -#include - -#define MAX_BLK_CNT 4 /* max # blocks per call in TestTwofish */ -int TestTwofish(int mode,int keySize) /* keySize must be 128, 192, or 256 */ - { /* return 0 iff test passes */ - keyInstance ki; /* key information, including tables */ - cipherInstance ci; /* keeps mode (ECB, CBC) and IV */ - BYTE plainText[MAX_BLK_CNT*(BLOCK_SIZE/8)]; - BYTE cipherText[MAX_BLK_CNT*(BLOCK_SIZE/8)]; - BYTE decryptOut[MAX_BLK_CNT*(BLOCK_SIZE/8)]; - BYTE iv[BLOCK_SIZE/8]; - int i,byteCnt; - - if (makeKey(&ki,DIR_ENCRYPT,keySize,NULL) != TRUE) - return 1; /* 'dummy' setup for a 128-bit key */ - if (cipherInit(&ci,mode,NULL) != TRUE) - return 1; /* 'dummy' setup for cipher */ - - for (i=0;ikeyLen+63)/64; /* round up to next multiple of 64 bits */ - int subkeyCnt = ROUND_SUBKEYS + 2*key->numRounds; - - sprintf(line,";\n;makeKey: Input key --> S-box key [%s]\n", - (key->direction == DIR_ENCRYPT) ? "Encrypt" : "Decrypt"); - DebugIO(line); - for (i=0;i %08lX\n","", - key->key32[2*i+1],key->key32[2*i],key->sboxKeys[k64Cnt-1-i]); - DebugIO(line); - } - sprintf(line,";%11sSubkeys\n",""); - DebugIO(line); - for (i=0;isubKeys[2*i],key->subKeys[2*i+1], - (2*i == INPUT_WHITEN) ? " Input whiten" : - (2*i == OUTPUT_WHITEN) ? " Output whiten" : - (2*i == ROUND_SUBKEYS) ? " Round subkeys" : ""); - DebugIO(line); - } - DebugIO(";\n"); - } -#else -CONST int debugCompile = 0; -#define DebugDump(x,s,R,XOR,doRot,showT,needBswap) -#define DebugDumpKey(key) -#endif diff --git a/twofish/platform.h b/twofish/platform.h deleted file mode 100644 index 400ea28..0000000 --- a/twofish/platform.h +++ /dev/null @@ -1,75 +0,0 @@ -/*************************************************************************** - PLATFORM.H -- Platform-specific defines for TWOFISH code - - Submitters: - Bruce Schneier, Counterpane Systems - Doug Whiting, Hi/fn - John Kelsey, Counterpane Systems - Chris Hall, Counterpane Systems - David Wagner, UC Berkeley - - Code Author: Doug Whiting, Hi/fn - - Version 1.00 April 1998 - - Copyright 1998, Hi/fn and Counterpane Systems. All rights reserved. - - Notes: - * Tab size is set to 4 characters in this file - -***************************************************************************/ - -/* use intrinsic rotate if possible */ -#define ROL(x,n) (((x) << ((n) & 0x1F)) | ((x) >> (32-((n) & 0x1F)))) -#define ROR(x,n) (((x) >> ((n) & 0x1F)) | ((x) << (32-((n) & 0x1F)))) - -#if (0) && defined(__BORLANDC__) && (__BORLANDC__ >= 0x462) -#error "!!!This does not work for some reason!!!" -#include /* get prototype for _lrotl() , _lrotr() */ -#pragma inline __lrotl__ -#pragma inline __lrotr__ -#undef ROL /* get rid of inefficient definitions */ -#undef ROR -#define ROL(x,n) __lrotl__(x,n) /* use compiler intrinsic rotations */ -#define ROR(x,n) __lrotr__(x,n) -#endif - -#ifdef _MSC_VER -#include /* get prototypes for rotation functions */ -#undef ROL -#undef ROR -#pragma intrinsic(_lrotl,_lrotr) /* use intrinsic compiler rotations */ -#define ROL(x,n) _lrotl(x,n) -#define ROR(x,n) _lrotr(x,n) -#endif - -#if !defined(__i386__) && !defined(__x86_64__) -#ifdef __BORLANDC__ -#define __i386__ 300 /* make sure this is defined for Intel CPUs */ -#endif -#endif - -#if defined(__i386__) || defined(__x86_64__) || defined(__arm__) -#define LittleEndian 1 /* e.g., 1 for Pentium, 0 for 68K */ -#define ALIGN32 0 /* need dword alignment? (no for Pentium) */ -#else /* non-Intel platforms */ -#define LittleEndian 0 /* (assume big endian */ -#define ALIGN32 0 /* (assume need alignment for non-Intel) */ -#endif - -#if LittleEndian -#define Bswap(x) (x) /* NOP for little-endian machines */ -#define ADDR_XOR 0 /* NOP for little-endian machines */ -#else -#define Bswap(x) ((ROR(x,8) & 0xFF00FF00) | (ROL(x,8) & 0x00FF00FF)) -#define ADDR_XOR 3 /* convert byte address in dword */ -#endif - -/* Macros for extracting bytes from dwords (correct for endianness) */ -#define _b(x,N) (((BYTE *)&x)[((N) & 3) ^ ADDR_XOR]) /* pick bytes out of a dword */ - -#define b0(x) _b(x,0) /* extract LSB of DWORD */ -#define b1(x) _b(x,1) -#define b2(x) _b(x,2) -#define b3(x) _b(x,3) /* extract MSB of DWORD */ - diff --git a/twofish/table.h b/twofish/table.h deleted file mode 100644 index 5c3c590..0000000 --- a/twofish/table.h +++ /dev/null @@ -1,228 +0,0 @@ -/*************************************************************************** - TABLE.H -- Tables, macros, constants for Twofish S-boxes and MDS matrix - - Submitters: - Bruce Schneier, Counterpane Systems - Doug Whiting, Hi/fn - John Kelsey, Counterpane Systems - Chris Hall, Counterpane Systems - David Wagner, UC Berkeley - - Code Author: Doug Whiting, Hi/fn - - Version 1.00 April 1998 - - Copyright 1998, Hi/fn and Counterpane Systems. All rights reserved. - - Notes: - * Tab size is set to 4 characters in this file - * These definitions should be used in optimized and unoptimized - versions to insure consistency. - -***************************************************************************/ - -/* for computing subkeys */ -#define SK_STEP 0x02020202u -#define SK_BUMP 0x01010101u -#define SK_ROTL 9 - -/* Reed-Solomon code parameters: (12,8) reversible code - g(x) = x**4 + (a + 1/a) x**3 + a x**2 + (a + 1/a) x + 1 - where a = primitive root of field generator 0x14D */ -#define RS_GF_FDBK 0x14D /* field generator */ -#define RS_rem(x) \ - { BYTE b = (BYTE) (x >> 24); \ - DWORD g2 = ((b << 1) ^ ((b & 0x80) ? RS_GF_FDBK : 0 )) & 0xFF; \ - DWORD g3 = ((b >> 1) & 0x7F) ^ ((b & 1) ? RS_GF_FDBK >> 1 : 0 ) ^ g2 ; \ - x = (x << 8) ^ (g3 << 24) ^ (g2 << 16) ^ (g3 << 8) ^ b; \ - } - -/* Macros for the MDS matrix -* The MDS matrix is (using primitive polynomial 169): -* 01 EF 5B 5B -* 5B EF EF 01 -* EF 5B 01 EF -* EF 01 EF 5B -*---------------------------------------------------------------- -* More statistical properties of this matrix (from MDS.EXE output): -* -* Min Hamming weight (one byte difference) = 8. Max=26. Total = 1020. -* Prob[8]: 7 23 42 20 52 95 88 94 121 128 91 -* 102 76 41 24 8 4 1 3 0 0 0 -* Runs[8]: 2 4 5 6 7 8 9 11 -* MSBs[8]: 1 4 15 8 18 38 40 43 -* HW= 8: 05040705 0A080E0A 14101C14 28203828 50407050 01499101 A080E0A0 -* HW= 9: 04050707 080A0E0E 10141C1C 20283838 40507070 80A0E0E0 C6432020 07070504 -* 0E0E0A08 1C1C1410 38382820 70705040 E0E0A080 202043C6 05070407 0A0E080E -* 141C101C 28382038 50704070 A0E080E0 4320C620 02924B02 089A4508 -* Min Hamming weight (two byte difference) = 3. Max=28. Total = 390150. -* Prob[3]: 7 18 55 149 270 914 2185 5761 11363 20719 32079 -* 43492 51612 53851 52098 42015 31117 20854 11538 6223 2492 1033 -* MDS OK, ROR: 6+ 7+ 8+ 9+ 10+ 11+ 12+ 13+ 14+ 15+ 16+ -* 17+ 18+ 19+ 20+ 21+ 22+ 23+ 24+ 25+ 26+ -*/ -#define MDS_GF_FDBK 0x169 /* primitive polynomial for GF(256)*/ -#define LFSR1(x) ( ((x) >> 1) ^ (((x) & 0x01) ? MDS_GF_FDBK/2 : 0)) -#define LFSR2(x) ( ((x) >> 2) ^ (((x) & 0x02) ? MDS_GF_FDBK/2 : 0) \ - ^ (((x) & 0x01) ? MDS_GF_FDBK/4 : 0)) - -#define Mx_1(x) ((DWORD) (x)) /* force result to dword so << will work */ -#define Mx_X(x) ((DWORD) ((x) ^ LFSR2(x))) /* 5B */ -#define Mx_Y(x) ((DWORD) ((x) ^ LFSR1(x) ^ LFSR2(x))) /* EF */ - -#define M00 Mul_1 -#define M01 Mul_Y -#define M02 Mul_X -#define M03 Mul_X - -#define M10 Mul_X -#define M11 Mul_Y -#define M12 Mul_Y -#define M13 Mul_1 - -#define M20 Mul_Y -#define M21 Mul_X -#define M22 Mul_1 -#define M23 Mul_Y - -#define M30 Mul_Y -#define M31 Mul_1 -#define M32 Mul_Y -#define M33 Mul_X - -#define Mul_1 Mx_1 -#define Mul_X Mx_X -#define Mul_Y Mx_Y - -/* Define the fixed p0/p1 permutations used in keyed S-box lookup. - By changing the following constant definitions for P_ij, the S-boxes will - automatically get changed in all the Twofish source code. Note that P_i0 is - the "outermost" 8x8 permutation applied. See the f32() function to see - how these constants are to be used. -*/ -#define P_00 1 /* "outermost" permutation */ -#define P_01 0 -#define P_02 0 -#define P_03 (P_01^1) /* "extend" to larger key sizes */ -#define P_04 1 - -#define P_10 0 -#define P_11 0 -#define P_12 1 -#define P_13 (P_11^1) -#define P_14 0 - -#define P_20 1 -#define P_21 1 -#define P_22 0 -#define P_23 (P_21^1) -#define P_24 0 - -#define P_30 0 -#define P_31 1 -#define P_32 1 -#define P_33 (P_31^1) -#define P_34 1 - -#define p8(N) P8x8[P_##N] /* some syntax shorthand */ - -/* fixed 8x8 permutation S-boxes */ - -/*********************************************************************** -* 07:07:14 05/30/98 [4x4] TestCnt=256. keySize=128. CRC=4BD14D9E. -* maxKeyed: dpMax = 18. lpMax =100. fixPt = 8. skXor = 0. skDup = 6. -* log2(dpMax[ 6..18])= --- 15.42 1.33 0.89 4.05 7.98 12.05 -* log2(lpMax[ 7..12])= 9.32 1.01 1.16 4.23 8.02 12.45 -* log2(fixPt[ 0.. 8])= 1.44 1.44 2.44 4.06 6.01 8.21 11.07 14.09 17.00 -* log2(skXor[ 0.. 0]) -* log2(skDup[ 0.. 6])= --- 2.37 0.44 3.94 8.36 13.04 17.99 -***********************************************************************/ -CONST BYTE P8x8[2][256]= - { -/* p0: */ -/* dpMax = 10. lpMax = 64. cycleCnt= 1 1 1 0. */ -/* 817D6F320B59ECA4.ECB81235F4A6709D.BA5E6D90C8F32471.D7F4126E9B3085CA. */ -/* Karnaugh maps: -* 0111 0001 0011 1010. 0001 1001 1100 1111. 1001 1110 0011 1110. 1101 0101 1111 1001. -* 0101 1111 1100 0100. 1011 0101 0010 0000. 0101 1000 1100 0101. 1000 0111 0011 0010. -* 0000 1001 1110 1101. 1011 1000 1010 0011. 0011 1001 0101 0000. 0100 0010 0101 1011. -* 0111 0100 0001 0110. 1000 1011 1110 1001. 0011 0011 1001 1101. 1101 0101 0000 1100. -*/ - { - 0xA9, 0x67, 0xB3, 0xE8, 0x04, 0xFD, 0xA3, 0x76, - 0x9A, 0x92, 0x80, 0x78, 0xE4, 0xDD, 0xD1, 0x38, - 0x0D, 0xC6, 0x35, 0x98, 0x18, 0xF7, 0xEC, 0x6C, - 0x43, 0x75, 0x37, 0x26, 0xFA, 0x13, 0x94, 0x48, - 0xF2, 0xD0, 0x8B, 0x30, 0x84, 0x54, 0xDF, 0x23, - 0x19, 0x5B, 0x3D, 0x59, 0xF3, 0xAE, 0xA2, 0x82, - 0x63, 0x01, 0x83, 0x2E, 0xD9, 0x51, 0x9B, 0x7C, - 0xA6, 0xEB, 0xA5, 0xBE, 0x16, 0x0C, 0xE3, 0x61, - 0xC0, 0x8C, 0x3A, 0xF5, 0x73, 0x2C, 0x25, 0x0B, - 0xBB, 0x4E, 0x89, 0x6B, 0x53, 0x6A, 0xB4, 0xF1, - 0xE1, 0xE6, 0xBD, 0x45, 0xE2, 0xF4, 0xB6, 0x66, - 0xCC, 0x95, 0x03, 0x56, 0xD4, 0x1C, 0x1E, 0xD7, - 0xFB, 0xC3, 0x8E, 0xB5, 0xE9, 0xCF, 0xBF, 0xBA, - 0xEA, 0x77, 0x39, 0xAF, 0x33, 0xC9, 0x62, 0x71, - 0x81, 0x79, 0x09, 0xAD, 0x24, 0xCD, 0xF9, 0xD8, - 0xE5, 0xC5, 0xB9, 0x4D, 0x44, 0x08, 0x86, 0xE7, - 0xA1, 0x1D, 0xAA, 0xED, 0x06, 0x70, 0xB2, 0xD2, - 0x41, 0x7B, 0xA0, 0x11, 0x31, 0xC2, 0x27, 0x90, - 0x20, 0xF6, 0x60, 0xFF, 0x96, 0x5C, 0xB1, 0xAB, - 0x9E, 0x9C, 0x52, 0x1B, 0x5F, 0x93, 0x0A, 0xEF, - 0x91, 0x85, 0x49, 0xEE, 0x2D, 0x4F, 0x8F, 0x3B, - 0x47, 0x87, 0x6D, 0x46, 0xD6, 0x3E, 0x69, 0x64, - 0x2A, 0xCE, 0xCB, 0x2F, 0xFC, 0x97, 0x05, 0x7A, - 0xAC, 0x7F, 0xD5, 0x1A, 0x4B, 0x0E, 0xA7, 0x5A, - 0x28, 0x14, 0x3F, 0x29, 0x88, 0x3C, 0x4C, 0x02, - 0xB8, 0xDA, 0xB0, 0x17, 0x55, 0x1F, 0x8A, 0x7D, - 0x57, 0xC7, 0x8D, 0x74, 0xB7, 0xC4, 0x9F, 0x72, - 0x7E, 0x15, 0x22, 0x12, 0x58, 0x07, 0x99, 0x34, - 0x6E, 0x50, 0xDE, 0x68, 0x65, 0xBC, 0xDB, 0xF8, - 0xC8, 0xA8, 0x2B, 0x40, 0xDC, 0xFE, 0x32, 0xA4, - 0xCA, 0x10, 0x21, 0xF0, 0xD3, 0x5D, 0x0F, 0x00, - 0x6F, 0x9D, 0x36, 0x42, 0x4A, 0x5E, 0xC1, 0xE0 - }, -/* p1: */ -/* dpMax = 10. lpMax = 64. cycleCnt= 2 0 0 1. */ -/* 28BDF76E31940AC5.1E2B4C376DA5F908.4C75169A0ED82B3F.B951C3DE647F208A. */ -/* Karnaugh maps: -* 0011 1001 0010 0111. 1010 0111 0100 0110. 0011 0001 1111 0100. 1111 1000 0001 1100. -* 1100 1111 1111 1010. 0011 0011 1110 0100. 1001 0110 0100 0011. 0101 0110 1011 1011. -* 0010 0100 0011 0101. 1100 1000 1000 1110. 0111 1111 0010 0110. 0000 1010 0000 0011. -* 1101 1000 0010 0001. 0110 1001 1110 0101. 0001 0100 0101 0111. 0011 1011 1111 0010. -*/ - { - 0x75, 0xF3, 0xC6, 0xF4, 0xDB, 0x7B, 0xFB, 0xC8, - 0x4A, 0xD3, 0xE6, 0x6B, 0x45, 0x7D, 0xE8, 0x4B, - 0xD6, 0x32, 0xD8, 0xFD, 0x37, 0x71, 0xF1, 0xE1, - 0x30, 0x0F, 0xF8, 0x1B, 0x87, 0xFA, 0x06, 0x3F, - 0x5E, 0xBA, 0xAE, 0x5B, 0x8A, 0x00, 0xBC, 0x9D, - 0x6D, 0xC1, 0xB1, 0x0E, 0x80, 0x5D, 0xD2, 0xD5, - 0xA0, 0x84, 0x07, 0x14, 0xB5, 0x90, 0x2C, 0xA3, - 0xB2, 0x73, 0x4C, 0x54, 0x92, 0x74, 0x36, 0x51, - 0x38, 0xB0, 0xBD, 0x5A, 0xFC, 0x60, 0x62, 0x96, - 0x6C, 0x42, 0xF7, 0x10, 0x7C, 0x28, 0x27, 0x8C, - 0x13, 0x95, 0x9C, 0xC7, 0x24, 0x46, 0x3B, 0x70, - 0xCA, 0xE3, 0x85, 0xCB, 0x11, 0xD0, 0x93, 0xB8, - 0xA6, 0x83, 0x20, 0xFF, 0x9F, 0x77, 0xC3, 0xCC, - 0x03, 0x6F, 0x08, 0xBF, 0x40, 0xE7, 0x2B, 0xE2, - 0x79, 0x0C, 0xAA, 0x82, 0x41, 0x3A, 0xEA, 0xB9, - 0xE4, 0x9A, 0xA4, 0x97, 0x7E, 0xDA, 0x7A, 0x17, - 0x66, 0x94, 0xA1, 0x1D, 0x3D, 0xF0, 0xDE, 0xB3, - 0x0B, 0x72, 0xA7, 0x1C, 0xEF, 0xD1, 0x53, 0x3E, - 0x8F, 0x33, 0x26, 0x5F, 0xEC, 0x76, 0x2A, 0x49, - 0x81, 0x88, 0xEE, 0x21, 0xC4, 0x1A, 0xEB, 0xD9, - 0xC5, 0x39, 0x99, 0xCD, 0xAD, 0x31, 0x8B, 0x01, - 0x18, 0x23, 0xDD, 0x1F, 0x4E, 0x2D, 0xF9, 0x48, - 0x4F, 0xF2, 0x65, 0x8E, 0x78, 0x5C, 0x58, 0x19, - 0x8D, 0xE5, 0x98, 0x57, 0x67, 0x7F, 0x05, 0x64, - 0xAF, 0x63, 0xB6, 0xFE, 0xF5, 0xB7, 0x3C, 0xA5, - 0xCE, 0xE9, 0x68, 0x44, 0xE0, 0x4D, 0x43, 0x69, - 0x29, 0x2E, 0xAC, 0x15, 0x59, 0xA8, 0x0A, 0x9E, - 0x6E, 0x47, 0xDF, 0x34, 0x35, 0x6A, 0xCF, 0xDC, - 0x22, 0xC9, 0xC0, 0x9B, 0x89, 0xD4, 0xED, 0xAB, - 0x12, 0xA2, 0x0D, 0x52, 0xBB, 0x02, 0x2F, 0xA9, - 0xD7, 0x61, 0x1E, 0xB4, 0x50, 0x04, 0xF6, 0xC2, - 0x16, 0x25, 0x86, 0x56, 0x55, 0x09, 0xBE, 0x91 - } - }; From 050892bb73b5a0bb12ba58ea67ee9c0b24c513c5 Mon Sep 17 00:00:00 2001 From: Catatonic Prime Date: Tue, 27 Dec 2016 16:32:27 +0000 Subject: [PATCH 008/531] libgcrypt doens't appear to be working either. No errors so crypto is funny? dunno. --- hydra-radmin2.c | 14 ++++++++------ 1 file changed, 8 insertions(+), 6 deletions(-) diff --git a/hydra-radmin2.c b/hydra-radmin2.c index c02f23c..9ae609f 100644 --- a/hydra-radmin2.c +++ b/hydra-radmin2.c @@ -264,25 +264,27 @@ void service_radmin2(char *ip, int sp, unsigned char options, char *miscptr, FIL //3.b) encrypt data received using pkey & known IV err= gcry_cipher_open(&cipher, GCRY_CIPHER_TWOFISH128, GCRY_CIPHER_MODE_CBC, 0); if(err) { - hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_open error (%08x)\n", (int)getpid(), index); + hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_open error (%08x)\n%s/%s", (int)getpid(), index, gcry_strsource(err), gcry_strerror(err)); hydra_child_exit(1); } - err = gcry_cipher_setkey(cipher, pkey, 128); + err = gcry_cipher_setkey(cipher, pkey, 16); if(err) { - hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_setkey error (%08x)\n", (int)getpid(), index); + hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_setkey error (%08x)\n%s/%s", (int)getpid(), index, gcry_strsource(err), gcry_strerror(err)); hydra_child_exit(1); } - err = gcry_cipher_setiv(cipher, IV, 128); + err = gcry_cipher_setiv(cipher, IV, 16); if(err) { - hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_setiv error (%08x)\n", (int)getpid(), index); + hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_setiv error (%08x)\n%s/%s", (int)getpid(), index, gcry_strsource(err), gcry_strerror(err)); hydra_child_exit(1); } err = gcry_cipher_encrypt(cipher, encrypted, 32, msg->data, 32); if(err) { - hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_encrypt error (%08x)\n", (int)getpid(), index); + hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_encrypt error (%08x)\n%s/%s", (int)getpid(), index, gcry_strsource(err), gcry_strerror(err)); hydra_child_exit(1); } gcry_cipher_close(cipher); + hydra_report(stderr, "Trying another one...\n"); + // index = makeKey(&key, DIR_ENCRYPT, 128, pkey); // if(index != TRUE) { // hydra_report(stderr, "Error: Child with pid %d terminating, make key error (%08x)\n", (int)getpid(), index); From ff7343e8728f0b7c92de24dc0f36bac5806752b4 Mon Sep 17 00:00:00 2001 From: Catatonic Prime Date: Tue, 27 Dec 2016 17:14:17 +0000 Subject: [PATCH 009/531] Yay gcrypt is working!!! --- hydra-radmin2.c | 44 +++++++++++++++++++++++++------------------- 1 file changed, 25 insertions(+), 19 deletions(-) diff --git a/hydra-radmin2.c b/hydra-radmin2.c index 9ae609f..bc2d428 100644 --- a/hydra-radmin2.c +++ b/hydra-radmin2.c @@ -1,7 +1,6 @@ #include "hydra-mod.h" #include #include -#include #include extern char *HYDRA_EXIT; @@ -177,14 +176,11 @@ void service_radmin2(char *ip, int sp, unsigned char options, char *miscptr, FIL char buffer[42]; char password[101]; unsigned char rawkey[16]; - char pkey[33]; - char *IV = "\xFE\xDC\xBA\x98\x76\x54\x32\x10\xA3\x9D\x4A\x18\xF8\x5B\x4A\x52"; + unsigned char *IV = "\xFE\xDC\xBA\x98\x76\x54\x32\x10\xA3\x9D\x4A\x18\xF8\x5B\x4A\x52"; unsigned char encrypted[32]; gcry_error_t err; gcry_cipher_hd_t cipher; - - //Initialization nonsense. - MD5_CTX md5c; + gcry_md_hd_t md; if(port != 0) { myport = port; @@ -193,7 +189,6 @@ void service_radmin2(char *ip, int sp, unsigned char options, char *miscptr, FIL gcry_check_version(NULL); memset(buffer, 0x00, sizeof(buffer)); - memset(pkey, 0x00, 33); memset(encrypted, 0x00, 32); memset(password, 0x00, 100); @@ -206,13 +201,19 @@ void service_radmin2(char *ip, int sp, unsigned char options, char *miscptr, FIL while(1) { // Get a password to work with. strncpy(password, hydra_get_next_password(), 101); - MD5_Init(&md5c); - MD5_Update(&md5c, password, 100); - MD5_Final(rawkey, &md5c); - //Copy raw md5 data into ASCIIZ string - for(index = 0; index < 16; index++) { - sprintf((pkey+index*2), "%02x", rawkey[index]); + + err = gcry_md_open(&md, GCRY_MD_MD5, 0); + if(err) { + hydra_report(stderr, "Error: Child with pid %d terminating, gcry_md_open error (%08x)\n%s/%s", (int)getpid(), index, gcry_strsource(err), gcry_strerror(err)); + hydra_child_exit(1); } + gcry_md_write(md, password, 100); + if(gcry_md_read(md, 0) == NULL) { + hydra_report(stderr, "Error: Child with pid %d terminating, gcry_md_read error (%08x)\n", (int)getpid(), index); + hydra_child_exit(1); + } + memcpy(rawkey, gcry_md_read(md, 0), 16); + gcry_md_close(md); /* Typical conversation goes as follows... 0) connect to server @@ -267,22 +268,27 @@ void service_radmin2(char *ip, int sp, unsigned char options, char *miscptr, FIL hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_open error (%08x)\n%s/%s", (int)getpid(), index, gcry_strsource(err), gcry_strerror(err)); hydra_child_exit(1); } - err = gcry_cipher_setkey(cipher, pkey, 16); - if(err) { - hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_setkey error (%08x)\n%s/%s", (int)getpid(), index, gcry_strsource(err), gcry_strerror(err)); - hydra_child_exit(1); - } + err = gcry_cipher_setiv(cipher, IV, 16); if(err) { hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_setiv error (%08x)\n%s/%s", (int)getpid(), index, gcry_strsource(err), gcry_strerror(err)); hydra_child_exit(1); - } + } + + err = gcry_cipher_setkey(cipher, rawkey, 16); + if(err) { + hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_setkey error (%08x)\n%s/%s", (int)getpid(), index, gcry_strsource(err), gcry_strerror(err)); + hydra_child_exit(1); + } + err = gcry_cipher_encrypt(cipher, encrypted, 32, msg->data, 32); if(err) { hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_encrypt error (%08x)\n%s/%s", (int)getpid(), index, gcry_strsource(err), gcry_strerror(err)); hydra_child_exit(1); } + gcry_cipher_close(cipher); + hydra_report(stderr, "Trying another one...\n"); // index = makeKey(&key, DIR_ENCRYPT, 128, pkey); From 249c8f973bfd30e9609f2aa08ccc54cfea026c79 Mon Sep 17 00:00:00 2001 From: catatonic Date: Tue, 27 Dec 2016 10:20:59 -0700 Subject: [PATCH 010/531] Removing diagnostics --- hydra-radmin2.c | 20 -------------------- 1 file changed, 20 deletions(-) diff --git a/hydra-radmin2.c b/hydra-radmin2.c index bc2d428..8a00d71 100644 --- a/hydra-radmin2.c +++ b/hydra-radmin2.c @@ -289,26 +289,6 @@ void service_radmin2(char *ip, int sp, unsigned char options, char *miscptr, FIL gcry_cipher_close(cipher); - hydra_report(stderr, "Trying another one...\n"); - -// index = makeKey(&key, DIR_ENCRYPT, 128, pkey); -// if(index != TRUE) { -// hydra_report(stderr, "Error: Child with pid %d terminating, make key error (%08x)\n", (int)getpid(), index); -// hydra_child_exit(1); -// } - -// index = cipherInit(&cipher, MODE_CBC, IV); -// if(index != TRUE) { -// hydra_report(stderr, "Error: Child with pid %d terminating, cipher init error(%08x)\n", (int)getpid(), index); -// hydra_child_exit(1); -// } - -// index = blockEncrypt(&cipher, &key, msg->data, 32 * 8, encrypted); -// if(index <= 0) { -// hydra_report(stderr, "Error: Child with pid %d terminating, encrypt error(%08x)\n", (int)getpid(), index); -// hydra_child_exit(1); -// } - //3.c) half sum - this is the solution to the challenge. for(index=0; index < 16; index++) { *(encrypted+index) += *(encrypted+index+16); From 5d88976bc621040e7d96eb0fe368af7f4875323f Mon Sep 17 00:00:00 2001 From: catatonic Date: Tue, 27 Dec 2016 15:01:15 -0700 Subject: [PATCH 011/531] Fixing issue were we are not correctly grabbing the next password "pair" --- hydra-radmin2.c | 40 ++++++++++++++++++++++------------------ 1 file changed, 22 insertions(+), 18 deletions(-) diff --git a/hydra-radmin2.c b/hydra-radmin2.c index 8a00d71..dce8f05 100644 --- a/hydra-radmin2.c +++ b/hydra-radmin2.c @@ -189,8 +189,6 @@ void service_radmin2(char *ip, int sp, unsigned char options, char *miscptr, FIL gcry_check_version(NULL); memset(buffer, 0x00, sizeof(buffer)); - memset(encrypted, 0x00, 32); - memset(password, 0x00, 100); //Phone the mother ship hydra_register_socket(sp); @@ -199,21 +197,6 @@ void service_radmin2(char *ip, int sp, unsigned char options, char *miscptr, FIL } while(1) { - // Get a password to work with. - strncpy(password, hydra_get_next_password(), 101); - - err = gcry_md_open(&md, GCRY_MD_MD5, 0); - if(err) { - hydra_report(stderr, "Error: Child with pid %d terminating, gcry_md_open error (%08x)\n%s/%s", (int)getpid(), index, gcry_strsource(err), gcry_strerror(err)); - hydra_child_exit(1); - } - gcry_md_write(md, password, 100); - if(gcry_md_read(md, 0) == NULL) { - hydra_report(stderr, "Error: Child with pid %d terminating, gcry_md_read error (%08x)\n", (int)getpid(), index); - hydra_child_exit(1); - } - memcpy(rawkey, gcry_md_read(md, 0), 16); - gcry_md_close(md); /* Typical conversation goes as follows... 0) connect to server @@ -259,6 +242,28 @@ void service_radmin2(char *ip, int sp, unsigned char options, char *miscptr, FIL } //3) Send challenge solution. + + // Get a password to work with. + memset(password, 0x00, sizeof(password)); + memset(encrypted, 0x00, sizeof(encrypted)); + hydra_get_next_pair(); + strncpy(password, hydra_get_next_password(), sizeof(password)-1); + hydra_report(stderr, "Trying: %s\n", password); + //MD5 the password to generate the password key, this is used with twofish below. + err = gcry_md_open(&md, GCRY_MD_MD5, 0); + if(err) { + hydra_report(stderr, "Error: Child with pid %d terminating, gcry_md_open error (%08x)\n%s/%s", (int)getpid(), index, gcry_strsource(err), gcry_strerror(err)); + hydra_child_exit(1); + } + gcry_md_reset(md); + gcry_md_write(md, password, 100); + if(gcry_md_read(md, 0) == NULL) { + hydra_report(stderr, "Error: Child with pid %d terminating, gcry_md_read error (%08x)\n", (int)getpid(), index); + hydra_child_exit(1); + } + memcpy(rawkey, gcry_md_read(md, 0), 16); + gcry_md_close(md); + //3.a) generate a new message from the buffer msg = buffer2message(buffer); @@ -335,7 +340,6 @@ void service_radmin2(char *ip, int sp, unsigned char options, char *miscptr, FIL hydra_report(stderr, "Error: Child with pid %d terminating, protocol error\n", (int)getpid()); hydra_child_exit(2); } - } } From c5d98dc35298e1f8cf4c06606e36337fa738100a Mon Sep 17 00:00:00 2001 From: Catatonic Prime Date: Tue, 27 Dec 2016 22:06:41 +0000 Subject: [PATCH 012/531] Removing diagnostics --- hydra-radmin2.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-radmin2.c b/hydra-radmin2.c index dce8f05..9985b52 100644 --- a/hydra-radmin2.c +++ b/hydra-radmin2.c @@ -248,7 +248,7 @@ void service_radmin2(char *ip, int sp, unsigned char options, char *miscptr, FIL memset(encrypted, 0x00, sizeof(encrypted)); hydra_get_next_pair(); strncpy(password, hydra_get_next_password(), sizeof(password)-1); - hydra_report(stderr, "Trying: %s\n", password); + //MD5 the password to generate the password key, this is used with twofish below. err = gcry_md_open(&md, GCRY_MD_MD5, 0); if(err) { From 639dce3be18831e03384482329e770ba6d12f6ef Mon Sep 17 00:00:00 2001 From: van Hauser Date: Wed, 3 May 2017 14:10:17 +0200 Subject: [PATCH 013/531] v8.6-dev init --- CHANGES | 4 ++++ hydra.c | 2 +- 2 files changed, 5 insertions(+), 1 deletion(-) diff --git a/CHANGES b/CHANGES index c185553..249e2bb 100644 --- a/CHANGES +++ b/CHANGES @@ -1,6 +1,10 @@ Changelog for hydra ------------------- +Release 8.6-dev +* ... + + Release 8.5 * New command line option: -b : format option for -o output file (json only so far, happy for patches supporting others :) ) - thanks to veggiespam for the patch diff --git a/hydra.c b/hydra.c index 3f3f358..e394fbd 100644 --- a/hydra.c +++ b/hydra.c @@ -171,7 +171,7 @@ char *SERVICES = #define RESTOREFILE "./hydra.restore" #define PROGRAM "Hydra" -#define VERSION "v8.5" +#define VERSION "v8.6-dev" #define AUTHOR "van Hauser/THC" #define EMAIL "" #define RESOURCE "http://www.thc.org/thc-hydra" From 0e0a7878dc83041099a12f822cf5d0541a70de22 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Wed, 3 May 2017 14:15:09 +0200 Subject: [PATCH 014/531] forgot to update web pages --- web/CHANGES | 16 +++++++++++ web/README | 75 ++++++++++++++++++++++++++++++++++++++++++++++++-- web/index.html | 35 ++++++++++------------- 3 files changed, 103 insertions(+), 23 deletions(-) diff --git a/web/CHANGES b/web/CHANGES index 49cf12d..249e2bb 100644 --- a/web/CHANGES +++ b/web/CHANGES @@ -1,6 +1,22 @@ Changelog for hydra ------------------- +Release 8.6-dev +* ... + + +Release 8.5 +* New command line option: + -b : format option for -o output file (json only so far, happy for patches supporting others :) ) - thanks to veggiespam for the patch +* ./configure now honors the CC enviroment variable if present +* Fix for the restore file crash on some x64 platforms (finally! thanks to lukas227!) +* Changed the format of the restore file to detect cross platform copies +* Fixed a bug in the NCP module +* Favor strrchr() over rindex() +* Added refactoring patch by diadlo +* Updated man page with missing command line options + + Release 8.4 ! Reports came in that the rdp module is not working reliable sometimes, most likely against new Windows versions. please test, report and if possible send a fix * Proxy support re-implemented: diff --git a/web/README b/web/README index b48bf5b..072175a 100644 --- a/web/README +++ b/web/README @@ -28,7 +28,7 @@ either support more than one protocol to attack or support parallized connects. It was tested to compile cleanly on Linux, Windows/Cygwin, Solaris, -FreeBSD/OpenBSD, QNX (Blackberry 10) and OSX. +FreeBSD/OpenBSD, QNX (Blackberry 10) and MacOS. Currently this tool supports the following protocols: Asterisk, AFP, Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird, FTP, @@ -91,9 +91,9 @@ and compile them manually. SUPPORTED PLATFORMS ------------------- All UNIX platforms (linux, *bsd, solaris, etc.) -Mac OS/X +MacOS Windows with Cygwin (both IPv4 and IPv6) -Mobile systems based on Linux, Mac OS/X or QNX (e.g. Android, iPhone, Blackberry 10, Zaurus, iPaq) +Mobile systems based on Linux, MacOS or QNX (e.g. Android, iPhone, Blackberry 10, Zaurus, iPaq) @@ -287,6 +287,75 @@ ADDITIONAL HINTS cat dictionary.txt | pw-inspector -m 6 -c 2 -n > passlist.txt +RESULTS OUTPUT +-------------- + +The results are output to stdio along with the other information. Via the -o +command line option, the results can also be written to a file. Using -b, +the format of the output can be specified. Currently, these are supported: +* `text` - plain text format +* `jsonv1` - JSON data using version 1.x of the schema (defined below). +* `json` - JSON data using the latest version of the schema, currently there + is only version 1. + +If using JSON output, the results file may not be valid JSON if there are +serious errors in booting Hydra. + + +### JSON Schema +Here is an example of the JSON output. Notes on some of the fields: + +* `errormessages` - an array of zero or more strings that are normally printed + to stderr at the end of the Hydra's run. The text is very free form. +* `success` - indication if Hydra ran correctly without error (**NOT** if + passwords were detected). This parameter is either the JSON value `true` + or `false` depending on completion. +* `quantityfound` - How many username+password combinations discovered. +* `jsonoutputversion` - Version of the schema, 1.00, 1.01, 1.11, 2.00, + 2.03, etc. Hydra will make second tuple of the version to always be two + digits to make it easier for downstream processors (as opposed to v1.1 vs + v1.10). The minor-level versions are additive, so 1.02 will contain more + fields than version 1.00 and will be backward compatible. Version 2.x will + break something from version 1.x output. + +Version 1.00 example: +``` +{ + "errormessages": [ + "[ERROR] Error Message of Something", + "[ERROR] Another Message", + "These are very free form" + ], + "generator": { + "built": "2017-03-01 14:44:22", + "commandline": "hydra -b jsonv1 -o results.json ... ...", + "jsonoutputversion": "1.00", + "server": "127.0.0.1", + "service": "http-post-form", + "software": "Hydra", + "version": "v8.5" + }, + "quantityfound": 2, + "results": [ + { + "host": "127.0.0.1", + "login": "bill@example.com", + "password": "bill", + "port": 9999, + "service": "http-post-form" + }, + { + "host": "127.0.0.1", + "login": "joe@example.com", + "password": "joe", + "port": 9999, + "service": "http-post-form" + } + ], + "success": false +} +``` + SPEED ----- diff --git a/web/index.html b/web/index.html index 6d02e3a..ce6ba0e 100644 --- a/web/index.html +++ b/web/index.html @@ -16,8 +16,8 @@ A very fast network logon cracker which support many different services. See feature sets and services coverage page - incl. a speed comparison against ncrack and medusa

- Current Version: 8.4 - Last update 2017-01-27 + Current Version: 8.5 + Last update 2017-05-03

@@ -27,32 +27,27 @@ [0x00] News and Changelog - Check out the feature sets and services coverage page - including a speed comparison against ncrack and medusa (yes, we win :-) ) - Development just moved to a public github repository: https://github.com/vanhauser-thc/thc-hydra + + Check out the feature sets and services coverage page - including a speed comparison against ncrack and medusa (yes, we win :-) ) + Development code is available at a public github repository: https://github.com/vanhauser-thc/thc-hydra There is a new section below for online tutorials. Read below for Linux compilation notes. - CHANGELOG for 8.4 + CHANGELOG for 8.5 =================== ! Development moved to a public github repository: https://github.com/vanhauser-thc/thc-hydra ! Reports came in that the rdp module is not working reliable sometimes, most likely against new Windows versions. please test, report and if possible send a fix - * Proxy support re-implemented: - - HYDRA_PROXY[_HTTP] environment can be a text file with up to 64 entries - - HYDRA_PROXY_AUTH was deprecated, set login/password in HTTP_PROXY[_HTTP] - * New protocol: adam6500 - this one is work in progress, please test and report - * New protocol: rpcap - thanks to Petar Kaleychev - * New command line options: - -y : disables -x 1aA interpretation, thanks to crondaemon for the patch - -I : ignore an existing hydra.restore file (dont wait for 10 seconds) - * hydra-svn: works now with the current libsvn version - * hydra-ssh: initial check for password auth support now uses login supplied - * Fixed dpl4hydra to be able to update from the web again - * Fixed crash when -U was used without any service (thanks to thecarterb for reporting) - * Updated default password lists - * The protocols vnc, xmpp, telnet, imap, nntp and pcanywhere got accidentially long sleep commands due a patch in 8.2, fixed - * Added special error message for clueless users :) + * New command line option: + -b : format option for -o output file (json only so far, happy for patches supporting others :) ) - thanks to veggiespam for the patch + * ./configure now honors the CC enviroment variable if present + * Fix for the restore file crash on some x64 platforms (finally! thanks to lukas227!) + * Changed the format of the restore file to detect cross platform copies + * Fixed a bug in the NCP module + * Favor strrchr() over rindex() + * Added refactoring patch by diadlo + * Updated man page with missing command line options You can also take a look at the full CHANGES file From 4575af147696400b380e60f540f6b7632179aa98 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Wed, 3 May 2017 14:20:55 +0200 Subject: [PATCH 015/531] forgot to update web pages --- web/index.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/web/index.html b/web/index.html index ce6ba0e..bd6760f 100644 --- a/web/index.html +++ b/web/index.html @@ -132,7 +132,7 @@ [0x05] The Art of Downloading: Source and Binaries 1. PRODUCTION/RELEASE VERSION: - The source code of state-of-the-art Hydra: hydra-8.4.tar.gz + The source code of state-of-the-art Hydra: hydra-8.5.tar.gz (compiles on all UNIX based platforms - even MacOS X, Cygwin on Windows, ARM-Linux, Android, iPhone, Blackberry 10, etc.) 2. DEVELOPMENT VERSION: From df5ec9ea308f5f1099e81953e764e76d48bd937a Mon Sep 17 00:00:00 2001 From: petrock6 Date: Sat, 20 May 2017 02:58:47 -0500 Subject: [PATCH 016/531] Bugfix for issue 121 -- increased URL/POST/cookie data size to 6096 bytes from 1000 bytes. --- hydra-http-form.c | 25 +++++++++++++------------ hydra-mod.c | 9 +++++++-- hydra.c | 4 ++-- 3 files changed, 22 insertions(+), 16 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 116e463..c07a4aa 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -84,7 +84,7 @@ char cookie[4096] = "", cmiscptr[1024]; extern char *webtarget; extern char *slash; int webport, freemischttpform = 0; -char bufferurl[1024], cookieurl[1024] = "", userheader[1024] = "", *url, *variables, *optional1; +char bufferurl[6096+24], cookieurl[6096+24] = "", userheader[6096+24] = "", *url, *variables, *optional1; #define MAX_REDIRECT 8 #define MAX_CONTENT_LENGTH 20 @@ -678,8 +678,8 @@ int start_http_form(int s, char *ip, int port, unsigned char options, char *misc snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int) strlen(upd3variables)); if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) hdrrepv(&ptr_head, "Content-Length", content_length); - else - add_header(&ptr_head, "Content-Length", content_length, HEADER_TYPE_DEFAULT); + else + add_header(&ptr_head, "Content-Length", content_length, HEADER_TYPE_DEFAULT); if (!header_exists(&ptr_head, "Content-Type", HEADER_TYPE_DEFAULT)) add_header(&ptr_head, "Content-Type", "application/x-www-form-urlencoded", HEADER_TYPE_DEFAULT); cookie_header = stringify_cookies(ptr_cookie); @@ -1056,7 +1056,7 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { else webport = PORT_HTTP_SSL; - sprintf(bufferurl, "%.1000s", miscptr); + sprintf(bufferurl, "%.6096s", miscptr); url = bufferurl; ptr = url; while (*ptr != 0 && (*ptr != ':' || *(ptr - 1) == '\\')) @@ -1162,14 +1162,15 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { case 'H': // add a new header, or replace an existing one's value ptr = optional1 + 2; - while (*ptr != 0 && *ptr != ':') - ptr++; - if (*(ptr - 1) == '\\') - *(ptr - 1) = 0; - if (*ptr != 0){ - *ptr = 0; - ptr += 2; - } + while (*ptr != 0 && *ptr != ':') ptr++; + + if (*(ptr - 1) == '\\') + *(ptr - 1) = 0; + + if (*ptr != 0) { + *ptr = 0; + ptr += 2; + } ptr2 = ptr; while (*ptr2 != 0 && (*ptr2 != ':' || *(ptr2 - 1) == '\\')) ptr2++; diff --git a/hydra-mod.c b/hydra-mod.c index 00dc99a..83a65be 100644 --- a/hydra-mod.c +++ b/hydra-mod.c @@ -1040,8 +1040,13 @@ int make_to_lower(char *buf) { char *hydra_strrep(char *string, char *oldpiece, char *newpiece) { int str_index, newstr_index, oldpiece_index, end, new_len, old_len, cpy_len; - char *c, oldstring[1024], newstring[1024]; - static char finalstring[1024]; + char *c, oldstring[6096], newstring[6096]; //updated due to issue 192 on github. + static char finalstring[6096]; + + if(strlen(string) > 6096) { + hydra_report(stderr, "[ERROR] Supplied URL or POST data too large. Max limit is 6096 characters.\n"); + exit(-1); + } if (string == NULL || oldpiece == NULL || newpiece == NULL || strlen(string) >= sizeof(oldstring) - 1 || (strlen(string) + strlen(newpiece) - strlen(oldpiece) >= sizeof(newstring) - 1 && strlen(string) > strlen(oldpiece))) diff --git a/hydra.c b/hydra.c index e394fbd..520ef59 100644 --- a/hydra.c +++ b/hydra.c @@ -3249,7 +3249,7 @@ int main(int argc, char *argv[]) { if (strcmp(hydra_options.service, "http-get-form") == 0 || strcmp(hydra_options.service, "http-post-form") == 0 || strcmp(hydra_options.service, "https-get-form") == 0 || strcmp(hydra_options.service, "https-post-form") == 0) { - char bufferurl[1024], *url, *variables, *cond, *optional1; + char bufferurl[6096+24], *url, *variables, *cond, *optional1; //6096 comes from issue 192 on github. Extra 24 bytes for null padding. if (strncmp(hydra_options.service, "http-", 5) == 0) { i = 1; @@ -3284,7 +3284,7 @@ int main(int argc, char *argv[]) { if (strstr(hydra_options.miscptr, "\\:") != NULL) { fprintf(stderr, "[INFORMATION] escape sequence \\: detected in module option, no parameter verification is performed.\n"); } else { - sprintf(bufferurl, "%.1000s", hydra_options.miscptr); + sprintf(bufferurl, "%.6096s", hydra_options.miscptr); url = strtok(bufferurl, ":"); variables = strtok(NULL, ":"); cond = strtok(NULL, ":"); From 3ed91cd18ffca504bd30a02a7745b4af9e790f7f Mon Sep 17 00:00:00 2001 From: van Hauser Date: Sat, 20 May 2017 15:44:42 +0200 Subject: [PATCH 017/531] fix --- CHANGES | 2 +- hydra-http-form.c | 2 ++ hydra-mod.c | 4 ++-- hydra.c | 2 +- 4 files changed, 6 insertions(+), 4 deletions(-) diff --git a/CHANGES b/CHANGES index 249e2bb..fb9ebcd 100644 --- a/CHANGES +++ b/CHANGES @@ -2,7 +2,7 @@ Changelog for hydra ------------------- Release 8.6-dev -* ... +* http-form module now supports URLs up to 6000 bytes (thanks to petrock6@github for the patch) Release 8.5 diff --git a/hydra-http-form.c b/hydra-http-form.c index c07a4aa..f322650 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -454,6 +454,8 @@ char *html_encode(char *string) { ret = hydra_strrep(ret, "&", "%26"); if (index(ret, '#') != NULL) ret = hydra_strrep(ret, "#", "%23"); + if (index(ret, '=') != NULL) + ret = hydra_strrep(ret, "=", "%3D"); return ret; } diff --git a/hydra-mod.c b/hydra-mod.c index 83a65be..b675377 100644 --- a/hydra-mod.c +++ b/hydra-mod.c @@ -1043,8 +1043,8 @@ char *hydra_strrep(char *string, char *oldpiece, char *newpiece) { char *c, oldstring[6096], newstring[6096]; //updated due to issue 192 on github. static char finalstring[6096]; - if(strlen(string) > 6096) { - hydra_report(stderr, "[ERROR] Supplied URL or POST data too large. Max limit is 6096 characters.\n"); + if(strlen(string) > 6000) { + hydra_report(stderr, "[ERROR] Supplied URL or POST data too large. Max limit is 6000 characters.\n"); exit(-1); } diff --git a/hydra.c b/hydra.c index 520ef59..f54554b 100644 --- a/hydra.c +++ b/hydra.c @@ -3284,7 +3284,7 @@ int main(int argc, char *argv[]) { if (strstr(hydra_options.miscptr, "\\:") != NULL) { fprintf(stderr, "[INFORMATION] escape sequence \\: detected in module option, no parameter verification is performed.\n"); } else { - sprintf(bufferurl, "%.6096s", hydra_options.miscptr); + sprintf(bufferurl, "%.6000s", hydra_options.miscptr); url = strtok(bufferurl, ":"); variables = strtok(NULL, ":"); cond = strtok(NULL, ":"); From dfef658cf87ee08f5748612a6a3e0ea2c72f8416 Mon Sep 17 00:00:00 2001 From: Diadlo Date: Thu, 1 Jun 2017 00:39:33 +0300 Subject: [PATCH 018/531] Create services vector --- hydra.c | 196 ++++++++++++++++++++++++++------------------------------ 1 file changed, 91 insertions(+), 105 deletions(-) diff --git a/hydra.c b/hydra.c index f54554b..c10f5f5 100644 --- a/hydra.c +++ b/hydra.c @@ -1184,132 +1184,118 @@ char *hydra_build_time() { return (char *) &datetime; } -void hydra_service_init(int target_no) { - int x = 99; +typedef void (*service_t)(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); +typedef int (*service_init_t)(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); +static const struct { + const char* name; + service_init_t init; + service_t exec; +} services[] = { + { "adam6500", service_adam6500_init, service_adam6500 }, #ifdef LIBAFP - if (strcmp(hydra_options.service, "afp") == 0) - x = service_afp_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); + { "afp", service_afp_init, service_afp }, #endif - if (strcmp(hydra_options.service, "asterisk") == 0) - x = service_asterisk_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "cisco-enable") == 0) - x = service_cisco_enable_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "cvs") == 0) - x = service_cvs_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "adam6500") == 0) - x = service_adam6500_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "cisco") == 0) - x = service_cisco_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); + { "asterisk", service_asterisk_init, service_asterisk }, + { "cisco", service_cisco_init, service_cisco }, + { "cisco-enable", service_cisco_enable_init, service_cisco_enable }, + { "cvs", service_cvs_init, service_cvs }, #ifdef LIBFIREBIRD - if (strcmp(hydra_options.service, "firebird") == 0) - x = service_firebird_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); + { "firebird", service_firebird_init, service_firebird }, #endif - if (strcmp(hydra_options.service, "ftp") == 0 || strcmp(hydra_options.service, "ftps") == 0) - x = service_ftp_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "redis") == 0 || strcmp(hydra_options.service, "redis") == 0) - x = service_redis_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "http-get") == 0 || strcmp(hydra_options.service, "http-head") == 0) - x = service_http_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "http-form") == 0 || strcmp(hydra_options.service, "http-get-form") == 0 || strcmp(hydra_options.service, "http-post-form") == 0) - x = service_http_form_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "http-proxy") == 0) - x = service_http_proxy_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "http-proxy-urlenum") == 0) - x = service_http_proxy_urlenum_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "icq") == 0) - x = service_icq_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "imap") == 0) - x = service_imap_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "irc") == 0) - x = service_irc_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strncmp(hydra_options.service, "ldap", 4) == 0) - x = service_ldap_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); -#ifdef LIBOPENSSL - if (strcmp(hydra_options.service, "sip") == 0) - x = service_sip_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "smb") == 0 || strcmp(hydra_options.service, "smbnt") == 0) - x = service_smb_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "oracle-listener") == 0) - x = service_oracle_listener_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "oracle-sid") == 0) - x = service_oracle_sid_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "rdp") == 0) - x = service_rdp_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); -#endif - if (strcmp(hydra_options.service, "mssql") == 0) - x = service_mssql_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); + { "ftp", service_ftp_init, service_ftp }, + { "ftps", service_ftp_init, service_ftps }, + { "http-get", service_http_init, service_http_get }, + { "http-get-form", service_http_form_init, service_http_get_form }, + { "http-head", service_http_init, service_http_head }, + { "http-form", service_http_form_init, NULL }, + { "http-post", NULL, service_http_post }, + { "http-post-form", service_http_form_init, service_http_post_form }, + { "http-proxy", service_http_proxy_init, service_http_proxy }, + { "http-proxy-urlenum", service_http_proxy_urlenum_init, service_http_proxy_urlenum }, + { "icq", service_icq_init, service_icq }, + { "imap", service_imap_init, service_imap }, + { "irc", service_irc_init, service_irc }, + { "ldap2", service_ldap_init, service_ldap2 }, + { "ldap3", service_ldap_init, service_ldap3 }, + { "ldap3-crammd5", service_ldap_init, service_ldap3_cram_md5 }, + { "ldap3-digestmd5", service_ldap_init, service_ldap3_digest_md5 }, + { "mssql", service_mssql_init, service_mssql }, #ifdef HAVE_MATH_H - if (strcmp(hydra_options.service, "mysql") == 0) - x = service_mysql_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); + { "mysql", service_mysql_init, service_mysql }, #endif #ifdef LIBNCP - if (strcmp(hydra_options.service, "ncp") == 0) - x = service_ncp_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); + { "ncp", service_ncp_init, service_ncp }, #endif - if (strcmp(hydra_options.service, "nntp") == 0) - x = service_nntp_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); + { "nntp", service_nntp_init, service_nntp }, #ifdef LIBORACLE - if (strcmp(hydra_options.service, "oracle") == 0) - x = service_oracle_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); + { "oracle", service_oracle_init, service_oracle }, #endif - if (strcmp(hydra_options.service, "pcanywhere") == 0) - x = service_pcanywhere_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "pcnfs") == 0) - x = service_pcnfs_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "pop3") == 0) - x = service_pop3_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); +#ifdef LIBOPENSSL + { "oracle-listener", service_oracle_listener_init, service_oracle_listener }, + { "oracle-sid", service_oracle_sid_init, service_oracle_sid }, +#endif + { "pcanywhere", service_pcanywhere_init, service_pcanywhere }, + { "pcnfs", service_pcnfs_init, service_pcnfs }, + { "pop3", service_pop3_init, service_pop3 }, #ifdef LIBPOSTGRES - if (strcmp(hydra_options.service, "postgres") == 0) - x = service_postgres_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); + { "postgres", service_postgres_init, service_postgres }, #endif - if (strcmp(hydra_options.service, "rexec") == 0) - x = service_rexec_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "rlogin") == 0) - x = service_rlogin_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "rsh") == 0) - x = service_rsh_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); + { "redis", service_redis_init, service_redis }, + { "rexec", service_rexec_init, service_rexec }, +#ifdef LIBOPENSSL + { "rdp", service_rdp_init, service_rdp }, +#endif + { "rlogin", service_rlogin_init, service_rlogin }, + { "rsh", service_rsh_init, service_rsh }, + { "rtsp", service_rtsp_init, service_rtsp }, + { "rpcap", service_rpcap_init, service_rpcap }, + { "s7-300", service_s7_300_init, service_s7_300 }, #ifdef LIBSAPR3 - if (strcmp(hydra_options.service, "sapr3") == 0) - x = service_sapr3_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); + { "sapr3", service_sapr3_init, service_sapr3 }, #endif - if (strcmp(hydra_options.service, "smtp") == 0) - x = service_smtp_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "smtp-enum") == 0) - x = service_smtp_enum_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "snmp") == 0) - x = service_snmp_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "socks5") == 0) - x = service_socks5_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); +#ifdef LIBOPENSSL + { "sip", service_sip_init, service_sip }, + { "smbnt", service_smb_init, service_smb }, + { "smb", service_smb_init, service_smb }, +#endif + { "smtp", service_smtp_init, service_smtp }, + { "smtp-enum", service_smtp_enum_init, service_smtp_enum }, + { "snmp", service_snmp_init, service_snmp }, + { "socks5", service_socks5_init, service_socks5 }, #ifdef LIBSSH - // dirty workaround here: - if (strcmp(hydra_options.service, "ssh") == 0) - x = service_ssh_init(hydra_targets[target_no]->ip, -1, options, login_ptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "sshkey") == 0) - x = service_sshkey_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); + { "ssh", NULL, service_ssh }, + { "sshkey", service_sshkey_init, service_sshkey }, #endif #ifdef LIBSVN - if (strcmp(hydra_options.service, "svn") == 0) - x = service_svn_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); + { "svn", service_svn_init, service_svn }, #endif - if (strcmp(hydra_options.service, "teamspeak") == 0) - x = service_teamspeak_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "telnet") == 0) - x = service_telnet_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "vmauthd") == 0) - x = service_vmauthd_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "vnc") == 0) - x = service_vnc_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "xmpp") == 0) - x = service_xmpp_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "s7-300") == 0) - x = service_s7_300_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "rtsp") == 0) - x = service_rtsp_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); - if (strcmp(hydra_options.service, "rpcap") == 0) - x = service_rpcap_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); + { "teamspeak", service_teamspeak_init, service_teamspeak }, + { "telnet", service_telnet_init, service_telnet }, + { "vmauthd", service_vmauthd_init, service_vmauthd }, + { "vnc", service_vnc_init, service_vnc }, + { "xmpp", service_xmpp_init, NULL } +}; + +void hydra_service_init(int target_no) { + int x = 99; + int i = 0; + + for (i = 0; i < sizeof(services) / sizeof(services[0]); i++) { + if (strcmp(hydra_options.service, services[i].name) == 0) { + if (services[i].init) { + x = services[i].init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); + break; + } + } + } // ADD NEW SERVICES HERE + // dirty workaround here: +#ifdef LIBSSH + if (strcmp(hydra_options.service, "ssh") == 0) + x = service_ssh_init(hydra_targets[target_no]->ip, -1, options, login_ptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); +#endif if (x != 0 && x != 99) { if (x > 0 && x < 4) From 5dc883fb4beda7cac87ac341edff2ef354fd94db Mon Sep 17 00:00:00 2001 From: Diadlo Date: Thu, 1 Jun 2017 00:25:41 +0300 Subject: [PATCH 019/531] Refactor service_init --- hydra.c | 25 +++++++++++++++---------- 1 file changed, 15 insertions(+), 10 deletions(-) diff --git a/hydra.c b/hydra.c index c10f5f5..e4561c8 100644 --- a/hydra.c +++ b/hydra.c @@ -1280,11 +1280,14 @@ static const struct { void hydra_service_init(int target_no) { int x = 99; int i = 0; + hydra_target* t = hydra_targets[target_no]; + char* miscptr = hydra_options.miscptr; + FILE* ofp = hydra_brains.ofp; for (i = 0; i < sizeof(services) / sizeof(services[0]); i++) { if (strcmp(hydra_options.service, services[i].name) == 0) { if (services[i].init) { - x = services[i].init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); + x = services[i].init(t->ip, -1, options, miscptr, ofp, t->port, t->target); break; } } @@ -1294,18 +1297,20 @@ void hydra_service_init(int target_no) { // dirty workaround here: #ifdef LIBSSH if (strcmp(hydra_options.service, "ssh") == 0) - x = service_ssh_init(hydra_targets[target_no]->ip, -1, options, login_ptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); + x = service_ssh_init(t->ip, -1, options, login_ptr, ofp, t->port, t->target); #endif - if (x != 0 && x != 99) { - if (x > 0 && x < 4) - hydra_targets[target_no]->done = x; - else - hydra_targets[target_no]->done = 2; - hydra_brains.finished++; - if (hydra_brains.targets == 1) - exit(-1); + if (x == 0 || x == 99) { + return; } + + if (x > 0 && x < 4) + hydra_targets[target_no]->done = x; + else + hydra_targets[target_no]->done = 2; + hydra_brains.finished++; + if (hydra_brains.targets == 1) + exit(-1); } From 8b6607aec0c36c8c4dbe7884553980c617109bb2 Mon Sep 17 00:00:00 2001 From: Diadlo Date: Thu, 1 Jun 2017 00:36:53 +0300 Subject: [PATCH 020/531] Add using SERVICE macro --- hydra.c | 95 +++++++++++++++++++++++++++++---------------------------- 1 file changed, 49 insertions(+), 46 deletions(-) diff --git a/hydra.c b/hydra.c index e4561c8..314cefa 100644 --- a/hydra.c +++ b/hydra.c @@ -1187,23 +1187,26 @@ char *hydra_build_time() { typedef void (*service_t)(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); typedef int (*service_init_t)(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); +#define SERVICE2(name, func) { name, service_##func##_init, service_##func } +#define SERVICE(name) { #name, service_##name##_init, service_##name } + static const struct { const char* name; service_init_t init; service_t exec; } services[] = { - { "adam6500", service_adam6500_init, service_adam6500 }, + SERVICE(adam6500), #ifdef LIBAFP - { "afp", service_afp_init, service_afp }, + SERVICE(afp), #endif - { "asterisk", service_asterisk_init, service_asterisk }, - { "cisco", service_cisco_init, service_cisco }, - { "cisco-enable", service_cisco_enable_init, service_cisco_enable }, - { "cvs", service_cvs_init, service_cvs }, + SERVICE(asterisk), + SERVICE(cisco), + SERVICE2("cisco-enable", cisco_enable), + SERVICE(cvs), #ifdef LIBFIREBIRD - { "firebird", service_firebird_init, service_firebird }, + SERVICE(firebird), #endif - { "ftp", service_ftp_init, service_ftp }, + SERVICE(ftp), { "ftps", service_ftp_init, service_ftps }, { "http-get", service_http_init, service_http_get }, { "http-get-form", service_http_form_init, service_http_get_form }, @@ -1211,69 +1214,69 @@ static const struct { { "http-form", service_http_form_init, NULL }, { "http-post", NULL, service_http_post }, { "http-post-form", service_http_form_init, service_http_post_form }, - { "http-proxy", service_http_proxy_init, service_http_proxy }, - { "http-proxy-urlenum", service_http_proxy_urlenum_init, service_http_proxy_urlenum }, - { "icq", service_icq_init, service_icq }, - { "imap", service_imap_init, service_imap }, - { "irc", service_irc_init, service_irc }, + SERVICE2("http-proxy", http_proxy), + SERVICE2("http-proxy-urlenum", http_proxy_urlenum), + SERVICE(icq), + SERVICE(imap), + SERVICE(irc), { "ldap2", service_ldap_init, service_ldap2 }, { "ldap3", service_ldap_init, service_ldap3 }, { "ldap3-crammd5", service_ldap_init, service_ldap3_cram_md5 }, { "ldap3-digestmd5", service_ldap_init, service_ldap3_digest_md5 }, - { "mssql", service_mssql_init, service_mssql }, + SERVICE(mssql), #ifdef HAVE_MATH_H - { "mysql", service_mysql_init, service_mysql }, + SERVICE(mysql), #endif #ifdef LIBNCP - { "ncp", service_ncp_init, service_ncp }, + SERVICE(ncp), #endif - { "nntp", service_nntp_init, service_nntp }, + SERVICE(nntp), #ifdef LIBORACLE - { "oracle", service_oracle_init, service_oracle }, + SERVICE(oracle), #endif #ifdef LIBOPENSSL - { "oracle-listener", service_oracle_listener_init, service_oracle_listener }, - { "oracle-sid", service_oracle_sid_init, service_oracle_sid }, + SERVICE2("oracle-listener", oracle_listener), + SERVICE2("oracle-sid", oracle_sid), #endif - { "pcanywhere", service_pcanywhere_init, service_pcanywhere }, - { "pcnfs", service_pcnfs_init, service_pcnfs }, - { "pop3", service_pop3_init, service_pop3 }, + SERVICE(pcanywhere), + SERVICE(pcnfs), + SERVICE(pop3), #ifdef LIBPOSTGRES - { "postgres", service_postgres_init, service_postgres }, + SERVICE(postgres), #endif - { "redis", service_redis_init, service_redis }, - { "rexec", service_rexec_init, service_rexec }, + SERVICE(redis), + SERVICE(rexec), #ifdef LIBOPENSSL - { "rdp", service_rdp_init, service_rdp }, + SERVICE(rdp), #endif - { "rlogin", service_rlogin_init, service_rlogin }, - { "rsh", service_rsh_init, service_rsh }, - { "rtsp", service_rtsp_init, service_rtsp }, - { "rpcap", service_rpcap_init, service_rpcap }, - { "s7-300", service_s7_300_init, service_s7_300 }, + SERVICE(rlogin), + SERVICE(rsh), + SERVICE(rtsp), + SERVICE(rpcap), + SERVICE2("s7-300", s7_300), #ifdef LIBSAPR3 - { "sapr3", service_sapr3_init, service_sapr3 }, + SERVICE(sapr3), #endif #ifdef LIBOPENSSL - { "sip", service_sip_init, service_sip }, - { "smbnt", service_smb_init, service_smb }, - { "smb", service_smb_init, service_smb }, + SERVICE(sip), + SERVICE2("smbnt", smb), + SERVICE(smb), #endif - { "smtp", service_smtp_init, service_smtp }, - { "smtp-enum", service_smtp_enum_init, service_smtp_enum }, - { "snmp", service_snmp_init, service_snmp }, - { "socks5", service_socks5_init, service_socks5 }, + SERVICE(smtp), + SERVICE2("smtp-enum", smtp_enum), + SERVICE(snmp), + SERVICE(socks5), #ifdef LIBSSH { "ssh", NULL, service_ssh }, - { "sshkey", service_sshkey_init, service_sshkey }, + SERVICE(sshkey), #endif #ifdef LIBSVN - { "svn", service_svn_init, service_svn }, + SERVICE(svn), #endif - { "teamspeak", service_teamspeak_init, service_teamspeak }, - { "telnet", service_telnet_init, service_telnet }, - { "vmauthd", service_vmauthd_init, service_vmauthd }, - { "vnc", service_vnc_init, service_vnc }, + SERVICE(teamspeak), + SERVICE(telnet), + SERVICE(vmauthd), + SERVICE(vnc), { "xmpp", service_xmpp_init, NULL } }; From 6edd64e6b68ccbf453c3bb54b79abc6dca922c54 Mon Sep 17 00:00:00 2001 From: Diadlo Date: Thu, 1 Jun 2017 00:45:41 +0300 Subject: [PATCH 021/531] Refactor spawn_head --- hydra.c | 161 ++++++-------------------------------------------------- 1 file changed, 17 insertions(+), 144 deletions(-) diff --git a/hydra.c b/hydra.c index 314cefa..09ee76b 100644 --- a/hydra.c +++ b/hydra.c @@ -1364,152 +1364,25 @@ int hydra_spawn_head(int head_no, int target_no) { if (debug) printf("[DEBUG] head_no %d has pid %d\n", head_no, getpid()); - // now call crack module - if (strcmp(hydra_options.service, "asterisk") == 0) - service_asterisk(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "telnet") == 0) - service_telnet(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "ftp") == 0) { - - service_ftp(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - + hydra_target* t = hydra_targets[target_no]; + int sp = hydra_heads[head_no]->sp[1]; + char* miscptr = hydra_options.miscptr; + FILE* ofp = hydra_brains.ofp; + hydra_target* head_target = hydra_targets[hydra_heads[head_no]->target_no]; + for (i = 0; i < sizeof(services) / sizeof(services[0]); i++) { + if (strcmp(hydra_options.service, services[i].name) == 0) { + if (services[i].exec) { + services[i].exec(t->ip, sp, options, miscptr, ofp, t->port, head_target->target); + // just in case a module returns (which it shouldnt) we let it exit here + exit(-1); + } + } } - if (strcmp(hydra_options.service, "ftps") == 0) - service_ftps(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "redis") == 0) - service_redis(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "pop3") == 0) - service_pop3(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "imap") == 0) - service_imap(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "vmauthd") == 0) - service_vmauthd(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "ldap2") == 0) - service_ldap2(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "ldap3") == 0) - service_ldap3(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "http-head") == 0) - service_http_head(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "ldap3-crammd5") == 0) - service_ldap3_cram_md5(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "ldap3-digestmd5") == 0) - service_ldap3_digest_md5(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "http-post") == 0) - service_http_post(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "http-get") == 0) - service_http_get(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "http-get-form") == 0) - service_http_get_form(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "http-post-form") == 0) - service_http_post_form(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "http-proxy") == 0) - service_http_proxy(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "http-proxy-urlenum") == 0) - service_http_proxy_urlenum(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "adam6500") == 0) - service_adam6500(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "cisco") == 0) - service_cisco(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "cisco-enable") == 0) - service_cisco_enable(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "socks5") == 0) - service_socks5(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "vnc") == 0) - service_vnc(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "rexec") == 0) - service_rexec(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "rlogin") == 0) - service_rlogin(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "rsh") == 0) - service_rsh(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "nntp") == 0) - service_nntp(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "icq") == 0) - service_icq(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "pcnfs") == 0) - service_pcnfs(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); -#ifdef HAVE_MATH_H - if (strcmp(hydra_options.service, "mysql") == 0) - service_mysql(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); -#endif - if (strcmp(hydra_options.service, "mssql") == 0) - service_mssql(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); -#ifdef LIBOPENSSL - if (strcmp(hydra_options.service, "oracle-listener") == 0) - service_oracle_listener(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "oracle-sid") == 0) - service_oracle_sid(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); -#endif -#ifdef LIBORACLE - if (strcmp(hydra_options.service, "oracle") == 0) - service_oracle(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); -#endif -#ifdef LIBPOSTGRES - if (strcmp(hydra_options.service, "postgres") == 0) - service_postgres(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); -#endif -#ifdef LIBFIREBIRD - if (strcmp(hydra_options.service, "firebird") == 0) - service_firebird(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); -#endif -#ifdef LIBAFP - if (strcmp(hydra_options.service, "afp") == 0) - service_afp(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); -#endif -#ifdef LIBNCP - if (strcmp(hydra_options.service, "ncp") == 0) - service_ncp(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); -#endif - if (strcmp(hydra_options.service, "pcanywhere") == 0) - service_pcanywhere(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "cvs") == 0) - service_cvs(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); -#ifdef LIBSVN - if (strcmp(hydra_options.service, "svn") == 0) - service_svn(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); -#endif - if (strcmp(hydra_options.service, "snmp") == 0) - service_snmp(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); -#ifdef LIBOPENSSL - if ((strcmp(hydra_options.service, "smb") == 0) || (strcmp(hydra_options.service, "smbnt") == 0)) - service_smb(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); -#endif -#ifdef LIBSAPR3 - if (strcmp(hydra_options.service, "sapr3") == 0) - service_sapr3(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); -#endif -#ifdef LIBSSH - if (strcmp(hydra_options.service, "ssh") == 0) - service_ssh(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "sshkey") == 0) - service_sshkey(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); -#endif - if (strcmp(hydra_options.service, "smtp") == 0) - service_smtp(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "smtp-enum") == 0) - service_smtp_enum(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "teamspeak") == 0) - service_teamspeak(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); -#ifdef LIBOPENSSL - if (strcmp(hydra_options.service, "sip") == 0) - service_sip(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); -#endif - if (strcmp(hydra_options.service, "xmpp") == 0) - service_xmpp(hydra_targets[target_no]->target, hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "irc") == 0) - service_irc(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); -#ifdef LIBOPENSSL - if (strcmp(hydra_options.service, "rdp") == 0) - service_rdp(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); -#endif - if (strcmp(hydra_options.service, "s7-300") == 0) - service_s7_300(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "rtsp") == 0) - service_rtsp(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - if (strcmp(hydra_options.service, "rpcap") == 0) - service_rpcap(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); - // ADD NEW SERVICES HERE + // FIXME: dirty workaround here + if (strcmp(hydra_options.service, "xmpp") == 0) { + service_xmpp(hydra_targets[target_no]->target, hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); + } // just in case a module returns (which it shouldnt) we let it exit here exit(-1); From 0d6efda1d2e48bac7df2aac9b0668528ad7e3d4f Mon Sep 17 00:00:00 2001 From: Diadlo Date: Thu, 1 Jun 2017 23:56:06 +0300 Subject: [PATCH 022/531] Add swap function --- hydra.c | 24 ++++++++++++------------ 1 file changed, 12 insertions(+), 12 deletions(-) diff --git a/hydra.c b/hydra.c index f54554b..51e5b95 100644 --- a/hydra.c +++ b/hydra.c @@ -1771,6 +1771,14 @@ void hydra_increase_fail_count(int target_no, int head_no) { } } +void swap_chars(char* a, char* b) +{ + unsigned char keep; + keep = *a; + *a = *b; + *b = keep; +} + char *hydra_reverse_login(int head_no, char *login) { int i, j; char *start, *pos; @@ -1793,25 +1801,17 @@ char *hydra_reverse_login(int head_no, char *login) { while(start < --pos) { switch( (*pos & 0xF0) >> 4 ) { case 0xF: /* U+010000-U+10FFFF: four bytes. */ - keep = *pos; - *pos = *(pos-3); - *(pos-3) = keep; - keep = *(pos-1); - *(pos-1) = *(pos-2); - *(pos-2) = keep; + swap(pos, pos - 3); + swap(pos - 1, pos - 2); pos -= 3; break; case 0xE: /* U+000800-U+00FFFF: three bytes. */ - keep = *pos; - *pos = *(pos-2); - *(pos-2) = keep; + swap(pos, pos - 2); pos -= 2; break; case 0xC: /* fall-through */ case 0xD: /* U+000080-U+0007FF: two bytes. */ - keep = *pos; - *pos = *(pos-1); - *(pos-1) = keep; + swap(pos, pos - 1); pos--; break; } From 07d55e94afa8c4c54a002f04de07c0b8f5af70c6 Mon Sep 17 00:00:00 2001 From: Diadlo Date: Fri, 2 Jun 2017 00:13:46 +0300 Subject: [PATCH 023/531] Add target_state_t enum --- hydra.c | 63 ++++++++++++++++++++++++++++++++------------------------- 1 file changed, 35 insertions(+), 28 deletions(-) diff --git a/hydra.c b/hydra.c index f54554b..6fbca31 100644 --- a/hydra.c +++ b/hydra.c @@ -200,6 +200,13 @@ typedef struct { time_t last_seen; } hydra_head; +typedef enum { + STATE_ACTIVE = 0, + STATE_FINISHED = 1, + STATE_ERROR = 2, + STATE_UNRESOLVED = 3 +} target_state_t; + typedef struct { char *target; char ip[36]; @@ -210,7 +217,7 @@ typedef struct { unsigned long int sent; int pass_state; int use_count; - int done; // 0 if active, 1 if finished scanning, 2 if error (for RESTOREFILE), 3 could not be resolved + target_state_t done; int fail_count; int redo_state; int redo; @@ -734,7 +741,7 @@ void hydra_restore_write(int print_msg) { return; for (i = 0; i < hydra_brains.targets; i++) - if (hydra_targets[j]->done != 1 && hydra_targets[j]->done != 3) + if (hydra_targets[j]->done != STATE_FINISHED && hydra_targets[j]->done != STATE_UNRESOLVED) j++; if (j == 0) { process_restore = 0; @@ -776,7 +783,7 @@ void hydra_restore_write(int print_msg) { if (hydra_options.colonfile == NULL || hydra_options.colonfile == empty_login) fck = fwrite(pass_ptr, hydra_brains.sizepass, 1, f); for (j = 0; j < hydra_brains.targets; j++) - if (hydra_targets[j]->done != 1) { + if (hydra_targets[j]->done != STATE_FINISHED) { fck = fwrite(hydra_targets[j], sizeof(hydra_target), 1, f); fprintf(f, "%s\n%d\n%d\n", hydra_targets[j]->target == NULL ? "" : hydra_targets[j]->target, (int) (hydra_targets[j]->login_ptr - login_ptr), (int) (hydra_targets[j]->pass_ptr - pass_ptr)); @@ -1315,7 +1322,7 @@ void hydra_service_init(int target_no) { if (x > 0 && x < 4) hydra_targets[target_no]->done = x; else - hydra_targets[target_no]->done = 2; + hydra_targets[target_no]->done = STATE_ERROR; hydra_brains.finished++; if (hydra_brains.targets == 1) exit(-1); @@ -1705,7 +1712,7 @@ void hydra_increase_fail_count(int target_no, int head_no) { k++; if (k <= 1) { // we need to put this in a list, otherwise we fail one login+pw test - if (hydra_targets[target_no]->done == 0 + if (hydra_targets[target_no]->done == STATE_ACTIVE && hydra_targets[target_no]->redo <= hydra_options.max_use * 2 && ((hydra_heads[head_no]->current_login_ptr != empty_login && hydra_heads[head_no]->current_pass_ptr != empty_login) || (hydra_heads[head_no]->current_login_ptr != NULL && hydra_heads[head_no]->current_pass_ptr != NULL))) { @@ -1720,11 +1727,11 @@ void hydra_increase_fail_count(int target_no, int head_no) { hydra_heads[head_no]->current_pass_ptr = empty_login; } if (hydra_targets[target_no]->fail_count >= MAXFAIL + hydra_options.tasks * hydra_targets[target_no]->ok) { - if (hydra_targets[target_no]->done == 0 && hydra_options.max_use == hydra_targets[target_no]->failed) { + if (hydra_targets[target_no]->done == STATE_ACTIVE && hydra_options.max_use == hydra_targets[target_no]->failed) { if (hydra_targets[target_no]->ok == 1) - hydra_targets[target_no]->done = 2; // mark target as done by errors + hydra_targets[target_no]->done = STATE_ERROR; // mark target as done by errors else - hydra_targets[target_no]->done = 3; // mark target as done by unable to connect + hydra_targets[target_no]->done = STATE_UNRESOLVED; // mark target as done by unable to connect hydra_brains.finished++; fprintf(stderr, "[ERROR] Too many connect errors to target, disabling %s://%s%s%s:%d\n", hydra_options.service, hydra_targets[target_no]->ip[0] == 16 && index(hydra_targets[target_no]->target, ':') != NULL ? "[" : "", hydra_targets[target_no]->target, hydra_targets[target_no]->ip[0] == 16 @@ -1737,7 +1744,7 @@ void hydra_increase_fail_count(int target_no, int head_no) { } // we keep the last one alive as long as it make sense } else { // we need to put this in a list, otherwise we fail one login+pw test - if (hydra_targets[target_no]->done == 0 + if (hydra_targets[target_no]->done == STATE_ACTIVE && hydra_targets[target_no]->redo <= hydra_options.max_use * 2 && ((hydra_heads[head_no]->current_login_ptr != empty_login && hydra_heads[head_no]->current_pass_ptr != empty_login) || (hydra_heads[head_no]->current_login_ptr != NULL && hydra_heads[head_no]->current_pass_ptr != NULL))) { @@ -1832,8 +1839,8 @@ int hydra_send_next_pair(int target_no, int head_no) { snpdone = 1; } else { if (hydra_targets[target_no]->sent >= hydra_brains.todo + hydra_targets[target_no]->redo) { - if (hydra_targets[target_no]->done == 0) { - hydra_targets[target_no]->done = 1; + if (hydra_targets[target_no]->done == STATE_ACTIVE) { + hydra_targets[target_no]->done = STATE_FINISHED; hydra_brains.finished++; if (verbose) printf("[STATUS] attack finished for %s (waiting for children to complete tests)\n", hydra_targets[target_no]->target); @@ -1873,8 +1880,8 @@ int hydra_send_next_pair(int target_no, int head_no) { snpdone = 1; } else { // if a pair does not complete after this point it is lost - if (hydra_targets[target_no]->done == 0) { - hydra_targets[target_no]->done = 1; + if (hydra_targets[target_no]->done == STATE_ACTIVE) { + hydra_targets[target_no]->done = STATE_FINISHED; hydra_brains.finished++; if (verbose) printf("[STATUS] attack finished for %s (waiting for children to complete tests)\n", hydra_targets[target_no]->target); @@ -1883,7 +1890,7 @@ int hydra_send_next_pair(int target_no, int head_no) { return -1; } } else { // normale state, no redo - if (hydra_targets[target_no]->done) { + if (hydra_targets[target_no]->done != STATE_ACTIVE) { loop_cnt = 0; return -1; // head will be disabled by main while() } @@ -2099,8 +2106,8 @@ int hydra_send_next_pair(int target_no, int head_no) { if (!snpdone || hydra_targets[target_no]->skipcnt >= hydra_brains.countlogin) { fck = write(hydra_heads[head_no]->sp[0], HYDRA_EXIT, sizeof(HYDRA_EXIT)); if (hydra_targets[target_no]->use_count <= 1) { - if (hydra_targets[target_no]->done == 0) { - hydra_targets[target_no]->done = 1; + if (hydra_targets[target_no]->done == STATE_ACTIVE) { + hydra_targets[target_no]->done = STATE_FINISHED; hydra_brains.finished++; if (verbose) printf("[STATUS] attack finished for %s (waiting for children to complete tests)\n", hydra_targets[target_no]->target); @@ -2250,7 +2257,7 @@ int hydra_select_target() { int target_no = -1, i, j = -1000; for (i = 0; i < hydra_brains.targets; i++) - if (hydra_targets[i]->use_count < hydra_options.tasks && hydra_targets[i]->done == 0) + if (hydra_targets[i]->use_count < hydra_options.tasks && hydra_targets[i]->done == STATE_ACTIVE) if (j < hydra_options.tasks - hydra_targets[i]->failed - hydra_targets[i]->use_count) { target_no = i; j = hydra_options.tasks - hydra_targets[i]->failed - hydra_targets[i]->use_count; @@ -3840,7 +3847,7 @@ int main(int argc, char *argv[]) { printf("[failed for %s] ", hydra_targets[i]->target); else fprintf(stderr, "[ERROR] could not resolve address: %s\n", hydra_targets[i]->target); - hydra_targets[i]->done = 3; + hydra_targets[i]->done = STATE_UNRESOLVED; hydra_brains.finished++; } } else { @@ -3862,7 +3869,7 @@ int main(int argc, char *argv[]) { if ((strcmp(hydra_options.service, "socks5") == 0) || (strcmp(hydra_options.service, "sip") == 0)) { fprintf(stderr, "[ERROR] Target %s resolves to an IPv6 address, however module %s does not support this. Maybe try \"-4\" option. Sending in patches helps.\n", hydra_targets[i]->target, hydra_options.service); - hydra_targets[i]->done = 3; + hydra_targets[i]->done = STATE_UNRESOLVED; hydra_brains.finished++; } else { hydra_targets[i]->ip[0] = 16; @@ -3887,7 +3894,7 @@ int main(int argc, char *argv[]) { printf("[failed for %s] ", hydra_targets[i]->target); else fprintf(stderr, "[ERROR] Could not resolve proxy address: %s\n", hydra_targets[i]->target); - hydra_targets[i]->done = 3; + hydra_targets[i]->done = STATE_UNRESOLVED; hydra_brains.finished++; } freeaddrinfo(res); @@ -4064,15 +4071,15 @@ int main(int argc, char *argv[]) { fflush(hydra_brains.ofp); } if (hydra_options.exit_found) { // option set says quit target after on valid login/pass pair is found - if (hydra_targets[hydra_heads[head_no]->target_no]->done == 0) { - hydra_targets[hydra_heads[head_no]->target_no]->done = 1; // mark target as done + if (hydra_targets[hydra_heads[head_no]->target_no]->done == STATE_ACTIVE) { + hydra_targets[hydra_heads[head_no]->target_no]->done = STATE_FINISHED; // mark target as done hydra_brains.finished++; printf("[STATUS] attack finished for %s (valid pair found)\n", hydra_targets[hydra_heads[head_no]->target_no]->target); } if (hydra_options.exit_found == 2) { for (j = 0; j < hydra_brains.targets; j++) - if (hydra_targets[j]->done == 0) { - hydra_targets[j]->done = 1; + if (hydra_targets[j]->done == STATE_ACTIVE) { + hydra_targets[j]->done = STATE_FINISHED; hydra_brains.finished++; } } @@ -4210,18 +4217,18 @@ int main(int argc, char *argv[]) { j = k = error = 0; for (i = 0; i < hydra_brains.targets; i++) switch (hydra_targets[i]->done) { - case 3: + case STATE_UNRESOLVED: k++; break; - case 2: + case STATE_ERROR: if (hydra_targets[i]->ok == 0) k++; else error++; break; - case 1: + case STATE_FINISHED: break; - case 0: + case STATE_ACTIVE: if (hydra_targets[i]->ok == 0) k++; else From cdb9123e2869fed896a5fdfad99da604f764bf0b Mon Sep 17 00:00:00 2001 From: Diadlo Date: Fri, 2 Jun 2017 09:50:42 +0300 Subject: [PATCH 024/531] Add hydra_mode_t enum --- hydra.c | 46 ++++++++++++++++++++++++++++++---------------- 1 file changed, 30 insertions(+), 16 deletions(-) diff --git a/hydra.c b/hydra.c index 6fbca31..bb84f2d 100644 --- a/hydra.c +++ b/hydra.c @@ -247,8 +247,18 @@ typedef struct { FILE *ofp; } hydra_brain; +typedef enum { + MODE_PASSWORD_LIST = 1, + MODE_LOGIN_LIST = 2, + MODE_PASSWORD_BRUTE = 4, + MODE_PASSWORD_REVERSE = 8, + MODE_PASSWORD_NULL = 16, + MODE_PASSWORD_SAME = 32, + MODE_COLON_FILE = 64 +} hydra_mode_t; + typedef struct { - int mode; // valid modes: 0 = -l -p, 1 = -l -P, 2 = -L -p, 3 = -L -P, 4 = -l -x, 6 = -L -x, +8 if -e r, +16 if -e n, +32 if -e s, 64 = -C | bit 128 undefined + hydra_mode_t mode; int loop_mode; // valid modes: 0 = password, 1 = user int ssl; int restore; @@ -330,6 +340,10 @@ int snpdone, snp_is_redo, snpbuflen, snpi, snpj, snpdont; #include "performance.h" +int inline check_flag(int value, int flag) { + return (value & flag) == flag; +} + void help(int ext) { printf("Syntax: hydra [[[-l LOGIN|-L FILE] [-p PASS|-P FILE]] | [-C FILE]] [-e nsr]" " [-o FILE] [-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-W TIME] [-f] [-s PORT]" #ifdef HAVE_MATH_H @@ -934,7 +948,7 @@ void hydra_restore_read() { fck = (int) fread(login_ptr, hydra_brains.sizelogin, 1, f); if (debug) printf("[DEBUG] reading restore file: Step 9 complete\n"); - if ((hydra_options.mode & 64) != 64) { // NOT colonfile mode + if (!check_flag(hydra_options.mode, MODE_COLON_FILE)) { // NOT colonfile mode pass_ptr = malloc(hydra_brains.sizepass); fck = (int) fread(pass_ptr, hydra_brains.sizepass, 1, f); } else { // colonfile mode @@ -1939,7 +1953,7 @@ int hydra_send_next_pair(int target_no, int head_no) { } // now we handle the -C -l/-L -p/-P data if (hydra_targets[target_no]->pass_state == 3 && snpdone == 0) { - if ((hydra_options.mode & 64) == 64) { // colon mode + if (check_flag(hydra_options.mode, MODE_COLON_FILE)) { // colon mode hydra_heads[head_no]->current_login_ptr = hydra_targets[target_no]->login_ptr; hydra_heads[head_no]->current_pass_ptr = hydra_targets[target_no]->pass_ptr; hydra_targets[target_no]->login_no++; @@ -2008,17 +2022,17 @@ int hydra_send_next_pair(int target_no, int head_no) { if (hydra_targets[target_no]->pass_no < hydra_brains.countpass) { hydra_heads[head_no]->current_login_ptr = hydra_targets[target_no]->login_ptr; if (hydra_targets[target_no]->pass_state == 0) { - if ((hydra_options.mode & 4) == 4) + if (check_flag(hydra_options.mode, MODE_PASSWORD_BRUTE)) hydra_heads[head_no]->current_pass_ptr = strdup(hydra_heads[head_no]->current_login_ptr); else hydra_heads[head_no]->current_pass_ptr = hydra_heads[head_no]->current_login_ptr; } else if (hydra_targets[target_no]->pass_state == 1) { - if ((hydra_options.mode & 4) == 4) + if (check_flag(hydra_options.mode, MODE_PASSWORD_BRUTE)) hydra_heads[head_no]->current_pass_ptr = strdup(empty_login); else hydra_heads[head_no]->current_pass_ptr = empty_login; } else if (hydra_targets[target_no]->pass_state == 2) { - if ((hydra_options.mode & 4) == 4) + if (check_flag(hydra_options.mode, MODE_PASSWORD_BRUTE)) hydra_heads[head_no]->current_pass_ptr = strdup(hydra_reverse_login(head_no, hydra_heads[head_no]->current_login_ptr)); else hydra_heads[head_no]->current_pass_ptr = hydra_reverse_login(head_no, hydra_heads[head_no]->current_login_ptr); @@ -2048,7 +2062,7 @@ int hydra_send_next_pair(int target_no, int head_no) { if (snpdont) { hydra_targets[target_no]->pass_ptr = pass_ptr; } else { - if ((hydra_options.mode & 4) == 4) { // bfg mode + if (check_flag(hydra_options.mode, MODE_PASSWORD_BRUTE)) { #ifndef HAVE_MATH_H sleep(1); #else @@ -2129,7 +2143,7 @@ int hydra_send_next_pair(int target_no, int head_no) { if (debug) printf("[DEBUG] double found for %s == %s, skipping\n", hydra_heads[head_no]->current_login_ptr, hydra_targets[target_no]->skiplogin[snpi - 1]); // only if -l/L -p/P with -u and if loginptr was not justed increased - if ((hydra_options.mode & 64) != 64 && hydra_options.loop_mode == 0 && hydra_targets[target_no]->pass_no > 0) { // -l -P (not! -u) + if (!check_flag(hydra_options.mode, MODE_COLON_FILE) && hydra_options.loop_mode == 0 && hydra_targets[target_no]->pass_no > 0) { // -l -P (not! -u) // increase login_ptr to next hydra_targets[target_no]->login_no++; if (hydra_targets[target_no]->login_no < hydra_brains.countlogin) { @@ -2204,7 +2218,7 @@ void hydra_skip_user(int target_no, char *username) { strcpy(hydra_targets[target_no]->skiplogin[hydra_targets[target_no]->skipcnt], username); hydra_targets[target_no]->skipcnt++; } - if (hydra_options.loop_mode == 0 && (hydra_options.mode & 64) != 64) { + if (hydra_options.loop_mode == 0 && !check_flag(hydra_options.mode, MODE_COLON_FILE)) { if (memcmp(username, hydra_targets[target_no]->login_ptr, strlen(username)) == 0) { if (debug) printf("[DEBUG] skipping username %s\n", username); @@ -2554,15 +2568,15 @@ int main(int argc, char *argv[]) { switch (optarg[i]) { case 'r': hydra_options.try_password_reverse_login = 1; - hydra_options.mode = hydra_options.mode | 8; + hydra_options.mode = hydra_options.mode | MODE_PASSWORD_REVERSE; break; case 'n': hydra_options.try_null_password = 1; - hydra_options.mode = hydra_options.mode | 16; + hydra_options.mode = hydra_options.mode | MODE_PASSWORD_NULL; break; case 's': hydra_options.try_password_same_as_login = 1; - hydra_options.mode = hydra_options.mode | 32; + hydra_options.mode = hydra_options.mode | MODE_PASSWORD_SAME; break; default: fprintf(stderr, "[ERROR] unknown mode %c for option -e, only supporting \"n\", \"s\" and \"r\"\n", optarg[i]); @@ -2582,14 +2596,14 @@ int main(int argc, char *argv[]) { break; case 'L': hydra_options.loginfile = optarg; - hydra_options.mode = hydra_options.mode | 2; + hydra_options.mode = hydra_options.mode | MODE_LOGIN_LIST; break; case 'p': hydra_options.pass = optarg; break; case 'P': hydra_options.passfile = optarg; - hydra_options.mode = hydra_options.mode | 1; + hydra_options.mode = hydra_options.mode | MODE_PASSWORD_LIST; break; case 'f': hydra_options.exit_found = 1; @@ -2620,7 +2634,7 @@ int main(int argc, char *argv[]) { break; case 'C': hydra_options.colonfile = optarg; - hydra_options.mode = 64; + hydra_options.mode = MODE_COLON_FILE; break; case 'm': hydra_options.miscptr = optarg; @@ -2666,7 +2680,7 @@ int main(int argc, char *argv[]) { help_bfg(); bf_options.arg = optarg; hydra_options.bfg = 1; - hydra_options.mode = hydra_options.mode | 4; + hydra_options.mode = hydra_options.mode | MODE_PASSWORD_BRUTE; hydra_options.loop_mode = 1; break; #endif From 985f9c43b0991760a69990f01796fcfa3c80135a Mon Sep 17 00:00:00 2001 From: Diadlo Date: Fri, 2 Jun 2017 10:21:15 +0300 Subject: [PATCH 025/531] Add output_format_t enum --- hydra.c | 25 ++++++++++++++++--------- 1 file changed, 16 insertions(+), 9 deletions(-) diff --git a/hydra.c b/hydra.c index bb84f2d..e1b5d07 100644 --- a/hydra.c +++ b/hydra.c @@ -257,6 +257,13 @@ typedef enum { MODE_COLON_FILE = 64 } hydra_mode_t; +typedef enum { + FORMAT_PLAIN_TEXT, + FORMAT_JSONV1, + FORMAT_JSONV2, + FORMAT_XMLV1 +} output_format_t; + typedef struct { hydra_mode_t mode; int loop_mode; // valid modes: 0 = password, 1 = user @@ -272,7 +279,7 @@ typedef struct { int exit_found; int max_use; int cidr; - int outfile_format; // 0 = plain text, 1 = JSONv1, [future --> ] 2 = JSONv2, 3=XMLv1, 4=... + output_format_t outfile_format; char *login; char *loginfile; char *pass; @@ -2521,7 +2528,7 @@ int main(int argc, char *argv[]) { hydra_options.passfile = NULL; hydra_options.tasks = TASKS; hydra_options.max_use = MAXTASKS; - hydra_options.outfile_format = 0; + hydra_options.outfile_format = FORMAT_PLAIN_TEXT; hydra_brains.ofp = stdout; hydra_brains.targets = 1; hydra_options.waittime = waittime = WAITTIME; @@ -2618,11 +2625,11 @@ int main(int argc, char *argv[]) { case 'b': outfile_format_tmp = optarg; if (0==strcasecmp(outfile_format_tmp,"text")) - hydra_options.outfile_format = 0; + hydra_options.outfile_format = FORMAT_PLAIN_TEXT; else if (0==strcasecmp(outfile_format_tmp,"json")) // latest json formatting. - hydra_options.outfile_format = 1; + hydra_options.outfile_format = FORMAT_JSONV1; else if (0==strcasecmp(outfile_format_tmp,"jsonv1")) - hydra_options.outfile_format = 1; + hydra_options.outfile_format = FORMAT_JSONV1; else { fprintf(stderr, "[ERROR] Output file format must be (text, json, jsonv1)\n"); exit(-1); @@ -2726,7 +2733,7 @@ int main(int argc, char *argv[]) { bail("You can only use -L OR -l, not both\n"); if (hydra_options.pass != NULL && hydra_options.passfile != NULL) bail("You can only use -P OR -p, not both\n"); - if (hydra_options.outfile_format != 0 && hydra_options.outfile_ptr == NULL) + if (hydra_options.outfile_format != FORMAT_PLAIN_TEXT && hydra_options.outfile_ptr == NULL) fprintf(stderr, "[WARNING] output file format specified (-b) - but no output file (-o)\n"); if (hydra_options.restore) { @@ -3805,7 +3812,7 @@ int main(int argc, char *argv[]) { perror("[ERROR] Error creating outputfile"); exit(-1); } - if (hydra_options.outfile_format == 1) { // JSONv1 + if (hydra_options.outfile_format == FORMAT_JSONV1) { fprintf(hydra_brains.ofp, "{ \"generator\": {\n" "\t\"software\": \"%s\", \"version\": \"%s\", \"built\": \"%s\",\n" "\t\"server\": \"%s\", \"service\": \"%s\", \"jsonoutputversion\": \"1.00\",\n" @@ -4058,7 +4065,7 @@ int main(int argc, char *argv[]) { printf("[%d][%s] host: %s login: %s password: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr); } - if (hydra_options.outfile_format == 1 /* JSONv1 */ && hydra_options.outfile_ptr != NULL && hydra_brains.ofp != NULL) { + if (hydra_options.outfile_format == FORMAT_JSONV1 && hydra_options.outfile_ptr != NULL && hydra_brains.ofp != NULL) { fprintf(hydra_brains.ofp, "%s\n\t{\"port\": %d, \"service\": \"%s\", \"host\": \"%s\", \"login\": \"%s\", \"password\": \"%s\"}", hydra_brains.found == 1 ? "" : ",", // prefix a comma if not first finding hydra_targets[hydra_heads[head_no]->target_no]->port, @@ -4312,7 +4319,7 @@ int main(int argc, char *argv[]) { // yeah we did it printf("%s (%s) finished at %s\n", PROGRAM, RESOURCE, hydra_build_time()); if (hydra_brains.ofp != NULL && hydra_brains.ofp != stdout) { - if (hydra_options.outfile_format == 1 /* JSONv1 */ ) { + if (hydra_options.outfile_format == FORMAT_JSONV1) { fprintf(hydra_brains.ofp, "\n\t],\n\"success\": %s,\n\"errormessages\": [ %s ],\n\"quantityfound\": %lu }\n", (error ? "false" : "true"), json_error, hydra_brains.found); } From 0519661f9514c3b711cfe3087430cb94fb3a9066 Mon Sep 17 00:00:00 2001 From: Diadlo Date: Fri, 2 Jun 2017 10:58:10 +0300 Subject: [PATCH 026/531] Add using macros to align help text --- hydra.c | 149 ++++++++++++++++++++++++++------------------------------ 1 file changed, 70 insertions(+), 79 deletions(-) diff --git a/hydra.c b/hydra.c index f54554b..a4cee40 100644 --- a/hydra.c +++ b/hydra.c @@ -323,88 +323,78 @@ int snpdone, snp_is_redo, snpbuflen, snpi, snpj, snpdont; #include "performance.h" -void help(int ext) { - printf("Syntax: hydra [[[-l LOGIN|-L FILE] [-p PASS|-P FILE]] | [-C FILE]] [-e nsr]" " [-o FILE] [-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-W TIME] [-f] [-s PORT]" -#ifdef HAVE_MATH_H - " [-x MIN:MAX:CHARSET]" -#endif - " [-ISOuvVd46] " - //"[server service [OPT]]|" - "[service://server[:PORT][/OPT]]\n"); - printf("\nOptions:\n"); - if (ext) - printf(" -R restore a previous aborted/crashed session\n"); - if (ext) - printf(" -I ignore an existing restore file (dont wait 10 seconds)\n"); -#ifdef LIBOPENSSL - if (ext) - printf(" -S perform an SSL connect\n"); -#endif - if (ext) - printf(" -s PORT if the service is on a different default port, define it here\n"); - printf(" -l LOGIN or -L FILE login with LOGIN name, or load several logins from FILE\n"); - printf(" -p PASS or -P FILE try password PASS, or load several passwords from FILE\n"); -#ifdef HAVE_MATH_H - if (ext) { - printf(" -x MIN:MAX:CHARSET password bruteforce generation, type \"-x -h\" to get help\n"); - printf(" -y disable use of symbols in bruteforce, see above\n"); - } -#endif - if (ext) - printf(" -e nsr try \"n\" null password, \"s\" login as pass and/or \"r\" reversed login\n"); - if (ext) - printf(" -u loop around users, not passwords (effective! implied with -x)\n"); - printf(" -C FILE colon separated \"login:pass\" format, instead of -L/-P options\n"); - printf(" -M FILE list of servers to attack, one entry per line, ':' to specify port\n"); - if (ext) - printf(" -o FILE write found login/password pairs to FILE instead of stdout\n"); - if (ext) - printf(" -b FORMAT specify the format for the -o FILE: text(default), json, jsonv1\n"); - if (ext) - printf(" -f / -F exit when a login/pass pair is found (-M: -f per host, -F global)\n"); - printf(" -t TASKS run TASKS number of connects in parallel per target (default: %d)\n", TASKS); - if (ext) - printf(" -T TASKS run TASKS connects in parallel overall (for -M, default: %d)\n", MAXTASKS); - if (ext) - printf(" -w / -W TIME waittime for responses (%d) / between connects per thread (%d)\n", WAITTIME, conwait); - if (ext) - printf(" -4 / -6 use IPv4 (default) / IPv6 addresses (put always in [] also in -M)\n"); - if (ext) - printf(" -v / -V / -d verbose mode / show login+pass for each attempt / debug mode \n"); - if (ext) - printf(" -O use old SSL v2 and v3\n"); - if (ext) - printf(" -q do not print messages about connection errors\n"); - printf(" -U service module usage details\n"); - if (ext == 0) - printf(" -h more command line options (COMPLETE HELP)\n"); - printf(" server the target: DNS, IP or 192.168.0.0/24 (this OR the -M option)\n"); - printf(" service the service to crack (see below for supported protocols)\n"); - printf(" OPT some service modules support additional input (-U for module help)\n"); +#define PRINT_NORMAL(ext, text, ...) printf(text, ##__VA_ARGS__) +#define PRINT_EXTEND(ext, text, ...) do { \ + if (ext) \ + printf(text, ##__VA_ARGS__); \ + } while(0) + +void help(int ext) { + PRINT_NORMAL(ext, "Syntax: hydra [[[-l LOGIN|-L FILE] [-p PASS|-P FILE]] | [-C FILE]] [-e nsr]" + " [-o FILE] [-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-W TIME] [-f] [-s PORT]" +#ifdef HAVE_MATH_H + " [-x MIN:MAX:CHARSET]" +#endif + " [-ISOuvVd46] " + //"[server service [OPT]]|" + "[service://server[:PORT][/OPT]]\n"); + PRINT_NORMAL(ext, "\nOptions:\n"); + PRINT_EXTEND(ext, " -R restore a previous aborted/crashed session\n" + " -I ignore an existing restore file (dont wait 10 seconds)\n" +#ifdef LIBOPENSSL + " -S perform an SSL connect\n" +#endif + " -s PORT if the service is on a different default port, define it here\n"); + PRINT_NORMAL(ext, " -l LOGIN or -L FILE login with LOGIN name, or load several logins from FILE\n" + " -p PASS or -P FILE try password PASS, or load several passwords from FILE\n"); + PRINT_EXTEND(ext, +#ifdef HAVE_MATH_H + " -x MIN:MAX:CHARSET password bruteforce generation, type \"-x -h\" to get help\n" + " -y disable use of symbols in bruteforce, see above\n" +#endif + " -e nsr try \"n\" null password, \"s\" login as pass and/or \"r\" reversed login\n" + " -u loop around users, not passwords (effective! implied with -x)\n"); + PRINT_NORMAL(ext, " -C FILE colon separated \"login:pass\" format, instead of -L/-P options\n" + " -M FILE list of servers to attack, one entry per line, ':' to specify port\n"); + PRINT_EXTEND(ext, " -o FILE write found login/password pairs to FILE instead of stdout\n" + " -b FORMAT specify the format for the -o FILE: text(default), json, jsonv1\n" + " -f / -F exit when a login/pass pair is found (-M: -f per host, -F global)\n"); + PRINT_NORMAL(ext, " -t TASKS run TASKS number of connects in parallel per target (default: %d)\n", TASKS); + PRINT_EXTEND(ext, " -T TASKS run TASKS connects in parallel overall (for -M, default: %d)\n" + " -w / -W TIME waittime for responses (%d) / between connects per thread (%d)\n" + " -4 / -6 use IPv4 (default) / IPv6 addresses (put always in [] also in -M)\n" + " -v / -V / -d verbose mode / show login+pass for each attempt / debug mode \n" + " -O use old SSL v2 and v3\n" + " -q do not print messages about connection errors\n", + MAXTASKS, WAITTIME, conwait + ); + PRINT_NORMAL(ext, " -U service module usage details\n" + " -h more command line options (COMPLETE HELP)\n" + " server the target: DNS, IP or 192.168.0.0/24 (this OR the -M option)\n" + " service the service to crack (see below for supported protocols)\n" + " OPT some service modules support additional input (-U for module help)\n"); + PRINT_NORMAL(ext, "\nSupported services: %s\n" + "\n%s is a tool to guess/crack valid login/password pairs. Licensed under AGPL\n" + "v3.0. The newest version is always available at %s\n" + "Don't use in military or secret service organizations, or for illegal purposes.\n", + SERVICES, PROGRAM, RESOURCE + ); - printf("\nSupported services: %s\n", SERVICES); - printf("\n%s is a tool to guess/crack valid login/password pairs. Licensed under AGPL\nv3.0. The newest version is always available at %s\n", PROGRAM, RESOURCE); - printf("Don't use in military or secret service organizations, or for illegal purposes.\n"); if (ext && strlen(unsupported) > 0) { if (unsupported[strlen(unsupported) - 1] == ' ') unsupported[strlen(unsupported) - 1] = 0; printf("These services were not compiled in: %s.\n", unsupported); } - if (ext) { - printf("\nUse HYDRA_PROXY_HTTP or HYDRA_PROXY environment variables for a proxy setup.\n"); - printf("E.g. %% export HYDRA_PROXY=socks5://l:p@127.0.0.1:9150 (or: socks4:// connect://)\n"); - printf(" %% export HYDRA_PROXY=connect_and_socks_proxylist.txt (up to 64 entries)\n"); - printf(" %% export HYDRA_PROXY_HTTP=http://login:pass@proxy:8080\n"); - printf(" %% export HYDRA_PROXY_HTTP=proxylist.txt (up to 64 entries)\n"); - } - - printf("\nExample%s:%s hydra -l user -P passlist.txt ftp://192.168.0.1\n", ext == 0 ? "" : "s", ext == 0 ? "" : "\n"); - if (ext) { - printf(" hydra -L userlist.txt -p defaultpw imap://192.168.0.1/PLAIN\n"); - printf(" hydra -C defaults.txt -6 pop3s://[2001:db8::1]:143/TLS:DIGEST-MD5\n"); - printf(" hydra -l admin -p password ftp://[192.168.0.0/24]/\n"); - printf(" hydra -L logins.txt -P pws.txt -M targets.txt ssh\n"); - } + PRINT_EXTEND(ext, "\nUse HYDRA_PROXY_HTTP or HYDRA_PROXY environment variables for a proxy setup.\n" + "E.g. %% export HYDRA_PROXY=socks5://l:p@127.0.0.1:9150 (or: socks4:// connect://)\n" + " %% export HYDRA_PROXY=connect_and_socks_proxylist.txt (up to 64 entries)\n" + " %% export HYDRA_PROXY_HTTP=http://login:pass@proxy:8080\n" + " %% export HYDRA_PROXY_HTTP=proxylist.txt (up to 64 entries)\n"); + PRINT_NORMAL(ext, "\nExample%s:%s hydra -l user -P passlist.txt ftp://192.168.0.1\n", ext == 0 ? "" : "s", ext == 0 ? "" : "\n"); + PRINT_EXTEND(ext, " hydra -L userlist.txt -p defaultpw imap://192.168.0.1/PLAIN\n" + " hydra -C defaults.txt -6 pop3s://[2001:db8::1]:143/TLS:DIGEST-MD5\n" + " hydra -l admin -p password ftp://[192.168.0.0/24]/\n" + " hydra -L logins.txt -P pws.txt -M targets.txt ssh\n"); exit(-1); } @@ -421,9 +411,10 @@ void help_bfg() { "Examples:\n" " -x 3:5:a generate passwords from length 3 to 5 with all lowercase letters\n" " -x 5:8:A1 generate passwords from length 5 to 8 with uppercase and numbers\n" - " -x 1:3:/ generate passwords from length 1 to 3 containing only slashes\n" " -x 5:5:/%%,.- generate passwords with length 5 which consists only of /%%,.-\n" - " -x 3:5:aA1 -y generate passwords from length 3 to 5 with a, A and 1 only\n"); - printf("\nThe bruteforce mode was made by Jan Dlabal, http://houbysoft.com/bfg/\n"); + " -x 1:3:/ generate passwords from length 1 to 3 containing only slashes\n" + " -x 5:5:/%%,.- generate passwords with length 5 which consists only of /%%,.-\n" + " -x 3:5:aA1 -y generate passwords from length 3 to 5 with a, A and 1 only\n" + "\nThe bruteforce mode was made by Jan Dlabal, http://houbysoft.com/bfg/\n"); exit(-1); } From f7b122f6edfae76491054a89a51e864bd1852394 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Tue, 6 Jun 2017 15:22:37 +0200 Subject: [PATCH 027/531] cleanup --- hydra.c | 59 +++++++++++++++++++++++++++++---------------------------- 1 file changed, 30 insertions(+), 29 deletions(-) diff --git a/hydra.c b/hydra.c index 10c069f..d68f872 100644 --- a/hydra.c +++ b/hydra.c @@ -187,6 +187,31 @@ extern int old_ssl; void hydra_kill_head(int head_no, int killit, int fail); +// some enum definitions +typedef enum { + STATE_ACTIVE = 0, + STATE_FINISHED = 1, + STATE_ERROR = 2, + STATE_UNRESOLVED = 3 +} target_state_t; + +typedef enum { + MODE_PASSWORD_LIST = 1, + MODE_LOGIN_LIST = 2, + MODE_PASSWORD_BRUTE = 4, + MODE_PASSWORD_REVERSE = 8, + MODE_PASSWORD_NULL = 16, + MODE_PASSWORD_SAME = 32, + MODE_COLON_FILE = 64 +} hydra_mode_t; + +typedef enum { + FORMAT_PLAIN_TEXT, + FORMAT_JSONV1, + FORMAT_JSONV2, + FORMAT_XMLV1 +} output_format_t; + // some structure definitions typedef struct { pid_t pid; @@ -200,13 +225,6 @@ typedef struct { time_t last_seen; } hydra_head; -typedef enum { - STATE_ACTIVE = 0, - STATE_FINISHED = 1, - STATE_ERROR = 2, - STATE_UNRESOLVED = 3 -} target_state_t; - typedef struct { char *target; char ip[36]; @@ -247,23 +265,6 @@ typedef struct { FILE *ofp; } hydra_brain; -typedef enum { - MODE_PASSWORD_LIST = 1, - MODE_LOGIN_LIST = 2, - MODE_PASSWORD_BRUTE = 4, - MODE_PASSWORD_REVERSE = 8, - MODE_PASSWORD_NULL = 16, - MODE_PASSWORD_SAME = 32, - MODE_COLON_FILE = 64 -} hydra_mode_t; - -typedef enum { - FORMAT_PLAIN_TEXT, - FORMAT_JSONV1, - FORMAT_JSONV2, - FORMAT_XMLV1 -} output_format_t; - typedef struct { hydra_mode_t mode; int loop_mode; // valid modes: 0 = password, 1 = user @@ -304,7 +305,6 @@ typedef struct { // external vars extern char HYDRA_EXIT[5]; - #if !defined(ANDROID) && !defined(__BIONIC__) extern int errno; #endif @@ -347,16 +347,17 @@ int snpdone, snp_is_redo, snpbuflen, snpi, snpj, snpdont; #include "performance.h" -int inline check_flag(int value, int flag) { - return (value & flag) == flag; -} - #define PRINT_NORMAL(ext, text, ...) printf(text, ##__VA_ARGS__) #define PRINT_EXTEND(ext, text, ...) do { \ if (ext) \ printf(text, ##__VA_ARGS__); \ } while(0) + +int inline check_flag(int value, int flag) { + return (value & flag) == flag; +} + void help(int ext) { PRINT_NORMAL(ext, "Syntax: hydra [[[-l LOGIN|-L FILE] [-p PASS|-P FILE]] | [-C FILE]] [-e nsr]" " [-o FILE] [-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-W TIME] [-f] [-s PORT]" From 5033c262dfca80727ecf76365428d2f9f0aa120a Mon Sep 17 00:00:00 2001 From: van Hauser Date: Tue, 6 Jun 2017 15:23:43 +0200 Subject: [PATCH 028/531] changelog update --- CHANGES | 1 + 1 file changed, 1 insertion(+) diff --git a/CHANGES b/CHANGES index fb9ebcd..3a851c2 100644 --- a/CHANGES +++ b/CHANGES @@ -3,6 +3,7 @@ Changelog for hydra Release 8.6-dev * http-form module now supports URLs up to 6000 bytes (thanks to petrock6@github for the patch) +* merged several patches by Diadlo@github to make the code easier readable. thanks for that! Release 8.5 From 66562bd73cbb904dc929575a32cbd71542f03a08 Mon Sep 17 00:00:00 2001 From: Diadlo Date: Sat, 10 Jun 2017 23:54:32 +0300 Subject: [PATCH 029/531] Move null pointer check before pointer using --- hydra-mod.c | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/hydra-mod.c b/hydra-mod.c index b675377..fd16e54 100644 --- a/hydra-mod.c +++ b/hydra-mod.c @@ -1043,15 +1043,15 @@ char *hydra_strrep(char *string, char *oldpiece, char *newpiece) { char *c, oldstring[6096], newstring[6096]; //updated due to issue 192 on github. static char finalstring[6096]; - if(strlen(string) > 6000) { - hydra_report(stderr, "[ERROR] Supplied URL or POST data too large. Max limit is 6000 characters.\n"); - exit(-1); - } - if (string == NULL || oldpiece == NULL || newpiece == NULL || strlen(string) >= sizeof(oldstring) - 1 || (strlen(string) + strlen(newpiece) - strlen(oldpiece) >= sizeof(newstring) - 1 && strlen(string) > strlen(oldpiece))) return NULL; + if (strlen(string) > 6000) { + hydra_report(stderr, "[ERROR] Supplied URL or POST data too large. Max limit is 6000 characters.\n"); + exit(-1); + } + strcpy(newstring, string); strcpy(oldstring, string); From e95e036bbf31bf07780649db7a7e343298855d85 Mon Sep 17 00:00:00 2001 From: Diadlo Date: Sat, 10 Jun 2017 23:54:59 +0300 Subject: [PATCH 030/531] Remove null pointer dereference --- hydra-xmpp.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/hydra-xmpp.c b/hydra-xmpp.c index 7fb4462..db38fe0 100644 --- a/hydra-xmpp.c +++ b/hydra-xmpp.c @@ -338,8 +338,7 @@ void service_xmpp(char *target, char *ip, int sp, unsigned char options, char *m do { if ((buf = hydra_receive_line(sock)) == NULL) { /* no auth method identified */ - hydra_report(stderr, "[ERROR] no authentication methods can be identified %s\n", buf); - free(buf); + hydra_report(stderr, "[ERROR] no authentication methods can be identified\n"); hydra_child_exit(1); } From 48709842a6afa4b37eb635e85149dad95c2b9142 Mon Sep 17 00:00:00 2001 From: Diadlo Date: Sat, 10 Jun 2017 23:56:18 +0300 Subject: [PATCH 031/531] Replace possible null pointer no '(null)' string --- hydra.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra.c b/hydra.c index b3a81aa..d9f07e9 100644 --- a/hydra.c +++ b/hydra.c @@ -3173,7 +3173,7 @@ int main(int argc, char *argv[]) { cond = strtok(NULL, ":"); optional1 = strtok(NULL, "\n"); if ((variables == NULL) || (strstr(variables, "^USER^") == NULL && strstr(variables, "^PASS^") == NULL)) { - fprintf(stderr, "[ERROR] the variables argument needs at least the strings ^USER^ or ^PASS^: %s\n", variables); + fprintf(stderr, "[ERROR] the variables argument needs at least the strings ^USER^ or ^PASS^: %s\n", STR_NULL(variables)); exit(-1); } if ((url == NULL) || (cond == NULL)) { From 300fe2f19d7827588356e66b9010c95bad7d61d4 Mon Sep 17 00:00:00 2001 From: Diadlo Date: Sat, 10 Jun 2017 23:56:52 +0300 Subject: [PATCH 032/531] Prevert using NULL login --- hydra-sip.c | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/hydra-sip.c b/hydra-sip.c index 3faea0b..3cf3b33 100644 --- a/hydra-sip.c +++ b/hydra-sip.c @@ -32,7 +32,11 @@ void empty_register(char *buf, char *host, char *lhost, int port, int lport, cha "REGISTER sip:%s SIP/2.0\r\n" "Via: SIP/2.0/UDP %s:%i\r\n" "From: \r\n" - "To: \r\n" "Call-ID: 1337@%s\r\n" "CSeq: %i REGISTER\r\n" "Content-Length: 0\r\n\r\n", host, lhost, lport, user, host, user, host, host, cseq); + "To: \r\n" + "Call-ID: 1337@%s\r\n" + "CSeq: %i REGISTER\r\n" + "Content-Length: 0\r\n\r\n", + host, lhost, lport, user, host, user, host, host, cseq); } int get_sip_code(char *buf) { @@ -50,7 +54,7 @@ int start_sip(int s, char *ip, char *lip, int port, int lport, unsigned char opt char buf[SIP_MAX_BUF]; if (strlen(login = hydra_get_next_login()) == 0) - login = NULL; + return 3; if (strlen(pass = hydra_get_next_password()) == 0) pass = NULL; From a01712370b483ad7a1f4029e4f2e5b3a5d73fc65 Mon Sep 17 00:00:00 2001 From: Diadlo Date: Sat, 10 Jun 2017 23:31:45 +0300 Subject: [PATCH 033/531] Remove useless sock check in init functions 'sock' inited with -1 a few lines above, so condition is alwais false --- hydra-pop3.c | 3 --- hydra-redis.c | 2 -- hydra-rpcap.c | 2 -- 3 files changed, 7 deletions(-) diff --git a/hydra-pop3.c b/hydra-pop3.c index ac3c8a4..4481dfc 100644 --- a/hydra-pop3.c +++ b/hydra-pop3.c @@ -525,9 +525,6 @@ int service_pop3_init(char *ip, int sp, unsigned char options, char *miscptr, FI p.disable_tls = 1; memcpy(p.ip, ip, 36); - if (sock >= 0) - sock = hydra_disconnect(sock); -// usleepn(300); if ((options & OPTION_SSL) == 0) { if (port != 0) myport = port; diff --git a/hydra-redis.c b/hydra-redis.c index d388de2..61a08ea 100644 --- a/hydra-redis.c +++ b/hydra-redis.c @@ -135,8 +135,6 @@ int service_redis_init(char *ip, int sp, unsigned char options, char *miscptr, F char buffer[] = "*1\r\n$4\r\nping\r\n"; hydra_register_socket(sp); - if (sock >= 0) - sock = hydra_disconnect(sock); if ((options & OPTION_SSL) == 0) { if (port != 0) myport = port; diff --git a/hydra-rpcap.c b/hydra-rpcap.c index fc9ce00..8272870 100644 --- a/hydra-rpcap.c +++ b/hydra-rpcap.c @@ -130,8 +130,6 @@ int service_rpcap_init(char *ip, int sp, unsigned char options, char *miscptr, F char buffer[] = "\x00\x08\x00\x00\x00\x00\x00\x08\x00\x00\x00\x00\x00\x00\x00\x00"; hydra_register_socket(sp); - if (sock >= 0) - sock = hydra_disconnect(sock); if ((options & OPTION_SSL) == 0) { if (port != 0) myport = port; From 18ae87b39624fac492f68cc0b5f964955f9d5fa1 Mon Sep 17 00:00:00 2001 From: Diadlo Date: Sun, 11 Jun 2017 18:21:40 +0300 Subject: [PATCH 034/531] Remove useless null check 'while' has 2 pbuffer[0] checks: - pbuffer[0] not equal to 0 - pbuffer[0] more then 31 (first printable char) if pbuffer[0] more than 31 it's always not equal to 0 => first check is useless --- sasl.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/sasl.c b/sasl.c index d5239dc..dad73da 100644 --- a/sasl.c +++ b/sasl.c @@ -308,7 +308,7 @@ void sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char * currentpos = 0; } pbuffer++; - } while ((pbuffer[0] != '\0') && (pbuffer[0] > 31) && (ind < array_size)); + } while ((pbuffer[0] > 31) && (ind < array_size)); //save the latest one if (ind < array_size) { array[ind] = malloc(currentpos + 1); From 78c88159fa4fe9a5ba664a28b15f608ea43e03f1 Mon Sep 17 00:00:00 2001 From: Diadlo Date: Sun, 11 Jun 2017 18:25:45 +0300 Subject: [PATCH 035/531] Remove reduant 'if' after 'else' if (A) { } else if (!A) { } --- hydra.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra.c b/hydra.c index d9f07e9..25275e5 100644 --- a/hydra.c +++ b/hydra.c @@ -1944,7 +1944,7 @@ int hydra_send_next_pair(int target_no, int head_no) { hydra_targets[target_no]->login_no = 0; hydra_targets[target_no]->login_ptr = login_ptr; - } else if (hydra_targets[target_no]->login_no < hydra_brains.countlogin) { + } else { hydra_targets[target_no]->login_ptr++; while (*hydra_targets[target_no]->login_ptr != 0) hydra_targets[target_no]->login_ptr++; From 39cf5133a65fffd547f06c271b9a93c840656c2d Mon Sep 17 00:00:00 2001 From: Diadlo Date: Sun, 11 Jun 2017 18:48:24 +0300 Subject: [PATCH 036/531] Extract maxfail in to a variable Reduce code duplication, make code easier to read --- hydra.c | 24 ++++++++++-------------- 1 file changed, 10 insertions(+), 14 deletions(-) diff --git a/hydra.c b/hydra.c index d9f07e9..644f212 100644 --- a/hydra.c +++ b/hydra.c @@ -1562,26 +1562,22 @@ void hydra_kill_head(int head_no, int killit, int fail) { } void hydra_increase_fail_count(int target_no, int head_no) { - int i, k; + int i, k, ok, success, tasks, a, b, maxfail; if (target_no < 0) return; + ok = hydra_targets[target_no]->ok; + tasks = hydra_options.tasks; + success = tasks - hydra_targets[target_no]->failed; + a = tasks <= 4 && ok ? 6 - tasks : 1; + b = success < 5 && ok ? 6 - success : 1; + maxfail = MAXFAIL + a + b + (ok ? 2 : -2); + hydra_targets[target_no]->fail_count++; if (debug) - printf("[DEBUG] hydra_increase_fail_count: %d >= %d => disable\n", hydra_targets[target_no]->fail_count, - MAXFAIL + (hydra_options.tasks <= 4 && hydra_targets[target_no]->ok ? 6 - hydra_options.tasks : 1) + (hydra_options.tasks - hydra_targets[target_no]->failed < 5 - && hydra_targets[target_no]->ok ? 6 - (hydra_options.tasks - - hydra_targets - [target_no]->failed) : 1) - + (hydra_targets[target_no]->ok ? 2 : -2)); - if (hydra_targets[target_no]->fail_count >= - MAXFAIL + (hydra_options.tasks <= 4 && hydra_targets[target_no]->ok ? 6 - hydra_options.tasks : 1) + (hydra_options.tasks - hydra_targets[target_no]->failed < 5 - && hydra_targets[target_no]->ok ? 6 - (hydra_options.tasks - - hydra_targets - [target_no]->failed) : 1) + - (hydra_targets[target_no]->ok ? 2 : -2) - ) { + printf("[DEBUG] hydra_increase_fail_count: %d >= %d => disable\n", hydra_targets[target_no]->fail_count, maxfail); + if (hydra_targets[target_no]->fail_count >= maxfail) { k = 0; for (i = 0; i < hydra_options.max_use; i++) if (hydra_heads[i]->active >= 0 && hydra_heads[i]->target_no == target_no) From 1043a120d7652cf1e43fb6a6c35a4c8a64cd4c51 Mon Sep 17 00:00:00 2001 From: Diadlo Date: Mon, 12 Jun 2017 12:21:08 +0300 Subject: [PATCH 037/531] Replace one compare sign to make summands more generic --- hydra.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra.c b/hydra.c index 644f212..ad77185 100644 --- a/hydra.c +++ b/hydra.c @@ -1570,7 +1570,7 @@ void hydra_increase_fail_count(int target_no, int head_no) { ok = hydra_targets[target_no]->ok; tasks = hydra_options.tasks; success = tasks - hydra_targets[target_no]->failed; - a = tasks <= 4 && ok ? 6 - tasks : 1; + a = tasks < 5 && ok ? 6 - tasks : 1; b = success < 5 && ok ? 6 - success : 1; maxfail = MAXFAIL + a + b + (ok ? 2 : -2); From a47bd13c30e1e16038b8318d07a0bfdce92a157f Mon Sep 17 00:00:00 2001 From: Diadlo Date: Mon, 12 Jun 2017 12:23:17 +0300 Subject: [PATCH 038/531] Add maxfail default value Maxfail for '!ok' is always 0 --- hydra.c | 14 ++++++++------ 1 file changed, 8 insertions(+), 6 deletions(-) diff --git a/hydra.c b/hydra.c index ad77185..b485118 100644 --- a/hydra.c +++ b/hydra.c @@ -1562,17 +1562,19 @@ void hydra_kill_head(int head_no, int killit, int fail) { } void hydra_increase_fail_count(int target_no, int head_no) { - int i, k, ok, success, tasks, a, b, maxfail; + int i, k, ok, maxfail = 0; if (target_no < 0) return; ok = hydra_targets[target_no]->ok; - tasks = hydra_options.tasks; - success = tasks - hydra_targets[target_no]->failed; - a = tasks < 5 && ok ? 6 - tasks : 1; - b = success < 5 && ok ? 6 - success : 1; - maxfail = MAXFAIL + a + b + (ok ? 2 : -2); + if (ok) { + const int tasks = hydra_options.tasks; + const int success = tasks - hydra_targets[target_no]->failed; + const int t = tasks < 5 && ok ? 6 - tasks : 1; + const int s = success < 5 && ok ? 6 - success : 1; + maxfail = MAXFAIL + t + s + (ok ? 2 : -2); + } hydra_targets[target_no]->fail_count++; if (debug) From e8e17d092d23b9f1108e85c96c01e4bf9d17e306 Mon Sep 17 00:00:00 2001 From: Diadlo Date: Mon, 12 Jun 2017 12:24:21 +0300 Subject: [PATCH 039/531] Remove using 'ok' from 'if' where 'ok' is always true --- hydra.c | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/hydra.c b/hydra.c index b485118..b949a02 100644 --- a/hydra.c +++ b/hydra.c @@ -1567,13 +1567,12 @@ void hydra_increase_fail_count(int target_no, int head_no) { if (target_no < 0) return; - ok = hydra_targets[target_no]->ok; - if (ok) { + if (hydra_targets[target_no]->ok) { const int tasks = hydra_options.tasks; const int success = tasks - hydra_targets[target_no]->failed; - const int t = tasks < 5 && ok ? 6 - tasks : 1; - const int s = success < 5 && ok ? 6 - success : 1; - maxfail = MAXFAIL + t + s + (ok ? 2 : -2); + const int t = tasks < 5 ? 6 - tasks : 1; + const int s = success < 5 ? 6 - success : 1; + maxfail = MAXFAIL + t + s + 2; } hydra_targets[target_no]->fail_count++; From 13962a20a8455a93d82470178f8989cf290c5a0c Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 15 Jun 2017 11:45:46 +0200 Subject: [PATCH 040/531] fix for SSL error:00000000:lib(0):func(0):reason(0) bug --- CHANGES | 1 + hydra-mod.c | 3 +-- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/CHANGES b/CHANGES index 3a851c2..ee7a523 100644 --- a/CHANGES +++ b/CHANGES @@ -3,6 +3,7 @@ Changelog for hydra Release 8.6-dev * http-form module now supports URLs up to 6000 bytes (thanks to petrock6@github for the patch) +* Fix for SSL connections that failed with error:00000000:lib(0):func(0):reason(0) (thanks gaia@github for reporting) * merged several patches by Diadlo@github to make the code easier readable. thanks for that! diff --git a/hydra-mod.c b/hydra-mod.c index fd16e54..0b9fd78 100644 --- a/hydra-mod.c +++ b/hydra-mod.c @@ -514,10 +514,9 @@ int internal__hydra_connect_to_ssl(int socket, char *hostname) { return -1; } } else { -// if ((sslContext = SSL_CTX_new(SSLv23_client_method())) == NULL) { #ifndef TLSv1_2_client_method #if OPENSSL_VERSION_NUMBER < 0x10100000L - #define TLSv1_2_client_method TLSv1_client_method + #define TLSv1_2_client_method TLSv1_2_client_method #else #define TLSv1_2_client_method TLS_client_method #endif From 21c4b99e1b078caacf28f90f36bef8ecb105fe93 Mon Sep 17 00:00:00 2001 From: Diadlo Date: Wed, 21 Jun 2017 23:14:25 +0300 Subject: [PATCH 041/531] Use early break instead of large if --- hydra.c | 452 ++++++++++++++++++++++++++++---------------------------- 1 file changed, 228 insertions(+), 224 deletions(-) diff --git a/hydra.c b/hydra.c index 00a32aa..15507be 100644 --- a/hydra.c +++ b/hydra.c @@ -450,231 +450,235 @@ void help_bfg() { void module_usage() { int find = 0; - if (hydra_options.service) { - printf("\nHelp for module %s:\n============================================================================\n", hydra_options.service); - if ((strcmp(hydra_options.service, "oracle") == 0) || (strcmp(hydra_options.service, "ora") == 0)) { - printf("Module oracle / ora is optionally taking the ORACLE SID, default is \"ORCL\"\n\n"); - find = 1; - } - if ((strcmp(hydra_options.service, "oracle-listener") == 0) || (strcmp(hydra_options.service, "tns") == 0)) { - printf("Module oracle-listener / tns is optionally taking the mode the password is stored as, could be PLAIN (default) or CLEAR\n\n"); - find = 1; - } - if (strcmp(hydra_options.service, "cvs") == 0) { - printf("Module cvs is optionally taking the repository name to attack, default is \"/root\"\n\n"); - find = 1; - } - if (strcmp(hydra_options.service, "xmpp") == 0) { - printf("Module xmpp is optionally taking one authentication type of:\n" - " LOGIN (default), PLAIN, CRAM-MD5, DIGEST-MD5, SCRAM-SHA1\n\n" - "Note, the target passed should be a fdqn as the value is used in the Jabber init request, example: hermes.jabber.org\n\n"); - find = 1; - } - if (!find && (strcmp(hydra_options.service, "pop3") == 0)) { - printf("Module pop3 is optionally taking one authentication type of:\n" - " CLEAR (default), LOGIN, PLAIN, CRAM-MD5, CRAM-SHA1,\n" - " CRAM-SHA256, DIGEST-MD5, NTLM.\n" "Additionally TLS encryption via STLS can be enforced with the TLS option.\n\n" "Example: pop3://target/TLS:PLAIN\n"); - find = 1; - } - if (!find && (strcmp(hydra_options.service, "rdp") == 0)) { - printf("Module rdp is optionally taking the windows domain name.\n" "For example:\nhydra rdp://192.168.0.1/firstdomainname -l john -p doe\n\n"); - find = 1; - } - if (!find && (strcmp(hydra_options.service, "s7-300") == 0)) { - printf("Module S7-300 is for a special Siemens PLC. It either requires only a password or no authentication, so just use the -p or -P option.\n\n"); - find = 1; - } - if (!find && (strcmp(hydra_options.service, "nntp") == 0)) { - printf("Module nntp is optionally taking one authentication type of:\n" " USER (default), LOGIN, PLAIN, CRAM-MD5, DIGEST-MD5, NTLM\n\n"); - find = 1; - } - if (!find && (strcmp(hydra_options.service, "imap") == 0)) { - printf("Module imap is optionally taking one authentication type of:\n" - " CLEAR or APOP (default), LOGIN, PLAIN, CRAM-MD5, CRAM-SHA1,\n" - " CRAM-SHA256, DIGEST-MD5, NTLM\n" "Additionally TLS encryption via STARTTLS can be enforced with the TLS option.\n\n" "Example: imap://target/TLS:PLAIN\n"); - find = 1; - } - if (!find && (strcmp(hydra_options.service, "smtp-enum")) == 0) { - printf("Module smtp-enum is optionally taking one SMTP command of:\n\n" - "VRFY (default), EXPN, RCPT (which will connect using \"root\" account)\n" - "login parameter is used as username and password parameter as the domain name\n" - "For example to test if john@localhost exists on 192.168.0.1:\n" "hydra smtp-enum://192.168.0.1/vrfy -l john -p localhost\n\n"); - find = 1; - } - if (!find && (strcmp(hydra_options.service, "smtp")) == 0) { - printf("Module smtp is optionally taking one authentication type of:\n" - " LOGIN (default), PLAIN, CRAM-MD5, DIGEST-MD5, NTLM\n\n" - "Additionally TLS encryption via STARTTLS can be enforced with the TLS option.\n\n" "Example: smtp://target/TLS:PLAIN\n"); - find = 1; - } - if (!find && (strcmp(hydra_options.service, "svn") == 0)) { - printf("Module svn is optionally taking the repository name to attack, default is \"trunk\"\n\n"); - find = 1; - } - if (!find && (strcmp(hydra_options.service, "ncp") == 0)) { - printf("Module ncp is optionally taking the full context, for example \".O=cx\"\n\n"); - find = 1; - } - if (!find && (strcmp(hydra_options.service, "firebird") == 0)) { - printf("Module firebird is optionally taking the database path to attack,\n" "default is \"C:\\Program Files\\Firebird\\Firebird_1_5\\security.fdb\"\n\n"); - find = 1; - } - if (!find && (strcmp(hydra_options.service, "mysql") == 0)) { - printf("Module mysql is optionally taking the database to attack, default is \"mysql\"\n\n"); - find = 1; - } - if (!find && (strcmp(hydra_options.service, "irc") == 0)) { - printf("Module irc is optionally taking the general server password, if the server is requiring one\n" "and none is passed the password from -p/-P will be used\n\n"); - find = 1; - } - if (!find && (strcmp(hydra_options.service, "postgres") == 0)) { - printf("Module postgres is optionally taking the database to attack, default is \"template1\"\n\n"); - find = 1; - } - if (!find && (strcmp(hydra_options.service, "telnet") == 0)) { - printf("Module telnet is optionally taking the string which is displayed after\n" - "a successful login (case insensitive), use if the default in the telnet\n" "module produces too many false positives\n\n"); - find = 1; - } - if (!find && (strcmp(hydra_options.service, "sapr3") == 0)) { - printf("Module sapr3 requires the client id, a number between 0 and 99\n\n"); - find = 1; - } - if (!find && (strcmp(hydra_options.service, "sshkey") == 0)) { - printf("Module sshkey does not provide additional options, although the semantic for\n" - "options -p and -P is changed:\n" - " -p expects a path to an unencrypted private key in PEM format.\n" - " -P expects a filename containing a list of path to some unencrypted\n" " private keys in PEM format.\n\n"); - find = 1; - } - if (!find && (strcmp(hydra_options.service, "cisco-enable") == 0)) { - printf("Module cisco-enable is optionally taking the logon password for the cisco device\n" - "Note: if AAA authentication is used, use the -l option for the username\n" - "and the optional parameter for the password of the user.\n" - "Examples:\n" - " hydra -P pass.txt target cisco-enable (direct console access)\n" - " hydra -P pass.txt -m cisco target cisco-enable (Logon password cisco)\n" - " hydra -l foo -m bar -P pass.txt target cisco-enable (AAA Login foo, password bar)\n"); - find = 1; - } - if (!find && (strcmp(hydra_options.service, "cisco") == 0)) { - printf("Module cisco is optionally taking the keyword ENTER, it then sends an initial\n" "ENTER when connecting to the service.\n"); - find = 1; - } - if (!find && ((strcmp(hydra_options.service, "ldap2") == 0) - || (strcmp(hydra_options.service, "ldap3") == 0) - || (strcmp(hydra_options.service, "ldap3-crammd5") == 0) - || (strcmp(hydra_options.service, "ldap3-digestmd5") == 0)) - ) { - printf("Module %s is optionally taking the DN (depending of the auth method choosed\n" - "Note: you can also specify the DN as login when Simple auth method is used).\n" - "The keyword \"^USER^\" is replaced with the login.\n" - "Special notes for Simple method has 3 operation modes: anonymous, (no user no pass),\n" - "unauthenticated (user but no pass), user/pass authenticated (user and pass).\n" - "So don't forget to set empty string as user/pass to test all modes.\n" - "Hint: to authenticate to a windows active directy ldap, this is usually\n" - " cn=^USER^,cn=users,dc=foo,dc=bar,dc=com for domain foo.bar.com\n\n", hydra_options.service); - find = 1; - } - if (!find && ((strcmp(hydra_options.service, "smb") == 0) || (strcmp(hydra_options.service, "smbnt") == 0))) { - printf("Module smb default value is set to test both local and domain account, using a simple password with NTLM dialect.\n" - "Note: you can set the group type using LOCAL or DOMAIN keyword\n" - " or other_domain:{value} to specify a trusted domain.\n" - " you can set the password type using HASH or MACHINE keyword\n" - " (to use the Machine's NetBIOS name as the password).\n" - " you can set the dialect using NTLMV2, NTLM, LMV2, LM keyword.\n" - "Example: \n" - " hydra smb://microsoft.com -l admin -p tooeasy -m \"local lmv2\"\n" - " hydra smb://microsoft.com -l admin -p D5731CFC6C2A069C21FD0D49CAEBC9EA:2126EE7712D37E265FD63F2C84D2B13D::: -m \"local hash\"\n" - " hydra smb://microsoft.com -l admin -p tooeasy -m \"other_domain:SECONDDOMAIN\"\n\n"); - find = 1; - } - if (!find && ((strcmp(hydra_options.service, "http-get-form") == 0) - || (strcmp(hydra_options.service, "https-get-form") == 0) - || (strcmp(hydra_options.service, "http-post-form") == 0) - || (strcmp(hydra_options.service, "https-post-form") == 0) - || (strncmp(hydra_options.service, "http-form", 9) == 0) - || (strncmp(hydra_options.service, "https-form", 10) == 0) - ) - ) { - printf("Module %s requires the page and the parameters for the web form.\n\n" - "By default this module is configured to follow a maximum of 5 redirections in\n" - "a row. It always gathers a new cookie from the same URL without variables\n" - "The parameters take three \":\" separated values, plus optional values.\n" - "(Note: if you need a colon in the option string as value, escape it with \"\\:\", but do not escape a \"\\\" with \"\\\\\".)\n" - "\nSyntax: :
:[:[:]\n" - "First is the page on the server to GET or POST to (URL).\n" - "Second is the POST/GET variables (taken from either the browser, proxy, etc.\n" - " with usernames and passwords being replaced in the \"^USER^\" and \"^PASS^\"\n" - " placeholders (FORM PARAMETERS)\n" - "Third is the string that it checks for an *invalid* login (by default)\n" - " Invalid condition login check can be preceded by \"F=\", successful condition\n" - " login check must be preceded by \"S=\".\n" - " This is where most people get it wrong. You have to check the webapp what a\n" - " failed string looks like and put it in this parameter!\n" - "The following parameters are optional:\n" - " C=/page/uri to define a different page to gather initial cookies from\n" - " (h|H)=My-Hdr\\: foo to send a user defined HTTP header with each request\n" - " ^USER^ and ^PASS^ can also be put into these headers!\n" - " Note: 'h' will add the user-defined header at the end\n" - " regardless it's already being sent by Hydra or not.\n" - " 'H' will replace the value of that header if it exists, by the\n" - " one supplied by the user, or add the header at the end\n" - "Note that if you are going to put colons (:) in your headers you should escape them with a backslash (\\).\n" - " All colons that are not option separators should be escaped (see the examples above and below).\n" - " You can specify a header without escaping the colons, but that way you will not be able to put colons\n" - " in the header value itself, as they will be interpreted by hydra as option separators.\n" - "\nExamples:\n" - " \"/login.php:user=^USER^&pass=^PASS^:incorrect\"\n" - " \"/login.php:user=^USER^&pass=^PASS^&colon=colon\\:escape:S=authlog=.*success\"\n" - " \"/login.php:user=^USER^&pass=^PASS^&mid=123:authlog=.*failed\"\n" - " \"/:user=^USER&pass=^PASS^:failed:H=Authorization\\: Basic dT1w:H=Cookie\\: sessid=aaaa:h=X-User\\: ^USER^:H=User-Agent\\: wget\"\n" - " \"/exchweb/bin/auth/owaauth.dll:destination=http%%3A%%2F%%2F%%2Fexchange&flags=0&username=%%5C^USER^&password=^PASS^&SubmitCreds=x&trusted=0:reason=:C=/exchweb\"\n", - hydra_options.service); - find = 1; - } - if (!find && (strcmp(hydra_options.service, "http-proxy") == 0)) { - printf("Module http-proxy is optionally taking the page to authenticate at.\n" - "Default is http://www.microsoft.com/)\n" "Basic, DIGEST-MD5 and NTLM are supported and negotiated automatically.\n\n"); - find = 1; - } - if (!find && (strcmp(hydra_options.service, "http-proxy-urlenum") == 0)) { - printf("Module http-proxy-urlenum only uses the -L option, not -x or -p/-P option.\n" - "The -L loginfile must contain the URL list to try through the proxy.\n" - "The proxy credentials cann be put as the optional parameter, e.g.\n" - " hydra -L urllist.txt -s 3128 target.com http-proxy-urlenum user:pass\n" " hydra -L urllist.txt http-proxy-urlenum://target.com:3128/user:pass\n\n"); - find = 1; - } - if (!find && (strncmp(hydra_options.service, "snmp", 4) == 0)) { - printf("Module snmp is optionally taking the following parameters:\n"); - printf(" READ perform read requests (default)\n"); - printf(" WRITE perform write requests\n"); - printf(" 1 use SNMP version 1 (default)\n"); - printf(" 2 use SNMP version 2\n"); - printf(" 3 use SNMP version 3\n"); - printf(" Note that SNMP version 3 usually uses both login and passwords!\n"); - printf(" SNMP version 3 has the following optional sub parameters:\n"); - printf(" MD5 use MD5 authentication (default)\n"); - printf(" SHA use SHA authentication\n"); - printf(" DES use DES encryption\n"); - printf(" AES use AES encryption\n"); - printf(" if no -p/-P parameter is given, SNMPv3 noauth is performed, which\n"); - printf(" only requires a password (or username) not both.\n"); - printf("To combine the options, use colons (\":\"), e.g.:\n"); - printf(" hydra -L user.txt -P pass.txt -m 3:SHA:AES:READ target.com snmp\n"); - printf(" hydra -P pass.txt -m 2 target.com snmp\n"); - find = 1; - } - if (!find && ((strcmp(hydra_options.service, "http-get") == 0) - || (strcmp(hydra_options.service, "https-get") == 0) - || (strcmp(hydra_options.service, "http-post") == 0) - || (strcmp(hydra_options.service, "https-post") == 0)) - ) { - printf("Module %s requires the page to authenticate.\n" - "For example: \"/secret\" or \"http://bla.com/foo/bar\" or \"https://test.com:8080/members\"\n\n", hydra_options.service); - find = 1; - } + if (!hydra_options.service) { + printf("The Module %s does not need or support optional parameters\n", hydra_options.service); + exit(0); } + + printf("\nHelp for module %s:\n============================================================================\n", hydra_options.service); + if ((strcmp(hydra_options.service, "oracle") == 0) || (strcmp(hydra_options.service, "ora") == 0)) { + printf("Module oracle / ora is optionally taking the ORACLE SID, default is \"ORCL\"\n\n"); + find = 1; + } + if ((strcmp(hydra_options.service, "oracle-listener") == 0) || (strcmp(hydra_options.service, "tns") == 0)) { + printf("Module oracle-listener / tns is optionally taking the mode the password is stored as, could be PLAIN (default) or CLEAR\n\n"); + find = 1; + } + if (strcmp(hydra_options.service, "cvs") == 0) { + printf("Module cvs is optionally taking the repository name to attack, default is \"/root\"\n\n"); + find = 1; + } + if (strcmp(hydra_options.service, "xmpp") == 0) { + printf("Module xmpp is optionally taking one authentication type of:\n" + " LOGIN (default), PLAIN, CRAM-MD5, DIGEST-MD5, SCRAM-SHA1\n\n" + "Note, the target passed should be a fdqn as the value is used in the Jabber init request, example: hermes.jabber.org\n\n"); + find = 1; + } + if (!find && (strcmp(hydra_options.service, "pop3") == 0)) { + printf("Module pop3 is optionally taking one authentication type of:\n" + " CLEAR (default), LOGIN, PLAIN, CRAM-MD5, CRAM-SHA1,\n" + " CRAM-SHA256, DIGEST-MD5, NTLM.\n" "Additionally TLS encryption via STLS can be enforced with the TLS option.\n\n" "Example: pop3://target/TLS:PLAIN\n"); + find = 1; + } + if (!find && (strcmp(hydra_options.service, "rdp") == 0)) { + printf("Module rdp is optionally taking the windows domain name.\n" "For example:\nhydra rdp://192.168.0.1/firstdomainname -l john -p doe\n\n"); + find = 1; + } + if (!find && (strcmp(hydra_options.service, "s7-300") == 0)) { + printf("Module S7-300 is for a special Siemens PLC. It either requires only a password or no authentication, so just use the -p or -P option.\n\n"); + find = 1; + } + if (!find && (strcmp(hydra_options.service, "nntp") == 0)) { + printf("Module nntp is optionally taking one authentication type of:\n" " USER (default), LOGIN, PLAIN, CRAM-MD5, DIGEST-MD5, NTLM\n\n"); + find = 1; + } + if (!find && (strcmp(hydra_options.service, "imap") == 0)) { + printf("Module imap is optionally taking one authentication type of:\n" + " CLEAR or APOP (default), LOGIN, PLAIN, CRAM-MD5, CRAM-SHA1,\n" + " CRAM-SHA256, DIGEST-MD5, NTLM\n" "Additionally TLS encryption via STARTTLS can be enforced with the TLS option.\n\n" "Example: imap://target/TLS:PLAIN\n"); + find = 1; + } + if (!find && (strcmp(hydra_options.service, "smtp-enum")) == 0) { + printf("Module smtp-enum is optionally taking one SMTP command of:\n\n" + "VRFY (default), EXPN, RCPT (which will connect using \"root\" account)\n" + "login parameter is used as username and password parameter as the domain name\n" + "For example to test if john@localhost exists on 192.168.0.1:\n" "hydra smtp-enum://192.168.0.1/vrfy -l john -p localhost\n\n"); + find = 1; + } + if (!find && (strcmp(hydra_options.service, "smtp")) == 0) { + printf("Module smtp is optionally taking one authentication type of:\n" + " LOGIN (default), PLAIN, CRAM-MD5, DIGEST-MD5, NTLM\n\n" + "Additionally TLS encryption via STARTTLS can be enforced with the TLS option.\n\n" "Example: smtp://target/TLS:PLAIN\n"); + find = 1; + } + if (!find && (strcmp(hydra_options.service, "svn") == 0)) { + printf("Module svn is optionally taking the repository name to attack, default is \"trunk\"\n\n"); + find = 1; + } + if (!find && (strcmp(hydra_options.service, "ncp") == 0)) { + printf("Module ncp is optionally taking the full context, for example \".O=cx\"\n\n"); + find = 1; + } + if (!find && (strcmp(hydra_options.service, "firebird") == 0)) { + printf("Module firebird is optionally taking the database path to attack,\n" "default is \"C:\\Program Files\\Firebird\\Firebird_1_5\\security.fdb\"\n\n"); + find = 1; + } + if (!find && (strcmp(hydra_options.service, "mysql") == 0)) { + printf("Module mysql is optionally taking the database to attack, default is \"mysql\"\n\n"); + find = 1; + } + if (!find && (strcmp(hydra_options.service, "irc") == 0)) { + printf("Module irc is optionally taking the general server password, if the server is requiring one\n" "and none is passed the password from -p/-P will be used\n\n"); + find = 1; + } + if (!find && (strcmp(hydra_options.service, "postgres") == 0)) { + printf("Module postgres is optionally taking the database to attack, default is \"template1\"\n\n"); + find = 1; + } + if (!find && (strcmp(hydra_options.service, "telnet") == 0)) { + printf("Module telnet is optionally taking the string which is displayed after\n" + "a successful login (case insensitive), use if the default in the telnet\n" "module produces too many false positives\n\n"); + find = 1; + } + if (!find && (strcmp(hydra_options.service, "sapr3") == 0)) { + printf("Module sapr3 requires the client id, a number between 0 and 99\n\n"); + find = 1; + } + if (!find && (strcmp(hydra_options.service, "sshkey") == 0)) { + printf("Module sshkey does not provide additional options, although the semantic for\n" + "options -p and -P is changed:\n" + " -p expects a path to an unencrypted private key in PEM format.\n" + " -P expects a filename containing a list of path to some unencrypted\n" " private keys in PEM format.\n\n"); + find = 1; + } + if (!find && (strcmp(hydra_options.service, "cisco-enable") == 0)) { + printf("Module cisco-enable is optionally taking the logon password for the cisco device\n" + "Note: if AAA authentication is used, use the -l option for the username\n" + "and the optional parameter for the password of the user.\n" + "Examples:\n" + " hydra -P pass.txt target cisco-enable (direct console access)\n" + " hydra -P pass.txt -m cisco target cisco-enable (Logon password cisco)\n" + " hydra -l foo -m bar -P pass.txt target cisco-enable (AAA Login foo, password bar)\n"); + find = 1; + } + if (!find && (strcmp(hydra_options.service, "cisco") == 0)) { + printf("Module cisco is optionally taking the keyword ENTER, it then sends an initial\n" "ENTER when connecting to the service.\n"); + find = 1; + } + if (!find && ((strcmp(hydra_options.service, "ldap2") == 0) + || (strcmp(hydra_options.service, "ldap3") == 0) + || (strcmp(hydra_options.service, "ldap3-crammd5") == 0) + || (strcmp(hydra_options.service, "ldap3-digestmd5") == 0)) + ) { + printf("Module %s is optionally taking the DN (depending of the auth method choosed\n" + "Note: you can also specify the DN as login when Simple auth method is used).\n" + "The keyword \"^USER^\" is replaced with the login.\n" + "Special notes for Simple method has 3 operation modes: anonymous, (no user no pass),\n" + "unauthenticated (user but no pass), user/pass authenticated (user and pass).\n" + "So don't forget to set empty string as user/pass to test all modes.\n" + "Hint: to authenticate to a windows active directy ldap, this is usually\n" + " cn=^USER^,cn=users,dc=foo,dc=bar,dc=com for domain foo.bar.com\n\n", hydra_options.service); + find = 1; + } + if (!find && ((strcmp(hydra_options.service, "smb") == 0) || (strcmp(hydra_options.service, "smbnt") == 0))) { + printf("Module smb default value is set to test both local and domain account, using a simple password with NTLM dialect.\n" + "Note: you can set the group type using LOCAL or DOMAIN keyword\n" + " or other_domain:{value} to specify a trusted domain.\n" + " you can set the password type using HASH or MACHINE keyword\n" + " (to use the Machine's NetBIOS name as the password).\n" + " you can set the dialect using NTLMV2, NTLM, LMV2, LM keyword.\n" + "Example: \n" + " hydra smb://microsoft.com -l admin -p tooeasy -m \"local lmv2\"\n" + " hydra smb://microsoft.com -l admin -p D5731CFC6C2A069C21FD0D49CAEBC9EA:2126EE7712D37E265FD63F2C84D2B13D::: -m \"local hash\"\n" + " hydra smb://microsoft.com -l admin -p tooeasy -m \"other_domain:SECONDDOMAIN\"\n\n"); + find = 1; + } + if (!find && ((strcmp(hydra_options.service, "http-get-form") == 0) + || (strcmp(hydra_options.service, "https-get-form") == 0) + || (strcmp(hydra_options.service, "http-post-form") == 0) + || (strcmp(hydra_options.service, "https-post-form") == 0) + || (strncmp(hydra_options.service, "http-form", 9) == 0) + || (strncmp(hydra_options.service, "https-form", 10) == 0) + ) + ) { + printf("Module %s requires the page and the parameters for the web form.\n\n" + "By default this module is configured to follow a maximum of 5 redirections in\n" + "a row. It always gathers a new cookie from the same URL without variables\n" + "The parameters take three \":\" separated values, plus optional values.\n" + "(Note: if you need a colon in the option string as value, escape it with \"\\:\", but do not escape a \"\\\" with \"\\\\\".)\n" + "\nSyntax: ::[:[:]\n" + "First is the page on the server to GET or POST to (URL).\n" + "Second is the POST/GET variables (taken from either the browser, proxy, etc.\n" + " with usernames and passwords being replaced in the \"^USER^\" and \"^PASS^\"\n" + " placeholders (FORM PARAMETERS)\n" + "Third is the string that it checks for an *invalid* login (by default)\n" + " Invalid condition login check can be preceded by \"F=\", successful condition\n" + " login check must be preceded by \"S=\".\n" + " This is where most people get it wrong. You have to check the webapp what a\n" + " failed string looks like and put it in this parameter!\n" + "The following parameters are optional:\n" + " C=/page/uri to define a different page to gather initial cookies from\n" + " (h|H)=My-Hdr\\: foo to send a user defined HTTP header with each request\n" + " ^USER^ and ^PASS^ can also be put into these headers!\n" + " Note: 'h' will add the user-defined header at the end\n" + " regardless it's already being sent by Hydra or not.\n" + " 'H' will replace the value of that header if it exists, by the\n" + " one supplied by the user, or add the header at the end\n" + "Note that if you are going to put colons (:) in your headers you should escape them with a backslash (\\).\n" + " All colons that are not option separators should be escaped (see the examples above and below).\n" + " You can specify a header without escaping the colons, but that way you will not be able to put colons\n" + " in the header value itself, as they will be interpreted by hydra as option separators.\n" + "\nExamples:\n" + " \"/login.php:user=^USER^&pass=^PASS^:incorrect\"\n" + " \"/login.php:user=^USER^&pass=^PASS^&colon=colon\\:escape:S=authlog=.*success\"\n" + " \"/login.php:user=^USER^&pass=^PASS^&mid=123:authlog=.*failed\"\n" + " \"/:user=^USER&pass=^PASS^:failed:H=Authorization\\: Basic dT1w:H=Cookie\\: sessid=aaaa:h=X-User\\: ^USER^:H=User-Agent\\: wget\"\n" + " \"/exchweb/bin/auth/owaauth.dll:destination=http%%3A%%2F%%2F%%2Fexchange&flags=0&username=%%5C^USER^&password=^PASS^&SubmitCreds=x&trusted=0:reason=:C=/exchweb\"\n", + hydra_options.service); + find = 1; + } + if (!find && (strcmp(hydra_options.service, "http-proxy") == 0)) { + printf("Module http-proxy is optionally taking the page to authenticate at.\n" + "Default is http://www.microsoft.com/)\n" "Basic, DIGEST-MD5 and NTLM are supported and negotiated automatically.\n\n"); + find = 1; + } + if (!find && (strcmp(hydra_options.service, "http-proxy-urlenum") == 0)) { + printf("Module http-proxy-urlenum only uses the -L option, not -x or -p/-P option.\n" + "The -L loginfile must contain the URL list to try through the proxy.\n" + "The proxy credentials cann be put as the optional parameter, e.g.\n" + " hydra -L urllist.txt -s 3128 target.com http-proxy-urlenum user:pass\n" " hydra -L urllist.txt http-proxy-urlenum://target.com:3128/user:pass\n\n"); + find = 1; + } + if (!find && (strncmp(hydra_options.service, "snmp", 4) == 0)) { + printf("Module snmp is optionally taking the following parameters:\n"); + printf(" READ perform read requests (default)\n"); + printf(" WRITE perform write requests\n"); + printf(" 1 use SNMP version 1 (default)\n"); + printf(" 2 use SNMP version 2\n"); + printf(" 3 use SNMP version 3\n"); + printf(" Note that SNMP version 3 usually uses both login and passwords!\n"); + printf(" SNMP version 3 has the following optional sub parameters:\n"); + printf(" MD5 use MD5 authentication (default)\n"); + printf(" SHA use SHA authentication\n"); + printf(" DES use DES encryption\n"); + printf(" AES use AES encryption\n"); + printf(" if no -p/-P parameter is given, SNMPv3 noauth is performed, which\n"); + printf(" only requires a password (or username) not both.\n"); + printf("To combine the options, use colons (\":\"), e.g.:\n"); + printf(" hydra -L user.txt -P pass.txt -m 3:SHA:AES:READ target.com snmp\n"); + printf(" hydra -P pass.txt -m 2 target.com snmp\n"); + find = 1; + } + if (!find && ((strcmp(hydra_options.service, "http-get") == 0) + || (strcmp(hydra_options.service, "https-get") == 0) + || (strcmp(hydra_options.service, "http-post") == 0) + || (strcmp(hydra_options.service, "https-post") == 0)) + ) { + printf("Module %s requires the page to authenticate.\n" + "For example: \"/secret\" or \"http://bla.com/foo/bar\" or \"https://test.com:8080/members\"\n\n", hydra_options.service); + find = 1; + } + if (!find) // this is also printed if the module does not exist at all printf("The Module %s does not need or support optional parameters\n", hydra_options.service); exit(0); From 9265272a3ed70277fc2059d834905f6f24a75611 Mon Sep 17 00:00:00 2001 From: Diadlo Date: Wed, 21 Jun 2017 23:17:32 +0300 Subject: [PATCH 042/531] Use early return instead of 'find' flag It's increase performance --- hydra.c | 137 +++++++++++++++++++++++++++----------------------------- 1 file changed, 67 insertions(+), 70 deletions(-) diff --git a/hydra.c b/hydra.c index 15507be..1d81e02 100644 --- a/hydra.c +++ b/hydra.c @@ -448,8 +448,6 @@ void help_bfg() { } void module_usage() { - int find = 0; - if (!hydra_options.service) { printf("The Module %s does not need or support optional parameters\n", hydra_options.service); exit(0); @@ -458,100 +456,100 @@ void module_usage() { printf("\nHelp for module %s:\n============================================================================\n", hydra_options.service); if ((strcmp(hydra_options.service, "oracle") == 0) || (strcmp(hydra_options.service, "ora") == 0)) { printf("Module oracle / ora is optionally taking the ORACLE SID, default is \"ORCL\"\n\n"); - find = 1; + return; } if ((strcmp(hydra_options.service, "oracle-listener") == 0) || (strcmp(hydra_options.service, "tns") == 0)) { printf("Module oracle-listener / tns is optionally taking the mode the password is stored as, could be PLAIN (default) or CLEAR\n\n"); - find = 1; + return; } if (strcmp(hydra_options.service, "cvs") == 0) { printf("Module cvs is optionally taking the repository name to attack, default is \"/root\"\n\n"); - find = 1; + return; } if (strcmp(hydra_options.service, "xmpp") == 0) { printf("Module xmpp is optionally taking one authentication type of:\n" " LOGIN (default), PLAIN, CRAM-MD5, DIGEST-MD5, SCRAM-SHA1\n\n" "Note, the target passed should be a fdqn as the value is used in the Jabber init request, example: hermes.jabber.org\n\n"); - find = 1; + return; } - if (!find && (strcmp(hydra_options.service, "pop3") == 0)) { + if (strcmp(hydra_options.service, "pop3") == 0) { printf("Module pop3 is optionally taking one authentication type of:\n" " CLEAR (default), LOGIN, PLAIN, CRAM-MD5, CRAM-SHA1,\n" " CRAM-SHA256, DIGEST-MD5, NTLM.\n" "Additionally TLS encryption via STLS can be enforced with the TLS option.\n\n" "Example: pop3://target/TLS:PLAIN\n"); - find = 1; + return; } - if (!find && (strcmp(hydra_options.service, "rdp") == 0)) { + if (strcmp(hydra_options.service, "rdp") == 0) { printf("Module rdp is optionally taking the windows domain name.\n" "For example:\nhydra rdp://192.168.0.1/firstdomainname -l john -p doe\n\n"); - find = 1; + return; } - if (!find && (strcmp(hydra_options.service, "s7-300") == 0)) { + if (strcmp(hydra_options.service, "s7-300") == 0) { printf("Module S7-300 is for a special Siemens PLC. It either requires only a password or no authentication, so just use the -p or -P option.\n\n"); - find = 1; + return; } - if (!find && (strcmp(hydra_options.service, "nntp") == 0)) { + if (strcmp(hydra_options.service, "nntp") == 0) { printf("Module nntp is optionally taking one authentication type of:\n" " USER (default), LOGIN, PLAIN, CRAM-MD5, DIGEST-MD5, NTLM\n\n"); - find = 1; + return; } - if (!find && (strcmp(hydra_options.service, "imap") == 0)) { + if (strcmp(hydra_options.service, "imap") == 0) { printf("Module imap is optionally taking one authentication type of:\n" " CLEAR or APOP (default), LOGIN, PLAIN, CRAM-MD5, CRAM-SHA1,\n" " CRAM-SHA256, DIGEST-MD5, NTLM\n" "Additionally TLS encryption via STARTTLS can be enforced with the TLS option.\n\n" "Example: imap://target/TLS:PLAIN\n"); - find = 1; + return; } - if (!find && (strcmp(hydra_options.service, "smtp-enum")) == 0) { + if (strcmp(hydra_options.service, "smtp-enum") == 0) { printf("Module smtp-enum is optionally taking one SMTP command of:\n\n" "VRFY (default), EXPN, RCPT (which will connect using \"root\" account)\n" "login parameter is used as username and password parameter as the domain name\n" "For example to test if john@localhost exists on 192.168.0.1:\n" "hydra smtp-enum://192.168.0.1/vrfy -l john -p localhost\n\n"); - find = 1; + return; } - if (!find && (strcmp(hydra_options.service, "smtp")) == 0) { + if (strcmp(hydra_options.service, "smtp") == 0) { printf("Module smtp is optionally taking one authentication type of:\n" " LOGIN (default), PLAIN, CRAM-MD5, DIGEST-MD5, NTLM\n\n" "Additionally TLS encryption via STARTTLS can be enforced with the TLS option.\n\n" "Example: smtp://target/TLS:PLAIN\n"); - find = 1; + return; } - if (!find && (strcmp(hydra_options.service, "svn") == 0)) { + if (strcmp(hydra_options.service, "svn") == 0) { printf("Module svn is optionally taking the repository name to attack, default is \"trunk\"\n\n"); - find = 1; + return; } - if (!find && (strcmp(hydra_options.service, "ncp") == 0)) { + if (strcmp(hydra_options.service, "ncp") == 0) { printf("Module ncp is optionally taking the full context, for example \".O=cx\"\n\n"); - find = 1; + return; } - if (!find && (strcmp(hydra_options.service, "firebird") == 0)) { + if (strcmp(hydra_options.service, "firebird") == 0) { printf("Module firebird is optionally taking the database path to attack,\n" "default is \"C:\\Program Files\\Firebird\\Firebird_1_5\\security.fdb\"\n\n"); - find = 1; + return; } - if (!find && (strcmp(hydra_options.service, "mysql") == 0)) { + if (strcmp(hydra_options.service, "mysql") == 0) { printf("Module mysql is optionally taking the database to attack, default is \"mysql\"\n\n"); - find = 1; + return; } - if (!find && (strcmp(hydra_options.service, "irc") == 0)) { + if (strcmp(hydra_options.service, "irc") == 0) { printf("Module irc is optionally taking the general server password, if the server is requiring one\n" "and none is passed the password from -p/-P will be used\n\n"); - find = 1; + return; } - if (!find && (strcmp(hydra_options.service, "postgres") == 0)) { + if (strcmp(hydra_options.service, "postgres") == 0) { printf("Module postgres is optionally taking the database to attack, default is \"template1\"\n\n"); - find = 1; + return; } - if (!find && (strcmp(hydra_options.service, "telnet") == 0)) { + if (strcmp(hydra_options.service, "telnet") == 0) { printf("Module telnet is optionally taking the string which is displayed after\n" "a successful login (case insensitive), use if the default in the telnet\n" "module produces too many false positives\n\n"); - find = 1; + return; } - if (!find && (strcmp(hydra_options.service, "sapr3") == 0)) { + if (strcmp(hydra_options.service, "sapr3") == 0) { printf("Module sapr3 requires the client id, a number between 0 and 99\n\n"); - find = 1; + return; } - if (!find && (strcmp(hydra_options.service, "sshkey") == 0)) { + if (strcmp(hydra_options.service, "sshkey") == 0) { printf("Module sshkey does not provide additional options, although the semantic for\n" "options -p and -P is changed:\n" " -p expects a path to an unencrypted private key in PEM format.\n" " -P expects a filename containing a list of path to some unencrypted\n" " private keys in PEM format.\n\n"); - find = 1; + return; } - if (!find && (strcmp(hydra_options.service, "cisco-enable") == 0)) { + if (strcmp(hydra_options.service, "cisco-enable") == 0) { printf("Module cisco-enable is optionally taking the logon password for the cisco device\n" "Note: if AAA authentication is used, use the -l option for the username\n" "and the optional parameter for the password of the user.\n" @@ -559,16 +557,16 @@ void module_usage() { " hydra -P pass.txt target cisco-enable (direct console access)\n" " hydra -P pass.txt -m cisco target cisco-enable (Logon password cisco)\n" " hydra -l foo -m bar -P pass.txt target cisco-enable (AAA Login foo, password bar)\n"); - find = 1; + return; } - if (!find && (strcmp(hydra_options.service, "cisco") == 0)) { + if (strcmp(hydra_options.service, "cisco") == 0) { printf("Module cisco is optionally taking the keyword ENTER, it then sends an initial\n" "ENTER when connecting to the service.\n"); - find = 1; + return; } - if (!find && ((strcmp(hydra_options.service, "ldap2") == 0) - || (strcmp(hydra_options.service, "ldap3") == 0) - || (strcmp(hydra_options.service, "ldap3-crammd5") == 0) - || (strcmp(hydra_options.service, "ldap3-digestmd5") == 0)) + if ((strcmp(hydra_options.service, "ldap2") == 0) + || (strcmp(hydra_options.service, "ldap3") == 0) + || (strcmp(hydra_options.service, "ldap3-crammd5") == 0) + || (strcmp(hydra_options.service, "ldap3-digestmd5") == 0) ) { printf("Module %s is optionally taking the DN (depending of the auth method choosed\n" "Note: you can also specify the DN as login when Simple auth method is used).\n" @@ -578,9 +576,9 @@ void module_usage() { "So don't forget to set empty string as user/pass to test all modes.\n" "Hint: to authenticate to a windows active directy ldap, this is usually\n" " cn=^USER^,cn=users,dc=foo,dc=bar,dc=com for domain foo.bar.com\n\n", hydra_options.service); - find = 1; + return; } - if (!find && ((strcmp(hydra_options.service, "smb") == 0) || (strcmp(hydra_options.service, "smbnt") == 0))) { + if ((strcmp(hydra_options.service, "smb") == 0) || (strcmp(hydra_options.service, "smbnt") == 0)) { printf("Module smb default value is set to test both local and domain account, using a simple password with NTLM dialect.\n" "Note: you can set the group type using LOCAL or DOMAIN keyword\n" " or other_domain:{value} to specify a trusted domain.\n" @@ -591,15 +589,15 @@ void module_usage() { " hydra smb://microsoft.com -l admin -p tooeasy -m \"local lmv2\"\n" " hydra smb://microsoft.com -l admin -p D5731CFC6C2A069C21FD0D49CAEBC9EA:2126EE7712D37E265FD63F2C84D2B13D::: -m \"local hash\"\n" " hydra smb://microsoft.com -l admin -p tooeasy -m \"other_domain:SECONDDOMAIN\"\n\n"); - find = 1; + return; } - if (!find && ((strcmp(hydra_options.service, "http-get-form") == 0) - || (strcmp(hydra_options.service, "https-get-form") == 0) - || (strcmp(hydra_options.service, "http-post-form") == 0) - || (strcmp(hydra_options.service, "https-post-form") == 0) - || (strncmp(hydra_options.service, "http-form", 9) == 0) - || (strncmp(hydra_options.service, "https-form", 10) == 0) - ) + if ((strcmp(hydra_options.service, "http-get-form") == 0) + || (strcmp(hydra_options.service, "https-get-form") == 0) + || (strcmp(hydra_options.service, "http-post-form") == 0) + || (strcmp(hydra_options.service, "https-post-form") == 0) + || (strncmp(hydra_options.service, "http-form", 9) == 0) + || (strncmp(hydra_options.service, "https-form", 10) == 0) + ) { printf("Module %s requires the page and the parameters for the web form.\n\n" "By default this module is configured to follow a maximum of 5 redirections in\n" @@ -635,21 +633,21 @@ void module_usage() { " \"/:user=^USER&pass=^PASS^:failed:H=Authorization\\: Basic dT1w:H=Cookie\\: sessid=aaaa:h=X-User\\: ^USER^:H=User-Agent\\: wget\"\n" " \"/exchweb/bin/auth/owaauth.dll:destination=http%%3A%%2F%%2F%%2Fexchange&flags=0&username=%%5C^USER^&password=^PASS^&SubmitCreds=x&trusted=0:reason=:C=/exchweb\"\n", hydra_options.service); - find = 1; + return; } - if (!find && (strcmp(hydra_options.service, "http-proxy") == 0)) { + if (strcmp(hydra_options.service, "http-proxy") == 0) { printf("Module http-proxy is optionally taking the page to authenticate at.\n" "Default is http://www.microsoft.com/)\n" "Basic, DIGEST-MD5 and NTLM are supported and negotiated automatically.\n\n"); - find = 1; + return; } - if (!find && (strcmp(hydra_options.service, "http-proxy-urlenum") == 0)) { + if (strcmp(hydra_options.service, "http-proxy-urlenum") == 0) { printf("Module http-proxy-urlenum only uses the -L option, not -x or -p/-P option.\n" "The -L loginfile must contain the URL list to try through the proxy.\n" "The proxy credentials cann be put as the optional parameter, e.g.\n" " hydra -L urllist.txt -s 3128 target.com http-proxy-urlenum user:pass\n" " hydra -L urllist.txt http-proxy-urlenum://target.com:3128/user:pass\n\n"); - find = 1; + return; } - if (!find && (strncmp(hydra_options.service, "snmp", 4) == 0)) { + if (strncmp(hydra_options.service, "snmp", 4) == 0) { printf("Module snmp is optionally taking the following parameters:\n"); printf(" READ perform read requests (default)\n"); printf(" WRITE perform write requests\n"); @@ -667,20 +665,19 @@ void module_usage() { printf("To combine the options, use colons (\":\"), e.g.:\n"); printf(" hydra -L user.txt -P pass.txt -m 3:SHA:AES:READ target.com snmp\n"); printf(" hydra -P pass.txt -m 2 target.com snmp\n"); - find = 1; + return; } - if (!find && ((strcmp(hydra_options.service, "http-get") == 0) - || (strcmp(hydra_options.service, "https-get") == 0) - || (strcmp(hydra_options.service, "http-post") == 0) - || (strcmp(hydra_options.service, "https-post") == 0)) + if ((strcmp(hydra_options.service, "http-get") == 0) + || (strcmp(hydra_options.service, "https-get") == 0) + || (strcmp(hydra_options.service, "http-post") == 0) + || (strcmp(hydra_options.service, "https-post") == 0) ) { printf("Module %s requires the page to authenticate.\n" "For example: \"/secret\" or \"http://bla.com/foo/bar\" or \"https://test.com:8080/members\"\n\n", hydra_options.service); - find = 1; + return; } - if (!find) // this is also printed if the module does not exist at all - printf("The Module %s does not need or support optional parameters\n", hydra_options.service); + printf("The Module %s does not need or support optional parameters\n", hydra_options.service); exit(0); } From 7e09c0b43eb29abb2c4457f69ca87e17324a6328 Mon Sep 17 00:00:00 2001 From: Diadlo Date: Thu, 22 Jun 2017 00:36:57 +0300 Subject: [PATCH 043/531] Extrace each module usage in separate function --- hydra.c | 356 +++++++++++++++++++++++++++++++++++++------------------- 1 file changed, 236 insertions(+), 120 deletions(-) diff --git a/hydra.c b/hydra.c index 1d81e02..ecc5634 100644 --- a/hydra.c +++ b/hydra.c @@ -447,6 +447,213 @@ void help_bfg() { exit(-1); } +void usage_oracle(const char* service) { + printf("Module oracle / ora is optionally taking the ORACLE SID, default is \"ORCL\"\n\n"); +} + +void usage_oracle_listener(const char* service) { + printf("Module oracle-listener / tns is optionally taking the mode the password is stored as, could be PLAIN (default) or CLEAR\n\n"); +} + +void usage_cvs(const char* service) { + printf("Module cvs is optionally taking the repository name to attack, default is \"/root\"\n\n"); +} + +void usage_xmpp(const char* service) { + printf("Module xmpp is optionally taking one authentication type of:\n" + " LOGIN (default), PLAIN, CRAM-MD5, DIGEST-MD5, SCRAM-SHA1\n\n" + "Note, the target passed should be a fdqn as the value is used in the Jabber init request, example: hermes.jabber.org\n\n"); +} + +void usage_pop3(const char* service) { + printf("Module pop3 is optionally taking one authentication type of:\n" + " CLEAR (default), LOGIN, PLAIN, CRAM-MD5, CRAM-SHA1,\n" + " CRAM-SHA256, DIGEST-MD5, NTLM.\n" "Additionally TLS encryption via STLS can be enforced with the TLS option.\n\n" "Example: pop3://target/TLS:PLAIN\n"); +} + +void usage_rdp(const char* service) { + printf("Module rdp is optionally taking the windows domain name.\n" "For example:\nhydra rdp://192.168.0.1/firstdomainname -l john -p doe\n\n"); +} + +void usage_s7_300(const char* service) { + printf("Module S7-300 is for a special Siemens PLC. It either requires only a password or no authentication, so just use the -p or -P option.\n\n"); +} + +void usage_nntp(const char* service) { + printf("Module nntp is optionally taking one authentication type of:\n" " USER (default), LOGIN, PLAIN, CRAM-MD5, DIGEST-MD5, NTLM\n\n"); +} + +void usage_imap(const char* service) { + printf("Module imap is optionally taking one authentication type of:\n" + " CLEAR or APOP (default), LOGIN, PLAIN, CRAM-MD5, CRAM-SHA1,\n" + " CRAM-SHA256, DIGEST-MD5, NTLM\n" "Additionally TLS encryption via STARTTLS can be enforced with the TLS option.\n\n" "Example: imap://target/TLS:PLAIN\n"); +} + +void usage_smtp_enum(const char* service) { + printf("Module smtp-enum is optionally taking one SMTP command of:\n\n" + "VRFY (default), EXPN, RCPT (which will connect using \"root\" account)\n" + "login parameter is used as username and password parameter as the domain name\n" + "For example to test if john@localhost exists on 192.168.0.1:\n" "hydra smtp-enum://192.168.0.1/vrfy -l john -p localhost\n\n"); +} + +void usage_smtp(const char* service) { + printf("Module smtp is optionally taking one authentication type of:\n" + " LOGIN (default), PLAIN, CRAM-MD5, DIGEST-MD5, NTLM\n\n" + "Additionally TLS encryption via STARTTLS can be enforced with the TLS option.\n\n" "Example: smtp://target/TLS:PLAIN\n"); +} + +void usage_svn(const char* service) { + printf("Module svn is optionally taking the repository name to attack, default is \"trunk\"\n\n"); +} + +void usage_ncp(const char* service) { + printf("Module ncp is optionally taking the full context, for example \".O=cx\"\n\n"); +} + +void usage_firebird(const char* service) { + printf("Module firebird is optionally taking the database path to attack,\n" "default is \"C:\\Program Files\\Firebird\\Firebird_1_5\\security.fdb\"\n\n"); +} + +void usage_mysql(const char* service) { + printf("Module mysql is optionally taking the database to attack, default is \"mysql\"\n\n"); +} + +void usage_irc(const char* service) { + printf("Module irc is optionally taking the general server password, if the server is requiring one\n" "and none is passed the password from -p/-P will be used\n\n"); +} + +void usage_postgres(const char* service) { + printf("Module postgres is optionally taking the database to attack, default is \"template1\"\n\n"); +} + +void usage_telnet(const char* service) { + printf("Module telnet is optionally taking the string which is displayed after\n" + "a successful login (case insensitive), use if the default in the telnet\n" "module produces too many false positives\n\n"); +} + +void usage_sapr3(const char* service) { + printf("Module sapr3 requires the client id, a number between 0 and 99\n\n"); +} + +void usage_sshkey(const char* service) { + printf("Module sshkey does not provide additional options, although the semantic for\n" + "options -p and -P is changed:\n" + " -p expects a path to an unencrypted private key in PEM format.\n" + " -P expects a filename containing a list of path to some unencrypted\n" " private keys in PEM format.\n\n"); +} + +void usage_cisco_enable(const char* service) { + printf("Module cisco-enable is optionally taking the logon password for the cisco device\n" + "Note: if AAA authentication is used, use the -l option for the username\n" + "and the optional parameter for the password of the user.\n" + "Examples:\n" + " hydra -P pass.txt target cisco-enable (direct console access)\n" + " hydra -P pass.txt -m cisco target cisco-enable (Logon password cisco)\n" + " hydra -l foo -m bar -P pass.txt target cisco-enable (AAA Login foo, password bar)\n"); +} + +void usage_cisco(const char* service) { + printf("Module cisco is optionally taking the keyword ENTER, it then sends an initial\n" "ENTER when connecting to the service.\n"); +} + +void usage_ldap(const char* service) { + printf("Module %s is optionally taking the DN (depending of the auth method choosed\n" + "Note: you can also specify the DN as login when Simple auth method is used).\n" + "The keyword \"^USER^\" is replaced with the login.\n" + "Special notes for Simple method has 3 operation modes: anonymous, (no user no pass),\n" + "unauthenticated (user but no pass), user/pass authenticated (user and pass).\n" + "So don't forget to set empty string as user/pass to test all modes.\n" + "Hint: to authenticate to a windows active directy ldap, this is usually\n" + " cn=^USER^,cn=users,dc=foo,dc=bar,dc=com for domain foo.bar.com\n\n", service); +} + +void usage_smb(const char* service) { + printf("Module smb default value is set to test both local and domain account, using a simple password with NTLM dialect.\n" + "Note: you can set the group type using LOCAL or DOMAIN keyword\n" + " or other_domain:{value} to specify a trusted domain.\n" + " you can set the password type using HASH or MACHINE keyword\n" + " (to use the Machine's NetBIOS name as the password).\n" + " you can set the dialect using NTLMV2, NTLM, LMV2, LM keyword.\n" + "Example: \n" + " hydra smb://microsoft.com -l admin -p tooeasy -m \"local lmv2\"\n" + " hydra smb://microsoft.com -l admin -p D5731CFC6C2A069C21FD0D49CAEBC9EA:2126EE7712D37E265FD63F2C84D2B13D::: -m \"local hash\"\n" + " hydra smb://microsoft.com -l admin -p tooeasy -m \"other_domain:SECONDDOMAIN\"\n\n"); +} + +void usage_http_form(const char* service) { + printf("Module %s requires the page and the parameters for the web form.\n\n" + "By default this module is configured to follow a maximum of 5 redirections in\n" + "a row. It always gathers a new cookie from the same URL without variables\n" + "The parameters take three \":\" separated values, plus optional values.\n" + "(Note: if you need a colon in the option string as value, escape it with \"\\:\", but do not escape a \"\\\" with \"\\\\\".)\n" + "\nSyntax: ::[:[:]\n" + "First is the page on the server to GET or POST to (URL).\n" + "Second is the POST/GET variables (taken from either the browser, proxy, etc.\n" + " with usernames and passwords being replaced in the \"^USER^\" and \"^PASS^\"\n" + " placeholders (FORM PARAMETERS)\n" + "Third is the string that it checks for an *invalid* login (by default)\n" + " Invalid condition login check can be preceded by \"F=\", successful condition\n" + " login check must be preceded by \"S=\".\n" + " This is where most people get it wrong. You have to check the webapp what a\n" + " failed string looks like and put it in this parameter!\n" + "The following parameters are optional:\n" + " C=/page/uri to define a different page to gather initial cookies from\n" + " (h|H)=My-Hdr\\: foo to send a user defined HTTP header with each request\n" + " ^USER^ and ^PASS^ can also be put into these headers!\n" + " Note: 'h' will add the user-defined header at the end\n" + " regardless it's already being sent by Hydra or not.\n" + " 'H' will replace the value of that header if it exists, by the\n" + " one supplied by the user, or add the header at the end\n" + "Note that if you are going to put colons (:) in your headers you should escape them with a backslash (\\).\n" + " All colons that are not option separators should be escaped (see the examples above and below).\n" + " You can specify a header without escaping the colons, but that way you will not be able to put colons\n" + " in the header value itself, as they will be interpreted by hydra as option separators.\n" + "\nExamples:\n" + " \"/login.php:user=^USER^&pass=^PASS^:incorrect\"\n" + " \"/login.php:user=^USER^&pass=^PASS^&colon=colon\\:escape:S=authlog=.*success\"\n" + " \"/login.php:user=^USER^&pass=^PASS^&mid=123:authlog=.*failed\"\n" + " \"/:user=^USER&pass=^PASS^:failed:H=Authorization\\: Basic dT1w:H=Cookie\\: sessid=aaaa:h=X-User\\: ^USER^:H=User-Agent\\: wget\"\n" + " \"/exchweb/bin/auth/owaauth.dll:destination=http%%3A%%2F%%2F%%2Fexchange&flags=0&username=%%5C^USER^&password=^PASS^&SubmitCreds=x&trusted=0:reason=:C=/exchweb\"\n", + service); +} + +void usage_http_proxy(const char* service) { + printf("Module http-proxy is optionally taking the page to authenticate at.\n" + "Default is http://www.microsoft.com/)\n" "Basic, DIGEST-MD5 and NTLM are supported and negotiated automatically.\n\n"); +} + +void usage_http_proxy_urlenum(const char* service) { + printf("Module http-proxy-urlenum only uses the -L option, not -x or -p/-P option.\n" + "The -L loginfile must contain the URL list to try through the proxy.\n" + "The proxy credentials cann be put as the optional parameter, e.g.\n" + " hydra -L urllist.txt -s 3128 target.com http-proxy-urlenum user:pass\n" " hydra -L urllist.txt http-proxy-urlenum://target.com:3128/user:pass\n\n"); +} + +void usage_snmp(const char* service) { + printf("Module snmp is optionally taking the following parameters:\n" + " READ perform read requests (default)\n" + " WRITE perform write requests\n" + " 1 use SNMP version 1 (default)\n" + " 2 use SNMP version 2\n" + " 3 use SNMP version 3\n" + " Note that SNMP version 3 usually uses both login and passwords!\n" + " SNMP version 3 has the following optional sub parameters:\n" + " MD5 use MD5 authentication (default)\n" + " SHA use SHA authentication\n" + " DES use DES encryption\n" + " AES use AES encryption\n" + " if no -p/-P parameter is given, SNMPv3 noauth is performed, which\n" + " only requires a password (or username) not both.\n" + "To combine the options, use colons (\":\"), e.g.:\n" + " hydra -L user.txt -P pass.txt -m 3:SHA:AES:READ target.com snmp\n" + " hydra -P pass.txt -m 2 target.com snmp\n"); +} + +void usage_http(const char* service) { + printf("Module %s requires the page to authenticate.\n" + "For example: \"/secret\" or \"http://bla.com/foo/bar\" or \"https://test.com:8080/members\"\n\n", service); +} + void module_usage() { if (!hydra_options.service) { printf("The Module %s does not need or support optional parameters\n", hydra_options.service); @@ -455,112 +662,91 @@ void module_usage() { printf("\nHelp for module %s:\n============================================================================\n", hydra_options.service); if ((strcmp(hydra_options.service, "oracle") == 0) || (strcmp(hydra_options.service, "ora") == 0)) { - printf("Module oracle / ora is optionally taking the ORACLE SID, default is \"ORCL\"\n\n"); + usage_oracle(hydra_options.service); return; } if ((strcmp(hydra_options.service, "oracle-listener") == 0) || (strcmp(hydra_options.service, "tns") == 0)) { - printf("Module oracle-listener / tns is optionally taking the mode the password is stored as, could be PLAIN (default) or CLEAR\n\n"); + usage_oracle_listener(hydra_options.service); return; } if (strcmp(hydra_options.service, "cvs") == 0) { - printf("Module cvs is optionally taking the repository name to attack, default is \"/root\"\n\n"); + usage_cvs(hydra_options.service); return; } if (strcmp(hydra_options.service, "xmpp") == 0) { - printf("Module xmpp is optionally taking one authentication type of:\n" - " LOGIN (default), PLAIN, CRAM-MD5, DIGEST-MD5, SCRAM-SHA1\n\n" - "Note, the target passed should be a fdqn as the value is used in the Jabber init request, example: hermes.jabber.org\n\n"); + usage_xmpp(hydra_options.service); return; } if (strcmp(hydra_options.service, "pop3") == 0) { - printf("Module pop3 is optionally taking one authentication type of:\n" - " CLEAR (default), LOGIN, PLAIN, CRAM-MD5, CRAM-SHA1,\n" - " CRAM-SHA256, DIGEST-MD5, NTLM.\n" "Additionally TLS encryption via STLS can be enforced with the TLS option.\n\n" "Example: pop3://target/TLS:PLAIN\n"); + usage_pop3(hydra_options.service); return; } if (strcmp(hydra_options.service, "rdp") == 0) { - printf("Module rdp is optionally taking the windows domain name.\n" "For example:\nhydra rdp://192.168.0.1/firstdomainname -l john -p doe\n\n"); + usage_rdp(hydra_options.service); return; } if (strcmp(hydra_options.service, "s7-300") == 0) { - printf("Module S7-300 is for a special Siemens PLC. It either requires only a password or no authentication, so just use the -p or -P option.\n\n"); + usage_s7_300(hydra_options.service); return; } if (strcmp(hydra_options.service, "nntp") == 0) { - printf("Module nntp is optionally taking one authentication type of:\n" " USER (default), LOGIN, PLAIN, CRAM-MD5, DIGEST-MD5, NTLM\n\n"); + usage_nntp(hydra_options.service); return; } if (strcmp(hydra_options.service, "imap") == 0) { - printf("Module imap is optionally taking one authentication type of:\n" - " CLEAR or APOP (default), LOGIN, PLAIN, CRAM-MD5, CRAM-SHA1,\n" - " CRAM-SHA256, DIGEST-MD5, NTLM\n" "Additionally TLS encryption via STARTTLS can be enforced with the TLS option.\n\n" "Example: imap://target/TLS:PLAIN\n"); + usage_imap(hydra_options.service); return; } if (strcmp(hydra_options.service, "smtp-enum") == 0) { - printf("Module smtp-enum is optionally taking one SMTP command of:\n\n" - "VRFY (default), EXPN, RCPT (which will connect using \"root\" account)\n" - "login parameter is used as username and password parameter as the domain name\n" - "For example to test if john@localhost exists on 192.168.0.1:\n" "hydra smtp-enum://192.168.0.1/vrfy -l john -p localhost\n\n"); + usage_smtp_enum(hydra_options.service); return; } if (strcmp(hydra_options.service, "smtp") == 0) { - printf("Module smtp is optionally taking one authentication type of:\n" - " LOGIN (default), PLAIN, CRAM-MD5, DIGEST-MD5, NTLM\n\n" - "Additionally TLS encryption via STARTTLS can be enforced with the TLS option.\n\n" "Example: smtp://target/TLS:PLAIN\n"); + usage_smtp(hydra_options.service); return; } if (strcmp(hydra_options.service, "svn") == 0) { - printf("Module svn is optionally taking the repository name to attack, default is \"trunk\"\n\n"); + usage_svn(hydra_options.service); return; } if (strcmp(hydra_options.service, "ncp") == 0) { - printf("Module ncp is optionally taking the full context, for example \".O=cx\"\n\n"); + usage_ncp(hydra_options.service); return; } if (strcmp(hydra_options.service, "firebird") == 0) { - printf("Module firebird is optionally taking the database path to attack,\n" "default is \"C:\\Program Files\\Firebird\\Firebird_1_5\\security.fdb\"\n\n"); + usage_firebird(hydra_options.service); return; } if (strcmp(hydra_options.service, "mysql") == 0) { - printf("Module mysql is optionally taking the database to attack, default is \"mysql\"\n\n"); + usage_mysql(hydra_options.service); return; } if (strcmp(hydra_options.service, "irc") == 0) { - printf("Module irc is optionally taking the general server password, if the server is requiring one\n" "and none is passed the password from -p/-P will be used\n\n"); + usage_irc(hydra_options.service); return; } if (strcmp(hydra_options.service, "postgres") == 0) { - printf("Module postgres is optionally taking the database to attack, default is \"template1\"\n\n"); + usage_postgres(hydra_options.service); return; } if (strcmp(hydra_options.service, "telnet") == 0) { - printf("Module telnet is optionally taking the string which is displayed after\n" - "a successful login (case insensitive), use if the default in the telnet\n" "module produces too many false positives\n\n"); + usage_telnet(hydra_options.service); return; } if (strcmp(hydra_options.service, "sapr3") == 0) { - printf("Module sapr3 requires the client id, a number between 0 and 99\n\n"); + usage_sapr3(hydra_options.service); return; } if (strcmp(hydra_options.service, "sshkey") == 0) { - printf("Module sshkey does not provide additional options, although the semantic for\n" - "options -p and -P is changed:\n" - " -p expects a path to an unencrypted private key in PEM format.\n" - " -P expects a filename containing a list of path to some unencrypted\n" " private keys in PEM format.\n\n"); + usage_sshkey(hydra_options.service); return; } if (strcmp(hydra_options.service, "cisco-enable") == 0) { - printf("Module cisco-enable is optionally taking the logon password for the cisco device\n" - "Note: if AAA authentication is used, use the -l option for the username\n" - "and the optional parameter for the password of the user.\n" - "Examples:\n" - " hydra -P pass.txt target cisco-enable (direct console access)\n" - " hydra -P pass.txt -m cisco target cisco-enable (Logon password cisco)\n" - " hydra -l foo -m bar -P pass.txt target cisco-enable (AAA Login foo, password bar)\n"); + usage_cisco_enable(hydra_options.service); return; } if (strcmp(hydra_options.service, "cisco") == 0) { - printf("Module cisco is optionally taking the keyword ENTER, it then sends an initial\n" "ENTER when connecting to the service.\n"); + usage_cisco(hydra_options.service); return; } if ((strcmp(hydra_options.service, "ldap2") == 0) @@ -568,27 +754,11 @@ void module_usage() { || (strcmp(hydra_options.service, "ldap3-crammd5") == 0) || (strcmp(hydra_options.service, "ldap3-digestmd5") == 0) ) { - printf("Module %s is optionally taking the DN (depending of the auth method choosed\n" - "Note: you can also specify the DN as login when Simple auth method is used).\n" - "The keyword \"^USER^\" is replaced with the login.\n" - "Special notes for Simple method has 3 operation modes: anonymous, (no user no pass),\n" - "unauthenticated (user but no pass), user/pass authenticated (user and pass).\n" - "So don't forget to set empty string as user/pass to test all modes.\n" - "Hint: to authenticate to a windows active directy ldap, this is usually\n" - " cn=^USER^,cn=users,dc=foo,dc=bar,dc=com for domain foo.bar.com\n\n", hydra_options.service); + usage_ldap(hydra_options.service); return; } if ((strcmp(hydra_options.service, "smb") == 0) || (strcmp(hydra_options.service, "smbnt") == 0)) { - printf("Module smb default value is set to test both local and domain account, using a simple password with NTLM dialect.\n" - "Note: you can set the group type using LOCAL or DOMAIN keyword\n" - " or other_domain:{value} to specify a trusted domain.\n" - " you can set the password type using HASH or MACHINE keyword\n" - " (to use the Machine's NetBIOS name as the password).\n" - " you can set the dialect using NTLMV2, NTLM, LMV2, LM keyword.\n" - "Example: \n" - " hydra smb://microsoft.com -l admin -p tooeasy -m \"local lmv2\"\n" - " hydra smb://microsoft.com -l admin -p D5731CFC6C2A069C21FD0D49CAEBC9EA:2126EE7712D37E265FD63F2C84D2B13D::: -m \"local hash\"\n" - " hydra smb://microsoft.com -l admin -p tooeasy -m \"other_domain:SECONDDOMAIN\"\n\n"); + usage_smb(hydra_options.service); return; } if ((strcmp(hydra_options.service, "http-get-form") == 0) @@ -599,72 +769,19 @@ void module_usage() { || (strncmp(hydra_options.service, "https-form", 10) == 0) ) { - printf("Module %s requires the page and the parameters for the web form.\n\n" - "By default this module is configured to follow a maximum of 5 redirections in\n" - "a row. It always gathers a new cookie from the same URL without variables\n" - "The parameters take three \":\" separated values, plus optional values.\n" - "(Note: if you need a colon in the option string as value, escape it with \"\\:\", but do not escape a \"\\\" with \"\\\\\".)\n" - "\nSyntax: ::[:[:]\n" - "First is the page on the server to GET or POST to (URL).\n" - "Second is the POST/GET variables (taken from either the browser, proxy, etc.\n" - " with usernames and passwords being replaced in the \"^USER^\" and \"^PASS^\"\n" - " placeholders (FORM PARAMETERS)\n" - "Third is the string that it checks for an *invalid* login (by default)\n" - " Invalid condition login check can be preceded by \"F=\", successful condition\n" - " login check must be preceded by \"S=\".\n" - " This is where most people get it wrong. You have to check the webapp what a\n" - " failed string looks like and put it in this parameter!\n" - "The following parameters are optional:\n" - " C=/page/uri to define a different page to gather initial cookies from\n" - " (h|H)=My-Hdr\\: foo to send a user defined HTTP header with each request\n" - " ^USER^ and ^PASS^ can also be put into these headers!\n" - " Note: 'h' will add the user-defined header at the end\n" - " regardless it's already being sent by Hydra or not.\n" - " 'H' will replace the value of that header if it exists, by the\n" - " one supplied by the user, or add the header at the end\n" - "Note that if you are going to put colons (:) in your headers you should escape them with a backslash (\\).\n" - " All colons that are not option separators should be escaped (see the examples above and below).\n" - " You can specify a header without escaping the colons, but that way you will not be able to put colons\n" - " in the header value itself, as they will be interpreted by hydra as option separators.\n" - "\nExamples:\n" - " \"/login.php:user=^USER^&pass=^PASS^:incorrect\"\n" - " \"/login.php:user=^USER^&pass=^PASS^&colon=colon\\:escape:S=authlog=.*success\"\n" - " \"/login.php:user=^USER^&pass=^PASS^&mid=123:authlog=.*failed\"\n" - " \"/:user=^USER&pass=^PASS^:failed:H=Authorization\\: Basic dT1w:H=Cookie\\: sessid=aaaa:h=X-User\\: ^USER^:H=User-Agent\\: wget\"\n" - " \"/exchweb/bin/auth/owaauth.dll:destination=http%%3A%%2F%%2F%%2Fexchange&flags=0&username=%%5C^USER^&password=^PASS^&SubmitCreds=x&trusted=0:reason=:C=/exchweb\"\n", - hydra_options.service); + usage_http_form(hydra_options.service); return; } if (strcmp(hydra_options.service, "http-proxy") == 0) { - printf("Module http-proxy is optionally taking the page to authenticate at.\n" - "Default is http://www.microsoft.com/)\n" "Basic, DIGEST-MD5 and NTLM are supported and negotiated automatically.\n\n"); + usage_http_proxy(hydra_options.service); return; } if (strcmp(hydra_options.service, "http-proxy-urlenum") == 0) { - printf("Module http-proxy-urlenum only uses the -L option, not -x or -p/-P option.\n" - "The -L loginfile must contain the URL list to try through the proxy.\n" - "The proxy credentials cann be put as the optional parameter, e.g.\n" - " hydra -L urllist.txt -s 3128 target.com http-proxy-urlenum user:pass\n" " hydra -L urllist.txt http-proxy-urlenum://target.com:3128/user:pass\n\n"); + usage_http_proxy_urlenum(hydra_options.service); return; } if (strncmp(hydra_options.service, "snmp", 4) == 0) { - printf("Module snmp is optionally taking the following parameters:\n"); - printf(" READ perform read requests (default)\n"); - printf(" WRITE perform write requests\n"); - printf(" 1 use SNMP version 1 (default)\n"); - printf(" 2 use SNMP version 2\n"); - printf(" 3 use SNMP version 3\n"); - printf(" Note that SNMP version 3 usually uses both login and passwords!\n"); - printf(" SNMP version 3 has the following optional sub parameters:\n"); - printf(" MD5 use MD5 authentication (default)\n"); - printf(" SHA use SHA authentication\n"); - printf(" DES use DES encryption\n"); - printf(" AES use AES encryption\n"); - printf(" if no -p/-P parameter is given, SNMPv3 noauth is performed, which\n"); - printf(" only requires a password (or username) not both.\n"); - printf("To combine the options, use colons (\":\"), e.g.:\n"); - printf(" hydra -L user.txt -P pass.txt -m 3:SHA:AES:READ target.com snmp\n"); - printf(" hydra -P pass.txt -m 2 target.com snmp\n"); + usage_snmp(hydra_options.service); return; } if ((strcmp(hydra_options.service, "http-get") == 0) @@ -672,8 +789,7 @@ void module_usage() { || (strcmp(hydra_options.service, "http-post") == 0) || (strcmp(hydra_options.service, "https-post") == 0) ) { - printf("Module %s requires the page to authenticate.\n" - "For example: \"/secret\" or \"http://bla.com/foo/bar\" or \"https://test.com:8080/members\"\n\n", hydra_options.service); + usage_http(hydra_options.service); return; } From a8f8bdbc5f198a0d2dfc41112e035c7dbb69f6e2 Mon Sep 17 00:00:00 2001 From: Diadlo Date: Thu, 22 Jun 2017 01:00:36 +0300 Subject: [PATCH 044/531] Add usage functions into service vector --- hydra.c | 219 +++++++++++++------------------------------------------- 1 file changed, 50 insertions(+), 169 deletions(-) diff --git a/hydra.c b/hydra.c index ecc5634..0b0ce76 100644 --- a/hydra.c +++ b/hydra.c @@ -655,142 +655,20 @@ void usage_http(const char* service) { } void module_usage() { + int i; if (!hydra_options.service) { printf("The Module %s does not need or support optional parameters\n", hydra_options.service); exit(0); } printf("\nHelp for module %s:\n============================================================================\n", hydra_options.service); - if ((strcmp(hydra_options.service, "oracle") == 0) || (strcmp(hydra_options.service, "ora") == 0)) { - usage_oracle(hydra_options.service); - return; - } - if ((strcmp(hydra_options.service, "oracle-listener") == 0) || (strcmp(hydra_options.service, "tns") == 0)) { - usage_oracle_listener(hydra_options.service); - return; - } - if (strcmp(hydra_options.service, "cvs") == 0) { - usage_cvs(hydra_options.service); - return; - } - if (strcmp(hydra_options.service, "xmpp") == 0) { - usage_xmpp(hydra_options.service); - return; - } - if (strcmp(hydra_options.service, "pop3") == 0) { - usage_pop3(hydra_options.service); - return; - } - if (strcmp(hydra_options.service, "rdp") == 0) { - usage_rdp(hydra_options.service); - return; - } - if (strcmp(hydra_options.service, "s7-300") == 0) { - usage_s7_300(hydra_options.service); - return; - } - if (strcmp(hydra_options.service, "nntp") == 0) { - usage_nntp(hydra_options.service); - return; - } - if (strcmp(hydra_options.service, "imap") == 0) { - usage_imap(hydra_options.service); - return; - } - if (strcmp(hydra_options.service, "smtp-enum") == 0) { - usage_smtp_enum(hydra_options.service); - return; - } - if (strcmp(hydra_options.service, "smtp") == 0) { - usage_smtp(hydra_options.service); - return; - } - if (strcmp(hydra_options.service, "svn") == 0) { - usage_svn(hydra_options.service); - return; - } - if (strcmp(hydra_options.service, "ncp") == 0) { - usage_ncp(hydra_options.service); - return; - } - if (strcmp(hydra_options.service, "firebird") == 0) { - usage_firebird(hydra_options.service); - return; - } - if (strcmp(hydra_options.service, "mysql") == 0) { - usage_mysql(hydra_options.service); - return; - } - if (strcmp(hydra_options.service, "irc") == 0) { - usage_irc(hydra_options.service); - return; - } - if (strcmp(hydra_options.service, "postgres") == 0) { - usage_postgres(hydra_options.service); - return; - } - if (strcmp(hydra_options.service, "telnet") == 0) { - usage_telnet(hydra_options.service); - return; - } - if (strcmp(hydra_options.service, "sapr3") == 0) { - usage_sapr3(hydra_options.service); - return; - } - if (strcmp(hydra_options.service, "sshkey") == 0) { - usage_sshkey(hydra_options.service); - return; - } - if (strcmp(hydra_options.service, "cisco-enable") == 0) { - usage_cisco_enable(hydra_options.service); - return; - } - if (strcmp(hydra_options.service, "cisco") == 0) { - usage_cisco(hydra_options.service); - return; - } - if ((strcmp(hydra_options.service, "ldap2") == 0) - || (strcmp(hydra_options.service, "ldap3") == 0) - || (strcmp(hydra_options.service, "ldap3-crammd5") == 0) - || (strcmp(hydra_options.service, "ldap3-digestmd5") == 0) - ) { - usage_ldap(hydra_options.service); - return; - } - if ((strcmp(hydra_options.service, "smb") == 0) || (strcmp(hydra_options.service, "smbnt") == 0)) { - usage_smb(hydra_options.service); - return; - } - if ((strcmp(hydra_options.service, "http-get-form") == 0) - || (strcmp(hydra_options.service, "https-get-form") == 0) - || (strcmp(hydra_options.service, "http-post-form") == 0) - || (strcmp(hydra_options.service, "https-post-form") == 0) - || (strncmp(hydra_options.service, "http-form", 9) == 0) - || (strncmp(hydra_options.service, "https-form", 10) == 0) - - ) { - usage_http_form(hydra_options.service); - return; - } - if (strcmp(hydra_options.service, "http-proxy") == 0) { - usage_http_proxy(hydra_options.service); - return; - } - if (strcmp(hydra_options.service, "http-proxy-urlenum") == 0) { - usage_http_proxy_urlenum(hydra_options.service); - return; - } - if (strncmp(hydra_options.service, "snmp", 4) == 0) { - usage_snmp(hydra_options.service); - return; - } - if ((strcmp(hydra_options.service, "http-get") == 0) - || (strcmp(hydra_options.service, "https-get") == 0) - || (strcmp(hydra_options.service, "http-post") == 0) - || (strcmp(hydra_options.service, "https-post") == 0) - ) { - usage_http(hydra_options.service); - return; + for (i = 0; i < sizeof(services) / sizeof(services[0]); i++) { + if (strcmp(hydra_options.service, services[i].name) == 0) { + if (services[i].usage) { + services[i].usage(hydra_options.service); + exit(0); + } + } } printf("The Module %s does not need or support optional parameters\n", hydra_options.service); @@ -1323,98 +1201,101 @@ char *hydra_build_time() { typedef void (*service_t)(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); typedef int (*service_init_t)(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); +typedef void (*service_usage_t)(const char* service); -#define SERVICE2(name, func) { name, service_##func##_init, service_##func } -#define SERVICE(name) { #name, service_##name##_init, service_##name } +#define SERVICE2(name, func) { name, service_##func##_init, service_##func, NULL } +#define SERVICE(name) { #name, service_##name##_init, service_##name, NULL } +#define SERVICE3(name, func) { name, service_##func##_init, service_##func, usage_##func } static const struct { const char* name; service_init_t init; service_t exec; + service_usage_t usage; } services[] = { SERVICE(adam6500), #ifdef LIBAFP SERVICE(afp), #endif SERVICE(asterisk), - SERVICE(cisco), - SERVICE2("cisco-enable", cisco_enable), - SERVICE(cvs), + SERVICE3("cisco", cisco), + SERVICE3("cisco-enable", cisco_enable), + SERVICE3("cvs", cvs), #ifdef LIBFIREBIRD - SERVICE(firebird), + SERVICE3("firebird", firebird), #endif SERVICE(ftp), { "ftps", service_ftp_init, service_ftps }, - { "http-get", service_http_init, service_http_get }, - { "http-get-form", service_http_form_init, service_http_get_form }, - { "http-head", service_http_init, service_http_head }, - { "http-form", service_http_form_init, NULL }, - { "http-post", NULL, service_http_post }, - { "http-post-form", service_http_form_init, service_http_post_form }, - SERVICE2("http-proxy", http_proxy), - SERVICE2("http-proxy-urlenum", http_proxy_urlenum), + { "http-get", service_http_init, service_http_get, usage_http }, + { "http-get-form", service_http_form_init, service_http_get_form, usage_http_form }, + { "http-head", service_http_init, service_http_head, NULL }, + { "http-form", service_http_form_init, NULL, usage_http_form }, + { "http-post", NULL, service_http_post, usage_http }, + { "http-post-form", service_http_form_init, service_http_post_form, usage_http_form }, + SERVICE3("http-proxy", http_proxy), + SERVICE3("http-proxy-urlenum", http_proxy_urlenum), SERVICE(icq), - SERVICE(imap), - SERVICE(irc), - { "ldap2", service_ldap_init, service_ldap2 }, - { "ldap3", service_ldap_init, service_ldap3 }, - { "ldap3-crammd5", service_ldap_init, service_ldap3_cram_md5 }, - { "ldap3-digestmd5", service_ldap_init, service_ldap3_digest_md5 }, + SERVICE3("imap", imap), + SERVICE3("irc", irc), + { "ldap2", service_ldap_init, service_ldap2, usage_ldap }, + { "ldap3", service_ldap_init, service_ldap3, usage_ldap }, + { "ldap3-crammd5", service_ldap_init, service_ldap3_cram_md5, usage_ldap }, + { "ldap3-digestmd5", service_ldap_init, service_ldap3_digest_md5, usage_ldap }, SERVICE(mssql), #ifdef HAVE_MATH_H - SERVICE(mysql), + SERVICE3("mysql", mysql), #endif #ifdef LIBNCP - SERVICE(ncp), + SERVICE3("ncp", ncp), #endif - SERVICE(nntp), + SERVICE3("nntp", nntp), #ifdef LIBORACLE - SERVICE(oracle), + SERVICE3("oracle", oracle), #endif #ifdef LIBOPENSSL - SERVICE2("oracle-listener", oracle_listener), + SERVICE3("oracle-listener", oracle_listener), SERVICE2("oracle-sid", oracle_sid), #endif SERVICE(pcanywhere), SERVICE(pcnfs), - SERVICE(pop3), + SERVICE3("pop3", pop3), #ifdef LIBPOSTGRES - SERVICE(postgres), + SERVICE3("postgres", postgres), #endif SERVICE(redis), SERVICE(rexec), #ifdef LIBOPENSSL - SERVICE(rdp), + SERVICE3("rdp", rdp), #endif SERVICE(rlogin), SERVICE(rsh), SERVICE(rtsp), SERVICE(rpcap), - SERVICE2("s7-300", s7_300), + SERVICE3("s7-300", s7_300), #ifdef LIBSAPR3 - SERVICE(sapr3), + SERVICE3("sarp3", sapr3), #endif #ifdef LIBOPENSSL SERVICE(sip), - SERVICE2("smbnt", smb), - SERVICE(smb), + SERVICE3("smbnt", smb), + SERVICE3("smb", smb), #endif - SERVICE(smtp), - SERVICE2("smtp-enum", smtp_enum), - SERVICE(snmp), + SERVICE3("smtp", smtp), + SERVICE3("smtp-enum", smtp_enum), + SERVICE3("snmp", snmp), SERVICE(socks5), #ifdef LIBSSH { "ssh", NULL, service_ssh }, - SERVICE(sshkey), + SERVICE3("sshkey", sshkey), #endif #ifdef LIBSVN - SERVICE(svn), + SERVICE3("svn", svn), #endif SERVICE(teamspeak), - SERVICE(telnet), + SERVICE3("telnet", telnet), SERVICE(vmauthd), SERVICE(vnc), - { "xmpp", service_xmpp_init, NULL } + { "xmpp", service_xmpp_init, NULL, usage_xmpp } }; void hydra_service_init(int target_no) { From bd8a901bea82bafd3c10dc9d5a346f2b379ab985 Mon Sep 17 00:00:00 2001 From: Diadlo Date: Thu, 22 Jun 2017 01:07:27 +0300 Subject: [PATCH 045/531] Move services and usage on the top of the hydra.c --- hydra.c | 230 ++++++++++++++++++++++++++++++++------------------------ 1 file changed, 131 insertions(+), 99 deletions(-) diff --git a/hydra.c b/hydra.c index 0b0ce76..56ded02 100644 --- a/hydra.c +++ b/hydra.c @@ -15,6 +15,37 @@ #include #endif +void usage_oracle(const char* service); +void usage_oracle_listener(const char* service); +void usage_cvs(const char* service); +void usage_xmpp(const char* service); +void usage_pop3(const char* service); +void usage_rdp(const char* service); +void usage_s7_300(const char* service); +void usage_nntp(const char* service); +void usage_imap(const char* service); +void usage_smtp_enum(const char* service); +void usage_smtp(const char* service); +void usage_svn(const char* service); +void usage_ncp(const char* service); +void usage_firebird(const char* service); +void usage_mysql(const char* service); +void usage_irc(const char* service); +void usage_postgres(const char* service); +void usage_telnet(const char* service); +void usage_sapr3(const char* service); +void usage_sshkey(const char* service); +void usage_cisco_enable(const char* service); +void usage_cisco(const char* service); +void usage_ldap(const char* service); +void usage_smb(const char* service); +void usage_http_form(const char* service); +void usage_http_proxy(const char* service); +void usage_http_proxy_urlenum(const char* service); +void usage_snmp(const char* service); +void usage_http(const char* service); + + extern void service_asterisk(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); extern void service_telnet(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); extern void service_ftp(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); @@ -347,6 +378,106 @@ int snpdone, snp_is_redo, snpbuflen, snpi, snpj, snpdont; #include "performance.h" +typedef void (*service_t)(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); +typedef int (*service_init_t)(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); +typedef void (*service_usage_t)(const char* service); + +#define SERVICE2(name, func) { name, service_##func##_init, service_##func, NULL } +#define SERVICE(name) { #name, service_##name##_init, service_##name, NULL } +#define SERVICE3(name, func) { name, service_##func##_init, service_##func, usage_##func } + +static const struct { + const char* name; + service_init_t init; + service_t exec; + service_usage_t usage; +} services[] = { + SERVICE(adam6500), +#ifdef LIBAFP + SERVICE(afp), +#endif + SERVICE(asterisk), + SERVICE3("cisco", cisco), + SERVICE3("cisco-enable", cisco_enable), + SERVICE3("cvs", cvs), +#ifdef LIBFIREBIRD + SERVICE3("firebird", firebird), +#endif + SERVICE(ftp), + { "ftps", service_ftp_init, service_ftps }, + { "http-get", service_http_init, service_http_get, usage_http }, + { "http-get-form", service_http_form_init, service_http_get_form, usage_http_form }, + { "http-head", service_http_init, service_http_head, NULL }, + { "http-form", service_http_form_init, NULL, usage_http_form }, + { "http-post", NULL, service_http_post, usage_http }, + { "http-post-form", service_http_form_init, service_http_post_form, usage_http_form }, + SERVICE3("http-proxy", http_proxy), + SERVICE3("http-proxy-urlenum", http_proxy_urlenum), + SERVICE(icq), + SERVICE3("imap", imap), + SERVICE3("irc", irc), + { "ldap2", service_ldap_init, service_ldap2, usage_ldap }, + { "ldap3", service_ldap_init, service_ldap3, usage_ldap }, + { "ldap3-crammd5", service_ldap_init, service_ldap3_cram_md5, usage_ldap }, + { "ldap3-digestmd5", service_ldap_init, service_ldap3_digest_md5, usage_ldap }, + SERVICE(mssql), +#ifdef HAVE_MATH_H + SERVICE3("mysql", mysql), +#endif +#ifdef LIBNCP + SERVICE3("ncp", ncp), +#endif + SERVICE3("nntp", nntp), +#ifdef LIBORACLE + SERVICE3("oracle", oracle), +#endif +#ifdef LIBOPENSSL + SERVICE3("oracle-listener", oracle_listener), + SERVICE2("oracle-sid", oracle_sid), +#endif + SERVICE(pcanywhere), + SERVICE(pcnfs), + SERVICE3("pop3", pop3), +#ifdef LIBPOSTGRES + SERVICE3("postgres", postgres), +#endif + SERVICE(redis), + SERVICE(rexec), +#ifdef LIBOPENSSL + SERVICE3("rdp", rdp), +#endif + SERVICE(rlogin), + SERVICE(rsh), + SERVICE(rtsp), + SERVICE(rpcap), + SERVICE3("s7-300", s7_300), +#ifdef LIBSAPR3 + SERVICE3("sarp3", sapr3), +#endif +#ifdef LIBOPENSSL + SERVICE(sip), + SERVICE3("smbnt", smb), + SERVICE3("smb", smb), +#endif + SERVICE3("smtp", smtp), + SERVICE3("smtp-enum", smtp_enum), + SERVICE3("snmp", snmp), + SERVICE(socks5), +#ifdef LIBSSH + { "ssh", NULL, service_ssh }, + SERVICE3("sshkey", sshkey), +#endif +#ifdef LIBSVN + SERVICE3("svn", svn), +#endif + SERVICE(teamspeak), + SERVICE3("telnet", telnet), + SERVICE(vmauthd), + SERVICE(vnc), + { "xmpp", service_xmpp_init, NULL, usage_xmpp } +}; + + #define PRINT_NORMAL(ext, text, ...) printf(text, ##__VA_ARGS__) #define PRINT_EXTEND(ext, text, ...) do { \ if (ext) \ @@ -1199,105 +1330,6 @@ char *hydra_build_time() { return (char *) &datetime; } -typedef void (*service_t)(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); -typedef int (*service_init_t)(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); -typedef void (*service_usage_t)(const char* service); - -#define SERVICE2(name, func) { name, service_##func##_init, service_##func, NULL } -#define SERVICE(name) { #name, service_##name##_init, service_##name, NULL } -#define SERVICE3(name, func) { name, service_##func##_init, service_##func, usage_##func } - -static const struct { - const char* name; - service_init_t init; - service_t exec; - service_usage_t usage; -} services[] = { - SERVICE(adam6500), -#ifdef LIBAFP - SERVICE(afp), -#endif - SERVICE(asterisk), - SERVICE3("cisco", cisco), - SERVICE3("cisco-enable", cisco_enable), - SERVICE3("cvs", cvs), -#ifdef LIBFIREBIRD - SERVICE3("firebird", firebird), -#endif - SERVICE(ftp), - { "ftps", service_ftp_init, service_ftps }, - { "http-get", service_http_init, service_http_get, usage_http }, - { "http-get-form", service_http_form_init, service_http_get_form, usage_http_form }, - { "http-head", service_http_init, service_http_head, NULL }, - { "http-form", service_http_form_init, NULL, usage_http_form }, - { "http-post", NULL, service_http_post, usage_http }, - { "http-post-form", service_http_form_init, service_http_post_form, usage_http_form }, - SERVICE3("http-proxy", http_proxy), - SERVICE3("http-proxy-urlenum", http_proxy_urlenum), - SERVICE(icq), - SERVICE3("imap", imap), - SERVICE3("irc", irc), - { "ldap2", service_ldap_init, service_ldap2, usage_ldap }, - { "ldap3", service_ldap_init, service_ldap3, usage_ldap }, - { "ldap3-crammd5", service_ldap_init, service_ldap3_cram_md5, usage_ldap }, - { "ldap3-digestmd5", service_ldap_init, service_ldap3_digest_md5, usage_ldap }, - SERVICE(mssql), -#ifdef HAVE_MATH_H - SERVICE3("mysql", mysql), -#endif -#ifdef LIBNCP - SERVICE3("ncp", ncp), -#endif - SERVICE3("nntp", nntp), -#ifdef LIBORACLE - SERVICE3("oracle", oracle), -#endif -#ifdef LIBOPENSSL - SERVICE3("oracle-listener", oracle_listener), - SERVICE2("oracle-sid", oracle_sid), -#endif - SERVICE(pcanywhere), - SERVICE(pcnfs), - SERVICE3("pop3", pop3), -#ifdef LIBPOSTGRES - SERVICE3("postgres", postgres), -#endif - SERVICE(redis), - SERVICE(rexec), -#ifdef LIBOPENSSL - SERVICE3("rdp", rdp), -#endif - SERVICE(rlogin), - SERVICE(rsh), - SERVICE(rtsp), - SERVICE(rpcap), - SERVICE3("s7-300", s7_300), -#ifdef LIBSAPR3 - SERVICE3("sarp3", sapr3), -#endif -#ifdef LIBOPENSSL - SERVICE(sip), - SERVICE3("smbnt", smb), - SERVICE3("smb", smb), -#endif - SERVICE3("smtp", smtp), - SERVICE3("smtp-enum", smtp_enum), - SERVICE3("snmp", snmp), - SERVICE(socks5), -#ifdef LIBSSH - { "ssh", NULL, service_ssh }, - SERVICE3("sshkey", sshkey), -#endif -#ifdef LIBSVN - SERVICE3("svn", svn), -#endif - SERVICE(teamspeak), - SERVICE3("telnet", telnet), - SERVICE(vmauthd), - SERVICE(vnc), - { "xmpp", service_xmpp_init, NULL, usage_xmpp } -}; - void hydra_service_init(int target_no) { int x = 99; int i; From d917d1aeba56e1514e04b31d352d60c2d1f270f8 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Fri, 23 Jun 2017 10:40:50 +0200 Subject: [PATCH 046/531] option -c test --- hydra.c | 291 ++++++++++++++++++++++++++++++-------------------------- 1 file changed, 156 insertions(+), 135 deletions(-) diff --git a/hydra.c b/hydra.c index 56ded02..4f409ce 100644 --- a/hydra.c +++ b/hydra.c @@ -2298,11 +2298,12 @@ int main(int argc, char *argv[]) { FILE *lfp = NULL, *pfp = NULL, *cfp = NULL, *ifp = NULL, *rfp = NULL, *proxyfp; size_t countinfile = 1, sizeinfile = 0; unsigned long int math2; - int i = 0, j = 0, k, error = 0, modusage = 0, ignore_restore = 0; - int head_no = 0, target_no = 0, exit_condition = 0, readres; + int i = 0, j = 0, k, error = 0, modusage = 0, ignore_restore = 0, do_switch; + int head_no = 0, target_no = 0, exit_condition = 0, readres, time_next_attempt = 0; time_t starttime, elapsed_status, elapsed_restore, status_print = 59, tmp_time; char *tmpptr, *tmpptr2; char rc, buf[MAXBUF]; + time_t last_attempt = 0; fd_set fdreadheads; int max_fd; struct addrinfo hints, *res, *p; @@ -2421,7 +2422,7 @@ int main(int argc, char *argv[]) { help(1); if (argc < 2) help(0); - while ((i = getopt(argc, argv, "hIq64Rde:vVl:fFg:L:p:OP:o:b:M:C:t:T:m:w:W:s:SUux:y")) >= 0) { + while ((i = getopt(argc, argv, "hIq64Rde:vVl:fFg:L:p:OP:o:b:M:C:t:T:m:w:W:s:SUux:yc:")) >= 0) { switch (i) { case 'h': help(1); @@ -2542,6 +2543,13 @@ int main(int argc, char *argv[]) { case 's': hydra_options.port = port = atoi(optarg); break; + case 'c': +#ifdef MSG_PEEK + time_next_attempt = atoi(optarg); +#else + fprintf(stderr, "[WARNING] -c option can not be used as your operating system is missing the MSG_PEEK feature\n"); +#endif + break; case 'S': #ifndef LIBOPENSSL fprintf(stderr, "[WARNING] hydra was compiled without SSL support. Install openssl and recompile! Option ignored...\n"); @@ -2611,6 +2619,8 @@ int main(int argc, char *argv[]) { printf("%s ", argv[i]); printf("\n"); } + if (hydra_options.tasks > 0 && time_next_attempt) + fprintf(stderr, "[WARNING] when using the -c option, you should also set the task per target to one (-t 1)\n"); if (hydra_options.login != NULL && hydra_options.loginfile != NULL) bail("You can only use -L OR -l, not both\n"); if (hydra_options.pass != NULL && hydra_options.passfile != NULL) @@ -3864,6 +3874,7 @@ int main(int argc, char *argv[]) { for (head_no = 0; head_no < hydra_options.max_use; head_no++) { if (debug > 1 && hydra_heads[head_no]->active != -1) printf("[DEBUG] head_no[%d] to target_no %d active %d\n", head_no, hydra_heads[head_no]->target_no, hydra_heads[head_no]->active); + switch (hydra_heads[head_no]->active) { case -1: // disabled head, ignored @@ -3888,13 +3899,22 @@ int main(int argc, char *argv[]) { break; case 1: if (FD_ISSET(hydra_heads[head_no]->sp[0], &fdreadheads)) { - readres = read_safe(hydra_heads[head_no]->sp[0], &rc, 1); - if (readres > 0) { - FD_CLR(hydra_heads[head_no]->sp[0], &fdreadheads); - hydra_heads[head_no]->last_seen = tmp_time; - if (debug) - printf("[DEBUG] head_no[%d] read %c\n", head_no, rc); - switch (rc) { + do_switch = 1; + if (time_next_attempt > 0) { + if (last_attempt + time_next_attempt >= time(NULL)) { + if (recv(hydra_heads[head_no]->sp[0], &rc, 1, MSG_PEEK) == 1 && (rc == 'N' || rc == 'n')) + do_switch = 0; + } else + last_attempt = time(NULL); + } + if (do_switch) { + readres = read_safe(hydra_heads[head_no]->sp[0], &rc, 1); + if (readres > 0) { + FD_CLR(hydra_heads[head_no]->sp[0], &fdreadheads); + hydra_heads[head_no]->last_seen = tmp_time; + if (debug) + printf("[DEBUG] head_no[%d] read %c\n", head_no, rc); + switch (rc) { // Valid Results: // n - mother says to itself that child requests next login/password pair // N - child requests next login/password pair @@ -3904,137 +3924,138 @@ int main(int argc, char *argv[]) { // f - child reports that the username does not exist // F - child reports that it found a valid login/password pair // and requests next pair. Sends login/pw pair with next msg! - case 'N': // head wants next pair - hydra_targets[hydra_heads[head_no]->target_no]->ok = 1; - if (hydra_targets[hydra_heads[head_no]->target_no]->fail_count > 0) - hydra_targets[hydra_heads[head_no]->target_no]->fail_count--; - // no break here - case 'n': // mother sends this to itself initially - loop_cnt = 0; - if (hydra_send_next_pair(hydra_heads[head_no]->target_no, head_no) == -1) - hydra_kill_head(head_no, 1, 0); - break; - - case 'F': // valid password found - hydra_brains.found++; - if (colored_output) { - if (hydra_heads[head_no]->current_login_ptr == NULL || strlen(hydra_heads[head_no]->current_login_ptr) == 0) { - if (hydra_heads[head_no]->current_pass_ptr == NULL || strlen(hydra_heads[head_no]->current_pass_ptr) == 0) - printf("[\e[1;32m%d\e[0m][\e[1;32m%s\e[0m] host: \e[1;32m%s\e[0m\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, - hydra_targets[hydra_heads[head_no]->target_no]->target); - else - printf("[\e[1;32m%d\e[0m][\e[1;32m%s\e[0m] host: \e[1;32m%s\e[0m password: \e[1;32m%s\e[0m\n", hydra_targets[hydra_heads[head_no]->target_no]->port, - hydra_options.service, hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_pass_ptr); - } else if (hydra_heads[head_no]->current_pass_ptr == NULL || strlen(hydra_heads[head_no]->current_pass_ptr) == 0) { - printf("[\e[1;32m%d\e[0m][\e[1;32m%s\e[0m] host: \e[1;32m%s\e[0m login: \e[1;32m%s\e[0m\n", hydra_targets[hydra_heads[head_no]->target_no]->port, - hydra_options.service, hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr); - } else - printf("[\e[1;32m%d\e[0m][\e[1;32m%s\e[0m] host: \e[1;32m%s\e[0m login: \e[1;32m%s\e[0m password: \e[1;32m%s\e[0m\n", - hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, hydra_targets[hydra_heads[head_no]->target_no]->target, - hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr); - } else { - if (hydra_heads[head_no]->current_login_ptr == NULL || strlen(hydra_heads[head_no]->current_login_ptr) == 0) { - if (hydra_heads[head_no]->current_pass_ptr == NULL || strlen(hydra_heads[head_no]->current_pass_ptr) == 0) - printf("[%d][%s] host: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, - hydra_targets[hydra_heads[head_no]->target_no]->target); - else - printf("[%d][%s] host: %s password: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, - hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_pass_ptr); - } else if (hydra_heads[head_no]->current_pass_ptr == NULL || strlen(hydra_heads[head_no]->current_pass_ptr) == 0) { - printf("[%d][%s] host: %s login: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, - hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr); - } else - printf("[%d][%s] host: %s login: %s password: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, - hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr); - } - if (hydra_options.outfile_format == FORMAT_JSONV1 && hydra_options.outfile_ptr != NULL && hydra_brains.ofp != NULL) { - fprintf(hydra_brains.ofp, "%s\n\t{\"port\": %d, \"service\": \"%s\", \"host\": \"%s\", \"login\": \"%s\", \"password\": \"%s\"}", - hydra_brains.found == 1 ? "" : ",", // prefix a comma if not first finding - hydra_targets[hydra_heads[head_no]->target_no]->port, - hydra_options.service, - hydra_targets[hydra_heads[head_no]->target_no]->target !=NULL ? hydra_targets[hydra_heads[head_no]->target_no]->target : "", - hydra_heads[head_no]->current_login_ptr !=NULL ? hydra_string_replace(hydra_heads[head_no]->current_login_ptr,"\"","\\\"") : "", - hydra_heads[head_no]->current_pass_ptr != NULL ? hydra_string_replace(hydra_heads[head_no]->current_pass_ptr,"\"","\\\"") : "" - ); - fflush(hydra_brains.ofp); - } else if (hydra_options.outfile_ptr != NULL && hydra_brains.ofp != NULL) { // else output format == 0 aka text - if (hydra_heads[head_no]->current_login_ptr == NULL || strlen(hydra_heads[head_no]->current_login_ptr) == 0) { - if (hydra_heads[head_no]->current_pass_ptr == NULL || strlen(hydra_heads[head_no]->current_pass_ptr) == 0) - fprintf(hydra_brains.ofp, "[%d][%s] host: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, - hydra_targets[hydra_heads[head_no]->target_no]->target); - else - fprintf(hydra_brains.ofp, "[%d][%s] host: %s password: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, - hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_pass_ptr); - } else if (hydra_heads[head_no]->current_pass_ptr == NULL || strlen(hydra_heads[head_no]->current_pass_ptr) == 0) { - fprintf(hydra_brains.ofp, "[%d][%s] host: %s login: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, - hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr); - } else - fprintf(hydra_brains.ofp, "[%d][%s] host: %s login: %s password: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, - hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr); - fflush(hydra_brains.ofp); - } - if (hydra_options.exit_found) { // option set says quit target after on valid login/pass pair is found - if (hydra_targets[hydra_heads[head_no]->target_no]->done == STATE_ACTIVE) { - hydra_targets[hydra_heads[head_no]->target_no]->done = STATE_FINISHED; // mark target as done - hydra_brains.finished++; - printf("[STATUS] attack finished for %s (valid pair found)\n", hydra_targets[hydra_heads[head_no]->target_no]->target); - } - if (hydra_options.exit_found == 2) { - for (j = 0; j < hydra_brains.targets; j++) - if (hydra_targets[j]->done == STATE_ACTIVE) { - hydra_targets[j]->done = STATE_FINISHED; - hydra_brains.finished++; - } - } - for (j = 0; j < hydra_options.max_use; j++) - if (hydra_heads[j]->active >= 0 && (hydra_heads[j]->target_no == target_no || hydra_options.exit_found == 2)) { - if (hydra_brains.targets > hydra_brains.finished && hydra_options.exit_found < 2) - hydra_kill_head(j, 1, 0); // kill all heads working on the target + case 'N': // head wants next pair + hydra_targets[hydra_heads[head_no]->target_no]->ok = 1; + if (hydra_targets[hydra_heads[head_no]->target_no]->fail_count > 0) + hydra_targets[hydra_heads[head_no]->target_no]->fail_count--; + // no break here + case 'n': // mother sends this to itself initially + loop_cnt = 0; + if (hydra_send_next_pair(hydra_heads[head_no]->target_no, head_no) == -1) + hydra_kill_head(head_no, 1, 0); + break; + + case 'F': // valid password found + hydra_brains.found++; + if (colored_output) { + if (hydra_heads[head_no]->current_login_ptr == NULL || strlen(hydra_heads[head_no]->current_login_ptr) == 0) { + if (hydra_heads[head_no]->current_pass_ptr == NULL || strlen(hydra_heads[head_no]->current_pass_ptr) == 0) + printf("[\e[1;32m%d\e[0m][\e[1;32m%s\e[0m] host: \e[1;32m%s\e[0m\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, + hydra_targets[hydra_heads[head_no]->target_no]->target); else - hydra_kill_head(j, 1, 2); // kill all heads working on the target + printf("[\e[1;32m%d\e[0m][\e[1;32m%s\e[0m] host: \e[1;32m%s\e[0m password: \e[1;32m%s\e[0m\n", hydra_targets[hydra_heads[head_no]->target_no]->port, + hydra_options.service, hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_pass_ptr); + } else if (hydra_heads[head_no]->current_pass_ptr == NULL || strlen(hydra_heads[head_no]->current_pass_ptr) == 0) { + printf("[\e[1;32m%d\e[0m][\e[1;32m%s\e[0m] host: \e[1;32m%s\e[0m login: \e[1;32m%s\e[0m\n", hydra_targets[hydra_heads[head_no]->target_no]->port, + hydra_options.service, hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr); + } else + printf("[\e[1;32m%d\e[0m][\e[1;32m%s\e[0m] host: \e[1;32m%s\e[0m login: \e[1;32m%s\e[0m password: \e[1;32m%s\e[0m\n", + hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, hydra_targets[hydra_heads[head_no]->target_no]->target, + hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr); + } else { + if (hydra_heads[head_no]->current_login_ptr == NULL || strlen(hydra_heads[head_no]->current_login_ptr) == 0) { + if (hydra_heads[head_no]->current_pass_ptr == NULL || strlen(hydra_heads[head_no]->current_pass_ptr) == 0) + printf("[%d][%s] host: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, + hydra_targets[hydra_heads[head_no]->target_no]->target); + else + printf("[%d][%s] host: %s password: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, + hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_pass_ptr); + } else if (hydra_heads[head_no]->current_pass_ptr == NULL || strlen(hydra_heads[head_no]->current_pass_ptr) == 0) { + printf("[%d][%s] host: %s login: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, + hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr); + } else + printf("[%d][%s] host: %s login: %s password: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, + hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr); + } + if (hydra_options.outfile_format == FORMAT_JSONV1 && hydra_options.outfile_ptr != NULL && hydra_brains.ofp != NULL) { + fprintf(hydra_brains.ofp, "%s\n\t{\"port\": %d, \"service\": \"%s\", \"host\": \"%s\", \"login\": \"%s\", \"password\": \"%s\"}", + hydra_brains.found == 1 ? "" : ",", // prefix a comma if not first finding + hydra_targets[hydra_heads[head_no]->target_no]->port, + hydra_options.service, + hydra_targets[hydra_heads[head_no]->target_no]->target !=NULL ? hydra_targets[hydra_heads[head_no]->target_no]->target : "", + hydra_heads[head_no]->current_login_ptr !=NULL ? hydra_string_replace(hydra_heads[head_no]->current_login_ptr,"\"","\\\"") : "", + hydra_heads[head_no]->current_pass_ptr != NULL ? hydra_string_replace(hydra_heads[head_no]->current_pass_ptr,"\"","\\\"") : "" + ); + fflush(hydra_brains.ofp); + } else if (hydra_options.outfile_ptr != NULL && hydra_brains.ofp != NULL) { // else output format == 0 aka text + if (hydra_heads[head_no]->current_login_ptr == NULL || strlen(hydra_heads[head_no]->current_login_ptr) == 0) { + if (hydra_heads[head_no]->current_pass_ptr == NULL || strlen(hydra_heads[head_no]->current_pass_ptr) == 0) + fprintf(hydra_brains.ofp, "[%d][%s] host: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, + hydra_targets[hydra_heads[head_no]->target_no]->target); + else + fprintf(hydra_brains.ofp, "[%d][%s] host: %s password: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, + hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_pass_ptr); + } else if (hydra_heads[head_no]->current_pass_ptr == NULL || strlen(hydra_heads[head_no]->current_pass_ptr) == 0) { + fprintf(hydra_brains.ofp, "[%d][%s] host: %s login: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, + hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr); + } else + fprintf(hydra_brains.ofp, "[%d][%s] host: %s login: %s password: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, + hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr); + fflush(hydra_brains.ofp); + } + if (hydra_options.exit_found) { // option set says quit target after on valid login/pass pair is found + if (hydra_targets[hydra_heads[head_no]->target_no]->done == STATE_ACTIVE) { + hydra_targets[hydra_heads[head_no]->target_no]->done = STATE_FINISHED; // mark target as done + hydra_brains.finished++; + printf("[STATUS] attack finished for %s (valid pair found)\n", hydra_targets[hydra_heads[head_no]->target_no]->target); } - continue; - } - // fall through - case 'f': // username identified as invalid - hydra_targets[hydra_heads[head_no]->target_no]->ok = 1; - if (hydra_targets[hydra_heads[head_no]->target_no]->fail_count > 0) - hydra_targets[hydra_heads[head_no]->target_no]->fail_count--; - memset(buf, 0, sizeof(buf)); - read_safe(hydra_heads[head_no]->sp[0], buf, MAXBUF); - hydra_skip_user(hydra_heads[head_no]->target_no, buf); - fck = write(hydra_heads[head_no]->sp[1], "n", 1); // small hack - break; - + if (hydra_options.exit_found == 2) { + for (j = 0; j < hydra_brains.targets; j++) + if (hydra_targets[j]->done == STATE_ACTIVE) { + hydra_targets[j]->done = STATE_FINISHED; + hydra_brains.finished++; + } + } + for (j = 0; j < hydra_options.max_use; j++) + if (hydra_heads[j]->active >= 0 && (hydra_heads[j]->target_no == target_no || hydra_options.exit_found == 2)) { + if (hydra_brains.targets > hydra_brains.finished && hydra_options.exit_found < 2) + hydra_kill_head(j, 1, 0); // kill all heads working on the target + else + hydra_kill_head(j, 1, 2); // kill all heads working on the target + } + continue; + } + // fall through + case 'f': // username identified as invalid + hydra_targets[hydra_heads[head_no]->target_no]->ok = 1; + if (hydra_targets[hydra_heads[head_no]->target_no]->fail_count > 0) + hydra_targets[hydra_heads[head_no]->target_no]->fail_count--; + memset(buf, 0, sizeof(buf)); + read_safe(hydra_heads[head_no]->sp[0], buf, MAXBUF); + hydra_skip_user(hydra_heads[head_no]->target_no, buf); + fck = write(hydra_heads[head_no]->sp[1], "n", 1); // small hack + break; + // we do not make a difference between 'C' and 'E' results - yet - case 'E': // head reports protocol error - case 'C': // head reports connect error - fck = write(hydra_heads[head_no]->sp[0], "Q", 1); - if (debug) { - printf("[ATTEMPT-ERROR] target %s - login \"%s\" - pass \"%s\" - child %d - %lu of %lu\n", - hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, head_no, - hydra_targets[hydra_heads[head_no]->target_no]->sent, hydra_brains.todo); - } - hydra_increase_fail_count(hydra_heads[head_no]->target_no, head_no); - break; + case 'E': // head reports protocol error + case 'C': // head reports connect error + fck = write(hydra_heads[head_no]->sp[0], "Q", 1); + if (debug) { + printf("[ATTEMPT-ERROR] target %s - login \"%s\" - pass \"%s\" - child %d - %lu of %lu\n", + hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, head_no, + hydra_targets[hydra_heads[head_no]->target_no]->sent, hydra_brains.todo); + } + hydra_increase_fail_count(hydra_heads[head_no]->target_no, head_no); + break; - case 'Q': // head reports its quitting - fck = write(hydra_heads[head_no]->sp[0], "Q", 1); - if (debug) - printf("[DEBUG] child %d reported it quit\n", head_no); - hydra_kill_head(head_no, 1, 0); - break; - - default: - fprintf(stderr, "[ERROR] child %d sent nonsense data, killing and restarting it!\n", head_no); + case 'Q': // head reports its quitting + fck = write(hydra_heads[head_no]->sp[0], "Q", 1); + if (debug) + printf("[DEBUG] child %d reported it quit\n", head_no); + hydra_kill_head(head_no, 1, 0); + break; + + default: + fprintf(stderr, "[ERROR] child %d sent nonsense data, killing and restarting it!\n", head_no); + hydra_increase_fail_count(hydra_heads[head_no]->target_no, head_no); + } // end switch + } // readres + if (readres == -1) { + if (verbose) + fprintf(stderr, "[WARNING] child %d seems to have died, restarting (this only happens if a module is bad) ... \n", head_no); hydra_increase_fail_count(hydra_heads[head_no]->target_no, head_no); } - } - if (readres == -1) { - if (verbose) - fprintf(stderr, "[WARNING] child %d seems to have died, restarting (this only happens if a module is bad) ... \n", head_no); - hydra_increase_fail_count(hydra_heads[head_no]->target_no, head_no); - } + } // end do_switch } else { if (hydra_heads[head_no]->last_seen + hydra_options.waittime > tmp_time) { // check if recover of timed-out head is necessary From 88aae592279141800da4565fb7598396fcf88ec8 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Fri, 23 Jun 2017 18:23:59 +0200 Subject: [PATCH 047/531] changed -R behaviour --- CHANGES | 3 +++ hydra.1 | 9 +++++++-- hydra.c | 18 +++++++++++------- 3 files changed, 21 insertions(+), 9 deletions(-) diff --git a/CHANGES b/CHANGES index ee7a523..ec4f017 100644 --- a/CHANGES +++ b/CHANGES @@ -4,6 +4,9 @@ Changelog for hydra Release 8.6-dev * http-form module now supports URLs up to 6000 bytes (thanks to petrock6@github for the patch) * Fix for SSL connections that failed with error:00000000:lib(0):func(0):reason(0) (thanks gaia@github for reporting) +* Added new command line option: + -c TIME: seconds between login attempts (over all threads, so -t 1 is recommended) +* Options put after -R (for loading a restore file) are now honored (and were disallowed before) * merged several patches by Diadlo@github to make the code easier readable. thanks for that! diff --git a/hydra.1 b/hydra.1 index 20ae24d..12e2e7c 100644 --- a/hydra.1 +++ b/hydra.1 @@ -6,7 +6,7 @@ hydra \- a very fast network logon cracker which support many different services [[[\-l LOGIN|\-L FILE] [\-p PASS|\-P FILE|\-x OPT \-y]] | [\-C FILE]] [\-e nsr] [\-u] [\-f|\-F] [\-M FILE] [\-o FILE] [\-b FORMAT] [\-t TASKS] [\-T TASKS] [\-w TIME] [\-W TIME] [\-m OPTIONS] [\-s PORT] - [\-S] [\-O] [\-4|6] [\-I] [\-vV] [\-d] + [\-c TIME] [\-S] [\-O] [\-4|6] [\-I] [\-vV] [\-d] server service [OPTIONS] .br .SH DESCRIPTION @@ -47,7 +47,8 @@ Some modules have optional or mandatory options. type "hydra \-U " .TP .B \-R restore a previously aborted session. Requires a hydra.restore file was -written. No other options are allowed when using \-R +written. Options are restored, but can be changed by setting them after +\-R on the command line .TP .B \-S connect via SSL @@ -115,6 +116,10 @@ defines the max wait time in seconds for responses (default: 32) defines a wait time between each connection a task performs. This usually only makes sense if a low task number is used, .e.g \-t 1 .TP +.B \-c TIME +the wait time in seconds per login attempt over all threads (-t 1 is recommended) +This usually only makes sense if a low task number is used, .e.g \-t 1 +.TP .B \-4 / \-6 prefer IPv4 (default) or IPv6 addresses .TP diff --git a/hydra.c b/hydra.c index 4f409ce..2385415 100644 --- a/hydra.c +++ b/hydra.c @@ -495,7 +495,7 @@ void help(int ext) { #ifdef HAVE_MATH_H " [-x MIN:MAX:CHARSET]" #endif - " [-ISOuvVd46] " + " [-c TIME] [-ISOuvVd46] " //"[server service [OPT]]|" "[service://server[:PORT][/OPT]]\n"); PRINT_NORMAL(ext, "\nOptions:\n"); @@ -521,7 +521,10 @@ void help(int ext) { " -f / -F exit when a login/pass pair is found (-M: -f per host, -F global)\n"); PRINT_NORMAL(ext, " -t TASKS run TASKS number of connects in parallel per target (default: %d)\n", TASKS); PRINT_EXTEND(ext, " -T TASKS run TASKS connects in parallel overall (for -M, default: %d)\n" - " -w / -W TIME waittime for responses (%d) / between connects per thread (%d)\n" + " -w / -W TIME wait time for a response (%d) / between connects per thread (%d)\n" +#ifdef MSG_PEEK + " -c TIME wait time per login attempt over all threads (-t 1 is recommended)\n" +#endif " -4 / -6 use IPv4 (default) / IPv6 addresses (put always in [] also in -M)\n" " -v / -V / -d verbose mode / show login+pass for each attempt / debug mode \n" " -O use old SSL v2 and v3\n" @@ -970,8 +973,7 @@ void hydra_restore_read() { int i, j, orig_debug = debug; char out[1024]; - if (debug) - printf("[DEBUG] reading restore file %s\n", RESTOREFILE); + printf("[INFORMATION] reading restore file %s\n", RESTOREFILE); if ((f = fopen(RESTOREFILE, "r")) == NULL) { fprintf(stderr, "[ERROR] restore file (%s) not found - ", RESTOREFILE); perror(""); @@ -2444,6 +2446,7 @@ int main(int argc, char *argv[]) { break; case 'R': hydra_options.restore = 1; + hydra_restore_read(); break; case 'I': ignore_restore = 1; // this is not to be saved in hydra_options! @@ -2610,7 +2613,8 @@ int main(int argc, char *argv[]) { printf("[DEBUG] Ouput color flag is %d\n", colored_output); if (hydra_options.restore && argc > 2 + debug + verbose) - bail("no option may be supplied together with -R"); + fprintf(stderr, "[WARNING] options after -R are now honored (since v8.6)\n"); +// bail("no option may be supplied together with -R"); printf("%s (%s) starting at %s\n", PROGRAM, RESOURCE, hydra_build_time()); if (debug) { @@ -2629,7 +2633,7 @@ int main(int argc, char *argv[]) { fprintf(stderr, "[WARNING] output file format specified (-b) - but no output file (-o)\n"); if (hydra_options.restore) { - hydra_restore_read(); +// hydra_restore_read(); // stuff we have to copy from the non-restore part if (strncmp(hydra_options.service, "http-", 5) == 0) { if (getenv("HYDRA_PROXY_HTTP") && getenv("HYDRA_PROXY")) @@ -3456,7 +3460,7 @@ int main(int argc, char *argv[]) { } free(memcheck); if ((rfp = fopen(RESTOREFILE, "r")) != NULL) { - fprintf(stderr, "[WARNING] Restorefile (%s) from a previous session found, to prevent overwriting, %s\n", ignore_restore == 1 ? "ignored ..." : "you have 10 seconds to abort...", RESTOREFILE); + fprintf(stderr, "[WARNING] Restorefile (%s) from a previous session found, to prevent overwriting, %s\n", ignore_restore == 1 ? "ignored ..." : "you have 10 seconds to abort... (use option -I to skip waiting)", RESTOREFILE); if (ignore_restore != 1) sleep(10); fclose(rfp); From 51d881353b91348db86341d1a78ca9bade6ddaaa Mon Sep 17 00:00:00 2001 From: van Hauser Date: Fri, 23 Jun 2017 19:15:18 +0200 Subject: [PATCH 048/531] moved help to modules --- CHANGES | 1 + hydra-cisco-enable.c | 10 ++ hydra-cisco.c | 4 + hydra-cvs.c | 4 + hydra-firebird.c | 4 + hydra-http-form.c | 37 +++++++ hydra-http-proxy-urlenum.c | 7 ++ hydra-http-proxy.c | 5 + hydra-http.c | 5 + hydra-imap.c | 6 ++ hydra-irc.c | 4 + hydra-ldap.c | 11 ++ hydra-mysql.c | 4 + hydra-ncp.c | 4 + hydra-nntp.c | 4 + hydra-oracle-listener.c | 4 + hydra-oracle.c | 4 + hydra-pop3.c | 6 ++ hydra-postgres.c | 4 + hydra-rdp.c | 4 + hydra-s7-300.c | 4 + hydra-sapr3.c | 4 + hydra-smb.c | 13 +++ hydra-smtp-enum.c | 7 ++ hydra-smtp.c | 6 ++ hydra-snmp.c | 20 ++++ hydra-sshkey.c | 7 ++ hydra-svn.c | 4 + hydra-telnet.c | 5 + hydra-xmpp.c | 6 ++ hydra.c | 207 ------------------------------------- 31 files changed, 208 insertions(+), 207 deletions(-) diff --git a/CHANGES b/CHANGES index ec4f017..5dd7266 100644 --- a/CHANGES +++ b/CHANGES @@ -8,6 +8,7 @@ Release 8.6-dev -c TIME: seconds between login attempts (over all threads, so -t 1 is recommended) * Options put after -R (for loading a restore file) are now honored (and were disallowed before) * merged several patches by Diadlo@github to make the code easier readable. thanks for that! +* merged a patch by Diadlo@github that moves the help output to the invididual module Release 8.5 diff --git a/hydra-cisco-enable.c b/hydra-cisco-enable.c index f943d5c..3113179 100644 --- a/hydra-cisco-enable.c +++ b/hydra-cisco-enable.c @@ -209,3 +209,13 @@ int service_cisco_enable_init(char *ip, int sp, unsigned char options, char *mis return 0; } + +void usage_cisco_enable(const char* service) { + printf("Module cisco-enable is optionally taking the logon password for the cisco device\n" + "Note: if AAA authentication is used, use the -l option for the username\n" + "and the optional parameter for the password of the user.\n" + "Examples:\n" + " hydra -P pass.txt target cisco-enable (direct console access)\n" + " hydra -P pass.txt -m cisco target cisco-enable (Logon password cisco)\n" + " hydra -l foo -m bar -P pass.txt target cisco-enable (AAA Login foo, password bar)\n"); +} diff --git a/hydra-cisco.c b/hydra-cisco.c index 3e45ad4..dcb50fc 100644 --- a/hydra-cisco.c +++ b/hydra-cisco.c @@ -211,3 +211,7 @@ int service_cisco_init(char *ip, int sp, unsigned char options, char *miscptr, F return 0; } + +void usage_cisco(const char* service) { + printf("Module cisco is optionally taking the keyword ENTER, it then sends an initial\n" "ENTER when connecting to the service.\n"); +} diff --git a/hydra-cvs.c b/hydra-cvs.c index 3995c95..0fa24e4 100644 --- a/hydra-cvs.c +++ b/hydra-cvs.c @@ -149,3 +149,7 @@ int service_cvs_init(char *ip, int sp, unsigned char options, char *miscptr, FIL return 0; } + +void usage_cvs(const char* service) { + printf("Module cvs is optionally taking the repository name to attack, default is \"/root\"\n\n"); +} diff --git a/hydra-firebird.c b/hydra-firebird.c index f606f0e..006c5c0 100644 --- a/hydra-firebird.c +++ b/hydra-firebird.c @@ -159,3 +159,7 @@ int service_firebird_init(char *ip, int sp, unsigned char options, char *miscptr return 0; } + +void usage_firebird(const char* service) { + printf("Module firebird is optionally taking the database path to attack,\n" "default is \"C:\\Program Files\\Firebird\\Firebird_1_5\\security.fdb\"\n\n"); +} diff --git a/hydra-http-form.c b/hydra-http-form.c index f322650..8d7ce36 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -1239,3 +1239,40 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { } return ptr_head; } + +void usage_http_form(const char* service) { + printf("Module %s requires the page and the parameters for the web form.\n\n" + "By default this module is configured to follow a maximum of 5 redirections in\n" + "a row. It always gathers a new cookie from the same URL without variables\n" + "The parameters take three \":\" separated values, plus optional values.\n" + "(Note: if you need a colon in the option string as value, escape it with \"\\:\", but do not escape a \"\\\" with \"\\\\\".)\n" + "\nSyntax: ::[:[:]\n" + "First is the page on the server to GET or POST to (URL).\n" + "Second is the POST/GET variables (taken from either the browser, proxy, etc.\n" + " with usernames and passwords being replaced in the \"^USER^\" and \"^PASS^\"\n" + " placeholders (FORM PARAMETERS)\n" + "Third is the string that it checks for an *invalid* login (by default)\n" + " Invalid condition login check can be preceded by \"F=\", successful condition\n" + " login check must be preceded by \"S=\".\n" + " This is where most people get it wrong. You have to check the webapp what a\n" + " failed string looks like and put it in this parameter!\n" + "The following parameters are optional:\n" + " C=/page/uri to define a different page to gather initial cookies from\n" + " (h|H)=My-Hdr\\: foo to send a user defined HTTP header with each request\n" + " ^USER^ and ^PASS^ can also be put into these headers!\n" + " Note: 'h' will add the user-defined header at the end\n" + " regardless it's already being sent by Hydra or not.\n" + " 'H' will replace the value of that header if it exists, by the\n" + " one supplied by the user, or add the header at the end\n" + "Note that if you are going to put colons (:) in your headers you should escape them with a backslash (\\).\n" + " All colons that are not option separators should be escaped (see the examples above and below).\n" + " You can specify a header without escaping the colons, but that way you will not be able to put colons\n" + " in the header value itself, as they will be interpreted by hydra as option separators.\n" + "\nExamples:\n" + " \"/login.php:user=^USER^&pass=^PASS^:incorrect\"\n" + " \"/login.php:user=^USER^&pass=^PASS^&colon=colon\\:escape:S=authlog=.*success\"\n" + " \"/login.php:user=^USER^&pass=^PASS^&mid=123:authlog=.*failed\"\n" + " \"/:user=^USER&pass=^PASS^:failed:H=Authorization\\: Basic dT1w:H=Cookie\\: sessid=aaaa:h=X-User\\: ^USER^:H=User-Agent\\: wget\"\n" + " \"/exchweb/bin/auth/owaauth.dll:destination=http%%3A%%2F%%2F%%2Fexchange&flags=0&username=%%5C^USER^&password=^PASS^&SubmitCreds=x&trusted=0:reason=:C=/exchweb\"\n", + service); +} diff --git a/hydra-http-proxy-urlenum.c b/hydra-http-proxy-urlenum.c index 97dce71..2f265d4 100644 --- a/hydra-http-proxy-urlenum.c +++ b/hydra-http-proxy-urlenum.c @@ -291,3 +291,10 @@ int service_http_proxy_urlenum_init(char *ip, int sp, unsigned char options, cha return 0; } + +void usage_http_proxy_urlenum(const char* service) { + printf("Module http-proxy-urlenum only uses the -L option, not -x or -p/-P option.\n" + "The -L loginfile must contain the URL list to try through the proxy.\n" + "The proxy credentials cann be put as the optional parameter, e.g.\n" + " hydra -L urllist.txt -s 3128 target.com http-proxy-urlenum user:pass\n" " hydra -L urllist.txt http-proxy-urlenum://target.com:3128/user:pass\n\n"); +} diff --git a/hydra-http-proxy.c b/hydra-http-proxy.c index 6a5c578..d21ae90 100644 --- a/hydra-http-proxy.c +++ b/hydra-http-proxy.c @@ -312,3 +312,8 @@ int service_http_proxy_init(char *ip, int sp, unsigned char options, char *miscp return 0; } + +void usage_http_proxy(const char* service) { + printf("Module http-proxy is optionally taking the page to authenticate at.\n" + "Default is http://www.microsoft.com/)\n" "Basic, DIGEST-MD5 and NTLM are supported and negotiated automatically.\n\n"); +} diff --git a/hydra-http.c b/hydra-http.c index a7d773f..9e5a28e 100644 --- a/hydra-http.c +++ b/hydra-http.c @@ -350,3 +350,8 @@ int service_http_init(char *ip, int sp, unsigned char options, char *miscptr, FI return 0; } + +void usage_http(const char* service) { + printf("Module %s requires the page to authenticate.\n" + "For example: \"/secret\" or \"http://bla.com/foo/bar\" or \"https://test.com:8080/members\"\n\n", service); +} diff --git a/hydra-imap.c b/hydra-imap.c index dcf45ed..07524d5 100644 --- a/hydra-imap.c +++ b/hydra-imap.c @@ -584,3 +584,9 @@ int service_imap_init(char *ip, int sp, unsigned char options, char *miscptr, FI return 0; } + +void usage_imap(const char* service) { + printf("Module imap is optionally taking one authentication type of:\n" + " CLEAR or APOP (default), LOGIN, PLAIN, CRAM-MD5, CRAM-SHA1,\n" + " CRAM-SHA256, DIGEST-MD5, NTLM\n" "Additionally TLS encryption via STARTTLS can be enforced with the TLS option.\n\n" "Example: imap://target/TLS:PLAIN\n"); +} diff --git a/hydra-irc.c b/hydra-irc.c index 42e2043..bb79ee0 100644 --- a/hydra-irc.c +++ b/hydra-irc.c @@ -222,3 +222,7 @@ int service_irc_init(char *ip, int sp, unsigned char options, char *miscptr, FIL return 0; } + +void usage_irc(const char* service) { + printf("Module irc is optionally taking the general server password, if the server is requiring one\n" "and none is passed the password from -p/-P will be used\n\n"); +} diff --git a/hydra-ldap.c b/hydra-ldap.c index 517d3c0..b1514c4 100644 --- a/hydra-ldap.c +++ b/hydra-ldap.c @@ -454,3 +454,14 @@ int service_ldap_init(char *ip, int sp, unsigned char options, char *miscptr, FI return 0; } + +void usage_ldap(const char* service) { + printf("Module %s is optionally taking the DN (depending of the auth method choosed\n" + "Note: you can also specify the DN as login when Simple auth method is used).\n" + "The keyword \"^USER^\" is replaced with the login.\n" + "Special notes for Simple method has 3 operation modes: anonymous, (no user no pass),\n" + "unauthenticated (user but no pass), user/pass authenticated (user and pass).\n" + "So don't forget to set empty string as user/pass to test all modes.\n" + "Hint: to authenticate to a windows active directy ldap, this is usually\n" + " cn=^USER^,cn=users,dc=foo,dc=bar,dc=com for domain foo.bar.com\n\n", service); +} diff --git a/hydra-mysql.c b/hydra-mysql.c index babf4a8..df9dad4 100644 --- a/hydra-mysql.c +++ b/hydra-mysql.c @@ -437,3 +437,7 @@ int service_mysql_init(char *ip, int sp, unsigned char options, char *miscptr, F return 0; } + +void usage_mysql(const char* service) { + printf("Module mysql is optionally taking the database to attack, default is \"mysql\"\n\n"); +} diff --git a/hydra-ncp.c b/hydra-ncp.c index 44c084c..ca22236 100644 --- a/hydra-ncp.c +++ b/hydra-ncp.c @@ -197,3 +197,7 @@ int service_ncp_init(char *ip, int sp, unsigned char options, char *miscptr, FIL return 0; } + +void usage_ncp(const char* service) { + printf("Module ncp is optionally taking the full context, for example \".O=cx\"\n\n"); +} diff --git a/hydra-nntp.c b/hydra-nntp.c index bfa3108..82753d1 100644 --- a/hydra-nntp.c +++ b/hydra-nntp.c @@ -485,3 +485,7 @@ int service_nntp_init(char *ip, int sp, unsigned char options, char *miscptr, FI return 0; } + +void usage_nntp(const char* service) { + printf("Module nntp is optionally taking one authentication type of:\n" " USER (default), LOGIN, PLAIN, CRAM-MD5, DIGEST-MD5, NTLM\n\n"); +} diff --git a/hydra-oracle-listener.c b/hydra-oracle-listener.c index 5f58181..9a52cea 100644 --- a/hydra-oracle-listener.c +++ b/hydra-oracle-listener.c @@ -339,4 +339,8 @@ int service_oracle_listener_init(char *ip, int sp, unsigned char options, char * return 0; } +void usage_oracle_listener(const char* service) { + printf("Module oracle-listener / tns is optionally taking the mode the password is stored as, could be PLAIN (default) or CLEAR\n\n"); +} + #endif diff --git a/hydra-oracle.c b/hydra-oracle.c index f590ea9..871adc8 100644 --- a/hydra-oracle.c +++ b/hydra-oracle.c @@ -196,3 +196,7 @@ int service_oracle_init(char *ip, int sp, unsigned char options, char *miscptr, return 0; } + +void usage_oracle(const char* service) { + printf("Module oracle / ora is optionally taking the ORACLE SID, default is \"ORCL\"\n\n"); +} diff --git a/hydra-pop3.c b/hydra-pop3.c index 4481dfc..1ae675b 100644 --- a/hydra-pop3.c +++ b/hydra-pop3.c @@ -775,3 +775,9 @@ int service_pop3_init(char *ip, int sp, unsigned char options, char *miscptr, FI return 0; } + +void usage_pop3(const char* service) { + printf("Module pop3 is optionally taking one authentication type of:\n" + " CLEAR (default), LOGIN, PLAIN, CRAM-MD5, CRAM-SHA1,\n" + " CRAM-SHA256, DIGEST-MD5, NTLM.\n" "Additionally TLS encryption via STLS can be enforced with the TLS option.\n\n" "Example: pop3://target/TLS:PLAIN\n"); +} diff --git a/hydra-postgres.c b/hydra-postgres.c index e572622..056e23b 100644 --- a/hydra-postgres.c +++ b/hydra-postgres.c @@ -132,3 +132,7 @@ int service_postgres_init(char *ip, int sp, unsigned char options, char *miscptr return 0; } + +void usage_postgres(const char* service) { + printf("Module postgres is optionally taking the database to attack, default is \"template1\"\n\n"); +} diff --git a/hydra-rdp.c b/hydra-rdp.c index 38c9c83..bd5b0e0 100644 --- a/hydra-rdp.c +++ b/hydra-rdp.c @@ -3247,3 +3247,7 @@ int service_rdp_init(char *ip, int sp, unsigned char options, char *miscptr, FIL return 0; } + +void usage_rdp(const char* service) { + printf("Module rdp is optionally taking the windows domain name.\n" "For example:\nhydra rdp://192.168.0.1/firstdomainname -l john -p doe\n\n"); +} diff --git a/hydra-s7-300.c b/hydra-s7-300.c index b06e398..6ece2f8 100644 --- a/hydra-s7-300.c +++ b/hydra-s7-300.c @@ -285,3 +285,7 @@ int service_s7_300_init(char *ip, int sp, unsigned char options, char *miscptr, return 0; } + +void usage_s7_300(const char* service) { + printf("Module S7-300 is for a special Siemens PLC. It either requires only a password or no authentication, so just use the -p or -P option.\n\n"); +} diff --git a/hydra-sapr3.c b/hydra-sapr3.c index bd46c3c..0eaa54a 100644 --- a/hydra-sapr3.c +++ b/hydra-sapr3.c @@ -130,3 +130,7 @@ int service_sapr3_init(char *ip, int sp, unsigned char options, char *miscptr, F return 0; } + +void usage_sapr3(const char* service) { + printf("Module sapr3 requires the client id, a number between 0 and 99\n\n"); +} diff --git a/hydra-smb.c b/hydra-smb.c index f0f5a40..0f669f2 100644 --- a/hydra-smb.c +++ b/hydra-smb.c @@ -1440,3 +1440,16 @@ int service_smb_init(char *ip, int sp, unsigned char options, char *miscptr, FIL return 0; } + +void usage_smb(const char* service) { + printf("Module smb default value is set to test both local and domain account, using a simple password with NTLM dialect.\n" + "Note: you can set the group type using LOCAL or DOMAIN keyword\n" + " or other_domain:{value} to specify a trusted domain.\n" + " you can set the password type using HASH or MACHINE keyword\n" + " (to use the Machine's NetBIOS name as the password).\n" + " you can set the dialect using NTLMV2, NTLM, LMV2, LM keyword.\n" + "Example: \n" + " hydra smb://microsoft.com -l admin -p tooeasy -m \"local lmv2\"\n" + " hydra smb://microsoft.com -l admin -p D5731CFC6C2A069C21FD0D49CAEBC9EA:2126EE7712D37E265FD63F2C84D2B13D::: -m \"local hash\"\n" + " hydra smb://microsoft.com -l admin -p tooeasy -m \"other_domain:SECONDDOMAIN\"\n\n"); +} diff --git a/hydra-smtp-enum.c b/hydra-smtp-enum.c index aad98f4..2e8e93b 100644 --- a/hydra-smtp-enum.c +++ b/hydra-smtp-enum.c @@ -262,3 +262,10 @@ int service_smtp_enum_init(char *ip, int sp, unsigned char options, char *miscpt return 0; } + +void usage_smtp_enum(const char* service) { + printf("Module smtp-enum is optionally taking one SMTP command of:\n\n" + "VRFY (default), EXPN, RCPT (which will connect using \"root\" account)\n" + "login parameter is used as username and password parameter as the domain name\n" + "For example to test if john@localhost exists on 192.168.0.1:\n" "hydra smtp-enum://192.168.0.1/vrfy -l john -p localhost\n\n"); +} diff --git a/hydra-smtp.c b/hydra-smtp.c index 1f40110..721671b 100644 --- a/hydra-smtp.c +++ b/hydra-smtp.c @@ -456,3 +456,9 @@ int service_smtp_init(char *ip, int sp, unsigned char options, char *miscptr, FI return 0; } + +void usage_smtp(const char* service) { + printf("Module smtp is optionally taking one authentication type of:\n" + " LOGIN (default), PLAIN, CRAM-MD5, DIGEST-MD5, NTLM\n\n" + "Additionally TLS encryption via STARTTLS can be enforced with the TLS option.\n\n" "Example: smtp://target/TLS:PLAIN\n"); +} diff --git a/hydra-snmp.c b/hydra-snmp.c index 497b7b1..1af2d3d 100644 --- a/hydra-snmp.c +++ b/hydra-snmp.c @@ -586,3 +586,23 @@ int service_snmp_init(char *ip, int sp, unsigned char options, char *miscptr, FI return 0; } + +void usage_snmp(const char* service) { + printf("Module snmp is optionally taking the following parameters:\n" + " READ perform read requests (default)\n" + " WRITE perform write requests\n" + " 1 use SNMP version 1 (default)\n" + " 2 use SNMP version 2\n" + " 3 use SNMP version 3\n" + " Note that SNMP version 3 usually uses both login and passwords!\n" + " SNMP version 3 has the following optional sub parameters:\n" + " MD5 use MD5 authentication (default)\n" + " SHA use SHA authentication\n" + " DES use DES encryption\n" + " AES use AES encryption\n" + " if no -p/-P parameter is given, SNMPv3 noauth is performed, which\n" + " only requires a password (or username) not both.\n" + "To combine the options, use colons (\":\"), e.g.:\n" + " hydra -L user.txt -P pass.txt -m 3:SHA:AES:READ target.com snmp\n" + " hydra -P pass.txt -m 2 target.com snmp\n"); +} diff --git a/hydra-sshkey.c b/hydra-sshkey.c index 74df1e8..a8b3ec0 100644 --- a/hydra-sshkey.c +++ b/hydra-sshkey.c @@ -164,3 +164,10 @@ int service_sshkey_init(char *ip, int sp, unsigned char options, char *miscptr, return 0; } + +void usage_sshkey(const char* service) { + printf("Module sshkey does not provide additional options, although the semantic for\n" + "options -p and -P is changed:\n" + " -p expects a path to an unencrypted private key in PEM format.\n" + " -P expects a filename containing a list of path to some unencrypted\n" " private keys in PEM format.\n\n"); +} diff --git a/hydra-svn.c b/hydra-svn.c index ec1efae..2e4b06a 100644 --- a/hydra-svn.c +++ b/hydra-svn.c @@ -212,3 +212,7 @@ int service_svn_init(char *ip, int sp, unsigned char options, char *miscptr, FIL return 0; } + +void usage_svn(const char* service) { + printf("Module svn is optionally taking the repository name to attack, default is \"trunk\"\n\n"); +} diff --git a/hydra-telnet.c b/hydra-telnet.c index b5ba065..caecdd4 100644 --- a/hydra-telnet.c +++ b/hydra-telnet.c @@ -217,3 +217,8 @@ int service_telnet_init(char *ip, int sp, unsigned char options, char *miscptr, return 0; } + +void usage_telnet(const char* service) { + printf("Module telnet is optionally taking the string which is displayed after\n" + "a successful login (case insensitive), use if the default in the telnet\n" "module produces too many false positives\n\n"); +} diff --git a/hydra-xmpp.c b/hydra-xmpp.c index db38fe0..ffd2552 100644 --- a/hydra-xmpp.c +++ b/hydra-xmpp.c @@ -498,3 +498,9 @@ int service_xmpp_init(char *ip, int sp, unsigned char options, char *miscptr, FI return 0; } + +void usage_xmpp(const char* service) { + printf("Module xmpp is optionally taking one authentication type of:\n" + " LOGIN (default), PLAIN, CRAM-MD5, DIGEST-MD5, SCRAM-SHA1\n\n" + "Note, the target passed should be a fdqn as the value is used in the Jabber init request, example: hermes.jabber.org\n\n"); +} diff --git a/hydra.c b/hydra.c index 2385415..581fad7 100644 --- a/hydra.c +++ b/hydra.c @@ -581,213 +581,6 @@ void help_bfg() { exit(-1); } -void usage_oracle(const char* service) { - printf("Module oracle / ora is optionally taking the ORACLE SID, default is \"ORCL\"\n\n"); -} - -void usage_oracle_listener(const char* service) { - printf("Module oracle-listener / tns is optionally taking the mode the password is stored as, could be PLAIN (default) or CLEAR\n\n"); -} - -void usage_cvs(const char* service) { - printf("Module cvs is optionally taking the repository name to attack, default is \"/root\"\n\n"); -} - -void usage_xmpp(const char* service) { - printf("Module xmpp is optionally taking one authentication type of:\n" - " LOGIN (default), PLAIN, CRAM-MD5, DIGEST-MD5, SCRAM-SHA1\n\n" - "Note, the target passed should be a fdqn as the value is used in the Jabber init request, example: hermes.jabber.org\n\n"); -} - -void usage_pop3(const char* service) { - printf("Module pop3 is optionally taking one authentication type of:\n" - " CLEAR (default), LOGIN, PLAIN, CRAM-MD5, CRAM-SHA1,\n" - " CRAM-SHA256, DIGEST-MD5, NTLM.\n" "Additionally TLS encryption via STLS can be enforced with the TLS option.\n\n" "Example: pop3://target/TLS:PLAIN\n"); -} - -void usage_rdp(const char* service) { - printf("Module rdp is optionally taking the windows domain name.\n" "For example:\nhydra rdp://192.168.0.1/firstdomainname -l john -p doe\n\n"); -} - -void usage_s7_300(const char* service) { - printf("Module S7-300 is for a special Siemens PLC. It either requires only a password or no authentication, so just use the -p or -P option.\n\n"); -} - -void usage_nntp(const char* service) { - printf("Module nntp is optionally taking one authentication type of:\n" " USER (default), LOGIN, PLAIN, CRAM-MD5, DIGEST-MD5, NTLM\n\n"); -} - -void usage_imap(const char* service) { - printf("Module imap is optionally taking one authentication type of:\n" - " CLEAR or APOP (default), LOGIN, PLAIN, CRAM-MD5, CRAM-SHA1,\n" - " CRAM-SHA256, DIGEST-MD5, NTLM\n" "Additionally TLS encryption via STARTTLS can be enforced with the TLS option.\n\n" "Example: imap://target/TLS:PLAIN\n"); -} - -void usage_smtp_enum(const char* service) { - printf("Module smtp-enum is optionally taking one SMTP command of:\n\n" - "VRFY (default), EXPN, RCPT (which will connect using \"root\" account)\n" - "login parameter is used as username and password parameter as the domain name\n" - "For example to test if john@localhost exists on 192.168.0.1:\n" "hydra smtp-enum://192.168.0.1/vrfy -l john -p localhost\n\n"); -} - -void usage_smtp(const char* service) { - printf("Module smtp is optionally taking one authentication type of:\n" - " LOGIN (default), PLAIN, CRAM-MD5, DIGEST-MD5, NTLM\n\n" - "Additionally TLS encryption via STARTTLS can be enforced with the TLS option.\n\n" "Example: smtp://target/TLS:PLAIN\n"); -} - -void usage_svn(const char* service) { - printf("Module svn is optionally taking the repository name to attack, default is \"trunk\"\n\n"); -} - -void usage_ncp(const char* service) { - printf("Module ncp is optionally taking the full context, for example \".O=cx\"\n\n"); -} - -void usage_firebird(const char* service) { - printf("Module firebird is optionally taking the database path to attack,\n" "default is \"C:\\Program Files\\Firebird\\Firebird_1_5\\security.fdb\"\n\n"); -} - -void usage_mysql(const char* service) { - printf("Module mysql is optionally taking the database to attack, default is \"mysql\"\n\n"); -} - -void usage_irc(const char* service) { - printf("Module irc is optionally taking the general server password, if the server is requiring one\n" "and none is passed the password from -p/-P will be used\n\n"); -} - -void usage_postgres(const char* service) { - printf("Module postgres is optionally taking the database to attack, default is \"template1\"\n\n"); -} - -void usage_telnet(const char* service) { - printf("Module telnet is optionally taking the string which is displayed after\n" - "a successful login (case insensitive), use if the default in the telnet\n" "module produces too many false positives\n\n"); -} - -void usage_sapr3(const char* service) { - printf("Module sapr3 requires the client id, a number between 0 and 99\n\n"); -} - -void usage_sshkey(const char* service) { - printf("Module sshkey does not provide additional options, although the semantic for\n" - "options -p and -P is changed:\n" - " -p expects a path to an unencrypted private key in PEM format.\n" - " -P expects a filename containing a list of path to some unencrypted\n" " private keys in PEM format.\n\n"); -} - -void usage_cisco_enable(const char* service) { - printf("Module cisco-enable is optionally taking the logon password for the cisco device\n" - "Note: if AAA authentication is used, use the -l option for the username\n" - "and the optional parameter for the password of the user.\n" - "Examples:\n" - " hydra -P pass.txt target cisco-enable (direct console access)\n" - " hydra -P pass.txt -m cisco target cisco-enable (Logon password cisco)\n" - " hydra -l foo -m bar -P pass.txt target cisco-enable (AAA Login foo, password bar)\n"); -} - -void usage_cisco(const char* service) { - printf("Module cisco is optionally taking the keyword ENTER, it then sends an initial\n" "ENTER when connecting to the service.\n"); -} - -void usage_ldap(const char* service) { - printf("Module %s is optionally taking the DN (depending of the auth method choosed\n" - "Note: you can also specify the DN as login when Simple auth method is used).\n" - "The keyword \"^USER^\" is replaced with the login.\n" - "Special notes for Simple method has 3 operation modes: anonymous, (no user no pass),\n" - "unauthenticated (user but no pass), user/pass authenticated (user and pass).\n" - "So don't forget to set empty string as user/pass to test all modes.\n" - "Hint: to authenticate to a windows active directy ldap, this is usually\n" - " cn=^USER^,cn=users,dc=foo,dc=bar,dc=com for domain foo.bar.com\n\n", service); -} - -void usage_smb(const char* service) { - printf("Module smb default value is set to test both local and domain account, using a simple password with NTLM dialect.\n" - "Note: you can set the group type using LOCAL or DOMAIN keyword\n" - " or other_domain:{value} to specify a trusted domain.\n" - " you can set the password type using HASH or MACHINE keyword\n" - " (to use the Machine's NetBIOS name as the password).\n" - " you can set the dialect using NTLMV2, NTLM, LMV2, LM keyword.\n" - "Example: \n" - " hydra smb://microsoft.com -l admin -p tooeasy -m \"local lmv2\"\n" - " hydra smb://microsoft.com -l admin -p D5731CFC6C2A069C21FD0D49CAEBC9EA:2126EE7712D37E265FD63F2C84D2B13D::: -m \"local hash\"\n" - " hydra smb://microsoft.com -l admin -p tooeasy -m \"other_domain:SECONDDOMAIN\"\n\n"); -} - -void usage_http_form(const char* service) { - printf("Module %s requires the page and the parameters for the web form.\n\n" - "By default this module is configured to follow a maximum of 5 redirections in\n" - "a row. It always gathers a new cookie from the same URL without variables\n" - "The parameters take three \":\" separated values, plus optional values.\n" - "(Note: if you need a colon in the option string as value, escape it with \"\\:\", but do not escape a \"\\\" with \"\\\\\".)\n" - "\nSyntax: ::[:[:]\n" - "First is the page on the server to GET or POST to (URL).\n" - "Second is the POST/GET variables (taken from either the browser, proxy, etc.\n" - " with usernames and passwords being replaced in the \"^USER^\" and \"^PASS^\"\n" - " placeholders (FORM PARAMETERS)\n" - "Third is the string that it checks for an *invalid* login (by default)\n" - " Invalid condition login check can be preceded by \"F=\", successful condition\n" - " login check must be preceded by \"S=\".\n" - " This is where most people get it wrong. You have to check the webapp what a\n" - " failed string looks like and put it in this parameter!\n" - "The following parameters are optional:\n" - " C=/page/uri to define a different page to gather initial cookies from\n" - " (h|H)=My-Hdr\\: foo to send a user defined HTTP header with each request\n" - " ^USER^ and ^PASS^ can also be put into these headers!\n" - " Note: 'h' will add the user-defined header at the end\n" - " regardless it's already being sent by Hydra or not.\n" - " 'H' will replace the value of that header if it exists, by the\n" - " one supplied by the user, or add the header at the end\n" - "Note that if you are going to put colons (:) in your headers you should escape them with a backslash (\\).\n" - " All colons that are not option separators should be escaped (see the examples above and below).\n" - " You can specify a header without escaping the colons, but that way you will not be able to put colons\n" - " in the header value itself, as they will be interpreted by hydra as option separators.\n" - "\nExamples:\n" - " \"/login.php:user=^USER^&pass=^PASS^:incorrect\"\n" - " \"/login.php:user=^USER^&pass=^PASS^&colon=colon\\:escape:S=authlog=.*success\"\n" - " \"/login.php:user=^USER^&pass=^PASS^&mid=123:authlog=.*failed\"\n" - " \"/:user=^USER&pass=^PASS^:failed:H=Authorization\\: Basic dT1w:H=Cookie\\: sessid=aaaa:h=X-User\\: ^USER^:H=User-Agent\\: wget\"\n" - " \"/exchweb/bin/auth/owaauth.dll:destination=http%%3A%%2F%%2F%%2Fexchange&flags=0&username=%%5C^USER^&password=^PASS^&SubmitCreds=x&trusted=0:reason=:C=/exchweb\"\n", - service); -} - -void usage_http_proxy(const char* service) { - printf("Module http-proxy is optionally taking the page to authenticate at.\n" - "Default is http://www.microsoft.com/)\n" "Basic, DIGEST-MD5 and NTLM are supported and negotiated automatically.\n\n"); -} - -void usage_http_proxy_urlenum(const char* service) { - printf("Module http-proxy-urlenum only uses the -L option, not -x or -p/-P option.\n" - "The -L loginfile must contain the URL list to try through the proxy.\n" - "The proxy credentials cann be put as the optional parameter, e.g.\n" - " hydra -L urllist.txt -s 3128 target.com http-proxy-urlenum user:pass\n" " hydra -L urllist.txt http-proxy-urlenum://target.com:3128/user:pass\n\n"); -} - -void usage_snmp(const char* service) { - printf("Module snmp is optionally taking the following parameters:\n" - " READ perform read requests (default)\n" - " WRITE perform write requests\n" - " 1 use SNMP version 1 (default)\n" - " 2 use SNMP version 2\n" - " 3 use SNMP version 3\n" - " Note that SNMP version 3 usually uses both login and passwords!\n" - " SNMP version 3 has the following optional sub parameters:\n" - " MD5 use MD5 authentication (default)\n" - " SHA use SHA authentication\n" - " DES use DES encryption\n" - " AES use AES encryption\n" - " if no -p/-P parameter is given, SNMPv3 noauth is performed, which\n" - " only requires a password (or username) not both.\n" - "To combine the options, use colons (\":\"), e.g.:\n" - " hydra -L user.txt -P pass.txt -m 3:SHA:AES:READ target.com snmp\n" - " hydra -P pass.txt -m 2 target.com snmp\n"); -} - -void usage_http(const char* service) { - printf("Module %s requires the page to authenticate.\n" - "For example: \"/secret\" or \"http://bla.com/foo/bar\" or \"https://test.com:8080/members\"\n\n", service); -} - void module_usage() { int i; if (!hydra_options.service) { From 115a4d007a690621c10d763e08e11ddaa9348cc9 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Sat, 24 Jun 2017 15:18:40 +0200 Subject: [PATCH 049/531] forget to move -c option value to restore file data --- Makefile | 89 ++++++++++++++++++++++++++++++++++++++++++++++++++++++-- hydra.c | 11 +++---- 2 files changed, 93 insertions(+), 7 deletions(-) diff --git a/Makefile b/Makefile index 372e67e..9679ecb 100644 --- a/Makefile +++ b/Makefile @@ -1,5 +1,90 @@ -all: - @echo Error: you must run "./configure" first +CC=gcc +STRIP=strip +XDEFINES= -DLIBOPENSSL -DHAVE_PCRE -DLIBSVN -DHAVE_ZLIB -DHAVE_MATH_H +XLIBS= -lz -lssl -lpcre -lsvn_client-1 -lapr-1 -laprutil-1 -lsvn_subr-1 -lcrypto +XLIBPATHS=-L/usr/lib -L/usr/local/lib -L/lib -L/lib +XIPATHS= -I/usr/include -I/usr/include/subversion-1 -I/usr/include/apr-1 -I/usr/include/subversion-1 +PREFIX=/usr/local +XHYDRA_SUPPORT= +STRIP=strip + +HYDRA_LOGO=hydra-logo.o +PWI_LOGO=pw-inspector-logo.o +SEC=-fstack-protector-all --param ssp-buffer-size=4 -D_FORTIFY_SOURCE=2 + +# +# Makefile for Hydra - (c) 2001-2017 by van Hauser / THC +# +OPTS=-I. -O3 +# -Wall -g -pedantic +LIBS=-lm +BINDIR = /bin +MANDIR ?= /man/man1/ +DATADIR ?= /etc +DESTDIR ?= + +SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ + hydra-telnet.c hydra-cisco.c hydra-http.c hydra-ftp.c hydra-imap.c \ + hydra-pop3.c hydra-smb.c hydra-icq.c hydra-cisco-enable.c hydra-ldap.c \ + hydra-mysql.c hydra-mssql.c hydra-xmpp.c hydra-http-proxy-urlenum.c \ + hydra-snmp.c hydra-cvs.c hydra-smtp.c hydra-smtp-enum.c hydra-sapr3.c hydra-ssh.c \ + hydra-sshkey.c hydra-teamspeak.c hydra-postgres.c hydra-rsh.c hydra-rlogin.c \ + hydra-oracle-listener.c hydra-svn.c hydra-pcanywhere.c hydra-sip.c \ + hydra-oracle.c hydra-vmauthd.c hydra-asterisk.c hydra-firebird.c hydra-afp.c hydra-ncp.c \ + hydra-oracle-sid.c hydra-http-proxy.c hydra-http-form.c hydra-irc.c \ + hydra-rdp.c hydra-s7-300.c hydra-redis.c hydra-adam6500.c \ + crc32.c d3des.c bfg.c ntlm.c sasl.c hmacmd5.c hydra-mod.c hydra-rtsp.c hydra-time.c hydra-rpcap.c +OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ + hydra-telnet.o hydra-cisco.o hydra-http.o hydra-ftp.o hydra-imap.o \ + hydra-pop3.o hydra-smb.o hydra-icq.o hydra-cisco-enable.o hydra-ldap.o \ + hydra-mysql.o hydra-mssql.o hydra-xmpp.o hydra-http-proxy-urlenum.o \ + hydra-snmp.o hydra-cvs.o hydra-smtp.o hydra-smtp-enum.o hydra-sapr3.o hydra-ssh.o \ + hydra-sshkey.o hydra-teamspeak.o hydra-postgres.o hydra-rsh.o hydra-rlogin.o \ + hydra-oracle-listener.o hydra-svn.o hydra-pcanywhere.o hydra-sip.o \ + hydra-oracle-sid.o hydra-oracle.o hydra-vmauthd.o hydra-asterisk.o hydra-firebird.o hydra-afp.o hydra-ncp.o \ + hydra-http-proxy.o hydra-http-form.o hydra-irc.o hydra-redis.o \ + hydra-rdp.o hydra-s7-300.c hydra-adam6500.o \ + crc32.o d3des.o bfg.o ntlm.o sasl.o hmacmd5.o hydra-mod.o hydra-rtsp.o hydra-time.o hydra-rpcap.o +BINS = hydra pw-inspector + +EXTRA_DIST = README README.arm README.palm CHANGES TODO INSTALL LICENSE \ + hydra-mod.h hydra.h crc32.h d3des.h + +all: pw-inspector hydra $(XHYDRA_SUPPORT) + @echo + @echo Now type "make install" + +hydra: hydra.c $(OBJ) + $(CC) $(OPTS) $(SEC) $(LIBS) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o hydra $(HYDRA_LOGO) hydra.c $(OBJ) $(LIBS) $(XLIBS) $(XLIBPATHS) $(XIPATHS) $(XDEFINES) + @echo + @echo If men could get pregnant, abortion would be a sacrament + @echo + +xhydra: + -cd hydra-gtk && sh ./make_xhydra.sh + +pw-inspector: pw-inspector.c + -$(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o pw-inspector $(PWI_LOGO) pw-inspector.c + +.c.o: + $(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) -c $< $(XDEFINES) $(XIPATHS) + +strip: all + strip $(BINS) + -echo OK > /dev/null && test -x xhydra && strip xhydra || echo OK > /dev/null + +install: strip + -mkdir -p $(DESTDIR)$(PREFIX)$(BINDIR) + cp -f hydra-wizard.sh $(BINS) $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 hydra-wizard.sh $(BINS) + -echo OK > /dev/null && test -x xhydra && cp xhydra $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 xhydra || echo OK > /dev/null + -sed -e "s|^INSTALLDIR=.*|INSTALLDIR="$(PREFIX)"|" dpl4hydra.sh | sed -e "s|^LOCATION=.*|LOCATION="$(DATADIR)"|" > $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh + -chmod 755 $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh + -mkdir -p $(DESTDIR)$(PREFIX)$(DATADIR) + -cp -f *.csv $(DESTDIR)$(PREFIX)$(DATADIR) + -mkdir -p $(DESTDIR)$(PREFIX)$(MANDIR) + -cp -f hydra.1 xhydra.1 pw-inspector.1 $(DESTDIR)$(PREFIX)$(MANDIR) clean: + rm -rf xhydra pw-inspector hydra *.o core *.core *.stackdump *~ Makefile.in Makefile dev_rfc hydra.restore arm/*.ipk arm/ipkg/usr/bin/* hydra-gtk/src/*.o hydra-gtk/src/xhydra hydra-gtk/stamp-h hydra-gtk/config.status hydra-gtk/errors hydra-gtk/config.log hydra-gtk/src/.deps hydra-gtk/src/Makefile hydra-gtk/Makefile cp -f Makefile.orig Makefile + diff --git a/hydra.c b/hydra.c index 581fad7..7260b63 100644 --- a/hydra.c +++ b/hydra.c @@ -311,6 +311,7 @@ typedef struct { int exit_found; int max_use; int cidr; + int time_next_attempt; output_format_t outfile_format; char *login; char *loginfile; @@ -2094,7 +2095,7 @@ int main(int argc, char *argv[]) { size_t countinfile = 1, sizeinfile = 0; unsigned long int math2; int i = 0, j = 0, k, error = 0, modusage = 0, ignore_restore = 0, do_switch; - int head_no = 0, target_no = 0, exit_condition = 0, readres, time_next_attempt = 0; + int head_no = 0, target_no = 0, exit_condition = 0, readres; time_t starttime, elapsed_status, elapsed_restore, status_print = 59, tmp_time; char *tmpptr, *tmpptr2; char rc, buf[MAXBUF]; @@ -2341,7 +2342,7 @@ int main(int argc, char *argv[]) { break; case 'c': #ifdef MSG_PEEK - time_next_attempt = atoi(optarg); + hydra_options.time_next_attempt = atoi(optarg); #else fprintf(stderr, "[WARNING] -c option can not be used as your operating system is missing the MSG_PEEK feature\n"); #endif @@ -2416,7 +2417,7 @@ int main(int argc, char *argv[]) { printf("%s ", argv[i]); printf("\n"); } - if (hydra_options.tasks > 0 && time_next_attempt) + if (hydra_options.tasks > 0 && hydra_options.time_next_attempt) fprintf(stderr, "[WARNING] when using the -c option, you should also set the task per target to one (-t 1)\n"); if (hydra_options.login != NULL && hydra_options.loginfile != NULL) bail("You can only use -L OR -l, not both\n"); @@ -3697,8 +3698,8 @@ int main(int argc, char *argv[]) { case 1: if (FD_ISSET(hydra_heads[head_no]->sp[0], &fdreadheads)) { do_switch = 1; - if (time_next_attempt > 0) { - if (last_attempt + time_next_attempt >= time(NULL)) { + if (hydra_options.time_next_attempt > 0) { + if (last_attempt + hydra_options.time_next_attempt >= time(NULL)) { if (recv(hydra_heads[head_no]->sp[0], &rc, 1, MSG_PEEK) == 1 && (rc == 'N' || rc == 'n')) do_switch = 0; } else From be47c0e475ad15d2ad9bb38fc32e8fe234dc1123 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Sat, 24 Jun 2017 15:18:55 +0200 Subject: [PATCH 050/531] makefile clean --- Makefile | 89 ++------------------------------------------------------ 1 file changed, 2 insertions(+), 87 deletions(-) diff --git a/Makefile b/Makefile index 9679ecb..372e67e 100644 --- a/Makefile +++ b/Makefile @@ -1,90 +1,5 @@ -CC=gcc -STRIP=strip -XDEFINES= -DLIBOPENSSL -DHAVE_PCRE -DLIBSVN -DHAVE_ZLIB -DHAVE_MATH_H -XLIBS= -lz -lssl -lpcre -lsvn_client-1 -lapr-1 -laprutil-1 -lsvn_subr-1 -lcrypto -XLIBPATHS=-L/usr/lib -L/usr/local/lib -L/lib -L/lib -XIPATHS= -I/usr/include -I/usr/include/subversion-1 -I/usr/include/apr-1 -I/usr/include/subversion-1 -PREFIX=/usr/local -XHYDRA_SUPPORT= -STRIP=strip - -HYDRA_LOGO=hydra-logo.o -PWI_LOGO=pw-inspector-logo.o -SEC=-fstack-protector-all --param ssp-buffer-size=4 -D_FORTIFY_SOURCE=2 - -# -# Makefile for Hydra - (c) 2001-2017 by van Hauser / THC -# -OPTS=-I. -O3 -# -Wall -g -pedantic -LIBS=-lm -BINDIR = /bin -MANDIR ?= /man/man1/ -DATADIR ?= /etc -DESTDIR ?= - -SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ - hydra-telnet.c hydra-cisco.c hydra-http.c hydra-ftp.c hydra-imap.c \ - hydra-pop3.c hydra-smb.c hydra-icq.c hydra-cisco-enable.c hydra-ldap.c \ - hydra-mysql.c hydra-mssql.c hydra-xmpp.c hydra-http-proxy-urlenum.c \ - hydra-snmp.c hydra-cvs.c hydra-smtp.c hydra-smtp-enum.c hydra-sapr3.c hydra-ssh.c \ - hydra-sshkey.c hydra-teamspeak.c hydra-postgres.c hydra-rsh.c hydra-rlogin.c \ - hydra-oracle-listener.c hydra-svn.c hydra-pcanywhere.c hydra-sip.c \ - hydra-oracle.c hydra-vmauthd.c hydra-asterisk.c hydra-firebird.c hydra-afp.c hydra-ncp.c \ - hydra-oracle-sid.c hydra-http-proxy.c hydra-http-form.c hydra-irc.c \ - hydra-rdp.c hydra-s7-300.c hydra-redis.c hydra-adam6500.c \ - crc32.c d3des.c bfg.c ntlm.c sasl.c hmacmd5.c hydra-mod.c hydra-rtsp.c hydra-time.c hydra-rpcap.c -OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ - hydra-telnet.o hydra-cisco.o hydra-http.o hydra-ftp.o hydra-imap.o \ - hydra-pop3.o hydra-smb.o hydra-icq.o hydra-cisco-enable.o hydra-ldap.o \ - hydra-mysql.o hydra-mssql.o hydra-xmpp.o hydra-http-proxy-urlenum.o \ - hydra-snmp.o hydra-cvs.o hydra-smtp.o hydra-smtp-enum.o hydra-sapr3.o hydra-ssh.o \ - hydra-sshkey.o hydra-teamspeak.o hydra-postgres.o hydra-rsh.o hydra-rlogin.o \ - hydra-oracle-listener.o hydra-svn.o hydra-pcanywhere.o hydra-sip.o \ - hydra-oracle-sid.o hydra-oracle.o hydra-vmauthd.o hydra-asterisk.o hydra-firebird.o hydra-afp.o hydra-ncp.o \ - hydra-http-proxy.o hydra-http-form.o hydra-irc.o hydra-redis.o \ - hydra-rdp.o hydra-s7-300.c hydra-adam6500.o \ - crc32.o d3des.o bfg.o ntlm.o sasl.o hmacmd5.o hydra-mod.o hydra-rtsp.o hydra-time.o hydra-rpcap.o -BINS = hydra pw-inspector - -EXTRA_DIST = README README.arm README.palm CHANGES TODO INSTALL LICENSE \ - hydra-mod.h hydra.h crc32.h d3des.h - -all: pw-inspector hydra $(XHYDRA_SUPPORT) - @echo - @echo Now type "make install" - -hydra: hydra.c $(OBJ) - $(CC) $(OPTS) $(SEC) $(LIBS) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o hydra $(HYDRA_LOGO) hydra.c $(OBJ) $(LIBS) $(XLIBS) $(XLIBPATHS) $(XIPATHS) $(XDEFINES) - @echo - @echo If men could get pregnant, abortion would be a sacrament - @echo - -xhydra: - -cd hydra-gtk && sh ./make_xhydra.sh - -pw-inspector: pw-inspector.c - -$(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o pw-inspector $(PWI_LOGO) pw-inspector.c - -.c.o: - $(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) -c $< $(XDEFINES) $(XIPATHS) - -strip: all - strip $(BINS) - -echo OK > /dev/null && test -x xhydra && strip xhydra || echo OK > /dev/null - -install: strip - -mkdir -p $(DESTDIR)$(PREFIX)$(BINDIR) - cp -f hydra-wizard.sh $(BINS) $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 hydra-wizard.sh $(BINS) - -echo OK > /dev/null && test -x xhydra && cp xhydra $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 xhydra || echo OK > /dev/null - -sed -e "s|^INSTALLDIR=.*|INSTALLDIR="$(PREFIX)"|" dpl4hydra.sh | sed -e "s|^LOCATION=.*|LOCATION="$(DATADIR)"|" > $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh - -chmod 755 $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh - -mkdir -p $(DESTDIR)$(PREFIX)$(DATADIR) - -cp -f *.csv $(DESTDIR)$(PREFIX)$(DATADIR) - -mkdir -p $(DESTDIR)$(PREFIX)$(MANDIR) - -cp -f hydra.1 xhydra.1 pw-inspector.1 $(DESTDIR)$(PREFIX)$(MANDIR) +all: + @echo Error: you must run "./configure" first clean: - rm -rf xhydra pw-inspector hydra *.o core *.core *.stackdump *~ Makefile.in Makefile dev_rfc hydra.restore arm/*.ipk arm/ipkg/usr/bin/* hydra-gtk/src/*.o hydra-gtk/src/xhydra hydra-gtk/stamp-h hydra-gtk/config.status hydra-gtk/errors hydra-gtk/config.log hydra-gtk/src/.deps hydra-gtk/src/Makefile hydra-gtk/Makefile cp -f Makefile.orig Makefile - From 6a6c58c9255dd2e3398757e2c29cf01abb54f99d Mon Sep 17 00:00:00 2001 From: mindon Date: Sat, 24 Jun 2017 08:26:39 -0500 Subject: [PATCH 051/531] Reset redirect flag and fix redirect port error issue fix following 2 issues: 1. when fail is a redirect url, matched is not - but the redirect flag is still 1 - causing match missed 2. when redirect to a relative url on a port not 80, it fails to attach the port to the redirect url --- hydra-http-form.c | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 8d7ce36..89eeb7c 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -468,7 +468,8 @@ return -1 if no response from server */ int analyze_server_response(int s) { int runs = 0; - + redirected_flag = 0; + auth_flag = 0; while ((buf = hydra_receive_line(s)) != NULL) { runs++; //check for http redirection @@ -848,6 +849,10 @@ int start_http_form(int s, char *ip, int port, unsigned char options, char *misc str3[0] = '/'; } + if(strrchr(url, ':') == NULL && port != 80) { + sprintf(str2, "%s:%d", str2, port); + } + if (verbose) hydra_report(stderr, "[VERBOSE] Page redirected to http://%s%s\n", str2, str3); From bea6cbe821dc61a329b152f7089ec1af521da7ec Mon Sep 17 00:00:00 2001 From: van Hauser Date: Sun, 25 Jun 2017 16:27:12 +0200 Subject: [PATCH 052/531] write restore file if final threads did not complete --- hydra.c | 36 +++++++++++++++++++++++------------- 1 file changed, 23 insertions(+), 13 deletions(-) diff --git a/hydra.c b/hydra.c index 7260b63..9cde76c 100644 --- a/hydra.c +++ b/hydra.c @@ -2417,7 +2417,7 @@ int main(int argc, char *argv[]) { printf("%s ", argv[i]); printf("\n"); } - if (hydra_options.tasks > 0 && hydra_options.time_next_attempt) + if (hydra_options.tasks > 1 && hydra_options.time_next_attempt) fprintf(stderr, "[WARNING] when using the -c option, you should also set the task per target to one (-t 1)\n"); if (hydra_options.login != NULL && hydra_options.loginfile != NULL) bail("You can only use -L OR -l, not both\n"); @@ -3932,6 +3932,7 @@ int main(int argc, char *argv[]) { exit_condition = hydra_check_for_exit_condition(); } + process_restore = 0; if (debug) printf("[DEBUG] while loop left with %d\n", exit_condition); @@ -3961,6 +3962,26 @@ int main(int argc, char *argv[]) { fprintf(stderr, "[ERROR] illegal target result value (%d=>%d)\n", i, hydra_targets[i]->done); } + printf("%d of %d target%s%scompleted, %lu valid password%s found\n", hydra_brains.targets - j - k - error, hydra_brains.targets, hydra_brains.targets == 1 ? " " : "s ", + hydra_brains.found > 0 ? "successfully " : "", hydra_brains.found, hydra_brains.found == 1 ? "" : "s"); + + if (error == 0 && j == 0) { + process_restore = 0; + unlink(RESTOREFILE); + } else { + k = 0; + for (j = 0; j < hydra_options.max_use; j++) + if (hydra_heads[j]->active > 0) + k++; + if (hydra_options.cidr == 0 && k == 0) { + printf("[INFO] Writing restore file because %d server scan%s could not be completed\n", j + error, j + error == 1 ? "" : "s"); + hydra_restore_write(1); + } else if (k > 0) { + printf("[WARNING] Writing restore file because %d final worker threads did not complete until end.\n", k); + hydra_restore_write(1); + } + } + if (debug) printf("[DEBUG] killing all remaining childs now that might be stuck\n"); for (i = 0; i < hydra_options.max_use; i++) @@ -3968,18 +3989,7 @@ int main(int argc, char *argv[]) { hydra_kill_head(i, 1, 3); (void) wait3(NULL, WNOHANG, NULL); - printf("%d of %d target%s%scompleted, %lu valid password%s found\n", hydra_brains.targets - j - k - error, hydra_brains.targets, hydra_brains.targets == 1 ? " " : "s ", - hydra_brains.found > 0 ? "successfully " : "", hydra_brains.found, hydra_brains.found == 1 ? "" : "s"); - if (error == 0 && j == 0) { - process_restore = 0; - unlink(RESTOREFILE); - } else { - if (hydra_options.cidr == 0) { - printf("[INFO] Writing restore file because %d server scan%s could not be completed\n", j + error, j + error == 1 ? "" : "s"); - hydra_restore_write(1); - } - } - #define STRMAX (10*1024) +#define STRMAX (10*1024) char json_error[STRMAX+2], tmp_str[STRMAX+2]; memset(json_error, 0, STRMAX+2); memset(tmp_str, 0, STRMAX+2); From b4acb367f565e9c0bb3cf2c3215690912b63814a Mon Sep 17 00:00:00 2001 From: van Hauser Date: Sun, 25 Jun 2017 16:52:56 +0200 Subject: [PATCH 053/531] better head/target state documentation --- hydra.c | 113 +++++++++++++++++++++++++++++--------------------------- 1 file changed, 59 insertions(+), 54 deletions(-) diff --git a/hydra.c b/hydra.c index 9cde76c..5f3bb74 100644 --- a/hydra.c +++ b/hydra.c @@ -220,10 +220,16 @@ void hydra_kill_head(int head_no, int killit, int fail); // some enum definitions typedef enum { - STATE_ACTIVE = 0, - STATE_FINISHED = 1, - STATE_ERROR = 2, - STATE_UNRESOLVED = 3 + HEAD_DISABLED = -1, + HEAD_UNUSED = 0, + HEAD_ACTIVE = 1 +} head_state_t; + +typedef enum { + TARGET_ACTIVE = 0, + TARGET_FINISHED = 1, + TARGET_ERROR = 2, + TARGET_UNRESOLVED = 3 } target_state_t; typedef enum { @@ -251,7 +257,7 @@ typedef struct { char *current_login_ptr; char *current_pass_ptr; char reverse[256]; - int active; + head_state_t active; int redo; time_t last_seen; } hydra_head; @@ -645,14 +651,14 @@ void hydra_debug(int force, char *string) { return; for (i = 0; i < hydra_options.max_use; i++) { - if (hydra_heads[i]->active >= 0) { + if (hydra_heads[i]->active >= HEAD_UNUSED) { printf("[DEBUG] Task %d - pid %d active %d redo %d current_login_ptr %s current_pass_ptr %s\n", i, (int) hydra_heads[i]->pid, hydra_heads[i]->active, hydra_heads[i]->redo, STR_NULL(hydra_heads[i]->current_login_ptr), STR_NULL(hydra_heads[i]->current_pass_ptr)); - if (hydra_heads[i]->active == 0) + if (hydra_heads[i]->active == HEAD_UNUSED) inactive++; else active++; @@ -677,7 +683,7 @@ void hydra_restore_write(int print_msg) { return; for (i = 0; i < hydra_brains.targets; i++) - if (hydra_targets[j]->done != STATE_FINISHED && hydra_targets[j]->done != STATE_UNRESOLVED) + if (hydra_targets[j]->done != TARGET_FINISHED && hydra_targets[j]->done != TARGET_UNRESOLVED) j++; if (j == 0) { process_restore = 0; @@ -719,7 +725,7 @@ void hydra_restore_write(int print_msg) { if (hydra_options.colonfile == NULL || hydra_options.colonfile == empty_login) fck = fwrite(pass_ptr, hydra_brains.sizepass, 1, f); for (j = 0; j < hydra_brains.targets; j++) - if (hydra_targets[j]->done != STATE_FINISHED) { + if (hydra_targets[j]->done != TARGET_FINISHED) { fck = fwrite(hydra_targets[j], sizeof(hydra_target), 1, f); fprintf(f, "%s\n%d\n%d\n", hydra_targets[j]->target == NULL ? "" : hydra_targets[j]->target, (int) (hydra_targets[j]->login_ptr - login_ptr), (int) (hydra_targets[j]->pass_ptr - pass_ptr)); @@ -1152,7 +1158,7 @@ void hydra_service_init(int target_no) { if (x > 0 && x < 4) hydra_targets[target_no]->done = x; else - hydra_targets[target_no]->done = STATE_ERROR; + hydra_targets[target_no]->done = TARGET_ERROR; hydra_brains.finished++; if (hydra_brains.targets == 1) exit(-1); @@ -1168,7 +1174,7 @@ int hydra_spawn_head(int head_no, int target_no) { return -1; } - if (hydra_heads[head_no]->active < 0) { + if (hydra_heads[head_no]->active == HEAD_DISABLED) { printf("[DEBUG-ERROR] child %d should not be respawned!\n", head_no); return -1; } @@ -1235,7 +1241,7 @@ int hydra_spawn_head(int head_no, int target_no) { (void) fcntl(hydra_heads[head_no]->sp[0], F_SETFL, O_NONBLOCK); if (hydra_heads[head_no]->redo != 1) hydra_heads[head_no]->target_no = target_no; - hydra_heads[head_no]->active = 1; + hydra_heads[head_no]->active = HEAD_ACTIVE; hydra_targets[hydra_heads[head_no]->target_no]->use_count++; hydra_brains.active++; hydra_heads[head_no]->last_seen = time(NULL); @@ -1244,14 +1250,14 @@ int hydra_spawn_head(int head_no, int target_no) { } else { perror("[ERROR] Fork for children failed"); hydra_heads[head_no]->sp[0] = -1; - hydra_heads[head_no]->active = 0; + hydra_heads[head_no]->active = HEAD_UNUSED; return -1; } } } else { perror("[ERROR] socketpair creation failed"); hydra_heads[head_no]->sp[0] = -1; - hydra_heads[head_no]->active = 0; + hydra_heads[head_no]->active = HEAD_UNUSED; return -1; } return 0; @@ -1348,7 +1354,7 @@ void hydra_kill_head(int head_no, int killit, int fail) { printf("[DEBUG] head_no %d, kill %d, fail %d\n", head_no, killit, fail); if (head_no < 0) return; - if (hydra_heads[head_no]->active > 0 || (hydra_heads[head_no]->sp[0] > 2 && hydra_heads[head_no]->sp[1] > 2)) { + if (hydra_heads[head_no]->active == HEAD_ACTIVE || (hydra_heads[head_no]->sp[0] > 2 && hydra_heads[head_no]->sp[1] > 2)) { close(hydra_heads[head_no]->sp[0]); close(hydra_heads[head_no]->sp[1]); } @@ -1357,8 +1363,8 @@ void hydra_kill_head(int head_no, int killit, int fail) { kill(hydra_heads[head_no]->pid, SIGTERM); hydra_brains.active--; } - if (hydra_heads[head_no]->active > 0) { - hydra_heads[head_no]->active = 0; + if (hydra_heads[head_no]->active == HEAD_ACTIVE) { + hydra_heads[head_no]->active = HEAD_UNUSED; hydra_targets[hydra_heads[head_no]->target_no]->use_count--; } if (fail == 1) { @@ -1366,11 +1372,11 @@ void hydra_kill_head(int head_no, int killit, int fail) { hydra_heads[head_no]->redo = 1; } else if (fail == 2) { if (hydra_options.cidr != 1) - hydra_heads[head_no]->active = -1; + hydra_heads[head_no]->active = HEAD_DISABLED; if (hydra_heads[head_no]->target_no >= 0) hydra_targets[hydra_heads[head_no]->target_no]->failed++; } else if (fail == 3) { - hydra_heads[head_no]->active = -1; + hydra_heads[head_no]->active = HEAD_DISABLED; if (hydra_heads[head_no]->target_no >= 0) hydra_targets[hydra_heads[head_no]->target_no]->failed++; } @@ -1407,11 +1413,11 @@ void hydra_increase_fail_count(int target_no, int head_no) { if (hydra_targets[target_no]->fail_count >= maxfail) { k = 0; for (i = 0; i < hydra_options.max_use; i++) - if (hydra_heads[i]->active >= 0 && hydra_heads[i]->target_no == target_no) + if (hydra_heads[i]->active >= HEAD_UNUSED && hydra_heads[i]->target_no == target_no) k++; if (k <= 1) { // we need to put this in a list, otherwise we fail one login+pw test - if (hydra_targets[target_no]->done == STATE_ACTIVE + if (hydra_targets[target_no]->done == TARGET_ACTIVE && hydra_targets[target_no]->redo <= hydra_options.max_use * 2 && ((hydra_heads[head_no]->current_login_ptr != empty_login && hydra_heads[head_no]->current_pass_ptr != empty_login) || (hydra_heads[head_no]->current_login_ptr != NULL && hydra_heads[head_no]->current_pass_ptr != NULL))) { @@ -1426,11 +1432,11 @@ void hydra_increase_fail_count(int target_no, int head_no) { hydra_heads[head_no]->current_pass_ptr = empty_login; } if (hydra_targets[target_no]->fail_count >= MAXFAIL + hydra_options.tasks * hydra_targets[target_no]->ok) { - if (hydra_targets[target_no]->done == STATE_ACTIVE && hydra_options.max_use == hydra_targets[target_no]->failed) { + if (hydra_targets[target_no]->done == TARGET_ACTIVE && hydra_options.max_use == hydra_targets[target_no]->failed) { if (hydra_targets[target_no]->ok == 1) - hydra_targets[target_no]->done = STATE_ERROR; // mark target as done by errors + hydra_targets[target_no]->done = TARGET_ERROR; // mark target as done by errors else - hydra_targets[target_no]->done = STATE_UNRESOLVED; // mark target as done by unable to connect + hydra_targets[target_no]->done = TARGET_UNRESOLVED; // mark target as done by unable to connect hydra_brains.finished++; fprintf(stderr, "[ERROR] Too many connect errors to target, disabling %s://%s%s%s:%d\n", hydra_options.service, hydra_targets[target_no]->ip[0] == 16 && index(hydra_targets[target_no]->target, ':') != NULL ? "[" : "", hydra_targets[target_no]->target, hydra_targets[target_no]->ip[0] == 16 @@ -1443,7 +1449,7 @@ void hydra_increase_fail_count(int target_no, int head_no) { } // we keep the last one alive as long as it make sense } else { // we need to put this in a list, otherwise we fail one login+pw test - if (hydra_targets[target_no]->done == STATE_ACTIVE + if (hydra_targets[target_no]->done == TARGET_ACTIVE && hydra_targets[target_no]->redo <= hydra_options.max_use * 2 && ((hydra_heads[head_no]->current_login_ptr != empty_login && hydra_heads[head_no]->current_pass_ptr != empty_login) || (hydra_heads[head_no]->current_login_ptr != NULL && hydra_heads[head_no]->current_pass_ptr != NULL))) { @@ -1538,8 +1544,8 @@ int hydra_send_next_pair(int target_no, int head_no) { snpdone = 1; } else { if (hydra_targets[target_no]->sent >= hydra_brains.todo + hydra_targets[target_no]->redo) { - if (hydra_targets[target_no]->done == STATE_ACTIVE) { - hydra_targets[target_no]->done = STATE_FINISHED; + if (hydra_targets[target_no]->done == TARGET_ACTIVE) { + hydra_targets[target_no]->done = TARGET_FINISHED; hydra_brains.finished++; if (verbose) printf("[STATUS] attack finished for %s (waiting for children to complete tests)\n", hydra_targets[target_no]->target); @@ -1579,8 +1585,8 @@ int hydra_send_next_pair(int target_no, int head_no) { snpdone = 1; } else { // if a pair does not complete after this point it is lost - if (hydra_targets[target_no]->done == STATE_ACTIVE) { - hydra_targets[target_no]->done = STATE_FINISHED; + if (hydra_targets[target_no]->done == TARGET_ACTIVE) { + hydra_targets[target_no]->done = TARGET_FINISHED; hydra_brains.finished++; if (verbose) printf("[STATUS] attack finished for %s (waiting for children to complete tests)\n", hydra_targets[target_no]->target); @@ -1589,7 +1595,7 @@ int hydra_send_next_pair(int target_no, int head_no) { return -1; } } else { // normale state, no redo - if (hydra_targets[target_no]->done != STATE_ACTIVE) { + if (hydra_targets[target_no]->done != TARGET_ACTIVE) { loop_cnt = 0; return -1; // head will be disabled by main while() } @@ -1805,8 +1811,8 @@ int hydra_send_next_pair(int target_no, int head_no) { if (!snpdone || hydra_targets[target_no]->skipcnt >= hydra_brains.countlogin) { fck = write(hydra_heads[head_no]->sp[0], HYDRA_EXIT, sizeof(HYDRA_EXIT)); if (hydra_targets[target_no]->use_count <= 1) { - if (hydra_targets[target_no]->done == STATE_ACTIVE) { - hydra_targets[target_no]->done = STATE_FINISHED; + if (hydra_targets[target_no]->done == TARGET_ACTIVE) { + hydra_targets[target_no]->done = TARGET_FINISHED; hydra_brains.finished++; if (verbose) printf("[STATUS] attack finished for %s (waiting for children to complete tests)\n", hydra_targets[target_no]->target); @@ -1942,7 +1948,7 @@ int hydra_check_for_exit_condition() { if (hydra_brains.active < 1) { // no head active?! check if they are all disabled, if so, we are done for (i = 0; i < hydra_options.max_use && k == 0; i++) - if (hydra_heads[i]->active >= 0) + if (hydra_heads[i]->active >= HEAD_UNUSED) k = 1; if (k == 0) { fprintf(stderr, "[ERROR] all children were disabled due too many connection errors\n"); @@ -1956,7 +1962,7 @@ int hydra_select_target() { int target_no = -1, i, j = -1000; for (i = 0; i < hydra_brains.targets; i++) - if (hydra_targets[i]->use_count < hydra_options.tasks && hydra_targets[i]->done == STATE_ACTIVE) + if (hydra_targets[i]->use_count < hydra_options.tasks && hydra_targets[i]->done == TARGET_ACTIVE) if (j < hydra_options.tasks - hydra_targets[i]->failed - hydra_targets[i]->use_count) { target_no = i; j = hydra_options.tasks - hydra_targets[i]->failed - hydra_targets[i]->use_count; @@ -3558,7 +3564,7 @@ int main(int argc, char *argv[]) { printf("[failed for %s] ", hydra_targets[i]->target); else fprintf(stderr, "[ERROR] could not resolve address: %s\n", hydra_targets[i]->target); - hydra_targets[i]->done = STATE_UNRESOLVED; + hydra_targets[i]->done = TARGET_UNRESOLVED; hydra_brains.finished++; } } else { @@ -3580,7 +3586,7 @@ int main(int argc, char *argv[]) { if ((strcmp(hydra_options.service, "socks5") == 0) || (strcmp(hydra_options.service, "sip") == 0)) { fprintf(stderr, "[ERROR] Target %s resolves to an IPv6 address, however module %s does not support this. Maybe try \"-4\" option. Sending in patches helps.\n", hydra_targets[i]->target, hydra_options.service); - hydra_targets[i]->done = STATE_UNRESOLVED; + hydra_targets[i]->done = TARGET_UNRESOLVED; hydra_brains.finished++; } else { hydra_targets[i]->ip[0] = 16; @@ -3605,7 +3611,7 @@ int main(int argc, char *argv[]) { printf("[failed for %s] ", hydra_targets[i]->target); else fprintf(stderr, "[ERROR] Could not resolve proxy address: %s\n", hydra_targets[i]->target); - hydra_targets[i]->done = STATE_UNRESOLVED; + hydra_targets[i]->done = TARGET_UNRESOLVED; hydra_brains.finished++; } freeaddrinfo(res); @@ -3660,7 +3666,7 @@ int main(int argc, char *argv[]) { max_fd = 0; FD_ZERO(&fdreadheads); for (head_no = 0, max_fd = 1; head_no < hydra_options.max_use; head_no++) { - if (hydra_heads[head_no]->active > 0) { + if (hydra_heads[head_no]->active == HEAD_ACTIVE) { FD_SET(hydra_heads[head_no]->sp[0], &fdreadheads); if (max_fd < hydra_heads[head_no]->sp[0]) max_fd = hydra_heads[head_no]->sp[0]; @@ -3670,14 +3676,13 @@ int main(int argc, char *argv[]) { tmp_time = time(NULL); for (head_no = 0; head_no < hydra_options.max_use; head_no++) { - if (debug > 1 && hydra_heads[head_no]->active != -1) + if (debug > 1 && hydra_heads[head_no]->active != HEAD_DISABLED) printf("[DEBUG] head_no[%d] to target_no %d active %d\n", head_no, hydra_heads[head_no]->target_no, hydra_heads[head_no]->active); switch (hydra_heads[head_no]->active) { - case -1: - // disabled head, ignored + case HEAD_DISABLED: break; - case 0: + case HEAD_UNUSED: if (hydra_heads[head_no]->redo) { hydra_spawn_head(head_no, hydra_heads[head_no]->target_no); } else { @@ -3695,7 +3700,7 @@ int main(int argc, char *argv[]) { hydra_spawn_head(head_no, hydra_heads[head_no]->target_no); // target_no is ignored if head->redo == 1 } break; - case 1: + case HEAD_ACTIVE: if (FD_ISSET(hydra_heads[head_no]->sp[0], &fdreadheads)) { do_switch = 1; if (hydra_options.time_next_attempt > 0) { @@ -3792,15 +3797,15 @@ int main(int argc, char *argv[]) { fflush(hydra_brains.ofp); } if (hydra_options.exit_found) { // option set says quit target after on valid login/pass pair is found - if (hydra_targets[hydra_heads[head_no]->target_no]->done == STATE_ACTIVE) { - hydra_targets[hydra_heads[head_no]->target_no]->done = STATE_FINISHED; // mark target as done + if (hydra_targets[hydra_heads[head_no]->target_no]->done == TARGET_ACTIVE) { + hydra_targets[hydra_heads[head_no]->target_no]->done = TARGET_FINISHED; // mark target as done hydra_brains.finished++; printf("[STATUS] attack finished for %s (valid pair found)\n", hydra_targets[hydra_heads[head_no]->target_no]->target); } if (hydra_options.exit_found == 2) { for (j = 0; j < hydra_brains.targets; j++) - if (hydra_targets[j]->done == STATE_ACTIVE) { - hydra_targets[j]->done = STATE_FINISHED; + if (hydra_targets[j]->done == TARGET_ACTIVE) { + hydra_targets[j]->done = TARGET_FINISHED; hydra_brains.finished++; } } @@ -3906,7 +3911,7 @@ int main(int argc, char *argv[]) { } k = 0; for (j = 0; j < hydra_options.max_use; j++) - if (hydra_heads[j]->active >= 0) + if (hydra_heads[j]->active >= HEAD_UNUSED) k++; /* I think we don't need this anymore if ((hydra_brains.todo_all + total_redo_count) < hydra_brains.sent) { //in case of overflow of unsigned "-1" @@ -3940,18 +3945,18 @@ int main(int argc, char *argv[]) { j = k = error = 0; for (i = 0; i < hydra_brains.targets; i++) switch (hydra_targets[i]->done) { - case STATE_UNRESOLVED: + case TARGET_UNRESOLVED: k++; break; - case STATE_ERROR: + case TARGET_ERROR: if (hydra_targets[i]->ok == 0) k++; else error++; break; - case STATE_FINISHED: + case TARGET_FINISHED: break; - case STATE_ACTIVE: + case TARGET_ACTIVE: if (hydra_targets[i]->ok == 0) k++; else @@ -3971,7 +3976,7 @@ int main(int argc, char *argv[]) { } else { k = 0; for (j = 0; j < hydra_options.max_use; j++) - if (hydra_heads[j]->active > 0) + if (hydra_heads[j]->active == HEAD_ACTIVE) k++; if (hydra_options.cidr == 0 && k == 0) { printf("[INFO] Writing restore file because %d server scan%s could not be completed\n", j + error, j + error == 1 ? "" : "s"); @@ -3985,7 +3990,7 @@ int main(int argc, char *argv[]) { if (debug) printf("[DEBUG] killing all remaining childs now that might be stuck\n"); for (i = 0; i < hydra_options.max_use; i++) - if (hydra_heads[i]->active > 0 && hydra_heads[i]->pid > 0) + if (hydra_heads[i]->active == HEAD_ACTIVE && hydra_heads[i]->pid > 0) hydra_kill_head(i, 1, 3); (void) wait3(NULL, WNOHANG, NULL); From 13942efbbd2918e54624933a81f1a31bf2c91536 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Mon, 26 Jun 2017 09:50:47 +0200 Subject: [PATCH 054/531] ? --- hydra.c | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) diff --git a/hydra.c b/hydra.c index 5f3bb74..ac8210e 100644 --- a/hydra.c +++ b/hydra.c @@ -3970,14 +3970,15 @@ int main(int argc, char *argv[]) { printf("%d of %d target%s%scompleted, %lu valid password%s found\n", hydra_brains.targets - j - k - error, hydra_brains.targets, hydra_brains.targets == 1 ? " " : "s ", hydra_brains.found > 0 ? "successfully " : "", hydra_brains.found, hydra_brains.found == 1 ? "" : "s"); - if (error == 0 && j == 0) { + k = 0; + for (j = 0; j < hydra_options.max_use; j++) + if (hydra_heads[j]->active == HEAD_ACTIVE) + k++; + + if (error == 0 && j == 0 && k == 0) { process_restore = 0; unlink(RESTOREFILE); } else { - k = 0; - for (j = 0; j < hydra_options.max_use; j++) - if (hydra_heads[j]->active == HEAD_ACTIVE) - k++; if (hydra_options.cidr == 0 && k == 0) { printf("[INFO] Writing restore file because %d server scan%s could not be completed\n", j + error, j + error == 1 ? "" : "s"); hydra_restore_write(1); From 43c9ab09e57f061aa82391954d8c99aeceb7890d Mon Sep 17 00:00:00 2001 From: van Hauser Date: Mon, 26 Jun 2017 13:37:55 +0200 Subject: [PATCH 055/531] print test username --- hydra-ssh.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-ssh.c b/hydra-ssh.c index cb3acfe..636237e 100644 --- a/hydra-ssh.c +++ b/hydra-ssh.c @@ -172,7 +172,7 @@ int service_ssh_init(char *ip, int sp, unsigned char options, char *miscptr, FIL ssh_session session = ssh_new(); if (verbose || debug) - printf("[INFO] Testing if password authentication is supported by ssh://%s:%d\n", hydra_address2string(ip), port); + printf("[INFO] Testing if password authentication is supported by ssh://%s@%s:%d\n", miscptr == NULL ? "hydra" : "miscptr", hydra_address2string(ip), port); ssh_options_set(session, SSH_OPTIONS_PORT, &port); ssh_options_set(session, SSH_OPTIONS_HOST, hydra_address2string(ip)); if (miscptr == NULL) From eff86754f2810c220c7551357f6970ea9a3a010e Mon Sep 17 00:00:00 2001 From: van Hauser Date: Mon, 26 Jun 2017 16:35:38 +0200 Subject: [PATCH 056/531] fix --- hydra-ssh.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-ssh.c b/hydra-ssh.c index 636237e..d73a949 100644 --- a/hydra-ssh.c +++ b/hydra-ssh.c @@ -172,7 +172,7 @@ int service_ssh_init(char *ip, int sp, unsigned char options, char *miscptr, FIL ssh_session session = ssh_new(); if (verbose || debug) - printf("[INFO] Testing if password authentication is supported by ssh://%s@%s:%d\n", miscptr == NULL ? "hydra" : "miscptr", hydra_address2string(ip), port); + printf("[INFO] Testing if password authentication is supported by ssh://%s@%s:%d\n", miscptr == NULL ? "hydra" : miscptr, hydra_address2string(ip), port); ssh_options_set(session, SSH_OPTIONS_PORT, &port); ssh_options_set(session, SSH_OPTIONS_HOST, hydra_address2string(ip)); if (miscptr == NULL) From b43514dc4576e7020ed48cb4bdee5e2a12e4c9d8 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Tue, 27 Jun 2017 11:12:47 +0200 Subject: [PATCH 057/531] -c enforces -t 1 now --- hydra.c | 14 +++++++++++--- 1 file changed, 11 insertions(+), 3 deletions(-) diff --git a/hydra.c b/hydra.c index ac8210e..e0eb9a4 100644 --- a/hydra.c +++ b/hydra.c @@ -530,7 +530,7 @@ void help(int ext) { PRINT_EXTEND(ext, " -T TASKS run TASKS connects in parallel overall (for -M, default: %d)\n" " -w / -W TIME wait time for a response (%d) / between connects per thread (%d)\n" #ifdef MSG_PEEK - " -c TIME wait time per login attempt over all threads (-t 1 is recommended)\n" + " -c TIME wait time per login attempt over all threads (enforces -t 1)\n" #endif " -4 / -6 use IPv4 (default) / IPv6 addresses (put always in [] also in -M)\n" " -v / -V / -d verbose mode / show login+pass for each attempt / debug mode \n" @@ -2349,6 +2349,13 @@ int main(int argc, char *argv[]) { case 'c': #ifdef MSG_PEEK hydra_options.time_next_attempt = atoi(optarg); + if (hydra_options.time_next_attempt < 0) { + fprintf(stderr, "[ERROR] -c option value can not be negative\n"); + exit(-1); + } else if (hydra_options.time_next_attempt > 0) { + printf("[INFO] setting max tasks per host to 1 due to -c option usage\n"); + hydra_options.tasks = 1; + } #else fprintf(stderr, "[WARNING] -c option can not be used as your operating system is missing the MSG_PEEK feature\n"); #endif @@ -3970,12 +3977,13 @@ int main(int argc, char *argv[]) { printf("%d of %d target%s%scompleted, %lu valid password%s found\n", hydra_brains.targets - j - k - error, hydra_brains.targets, hydra_brains.targets == 1 ? " " : "s ", hydra_brains.found > 0 ? "successfully " : "", hydra_brains.found, hydra_brains.found == 1 ? "" : "s"); + error += j; k = 0; for (j = 0; j < hydra_options.max_use; j++) if (hydra_heads[j]->active == HEAD_ACTIVE) k++; - if (error == 0 && j == 0 && k == 0) { + if (error == 0 && k == 0) { process_restore = 0; unlink(RESTOREFILE); } else { @@ -4022,7 +4030,7 @@ int main(int argc, char *argv[]) { } error = 1; } - if (j) { + if (error) { snprintf(tmp_str, STRMAX, "[ERROR] %d target%s did not complete", j, j == 1 ? "" : "s"); fprintf(stderr, "%s\n", tmp_str); if (*json_error) { From abb83694aad34a63a8c83be78932c14e8bd5b844 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Tue, 27 Jun 2017 11:14:56 +0200 Subject: [PATCH 058/531] -c enforces -t 1 now --- hydra.c | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/hydra.c b/hydra.c index e0eb9a4..94310b4 100644 --- a/hydra.c +++ b/hydra.c @@ -2352,10 +2352,7 @@ int main(int argc, char *argv[]) { if (hydra_options.time_next_attempt < 0) { fprintf(stderr, "[ERROR] -c option value can not be negative\n"); exit(-1); - } else if (hydra_options.time_next_attempt > 0) { - printf("[INFO] setting max tasks per host to 1 due to -c option usage\n"); - hydra_options.tasks = 1; - } + } #else fprintf(stderr, "[WARNING] -c option can not be used as your operating system is missing the MSG_PEEK feature\n"); #endif @@ -2399,6 +2396,11 @@ int main(int argc, char *argv[]) { } } + if (hydra_options.time_next_attempt > 0 && hydra_options.tasks != 1) { + printf("[INFO] setting max tasks per host to 1 due to -c option usage\n"); + hydra_options.tasks = 1; + } + //check if output is redirected from the shell or in a file if (colored_output && !isatty(fileno(stdout))) colored_output = 0; From 74931e3b588d40d83da640d9bc7c7e2b2bcecfe5 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Tue, 27 Jun 2017 11:36:35 +0200 Subject: [PATCH 059/531] ensure null terminated entries in restore file --- hydra.c | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/hydra.c b/hydra.c index 94310b4..de94138 100644 --- a/hydra.c +++ b/hydra.c @@ -721,9 +721,9 @@ void hydra_restore_write(int print_msg) { else fprintf(f, "%s\n", hydra_options.outfile_ptr); fprintf(f, "%s\n%s\n", hydra_options.miscptr == NULL ? "" : hydra_options.miscptr, hydra_options.service); - fck = fwrite(login_ptr, hydra_brains.sizelogin, 1, f); + fck = fwrite(login_ptr, hydra_brains.sizelogin + hydra_brains.countlogin + 8, 1, f); if (hydra_options.colonfile == NULL || hydra_options.colonfile == empty_login) - fck = fwrite(pass_ptr, hydra_brains.sizepass, 1, f); + fck = fwrite(pass_ptr, hydra_brains.sizepass + hydra_brains.countpass + 8, 1, f); for (j = 0; j < hydra_brains.targets; j++) if (hydra_targets[j]->done != TARGET_FINISHED) { fck = fwrite(hydra_targets[j], sizeof(hydra_target), 1, f); @@ -871,13 +871,13 @@ void hydra_restore_read() { if (debug) printf("[DEBUG] reading restore file: Step 8 complete\n"); - login_ptr = malloc(hydra_brains.sizelogin); - fck = (int) fread(login_ptr, hydra_brains.sizelogin, 1, f); + login_ptr = malloc(hydra_brains.sizelogin + hydra_brains.countlogin + 8); + fck = (int) fread(login_ptr, hydra_brains.sizelogin + hydra_brains.countlogin + 8, 1, f); if (debug) printf("[DEBUG] reading restore file: Step 9 complete\n"); if (!check_flag(hydra_options.mode, MODE_COLON_FILE)) { // NOT colonfile mode - pass_ptr = malloc(hydra_brains.sizepass); - fck = (int) fread(pass_ptr, hydra_brains.sizepass, 1, f); + pass_ptr = malloc(hydra_brains.sizepass + hydra_brains.countpass + 8); + fck = (int) fread(pass_ptr, hydra_brains.sizepass + hydra_brains.countpass + 8, 1, f); } else { // colonfile mode hydra_options.colonfile = empty_login; // dummy pass_ptr = csv_ptr = login_ptr; From f124c26fc6e86cde8e5b009312c4e8ac0137b615 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Wed, 5 Jul 2017 08:48:00 +0200 Subject: [PATCH 060/531] big int to stdint switch --- Makefile | 89 ++++++- bfg.c | 27 +- bfg.h | 6 +- crc32.c | 14 +- crc32.h | 2 +- d3des.c | 9 +- d3des.h | 9 +- hmacmd5.c | 12 +- hmacmd5.h | 15 +- hydra-adam6500.c | 16 +- hydra-afp.c | 17 +- hydra-asterisk.c | 12 +- hydra-cisco-enable.c | 28 +-- hydra-cisco.c | 18 +- hydra-cvs.c | 16 +- hydra-firebird.c | 12 +- hydra-ftp.c | 16 +- hydra-http-form.c | 62 ++--- hydra-http-proxy-urlenum.c | 16 +- hydra-http-proxy.c | 14 +- hydra-http.c | 26 +- hydra-icq.c | 36 +-- hydra-imap.c | 30 +-- hydra-irc.c | 26 +- hydra-ldap.c | 30 +-- hydra-mod.c | 156 ++++++------ hydra-mod.h | 66 ++--- hydra-mssql.c | 14 +- hydra-mysql.c | 28 +-- hydra-ncp.c | 19 +- hydra-nntp.c | 28 +-- hydra-oracle-listener.c | 38 +-- hydra-oracle-sid.c | 14 +- hydra-oracle.c | 12 +- hydra-pcanywhere.c | 36 +-- hydra-pcnfs.c | 10 +- hydra-pop3.c | 40 +-- hydra-postgres.c | 12 +- hydra-rdp.c | 164 ++++++------ hydra-redis.c | 20 +- hydra-rexec.c | 14 +- hydra-rlogin.c | 14 +- hydra-rpcap.c | 16 +- hydra-rsh.c | 14 +- hydra-rtsp.c | 24 +- hydra-s7-300.c | 24 +- hydra-sapr3.c | 18 +- hydra-sip.c | 54 ++-- hydra-smb.c | 84 +++---- hydra-smtp-enum.c | 18 +- hydra-smtp.c | 26 +- hydra-snmp.c | 34 +-- hydra-socks5.c | 16 +- hydra-ssh.c | 14 +- hydra-sshkey.c | 12 +- hydra-svn.c | 16 +- hydra-teamspeak.c | 18 +- hydra-telnet.c | 20 +- hydra-time.c | 8 +- hydra-vmauthd.c | 12 +- hydra-vnc.c | 20 +- hydra-xmpp.c | 28 +-- hydra.c | 504 ++++++++++++++++++------------------- hydra.h | 9 +- libpq-fe.h | 132 +++++----- ntlm.c | 98 ++++---- ntlm.h | 21 +- performance.h | 14 +- postgres_ext.h | 4 +- pw-inspector.c | 12 +- rdp.h | 24 +- sasl.c | 56 ++--- sasl.h | 6 +- 73 files changed, 1364 insertions(+), 1235 deletions(-) diff --git a/Makefile b/Makefile index 372e67e..6019d93 100644 --- a/Makefile +++ b/Makefile @@ -1,5 +1,90 @@ -all: - @echo Error: you must run "./configure" first +CC=gcc +STRIP=strip +XDEFINES= -DLIBOPENSSL -DHAVE_PCRE -DLIBSVN -DLIBSSH -DHAVE_ZLIB -DHAVE_MATH_H +XLIBS= -lz -lssl -lpcre -lsvn_client-1 -lapr-1 -laprutil-1 -lsvn_subr-1 -lssh -lcrypto +XLIBPATHS=-L/usr/lib -L/usr/local/lib -L/lib -L/lib -L/usr/local/lib -L/lib +XIPATHS= -I/usr/include -I/usr/local/include -I/usr/include/subversion-1 -I/usr/include/apr-1 -I/usr/include/subversion-1 +PREFIX=/usr/local +XHYDRA_SUPPORT= +STRIP=strip + +HYDRA_LOGO=hydra-logo.o +PWI_LOGO=pw-inspector-logo.o +SEC=-fstack-protector-all --param ssp-buffer-size=4 -D_FORTIFY_SOURCE=2 + +# +# Makefile for Hydra - (c) 2001-2017 by van Hauser / THC +# +OPTS=-I. -O3 +# -Wall -g -pedantic +LIBS=-lm +BINDIR = /bin +MANDIR ?= /man/man1/ +DATADIR ?= /etc +DESTDIR ?= + +SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ + hydra-telnet.c hydra-cisco.c hydra-http.c hydra-ftp.c hydra-imap.c \ + hydra-pop3.c hydra-smb.c hydra-icq.c hydra-cisco-enable.c hydra-ldap.c \ + hydra-mysql.c hydra-mssql.c hydra-xmpp.c hydra-http-proxy-urlenum.c \ + hydra-snmp.c hydra-cvs.c hydra-smtp.c hydra-smtp-enum.c hydra-sapr3.c hydra-ssh.c \ + hydra-sshkey.c hydra-teamspeak.c hydra-postgres.c hydra-rsh.c hydra-rlogin.c \ + hydra-oracle-listener.c hydra-svn.c hydra-pcanywhere.c hydra-sip.c \ + hydra-oracle.c hydra-vmauthd.c hydra-asterisk.c hydra-firebird.c hydra-afp.c hydra-ncp.c \ + hydra-oracle-sid.c hydra-http-proxy.c hydra-http-form.c hydra-irc.c \ + hydra-rdp.c hydra-s7-300.c hydra-redis.c hydra-adam6500.c \ + crc32.c d3des.c bfg.c ntlm.c sasl.c hmacmd5.c hydra-mod.c hydra-rtsp.c hydra-time.c hydra-rpcap.c +OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ + hydra-telnet.o hydra-cisco.o hydra-http.o hydra-ftp.o hydra-imap.o \ + hydra-pop3.o hydra-smb.o hydra-icq.o hydra-cisco-enable.o hydra-ldap.o \ + hydra-mysql.o hydra-mssql.o hydra-xmpp.o hydra-http-proxy-urlenum.o \ + hydra-snmp.o hydra-cvs.o hydra-smtp.o hydra-smtp-enum.o hydra-sapr3.o hydra-ssh.o \ + hydra-sshkey.o hydra-teamspeak.o hydra-postgres.o hydra-rsh.o hydra-rlogin.o \ + hydra-oracle-listener.o hydra-svn.o hydra-pcanywhere.o hydra-sip.o \ + hydra-oracle-sid.o hydra-oracle.o hydra-vmauthd.o hydra-asterisk.o hydra-firebird.o hydra-afp.o hydra-ncp.o \ + hydra-http-proxy.o hydra-http-form.o hydra-irc.o hydra-redis.o \ + hydra-rdp.o hydra-s7-300.c hydra-adam6500.o \ + crc32.o d3des.o bfg.o ntlm.o sasl.o hmacmd5.o hydra-mod.o hydra-rtsp.o hydra-time.o hydra-rpcap.o +BINS = hydra pw-inspector + +EXTRA_DIST = README README.arm README.palm CHANGES TODO INSTALL LICENSE \ + hydra-mod.h hydra.h crc32.h d3des.h + +all: pw-inspector hydra $(XHYDRA_SUPPORT) + @echo + @echo Now type "make install" + +hydra: hydra.c $(OBJ) + $(CC) $(OPTS) $(SEC) $(LIBS) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o hydra $(HYDRA_LOGO) hydra.c $(OBJ) $(LIBS) $(XLIBS) $(XLIBPATHS) $(XIPATHS) $(XDEFINES) + @echo + @echo If men could get pregnant, abortion would be a sacrament + @echo + +xhydra: + -cd hydra-gtk && sh ./make_xhydra.sh + +pw-inspector: pw-inspector.c + -$(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o pw-inspector $(PWI_LOGO) pw-inspector.c + +.c.o: + $(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) -c $< $(XDEFINES) $(XIPATHS) + +strip: all + strip $(BINS) + -echo OK > /dev/null && test -x xhydra && strip xhydra || echo OK > /dev/null + +install: strip + -mkdir -p $(DESTDIR)$(PREFIX)$(BINDIR) + cp -f hydra-wizard.sh $(BINS) $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 hydra-wizard.sh $(BINS) + -echo OK > /dev/null && test -x xhydra && cp xhydra $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 xhydra || echo OK > /dev/null + -sed -e "s|^INSTALLDIR=.*|INSTALLDIR="$(PREFIX)"|" dpl4hydra.sh | sed -e "s|^LOCATION=.*|LOCATION="$(DATADIR)"|" > $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh + -chmod 755 $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh + -mkdir -p $(DESTDIR)$(PREFIX)$(DATADIR) + -cp -f *.csv $(DESTDIR)$(PREFIX)$(DATADIR) + -mkdir -p $(DESTDIR)$(PREFIX)$(MANDIR) + -cp -f hydra.1 xhydra.1 pw-inspector.1 $(DESTDIR)$(PREFIX)$(MANDIR) clean: + rm -rf xhydra pw-inspector hydra *.o core *.core *.stackdump *~ Makefile.in Makefile dev_rfc hydra.restore arm/*.ipk arm/ipkg/usr/bin/* hydra-gtk/src/*.o hydra-gtk/src/xhydra hydra-gtk/stamp-h hydra-gtk/config.status hydra-gtk/errors hydra-gtk/config.log hydra-gtk/src/.deps hydra-gtk/src/Makefile hydra-gtk/Makefile cp -f Makefile.orig Makefile + diff --git a/bfg.c b/bfg.c index bfe5806..89b115b 100644 --- a/bfg.c +++ b/bfg.c @@ -6,15 +6,22 @@ #include #include #include +#ifdef __sun + #include +#elif defined(__FreeBSD__) || defined(__IBMCPP__) || defined(_AIX) + #include +#else + #include +#endif #include "bfg.h" bf_option bf_options; #ifdef HAVE_MATH_H -extern int debug; +extern int32_t debug; -static int add_single_char(char ch, char flags, int* crs_len) { +static int32_t add_single_char(char ch, char flags, int32_t* crs_len) { if ((ch >= '2' && ch <= '9') || ch == '0') { if ((flags & BF_NUMS) > 0) { printf("[ERROR] character %c defined in -x although the whole number range was already defined by '1', ignored\n", ch); @@ -22,7 +29,7 @@ static int add_single_char(char ch, char flags, int* crs_len) { } //printf("[WARNING] adding character %c for -x, note that '1' will add all numbers from 0-9\n", ch); } - if (tolower((int) ch) >= 'b' && tolower((int) ch) <= 'z') { + if (tolower((int32_t) ch) >= 'b' && tolower((int32_t) ch) <= 'z') { if ((ch <= 'Z' && (flags & BF_UPPER) > 0) || (ch > 'Z' && (flags & BF_UPPER) > 0)) { printf("[ERROR] character %c defined in -x although the whole letter range was already defined by '%c', ignored\n", ch, ch <= 'Z' ? 'A' : 'a'); return 0; @@ -43,9 +50,9 @@ static int add_single_char(char ch, char flags, int* crs_len) { // // note that we check for -x .:.:ab but not for -x .:.:ba // -int bf_init(char *arg) { - int i = 0; - int crs_len = 0; +int32_t bf_init(char *arg) { + int32_t i = 0; + int32_t crs_len = 0; char flags = 0; char *tmp = strchr(arg, ':'); @@ -165,10 +172,10 @@ int bf_init(char *arg) { } -unsigned long int bf_get_pcount() { - int i; +uint64_t bf_get_pcount() { + int32_t i; double count = 0; - unsigned long int foo; + uint64_t foo; for (i = bf_options.from; i <= bf_options.to; i++) count += (pow((double) bf_options.crs_len, (double) i)); @@ -183,7 +190,7 @@ unsigned long int bf_get_pcount() { char *bf_next() { - int i, pos = bf_options.current - 1; + int32_t i, pos = bf_options.current - 1; if (bf_options.current > bf_options.to) return NULL; // we are done diff --git a/bfg.h b/bfg.h index 3ed42d2..2ac5f49 100644 --- a/bfg.h +++ b/bfg.h @@ -40,14 +40,14 @@ typedef struct { char *arg; /* argument received for bfg commandline option */ char *crs; /* internal representation of charset */ char *ptr; /* ptr to the last generated password */ - unsigned int disable_symbols; + uint32_t disable_symbols; } bf_option; extern bf_option bf_options; #ifdef HAVE_MATH_H -extern unsigned long int bf_get_pcount(); -extern int bf_init(char *arg); +extern uint64_t bf_get_pcount(); +extern int32_t bf_init(char *arg); extern char *bf_next(); #endif diff --git a/crc32.c b/crc32.c index 44bd6ce..364cfa4 100644 --- a/crc32.c +++ b/crc32.c @@ -1,4 +1,3 @@ - /*- * COPYRIGHT (C) 1986 Gary S. Brown. You may use this program, or * code or tables extracted from it, as desired without restriction. @@ -42,8 +41,15 @@ */ #include +#ifdef __sun + #include +#elif defined(__FreeBSD__) || defined(__IBMCPP__) || defined(_AIX) + #include +#else + #include +#endif -unsigned int crc32_tab[] = { +uint32_t crc32_tab[] = { 0x00000000, 0x77073096, 0xee0e612c, 0x990951ba, 0x076dc419, 0x706af48f, 0xe963a535, 0x9e6495a3, 0x0edb8832, 0x79dcb8a4, 0xe0d5e91e, 0x97d2d988, 0x09b64c2b, 0x7eb17cbd, 0xe7b82d07, 0x90bf1d91, 0x1db71064, 0x6ab020f2, @@ -91,9 +97,9 @@ unsigned int crc32_tab[] = { #ifndef HAVE_ZLIB -unsigned int crc32(const void *buf, unsigned int size) { +uint32_t crc32(const void *buf, uint32_t size) { const unsigned char *p; - unsigned int crc; + uint32_t crc; p = buf; crc = ~0U; diff --git a/crc32.h b/crc32.h index cfd45cb..575aefa 100644 --- a/crc32.h +++ b/crc32.h @@ -4,7 +4,7 @@ #include #ifndef HAVE_ZLIB -unsigned int crc32(const void *buf, unsigned int size); +uint32_t crc32(const void *buf, uint32_t size); #endif #endif diff --git a/d3des.c b/d3des.c index 9dc4912..7f964ea 100644 --- a/d3des.c +++ b/d3des.c @@ -1,4 +1,3 @@ - /* 2001 van Hauser for Hydra: commented out KnR Kn3 and Df_Key to remove compiler warnings for unused definitions. */ @@ -84,9 +83,9 @@ static unsigned char pc2[48] = { void deskey(key, edf) /* Thanks to James Gillogly & Phil Karn! */ unsigned char *key; - int edf; + int32_t edf; { - register int i, j, l, m, n; + register int32_t i, j, l, m, n; unsigned char pc1m[56], pcr[56]; unsigned long kn[32]; @@ -132,7 +131,7 @@ static void cookey(raw1) { register unsigned long *cook, *raw0; unsigned long dough[32]; - register int i; + register int32_t i; cook = dough; for (i = 0; i < 16; i++, raw1++) { @@ -367,7 +366,7 @@ static void desfunc(block, keys) register unsigned long *block, *keys; { register unsigned long fval, work, right, leftt; - register int round; + register int32_t round; leftt = block[0]; right = block[1]; diff --git a/d3des.h b/d3des.h index 21a2003..18be88b 100644 --- a/d3des.h +++ b/d3des.h @@ -1,3 +1,10 @@ +#ifdef __sun + #include +#elif defined(__FreeBSD__) || defined(__IBMCPP__) || defined(_AIX) + #include +#else + #include +#endif /* * This is D3DES (V5.09) by Richard Outerbridge with the double and @@ -23,7 +30,7 @@ #define EN0 0 /* MODE == encrypt */ #define DE1 1 /* MODE == decrypt */ -extern void deskey(unsigned char *, int); +extern void deskey(unsigned char *, int32_t); /* hexkey[8] MODE * Sets the internal key register according to the hexadecimal diff --git a/hmacmd5.c b/hmacmd5.c index 63771be..9400aba 100644 --- a/hmacmd5.c +++ b/hmacmd5.c @@ -43,8 +43,8 @@ the rfc 2104 version of hmac_md5 initialisation. ***********************************************************************/ -void hmac_md5_init_rfc2104(const unsigned char *key, int key_len, HMACMD5Context * ctx) { - int i; +void hmac_md5_init_rfc2104(const unsigned char *key, int32_t key_len, HMACMD5Context * ctx) { + int32_t i; unsigned char tk[16]; /* if key is longer than 64 bytes reset it to key=MD5(key) */ @@ -79,8 +79,8 @@ void hmac_md5_init_rfc2104(const unsigned char *key, int key_len, HMACMD5Context the microsoft version of hmac_md5 initialisation. ***********************************************************************/ -void hmac_md5_init_limK_to_64(const unsigned char *key, int key_len, HMACMD5Context * ctx) { - int i; +void hmac_md5_init_limK_to_64(const unsigned char *key, int32_t key_len, HMACMD5Context * ctx) { + int32_t i; /* if key is longer than 64 bytes truncate it */ if (key_len > 64) { @@ -107,7 +107,7 @@ void hmac_md5_init_limK_to_64(const unsigned char *key, int key_len, HMACMD5Cont update hmac_md5 "inner" buffer ***********************************************************************/ -void hmac_md5_update(const unsigned char *text, int text_len, HMACMD5Context * ctx) { +void hmac_md5_update(const unsigned char *text, int32_t text_len, HMACMD5Context * ctx) { MD5_Update(&ctx->ctx, (void *) text, text_len); /* then text of datagram */ } @@ -131,7 +131,7 @@ void hmac_md5_final(unsigned char *digest, HMACMD5Context * ctx) use the microsoft hmacmd5 init method because the key is 16 bytes. ************************************************************/ -void hmac_md5(unsigned char key[16], unsigned char *data, int data_len, unsigned char *digest) { +void hmac_md5(unsigned char key[16], unsigned char *data, int32_t data_len, unsigned char *digest) { HMACMD5Context ctx; hmac_md5_init_limK_to_64(key, 16, &ctx); diff --git a/hmacmd5.h b/hmacmd5.h index ce4299c..54e1393 100644 --- a/hmacmd5.h +++ b/hmacmd5.h @@ -29,6 +29,13 @@ */ +#ifdef __sun + #include +#elif defined(__FreeBSD__) || defined(__IBMCPP__) || defined(_AIX) + #include +#else + #include +#endif #include #ifndef _HMAC_MD5_H @@ -41,10 +48,10 @@ typedef struct { #endif /* _HMAC_MD5_H */ -void hmac_md5_init_rfc2104(const unsigned char *key, int key_len, HMACMD5Context *ctx); -void hmac_md5_init_limK_to_64(const unsigned char* key, int key_len,HMACMD5Context *ctx); -void hmac_md5_update(const unsigned char *text, int text_len, HMACMD5Context *ctx); +void hmac_md5_init_rfc2104(const unsigned char *key, int32_t key_len, HMACMD5Context *ctx); +void hmac_md5_init_limK_to_64(const unsigned char* key, int32_t key_len,HMACMD5Context *ctx); +void hmac_md5_update(const unsigned char *text, int32_t text_len, HMACMD5Context *ctx); void hmac_md5_final(unsigned char *digest, HMACMD5Context *ctx); -void hmac_md5( unsigned char key[16], unsigned char *data, int data_len, unsigned char *digest); +void hmac_md5( unsigned char key[16], unsigned char *data, int32_t data_len, unsigned char *digest); diff --git a/hydra-adam6500.c b/hydra-adam6500.c index fc45ddb..de8ca15 100644 --- a/hydra-adam6500.c +++ b/hydra-adam6500.c @@ -56,11 +56,11 @@ unsigned char adam6500_resp2[] = { 0x00, 0x00, 0x00 }; -int start_adam6500(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_adam6500(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *pass; unsigned char buffer[300]; - int i; + int32_t i; if (strlen(pass = hydra_get_next_password()) == 0) pass = empty; @@ -90,9 +90,9 @@ int start_adam6500(int s, char *ip, int port, unsigned char options, char *miscp return 1; } -void service_adam6500(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, failc = 0, retry = 1, next_run = 1, sock = -1; - int myport = PORT_ADAM6500, mysslport = PORT_ADAM6500_SSL; +void service_adam6500(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, failc = 0, retry = 1, next_run = 1, sock = -1; + int32_t myport = PORT_ADAM6500, mysslport = PORT_ADAM6500_SSL; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -103,7 +103,7 @@ void service_adam6500(char *ip, int sp, unsigned char options, char *miscptr, FI case 1: /* connect and service init function */ { unsigned char *buf2; - int f = 0; + int32_t f = 0; if (sock >= 0) sock = hydra_disconnect(sock); @@ -120,7 +120,7 @@ void service_adam6500(char *ip, int sp, unsigned char options, char *miscptr, FI port = mysslport; } if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } @@ -148,7 +148,7 @@ void service_adam6500(char *ip, int sp, unsigned char options, char *miscptr, FI } } -int service_adam6500_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_adam6500_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-afp.c b/hydra-afp.c index 7495ce4..c940ce1 100644 --- a/hydra-afp.c +++ b/hydra-afp.c @@ -1,4 +1,3 @@ - /* * Apple Filing Protocol Support - by David Maciejak @ GMAIL dot com * @@ -27,7 +26,7 @@ void dummy_afp() { extern char *HYDRA_EXIT; -void stdout_fct(void *priv, enum loglevels loglevel, int logtype, const char *message) { +void stdout_fct(void *priv, enum loglevels loglevel, int32_t logtype, const char *message) { //fprintf(stderr, "[ERROR] Caught unknown error %s\n", message); } @@ -39,7 +38,7 @@ static struct libafpclient afpclient = { .loop_started = NULL, }; -static int server_subconnect(struct afp_url url) { +static int32_t server_subconnect(struct afp_url url) { struct afp_connection_request *conn_req; struct afp_server *server = NULL; @@ -78,7 +77,7 @@ static int server_subconnect(struct afp_url url) { return 0; } -int start_afp(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_afp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *login, *pass, mlogin[AFP_MAX_USERNAME_LEN], mpass[AFP_MAX_PASSWORD_LEN]; struct afp_url tmpurl; @@ -119,9 +118,9 @@ int start_afp(int s, char *ip, int port, unsigned char options, char *miscptr, F return 1; } -void service_afp(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_AFP; +void service_afp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_AFP; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -140,7 +139,7 @@ void service_afp(char *ip, int sp, unsigned char options, char *miscptr, FILE * port = myport; } if (sock < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } @@ -173,7 +172,7 @@ void service_afp(char *ip, int sp, unsigned char options, char *miscptr, FILE * #endif -int service_afp_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_afp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-asterisk.c b/hydra-asterisk.c index 13c53b5..5be7896 100644 --- a/hydra-asterisk.c +++ b/hydra-asterisk.c @@ -11,7 +11,7 @@ extern char *HYDRA_EXIT; char *buf; -int start_asterisk(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_asterisk(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = "\"\""; char *login, *pass, buffer[1024]; @@ -62,9 +62,9 @@ int start_asterisk(int s, char *ip, int port, unsigned char options, char *miscp return 2; } -void service_asterisk(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_ASTERISK, mysslport = PORT_ASTERISK_SSL; +void service_asterisk(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_ASTERISK, mysslport = PORT_ASTERISK_SSL; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -89,7 +89,7 @@ void service_asterisk(char *ip, int sp, unsigned char options, char *miscptr, FI if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } buf = hydra_receive_line(sock); @@ -122,7 +122,7 @@ void service_asterisk(char *ip, int sp, unsigned char options, char *miscptr, FI } } -int service_asterisk_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_asterisk_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-cisco-enable.c b/hydra-cisco-enable.c index 3113179..4cc9bdf 100644 --- a/hydra-cisco-enable.c +++ b/hydra-cisco-enable.c @@ -3,7 +3,7 @@ extern char *HYDRA_EXIT; char *buf; -int start_cisco_enable(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_cisco_enable(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *pass, buffer[300]; @@ -58,9 +58,9 @@ int start_cisco_enable(int s, char *ip, int port, unsigned char options, char *m return 3; } -void service_cisco_enable(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, failc = 0, retry = 1, next_run = 1, sock = -1; - int myport = PORT_TELNET, mysslport = PORT_TELNET_SSL; +void service_cisco_enable(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, failc = 0, retry = 1, next_run = 1, sock = -1; + int32_t myport = PORT_TELNET, mysslport = PORT_TELNET_SSL; char buffer[300]; char *login; @@ -87,7 +87,7 @@ void service_cisco_enable(char *ip, int sp, unsigned char options, char *miscptr port = mysslport; } if (sock < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } @@ -101,7 +101,7 @@ void service_cisco_enable(char *ip, int sp, unsigned char options, char *miscptr sprintf(buffer, "%.250s\r\n", login); if (hydra_send(sock, buffer, strlen(buffer), 0) < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not send login\n", (int) getpid()); + if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not send login\n", (int32_t) getpid()); hydra_child_exit(2); } } @@ -117,7 +117,7 @@ void service_cisco_enable(char *ip, int sp, unsigned char options, char *miscptr sprintf(buffer, "%.250s\r\n", miscptr); if (hydra_send(sock, buffer, strlen(buffer), 0) < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not send login\n", (int) getpid()); + if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not send login\n", (int32_t) getpid()); hydra_child_exit(2); } } @@ -132,7 +132,7 @@ void service_cisco_enable(char *ip, int sp, unsigned char options, char *miscptr } if (strstr(buf, "assw") != NULL) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating - can not login, can not login\n", (int) getpid()); + if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating - can not login, can not login\n", (int32_t) getpid()); hydra_child_exit(2); } free(buf); @@ -143,11 +143,11 @@ void service_cisco_enable(char *ip, int sp, unsigned char options, char *miscptr case 2: /* run the cracking function */ { unsigned char *buf2; - int f = 0; + int32_t f = 0; sprintf(buffer, "%.250s\r\n", "ena"); if (hydra_send(sock, buffer, strlen(buffer), 0) < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not send 'ena'\n", (int) getpid()); + if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not send 'ena'\n", (int32_t) getpid()); hydra_child_exit(2); } @@ -160,11 +160,11 @@ void service_cisco_enable(char *ip, int sp, unsigned char options, char *miscptr if (failc < retry) { next_run = 1; failc++; - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d was disconnected - retrying (%d of %d retries)\n", (int) getpid(), failc, retry); + if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d was disconnected - retrying (%d of %d retries)\n", (int32_t) getpid(), failc, retry); sleep(3); break; } else { - fprintf(stderr, "[ERROR] Child with pid %d was disconnected - exiting\n", (int) getpid()); + fprintf(stderr, "[ERROR] Child with pid %d was disconnected - exiting\n", (int32_t) getpid()); hydra_child_exit(0); } } @@ -180,7 +180,7 @@ void service_cisco_enable(char *ip, int sp, unsigned char options, char *miscptr case 3: /* clean exit */ sprintf(buffer, "%.250s\r\n", "exit"); if (hydra_send(sock, buffer, strlen(buffer), 0) < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not send 'exit'\n", (int) getpid()); + if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not send 'exit'\n", (int32_t) getpid()); hydra_child_exit(0); } if (sock >= 0) @@ -196,7 +196,7 @@ void service_cisco_enable(char *ip, int sp, unsigned char options, char *miscptr } } -int service_cisco_enable_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_cisco_enable_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-cisco.c b/hydra-cisco.c index dcb50fc..6a65f77 100644 --- a/hydra-cisco.c +++ b/hydra-cisco.c @@ -7,7 +7,7 @@ extern char *HYDRA_EXIT; char *buf = NULL; -int start_cisco(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_cisco(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *pass, buffer[300]; @@ -115,9 +115,9 @@ int start_cisco(int s, char *ip, int port, unsigned char options, char *miscptr, return 1; } -void service_cisco(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, failc = 0, retry = 1, next_run = 1, sock = -1; - int myport = PORT_TELNET, mysslport = PORT_TELNET_SSL; +void service_cisco(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, failc = 0, retry = 1, next_run = 1, sock = -1; + int32_t myport = PORT_TELNET, mysslport = PORT_TELNET_SSL; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -128,7 +128,7 @@ void service_cisco(char *ip, int sp, unsigned char options, char *miscptr, FILE case 1: /* connect and service init function */ { unsigned char *buf2; - int f = 0; + int32_t f = 0; if (sock >= 0) sock = hydra_disconnect(sock); @@ -147,7 +147,7 @@ void service_cisco(char *ip, int sp, unsigned char options, char *miscptr, FILE port = mysslport; } if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } do { @@ -159,11 +159,11 @@ void service_cisco(char *ip, int sp, unsigned char options, char *miscptr, FILE if (failc < retry) { next_run = 1; failc++; - if (quiet != 1) hydra_report(stderr, "[ERROR] Child with pid %d was disconnected - retrying (%d of %d retries)\n", (int) getpid(), failc, retry); + if (quiet != 1) hydra_report(stderr, "[ERROR] Child with pid %d was disconnected - retrying (%d of %d retries)\n", (int32_t) getpid(), failc, retry); sleep(3); break; } else { - if (quiet != 1) hydra_report(stderr, "[ERROR] Child with pid %d was disconnected - exiting\n", (int) getpid()); + if (quiet != 1) hydra_report(stderr, "[ERROR] Child with pid %d was disconnected - exiting\n", (int32_t) getpid()); hydra_child_exit(0); } } @@ -198,7 +198,7 @@ void service_cisco(char *ip, int sp, unsigned char options, char *miscptr, FILE } } -int service_cisco_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_cisco_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-cvs.c b/hydra-cvs.c index 0fa24e4..b745504 100644 --- a/hydra-cvs.c +++ b/hydra-cvs.c @@ -1,14 +1,14 @@ #include "hydra-mod.h" -extern int hydra_data_ready_timed(int socket, long sec, long usec); +extern int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec); extern char *HYDRA_EXIT; char *buf; -int start_cvs(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_cvs(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *login, *pass, buffer[1024], pass2[513]; - int i; + int32_t i; char *directory = miscptr; /* evil cvs encryption sheme... @@ -85,9 +85,9 @@ int start_cvs(int s, char *ip, int port, unsigned char options, char *miscptr, F return 3; } -void service_cvs(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_CVS, mysslport = PORT_CVS_SSL; +void service_cvs(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_CVS, mysslport = PORT_CVS_SSL; hydra_register_socket(sp); @@ -118,7 +118,7 @@ void service_cvs(char *ip, int sp, unsigned char options, char *miscptr, FILE * } if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } next_run = start_cvs(sock, ip, port, options, miscptr, fp); @@ -136,7 +136,7 @@ void service_cvs(char *ip, int sp, unsigned char options, char *miscptr, FILE * } } -int service_cvs_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_cvs_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-firebird.c b/hydra-firebird.c index 006c5c0..fbcad69 100644 --- a/hydra-firebird.c +++ b/hydra-firebird.c @@ -27,7 +27,7 @@ void dummy_firebird() { extern char *HYDRA_EXIT; -int start_firebird(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_firebird(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *login, *pass; char database[256]; @@ -87,9 +87,9 @@ int start_firebird(int s, char *ip, int port, unsigned char options, char *miscp return 1; } -void service_firebird(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_FIREBIRD, mysslport = PORT_FIREBIRD_SSL; +void service_firebird(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_FIREBIRD, mysslport = PORT_FIREBIRD_SSL; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -113,7 +113,7 @@ void service_firebird(char *ip, int sp, unsigned char options, char *miscptr, FI port = mysslport; } if (sock < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } @@ -146,7 +146,7 @@ void service_firebird(char *ip, int sp, unsigned char options, char *miscptr, FI #endif -int service_firebird_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_firebird_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-ftp.c b/hydra-ftp.c index 8eab162..6b853eb 100644 --- a/hydra-ftp.c +++ b/hydra-ftp.c @@ -3,7 +3,7 @@ extern char *HYDRA_EXIT; char *buf; -int start_ftp(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_ftp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = "\"\""; char *login, *pass, buffer[510]; @@ -74,9 +74,9 @@ int start_ftp(int s, char *ip, int port, unsigned char options, char *miscptr, F return 2; } -void service_ftp_core(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname, int tls) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_FTP, mysslport = PORT_FTP_SSL; +void service_ftp_core(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname, int32_t tls) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_FTP, mysslport = PORT_FTP_SSL; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -100,7 +100,7 @@ void service_ftp_core(char *ip, int sp, unsigned char options, char *miscptr, FI } if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } usleepn(250); @@ -167,15 +167,15 @@ void service_ftp_core(char *ip, int sp, unsigned char options, char *miscptr, FI } } -void service_ftp(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +void service_ftp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { service_ftp_core(ip, sp, options, miscptr, fp, port, hostname, 0); } -void service_ftps(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +void service_ftps(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { service_ftp_core(ip, sp, options, miscptr, fp, port, hostname, 1); } -int service_ftp_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_ftp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-http-form.c b/hydra-http-form.c index 89eeb7c..4d84126 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -75,15 +75,15 @@ typedef struct cookie_node { struct cookie_node *next; } t_cookie_node, *ptr_cookie_node; -int success_cond = 0; -int getcookie = 1; -int auth_flag = 0; +int32_t success_cond = 0; +int32_t getcookie = 1; +int32_t auth_flag = 0; char cookie[4096] = "", cmiscptr[1024]; extern char *webtarget; extern char *slash; -int webport, freemischttpform = 0; +int32_t webport, freemischttpform = 0; char bufferurl[6096+24], cookieurl[6096+24] = "", userheader[6096+24] = "", *url, *variables, *optional1; #define MAX_REDIRECT 8 @@ -91,8 +91,8 @@ char bufferurl[6096+24], cookieurl[6096+24] = "", userheader[6096+24] = "", *url #define MAX_PROXY_LENGTH 2048 // sizeof(cookieurl) * 2 char redirected_url_buff[2048] = ""; -int redirected_flag = 0; -int redirected_cpt = MAX_REDIRECT; +int32_t redirected_flag = 0; +int32_t redirected_cpt = MAX_REDIRECT; char *cookie_request, *normal_request; // Buffers for HTTP headers @@ -135,7 +135,7 @@ strndup (const char *s, size_t n) } #endif -int append_cookie(char *name, char *value, ptr_cookie_node *last_cookie) +int32_t append_cookie(char *name, char *value, ptr_cookie_node *last_cookie) { ptr_cookie_node new_ptr = (ptr_cookie_node) malloc(sizeof(t_cookie_node)); if (!new_ptr) @@ -156,7 +156,7 @@ int append_cookie(char *name, char *value, ptr_cookie_node *last_cookie) char * stringify_cookies(ptr_cookie_node ptr_cookie) { ptr_cookie_node cur_ptr = NULL; - unsigned int length = 1; + uint32_t length = 1; char *cookie_hdr = (char *) malloc(length); if (cookie_hdr) { @@ -195,7 +195,7 @@ success: * +--------+ * Returns 1 if success, or 0 otherwise. */ -int add_or_update_cookie(ptr_cookie_node * ptr_cookie, char * cookie_expr) +int32_t add_or_update_cookie(ptr_cookie_node * ptr_cookie, char * cookie_expr) { ptr_cookie_node cur_ptr = NULL, new_ptr = NULL; char * cookie = strdup(cookie_expr); @@ -227,11 +227,11 @@ int add_or_update_cookie(ptr_cookie_node * ptr_cookie, char * cookie_expr) return 1; } -int process_cookies(ptr_cookie_node * ptr_cookie, char * cookie_expr) +int32_t process_cookies(ptr_cookie_node * ptr_cookie, char * cookie_expr) { char *tok = NULL; char *expr = strdup(cookie_expr); - int res = 0; + int32_t res = 0; if (strstr(cookie_expr, ";")) { tok = strtok(expr, ";"); @@ -257,7 +257,7 @@ int process_cookies(ptr_cookie_node * ptr_cookie, char * cookie_expr) * * Returns 1 if success, or 0 otherwise (out of memory). */ -int add_header(ptr_header_node * ptr_head, char *header, char *value, char type) { +int32_t add_header(ptr_header_node * ptr_head, char *header, char *value, char type) { ptr_header_node cur_ptr = NULL; ptr_header_node existing_hdr, new_ptr; @@ -369,7 +369,7 @@ void cleanup(ptr_header_node *ptr_head) { char *stringify_headers(ptr_header_node * ptr_head) { char *headers_str = NULL; ptr_header_node cur_ptr = *ptr_head; - int ttl_size = 0; + int32_t ttl_size = 0; for (; cur_ptr; cur_ptr = cur_ptr->next) ttl_size += strlen(cur_ptr->header) + strlen(cur_ptr->value) + 4; @@ -391,7 +391,7 @@ char *stringify_headers(ptr_header_node * ptr_head) { char *prepare_http_request(char *type, char *path, char *params, char *headers) { - unsigned int reqlen = 0; + uint32_t reqlen = 0; char *http_request = NULL; if (type && path && headers) { @@ -431,7 +431,7 @@ char *prepare_http_request(char *type, char *path, char *params, char *headers) return http_request; } -int strpos(char *str, char *target) { +int32_t strpos(char *str, char *target) { char *res = strstr(str, target); if (res == NULL) @@ -462,12 +462,12 @@ char *html_encode(char *string) { /* -int analyze_server_response(int socket) +int32_t analyze_server_response(int32_t socket) return 0 or 1 when the cond regex is matched return -1 if no response from server */ -int analyze_server_response(int s) { - int runs = 0; +int32_t analyze_server_response(int32_t s) { + int32_t runs = 0; redirected_flag = 0; auth_flag = 0; while ((buf = hydra_receive_line(s)) != NULL) { @@ -572,7 +572,7 @@ int analyze_server_response(int s) { return 0; } -void hydra_reconnect(int s, char *ip, int port, unsigned char options, char *hostname) { +void hydra_reconnect(int32_t s, char *ip, int32_t port, unsigned char options, char *hostname) { if (s >= 0) s = hydra_disconnect(s); if ((options & OPTION_SSL) == 0) { @@ -582,13 +582,13 @@ void hydra_reconnect(int s, char *ip, int port, unsigned char options, char *hos } } -int start_http_form(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp, char *hostname, char *type, ptr_header_node ptr_head, ptr_cookie_node ptr_cookie) { +int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp, char *hostname, char *type, ptr_header_node ptr_head, ptr_cookie_node ptr_cookie) { char *empty = ""; char *login, *pass, clogin[256], cpass[256]; char header[8096], *upd3variables; char *cookie_header = NULL; char *http_request; - int found = !success_cond, i, j; + int32_t found = !success_cond, i, j; char content_length[MAX_CONTENT_LENGTH], proxy_string[MAX_PROXY_LENGTH]; memset(header, 0, sizeof(header)); @@ -630,7 +630,7 @@ int start_http_form(int s, char *ip, int port, unsigned char options, char *misc if (strcmp(type, "POST") == 0) { memset(proxy_string, 0, sizeof(proxy_string)); snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s:%d%.600s", webtarget, webport, url); - snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int) strlen(upd3variables)); + snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t) strlen(upd3variables)); if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) hdrrepv(&ptr_head, "Content-Length", content_length); else @@ -678,7 +678,7 @@ int start_http_form(int s, char *ip, int port, unsigned char options, char *misc if (strcmp(type, "POST") == 0) { memset(proxy_string, 0, sizeof(proxy_string)); snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s:%d%.600s", webtarget, webport, url); - snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int) strlen(upd3variables)); + snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t) strlen(upd3variables)); if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) hdrrepv(&ptr_head, "Content-Length", content_length); else @@ -724,7 +724,7 @@ int start_http_form(int s, char *ip, int port, unsigned char options, char *misc } // now prepare for the "real" request if (strcmp(type, "POST") == 0) { - snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int) strlen(upd3variables)); + snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t) strlen(upd3variables)); if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) hdrrepv(&ptr_head, "Content-Length", content_length); else @@ -905,9 +905,9 @@ int start_http_form(int s, char *ip, int port, unsigned char options, char *misc return 1; } -void service_http_form(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname, char *type, ptr_header_node * ptr_head, ptr_cookie_node * ptr_cookie) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_HTTP, mysslport = PORT_HTTP_SSL; +void service_http_form(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname, char *type, ptr_header_node * ptr_head, ptr_cookie_node * ptr_cookie) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_HTTP, mysslport = PORT_HTTP_SSL; // register our socket descriptor hydra_register_socket(sp); @@ -945,7 +945,7 @@ void service_http_form(char *ip, int sp, unsigned char options, char *miscptr, F port = mysslport; } if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, cannot connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, cannot connect\n", (int32_t) getpid()); if (freemischttpform) free(miscptr); freemischttpform = 0; @@ -986,7 +986,7 @@ void service_http_form(char *ip, int sp, unsigned char options, char *miscptr, F free(miscptr); } -void service_http_get_form(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +void service_http_get_form(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { ptr_cookie_node ptr_cookie = NULL; ptr_header_node ptr_head = initialize(ip, options, miscptr); @@ -998,7 +998,7 @@ void service_http_get_form(char *ip, int sp, unsigned char options, char *miscpt } } -void service_http_post_form(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +void service_http_post_form(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { ptr_cookie_node ptr_cookie = NULL; ptr_header_node ptr_head = initialize(ip, options, miscptr); @@ -1010,7 +1010,7 @@ void service_http_post_form(char *ip, int sp, unsigned char options, char *miscp } } -int service_http_form_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_http_form_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-http-proxy-urlenum.c b/hydra-http-proxy-urlenum.c index 2f265d4..ae6097f 100644 --- a/hydra-http-proxy-urlenum.c +++ b/hydra-http-proxy-urlenum.c @@ -3,15 +3,15 @@ extern char *HYDRA_EXIT; char *buf; -static int http_proxy_auth_mechanism = AUTH_ERROR; +static int32_t http_proxy_auth_mechanism = AUTH_ERROR; -int start_http_proxy_urlenum(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp, char *hostname) { +int32_t start_http_proxy_urlenum(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp, char *hostname) { char *empty = ""; char *login, *pass, buffer[500], buffer2[500], mlogin[260], mpass[260], mhost[260]; char url[260], host[30]; char *header = ""; /* XXX TODO */ char *ptr; - int auth = 0; + int32_t auth = 0; login = hydra_get_next_login(); if (login == NULL || strlen(login) == 0 || strstr(login, "://") == NULL) { @@ -228,9 +228,9 @@ int start_http_proxy_urlenum(int s, char *ip, int port, unsigned char options, c return 1; } -void service_http_proxy_urlenum(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_HTTP_PROXY, mysslport = PORT_HTTP_PROXY_SSL; +void service_http_proxy_urlenum(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_HTTP_PROXY, mysslport = PORT_HTTP_PROXY_SSL; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -256,7 +256,7 @@ void service_http_proxy_urlenum(char *ip, int sp, unsigned char options, char *m port = mysslport; } if (sock < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } next_run = 2; @@ -278,7 +278,7 @@ void service_http_proxy_urlenum(char *ip, int sp, unsigned char options, char *m } } -int service_http_proxy_urlenum_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_http_proxy_urlenum_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-http-proxy.c b/hydra-http-proxy.c index d21ae90..26420af 100644 --- a/hydra-http-proxy.c +++ b/hydra-http-proxy.c @@ -2,10 +2,10 @@ #include "sasl.h" extern char *HYDRA_EXIT; -static int http_proxy_auth_mechanism = AUTH_ERROR; +static int32_t http_proxy_auth_mechanism = AUTH_ERROR; char *http_proxy_buf = NULL; -int start_http_proxy(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp, char *hostname) { +int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp, char *hostname) { char *empty = ""; char *login, *pass, buffer[500], buffer2[500]; char url[210], host[30]; @@ -246,9 +246,9 @@ int start_http_proxy(int s, char *ip, int port, unsigned char options, char *mis return 1; } -void service_http_proxy(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_HTTP_PROXY, mysslport = PORT_HTTP_PROXY_SSL; +void service_http_proxy(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_HTTP_PROXY, mysslport = PORT_HTTP_PROXY_SSL; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -277,7 +277,7 @@ void service_http_proxy(char *ip, int sp, unsigned char options, char *miscptr, } if (sock < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } next_run = 2; @@ -299,7 +299,7 @@ void service_http_proxy(char *ip, int sp, unsigned char options, char *miscptr, } } -int service_http_proxy_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_http_proxy_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-http.c b/hydra-http.c index 9e5a28e..862bb68 100644 --- a/hydra-http.c +++ b/hydra-http.c @@ -5,15 +5,15 @@ extern char *HYDRA_EXIT; char *webtarget = NULL; char *slash = "/"; char *http_buf = NULL; -int webport, freemischttp = 0; -int http_auth_mechanism = AUTH_BASIC; +int32_t webport, freemischttp = 0; +int32_t http_auth_mechanism = AUTH_BASIC; -int start_http(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp, char *type) { +int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp, char *type) { char *empty = ""; char *login, *pass, buffer[500], buffer2[500]; char header[64] = "Content-Length: 0\r\n"; char *ptr, *fooptr; - int complete_line = 0; + int32_t complete_line = 0; char tmpreplybuf[1024] = "", *tmpreplybufptr; if (strlen(login = hydra_get_next_login()) == 0) @@ -212,7 +212,7 @@ int start_http(int s, char *ip, int port, unsigned char options, char *miscptr, //the first authentication type failed, check the type from server header if ((hydra_strcasestr(http_buf, "WWW-Authenticate: Basic") == NULL) && (http_auth_mechanism == AUTH_BASIC)) { //seems the auth supported is not Basic shceme so testing further - int find_auth = 0; + int32_t find_auth = 0; if (hydra_strcasestr(http_buf, "WWW-Authenticate: NTLM") != NULL) { http_auth_mechanism = AUTH_NTLM; @@ -240,9 +240,9 @@ int start_http(int s, char *ip, int port, unsigned char options, char *miscptr, return 1; } -void service_http(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname, char *type) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_HTTP, mysslport = PORT_HTTP_SSL; +void service_http(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname, char *type) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_HTTP, mysslport = PORT_HTTP_SSL; char *ptr, *ptr2; hydra_register_socket(sp); @@ -299,7 +299,7 @@ void service_http(char *ip, int sp, unsigned char options, char *miscptr, FILE * if (sock < 0) { if (freemischttp) free(miscptr); - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } next_run = 2; @@ -325,19 +325,19 @@ void service_http(char *ip, int sp, unsigned char options, char *miscptr, FILE * } } -void service_http_get(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +void service_http_get(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { service_http(ip, sp, options, miscptr, fp, port, hostname, "GET"); } -void service_http_post(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +void service_http_post(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { service_http(ip, sp, options, miscptr, fp, port, hostname, "POST"); } -void service_http_head(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +void service_http_head(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { service_http(ip, sp, options, miscptr, fp, port, hostname, "HEAD"); } -int service_http_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_http_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-icq.c b/hydra-icq.c index 3e2722d..68fd667 100644 --- a/hydra-icq.c +++ b/hydra-icq.c @@ -1,8 +1,8 @@ #include "hydra-mod.h" extern char *HYDRA_EXIT; -extern int child_head_no; -int seq = 1; +extern int32_t child_head_no; +int32_t seq = 1; const unsigned char icq5_table[] = { 0x59, 0x60, 0x37, 0x6B, 0x65, 0x62, 0x46, 0x48, 0x53, 0x61, 0x4C, @@ -31,10 +31,10 @@ const unsigned char icq5_table[] = { 0x5A, 0x00, 0x00 }; -void fix_packet(char *buf, int len) { +void fix_packet(char *buf, int32_t len) { unsigned long c1, c2; unsigned long r1, r2; - int pos, key, k; + int32_t pos, key, k; c1 = buf[8]; c1 <<= 8; @@ -83,10 +83,10 @@ void icq_header(char *buf, unsigned short cmd, unsigned long uin) { buf[9] = (uin >> 24) & 0xff; } -int icq_login(int s, char *login, char *pass) { +int32_t icq_login(int32_t s, char *login, char *pass) { unsigned long uin = strtoul(login, NULL, 10); char buf[256]; - int len; + int32_t len; bzero(buf, sizeof(buf)); @@ -103,7 +103,7 @@ int icq_login(int s, char *login, char *pass) { return (hydra_send(s, buf, 43 + len, 0)); } -int icq_login_1(int s, char *login) { +int32_t icq_login_1(int32_t s, char *login) { unsigned long uin = strtoul(login, NULL, 10); char buf[64]; @@ -111,7 +111,7 @@ int icq_login_1(int s, char *login) { return (hydra_send(s, buf, 10, 0)); } -int icq_disconnect(int s, char *login) { +int32_t icq_disconnect(int32_t s, char *login) { unsigned long uin = strtoul(login, NULL, 10); char buf[64]; @@ -123,7 +123,7 @@ int icq_disconnect(int s, char *login) { return (hydra_send(s, buf, 34, 0)); } -int icq_ack(int s, char *login) { +int32_t icq_ack(int32_t s, char *login) { unsigned long uin = strtoul(login, NULL, 10); char buf[64]; @@ -141,11 +141,11 @@ int icq_ack(int s, char *login) { return (hydra_send(s, buf, 10, 0)); } -int start_icq(int sock, char *ip, int port, FILE * output, char *miscptr, FILE * fp) { +int32_t start_icq(int32_t sock, char *ip, int32_t port, FILE * output, char *miscptr, FILE * fp) { unsigned char buf[1024]; char *login, *pass; char *empty = ""; - int i, r; + int32_t i, r; if (strlen(login = hydra_get_next_login()) == 0) return 2; @@ -153,7 +153,7 @@ int start_icq(int sock, char *ip, int port, FILE * output, char *miscptr, FILE * pass = empty; for (i = 0; login[i]; i++) - if (!isdigit((int) login[i])) { + if (!isdigit((int32_t) login[i])) { fprintf(stderr, "[ERROR] Invalid UIN %s\n, ignoring.", login); hydra_completed_pair(); return 2; @@ -168,7 +168,7 @@ int start_icq(int sock, char *ip, int port, FILE * output, char *miscptr, FILE * if (r < 0) { if (verbose) - fprintf(stderr, "[ERROR] Process %d: Can not connect [unreachable]\n", (int) getpid()); + fprintf(stderr, "[ERROR] Process %d: Can not connect [unreachable]\n", (int32_t) getpid()); return 3; } @@ -196,9 +196,9 @@ int start_icq(int sock, char *ip, int port, FILE * output, char *miscptr, FILE * return 1; } -void service_icq(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_ICQ; +void service_icq(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_ICQ; if (port) myport = port; @@ -221,7 +221,7 @@ void service_icq(char *ip, int sp, unsigned char options, char *miscptr, FILE * sock = hydra_disconnect(sock); sock = hydra_connect_udp(ip, myport); if (sock < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } next_run = 2; @@ -241,7 +241,7 @@ void service_icq(char *ip, int sp, unsigned char options, char *miscptr, FILE * } } -int service_icq_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_icq_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-imap.c b/hydra-imap.c index 07524d5..f9a3822 100644 --- a/hydra-imap.c +++ b/hydra-imap.c @@ -3,13 +3,13 @@ extern char *HYDRA_EXIT; char *buf; -int counter; +int32_t counter; -int imap_auth_mechanism = AUTH_CLEAR; +int32_t imap_auth_mechanism = AUTH_CLEAR; -char *imap_read_server_capacity(int sock) { +char *imap_read_server_capacity(int32_t sock) { char *ptr = NULL; - int resp = 0; + int32_t resp = 0; char *buf = NULL; do { @@ -30,7 +30,7 @@ char *imap_read_server_capacity(int sock) { buf[strlen(buf) - 1] = 0; if (buf[strlen(buf) - 1] == '\r') buf[strlen(buf) - 1] = 0; - if (isdigit((int) *ptr) && *(ptr + 1) == ' ') { + if (isdigit((int32_t) *ptr) && *(ptr + 1) == ' ') { resp = 1; } } @@ -39,7 +39,7 @@ char *imap_read_server_capacity(int sock) { return buf; } -int start_imap(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_imap(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *login, *pass, buffer[500], buffer2[500], *fooptr; @@ -111,7 +111,7 @@ int start_imap(int s, char *ip, int port, unsigned char options, char *miscptr, case AUTH_CRAMMD5: case AUTH_CRAMSHA1: case AUTH_CRAMSHA256:{ - int rc = 0; + int32_t rc = 0; char *preplogin; rc = sasl_saslprep(login, SASL_ALLOW_UNASSIGNED, &preplogin); @@ -220,7 +220,7 @@ int start_imap(int s, char *ip, int port, unsigned char options, char *miscptr, char clientfirstmessagebare[200]; char serverfirstmessage[200]; char *preplogin; - int rc = sasl_saslprep(login, SASL_ALLOW_UNASSIGNED, &preplogin); + int32_t rc = sasl_saslprep(login, SASL_ALLOW_UNASSIGNED, &preplogin); if (rc) { return 3; @@ -353,9 +353,9 @@ int start_imap(int s, char *ip, int port, unsigned char options, char *miscptr, return 1; } -void service_imap(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_IMAP, mysslport = PORT_IMAP_SSL, disable_tls = 1; +void service_imap(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_IMAP, mysslport = PORT_IMAP_SSL, disable_tls = 1; char *buffer1 = "1 CAPABILITY\r\n"; hydra_register_socket(sp); @@ -380,7 +380,7 @@ void service_imap(char *ip, int sp, unsigned char options, char *miscptr, FILE * } if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } buf = hydra_receive_line(sock); @@ -404,10 +404,10 @@ void service_imap(char *ip, int sp, unsigned char options, char *miscptr, FILE * } if ((miscptr != NULL) && (strlen(miscptr) > 0)) { - int i; + int32_t i; for (i = 0; i < strlen(miscptr); i++) - miscptr[i] = (char) toupper((int) miscptr[i]); + miscptr[i] = (char) toupper((int32_t) miscptr[i]); if (strstr(miscptr, "TLS") || strstr(miscptr, "SSL") || strstr(miscptr, "STARTTLS")) { disable_tls = 0; @@ -571,7 +571,7 @@ void service_imap(char *ip, int sp, unsigned char options, char *miscptr, FILE * } } -int service_imap_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_imap_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-irc.c b/hydra-irc.c index bb79ee0..601715b 100644 --- a/hydra-irc.c +++ b/hydra-irc.c @@ -9,12 +9,12 @@ RFC 1459: Internet Relay Chat Protocol extern char *HYDRA_EXIT; char *buf; char buffer[300] = ""; -int myport = PORT_IRC, mysslport = PORT_IRC_SSL; +int32_t myport = PORT_IRC, mysslport = PORT_IRC_SSL; -int start_oper_irc(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_oper_irc(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *login, *pass; - int ret; + int32_t ret; if (strlen(login = hydra_get_next_login()) == 0) login = empty; @@ -42,7 +42,7 @@ int start_oper_irc(int s, char *ip, int port, unsigned char options, char *miscp return 2; } -int send_nick(int s, char *ip, char *pass) { +int32_t send_nick(int32_t s, char *ip, char *pass) { if (strlen(pass) > 0) { sprintf(buffer, "PASS %s\r\n", pass); if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { @@ -53,14 +53,14 @@ int send_nick(int s, char *ip, char *pass) { if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { return -1; } - sprintf(buffer, "NICK hydra%d\r\nUSER hydra%d hydra %s :hydra\r\n", (int) getpid(), (int) getpid(), hydra_address2string(ip)); + sprintf(buffer, "NICK hydra%d\r\nUSER hydra%d hydra %s :hydra\r\n", (int32_t) getpid(), (int32_t) getpid(), hydra_address2string(ip)); if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { return -1; } return 0; } -int irc_server_connect(char *ip, int sock, int port, unsigned char options, char *hostname) { +int32_t irc_server_connect(char *ip, int32_t sock, int32_t port, unsigned char options, char *hostname) { if (sock >= 0) sock = hydra_disconnect(sock); // usleepn(275); @@ -78,17 +78,17 @@ int irc_server_connect(char *ip, int sock, int port, unsigned char options, char return sock; } -int start_pass_irc(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp, char *hostname) { +int32_t start_pass_irc(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp, char *hostname) { char *empty = ""; char *pass; - int ret; + int32_t ret; if (strlen(pass = hydra_get_next_password()) == 0) pass = empty; s = irc_server_connect(ip, s, port, options, hostname); if (s < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); return 3; } @@ -118,8 +118,8 @@ int start_pass_irc(int s, char *ip, int port, unsigned char options, char *miscp return 4; } -void service_irc(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1, ret; +void service_irc(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1, ret; char *buf; hydra_register_socket(sp); @@ -133,7 +133,7 @@ void service_irc(char *ip, int sp, unsigned char options, char *miscptr, FILE * sock = irc_server_connect(ip, sock, port, options, hostname); if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } @@ -209,7 +209,7 @@ void service_irc(char *ip, int sp, unsigned char options, char *miscptr, FILE * } } -int service_irc_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_irc_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-ldap.c b/hydra-ldap.c index b1514c4..c14d20a 100644 --- a/hydra-ldap.c +++ b/hydra-ldap.c @@ -4,15 +4,15 @@ extern char *HYDRA_EXIT; unsigned char *buf; -int counter; -int tls_required = 0; +int32_t counter; +int32_t tls_required = 0; -int start_ldap(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp, char *hostname, char version, int auth_method) { +int32_t start_ldap(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp, char *hostname, char version, int32_t auth_method) { char *empty = ""; char *login = "", *pass, *fooptr = ""; unsigned char buffer[512]; - int length = 0; - int ldap_auth_mechanism = auth_method; + int32_t length = 0; + int32_t ldap_auth_mechanism = auth_method; /* The LDAP "simple" method has three modes of operation: @@ -170,7 +170,7 @@ int start_ldap(int s, char *ip, int port, unsigned char options, char *miscptr, if (ldap_auth_mechanism == AUTH_DIGESTMD5) { char *ptr; char buffer2[500]; - int ind = 0; + int32_t ind = 0; ptr = strstr((char *) buf, "realm="); @@ -351,9 +351,9 @@ int start_ldap(int s, char *ip, int port, unsigned char options, char *miscptr, return 2; } -void service_ldap(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname, char version, int auth_method) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_LDAP, mysslport = PORT_LDAP_SSL; +void service_ldap(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname, char version, int32_t auth_method) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_LDAP, mysslport = PORT_LDAP_SSL; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -377,7 +377,7 @@ void service_ldap(char *ip, int sp, unsigned char options, char *miscptr, FILE * } if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } counter = 1; @@ -425,23 +425,23 @@ void service_ldap(char *ip, int sp, unsigned char options, char *miscptr, FILE * } } -void service_ldap2(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +void service_ldap2(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { service_ldap(ip, sp, options, miscptr, fp, port, hostname, 2, AUTH_CLEAR); } -void service_ldap3(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +void service_ldap3(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { service_ldap(ip, sp, options, miscptr, fp, port, hostname, 3, AUTH_CLEAR); } -void service_ldap3_cram_md5(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +void service_ldap3_cram_md5(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { service_ldap(ip, sp, options, miscptr, fp, port, hostname, 3, AUTH_CRAMMD5); } -void service_ldap3_digest_md5(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +void service_ldap3_digest_md5(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { service_ldap(ip, sp, options, miscptr, fp, port, hostname, 3, AUTH_DIGESTMD5); } -int service_ldap_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_ldap_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-mod.c b/hydra-mod.c index 0b9fd78..3c9fc69 100644 --- a/hydra-mod.c +++ b/hydra-mod.c @@ -27,27 +27,27 @@ #define SOCKS_DOMAIN 3 #define SOCKS_IPV6 4 -extern int conwait; +extern int32_t conwait; char quiet; -int do_retry = 1; -int module_auth_type = -1; -int intern_socket, extern_socket; +int32_t do_retry = 1; +int32_t module_auth_type = -1; +int32_t intern_socket, extern_socket; char pair[260]; char HYDRA_EXIT[5] = "\x00\xff\x00\xff\x00"; char *HYDRA_EMPTY = "\x00\x00\x00\x00"; char *fe80 = "\xfe\x80\x00"; -int fail = 0; -int alarm_went_off = 0; -int use_ssl = 0; +int32_t fail = 0; +int32_t alarm_went_off = 0; +int32_t use_ssl = 0; char ipaddr_str[64]; -int src_port = 0; -int __fck = 0; -int ssl_first = 1; -int __first_connect = 1; +int32_t src_port = 0; +int32_t __fck = 0; +int32_t ssl_first = 1; +int32_t __first_connect = 1; char ipstring[64]; -unsigned int colored_output = 1; +uint32_t colored_output = 1; char quiet = 0; -int old_ssl = 0; +int32_t old_ssl = 0; #ifdef LIBOPENSSL SSL *ssl = NULL; @@ -56,7 +56,7 @@ RSA *rsa = NULL; #endif /* prototype */ -int my_select(int fd, fd_set * fdread, fd_set * fdwrite, fd_set * fdex, long sec, long usec); +int32_t my_select(int32_t fd, fd_set * fdread, fd_set * fdwrite, fd_set * fdex, long sec, long usec); /* ----------------- alarming functions ---------------- */ void alarming() { @@ -66,14 +66,14 @@ void alarming() { /* uh, I think it's not good for performance if we try to reconnect to a timeout system! * if (fail > MAX_CONNECT_RETRY) { */ - //fprintf(stderr, "Process %d: Can not connect [timeout], process exiting\n", (int) getpid()); + //fprintf(stderr, "Process %d: Can not connect [timeout], process exiting\n", (int32_t) getpid()); if (debug) printf("DEBUG_CONNECT_TIMEOUT\n"); hydra_child_exit(1); /* * } else { - * if (verbose) fprintf(stderr, "Process %d: Can not connect [timeout], retrying (%d of %d retries)\n", (int)getpid(), fail, MAX_CONNECT_RETRY); + * if (verbose) fprintf(stderr, "Process %d: Can not connect [timeout], retrying (%d of %d retries)\n", (int32_t)getpid(), fail, MAX_CONNECT_RETRY); * } */ } @@ -85,8 +85,8 @@ void interrupt() { /* ----------------- internal functions ----------------- */ -int internal__hydra_connect(char *host, int port, int protocol, int type) { - int s, ret = -1, ipv6 = 0, reset_selected = 0; +int32_t internal__hydra_connect(char *host, int32_t port, int32_t protocol, int32_t type) { + int32_t s, ret = -1, ipv6 = 0, reset_selected = 0; #ifdef AF_INET6 struct sockaddr_in6 target6; @@ -95,7 +95,7 @@ int internal__hydra_connect(char *host, int port, int protocol, int type) { struct sockaddr_in target; struct sockaddr_in sin; char *buf, *tmpptr = NULL; - int err = 0; + int32_t err = 0; if (proxy_count > 0 && use_proxy > 0 && selected_proxy == -1) { reset_selected = 1; @@ -117,7 +117,7 @@ int internal__hydra_connect(char *host, int port, int protocol, int type) { s = socket(PF_INET, protocol, type); if (s >= 0) { if (src_port != 0) { - int bind_ok = 0; + int32_t bind_ok = 0; #ifdef AF_INET6 if (ipv6) { @@ -221,9 +221,9 @@ int internal__hydra_connect(char *host, int port, int protocol, int type) { fail++; if (verbose ) { if (do_retry && fail <= MAX_CONNECT_RETRY) - fprintf(stderr, "Process %d: Can not connect [unreachable], retrying (%d of %d retries)\n", (int) getpid(), fail, MAX_CONNECT_RETRY); + fprintf(stderr, "Process %d: Can not connect [unreachable], retrying (%d of %d retries)\n", (int32_t) getpid(), fail, MAX_CONNECT_RETRY); else - fprintf(stderr, "Process %d: Can not connect [unreachable]\n", (int) getpid()); + fprintf(stderr, "Process %d: Can not connect [unreachable]\n", (int32_t) getpid()); } } } while (ret < 0 && fail <= MAX_CONNECT_RETRY && do_retry); @@ -232,7 +232,7 @@ int internal__hydra_connect(char *host, int port, int protocol, int type) { printf("DEBUG_CONNECT_UNREACHABLE\n"); /* we wont quit here, thats up to the module to decide what to do - * fprintf(stderr, "Process %d: Can not connect [unreachable], process exiting\n", (int)getpid()); + * fprintf(stderr, "Process %d: Can not connect [unreachable], process exiting\n", (int32_t)getpid()); * hydra_child_exit(1); */ extern_socket = -1; @@ -317,7 +317,7 @@ int internal__hydra_connect(char *host, int port, int protocol, int type) { hydra_report(stderr, "[ERROR] SOCKS5 proxy read failed (%zu/2)\n", cnt); err = 1; } - if ((unsigned int) buf[1] == SOCKS_NOMETHOD) { + if ((uint32_t) buf[1] == SOCKS_NOMETHOD) { hydra_report(stderr, "[ERROR] SOCKS5 proxy authentication method negotiation failed\n"); err = 1; } @@ -457,8 +457,8 @@ int internal__hydra_connect(char *host, int port, int protocol, int type) { } #if defined(LIBOPENSSL) && !defined(LIBRESSL_VERSION_NUMBER) -RSA *ssl_temp_rsa_cb(SSL * ssl, int export, int keylength) { - int ok = 0; +RSA *ssl_temp_rsa_cb(SSL * ssl, int32_t export, int32_t keylength) { + int32_t ok = 0; #if !defined(LIBRESSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L BIGNUM *n; n = BN_new(); @@ -493,8 +493,8 @@ RSA *ssl_temp_rsa_cb(SSL * ssl, int export, int keylength) { #endif #if defined(LIBOPENSSL) -int internal__hydra_connect_to_ssl(int socket, char *hostname) { - int err; +int32_t internal__hydra_connect_to_ssl(int32_t socket, char *hostname) { + int32_t err; if (ssl_first) { SSL_load_error_strings(); @@ -574,8 +574,8 @@ int internal__hydra_connect_to_ssl(int socket, char *hostname) { return socket; } -int internal__hydra_connect_ssl(char *host, int port, int protocol, int type, char *hostname) { - int socket; +int32_t internal__hydra_connect_ssl(char *host, int32_t port, int32_t protocol, int32_t type, char *hostname) { + int32_t socket; if ((socket = internal__hydra_connect(host, port, protocol, type)) < 0) return -1; @@ -584,7 +584,7 @@ int internal__hydra_connect_ssl(char *host, int port, int protocol, int type, ch } #endif -int internal__hydra_recv(int socket, char *buf, int length) { +int32_t internal__hydra_recv(int32_t socket, char *buf, int32_t length) { #ifdef LIBOPENSSL if (use_ssl) { return SSL_read(ssl, buf, length); @@ -593,7 +593,7 @@ int internal__hydra_recv(int socket, char *buf, int length) { return recv(socket, buf, length, 0); } -int internal__hydra_send(int socket, char *buf, int size, int options) { +int32_t internal__hydra_send(int32_t socket, char *buf, int32_t size, int32_t options) { #ifdef LIBOPENSSL if (use_ssl) { return SSL_write(ssl, buf, size); @@ -604,7 +604,7 @@ int internal__hydra_send(int socket, char *buf, int size, int options) { /* ------------------ public functions ------------------ */ -void hydra_child_exit(int code) { +void hydra_child_exit(int32_t code) { char buf[2]; if (debug) @@ -628,7 +628,7 @@ void hydra_child_exit(int code) { exit(0); // might be killed before reaching this } -void hydra_register_socket(int s) { +void hydra_register_socket(int32_t s) { intern_socket = s; } @@ -694,7 +694,7 @@ void hydra_report_debug(FILE * st, char *format, ...) { char bufOut[33000]; char temp[6]; unsigned char cTemp; - int i = 0, len; + int32_t i = 0, len; if (format == NULL) { fprintf(stderr, "[ERROR] no msg passed.\n"); @@ -724,7 +724,7 @@ void hydra_report_debug(FILE * st, char *format, ...) { return; } -void hydra_report_found(int port, char *svc, FILE * fp) { +void hydra_report_found(int32_t port, char *svc, FILE * fp) { /* if (!strcmp(svc, "rsh")) if (colored_output) @@ -748,7 +748,7 @@ void hydra_report_found(int port, char *svc, FILE * fp) { } /* needed for irc module to display the general server password */ -void hydra_report_pass_found(int port, char *ip, char *svc, FILE * fp) { +void hydra_report_pass_found(int32_t port, char *ip, char *svc, FILE * fp) { /* strcpy(ipaddr_str, hydra_address2string(ip)); if (colored_output) @@ -761,7 +761,7 @@ void hydra_report_pass_found(int port, char *ip, char *svc, FILE * fp) { */ } -void hydra_report_found_host(int port, char *ip, char *svc, FILE * fp) { +void hydra_report_found_host(int32_t port, char *ip, char *svc, FILE * fp) { /* char *keyw = "password"; strcpy(ipaddr_str, hydra_address2string(ip)); @@ -802,7 +802,7 @@ void hydra_report_found_host(int port, char *ip, char *svc, FILE * fp) { */ } -void hydra_report_found_host_msg(int port, char *ip, char *svc, FILE * fp, char *msg) { +void hydra_report_found_host_msg(int32_t port, char *ip, char *svc, FILE * fp, char *msg) { /* strcpy(ipaddr_str, hydra_address2string(ip)); if (colored_output) @@ -816,7 +816,7 @@ void hydra_report_found_host_msg(int port, char *ip, char *svc, FILE * fp, char */ } -int hydra_connect_to_ssl(int socket, char *hostname) { +int32_t hydra_connect_to_ssl(int32_t socket, char *hostname) { #ifdef LIBOPENSSL return (internal__hydra_connect_to_ssl(socket, hostname)); #else @@ -825,7 +825,7 @@ int hydra_connect_to_ssl(int socket, char *hostname) { #endif } -int hydra_connect_ssl(char *host, int port, char *hostname) { +int32_t hydra_connect_ssl(char *host, int32_t port, char *hostname) { if (__first_connect != 0) __first_connect = 0; else @@ -838,7 +838,7 @@ int hydra_connect_ssl(char *host, int port, char *hostname) { #endif } -int hydra_connect_tcp(char *host, int port) { +int32_t hydra_connect_tcp(char *host, int32_t port) { if (__first_connect != 0) __first_connect = 0; else @@ -846,7 +846,7 @@ int hydra_connect_tcp(char *host, int port) { return (internal__hydra_connect(host, port, SOCK_STREAM, 6)); } -int hydra_connect_udp(char *host, int port) { +int32_t hydra_connect_udp(char *host, int32_t port) { if (__first_connect != 0) __first_connect = 0; else @@ -854,7 +854,7 @@ int hydra_connect_udp(char *host, int port) { return (internal__hydra_connect(host, port, SOCK_DGRAM, 17)); } -int hydra_disconnect(int socket) { +int32_t hydra_disconnect(int32_t socket) { #ifdef LIBOPENSSL if (use_ssl && SSL_get_fd(ssl) == socket) { /* SSL_shutdown(ssl); ...skip this--it slows things down */ @@ -869,7 +869,7 @@ int hydra_disconnect(int socket) { return -1; } -int hydra_data_ready_writing_timed(int socket, long sec, long usec) { +int32_t hydra_data_ready_writing_timed(int32_t socket, long sec, long usec) { fd_set fds; FD_ZERO(&fds); @@ -877,11 +877,11 @@ int hydra_data_ready_writing_timed(int socket, long sec, long usec) { return (my_select(socket + 1, &fds, NULL, NULL, sec, usec)); } -int hydra_data_ready_writing(int socket) { +int32_t hydra_data_ready_writing(int32_t socket) { return (hydra_data_ready_writing_timed(socket, 30, 0)); } -int hydra_data_ready_timed(int socket, long sec, long usec) { +int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec) { fd_set fds; FD_ZERO(&fds); @@ -889,12 +889,12 @@ int hydra_data_ready_timed(int socket, long sec, long usec) { return (my_select(socket + 1, &fds, NULL, NULL, sec, usec)); } -int hydra_data_ready(int socket) { +int32_t hydra_data_ready(int32_t socket) { return (hydra_data_ready_timed(socket, 0, 100)); } -int hydra_recv(int socket, char *buf, int length) { - int ret; +int32_t hydra_recv(int32_t socket, char *buf, int32_t length) { + int32_t ret; char text[64]; ret = internal__hydra_recv(socket, buf, length); @@ -906,8 +906,8 @@ int hydra_recv(int socket, char *buf, int length) { return ret; } -int hydra_recv_nb(int socket, char *buf, int length) { - int ret = -1; +int32_t hydra_recv_nb(int32_t socket, char *buf, int32_t length) { + int32_t ret = -1; char text[64]; if (hydra_data_ready_timed(socket, (long) waittime, 0) > 0) { @@ -928,9 +928,9 @@ int hydra_recv_nb(int socket, char *buf, int length) { return ret; } -char *hydra_receive_line(int socket) { +char *hydra_receive_line(int32_t socket) { char buf[1024], *buff, *buff2, text[64]; - int i, j = 1, k, got = 0; + int32_t i, j = 1, k, got = 0; if ((buff = malloc(sizeof(buf))) == NULL) { fprintf(stderr, "[ERROR] could not malloc\n"); @@ -1001,14 +1001,14 @@ char *hydra_receive_line(int socket) { return buff; } -int hydra_send(int socket, char *buf, int size, int options) { +int32_t hydra_send(int32_t socket, char *buf, int32_t size, int32_t options) { char text[64]; if (debug) { sprintf(text, "[DEBUG] SEND [pid:%d]", getpid()); hydra_dump_data(buf, size, text); -/* int k; +/* int32_t k; char *debugbuf = malloc(size + 1); if (debugbuf != NULL) { @@ -1027,18 +1027,18 @@ int hydra_send(int socket, char *buf, int size, int options) { return (internal__hydra_send(socket, buf, size, options)); } -int make_to_lower(char *buf) { +int32_t make_to_lower(char *buf) { if (buf == NULL) return 1; while (buf[0] != 0) { - buf[0] = tolower((int) buf[0]); + buf[0] = tolower((int32_t) buf[0]); buf++; } return 1; } char *hydra_strrep(char *string, char *oldpiece, char *newpiece) { - int str_index, newstr_index, oldpiece_index, end, new_len, old_len, cpy_len; + int32_t str_index, newstr_index, oldpiece_index, end, new_len, old_len, cpy_len; char *c, oldstring[6096], newstring[6096]; //updated due to issue 192 on github. static char finalstring[6096]; @@ -1102,12 +1102,12 @@ unsigned char hydra_conv64(unsigned char in) { } } -void hydra_tobase64(unsigned char *buf, int buflen, int bufsize) { +void hydra_tobase64(unsigned char *buf, int32_t buflen, int32_t bufsize) { unsigned char small[3] = { 0, 0, 0 }; unsigned char big[5]; unsigned char *ptr = buf; - int i = bufsize; - unsigned int len = 0; + int32_t i = bufsize; + uint32_t len = 0; unsigned char bof[i]; if (buf == NULL || strlen((char *) buf) == 0) @@ -1151,12 +1151,12 @@ void hydra_tobase64(unsigned char *buf, int buflen, int bufsize) { strcpy((char *) buf, (char *) bof); /* can not overflow */ } -void hydra_dump_asciihex(unsigned char *string, int length) { +void hydra_dump_asciihex(unsigned char *string, int32_t length) { unsigned char *p = (unsigned char *) string; unsigned char lastrow_data[16]; - int rows = length / HYDRA_DUMP_ROWS; - int lastrow = length % HYDRA_DUMP_ROWS; - int i, j; + int32_t rows = length / HYDRA_DUMP_ROWS; + int32_t lastrow = length % HYDRA_DUMP_ROWS; + int32_t i, j; for (i = 0; i < rows; i++) { printf("%04hx: ", i * 16); @@ -1227,16 +1227,16 @@ char *hydra_address2string(char *address) { return NULL; // not reached } -void hydra_set_srcport(int port) { +void hydra_set_srcport(int32_t port) { src_port = port; } #ifdef HAVE_PCRE -int hydra_string_match(char *str, const char *regex) { +int32_t hydra_string_match(char *str, const char *regex) { pcre *re = NULL; - int offset_error = 0; + int32_t offset_error = 0; const char *error = NULL; - int rc = 0; + int32_t rc = 0; re = pcre_compile(regex, PCRE_CASELESS | PCRE_DOTALL, &error, &offset_error, NULL); if (re == NULL) { @@ -1287,11 +1287,11 @@ char *hydra_strcasestr(const char *haystack, const char *needle) { return NULL; for (; *haystack; ++haystack) { - if (toupper((int) *haystack) == toupper((int) *needle)) { + if (toupper((int32_t) *haystack) == toupper((int32_t) *needle)) { const char *h, *n; for (h = haystack, n = needle; *h && *n; ++h, ++n) { - if (toupper((int) *h) != toupper((int) *n)) { + if (toupper((int32_t) *h) != toupper((int32_t) *n)) { break; } } @@ -1303,12 +1303,12 @@ char *hydra_strcasestr(const char *haystack, const char *needle) { return NULL; } -void hydra_dump_data(unsigned char *buf, int len, char *text) { +void hydra_dump_data(unsigned char *buf, int32_t len, char *text) { unsigned char *p = (unsigned char *) buf; unsigned char lastrow_data[16]; - int rows = len / 16; - int lastrow = len % 16; - int i, j; + int32_t rows = len / 16; + int32_t lastrow = len % 16; + int32_t i, j; if (text != NULL && text[0] != 0) printf("%s (%d bytes):\n", text, len); @@ -1362,8 +1362,8 @@ void hydra_dump_data(unsigned char *buf, int len, char *text) { } } -int hydra_memsearch(char *haystack, int hlen, char *needle, int nlen) { - int i; +int32_t hydra_memsearch(char *haystack, int32_t hlen, char *needle, int32_t nlen) { + int32_t i; for (i = 0; i <= hlen - nlen; i++) if (memcmp(haystack + i, needle, nlen) == 0) diff --git a/hydra-mod.h b/hydra-mod.h index e4dcbde..812e2d1 100644 --- a/hydra-mod.h +++ b/hydra-mod.h @@ -5,60 +5,60 @@ extern char quiet; -extern void hydra_child_exit(int code); -extern void hydra_register_socket(int s); +extern void hydra_child_exit(int32_t code); +extern void hydra_register_socket(int32_t s); extern char *hydra_get_next_pair(); extern char *hydra_get_next_login(); extern char *hydra_get_next_password(); extern void hydra_completed_pair(); extern void hydra_completed_pair_found(); extern void hydra_completed_pair_skip(); -extern void hydra_report_found(int port, char *svc, FILE * fp); -extern void hydra_report_pass_found(int port, char *ip, char *svc, FILE * fp); -extern void hydra_report_found_host(int port, char *ip, char *svc, FILE * fp); -extern void hydra_report_found_host_msg(int port, char *ip, char *svc, FILE * fp, char *msg); +extern void hydra_report_found(int32_t port, char *svc, FILE * fp); +extern void hydra_report_pass_found(int32_t port, char *ip, char *svc, FILE * fp); +extern void hydra_report_found_host(int32_t port, char *ip, char *svc, FILE * fp); +extern void hydra_report_found_host_msg(int32_t port, char *ip, char *svc, FILE * fp, char *msg); extern void hydra_report_debug(FILE *st, char *format, ...); -extern int hydra_connect_to_ssl(int socket, char *hostname); -extern int hydra_connect_ssl(char *host, int port, char *hostname); -extern int hydra_connect_tcp(char *host, int port); -extern int hydra_connect_udp(char *host, int port); -extern int hydra_disconnect(int socket); -extern int hydra_data_ready(int socket); -extern int hydra_recv(int socket, char *buf, int length); -extern int hydra_recv_nb(int socket, char *buf, int length); -extern char *hydra_receive_line(int socket); -extern int hydra_send(int socket, char *buf, int size, int options); -extern int make_to_lower(char *buf); +extern int32_t hydra_connect_to_ssl(int32_t socket, char *hostname); +extern int32_t hydra_connect_ssl(char *host, int32_t port, char *hostname); +extern int32_t hydra_connect_tcp(char *host, int32_t port); +extern int32_t hydra_connect_udp(char *host, int32_t port); +extern int32_t hydra_disconnect(int32_t socket); +extern int32_t hydra_data_ready(int32_t socket); +extern int32_t hydra_recv(int32_t socket, char *buf, int32_t length); +extern int32_t hydra_recv_nb(int32_t socket, char *buf, int32_t length); +extern char *hydra_receive_line(int32_t socket); +extern int32_t hydra_send(int32_t socket, char *buf, int32_t size, int32_t options); +extern int32_t make_to_lower(char *buf); extern unsigned char hydra_conv64(unsigned char in); -extern void hydra_tobase64(unsigned char *buf, int buflen, int bufsize); -extern void hydra_dump_asciihex(unsigned char *string, int length); -extern void hydra_set_srcport(int port); +extern void hydra_tobase64(unsigned char *buf, int32_t buflen, int32_t bufsize); +extern void hydra_dump_asciihex(unsigned char *string, int32_t length); +extern void hydra_set_srcport(int32_t port); extern char *hydra_address2string(char *address); extern char *hydra_strcasestr(const char *haystack, const char *needle); -extern void hydra_dump_data(unsigned char *buf, int len, char *text); -extern int hydra_memsearch(char *haystack, int hlen, char *needle, int nlen); +extern void hydra_dump_data(unsigned char *buf, int32_t len, char *text); +extern int32_t hydra_memsearch(char *haystack, int32_t hlen, char *needle, int32_t nlen); extern char *hydra_strrep(char *string, char *oldpiece, char *newpiece); #ifdef HAVE_PCRE -int hydra_string_match(char *str, const char *regex); +int32_t hydra_string_match(char *str, const char *regex); #endif char *hydra_string_replace(const char *string, const char *substr, const char *replacement); -int debug; -int verbose; -int waittime; -int port; -int found; -int proxy_count; -int use_proxy; -int selected_proxy; +int32_t debug; +int32_t verbose; +int32_t waittime; +int32_t port; +int32_t found; +int32_t proxy_count; +int32_t use_proxy; +int32_t selected_proxy; char proxy_string_ip[MAX_PROXY_COUNT][36]; -int proxy_string_port[MAX_PROXY_COUNT]; +int32_t proxy_string_port[MAX_PROXY_COUNT]; char proxy_string_type[MAX_PROXY_COUNT][10]; char *proxy_authentication[MAX_PROXY_COUNT]; char *cmdlinetarget; -typedef int BOOL; +typedef int32_t BOOL; #define hydra_report fprintf diff --git a/hydra-mssql.c b/hydra-mssql.c index 928a348..2f9608b 100644 --- a/hydra-mssql.c +++ b/hydra-mssql.c @@ -45,13 +45,13 @@ unsigned char p_lng[] = "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x30\x30\x30\x00\x00" "\x00\x03\x00\x00\x00"; -int start_mssql(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_mssql(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *login, *pass, buffer[1024]; char ms_login[MSLEN + 1]; char ms_pass[MSLEN + 1]; unsigned char len_login, len_pass; - int ret = -1; + int32_t ret = -1; if (strlen(login = hydra_get_next_login()) == 0) login = empty; @@ -107,9 +107,9 @@ int start_mssql(int s, char *ip, int port, unsigned char options, char *miscptr, return 1; } -void service_mssql(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_MSSQL, mysslport = PORT_MSSQL_SSL; +void service_mssql(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_MSSQL, mysslport = PORT_MSSQL_SSL; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -129,7 +129,7 @@ void service_mssql(char *ip, int sp, unsigned char options, char *miscptr, FILE port = mysslport; } if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } next_run = start_mssql(sock, ip, port, options, miscptr, fp); @@ -153,7 +153,7 @@ void service_mssql(char *ip, int sp, unsigned char options, char *miscptr, FILE } } -int service_mssql_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_mssql_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-mysql.c b/hydra-mysql.c index df9dad4..fdf1e81 100644 --- a/hydra-mysql.c +++ b/hydra-mysql.c @@ -11,7 +11,7 @@ void dummy_mysql() { printf("\n"); } -void service_mysql(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +void service_mysql(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { printf("\n"); } #else @@ -35,16 +35,16 @@ MYSQL *mysql = NULL; void hydra_hash_password(unsigned long *result, const char *password); char *hydra_scramble(char *to, const char *message, const char *password); -extern int internal__hydra_recv(int socket, char *buf, int length); -extern int hydra_data_ready_timed(int socket, long sec, long usec); +extern int32_t internal__hydra_recv(int32_t socket, char *buf, int32_t length); +extern int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec); extern char *HYDRA_EXIT; char mysqlsalt[9]; /* modified hydra_receive_line, I've striped code which changed every 0x00 to 0x20 */ -char *hydra_mysql_receive_line(int socket) { +char *hydra_mysql_receive_line(int32_t socket) { char buf[300], *buff, *buff2; - int i = 0, j = 0, buff_size = 300; + int32_t i = 0, j = 0, buff_size = 300; buff = malloc(buff_size); if (buff == NULL) @@ -87,7 +87,7 @@ char *hydra_mysql_receive_line(int socket) { } /* check if valid mysql protocol, mysql version and read salt */ -char hydra_mysql_init(int sock) { +char hydra_mysql_init(int32_t sock) { char *server_version, *pos, *buf; unsigned char protocol; @@ -169,14 +169,14 @@ char hydra_mysql_parse_response(unsigned char *response) { return 0; } -char hydra_mysql_send_com_quit(int sock) { +char hydra_mysql_send_com_quit(int32_t sock) { char com_quit_packet[5] = { 0x01, 0x00, 0x00, 0x00, 0x01 }; hydra_send(sock, com_quit_packet, 5, 0); return 0; } -int start_mysql(int sock, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_mysql(int32_t sock, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *response = NULL, *login = NULL, *pass = NULL; unsigned long response_len; char res = 0; @@ -213,7 +213,7 @@ int start_mysql(int sock, char *ip, int port, unsigned char options, char *miscp } /*mysql_options(&mysql,MYSQL_OPT_COMPRESS,0); */ if (!mysql_real_connect(mysql, hydra_address2string(ip), login, pass, database, 0, NULL, 0)) { - int my_errno = mysql_errno(mysql); + int32_t my_errno = mysql_errno(mysql); if (debug) hydra_report(stderr, "[ERROR] Failed to connect to database: %s\n", mysql_error(mysql)); @@ -308,9 +308,9 @@ int start_mysql(int sock, char *ip, int port, unsigned char options, char *miscp return 1; } -void service_mysql(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_MYSQL; +void service_mysql(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_MYSQL; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -330,7 +330,7 @@ void service_mysql(char *ip, int sp, unsigned char options, char *miscptr, FILE port = myport; } if (sock < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } next_run = 2; @@ -424,7 +424,7 @@ char *hydra_scramble(char *to, const char *message, const char *password) { } #endif -int service_mysql_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_mysql_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-ncp.c b/hydra-ncp.c index ca22236..5c68d13 100644 --- a/hydra-ncp.c +++ b/hydra-ncp.c @@ -1,4 +1,3 @@ - /* * Novell Network Core Protocol Support - by David Maciejak @ GMAIL dot com * Tested on Netware 6.5 @@ -26,7 +25,7 @@ void dummy_ncp() { #include extern char *HYDRA_EXIT; -extern int child_head_no; +extern int32_t child_head_no; typedef struct __NCP_DATA { struct ncp_conn_spec spec; @@ -37,14 +36,14 @@ typedef struct __NCP_DATA { //uncomment line below to see more trace stack //#define NCP_DEBUG -int start_ncp(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_ncp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *login; char *pass; char context[256]; - unsigned int ncp_lib_error_code; + uint32_t ncp_lib_error_code; char *empty = ""; - int object_type = NCP_BINDERY_USER; + int32_t object_type = NCP_BINDERY_USER; _NCP_DATA *session; @@ -135,9 +134,9 @@ int start_ncp(int s, char *ip, int port, unsigned char options, char *miscptr, F return 1; //reconnect } -void service_ncp(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_NCP; +void service_ncp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_NCP; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -153,7 +152,7 @@ void service_ncp(char *ip, int sp, unsigned char options, char *miscptr, FILE * sock = hydra_connect_tcp(ip, myport); port = myport; if (sock < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } next_run = 2; @@ -184,7 +183,7 @@ void service_ncp(char *ip, int sp, unsigned char options, char *miscptr, FILE * #endif -int service_ncp_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_ncp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-nntp.c b/hydra-nntp.c index 82753d1..f6b7f35 100644 --- a/hydra-nntp.c +++ b/hydra-nntp.c @@ -10,14 +10,14 @@ RFC 4643: Network News Transfer Protocol (NNTP) Extension for Authentication */ -int nntp_auth_mechanism = AUTH_CLEAR; +int32_t nntp_auth_mechanism = AUTH_CLEAR; extern char *HYDRA_EXIT; char *buf; -char *nntp_read_server_capacity(int sock) { +char *nntp_read_server_capacity(int32_t sock) { char *ptr = NULL; - int resp = 0; + int32_t resp = 0; char *buf = NULL; do { @@ -25,7 +25,7 @@ char *nntp_read_server_capacity(int sock) { free(buf); ptr = buf = hydra_receive_line(sock); if (buf != NULL) { - if (isdigit((int) buf[0]) && buf[3] == ' ') + if (isdigit((int32_t) buf[0]) && buf[3] == ' ') resp = 1; else { if (buf[strlen(buf) - 1] == '\n') @@ -38,7 +38,7 @@ char *nntp_read_server_capacity(int sock) { if ((ptr = strrchr(buf, '\n')) != NULL) { #endif ptr++; - if (isdigit((int) *ptr) && *(ptr + 3) == ' ') + if (isdigit((int32_t) *ptr) && *(ptr + 3) == ' ') resp = 1; } } @@ -47,10 +47,10 @@ char *nntp_read_server_capacity(int sock) { return buf; } -int start_nntp(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_nntp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = "\"\""; char *login, *pass, buffer[500], buffer2[500], *fooptr; - int i = 1; + int32_t i = 1; if (strlen(login = hydra_get_next_login()) == 0) login = empty; @@ -121,7 +121,7 @@ int start_nntp(int s, char *ip, int port, unsigned char options, char *miscptr, break; #ifdef LIBOPENSSL case AUTH_CRAMMD5:{ - int rc = 0; + int32_t rc = 0; char *preplogin; rc = sasl_saslprep(login, SASL_ALLOW_UNASSIGNED, &preplogin); @@ -266,9 +266,9 @@ int start_nntp(int s, char *ip, int port, unsigned char options, char *miscptr, return 2; } -void service_nntp(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int i = 0, run = 1, next_run = 1, sock = -1; - int myport = PORT_NNTP, mysslport = PORT_NNTP_SSL, disable_tls = 0; +void service_nntp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t i = 0, run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_NNTP, mysslport = PORT_NNTP_SSL, disable_tls = 0; char *buffer1 = "CAPABILITIES\r\n"; hydra_register_socket(sp); @@ -293,7 +293,7 @@ void service_nntp(char *ip, int sp, unsigned char options, char *miscptr, FILE * } if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } // usleepn(300); @@ -405,7 +405,7 @@ SASL PLAIN DIGEST-MD5 LOGIN NTLM CRAM-MD5 if ((miscptr != NULL) && (strlen(miscptr) > 0)) { for (i = 0; i < strlen(miscptr); i++) - miscptr[i] = (char) toupper((int) miscptr[i]); + miscptr[i] = (char) toupper((int32_t) miscptr[i]); if (strncmp(miscptr, "USER", 4) == 0) nntp_auth_mechanism = AUTH_CLEAR; @@ -472,7 +472,7 @@ SASL PLAIN DIGEST-MD5 LOGIN NTLM CRAM-MD5 } } -int service_nntp_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_nntp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-oracle-listener.c b/hydra-oracle-listener.c index 9a52cea..f10d72d 100644 --- a/hydra-oracle-listener.c +++ b/hydra-oracle-listener.c @@ -25,11 +25,11 @@ void dummy_oracle_listener() { extern char *HYDRA_EXIT; char *buf; unsigned char *hash; -int sid_mechanism = AUTH_PLAIN; +int32_t sid_mechanism = AUTH_PLAIN; -int initial_permutation(unsigned char **result, char *p_str, int *sz) { - int k = 0; - int i = strlen(p_str); +int32_t initial_permutation(unsigned char **result, char *p_str, int32_t *sz) { + int32_t k = 0; + int32_t i = strlen(p_str); char *buff; //expand the string with zero so that length is a multiple of 4 @@ -67,8 +67,8 @@ int initial_permutation(unsigned char **result, char *p_str, int *sz) { return 0; } -int ora_hash(unsigned char **orahash, unsigned char *buf, int len) { - int i; +int32_t ora_hash(unsigned char **orahash, unsigned char *buf, int32_t len) { + int32_t i; if ((*orahash = malloc(HASHSIZE)) == NULL) { hydra_report(stderr, "[ERROR] Can't allocate memory\n"); @@ -81,8 +81,8 @@ int ora_hash(unsigned char **orahash, unsigned char *buf, int len) { return 0; } -int convert_byteorder(unsigned char **result, int size) { - int i = 0; +int32_t convert_byteorder(unsigned char **result, int32_t size) { + int32_t i = 0; char *buff; if ((buff = malloc(size)) == NULL) { @@ -103,8 +103,8 @@ int convert_byteorder(unsigned char **result, int size) { return 0; } -int ora_descrypt(unsigned char **rs, unsigned char *result, int siz) { - int i = 0; +int32_t ora_descrypt(unsigned char **rs, unsigned char *result, int32_t siz) { + int32_t i = 0; char lastkey[8]; DES_key_schedule ks1; unsigned char key1[8] = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF }; @@ -138,9 +138,9 @@ int ora_descrypt(unsigned char **rs, unsigned char *result, int siz) { return 0; } -int ora_hash_password(char *pass) { +int32_t ora_hash_password(char *pass) { // secret hash function comes here, and written to char *hash - int siz = 0; + int32_t siz = 0; unsigned char *desresult; unsigned char *result; char buff[strlen(pass) + 5]; @@ -180,7 +180,7 @@ int ora_hash_password(char *pass) { return 0; } -int start_oracle_listener(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_oracle_listener(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { unsigned char tns_packet_begin[22] = { "\x00\x00\x01\x00\x00\x00\x01\x36\x01\x2c\x00\x00\x08\x00\x7f\xff\x86\x0e\x00\x00\x01\x00" }; @@ -192,7 +192,7 @@ int start_oracle_listener(int s, char *ip, int port, unsigned char options, char char *pass; char connect_string[200]; char buffer2[260]; - int siz = 0; + int32_t siz = 0; memset(connect_string, 0, sizeof(connect_string)); memset(buffer2, 0, sizeof(buffer2)); @@ -258,9 +258,9 @@ int start_oracle_listener(int s, char *ip, int port, unsigned char options, char return 1; } -void service_oracle_listener(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_ORACLE, mysslport = PORT_ORACLE_SSL; +void service_oracle_listener(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_ORACLE, mysslport = PORT_ORACLE_SSL; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -301,7 +301,7 @@ void service_oracle_listener(char *ip, int sp, unsigned char options, char *misc } if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } /* run the cracking function */ @@ -325,7 +325,7 @@ void service_oracle_listener(char *ip, int sp, unsigned char options, char *misc } } -int service_oracle_listener_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_oracle_listener_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-oracle-sid.c b/hydra-oracle-sid.c index 1444e59..7570379 100644 --- a/hydra-oracle-sid.c +++ b/hydra-oracle-sid.c @@ -23,7 +23,7 @@ char *buf; unsigned char *hash; -int start_oracle_sid(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_oracle_sid(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { /* PP is the packet length XX is the length of connect data @@ -39,7 +39,7 @@ int start_oracle_sid(int s, char *ip, int port, unsigned char options, char *mis char *login; char connect_string[200]; char buffer2[260]; - int siz = 0; + int32_t siz = 0; memset(connect_string, 0, sizeof(connect_string)); memset(buffer2, 0, sizeof(buffer2)); @@ -85,9 +85,9 @@ int start_oracle_sid(int s, char *ip, int port, unsigned char options, char *mis return 1; } -void service_oracle_sid(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_ORACLE, mysslport = PORT_ORACLE_SSL; +void service_oracle_sid(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_ORACLE, mysslport = PORT_ORACLE_SSL; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -110,7 +110,7 @@ void service_oracle_sid(char *ip, int sp, unsigned char options, char *miscptr, port = mysslport; } if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } /* run the cracking function */ @@ -134,7 +134,7 @@ void service_oracle_sid(char *ip, int sp, unsigned char options, char *miscptr, } } -int service_oracle_sid_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_oracle_sid_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-oracle.c b/hydra-oracle.c index 871adc8..e598401 100644 --- a/hydra-oracle.c +++ b/hydra-oracle.c @@ -40,7 +40,7 @@ void print_oracle_error(char *err) { } } -int start_oracle(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_oracle(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *login, *pass, buffer[200], sid[100]; @@ -132,9 +132,9 @@ int start_oracle(int s, char *ip, int port, unsigned char options, char *miscptr return 1; } -void service_oracle(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_ORACLE; +void service_oracle(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_ORACLE; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -158,7 +158,7 @@ void service_oracle(char *ip, int sp, unsigned char options, char *miscptr, FILE if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } next_run = 2; @@ -183,7 +183,7 @@ void service_oracle(char *ip, int sp, unsigned char options, char *miscptr, FILE #endif -int service_oracle_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_oracle_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-pcanywhere.c b/hydra-pcanywhere.c index 2161e1a..483e6fd 100644 --- a/hydra-pcanywhere.c +++ b/hydra-pcanywhere.c @@ -8,9 +8,9 @@ extern char *HYDRA_EXIT; -int pcadebug = 0; +int32_t pcadebug = 0; -int send_cstring(int s, char *crypted_string) { +int32_t send_cstring(int32_t s, char *crypted_string) { char buffer2[100], *bptr = buffer2; char clientcryptheader[] = "\x06"; @@ -25,8 +25,8 @@ int send_cstring(int s, char *crypted_string) { return hydra_send(s, buffer2, 2 + strlen(crypted_string), 0); } -void show_buffer(char *buffer, int size) { - int i; +void show_buffer(char *buffer, int32_t size) { + int32_t i; printf("size: %d, buffer:\n", size); for (i = 0; i < size; i++) { @@ -35,11 +35,11 @@ void show_buffer(char *buffer, int size) { printf("\n"); } -void clean_buffer(char *buf, int size) { - int i; +void clean_buffer(char *buf, int32_t size) { + int32_t i; for (i = 0; i < size; i++) { - int pos = buf[i]; + int32_t pos = buf[i]; if (pos < 32 || pos > 126) { // . char @@ -49,7 +49,7 @@ void clean_buffer(char *buf, int size) { } void print_encrypted_str(char *str) { - int i; + int32_t i; printf("encode string: "); for (i = 0; i < strlen(str); i++) { @@ -60,7 +60,7 @@ void print_encrypted_str(char *str) { void pca_encrypt(char *cleartxt) { char passwd[128]; - int i; + int32_t i; strncpy(passwd, cleartxt, sizeof(passwd) - 1); passwd[sizeof(passwd) - 1] = 0; @@ -76,7 +76,7 @@ void pca_encrypt(char *cleartxt) { void pca_decrypt(char *password) { char cleartext[128]; - int i; + int32_t i; if (strlen(password) > 0) { cleartext[0] = password[0] ^ 0xab; @@ -92,17 +92,17 @@ void debugprintf(char *msg) { printf("debug: %s\n", msg); } -int start_pcanywhere(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_pcanywhere(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *login, *pass; char buffer[2048] = ""; char clogin[128] = ""; char cpass[128] = ""; - int ret, i; + int32_t ret, i; char *client[4]; char *server[5]; - int clientsize[4]; + int32_t clientsize[4]; client[0] = "\x00\x00\x00\x00"; clientsize[0] = 4; @@ -224,9 +224,9 @@ int start_pcanywhere(int s, char *ip, int port, unsigned char options, char *mis return 1; } -void service_pcanywhere(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_PCANYWHERE, mysslport = PORT_PCANYWHERE_SSL; +void service_pcanywhere(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_PCANYWHERE, mysslport = PORT_PCANYWHERE_SSL; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -251,7 +251,7 @@ void service_pcanywhere(char *ip, int sp, unsigned char options, char *miscptr, port = mysslport; } if (sock < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } @@ -278,7 +278,7 @@ void service_pcanywhere(char *ip, int sp, unsigned char options, char *miscptr, } } -int service_pcanywhere_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_pcanywhere_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-pcnfs.c b/hydra-pcnfs.c index 2707638..fed02dd 100644 --- a/hydra-pcnfs.c +++ b/hydra-pcnfs.c @@ -33,7 +33,7 @@ struct pr_auth_args { /* Lets start ... */ -int start_pcnfs(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_pcnfs(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *login, *pass, buffer[LEN_HDR_RPC + LEN_AUTH_UNIX + LEN_HDR_PCN_AUTH]; char *ptr, *pkt = buffer; @@ -136,8 +136,8 @@ int start_pcnfs(int s, char *ip, int port, unsigned char options, char *miscptr, return 1; } -void service_pcnfs(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; +void service_pcnfs(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; hydra_register_socket(sp); if (port == 0) { @@ -161,7 +161,7 @@ void service_pcnfs(char *ip, int sp, unsigned char options, char *miscptr, FILE sock = hydra_disconnect(sock); // usleepn(275); if ((sock = hydra_connect_udp(ip, port)) < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } next_run = 2; @@ -183,7 +183,7 @@ void service_pcnfs(char *ip, int sp, unsigned char options, char *miscptr, FILE } } -int service_pcnfs_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_pcnfs_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-pop3.c b/hydra-pop3.c index 1ae675b..38897d0 100644 --- a/hydra-pop3.c +++ b/hydra-pop3.c @@ -6,9 +6,9 @@ typedef struct pool_str { char ip[36]; - /* int port;*/// not needed - int pop3_auth_mechanism; - int disable_tls; + /* int32_t port;*/// not needed + int32_t pop3_auth_mechanism; + int32_t disable_tls; struct pool_str *next; } pool; @@ -18,7 +18,7 @@ char apop_challenge[300] = ""; pool *plist = NULL, *p = NULL; /* functions */ -int service_pop3_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); +int32_t service_pop3_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); pool *list_create(pool data) { pool *p; @@ -59,9 +59,9 @@ pool *list_find(char *ip) { /* how to know when to release the mem ? -> well, after _start has determined which pool number it is */ -int list_remove(pool * node) { +int32_t list_remove(pool * node) { pool *save, *list = plist; - int ok = -1; + int32_t ok = -1; if (list == NULL || node == NULL) return -2; @@ -78,9 +78,9 @@ int list_remove(pool * node) { return ok; } -char *pop3_read_server_capacity(int sock) { +char *pop3_read_server_capacity(int32_t sock) { char *ptr = NULL; - int resp = 0; + int32_t resp = 0; char *buf = NULL; do { @@ -117,7 +117,7 @@ STLS return buf; } -int start_pop3(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_pop3(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = "\"\""; char *login, *pass, buffer[500], buffer2[500], *fooptr; @@ -137,7 +137,7 @@ int start_pop3(int s, char *ip, int port, unsigned char options, char *miscptr, case AUTH_APOP:{ MD5_CTX c; unsigned char md5_raw[MD5_DIGEST_LENGTH]; - int i; + int32_t i; char *pbuffer = buffer2; MD5_Init(&c); @@ -216,7 +216,7 @@ int start_pop3(int s, char *ip, int port, unsigned char options, char *miscptr, case AUTH_CRAMMD5: case AUTH_CRAMSHA1: case AUTH_CRAMSHA256:{ - int rc = 0; + int32_t rc = 0; char *preplogin; rc = sasl_saslprep(login, SASL_ALLOW_UNASSIGNED, &preplogin); @@ -413,8 +413,8 @@ int start_pop3(int s, char *ip, int port, unsigned char options, char *miscptr, return 2; } -void service_pop3(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; +void service_pop3(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; char *ptr = NULL; //extract data from the pool, ip is the key @@ -448,7 +448,7 @@ void service_pop3(char *ip, int sp, unsigned char options, char *miscptr, FILE * } if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } buf = hydra_receive_line(sock); @@ -513,10 +513,10 @@ void service_pop3(char *ip, int sp, unsigned char options, char *miscptr, FILE * } -int service_pop3_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int myport = PORT_POP3, mysslport = PORT_POP3_SSL; +int32_t service_pop3_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t myport = PORT_POP3, mysslport = PORT_POP3_SSL; char *ptr = NULL; - int sock = -1; + int32_t sock = -1; char *capa_str = "CAPA\r\n"; char *quit_str = "QUIT\r\n"; pool p; @@ -536,7 +536,7 @@ int service_pop3_init(char *ip, int sp, unsigned char options, char *miscptr, FI } if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] pid %d terminating, can not connect\n", (int32_t) getpid()); return -1; } buf = hydra_receive_line(sock); @@ -571,10 +571,10 @@ int service_pop3_init(char *ip, int sp, unsigned char options, char *miscptr, FI } if ((miscptr != NULL) && (strlen(miscptr) > 0)) { - int i; + int32_t i; for (i = 0; i < strlen(miscptr); i++) - miscptr[i] = (char) toupper((int) miscptr[i]); + miscptr[i] = (char) toupper((int32_t) miscptr[i]); if (strstr(miscptr, "TLS") || strstr(miscptr, "SSL") || strstr(miscptr, "STARTTLS")) { p.disable_tls = 0; diff --git a/hydra-postgres.c b/hydra-postgres.c index 056e23b..d27a78b 100644 --- a/hydra-postgres.c +++ b/hydra-postgres.c @@ -21,7 +21,7 @@ void dummy_postgres() { extern char *HYDRA_EXIT; -int start_postgres(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_postgres(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *login, *pass; char database[256]; @@ -66,9 +66,9 @@ int start_postgres(int s, char *ip, int port, unsigned char options, char *miscp return 1; } -void service_postgres(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_POSTGRES, mysslport = PORT_POSTGRES_SSL; +void service_postgres(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_POSTGRES, mysslport = PORT_POSTGRES_SSL; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -93,7 +93,7 @@ void service_postgres(char *ip, int sp, unsigned char options, char *miscptr, FI port = mysslport; } if (sock < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } next_run = 2; @@ -119,7 +119,7 @@ void service_postgres(char *ip, int sp, unsigned char options, char *miscptr, FI #endif -int service_postgres_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_postgres_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-rdp.c b/hydra-rdp.c index bd5b0e0..f8cf084 100644 --- a/hydra-rdp.c +++ b/hydra-rdp.c @@ -51,8 +51,8 @@ BOOL g_bitmap_cache = True; BOOL g_bitmap_cache_persist_enable = False; BOOL g_bitmap_compression = True; BOOL g_desktop_save = True; -int g_server_depth = -1; -int os_version = 0; //2000 +int32_t g_server_depth = -1; +int32_t os_version = 0; //2000 uint32 g_rdp5_performanceflags = RDP5_NO_WALLPAPER | RDP5_NO_FULLWINDOWDRAG | RDP5_NO_MENUANIMATIONS; @@ -73,7 +73,7 @@ uint8 g_client_random[SEC_RANDOM_SIZE]; #define LOGIN_UNKN 0 #define LOGIN_SUCC 1 #define LOGIN_FAIL 2 -int login_result = LOGIN_UNKN; +int32_t login_result = LOGIN_UNKN; uint8 *g_next_packet; uint32 g_rdp_shareid; @@ -102,15 +102,15 @@ static RDP_ORDER_STATE g_order_state; #define STREAM_COUNT 1 -int g_sock; +int32_t g_sock; static struct stream g_in; static struct stream g_out[STREAM_COUNT]; /* wait till socket is ready to write or timeout */ -static BOOL tcp_can_send(int sck, int millis) { +static BOOL tcp_can_send(int32_t sck, int32_t millis) { fd_set wfds; struct timeval time; - int sel_count; + int32_t sel_count; time.tv_sec = millis / 1000; time.tv_usec = (millis * 1000) % 1000000; @@ -125,7 +125,7 @@ static BOOL tcp_can_send(int sck, int millis) { /* Initialise TCP transport data packet */ STREAM tcp_init(uint32 maxlen) { - static int cur_stream_id = 0; + static int32_t cur_stream_id = 0; STREAM result = NULL; result = &g_out[cur_stream_id]; @@ -144,8 +144,8 @@ STREAM tcp_init(uint32 maxlen) { /* Send TCP transport data packet */ void tcp_send(STREAM s) { - int length = s->end - s->data; - int sent, total = 0; + int32_t length = s->end - s->data; + int32_t sent, total = 0; while (total < length) { @@ -167,7 +167,7 @@ void tcp_send(STREAM s) { /* Receive a message on the TCP layer */ STREAM tcp_recv(STREAM s, uint32 length) { uint32 new_length, end_offset, p_offset; - int rcvd = 0; + int32_t rcvd = 0; if (s == NULL) { /* read into "new" stream */ @@ -227,7 +227,7 @@ char *tcp_get_address() { /* reset the state of the tcp layer */ void tcp_reset_state(void) { - int i; + int32_t i; g_sock = -1; /* reset socket */ @@ -263,8 +263,8 @@ void tcp_reset_state(void) { uint16 g_mcs_userid; /* Parse an ASN.1 BER header */ -static BOOL ber_parse_header(STREAM s, int tagval, int *length) { - int tag, len; +static BOOL ber_parse_header(STREAM s, int32_t tagval, int32_t *length) { + int32_t tag, len; if (tagval > 0xff) { @@ -292,7 +292,7 @@ static BOOL ber_parse_header(STREAM s, int tagval, int *length) { } /* Output an ASN.1 BER header */ -static void ber_out_header(STREAM s, int tagval, int length) { +static void ber_out_header(STREAM s, int32_t tagval, int32_t length) { if (tagval > 0xff) { @@ -309,13 +309,13 @@ static void ber_out_header(STREAM s, int tagval, int length) { } /* Output an ASN.1 BER integer */ -static void ber_out_integer(STREAM s, int value) { +static void ber_out_integer(STREAM s, int32_t value) { ber_out_header(s, BER_TAG_INTEGER, 2); out_uint16_be(s, value); } /* Output a DOMAIN_PARAMS structure (ASN.1 BER) */ -static void mcs_out_domain_params(STREAM s, int max_channels, int max_users, int max_tokens, int max_pdusize) { +static void mcs_out_domain_params(STREAM s, int32_t max_channels, int32_t max_users, int32_t max_tokens, int32_t max_pdusize) { ber_out_header(s, MCS_TAG_DOMAIN_PARAMS, 32); ber_out_integer(s, max_channels); ber_out_integer(s, max_users); @@ -329,7 +329,7 @@ static void mcs_out_domain_params(STREAM s, int max_channels, int max_users, int /* Parse a DOMAIN_PARAMS structure (ASN.1 BER) */ static BOOL mcs_parse_domain_params(STREAM s) { - int length = 0; + int32_t length = 0; ber_parse_header(s, MCS_TAG_DOMAIN_PARAMS, &length); in_uint8s(s, length); @@ -339,8 +339,8 @@ static BOOL mcs_parse_domain_params(STREAM s) { /* Send an MCS_CONNECT_INITIAL message (ASN.1 BER) */ static void mcs_send_connect_initial(STREAM mcs_data) { - int datalen = mcs_data->end - mcs_data->data; - int length = 9 + 3 * 34 + 4 + datalen; + int32_t datalen = mcs_data->end - mcs_data->data; + int32_t length = 9 + 3 * 34 + 4 + datalen; STREAM s; s = iso_init(length + 5); @@ -368,7 +368,7 @@ static void mcs_send_connect_initial(STREAM mcs_data) { /* Expect a MCS_CONNECT_RESPONSE message (ASN.1 BER) */ static BOOL mcs_recv_connect_response(STREAM mcs_data) { uint8 result; - int length = 0; + int32_t length = 0; STREAM s; s = iso_recv(NULL); @@ -504,7 +504,7 @@ static BOOL mcs_recv_cjcf(void) { } /* Initialise an MCS transport data packet */ -STREAM mcs_init(int length) { +STREAM mcs_init(int32_t length) { STREAM s; s = iso_init(length + 8); @@ -618,7 +618,7 @@ static void iso_send_msg(uint8 code) { static void iso_send_connection_request(char *username) { STREAM s; - int length = 30 + strlen(username); + int32_t length = 30 + strlen(username); s = tcp_init(length); @@ -717,7 +717,7 @@ static STREAM iso_recv_msg(uint8 * code, uint8 * rdpver) { } /* Initialise ISO transport data packet */ -STREAM iso_init(int length) { +STREAM iso_init(int32_t length) { STREAM s; s = tcp_init(length + 7); @@ -794,7 +794,7 @@ void iso_reset_state(void) { tcp_reset_state(); } -static int g_rc4_key_len; +static int32_t g_rc4_key_len; static SSL_RC4 g_rc4_decrypt_key; static SSL_RC4 g_rc4_encrypt_key; static uint32 g_server_public_key_len; @@ -809,8 +809,8 @@ static uint8 g_sec_crypted_random[SEC_MAX_MODULUS_SIZE]; uint16 g_server_rdp_version = 0; /* These values must be available to reset state - Session Directory */ -static int g_sec_encrypt_use_count = 0; -static int g_sec_decrypt_use_count = 0; +static int32_t g_sec_encrypt_use_count = 0; +static int32_t g_sec_decrypt_use_count = 0; void ssl_sha1_init(SSL_SHA1 * sha1) { @@ -845,8 +845,8 @@ void ssl_rc4_crypt(SSL_RC4 * rc4, uint8 * in_data, uint8 * out_data, uint32 len) RC4(rc4, len, in_data, out_data); } -static void reverse(uint8 * p, int len) { - int i, j; +static void reverse(uint8 * p, int32_t len) { + int32_t i, j; uint8 temp; for (i = 0, j = len - 1; i < j; i++, j--) { @@ -856,11 +856,11 @@ static void reverse(uint8 * p, int len) { } } -void ssl_rsa_encrypt(uint8 * out, uint8 * in, int len, uint32 modulus_size, uint8 * modulus, uint8 * exponent) { +void ssl_rsa_encrypt(uint8 * out, uint8 * in, int32_t len, uint32 modulus_size, uint8 * modulus, uint8 * exponent) { BN_CTX *ctx; BIGNUM *mod, *exp, *x, *y; uint8 inr[SEC_MAX_MODULUS_SIZE]; - int outlen; + int32_t outlen; reverse(modulus, modulus_size); reverse(exponent, SEC_EXPONENT_SIZE); @@ -879,7 +879,7 @@ void ssl_rsa_encrypt(uint8 * out, uint8 * in, int len, uint32 modulus_size, uint BN_mod_exp(y, x, exp, mod, ctx); outlen = BN_bn2bin(y, out); reverse(out, outlen); - if (outlen < (int) modulus_size) + if (outlen < (int32_t) modulus_size) memset(out + outlen, 0, modulus_size - outlen); BN_free(y); @@ -903,7 +903,7 @@ static void ssl_cert_free(X509 * cert) { SSL_RKEY *ssl_cert_to_rkey(X509 * cert, uint32 * key_len) { EVP_PKEY *epk = NULL; SSL_RKEY *lkey; - int nid; + int32_t nid; /* By some reason, Microsoft sets the OID of the Public RSA key to the oid for "MD5 with RSA Encryption" instead of "RSA Encryption" @@ -942,7 +942,7 @@ SSL_RKEY *ssl_cert_to_rkey(X509 * cert, uint32 * key_len) { return lkey; } -int ssl_cert_print_fp(FILE * fp, X509 * cert) { +int32_t ssl_cert_print_fp(FILE * fp, X509 * cert) { return X509_print_fp(fp, cert); } @@ -951,8 +951,8 @@ void ssl_rkey_free(SSL_RKEY * rkey) { } /* returns error */ -int ssl_rkey_get_exp_mod(SSL_RKEY * rkey, uint8 * exponent, uint32 max_exp_len, uint8 * modulus, uint32 max_mod_len) { - int len; +int32_t ssl_rkey_get_exp_mod(SSL_RKEY * rkey, uint8 * exponent, uint32 max_exp_len, uint8 * modulus, uint32 max_mod_len) { + int32_t len; #if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) BIGNUM *n, *e, *d; @@ -960,7 +960,7 @@ int ssl_rkey_get_exp_mod(SSL_RKEY * rkey, uint8 * exponent, uint32 max_exp_len, n = BN_new(); e = BN_new(); RSA_get0_key(rkey, &n, &e, NULL); - if ((BN_num_bytes(e) > (int) max_exp_len) || (BN_num_bytes(n) > (int) max_mod_len)) { + if ((BN_num_bytes(e) > (int32_t) max_exp_len) || (BN_num_bytes(n) > (int32_t) max_mod_len)) { return 1; } len = BN_bn2bin(e, exponent); @@ -970,7 +970,7 @@ int ssl_rkey_get_exp_mod(SSL_RKEY * rkey, uint8 * exponent, uint32 max_exp_len, BN_free(n); BN_free(e); #else - if ((BN_num_bytes(rkey->e) > (int) max_exp_len) || (BN_num_bytes(rkey->n) > (int) max_mod_len)) + if ((BN_num_bytes(rkey->e) > (int32_t) max_exp_len) || (BN_num_bytes(rkey->n) > (int32_t) max_mod_len)) return 1; len = BN_bn2bin(rkey->e, exponent); reverse(exponent, len); @@ -986,7 +986,7 @@ BOOL ssl_sig_ok(uint8 * exponent, uint32 exp_len, uint8 * modulus, uint32 mod_le } -void ssl_hmac_md5(const void *key, int key_len, const unsigned char *msg, int msg_len, unsigned char *md) { +void ssl_hmac_md5(const void *key, int32_t key_len, const unsigned char *msg, int32_t msg_len, unsigned char *md) { #if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) HMAC_CTX *ctx; ctx = HMAC_CTX_new(); @@ -1020,7 +1020,7 @@ void sec_hash_48(uint8 * out, uint8 * in, uint8 * salt1, uint8 * salt2, uint8 sa uint8 pad[4]; SSL_SHA1 sha1; SSL_MD5 md5; - int i; + int32_t i; for (i = 0; i < 3; i++) { memset(pad, salt + i, i + 1); @@ -1060,7 +1060,7 @@ static void sec_make_40bit(uint8 * key) { } /* Generate encryption keys given client and server randoms */ -static void sec_generate_keys(uint8 * client_random, uint8 * server_random, int rc4_key_size) { +static void sec_generate_keys(uint8 * client_random, uint8 * server_random, int32_t rc4_key_size) { uint8 pre_master_secret[48]; uint8 master_secret[48]; uint8 key_block[48]; @@ -1123,7 +1123,7 @@ void buf_out_uint32(uint8 * buffer, uint32 value) { } /* Generate a MAC hash (5.2.3.1), using a combination of SHA1 and MD5 */ -void sec_sign(uint8 * signature, int siglen, uint8 * session_key, int keylen, uint8 * data, int datalen) { +void sec_sign(uint8 * signature, int32_t siglen, uint8 * session_key, int32_t keylen, uint8 * data, int32_t datalen) { uint8 shasig[20]; uint8 md5sig[16]; uint8 lenhdr[4]; @@ -1175,7 +1175,7 @@ static void sec_update(uint8 * key, uint8 * update_key) { } /* Encrypt data using RC4 */ -static void sec_encrypt(uint8 * data, int length) { +static void sec_encrypt(uint8 * data, int32_t length) { if (g_sec_encrypt_use_count == 4096) { sec_update(g_sec_encrypt_key, g_sec_encrypt_update_key); ssl_rc4_set_key(&g_rc4_encrypt_key, g_sec_encrypt_key, g_rc4_key_len); @@ -1187,7 +1187,7 @@ static void sec_encrypt(uint8 * data, int length) { } /* Decrypt data using RC4 */ -void sec_decrypt(uint8 * data, int length) { +void sec_decrypt(uint8 * data, int32_t length) { if (g_sec_decrypt_use_count == 4096) { sec_update(g_sec_decrypt_key, g_sec_decrypt_update_key); ssl_rc4_set_key(&g_rc4_decrypt_key, g_sec_decrypt_key, g_rc4_key_len); @@ -1199,13 +1199,13 @@ void sec_decrypt(uint8 * data, int length) { } /* Perform an RSA public key encryption operation */ -static void sec_rsa_encrypt(uint8 * out, uint8 * in, int len, uint32 modulus_size, uint8 * modulus, uint8 * exponent) { +static void sec_rsa_encrypt(uint8 * out, uint8 * in, int32_t len, uint32 modulus_size, uint8 * modulus, uint8 * exponent) { ssl_rsa_encrypt(out, in, len, modulus_size, modulus, exponent); } /* Initialise secure transport packet */ -STREAM sec_init(uint32 flags, int maxlen) { - int hdrlen; +STREAM sec_init(uint32 flags, int32_t maxlen) { + int32_t hdrlen; STREAM s; // if (!g_licence_issued) @@ -1221,7 +1221,7 @@ STREAM sec_init(uint32 flags, int maxlen) { /* Transmit secure transport packet over specified channel */ void sec_send_to_channel(STREAM s, uint32 flags, uint16 channel) { - int datalen; + int32_t datalen; s_pop_layer(s, sec_hdr); out_uint32_le(s, flags); @@ -1261,8 +1261,8 @@ static void sec_establish_key(void) { } /* Output a string in Unicode */ -void rdp_out_unistr(STREAM s, char *string, int len) { - int i = 0, j = 0; +void rdp_out_unistr(STREAM s, char *string, int32_t len) { + int32_t i = 0, j = 0; len += 2; while (i < len) { @@ -1275,8 +1275,8 @@ void rdp_out_unistr(STREAM s, char *string, int len) { /* Output connect initial data blob */ static void sec_out_mcs_data(STREAM s) { char *g_hostname = "hydra"; - int hostlen = 2 * strlen(g_hostname); - int length = 158 + 76 + 12 + 4; + int32_t hostlen = 2 * strlen(g_hostname); + int32_t length = 158 + 76 + 12 + 4; /* if (g_num_channels > 0) @@ -1720,9 +1720,9 @@ void sec_reset_state(void) { /* Read field indicating which parameters are present */ -static void rdp_in_present(STREAM s, uint32 * present, uint8 flags, int size) { +static void rdp_in_present(STREAM s, uint32 * present, uint8 flags, int32_t size) { uint8 bits; - int i; + int32_t i; if (flags & RDP_ORDER_SMALL) { size--; @@ -1831,7 +1831,7 @@ static void process_rect(STREAM s, RECT_ORDER * os, uint32 present, BOOL delta) /* Process a desktop save order */ static void process_desksave(STREAM s, DESKSAVE_ORDER * os, uint32 present, BOOL delta) { - int width, height; + int32_t width, height; if (present & 0x01) in_uint32_le(s, os->offset); @@ -1902,7 +1902,7 @@ static void process_memblt(STREAM s, MEMBLT_ORDER * os, uint32 present, BOOL del /* Process a text order */ static void process_text2(STREAM s, TEXT2_ORDER * os, uint32 present, BOOL delta) { - int i; + int32_t i; if (present & 0x000001) in_uint8(s, os->font); @@ -2047,7 +2047,7 @@ void process_orders(STREAM s, uint16 num_orders) { RDP_ORDER_STATE *os = &g_order_state; uint32 present; uint8 order_flags; - int size, processed = 0; + int32_t size, processed = 0; BOOL delta; while (processed < num_orders) { @@ -2256,7 +2256,7 @@ BOOL rdp_loop(BOOL * deactivated, uint32 * ext_disc_reason) { } /* Process incoming packets */ -int rdp_main_loop(BOOL * deactivated, uint32 * ext_disc_reason) { +int32_t rdp_main_loop(BOOL * deactivated, uint32 * ext_disc_reason) { while (rdp_loop(deactivated, ext_disc_reason)) { if (login_result != LOGIN_UNKN) { return login_result; @@ -2270,14 +2270,14 @@ int rdp_main_loop(BOOL * deactivated, uint32 * ext_disc_reason) { /* Parse a logon info packet */ static void rdp_send_logon_info(uint32 flags, char *domain, char *user, char *password, char *program, char *directory) { char *ipaddr = tcp_get_address(); - int len_domain = 2 * strlen(domain); - int len_user = 2 * strlen(user); - int len_password = 2 * strlen(password); - int len_program = 2 * strlen(program); - int len_directory = 2 * strlen(directory); - int len_ip = 2 * strlen(ipaddr); - int len_dll = 2 * strlen("C:\\WINNT\\System32\\mstscax.dll"); - int packetlen = 0; + int32_t len_domain = 2 * strlen(domain); + int32_t len_user = 2 * strlen(user); + int32_t len_password = 2 * strlen(password); + int32_t len_program = 2 * strlen(program); + int32_t len_directory = 2 * strlen(directory); + int32_t len_ip = 2 * strlen(ipaddr); + int32_t len_dll = 2 * strlen("C:\\WINNT\\System32\\mstscax.dll"); + int32_t packetlen = 0; uint32 sec_flags = g_encryption ? (SEC_LOGON_INFO | SEC_ENCRYPT) : SEC_LOGON_INFO; STREAM s = NULL; time_t t = time(NULL); @@ -2430,7 +2430,7 @@ BOOL rdp_connect(char *server, uint32 flags, char *domain, char *login, char *pa return True; } -int start_rdp(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_rdp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *login, *pass; char server[64]; @@ -2484,9 +2484,9 @@ int start_rdp(int s, char *ip, int port, unsigned char options, char *miscptr, F } /* Client program */ -void service_rdp(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1; - int myport = PORT_RDP; +void service_rdp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1; + int32_t myport = PORT_RDP; if (port != 0) myport = port; @@ -2502,7 +2502,7 @@ void service_rdp(char *ip, int sp, unsigned char options, char *miscptr, FILE * rdesktop_reset_state(); g_sock = hydra_connect_tcp(ip, myport); if (g_sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } next_run = start_rdp(g_sock, ip, port, options, miscptr, fp); @@ -2529,7 +2529,7 @@ void generate_random(uint8 * random) { struct tms tmsbuf; SSL_MD5 md5; uint32 *r; - int fd, n; + int32_t fd, n; /* If we have a kernel random device, try that first */ if (((fd = open("/dev/urandom", O_RDONLY)) != -1) @@ -2559,7 +2559,7 @@ void generate_random(uint8 * random) { } /* malloc; exit if out of memory */ -void *xmalloc(int size) { +void *xmalloc(int32_t size) { void *mem = malloc(size); if (mem == NULL) { @@ -2634,9 +2634,9 @@ void unimpl(char *format, ...) { } /* produce a hex dump */ -void hexdump(unsigned char *p, unsigned int len) { +void hexdump(unsigned char *p, uint32_t len) { unsigned char *line = p; - int i, thisline, offset = 0; + int32_t i, thisline, offset = 0; while (offset < len) { printf("%04x ", offset); @@ -2660,7 +2660,7 @@ void hexdump(unsigned char *p, unsigned int len) { } /* Initialise an RDP data packet */ -static STREAM rdp_init_data(int maxlen) { +static STREAM rdp_init_data(int32_t maxlen) { STREAM s; s = sec_init(g_encryption ? SEC_ENCRYPT : 0, maxlen + 18); @@ -2695,10 +2695,10 @@ static void rdp_send_data(STREAM s, uint8 data_pdu_type) { * * Returns str_len of string */ -int rdp_in_unistr(STREAM s, char *string, int str_size, int in_len) { - int i = 0; - int len = in_len / 2; - int rem = 0; +int32_t rdp_in_unistr(STREAM s, char *string, int32_t str_size, int32_t in_len) { + int32_t i = 0; + int32_t len = in_len / 2; + int32_t rem = 0; if (len > str_size - 1) { warning("server sent an unexpectedly long string, truncating\n"); @@ -2865,7 +2865,7 @@ static void rdp_out_order_caps(STREAM s) { /* Output bitmap cache capability set */ static void rdp_out_bmpcache_caps(STREAM s) { - int Bpp; + int32_t Bpp; out_uint16_le(s, RDP_CAPSET_BMPCACHE); out_uint16_le(s, RDP_CAPLEN_BMPCACHE); @@ -3070,7 +3070,7 @@ static void rdp_process_bitmap_caps(STREAM s) { /* Process server capabilities */ static void rdp_process_server_caps(STREAM s, uint16 length) { - int n; + int32_t n; uint8 *next, *start; uint16 ncapsets, capset_type, capset_length; @@ -3234,7 +3234,7 @@ static BOOL process_data_pdu(STREAM s, uint32 * ext_disc_reason) { } #endif -int service_rdp_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_rdp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-redis.c b/hydra-redis.c index 61a08ea..76a6afb 100644 --- a/hydra-redis.c +++ b/hydra-redis.c @@ -3,7 +3,7 @@ extern char *HYDRA_EXIT; char *buf; -int start_redis(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_redis(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *pass, buffer[510]; char *empty = ""; @@ -11,7 +11,7 @@ int start_redis(int s, char *ip, int port, unsigned char options, char *miscptr, pass = empty; char pass_num[50]; - int pass_len = strlen(pass); + int32_t pass_len = strlen(pass); snprintf(pass_num, 50, "%d", pass_len); memset(buffer, 0, sizeof(buffer)); @@ -51,9 +51,9 @@ int start_redis(int s, char *ip, int port, unsigned char options, char *miscptr, return 1; } -void service_redis_core(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname, int tls) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_REDIS, mysslport = PORT_REDIS_SSL; +void service_redis_core(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname, int32_t tls) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_REDIS, mysslport = PORT_REDIS_SSL; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -77,7 +77,7 @@ void service_redis_core(char *ip, int sp, unsigned char options, char *miscptr, } if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } usleepn(250); @@ -103,7 +103,7 @@ void service_redis_core(char *ip, int sp, unsigned char options, char *miscptr, } } -void service_redis(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +void service_redis(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { service_redis_core(ip, sp, options, miscptr, fp, port, hostname, 0); } @@ -122,7 +122,7 @@ void service_redis(char *ip, int sp, unsigned char options, char *miscptr, FILE * (error) ERR operation not permitted (for older redis versions) * That is used for initial password authentication and redis server response tests in service_redis_init */ -int service_redis_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_redis_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. @@ -130,8 +130,8 @@ int service_redis_init(char *ip, int sp, unsigned char options, char *miscptr, F // 0 - when the server is redis and it requires password // 1 - when the server is not redis or when the server does not require password - int sock = -1; - int myport = PORT_REDIS, mysslport = PORT_REDIS_SSL; + int32_t sock = -1; + int32_t myport = PORT_REDIS, mysslport = PORT_REDIS_SSL; char buffer[] = "*1\r\n$4\r\nping\r\n"; hydra_register_socket(sp); diff --git a/hydra-rexec.c b/hydra-rexec.c index c71167f..5b7073a 100644 --- a/hydra-rexec.c +++ b/hydra-rexec.c @@ -7,10 +7,10 @@ extern char *HYDRA_EXIT; char *buf; -int start_rexec(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_rexec(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *login, *pass, buffer[300] = "", buffer2[100], *bptr = buffer2; - int ret; + int32_t ret; if (strlen(login = hydra_get_next_login()) == 0) login = empty; @@ -45,9 +45,9 @@ int start_rexec(int s, char *ip, int port, unsigned char options, char *miscptr, return 1; } -void service_rexec(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_REXEC, mysslport = PORT_REXEC_SSL; +void service_rexec(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_REXEC, mysslport = PORT_REXEC_SSL; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -72,7 +72,7 @@ void service_rexec(char *ip, int sp, unsigned char options, char *miscptr, FILE port = mysslport; } if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } next_run = 2; @@ -95,7 +95,7 @@ void service_rexec(char *ip, int sp, unsigned char options, char *miscptr, FILE } } -int service_rexec_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_rexec_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-rlogin.c b/hydra-rlogin.c index 2dc8ef6..b29ee5d 100644 --- a/hydra-rlogin.c +++ b/hydra-rlogin.c @@ -14,10 +14,10 @@ no memleaks found on 110425 extern char *HYDRA_EXIT; char *buf; -int start_rlogin(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_rlogin(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *login, *pass, buffer[300] = "", buffer2[100], *bptr = buffer2; - int ret; + int32_t ret; if (strlen(login = hydra_get_next_login()) == 0) login = empty; @@ -89,9 +89,9 @@ int start_rlogin(int s, char *ip, int port, unsigned char options, char *miscptr return 1; } -void service_rlogin(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_RLOGIN, mysslport = PORT_RLOGIN_SSL; +void service_rlogin(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_RLOGIN, mysslport = PORT_RLOGIN_SSL; hydra_register_socket(sp); @@ -119,7 +119,7 @@ void service_rlogin(char *ip, int sp, unsigned char options, char *miscptr, FILE port = mysslport; } if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } next_run = 2; @@ -141,7 +141,7 @@ void service_rlogin(char *ip, int sp, unsigned char options, char *miscptr, FILE } } -int service_rlogin_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_rlogin_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-rpcap.c b/hydra-rpcap.c index 8272870..2fa4956 100644 --- a/hydra-rpcap.c +++ b/hydra-rpcap.c @@ -6,7 +6,7 @@ extern char *HYDRA_EXIT; char *buf; -int start_rpcap(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_rpcap(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *login, *pass, buffer[1024]; @@ -72,9 +72,9 @@ int start_rpcap(int s, char *ip, int port, unsigned char options, char *miscptr, return 2; } -void service_rpcap(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_RPCAP, mysslport = PORT_RPCAP_SSL; +void service_rpcap(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_RPCAP, mysslport = PORT_RPCAP_SSL; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -99,7 +99,7 @@ void service_rpcap(char *ip, int sp, unsigned char options, char *miscptr, FILE if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } next_run = 2; @@ -119,14 +119,14 @@ void service_rpcap(char *ip, int sp, unsigned char options, char *miscptr, FILE } } -int service_rpcap_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_rpcap_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, performed once only. // return codes: // 0 - rpcap with authentication // 1 - rpcap error or no need of authentication - int sock = -1; - int myport = PORT_RPCAP, mysslport = PORT_RPCAP_SSL; + int32_t sock = -1; + int32_t myport = PORT_RPCAP, mysslport = PORT_RPCAP_SSL; char buffer[] = "\x00\x08\x00\x00\x00\x00\x00\x08\x00\x00\x00\x00\x00\x00\x00\x00"; hydra_register_socket(sp); diff --git a/hydra-rsh.c b/hydra-rsh.c index deeb097..90496cc 100644 --- a/hydra-rsh.c +++ b/hydra-rsh.c @@ -13,10 +13,10 @@ no memleaks found on 110425 extern char *HYDRA_EXIT; char *buf; -int start_rsh(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_rsh(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *login, buffer[300] = "", buffer2[100], *bptr = buffer2; - int ret; + int32_t ret; if (strlen(login = hydra_get_next_login()) == 0) login = empty; @@ -60,9 +60,9 @@ int start_rsh(int s, char *ip, int port, unsigned char options, char *miscptr, F return 1; } -void service_rsh(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_RSH, mysslport = PORT_RSH_SSL; +void service_rsh(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_RSH, mysslport = PORT_RSH_SSL; hydra_register_socket(sp); @@ -89,7 +89,7 @@ void service_rsh(char *ip, int sp, unsigned char options, char *miscptr, FILE * port = mysslport; } if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } next_run = 2; @@ -111,7 +111,7 @@ void service_rsh(char *ip, int sp, unsigned char options, char *miscptr, FILE * } } -int service_rsh_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_rsh_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-rtsp.c b/hydra-rtsp.c index 5b90522..41836ad 100644 --- a/hydra-rtsp.c +++ b/hydra-rtsp.c @@ -16,7 +16,7 @@ char *buf; char packet[500]; char packet2[500]; -int is_Unauthorized(char *s) { +int32_t is_Unauthorized(char *s) { if (strstr(s, "401 Unauthorized") != NULL) { return 1; @@ -25,7 +25,7 @@ int is_Unauthorized(char *s) { } } -int is_NotFound(char *s) { +int32_t is_NotFound(char *s) { if (strstr(s, "404 Stream Not Found") != NULL) { return 1; @@ -34,7 +34,7 @@ int is_NotFound(char *s) { } } -int is_Authorized(char *s) { +int32_t is_Authorized(char *s) { if (strstr(s, "200 OK") != NULL) { return 1; @@ -43,7 +43,7 @@ int is_Authorized(char *s) { } } -int use_Basic_Auth(char *s) { +int32_t use_Basic_Auth(char *s) { if (strstr(s, "WWW-Authenticate: Basic") != NULL) { return 1; @@ -52,7 +52,7 @@ int use_Basic_Auth(char *s) { } } -int use_Digest_Auth(char *s) { +int32_t use_Digest_Auth(char *s) { if (strstr(s, "WWW-Authenticate: Digest") != NULL) { return 1; @@ -63,7 +63,7 @@ int use_Digest_Auth(char *s) { -void create_core_packet(int control, char *ip, int port) { +void create_core_packet(int32_t control, char *ip, int32_t port) { char buffer[500]; char *target = hydra_address2string(ip); @@ -78,7 +78,7 @@ void create_core_packet(int control, char *ip, int port) { } } } -int start_rtsp(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_rtsp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *login, *pass, buffer[500], buffer2[500]; @@ -180,9 +180,9 @@ int start_rtsp(int s, char *ip, int port, unsigned char options, char *miscptr, return 2; } -void service_rtsp(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_RTSP, mysslport = PORT_RTSP_SSL; +void service_rtsp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_RTSP, mysslport = PORT_RTSP_SSL; char *ptr, *ptr2; hydra_register_socket(sp); @@ -206,7 +206,7 @@ void service_rtsp(char *ip, int sp, unsigned char options, char *miscptr, FILE * } if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } @@ -229,7 +229,7 @@ void service_rtsp(char *ip, int sp, unsigned char options, char *miscptr, FILE * } } -int service_rtsp_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_rtsp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-s7-300.c b/hydra-s7-300.c index 6ece2f8..31b11aa 100644 --- a/hydra-s7-300.c +++ b/hydra-s7-300.c @@ -15,13 +15,13 @@ unsigned char p_s7_read_szl[] = "\x03\x00\x00\x21\x02\xf0\x80\x32\x07\x00" "\x00 unsigned char p_s7_password_request[] = "\x03\x00\x00\x25\x02\xf0\x80\x32\x07\x00" "\x00\x00\x00\x00\x08\x00\x0c\x00\x01\x12" "\x04\x11\x45\x01\x00\xff\x09\x00\x08"; -int start_s7_300(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_s7_300(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *pass, buffer[1024]; char context[S7PASSLEN + 1]; unsigned char encoded_password[S7PASSLEN]; char *spaces = " "; - int ret = -1; + int32_t ret = -1; if (strlen(pass = hydra_get_next_password()) == 0) pass = empty; @@ -38,7 +38,7 @@ int start_s7_300(int s, char *ip, int port, unsigned char options, char *miscptr // encode password encoded_password[0] = context[0] ^ 0x55; encoded_password[1] = context[1] ^ 0x55; - int i; + int32_t i; for (i = 2; i < S7PASSLEN; i++) { encoded_password[i] = context[i] ^ encoded_password[i - 2] ^ 0x55; @@ -124,9 +124,9 @@ int start_s7_300(int s, char *ip, int port, unsigned char options, char *miscptr return 1; } -void service_s7_300(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; - int s7port = PORT_S7_300; +void service_s7_300(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t s7port = PORT_S7_300; if (port != 0) s7port = port; @@ -139,7 +139,7 @@ void service_s7_300(char *ip, int sp, unsigned char options, char *miscptr, FILE case 1: /* connect and service init function */ sock = hydra_connect_tcp(ip, s7port); if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } next_run = start_s7_300(sock, ip, s7port, options, miscptr, fp); @@ -163,7 +163,7 @@ void service_s7_300(char *ip, int sp, unsigned char options, char *miscptr, FILE } } -int service_s7_300_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_s7_300_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. @@ -175,15 +175,15 @@ int service_s7_300_init(char *ip, int sp, unsigned char options, char *miscptr, // 1 skip target without generating an error // 2 skip target because of protocol problems // 3 skip target because its unreachable - int sock = -1; - int s7port = PORT_S7_300; + int32_t sock = -1; + int32_t s7port = PORT_S7_300; char *empty = ""; char *pass, buffer[1024]; char context[S7PASSLEN + 1]; unsigned char encoded_password[S7PASSLEN]; char *spaces = " "; - int ret = -1; - int i; + int32_t ret = -1; + int32_t i; if (port != 0) s7port = port; diff --git a/hydra-sapr3.c b/hydra-sapr3.c index 0eaa54a..c3b729d 100644 --- a/hydra-sapr3.c +++ b/hydra-sapr3.c @@ -10,22 +10,22 @@ void dummy_sapr3() { #include /* temporary workaround fix */ -const int *__ctype_tolower; -const int *__ctype_toupper; -const int *__ctype_b; +const int32_t *__ctype_tolower; +const int32_t *__ctype_toupper; +const int32_t *__ctype_b; extern void flood(); /* for -lm */ extern char *HYDRA_EXIT; RFC_ERROR_INFO_EX error_info; -int start_sapr3(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_sapr3(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { RFC_HANDLE handle; char *empty = ""; char *login, *pass, buffer[1024]; char *buf; - int i; - int sysnr = port % 100; + int32_t i; + int32_t sysnr = port % 100; char opts[] = "RFCINI=N RFCTRACE=N BALANCE=N DEBUG=N TRACE=0 ABAP_DEBUG=0"; // char opts[] = "RFCINI=N RFCTRACE=Y BALANCE=N DEBUG=Y TRACE=Y ABAP_DEBUG=Y"; @@ -89,8 +89,8 @@ int start_sapr3(int s, char *ip, int port, unsigned char options, char *miscptr, return 1; } -void service_sapr3(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; +void service_sapr3(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -117,7 +117,7 @@ void service_sapr3(char *ip, int sp, unsigned char options, char *miscptr, FILE #endif -int service_sapr3_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_sapr3_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-sip.c b/hydra-sip.c index 3cf3b33..c1411fb 100644 --- a/hydra-sip.c +++ b/hydra-sip.c @@ -1,4 +1,3 @@ - /* simple sip digest auth (md5) module 2009/02/19 * written by gh0st 2005 * modified by Jean-Baptiste Aviat - should @@ -13,20 +12,27 @@ void dummy_sip() { } #else +#ifdef __sun + #include +#elif defined(__FreeBSD__) || defined(__IBMCPP__) || defined(_AIX) + #include +#else + #include +#endif #include "sasl.h" #include "hydra-mod.h" -extern int hydra_data_ready_timed(int socket, long sec, long usec); +extern int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec); char external_ip_addr[17] = ""; -char *get_iface_ip(unsigned long int ip); -int cseq; +char *get_iface_ip(uint64_t ip); +int32_t cseq; extern char *HYDRA_EXIT; #define SIP_MAX_BUF 1024 -void empty_register(char *buf, char *host, char *lhost, int port, int lport, char *user) { +void empty_register(char *buf, char *host, char *lhost, int32_t port, int32_t lport, char *user) { memset(buf, 0, SIP_MAX_BUF); snprintf(buf, SIP_MAX_BUF, "REGISTER sip:%s SIP/2.0\r\n" @@ -39,8 +45,8 @@ void empty_register(char *buf, char *host, char *lhost, int port, int lport, cha host, lhost, lport, user, host, user, host, host, cseq); } -int get_sip_code(char *buf) { - int code; +int32_t get_sip_code(char *buf) { + int32_t code; char tmpbuf[SIP_MAX_BUF], word[SIP_MAX_BUF]; if (sscanf(buf, "%s %i %s", tmpbuf, &code, word) != 3) @@ -48,9 +54,9 @@ int get_sip_code(char *buf) { return code; } -int start_sip(int s, char *ip, char *lip, int port, int lport, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_sip(int32_t s, char *ip, char *lip, int32_t port, int32_t lport, unsigned char options, char *miscptr, FILE * fp) { char *login, *pass, *host, buffer[SIP_MAX_BUF]; - int i; + int32_t i; char buf[SIP_MAX_BUF]; if (strlen(login = hydra_get_next_login()) == 0) @@ -71,8 +77,8 @@ int start_sip(int s, char *ip, char *lip, int port, int lport, unsigned char opt return 3; } - int has_sip_cred = 0; - int try = 0; + int32_t has_sip_cred = 0; + int32_t try = 0; /* We have to check many times because server may begin to send "100 Trying" * before "401 Unauthorized" */ @@ -88,7 +94,7 @@ int start_sip(int s, char *ip, char *lip, int port, int lport, unsigned char opt } if (strncmp(buf, "SIP/2.0 606", 11) == 0) { char *ptr = NULL; - int i = 0; + int32_t i = 0; // if we already tried to connect, exit if (external_ip_addr[0]) { @@ -150,8 +156,8 @@ int start_sip(int s, char *ip, char *lip, int port, int lport, unsigned char opt return 3; } try = 0; - int has_resp = 0; - int sip_code = 0; + int32_t has_resp = 0; + int32_t sip_code = 0; while (try < 2 && !has_resp) { try++; @@ -180,11 +186,11 @@ int start_sip(int s, char *ip, char *lip, int port, int lport, unsigned char opt return 1; } -void service_sip(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_SIP, mysslport = PORT_SIP_SSL; +void service_sip(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_SIP, mysslport = PORT_SIP_SSL; - char *lip = get_iface_ip((int) *(&ip[1])); + char *lip = get_iface_ip((int32_t) *(&ip[1])); hydra_register_socket(sp); @@ -197,7 +203,7 @@ void service_sip(char *ip, int sp, unsigned char options, char *miscptr, FILE * if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) run = 3; - int lport = 0; + int32_t lport = 0; while (1) { switch (run) { @@ -222,7 +228,7 @@ void service_sip(char *ip, int sp, unsigned char options, char *miscptr, FILE * if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); free(lip); hydra_child_exit(1); } @@ -250,8 +256,8 @@ void service_sip(char *ip, int sp, unsigned char options, char *miscptr, FILE * } } -char *get_iface_ip(unsigned long int ip) { - int sfd; +char *get_iface_ip(uint64_t ip) { + int32_t sfd; sfd = socket(AF_INET, SOCK_DGRAM, 0); @@ -267,7 +273,7 @@ char *get_iface_ip(unsigned long int ip) { return NULL; } struct sockaddr_in *local = malloc(sizeof(struct sockaddr_in)); - int size = sizeof(struct sockaddr_in); + int32_t size = sizeof(struct sockaddr_in); if (getsockname(sfd, (void *) local, (socklen_t *) & size)) { perror("getsockname"); @@ -293,7 +299,7 @@ char *get_iface_ip(unsigned long int ip) { #endif -int service_sip_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_sip_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-smb.c b/hydra-smb.c index 0f669f2..48f7d7e 100644 --- a/hydra-smb.c +++ b/hydra-smb.c @@ -97,8 +97,8 @@ http://technet.microsoft.com/en-us/library/cc960646.aspx #define TIME_T_MAX (~ (time_t) 0 - TIME_T_MIN) #endif -#define IVAL_NC(buf,pos) (*(unsigned int *)((char *)(buf) + (pos))) /* Non const version of above. */ -#define SIVAL(buf,pos,val) IVAL_NC(buf,pos)=((unsigned int)(val)) +#define IVAL_NC(buf,pos) (*(uint32_t *)((char *)(buf) + (pos))) /* Non const version of above. */ +#define SIVAL(buf,pos,val) IVAL_NC(buf,pos)=((uint32_t)(val)) #define TIME_FIXUP_CONSTANT_INT 11644473600LL @@ -108,15 +108,15 @@ static unsigned char challenge[8]; static unsigned char workgroup[16]; static unsigned char domain[16]; static unsigned char machine_name[16]; -int hashFlag, accntFlag, protoFlag; +int32_t hashFlag, accntFlag, protoFlag; -int smb_auth_mechanism = AUTH_NTLM; -int security_mode = ENCRYPTED; +int32_t smb_auth_mechanism = AUTH_NTLM; +int32_t security_mode = ENCRYPTED; -static size_t UTF8_UTF16LE(unsigned char *in, int insize, unsigned char *out, int outsize) +static size_t UTF8_UTF16LE(unsigned char *in, int32_t insize, unsigned char *out, int32_t outsize) { - int i=0,j=0; - unsigned long int ch; + int32_t i=0,j=0; + uint64_t ch; if (debug) { hydra_report(stderr, "[DEBUG] UTF8_UTF16LE in:\n"); hydra_dump_asciihex(in, insize); @@ -154,8 +154,8 @@ static size_t UTF8_UTF16LE(unsigned char *in, int insize, unsigned char *out, in return j; } -static unsigned char Get7Bits(unsigned char *input, int startBit) { - register unsigned int word; +static unsigned char Get7Bits(unsigned char *input, int32_t startBit) { + register uint32_t word; word = (unsigned) input[startBit / 8] << 8; word |= (unsigned) input[startBit / 8 + 1]; @@ -197,15 +197,15 @@ void DesEncrypt(unsigned char *clear, unsigned char *key, unsigned char *cipher) pass = users password challenge = the challenge recieved from the server */ -int HashLM(unsigned char **lmhash, unsigned char *pass, unsigned char *challenge) { +int32_t HashLM(unsigned char **lmhash, unsigned char *pass, unsigned char *challenge) { static unsigned char magic[] = { 0x4b, 0x47, 0x53, 0x21, 0x40, 0x23, 0x24, 0x25 }; unsigned char password[14 + 1]; unsigned char lm_hash[21]; unsigned char lm_response[24]; - int i = 0, j = 0; + int32_t i = 0, j = 0; unsigned char *p = NULL; char HexChar; - int HexValue; + int32_t HexValue; memset(password, 0, 14 + 1); memset(lm_hash, 0, 21); @@ -300,15 +300,15 @@ int HashLM(unsigned char **lmhash, unsigned char *pass, unsigned char *challenge MakeNTLM Function: Create a NTLM hash from the password */ -int MakeNTLM(unsigned char *ntlmhash, unsigned char *pass) { +int32_t MakeNTLM(unsigned char *ntlmhash, unsigned char *pass) { MD4_CTX md4Context; unsigned char hash[16]; /* MD4_SIGNATURE_SIZE = 16 */ unsigned char unicodePassword[256 * 2]; /* MAX_NT_PASSWORD = 256 */ - int i = 0, j = 0; - int mdlen; + int32_t i = 0, j = 0; + int32_t mdlen; unsigned char *p = NULL; char HexChar; - int HexValue; + int32_t HexValue; /* Use NTLM Hash instead of password */ if (hashFlag == 1) { @@ -389,14 +389,14 @@ int MakeNTLM(unsigned char *ntlmhash, unsigned char *pass) { samba-3.0.28a - libsmb/smbencrypt.c jcifs - packet capture of LMv2-only connection */ -int HashLMv2(unsigned char **LMv2hash, unsigned char *szLogin, unsigned char *szPassword) { +int32_t HashLMv2(unsigned char **LMv2hash, unsigned char *szLogin, unsigned char *szPassword) { unsigned char ntlm_hash[16]; unsigned char lmv2_response[24]; unsigned char unicodeUsername[20 * 2]; unsigned char unicodeTarget[256 * 2]; HMACMD5Context ctx; unsigned char kr_buf[16]; - int ret, i; + int32_t ret, i; unsigned char client_challenge[8] = { 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88 }; memset(ntlm_hash, 0, 16); @@ -486,14 +486,14 @@ int HashLMv2(unsigned char **LMv2hash, unsigned char *szLogin, unsigned char *sz GPO: "Network Security: LAN Manager authentication level" Setting: "Send NTLMv2 response only\refuse LM & NTLM" */ -int HashNTLMv2(unsigned char **NTLMv2hash, int *iByteCount, unsigned char *szLogin, unsigned char *szPassword) { +int32_t HashNTLMv2(unsigned char **NTLMv2hash, int32_t *iByteCount, unsigned char *szLogin, unsigned char *szPassword) { unsigned char ntlm_hash[16]; unsigned char ntlmv2_response[56 + 20 * 2 + 256 * 2]; unsigned char unicodeUsername[20 * 2]; unsigned char unicodeTarget[256 * 2]; HMACMD5Context ctx; unsigned char kr_buf[16]; - int ret, i, iTargetLen; + int32_t ret, i, iTargetLen; unsigned char client_challenge[8] = { 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88 }; /* @@ -650,8 +650,8 @@ int HashNTLMv2(unsigned char **NTLMv2hash, int *iByteCount, unsigned char *szLog pass = users password challenge = the challenge recieved from the server */ -int HashNTLM(unsigned char **ntlmhash, unsigned char *pass, unsigned char *challenge, char *miscptr) { - int ret; +int32_t HashNTLM(unsigned char **ntlmhash, unsigned char *pass, unsigned char *challenge, char *miscptr) { + int32_t ret; unsigned char hash[16]; /* MD4_SIGNATURE_SIZE = 16 */ unsigned char p21[21]; unsigned char ntlm_response[24]; @@ -677,13 +677,13 @@ int HashNTLM(unsigned char **ntlmhash, unsigned char *pass, unsigned char *chall Function: Request a new session from the server Returns: TRUE on success else FALSE. */ -int NBSSessionRequest(int s) { +int32_t NBSSessionRequest(int32_t s) { char nb_name[32]; /* netbiosname */ char nb_local[32]; /* netbios localredirector */ unsigned char rqbuf[7] = { 0x81, 0x00, 0x00, 0x44, 0x20, 0x00, 0x20 }; char *buf; unsigned char rbuf[400]; - int k; + int32_t k; /* if we are running in native mode (aka port 445) don't do netbios */ if (protoFlag == WIN2000_NATIVEMODE) @@ -726,7 +726,7 @@ int NBSSessionRequest(int s) { The challenge is retrieved from the answer No error checking is performed i.e cross your fingers.... */ -int SMBNegProt(int s) { +int32_t SMBNegProt(int32_t s) { unsigned char buf[] = { 0x00, 0x00, 0x00, 0xbe, 0xff, 0x53, 0x4d, 0x42, 0x72, 0x00, 0x00, 0x00, 0x00, 0x08, 0x01, 0xc0, @@ -778,9 +778,9 @@ int SMBNegProt(int s) { unsigned char rbuf[400]; unsigned char sess_key[2]; unsigned char userid[2] = { 0xCD, 0xEF }; - int i = 0, j = 0, k; - int iLength = 194; - int iResponseOffset = 73; + int32_t i = 0, j = 0, k; + int32_t iLength = 194; + int32_t iResponseOffset = 73; memset((char *) rbuf, 0, 400); @@ -894,18 +894,18 @@ int SMBNegProt(int s) { the server. Returns: TRUE on success else FALSE. */ -unsigned long SMBSessionSetup(int s, char *szLogin, char *szPassword, char *miscptr) { +unsigned long SMBSessionSetup(int32_t s, char *szLogin, char *szPassword, char *miscptr) { unsigned char buf[512]; unsigned char *LMv2hash = NULL; unsigned char *NTLMv2hash = NULL; unsigned char *NTLMhash = NULL; unsigned char *LMhash = NULL; // unsigned char unicodeLogin[32 * 2]; - int j; + int32_t j; char bufReceive[512]; - int nReceiveBufferSize = 0; - int ret; - int iByteCount = 0, iOffset = 0; + int32_t nReceiveBufferSize = 0; + int32_t ret; + int32_t iByteCount = 0, iOffset = 0; if (accntFlag == 0) { strcpy((char *) workgroup, "localhost"); @@ -1197,10 +1197,10 @@ unsigned long SMBSessionSetup(int s, char *szLogin, char *szPassword, char *misc return (((bufReceive[41] & 0x01) << 24) | ((bufReceive[11] & 0xFF) << 16) | ((bufReceive[10] & 0xFF) << 8) | (bufReceive[9] & 0xFF)); } -int start_smb(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_smb(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *login, *pass; - int SMBerr, SMBaction; + int32_t SMBerr, SMBaction; unsigned long SMBSessionRet; char ipaddr_str[64]; char ErrorCode[10]; @@ -1221,7 +1221,7 @@ int start_smb(int s, char *ip, int port, unsigned char options, char *miscptr, F SMBaction = ((unsigned long) SMBSessionRet & 0xFF000000) >> 24; if (verbose) - hydra_report(stderr, "[VERBOSE] SMBSessionRet: %8.8X SMBerr: %4.4X SMBaction: %2.2X\n", (unsigned int) SMBSessionRet, SMBerr, SMBaction); + hydra_report(stderr, "[VERBOSE] SMBSessionRet: %8.8X SMBerr: %4.4X SMBaction: %2.2X\n", (uint32_t) SMBSessionRet, SMBerr, SMBaction); /* some error code are available here: @@ -1303,8 +1303,8 @@ int start_smb(int s, char *ip, int port, unsigned char options, char *miscptr, F return 1; } -void service_smb(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; +void service_smb(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; //default is both (local and domain) checks and normal passwd accntFlag = 2; //BOTH @@ -1316,7 +1316,7 @@ void service_smb(char *ip, int sp, unsigned char options, char *miscptr, FILE * strupper(miscptr); if (strstr(miscptr, "OTHER_DOMAIN:") != NULL) { char *tmpdom; - int err = 0; + int32_t err = 0; accntFlag = 4; //OTHER DOMAIN tmpdom = strstr(miscptr, "OTHER_DOMAIN:"); @@ -1401,7 +1401,7 @@ void service_smb(char *ip, int sp, unsigned char options, char *miscptr, FILE * } } if (sock < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } if (NBSSessionRequest(sock) < 0) { @@ -1427,7 +1427,7 @@ void service_smb(char *ip, int sp, unsigned char options, char *miscptr, FILE * } #endif -int service_smb_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_smb_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-smtp-enum.c b/hydra-smtp-enum.c index 2e8e93b..c7dccf2 100644 --- a/hydra-smtp-enum.c +++ b/hydra-smtp-enum.c @@ -16,15 +16,15 @@ passwd will be used as the domain name extern char *HYDRA_EXIT; char *buf; char *err = NULL; -int tosent = 0; +int32_t tosent = 0; #define VRFY 0 #define EXPN 1 #define RCPT 2 -int smtp_enum_cmd = VRFY; +int32_t smtp_enum_cmd = VRFY; -int start_smtp_enum(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_smtp_enum(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *login, *pass, buffer[500]; @@ -150,9 +150,9 @@ int start_smtp_enum(int s, char *ip, int port, unsigned char options, char *misc return 2; } -void service_smtp_enum(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1, i = 0; - int myport = PORT_SMTP, mysslport = PORT_SMTP_SSL; +void service_smtp_enum(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1, i = 0; + int32_t myport = PORT_SMTP, mysslport = PORT_SMTP_SSL; char *buffer = "HELO hydra\r\n"; hydra_register_socket(sp); @@ -175,7 +175,7 @@ void service_smtp_enum(char *ip, int sp, unsigned char options, char *miscptr, F port = mysslport; } if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } /* receive initial header */ @@ -207,7 +207,7 @@ void service_smtp_enum(char *ip, int sp, unsigned char options, char *miscptr, F if ((miscptr != NULL) && (strlen(miscptr) > 0)) { for (i = 0; i < strlen(miscptr); i++) - miscptr[i] = (char) toupper((int) miscptr[i]); + miscptr[i] = (char) toupper((int32_t) miscptr[i]); if (strncmp(miscptr, "EXPN", 4) == 0) smtp_enum_cmd = EXPN; @@ -249,7 +249,7 @@ void service_smtp_enum(char *ip, int sp, unsigned char options, char *miscptr, F } } -int service_smtp_enum_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_smtp_enum_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-smtp.c b/hydra-smtp.c index 721671b..17df421 100644 --- a/hydra-smtp.c +++ b/hydra-smtp.c @@ -2,11 +2,11 @@ #include "sasl.h" extern char *HYDRA_EXIT; -int smtp_auth_mechanism = AUTH_LOGIN; +int32_t smtp_auth_mechanism = AUTH_LOGIN; -char *smtp_read_server_capacity(int sock) { +char *smtp_read_server_capacity(int32_t sock) { char *ptr = NULL; - int resp = 0; + int32_t resp = 0; char *buf = NULL; do { @@ -14,7 +14,7 @@ char *smtp_read_server_capacity(int sock) { free(buf); ptr = buf = hydra_receive_line(sock); if (buf != NULL) { - if (isdigit((int) buf[0]) && buf[3] == ' ') + if (isdigit((int32_t) buf[0]) && buf[3] == ' ') resp = 1; else { if (buf[strlen(buf) - 1] == '\n') @@ -27,7 +27,7 @@ char *smtp_read_server_capacity(int sock) { if ((ptr = strrchr(buf, '\n')) != NULL) { #endif ptr++; - if (isdigit((int) *ptr) && *(ptr + 3) == ' ') + if (isdigit((int32_t) *ptr) && *(ptr + 3) == ' ') resp = 1; } } @@ -36,7 +36,7 @@ char *smtp_read_server_capacity(int sock) { return buf; } -int start_smtp(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_smtp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *login, *pass, buffer[500], buffer2[500], *fooptr, *buf; @@ -78,7 +78,7 @@ int start_smtp(int s, char *ip, int port, unsigned char options, char *miscptr, #ifdef LIBOPENSSL case AUTH_CRAMMD5:{ - int rc = 0; + int32_t rc = 0; char *preplogin; rc = sasl_saslprep(login, SASL_ALLOW_UNASSIGNED, &preplogin); @@ -254,9 +254,9 @@ int start_smtp(int s, char *ip, int port, unsigned char options, char *miscptr, return 2; } -void service_smtp(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1, i = 0; - int myport = PORT_SMTP, mysslport = PORT_SMTP_SSL, disable_tls = 1; +void service_smtp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1, i = 0; + int32_t myport = PORT_SMTP, mysslport = PORT_SMTP_SSL, disable_tls = 1; char *buf; char *buffer1 = "EHLO hydra\r\n"; char *buffer2 = "HELO hydra\r\n"; @@ -282,7 +282,7 @@ void service_smtp(char *ip, int sp, unsigned char options, char *miscptr, FILE * } if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } @@ -310,7 +310,7 @@ void service_smtp(char *ip, int sp, unsigned char options, char *miscptr, FILE * if ((miscptr != NULL) && (strlen(miscptr) > 0)) { for (i = 0; i < strlen(miscptr); i++) - miscptr[i] = (char) toupper((int) miscptr[i]); + miscptr[i] = (char) toupper((int32_t) miscptr[i]); if (strstr(miscptr, "TLS") || strstr(miscptr, "SSL") || strstr(miscptr, "STARTTLS")) { disable_tls = 0; @@ -443,7 +443,7 @@ void service_smtp(char *ip, int sp, unsigned char options, char *miscptr, FILE * } } -int service_smtp_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_smtp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-snmp.c b/hydra-snmp.c index 1af2d3d..0579ddb 100644 --- a/hydra-snmp.c +++ b/hydra-snmp.c @@ -7,13 +7,13 @@ #include #endif -extern int hydra_data_ready_timed(int socket, long sec, long usec); +extern int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec); extern char *HYDRA_EXIT; -extern int child_head_no; +extern int32_t child_head_no; char snmpv3buf[1024], *snmpv3info = NULL; -int snmpv3infolen = 0, snmpversion = 1, snmpread = 1, hashtype = 1, enctype = 0; +int32_t snmpv3infolen = 0, snmpversion = 1, snmpread = 1, hashtype = 1, enctype = 0; unsigned char snmpv3_init[] = { 0x30, 0x3e, 0x02, 0x01, 0x03, 0x30, 0x11, 0x02, 0x04, 0x08, 0x86, 0xdd, 0xf0, 0x02, 0x03, 0x00, @@ -196,11 +196,11 @@ void password_to_key_sha(u_char * password, /* IN */ } #endif -int start_snmp(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_snmp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = "\"\"", *ptr, *login, *pass, buffer[1024], buf[1024], hash[64], key[256] = "", salt[8] = ""; - int i, j, k, size, off = 0, off2 = 0, done = 0; + int32_t i, j, k, size, off = 0, off2 = 0, done = 0; unsigned char initVect[8], privacy_params[8]; - int engine_boots = 0; + int32_t engine_boots = 0; #ifdef LIBOPENSSL DES_key_schedule symcbc; @@ -316,13 +316,13 @@ int start_snmp(int s, char *ip, int port, unsigned char options, char *miscptr, /* //PrivDES::encrypt(const unsigned char *key, - // const unsigned int /*key_len*///, + // const uint32_t /*key_len*///, // const unsigned char *buffer, -// const unsigned int buffer_len, +// const uint32_t buffer_len, // unsigned char *out_buffer, -// unsigned int *out_buffer_len, +// uint32_t *out_buffer_len, // unsigned char *privacy_params, -// unsigned int *privacy_params_len, +// uint32_t *privacy_params_len, // const unsigned long engine_boots, // const unsigned long /*engine_time*/) // last 8 bytes of key are used as base for initialization vector */ @@ -347,9 +347,9 @@ int start_snmp(int s, char *ip, int port, unsigned char options, char *miscptr, if (buffer_len % 8) { unsigned char tmp_buf[8]; unsigned char *tmp_buf_ptr = tmp_buf; - int start = buffer_len - (buffer_len % 8); + int32_t start = buffer_len - (buffer_len % 8); memset(tmp_buf, 0, 8); - for (unsigned int l = start; l < buffer_len; l++) + for (uint32_t l = start; l < buffer_len; l++) *tmp_buf_ptr++ = buffer[l]; DES_ncbc_encrypt(tmp_buf, buf + start, 1, &symcbc, (const_DES_cblock*)(initVect), DES_ENCRYPT); *out_buffer_len = buffer_len + 8 - (buffer_len % 8); @@ -470,9 +470,9 @@ int start_snmp(int s, char *ip, int port, unsigned char options, char *miscptr, return 1; } -void service_snmp(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1, i = 0; - int myport = PORT_SNMP; +void service_snmp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1, i = 0; + int32_t myport = PORT_SNMP; char *lptr; if (miscptr != NULL) { @@ -519,7 +519,7 @@ void service_snmp(char *ip, int sp, unsigned char options, char *miscptr, FILE * hydra_register_socket(sp); if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, no socket available\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, no socket available\n", (int32_t) getpid()); hydra_child_exit(1); } @@ -573,7 +573,7 @@ void service_snmp(char *ip, int sp, unsigned char options, char *miscptr, FILE * } } -int service_snmp_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_snmp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-socks5.c b/hydra-socks5.c index 1c01a0e..6781916 100644 --- a/hydra-socks5.c +++ b/hydra-socks5.c @@ -12,12 +12,12 @@ This module enable bruteforcing for socks5, only following types are supported: extern char *HYDRA_EXIT; unsigned char *buf; -int fail_cnt; +int32_t fail_cnt; -int start_socks5(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_socks5(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *login, *pass, buffer[300]; - int pport, fud = 0; + int32_t pport, fud = 0; if (strlen(login = hydra_get_next_login()) == 0) login = empty; @@ -104,9 +104,9 @@ int start_socks5(int s, char *ip, int port, unsigned char options, char *miscptr return 2; } -void service_socks5(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_SOCKS5, mysslport = PORT_SOCKS5_SSL; +void service_socks5(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_SOCKS5, mysslport = PORT_SOCKS5_SSL; hydra_register_socket(sp); if (port != 0) @@ -133,7 +133,7 @@ void service_socks5(char *ip, int sp, unsigned char options, char *miscptr, FILE } if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } next_run = 2; @@ -165,7 +165,7 @@ void service_socks5(char *ip, int sp, unsigned char options, char *miscptr, FILE } } -int service_socks5_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_socks5_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-ssh.c b/hydra-ssh.c index d73a949..e0a67b1 100644 --- a/hydra-ssh.c +++ b/hydra-ssh.c @@ -20,12 +20,12 @@ void dummy_ssh() { ssh_session session = NULL; extern char *HYDRA_EXIT; -int new_session = 1; +int32_t new_session = 1; -int start_ssh(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_ssh(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *login, *pass, keep_login[300]; - int auth_state = 0, rc = 0, i = 0; + int32_t auth_state = 0, rc = 0, i = 0; if (strlen(login = hydra_get_next_login()) == 0) login = empty; @@ -107,8 +107,8 @@ int start_ssh(int s, char *ip, int port, unsigned char options, char *miscptr, F return 1; } -void service_ssh(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; +void service_ssh(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -155,7 +155,7 @@ void service_ssh(char *ip, int sp, unsigned char options, char *miscptr, FILE * // dirty workaround here: miscptr is the ptr to the logins, and the first one is used // to test if password authentication is enabled!! // -int service_ssh_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_ssh_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. @@ -168,7 +168,7 @@ int service_ssh_init(char *ip, int sp, unsigned char options, char *miscptr, FIL // 2 skip target because of protocol problems // 3 skip target because its unreachable #ifdef LIBSSH - int rc, method; + int32_t rc, method; ssh_session session = ssh_new(); if (verbose || debug) diff --git a/hydra-sshkey.c b/hydra-sshkey.c index a8b3ec0..e9f46c8 100644 --- a/hydra-sshkey.c +++ b/hydra-sshkey.c @@ -19,12 +19,12 @@ void dummy_sshkey() { extern ssh_session session; extern char *HYDRA_EXIT; -extern int new_session; +extern int32_t new_session; -int start_sshkey(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_sshkey(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *login, *key, keep_login[300]; - int auth_state = 0, rc = 0; + int32_t auth_state = 0, rc = 0; ssh_private_key privkey; if (strlen(login = hydra_get_next_login()) == 0) @@ -108,8 +108,8 @@ int start_sshkey(int s, char *ip, int port, unsigned char options, char *miscptr return 1; } -void service_sshkey(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; +void service_sshkey(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -151,7 +151,7 @@ void service_sshkey(char *ip, int sp, unsigned char options, char *miscptr, FILE #endif #endif -int service_sshkey_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_sshkey_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-svn.c b/hydra-svn.c index 2e4b06a..11ed2f9 100644 --- a/hydra-svn.c +++ b/hydra-svn.c @@ -23,7 +23,7 @@ void dummy_svn() { } #else -extern int hydra_data_ready_timed(int socket, long sec, long usec); +extern int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec); extern char *HYDRA_EXIT; @@ -50,8 +50,8 @@ static svn_error_t *my_simple_prompt_callback(svn_auth_cred_simple_t ** cred, vo return SVN_NO_ERROR; } -int start_svn(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { - int ipv6 = 0; +int32_t start_svn(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { + int32_t ipv6 = 0; char URL[1024]; char URLBRANCH[256]; const char *canonical; @@ -145,9 +145,9 @@ int start_svn(int s, char *ip, int port, unsigned char options, char *miscptr, F return 3; } -void service_svn(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_SVN, mysslport = PORT_SVN_SSL; +void service_svn(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_SVN, mysslport = PORT_SVN_SSL; hydra_register_socket(sp); @@ -174,7 +174,7 @@ void service_svn(char *ip, int sp, unsigned char options, char *miscptr, FILE * } if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } @@ -199,7 +199,7 @@ void service_svn(char *ip, int sp, unsigned char options, char *miscptr, FILE * #endif -int service_svn_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_svn_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-teamspeak.c b/hydra-teamspeak.c index c0e8b87..3d9df94 100644 --- a/hydra-teamspeak.c +++ b/hydra-teamspeak.c @@ -33,12 +33,12 @@ struct team_speak { char login[29]; }; -extern int hydra_data_ready_timed(int socket, long sec, long usec); +extern int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec); extern char *HYDRA_EXIT; char *buf; -int start_teamspeak(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_teamspeak(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *login, *pass; char buf[100]; @@ -87,11 +87,11 @@ int start_teamspeak(int s, char *ip, int port, unsigned char options, char *misc hydra_completed_pair_found(); } if (buf[0x4B] != 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } } else { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } @@ -102,9 +102,9 @@ int start_teamspeak(int s, char *ip, int port, unsigned char options, char *misc return 1; } -void service_teamspeak(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_TEAMSPEAK; +void service_teamspeak(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_TEAMSPEAK; hydra_register_socket(sp); @@ -123,7 +123,7 @@ void service_teamspeak(char *ip, int sp, unsigned char options, char *miscptr, F sock = hydra_connect_udp(ip, myport); port = myport; if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } } @@ -142,7 +142,7 @@ void service_teamspeak(char *ip, int sp, unsigned char options, char *miscptr, F } } -int service_teamspeak_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_teamspeak_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-telnet.c b/hydra-telnet.c index caecdd4..b938271 100644 --- a/hydra-telnet.c +++ b/hydra-telnet.c @@ -3,12 +3,12 @@ extern char *HYDRA_EXIT; char *buf; -int no_line_mode; +int32_t no_line_mode; -int start_telnet(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_telnet(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *login, *pass, buffer[300]; - int i = 0; + int32_t i = 0; if (strlen(login = hydra_get_next_login()) == 0) login = empty; @@ -96,9 +96,9 @@ int start_telnet(int s, char *ip, int port, unsigned char options, char *miscptr return 2; } -void service_telnet(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1, fck; - int myport = PORT_TELNET, mysslport = PORT_TELNET_SSL; +void service_telnet(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1, fck; + int32_t myport = PORT_TELNET, mysslport = PORT_TELNET_SSL; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -106,8 +106,8 @@ void service_telnet(char *ip, int sp, unsigned char options, char *miscptr, FILE if (miscptr != NULL) make_to_lower(miscptr); while (1) { - int first = 0; - int old_waittime = waittime; + int32_t first = 0; + int32_t old_waittime = waittime; switch (run) { case 1: /* connect and service init function */ @@ -128,7 +128,7 @@ void service_telnet(char *ip, int sp, unsigned char options, char *miscptr, FILE port = mysslport; } if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } if ((buf = hydra_receive_line(sock)) == NULL) { /* check the first line */ @@ -204,7 +204,7 @@ void service_telnet(char *ip, int sp, unsigned char options, char *miscptr, FILE } } -int service_telnet_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_telnet_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-time.c b/hydra-time.c index 47f73d7..734e3c2 100644 --- a/hydra-time.c +++ b/hydra-time.c @@ -2,14 +2,14 @@ #ifndef _WIN32 #include -int sleepn(time_t seconds) +int32_t sleepn(time_t seconds) { struct timespec ts; ts.tv_sec = seconds; ts.tv_nsec = 0; return nanosleep(&ts, NULL); } -int usleepn(long int milisec) { +int32_t usleepn(int64_t milisec) { struct timespec ts; ts.tv_sec = milisec / 1000; ts.tv_nsec = (milisec % 1000) * 1000000L; @@ -19,12 +19,12 @@ int usleepn(long int milisec) { #else #include -int sleepn(unsigned int seconds) +int32_t sleepn(uint32_t seconds) { return SleepEx(milisec*1000,TRUE); } -int usleepn(unsigned int milisec) +int32_t usleepn(uint32_t milisec) { return SleepEx(milisec,TRUE); } diff --git a/hydra-vmauthd.c b/hydra-vmauthd.c index d223c22..7ed6174 100644 --- a/hydra-vmauthd.c +++ b/hydra-vmauthd.c @@ -10,7 +10,7 @@ extern char *HYDRA_EXIT; char *buf; -int start_vmauthd(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_vmauthd(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = "\"\""; char *login, *pass, buffer[300]; @@ -65,9 +65,9 @@ int start_vmauthd(int s, char *ip, int port, unsigned char options, char *miscpt return 2; } -void service_vmauthd(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_VMAUTHD, mysslport = PORT_VMAUTHD_SSL; +void service_vmauthd(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_VMAUTHD, mysslport = PORT_VMAUTHD_SSL; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -92,7 +92,7 @@ void service_vmauthd(char *ip, int sp, unsigned char options, char *miscptr, FIL if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } buf = hydra_receive_line(sock); @@ -142,7 +142,7 @@ void service_vmauthd(char *ip, int sp, unsigned char options, char *miscptr, FIL } } -int service_vmauthd_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_vmauthd_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-vnc.c b/hydra-vnc.c index 598ffe3..ee8f582 100644 --- a/hydra-vnc.c +++ b/hydra-vnc.c @@ -15,8 +15,8 @@ //for RFB 3.7 and onwards #define RFB37 2 -int vnc_client_version = RFB33; -int failed_auth = 0; +int32_t vnc_client_version = RFB33; +int32_t failed_auth = 0; extern char *HYDRA_EXIT; char *buf; @@ -28,7 +28,7 @@ char *buf; void vncEncryptBytes(unsigned char *bytes, char *passwd) { unsigned char key[8]; - int i; + int32_t i; /* key is simply password padded with nulls */ for (i = 0; i < 8; i++) { @@ -44,7 +44,7 @@ void vncEncryptBytes(unsigned char *bytes, char *passwd) { } } -int start_vnc(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_vnc(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *pass; unsigned char buf2[CHALLENGESIZE + 4]; @@ -55,7 +55,7 @@ int start_vnc(int s, char *ip, int port, unsigned char options, char *miscptr, F recv(s, buf2, CHALLENGESIZE + 4, 0); if (vnc_client_version == RFB37) { - int i; + int32_t i; //fprintf(stderr,"number of security types supported: %d\n", buf2[0]); if (buf2[0] == 0 || buf2[0] > CHALLENGESIZE + 4) { @@ -143,9 +143,9 @@ int start_vnc(int s, char *ip, int port, unsigned char options, char *miscptr, F return 1; /* never reached */ } -void service_vnc(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { - int run = 1, next_run = 1, sock = -1; - int myport = PORT_VNC, mysslport = PORT_VNC_SSL; +void service_vnc(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_VNC, mysslport = PORT_VNC_SSL; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -167,7 +167,7 @@ void service_vnc(char *ip, int sp, unsigned char options, char *miscptr, FILE * port = mysslport; } if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); hydra_child_exit(1); } usleepn(300); @@ -229,7 +229,7 @@ void service_vnc(char *ip, int sp, unsigned char options, char *miscptr, FILE * } } -int service_vnc_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +int32_t service_vnc_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-xmpp.c b/hydra-xmpp.c index ffd2552..6f6b3cb 100644 --- a/hydra-xmpp.c +++ b/hydra-xmpp.c @@ -6,12 +6,12 @@ extern char *HYDRA_EXIT; static char *domain = NULL; -int xmpp_auth_mechanism = AUTH_ERROR; +int32_t xmpp_auth_mechanism = AUTH_ERROR; char *JABBER_CLIENT_INIT_STR = ""; -int start_xmpp(int s, char *ip, int port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_xmpp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = "\"\""; char *login, *pass, buffer[500], buffer2[500]; char *AUTH_STR = "sp[0] = -1; hydra_heads[j]->sp[1] = -1; sck = fgets(out, sizeof(out), f); @@ -983,8 +983,8 @@ void hydra_restore_read() { hydra_debug(0, "hydra_restore_read"); } -void killed_childs(int signo) { - int pid, i; +void killed_childs(int32_t signo) { + int32_t pid, i; killed++; pid = wait3(NULL, WNOHANG, NULL); @@ -997,15 +997,15 @@ void killed_childs(int signo) { } } -void killed_childs_report(int signo) { +void killed_childs_report(int32_t signo) { if (debug) printf("[DEBUG] children crashed! (%d)\n", child_head_no); fck = write(child_socket, "E", 1); _exit(-1); } -void kill_children(int signo) { - int i; +void kill_children(int32_t signo) { + int32_t i; if (verbose) fprintf(stderr, "[ERROR] Received signal %d, going down ...\n", signo); @@ -1022,10 +1022,10 @@ void kill_children(int signo) { exit(0); } -unsigned long int countlines(FILE * fd, int colonmode) { +uint64_t countlines(FILE * fd, int32_t colonmode) { size_t clines = 0; char *buf = malloc(MAXLINESIZE); - int only_one_empty_line = 0; + int32_t only_one_empty_line = 0; #ifdef HAVE_ZLIB gzFile fp = gzdopen(fileno(fd), "r"); @@ -1064,10 +1064,10 @@ unsigned long int countlines(FILE * fd, int colonmode) { return clines; } -void fill_mem(char *ptr, FILE * fd, int colonmode) { +void fill_mem(char *ptr, FILE * fd, int32_t colonmode) { char tmp[MAXBUF + 4] = "", *ptr2; - unsigned int len; - int only_one_empty_line = 0; + uint32_t len; + int32_t only_one_empty_line = 0; #ifdef HAVE_ZLIB gzFile fp = gzdopen(fileno(fd), "r"); @@ -1132,9 +1132,9 @@ char *hydra_build_time() { return (char *) &datetime; } -void hydra_service_init(int target_no) { - int x = 99; - int i; +void hydra_service_init(int32_t target_no) { + int32_t x = 99; + int32_t i; hydra_target* t = hydra_targets[target_no]; char* miscptr = hydra_options.miscptr; FILE* ofp = hydra_brains.ofp; @@ -1165,8 +1165,8 @@ void hydra_service_init(int target_no) { } } -int hydra_spawn_head(int head_no, int target_no) { - int i; +int32_t hydra_spawn_head(int32_t head_no, int32_t target_no) { + int32_t i; if (head_no < 0 || head_no >= hydra_options.max_use || target_no < 0 || target_no >= hydra_brains.targets) { if (verbose > 1 || debug) @@ -1213,7 +1213,7 @@ int hydra_spawn_head(int head_no, int target_no) { printf("[DEBUG] head_no %d has pid %d\n", head_no, getpid()); hydra_target* t = hydra_targets[target_no]; - int sp = hydra_heads[head_no]->sp[1]; + int32_t sp = hydra_heads[head_no]->sp[1]; char* miscptr = hydra_options.miscptr; FILE* ofp = hydra_brains.ofp; hydra_target* head_target = hydra_targets[hydra_heads[head_no]->target_no]; @@ -1263,8 +1263,8 @@ int hydra_spawn_head(int head_no, int target_no) { return 0; } -int hydra_lookup_port(char *service) { - int i = 0, port = -2; +int32_t hydra_lookup_port(char *service) { + int32_t i = 0, port = -2; hydra_portlist hydra_portlists[] = { {"ftp", PORT_FTP, PORT_FTP_SSL}, @@ -1349,7 +1349,7 @@ int hydra_lookup_port(char *service) { } // killit = 1 : kill(pid); fail = 1 : redo, fail = 2/3 : disable -void hydra_kill_head(int head_no, int killit, int fail) { +void hydra_kill_head(int32_t head_no, int32_t killit, int32_t fail) { if (debug) printf("[DEBUG] head_no %d, kill %d, fail %d\n", head_no, killit, fail); if (head_no < 0) @@ -1393,17 +1393,17 @@ void hydra_kill_head(int head_no, int killit, int fail) { (void) wait3(NULL, WNOHANG, NULL); } -void hydra_increase_fail_count(int target_no, int head_no) { - int i, k, ok, maxfail = 0; +void hydra_increase_fail_count(int32_t target_no, int32_t head_no) { + int32_t i, k, ok, maxfail = 0; if (target_no < 0) return; if (hydra_targets[target_no]->ok) { - const int tasks = hydra_options.tasks; - const int success = tasks - hydra_targets[target_no]->failed; - const int t = tasks < 5 ? 6 - tasks : 1; - const int s = success < 5 ? 6 - success : 1; + const int32_t tasks = hydra_options.tasks; + const int32_t success = tasks - hydra_targets[target_no]->failed; + const int32_t t = tasks < 5 ? 6 - tasks : 1; + const int32_t s = success < 5 ? 6 - success : 1; maxfail = MAXFAIL + t + s + 2; } @@ -1483,8 +1483,8 @@ void hydra_increase_fail_count(int target_no, int head_no) { } } -char *hydra_reverse_login(int head_no, char *login) { - int i, j; +char *hydra_reverse_login(int32_t head_no, char *login) { + int32_t i, j; char *start, *pos; unsigned char keep; @@ -1532,7 +1532,7 @@ char *hydra_reverse_login(int head_no, char *login) { return hydra_heads[head_no]->reverse; } -int hydra_send_next_pair(int target_no, int head_no) { +int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { // variables moved to save stack snpdone = 0; snp_is_redo = 0; @@ -1894,8 +1894,8 @@ int hydra_send_next_pair(int target_no, int head_no) { return -1; } -void hydra_skip_user(int target_no, char *username) { - int i; +void hydra_skip_user(int32_t target_no, char *username) { + int32_t i; if (username == NULL || *username == 0) return; @@ -1932,8 +1932,8 @@ void hydra_skip_user(int target_no, char *username) { } } -int hydra_check_for_exit_condition() { - int i, k = 0; +int32_t hydra_check_for_exit_condition() { + int32_t i, k = 0; if (hydra_brains.exit) { if (debug) @@ -1958,8 +1958,8 @@ int hydra_check_for_exit_condition() { return 0; } -int hydra_select_target() { - int target_no = -1, i, j = -1000; +int32_t hydra_select_target() { + int32_t target_no = -1, i, j = -1000; for (i = 0; i < hydra_brains.targets; i++) if (hydra_targets[i]->use_count < hydra_options.tasks && hydra_targets[i]->done == TARGET_ACTIVE) @@ -1970,9 +1970,9 @@ int hydra_select_target() { return target_no; } -void process_proxy_line(int type, char *string) { +void process_proxy_line(int32_t type, char *string) { char *type_string = string, *target_string, *port_string, *auth_string = NULL, *device_string = NULL, *sep; - int port; + int32_t port; struct addrinfo hints, *res, *p; struct sockaddr_in6 *ipv6 = NULL; struct sockaddr_in *ipv4 = NULL; @@ -2094,20 +2094,20 @@ void process_proxy_line(int type, char *string) { proxy_count++; } -int main(int argc, char *argv[]) { +int32_t main(int32_t argc, char *argv[]) { char *proxy_string = NULL, *device = NULL, *memcheck, *cmdtarget = NULL; char *outfile_format_tmp; FILE *lfp = NULL, *pfp = NULL, *cfp = NULL, *ifp = NULL, *rfp = NULL, *proxyfp; size_t countinfile = 1, sizeinfile = 0; - unsigned long int math2; - int i = 0, j = 0, k, error = 0, modusage = 0, ignore_restore = 0, do_switch; - int head_no = 0, target_no = 0, exit_condition = 0, readres; + uint64_t math2; + int32_t i = 0, j = 0, k, error = 0, modusage = 0, ignore_restore = 0, do_switch; + int32_t head_no = 0, target_no = 0, exit_condition = 0, readres; time_t starttime, elapsed_status, elapsed_restore, status_print = 59, tmp_time; char *tmpptr, *tmpptr2; char rc, buf[MAXBUF]; time_t last_attempt = 0; fd_set fdreadheads; - int max_fd; + int32_t max_fd; struct addrinfo hints, *res, *p; struct sockaddr_in6 *ipv6 = NULL; struct sockaddr_in *ipv4 = NULL; @@ -3169,7 +3169,7 @@ int main(int argc, char *argv[]) { exit(-1); } if (hydra_brains.sizelogin > MAX_BYTES) { - fprintf(stderr, "[ERROR] Maximum size of the login file is %d, this file has %lu bytes.\n", MAX_BYTES, (unsigned long int) hydra_brains.sizelogin); + fprintf(stderr, "[ERROR] Maximum size of the login file is %d, this file has %lu bytes.\n", MAX_BYTES, (uint64_t) hydra_brains.sizelogin); exit(-1); } login_ptr = malloc(hydra_brains.sizelogin + hydra_brains.countlogin + 8); @@ -3198,7 +3198,7 @@ int main(int argc, char *argv[]) { exit(-1); } if (hydra_brains.sizepass > MAX_BYTES) { - fprintf(stderr, "[ERROR] Maximum size of the password file is %d, this file has %lu bytes.\n", MAX_BYTES, (unsigned long int) hydra_brains.sizepass); + fprintf(stderr, "[ERROR] Maximum size of the password file is %d, this file has %lu bytes.\n", MAX_BYTES, (uint64_t) hydra_brains.sizepass); exit(-1); } pass_ptr = malloc(hydra_brains.sizepass + hydra_brains.countpass + 8); @@ -3245,7 +3245,7 @@ int main(int argc, char *argv[]) { exit(-1); } if (hydra_brains.sizelogin > MAX_BYTES / 2) { - fprintf(stderr, "[ERROR] Maximum size of the colon file is %d, this file has %lu bytes.\n", MAX_BYTES / 2, (unsigned long int) hydra_brains.sizelogin); + fprintf(stderr, "[ERROR] Maximum size of the colon file is %d, this file has %lu bytes.\n", MAX_BYTES / 2, (uint64_t) hydra_brains.sizelogin); exit(-1); } csv_ptr = malloc(hydra_brains.sizelogin + 2 * hydra_brains.countlogin + 8); @@ -3291,11 +3291,11 @@ int main(int argc, char *argv[]) { bail("Could not allocate enough memory for target data"); sizeinfile = size_of_data; if (countinfile > MAX_LINES / 1000) { - fprintf(stderr, "[ERROR] Maximum number of target file entries is %d, this file has %d entries.\n", MAX_LINES / 1000, (int) countinfile); + fprintf(stderr, "[ERROR] Maximum number of target file entries is %d, this file has %d entries.\n", MAX_LINES / 1000, (int32_t) countinfile); exit(-1); } if (sizeinfile > MAX_BYTES / 1000) { - fprintf(stderr, "[ERROR] Maximum size of the server file is %d, this file has %d bytes.\n", MAX_BYTES / 1000, (int) sizeinfile); + fprintf(stderr, "[ERROR] Maximum size of the server file is %d, this file has %d bytes.\n", MAX_BYTES / 1000, (int32_t) sizeinfile); exit(-1); } if ((servers_ptr = malloc(sizeinfile + countservers + 8)) == NULL) @@ -3345,7 +3345,7 @@ int main(int argc, char *argv[]) { sizeservers = strlen(hydra_options.server) + 1; } else { /* CIDR notation on command line, e.g. 192.168.0.0/24 */ - unsigned int four_from, four_to, addr_cur, addr_cur2, k, l; + uint32_t four_from, four_to, addr_cur, addr_cur2, k, l; in_addr_t addr4; struct sockaddr_in target; @@ -3506,7 +3506,7 @@ int main(int argc, char *argv[]) { else printf("[DATA] max %d task%s per %d server%s, overall %d tasks, %lu login tr%s (l:%lu/p:%lu), ~%lu tr%s per task\n", hydra_options.tasks, hydra_options.tasks == 1 ? "" : "s", hydra_brains.targets, hydra_brains.targets == 1 ? "" : "s", hydra_options.max_use, hydra_brains.todo, hydra_brains.todo == 1 ? "y" : "ies", - (unsigned long int) hydra_brains.countlogin, (unsigned long int) hydra_brains.countpass, math2, math2 == 1 ? "y" : "ies"); + (uint64_t) hydra_brains.countlogin, (uint64_t) hydra_brains.countpass, math2, math2 == 1 ? "y" : "ies"); printf("[DATA] attacking service %s on port %d%s\n", hydra_options.service, port, hydra_options.ssl == 1 ? " with SSL" : ""); if (hydra_options.miscptr != NULL && hydra_options.miscptr[0] != 0) @@ -3933,12 +3933,12 @@ int main(int argc, char *argv[]) { */ printf("[STATUS] %.2f tries/min, %lu tries in %02lu:%02luh, %lu to do in %02lu:%02luh, %d active\n", (1.0 * hydra_brains.sent) / (((elapsed_status - starttime) * 1.0) / 60), // tries/min hydra_brains.sent, // tries - (long unsigned int) ((elapsed_status - starttime) / 3600), // hours - (long unsigned int) (((elapsed_status - starttime) % 3600) / 60), // minutes + (uint64_t) ((elapsed_status - starttime) / 3600), // hours + (uint64_t) (((elapsed_status - starttime) % 3600) / 60), // minutes (hydra_brains.todo_all + total_redo_count) - hydra_brains.sent != 0 ? (hydra_brains.todo_all + total_redo_count) - hydra_brains.sent : 1, // left todo - (long unsigned int) (((double) (hydra_brains.todo_all + total_redo_count) - hydra_brains.sent) / ((double) hydra_brains.sent / (elapsed_status - starttime)) + (uint64_t) (((double) (hydra_brains.todo_all + total_redo_count) - hydra_brains.sent) / ((double) hydra_brains.sent / (elapsed_status - starttime)) ) / 3600, // hours - (((long unsigned int) (((double) (hydra_brains.todo_all + total_redo_count) - hydra_brains.sent) / ((double) hydra_brains.sent / (elapsed_status - starttime)) + (((uint64_t) (((double) (hydra_brains.todo_all + total_redo_count) - hydra_brains.sent) / ((double) hydra_brains.sent / (elapsed_status - starttime)) ) % 3600) / 60) + 1, // min k); hydra_debug(0, "STATUS"); diff --git a/hydra.h b/hydra.h index 54373d4..d0e2f5c 100644 --- a/hydra.h +++ b/hydra.h @@ -1,6 +1,13 @@ #ifndef _HYDRA_H #include +#ifdef __sun + #include +#elif defined(__FreeBSD__) || defined(__IBMCPP__) || defined(_AIX) + #include +#else + #include +#endif #include #include #include @@ -149,7 +156,7 @@ #ifndef _WIN32 int sleepn(time_t seconds); -int usleepn(long int useconds); +int usleepn(long useconds); #else diff --git a/libpq-fe.h b/libpq-fe.h index 7d08744..d7cce84 100644 --- a/libpq-fe.h +++ b/libpq-fe.h @@ -119,7 +119,7 @@ extern "C" { */ typedef struct pgNotify { char *relname; /* notification condition name */ - int be_pid; /* process ID of server process */ + int32_t be_pid; /* process ID of server process */ char *extra; /* notification parameter */ } PGnotify; @@ -164,7 +164,7 @@ extern "C" { * Display entered value as is "*" * Password field - hide value "D" Debug * option - don't show by default */ - int dispsize; /* Field size in characters for dialog */ + int32_t dispsize; /* Field size in characters for dialog */ } PQconninfoOption; /* ---------------- @@ -172,11 +172,11 @@ extern "C" { * ---------------- */ typedef struct { - int len; - int isint; + int32_t len; + int32_t isint; union { - int *ptr; /* can't use void (dec compiler barfs) */ - int integer; + int32_t *ptr; /* can't use void (dec compiler barfs) */ + int32_t integer; } u; } PQArgBlock; @@ -215,14 +215,14 @@ extern "C" { */ /* Asynchronous (non-blocking) */ - extern int PQresetStart(PGconn * conn); + extern int32_t PQresetStart(PGconn * conn); extern PostgresPollingStatusType PQresetPoll(PGconn * conn); /* Synchronous (blocking) */ extern void PQreset(PGconn * conn); /* issue a cancel request */ - extern int PQrequestCancel(PGconn * conn); + extern int32_t PQrequestCancel(PGconn * conn); /* Accessor functions for PGconn objects */ extern char *PQdb(const PGconn * conn); @@ -235,12 +235,12 @@ extern "C" { extern ConnStatusType PQstatus(const PGconn * conn); extern PGTransactionStatusType PQtransactionStatus(const PGconn * conn); extern const char *PQparameterStatus(const PGconn * conn, const char *paramName); - extern int PQprotocolVersion(const PGconn * conn); + extern int32_t PQprotocolVersion(const PGconn * conn); extern char *PQerrorMessage(const PGconn * conn); - extern int PQsocket(const PGconn * conn); - extern int PQbackendPID(const PGconn * conn); - extern int PQclientEncoding(const PGconn * conn); - extern int PQsetClientEncoding(PGconn * conn, const char *encoding); + extern int32_t PQsocket(const PGconn * conn); + extern int32_t PQbackendPID(const PGconn * conn); + extern int32_t PQclientEncoding(const PGconn * conn); + extern int32_t PQsetClientEncoding(PGconn * conn, const char *encoding); #ifdef USE_SSL @@ -265,74 +265,74 @@ extern "C" { extern PGresult *PQexec(PGconn * conn, const char *query); extern PGresult *PQexecParams(PGconn * conn, const char *command, - int nParams, const Oid * paramTypes, const char *const *paramValues, const int *paramLengths, const int *paramFormats, int resultFormat); + int32_t nParams, const Oid * paramTypes, const char *const *paramValues, const int32_t *paramLengths, const int32_t *paramFormats, int32_t resultFormat); extern PGresult *PQexecPrepared(PGconn * conn, - const char *stmtName, int nParams, const char *const *paramValues, const int *paramLengths, const int *paramFormats, int resultFormat); + const char *stmtName, int32_t nParams, const char *const *paramValues, const int32_t *paramLengths, const int32_t *paramFormats, int32_t resultFormat); /* Interface for multiple-result or asynchronous queries */ - extern int PQsendQuery(PGconn * conn, const char *query); - extern int PQsendQueryParams(PGconn * conn, + extern int32_t PQsendQuery(PGconn * conn, const char *query); + extern int32_t PQsendQueryParams(PGconn * conn, const char *command, - int nParams, const Oid * paramTypes, const char *const *paramValues, const int *paramLengths, const int *paramFormats, int resultFormat); - extern int PQsendQueryPrepared(PGconn * conn, - const char *stmtName, int nParams, const char *const *paramValues, const int *paramLengths, const int *paramFormats, int resultFormat); + int32_t nParams, const Oid * paramTypes, const char *const *paramValues, const int32_t *paramLengths, const int32_t *paramFormats, int32_t resultFormat); + extern int32_t PQsendQueryPrepared(PGconn * conn, + const char *stmtName, int32_t nParams, const char *const *paramValues, const int32_t *paramLengths, const int32_t *paramFormats, int32_t resultFormat); extern PGresult *PQgetResult(PGconn * conn); /* Routines for managing an asynchronous query */ - extern int PQisBusy(PGconn * conn); - extern int PQconsumeInput(PGconn * conn); + extern int32_t PQisBusy(PGconn * conn); + extern int32_t PQconsumeInput(PGconn * conn); /* LISTEN/NOTIFY support */ extern PGnotify *PQnotifies(PGconn * conn); /* Routines for copy in/out */ - extern int PQputCopyData(PGconn * conn, const char *buffer, int nbytes); - extern int PQputCopyEnd(PGconn * conn, const char *errormsg); - extern int PQgetCopyData(PGconn * conn, char **buffer, int async); + extern int32_t PQputCopyData(PGconn * conn, const char *buffer, int32_t nbytes); + extern int32_t PQputCopyEnd(PGconn * conn, const char *errormsg); + extern int32_t PQgetCopyData(PGconn * conn, char **buffer, int32_t async); /* Deprecated routines for copy in/out */ - extern int PQgetline(PGconn * conn, char *string, int length); - extern int PQputline(PGconn * conn, const char *string); - extern int PQgetlineAsync(PGconn * conn, char *buffer, int bufsize); - extern int PQputnbytes(PGconn * conn, const char *buffer, int nbytes); - extern int PQendcopy(PGconn * conn); + extern int32_t PQgetline(PGconn * conn, char *string, int32_t length); + extern int32_t PQputline(PGconn * conn, const char *string); + extern int32_t PQgetlineAsync(PGconn * conn, char *buffer, int32_t bufsize); + extern int32_t PQputnbytes(PGconn * conn, const char *buffer, int32_t nbytes); + extern int32_t PQendcopy(PGconn * conn); /* Set blocking/nonblocking connection to the backend */ - extern int PQsetnonblocking(PGconn * conn, int arg); - extern int PQisnonblocking(const PGconn * conn); + extern int32_t PQsetnonblocking(PGconn * conn, int32_t arg); + extern int32_t PQisnonblocking(const PGconn * conn); /* Force the write buffer to be written (or at least try) */ - extern int PQflush(PGconn * conn); + extern int32_t PQflush(PGconn * conn); /* * "Fast path" interface --- not really recommended for application * use */ - extern PGresult *PQfn(PGconn * conn, int fnid, int *result_buf, int *result_len, int result_is_int, const PQArgBlock * args, int nargs); + extern PGresult *PQfn(PGconn * conn, int32_t fnid, int32_t *result_buf, int32_t *result_len, int32_t result_is_int, const PQArgBlock * args, int32_t nargs); /* Accessor functions for PGresult objects */ extern ExecStatusType PQresultStatus(const PGresult * res); extern char *PQresStatus(ExecStatusType status); extern char *PQresultErrorMessage(const PGresult * res); - extern char *PQresultErrorField(const PGresult * res, int fieldcode); - extern int PQntuples(const PGresult * res); - extern int PQnfields(const PGresult * res); - extern int PQbinaryTuples(const PGresult * res); - extern char *PQfname(const PGresult * res, int field_num); - extern int PQfnumber(const PGresult * res, const char *field_name); - extern Oid PQftable(const PGresult * res, int field_num); - extern int PQftablecol(const PGresult * res, int field_num); - extern int PQfformat(const PGresult * res, int field_num); - extern Oid PQftype(const PGresult * res, int field_num); - extern int PQfsize(const PGresult * res, int field_num); - extern int PQfmod(const PGresult * res, int field_num); + extern char *PQresultErrorField(const PGresult * res, int32_t fieldcode); + extern int32_t PQntuples(const PGresult * res); + extern int32_t PQnfields(const PGresult * res); + extern int32_t PQbinaryTuples(const PGresult * res); + extern char *PQfname(const PGresult * res, int32_t field_num); + extern int32_t PQfnumber(const PGresult * res, const char *field_name); + extern Oid PQftable(const PGresult * res, int32_t field_num); + extern int32_t PQftablecol(const PGresult * res, int32_t field_num); + extern int32_t PQfformat(const PGresult * res, int32_t field_num); + extern Oid PQftype(const PGresult * res, int32_t field_num); + extern int32_t PQfsize(const PGresult * res, int32_t field_num); + extern int32_t PQfmod(const PGresult * res, int32_t field_num); extern char *PQcmdStatus(PGresult * res); extern char *PQoidStatus(const PGresult * res); /* old and ugly */ extern Oid PQoidValue(const PGresult * res); /* new and improved */ extern char *PQcmdTuples(PGresult * res); - extern char *PQgetvalue(const PGresult * res, int tup_num, int field_num); - extern int PQgetlength(const PGresult * res, int tup_num, int field_num); - extern int PQgetisnull(const PGresult * res, int tup_num, int field_num); + extern char *PQgetvalue(const PGresult * res, int32_t tup_num, int32_t field_num); + extern int32_t PQgetlength(const PGresult * res, int32_t tup_num, int32_t field_num); + extern int32_t PQgetisnull(const PGresult * res, int32_t tup_num, int32_t field_num); /* Delete a PGresult */ extern void PQclear(PGresult * res); @@ -369,40 +369,40 @@ extern "C" { */ extern void PQdisplayTuples(const PGresult * res, FILE * fp, /* where to send the output */ - int fillAlign, /* pad the fields with spaces */ + int32_t fillAlign, /* pad the fields with spaces */ const char *fieldSep, /* field separator */ - int printHeader, /* display headers? */ - int quiet); + int32_t printHeader, /* display headers? */ + int32_t quiet); extern void PQprintTuples(const PGresult * res, FILE * fout, /* output stream */ - int printAttName, /* print attribute names */ - int terseOutput, /* delimiter bars */ - int width); /* width of column, if 0, use variable + int32_t printAttName, /* print attribute names */ + int32_t terseOutput, /* delimiter bars */ + int32_t width); /* width of column, if 0, use variable * width */ /* === in fe-lobj.c === */ /* Large-object access routines */ - extern int lo_open(PGconn * conn, Oid lobjId, int mode); - extern int lo_close(PGconn * conn, int fd); - extern int lo_read(PGconn * conn, int fd, char *buf, size_t len); - extern int lo_write(PGconn * conn, int fd, char *buf, size_t len); - extern int lo_lseek(PGconn * conn, int fd, int offset, int whence); - extern Oid lo_creat(PGconn * conn, int mode); - extern int lo_tell(PGconn * conn, int fd); - extern int lo_unlink(PGconn * conn, Oid lobjId); + extern int32_t lo_open(PGconn * conn, Oid lobjId, int32_t mode); + extern int32_t lo_close(PGconn * conn, int32_t fd); + extern int32_t lo_read(PGconn * conn, int32_t fd, char *buf, size_t len); + extern int32_t lo_write(PGconn * conn, int32_t fd, char *buf, size_t len); + extern int32_t lo_lseek(PGconn * conn, int32_t fd, int32_t offset, int32_t whence); + extern Oid lo_creat(PGconn * conn, int32_t mode); + extern int32_t lo_tell(PGconn * conn, int32_t fd); + extern int32_t lo_unlink(PGconn * conn, Oid lobjId); extern Oid lo_import(PGconn * conn, const char *filename); - extern int lo_export(PGconn * conn, Oid lobjId, const char *filename); + extern int32_t lo_export(PGconn * conn, Oid lobjId, const char *filename); /* === in fe-misc.c === */ /* Determine length of multibyte encoded char at *s */ - extern int PQmblen(const unsigned char *s, int encoding); + extern int32_t PQmblen(const unsigned char *s, int32_t encoding); /* Get encoding id from environment variable PGCLIENTENCODING */ - extern int PQenv2encoding(void); + extern int32_t PQenv2encoding(void); #ifdef __cplusplus } diff --git a/ntlm.c b/ntlm.c index 865dccf..19e54f4 100644 --- a/ntlm.c +++ b/ntlm.c @@ -54,7 +54,7 @@ /* This file implements macros for machine independent short and - int manipulation + int32_t manipulation Here is a description of this file that I emailed to the samba list once: @@ -72,7 +72,7 @@ an optimisation. You can take it out completely and it will make no difference. The routines (macros) in byteorder.h are totally byteorder independent. The 386 optimsation just takes advantage of the fact that the x86 processors don't care about alignment, so we don't have to -align ints on int boundaries etc. If there are other processors out +align ints on int32_t boundaries etc. If there are other processors out there that aren't alignment sensitive then you could also define CAREFUL_ALIGNMENT=0 on those processors as well. @@ -81,7 +81,7 @@ want to extract a 2 byte integer from a SMB packet and put it into a type called uint16 that is in the local machines byte order, and you want to do it with only the assumption that uint16 is _at_least_ 16 bits long (this last condition is very important for architectures -that don't have any int types that are 2 bytes long) +that don't have any int32_t types that are 2 bytes long) You do this: @@ -207,10 +207,10 @@ it also defines lots of intermediate macros, just ignore those :-) /* macros for reading / writing arrays */ #define SMBMACRO(macro,buf,pos,val,len,size) \ -{ int l; for (l = 0; l < (len); l++) (val)[l] = macro((buf), (pos) + (size)*l); } +{ int32_t l; for (l = 0; l < (len); l++) (val)[l] = macro((buf), (pos) + (size)*l); } #define SSMBMACRO(macro,buf,pos,val,len,size) \ -{ int l; for (l = 0; l < (len); l++) macro((buf), (pos) + (size)*l, (val)[l]); } +{ int32_t l; for (l = 0; l < (len); l++) macro((buf), (pos) + (size)*l, (val)[l]); } /* reads multiple data from an SMB buffer */ #define PCVAL(buf,pos,val,len) SMBMACRO(CVAL,buf,pos,val,len,1) @@ -259,7 +259,7 @@ it also defines lots of intermediate macros, just ignore those :-) DEBUG(5,("%s%04x %s: ", \ tab_depth(depth), base,string)); \ if (charmode) print_asc(5, (unsigned char*)(outbuf), (len)); else \ - { int idx; for (idx = 0; idx < len; idx++) { DEBUG(5,("%02x ", (outbuf)[idx])); } } \ + { int32_t idx; for (idx = 0; idx < len; idx++) { DEBUG(5,("%02x ", (outbuf)[idx])); } } \ DEBUG(5,("\n")); } #define DBG_RW_PSVAL(charmode,string,depth,base,read,big_endian,inbuf,outbuf,len) \ @@ -267,7 +267,7 @@ it also defines lots of intermediate macros, just ignore those :-) DEBUG(5,("%s%04x %s: ", \ tab_depth(depth), base,string)); \ if (charmode) print_asc(5, (unsigned char*)(outbuf), 2*(len)); else \ - { int idx; for (idx = 0; idx < len; idx++) { DEBUG(5,("%04x ", (outbuf)[idx])); } } \ + { int32_t idx; for (idx = 0; idx < len; idx++) { DEBUG(5,("%04x ", (outbuf)[idx])); } } \ DEBUG(5,("\n")); } #define DBG_RW_PIVAL(charmode,string,depth,base,read,big_endian,inbuf,outbuf,len) \ @@ -275,7 +275,7 @@ it also defines lots of intermediate macros, just ignore those :-) DEBUG(5,("%s%04x %s: ", \ tab_depth(depth), base,string)); \ if (charmode) print_asc(5, (unsigned char*)(outbuf), 4*(len)); else \ - { int idx; for (idx = 0; idx < len; idx++) { DEBUG(5,("%08x ", (outbuf)[idx])); } } \ + { int32_t idx; for (idx = 0; idx < len; idx++) { DEBUG(5,("%08x ", (outbuf)[idx])); } } \ DEBUG(5,("\n")); } #define DBG_RW_CVAL(string,depth,base,read,inbuf,outbuf) \ @@ -300,7 +300,7 @@ it also defines lots of intermediate macros, just ignore those :-) /* NOTE: This code makes no attempt to be fast! - It assumes that a int is at least 32 bits long + It assumes that a int32_t is at least 32 bits long */ static uint32 A, B, C, D; @@ -317,7 +317,7 @@ static uint32 H(uint32 X, uint32 Y, uint32 Z) { return X ^ Y ^ Z; } -static uint32 lshift(uint32 x, int s) { +static uint32 lshift(uint32 x, int32_t s) { x &= 0xFFFFFFFF; return ((x << s) & 0xFFFFFFFF) | (x >> (32 - s)); } @@ -328,7 +328,7 @@ static uint32 lshift(uint32 x, int s) { /* this applies md4 to 64 byte chunks */ static void mdfour64(uint32 * M) { - int j; + int32_t j; uint32 AA, BB, CC, DD; uint32 X[16]; @@ -406,7 +406,7 @@ static void mdfour64(uint32 * M) { } static void copy64(uint32 * M, unsigned char *in) { - int i; + int32_t i; for (i = 0; i < 16; i++) M[i] = (in[i * 4 + 3] << 24) | (in[i * 4 + 2] << 16) | (in[i * 4 + 1] << 8) | (in[i * 4 + 0] << 0); @@ -420,11 +420,11 @@ static void copy4(unsigned char *out, uint32 x) { } /* produce a md4 message digest from data of length n bytes */ -void mdfour(unsigned char *out, unsigned char *in, int n) { +void mdfour(unsigned char *out, unsigned char *in, int32_t n) { unsigned char buf[128]; uint32 M[16]; uint32 b = n * 8; - int i; + int32_t i; A = 0x67452301; B = 0xefcdab89; @@ -577,16 +577,16 @@ static uchar sbox[8][4][16] = { {2, 1, 14, 7, 4, 10, 8, 13, 15, 12, 9, 0, 3, 5, 6, 11}} }; -static void permute(char *out, char *in, uchar * p, int n) { - int i; +static void permute(char *out, char *in, uchar * p, int32_t n) { + int32_t i; for (i = 0; i < n; i++) out[i] = in[p[i] - 1]; } -static void l_shift(char *d, int count, int n) { +static void l_shift(char *d, int32_t count, int32_t n) { char out[64]; - int i; + int32_t i; for (i = 0; i < n; i++) out[i] = d[(i + count) % n]; @@ -594,22 +594,22 @@ static void l_shift(char *d, int count, int n) { d[i] = out[i]; } -static void concat(char *out, char *in1, char *in2, int l1, int l2) { +static void concat(char *out, char *in1, char *in2, int32_t l1, int32_t l2) { while (l1--) *out++ = *in1++; while (l2--) *out++ = *in2++; } -void xor(char *out, char *in1, char *in2, int n) { - int i; +void xor(char *out, char *in1, char *in2, int32_t n) { + int32_t i; for (i = 0; i < n; i++) out[i] = in1[i] ^ in2[i]; } -static void dohash(char *out, char *in, char *key, int forw) { - int i, j, k; +static void dohash(char *out, char *in, char *key, int32_t forw) { + int32_t i, j, k; char pk1[56]; char c[28]; char d[28]; @@ -658,7 +658,7 @@ static void dohash(char *out, char *in, char *key, int forw) { b[j][k] = erk[j * 6 + k]; for (j = 0; j < 8; j++) { - int m, n; + int32_t m, n; m = (b[j][0] << 1) | b[j][5]; @@ -688,7 +688,7 @@ static void dohash(char *out, char *in, char *key, int forw) { } static void str_to_key(unsigned char *str, unsigned char *key) { - int i; + int32_t i; key[0] = str[0] >> 1; key[1] = ((str[0] & 0x01) << 6) | (str[1] >> 2); @@ -704,8 +704,8 @@ static void str_to_key(unsigned char *str, unsigned char *key) { } -static void smbhash(unsigned char *out, unsigned char *in, unsigned char *key, int forw) { - int i; +static void smbhash(unsigned char *out, unsigned char *in, unsigned char *key, int32_t forw) { + int32_t i; char outb[64]; char inb[64]; char keyb[64]; @@ -769,7 +769,7 @@ void cred_hash2(unsigned char *out, unsigned char *in, unsigned char *key) { smbhash(out, buf, key2, 1); } -void cred_hash3(unsigned char *out, unsigned char *in, unsigned char *key, int forw) { +void cred_hash3(unsigned char *out, unsigned char *in, unsigned char *key, int32_t forw) { static unsigned char key2[8]; smbhash(out, in, key, forw); @@ -777,12 +777,12 @@ void cred_hash3(unsigned char *out, unsigned char *in, unsigned char *key, int f smbhash(out + 8, in + 8, key2, forw); } -void SamOEMhash(unsigned char *data, unsigned char *key, int val) { +void SamOEMhash(unsigned char *data, unsigned char *key, int32_t val) { unsigned char s_box[256]; unsigned char index_i = 0; unsigned char index_j = 0; unsigned char j = 0; - int ind; + int32_t ind; for (ind = 0; ind < 256; ind++) { s_box[ind] = (unsigned char) ind; @@ -861,7 +861,7 @@ char *safe_strcpy(char *dest, const char *src, size_t maxlength) { len = strlen(src); if (len > maxlength) { - DEBUG(0, ("Error: string overflow by %d in safe_strcpy [%.50s]\n", (int) (len - maxlength), src)); + DEBUG(0, ("Error: string overflow by %d in safe_strcpy [%.50s]\n", (int32_t) (len - maxlength), src)); len = maxlength; } @@ -879,8 +879,8 @@ void strupper(char *s) { if (skip != 0) s += skip; else { - if (islower((int) *s)) - *s = toupper((int) *s); + if (islower((int32_t) *s)) + *s = toupper((int32_t) *s); s++; } } @@ -916,8 +916,8 @@ void SMBencrypt(uchar * passwd, uchar * c8, uchar * p24) { } /* Routines for Windows NT MD4 Hash functions. */ -static int _my_wcslen(int16 * str) { - int len = 0; +static int32_t _my_wcslen(int16 * str) { + int32_t len = 0; while (*str++ != 0) len++; @@ -931,8 +931,8 @@ static int _my_wcslen(int16 * str) { * format. */ -static int _my_mbstowcs(int16 * dst, uchar * src, int len) { - int i; +static int32_t _my_mbstowcs(int16 * dst, uchar * src, int32_t len) { + int32_t i; int16 val; for (i = 0; i < len; i++) { @@ -951,7 +951,7 @@ static int _my_mbstowcs(int16 * dst, uchar * src, int len) { */ void E_md4hash(uchar * passwd, uchar * p16) { - int len; + int32_t len; int16 wpwd[129]; /* Password cannot be longer than 128 characters */ @@ -1051,7 +1051,7 @@ void SMBNTencrypt(uchar * passwd, uchar * c8, uchar * p24) { #if 0 BOOL make_oem_passwd_hash(char data[516], const char *passwd, uchar old_pw_hash[16], BOOL unicode) { - int new_pw_len = strlen(passwd) * (unicode ? 2 : 1); + int32_t new_pw_len = strlen(passwd) * (unicode ? 2 : 1); if (new_pw_len > 512) { DEBUG(0, ("make_oem_passwd_hash: new password is too long.\n")); @@ -1134,7 +1134,7 @@ else \ #define AddString(ptr, header, string) \ { \ char *p = string; \ -int len = 0; \ +int32_t len = 0; \ if (p) len = strlen(p); \ AddBytes(ptr, header, ((unsigned char*)p), len); \ } @@ -1143,7 +1143,7 @@ AddBytes(ptr, header, ((unsigned char*)p), len); \ { \ char *p = string; \ unsigned char *b = NULL; \ -int len = 0; \ +int32_t len = 0; \ if (p) \ { \ len = strlen(p); \ @@ -1162,21 +1162,21 @@ dumpRaw(fp,((unsigned char*)structPtr)+IVAL(&structPtr->header.offset,0),SVAL(&s static void dumpRaw(FILE * fp, unsigned char *buf, size_t len) { - int i; + int32_t i; - for (i = 0; i < (signed int) len; ++i) + for (i = 0; i < (int32_t) len; ++i) fprintf(fp, "%02x ", buf[i]); fprintf(fp, "\n"); } static char *unicodeToString(char *p, size_t len) { - int i; + int32_t i; static char buf[4096]; assert(len + 1 < sizeof buf); - for (i = 0; i < (signed int) len; ++i) { + for (i = 0; i < (int32_t) len; ++i) { buf[i] = *p & 0x7f; p += 2; } @@ -1188,7 +1188,7 @@ static char *unicodeToString(char *p, size_t len) { static unsigned char *strToUnicode(char *p) { static unsigned char buf[4096]; size_t l = strlen(p); - int i = 0; + int32_t i = 0; assert(l * 2 < sizeof buf); @@ -1377,7 +1377,7 @@ static const char base64val[] = { #define DECODE64(c) (isascii(c) ? base64val[c] : BAD) -void to64frombits(unsigned char *out, const unsigned char *in, int inlen) +void to64frombits(unsigned char *out, const unsigned char *in, int32_t inlen) /* raw bytes in quasi-big-endian order to base 64 string (NUL-terminated) */ { @@ -1402,11 +1402,11 @@ void to64frombits(unsigned char *out, const unsigned char *in, int inlen) *out = '\0'; } -int from64tobits(char *out, const char *in) +int32_t from64tobits(char *out, const char *in) /* base 64 to raw bytes in quasi-big-endian order, returning count of bytes */ { - int len = 0; + int32_t len = 0; register unsigned char digit1, digit2, digit3, digit4; if (in[0] == '+' && in[1] == ' ') diff --git a/ntlm.h b/ntlm.h index 1a7db63..85f8f7f 100644 --- a/ntlm.h +++ b/ntlm.h @@ -1,4 +1,3 @@ - /* $Id$ Single file NTLM system to create and parse authentication messages. @@ -52,8 +51,8 @@ included bonus!!: Base64 code - int from64tobits(char *out, const char *in); - void to64frombits(unsigned char *out, const unsigned char *in, int inlen); + int32_t from64tobits(char *out, const char *in); + void to64frombits(unsigned char *out, const unsigned char *in, int32_t inlen); @@ -66,8 +65,16 @@ * These structures are byte-order dependant, and should not * be manipulated except by the use of the routines provided */ +#ifdef __sun + #include +#elif defined(__FreeBSD__) || defined(__IBMCPP__) || defined(_AIX) + #include +#else + #include +#endif + typedef unsigned short uint16; -typedef unsigned int uint32; +typedef uint32_t uint32; typedef unsigned char uint8; typedef struct { @@ -131,10 +138,10 @@ void buildAuthResponse(tSmbNtlmAuthChallenge * challenge, tSmbNtlmAuthResponse * //flags, host, and domain superseeds given by server. Leave 0 and NULL for server authentication /* Base64 code*/ -int from64tobits(char *out, const char *in); -void to64frombits(unsigned char *out, const unsigned char *in, int inlen); +int32_t from64tobits(char *out, const char *in); +void to64frombits(unsigned char *out, const unsigned char *in, int32_t inlen); -void xor(char *out, char *in1, char *in2, int n); +void xor(char *out, char *in1, char *in2, int32_t n); // info functions void dumpAuthRequest(FILE * fp, tSmbNtlmAuthRequest * request); diff --git a/performance.h b/performance.h index 0d753f7..2d4a682 100644 --- a/performance.h +++ b/performance.h @@ -7,8 +7,8 @@ #include /* handles select errors */ -int my_select(int fd, fd_set * fdread, fd_set * fdwrite, fd_set * fdex, long sec, long usec) { - int ret_val; +int32_t my_select(int32_t fd, fd_set * fdread, fd_set * fdwrite, fd_set * fdex, long sec, long usec) { + int32_t ret_val; struct timeval stv; fd_set *fdr2, *fdw2, *fde2; @@ -28,13 +28,13 @@ int my_select(int fd, fd_set * fdread, fd_set * fdwrite, fd_set * fdex, long sec } /*reads in a non-blocking way*/ -ssize_t read_safe(int fd, void *buffer, size_t len) { - int r = 0; - int total = 0; - int toread = len; +ssize_t read_safe(int32_t fd, void *buffer, size_t len) { + int32_t r = 0; + int32_t total = 0; + int32_t toread = len; fd_set fr; struct timeval tv; - int ret = 0; + int32_t ret = 0; (void)fcntl(fd, F_SETFL, O_NONBLOCK); do { diff --git a/postgres_ext.h b/postgres_ext.h index 20affdd..16ceadd 100644 --- a/postgres_ext.h +++ b/postgres_ext.h @@ -27,7 +27,7 @@ /* * Object ID is a fundamental type in Postgres. */ -typedef unsigned int Oid; +typedef uint32_t Oid; #ifdef __cplusplus #define InvalidOid (Oid(0)) @@ -43,7 +43,7 @@ typedef unsigned int Oid; /* * NAMEDATALEN is the max length for system identifiers (e.g. table names, * attribute names, function names, etc). It must be a multiple of - * sizeof(int) (typically 4). + * sizeof(int32_t) (typically 4). * * NOTE that databases with different NAMEDATALEN's cannot interoperate! */ diff --git a/pw-inspector.c b/pw-inspector.c index 003fd00..d5ca29c 100644 --- a/pw-inspector.c +++ b/pw-inspector.c @@ -36,10 +36,10 @@ void help() { exit(-1); } -int main(int argc, char *argv[]) { - int i, j, k; - int sets = 0, countsets = 0, minlen = 0, maxlen = MAXLENGTH, count = 0; - int set_low = 0, set_up = 0, set_no = 0, set_print = 0, set_other = 0; +int32_t main(int32_t argc, char *argv[]) { + int32_t i, j, k; + int32_t sets = 0, countsets = 0, minlen = 0, maxlen = MAXLENGTH, count = 0; + int32_t set_low = 0, set_up = 0, set_no = 0, set_print = 0, set_other = 0; FILE *in = stdin, *out = stdout; char buf[MAXLENGTH + 1]; @@ -136,7 +136,7 @@ int main(int argc, char *argv[]) { if (set_print) { j = 0; for (k = 0; k < strlen(buf); k++) - if (isprint((int) buf[k]) != 0 && isalnum((int) buf[k]) == 0) + if (isprint((int32_t) buf[k]) != 0 && isalnum((int32_t) buf[k]) == 0) j = 1; if (j) i++; @@ -144,7 +144,7 @@ int main(int argc, char *argv[]) { if (set_other) { j = 0; for (k = 0; k < strlen(buf); k++) - if (isprint((int) buf[k]) == 0 && isalnum((int) buf[k]) == 0) + if (isprint((int32_t) buf[k]) == 0 && isalnum((int32_t) buf[k]) == 0) j = 1; if (j) i++; diff --git a/rdp.h b/rdp.h index 0b7c496..1d3c7c4 100644 --- a/rdp.h +++ b/rdp.h @@ -30,7 +30,7 @@ #include #include #include -#define DIR int +#define DIR int32_t #else #include #include @@ -142,7 +142,7 @@ typedef struct stream unsigned char *p; unsigned char *end; unsigned char *data; - unsigned int size; + uint32_t size; /* Offsets of various headers */ unsigned char *iso_hdr; @@ -216,8 +216,8 @@ typedef unsigned char uint8; typedef signed char sint8; typedef unsigned short uint16; typedef signed short sint16; -typedef unsigned int uint32; -typedef signed int sint32; +typedef uint32_t uint32; +typedef int32_t sint32; typedef struct _BOUNDS { @@ -579,14 +579,14 @@ enum RDP_UPDATE_PDU_TYPE #define RDP_INPUT_SCANCODE 4 /* iso.c */ -STREAM iso_init(int length); +STREAM iso_init(int32_t length); void iso_send(STREAM s); STREAM iso_recv(uint8 * rdpver); BOOL iso_connect(char *server, char *username, BOOL reconnect); void iso_disconnect(void); void iso_reset_state(void); /* mcs.c */ -STREAM mcs_init(int length); +STREAM mcs_init(int32_t length); void mcs_send_to_channel(STREAM s, uint16 channel); void mcs_send(STREAM s); STREAM mcs_recv(uint16 * channel, uint8 * rdpver); @@ -598,14 +598,14 @@ void process_orders(STREAM s, uint16 num_orders); void reset_order_state(void); /* rdesktop.c */ void generate_random(uint8 * random); -void *xmalloc(int size); +void *xmalloc(int32_t size); void exit_if_null(void *ptr); char *xstrdup(const char *s); void *xrealloc(void *oldmem, size_t size); void error(char *format, ...); void warning(char *format, ...); void unimpl(char *format, ...); -void hexdump(unsigned char *p, unsigned int len); +void hexdump(unsigned char *p, uint32_t len); /* rdp.c */ static void process_demand_active(STREAM s); static BOOL process_data_pdu(STREAM s, uint32 * ext_disc_reason); @@ -613,10 +613,10 @@ static BOOL process_data_pdu(STREAM s, uint32 * ext_disc_reason); void sec_hash_48(uint8 * out, uint8 * in, uint8 * salt1, uint8 * salt2, uint8 salt); void sec_hash_16(uint8 * out, uint8 * in, uint8 * salt1, uint8 * salt2); void buf_out_uint32(uint8 * buffer, uint32 value); -void sec_sign(uint8 * signature, int siglen, uint8 * session_key, int keylen, uint8 * data, - int datalen); -void sec_decrypt(uint8 * data, int length); -STREAM sec_init(uint32 flags, int maxlen); +void sec_sign(uint8 * signature, int32_t siglen, uint8 * session_key, int32_t keylen, uint8 * data, + int32_t datalen); +void sec_decrypt(uint8 * data, int32_t length); +STREAM sec_init(uint32 flags, int32_t maxlen); void sec_send_to_channel(STREAM s, uint32 flags, uint16 channel); void sec_send(STREAM s, uint32 flags); void sec_process_mcs_data(STREAM s); diff --git a/sasl.c b/sasl.c index dad73da..cf2234e 100644 --- a/sasl.c +++ b/sasl.c @@ -1,14 +1,14 @@ #include "sasl.h" -extern int selected_proxy; +extern int32_t selected_proxy; /* print_hex is used for debug it displays the string buf hexa values of size len */ -int print_hex(unsigned char *buf, int len) { - int i; - int n; +int32_t print_hex(unsigned char *buf, int32_t len) { + int32_t i; + int32_t n; for (i = 0, n = 0; i < len; i++) { if (n > 7) { @@ -26,9 +26,9 @@ int print_hex(unsigned char *buf, int len) { RFC 4013: SASLprep: Stringprep Profile for User Names and Passwords code based on gsasl_saslprep from GSASL project */ -int sasl_saslprep(const char *in, sasl_saslprep_flags flags, char **out) { +int32_t sasl_saslprep(const char *in, sasl_saslprep_flags flags, char **out) { #if LIBIDN - int rc; + int32_t rc; rc = stringprep_profile(in, out, "SASLprep", (flags & SASL_ALLOW_UNASSIGNED) ? STRINGPREP_NO_UNASSIGNED : 0); if (rc != STRINGPREP_OK) { @@ -71,7 +71,7 @@ the first parameter result must be able to hold at least 255 bytes! void sasl_plain(char *result, char *login, char *pass) { char *preplogin; char *preppasswd; - int rc = sasl_saslprep(login, SASL_ALLOW_UNASSIGNED, &preplogin); + int32_t rc = sasl_saslprep(login, SASL_ALLOW_UNASSIGNED, &preplogin); if (rc) { result = NULL; @@ -107,7 +107,7 @@ void sasl_cram_md5(char *result, char *pass, char *challenge) { char opad[64]; unsigned char md5_raw[MD5_DIGEST_LENGTH]; MD5_CTX md5c; - int i, rc; + int32_t i, rc; char *preppasswd; if (challenge == NULL) { @@ -161,7 +161,7 @@ void sasl_cram_sha1(char *result, char *pass, char *challenge) { char opad[64]; unsigned char sha1_raw[SHA_DIGEST_LENGTH]; SHA_CTX shac; - int i, rc; + int32_t i, rc; char *preppasswd; if (challenge == NULL) { @@ -215,7 +215,7 @@ void sasl_cram_sha256(char *result, char *pass, char *challenge) { char opad[64]; unsigned char sha256_raw[SHA256_DIGEST_LENGTH]; SHA256_CTX sha256c; - int i, rc; + int32_t i, rc; char *preppasswd; if (challenge == NULL) { @@ -262,17 +262,17 @@ void sasl_cram_sha256(char *result, char *pass, char *challenge) { RFC 2831: Using Digest Authentication as a SASL Mechanism the parameter result must be able to hold at least 500 bytes!! */ -void sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char *miscptr, char *type, char *webtarget, int webport, char *header) { +void sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char *miscptr, char *type, char *webtarget, int32_t webport, char *header) { char *pbuffer = NULL; - int array_size = 10; + int32_t array_size = 10; unsigned char response[MD5_DIGEST_LENGTH]; char *array[array_size]; char buffer2[500], buffer3[500], nonce[200], realm[50], algo[20]; - int i = 0, ind = 0, lastpos = 0, currentpos = 0, intq = 0, auth_find = 0; + int32_t i = 0, ind = 0, lastpos = 0, currentpos = 0, intq = 0, auth_find = 0; MD5_CTX md5c; char *preplogin; char *preppasswd; - int rc = sasl_saslprep(login, SASL_ALLOW_UNASSIGNED, &preplogin); + int32_t rc = sasl_saslprep(login, SASL_ALLOW_UNASSIGNED, &preplogin); memset(realm, 0, sizeof(realm)); if (rc) { @@ -286,7 +286,7 @@ void sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char * return; } //DEBUG S: nonce="HB3HGAk+hxKpijy/ichq7Wob3Zo17LPM9rr4kMX7xRM=",realm="tida",qop="auth",maxbuf=4096,charset=utf-8,algorithm=md5-sess -//DEBUG S: nonce="1Mr6c8WjOd/x5r8GUnGeQIRNUtOVtItu3kQOGAmsZfM=",realm="test.com",qop="auth,auth-int,auth-conf",cipher="rc4-40,rc4-56,rc4,des,3des",maxbuf=4096,charset=utf-8,algorithm=md5-sess +//DEBUG S: nonce="1Mr6c8WjOd/x5r8GUnGeQIRNUtOVtItu3kQOGAmsZfM=",realm="test.com",qop="auth,auth-int32_t,auth-conf",cipher="rc4-40,rc4-56,rc4,des,3des",maxbuf=4096,charset=utf-8,algorithm=md5-sess //warning some not well configured xmpp server is sending no realm //DEBUG S: nonce="3448160828",qop="auth",charset=utf-8,algorithm=md5-sess pbuffer = buffer; @@ -329,13 +329,13 @@ void sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char * //check if it contains double-quote if (strstr(array[i], "\"") != NULL) { //assume last char is also a double-quote - int nonce_string_len = strlen(array[i]) - strlen("nonce=\"") - 1; + int32_t nonce_string_len = strlen(array[i]) - strlen("nonce=\"") - 1; if ((nonce_string_len > 0) && (nonce_string_len <= sizeof(nonce) - 1)) { strncpy(nonce, strstr(array[i], "nonce=") + strlen("nonce=") + 1, nonce_string_len); nonce[nonce_string_len] = '\0'; } else { - int j; + int32_t j; for (j = 0; j < ind; j++) if (array[j] != NULL) @@ -352,13 +352,13 @@ void sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char * if (strstr(array[i], "realm=") != NULL) { if (strstr(array[i], "\"") != NULL) { //assume last char is also a double-quote - int realm_string_len = strlen(array[i]) - strlen("realm=\"") - 1; + int32_t realm_string_len = strlen(array[i]) - strlen("realm=\"") - 1; if ((realm_string_len > 0) && (realm_string_len <= sizeof(realm) - 1)) { strncpy(realm, strstr(array[i], "realm=") + strlen("realm=") + 1, realm_string_len); realm[realm_string_len] = '\0'; } else { - int i; + int32_t i; for (i = 0; i < ind; i++) if (array[i] != NULL) @@ -375,13 +375,13 @@ void sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char * if (strstr(array[i], "qop=") != NULL) { /* -The value "auth" indicates authentication; the value "auth-int" indicates +The value "auth" indicates authentication; the value "auth-int32_t" indicates authentication with integrity protection; the value "auth-conf" indicates authentication with integrity protection and encryption. */ auth_find = 1; if ((strstr(array[i], "\"auth\"") == NULL) && (strstr(array[i], "\"auth,") == NULL) && (strstr(array[i], ",auth\"") == NULL)) { - int j; + int32_t j; for (j = 0; j < ind; j++) if (array[j] != NULL) @@ -394,13 +394,13 @@ indicates authentication with integrity protection and encryption. if (strstr(array[i], "algorithm=") != NULL) { if (strstr(array[i], "\"") != NULL) { //assume last char is also a double-quote - int algo_string_len = strlen(array[i]) - strlen("algorithm=\"") - 1; + int32_t algo_string_len = strlen(array[i]) - strlen("algorithm=\"") - 1; if ((algo_string_len > 0) && (algo_string_len <= sizeof(algo) - 1)) { strncpy(algo, strstr(array[i], "algorithm=") + strlen("algorithm=") + 1, algo_string_len); algo[algo_string_len] = '\0'; } else { - int j; + int32_t j; for (j = 0; j < ind; j++) if (array[j] != NULL) @@ -414,7 +414,7 @@ indicates authentication with integrity protection and encryption. algo[sizeof(algo) - 1] = '\0'; } if ((strstr(algo, "MD5") == NULL) && (strstr(algo, "md5") == NULL)) { - int j; + int32_t j; for (j = 0; j < ind; j++) if (array[j] != NULL) @@ -558,10 +558,10 @@ and my girlfriend that let me work on that 2 whole nights ;) clientfirstmessagebare must be at least 500 bytes in size! */ void sasl_scram_sha1(char *result, char *pass, char *clientfirstmessagebare, char *serverfirstmessage) { - int saltlen = 0; - int iter = 4096; + int32_t saltlen = 0; + int32_t iter = 4096; char *salt, *nonce, *ic; - unsigned int resultlen = 0; + uint32_t resultlen = 0; char clientfinalmessagewithoutproof[200]; char buffer[500]; unsigned char SaltedPassword[SHA_DIGEST_LENGTH]; @@ -572,7 +572,7 @@ void sasl_scram_sha1(char *result, char *pass, char *clientfirstmessagebare, cha char ClientProof[SHA_DIGEST_LENGTH]; unsigned char clientproof_b64[50]; char *preppasswd; - int rc = sasl_saslprep(pass, 0, &preppasswd); + int32_t rc = sasl_saslprep(pass, 0, &preppasswd); if (rc) { result = NULL; diff --git a/sasl.h b/sasl.h index dd6725e..29622d7 100644 --- a/sasl.h +++ b/sasl.h @@ -32,10 +32,10 @@ typedef enum { } sasl_saslprep_flags; -int print_hex(unsigned char *buf, int len); +int32_t print_hex(unsigned char *buf, int32_t len); void sasl_plain(char *result, char *login, char *pass); -int sasl_saslprep(const char *in, sasl_saslprep_flags flags, char **out); +int32_t sasl_saslprep(const char *in, sasl_saslprep_flags flags, char **out); #ifdef LIBOPENSSL #include @@ -45,6 +45,6 @@ int sasl_saslprep(const char *in, sasl_saslprep_flags flags, char **out); void sasl_cram_md5(char *result, char *pass, char *challenge); void sasl_cram_sha1(char *result, char *pass, char *challenge); void sasl_cram_sha256(char *result, char *pass, char *challenge); -void sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char *miscptr, char *type, char *webtarget, int webport, char *header); +void sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char *miscptr, char *type, char *webtarget, int32_t webport, char *header); void sasl_scram_sha1(char *result, char *pass, char *clientfirstmessagebare, char *serverfirstmessage); #endif From 044bab0c2c7a7841a3e7bae1b1c5b88a83ff124e Mon Sep 17 00:00:00 2001 From: van Hauser Date: Wed, 5 Jul 2017 08:48:20 +0200 Subject: [PATCH 061/531] makefile fix --- Makefile | 89 ++------------------------------------------------------ 1 file changed, 2 insertions(+), 87 deletions(-) diff --git a/Makefile b/Makefile index 6019d93..372e67e 100644 --- a/Makefile +++ b/Makefile @@ -1,90 +1,5 @@ -CC=gcc -STRIP=strip -XDEFINES= -DLIBOPENSSL -DHAVE_PCRE -DLIBSVN -DLIBSSH -DHAVE_ZLIB -DHAVE_MATH_H -XLIBS= -lz -lssl -lpcre -lsvn_client-1 -lapr-1 -laprutil-1 -lsvn_subr-1 -lssh -lcrypto -XLIBPATHS=-L/usr/lib -L/usr/local/lib -L/lib -L/lib -L/usr/local/lib -L/lib -XIPATHS= -I/usr/include -I/usr/local/include -I/usr/include/subversion-1 -I/usr/include/apr-1 -I/usr/include/subversion-1 -PREFIX=/usr/local -XHYDRA_SUPPORT= -STRIP=strip - -HYDRA_LOGO=hydra-logo.o -PWI_LOGO=pw-inspector-logo.o -SEC=-fstack-protector-all --param ssp-buffer-size=4 -D_FORTIFY_SOURCE=2 - -# -# Makefile for Hydra - (c) 2001-2017 by van Hauser / THC -# -OPTS=-I. -O3 -# -Wall -g -pedantic -LIBS=-lm -BINDIR = /bin -MANDIR ?= /man/man1/ -DATADIR ?= /etc -DESTDIR ?= - -SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ - hydra-telnet.c hydra-cisco.c hydra-http.c hydra-ftp.c hydra-imap.c \ - hydra-pop3.c hydra-smb.c hydra-icq.c hydra-cisco-enable.c hydra-ldap.c \ - hydra-mysql.c hydra-mssql.c hydra-xmpp.c hydra-http-proxy-urlenum.c \ - hydra-snmp.c hydra-cvs.c hydra-smtp.c hydra-smtp-enum.c hydra-sapr3.c hydra-ssh.c \ - hydra-sshkey.c hydra-teamspeak.c hydra-postgres.c hydra-rsh.c hydra-rlogin.c \ - hydra-oracle-listener.c hydra-svn.c hydra-pcanywhere.c hydra-sip.c \ - hydra-oracle.c hydra-vmauthd.c hydra-asterisk.c hydra-firebird.c hydra-afp.c hydra-ncp.c \ - hydra-oracle-sid.c hydra-http-proxy.c hydra-http-form.c hydra-irc.c \ - hydra-rdp.c hydra-s7-300.c hydra-redis.c hydra-adam6500.c \ - crc32.c d3des.c bfg.c ntlm.c sasl.c hmacmd5.c hydra-mod.c hydra-rtsp.c hydra-time.c hydra-rpcap.c -OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ - hydra-telnet.o hydra-cisco.o hydra-http.o hydra-ftp.o hydra-imap.o \ - hydra-pop3.o hydra-smb.o hydra-icq.o hydra-cisco-enable.o hydra-ldap.o \ - hydra-mysql.o hydra-mssql.o hydra-xmpp.o hydra-http-proxy-urlenum.o \ - hydra-snmp.o hydra-cvs.o hydra-smtp.o hydra-smtp-enum.o hydra-sapr3.o hydra-ssh.o \ - hydra-sshkey.o hydra-teamspeak.o hydra-postgres.o hydra-rsh.o hydra-rlogin.o \ - hydra-oracle-listener.o hydra-svn.o hydra-pcanywhere.o hydra-sip.o \ - hydra-oracle-sid.o hydra-oracle.o hydra-vmauthd.o hydra-asterisk.o hydra-firebird.o hydra-afp.o hydra-ncp.o \ - hydra-http-proxy.o hydra-http-form.o hydra-irc.o hydra-redis.o \ - hydra-rdp.o hydra-s7-300.c hydra-adam6500.o \ - crc32.o d3des.o bfg.o ntlm.o sasl.o hmacmd5.o hydra-mod.o hydra-rtsp.o hydra-time.o hydra-rpcap.o -BINS = hydra pw-inspector - -EXTRA_DIST = README README.arm README.palm CHANGES TODO INSTALL LICENSE \ - hydra-mod.h hydra.h crc32.h d3des.h - -all: pw-inspector hydra $(XHYDRA_SUPPORT) - @echo - @echo Now type "make install" - -hydra: hydra.c $(OBJ) - $(CC) $(OPTS) $(SEC) $(LIBS) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o hydra $(HYDRA_LOGO) hydra.c $(OBJ) $(LIBS) $(XLIBS) $(XLIBPATHS) $(XIPATHS) $(XDEFINES) - @echo - @echo If men could get pregnant, abortion would be a sacrament - @echo - -xhydra: - -cd hydra-gtk && sh ./make_xhydra.sh - -pw-inspector: pw-inspector.c - -$(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o pw-inspector $(PWI_LOGO) pw-inspector.c - -.c.o: - $(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) -c $< $(XDEFINES) $(XIPATHS) - -strip: all - strip $(BINS) - -echo OK > /dev/null && test -x xhydra && strip xhydra || echo OK > /dev/null - -install: strip - -mkdir -p $(DESTDIR)$(PREFIX)$(BINDIR) - cp -f hydra-wizard.sh $(BINS) $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 hydra-wizard.sh $(BINS) - -echo OK > /dev/null && test -x xhydra && cp xhydra $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 xhydra || echo OK > /dev/null - -sed -e "s|^INSTALLDIR=.*|INSTALLDIR="$(PREFIX)"|" dpl4hydra.sh | sed -e "s|^LOCATION=.*|LOCATION="$(DATADIR)"|" > $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh - -chmod 755 $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh - -mkdir -p $(DESTDIR)$(PREFIX)$(DATADIR) - -cp -f *.csv $(DESTDIR)$(PREFIX)$(DATADIR) - -mkdir -p $(DESTDIR)$(PREFIX)$(MANDIR) - -cp -f hydra.1 xhydra.1 pw-inspector.1 $(DESTDIR)$(PREFIX)$(MANDIR) +all: + @echo Error: you must run "./configure" first clean: - rm -rf xhydra pw-inspector hydra *.o core *.core *.stackdump *~ Makefile.in Makefile dev_rfc hydra.restore arm/*.ipk arm/ipkg/usr/bin/* hydra-gtk/src/*.o hydra-gtk/src/xhydra hydra-gtk/stamp-h hydra-gtk/config.status hydra-gtk/errors hydra-gtk/config.log hydra-gtk/src/.deps hydra-gtk/src/Makefile hydra-gtk/Makefile cp -f Makefile.orig Makefile - From 644568954562264b8ea3ff16f1ed9490cc04d772 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 6 Jul 2017 21:29:59 +0200 Subject: [PATCH 062/531] show device on IPv6 LL addresses --- hydra-mod.c | 4 ++++ hydra.c | 2 +- 2 files changed, 5 insertions(+), 1 deletion(-) diff --git a/hydra-mod.c b/hydra-mod.c index 3c9fc69..2e9d763 100644 --- a/hydra-mod.c +++ b/hydra-mod.c @@ -1216,6 +1216,10 @@ char *hydra_address2string(char *address) { if (address[0] == 16) { memcpy(&target6.sin6_addr, &address[1], 16); inet_ntop(AF_INET6, &target6.sin6_addr, ipstring, sizeof(ipstring)); + if (hydra_targets[i]->ip[17] != 0) { + strcat(ipstring, "%"); + strcat(ipstring, hydra_targets[i]->ip[17]); + } return ipstring; } else #endif diff --git a/hydra.c b/hydra.c index 314ab47..227fa64 100644 --- a/hydra.c +++ b/hydra.c @@ -3564,9 +3564,9 @@ int32_t main(int32_t argc, char *argv[]) { ipv4 = NULL; #ifdef AF_INET6 ipv6 = NULL; +#endif if ((device = index(hydra_targets[i]->target, '%')) != NULL) *device++ = 0; -#endif if (getaddrinfo(hydra_targets[i]->target, NULL, &hints, &res) != 0) { if (use_proxy == 0) { if (verbose) From f4eb8d013214fa9c4f2860cccc86dd4efc92ec4e Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 6 Jul 2017 21:32:46 +0200 Subject: [PATCH 063/531] show device on IPv6 LL addresses --- hydra-mod.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/hydra-mod.c b/hydra-mod.c index 2e9d763..1593639 100644 --- a/hydra-mod.c +++ b/hydra-mod.c @@ -1216,9 +1216,9 @@ char *hydra_address2string(char *address) { if (address[0] == 16) { memcpy(&target6.sin6_addr, &address[1], 16); inet_ntop(AF_INET6, &target6.sin6_addr, ipstring, sizeof(ipstring)); - if (hydra_targets[i]->ip[17] != 0) { + if (address[17] != 0) { strcat(ipstring, "%"); - strcat(ipstring, hydra_targets[i]->ip[17]); + strcat(ipstring, address + 17); } return ipstring; } else From bbb54239b79e3d3359be575b269942039ce1d435 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 6 Jul 2017 21:34:42 +0200 Subject: [PATCH 064/531] fix --- hydra.h | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/hydra.h b/hydra.h index d0e2f5c..d7ba0a8 100644 --- a/hydra.h +++ b/hydra.h @@ -1,4 +1,4 @@ -#ifndef _HYDRA_H + #include #ifdef __sun @@ -155,13 +155,13 @@ #ifndef _WIN32 -int sleepn(time_t seconds); -int usleepn(long useconds); +int32_t sleepn(time_t seconds); +int32_t usleepn(long useconds); #else -int sleepn(unsigned int seconds); -int usleepn(unsigned int useconds); +int32_t sleepn(uint32_t seconds); +int32_t usleepn(uint32_t useconds); #endif From e141c59d2a2460c9fd0cec9725dd7aa2c439203e Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 6 Jul 2017 21:37:59 +0200 Subject: [PATCH 065/531] fix --- hydra.h | 28 ++++++++++++---------------- 1 file changed, 12 insertions(+), 16 deletions(-) diff --git a/hydra.h b/hydra.h index d7ba0a8..1184a00 100644 --- a/hydra.h +++ b/hydra.h @@ -1,4 +1,4 @@ - +#ifndef _HYDRA_H #include #ifdef __sun @@ -30,20 +30,20 @@ #include #ifdef HAVE_OPENSSL -#define HYDRA_SSL + #define HYDRA_SSL #endif #ifdef HAVE_SSL -#ifndef HYDRA_SSL -#define HYDRA_SSL -#endif + #ifndef HYDRA_SSL + #define HYDRA_SSL + #endif #endif #ifdef LIBSSH -#include + #include #endif #ifdef HAVE_ZLIB -#include + #include #endif #define OPTION_SSL 1 @@ -148,21 +148,17 @@ #define True 1 #ifndef INET_ADDRSTRLEN -#define INET_ADDRSTRLEN 16 + #define INET_ADDRSTRLEN 16 #endif #define MAX_PROXY_COUNT 64 #ifndef _WIN32 - -int32_t sleepn(time_t seconds); -int32_t usleepn(long useconds); - + int32_t sleepn(time_t seconds); + int32_t usleepn(long useconds); #else - -int32_t sleepn(uint32_t seconds); -int32_t usleepn(uint32_t useconds); - + int32_t sleepn(uint32_t seconds); + int32_t usleepn(uint32_t useconds); #endif #define _HYDRA_H From 7613700a5a9a3803757c2ad3a9d9f3a787bf98d2 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 6 Jul 2017 21:39:01 +0200 Subject: [PATCH 066/531] fix --- hydra.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra.h b/hydra.h index 1184a00..cece25c 100644 --- a/hydra.h +++ b/hydra.h @@ -155,7 +155,7 @@ #ifndef _WIN32 int32_t sleepn(time_t seconds); - int32_t usleepn(long useconds); + int32_t usleepn(int64_t useconds); #else int32_t sleepn(uint32_t seconds); int32_t usleepn(uint32_t useconds); From 11176a1080d9aaae76ef91d2265a5f4e83435804 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 6 Jul 2017 22:25:09 +0200 Subject: [PATCH 067/531] stdint fixes --- hydra-http-form.c | 2 +- hydra-mod.c | 4 +++- hydra.c | 53 +++++++++++++++++++++++++---------------------- 3 files changed, 32 insertions(+), 27 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 4d84126..58f0ddf 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -343,7 +343,7 @@ void hdrrepv(ptr_header_node * ptr_head, char *hdrname, char *new_value) { if (cur_ptr->value) strcpy(cur_ptr->value, new_value); else { - hydra_report(stderr, "[ERROR] Out of memory (hdrrepv %lu)", strlen(new_value) + 1); + hydra_report(stderr, "[ERROR] Out of memory (hdrrepv %u)", strlen(new_value) + 1); hydra_child_exit(0); } } diff --git a/hydra-mod.c b/hydra-mod.c index 1593639..b2ab4c4 100644 --- a/hydra-mod.c +++ b/hydra-mod.c @@ -1215,11 +1215,13 @@ char *hydra_address2string(char *address) { #ifdef AF_INET6 if (address[0] == 16) { memcpy(&target6.sin6_addr, &address[1], 16); - inet_ntop(AF_INET6, &target6.sin6_addr, ipstring, sizeof(ipstring)); + ipstring[0] = '[ + inet_ntop(AF_INET6, &target6.sin6_addr, ipstring + 1, sizeof(ipstring) - 1); if (address[17] != 0) { strcat(ipstring, "%"); strcat(ipstring, address + 17); } + strcat(ipstring, "]"); return ipstring; } else #endif diff --git a/hydra.c b/hydra.c index 227fa64..1ec958f 100644 --- a/hydra.c +++ b/hydra.c @@ -617,7 +617,7 @@ void hydra_debug(int32_t force, char *string) { if (!debug && !force) return; - printf("[DEBUG] Code: %s Time: %lu\n", string, (uint64_t) time(NULL)); + printf("[DEBUG] Code: %s Time: %llu\n", string, (uint64_t) time(NULL)); printf("[DEBUG] Options: mode %d ssl %d restore %d showAttempt %d tasks %d max_use %d tnp %d tpsal %d tprl %d exit_found %d miscptr %s service %s\n", hydra_options.mode, hydra_options.ssl, hydra_options.restore, hydra_options.showAttempt, hydra_options.tasks, hydra_options.max_use, @@ -625,7 +625,7 @@ void hydra_debug(int32_t force, char *string) { hydra_options.try_password_reverse_login, hydra_options.exit_found, STR_NULL(hydra_options.miscptr), hydra_options.service); - printf("[DEBUG] Brains: active %d targets %d finished %d todo_all %lu todo %lu sent %lu found %lu countlogin %lu sizelogin %lu countpass %lu sizepass %lu\n", + printf("[DEBUG] Brains: active %d targets %d finished %d todo_all %llu todo %llu sent %llu found %llu countlogin %llu sizelogin %llu countpass %llu sizepass %llu\n", hydra_brains.active, hydra_brains.targets, hydra_brains.finished, hydra_brains.todo_all + total_redo_count, hydra_brains.todo, hydra_brains.sent, hydra_brains.found, @@ -637,7 +637,7 @@ void hydra_debug(int32_t force, char *string) { for (i = 0; i < hydra_brains.targets; i++) { hydra_target* target = hydra_targets[i]; printf - ("[DEBUG] Target %d - target %s ip %s login_no %lu pass_no %lu sent %lu pass_state %d redo_state %d (%d redos) use_count %d failed %d done %d fail_count %d login_ptr %s pass_ptr %s\n", + ("[DEBUG] Target %d - target %s ip %s login_no %llu pass_no %llu sent %llu pass_state %d redo_state %d (%d redos) use_count %d failed %d done %d fail_count %d login_ptr %s pass_ptr %s\n", i, STR_NULL(target->target), hydra_address2string(target->ip), target->login_no, target->pass_no, target->sent, target->pass_state, target->redo_state, target->redo, @@ -740,7 +740,7 @@ void hydra_restore_write(int32_t print_msg) { for (j = 0; j < hydra_options.max_use; j++) { memcpy((char *) &hh, hydra_heads[j], sizeof(hydra_head)); if (j == 0 && debug) { - printf("[DEBUG] sizeof hydra_head: %lu\n", sizeof(hydra_head)); + printf("[DEBUG] sizeof hydra_head: %u\n", sizeof(hydra_head)); printf("[DEBUG] memcmp: %d\n", memcmp(hydra_heads[j], &hh, sizeof(hydra_head))); } hh.active = 0; // re-enable disabled heads @@ -1556,14 +1556,14 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { if (debug) printf - ("[DEBUG] send_next_pair_init target %d, head %d, redo %d, redo_state %d, pass_state %d. loop_mode %d, curlogin %s, curpass %s, tlogin %s, tpass %s, logincnt %lu/%lu, passcnt %lu/%lu, loop_cnt %d\n", + ("[DEBUG] send_next_pair_init target %d, head %d, redo %d, redo_state %d, pass_state %d. loop_mode %d, curlogin %s, curpass %s, tlogin %s, tpass %s, logincnt %llu/%llu, passcnt %llu/%llu, loop_cnt %d\n", target_no, head_no, hydra_targets[target_no]->redo, hydra_targets[target_no]->redo_state, hydra_targets[target_no]->pass_state, hydra_options.loop_mode, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, hydra_targets[target_no]->login_ptr, hydra_targets[target_no]->pass_ptr, hydra_targets[target_no]->login_no, hydra_brains.countlogin, hydra_targets[target_no]->pass_no, hydra_brains.countpass, loop_cnt); if (loop_cnt > (hydra_brains.countlogin * 2) + 1 && loop_cnt > (hydra_brains.countpass * 2) + 1) { if (debug) - printf("[DEBUG] too many loops in send_next_pair, returning -1 (loop_cnt %d, sent %lu, todo %lu)\n", loop_cnt, hydra_targets[target_no]->sent, hydra_brains.todo); + printf("[DEBUG] too many loops in send_next_pair, returning -1 (loop_cnt %d, sent %llu, todo %llu)\n", loop_cnt, hydra_targets[target_no]->sent, hydra_brains.todo); return -1; } @@ -1573,7 +1573,7 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { snpdone = 1; } else { if (debug && (hydra_heads[head_no]->current_login_ptr != NULL || hydra_heads[head_no]->current_pass_ptr != NULL)) - printf("[COMPLETED] target %s - login \"%s\" - pass \"%s\" - child %d - %lu of %lu\n", + printf("[COMPLETED] target %s - login \"%s\" - pass \"%s\" - child %d - %llu of %llu\n", hydra_targets[target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, head_no, hydra_targets[target_no]->sent, hydra_brains.todo + hydra_targets[target_no]->redo); hydra_heads[head_no]->redo = 0; @@ -1883,7 +1883,7 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { return 0; // not prevent disabling it, if its needed its already done in the above line } if (debug || hydra_options.showAttempt) { - printf("[%sATTEMPT] target %s - login \"%s\" - pass \"%s\" - %lu of %lu [child %d] (%d/%d)\n", + printf("[%sATTEMPT] target %s - login \"%s\" - pass \"%s\" - %llu of %llu [child %d] (%d/%d)\n", hydra_targets[target_no]->redo_state ? "REDO-" : snp_is_redo ? "RE-" : "", hydra_targets[target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, hydra_targets[target_no]->sent, hydra_brains.todo + hydra_targets[target_no]->redo, head_no, hydra_targets[target_no]->redo_state ? hydra_targets[target_no]->redo_state - 1 : 0, hydra_targets[target_no]->redo); } @@ -3165,11 +3165,11 @@ int32_t main(int32_t argc, char *argv[]) { exit(-1); } if (hydra_brains.countlogin > MAX_LINES) { - fprintf(stderr, "[ERROR] Maximum number of logins is %d, this file has %lu entries.\n", MAX_LINES, hydra_brains.countlogin); + fprintf(stderr, "[ERROR] Maximum number of logins is %d, this file has %llu entries.\n", MAX_LINES, hydra_brains.countlogin); exit(-1); } if (hydra_brains.sizelogin > MAX_BYTES) { - fprintf(stderr, "[ERROR] Maximum size of the login file is %d, this file has %lu bytes.\n", MAX_BYTES, (uint64_t) hydra_brains.sizelogin); + fprintf(stderr, "[ERROR] Maximum size of the login file is %d, this file has %llu bytes.\n", MAX_BYTES, (uint64_t) hydra_brains.sizelogin); exit(-1); } login_ptr = malloc(hydra_brains.sizelogin + hydra_brains.countlogin + 8); @@ -3194,11 +3194,11 @@ int32_t main(int32_t argc, char *argv[]) { exit(-1); } if (hydra_brains.countpass > MAX_LINES) { - fprintf(stderr, "[ERROR] Maximum number of passwords is %d, this file has %lu entries.\n", MAX_LINES, hydra_brains.countpass); + fprintf(stderr, "[ERROR] Maximum number of passwords is %d, this file has %llu entries.\n", MAX_LINES, hydra_brains.countpass); exit(-1); } if (hydra_brains.sizepass > MAX_BYTES) { - fprintf(stderr, "[ERROR] Maximum size of the password file is %d, this file has %lu bytes.\n", MAX_BYTES, (uint64_t) hydra_brains.sizepass); + fprintf(stderr, "[ERROR] Maximum size of the password file is %d, this file has %llu bytes.\n", MAX_BYTES, (uint64_t) hydra_brains.sizepass); exit(-1); } pass_ptr = malloc(hydra_brains.sizepass + hydra_brains.countpass + 8); @@ -3241,11 +3241,11 @@ int32_t main(int32_t argc, char *argv[]) { exit(-1); } if (hydra_brains.countlogin > MAX_LINES / 2) { - fprintf(stderr, "[ERROR] Maximum number of colon file entries is %d, this file has %lu entries.\n", MAX_LINES / 2, hydra_brains.countlogin); + fprintf(stderr, "[ERROR] Maximum number of colon file entries is %d, this file has %llu entries.\n", MAX_LINES / 2, hydra_brains.countlogin); exit(-1); } if (hydra_brains.sizelogin > MAX_BYTES / 2) { - fprintf(stderr, "[ERROR] Maximum size of the colon file is %d, this file has %lu bytes.\n", MAX_BYTES / 2, (uint64_t) hydra_brains.sizelogin); + fprintf(stderr, "[ERROR] Maximum size of the colon file is %d, this file has %llu bytes.\n", MAX_BYTES / 2, (uint64_t) hydra_brains.sizelogin); exit(-1); } csv_ptr = malloc(hydra_brains.sizelogin + 2 * hydra_brains.countlogin + 8); @@ -3465,7 +3465,7 @@ int32_t main(int32_t argc, char *argv[]) { bail("No login/password combination given!"); if (hydra_brains.todo < hydra_options.tasks) { if (verbose && hydra_options.tasks != TASKS) - printf("[VERBOSE] More tasks defined than login/pass pairs exist. Tasks reduced to %lu\n", hydra_brains.todo); + printf("[VERBOSE] More tasks defined than login/pass pairs exist. Tasks reduced to %llu\n", hydra_brains.todo); hydra_options.tasks = hydra_brains.todo; } } @@ -3500,13 +3500,16 @@ int32_t main(int32_t argc, char *argv[]) { if (hydra_options.ssl) options = options | OPTION_SSL; if (hydra_options.colonfile != NULL) - printf("[DATA] max %d task%s per %d server%s, overall %d tasks, %lu login tr%s, ~%lu tr%s per task\n", hydra_options.tasks, hydra_options.tasks == 1 ? "" : "s", + printf("[DATA] max %d task%s per %d server%s, overall %d tasks, %llu login tr%s, ~%llu tr%s per task\n", hydra_options.tasks, hydra_options.tasks == 1 ? "" : "s", hydra_brains.targets, hydra_brains.targets == 1 ? "" : "s", hydra_options.max_use, hydra_brains.todo, hydra_brains.todo == 1 ? "y" : "ies", math2, math2 == 1 ? "y" : "ies"); else - printf("[DATA] max %d task%s per %d server%s, overall %d tasks, %lu login tr%s (l:%lu/p:%lu), ~%lu tr%s per task\n", hydra_options.tasks, hydra_options.tasks == 1 ? "" : "s", - hydra_brains.targets, hydra_brains.targets == 1 ? "" : "s", hydra_options.max_use, hydra_brains.todo, hydra_brains.todo == 1 ? "y" : "ies", - (uint64_t) hydra_brains.countlogin, (uint64_t) hydra_brains.countpass, math2, math2 == 1 ? "y" : "ies"); + printf("[DATA] max %d task%s per %d server%s, overall %d task%s, %llu login tr%s (l:%llu/p:%llu), ~%llu tr%s per task\n", hydra_options.tasks, hydra_options.tasks == 1 ? "" : "s", + hydra_brains.targets, hydra_brains.targets == 1 ? "" : "s", + hydra_options.max_use, hydra_options.max_use == 1 ? "" : "s", + hydra_brains.todo, hydra_brains.todo == 1 ? "y" : "ies", + (uint64_t) hydra_brains.countlogin, (uint64_t) hydra_brains.countpass, + math2, math2 == 1 ? "y" : "ies"); printf("[DATA] attacking service %s on port %d%s\n", hydra_options.service, port, hydra_options.ssl == 1 ? " with SSL" : ""); if (hydra_options.miscptr != NULL && hydra_options.miscptr[0] != 0) @@ -3843,7 +3846,7 @@ int32_t main(int32_t argc, char *argv[]) { case 'C': // head reports connect error fck = write(hydra_heads[head_no]->sp[0], "Q", 1); if (debug) { - printf("[ATTEMPT-ERROR] target %s - login \"%s\" - pass \"%s\" - child %d - %lu of %lu\n", + printf("[ATTEMPT-ERROR] target %s - login \"%s\" - pass \"%s\" - child %d - %llu of %llu\n", hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, head_no, hydra_targets[hydra_heads[head_no]->target_no]->sent, hydra_brains.todo); } @@ -3892,7 +3895,7 @@ int32_t main(int32_t argc, char *argv[]) { hydra_increase_fail_count(hydra_heads[head_no]->target_no, head_no); } } - //if (debug) printf("DEBUG: bug hunt: %lu %lu\n", hydra_brains.todo_all, hydra_brains.sent); + //if (debug) printf("DEBUG: bug hunt: %llu %llu\n", hydra_brains.todo_all, hydra_brains.sent); usleepn(USLEEP_LOOP); (void) wait3(NULL, WNOHANG, NULL); @@ -3927,11 +3930,11 @@ int32_t main(int32_t argc, char *argv[]) { for (i = 0; i < hydra_options.max_use; i++) if (hydra_heads[i]->active > 0 && hydra_heads[i]->pid > 0) hydra_kill_head(i, 1, 3); - printf("[BUG] %lu + %d < %lu\n", hydra_brains.todo_all, total_redo_count, hydra_brains.sent); + printf("[BUG] %llu + %d < %llu\n", hydra_brains.todo_all, total_redo_count, hydra_brains.sent); bail("[BUG] Weird bug detected where more tests were performed than possible. Please rerun with -d command line switch and post all output plus command line here: https://github.com/vanhauser-thc/thc-hydra/issues/113 or send it in an email to vh@thc.org"); } */ - printf("[STATUS] %.2f tries/min, %lu tries in %02lu:%02luh, %lu to do in %02lu:%02luh, %d active\n", (1.0 * hydra_brains.sent) / (((elapsed_status - starttime) * 1.0) / 60), // tries/min + printf("[STATUS] %.2f tries/min, %llu tries in %02llu:%02lluh, %llu to do in %02lu:%02luh, %d active\n", (1.0 * hydra_brains.sent) / (((elapsed_status - starttime) * 1.0) / 60), // tries/min hydra_brains.sent, // tries (uint64_t) ((elapsed_status - starttime) / 3600), // hours (uint64_t) (((elapsed_status - starttime) % 3600) / 60), // minutes @@ -3976,7 +3979,7 @@ int32_t main(int32_t argc, char *argv[]) { fprintf(stderr, "[ERROR] illegal target result value (%d=>%d)\n", i, hydra_targets[i]->done); } - printf("%d of %d target%s%scompleted, %lu valid password%s found\n", hydra_brains.targets - j - k - error, hydra_brains.targets, hydra_brains.targets == 1 ? " " : "s ", + printf("%d of %d target%s%scompleted, %llu valid password%s found\n", hydra_brains.targets - j - k - error, hydra_brains.targets, hydra_brains.targets == 1 ? " " : "s ", hydra_brains.found > 0 ? "successfully " : "", hydra_brains.found, hydra_brains.found == 1 ? "" : "s"); error += j; @@ -4047,7 +4050,7 @@ int32_t main(int32_t argc, char *argv[]) { printf("%s (%s) finished at %s\n", PROGRAM, RESOURCE, hydra_build_time()); if (hydra_brains.ofp != NULL && hydra_brains.ofp != stdout) { if (hydra_options.outfile_format == FORMAT_JSONV1) { - fprintf(hydra_brains.ofp, "\n\t],\n\"success\": %s,\n\"errormessages\": [ %s ],\n\"quantityfound\": %lu }\n", + fprintf(hydra_brains.ofp, "\n\t],\n\"success\": %s,\n\"errormessages\": [ %s ],\n\"quantityfound\": %llu }\n", (error ? "false" : "true"), json_error, hydra_brains.found); } fclose(hydra_brains.ofp); From 4c6cbf03a7b14717e35ccb4356c7d8104800fb93 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 6 Jul 2017 22:26:08 +0200 Subject: [PATCH 068/531] stdint fixes --- hydra-mod.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-mod.c b/hydra-mod.c index b2ab4c4..b87a07c 100644 --- a/hydra-mod.c +++ b/hydra-mod.c @@ -1215,7 +1215,7 @@ char *hydra_address2string(char *address) { #ifdef AF_INET6 if (address[0] == 16) { memcpy(&target6.sin6_addr, &address[1], 16); - ipstring[0] = '[ + ipstring[0] = '['; inet_ntop(AF_INET6, &target6.sin6_addr, ipstring + 1, sizeof(ipstring) - 1); if (address[17] != 0) { strcat(ipstring, "%"); From 4ab31cd18e8e35257e47efd90d67f9969f9f7c98 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 6 Jul 2017 22:34:55 +0200 Subject: [PATCH 069/531] ipv6 pretty print --- hydra-firebird.c | 1 - hydra-http-proxy-urlenum.c | 4 ++-- hydra-mod.c | 23 +++++++++++++++++++++++ hydra-postgres.c | 1 - hydra-ssh.c | 8 ++++---- hydra-svn.c | 5 +---- hydra.c | 3 ++- 7 files changed, 32 insertions(+), 13 deletions(-) diff --git a/hydra-firebird.c b/hydra-firebird.c index fbcad69..1b5228b 100644 --- a/hydra-firebird.c +++ b/hydra-firebird.c @@ -1,4 +1,3 @@ - /* Firebird Support - by David Maciejak @ GMAIL dot com diff --git a/hydra-http-proxy-urlenum.c b/hydra-http-proxy-urlenum.c index ae6097f..5abaaea 100644 --- a/hydra-http-proxy-urlenum.c +++ b/hydra-http-proxy-urlenum.c @@ -210,8 +210,8 @@ int32_t start_http_proxy_urlenum(int32_t s, char *ip, int32_t port, unsigned cha if (*ptr == '2' || (*ptr == '3' && (*(ptr + 2) == '1' || *(ptr + 2) == '2')) || strncmp(ptr, "404", 4) == 0 || strncmp(ptr, "403", 4) == 0) { hydra_report_found_host(port, ip, "http-proxy", fp); if (fp != stdout) - fprintf(fp, "[%d][http-proxy-urlenum] host: %s url: %s\n", port, hydra_address2string(ip), url); - printf("[%d][http-proxy-urlenum] host: %s url: %s\n", port, hydra_address2string(ip), url); + fprintf(fp, "[%d][http-proxy-urlenum] host: %s url: %s\n", port, hydra_address2string_beautiful(ip), url); + printf("[%d][http-proxy-urlenum] host: %s url: %s\n", port, hydra_address2string_beautiful(ip), url); hydra_completed_pair_found(); } else { if (strncmp(ptr, "407", 3) == 0 /*|| strncmp(ptr, "401", 3) == 0 */ ) { diff --git a/hydra-mod.c b/hydra-mod.c index b87a07c..2f86963 100644 --- a/hydra-mod.c +++ b/hydra-mod.c @@ -1208,6 +1208,29 @@ char *hydra_address2string(char *address) { struct sockaddr_in target; struct sockaddr_in6 target6; + if (address[0] == 4) { + memcpy(&target.sin_addr.s_addr, &address[1], 4); + return inet_ntoa((struct in_addr) target.sin_addr); + } else +#ifdef AF_INET6 + if (address[0] == 16) { + memcpy(&target6.sin6_addr, &address[1], 16); + inet_ntop(AF_INET6, &target6.sin6_addr, ipstring, sizeof(ipstring)); + return ipstring; + } else +#endif + { + if (debug) + fprintf(stderr, "[ERROR] unknown address string size!\n"); + return NULL; + } + return NULL; // not reached +} + +char *hydra_address2string_beautiful(char *address) { + struct sockaddr_in target; + struct sockaddr_in6 target6; + if (address[0] == 4) { memcpy(&target.sin_addr.s_addr, &address[1], 4); return inet_ntoa((struct in_addr) target.sin_addr); diff --git a/hydra-postgres.c b/hydra-postgres.c index d27a78b..0be1363 100644 --- a/hydra-postgres.c +++ b/hydra-postgres.c @@ -1,4 +1,3 @@ - /* * PostgresSQL Support - by Diaul (at) devilopers.org * diff --git a/hydra-ssh.c b/hydra-ssh.c index e0a67b1..0834713 100644 --- a/hydra-ssh.c +++ b/hydra-ssh.c @@ -172,7 +172,7 @@ int32_t service_ssh_init(char *ip, int32_t sp, unsigned char options, char *misc ssh_session session = ssh_new(); if (verbose || debug) - printf("[INFO] Testing if password authentication is supported by ssh://%s@%s:%d\n", miscptr == NULL ? "hydra" : miscptr, hydra_address2string(ip), port); + printf("[INFO] Testing if password authentication is supported by ssh://%s@%s:%d\n", miscptr == NULL ? "hydra" : miscptr, hydra_address2string_beautiful(ip), port); ssh_options_set(session, SSH_OPTIONS_PORT, &port); ssh_options_set(session, SSH_OPTIONS_HOST, hydra_address2string(ip)); if (miscptr == NULL) @@ -182,7 +182,7 @@ int32_t service_ssh_init(char *ip, int32_t sp, unsigned char options, char *misc ssh_options_set(session, SSH_OPTIONS_COMPRESSION_C_S, "none"); ssh_options_set(session, SSH_OPTIONS_COMPRESSION_S_C, "none"); if (ssh_connect(session) != 0) { - fprintf(stderr, "[ERROR] could not connect to ssh://%s:%d - %s\n", hydra_address2string(ip), port, ssh_get_error(session)); + fprintf(stderr, "[ERROR] could not connect to ssh://%s:%d - %s\n", hydra_address2string_beautiful(ip), port, ssh_get_error(session)); return 2; } rc = ssh_userauth_none(session, NULL); @@ -193,11 +193,11 @@ int32_t service_ssh_init(char *ip, int32_t sp, unsigned char options, char *misc if ((method & SSH_AUTH_METHOD_INTERACTIVE) || (method & SSH_AUTH_METHOD_PASSWORD)) { if (verbose || debug) - printf("[INFO] Successful, password authentication is supported by ssh://%s:%d\n", hydra_address2string(ip), port); + printf("[INFO] Successful, password authentication is supported by ssh://%s:%d\n", hydra_address2string_beautiful(ip), port); return 0; } - fprintf(stderr, "[ERROR] target ssh://%s:%d/ does not support password authentication.\n", hydra_address2string(ip), port); + fprintf(stderr, "[ERROR] target ssh://%s:%d/ does not support password authentication.\n", hydra_address2string_beautiful(ip), port); return 1; #else return 0; diff --git a/hydra-svn.c b/hydra-svn.c index 11ed2f9..cdee8ec 100644 --- a/hydra-svn.c +++ b/hydra-svn.c @@ -103,10 +103,7 @@ int32_t start_svn(int32_t s, char *ip, int32_t port, unsigned char options, char svn_auth_open(&ctx->auth_baton, providers, pool); revision.kind = svn_opt_revision_head; - if (ipv6) - snprintf(URL, sizeof(URL), "svn://[%s]:%d/%s", hydra_address2string(ip), port, URLBRANCH); - else - snprintf(URL, sizeof(URL), "svn://%s:%d/%s", hydra_address2string(ip), port, URLBRANCH); + snprintf(URL, sizeof(URL), "svn://%s:%d/%s", hydra_address2string_beautiful(ip), port, URLBRANCH); dirents = SVN_DIRENT_KIND; canonical = svn_uri_canonicalize(URL, pool); //err = svn_client_list2(canonical, &revision, &revision, svn_depth_unknown, dirents, FALSE, print_dirdummy, NULL, ctx, pool); diff --git a/hydra.c b/hydra.c index 1ec958f..c335e2b 100644 --- a/hydra.c +++ b/hydra.c @@ -211,6 +211,7 @@ extern char *hydra_strcasestr(const char *haystack, const char *needle); extern void hydra_tobase64(unsigned char *buf, int32_t buflen, int32_t bufsize); extern char *hydra_string_replace(const char *string, const char *substr, const char *replacement); extern char *hydra_address2string(char *address); +extern char *hydra_address2string_beautiful(char *address); extern int32_t colored_output; extern char quiet; extern int32_t do_retry; @@ -638,7 +639,7 @@ void hydra_debug(int32_t force, char *string) { hydra_target* target = hydra_targets[i]; printf ("[DEBUG] Target %d - target %s ip %s login_no %llu pass_no %llu sent %llu pass_state %d redo_state %d (%d redos) use_count %d failed %d done %d fail_count %d login_ptr %s pass_ptr %s\n", - i, STR_NULL(target->target), hydra_address2string(target->ip), + i, STR_NULL(target->target), hydra_address2string_beautiful(target->ip), target->login_no, target->pass_no, target->sent, target->pass_state, target->redo_state, target->redo, target->use_count, target->failed, target->done, From 859b7aa443b17bc50108603716d89a2e52ee9268 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 6 Jul 2017 22:35:45 +0200 Subject: [PATCH 070/531] ipv6 pretty print --- hydra-mod.h | 1 + 1 file changed, 1 insertion(+) diff --git a/hydra-mod.h b/hydra-mod.h index 812e2d1..c4032fd 100644 --- a/hydra-mod.h +++ b/hydra-mod.h @@ -34,6 +34,7 @@ extern void hydra_tobase64(unsigned char *buf, int32_t buflen, int32_t bufsize); extern void hydra_dump_asciihex(unsigned char *string, int32_t length); extern void hydra_set_srcport(int32_t port); extern char *hydra_address2string(char *address); +extern char *hydra_address2string_beautiful(char *address); extern char *hydra_strcasestr(const char *haystack, const char *needle); extern void hydra_dump_data(unsigned char *buf, int32_t len, char *text); extern int32_t hydra_memsearch(char *haystack, int32_t hlen, char *needle, int32_t nlen); From 5a19c1787e51dc7ea2b84a8c0d1365ad9f747488 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 6 Jul 2017 22:58:31 +0200 Subject: [PATCH 071/531] small info changes --- hydra.c | 16 +++++++++++++--- 1 file changed, 13 insertions(+), 3 deletions(-) diff --git a/hydra.c b/hydra.c index c335e2b..61344bb 100644 --- a/hydra.c +++ b/hydra.c @@ -3512,9 +3512,16 @@ int32_t main(int32_t argc, char *argv[]) { (uint64_t) hydra_brains.countlogin, (uint64_t) hydra_brains.countpass, math2, math2 == 1 ? "y" : "ies"); - printf("[DATA] attacking service %s on port %d%s\n", hydra_options.service, port, hydra_options.ssl == 1 ? " with SSL" : ""); - if (hydra_options.miscptr != NULL && hydra_options.miscptr[0] != 0) - printf("[DATA] with additional data %s\n", hydra_options.miscptr); + if (hydra_brains.targets == 1) { + if (index(hydra_targets[0]->target, ':') == NULL) + printf("[DATA] attacking %s%s://%s:%d/%s\n", hydra_options.service, hydra_options.ssl == 1 ? "s" : "", hydra_targets[0]->target, port, hydra_options.miscptr != NULL ? hydra_options.miscptr : ""); + else + printf("[DATA] attacking %s%s://[%s]:%d/%s\n", hydra_options.service, hydra_options.ssl == 1 ? "s" : "", hydra_targets[0]->target, port, hydra_options.miscptr != NULL ? hydra_options.miscptr : ""); + } else + printf("[DATA] attacking %s%s://(%d targets):%d/%s\n", hydra_options.service, hydra_options.ssl == 1 ? "s" : "", hydra_brains.targets, port, hydra_options.miscptr != NULL ? hydra_options.miscptr : ""); + //service %s on port %d%s\n", hydra_options.service, port, hydra_options.ssl == 1 ? " with SSL" : ""); +// if (hydra_options.miscptr != NULL && hydra_options.miscptr[0] != 0) +// printf("[DATA] with additional data %s\n", hydra_options.miscptr); if (hydra_options.outfile_ptr != NULL) { if ((hydra_brains.ofp = fopen(hydra_options.outfile_ptr, "a+")) == NULL) { @@ -3629,6 +3636,9 @@ int32_t main(int32_t argc, char *argv[]) { } freeaddrinfo(res); } + // restore device information if present + if (device != NULL) + *(device - 1) = '%'; } if (verbose) printf("[VERBOSE] resolving done\n"); From 789214cc7e34be3e916ed54dca27cf0a2ca682ef Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 6 Jul 2017 23:02:05 +0200 Subject: [PATCH 072/531] warn on BINDTODEVICE not supported in some modules --- hydra.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/hydra.c b/hydra.c index 61344bb..0520e28 100644 --- a/hydra.c +++ b/hydra.c @@ -3637,8 +3637,10 @@ int32_t main(int32_t argc, char *argv[]) { freeaddrinfo(res); } // restore device information if present - if (device != NULL) + if (device != NULL) { *(device - 1) = '%'; + fprintf(stderr, "[WARNING] not all modules support BINDTODEVICE for IPv6 link local addresses, e.g. SSH does not\n"); + } } if (verbose) printf("[VERBOSE] resolving done\n"); From 185021d47471dfafee31ac145abd830743e0f7bc Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 6 Jul 2017 23:09:44 +0200 Subject: [PATCH 073/531] compile fix for debug --- hydra.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra.c b/hydra.c index 0520e28..edd71de 100644 --- a/hydra.c +++ b/hydra.c @@ -493,7 +493,7 @@ static const struct { } while(0) -int32_t inline check_flag(int32_t value, int32_t flag) { +int32_t /*inline*/ check_flag(int32_t value, int32_t flag) { // inline does not compile with debug return (value & flag) == flag; } From 1a72fe023ec50309b0b60e0cd0d2f79e812f692b Mon Sep 17 00:00:00 2001 From: van Hauser Date: Fri, 7 Jul 2017 11:21:46 +0200 Subject: [PATCH 074/531] cleanup --- bfg.c | 1 + hydra-adam6500.c | 5 +---- hydra-http-form.c | 3 +-- hydra-ldap.c | 4 ++++ hydra-mod.c | 22 +++++++++++----------- hydra-mod.h | 8 ++++---- hydra-oracle-listener.c | 3 +-- hydra-rdp.c | 28 ++++++++++++++-------------- hydra-rlogin.c | 3 +-- hydra-rsh.c | 10 ++++------ hydra-rtsp.c | 8 ++------ hydra-snmp.c | 6 +++--- hydra-svn.c | 6 +++--- hydra-time.c | 2 +- hydra.c | 11 ++++++----- hydra.h | 2 +- performance.h | 2 +- sasl.c | 2 +- 18 files changed, 60 insertions(+), 66 deletions(-) diff --git a/bfg.c b/bfg.c index 89b115b..a3a1dad 100644 --- a/bfg.c +++ b/bfg.c @@ -45,6 +45,7 @@ static int32_t add_single_char(char ch, char flags, int32_t* crs_len) { bf_options.crs[*crs_len - 1] = ch; bf_options.crs[*crs_len] = '\0'; } + return 0; } // return values : 0 on success, 1 on error // diff --git a/hydra-adam6500.c b/hydra-adam6500.c index de8ca15..9382fd1 100644 --- a/hydra-adam6500.c +++ b/hydra-adam6500.c @@ -91,7 +91,7 @@ int32_t start_adam6500(int32_t s, char *ip, int32_t port, unsigned char options, } void service_adam6500(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { - int32_t run = 1, failc = 0, retry = 1, next_run = 1, sock = -1; + int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_ADAM6500, mysslport = PORT_ADAM6500_SSL; hydra_register_socket(sp); @@ -102,9 +102,6 @@ void service_adam6500(char *ip, int32_t sp, unsigned char options, char *miscptr switch (run) { case 1: /* connect and service init function */ { - unsigned char *buf2; - int32_t f = 0; - if (sock >= 0) sock = hydra_disconnect(sock); // usleepn(275); diff --git a/hydra-http-form.c b/hydra-http-form.c index 58f0ddf..ca039d6 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -197,8 +197,7 @@ success: */ int32_t add_or_update_cookie(ptr_cookie_node * ptr_cookie, char * cookie_expr) { - ptr_cookie_node cur_ptr = NULL, new_ptr = NULL; - char * cookie = strdup(cookie_expr); + ptr_cookie_node cur_ptr = NULL; char * cookie_name = NULL, * cookie_value = strstr(cookie_expr, "="); if (cookie_value) { diff --git a/hydra-ldap.c b/hydra-ldap.c index c14d20a..a2100c5 100644 --- a/hydra-ldap.c +++ b/hydra-ldap.c @@ -451,6 +451,10 @@ int32_t service_ldap_init(char *ip, int32_t sp, unsigned char options, char *mis // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here + if (strlen(miscptr) > 220) { + fprintf(stderr, "[ERROR] the option string to this module may not be larger than 220 bytes\n"); + return -1; + } return 0; } diff --git a/hydra-mod.c b/hydra-mod.c index 2f86963..88229a1 100644 --- a/hydra-mod.c +++ b/hydra-mod.c @@ -317,7 +317,7 @@ int32_t internal__hydra_connect(char *host, int32_t port, int32_t protocol, int3 hydra_report(stderr, "[ERROR] SOCKS5 proxy read failed (%zu/2)\n", cnt); err = 1; } - if ((uint32_t) buf[1] == SOCKS_NOMETHOD) { + if ((unsigned char) buf[1] == SOCKS_NOMETHOD) { hydra_report(stderr, "[ERROR] SOCKS5 proxy authentication method negotiation failed\n"); err = 1; } @@ -329,7 +329,7 @@ int32_t internal__hydra_connect(char *host, int32_t port, int32_t protocol, int3 char *login = strtok(proxy_authentication[selected_proxy], ":"); char *pass = strtok(NULL, ":"); - snprintf(buf, sizeof(buf), "\x01%c%s%c%s", (char) strlen(login), login, (char) strlen(pass), pass); + snprintf(buf, 4096, "\x01%c%s%c%s", (char) strlen(login), login, (char) strlen(pass), pass); cnt = hydra_send(s, buf, strlen(buf), 0); if (cnt != strlen(buf)) { @@ -584,7 +584,7 @@ int32_t internal__hydra_connect_ssl(char *host, int32_t port, int32_t protocol, } #endif -int32_t internal__hydra_recv(int32_t socket, char *buf, int32_t length) { +int32_t internal__hydra_recv(int32_t socket, char *buf, uint32_t length) { #ifdef LIBOPENSSL if (use_ssl) { return SSL_read(ssl, buf, length); @@ -593,7 +593,7 @@ int32_t internal__hydra_recv(int32_t socket, char *buf, int32_t length) { return recv(socket, buf, length, 0); } -int32_t internal__hydra_send(int32_t socket, char *buf, int32_t size, int32_t options) { +int32_t internal__hydra_send(int32_t socket, char *buf, uint32_t size, int32_t options) { #ifdef LIBOPENSSL if (use_ssl) { return SSL_write(ssl, buf, size); @@ -708,7 +708,7 @@ void hydra_report_debug(FILE * st, char *format, ...) { for (i = 0; i < len; i++) { memset(temp, 0, 6); cTemp = (unsigned char) buf[i]; - if ((cTemp < 32 && cTemp >= 0) || cTemp > 126) { + if (cTemp < 32 || cTemp > 126) { sprintf(temp, "[%02X]", cTemp); } else sprintf(temp, "%c", cTemp); @@ -893,7 +893,7 @@ int32_t hydra_data_ready(int32_t socket) { return (hydra_data_ready_timed(socket, 0, 100)); } -int32_t hydra_recv(int32_t socket, char *buf, int32_t length) { +int32_t hydra_recv(int32_t socket, char *buf, uint32_t length) { int32_t ret; char text[64]; @@ -906,7 +906,7 @@ int32_t hydra_recv(int32_t socket, char *buf, int32_t length) { return ret; } -int32_t hydra_recv_nb(int32_t socket, char *buf, int32_t length) { +int32_t hydra_recv_nb(int32_t socket, char *buf, uint32_t length) { int32_t ret = -1; char text[64]; @@ -1001,7 +1001,7 @@ char *hydra_receive_line(int32_t socket) { return buff; } -int32_t hydra_send(int32_t socket, char *buf, int32_t size, int32_t options) { +int32_t hydra_send(int32_t socket, char *buf, uint32_t size, int32_t options) { char text[64]; if (debug) { @@ -1102,15 +1102,15 @@ unsigned char hydra_conv64(unsigned char in) { } } -void hydra_tobase64(unsigned char *buf, int32_t buflen, int32_t bufsize) { +void hydra_tobase64(unsigned char *buf, uint32_t buflen, uint32_t bufsize) { unsigned char small[3] = { 0, 0, 0 }; unsigned char big[5]; unsigned char *ptr = buf; - int32_t i = bufsize; + uint32_t i = bufsize; uint32_t len = 0; unsigned char bof[i]; - if (buf == NULL || strlen((char *) buf) == 0) + if (buf == NULL || strlen((char *) buf) == 0 || buflen == 0) return; bof[0] = 0; memset(big, 0, sizeof(big)); diff --git a/hydra-mod.h b/hydra-mod.h index c4032fd..bf72b7c 100644 --- a/hydra-mod.h +++ b/hydra-mod.h @@ -24,13 +24,13 @@ extern int32_t hydra_connect_tcp(char *host, int32_t port); extern int32_t hydra_connect_udp(char *host, int32_t port); extern int32_t hydra_disconnect(int32_t socket); extern int32_t hydra_data_ready(int32_t socket); -extern int32_t hydra_recv(int32_t socket, char *buf, int32_t length); -extern int32_t hydra_recv_nb(int32_t socket, char *buf, int32_t length); +extern int32_t hydra_recv(int32_t socket, char *buf, uint32_t length); +extern int32_t hydra_recv_nb(int32_t socket, char *buf, uint32_t length); extern char *hydra_receive_line(int32_t socket); -extern int32_t hydra_send(int32_t socket, char *buf, int32_t size, int32_t options); +extern int32_t hydra_send(int32_t socket, char *buf, uint32_t size, int32_t options); extern int32_t make_to_lower(char *buf); extern unsigned char hydra_conv64(unsigned char in); -extern void hydra_tobase64(unsigned char *buf, int32_t buflen, int32_t bufsize); +extern void hydra_tobase64(unsigned char *buf, uint32_t buflen, uint32_t bufsize); extern void hydra_dump_asciihex(unsigned char *string, int32_t length); extern void hydra_set_srcport(int32_t port); extern char *hydra_address2string(char *address); diff --git a/hydra-oracle-listener.c b/hydra-oracle-listener.c index f10d72d..4f32997 100644 --- a/hydra-oracle-listener.c +++ b/hydra-oracle-listener.c @@ -1,4 +1,3 @@ - /* david: @@ -18,7 +17,7 @@ void dummy_oracle_listener() { printf("\n"); } #else -#include +#include "sasl.h" #include #define HASHSIZE 17 diff --git a/hydra-rdp.c b/hydra-rdp.c index f8cf084..af281a4 100644 --- a/hydra-rdp.c +++ b/hydra-rdp.c @@ -1831,7 +1831,7 @@ static void process_rect(STREAM s, RECT_ORDER * os, uint32 present, BOOL delta) /* Process a desktop save order */ static void process_desksave(STREAM s, DESKSAVE_ORDER * os, uint32 present, BOOL delta) { - int32_t width, height; + //int32_t width, height; if (present & 0x01) in_uint32_le(s, os->offset); @@ -1853,8 +1853,8 @@ static void process_desksave(STREAM s, DESKSAVE_ORDER * os, uint32 present, BOOL DEBUG(("DESKSAVE(l=%d,t=%d,r=%d,b=%d,off=%d,op=%d)\n", os->left, os->top, os->right, os->bottom, os->offset, os->action)); - width = os->right - os->left + 1; - height = os->bottom - os->top + 1; + //width = os->right - os->left + 1; + //height = os->bottom - os->top + 1; } /* Process a memory blt order */ @@ -1999,13 +1999,13 @@ static void process_secondary_order(STREAM s) { * For very compact orders the length becomes negative * so a signed integer must be used. */ uint16 length; - uint16 flags; - uint8 type; + //uint16 flags; + //uint8 type; uint8 *next_order; in_uint16_le(s, length); - in_uint16_le(s, flags); /* used by bmpcache2 */ - in_uint8(s, type); + //in_uint16_le(s, flags); /* used by bmpcache2 */ + //in_uint8(s, type); next_order = s->p + (sint16) length + 7; @@ -2148,7 +2148,7 @@ void rdp_disconnect(void) { void rdp5_process(STREAM s) { uint16 length, count; - uint8 type, ctype; + uint8 type/*, ctype*/; uint8 *next; struct stream *ts; @@ -2156,11 +2156,11 @@ void rdp5_process(STREAM s) { while (s->p < s->end) { in_uint8(s, type); if (type & RDP5_COMPRESSED) { - in_uint8(s, ctype); + //in_uint8(s, ctype); in_uint16_le(s, length); type ^= RDP5_COMPRESSED; } else { - ctype = 0; + //ctype = 0; in_uint16_le(s, length); } g_next_packet = next = s->p + length; @@ -3178,14 +3178,14 @@ void process_disconnect_pdu(STREAM s, uint32 * ext_disc_reason) { /* Process data PDU */ static BOOL process_data_pdu(STREAM s, uint32 * ext_disc_reason) { uint8 data_pdu_type; - uint8 ctype; + //uint8 ctype; uint16 clen; - uint32 len; + //uint32 len; in_uint8s(s, 6); /* shareid, pad, streamid */ - in_uint16_le(s, len); + //in_uint16_le(s, len); in_uint8(s, data_pdu_type); - in_uint8(s, ctype); + //in_uint8(s, ctype); in_uint16_le(s, clen); clen -= 18; diff --git a/hydra-rlogin.c b/hydra-rlogin.c index b29ee5d..5819250 100644 --- a/hydra-rlogin.c +++ b/hydra-rlogin.c @@ -61,8 +61,7 @@ int32_t start_rlogin(int32_t s, char *ip, int32_t port, unsigned char options, c memset(buffer, 0, sizeof(buffer)); ret = hydra_recv(s, buffer, sizeof(buffer)); if (strcmp(buffer, "\r\n")) - ret = hydra_recv(s, buffer, sizeof(buffer) - 1); - if (ret >= 0) + if ((ret = hydra_recv(s, buffer, sizeof(buffer) - 1)) > 0) buffer[ret] = 0; } /* Authentication failure */ diff --git a/hydra-rsh.c b/hydra-rsh.c index 90496cc..67c5e5b 100644 --- a/hydra-rsh.c +++ b/hydra-rsh.c @@ -37,13 +37,11 @@ int32_t start_rsh(int32_t s, char *ip, int32_t port, unsigned char options, char } buffer[0] = 0; - if ((ret = hydra_recv(s, buffer, sizeof(buffer) - 1)) >= 0) + if ((ret = hydra_recv(s, buffer, sizeof(buffer) - 1)) > 0) buffer[ret] = 0; - /* 0x00 is sent but hydra_recv transformed it */ - if (strlen(buffer) == 0) - ret = hydra_recv(s, buffer, sizeof(buffer) - 1); - if (ret >= 0) - buffer[ret] = 0; + else /* 0x00 is sent but hydra_recv transformed it */ + if ((ret = hydra_recv(s, buffer, sizeof(buffer) - 1)) > 0) + buffer[ret] = 0; #ifdef HAVE_PCRE if (ret > 0 && (!hydra_string_match(buffer, "\\s(failure|incorrect|denied)"))) { #else diff --git a/hydra-rtsp.c b/hydra-rtsp.c index 41836ad..e0eb6b5 100644 --- a/hydra-rtsp.c +++ b/hydra-rtsp.c @@ -64,8 +64,6 @@ int32_t use_Digest_Auth(char *s) { void create_core_packet(int32_t control, char *ip, int32_t port) { - - char buffer[500]; char *target = hydra_address2string(ip); if (control == 0) { @@ -125,8 +123,7 @@ int32_t start_rtsp(int32_t s, char *ip, int32_t port, unsigned char options, cha } if (use_Digest_Auth(lresp) == 1) { - char *dbuf; - char dbuffer[500] = ""; + char *dbuf = NULL; char aux[500] = ""; char *pbuffer = hydra_strcasestr(lresp, "WWW-Authenticate: Digest "); @@ -182,8 +179,7 @@ int32_t start_rtsp(int32_t s, char *ip, int32_t port, unsigned char options, cha void service_rtsp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; - int32_t myport = PORT_RTSP, mysslport = PORT_RTSP_SSL; - char *ptr, *ptr2; + int32_t myport = PORT_RTSP/*, mysslport = PORT_RTSP_SSL*/; hydra_register_socket(sp); diff --git a/hydra-snmp.c b/hydra-snmp.c index 0579ddb..f3235e0 100644 --- a/hydra-snmp.c +++ b/hydra-snmp.c @@ -198,7 +198,7 @@ void password_to_key_sha(u_char * password, /* IN */ int32_t start_snmp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = "\"\"", *ptr, *login, *pass, buffer[1024], buf[1024], hash[64], key[256] = "", salt[8] = ""; - int32_t i, j, k, size, off = 0, off2 = 0, done = 0; + int32_t i, j, k, size, off = 0, off2 = 0; unsigned char initVect[8], privacy_params[8]; int32_t engine_boots = 0; @@ -316,7 +316,7 @@ int32_t start_snmp(int32_t s, char *ip, int32_t port, unsigned char options, cha /* //PrivDES::encrypt(const unsigned char *key, - // const uint32_t /*key_len*///, +// const uint32_t key_len, // const unsigned char *buffer, // const uint32_t buffer_len, // unsigned char *out_buffer, @@ -324,7 +324,7 @@ int32_t start_snmp(int32_t s, char *ip, int32_t port, unsigned char options, cha // unsigned char *privacy_params, // uint32_t *privacy_params_len, // const unsigned long engine_boots, -// const unsigned long /*engine_time*/) +// const unsigned long engine_time) // last 8 bytes of key are used as base for initialization vector */ k = 0; memcpy((char *) initVect, key + 8, 8); diff --git a/hydra-svn.c b/hydra-svn.c index cdee8ec..207b32f 100644 --- a/hydra-svn.c +++ b/hydra-svn.c @@ -51,7 +51,7 @@ static svn_error_t *my_simple_prompt_callback(svn_auth_cred_simple_t ** cred, vo } int32_t start_svn(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { - int32_t ipv6 = 0; + //int32_t ipv6 = 0; char URL[1024]; char URLBRANCH[256]; const char *canonical; @@ -71,8 +71,8 @@ int32_t start_svn(int32_t s, char *ip, int32_t port, unsigned char options, char if (svn_cmdline_init("hydra", stderr) != EXIT_SUCCESS) return 4; - if (ip[0] == 16) - ipv6 = 1; + //if (ip[0] == 16) + // ipv6 = 1; pool = svn_pool_create(NULL); diff --git a/hydra-time.c b/hydra-time.c index 734e3c2..bbd068d 100644 --- a/hydra-time.c +++ b/hydra-time.c @@ -9,7 +9,7 @@ int32_t sleepn(time_t seconds) ts.tv_nsec = 0; return nanosleep(&ts, NULL); } -int32_t usleepn(int64_t milisec) { +int32_t usleepn(uint64_t milisec) { struct timespec ts; ts.tv_sec = milisec / 1000; ts.tv_nsec = (milisec % 1000) * 1000000L; diff --git a/hydra.c b/hydra.c index edd71de..4171d29 100644 --- a/hydra.c +++ b/hydra.c @@ -412,7 +412,7 @@ static const struct { SERVICE3("firebird", firebird), #endif SERVICE(ftp), - { "ftps", service_ftp_init, service_ftps }, + { "ftps", service_ftp_init, service_ftps, NULL }, { "http-get", service_http_init, service_http_get, usage_http }, { "http-get-form", service_http_form_init, service_http_get_form, usage_http_form }, { "http-head", service_http_init, service_http_head, NULL }, @@ -472,7 +472,7 @@ static const struct { SERVICE3("snmp", snmp), SERVICE(socks5), #ifdef LIBSSH - { "ssh", NULL, service_ssh }, + { "ssh", NULL, service_ssh, NULL }, SERVICE3("sshkey", sshkey), #endif #ifdef LIBSVN @@ -907,7 +907,7 @@ void hydra_restore_read() { hydra_targets[j]->pass_ptr = malloc(strlen(out) + 1); strcpy(hydra_targets[j]->pass_ptr, out); } - if (hydra_targets[j]->redo > 0) + if (hydra_targets[j]->redo > 0) { if (debug) printf("[DEBUG] target %d redo %d\n", j, hydra_targets[j]->redo); for (i = 0; i < hydra_targets[j]->redo; i++) { sck = fgets(out, sizeof(out), f); @@ -921,6 +921,7 @@ void hydra_restore_read() { hydra_targets[j]->redo_pass[i] = malloc(strlen(out) + 1); strcpy(hydra_targets[j]->redo_pass[i], out); } + } if (hydra_targets[j]->skipcnt >= hydra_brains.countlogin) hydra_targets[j]->skipcnt = 0; if (hydra_targets[j]->skipcnt > 0) @@ -1395,7 +1396,7 @@ void hydra_kill_head(int32_t head_no, int32_t killit, int32_t fail) { } void hydra_increase_fail_count(int32_t target_no, int32_t head_no) { - int32_t i, k, ok, maxfail = 0; + int32_t i, k, maxfail = 0; if (target_no < 0) return; @@ -3947,7 +3948,7 @@ int32_t main(int32_t argc, char *argv[]) { bail("[BUG] Weird bug detected where more tests were performed than possible. Please rerun with -d command line switch and post all output plus command line here: https://github.com/vanhauser-thc/thc-hydra/issues/113 or send it in an email to vh@thc.org"); } */ - printf("[STATUS] %.2f tries/min, %llu tries in %02llu:%02lluh, %llu to do in %02lu:%02luh, %d active\n", (1.0 * hydra_brains.sent) / (((elapsed_status - starttime) * 1.0) / 60), // tries/min + printf("[STATUS] %.2f tries/min, %llu tries in %02llu:%02lluh, %llu to do in %02llu:%02lluh, %d active\n", (1.0 * hydra_brains.sent) / (((elapsed_status - starttime) * 1.0) / 60), // tries/min hydra_brains.sent, // tries (uint64_t) ((elapsed_status - starttime) / 3600), // hours (uint64_t) (((elapsed_status - starttime) % 3600) / 60), // minutes diff --git a/hydra.h b/hydra.h index cece25c..62560d2 100644 --- a/hydra.h +++ b/hydra.h @@ -155,7 +155,7 @@ #ifndef _WIN32 int32_t sleepn(time_t seconds); - int32_t usleepn(int64_t useconds); + int32_t usleepn(uint64_t useconds); #else int32_t sleepn(uint32_t seconds); int32_t usleepn(uint32_t useconds); diff --git a/performance.h b/performance.h index 2d4a682..10759f8 100644 --- a/performance.h +++ b/performance.h @@ -31,7 +31,7 @@ int32_t my_select(int32_t fd, fd_set * fdread, fd_set * fdwrite, fd_set * fdex, ssize_t read_safe(int32_t fd, void *buffer, size_t len) { int32_t r = 0; int32_t total = 0; - int32_t toread = len; + uint32_t toread = len; fd_set fr; struct timeval tv; int32_t ret = 0; diff --git a/sasl.c b/sasl.c index cf2234e..ba08978 100644 --- a/sasl.c +++ b/sasl.c @@ -321,7 +321,7 @@ void sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char * while ((array[i] != NULL) && (array[i][0] == ' ')) { char *tmp = strdup(array[i]); - memset(array[i], 0, sizeof(array[i])); + //memset(array[i], 0, sizeof(array[i])); strcpy(array[i], tmp + 1); free(tmp); } From 15e534fbbfabcc6f234a4545ae093f56525da01b Mon Sep 17 00:00:00 2001 From: van Hauser Date: Fri, 7 Jul 2017 18:05:59 +0200 Subject: [PATCH 075/531] smbv1 check --- CHANGES | 1 + hydra-smb.c | 59 +++++++++++++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 60 insertions(+) diff --git a/CHANGES b/CHANGES index 5dd7266..37f5b4d 100644 --- a/CHANGES +++ b/CHANGES @@ -2,6 +2,7 @@ Changelog for hydra ------------------- Release 8.6-dev +* smb module now checks if SMBv1 is supported by the server * http-form module now supports URLs up to 6000 bytes (thanks to petrock6@github for the patch) * Fix for SSL connections that failed with error:00000000:lib(0):func(0):reason(0) (thanks gaia@github for reporting) * Added new command line option: diff --git a/hydra-smb.c b/hydra-smb.c index 48f7d7e..afc8ec6 100644 --- a/hydra-smb.c +++ b/hydra-smb.c @@ -1437,7 +1437,66 @@ int32_t service_smb_init(char *ip, int32_t sp, unsigned char options, char *misc // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here + time_t ctime; + int ready = 0, sock = hydra_connect_tcp(ip, port); + unsigned char buf[] = { + 0x00, 0x00, 0x00, 0xbe, 0xff, 0x53, 0x4d, 0x42, + 0x72, 0x00, 0x00, 0x00, 0x00, 0x18, 0x43, 0xc8, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xfe, 0xff, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x9b, 0x00, 0x02, + 0x50, 0x43, 0x20, 0x4e, 0x45, 0x54, 0x57, 0x4f, + 0x52, 0x4b, 0x20, 0x50, 0x52, 0x4f, 0x47, 0x52, + 0x41, 0x4d, 0x20, 0x31, 0x2e, 0x30, 0x00, 0x02, + 0x4d, 0x49, 0x43, 0x52, 0x4f, 0x53, 0x4f, 0x46, + 0x54, 0x20, 0x4e, 0x45, 0x54, 0x57, 0x4f, 0x52, + 0x4b, 0x53, 0x20, 0x31, 0x2e, 0x30, 0x33, 0x00, + 0x02, 0x4d, 0x49, 0x43, 0x52, 0x4f, 0x53, 0x4f, + 0x46, 0x54, 0x20, 0x4e, 0x45, 0x54, 0x57, 0x4f, + 0x52, 0x4b, 0x53, 0x20, 0x33, 0x2e, 0x30, 0x00, + 0x02, 0x4c, 0x41, 0x4e, 0x4d, 0x41, 0x4e, 0x31, + 0x2e, 0x30, 0x00, 0x02, 0x4c, 0x4d, 0x31, 0x2e, + 0x32, 0x58, 0x30, 0x30, 0x32, 0x00, 0x02, 0x44, + 0x4f, 0x53, 0x20, 0x4c, 0x41, 0x4e, 0x4d, 0x41, + 0x4e, 0x32, 0x2e, 0x31, 0x00, 0x02, 0x4c, 0x41, + 0x4e, 0x4d, 0x41, 0x4e, 0x32, 0x2e, 0x31, 0x00, + 0x02, 0x53, 0x61, 0x6d, 0x62, 0x61, 0x00, 0x02, + 0x4e, 0x54, 0x20, 0x4c, 0x41, 0x4e, 0x4d, 0x41, + 0x4e, 0x20, 0x31, 0x2e, 0x30, 0x00, 0x02, 0x4e, + 0x54, 0x20, 0x4c, 0x4d, 0x20, 0x30, 0x2e, 0x31, + 0x32, 0x00 }; + + if (sock < 0) { + fprintf(stderr, "[ERROR] could not connect to target smb://%s:%d/\n", hostname, port); + return -1; + } + + if (send(sock, buf, sizeof(buf), 0) < 0) { + fprintf(stderr, "[ERROR] unable to send to target smb://%s:%d/\n", hostname, port); + return -1; + } + + ctime = time(NULL); + do { + usleepn(300); + } while ((ready = hydra_data_ready(sock)) <= 0 && ctime + 5 < time(NULL)); + + if (ready <= 0) { + fprintf(stderr, "[ERROR] no reply from target smb://%s:%d/\n", hostname, port); + return -1; + } + + if ((ready = recv(sock, buf, sizeof(buf), 0)) < 40) { + fprintf(stderr, "[ERROR] invalid reply from target smb://%s:%d/\n", hostname, port); + return -1; + } + + if (buf[37] == buf[38] && buf[38] == 0xff) { + fprintf(stderr, "[ERROR] target smb://%s:%d/ does not support SMBv1\n", hostname, port); + return -1; + } + return 0; } From cea00533ea8d87e242e66f921110de7dbf47c31f Mon Sep 17 00:00:00 2001 From: van Hauser Date: Fri, 7 Jul 2017 18:26:17 +0200 Subject: [PATCH 076/531] smb req signing check --- CHANGES | 2 +- hydra-smb.c | 9 ++++++++- 2 files changed, 9 insertions(+), 2 deletions(-) diff --git a/CHANGES b/CHANGES index 37f5b4d..237e1a6 100644 --- a/CHANGES +++ b/CHANGES @@ -2,7 +2,7 @@ Changelog for hydra ------------------- Release 8.6-dev -* smb module now checks if SMBv1 is supported by the server +* smb module now checks if SMBv1 is supported by the server and now signing is required * http-form module now supports URLs up to 6000 bytes (thanks to petrock6@github for the patch) * Fix for SSL connections that failed with error:00000000:lib(0):func(0):reason(0) (thanks gaia@github for reporting) * Added new command line option: diff --git a/hydra-smb.c b/hydra-smb.c index afc8ec6..3be4170 100644 --- a/hydra-smb.c +++ b/hydra-smb.c @@ -1480,7 +1480,7 @@ int32_t service_smb_init(char *ip, int32_t sp, unsigned char options, char *misc ctime = time(NULL); do { usleepn(300); - } while ((ready = hydra_data_ready(sock)) <= 0 && ctime + 5 < time(NULL)); + } while ((ready = hydra_data_ready(sock)) <= 0 && ctime + 5 <= time(NULL)); if (ready <= 0) { fprintf(stderr, "[ERROR] no reply from target smb://%s:%d/\n", hostname, port); @@ -1491,12 +1491,19 @@ int32_t service_smb_init(char *ip, int32_t sp, unsigned char options, char *misc fprintf(stderr, "[ERROR] invalid reply from target smb://%s:%d/\n", hostname, port); return -1; } + + close(sock); if (buf[37] == buf[38] && buf[38] == 0xff) { fprintf(stderr, "[ERROR] target smb://%s:%d/ does not support SMBv1\n", hostname, port); return -1; } + if (buf[15] & 16 == 16) { + fprintf(stderr, "[ERROR] target smb://%s:%d/ requires signing which we do not support\n", hostname, port); + return -1; + } + return 0; } From 1503c8a381236b3f99ad57ed17c2c4dce501502c Mon Sep 17 00:00:00 2001 From: catatonic Date: Fri, 7 Jul 2017 19:34:52 +0000 Subject: [PATCH 077/531] Checking for gcrypt support & disabling radmin2 when it is unavailable. --- Makefile.am | 2 +- configure | 24 ++++++++++++++++++++++++ hydra-radmin2.c | 4 ++++ hydra.c | 12 ++++++++++++ 4 files changed, 41 insertions(+), 1 deletion(-) diff --git a/Makefile.am b/Makefile.am index 843bac6..6e7b287 100644 --- a/Makefile.am +++ b/Makefile.am @@ -3,7 +3,7 @@ # OPTS=-I. -O3 # -Wall -g -pedantic -LIBS=-lm -lgcrypt +LIBS=-lm BINDIR = /bin MANDIR ?= /man/man1/ DATADIR ?= /etc diff --git a/configure b/configure index ef77d8f..766fd98 100755 --- a/configure +++ b/configure @@ -36,6 +36,7 @@ CURSES_IPATH="" CRYPTO_PATH="" IDN_PATH="" IDN_IPATH="" +GCRYPT_PATH="" PR29_IPATH="" PCRE_PATH="" PCRE_IPATH="" @@ -242,6 +243,22 @@ if [ "$SSL_IPATH" = "/usr/include" ]; then SSL_IPATH="" fi +echo "Checking for gcrypt (libgcrypt.so) ..." +for i in $LIBDIRS ; do + if [ "X" = "X$GCRYPT_PATH" ]; then + if [ -f "$i/libgcrypt.so" -o -f "$i/libgcrypt.dylib" -o -f "$i/libgcrypt.a" -o -f "$i/libgcrypt.dll.a" -o -f "$i/libgcrypt.la" ]; then + HAVE_GCRYPT="y" + fi + fi +done +if [ -n "$HAVE_GCRYPT" ]; then + echo " ... found" +else + echo " ... gcrypt not found, gcrypt support disabled" +fi + + + echo "Checking for idn (libidn.so) ..." for i in $LIBDIRS ; do if [ "X" = "X$IDN_PATH" ]; then @@ -1069,6 +1086,10 @@ fi if [ -n "$HAVE_ZLIB" ]; then XDEFINES="$XDEFINES -DHAVE_ZLIB" fi +if [ -n "$HAVE_GCRYPT" ]; then + XDEFINES="$XDEFINES -DHAVE_GCRYPT" +fi + OLDPATH="" for i in $SSL_PATH $FIREBIRD_PATH $WORACLE_LIB_PATH $PCRE_PATH $IDN_PATH $CRYPTO_PATH $SSH_PATH $NSL_PATH $SOCKET_PATH $RESOLV_PATH $SAPR3_PATH $POSTGRES_PATH $SVN_PATH $NCP_PATH $CURSES_PATH $ORACLE_PATH $AFP_PATH $MYSQL_PATH; do @@ -1124,6 +1145,9 @@ fi if [ -n "$ORACLE_IPATH" ]; then XIPATHS="$XIPATHS -I$ORACLE_IPATH" fi +if [ -n "$HAVE_GCRYPT" ]; then + XLIBS="$XLIBS -lgcrypt" +fi if [ -n "$HAVE_ZLIB" ]; then XLIBS="$XLIBS -lz" fi diff --git a/hydra-radmin2.c b/hydra-radmin2.c index 9985b52..7c09b3b 100644 --- a/hydra-radmin2.c +++ b/hydra-radmin2.c @@ -1,7 +1,9 @@ #include "hydra-mod.h" #include #include +#ifdef HAVE_GCRYPT #include +#endif extern char *HYDRA_EXIT; @@ -167,6 +169,7 @@ int start_radmin2(int s, char *ip, int port, unsigned char options, char *miscpt } void service_radmin2(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { +#ifdef HAVE_GCRYPT int sock = -1; int index; int bytecount; @@ -341,6 +344,7 @@ void service_radmin2(char *ip, int sp, unsigned char options, char *miscptr, FIL hydra_child_exit(2); } } +#endif } int service_radmin2_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname) { diff --git a/hydra.c b/hydra.c index 2061a31..2c90c5a 100644 --- a/hydra.c +++ b/hydra.c @@ -57,7 +57,9 @@ extern void service_http_proxy_urlenum(char *ip, int sp, unsigned char options, extern void service_s7_300(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); extern void service_rtsp(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); extern void service_rpcap(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); +#ifdef HAVE_GCRYPT extern void service_radmin2(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); +#endif // ADD NEW SERVICES HERE @@ -148,7 +150,9 @@ extern int service_xmpp_init(char *ip, int sp, unsigned char options, char *misc extern int service_s7_300_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); extern int service_rtsp_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); extern int service_rpcap_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); +#ifdef HAVE_GCRYPT extern int service_radmin2_init(char *ip, int sp, unsigned char options, char *miscptr, FILE * fp, int port, char *hostname); +#endif // ADD NEW SERVICES HERE @@ -1265,8 +1269,10 @@ void hydra_service_init(int target_no) { x = service_rtsp_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); if (strcmp(hydra_options.service, "rpcap") == 0) x = service_rpcap_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); +#ifdef HAVE_GCRYPT if (strcmp(hydra_options.service, "radmin2") == 0) x = service_radmin2_init(hydra_targets[target_no]->ip, -1, options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[target_no]->target); +#endif // ADD NEW SERVICES HERE @@ -1473,8 +1479,10 @@ int hydra_spawn_head(int head_no, int target_no) { service_rtsp(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); if (strcmp(hydra_options.service, "rpcap") == 0) service_rpcap(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); +#ifdef HAVE_GCRYPT if (strcmp(hydra_options.service, "radmin2") == 0) service_radmin2(hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); +#endif // ADD NEW SERVICES HERE @@ -3275,7 +3283,11 @@ int main(int argc, char *argv[]) { i = 1; } if (strcmp(hydra_options.service, "radmin2") == 0) +#ifdef HAVE_GCRYPT i = 1; +#else + bail("Compiled without gcrypt support"); +#endif // ADD NEW SERVICES HERE From 444a912b3743678ba280fe41d9e3f3d854725837 Mon Sep 17 00:00:00 2001 From: Catatonic Date: Fri, 7 Jul 2017 15:39:49 -0700 Subject: [PATCH 078/531] Removing unused variable --- configure | 1 - 1 file changed, 1 deletion(-) diff --git a/configure b/configure index c463adc..f774b8c 100755 --- a/configure +++ b/configure @@ -40,7 +40,6 @@ CURSES_IPATH="" CRYPTO_PATH="" IDN_PATH="" IDN_IPATH="" -GCRYPT_PATH="" PR29_IPATH="" PCRE_PATH="" PCRE_IPATH="" From 2386d4517fb2b5a3fac3f23d93b9ea12f9c91063 Mon Sep 17 00:00:00 2001 From: catatonic Date: Sat, 8 Jul 2017 01:14:41 +0000 Subject: [PATCH 079/531] Improving data specificity more. --- hydra-radmin2.c | 32 ++++++++++++++++---------------- 1 file changed, 16 insertions(+), 16 deletions(-) diff --git a/hydra-radmin2.c b/hydra-radmin2.c index afc5823..cba0431 100644 --- a/hydra-radmin2.c +++ b/hydra-radmin2.c @@ -92,8 +92,8 @@ char *message2buffer(struct rmessage *msg) { hydra_child_exit(0); } memcpy(data, &msg->magic, sizeof(char)); - *((int *)(data+1)) = htonl(msg->length); - *((int *)(data+5)) = htonl(msg->checksum); + *((int32_t *)(data+1)) = htonl(msg->length); + *((int32_t *)(data+5)) = htonl(msg->checksum); memcpy((data+9), &msg->type, sizeof(char)); break; case 0x09: @@ -103,8 +103,8 @@ char *message2buffer(struct rmessage *msg) { hydra_child_exit(0); } memcpy(data, &msg->magic, sizeof(char)); - *((int *)(data+1)) = htonl(msg->length); - *((int *)(data+5)) = htonl(msg->checksum); + *((int32_t *)(data+1)) = htonl(msg->length); + *((int32_t *)(data+5)) = htonl(msg->checksum); memcpy((data+9), &msg->type, sizeof(char)); memcpy((data+10), msg->data, sizeof(char) * 32); break; @@ -211,7 +211,7 @@ void service_radmin2(char *ip, int32_t sp, unsigned char options, char *miscptr, // 0) Connect to the server sock = hydra_connect_tcp(ip, myport); if(sock < 0) { - hydra_report(stderr, "Error: Child with pid %d terminating, can not connect\n", (int)getpid()); + hydra_report(stderr, "Error: Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } @@ -228,7 +228,7 @@ void service_radmin2(char *ip, int32_t sp, unsigned char options, char *miscptr, while(index < 42) { //We're always expecting back a 42 byte buffer from a challenge request. switch(hydra_data_ready(sock)) { case -1: - hydra_report(stderr, "Error: Child with pid %d terminating, receive error\nerror:\t%s\n", (int)getpid(), strerror(errno)); + hydra_report(stderr, "Error: Child with pid %d terminating, receive error\nerror:\t%s\n", (int32_t)getpid(), strerror(errno)); hydra_child_exit(1); break; case 0: @@ -237,7 +237,7 @@ void service_radmin2(char *ip, int32_t sp, unsigned char options, char *miscptr, default: bytecount = hydra_recv(sock, buffer+index, 42 - index); if(bytecount < 0) { - hydra_report(stderr, "Error: Child with pid %d terminating, receive error\nerror:\t%s\n", (int)getpid(), strerror(errno)); + hydra_report(stderr, "Error: Child with pid %d terminating, receive error\nerror:\t%s\n", (int32_t)getpid(), strerror(errno)); hydra_child_exit(1); } index += bytecount; @@ -255,13 +255,13 @@ void service_radmin2(char *ip, int32_t sp, unsigned char options, char *miscptr, //MD5 the password to generate the password key, this is used with twofish below. err = gcry_md_open(&md, GCRY_MD_MD5, 0); if(err) { - hydra_report(stderr, "Error: Child with pid %d terminating, gcry_md_open error (%08x)\n%s/%s", (int)getpid(), index, gcry_strsource(err), gcry_strerror(err)); + hydra_report(stderr, "Error: Child with pid %d terminating, gcry_md_open error (%08x)\n%s/%s", (int32_t)getpid(), index, gcry_strsource(err), gcry_strerror(err)); hydra_child_exit(1); } gcry_md_reset(md); gcry_md_write(md, password, 100); if(gcry_md_read(md, 0) == NULL) { - hydra_report(stderr, "Error: Child with pid %d terminating, gcry_md_read error (%08x)\n", (int)getpid(), index); + hydra_report(stderr, "Error: Child with pid %d terminating, gcry_md_read error (%08x)\n", (int32_t)getpid(), index); hydra_child_exit(1); } memcpy(rawkey, gcry_md_read(md, 0), 16); @@ -273,25 +273,25 @@ void service_radmin2(char *ip, int32_t sp, unsigned char options, char *miscptr, //3.b) encrypt data received using pkey & known IV err= gcry_cipher_open(&cipher, GCRY_CIPHER_TWOFISH128, GCRY_CIPHER_MODE_CBC, 0); if(err) { - hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_open error (%08x)\n%s/%s", (int)getpid(), index, gcry_strsource(err), gcry_strerror(err)); + hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_open error (%08x)\n%s/%s", (int32_t)getpid(), index, gcry_strsource(err), gcry_strerror(err)); hydra_child_exit(1); } err = gcry_cipher_setiv(cipher, IV, 16); if(err) { - hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_setiv error (%08x)\n%s/%s", (int)getpid(), index, gcry_strsource(err), gcry_strerror(err)); + hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_setiv error (%08x)\n%s/%s", (int32_t)getpid(), index, gcry_strsource(err), gcry_strerror(err)); hydra_child_exit(1); } err = gcry_cipher_setkey(cipher, rawkey, 16); if(err) { - hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_setkey error (%08x)\n%s/%s", (int)getpid(), index, gcry_strsource(err), gcry_strerror(err)); + hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_setkey error (%08x)\n%s/%s", (int32_t)getpid(), index, gcry_strsource(err), gcry_strerror(err)); hydra_child_exit(1); } err = gcry_cipher_encrypt(cipher, encrypted, 32, msg->data, 32); if(err) { - hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_encrypt error (%08x)\n%s/%s", (int)getpid(), index, gcry_strsource(err), gcry_strerror(err)); + hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_encrypt error (%08x)\n%s/%s", (int32_t)getpid(), index, gcry_strsource(err), gcry_strerror(err)); hydra_child_exit(1); } @@ -315,7 +315,7 @@ void service_radmin2(char *ip, int32_t sp, unsigned char options, char *miscptr, while(index < 10) { //We're always expecting back a 42 byte buffer from a challenge request. switch(hydra_data_ready(sock)) { case -1: - hydra_report(stderr, "Error: Child with pid %d terminating, receive error\nerror:\t%s\n", (int)getpid(), strerror(errno)); + hydra_report(stderr, "Error: Child with pid %d terminating, receive error\nerror:\t%s\n", (int32_t)getpid(), strerror(errno)); hydra_child_exit(1); break; case 0: @@ -324,7 +324,7 @@ void service_radmin2(char *ip, int32_t sp, unsigned char options, char *miscptr, default: bytecount = hydra_recv(sock, buffer+index, 10 - index); if(bytecount < 0) { - hydra_report(stderr, "Error: Child with pid %d terminating, receive error\nerror:\t%s\n", (int)getpid(), strerror(errno)); + hydra_report(stderr, "Error: Child with pid %d terminating, receive error\nerror:\t%s\n", (int32_t)getpid(), strerror(errno)); hydra_child_exit(1); } index += bytecount; @@ -340,7 +340,7 @@ void service_radmin2(char *ip, int32_t sp, unsigned char options, char *miscptr, hydra_disconnect(sock); break; default: - hydra_report(stderr, "Error: Child with pid %d terminating, protocol error\n", (int)getpid()); + hydra_report(stderr, "Error: Child with pid %d terminating, protocol error\n", (int32_t)getpid()); hydra_child_exit(2); } } From 07acbda42226107d5ca926b35f6a2cc401c46ffd Mon Sep 17 00:00:00 2001 From: van Hauser Date: Sat, 8 Jul 2017 14:42:23 +0200 Subject: [PATCH 080/531] radmin2 enhancements --- CHANGES | 1 + configure | 2 +- hydra.c | 6 +++++- 3 files changed, 7 insertions(+), 2 deletions(-) diff --git a/CHANGES b/CHANGES index 237e1a6..da0b624 100644 --- a/CHANGES +++ b/CHANGES @@ -2,6 +2,7 @@ Changelog for hydra ------------------- Release 8.6-dev +* added radmin2 module by catatonic prime - great work! * smb module now checks if SMBv1 is supported by the server and now signing is required * http-form module now supports URLs up to 6000 bytes (thanks to petrock6@github for the patch) * Fix for SSL connections that failed with error:00000000:lib(0):func(0):reason(0) (thanks gaia@github for reporting) diff --git a/configure b/configure index f774b8c..482217c 100755 --- a/configure +++ b/configure @@ -257,7 +257,7 @@ done if [ -n "$HAVE_GCRYPT" ]; then echo " ... found" else - echo " ... gcrypt not found, gcrypt support disabled" + echo " ... gcrypt not found, radmin2 module disabled" fi diff --git a/hydra.c b/hydra.c index d432c38..d7be204 100644 --- a/hydra.c +++ b/hydra.c @@ -2136,6 +2136,10 @@ int32_t main(int32_t argc, char *argv[]) { SERVICES = hydra_string_replace(SERVICES, "firebird ", ""); strcat(unsupported, "firebird "); #endif +#ifndef HAVE_GCRYPT + SERVICES = hydra_string_replace(SERVICES, "radmin2 ", ""); + strcat(unsupported, "radmin2 "); +#endif #ifndef LIBAFP SERVICES = hydra_string_replace(SERVICES, "afp ", ""); strcat(unsupported, "afp "); @@ -3089,7 +3093,7 @@ int32_t main(int32_t argc, char *argv[]) { #ifdef HAVE_GCRYPT i = 1; #else - bail("hydra was not compiled with gcrypt support, radmin2 module can not be used"); + bail("hydra was not compiled with gcrypt support, radmin2 module not available"); #endif } From 9ba5939ad5f00fcf5fa86e0ed680ce59331d34cb Mon Sep 17 00:00:00 2001 From: van Hauser Date: Sat, 8 Jul 2017 14:48:24 +0200 Subject: [PATCH 081/531] makefile cleanup --- Makefile.am | 32 +++++++++++++++++--------------- 1 file changed, 17 insertions(+), 15 deletions(-) diff --git a/Makefile.am b/Makefile.am index 823e753..8a293c9 100755 --- a/Makefile.am +++ b/Makefile.am @@ -13,26 +13,28 @@ SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ hydra-telnet.c hydra-cisco.c hydra-http.c hydra-ftp.c hydra-imap.c \ hydra-pop3.c hydra-smb.c hydra-icq.c hydra-cisco-enable.c hydra-ldap.c \ hydra-mysql.c hydra-mssql.c hydra-xmpp.c hydra-http-proxy-urlenum.c \ - hydra-snmp.c hydra-cvs.c hydra-smtp.c hydra-smtp-enum.c hydra-sapr3.c hydra-ssh.c \ - hydra-sshkey.c hydra-teamspeak.c hydra-postgres.c hydra-rsh.c hydra-rlogin.c \ - hydra-oracle-listener.c hydra-svn.c hydra-pcanywhere.c hydra-sip.c \ - hydra-oracle.c hydra-vmauthd.c hydra-asterisk.c hydra-firebird.c hydra-afp.c hydra-ncp.c \ + hydra-snmp.c hydra-cvs.c hydra-smtp.c hydra-smtp-enum.c hydra-sapr3.c \ + hydra-ssh.c hydra-sshkey.c hydra-teamspeak.c hydra-postgres.c \ + hydra-rsh.c hydra-rlogin.c hydra-oracle-listener.c hydra-svn.c \ + hydra-pcanywhere.c hydra-sip.c hydra-oracle.c hydra-vmauthd.c \ + hydra-asterisk.c hydra-firebird.c hydra-afp.c hydra-ncp.c hydra-rdp.c \ hydra-oracle-sid.c hydra-http-proxy.c hydra-http-form.c hydra-irc.c \ - hydra-rdp.c hydra-s7-300.c hydra-redis.c hydra-adam6500.c \ - crc32.c d3des.c bfg.c ntlm.c sasl.c hmacmd5.c hydra-mod.c hydra-rtsp.c hydra-time.c hydra-rpcap.c \ - hydra-radmin2.c + hydra-s7-300.c hydra-redis.c hydra-adam6500.c hydra-rtsp.c \ + hydra-rpcap.c hydra-radmin2.c \ + hydra-time.c crc32.c d3des.c bfg.c ntlm.c sasl.c hmacmd5.c hydra-mod.c OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ hydra-telnet.o hydra-cisco.o hydra-http.o hydra-ftp.o hydra-imap.o \ hydra-pop3.o hydra-smb.o hydra-icq.o hydra-cisco-enable.o hydra-ldap.o \ hydra-mysql.o hydra-mssql.o hydra-xmpp.o hydra-http-proxy-urlenum.o \ - hydra-snmp.o hydra-cvs.o hydra-smtp.o hydra-smtp-enum.o hydra-sapr3.o hydra-ssh.o \ - hydra-sshkey.o hydra-teamspeak.o hydra-postgres.o hydra-rsh.o hydra-rlogin.o \ - hydra-oracle-listener.o hydra-svn.o hydra-pcanywhere.o hydra-sip.o \ - hydra-oracle-sid.o hydra-oracle.o hydra-vmauthd.o hydra-asterisk.o hydra-firebird.o hydra-afp.o hydra-ncp.o \ - hydra-http-proxy.o hydra-http-form.o hydra-irc.o hydra-redis.o \ - hydra-rdp.o hydra-s7-300.c hydra-adam6500.o \ - crc32.o d3des.o bfg.o ntlm.o sasl.o hmacmd5.o hydra-mod.o hydra-rtsp.o hydra-time.o hydra-rpcap.o \ - hydra-radmin2.o + hydra-snmp.o hydra-cvs.o hydra-smtp.o hydra-smtp-enum.o hydra-sapr3.o \ + hydra-ssh.o hydra-sshkey.o hydra-teamspeak.o hydra-postgres.o \ + hydra-rsh.o hydra-rlogin.o hydra-oracle-listener.o hydra-svn.o \ + hydra-pcanywhere.o hydra-sip.o hydra-oracle-sid.o hydra-oracle.o \ + hydra-vmauthd.o hydra-asterisk.o hydra-firebird.o hydra-afp.o \ + hydra-ncp.o hydra-http-proxy.o hydra-http-form.o hydra-irc.o \ + hydra-redis.o hydra-rdp.o hydra-s7-300.c hydra-adam6500.o hydra-rtsp.o \ + hydra-rpcap.o hydra-radmin2.o \ + crc32.o d3des.o bfg.o ntlm.o sasl.o hmacmd5.o hydra-mod.o hydra-time.o BINS = hydra pw-inspector EXTRA_DIST = README README.arm README.palm CHANGES TODO INSTALL LICENSE \ From 0a4f0987d10518c90590dff9c18e12dfdeeba99f Mon Sep 17 00:00:00 2001 From: van Hauser Date: Sat, 8 Jul 2017 15:11:13 +0200 Subject: [PATCH 082/531] beauty output --- hydra.c | 44 ++++++++++++++++++++++---------------------- 1 file changed, 22 insertions(+), 22 deletions(-) diff --git a/hydra.c b/hydra.c index d7be204..8ec961c 100644 --- a/hydra.c +++ b/hydra.c @@ -2124,30 +2124,38 @@ int32_t main(int32_t argc, char *argv[]) { struct sockaddr_in *ipv4 = NULL; printf("%s %s (c) 2017 by %s - Please do not use in military or secret service organizations, or for illegal purposes.\n\n", PROGRAM, VERSION, AUTHOR); -#ifndef LIBPOSTGRES - SERVICES = hydra_string_replace(SERVICES, "postgres ", ""); - strcat(unsupported, "postgres "); -#endif -#ifndef LIBSAPR3 - SERVICES = hydra_string_replace(SERVICES, "sapr3 ", ""); - strcat(unsupported, "sapr3 "); +#ifndef LIBAFP + SERVICES = hydra_string_replace(SERVICES, "afp ", ""); + strcat(unsupported, "afp "); #endif #ifndef LIBFIREBIRD SERVICES = hydra_string_replace(SERVICES, "firebird ", ""); strcat(unsupported, "firebird "); #endif -#ifndef HAVE_GCRYPT - SERVICES = hydra_string_replace(SERVICES, "radmin2 ", ""); - strcat(unsupported, "radmin2 "); -#endif -#ifndef LIBAFP - SERVICES = hydra_string_replace(SERVICES, "afp ", ""); - strcat(unsupported, "afp "); +#ifndef LIBMYSQLCLIENT + SERVICES = hydra_string_replace(SERVICES, "mysql ", "mysql(v4) "); + strcat(unsupported, "mysql5 "); #endif #ifndef LIBNCP SERVICES = hydra_string_replace(SERVICES, "ncp ", ""); strcat(unsupported, "ncp "); #endif +#ifndef LIBORACLE + SERVICES = hydra_string_replace(SERVICES, "oracle ", ""); + strcat(unsupported, "oracle "); +#endif +#ifndef LIBPOSTGRES + SERVICES = hydra_string_replace(SERVICES, "postgres ", ""); + strcat(unsupported, "postgres "); +#endif +#ifndef HAVE_GCRYPT + SERVICES = hydra_string_replace(SERVICES, "radmin2 ", ""); + strcat(unsupported, "radmin2 "); +#endif +#ifndef LIBSAPR3 + SERVICES = hydra_string_replace(SERVICES, "sapr3 ", ""); + strcat(unsupported, "sapr3 "); +#endif #ifndef LIBSSH SERVICES = hydra_string_replace(SERVICES, "ssh ", ""); strcat(unsupported, "ssh "); @@ -2158,14 +2166,6 @@ int32_t main(int32_t argc, char *argv[]) { SERVICES = hydra_string_replace(SERVICES, "svn ", ""); strcat(unsupported, "svn "); #endif -#ifndef LIBORACLE - SERVICES = hydra_string_replace(SERVICES, "oracle ", ""); - strcat(unsupported, "oracle "); -#endif -#ifndef LIBMYSQLCLIENT - SERVICES = hydra_string_replace(SERVICES, "mysql ", "mysql(v4) "); - strcat(unsupported, "mysql5 "); -#endif #ifndef LIBOPENSSL // for ftps SERVICES = hydra_string_replace(SERVICES, " ftps", ""); From bd8ec4712f2bce119a86dce864b2fd7fb1730602 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Fri, 21 Jul 2017 13:26:22 +0200 Subject: [PATCH 083/531] v8.6 release --- CHANGES | 2 +- hydra.c | 2 +- web/CHANGES | 10 +++++++- web/index.html | 26 ++++++++++---------- web/network_password_cracker_comparison.html | 20 ++++++++++----- 5 files changed, 38 insertions(+), 22 deletions(-) diff --git a/CHANGES b/CHANGES index da0b624..6eee16c 100644 --- a/CHANGES +++ b/CHANGES @@ -3,7 +3,7 @@ Changelog for hydra Release 8.6-dev * added radmin2 module by catatonic prime - great work! -* smb module now checks if SMBv1 is supported by the server and now signing is required +* smb module now checks if SMBv1 is supported by the server and if signing is required * http-form module now supports URLs up to 6000 bytes (thanks to petrock6@github for the patch) * Fix for SSL connections that failed with error:00000000:lib(0):func(0):reason(0) (thanks gaia@github for reporting) * Added new command line option: diff --git a/hydra.c b/hydra.c index 8ec961c..112db56 100644 --- a/hydra.c +++ b/hydra.c @@ -207,7 +207,7 @@ char *SERVICES = #define RESTOREFILE "./hydra.restore" #define PROGRAM "Hydra" -#define VERSION "v8.6-dev" +#define VERSION "v8.6" #define AUTHOR "van Hauser/THC" #define EMAIL "" #define RESOURCE "http://www.thc.org/thc-hydra" diff --git a/web/CHANGES b/web/CHANGES index 249e2bb..6eee16c 100644 --- a/web/CHANGES +++ b/web/CHANGES @@ -2,7 +2,15 @@ Changelog for hydra ------------------- Release 8.6-dev -* ... +* added radmin2 module by catatonic prime - great work! +* smb module now checks if SMBv1 is supported by the server and if signing is required +* http-form module now supports URLs up to 6000 bytes (thanks to petrock6@github for the patch) +* Fix for SSL connections that failed with error:00000000:lib(0):func(0):reason(0) (thanks gaia@github for reporting) +* Added new command line option: + -c TIME: seconds between login attempts (over all threads, so -t 1 is recommended) +* Options put after -R (for loading a restore file) are now honored (and were disallowed before) +* merged several patches by Diadlo@github to make the code easier readable. thanks for that! +* merged a patch by Diadlo@github that moves the help output to the invididual module Release 8.5 diff --git a/web/index.html b/web/index.html index bd6760f..6786d7f 100644 --- a/web/index.html +++ b/web/index.html @@ -16,8 +16,8 @@ A very fast network logon cracker which support many different services. See feature sets and services coverage page - incl. a speed comparison against ncrack and medusa

- Current Version: 8.5 - Last update 2017-05-03 + Current Version: 8.6 + Last update 2017-07-21

@@ -34,20 +34,20 @@ Read below for Linux compilation notes.
- CHANGELOG for 8.5 + CHANGELOG for 8.6 =================== ! Development moved to a public github repository: https://github.com/vanhauser-thc/thc-hydra ! Reports came in that the rdp module is not working reliable sometimes, most likely against new Windows versions. please test, report and if possible send a fix - * New command line option: - -b : format option for -o output file (json only so far, happy for patches supporting others :) ) - thanks to veggiespam for the patch - * ./configure now honors the CC enviroment variable if present - * Fix for the restore file crash on some x64 platforms (finally! thanks to lukas227!) - * Changed the format of the restore file to detect cross platform copies - * Fixed a bug in the NCP module - * Favor strrchr() over rindex() - * Added refactoring patch by diadlo - * Updated man page with missing command line options + * added radmin2 module by catatonic prime - great work! + * smb module now checks if SMBv1 is supported by the server and if signing is required + * http-form module now supports URLs up to 6000 bytes (thanks to petrock6@github for the patch) + * Fix for SSL connections that failed with error:00000000:lib(0):func(0):reason(0) (thanks gaia@github for reporting) + * Added new command line option: + -c TIME: seconds between login attempts (over all threads, so -t 1 is recommended) + * Options put after -R (for loading a restore file) are now honored (and were disallowed before) + * merged several patches by Diadlo@github to make the code easier readable. thanks for that! + * merged a patch by Diadlo@github that moves the help output to the invididual module You can also take a look at the full CHANGES file @@ -132,7 +132,7 @@ [0x05] The Art of Downloading: Source and Binaries 1. PRODUCTION/RELEASE VERSION: - The source code of state-of-the-art Hydra: hydra-8.5.tar.gz + The source code of state-of-the-art Hydra: hydra-8.6.tar.gz (compiles on all UNIX based platforms - even MacOS X, Cygwin on Windows, ARM-Linux, Android, iPhone, Blackberry 10, etc.) 2. DEVELOPMENT VERSION: diff --git a/web/network_password_cracker_comparison.html b/web/network_password_cracker_comparison.html index c72dbc3..ac3aa69 100644 --- a/web/network_password_cracker_comparison.html +++ b/web/network_password_cracker_comparison.html @@ -62,14 +62,14 @@ features are added to the project. If you find any inaccuracies Version - 8.5 - 2.1 + 8.6 + 2.2 0.4 alpha Last Update - May 2017 - April 2012 + July 2017 + November 2015 April 2011 @@ -530,6 +530,14 @@ contact us as the service depends on RFC implementations, some adjustements may No + +Asterisk + +Yes +No +No + + RDP Windows Workstation @@ -692,11 +700,11 @@ contact us as the service depends on RFC implementations, some adjustements may No EXPN cmdYes -No +Yes No RCPT TO cmdYes -No +Yes No From cd0757e81b17b691d1b2a6d974899ea2e422507b Mon Sep 17 00:00:00 2001 From: van Hauser Date: Fri, 21 Jul 2017 13:35:40 +0200 Subject: [PATCH 084/531] x64 warning fixes --- Makefile | 93 ++++++++++++++++++++++++++++++++++++++++++++++- hydra-http-form.c | 2 +- hydra.c | 46 +++++++++++------------ 3 files changed, 115 insertions(+), 26 deletions(-) diff --git a/Makefile b/Makefile index 372e67e..fc74d73 100644 --- a/Makefile +++ b/Makefile @@ -1,5 +1,94 @@ -all: - @echo Error: you must run "./configure" first +CC=gcc +STRIP=strip +XDEFINES= -DLIBOPENSSL -DHAVE_PCRE -DLIBSVN -DLIBSSH -DHAVE_ZLIB -DHAVE_MATH_H +XLIBS= -lz -lssl -lpcre -lsvn_client-1 -lapr-1 -laprutil-1 -lsvn_subr-1 -lssh -lcrypto +XLIBPATHS=-L/usr/lib -L/usr/local/lib -L/lib -L/lib -L/usr/local/lib -L/lib +XIPATHS= -I/usr/include -I/usr/local/include -I/usr/include/subversion-1 -I/usr/include/apr-1 -I/usr/include/subversion-1 +PREFIX=/usr/local +XHYDRA_SUPPORT= +STRIP=strip + +HYDRA_LOGO=hydra-logo.o +PWI_LOGO=pw-inspector-logo.o +SEC=-fstack-protector-all --param ssp-buffer-size=4 -D_FORTIFY_SOURCE=2 + +# +# Makefile for Hydra - (c) 2001-2017 by van Hauser / THC +# +OPTS=-I. -O3 +# -Wall -g -pedantic +LIBS=-lm +BINDIR = /bin +MANDIR ?= /man/man1/ +DATADIR ?= /etc +DESTDIR ?= + +SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ + hydra-telnet.c hydra-cisco.c hydra-http.c hydra-ftp.c hydra-imap.c \ + hydra-pop3.c hydra-smb.c hydra-icq.c hydra-cisco-enable.c hydra-ldap.c \ + hydra-mysql.c hydra-mssql.c hydra-xmpp.c hydra-http-proxy-urlenum.c \ + hydra-snmp.c hydra-cvs.c hydra-smtp.c hydra-smtp-enum.c hydra-sapr3.c \ + hydra-ssh.c hydra-sshkey.c hydra-teamspeak.c hydra-postgres.c \ + hydra-rsh.c hydra-rlogin.c hydra-oracle-listener.c hydra-svn.c \ + hydra-pcanywhere.c hydra-sip.c hydra-oracle.c hydra-vmauthd.c \ + hydra-asterisk.c hydra-firebird.c hydra-afp.c hydra-ncp.c hydra-rdp.c \ + hydra-oracle-sid.c hydra-http-proxy.c hydra-http-form.c hydra-irc.c \ + hydra-s7-300.c hydra-redis.c hydra-adam6500.c hydra-rtsp.c \ + hydra-rpcap.c hydra-radmin2.c \ + hydra-time.c crc32.c d3des.c bfg.c ntlm.c sasl.c hmacmd5.c hydra-mod.c +OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ + hydra-telnet.o hydra-cisco.o hydra-http.o hydra-ftp.o hydra-imap.o \ + hydra-pop3.o hydra-smb.o hydra-icq.o hydra-cisco-enable.o hydra-ldap.o \ + hydra-mysql.o hydra-mssql.o hydra-xmpp.o hydra-http-proxy-urlenum.o \ + hydra-snmp.o hydra-cvs.o hydra-smtp.o hydra-smtp-enum.o hydra-sapr3.o \ + hydra-ssh.o hydra-sshkey.o hydra-teamspeak.o hydra-postgres.o \ + hydra-rsh.o hydra-rlogin.o hydra-oracle-listener.o hydra-svn.o \ + hydra-pcanywhere.o hydra-sip.o hydra-oracle-sid.o hydra-oracle.o \ + hydra-vmauthd.o hydra-asterisk.o hydra-firebird.o hydra-afp.o \ + hydra-ncp.o hydra-http-proxy.o hydra-http-form.o hydra-irc.o \ + hydra-redis.o hydra-rdp.o hydra-s7-300.c hydra-adam6500.o hydra-rtsp.o \ + hydra-rpcap.o hydra-radmin2.o \ + crc32.o d3des.o bfg.o ntlm.o sasl.o hmacmd5.o hydra-mod.o hydra-time.o +BINS = hydra pw-inspector + +EXTRA_DIST = README README.arm README.palm CHANGES TODO INSTALL LICENSE \ + hydra-mod.h hydra.h crc32.h d3des.h + +all: pw-inspector hydra $(XHYDRA_SUPPORT) + @echo + @echo Now type "make install" + +hydra: hydra.c $(OBJ) + $(CC) $(OPTS) $(SEC) $(LIBS) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o hydra $(HYDRA_LOGO) hydra.c $(OBJ) $(LIBS) $(XLIBS) $(XLIBPATHS) $(XIPATHS) $(XDEFINES) + @echo + @echo If men could get pregnant, abortion would be a sacrament + @echo + +xhydra: + -cd hydra-gtk && sh ./make_xhydra.sh + +pw-inspector: pw-inspector.c + -$(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o pw-inspector $(PWI_LOGO) pw-inspector.c + +.c.o: + $(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) -c $< $(XDEFINES) $(XIPATHS) + +strip: all + strip $(BINS) + -echo OK > /dev/null && test -x xhydra && strip xhydra || echo OK > /dev/null + +install: strip + -mkdir -p $(DESTDIR)$(PREFIX)$(BINDIR) + cp -f hydra-wizard.sh $(BINS) $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 hydra-wizard.sh $(BINS) + -echo OK > /dev/null && test -x xhydra && cp xhydra $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 xhydra || echo OK > /dev/null + -sed -e "s|^INSTALLDIR=.*|INSTALLDIR="$(PREFIX)"|" dpl4hydra.sh | sed -e "s|^LOCATION=.*|LOCATION="$(DATADIR)"|" > $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh + -chmod 755 $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh + -mkdir -p $(DESTDIR)$(PREFIX)$(DATADIR) + -cp -f *.csv $(DESTDIR)$(PREFIX)$(DATADIR) + -mkdir -p $(DESTDIR)$(PREFIX)$(MANDIR) + -cp -f hydra.1 xhydra.1 pw-inspector.1 $(DESTDIR)$(PREFIX)$(MANDIR) clean: + rm -rf xhydra pw-inspector hydra *.o core *.core *.stackdump *~ Makefile.in Makefile dev_rfc hydra.restore arm/*.ipk arm/ipkg/usr/bin/* hydra-gtk/src/*.o hydra-gtk/src/xhydra hydra-gtk/stamp-h hydra-gtk/config.status hydra-gtk/errors hydra-gtk/config.log hydra-gtk/src/.deps hydra-gtk/src/Makefile hydra-gtk/Makefile cp -f Makefile.orig Makefile + diff --git a/hydra-http-form.c b/hydra-http-form.c index ca039d6..363e115 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -342,7 +342,7 @@ void hdrrepv(ptr_header_node * ptr_head, char *hdrname, char *new_value) { if (cur_ptr->value) strcpy(cur_ptr->value, new_value); else { - hydra_report(stderr, "[ERROR] Out of memory (hdrrepv %u)", strlen(new_value) + 1); + hydra_report(stderr, "[ERROR] Out of memory (hdrrepv %lu)", strlen(new_value) + 1); hydra_child_exit(0); } } diff --git a/hydra.c b/hydra.c index 112db56..4579f9c 100644 --- a/hydra.c +++ b/hydra.c @@ -626,7 +626,7 @@ void hydra_debug(int32_t force, char *string) { if (!debug && !force) return; - printf("[DEBUG] Code: %s Time: %llu\n", string, (uint64_t) time(NULL)); + printf("[DEBUG] Code: %s Time: %lu\n", string, (uint64_t) time(NULL)); printf("[DEBUG] Options: mode %d ssl %d restore %d showAttempt %d tasks %d max_use %d tnp %d tpsal %d tprl %d exit_found %d miscptr %s service %s\n", hydra_options.mode, hydra_options.ssl, hydra_options.restore, hydra_options.showAttempt, hydra_options.tasks, hydra_options.max_use, @@ -634,7 +634,7 @@ void hydra_debug(int32_t force, char *string) { hydra_options.try_password_reverse_login, hydra_options.exit_found, STR_NULL(hydra_options.miscptr), hydra_options.service); - printf("[DEBUG] Brains: active %d targets %d finished %d todo_all %llu todo %llu sent %llu found %llu countlogin %llu sizelogin %llu countpass %llu sizepass %llu\n", + printf("[DEBUG] Brains: active %d targets %d finished %d todo_all %lu todo %lu sent %lu found %lu countlogin %lu sizelogin %lu countpass %lu sizepass %lu\n", hydra_brains.active, hydra_brains.targets, hydra_brains.finished, hydra_brains.todo_all + total_redo_count, hydra_brains.todo, hydra_brains.sent, hydra_brains.found, @@ -646,7 +646,7 @@ void hydra_debug(int32_t force, char *string) { for (i = 0; i < hydra_brains.targets; i++) { hydra_target* target = hydra_targets[i]; printf - ("[DEBUG] Target %d - target %s ip %s login_no %llu pass_no %llu sent %llu pass_state %d redo_state %d (%d redos) use_count %d failed %d done %d fail_count %d login_ptr %s pass_ptr %s\n", + ("[DEBUG] Target %d - target %s ip %s login_no %lu pass_no %lu sent %lu pass_state %d redo_state %d (%d redos) use_count %d failed %d done %d fail_count %d login_ptr %s pass_ptr %s\n", i, STR_NULL(target->target), hydra_address2string_beautiful(target->ip), target->login_no, target->pass_no, target->sent, target->pass_state, target->redo_state, target->redo, @@ -749,7 +749,7 @@ void hydra_restore_write(int32_t print_msg) { for (j = 0; j < hydra_options.max_use; j++) { memcpy((char *) &hh, hydra_heads[j], sizeof(hydra_head)); if (j == 0 && debug) { - printf("[DEBUG] sizeof hydra_head: %u\n", sizeof(hydra_head)); + printf("[DEBUG] sizeof hydra_head: %lu\n", sizeof(hydra_head)); printf("[DEBUG] memcmp: %d\n", memcmp(hydra_heads[j], &hh, sizeof(hydra_head))); } hh.active = 0; // re-enable disabled heads @@ -1567,14 +1567,14 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { if (debug) printf - ("[DEBUG] send_next_pair_init target %d, head %d, redo %d, redo_state %d, pass_state %d. loop_mode %d, curlogin %s, curpass %s, tlogin %s, tpass %s, logincnt %llu/%llu, passcnt %llu/%llu, loop_cnt %d\n", + ("[DEBUG] send_next_pair_init target %d, head %d, redo %d, redo_state %d, pass_state %d. loop_mode %d, curlogin %s, curpass %s, tlogin %s, tpass %s, logincnt %lu/%lu, passcnt %lu/%lu, loop_cnt %d\n", target_no, head_no, hydra_targets[target_no]->redo, hydra_targets[target_no]->redo_state, hydra_targets[target_no]->pass_state, hydra_options.loop_mode, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, hydra_targets[target_no]->login_ptr, hydra_targets[target_no]->pass_ptr, hydra_targets[target_no]->login_no, hydra_brains.countlogin, hydra_targets[target_no]->pass_no, hydra_brains.countpass, loop_cnt); if (loop_cnt > (hydra_brains.countlogin * 2) + 1 && loop_cnt > (hydra_brains.countpass * 2) + 1) { if (debug) - printf("[DEBUG] too many loops in send_next_pair, returning -1 (loop_cnt %d, sent %llu, todo %llu)\n", loop_cnt, hydra_targets[target_no]->sent, hydra_brains.todo); + printf("[DEBUG] too many loops in send_next_pair, returning -1 (loop_cnt %d, sent %lu, todo %lu)\n", loop_cnt, hydra_targets[target_no]->sent, hydra_brains.todo); return -1; } @@ -1584,7 +1584,7 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { snpdone = 1; } else { if (debug && (hydra_heads[head_no]->current_login_ptr != NULL || hydra_heads[head_no]->current_pass_ptr != NULL)) - printf("[COMPLETED] target %s - login \"%s\" - pass \"%s\" - child %d - %llu of %llu\n", + printf("[COMPLETED] target %s - login \"%s\" - pass \"%s\" - child %d - %lu of %lu\n", hydra_targets[target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, head_no, hydra_targets[target_no]->sent, hydra_brains.todo + hydra_targets[target_no]->redo); hydra_heads[head_no]->redo = 0; @@ -1894,7 +1894,7 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { return 0; // not prevent disabling it, if its needed its already done in the above line } if (debug || hydra_options.showAttempt) { - printf("[%sATTEMPT] target %s - login \"%s\" - pass \"%s\" - %llu of %llu [child %d] (%d/%d)\n", + printf("[%sATTEMPT] target %s - login \"%s\" - pass \"%s\" - %lu of %lu [child %d] (%d/%d)\n", hydra_targets[target_no]->redo_state ? "REDO-" : snp_is_redo ? "RE-" : "", hydra_targets[target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, hydra_targets[target_no]->sent, hydra_brains.todo + hydra_targets[target_no]->redo, head_no, hydra_targets[target_no]->redo_state ? hydra_targets[target_no]->redo_state - 1 : 0, hydra_targets[target_no]->redo); } @@ -3188,11 +3188,11 @@ int32_t main(int32_t argc, char *argv[]) { exit(-1); } if (hydra_brains.countlogin > MAX_LINES) { - fprintf(stderr, "[ERROR] Maximum number of logins is %d, this file has %llu entries.\n", MAX_LINES, hydra_brains.countlogin); + fprintf(stderr, "[ERROR] Maximum number of logins is %d, this file has %lu entries.\n", MAX_LINES, hydra_brains.countlogin); exit(-1); } if (hydra_brains.sizelogin > MAX_BYTES) { - fprintf(stderr, "[ERROR] Maximum size of the login file is %d, this file has %llu bytes.\n", MAX_BYTES, (uint64_t) hydra_brains.sizelogin); + fprintf(stderr, "[ERROR] Maximum size of the login file is %d, this file has %lu bytes.\n", MAX_BYTES, (uint64_t) hydra_brains.sizelogin); exit(-1); } login_ptr = malloc(hydra_brains.sizelogin + hydra_brains.countlogin + 8); @@ -3217,11 +3217,11 @@ int32_t main(int32_t argc, char *argv[]) { exit(-1); } if (hydra_brains.countpass > MAX_LINES) { - fprintf(stderr, "[ERROR] Maximum number of passwords is %d, this file has %llu entries.\n", MAX_LINES, hydra_brains.countpass); + fprintf(stderr, "[ERROR] Maximum number of passwords is %d, this file has %lu entries.\n", MAX_LINES, hydra_brains.countpass); exit(-1); } if (hydra_brains.sizepass > MAX_BYTES) { - fprintf(stderr, "[ERROR] Maximum size of the password file is %d, this file has %llu bytes.\n", MAX_BYTES, (uint64_t) hydra_brains.sizepass); + fprintf(stderr, "[ERROR] Maximum size of the password file is %d, this file has %lu bytes.\n", MAX_BYTES, (uint64_t) hydra_brains.sizepass); exit(-1); } pass_ptr = malloc(hydra_brains.sizepass + hydra_brains.countpass + 8); @@ -3264,11 +3264,11 @@ int32_t main(int32_t argc, char *argv[]) { exit(-1); } if (hydra_brains.countlogin > MAX_LINES / 2) { - fprintf(stderr, "[ERROR] Maximum number of colon file entries is %d, this file has %llu entries.\n", MAX_LINES / 2, hydra_brains.countlogin); + fprintf(stderr, "[ERROR] Maximum number of colon file entries is %d, this file has %lu entries.\n", MAX_LINES / 2, hydra_brains.countlogin); exit(-1); } if (hydra_brains.sizelogin > MAX_BYTES / 2) { - fprintf(stderr, "[ERROR] Maximum size of the colon file is %d, this file has %llu bytes.\n", MAX_BYTES / 2, (uint64_t) hydra_brains.sizelogin); + fprintf(stderr, "[ERROR] Maximum size of the colon file is %d, this file has %lu bytes.\n", MAX_BYTES / 2, (uint64_t) hydra_brains.sizelogin); exit(-1); } csv_ptr = malloc(hydra_brains.sizelogin + 2 * hydra_brains.countlogin + 8); @@ -3488,7 +3488,7 @@ int32_t main(int32_t argc, char *argv[]) { bail("No login/password combination given!"); if (hydra_brains.todo < hydra_options.tasks) { if (verbose && hydra_options.tasks != TASKS) - printf("[VERBOSE] More tasks defined than login/pass pairs exist. Tasks reduced to %llu\n", hydra_brains.todo); + printf("[VERBOSE] More tasks defined than login/pass pairs exist. Tasks reduced to %lu\n", hydra_brains.todo); hydra_options.tasks = hydra_brains.todo; } } @@ -3523,11 +3523,11 @@ int32_t main(int32_t argc, char *argv[]) { if (hydra_options.ssl) options = options | OPTION_SSL; if (hydra_options.colonfile != NULL) - printf("[DATA] max %d task%s per %d server%s, overall %d tasks, %llu login tr%s, ~%llu tr%s per task\n", hydra_options.tasks, hydra_options.tasks == 1 ? "" : "s", + printf("[DATA] max %d task%s per %d server%s, overall %d tasks, %lu login tr%s, ~%lu tr%s per task\n", hydra_options.tasks, hydra_options.tasks == 1 ? "" : "s", hydra_brains.targets, hydra_brains.targets == 1 ? "" : "s", hydra_options.max_use, hydra_brains.todo, hydra_brains.todo == 1 ? "y" : "ies", math2, math2 == 1 ? "y" : "ies"); else - printf("[DATA] max %d task%s per %d server%s, overall %d task%s, %llu login tr%s (l:%llu/p:%llu), ~%llu tr%s per task\n", hydra_options.tasks, hydra_options.tasks == 1 ? "" : "s", + printf("[DATA] max %d task%s per %d server%s, overall %d task%s, %lu login tr%s (l:%lu/p:%lu), ~%lu tr%s per task\n", hydra_options.tasks, hydra_options.tasks == 1 ? "" : "s", hydra_brains.targets, hydra_brains.targets == 1 ? "" : "s", hydra_options.max_use, hydra_options.max_use == 1 ? "" : "s", hydra_brains.todo, hydra_brains.todo == 1 ? "y" : "ies", @@ -3881,7 +3881,7 @@ int32_t main(int32_t argc, char *argv[]) { case 'C': // head reports connect error fck = write(hydra_heads[head_no]->sp[0], "Q", 1); if (debug) { - printf("[ATTEMPT-ERROR] target %s - login \"%s\" - pass \"%s\" - child %d - %llu of %llu\n", + printf("[ATTEMPT-ERROR] target %s - login \"%s\" - pass \"%s\" - child %d - %lu of %lu\n", hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, head_no, hydra_targets[hydra_heads[head_no]->target_no]->sent, hydra_brains.todo); } @@ -3930,7 +3930,7 @@ int32_t main(int32_t argc, char *argv[]) { hydra_increase_fail_count(hydra_heads[head_no]->target_no, head_no); } } - //if (debug) printf("DEBUG: bug hunt: %llu %llu\n", hydra_brains.todo_all, hydra_brains.sent); + //if (debug) printf("DEBUG: bug hunt: %lu %lu\n", hydra_brains.todo_all, hydra_brains.sent); usleepn(USLEEP_LOOP); (void) wait3(NULL, WNOHANG, NULL); @@ -3965,11 +3965,11 @@ int32_t main(int32_t argc, char *argv[]) { for (i = 0; i < hydra_options.max_use; i++) if (hydra_heads[i]->active > 0 && hydra_heads[i]->pid > 0) hydra_kill_head(i, 1, 3); - printf("[BUG] %llu + %d < %llu\n", hydra_brains.todo_all, total_redo_count, hydra_brains.sent); + printf("[BUG] %lu + %d < %lu\n", hydra_brains.todo_all, total_redo_count, hydra_brains.sent); bail("[BUG] Weird bug detected where more tests were performed than possible. Please rerun with -d command line switch and post all output plus command line here: https://github.com/vanhauser-thc/thc-hydra/issues/113 or send it in an email to vh@thc.org"); } */ - printf("[STATUS] %.2f tries/min, %llu tries in %02llu:%02lluh, %llu to do in %02llu:%02lluh, %d active\n", (1.0 * hydra_brains.sent) / (((elapsed_status - starttime) * 1.0) / 60), // tries/min + printf("[STATUS] %.2f tries/min, %lu tries in %02lu:%02luh, %lu to do in %02lu:%02luh, %d active\n", (1.0 * hydra_brains.sent) / (((elapsed_status - starttime) * 1.0) / 60), // tries/min hydra_brains.sent, // tries (uint64_t) ((elapsed_status - starttime) / 3600), // hours (uint64_t) (((elapsed_status - starttime) % 3600) / 60), // minutes @@ -4014,7 +4014,7 @@ int32_t main(int32_t argc, char *argv[]) { fprintf(stderr, "[ERROR] illegal target result value (%d=>%d)\n", i, hydra_targets[i]->done); } - printf("%d of %d target%s%scompleted, %llu valid password%s found\n", hydra_brains.targets - j - k - error, hydra_brains.targets, hydra_brains.targets == 1 ? " " : "s ", + printf("%d of %d target%s%scompleted, %lu valid password%s found\n", hydra_brains.targets - j - k - error, hydra_brains.targets, hydra_brains.targets == 1 ? " " : "s ", hydra_brains.found > 0 ? "successfully " : "", hydra_brains.found, hydra_brains.found == 1 ? "" : "s"); error += j; @@ -4085,7 +4085,7 @@ int32_t main(int32_t argc, char *argv[]) { printf("%s (%s) finished at %s\n", PROGRAM, RESOURCE, hydra_build_time()); if (hydra_brains.ofp != NULL && hydra_brains.ofp != stdout) { if (hydra_options.outfile_format == FORMAT_JSONV1) { - fprintf(hydra_brains.ofp, "\n\t],\n\"success\": %s,\n\"errormessages\": [ %s ],\n\"quantityfound\": %llu }\n", + fprintf(hydra_brains.ofp, "\n\t],\n\"success\": %s,\n\"errormessages\": [ %s ],\n\"quantityfound\": %lu }\n", (error ? "false" : "true"), json_error, hydra_brains.found); } fclose(hydra_brains.ofp); From 93181d813533e487a9665c1a94fadd83bf4f3318 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Fri, 21 Jul 2017 13:35:56 +0200 Subject: [PATCH 085/531] makefile fix --- Makefile | 93 ++------------------------------------------------------ 1 file changed, 2 insertions(+), 91 deletions(-) diff --git a/Makefile b/Makefile index fc74d73..372e67e 100644 --- a/Makefile +++ b/Makefile @@ -1,94 +1,5 @@ -CC=gcc -STRIP=strip -XDEFINES= -DLIBOPENSSL -DHAVE_PCRE -DLIBSVN -DLIBSSH -DHAVE_ZLIB -DHAVE_MATH_H -XLIBS= -lz -lssl -lpcre -lsvn_client-1 -lapr-1 -laprutil-1 -lsvn_subr-1 -lssh -lcrypto -XLIBPATHS=-L/usr/lib -L/usr/local/lib -L/lib -L/lib -L/usr/local/lib -L/lib -XIPATHS= -I/usr/include -I/usr/local/include -I/usr/include/subversion-1 -I/usr/include/apr-1 -I/usr/include/subversion-1 -PREFIX=/usr/local -XHYDRA_SUPPORT= -STRIP=strip - -HYDRA_LOGO=hydra-logo.o -PWI_LOGO=pw-inspector-logo.o -SEC=-fstack-protector-all --param ssp-buffer-size=4 -D_FORTIFY_SOURCE=2 - -# -# Makefile for Hydra - (c) 2001-2017 by van Hauser / THC -# -OPTS=-I. -O3 -# -Wall -g -pedantic -LIBS=-lm -BINDIR = /bin -MANDIR ?= /man/man1/ -DATADIR ?= /etc -DESTDIR ?= - -SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ - hydra-telnet.c hydra-cisco.c hydra-http.c hydra-ftp.c hydra-imap.c \ - hydra-pop3.c hydra-smb.c hydra-icq.c hydra-cisco-enable.c hydra-ldap.c \ - hydra-mysql.c hydra-mssql.c hydra-xmpp.c hydra-http-proxy-urlenum.c \ - hydra-snmp.c hydra-cvs.c hydra-smtp.c hydra-smtp-enum.c hydra-sapr3.c \ - hydra-ssh.c hydra-sshkey.c hydra-teamspeak.c hydra-postgres.c \ - hydra-rsh.c hydra-rlogin.c hydra-oracle-listener.c hydra-svn.c \ - hydra-pcanywhere.c hydra-sip.c hydra-oracle.c hydra-vmauthd.c \ - hydra-asterisk.c hydra-firebird.c hydra-afp.c hydra-ncp.c hydra-rdp.c \ - hydra-oracle-sid.c hydra-http-proxy.c hydra-http-form.c hydra-irc.c \ - hydra-s7-300.c hydra-redis.c hydra-adam6500.c hydra-rtsp.c \ - hydra-rpcap.c hydra-radmin2.c \ - hydra-time.c crc32.c d3des.c bfg.c ntlm.c sasl.c hmacmd5.c hydra-mod.c -OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ - hydra-telnet.o hydra-cisco.o hydra-http.o hydra-ftp.o hydra-imap.o \ - hydra-pop3.o hydra-smb.o hydra-icq.o hydra-cisco-enable.o hydra-ldap.o \ - hydra-mysql.o hydra-mssql.o hydra-xmpp.o hydra-http-proxy-urlenum.o \ - hydra-snmp.o hydra-cvs.o hydra-smtp.o hydra-smtp-enum.o hydra-sapr3.o \ - hydra-ssh.o hydra-sshkey.o hydra-teamspeak.o hydra-postgres.o \ - hydra-rsh.o hydra-rlogin.o hydra-oracle-listener.o hydra-svn.o \ - hydra-pcanywhere.o hydra-sip.o hydra-oracle-sid.o hydra-oracle.o \ - hydra-vmauthd.o hydra-asterisk.o hydra-firebird.o hydra-afp.o \ - hydra-ncp.o hydra-http-proxy.o hydra-http-form.o hydra-irc.o \ - hydra-redis.o hydra-rdp.o hydra-s7-300.c hydra-adam6500.o hydra-rtsp.o \ - hydra-rpcap.o hydra-radmin2.o \ - crc32.o d3des.o bfg.o ntlm.o sasl.o hmacmd5.o hydra-mod.o hydra-time.o -BINS = hydra pw-inspector - -EXTRA_DIST = README README.arm README.palm CHANGES TODO INSTALL LICENSE \ - hydra-mod.h hydra.h crc32.h d3des.h - -all: pw-inspector hydra $(XHYDRA_SUPPORT) - @echo - @echo Now type "make install" - -hydra: hydra.c $(OBJ) - $(CC) $(OPTS) $(SEC) $(LIBS) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o hydra $(HYDRA_LOGO) hydra.c $(OBJ) $(LIBS) $(XLIBS) $(XLIBPATHS) $(XIPATHS) $(XDEFINES) - @echo - @echo If men could get pregnant, abortion would be a sacrament - @echo - -xhydra: - -cd hydra-gtk && sh ./make_xhydra.sh - -pw-inspector: pw-inspector.c - -$(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o pw-inspector $(PWI_LOGO) pw-inspector.c - -.c.o: - $(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) -c $< $(XDEFINES) $(XIPATHS) - -strip: all - strip $(BINS) - -echo OK > /dev/null && test -x xhydra && strip xhydra || echo OK > /dev/null - -install: strip - -mkdir -p $(DESTDIR)$(PREFIX)$(BINDIR) - cp -f hydra-wizard.sh $(BINS) $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 hydra-wizard.sh $(BINS) - -echo OK > /dev/null && test -x xhydra && cp xhydra $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 xhydra || echo OK > /dev/null - -sed -e "s|^INSTALLDIR=.*|INSTALLDIR="$(PREFIX)"|" dpl4hydra.sh | sed -e "s|^LOCATION=.*|LOCATION="$(DATADIR)"|" > $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh - -chmod 755 $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh - -mkdir -p $(DESTDIR)$(PREFIX)$(DATADIR) - -cp -f *.csv $(DESTDIR)$(PREFIX)$(DATADIR) - -mkdir -p $(DESTDIR)$(PREFIX)$(MANDIR) - -cp -f hydra.1 xhydra.1 pw-inspector.1 $(DESTDIR)$(PREFIX)$(MANDIR) +all: + @echo Error: you must run "./configure" first clean: - rm -rf xhydra pw-inspector hydra *.o core *.core *.stackdump *~ Makefile.in Makefile dev_rfc hydra.restore arm/*.ipk arm/ipkg/usr/bin/* hydra-gtk/src/*.o hydra-gtk/src/xhydra hydra-gtk/stamp-h hydra-gtk/config.status hydra-gtk/errors hydra-gtk/config.log hydra-gtk/src/.deps hydra-gtk/src/Makefile hydra-gtk/Makefile cp -f Makefile.orig Makefile - From 21ae638382c60664e837eb5a86f1eb7a876c81b9 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Fri, 21 Jul 2017 13:37:30 +0200 Subject: [PATCH 086/531] 8.7-dev init --- CHANGES | 7 ++++++- hydra.c | 2 +- 2 files changed, 7 insertions(+), 2 deletions(-) diff --git a/CHANGES b/CHANGES index 6eee16c..604b0ff 100644 --- a/CHANGES +++ b/CHANGES @@ -1,7 +1,12 @@ Changelog for hydra ------------------- -Release 8.6-dev + +Release 8.7-dev +* ... + + +Release 8.6 * added radmin2 module by catatonic prime - great work! * smb module now checks if SMBv1 is supported by the server and if signing is required * http-form module now supports URLs up to 6000 bytes (thanks to petrock6@github for the patch) diff --git a/hydra.c b/hydra.c index 4579f9c..b6e21dd 100644 --- a/hydra.c +++ b/hydra.c @@ -207,7 +207,7 @@ char *SERVICES = #define RESTOREFILE "./hydra.restore" #define PROGRAM "Hydra" -#define VERSION "v8.6" +#define VERSION "v8.7-dev" #define AUTHOR "van Hauser/THC" #define EMAIL "" #define RESOURCE "http://www.thc.org/thc-hydra" From 0e6ef089db031b18524aac7209fa2dda38d950c9 Mon Sep 17 00:00:00 2001 From: Lukas Schwaighofer Date: Wed, 26 Jul 2017 01:22:11 +0200 Subject: [PATCH 087/531] fix various spelling and typography errors MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit taken from Debian; the changes were authored by: * Julián Moreno Patiño * Daniel Echeverry --- CHANGES | 2 +- hydra-gtk/make_xhydra.sh | 2 +- hydra-gtk/src/interface.c | 2 +- hydra-gtk/xhydra.glade | 2 +- hydra-http-form.c | 4 ++-- hydra-http.c | 2 +- hydra-ldap.c | 2 +- hydra-mod.c | 2 +- hydra-pop3.c | 2 +- hydra-smtp-enum.c | 2 +- hydra-smtp.c | 2 +- hydra-snmp.c | 2 +- hydra.1 | 4 ++-- hydra.c | 6 +++--- ntlm.c | 2 +- web/CHANGES | 2 +- 16 files changed, 20 insertions(+), 20 deletions(-) diff --git a/CHANGES b/CHANGES index 604b0ff..3adf655 100644 --- a/CHANGES +++ b/CHANGES @@ -39,7 +39,7 @@ Release 8.4 * New protocol: rpcap - thanks to Petar Kaleychev * New command line options: -y : disables -x 1aA interpretation, thanks to crondaemon for the patch - -I : ignore an existing hydra.restore file (dont wait for 10 seconds) + -I : ignore an existing hydra.restore file (don't wait for 10 seconds) * hydra-svn: works now with the current libsvn version * hydra-ssh: initial check for password auth support now uses login supplied * Fixed dpl4hydra to be able to update from the web again diff --git a/hydra-gtk/make_xhydra.sh b/hydra-gtk/make_xhydra.sh index cf4b8c0..04f4a3a 100755 --- a/hydra-gtk/make_xhydra.sh +++ b/hydra-gtk/make_xhydra.sh @@ -1,7 +1,7 @@ #!/bin/bash PKG_CONFIG_PATH=$PKG_CONFIG_PATH:/opt/gnome/lib/pkgconfig export PKG_CONFIG_PATH -echo "Trying to compile xhydra now (hydra gtk gui) - dont worry if this fails, this is really optional ..." +echo "Trying to compile xhydra now (hydra gtk gui) - don't worry if this fails, this is really optional ..." ./configure > /dev/null 2> errors test -e Makefile || { echo "Error: configure wasnt happy. Analyse this:" diff --git a/hydra-gtk/src/interface.c b/hydra-gtk/src/interface.c index 1ad52f4..d93b52a 100644 --- a/hydra-gtk/src/interface.c +++ b/hydra-gtk/src/interface.c @@ -913,7 +913,7 @@ GtkWidget *create_wndMain(void) { gtk_widget_set_name(entTelnet, "entTelnet"); gtk_widget_show(entTelnet); gtk_container_add(GTK_CONTAINER(alignment1), entTelnet); - gtk_tooltips_set_tip(tooltips, entTelnet, "Insert the return string for a succesfull login", NULL); + gtk_tooltips_set_tip(tooltips, entTelnet, "Insert the return string for a successful login", NULL); label36 = gtk_label_new("Telnet - Successful Login String"); gtk_widget_set_name(label36, "label36"); diff --git a/hydra-gtk/xhydra.glade b/hydra-gtk/xhydra.glade index fab45dd..57df9ac 100644 --- a/hydra-gtk/xhydra.glade +++ b/hydra-gtk/xhydra.glade @@ -2340,7 +2340,7 @@ addresses and/or DNS names. True - Insert the return string for a succesfull login + Insert the return string for a successful login True True True diff --git a/hydra-http-form.c b/hydra-http-form.c index 363e115..1d7e1f4 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -612,7 +612,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options hdrrep(&ptr_head, "^USER^", clogin); hdrrep(&ptr_head, "^PASS^", cpass); - /* again: no snprintf to be portable. dont worry, buffer cant overflow */ + /* again: no snprintf to be portable. don't worry, buffer cant overflow */ if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) { if (getcookie) { memset(proxy_string, 0, sizeof(proxy_string)); @@ -1199,7 +1199,7 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { } } - /* again: no snprintf to be portable. dont worry, buffer cant overflow */ + /* again: no snprintf to be portable. don't worry, buffer cant overflow */ if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) { // proxy with authentication add_header(&ptr_head, "Host", webtarget, HEADER_TYPE_DEFAULT); diff --git a/hydra-http.c b/hydra-http.c index 862bb68..7c8db46 100644 --- a/hydra-http.c +++ b/hydra-http.c @@ -36,7 +36,7 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha sprintf(buffer2, "%.50s:%.50s", login, pass); hydra_tobase64((unsigned char *) buffer2, strlen(buffer2), sizeof(buffer2)); - /* again: no snprintf to be portable. dont worry, buffer cant overflow */ + /* again: no snprintf to be portable. don't worry, buffer cant overflow */ if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) sprintf(buffer, "%s http://%s:%d%.250s HTTP/1.1\r\nHost: %s\r\nConnection: close\r\nAuthorization: Basic %s\r\nProxy-Authorization: Basic %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", type, webtarget, webport, miscptr, webtarget, buffer2, proxy_authentication[selected_proxy], header); diff --git a/hydra-ldap.c b/hydra-ldap.c index a2100c5..ff90d2e 100644 --- a/hydra-ldap.c +++ b/hydra-ldap.c @@ -466,6 +466,6 @@ void usage_ldap(const char* service) { "Special notes for Simple method has 3 operation modes: anonymous, (no user no pass),\n" "unauthenticated (user but no pass), user/pass authenticated (user and pass).\n" "So don't forget to set empty string as user/pass to test all modes.\n" - "Hint: to authenticate to a windows active directy ldap, this is usually\n" + "Hint: to authenticate to a windows active directory ldap, this is usually\n" " cn=^USER^,cn=users,dc=foo,dc=bar,dc=com for domain foo.bar.com\n\n", service); } diff --git a/hydra-mod.c b/hydra-mod.c index 88229a1..42b9c3b 100644 --- a/hydra-mod.c +++ b/hydra-mod.c @@ -534,7 +534,7 @@ int32_t internal__hydra_connect_to_ssl(int32_t socket, char *hostname) { // SSL_CTX_set_options(sslContext, SSL_OP_NO_SSLv2); // SSL_CTX_set_options(sslContext, SSL_OP_NO_TLSv1); - /* we set the default verifiers and dont care for the results */ + /* we set the default verifiers and don't care for the results */ (void) SSL_CTX_set_default_verify_paths(sslContext); #if OPENSSL_VERSION_NUMBER < 0x10100000L SSL_CTX_set_tmp_rsa_callback(sslContext, ssl_temp_rsa_cb); diff --git a/hydra-pop3.c b/hydra-pop3.c index 38897d0..fe07eed 100644 --- a/hydra-pop3.c +++ b/hydra-pop3.c @@ -620,7 +620,7 @@ int32_t service_pop3_init(char *ip, int32_t sp, unsigned char options, char *mis #endif if (hydra_send(sock, quit_str, strlen(quit_str), 0) < 0) { - //we dont care if the server is not receiving the quit msg + //we don't care if the server is not receiving the quit msg } hydra_disconnect(sock); diff --git a/hydra-smtp-enum.c b/hydra-smtp-enum.c index c7dccf2..ebcd379 100644 --- a/hydra-smtp-enum.c +++ b/hydra-smtp-enum.c @@ -182,7 +182,7 @@ void service_smtp_enum(char *ip, int32_t sp, unsigned char options, char *miscpt if ((buf = hydra_receive_line(sock)) == NULL) hydra_child_exit(2); if (strstr(buf, "220") == NULL) { - hydra_report(stderr, "Warning: SMTP does not allow to connect: %s\n", buf); + hydra_report(stderr, "Warning: SMTP does not allow connecting: %s\n", buf); hydra_child_exit(2); } // while (strstr(buf, "220 ") == NULL) { diff --git a/hydra-smtp.c b/hydra-smtp.c index 17df421..b27ec0f 100644 --- a/hydra-smtp.c +++ b/hydra-smtp.c @@ -290,7 +290,7 @@ void service_smtp(char *ip, int32_t sp, unsigned char options, char *miscptr, FI if ((buf = hydra_receive_line(sock)) == NULL) hydra_child_exit(2); if (strstr(buf, "220") == NULL) { - hydra_report(stderr, "[WARNING] SMTP does not allow to connect: %s\n", buf); + hydra_report(stderr, "[WARNING] SMTP does not allow connecting: %s\n", buf); free(buf); hydra_child_exit(2); } diff --git a/hydra-snmp.c b/hydra-snmp.c index f3235e0..5ffc4ef 100644 --- a/hydra-snmp.c +++ b/hydra-snmp.c @@ -301,7 +301,7 @@ int32_t start_snmp(int32_t s, char *ip, int32_t port, unsigned char options, cha i += 2; } else { buffer[i + 1] = 8; - memcpy(buffer + i + 2, salt, 8); // uninitialized and we dont care + memcpy(buffer + i + 2, salt, 8); // uninitialized and we don't care i += 10; } diff --git a/hydra.1 b/hydra.1 index 12e2e7c..5d87264 100644 --- a/hydra.1 +++ b/hydra.1 @@ -92,7 +92,7 @@ tried on all logins, then the next password. exit after the first found login/password pair (per host if \-M) .TP .B \-F -exit after the first found login/password pair for any host (for usage with -M) +exit after the first found login/password pair for any host (for usage with \-M) .TP .B \-M FILE server list for parallel attacks, one entry per line @@ -130,7 +130,7 @@ verbose mode / show login+pass combination for each attempt debug mode .TP .B \-I -ignore an existing restore file (dont wait 10 seconds) +ignore an existing restore file (don't wait 10 seconds) .TP .B \-h, \-\-help Show summary of options. diff --git a/hydra.c b/hydra.c index b6e21dd..f068807 100644 --- a/hydra.c +++ b/hydra.c @@ -516,7 +516,7 @@ void help(int32_t ext) { "[service://server[:PORT][/OPT]]\n"); PRINT_NORMAL(ext, "\nOptions:\n"); PRINT_EXTEND(ext, " -R restore a previous aborted/crashed session\n" - " -I ignore an existing restore file (dont wait 10 seconds)\n" + " -I ignore an existing restore file (don't wait 10 seconds)\n" #ifdef LIBOPENSSL " -S perform an SSL connect\n" #endif @@ -2434,7 +2434,7 @@ int32_t main(int32_t argc, char *argv[]) { #endif if (debug) - printf("[DEBUG] Ouput color flag is %d\n", colored_output); + printf("[DEBUG] Output color flag is %d\n", colored_output); if (hydra_options.restore && argc > 2 + debug + verbose) fprintf(stderr, "[WARNING] options after -R are now honored (since v8.6)\n"); @@ -4037,7 +4037,7 @@ int32_t main(int32_t argc, char *argv[]) { } if (debug) - printf("[DEBUG] killing all remaining childs now that might be stuck\n"); + printf("[DEBUG] killing all remaining children now that might be stuck\n"); for (i = 0; i < hydra_options.max_use; i++) if (hydra_heads[i]->active == HEAD_ACTIVE && hydra_heads[i]->pid > 0) hydra_kill_head(i, 1, 3); diff --git a/ntlm.c b/ntlm.c index 19e54f4..00df4c8 100644 --- a/ntlm.c +++ b/ntlm.c @@ -1321,7 +1321,7 @@ void dumpAuthChallenge(FILE * fp, tSmbNtlmAuthChallenge * challenge) { fprintf(fp, " Flags = %08x\n", IVAL(&challenge->flags, 0)); fprintf(fp, " Challenge = "); dumpRaw(fp, challenge->challengeData, 8); - fprintf(fp, " Uncomplete!! parse optional parameters\n"); + fprintf(fp, " Incomplete!! parse optional parameters\n"); } void dumpAuthResponse(FILE * fp, tSmbNtlmAuthResponse * response) { diff --git a/web/CHANGES b/web/CHANGES index 6eee16c..3ae374b 100644 --- a/web/CHANGES +++ b/web/CHANGES @@ -34,7 +34,7 @@ Release 8.4 * New protocol: rpcap - thanks to Petar Kaleychev * New command line options: -y : disables -x 1aA interpretation, thanks to crondaemon for the patch - -I : ignore an existing hydra.restore file (dont wait for 10 seconds) + -I : ignore an existing hydra.restore file (don't wait for 10 seconds) * hydra-svn: works now with the current libsvn version * hydra-ssh: initial check for password auth support now uses login supplied * Fixed dpl4hydra to be able to update from the web again From ea3fd5285c039473c9044325a6aa5c5092a167d9 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Wed, 26 Jul 2017 22:29:18 +0200 Subject: [PATCH 088/531] more spelling fixes --- CHANGES | 2 +- hydra-gtk/src/main.c | 2 +- hydra-http-form.c | 4 ++-- hydra-http-proxy-urlenum.c | 2 +- hydra-http-proxy.c | 2 +- hydra-http.c | 4 ++-- 6 files changed, 8 insertions(+), 8 deletions(-) diff --git a/CHANGES b/CHANGES index 3adf655..13894da 100644 --- a/CHANGES +++ b/CHANGES @@ -3,7 +3,7 @@ Changelog for hydra Release 8.7-dev -* ... +* added patch from debian maintainers which fixes spellings Release 8.6 diff --git a/hydra-gtk/src/main.c b/hydra-gtk/src/main.c index 375d98a..931493b 100644 --- a/hydra-gtk/src/main.c +++ b/hydra-gtk/src/main.c @@ -61,7 +61,7 @@ int main(int argc, char *argv[]) { gtk_widget_show(wndMain); - /* if we cant use the new cool file chooser, the save button gets disabled */ + /* if we can't use the new cool file chooser, the save button gets disabled */ #ifndef GTK_TYPE_FILE_CHOOSER GtkWidget *btnSave; diff --git a/hydra-http-form.c b/hydra-http-form.c index 1d7e1f4..6690bfe 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -612,7 +612,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options hdrrep(&ptr_head, "^USER^", clogin); hdrrep(&ptr_head, "^PASS^", cpass); - /* again: no snprintf to be portable. don't worry, buffer cant overflow */ + /* again: no snprintf to be portable. don't worry, buffer can't overflow */ if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) { if (getcookie) { memset(proxy_string, 0, sizeof(proxy_string)); @@ -1199,7 +1199,7 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { } } - /* again: no snprintf to be portable. don't worry, buffer cant overflow */ + /* again: no snprintf to be portable. don't worry, buffer can't overflow */ if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) { // proxy with authentication add_header(&ptr_head, "Host", webtarget, HEADER_TYPE_DEFAULT); diff --git a/hydra-http-proxy-urlenum.c b/hydra-http-proxy-urlenum.c index 5abaaea..0ca7b47 100644 --- a/hydra-http-proxy-urlenum.c +++ b/hydra-http-proxy-urlenum.c @@ -109,7 +109,7 @@ int32_t start_http_proxy_urlenum(int32_t s, char *ip, int32_t port, unsigned cha buildAuthRequest((tSmbNtlmAuthRequest *) buf2, 0, NULL, NULL); to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthRequest *) buf2)); - /* to be portable, no snprintf, buffer is big enough so it cant overflow */ + /* to be portable, no snprintf, buffer is big enough so it can't overflow */ //send the first.. sprintf(buffer, "GET %s HTTP/1.0\r\n%sProxy-Authorization: NTLM %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\nProxy-Connection: keep-alive\r\n%s\r\n", url, host, buf1, header); diff --git a/hydra-http-proxy.c b/hydra-http-proxy.c index 26420af..cc9ad6b 100644 --- a/hydra-http-proxy.c +++ b/hydra-http-proxy.c @@ -117,7 +117,7 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option buildAuthRequest((tSmbNtlmAuthRequest *) buf2, 0, NULL, NULL); to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthRequest *) buf2)); - /* to be portable, no snprintf, buffer is big enough so it cant overflow */ + /* to be portable, no snprintf, buffer is big enough so it can't overflow */ //send the first.. sprintf(buffer, "GET %s HTTP/1.0\r\n%sProxy-Authorization: NTLM %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\nProxy-Connection: keep-alive\r\n%s\r\n", url, host, buf1, header); if (hydra_send(s, buffer, strlen(buffer), 0) < 0) diff --git a/hydra-http.c b/hydra-http.c index 7c8db46..ddbec4c 100644 --- a/hydra-http.c +++ b/hydra-http.c @@ -36,7 +36,7 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha sprintf(buffer2, "%.50s:%.50s", login, pass); hydra_tobase64((unsigned char *) buffer2, strlen(buffer2), sizeof(buffer2)); - /* again: no snprintf to be portable. don't worry, buffer cant overflow */ + /* again: no snprintf to be portable. don't worry, buffer can't overflow */ if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) sprintf(buffer, "%s http://%s:%d%.250s HTTP/1.1\r\nHost: %s\r\nConnection: close\r\nAuthorization: Basic %s\r\nProxy-Authorization: Basic %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", type, webtarget, webport, miscptr, webtarget, buffer2, proxy_authentication[selected_proxy], header); @@ -82,7 +82,7 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha buildAuthRequest((tSmbNtlmAuthRequest *) buf2, 0, NULL, NULL); to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthRequest *) buf2)); - /* to be portable, no snprintf, buffer is big enough so it cant overflow */ + /* to be portable, no snprintf, buffer is big enough so it can't overflow */ //send the first.. if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) sprintf(buffer, From b8c70cd502470377a3140a0c8565dbe8c0f39d0a Mon Sep 17 00:00:00 2001 From: Lukas Schwaighofer Date: Tue, 1 Aug 2017 20:33:19 +0200 Subject: [PATCH 089/531] add radmin2 as a selectable option to xhydra --- hydra-gtk/src/interface.c | 1 + 1 file changed, 1 insertion(+) diff --git a/hydra-gtk/src/interface.c b/hydra-gtk/src/interface.c index d93b52a..f501d0b 100644 --- a/hydra-gtk/src/interface.c +++ b/hydra-gtk/src/interface.c @@ -259,6 +259,7 @@ GtkWidget *create_wndMain(void) { cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "pop3"); cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "pcanywhere"); cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "postgres"); + cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "radmin2"); cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "rdp"); cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "redis"); cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "rexec"); From 120e6d5ccbb271ed1823468aec4d7669291f97d2 Mon Sep 17 00:00:00 2001 From: Lukas Schwaighofer Date: Tue, 1 Aug 2017 20:34:29 +0200 Subject: [PATCH 090/531] minor man page improvements * mention radmin2 as a module in the hydra man page * remove the listed modules from the xhydra man page, refer to the hydra man page instead * improve markup --- hydra.1 | 32 +++++++++++++++----------------- xhydra.1 | 16 +++++----------- 2 files changed, 20 insertions(+), 28 deletions(-) diff --git a/hydra.1 b/hydra.1 index 5d87264..2b64218 100644 --- a/hydra.1 +++ b/hydra.1 @@ -13,26 +13,25 @@ hydra \- a very fast network logon cracker which support many different services Hydra is a parallelized login cracker which supports numerous protocols to attack. New modules are easy to add, beside that, it is flexible and very fast. - +.LP This tool gives researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. - +.TP Currently this tool supports: - adam6500 afp asterisk cisco cisco-enable cvs firebird ftp ftps - http[s]-{head|get|post} http[s]-{get|post}-form http-proxy - http-proxy-urlenum icq imap[s] irc ldap2[s] - ldap3[-{cram|digest}md5][s] mssql mysql(v4) mysql5 ncp nntp - oracle oracle-listener oracle-sid pcanywhere pcnfs pop3[s] - postgres rdp redis rexec rlogin rpcap rsh rtsp s7-300 sapr3 sip - smb smtp[s] smtp-enum snmp socks5 ssh sshkey svn teamspeak telnet[s] - vmauthd vnc xmpp - - For most protocols SSL is supported (e.g. https-get, ftp-ssl, etc.). - If not all necessary libraries are found during compile time, your - available services will be less. - Type "hydra" to see what is available. - +adam6500 afp asterisk cisco cisco-enable cvs firebird ftp ftps +http[s]-{head|get|post} http[s]-{get|post}-form http-proxy +http-proxy-urlenum icq imap[s] irc ldap2[s] +ldap3[-{cram|digest}md5][s] mssql mysql(v4) mysql5 ncp nntp +oracle oracle-listener oracle-sid pcanywhere pcnfs pop3[s] +postgres rdp radmin2 redis rexec rlogin rpcap rsh rtsp s7-300 sapr3 sip +smb smtp[s] smtp-enum snmp socks5 ssh sshkey svn teamspeak telnet[s] +vmauthd vnc xmpp +.LP +For most protocols SSL is supported (e.g. https-get, ftp-ssl, etc.). +If not all necessary libraries are found during compile time, your +available services will be less. +Type "hydra" to see what is available. .SH Options .TP .B target @@ -141,7 +140,6 @@ Show summary of options. The programs are documented fully by van Hauser .SH AUTHOR hydra was written by van Hauser / THC - .PP This manual page was written by Daniel Echeverry , for the Debian project (and may be used by others). diff --git a/xhydra.1 b/xhydra.1 index 453016a..4a75e0a 100644 --- a/xhydra.1 +++ b/xhydra.1 @@ -7,17 +7,11 @@ Execute xhydra in a terminal to start the application. Hydra is a parallelized login cracker which supports numerous protocols to attack. New modules are easy to add, beside that, it is flexible and very fast. - -This tool gives researchers and security consultants the possibility to -show how easy it would be to gain unauthorized access from remote to a -system. - -Currently this tool supports: - AFP, Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird, FTP, HTTP-FORM-GET, - HTTP-FORM-POST, HTTP-GET, HTTP-HEAD, HTTP-PROXY, HTTPS-FORM-GET, HTTPS-FORM-POST, - HTTPS-GET, HTTPS-HEAD, ICQ, IMAP, IRC, LDAP, MS-SQL, MYSQL, NCP, NNTP, PCNFS, POP3, - POSTGRES, RDP, REXEC, SAP/R3, SMB, SMTP, SNMP, SOCKS5, SSH(v1 and v2), - Subversion, Teamspeak (TS2), TELNET, VMware-Auth, VNC and XMPP. +.LP +.B xhydra +is the graphical fronend for the +.BR hydra (1) +tool. .SH SEE ALSO .BR hydra (1), .BR pw-inspector (1). From b9465a4c8ccd78bcbc5785931493c6591d4699ad Mon Sep 17 00:00:00 2001 From: van Hauser Date: Tue, 8 Aug 2017 16:08:05 +0200 Subject: [PATCH 091/531] spelling --- hydra-irc.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-irc.c b/hydra-irc.c index 601715b..f41f655 100644 --- a/hydra-irc.c +++ b/hydra-irc.c @@ -224,5 +224,5 @@ int32_t service_irc_init(char *ip, int32_t sp, unsigned char options, char *misc } void usage_irc(const char* service) { - printf("Module irc is optionally taking the general server password, if the server is requiring one\n" "and none is passed the password from -p/-P will be used\n\n"); + printf("Module irc is optionally taking the general server password, if the server is requiring one, and if none is passed the password from -p/-P will be used\n\n"); } From a6d35e11bc9b0fe48f82a6a9119d5bd56655f7c7 Mon Sep 17 00:00:00 2001 From: Dario Lombardo Date: Thu, 17 Aug 2017 23:02:35 +0200 Subject: [PATCH 092/531] Change REAME to README.md. --- README => README.md | 172 +++++++++++++++++++++++++++++--------------- 1 file changed, 114 insertions(+), 58 deletions(-) rename README => README.md (88%) diff --git a/README b/README.md similarity index 88% rename from README rename to README.md index 072175a..b5e1c8e 100644 --- a/README +++ b/README.md @@ -64,9 +64,11 @@ HOW TO COMPILE -------------- To configure, compile and install hydra, just type: +``` ./configure make make install +``` If you want the ssh module, you have to setup libssh (not libssh2!) on your system, get it from http://www.libssh.org, for ssh v1 support you also need @@ -74,9 +76,13 @@ to add "-DWITH_SSH1=On" option in the cmake command line. If you use Ubuntu/Debian, this will install supplementary libraries needed for a few optional modules: - apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev \ + +``` +apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev \ libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev \ firebird2.1-dev libncp-dev +``` + This enables all optional modules and features with the exception of Oracle, SAP R/3 and the apple filing protocol - which you will need to download and install from the vendor's web sites. @@ -90,31 +96,34 @@ and compile them manually. SUPPORTED PLATFORMS ------------------- -All UNIX platforms (linux, *bsd, solaris, etc.) -MacOS -Windows with Cygwin (both IPv4 and IPv6) -Mobile systems based on Linux, MacOS or QNX (e.g. Android, iPhone, Blackberry 10, Zaurus, iPaq) +- All UNIX platforms (linux, *bsd, solaris, etc.) +- MacOS +- Windows with Cygwin (both IPv4 and IPv6) +- Mobile systems based on Linux, MacOS or QNX (e.g. Android, iPhone, Blackberry 10, Zaurus, iPaq) HOW TO USE ---------- -If you just enter "hydra", you will see a short summary of the important +If you just enter `hydra`, you will see a short summary of the important options available. -Type "./hydra -h" to see all available command line options. +Type `./hydra -h` to see all available command line options. Note that NO login/password file is included. Generate them yourself. A default password list is however present, use "dpl4hydra.sh" to generate a list. -For Linux users, a GTK gui is available, try "./xhydra" +For Linux users, a GTK gui is available, try `./xhydra` For the command line usage, the syntax is as follows: For attacking one target or a network, you can use the new "://" style: hydra [some command line options] PROTOCOL://TARGET:PORT/OPTIONS The old mode can be used for these too, and additionally if you want to specify your targets from a text file, you *must* use this one: - hydra [some command line options] [-s port] TARGET PROTOCOL OPTIONS + +``` +hydra [some command line options] [-s port] TARGET PROTOCOL OPTIONS +``` Via the command line options you specify which logins to try, which passwords, if SSL should be used, how many parallel tasks to use for attacking, etc. @@ -158,22 +167,27 @@ notation but use the old style and just supply the protocol (and module options) hydra [some command line options] -M targets.txt ftp You can supply also port for each target entry by adding ":" after a target entry in the file, e.g.: - foo.bar.com - target.com:21 - unusual.port.com:2121 - default.used.here.com - 127.0.0.1 - 127.0.0.1:2121 + +``` +foo.bar.com +target.com:21 +unusual.port.com:2121 +default.used.here.com +127.0.0.1 +127.0.0.1:2121 +``` Note that if you want to attach IPv6 targets, you must supply the -6 option and *must* put IPv6 addresses in brackets in the file(!) like this: - foo.bar.com - target.com:21 - [fe80::1%eth0] - [2001::1] - [2002::2]:8080 - [2a01:24a:133:0:00:123:ff:1a] +``` +foo.bar.com +target.com:21 +[fe80::1%eth0] +[2001::1] +[2002::2]:8080 +[2a01:24a:133:0:00:123:ff:1a] +``` LOGINS AND PASSWORDS -------------------- @@ -182,45 +196,68 @@ With -l for login and -p for password you tell hydra that this is the only login and/or password to try. With -L for logins and -P for passwords you supply text files with entries. e.g.: - hydra -l admin -p password ftp://localhost/ - hydra -L default_logins.txt -p test ftp://localhost/ - hydra -l admin -P common_passwords.txt ftp://localhost/ - hydra -L logins.txt -P passwords.txt ftp://localhost/ + +``` +hydra -l admin -p password ftp://localhost/ +hydra -L default_logins.txt -p test ftp://localhost/ +hydra -l admin -P common_passwords.txt ftp://localhost/ +hydra -L logins.txt -P passwords.txt ftp://localhost/ +``` + Additionally, you can try passwords based on the login via the "-e" option. The "-e" option has three parameters: - s - try the login as password - n - try an empty password - r - reverse the login and try it as password + +``` +s - try the login as password +n - try an empty password +r - reverse the login and try it as password +``` + If you want to, e.g. try "try login as password and "empty password", you specify "-e sn" on the command line. - But there are two more modes for trying passwords than -p/-P: You can use text file which where a login and password pair is separated by a colon, e.g.: - admin:password - test:test - foo:bar + +``` +admin:password +test:test +foo:bar +``` + This is a common default account style listing, that is also generated by the dpl4hydra.sh default account file generator supplied with hydra. You use such a text file with the -C option - note that in this mode you can not use -l/-L/-p/-P options (-e nsr however you can). Example: - hydra -C default_accounts.txt ftp://localhost/ + +``` +hydra -C default_accounts.txt ftp://localhost/ +``` And finally, there is a bruteforce mode with the -x option (which you can not use with -p/-P/-C): - -x minimum_length:maximum_length:charset -the charset definition is 'a' for lowercase letters, 'A' for uppercase letters, -'1' for numbers and for anything else you supply it is their real representation. + +``` +-x minimum_length:maximum_length:charset +``` + +the charset definition is `a` for lowercase letters, `A` for uppercase letters, +`1` for numbers and for anything else you supply it is their real representation. Examples: - -x 1:3:a generate passwords from length 1 to 3 with all lowercase letters - -x 2:5:/ generate passwords from length 2 to 5 containing only slashes - -x 5:8:A1 generate passwords from length 5 to 8 with uppercase and numbers + +``` +-x 1:3:a generate passwords from length 1 to 3 with all lowercase letters +-x 2:5:/ generate passwords from length 2 to 5 containing only slashes +-x 5:8:A1 generate passwords from length 5 to 8 with uppercase and numbers +``` + Example: - hydra -l ftp -x 3:3:a ftp://localhost/ - +``` +hydra -l ftp -x 3:3:a ftp://localhost/ +``` SPECIAL OPTIONS FOR MODULES --------------------------- @@ -229,19 +266,23 @@ command line option, you can pass one option to a module. Many modules use this, a few require it! To see the special option of a module, type: + hydra -U + e.g. + ./hydra -U http-post-form The special options can be passed via the -m parameter, as 3rd command line option or in the service://target/option format. Examples (they are all equal): - ./hydra -l test -p test -m PLAIN 127.0.0.1 imap - ./hydra -l test -p test 127.0.0.1 imap PLAIN - ./hydra -l test -p test imap://127.0.0.1/PLAIN - +``` +./hydra -l test -p test -m PLAIN 127.0.0.1 imap +./hydra -l test -p test 127.0.0.1 imap PLAIN +./hydra -l test -p test imap://127.0.0.1/PLAIN +``` RESTORING AN ABORTED/CRASHED SESSION ------------------------------------ @@ -251,28 +292,35 @@ restore the session. This session file is written every 5 minutes. NOTE: the hydra.restore file can NOT be copied to a different platform (e.g. from little endian to big endian, or from solaris to aix) - - HOW TO SCAN/CRACK OVER A PROXY ------------------------------ The environment variable HYDRA_PROXY_HTTP defines the web proxy (this works just for the http services!). The following syntax is valid: - HYDRA_PROXY_HTTP="http://123.45.67.89:8080/" - HYDRA_PROXY_HTTP="http://login:password@123.45.67.89:8080/" - HYDRA_PROXY_HTTP="proxylist.txt" + +``` +HYDRA_PROXY_HTTP="http://123.45.67.89:8080/" +HYDRA_PROXY_HTTP="http://login:password@123.45.67.89:8080/" +HYDRA_PROXY_HTTP="proxylist.txt" +``` + The last example is a text file containing up to 64 proxies (in the same format definition as the other examples). For all other services, use the HYDRA_PROXY variable to scan/crack. It uses the same syntax. eg: - HYDRA_PROXY=[connect|socks4|socks5]://[login:password@]proxy_addr:proxy_port + +``` +HYDRA_PROXY=[connect|socks4|socks5]://[login:password@]proxy_addr:proxy_port +``` + for example: - HYDRA_PROXY=connect://proxy.anonymizer.com:8000 - HYDRA_PROXY=socks4://auth:pw@127.0.0.1:1080 - HYDRA_PROXY=socksproxylist.txt - +``` +HYDRA_PROXY=connect://proxy.anonymizer.com:8000 +HYDRA_PROXY=socks4://auth:pw@127.0.0.1:1080 +HYDRA_PROXY=socksproxylist.txt +``` ADDITIONAL HINTS ---------------- @@ -293,6 +341,7 @@ RESULTS OUTPUT The results are output to stdio along with the other information. Via the -o command line option, the results can also be written to a file. Using -b, the format of the output can be specified. Currently, these are supported: + * `text` - plain text format * `jsonv1` - JSON data using version 1.x of the schema (defined below). * `json` - JSON data using the latest version of the schema, currently there @@ -302,7 +351,8 @@ If using JSON output, the results file may not be valid JSON if there are serious errors in booting Hydra. -### JSON Schema +JSON Schema +----------- Here is an example of the JSON output. Notes on some of the fields: * `errormessages` - an array of zero or more strings that are normally printed @@ -373,6 +423,7 @@ Run against a SuSE Linux 7.2 on localhost with a "-C FILE" containing 295 entries (294 tries invalid logins, 1 valid). Every test was run three times (only for "1 task" just once), and the average noted down. +``` P A R A L L E L T A S K S SERVICE 1 4 8 16 32 50 64 100 128 ------- -------------------------------------------------------------------- @@ -380,6 +431,7 @@ telnet 23:20 5:58 2:58 1:34 1:05 0:33 0:45* 0:25* 0:55* ftp 45:54 11:51 5:54 3:06 1:25 0:58 0:46 0:29 0:32 pop3 92:10 27:16 13:56 6:42 2:55 1:57 1:24 1:14 0:50 imap 31:05 7:41 3:51 1:58 1:01 0:39 0:32 0:25 0:21 +``` (*) Note: telnet timings can be VERY different for 64 to 128 tasks! e.g. with @@ -387,10 +439,12 @@ Note: telnet timings can be VERY different for 64 to 128 tasks! e.g. with The reason for this is unknown... guesses per task (rounded up): - 295 74 38 19 10 6 5 3 3 + + 295 74 38 19 10 6 5 3 3 guesses possible per connect (depends on the server software and config): - telnet 4 + + telnet 4 ftp 6 pop3 1 imap 3 @@ -406,6 +460,7 @@ vh@thc.org (and put "antispam" in the subject line) You should use PGP to encrypt emails to vh@thc.org : +``` -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v3.3.3 (vh@thc.org) @@ -471,3 +526,4 @@ zlGuZP1S6Y7S13ytiULSzTfUxJmyGYgNo+4ygh0i6Dudf9NLmV+i9aEIbLbd6bni zB3yrr+vYBT0uDWmxwPjiJs= =ytEf -----END PGP PUBLIC KEY BLOCK----- +``` \ No newline at end of file From fdf9b5f588bcafa7a62892d47e99bad018cc616f Mon Sep 17 00:00:00 2001 From: van Hauser Date: Fri, 18 Aug 2017 11:30:42 +0200 Subject: [PATCH 093/531] warning fixes by crondaemon --- Makefile.unix | 1 - hydra-mod.c | 2 +- hydra-smb.c | 2 +- 3 files changed, 2 insertions(+), 3 deletions(-) diff --git a/Makefile.unix b/Makefile.unix index d58d678..6519b52 100644 --- a/Makefile.unix +++ b/Makefile.unix @@ -1,2 +1 @@ -CC=gcc STRIP=strip diff --git a/hydra-mod.c b/hydra-mod.c index 42b9c3b..e58d102 100644 --- a/hydra-mod.c +++ b/hydra-mod.c @@ -954,7 +954,7 @@ char *hydra_receive_line(int32_t socket) { if (got < 0) { if (debug) { sprintf(text, "[DEBUG] RECV [pid:%d]", getpid()); - hydra_dump_data("", -1, text); + hydra_dump_data((unsigned char*)"", -1, text); //hydra_report_debug(stderr, "DEBUG_RECV_BEGIN||END [pid:%d %d]", getpid(), i); perror("recv"); } diff --git a/hydra-smb.c b/hydra-smb.c index 3be4170..0337ffd 100644 --- a/hydra-smb.c +++ b/hydra-smb.c @@ -1499,7 +1499,7 @@ int32_t service_smb_init(char *ip, int32_t sp, unsigned char options, char *misc return -1; } - if (buf[15] & 16 == 16) { + if ((buf[15] & 16) == 16) { fprintf(stderr, "[ERROR] target smb://%s:%d/ requires signing which we do not support\n", hostname, port); return -1; } From 2a9e13201af3596d2e5a6ee6a4d1e549c0db287b Mon Sep 17 00:00:00 2001 From: van Hauser Date: Fri, 18 Aug 2017 11:31:06 +0200 Subject: [PATCH 094/531] warning fixes by crondaemon --- CHANGES | 1 + 1 file changed, 1 insertion(+) diff --git a/CHANGES b/CHANGES index 13894da..d5802ad 100644 --- a/CHANGES +++ b/CHANGES @@ -4,6 +4,7 @@ Changelog for hydra Release 8.7-dev * added patch from debian maintainers which fixes spellings +* a few warning fixes by crondaemon Release 8.6 From 892b79d46406e727fc3c42f1d5af756b7c716a92 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Fri, 18 Aug 2017 11:39:36 +0200 Subject: [PATCH 095/531] readme --- README.md => README | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename README.md => README (100%) diff --git a/README.md b/README similarity index 100% rename from README.md rename to README From 9cfe981bdcc859b7e2e0d338c19eb377e4e98fdd Mon Sep 17 00:00:00 2001 From: van Hauser Date: Fri, 18 Aug 2017 11:40:22 +0200 Subject: [PATCH 096/531] README for github --- README.md | 529 ++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 529 insertions(+) create mode 100644 README.md diff --git a/README.md b/README.md new file mode 100644 index 0000000..b5e1c8e --- /dev/null +++ b/README.md @@ -0,0 +1,529 @@ + + H Y D R A + + (c) 2001-2017 by van Hauser / THC + http://www.thc.org + many modules were written by David (dot) Maciejak @ gmail (dot) com + BFG code by Jan Dlabal + + Licensed under AGPLv3 (see LICENSE file) + + Please do not use in military or secret service organizations, + or for illegal purposes. + + + +INTRODUCTION +------------ +Number one of the biggest security holes are passwords, as every password +security study shows. +This tool is a proof of concept code, to give researchers and security +consultants the possibility to show how easy it would be to gain unauthorized +access from remote to a system. + +THIS TOOL IS FOR LEGAL PURPOSES ONLY! + +There are already several login hacker tools available, however none does +either support more than one protocol to attack or support parallized +connects. + +It was tested to compile cleanly on Linux, Windows/Cygwin, Solaris, +FreeBSD/OpenBSD, QNX (Blackberry 10) and MacOS. + +Currently this tool supports the following protocols: + Asterisk, AFP, Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird, FTP, + HTTP-FORM-GET, HTTP-FORM-POST, HTTP-GET, HTTP-HEAD, HTTP-POST, HTTP-PROXY, + HTTPS-FORM-GET, HTTPS-FORM-POST, HTTPS-GET, HTTPS-HEAD, HTTPS-POST, + HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, + Oracle SID, Oracle, PC-Anywhere, PCNFS, POP3, POSTGRES, RDP, Rexec, Rlogin, + Rsh, RTSP, SAP/R3, SIP, SMB, SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, + SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, + VNC and XMPP. + +However the module engine for new services is very easy so it won't take a +long time until even more services are supported. +Your help in writing, enhancing or fixing modules is highly appreciated!! :-) + + + +WHERE TO GET +------------ +You can always find the newest release/production version of hydra at its +project page at https://www.thc.org/thc-hydra +If you are interested in the current development state, the public development +repository is at Github: + svn co https://github.com/vanhauser-thc/thc-hydra + or + git clone https://github.com/vanhauser-thc/thc-hydra +Use the development version at your own risk. It contains new features and +new bugs. Things might not work! + + + +HOW TO COMPILE +-------------- +To configure, compile and install hydra, just type: + +``` +./configure +make +make install +``` + +If you want the ssh module, you have to setup libssh (not libssh2!) on your +system, get it from http://www.libssh.org, for ssh v1 support you also need +to add "-DWITH_SSH1=On" option in the cmake command line. + +If you use Ubuntu/Debian, this will install supplementary libraries needed +for a few optional modules: + +``` +apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev \ + libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev \ + firebird2.1-dev libncp-dev +``` + +This enables all optional modules and features with the exception of Oracle, +SAP R/3 and the apple filing protocol - which you will need to download and +install from the vendor's web sites. + +For all other Linux derivates and BSD based systems, use the system +software installer and look for similar named libraries like in the +command above. In all other cases you have to download all source libraries +and compile them manually. + + + +SUPPORTED PLATFORMS +------------------- +- All UNIX platforms (linux, *bsd, solaris, etc.) +- MacOS +- Windows with Cygwin (both IPv4 and IPv6) +- Mobile systems based on Linux, MacOS or QNX (e.g. Android, iPhone, Blackberry 10, Zaurus, iPaq) + + + +HOW TO USE +---------- +If you just enter `hydra`, you will see a short summary of the important +options available. +Type `./hydra -h` to see all available command line options. + +Note that NO login/password file is included. Generate them yourself. +A default password list is however present, use "dpl4hydra.sh" to generate +a list. + +For Linux users, a GTK gui is available, try `./xhydra` + +For the command line usage, the syntax is as follows: + For attacking one target or a network, you can use the new "://" style: + hydra [some command line options] PROTOCOL://TARGET:PORT/OPTIONS + The old mode can be used for these too, and additionally if you want to + specify your targets from a text file, you *must* use this one: + +``` +hydra [some command line options] [-s port] TARGET PROTOCOL OPTIONS +``` + +Via the command line options you specify which logins to try, which passwords, +if SSL should be used, how many parallel tasks to use for attacking, etc. + +PROTOCOL is the protocol you want to use for attacking, e.g. ftp, smtp, +http-get or many others are available +TARGET is the target you want to attack +OPTIONS are optional values which are special per PROTOCOL module + +FIRST - select your target + you have three options on how to specify the target you want to attack: + 1. a single target on the command line: just put the IP or DNS address in + 2. a network range on the command line: CIDR specification like "192.168.0.0/24" + 3. a list of hosts in a text file: one line per entry (see below) + +SECOND - select your protocol + Try to avoid telnet, as it is unreliable to detect a correct or false login attempt. + Use a port scanner to see which protocols are enabled on the target. + +THIRD - check if the module has optional parameters + hydra -U PROTOCOL + e.g. hydra -U smtp + +FOURTH - the destination port + this is optional! if no port is supplied the default common port for the + PROTOCOL is used. + If you specify SSL to use ("-S" option), the SSL common port is used by default. + + +If you use "://" notation, you must use "[" "]" brackets if you want to supply +IPv6 addresses or CIDR ("192.168.0.0/24") notations to attack: + hydra [some command line options] ftp://[192.168.0.0/24]/ + hydra [some command line options] -6 smtp://[2001:db8::1]/NTLM + +Note that everything hydra does is IPv4 only! +If you want to attack IPv6 addresses, you must add the "-6" command line option. +All attacks are then IPv6 only! + +If you want to supply your targets via a text file, you can not use the :// +notation but use the old style and just supply the protocol (and module options): + hydra [some command line options] -M targets.txt ftp +You can supply also port for each target entry by adding ":" after a +target entry in the file, e.g.: + +``` +foo.bar.com +target.com:21 +unusual.port.com:2121 +default.used.here.com +127.0.0.1 +127.0.0.1:2121 +``` + +Note that if you want to attach IPv6 targets, you must supply the -6 option +and *must* put IPv6 addresses in brackets in the file(!) like this: + +``` +foo.bar.com +target.com:21 +[fe80::1%eth0] +[2001::1] +[2002::2]:8080 +[2a01:24a:133:0:00:123:ff:1a] +``` + +LOGINS AND PASSWORDS +-------------------- +You have many options on how to attack with logins and passwords +With -l for login and -p for password you tell hydra that this is the only +login and/or password to try. +With -L for logins and -P for passwords you supply text files with entries. +e.g.: + +``` +hydra -l admin -p password ftp://localhost/ +hydra -L default_logins.txt -p test ftp://localhost/ +hydra -l admin -P common_passwords.txt ftp://localhost/ +hydra -L logins.txt -P passwords.txt ftp://localhost/ +``` + +Additionally, you can try passwords based on the login via the "-e" option. +The "-e" option has three parameters: + +``` +s - try the login as password +n - try an empty password +r - reverse the login and try it as password +``` + +If you want to, e.g. try "try login as password and "empty password", you +specify "-e sn" on the command line. + +But there are two more modes for trying passwords than -p/-P: +You can use text file which where a login and password pair is separated by a colon, +e.g.: + +``` +admin:password +test:test +foo:bar +``` + +This is a common default account style listing, that is also generated by the +dpl4hydra.sh default account file generator supplied with hydra. +You use such a text file with the -C option - note that in this mode you +can not use -l/-L/-p/-P options (-e nsr however you can). +Example: + +``` +hydra -C default_accounts.txt ftp://localhost/ +``` + +And finally, there is a bruteforce mode with the -x option (which you can not +use with -p/-P/-C): + +``` +-x minimum_length:maximum_length:charset +``` + +the charset definition is `a` for lowercase letters, `A` for uppercase letters, +`1` for numbers and for anything else you supply it is their real representation. +Examples: + +``` +-x 1:3:a generate passwords from length 1 to 3 with all lowercase letters +-x 2:5:/ generate passwords from length 2 to 5 containing only slashes +-x 5:8:A1 generate passwords from length 5 to 8 with uppercase and numbers +``` + +Example: + +``` +hydra -l ftp -x 3:3:a ftp://localhost/ +``` + +SPECIAL OPTIONS FOR MODULES +--------------------------- +Via the third command line parameter (TARGET SERVICE OPTIONAL) or the -m +command line option, you can pass one option to a module. +Many modules use this, a few require it! + +To see the special option of a module, type: + + hydra -U + +e.g. + + ./hydra -U http-post-form + +The special options can be passed via the -m parameter, as 3rd command line +option or in the service://target/option format. + +Examples (they are all equal): + +``` +./hydra -l test -p test -m PLAIN 127.0.0.1 imap +./hydra -l test -p test 127.0.0.1 imap PLAIN +./hydra -l test -p test imap://127.0.0.1/PLAIN +``` + +RESTORING AN ABORTED/CRASHED SESSION +------------------------------------ +When hydra is aborted with Control-C, killed or crashes, it leaves a +"hydra.restore" file behind which contains all necessary information to +restore the session. This session file is written every 5 minutes. +NOTE: the hydra.restore file can NOT be copied to a different platform (e.g. +from little endian to big endian, or from solaris to aix) + +HOW TO SCAN/CRACK OVER A PROXY +------------------------------ +The environment variable HYDRA_PROXY_HTTP defines the web proxy (this works +just for the http services!). +The following syntax is valid: + +``` +HYDRA_PROXY_HTTP="http://123.45.67.89:8080/" +HYDRA_PROXY_HTTP="http://login:password@123.45.67.89:8080/" +HYDRA_PROXY_HTTP="proxylist.txt" +``` + +The last example is a text file containing up to 64 proxies (in the same +format definition as the other examples). + +For all other services, use the HYDRA_PROXY variable to scan/crack. +It uses the same syntax. eg: + +``` +HYDRA_PROXY=[connect|socks4|socks5]://[login:password@]proxy_addr:proxy_port +``` + +for example: + +``` +HYDRA_PROXY=connect://proxy.anonymizer.com:8000 +HYDRA_PROXY=socks4://auth:pw@127.0.0.1:1080 +HYDRA_PROXY=socksproxylist.txt +``` + +ADDITIONAL HINTS +---------------- +* sort your password files by likelihood and use the -u option to find + passwords much faster! +* uniq your dictionary files! this can save you a lot of time :-) + cat words.txt | sort | uniq > dictionary.txt +* if you know that the target is using a password policy (allowing users + only to choose password with a minimum length of 6, containing a least one + letter and one number, etc. use the tool pw-inspector which comes along + with the hydra package to reduce the password list: + cat dictionary.txt | pw-inspector -m 6 -c 2 -n > passlist.txt + + +RESULTS OUTPUT +-------------- + +The results are output to stdio along with the other information. Via the -o +command line option, the results can also be written to a file. Using -b, +the format of the output can be specified. Currently, these are supported: + +* `text` - plain text format +* `jsonv1` - JSON data using version 1.x of the schema (defined below). +* `json` - JSON data using the latest version of the schema, currently there + is only version 1. + +If using JSON output, the results file may not be valid JSON if there are +serious errors in booting Hydra. + + +JSON Schema +----------- +Here is an example of the JSON output. Notes on some of the fields: + +* `errormessages` - an array of zero or more strings that are normally printed + to stderr at the end of the Hydra's run. The text is very free form. +* `success` - indication if Hydra ran correctly without error (**NOT** if + passwords were detected). This parameter is either the JSON value `true` + or `false` depending on completion. +* `quantityfound` - How many username+password combinations discovered. +* `jsonoutputversion` - Version of the schema, 1.00, 1.01, 1.11, 2.00, + 2.03, etc. Hydra will make second tuple of the version to always be two + digits to make it easier for downstream processors (as opposed to v1.1 vs + v1.10). The minor-level versions are additive, so 1.02 will contain more + fields than version 1.00 and will be backward compatible. Version 2.x will + break something from version 1.x output. + +Version 1.00 example: +``` +{ + "errormessages": [ + "[ERROR] Error Message of Something", + "[ERROR] Another Message", + "These are very free form" + ], + "generator": { + "built": "2017-03-01 14:44:22", + "commandline": "hydra -b jsonv1 -o results.json ... ...", + "jsonoutputversion": "1.00", + "server": "127.0.0.1", + "service": "http-post-form", + "software": "Hydra", + "version": "v8.5" + }, + "quantityfound": 2, + "results": [ + { + "host": "127.0.0.1", + "login": "bill@example.com", + "password": "bill", + "port": 9999, + "service": "http-post-form" + }, + { + "host": "127.0.0.1", + "login": "joe@example.com", + "password": "joe", + "port": 9999, + "service": "http-post-form" + } + ], + "success": false +} +``` + + +SPEED +----- +through the parallelizing feature, this password cracker tool can be very +fast, however it depends on the protocol. The fastest are generally POP3 +and FTP. +Experiment with the task option (-t) to speed things up! The higher - the +faster ;-) (but too high - and it disables the service) + + + +STATISTICS +---------- +Run against a SuSE Linux 7.2 on localhost with a "-C FILE" containing +295 entries (294 tries invalid logins, 1 valid). Every test was run three +times (only for "1 task" just once), and the average noted down. + +``` + P A R A L L E L T A S K S +SERVICE 1 4 8 16 32 50 64 100 128 +------- -------------------------------------------------------------------- +telnet 23:20 5:58 2:58 1:34 1:05 0:33 0:45* 0:25* 0:55* +ftp 45:54 11:51 5:54 3:06 1:25 0:58 0:46 0:29 0:32 +pop3 92:10 27:16 13:56 6:42 2:55 1:57 1:24 1:14 0:50 +imap 31:05 7:41 3:51 1:58 1:01 0:39 0:32 0:25 0:21 +``` + +(*) +Note: telnet timings can be VERY different for 64 to 128 tasks! e.g. with +128 tasks, running four times resulted in timings between 28 and 97 seconds! +The reason for this is unknown... + +guesses per task (rounded up): + + 295 74 38 19 10 6 5 3 3 + +guesses possible per connect (depends on the server software and config): + + telnet 4 + ftp 6 + pop3 1 + imap 3 + + + +BUGS & FEATURES +--------------- +Hydra: +Email me or David if you find bugs or if you have written a new module. +vh@thc.org (and put "antispam" in the subject line) + + +You should use PGP to encrypt emails to vh@thc.org : + +``` +-----BEGIN PGP PUBLIC KEY BLOCK----- +Version: GnuPG v3.3.3 (vh@thc.org) + +mQINBFIp+7QBEADQcJctjohuYjBxq7MELAlFDvXRTeIqqh8kqHPOR018xKL09pZT +KiBWFBkU48xlR3EtV5fC1yEt8gDEULe5o0qtK1aFlYBtAWkflVNjDrs+Y2BpjITQ +FnAPHw0SOOT/jfcvmhNOZMzMU8lIubAVC4cVWoSWJbLTv6e0DRIPiYgXNT5Quh6c +vqhnI1C39pEo/W/nh3hSa16oTc5dtTLbi5kEbdzml78TnT0OASmWLI+xtYKnP+5k +Xv4xrXRMVk4L1Bv9WpCY/Jb6J8K8SJYdXPtbaIi4VjgVr5gvg9QC/d/QP2etmw3p +lJ1Ldv63x6nXsxnPq6MSOOw8+QqKc1dAgIA43k6SU4wLq9TB3x0uTKnnB8pA3ACI +zPeRN9LFkr7v1KUMeKKEdu8jUut5iKUJVu63lVYxuM5ODb6Owt3+UXgsSaQLu9nI +DZqnp/M6YTCJTJ+cJANN+uQzESI4Z2m9ITg/U/cuccN/LIDg8/eDXW3VsCqJz8Bf +lBSwMItMhs/Qwzqc1QCKfY3xcNGc4aFlJz4Bq3zSdw3mUjHYJYv1UkKntCtvvTCN +DiomxyBEKB9J7KNsOLI/CSst3MQWSG794r9ZjcfA0EWZ9u6929F2pGDZ3LiS7Jx5 +n+gdBDMe0PuuonLIGXzyIuMrkfoBeW/WdnOxh+27eemcdpCb68XtQCw6UQARAQAB +tB52YW4gSGF1c2VyICgyMDEzKSA8dmhAdGhjLm9yZz6JAjkEEwECACMCGwMCHgEC +F4AFAlIp/QcGCwkIAwcCBhUKCQgLAgUWAwIBAAAKCRDI8AEqhCFiv2R9D/9qTCJJ +xCH4BUbWIUhw1zRkn9iCVSwZMmfaAhz5PdVTjeTelimMh5qwK2MNAjpR7vCCd3BH +Z2VLB2Eoz9MOgSCxcMOnCDJjtCdCOeaxiASJt8qLeRMwdMOtznM8MnKCIO8X4oo4 +qH8eNj83KgpI50ERBCj/EMsgg07vSyZ9i1UXjFofFnbHRWSW9yZO16qD4F6r4SGz +dsfXARcO3QRI5lbjdGqm+g+HOPj1EFLAOxJAQOygz7ZN5fj+vPp+G/drONxNyVKp +QFtENpvqPdU9CqYh8ssazXTWeBi/TIs0q0EXkzqo7CQjfNb6tlRsg18FxnJDK/ga +V/1umTg41bQuVP9gGmycsiNI8Atr5DWqaF+O4uDmQxcxS0kX2YXQ4CSQJFi0pml5 +slAGL8HaAUbV7UnQEqpayPyyTEx1i0wK5ZCHYjLBfJRZCbmHX7SbviSAzKdo5JIl +Atuk+atgW3vC3hDTrBu5qlsFCZvbxS21PJ+9zmK7ySjAEFH/NKFmx4B8kb7rPAOM +0qCTv0pD/e4ogJCxVrqQ2XcCSJWxJL31FNAMnBZpVzidudNURG2v61h3ckkSB/fP +JnkRy/yxYWrdFBYkURImxD8iFD1atj1n3EI5HBL7p/9mHxf1DVJWz7rYQk+3czvs +IhBz7xGBz4nhpCi87VDEYttghYlJanbiRfNh3okCOAQTAQIAIgUCUin7tAIbAwYL +CQgHAwIGFQgCCQoLBBYCAwECHgECF4AACgkQyPABKoQhYr8OIA//cvkhoKay88yS +AjMQypach8C5CvP7eFCT11pkCt1DMAO/8Dt6Y/Ts10dPjohGdIX4PkoLTkQDwBDJ +HoLO75oqj0CYLlqDI4oHgf2uzd0Zv8f/11CQQCtut5oEK72mGNzv3GgVqg60z2KR +2vpxvGQmDwpDOPP620tf/LuRQgBpks7uazcbkAE2Br09YrUQSCBNHy8kirHW5m5C +nupMrcvuFx7mHKW1z3FuhM8ijG7oRmcBWfVoneQgIT3l2WBniXg1mKFhuUSV8Erc +XIcc11qsKshyqh0GWb2JfeXbAcTW8/4IwrCP+VfAyLO9F9khP6SnCmcNF9EVJyR6 +Aw+JMNRin7PgvsqbFhpkq9N+gVBAufz3DZoMTEbsMTtW4lYG6HMWhza2+8G9XyaL +ARAWhkNVsmQQ5T6qGkI19thB6E/T6ZorTxqeopNVA7VNK3RVlKpkmUu07w5bTD6V +l3Ti6XfcSQqzt6YX2/WUE8ekEG3rSesuJ5fqjuTnIIOjBxr+pPxkzdoazlu2zJ9F +n24fHvlU20TccEWXteXj9VFzV/zbPEQbEqmE16lV+bO8U7UHqCOdE83OMrbNKszl +7LSCbFhCDtflUsyClBt/OPnlLEHgEE1j9QkqdFFy90l4HqGwKvx7lUFDnuF8LYsb +/hcP4XhqjiGcjTPYBDK254iYrpOSMZSIRgQQEQIABgUCUioGfQAKCRBDlBVOdiii +tuddAJ4zMrge4qzajScIQcXYgIWMXVenCQCfYTNQPGkHVyp3dMhJ0NR21TYoYMC5 +Ag0EUin7tAEQAK5/AEIBLlA/TTgjUF3im6nu/rkWTM7/gs5H4W0a04kF4UPhaJUR +gCNlDfUnBFA0QD7Jja5LHYgLdoHXiFelPhGrbZel/Sw6sH2gkGCBtFMrVkm3u7tt +x3AZlprqqRH68Y5xTCEjGRncCAmaDgd2apgisJqXpu0dRDroFYpJFNH3vw9N2a62 +0ShNakYP4ykVG3jTDC4MSl2q3BO5dzn8GYFHU0CNz6nf3gZR+48BG+zmAT77peTS ++C4Mbd6LmMmB0cuS2kYiFRwE2B69UWguLHjpXFcu9/85JJVCl2CIab7l5hpqGmgw +G/yW8HFK04Yhew7ZJOXJfUYlv1EZzR5bOsZ8Z9inC6hvFmxuCYCFnvkiEI+pOxPA +oeNOkMaT/W4W+au0ZVt3Hx+oD0pkJb5if0jrCaoAD4gpWOte6LZA8mAbKTxkHPBr +rA9/JFis5CVNI688O6eDiJqCCJjPOQA+COJI+0V+tFa6XyHPB4LxA46RxtumUZMC +v/06sDJlXMNpZbSd5Fq95YfZd4l9Vr9VrvKXfbomn+akwUymP8RDyc6Z8BzjF4Y5 +02m6Ts0J0MnSYfEDqJPPZbMGB+GAgAqLs7FrZJQzOZTiOXOSIJsKMYsPIDWE8lXv +s77rs0rGvgvQfWzPsJlMIx6ryrMnAsfOkzM2GChGNX9+pABpgOdYII4bABEBAAGJ +Ah8EGAECAAkFAlIp+7QCGwwACgkQyPABKoQhYr+hrg/9Er0+HN78y6UWGFHu/KVK +d8M6ekaqjQndQXmzQaPQwsOHOvWdC+EtBoTdR3VIjAtX96uvzCRV3sb0XPB9S9eP +gRrO/t5+qTVTtjua1zzjZsMOr1SxhBgZ5+0U2aoY1vMhyIjUuwpKKNqj2uf+uj5Y +ZQbCNklghf7EVDHsYQ4goB9gsNT7rnmrzSc6UUuJOYI2jjtHp5BPMBHh2WtUVfYP +8JqDfQ+eJQr5NCFB24xMW8OxMJit3MGckUbcZlUa1wKiTb0b76fOjt0y/+9u1ykd +X+i27DAM6PniFG8BfqPq/E3iU20IZGYtaAFBuhhDWR3vGY4+r3OxdlFAJfBG9XDD +aEDTzv1XF+tEBo69GFaxXZGdk9//7qxcgiya4LL9Kltuvs82+ZzQhC09p8d3YSQN +cfaYObm4EwbINdKP7cr4anGFXvsLC9urhow/RNBLiMbRX/5qBzx2DayXtxEnDlSC +Mh7wCkNDYkSIZOrPVUFOCGxu7lloRgPxEetM5x608HRa3hDHoe5KvUBmmtavB/aR +zlGuZP1S6Y7S13ytiULSzTfUxJmyGYgNo+4ygh0i6Dudf9NLmV+i9aEIbLbd6bni +1B/y8hBSx3SVb4sQVRe3clBkfS1/mYjlldtYjzOwcd02x599KJlcChf8HnWFB7qT +zB3yrr+vYBT0uDWmxwPjiJs= +=ytEf +-----END PGP PUBLIC KEY BLOCK----- +``` \ No newline at end of file From e669df08a89182c4fa7615edff5304b2bb0a5122 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Fri, 18 Aug 2017 12:00:19 +0200 Subject: [PATCH 097/531] readme updates --- README | 16 ++++++++-------- README.md | 16 ++++++++-------- 2 files changed, 16 insertions(+), 16 deletions(-) diff --git a/README b/README index b5e1c8e..b3a3d14 100644 --- a/README +++ b/README @@ -75,12 +75,12 @@ system, get it from http://www.libssh.org, for ssh v1 support you also need to add "-DWITH_SSH1=On" option in the cmake command line. If you use Ubuntu/Debian, this will install supplementary libraries needed -for a few optional modules: +for a few optional modules (note that some might not be available on your distribution): ``` apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev \ libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev \ - firebird2.1-dev libncp-dev + firebird-dev libncp-dev ``` This enables all optional modules and features with the exception of Oracle, @@ -96,8 +96,8 @@ and compile them manually. SUPPORTED PLATFORMS ------------------- -- All UNIX platforms (linux, *bsd, solaris, etc.) -- MacOS +- All UNIX platforms (Linux, *bsd, Solaris, etc.) +- MacOS (basically a BSD clone) - Windows with Cygwin (both IPv4 and IPv6) - Mobile systems based on Linux, MacOS or QNX (e.g. Android, iPhone, Blackberry 10, Zaurus, iPaq) @@ -117,12 +117,12 @@ For Linux users, a GTK gui is available, try `./xhydra` For the command line usage, the syntax is as follows: For attacking one target or a network, you can use the new "://" style: - hydra [some command line options] PROTOCOL://TARGET:PORT/OPTIONS + hydra [some command line options] PROTOCOL://TARGET:PORT/MODULE-OPTIONS The old mode can be used for these too, and additionally if you want to specify your targets from a text file, you *must* use this one: ``` -hydra [some command line options] [-s port] TARGET PROTOCOL OPTIONS +hydra [some command line options] [-s PORT] TARGET PROTOCOL [MODULE-OPTIONS] ``` Via the command line options you specify which logins to try, which passwords, @@ -131,7 +131,7 @@ if SSL should be used, how many parallel tasks to use for attacking, etc. PROTOCOL is the protocol you want to use for attacking, e.g. ftp, smtp, http-get or many others are available TARGET is the target you want to attack -OPTIONS are optional values which are special per PROTOCOL module +MODULE-OPTIONS are optional values which are special per PROTOCOL module FIRST - select your target you have three options on how to specify the target you want to attack: @@ -156,7 +156,7 @@ FOURTH - the destination port If you use "://" notation, you must use "[" "]" brackets if you want to supply IPv6 addresses or CIDR ("192.168.0.0/24") notations to attack: hydra [some command line options] ftp://[192.168.0.0/24]/ - hydra [some command line options] -6 smtp://[2001:db8::1]/NTLM + hydra [some command line options] -6 smtps://[2001:db8::1]/NTLM Note that everything hydra does is IPv4 only! If you want to attack IPv6 addresses, you must add the "-6" command line option. diff --git a/README.md b/README.md index b5e1c8e..b3a3d14 100644 --- a/README.md +++ b/README.md @@ -75,12 +75,12 @@ system, get it from http://www.libssh.org, for ssh v1 support you also need to add "-DWITH_SSH1=On" option in the cmake command line. If you use Ubuntu/Debian, this will install supplementary libraries needed -for a few optional modules: +for a few optional modules (note that some might not be available on your distribution): ``` apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev \ libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev \ - firebird2.1-dev libncp-dev + firebird-dev libncp-dev ``` This enables all optional modules and features with the exception of Oracle, @@ -96,8 +96,8 @@ and compile them manually. SUPPORTED PLATFORMS ------------------- -- All UNIX platforms (linux, *bsd, solaris, etc.) -- MacOS +- All UNIX platforms (Linux, *bsd, Solaris, etc.) +- MacOS (basically a BSD clone) - Windows with Cygwin (both IPv4 and IPv6) - Mobile systems based on Linux, MacOS or QNX (e.g. Android, iPhone, Blackberry 10, Zaurus, iPaq) @@ -117,12 +117,12 @@ For Linux users, a GTK gui is available, try `./xhydra` For the command line usage, the syntax is as follows: For attacking one target or a network, you can use the new "://" style: - hydra [some command line options] PROTOCOL://TARGET:PORT/OPTIONS + hydra [some command line options] PROTOCOL://TARGET:PORT/MODULE-OPTIONS The old mode can be used for these too, and additionally if you want to specify your targets from a text file, you *must* use this one: ``` -hydra [some command line options] [-s port] TARGET PROTOCOL OPTIONS +hydra [some command line options] [-s PORT] TARGET PROTOCOL [MODULE-OPTIONS] ``` Via the command line options you specify which logins to try, which passwords, @@ -131,7 +131,7 @@ if SSL should be used, how many parallel tasks to use for attacking, etc. PROTOCOL is the protocol you want to use for attacking, e.g. ftp, smtp, http-get or many others are available TARGET is the target you want to attack -OPTIONS are optional values which are special per PROTOCOL module +MODULE-OPTIONS are optional values which are special per PROTOCOL module FIRST - select your target you have three options on how to specify the target you want to attack: @@ -156,7 +156,7 @@ FOURTH - the destination port If you use "://" notation, you must use "[" "]" brackets if you want to supply IPv6 addresses or CIDR ("192.168.0.0/24") notations to attack: hydra [some command line options] ftp://[192.168.0.0/24]/ - hydra [some command line options] -6 smtp://[2001:db8::1]/NTLM + hydra [some command line options] -6 smtps://[2001:db8::1]/NTLM Note that everything hydra does is IPv4 only! If you want to attack IPv6 addresses, you must add the "-6" command line option. From b05d52f43d341a570cceae2656d79d4ad2d5bada Mon Sep 17 00:00:00 2001 From: Dario Lombardo Date: Thu, 17 Aug 2017 22:47:02 +0200 Subject: [PATCH 098/531] Add travis-ci file. --- .travis.yml | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) create mode 100644 .travis.yml diff --git a/.travis.yml b/.travis.yml new file mode 100644 index 0000000..070d52a --- /dev/null +++ b/.travis.yml @@ -0,0 +1,16 @@ +language: c +sudo: required +dist: trusty +os: + - linux + - osx +compiler: + - clang + - gcc +matrix: +before_install: + - $CC --version +before_script: + ./configure +script: + - make From 2d67764bbf3db8cbce7e2f364a510a73a84480be Mon Sep 17 00:00:00 2001 From: Dario Lombardo Date: Fri, 18 Aug 2017 21:26:29 +0200 Subject: [PATCH 099/531] mod: fix warning (found by ccc-analyzer). --- hydra-mod.c | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/hydra-mod.c b/hydra-mod.c index e58d102..d568571 100644 --- a/hydra-mod.c +++ b/hydra-mod.c @@ -288,9 +288,9 @@ int32_t internal__hydra_connect(char *host, int32_t port, int32_t protocol, int3 if (debug) printf("DEBUG_CONNECT_PROXY_OK\n"); } else { - if (debug) + if (debug && tmpptr) printf("DEBUG_CONNECT_PROXY_FAILED (Code: %c%c%c)\n", *tmpptr, *(tmpptr + 1), *(tmpptr + 2)); - if (verbose) + if (verbose && tmpptr) fprintf(stderr, "[ERROR] CONNECT call to proxy failed with code %c%c%c\n", *tmpptr, *(tmpptr + 1), *(tmpptr + 2)); err = 1; } @@ -948,7 +948,6 @@ char *hydra_receive_line(int32_t socket) { } else { if (debug) printf("[DEBUG] hydra_data_ready_timed: %d, waittime: %d, conwait: %d, socket: %d\n", i, waittime, conwait, socket); - i = 0; } if (got < 0) { From 995c6d2385f9cfa29a16a7a0dc413490c7a2b904 Mon Sep 17 00:00:00 2001 From: Dario Lombardo Date: Fri, 18 Aug 2017 21:29:23 +0200 Subject: [PATCH 100/531] vnc: fix use after-free (found by ccc-analyzer). --- hydra-vnc.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-vnc.c b/hydra-vnc.c index ee8f582..6dc3cdd 100644 --- a/hydra-vnc.c +++ b/hydra-vnc.c @@ -135,8 +135,8 @@ int32_t start_vnc(int32_t s, char *ip, int32_t port, unsigned char options, char return 3; return 1; default: - free(buf); hydra_report(stderr, "[ERROR] unknown VNC server security result %d\n", buf[3]); + free(buf); return 1; } From bb734b2c90fff632c5f9dbfb7e6f0de8a7d2b538 Mon Sep 17 00:00:00 2001 From: Dario Lombardo Date: Fri, 18 Aug 2017 21:34:57 +0200 Subject: [PATCH 101/531] cisco: use strstr only on non-null var (found by ccc-analyzer). --- hydra-cisco.c | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/hydra-cisco.c b/hydra-cisco.c index 6a65f77..32d0e20 100644 --- a/hydra-cisco.c +++ b/hydra-cisco.c @@ -127,7 +127,7 @@ void service_cisco(char *ip, int32_t sp, unsigned char options, char *miscptr, F switch (run) { case 1: /* connect and service init function */ { - unsigned char *buf2; + unsigned char *buf2 = NULL; int32_t f = 0; if (sock >= 0) @@ -151,9 +151,10 @@ void service_cisco(char *ip, int32_t sp, unsigned char options, char *miscptr, F hydra_child_exit(1); } do { - if (f != 0) + if (f != 0) { free(buf2); - else + buf2 = NULL; + } else f = 1; if ((buf2 = (unsigned char *) hydra_receive_line(sock)) == NULL) { if (failc < retry) { @@ -169,7 +170,7 @@ void service_cisco(char *ip, int32_t sp, unsigned char options, char *miscptr, F } if (buf2 != NULL && hydra_strcasestr((char*)buf2, "ress ENTER") != NULL) hydra_send(sock, "\r\n", 2, 0); - } while (strstr((char *) buf2, "assw") == NULL); + } while (buf2 != NULL && strstr((char *) buf2, "assw") == NULL); free(buf2); if (next_run != 0) break; From 82be691b9d34f0f743f4e37c40c9c1f9cfca099e Mon Sep 17 00:00:00 2001 From: Dario Lombardo Date: Fri, 18 Aug 2017 21:37:29 +0200 Subject: [PATCH 102/531] vmauthd: don't use freed mem (found by ccc-analyzer). --- hydra-vmauthd.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-vmauthd.c b/hydra-vmauthd.c index 7ed6174..95ba53f 100644 --- a/hydra-vmauthd.c +++ b/hydra-vmauthd.c @@ -108,8 +108,8 @@ void service_vmauthd(char *ip, int32_t sp, unsigned char options, char *miscptr, hydra_child_exit(2); } if ((strstr(buf, "Version 1.00") == NULL) && (strstr(buf, "Version 1.10") == NULL)) { - free(buf); hydra_report(stderr, "[ERROR] this vmware authd protocol is not supported, please report: %s\n", buf); + free(buf); hydra_child_exit(2); } //by default this service is waiting for ssl connections From 8c42e0007b3f24c31022918aae0c7302dbec67b2 Mon Sep 17 00:00:00 2001 From: Dario Lombardo Date: Fri, 18 Aug 2017 21:41:00 +0200 Subject: [PATCH 103/531] radmin2: cast calloc output (found by ccc-analyzer). --- hydra-radmin2.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/hydra-radmin2.c b/hydra-radmin2.c index cba0431..e72c838 100644 --- a/hydra-radmin2.c +++ b/hydra-radmin2.c @@ -86,7 +86,7 @@ char *message2buffer(struct rmessage *msg) { switch(msg->type) { case 0x1b: //Challenge request - data = calloc (10, sizeof(unsigned char)); + data = (char *)calloc (10, sizeof(char)); if(data == NULL) { hydra_report(stderr, "calloc failure\n"); hydra_child_exit(0); @@ -97,7 +97,7 @@ char *message2buffer(struct rmessage *msg) { memcpy((data+9), &msg->type, sizeof(char)); break; case 0x09: - data = calloc (42, sizeof(unsigned char)); + data = (char *)calloc (42, sizeof(char)); if(data == NULL) { hydra_report(stderr, "calloc failure\n"); hydra_child_exit(0); From 0ed3bef2db833b0106831cd12d7908fc3e429c46 Mon Sep 17 00:00:00 2001 From: Dario Lombardo Date: Fri, 18 Aug 2017 21:55:47 +0200 Subject: [PATCH 104/531] hydra.c: make proper allocation and casts when using malloc. --- hydra.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/hydra.c b/hydra.c index f068807..833f258 100644 --- a/hydra.c +++ b/hydra.c @@ -894,7 +894,7 @@ void hydra_restore_read() { if (debug) printf("[DEBUG] reading restore file: Step 10 complete\n"); - hydra_targets = malloc((hydra_brains.targets + 3) * sizeof(hydra_targets)); + hydra_targets = (hydra_target **) malloc((hydra_brains.targets + 3) * sizeof(hydra_target*)); for (j = 0; j < hydra_brains.targets; j++) { hydra_targets[j] = malloc(sizeof(hydra_target)); fck = (int32_t) fread(hydra_targets[j], sizeof(hydra_target), 1, f); @@ -3397,7 +3397,7 @@ int32_t main(int32_t argc, char *argv[]) { four_from = (addr4 & l); l = 1 << (32 - k); hydra_brains.targets = countservers = l; - hydra_targets = malloc(sizeof(hydra_target*) * (l + 2) + 8); + hydra_targets = (hydra_target**)malloc(sizeof(hydra_target*) * (l + 2) + 8); if (hydra_targets == NULL) bail("Could not allocate enough memory for target data"); i = 0; From 35ece53d3b9025f60d0d8baf5a0382637d1749c4 Mon Sep 17 00:00:00 2001 From: Dario Lombardo Date: Sat, 19 Aug 2017 00:50:17 +0200 Subject: [PATCH 105/531] Move int includes to hydra-mod and add includes. This makes the code compile on OSX. --- hydra-mod.h | 8 ++++++++ hydra-rdp.c | 2 ++ hydra-sip.c | 11 +++-------- 3 files changed, 13 insertions(+), 8 deletions(-) diff --git a/hydra-mod.h b/hydra-mod.h index bf72b7c..5d613f7 100644 --- a/hydra-mod.h +++ b/hydra-mod.h @@ -3,6 +3,14 @@ #include "hydra.h" +#ifdef __sun + #include +#elif defined(__FreeBSD__) || defined(__IBMCPP__) || defined(_AIX) + #include +#else + #include +#endif + extern char quiet; extern void hydra_child_exit(int32_t code); diff --git a/hydra-rdp.c b/hydra-rdp.c index af281a4..d4ad81d 100644 --- a/hydra-rdp.c +++ b/hydra-rdp.c @@ -34,6 +34,8 @@ It's particularly true on windows XP */ +#include + #ifndef LIBOPENSSL #include void dummy_rdp() { diff --git a/hydra-sip.c b/hydra-sip.c index c1411fb..7d681e8 100644 --- a/hydra-sip.c +++ b/hydra-sip.c @@ -5,6 +5,9 @@ * * 05042011 david: modified to use sasl lib */ + +#include "hydra-mod.h" + #ifndef LIBOPENSSL #include void dummy_sip() { @@ -12,15 +15,7 @@ void dummy_sip() { } #else -#ifdef __sun - #include -#elif defined(__FreeBSD__) || defined(__IBMCPP__) || defined(_AIX) - #include -#else - #include -#endif #include "sasl.h" -#include "hydra-mod.h" extern int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec); From 502eb5286af1805b08a118a9606a5e1811d5f884 Mon Sep 17 00:00:00 2001 From: Dario Lombardo Date: Sat, 19 Aug 2017 15:00:16 +0200 Subject: [PATCH 106/531] travis-ci: install libgcrypt on osx. --- .travis.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.travis.yml b/.travis.yml index 070d52a..19f1e15 100644 --- a/.travis.yml +++ b/.travis.yml @@ -9,7 +9,7 @@ compiler: - gcc matrix: before_install: - - $CC --version + - if [ "$TRAVIS_OS_NAME" == "osx" ];then brew install libgcrypt; fi before_script: ./configure script: From 9772a91fb0c6936889f46c9f60dc3b4051bdac5b Mon Sep 17 00:00:00 2001 From: van Hauser Date: Sat, 19 Aug 2017 17:48:10 +0200 Subject: [PATCH 107/531] include fix --- CHANGES | 2 +- hydra-rdp.c | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/CHANGES b/CHANGES index d5802ad..5cea41b 100644 --- a/CHANGES +++ b/CHANGES @@ -4,7 +4,7 @@ Changelog for hydra Release 8.7-dev * added patch from debian maintainers which fixes spellings -* a few warning fixes by crondaemon +* many warning fixes by crondaemon Release 8.6 diff --git a/hydra-rdp.c b/hydra-rdp.c index d4ad81d..8b9394c 100644 --- a/hydra-rdp.c +++ b/hydra-rdp.c @@ -34,7 +34,7 @@ It's particularly true on windows XP */ -#include +#include "hydra-mod.h" #ifndef LIBOPENSSL #include From ba4a23d2d470d7407a82a0029d5cde763bc099cd Mon Sep 17 00:00:00 2001 From: van Hauser Date: Fri, 1 Sep 2017 09:29:03 +0200 Subject: [PATCH 108/531] segfault fix --- CHANGES | 1 + hydra.c | 32 ++++++++++++++++++++------------ 2 files changed, 21 insertions(+), 12 deletions(-) diff --git a/CHANGES b/CHANGES index 5cea41b..c46ab22 100644 --- a/CHANGES +++ b/CHANGES @@ -4,6 +4,7 @@ Changelog for hydra Release 8.7-dev * added patch from debian maintainers which fixes spellings +* fixed weird crash on x64 systems * many warning fixes by crondaemon diff --git a/hydra.c b/hydra.c index 833f258..05d8a15 100644 --- a/hydra.c +++ b/hydra.c @@ -3522,17 +3522,22 @@ int32_t main(int32_t argc, char *argv[]) { options = 0; if (hydra_options.ssl) options = options | OPTION_SSL; - if (hydra_options.colonfile != NULL) - printf("[DATA] max %d task%s per %d server%s, overall %d tasks, %lu login tr%s, ~%lu tr%s per task\n", hydra_options.tasks, hydra_options.tasks == 1 ? "" : "s", - hydra_brains.targets, hydra_brains.targets == 1 ? "" : "s", hydra_options.max_use, hydra_brains.todo, hydra_brains.todo == 1 ? "y" : "ies", math2, - math2 == 1 ? "y" : "ies"); - else - printf("[DATA] max %d task%s per %d server%s, overall %d task%s, %lu login tr%s (l:%lu/p:%lu), ~%lu tr%s per task\n", hydra_options.tasks, hydra_options.tasks == 1 ? "" : "s", - hydra_brains.targets, hydra_brains.targets == 1 ? "" : "s", - hydra_options.max_use, hydra_options.max_use == 1 ? "" : "s", - hydra_brains.todo, hydra_brains.todo == 1 ? "y" : "ies", + + printf("[DATA] max %d task%s per %d server%s, overall %d task%s, %lu login tr", + hydra_options.tasks, hydra_options.tasks == 1 ? "" : "s", + hydra_brains.targets, hydra_brains.targets == 1 ? "" : "s", + hydra_options.max_use, hydra_options.max_use == 1 ? "" : "s", + hydra_brains.todo); + printf("%s", hydra_brains.todo == 1 ? "y" : "ies"); + if (hydra_options.colonfile == NULL) { + printf(" (l:%lu/p:%lu), ~%lu tr", (uint64_t) hydra_brains.countlogin, (uint64_t) hydra_brains.countpass, - math2, math2 == 1 ? "y" : "ies"); + math2); + } else { + printf(", ~%lu tr", math2); + } + printf("%s", math2 == 1 ? "y" : "ies"); + printf(" per task\n"); if (hydra_brains.targets == 1) { if (index(hydra_targets[0]->target, ':') == NULL) @@ -4014,8 +4019,11 @@ int32_t main(int32_t argc, char *argv[]) { fprintf(stderr, "[ERROR] illegal target result value (%d=>%d)\n", i, hydra_targets[i]->done); } - printf("%d of %d target%s%scompleted, %lu valid password%s found\n", hydra_brains.targets - j - k - error, hydra_brains.targets, hydra_brains.targets == 1 ? " " : "s ", - hydra_brains.found > 0 ? "successfully " : "", hydra_brains.found, hydra_brains.found == 1 ? "" : "s"); + printf("%d of %d target%s%scompleted, %lu valid password", + hydra_brains.targets - j - k - error, hydra_brains.targets, hydra_brains.targets == 1 ? " " : "s ", + hydra_brains.found > 0 ? "successfully " : "", hydra_brains.found); + printf("%s", hydra_brains.found == 1 ? "" : "s"); + printf(" found\n"); error += j; k = 0; From 28e3e0b4698731ae7b97634a4e523ab510ec3904 Mon Sep 17 00:00:00 2001 From: Dominyk Tiller Date: Fri, 1 Sep 2017 12:44:12 +0100 Subject: [PATCH 109/531] configure: find math.h on Xcode-only macOS systems Should fix https://github.com/vanhauser-thc/thc-hydra/issues/255. --- configure | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/configure b/configure index 482217c..88b1a05 100755 --- a/configure +++ b/configure @@ -130,6 +130,12 @@ if [ "$SYSS" = "Linux" -o "$SYSS" = "OpenBSD" -o "$SYSS" = "FreeBSD" -o "$SYSS" echo Detected 64 Bit $SYSS OS fi fi +# On macOS /usr/include only exists if one has installed the Command Line Tools package. +# If this is an Xcode-only system we need to look inside the SDK for headers. +SDK_PATH="" +if [ "$SYSS" = "Darwin" ] && [ ! -d "/usr/include" ]; then + SDK_PATH=`xcrun --show-sdk-path` +fi LIBDIRS=`cat /etc/ld.so.conf /etc/ld.so.conf.d/* 2> /dev/null | grep -v '^#' | sort | uniq` if [ "$SIXFOUR" = "64" ]; then LIBDIRS="$LIBDIRS /lib64 /usr/lib64 /usr/local/lib64 /opt/local/lib64" @@ -138,7 +144,7 @@ if [ -d "/Library/Developer/CommandLineTools/usr/lib" ]; then LIBDIRS="$LIBDIRS /Library/Developer/CommandLineTools/usr/lib /Library/Developer/CommandLineTools/lib" fi LIBDIRS="$LIBDIRS /lib /usr/lib /usr/local/lib /opt/local/lib" -INCDIRS="/usr/include /usr/local/include /opt/include /opt/local/include" +INCDIRS="$SDK_PATH/usr/include /usr/local/include /opt/include /opt/local/include" if [ -n "$PREFIX" ]; then if [ -d "$PREFIX/lib" ]; then LIBDIRS="$LIBDIRS $PREFIX/lib" @@ -646,7 +652,7 @@ if [ "X" != "X$DEBUG" ]; then echo DEBUG: MYSQL_IPATH=$MYSQL_IPATH/mysql.h fi MATH="" -if [ -f "/usr/include/math.h" ]; then +if [ -f "$SDK_PATH/usr/include/math.h" ]; then MATH="-DHAVE_MATH_H" if [ -n "$MYSQL_PATH" -a -n "$MYSQL_IPATH" -a -n "$MATH" ]; then echo " ... found" From 93d5da33a7b49ad437cfda8d4feac0f090d94672 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Sun, 1 Oct 2017 22:23:09 +0200 Subject: [PATCH 110/531] fix for weird sshd response --- hydra-ssh.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/hydra-ssh.c b/hydra-ssh.c index 0834713..e1497a1 100644 --- a/hydra-ssh.c +++ b/hydra-ssh.c @@ -191,10 +191,16 @@ int32_t service_ssh_init(char *ip, int32_t sp, unsigned char options, char *misc ssh_finalize(); ssh_free(session); + if (debug) printf("[DEBUG] SSH method check: %08x\n", method); + if ((method & SSH_AUTH_METHOD_INTERACTIVE) || (method & SSH_AUTH_METHOD_PASSWORD)) { if (verbose || debug) printf("[INFO] Successful, password authentication is supported by ssh://%s:%d\n", hydra_address2string_beautiful(ip), port); return 0; + } else if (method == 0) { + if (verbose || debug) + fprintf(stderr, "[WARNING] invalid SSH method reply from ssh://%s:%d, continuing anyway ... (check for empty password!)\n", hydra_address2string_beautiful(ip), port); + return 0; } fprintf(stderr, "[ERROR] target ssh://%s:%d/ does not support password authentication.\n", hydra_address2string_beautiful(ip), port); From 0a50b41be99f1b2fe2b1c2235a3a0a18c2d92f36 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 5 Oct 2017 13:31:36 +0200 Subject: [PATCH 111/531] corrected int type for main --- hydra.c | 2 +- pw-inspector.c | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/hydra.c b/hydra.c index 05d8a15..2def31e 100644 --- a/hydra.c +++ b/hydra.c @@ -2105,7 +2105,7 @@ void process_proxy_line(int32_t type, char *string) { proxy_count++; } -int32_t main(int32_t argc, char *argv[]) { +int main(int argc, char *argv[]) { char *proxy_string = NULL, *device = NULL, *memcheck, *cmdtarget = NULL; char *outfile_format_tmp; FILE *lfp = NULL, *pfp = NULL, *cfp = NULL, *ifp = NULL, *rfp = NULL, *proxyfp; diff --git a/pw-inspector.c b/pw-inspector.c index d5ca29c..7a516c8 100644 --- a/pw-inspector.c +++ b/pw-inspector.c @@ -36,7 +36,7 @@ void help() { exit(-1); } -int32_t main(int32_t argc, char *argv[]) { +int main(int argc, char *argv[]) { int32_t i, j, k; int32_t sets = 0, countsets = 0, minlen = 0, maxlen = MAXLENGTH, count = 0; int32_t set_low = 0, set_up = 0, set_no = 0, set_print = 0, set_other = 0; From d4429b67ac5341c5719c1026d5aacba183bab113 Mon Sep 17 00:00:00 2001 From: Michael Gehring Date: Thu, 5 Oct 2017 13:20:10 +0200 Subject: [PATCH 112/531] fix build with musl libc --- pw-inspector.c | 1 + 1 file changed, 1 insertion(+) diff --git a/pw-inspector.c b/pw-inspector.c index 7a516c8..9b5a2f9 100644 --- a/pw-inspector.c +++ b/pw-inspector.c @@ -3,6 +3,7 @@ #include #include #include +#include #define PROGRAM "PW-Inspector" #define VERSION "v0.2" From 2650665161316eb45930042c34135f16529568ec Mon Sep 17 00:00:00 2001 From: Aleksandrina Nikolova Date: Fri, 6 Oct 2017 07:17:35 +1000 Subject: [PATCH 113/531] Fixes issue #267 (http-get-form does not use absolute URL when proxy is set) --- hydra-http-form.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 6690bfe..08a7a8e 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -654,7 +654,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options else hdrrepv(&ptr_head, "Cookie", cookie_header); normal_request = stringify_headers(&ptr_head); - http_request = prepare_http_request("GET", url, upd3variables, normal_request); + http_request = prepare_http_request("GET", proxy_string, upd3variables, normal_request); if (hydra_send(s, http_request, strlen(http_request), 0) < 0) return 1; } @@ -702,7 +702,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options else hdrrepv(&ptr_head, "Cookie", cookie_header); normal_request = stringify_headers(&ptr_head); - http_request = prepare_http_request("GET", url, upd3variables, normal_request); + http_request = prepare_http_request("GET", proxy_string, upd3variables, normal_request); if (hydra_send(s, http_request, strlen(http_request), 0) < 0) return 1; } From e72b408e54fb0080b3583e679245cfbf27fae58d Mon Sep 17 00:00:00 2001 From: Edouard Hinard Date: Wed, 25 Oct 2017 08:23:00 +0200 Subject: [PATCH 114/531] possible base64 encoding of credentials --- hydra-http-form.c | 18 +++++++++++++----- hydra.c | 4 ++-- 2 files changed, 15 insertions(+), 7 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 08a7a8e..a27b738 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -583,7 +583,7 @@ void hydra_reconnect(int32_t s, char *ip, int32_t port, unsigned char options, c int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp, char *hostname, char *type, ptr_header_node ptr_head, ptr_cookie_node ptr_cookie) { char *empty = ""; - char *login, *pass, clogin[256], cpass[256]; + char *login, *pass, clogin[256], cpass[256], b64login[345], b64pass[345]; char header[8096], *upd3variables; char *cookie_header = NULL; char *http_request; @@ -601,16 +601,24 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options login = empty; if (strlen(pass = hydra_get_next_password()) == 0) pass = empty; + strcpy(b64login, login); + hydra_tobase64((unsigned char *)b64login, strlen(b64login), sizeof(b64login)); + strcpy(b64pass, pass); + hydra_tobase64((unsigned char *)b64pass, strlen(b64pass), sizeof(b64pass)); strncpy(clogin, html_encode(login), sizeof(clogin) - 1); clogin[sizeof(clogin) - 1] = 0; strncpy(cpass, html_encode(pass), sizeof(cpass) - 1); cpass[sizeof(cpass) - 1] = 0; upd3variables = hydra_strrep(variables, "^USER^", clogin); upd3variables = hydra_strrep(upd3variables, "^PASS^", cpass); + upd3variables = hydra_strrep(upd3variables, "^USER64^", b64login); + upd3variables = hydra_strrep(upd3variables, "^PASS64^", b64pass); // Replace the user/pass placeholders in the user-supplied headers hdrrep(&ptr_head, "^USER^", clogin); hdrrep(&ptr_head, "^PASS^", cpass); + hdrrep(&ptr_head, "^USER64^", b64login); + hdrrep(&ptr_head, "^PASS64^", b64pass); /* again: no snprintf to be portable. don't worry, buffer can't overflow */ if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) { @@ -1253,8 +1261,8 @@ void usage_http_form(const char* service) { "\nSyntax: ::[:[:]\n" "First is the page on the server to GET or POST to (URL).\n" "Second is the POST/GET variables (taken from either the browser, proxy, etc.\n" - " with usernames and passwords being replaced in the \"^USER^\" and \"^PASS^\"\n" - " placeholders (FORM PARAMETERS)\n" + " with url-encoded (resp. base64-encoded) usernames and passwords being replaced in the\n" + " \"^USER^\" (resp. \"^USER64^\") and \"^PASS^\" (resp. \"^PASS64^\") placeholders (FORM PARAMETERS)\n" "Third is the string that it checks for an *invalid* login (by default)\n" " Invalid condition login check can be preceded by \"F=\", successful condition\n" " login check must be preceded by \"S=\".\n" @@ -1263,7 +1271,7 @@ void usage_http_form(const char* service) { "The following parameters are optional:\n" " C=/page/uri to define a different page to gather initial cookies from\n" " (h|H)=My-Hdr\\: foo to send a user defined HTTP header with each request\n" - " ^USER^ and ^PASS^ can also be put into these headers!\n" + " ^USER[64]^ and ^PASS[64]^ can also be put into these headers!\n" " Note: 'h' will add the user-defined header at the end\n" " regardless it's already being sent by Hydra or not.\n" " 'H' will replace the value of that header if it exists, by the\n" @@ -1274,7 +1282,7 @@ void usage_http_form(const char* service) { " in the header value itself, as they will be interpreted by hydra as option separators.\n" "\nExamples:\n" " \"/login.php:user=^USER^&pass=^PASS^:incorrect\"\n" - " \"/login.php:user=^USER^&pass=^PASS^&colon=colon\\:escape:S=authlog=.*success\"\n" + " \"/login.php:user=^USER64^&pass=^PASS64^&colon=colon\\:escape:S=authlog=.*success\"\n" " \"/login.php:user=^USER^&pass=^PASS^&mid=123:authlog=.*failed\"\n" " \"/:user=^USER&pass=^PASS^:failed:H=Authorization\\: Basic dT1w:H=Cookie\\: sessid=aaaa:h=X-User\\: ^USER^:H=User-Agent\\: wget\"\n" " \"/exchweb/bin/auth/owaauth.dll:destination=http%%3A%%2F%%2F%%2Fexchange&flags=0&username=%%5C^USER^&password=^PASS^&SubmitCreds=x&trusted=0:reason=:C=/exchweb\"\n", diff --git a/hydra.c b/hydra.c index 2def31e..1e2013a 100644 --- a/hydra.c +++ b/hydra.c @@ -3037,8 +3037,8 @@ int main(int argc, char *argv[]) { variables = strtok(NULL, ":"); cond = strtok(NULL, ":"); optional1 = strtok(NULL, "\n"); - if ((variables == NULL) || (strstr(variables, "^USER^") == NULL && strstr(variables, "^PASS^") == NULL)) { - fprintf(stderr, "[ERROR] the variables argument needs at least the strings ^USER^ or ^PASS^: %s\n", STR_NULL(variables)); + if ((variables == NULL) || (strstr(variables, "^USER^") == NULL && strstr(variables, "^PASS^") == NULL && strstr(variables, "^USER64^") == NULL && strstr(variables, "^PASS64^") == NULL)) { + fprintf(stderr, "[ERROR] the variables argument needs at least the strings ^USER^, ^PASS^, ^USER64^ or ^PASS64^: %s\n", STR_NULL(variables)); exit(-1); } if ((url == NULL) || (cond == NULL)) { From 445e5026ef1760e0bbd0c978ba599054adfbb80a Mon Sep 17 00:00:00 2001 From: van Hauser Date: Mon, 6 Nov 2017 07:23:50 +0100 Subject: [PATCH 115/531] hydra return code fix --- CHANGES | 1 + hydra.c | 2 +- 2 files changed, 2 insertions(+), 1 deletion(-) diff --git a/CHANGES b/CHANGES index c46ab22..7c48c56 100644 --- a/CHANGES +++ b/CHANGES @@ -3,6 +3,7 @@ Changelog for hydra Release 8.7-dev +* corrected hydra return code to be 0 on success * added patch from debian maintainers which fixes spellings * fixed weird crash on x64 systems * many warning fixes by crondaemon diff --git a/hydra.c b/hydra.c index 1e2013a..cbe6be7 100644 --- a/hydra.c +++ b/hydra.c @@ -4100,7 +4100,7 @@ int main(int argc, char *argv[]) { } fflush(NULL); - if (error || j || exit_condition < 0) + if (error || j != 0 || exit_condition < 0) return -1; else return 0; From a58f785065b35a5731c8cf237f3c27603f306eb0 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Mon, 27 Nov 2017 17:44:51 +0100 Subject: [PATCH 116/531] fixed http-form memory leaks --- CHANGES | 1 + hydra-http-form.c | 397 ++++++++++++++++++++++++++++------------------ 2 files changed, 240 insertions(+), 158 deletions(-) diff --git a/CHANGES b/CHANGES index 7c48c56..337590a 100644 --- a/CHANGES +++ b/CHANGES @@ -3,6 +3,7 @@ Changelog for hydra Release 8.7-dev +* fixed various memory leaks in http-form module * corrected hydra return code to be 0 on success * added patch from debian maintainers which fixes spellings * fixed weird crash on x64 systems diff --git a/hydra-http-form.c b/hydra-http-form.c index a27b738..857b359 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -69,10 +69,10 @@ typedef struct header_node { } t_header_node, *ptr_header_node; typedef struct cookie_node { - char *name; - char *value; - struct cookie_node *prev; - struct cookie_node *next; + char *name; + char *value; + struct cookie_node *prev; + struct cookie_node *next; } t_cookie_node, *ptr_cookie_node; int32_t success_cond = 0; @@ -84,7 +84,7 @@ char cookie[4096] = "", cmiscptr[1024]; extern char *webtarget; extern char *slash; int32_t webport, freemischttpform = 0; -char bufferurl[6096+24], cookieurl[6096+24] = "", userheader[6096+24] = "", *url, *variables, *optional1; +char bufferurl[6096 + 24], cookieurl[6096 + 24] = "", userheader[6096 + 24] = "", *url, *variables, *optional1; #define MAX_REDIRECT 8 #define MAX_CONTENT_LENGTH 20 @@ -94,7 +94,7 @@ char redirected_url_buff[2048] = ""; int32_t redirected_flag = 0; int32_t redirected_cpt = MAX_REDIRECT; -char *cookie_request, *normal_request; // Buffers for HTTP headers +char *cookie_request = NULL, *normal_request = NULL; // Buffers for HTTP headers /* * Function to perform some initial setup. @@ -115,75 +115,73 @@ ptr_header_node header_exists(ptr_header_node * ptr_head, char *header_name, cha } #if defined(__sun) + /* Written by Kaveh R. Ghazi */ -char * -strndup (const char *s, size_t n) -{ +char *strndup(const char *s, size_t n) { char *result; - size_t len = strlen (s); + size_t len = strlen(s); if (n < len) len = n; - result = (char *) malloc (len + 1); + result = (char *) malloc(len + 1); if (!result) return 0; - memcpy (result, s, len); + memcpy(result, s, len); result[len] = '\0'; - return(result); + return (result); } #endif -int32_t append_cookie(char *name, char *value, ptr_cookie_node *last_cookie) -{ - ptr_cookie_node new_ptr = (ptr_cookie_node) malloc(sizeof(t_cookie_node)); - if (!new_ptr) - return 0; - new_ptr->name = name; - new_ptr->value = value; - new_ptr->next = NULL; - new_ptr->prev = NULL; - - if (*last_cookie == NULL) - *last_cookie = new_ptr; - else - (*last_cookie)->next = new_ptr; - - return 1; +int32_t append_cookie(char *name, char *value, ptr_cookie_node * last_cookie) { + ptr_cookie_node new_ptr = (ptr_cookie_node) malloc(sizeof(t_cookie_node)); + + if (!new_ptr) + return 0; + new_ptr->name = name; + new_ptr->value = value; + new_ptr->next = NULL; + new_ptr->prev = NULL; + + if (*last_cookie == NULL) + *last_cookie = new_ptr; + else + (*last_cookie)->next = new_ptr; + + return 1; } -char * stringify_cookies(ptr_cookie_node ptr_cookie) -{ - ptr_cookie_node cur_ptr = NULL; - uint32_t length = 1; - char *cookie_hdr = (char *) malloc(length); +char *stringify_cookies(ptr_cookie_node ptr_cookie) { + ptr_cookie_node cur_ptr = NULL; + uint32_t length = 1; + char *cookie_hdr = (char *) malloc(length); - if (cookie_hdr) { - memset(cookie_hdr, 0, length); - for (cur_ptr = ptr_cookie; cur_ptr; cur_ptr = cur_ptr->next) { - length += 2 + strlen(cur_ptr->name) + strlen(cur_ptr->value); - cookie_hdr = (char *) realloc(cookie_hdr, length); - if (cookie_hdr) { - strcat(cookie_hdr, cur_ptr->name); - strcat(cookie_hdr, "="); - strcat(cookie_hdr, cur_ptr->value); - if (cur_ptr->next) - strcat(cookie_hdr, ";"); - } else - goto bail; - } - goto success; - } + if (cookie_hdr) { + memset(cookie_hdr, 0, length); + for (cur_ptr = ptr_cookie; cur_ptr; cur_ptr = cur_ptr->next) { + length += 2 + strlen(cur_ptr->name) + strlen(cur_ptr->value); + cookie_hdr = (char *) realloc(cookie_hdr, length); + if (cookie_hdr) { + strcat(cookie_hdr, cur_ptr->name); + strcat(cookie_hdr, "="); + strcat(cookie_hdr, cur_ptr->value); + if (cur_ptr->next) + strcat(cookie_hdr, ";"); + } else + goto bail; + } + goto success; + } bail: - if (cookie_hdr) { - free(cookie_hdr); - cookie_hdr = NULL; - } + if (cookie_hdr) { + free(cookie_hdr); + cookie_hdr = NULL; + } success: - return cookie_hdr; + return cookie_hdr; } /* @@ -195,55 +193,59 @@ success: * +--------+ * Returns 1 if success, or 0 otherwise. */ -int32_t add_or_update_cookie(ptr_cookie_node * ptr_cookie, char * cookie_expr) -{ - ptr_cookie_node cur_ptr = NULL; - char * cookie_name = NULL, - * cookie_value = strstr(cookie_expr, "="); - if (cookie_value) { - cookie_name = strndup(cookie_expr, cookie_value - cookie_expr); - cookie_value = strdup(cookie_value + 1); - - // we've got the cookie's name and value, now it's time to insert or update the list - if (*ptr_cookie == NULL) { - // no cookies - append_cookie(cookie_name, cookie_value, ptr_cookie); - } else { - for (cur_ptr = *ptr_cookie; cur_ptr; cur_ptr = cur_ptr->next) { - if (strcmp(cur_ptr->name, cookie_name) == 0) { - free(cur_ptr->value); - cur_ptr->value = cookie_value; - break; - } - if (cur_ptr->next == NULL) { - append_cookie(cookie_name, cookie_value, &cur_ptr); - break; - } - } - } - } else - return 0; - return 1; +int32_t add_or_update_cookie(ptr_cookie_node * ptr_cookie, char *cookie_expr) { + ptr_cookie_node cur_ptr = NULL; + char *cookie_name = NULL, *cookie_value = strstr(cookie_expr, "="); + + if (cookie_value) { + cookie_name = strndup(cookie_expr, cookie_value - cookie_expr); + cookie_value = strdup(cookie_value + 1); + + // we've got the cookie's name and value, now it's time to insert or update the list + if (*ptr_cookie == NULL) { + // no cookies + append_cookie(cookie_name, cookie_value, ptr_cookie); + } else { + for (cur_ptr = *ptr_cookie; cur_ptr; cur_ptr = cur_ptr->next) { + if (strcmp(cur_ptr->name, cookie_name) == 0) { + free(cur_ptr->value); // free old value + free(cookie_name); // we already have it + cur_ptr->value = cookie_value; + break; + } + if (cur_ptr->next == NULL) { + append_cookie(cookie_name, cookie_value, &cur_ptr); + break; + } + } + } + } else + return 0; + return 1; } -int32_t process_cookies(ptr_cookie_node * ptr_cookie, char * cookie_expr) -{ - char *tok = NULL; - char *expr = strdup(cookie_expr); - int32_t res = 0; +int32_t process_cookies(ptr_cookie_node * ptr_cookie, char *cookie_expr) { + char *tok = NULL; + char *expr = strdup(cookie_expr); + int32_t res = 0; - if (strstr(cookie_expr, ";")) { - tok = strtok(expr, ";"); - while (tok) { - res = add_or_update_cookie(ptr_cookie, tok); - if (!res) - return res; - tok = strtok(NULL, ";"); - } - return res; - } else { - return add_or_update_cookie(ptr_cookie, expr); - } + if (strstr(cookie_expr, ";")) { + tok = strtok(expr, ";"); + while (tok) { + res = add_or_update_cookie(ptr_cookie, tok); + if (!res) { + free(expr); + return res; + } + tok = strtok(NULL, ";"); + } + free(expr); + return res; + } else { + add_or_update_cookie(ptr_cookie, expr); + free(expr); + return 0; + } } /* @@ -271,7 +273,7 @@ int32_t add_header(ptr_header_node * ptr_head, char *header, char *value, char t (type == HEADER_TYPE_DEFAULT && !header_exists(ptr_head, new_header, HEADER_TYPE_USERHEADER_REPL)) || (type == HEADER_TYPE_USERHEADER_REPL && !header_exists(ptr_head, new_header, HEADER_TYPE_DEFAULT)) || (type == HEADER_TYPE_DEFAULT_REPL && !header_exists(ptr_head, new_header, HEADER_TYPE_DEFAULT)) - ) { + ) { /* * We are in one of the following scenarios: * 1. A default header with no user-supplied headers that replace it. @@ -282,8 +284,11 @@ int32_t add_header(ptr_header_node * ptr_head, char *header, char *value, char t * In either case we just add the header to the list. */ new_ptr = (ptr_header_node) malloc(sizeof(t_header_node)); - if (!new_ptr) + if (!new_ptr) { + free(new_header); + free(new_value); return 0; + } new_ptr->header = new_header; new_ptr->value = new_value; new_ptr->type = type; @@ -298,12 +303,15 @@ int32_t add_header(ptr_header_node * ptr_head, char *header, char *value, char t } else if ((type == HEADER_TYPE_DEFAULT_REPL || type == HEADER_TYPE_USERHEADER_REPL) && (existing_hdr = header_exists(ptr_head, new_header, HEADER_TYPE_DEFAULT)) != NULL) { // It's a user-supplied header that must replace a default one // Replace the default header's value with this new value - free(existing_hdr->value); + free(existing_hdr->value); // free old value existing_hdr->value = new_value; existing_hdr->type = type; + free(new_header); // we dont need this one anymore } } else { // we're out of memory, so forcefully end + free(new_header); + free(new_value); return 0; } @@ -314,7 +322,7 @@ int32_t add_header(ptr_header_node * ptr_head, char *header, char *value, char t * Replace in all headers' values every occurrence of oldvalue by newvalue. * Only user-defined headers are considered. */ -void hdrrep(ptr_header_node * ptr_head, char *oldvalue, char *newvalue) { +void hdrrep(ptr_header_node *ptr_head, char *oldvalue, char *newvalue) { ptr_header_node cur_ptr = NULL; for (cur_ptr = *ptr_head; cur_ptr; cur_ptr = cur_ptr->next) { @@ -333,7 +341,7 @@ void hdrrep(ptr_header_node * ptr_head, char *oldvalue, char *newvalue) { /* * Replace the value of the default header named 'hdrname'. */ -void hdrrepv(ptr_header_node * ptr_head, char *hdrname, char *new_value) { +void hdrrepv(ptr_header_node *ptr_head, char *hdrname, char *new_value) { ptr_header_node cur_ptr = NULL; for (cur_ptr = *ptr_head; cur_ptr; cur_ptr = cur_ptr->next) { @@ -349,7 +357,7 @@ void hdrrepv(ptr_header_node * ptr_head, char *hdrname, char *new_value) { } } -void cleanup(ptr_header_node *ptr_head) { +void cleanup(ptr_header_node * ptr_head) { ptr_header_node cur_ptr = *ptr_head, next_ptr = cur_ptr; while (next_ptr != NULL) { @@ -365,7 +373,7 @@ void cleanup(ptr_header_node *ptr_head) { * Concat all the headers in the list in a single string. * Leave the list itself intact: do not clean it here. */ -char *stringify_headers(ptr_header_node * ptr_head) { +char *stringify_headers(ptr_header_node *ptr_head) { char *headers_str = NULL; ptr_header_node cur_ptr = *ptr_head; int32_t ttl_size = 0; @@ -467,6 +475,7 @@ return -1 if no response from server */ int32_t analyze_server_response(int32_t s) { int32_t runs = 0; + redirected_flag = 0; auth_flag = 0; while ((buf = hydra_receive_line(s)) != NULL) { @@ -581,12 +590,13 @@ void hydra_reconnect(int32_t s, char *ip, int32_t port, unsigned char options, c } } -int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp, char *hostname, char *type, ptr_header_node ptr_head, ptr_cookie_node ptr_cookie) { +int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp, char *hostname, char *type, ptr_header_node ptr_head, + ptr_cookie_node ptr_cookie) { char *empty = ""; char *login, *pass, clogin[256], cpass[256], b64login[345], b64pass[345]; char header[8096], *upd3variables; char *cookie_header = NULL; - char *http_request; + char *http_request = NULL; int32_t found = !success_cond, i, j; char content_length[MAX_CONTENT_LENGTH], proxy_string[MAX_PROXY_LENGTH]; @@ -602,9 +612,9 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options if (strlen(pass = hydra_get_next_password()) == 0) pass = empty; strcpy(b64login, login); - hydra_tobase64((unsigned char *)b64login, strlen(b64login), sizeof(b64login)); + hydra_tobase64((unsigned char *) b64login, strlen(b64login), sizeof(b64login)); strcpy(b64pass, pass); - hydra_tobase64((unsigned char *)b64pass, strlen(b64pass), sizeof(b64pass)); + hydra_tobase64((unsigned char *) b64pass, strlen(b64pass), sizeof(b64pass)); strncpy(clogin, html_encode(login), sizeof(clogin) - 1); clogin[sizeof(clogin) - 1] = 0; strncpy(cpass, html_encode(pass), sizeof(cpass) - 1); @@ -625,6 +635,8 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options if (getcookie) { memset(proxy_string, 0, sizeof(proxy_string)); snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s:%d%.600s", webtarget, webport, cookieurl); + if (http_request != NULL) + free(http_request); http_request = prepare_http_request("GET", proxy_string, NULL, cookie_request); if (hydra_send(s, http_request, strlen(http_request), 0) < 0) return 1; @@ -644,24 +656,36 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options add_header(&ptr_head, "Content-Length", content_length, HEADER_TYPE_DEFAULT); if (!header_exists(&ptr_head, "Content-Type", HEADER_TYPE_DEFAULT)) add_header(&ptr_head, "Content-Type", "application/x-www-form-urlencoded", HEADER_TYPE_DEFAULT); + if (cookie_header != NULL) + free(cookie_header); cookie_header = stringify_cookies(ptr_cookie); if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); + add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); else - hdrrepv(&ptr_head, "Cookie", cookie_header); + hdrrepv(&ptr_head, "Cookie", cookie_header); + if (normal_request != NULL) + free(normal_request); normal_request = stringify_headers(&ptr_head); + if (http_request != NULL) + free(http_request); http_request = prepare_http_request("POST", proxy_string, upd3variables, normal_request); if (hydra_send(s, http_request, strlen(http_request), 0) < 0) return 1; } else { if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) hdrrepv(&ptr_head, "Content-Length", "0"); + if (cookie_header != NULL) + free(cookie_header); cookie_header = stringify_cookies(ptr_cookie); if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); - else - hdrrepv(&ptr_head, "Cookie", cookie_header); - normal_request = stringify_headers(&ptr_head); + add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); + else + hdrrepv(&ptr_head, "Cookie", cookie_header); + if (normal_request != NULL) + free(normal_request); + normal_request = stringify_headers(&ptr_head); + if (http_request != NULL) + free(http_request); http_request = prepare_http_request("GET", proxy_string, upd3variables, normal_request); if (hydra_send(s, http_request, strlen(http_request), 0) < 0) return 1; @@ -673,6 +697,8 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options //doing a GET to get cookies memset(proxy_string, 0, sizeof(proxy_string)); snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s:%d%.600s", webtarget, webport, cookieurl); + if (http_request != NULL) + free(http_request); http_request = prepare_http_request("GET", proxy_string, NULL, cookie_request); if (hydra_send(s, http_request, strlen(http_request), 0) < 0) return 1; @@ -688,43 +714,60 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t) strlen(upd3variables)); if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) hdrrepv(&ptr_head, "Content-Length", content_length); - else - add_header(&ptr_head, "Content-Length", content_length, HEADER_TYPE_DEFAULT); + else + add_header(&ptr_head, "Content-Length", content_length, HEADER_TYPE_DEFAULT); if (!header_exists(&ptr_head, "Content-Type", HEADER_TYPE_DEFAULT)) add_header(&ptr_head, "Content-Type", "application/x-www-form-urlencoded", HEADER_TYPE_DEFAULT); + if (cookie_header != NULL) + free(cookie_header); cookie_header = stringify_cookies(ptr_cookie); if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); - else - hdrrepv(&ptr_head, "Cookie", cookie_header); + add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); + else + hdrrepv(&ptr_head, "Cookie", cookie_header); + if (normal_request != NULL) + free(normal_request); normal_request = stringify_headers(&ptr_head); + if (http_request != NULL) + free(http_request); http_request = prepare_http_request("POST", proxy_string, upd3variables, normal_request); if (hydra_send(s, http_request, strlen(http_request), 0) < 0) return 1; } else { if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) hdrrepv(&ptr_head, "Content-Length", "0"); - cookie_header = stringify_cookies(ptr_cookie); - if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); - else - hdrrepv(&ptr_head, "Cookie", cookie_header); - normal_request = stringify_headers(&ptr_head); + if (cookie_header != NULL) + free(cookie_header); + cookie_header = stringify_cookies(ptr_cookie); + if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) + add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); + else + hdrrepv(&ptr_head, "Cookie", cookie_header); + if (normal_request != NULL) + free(normal_request); + normal_request = stringify_headers(&ptr_head); + if (http_request != NULL) + free(http_request); http_request = prepare_http_request("GET", proxy_string, upd3variables, normal_request); if (hydra_send(s, http_request, strlen(http_request), 0) < 0) return 1; } } else { // direct web server, no proxy + normal_request = NULL; if (getcookie) { //doing a GET to save cookies + if (http_request != NULL) + free(http_request); http_request = prepare_http_request("GET", cookieurl, NULL, cookie_request); if (hydra_send(s, http_request, strlen(http_request), 0) < 0) return 1; i = analyze_server_response(s); // ignore result if (strlen(cookie) > 0) { //printf("[DEBUG] Got cookie: %s\n", cookie); - process_cookies(&ptr_cookie, cookie); + process_cookies(&ptr_cookie, cookie); + if (normal_request != NULL) + free(normal_request); normal_request = stringify_headers(&ptr_head); } hydra_reconnect(s, ip, port, options, hostname); @@ -738,24 +781,36 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options add_header(&ptr_head, "Content-Length", content_length, HEADER_TYPE_DEFAULT); if (!header_exists(&ptr_head, "Content-Type", HEADER_TYPE_DEFAULT)) add_header(&ptr_head, "Content-Type", "application/x-www-form-urlencoded", HEADER_TYPE_DEFAULT); + if (cookie_header != NULL) + free(cookie_header); cookie_header = stringify_cookies(ptr_cookie); if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); + add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); else - hdrrepv(&ptr_head, "Cookie", cookie_header); + hdrrepv(&ptr_head, "Cookie", cookie_header); + if (normal_request != NULL) + free(normal_request); normal_request = stringify_headers(&ptr_head); + if (http_request != NULL) + free(http_request); http_request = prepare_http_request("POST", url, upd3variables, normal_request); if (hydra_send(s, http_request, strlen(http_request), 0) < 0) return 1; } else { if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) hdrrepv(&ptr_head, "Content-Length", "0"); - cookie_header = stringify_cookies(ptr_cookie); - if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); - else - hdrrepv(&ptr_head, "Cookie", cookie_header); - normal_request = stringify_headers(&ptr_head); + if (cookie_header != NULL) + free(cookie_header); + cookie_header = stringify_cookies(ptr_cookie); + if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) + add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); + else + hdrrepv(&ptr_head, "Cookie", cookie_header); + if (normal_request != NULL) + free(normal_request); + normal_request = stringify_headers(&ptr_head); + if (http_request != NULL) + free(http_request); http_request = prepare_http_request("GET", url, upd3variables, normal_request); if (hydra_send(s, http_request, strlen(http_request), 0) < 0) return 1; @@ -764,7 +819,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options } if (debug) - hydra_report_debug(stdout, "HTTP request sent:\n%s\n", http_request); + hydra_report_debug(stdout, "HTTP request sent:\n%s\n", http_request); found = analyze_server_response(s); @@ -856,7 +911,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options str3[0] = '/'; } - if(strrchr(url, ':') == NULL && port != 80) { + if (strrchr(url, ':') == NULL && port != 80) { sprintf(str2, "%s:%d", str2, port); } @@ -872,7 +927,11 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options hdrrepv(&ptr_head, "Host", str2); memset(proxy_string, 0, sizeof(proxy_string)); snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s:%d%.600s", webtarget, webport, str3); + if (normal_request != NULL) + free(normal_request); normal_request = stringify_headers(&ptr_head); + if (http_request != NULL) + free(http_request); http_request = prepare_http_request("GET", proxy_string, NULL, normal_request); } else { if (use_proxy == 1) { @@ -880,12 +939,20 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options hdrrepv(&ptr_head, "Host", str2); memset(proxy_string, 0, sizeof(proxy_string)); snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s:%d%.600s", webtarget, webport, str3); + if (normal_request != NULL) + free(normal_request); normal_request = stringify_headers(&ptr_head); + if (http_request != NULL) + free(http_request); http_request = prepare_http_request("GET", proxy_string, NULL, normal_request); } else { //direct web server, no proxy hdrrepv(&ptr_head, "Host", str2); + if (normal_request != NULL) + free(normal_request); normal_request = stringify_headers(&ptr_head); + if (http_request != NULL) + free(http_request); http_request = prepare_http_request("GET", str3, NULL, normal_request); } } @@ -897,7 +964,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options found = analyze_server_response(s); if (strlen(cookie) > 0) - process_cookies(&ptr_cookie, cookie); + process_cookies(&ptr_cookie, cookie); } } @@ -912,7 +979,8 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options return 1; } -void service_http_form(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname, char *type, ptr_header_node * ptr_head, ptr_cookie_node * ptr_cookie) { +void service_http_form(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname, char *type, ptr_header_node * ptr_head, + ptr_cookie_node * ptr_cookie) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_HTTP, mysslport = PORT_HTTP_SSL; @@ -995,7 +1063,7 @@ void service_http_form(char *ip, int32_t sp, unsigned char options, char *miscpt void service_http_get_form(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { ptr_cookie_node ptr_cookie = NULL; - ptr_header_node ptr_head = initialize(ip, options, miscptr); + ptr_header_node ptr_head = initialize(ip, options, miscptr); if (ptr_head) service_http_form(ip, sp, options, miscptr, fp, port, hostname, "GET", &ptr_head, &ptr_cookie); @@ -1007,7 +1075,7 @@ void service_http_get_form(char *ip, int32_t sp, unsigned char options, char *mi void service_http_post_form(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { ptr_cookie_node ptr_cookie = NULL; - ptr_header_node ptr_head = initialize(ip, options, miscptr); + ptr_header_node ptr_head = initialize(ip, options, miscptr); if (ptr_head) service_http_form(ip, sp, options, miscptr, fp, port, hostname, "POST", &ptr_head, &ptr_cookie); @@ -1034,7 +1102,7 @@ int32_t service_http_form_init(char *ip, int32_t sp, unsigned char options, char ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { ptr_header_node ptr_head = NULL; char *ptr, *ptr2, *proxy_string; - + if (use_proxy > 0 && proxy_count > 0) selected_proxy = random() % proxy_count; @@ -1146,15 +1214,15 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { break; case 'h': // add a new header at the end - ptr = optional1 + 2; + ptr = optional1 + 2; while (*ptr != 0 && *ptr != ':') - ptr++; - if (*(ptr - 1) == '\\') - *(ptr - 1) = 0; - if (*ptr != 0){ - *ptr = 0; - ptr += 2; - } + ptr++; + if (*(ptr - 1) == '\\') + *(ptr - 1) = 0; + if (*ptr != 0) { + *ptr = 0; + ptr += 2; + } ptr2 = ptr; while (*ptr2 != 0 && (*ptr2 != ':' || *(ptr2 - 1) == '\\')) ptr2++; @@ -1175,14 +1243,15 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { return NULL; case 'H': // add a new header, or replace an existing one's value - ptr = optional1 + 2; - while (*ptr != 0 && *ptr != ':') ptr++; + ptr = optional1 + 2; + while (*ptr != 0 && *ptr != ':') + ptr++; if (*(ptr - 1) == '\\') - *(ptr - 1) = 0; + *(ptr - 1) = 0; if (*ptr != 0) { - *ptr = 0; + *ptr = 0; ptr += 2; } ptr2 = ptr; @@ -1223,8 +1292,12 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { } if (getcookie) { //doing a GET to save cookies + if (cookie_request != NULL) + free(cookie_request); cookie_request = stringify_headers(&ptr_head); } + if (normal_request != NULL) + free(normal_request); normal_request = stringify_headers(&ptr_head); } else { if (use_proxy == 1) { @@ -1233,8 +1306,12 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { add_header(&ptr_head, "User-Agent", "Mozilla/5.0 (Hydra Proxy)", HEADER_TYPE_DEFAULT); if (getcookie) { //doing a GET to get cookies + if (cookie_request != NULL) + free(cookie_request); cookie_request = stringify_headers(&ptr_head); } + if (normal_request != NULL) + free(normal_request); normal_request = stringify_headers(&ptr_head); } else { // direct web server, no proxy @@ -1243,16 +1320,20 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { if (getcookie) { //doing a GET to save cookies + if (cookie_request != NULL) + free(cookie_request); cookie_request = stringify_headers(&ptr_head); } + if (normal_request != NULL) + free(normal_request); normal_request = stringify_headers(&ptr_head); } } return ptr_head; } -void usage_http_form(const char* service) { +void usage_http_form(const char *service) { printf("Module %s requires the page and the parameters for the web form.\n\n" "By default this module is configured to follow a maximum of 5 redirections in\n" "a row. It always gathers a new cookie from the same URL without variables\n" From 0c1a50db31d3e5a13bc0211cf326207c10c1dcc1 Mon Sep 17 00:00:00 2001 From: Mostafa Hussein Date: Fri, 22 Dec 2017 01:03:23 +0200 Subject: [PATCH 117/531] Don't add extra slash to url if exist --- hydra.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/hydra.c b/hydra.c index cbe6be7..aa463ce 100644 --- a/hydra.c +++ b/hydra.c @@ -3541,11 +3541,11 @@ int main(int argc, char *argv[]) { if (hydra_brains.targets == 1) { if (index(hydra_targets[0]->target, ':') == NULL) - printf("[DATA] attacking %s%s://%s:%d/%s\n", hydra_options.service, hydra_options.ssl == 1 ? "s" : "", hydra_targets[0]->target, port, hydra_options.miscptr != NULL ? hydra_options.miscptr : ""); + printf("[DATA] attacking %s%s://%s:%d%s%s\n", hydra_options.service, hydra_options.ssl == 1 ? "s" : "", hydra_targets[0]->target, port, strstr(hydra_options.miscptr, "/") == hydra_options.miscptr ? "" : "/", hydra_options.miscptr != NULL ? hydra_options.miscptr : ""); else - printf("[DATA] attacking %s%s://[%s]:%d/%s\n", hydra_options.service, hydra_options.ssl == 1 ? "s" : "", hydra_targets[0]->target, port, hydra_options.miscptr != NULL ? hydra_options.miscptr : ""); + printf("[DATA] attacking %s%s://[%s]:%d%s%s\n", hydra_options.service, hydra_options.ssl == 1 ? "s" : "", hydra_targets[0]->target, port, strstr(hydra_options.miscptr, "/") == hydra_options.miscptr ? "" : "/", hydra_options.miscptr != NULL ? hydra_options.miscptr : ""); } else - printf("[DATA] attacking %s%s://(%d targets):%d/%s\n", hydra_options.service, hydra_options.ssl == 1 ? "s" : "", hydra_brains.targets, port, hydra_options.miscptr != NULL ? hydra_options.miscptr : ""); + printf("[DATA] attacking %s%s://(%d targets):%d%s%s\n", hydra_options.service, hydra_options.ssl == 1 ? "s" : "", hydra_brains.targets, port, strstr(hydra_options.miscptr, "/") == hydra_options.miscptr ? "" : "/", hydra_options.miscptr != NULL ? hydra_options.miscptr : ""); //service %s on port %d%s\n", hydra_options.service, port, hydra_options.ssl == 1 ? " with SSL" : ""); // if (hydra_options.miscptr != NULL && hydra_options.miscptr[0] != 0) // printf("[DATA] with additional data %s\n", hydra_options.miscptr); From cc209e5227814dd9af8cd1df7bc73604f8c293fb Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 4 Jan 2018 10:52:09 +0100 Subject: [PATCH 118/531] 2018 year update --- Makefile.am | 2 +- README | 4 ++-- README.md | 4 ++-- hydra-oracle.c | 4 +++- hydra.1 | 2 +- hydra.c | 4 ++-- 6 files changed, 11 insertions(+), 9 deletions(-) diff --git a/Makefile.am b/Makefile.am index 8a293c9..f6b1a37 100755 --- a/Makefile.am +++ b/Makefile.am @@ -1,5 +1,5 @@ # -# Makefile for Hydra - (c) 2001-2017 by van Hauser / THC +# Makefile for Hydra - (c) 2001-2018 by van Hauser / THC # OPTS=-I. -O3 # -Wall -g -pedantic diff --git a/README b/README index b3a3d14..b661a7e 100644 --- a/README +++ b/README @@ -1,7 +1,7 @@ H Y D R A - (c) 2001-2017 by van Hauser / THC + (c) 2001-2018 by van Hauser / THC http://www.thc.org many modules were written by David (dot) Maciejak @ gmail (dot) com BFG code by Jan Dlabal @@ -377,7 +377,7 @@ Version 1.00 example: "These are very free form" ], "generator": { - "built": "2017-03-01 14:44:22", + "built": "2018-01-01 14:44:22", "commandline": "hydra -b jsonv1 -o results.json ... ...", "jsonoutputversion": "1.00", "server": "127.0.0.1", diff --git a/README.md b/README.md index b3a3d14..c5c0dfb 100644 --- a/README.md +++ b/README.md @@ -1,7 +1,7 @@ H Y D R A - (c) 2001-2017 by van Hauser / THC + (c) 2001-2018 by van Hauser / THC http://www.thc.org many modules were written by David (dot) Maciejak @ gmail (dot) com BFG code by Jan Dlabal @@ -377,7 +377,7 @@ Version 1.00 example: "These are very free form" ], "generator": { - "built": "2017-03-01 14:44:22", + "built": "2018-03-01 14:44:22", "commandline": "hydra -b jsonv1 -o results.json ... ...", "jsonoutputversion": "1.00", "server": "127.0.0.1", diff --git a/hydra-oracle.c b/hydra-oracle.c index e598401..1adefba 100644 --- a/hydra-oracle.c +++ b/hydra-oracle.c @@ -83,7 +83,9 @@ int32_t start_oracle(int32_t s, char *ip, int32_t port, unsigned char options, c return 4; } - if (OCILogon(o_environment, o_error, &o_servicecontext, (const OraText *) login, strlen(login), (const OraText *) pass, strlen(pass), (const OraText *) buffer, strlen(buffer))) { + // deprecated: if (OCILogon(o_environment, o_error, &o_servicecontext, (const OraText *) login, strlen(login), (const OraText *) pass, strlen(pass), (const OraText *) buffer, strlen(buffer))) { + if (oci_connect(login, pass, connect + o_environment, o_error, &o_servicecontext, (const OraText *) login, strlen(login), (const OraText *) pass, strlen(pass), (const OraText *) buffer, strlen(buffer))) { OCIErrorGet(o_error, 1, NULL, &o_errorcode, o_errormsg, sizeof(o_errormsg), OCI_HTYPE_ERROR); //database: oracle_error: ORA-01017: invalid username/password; logon denied //database: oracle_error: ORA-12514: TNS:listener does not currently know of service requested in connect descriptor diff --git a/hydra.1 b/hydra.1 index 2b64218..e627042 100644 --- a/hydra.1 +++ b/hydra.1 @@ -1,4 +1,4 @@ -.TH "HYDRA" "1" "01/03/2017" +.TH "HYDRA" "1" "01/01/2018" .SH NAME hydra \- a very fast network logon cracker which support many different services .SH SYNOPSIS diff --git a/hydra.c b/hydra.c index aa463ce..ec31348 100644 --- a/hydra.c +++ b/hydra.c @@ -1,5 +1,5 @@ /* - * hydra (c) 2001-2017 by van Hauser / THC + * hydra (c) 2001-2018 by van Hauser / THC * http://www.thc.org * * Parallized network login hacker. @@ -2123,7 +2123,7 @@ int main(int argc, char *argv[]) { struct sockaddr_in6 *ipv6 = NULL; struct sockaddr_in *ipv4 = NULL; - printf("%s %s (c) 2017 by %s - Please do not use in military or secret service organizations, or for illegal purposes.\n\n", PROGRAM, VERSION, AUTHOR); + printf("%s %s (c) 2018 by %s - Please do not use in military or secret service organizations, or for illegal purposes.\n\n", PROGRAM, VERSION, AUTHOR); #ifndef LIBAFP SERVICES = hydra_string_replace(SERVICES, "afp ", ""); strcat(unsupported, "afp "); From 71d407d6418bb38a5fe1fce03706412bd7f130c8 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 4 Jan 2018 10:53:24 +0100 Subject: [PATCH 119/531] fix --- hydra-oracle.c | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/hydra-oracle.c b/hydra-oracle.c index 1adefba..e598401 100644 --- a/hydra-oracle.c +++ b/hydra-oracle.c @@ -83,9 +83,7 @@ int32_t start_oracle(int32_t s, char *ip, int32_t port, unsigned char options, c return 4; } - // deprecated: if (OCILogon(o_environment, o_error, &o_servicecontext, (const OraText *) login, strlen(login), (const OraText *) pass, strlen(pass), (const OraText *) buffer, strlen(buffer))) { - if (oci_connect(login, pass, connect - o_environment, o_error, &o_servicecontext, (const OraText *) login, strlen(login), (const OraText *) pass, strlen(pass), (const OraText *) buffer, strlen(buffer))) { + if (OCILogon(o_environment, o_error, &o_servicecontext, (const OraText *) login, strlen(login), (const OraText *) pass, strlen(pass), (const OraText *) buffer, strlen(buffer))) { OCIErrorGet(o_error, 1, NULL, &o_errorcode, o_errormsg, sizeof(o_errormsg), OCI_HTYPE_ERROR); //database: oracle_error: ORA-01017: invalid username/password; logon denied //database: oracle_error: ORA-12514: TNS:listener does not currently know of service requested in connect descriptor From 9597bafb178a57f839502abdd3d62b0b43028993 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 4 Jan 2018 11:14:11 +0100 Subject: [PATCH 120/531] crash fix --- hydra.c | 17 +++++++++++------ 1 file changed, 11 insertions(+), 6 deletions(-) diff --git a/hydra.c b/hydra.c index ec31348..4f12335 100644 --- a/hydra.c +++ b/hydra.c @@ -3540,12 +3540,17 @@ int main(int argc, char *argv[]) { printf(" per task\n"); if (hydra_brains.targets == 1) { - if (index(hydra_targets[0]->target, ':') == NULL) - printf("[DATA] attacking %s%s://%s:%d%s%s\n", hydra_options.service, hydra_options.ssl == 1 ? "s" : "", hydra_targets[0]->target, port, strstr(hydra_options.miscptr, "/") == hydra_options.miscptr ? "" : "/", hydra_options.miscptr != NULL ? hydra_options.miscptr : ""); - else - printf("[DATA] attacking %s%s://[%s]:%d%s%s\n", hydra_options.service, hydra_options.ssl == 1 ? "s" : "", hydra_targets[0]->target, port, strstr(hydra_options.miscptr, "/") == hydra_options.miscptr ? "" : "/", hydra_options.miscptr != NULL ? hydra_options.miscptr : ""); - } else - printf("[DATA] attacking %s%s://(%d targets):%d%s%s\n", hydra_options.service, hydra_options.ssl == 1 ? "s" : "", hydra_brains.targets, port, strstr(hydra_options.miscptr, "/") == hydra_options.miscptr ? "" : "/", hydra_options.miscptr != NULL ? hydra_options.miscptr : ""); + if (index(hydra_targets[0]->target, ':') == NULL) { + printf("[DATA] attacking %s%s://%s:", hydra_options.service, hydra_options.ssl == 1 ? "s" : "", hydra_targets[0]->target); + printf("%d%s%s\n", port, hydra_options.miscptr == NULL || hydra_options.miscptr[0] != '/' ? "/" : "", hydra_options.miscptr != NULL ? hydra_options.miscptr : ""); + } else { + printf("[DATA] attacking %s%s://[%s]:", hydra_options.service, hydra_options.ssl == 1 ? "s" : "", hydra_targets[0]->target); + printf("%d%s%s\n", port, hydra_options.miscptr == NULL || hydra_options.miscptr[0] != '/' ? "/" : "", hydra_options.miscptr != NULL ? hydra_options.miscptr : ""); + } + } else { + printf("[DATA] attacking %s%s://(%d targets):", hydra_options.service, hydra_options.ssl == 1 ? "s" : "", hydra_brains.targets); + printf("%d%s%s\n", port, hydra_options.miscptr == NULL || hydra_options.miscptr[0] != '/' ? "/" : "", hydra_options.miscptr != NULL ? hydra_options.miscptr : ""); + } //service %s on port %d%s\n", hydra_options.service, port, hydra_options.ssl == 1 ? " with SSL" : ""); // if (hydra_options.miscptr != NULL && hydra_options.miscptr[0] != 0) // printf("[DATA] with additional data %s\n", hydra_options.miscptr); From dcd04ac6d94afab7fa8e9e7b935361683f8f1c50 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Wed, 31 Jan 2018 14:07:03 +0100 Subject: [PATCH 121/531] -w support for ssh module --- CHANGES | 1 + hydra-ssh.c | 2 ++ hydra.c | 50 -------------------------------------------------- hydra.h | 50 ++++++++++++++++++++++++++++++++++++++++++++++++++ 4 files changed, 53 insertions(+), 50 deletions(-) diff --git a/CHANGES b/CHANGES index 337590a..e49e9bf 100644 --- a/CHANGES +++ b/CHANGES @@ -3,6 +3,7 @@ Changelog for hydra Release 8.7-dev +* added -w timeout support to ssh module * fixed various memory leaks in http-form module * corrected hydra return code to be 0 on success * added patch from debian maintainers which fixes spellings diff --git a/hydra-ssh.c b/hydra-ssh.c index e1497a1..3bb4e49 100644 --- a/hydra-ssh.c +++ b/hydra-ssh.c @@ -19,6 +19,7 @@ void dummy_ssh() { ssh_session session = NULL; +extern hydra_option hydra_options; extern char *HYDRA_EXIT; int32_t new_session = 1; @@ -43,6 +44,7 @@ int32_t start_ssh(int32_t s, char *ip, int32_t port, unsigned char options, char ssh_options_set(session, SSH_OPTIONS_PORT, &port); ssh_options_set(session, SSH_OPTIONS_HOST, hydra_address2string(ip)); ssh_options_set(session, SSH_OPTIONS_USER, login); + ssh_options_set(session, SSH_OPTIONS_TIMEOUT, &hydra_options.waittime); ssh_options_set(session, SSH_OPTIONS_COMPRESSION_C_S, "none"); ssh_options_set(session, SSH_OPTIONS_COMPRESSION_S_C, "none"); if (ssh_connect(session) != 0) { diff --git a/hydra.c b/hydra.c index 4f12335..ae4837f 100644 --- a/hydra.c +++ b/hydra.c @@ -238,23 +238,6 @@ typedef enum { TARGET_UNRESOLVED = 3 } target_state_t; -typedef enum { - MODE_PASSWORD_LIST = 1, - MODE_LOGIN_LIST = 2, - MODE_PASSWORD_BRUTE = 4, - MODE_PASSWORD_REVERSE = 8, - MODE_PASSWORD_NULL = 16, - MODE_PASSWORD_SAME = 32, - MODE_COLON_FILE = 64 -} hydra_mode_t; - -typedef enum { - FORMAT_PLAIN_TEXT, - FORMAT_JSONV1, - FORMAT_JSONV2, - FORMAT_XMLV1 -} output_format_t; - // some structure definitions typedef struct { pid_t pid; @@ -308,39 +291,6 @@ typedef struct { FILE *ofp; } hydra_brain; -typedef struct { - hydra_mode_t mode; - int32_t loop_mode; // valid modes: 0 = password, 1 = user - int32_t ssl; - int32_t restore; - int32_t debug; // is external - for restore - int32_t verbose; // is external - for restore - int32_t showAttempt; - int32_t tasks; - int32_t try_null_password; - int32_t try_password_same_as_login; - int32_t try_password_reverse_login; - int32_t exit_found; - int32_t max_use; - int32_t cidr; - int32_t time_next_attempt; - output_format_t outfile_format; - char *login; - char *loginfile; - char *pass; - char *passfile; - char *outfile_ptr; - char *infile_ptr; - char *colonfile; - int32_t waittime; // is external - for restore - int32_t conwait; // is external - for restore - uint32_t port; // is external - for restore - char *miscptr; - char *server; - char *service; - char bfg; -} hydra_option; - typedef struct { char *name; int32_t port; diff --git a/hydra.h b/hydra.h index 74a33fa..d1fcc60 100755 --- a/hydra.h +++ b/hydra.h @@ -162,5 +162,55 @@ int32_t usleepn(uint32_t useconds); #endif +typedef enum { + MODE_PASSWORD_LIST = 1, + MODE_LOGIN_LIST = 2, + MODE_PASSWORD_BRUTE = 4, + MODE_PASSWORD_REVERSE = 8, + MODE_PASSWORD_NULL = 16, + MODE_PASSWORD_SAME = 32, + MODE_COLON_FILE = 64 +} hydra_mode_t; + +typedef enum { + FORMAT_PLAIN_TEXT, + FORMAT_JSONV1, + FORMAT_JSONV2, + FORMAT_XMLV1 +} output_format_t; + +typedef struct { + hydra_mode_t mode; + int32_t loop_mode; // valid modes: 0 = password, 1 = user + int32_t ssl; + int32_t restore; + int32_t debug; // is external - for restore + int32_t verbose; // is external - for restore + int32_t showAttempt; + int32_t tasks; + int32_t try_null_password; + int32_t try_password_same_as_login; + int32_t try_password_reverse_login; + int32_t exit_found; + int32_t max_use; + int32_t cidr; + int32_t time_next_attempt; + output_format_t outfile_format; + char *login; + char *loginfile; + char *pass; + char *passfile; + char *outfile_ptr; + char *infile_ptr; + char *colonfile; + int32_t waittime; // is external - for restore + int32_t conwait; // is external - for restore + uint32_t port; // is external - for restore + char *miscptr; + char *server; + char *service; + char bfg; +} hydra_option; + #define _HYDRA_H #endif From b54a3b24959f9b497e9f1f2715c91edad41e5b0f Mon Sep 17 00:00:00 2001 From: van Hauser Date: Wed, 31 Jan 2018 14:07:54 +0100 Subject: [PATCH 122/531] -w support for ssh module --- hydra-ssh.c | 1 + 1 file changed, 1 insertion(+) diff --git a/hydra-ssh.c b/hydra-ssh.c index 3bb4e49..3808a35 100644 --- a/hydra-ssh.c +++ b/hydra-ssh.c @@ -181,6 +181,7 @@ int32_t service_ssh_init(char *ip, int32_t sp, unsigned char options, char *misc ssh_options_set(session, SSH_OPTIONS_USER, "hydra"); else ssh_options_set(session, SSH_OPTIONS_USER, miscptr); + ssh_options_set(session, SSH_OPTIONS_TIMEOUT, &hydra_options.waittime); ssh_options_set(session, SSH_OPTIONS_COMPRESSION_C_S, "none"); ssh_options_set(session, SSH_OPTIONS_COMPRESSION_S_C, "none"); if (ssh_connect(session) != 0) { From 1845c4476bd490089d1d32fdf030499a1023f137 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Mon, 19 Feb 2018 19:07:48 +0100 Subject: [PATCH 123/531] proxy connect debug --- hydra-mod.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/hydra-mod.c b/hydra-mod.c index d568571..251ef27 100644 --- a/hydra-mod.c +++ b/hydra-mod.c @@ -283,6 +283,12 @@ int32_t internal__hydra_connect(char *host, int32_t port, int32_t protocol, int3 snprintf(buf, 4096, "CONNECT %s:%d HTTP/1.0\r\nProxy-Authorization: Basic %s\r\n\r\n", hydra_address2string(host), port, proxy_authentication[selected_proxy]); send(s, buf, strlen(buf), 0); + if (debug) { + char *ptr = index(buf, '\r'); + if (ptr != NULL) + *ptr = 0; + printf("DEBUG_CONNECT_PROXY_SENT: %s\n", buf); + } recv(s, buf, 4096, 0); if (strncmp("HTTP/", buf, 5) == 0 && (tmpptr = index(buf, ' ')) != NULL && *++tmpptr == '2') { if (debug) From d06208966b3c1ef07324fdfc247a52fc73eac550 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Tue, 17 Apr 2018 02:04:26 +0200 Subject: [PATCH 124/531] allow newer libssh versions - once they exist --- hydra-sshkey.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/hydra-sshkey.c b/hydra-sshkey.c index e9f46c8..a9b85b2 100644 --- a/hydra-sshkey.c +++ b/hydra-sshkey.c @@ -15,7 +15,7 @@ void dummy_sshkey() { #include -#if LIBSSH_VERSION_MAJOR == 0 && LIBSSH_VERSION_MINOR >= 4 +#if LIBSSH_VERSION_MAJOR >= 0 && LIBSSH_VERSION_MINOR >= 4 extern ssh_session session; extern char *HYDRA_EXIT; @@ -147,7 +147,7 @@ void service_sshkey(char *ip, int32_t sp, unsigned char options, char *miscptr, } } #else -#error "You are not using v0.4.x. Download from http://www.libssh.org and add -DWITH_SSH1=On in cmake to enable SSH v1 support" +#error "You are not using at least v0.4.x. Download from http://www.libssh.org and add -DWITH_SSH1=On in cmake to enable SSH v1 support" #endif #endif From 1572e8c458797d5a824101202fb59ecea2e24877 Mon Sep 17 00:00:00 2001 From: Darren Rainey Date: Tue, 5 Jun 2018 20:59:43 +0100 Subject: [PATCH 125/531] General Cleanup --- hydra.c | 21 --------------------- 1 file changed, 21 deletions(-) diff --git a/hydra.c b/hydra.c index ae4837f..89fac11 100644 --- a/hydra.c +++ b/hydra.c @@ -184,9 +184,6 @@ extern int32_t service_s7_300_init(char *ip, int32_t sp, unsigned char options, extern int32_t service_rtsp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); extern int32_t service_rpcap_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -// ADD NEW SERVICES HERE - - // ADD NEW SERVICES HERE char *SERVICES = "adam6500 asterisk afp cisco cisco-enable cvs firebird ftp ftps http[s]-{head|get|post} http[s]-{get|post}-form http-proxy http-proxy-urlenum icq imap[s] irc ldap2[s] ldap3[-{cram|digest}md5][s] mssql mysql ncp nntp oracle oracle-listener oracle-sid pcanywhere pcnfs pop3[s] postgres radmin2 rdp redis rexec rlogin rpcap rsh rtsp s7-300 sapr3 sip smb smtp[s] smtp-enum snmp socks5 ssh sshkey svn teamspeak telnet[s] vmauthd vnc xmpp"; @@ -1055,14 +1052,6 @@ void fill_mem(char *ptr, FILE * fd, int32_t colonmode) { fprintf(stderr, "[ERROR] invalid line in colon file (-C), missing colon in line: %s\n", tmp); exit(-1); } else { - // if (tmp[0] == ':') { - // *ptr = 0; - // ptr++; - // } - // if (tmp[len - 1] == ':' && len > 1) { - // len++; - // tmp[len - 1] = 0; - // } *ptr2 = 0; } } @@ -3049,7 +3038,6 @@ int main(int argc, char *argv[]) { // ADD NEW SERVICES HERE - if (i == 0) { fprintf(stderr, "[ERROR] Unknown service: %s\n", hydra_options.service); exit(-1); @@ -3920,15 +3908,6 @@ int main(int argc, char *argv[]) { for (j = 0; j < hydra_options.max_use; j++) if (hydra_heads[j]->active >= HEAD_UNUSED) k++; -/* I think we don't need this anymore - if ((hydra_brains.todo_all + total_redo_count) < hydra_brains.sent) { //in case of overflow of unsigned "-1" - for (i = 0; i < hydra_options.max_use; i++) - if (hydra_heads[i]->active > 0 && hydra_heads[i]->pid > 0) - hydra_kill_head(i, 1, 3); - printf("[BUG] %lu + %d < %lu\n", hydra_brains.todo_all, total_redo_count, hydra_brains.sent); - bail("[BUG] Weird bug detected where more tests were performed than possible. Please rerun with -d command line switch and post all output plus command line here: https://github.com/vanhauser-thc/thc-hydra/issues/113 or send it in an email to vh@thc.org"); - } -*/ printf("[STATUS] %.2f tries/min, %lu tries in %02lu:%02luh, %lu to do in %02lu:%02luh, %d active\n", (1.0 * hydra_brains.sent) / (((elapsed_status - starttime) * 1.0) / 60), // tries/min hydra_brains.sent, // tries (uint64_t) ((elapsed_status - starttime) / 3600), // hours From eb064c4222964ecac9dc757ad8c847b130c43deb Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 14 Jun 2018 02:44:31 +0200 Subject: [PATCH 126/531] support uncommon mysql ports --- CHANGES | 1 + Makefile.am | 0 hydra-mysql.c | 2 +- hydra.h | 0 4 files changed, 2 insertions(+), 1 deletion(-) mode change 100755 => 100644 Makefile.am mode change 100755 => 100644 hydra.h diff --git a/CHANGES b/CHANGES index e49e9bf..02f7e81 100644 --- a/CHANGES +++ b/CHANGES @@ -3,6 +3,7 @@ Changelog for hydra Release 8.7-dev +* mysql module: a non-default port was not working, fixed * added -w timeout support to ssh module * fixed various memory leaks in http-form module * corrected hydra return code to be 0 on success diff --git a/Makefile.am b/Makefile.am old mode 100755 new mode 100644 diff --git a/hydra-mysql.c b/hydra-mysql.c index fdf1e81..0fda989 100644 --- a/hydra-mysql.c +++ b/hydra-mysql.c @@ -212,7 +212,7 @@ int32_t start_mysql(int32_t sock, char *ip, int32_t port, unsigned char options, } } /*mysql_options(&mysql,MYSQL_OPT_COMPRESS,0); */ - if (!mysql_real_connect(mysql, hydra_address2string(ip), login, pass, database, 0, NULL, 0)) { + if (!mysql_real_connect(mysql, hydra_address2string(ip), login, pass, database, port, NULL, 0)) { int32_t my_errno = mysql_errno(mysql); if (debug) diff --git a/hydra.h b/hydra.h old mode 100755 new mode 100644 From d89483ed0517ce92a48d5ce859dd5c80f050f470 Mon Sep 17 00:00:00 2001 From: mathewmarcus Date: Sat, 14 Jul 2018 11:10:34 -0500 Subject: [PATCH 127/531] pulled option parsing functionality into separate function --- hydra-http-form.c | 164 +++++++++++++++++++++++++--------------------- 1 file changed, 88 insertions(+), 76 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 857b359..3b8a3f3 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -396,6 +396,92 @@ char *stringify_headers(ptr_header_node *ptr_head) { return headers_str; } +ptr_header_node parse_options(char *miscptr) { + ptr_header_node ptr_head = NULL; + char *ptr, *ptr2; + + /* + * Parse the user-supplied options. + * Beware of the backslashes (\)! + */ + while (*miscptr != 0) { + switch (miscptr[0]) { + case 'c': // fall through + case 'C': + ptr = miscptr + 2; + while (*ptr != 0 && (*ptr != ':' || *(ptr - 1) == '\\')) + ptr++; + if (*ptr != 0) + *ptr++ = 0; + sprintf(cookieurl, "%.1000s", hydra_strrep(miscptr + 2, "\\:", ":")); + miscptr = ptr; + break; + case 'h': + // add a new header at the end + ptr = miscptr + 2; + while (*ptr != 0 && *ptr != ':') + ptr++; + if (*(ptr - 1) == '\\') + *(ptr - 1) = 0; + if (*ptr != 0) { + *ptr = 0; + ptr += 2; + } + ptr2 = ptr; + while (*ptr2 != 0 && (*ptr2 != ':' || *(ptr2 - 1) == '\\')) + ptr2++; + if (*ptr2 != 0) + *ptr2++ = 0; + /* + * At this point: + * - (optional1 + 2) contains the header's name + * - ptr contains the header's value + */ + if (add_header(&ptr_head, miscptr + 2, hydra_strrep(ptr, "\\:", ":"), HEADER_TYPE_USERHEADER)) { + // Success: break the switch and go ahead + miscptr = ptr2; + break; + } + // Error: abort execution + hydra_report(stderr, "[ERROR] Out of memory for HTTP headers (h)."); + return NULL; + case 'H': + // add a new header, or replace an existing one's value + ptr = miscptr + 2; + while (*ptr != 0 && *ptr != ':') + ptr++; + + if (*(ptr - 1) == '\\') + *(ptr - 1) = 0; + + if (*ptr != 0) { + *ptr = 0; + ptr += 2; + } + ptr2 = ptr; + while (*ptr2 != 0 && (*ptr2 != ':' || *(ptr2 - 1) == '\\')) + ptr2++; + if (*ptr2 != 0) + *ptr2++ = 0; + /* + * At this point: + * - (optional1 + 2) contains the header's name + * - ptr contains the header's value + */ + if (add_header(&ptr_head, miscptr + 2, hydra_strrep(ptr, "\\:", ":"), HEADER_TYPE_USERHEADER_REPL)) { + // Success: break the switch and go ahead + miscptr = ptr2; + break; + } + // Error: abort execution + hydra_report(stderr, "[ERROR] Out of memory for HTTP headers (H)."); + return NULL; + // no default + } + } + + return ptr_head; +} char *prepare_http_request(char *type, char *path, char *params, char *headers) { uint32_t reqlen = 0; @@ -1100,7 +1186,7 @@ int32_t service_http_form_init(char *ip, int32_t sp, unsigned char options, char } ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { - ptr_header_node ptr_head = NULL; + ptr_header_node ptr_head; char *ptr, *ptr2, *proxy_string; if (use_proxy > 0 && proxy_count > 0) @@ -1200,81 +1286,7 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { * Parse the user-supplied options. * Beware of the backslashes (\)! */ - while (*optional1 != 0) { - switch (optional1[0]) { - case 'c': // fall through - case 'C': - ptr = optional1 + 2; - while (*ptr != 0 && (*ptr != ':' || *(ptr - 1) == '\\')) - ptr++; - if (*ptr != 0) - *ptr++ = 0; - sprintf(cookieurl, "%.1000s", hydra_strrep(optional1 + 2, "\\:", ":")); - optional1 = ptr; - break; - case 'h': - // add a new header at the end - ptr = optional1 + 2; - while (*ptr != 0 && *ptr != ':') - ptr++; - if (*(ptr - 1) == '\\') - *(ptr - 1) = 0; - if (*ptr != 0) { - *ptr = 0; - ptr += 2; - } - ptr2 = ptr; - while (*ptr2 != 0 && (*ptr2 != ':' || *(ptr2 - 1) == '\\')) - ptr2++; - if (*ptr2 != 0) - *ptr2++ = 0; - /* - * At this point: - * - (optional1 + 2) contains the header's name - * - ptr contains the header's value - */ - if (add_header(&ptr_head, optional1 + 2, hydra_strrep(ptr, "\\:", ":"), HEADER_TYPE_USERHEADER)) { - // Success: break the switch and go ahead - optional1 = ptr2; - break; - } - // Error: abort execution - hydra_report(stderr, "[ERROR] Out of memory for HTTP headers (h)."); - return NULL; - case 'H': - // add a new header, or replace an existing one's value - ptr = optional1 + 2; - while (*ptr != 0 && *ptr != ':') - ptr++; - - if (*(ptr - 1) == '\\') - *(ptr - 1) = 0; - - if (*ptr != 0) { - *ptr = 0; - ptr += 2; - } - ptr2 = ptr; - while (*ptr2 != 0 && (*ptr2 != ':' || *(ptr2 - 1) == '\\')) - ptr2++; - if (*ptr2 != 0) - *ptr2++ = 0; - /* - * At this point: - * - (optional1 + 2) contains the header's name - * - ptr contains the header's value - */ - if (add_header(&ptr_head, optional1 + 2, hydra_strrep(ptr, "\\:", ":"), HEADER_TYPE_USERHEADER_REPL)) { - // Success: break the switch and go ahead - optional1 = ptr2; - break; - } - // Error: abort execution - hydra_report(stderr, "[ERROR] Out of memory for HTTP headers (H)."); - return NULL; - // no default - } - } + ptr_head = parse_options(optional1); /* again: no snprintf to be portable. don't worry, buffer can't overflow */ if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) { From 689b20f60afbc210267da94d414a14fb6baa181d Mon Sep 17 00:00:00 2001 From: mathewmarcus Date: Sat, 14 Jul 2018 15:55:35 -0500 Subject: [PATCH 128/531] ported relevant shared http declarations into header file --- hydra-http-form.c | 7 +++---- hydra-http.h | 11 +++++++++++ 2 files changed, 14 insertions(+), 4 deletions(-) create mode 100644 hydra-http.h diff --git a/hydra-http-form.c b/hydra-http-form.c index 3b8a3f3..86cc71d 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -50,6 +50,7 @@ Added fail or success condition, getting cookies, and allow 5 redirections by da */ #include "hydra-mod.h" +#include "hydra-http.h" /* HTTP Header Types */ #define HEADER_TYPE_USERHEADER 'h' @@ -61,12 +62,12 @@ extern char *HYDRA_EXIT; char *buf; char *cond; -typedef struct header_node { +struct header_node { char *header; char *value; char type; struct header_node *next; -} t_header_node, *ptr_header_node; +}; typedef struct cookie_node { char *name; @@ -81,8 +82,6 @@ int32_t auth_flag = 0; char cookie[4096] = "", cmiscptr[1024]; -extern char *webtarget; -extern char *slash; int32_t webport, freemischttpform = 0; char bufferurl[6096 + 24], cookieurl[6096 + 24] = "", userheader[6096 + 24] = "", *url, *variables, *optional1; diff --git a/hydra-http.h b/hydra-http.h new file mode 100644 index 0000000..1718ffd --- /dev/null +++ b/hydra-http.h @@ -0,0 +1,11 @@ +#ifndef _HYDRA_HTTP_H +#define _HYDRA_HTTP_H + +typedef struct header_node t_header_node, *ptr_header_node; + +extern char *webtarget; +extern char *slash; +extern char *optional1; + +extern ptr_header_node parse_options(char *miscptr); +#endif From a6db85b963b606f7b5cb371e7448dabc4efb529d Mon Sep 17 00:00:00 2001 From: mathewmarcus Date: Sat, 14 Jul 2018 16:14:40 -0500 Subject: [PATCH 129/531] parse optional header string e.g. (h|H=My-Hdr\: foo) for non-form based http requests --- hydra-http.c | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/hydra-http.c b/hydra-http.c index ddbec4c..b61cbf8 100644 --- a/hydra-http.c +++ b/hydra-http.c @@ -1,4 +1,5 @@ #include "hydra-mod.h" +#include "hydra-http.h" #include "sasl.h" extern char *HYDRA_EXIT; @@ -244,6 +245,7 @@ void service_http(char *ip, int32_t sp, unsigned char options, char *miscptr, FI int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_HTTP, mysslport = PORT_HTTP_SSL; char *ptr, *ptr2; + ptr_header_node ptr_head; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -278,6 +280,16 @@ void service_http(char *ip, int32_t sp, unsigned char options, char *miscptr, FI else webport = mysslport; + /* Advance to options string */ + ptr = miscptr; + while (*ptr != 0 && (*ptr != ':' || *(ptr - 1) == '\\')) + ptr++; + if (*ptr != 0) + *ptr++ = 0; + optional1 = ptr; + + ptr_head = parse_options(optional1); + while (1) { next_run = 0; switch (run) { From 4b1a945c4505dc17969b2cd38f51dd2b56153d5c Mon Sep 17 00:00:00 2001 From: mathewmarcus Date: Mon, 16 Jul 2018 07:04:59 -0500 Subject: [PATCH 130/531] moved relevant header macros and functions into http header file --- hydra-http-form.c | 7 ------- hydra-http.h | 10 ++++++++++ 2 files changed, 10 insertions(+), 7 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 86cc71d..5d719b9 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -49,15 +49,8 @@ Added fail or success condition, getting cookies, and allow 5 redirections by da */ -#include "hydra-mod.h" #include "hydra-http.h" -/* HTTP Header Types */ -#define HEADER_TYPE_USERHEADER 'h' -#define HEADER_TYPE_USERHEADER_REPL 'H' -#define HEADER_TYPE_DEFAULT 'D' -#define HEADER_TYPE_DEFAULT_REPL 'd' - extern char *HYDRA_EXIT; char *buf; char *cond; diff --git a/hydra-http.h b/hydra-http.h index 1718ffd..1679ccb 100644 --- a/hydra-http.h +++ b/hydra-http.h @@ -1,6 +1,14 @@ #ifndef _HYDRA_HTTP_H #define _HYDRA_HTTP_H +#include "hydra-mod.h" + +/* HTTP Header Types */ +#define HEADER_TYPE_USERHEADER 'h' +#define HEADER_TYPE_USERHEADER_REPL 'H' +#define HEADER_TYPE_DEFAULT 'D' +#define HEADER_TYPE_DEFAULT_REPL 'd' + typedef struct header_node t_header_node, *ptr_header_node; extern char *webtarget; @@ -8,4 +16,6 @@ extern char *slash; extern char *optional1; extern ptr_header_node parse_options(char *miscptr); +extern int32_t add_header(ptr_header_node * ptr_head, char *header, char *value, char type); +extern char *stringify_headers(ptr_header_node *ptr_head); #endif From 9afbddfa95fbb7bfaad29bbbc5fe926efc66666e Mon Sep 17 00:00:00 2001 From: mathewmarcus Date: Mon, 16 Jul 2018 07:16:58 -0500 Subject: [PATCH 131/531] optionally include headers in non-form based http requests --- hydra-http.c | 44 ++++++++++++++++++++++++++++++++++---------- 1 file changed, 34 insertions(+), 10 deletions(-) diff --git a/hydra-http.c b/hydra-http.c index b61cbf8..bfdfc27 100644 --- a/hydra-http.c +++ b/hydra-http.c @@ -1,4 +1,3 @@ -#include "hydra-mod.h" #include "hydra-http.h" #include "sasl.h" @@ -9,10 +8,10 @@ char *http_buf = NULL; int32_t webport, freemischttp = 0; int32_t http_auth_mechanism = AUTH_BASIC; -int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp, char *type) { +int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp, char *type, ptr_header_node ptr_head) { char *empty = ""; - char *login, *pass, buffer[500], buffer2[500]; - char header[64] = "Content-Length: 0\r\n"; + char *login, *pass, *buffer, buffer2[500]; + char *header; char *ptr, *fooptr; int32_t complete_line = 0; char tmpreplybuf[1024] = "", *tmpreplybufptr; @@ -22,8 +21,15 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha if (strlen(pass = hydra_get_next_password()) == 0) pass = empty; - if (strcmp(type, "POST") != 0) - header[0] = 0; + if (strcmp(type, "POST") == 0) + add_header(&ptr_head, "Content-Length", "0", HEADER_TYPE_DEFAULT); + + header = stringify_headers(&ptr_head); + + if(!(buffer = malloc(strlen(header) + 500))) { + free(header); + return 3; + } // we must reset this if buf is NULL and we do MD5 digest if (http_buf == NULL && http_auth_mechanism == AUTH_DIGESTMD5) @@ -63,6 +69,8 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha fooptr = buffer2; sasl_digest_md5(fooptr, login, pass, buffer, miscptr, type, webtarget, webport, header); if (fooptr == NULL) { + free(buffer); + free(header); return 3; } @@ -98,8 +106,11 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha buf1, header); } - if (hydra_send(s, buffer, strlen(buffer), 0) < 0) + if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { + free(buffer); + free(header); return 1; + } //receive challenge if (http_buf != NULL) @@ -110,8 +121,11 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha http_buf = hydra_receive_line(s); } - if (http_buf == NULL) + if (http_buf == NULL) { + free(buffer); + free(header); return 1; + } if (pos != NULL) { char *str; @@ -154,6 +168,8 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha } if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { + free(buffer); + free(header); return 1; } @@ -190,6 +206,8 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha if (http_buf == NULL) { if (verbose) hydra_report(stderr, "[ERROR] Server did not answer\n"); + free(buffer); + free(header); return 3; } @@ -229,6 +247,8 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha if (find_auth) { // free(http_buf); // http_buf = NULL; + free(buffer); + free(header); return 1; } } @@ -236,6 +256,8 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha } // free(http_buf); // http_buf = NULL; + free(buffer); + free(header); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) return 3; return 1; @@ -318,7 +340,7 @@ void service_http(char *ip, int32_t sp, unsigned char options, char *miscptr, FI break; } case 2: /* run the cracking function */ - next_run = start_http(sock, ip, port, options, miscptr, fp, type); + next_run = start_http(sock, ip, port, options, miscptr, fp, type, ptr_head); break; case 3: /* clean exit */ if (sock >= 0) @@ -365,5 +387,7 @@ int32_t service_http_init(char *ip, int32_t sp, unsigned char options, char *mis void usage_http(const char* service) { printf("Module %s requires the page to authenticate.\n" - "For example: \"/secret\" or \"http://bla.com/foo/bar\" or \"https://test.com:8080/members\"\n\n", service); + "The following parameters are optional:\n" + " (h|H)=My-Hdr\\: foo to send a user defined HTTP header with each request\n" + "For example: \"/secret\" or \"http://bla.com/foo/bar:H=Cookie\\: sessid=aaaa\" or \"https://test.com:8080/members\"\n\n", service); } From 25383d76d93d1b8b67b2b54acc8bff476f3fd61e Mon Sep 17 00:00:00 2001 From: mathewmarcus Date: Mon, 16 Jul 2018 07:41:21 -0500 Subject: [PATCH 132/531] modified parse_options function --- hydra-http-form.c | 19 +++++++++---------- hydra-http.c | 5 +++-- hydra-http.h | 2 +- 3 files changed, 13 insertions(+), 13 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 5d719b9..4b02483 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -388,8 +388,7 @@ char *stringify_headers(ptr_header_node *ptr_head) { return headers_str; } -ptr_header_node parse_options(char *miscptr) { - ptr_header_node ptr_head = NULL; +int32_t parse_options(char *miscptr, ptr_header_node *ptr_head) { char *ptr, *ptr2; /* @@ -429,14 +428,14 @@ ptr_header_node parse_options(char *miscptr) { * - (optional1 + 2) contains the header's name * - ptr contains the header's value */ - if (add_header(&ptr_head, miscptr + 2, hydra_strrep(ptr, "\\:", ":"), HEADER_TYPE_USERHEADER)) { + if (add_header(ptr_head, miscptr + 2, hydra_strrep(ptr, "\\:", ":"), HEADER_TYPE_USERHEADER)) { // Success: break the switch and go ahead miscptr = ptr2; break; } // Error: abort execution hydra_report(stderr, "[ERROR] Out of memory for HTTP headers (h)."); - return NULL; + return 0; case 'H': // add a new header, or replace an existing one's value ptr = miscptr + 2; @@ -460,19 +459,18 @@ ptr_header_node parse_options(char *miscptr) { * - (optional1 + 2) contains the header's name * - ptr contains the header's value */ - if (add_header(&ptr_head, miscptr + 2, hydra_strrep(ptr, "\\:", ":"), HEADER_TYPE_USERHEADER_REPL)) { + if (add_header(ptr_head, miscptr + 2, hydra_strrep(ptr, "\\:", ":"), HEADER_TYPE_USERHEADER_REPL)) { // Success: break the switch and go ahead miscptr = ptr2; break; } // Error: abort execution hydra_report(stderr, "[ERROR] Out of memory for HTTP headers (H)."); - return NULL; + return 0; // no default } } - - return ptr_head; + return 1; } char *prepare_http_request(char *type, char *path, char *params, char *headers) { @@ -1178,7 +1176,7 @@ int32_t service_http_form_init(char *ip, int32_t sp, unsigned char options, char } ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { - ptr_header_node ptr_head; + ptr_header_node ptr_head = NULL; char *ptr, *ptr2, *proxy_string; if (use_proxy > 0 && proxy_count > 0) @@ -1278,7 +1276,8 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { * Parse the user-supplied options. * Beware of the backslashes (\)! */ - ptr_head = parse_options(optional1); + if (!parse_options(optional1, &ptr_head)) + return NULL; /* again: no snprintf to be portable. don't worry, buffer can't overflow */ if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) { diff --git a/hydra-http.c b/hydra-http.c index bfdfc27..db9b500 100644 --- a/hydra-http.c +++ b/hydra-http.c @@ -267,7 +267,7 @@ void service_http(char *ip, int32_t sp, unsigned char options, char *miscptr, FI int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_HTTP, mysslport = PORT_HTTP_SSL; char *ptr, *ptr2; - ptr_header_node ptr_head; + ptr_header_node ptr_head = NULL; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -310,7 +310,8 @@ void service_http(char *ip, int32_t sp, unsigned char options, char *miscptr, FI *ptr++ = 0; optional1 = ptr; - ptr_head = parse_options(optional1); + if (!parse_options(optional1, &ptr_head)) + run = 4; while (1) { next_run = 0; diff --git a/hydra-http.h b/hydra-http.h index 1679ccb..b6b4c2b 100644 --- a/hydra-http.h +++ b/hydra-http.h @@ -15,7 +15,7 @@ extern char *webtarget; extern char *slash; extern char *optional1; -extern ptr_header_node parse_options(char *miscptr); +extern int32_t parse_options(char *miscptr, ptr_header_node * ptr_head); extern int32_t add_header(ptr_header_node * ptr_head, char *header, char *value, char type); extern char *stringify_headers(ptr_header_node *ptr_head); #endif From 7f4d8fc6e9be3ff7024acbfa80cd3a8c8242a84d Mon Sep 17 00:00:00 2001 From: van Hauser Date: Mon, 16 Jul 2018 17:45:21 +0200 Subject: [PATCH 133/531] update changelog --- CHANGES | 1 + 1 file changed, 1 insertion(+) diff --git a/CHANGES b/CHANGES index 02f7e81..84333ba 100644 --- a/CHANGES +++ b/CHANGES @@ -3,6 +3,7 @@ Changelog for hydra Release 8.7-dev +* http-get/http-post: now supports H=/h= parameters same as http-form (thanks to mathewmarcus@github for the patch) * mysql module: a non-default port was not working, fixed * added -w timeout support to ssh module * fixed various memory leaks in http-form module From f6383ae4c7498f44fefa4c53eb16f9d40d1a74ce Mon Sep 17 00:00:00 2001 From: mathewmarcus Date: Fri, 27 Jul 2018 14:23:59 -0500 Subject: [PATCH 134/531] set cookie for http-form-post redirects --- hydra-http-form.c | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/hydra-http-form.c b/hydra-http-form.c index 4b02483..7debe73 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -997,6 +997,15 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) hdrrepv(&ptr_head, "Content-Length", "0"); + // re-use the above code to set cookies + if (cookie_header != NULL) + free(cookie_header); + cookie_header = stringify_cookies(ptr_cookie); + if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) + add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); + else + hdrrepv(&ptr_head, "Cookie", cookie_header); + //re-use the code above to check for proxy use if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) { // proxy with authentication From 0626888331d01498b353f6c7cae5512a44a343d3 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 9 Aug 2018 11:13:25 +0200 Subject: [PATCH 135/531] http-form fix to always identify 403/404 as failed --- CHANGES | 4 +++- hydra-http-form.c | 4 ++-- 2 files changed, 5 insertions(+), 3 deletions(-) diff --git a/CHANGES b/CHANGES index 84333ba..dba24ce 100644 --- a/CHANGES +++ b/CHANGES @@ -3,7 +3,9 @@ Changelog for hydra Release 8.7-dev -* http-get/http-post: now supports H=/h= parameters same as http-form (thanks to mathewmarcus@github for the patch) +* http-get/http-post: + - now supports H=/h= parameters same as http-form (thanks to mathewmarcus@github for the patch) + - 403/404 errors are now always registered as failed attempts * mysql module: a non-default port was not working, fixed * added -w timeout support to ssh module * fixed various memory leaks in http-form module diff --git a/hydra-http-form.c b/hydra-http-form.c index 4b02483..bf8497d 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -562,7 +562,7 @@ int32_t analyze_server_response(int32_t s) { } else if (strstr(buf, "HTTP/1.1 401") != NULL || strstr(buf, "HTTP/1.0 401") != NULL) { auth_flag = 1; } else if ((strstr(buf, "HTTP/1.1 403") != NULL) || (strstr(buf, "HTTP/1.1 404") != NULL) || (strstr(buf, "HTTP/1.0 403") != NULL) || (strstr(buf, "HTTP/1.0 404") != NULL)) { - return 0; + return -1; } if (hydra_strcasestr(buf, "Location: ") != NULL) { @@ -899,7 +899,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options found = analyze_server_response(s); - if (auth_flag) { // we received a 401 error - user using wrong module + if (auth_flag) { // we received a 401 error - user is using wrong module hydra_report(stderr, "[ERROR] the target is using HTTP auth, not a web form, received HTTP error code 401. Use module \"http%s-get\" instead.\n", (options & OPTION_SSL) > 0 ? "s" : ""); return 4; From 4f167371d252e5e85aef91fa6c32b78552b00793 Mon Sep 17 00:00:00 2001 From: Or Bin Date: Fri, 10 Aug 2018 23:11:58 +0300 Subject: [PATCH 136/531] Fixed a tiny typo in the help text --- hydra.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra.c b/hydra.c index 89fac11..6746d68 100644 --- a/hydra.c +++ b/hydra.c @@ -533,7 +533,7 @@ void help_bfg() { " valid CHARSET values are: 'a' for lowercase letters,\n" " 'A' for uppercase letters, '1' for numbers, and for all others,\n" " just add their real representation.\n" - " -y disable the use if the above letters as placeholders\n\n" + " -y disable the use of the above letters as placeholders\n\n" "Examples:\n" " -x 3:5:a generate passwords from length 3 to 5 with all lowercase letters\n" " -x 5:8:A1 generate passwords from length 5 to 8 with uppercase and numbers\n" From 0796c5f9540bf99c598437b85252e91b29e42d09 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Sat, 18 Aug 2018 14:41:32 +0200 Subject: [PATCH 137/531] update web link --- CHANGES | 1 + README | 6 +- README.md | 4 +- hydra-pcnfs.c | 2 +- hydra.c | 4 +- pw-inspector.c | 2 +- web/CHANGES | 17 ++++- web/README | 190 ++++++++++++++++++++++++++++++++----------------- 8 files changed, 149 insertions(+), 77 deletions(-) diff --git a/CHANGES b/CHANGES index dba24ce..8a1786a 100644 --- a/CHANGES +++ b/CHANGES @@ -3,6 +3,7 @@ Changelog for hydra Release 8.7-dev +* New web page: https://github.com/vanhauser-thc/thc-hydra * http-get/http-post: - now supports H=/h= parameters same as http-form (thanks to mathewmarcus@github for the patch) - 403/404 errors are now always registered as failed attempts diff --git a/README b/README index b661a7e..c089c2e 100644 --- a/README +++ b/README @@ -2,7 +2,7 @@ H Y D R A (c) 2001-2018 by van Hauser / THC - http://www.thc.org + https://github.com/vanhauser-thc/thc-hydra many modules were written by David (dot) Maciejak @ gmail (dot) com BFG code by Jan Dlabal @@ -49,7 +49,7 @@ Your help in writing, enhancing or fixing modules is highly appreciated!! :-) WHERE TO GET ------------ You can always find the newest release/production version of hydra at its -project page at https://www.thc.org/thc-hydra +project page at https://github.com/vanhauser-thc/thc-hydra/releases If you are interested in the current development state, the public development repository is at Github: svn co https://github.com/vanhauser-thc/thc-hydra @@ -377,7 +377,7 @@ Version 1.00 example: "These are very free form" ], "generator": { - "built": "2018-01-01 14:44:22", + "built": "2018-03-01 14:44:22", "commandline": "hydra -b jsonv1 -o results.json ... ...", "jsonoutputversion": "1.00", "server": "127.0.0.1", diff --git a/README.md b/README.md index c5c0dfb..c089c2e 100644 --- a/README.md +++ b/README.md @@ -2,7 +2,7 @@ H Y D R A (c) 2001-2018 by van Hauser / THC - http://www.thc.org + https://github.com/vanhauser-thc/thc-hydra many modules were written by David (dot) Maciejak @ gmail (dot) com BFG code by Jan Dlabal @@ -49,7 +49,7 @@ Your help in writing, enhancing or fixing modules is highly appreciated!! :-) WHERE TO GET ------------ You can always find the newest release/production version of hydra at its -project page at https://www.thc.org/thc-hydra +project page at https://github.com/vanhauser-thc/thc-hydra/releases If you are interested in the current development state, the public development repository is at Github: svn co https://github.com/vanhauser-thc/thc-hydra diff --git a/hydra-pcnfs.c b/hydra-pcnfs.c index fed02dd..dc9e41a 100644 --- a/hydra-pcnfs.c +++ b/hydra-pcnfs.c @@ -66,7 +66,7 @@ int32_t start_pcnfs(int32_t s, char *ip, int32_t port, unsigned char options, ch prh->len_passwd = htonl(63); prh->len_comments = htonl(254); - strcpy(prh->comments, " Hydra - THC password cracker - visit http://www.thc.org - use only allowed for legal purposes "); + strcpy(prh->comments, " Hydra - THC password cracker - visit https://github.com/vanhauser-thc/thc-hydra - use only allowed for legal purposes "); strcpy(prh->name, "localhost"); ptr = prh->id; diff --git a/hydra.c b/hydra.c index 6746d68..53e1ff7 100644 --- a/hydra.c +++ b/hydra.c @@ -1,6 +1,6 @@ /* * hydra (c) 2001-2018 by van Hauser / THC - * http://www.thc.org + * https://github.com/vanhauser-thc/thc-hydra * * Parallized network login hacker. * Don't use in military or secret service organizations, or for illegal purposes. @@ -207,7 +207,7 @@ char *SERVICES = #define VERSION "v8.7-dev" #define AUTHOR "van Hauser/THC" #define EMAIL "" -#define RESOURCE "http://www.thc.org/thc-hydra" +#define RESOURCE "https://github.com/vanhauser-thc/thc-hydra" extern char *hydra_strcasestr(const char *haystack, const char *needle); extern void hydra_tobase64(unsigned char *buf, int32_t buflen, int32_t bufsize); diff --git a/pw-inspector.c b/pw-inspector.c index 9b5a2f9..86eb352 100644 --- a/pw-inspector.c +++ b/pw-inspector.c @@ -8,7 +8,7 @@ #define PROGRAM "PW-Inspector" #define VERSION "v0.2" #define EMAIL "vh@thc.org" -#define WEB "http://www.thc.org" +#define WEB "https://github.com/vanhauser-thc/thc-hydra" #define MAXLENGTH 256 diff --git a/web/CHANGES b/web/CHANGES index 3ae374b..8a1786a 100644 --- a/web/CHANGES +++ b/web/CHANGES @@ -1,7 +1,22 @@ Changelog for hydra ------------------- -Release 8.6-dev + +Release 8.7-dev +* New web page: https://github.com/vanhauser-thc/thc-hydra +* http-get/http-post: + - now supports H=/h= parameters same as http-form (thanks to mathewmarcus@github for the patch) + - 403/404 errors are now always registered as failed attempts +* mysql module: a non-default port was not working, fixed +* added -w timeout support to ssh module +* fixed various memory leaks in http-form module +* corrected hydra return code to be 0 on success +* added patch from debian maintainers which fixes spellings +* fixed weird crash on x64 systems +* many warning fixes by crondaemon + + +Release 8.6 * added radmin2 module by catatonic prime - great work! * smb module now checks if SMBv1 is supported by the server and if signing is required * http-form module now supports URLs up to 6000 bytes (thanks to petrock6@github for the patch) diff --git a/web/README b/web/README index 072175a..b76c4c4 100644 --- a/web/README +++ b/web/README @@ -1,8 +1,8 @@ H Y D R A - (c) 2001-2017 by van Hauser / THC - http://www.thc.org + (c) 2001-2018 by van Hauser / THC + https://github.com/vanhauser-thc/thc-hydra many modules were written by David (dot) Maciejak @ gmail (dot) com BFG code by Jan Dlabal @@ -49,7 +49,7 @@ Your help in writing, enhancing or fixing modules is highly appreciated!! :-) WHERE TO GET ------------ You can always find the newest release/production version of hydra at its -project page at https://www.thc.org/thc-hydra +project page at https://github.com/vanhauser-thc/thc-hydra/releases If you are interested in the current development state, the public development repository is at Github: svn co https://github.com/vanhauser-thc/thc-hydra @@ -64,19 +64,25 @@ HOW TO COMPILE -------------- To configure, compile and install hydra, just type: +``` ./configure make make install +``` If you want the ssh module, you have to setup libssh (not libssh2!) on your system, get it from http://www.libssh.org, for ssh v1 support you also need to add "-DWITH_SSH1=On" option in the cmake command line. If you use Ubuntu/Debian, this will install supplementary libraries needed -for a few optional modules: - apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev \ +for a few optional modules (note that some might not be available on your distribution): + +``` +apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev \ libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev \ - firebird2.1-dev libncp-dev + firebird-dev libncp-dev +``` + This enables all optional modules and features with the exception of Oracle, SAP R/3 and the apple filing protocol - which you will need to download and install from the vendor's web sites. @@ -90,31 +96,34 @@ and compile them manually. SUPPORTED PLATFORMS ------------------- -All UNIX platforms (linux, *bsd, solaris, etc.) -MacOS -Windows with Cygwin (both IPv4 and IPv6) -Mobile systems based on Linux, MacOS or QNX (e.g. Android, iPhone, Blackberry 10, Zaurus, iPaq) +- All UNIX platforms (Linux, *bsd, Solaris, etc.) +- MacOS (basically a BSD clone) +- Windows with Cygwin (both IPv4 and IPv6) +- Mobile systems based on Linux, MacOS or QNX (e.g. Android, iPhone, Blackberry 10, Zaurus, iPaq) HOW TO USE ---------- -If you just enter "hydra", you will see a short summary of the important +If you just enter `hydra`, you will see a short summary of the important options available. -Type "./hydra -h" to see all available command line options. +Type `./hydra -h` to see all available command line options. Note that NO login/password file is included. Generate them yourself. A default password list is however present, use "dpl4hydra.sh" to generate a list. -For Linux users, a GTK gui is available, try "./xhydra" +For Linux users, a GTK gui is available, try `./xhydra` For the command line usage, the syntax is as follows: For attacking one target or a network, you can use the new "://" style: - hydra [some command line options] PROTOCOL://TARGET:PORT/OPTIONS + hydra [some command line options] PROTOCOL://TARGET:PORT/MODULE-OPTIONS The old mode can be used for these too, and additionally if you want to specify your targets from a text file, you *must* use this one: - hydra [some command line options] [-s port] TARGET PROTOCOL OPTIONS + +``` +hydra [some command line options] [-s PORT] TARGET PROTOCOL [MODULE-OPTIONS] +``` Via the command line options you specify which logins to try, which passwords, if SSL should be used, how many parallel tasks to use for attacking, etc. @@ -122,7 +131,7 @@ if SSL should be used, how many parallel tasks to use for attacking, etc. PROTOCOL is the protocol you want to use for attacking, e.g. ftp, smtp, http-get or many others are available TARGET is the target you want to attack -OPTIONS are optional values which are special per PROTOCOL module +MODULE-OPTIONS are optional values which are special per PROTOCOL module FIRST - select your target you have three options on how to specify the target you want to attack: @@ -147,7 +156,7 @@ FOURTH - the destination port If you use "://" notation, you must use "[" "]" brackets if you want to supply IPv6 addresses or CIDR ("192.168.0.0/24") notations to attack: hydra [some command line options] ftp://[192.168.0.0/24]/ - hydra [some command line options] -6 smtp://[2001:db8::1]/NTLM + hydra [some command line options] -6 smtps://[2001:db8::1]/NTLM Note that everything hydra does is IPv4 only! If you want to attack IPv6 addresses, you must add the "-6" command line option. @@ -158,22 +167,27 @@ notation but use the old style and just supply the protocol (and module options) hydra [some command line options] -M targets.txt ftp You can supply also port for each target entry by adding ":" after a target entry in the file, e.g.: - foo.bar.com - target.com:21 - unusual.port.com:2121 - default.used.here.com - 127.0.0.1 - 127.0.0.1:2121 + +``` +foo.bar.com +target.com:21 +unusual.port.com:2121 +default.used.here.com +127.0.0.1 +127.0.0.1:2121 +``` Note that if you want to attach IPv6 targets, you must supply the -6 option and *must* put IPv6 addresses in brackets in the file(!) like this: - foo.bar.com - target.com:21 - [fe80::1%eth0] - [2001::1] - [2002::2]:8080 - [2a01:24a:133:0:00:123:ff:1a] +``` +foo.bar.com +target.com:21 +[fe80::1%eth0] +[2001::1] +[2002::2]:8080 +[2a01:24a:133:0:00:123:ff:1a] +``` LOGINS AND PASSWORDS -------------------- @@ -182,45 +196,68 @@ With -l for login and -p for password you tell hydra that this is the only login and/or password to try. With -L for logins and -P for passwords you supply text files with entries. e.g.: - hydra -l admin -p password ftp://localhost/ - hydra -L default_logins.txt -p test ftp://localhost/ - hydra -l admin -P common_passwords.txt ftp://localhost/ - hydra -L logins.txt -P passwords.txt ftp://localhost/ + +``` +hydra -l admin -p password ftp://localhost/ +hydra -L default_logins.txt -p test ftp://localhost/ +hydra -l admin -P common_passwords.txt ftp://localhost/ +hydra -L logins.txt -P passwords.txt ftp://localhost/ +``` + Additionally, you can try passwords based on the login via the "-e" option. The "-e" option has three parameters: - s - try the login as password - n - try an empty password - r - reverse the login and try it as password + +``` +s - try the login as password +n - try an empty password +r - reverse the login and try it as password +``` + If you want to, e.g. try "try login as password and "empty password", you specify "-e sn" on the command line. - But there are two more modes for trying passwords than -p/-P: You can use text file which where a login and password pair is separated by a colon, e.g.: - admin:password - test:test - foo:bar + +``` +admin:password +test:test +foo:bar +``` + This is a common default account style listing, that is also generated by the dpl4hydra.sh default account file generator supplied with hydra. You use such a text file with the -C option - note that in this mode you can not use -l/-L/-p/-P options (-e nsr however you can). Example: - hydra -C default_accounts.txt ftp://localhost/ + +``` +hydra -C default_accounts.txt ftp://localhost/ +``` And finally, there is a bruteforce mode with the -x option (which you can not use with -p/-P/-C): - -x minimum_length:maximum_length:charset -the charset definition is 'a' for lowercase letters, 'A' for uppercase letters, -'1' for numbers and for anything else you supply it is their real representation. + +``` +-x minimum_length:maximum_length:charset +``` + +the charset definition is `a` for lowercase letters, `A` for uppercase letters, +`1` for numbers and for anything else you supply it is their real representation. Examples: - -x 1:3:a generate passwords from length 1 to 3 with all lowercase letters - -x 2:5:/ generate passwords from length 2 to 5 containing only slashes - -x 5:8:A1 generate passwords from length 5 to 8 with uppercase and numbers + +``` +-x 1:3:a generate passwords from length 1 to 3 with all lowercase letters +-x 2:5:/ generate passwords from length 2 to 5 containing only slashes +-x 5:8:A1 generate passwords from length 5 to 8 with uppercase and numbers +``` + Example: - hydra -l ftp -x 3:3:a ftp://localhost/ - +``` +hydra -l ftp -x 3:3:a ftp://localhost/ +``` SPECIAL OPTIONS FOR MODULES --------------------------- @@ -229,19 +266,23 @@ command line option, you can pass one option to a module. Many modules use this, a few require it! To see the special option of a module, type: + hydra -U + e.g. + ./hydra -U http-post-form The special options can be passed via the -m parameter, as 3rd command line option or in the service://target/option format. Examples (they are all equal): - ./hydra -l test -p test -m PLAIN 127.0.0.1 imap - ./hydra -l test -p test 127.0.0.1 imap PLAIN - ./hydra -l test -p test imap://127.0.0.1/PLAIN - +``` +./hydra -l test -p test -m PLAIN 127.0.0.1 imap +./hydra -l test -p test 127.0.0.1 imap PLAIN +./hydra -l test -p test imap://127.0.0.1/PLAIN +``` RESTORING AN ABORTED/CRASHED SESSION ------------------------------------ @@ -251,28 +292,35 @@ restore the session. This session file is written every 5 minutes. NOTE: the hydra.restore file can NOT be copied to a different platform (e.g. from little endian to big endian, or from solaris to aix) - - HOW TO SCAN/CRACK OVER A PROXY ------------------------------ The environment variable HYDRA_PROXY_HTTP defines the web proxy (this works just for the http services!). The following syntax is valid: - HYDRA_PROXY_HTTP="http://123.45.67.89:8080/" - HYDRA_PROXY_HTTP="http://login:password@123.45.67.89:8080/" - HYDRA_PROXY_HTTP="proxylist.txt" + +``` +HYDRA_PROXY_HTTP="http://123.45.67.89:8080/" +HYDRA_PROXY_HTTP="http://login:password@123.45.67.89:8080/" +HYDRA_PROXY_HTTP="proxylist.txt" +``` + The last example is a text file containing up to 64 proxies (in the same format definition as the other examples). For all other services, use the HYDRA_PROXY variable to scan/crack. It uses the same syntax. eg: - HYDRA_PROXY=[connect|socks4|socks5]://[login:password@]proxy_addr:proxy_port + +``` +HYDRA_PROXY=[connect|socks4|socks5]://[login:password@]proxy_addr:proxy_port +``` + for example: - HYDRA_PROXY=connect://proxy.anonymizer.com:8000 - HYDRA_PROXY=socks4://auth:pw@127.0.0.1:1080 - HYDRA_PROXY=socksproxylist.txt - +``` +HYDRA_PROXY=connect://proxy.anonymizer.com:8000 +HYDRA_PROXY=socks4://auth:pw@127.0.0.1:1080 +HYDRA_PROXY=socksproxylist.txt +``` ADDITIONAL HINTS ---------------- @@ -293,6 +341,7 @@ RESULTS OUTPUT The results are output to stdio along with the other information. Via the -o command line option, the results can also be written to a file. Using -b, the format of the output can be specified. Currently, these are supported: + * `text` - plain text format * `jsonv1` - JSON data using version 1.x of the schema (defined below). * `json` - JSON data using the latest version of the schema, currently there @@ -302,7 +351,8 @@ If using JSON output, the results file may not be valid JSON if there are serious errors in booting Hydra. -### JSON Schema +JSON Schema +----------- Here is an example of the JSON output. Notes on some of the fields: * `errormessages` - an array of zero or more strings that are normally printed @@ -327,7 +377,7 @@ Version 1.00 example: "These are very free form" ], "generator": { - "built": "2017-03-01 14:44:22", + "built": "2018-01-01 14:44:22", "commandline": "hydra -b jsonv1 -o results.json ... ...", "jsonoutputversion": "1.00", "server": "127.0.0.1", @@ -373,6 +423,7 @@ Run against a SuSE Linux 7.2 on localhost with a "-C FILE" containing 295 entries (294 tries invalid logins, 1 valid). Every test was run three times (only for "1 task" just once), and the average noted down. +``` P A R A L L E L T A S K S SERVICE 1 4 8 16 32 50 64 100 128 ------- -------------------------------------------------------------------- @@ -380,6 +431,7 @@ telnet 23:20 5:58 2:58 1:34 1:05 0:33 0:45* 0:25* 0:55* ftp 45:54 11:51 5:54 3:06 1:25 0:58 0:46 0:29 0:32 pop3 92:10 27:16 13:56 6:42 2:55 1:57 1:24 1:14 0:50 imap 31:05 7:41 3:51 1:58 1:01 0:39 0:32 0:25 0:21 +``` (*) Note: telnet timings can be VERY different for 64 to 128 tasks! e.g. with @@ -387,10 +439,12 @@ Note: telnet timings can be VERY different for 64 to 128 tasks! e.g. with The reason for this is unknown... guesses per task (rounded up): - 295 74 38 19 10 6 5 3 3 + + 295 74 38 19 10 6 5 3 3 guesses possible per connect (depends on the server software and config): - telnet 4 + + telnet 4 ftp 6 pop3 1 imap 3 @@ -406,6 +460,7 @@ vh@thc.org (and put "antispam" in the subject line) You should use PGP to encrypt emails to vh@thc.org : +``` -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v3.3.3 (vh@thc.org) @@ -471,3 +526,4 @@ zlGuZP1S6Y7S13ytiULSzTfUxJmyGYgNo+4ygh0i6Dudf9NLmV+i9aEIbLbd6bni zB3yrr+vYBT0uDWmxwPjiJs= =ytEf -----END PGP PUBLIC KEY BLOCK----- +``` \ No newline at end of file From a1de59e46528b649d37f7f8610716086a56b59ce Mon Sep 17 00:00:00 2001 From: van Hauser Date: Sat, 18 Aug 2018 15:38:46 +0200 Subject: [PATCH 138/531] added web page --- hydra.1 | 1 + 1 file changed, 1 insertion(+) diff --git a/hydra.1 b/hydra.1 index e627042..df0948a 100644 --- a/hydra.1 +++ b/hydra.1 @@ -140,6 +140,7 @@ Show summary of options. The programs are documented fully by van Hauser .SH AUTHOR hydra was written by van Hauser / THC +Find new versions or report bugs at https://github.com/vanhauser-thc/thc-hydra .PP This manual page was written by Daniel Echeverry , for the Debian project (and may be used by others). From 9ea71a55eba66c19a8bd4cafaba1f5bdabd46233 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Wed, 3 Oct 2018 17:39:12 +0200 Subject: [PATCH 139/531] debugging ssh --- hydra-ssh.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-ssh.c b/hydra-ssh.c index 3808a35..4e9dc7a 100644 --- a/hydra-ssh.c +++ b/hydra-ssh.c @@ -206,7 +206,7 @@ int32_t service_ssh_init(char *ip, int32_t sp, unsigned char options, char *misc return 0; } - fprintf(stderr, "[ERROR] target ssh://%s:%d/ does not support password authentication.\n", hydra_address2string_beautiful(ip), port); + fprintf(stderr, "[ERROR] target ssh://%s:%d/ does not support password authentication (method reply %d).\n", hydra_address2string_beautiful(ip), port, method); return 1; #else return 0; From 2043a941ebe86cb42d1c599e531d6ab1c818ca1e Mon Sep 17 00:00:00 2001 From: van Hauser Date: Sat, 6 Oct 2018 18:33:13 +0200 Subject: [PATCH 140/531] force stdint.h --- hydra-sip.c | 1 + 1 file changed, 1 insertion(+) diff --git a/hydra-sip.c b/hydra-sip.c index 7d681e8..22de26c 100644 --- a/hydra-sip.c +++ b/hydra-sip.c @@ -15,6 +15,7 @@ void dummy_sip() { } #else +#include #include "sasl.h" extern int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec); From ff4deb768e48e977c582dccebfe3a0b248c5f871 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 11 Oct 2018 19:30:55 +0200 Subject: [PATCH 141/531] fix no target crash --- hydra.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/hydra.c b/hydra.c index 53e1ff7..6a0413d 100644 --- a/hydra.c +++ b/hydra.c @@ -3290,6 +3290,9 @@ int main(int argc, char *argv[]) { tmpptr++; tmpptr++; } + } else if (hydra_options.server == NULL) { + fprintf(stderr, "Error: no target server given, nor -M option used\n"); + exit(-1); } else if (index(hydra_options.server, '/') != NULL) { if (cmdtarget == NULL) bail("You seem to mix up \"service://target:port/options\" syntax with \"target service options\" syntax. Read the README on how to use hydra correctly!"); From a2de33fd2bcd50fa876dcfd121740074fb1064d0 Mon Sep 17 00:00:00 2001 From: Dave Eargle Date: Fri, 26 Oct 2018 02:09:00 -0600 Subject: [PATCH 142/531] make thread-safe against old ssl versions --- hydra-ssh.c | 1 + 1 file changed, 1 insertion(+) diff --git a/hydra-ssh.c b/hydra-ssh.c index 4e9dc7a..2f1d2d5 100644 --- a/hydra-ssh.c +++ b/hydra-ssh.c @@ -40,6 +40,7 @@ int32_t start_ssh(int32_t s, char *ip, int32_t port, unsigned char options, char ssh_free(session); } + ssh_init(); session = ssh_new(); ssh_options_set(session, SSH_OPTIONS_PORT, &port); ssh_options_set(session, SSH_OPTIONS_HOST, hydra_address2string(ip)); From f6bd9d641079a11f431db2e50f72619da6509ce8 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Sun, 28 Oct 2018 07:46:59 +0100 Subject: [PATCH 143/531] fixed some typos --- README | 16 ++++++++-------- README.md | 16 ++++++++-------- 2 files changed, 16 insertions(+), 16 deletions(-) diff --git a/README b/README index c089c2e..bcb1e05 100644 --- a/README +++ b/README @@ -23,7 +23,7 @@ access from remote to a system. THIS TOOL IS FOR LEGAL PURPOSES ONLY! -There are already several login hacker tools available, however none does +There are already several login hacker tools available, however, none does either support more than one protocol to attack or support parallized connects. @@ -88,15 +88,15 @@ SAP R/3 and the apple filing protocol - which you will need to download and install from the vendor's web sites. For all other Linux derivates and BSD based systems, use the system -software installer and look for similar named libraries like in the -command above. In all other cases you have to download all source libraries +software installer and look for similarly named libraries like in the +command above. In all other cases, you have to download all source libraries and compile them manually. SUPPORTED PLATFORMS ------------------- -- All UNIX platforms (Linux, *bsd, Solaris, etc.) +- All UNIX platforms (Linux, *BSD, Solaris, etc.) - MacOS (basically a BSD clone) - Windows with Cygwin (both IPv4 and IPv6) - Mobile systems based on Linux, MacOS or QNX (e.g. Android, iPhone, Blackberry 10, Zaurus, iPaq) @@ -113,7 +113,7 @@ Note that NO login/password file is included. Generate them yourself. A default password list is however present, use "dpl4hydra.sh" to generate a list. -For Linux users, a GTK gui is available, try `./xhydra` +For Linux users, a GTK GUI is available, try `./xhydra` For the command line usage, the syntax is as follows: For attacking one target or a network, you can use the new "://" style: @@ -165,7 +165,7 @@ All attacks are then IPv6 only! If you want to supply your targets via a text file, you can not use the :// notation but use the old style and just supply the protocol (and module options): hydra [some command line options] -M targets.txt ftp -You can supply also port for each target entry by adding ":" after a +You can supply also the port for each target entry by adding ":" after a target entry in the file, e.g.: ``` @@ -290,7 +290,7 @@ When hydra is aborted with Control-C, killed or crashes, it leaves a "hydra.restore" file behind which contains all necessary information to restore the session. This session file is written every 5 minutes. NOTE: the hydra.restore file can NOT be copied to a different platform (e.g. -from little endian to big endian, or from solaris to aix) +from little endian to big endian, or from Solaris to AIX) HOW TO SCAN/CRACK OVER A PROXY ------------------------------ @@ -329,7 +329,7 @@ ADDITIONAL HINTS * uniq your dictionary files! this can save you a lot of time :-) cat words.txt | sort | uniq > dictionary.txt * if you know that the target is using a password policy (allowing users - only to choose password with a minimum length of 6, containing a least one + only to choose a password with a minimum length of 6, containing a least one letter and one number, etc. use the tool pw-inspector which comes along with the hydra package to reduce the password list: cat dictionary.txt | pw-inspector -m 6 -c 2 -n > passlist.txt diff --git a/README.md b/README.md index c089c2e..bcb1e05 100644 --- a/README.md +++ b/README.md @@ -23,7 +23,7 @@ access from remote to a system. THIS TOOL IS FOR LEGAL PURPOSES ONLY! -There are already several login hacker tools available, however none does +There are already several login hacker tools available, however, none does either support more than one protocol to attack or support parallized connects. @@ -88,15 +88,15 @@ SAP R/3 and the apple filing protocol - which you will need to download and install from the vendor's web sites. For all other Linux derivates and BSD based systems, use the system -software installer and look for similar named libraries like in the -command above. In all other cases you have to download all source libraries +software installer and look for similarly named libraries like in the +command above. In all other cases, you have to download all source libraries and compile them manually. SUPPORTED PLATFORMS ------------------- -- All UNIX platforms (Linux, *bsd, Solaris, etc.) +- All UNIX platforms (Linux, *BSD, Solaris, etc.) - MacOS (basically a BSD clone) - Windows with Cygwin (both IPv4 and IPv6) - Mobile systems based on Linux, MacOS or QNX (e.g. Android, iPhone, Blackberry 10, Zaurus, iPaq) @@ -113,7 +113,7 @@ Note that NO login/password file is included. Generate them yourself. A default password list is however present, use "dpl4hydra.sh" to generate a list. -For Linux users, a GTK gui is available, try `./xhydra` +For Linux users, a GTK GUI is available, try `./xhydra` For the command line usage, the syntax is as follows: For attacking one target or a network, you can use the new "://" style: @@ -165,7 +165,7 @@ All attacks are then IPv6 only! If you want to supply your targets via a text file, you can not use the :// notation but use the old style and just supply the protocol (and module options): hydra [some command line options] -M targets.txt ftp -You can supply also port for each target entry by adding ":" after a +You can supply also the port for each target entry by adding ":" after a target entry in the file, e.g.: ``` @@ -290,7 +290,7 @@ When hydra is aborted with Control-C, killed or crashes, it leaves a "hydra.restore" file behind which contains all necessary information to restore the session. This session file is written every 5 minutes. NOTE: the hydra.restore file can NOT be copied to a different platform (e.g. -from little endian to big endian, or from solaris to aix) +from little endian to big endian, or from Solaris to AIX) HOW TO SCAN/CRACK OVER A PROXY ------------------------------ @@ -329,7 +329,7 @@ ADDITIONAL HINTS * uniq your dictionary files! this can save you a lot of time :-) cat words.txt | sort | uniq > dictionary.txt * if you know that the target is using a password policy (allowing users - only to choose password with a minimum length of 6, containing a least one + only to choose a password with a minimum length of 6, containing a least one letter and one number, etc. use the tool pw-inspector which comes along with the hydra package to reduce the password list: cat dictionary.txt | pw-inspector -m 6 -c 2 -n > passlist.txt From 1f599bb71069cb359748685860e322f6a6be077e Mon Sep 17 00:00:00 2001 From: plonibarploni <44826203+plonibarploni@users.noreply.github.com> Date: Sun, 11 Nov 2018 14:45:27 -0500 Subject: [PATCH 144/531] remove obsolete dependencies this closes #373. --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index bcb1e05..5ca9bd1 100644 --- a/README.md +++ b/README.md @@ -80,7 +80,7 @@ for a few optional modules (note that some might not be available on your distri ``` apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev \ libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev \ - firebird-dev libncp-dev + firebird-dev ``` This enables all optional modules and features with the exception of Oracle, @@ -526,4 +526,4 @@ zlGuZP1S6Y7S13ytiULSzTfUxJmyGYgNo+4ygh0i6Dudf9NLmV+i9aEIbLbd6bni zB3yrr+vYBT0uDWmxwPjiJs= =ytEf -----END PGP PUBLIC KEY BLOCK----- -``` \ No newline at end of file +``` From 9ad5738bdbd4927f5b6044204b6eae12fa86eae6 Mon Sep 17 00:00:00 2001 From: plonibarploni <44826203+plonibarploni@users.noreply.github.com> Date: Sun, 11 Nov 2018 14:48:27 -0500 Subject: [PATCH 145/531] remove obsolete dependency --- README | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README b/README index bcb1e05..5ca9bd1 100644 --- a/README +++ b/README @@ -80,7 +80,7 @@ for a few optional modules (note that some might not be available on your distri ``` apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev \ libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev \ - firebird-dev libncp-dev + firebird-dev ``` This enables all optional modules and features with the exception of Oracle, @@ -526,4 +526,4 @@ zlGuZP1S6Y7S13ytiULSzTfUxJmyGYgNo+4ygh0i6Dudf9NLmV+i9aEIbLbd6bni zB3yrr+vYBT0uDWmxwPjiJs= =ytEf -----END PGP PUBLIC KEY BLOCK----- -``` \ No newline at end of file +``` From c56d87d4da55409d60f05e6a0cf802b19ab23e17 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 15 Nov 2018 08:25:38 +0100 Subject: [PATCH 146/531] added MacOS compile hints --- README | 3 ++- README.md | 3 ++- 2 files changed, 4 insertions(+), 2 deletions(-) diff --git a/README b/README index 5ca9bd1..ddd02cf 100644 --- a/README +++ b/README @@ -73,6 +73,7 @@ make install If you want the ssh module, you have to setup libssh (not libssh2!) on your system, get it from http://www.libssh.org, for ssh v1 support you also need to add "-DWITH_SSH1=On" option in the cmake command line. +IMPORTANT: If you compile on MacOS then you must do this - do not install libssh via brew! If you use Ubuntu/Debian, this will install supplementary libraries needed for a few optional modules (note that some might not be available on your distribution): @@ -84,7 +85,7 @@ apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev \ ``` This enables all optional modules and features with the exception of Oracle, -SAP R/3 and the apple filing protocol - which you will need to download and +SAP R/3, NCP and the apple filing protocol - which you will need to download and install from the vendor's web sites. For all other Linux derivates and BSD based systems, use the system diff --git a/README.md b/README.md index 5ca9bd1..ddd02cf 100644 --- a/README.md +++ b/README.md @@ -73,6 +73,7 @@ make install If you want the ssh module, you have to setup libssh (not libssh2!) on your system, get it from http://www.libssh.org, for ssh v1 support you also need to add "-DWITH_SSH1=On" option in the cmake command line. +IMPORTANT: If you compile on MacOS then you must do this - do not install libssh via brew! If you use Ubuntu/Debian, this will install supplementary libraries needed for a few optional modules (note that some might not be available on your distribution): @@ -84,7 +85,7 @@ apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev \ ``` This enables all optional modules and features with the exception of Oracle, -SAP R/3 and the apple filing protocol - which you will need to download and +SAP R/3, NCP and the apple filing protocol - which you will need to download and install from the vendor's web sites. For all other Linux derivates and BSD based systems, use the system From b32f0c063340df32f542a4d5fb762855dde0bc8e Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 15 Nov 2018 08:27:07 +0100 Subject: [PATCH 147/531] enabled child crash reporting --- hydra.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/hydra.c b/hydra.c index 6a0413d..aff1736 100644 --- a/hydra.c +++ b/hydra.c @@ -955,8 +955,8 @@ void killed_childs(int32_t signo) { } void killed_childs_report(int32_t signo) { - if (debug) - printf("[DEBUG] children crashed! (%d)\n", child_head_no); + //if (debug) + printf("[ERROR] children crashed! (%d)\n", child_head_no); fck = write(child_socket, "E", 1); _exit(-1); } From fc9350cfdfc81a935ac93e0372ea679f4a57ab14 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Tue, 11 Dec 2018 19:01:48 +0100 Subject: [PATCH 148/531] ldap fix --- CHANGES | 1 + hydra-ldap.c | 2 +- 2 files changed, 2 insertions(+), 1 deletion(-) diff --git a/CHANGES b/CHANGES index 8a1786a..2a95b7f 100644 --- a/CHANGES +++ b/CHANGES @@ -4,6 +4,7 @@ Changelog for hydra Release 8.7-dev * New web page: https://github.com/vanhauser-thc/thc-hydra +* ldap: fixed a dumb strlen on a potential null pointer * http-get/http-post: - now supports H=/h= parameters same as http-form (thanks to mathewmarcus@github for the patch) - 403/404 errors are now always registered as failed attempts diff --git a/hydra-ldap.c b/hydra-ldap.c index ff90d2e..e00265e 100644 --- a/hydra-ldap.c +++ b/hydra-ldap.c @@ -451,7 +451,7 @@ int32_t service_ldap_init(char *ip, int32_t sp, unsigned char options, char *mis // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here - if (strlen(miscptr) > 220) { + if (miscptr != NULL && strlen(miscptr) > 220) { fprintf(stderr, "[ERROR] the option string to this module may not be larger than 220 bytes\n"); return -1; } From d76bfe440b610b4f9def203a5e527713b8edad1f Mon Sep 17 00:00:00 2001 From: van Hauser Date: Mon, 24 Dec 2018 13:12:12 +0100 Subject: [PATCH 149/531] add ldap alias --- hydra.c | 1 + 1 file changed, 1 insertion(+) diff --git a/hydra.c b/hydra.c index aff1736..f7e690a 100644 --- a/hydra.c +++ b/hydra.c @@ -376,6 +376,7 @@ static const struct { SERVICE(icq), SERVICE3("imap", imap), SERVICE3("irc", irc), + { "ldap", service_ldap_init, service_ldap2, usage_ldap }, { "ldap2", service_ldap_init, service_ldap2, usage_ldap }, { "ldap3", service_ldap_init, service_ldap3, usage_ldap }, { "ldap3-crammd5", service_ldap_init, service_ldap3_cram_md5, usage_ldap }, From 6509f2d172b07bb0fe34bf8b7536f2a039abd9fb Mon Sep 17 00:00:00 2001 From: van Hauser Date: Mon, 24 Dec 2018 13:17:21 +0100 Subject: [PATCH 150/531] rdp disabled --- hydra.c | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/hydra.c b/hydra.c index f7e690a..da5da27 100644 --- a/hydra.c +++ b/hydra.c @@ -3017,16 +3017,17 @@ int main(int argc, char *argv[]) { if (strcmp(hydra_options.service, "irc") == 0) i = 1; if (strcmp(hydra_options.service, "rdp") == 0) { - if (hydra_options.tasks > 4) - fprintf(stderr, - "[WARNING] rdp servers often don't like many connections, use -t 1 or -t 4 to reduce the number of parallel connections and -W 1 or -W 3 to wait between connection to allow the server to recover\n"); + //if (hydra_options.tasks > 4) + // fprintf(stderr, "[WARNING] rdp servers often don't like many connections, use -t 1 or -t 4 to reduce the number of parallel connections and -W 1 or -W 3 to wait between connection to allow the server to recover\n"); //if (hydra_options.tasks > 4) { // fprintf(stderr, "[INFO] Reduced number of tasks to 4 (rdp does not like many parallel connections)\n"); // hydra_options.tasks = 4; //} //if (conwait == 0) // hydra_options.conwait = conwait = 1; - printf("[WARNING] the rdp module is currently reported to be unreliable, most likely against new Windows version. Please test, report - and if possible, fix.\n"); + //printf("[WARNING] the rdp module is currently reported to be unreliable, most likely against new Windows version. Please test, report - and if possible, fix.\n"); + printf("[ERROR] the rdp module does not support the current protocol, hence it is disabled. If you want to add it, please contact vh@thc.org\n"); + exit(-1); i = 1; } if (strcmp(hydra_options.service, "radmin2") == 0) { From bf8444ae39ffba629fc5faafe6d3770c44b12a77 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Mon, 24 Dec 2018 13:18:17 +0100 Subject: [PATCH 151/531] rdp disabled --- CHANGES | 1 + 1 file changed, 1 insertion(+) diff --git a/CHANGES b/CHANGES index 2a95b7f..5b69ff2 100644 --- a/CHANGES +++ b/CHANGES @@ -4,6 +4,7 @@ Changelog for hydra Release 8.7-dev * New web page: https://github.com/vanhauser-thc/thc-hydra +* rdp: disabled the module as it does not support the current protocol. If you want to add it contact me * ldap: fixed a dumb strlen on a potential null pointer * http-get/http-post: - now supports H=/h= parameters same as http-form (thanks to mathewmarcus@github for the patch) From 6f2d9d674497417a07e7a3af0f7d677802e9ae80 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Mon, 24 Dec 2018 13:37:39 +0100 Subject: [PATCH 152/531] add PROBLEMS file --- CHANGES | 1 + 1 file changed, 1 insertion(+) diff --git a/CHANGES b/CHANGES index 5b69ff2..8100351 100644 --- a/CHANGES +++ b/CHANGES @@ -4,6 +4,7 @@ Changelog for hydra Release 8.7-dev * New web page: https://github.com/vanhauser-thc/thc-hydra +* added PROBLEMS file with known issues * rdp: disabled the module as it does not support the current protocol. If you want to add it contact me * ldap: fixed a dumb strlen on a potential null pointer * http-get/http-post: From aee8fdee3ff54d76fe63c4ac703993ffed66c3b0 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Mon, 24 Dec 2018 17:27:11 +0100 Subject: [PATCH 153/531] PROBLEMS file added --- PROBLEMS | 7 +++++++ 1 file changed, 7 insertions(+) create mode 100644 PROBLEMS diff --git a/PROBLEMS b/PROBLEMS new file mode 100644 index 0000000..74dafd2 --- /dev/null +++ b/PROBLEMS @@ -0,0 +1,7 @@ +List of known issues: +===================== + +* Cygwin: more than 30 tasks (-t 31 or more) will lead to a stack smash +* OS X: brew installed modules are not compiled correctly and will crash hydra +* RDP module: disabled as it does not support the current protocol. Help needed! + From 3f56e5185a6563e99232910459a9d21bce458c62 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Wed, 2 Jan 2019 13:38:23 +0100 Subject: [PATCH 154/531] v8.8 release --- CHANGES | 2 +- Makefile.am | 2 +- README | 4 ++-- README.md | 4 ++-- hydra.1 | 2 +- hydra.c | 6 +++--- web/CHANGES | 5 ++++- web/README | 27 ++++++++++++++------------- 8 files changed, 28 insertions(+), 24 deletions(-) diff --git a/CHANGES b/CHANGES index 8100351..76354e3 100644 --- a/CHANGES +++ b/CHANGES @@ -2,7 +2,7 @@ Changelog for hydra ------------------- -Release 8.7-dev +Release 8.8 * New web page: https://github.com/vanhauser-thc/thc-hydra * added PROBLEMS file with known issues * rdp: disabled the module as it does not support the current protocol. If you want to add it contact me diff --git a/Makefile.am b/Makefile.am index f6b1a37..d65f7d7 100644 --- a/Makefile.am +++ b/Makefile.am @@ -1,5 +1,5 @@ # -# Makefile for Hydra - (c) 2001-2018 by van Hauser / THC +# Makefile for Hydra - (c) 2001-2019 by van Hauser / THC # OPTS=-I. -O3 # -Wall -g -pedantic diff --git a/README b/README index ddd02cf..3847215 100644 --- a/README +++ b/README @@ -1,7 +1,7 @@ H Y D R A - (c) 2001-2018 by van Hauser / THC + (c) 2001-2019 by van Hauser / THC https://github.com/vanhauser-thc/thc-hydra many modules were written by David (dot) Maciejak @ gmail (dot) com BFG code by Jan Dlabal @@ -378,7 +378,7 @@ Version 1.00 example: "These are very free form" ], "generator": { - "built": "2018-03-01 14:44:22", + "built": "2019-03-01 14:44:22", "commandline": "hydra -b jsonv1 -o results.json ... ...", "jsonoutputversion": "1.00", "server": "127.0.0.1", diff --git a/README.md b/README.md index ddd02cf..3847215 100644 --- a/README.md +++ b/README.md @@ -1,7 +1,7 @@ H Y D R A - (c) 2001-2018 by van Hauser / THC + (c) 2001-2019 by van Hauser / THC https://github.com/vanhauser-thc/thc-hydra many modules were written by David (dot) Maciejak @ gmail (dot) com BFG code by Jan Dlabal @@ -378,7 +378,7 @@ Version 1.00 example: "These are very free form" ], "generator": { - "built": "2018-03-01 14:44:22", + "built": "2019-03-01 14:44:22", "commandline": "hydra -b jsonv1 -o results.json ... ...", "jsonoutputversion": "1.00", "server": "127.0.0.1", diff --git a/hydra.1 b/hydra.1 index df0948a..37ddf3e 100644 --- a/hydra.1 +++ b/hydra.1 @@ -1,4 +1,4 @@ -.TH "HYDRA" "1" "01/01/2018" +.TH "HYDRA" "1" "01/01/2019" .SH NAME hydra \- a very fast network logon cracker which support many different services .SH SYNOPSIS diff --git a/hydra.c b/hydra.c index da5da27..64d7da3 100644 --- a/hydra.c +++ b/hydra.c @@ -1,5 +1,5 @@ /* - * hydra (c) 2001-2018 by van Hauser / THC + * hydra (c) 2001-2019 by van Hauser / THC * https://github.com/vanhauser-thc/thc-hydra * * Parallized network login hacker. @@ -204,7 +204,7 @@ char *SERVICES = #define RESTOREFILE "./hydra.restore" #define PROGRAM "Hydra" -#define VERSION "v8.7-dev" +#define VERSION "v8.8" #define AUTHOR "van Hauser/THC" #define EMAIL "" #define RESOURCE "https://github.com/vanhauser-thc/thc-hydra" @@ -2063,7 +2063,7 @@ int main(int argc, char *argv[]) { struct sockaddr_in6 *ipv6 = NULL; struct sockaddr_in *ipv4 = NULL; - printf("%s %s (c) 2018 by %s - Please do not use in military or secret service organizations, or for illegal purposes.\n\n", PROGRAM, VERSION, AUTHOR); + printf("%s %s (c) 2019 by %s - Please do not use in military or secret service organizations, or for illegal purposes.\n\n", PROGRAM, VERSION, AUTHOR); #ifndef LIBAFP SERVICES = hydra_string_replace(SERVICES, "afp ", ""); strcat(unsupported, "afp "); diff --git a/web/CHANGES b/web/CHANGES index 8a1786a..76354e3 100644 --- a/web/CHANGES +++ b/web/CHANGES @@ -2,8 +2,11 @@ Changelog for hydra ------------------- -Release 8.7-dev +Release 8.8 * New web page: https://github.com/vanhauser-thc/thc-hydra +* added PROBLEMS file with known issues +* rdp: disabled the module as it does not support the current protocol. If you want to add it contact me +* ldap: fixed a dumb strlen on a potential null pointer * http-get/http-post: - now supports H=/h= parameters same as http-form (thanks to mathewmarcus@github for the patch) - 403/404 errors are now always registered as failed attempts diff --git a/web/README b/web/README index b76c4c4..3847215 100644 --- a/web/README +++ b/web/README @@ -1,7 +1,7 @@ H Y D R A - (c) 2001-2018 by van Hauser / THC + (c) 2001-2019 by van Hauser / THC https://github.com/vanhauser-thc/thc-hydra many modules were written by David (dot) Maciejak @ gmail (dot) com BFG code by Jan Dlabal @@ -23,7 +23,7 @@ access from remote to a system. THIS TOOL IS FOR LEGAL PURPOSES ONLY! -There are already several login hacker tools available, however none does +There are already several login hacker tools available, however, none does either support more than one protocol to attack or support parallized connects. @@ -73,6 +73,7 @@ make install If you want the ssh module, you have to setup libssh (not libssh2!) on your system, get it from http://www.libssh.org, for ssh v1 support you also need to add "-DWITH_SSH1=On" option in the cmake command line. +IMPORTANT: If you compile on MacOS then you must do this - do not install libssh via brew! If you use Ubuntu/Debian, this will install supplementary libraries needed for a few optional modules (note that some might not be available on your distribution): @@ -80,23 +81,23 @@ for a few optional modules (note that some might not be available on your distri ``` apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev \ libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev \ - firebird-dev libncp-dev + firebird-dev ``` This enables all optional modules and features with the exception of Oracle, -SAP R/3 and the apple filing protocol - which you will need to download and +SAP R/3, NCP and the apple filing protocol - which you will need to download and install from the vendor's web sites. For all other Linux derivates and BSD based systems, use the system -software installer and look for similar named libraries like in the -command above. In all other cases you have to download all source libraries +software installer and look for similarly named libraries like in the +command above. In all other cases, you have to download all source libraries and compile them manually. SUPPORTED PLATFORMS ------------------- -- All UNIX platforms (Linux, *bsd, Solaris, etc.) +- All UNIX platforms (Linux, *BSD, Solaris, etc.) - MacOS (basically a BSD clone) - Windows with Cygwin (both IPv4 and IPv6) - Mobile systems based on Linux, MacOS or QNX (e.g. Android, iPhone, Blackberry 10, Zaurus, iPaq) @@ -113,7 +114,7 @@ Note that NO login/password file is included. Generate them yourself. A default password list is however present, use "dpl4hydra.sh" to generate a list. -For Linux users, a GTK gui is available, try `./xhydra` +For Linux users, a GTK GUI is available, try `./xhydra` For the command line usage, the syntax is as follows: For attacking one target or a network, you can use the new "://" style: @@ -165,7 +166,7 @@ All attacks are then IPv6 only! If you want to supply your targets via a text file, you can not use the :// notation but use the old style and just supply the protocol (and module options): hydra [some command line options] -M targets.txt ftp -You can supply also port for each target entry by adding ":" after a +You can supply also the port for each target entry by adding ":" after a target entry in the file, e.g.: ``` @@ -290,7 +291,7 @@ When hydra is aborted with Control-C, killed or crashes, it leaves a "hydra.restore" file behind which contains all necessary information to restore the session. This session file is written every 5 minutes. NOTE: the hydra.restore file can NOT be copied to a different platform (e.g. -from little endian to big endian, or from solaris to aix) +from little endian to big endian, or from Solaris to AIX) HOW TO SCAN/CRACK OVER A PROXY ------------------------------ @@ -329,7 +330,7 @@ ADDITIONAL HINTS * uniq your dictionary files! this can save you a lot of time :-) cat words.txt | sort | uniq > dictionary.txt * if you know that the target is using a password policy (allowing users - only to choose password with a minimum length of 6, containing a least one + only to choose a password with a minimum length of 6, containing a least one letter and one number, etc. use the tool pw-inspector which comes along with the hydra package to reduce the password list: cat dictionary.txt | pw-inspector -m 6 -c 2 -n > passlist.txt @@ -377,7 +378,7 @@ Version 1.00 example: "These are very free form" ], "generator": { - "built": "2018-01-01 14:44:22", + "built": "2019-03-01 14:44:22", "commandline": "hydra -b jsonv1 -o results.json ... ...", "jsonoutputversion": "1.00", "server": "127.0.0.1", @@ -526,4 +527,4 @@ zlGuZP1S6Y7S13ytiULSzTfUxJmyGYgNo+4ygh0i6Dudf9NLmV+i9aEIbLbd6bni zB3yrr+vYBT0uDWmxwPjiJs= =ytEf -----END PGP PUBLIC KEY BLOCK----- -``` \ No newline at end of file +``` From 7565756c33f47ffb9b53b2cb45e8f540e8174daf Mon Sep 17 00:00:00 2001 From: van Hauser Date: Wed, 2 Jan 2019 13:41:34 +0100 Subject: [PATCH 155/531] v8.9-dev init --- CHANGES | 3 +++ hydra.c | 2 +- 2 files changed, 4 insertions(+), 1 deletion(-) diff --git a/CHANGES b/CHANGES index 76354e3..0344230 100644 --- a/CHANGES +++ b/CHANGES @@ -1,6 +1,9 @@ Changelog for hydra ------------------- +Release 8.9-dev +* your patch? :) + Release 8.8 * New web page: https://github.com/vanhauser-thc/thc-hydra diff --git a/hydra.c b/hydra.c index 64d7da3..0a27cef 100644 --- a/hydra.c +++ b/hydra.c @@ -204,7 +204,7 @@ char *SERVICES = #define RESTOREFILE "./hydra.restore" #define PROGRAM "Hydra" -#define VERSION "v8.8" +#define VERSION "v8.9-dev" #define AUTHOR "van Hauser/THC" #define EMAIL "" #define RESOURCE "https://github.com/vanhauser-thc/thc-hydra" From 238d9d8bb586a80d9f5e8525351bd44d9f880ce7 Mon Sep 17 00:00:00 2001 From: Daniel Echeverry Date: Mon, 7 Jan 2019 18:45:29 -0500 Subject: [PATCH 156/531] Fix spelling error --- hydra-rpcap.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-rpcap.c b/hydra-rpcap.c index 2fa4956..a1cb9d3 100644 --- a/hydra-rpcap.c +++ b/hydra-rpcap.c @@ -153,7 +153,7 @@ int32_t service_rpcap_init(char *ip, int32_t sp, unsigned char options, char *mi buf = hydra_receive_line(sock); - if (strstr(buf, "NULL autentication not permitted") == NULL) { + if (strstr(buf, "NULL authentication not permitted") == NULL) { hydra_report(stderr, "[!] rpcap error or no need of authentication!\n"); free(buf); return 1; From ffb7b5bc8ab4d49280de631980defb6638e4f793 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Wed, 9 Jan 2019 11:10:49 +0100 Subject: [PATCH 157/531] CIDR notation now correctly identifed --- CHANGES | 1 + hydra.c | 10 +++++----- 2 files changed, 6 insertions(+), 5 deletions(-) diff --git a/CHANGES b/CHANGES index 0344230..c9d0618 100644 --- a/CHANGES +++ b/CHANGES @@ -3,6 +3,7 @@ Changelog for hydra Release 8.9-dev * your patch? :) +* CIDR notation (hydra -l test -p test 192.168.0.0/24 ftp) was not detected, fixed Release 8.8 diff --git a/hydra.c b/hydra.c index 0a27cef..0a923b3 100644 --- a/hydra.c +++ b/hydra.c @@ -2046,7 +2046,7 @@ void process_proxy_line(int32_t type, char *string) { } int main(int argc, char *argv[]) { - char *proxy_string = NULL, *device = NULL, *memcheck, *cmdtarget = NULL; + char *proxy_string = NULL, *device = NULL, *memcheck; char *outfile_format_tmp; FILE *lfp = NULL, *pfp = NULL, *cfp = NULL, *ifp = NULL, *rfp = NULL, *proxyfp; size_t countinfile = 1, sizeinfile = 0; @@ -2425,7 +2425,7 @@ int main(int argc, char *argv[]) { // check if targetdef follow syntax ://[:][/] or it's a syntax error char *targetdef = strdup(argv[optind]); char *service_pos, *target_pos, *port_pos = NULL, *param_pos = NULL; - cmdtarget = argv[optind]; + cmdlinetarget = argv[optind]; if ((targetdef != NULL) && (strstr(targetdef, "://") != NULL)) { service_pos = strstr(targetdef, "://"); @@ -2478,7 +2478,7 @@ int main(int argc, char *argv[]) { printf("[DEBUG] opt:%d argc:%d mod:%s tgt:%s port:%u misc:%s\n", optind, argc, hydra_options.service, hydra_options.server, hydra_options.port, hydra_options.miscptr); } else { hydra_options.server = NULL; - hydra_options.service = NULL; + hydra_options.service = NULL; if (modusage) { hydra_options.service = targetdef; @@ -3296,9 +3296,9 @@ int main(int argc, char *argv[]) { fprintf(stderr, "Error: no target server given, nor -M option used\n"); exit(-1); } else if (index(hydra_options.server, '/') != NULL) { - if (cmdtarget == NULL) + if (cmdlinetarget == NULL) bail("You seem to mix up \"service://target:port/options\" syntax with \"target service options\" syntax. Read the README on how to use hydra correctly!"); - if (strstr(cmdtarget, "://") != NULL) { + if (strstr(cmdlinetarget, "://") != NULL) { tmpptr = index(hydra_options.server, '/'); if (tmpptr != NULL) *tmpptr = 0; From f0f546af8aa33e958b64ddc66d6a77962ae32be9 Mon Sep 17 00:00:00 2001 From: ImgBotApp Date: Sun, 17 Feb 2019 02:48:12 +0000 Subject: [PATCH 158/531] [ImgBot] Optimize images *Total -- 614.33kb -> 589.40kb (4.06%) /web/webfiles/img/hydra_pass.jpg -- 34.39kb -> 29.21kb (15.08%) /web/webfiles/img/hydra_target.jpg -- 28.19kb -> 23.97kb (14.95%) /web/webfiles/img/hydra_start.jpg -- 49.21kb -> 43.31kb (11.99%) /xhydra.jpg -- 75.15kb -> 66.52kb (11.48%) /web/webfiles/img/Cross.png -- 0.98kb -> 0.93kb (4.89%) /web/xhydra.png -- 213.21kb -> 212.73kb (0.22%) /web/webfiles/img/xhydra.png -- 213.21kb -> 212.73kb (0.22%) --- web/webfiles/img/Cross.png | Bin 1002 -> 953 bytes web/webfiles/img/hydra_pass.jpg | Bin 35217 -> 29906 bytes web/webfiles/img/hydra_start.jpg | Bin 50388 -> 44345 bytes web/webfiles/img/hydra_target.jpg | Bin 28862 -> 24547 bytes web/webfiles/img/xhydra.png | Bin 218327 -> 217839 bytes web/xhydra.png | Bin 218327 -> 217839 bytes xhydra.jpg | Bin 76954 -> 68119 bytes 7 files changed, 0 insertions(+), 0 deletions(-) diff --git a/web/webfiles/img/Cross.png b/web/webfiles/img/Cross.png index e0061295ce63a09c027203d77493a9cfb464220a..b96b6d27a90130d671fd8c237a5085c421e70db1 100644 GIT binary patch delta 898 zcmaFGzLR}|BnLAC14G8|d-4+%h3gfPJ%W507^>757#dm_7=8hz8eT9klo~KFyh>nT zu$sZZAYL$MSD+0817m!EPlzi}!SNL<_Dq}h^1*|XYuB!=t6Ohm^dcmrNkiks-Mh_N zT8p%_Hnp|wpEGBTzW)EPu>WReE!x_zLPP&sS*_63J-T%1^0KlgK|%jbO#U%2)c-Ru zXi!zXvTxrTpi*Pw+de)kD=VK|zuus%{4OHmpT2&JxcI|>fErcRCKZ+cNl7)z%B^Z@ zpQ57viHkoA4z5;Ie0J;Bg>BoqWn}(|ivE+7Yygtl+P@hXJ_ri_)6x0F!0MTJX28EHF@$6FRvF0 z3iYb0k8j@m{Q2|!%a>os%m486TW4VK_3PL7@87?C`EqVf&N3aH16#MAK7IPknKSd$ z)tA@SK701;{{8#s&Yj!7eS2?udbP9j+)0xbE?hW&{`?<5e!PAA_Tj^aH*VZGdGh43 zW5*61sy}q_;K8FukADCD{o}`vuV26Z|NsAygKvN_!oXM(o!hlK=%O`MV(&f2wV#Y*GDzJXT)rcIi1A!K5R;Ppo?n}P$Q-Ti{XgIxXZH!w;{ zNM%ZS&&rr3wWvc%gLCH0=ozOsdK)k9ii(QNzIEf&#$v@Iye27c-^kvOohmzL&du1E z#6$IYr{2k#Rmm7hZJH++_og7fYV*$@UB7>_vuK@UV{LbERyEPFQ3{H&*RoQx^6IuV z)3ebL(U20DKVim{Ig@5h<7-)|dD63!^P|JVo-;qzyg4%G&YnL_fA-v&bL7pMA3hs2 zTNzywj~WPsi3FTz;AUXp2{MY``bF6u7+{hmt`Q{@i{*0|R6(qi#FA92CkWnkbvxiJW+6`>(FKP5A*61N7cbC&Ob8W=oX{an^L HB{Ts5X$W}H delta 941 zcmV;e15*6C2kHlq83+ad003VlE-jHE6E_B8OGiWi{{a60|De66lK=n!32;bRa{vGf z6951U69E94oEQKA00(qQO+^RT3wx9@is!Omt|+ghrM> zjq-b+k3Wu$vDuKD6F=X&MJ5u6xZM!1Ug2^efSchkKH$Y%juYW9zVQ1Y@_Aee1h8`N z9-iE}vjJC{;ex8-gv$lY&4H;DI%_pt4g~P+>3`G6JbJ{5a2Qwoezecdg6TA*PzWKX z6VEc4&C9Tm&2re~Vrg)YMleVNAVVP*qEUV+1eanlG8Cc#&G5`havAQ!ig)hr8kWyBJTU zU^{sdZCzc+sw#|B3UQAIPj27dyz}h)_Td**#g5)y^mKOv$ByBF~;X;@=1oEjQ}*=&Z{Y=+HdlOzBrm&+`d%cxeXSYBR6 zu~@|K4<4X2GlTu-&OvEwgJBquWqEzo-@U_JB7t3QH++!@gb=XX?XXxZa5x+dcy)D^ znx>&zt)gD9qf)70Wn~5RdL3(PYhKWG9VDSB3UpnEBuP*d1uZQtFquqfZEc0sYK6&U zg2iG%dwaXIVUAWR73#VU!!TeN26SED@)s$J0$G+J%Q6&2fz@i2@PEdi0JFvG0iYeC P00000NkvXXu0mjfe{{b` diff --git a/web/webfiles/img/hydra_pass.jpg b/web/webfiles/img/hydra_pass.jpg index 35b15b02dbc67c1f8beba3a93e842e7e470f78d7..96ea4770ee9301ade7c2ad36b8e6cc93e9dd04e1 100644 GIT binary patch literal 29906 zcmeFZ1z256vM{q?|uLGclTG_Rb8vQy4t(fTKCKM>i`TnDOo815C{MOAr^4I3J?b%z`?=8!6LxJ z!y_UhAfe!(q97xq5Mp7YO+Kr>yv*Wu%|jd*w{Qj^YLw}QRWqPyO867@&w`L$yvMY z3jyW2sFYAw?v(7bzNd_+&8)Yp1U^Sm%G_{N_9oX&Yy$5HqU%DBm-|nhOt}Wh+sv>h zdcyvU#Y`3Fwkaj2X@HN|SIEbd@f%9CXQC0}6*?KVfE975e#`p|lrOncL_dLD-@7uQ;!_3Jwx!}~rMb9^P;pU)w!e8&nncH_@H(vy^ zYNct|1X?w9<9zN~ocTEC*nV-M)*B%5bG@i`NZfeYT-9{E=5T89#<;A|HzhlxQD#A^ zYi4-iq`Fx)JRUOQ#ODy3cCp`*?sgYv%soh+SwQw?TB85d%j8AJ_+dO{T!a`sLgDW` zup1ltXh=@A9Cra0zmF7Zm2>EE|G43#ci8W_{`kxvF&=X9)5goRnk8_9TP_G7P%*~W z8GJH1G+jrRqt-(_jzBI^Vg1l>vI}16TU{4@V{^{g_pW5u>!bM}&j~HfmkIYenKstm5$iIDsv026wvnvixl-;|x?t4*T{ZksrGJa9 zd!zqeFAVPd0+*Y6N!~0CwASpGndm=sqt+&q=&a+=6Y`GWZ-B?^Qp`UT2%;Q-^P6Fw zXN06~A<7w>_)WQ|(+^c7cS5DBsg*2Qq-vv~r-}D#pwxX!LIgeg>T!0>_<&DKQDzYk zfSw_g+#6pyx@TSb+?vA+JpU3eJ$uX#lFWl7UC9F9ES_ZcA$+}mS$tD&$x>|U@1ssO_yiR7kj(jW`zfCZ$(IHqIxRQYB7wB}O+)IjNPLtEJ zSfqNgw`1VRZg1(oc45E02zlD*8Pp9xN;x176#0=l!fcxyCBD<>FQEhe;du^NM#r~{6V$c zp1lqKgP_xbxrR`9{O~)qR!Hu=ozJiMZk;DAy$c$cY&m#{mB16UZi-x1&^D>#Z$I@l zL+{=N?oN$M<t{ffq9 ztdu?v)D?2r9ia@Sjlc36vqd@wz)#)6PvxXV3yYuR)Zs4jNXMKE3ab)12 z6TMUT79)XOtMRgi_&bJ!S-d+*%JVo++j7Cr;1`lysg#M@;6Qnq%Qv&=nckp3@h*Il zeIyvqvVF5oi03Y^X-f=D3d{&>&jyJ)*g_`csLbA()S%Rr9jh#yGC2$pIJk}weJhPd zOE*)}6*qciym$e!XB!-MfqP>h+SE^M|2y!8#CB&FCB|xZqYE-sGGPFKFc1q30|l8* ze^eo4s)WJ9#Kyq|gD5CrS=mI`IWVYIIH@4>Cjx{82n#h(RXq^?rIBE3R?y7crG|JF zju^2q5Kj9YPh<|Jsv#5`Yt$eI!Z;OMR4>FcV}*DG<5d3=k-gBFvDpC+AzqV#b5(`J zI-c|iX{UP+zRZ(M7V~P8kwm#!#>&bgsSzecDTVQm4GDrem4?M{Bea^&*$ftR@MIzYHPG&%Fk}Nq^m9AV5mmyzMU}YE31^R7w(g?AazS0<)|}PX|o9S zMjiM>DPU<9|-r8r|k`@q#F)#_noZz$QT=!4BC#pXHtY zb7~Jm@Qkni%t;+*_@}x>YI%BrF>d1vl5`n+-E=}r%cZVcE?237QlCLwB~2} zS1MbTTkio=#Y-s~Uv6zP?g2?5)bW(j)XU+pW*Tl79ZuGJrmnu^9v{B+;u>aL>xgkN z9BK_f6D)r;H4l;bTNl_Rl=(zgedzWkX++_#TjaV5#PKI_jg)L181irHyY&nBx?YGC=( zhWyvWqAt%OWm2<6PmGf{0c~oty2Q-PBhRailWNT|T50Y9c@I@_59k0VaDF#p?KJV~ zy$n7@-oYP#oc3p^Lfua)tnQDAp)O&RxR7i=Bex)=Vk+2@uhhAW-+5CYrRa%}_~nB7 z)K}5>r^fJYjO-IPSruihP5rDcjf18<+w6d8LDPk*wj`&v>_y>koVVN2q%0qspAv`s zJwQHa+)ftoeV-vqbo1xJ{XukEohyeI7Ruxcrkgs$9h;3NrYVd{IxW!}?!^TuTh_;R zn!Gcgp17x*#G6O6(6Wy2(_Fi}sMqtf+I{oHRYSjOb?5a?1HQfl-t2MHTfuL|Zu145 zSz1aL2H$FS=YF)`lGzX~O6y3nhUHN2cHFlq3BxNkPvr+(VTuAl!842$8JzC8ZVKVL zk5>~X^u{7>H=K(s(ixbHl)N8}(!g`Z{{*$JXZ#I`o%|l~NL*wxc-t50o|FSFpRTqDtL#9oE7vIdkmXCAMySUM9SCP%F5EV6s zA5~F5RpYzlcf5Ta{_a`tF=z7yBO~>eTKG{WUfSz{VrDj*NCiF9x&K#4%ENGa;7Lp+ zy!WH8-@u;;eIQyHY;vy3va|XJ0cJbvoLI>p<0<1pM1Qy%0V&736`I<;V*TZTCvJ5( zb^>uB8;_y{2N5eF3jIqj5F5$G+p1tt%)yh4f z;!5d`<<4m5$M}lDZLV!Ak0m!>nc++n9i8d$k#&PZh}c=Ku7En$8LL3=J!R#-YP4qg zJ3`gUXQ<7RP|}o3wpmiSgX>fJ!ry#lKMZ^ryZNbLFm}&e)j2u-!m&T}Q=e~N{y(Vl zAJhf&WsxxXTqcaG_63J=j3kvV*#r$ZX;xiU@$bB7gUU05(+D5oV(z(!#+UD&A2+OT zC-B;>xE-fhNeff@sIA6RMaXh*H&VOSzt9@5mml`tS9_!r&s2EIv=;cz#e$;F(!99* zz{uhrutc;VS0|FZ;bpxcOKbKq^TkvPr9ui5ufFLEk}>R#&lBzYOye`mvLi9$lTvRJ z@oq)Gk689ITvqb&bfoXK?Bd+`DyTNmX}XgQ4lkHm>5-#f+F(Xe?1{aB&E$x_}h9V3OJPu*Xne^DB206XyqZ=Vi^6fHu?W z{RF;Nx$Jiu#p?F4@tuZB2a+Cgl{Vx6udv zo`qiA-k&O`dRyhviAze# zOA;H5tJaX7#h0&T=Nd}m#UP7o)lwZCJxS8&ZxCI+xUWshNcA>3t;#`*_Rv%aN7GA= zKW1CgUuwvZCO%HaOq+y({1a2or?9uB1DoZ()ttuG-vXox^6cEJIbyM%4*s=es$`E! zpU?^OseuL^=MsO*70>VK5*irtpt;B-D1VLj^u(6B8{n$!E_M5`MCz91~ua>VjWBAW(u)-zsRq2xC zX#Oq$ZazC5Lyz5j14)_`k~Cx+3iZ3Bp|F6MAT|*vzaQyBJ*2z#v8}I&l+UWq_X*Q= zhCbdvo&8?|t&_+vZ_amaIU%V_LiWQ@P>?fkI2br6AS`4@{E!tU7DVg>7;H)o(fGuV zU{w=m*ZLU@DzUt}SrDs;zlxfvOV4MVe05lHw}vlYf8Hp=2}9Y~*Ebi3iMj`vZ>9~KuP*3* zRqd-c$iiz{to1l&NhS|dN30bmmsHY2f7X7eM_3@dYe9oW=#O~n%}hJ;#zI9g?2DMQ z4P>-VPMNkV3z$Vcm?NQ~J3$X$hUcxKt6aixW070J6nP& zt3HefTxicxWucsDAvv2J(wJjcBDa{RFZa5te91v8xl!+^e732=uu)HI!LF%7?roLF zf{ngr_1h{&+s0MRA_uKD+rMJXzCFB3Mq=WbH{sIAlv&af{(yd)u zu;R?finCn|?l1UH!H(q@Ri3q{dKV@;jmLcxc59&-OKs?!H6CPkPYwkZ{|BPMCokku z^wf@wH@QrwxgBd4qO9$+UF$qko$#65Z# z?NZ)RPG-fxVpoxldZv*rlnXb%{@DaCJnpWDQBf0Z-VkLRO8N_r5Atp3weFejsL%e? zEPFCyTUR4ow?`zfGE*+(9I=(SOuokIQq@K*?>K8wA-co53#?!MIyxp@*)H?(^9_DW zs~aWq07!%5%jZj?CB;*&DYLDQK~AZlTW>+xk;na7p9JOG3uCSXqvN|tE?GXx!=jf} z5U^c3`kX~Cs^q^6lszz4LYRL%_5ZKH)=-E9D#j~tnshxT`FDz2+%6i&5&f@PH_2Tz zMn+o=16JujV-I9ivN;_GO-3KN4+(F!sxE&7XnkoACplA~Y=1oCIKnQq9F6C3SKym; zP4S%dE?B&P@Ce;DlSZ#IU8{7(Lq_5 zCW0x&tYj5Vc(_z+Q2{4y?<{^WBV+1!Wv?PRlIc8tJCGKXbD`-X07li_Ht_9YSK~Lw zCkF)1_^%U#_+or0FdAalPA)KFV48mOdIC8iXTmyK@YC^=J_ zsI~5>N`LmOJb0tw(^d4H`eE>T-xW@;4>ovHwl~o_-2q{ya90hjsf{|^+0(#ChH#M~ z!K|#)A-m18%WVVpDF=h2{SLJqXAr5xxcmkq4{?!0scZ^g+KI;A67Q}`y(`SpmCSQah_B#m?+jkj`1|fS_C~VzD9mV(j@9>ZJ>mPYyw6@ z4B1uCu>H1}_b7HYMyI1E-LQR5eyE(ADVO`qrCj54lbsqAfrXEu8SSj6+971NpZg}B z5J1K?bk6@JQOLdFhk+kOHJ%JMyJK=@vaX0ZR*osZ1Oc%KN zj0OEsF;&yb@Y#v=6bq4k!+JmGUxU7@_)<1Xk!bOJgTAtMsFq>`#-}WpD=~Ix#`9Ev z(~{U|ThPUhIMMt!k>J=T=Y$84dm|sDzKP0?2e3vdg6!*SGGf@5)$HudSLyj1YE}{v zmv~H#n)Q^avDT*n@u`#6{pqtoyGv5l+hnR!twH2&T6Sj=jXPnU#Po>Tk3ZOko(z}Z z9=0+-`9zTLwrBIUBw3p8J1BT=%S7j7!ViY-=$d8hVwrKaF{IftWtLaOXo}S80m36dNBN#>)|TIS%YSc_9viN8zh(iZR+QvF9sDy{k{%;H zswWRb-pk|WMZ<7%&Qe`qnJ&ZI1@8qSXdKUvGI?h0?}aN>s91+$4n|W^7>gG2S<*UK z_k|slsH`kT;|VVK(YzkDWm=YmpGm5yWvuSiTry$!RGaL+EZ2HSW9WfZ-G-=b7*z2; z8BzKKMcJGj3CUb{%?9fvHQzc7i(?iW)^fi#Jh2F^e2zG)tO_+VllxiVV!lKP<<79C z$)`&g4mLV#IKn0mdbY0=AII4nq~s`E_wiek6IO1des1ws-xY!uQzh7E*;hDSX*b9v z|6@RcUM{I3b>pF(iGI$#lL{(p4r%hXP$N_yy9&cm5wzLm2c)$7Bk4&=cc`*{p!ZkO zR4Av2O&YTqEekTW+)zmd?dxHuKT@ngd0&fNJr4a5L{OU1YCNZVws5dvX>}y55QSaMw z>?k=&zsZWBnjJ0c!D%~r-2w|W)j-N=d)1->!GxQ`*z2`z;qqUE?<5fy_ORrZbN7VjM0j6LB<{+3;(R^K!|S2|iFSE`K9?B-t+COG@?fc_NB_=K`5w9Sj?^ z^zckQ)(yV0c`o+?$yj$|L?{lQcicD=_yQ^L8PF!GX}X{x8S>Rr z_J=Acb+G4CaMQ!SExEhE0R-Yq3RhO1J&XOw(2 zDU&|scs5@XO*14DahnN!JLKu@WWz344{L7I>C)nN_En#Tj7)a6VXrFTWF2U@>T$^p zpy4?eN1gN)@-my$6VzOxEI#jO$|R)pM0}ekJ_*kmUEuM)2nl&p6Tx~0tHwlk_OlfV zXK$?bJ)kT5=jNv!^6k0fzXzyn;2(?+cqeENe)Dqt7r@`-{~%cKy4V#icl(l+Eln(^ ze!UEPe4)g`Zz}`%#yPv7Ue|XUL^JGVErT*#@#$dS7m9zma`-P66~BuT|7`TIfK$nz zc1@cWO*U7yEi~rmP*9tx+A!2lJXLT7hGKKF(HpKca&y2Qh88HOCcB05&3lB*SO{X) zcSjRgCao3jU_Sm}t%`_6iClJ_|43_&Z{{8li+E@r;)IvYaObJPs(akfP>`9=k{w>c z@%W{9$4Y%ihdeDDnP2E5a1YDuv8p~Ej!e9~;7Wmo5jC+`N+v_nd9Vtn6#K`kVk~Ow z>nRU?p;NwvP)scnNgZcglYY(rmY_;I-K$|C9P+^(9>r=b;r?H`QMW!Ej#RxpOS=7e ztmf>;&o8P|(E}&kn!U*Eiu%@14Oz(HGxnXn3oOZp_UyD82%&TSi%g|nWVS{Dzbw97 zQYDIIA}Q#C?2!_oOPFgO9pnNWg`}NTZ3`FciVe4lTY5>}?W4aa=upQh9Uh+Gro;3r zDiZORl6%qRt`tna#Lsl1ve&?KGxy|b+qQ7|$pPeKEY+Yxg&odPGadLoZ(JPB=~a>} z>Zf--g>>+X`|ei^r7Go1BMax0H*?}PDT*^Rjbb3MII}myRRk`0mWZMz{a8?riW1DF zU=zpjNwtiSvrcDltjRFD6dq5V#rt9g3oXH3YWZZ?D&VBTS4#B;qn)nvL6v>@a@YI1 z76z%*KbkzFJ9>twz@I5(9X{vP9tBfqLN;xJ+dQJiQ!GEa{&J zIX!^slg~JsJrh?P2TeLC=3dk`y%cZcSEAC*w6i32s1Q9dW0;03Tnyz=ees;Ca%uru zaYv)-s8NND5^q!yW=+YPyJHf7wRJF=*mn29srz_m(%c7{i$>IUj4VVyMMivBcR`~3C7(Z7>R$cK|RPv|MVCFk?hLqYf;}H zzyGGc5}Na}>acIBL+jjR_kD#Y>*v^7rEc*9(r8WZnmF8qkIQ0pntFlMeyp z$nK|%I*#R*u`(*fF-i3s?DM&DuT+7Bi+k;{;o|-<5pQ>usMi(_g2hA= zea%`s%fS^hAw;N&)WP=v{Iy*gxvcV37d8Z(RW$mhDtuWX5;;yVkLpoQeq6pD$>M1E z>Z-8@xn#aMP~z5}J}z$>Cqv;KUtw7U5i`w1zGBdE-M@B%1hvVo!zi3|ybXoy!lN{r zgPLU1S30f_ric(MszOaaMy7G+dG*=P0_Pq;f22x?6poP>YNL?onE%4Q!BkDq=3`~1 z&H?*G^VCHhyKb2fRT=}Qocm1@7dID)_>Rn-It}4QOcY~wZnJOD*A>hD!k3FGUot0p zxEwg4GA6Kw1nP@3s#dQb&Dz;a7g7ud3ZK3&-spS8l@e|PILDDSF6G_wRVWt9|kD6O%l?qqp zu;?r^5VIy8#X0K*k^#%Q$I1pR@W&vp0`G#ym!4OyKTU2b7F^PsWuPXUFA^&UnK&CLQGEhz(7zeM#OV0EexLMeV5d%cJw6YEK;xE?NC*L89n*q6zt z5!$|bmyfGk?9i@VHcCXI2)i ztEpOlejq4;`!|){SU#K-TS}tvG$qj@D}Q~J->RH>Z1`y6f+cb1I#u@6d#v!Xb9>h7 zgUh~vb0vt4CjAV28sAX%*dFnjEtKzr^G`@Rn!fJUI4z)z5 z7*2&07<;14Dd%&+CbTjlVNZ|XM&SGMlJ04GHF0^)d1aEq7{Aq_IuTX8GM%R^$X6|l zd#Y?X*N8LxW<5%{WR+Q z)kpaR&#Wuu33Vv3*ykyeXZo@WDKec=pWK=lNikyflaq43PaD`EZ4j;I^J74k!A*wS z7A*GST;}VCZ)7dVZmvsBK{KR{UMXr{h&2wswpt`L&5>lCymxKa8WKKM;SKbZaPUB-#tPm-*`|wia#N= zx_|*$fgQ5CKHaJBY@EEj_H8b%tKHyAERvV%JeYa>8jH&}7H%&fsyfIIGROjj{5@3O+Y=W8E?wrMkOP&$fz8)+v6Hp1|?ITx0k0x z&A`NMNo|{8=iQ%aTweG-w!k8p=_9MnJpkOlu*dHaU0Q2NN35?A57R@j7#^{($2B=) z3pPYh7$50vlspdlIB$T9*NH(Y+Jj2RiHI~HDn}U5b4v|d6&l8DFCc1XvVp9Rj-j{w zJYcb}AFqiF1QG2oBBNwn?>?$g@r+Vk4JIsdPI5r5rex2>ES)zZiG<|!G1c6pvk7(I z)kysBby?yc44R%**-Px~8tI(-Lhh;=Aa~W!P_WQ2zr48(xvR#cVEZhpYSQy1K5quY z*}o2QJ+1Qbmp8YCDH7gmihQT|9Ca%XgT$#Ivga=+!aO~vIuByzqG4H~>?LM;cUa|+ zvhj5)p|ME}+PE3RD~Slqihwa1ozwdm0Hg`14pKuTrQ)(+SgzCcUSO|^#7$jO|Fb6A498S;6aIQ5rpvG#}bwmuWDhB?c}#)Q>9 z`D#?s{0L*?kOoTb6Oj(?qrp<~uuWQ$gYvT=*w_~wpL4T;slYx{f0&$h00emPi;g36jO{#|Q=B<5?B;bTMD ze<}f~%)$D9D$TY>E9}usR=m3B!ZAl`Jm+^ zD5J|{`r?2i<~X`GRPWXsD0NdYcwoA(pNp7Un4$!H*k5%aYm7}xKnu^oHN?n;9k=2p zonr$>HNu2SxM1d>>H4MQa}Ch=6$nDdOE!X?q5Mzovfohb(a=tX%B7bg4X@}DKModI zQ`z3{hCNfn6i8w`4;1m;=u;r$E{uu>haWMl+jbNBSnf`0~LDQMKgjH1)8Ns)gA z2ml0hF@TzrdBQJ`vNwAMBLv>!2%3$AqfnrW?}_UG){TsblqEo(FavSy=KHny$Qq1Q5oKsr#+?RdMzRORVW{E73)}~X++UBGhSPWaXN~~gvOV%rJy|Lh2jw< ziH7p6zaulQnW)vf?W#T ztgaO>dzeLGg&k)T;Gw4%zs#Ln^?#^hZsZ~)coYFfXk&#ouX+dgES*V zb{dQom#u3UE*A9>D!>pcff5R(#xZynCB&9Pwg+2=eGrXrXqKIY1?WFZKe_~u0V7k0 zy@Cjv;G%xb#u3nu0fgm{!`ySyv_zI>v7Rtfmr&-X$Ik`ZBTc1V(Y@@>b%7t5ZecFFKm##m_2hh&@9CB(RG(5vM~L zPPs0yN77=EZ1@2HD6oLrCi}3oG@USMgT)qddqwe8Lte^&`eU(YHCjl~C)&-JozRqk z(#`ViRHhb-F&15yu@r;)Ul6s+>z{S>A&e*DZzBJ|2|*+hA$R;gX*8V`b(%<|cM@U! z9>6~>I*S+nfDJ)KRD2Z$>0)co5n}HNZO4%GkC?OAC z8t(hp*aT;P1#8cIIT#57C5jFluUe!KG{a3K>8OHpoqAu|-IbqnT}BegXg-dBg=U7y zfDyqW5nnFNa|d}*s=)Y{CC2U3n6vpcP%Xf~m5LD&@4YHTgLVbUw;aDLf63HyL7{4G z3G;z23uG@Fh=;1|mv&U6WK=&9|F??yO`ktvicZgc87+MRZT(nfVUka{Mo{JOCm{vc31=XFe;oI(^5AU+b0 zIl>9*T@afeAS>2Ovtm)umi?ia@YEQ!*69x_mLv}aU{ zimAV34WZ~;5Vzz)jNkh#>LHj2n1-?Mcc+M8)5MNUr;T=1K{KUANuuwd%0=bv=GBxT z50V6|bFnmedKf){e!sNpf(@Xt6nbH0x9R>QVfSUU zsc=tUZAohUV=%-GTi-zEbu7VF=Dj8r90P~ju7>2Rt-C!Uw8>x(Gl%~YS zj%{S!(?YO9%9_>1@H_pfe6F*+tP7@ zzC6J#7&6iUtEpyE zRp=6=0;hW&hdXY?>N`Oj6cEx(gLJRf=hR5LG@ zt)Qz89a%bj8EAIPOE+cK7zMJUltdIEOls6c-EhWF~-oda+Lls6THDvGI6fSh%bC(OhR4T#t%YlvG~;v_m;TnhM8bQ&&5PBBMP*n z`#rSa4!YNLh%2Dojh|McF8H_Ba{rr2A99M8j3#!v;Y)@0^*PR3Kiwe)h8vI&#%@}@ zda?VfOQ$GIATc;X^F{tKRN%*BOF^H(tCcXZRYeW3hN&NrUjr5VIN33&x1sYfW>w#Q ze-Br^#`{KE({QMd@jyAmFybf*UEzpD<34rolotXL3wzipjcQBs`I>Tu6MpCFVR$ zaAjL+7=el+VuLe_;@5NCOvg?HFP_T#4Al_(kQ)=x#?p?{rg%|ynj`tsLJpV-76a$1npCvJAMp*k+ zLdHn4l*8v5_>^1-&ond(MK)rF3Rc2KCD7;&Ukav0{WlR18VeJlfToj!-#Bj^TF_@i z#A4!lsj7sq)1DH7fweg4qLgZ$XS-rm!J%x;xu-flX@9v7P4 z8Y0H9tT1NB;m;C8C=rN92n1D-%wZ1bGF3}J)bOU@q#h*0A-aZIC=LlA))l)5J6%!| ziWxuFvN2&^IkP`veAJ;Njv65fJK_3*eo3ALj``fl)GJg;wS{p`Tx%r>Gzue5S7syg36%SkWWE5+dUAyhP5=?2CPf%&>W{NoQC=BT!@E&&ywcqeUtLT< zmsQ8%f)Ke_h2U};*6_~4$RvEk&nYl2SV8b0!cT|A6kKt=QqAM$w!wkmB>R`h{quKt z??U(T0J_ucGn0`TSCv4&?*W_55{qRyP*Z1^a+ozLh>|EwM*Z-P^&xZ;A$=-)_FL2b z0Q>*|9AIpnv~$#}2c{d1PKT&F=@N^A9momdhiVLBhYJA1B4vs}!Bd!Va%#$K$ROfS z^JC-Ef29^Phq4v%fEAy<2|>rb_?sN!bzNj3Xp&Pt?@iw>{~{lDFy^#Jr;eQ zk<+^xcMo_P{Dxwm+LfYAM3BD%=mB*IyNq0mZ_Ltd=-2iiLz^NM&{Vla1kKS#FJM6^ zNE{7f9Kr@+0OzPe>t2mexg^wTMV?x}I2z6mSMXrvM-^exZFuB#f_zNf=(!P zLqyK#W4iVk;Z0Ha55?pRZGq81fq>F(Q8QC;vyL*J*f+ zBuv_xbQ3E>oPq)Ei)|M6==wEZC#}WB(4l?q1QB6V#HmOrYo2a7* zUQcBTkJ2arUO`E84+P@`Z3&`nCEf!hUIL&L0a27j2>DFGc`$4waRZ2P%Y&>`1m$|4+rkK&Lsh4wp;6gFs5!r?RePCA z_yYS8T4)2)HD&1;NlK zWY>Vwjd6QPFqBWl#G)CAi_neJc&GPaEZ&vWi6FderG~Zz$pDu2D5+H+xxunlrdCm^ zWvk>$`2mz*=uAM!K>U?c(t7t`uPy0j5XG=6P6H6iPh>1a%kgV;vE0T@Jo0w}ln7j# zr+zSs!!p)^Y!vS`j-Ps^TneUGeTM<#Boa{$ z>fNG!{YES0V0KMUze3*K=4lo4LQ(4iXk28Lrh=B1bzgB!Ak(O>wCz4=^pU2_Y?B>@CKKgX^`v_E+7-khG? z10cydo}zJ6l0bw`t-a=RY;C12vA^)}gp^t~u zezh9df5f{`1$Zzx%uuh-pFrV#5$+{oQx77!sHr&64lK znF^omW4yDVms3kB`T^+fc;~hB_qzYw$Q?XkvXk;&x~`b%3;g=AFBHwo$v2%nKkxgz z#)DDIzXu>a{1)m#49It{zyFOQ5EBC;hKUHPsOqnu*iD75lywZN|3;UyZ#G@zZ^af(s*a?3_Y`0#TZR`6e43_xCa3;SeM~+ZCmHfqs zzcBo`&7eGi`HMldcosT(M_2lbab#>4x*K>;-beV0VQuT{B_}1~9C>zy|J>K~1igKH zycat`BdY}VJ^72S#+#+*zRVAT=>$x;Y*kpJsVqUfozSmArLxRtT#gJUXNE}UV@50(?6f&I`m1nRl5kxEL05!1h zSxEBHIoymY9vf(wOzR{q3HQa-bDJyWl0`Tc^#ZeD_Y~WoE!7meHV?Yjka)c3rzGKP zh{^V?1QAX@30fWUetBiZA7!QYWyoQ(o}#aUXMgGH|33E5sKn+hTz`Vz-D3UdN<}oI zz0g5Sg3ruqhL8=jjx6nXPYZMi29sI@_Y(q*oE&CI64o@iO7pPKG$ixEItZ<2Llu#J z8+7Fi&`M1tEC>-$+4$Hw`qj%eFZHpmgS9WwvW6$vg>&1_--C**DNHG__K1&Ir|~15 z=v3?dO`%NpOXTx}@@hF#0>tB#!t$QRLLeXI*SrKE{4Xnai_QLFpU`kaC zsUYQT&DCxV*1Zykm$vdtR8UON9V(H<-&;TL6P?bqD|a0-s@Bvhf8%fuD7g}jqHc&) zN_afea}*Mo$F-!f8`EV_UZweT^&X&n=1U-JMV3u%R1mm|3NPkRT{cDP)1s+YzV_xW zXYYpk|qh_1qt?;voFVviF9TdCYXVGC{ z(ql){SNX)#BNB_L@z_;wj>MAm283fDj^aF(DF3>|`08;E{#4{vxhV|a zWq_!JvX1y6&y+~mQIq%T0IsHuZ{jiJ{+#k;xu zcaTHUy;uxyJik#^Bvdqy5)n6SB&fLFwC6-L3utVls&Y@yG6``cbq9$&DEm=S)w2_; z;LOxO)RKx&Yy~y9DltB*UJX3}*thU>U8NX;4nmb<^i0Bmu=U~L`7{XMZUJu>U5Rg4 zje7#&PzZQT&}#0~pWPcYW_o<7xXG)QOn*Owh-_r2XOv}M@u3jr-jlSZEZGCQ>?=ko~ z3|!sVELJ9(t^pF~QeF1{*uVUxAiR_p@8;Vk%0*b*3%PIl)s3-;LM!wV=^~nNW1;m{ zx<_q!im>nN^O3d;C$dN^uhO`MVtH8nAwN>2f}w!U64|%ox2M+RLHeBeScXG-&sX{E zJD1GlnCU059RYXx*(~NayO=jza@%aL-GP(vbCv9=e8l-rJ{h)mPk{NLr3@;F5F9v8 zteNqi)bAvB(@?z6U;a2-*H;~z%RyBdW%#Ojjw+-uq@PolxyZ(~xt9Au4%5m>~<2lQ4iFNEU_+0x}F)f*=S;kbxlyhy=+wBOroE5{V*75G4oU zf8*}I`~J7JTl?PIeO0fzZgt;2b#LEJ=bY~I-P6)gL1Mq2AWeBAeLY|yTLzENd(e{5 zy-hJ|qL=+t^aJS|U$Z$2fa*eEa1o=6y~}X4JV5nOhcHQSqLf9EYu&Ng6uXGQ~~kP0w%4B1GTm$u?aUmj|COegTjb8uCPR zr;u0{XdCsbq4i~QaRO0?pMzGh2QsbBBi2ZkBXU-Wv>qZ`0e(4nb z9}*Z7DEjnvV#zu&m!#Tc8WicJp|;ZkI+BEe3>7`g&S9pK;2n-UHO@9+&}&LFvv^__ zI7~dNAAJ?X~r+|C0=jXxb>2&B}?T!&Cj)g|t?Owwt;4X|O*9)NZ*M#KnbG zFVT;x0B%#})l8h)s5k;z;g;etE<>!4+AwKh3?VJIqCA}* zm_T7VuD^1KQEdlB0oc$H5w|C3o z`nK#lA%D-F-^`+AB?C-=Uvp(nSuND`guMv^3j80x&3S) zS)kZg?D>&_x>#N(cz9Z?lX({*|98z6qpV`nFNRzQct|o_B8F`7b?< z>-WPo)4->9{KwfiTYn!X7v0J*Qb&Ef?!Ir}T|+K1*|C>P&FjVeLB-m{mA4L&QXSNtJ}p^+}$_5GaZ| zf2H}WgHMTq{u|*M99#JC^RKqkEwONcLa03F6t9;$neGhdJu|6;1l-dfeKGg+f0KoC zy#5j^(1H8=$MCPt?m z1R9NoPe99xkncAYB_ltuq_um|1SRy@^88?oYtvYj_*ZX0G;uD;D3_htUlWwg@qCtH zK|j8AtC5A1^pxC3Zs^8!XO-b(9CQ%IY`lSIta)s_U?c6G4W6b@jSPA4;AoHkDeIv; z&4z1x;z&N8a)U8K?k6JvUPGWMQkD1PB@XPk`8)4g@)Q$Ifh02znp~>>CkW-w?YK<= z_<%9ADYzHC&h~Kc&r|P|-l;*lb!>&f+|Ng#^3`jYr-z(hB`-BKI5^(mA}Z@XS||yn zueh6?f(4-5WPyg_3-aG`s0(Pt;xH0qxTx!mB4w?GFr;0j<*&8e^PtVHbRImSjO zng^X#_D)b6_(F&te_UMw{u`jXzJGu6uUs~XJT6&24s(rW1sgBNSNqsI;&|n2FCZR# z8^k#f)_yCncObKJE3>r8?TxoA%5Cun_1Y*QzE3vyl;|ww46{ZypSA*Y5veu)slP!V zr;(GZ!1~5)YtbB)Y_`d_C-{Lhb=r+`_oDu$+$91!D5D*=iZQrdYpUxAdBd8@0{@>T zfK93ZvE}@~aE+@AZ&$|%Q{)≤X&{{|NXIFfeo>D#k)1Ru3paUbeTR9XMj&Hn==0;jl%GPH zUU<29;lk_cTY;-y;uJSbRo=K_xsK7V6}fw>3Yj`bR_aMG!uUqipusF3Q&nLP2bT19 z*H6i+1j%#Q8Chj*+UtT8q;Ob&y7r4sj)>`*QfPP3RS;V5E}ue{W0NSHxg?Dx)zBo?8Gokou8K(pEHsFNxJP!t|2b2(#a?$WYnucR?$g$`9 zL9UI)hZ~`etBg`$;@P+W5!q*j<=x<>2#)pdS!TUxZNclh@&TK8>k(kS87j#KUWm(| zcf?czal$($*ouqJSqX9QT6Qq*S^sMfEI zaDmZXLA}ufUqq=>+4GR*679Jn1NrOc8!66z2=)lfmTF?)06kc|u!5q6u2|{?Z=PJN{j=xah6&Bog`L`VS1ua`?m4wmpSs#9LK4SUY6v=S46JK!Ha3;w6lyNB7mJVfVKdy(ez{%Ituukuo&gbq}F z?(%9!B#FDAO%M|JRQw~Rhg>xu*?ssrIdo{&sM!!DrXb;oNFZrW^08Z)4%)T)DZq2^ z7IWg*itv0pkxpew8M*Q2hq)Tl!%!Mk<6;>UI({28bKCJ2A~Au5Ko1gVM#AWFv)WJQ zg)wc0-5aU583165=@-ZoV@)M~={_Cz%ep(bJ>A@i3V9+@ zH5hjFkXCzPa;bQ*KF(_3pR0HmfCUg*ViBHxQQCnG-WY-G)jfcYEd5Ih)H#5i9DaR# zZu!VI_NL4uDu;f$omhc&sT$)*VGWV$NAU^LG%}Q>8oL2|ar-qwOsN2#ExK3S=%x`t zHl9{wo`CRXOCkgPeD^#D@(ov*BkLpv##~b+6uxzU;k> ziQ;m81I*zzoBr`A{(CgBYlOD&fQsSY0Fjvq54}+<_LaW@?$ZLyZWG~{qUfeVno45% z8!IC^_EG{Z^Jgm5D;D*yYlHJb-kipgw!bV+8~wUy&?j%Udtdaqv+e#v?w(ifu8s%L zle8a{^dSgc!DlmV`EkgKj~^|S#@g3@szuvQzkjptzbClL203oXFpzo`{I9^_(|C!R_d)VT1Dd{hEf)q)IayT}>Ea2htcT=KWBzM=n z+U2EAS1nrIu#QLyPS?@q4)IEw3W^XyOer45Z}B0mBX+FztOld1w^;MFav5Qt!&A}J5o26_^?41nkT1v{LbHI*)wAbg0A+q9 zh+xrzpqSi{Cp8P+n4(_Wa%2NL65ri8cgK|Ty-;M!S61@_&wMKm7TtL+PPUwY@r0CG zu1O<=Y^G?<3oD+P6y(Qi-DTXe?<4Ms+SvND4rh3F?RnP4V(JXzX9YX={a(?TmgO>6K(kmwXf<_>w)eIBXR@NWksrTVNPGu zz=@<~Tskom7P%A<^tH&8?gBqAOO@7pcbuZ#@Mc=$Rm{IjNZ88DP%xFdeK?3(|Gd-D zWDOT|Bm;hMi!}hlzXSVuN~RyF$nH^6@mX`f%@=k`xlQ_(P@%m6_dAadwgscl%xY`C)G6I zj<5M{s1IkbngB|;G(DXPylmch?xI76J^2MRI3}V3;ZFPfx2AgMaa9`ws zyze}z8VD~b7l#II#dEf#Wfp?_&9}~Z`$il;jKUI^EIu<8Bx!*hS*e8HMAPLwJtsK9 z&OlSo^GnbRC&PF<;N(K&*Q2&LViN_}_&9Y*v$rHG`zav_As9pN(#;R(Q8+Bwkh8WA z+vXd!As6{Zo~8wMl_iSu7GZ z3Y2Z+$P&aj!EM+)E9%WuZL3g_T?UWXgs=H|XEsb4W_#Oy1U;I<$8#BiJY_OA2|aFdE8#GzQgV4s?@%LVe2ZYhDe*em z7=`6PwZCr$tHuzR-q(|`esMJ7n7)`*ywkpaw=S^{vOCU9;_)`ctksTwlex?0IaH{} zFN-v#Te2*ttLrG_GXv%$DTrB}^)0zkk!&^WBjwol-KWaU9#3*6!R?tHA{8~lt?!_V z0#p~V&KSx5i030whW8WH#&@Ii%(8a_EFXC1{|Fn4Q3)0JAes4y>--tCpI_AnK@%bo zy2f$$GB!Nag+U;rnnRst&0vD-g*^+5zSWL(lSxP($j_p*&vjXw%8bda4-WV&KgTdx zn>-fzvUO!xikMyf#MpN$Q?CN1FivqA^vqnp(RQ`}u>aT{F>lrC?`4Bb9yMiuRHAr0 zoy;(JS!7{8!Cgq^+lL^9ks!QO7=idQ>rTK>5B3H@?x|YnX8!>H&EUw!sWF|OIoqN= z3dovSBBn%DdlKLwIG|p zdOfD+ZNzHY43t$Bw&Cib+!IWBLRZn*+;!Smi=y!9P~IhFn!S9`$-AhKjh-6^D;#Iv iABUc5b^N~}tgP$Ov1(0T8Eo1NxjVSZZQOEqrY7M literal 35217 zcmeFZ2Ut`~vo^X2lCvN=gP=soNElE_A|QxJmMA&rI0OO7859tZC@3H~C&?%v8HSv5 z&S~bZ{hhP-R=4|v?>WzZ&%OUQJWB>=b#+yBb@kiT?;6AyViq8HC@m)qARz$&68Hlk zCV=|@1{xYV+BFPxbaYHi3@jXCTpVm{9CD)T_{7u{v^3NdR8(|KoGf$ul4#eJ_0bvZhEC7IHL&-?#JWLBMoz(elZExxZ9aYhK_TJ0 z_a8_}%gD+-e4_eP?U}lUrlFDX3lmc_a|cH!XBSsDcmJ0GfkCf=Ltzp%Kpyt2BszPEpHcyxSn zdUpPsT}S}RznKO8`)`K*WEUZ57cwd;3M%?NWa1Xhf3A==yfo8F+j# zi0?(eD{jVQ zJXr?eAK_t#IR6)K%}RPLU59jLPys<9pAdb+LWVqbJ$M~>}mqnKl#yp;cD94Loc zdIQD(^FDsh%q{!zl<0@jTV-mb-0U0KW`4qGt9@e`%yAKzXRdwP?uJ6bNGcrsORnvS zx!Y>Dv0M?@&^gx0DZhMr!Cscm=3tLG&0bR%)Nz2KCj4xw(L_B!aumPlnD zq7joCce~ZyDK+hb9J2aa zjrOve==+NCdnf{1Rj7q`Pu8AIw0JNMF~P?Yb9A^|D_p*zzU8UK{H~<3n)K5b8z%c37Jj7((URSln z;niz1WQ8Zn!;ZoHYQS8)<)%_emW3si9)lLKvf%#C^bs#9M!D% zr`@VvLREaD{)h;beX8R&Qdj#^dkon1yzBvrkorPb1TeMe`rvxJ--9j#%&)K=Un%3lU;%B1d zwla8oe}ajs>F`3iGAp#^aViza z7B8M;!CZ@42F8+24QNd~8aWNRs4`TT&fY`-9oh?IbW!%!W_Js+b3;9!x(>iZZET$N zuXEq&edLpWbms4lml4GB%~^)p>0O)2wX#tPfnYC@Uq!?rKd7U;zeaFtqX1I>x++Qcbc22 z7BFpR&q~AYQbmkuo9sBRLbA;$`SWncqr74jC(<@Q;7&+(jL~nTz7-SB7I3!_8rYOQ zD@FiBr@|eIQwZRpYwU@hb@Db+rKs2DLXjc@&~%WG>FB8v=Al}NO*Q_xr zI_Ls8e!($9hL+B)MJOrhie2T2cja339X}1+N?+I{IOC-OA0x%aN~&iRwpv|1F$8C%@yg&h-WcbD_QB<%!otLCn#710y~&{UK5 z&0E!!l;MWE^(@{S{V*S;V^6U=U27X1jpZ!kd|TDIc^xWw28PEgjkQ{zyT*Y$NRaW}!w#0*A{zKmn$cjz%Ej##=Wlk$ z815^%N{Z%ooK&;|c0u=}C$Ph=wx`e!b1)&!Xlo6#lnx!!y>}0Hjxr^xT1;{d!Z}+b zlWF(3{8JpaW)9PTA%2+cFEc3a=XhcL#wmHMAYu(I`6y_GPOBGG=<_idNI*TNCOXO|@XG!tdP!;Ed zMMPw4sNX;(a3>4_8sOvu3lYmQ-$ZeWVJllW-{=VD?o+RHoq4NJrnXW9?zGf!9XnTF z>kGIPBR;NZj*+(@dvz9bKkAX5pTKDHX=O`NL-xFt$&*1xIsE}5S%o9N$ug5?tP|tI zPZ-~wuP}Ko`5cjjP}Az{7c_h!8+?atQ!W#S{0LcJPB|ilNNCo1S}m~{jEuIc&&1A}*V(cX=bW;>bzR@! zC60c`eZfkOsuy{b8aERF*+)r(*MEc@N@lh;h$!={o%3qrCQ@=04ctH*HhgnKlFapu zv4Lo_Z(5CAtgq(N0@kh%s|vTZ*X%zOb9fVvjZer}*?f?VmU;W(SbKpfHRsXM&1?h^ zU~Gc`B;P=H37~sUZJzh`puwJZZl=NnLs)7nYh_};#$cOVlODi|e}#-;34gkIHz&^~ zOA|ZPmod>Pgf&B_k1aJMvl>i~ia_4+@Qp+~*@hq%1c22&1NY|v;TRnPm|y*=n{S$~ zF(YQ2^!0vToEENiXN(PFuS07C)o!c0tVEpl=vEKWRY1AKEt@lNi7jh~jl4n@iNv*6 zQZE#Fq*;%TM1o2q4U-#pDa{=|j=CR~@MN_6Xxz?c2)p(a57~G1+S8x98(f8Lrxn4z z*ySq5$`J2Mv}tH9OS7e7&Mq(x5qONmb6F`n;hWHO;Ql9SPxdQK3~kf&ibYVuN#Yx? z&_Hb4B#8jp`hRM;QJoQK^Q6i{=vc_+R80*59Fiv@03>t-K&nKGyMTi+S}2K12oImc z!9Oz_b1Z~~h}A33Z7z(>A%Ho}mP(uBt@f#RcE{G^y^s<2gNNRf?Q$%-)lAz=S7{eh z(4}1Wt<}tbSB1$_FpQf~w;Gi|=3LO08?uzEKL7?B)(CYiw9;B&3p=vZxz`R}I-0c2 z`g?WNx2KiNeu${qIj4&SEuhwanwoY2kEc%^+f<2B6#r=$}*LClVT|z zRFF$Hb>}VkRMkWor+CkVaL0L{u9;GcYZueTDAU{4v{D4%QFK|hqf<}p;r_N|yrZ}^ zGH@>t)nb&+4+8;6Z=<1KmTlgB0{w-3I&FWnp$*)NksB?P6A6Zxz)zl^nN7$2!oFJb z-=iQ19BK=^sm6&)O6P!%@mdoh1fa3ebL-TGoawFmVr*6HF?7cX0VKTLsQhD0qIajc zo5I}}2_$J(r<$66`!wjG%`XhJsQROg|L!!8+})!t7CV+r1Tekvn|}s=W#Ka`DVphA z+he;;TLiFMpg&Q0;k;n|t?EM1a)ow7%q<&&yTBA%q#ffz1f`S6q zbf&)5_zU|A=l^Je|JU$%_zMGd%6}jJ76kCQJji-xYa+b%-ooZoX$th?(Q@2hqxEQ_ z|M$R@J+&dzldiYNpo=`Tp4EeXQEbT;{FQzDlYa!WU`nnV34AmA`f#S)KhG;mhuGv`D~&#?7?tFWqJ2lb6S0bu3G<8gcO?1J zf|rco{;01NdeYX10GI{?eaZaPJtqueN_e;Z?CoF1Hw%)JO}e{})RT}Jlg;c#fOQB6 zAp)2ogK|BzJnZbN!R+cLdWJe_WN5dxp?Rq6jP{f0ksHOXjye*nQCU2= zGD_7+X3pK@4`iKv8=h@%t(~q!!0He{JMF%hS>rK!BLeuQ_OjKpO^Wy_(h>USv@;}7 zJKYi5bGlLH1sl{Ev!o<*8}G<$?P(EhMMJ_+LjI=P&v}fScq%2tcPtm38i?ylcl!d% zT3z`mb881IS#H9*RxIP9-cD=k0pzMCF~GVcKbRIUv(v7SJ;5~T=Mf2K$SDbzGY{uJ z%75&Vv)PBa=hP8ots>%uHAgYsi`k;U7ee7i<{x!;Uo{n=6+|I9#D8UJy^WUUW=Nsn zkUNDP;5%U&N9;N-xr#TANxnemn4h+rqyd`3(n@>EQU$Ixw<9tOTs@xcBY?6?u6*4y zjeYoFy28z`3qn)m?Y0nl*@#MGu_sESb@H6~)_j4Vo@D80ss}TNhnCgyE?d69?#9uJ zl4M%QmUqdu&}=B?zgQ#EWE4msVM@JedEaqBR&j(e!18F(utCCz_f#C_y5ip~sH|`u zJ>tRcP)KLfBEbVURGK4jz<;#chr`u;WW9Ufe0qI+4gw=pX>W@QCX!2)()W{{^J#AG z6jd8`$XmcR<1LlmyKY#>XW@?kN}e>%u?N9@yqOR{GY2?4gc8)(NWkBpHSn*1OF7V| zT4`{G$WwWG1dvV}4B3?jH!7{ldUvtd(m?c4LVJ#M8jAo>Dxtg;qD;Y6L#RrGnKOCoSzyhj{9ze?yL z5IWC|?vU}1|4_#Z3|R)3E6EuggQuQBOe^pq|kFruvU#%!-ngQQdf|z>WY`ug~LO zUY~^S5ko(lnSl1C5kO~C7eM>c@nZg^)W1CSKOIv)r_f5sPhtOztKj)t!?pyMs4?@$ zS}oZ#4|ZG(*-;$m=#bZunAjW-`8b-+YC>2)5FSB;SYl>ck{(18P+s6a(vHHXd2)Wm zrgWil0C(rQx_G|(F&rB%70w86sxg6w#FX&AFDE+^6VkG9N!ZiXIpZLbLBhx&r(NP8 z7w*Q(I^xH-AL-D!%5y^iVx;h^qEqGX-an%)a1D8mM<=Jk78f$p<5tKyaErO!o)G!6 z$2T=Zm})S0kE472I;=V8V=`yLz)g$r2BSdc#GFAN;$oIme_-XM7+&q4nq~g^wvZD_ znk=*=|3%9~E358;PGbl8fl^!vDG$kp}`x^|)C*!e1}Op)#{+gWFk!DP-3m z7-p=_Nv7W}OpfQ^mrlSZ#@RkEA1DAlDMmFRy5DsS53u8 zWX7+k!us{@*04o|J|9^c$t^K1sWkC;wUwSa{rI__RYb{((Hj`1WZ8R`RJL2*^fTH< z6R?SZ)B)!5>5p>tHY|54#n4kz@VwQQLy=bFp3zM+5352=H%s7O??w;4q@?WaeBH8a zJr&u&TWK@3^VAVaaGI?EzqglV&$ueB(ik!0hGP(cJx&IMV? z009hGTfl;R|HmA-NN`tqi52M&#LtH+1SuyA3c(_%;%T|qk*OTfC+e&D*XA2yVAE(d z2?{csuS$f%4Z+O=(F(mB+eS*Nk~WfrsZ%2?G3}rqx&s4&vC(OA>)q71b6$%3BTjO2 z6)xd*St43gRD|jy4a~I-(3_+3&#HrU3NtOjFpj(T<`idAVksBsrO}yG?_Ql8r?s$w z4&nN8p_aU2IrX+Sipr#cSE5Yh`Ida&*=pm-7W8xEpKq(T+;#4;sf#x+`wSw9MoAYj z+0E{UOkRJR`EEAWU&GF#bZlJbAt%$Yvl6Ou8z0o9N-g@c{-}AxtbdtF^p3>g-^i`{ z&`3soSFNMcj-L>NDcK` zNRX&*;c1yMrXMl*eA|M4@8us{KJPST`1qBMRBox1_yi5}?S{umFYd{7k6Q!6sCbz| zbYm1t-RsXNoXT!)A8g^|$I3E<6EXz9-hRqL9_?{GK@6D1#miq%uMdG~+<4GUum5`V z)A>^_{EeFMoxsD|55dDLslB(DptsPLjZjmN*3BE!n0vzx6s(W;%h+{U=;DNg$*H}| z!*jd5NLvbS9WG8e98*5#MxuY1Zh%BbM9PHhM)#PpUHIHRJ7g{ zY%;wy7~*KX{-9fY-Ewh_U2(y_fz3)JbD&3+$4EKxj=WDezb4}4w=vlfzxCy%!ps`Z zl8lERi$5AiMO_zpmT7B0o&GGtE8+{>6U0;vGhh`f^ZO3yr)aElT-`M|R#LaMzF1Uq zDGc$Py&9CcD34sGBNoPzdyEz4a~Eqc=zav{2a&W2UD1)xPq`RBkUt2JN9$aRR}t81 zzcU!J)zAUfQp7>jIAa6WQiqXtd6n%2x%7~Q|zjf|0sP$zM0 zvvH*taco7$ue4tFsxq^>KHt+CskA8l)*jDjI0GV0;rowL58abz2(@`BX!a z{~WuRXm|pLCGGuKqTrkR072-eqWO=$s{4k`4sF%#o?63MLQj z9I*77^?c*p!u3@+*CIh7=aRFg*cs;-rXKLxk@+zWJbo?Buml05fhC}wN^mEbU%wrm zZ7%RcW6Er=%Z7(ITC@voNlg0w3tt_o_UxRtycUYOm=-1;O#P%AE$ye^!EVIMFal}J zk6ubG3OCbk%h)+NIoUawzo?3l(m=KQTG0M2Um$!@&xGlSAFOEp(AWD5>cq=4a69AG zhyX|=wjz=9?3)aFc1^9EXU!y6=D@QnowefA- zPJAQBf*Vh#7aN{#$U;_l@%Fqn8)9xE};Ubs8u zD9lZ`aW2({tgpk?<-$IjzH#9+d|-?e=a(g&i%KJHQS*bEGT)Ca^6Elcmh)Y+7J+nedxKGs`THhvj@YJjPCJ$s+aBtH=^0&Jv9?ke`As97 z=*DR*5()CAML$>Ki5Z;xo=ikD)BgPFWmT+?$-h~*@5K5a2u`&-^pVW`eFj2uv@Mz& zqiJ6so6@naPGt*9zEvkj7RH93XmeTeB+O8FtBvIq8pD7jxQA|qb;Qn`tm({rZ@Axr z>>y|BJr9gYDIUeNx+wjA|66ml1bBBJlX5DnxCJ8sQO3)OOVfkva95eL%F{unh>+N? zN@sJl%QFiyuhR}bLwXw9eHb&ce!ruCndNdf^1x;<9b+|5v=szegm5c3-=Ct8@7`9r z16g?qO@@Zk7(n~L0;vE3paA|i2;RVNgY4reU05N2to>2R-%TlGY}ZVg*^OR<8C;Wh z87wMfQtn+*|D3lH?bG+|pmywWCCZW}YsN>JQ5qr>8mfT@#`nb|v*_4)(3YHfdBn^W zBnR-RR&Q!NTQ05-6Q)GD<6#ewi_R&Li($UMWJCZAaM00u^`vL~*1BuQnr|D&cQ&`S zXL~)X=QT*hs~AbxO-T5cRvSlVtAC>{_ zE|o#dg496a=6q?@AbU=E5REF2#K+)>*DBl)ED2kic`kxU)ANF}p&R3yj;uR3gowyV zmTk&#CmQt2&dkS9_tAxV9glF8o(|*=Z)T4$Ics?c>m_d%mv%4>iW(DoKc$ODl8^PX zmqV^u8T_cjEK^!(ltho3Z=gbRCxy|jJG`fPA$CKmJG=&kkkF$eqlGlHrS&7S2L5$ELY3-V;#Ph=-(+vsHEeRPdV!{wcj zlI?9LVJ;PqjR}^Dea6QdSbgQbPkZvIs)OE%B(vmAdMN;Q-Xx>t_4gkSQf%c~cuDs! z+dwwo5&EF=F$nVTAlu$w+!rR9bbA8rn}nWXK~I;Sl@B;hPzD#WA6{s=Eej{e>Z_VT zrs<5}{PsSK`yf>(4XoGg5`z_`ZqdBPm2Jr7HOQrXR>r?R{Ff8{_e8?1sOncZ&%oPP z?2h5GL}*Ab=fkcJl#zP8x}7%KeZe)zG1f5TkXOMP{p*mj)Z@rP(I2vzV|kCO3|#8! zI=tDPYu|j$T>WzhYaWmh!us2VR3aNq??$aGqh{#C#`S1V+P^@Xzajai&W zpQF2Mej{A`7dJ*P>z$vU#+%)lDLUsAioBK zQC^5V^SO`J)L<5AUwY?&`nao#xQWU{h)*5wIAm6@ezb6T@cD(aI=Dr6T3=$M`_W)o-51IcA0PStwrul8vzYrxHbAT_MTfJ37-K@-7?DElG|Vf$zS$k+x@Y=>cNJW6DAB5IFl*I)CGwma7Te)f{pv zSc?D_%AlVscKa@OhoHMQE(oB*BCT%7i5hL8T~ICY8SfW?N;Av!kC192No#D*tq)OT ztkYw24zX3GiJE)z6FmkutL2_3M_e;ADkdF});BR7V&fCnqa&>1e4NU|tH$U7C#ejC zt^{Tx0Dq50xQNUpn+* zpI_ef@wS{L%0+F*nkB+S59OCDvqFwSp%Lj~tBy zhCew6w&PEC3gv29h_h4;S@8vP6$_R!seI$jV%^3z^Yg7nBe805zYC?8S&=M~GF9pvEi zFx}jY9wDBTdBY~#v10vkvG`JM7U|nFdG*n>4Vg=91aQy%5f+%7B*4^@j{IZZ(hb&i znU6f9JWRW|W}bFVp0DM5z)!5K%D52;qSDUB4Cok_6kI`v!$Fr2EK5KifMp5Y(95J6 z%>?d@klPZh86m)Lmt}O;dzA;zo(!uSQ9S;zA4A<8C7JLn7JUef31wS2JLB~=!i_5moQr#w)pOqxE~Q}66OZ-C9yvt<8{uU_Wm zy#bliiU(6>YP?@p8O@k0rC%ub%P~f8X%aua=2Tp!#Af^vdr5Yn<5knxR;>g6Jr@C` zCspT3fxltEt$_00H^zL}j1L(St{LOC#*8tNGsP(7@w+6Dyw^I3!*N zo%x$Xf4-^_z>O%5GCxINr0g;lWnA>t<;U~QcHUD}TGM2>2YBS?MIqiV zczGNPKj+(K*e&iK8jmmggw{!D{=n=aEQ~sBs&gSsRShN+w3+3`!MDYOZaW8KWmIY2 zYh=Q6vC=-DHOW@HcrbGSQ@U8~KMrnODN8%)&zRMy7;wZEA^&LQcqM=>cd*<{eCMOR zN#PO-`d%(<4aOYCec!}5ccRUDSyqKC`UVSKo-tr6YrrEyBr*&s14#;ESzv)E{7)@8 z(MDn5v1DpLSk$=}S#}@11I$AW0R~qYHfLKbSBIv5XkjbR(2sw490@-s_R63=+oHWX zWFy_W4(&68>}1NoZh}$8N7jo6kOLUxVpWanj~*lcG>jC*;?F*1{1Qg5&Qruuno5+xaoH6!aEA@n~#FWIg|-LDozb+s?p7K-+RFC5q@vZ2@{~vzs1P@aBLM-R|6%7(q)fG z^BM9~eJiQ+-lUcS)i>F9F|uPkpN>#%rQ{S724ExbP0cnchdMX z8i^fcNf|Pdt#f%-7V(~@`ouz9 z^>H<=5npUf*spsf2)HgLnS^C-FV&-%1z?)vqZjk8Hnn z(Co)P$l~#FTg80h_n4%KiKxj%_5ToJ`3P?M|39>3{)|X;{%>5%y$PhDcxxh9)(W(; zc6CvB!_Msz;;Hf93^oP^;UN160Z`@{GG%18jb`Uw!J%+LY0i2M$j$+XUuq=eq+~*i zTUfbd0(QaJj2Q;szLUz6aYS+3nX%; z)Ho(tC65)!zwmu@AC3~HqHS99bSg#7g~B*)OuuR7kU>PC7 zu85y^lxO#Afww0>6;eW(3*Q){zLHc6xu%kJOW6UDnUwfE;YV>yz?yRyf{KE#^@6nx7hd7K{Kj)|m-uZM0PW#;altio>P zTh>{@KyuY9jn^x#D>R?`OHnZ)k$*SglX0!gqcJAez6wNqNPb_Fx465(C6|uQFzB z{t6`U-@b?TsY7-dlt7Y}$YT)3e1gtCNV}9GMe+D0nE2$mbsz2yG9G-1Kt_|>5BgP6 z&isKY#Qz;Gk@$bFLuT&~WaT66DIu7S38k8*e+M+mzoVv)wBIX1C|qF_X~zO)`pK@n!`#H;v%Xe^Sc>ABadg#Q7tP zotjPyc}c^{;$BGWXPHY?5J^nB7)FVC-7080iwR-PCp_wV$)sK zis9zSLG#kq#k8TcL&{zxSB`LBCC>?YaJFmyychkpahaD~+gh2Q0w;Tiy+GgrsfYfv zomw%oTEPdr1T7Y!y9T6r2VcmlNH8Sv5$qfUGw2Ifzn2yF!#Wuko+cld7WqK^i-|MhsAcuD<;xbZsuoMso?kHwQ8 zOV-hq+MD;QfI!jRTzkEvv(b?3d{<5d>FM5y3pvqR57Vv7iBM&Z&tO(dDE?AK9CZTW zp0yk09IhiuO8Agxj_LhP&c(909aXFDjX(W$JU2*9XoUERuIV?-j&KgL#NRD*fakm?!%jEQRA?v*| zp{}9EHIn6l(!0u9qD9lkJrqb#iBXdg=HbhUTeDgsZI!Z*n7Sbjly95mQ4VGA?BL(H;D90t?P#{a2^|a_>JE zNVeh}`YhpPmB8%kxzCv|x(`yPXoO_Zy&{o4nal8Vr7OR3r7N7lf3md1`Z0~rT#&*! zKAE0&!umzXz)&|&D0?9x_QKorPrW>LW5cg6sq?kwmm$O;udzk+NgL_7_TmjBWSgg= zz6UXNMim&GO*$FLlxI;Lbf}nw+9;!_M$o$l8I^s{~xnYn&nKhG<{N*n=nU6(@9bu*_Yl9iB*X--Z6;#JVxL@AsS zgY_GSbVsl$7qEIb8Ye`{xzD0w$Q8*-_Op!Rkln9GN8#qPy$Na`v0sZZhmONy)G?%5 zU2utr6F8b~px$ZcO%WJrVnIjCq2V6Xgl~5-R+$wP(U1MLe61XGkgxa}Y- zTn=IPnQQo=A+c9vN7}*MT;nB~5{NR{sxw0AglvjW58$4nAluL%6GY2xv_JK|ZJN=E zN4e=O3g$R`TrlH(hQja2j9t2ciI|2GtWSg0ic5pqB-Rp?|NSbdWntS^>|PahlcMpP zp+1Pik@$@_XF}f8r;QgsFap-}H_$IYHfMT>0unW`vIIJK=XuI&mNF(hH<{|8M4o{ns$uc4~=~$uRZz_y7;^wvPlXuIBymvWQT#}-KgJ> zJ#MWh*_$UkH!-7N(I7H?A%QJ*o7>SAgD$EY4}lB9&@8Fsq%&MUfdoq72Og1T9dlsJXLjIY$k9dCTJ+O z2P^8Apo%D(&2!>Vn?K{)iq1~Oeg(7O5|B+|c*)SP_p0krJU~^vl2mFlr@^qtvq7ZW zl#OI+|ixp*E&;2mXd! zoMb_UR~c)L2M$FWRjkW!b-!kAEvC|1`6#hULmm3;C@CA4f0Z z=XUP5zL)sIXGJTF9$q-?=d>-ToGJHe;rjU1Cl-WduC04TcSs8|~Q5z7aS z#L&)}Ebx0n*i^yChkD$Z-DW}{i#7w$O_F@*>WjR8<~;X6iNN*q$mh>uhMFTs9wH)N zy0#7{#3(T8=A$aQbYH}gK!j$I@yKZG@9`C)XZNc*CYm{(8j&IZ7=b*Iw${|^x{3sH z9z*sz{ZGP8z|rRw6w)>tx-{A0vM+qYd~bOu-Y47A1Qik^0k<^)BJDs%VZk9vIOptB=1aT&&oF= z7~kT8b)sbLTj)dXJmzV|i|ad8bUcZXDlcuUQD(Po-_5W}k_k7Gdi1GRxwIF+a){tT z8thm1rWw6Ck~=)2^{hfmq}V$8VXYBuO?dAn5$0r%A09@BZjKk}lVp{_ZEF_w;f%T( zA4_yfgE#$hD}}@+GXp;SriBLhWUW>o@4<9t`Z!(+4)Vt_Vp93c9rIe#Ma|sa){pEx zj{K;-ez&30gg>^0I$)rM_+?Qqj_l=Ja9>ZVzhC`6fYw9&i}_jXR4=bm-Z)^%_rXK1 zu$(-V`9igTf^!UZPwuH zR8cY5)An}cy(La?B^^6HV}(WseIhkJVb|pQTi~NqOQlN0%BHZo43E6cbjJv>Ql;xc zM%tZsS}mI+NP$H^3=$)T#Glu<$e&ip=g+A%AF&gS$_;Z`+o;UNz=Rg?0x?nTKP1?u z2MYDt+S=Mn>p;Re(B51XpxTSQyumv?Rg`!!Ho{x^1tyDhf=-pdPP} zU2Gh^x8v9Bh4T+w3!e_Z@Imz(lgSZ%;o)+?>m(XoQnE-Q^c010i77V4Ae4^v>IZo7 zvng#wp#}~0sn`lEPf~@llcubd8TY5vOUQW}Z`)@f (3bmocPDVW;u#vUyH5Q;AU zAz3PAqFvR-p!$rb6_~2zUgwQ4EkVKm&#*}Dpr;qcZei#Li-cH>hD?){z^6|rJBbAo zUcV4YG0I4lC7a#TRJ(h%G!w>o=*HKTUJ;~JSwqxm*l9)~@$}Qm#cML^r)SM7@^p9p zU&T-VC&5Zb0JY)na@cmWvSR^R>76DN+^zxyP&p26k0)tQcA??&l+1AkIZ) zN{eZrj>B?*df;}Qp`Dt67JB1*EK-X<1K)fXa&$D*Y(F+#-9 zv{LZu(SZCXYpKrl#`$hz7yNa*ZXVtzulrM0L=C^JML2AIMF2LXzj5OrJF_4sRD8w+ ztjF6zXPV)BNNMxbgymnfOcPuUxfO4Y+o8WDu2Rz}Oir{tD-m8t+EP#3^;hJ3IT&#D zvY6?hn`q(DvoK68C>E8KvB88o0U!jkOInA2C()~+5AF?i)98O`ijp)eN_sQX#>DC> zD^;hy%o%Rg_C8?_3;cEf^`%KHS&y{Wwn7_;=F^x8@=u4#Q5#K}YAe(ikU6FwHAe*p ziKb0SbmO6uir{q{X6xM1A{Ur z&Fsy2b)I8a?-WY4l(Z}bFz_j)8}04e^(hLko2#29^}c2Am-?Vy{<6|Rn=G}tu8BE1 zi>}@%EmqN55mqbF(GuL-#AFBbUQMkla8x0h zvsHG!YIY|pwVf@D-I?xKjJi5L%i=7P#)3lKg<I;AafoP4Uz{IK|aohcT{`3 zBL({NUL1V2d!&gr`HxOi#@{e}JyCwhphxC#K;_w##wFA)1$nZYk|fj8cpawoMLg5Z z#ZX9v;cB6jt@!bWQJyX~0MZyST>qnNNaYrEWgl{JnKmc&jr`d(R^xDj89#>;OEm#U zd2K;zt9ol5WAHQRj^OKPt!t9x0L~EiDc1aSH+-C{tdwL5ro&%qhGkX4Kv+Unx&K;K z-w%WBi-3jAh4&~N$_P%bE;upN27FqrZxMQO2KgMC&SNc#&E7yWco;v#aZ_HIRo^Q& z^wn6c^)*u0J8`S84Skz?uPIJret8EUj6d$kk*QIg-Z~ae(k?ZLx%i}HU3d5a0Zbe> z9-Pr$!IgG1zwbx~>EXm@qL%r#k;R5etC)ui-6e!dbhZ)^8uz{TNL{)G{P**i7LwuA z{WgvqwDN_-n6s- za%H#VRv%Tze=ri1;Fl>LUlm=#Wx(_i3qGaz+v9|3ogn379~wX^VcoC({BM0wE2aOv z$0NVD#1U;vuMhqSTGe=tk^O^E)mW7hm(Cg=8~`a^NiswsEa{(GI)2)ByZyQP6k@l2 zEt;RAj|+T~wf>U89%K5qU3lL=cHt+@kGkfrIO3wDgR=MWuXtiA_&J<$8Bi0B_a6|6 zcMjhd>7267PcNlHwnbV~7r(9pr|SQffOPnlT5;sI?R}Kam3MjkZ80r615U=JRn?^x zfv(K5ggG&c^!J#szX(nm3w0sY-_~6aaP0BMH6Ujysf%y5DS2SKS7#MA7wuy#M7J+8 z)RUiYPN>d536=2MR%d2YvFRG0_lT>lEJPr`7zk|92Z^9%k5^MSd}Ot%E(@rf9%vkkwRy?-s)QJ zxMjm+ffYqg=kaR>_Q#IxS64#4rYKo|;r0{>l?<-HJFcN_oH zo91yoqj;>>-F_kk4l!mfBXG*0>=+h5(?hN7Mn?G<6t>q0VCiGut?L4tQQi375<=I^_5z7zRp=bu%b7}0I}vnOhS=j)fcxh^wLvyUF?z8A%BpV{JyACgolwC7OdU$Fb+)<9+1m zxJ6s1*M^*XobL9pFHey~x38gkn*q^RO^WWe(hhApzq@+$npi^4G~E==^?*pN=vim! zvEZxZVs&TCWh#>#`@6&V*VdkmoVUfreBOPSP?!|R*Jbs!P=dDZO*VttR17uJPB&;P z?_YUjAFfho;BH_^#Fq%H5IB1M@E4NdzZ(35ZTBxP{VO!U+3~-6KIpnF2%79oC+URJ zZhFAw`gTLM;eFuogD8j@n}VUIH3tabA9cPX1Q4Z|Bg~Y7MrZFP3jB649HLZHwyIcROtWO z@9K+_5gSh(vy3(O@bZu@eU6DP{@k>f80mC?+AfW^Q0bwbBe9yvB_jGvR#%;QWeIB+xaC#=lU+s0_Jzj+*jbji3O*WU%H9?LH6DSMx$?TvhR4 zdX6Z(TzK)71TeG~T1z!UvS_Kfq@f>3IwmCBUvf1fe8{ZO?FL&2MEApQlpH8NT;tzT zk}BInb)U4wj+c)wNnmZO`8+0~alA8CcC|IuXKAOynP$LuAqiAfRf)Vw(h8c~mg{0k zr#Az$Tn)AU5;-y<)B`r zH*`nz+cNu^hh6DcN{3ppy^s$%u9>RU{bkKIdNtuE$5QoI8+G$Y7i~h=0d%Fr4v}#< zP9#~LEH6d_pE$W4KQBve{Iv6&>5<|V0&sDeJ}a)Zc59RNq&7{ch|*lA2*@4Z%=~0V z7mcETg>$<>H7qPu^%i9WMmm-nTqtHsVX7j5R$l9ag>#ifnDF(FQe-!$ZC^Z=mZ1te zq@-aS#q&2toyS-_ctNm}YIB>c<;s-wjSqUe32+_fAQP;vj#H{ z-=ChQAqF4d{H2Eji#>yx3}~*^UuIKPXsW!iN_x@g-a1igKl}k~8!zKjatyZ#4`CtQ zSeI^m-QT_=8>rzJ`rY7p8CDga*Bj2n3woHCS+ONuk1l9MAy394!maF_>oghfXirzM$m(>|&S&Nev} z-PQ)J#JJcTLG-_rfZVIN3&v4;4N47?_Qc>%(<24j zt}_f$%n*w-^g2*b?z4i22}R%P%{T$}XcE~k?sjE_+uB0!t33+QKQx8jQ4dwEYHBO@ zD^iv!Xs09+IOV~sDe5h@lifC_%55pOv~-B!;zJ82aBbl5H)ZOdbB-fHa}f46enp*J zF#n?F8ou`BlUg@J5=+RMRJRk6CVq=I-aa!i31K|bP`PIun$g&}93kd`Jz`AH_IF)u}JTJ5bs(1r~|RDSU&?@Qhx@+plv zG#RJVpg25yDJ}s4+K4D-apXPWmt9IW0e;rb6vG|M#7b*c2?Lwbbn5)n0)4&4_0v_g zip&DwY%eM^iOgJ=y{~(^M=H%AB^g5XfA>*>O2Wl2o+Q3NpaEp2qlnWoJ>q~PEtb|@ zEcYLvZ1`4b8vq9gt3W4Illa}|-dsR$b?Y9@nrM29-YXwPdSj7T&^fCFWsB2G>1cN>*J z03f>yu)G`(t6beq`T+{hzVYpE#O=*@A+Z~8Mt|dLZ#?jSkN;bd|KqC5j2fHgwVb$W zn$N*?h;9y^u)5O;iptd~JA?EJdQJnF`i`8{@kFIeuzHwhB|X~ujcfJ9o6n`Jlw z8b%kdY?E&M$^Sh-^1o6`xU(^mhOZ|`91jbO!W#v*yW+z_{#)_)kAAUNKPQhV^ySm1 zhqdo1UlNhXO>l6jsA8?gdB^|Vr0({2lX{s589=##NCq;MDBxu>3P!lD3jm5J*5^3@ zfu;tsNmdRtICt;=wRrw?gqGj!?#N9P2FWque&eLfJnS|*g1Kc(E?opspHiP>+hfNq zOj4G;wCFj~9lOV=aeTcX*l}z$5^}{SBA6$ngpo|0>7=fhov)YMBoR+{J5%DJD%HnY z-BVF#Efbyss6kIHHsYRf?m{No^7h!`HTn0Kn%Q#?>INcE9vTHZr>7k}J|nOd@+iyS z)E9}hPn=v{TA!dcNTQ&o#ZcT6Jifhp*qeuqnwM2yh7XBbF>ZK8%oHcE3y`XzeDb{0 z?OX18CCo6QF>tbPpg9RW8S>HNq~Qq%3o%11UFh{5rN2D8_tgUG+>b3743yK+T~1h_Q@M2fQZn(yE^JjxLX|J2FK^|CIr~jq3|3Qtu8dvL|PYa0EMy%m0}GrNYYR5PaK&4ut#4T zxAn^CCIAf9U|xe?Aj!1{ca*fkmni#<<&z*&K3%G)C!fN@z#Vl~P5WbZ zmRSl&-l&HLdd#cJCR#cri+6wAcLymx=m4ILu<8F4T>Ib-F8Ba9S9q-61;38d$C>9 zTx4y`4l&a%8TPJ&2eVuIu zXWzLV`g*<86BSTIRmOF)j`Us zd$r@O=MhT7g6NnBacxvZ|9PSdztPXhiIV+}r{~!01vsyJje!8e`i}j9lE~I~mL=mya>rIGPXsA&8?j}NU%yVrz~GV)dK#`pAu>3~*E4?! zCbiyk=-tQT4t1WQ7>9N?$=9e=eQK(*2QSu+2K%q?`X8(aBvCmx3+)PD^!ch4WZXBH zuCGoUUjA;!L06l4=0hNh_Gyux&z$xnCFPOx^KlWS(m82}0~n6Gt=s&`+bdX}f#8lQ zYW?FU7J(M(Ac2*1kdVdyrvRw|gxd=C$3_a4v_ad`Y&yH~1`32O6;k?wSoCN?lmxeN z+qzY2&)@nY;#64EC_YB5Bji8x>5tOs(bK1sHGOSojG~B^YV#=k&o+kq#x;&+l0ro! zvqv1Qof<5==fA%F_A++#zI&INP_1q}5_Y$f3V%>*|1|pU+*Z~GoLFt9w?xtm`AmVb zv~r8y1Jet{d56#Bs&tS#0cB=uY);9d)Z_k$He@bKh?&T&F$mU&N!AO<8B97;B=pS7 z!-Z`qxgKV3KRanH*weL>wt*=)yfKVu{(EmCf2-*q9PQ1&{E{+<|5pL9ouM&?a3f{l z+{iZX7XUqQ1NlbNFUz{(oT&_#iK6ptytKNMT$IBrz9XKu=i%+nPd3k|L1m<_ z@Ao(a`-WaBil^XtCJL;*+vMKFER~iKer0?#u&7#h*GO(%mLW>D@!dsiXW`0d0!>Gp zA`|&{;U6F-3Rot@+@%Wy)hzE-e#R~^LSz*N>N=PVn-MKt8IE~4e>#`sdFz%QQQ8Sw zpfZT^o5kukE2!aSgZs*S^H5QrBb~hUoHEtj3blyCpj{UZF9eZ)7-;oW{Pxp|wi&Gw z^=FmI5Bd4Wd%4#N}BTH9#@JcBvvAlebC+WGT5c^kh~8IT|+K-E$V}%3Vp{;#rvqF6w1u04b{!7B#d6 zuT1(%oBOzCR2k@xknC;5J$@QBdRHqZ2xG#@Yd^}x4wy+tM*9qI*JGTo@KA7fMU-HU z45UY12fIxShm)czNMT3)e>MN)t>(!0EvcrC<~B4*U`O(90td#w3H?OUMQyu(+I|0x zHU~bpgx@t?+L+GQeUhs0agGh+*)ag~D~|J=cU8*db;Zt#EEouZRap2uoMsi!BAir8 z6#y4wsk~@iV01RqeVq>4#msfp<`)uO$jGKBp0!~ECq6ctcf-MYZVSAr>RyJDU<+E0 zq%>8~rU!+Ay6xZ$O3nfK^IK!vBpkg2`%T!Dfszpx4sAmnM<|R#%Juq%OIo8R0H@DZ zjIF-UdsT%n%bC43inWbQZnnYKL(w<*-OAYYNA# zA@Ycl0PA9$N=C^+gh#A*)o427(b8TiVjlH!x}p4{ejX9~s_%N+yl4_mh|)cheeQj! zH@+T){H!N~JNzX?)gocYnS}sDRvQy{9WMlFK#O{ZSqkj{Ain%S4i<+i+9pnJA(mtN zlC@=M3Gkk8N`o2CvS}dJK%16e88$RJ6XMbP{I&Y{Tv5<-4YnyyrbTv9tP~L+A@8tE za1O+KM|YwIXLgo3vAHP>LM*&e^I68BfC?2oAUP&b8h;^A>;O6z23n^dZ+iIfL?_nB zAi3o;o9T1`-zfci;aF)n#noybD(*Ve6=qR6?n`&8!9dC8fnhtsB--2Z#bbm&9F-Hh zbiMlsin5SiY$QsE@~Pc)iQClOB1!wWv!JKqlVz(-x+a|z8^Y!5^@)#Dz*^DD{+%H( z{#)(Mxpubnu@O6}beWEFh`&;3#JATQa;L}lq1p}DOsGlK<05pVDi4-tq~NHs#@D&@ z<~@gKEURzl85o$p?JMIg#VPT3kW6(P=GVmOS%oc0y|^36#F^mq3bFTaX@gA6EK1sS zLQR5fhN7D-c|$@iGtp}`@-qlp%3N;xMpY71uzlFI{Av# z(iZ^Jk7WUX8V8P$qkv-_=B+ez7FKNYo;1&XCgN_#66LF1}1 z)%OaIQWS{YC^UT==~=iFNdZ6_fb~1q){nlvlW`7T`~iA63Lu>Zff`aKP(q>tI{H={ zK8NUj;ZGt_2*ncdA)h!TD!bBbA#FU~7@3`6XZ|E+EH)xIypRgp z*^;2#zhY*ULk6o{dF=lH#clrbFO3fIl5C3YbPx!q>hF!WduQ`Z?kiHrF0!1?U-{@1 zigSX(D$}Vx?_Gf#rsOL^F1f*7<1)93`<*VH;GkqA`1VdzdXs|yrT;_wGzTR$G~da@ z4`*AEilwatlBR__Ge)&}=JASl%=HIDM`R=eGYiSL$L{*L_^A6eTwO8pOX(oLkdywE zhCGlr9o{!wrRfRe3|P{$6+ht$Sg8xRN&>jDM5Sp1I^?;0!2dGE?7c3ca*H9={j|~T~et^6ZWL2P&`x++W;XdL&&&bF+*b(Zm zG-1-vKw>p;3Xj{dElidwws_mt$D;WS<-G`YF7Dh^y5P7)hDv>fY2E@;*itr&Tq<~E zZ$4PC*YI#G5I}I=RMAiN-bU7Wd1gbRyBbQHjs_6lA2wCYmaDK(9S5p_zJXcKT0<+H zBead|x}0VF91)>fSE*hPl2mszvG^Oac9BJ13thu4F$tSfvw|Q5Mbji-MU2R?J zFvhn6W@&Npj&{}L^Y{IC-?;R{Q{QkYSgwtD*G4|@s>7l1jj2E4HIK8kC^QE2EJbd4F$JE9V&>;MDP<`@?G_kPk@rfemvvxoednKns|@1p zux9vVfkPz03q#j5>XX3V4PTAR_IBxAS7pt7cW#kfGxFpJ9b25(-v1G7=X_rTz}G8= z8_7C~jdaHJCCd+71kU-MGsk&8c2Lm~>}vx7#h~9sS+UU2#yg(zWrCEePdv>+qEZ~- z%!~P^xgP%)^_OL5EsjmjiiJBVCHEoeN31rgHY7~6UD=2B`I%WZFYRntL@O7`tPz89zDll+^_t9VBf33nJ3>K z-qD&MSYNnQ@=(aEBcP32lAv1w+=?Ou6qLay*$raCj~iTr&i8tDY{;#|VD8CiYY6|J6ZGfDS=w$KUJ4I2Irg83G^;|1lr$j4@?>^J@Kr4ZURu4e|MZ zA0B1$S>dnNfeziDmf2kDJ4WbM&Gi$=c}RrbFHTP=;kh{`YKx5L@$e2^ zT^;iVd=6OqJcxGct9qRKXhK(@Y*o>_7%#IOY5VE)a)vKbcgOc!GmJSGTggB?n0*O< z*Qawz;3f@@XgFn+sq!a2vM__fd#XL)N6+uBV)VO{Zj|NOm3`?+E%-X$2`;hWo8ni! zPFIX)Q0Gq?q49N_`#LPakVY+e{DEc}5n}q$Mq5s`CA8EY{LM|%9z*`U0VzDjcK?bk z5+51V5ORHRQi2INIJY%o!{zg;whI>^QWvmJCnJ)IU`Jbdr6GZ&sd4x5iKHf$SbFZ- zktbpekJ^^wo6g`Ez$Hx?ZOJDq;xrq@#uzQDG zUpO9SwYd``7Ko~02H}poq*glC1hNOr7^cC3n1b{{K40qD-MrEn6MujdJwnfV^w%G# zmCMSBP!e!&s+2ls+!!evNmBO)I3U^w=ww=1kpK~D*#7eahfKFKomwPiJuIGLEp>Mf z{_0g6fOBG&6&@lddl<)j%}Q;x$jtglqS53|e7Z7-Of(S6{g06XIuHjyx5hTj*;;E) zILa3#nqUW(%*qcZf?&GYHHo8+(L4bP&9pln-FhS`T*Kqx*DTKgdPVe42Fa2Pj|Dez z_%Q2F|2V27O)wZ7S<|@bY>PAp<-hH#uATY0O-A zy;iv{YFeNN)XzzjIRfxf_!7{`Gah|c!D~R`QEZmrb=HBLAPK=?EUi8S_4}S18jU_T zUbqh+*qf!1S9RyW-9l%nl5x96&66=x54cIvtlzYBxafGeMj*CSrNK)Eb_#G>WP8|5 z!0G4gwnE0s0X+N_!`3TyN8l}QWC2Lr{svbsZ)$`XwNT!dEiq<>{-q-LPLOUUfdm0R z6`76z=A3$tF~II!rdG|{XnjoX9*06_f3MNQHI0+(gmJR|#ZA$EfN*9zfHtXufJMM1 z$yqS9>}Z1REk3|$r0am4)D#a_N3hCSx!09V?Ie=8>TPC?(4Bic;g98WUP-zOYPX3> zf?iMD`=hXR$cb_B&BysbZ@yu`m6jaUUNm7`KNT`Dnj14Vah=vE5F1Ny^&85F$sbK$ z`C^N!K#!M-bArQ!eER_xp5)HNUHm02sQ409V{%@7s!WQ`o3;^#&lN96G#N4){DgFX z*t{`I@g*OK3ex`+|MF;YMJ8}(ElDzCMxFE zZn;E{@XZeynGWT!{CGXe$WSKEE^@e#>wYko5@yS#n8kZ^hjma9D^~8K{i@F6KWHNM zN-X5Db9P}@c&rG0D1~cOGg+`o;p)V_8HhRsmc5w~3d_1++`KUgMTUBP`=-zo=N|@q z2;2ea0bvZXsn(-|(GF1zVd=?(ZndR55y^?Y9{bSP+3pb@Nnw+q5-mh?`kK_g6=LE# z^~x~%56)j+mmyVclQOff@HRiD|8dmvLoUJXq1XLqJjP0yw!}kVAI}`awngv9&;mKH>2m5e4=XfvbMG#?C6&(eG9jk(3A5?!3l^GJJRCdJHwMYA)yjZ(g(L75>ea{ zS;rk8irZFRZT(Tk(sE$#o{FJa<9Va@D^_#;jy#+}e)4Fp+O0J_Bj2%YfQkSK4RD2s zq1+#4`;X|MnMtv}M&|)IEpUK&g+b|mpWJ7EfNX6tP6)?=Rh>;7`6L>y#ElF}2|%I) z^^0zud%w3J9Ju1^hO}~sJfK1+sU!}NsjUDUMaA#_pj)8j{f4~Rmm0vy^T)gl0F>_x zU|6-few#am18&F*+;f)~@L59z0Q~}23Y-@$-w5V^YOB< zxL^EM%~2d1ML?~w%*Dlf3fSV{WJ?1&gaT`Wuc)NYVTg1?ISg=<7BTzhe_8laM!3Rd O0x!OYG38 diff --git a/web/webfiles/img/hydra_start.jpg b/web/webfiles/img/hydra_start.jpg index 841d78004ddd8d9a811a00b59fa9e715b68b5988..e6187355212dcc069e45d13abb2f70596ca5b37d 100644 GIT binary patch literal 44345 zcmeFY1yo$iwkX=T2WVUp+$GRBfdp-=ap*wf?hZi$!M#avhv4qecu0a<1C2BuLI@Hh z2@nV*A$+psoW0+;cbt3Qf9H>P$M|c)?3z-uR>_(*SJkTPrR%o(Qjk*Krf0fyo1T%8nO%^JnU$Z7k&#=1 zhhIooR8*9SOG;J}BqJyy3i@RPgMfg5n24B`goGBv!pH*pZ(rB_0CIc`4@`b63|0Up zIR+Lv#`Pe8;pQeWv3}j|KQ1gBOl({Xyc;16#;@xif?o*?Oswk_05R50E;1~#8@l>j z^VSdl7tgWi77eF0LV6g37gG#fysZmmuVhuPzRr(~3Cq}hVCws3^FF%}^yS$`i0}zS zn=VM@Q(yKaCl~w$+t&?9a2mz1dCK=s75CNRx9;9#n`2@hJkBb6^8LfJRO^5V)U3~9 zZ_q?zfrISQm?4WpzaQiBW4kT=$q)BvtBtgvLk_K!EwChdBlCyLs@7}sJv8qeyA51z(ez2QOWc7%B;+bofT}Pw2JC zt$>ffkLW}W#}?>+jNFwYdX4yoBHE1klvDpJ=zhq`vEdsxr+p3g$}_k5K57O(SoM># z95+L9nuP3$dUa$v!eFwUP)Z|2lOK3wR@31u|EMgvXSu#WeC_aqzgc;w@n1U$<7B$} zM@vs*aHg4R9gaPE6t$x2EIwRkvZakg6@UC`+4X*J(TM+jXx)9OaC!7d!r%o9w$72k z+=0Cv1<>gSyg$TP(=8+)vKwhR`(}>82%-7RgfnKU*S6(@t&!S}ovrxF4#Uc0+@Q;S z3fK8%dWyv*T03ISwQrB3?$`*6lDpA=m(IkkL|o+cWc09iBW)g!4i5%(Wx0ynG#d94 zpD!NyBQ~=>{@^z+?2p_J9qj`@_QsgZi?jFD5NV zbe5Qoy$wv}xCPTf5+zhu?9O1w&6D?m8#`fmL$4D(-L2b(q zj5}Qmo5-gHNcX%|(?Kp+Rrx(CWvc}h7xPO&>ZYO$-E;}k3V!5{BIpLy3Ys>b0Y-RR+MPSc;q-MjCkO&wKK zvP9;7wJC<;>GRUyoqKoE@;0PZBxKFIWZzvPFU(z0Q?RaQw~D97&AN(bZ_2HoJj!zS z#;O``@$nje=l9gY=+F?x1>SbkFvJP(+p5Nqw*?Xf3N1v+6O#|dSa-do{bZ$75$1$Y$-+_KOf@Rm8yxJMGC7+4$Mk=1P%BS}!C0CRDMJpTA1 zyz$7c>(-B=U*>;Z#h25lKA+pqG$+5<*PZ22z2wY{cPcEzH96}j3lfhgcNG&}r>ApI zNYaW^#NBHg9(}lFD<&oo)BYl^VR%x$-csx&TfW+s&-M*{pIgFF^{d~k-k?A4-Ti~~ zY|Fg`y~Q(y7(ux1(oxu-8h`u!^GQUXm^ld*{Y~^w;?Hh4>&=2exc|xjTk6m8F6+U8 zP9yxA=r6<{^+sM9hD&2>f9wUHBs$mqn3)x@uXz(cL+}f(7Do#nig^S!GHQrHkEJnw z!GrEging-)%ocIjlRP&I&1|6tL7m^Uf7dr==|eLJVD!yRE=LGpZUYJcsLREfCm|M! zO^r>M=Q>Iw8o zV1)%f06=F$P;BPNYu8NY=$^3Ww#8e|F?Tl%$78xL@^pWntFcpTl}si6JmLKbebOfq z&T~8O0l8y00`q11$@3(RYk;(Uca@Mf!Mgw~4}~(k0k|JC2;-Of*y!Nc7LPrSXq-w(BI%gi=9)F(3LiLOiU-_=(#eGCy;z?|bv@lO)! zep+U7;F$Em1*btQVsRzKF^X1j+mamVXT-`}uY%tt5 z5~mxo$VK&r#Dam_NF3>BZ%8?G$_@G7Q!WzjVu4X4q8V>*!i1yvG`CFk+$D332AS_2 zUgEm7a#QP=rrH@j;}Z;MQ`J>2a&#dn(3FULeO~IQ40l_4#J1D=&A!$6O2oMCXHFeD z6oPhnP~jr>d`>KP`a>?#;S19KUn)djY65}L0m*(xKh@3GH%Aek$D=yKKfwjyHm?46 zM~u8=&y1*lg5928#D(iL{7S~pb zrR|SL;Af1Iy$G}ZmpFMFrV8u1Q+k8CN!dN4Nt6`u<7>d@&`a&$^887JN^MhYVJ=a zoHTs0FzO&lDn!z||_fp{1y|KgnCALxPX4@hg+7p*Q zOG&5Kf*tcE)5-a*zk6k$_Wd{#tlS9fS#-!8a7PG(wp1R{^H1vu-m|#Kr%ho-jMco3 zZN6^7dp1Vb)JU#OB8RdDjWJ1gb z>OaAIv0M4?z?Hu0oA?JLc(5w|gZRaS|A=gmUt~T=_5)ESrrM2x-sgBjx;RbK1l6+G zC;m4XVrgQo`YX=|@>{}0xCu>C-^oTCBn>CmB$v^oo|tQl1>WU&-<$P+D#`cK^d9AT z<>!x_+$;|vtE5j0={Rh{83#$q%h6ddGbg|Q4}KOlo({=Y|B!JfRwCKc;v5uxxFc>Q zLI$@r0Ob0#B<$ksY$Y0235-8BGc zI66oR0~7?PHcE5~se7^TbULc1kDgRYRa@14=47fNDGYTW`{JeT9C{0LmjxD1 z-VDIM>q+iKkL$D^H#WtP?mxu*YJknVlve#MbKzS$u_iU7J67GI$_pZS7DBIRpV|h; z78X`++07mF0Biq6oVzEC)RUY=6EM_p%R!ic;L#mmN7-7%<5-zkR%_yEo?bkPbc74F z3bEU?j%%}=Mk9k~=ZRQi9qo%qTUKG^t6`SCcZKsm?}!fT(Ko~y)dY$x3a-nM2{Mn3 zN)OV#6^UwUP(^1;(25dJC=#>l3eBo9Dlv0Fy`5i6W=D!l8N4Tx*|rwP-NtsgowHwX zNZ5>9s+45BzVZmH0Dhs5ojL5yGcQ^!UFQ819&K+}A$6P}9MP+QG);?GfSgShS%XKX=qJ}hONHp+F0&QL7uohW_a zE#XxRoKXtpNlq60fw*bRCVqwfZ7i+M2FGo)qxa?JyU0OQdf(LVjd**LRajzbrpl|$O3=0D zjt@_plTWw0ing$;3&=mVQpwU?R#wdbv(CWmdteLw#gOs*&48hryK;l0*ZQA5_M zp)Ag%6VU<6ly)0lulJo~3~IGlYx-RlM{*{C<8LOSI53Jpq|)=apB>R~S|KO(HDlyZ zet2Av`(0+VHEdw3l(dmkif8C8)0d^#(uBwQ7hXcNNwz?p4x`jXygaj7F1R9ILD*B1 z<0?9YNO(8WbTkvXvKWNa*lk=-GwE4hHTw%er%pe?w%e{pvZ&0 zS%)iDUF2I;s{BZ6XE(?ZchCC)?(r!rC2yf3S3o1L55Uz#y3igOaUhK zoM|Czil|?n^PY%Wzme9f+a+G^ubMA;GRaGfUvV-a?8&$3CZ?%P;qPD7$PaE$B=dLS zIiBn06vNo_p0<6pq8;~OO%*HVY;^XFx0D^T3d?7+I9AZl?MAIf#f{>K=8+awrj0+U z?s*X)GSy^Dm)+%!hd)4Gd4*pvGTboJw}+;EwWCf8`Rcly$NBU0cRxg0aaTA_ zR}8kW>4=>rNO>U6#-rR+k^mHHlbsO$sr#(v=jyFVHhgfI5i|igN+H2qca>%&^!lY! zwyk%+NV7ynL{l^?c%h!r0asNMIKrJR5>-;)+Et=we-CO-IVPnxs->wmWf|jHZ%!6I zjvV!p%j6!7jBKyER3r+EenED^mpa^JaZ=-x$%~!iV7i^Q#J_3XR#_G3%`3t;Iem{c z{F&LP#P`nMd)_k!q6%QmjH`^gBWUG@b zsIq}b?nPoN3}UwqTocyO@Njz1aMlGrFbIDa6N+Ki#JG*G>GnEZj$3k2SbR;yvCRN1 zDWkwWG=j$kZ12E-Lv9cERnewp@W!tsA)k{}O7Tq4x5TL=OQ7(2y8!jx--AgN-i)moHLgVvsoRYq5kjD{#~xj}!uxz&Zd1vujW2+d~85v(vsLThRE7k}bBWg}35`bCn5s z=h<`ernCLLCmrX1++(0_&f&vy^SXLedKD(TM8n8(yxwYgju~vnD^`97$1HoMo|5bp zW`Pj7;;kCV@y>EuR6W+jt!fs9rWpAst1Au&g^yL_mO+0m){TymP`CpGTdCBvkx{yi zgIBD~FQ|0&nTfuNiN4b3{WN&>!}Lmpwh=LZ4gPz05z$4jdP*Ettr}jgNJ(IlgZqa!6LTF;ex$_J|8ScRgsa z&xoWKy;Kelx3&k17HJKwYoV+cRdvyi_2TKbx-(|gdyh%lshQ8Iyr+zU8&hq>cP40O z^C3PwX6&!+C#~qHhnM)D$+27W_B5F23++nfiff2Kk}T(x-=qgBFIT8hH-4r4W5~tl z&=wq#;)iH1xENw>SvxD@}qZ z2)TNpL$qwmR4ecv*=U$`$1Q0kPW)@YpEKeKCV+`d#%+Q!Y_;I_sr5$x5n$%2fVpRV zJlGRnDtQg){$uL={7wlbsOPt#JG1&+^Gd`jMT&uNHc~F)cF;i0gRe$^c+n?J7yQ5b zG0B&tKd66q-i#KpKZ*VbQSJ_0190MkBr6dQVre$70TF+gPyBohcy0Z=V;Q;#efwL_ z#R&Y6ea?wS)Vt`-BLviT(}=&9{GwpLp&OQlUf}zI`+NUjp?|S{y4Xi?gy>3@9n{Fo!0P>27fIg5!fgeEZCDrvj(vpu^mt^xKe#}}0d z?ZvC;ZwWyq6*9?@RS}W+23JhYKRKpwR|;Ddq~)pYv{B!g-d(mO(%p0VS;zcs`wLrZ zz0?#rQpQ}N=i=w|#s1b(J_+YaNKJ7d+2yPEPMU8RGI4NI15`8W?1rzhV@KW*RR=TtOSx?0;jZH@B*`d^;B)?!v^s_G$3{42`65_j(} zX?E{2IZS_t{rK;~9>N3~o?Eif%GT@N9fyPWA5fl`)x-~vw>@Qyec+EEQT#cG=+vmw#eUDrDoB)&Ji200n;yr^rIDeAi{2_ z`u`q`Rzcik^jB^P;$wAVJ{2*Je=~1(r2Ky?(i`3%>nRf4BOJ1M7jv_Y$4m~u0$^fb zWBqdt76XV$&WuIIA`FsC{%zszW+UEfryHQ=U%J2xfVto_|=Xa1uIOdtk1vn7`BANDbS*6YYUw>v6Qq;3PW|z~kjChBmU(!#d)cVJQCGG=Ey%yc1=v9ox1144VOD zr(>;Nl_-@Xw(h+_ECO;aN|WnQ$V}sh^*Z7&SK71L7RWQO9}c?CwUW1J6(yxUvKDt* zj$7u^0gv4iW)QuRq*dK0Whdp{NYv(UlqSK*8wvY9{xX+6oBfR>)eqY>t(Cm>MlvQH zA+C0l{oiPq)d-Yk{N&Ycq9Vr_&#rd5KwTDlv8AAPI&Pp8ag&RNCFwX$jucU%9ODvh z#+lp$=;)9pj)BEtxM?1{w7g~p&12>$WnEj-lH{nj98dQ;H1Rxmc9Muuji=>RIsBvP zXOCeT$_wTF)HaD!d5)KDrF?u=uq9r3bRT&%kL; zE{ejAN2AgNvxA&YN`u*PrT7*4V!W_cLqPql2mBkt&ARMOg|Kj+u-kEb(s7~(9O3~t z3AVNgwqD($VA!JGpv~T(ZNC^Cz8LBl=9Cx~==*Of^WC=l1YgT)+Qou}RHX^}ta`qy zKz!Ft=}~nW?V3;rqA&6fSjtLedU*9F)zrKXK+CP5w&uV@3XWO(09X!ewU2b2jQ8BN z#{E>DZY%W5kGH%?QKq@mq~`tMr867Xpk`>H){*M!ojSK?Q1Ovk2AhRHMDFVr`EIMV zr%642PrN$Z8>hsN7A}X^yI)GKc0Al=c(ngx>wlmM&vf3)%3a#0B*$`MG!~J;x^Zte zD6w??E+mG2F%_pecZO=5f^}#=DGNQ>_XoRc*1Jhm)RTPazB;}ul0gmaE4v#7b3O$~ z4B+AF>gqA&^2B#L*;}z2A=gXvd z%%3=)Wp8D&FlJ>=7wYMDWN@2BSjg6Jf17*}NQ!>Z7xRvrTR_ zwI;2P*Q34SAGt1-!d~Vk7smGtYSE3AjG+hwOEGq$1rtrE^R)8WBy59LVi$;uaTdB4 zelVl>ifAq3ch2MLpK&=4)qLv5$&twDsPE=5z?=-PfgyufWO@CE%5o=y5&%-0c0gE- zX6gQMqP1baQMPYUO`_6dYsfsRPS?(f#L9)}!=>U29%nO4qXvoOyO^{qA|3!te#EiW zg5i%({>*bF)p&gMZWnZp*+8t(TgIN zfbQfZw|&G&h?Ojbf1J;c;R@OnD<{`n4>AIOQRcZRX4!U8_Aq~iEuYnd6&EptgP#>< zPkl!7qhn07juvX9)F4;6)%4!#cyT|TAa!8?Il>i0KL#?$J#QGi*7gaLDN0R zG-NiH$1O^lah#l-L|A(i2|KT@HuPPrKycGJJ8xFKS`Wn{UgsF)&ie)zQ@Y=KTbocF zL#@`vp9j%Im6h!+qa~infOJrCT&h1ilp56wzkXxAc}%0TCmaQ}`RC?sk{_4`j4(gx zJbo&7<+a5a{%vbm3hQhHZgLGc{^Xp#LQ4Cdbn%YxC{u&Xf2!+^ckqms`sMK_uZEfb z(AaMZ+#45PdA&{|f4Bb|>pw7^01y9mu*LY)!7SJ&W%8gA?k!c|cl=aEq@hnpz*d9= zU;0KG{Y&M40;0&KXmTWu4^0IAj>Rx|O43CnLI4 zeQOgN!Be3~Ojun83G}W2wj41u=xfwc05Zf{{TbLo-UzMmmy={d*MWQV4XTx5!gUan z`w(vK&^#vmpDqQ9?9#YCtBsjb$moW?3t>IiDF}A#ud#ao! zXva&vE?6CHLIJSnrcJEj+XSZCl(5y(H-nvd5C^%Wq^wl$?#QYrr#(_ zte!c?^A#=YM20@tD@+Kj8>R=X3?Y7S5-E?Xo5PtCVhK z3Q6HIO=3jZ+6vC#UL>huHlcv}?9Znkg)sTLm~}|b`nX$mL`du~&pt$rbLv3N+BfOF zE2_K05|NrLfXr9BgwpNO<-IJJ57k5ptFqy3X@Z6=8x3)D8Dg6A*yheo_?wOzMWyc5 zn4*#Ker%F{?g@1I59KRp zYl1Wv^6hEB{V;I*K}n41YtTae`ogD*J(zl~S&ggSF=js`r_^ltheNL<6-z?)_^kem2U6FK^7Ccu%a+Kzx^pJw_ zQ^U1FdedTFu{k_Tz)a{Ib;bRF^o3uTxLM3Ywg?>~;Et$L(D zedAAb=6q(66@4wAD#cu=@7R?AC(9|zDPKE%w3l71*GoUUoCL+#*HZVU^>NSDazjM; zmtN8jj?B*a*b0@?_^RhQX9_bRkw-DvoZPj1gypK`5~pUswlmJQNvWe?oivx4y0#CM zQBv)q6?mlr;CgN=buB<*sErT(V0GX^2{UY|H*iE$beaR~0-i52fg9KR=5*%1f-UBs zW;-pQ<=XZd;aVvkPVV2Vocn~PSv@s^UT5}oB5w<89C^f!&0~Z0y4movr=>KcYYsnl zo(8?;0gaKmV%=3NnKYsf`~n?~5UCAr&oW)#=|Nr$NKcmT`Xo5TBxS2Obz9rDi=z8K zS#DCh@sXWJw^jA0S1Lgv3t-kHHUFR@+dAj29_(+$FxLY}TRAXW=s~(e{WX9>Nu zKk-qBeGaOJ2y)rPzD&l(}_C$ z>u9d=b+5A@aDryjKdj&=>w(?^j=}2Lavs4VRAKr#*ehAUvlLod2waP(1-0LuJ&T*l;HiKX zc7v^yYStUY$7C^+X(WoKMoDV-W!_Y!Lr2oD0ZV9XA`n%Z8-<6;yi+jy>qx?DK+c5p zUmf~#%XarphH^2?W(#P`V`!iKZu}Z>VC`}V)=Twy0%M^S_z+fT<@nfvDORUUG{06)=l7c z{u^hbA~x#J@%rf+Q@j~=oChCXE>PrTTUHc#5Sv6FXEJg6q@wk9kjfq#2N7XB5-v(L z$?BRN3h!t1(i?tQnP!OFQ@@y^`S{9)jlvTAk8sVg{r2j<@R^Y?Z< zwbgESAtp!nw08o1adlsz)VI4?NlLF8j5s^zc#allEuSb((S<_B$bsZ8A3Z-k;?pURB_EUAf1**Rprg%l!lc z%{XL=?ka36t2K&~@d8A9Nl&F5~LbBv#_b-k}|^c-HaKQ$ygb+zabV7f~$vrZ;+$=LzAv{Q8yB-8&48tGOf|{WTCcL z)sF??G0ZSNF@v662sfVn)ahjNMLpeb$BMWFGQsU=Z>Dv@f!YqsL9!$aWU0mJ<+58m zA=4yGb~J3p6@hP3qhMVXxXA)qnFuN>w;A-PI=$gj38+XodWg@tLjgiTiAM#J)6HmXH=Ct^c3bo4r#5$s&j8iz^;b?m z`TljV+6M?n*V<>v8B&SQe72$hB5T!^`P2uI)HLM+#%)fAQQ70)O~A{r{S=cDJNNW< zcq+oQdy?K~?%-o%V^G=J zcHNoR?PIZ1;|eDZlJ+*D0Hq1g@*_K_%?f*UgRrgawPozQg8tMAY$)I6WxME?%tsMnd%3|}+kNC{ zOdXNYLKjz+<7-^N!*yxzLTjeK8=L8EZQI3RS36VLPHEh}oS|N;gL`@!=Sxrwa)xx6 z@@U6!F|gN87rn&`2x9`cP;9d}_=C}JoQUnZ4-=yJUczk=rIbOE}H(p6Zv(Tg-&MT8vmt{KNvNRKS zT<=m9C54zNU3(gYVe7h48h-+)2s?0#-4ulb9MD688NZk405yBZCnT!%wRafT$u5-z zh>ym0T5y6w{W5*;Y!dA)b~Ai#`3}dm6p80VxzOH)VBOW7a)*1 z9{50_Km}fGP5dHA_nTE6NqAO4nninx1a|Q>(5uyt@fMqBpvuOy^>Xc>O)!I!G`G$+vQv5|A1f4{TuK^5!IsQd zwfe_&;cfFd$kc?3r73hKI?xdsm?xo;?KHO#rH)i{dZJuwSbk=)V2yU16vx4d0N;yS zxE~O7uu9DUQp5TLjkw>Es+QlHpQ5p>!So4;QoNaCGX3+^wQrneHpuC&fPjF!V!%cz zg#?QYBxV8RnU(<+`M%}8|%aeGpYb!{V#E{7Od$m99IMKLu zze;KY>(|Ogd@Ae@_W~rObbbaI4zekv( zRAJL88Ic)X9M?bw7`IIgty3D?Y+kfpTVH+4hg9YQz(gLQ*ZJ%_UR4io0)RN4r>`?_ zyTPFyuhTgv?BBG9$4m-Y3rat#-Z_=aG;_c~_*2out@dF)lg)_kW>Yyyg&04*B}^|k+Dqj5gvq-a`Ms<2zYWFo zYGV1Z)a{WYrHqFe_cLBVqXjqUtRygm9w!1@MwE%f+LCJbRyy=cIKQ!favX2*eq#)u zsqUT6^&h+j@Wvt4%eEJLd~Lg_9}KiV6R)#P<0;QC4}FK?c%w8?v8+y2&i`CSU3-iF z5`GPMbPf3SIwMV6#5m=MBbm@NRFc|(f3R5tD%a%VJvjJNL_2frtNS&e?XMYzwFZ-Y z+;Ov%)NK6&lTx#K(O0wu4&0b#)W>3lF}+`UPNFjj*rd!JTSsPpqAFA4^j()aCHs&s z+RM^g>NxgX(d45u(L3*6bh8zMW^Ew5yb6_mH%QbNvNt=_!wyaFzZfkHT25!Dn%(W$ z1ro27jpc$oxed%iyu>P+jHhkuB1*M3{pp8QCsi^1PxTM8(>IrMDkmwqa@VoxwMy-? z`*OTV*UQ(*g>VJbE%MuYZ6w?xuI#7c%a?0jOH1+3lIfxfdY$9wUD zx4)dkCn(oeSN1G?KWr`fif;jaF|!e!wPxi2bIx%t_kYrO)q7S^Wy0eBq~Yr97Snqk zO4`tZzXjY}&El$K`VgW;7zdwP#x@33y8Gk48F+bAj%C?v+vNczg>A4&R3X}pUhlcX z*=~IL*tX+@f~fLvJ)L7!y#uLJ{2|ofK(xvStkD716qcVILmtI141-kKR@L=7oZD3S zIm6Oi!}DCeXda(MfC4ismlx(3n&Ak0$YZ+KP|hnucrkwo2|cgX%T)@_P&$VRgYO-o zD;$uUVVT|d^=1pUPE~yLMB5+Ap>30&?QNf;;S0sp~O4&;@PI~%2#OpJz z)_n*gw9dYBuIE}2|My2v;*4)>2jv}Eq zK91mfdQ3rOaxvsQ^2nQk(=Xk~i8nDNNvf1nVb=X_sSphJ3dL`~V%p{2p^@p@+|h$1 z0^6OWe*WGM%A#<}E(b=c?~U5`?yq|L_|i*rf*hRMThD5A9M>($LZnU|*7R)8oaPjM~jtR^(Y_=D9Gybxx1hjj`nKpfuO7mxe zORSeF3!ZKNeehXoweh!=>$UCt{0uWKQ}E(#i$T%D7Hz226J_QT4XFB?^FhfkPmTMq zAn8xRIGIgcFlq%VBCVhRxhmYOXQG5*P64N2fAO5@o$}8sY#Ojb>;7?N7&_b%!reYh zqVaYTzkNzTW79Yt*a;L0S2BrCd4x&GpJQc0Mnj81Za~b<>?kl?a&!z?@u2nD!UiRN zFe#ZFBJQ2!BQE7ir)s9g`AlA3%l(R+xUa(4``gou-8N3IL&t3C;wd)FxdV!S`H+`?GN-(Jr(w_d@4BlQnd9Wdo?_$oi4iL^)3!ZgZM_F5EkscI&AS`%=bpkz7NMR$ooX ztmp?V%H?XxdmreCb`8wmMlmjJVaeJ^^$n9>1CrCd>p2X{`UOp`o#?dm&x8Si%lh*j6w0oT-~Cj4|f%741rNaSVZPqX*D)-59zhbICz#J|p@^*vY0 zpHZ0Oj1MvoaKcub=9?`N#@%1T`Alb9uQaUU!XB|i}pBEZjcnHX?zM;tWDMFx*|>+BQ<+y zg7X_oX%1SBa1^PPlUsd`QD`S`D8VpL<2Kj2$(Dta=SJ>#?<8TSHLh zCyCiRj`SWHDkYpN>bp+vry)Y|(cANr%!nUL%HgcX|O{0Tt8h+&=Tth{RgTtkufgLPtHHwR@Vu5&w2cjvIb zNTu@|F51VKnJcId@N*Zf_U4UgRSKXgF`vfNg$oFrTwMQEaRL~fHC)l0i*!tLp@4nq zpFlcRSM@H!3B1wcaJ&o$gW;4I5J0aeLkBJaoU4coaMhpDxc-}ca95VseU}6T)!TSM$i@b*OIJwymKCqVt z2|qYFCY3RkQ;YI>m9*M2%j*`@7YU<(O!C<~@eCQ(`^Twy&)jR`Je8NfdOHiQqMCi9 z2J<4n>6;k!+FUVtnhRyyS(F{@ORl`KiL3q2C((*%YZSOjEvjTAC|9}7puUZs)EOZu zPeBE=d`vTm>hBz4SHCs!_`~}CZoE&P+GNwnw6D0E-6}LIYC<8p8i^-v@IY!E6Q<4o zbQ9{AGO2dz9`7ABLAuTR*2Z?0U9=n1$KGnEO?k#{B0Fcls@#K$8CuvG=xnymh22&J zO>b1f$&uU@FfLocZ4^VLmyMM2%}~-h#$`j!bNC$-XT5xBNahIwe-G~5)ZZs51l<;F8*}* z+gl2SN3Dk8=G8lcrm_ZKqf8{N3XO$Tvre zFbwSF&YYb))k-$OOl76`gxv7fwDXiJVVh>)PfewFiT=SbJ^Wp!gTTM8MD}Z|IQi6J zI9U}`yjhk?^$lshIoxvA*I0WL?fQ{UG9|X1i>HuJ2%}UmV#}0`+diaPLDbLnYk#+< zL4Li?1UCjs)%V+6pjz~DL_+RRyuv$YXRinUOA#Tcp96oJdMQ3WJHPYScRZozzM)Nj z^V(70ORr-8wlKoA&U7gAS5ISgfA1P#^|#$Dg0CvyN&g(b1cv2xg+`54Ll{MSNjCjr z&+ySQY!=J(KSvkO!7p3*^3N3@*r;e_R9yhLd6Rx5%H0Rw2P)` zS>x&1K7>CQ1k_B?=ALxHTgIkd44ysDDY>57AD6x+pjPE z?cy6m2_d@l9k^#q6%9_NGRFpD755!=w3>^)(Ji423a>SYY4q}}X1Ud{KH zcvD12x6$uqD;1^XaRR7la9@Vv*HsIqeo;)&tC+bQJQW~RXML-Dcf%il?27*DlMhu) zKUoox#pO2M=xe|@kL^-@C)IFA9#cM_PF`F$(X#Y}pA;MyG&L7=4S*1`AY2!!yPGv| zKd_ritOKjKMXGzIzjqClcioc5f%Y`T-)z_zW*K7nL72FV?Javiax|d=)=+Qb5(i-z ziIr-G^q8HFd<&oY>_v`@hG%>Ex(1TIY*wV6qxvl2OU$ZJ^cp3UCQ%9Ht8B$j3pMd+rWzv?yTWIGZ6pI8Z6I}qHC@8e6aAnkxy8!)8H>UPj&CY z|6-tIIul0?{fnt??30oworQH}(fZ&c?ad1^Dn)}BI$uWnd|PH%O8dpJ3eVR*?(O?u zhZrm0T$HAN-=Oq<{`lQf{ZGNV;~}3C{(lvK%(v>!B)*%oN53}M;d!68Zu~h4)GB~Y zB(x?}-RR3awPYNfkV}kvM_2%R9cbT5COj8Kd^mnGVGh_C*rgLOIGD}oF&L;JMD{?g z0YoLDcFf2RKwJS}rX6uDafpBLyM^Ee>%O2_PW~E#M`YhVT`IL#_nDYk^w4ovSNN0a zM(N5V1}avwlkUfd=Ptyyx)gGx38am^Kx+Bzz>CTzSPhEa>X>_cjvsZPkV_W_pQ-{| zqXJ!SB8^Nw6tJN3p`^HPKP7?d!W$l6+o=}Yi6ZC}&+PqCwa`hAy(s1Ul|ZFens{eQ zC39{te+6!dhy9?yBnhbk6LciKqB@;&SZbu@U5Wn5Hm^*=869Zh&8W$CoO}hqNxMXI z5u_1tDvELQ?6aN5mza&nYEy!F!WSRs2$PuGV|98tSz)|83@lvG7OU08u)OljG1MUik2`z*=@Xms*QDg z2NT_feM3}jILg(I_mHp}twsCvVyl$J-bQfd2 zsM*0dCC8Z`BlcoW+;X{F$BYvwNAf!Ap_Jgu0A=|!*djUHMZNntAlgKa2nT>zoTazv z&8h-mD$h5p=$ES;}1^A6zSL*kg9#$zYB)Sft?HrdvpUF)zKxyP|LBKlRJjQ z08Vv)r2ziQ#KFJyACaHs@+cdXRD*+eIh_7$YD>=*y((U+%*0wz|6fZhSi3{2WS|% z#nu^S>I#FcP_o$d;$FOXacikSsZhWC<(zY$Gv~fD&)m85+;`sn?fiE4E4$y#WOlQg?|xQ+VFhla z$!dJv;O#gA^7Tg+;JL5{Ay$cR+Yp5`DeppQRUV*D_~nYSP}m~koHHi-^K$*_%o9jUGU6>*aQARfR5cpb_8 z?%$#<_JO*|C-H+8Egw?pYsYE#wL%B|4X0Wne0CJ4itIOqGP zC`X&GNth$UPaexu0Na%3pAH#NnYl4M%dGJA1apEYa)mJm%6`O|a;~nNQHcBEDahdp z`{iOOV~oR5deSC0Ls?0{QSirZ5F%2i|1V1Kc|p>(3-Hro`ePN|t^X$ZR{ya?($+T=e6JpSrdKyCqR%#K|JgC$4$QzgnE7(0-f8!5nrZN6_U&;krFlJE0bRK=J zjwVbv?#ZCt995de2g?npopFqxJ*J;zEt4kHKA}x zvt;tuMpoIsRw}OW0$Y$2kY()zB5I0u%hQekAh`*zUej?r0Y=U|rz(SdFHJ9W0NmMRIj1Z^c zG>y`fhubf-6o>dl4x>5XYDiH5n}OK;k4PF6uq@NHz5BNI(AFkA>S8nob)rA)ET_{N72g! z@Gf@ftHD{eLn|3k{^L(-2O4sd;)gd@GwBS0Rl7tidNaS-b>Jqmn9YAqF3-%+=1~4v z9Zk4U)e2zSM^9IEG;39s)d|y*&)xqzKO`@+EvAaq>69Ubh7n1*_LEh2jm{Tbm-*)XarRa9?1lgDi(Y(yU#@%Vm(o(m z8Hy^%;bUdy%kEdkHwu{Z#Xo!ZvJk0I!${B%>Nu+gm@X$J8Y^xSNfBMcVhX{ry>+F_ zOJC)28FC2*zm%%s=q0`@(dYVFE}_DLmIlZwtVTe%nvV0SdLKKO^-uI^B5wwmII6SW z&PoG-f@f1TON=_@H_>7Atiw1~ztWx__psy=n`_bK)Hi7WZi#{BvcJ?z5v`d-XEUD6 z`-mqdt0I@6h!b^^mdR>-eRdd&7yyCc66@8l012`tMk)j*B9rMv6MAG-h|fo{AaHgU-F_e9Mfz#W1)m?1Q_Px~X2%2Kq%-mqT7 zs4DOo@%wxZPF9Iwi!({#Xuh zPmJ}m`Qgok%dJu5O|`H)9N*7iY2vO4JPdX?b3SSc*@wS`mFS8bYkUEolR_#m(6kHGj|fUmc-J#Hk1*jy>Ro(tn+{OqlmwXZ>;Q*hW~SiVt|2CZgOFsc4F z5v{wppjbGFGNA1?WbqOKGJ6niO!s0Wd$7nig6%G$$*ekngOCl%pb6P2BWJ){T+%ZL zD-RH!5OGN7rw4LPqwT!kjeXC5d4};w@4U+xkr{(B_0GD|yR8WWJpWpwwD$~fvn%(R zUYAXEys99giGI1Tcrpcx56mp4le4MU$nDp1qO<&Jy3HZ1d4g{S)XQdFjQ4mZV6md?Hgt2VL&95(qCEm9ZDFZ+*4rL z3tJbDV4z`Ey?a*;(jRqD<{6Z^J5Ni8vcN+(Hpq~-jWCo03nPh&H*Qy6fpiKNx_!x3 zpvkf-;);&GZ6ge?Y2*sr4SLlX^lJVhn!y$Z6Iu^*X0jP}s=PxP^km`Yo@>2t1D2N2 zBI6*->~Vgm)l+-9}Hn80MslHgA)e$aC_p*ifV}ah7;LHSUPT zMzzP=N5=r@BAsPohzJ<7a|&x65gD$_jmrS?l?d=#kwRFlaX_*AstD0(Ovzj22-c(AkLOg-Jtu|@W1w0BGL>d0+*!-WBF8YX@-TFiM*tFZ$>SsRin2hFNd>9~ zO$o$e^LgZyE1WJu*m(4SCjRXkH=HY|u;XE@jS{q|g+ig19uis1`kCm{@A{JejvN4y zr4NELI8%9UXMbTh7Y8AYQtSZ*ka$hPP}q61HxUo;)fc-N$dT$Duh8*qMXC<01hQt2 zbob_#)C7RcHr=ogBzCHa-$9ykCwD}`3}vC`5XB(dmXhA2))}VTL}$?qxsTrU%!hn2 z-oH9Cfh{}0J5f)0CS1g~F33%F2$}L2Pa*U$u`A+bp!^KO1|__3IAe_Qq-ea28&BvZ zTt*R|Q+cdKV~vA$a(6a_zbpKMu8q}0EQ>ZP#^ZwjYQFGn6fvcG#YE#x`n<0vXtrtH z)+djoF#v(Hviglmrila7_-sO>XuISBW2f7+$U~3mAJkDPNKvu32E`7l0t!utl8v5H z;q>Lb3Urb&-)4xdO|s%I6jL*uNZfc2SW7UBDe4dwATEl zI^0yc85@YVS{MNW>9>Rc-GaCb8v}R*juX%nr@4=@;K7(*LZp6K=AjC%3#BCa!)*|Hl{I6 z2a|0tHBOEd&o^vZ>vP0h&Q(yiLF#ZakicSGip0Py{oYP2rcVByV`#Fr90Dm)NvEQm z&=xNs(w@YX(F8yUV#v&r&vIl^1mv59B?l_F)(`7OMvj{sRX9l-uA=8MBK9M04` z@<1QMX*+3!a$QtOo){WNW8=JIUstrrIMQ#!a3TJXc4iS%Q#bn?AZj$8V>9S5ys@72 zfFeuvp2AyPULWaWAUsVzheJ~~5>LUfMmduM|>w|JbH%jbkLE4T(v>Vm z%D^=w5Z?Gq(~6fTyUFx7K*wl2HnlZR?l?9Q#D5A6)YUY^8~4J@el67lHgrR}=o4(d z&>S4Y8ZaeoMafz{zDE9YYqI7M_w}Bw=j=*fGkBdd;pZGtwvkG(D28?;ZzE%fQ_fS^ z6BGriABcakv1m3KE6WqC0A+NbuMx@a?f|6N0r+2>zuut{%w>3WyEDF2$JactX>_ZG z0!FVu`E+qCrDm{%phuJ&JfYyJf5a+_;~_(P1i_G{s!pYmerSS&63~Z_sEr0>}<#S$?wV}vbsc7bZ0fSXnNDcC(yfL-u~=!sOtvY znd7L@Rg{cXGou+ic5l^V4mUw)T1rBu;oN%WNKPD;;hJ8WA#o0A7Rdth^n^(BmX^oQ z$J#mx7{h|jHRVcZeW0qc^t8PhC-xgKJsZLUWWu-)D_lAAFOb1_3Y38eN~&yU?iuJM z_vjK3Gu*-gKqO++j$~Fx^GY}?3|KY@uQ3E`7=8P*EUmKU?k>+C)v<4KRo*mmJnglw#g;7uu5fn5GWw@1iuyE&%r zjf*kVhOM9JpSUV3^+D?K>bylhw*Xj=F^{4EO=^`wsWfL+6$?M|g&JvG>6(1R``~#30JpGHO&nN6rH@z2Tj&DJQ)PTf#g}^U-r9E%DwhpET+@5V@s5@7*Ws z2d_Fa$U7{q5HymY$k0By(K#uCy#o}g9URyHp0dM*+!*z*qMF?aDFj3*7YM{Nh4!V1X zmQmS|jUBLugdY*n7jP!P7ea+9Z@!R7+7RTqSeLmyh8}!o1~rJYu%+Z z%#1>pgNZUTtl%QhG@Yho3PH^m5lf`Kr@6F$scXd6nW8Y#DO8M@Snkp_%VxFahmYqM>5g_dC+VDgt?oqrB`F)?OZ1k7~JH%$Fa+f5!MYK+fGs~{l)2(t-% zWSufJ`G(=4hH;&4XxuB|G-dRsR$UmQ5%$qosB`wyjyT2kWZqSkD#D&fY;Si)tit#{ zgFx*hRMejafYffnV&Kfs5wRJVF5UjPPY4I4@x9(QzT6P0pNONhMKJ%OPhf^7ak_fr zX~)8i8z47t!>yZ0mqGelvh6$^m8I%R7fj`>m-;)ASCPysO2q0S?Y#mf>r;_#WBl5i>AjqD3g_9MqS_&hf zci`Hu{LJu~%{}gZJkky>GcmX1oJetH3@u? z{XnNmEY9*5cDPl&gH65_c?vHLwd#s7A+js-v z3>-V}5O^=P=m%AMdQHm&K4S`({3bMJI1b7dj&mN;?rc7TUcfuRByIF+O6&5PGZEAU zP!b)k2k@f=?w@0+ikaytDQZ)@!Td7cPC)0T^RM03B~J`dRn`|QZ zy|i;qBPN4bJ&2{HVV?qHrp$ng5i8$FuPY#oo-no6Q8Cc%d?_8lLcN61l@f*d1nzZHBp^Kr{jBw9vrNoGbUZ0)kmxR&$*yv*=%OK?J&8fz2U|k2YI0v z1S%{ZgPy8S{S8>14H0c9kulVH1Wz+IG?b z4d5-iCz4Iv`O`+19F zRqfSS&TNv(MjHpUL;>Ii7;c48Z&+T%KFF6-6+J}11Kez{e%Xzj;F}6wv`WZoiHH;9 zre}GS$04+s2sAZWNr5R)oCjRh3LNe|r2^2(Fno!vEGV`I;^DPajIutxx;~p-IhZDY zwynS%=yqpIGK-*d+Uc~mn0nhI36pXrq=Nt#%K7z{`xIDio2{@w?Hv!&-32{+$cW;h~zx;JvJZ5+*j%MiL5 z+Can8p)|wLhM?lX4@1je?u_5yr#Yc^)n_jQWbyJD@O@Hy=iQmRC(7&p7o;tqX7dPpk&k?y9V$1 z4Op8EITz|8#|)QMdUk~?S}*^!=tkBj@4{;` zkx+d2L$2_4)bnSXp)Y%BpW|hD@siKfKM| zm$HB4y+MKy#MQc2fK;(N1cfc^H0_^ifAjtp2Vrh;_xrc6xQ}bf>H^>YsrK(RVX%}z zKeSi;+YS3QEQnmk|7-+y+5L^m(ASrEQ{z=N{MVXcg~f~js+vS;?P(o6K#Y8acDjv< zFH1vDf`*;YupbJ853f9BGK^}t+bgwq-t#3xS}-&$Spu>;{ZTF5zS#HDQA%fez6Esv zG{gj{f&LK(X;r_CBlwv@usk4emc|ip1?*D%(hm)Bw>=kV3x2iKRKdGQ^E%y5z%UV{ z7YG_xZoyz;9SF@x@<~h5XNsd`ybu+1UwXz0!d&>b^!*F` z9z&9dPw%kZ%|8VTmVWS_8Dv4ppUgO43#D$5l%r8B&t5fCRW7H&F-d_2-s|HspkSW5 zkDo{#&K30L*FaW$gw&A`cjnx-`-ob|Lt08ez&WU7`Z~VMzih$1=f?JmuOT4q`Efd!RM@(ON zMas7y{go0ZRHE_{`;n`=u^^g9yws6Ww}i#{?RVDLoTCNNqp8d4|CUoAD)W<@H0=j>k7Un4gr@-5?_*zo$c|8CCmzFA zLNA=ModE?0uy(H+oUcAw;Nvpp-ZQ9A^H9W5q}y&V98sP^et>QO)c|*i7rF)iM+xie zF6O3RUt+?o1FZm4z5W|1ck62aZuZI3q-NSB9J@nNkUFTlWBb_~+N0tNw=5d{O%B12 zPQCaBjwVgnhugh{uA&z%ws@xXvt16N_l~NC1kw+Sk>NtiXa_cv$;k1{MMgN$;x&66Z3CnyE^mt|{m_Sm9wlj?Mt(Em6N@cxg^FzV zioE3}Y9RZ_Pp%>XFa%a-O-N>n50seunIz=loGp~;tnbqjah2=)t5q*1W_2ZLc%94e zRkuS+#*vY^)?X9(s;BBcswotoqghxcGmwm*CNw8@x<3Ws$j1N`W}X}rPsOa*7aS`` zR*%>oJvK?Mq;GZDD<6XOi%(#)@D~cEr?|q_!+s_IjWdYLfe&nfZvsv>k#x(9Y9y&f z!gO=*r!c}d0Q52X$R-M+(PW>!+v=CZ1l)Wf*Ab5>gvnsB_{2Efc2BzhsdH8q0DyXc z#E%w#==*p+I0LYF;NE`y!r5kDo00V^ZZ_8?zf)vp7gmE0KMIFE>UM3_8}0TGwOtRRWM4+a2`jqMUm zGZGGu7sNk}JqdpQkIZtM4xj{_A~~iKJju~IBzFAIOy6_4YKdoOpuPY0{Q7sozsku? z06rp|v4;lNjaqwl{mc44qt~#)F|Eo;BCeHI`mWl)H2!PuG}rGxH27a-{_mw<{6vBd z+>{2_8-pR@`FMsI%R!9O6DlW@DwOVg#8@1tTV^&!#SAEe?f!%KX9Q99BFsQyCt83~ zGLmSB$TEPK(*YPRsGM|XOMgtzRWe9bKZw=t5S(4T*&eas0vRPS8-t z1?d7pXmC8e3g9G!+drB+;?HOvMo9G`0>?OTlVZ)2f6D*Kg8g ztFU4uGy8Ax_1SU0J{Db{CmFkMK3`QWp1jn$^dB?ldxAUN#H22BuL*ATsYS2d&<=Wb z`-Glh>)M5}gezi-2Tl8BeZ@Cv{}hID2pJS}oLP!%#+(6hPjCLys}%{&vzxZGXk2*EyXHuMB`2xUrz$f&}ypG#M^%4uW!t2%#i#AiOnh67(2eF`LAB3uzzQ#o9iRa|vbzRwZ4 zri|rKzQh^v(*-aQ`_ZT?YTZv)@NCp-oB}dB7>|k3jK1IkuGV{S} z;Io|3kNwv%*cf5$pk`Q?W0RF1#@H{D(Wfg6P|IbcLTl*Dx`PWnIzo9TwHPRTe696e zLA7Zr)ab!-$WZjP+6K#jm0yz|qtSYoxbEmayF}5>Mw`_B*f{e2`&`S~hLz~0U+LSF zV%xL#Sl(=W?juagEqG6I{`^q;!1D3s?`qROT=f&2`s-=+mqfQ_U&hIy+64JQMN;Byr9}LUXWdQg{#LtUrb^CwOPQE?G!-bL# z;WsE)59qn%CdVSnY8xaz+^_)<5@Ey`!@~bc3j{S9-Z)2CqPL zQd>W)3Dwpa{J5J3K$m0a8QY~-sm z5K6D=Lf5^m3gR7H`g)ns(z5c`g)zYY)>fkjQjgG?M^*k>>JZDubQQl&bxLiiH_|>L zNNhuB)V9YcQeX0xOQESr43ls9Bo}{ngJjK)(v1lizMR-Tej2TU6R1OCg0U<)^->BC zIT?jC^?%{e=hkk3&wy?QoG&32hE_{yzclVXf624VtEK4p#jIk;TDHlua#nap=h@Hq z$;Wr0n|JB<&n|PB0YDw;x9D1?ShazK(uuhPT2e2u0$0TaOA6CS(XlWqd?GNYMQ;_9 zaEIIs*09)je-|ft4~fE7#h|Abetj8;oQyphJ(SfgHwV$`atwTn0l%zXks39i+vxEt zbM;D6SN#om34*}Sc9>)SYXU={6|0gQAs0)eo#> zSfb{}hx`lhAu8dK5*dxGel0cv`!3=MwKcHX#eN`2Kjh1ERQLyiSNAV@+9wf|Hn+hB zjvDQ0%d@BFNuybIJyj;A_F7TkdB}s$8#C8b%8F(WxMXb=LJ!eEE(x;i6hSgP=x=h*zCdgD#+C65xA zGW17^zz~eQ&|{l#k^9IGuqiaA6ss&w`T8ebbh+cI0Q-fBU`n5aGjya?%6PyKz1Weg zcBVD5p_jiHUbOu@xWieD?ri$)zd_x{+;I?3ty_5agN)a7xk12FUMiy~?x9m7wm-_+ zY2xlY*^VZ^0h#66scbhSbE^3zetD*zF=sb1lnjZ{$BMzbqjyg@q`Zz2f3d|=F$$TK zs{iMNA+kkXw<=j#;BM=Y6So1i<{J$ysEdfy*2y|h-Bb?9_GXQ%FeoiTL|%v*(dHm= zNlNV9TOrzah1#+o`7d#5q`mh)$ka)+TU7c^rt^w^mq^Q@5ctOu=f9Ig*sa{-92l+! zcb$D-DpSjvDUujS`ht{c)&3<1JxsEeciuj~(bN+MZj$ufd(FbJ4B#~_B>1N*KwI@? z@B7A77HqwzA6C(%0t-htp4@G^^oI32>_*T3bjDdBsX_9O9>sRuH8ll-NiVMDdpR(6 zCtLe?FCNDm1rD=OMbMlLtZ1J|426eACzXj7`w^qeyj)G!&I*bL(>@g_{^R!J@XvIo zvtLpd1&+b=;2+?&*OxWwc=QO?mUI)+sqQjGjClU3Ls%KdD3&Evv_U>L$CshTn0TKk z%jv;+OXj&HeIT{on)laI2#z{%{T#Jq@bO}ngx}KU6@@|XerCCsc-t29SS%M4p55Du z{fB+5Nv4-#`@OdHlZ-C+9j(kJM$lW{1Wgs2jfO;4)^jD-rp1YHcIJ@szEsYRx6LMa z5dyf_)#ro7)FVWW+f(tGx}UvEj?lw25toPOTw}t8SiHNcSON6vCO+LuizF2#Z!?xj zklX0cr=XqQTIKiC4T=Z7)Q5hlTr-Q%lN>crBpebIxh zkfTBeKPvhB>G5E;`M2q$yhF}s%@87Eby-@b4)z;?%3AyE(yie1!8%y-iUn7ER8S}$ zz|*PC$GMA43_~L!O+?Pz+x5o&rs}lXlXE}3m zFN^nx$$9x+8HRukcIflmUXKC=+R6NVn}ACIDn3w5`{1B*OAQE~R6!2i{*m?cY&LSs zyBnN(^KpH__qN9C-HX~FlwC6%r;3y|(29j8UA1HG~U2@LKX;ZDr0k zCXc96z&BedSG~aMTFWAHVI@2CI;NS`RE@ZjM?}_ltf5X2sXkp|Rs@Kpsi9HhIWNPa ze`cZZFizt&ro{qY#YrqJqGoR*=Dj9Vw+bhWl%m|!iI-h3-S%8KQM&W+3d_X^a;N2^ zJDxuTzHp9f#KTQf>+?nGC2vxp8p z>&=UUZsAmVH?HNay7&?qr|_EEiS{`2<_B}|ES8&3a4iC}olrOV)t(i@ zSA32^>X3OTD&fxgvlY7HE9L(4Wz_umWS2!M^c`ePDYo+hO_U?;@+Cd&VKP#n`Rj1$ z-jLE-!#Y~`QvBj_TB0^YBo(AF724*`JDpTivX$0N-DLHEi)yh48#QZ`vlGcHdEaTn z{OXZjq)dQdxDOn_bg{SSA>ZSUnu?i_UOWq>hC4N*eqQRELz}{FoA?s{npy1~C1PpT zWB&sqv{MqUn_! z8_q8CA`r>Z%?>QHcb)MQPGyP^@8+=#{j@?^rKhS1@%iNWp4N`TW|o}rKK8L}t3;5b zqE(TKjgK$jN{lL>&y5)ut)r&=~HpC*7i%Y4_d5Z@Ew`p z>ns3e?Tg+wM7<3M%bJ~x$;OY;5JNfd^kR}vK@4~tnG6VbIiBp2sdv9m^f&{ zL|C$YdbilLTWJ>g(gg*83%AWK7kPQVgm|cfratrQxW+Vc$KL1>o5qNDqbhOy7ns7|bdmZ|HDm}%&K1qo6iSGb!$ zwR(718vtlZkij|E(9#SXHUe3qP3^7(=}FBquy&iUhK1UWDJ>%iT)H*sGcZxgPqy>{ zdW3wVR6eqb5$PnPBii{5G_g_Sv{!^w@l^vd&h|da@8_>U($0_EGVXfW;3c{FYWf~f zTzP7tjLrB3_)1`B+t3JFsHRPVzS@=_b!zgmSi@Q?CsO@jth@7oSMGUCZxKzerhTT8 zQXjjs+`AsitT!56x>rgcXueiu?+M@$WkU+gSzpeaICA*Fp(``uMf>t?b?47A{;_Lr zAt~^8tN;a7gi6MpbGKk{8YXMpvlPPK=ft^8u{Gb-tYjb_uV27$JApB|2Q)SBKgWLd zf5C>Z91x|%ITH7b-6KT>`CKN9_qlVKpRSM!?mPGA%4;l%Gu_+DZneS&L$Ylhl=uN{ za}Q}dC&lOMZwSDdmF6<-kj#e=p;uwK3mmp-Q%0E$-XvpY-iIb)X4;OJ>+YclSX=YE^&zkEJJn_hJF)ui$Fno1jGDFrey zia{@ilrQ3IO+>v_6|IML*ES()Bp1RLaX&T^n_KWDH9g#fD`RENBh1QeMxp1WZt}$S z_&%dK!BzM{VeS5$JZn$mP|8jBiDZ>$9^hVm4u&x5&N1*)5ug6vP&V02v$aBR*x7=e zl{`5J1Y0yIwn3Rn|I6a6h`UE$#N09RR*0($t zG+p_q1Uzm-H=!&(8$8Y8Qo`KO;o|Cjz3PJ`3vXvJ@SC?W%Pt>ZFMo(x`R*((o7#tD zIpP?(T+xWT^?6aAcNCMHU#lQ1Y-Hp$^D2VO=VD?PPF*6VS9vZ>4JP?(NpKn0CE}I| zBU_|cHVcwYGG;Ufb{}!4#A5iidSbL+@)8TbYZhMPB|S3CORKa-J)5PZf?`T`pHLW` zb(Z7L0eb34Q#1MC>;`Vv9W1a3if54{D+{!N+NlP?_qbc6JsIw>pCMNh{YPJiu42*p zKYcAKDub`5Fz!15q0JiufC(;IDg3V&##v05*%()BvedMX&t>#{92Wo1jM0_kU=uZ7 zo!D-D6_#MZMla`nlmJb%^=u(AGwV`u6dRy@N&TKIj9KfJZnisd~O***GF1((V zk05k7RYjD>NQO4>3&dnGSnKzN@*f&<+-~kg*&A5!Xf=v|oHO&BkmJl%l5}L_HI88u zgbyW>0uA&qMkOG;vLn+gJDO3Z*OIyi6C1o3+ zM%J$dSR1LT+wKaDYNu+kG9`$oXFpVT$H7Hzi6_PdQi64rumbD~Qgje(rB8Huq)kJu$RHqQ&M!1!uxU@wV7Yh?&J=?mwIc3tmimf=u-#~)mnZR+{+ z-cpsq@e{f?if?YxIsoLN2Shiz&ga39=Rf$>$cr~8n0o~l)r^-k)#H{6LNSGzGhP;z zJH35`npk}r&J>x`Ad&1){k)L_yP>{kC%}6x5x-abcP~K$KN;uro#ahQ^ z5ow8;qOG-#%cJ;_B^EOdcBNsndlxua#wS{)0!a}msCjttPzH6#^hqk2$-~qHn_9_k(iRz&3{LTMjA13SvDDS@SVwC#L>XtJ4dg^H%c2jioxfKVxd{7*-9)oL9 z>r~|cv?b|ks1p+MINzswU%JYJEZ7&xxfyqDho`6oZz7uRntmmO0pgCtl(CcM=p}SB zYnZ&BoY)7;3b`1dEH#lP7J=FnO2Kixq}PJKH2)ki$nTN$RU~wSXqO_Y-XM>YPF&Ee zp#2f!K_3M#v`D7pV+T(6R|0@t-0Y+JBk^vzSa1OSRr*gy=Ylz1Y!)pYv#(v|TNh)+ zMYeO>pamvn32Z2uB_Z-fdEOjNnWD$t9Z%Avh@E&oX>qRcG4Mdfd2Ira^AN@mw zo)0$#SJb$a95vv;g(U(<;S#3%2maVb;Ol2PjLp6Tt=7Ua8sFE+4KMYml%XnWe%o~z zXlbfK(H3;8Ol8kBO05W$#ZTC>TBy?e=KO~xE>oxdq&^TOxSdal<$nERCIj%4B=3ys zPgRiB4DoGs(G3eM1-AM|{(Tt>akE%@6_lR)goLn@)d^ zCmfqODEXxmbZ@uvCq8uPHw@r2(!bdR?z5ni=`jc_J=?P>i86mBK48-G385P*aZ&St zHyNIt5vsb7UeYyd)?ruL8g-DDXF=f~xL;;xYvTB@Czi;Q&Hs2!RkDN)FGLlN71X`E zpZmwQ3Vo&A9ODzyp+|4~D4VioC8>Ow0kOSp+uy z1~8H1Mq(tuN}FYUFDehp=VO|NwhEhw4?VXG}ezC;p=ck+#8mZezP5d(Lug1TX~p{ikyH2gyJfnlE~q57Ou_j<;%dt7Xi zd(sv%7s*;}ch=_p0oHy4PAbpR+I!#ou0i;0_(YV8>+hq-mpkUZzCsm$J953 zV!GkFoI+{0 zC)DjgWm+aj#=WT$AXnp`JJcUKSBza6R59L^jL$)CJA^Co@M>W&ma$b`ugrf()x_3zK=)(N9PIWz#*)SlKzHKXXKs~N_9bhD z8mppQ3c0YHK?3zO;Yk54F;E5=P1GuloXgs8{p&W-$E)m?W`Q`@&rAPE5i zCiLD#2wmwQBy>0~* z@7{UupZD*ZIWuR^oVEAtnX~uWYkhmI^|?03mcE1)EB(dm0WL}^7P|+Gx-De0h7*B4 zuJJy@L&su3SDabuWRxtEFn(ioGLKl_63aA-H1^^kN%C7u?g_F9=HzII@`U73xN;>b zIQyYiX-3)iHMs4(zK{0Jk@H>%&AQnJi_q5!w6l^k6dV2DYGwIJ&(!c>Cqqzgm!_j@ zsReGgT%_(u@xj#Y&5j?px=|{34egTnZtLkA-zO@;ng%@P(Ix0XTYKf+X8AcSPM@#-`QM(ZAeiGw5 z8+Vh@*8Ij_aj&pLvqTpVqXA+Gy}`Xwm^Wz1()K6usJtvh$=0Y-scTeJOnI}qAc6jh zp+jTeDrn+qFf#h#dU80dMvhAbFKsf#f#z__-U=Gq;jcw8sJ?1Q#DS+c1gs|*PW z$$O<8W{{?E1KI8bDWk^4x($x)UaF^1v3yM&fR8)_T-8{ZkLrGvnlDR z^{q1vIZeV8FryE}K2I$&k15#5^qR+(cTi1R0r&(hrY+@&RUxvyk#^yV-&kuGbCw^P z$HIU_#%1K_D{_QIxtjNLQ+Z@&EoN%cp#{rnPIpF-*Kek>h1RpIBPwoeTcBkx@l67k zwcNyp)1}JgGd|@Pzhq3LU%(+@4&)4-^?E6rDLuh67j1>z-o8A$p$orXjYC4 z^Mj9!tI0>x)tXIngsDMZs-g@$)qM8bs~w*A8C9TS7o-PVzn%Vd9uNz88@0mKK2dX! zo>$so46Lj$l>%enw#r^xq$1Jw-j-fTexAiTb9)vWX zp3iGhU&^rQdI8I{ptNBQQr`y4n>cErLg)YmMb^rklXYp=p*URAr*|6}?V6PxcV(6J z$!k-ElY+b+tc%0yaXxF0vNOx;##O09&$_$o8z!Qo?>70dYQsO@Xw7~r=O581(gEJq z@>$~+R2Q%MvT)PyUOGF*f1t@M(nYl81)oCW}o{5 zBBA7ut;gI{DWJS`b7ddg^k|0BshPjw8O#8UotUKp3s zO|Dk~@py`94_v7(k%(+Df1X@X54vl%OjL8sZsr3Fpd4p7XYx5qld&pL^_w$yDkriq zKTJQowjhYNZ5kab04HiNaa$(`wFqb_qRUlRa}M}39zQwE3AT5nmdo~cuG$tFvH zmQa`fRIIH}f`FNuM((UbfH6NBlsvAX|ALt$_ta;Xj7&2%=a~uzY^FK$RZ;LBwK;kQ z*a!DPc2BKavZ|h&)|cxkIGs)2Zf1&oQMnC5^_rl|E)iKO8XHzBLK5%jx^;T_clp_z z9~6fo>8&qArfe(1vOnu>z^Li#9QP%y#yX-r&dEukl34K%)sCE)?X$l#S1H0;*}u_s zNt=*|lnE>NQrX)a<&jEfHWReLNru<_&r~n#E3>aQG+`WbUcp zO1bb%kD&7MVqYP4F2#|9JwfE!DKoY)g>V<)fHy@!UW!@*fHXGF>le5JOG4i0On?JJ zIzmoEMa}BCHYrMR#-Y^(v1s4CRpyq2sD{Q4<O!O0%&Q-Ziwi$&D!VnTjVHI0 zLfz$G5^_yYQ?Vl-^J#Tro30LBXRN&xY^MR|P`2Zf#L!}^q4tC$x{Klo!6^mhtrO^u z{M(gG8K41i3o>pBiAxWRH2LnL(M1&7WQlW`3i=WNPP35$CV^08q~$qIF^Yg#LC~1t zJp6=>Nd$U-B=AXU8x-{CQ!I~JrQ|s{>C`#Y?B?0lIgtr0r11V@?ik+6PhIy?y$n*T z&CV`y$kyYr7R@BHv^JYlN{MKRE~F1jysVw~m;unLrHapLj0E~*6 z>Cq_i5|0?8q^#H==C&Q?%)OLdPy>PZRGbqWjmKbxPlSZ0oV_Vwr;B$hNS&5{+59qP z-1oK4e1Ht2LadJ8q^tq;W#YoPz%6BZc*A+nG_@EMrMc{r@!(+mGTQuW_rV3b=y5U7 zpVn9W@a?8*=blac1i&knCd?^oXL{#(yBxfjh*DnZ@?ijJstyMF{Z?a%uQx& z-8w_d^+HUg?z?`w^}UZb$3yGNC52i`d$|Ekxyn1A+4CJ#8W3La>|}I(>;f{cnad0j zRTH=JN^~9cjj?Q&&J(f5#;Fi^UiaX)iXV6zee3Jr_j=3Px`(E&;D!C>-ABSdBz`;b zN0z5f*zAeX@v?C>w|@c{f1CI^wmm-qNx$7nVd;gRfNt6}VYc6V*|Og{Q1joUOm*?- z(wCk+7%sT6`o41qjIXubI-q5bO+#^(sO}HiSd_;Do$wWxqdkSVqx@HK@8)&9xBrnJ zL9;wMnWrV9;Zr&GVY1{w5JcK@_1_|U|L!XYf=_L4eftUEq9ug!o1T55qQ|0>_^$DP zkNi(JO{i$g{LI#g+>4n&)ogDU|0KS6hJ1&A&!?!)yh?FKaE+JdJ?}1$&k9MlG+kws zFK$#ZUlCJd+_W?l`%XYDI!hJD`hAXUAO_gFW*S2LuqAR!&_NH3ZeRc5HqRwRo=|Db z#0|bVO^qCPt5eXQ0DJOEoG$g=&Ya?+2x0Xj{0BvX!&*zH9$L#N1eiWM-uqDj2WPw5v~2tQHy9WM0~kT3s&vZGQGHfb8M{Hk(0 zc(e#J>3n{Ne3iK^7nm2NV+V$C2wt(e6Ems&&Ig}jMP)^TScR!dueAE%mi4+GZzVXP`}hPPGU;l~NyntB-%N!xJ5sz9v=XA4z--u>!97 z)UNsF)b%5#IIi!YU3qp#*;Z@QIi=js9#rwn5e!8{*%zKIwpd0=NgF`wLue2!XAh5%yLEDK^>8 zc?fjfl&wHnSZ|G9nWO(oPEKnLz3F>9^=oMJOlCYQ^&@vraXcsEEhYe?ONZO#YdE)Q zel9;|L3RiNMA_5ezZ|?6TK?VwGJ~l0BLn55W)C-op9=3BKKZ>CmfD(~9ms=5{K`pM z55v-T{JbA2I4{rkJ(JO8f4|1g%Ib{*+_!$Z= zP#=Zw#~llUkNdMe)ZlONe4(&<>-O=6=|d_5g}fE+#0-=6ehKIr|5t+^YnP9C6xVnx z%>7Ci-z(za@2z`&iPZUd-Gu-Yc!39`v3~AZ(xLaxUu7;&~iNKm|-|-dM~} zKt{}JAzK2CnIh*`E`^&Rjg4R`X7$nk@d^K0R{j-OoolBrdBGZlGR2TB>Jk^Z*_w15RTieU|SOpat%#j=rp6jdM3~2Uxe1E_1tG{9=$| z26tB7J#=!S#FsWp5jU5__=GWE?eFi z}Iy6cjF~uGUZ^IfbH|PT! zJnuN2W(>g$5m8}Y41y5gP$b$exY&BWVEkY`ejwd~mn#|15XV&h0L(E&y5?*5MJU#k zMxh902uP?fS6Z^#wWt?}5hi{kj!ZuBjnomcFU)8rpGIXxn`G`UR4a|`quxy_-xvrY zN7%u0@0&}Tt3On4kbc_fik?VV=z?>W?4fYxj~*;0D7x328(OD<5&a+D4`QFRzaBo$ zmB&FjEdg6`H$1d3;+KwYkk-EgZ!-7LVFr%m}i`x&2lz0@)4i( zvk5lX3L#uvRhU#V3|c!~=(1ZgA(w3%>yh7m^ybdcIe5cMl-KDNRrKX8tUZ2+ZgYoZ z#9oK3gRwKEb-+&94=MSx;PJRzbjL^^pMC&{1;4p>ir04I!5isLr3(vj)V6lEqW61` zsWcd-H7b@Kc7=Dd)etiI?EER-{=pX|xls|CGebNE<8ZqQf}OBJafl#Cr6^)e*z5Z3 z?+HBmuEQkJWb{J}z|G@BL?FHo^0nviY(k-z1ae#S!h2iz_)27Gr~K-Jj#gwUYm(d( z(dE?WZe>TG)Jrc%EZc1_`7Crb*pe9q_2#1*Qm|623^}*X6pQEz!2!+$rhOsBa$s|D zg7)`-D=($IvMS;wpN}Is2Kg9f>masEp$EfBH&*{2eRvm)5Hr$Ri8p-U3ikrkg2#u{N`FrM E2O-$IzyJUM literal 50388 zcmeFZWmsI>(k|LK1b3G}Bf*1fu;2lLyF;LHchX28!7V`W;O=e#g1ZK5+}$BKr`LDR z+TU6$x%;{2-uvsG-8>DGo;~EPdaK5$nlT=4lX7hISC~NISCmV6_Aylikg{*jEsTz1vC3gE-o%g zdVXO(4k1=fE{;Dsfk8n*K|@6&LPsa!cuw}5fQ5mBgN27fK!Asbe%lv%9srMxfb;yN z7$UB+F%q>S9*2KSCNhn9We2{>_z95H#3=yf837>?F$palJ;Mt|E^Z!PK7Ij-*OF4w zGO}{2YU&!ATG~3MX6ElKEJ0SzF0O9w9-dx-AA*8EehLYVjr$y*koYAjIV(FSH!r`S zu&AoKrnauWp|R6zKN`PH@cjm@p?o!!0Dv-69~tDo05w}0S* z0l@uFSkT}96WBj+VMB4j!o$PCBmIF32G$+=hQo$Oc>WR*M@$*X*b$eS!yg$>JSMZU z1BHfD$Z$o>WFzj4h2(BNR8%7eoOhyXSbT5HQc zmeSRaGuv$wXdKbp0VQ+jxR{;PVm;{_x$1C1gtt}(xxukCFPfAt_#BDhw&3H5dY=G> znZ@iw6_#}>eU4;aJ{Z05E68eby|qRLUAMx624A9PkB{K2P=9`qA2Sb@g|8-n3;ceD zIlTPBX)ZNJPU^5mgOHthKNl3hkGL~Bn??IM66MBYRL{$lj~_;bg?rPZCo%s>gHd*J z9T1Hdjq(NuE|YJ!(RoV!PFUlpUtTLOkz)Xc#q%Aj7&}`{fQegd&~`Q)0RkP(;Qt0UvVzf8I9;53a{}avf3=MZ$_szkn*r`6J9Y% z>kSS(^I|U}On;BM6Y@N6VeSM;Xlt3r6JYj0WQQ>C39y1@c(0&ad2(yT#0jyy)s93! zXO7i@^n5~TA7lsMc%hx^kA$pgG=`Ow0?}+q)U#vcDX8<5zTf z6X=DJ^^tzeO`6;_v)clpW`=|(g=8T=3Co&~mt&i>?ywK3k|uqwXl+zs0cMit{u!3C`wqA5;re9JclB|U?v!0$?n)3}c65-fqd2VGREGV`ba>XZrj-quK<)~tM>eQMZ-z%GSjE^*Rgv57?O_;lHaNZxF zPx`j=Y)7@Gy6!ITOZhtnk1A}F=!a19h^!eR@$Ev|c13^FeUU~YZB&YblNtXgy~qh` z{sm<`Lm~!d3SVbt-(gVC`=54!x5{7j0uPei7M=j+T6XgouR1XGE_Qc^UsO+e_9U7} z4@X@mc8mzP9p9>UWi-RNEIXh#t{+>Fd%53EChH}92e^Um->u=-4Oo`*>dja(&|O#G)U_L zqbek3gay2uRYU&CE_T_w3SNbu07&|)E6169a488w52-M3D##7!GYj=1K4k0pc29s@ z*xw9LsPn7Lv;IjKDSs!-DiFl^A>O#zlJ5>)*m*KPpDXVd$|(JlSc)Jgt($rzI*HUX z=O+N{9$4%KN{>(4yUl(A=D{2=B6BAfz4ZCz6pvFGW|MW>cZ{8GV~$tIUfcOfidK%S zWRyIPA0=WSsNoMsi%1uFC?al%yWdtwoqLx?1TKy*vqc*^E%MGISi7Q9C{Nh}Q(X?1 zFTVb!`yWidSkUKx@`YiHRqRSZ&<orJwtg$2{vbk7t%$|0EWFZolc)0$CDn@J|4X&PlTL z^cL?sm0x{bVON8L&s+~VhO`YU=g(#r%84()hgs6RJ3re|N^idX$+qbT*md;ulo76G zoL4sBu5TEQll9;U|KIhmR{D#~mH$bXY|%!fU;TvYFNDbt`3J4?xf+>$Ac1kuM?CqT z0RFBbU+)XXSYI<=EVh$#bP@wH4z9gS<0faKz*b7X*abJ=KRu!<{68Gs_*XsSU)8l(nC3mhp#4$h1L z`EYpxx7*}Q6E^oRO~F>I#wYn7H0a#b&uzwd2R5BVKSdUK&!q1vJppiiS=e+(1 zApE5YGeJUhW5dp5=o@pH#;pMxa9HH~0=jJI5S>nE@9b+_rBL@6<2x6J@1vCim4M#J z>`Gxtg;j{JlG4dhNd7)y-qj=1PIz?^iNZ}o-%Seq3KsuGnML;iuJVcPW>1i7iIz@X zmL1DV^_}!`OuSQmWXt(3bl=k}ZDGC|)}P5UFXCUm%FEutd*$OWG=39Ng9GnDetWAP zW{(MSf7{7%ZP78#eAe=|OzSb!nb&d`P6;xrB>$fg37N1az&rAVbmr3zIwr^{~eLbEl+d) z{#DfiXfkKKTPXUahQ>`y=yreyU*9D>#bvHML``2}uD7xi{BNf0&ZT;FDfqEE$~5>1 z5M*xu1Q1ICpJ0JcUH;zc$TAx;bwn{D97+0!AK&(X2n~1I#hw7&lf9iDov_^d(PHr6 zYo%o)xaW>( zLD7r(1b8-0-VCm{<2gi)s&*T3e5{^HRy|qbkQKP>r+1`3cmgc#KLJ<-XY3^@mhv60 z91k36R$GkyNiO@S0z}4}{r&$qi}88+H~3~8|J4R*wZ$yfbw5^dO=<24&^q&|GVOIP_nx#zmfoNdcm#aNxLX8o=6fCP{HYM2 z4{ta-jX@(kmh>&J1G~s(zVSrLZvh@L{Mm-;o;N&JvDHa-LH17MXVVj4Q1K%BH~8Wq z%F^|P3&N@1WFq%WT5gAriw%$()>p$2{@&YB1CUauM?Y|X2AI~BQT+t)F2Aoi)^El0 z_Dbu760a*N_%s;adWI?h`3WF(got!sb0DA!{tZ6;?titR{Dm8ze}k{t>QCK&gwoa; zW3dfVPwE!bJJ)Q%_XN=1AAWIdPYg`++K6k2y8<7(J^>Qa_Ur$}%9xWS_Vx&`4JxO@|3H%K^CVq!d)AmpGJ3IkSN{u1)cW&!;V-0t_Hrtf@!k)Rm zveoV4PiEr0BJCl*-{Iq4_!pVQex=9mZ}9!akqz2^bevy+j3jS#weReeT1UGz zIA9(Nm}$)1(^Q&&N=8`d{-jj~=;s$g&Cr?4%2KCg>B&myd9CwIlFO;&gfL=SauL51 zFyMrNK7vUFwF2@m=GSAaTg>9!4v4b-D|)xn!+2!_9MoefFS6q;{95d)Sa-^Z5LKfc z>>NB{p$3h7plw3u@BY$+fXR?nAA>GFvdOx=0JgT2>ceCA)uz(MU zt)Bo{-CSMXn%^^SU`C$+2Gf+cR5P^e_VCM~o^$>#g#-Inq}_GoVGd|3ne^JILY*Aew;%UP)hn z0(>eGh^$>bG#q@KJo#4Wy=gIcr|8d>!Wq8qVnN(~A4Dy%`1w*n#Nd>r z6=VWT;9;FO7)`4D!p872Kny-EGM;5At<>taYvwpd)-rrvOD)zTsSO^4Fx}LrwS7dT(lVW2A219?>$`t_yXk==@I2fU2O5;31F!&PfDNyl%?~;4@RL0hC@Q4I@MJlh8n`(p=3Ye%8T5>Uk5$`;D1uy zO9EUzYw|t;P;xUKV11w~ae#N!BX!iZ0`n7K2X_tg9(MtJiU%{HthfC4;YC)tpsxC> z(kGD9=E9X8#Y(Q~py~a5-6xZU4~xKP}-aMr`O7 zbiltWU-_Q|@)M9_g8G_&*s1j2DFoPM_|K&Ne=aG&HFSpyyfc8tWiLeHeQr+WAEm+! z?+|sM?xoV;$J#Qsbn&&c#$+j1gl8EmiveFJh!8+P4#1oMlVEt-k%_VunwyUm32)0Alk-hWRVpq&9!?k@6`0+ssdC@H<()!lDux8 z^gP6Tw`K)_S$6wtJO3)CMA=`b$MDyGn8Gr;w?_C?&Zd{9ciCR`5qP)9;BGPp4F!4V z@gTvc^KHX4*@u+5M%XLKtJU9;b~>@bDw5eptP^XX1`|0(N=c-y6u_fn1Q=rNS+7BK zu?521E0fc#X)ogoK5LhD zw|jSoC&F#ZB*Hfmy$a0dw!MG7ZYW@)^Ig2@Ifve-O@{##kFlsUDbMHC9qnA05=DQN z!QTZE^RcU*P$1$*4gprRxVbWMGb)cN-@EWK@t0)mEK_9ahS!SJV9x$35Yp^=!-tzM zI5Kx4u9Jaxvo}uw>wG-KkB$$8o=*T_!pDd5YvsQjYclvqvnP)5z};~zro43A_SsT+ zG;p)MYwlS%8uc+L*7C?!o-*+-y-?$jwM-0;a1W>yS?rh_#3}c0Z-cVFJMhxSZ+ox0c5wN>zU8Xae#g%WJ)9n4V_)r^L@rR z!N2d8@(~yHSiU6#@n>q4`s_kCeB zpQc4Fj9H!VV!t)^Z(O!RrL6lG$!aKtv`7^0E)h;0vskF5lUjH{1|(`LJ38 zrYe2q9RwnyBX=t}LKc+rq`1KRcYTL8pZZVcS_|Ik>gqo1;G4Ii!bqV>B*}$i#su?h z^X;dOo3Gut8tvwSPW4A&2^*B%c+g(H#r__>Sr;pSsltGcG4p$w)9X)jBL_|Ccyp;9 zR<5ZOZ=&Rx0ewmnR^XyV_c#O4{mb;qavk$^#qEw?jSUoX1u%@`FeF88syHSQR`Q#U zVF1PsOI(@qr&wZgR7x2G&)D8XSxuH%i>J#cUEJi=dwc4rvEfF`k$2M2luws?q#PQ~ zs)Z?#59v zWn=PM=XB0@`n(E&Xj07zB&32nagv_t%ZT@T!tw{28g6dWUbSgOys?Kg$JTEA&!=FL zWN0WkV)^!5?=3P87TFx3R}!pe&HSToJmdhomRX^qc*>H1|2J>^v);c2Bfd(8%szix zOkPVj?HHahgD9^MCPgmPKJOP3m2FoiNI6W$5l6ouVyTSFu;IUVd^2%;Sd#&xyXWrK zv&N)^3970w{sctM8DW>^D>j@@{`i1Q*mg~h^aP;Dna-s%+e;^}|M9LN=BO-_kZ0LE z&Db1P=FtW&9%$rmwe9JLN7pttP9Uz#U$N18ZS*VTYkR^=wC^ zmK*aHiw%4tfcYpaeU+E_1Q16!enf)q%zF#S$A>}b6bbU4+sz4Q^GEWNu4vy(xW*q3 zO>aISV2H=6!Ddro1k|jKtq1RoY#$~@aaY94_wDs4KUe9f5-?YbXm$*DS*vOLcVnPt zm`99*u+QFzvN^+AXROQts? zvPgun@}aN*Jm&8Wy_PZtKHbwmO%lleXnUz$2J|j2kQ}a`v(VBOjTK1&Y|0WXEh3M2 z4&!)u@t2t-Sl`X5@Y8(xevm>T(>}kw*(bsPd;v&bn6Cea93H2pM0P}5p{c_ik?TwL zCQe+j5LcPw^s^&-I$7FaVq&@1BgiHgi;F}jvT#Be@hX%^Acqv+VDN$g_nLVxvty8u z?|7|)$gF`!>G7e0#N!9l<$DZhL=**GH2ykw*qy#tq; zy;s!Vhcaqn&pAmeNp>LtL+leK1kGwaB+BNp6;rBOC=}%mMWXXPiXVk+L=Ij+W6|u1 zx+lP2^`?Hb-S{n%tKr(yYoDx;BkB-Yikyfeo&G>HtHXumAzUY@BH*2?GPBbrG7`hy zdbv%(XsuWQ2nFnJ@5EYWyA?zsJjM~xcPIa%Pl&v@uY+hMwDs@c|3*c*4i{6&Rc{6t zNEm*?O82V_iqx*EBkZpZ$m_@NPtGUv@r_-W)V>j#$hLI2*`3BjJW9t!rtzF#9!D}s z->JTR0%XGed;-9IeFCgcf&V6!w1AyWS9F}Uf#ab`qi>(z&~gaZcF7DGNX3~R!)*-K z5x+Mc7SyY<9SQ;}L8Y=O zEcN>4tEL1u3lEDT(T|M;;^)!wXk&F0ydA{E@Gd~30Cok_z4s&_t{WA>u;Sw4uoPA9 zu2{xCnn-gyo*?BKdm1=?`oglPe+>2y6k!-U-Ozx?1a@n+{202s9l~Ifr%!HB$rOcD z+YvWFB4zg_uHVtY#Hmb~re(iW5E#haQjzU6mmvbKTN3s6Fj@cm{{5Ob=}sO}Cj^g@ z+*zs)HHctQ&_bqg`}tlirGer++?M1U?be!_>Y8Fr*^}w?2fvIHi<(mvVi$HG#UxMv z-C`*J=DDDJk^MR^Z7Lj8^X4FCAkZbEF=cBbZXr&0rcPr%BDF3tI%oPUT!4KAy3MW~ zr7JJ&rtYWoE03QF)*zhThIbJfRsnw(D}x69Nd-`PY0q#;iZdu~>*h38%qCivTk{bI z-Tm>yur!o1Ea2-y%9Cj8whKBdk?TLwOTCuZzAe1DwL#r60TSp#F~e-PuT$p6s5F+F z9cTs=#r7Ka6fCZXY$shRIQ@%fF%-d@t1rN-R5Re6H&fsfj+rMwJgNrU*2orGs9g5obAmMAU`G+Iu3az-egIBKe2k83aEH zi;^SYL!<5Qvd|i#v9LefUBVLpYUS6m+-Q=ojWfvJ+L(EKVb~GRUk{BHU;j*u>g;95EhXG_?h}AU zviu>C1$?1ZBrY8K^HJt-`5|;3{1_73wCJqfSUHBiS@WDeX(f1JNKAiHAgl73vwsT? z2B%*9@qG-W?GC@@3GjeR>+TFv-kV3$aOXK@X_>BMvh90B=zw>j3J(y#mJR>TvDZXU zn%C`K^exx+{V@!#1PPZ4@{*|9SIQUI6;vB%{6#u#;dZ?rR$D7-Wy;E3UR=t|ZT9(P zy`H_xccieB5`{0r;EZWCUzMu+CO=r*s-&C@H1k`Gr>0sU&%_r4IyP*qx6u_yo}A6G zd>f`6DHKA@AI|HFXBgzEXNqrZrvbA7qc%X`v-h3num z5SyzO3q-N5mJqAPYKBzDb~ShiE?7}iwZCIuL${qLOT1#R05b16ef|(hoyBr;fb6NV zNG&Sm*!$*O6!WAmv&c$7e`@BWYf>8Q49m<3cLp5EPC({^)KB?gIw4N)N8OyqJw8I0 zi|#1_gW!1;y2lw6`8;F8XRFWU z-_}?|agRCeSL7bGT3D}fPNW|=L%(_d+Xb~*SBVHTub58|U%aPd8`QK*kjO4PwT~+^ zGEwZO?MH{n}|7^}3eP>B& zh=YSH$}8pjBS~CmRN=d|AM342^w_%EVJ;ybtUfTHNi9&XxRPzuS;ERI;m<;M)fUXk zdMNgJ>Dai8!5=ysWX!hxh}}-pwSBGX{MSNUmvOAzLhM5FI&9&uoX?w91P6j1c;W~L z_xMMMj9Kmpt&+EDeH{fyZ3|zIvy?qUhWCFB(IUIw#7i}WS7mO&MvN&ofUfBe3o89a z2?@K-&cXxY17^=Zd174N%pf};P6qIj0P0Kj1%flySf2He^3C@=Ze}KL=4{FYYd$M} z0@!pcrn>bC8P0IO%(krOeKh=XT7cb~>KXg;Sy=jpo{sXA-9=d7tImA=loFfK zq%US+_68!;+d>z;K0m+&T1o{Tc56 D1)$^(Be+X(Xrz2u~T1) zh60>HbeU*02ag_<9P5q_aIl>9mO^&L^K|)i+2{-I&%#_ST&^ZR5b1?;#H6Rh#8g7u z_)7-SVXsg-SkkM;LAd(0H??=HbMi9sRm7+cL9>tG05`d~WliWPY!Ob3qs%^CwehX7jqF&R~ci$EMrK*NwpL zx3#C!nTSab#YMWhr1GUCzVAl(;Fxk84_@iU%DiJ@ByVRJkrJGahzhDrVZ+w9%7Bo# ztZl8d1lzt$c0@e*q@g7EEYpKX&mtCup1Jyj3}ku5d+Xm+8KsaYR}*1!Hc#sLvVqg= z*oGP~Ye1MM%LT)d5n}JMJ$2Y3du8})Uv~mRwbN3HZ^>@H;*8`F7ZOY;JiXU-* z9J{unEm`r5>*}-o7{Wx8c2Huq2uJ(LXP_kRjS(--2H)!mtS5Q6NDf*j;!&_MtA6=O z;zLhAuia1;j=NF94m*=XCk5%pP99#Kv4sUa&!4J#1j!&^&kb?=&0Hf)h0-aO)|mpp z6tpD7hMMxgc)>8m%B-@7oY-$6n?@s+xY!s_Fv4@h*SEvVwTv^nH$(7tu4MG88K!{g zkW__-iowpqG|qo?!Cuj^^q$lkv5%EIlP8`cmoERxyt*rBXqY4Kp?6c0YTZtjT$B%W zg&e=;np^Ov{0Ch~KYEEf_Ln6lb+?z9Dlp24Zh$j5G=EW&6@p(R z;frxHC!uVf_cP~u_KKuQ`>yqIJt!T-?IuV2DWNwn-N-%Hre(x-(&BU)Kv6eB*$5|5 zF#TS+_eecatI=c`JNn=Q!@(+QbQ<8?(~rl#@)JL?)B{6bQ>$r;X3Cbv(~jlH6m%f8 zYi#+(jJm(YgxVCo0I->|wT%apZN4rjcqp~>!-gAqy`edMfT@s13|9dq&dH&>5t|>0 zh_A;vn!NNnZ&LJ>BGIB?X?9L)NoS#Na#4=vVZ#<#9jy!Fb)@5r{|< zxMHtfAi<}^{`}kcnd>^G<^G7<1@XGvy4?A_v~jT~oLKQj$ZDXV>rWI7HissdUz+%nNZAGM4{pk0*$ws?HZbf@gD(3_?fOM>FsQ^7_TYiyi-{osH_a09PtKBN~uQiAT6OmZ)1?~@6{Xh zKG_=B?;<3LTx9NcbxP#)&6bPw_G@QVr!ze(g!D0XnXN>&lOu+eOO`zpmL43f1uuEB z3{5f?^_}+hbvSfIKilSmi&?;;uWU)Ug2o~+2rW1_FL_W{JEYEMzM5!K6oHy3;vXXN zh4a(4?V1`I7VGVA=hF2|>GSR_zH#=-rN~!4j!YWYa(I?~t%*H^Y{_(0*9n@3@csOX zVKs5wUB1?Mk#xy|omE#?-xM?XCSH45I$kb(fjq}k-}7#fZ!3PLt5jgJQ|Gelwl0F8 z)|mF*L0i_LXk@IPy6YLif;_yzml2O1N!J*Vfo6!^Wt5SXIa14Ev75oQcUWzC|RN?+pocY6hs&1MowY+IUwisqL%Fa_|V1+v{cF|sErk9>p+ z#R~P7cD%YYSUhkKmGyKycSee^WWEZ-+h&Sw1lBn2XXjg1Xj{I>Q9K4?CiHXauMXW+ z8F~m|$qKo2^vVGewSG{IbLk#xY?^s6uXt`~wKJ=$#R7n6r~BHs^`Qq`pkw34$kp@- zRL>NX!sYFOQ>o%ue%23UD`#1pEY_{x)cNGaeGx{C){}#G{m)Mzem}CSnMMSrTYz9&8Q)s=VlA0?71T0V$Ay zBpb`CH8>zFh&)dQ^Vm}BhVo!OQnf;VMNi%42rir(+y*cIp+4J37lsy*98{v93fg&T zp6Nn+iY<}vA?*Mov{;XgWI+2=3wUE^KJ^5oIh`22n@AG$Wy)Axdzy;Ft@v0u!GP#R zNAdDWf^YJ=M&#Dqwg&(TMFU+cYSft@gerA0UzaM`>vf&Nn}aVI zN%#kA6LWq={_=sD|BONIy z2=&o0zz8gHrw2*6OI;Kze0 zNf)e4YAM#|Rc&mH&_6283KAL=Em6Dis~{I^SLv>hfmdI|H6%1Zs5m9a8y5vm#$Ihk zV|@~;I1t@fao*Ru1^csdf#7d>3PHw>Ty&&u^lx5A%y@Hr8P^u)I5t9A?$~x?GMVgT zmt4{EVR7YDvTJgvh*j4Qni-tcLQ5rcUdDrwGNhQ(=}lQ=Q?H5tz=DVKJyZ+KzBon0PxMs#Mil6d{RR?zp6L7xw%zaL_aDH<${!{N2&U3Pmm0P zl>RJS9~uV&Xpe$8P_=cMwkav%TVbAbzAR4Jv!bLBqq)7;OR2WU=>P_W^?fFpYVTaD zy4Z@4tN^XI{T#B4UBu#zJ0p#%!Ng=53DqTfySKve2X5cgs+Y9ePZo@7thr8m+7C>4 z0o$20Gz}#oEyUo0MP2>9`FVZ4`5IWH(9r=HnugGK3%se#U)~bH!$cA^q1($n&Q=F3 zkDU1w4_cQ(+${!@XdzRsbKzGbp1Y#N9M{`#>f_VbQ2V%6nWM|{soCb{))yOKN!?G_ z7t~(R1bF1@dQ2>NM^W3-Xx2KLvfP_!;Uzr}|0*cXiPJko^v3QIj)o8So@KHZ0u!j1 zKA}`2L!-b!+w4qbAHDEW2o{>p3r5sh*yu^o;-aMwVgZN1I&NlEd?a@=f2TL;5$U~w>6=*_H- zefwUeqrWKc>v&~JT`T#Ht#Uav8t|RM*?$=h=&aF(39N4deOorh>6?CYGPnCp{N4Qe zhzcP3;h+Mzu@N|CEAXDRa*EBB6731_u5WA*Bj=2}H`-k0<6J(mW6W8s_$8%x00sl> zbo|;Ni>^wPqP%wl+cU+9P5}n?FUeE`vnCuq8#Ki5WZQYpN?rQA2k71uX@!HZ(4^^E zl{Dqiifc@;)B4uK91-zGWHt~;f!bC(rK%pNCpopr`B3$)dO(Ku%zrlJQ9KLzd#r9| zAAiZAL`U_`66_31X@2aZ+sT5CnWHoe+98@VpdD70W$R&ScF$Rq)OI}#8G7a1wsOiQ zjaoZ1(nHgAfV0GUGsv{xU2-0xMX2YWEGy&)!aSmz!o3y!7 zVm|^c7$W$eWgb>{ZTk8fH-Trqkg8? z-O;m1Yhig&NL-mGnc~M5go-ufbF7$2MbR)x zHiDb&K@k85b51@->crT1x|G56y^cU2GV|LHHsBpIqYhD0l9<^$G(}~9HMCB9#rQ9js zl6Zf8!*uvSYb|34dnhlzD?Q+&`)vO`DIoQ4Ps_p_Xtte6L+`vj(3pf4_PmMT6`&~I zTI|if;k$d42y)#zzFRVmaa$)d9T;&QIkxke|7%Jfnn6I?ov+I$C@$V@vVCX<5hRSU zOrbJK^-WYq6UzWXa5J}&gb~O^e@wKfnitfZ%1PFCap*rDhER3GAEL@O16<$A95(n` z1y`S9N=(#Phh1;RZpj?HhmgsmeZ^qqsMH^c-u2u@Eg+ z*|Be4me1~UJ0zn=2frk-a>0N@IC9+eE`;dy5LQtFYJl$08<;^H(S9Vti&B$8?Er0? zoR|+Bo+>#NElQ*-L0o5 zCNGh*ye+IXr!dkj6h@Ye{5J)a)e<(<+4-53@)^JJPtyHx+1J%NDtq2q+t`TPZOv(O zrmY@b@aCxBNUQ@vl!mo&bmGD~gqx3=g~*o4u(|aMKflLzq)Cv+cG8p^C5<~#F^NU6 zD~q6BMe8C6sH{*#{P9aifW97cpXTOdCXGI1-0MDeIyvvkds&7P!AC9^~ zo}AZkoZB9Gw?ZOM0c@PPD7sJE`6=hMw>lc-Ag%0;B2W6d@P1~+$z#6tYLbgKZH-wf zL9*F9)h1Bd5xx}P+wu?mBVOyoUs09Timkl`Nt^p3S_s)m6HVkjUmmHei0W-5;YKd= zim(Xm_vj$R?$LRlh*alAqUOq^%>f;r6+FwSbB6G33!}4K`Em2r_Sp@1LW>Kk!`V(G zD=sf=kG3N_tiO!k!xciTNu)9h_2=IVQ1~jVI^r(aC1o?k43y6U_o27c16~6yEs#BIOV7=QhPhZp~mIs1;Qlk0)yn!r(8 zdP84l*sPR^u}T7{g71WP2+U?^w`2De&39h)-v7iMgrm!}Y^~uH;4|z`X83L)=kRX1 z!N+aGiNgV=*mNy|RCy{QsC3SADdmDGnNX=WVJtJ8sQ^?|0qo{268xA0qw#D){! zk+95tLQPGF*b`l)Eos~a?d;~{-7`Onfknnh4!6KwvLDG;+g&{A>}iHd8F%uEwG*Wo zN?%4%l9FBLfsD-qHv?UM>=+^+k^vX3(#kaxHfF7@DFgN4e!3vjSn&b?tSrzEKn(QP za=uAB!icem`k<=x%z!oxR4wqpvBRK0s8O7ZYxS zvr{28zqe3zKj5+YkA5Z3~U5H~*8V^&wwLeokW(-wCj;MTApQb7MGpDby?7mE|Mthqy@=HN=0#5pR z5@2hVA$PEO63ur{513G+0J4qkO)9uS80}aORl~$Cjl{EIYXMy=r-kBvUmhJo?YC56 z_KC!j(JmtoE%E)uO@_hTEZjbHU*|=x3}Wcg-0ylQIhjR-z-&Xj;vRw?HdoyMXj#dJ z{nr5_OS=1+c;)8k2gUGCN@U7?7?fUlJmy;Vd~gAdF&g=&!9lhKzQMXZxSpr;M_NG3 z`)$Tz$}fcP?kjGbqxty&$=kLqn1vFn5%LP4Qna52M0Mlifjr|}jzc9~ha=z3^~fv& zd&{`ahY_GP2{b%21UPYPM0P{WBWy3Pa?+jvuJxoyL*Mmh838?(a1-3N?>b-CM|$5R z5oo`D$?PapP7^Jo{u<%S3a%ffgtmjns8Y*}ORK;zeHu5acSwRGy#L#-y&%#T9sNd5 zQWIaX6Lc!qd<9jeY*}y>;?=sHfax@@wDoBe)1*GL9cDM7b)wsL0=QZR^Alh(Rh?o!VqtL^W;?7W6dc(#XYa%* zAZA_Fh2H?MJCA0Txqf?It)Bu1`4+0gcpS}LbJ|NBbtjxI&KX+}B z*I;UXfSm21+yphHkFGWLN8WCwdyb9U!$Blx`v?by!uE&SuwubaEGrWwG*cHpCXS7Q zEzIgdNEAvjk9y9lG)ZMdG5Gm5;549_3)|9untGX^p?4xL zyX(2&n@XH)ehWdUkWZQ03Z4+u0NHI?&Qcd0VG}TvxWPrkY@GLxxEPR4nOs|&ujVua zu}%!2zSxpBY6hr(&g^lne!m2L{EaAy0r8Kc%SB>W)Mlbmpe~|KYO+Y59i_Qrkg&dTnQ;Ot$dd9kwsCisLJdiZfxhHYx=S-W2}`W`C9VX zCq!tW+ZBGVhqcrxd0t6<(`I_Sqbrqp`U5wLSq$D84#PaY+M6IEG(KY5sJH08xLuWd zO@voDS8;QNEwMBGW~_UI{2%O|VW3c16c{);aB4Swi~!c3TJP|T?b5wI^XF|UpWBE@ zwXku#u`z^0D%fLElAg4`@MZMCJ(w7!%XM_(6-2<6cbcGZ+jfu^G9?Y>jI`$LdPVW$ z5_~9+oHYTizGU}5O6AZKh4qtxk%^&iBppr}kI1;Sz1G>W+@~RIc%JvPwu> z85|TLVlC>=FVJlcOJW;OIn-1hAY#TrZ$M5-qBb}G6Z{z- zOn6L;Zn8lpL21sM)mx?#UI*Y#8GDDm1X`3H$*S&misu1KgNiaW#Se5uiyKu5XS$a2 zp0u7s_*xl0azu=Ud@CCiFLwyOS=M|Ujbz9>n;D9vV-B6&ctM2&v*Yk8z>hX7lmYO+ z@rDby{`dr-W(ybD|B!LZNOCi}mUtgQ&~}AZ`ve#_`4;|fPshT|mV-AUq0fbyEzO4( znRn>@E``dW*3liw}rv9*49mN>8r{U+R+49SE5QCNr@kYO3y3u zErwt0tIT^8egE0@vk6{SWWE&F(d{iwv|ms>sZjhm%_tmckm(*vnf0mGJhb?Y*WDDM zc8E8&-__Ah`#u4O+40kcop!vGRskS+wDKglF|RYrn$oVR=?8W5ox-O78N9?H(gPI} zJeu1PGsgxcGYkX`9b!+opl8hjEm```RNCzjLRNKbtzX%5Fi<9wx?xV~AJ?mx)F=|_ zat9_5TkX|;oZ%7|V-VYX@q8fD=48{<4UQad0y3+YA8|=8nbn;$Z(D*ww>p@Uh}KE& zfkQ9Mf5qLe?;&l_RMj?vusG#4Xb8PsQY`P?@_;Eeefo`j!<>q=-=6P(C{%H26*?4_K4xuY;?=5{uJyGVrkx-*7*vk*_LXE+(+zW2 z{lX>rlPk!bexV)6ZY)Y-(W4=u%<}{=Y2(Q{(IS@^G^A40wHs}1JC1IyJ6!CsdKmrW z0#U-&wp7)lUS5&_o=WLUsXq%hO5Hf(Yu`4#)#NHHUB1p3nidi%lr={vg*G{m;bLdFhzp4oK)<_1hs^2j(I5wJ9GC$ z?ZB>wyG$P8;ATKPlfy3Qn%=p&*lqr~(G zd^>SW#_E)g_a!5uFgWVJ^AJnQ%9UMD-TQ*S%@@_K z0E)*a9gB6qq|U2v3^-a63c%TJM?3ZMR& zpox`p{#?3iMfQvVs&+yQ-V=WOo3pm_To{Q=O85Pa_BTYG$zxfD(Ir zExkP*X1A*t&)Bg27okUR82 z9i&Mv_Z=TSvhz6^6NMn$uKJ9@xVd#}a$WjX7eQ0^0A;m*YU1{0udt(DPs*yV92@o? zDg)N8TZUzvT)ZCcmfmXWArjMO-3jNsBGVTNyEBxAiL!n4lr}TgF%)B4o_c`-EpU%wruxB!}_e?UGec$U|*Sgkk0nv7*F-p3k`B~tvQw-*k zN<9+@78P;g@MbHfkVOOPhbqyHcI|w7u5z)1%r7Eoy<*ZIr5CDypMCNoRGCT>vLyd! zku3J+1mZL?Sr}joS$$nD&BR`8xzg6$Gt5wcfl+WElm7-D8Rfvg3RanAwgFElt-kvN zgp&Zrgz|g8OQ=sLsru_BmaQU&3XjymHf$dy^Tm^1k!Xzjr1+qUZ~89K6l|&!;uGuJ zdp^a-_X<`zTH3LL#zP6whGRgJD5)P$QNB`7A(eUpf%A3&-={W};scmITIy-U*WMv*R$1TnIC!s>0!Jw%C+=r?Ny%Jf|a zp>g5Tnz)nMg?}nzxU!>u{LyO*-is41Y$UOc3#MM&tmramrdzeNa*G1s39U!>#FMs) zDhfZ5K!kHT;e<27lUQStRG@GFotGoSt$~(Ie5(t;whbz?*AK73cjfLl?@5*{)s$ z{ox^2F!t^0~Qjk{BnxJNe7CT0kUtl(u^E?=T`z+y(^P}ar7$XnxwJ}L`0=t z(nYsDk9ylwdGA{0xcKogy{A66%yCrjb%c~Ki$z_UQtJ(&qQ6U+yBBoKI^lm?C_quOK;=j$`Y*(BfcLEAcmY7SxUGi2T9usQ z63#)}Yq$n{LM0R;4C;TQE@!>XN3TCOf_#$-Ut!<}!#Y;ICa!)&AD-D9zK{Lm{5Cnn=*f z)syP&3^ZB7IRMuNm+OndrAaE`$MUs-J0G+d%s52P+hLK7a$RBZoX&0G);K=7?J9e0 zF1(VmsscC&4W9xtOrraZSJD-gTU_1`XFq^f=+*p7AsKgG1C{!9;wp7P?fUAYqWB%% z!W-{(_2!Em(bb&d(|NwtEJeC_606ky2uW0KfR)ltg6PJjHf5i0&f+%+KW*axm?<9? zv$f^z|8V)QgH$~zI z#xLjN&F&AR3BuR!z%uTm4RTH#aQY1MOlcgKy2%r$Za$r(VN&MYToa~;*cb74iw=oz z3xk2wy$pG|?Zh=^WGeQ+dnWaZSK3ONh6_s&?9sh%+U;zLIC1 zO!B|;ji?g^DG7Akb?nI1{cw1Nx$V^>9>S=G36xNmc1Bs$(T!@CvDl0!-PWGR$^FEt zwlv+w1IPwQMy3RdC21W!apbn3ahtG-^Qi27!)@e)SOFPwg&fgLBedx*^+mfPt<_PE zpR|9#$QEHxuQxT$$DR5#^f6eyHCBd~-TN*1xYR-Yf;1G%|7}R<+}jDLkQ}#EuuJy7sI8Qw6X$IN{OyKys6OGN3L6+3}Ge&QS%<44BXK*sUO$ zErrGm`kC(*yIZj*?v?4V%A%Y0xcU*XAq%~#^VN(OZA!a_DprBkZOKemKe(1lReSWK zpC=0eDU-e$sAv90HsA`0SOa5mO~U~@i7omJvrN@C!i3XhNpn}?kY>vmScP|_>I@hE z80h$0jFIvNq8s?f6`^9elOT*e7-*xp)`I(`Pc&yJ-m)WM(1yrfFrCMUW3;N#xxb9s zD$>)~m=+8%7h(o_E~;#askFte;~T;aI(nCn%;Ca{6KN> zIF$q+RGvDTwf@|--O*!~=iZQ1iC;$LslUKl;Yq+E0)Y**cka0jjy&Baz=`6`r@S*n@Dbe&Bu6&c+E{VktTsmO#%3Ex< z$JeUf`A?%;&wanVi@=v5m~pG?7m3fhoJ(Rrr3>V4juTuM!H5*CV9@g1oU>& zy~EIm(KeZ@dYt%{#}GTL&pY_Nu>lq;Z4H@M2(5<91(H?vnaRp1!N@Ug zVN^TZDRW$(e>t1f_Q)TBT~{tH2>-G8YkQ&*TXkCQJwie#c_!GGb1^`H2T)ULl<})?qRz*dHZ65cnks+gh(kN{f zWuz=$4~g%-;Ve5+R6YJ$A97ZA=aIHaJdvA)A|gLnw)^;}=(8xjZ)TVBa9 zn4h9NjhCm99i=y|1UZ_Vxy);$T}(xB+;DJW^6Q5`9o#*+Ble(aYaicoFS}5tWIV3m z*tp=xpaL{73Jt)dFfWR4bd3-TcW5%u8C4`f1bxkCOO86hZNOF+um=2d`q#>53oZK0 z{NEqlgn?B-epM$NRZ*Lwn9;z?=il8ZZSTACU&XNe9~U0>7VY1tPVWBzs)>RQ%E0?l zF(z01$SAt>U(H@}F;9H|^L<5pb7WgrvX~b#VS(l$b!E%yv-K|*d$}{KMtu}VI-;V6 zQ=aTOa7sv}&yNq?VpQKI)$m?Br~jW7zZO5VMI9P07%WDqG`&|an#!fz+Vg`q0N|=5 zZk~|uaVN<+Q*-{SJ^@tb$UK#tp2mmpX$HQ-DJw`o5e5pA*y9GNv@D$S+dB3g3EI}H z19V2&01CoA8wn_kmNsS87P^0eV4HIgcK!~-rluXT6m`iQ{#T6QVNme_t??e^*M=!= zv-ORul>NRAaG~hxPrOPJ2o*mY+}PNt*@H4GuWP(bAfY81IiVj_t!T5j%P+&DSA*|< z2b6td7MwYoFEf{IuzuI1q_eYujFfgtHFn>RFAlVfejmBX+9cpsB?l*EZ`1a!*u2M> z{zD1&S=>S|cQyMi{bZC4{_v&gr&SAk{tY9#mI9=2q4{|AeZLp|^S}(Fxn2{B4|?tb zQ9xBen7a%~dr$o3V;q^8$d9KBloh-BgFHlQBPnTJPkGIc`*C(S^AEv|IK#4QjL{7O zHEytZONU6<-;ayrHW(^%Qw$g{R*M#fK`{=clI*RWvGRGR+$KvS)Z+&3_e3MF8s+7c zLJ$-odmo}@ta}*!=TQz^j$0kNY?fW|;hekmu{%zgw)f}8Iql^lhgY{dI`KYMd6AV> zLG^r_vt1UK+S_BW&lb@4&k8@bu}0mTu5rrXEeuXTcy-oqB-ykbqG)uc_x&=Rhg+M{Vp|v?O#>@4LD>0vOcwZYrGk<4c>XLEh#c@eD&vLNmovv- zjq#Ql%{oa8l$sf5)^FMY-XlN>j4#1#6Yu97iY_9fHm3cB%9kfNBN@M7K$E#dA(gLA z7zs#_e=)6&bmJj#&8lxCr6`K=FC@#8+)sPA5}IFIGET~nPg2TS0^ zT>0hUt|K{=_fJ-FQ20(}btUeyYz>toEP{7D@WiS;4fyCPbL2C9(N6JIQh4@1fci#o z2Y-CU6Z)sGV{z7Zy2GXd%w~`RO!O<4#t3zmlZLb zkFSeVu$kHurqi#B;)^uvpr=~-yLG{?eW9*CLmv|bjffy`=9GTD{({%`*+iz9W~(tvj&{`QdLt8I0({LH9d(KvmBirB;Pz zR2Ju`wqut_d{g>{66ZX8GKw{%(H<(j&xqzZkb8MTkYR|CL-I3KiCmbl zQ*oPB-fh5MHv{BtJv+&Pr+abryJstF*^nt>Pw{89j!?JZx2dFv1Hi}WS04_b8it0l zcNB74$97v{KPfe@sN^}qcXDm7JI`jb7RM&Ns7}w3FOr-q4OdeH#6mIa>zvJeqvCe6 z{^=GJ{QbS8$&XW_P(1(>U}K|Jay!oC&6?psAOo`fRH-%jhy#oBZUz;%sS{KkJY^VBn6paL>8<375wjXU}-xFM0^Gio%jf1QvDpw;O>1?Di0}qh)&<; zzgY0y2lm~F86t1v)n8^TPT7aqWd%;Cc^{O06y5H{XTc33+advpD3wcJ*bhunE}WAX-?vS6L)w`pyW2?g3B8 zMj3d+>tn8h^VgP`R`fDB(g|wmDxDk*SL+&|NYAAN(AEko&<{>uGCnn}@jGB^3tkS25^u0dTWX|2K0 z;%819vd?qmj>;UZ?bh66*2BnZBJWx$b@4Bjhm;Ec!g%^I*o$CmKK26iNg(biw~eIN z+6;QNrvi1C!E)B!Gq3x`{5d2T&rNIXAxv)0(E{4_=Y+%N2P)Nl zn=Yhc+C?OKOPbsS%c(m;rgC_4^$qBw|Ab)?@3>4!;Hp=wE!n~+TdRKSEgKqP!u>eR zk$t0EB$_+*wdO^*MgB{s>s;c&UdQEnlE2`tYY2g>p}nTs)XxRH=vyt5D@jvo_I8f% zLN=AGKH24sMe&)onL;tjd+VN14I_SrZ6#uxPn<;lWq=7cc{1fco=VE9GuEj0mR?GP zmtUHE^LUH-tT&&D!l@=p2})x-oJW1oz)muDQPC zc`G*JUgijSIWS#TAY_PsaD@7nZV#z?gJlk%b#9 zt?MKXPt?UYuwiAOK&j{fY?P(b(p=jCie-i-h&ZeaFt8E)rY0Y0@jontHZ#1*JX4|`2)%46}(p*|HTK8@kUTv|F%Hc+Y*;E+CB?tPl6 zO(dF7#ObPlk%=q~KY9S&56-J{pP2BO>PJgHeVI<3l-_YO4*H!D8Fed0Hgq>I*->h^ z{DD>slpp3-6A(kRK_m0BSt>(fB7e9;^ul`SdO!U%t`vQynSx08$77x zsIL2S3=3f{uU3ldGI_)b73)ZmdsFZ@($HarcDEt{PF|#ksz*!GG-vwICp8`)Y|+}e z>pD*p6nq4zVP{+9#Al#lM4bR`otE({BLhN2xz3 z0@HNWnt1xJ_!rqwQrHni>kPqaE}d$AxZN%TKBvVU6FX1r^~V&QPPePdlO8IMB%d)C zKbPgxrlXVe;cx>1A;B!GM^8Cj5oa?3l)vttBs&>$ikUS`TNSsQ_|6@*w?(D`8&QrM zb!jbJXd~OTD?w}a=^Um|LEYCijug`MBkY&S*l!zoK0V44(**0P2bqC?>y26YVP?WL zBjcm{aQ0!d!StEbQlPnwq;W67@U7P9*^iAstdfP$Xrx(7r(am|K(kd2@4A}jPYN3H zoKjqvdMjNWfku^TcnY6As>#$Sa)$b(FqYtUx?T%p6#leM&y019xq8t-p5j9?k?+yM z?q#TZfUVTGIk3of!hjl37KBp*-Opj=2g@w4Ol=&Iq`SUsScC`z04Wd_9U0TjxPKw| zmW7$e!!^kXwOWWUxA3}Dwdzpt8r~yVZbh|dN@=^ciTW8|H8>j@P%$aUoNiVy z^7|nf@>V;tZ(6o)3_^)ziOSxR1oE?zW@&cJ5dTA2F}4daKL6SpgD_}UQL1Vbfmpcs z`bTxS3zfV6GT{l76{M;=mZs@pyy(4TtRIZ$JBi~17}bJM=QowQPw53$b_ zjt|i5nBv3{*S!(TW~0LE&iym`Fw6F(!drIh$md;xgoWd!>m{eb8YF)sSjqG^-=d3g zoJ?PB^ZYwe?H#XlU0osHvr>$7@sq>)cYeEr`PnS5$&w}kz-|D*SDR!zleDUGRfb`x zs?zJdQgbqLK+WI#**?ymriqqt9SmJ0tl2a!E|?Nn4cmNqG8!rGBUypjVMgAMly|(e z@!;kp3*%9Sv|zmpH1yy{S(bA_JLg3rc*VJPN6Wf15GYVsLEnd-6Pa@@-JI1aub{2O zle^B=(AB@n3nv`AJfu-}=BnZ87_VEVG^>;3A>c(97Po0ANAXE)4ULUB( zqp~ut`dLF#Mg{<2_)%uS%{>9!1Z1e5xFi*sDU5xMnX}(akj?4S(-cbly1|bTgqO0#pYkQ!4z5ONp(O}W$_Yp^HY_UET znOGX)uJS#p^Kqe=8=)c-qDn;Mx%x(0{I7pzY_L!(Nre04g^}Cp+P8YvpyYk-YU&6F*(JlRl4Nd1lleaX*Wz>^zGcf%o5aR?^`j-tLve|FxbJNO z@(4~7+Sf0-AKg9{YhYoFVLJ&VtE9Pw8Yj{=>?r+;mP zkBkh_p)ND$Qrh;Xj8Q4-e{rkTY>CnaN{rCqYso1YCiV+&3mJp6_Qq9_RSmla%(V65h{m~m99tsm*@-a$hU zNX_drj6nLLs6l~p{GXxn2})8e$o}bnt#c+HnpD5ndkq`=dAjY*i<$p)<|~VvJr$Xr z`5)2w`t?M#0k~r+*A@Z=n?`CX@#=m5bgKM3DpuGdjT_QDJ)rc0?|I%vd5)6kqPSum zF9b`xbENb8$&qF|e)+qtpWIQ~TsB!W*b|D6e7B2gq%KuY@9)lvZC;<;jkSH!_ND}L zW%O z^^V)m8UJHQLblGu*b=|!SBMCd!YiVh<94L*`{3Q|S*+NSYxSGS?pvzd$9#O{R^%B3 zc)HQn358|uLS?9CfAd!zYM4FmJkTXPR6AUoV z+hs^5aR&?X2OvdZ_r=Zlf;v*VE7L+$7x?x9SyjA7<_o=pid&tko>(>fi-|AHyZzD6 zw~+p*-r&c4LPuZMlw! zryI(3!Xus8Zb!-y9;bE(A0I@{OvGy3mCq2#;gA2_WBPr(_Nw1NODdAZiB zmx7R8ZGt{(Z{65j+d^n8+)YJxbhG|j=A!ceZAyMNX~{IHS0M|p{KK^!>ks|id+f$6 z>9mP~T0L{Bpz&YI2ZT>~mct{Ses)`KR?~xgH~Rf-$tuZ_&!^hv_;mJfIH4+kyDhJg zSZi!=o4y4}mP?Lt3eGIFG~YO|6Dx>5gBUKY_$Bd&RmSDZ_VH)DqnN7ze2rEUQiF$I z0lZI?5`mkixktKDy%)`zc1<7CF)&5T_N?zFS0lsz3Sjg@WauycrNugxEUROJ6uT2X z3QQV#Z+2?$xLqYG1I}%0gj!l*iJQ9d?|ioPKf(LuumOlQyBJOhkn4umiiBM&G~LRh z3Jm)Kw-X%$RR+2X%{G#e0%S`GTC|#_ya{1@)?=2=D2N;&Wq)~9$LiP!bp?FL(bGq< zdU#x(%!P5VLoZRr;8RFkZU2Q-bWGF;!07{TuN|4T%DEfz~vX#4S~$ zOM%kA+JS@}&vJu7jRv&u$0c|#6NN)2*wYq7&!I89oO?G_iU9^gaG|C59 zzC~-WggAj)*jyEd&r5u9czjL#sQ`!aEqhR-g;I6V&rFRP2qe1`3w3X(_GZA~BEC^n zJ;qyost^uWNl#e>&gH0~dH z^E_Izbo4IliEC6a{817zjc29$91aFSV*+=piDmA zTFiA8l0!jgtX|ypmyu77rm%8-i60EcB9wb;NW!XY<4y2-WVmNn3CQo*uJF63NY#68 zfVtSN@Ys(l4r|X5){?+4Jh&zsD$lJ*<(ZGK-VBR5Ll5;>e{12o6L+0W<#~5LTU>3U z)Hcr{u8FjNrj&#m>zcY5lTY89=+bwZnjc?PlpGfD<}hQW7x*x1Y0NL^Epe+ zpC&sbBT-0UYNV9rW7mdaG@7w4NokLPnmqzpepX)g@PV^(&b)HTP!0z97NUUP+IsYm zY0>7ZpDUf1xGf2Dv%wMxF}waoX!XZ|1Uzd~j_B3hm1dYuH~LdzKkl^JJuTMJ%n(Pd zS*peMLJcqNBUMKPGAJP!$={1NjK1NV({mRkd!HsN0dDNsMsKD_9&*7f=f;on5sE>qBQMl> zq>m(qZNfuu%Zc#FH+K8ke9?HW${|k*nbe2*ay_%tY$Q!1(Slx)V?|3xlJsdt%%px} z0g4k|Rcaferw&b(pZq7AY4oXB(600-05|#;`sUv2Vn)h2m0vfW2#5c&#PCNj#t2|h zuxM)t1KdgW1JPRM-Jhkf3|5ZfCF0K`_%$5>aROhe*~OoPZWb2}8nC8jSNSH1h6xuw%YJw)L%Pe<3P(%p zHgiG4Y-323(SzgNqGIwMeY)V?cZNPQ4+i-@aKB2p2X^zu6%YiZ0{G^T?A&DvUt&c5 z6)BD)Y*4_gDXg6yCY zQtCOU)kUCwEem(qPCX6fYS-}%3sxb3pDM|y_an`DFZA^F>Ol3Win>^#9B!Bg0T8d0 zeAvO_ciiQ7*QQlJ9cU2IT2F-!s;q4qB`UF{(H^6J3xn6>q^2iHkMRo&>NHCYXTv<# zt;#y;QF`lePR;pl#$m7UJg63$4Uq*nrHFxC#FOTV?H>G$|2Q&T4D1e8axNMvQTWla z3V=R;n)MHtc1rpoj~H`ZZABXOMd8W4{=o{ZM zRI(ig$_2J`f;+s_J3EqZ4)4cszKljC3{T5(QkrTr0x^eCgIQ4Xf3?qjR-Ee>wJs#5 zMF<(36+*n1AJ?LDErCK$_$Z27FQ4QvO=dL`qH$Ne%Zq!B`b0=1l{`&-}uzBF!&LFNbily?^(kfc@H6 z?c2T3)<38J%3s2_sP)^Wm@2`LvZJ6wocnkGyuK-oBsu}biClSKyCok{6shkoat+B(W`Ok)8?ne5c{buv4iv6se#O@q_)e-Rvv^{a{_bF z>d9k7cb5=$e0Q+=t7=<{`{=(MrS|fa&#G!i&x7&BK_#*l()*r|C_1BO?<9?7H#VrI zG3qDs5AG?F?Z4Ow@|u(gu1d55b*Z^`ECb!spU~rf8!EVz9SV}A4D`Dif*9j+9vF$( zM*U5;Ag;$fYb+6WyOkbYc&qTTmRU}#h!1HtpDi6n9`!Ro@>A?-XbNzT(N zQ(M@!E_?NiA!+K#s_j1*aT4tT2MC4cAkx0djujJ|&{2?HRoW{`UU7$U6Hol7e83yg zTvfXsiId-z209GNvd*f^bvPN^Py;VECZ2vN9(ZYFA1p|_ zmP@iA6{2olomxd?-%kM49I7x|&=-g}6C5$pr2IX@k(B?At6-56!0&}t(j+UJJ26$( z!L`M4egBNAnYX^*d!Qk4p(q$-bTohV4V?ZmYJt}YZd(3+)!Bou4UNpdkJb{ivP{bO zhGBo18xSJFDnY51rbQPq2J9&7RPf*PSxq-)uVZ!HHOO&RS3NKg-m}zwJW^+3p1=t#iR0g z%EF_xeHo^xGTN;7^g)v%JHcl!SR%#`TdX41FE&<@Id`QlREYs+hLl`PX~)vpMTsWI z0`r@km18KTYP*cN=5D{s4`X4IRBtN(!rA7ax0Dm$ErHUA$-1BtyTih=Bml zbYpmm8cIXz26Gp9<>e2Fn`u9T+}w7LghPO~a~5)`cy+5{JGg_3f`u6vOr<x}Ow)(#`lPz?m)a!OW#> z%4sX=R#hG%yM-`mhP@r-N&OlJAa*WXa^^Ey1?Z?sj!Lmv<+MKXw$GR|Q8ES~vR(S9 z&yz*O63fdF3bSj1@iz!T1tkkB?hiQi&_m)lchB8Ow~+~-l7ejxb(zcbxL+ahD~SQc zONSRmpL;QBY<(mIn_=%SgHiAD_Xo9nCm;s zh|?$(1AGMw3ia%rC#WYHKilZdDqPJsunOL4DT=>RqWPB0?NfeU$$l%Q&^XUQ*9P@> zirC_z7sQkQ8j4Rxab*-Vxb{x_U;V9ZD=a2HJ~xFkD__Nu+L{QfSpSbV8g+hz zW0A8M@=S%R&?kys;|!z7jVxK4EF(~Iv!jY5whT!_+fEtkP;|#7pRnVZWygUk*1=n# zs?#h71lzl)wd6HYSz8!UCuIE;0e=nXk6IzS#qF;78NFNXEBW$#49$arHHOb_$c{m5 zmHsXHxpcL;yf3QOQ|hbie4xQY7pgcc1+nSSu#{YU=$lL?JQ!pYCLmS_csVpk1(dJB!fqE zx4dFF-N_v}8vV?~4dN$KZ-T^4AQk9er}QTPrTP?Xqc1i zb1`+S7Qkoqi*=!MZIhIy;0d4H!$8}v%g0x1n&W@|P|e&}2Zg2W!X__e%VuE}1d|5MIcY_VNt;P=d&KMMs`?v4~6UyV2rpUZ#AiF6U} zd0(PnFx7RL7kxY2&Ql@302Sr9kIrw35%VbmrOBm!uWUcHf>fmrl^OtUe>OryK|J6) zHuq?b+*$705{BsD*Te+US|ovnrl&wE?Fw&(CTPssyQp8%QGD3|Zr19omx`>ZQyFUv zxXDSL6?>4&;OcW%VztYV^2Xdy>rJ2}h1_jwd|DoJzQgI?hZ20}jvQuSTpbe7Yl8uG zlctG)>cm1g>fya~KiZTC;vlX&>5T4T(Tq>YZeN2o$*1wMUb0>yO9H}ze%_hXE9^S{ zyBoKVd_Zc7ogeI757zMKojBM>kEZSU))-m3LmU!D8OEq=oJ6KJwS@Ymhzv{tgUd79X26Bm!3qVh+K)k(Low}ag)5yEW<_fzZHOUj{yopv z#f$_qq?|4Zm~=v@F%=m7>f~dau@zyPO55}K9Wgi)7X0?p&5XnE7~4n?p}&X9M3AyU zdwtV9gt4&$8nFkLiHz{>D|E~Kdg1dbKTmG9+R3yd?{h=i*$N8Im2?%ObdX2X@L#rx zy@$jt5pj{ywI%(-MJ}fK3uB`mCl_|lEpBcDl<2S7S0aeG>m;N5@TQ2xzdWT!)eGbI zJdPIjyM^x=sf&XpS_zZpngB>OYi6?x{Lq;7U%tok)r7IY7{#m2GzpQA~cx~tY{9(_oxB-@|!;|I}tt1H|O?*$=+n;ox zCZ|H(PB6ls^pQe*oJL0*Fx(>>I@HozHgWYyrzUm4Tch@z<# zq(MN2kfA2|OwLsD4y+P=md@ce>{p46mIVHjk`AH1`{fn$8n0DyxYRo`*T8L*cDqo> zg?McRzv@v@;*SeaZMJnRZzrv`=;(TJxd7U52jusrtJljA zfW$lqM&}06lm!(LFyZY8vGw=mD{Cc{Gyivc$^X~Z5+|bvifiLbBpyeZ-Fmv(UD*Bj z*~c=K*$U5Ulz32NdH!a2!1TXKw7M2HTR|riF8t4R0ZjQb4y7?-Mv|bM>IvQ!W=3;f zLdkn7DzCyaicZ=Kg~-2LuJ;rY*|mz7j|v_uv+*q$0I~0)c%ilJpbeFZE|h^yt~XWT zX}PlzKONU}Sbu494XD=UA@&TJa_g=F`hx=V5D?Nt;_r66j2!&wV+2WX;XEnc&97KW=ISW&sBc4pde<0f z7+@VvoU4otEze?2Ra5YHZgo_=N=;rk!Y3l=!6G#z{-QqZlw6VGOn5mKPCm{J#vO>! zvuAxnq%VkvBNcUTiY66q?<<&BnZ*#~v`@)a)DC-G_Wb-4zCxI7dEqKi@uTgMx&A5V zN2Y7h^iqXWUC(r#hC|y+BV%X*r&YkZttma*FKl1Y$$ z2fLt+fS_mH1#rv59nM|skNL9}6bAP=+PJcD&fW_HtBhzBYNz>|-B)>0Ul%dO$Q$KR zX4E0&|Frj2ZchI=3!t6+%ueeT$Hv2!H)v-+c?G06zyrPH+i_)(&f&+f#Jn$eeWtFR$>c{t2`ZKAbmQFnh>Bi!f<8tYHy#*Y!NH z?#{His>4{_NR*`Ud456mjP;i>G&jVYBem@T*F~p&N78y(t4I7%zP6KV)608NH)(2t zp-A_N3RT_(uwh?`D)F5yqt#U|w=505FxrJHzHc#j!vtp;d|C~%<54IhvlE{<(KhP5 zW_{bFcTb0^?JrYxEcg$1?pBOa&$O$#xlZ3S(~*H_f}-AW$?YDR(r8N5_Z_7~T(?3W zOwqfdS3H^JRDsa_mCp6kmMyNS;hr7b4gw^gSDH|S-J(W*vWVP)t!rQ{a79B z%J0Ob)Dd6Y)CLMZhyDJ^02g$misSR!ssd9?{7EacDzSqSu9>VVu=iNyjl?q~np#`G z8LEr|ym8B2%EvaajxRkJyjcQ0GT$AZb4q$bt|f(p7`KI~aPaNB49Oqj*>l}w3fh?3 zHGaYj!>uxvc3}h|jiLTab=e`I>f|VuCf*e~&`4b}Uw54^2Mc%i*FL&5{%+k9oVQw< zioKs!HmKM7_5e$57l9!`%$4`P4sJQ1QK3!?9-@pzdn%hZ(r3-L$A&xD!cd6?(ImV$E|seUrAyyjq_ zsfZT3QqSO=nmVx&{77pF0q=MjZ|%DCWt^>4B7CNp`ab$Cbz>(f?`PfjSJUY4zjcxf zn3W#addEAQz18!^fu^al_Jmy*TDWg$?W?` zqaCbsa!a1^tqY{$$L*v;`qOk(*ab!78uUP^Kg81-7#&DzfeEf;^p2;8LyK? z*VyYXq0Zb`2k3qa0rz42NT?s^)RV^Mt|h#tD}e6$v+&iE&{%xo8FJ0&Eh5MEHoVKk zRh}K3(n>(`xWwMi%Ytl1^kF}LqF~o8KJYbfQy;dP^aI17e*HLK)Q-@Ws3;}yF9QT?%+x9XVtRBzAwkz)*KNa~&L;DG7$J!DXq=GGXo zITg-+rn9xKyv(}N=Sg|Wo45XnTz-diCwL>`s+e>?eum zyVP;BC~6Ydz+jsuH(g_?`E&l`Z*!2wflgTS+&w=%I@7QxI<=UQZNOv-T z4!KlA+66pna2+A6Li1>`A5#3nZA@BsQQ&%>jMlA4@3mB;TB7ir6)f~7m{k8!aZrBm zaFUGCCRBQgq`#-?n2fB>E=_c2(NhREgFt{eoCpHnW$K5Tp*dpw2o{``^rSk?$L*qi zP*W#^A3zIFPMz$2_j$ReG@vlDRs(ebe}}xNC4YroEcT)gvPqqI5DthLvQ=J1`}cC| z4O99I16=)dtg7p(kENDdKa1uqoeLgG2JAR90C6jiU;V9o6Fd+mh~e;xm92*INC=J| z?pA`il^Jw$c>6){Oiyb|FMZT-e-E$ruRe2kAGO=1o z@Dq+6&CLE0g}^~_{5x3zk}HFqhxXulb_OnQY#yJp+gEk19>uNu2S5P?NDtqZor_~^ zW}S+u*XF61FsLPtHGW`^y5!^uKI&;15)r>IbH^vLJG7y$F0C4Eja?Nei`22DYvzsb zYQv@>Nub6=WS>)I&*ZOw4N@M`hBUhr9jj{6$gS(+%t-_dhBPBUTj&L19WIqF64D49xavv}_w3HBqRlrWEd9dXMlwL3Mwehz^}d7JNu_OuaBL zDQ!gnx!itxiP*SW5M8ZIi0`@P9GwLiA8r=nHClQfhvQQ7CQ!|!eI%@IvO6J0RyYAuLqXVbSs3K>~L^rIoqHr&(R_K``^xe*mDSOGbj~+LYA^|9m?F z*+eQ&xmv3v=(#*1Z3I#rF^y~V$4Q`VLP2R3QXP@x#)n76wdz6 zvA~v5pL)lHJ^P17|2Hk4-VJR`|BsdHH6gcXU|R=)fQTcyZ^K4aR_TD;SFZ}!>D&@J z(92pUCaU@cwG_-h9gyw>-i`}vos@kIeq70?O5j5>O>@8(_q}Ppki9(8Bp|eXc|V%T z2M7(A%E_ojAkZwD#Jw^4P!$8Xo;g$-Q?MhL?QlvoyMu&0U%Fj#mIvIVE`Hd@{t96( z^iGO*SQ1!V`mv7bpR;|B!fnZw@QQXd2LZ0S@GN$#craeLJCk9rzA8&Gm3P+%YSbr? zjE1!M3Cg2$16ZZ{y55WwBMyg@v7MY4#(+w@`lwy&lBT9RP;^(H?whJpA=QSNn*;tA z$yJV1I-{gdImFt(|9>T$%(<&_VvdW}+KE5Mi^7+GBsH@8Eh~~wy0O{h_FZ1Htv@or zg6`Pt{sVYoR=#oD;-HnD=06lLl3!a4X!j#r-%r`4Vom&+Sc{&JZv{5SR~ek;U*afD zo)NI~P{}Gy1xTMWCX%Ay^kk|cg{b}abk_f18(9*NTWWYhu^nD9S*jmyWmLH&nXN^O z5)L{B+AHE$m|HFJep@shc3X%1FH*`-RaOonh|$?u7#UAgw9eH%8w(Lc>zkwa%@IFm zAd8;e_vImv(j#4%*1^ot6*SL*LLj=?x=-@!E3EzeA;vk>!2MoNAwl1qy4+pKbuW_R z;mWqcG=ZphpUcTP))z`Gha8p6tzh+AwQRYS8@}hgA_@zn&<~LMwqI6$ z>i@ycrVNSo@bF9qjrlOI6zIPm|D{h--+}s?ft&%A@jBb>QbjgmNT<0SHt%3L#}xCS zsyd%=bWr27pZtk`_uCQjA>lH}KaK~_s}aV=h<|&xXMy9H?u3l#IL}^|5c6=)>o!l8 zS27#1u|{8{VfFL3EDntmf_reW{$yGKY;j5kx{?J-!Xehc1IB%H7^I!c&aMXCJ!N_u+9RAhT@0q&h=B$;1PA%c$x$qCB8Fb*^f2fw>lD6EbH`UqIs`f{9FS z(6VvjbUh#*PCkz5qzwb&c)ZD&k&%4L`&qI0c5eu!EEU3w_2af^-r4;*W&@X$A zvO%1%bm3ka5jl7UwL)6^r5rLBufo^-_vbo(`rmA8%pRm3rLiPXdpjI5)$EqX(`wxc zXF+}cbvi|-uC*!m>5|lEt65(5C(L#k=xL=mc+h7S=Bn<9ruASvYFkt2Q;m;s+L&h& zOQ%;vZhS8H>fe7-`#2B|3LfO+;Ij34!c|vz`+|a)nrb~78`9*iAblR#;W*C1l(DAH zJX*%y5GRH?1aiD!#M7W)g4jc*lt^kY9yu?u7_?l9O9OKNG9yhDz8>mua-%BGAqcEy z&Rrn?rnTb0KBL0;|CIODVNreG-iJm?KtLJ<1XMyAq>&Iw>25?oxH70i`Cz8A|QDu5_V-Mn*X;y$-tWqOX!m|P6Xk2;5d(XnQ z*CBbik-spX86_pEW#YL?CtaUA8LS~ZKJFIsnlVcNJ`yTtL>4th-cn{*i>puH&5?A7 zhm+7znXChsH04E#ID=e(l%9nEjNw|JymPrS26*uGj$Be*(%3dTtKH-J>tPNkj4NjN z1^migYI%}mI218TIdpdDVrG#~4kHW%i&@jFtF?z3x=2_n_ObwMUS702G3a-)GkiGd zcBaD(@C|Wdxf75(HWp1-zr^6*LNk}0d%$EJ!ZdPdX_0creL~}jqfp56vDZkX z%Ian9cO4zCEY)@~qi`7v(CwlJi^MxPIpC<;TxFo(ds#q1!x>KtLnZLLLJXce#f%k( zhAy{}SM)?bjMeF*tX4-kxWW+Q zPMP?rX2(;m$Y5=x@y76mMg16q7FvxmfrJlVTMve6IE*3X@C&H6!>{}&m4?~aZR+p8 z%b1!@swv#HRgq?m$$DM2+0iBP)CWK{DVRNeEG#k6NuxSMUt1oMt~>S?^$R^S9tE@J z(nQw0G$yJkag7vUUg>LQIKzh1E2ChvQls(ITZ!DUG7oQc~U%jGnec}}97>%ht!4kK}BH6D~T2nYQp$Mm%e?H~>A6@@% zIQcy0&N--jhF4?m>6T+HY8on9F?rXfi^y1;l9+x6W2QO@!80E=(8I+lX%4q(;C{?& z7##V>gf@n%bxqa79jPw!Mnl+Uo(bMQ)MmryK5N1^!-6&fatBhtMbSb-|67~ulVhMfBPaODVxe|{y;}Lsq@S*xO_~$&h07s zEhPR=y~3PaYj+w$UHonkagxFeLSHhY?4Z{up+i13vQ3GDAOU7Q;3=BuexcQ@HUPL5;Y7wpG_BlDpce1YN&IBlZ2BV}tvMJbQt zkvC?;KIu~MIVW%>KlOgyYtIqBC2yxPXLFGY2SbHDTpIAv2n2~d_t)cEGax9d-NS7t z_m&JJh-abb3>iwpGQU#tfJ0KiIEq!YmLu2NJiS|JM^|gyBSD2h<@O|WZ;U}P&0$=H zkYmsU;%q#Hm$WH*a0y%jFD*+ASRR!}L5c)k_>#6VNj_+VwoFfFE0lwvO9JegZvKh-A&zl7y=oN}6}IoNW#WQW ztwKsB>fm>T&fRw((*0_KfVt>o8l9@6QLtBOi0C$mK@j0M1GZs^zTSEX9N|`iOqA1& zD?*#CY&t)ey#%~poj*AP(+YiUsoz#1?Rk%+n(Kc2G0orn9KOw5eck&Xc4z)5hHR

4UFESEG_{rNbDnfwqJSO@Ga!v?Y%W! z&ycU25=cp%l?mzr1knxA4-^GXUceIT&@(NZoNdzHn#GAzwO@Z}>e!-19Y7UvqFPM> z`Ac95F}o%aSzh^>#BK*_Hi2As8NG0TEL!S;Dd_6NqF4)P3->zi)D1z0M$yr6V;&;-+~@)uo{+5wyN`r9-esEm9?oR-%=-&BKU%<2EYxu|~_ zY86kUhu!oy;|6}@r%FZ`q5?nDD|^RLXAb!G+;19O)jp&HyQ-930*y_bP>|h&mjHMk z`~*F!{1O1)!^I1)~jzW9SJRbV5}vxA)+uBrh?4H)f^sdSgq)kv0-`D+b5W zcC7h8U~F2Lxte13FU6IafUJHu5ws&NME{|bFjR&M%3l!bj@OsaZ$zk*%}B2Ys{aot z@Q2*fI^CMSUrUpE2pT(yqoZNA)#gTIO7wmhI&A3Q{u+7UDD@Nqx-Fh42M;@I)^b(Z zlCA7LV^SukO^c4Iu5gcoyp?Kl(Z48Ct59&oWt_N`TOZw4g+EEx0Wj1@LL2PwVw;_z z4DG73v&{`|*s|MZ?QL$tEX|)^t57pb#(Rd<`uAa>JqOPlTK=hjRDdSsf8w==K0?8=4`!a!EPpB))3peBVrdoS@ z0ZPv3>bnB(W-BHjPjoGhbjtZ0^&YCU6gCc;IyH1oncWJ|?A5Z>&q}%K(lkg&b1bhR zOt9$rZqiaj&JswZd%68I2gm1b{2QXhy{j`zd(Wi?6#KX|`ZWdJHitqwrlzB&!(p7T z99JfVWusIAXVtQv;d0{M=`$BPhi`nQ-%R;?s#o8J40?bxVb})55c3_TU1&N8PJgcI${b;pHVsEJ2urE>Q4mbK&ibF%O7&B5Tl5rqv11eH+r zJ$}FScf_g|b_r1T!A~y%Mv%*S#jE7R`ENBV7O7R}#>S*s%FLb={&{y}RfGL8E?d{3m5Mr;qou4Y4;LYH?R@9EKI+wo-CV zw!DDVAS-_=MGB)t!UeG4l5|I{N|w8U5ZEsRGC?5DE0fgOXw6;tjrjSkQE%a$0JDaR!&EB6JQws56{`7Q zTMBQdC>AAVm17Kkj3Q31)#!D3%*Xp6lH1-wlZ-1)&IH%(2d=&e6c1F}1)V8R)rW1^ z7(*qk@kb>-N|0_&=*Jj+RR-a&D4$O&k*+F3J~Zz{UEn-(ySN015H7aRUst#dPq3Fg zV3E%_F1vw}i|N$AjWs5c^G<7Aadbck`oa9|jJ8T=jb0VH$=O2~DF9aJsv90_Q4?GO z=~0SctgsM;a24iTVsC&eF|%nBqyAtq{KZh&4Vzqhl-O?%V5y1kx`}!p*L!NmlP?Sv z*pSV1QzpHwbXgH==X4!`oU>d7^OOA@xscginIA76V8456)(GYcMN}_=Yb56TtRXf{ zkFoGDd--fm33@q{$91x1l%h?+=;jOeD-rFZwoH9EJ_GxK7(j@P43J9qB z-8;&0A2b?tZo18WTXfSCH{|Qahm+N)S13fOJMV?S4#fAV!BS4hM^pE(kBwmar!Sk_ zn~%Ge=GKl_=t7OOeC^*fZ;MfFez#LnM9P1^{`N|l`8qjGSx+?bUGyK0^z}M?4f%>? z2rL7K?b2SH!j`@PRd(|rXs$J<{_3~=j}R887UAr7ea#{G?JY>R#U-TeMZ6oV-!{A- zDKZ)|kCNr3v$hfHw4uB?+I_9JH%YB%k2tRM9SCL!6GmVv!i5-R%&KEfEL~%=#i036 zrn&zawR>8iq{1r_KZ&jE%7|PPhv`Tzje7P>S%bmjzs8NNYMN@1e{H4MzUk+Iyry*5 zqsh%uzq?Fe$|=%GA3-10H_k2Q-il1MSQoDjw424KG(G9-+0u_D#y;K6s>#fi5D}7pkp@WNP(r{gj zl;o$h#HU8;#RzMtq+V)a_NvvcrE8*VnYoj_izf+z)Lj;_YWX=guqrx~IqSO`Vesvu zz-5oXtb>6H(`rE+=hYzJgkQFm9G`0n! zVYaAa4IR)Vr5D+Z23@cVd zaSoBfk6+^Ki0C%K<=)L)A9WFIaQ#3LwjNfedm*A*VVNF8>soKD!y}=u94z!e7B)7L z`=SuCkiGM9HdVxXX28S1cyIT}1MHJK-C_6;Scc4NTZtZULSR*p^H(wmcU#+j;asPn ztJ73f7MMFcCM`0}1te-s@Sa!{ZNnxSWKUk8s>khY1-rp)Mrx(PMaPqD855a_4djA5 zm9=orGnYiNWBdEjl@JD9xdZ~up`cal1W{3^!N*&Do8uU4TqT1qn-yG?iMrbQeL;3F zKQ(HM9DI^~=|34e5xY6MJTFj7*mMN#Z);or=64^@?b$LdoEr&r(Lae(bY6Rn3H6EufR@b7?;oz4(Mk=I_mu6@Kad|np;bo!?_t)`i7C(KZt1jO~tjoZLE^d+w;N;DzGutlJ@Af7!oO*o@ z!{yzT)Wjt-5t_7xxNdOt-dm20Ljsr0uWb59=sF@yLx*A3#rWOkc@5<{8u7Rr4lEq+ zV-HOl1296 zYWj^bSu0rR)zyc|!M~(jC-2s-|I&e?@YO5)bI=%$r@tFYIFA3Pd*0+j#l@Nr8|y~C z+=sSpO?XQBchkRxs-br|+qCVke(~Y>%^lVoYwHqcJlz)tw`>zMCiXrI1O}KnPEN~G z#_k0PQQx!Zt-mqvvBk}fYoNPw%A0H&IWd2T?V&Z*m4>VyCz-iS$*UEqqywb>Ug~uU zrWds1tF5UO@;LtRH%z_bNBnA{+oSZ^yxDfv#^!bfdg%?j=;=76<&U^fRUJEM7?D_f z%ltc6qY`{>{G$CdI|UUqr(~kLliwF~twC;KL9P5Zow}*);ft@~FUtw?;{%i`_K2t! zKU`V1``oXtz|}U9T^S4Fhr=}W6%OSzICV}QLA6n(eD%}t-F$)>B6>L@Sp zaS-EcNqy3ieeGRFaXqAVCx0=FKdf%6)zikT=gQFrYlNh1Y(>U?{II~y#VhrJI86<* zMC_mI=x_L}-9g{i7%Hk~Ds0JHBUE5HCH~me@%2MLKY+Um?G?AMWDTf09tE zLo;h2M=1bDV#vZv{ZJ$7bE-*D=>AIIOX5gSSO2~uiH5bq*K20pCWddqx}(?^Y1Vq5 zErM15;=f<=`XY7EH3E0r-lYkt^7`tUvXDp;u@tj`cUL9uwn6B%_Sfz$N_OskE*nHkT}Sy0c3=I^8TExZW6lGtfcw$M|6(GZNfGH?<@@Dh1j|wU08HX7T>?K^ zlT5_9xvUaBvKN{~{P1U=)<74^hLQC9;AS)n%*gIT{$OAZLYe;`<4}$Qx9cvMIRi7T z5l#YAhVN9W(keKS6%i68q22pl#U3Lu{E<(BC*nQ@Z!*0QMs_~Wg*F4J{w!D1EPQnnP)jZ6@Zb2=!q!#4$jhrvS)B{B%Ym#alNwTr1 z0!XF$(gN$NiR*_BIcvOp_Fz9vg^JHZq82fWokS5|_d8~(_;|TqUSYy``FvUCxFLP) z3AuXo5POETE`>W4F$Gf0O^tRzGjcG1#m)p<*`^hxUjomCNl@zDpYyQ2LQfK!;Q5%0 zl}E|dhZCAEecjKYIWG-zb)vSRp*;$l);>pIUL}2u3x;w08rkas2u?W&6AfAz3jExj z?nSHX76Nf@^ZQH&6Mi3jP)KuZFmnye+c(^YpI03Z7~Ko=w8NUvWBpilgu`{GEQH>j z*#B-TrGIjCi}2dit6HJHYu%9SI>|E_s}lk97(IOo-W9R~rjhDC#DPH4CqF>;zd<3h zAe=2Z3x2{B5-0liQx%RTz2sZOSJm$ z(PjIX0GyO&O)!gtFp}uJr@Io|`|#@7-YiVYXDuhHm5)SuT=A5$^5y1Unuqa|K}y_w zMRY-vg0RnI7M36335?DJ<$g=7J!vsS$p>gjC{w4Se;PF{s+G60ePa56zp%$omB{f! zz8-$ddpu4|3}Ht!ZR=^OB0|@uFFgbA=pNXbOy!TUAoYp~YKl}-$G1a19POl@U#!u5 z``XkVg~$~nK>>DWj}#`5C33DI-`aJS=pMb7mJy;P!)P;})MxTQ9y2RT=lLEDP5wxa|Q zwDpwR(+T;vOw`pW0e~O*k2-5*cMyBK%Z2Lhr+jt8%|~V^eqsVE_M$h`!H0$bSF-Q{ zg^a8mQvsJm{B{YfSH0f5sNsh#bTxmHlAc+=1YP#b%SPS$=mmFg8L!FLPA!6y;5jZY zg~uz;G=rQKc)v`uaSN~+R|S!=`8OAHgtL+EDXC-RwV-?fH>ZDG0>4O%qHML1s(#eg z<<8k>k{vl5f)1iR3HYOkEJ0ru4-t#B_E~RMy-9bCqxmg15U#@FO+S6-o#vjdd&sh# z)Wbc$Ro{EnuUhS`2(1X@GGshyTc;S_htRBzcS08`cM7nb-$$VH)S>F3x&yDN(@#!n zQ!4&2T3!6k^di@N7q$=~)#@0v1TAeddjO|7MG+tq_BqI=*@?`nptB*OkPkCq4E`oS zDkyN`4hvoU0|TgZnS$Q1MrRFRP2|bBaJIfsi^yUUW$vJK%_Z5{RnGCEcoHz_yL{i5 zVC}8~=HZ*Q)}+{l0BwF#E^~=hnjOwVtM) zM^=Jlcjd3m3HQjO+(J`gg3{u95~y!!wz`!l5D(Qd?Dj6m#%LQG(*wX`)IBl4>@cquEnxU1b9=|#jDXZ zw2ITCQ2`7o0z#gnJiq7X=8cAdO|ZWk4=x+CiE?!Nt4Fspe0=~60BIuiA}t-< zT{Vc6W$FRZAQ)(|iNbGJ|75>^nimU(-B0w2R&e*7Vu5>F$Jc2t0b;$MDMsY=FQ$rS zBGKXkjT@{5zy`$$n6yYJv&x-?`4sO8}8t znV*>X?gb*bh|J7rcD)1;>COC!o9b-{1pmZLBS8oPy^nt4<^K<|2N>28At?OU9n8+I zCPFLIpKiRucr+-|Kd#kM9}+X}ncA?=aiNq(D&#fWzKx~VLFiR<99SKsLXO^Yg|1|K z6kDxn-uVgSfEe_B!5PiZsN&(NXbVX1v^wl4lioyZm~TL&bSJHzALg6;(x?6FSh7*y9HQ5F^v5Q=nLGW^Q?tCZxy_cWK| F{|3m9+uHyD diff --git a/web/webfiles/img/hydra_target.jpg b/web/webfiles/img/hydra_target.jpg index 9670bff36cb0de3c44d7725c9a598d80f7e18807..72c4bb3703d705f1ef949c51fd369448aa54d698 100644 GIT binary patch literal 24547 zcmeFZ1za4tGaCdiiNkVY<;7)LN4TK0D++Bi%U?B+sLI?zS z6Oz5p-bda&=iPhmeee5y)itZCR{eX`s;bph)78~|y>Pt_0Ljb9$pC;r004+M0N2X^ zDF6l<8af&(20A)ACME_J4iPR6HZ~3!0UGx*q9?{!(hEhW z2kH+WFyAtNyxbu7ZoSy(??4usW%4@gJTI5YeQx=FI|iGmmba~Dt-lO;j5F4}9QxJa zIa_Msp#J|UX}{cW+J382r>nCOV|Ay&y@;&U^F7I>T&9y2X-uCo_j~mwD|RiRv@Y3{ zr!!N*MpZ4^AK)A_nb?M;CsXgncR0MNyzv4dzuKPnezVHsII$P)WoG0Vj%qqB&CD;F zvL^3H-{uHa{pK(9$p^>EkwY3yp<(3Fv<1t_xrF#DB7fs(Kj&b2#`MjY;R9>SD56kx zFkG7E55Z)8v6v?B`L<{pSgUBlJUYiao56(+nh-6?j8Xhg1hf(p$1TTPCWehQje&u< zGDoJURr_AHDT?xpMKQ9Zd`w;<%wd9MGvyYw4Nukj%4cZq>8~81i-sr zxZ|*G{<7W5zzPVkI5jge=VLzSDr!nGt7|3FrYJ&lMTkLa{VHW$|6vn645W&sbt@Gh zxA>iy>(Y|~&_yOa{-O_Bd;Q#)TtUu)gC%!MskH-c0zw8bM*S|8$5`k;@|xD;!2sac ziQxy|5uJIqD#v^XTI;}gL|2*AES?SDoP~n%jEDC{K0*|L)kj#wex#d+Gj@cQ2jdSB zuJz&QzY_8T|C`exVUr)~E7dI*DD3^g6M7SqTbCJq{w~!i1qA@WvnY#F3O=#=4bFPN zI^xHH^GyELBUpI#^I^xobIva;)=^hE|5Aw458_o^GncSxhud2CgHvW|p`g0>R}BrQ ztMAl4IM@e&U6Gk@JE90ghylvohr4`uSW~ilBNJoqqy1|xv!@j#;(utBr?jj@g|=r( zlnmXR+=X0tH_Ow9fd@)_x_r zr2Kf|=1jnR!<=?n*d{B9dG>OUO8lXkks_jd{$#5^fq$YqK7Z5-Jh3{g>$;#J;}m_V z{?T`~UC`kzyT!OJ$%9IsboJS#pQo}O*RVXjl?67-3K4S2&TbPB|C3pS$`Q$d>0pTj zuwMcFpHjc);WYe)*zv)_`j${vuv6C-=iQI-InTD%X24$HIdAqfYZ^Ivj3fP{`()Ki zz2=B3s!>l`!Gqaw;bhKc{;mqWso{s${CnvCdoS?eD%CeqXUgf@$Y(#X0L$iKMK*8d zuv&RDholU{ecPDFc46`QiFQdjdSk@~${8*P(=m4(P+MO{Hm2&fr$Rc^v0MH=iQ{j7 z7+gel{MiIC1F?YsKolSf5&#wTx0whr1ECOr35kfIyr>WwPH`@79zIoC5FKJ#!az(` zKvbl@n%cgo&n=`|Q+F*a-Rmg!LU2Quxi08Dui!9R^iWsb2 z7YA=wYjaFHNwXR_cNfQ0)Jn3R^5zEVdlBY~}#^ z$b-TAMpj1P7B9Hde3}CDcY5I{d-^j2EsDcZt``={4Q0BMCjz&s?dEvjlY7Mp_vczD zx8VJk9TEQ?sl5}s0YQ5yz=e&nqjH5&?G6Q9PK)GJPXzB`hWkCc`-NS z|7w^u^%ZFK;j?3}?f0Ye*>wWO&d;Cp#ybC=XflWIe|-KsB0h6>>3HCL`39KvkUa0P z!`YDki;QHSkx$j^nNN+JwG)+iTg$Gxj_&y=D2L@dz9>l-R(7Whn@uZDBy(E!er1(2 zS^my4=e1My{$rZ?XHL@}Y$4_^cB&)P4mcq1bttJ_)N&~7FcVPEfxBg=la3`5Mj}0fGOA#C>KOZ=b&(OWR zcYFSG%4I;Rx%prS4ykDm8YyR2I1Z=juDQ=|32Gd5o?mP;1g6M5F7_v+$gSeD(YB@kWnTX)){|$2Levy=Bxp`OS`FD;v;osCA5!lI zj6S6;sOWEXtI2V&Az%CtBNnuYQOEkHLr-1}3%8FK*kkiBQzlz3-_hD>H}x7Vlj7D7 zMoG0f;FVoYtxn#=iMMZ*qYH4^q@Ex9re{699e1uYQol!akKSkKV`5X)JC#Vk!FwiI z^R1d+u5`F=(~{3pDAkY|HN4b!krA%avant@Am>_r#MxpjN7<6>&Xjbg{WJdiH3ImK z#+)}SHt|c6%mEL^dph&p7=e}KFW+h&S*e&DTgElM&dRL#hd%n*_tO`RWp&>g2NsIn z6(BCI2zESu%4Q*3_lduk40U%F*uH74EIaQ+Atho@M{jL8f(M!gAV_2X%s{&?v}4_uJ^sKgb0@0?g`!`z(kQr|O9 zS!I7zJ4jrE-bL$=%+qWwYsYDL%r!ud`t0-?;8>pX`1^}X|7f0-Uw}k#VIM_a3whbw z<;%*2G{uBL?3bE`3r|k%TVH;tbF4trB_=78`G?P{dvntWBUyF^{I^E#WSDTiH1qBL z7Iuui{dbaYh{5;;Y;6ihH_9$N{pIeg-vfkFCA{r4?8Tg_*?_b;m4j0A6w-szif68mC@cl|1|W%vv#e+pl0EjIe2yD!VZqis9(D&)fiJ-oG>^1D@%4Fq#((oZnye56IyOP~4UU~I2= zw6MdPbT-;Y>x?D`&6`Tod>;D_t6eA<+sN-XR?rJ+>96Sh$w>Qtno`5hjulCl>3wP) z7RB*64^zkuFN>cd7Cf*OKjU6~-z@e1rbaTL3HI2k+=N_+GA|@IV$s3r9d8AWV?%X} zHIao?+-?(Wl9)2j`exX;e+{6zhjoXIYnWGcxPy|rj~dGx*D_%;zUuuj5qHaTxjD@D zLOmJZZr2aC=+!w=hnQ$Se>c-SFN_Tyb*ru6nY2hx=zqz~e97#W{i7Mb^TJeyeANa| zKm2Igfg{n!wEtNGou69YW~+WrCp?JPC{>;CKN8tE2zZyLcBF)zWM}221Fx+TjepV; zaPA0Ow0_(9zEv$rCHp*UVBkRLnXmjZPhxyxZ1q!r3#*-fmbnpa;A+@sQYFK~!sFPQEu zW2a}XEF#ldWmp#`E2}I^yCJPvy={Y6o|?6?F=&F7B(3++p}@i;f*!tV_F&9EwMjY% z)k%vmKJueTVr^JWVuAwqiwszTG#WAgbbKgSJDArBrfC16Xv5yQ|DQkDs<~q`M|C6p z?;t}y=2Lvm8f1K=`pKT^gVc-i`z?5<1#f0VmLmSUSaj0wgd58AQXyEuL`mUmdaPbPs4OUAuI?aPc-?u?G4tHvQ+;PYv?l_Q;P|>lF(GaU(s0jUklm#Y0=*@!yl}JoV-T)Eus+oBd zG)_*@x-~#J#odFtBvsYTiKH|<3lBe|(pfZZ{<;}KyN6`wNFq4lq$%yi;z^^RY+9j` z6+vrls=i(Dv73mdn}?e$2qrpmFG8b9S^?{Jr{N9{UhF$zpqbPH#$*VVL^#L2d zb9c9Or>^2^Sor9IuHphVCIYqCfe3(RJl-S}2r!Q+8-sIq4+6~Kh#HDO{fi>87(0Xa zmrxn-W+&b6KEY_-%H(5iHYBJ!fq}09rNQiI#xaFkrL6J2ojFe6S4yF z*ufWU^oR2Jhhj=Za2@g-%H-#g4dk0^Smy1tQ%m$euuL^q8I|a3r#duO$xqdIr`qXj z)lSv0%C{_OmDp)_{6lE&x5Y0kM7nO}-HsLfiM7oEqW3EFET|JLU*WTmA@gJVB{!e7z?=4ZNd9Jl_ z4Y=bDb*ihsNd4>RHtewwZg19!|MQ5Wrrq{7-a4C?I+hNpT6?PBa?0ClYb^yP)jiJx z$u&Z{LiHJ>&QogmG)2@rc{nktM>f9R*}9jSCq1TdrtI&QQm(WnHbVhitVU~eVxd@I z*mW-9ctQOvMxGcybi2{g?!EN)NoV3>ThF0KhKs(k;ANhB+pZVsM^Z%QqR$BN9GLw` z&@|fJJBRLbNaYMdUuvrl4qhhELLNYSu1L?>aLU}@g`_we);Gotr;(_&yLS%>aOmpE zyc@=5T4^`4qDW_BD{_Aq_Wv-%q6dl=sX{hFn?&t~z3V?C6j1!BT>FgGm-r>t8mde1 z(=LPcnnR^Rr$^Gcm49KV-JaHU()trBDla&6hkO{w_mhho|*Y%gUqy}L5Gz+|?aL@WF?Fq-p4}wc^%d4+ zR#A#n3(<2DSt4Q%G~7m4d=`5pm-}93FQLqKw$kN=amM;z_Sfp;Znvz3> z``fcI}rMz=ry;vtLM5GCQho&Ji-jCEmssitFIXJ5k3Fwa zaKHNeiq<6MNa`bvAC?_-FGJ&z4HvCmHFUvLIl~K+B*-?VsR-GIoGBWw}RT(Pk$FfvuzU^b>qqS=Bg zvM0sXU+0!MJ}5ge+JN>>qkNc*-iy78oPQ^pa1m)Dbs92ky-rt)>dG2qh_$YR)JEJH z#$;Y3B9DmNa7lzo+4<+RekN`pxDF_R3Ds3U@RE+iWJ_8>y2Ss1mx}lvTIcU1&y90WD&-)?|1wPGn(MBvQH< zur&MWtg6Q*`Z@oD|5t)?qZwuR-5FviLl{5bRHK5ta4aQq?~AgtWtMHu_YZRYbY)82May3kuK_fA zf_5(aI|E-9G-52|*4{}Xd0yF7J8OVq#!>jiy>tt@A_%jy4foae(<`q5#4O(`-7ksY zTu_fB2P1hSj}t{R_U)Y4Al}_C-|0B^@6g@e$6umy;z6-hrm04qeHKHnurn|@24l0! z)>V=~N3t*3w9Z8XMM;d{X1Jzn`GQ?NvNrcU$XSw78AV!#Xd^yn=BjHx97vJE22^$z zw#4}sMkxv^d|8hPm2D>Ep0H=`B#?0P@?pHuU3Kt@MFp<<<@DxLrs(bqE7?hypNC&X z9s$GyRuLo5c?}pYkPMHa{S3WDWW~=ukQ6E=#Am zGvXM=VY~h!X%xw(s=+D_)Dx0D$78RC_R!%C6{o=+&C~YAvv}H8YrBaN^m%Z9$}-FN zs1$Bk-bhP$z3jlD+V)b;y2K^mV&NK)aK&-U>sAuJ7y2jURos&9Zt1+>D9py}&?quFCc zOZ9ccTE@`%b4}|;_xv7%sH@snFMnN|7i}q~T_}A4eNSA+?&dukx(!v^wqlU~B9FXE zwo20pK#Mks3|W&pW=gy_=J>$L=3Uh_V4g!`Rb;mg_X!K1$B1?Oyx++$GhLmb3t8z; z$Hv5xj!WQaQrV=rKk#V*R+NPUh)1#?`2Cwm-UC0P)G!ItTPqSX{xiSoveJ{h zFr-pwc!4S{`n;7^Umtk`+d6jRrP53LQO!KunfC7fX1f{?O)tl-EL10ToJXVNGLiL6 z;gvK~E<@s1*8o3?%N&zM%b5-Ho;!55O;1~-&fLhMnDuQ2X9PJ`Vtu3hDE{v5MKGW0 zQoBMz0PH29EINpDUQIW04I4R|L;OFKlTu>E*a zJ%S{Py>KsTRH%lJP{&H#f9+S9NB%h6!%wSE^q8Z+^J8+yMsiP|5kz~cc8v+b+b#2Q zzNswzHZl^f);>U!P~jqgob<&DRbgI9oKsuxD2{jU={tYobyG zv?M%$m5d^QSC2&Kz}lE!D_}*S--&LjL(v#RZgvY>JgIFpg?=x$ zA`byGbRKG3O?B&F`R`_9w+A2wR;=K&3`wtCblH!E{h?N9DMD?!4s~7V$KioPbhs?F zYzyOD-!_@lugHx|=;l1aUVmrZoByt*p99HE#^)WgM-e30A>SSV8pvc`MN9HZQ9NNU zfUlP9l}LaT$IooY406?NgKpDi*iP}5(Zb!-$i_ka{b?SfDK;$ngg9&GnN?$lI=Sn0 zB3;J!gP(swefS3J_&M>;1J?g0cGxQH$J~5DB&#Ppa@7Z(Q*OGq&H2j+$IO0?=Kdeq z1l{!e8*2C(y~m$6Abl^0cTtVFv#OqQ95`p0HLt6`bIVKKxMHjXvTTh3t6y~NEqxm5bc3bZL6 zB#qQkd0O+9YBoYTVRQHdgM|cv+Fq20*7t4~k&MkHn1M9;w*ETRqL5GFzDyCb8qZ8n zvBLzpO$Fx5N%;cdXII<52GfskpU2Mgr1$U@Q_#DAk_^jC2tkJ9B_#+;}xuCc2 z2Xv8@Ob6%4XJjVBP;0HoInU2epkIgF(`a+QD0;wg8yRhLt^uD$g+5&I4~)@fvul^f znK`+UZ;v-VF5DRx7(=34oYlNk^S2TZOwKWo8OGl&lTY+OHdI(yD=Fu-CAf(EHIwc9 zbsq%$HrQWwF((?}GbS%lG92$d7A3{G1_X|(Itui9mP&atOz}zu@p!4H!qp?^#s;&s zPM29dD}wO{VX20z#h03pc^z71<@>(i&1Q}Ey`zGqXl|IqlP)b9pY`FCfVPy+) zhs*TGf?xkwJa%DceunB2VsuP7@nj7`e#henY9#^dGGX?GSfwD zb~VUp6IGZV$w30#BPsVasb$jj!xaU1HeQw~)VzRqFJsJn z>Cv$Z;B*>7ZYDp#6 zUAijOmx17vJlS8%xN7JdiyO(o30#IUT4WXXJ{@49BzXZOt{Sh3rl52 zM$=vb<8i{htSz+>=LV7^2Rpnu;{X<`(cP|-W{?hjQ`rq_AFu>oO16w%13v5qD5>k! z28+QMnuT#$Xi8>nn1RVb%(jMWoduVCa&mQ{fC)+xw!8TaW*<;v@NL<2A4!<^EMb$} zp3tp74epC*{y)gnYoHlF#!94o%k=mY*)X`)EjQvqg^t1FF_G@%dV@KOa^!I~tC;+W z(*LzyuJ`VjVcAjhUS${I^Vf`sClD-%ClJU;C}@A#mJ0-cX}At0)XYA+B^ESvO@e|D zPaRY@em!IW-lIu+qa}Vua~S)57zK+@QG6>%UYvbkT5SZv&QH&=2<@g|TREt4!5(CLFSs4NJ zeRD(Eq%=awmou_ZKq@|;#c-pv?8((KP6%xH#NeMon9sc~=%@-wK3a&~NtY<(jHttT zTof$0bP87P>|ir2p3ESKD@=JAX}|yU4m2w^x=Pb~vxT{AiBEUCa+a#CM&9l;PFtw5 zMb?>BJ_TG|zU{BJ1A|W@Jr{*NXV0j>ief3TeG7~(s6&`faw6Ls!bM^Yl0KJXDYw=%~GUfWxC zr{;T{k%SkOM{Jmok2+$*zpBB-8{2{sLFW$6!_x~)E9CE^4=lQioG9JG>xLBc{wnt= z&1WsSZ>qCdfi-uqrVd}`c6rFol>s7|?H!Ht z6YlJPCbSPESg}A}`CIyU(!Ypg8XnyMtHeMvWz6p+5`cj(2~c;nOd<(Mv=u@S?zTr^ z7$KKLVpd3KffkYOfqh6g8mn5fqQo3=BsidO-DA-Q-5esgm`#*}e1)EF5mCHxEP^Us zB+~U<@>LB&aB}$! zZ7dY}5yCPIF45Fu7I2jh5==BsEwl#NEn|jJI7!*iEC&>VoGm6fE+-R!0Vxc z4qB;)1^UN@oJh=Q^^?X*pp$ZEog=GA6JQAG?qIvJika*d95V@)&+Y2Q_ZDeHlS)AX zt;>tRU`+t7cs)U=i6#lC-^@s!g&82mIQr!bN|ba=2{?>~Z(9&5$s=*~OOc~xnFdDP zC*>kvKPyjlRTgp$8sM-j-?Y)Ii~_o$qoIi~&_%l7u)S?!-PSxCAR-6(LRuBudV|M= zQPA3=@Lul+ihVhsWA+53Gu-M{jDqnSwu>TB++yBJ47A9=VMGJ7+$Xm~lj0*QUXLm! zvp}b^XyoSL00vDl56z>4P~gRciT^77QGJc*x3(^(Nv-OZd3j7ON{a^rbKGEpbzjC~(hh!#ntsI}xDsJ(V)8IJR zQ&qSol|rm7fF zw;klFa~9)xR=SCf8u^fbSdYATXl{i7~IsSmx5Lhgoe&PeyLy`aLXv5 zJz-Vod*;rQhkx;zq@{gToL%EPj^mr}>$dC_wpW0JVvcLJUrQyB!_m1Cl^=!>a7*y; zVxeaMYSl|3oJpp{XGxebK@31b6vj$&QLM)e+hu4Vw8ThWCi6-<2C~?Qu5i-be0t&h zVp+6GaT&!cwYO-y5hSHtOvaJebjW1*OX35R{D}c6G~Kj3i55~#n`DU~`wg{_;#1~< zo_v%EB*$U=OOL_i#1J?zAEr0$g@P(RKYH=#3HmQJKXU*DduzoeH>$bPs@=3IgV9ie zGeq5Fb0IWiugbO5Lu3eizcGl;xNZ$dlbSc_(j^Yc=C{3BKU5CN?HAW94M{=;6oZC& zqB6E&fr<}6eqy9Vz<4P-WrI(r36sFc(Wz~iS$m?mBRn6L*yW8w3M^~pWH5u+Mm?}I z3kGBy4#2(df~3$saSo`-A2YpSJL`&C&3oFu?(aQv#qsPK;DL;d+!SV!`cE8r6E&IN zjl8aQ$N(Yqb`P}E!~S`qA_-!rIl7nIbT6j%RStWVL7wk)g2z#e9tsU9FatkQTO+^F zriTVgbLjxjHx;B^6s9FpkNq-%G*dSO(un7nHWGNMQUIWpMFO}_yCq)(#*3~nMSg4M zZOkoY8#oHwm5X@n(maZylxt;da4Iaug6mEbKo*yjQfCs zURuT$z|A@N>fjn69Rr2zw?r}r6+FVv9&-r~jS!2w_*sDNCJIV2uy|HoV;{b*hGZ8D zHq-cg6~hnH1#$sQH=kN{u#wILDftVfx4X}035cy2-Vs6hR2*>?+}xXT`&L~cu*0is+N?Ged=#^qu8aeh;I2SQvMFDJqKw(AG>4Dud;P&~l&*L-{T%@d4S zqV14?kkVw!qs~N$?|0FA(cn0AL4If^84fr7)G{F)Nn|c@H`se)PsH^kx6Ma+xdAf}NfkcQ3@ANSR#0q&WO)J_Pr1f8%6mhXfsl#)(kzn9r`C;kCq#h|13!1lmU{SX?YAW{d6 zhO!~HFHTBpk1lvhtUo%h=bBz*_R7CpfTB;=k63Fp8 zx~g>JP91i9rH1D`hnTihAfc7;_JL#WGFlfU@W25B_`D!bneAjym{B|#o*>dDV8k9* zzTEAc{YE|a8gOr-ST7JXauyp+VFRD+q)N;-Jy1gDK%&8jFJCZc?#3@6Nr94a?UsO!UQMJK76;xnbdiRe^R?_Jqgf_+kK5_1$7A&H%uv6B!$?>qb_uX^c~CfuS3KMIuw zg;JA93k;AP0XgD4G21yMe9bLm2fDFbBo&#B5p|79x@1 z$eNx19Frxt0CEc~0aZc|W9}I>-3#K1un+)fEQplV-&ZmH_@ry~ZpgDo=$@x|dk0k0 z|JSf55+q^{&cDl14%n;WD_3?J1$F?vkq%H7u`7G8=>rQ|bN%au#FqY%gsL3AOFr*F6&SjPjSEpP+i- z;z!K!ul88c&2dE9LQ|g2Ad@3KL{$q6?(em8t$)JydQyk-8}o9fEv~8S<{JDcE$99M zbA|-8e8mxi<$)=8H&1K_+8`+u7a2297@|txR>0eAP|(wk{<;ciFGuPACEwH=KNI`T z1Q^^nmg3_ky&^8y7NOh`gaiZGbKO-9=_3t+0xz5^+M*33-6&HeTqBVT&O;6XCJpc$k9ony!t0RE>Zs`5Dq<2bxJH4A@F& z7`e89JmP+TN2(Z{uKuJCK(oJ_fLk5}K{oCJL!(6UnZqn!*b$`chavF-kX&h`Faf$4 z8W^PHJPh6TcpvV(hLKp2ikK82vbM1sz#m`FT;-QdG}Q<7Y8 z08rmptK{9kPWXY#1ap<;l$Lgnc?2d&wItDWP518MHBbS_15q7OWndC)Dur*Vd}{We zR{lEzPHl0cg@6eIpcZMc#2I2a@aDaI#LjB~094z0r+(^=VaGhjm*E%gpAeBdO-$$MJ9VxBhiH^; z5g;x!kOU&}=i>nAqV#9Z-%nkL>#RLm6TJqk1t8?wVL;*q5&Oae{7z8)5HI_zU430c z6nIKh7{k^$%$E0c?FRn+hpZoZ7+rjN`NRLjf4v60yartU(2x>=M)>rb6A-}P{F}?K zKg#(b{_C2H%5VH@fC}Rc2qFG==<&Gd=YGoL@mDwKrMIhyod*a|jfyBD=Xi)3A=^gm z;?p1Nb%DtE;a~k=p5U4UT#N_&G5_zyZ;C|hY8d}1{_9%6xbN|&Un&MXzqkh6|EbgR zrx!Q1`-6_ZEBg~Z4?FaMU^5yJgiAtP^)FlhK``)3 zL+B@1n);nAm;jl)dP)iNPjau;i#Y9^^Y1%?XX#bslX+fOL6m~7JMlLJ|4@VFcgL(2 z5cXpu{|_~8K5g-rFIWJy!4R!IJQI*NG`21O%^{Fi>K+I}e`K_A`Ih#V zV?=#J&F*_EfU)a-#MhtAwcgRg?56N-{(*1VoUhIUU)4qb^svpF(#0^T*PhQKpcl6u z1cd)=-ojoQjGHq5LKFjT9y%aiokm7Dl;1uE0t5qSxFpmL&AL8=+=4h03nn4r4S#s( z076aEv#m^J^_sPPnwB78UPyZlaGm@Tnq02uscd1JVTn71lFvj(!h+Y&VOdJLG#N-j zHcyNKDRo1>)s~hAGbSjNUYMhuB(TPis3rig2D>PPq)3b`-&)m}Cnn{`3{6_R;6qJ( z3grXrmYifkaNMyAZn?d9c2a#{K|USpo#Q+N2MJCWJZ>)AnZ7N86h#&aR*T zg#Zl>p9Q(YSs~yxdVE=sS7EO4yg;D^KIO*0cNshOVy!P}K`uWO8 zmrhnfIcH<->NX>hDT8;VS6rN5u!@lOH@~GY&Q1s?Z;0djt_HA3Fv94F`!HW(V?jEX zW8pCE4(ie7Dt#6GKUk$Iu|$?{R)ls@T~A9;$Wpfwy)ZHCl=5Jf-Lza(%&QaC67}^1 z{1sunIDr}~w`}8JPqh>(h@d_!(1|!~K#X(B7uR~yD1yR#wxx~2^~ikY!VR+b{7Z3n z=-uwPruuI*aq}oXUQqUa0V%PiF$0Av1^E@m0Y!C!Bx90Lx{=iPii&qtRNKhREeY@> zgrSnwubI&N)l2pw&&8qQN$`FS$b5`9)^I3_wK)xum9cQ37M=n>8FMvHFDI|#I+U&3 zFv=n#86JAU>0Q`Wz|mSh#`m>Ci?`AmvBFVy=vV&#=l=UzqdG8MYsPsxsp0<7s2l2X zFMnC3T~TdYQV($ut3XojJAWWXJOT6eLis0kv#*&7ovS%a7@^WoE-Q8yxV)s4tsG6b z{u{(CqFMfpP@)Oj`-Hevs4cH?+gWEFh$LQd~tNdBb_oI zr|wB>>D^iRrV2y_3wPrOMel-fo4Af%FjZF3U*xd>Acc&&5{FzyNHne1Vmc+nT9&Uo z-if0S!QNwtp|R$}_(xt3ofKA9r+@S<2LwmvnxS|0d18bwW_&YF(b7t~98U#+)Cj8~ zXQZ`3pk*Fv)~V>qMw9lV{QoYM%VV%!Y!(nH*7zZZiR2ovn>Ipq*Cqrt+GiW*u%YyE zm&k=g(W(z9F6%N|TrYMz)2hXT20{r_6i}sN+$L!xp$Z?wyKEjFlD{f3Wd#Yot}eiJ zaWc363KM|YmTLG}5hN-65X(R6@L%3s+LTIup>d7$* z1B*#D@X%n{aP!1jqLPn;Zjoxl7DRRnVUc9ma@mR1Aza0gn4k(%DV(@h`=Qyo_n{w2 z0Svoj(qGW_cn}iGKNAoGrB;Yg!W1d) zNg>|bu%+K=I`FFs^sWUiwV~UuQ~e=Yu^+8sPCBEp{pXBy1&;=6fa*77s&gx(UmrIaMv_7Q=Bp&9QiMMz%| zw{b*v>FZ|~S9eZ5MUs*0rsFc*;?lKDsNa1gyk=Fw9GfvXv?pLxEiDjBW<)m1nFb+d zz@U1bZ%Bz#9Fu)cn7qD_n4Mk848(v!OoL8oRZOScluTC z)e%&^f(a7tq51*HGo8`=YTaCO`=NC(+{LyDhhLjqc;OtGG!AAaAUrK2iz|m4$u2!j zmRa=V8;%)ZVoQ;tgfP@1INGwF3^d3YS%ml>2RHX5(MFnflj?IFWboVXIe`#K21&?4 zo=V2ZXfg+)5EjA-aS~7T`lC|i5(Q9)C)l@^zM-_!d6LmLuyzX2UId8Nwob`tI4+v_ z#E!5=N&twGxY$%}5`_u+oD$QNtSUgNbg#)!6U{qP6F{`Cqe4N>Z9*qAvqf~`X)hq( zN0FesIKY&|;$(p=jpsD3=`;;6?2>(3)xa64`s#9}SoNeGLN8EFSjct@%j^!BhT$Em!uSKB}kSq=O`WcTl2bX|TH~Cc$!g zKf7csIvK4}tktJ#{Q@go$7T<~>N}EfQ!`jz9~u)3TAai{6bjdO3j(lVpfE^qx7*)G zi)n)3631|~7lx@-ME530HXzYQRwJW8D43q=`Z#4t4crnp4Gs-;RzmS22Mj%{(uNIz z0K1WlElgln*L)zS5lJ5@UJQ3`_8keHM;g{|%RABAVX(2Z0+gz9#Pb74SN2D1E&pOh*k<=()T0D5mxH@laBNuE5Z#-` zL^cel6$n!x-G}=fGhaWR;-X$FIVZ`pl%r&zWriW0KGcv%ekYXVR$3$Xq<4@j3@*vh z1&NgJAA~Gf+%tbZ^~6qvw=7FzlzBVlSpH#&=)a2r(^X>%J8R*Ewecwi8x&ZJ4ZN;0as8a z9l83J4Uj2qR!(QUX?=fNM<`ffNrp%sySKH|+)-JxK9ZA`90sbi?umYMpR#xwhcLep z-yDP@yflad&03iXeyq#^(Mt{OnzKa5lQe6jP(eFS$hEnn?aATbtivZ^JaD`1Pu zAgz)ZwPf0b;pMZjQL98Rl?s<~RS2?m3}%dQLN$?DxM6`to)vr5ABi$7F?hIq%#%`w zbEBBCw5LhvM*YpM#F&T*RzWY(?(m2peX#Cg3$e4#v<^0{PLiNg+<5h#QM*Y*@Nn}FldjYIpA7;u7+-z+bs=nXe-J>oagFS; zOs1bCGr$-iMCLU5o~BIKpkB?6M&H_(dRi*ooS9)8Wm>u^`GM+1D&RJQJRzq6pHsp_ z>_=B;He)3oa(G}ORvHTDz)~t^h@J-yCdZz*eRH&4dQz2})j~!1Y*2=H*R2E&$xCBa zmwijbk`GVx+FrNQm)qNr?l!s4mkgoqP(3zmG)HzXTj6FZeY_fU?T{*o+5G*9f51S8 zVU=LEgs3im`+Q@s2W>T1ISgx`WkvDC4<+c-$6j?`UL2JKPKDu+O7Vf`Nw5>ngLiby zkSCZ9ZB^w2xoqZc?7)vpzj-<>M9?5VxBN4v1f#cNw3(l7L1MlP^DV^k1>U_z?C6V_ z<_p)saB7>nI^KLtww*<*^Oc{SSE~L^5{sp^vU0!W+kQBy+-D7@9RgB#b861es|C~d zKRjLSmTx+A5Jl!4m>E?TQk6O8ja%boq*@ zo-L_`G{%?xA?j}jHi~1@m!H*JHFTj@qY8clptuJ7;Suf4WFl~2rdx*G&xRU@Ve!cr z`MiXqLjllh?CiwVrobJ}x{YernO``N%|&ofEW zblFN7y|NPEfobcI!t|@h?+`CnMdid}nZoJ&Cic}|eiP4$To1Q~l0{y*JhAHf< zPcin{Z)<$dGuF@?a~bt96eVZv=ZXaBqPZ>l2`zfit$Sy(AlM{?HfZL(FQk;5@2IPq z3N7A=(ZCc2g_gS5jW$ic_n?@Grn0MqcQ8+s=_~J39l_L5bhC#7WRDQ<1qEb(XIgG) zb$#XXC`0z>QJ>4n2LIJwm1w?PxQt#5`L@&l#=8Dsf6xRvUP7~3<%BLat6(D>oy^H% zm)>Ut?@L>o4ZTQ+4nfN2Vk7B5>hCd3Z(%~B2Bd1%tA-|g zo+^&0H~)HzHR-ghJC-e+0qHz=UZ7TCsr`=q){Cm7)Bl-hCD5=NH6A}ej3eY7&3n%$*?)>K8zKBG7}TI)&>&Vk2ycsZ=gcZ+*xa zcLTQ;W~~q3;xp)*i@Z%5&JNoyr8hrTodxR?wI&2_0>rh}wmz;rQzNkDLQyM1d{hIz z2i0v%k^tLEWF|4vR7MN)$A%L|lA=lu%{XvX_cxJ`{Fem7+UnuG^}*&i=!il2kku=t zZvxOvtJddjD@RzgHpHrdFED5(1epNb9v)IG_K1ciQ36Z4R^16i zk2&9qq^X!}KO3lwqf}_+=VNlN!?{Oc){gP0N#jV+R+2~uvz3voYVz!mZUI?Tu;xwA zdlrd1n2}zkKA_rCNOVDH6LA#jx5&82c9Q)st~3hdy~y;zV>8%5)lT)SPLwyG9?%L; z*dBL`SDv83-f_>Tn`>bJ;2GIb8$VG1OWWO^U?P zB#err-$dsT>xzd*%NEJAcsqVY>qa9vA=<+aYD4PgMaj|pbW#XGYHSLGQQ0+$me>Kp zuyL$0DMk~SecEtR3500W-O$Y{7y4EfJTgmD1+#F)3mA3pzAFCPVv2Q!#2rb%q#iIU z$0n#=Xs(O5@5@*(Dpmt z6pCq<#uPL=7!Ad>b`5%pzy!=GCQ`vJK^t-B6zNYsxJ8_%kdaqXH>2D&!0JzZ8nAft zkLG`EUxSz6U|ca|Pj6!3U) zUwG1;)}PW(j>ekb_$aLQUEsD^=7d=eDvoN4ls5%$X$ZI~ly5xEXvy^IV+szNo*ns9 zav)>F8lLU{Lb`c&>|TCzR`V)X3qH>o9pr`r8uEDV=-cAXB*1%Q^I!D~I$C*i?9qkPgMQ?l>R~C44rEna&l>94Tl3$91Kqre|?+f1vS`4l$ug#P{&=RmW5l%sR+^2`HzUer&=--75z9{~1y&3LYMA=L60)5KCovFGvcC z3FdsU=~@TJyb~K$w`~7s`Fvi6OH)q0I&i7t+ygDU>dzr9SwvpGh{T@Ar{eNgEm+2x zZBtcq>CP?}3!|13JzH9)$>^QXO>qSdmhIpYGvZWc_jUyidTFz^v}U}Sc30}kzuc6~ zi+SFw2To2VR}H4nE};M(W!oun z#%4!-PCl8r^z6YoRv`kxVqR}%iX8g2(Z8|!m`t}@&7-0-{j()>S=)k*jUHXGU){^d zrRu`imKU%wuqi3bC1PjI$z*;_jt$o)YBp}VI9EyP5S#EqcI9Ld_sokkXS8m55!p65 zr{RHuk&FMUuFg*nPaVBANk9}dvWx%PmEo3n)#$j z#%ASPvez!*;+!}kR8+!KV_(@Uqm}I%+blL3ac#Kc9Wt3wOebQohN=daL<#F%)fItU z5&}!of=;jXsx7)P$@^xjdg{H!qBG7oYL^`d5xO~B!0YS{rdXy8;_1De63QM6LfSYE zElOu*yn1iOR<;WP4oNPOXIeEbN!?ILbKJQ{I%N5E-AV@rY zd-e65rukiyD{D@p|{rv?TYNt_Tge# zbTe?%J@ci9CZ>e{oc;Kt+gC-y4ZQo;O;mE}6jJd(ro@txa?B;I<*QRIStjrPWa0bp zR?t!9>kTg=nGRfCb$Y%_jlhdGWlwphvjRJp1ZG~6f3(BB>Y?oGmhyFi_XY#A-zdVz Vtl$4rE%%((ZPF_7%a{MZ2>=&MP67Y` literal 28862 zcmeFZ1ys~syEi;I$bgh|hYSc(B8|j=N=r+JA|N2$B@Q7V4TFHv-67p2NGaXjCEY!I zf1h*i`&MtC=bZOl=Uw0Xt?$A0ckPKC*R_B9>OEJZSF@m-G7{1fAQTi32nF~Dx|#qz z1fip$LC~(FLm&_g4D=gVgxFY^m{?@^1h|A$)- z{;hjrXaq|75IP$|PS5aUbm)VkCL-m&9eS?kwq6)Fh)GDv$Qf=kGTmY3=Hcbz7r6iM zk+_7Ul(dY>6IC^J4NWZrL!%eQCZ;d#>>V7PoLyYK-}w0Yz4Z@3M7)cPihlngCM7j3 zJtH$KJEyp$w5+_Mva0%1bIa$}w)T$B{(-@v;gQj?@wxeh#iiwy)wOTCd;156N5?0p zXW!{U0fGO6Ea3nDAnX^q@Bq55p`wCOA>Zjjx#k2sU_8|8x9*|gizz|$Z3yT%J<$mt zgeMm@VL-W*cZi7f-v*&1(Au;lfzOT~1(1a`sX$-4_A9Q>}2oZ$k!NMvWwG zy8=B;&gJ;}(WG3t-GEoZ`C^xlV#Zf}8KVjjPd?KSe1MlB%* zdw<%)?V7n`I~Er%Be7YkM#90mo^I+TfVSE*n!@ld1mo1XN5|EGUjRj!jc3WZH9B)k zjahnN0Tf0UhVd95oXo#gWjCmLF08iIA*+!Q&Dn{<=JJAFj4FVtnaX{?EnPH$VUSu_ zRz6m=|L&uaL^A^iv!!ts_Ycn>Qo{MV;t=q$Zx=1O1FSgY1q zb`i=dAA11i-K<0{xPQE+KGEz39i+D)ki*QZ3|YNI;7%1iPqJSLlO#)RCVvwxLSHsm zIIqo@sOFX(KCu+&&}6soigkFfTq97nuCe(_n<2TlqKf3>7b|*OVl%IjsA=#$>>%SM zklk9qt8F>K8((x4M9!)FF0UQTT%ZJAf&6n}qc(7(E08JNz_h_|zc!R>!`l6_rYN{- zZHBbqSZT;U)?~vn8SgF6#OO8;s(C{+rFl(QHtNTHq2@3&Yf)6Sp^y^8==KqWp zCTE%<*RfdvBt8fw~;%h8|kV?UQ7 zTl=DnpO_3SlqoU6s}&O{X^!k3o;=W4sti1*kT7MNM`$AWH+5RGgC{(?(c2da7tLO% zq>VclHusOlnmng5c57gN-a(n7On>?z1k|RpKuQ~CYiW8vKRq+>m8x_9xR8~Vqdo!0 zz3#^zIftj-t~e=vjJ=MMR1V3XjjxxEkn_fpPiB6&X~xgTxk6FC*$yd!CXD6G_sC76 z46xn{!$9`a^$z zgnuH?CO>rrl5vhWer6fFg;F8pzOhg!e+AOAlSQ<3RSIxYu0$lBkf@yDb|!dL-7Fb! z0@;7TGQ0*anOh4{P|y>;%ogd$wCFif_1#Qb*tmJvBcBjAIIqJmV!nXm2Q4QdJD;k? zU3-lGdINjFy^(h%v@XtJZDw7<)5f<)ZiQUepN1DU{}jT%Hqo#q`kUc%)S?+eW36os z1$r1^JM5VUG?7fvIJmL=&B^VXKCQ2hExpf_l61T`VjL&0Kt>vt<2WKsxH<=GYh8Cr z23%UBpG$Uyo;H60~JIB~s?SgC(bh+(9c6NnI(CL!tcf-r{ zFBa`v;ym^fSX@C~A4GcZrQ^>v?HiNY3s8Nm?3v!|h0Abb{!i{_@U_JUzX4m?`R(`$ z*q9ncxp(NthaeFkhUhBmJvUK#IJg zT*$P%0;OO3%>>z6f9HA1uYi&8w8bqpov^!%)UPq&KSvd|8_3M$&iET-6n+Jkys53m zX$9o=!?-=WE6}xXaIsSW9&a_*YCP^6`EsJb#&!~L zE13%NFKyTAVK@Ku7V2)^O^|KUqZPVTN54I0eMJt<)GxmeoTS8-L zcJF$}*>BDqB>iUiA(p?Lpm)FGg{hZa>_|?~5?-9gX91yk=2zfqf3W=SZ-}`w{|l~6 zyVzxEcxM;e?GohSv$_haFlKJda7+OG+68*8i0gTYEz!FIBFj$_X{D5QE(Q|>BeF<3tpmEDMV+*tvMcR&f z1u||PpiD@pbvsx7yR6G@skDAI)=GsVY0l1dTw_nu|DOJGlp^EY!=i`AjemWhVL15O z0(L@dH+K!bh&jBa9>->&0^aZWyYZjo|BdHLzrrO|v(#(v+dsiaGdcy@|yjWtws<5A7WkFrAf+P1)2iXiNO(!i`zMmV0N`IHE%8 zaSDrKRtpq@GuL18jRzlIu8+;Izhgiz;CLhT`We`$^02*7Y^PY7*gs92+lsO%BPb*! zT~mV?^`bpmdRo8ob zE`$k>%9{|fW~6UV5f8&2Kl9=pi9M-kj;T+dw=h;2u$R{F$Cr{j^qMR+R%e*U7En<63I65{VX+t#2gI&1)t9!Q-#`yvmYbt6aBfcUqjjv1e--vvB4c#26x^X`v+bT^9 zGtd(n?GV6}qT9og5Rh60h(~!)_R$b=G>%lgALAA1M&}IDn-eg{Xsc>F7|p?MRN~?z^a}Hh5byb{eo~zeYf0=Gzb$lzaaQur+ zrhJ4X;hyMcP3>g~mIRF11?b>Sx8caU7D^7d#?)=t|HZN=`xGVyx2U^?Lnx3$kqwt< zfNk3-b_M#}_e;n1s+3SGl}b1MBYvwBHMJ|y0a^4F2nBKlB2l2hUcf>hDG)=&Lk3S` z;hvg~+82xm2-nHaZ7ht=U4iDbnk%f1He08XZH_F*x?#hv`!cU7TBRBFs_3`qFB8wF z;7ggVo2#k+xfJ?Wd_f#gy(-k3l4pF@9I&NK{eA#!H-@Qd;1!m`j@>rMl98A# zra$`7UhoAWB`_TCABBVzOqy_z9#>nHRr>4{IenVf) z%Rf-y2W+(&&Q!xh1%;ze+gOb;{}o7cz3a}26&ZcJ>taM@#1VYk;R+NLzh3d@o`mmA zb2J9KF5VQQS)FQZ{Qjw*jMZ-lG^_lxkN3_rr}X{94n`ZsjVsXf`gi{H|Bga+3vue{ zOzR_?4eKk=PQLy`#ku2xWpCvRNon>5KCa3Aoyx5FexHK;0&YY_?L^!M?I4QO zwH&GLH2j9Xg84tY;Qk#RGQS~Ex9pGYZ@vP3D)Y0P*_;Tjd9biCRT2l!J6wMEceEZ( z^!))$sS_*GXA*U`=(M2+mb1^`U*wz9`F=+q&*YzA7W+Fq)_y}DOZlJM4?j`+xH)lI zV^d+G;~raX2Z-d_Vc!q4?+<3mytCcYbP0|3HxqA#6`>M+khg8Cb0Ac9FlKnsnoN`< z!FK@#{G*;0`0?kSD-ivFuP3RO#;b|vh+?iSFI(F;kxhJLq?4|$!*xU?Mx--4AwV1g zhIa*;A%R^)$djW!$I#!m2#{&-smAE*e1G&HbTTh}^Jazy)O=wad_XM0`I)vz>9 zY)OTx7*oeivPV*mp7rWmn`*}IpjMhaVbg{qNW&GVSM5#9tIy(uswjt$Pl=}} z!0PmdY0hXz7#6HhXG~*aURu2lP1l(g)R8y93&i7TWPZwN)W}&ODza_9=zzqpF5g-4 zJ!nUEWlu{xq>akI{_^}78xbPEeTM^tmBZBma-fZw0F+=c%^Au`#1#m&0(K!TXP6_b zltEo4gL5$TVYZ&Va%Zzs(kfX8sy)`kZ<-PQPyu?=7NRE;(Fk6ieO~Xmiyb`GIIzuX zAYEX8o^1V5&;s8pl!8eZW#Sf8$PgzIa={P=kb>Kic)|dvp?T)0)a=#jhUm-8IV!#5 z&YtL_L|nPsUl;hN$Xcyox1>TUUN~lFu1_;WtMZXQ)VR~np3nLS(fWB@_rpFf*Yzbd z4k=oMO@DgLKw17%jhM>=e>S{W*&7H20^VEIru2+vc%RB$_wLQmvO+(V53~tUgX;rK z-V50>`ZB0VKxn<7?X<`Fp(nDpu0TmN{;(Zcz;$R*M4cutt1d3Buc$6}Rygt*EGjah zdxS6!*La5Df5u^Li%V3dvwrdkaP<3XA62czlh498-p!oIv0i~z3FdJx2qxjXged(= zIx`oyqu>V^yAUMC7VIPdHpdM}-Xw*$upI@P?-N0!#qHobF`58N7+Yvg7%KsmFadke z--GlN0d#SbFn}&RQ7Q(aF5s}48ef4#6K}$26Be#OZ&Q&3vamDM6K`Ovj%hB$LH6&| z`K~}1>4}%uUIBW}%Pka17y9o-{hL$&|HPDf;z=`7GM^9GczgvqyD_}-^I2Rv%-zp( zF7Do=z?Q*uwy#-@-`X(purx#k>59_(SSI-TRMPM%i4#2+sogQY2pl)Q^f+j^Bx11V z>2c;lif?iu8(p6w0}$CK(K5k@`NZP2Lv-hs$&1}#-&9(Iyr$I}Rjorv`$2U{R)zKO+NC=M? z=RS9g;(Jayk+(F1#R;0`xK|muXuzO>(;YBZAf%hC#eKw;UR0+mHI_DfWGC-=y;?@6 zRy2m-ax!|lo=2`63sfF zw=$g_f?p5~9y$k?W<~9ct$lLd(GRY&x>Lp4=G7czpQbFhy(!ysy4rBO3I7!OSFJ)3#nv{3U5)T=K)(Kbu%uD|T1B5?2SbV;C(rba zmMf4G#F$m49s&m8OIU+?H(_OWVJj(sg#bA3H#$Zx9%he@Yt_|$%V#?*Wqp+fW06Vr zlb;Pg8R0UX|B^OP>Jx=-TvheacWyCZ&f;QOzq9qmrtt#3ktB4u^aAjfsCj9Q2mw9P zwAU;tnU{TwSeYH)kxRHUf5PqX#pb1abGaLm))9nEtGXEV|5^ z=`}7E%W;!mKJvBi2I&(54$eqO{JtolZGJm$CH&+uJB@_|oR6hpE zFJC}@R47N=mU6Dng=ys#o(1U!kN^jF>q@BuFRX77FadqXU&=Oej&gh! zmAvsVYFuhnSSpEI@agZF9q*(uNJpY%y3wal-sUe;`0nr&!eo6h@G1OyNq0U8>N4c3o{gCW(JL0}hUaa*+)X6JHu)e$34qL$6vFc>w; zFl|u#I74fbB*5%kqd^{A-r;VVyFzF5GRMS@mD*M!x+6`PcyW0$>g*C+?Mm&-9=#jz zAII++cG#2{7Nogtq{5qO22Q;5df{t8bEdV_g<0%Stym6jSw_6kjr9D(vJwThR=#Z$ z`D+`(k7A`aa3mDKk}YI=rEwm(M`a;^@ul1EVVtBSPKZyaBo6xTJVbu;iKh_8%knEw zzl)je#|xD!5bfd>sC?#3fsLn+ZIj=BritdEWZr$Gam-j+AG^ zeBQ7{y#d$;1c>UaX0s$`y9IR&Uht%?6V#3j_dum_!)Z0s#1SG=>Z;F3ueAhu2gRuh zt2EyeiC`#?N0oz4N?Ok^yNHE{tD@|Su?Lrt;BeXsE{=$c(+apVHXZGnR^0rinE63? zuJ+pWyiVgeF^8JDKcC)qMYw-npB0P981ohaj;ZS=d9D=U+tjE*j# z!+aSgaPSCxF=?&g=mubv_I(`4&wE~0RU1$CMYoe7>>ep9T_*LY*vWFWrhN_BA?fx? zIlfLC=7SJjU%UVW2RfB1oH=&G@#+2w&E?S*=tA{YhIMtOpT(hO0liypmUvgin6ZYY zC;}D>T9PK6oB4t*6)1QfWp+NMEC7A~X(N_es&RZ}sU5~de+QH>IpT06c=vQa z6nPFuGKUt8!F%H1$AH7K`vhlooY z$+@;VhwHl;JQg-N<(}BX2Q!?kS9}+@y;igRYIG`SKfq+?bE)-Mo0W^3rA5B-*IN1H zbbrYkrz+c>vq5oqy4ydFCDI1OpF{xQ%>WU+&x$0HiPCd|n%t}0-x0)?=GgIa$4|FJ zBA(C4Stu@Y9DYlFSN+0y6h5j9IC_%lPFEm<;ww-h5HZ=V0K9~py6NEbr;_A4rn}W` z%#TyQhUxct-Ge!UoQ7LiO)vzfF-M%wm0F~D_1-GFO?FWjnL4#^X4A; zI8~qCeB~2e|J(c5$7)(7_)e+i@7quGjMVcNjQj`#nxBZs!c6_@fQ>)jx&3wES^c}m z44lGcEmB|gBq9v9!HZwY$zJPs3F;JE@Xa|41%5Ox?{8skPG0pgr)f}OYz{gg8R&O~qUlSP_sy+QPFAh0_ zZ?DNsxlfe^19Nk817lTqS`f_b&=4a_ULU1WD=1iiF}qOmrg61x?C-^+y&GBJ?PX@xV<;lwtnuC6ws{P+dI zqc2r<T~Rkus*wb32!qO1{D zP#p0Dm!L_EcXsANcPvEY_QTxNE8R@b;tAo| zrx#R}0CkurTt~6<7oqSq*@`+k+uPk@OX%(3qBRUg?kMJfx*_xgjTzG?&nf0;qmTz= z`Pb8%9(Z(nJMz7Xqxn$3#g*V(aQ-i`;seKNJmOPp{kHD#byr7dOm1GPMPK7p4SWd^ zXF%3tc}Ga}9x(!g5qW!9DB%j!AhU)1>CinPA(!~zNJlU#F@FbPf4S(56GWzfJ?df8 z?@?tN5b;&vbdF|uWrXnqW)hp zu*T~cHn*sML&#>rNAb9UG>5t#ndV037>itv6H%)lM(JXeTD7> z_TaOuZYgClPqG!p;XG$ar1&KPvdQ)C-pkb&UKH;ys^+B?IqOFhn{C57t=+s(sNdX( z;))z@I}%(QSM!6e6>-~rwKzC8Az`kuok%~$6SGOc5Liggqu&*&a>yu1;vw=Rkr^5-l8uYfLv-l5QAXIH% z&l7(t;Cp6Uwf&xWMZJEwG|+9LrroEY7!NCB@N46^%x6P9OGOEE(uv533{hxipAd^x z2E+Eaa;sHY%A=i$G1i;tBQ`gnU!0ui5q2^Cas<)={VY-kHT2~HVyxEr)u@tGr0g6N zGx;DLlSNjU$&_rNI~A;=2i?1g?aD4H@SaKd$qo3)lC(HTatVk#!vN(n3+(5@yMKT9 zZzlYI5DAfu&ejM4>fYOIlm(PM#2H`gLUAo;FTE;9kJMXP@J22l=t^+n7i?uV?D zfMgn-A7#jzS5Juev!_VM zzuintCBI!p6TmHC$@YSH4}zFVE04U5zTUcMPNd)KCHY$N zC1@h0N*9evP0mRzWW9y&n8Wng>;@p0vck2{7f%CPaO`faN{VgAz;-^y@NWm5IebJ+ ze{vi0#TI*^zeI#4;8*}PsI+IB4n&z$((&02Jd~9cR$H?tU6f;{JC;3~S*1t?UJ1*3Q5e<(c&8oQY%TXo!Aa%$K;)S_a>-1xS5f5#~O#}BUL1k&z#&t z<-yX4YzJ;1BiZ%$DxDG5;}Q2gkJU3caII1J8NrSoH<(hwt`jPW{`in0SqBTa;TYdy zB9oPD%q;ucDh&;>_JoA~xNSwP{GzzV(XnvPAz^ z0z|dtYZ+71+yn*vMvi;8t+{&dw&NB^>Nuo%0MU>)2A^jRcui+c7+@E#Lw_A{t)97I z_~87DKbymwkhyYf7HKcS@Iq3Qny$`h%*qAZ$QuHTWsi5vSQaR>DXa*-5ww1&sq@uf ztF4@)e-p}b)4b#wO1E`zw~c)JBlu2`a}CnBOArX_XI_Cq`>sIfZGjD|<^v5oGVqg2 z6KAglmC6zOOOnTfI0*yelT&q{T0&;3?=fdk;&~aN?#A6kHRhfjFj{%SmP)8)d zk0d893LLlhDmKqv1kwT-hEMnAx6dfJw=eJ$kub>%C^b7!SW*I%|22JAAcx6w=fUzb zx`W)h3X1o=#mp=mqp|U!uMax&-ixB4ybW))o{R_@$fzGmIq@;lr!QZSsr*`e;FmZ5wh#ZW4Hj84a7cl! z%Ofnqvi9{2OS8oylWvaaL{*5bg22J7Q<1s@?xEl1K9Kv#SI##06TUx-wL1LT?awrO zd~2|y8$+-It|t}X<(Et;S&}2vcvqls_@gV(N4>y{m};%%TIdys4hh(m&+14{dF;zr z^~DLFcmUB16uqrZmS(VkJ!0A@fedPqPZ1R4y@jEC|7HuNm+7;jvI@kqhJ|?&VzVV$ zqQ6Vu%ojCrnpfId+I%GIPkt74i@t*Xu*Y@9;)2G^(jo=fJ4pYrEZnH#BjV9L z3B@H2$L(8EsMlJsaAj7rlCT1CamGzYK2ANP-`HjA&vHbi5z*&b0hcg=Ckk9gZsj=h z9#OEw6Ug`}o>O(bQ%kUSQbM13>EgD61zrTfhISf3W_`dgf}xn>T|&orQ@RsV(oRR8 z6Nq*DVDE}_zR0?a{Qz+*yJ;%!&N5B60bJOJ4{z;J)TX|_=&>0A{!8}BWB0nJK z+r6z=85~!4@P#}1Z6h6bXvlqiNTEQ1^98KPjJwoALB-5@WBFqU=k6SBxG0l|{KOL= zp_@t{!jhlj!LLAg;-)-kS*C5q;@0B##M8j#S(U&3i-{8Z&KZ8@d&t6V5K4is0`{lz zHx>6@k{s zF1-fGw}z8GYqCt|7s3LJhJ%L~1sNtzQ!=YY_gZX=c04RvXPrBy+XMu1_f4(k^0i*( z^L$V! zzOaqt*1?Wpq4?v4`yWdT^ehoK`192d3+6S+v-)%SM;*ejT_DFq&W_ea6#VBakuk8I%&h1S%BVmAnW(Q@Hdh zQ@F$$Nl}kKNkvLrG9sI_GLgP7qh?=q0m*;#vxQHvy}PT4N0@!^2z6PVkvH(gr+u&u z5+K8HyC5n(h$$r?43IDY#PT)`)R3KCG|c^G6E*%(6mC*C{22^JDBhBSSrtTqm@mO& zY;qRPTl0aE>O%)z+~X0xQJ;1fO`Ks|EUk%mpNr8O+60Bab|GhRp_kHoAsE}d&k+T$JyoyDxyUaDoI@nU`qP+xe=3*YL#XhO&&aER8jGe-bX@8X>g&=2>wYE z_Y!m=4Oku8iAcKC6QD|q{#@@0RCos#>B^(54(@@^vHBrBUeg0=mko&W;Yt2d9l_F@ zm8nnd1}Jeu*a3K#5s6_5|6WD#b1yv~apM2hSSgJz+rP~4z1ZNVf)7_BLJeHuU*DzK ziFyds9>DP7vr#KR?Lpy#lt7e~hF{)IMdG)^S0VEX7x+L${w~q#6QyTD$3MSG_zPR= zZUnGGfMCtf%=)z=Lp@nZ++%;{mpTolUl?=1%=D2mBsMEperiQlaNS6KEbxo5r+*{k zjaf=tfmRq)op~!6`SA)=4?iHvQT;!7^u7+7XGEy>Iq=_ zO&inEemQ=zFIg^F(-K8cN%f6w{({DiF_n;!x7t(UsRz5~18(zEV#nzL6?6(fB*c^^Ao7BOcj)azm;M;lYv@>3SbIaZL%$2+-TFLfuH z@eIPgWg>`-LmN6<3||x326_h0UJvTTyWCJZ{`N*e&+E8~ z5Gd;K5TOomUeo@=3;ga0{`ElkcEL#LqdK6BN*T_4@N%wJCA}x#`KfaMW(-fl7Mc(F zg9q7`oYokP>y5Xodp1!ILy>1z$lKW{jsfYHNeM+jC?ANrwDkSZ9;n9q=O6ajUms_V zKJs$?o@?N{0uf05&=&6{G0Ay4jHdp# z{Etud^al-A;>6r3hK0cjWLB&p*22tXvZR3J=>g~+5KH$3a44a#BLK@ZAMmvv@~lR# zyat3!cmp5@KdNN|UPerMB@GvlD|-M04}bL6M|kFFPDu_F&abaFbmXT0!%R;5RoMQo zzh;TsjeFoOC|~g++#pf4*jIsBA~-;3H4l6T)exUwc+In~52y{$b~Z*jzl5Fe)c^{+ z6#l7vr{`j45WZstIjXL+pm{Im|K?{ESFW_gBoaD5LcFtL@jvl#2lY44XUL-nk;UTsI( z@-7~Wc)p$LJ@_KW(sK5>EavOSK*2jiMpaR^c|EqI-q3qw=pR4}ON4n4@jvW@6u?&a z@%f*(8~$OQdfeE@RKV=X(|&1Tk-FO3!=CL*pl+(6+amrokwb|@wT-5BgKJGMQK=b~ zceMjm8o#6@EP#;sxh%CHLK?WW*|@+{XQkq$a8pk#8`CDW)(kr|>W$7aH~f8g%`&T! zV|eHB+7r(q9+s|aN9&rEL zKeg?UK;>SjI}Nhg6^?wDZco&6QtD}uhHs5lmbsXCb|PbP<1EjH@9m+m`0izqS)u80 zxk6&R#iUpr$z>F-wbZILyrwN(6@!iYg9B+98QVs}8N(f_FLY#h3W^k2lnKJ$X2yXE z!-PISWIV`w6xnmKjg(&T2f|rEv2#jHg-9Rn#StJ~i2N2F9u;0Y@tvMI9{7@>lV;Pl z&sF5_0m6}H3{pfDc`~zqOoP0Zh!oINWB#&$Z7AgR@CXy-d$tEfNcW05|$}qFs(gS-F?F+Si>m+ zcR;`y{@e4j4Qkf+_wy}lE%G8IfccHP%}=Md!0ab0Rk;<&uuJ{K^IyU@zyC~KIM0kc zy}W`tK2toy;vB1DKp{(~6z?;oc|c2XF8md>H3$;(%${3Ka`eIlNUu^;0EZJ$I~UJG zi%#~DuY>?G>x}`Vaz7J4Gwai&G1y(XIB^CNuxJE;ff69nw$O9BvonLlVg!yop{8e{ zxS@M!TjKuQT*C#a0^p=DozsNER+^jPCme}apdh6eXmwy;HA>F7>@A#oZL@O!<=1D% zZvz|O51)|;Ed{iNa2jBJ1V8_mlcUxxUhk5qsA0xp!} zfRQKg2u2O>@$&^r+x1~rAkx&0*Fr!J85bK!6nugs?}@)BKlra%$HKw0n)fR|e`O_W z<48(T!bF=%&~kJ0dqwHi4$Xb0JLD} zPF}FKDz8?#zY!|b;__>_RQK3;E>>vky>3;PgC5F7kZIrlan(|_O>Aao5@wo@z2t+K z(sNIcjXh)|lwFcKof|+X;?%7t=a7edI6ALmhYNl=$L_0|s1UpYIncYg?jlPBRx;~2 z1is*s6M7-dIxNZr%}g!kL-wVEHX<|JW3NS<7ssc~g<|pd5T)A8pPQ+_lgoUX=h!4N z!KBftMU3KMOM^f`-IxT?E|-?MbDgX8lL~FKe5v+Yahw|4OV{K*q;gykE}1TNxO=0= zoj09QE6iJA=tkLLmA73vo>IBUT!}5ScckS9(j+ufBs)TvVXM%7;$5YMgc*gKi5JNS zgd_+zF39I$B?3+L?E+eykeMk|8jJizrtl<6%+@e}Z-+U=>5GTm;B{81wHT#2w>RYz zIBEVue(WsT(G`nrgX`ETOo!FGg_v|MOL>%O0YDmtArSII|?2EHlZ z3eHce(%76rp;$1XdqlcH|-=3wBi~GTP!EMi0 zVC}QU&avOz&SqU#U2Xbo)FYE2U#yp5Z8w$edhm>e9FCH(1OA!hx1qiZBs)U@yY2bw z?2Gw=>B>-&D^R;6P@+}@dxEr4(e|vH>mh%67MDPwJ;jvsa@_v7Uz$86PhU&;{pC77 zZ%0R~{31UMhpsL`>#*y@+Jyb4L_d{04R5DeR=Bb``+TYyJ}Fj$DC#vaXpE8Ho8|ub zomJmUnsXX?L{qbN;=voEz;NGF9DS7w9em++!KT+_g9DFt^3Li`4F}8(Ojv_6Bk4Iy z1<}I;sXnX5i;h?J2+-w8I{aX?{%FAd(MENm+1KH(t@58MXlyU zAxxc)zStO3$J>G3$MggER1RpLr-hr-nGDOi5t?cn>L&-0m=k!mF@oY;!BQBjS;#Ik zKyx@Ip5P?TJ^sLIF^4eC-!KT^Vc*)3AbNs@kfuZtCFoNMbW`SJ-Mj~Q3u{OsnHk02 z!n^b(<TIh@)yJjsaq6HJtjOD{ux(9#@WCIt>=;{5L9B)Jox5Tid{p__G!N*FWsZPsD>I&&4hc0Ua6* z+%-@Ap`Ew=PkF+Q7JB4;_Fdfo=O1vo{%UK^{J`|oANi((O|uC(j6j|}McxkmvsF_6 z&(>8*4jac^XS_UU`0l&?(K7yl{h>du&zc)vN;9l*z6L*uf&JO){wHuqnKc1CX;@z3 zaX)Z+0T=L(CQtlNn=kUi>ckuSkiBqC*fvmJIB)V-(@gM3GJjZKpl9l360#URBl{md z?H|oyrys%h!wO0M_x8g3DOa}IJ~|Y#46wE;_`%3$KG!$<6YJydwK$7yc>QCYcb{o@ zlktDE=5)h}Ec_P)0)eQKe`NM}zi0Nm0Y@#n$QiC3t2J=9OwP7{Sr9|-NdT45Cyi1o zn(2M*&_rQDb@6{Xo+!SO(&b;L<;U$(M1A)J{?Cwt!thHL2mAwriJDHD!L4Un%yi7F zBXg>ROf*cwkYONy{r(^MYwZ&So1NvboF&XP^81!LhG=RKvW4V~6aUS;vP=A975X(r z`ninv*TUr|geq)7;3fPla}cLs4E)!a?|yFViL!;ZR{w2|)lH|25A6C32H{cgnM!ER zsS%j(Vd)up!2H>W>MkWoXqL>8;z=;nOU! zt#kM|^i3Vs6UDgv&vCJPGEJ-P@2e)4d&Y-#v5whdOwk8J?ZH7sZRN~MBw(B~0rpq8 z4%GevQJUPx+R~3&AAD8ZywyR!A0l1gsJ#hMEbBeEM4==1DVwU1M75dMmKySlUB)tk zIn~MAAZ)tL>Qg*~>bo!5(=}3u4>8L8hBGSMU}f#FzSq6qPDGtmL+Paiu8U%ETxa)l zbF!GTAZH_2i*eZLn#`uY0&!oa3we;lg+0XQJ)q*ar{|Zk*1M+WJC5e~kh{dFozWh_ z9o&n<*+xB@`%VX!y{ZA5rjYxPW_k24N1XbTOvZ=k@0GQGX{{LzYdJ)58%gOCZ*18q{d5ItCRTB&=)}3; zF3t;S6ace-*=L7zj-qCxF2;=PK`t()08bGJH0%;F5Tek8!B&>Hk!PXbFMYMs?C(1P zqD&GvrBB`|qP`Xdv_@>h`8ODF*^3t5(=~H>NCSkDm6b&CPQl36z;AJEX8{gSfDjOV zhVj9V2jLgu-z$a|aZgWyU`KuG_bX@rp7P&}r33E!e5Ow%U865DxQxgS?h1;#2j*{F zz3%#pg!^AFzxgBRO4OaRe%2GnBgZEI-2v>7b8?)GbnBl@Yss_a}GPgx@UQ38Kb%<9uzujb6o5;s^Q>?;q<`9wQ z(v2&3+V;vIfc5$r3sB6U?I$$652c@}WHW zT|MJ^{F~)uk9wsE3ijW8;`9{^1%noMxI`%kRoVE|N`_JpvI1nanPYU)1QNUDD9uoh zPHVA6d!B%LriLoF4s(0^>XMR5X9f%>WW>AYd5;98zF~kq(i?;Tw=oaY1#RY8j)w|2 zxa&Bl*Ya-ozZt2293%rdB``45_vm2e3Qu4@3@JI9(vqbq?!cKKy~}l{Ig}@jg3JwX zX}!GSby=X&3Z>E`xN=nMywH@LI%hznUZ-nxV4IVqHe##P{hy{DEDSn&g?muX{pXY1J zRzT~!h-&@OpZZ>9eSa;hr$-Mztvx?zbv4guS1)K7F?pFIu8|Hbpd$PQ&ScK1xD!GW z3Qiat*>wzv>Qgw%){)U+wV9CF3w}RS&5<5$DPfDo$u;c3yPD@#NMurOhWW+qT@+Cz zE};V8g8|;f&9^S6-xr}Z>#Nu)hH8j6?LquwYC+FwKJ=90Ao2YA%fvIX!bd;HWrx@r zPh$d@a_|n@epcR9h3J42+K>Vty(^BC(`EY}OedoKal?rclf`UI7qDHCQn+IU7Ws7k z$4QeNE5xMq)Iy(EGDTWTnKC^3D=Rf4MRjYO@MQ~+H5?g-tMcJ;(Q5tlWnNDLZ0J=U zbz|u6wih$eIx>KO9;?Y81x!mV4AiQl)>T3u`yf8K@zVw;I0HAqN~Eh)SkB8RL{}Af z5~lHnwn}qzUAC0*RomqclQsqmF>j(MQ78N6Tf6;h}(qACvJgx>PO>h!;(RHqckWI2nECRq>ZPyEk7 z()T>YKYMz5lPXJhee2-#kc|=E;qXW2y_Saifmrys)X(<^5)E{TK7aa}b8T~?5}^yP zZY~ljixpRG{Jg6c!CNtRYW^%>T-`J&qO+P_l2$r=OvA?#UHLwBnTHUWlY>>(#ASqR zA6r3Q!ld?E$k)(YwEi@UK}L=Xo(R(Y{+gIOC|^&Unvbyi>O^-e4+b%pCeF>637xM0a>r8HPqm=L9P9Z68v zFwDNqMn-klqMr<3?!oe;gt~S2Xb1x;-xU9<%W{+z#?#x8Sz2S#CWY+jrcRcItg6aH z6{MD2iIWv%!jeL9j@*h6s=Iy;vGI!Q#c<<{bjqDtwOp1`2B@?O);Y@Lqb<9Npu1>E zl{*E6w-EbA-cKiWWQAhcmn(Re5Zq7MpXh!Cy|q+Mx+h!&{9K3*4vFH9Wwy{JN40E~ zC98gU6+(7BP^pg4>--jf7}eOgO^C~KjjXnPX^GePy*Iu*!LA2jaDklMKQ3m`{zowb zkd*i}WbmtE%C>}j9aIum3@s4)r9P_br$W(}8lM7~vVTgV{FqSrpKkvw2>vGuJ5oI8 zsw0z2V^l%KP>!C*o-s}RFLujIQZ>FsojLgpV@^14K{f9#V-XEL@T&o{49({GZCr{6u zZOqbMa$DuvmNM(K1%qssy+3n$)C0;oYM~qqQ-F+NFT&B z_lDr%I*DP{&Pg~E=Q7PqA`=$T?;E|lp2mp9C9On}3OURU z_Ub&eBST=MMuItsgT1jkrS!umZ;Bnz)%Mkr6pVe;fXasJTVXGyx+J+&bV zg%PXJ#qE8NB;!BNNEvu#n({KjRB=K#Ia;OM?ETGZOB6@1Jh1g-0@~|^Gd0K9IkO&| zZ)cB&qbr<_I=~u}tVo$tB?H^a@f>ZO%EhA7j>DWYiO}4M@ssCw%z?|_+_AwTPWTd! z*&hi$^<7eUH`=NIrM2_G$>!<0{m`D^NwI+mrq28vE&`%_anTSg@k%-w?455qw*M;5 zJsUO*cPgAdTGw+2s!@Hb*nJpcCuYbt?E?e(-;`*v%5Ql-Xj@8po))zHpt7-Bfv4B3 zo}v#i6<^9i8$;vcfzw*`7H}oH93$u$C`(hX(_Limm_xU_P zPs|s-h{TKQmRIb))NSEm(Zy$xV5{3KSPE|?Odv{C>b^G;w36_yo=W=GZqM5SYO-2? zHuG?LynAX!Tu~s;AdgNdARy#AqTs+3Nyyx>w?+Sc6vWH1CHyTvDa1-+$e^!uxDJ7l zc};3wBWa>;T=Iz`-_83Uzlp1s?BXkAu>~*3yJt*F1?{qphMFh8J{p!ZYG3yfYvWE} zDXXsOmC@7|{<`L1#^FPz8Yd}a*+@)l{4ya;4f6J&%c_-lo@l_RKeZy@g+z4>-M-W= zx4sPpKc=5K!kwSn*PhEcQ8J`$^W%(|6R0v^YVnA7KXieymGSHeVn<-q&J^gjTBSzg1-K zO`1i>V^FwTNoTy=oaeugr1och8LdR{?6zN*g9c+zNBlY0hj#`}k1m+Ng|V9b`7JLj z;IgNn#53T2Wl%ZSMO*cs%Bv1Cj3A`D~6HcapRJYU{M*QIao zdp)1$y3T$6=lsrnpZnaua|TLlY9Mt88hU8i%G1s*Aj`!xVV>K9Dy4Q;4AamVM4I?M=T1AlOhWYT2wF|8J zM$m;=^4t$;#bT<++e?3XHB~)^s7!UzxML+36V$KopvH&lx2l!2)HJH6Nr5w<{jCJG;^hvSchMJN%ZoR6EdgQg-~Ss+ zBcp_9>oKS{aYp1N$8Czlc@IeUOTHw*fB&cbTil}@lx7QL$q}IR3?EQ>G3c>&NZ~LpVKZndh@QQ)LJ;`1ZHToZrVeT}xQ6{OD z7-eV%>%c@{=RYi4?y2`d2HlP3w>j>>d1_C;mzvTFje=`$iyn`t+rmzQUE9t;sQbAhc(p{6TPyH7QCMa4BpVS2kh%V6Znf(oyl(Z{okcDmPx zMqH4Vx(InSE*nNTyR_wdjV=bQgu_^+HWx+K>VC(nzQxIp!4=862J=%lY*mEL_`PI_ z^SNJJ?ITooND0hX`&m~n{xJVwY@jBsAHVqc4~XE$Wrl_77h^RxM_RwPe#Vf{;v;3a z=A)Oa&SAJS&c0Sn7Z6xkbTw=-sb4YJvR&>*!w^n?zB#w;M^u=-T!RDFQVzl@4*Z2)O=A5X6$fbIrn%?%K=D>4M8z^&bpDo|j zq6y1=2ZJS($Xi? zh{O*_VWGXR`do@tbhUb(u3rK*``i__$GiKA)_B^rPY+fQ3viAKJ2*N(7@+S21>KB9 zKpX>Q*O_YA&tA8rdt68w&hxX9Nx$-FzRIa7Q#2{mlse21m&*dCVZ6!uCisM1kef;7OAu{O9{qjlP>0EVHHR1Z9^K+JIqJ!l+ znEaeu^q2$=suLxK!L&vMktec9E5BLYgdoMQtzl_?uSCP5O8DF=U^PCRv%JVQZ3vjY z_^X}%>vatJ=z@9ji^7iVM$dA~Yr;=;70uBixsbs&rHWUZf2;dx(p@)2xep!;}z|H137oW{F!4`8?^9Q&_>QgYu`$z4anY2p`D6z7h zgYo93Bk7fE^QP=OH6Uwj#YA0a@EfMoE}x7L^gYIy9S%*eI!;RiBh$a<7bv7JSPtL? z6SZ^-YVu(3Mn1TM%e~_&>90f@o{iQTF?G#3X6iwmNgX0yRnxbh)**6AQ#JWfX?{5c z;!Fya&k4Sl1bG80fUE<36Yv>sRJX#Hl6!cm?9h^Uk!8ZIio5pql5WDv@fwVK0kqQ@ z1wQg&1^HV{@ESARyzRwgu6WwvRM}f5kQtke`|Iw)RN$fQpfvzTl8|IMKIb1(W#dsY zq)=X79y3SZS{tV$x#W{_sBwDprn#4SSN5$bq9wcT^)Yx*{)K=DXtd@1PouCWtwxMt z5uDakVUXEMTHoJ**{aVQV`}mdbLz42ncHoKNvU#~ingj=5l5->8b*e?J@f)u(2i4< z2A`UDWD1Z|tW_jj-V6xz>$-2B9J!Mvjfx<$m4I(IKTBToWJBcsDD{leXpkXVdZC=Ut^bdCPoluE76t z9^kkaolZNt$=U#piUYTRr(tj4`Z)0=t8YsdPt}vASV}||v!wE%P)-34&Gw0bcPA9a z58nT3Peq=kOFJ0XgIW4&4QpUP=1&pzD|6&hG!pVo5Hp$+bVJ>w5J4UCb z-e4bLToN-(TLiE(hXeD7L|>!EnY9~yW0}LUdnfuF)6^?VLyVzecPHbGgqsN0ZE&q1HCR63L)xN{mh);Wi1^d01IaY7D#O<0*ikEOy|ui$f;J3Dv?AHZ@YF z?jqJJoX~-{ifjdWsO^!BjZno0JA+*NB*7*F{PalozB3b7$EVeT=Ze<5Y3DigyaN!E zooNx0b!K&4OGBJoLWvEOWp;n|WF(lKs_*Uj>bClJw1uG@(s6NSf+BH}dU8x9F+I4{Isk3{Td6Et4g*7<;C10_RdL$3F*l5LLOEq9u*#6xBBcWHfXsJI z*9LdYQZLwR9r+8M1g8nU*iPp%J4n@A*}Y{o_6NA;)vA(qE4Dx|@3XI?;8N`QmeuiZ z?mdcIofa+HGKbn{?}w@f9sXVzt*TAFyy)icr6X!zURK+SnNWTZDf%ehC;;Md2D_=@`mj=V$Lz(?SMBb$qxqTw zRL>`pEMjfGSvc-9DF}W1By5}54_od;MYB_7reBs{Xfa8BzB88GGmM=YW0AHlsHAva zN4lpU4B@?o#ENw($a)7H!M9Wk41&gl{B$iFN4?D(&tsdaV81bjLGhN2g!u|w1)dXx zmrHcMWJ$Qn}hD*wrNP)`^%!>`Tb`- z`3bdu3V|ne|M0zS#LBA%uT}Fc0~^Q_CnoXf)eJ@gzqn*{K{pleLmmEIXk7D5t4w4( zLQ6&r_i!{sMdtiRpVQ24nY=W2P-Jp4NgNdqen4iI!DrQrlcaAjy`Av8GtV_ynWmO1 z8h-3*f-Zwt6okuKPl%pY&-${6Yd|e~?`LuRo3ht7Q8v(+uY$&W!Bim@h~F3)Wl(~< z;AT6rN&?fRszQ03t!4T;86#WAWR7&&#Y*(mSIA3Q4GAVH+Z8y=EajCS>%+D`_goF< zqQbFQpnfAfyVnM{j-fpw;NpK9r@^H$j${`Q5{$5zPS9$r6)q(_>jTuCCO_07d~*-& z#b>o_S%nQ+NIBTR-tlPW28xQRo=NMX{GJc=Nld2F1#VmRmSt_?D`t)FVJ|0$c8#n>>%^i#DSeY!((U$y79K;XgcGBHD z^v-~d!2u{5Y!>_X7ILZVR28KDKG@uuT)@@_CO76ENp;+#kp}E`27txLBIrJ>pqe%a z=-s_}{>?A-*vAx~en4ED(d(?h)`YV#Fft9Vd!7`UiXzdpf!nz$%fW$-{{bP_R%0Uv zI7nF+2L3!?8kC(19+9iNKOTI3K*;sYBpO}?4e&YWACM4FKy5K@AyYV(JaDZqp~&>r z-^Zgw(_UQHlqEOEat7>r|xTVTY8eK`)k;Z@6*-@MP|&(ed_KrrWhS! zpT7TU-|OoYm{A*7^skRgcFDdQRkPzCgZc{L?ge^JqkcYgjfA%PCUdJR(?u6%oR6^{ z`EpK9^~?!k;KDXI=H1=BCf;i7W!P@4yl6eL4qqCF-HmWhnWgI!@L_jA;9dR;1Dc#Oj9On+_Z2-9e6 SZ&U2Q!HjD=WFl zO)@j<%$zf4@3ZHNhMGJEDhVn80KiaG0BQjMuy1c+0mz7Nms{_Jr?(5dm6WO!0ML+# z_F{_g_L<6DK}!_?@TCU;g2MrTe?JL60suTX0e}+|06;hc03dY!-l-}2_64GuvOEv~ z{rAZ4Df{+z2gO<8gBt*VhWGCY1IYSL^mY@;T~SpQX$=+?mzX$aScB!QMSvnuO2>Qc zEXS*x+_L4h??Qy9D{phoPhCMF7!U%O!;#X!m#WS$JnDI;gHIsU@SE~oy}(&dFalF3 z?3^E3@z@5Y`vnO=}rZ>x(Y^&{gR*r}UGvZoSPA%!Z<`3P<;Tegg;|7k@LB@VPEN4S_zYixGaKSMiSs+R~ z!Nlnq0uqG(SQCJR{{0DOS2h+%1JnO2b6%X^@wcE9wJHY2A+(GP`f*wqFW4OP7<1sV zI|^aTRCy>j>?f4OH`KYkd!4xF7}Zye``53x=58F%6o4vIC3jcQ5TIx^*Jx4K1Es|c zhJaTIgS~p5zbgm3>TDziwkyuE#lu#Dd#0vphp$rcXyx7-Fitr-If32ohr^->8l#R9 zH4V$=4(4s+ov0|w1@}Tz+#06mEEArTmJb=~jw7 zN=bL(F^bGkjlY&|G!|T1NHOq->W9X+09-v}&ss zWzAoLk*VYtlElM6`rehm9*K@Aow{&#M_*7r6xlp3n9(rHWL0#OY8l*^`@&;SHO{9p^`@lJQUmd@9I4>FM0i!c6MYHXd){kYjf#|$ zGc3|ll6IFy2{$SW{EFAH_?CY~P8j4~1Q5LJnHvz$Yp{X_#5P&;Uii+$ z*-QRe1)!PF=Z;n27e(_#iA_M^vzIIpQ&&pF;Xd@i_H7bJOqPDHBAx&4-F2cJ^udyR z|HUw0CfOeIojS~P(_&Bxpgs^uv=isAAp%wHVP!wof=yXYW#H=#NXg%F zIGXrBQ)l8bC3INt3lUCZUpplueM!YI((W=DV9odq6EB2JZc(fO;mH(n+EhLu``6(Y z?J||lgRH8*@Trm-7FzYzh<|)I{Y05F;ZZb+G)Pdz_hRcEyjs3$-5gAIVNqeea{Yn- z=Pw-I{^xd}-O4Ixw=-l!6@&<+jsbtp;6tHrlhMY^YE)dEjW@ zhE)^aFHW0kU5Xkn85hKsvda)bAZg_EqNx-L3x`q4|Lm8-Aq_=7JF64ZYcLRI=q)rG zLXrFzH7-}2`U2i!9RY)}pb?o1%=@2ozcOKW*Ym3|w3t$MCB+j{>`(v#oBs2e91(8L zI}wChMC?;t&|V}%e6#0Qp3%Vv%&G?`JD@b29JP`Zb|wS^eGu%330=zqgG;M$MS}a$+5FyxZ?Vl`Z#z9f?-n_{p&> zI6hJ0wNM=Fwgn9YU`pK9cLYIB zm~sdUf+_MN4X%OJx`nW+aCU$uCGukV%DcB`1>z61Vk1qg{8{#R(-H{@1*X4c+&)}*WOd|o8Y z0y1{Adn8mlt6jkNk_7U{(2+>88a7pqHFHqAGY7zR^|w{q`ARJyVz)n(c)NYgi!m+yNt^j3 zWl&v@vvx2{gV8bcp(?JcWbyHn9BaGAEhnbnO}|we#~;tZ7-#+M{MI(%U(Pvu5eULP zDSlW3j~QRl&uC>Za3#k!Y^fdOj!yVF7| z6?hJq9JV80Ul3DyIHy)+K$+cd!MCmQx={2L4ofs++SosntxyM(QC4HG!%n-v#Rp{SiSH6ptWJc-uuKReZ@M0xx;SA5m z2}|n(xcUt*0a;b&5V`;Dwj2AuH5(Bx#PhkgvZCRb7am8R`kP3>d!%!WB*k^HK3v(S zlO(_1xESUg!phNezs;LmhJXv6yj~(4m(8c8CQQ+XZ5d37v--hau9>E;pK~PRU`P)< zw;k--qUUd}%y2M2qkcZ_N;trQ4|^E*dZ^a$PQq*ROc#)DIGRzn?s@6Cv1=v1N`9m{KEE$BOzll>}2g&k!Iow`U7n)W4 zuM5#0U#ujuFT00Kg9Y<{RP0iJ3vZQEpdWb+0Yaepun}51C}B$^(>IK%O3>@&moMu6 zp|R|pM~Yj}--qI(qY|%IcurmCtsJ$Vx|YsQPiga}V^2GNhNlxz!o&1B@uA6t$)K;= zM3L0NtW`opKC<3jAZ@?bP{oMW%BT-z)}?73q?baE>z@+W!KR^_FH_ZSvYNCNye=Pn z*p3n>0hw?ayGJj>jQ%sHIq3BouI}+B&k1hk3*AAv<;)!XO{uj0=}{>u!6ekqq!@X5 z3t@Q^r8n_Zusydes6wanlrn()FlevH=w)?U^!Rz}VMO3IKIr-5=Z(ntr-o6AA_F3> zx`0VL!|{-yc|1}9)vbmAqz$o+Xs){&WS>sIOxV+{y854Sry+-u@@TBzF>lJG*v%80 zY7j&T$uJ;coZpccD!)Zumq+na-HW3346cZyP{Oe%)K&g3?_%A&16>@PrU#_zR_SfL zljU$I^$6KrJ)z7uXf^A{CVi}&lQGDkA%lKT+>T7lMnv`Z*{{7e`G<}nJI z1ZDNTMaY`==iDybF0YFetqPjAwf6G`3{BJvp_i;NEZ}pwb@(CvBW6Q3 z9$wU`sJW*!a$pPC{4ZEgA~TEaW;v*Wm!%wgk@ zX&UA0^~Yn*f30+VJ6xR|DrMdK%70Xbo1|#4EWO;)9KZ~diC>Jz-_Jnyakgs>(W7R- zg*v%;%Pr@~Ppx@ZUM`*D{6yB&{#3H7-b0{z3l*z6A{Pdb$!7&VxwBhl^B&CJ97_y( zD0=u4gTwHja1JBWgiu7!1fMAZR~jEy(!|Qg9*S!T=f-X70h3@p9Ml839NTqXJl9|^ z3WnToLH}eneXd#UvAa)PlIRVY%+96a-Ephjb^wW+Q9Dbbc~dZd3m;+qs$8H&O!uwz z0GQkA?$2F#^(}WphbW*tJQmpWIu%M%E#gL@%Wi4zu?p*?6H^du?NkT4_noekh%S!e_0LA*q1^v2pIcUQ zh^WiA_i(E22$3#G0qXTJqrT>=@GcoNw)TxP4$YP)i)x`1XjC8sN%mf~IQe54d{<;( z!k@T8ct@-DUxe`E@i6FnEXON;(92+6+LKg<4)RyE!bYazrd7QcCEL#eN^v!%vEsLw z)FD{4awXrQ4>f91^SD<;YRQ>Y7^wFRhXeTI$BUDTqtwbcg_P&Nsjc<;aoZgGvVkvJ z622m?C+a7_C72@wCbXt>ClJBNUnF}02aKbcA-0ZMH3tL=#asFdBP1|>zaDYnLm+$( z{m64kjly4)aQG}m8-0)fUK<{xx5Z_N?D!MQ!}=fom#tzFf?k+_LpHXyw%j9?CpM0f zu1wbBR0YHyFR}Dc>;`+E0W5Z`Cwq!D5G5S-b7EM5sl@@^5qYq*CiPzDh6x<2^rpOz7QMw?iJPgkhwPHFsFzScpgHA4&K!urmV zRYdV@QzXoRLF2$BB&Ag`fSg9VUR*hE^h&tZ2+*Jl zm<4T4Sl!Zmy?waa036#%J-U5Knk;w?)cU-5qEq4-Ze&9Z9(pR$Rv4mXm%67JB#BO_ zmH16X*B=(Pkywl??)*21^oKD$;4}zp=6ggWy2UqsOr?PSW>g=XkHpJEZUs(34Mnry zAw0}KD@w*b6ywU0!j=&cY^qC|bu|cv+4&U%Bv-}XTE#SKR^konU}&Q=7?b2VET$`a zbH&P^m*!KR%yAJW=yaAzcuM)G)aYKi?zk-U>&S!9Q%hd$0uY~Dq)oK4RnrdC8V<4D zD|8OtD3iabfH$x$EvoxJ03Iq`0@l?R`I>NWtl9zvQL@TtBp=n%x6ilg%~U!@ZtC5r zqYj-^uz-Rv5*rRLE*>8ip+QQo>KaFSQzxd ze#>tYHyDnoqd$LiLt2el*omqj{hWcAF=u**HHlGP+e)H-bqazu>H@z%RL1@{_CK`k z{)y!{xLxj})@Dqz&-i6Yl?o)8*R*6W*Fm*$Xijx-dzY&CF-mM7sO>=wZwg#CZ~LPw z0W|hT`osW6^9ZP-n!~h4DuMs|0mH6sC0L?i@Gl~^B|?lAgXqx0Esj|VA7$2>A+5+kz zP^f%N&)Oj&Ri#;9=N?eE%2%Eim!?fT&euOGC)AmIrI%Eft95wCAi1!z5s@aj%S7h{ ziQ3kPrIOm5fys~rMzh2WWz=KyeuQU}^L_8h|3Up%hod7hr2a{Pt?p=BLHntKIh)hu zt)x(+*4A4q6+lhGo-UI&c@4snEibjV;W!i_4OvH?gdD>Z;3bN>?n&!dOyJCSMkeWt zRJ~t+7_87t@Ikh1Y)rS_RyrS_yM(-i&-NgkWVk+XaIKaSvNw7x(08SJg+TOwTR>2( zj2;Dif7i4q{p`}F5GOA$FLQw17`20t20JqzLQswTu)FTS_b=j=D&9l^L~?#t*Rb|5 zIu*|f_~o=*l(llE+sOj%x zvHn^5cqK1B{I#MfUkgUQ!1L~7UC?w(nY7{}*(~@OVV%E%9n;n5$Xc2hfroza;GJXd z{sj-<4G$DTn`DAUMK-~45H1pA5mbZSkZe<0~oV9pgh(I~8?mlikVfMY=O&?OY3~B1CXNo^A zSqOXB$?$ufzVsYyy+#W3?j!XJtFMnUf($!ZaSqicH+g_ z&%(AGr3Qm$<=B)^+Iy*%78I`RQ8 zm4i9y)@WbDB=xi3YZzvq`I>7eRqS1j_WfB4^0-9u-hTDF@3I?9f>($2edR z$#O)Ao22xCdd836nLN}x)CrA{Q{S!EbW|(@OMnp}3bXT}?GXnR?&ZMz){mgRKP~9! z7%(Rn{>stT>!T06uUM>BBi+QX{=6WBEXy zJnjLAaWp$SDx}japdisYpLvvDM*MwQsEjFJMI5_io~|KwB&1F9aNU7<`gfw2TS04f z$CeEdF8}4iWWVTEQJ6no2W)mYZgd{EI8EikQmCAgO{s&g?XW?)kUS-`YC8 zx`7>Q*0m%D3l43GZ{iYtahi3OtTV&8?tmDX~VF)poQZX=As&2LJ8U zGHwIr?JtGY**jisuc?38*7Lde#>sTN$f8x@QD4je1|-X4M&TU$%A$ePR0 z{&bJA=U29}V)(|Oo>roqKE7&|2WjSb4!H261U=2A=gw0Ho@nRoSxG#Xyn@^M9Nq}? z@2PgnwUCXan(TEy-zRHF$Il~i#AiMCo66#lV|5AlBU6^Um@u$FUe5!rxX)~a|1}=r zkU-Qwx_GxF_6>Rd-I`zbGFDe_%X!RO2^lYW+?SV_Sa8|(c7_N?j{7)^u)<+y%m#m; zJj#3jTKSZL$%s>Io6Jz@ShSUk#prhi7d?XYK5GEFHPXL!Esh}KSMz6!i%if8Cof=k zl}OWj9EL3}Wy1e%e9KT7)IDoKzq3M)L=R*lRP@zg3Onj7E@g))2eDNfS=)uiVAV|4 zI|vlueEqri{XX{wv^fmD`2Yoh4LD$s;e&@&4Vc;4cD74nZ5mnT4rP!IiM2YO!1 zK&$TR`nXi{akORG_&NX77abG*dY2ON!n;lQf1$*9&Kv5tHM;Re0N$SP*#T0cC!Fy+B1={uEv zj)%4K6wTRC&a^uL*wyM!AMB-BGOBCnOW9G%Df&LgMN7jk&PBUp{b<))X+@JXS`L_Y z3WRn|1m8g`?|jUK9EJE_(yq>y}EjS68wR1@j`Tq ze*MD3QK1ZjFNMvCf6Vk&a=ZWal+Z>A=J1y&?&^xtsu(J*QFni&6>7%rAm4(aG+k|Ru}Q|s-0f%{2TsySoFTmc%owK zfoyQ%bN>ziE}kX`(t%;qPETFJK*g z&rC&V4EQjZQ@OlQ%{;Tg@7HpKYrV-s@U*N1)Fok;ho=p2qBd(;h$YU8 zLwo{#u9g)9_7vLqX1=Q8#59Vl%W+DX5Q@P_l}HCw0Jo7+B2hIeU$jA8OIbS1vK>a7 zd%|iiX>B--5zV>djwDw;tCpjfYuHue_v ze`=WNtpDcXI#Qs=<@k+yqxF+<7%%uvhcvl`7K*Jo4z{c+&|Q3dm7rYsil|#P3WWE( z-=V_`Csr<79~O!0L`U`fLxpVmF|lP&7jx%Kk^iVXi0U%&r&8q_ES#5^ZJyN*Z+GS{ zBSEZn4YF*qBE3Nu1cm+Kr&r-`DQp6+?U0ZUy9Lx}fykDWF$gJo1`%OV3Yp=%t|xyU zMZ2rAkvzdG%N!nRA;@#zLvp2xt1w!8kYHV(bK01K@B5%V{#UV}*Roz{W;mPks45wB z>2)AvqN;F=h2yO%2x`c<&voZc)hHTfcj5f=%>}PILp)u>{tv-Zf$9P>mzk|oHhg4p zcHt_)1XXjWCq9YP@%w!E<=JTD09v2UD70G)!qwU3>C&7H`<2hZ2)J zyi8}S{~3GlCb;uUec`p!Uf*Q&zbK;f==`{+;2rKqS4MrFrk<+O>SaUoIBH}Wu?@JRuu(Hth#q&yIEKOGj!umu~(@SXsyvZoek(={6O^76976 z@d*SsQBI3PZUw5Jt@`fMjh_hEdv28{IC>wN(w8@X0l#W*c_A{?8uUvB5_VWH6v7ke zK8_HDtK9OV)FO4RHEN>bz2{Rxp=tfOW2VvaOOiABrNF2myNIL*J^q}tO6HyH;JRn`{~ab;zGdTC?B{`cx6p2*W`x1~sz*S+@Y1{P#6iGwyw2293pDY$pL z`*_yjWcqi=6P0%GLC!fP*t+meEoEH13nF!(dh(_)VJfMq(Ebm#wObOCv)vv;MaHbitw5zTN;tvtjy?ARD11^*^{2B9t8}7q*4B_N+s6f-a;Zd zxIHDJ2`~aX+?-l_ccAVhc}fsc1#ia8_&q*9N~Q#X&6w1Y%y53pd#aP?XX@P3%Uyl) z!JT<}4NN%jxqY4T_rkmWMZ$FVWFu6>fZ`&AmH+`*|C{WsS2WJ^yvN?@Orh)+(j}M8 zsOhd!1Loz;3ffIKW{~*(Bz!9N@?@cNFlSbK{h_KkFFnQM>Qs6(haWyB~ zU_^p3uS6>)Sz&T~5$D;_;Q(HbV-4p(T84X4mWcu__rkvJ`garcVNrjjfjX6a{4NL7;#G)o> zqoc^}-OX&%=45CplG`}nmZda%EaR|3#jkaaXVH7{PSmeoq93D6@#7l6Jx!&nImp(G zaa7FBDS?2F@QG!0!SA%C>NFr!1@D-jHSu&jC`$YNPfQE)qBZ$UaBzd=Bdm=ZuSX$B z6!vfrmr)YG4ke(ELF3Q8o`b>%Q@J-YSsr%TRSd3Rmc%`I!d%sDB)Z@9T8{4uIu{fY zf7UG+;6UcxO>>{DPM88!HScqmA^DwrhA=RSDWT!%^gH3ar6#VYK+Fw05FM*#!7q)# z=%_YFbG2nbBa9L%$s(Nhf{Q?zXX_#^CFi(8q0_4kJExHNb=$|i!k#pAr!ALH{$bwl zhSY-Jn1JXV!71yF8g%$b2H(!vHR^re7oSn#=iP9-2>S?{#xBYyL~4+v-1XQDCwhGU zHuBeL+I?oyBH(7E(Gft6!5)MVA64HbUlY(uF;>vEq|7a58>^klE`4Sk!ap->sy;}Bj3Qdgd^DN|>Nh2B8f z;GJ=rkqc08@a1^vIa63PxD+o*e_D>Xjr}eu#`~aRO+#HeDOa*oI>%UZWt8a7KRH>| zb``<#f~_PTid$n;+x53|3Ibl|$aRhV2lI_PGX!1CO5PDD6KFV(uE}4*Q6?wp%7}Tc z=PYS_k(-yML`5K?h}^+Ze$zSHnh-rb6_imvJ!#5>>6Po6!_#1dlxZGYG+Q%PG8IYI z&{XX(_R^;ICv2!vCZf_Z8-|l?V&lq2;YnK<^YiizX#HX!$cooG`(vI zJU3K(y^ZPs*M4L>2lZVG^5&DT1aS~;A(~pt6Uaw$EdqEy&x& zc;6wLJO;cDu(Fh{KU-(_&=`E39@4P_^w&|<@3~0a-Pv3k^(75*HV0AoOf#smPw4h7 zs8Sd~%>!G2$qLqraOL}LPEhwX;*{tijojZrUR0~X(&-GaNU(n13-gz^d_1ll;Vn6g zC3+KB`JBI@A;0&*CzK=JSzVN$hSN4Se*HZ&k$t9nZS-Rkl&nA(w)5IpZVu9nkS(^T zJBCPik=LEAD|J;+bB~+y2DkAQ@Lwc2?j{!`B#18)!<(Tu^P8=aI9z~+)UIUNkbF9S zhKv1z=QBw$n3O7kt;*ZZ2*5PC$h?_BN%XH6TixnR$%E{x@5#V@`Bko4tHrprLIH^x zo>@gt?f;C|h4d!Mvrh6Kvw6N4enh&EnH319VeHaN*C2&;$XH3*kuoQuHL1qM&keKv zMMX>NNow93jN|gReK%nr8h8J^_f7ra>ol|var!1rw@<)tzxTV#+yru1aHKnupM@If*zDruqgafuQz7e$$zkpAvJ+-yyF1wu)$3t4vyipp6-uchc)iV{|^ zgtKUI3LEUBF4mW|ane*y_vWK0B!$qguI$u;N#b!M@H$m~eIDr@<9b4lw^3M)kL_@; z;pp`^)q}fSYU{nD4D6d0f3~k}|AVSmYt*rMPwTbg9@DhxCY+;c!^`xMPo6zOPuf(& zu(B&Sx7D@oy^#lu-*iIAf~mN(b_ z@MpTw`zP+3RQCf$$=HG8Ow5JRoe2NM$$$qLcdps-Z6;k*48I`bm(XyCA!jnNx-J{V zms`#y68$ga9(8r@@lt#TRM|h`@Ey!dz|k}&Q;ptYk5+q&Y6ESepR+0wjj8mAKW9|!<8!=xa2U{?& z($G{)aP+;rS-S6W(&_qfI>2#h3;OC+xl1~qxSBYRxs@m_PL*Rn0Q`osi27U2AIKJ5 z_QA=Z>UYts1djREjWt=L-lBYfH%@Nnc%3r-*_IAo*sO&V{=>*9Rm&K`H-CLIuCa}T>l6Pdl4n|7y@*n-f z{%i9!!M_i?3RXOIb?<)JuVOsXeDu8dv#|xiecu-zHu1v5qhP&kxWViIJtl3~^&8Qv zwVp;jn6nv^6FURKief2xo3q?tf3#FTYkq>^V%%TQeAI;jD9DV9JI3?r7Zui?F#ef$ zpwTJ9^CHryl{-HP3xV-vCYb6xyLmZCBR#V&IHeA8B1d$y$q*qIa%XZq+T`@;ZaL)( zWlt+;+iC?AE*DAfe20KPf6$L=Q7(^6wVf)$r)LI#Z2CY&M5>{?@io6Vsu)*+-g2El zl6~2EMzK!xI2F2n|CVjP3{zG_&RK+d^*-V^)`sb!80{C>;-Xa`fXhw>C3Fd#@VLX0 zo!y^cktbI^$;tgFQ=zY%77*^>Viv776c5M!6ZPJxgtp8g+naGVWl;1{sV;yOMRS}w z+n#oxpJo=y;2xP<0P7^-h)^f!`TkcfI-Y&KfT=7Z5~6X_?E3Bf-@nFdYinjWCjZUm zh8pB42M;A~gy=ougRE+L(fkeCFuvM2_T5u#UdKaWp4ZOF>qnpZ!c# z39G1sd1t2)BW^SkgI3eU5nO&(T@>4T8yp4m4A^5j2Ueav%p4q5(sW)9YT?$G420+5 zL@oe!#Dr2=Y%!5{yXDF1NOzSuFHka}zO)3}j`=FuItr>kc81u`+0v5{N+Lc#cN`yN zyF!or0-jFQ;I?;=C~|cJs@$G`?H3a$6EUSJbS(XrZ}woUwgTj$+y(fZz9Y&{)t=~% zgZD5`*W04LwrB4mDREbAFH5P|k4QB^mKPx^(Xb}tRT4@Wl#+`Po8>e6_S2|zB7r+5 zKSi0*2Q`oq22(og#@G*icf_mT*i8dZ7+a$NrKHYjd;3iYRnybc!|k-${UG9tz`*5f=c!%>>swV_4>+lkJYK296b#JZfoa+De|5c4?cSfr8<>qTPydV7<9VEA zYv0^+nf7_ilIl2=bfW~LoKvd}ExO2I&g5kIY0XOKC;T3Fc}#=Xw-av=A2Ie!Jn;lo z#^vKGwleQ&V({)tV5?Jp5d7lr=&TtOw9* zeSOo!e&Tn7&MT}m7RQax0zoJ6)lB%oD0PY-pLs>6 zu)2gFW5%fvWXe#WW39qBpLApb-n;7F*^e?f{`s|ovtjVSp5_*OtMXmM>2J@p-R}RD zMj{gWw%mE@M0Rf#^`7K&FtUCEduTOSE zd6vraCFS38|Amm)?Q+YpiL`<=j__kV+5vKn>J=cIWla#iRS}UfdGhk9ovFe^FZuYY#G*pe zE!?-@@XORM;ZeBez$ zx0bd15n^P15Hi7?pWVqTmmk2k0zvn%r;-*lS*j1uutQUOz@(4P!nX!^ck@y?U#Z<- zu;@MMz@8)d8-5%s*>$*<1QT7jTJF6=4k}AX&BHTNlD}!nK>1&3WVkf-oH0_u>5?{` z1Vi*tIcni7%{mH}MLl3DPEh1-k}d4Ew2bgqkss|>yHgU7+j)`P3%|fMo3z)9i*t_b zBiZ87wx;FkpDD@&Mgpea_=)bgy~P=b%i(2>Qmd8EV8^9Urj_N#17+Vc=BE<+potFR zmMMr*n`tQFC`7zj@h1>*TJgh&GS{*6C#JM#oEk28Z?&vQ3nUZ)MFq(M?tW(*!c@-0 zAJpHh>38|GFe91LkdWg)YkkCX5`V>}OO_JpH|BA8MlE@X;UHbAlh`>bO6=Y}sjAzr zh7QC3pK@?31_h7)a*Q^yK45pL0E2YNi`aa^VSX0=nXO*z;=o>KQC=x9tmQO^FSF$n zab#B(>u{n}{9f`*aFINlXVqfBUHCeDYT##)1*Sj5HI1jO$k(DM zfQndcErQjEv*;htc{-XO$wa~>mZQO?1owxZMnul& z8~kqadjX~S^E`5r4u&Ti%m_P}m?w?VqpVvkiJ?f>*BUkszP+~OH$j#bXWS`$p+od` zHm>E?sN4LK@q-O8`)(c)l`uKjzk-ySD%-lnKSm2Z)sHbk%oBYP8Ko>FQiU*KSMyq) zh}oWj5*;_%vXlhZp%`xxeuPu&FOns4YJm=>;BLL;uN+~7)G^6%nR6Z_S0?;&tqQv3 zPj5%#E+BQ#*I!;7ec#ms|Aaos;r#Zv~GqWc0yqD_WWp_*_74@!gDH+Y!#N!i zcC@-lO!05TIHDBX7o{)mGLlQpmcV1W%7HR?B$4f z{atCXTR!SrNBNW?0}k!LbGS@|UHT?>b;4{(un_NEf}6%H;0J%s1!Ew_w^6gOl2_F* z%|kyU5xWBIZ~=_}6)t~71WxYYEigGomQC}rOtLA2L zDHx-ChG0fjWfgIXKGIdan;Bob?VNS*)5_|f)@H@pKB7AY;uT2t&Z&2Bn}F&Bi*Z$p zapUn{U?OkUnVx-`J*$OMk%{Z#!_#F_G*HkU2Cx@(y1x0xSzrg2!gc zpFRY;_M^C2HMm~G$Cw(}F);FCtm5ZA-sL@vSxOAwvy^wn2N^Q)BI+~bKJqE2xEG5K z%`R!1-rgNfi{AV?44`LD9WOr-KTcLFb0%}%z*iz>Q338S&eZ;JBXh>DU9y%=d1u6{ z5M2i=ZH}CxzDYTtD{O`=4a>BP%znt&@oao`EXJ_~X(o`?kjWoUi}7C0 zfwIeT4mr80n>J}A^a7MtIj58;p*0T4ig-PCB)d|9QEDLp3Q1+YY#K)h;yaF58Gw_uHl?I!iWqB*5S6X3#f4+M{1^V zjxjN!Lsy_Dm-c7g7aa-rUZXD1&X}oHs?FspD$eHqxZ!#`W+iJ0 zSOy{2eCns(Ik;3skzicGE#tamj1w7Qj6Y7DdzaYyTxSlB}AE{$6X$>#SZGFd=n@OjAX=V z34>VE;wsger!&G?L4YQQONPoceBtY5fn>;;w$80m0o;HE&(e8a>9zhe6q9sqg7 zu@z=3${*%h*6*y-(Y=9$Om~m_0*zY`HUihUBvdb^QLFn;eoyA+%8;`LVu|yRyj?nj z=iOCFp0VsI0b@k)egP&&({0}KyLbvSrT=hSz%D&>@RC;Ep$U- zIc5laX{Z(^Q%-@--?BZdT|tzO8*r&6-f=ngam;v%K9d&T_2QU|6g8@EaWY&d{Un+2 z6bUe*TSqw}4d$H08fL2Vx!eCYQ(IX- zEg11pp$+#H{}H3)#a-==-n=ol62PGk-QHL0lz|UBXN0}C5hXt@PHuO0OjYOq`& zf3W$QE8{1V03Kn@VT*V7Z078!$`QgF;p!+#wb|`F`o;HlZ1PGL?*Xw-s}LW*a9>f{ zB<8{NCyCG^dP-#%)j|gR=(rZi7`-9qNPcQ5*&frQOwmAJ|i>w3eKMQzCSB{J)Gn0@TkML4Ry$2+I347;&U;@qOH6Wy|CA0T6u&@n&V|IiBR zLq3NA(bEBcgAD3TUVpWMTdQIs=8S?TKemci)NZucr2}|^IigI*N+(H=U+<>4ox!aR zA3wvA^MRIq=1sN`IPJdI_zp4xn5&gkD>_fy+`p?AU^`S}1=7IO#3z4ZE&9=JYx1by z1mLEZPKdYntF6)%CQ;H*5DE^Fx|}G&_nR#56VAymXruJ8XTdXU{OCi8*{A2N{9AXo{ftn?__@_it-2c29y133(T!wk-Xkb$S%sTmMO;5r@@I&3$JiuBO;ZY2eX z#2cd%=8oIf?{Pfcim2`Q3gR_^{!fkmqVv66z;@XhnLhrw3b?v4c;8F^Vl%(=y9bud zk3fplYb6-hCqN-JFLt+x&c;|2JnBWtU69~;!VqfL|7wOPopvn4Gp!<2nd5kFUs!n(uMNHz;_1#e19d%W&H^dE z<$qhywLkdd#8OU`dR;@vPz3f{Q9gI}(NpW@0O}k4pc5O8s7`Ir%=_UJhId3h>93;e zPM-)|YAnk!b5s*Yf{0z`#NaPb4UV&kXWx~;hbj0XmIFhpU^DA6c0)M~3<@$DPX#N% zAc|J!ZMlBh)-zaylcGGVNToyGU+dAeP;5aRDz%ep7cm;6SBf5v<48J%8k579ucaZ(5 zXJ(#4*4+O;yh7ELQ-wNgIiVN zxq=shXPohz?LUD#BN<-!&QeS#r2>&h-O3_~2~V>@=ztpG_VOi4y6~!}=zuJ>0|RMr zDK`TlYAFX|wAYni0<0~ewUiKK%IZWCJrR0`RjTe~{Q+T(gR!@xYffU-@0EyCFO{^l21G8d=iA@FQl% zJM3TN+?08$lm{zJQ8~4}6kYy2?D&F7m?(a`EiwKMok+L|Z$eF<6{ImcyJX7{kIB~D zJioCaXT>!G5?BjY@NgMVPukQ>(SHwHhB)hypBfDwUp>{7l4kFmbYr8$)`!+Me8Mx} zDMO1|rX$gau33?1+m3J=4Qg>?yrV{^env9mxP1FK|)X^d9k8L}=`1~K-`?C9`cWWj# zC|kzbx>)%4nB~Fj?KZAaad(H}?$mZN$(=B^;of`*8Hf7Wc5QPa+-}{=^Fd;1vo(%A zzM87XjdwBw;q9jgW%KGSvsyFlvlZcCRgGK8`KSAZkZkh9XL>;6yyEZ5R~oDW-4^nZ zToeDrK?(GFg2c>tvCd0Em_+#M&G97NA6Gt4rvyFDaK;GyqN3Co5+-h^##1pOsPnZW z>`xn0Nvo<>lf|cmH1kQ)E)RNDIBV>%Q@ANn5)|K{!|xD|WoOOM(Jm~*=`e3GzkZ?T zoZYRR83@uCJ%glyVR3A~SMIzHRYm@X@y^Sxi_KnLIiaUoBKHSGR*x>@zg&}f{vL<` z%to3Kr&f=q*3ahFWqWzuuBZ1^omThlZm+weQ}_hE?j1`Bf-se=@D?mK6ln0;`C=E` zt|0P5nf9Zr{PI_7u>}n6YKD-wXTPAdM@mNTk1?(_ibxGu%`pF#`a)Q@NQr_WVOXj5 z-==5`X-4(Gu!OZh&5vjW3Xr}x84H=;ZVMAvJlE?SeB*itTEyg>TneX<1y>CaIhhGH z@Z)czCO9Q*FunrcC+5}bfO^2|FvxS_7I>Yz``>L9X9oFaz|h>)LfqNkd1v{zKH0YS z@5IKt_cx(IIgM%MJ=M*WnKJV!ax69MBL#P*CD|Qah^^O7+%s0RFVFSs2^9su_+*f zp$k|J>A6fJIhQuUtWq7wOwNZra|b(+zyxJ74vUvks&vzCvM4dleaa*;jwuFLTh#t~ z8Br)7X&e$zTty87-suB9+gM6M)~3y@c1!b?Y9ScE`0FJU^It`13`R}(ZV=3+)uzvt z-&-!w%4Yz7YjD+~$F54nx=bDnD!>Q1io@>cq#JqnG2-%Qx@QZM89O>|IxeSbxw;42 z@U@9%!+pKGdxXeuaxZNuZ3~9ja~2X~{UT#)RDecznPUAtql3kSpATr% zAsky7z^*K)e~QTGUUQZhFUCxKE3lyOo&Y?e0AE>~6PU;81MX_A_SkmSVP#rPSUDk-)h05M0#XD> z(B%+8gtmZ$ve$($Z7QQ*Qh_(TC)Wo{Fkmx^fX4<}X54+_r*B6XkGlHy$ye18rDK=1 zF3v+m1ar?5`RmRpfZ_I_C%w#swD{6NB2P0mO3o+vgvmBgNg~8D<)r*0@Hu()c}Yysg&b^~C||5URzSd`tWa)VglEY*(WQMV-p z&^0}KcJ~z|DPa3iLI!Goj3kdL)qNJhM__p)B$Tuzlf$F8oN;O1X8eKGjPlMk%faLl zHZ@lPUn3TRdB8J}Sx*Xfhs}s1pW+SE{!!2z3ET6!m{)#}Bo0Iy1X=2D0?DOv(1!b^ zQ(*Uqh_QUny&+>Ck9zw2z`~X*5e*09{2t;SHQdcTDiPXDJj4c>Ujc9>*6#3J?wTUn zK~+%8LCG5QC1gf+4g;2pwdWebHMsO?D|721T!zJyj#iwasrJ$SoB#yWai&Z*a=qVa zOdYOJHEvBQQp=C*YRN%o%kaFIBxJ>U>8eOtY?V=nh@qH+>gBe08|0JOSk385pm?I3 zOxpqE&xOlh|KnN(;qEME2sb*ss@&|Vo|#mdI7JB6e->Ua$n?4q5Y*TRuWpUn4gn)b z0pOZ6ahc3v`{r^-rBj`4_gg;gJ_|_Ukb-9yRrNLUc+8O^aS;L^TCbj9zsSC&m;Y--&-S&70e#?BqjTVOw{6Ys$1{WYF6m1^qoB(HUVEcvL0`Shn zcc{FCi56$RyaT%#B8nJ#y;rdz)irnl$teE%43k^Ub~J zhCIJKHJNGwsZLF|bDTZ!cIO}}BY{(bjG@q5hEnM7-h9%P%gUAuZoq}!J>qfVEEUdl zku$DTDJkaKVjnt>;eC~?}^V3Ob1jNI+HM~+T?VIH{;{7E_&e_G3qQ;s;E5Zx8Gux7GW?4~_=w40?IswQ- zvbg!`jQJsf{kWr}8l9K%oOs7Kbe&%LSjP8?wHXONRVW-HVRc{f^m;W{`Kc*Obw)Q; z$i;)8G88xge6wx0CU7<2$ekJXve9S`^j`7leidv;$RG_M^n;Bq!DG5+WEBS<;? zJ}ug<_M6FVng5*!F!-=NksV4y0kr<`8jNh`*n>YpA+V zH5f$hJ!(Utt{fcmOY@NiNY=o3aVSY)j%1^S7DCL^|g4i3|AB9QCq-(2GPreyZ0;1oPTd9oE^OZ zTg;DihJ%Em#?w)DW-UBYgUY}nF57X_$2_Lo31Y3G^sBbKF3SXxES%8FAK7A+b~Nev zy7d^X$HJ6Wr@B-ueia&@5|29%KU4DxU57*P%8ubEc2tZbcAAn;P)P`&QuBQ>DQ*!~1Y`xV+q5?OSWtz8!>EFZI2)k-GSyE`Pm zeo{^3J5n$3Pt5OrZzX5X_BtTaft6}y5{^QtB@+?*wQ5t`QMgl8M-EB z(*?N7JJi}DxDa?Flt5>C+z@tX87jW`lQ+ky2s2JgG(JrLpH=y zwuKSJgTx0L=8KC28E|m=4A8F-JQgE*$VAcia4h~~_epay{(rI}AC>PNaC>JZop^*j z0N{N)7?nI=x86dH(Quk8x#$Fw*JlB62e0GZMWOZoCc}o%?R`%M&<^)#4VFQ13Bc||qrTqQOrVK3L z!;pFO>EO968*ag{_Bm6}8J#1FL5K3)9USob0FN0<7Xds1t6ttjfnHxg{b8dRY?aCs z8cm47R?H4}-LBAy0sPjRD2I>m^~-?J)|^*(M&F5vL?u<)bmV zwURQf4^oksBn__(z^quQRpjMY{@+*d!xbp{VB+VQx7Tq~XAJlseD|}2z^3HTd^8HX z7R9aARfXlYNA?fMnQ8_CoRj^BvYbA}fY0Q3xeTVySdh{#4*|K}c|+x@go9I9&w zbxRn=_#%!;VWQygssdd`beujnyR}^soSOERpk~)*c2+xId?TFSP?h{iQoV@@U{k_( z7AzGtQ6sHaWXGPq4>`m;8&`V6dhr6`_QVlfG^V<|a`>V0>zE_~&mWj~dszRax8-8j zzT7R!WwD9dZFa1lTH0){EG+ZN3&C#=oOPGwPGHvYrnUB5sGoOQBGr~L3*%~9+>A2W z=%Tw&DjwYrq^VXvZ}fb^`3Jm(ykEYqKi{~u-X^NX?;nUh)yK82DZz`PN$b(I+I-b~ zGaaD>BSSsZR|Mjh<5a0qGtu7O5@aKgcV!XUGF(>iXZqJKdig!rLcxgwmkk~Z_C#@3 zn5(Ugl}z9s29S1QKb}f`EJLfVw1z^{u>Ac$d9PELGG_L<87oYK zlZa;pb$4>vv!54#KRE+`070Dvgr@H)AJV!FrRX=}ran$^gXcrUrcxDxrey*ans_yi zAx8kyS%$7(Vq$`#qpQi#|z)^7SFf<8A7#ixnk;)%gVJTVw z2SM4)?mXG>&DU;0L(2PrMH=vOiR^Oywyj{)hKz?_Q#UvX_qPf=+U(ot`Krq+$n{(2 z@qhPpKVSL(0XOcpn;pNv@U%Oz++5wZTHH6+hJuJ;gF8--mmPrymxil-Z+~w?MY()m z$gt$ki>vApFHEoLh{z~Z?0d((pe{(N#NH8w7W8V}eJ)zTNIE-xV$S=B0T3@7>Zkx?MpK_My8pvy zxeOg(=6Ne)pf1^!JzBT|4M~H|4ea&fw%8s@2?m2h93lLRy|3*;Jr{~bCei2(RJi=r znb^5(YdSDZk)bl>nEk!(FnI$H9w0mD{8az;&H&f+F8N!o)5n1-j96;Z!Xrw zYiIa-9#m_hfH9gTiY#!xCa8Bea{S(gt$WR!qGG=N@yM|4^29F<=6yON$FU;bc)ES(pokGD|w8@A=#}SZQ;^#&7Z1=Rz8PvVpU-+Y^c+ga)aL zRAqnbD;f`}2DFtqF>I&y^r6?1b0&$ZK7xx3p-GECS3#IaY zFQxK|?=KrJGlxmCj8Xq{$N6|cuMgwdS~b5Zmd`vP97q*?*wWeAK&wEJnFpFkTSq$N4fKM z3la5jKI6Vx2+8AIg@6oR?_#cusFAu{=1MaYTu*XeQdo%=<$AKuerBXjQ{%CJN6D67yK~yCQDoiHRXW8C-5q;g$bby27@_fh%Q?*0e zbG6~c*YQz~Cu^ZtHzFE#I21!xKqL}1LP=PQrqQ|2*57$chx?-6q0xK7KBY*gea>B2 zwUz8wvW?|ns5^pP+ny>lR?&6U$e)Qa{-1FsZeY`v--Uq30)BpTR6h?=sdAdmpEUKo zEKr^qP4L-Z`wNHeB0gQGh&37X8e-pwyRNwTFT=3?d5rD;efC0v-T%&iN9ox^FC~Eu zwj5&NlG%mjl9@Hu0S9s2W{yo{OxKwc0sXHGytp`H``lS_^I0GHx)Vq=!hcZA&clqY zYyE>Or{30YM1F_>wEDqQlJmj zM7ra{BIi6S%czilC};Qip|012{6?!2KU-@dXuK8bzS6KBS3!$6ez;?c`jV|u`K;2d zIrLvA`DJRmdJ6>>gUyKlejtv$!9eNwr~}~ZI?jFb?S&-Ap{d;M)Vw<>QoKGfxY~VzW6#;p~K#GFRfFuF&db?SSMpVb+Ni35JU!ZIWshWk?n<2$-pr{jJ_{RdX z;}>)T7|CBrtOM^8V31Z+3On3&-)HeOY&sVk8$?=wtc+@=nVJseX2l(AMffmSfUs06s1| z9Rvk(CjW4;v6zaQ1Io2pzqMQ%JKpF*APl5#wsnLRCx25WmsUz6E0KW{D@yH855$%K z-BwZjpjW4{TxhqW@ujnF@bLbn%RjNbO#OvIfced@OanZc`0v%A!sl^$DvmN+sf%eh zJ!=Q$e8v=Lnk{Xau0(8>u}={Js9N&)^Yq{7a&^BSGqyo}Z5_LYEhpc8&ASTxuVKwtJ8_XV8j*;`o^ zY0-mXXJGfhp;6_9BAF|XNX$g~+z`2EIxb!SVrl>htMyB19wWQ&`6|KA^vT7pk)e3| z|LQ7g8w897ku2Xh(Z~v6VR3M9N%u=v))odFKHbrOw_^-PBpOHc?Hb{^w6FOysNO+E zYEaOHp*LfV3rBTZOdHSrk>=~N=O-|OmFrEEeY7w?zFJ}80z-sz)CGA?rV|P$#44#W zVUKZf$nG8<27Y7p$1a!b*qmU8vT^)9w<_(DL;rbJ@5F|4h23ozEj{#hbJMSE1R zpC{OeoV*J_YoTHhs!6#KW}cxs{)Z|I1%}xBE98IGK?Z*HpHPPHiQ&`I3l({+LVOc zKGJ#pV8Ly7?2rL*zKeVUQUiJ>E|p$4$#t-_k96(p^h&~(U?BwDZ)HR+KRIi3#0%6U zAXRzRwE&h5Y8AoozK(k2iGl5^HVy|Ji&X~hecz6W4SyQk6idYXui`T2{s3ii8-b;>|@;l<3EQXVHDN6}hgd!`x zY#|bG6tU^S#paRxn`>7rLF)a=Q3)*?xsx9%Wch*aF~uA3HHg2Q$Jq9@v!8oy;$bu; z`zo@eXz)~MI$-HSD{E{l8j>!L zpcSUTuIVuuucvz+!xkKcd;1yeTSHMpshIV;8E}80)$*h=?(ann`$H#K4DF)i=Fgc3 zx%k>**V`#|dcb$IC5DzJIN@!_AkZw4bMuXaW=5E)OZ9k&*jjmC8o0EYiA&(L0N zjpK{%yt4O_0w1!`{K}j(#cXRfA62d`#`AlUYP%n9bZ+ZO-e zx4ROLIn#Z#mpFVD7aH(fx|byCMKafk*L$mw^n(>q z<}yhs*GiWX&Icn=Lcc*7ab0_T1atd7OvBVHw>uXW_Yp2ab>-uLStCFfNQ8kioMK=T z_)%LhY+@HJP~TK*$%*_qa}B|YWwz8Kq;f5kcO{irw^k=JCp|pGsl8`9crq-u#dH}~ zV(y>b(s#c{z7?ARL*@g7E$VoC`7Set-+oJRC(|}qObT>jKx|?&y_jJC>qkvYfp1+6 zKEFU%22Hzr0&i}|pLu9?R(o_L0eWxEbH1M&;qwGd8YOPIB%9A!lYjc2@lWC{57{8| zL{0=NWA8>KuLa!1cVXUP(;op~E-m`rzYR$e`~1`9Z{`f5BS(W1^McK4M8?}oSfzpY z&nl)CSsp^wdHK3+Vezno&ETFcp&&%V8R&J4+Wdx%DlS3?p)L_a_K(8}QC+JwykCnw zNQJA=mX~xqJh^tF79eo>t2>R#{T!@@-lv$&ze42eIucX$vV9Fgq7J5D$^|G)O*~0JuBe3FnFzt8dtILzh>DS2r z8Xj}{ZHu0&r5gP=b1(^+jrVKq&YrFgSaEgvV_Wrq38(p5XJtFc$_TzkO)b~qLoUyA z-SI;GjI$N+z+66XrEc}gdIJG`9VK)tWzJ3m&Sk|-`@l1oF`{gkD*IsL{JmraN^ajJ zIRWoccn!HfqNGYfLzlnN!{(6IR-%=o(3J-l-PlXVS&QVw*iC+gHKiL*EeR~y`-g5N zlD3?mn+?S2@y)S{%}6EYK#FD*E|RFFujTX8fmIWxmjI|-n-@|h3{y~^N!Raw{2N!J znDHO)eeA8m8c|>7`8YTYG64+*Y-&5x9v_!X>N+pi#`49P#xws-Qwh9*$8Gu$`Oo%t zNoTb;mNp*sv4e#U)9`KET>f#{8e0ZDBBl}ly&dhmeD-+=OsK^|8-ucE5mrKt`%}i{ znF9*UG*Jo})sSgC z>9dd=PpG+Hgd#t6IKL3H7in#wdb=Tv&b}i|hC;|@q{SSiX}_VfHU8{VV!c|4%Z;PY zJ)~(7nkx-JwM(tQe+$Cg#$?+sgM7G+Zv@(8Tn^?B->;E-gz@msUAT~%nuH`-U6H}a zlFQ^)Tg>i`qQD&ZfpUyrmrwsU0{QfKK2;2OO7@+3hIVk?ka=@=b^R z)pPt`#m7|nmMre|gwpLVW;Yf=uf?jDA)2!Kui|!ui0}k33Izu4IrbP$LgoJ00lm|Nc@SfM*$K9bDtvD{`<(6?Z+)v_)9e}E({+) z>!4xiEc`4bnSCzOkr_I4DYPbucIc70;(2gLv%JtE&#$U^`ac<9x)Q-qhca29)2gqD zY(dN!HMUQwd>aEbjuMSxe2q$L42$ARp_W3bBq9!1kfEI{WV6CQJ8^+57+Y0y-8_EV z7FX)w=qX23mHMwbNdDdj8hEDVr}IH_5ZQgqO^o( z`RSK9W#*4$>tW3J3i)4K9@hfo@+fd%RrSNript7h>a@3k?>|IrsdEc z75-^>zjfY-XkYz8qB6kdqLpZFQ^|fB)CaT1@uox@kmtBd`yjQ4%FespH2r>JEUH2& zr^Ia@9HKb2PMgXMcV~;6KWB`c)vP`5E9TRC=^2TG#GU9bufI!=&ErA}H28RIjlhnf zP!nqr$pe8x93U__wusw8BvH z!BBc6+S`*SPpH7>|3GH~6o^n0F~&WBUyGzL&aH6uPaq?Vm4r6b+xx~r6!H5ile@5T zn+^peN`;0F>pOvm2PVLWH=vChQ^)L>6y}N3gBN8pQ&jFyG}zX{f3SsbhJ>`3p(uam z?$7?2nqB=<)LoINODW#(gu;wdgHlux8lL8w)u_OgHA18_QKI<)jk-G+f?QD3jXr*O zVi)bs+0-h;qs;Gyh%ER#>a{=Owj{x|^?t_+gpVq^5=sheJPR^GA^&NL#P4aESm^;=lP2O{G%d|<~s zY}dz9tdh42Qo1^_j^()wnTh?ED=g8I+}25&n%dzAL92)Q^nGT)6Gn*i?zWDdYjWI{ zet}^~M4L8Lc;GQx#A|%naiMow+BnpGThZ;8v{5I#7p40>k4d0MnSMfX5l2!PyuVT+ z2tRTOsf3Hgzy*_o7hn7B9<1maaaf(GFQ&>II3}SI*&vM0ha~uC#TuPN1Ur_TjajP= zZJ(R2mc2N(f`A~rB!dH7m$ShS{$W~g6JiwCfoq=*w9y9{^qM&wgHJ4Q zRdgf$%(<6Z#}`yp2XGHI$=MTwmhd!wkN~k&h!-+!X{FXh@{3}<)0q)%_R-;{R8o-G z#2vxNHGF~4%g_dJlB;0rg~$?w5UBWVsbc>CeC%*wMVzL}MGR1wYdtm4B1I%9HdJ!G z)oJF_D?T(mo|~r|pG&QGN8RbDQ2k2nY%=Q-oUV8AvGmkoBCs_35dv}Ug}t`0fwn9o zzo-c1``zZ0zY8198qdPUH4t~W`{G5lyi3!}+InQ;O(wMtM%YpvS03?1ywU2^ zdSH%mF*EuzDTbJb8gs>n|6628Umr5-b5b;#7^3nuhks_~LcGcFzw~_>DQftl;57<# z<75Dn3_|S6)0S8zrYb&)T9MpRhOE;0qfpH$A)YWVoW0+*@+UB6`}iU6llJSbar)iV33RWOsZ;ojAR`+~07}li9vTspH#G;?-k0 zqqeQ7uuuqv#L`I@QqNXR_|KHO$`!DC{Y|GqaAy6nmpadV!|*JK-@0|{(cvSh5@)0D zvJ*6c%;$PIP61QLXS)lKP4Bvm10`R)xYhX(#`E1u`4)bPYc-lPj1c+A#Q=GTPfkzg zI5c1pSt%V?`d2Nf(5=AL*mR~&EKpNSY%E5kgB6@l{?X9qu_ZFRpt>XcM!|}4=Z*&% zFk8Q&9L!x!6FTa#;q#|)0Iwm@$Y$AEa`yH+2QPQey~1=av(chn14(9+4p)P) zDIX*(vyC0lW%h9bYebz?FxQhe2J~jS@UO}#G;f%EoKaZ6VR1l1+1s{&3kmlJq{Trq z_NRAhR+fKo_mzH;Ognq6e+HYJ2%!M+`&{q$iOqaXCavr-72PM=+s5%wBs~0U!iN*H zf(W7@5DNxu*)7@#=M%Zt?`d?r6s3qvL^-(6=|pcB|t-`na+#AaE!KtLx?!|MT%;cXxL=`|R9Q z7X6$*qSQ)t)RZM3;c&JHjSC@_&p8UdQ3r8H%K)rKh&z-r2ueD*cK|AU)^hw%pmc^W zuKUp&e^`wgCglC}aeZZO`?ouL5QKpap-`$hm9f9>c|SRJm$bvHtxZ@2XqD0Y%3XWB1Q=WnRAi>x9yuk~D7PC?|uGF35cHxbq z;j~_zugiwDZsiKa-+KZvbgdqrKwK#|VxDnr4rJ9=k|Kt9T|-hxm|9wTu7S8~MJCE; ztX@e*t~?$4*SDCnPjp4_!Tcfyk3ah-c{FGOp@pclMhRSpDXMXwLqGkUqf1!FC@v-ye?NJV%^vV9dH zy1LrG(jhutdjPiE59}Y%QC!Ek8^r^IfxjP5fmXmWGI)xnSP_zD3eG68B=KY(ZrfKV zq#Two$kNGDn#6Ae!6YPXB10**N=xJLZy1r5B7}i$)F%A94|jjGFwXT~M~JpV9U#)C zvZsXndD~5SX?}(f3sI)-Ui&>A?ILD7rL;s}TWa@-eVAc~p@taveL9B?-I+VCB(-CV zAFi4AHgEbVgT;#ZkBhybW7Y+d*CA7*v?BxHv0Txas z*~pCSo5*Us38^~?9bbffSp7w)fJ^o&ye)QL2Tqbii#`tz0WW9C2El(V=g7QH64f!4 zqSpGm9w|+4c26nMl?8 zAu=bS9<{F}Frrno{s!q|$mqs$QO6Pzt0l5Fpf#-o)}7%gEBpi2G1D&^q2u!B76Tg^ z9TM^k?mQd`L6aDnCM;YN53qcZYh5uqP|BBJ!*U8-*I9naJyJXhUdGzuG+o-vZtIJ1 zZTka~z2AXwtb28?*soSm=3u!CF?WP~XqW^i!r3*1r`oVjaI-;JO5Mu*?Z`frZ1&kh71dbilHf6GoNzXlq<$mZ_Zn%yyvLAu ze&qLHYA*TR+3K)cOStak>%kfFLMBX(QEl~Eh*=f4#HGE<1HUXkzdAcu{V0Le%*ImJ znDa5*ypU;Az`Ys?GIxo`C1%mcwD)oP`kMXu=9~%1M2SVPi)!4eYYouf5vpHv7r@rs zaB=WJaMd&AmG{)xALo@mj9`2CAe)&Oj&oKIyozGU9hf#Twk8#7^um;oVX>K?<-HpI z!~!o`ybTW3&&px_mj#K+5`&|xW&`ZtjS`svqg- z^uL@HRvq9{8^|){^2xGv$>u@%{=-F$jj2U(I%6Hp**FAvNmX@U6Pic@C;4?;_Io?I zxtpTsR0{7mgdW??gUWa&l5A*TdzM3kNT#3kEDZ8&P0faKk@N6op@c8ckEd(n{g3*f zAgz+wKDX*^LBRJlN_ZIpF%bynP~l9k?+Rj_G$K8r87PugO)c=gFyc~yF(wq{ZpYK? zY2k5dG(|s()ivPF?&M1@?7^eFRmTVJAP`6aQCkkx=6xuEH@1aU1dfCPj{|gEp1ZE| zr%&$p~q0&62=|N3%lyy6^4_PXr$hPm79pz~Jh zux7a+%4cu8J$5R5fKJh487LIg7VvT5@E@Xs&B#)L5T+6Y2 z&-L7kI=VbGLsU)WTBaOFq)U+W$B^q5Uux8U2IF8Tlb{NEVNLd(b zNQRDwsocM|B2Ft)rEJ!YXD9q-6iKXYq{?`D12~+JrsUV}S!NMYHJTVD;jGq?ci=WH zRuL0(WMeB!DsGk(r4=8Bvz#bB9WSwTRUy|U-EHS0ha1aJDMaCsYFgN=(B6qLytk|> z#A7OHd7t@bzgAS_rdX?A6&vwS2T{$Wk~uWg^5S|Z?=!1Yv*z%kjxYCRfl?JNI?^d) zV^LVs1wGs2VP!;R2M0ycC>8~cdxtjUMpWaRKYbv5+L*~e#OgQnINGcrm+>$3s3ih) zJ{Jf>+tjMqsMwIn^21=(wa>O&%^u!Tjbnw&gAfM+TtTQAo4@_6s3}-<)oReF6C0tJ z1GpA|Bx2tyPEZpJpR(Z$tbuR)X1G|XK6hGMYmNchQ&zFBl-x1e)H*l&Pt35IQY5N> zP9%VNB3|QS=6=}z(Ry`s5AGWe9%j_2!fNP}g$VlZz$})idyL_D!2~91(zO!jozGXv`VuE^I3kaE+?m~!?vC4On+fB=2Gz_0#u37X7J`!} zA{z98ycz?e34TAZr$W_0^d)Yrl)ou82;=#D#dh!lX4ZXyLXuzJ;sf6IeL=a&(V(~5 zpL|Wt9<%EU@*FvDH=@XbDK(pcSW^(1J47}tNyJ263h}LH^^&U|s{#h?#{eG-un|rU zj>>`p(x{nxmw}Kc9gp6jn5WMjP&~RflvH>knT>;2;FW;~>v7McTdZ2)PMFq`AXymZ z*_gV8AAR&-h_GQ*!B#&B?hMD~$T1$b+pcbs{dBEus+4QFy6KMbXgZ9vH)3RcVU3Db z;ZFLPr#!WpHD+ez6P5~z3idoO*z-Xp=5kSN$#ZVIqRjWg$N7uQo&RU4$d@D0A+>WR z!V_Ot)u<5f(hh)}+yPwcI zAWtd5U{^IFuP(Z)MDzVSw%lpWXPf}b((Wqoc$Hn~8{!KNr2D>3;|e}~NW%&FJ4sPuzw3)It5M&D<$b2T5$jAz zZrw}ptm8|2A{Eq6+^68Az$$CvISsZb#U4HTVLQ&g<6?-fyVyc(h$U_MiKYxx)&+SZ zse;AMV-`dae3z^V!E5;C?d{X{74(K36A6>Qp6xkx6OpeLELKT_7g0s&)p3+4bdY=8 zP6HhQ^K!*%Ff;%evf=t*_qP*Smbh()2c#7hb4S>Z?wB=_YiB#D!r`yUNtHuM5{Uh3 z2E@oJ(JXMzO15hawlVq*WMxZ2*l&X|z>St-FhY~|BJ0s&4vE7kO8R7xG}&SGB}jQT zad4o9Lu;zD)4IPeh^|&Z$IADUVGXO>r?7D;I~SssB#?+X&W%&dqERR*un+Z#RRxMy z=N1pMj9Gq-S`H1@bpC2~;)S8l5TR)B5I7AC^WA^qWTD2S=0#mh5t6oaSqKgPBt3}I zW3u7HpuO&eo`t`G{MR&=&we}W{cRLPv5l)+!^|FdG8Pbb0F|a7;o1bbb&tAe1Tux;jtFw-7ma4d8-x0rjq|0lVS&9Z2tA=iMHE$lY?j zzTSN+D+lfm2sn<-()FCDx#?gd;rPD|vF7BKkr|4i@-y$@&V)us7bdwNeWy2aF~7T< zJU_@p!W78cCeBk-f1>|h9`Wbt&HhCzb9QrK@u6adx4VBg0_bzu<1w~mw;ub_De-3H zdDi9k^zoSI@ZJsD9yDR_*zJ47n)i~u^_Em3+kNGC{CWlg#bMg>KA#k;{NMM9H9t;9 z1Z!W9JOJwGRu7u>zd#xO@gEBYMW8dSR>D8S_EU0%x>{>Sz31fz+4zs*!MX7FN9#Uk zk2Aw}m*p|EN(d2avI@$$xI8*S*Ye*%@hpqD+CON?3=e@+seqL`A4p&V zok@w{F=oiug!}5ZgAZkn^NpaN5a=nPy@}CTa^W!8b$k5F?^MWqouRq80xG8|PQRKW zU79cxl~HNcnm9G@#$psk+z5&v?NB_f352g^Gng6XIhyBQ>o$05a8ZWOxLzuNCv<{7 ziyNTKrpCQIc|E3VNGv(3!+)UigW8F6=}t^rA}pM$DY;ZrMwz^SR3$LZ-}4Gj{BKhFVybP;SU>{j578EVYzay5(JQnndKIINu&*B0~J+l&j#F$?3Bo)TmG*6i% zWh-3@C&y~9WEvhe=ykHNdcxY;O0tV~F);~G87auw0oN=!B5OzZ@dhZgG#UEAVkprU zGR0c$cnliyBogX+MNL*JVh-YA-_ZTl2fI94%up<*PJfu#6hm|D$vlX8W@wc}$rt12>Qi<%Vc?f!TuYk9+-A3EYqOiLz2o1j#-J-IK0^gwc>W4P z)H4&7i=v|cD~n6>Hx5e~Mda!X z_%_SF{Bd08?=s?+h<|A>0pt`*O z_IY_>;C6IcHZy+coFfBNvLYOQOWW^Qt@Az2a_dctw!=nrb#-O3nkVP>xZKFSn-Tm1 zG*0u__#FCp0>!a!fcOsYW$h9MfLB@H*KxX&46d7S5X;;}2xUBgWZ(IK>hJU1r|UU* z17(yc{AJzLzDZ|M!ydP<5*>ZyF&=pwx;9xEhCy9|W~EL_pnJLlB#Rp*4^S?EZSL>G zO?OP;1v}LE%H2-)dxA)LL|yY6Vjd>qg`<9r@bPk5cPAi?Y7&uwA^QQIJ>~8CgyeYW z5g<|Cmk1F?0wrcTXgZrkjlpFJ@E?1bw6!uWS8C#OMIYKo8L7PJrc97El26wsY{H4> z7qdh|C#1ju+gw{4U(EY5t^#(rK{P$;I_=cMFjrKB(UwKe?tR;{Z$fm_fJ5bVMm1HH zmxz>>B;dRvQONS37X4&ehYr{3w!x-reQNNPLQelS_5N89j@Stz8)E- zjysA99^FAFNH(=Bm`k*(iHIX9LA)a)LJ#99=FpTi(c@P(Z32tEMx`d4)6$Fpa$)uC zWUz;Uhgc()^p=&hq}3abAv9I5#{a@c+eWsuvESQUP~3&#+*VM#cOo$HFr)s%qudcheMQC{}ENdM& zXDn7JSI)qN9I387Bp5I(A z>RjXXUtC!JS|VZU%hSdBC`Hfj#(hV*03XWl;vx`*e+K1G4kc0iloLG4*bi`h(|aP~ z=3+~zBseOiYDS;T2*twAC9-&Hj!IywnR<1ej zjmvhic|{(N)>i@&hHu>tm*j0PuKLhx3mmM>n8VPTdhc{aO3vjnP5onk#0n^4s8FXq z&rEDhSG-M`Fc~xzvZGaCBISz=job0|%C3^2Wj)?iWq=Rag4c`(3o#ct^oPQQz1$rU z0w%#8#99DZMM&9_zcodRDUwE^SZHW@kT`D8DckV0g}}y7@G*RY)WCCfhVD!8N;y58 zUInsLXbh_{W?5PKOM`?p?AFJ>>$EmBJ4EjGDYw{d1q-stsL^LEC!v8z&g{had89

S$AnaQqXMdB zHxKv@amlxP&W|B#sNCW{?dA|A4~lZpY`z?sZdQ?TCdQe!YN3 zM+;-JgTRRSTcJZuc>4JX*pCzZd`<;z^nTii_d7Sy1-VQ<=z-lMKp#^U++m4`irR`! ze;_bZG?SFB$#Fod4hss20h+0Nrx z1P>#`(I=MXj;q#MU1SPmumF~))sAAG&MB?lw@A? zN>a?3e(JX!GuLijA^YC_KL9F0)xN!#Q3y2Jwa#eDRG5bU3_?njH4QQ&V~KV`WF#$> zOduSWNCmh;gZ6NAiaSh&SjvQYr8_Y$C<6w(^9n2rJ!{so8- zEhGXL6%`pN?nG-rq(X#98Bn1T$*em@{tH0K&~D6Tm|oHY+_(5SioQ=OlQOMrWjAa) zheiu4J1hueCqW}=fJPI9ici1wja+c_fehyhhMR8j6;^Z>KMYy2rPpY}t5^;>dgT#- zz#zp{ENv?xEGO2ZqoZA;qoZGnAL>n;z>)K2A%#b%G4t}c&y%#XD-xn{f7^*IhHR(7 zU_6MaoWi9p>rt1jVorMpXU?Bb7>yxChJqh3To~i=l`C1bc^eC7&g5tJ-p7MWS1~j+ zY_V`2fixmSB?ReMJrPByHSJAJROf0bmBtWQHAbxoe9fe`1{_OaRYKw@qZyTUJg&O* z?VNS&u`F7)5|7ASghXZpqBT(%@ZJ*-@~Jtg)uGGzJG>BVbe~SHNm{@ zyea5>3AXnd8EqB8{MpFS0M*wowAT882OgO7g)e;Jtj~PrGq>*T0PHrfJnSFPQkTiaUovK7n9 za9lvv*NCbGbEw&WAGD+CUA!Fi^qK_SY~?=2tuLKep$aMN{7guRbX-KrMWj99cqyE0 z8Yh)Tq&;LRg>cQh57)s-r%;YWg&|?F1fdZQ4NE>ch|oo!u;inH5Q;?u9twR^?uC&- z{gemP5|9J^eLVQUeHzg9_4O=Ru;8wzo_gxj)22=HKli!MZMg8l3-bVHocRWBzwOVj z+w~hA9lgGxvFXCW{=Q?h*06Pu>wo+Q4xKZHcN}{Pqopylh%Hhh8~6oEL`Gc4&TzG3 zHa;apBIECoB8W=hW=ueJO*JeMo&V5O{uteQEg>RAY7Z&Fkq)5_NJ&Gb6OKezj1Yvh z!-BYlElo>VY7bOIAsV0<#lZCdRbjqAWjF<|RJKXf%)0i?1kqZY5w zf)WC)qOuP_P{wWS+_^(++_Wj_b<8_tU#7NoptWO}6?PV$I3m839Wm}4cON^5@z0IF z4#SWj3JD?~*KtU>F0J*AoO9^@TyW$eNV2@~pd;xW?&h;M{+6wML#*rRVf)tY6jf+O zMM9&6B;^Q#AmHRf4#!1OaD-Lw6*$tv4@YUKZ=$ufj=texq!NUL%$hWrkH6(2_M0`6 zvHU3Y*)-{tOW?ai7{|Vj`bMt);J+|`>I_E43Ji~qA*E}jgDpibss0WBK`9FcjATMP zHEBX6WTjK;yU z;1M7C29rcX9W)CbUjid}fk1!eGoQKT&_fTcTeN7=@ChfJ#Qpc*yEg&Yd;H^$6Hh#m zpZw%UTzB2K4w%$2;k{uPzAve;XHSLGj)0mfbjc@?mXQ)YIE3!)Pj;5>o}HqygDacr zNzIu?)w~&`>uYfQke-zrh!(E`ztWY|YzuYc@T5Gslo|rHtT>*0!Z;Z+b6w4Ff_uw^nFeTfyo8g0Mv7`%nrHV|nyg9!B$K zo;R9@d@&Yk5g-^G9Mlg#{P3y3sXaYC{KtR%$M1k=PdokWw%c#}^XrBn{LB|W%NMTt zJO>|o;I|*T?~!9lenC^p3)XGrBj5aQrge33b>WXZ(!`|blF^L3~~s&iQ`d&9|`f5K6OQD}S(v@Flp!K50FV8!NLBcpz+OnA)y9U^~tDnBXLF#I1 zIBfoWB2`M9ps`&ir8SvMidmB^1s3Ygvsf+`M&xOaA!LDIY zfw2}|Fbkeu4t^j6f{hzDt-bi-e>wISzxe5@y&ZtP$3N_tIddlW-FF`sTyVjAuf6t~ zs|N-KT9TIik^7^LSzy|Ret?#yZ6$<4I|9~i1m7` zw`|3KU{Qh_aI-nw`f9RWEqD!eq-tw$YqB_=XL#FECV|~p#H)nYts?_0i}%e~|6WDP z?z`G@p@pTuSu+t`Hk46zztvW*ReB!EO`)q4x}n}yciObCOTI|}hDTvrH)4A)m8`m5 zyLPc_*RBg^&z^mu*80TP^BR8Ps?T%K!3T5q9e4kswzhsj$uBGcv=|%}15YpGec$*# zw|wqXbToD1hdxqA2qcl!L5thd+L084VT4xXQaM8HAW4A?5keA%B|Mo)W~WM92DS~f z(s2-xnahUwxMV7hb^J36qIbfD~RCNf1}CI<}`#XerS;&l4+O;E#_!LUkr*Gy!bV5hon_rTuuY z=x|3keEDDB$)R(m5CkECQl{Gxw|(t1B;dL(Yj$>{{Lt)_%BU@(Vl_Mc@*@CYAFmTL zdiyJFhyn4@+06d4rywwF45=Ke{r~q*#9pGE@RCj6pz^g=L=tdZr1Wr*L_!gk3TP+I zSgA-|Cc_B}=5xrLHl%P+L55-}WYvz9Py$lGk^Aq_Ii5?j>jFH+Jm^lenY(S%RUteGA9k<_lAh0(9 z*n7P8$LBux89w*9FR*s)TISB3d)&SE-ur`rfdLa9T}N=@A*jO^K(S;v+&Crx3(R64 z9YZXCF;QBxc{9$!Ii!wUh*O=#2_uv;bKKGHe*9ptXK$r5B!%QsTNU3l}cD{^_Tm{^07>t6%r)`OMQ#128;1xb(Es z&)jt99k)#eG~0HG<##{HN4tK;&;IRSNy(h0bSZ>z62O?2hI{Tf9?!3T9;INPNfW8g zR-+>iN2Dl)Bc#*SK!_tf{RBnELn9{iGzz!l1Pg?i>gqP*#~RQm}4k zAJTPEiE&b_UKqVf6Tphz3lNb)+o-?$Q$%YW2Tq-euca|8QWml)Ut);&8YKb}B~{WU zml`~bCxp@^l=RR-;)xWl0$*x$SU?97FI7#H64bg5b0@apIUV@Qj4NCr2nZ0$#lgYR zf*^`G{-FIheBM6P*Hz=nYO+q95tRx{2qb9-(ym8Cb&hX-;sfkAWj;Ze!V#eX;#=Q_ zP#H{x(qD9!S;ukKp$kyTB&XVuX6+gVGc%g&IAovc z{OPgh(2i5KzQ$lW5^SO8!20dzmIi1rehs?13UR=6ShNyR&}bFH)DGwyMC|MnVHoIv zp`jZx+1!K0!q~P?UwJuSzWSQI3Bcate}0^Q{`q|Fb6+qQRLY~aY}xX_=;){dq^?TC z@rS{|`#>RYTErIGszqSF7Xq<<3%c95m5EduJ*@-h@P#-XZQ%PzKOzKD+Ci%jFPo<0 z>|<~+$+%1N`0CHArz)ERmw zRRm^pR^{zp3lf=JEnMMg$P*fli7s*PJ%ylNdw)~sh|-!7EUI-ZitfxnQ#TD z0MNzjPokobB^$PL)WZ3Meq=;|Y{ee?EGVJz6!<~Jh8??zT*u;M5_!K@iM%B0e<-T~ z5basJp{=u-NsTRpp*6#`YItTn?^ysz2r>RM+C#J8<+K$9(#-K~cSVEI>{l8{8BnS8 zkVt%~4ewro>t;+rfF=+=VdSImNDFg+8ZLrs_7dqJgo7f&lY(?j21$yXTZa}3ge1_R zY1s?GjENKY*qblpplJ)p`w|F^GNp)}9W@$hbd_vg6(~&r1V;Ja-sjqm^x~U5G?143 z2yHvG2b7a??#W zam5v%UhvBse*MlZn>K$e4*oRP!)b@X%&AcH?L5)UJFO@=I1ajh2%cVQmczWsFn=aY zYC{VLStwc^bCJwG1(Hmz8le@s7$oBJLI`AJDtv|I8duIFwV|7t_M>U*npkdVMTyNV z(xA@chHkv!DWl|OG;7L2AaSB@9Beg880D`>i*h9-F&yW?Vf32Kuw}dHhQv35>xijS zr#?An&YX|la?34Gc64;GW5Zsx1s`31Rb zhR0|58 z9(MNjv!kz{e6c_jDbk)pbvA44;|Wm;92_DvI|lmc9T*^&uCrPKWv5+X*Fq2#i5TVC zb!+(k?YAPO#EmEiKW&ANRHauynft9O!e6Krn|pe3UDx6vV!ca|py?$Ngr*clZ0+eo zXFU>u{|YDMS1SGu6vmv4@FUX++r!hQPM=81NfQQkxMdj~F$GZT@qGhfXW-HXPp}EF zj?HpKWeSue1F={W7#w5FgExnhP(L*i*QP?!3O*@mlW1kfJj$r}2_a(10FZ)6X{509 z)7Y>|YaBA@%g4kwOV4!2%ohNj?ZUe*RSEO`F8?Yc`?AWmbfDe7(!+huZZ~w1eZ}?)YsrN)R3;pQB|GA&1OjFveed9F1+gvhgY+Xg=NlkYK>FOqd#gtmc17}Ypy0&C4-NEF@T6%r>EQb_vxhX{hu&=i%0 zlp_+nozNhp!@%GWgQEq=lq>Rb8|l?D0AZLX8VCXlV0|ezVMbRcDVe1tN+=|bj?-tA zup3Yoq^p&QLrGUnC-<1P$%zu8>^E!=r43b7CJ9rlwXeq|EV1@}EX5m-L_}=LW0MPI zu{%=RgvB!FoVd#(BBLu|`Ttd^I;8LnE5h>jl@7665;awIXjRc_uNeP0I5gDOQB;bI zlK5ysE6^7uz8LZB-(q}Tk_;G$=$jsVipQ3&=KCLiH^(fT&CuAGd7nZcg+?h&rYgf_ zXB@$0%hy7>+*%RI+KLRARsxO#D>p$+7Co^AN+CLkAl3+2u@N0c&{PA{C&0Qb0DAkj zo&S2~nP-gNcH8Zr+}i=zd;HDE3CA7J{SQ9CkAC_?aoM{sbDwzfna#t)1LaQp)K0|t zCqX6+fif*WJHJ#ivYVbnI}$ebz^uv0852=qXl|U)ZqzoghK|{QN>Za7fp!Fu75va; z4_W)?y;na0rEwHEk;V%nQh_#REJ29pD`aH;u492bTG)**u5UDDfsP90FB#7`6@*fN z_CQ9kX$ve~3Hh<|ZkLP<%x3NTzP{zQTNmCk;nsf7^O!MX*616~KIiPOeD#`#&OGx> z_qN+^ONiWOoN*er-+t%ocD;v&jVV*97!7{l10TBj`s=@QC4dY9{O4BlpFjCE?M+p@ z|KzjChaRDb5-DFHpr*ct=8i_zF56%>|4^ex^DvT!tvx6N`IJMxDuc*Yp)+YS=k%=F zO3cqw3a70B-PS}FL6zl%ds5>#4vx?`!br0TA(BeW2={2pV{{X)g%p&E0ZTS);F$du zCL%kI9rd6Uz8+@hu5SMId*7t5Z-}Z)7RM%`A{PA-!Z`fJ;8pEdLP6p(Wbk_kgcOXF zO88-5>3&g#gt4t~F`_iRBYB1kMX0Vx0FERMhOan$H;<1@yIb#34_<>SX{l{639B;k zMCl?@q!Bj2Il_SJbev{eilPw0KnyGuQ`&?_Xb_HJam2FDS_?~yHwuV4mU0$?P=*L? zJ9W|k=*pb~Y!YtMD`7;Hl zcS}9gRYO$fN(l$MGBqJlE6#Np7bY9YCuaE;^TmLY_#ge%vsHm33 zD|i9Kg{;t~10aP_hpTAemsgsmwYiy?dTB0b%5*h^bfLZL+Y?>N%6iNJXLf)Ea&4w=~2L^hiv9|ibY;9CX|vDSpr z;{~VUMW^C%nEA|wQsBAx`8@yfwV%>EIE?4IR&CL-qEr#Nbc#z(Il{CVDqd4mf-QtL zLK{*-7^0tEgDw@3!a++ro;+YCG}IUkqD&g5cYu^gl=eLDO|$3D`RpT)KlZ;WK(@C7 z@PFv|)F&?ID_^~aH^1}Z%u^3P`ta5*TjnG#p(zheJOq8{zQ{;#nxRbuW-0 zL$qT+JIDx~b1c_c8xxFp;j4JosFLj>_<gK_`D?_ zkuR8Pcz6^>MqxM)g)%mvP{{M-lTT_P#Nw@6w({>E|KuO0PM)&$%FlfI=kIyXd!Ktf zum2B!_jE`QSnpi-zvS^86o z8S|#&rai(^faf_JckGEoQN)@xYuNhN$}9_Dw1ny(C2Xn1v74+xtyif2+0l(v6|id} zW^>r-urgy8&r7j>%XW4R_EFnj2U?(23FVCP;IoVP#_xW|)}CJK(>lrJ+@ z%9XjcEh1C33yT9NmzYY*L|;E1GHb08lNm!P&}`}*pkzg;5=q}gHsWP~fMq}AGVm{7 z82^CybIPQsNm*5GEll7?BD5kBAn@^05q{tks(`_Kfq{J9j4y0OuWXw>n@N*Pr^#kA zRCz9ulsLl0Rp3YurA=ZGM3w<0oMdcb@H4TRQbji;0awa#9f3%PcGj;5!Xl9u;ozci ziIh(%%qROo%FS8af-OL70$|uV0x2A%aIFYcWfR4`yTFf_-PJ~2eH{bcyTH}uWFck% z>4=JXj}>Cn<&WA{@ET=wF)|stcl7X^`xo({H=alknM5a&3aJJ8F`qXaGN0>jdyrj& zqu{#it}a0o*%^fkt_MRS@cahU!E?&{UD|^~=OP|lV(5XLO|WwpYDb??fzM$7z~_!W z;>a%?eBePmz4)2E3Bcat<&V=(J(aI~^%{Qjs~Z=-k+^pD8q-*$V_N@?L@2}mH#cQPUpxl9#HFIB^wv~+*ztA)KP8!Rg%C+a)mi>~ zyT6K^`D>Y2&1#|0jzcNyP|AA7IyTa{c^_{qAT{bEOQz)*Ii^i3lmQ}YZGdJ3ei_IE zCTsURNO|b$9JFFvh>-yX4v)glUC`YRqXn}+YE5@+VSiEyx#%7O&u%Z{NtS zkx{O>_#&jJLE+#Dm_Bm~u4fW}zz=xC8{WX%-u5;|^J6Ssx|9!o;Dc=4vW@f4KaVgB z*|cdBN-27Fb`zoK?dc^bl~5`o>g&gAt~Fy>?CX+VcQDwSKF?!uex>^PcAgo)Vit+q$ zGGKKIVk9|ABws77to*Ma(%JySZ1CCAJ7_j~uVUtJ-LqfS64)lL8pb7*iOIKYzt+_N!^|jQbQ^-((aBWf`6Xi!oxJcgP1aQ$!Z zLe$okixE|U$E>7&L^k=d)YK#)OBP;)ay_12x0N7L2Fnm9hgzc~G}Tsd_CfRc>0OT- zb0o%hvH;UH^RUi<4s7j(l#6rFY-0l)MNpkZA2AmmcpjnvF=q<8cM!rzcXxM-1NT2* z`_qe`>Db!=*n8~pc>ksE<-dOPL+-fiF3vjR%tdc`+glC+p_Q_wc}oMl`6TFQGU7H$ z8rxGTY&B!%p4y8O`M8~_jHrdO!B)fuBT*uEYQERw3jG*NSnhRN$=JBH9Cruw9_FNp zXbj^jsN}UP96Xb1L_5i2%?#O8NWH{bjZTNh`Yb(X&CuDhq4b=Fy9x88bdl>rF^y7a_y z@!ioeiiHwic-Q&VI4vMNX3UsEwmM63v;b(HdFB}|x#SY+>+7kluA#G|gAMD~vuxQC zzVn^yIp&yS>`VHjycA#l(lvbMs;kVVHaun!-AW^*rCP=)bR8K$CfaleV&h&W6Btlz~;SO9K{ zy4qTlitJ})WR(m45CbFKyyKdmv-sH+CeryK1j7*VQ3M_)$>>6+j#%Q_q~)^CXIp!FUkkCA9081n-zIr%7lbmt@Z#Q;1D z{nt8imP|U5N~5EQy6S31iv=QO+VnyzyDe!D9_Rof-vCV$1E?rrIk>K1{0tUb;>IEPn3U_V|21 z{i!SX@>jmJHv!mtz`Ni5ZvOkf|C|5%(GPjwdoJ1Mh8ur#<*j$zen@g>ONp324SnX3 zP?JR#e3X_}0A7P5z%}k%2_VWaX)Tb+0$D^%2-U*(Mj2-GR#Hf~dITC_lD5CNv!ISh6jwNfXwj5Tyt?lt&B|z*mUK26ZjVLN0bJ zvb*4s0ZqknpFx>=SYHdx^`?s3H2~Xtpl`^0Z;RPYTQ+m~r!HSVbM~y_3CAAyzKbuu zc;hdA@r#E6E;|20ZoKJtulf48?Y7%EpkPZRmDWF0^L z)^FI^H^|lRelxQ>yXb7JB{g*->@;RiPd)V%g+hUJI!#SYHIpYz<}vXoOO`C-*kh07 zoO90M@=ssEehc=SxJP!f}iUi&BD6L?&=p`kG8WPK}na`h%rW;h8#J zfsl$^I?LKETlwA}|IAJI-p|g#L2^}T6WonxMy zZNRH0$Qhuiu+qP#C!nQ3BH1}O!V8!n!frnn>RLCPgpT}^v^9c}fs%xte?dUF%g+UjYmtD~c#ij?b- zO*y#Ivw=J^NB}L9nYfAHPT~ToW4%rxiBL$Zpko{)HI8wmukIS?q^G`yq}Czq{%(etFMB+;GR^kWSlIkM}%{ z>nj$_m_o{PDaDfL5+bdPGo{izxqKr!P__e92{S0$S!?B(ajSOCe(N~~J0rBA2U_cD zCUwHD5%jt(Frfvu?SlS60Nv8k;`jFUre5#hAD4rBkAI@$eV1Ow;%A@Xx#ynaJKy=v z!E4s6xnkM!71#6+^dFvVJDCg|yC0lT$jmyWZErh{NdRO8XsL2;7SC*530@jf zDM+Uvn>ApSOcpX3`!5YC&$PLOV+2E#wn%PWhGSRy03|bi@$$oD@scS)#rI;*kKMhS z5T8rT`Sm2aDvhekqN~!jO&5Stc4l18B1GI49A`m0ZU|ZaZw%(D$w6C_>9$l?nct0- zl3qxEU!RxH=g%D)8hKYP=hc7tvsZ8a+BdJ;^`X2GJ3>iDfbe zHjj}>%U@B}iBO`fHBkscCU&&(<`WJzo)dNr$rxcTpr$I#SO0h)4?eTP%x$aFFU7S~ zVqSI^-H`%O2n?QNED!6qfKqs#$G-b6VB7X>ruwR`;<8IGrlF?F=+_7sEA^vA#LsTL zlNWw}uVHGa=+zg9QVFhw(E<#NK<@xzXD_0sA9@C0*AVoL*!NXHlmh%xiIIGfo%sSQ zxAw4T?N%OLzJUjpy~zDb*YeD|ZLHkBi{9Z8f*>U2y3|%>sL7el&{G0V%H<&&iAf|5e`Pp(+xp5EVx3J8c4)Y?>wOHd7iHG3Tq4 z0XvsUP$*H8%kt&R-pm2L_&b$2;E1k|i&^Zt+I!4Y~gu$Ki(`$rDdJ2Ecp%<&x|E zc=OF~9T^)=Yo+R=C@M$srg{_j=S%^@iVY}s>JmvCPge#qN18zIxsY-Yj)Qh88bCtq zVMtjSY;E%^QZP0K`I42_Ezd`jJfo5>^$$IC#VA4S1}L!a%a08Grf<|d)Dg-25v!Jm z5C%9Iw-sU(aZDdlmG}o``OU78cO4mljXMm}KqX{x;W{n~HF)M3XKuXZmRt4*IRC;6 zxaoJl|GUrj_c#5n@wUI*_T!)Z;^*hZKfCnO_wl12{Q#}CZ0%@C_x1GWm6;DoAq2WM zL(@?Q^OgU&n8%-A%TNF9+T`_qd*g4p@XZ$j@bh2(f=e&Cl+gFlyS1xDg?|G=z<#q} z`b0b(;s`-X2vP!Eq46xITAGjAZt4nYYD9x}k7I-eWodXK5%Z7GR@yj3<63uv@emU^ zZX^`9^5bh4+1gZD)`=3<2olZUSc$_I&f(WrT*g=-Ff=z23+zB`RhH-0Z{eiReV5jz zTEfY#^hXinKa{drRf3nPyw?CZP(bY*gq|LF@M+M{-rmmXXP&`NfAZf31K8TYGmGzG zMn@Y#sE7#YAKL*a&U@3xdH%ttlfP44lcS}vm2@_X<3N6_h!m2Mv0=u>#uytL+r!QA zayOtrIOg-x?G3aZcOY**?Rd8L4zO}ZAH9Pkge9L$Dvj%eI3k4<5}`v{>T8(X(#X8d zW)7M=ovCegwASa4!lmH*s7Mj%cuZgtGo>}2n<4AuNPE=?QVjb$DTG7Rcx`08>V(=@ znHU1({b35xfOY3{@EpOWoxMD=bR7>aS;N|GJroKBa@jP;>^qZ-PC9})6WWNB!gD2C zcJ}d>Ykt6n)!Pucw7Ep11-|;JcXR2fM=_Ys0}?3=1yyTJHl5Z|3anzzW4EiAN&A-PkiFz-dDf+pZf5_kG$ilr=C3NCqMmh#V!-~ zYJ_0=B*bwCpeMGPz@>%ptgt~$>#|&>wzEId9%M|rPe?bBw$!4s%B=+a?O_{9I{v~W z5)HMG3t%u0em)UkO|-Jr>zH09_=Jk;BLN!;NK5qOW@xQL?;M1|F(V^v0Zm#+L=@T~ z#>>g4YU`XAi_HQmH1VLi26;d|dfF)Z#qF@8M-WEFWe!ny%PqI;=en*w_f6;B@cZBX z?j7-Ke(_6JbJZ1B{!OR))1UtGwtMfs>o9=XvuCq<^=f|fqaVaUS~-qWP)dpV`UX8X zIEdC-Gh7mV_b%eSef@OoGaZ`i5W9xZz-@Qlo+JSK?lTY9aR`zaYd0~i#&N4fdlPzM zvyp$bR4`-9YQR*H+40Sc*Y1<1A~$nu$Lg-fdH_02()&QGD2zRrL*%G zL>kKgQ}%{eb}p^0KD?RhTV@CnUqMTKEuQD0#!AGq3N19kaZzEwfBgDZT;J!7haJd+ z`9b=34OC3TDiz^gVOfR-sHY2ska#g(h*aMi{R72m`80)%sv21fMPp{g_x*db`kB$=R2-lHp?;mAL?;sB@TSs)~ zqqNslGo!PWh0`W**qo_!HrCKolSQ}=INNb)Vo1Ke>g! zJoPLR!6)8#0hgY641>c%XyM^nKLLfp5t6hk`Tb)rB*||%AsHuDU_go}Xsd%4)|>C= zP6TC{0j`84YY>GzV*lC3*sQS@ao}w9;#Dxc%c!u1N^jk~b>g?b{jG(->zV-U?Ew5Q z9uGe7P~-V;KJSS3*7h?uZrpU)=;-M9%v}nTf##}VT00y(*R-Icz*gHbQ85EE?-wc8 zNLZ#lgyW%QMRlU}%UpInzTN&Zbwo@(!cw`k)-W&xMc;}Isq#2LypA1!3e9(+Z6cy} zb5oIa);Lmt-eH3iz=)ERGknH>R!IjS797zP=s{IhhttBO(o&cNV@t1L5fqB!-tE+B zQ#VI}|Jlu3w*3rX)|}a_S@r5hL!bQQC%N|8YpJctJvclvcI@GYA9mOiPdvHkyKMk9Ttcs0gI==6cKHtHy6djv@WT%` zpNZ%4)_q^k{;S>Ktt}2a-B;`3cR*#`~c!V|E zcCmCzH!p11!nVE<28Ifhg23twKoA(IV^?Te>T8+a)xy4$TbVntgGnv*wA9s*%@|N& z6a|ElvI(Fh>(x?~YAE{}?A8Go3;QV*$1I&QKspAX8Fy?XWicen{{ty;l))ch4TrMX z3_JStpjz|eX1RagA-%O~@nuYk_v#@Iro?m133edA>&lY`!LGO@#4hnC-^R~Sm zfd9W8mtFQ=zW@Cn0&v=Cr+xIoi!QiuWO($jT|LVyL#-f_HexkxjnLj?zHY8Z)K*#k zY`puKszql!BX^tf(5{oT-gG>tN@m}?Rrz|iIeTRyP$?6dGzvuWceSmAL|qO-g%171 z3to%YF|Uj(L8-?<91OUzVs5J<6LMNIKK5ScKdixI`NA)lrzRx z2BA$BYI3ko4kou5TF}PrW>$&NFK&2oQYw}DX*!cWWuN);AAIha#XtOOPVw4nuSIK( zmr7*;y?Vvkp8<1EIN=2DzyJPmk6o}}0e`vW)*b))p${B?+bxBIw`|<@P309EZu!;|zYRM|=|eMY2b0 zZT#XRD+m;6O(X;p+l={6Id&UVdf!N%AK&>X>2!vfbEojfHJc1TPgG91v zG&p`lsI{5L+oPqWg&EVPC-;;JLV9<0)-q_@MD0Ix_kr6E7pGb5(dL$AT+0W2L|*YKrP?n!{#K z;?UWXDfkQN85-rqodZ0(ej7_RY-Rn90SYRj%5!iX$zZ<7lPlM=Xypdu@>i2(a!V7_ zI~&<=N*A-Iwlkrr#%S;RK7Kex#;vs`MeKH66;Tvg10gCD9c7Y4mRUtH4#XspQQU?U zic$prXr7v?ERoP=uAhJxBO>A8T54l9o#u|`7vm3(LQQ73DoDSyW{QAZ&J_AYP~7A2S-{_^+*C%=q7xjaGDh24=Rw#70vEhEX{eiWva$ zXQeB1E>Wg9CfEp3PDDcEFh?eBxx^R}=2jF0};pLuTm zHZop{P(_5QX#F9KHiXbv-w%jXXx5)L>Yg#NG}e_A+UWlarIQXIk(HkoA~8q;V=t~E zWpjy`E-H=mw7o;aDB!n`E;pHL5+36M$$qaZW}J@QA8TvMyXwG@G5;AJHa`n7^Z&6T zJiQX`Sp=JR8VYu8mCf58nX5SN*kfBdIy!Fq z+-JY=!=hiRk5uScIW(xrp%0h?Cmw`2_5e6+t_e;xDPlD|B7tx`sLerJ1GLm3GMVvW z7vpAU>;Yjf#-r?af1LfDh@Ewkq(D~=zHBVj#^j`T2z>v4XP7kZ+$;X={yi1KMxvtK zFEn&Ez`P0QhN?spKv!DPYQ`r)F)Bb;js$g?l9q^$C{Q7IDa8C4h@%!lQyoIaeFT|a z{Oq&d!G|1Ny7YbTecLy_{`K@Lo$A9+JenEKo4_zSI?7#l-PQDRkNwM^{+xV0JUX=T zqKn?L-}GrScGw$Um(K_8xZ^GpgrkVkNCl8gT3X$Vc0)0Xv=LPjDlw5UhC7N-DGr$& z@Rc(M_~a>h-gS71d7Tj@1;uit1RE1lL%IJ- z$?vo2>}#7dYfW{vX#-guL7M7oNx4Q9G>n}z$YvSQN~aNWvw;`nPWl8aR~6|2jQ52~YiSiBa-MoiaBRYG}gnynTS&kMjW{S7EVV`XaPqWS1F~9a$hC`jkV~u1|urrc(!6vuU(}*uGL?W zEW``FGLS}*QOoP=Gjh7INDC$#AFmwv&vsO*0GWziq*E}n112_^E=rsPXm)Gu>X%Z! zlD72jzmsMCf-r)*8aQk|ESO=ww*CWQ5b7WO;Dn+|^nk6})jD#ivdPXltq=6!rZ2*#>^TsFm{%f_ENW zVD1FTyom)aK6E|rJ@!TBP3Z$I2{9d3Khttkm8X-ya^CQa_3t}aIuS+_kcsL!VP!JUt>VZ(OnCb#mHQ;y)C z7dKh03Gp&Zxq?DkiLa4@R3S9?L9u9(V|z@RXe$4sk3KT_*`tpwviVq9k+WxTkUh^D zUW=Sr(9=`SFr-p6)z;ujfs6&0>8cl^O(6)`NBKT z;>RDoh>x6mGzZM>B9-ze`VoOLj3oz$hN=uh`2sgR{sNwpCJ6Hck;M^Vb^aA7LW9uJ zGD$ikZJa@4_>GK&m5(+*a4Kw!BWq(WEu~c3Wgn03%89!=4T&!AU#aj=SL{1G^C&#^O(mc6I@{yBW7EZ|GM|A|Mjv#Ep*BK@@9mfbm zp{Y)LJiBoR|8@IAi27>2bpFZsVZ>vbcN%KfE5=~G+j2LrnJI?GdN*INUI~KQx>~wA zI{`T1gcFiiSiE=%gJb=;o|i12fqaGNkNih$(PiyjM@SlSSu=4T*GLqW0aAf=i90_c zkpQy1c|jN{MoUG;iY1!sYIyTe`*Y1Z&fvPs&gJ5h4yLU>$56gNAqY`IQd?EcZy#99 z`t9AguA~qS+gnrE_vH{NpGYW#R90eIlFg*3%Vnv}rK!$l$fjLf$0D8*`XLr5C=;5r z5+)fCjdARBV||@b0 z7FfR(`uoiHu4_6wQXsM!C?(TTR-{ zGFnRUt7keGC_)q}M#F&6i9O(@QUA05R7I7q?Ht}X*;zL`Ey~>jYnU5ik^$e*#yO72 z1pi1Hs zTTNt>Cv#62Ukt5n+kCg6nfNPMlhx*0}*5SfV*Ebx)16$s51mD%;U7*Oq>zC|KFr9>)wUJ8I!rWwgLYuLeCIdY2LVhhG`91 zMgl?3lf2NUIb*)$z{!v=Ii%c(NV$k8jq63M?yl#?Cp*|VlqMxLoz1n(p4iDl&n+{0 z?XiN~Zc2gW%O}v0xgAupfr>KV&$f9(A&9JIeMm$YIYiBM95a6^hqkq#B84Xe=~Rka z7q8~gXI3$BQY%-VdmP(Ghq!(Hi$)<+=vTkLwDrfZ_h?lF6%l(8WWG&m(iRXWAHPd$jUkJy*rKlD5|J^BK@gTp+w{6*e&?7=t!g0Mg; zm5!VBgrN^O)Ocy`d~OAwyWviHhes)t0+bMVLXb*(#JEfrIUrzyO=ehl^Gqa zWL=4HtX4%78UU%Pq;%>;LDG|&=hkhbdnj+g1Fy6fRqnk8w5lBenUtaaYOQ9?ocYBl ziu#rT5wgpuC5ZQInJ{P-s`fz^8xfPdnn zp{ap^z5$Lq=GgZydgiIO-1?_KFSP7@i6fz<0j5oW$?eeIfNrTnL=n1V?0CthP1Tu7 zm(|vk+GE1`()jpywA=M=?dl3iToG5oHUZK30*n^WVUS1-#FQKJ(1@~{wAw?LLW~E| z>D^pfUQ(U^gIgQAg6>!O-l*_Pu>54A2%2k6HN2r4MvC@S_4tl&oJ@>M(loR-!O?Yy zwcF8Kc9@N!P&AUPN&i)vO{1m?sys1u%Jj$P&6*wD@S9(A?Qx&n50&N*lCm%rTlSA7gCm#^S$?|3`cf9Ja&1wOiB`HH7DZ`pdV zHJE~0n~2tA4FwRZEE#E-+5tg?7|3(#e1}pba2!eK!1T6=1(P!PD0JGv^$of`la@TW zDaBWA^YA>#xtig8ku&Bl;NlaH=7|;S2!g=i{B1y&mIfy6ydOK07L^sKHUdOS7@(i& z0+=flMVe4J=D)crnr5`~iNg;e?YfMHro!$o7WuE+A0`X~Ef658#>Pe(8yWyjDwX2I6Hnmw+iwTpw%hJzN6%Kgnlzdc zZYq`hiIK74*Zel9%H}BfMWQGmD*5#H58(>q)tIn*_K<)jRdf71Y27w4V8KY4B*4)c z?HB_d2Z@pzO~l}cCgZtWcGeM`dC(kgdh~hjdVVb%x_2?VvjsoQllAJXte8US5YH9t z8XD$PKm7~610|YkJ-Qm|sj2eFWvi%4d$_K|S0QV=ck$HvEeIi~&8C^q(!lJlR_0G? zXIe)q6Pjx9q=z3y_)%cl9X5$~;o+rgQGxk7;r;J138*NZgw@DUj$!_oq*UH@*KNmd z-PV2V8E2ebyKLDDS8v|D+5Bq7M!{GC=1xoYM8jH+(2aG_Py@Y#A_xL%Yid6-Z_Yk< zKJf5^;obz`pX@mQ{PVf#rkfb(8=$ed>5dncyl`5<_+8(^-HULA$AMg>TeI4i4;JEce+(J)6#N)@VRW@ zcIX#x0f@rzyUBAh8Ix4L*n`kYu3fuU|I5Ez{N+L&td~H{6 z@9&bNq_NI)E2`2q>bgcSNo(`_$?a6hEp%0+X&30)7VAW#nT z+Fj;$MJ(G9k#YpS(#)AWiT!6xX2FapJh5yot}82?Ar%6LP^)s_kC&dkhRV_eBdhus zS}S0s9DEU>wL&RH{mf3jf7S`?-`YSv2oONZk=(v`6;Cc*!|{jA0w7^whz4h;;x=C?sdM;qNeI~g4f2m+rwpIpk>NA6ErDnc#GG}vTH zrpE>U_?%29%t;c0`1g@5B!no-I2%DHNf3n$k0=`IYk2=zM>BO&8*8@rGOw$RFbauu zfRx7eTWiRAX>MA+jQ*g=SKoam6Wi)&sjHiTcH$)#B@lr ztA8*6xc&B9zI6VD7cNPsGhbc1cFi0>v#DE93eXE@8;p>S%>EY%m^l&IJBR|kdGn@| z)~#O`?!Rz9@!Si~|3e0=docii=W)|bH}SsrzVBW2jSWNneSN153=SrtL{6E2IAlJ0 z&NSF>225%;W+qxfZH<}lSLY0}8ogVlE%p#icl&xAKmTv7f=!~4u>0bq!j(qbzkdMw zhY_|SE6=ud#fni@ct=$z{)w`rur?fS%X=~3$AMRAJJ*b#AB)7u*8$rg_Dp?zSJ@w@;efepC zlukP-ovx1`yR&;o691YfHdE8y3Jui>G4nUS`Q32OoAq>y-`2yOw-8zv=35h6r5A<_{jCCRw(p2Gq%o}dr{ zj?2`x7OGQCyz!_5DJe~0XZV5E1X>X&Nno)6fdv8j8Uh3XP!JI%0fB&g6fokK81n-P zVUZ|bLX8zU>bQfr<6Y-*l^HF1qM^hArAZ2m*fn`#&)< zn#a-5N2_Tdr2PS|X$vSM`to$2eR- z^0=4$hwwdn}h21yu&?9Enh)@-+;xvSV^i^+K)tqc$(Er(N!rchNdYM%(Z{p+uz1b zzx&-SpZV-(kEpM&e;~Q_clN_GD$N8*g_STC2%NIXhEV^UIX4Kzl<% zV#uVkho64>nOEI<>tFun(>w0C6K2)c*8VnWXisQG)>J`*6*du3Mb}6tD#&9_mMw)e zS(FiRkpf3YNLfHTAyOJZm#L04e&jKsL9nnZq7*8$=P;?Y86S@`4n2rz6WbXs6)7Mn z0b%4(BEq*6K3_|GB?z>{*WfFS3RoTf5mlRy1o>M+V{cs`rv(2yt4I zD@6z*;|*W(p4@nN+`ml127&0NWu+D4L4=6x zT_yxtM`#@qsnD`UG*J|ybc9lxFx2?PBGuJt&N^@ww|)AZ{NeJ8nbpzGr9b!;2mZ&m z`N+@j;Fk}-0FH~UkPz4Uuh<+C<1t~zxzg+l>1?J>Yn}bo4Zq^@%P;30Z-3js;Naj1 zu5=!-_zErhhG5ZhWU*w~9vT@*qZDXg{`n;@xcA@vQ0?9X;D7nZWOFQ9w1^W=Jn_t1 zZoB1<;o+e_O>qk2QhOZ%+1;AMx>z|3}?ldrtG` z%@zPVdv^SKczD=c_FNTAX-Cy&ja?~~eh$iFLmcabrdU1ZAss;^1d#%zvV?vuQIsRn zo)O?Na(oCo)1A>;0u+%JwADAFLrr6@p7)$_B&8DgktR@36vCkRBk&`EuQ1;$MW9S4 zU`%R44PjVhzZny_#hO5`iFaI zpV-dZjys5A6cFl=`!{Se*1Ot(I>%Z5?%_5PRyk8iO-e;%OUn8WXu?9lSW(+gFxm~* zvpbY07#!xR@BWmfYqye3rwt9*9)JAfA18hP``>>}*765G_yOMk{ts^1xpU{U$#&2` zL~s8fQkt2#R7Pr7+A2RDQO0b5vi_E+NC6G!GP=5usN{|0WAS~_IoOexi&B9CH``$MI zTyxDeX5KCx5vu5fbUOVr&vQ(JZD?!~5!BT~ZFM3U@Tto`{u~%f@VyDZ z|H5&>o6e_L7$cjjIqjKe7XNw43rh~MkxWu;klf6lf}S-2J-rKRtI^r4;qcd1qdnK4 z<+Tys5EVc)p~ZMk`Rh>93Ly=ZZ*TpPw=Ku}6H zGS8J%r&8q7Y0{o+pAXtEnVINl0g3@SjEp)~rJ2z`X$wHdiA(GsKe-hqv>2^`I1zGW zxoV3Al#-1?*h*g+F%Z{9%$W)Y&o(zYh$xEm$msCdi=KS)YYh!`zX163l~({z^vjjv z!0;GhP~szRdo#5&rzVryp`oGEzW$$It2y!HlV0_V-gNHyEL*->A9%pNzg@Lr<$(yH zH4^4d1}_C&jrKiPoQH7C*h56gSoHSZG(m((`c#S_Oyh^OL_v-y$f84Oq+EnVD@C9} za-K;H8)|Audufz#C#~#SE_6A%DYX^sTVn??* z&t!yCfe+aumd08`D?v>mz>SOxr4)i_c+@D^S%7Im6>M*W*^|-x&9oBHWiYDh-o>|W zdDtXcnX)kCjW^!-i`Qy3fA_oBqqWX9)Hh5>7O3aaT`ZuK(FG7Hvg0W+UQBcx8$j5- z#Ii)RvK)Mq+zX*zl0`d&N&7$xO{6vHlt)v>WyzKvQkD`gg(L`zXdSVwZ-iaLqs(k; zAylF5G@6832#u1;j?r|5Gh|$FSm~4mk7Terr66E1U!=3Sj!&I;9JTe;;EM9NLbw%j zKH}x0f1(y@yMdl-ib2qU?|Z9Pt!k}&R;VJK$z&)Ni~rKp)byX}blPMZV|jRXEwX12 z;YkBP?JNs@KKsIR0DSq&Uw+MZx4j_1S2^a*o5%0}a1*DVa%%5gci+`iNJ66!bT%0@ zXLS|K=z#iaqo7t>gHER{ntyz2UuoA?!dS%p9x}>Gpx^G_S3=Oo(E=Gy<=dSiSV6y2I$~BwEAtxbnATX&#Oe&WREEY}hAJVcaviev zad{mvR4k#D%W%P`r&wUy=m_fuMp&_HfGxu#j1@u%eek4FIIO(Mv=~nh+#M?MO8J8L zd*>-H!~3<@Kx%=K8YZ`x&v3M0=w5z^Xvl%tc-Z5eFJLc^>?}U5rxcz~Ymm-g$hJ_L2{Sv1yJb-iF`6h1o#Frs5 z^1z23arl<|?z#6BPx{|J_7T2$-M4t>+u!x|8~^az3nXZ*wa{Hn$i_NUdxHU}hI$+= z4DEvS&^VwXYBN4Fsscs>NV~=vEp$^j!his^0u?E=f-v$4D3Q?t+Xf_rP?Z*>gv8OB zK)cjdHS+$mj^;nU_Zz}gnliXl?IyHilf_E>sg9`2d8QgiBb2d@MG1s8hbj1DWKu2< ztz6G-4?jm|XFHdka1fDF)Ojg>vtoluYO^U*(J2ot!iu%G+x><}46)KBP5qccNr8w2 zK~#dV!nn7stE-F~Ttl6aAl3>o8Fbo%)tixkQkpxSUJO3QRBC7hK(Ab}y8X4>(`L<@ zby^SwrzFDv6I$tNYUZ{L8#!cR!NG*U}51*zx)=<%BkQmFFpDk#3@>j<#)POS)q zgA@v_B{DM7zDg@5cQ*6vnr)^AFai%0!%>vhEZe#r-}jk4p@m{#fT2Qbgtd`26FQwp zmMe@Ebz)JTD3byzLgEk!s|@Ie1WMz09wHx@(WiFIf04VbIbOQ?Bvfa|fB-$u0KH3y zVzJ1U^_yQJ;!rFae8vtIJof`o!J@;B`KhFJE3eW5$f3yY9X#i4NLx1v9!}>O`okHhSr~oIz;kvS!i6 zvYJ#vnDzL;v^xqtrl9HZzSD_tm)7G0f1*`U25F6xx{c{bF;LGBV0ai&@(n^=+Q6>` z#3*k|aj%w=>THJ2>KunoXk~hR9iMsl84jM*!OiEMisQOSk;0WJ+Z(XvEtpY2q*a0m z(8@Y`>CkKhQAC8IFJEHit^r=??&skxn_1I0%xKk{Uoy$Z!7RUUU} zW$+VXpBd=JdRX-$j1~mIj;)*YKwr=OQ>IKgroXQ*SuXz27{jB3(5(3KB^Pu1AMT+4 z@#h4>=b=X)UbUyw`1mJ2#(#eGIzIf756%DCPk(++sZbCS&{bKO+J&mE zhDj|J`=%`)S|($giRl3jtlG-F>VWyRk{YjyF`Xd@Qz%Cx0yDYQTA=Y!+Ociekd!Xc zR}6S&b1k4qJ1KA-3l3ETD$AJ%?aOs-_p@VQ(Di+x{^{Fz~q(&!pP{v zOUv-q(n!PRqhYl68OVox_0JD5mM?I{TTh{*p^mXak!>Sm+`MKBIMP;*E?Nd<*(Dv> zfJ1qVWmSZPuc;m_*@v33o(dI=j+O&R+Ji&pnZ&B654HM5gmlsS&O}b_LT%iMD)~?- zA$^JRKxEvc&g|*ye$Do?B}~S_ zLalLBWaO8%Kq`e4j%8(3rUEux3dgkEwfR~RSeHoqk;w?94Q?nBATT4aDXsPV*PV;( z=tU5y623o-bUfB>?tyfM_L^#<$RtjVkSL{)(vB)9dlkfz3`$2xZNEp@ZiZ6^GiyO8 z6m@BjgQrd4?nO%=lQMSVmL;WMwuq=m3Z(#yE{9IJrg{g8r4k#rZ+_Y9u>XDs^Yk-M zTzK+{r`-406OW#d&*x1BxOlZ72w`Fu)YT%2yYT&hb(=PJ-1ES_?#aiW6z)v`{=vuo z2Ohw4i=XAFqmR1y@yDL{+PZb?%Bf#NEn?PWbbAxD*TIBVsHrwBJI6618nN5??q)nM zD}ZAIkWkje))--+A`_5P#wAT#baE_38&jpmIoFBud{PTQdM5DaM-lmgbxSkU6Cou! z2rWp>p*dH@g4Ra%ZExj(wkBpZ)H0#2j>b%i&p-M!A`H3un1j&LL&zqSa80bJFv<~V zw4?D5yJ2MvOIv9TGDJo`O;tX}O|Iei$rHHrfZ25C3oP#*;K6M>cy`MUmi6^pUT$Ph zN>)^2jwz;PG+q)pNqqheu-_{{CdSJL+n?1{Lv1x;U>IgkLDbg5>P_f%TWw3wfouk< zGl;4xbWOGWI)!#!o9tmMp4*#^(bKxEh;2RSC=$g&L2cZ)@nI@h$rOrg85v@ME;6yU zm9KsAQ@rQwcNp*{s0|x8tOP`3V?F)-gUM;U^{p52pI^O>uYLV%v%mPctN(j=WOxRk zm5_p&6HLW1yQ`x6Qz?dGKF{gtLC$VmM@vdE9JMi|txu59CInbvC@hXD(j`>IfXk^tKj4 zG@f=qXcP)p3lxe%F;C7-@wNLO=kcdku;0R|y#3hy87hv^=%xAD^0nj#2O*a+bWT|w z$(calll}r$Oc=xCceG=dQB<}PhjIE~XiaBr1G`2> z*fpA`v#y1LKSqc^_$8LTxRq(G4b)a=h$@@{r5LYMP{}}$*2GK+EBd9B(I$u~$x0GQ zlZ-pAq^+(hF+S6k66@n+!}qjVl*NFO{XO;9h1BPsf10C@JX+jy-`yvkfByMjdf@&C zFYD{y)d*;otQQ0kbTy-Uc7cWo6DGd>d*8YK7r;Gx6M%o<(bUo`o?HB^-tU0@*DQW& z@pPr4csMP@v@Z0dc64J6%S;DP2psvq(}br5**0jKbKc$xwymwo3tFg!W6w>MW;BoXn{+rf^Va z6CJrUS=U1dfhTiFC&gpiH}cIVU*L*k4q{$IGg{UnrDsv^yac#tOg$)9P)WPcHR`!K zg^)Qk5lV!pFu>C#TB;n5pOWF&sU3`ze6|i3_}b%(d0@+S!=w<_;tK~vI9@v-Za=;* zKuY`fTn90w1wA}s@Bp1nP@hG-@FKczz>H3UF&G|0i#}7$dJfuk3=Oot25PGe4j}6x zs;kipXQR8C5lh#hM+>rS`d|;g#M+%ZVc&?6V1$d0JC;AZ=Plg+ou329EnBwg=H`a$ zcI_JY*xTR!4sN*NmmGTdVf^~nH}c^Rf8g_1UUB8SO2yKoc$?GnrohB@X$B(SPRhjYc&qZEG=u@It@TW5Ys3#D95*xp zz>$O+O2H_#8Np2}Ht^lQJPg?spE>U&B5i27!-3E5m#;JP+qgTULM!l8PC3l&tP!q6 z4~!u)DRdAkehH*yfGD6eHfppq;%vO56){qP^;^+VU?F1~#(bm}MAg=JJ`59$4xLKd zL_<+17GIMkd+wXw$jyKF)3B6r2`_}x(aQ1r&!)8|L%|PetV;2w+0%J+%MPx6`dJQa zZ{wU96RCAF4EaTC;G~UmqcW{@6+>C=nJHng0m=f1rNE%;rSaED&_34Np(^9yIu09q z`rlBUo*l1u{?a8E5zZ9EbRrQq8cI0od0kO=A&>$m} z5@b>ibtxAq9THzPr7dP9`YS4i3L0pftX8G>Fw5QZ@yKJ3=yT6Kmz!?7>5BJU@}8T2 z^Q+(dF<;0}1Yp%B=xPPW(^YAwFlExDlhG{MI|BFz9amm?C0Ad4HGRFibW=<7(DTne zR~vU~5kiQ4XP~>9p`i|DO@PKaL?(-t+ThssATRs3&Y)w9OFb4KO97ub@?hRLYa#uG zBJ28g@J#o1mhbFkRo@`X`}-N~E0#4p9f|NLql;$?h zpEHfO&Y4bEU5-dc1d&3@G@e^cCY3`9kI|rqA1r#FnT>V)%f7QH$P{&MmWa@}Zb^5~ z?J>J+mf;JACX_g6Dx;Y#w1?w(q`fSmZom%)7%L9Zk*nr`4cl10s}G71oh^+F7seRP zmk_Rpj$6Z)KA3bo{u+G1Yl97hP@!w95Y4r)v)?3d*=qD5^Wgbauwz#lU!e^TA%AHHd~t_h4_kI7o0HI>i#}_*`;79vmIPtQ=RbNGPu%?o z1FJWfVUm`YeCR_Tx$isQ`POZ94fQN~;z^D^_L%Sg;0Hf`U&&CYg6}mc+liE>@ zwHDN9MVpi!-<{GL;Y4gH*6@uT$8g}tCeCYK$Fxj8j*}wNS)}lYLX8j}j#DBXhCI3v ze(`vgo-q$xZAJA}Pn|$} zeU9M*RC$)3svxB`T9$ZW*8u-|)15Fh!uiJ@$^lb52!axxo8ifA-E8dX1J|>;V`RE& zN+hEXvz5!T=+Bz%=%yMI*h9l`h*9!^(5SwV@~8qc*3(17Fj62^i7-i(u|PI@AZ4(e z#%fPUVG`fh=(zb0f8xxu<V!mfOt=ZfT&pqm45UnoSf5qnEEjq;@!IS{FxlweiCj zR&mL#k8twzPR^V*iN>ldN@p&Qpj)|1Yw&AVFQZm8O zI8qY?KD|Q)lnMw#pInv8^BcDjT*KNn~83&L$o)dXG}04Ki4tpXwmLk z;T6IEZvvuOL7X6hkr8G#H?V)lWQ0>iYjuu}x@L}_u>c4eEsZi%$g^d5fM#SQ#r!)9(c=Xj*_$fcXi3{VNQG&9~kwa3O&hss>yxSK1aH65|0ItGC( z$ap!rM|bkEd!ONti&v7ZuHw?e7VwEf=hKrfaP5;zd1(D+hWyYn>||Mw9r5~TDU8q9 z&{I31Z_EgJh``K?7tS`1*|94LB5{)^l}ZV}l#bYm~S-;gY9V)K`Q3_;alm(**?FmDV)5iWq2~A5)GiMyO zfM=GkCrVkN1EpSylT9j7!5fb{kU}Xm(o@E_WfMgU%O`#S&`7fp$eK7Nmvg1o)vskL<4BA0h)? zrnq&spKFOY-H$W5u8#R_bqsupgR4kmV)vfR6U|Q$GEv%fA5(yxR4d(At6H2oXiPuBxhP1JHHE;YVD2?|t|F_J|{n z5RX6pxCUO+;J-Hk0GeA{#EMlb^@92Pe(%8tAAEmYA!!gyXoDFO(GArwV*+|oJ0hJi z!A3=PJ}8nbAIDaDVPrJaUrtJDcTIe2St*o84-6u7$T3r=GO4~56&b)xoM;FHj;x`n zx|+7?Ru1l(4g$tXd4~K^1`7o?4h{0NB`f*k($%0#bk^5#&a5e%GixgQwl~!karlHzQmH09;i8n8>BVxtdlLTG4aHc# zWn!3uH0^t#H4z#qBn|-&Zd}2q?s=3KHg03~gciPV(s8_D=6nW=1Ef8V>rXv`McZfb zUr#OLzKxp==*V-*HiYB40K1K1{$}H(iZ}go_kW~}b6!USY~G1>9E6UHUjKrb6-j`_ zTxGLjdRN!`makpcGDcP@(`zv1X*6HN*AbgrrgqXiYd&LiLV8VGNoq z0?hNQ??D!dMPx36h>S8^BuzIX5(@Bm(-DX8&EMY1Kt69RR;j4ADwrWb#LP(@95sI$ z#ZpKnoduzBv>=ip`Qivad0`d#?q2k8fs;=@fCHvZ~8ys#aTLTurG|g2B=8>tt{gT~lKL6Ct`-goF1%c@ARvdi3^Q z^EfLFjyA$vvAlF`T`fa{L;s_F?#3H$9K+$J;-vCRxd->JMe)7JLBPFgB)TTU|vl(hLX)-B?YU!ec zv}%|zueE`WToq9)CMC+9K`D(bZZQn;!ve0*3>AyqyKD_DO?6CfZA8VLgK?s$;w4|Z zj>L5wLKRX9Beo2Vux!^LFYMUKGu?f3kCmtqFtwqEPaSa(XU?9&^?!Vn8&~Z>duhAO zD)C!;s3 z@&9ZB@Wn5FiL0)W_VH)v z8!kasBO+;~g`EnY1Vcx1lq8a`MD2N{=8SxKgrG3Y3Ef_g=pHcL7EEFwq>J8fmPrn` z^_ciw@Yy*q_$J`g4}bW>wZHhqFD4HT4u~mJX4X%gH0c*hmM@vy-QAn)AtxSp+zo&F z%b&lM&1Nqz6beu%GPJFSjs1Oe)pnw_z}FFz8k)G`s*m&TXWs=Qc~L4AHSp0jYt|%4 zKHb^~bEg>a;`B}fJ_{|#u2|&Xjy;Mu&7RFz5SfssA+JVoltap`LP{4YjFx@gA3_NM zks|9k+`n-P*F3xkT*m<3>T)mjs)*OSUxl97hE_gWq!3yra?r(4F}rgjC+xouf4KJv zM73*^ZP!+SQ7pcWqe3n`^)MQ%t5Mn^IaojyeZ)u}J$;gC?+e@ZCZbd-#`L{%g}9>+ z-PLYb0K=n*{vq@u&za<6tWf@Z>T46hEIp8z0O>;yJ*@ujyYBiQ?|BbCbpO|rZ?YNY zESSb2GbU3k23G$drY&1clY#bAiZrD#z;h%Av^8;1TQeoCDTX0^V+Hz)A>D;MJ4Qy? zGCV?m!6yV<6iQ2c6;V(TZ1)1Qx7t8_$Yd5#aSuC8&{>;MHKSru@Ue? zF4%8Bj+ii&ksv@j!sG{)+3s%Dw$vJpM?MJAdWbJS{xrF?%WvOu9@A=S7>zu#UJlRA zkrIxj=#{y+-?&G7kKLi@yf9xTA^`z5qoEl1zZ~eg`ld8t^GK}PR;raudz3(Ir zoY2bq?|hW!x9>2>X(fQbBGRoIpLB_IWHxdw|F$l`%e4WM9Kr_Bw1;k~h3$O?pMWqU zBBf#f8Rk-N>p|&={=U9bCQO*{$B%yWqvrujKkg>~!JPKjUs()V0)`kJ+C zZ(qH3%_WB%cIf2o+qSWF%T`dD;hq7OY~0FWljb3%gH(b-P~cxqJc-|a=wG<&E7!-4 zIp)o~9!%?kDeX{I1^aYCuF3@e_#~Ak0~|GZUkZNFj%yV8QXdG1>U4v>mWm(@38Ffx zGEL@rp3C;J(17P+yo0EOd^29BLYUThB#d9SZKC6#kdcEV&D)MYj6dA{5L%}J$A}HN zAw;%K?iZQ8-z?sF;^9O(Am`QMI5~t0$$2izc5dPKtJlyr8qnQ6$cHXGiP;lc85k=d z9K#a$%jy>m*vpkKb)&3gl}OX6qTr*7MHn7M=S#*c%SoAg!HV02LnBZO#&^I5MiG7q zrgXxxbtc))7soHMYzjJ?P>z895$GSb{cS1kzU!{`(@#I0JMOsS@7nK9IO%xqzxM%N zcy5W8{Jpwr&OUs9Qfa~1s4h!b+p67>4rteOWo$6pKDiya!3iEzhlnP%~$G7dg)%)FF;=$rl6G z74qauB}PgC`AAbz5mk;uYjuXKbZN-C997-U1+%8nP?a&FLlFcjG8AP2zEZf3M1%o@ zV}%O3X;R|9%AQcUw#&3_;W!C_BnX0p_y6}C|LEWk{|_nw&YCrg2Oqqj(@#6&%sF#r zj|3(E>;zL$yg zfT|oKRIgBER`$RoluGEKAqWj8_SzFqq@;!6u|~YSPQF#zjnVd5x5PagHu3uxR`KtL zAH?M9T5y|atm>l5tHTj8ktD4Q%!#>&b;B$9LtOpnBHC+meEhHl1gZ*0X3@LRc%*#g z+2nZnP?0Ef2}>bzgh1&MpL_UrK6=XoG^R3q>9k|{=BaPM5p{%Nh(Mx*4G~%)rAI?e z2MxI{RFGm)T{VAs^C`UVpoLVa3f+UG?hTD1n@VAlyw?aIFmC*3*#|8RmI|7Pr5h8J zNTBCWh33ZibI}6>1Lq!m@WEey$GH~?<9l8{-u9Na@}r;p_>PAjen_lbxw7<$PkwSs zCY`wfdj|gYUY=RCk-R@_#wcharSNr$?|$gL)Sh~{X|<p%9}14%cOIRSCP6;5dNTIETBGxMI$P`cuMb>Ab1H=- z%cwt!z{hnZeT6YTde>c?HL;V&o?b=AUN-c0nf`V0gi1!WALTLbLjMmxUOd~b}9l#lXV?3sWgpMDdxA-bIRmSPMa~A{aRX>)zZkmt*uON zs3YUK_Wk%20-rE6e@keEYr7DIC}Mlxpy^!2>a58w@ptSM6$R1Q*ciRNz5mql@c*d< zps~J*HEY%|fByVWEM30z)>W%kS0|0ht`@|;(-Ex=uy7i3zgcDjjZCmoo@12Xo>_su z<1xhY4aV#vl|s5{v&T6OqNxso$OO}uMUTqzEYmN-zySCW)#(&JIO9}Wa;*fuZ(3x| zE1LwFOj;mCK<{WjpS<@`W;Zu-P**crX34l!XdR;X|JZx$ILnHw`}Pim-0g^ZJ z{5X92L(fe2wNq7l@3q%nD>SqCgG@d2APS;XE*hU_H?8IVwVS!>*aN7Gr|`TwyEjVj zX>gVQrcm_K&kA#_c)|mUT=wXLT>i-OOl)rAS7#o}m-j!6NXPMoPf3^4TG8(tF9ejdG97B5>z zPre_aLtDK`@_vCy!-jL&g&&1EQ(&)Y#(ZewhjVZ$;!@NGGP|a zIynjjLMDwYs@B$aRae9%Q3g6i5En6n0OWH}$U(6Hg@OrwCPF}1@?Mwh%oT~Eg3Uil zEN#R3kD`zvH7y*y=VU1643{8VgiH3_^U^g$zHckPH%iu(Wv*-J&w=lo3ccVX z3I(IjVfRrn^ie(iyDb;>wsxa5ICm;y#L&t=HPylFNibog+3U;KL7%Dqy;zKM&pqpe zf5zGOzRePfFKCyyeGOi~{KNmnwaCe4iIdgcrt%BZ?DG0&wKg!oG1hY@}d;)fxjeH~Iu zl#pg(%eFjAWW-#dNN+A@+d$SSm1-Mc{pPBH()r{#b}So|QiNgn9~~3_pJ@SjUYzdU zE`~M_`^K8JYraz~6f3>a>EmJ4P;^5L>^%)y>QRxM?C{LIt6sDgmac(9jtOI@vazon zZHZgTLa5ZI(e*VI=zq6?Ta>z4kS~B0YjLFJ`|mo014m6E7Z$9%WMr)|cb})3kr*>` z>jM^QesHnc$quck_$+OE_lIC=PEO zjTUw002J11%ZhuH5(0tqrh5;Kqo)sI(hg%t6ZlKiVDZly z6|fb)QYLswff(6@?(8)rz>-F|R){Dv{t)|2g(sJS3dGKi4zB&_PyPnf)TV31KsNKb zr_E7E996sEl?C+n_Gk)4v1-{`7H`?a$cB*!;(*50lKwEy`9~hXO>363VB;o>1jJ4I zqvREPFIdl3<#(el=bY%zF z)Zar}UoYFT{p`qO>B#2DhmiFH{3w88!1jTD0;Nz=nfBVCsY6AeU5?*>AO868iyS(8 z3Z55ZSbZbY#|-EF#~nd)O&Tp?Br#)VDW?Wk=b67P$FwGwxixis`u^uQVD40onl+wW z;G?A=7N`yz7C**rq2^7yWwFBnY-Ksr)S zojOgdTe}|LFTg+^R%}4*IR(AfROo6k>$1Mq5XV9vmaHprMa=Gs)P+}GdDXIuF1m5p(hVkeC~%E;Wp}lRzm&5ar4GeH6nyN(c7-JH|r< zZAK+ao(W|hoLTRot)4YLb;%Szec(CnUa*AOts{xM9$&rj0kXwBA3o+libaD$ZQR*I zluXjvP*2e>a{nu`mNqr$!}+x@a`ozk4n z<`zrG8dC|2Cc13u>?bM-j;bol^S4_h$V!VblgVItW$z>a|E}x&^UvqT8*k(%*Ig$+ z_nFU}-O=6o9ibx)QV7?9nd8tShe2Zv9554+PM{-QaRcklpkG*w*wM+PiBtLE$3DYR zbN6QWc_)(dLx@>gUmoYk6kdPHsQ@7`#|53Ae@&|8z-!r{WM+4Iu3f4JiG&LjD8KamlHE&inK2Jh*Hr z$Ih9=Z%#Uymh=dMD8jL3FRpNH|JBS&I|!6khIqNS=-EY-a`cJUl|(=7l|c2G2|%*f1#*VPz* z0HG`+-F{9gf|?pQU@APf0*LU7eyTQI(>;*QGyz=r@lWu}U;k>*QyqQOG0c1Hk?#Y? zfH;CMBHFl}ho4)V-b%IDJLLqQ9G$!Kw_}%C7@q6#2-!GyRq+@Xenz$nwSyP81 zVpuvw(sOZzWLQlS0p!Ahv2V4gh9eC@FVYIBONpa_OC4oK?o^~1l1y^?lxb)wO-iVh z9p8({g?T!%J#^Lk$-$o>K<2oSwl6KsMAGKGrglh%Zp9OTTzMJyH*`9l6Z6DExN+NzZ+ z_tc=-+AeeyBBoD-mL{_&f&kjOVC6PL0=6$?(!`0I&pGStr+#qNmH%+?2PgzZSzfEn z4NRLb5|l~c8`C54WD>27Wpcu;BN1;Tj6w>2H-#XFA7;@yw1MBTq~Ve%q9yqX$IRht zs884Nn@6AL4^PeKuCHFe*p_-c;n3Pp%dZ|?z-b5VMPuB-#bM3XE`;YXZfFCmcl7Y; znynxr-h0Sg9PL`-r%@mbtqy!z9t&MQa==V3IdpFvj83{x2CkCAHNmgykf92O zElE*_6u5QyGInDnaQCb;@P??~sErGBU1a~)!TW%>}?2k)7<2f$fg?>JL-|alSVl@{Wun$+f>nIwM zL-C`?SjHl8ZO|7&8uz&pYA+-*(kMp}X>gQ832mJAgu{^ZDEbQ>jIDRM=iC$c@O@A4 z(v~)>n8<5wT}2f{zbgss&9(qa=!jNENJMKG)eOrr;7LP16s{fVQVQjb5=4 z0U}$-HO|>{&b)=ME<9#;q9OAhGwPocCysa4t=nk+vNyx+kI&~T?>UY!O|=jS9Brzf zq7!k@$WgrbkxvjrAcdeV7Q=ORO>(LsPScjk7V`v=-2>WuwvP15?#~sOWr>msp(6y6 z2*E%Q;95Z@Ws@qYC6Y8F>S`HL4-g==j~`~~$n{fH5pl;uVGeO^A!lFt%xrAt7pI;~ zJXR#*hc<~dFIy@ICAek|632=0%+_wEHYpxo*uj%8F5$qvrgG@CaYp1uDjWoz`8vRd-FbZZ@f?z3u-o&6P2r$P}GhG^lSl)~@Jl%_yLDv=8InKM`3e%GCI zW3Km)f=eeeQq z_`~o2p>y!VAO6r@^B$RZ=H@M1070_3hRLIb5Je&B*8@KOd>ZCCoHGMq&eh#GtE&^XG9IG_DvUk^hYtddmqjK4Wp zg^*AT4dkE6KoC;r#<=3x{rL8w`y)g>LdLBgwUuBk%aW_t5cW#WR|rXae-D3MwGJG? z1+%A+4|LhNR#e?(qlYakYgQXAeGPbGfL|?K#@g;4zPRsPYT`|XFt1G@r%d9LRU80S zexDULuu^6qP}16=B1m`+UAYcEcF*lRylNv?oNyS|9Dgiz$rggBBzWRjltbcZVVuU4 zENd!B%d{3s;#hdy5fZ62D$Ef?eKaQH#AS?zc#L11a41Jk7*)1qE!`I(lpQTADZLrv zqPGtF+26O1YuXGNnra{&w`6ID!D1l_0u5tFB1W{BM~D<_R;@mK*7TWsztOXubIyCd zW)>TeDbl}kJ-0r-fP|yU$&Ik`y@epelO8p(7%9)A7)4}?A(>+7{~?)TQ1!h}rdR}f z52T$gK|s>0Lt6JWv@wK9cxk%|jMJe|3Kx@*mAb@^{fr{52%?A}R0N?zpwi@{q)8l9 zv1Icz$bn5ONz8MZ)HnoJNJ@jSqMS#YL)|FQYkZ|RXZln|r)#<9zQ@3G`P6X-Q5%n! z+edNN<+06ewD%5Fbp1=JxVmybMagWcB&nVC(YXMMJ|bsDdz6NJ5rQJZkpz(<= zr0B_HS+}8$<7Q8wh~}>67lR-0xf2e?bv$%r?z}=Eg)sUAwvR6mNPEx;JGN^2`v&Dy z!UTDtB}$00y|K1NPC*p1wyo2kNkX7Yt-?X*;NRQ+VmJOH=9@4K|Dh>>cMyPo;99a| z2?rf~&>r)ic=UlCJ9b!562b5mm_8nA5-?{1jJ2NJN`WH{0`T-gs)wzSKo_LANj@*x_Lr0=S4G148Om!x0kguNQ7bV>QUGfI6RMdvyZ#G=a zacJw`#;Ld5#=7<{u0P{wPMW+Yu2V}GTFq`zrHfEig=t~by#i_YW=4@!fp(BmQVeoH zFF{yjRaX}eZQRO&ZCz~c??Y>cKq$-A@XE1R+e}@Td4rGrYMiHxz+%yEd`0d&5gbNRfxt!>-$fOpC%r*PkW_YHccGtM}JE3Wv#a}y>^ zaMrJ1ZwL)LyZGtdkMV&c4`Nu;IKnWp2U#UqjH>t-ZOpUoJpP<4~82Lhf6=nV>9qV{ebLkb*@vw5IZBDRFypM4>`w3+Q4{dBeG) zG1^KA^7%ZvFH`0+NJr)g;j3T#5?5XQWBg+Af_K07ym^m3{Ky|Vx;h7a?#XmYj2%7p zf%eWF9|79F_{Goj(T{$d>#zUyKjkcJ-@a1?hOZ=u$Ej~>pfQ~w?j-S~XXSIn?z>!e zLzZB1fy9%BEST~jN@C@E12iV7u1}^Y6kf*l1jT~l$wjNJnYHF84?M}CGsZBYK8+v2 z(#`E`&Sg1mzgf&*xtV7cuVK!t37jxz3fW?@j2=QMNL&9wJ-EU)$RvZ>IAzkYuE+=L z(m5ss#UNm7dnX84DY44TF!2UvK)Z502MZGI%6WPR0r(eQ@ucY$wzLczx^DH_MLV|d zD3PQEt-}y|OoYZ7b8G{_2UWmJ6CpUcUaz1wQ8HCD=kECkT4CJ%?{GQtg z6ESNnAq;t^wFSluL)c1|l5&_7$gB^YI}yD(PzvcQj-E1x$KHQ7$4s1qE9(%Bt{i}> zWLqh1<*&;dFcKyJE3M4;8iFXx&CAz97;(nb@!-TE3W%bRC=4rycUiBxER~K%;3~)k z{ao|XLM9Gv;v;is5s5Ueb@RfWg%!?#u7dq_6~bYQ8?6Ynq96)HzE32IZ0udd$v54} zx}81TcHXI+K4TwTua-auAeHIoRcrb0jxt&9+e;$~BLlMe9rR>3bNlk;oO|cP9R7!U zx$5zkS=Zak-Xn(bo*Co$#GX_5@$pA7BN9pU$97NSzjq>3ocAp^ZdH@fGI`tqOi0VVS^m({K z5_96Hu!z=CnWG}A^xcJ!Nb$xsio%%qXjjrX(96y9=A%*`mz;Jug}`VGIF|FczI%XI zwsxRJG`LuE>^>_y!5M)g1USVIFXN+i2>tz4LQj!F1oA$PfFPHLOun4yOr17O16*~r z(cbygXFjcN`O8gz?C9zgfcWW8ui59v*IvCpAoAIqSh;e=Nux%LF3A%9(}F)hG4Mrc z{Fj;pwT(5@rDAw8VLU@#m-AK<1*+mj2yGot&7_D_0#C$9$7-mFHIq^qMN+ zSe8c7P(&&;0bd1#QPKQg6;Ucg=?K?#>FF=<+54X+3IiUz;4G##)RQUXNw}U-mXpeW zxJp}s(QeKlQK_CGMC&};d)jz#-8!ycw499{156p#$fZZ_#c|^&GNGZ7+E@Zd3JPH! zR|kx5O!L8e9%Z2DqaD{KSd`_1wf@H@19VyB#y&eT=YA2Dpjj_qyJ0oc5QKmP3*&O7`N z#tj<-p*DSZUMtGl~`uk`09>DPlbI>Ox*!zKKtt{VpaAA3{$)XT0OJB<8^5o3_!B%NoLn49+&q9Rh$4J@G?F!vew)^nZZe7u?V>WfsQEjXG}}Lyu#@4gAci7@uFADKl+QG z{d~}S_}u5d@bd0Z%YXKD&9&Fc8-Dk@Jr^&wMsl?&8XD5X9D(O1D@HoIT?d9cq4l6e zZkKWeGSjxrBgzF!$k@h4?#z2j(whXjh(JeC6xBYu2804P*BTVR7j2%sRN4^Q%H>#vd0p!5mPWP& zR+Grp+_r2LOCt+k!s|kixXO6TZJVF)87CX6R*;0Nve<>R?SKdZgKzR=_w(!r-t+9<(Q ze@I$u3lUew$6`(jDP#Cyo_IW6RryzclzO+xh7cvnsMV1Vid=E$-xxNsne&g_gIuv_ zWwOoh_<`cK6>DwMU&6$cO>%eR-YEq#QX~h8_*#Q+<$tR`ph5saNRTTM^i>i7tyOs4 zFRr`(+_T@!t+(IuZ#@%VUa%lmS6BDN^5+(h(NtfHi;L&R|89WNueVMHA0(!AVhMqP z@;QFbS$yt>zp!lkR;COe$?5y=!@<+1BSfA|v5opff@|)5hDpPknKHVC^RN07v6=** zKJ`%QlPU5+h=Zc4DQd@gEecTO09c){l(wW81Fa)Kg($y(?(BxnZe#XQC=in_ zAKq^^^FDA6-#+|U#x{<^*REmX3kZckMA8IUX$)}?nusEbK9uf4hykSIn++xmt5s?c zQqYs@<+hb;ARc4($l;_s&yEf%LJ=Vyk8G|TU*#>N723_KKu8LHhV}h@Jh6E@AKPm- z3AYhXNKCSAWH?xg_LI;H~LqMU*huh4GOARS6Mp1>FcH5(j zuS@aM;|`@R7N-zJNHi`kp*B+oo!L$FSbleD$c$0UOxA? zXE|{6aOS=L46ZxzbdH|5Cw1`_eBlvlBWzNFlRY<1eQF3fKhKF%$MF8SGm$}Hy~(Qz zo3~>WG)NCzS01BerCXme%8^x56XjZ@j5=7NQBbz=t#(3;qQIbIN|x7RO`@4d`G(QW>q|+$Mp9av2?Mky?bYy; zhv%_r{TAMH_*{n7))J@?M}t(FhM45RjXT)T(QkM@x-=nPO1M>(-9s5e#w|u9{D>$D zAy+`>3)NX41OZxw6uWv1zsFufh8Urre|PW)*t&JA?Cb3tQhs-yOLI*M*Nai&jtT}R zT-C{~R;ApiN-x1S=1OZz2wCl%jvom|Hw|HriLLzZv1jn4L*DnPOT@_gz0@QV-2U7O z?s@VREYH;b}*3#PkUi3xVy-MO28khGeUSsO;COtyhBoh1T}VAgBiP z7uM?6{AXGKiX|I1+g6XLCJ2;U2yYq*c+J|>?<4^KitG5}j|Jd2zxp-jzUSS4dhXfh z?lz^e0@p#$nPxn@XO4j}LviYAjanZXBF9wl+qw`huAz9~G;X7Zow*FsGQ(4;8ft24 z`12zV@%uY&g_>FeVTKV*XhF=FfXHN_y$d>fAfHD@inP?6I%_JAeeiUCe&PvC8#0;D zNfIeV5M;^wU1Wnk!$g;c-R>Y!I;0qOvvSJ{zVP$kGy5Z#a@seq;??yl!0|29RidOI zB?QlJ+sux>JaNxq-{Fl&;eZfCj=ZCme>55E7Nia9SAFy~e1*=7Iq_1~$>2*+enSlv%wcU5;Yd&hKA+k)!@}57}bC zBkwznpPzgRbB4~ub<;%3Fn*;ntrD~>SD8_yNX6@k$Lffpkgpyzi&-N_g0GA?cX){k- zw_)v|r~S@%zGITzgAUx0PN&R|7kv5_Eahvz`3th#H>FI}RMIG$l~pCH4=E85>7ZPp zSGbL)(h5`&6)B{U2pQS8?oy1hW!?Zt!z)qBm=mc&HA%pVu1J*j2~+_gH9~u6sc>bS z`uGSt@>xkhq?Ok#{hzA7Z`ooR@H~&5nQne`*WHX6J%V%gpNZ0?6yHb<2a)7=iy6>DZ|l*WSO%A`n85&YD1^BMs#dzsiW12to)U%om`i;?{S_K?nBzr<{>peLW16 zCKmvah!JxgJZX~r(mgjwk47sqVWD({AS@?!XhW9N(yBdIDIl8Mw?t0XXdM8O&mVgX z_q_NLI|uskM2td|1sSq(YX@Jr;U2zx{_(uDdIR@8{sPAyychp-`e9`KB9Tx?9ip^j z*HkG+YXru*P&wutj6_w7P*>`IB{U(LP((yRp=4x)t+Yf6Np~j8OKUrAK_{!&MpdZ7 z-zx}8qGD3oNh7t}cECFc!2eIzLl6Cp_rL$Vv4@x$#4}+<# z=pprxN}&?5N|h!M-ihw&fkGaEW@1AlAKPa(cfa>E{&f1W?A3#+Z+sOv~7K{uSD7Nv7dmrZbFI~g$ZhwTWJ34vv*;hIL+dpSR+h&Aoq%4I39Lb{_ zw?Y`u6i+a-WvH3Mm8B4(EV0TV2nzJ)+VEAbOmfkBfLFI~=Yb8I`O3j_2}7TbferL! zw=t0Kq!0`cYFimeX|rij`A`ySxh7nX48VSDqy`R8!>=soat9ZDE> zce%=~%H&H@%)%-GHl&84v>+xOetFV?%pTSR1)Kd#tcSo`#{Mf)3)Nq?0>PDtraH=M zHFkjxnsg{bs2VY)6=8z9=pX1OU(9|5;Mil29rVn5?X@S*KKuN&&CNspQVQ2}4lwVY z$GH6FzmSS~WujpuLxeKmyHwRv3#BT@F(f=HZG&nSwbsh;I&=xjx7$EPMA|PWb*0r& zB7!O%86-(nGovM86bx>Ipx6fA?SMZSUgDBll+f@S!NJi7d~h z&WrKrrp+wb(giX1HMg&-Nl}%gX@t_G^9H2|L*KZ4?gFFeAb==B`9Abj5P+|K^Xt?9 z6VAtDk2#SguP(~<^>kO3suncWCXkM6D`(H_BZ=YgyEYsO2ZcA-#=(v!M^$63gGivd zTtt)g^PIBxzSN`=Tye*JbY}*Lq70jMcJuLH-p0rwwJhDRm7m`92uB^fC)a)C6!Jx* z3MsW9k`+Y36yu`uWhX$e)xNT*K-qSJ(%iolQnTV;T1%8rc%H+`EuC!d=mh7r(Ab-= z1N3Wu!HTN=x1a(4wH$yW4?T>14nC;<(Z4GN0b|}^=X(j2}TTsiNlQRS-J*N zC51mrMD|=*yplbKj^dXe{VeUF&qLeS(&(m;j>pg;%`8~6f=~YN`-Gu1(yj`aI2t{w z8L}DhePk@bq2tGL+SG|0Ii{82wPrrLuUH_ZvN*bk&j6k$XxrJx=FT2;q^L@w)ALHyu(`dPKR)>a-#lj|QY8?sBwNhz(zfm32!__z zF|syEB#hcsNq0bL(?gR|5JpA%2X>N7*5OGHt@2#@bbbfpqY zS7(W0mtME9_N4;HljMsbSHHA~(G zd!Jx!S1-7(d5!<9#aT5HteeuXwaP7Qw~Q+RDnh$1%o-0bE(6dTHf%ijgcDA<=fMXb zJgxetUwLIA0Gl>#x^TpZ5$|nlYg4F5vc8QU{q}aIjTy`P4>^jg&LNaZj$~<&PDsPz z7P6u*p*4Xn5O->;w2?$v_{UcTV$=+3Whku(q5?4|Wm)`KX=s}?=pruhvV5$$*Dj&X zR_0oCW&ZxnR7!(60N^?iFt9J*tm_I`8*fxKb!tS5f@{Sp={Gn>XMpYsdpv^tWG7vI?NR9(Uigdh@LeNhkj2M}!;X8-#%g673 zf`Pyy9n}rde>e%y2o<4gQxK0E>uC8pL8x?s1rZEwg0aJ4Q=0&x=RGp-RDh||r?6_p z>hiB#c;STzAqFN-oYd4IWp|{Mrr-s=0SK^XZ~v)xo?LJFe4 zGj6SSL-E>%D|S)q zY|4Zn1wjy@`ZESC+_glEl#$8qDnsmg_Ut{x`~~y>t-=56U;jGa|Ni&+(wDyS^`BgO z^~vS)QM!1kGzU%?MZFi1RXs>YA(d-j|Dc<`KqIAxBN8OyHN=D|h#alZ(pZW~?HDM& zO0UE0wF(O4qVc1Ev-aPQ%^y6UZ~o;kEZ(@uNbW`vTERu<9mnTSJO~wOqR{sEwSz+7 z3d7hh`Jf1~Ys*~^(j6(|Yoa90UePfS+9nkUTvyUrDDc3d)ev*|XL*7QN={4mTvFmV z&VO_){jW*@_TGD6UVeE#vuBTUf*=TATrj^fv(r=udryI(%`m0aLZBGI9$gVC5ki1; z(Jw9Ml!FgpzZtU$f+AWwq!LML>eAfy^y9qmic9fxIYc6jZmK~{98NNoU_wJ3@0&H9 zv!_p?wV{ce?^93#QV9~mcweI+PzBNnmuHqN=fhY1o}L|DP?ti)Vrb!k_F28Yoo}wV znQQNTlJ1^(afE?#Lpw?(0U;fu zo+pi(phhF5Ll_18VaZCqe83(g9f#h?K%GYHrzDOeOTJiDm44MCFO6(TNyd-(?V_c8 zeC{-+G}qH#2yG|AR0Ptp?4wB7{x7c)i!qgjB;yBsb>8zNT$jJS_c)|*$QA>X&e7Gk zoyK%4u8bifg)8iae}gq+Bty+>@T5yB(M(^i4UOQCQA0U<`UHNzXa#x@YyBTR4}`6b zl!2XVQ^=h?C@IUdyVuPdLeP^(A=FPY^yI0Nx2;;Sy0!Y}e)-E^0`SA1{IKVz z*ZlOHCm(<6wn#;qp1j!b=u>?APk-h&U-&$Z)b{W*-U)*OsT~iM(jn3T3Li(r?D!tm zG)kaUNErFJRppWpk{~J&slcv1Rj&3GKvb*}ZPDd9ZmlCCdw zI@yxF|DLIFDaEaw1`&1d)jcb<_oH7UOT{qOVb?|gUcH!uCh z7s_OgL=xxxV{nHx^7TbaNGw^27J`xK1TpC_ES+RRLmeY)Qq;#hT2gV+g)TfNj_0P0 zop>yPv;yB6*Cuz>9D>s7HZ3Qlz|(?D&pMS!qvL$_xA)WA-^tuPr|^~2j^e;6qv*~Q z3?~Q=v};v(BSMTCsM<|VURnyJ=M+`2TB#*aDqu=tVvaJ2Z!+fc#HvlSZSO=R5`zS$ z{wdI37#cCT|B~y!Dgk);<@ua+^68_VeRkpEb?erZ*Mc6_2zyL1(!S$|7>B4(p;HNT z!mCX9D9~{i)@){2HsA|qegJ_c9Z!<1sbOR1PQH2LulU*RHyff*a|7|Q!KpuS})wl#im4 z>}@IF%JNcQ(a}fTg%c-^p~v^jqlRc<$X?|{fbzjDEYZhtAm(~ymUqUFcy9Z4-ZN_| zqiPala$$LPSZYmVbpssbAgm(WVAj3axJlP#VS5KRtys^|6Gn6Pv~lzmL&7LP3W?)r zieaAa+%}q0BXLEnYOHMcCwfVV(2W0>L%z;!B%__li~y7hiJ~H|TT>R9Dz%@2sE8&)3a?BxD)Gr8RV3ynUsF(5 zPgIt)FLrGc30nfD;z@ot?`e9wy7|#ZPe!Q-jcat@5hx|una}g=hV39-A{kOe_1{g- zRu+P%E*qL^RB3$QM|Sp=>0PN*>iyHFPW#K|&6{fgXz$f@^%)s2M~dakm-m0`+n4jL zZ(jCqIU_Tf96<70mwoFtU`VO>iS0Xu51n}=`?NL_SCH^r9D5&gQAmF=q$^+G`EC8= zLq(t>Tmk8LjA4lw!)p_auWw{zZ4*P%^~BsHN;`mSCA=-~$Y2CG7%dV7Z13I9ku%3} z_az@-M|VH7#*Dy~&^eH|($x|zLxeWkB+7Q~Rr##kUGH6%l_kp@8bMj3L<>=_{zcjE z0X#==_wy^ttsY}$@K&jCuQx8NOUmK^#N%;NsT6tJ9(pGM_y?}x!-jL_xo4#xy8poi z8#ZicECY6}!(i%I1DlR%DUV?(38a%%>Ru5@2azkH7cAwH4}XC<)25KkWm&s@2iM>7 zJMMjS9-DXWfFTVuO&`a}drjly=~LLVWh5i(8gQI6N<%>@<25ZTb6RQJbB-*GUSR$9 zZoc`4yC?)9B9*j|ltxRhN*T@u!9>E2lo{g~sg=>OmI@+CU0ssX58W5(Bv4U^2DS}k z@uLVY<}s$OhA`CS-mF9#wKFYoO7@sqqfo>hho`r0=hz9OtscI#dIUyJRa*SOhzLhG z!bt8W9Z5~nqdOn4c*8c7)(mf~WmQ)%QyUu@QIo(;#%W0l0$-7jLLxszXwzx~h0x}C zq*iDl4H;1=YT|KjU$&lAz5RS_&QvDU*V3O4i3B)OR0wLq!4GqEWw+6s9)T-UgZv08 z@V^y0viH91=Z-)~XiN^L!{0(NRJ7Km_{=`Dx%i=HAt5ax&A54iQ_%>1OKe_4PBI$# z5xOyLA?Pv<@C_0Md*4S5g)JTEOcsP{>FwygL~DJX5F)7lmD5f+m0$n%`t37k&bl?0 zh+S697a$RbbdpC`FJ;b(2^>6qI{9L*Y~fn!-wI(8BS#6O@bIGn6tyN83XsZ-grdQZ z3Z&wV<~`Y9DYPJr0zA(qb~>VDVxhId5A(!aE2wXE1C#(?6-nAjkCLLLDECjbA%Y3} zZ|pLoFEpO(u%WY)YaaX?2hN?w0h7m4@KssfS1C=>jWci4cGmaw8BK;V>rlT=$3~!~ zCRNlV15G51&R3K#qIw6+=Yhk*g$sAgo;mC2Lk>CkuZ2R<%ST~-Hdcf0`=YtIiI$cY z=ie3l&ph*Nap#@4>#^g;zOrfKrfDVxSHhh&k#BtZJkHy18VM06=B1I+BZ!J96`+WS zbYudyj!+tMVZ?wRk@F)q_4cu`x4;vd){u>Sn&WZy89AJNh7D(YQ$3E8CQ=EMbZ~`> zvZ83lB0%GZ1LXYzP3bg4YSV;aL@`v>O51+^w$zWx$*@Ty)NX@ql_7PN^mT>ksBKHn zj5{L)N^4w4u)QzGGt1UN+$~QVY5f+>e{_jBT-Dzy$p@>@CKV8m#i^^QW#`VF?<4?k z_xj$qzRM-w`UY+7ZQOR#t(lI_j`EC>7%>z*b39^VE4sDG%#>A|n>kLoiqKjZ{r5H7 zsfncsP<-|mKj!(xOIWdP1$hVb$Pvsv;#fYo&rD93G=bqYjYyfY@DzkmgwPJkafoRw zsm=DZg<+aTDkAO(uDbaFHgD@NNl0ma+Ht68n2SMButwUZY>09l6FBf7JHRK-J&gk< z&mS>I{s7=K1gMdOIKxre!QMySnB!5`A63>-xy&f3iP$2=$&ED3M77&kV`nAaYU!MNeDbRAl2c6N50Ro~RO zH}FFBuibOsy#RD~cX?4@#|>SFgnP7#~3g9?5kW+x4TxKMN@*8|>o^p{ z0+A*5DXmdbp&}FTgQ!Svp}j2s97O>_Y6@X5#es|wAF}Fw25^$}`CZ7sK8I}=xj+~e zQHjvBw`>w9aEOSI$^kbrme0!cmbFF2gkvUK;!cw9-SG$XKp!7G`c#r}hoY|xj$vlh z2%?aimaVhsl_*VyR{3r0nzET6NajN;b?XplAJyH5Fr#R?b@WIvWy-|FpKko~GavcL zhsN}D_tMqVEnTH46bjVWH!x(#klerPti1Ei+x1yzowMeSJ8qkVKntw|yVj^MAc%Z|s6Y@ENr@r}Cxm3kq=u0QM<7u27a|t6_we-Q zc7C^b87;8{M~xrF5o3olwziq9h~df5Cfl-1 z4%Sq}xn56+au9A-l>{iQj9RHSek4(qw!iC0o>{qpj-I~qsIDGl;`4S;fYR8Ju1HAR z`DHKWku+01?<4?k_v#zyOTPcS^T+(<)>~J0baq(kDS}}w=)ESx_>t&g4JPZdH`9zC zg^=^n^^Ot8QJ|s#w(TSnhJ5LF*BaQpxrv4YXL97M$y_jJDo2eSPra<8AYzpa&(5qX zt%wNFen3HoWg{Hnnvpn9B&kUx`0Fccx#!tej7+d2%dUH_Fidw7+yssd6k3_U6k3u} zXvJ^H!>~3(yN=dqDTukS zw7Z9CLz);`pT_q?T-Pk&qHo;c2Kw{t=;&tY$_=dAu#MF#H?eBv1_~X0P_S%PX#!PX zVcH(0=m{fMM9R1-CR~WeNDOag#;gfUoic{GGbXV2tjP>%sG&Ay^a!FTo7eQnO|>koMJjCX=w-&JDX%5cDUFcYa#bZ- z3JN~tLxnE(Q0o;5DWH|{r*Nf%mJo#ngosd9Mp-&Blu0v@N}9QQgf)WFxCpe;WiqJ> zLK~npnPMMtH-#f(NNq%}9Gd_UnJq4)(G}1_nh{c^NyTHlv|%m3o%aNLPM^dP(5OE;MU zMwR5njiv(vTsKDCOB-$@M*PUQIOZt$IfAf=)**2ZjvhCR6DAHPQ-o*R+IVdJR&HCh zfpK*;95Hq{bA~n3l&U4^qzF{OR>rPTUbIQQDWI(jp_WzXOlj;-50a$*I~%QPGQgTS zA&kG90Hq_NP#D6ai`Nq{ zu&tw;TrN+L_o;12Gkg3PZh86@(@%CyhUf}K%yICvG5zt-HijCp8|9e8I6@eY5dp=Z z$ngj5#qTfrI6~B*bY$&(H7G^iFM?9E)WnE64!JPIQHl_ZAP@?q!t*>lN76HprK79B z@@<{8CgME$>Poh4>tyrR?X+)dr(X`AKj=gYx~{| zx51AJ^k&-(G0<`X$~@fN>DQNYc7<>pY7$NK6*}mP6z>`{f-%jFZ0;Q}B2prxA`tQq z5`(mcR2;hA=rF0)+Lb2gxGrM)SoF)w0rboB=b!tfFMRQ5KfdPbr+0mXhQ``NS9iA& zt5KSK(I?Z{O%N1;0LR+x3Jb%Ro>vO!$PDnQpZ%8hY%d8JqcQ1`PNngZF15)diFk~L zgvXHjI?{<4$(TodB97}>yWyBiGU?(72Uj|VaOr^KNE~T|SE49F3yq2(LV?OrC}t4C zK{_!U$HmiWgyWRQ6Qs3gHU2@;$N@)+AKY;-K_TzJYMgh3tk@doq0RAf~_b$QfNm6RMycG*Zg5yO*^ za+1`5mTA?P=G3h#HdUF)UjAhq|@nl5`edIop8bleDfQohn9$Yiz6jwhhborrsD{vkAv~8 zh>0VhrQWn?OFejW*=K7GKxoH1=WBkP)Rg-fUexk#Zz zgrg)!N2f_SfB0g@9mFJBv28v*_VxxUJzXnnw-c=+lni!|ywh>0^eG?avwk7mQxFBTX;f zjIJvS?Hk^L<+J05S$eZ=G}W~tl!X+nliX|Hi7uOkpdpp0C+qhSL`Bk`;Mj4axqjiY zav!@=9lnk6z(EEo!XyACfdKJFzf(b-@FVnyW*FKCJ9~sibNd~)-3hc@bkRjzd+oL5 zU)^KYtSeWqTze*{afBgJt^l4xzEGefb*r@5@Y>Er83P>6D{I#=Z~Z!o$t0)&ll*B7 zg@_^bX2!>mWSr*O8tURP>XJzs zYEvXUhvvE(8d7m;V=v5Du;G=|(PZ5_io~kv5K|)udHzAIU^URvHJo@5`%$+@h zQ}&udwh$mJ`PCPinwZCf>$kC_tphx_WV&DowKCX!^)CcEQV3s}c9|ALI>gTyeSZxk z5^-kFoSB-xV8MS(@CUg3vTp&fWZ|L@=d<}liSu;m`%mQa=N*fP>PRK(jnuNPs-{bD zyNGOita{2vTkR@AM1-RRS~$2~f>#c8OoSMMYMZ}MtwZRNoSALPt4 z&%EQFd+#~f_rq9;!l%ACu0_F5rfXz!DKLv?j11S`bFX%TzK$)eD#pS z8Il@;9~t6{ud5+Zjg~ozD$DW>o4E1Om$>8kC3J1w3fnu;-C5`!u!Ozp#bZ{2dVVRS zTu9gB3~wYgriDbp!OtO)f$V+MuP!cOQI~U;p8L^4mL5z5USE0huBtU%ir1N?BKRP_)w|;|V5Bo-A5N zwdRHoAO5S_+S-S%yY9M20MEQ0Vfh7>_i^?)=hU<`HGgR1=FQ((zjkeM{l;|!LBt@| zj)I`Om$vR+{=9fCcU*rrU;6q-_~-{u!bOnJ7x92d2jw|n$B||{4T-j7MJ)wdI~2oS zy8EHIZZtxbByV0DY0GDy(nu+AiBS`4q^Gb0l;Gg8!}!aJRpf%G0{siUd)WBRoDEgW zL&RffDa-xA-R4-L`WBcmDwHxl7CUQhWzYjKRer=N{aA%N;ub zBUk4~kjq1Tieea1n$VXzLgAR?vvfP8%QNdYP#jv1tgk^uMmvHiBIU-p@BPQn=p`ul z0UC!*U0p11?_@=LH!IruSk>9XKqd#-9Q5@DeGejxz*WZf8X?h2q8-g0&%eMxp~#m`ImlG6$`EhS3WpFs za`?@{74}Njjp+S?Zd0DEa2T|oiX$eH{Nv7z4zXCW)v!2 zCULhk!Jd<#br@pIP_*Yk6jlyQX_=o&R0T78V|^c2Yi5od%C`?ch*PHQMOHcZVPF@F zgOq0JNU7+~ck$HXh1@)EKKDKIGHl%mJ$;Cdf%0fvH5*h2i7N%T0_BH9g(4J+sO~KO zmhE)E45@L$b<2!#!fQwYk+C1AN^eDIv_0$!L4@z;87TJRiUu=xD-BepG)Up$s(^-A z%#g8U6>nBTOgb!S@8*BzJ;joFufmG;h&5ZPgP7Gl6L_viJQgF9%`Qo#l5+awsbboU zY0GcA>E?3)^2Gv6mM&q*(uz&#*S_{OuDId~UzOBks)Rx9zjXsYwqNDzLm&FkuU~lK zg@aeDSfS&|#JIrs(<)Mc(D@ym;=7-{lDq!&S1!KnBOI{*9HgreMPbt&Gs|BhHcD$U zQ##N!9>rjQp3Dv!(j!cV+M0hApo|zE}H|noyt>d> zy{1!XnayQ2DiU<`Lu(721ASzpqDh>rbaGj#P(kEJEZ(*aJP#E{NbR9?2!6;VN9@gn z+FH7b1yTtk;4)|IF!q};f|%pd9|aVA#r8~rWgT6t=^9{lPahk4`smN(DHcO=VTjhy z;(3g%t)a$|G`I;+KE~`3U^cx=a#*SWgQ#o~?I7s) zi_n`b_jHvX^qqV5*&Dxd@mKlbmH!zCz#envvUt&}OrJ9KmHDr{Y&zR9j}ty|28T=? zPtqL%QHYQVr(}H$yLH_xnfp{<=ChBiny6#YBXqgnuC3gzD`K?NjVGJ$W+2x|NRdEj z{3s+2yl3VZ&Y3ZeXSeL&cS~1u^RjguKWQ|Fj2X$$M9k>+D_vzuq$??iO~CD}l1-|$ zwGS7AOrxqToke-R31TsiMXNXP{EAJuo@UN-&U#z@fY%ln8iDY`GAPj2zH{N{ zF8X}-^Iy2=odjTa*A+kb9$)*POL+B_1srhTA)or|0}p?ytE+2f>C@Hm1dJNOhy!M^ zV@N$T)fgtd3U?{9s{DPW^u0z5<$ZH!asJFXwA3__2{ho_1JN*Bwe|@00JlB; zG{3t0VHPY{0bAOQzIQG+sLKNg*Yg-QbQrl@?zaP(OvkXMCgIg2Y1`J8k0;_^lTsvx zv<%A+^bb53^W0hyaZKCei>aGEN)MURYKC1bvC!2H0Sd=4V^xW`!!K@mkjbNlbHJ>< zNy=JO2{{njm}5vmQ_6@2x#c-}hg=l$tCtq@i}}kKSi1$bb->y!r5CP1%Va7kh7M`j zvT5_?-?z37kIk90*T6mZ-1EIcF3+or7V_$%g`9TUY2u!H?%C~*xZ;W{UjKgX=HI^i z-S6_7-~5IfZn)v&rN2AshC`)*GJ-JV!11k|Gi@CGzNRKV#8^Q)5n&io^aB(D4&X@5 z_!^IC^{seQJn||c>xc9deKz+Eur*s?V{euXJ$8-HmMC(#E!)9wrVOYNUMaL0c0`^6N+Lq`R-1j~;g>#$QPi+LoA|{^qXLn;3`! z%9`Kh_+~3wZ4)ysEB{_7O?~Kczdv6n!a$}J81&59v(t+fE&7iM{s4;?y~^JE?050} z1uvPYO<>4DbNK8zN8^YZq>R~sY4%RpH)A*Lv62n5*hO+r3&$emdQjzEBHWf$N28FM zL<2FIpfk7GxG~!M(^Cv_5gasn1P6^7&a(Dy9@(&!E1!Lt(RH;PIc@}Vhqd4d#XzWR za#|YUvzj7hUyn-ct+*2F!L1F;8;YbsTWeg0|D87Mc>V22FkZk*Qa3eSdKaQa4viQ$vnNi zlkYzHEZIyRJc)2)gWFarFoU~c1fF8Q(PR10+}WHoc^b_%jY#c~@h#krBt+wsJ>wNR z^qIeU9SiP$8alcVK~!cB+u$$8Pnbx|b3eXi+t#I1r%o?E`sm*l2_d4b?QPI*UdFhI zRK!!mz3Rh?tb@7|8O)N1o%^tvgV?ImFgZ^zsd5^8A=F zV`L_iIm>aJ9furxP{*blH?Q5eaSIzaZlSiemWwaGm~VXJ8vwjs@P9j3=`jJm^PS7N z^wP_C@WK0U18)1$SH3*->Z`9DHFVgR|J}M}+kRR_S_Of)_vXLx)T1wP$T>%I(P!Vs z?9oHW=JOP74_he*fkIiSVRM7b!8VZZB<0kAmn7-9xH3Yi3_CM@ENt7(s_sr!b@b6z z2vjanUNYZiyvL0tLew(Hr83{v1&lHof@L^9KWi5`YIDdhp{yh>uAGI-5gx z_0f^(Ctt{usHq1XmPf0E(nwd*lN%rx1$b_ZKm};wP?w1F#eGa39-&Fc8i+Xw6J(Wf z4pd4J=sYS42_m0jYjd9cC_=z z`i*q^K3Y1o4P;oiqm609M-mVq5O|);ww`W&^5DZ9Hg`I6#}6Z~!V;!K67A;!zA9HX|ojO&lTD3~A zT(RtmatFGhmXCk(3??+zp+w4R_9=^0>Ni}*yA4!TDx16hd-WenpQqLu&x=!^8b)_! zYZcMZ$OLD7b3dmv*E6}Po*uuzt2?^6aq%ktB-ZernUgqt)Clq_Am=M%G^S0zJ`#4y z%Q5{UZ9Px47K2H&RNN=Ejz}e9ytHmB55KY&ClRljxDmUwaNpwgE=h%yTcGx3*hwkD z+n+D^esD!YYy@(xjVG_`Wtd zsL*&$XcluMh)F?5S1*20M7y?lr!wjyG>opVB^8U)k;}8Nql5R|{RpeOdqKFcemi>g zMr1aJ0-a1Gg)3thc6WE*32@_$H*?%^$MEpOj{q<*Ffb@k|NnJedTB)<<)SZqiOVm) zY$vdDU|{q908Py;y1T0b5W2UcU;OodZ|C91UgU$HJ&(_xdIT*EH4NnQ$dXUEHm+re z$d2xroIbDmsaGM3+PCt=rY+pJW)lnBJCLqRjq5P7F3#k-1}2XhY2=d;Z0pZ**;6m$ z;1W4b6~t%x0B^YipsKkQCeXW1S!&sgsw#t2HP^u6_0XS1?=ux*Npu*1)aDS3BqEl8 zkwek_8$oMYT84aQ^r+Df&7VJi0l?=zcM(De4nFW8o_+o~^Wrz|Aehj~j{Y8+>za_- zCz1|Qo5qSOB<ZaJ zOHmkzIWALN`PZ9K{r#MK=v-=J4mqoNptQz~AmzsR>*`hP?9Ui9`{L0HP_tzpLB4qTD3~gm@(sp<;#}?jzDT!4%w6U9=bOfKcqe# zLmRm=9KD;U{g3e8s<=z0SXY*8XXK!hUOfq~o4lV#N~g+S!jN~P2&9f^@DjXh+(=HC zG>WIUbnx>9EBNE0ReW~8SP#^)Ko# z{N(3{KJvE*R(ExER>r)&7|ygY9B}+0eE*|ovd_3yIx{(>j1%H8sv*u#k9`-H9GYY6 zK!%P&k*psuDqYX;bR&}*n{nK@F}*2hN{P{1wy#M|Oh!tY9l%}WP;s}ke&4i=Wf-q9l*Vf=UG3%3V`rRc! z6e$^9Q%hYW;Lu}lJ-r8A~FLhk!SL-*f{ngmf@)-}~P8xa5*c=6NapYKnhh>JIqCj4gDEjS-y@(x3rTj6se6TICRW#zOesHCe$}GrlE!UWF3fD zc>@Q<0s8&zM3Lmq)th*=eJA-KvcQXc>*vFu!c&*YlDLkAogEW0r4eFM(t*|{#QJUM zCtgL&oB$(R%8Ggjlf*Kr1=eo`Kca0%8;N*g7O()|r$4=xLk>PfJoD@`!t-J}2m(z< zk5JpYS-5QzdyF1SUe*ER=9#Z0X*?4Uas^l!@awYSws)sw5l}A*72#M6X}u_e^;ZQ zP!pq2^zcd}tipiYMqWcB{)t8Dt|UAoD{Y9$F*ive$XbU;Sxy4V#hlr$!tQ?o=zkZjBIUX{n~Z!Bme+k`N|jh;SaCo)Dur1 z{_~&z>My{NU0t2#mT1s*DOwKOi%(r}1|K|fU(#`pj{YpkL>+0Tflx>s9Z}RUG~K}H zTB~R#je=C96$Kp<`uQ?6sI6>(Lf|OZazw2?szJtxbV$sTBxMRn@$q+`#M6Jglb|Og zhywQ9`+$$^x8MG+{`_Y@c}wFQci(+C7hQDG0r%W>*E1V7ZPI{Dji{&f@F@sSaQy5x zYFx$d=eH0l$L7WkLJE}7Oq(#8WUR&tcG#>}3;UWCW9#Y}(U9WR?Hy+Er(&>eCv4q` zUbEFI38F@i9wRqz-gJ==q8$AH)2>S{xupF4^Uptj_ORijPH-Ik!1it1OqB2FX5fV- zT-BH3_9y3a#<2%-{t0$pck%!o_?4z+61UTfr=oNLbMJ?Z`cZ;9Vu@Be*e`ke1)s7`616d`;4ACb*k*? z>A895&YkZOK)7xT_s(C)*?aAWBvx*b8sQ)l5LBs;s}x^9cu&UG*3n-qfV9HU+CvD5 z)VfT^Dr+rBY5L2mBrq zB;=U!tsK-koaeW;asS#aAmE6xBbYm^kx)te$V{^6YU7Bi$qu0%D}(M3g%LMDyO?a? z8!@Zu#IQ;s@a-i8rHv#ja^XQ(B8}=~A}J<~8Rz_`Cjjza@g)20x4-z|53lC3%Pu|o zp+_EAykyCeBcsTs{sQ#4ksSZ2^SJxki}~bn2b&Q&6=P(>IGWSLNhDI#$Kxauangwd zo{Uk@ih&@cFYw9vMe>1f#d7Q$vkR`&`>XJ*m1UMjxUNfE?+(tm?E9Sa{cm&Soqr+L zkYMNmbIY%N)24Nw{Of&py(O!-x;o<%@`peC>CBB=Haj4MoAMa3|5&mJ4jkXf9>cRt zXelsfR4)UeQOHt2G4vVMRL?=PX5fjWB{-Q%tYmJXwV*a0W1rSmBR%Q4(4T>Ay|830 zckYEY3!s1y;(u%NXG zT*|VF(q1j021La8hC0(;(&Fup2vyAn>rw?Or3s+wHQuIBmxg4byd}k^9q__(bZ4)T z1r`PlW!#AJkE~n2o@=i7@!?lp^TTRrSjA%QuWD=3rdib9$&*jN!b=<00 zGsa{_Kus-&9lkfi>T8h^;J6mODIM|38chuj;?*$zu48t8uLZDc;IAn5iCsQ=Va<3z zTLn>LoTe?u#;NQvZ7j{DP#ijT1RvjP3dc_v#r^9xbNMri*q+Hzn{aR}fm(}_Re9B8 z3X^b1saW6M!=nq=7*|xaE000H>3uAA{cK8pBT|-)v(Va9{}zsrj_jW{W5%lg^z-&# zf&jeq(u?}Q0}tMO`Q_gkJ?N89In?aCFJJh~*?i`tLy3xtq8~7%ww3;Dz;i3t(caz7 z&i*U~zrfgG!>ILQ3~z2?SaUt~skF@?tqiJ7#GLXZxM6}jLZP%{p$1#2NS7E9^OmmQ zv6~+zSi70qUB?`@O*Q40xU;>3<{`~*DN*Y0&(PRdcXT#8@D;6$Iz{uW5m29GN>hfT zr}dMI1Th?rnw;bL9We@inxv!1XA8XV_@f!sGKw&=D2Fz|s6-xftYg-x6UOkHmzN^^ z0KKIHmaVbYrA8Ao2!e^vJ^R#pfNQR~`oAIp=iR!tl~YPgF0#S33qI23># zJE10y8b6--4?fKkvnKNKxzj0x5rOgvwW+361fhtKXtIS4LS3Y#c04+=E_bECtc(S* z79p;*8YdGwuZ|#QCraLG*;IxkOLORUVM=R>TQWfrRkPOdI5Z?7o2iVP3}oPi zr7&$QOdJhLp=%S!;X_f|cLM0EfBw@a0CDVbC-Aq2A7tFv(QMqb*;BwK zIMtP5H9R~RDmF$*wTVVDg&k)9BCT_vWX|{zytH^Vw>|$nm!ESM&#hU<(hXa<{3FLx zpG?!2$=d9~Of)1t$uC~rNN;};5=K;}G!;-ftOb_rXJwBm6k(fnXN(H4W;#!)gX zDe4Kq_=Xz3dC*+uw{`H#1xuMddzma}z+pe7Gnh(t&T#-%Yh2;d<^<>GFT4>1oWh0>qe(~hK2D4>NT;WTp3v#)adQ_qvl7ub8! zWIph&gSqhJ<2Yu{EXIr&LRWte#bQt~jCdW`)o=T5jvF_@Fl&^Cb=#q*3t1FA z@bL5Wh5<#TQQAQ&V;rM|l@HPaAv_Aj9NAnqj&yd(=4};ZeeZ<@EJxJT40ig`|D>j& zeq(4_G}W6VVOPj{2@xQ#`X~6{%PfN0c8kC`UVgSH-IXjH?^aqh+-I^ zclMT#lBrXttv>wlBmeDcZs))MeE>Z7%=7H*?%ZeFjyBsBRJ6{S$ljAj8PAhQSV13Q zQN_>}NV?2a*A`VQ>2eA2)|a@}R#I3?OSveKaUs+JMSlRt@vO{+Nrpwq5mKqLT(2SX zmCkWdP7ccZQ3v!( z0N1giN4p>(uglrlC6h0$ar0@(N+MrE#stc6ue_Qn)q+F!n}QZ_z*x=5x>}TI!gZT*W6k)o zkpoA?adeS`XY9$B-}`Pn(TqkC35BCfzdF#qU3VG>k4Q_BuHX|>r@)%6uzIuUYnuJD zy{miY-Z$TN>o)$2uhULBo!{K>>qqz9f1i_wve-g+OvcP4y-OV|Bs1inv|JvD$T`92N$<28D3eI0)aC~z4Pr= z{?!}+v&W38pkScTNf;F>37H+!-F4|yw;`&Lqsr?t((aL?C=`8)QN%G5T6zDB3H0Y9 z9@?;lm0i6!NIYrA4ILry;x5wcrKmNI~vFU(Ry2i|J6av=&^(j91xhr{P!wwR0 zhitKr{!EVTJsm9DwwbM+JJ{Z}leJs7bMFf;^3!|n=I8f5!165{iL`oSMr+l4sDXTK zuSrN-MTd;3Z(zAf5o&!qt1Qzd4Fze>)bGO=#c;B_|HA} z-OXV~9>Hz5-1@hn!-q|DU00R@8p}44Q9choy@)UhEz{V_Gvn9;%CK{#kQBorL6k?9 z$B0BFKpCjW_|vP1#*}MBdz5}_KH;xlNBrGfLTC-C1R|9z=PgsGPP_K#qmM2L*lUr^ z!J@UWcs-)A&IUQyuztPPS|{u&-(7mlQ%*T+HYK*+#vLqQvWClUxsAA+v)h6XUbPWFpTY0yF|x)$GMQxfuwga-&OLC(S!dGL*2dVeW6!?!$JgA42rq7HYb&Qa z$DDgCpFHgl@_uA0Q6b6rUG!u(lk!VlSC| zcR4VYrkG0o+3J0_D+giMe^c6c0SGLLtDz7;Di-7LF~d1_Y%2r#kiV|mOrKxC5m1}( zcx>S+?wY@fR3c^&Et?SOx0uXVB*pCx*4mbcikNheQdaD}wW@OaRMgd`|0~Yee@P4A z{`>DY#FbSmUrfYfC&XegQ<{g0wf8^Gdp`eto?o$%bVBjvb53S>(-7`>>P7zdfk(LR zzK8kwUH7wc%NFKLp1?H8s5M-uuG z(}%?wQX9i_KDbEpY+X?Mm zJicT-9eo344%xBpVj7eVO@=O%Rf)vRq=VVGRn>XvAX3&vDkdG%zOS+o{>PJmH_j!r z(ncqsxxV~&jZF>Sym|9tM;>|P5klIPtQB(W4)mrrD`)Cx>B`x&XU+H$Kxe)$_~g>7 zJ^^sePp;^^-~%80Ga$(1Ve58&_4us_HETpR0a<4q=L z>&o1-5LPwr?|d-TT!0evE5NiMEX14i>J5)jg&+iV=>$`Tw}6I$fehn^*E4!}9ZD;d za4fk^lW-lL*wW6c?VSkeS}3~Y{AUlhl5T;r6Bzjbdh_N+Wb#IUsT2-3v>El!{(&-# z+cIn@`yPDIzXkqJ*BT%ByY9GC9Ch@&)TT|FZtLyqOIjRX#A{Q0@*5ZM)$d$L7%B?I zES@J2PK45e{z511{cGqL*hn$VTU11r1HIDLPD@JOY7d}1%BN+e*pe>!pr8KSc01~7 z-5a&o&A9z*rw4XT2!t?_--f8GP*M@;5KTyg#8(lXD>-0HGlz~E$-*7oWI{!@P~^J% zo;MRKQkYf+5*-C^V+69~+~QQB0j2|x^kNk>fY5M-3Vs=5*>j)0^g9W_E>}ZC1Kr)- z54myglb#c^1%amP(fOSD;Y+yw;iu^JJ2-0gbS^vZe7^mG_j2V0@8@Tq{R|hM^BxYF zF#{=~5EPB`xES2q*%i`KC2I)jP*8nz4s4+(*N$+CxSl{pF7KK(n?v4veED|wcK6Ua zeB|!|-t+GF4tl)%?!Wi%_v+4j&#k2e9&4&2){w-}l6@zp@!S|vct|OUIWDerQPM?v zNgCsVd?8DyLL@F)YX*w#B;6XMlQ0&?!XaDeAW#J}j3q!T!LSiS%gq(h z15!vFT$DDF*n3WB#Ssc21$#{#MSUWH621klWw{#r^{cB5iOW`ILYV1}GI^`o=}l?e z?kv(b$u--%26u(EhLsyFkH#kQ8#n#vzB})F?C9f<`_84Y#*QB|Ry{WF(Grv? zv~U@<=R|&ZmOoBT+%j>VPR)KPj2aCd3!IN*&IcMIbWhaItJF!Hn5glv72I4 z1R-!liT@qhX^d)!zQTRcy3zsHdY9y`RA>oF5M}A@-%2Dxi@rt{fvb-EdN+T5ZPG{; z2S93pR05$uO3$9_sx0W_`%o8?96h0xI@jZ_=a;f%QyWRoG3&%CYD($8WdxwSmQ__- zPibPVN6fX4S9(j4vI&4j2*LvnJn))#5`bN<-rio4=@hwv>@QR4kTqFDubp zixw`Unq0;Y_l)+x3o!>A$9^v*Qn=^|)Jwzw0J#A9`4v`Ppv#UA`1JJ?6Y zftIF*^7C(R-@*UI>#|F~$zzW_xpnmDv0q80)8-WE&%(|gZhHJB{7_-ywnE|903F z4SK?)i7b9~(Y%j+_2%Fk=6+9 z5a@_VMAXJT?pn2prQ6yOp5-%0U4C691DVnRt))XO>l5oM7=L)*H_o1e%271=B6Rf` zo{b}EX&I6NnD@}b|FU)doy)%sz_6ji_I7a>Z`izvvUou{$$sxYhF|~ra?XC&!RSJa zp|wMqJA5R24{v66a~+-|S>4mm-_~#Et~Hxj(B4fDDv~lJU)V<1z$Usg+sFp}C;<}J zCS`{EVeX^t$0Mu=ncYjmjL_=pP%0o$MS2Fd6H-KKugvQ(rb87c)7@9tmE@wjWmFpT z)WQk~+1Dt9V+4(~B^?5Rf_xa!Gmz(xkH2cW4+dlw*7M=*j`~xzo=TDi^~rbz`OuMJ z{ulhR3ZPOty8N5pe&9nNx!|1yVAm_3%~4lZM_*sxtt~@Z_8U2JWTk1hqm$dN`XeWP z`f_f5?s3vF2iK8AmOxT6Rx6GCm9(zQOwB41iPj(^X-EHz=XIbJFF(JSAAkRMy!T62 zaOA~T@VVdrmbfQ*-$%}XxK}RuuKV@>UJ7vh@yEZV_t(B-M_77{L}Q9V0JFy@@m!Fu z!1W@e7vaVN97iKv7e^=@VHn81%91PYBnW&`u?8cwqBX@ZLm}ux32iJ=waJcS5wx~8 zm!H3{x1ayZ*K^N3`zIBIi*yNo>+EIqn$0}Dd@adj!hS9`o|ndS?D!8_RqR69g~hIo zn2ib7Rh9bN&H+k&XlqubB5P13EQ~E)JAS1##680U0D>T(SS4mz0UF8eV@UwO$_o|lCmZXc4;0;G@vCXMDJ zUw#i4p0E!;xbt43&_yW72RDl%rCM3F)Z)6#K;WT5EtqXkQiu7VVUU92sk&>R4!M=PU<+MPKA3k!|v?gKL&qnjF= z#c8LV_DS?0L3!fw6o(ylWcaUK+u#1q_qg=3Z*ta|XH96|**-rE!n!h3`$}Kys;1sr{RcTed zBY)+I6{iD)0egtmK1Uj^jJE6BWdhpg*0HF z)B-0{K&{?F=JENg{M}t#ckwmsd)gOy^yTF+b3$bdEAXeDeDcY^dg!5tIQWpm{_cCa z=%R}T#S7uO$aDfB1+zyxL|WiD3gP;A@et{TI5CBABOJ%Ww;Bj}KTAH!l8n{i${0#% zv<}G@x{a5*c8#KzRHjh#GzDK(g&oEJ_3M+L{?yH-xlYlOf$ki)KKUx1&_ay+fcvQF=JFhYprL`-ecnn&ppd0fBW+pYqxFvQg@*b_MRy? za4vf4SdM%DiG2S9Cvm~ybLq--a@+jps7t$a^=IuYx0#O7Dnbi~f}g<;vj}P2105tX zDs?$cGgOGsPSt=Ld1wJCFTwhbogDbJOZn7wzo1YE$%TS7tJm`VKiV?=-1#to9bM(SK4t3U^)q zX*AW2C6%b5HId@1>ErmH17|V2xq;s;TEnLvdYao;ZKe=LAPV$nx6skEn!emNqA0?X zMrcP^E9J;~vYWLbDhf~Yq@`ObjSRK~t&!q(Bx!#LhmVmzT2RmWN^eb~BeMp^(or z@6pG{ed^Pnt9$mDr~dAHx%S#?O)pt`9ta%IA#{?o)H@7Gn_Ss(0z9{f<96e@8HD5G z$Rg4aWQrlVLSR{?f_N-#d<#UxKz=77k+Fp(0wM8a49Agt@u#=&*Wcb*x|te{_kTI~ zf8YZj;F@c$xpL&l;pVVb5%l)+$o!RTZtubIq~&m_K?FZdwTr4Rc(>C zVHdh98lY6!TmB6T4yC{nzyQ5=?YbZC`g33W(pQ)`aZLL_Z{M5=lP2ER)Z7dpmMmG! z)jzy);(ZHWI(y^xZNnJIX?il~Nh3+^Go7!TeI)()A~8pD#ruxqrw`rBvuidGYBS+1 zg+l8PDI|f))6u_y_WqT$^{k~Qvz1J-lcLI_bYN>giKAut(2t}dAw8a3y_y5Rd?{_6 zoxJdqYgqil@3H3UEBMuyKh4z1lUeZ60xtN)Z*ZhbAu13kza&b`Ba7G3*V)H0`%mSt zY2(QhO<&ch|0~*ZIc{FE9__jYnk|LwU0oaPNLnfvQZrCQxmJ%pmxrA_2+&eWUU=b! zi*CI8&S2}trC*vech5~ixB}3Lq@mW{efORJzpv>D6DHvMKJi3+;x#}1Q5#5wM(B79 z=1%3@51+lMSZN6xO7cW)Rmi6Em5g$+NOmpL&7}+83qakdmsx` zN%W+2`t}YOqLvaU(2f+x-geuqGvDm{`N35`I3$sXHG?r1DhNqK+98=Jc}7JzB0xA< zq|75xmV6b_lT&o{X06PnCJ0TxGE?Xz)CHsNr8N!?(ouv$anZGZ=Em>*+Ax|0%7i@L z_kTG7_~Re{2*5u3>~le>ZBAPkes6{cUs*{!=2pS`s(knuq)xx4uV0-sTCAJ_zkm*c zvf#%*cG=evD0CF={?SV4sI;#yohrw&l`B`i=Etx8@ej*^W6hd1ryg|hf$xsTGT5DXOHyiNq%d2o}Q+)BH zL&+2Z+sCzDVN&w9wcAlbx@+LCpo5N5H1`%Pbr5tELT4}dJ{m-Gb8~p&2`2^s zPd)W=F;d~)we>Zd0dd5kM`Zt1YkK|q^-P*LX{PJAFAHlDPCN!vM)Sc7PU5>CJdU_i zOUh|NsR(7#m#RRk%LNfYpaW0}*NIV^8p4p8F{Bc$C>og7+`{Mfox(Q{n$4a=n|Wx% zX1?&)e6D+CHSGgA60%69xQ))f4fGY;iGpH9^0p)%gd|hwW+2yQ$NZ`nv3`R9UtR6% z*GULoyFYhr3kU>SM7RhNagXaCdWpsBw^Ngh4T9|dVG57s1_`ARE;Odn<_xx`M@B?U znU~*R_Kx6P?>hR_cM^a%d42DD-veOg^jW;J@Z}%vx##}ri4!M2XQ`xG2!U$v;-x>{ z&*#qn90yd*ZK6VyN8nydOR8(sS zBC^>Gb+xt6?7i2%u{ZNx{6Zli?XFagq!9C{OL-s_N(m$}0__k*X;hR#Yh_5xO0lV< zz|OwD@@6W888XFA{3vf=S&SOHB1FnK7ysf`?zs9-h=D8u*T@E-j{|P}zup2k=9pu+ z_uhN|(Ad;$J}lpdo*o`wypA9r8fZ`mYx`Q3fQrdoKN zpAl4zVkHx0B49^H#~TI?fWO{*->s*da>|Q!sT#J#)a0&L7Hc+l2qFo+z0f~^pAA4o zjBl=?C2dAZht<~;<~6k`kB)qSSGRZa!uD>S+q#oi+j>~u)5p@zZu)&i+D(#hTpU;7 zhydTu(4E^xd;cbO^sQ!RW(|d6Cl~+uCN^%`!3`H(#N2U{7%1k6B8b9}Y|&@j&=!9C zsSh)xbp$`Y`(Acrx^WyqI^pu*%PVQy)WQ1>-;=2$8YqUooi;b!>0A_X_sWe#O7Oa} z?xOOMH}@Awlvw{70^f(7J>}22ySw+k2OfOjA%F>!CbD$V(yspA-myq{@ZksN{HxaU zr#^FGL-Wuf_hqx$dK+P2(r8Y5_c46^yrWT}CKYQzJBIk?Y9sGs)EG;7P=po{5aB6< z92yC6bIiw_Bn>q~sZWh29UsGx+6E3C-NM%o-kVDg+LO*~p7Za1nomFcJR1ixq~n@G zzJreb)pY%T?7elI9o7BE{XS=AuC06ALxKcLaCf)T(n19))ZGOsv{a~jDW#>f6l;qV zw-8(+5aO?IVNhDTD(SR^gEk z2Itjatkyd`lpWjuVuwGgP6otIg7EOMK#bXOJm#+1%%5k^rzYvyf=&MA^^U z)|-_+MNpeg@ZG=M&COR|4+B{=4q5~P_!#iue|zx1?EasKLq2~h00$p*;6LIMV{1Qa z)^28V|A4`XM5qyqE|yZFR7j`-i%vFp5=TlLX>cS$YowH9i$y2}R=h{Q@h*TKo>dwJ zy0S&cSENNMXlI6Zq7p7RR;xb!o$-ETGBN%B^;0;W9l>P(cH+aQSBT$x{bp|wa}6FP)bt{VBVIk z+`M!dcdyvM3!4X6w7rLcVxFXQkWPpa0iILh#wQ-*&WGmk&XW${km@wM~aw2qFH@ zjoh#Pfl-OO@h>-xdhVHLCt9Zn!MIWEf5L%WanUJ+VVO*_g_KNLPP=2UELNIXI@*dj zxpwR!37ycI|H!C0V8$p4q)1TXHPBHrg_edXB)kmc>+AUbaR+eIJC4GYg41t)kS{zu zmrc1MxRPR!rK^7(Jwxjl%5PyH*J*;F2ym2fgb2Za1*;sFD*!-Q^%ViO#jvm8*nkSC zn<`Lu%(@dAM?2)pd4740idTIb`9e_pGT4RXR8h~H^`d4p>^VI$S+Xby$xstDb`D?uQ!uKoyQU@M%&<{7PU;lw^+qO2v zBcNPCY`OO-E`RVTez50m9Cz%YoP6w29I)3OjBRVCxu(`Sdl}7gl%anGIwUB0oVEX< z?0fwresIIzx$##wF}Qqv)r<;~$s|V|ee}?pRjY4WxoTx%%;>S3SFTvG(~|J!n{U4S zsH2X0Y0jKEw|(+spIQiP2SyMoC0>DeofbwU`4=h5TgSq`88? zph_i?X^Wv-xsF4^_4xKp_wdWBu7SP*>+==r@#7}WUcY|rZ~5O?bwKg`7hY8UlE)J#{+ukAr;sYZAS2utzHed}9Sap|QM z+vHRtNwHiakx0CA)tc2e=W{uQC#6m&A(^CR`Xr`I8^@(@KaQ!R+c@)z>sY^izzAY$ zjt(2(+I z%Ov>D?T^vc-ol4Zm_>KChdGN@vAM6niTmuvgdY+JCdA5SLm5>|57=_d{Kloo|0Ny?1pVLIT=zl z6Y;|mgQaf9WE_5S!hw8X->Lj|!7?tqV-EX|XySqyQ`x_x6-}O={2)>|)^JFpr9x;I zDU@MoX`7shYFeM#NkeUCEu899SXS9)i^_<>zTZ?b!Ho|sh?~7k);-pE%&70pk3hd7RA1~_3 zr=E;|zj^cK2QRwdJ&!*>f9`$z?Yqx;Teo&a%IX>=M0r~e%b$Ibd+vRhdmea%2VR)R zyp0>^EfjGx9;rlvhGZQHH%-z_kaQgslBQHWCmpaKGmo6X=3;?$i`E*?bp$~W(6x1I zkZ=>%3=9rjal-M(FIc>I@lLHBOQq5;dwP04o=hg)VzD?I_y{lp*MW{!CXY{Z-~@+q z80{(t6^1x6MPuu91Om@X;s}WpW{*iBEGtP_>0(JT>GH$79_B|^Tm$R3VhuFZ{xc7d z=f3T%Q=WL@iJt#~>Ypo5{#=4L*K*0*kL8Bh3%G0cJUZH%dD{WIQ}P3n35Orw{R~~* zgS_YX{TSO^PpDLE%A&OaL;5Nt<<;Z4wFpt9EuCOYeGQYE>Y3PBM^h?+@FahJViC{I zT~6!RHul(U96$Km9R76w^IUw=EcO`RLcUa>>}Nsb>B?^7lfSu{OpU{5PdkLoeL22- z-F>7}39h>EBdM;o8m6H;4e;(%2mQ`kG&V=@TFOBrnW;KEAh)Jo@OcU;i&xAzx&V8N2^x?V5G7 z03kdN_MF65KXy8&&DxV}Ax~Ypo!V5B2}Y5vxu~?biD_p`pN4B{Bd2fB;EEK~%GQ`g&_C&rt|UK0{l(*|=y0 z^B#JJd+)rT>umJrQ9FG!PrbAp z)n~eb<#IVOFgS498Q=nnoiM_N>Jl@wAa z?cBF!Ge3HE5gUdIY|iJb)UJB%Q*`IU!}tJ`j)NY^A-49K1H5wDRSw5tj3_I*)43f= zWdN?f?oW5!an~KOL|r~#q`j^2RV`)s{hidB+nZYtwxC^h0qS2c?a`R($*l11)K+89`He zG&RW<1cG9iCsYBhqp9;!jI2%a*V!+!d2JFY?yo#TH@?3Tw*~X9l`7Dn;w}j8W>u65eX9`)rWEnmZ&lPOR7Wu+` z&r^uHCql&C6k&r7ksWx!$5l|H6s|JGUCA%eH!xrfvr0aIxZvII{q_9$^B$-U{{L^T z<4!u6wX0Xr+ui?1tyKmPjA-H5w;#=w7oJKkS3*lcb7nM-@P^ILtDW=SaAT@Up)qQ+ z3ycVmgG<`2CFwPww4gSjIc8i3$4?r`<7>P4?vwLbKUCn5u^rSVprka8l4z-|BVULV zu64Q=RY84c(!bT!e>KQZR5}-0$B#Sie7PQdxgsC^`QI7H7ja$3IzAGA|C>nww2)K@ z92kYk#u{j>CFN_<+G2D=h0>a`QWQ!hbg^K}q-+wjdGn^rKk&heyB92&ziR~WpIHC6 z>(2Q1yY0Dm|BtW!{sLeGz=}I8a+heNzM4aq((Wv^Uh@j&3C=6cC-g){F;l^@^1`kx1wZFT8NCrArsB z1@d)u4Gawp@V@uGk3an351$c2d|GQQ2L=WziabFG`2yPqeX_*>tu$qfrAiel%2K&H8P;uyGrw?^Q=B2xApUEd^RCq>_Z8k9H(U*-RqYOs?3Alw0`i ziHGpj$LI3r`OCqJtb+w_N)gy{rj=CCH)Lf|9b?$yh!_y4g%zw(Dn5Ah4yWF;^PYV_ zumE86=&?+iFn*tP>(~Fv_xlYDDVgBJkG+FmUh-Z}yzF`&UAl&YcN@!RPdkJsUS7wH ziS7LK{iiXZqlJ7aq{f3kKRKWN!7PW&nnp)ml3dw3Vp`f$1gcFq8EO*shIS?$>NBIM zO^+a7?q#slM-XP|%lWL@)P?U#n$ij0x!XkEHgz0dYOdvrzrCG@7O&^PNuyY}zLQ7h zt|Xf;^8JsU!_m_w@WPr-{xN$lyX`)j4;?*|fqWUET!aomICzfa+W9N#EtQOPrk(w3 z5t@VF>dq5tD2Et0OojR>r66DSp>Gfda{$_L9P#_#|L$`aU;GiSz4n^_PxkF258TfQ zr<{8GoQEH73l-oxI8(>)jSEgBU-Svkq-2_eo3<@<9aqo8b@kuixVy@mA;QLJt#E8! z8lZ55q%kvsRHB~#d?(}T1lON^1b402z&9U%fk)SF;_@T+=eS9u5Uz&MxN#yplvV$W zD)*?0H{<-uD4?Rk`P!p-Gv2V*>o{no`OeJ`vZ-%?w3m#N=>Xr5Ne}~U^@d+Ku|?BXDDYz%s@v+2OaGl;t$td`<6LB-M7+V|KqE_AOHUBv(My? zJML-)c>B5MTyn=XZ7^A-*dzVdW6YSr`BqV31Am>-EOxwn36& zRRa=EPk^rssZO_?(3*>t+;n4zJ*;<3jZ5mVA8O`62&)vI6mu^h^=u@ANnW@)Pp z36ulM1u1Yv$WsfSV8Gp%gLj)izU&)iOJTIHeW|Gc|3Co0tx59o`pta!%3qUxei6d7 zXtkSgL(h>XELpx}HUHyl^5iM*>eXv07K`X|8A@gDp0}KHW=^9R`gRXkB}rV0xG%=&BOO&_S$W192~GM!GAG7e6{l=QY;G;PH&D-sw(F&9W^&i ze?dp>U2Rp)gfXv)Kcq5W8HsJAP{_Zdx3?!k8gStGC-I#xokwHFW9HNmJoM~RK78y< z(#Zrjf9X8iMe-;VeQFbur&ev@u4fj5(wsAE8p3foZll&~!Phxfb*(o*E+N>^)z7wUoL)Oe?WDil&uP=fanP6!e)Ga2 zzVh%395k|x&m261{YErX3<5M^MOQfv_7!%3aqLu;{5b9ssGZ{i1TnQy3rON{$1^YU z@PgIUCOtdr7Y2Zcr9nnQMQ=3v$0$QZSet@TO}49~2qKAOJ82R^7zJP*B6@~mW>H;T z-4iFCbmG>9FE4z{oS*Wodhp+IhcV_k^^}vi@upk8oy!$IP{`%qzVCiBPpYe{J5xBE zHFM^yzfYbtNz~TV#IArlL7wdJ0a3&M*6!$Xxx|tsOAjs-`kp-M$V2aYboLYR_w2s= z?&t6HQ#mw5I27{Y1|LB;${)g4gZSY9x%?mxFH4e1CJC&{l{L&n2~Axh!Mg2zy#K1} z=zi!0@I&hZgAhr1K)_&qPDaY(4QkL6it-}{+&7{Ns6Sv2zVr2W(~?S%E0#HV|LLsQ(9La6FD2!< zmg(S72z{FBQY_li&DU;tfWGcQ#*Odb%$d`T02LacvBBSTR8nr5x>Sqtnb$HFpAjO2 zFhEI2d-b%}k24C43CY@xy=)yA0HG*_0bf4nP=5cJxAWdJ59Pz}IGR&Vn8joL1LTzA z_UBe`$73(@zT@{})}+xUP)ksbImkUJxozoMw&aSHJFe_~6xv|6%08^_GLC;#<`+sE z!`ia%Q_dG*Q^gsxxvlN(|8MTm4_^GC`1gOj{sunw(T`j@dd#@Hip9dQk)>|U_z|3W z)IJ1(vZD=+BNIfv3emLIoMU>YW2e`{SJ{~ZpB4Bu>Y_%S#Hc^25C@0)bQ=yHgGHZO zPx95n_vPkuj|B(bcH4t||Ctw2Xwr^jEqrywq|K@o$|y_z$PU$_U35%g~a6lxMn1R9Y2MgAyXP z7*@WI?#;%pvTD_;JAU}XANIbL&QJHP9susW&&-A2{hs$Bgb1jj!X0?ff%iT4?6ax9 z-aehxISxJekj(Twc0a4HukQ=nws%b%?CWPJn>8(W5gQ1bV_zsbMvTQxfC>U?YwOEx zt!=jlVUW^VPpH0zxpU{l5jP%*Q7Y@*blJR zxRI266??`<5~~9RpHKht2G-s8n01*l!?FwB^X?=6`j;DDbkiQ&d%FMU6M*Y}_xsy` zuM5~$ham(Z+qd-4l`k?mQ)^m+7MUCh46j`K^yjwVH6%#LS`;CL@&Ho8#(^>e#ggq! zR_mAVylN0uH$6T_;uft1s%`71ii=eNHJ6GoR6upKAqcGTibYTd+6WOg_-D^!kCCnP4i#_(9K72IrcCPK`!_vAOGAct9=r!7Kg3J8-0}QU zzVyd?$QJ`}BwsxH2oed0LcVOSm%vu?#tWgLc8pP@jBU4_7;+Q6)lh}B)@EpFY-Dp^ zKN|)HcyVKaQ)e_#2ug$q4&Hq<$L=)|jYBCY^Q#4`IPZoBSUqmQTb@u0J<*^Te{I{57E(%4oos_LFyEBh}zx_zWEF_H#do8 z%N8&F;Kd)}x@&*`f4Vm>zv2?Excu8(ckS=_#jk%k{!iEc`JeOWzA)i;*Zw}Elyc%| zBoULQjA!zQRzl?)S!S^2Op?F`X(g1QzzL@!bYXZF;@!53 z6JrqUxhpKEBcjSmfmTM-BPA0Q3z|#*@(=^rES{G@MfAa8s=pN`*Ul28=#&-0jEsb3 zCK??B4Ze>q7R}xYE5Opo{#Zr#LxT!^gVD*Gu~NcIiuSfvZ&T-Hb|nD+AFLbya>FbB z>^HyuwGa4U+~ltK)|J_(pMB<9;B^gY)~sFks(*L>`R8-fO-7%+t)rcq+FDkxT4gf! zQO$@#i0<_u z**LE_@wnrc{`D_6K5@xqm+9b`tf~I14_YD29DCz7 zXlq1E$C{h$sAv`4V^zsF2eS*^^WEo=iShMz{);p+-t!41sFXtt7n+N`+OyWVpt< zc0zRMQj8 zzg6;)#PK1&I{4_kW8cwkdEy1o{i1Ud{2 zSW5`<#UgBp6J;@e{Dhk?`rrrpKl8~?{hw^aQ%^mWd+)uMyYIWl`Qm53F!Ic^P9OK; zf|s89)W<)$!_J8sOhVv!v`^|FlW+|Y#4+QRe6gQCEy$!=@SKE^UAAthaeH0r3JA^y zcljE@e`j5QVUJeqnB(f$APTLBq!$9M2}1bbjA`uK-o|I|dxGQtd^bNl{!mVyItCR6 zMow4@>n$MBG91=b(-EsdhjtVo(L!1yHy_&G>OcJGM?VS>2Y-O`&V9Qc(b4glI1dd1j{WF)Og&;h z^oA`2dCjBC8%R2e&hC)ASI^{&?>dj9Bhb<^a}|UL>e4Chcyb=U`qfRazSBG+A;joW zqc;o``i}&51^*pZDxI#R0e%Rj659sz2q}z6ime7CuCzuYg`^bb87OQgTN<#zUa_iw z$W#{6pvqsDmRJ?4zY?f`o-Cpi3|BuDX0AvgfyfsOrPK3lq7gS^ZTr!zU;gr!R{?zF zqaQz4D1%HuNDe=Gf0`Ro_<@ncmeQeE3^;Ap6pr3^3JAFCiI@4nPyfc>o_x`O4}Hb) z`%UB0cN|Sw3vd-$86AFvaZmJQg8Fp3(Mxy@JyoGhzzLM%W5*szrmhhLJg{Is|D3yk z)|$~Y*N&s3ZW`kn_hmxMG+tWY%ZGmXPX@dD*>BJB96fUi#XzBjV-)|jrq*+LYI85Q zE?#4(m=UN?RQ1;!5L^2Z`64(HJv0cLwT%o_{iDO`F8$?|+i-J+S~kgrs8>H?)ROgeYyy+01n+ zE6t4sJ-ad1!O#gk(3*rJ_{E*ia{q#rG}YChqH6u$U6ICs1^!Vk$L}pp=HsNkdP-r8 ziAq5L19`9pUwwUj&)jgs4SzcG%roCoXQ$j1K6buNJmI98(PPG5{=hx=-3mNBZQ9ho zJ@wSn6Mp+!qqp8+orFm*y zlIvcW#Fg*Am7?go8|xbOf9~nI-7{zI zx9j2Tuttm;QTdNBgiui~2Ug0zq62ItC5fAXLL#J#bW8wL8dmi58wWID+o}K33utGs zW^M2YUHt|~7y%KYVnv$jM>{U8*@P(O!Er0E6^7=kQlvuDr#l}4LRYE6;@ z_8d>C9GH2r7AO_q3Ps9ux%^$nvB$)b)`Td4a!5@o$*0dcgzsN;B8_!vloij>LZF4U z&PI_*Hj{KSC>^{y)hq&N2}Lm|F?GZ!E{lHu&E)J3))O_oy7l-37BaXN>_z00Jp*Qs!NdVV{ zRh`he9X*t@KKGh(;Nx%WGZh_(#>U3}bI*JGrvHmQc;`Rw;FBN!)Oq!Fb@xB{VuSwa=q*}Y>a znmX=u<;nqR$K^Z69>~=v9?WeES99^*PtxZX$s`g++r+AwT6KNX>9l6k!c4P_<6p!U zAS9J^xa+xP+&brF>e3!4Wh|Yw;>{rahqYd+FQc(km3jscxnf+k z#`AroQLU4J zdf~~8Zb*|YnOUqv5~`3)!r`w=*Rgy{KO`f0TUCXvFsHU&--QSj+A+)l(KCo%-w7Sf z=yVdP9dg+r*xqZC3+V3de&WU(Z=C&~+MU?OKg2OlLJ zd=(;qGp3DWY-2qixN|lq-S7~%op%zG8#83f{wu0YRmIVlIQY%%ARNkH`OOQjMN%jm&u^n~@{hacX1%PqIO z<<8Ds3BYTtv(G)J>yd{Z4tjffT^l|U0|Nv4=38&s$B|M`nmCd16DIuh;YS|1=Ak){ zZ5rtB{{`?V&}>_}k(C>|*nQjxE;#xC_L(%A$6s8{S%>XKf3}Q}3aK5G09Px5AmAH+ zx`Qo`JP!les4x@fo_pT2GxyxT|C?7`!8gBg`L2huvp}TP@J}hwo^lLkT}O?sh!iT& zggAH=+L9CqE$Jy1=^Dx#0U%XPH`A}Isv@wIv@LxpZF^Q4+uw~{)=E_FP;i8?Xq~n& zFuidbjA?_qI)o0F>!yrzp%w@knhOBO@xU|ljOIbYGb(-|eEw}maOfW67%UcWq-A1gf$L~Gb0z-t z(i(hEA(Ufy{@O^i+BpZJYY^R+LwgS3KrUqV#2=%!YR{aNTY!d_BJ_L;GF zZox}0{>S#+kACponr~eG&Dv2TMsL0M-g_gmsQ^TxCdKIer*YQ1Pv)!>_Ge0K6QJ<} ziRaXlb{j|~YLLnRkVB*J4_eb$GnSOwfG4+b@%|}JojQu&zqFi>J@^c#Oc}#5quY@5 z(A76cCfQ6wrVXu)QB9~r99wNyq;spLP*EN%c2*LLSG50grGCmm-p<4A-o zFJF5<19_jCglqi|T(tHP+OfdfH|o)$hqX6^GS@szk+T%U-8UmLRS_|Y?oQD!L#_n5 zeDqn+x7>2eY3H1C4!7Ta`&;VlbasW0ov#y4I+1_gdDr6Rrk3NgLxbaAF+I|n-o8G) zX6@QTfKNJ7e$I8hgMz@F74 zFW}cdzZtb+L;PtRIeOGX&p-F<(dV3VF2DWNuXjC^S6LmcEg$Lb?imR{LoJMK<&)dK~wZrZ(+y!oGXcIWWlL)$5GBwrktJ%Hg8pX7b5X52ECU)}%L#lO#_{ zZeF~GyO(c{$rr-{hP2h$x-O)$ph*b~WD%RTn#8LnjY=iZ0&*KR!}_h!wHB`a=?~w1 z```cZZ&POysU)BH>g9>MZ@>NT-Cf(S>Fe){13w9msfX{)M=p6kmwx#IPM9^7jO(F; z6iKI*hV%$(lg+qJ0#s;_{Z<-R+BUw{3eQQAPBamOE(yoysBtaq)!NKs8@jk<#aem` z0plA})H)>wiUWiw5;BP+y~sz^+&O6_Y%Aj=E1slxfD2e8zSZ3q!l;(^Ww#LOGD0}< zbI@8EprO@{h>-UJ!{8{YkP$T*PMtD_`P+K<{k-KIG`gK}4YibYU;(zn`T8Lemyo3A z&^3_bOMkeRbz6JLBoamtS_`{Z93sJLU4^|dJbkf4vMnkdBb%`6NG@0@Pys?2+)3OC zC>9Z|jnG(c{#z-MT9XbVDPTp<&>(7K7xWAO=n3P-$^L@`RjmFNq z-hTcg^In|y36PFJ!^mb+^;t>LO6S=p@cqh`EBiE07|Y2=9)MOMD%6xhzv3rtN&Q~J zV{=z8AHM1uaxW}G24U2!zB@ZKbS9vdEnB+lfxO15uc`Y;-$1`j0BUHPHh~YFav+Z5 zTJ3K0sC1+t8*O`GRLit51h=_cd$?=m2IIFb%uE`gDzm{?v=J-Gfv~e_oh`ufjTIDe zlq6JrzlaW?&g~`v04SEAwFyyE2OBm+-w?yhsrQ=(Cmlq`aWnbk$w%;sgLdcbyN%XJ!DW>O?v$GVyc!cfPp z{-)Z|q(qIuM8twcHVu+hv@>ZaX(G~TH#|K{3slsklAOBVKFpjtiP}sC?Lu39hA*9a zBo`jHpY7UM;EOQToFfI@g#urnJ)c|N zphvdi7mMf(TcQqt9y@ll^QS-j=~M6j&mwiVxpu#Nug?==Oq+4tKM8dfIH>N#1 z%1^)2G(Zy?;+u3B%x@!K9zfz)GMtPj_}XG*OhRor`&PA22tio|WSj)YO&G!at$qCJ zg+-h=c`T!AQ}{vjxsjH-sABqau^jTv8y;Zcx^1L9*Wx+MYlhJ!TgqU>eArn6psGKY zXe0GYMd4B?WBrYeTvZH%NEGtukuA{B0D+HCkkaPM1xkei{n;!mUvECMAkH}B^vf15 zeEIRW;@P=t1n?T`z*z@z?H{k%IC=6!RfkR+w#6TiBN-lrBpp^O63=^D;B8uzAEX=cp|A;XGYs*nh&Slr!*ADW6)DCc#l zt_f{|qXvW{jbKwbG(sX#@*zb<93|2LkiuXEq8BRpuxT5*x!zdTMn{>OL?1U34w=q7 z_L{`k58Z>tM4Ce2$9AbL=^CcC)gu*Ly!RAB4QmJbS-7pAhc|5HuI1~w`T6B|nG^?& zZRXU8V>xVGJ7XF$=0_KOLg~;ou!erOo4Q03sdOElmx3U)Aaer}R2I`Hg^W7_T33AB zwFci;NU1qv-vc;xzrEQ&21rD?4_}0 z6g7!P+bJ<(16r6)S7fg%;;~M37r?Zsib0OSVwctUe}V&=9y={ z}$W<;(ow`&Z)^io`%W&!xGkj@o3JzA#tS?lzUYMuT)Lok+x@a)E{w+XrG# zc`fwt1L)Np)r1XVgy>K}!Zo~fWs`zPctuokmvz+A-r+?zZ-H^6VaO%`HMMZ!{v>Da z&LQmGvlBjTyoDJ;(*E&^7q=pcS z$fn}rrnN#yVG;y9azQ^^2iFm(g1OI1g4DPgLdt-PmOiy^lBYYj@z)nu8=Qc$9T+8I zxmb;WO+D5_LB}&)9jK~=$^OlTE~Mk4@&y2$Oee%uSAFlVpa1-4`SFi``lj~UcfR*s zKK7B1?U6_(9#a}G9wfKcalpGz=0~4;2jg2B8OZhHx*1w)#*;}k5~>gffmSkZv%hXB zUu}5)A_Of15?-1y4ZG1-+|EF*lgSM!?l|{&Zg^=GpMKz3PMJD}_wKbDNw-9Ib~QP# znZ|SnuA8=1xCedGB3M^6~qg<_~8cMvapp2+K&};7Wn(N`Cv#=ehl<#blBR3^K)5_^&(a zS4IMkj)Z%J0UIh}v#av{K=f5On5c`@pH@|3A7RFB}JU8_z`-pTmzob_N5vJW?2xyA;A8{)Hy+H3bpkhh`!ul_nd8 zoO;uPY|j-DQrecGif5@i2LY5em;v~b})s(Q{KP^yp%qkqS-!g8(T%J;F9?Y?% zdypqLZe`{6AvPBBw5QX|8rj03V_MjEWGn6I1bz@wRtn)HNP4x@IQ6958l;=BYII@T z*{HN$H7*V%U1Hnd3d%tqMR%F;5_$4%o+GL8lq@X5c9HsJs zarVQiTnS|=Hb)4GWyM#nxrLQ?KW17=pxfKp#gRuGarn!NUhWg6G1_=`dpo zUpjt2KDpm+6ns;?ML#C$E*RBYX>|>-EoNdz$*8ql4i$c=2sP9vJtj5RbIiCAoIHIL zr%oEp$V`S6eSO@xbR9Rnyq1@H`e?05Gpa5_ohQhba}1OR$d~&mm5l+4bkjJ}H3xKL za3myw^4U7HnsS(bg;%?kVM0m;3et|?x`nIx=aNozqRNt0%ZPXl`7&aCpY7O~gF9}c z_h(`AwwUS{U5isH$6=|iuI}`no}TS*W`B*FFkbZb_OWs8nzf};d3==mi9IIrkpR`v;N5f=1nXs;S7KLw>AZ0`aeFHpwlSo#Kj$Cbmqm&*s$p(^MJ-Ol# z8876d$zz$?P{S|gE#vVG+c;+Y2x`3)gQWoqK|dkXHJY3f`36qtg*3zkT%i?=cNi=qb0f=mY6~bZyG(u}!1fJs%YDK72{rJ()(r7@X3Q|gw)(XE=Cc9}XYSl(S>tr$|wr$z+jf>uY(boC%=f5S-&s`&c z*SYrCd#~+UIxJrFvH-z`Idi%1#Ra_ku%mIXn@UNFeu*&f(ZWLtO<*R?C>`QRjT5>! z35UNwHJ2yudj|SV`%*|Ddi#3M`s+=9UAF6Pzy9^&i}PBFW#68#k`WWevftE+jHyep zN7Hyht>`P{*;?>f)thC}wq9;p_#A_Q;%&Q);iCua&YmreJhOQ#lmkR6Wh6`0s|5L- zwjJ$^QDdlSjx-g5h&%;J+z*3 zP{JW;s&yHdcE8XTL9WsETGtO2xpmQcLNCBk4xuneO<`$Ys1SF{097u()1E26PZ2!m!f(vzsel zDiUt%i#6LPO`4QD{P2T|*Is+=TlW0i)d6^&Yw@DRJ-KYIM=5Ui}9Ko_^W1pAd{6H-7myzxjtFqSgNKL8KNbPhr8)kzBe>}JeMrd!o-}f#P3bff8)`UsR12p~9mD(fp30QQ z2JTqCmfydyoQ}F0?pd{g&TP&A`J(x}P*tR9@ybIms!jxeMOnKNx_S*ycumE-hc#dg@Jtr}G?}_~Iq(ez1L}lI@8K5955~frvO5?*gE|j9mvr2(Y zRwW_UvRDD-&?n`!Qj=(8d}E4JCXVEt`%GYZLmdmZ^>f>j^~~=Ypd19$cpf#LhbIMv zAWN>$PuA~4DWAbY4>^Cp>e1_pvzrA`iD(QUG)dv|%lXTgvvxB`4{gU4=AIhbnb(&` z_vNj8ETA+MQk#N}TcK|dkfN=vc>qC|@B59>?Ho0F%@?NhgwgarO&@p<>?=t$5PK*Clf09!h=z$4%l% z7bzTslnmszFjVS7NNGDMBDV3Z7-NXxV7yorP{&S%v8A<@aum@X5E5U7%xG@{Df!+* zFYx#iOYnVdM3AD9gx1CkD7Nw5c?TdiBveQ`(DZlr5iVP0*aAYZeS6R4^XJdMw|23>Ln-@ zqph9woXm$l^O-NK`@jb-+I6E}=lZ~f7mXM*X7t(7X_RPf=CE12p|pe2AxdjP4dpN- z9|ZIjOY{{=1X^?E)KT1i-f^5iVyjtR@I>Y#bGTN#<`CFIFT^DHAlk2 z6$UZvM4AAqGFuHRVm|<+5-@cF&d3(tbI4wdZ%9{L0@!(~j+2Sl*WLaaQLs#V7W=ER zVc1F_Yg2_A5hQbfYOQdzLvu|BEt%0YW~Pu#j-$mJ#nBTd@tvb)@vD;$a;F2Hj@iXy$aE#&>d9n5H|U1p+S5t4Bo=5OoaFAGER0xK2LA4 zNQ0X~;!rGS=^9u`*U&}^ewLwP7ej@umhW#8O(R-mrFT`->eo>N-XPK&&c;y$iMcU z%9#JJ9Rb@0%-;pdex@S|tillvB|o6t-HXVTKtN3wmQQwHvEb6 zhjAkjEwxPAb3EtoHkOhKk!tv1SNW20)n%+yl@)l20)A+}w9OZ6_dr=e6)kL#au6CC zYDVFR6k3P4LXz}q$z(=QpP4{yW+H9%93R+wB4)vSnA5%EdJxL`_|7*Sp^H-i2>uPd)bdY<@r@~dcH#kyZK~z%w>`$oJ-yT?lkp|x{T{l8*3p;iv{Nr>X7H#AgGHNt zg|%xoVME59ol3~3qO55va4n)&4b8Jpxcud@`TYDJ&r;`lxNgMNf8+PXB(wSz-)g)E zG)>7g35dn3!dT+l02^fxnx9)P!InPT$TLYngzt^UFu80F-Q9~W`+%gF&o7<*=BVB&9vR8vwG#qeYM$Rnjqw_x7^K|?)4-RDSYMIOxYaljuy5{t8k>GR4Q`C z4R^uH^;YX&kVquNGtWGoIr`{h+1$B)*NuJyYkP0Em(Ar&mgTzaeaPO7ZLULw5re-1 zQj*Fs^Yc)mkvO3yM4}bs^T7_out*5!^_6MEsuitKN!LUG*EJupLIJUG4TQ?<2{1t} z2xC(+YSJ*O2|c=%&mA;_hE$RusBpEb;~%!Ov|~5fXyaJ!ymIW9jH{#A#0AHi$4F2i z3Acv2REwcQ3M0!aH3&i^63iM1^IZ&i#ph#FvmDE+QBZNU|7vthy zfA_oJdqfDKrca+f1e)HS-j{yy)1N;1u}^*aH6P)jhaT>odg|#NhaYytde?FF0}tJQ zkU;I>mxCrt-xGCX+xg7L&t+6=+VJ_6scNMo7|L&F+rV0s6bS89(M|0$(z433_dnxg zr>m@Rl~R^|=ODFX6ze1eB2QThlEUGehtJ?+2kpVxx6Nku+HKT$uAwI)QM!y0f$dHh z`kvW$VccOdiE3z0zED@3Er~{9kt!x=B~UoAb+gt2rCn-LlKY-p#_#TW9wh@ivX@mU z#2dT`(Y}skh3#ia3Qc1sO|nYoK<=;$L7{>GJPF%+pj@o{U8t*6E(N|Slh0-=j2*2R zKWRc<2odZ`0RD&8@}&l!H)+zOm!ln6nzxD{-El98h@KLmy=?2%n576@*Wqu^z0Au` zz64$UQSr~a-}An&0X+8Dqq}bK>s(*^>X!kSK7F@mqCvPA-OAZV>_x(H<2h_x^=d2? zQzJ!SI+~8c5dob;d7jv^4IvZ5+K^hj{=@neMP16XDuYhkO3>ZCh}E5hhTM!Ul^|4= zu0dNfw6!p6pQ)TSaTM87+2EOkLO3RvXrW?x;;0K=d5;1WTD(AHDO?R*&{Z+ip50mm zNFiyh8;j$3XrV1l&Ak7px>5)NX*vo?nWnX79AldHprdXY38$5oWG(x&w=li6(bBI} z)ySe^p{i6!MhKqV(9IuST82niE&sUXYs7(MDWG9{-aZ3%VsUH1UfDuCMrm$p0AT9W zsbbl(W&66W$Ki(`xe4GmzxesE$1`Tk7ywQ^_0(oBkvyQkzrTF%y?1YY@~J1r1!178 zyE)W&(9y*47oWj#`%R)0C|sc}OGJZm(fAA&wy|wsIi;XzN9QK!D_bj6Y?c2L%xfLD z+~Y9=kE0xXNSN2fS!p_~zm$E91 zXhFhpd9t$$zZ_albXA0mBj)QlgQ}vemWYIB_JCs(01F7!E7v1Bd%+Wi`e^~6I4*i@ zJB)1Rll$$4Qod=OMwF`R_PwnpvHu;lL8F6vcvm3$J0mk&ZLDLAjvSin$C37GE7i47 zR(MAtaIIO3@fR{iN{UeX2rWo?b+puurM-SSuG@egnpv@`YR~E_u^=e~*&yKObC=@# z678s0c&-ZtjXg!&a$qWIb_o8lJ%gwSCV`qUV}=8;a^*@5Fm3nUfBDs~d}Y`nz1#Gu z0BqW{iLqnHUh~*vkNr&wo?o(LQFQxOb99YNBOmhL8y!XaNCV$0A<26LT+gb3kP+T>NqnBK{JTfdhTCFTnioA0BRF$ zAuU)?Vn}xe=i*3>a2&3^?*)E#`_o9F@LUJ9z(M|NR)pC3JsNfk<78D(n@W;!BuX2U zLX=`FT{WoC0!k$_N*l;W=4-b4SCs_7;v4*dEMjZ7899L(J!&+c`uHaw{qRRW{FXmU zchLaf;QI2Hzs$^;GkXs^;_&iQPdu3b7<_IK*FF3gm%Q_IgcNq8MDsC;bTo4ot>J|y zUqTM$P@t3Plt^bXH`CLjue(;2^7Q5&e62vZRaR*`1pZemP$Da^NaaUpLtk^GY5zN7_)BPwUbq};Q;4!( z0US1DpuL`br;XvjQ7vSB-_oc;8}Ko5!eIU^LS>7JDUYa9EQ=*fb;RQ~Xl!lU^9n_% zH0^a`sZX|`l{MyxX7IMH5$Osa5Y}BL*C2EJtlwIShD5_h{5%N8Hzym{3^H{dGw@<8oG{5@Q z&pvvaz=~xn*=PT~uUxWd@dce*IwyxgSoL%@G}dz18HaM(X-BZ< z)G;*Fr6?niQqz=_bfh~N^ou;RaT9YkY~_g29qiH8K;94VwL;<$>M}jKt>nu6wAM`| z<<=60=6S}?Dl)Q(@gvG43va4^v-5f3fC!MKHynBH8=uTMFM z_ucaZ14YGE$L!5OzJwBrP`gNr5sCc+c1!}|y=Rk31VTx)2u!A^ZCl^*aHZxaw>`tX z&o3kC$zl6c*?aI>sgKaQ$_ct+&n1OMso~6knpA?6=f-N05%Cfo$*^f0B&Y&T5E6P4 zv8kdVVdl2P{C}iG2YGZ~A7X27eAD;ZYp(-0cW&l)zx~~=1mJ&dU48Y{ocFGGa_h~v z?B__iI8;iLD~j81yN~ysa0m?v7hizX0YXTW(jhK{zB1e_#5r@NE9co>8-RXRuQl_Ut-CY?FdH>J1Ae#seQHJ zFXBuiE=ddsN*V?LSi9h8B!oF^URZ3cY@?oZ2eh{Gwi#1Vl#OddXe?|M!c=IHrn{5~ zCD2l{qa&)hj3}VkYqNU#(LowXpElKW(2#CNh01{NB7oXXRNo>YD{?V98qptJu~Jo9Bk@r9BwdFMgJpj7{1Vfw))Ji1jxUUDveb%(zLFW$sLFUn+3ON9 zv>rsL(R~B4AkuAr`^P$fPrh)KgCIP5)-nFLaTEB(FMh`7KmXapKmKt?b1I$Q^3wc; zfTLrIn$W`OXy&AMpU8(VJehqbbP)PJML#ej6%>w;)TKw#kRHKEr5RDz%F6C_+`W1W zkF43u8M}{TY^H`{Xml5}3@HT#I(wJXR6Byk^hi^QDrMN0HW3vv0`a9V>W6Qv4IUW= znePjb!lSRSm3%&DgMWyKj(DMs{IyaPghNZp+bp<_UHj>IA0$A5pCJDyoiG9fKvp%U0tEYu@jd)g7D z@YS-s+U(n?%alx~NhdvY7$RP!br&VS6w8D{L#d4J9UT5o1Iu`@iLf5X8;fZ}*VVPP zwc>#XADH*8Z+(kPFTHfv2;hHl-FovaoPYj#`LW~2ZH_**>z-T0qw^QzNC$yME-OWS zO_F=(FJbQE3m{vHlFVT2xCzezTzTb{yKd;~T&JCO3IKcWv(L){X=oOX;QVusqa~9e z^h30;CO@!4@Yiw0tx&kQEbi%N!%*G?X!-Agvm#!y0#715$M^!o=tq5l zDd=eAz&*!v+QgBF&_yc4(^pzp$s5MOdwr+^hw*Nt? zfQ;Knb9$`F4@`A!$gDWv>x?@tK)3IABaW*T1-uU%a%O)dPcgjv^^Nq!uWl>CJ6q zQ~y#*LCyjKEAw(~6C17Hc<>(|$38l505PQ*ChX%YP#pR!VvLd6ZI zAHj>=+xhdtHDo;7VY11dmX%;g)ksH(>HrRbaIBt$1NeAJLAFrjTYr6=TOVIaCXv92 z`~m(0pE9&*uBnLopGlHTr*@bN?ChH*It;+~4L+x50EUKZLs89I8YD-$m>^6Zj zkKTuTF|gH8_zFyMb&K2}oHfExJiDofVmUAYN$Y>(L}K{pKsspGsm$w9!>&iP)kA9w zI`SQFt!G4gBgIftpMXpzMWGZ>RvKRmq}4zd@f=hV3#^DLT>)KrzY>8`QJ^u56Qu*v zZY?bh6OcG2C{$9Ho#y}+Z65L1l@6_?t)_cu4aM>xQaTn_Q5m)#C}=()70_rz4eB5zUD7&kI|&^S5Q|afHixyN_k>jz$JbKB1EMewJ+m ztEfx1P+!wV!l^}tWiz4H;!OpAT~(1wprnfQWH-h4OzWthUFBDyT@b!??b8Hdh$|)E zJ9ZYIe`p@*gy5nXQ|K<1ETbSq2^n9Vs#pk`BwGk0mLna6Htv+^RFbt@`uM>ub9i}u zHw~GT9gS(5@VxmX=auHg0zc!CNF@#3_FufX(i&ANS^+Exo4Vr9eT)#0fC`P*M6rnO z?2a%3x~8U9ELpPn;-{Z}`oG4bWtS4*zp)1T`yUI#@LZq+t=Z7m&+#W7!l>p(l+x6v zQrtIx8Na#VE?BcMQU?+5|G)>&n>Y7`rB_^W1&=-U*sdG-2G&c97N1!z7T>0|f&3o# z?h|?E$%hzo9oy<8nq5a~eUWW#RfsDG0pELO5q-s?Y1i+x{r!51e*MbRNeV zXk}6Qs!E%k7zI7N^QkM002C>wmX7Ahcp?cxp@c>ViHxX;J9+;i;&zFOr-c^KJG7ph z-;ETm6}{3i;8kF{>{>zEkvy}xm+w5bkdmX3+NnTfg{jJfQjFYQ#0dk#)z%p4-%t~3 zO{l6I8kHTZEM5&c0|MN-ZOaG3Fx>L|?;fS8xs75W&z^hkx$T)}pFPv}{pMKDIg^Hc zcjx0@zJTw3;tZyYX+wt!Uj?8{5~GwN?bb80VG5aKqfMTS_^@%7Gju!S=PaN) z8IchjFv5K9zyI7amURzu=%`lGu18rIdT=q!k}vfkw9#2Gx72_w-;hgSC8Sy49c<67 zr4$ybTDnyZjdo1nAkhSNPekZ=L9OR<^tg7u`q)c!q*KgjZK4?ZR=u=JzF3Hu@+t&4 zDnv;Kp+gj!nq-0{8@6-BpC4x3wgJ+fG1ZbPL`lzRq*U!OZGSIbB?;0o#kTVEwf&51 zCCO)8R3?R|!IJ`Mjk1IV^G01ir44g2^nHqjoKfrSAA;rUhXsFA5<4)m4aT;^)^1p^ z3Wl-(qOq~z?n^Jd^mh+D@Id*$;-`LBVo<4+|h+WX$5F4rL)QI)n zbR{3qo&%n=ZBhvhHL(9QnA}cg^hl1`Ya*Z9cPdjGYsiNoJ;f4R2a2p1$g-rnm!CYp z2nU$a-pm1`+t{nQf%=ru|5s&=BMjwKRSV7thB@;|GdOb3vE+&&Wk0YpY?r_-BbA^b(@I<2B$SkB6?Hq5 zF{Tlr!7jK89RN}jBFK2PB|Epb3n<0W`z z=|--&aSr*SPdZ_=5+vr{8BKvVSNTVutC-lMAz$N>txJ*dE!Z>+5&uF?pj$L%;vav1kma3SG}UByY0X9!E?r|>-|Xjh=FFLo09^h3@9w&JZ(!a3 zz};-!(tFynm8;^0`}7kJ;;4Og!`C_%Cyg4G!cyn7ig@!DaD^i6IQ(P9x=0Yu1~By| z+mjIwU&b}J%`z&IwWFHh$bAs|?Z*Cx?#a*3ID+3CwLjzPGYpgh0-z<8Vc(IBynD|{ zeD|pR`RiFn@RQ>YWY(xwHudMZb@^IuS+<#H*LSf#J4nCpqqN484pNF(emDOAD98$p z<49T?Cz6mELggcHtecuN)JO~Jiz$P)+SaIHC$SKcTzQcG>?T`@8KuG4 zl2Y);g=<)_aXSdt%#`@sZnA6|4eGKL&Ky3o&fa#q4{*$=zviESrjPc}(fenH-;Sd3d(4#ps zj@G(K<_?BoOo!A$;AnxXJX~eKaY)PX(Z;4$3Qb4t1Tx7XnYWV9 z%zlBz-2=F;gDYHw@W}c7Z0lV{Z*CJoY*HgFwj-izvxPR2w)r;y59$R|QTe_iSv=rQg*YkzXeDZ6Ba8u7h_RK9k?x|2R)R{2Y4y764sW zTPKz+UpDKMQ%)(aTD5A|4Sbzz)~s2gv$GQfPiC`2=G^LN>(NJC{)CigcZ#(Mm>>)geKvo$#~6_ zv|vmPoHThPIbZX$=a;dvcYv9r+GtKX6ho6>75zc-<$eMckZ{sS$3<#MXr+{mdmr)I#3EvYm!>yX``+wbOnnN<@HEGUv7|~?3=y#@~X%~Le$kY{C@G`Mej)@ zQr|3>OQv%;VU%G5EL~^x0zl8$YmffF-gNWl&OiTr7A;!zUvswZ>Hz#3>$~4IRs8g6 z(@$|->%10*+^Oh73=Ve5opM<2j?3u{LPsh z8pM9&Mi$Yda6PC^z&=wLci?pXdcm>0fA5LZC_ym{aWqDXRj62|G&-D>)~HYsgdrtA zq*M+NLQ$V~m{?!OeyzZJ#6k> z%+{f`l!IPe;ed2e(gM4{wBLn95r9<$jAY=okQ7ypt$i!dDzFHD8Jn+2Ef7i&N`p49 zO}K0r$nk}TUNST?X`BaR8knUm)aOEKi&eS?uU4hlHnT=U-beHp0AMneV%qMz)d0Az z>_*BIafN3og(}uvKnq;QK?$GjgXve@j9-!@t>?*(+NHO_GFi0;lhR2FI>2AXxCkPgL6PrX|)+-yM{@l_~ylD zpnW6g6KO9=A#Dp(*qNa{z$3t%l=PGX?q0pw98^+Ru^o&!kdklYqR^3fP^e;RxtWt& zTi}t+oP5+wesuZ)q(qXO?;~7`ND{(SIF{QUYPCaZUg=IKtHLL2(25TGw3MV$nh}{M ziYg%Q`*at}Z0arHx*qLy2{NurO1LN;kj-x;U)+u>)6`{}sqva|Ws->0r*s)9TpJjy zbh7jaRf(>FRR|fxI`Jy9Keqo;N`a%n6Ow$W_}s%Uku45_o3w|y6I<6J1)i^H9|};? z^1xp$0~5mNy4Xl2dj?VYoDCdm`LZQTuWoK_S>4yu*Az+BiOFNw^OVE*M5c%9 z&OVIa&Rxxg|9par_MOD1W=^yN2^Ep4aPYos>SLDEf|1QXMS&y{=W z9o$5qEO=FkIJiq`#yYWvKcKX-dIJ$WU`N$IbJeaks(F$Gp45Enh#9=|&ZpS7qk+kd z4U_^!r~_QB@e&>{ukYhKe|?Zmy#;E$1R=h8{qW6&l#0q<#PyHR2O3SJyv;5O}Ujp=yMt*KCQilRall z>lM|iV!IN6T`O9@yY_c{?JHm1?}tDBapeyuj^v?d7eap)d>;^^p}tnn*mKYPlTSah z>!!WIHKJqWTmcD%;ecQGp|jX~@<@iVMLXZqNU39klwlQ*ML=sHiR76rJ*?k0012nk zDy*(J-bf3;_R1s0JkxSD+V9Csf)BjySU!LF9w;F12PUXkK$aF*(Gp>2v7#bJOcggD zgWo2urRi!&GKyB-a0JStWHI$Az;>fG>*}|l#4==}$f=xCfuU!j(P zVke(DU<$KFH*(42FY^4R?R@>veb|3=69Jk)30zXBFkm3q&OoV$q)3r)Gav+hP@o(Z z49i3q5T&qsBSI=8^s{4WYz@goRgkSDG!>r=qu?kA@lj>Tq^3r`c);#_W%hh-IQ7+-fG)g#@TcCL}9J!dLTLoX$*7BiLEVF%Z02TNk9Yn$; z`0*G@RKJGJ$*r_UzFekIE*W*so*_Fr0u6pgd;2{?h!TM3Rg@TY=k|zZs%z`&#NwBi zw(POj?qbQJrTV|^Y~3{i_&3&--?|EbTW-7cF5kDzkfu8H*byef?$0Aav#E=v@{>L3 z5Q5sgA`xnoH1qY>46#BO#JUhrF2lBXD=>c4xakWQFM4;WR50Q&?ah4o$`5kMdrrX9 zf^5+TD}*d6!mu>gj-{o3qG_>fRpGQ#oqWkRbvzD(ktk{RT}VT^owl0E^!cz)TRk_O zaX1HzY~zD>J;hI+U51p9aLq`_%)A|h(v(zzp;8~&VlSmIPpq9QlzC@5wD1ZU>+cIu zVGu-0d%F5diI^H1fiblRQPPe&q@br*;N0EEGpV7TYZk1cIg=q@_W8*_p5<3}&!-p! zWLyyuERmQd*qaOg!xMq%S1ASAT#lZ>K~zwLMQgxU=!Ex5_06gdOf&)jK{lT=oPGqX z-wc5vnl?8yxyx28|7rAnVfAaR>5N}4nMz)@-+>3n|Hk0ID*^a7*JYP}1Aw(_){G$v zDN`mygCxl2;t!;QGa!U0U;M!j?YePqY+VfEWDR5*Yx(Mz-ouE-dT=1+IHX*cS}#Fu zGC@ruK|)F#p+I{kNGapU<^Wr>Ip%HL7E9G&4?(RWcehv3{H-=SuU7Pn19w#yAqe>S zi3jt}J;xJ-K`f2y6UG5e3uD8IuF^8sSV>-D+LHieY`!8aSjwWB9UZqwRjgoR!?QMB z5#RU8cr~=vj9^?tJCj=)*r&aY5w#xug&gy@Y-f2_j_tWJS_YKDL3*-l>FilV_rMzZ za+~STb(&F!*2Yd5ZDdq!>t9GksG-)AtQ#8OtFz}BUcIC$L9^0rIJg01ioWG(i=863 zcf9|h1mQ^N9)iJqoG!e)bV;JWudfc!NXd79^I1N0`hjTe8)G8-{SFpfh^DoE0uAYr zKww4^NF%jONaV0rLEgWK0A@b@Xc@-*dyVP*WD*TDr8+2tkn|*%96p1qPoBl^=B?zS zJD(xvD-u#vfR)mi>PTrLtPru)u-2L|x_?!jBWbH(U6oA692rY_(K-_IF{V&LX(SGk z&^lO}IsA|x@QGQw@l0ngcfY)v&tLNp_bph3kRd`kR&g^ld4$nF{nzF`uiZ~Gb9*cC z+uPSq?_icdD0pr;^bHsv4Lhc)_E%Iw3>zjm3JQLaY%z~?UFaS}Y>V~$#bsaonhS90 zH!cAnj|PBX*xQed*HW%Qa}B zo9dyt2BEY8?&J%xcgEQ9(X?j6O5{_q0UieETA-DDDhmyyv{yW4Hm(zs#7A({8!T>k1SAk z9-E8_inNnoE&1LF`*QZ4qv^{PD-LkBQdg12y#*&3N%hM7QfMmI5wo>yRcGmTN=Kdo zrt=_`G;MgT4XRox3rY-Ws2N3T{UoF|NkX7P%3+?SaxY_Q3lw#Z&cQreizPPXa3CUow)3o(v!XBw1!m9K|Gka;=aPb`I&nqta=hNg00VEP-5&hfFY%%784j zCJ-7|d$iV$r#9IZUsvSRXT~^@Yu^q4KVF@S|Eik;0opZzH_}BA5mrJXR6r;ka=y>$ zQ%AGMyX*PTJx_D~-{$bslMiHabB4f|D6KH>LdAQ?+;sD+6cA`@m{f(fk2El}HIgz7 zf~Y-SVPlAhZfH9I2BfLtgwqj%(Y3WqYpCU8e|wzKc|p?i5K7s9q7cfAbrc|#fPcZo zr^*N@a+j#+WSfK~Une~Q}8Qa0uZJR2eYav7~m;LFIB}*QhK7BgNmMzm)lD>VevgI=ReD_Qxxcdy+zXW9e?vgMdrAnc(Q{}iovFdD25 zE)^HO9qmplRep3(MwkGJ(m|D2nn9x1rkZK49}AJXo&Z-0Tv<;|qLx4f1Yw@~vAV_)2;0_!YrIqPIAdL-yuF&C>FzRvzKjibX=drP;h)6gU)1^o@*2*J` zf{$Ac2_5hPL)j99n0|->rYV#KauPEQlm~3w3Y`_-cF&VEwKgzvR6Ae&_J=t5uo(>Y zWRVg=Wdf5TH19(zlIc3?YDS=yZ-t>`RSQSGrV^xhBMLS`Ae1$T5{A<+ZAZaHFjVYA zNsViNQ%us(&{6kx6)T59YXK&QhLRuo7LLM(YwzAW*Ma!~g5_NNbC* zhzxh4rx7Z8h6czMau%5D8g%daZRVS66Oc-qq&QHq-%6Ayn+}!06_R{8PcD~3BvR;A z>mXME&<*vCV(W&^F_R}xW%cTnm7-q_&swCE*%MDZan9X$-~C@3{C6b)|K>X8xZ^H< z?wM!y$mjEjL;~I1VAWcU5Q;G?5vWiVumAJ)U)y!ZUiV~581$D3{xc7lF0S~&#|iR9 zJV#g%y&~;-)VK*+(=fHAj>B~;F#!l@^jsi#J@(U2<9l-kZfvBz{AG_fOJsO_vcdL3aX zeM&$=NPhaH_iat6! zgtKZb<0p+|zXNw?+CGyRKemH06GqV9(M&1fFnh%&GM->+b1luu48YG}B8A65xsReh6c_Q4wL#Gjs84wO_>@`v z^7-X_@&3828!YmO*mwd z4dlu_CNK&~h&0T55ySrM?{%ym*PIai_NBG_`K2`o&oz#Nii&5vvY!Pdpyb;zdu7~V zzKpYBh(YRy0ThZpg;3F4pXTsA#&Y@5&Qf29MYNaBYfp-^0U@Lr5>%<$C*=8`X$x%}`M3Arl_&Z+Ph!G9^ zMJUYN-BFSFj?r0{S{l815rT5@b&1`Z8~EV~2Xg42?lI5Cao%{<@@koiG6(GyNAAPE z9WC@)+0f`viUeY!sw=J!hoQ8o3i`Z)(gebS=VctAD)Vvd+%^QIQ97WtVLX{+GbrD{ z0fbvMt_Wkv;+PYUKud>QehUM+F0|v|MglZ(yw;XuZbX3uAx#OFo0e|kyN|tS=Co+T zy^56aA_E~LlmkRyT>JtwI#3AdLZ}Euh(h9o=6$u**Ra=q<2iJ%vFtZx6eAnz2o)4{ zNU2c5FGu3<3LIhK8G=y4tkF&EJF10eHh1%z`KxJ4Bsg*M2*x(nl9CAm8Bh*}*wVe2 zmimd*B%4k1IpU7}CsINIp;hnG2ufj*!J#!|OT7jyucK-^()N)kd;`MMk}ki*yY?85 z5Ds5?U><{|GT%OCe`AoOeG6#}aHQ3nVE70?8_AJMVxWez0^%`%tY`sf0U0Uj9xCzO z`{(lDiz}&1Byog5OAoCB1cE>aB!O|xjz=c1|FblF`~U+(L-Y*}nl^s*m_=*zIUN{` zWz@9yHoiyDDC8Pz$LBSUwLXIBO z!oee3d46*@|5(0>ViRG+u%wXG9zfpjK&j5vzMv^S~TK$MP^WC zmLzugWBd4A;ZP3q^yjydEo~=M0m35swTzr96^;^yKQBVG2td0yLNHVgdHb|cq&>-( z?w?C3DD$mjXOfg2zU}D5!QOUTcEl;X8g4;X+usU}=Q@N69$d7ZKRmLKwcGn?NF|ZD zCV8-(A~15hffj^9B4ZZK4)^6Xg1=+Y{n=uXfuSsgLf%aKq^__*qKzvxVtJ>f@B!&0 z)YViV8(Q1%sOWzPA?VKz5tIYt>bGhml#K~nT|FN7~5aJcVA3#c31Qz^)SdF?PLGA}LYAptTXOkqS>{XsH>8(1BGztRM-aNrJh5VN4A(FBj0AT~9d- zaD_aKzsJVy7;krF;DY9Q6+?kQYQ-UA zTRC7<6N|ft_}j7#T(@u?AKrHo$4}^>;0N^Qw^8s1>8P1NI@wI9d}76bs6^jMqNr@( zHM4Bvf5Qznh3`E4E_ zx$}7>3;6zV`^OjzX^#{~M}$@ZGC(NTs{NVd*H9oWW5n!Al%)_hrad|bi~Q`~=XrA3 zX8cf5pN^CpLyJ3btdgcScm%7(9g9~*hzFb0#;y`V3>#0lu1nDm=pE=Mo6nny-LVdw z!-BsC*F|sI2HU$Uw>_PKni_=bqE#>~nT|9AgHSOzIAn~tI=8{Lp7?2YjOdspgb2U% zl`r#y?_d3jkG>ncx$g+Isk8SZCt-e3=R(2Z7UJhwaiFR32T5N zhgEeKU3Af|8@H2n^fAXUI51 zZEjk;+GqhNjR-@NV8jQeLDFkkvGR?Av#P4Ast_fhe(jqnO zQ4wPfup05k=qJJUp|upsgU0q26*oH+K0+Eh*hr5)oe(V8(!)0%UBEyPSSjV|YB|nK z%#j`dKBkIPJ_<>`q-d;h`O=vOaP22f;k?6kr@gTj0TfGRf|$QwZ5<;`(kG*5Z>xSJ zLP*oekX8grfmUTeQwn`T6nnPS@vWowg_f*`6=bnDp?&A{%>`(w$## zDpa8eBMhq4v9V3;42U91Ma@GCZ6)PWEa%xc@DhE4+XyV%Kr4&XkGT03_dxYCm3A)+ zs{vp~Cq+Nt;1O;7_Oye!bLAF(`uqy&Jj2F7Nwk#aGGnlxV+47u|Am8Nv;u@QNu734 zgt!tKlOB&Q-pGZ&xr_T3Za^VOI!;BmAqwZBviBowN7di~S*gP-L4U_?gp~C453+Gf zCqvn+O$@3`ij?^xT8*L|w+V|BWYtW5lb`j@1BgBt!iJ_<;}Q65{1` zao_9ELl0%;@)h&Oj2pYt;1A%dU~4j!n6rHOvOoN<1pi$Lz`wEbr2;_^#zWdz#xkPl zI1-Wuaqc*z-+$5jzjgif*YCPy``BydRPwnYB-W4J zR++j={xhzm?cBN2i4`arGEfM)Z`CHsjxf!x>Q=tk@k^W5b!1l?tMNp^*+HnNEnZ?w zV-4@vV*-wFNeM|pI7r9X!|Dj6r%X3UA`wy=k9ld2R!3O+oBeyGQ7EhRUkMVzLK}re zMk_nhHB>5%BA_POL~XJKt!0%Mi{9xd!6>YmZa{Bg69dIAq=iLD?GU=!YQjrGB?+wn zP_5_k^yckce9t`k@+D)eGRzTCR09~$%0ZL?5uk;K4x!1Dy!YVA{N*Djalw(hAsxv3 zCP-_Pxh`u%EQI+oR}-2arz;7W9V(y+Fk(L*NvD>^Ob6|C6LH0V&XlA=;oYia9UGtTJA zZKSjBWh0sF2vZOUKnem2){I4bsDMDtYpG#2zp5&T7W|MyMz(O(G5he_=a+Nq(oPx@ z9!iA9vKU1`V5xjj^61&|eu%96L>v*~Nr(P?nJe#oflu8uo4#B~ZPKff;w294uRYMm z2LH-uQ0>5U5klaHA)VW|(>2gH?0pRzYe}eLIcyO%ohf&J#lTS6q78|IGQj zYXtBnS2~%*bq#gIba$&xStSsTgH9!2D34Ownf>Ua2kg3Q!`C5)9KtitJVQgO{|_{MI6T|6ofo(EScN=gTg38J4>Y1V zHZu0MM@Rbic9tzebSUU`%3MBsF5{XTn9^L&q=p(s*QcoW5+oeMUoWbFa$v^}p&Di# zToDJdcmOHly1%;Uij`k?@}9NUcp^nx{a8zsM7|i@FHeaxZ<^jb@)Ji54L) z3MULfB+!I7cI=UH1-CEnQ3wKr=h-fa-0{UL9e^OR5_G^1ICAP3K6U6c_8Zqo zITQ@!{n&WL=nRNgpe!O!2Mw`Kzt#bslfacpJU30kO_OkH@SHS`;~|9uNNSU9WD8yN zmbMax1sv^=_caMA_~9}8@XWM+e*XLt9$d49kIbCRi4)r?1wCx)FVI#uo>a2YCW5vb zgtEA|D*I?c21|YP=QmRJ3rOJ@bh{X?XeUL*flur>i?8D3$D<#Muot!yQAG2uJ;t$l zsK{3ydXBoJs$@x~rQae`9KN18EV<}uK9!N4FC@IM!i#GFzCl|3|Yag|qherh> z8p%>e7SaC-7^&ich8~6h5JFH6dFXF*G0@d(lINZw*s>i!C%lBHudn-JcTZ3Lkw+eR&G#~T%-DysgSq7Zmw)TZ z|Cuw`*%gM~+&b*A!#akBhCbTU(_=ou9W79ou27$(Kn&%f-6ce9^{dA+qik@CT?E3fd|)aW@*n5+w%on;W9FlqBbE&cn(4fLM>5| znUC#AL>+Wd-C&I+Uxy#8l`nH1Z<}74IPo9Iuwo;Q2^cJ=QK54JXCTk%QFTTH0I`}$A&(M1M z@|y`&fRv66f->f@$AV3EugWU0-Ye$JvVyq~LKqz-gweFMotUG>cCay9;*WEeanz(y zw5MHsWkw(ZZJ%MKT_3qL)+Z%vx97P0uIIS%*`*9*%Vb=~>I+1;7;S&1d5+S~*oDnV zD_tcS0|

s6<=9k!B<_l+DuB(_?1+k=d4gT_JYZFLCG8>H@yJ29eDV-v~($CXR-2 zBS1JdvD64H@uVOa%988qF|V^^O(gmwLKVJn#>uCAVezu1{%f5>U;N^ix%%qw^#ELP z`IS62XZHWh87y{%@;A5sbi<8xmtS_tpVzHhdlrD4G9ER3EcgKk*R-m-dSStG2$gPW zZV~(Lv)_jvnf>r}0PlO>dry7*iO23)w{|1%de;Td-hA_44*?iAZVVeXZ2GUie+M2o zi|3wuftJ>mkM{QT{s!P9S65WgynJ{SWhdualk^fS>FVR` z+vb>xUOH9&;^GzE1gqL&!wr^FBq0c>OL@F+pQ)U``#46_*Wd|(4h`2k(1LvEQ}7kV za+$6|iIqKBmh=p=dMHP>P(or zsVa(rQQ%NY(O5HrmWD}a-$zJkEeWix@i4iAN`)25fbIRO$(H(%jzERNwA-Zt(+TOK z@IgyzJ&zZ+^>fjk&yWoRke;PJDvR8iBGSs0=b*LblXRPybqc z;hT<&lGdS5TPbGe6;*yz{fiyw88N;?Q0W*{?`ZxI2wVr=e*06jB|Lt9$}EHF z0Hm-$R4HTesFWkYQQW?ulOH|2fT2>6TIr!xXc&{So77lZbhSv)j=?|bsCWXsd?T#bFuVl>&{zjY><@cR zGCQPjTDBKl*>zd+%^Nj{5%pHM4u_?OnZh z*^=en8#Wk&jp@ZCfawr=AP@`zLJOfK1cJc<0vJp;VBCUn#g-*Ywj^7<>-Jtw-`$zt zA2YjW&y`F`$nT5E9Y6Pxb#?DK+s=I2yHF~5#{ZqbAnvDeokLyo>OF`E)z(~wT{ z`r9AjuAPSvY1am+X^3t;z1M7aXRRU7WL%eLEt$)^&RWTemIkK0GG1VCZ8Gc=ScNr5 z8wWKhC21j%E;u-hl}ZejJPwWJ*grZ+Z@x$ZL0es#d37n~H`URWNs)G4Tq#U)ff4Uf zHX)F)7O6=BOptJ$By*bAfN+pfSRo`)OU8-)1UO`9ZCFHIx&_ZGFqZFTvM_{nt;T^C zku|c`VGkz+(8b#Q5l-bq4_;V=>snj;5b5q%;U1+)ItdO=O!Cs7JiztmpThH3&86%s z3s_VTND_`Q5Zc){!I$oTlHWXem~`4D;}{UER2nHv#qTI-5*MwJ%24&N-6R=yU_zrT z6?Op3c*haOufPui#wI5ipO~;pNKQ?He*A|n1aKOVBncOW$6@1>HcQYEloT{{wZcWG zAyzCx2RZNm0Qd6qLgUW3xiOsz;O^b(tHU^U>+~~j2BA`mwbi`B`QIH(u(?2f|gW*j!c@4`ZP&tj=QV^ z3plF*gRu8l}DJh$i}Zj%%rFeInh4@E9Z|e~R%!A5-Na`+hD7DR716rYDc^ zsfTxS>AViEzvyH-vq?$;G^AQ7RC4&rxDlGlSVR)NF*4_LP)T%+w0Np5SJ!j~suWF= zD7nf(+5WuNnmQ-R*S78D#>WrwtCw6%b0&coXk00%OC&iwHpRCe-OG<3Kg2}7Oug&i zSPcc&R`Sw1EjV^$DbP4dSLvmp<+KGj8*09cs&H4xr}Dog;gDdPPffqZk{XoZ(;3Bmn<=%S}3af=aMlgP^ev&O8Yz6DS#&3dxml zum^S>uGvH-pyqZ$$%BzG0G&)EM8)&|qVLK2^&8l>?J-(f>mL~#&7BEw{ioi-U%%nG zR7zz#2Q?Lh(y=N}hrlah=xOr^M^0u!k(MdmaM#1!v+tPEV!+b>bTF+Vt|GdPyejBY zz^U`w_{`;}GQY9jwCMFTr@-iNV%6F-2RR)Y=1i}EtcsoxAaMwkCO{CVfP(KcP$<%$ zt1wpdXw4*<*O+BRa~%msqLiW(7^XmTW;Sh&i%`n6ZA1Hdp*2#Nd2!t8MmU08ag@QS zy@t4@Ly6%kz0zpbOOmc&_s9hAy!|nbIK8E8BEH_4UM)#MCmgRW8(%M~W`1xlqdzVAofCG*Iu z*vN_6*1wSEc@p;XsLeCOz1LlME zsq_q>M<)^cyU}|O142t7#G-`@Uv%*Bp`Xk|r{BM3K!E?l_0f-gboe*--18!V)RZfN zsRDXlt9{6A#@p6}XlsFD#kAX+o6sAUA{Nhqxot3(heAmNM#}CZz(@a5uh+mpKc}5` z#&?e%?R~aV0UOR(&EI|WHHIc<T}MdEt$m&e9NB?E1uXUM@XlW#{mgir7XEi_-Jbxtc64h2VW~32c}9D-gf6!4vgjPW*rJB z5jCxhXMA`AoGMk)tMIDRmh!5#3r$;E7;e5WU2L=?s^UJeFRa*)0uTX7kz!uUdNRpI zG`&74+ne9m61ZYj{EPA zJ^uJVDWyIDByk*A*ab`G8i5~W1Or5&gg!Qin98Gf9)Q5efHpTbeXOs)|0^?*X(j>q zUte$en>X{BPyh21C!KWCB}2nQi_ltAC0A>6$AknF7D(j&pLy8CrL?FOn_IqW(*Mz{^A5ct~g>kZ2D^*mm3haP*zd( z=-6Y^+RXkvG`?2M%BES~(!{AW5H+2 zb~q#sfesj$+(*UF5r$c16DFggYpUU7Qcx^ac*E^md9r5&QWBvPAUtYl0datVz&yiR zFsm-fne)1M&si&QEg&w?VUu2>ovI1aiQ16bde){A4RkfGB<0i@{f7`yZ`BD+LS_@i z-znG}r#yU$ncC2H@7!D3XD3&%gvZa62=mTszNcV6a znQ?7kSGdxNFbUGW@9_yhd<3KAR=q7 ziTR$g*G_^=!q^yWI}qM{(caqj*x1fM{%J^v*u#>@OcUaA4O=bec&3{@2&$O^>pA^=fwR-1)7RmZtfB#XD7L zttplSLt~I|pgseM1X9^HCa!S=lNc0PAkeM@Ne2c-0U@R)r~Eg(_O(xZ@8<9S#YF$N zzV$6^-n^NSk+Gi)4-c;g^vhm-rFg^JUq~@m!Vyl@@J1*C6UHL9GHn^ohL=wa4`6=9 z5e|o@3ViP2Cnzd)0-g4FKp@&osQ6sDdI6ui^mMYWpd19opWK4!b)>8(A{x_iqA8)t zO3YnN#l72QwL&rz4iTeRQ4us_eN~+v*V`_b+1f#PA3GD6`!}?`50Tfhar=+ErghE zLfH1#VJBCCSD~pc!z*;D-PSUM6_=HGiR!n0XN}gJ-HN+68h!(1~Faj~c!4Gnb6?z%TAErevA* zS*%b9(h14sOS%{@RrvhIz09ghaY{!EUNjb(u7$6wY|@AwQB7Ws>kj;$(SYeBIacD@ zj9$_SNj52Yynmd3x_<|c9vooYFXQ_H>4cvT-{3qfIMIpp`ko>I5JcS+S4eaa;QIlk zVu`6ziHhf2zYS?{HPgmg$0dgGu0Sj~2orDNx-gZ4$M#ywbkw|g^TbC!{E=tgdfTrC z>oVDYJ$&%sN~JYqGq8LfVs^WIcpVrTMU0O_?+6@>7*lG=(j~9kxN+mnXPC zPhY$qR|qO9eU`Gp(3wh>nqcD7LP6gNF_h@bB3r7qzyx4uH5G=>7wZUX}o`LIyMRw#x|S=K&8IbyB$JTLuglPy zOz?2uFhASdO>-*2vZgwOa`3fR1^S5^XaSDabhVsB%56aD3NnN?it3FPv1+oW3llLU zYI+JL@504#9Lj2n(cDpn^G7Lp<7VI>oN8xA28757qc|)Gw7?PY%q6qYQt;{fwv)~z zId^U+6~AII9XckN8)Isidut_lV}})nUQ^BMDh<;9T!aM-fvZBHrD^{+Ws>wx7Wv2D zZ08I2Ji+5VBNTjTiU$cOWuG63a1@R*ls%z?sIr&Qa3M?p%uR5lL`q31U!XWSWt5cz zWyFo7`8`M2G+Y{Rt%!HoL_F|EnVRWzRWnbJE|g2~=#!8y0YcZ+)ydhjXP@L6K#;PP%ZxdPvq8-uw35&^v4aQ~KW(`YrE# z=R5i07r*%Q9h1D_jeO;6H<(RENF5j>bMYTP{1{8mJDDdA4>43Oacru3|9>CpoON z6hb+iJgbp!TyYMWgz+|07L8rwfn%%9XyjmJTSGcxsDrMRo)(mJL}rSDR@GlO{E@0% za9Ftt#ffYrwF))kv3z|^+L1T{Zapx_=Qr-AvoX!zp0S*Doy|xmL$Q*t%GZV}h_=-( z3>}}O)O`Apef;Ov1I9cdoU_~G5K3A=qd;hdREl+T+qwSSm7FrGjZ($KkFzKM7fCh= zyTNY%6)9o!AQjQQ(ry!TTUH^oV?eZ_y>RF~uSKmxqO$6a zLK{FJ!~~)&v_pA}=X;na^`UgwM+$KP)h?2fVj4NmN)l_0QZ5Zihktx%C*OKxFJE}> z8C#6BA|B6dh|8W$&vL)0`fa9f#QGM?1#E%E9W{3k#rA(llT~?!PO^RXo1^ z=mBonw3|xaGu=f1=|C30i>wz`@E2vCUx~mG8b=#GztpC}7s3iKSx_Ka|&s<=6n92|34Uy$CYWp7O zAC8h7A;fc)Qop+X??1@LKluryXIN6c!5VI;qo_k zZ05FIhaiph)kxn<_`vH|;5?__@gTVL!2u)K$QV8JRx9sKS zo!y+))xuj(Tf*x07CdFt;zRmXn0z`~l1>V~_V`ggbMH1tCJo9yvb)uhSPX%}#bH%P zJ+C}@G1n}cjVmSj5CI;VBt?1!Ca`5(jpI1{=I{_d-P6mQh74CM?&PHQMjTgC@%>11 z-i%EGS~K%$t(#vRorgfo6WH?V5Xh-5C{d_bqUBQbbBs*vr{Im@IO*tJYPY@^nv@ey z6oi$BPDshe9(aQ9Z$HLAU$LHRmd~N!2UZ_P-~_^GFj*lUh+_qa;Q`EFLTAa4N*Hww zq{h_}$A$4ig**25^6f_sa$s=OT3VmLUDN_pg%Aj(Z1)3Pn*fC9{ty-5+MlZw3KS0z&LGct?;$M+*B;3R%?x?RP{5Y48BI|@H3|&@L1Ax$(Y+9^e zzkb8Uhc`Yx6M<$%0RK-{Z*L#7X3Y{m|M|}k1%7bD>8GFm=&_^6zPoz$>R0-nk01Cb zrEna_aL)k>WyHb`~se(;_{ zhYw$Y*0Q6cg@5?WTWRfR#`6OLl%=g{Tu0K9O0l%9o-^mQaruJTJa6TEE?+d8uEs2T zM#lNiCl2zf9fvtq$TP1o!^-A5?mjZaXCB&NEPq8zVnM`I>YPwLETAQu;oq-3o0D1_ z$ydA@C%&3Ce}o>dy6?r?{1Lc07Cho=ebtzyt3a@@!mj~{5sd_-<&=k`iq`stbTlla zF40U~s+opVJ9Vj6vWX^=i8KyS^eYGvaPflKT)L=}t^K3?`<8=fU~Ol;k*U>=wNN${ zVtp#X*LNJ`pYPj=PDnel2xryOfGB+*0-uvQ+j!gAD|q*r%QWX{Tl=L z3ColBY^AuOrHP9dwoz6-Kiu8JuMZ6|w=u)wmJCvBJevSH4iqX=I8K60q5-8t+uh@V zb6Qugk!iwPVw;c%nP9Rw!0^-o%BqMXleQAKU74tDUA=$Di`K-_1T%+1NVsgtY$iO9 z&)&a_Rh`YOYOTk&{Q3BpXL=GD1-D2G$7oW7Eqi4XK?gxyGQm{E=Z8Cv@|oZ4;0KQ# zW~}HTQnEUZs%aw~U(K18J&|dT=`ujlb`DHJAMfsk4elrt<{>U|B2J|Of?|#?&`1}_>qk-PGj&^TwXjnb-nOCSF@L05H z5m!9xSzLU{C1|ZV?X=Sff&j{8bgl@k>3CxRDP^)yC?uZF*JJPAy{uZb>g@jh{?BNo zkka9rYcFT*x}}s#K0=C!u4bI`G-Yia^sFnN>u46YWLVmi)P*|4f^w!pUNp6O-y+eV;!s#1TwIQ{FvEJNa-UUBy>%i zS)T~iKK*+&cDd8l2xDq?$f!P5Dxke#5iOZn1VS0X9}B8V$P9^OmO9Y_X^pRa3c&>9 z69<`FpXO7StYhcM1P8~8j1_!l)k!LZmbQ|#E4XD(AOHHmZdA%Oo2hMiO9V>$P=dDR zH19ZlCC^{okuJyHF=yBatc~(3*l)XeqgLehcT%Yvs;^!@TRi z9%Ef+BOf?-HFN9JOqCUZ1%M9a4v~~8vguBAP&r|rvZ_ZAf+>};Wfp>=$$jKXgJ?XY zOhlHuI>sNZ-XrmpfI^K%Drv8bBJefkz~@8foJ_&;CU+(MXEBEc>;7ATn2!!iIY!t^d*u&9xHTgPD z{K(wzgpg=uq>-iL;7#P18W~09@>V2EgGiVTlu{%d2ggkiD1{?Mjqz0U6+&zGqvt|tsZG6}Sf4hA}#f;}gAGl(%*mLf= z=Z-vGuf@qHujd6Xc%Hod_B-CSd-ra@p|!J-*S__I1WKbF9}!3#8~l|pN^(LPGul7| z2;rF-G!7nsuj#5w@qsf}@cdQt`1t+X`Pe;MO(p82Kzk9u3M&j`_CnXTAj`bt?A2T_ zw}bJ(!?l`tS_Vif8WUB5b`Brvvg=sjm!WomIDWcQ-SmlQfsvGP=q?z!|0o-1Ogk7m z+t*6bluaA}}p>S=mab*IpT)@)-LON*Wb8<%uXLK}CMBsS>DGVvlEnBb~|=o(8I*XY+V97cRrAIEG60%@Ee z6G9MJajJr<@S$_o&@)=#9d~TwXD>dRgqtJ?6iPUjKFV?9B&B^L-K+#s#&qzdPa4T% zeWQHlzMX76JY<1=CNT&Dt`>%!fSTs2XB%EtP1$+_7@%iGD^e0v*`qi-L}g;a2z?G6*ZVHa} z!tNtzZ3btJ4UKYSXrSS-2RG*czJB93qEk86*DuPYvNzK8A^gu}fd8! zhLsEL)8B7@R#GVB@A&q&zx}hn{oB9gp@*Jcz?S#F|NZ>*r$1qIbo}LyJ+}43VGsPH z|NJ+cd(kQ6rplHX7wV_SN2Jnf;A2towz_c@js+v-eMNgJ$#a&?D-1RRmP-p;#X{U~^h80#hPsAjKt^BPOLc>z~#!3T><&Ij>BU2d%N>S0El!%h5 zgd-R&m3ha1J;ssoe3hQ46am zgE_a>x&?IBub@8FO2SE!kO|UmBMs?Ucv_)?0#_~XU|DAa-+b&4zu4PPb2h=!<~m$l zJbVh?1leS>p*31MUlsTtBK-x@k(B%b1LJ#{sthAV5`;nZhoVJV+T)7=m!^V_lqKRF z0jkMcn5?Pj9L>E-Iu2*f@8G995Asm&6jv{wQ^k=~Vf-~gS`t$F%r#6o#=z-`!3jS9 z;BG$on&3Tx_Lc}INRn349Oz8-TDBJfNsob&Qk>TU^j@;DLh9K~t2S9TjV%dBsddU6V=-r2-3~j;EB|p3WzWZMI zf@_{HcJ1Ch6L|icYX$`PCtk0(_7%5(@22lv0T_$ml?&kh$C(b=3E2Rgz6Ls5p;CrN zcEVI1$8qWE>iTAHZ_jm4*Xy9QPPMeOmd3}&G$1ax;w--Py?>-oE>*=mBBwv17HO!s z7dEA(os}DezO;^ikdT6{1LM5zR~sq%UQ9SBHU_W&GVLq6>XO{_f{U16pP>?{SPK~g zRua=1s5-{uj{^3IxY{u@K@oBSEU#L}I|DLmRilj#f7GS0uN&w9S0tF}ZBkAcbkHuo_$)PV(kVPm^1l$q%&c+G8(u<7s!q#bj7HO9Pm9&XfLE}z|k=&Wnu4=7LKh31xhL$CFyKfMnk&O1`QRH#kX^A;V@Mm zXQ*%hsq+*9!LRo9^6hO$ncI-&J?F0EJ?(W1$tK&4Dxjs^NsH$bj$pjh z&)C!vJSwrL$UaLE9W=h-P1ETQ%k0>lCT8Rl23zyISXD^{bxDUUgE?ODy}iNIKm zO!LSHA2%tD*-yTJ8W~6B^B8xnNRBb|+kvEm*n0%M=LpPchjlCISU8VVI)w}Z!yrJ} zW|fXfXA_N6%ww+!kSG-(ghmB|;i+*7{R6Od50olcQ3BbR&90j)JaAzDIrA1Rr2FuZnV|DOSaRkP{At(e zr=9xQ=r8#a)Mt%~)wG;TISz8&a%i`n3IGZU2-7+O-)Vr zj*pK6h-5ayJ3sg;yh;E%up6qjt<10luhwOetDUeAJRJsP6;Z4buHc*74^S+XEY}#K zAI3=T$`C28;GZr#i)GDO%7LP`Y|>F>69u)kG{x;7h#A9tKnSPeCS zO#-S3h1Nk-nRYZTCE+HGC2tgvM6}n3?tsz}|gOghuC}|(h4?rpcp$Md|g6AUImafkE2@tl; zPT9*mbc)_ZohAsPP zOuGcSK=)GLXueM}87JZ_8KsJ)lrzlDTQ zWhJET?}dOwAcoo^=}E-gcNf4h@i$j?G^KL}1woTH`ARDI8kTE`w7A z-uvq(c+C$V;;#MOjQfFc#0y7Dx*E~7tj_oa()vzWDy!D^d9WfqQbMVOI@*JOq!%@n z$C?+|>`_E)P?7?69WoZYfT&9&5-z1of`ZVLgus&mPY41b(b7dZpe=3(A&`z^l^P{3 zkdzXMWH_Ir(Ay82p0vT=a2roQ{fzd>LViakl|EtczwWy0+E=Vv@ek2P(C9+hgPr?q z@E3a4>{-lPFz@Wf{7w&3rhAM`Mzhnx^`e-FMu1`v>3o&UdnLgSg@!g^&QLYSX-ap|T({74B*N<;A}J!Xk1LIk4n;r5!1!L2te|nsdkTBpHVi5u zkuo5WP~5cr7~kBo59K&GLBQhH20nDjTCTrnEnRhKDqaO8WMuKHv?hUw+U`P&*c@I& zh<7uEcTu`RYkEHI^-ECNwAO2x5V78j47D944Vg{?Ehv;HNlC#~OXskny^c>ku#1Pf zhdH&Yoz_epQ{_?erD4!M=|n3CpMj}^jOV&d;3KBM7t6hBzM>i&1$MhuK1(v1)MX#ldnJLOq6ZIhi%pP+&4bwXZmJ)!ubZZsD3@IkybNLuvKMv z-jSl6viWxa7%l(V%_otN2|}HFgW30~2P zITZX69GQrcl<@izqi)um&F}IKh-*2B6Q8Y^E-8&2=SYqAHP`-p6YIK~_{7EQ$W?q2 z4kVq?h`v>{%V+T1pG7gDU)c`?C>j|Q(5(U$diJ@?i{kKq-8l}*sGK@?h#wHD8 z!jV?yT2!$J#5MRO9P5K84pu)eNf%CC1}u z(9EB|;MQZuj$YN=+QRtg*i4|A83FuxuIE4h1=qB;wgM!ji)UPP*$rB&%WQPyl9xS$lUB?p zP!3wDnm`r_$3(?f6+{=!7_~MnNShI4lafaVhxzT{K1e01WPCkc&_&XkN%PLL*Wi#q zD1i{Zsi0%r?|ASJTfu)=>a1c_m8yP)f;6J~ryyo16w_UgLW}Zf&MqL~BqPvS_2+HU zB1}722^gH%PsyJ|%9u)CID*jCj)FqtAo4fTFM*53BO%jtH7>K$9A$x*`h?|%jwJ&w8gxLQ0_qdZ%xzjrSHm)L zDocy&@Tm*e^8WMI^35Gbx$YN_(wDE$l1|}yIf}s;GVWAJ5VK|GILE>1_xt#Bsl|~B zt*3PmgdH1%V*-t~=2cQbI^po43)b+noyYjq!DGyANKy3R8;>30bw7KQPu>3nN5_kZ zR5ofa2&>-rlor8Z@Q+pf!ZGfPI-f^(55WFoFgj{RORj6(8^f-Zvajy|4kDQ_K;xZ9 zOky1+?FsX{^=Wfdjv#O(fs_=5rXU1)0eJ~|2MP|99EI;l0@tPF`Sgv9QRo|l$D-h` zL2=pTmwkHQp+oolAs?w%yzCVtYuBu~{L~E_KH1jM0Z;COAW)#y;>C-(_0~IH4a@}p znGV38a}azN|MD+iV8NWZ&mSHg`Dvk4iVq@f)#pdqSGax6n>UZsPCM;oKmYm9e{kW2 z7jysp_dc!8`_$7;W9ybJBwSZ}mf=vhY%aIn`32@Q)=~BPF&@n98I0$^6tC0aLb+}){RWnKE~R#$fGkxdkot?(p4)GcX9Cb)fn9}jeo^3Kzj)0C0;TA+OmjyA6;Ej3Yr zlFBj_bQO##9JCIOtDdVJ5;8wV6Lou@N*6#|Lnm#M zSAjx^1PX`7q~a@&9^|W!9pc01tl?{q9^lZ#gz>SEvT8xCWVNcdu9Hffr~_c0ClT0A zfz(haqX$P3<9Yj>2z&EQ|HfcUb+yAF1Oy6^N*eXNCl6P5oiI;pYJfA>z`7M?q^4>C zh9-C~9D{z3esy{7V4LDVCA)0^J(vaf#it3LpE=R4lU7yso;f6)E7 z<(6BVx4-S}^$5MBR4Q*B9~)!IlBHd{_v{{g{p;Vz*S~(lOrV)b0RDW}+^$*l4D|E- z7ro%`@3`&uHv{v^#Y))bC$u$9CR3ElmF`umR`>7Tz4Hu!Yp%J5TW-1KX?4D{I%m^A z*vCmHpRAwQu|tKOr8j^1yB?jce@uMaKdY z8d~cY&{n?~RA9R`Sm{}DqDYICJFqlK8wj;E;t>JDIuuIBrQ+x5%k9VWC#iE2-0;{z zKEG)%?>=ieuUWH*ilzE#rK02^wdKb3S~%0gmBF@Q#uw;Qy53l$HBCt+;DbY@(qYDg7+ zcC@nNCTYADBoG7!BXD#8cI-dybO9kcThZsPhgFNKc$yO>0oo=#%HRPKg(8(>z0lJS z+YdmXstig*hei*-=RNP?bD#U%Oi-9f0RC^SOD}r{zxnmu0KD*pFTCNdJMLsEpNlYK z*>px+a>+CDzq;+#cL6M0wnFURzxQc3_rLD7ujd>8@pTr>U;NC&#}3^Y78R`*ZQ#!D zeV95oK@j+MPHVL0q_TB>xQmKft^MO4QM19hQu3`G2l(fQpG4zY&HO5DDiX9QRru&L zPvg3i7BgC|Aa#I|DbZEjzYtY5UUaNI9a;fb%Xkr0WmTGCL^Kon1pB0pwWH(eg1V~M zqCf|Vw#G%Y)Gt8!1~6$_{whMEX)ClcTI^;df7tNaZ2&g8N!8fK5k{U>NCQ#~upl{pYWtGn=O9dB$J}ZLUX+ zK$AHksisjxrzZh|8uh-~!!+kpO$Ky?mq;faJU?Jl?*unLag@6b^x0}%QU$$)Yyfrq zn*x^C7jKhT0H8*c$}m|#Pvi`j-jUUZP1hz@QE?HnSd_6H7rn#i?fa~YBQ!QPq7`~7 zH)&31!5sAY>tN{ub1Y$?4^4iwA|k@te`9>g7?&OGHU1@5*vyfl7$|){uyrO1%p?H+ z=hszNUBxed`OClPbNu>$d~5Cd{`TGXkByDC2oSoto{xV0{rvT%XE0SN*;%+WOyDq< zN?jF^)w;%UFCIii*dmnzUj@AO7mu)YU>F>iDuBR(>9hl$$H{YA`O)*w#}5=rn6ZNE zy9CmeliU?Zv>GNlZw!I4P@C-yK>I!v9Dp}$n%llSdo*VqJKzI+2KI~vLR6@;=$VT~}( zbW1*c!mY2SsS^cyJCczCsjTXtb%#v2ka8S0_Kfh&$B*#Hu`%Ng=vdPL8^FzLh1`2< z`5a03YN}8eU9|w#8cH5wERQY~!B@n={}C78WDn+dg3$EJs$Yhc|FM3=wtZ;R1yfQ= z`Rr#u`-07zH-C0;aPTaoFqQxL>tJqYO#%?kmIU_W6@pj$#$ad^b{{slCi847={U09 zkt-)F-rlD`fy}Hwvo#|H{J*^Z(t|(1+ur)77gWmS)(|zm>eADB?%AuEER_(#(7m*( zI_OEKDzq~_`0Htoe8TeEla9ltzJ9h2jG8v3lHeEwy+P932RiNWj~ARmQ^uuS@eta@ zLl8(sQaE_pCr~o#aGEhh*xs~$@Dh9-7=V`*@CnUYOg~;nGQ(O`w>l9sAF4@Y!ho$q zH#!GFKy&?kW7DGbG!r3H$qHAHD~~cXu@9t+6cU7I0DICg=b#L&PHLZp**fZ-6#GWU zd17FKn}^3aG+83)xXj5US=-sdS+iSN)|R0@;o`^y1z+K#5VC>@q~&;99Dw#wj*GOS z2qr)B$v91PH7qfdOLb+s|2D@dvpa^zEFT@x+8^SH4@6zGWqQLCpSZHK}D=K|`J zY4(qg^X1KlxNGkqWnD3kj^kL{>8DP9vS{;4A!{tPZZ-Q5db02vo2 zFo9f9ZDDJrXicZM`)D5z9~-1Toxs-$R|@KrE_KNy?dc>9sU#^!lXL_bCqV*P^_9n{ znmO7*YBM8OA{0=m()mOrj6=0r3?~}eAn>DVQimWzGdmT5CX;NUF4=-a5kz7+_63x{ zk&;4XlD_dh#?239D1pifNrjbOWFzk&grGBV&Nhtg2uY;EEJDo{u|KM2;7X3!ftigs@iB!pi?w>43gAMny=45&~rt2s{re z9%5t+{rKJp#2}>z5(JH9VCU{#?o>V$;*p4kdUQ5v)hR`U%dxIxCdV%OhbXS7gev{W=QG+N?FNpnWhl}R(VF~fp}I%YMb z>CC2RN+wA;5Ji)qzlIOdO9r&i1;s*o+7p}B6JWdiuM{sKZFg-cl# z7@XKkAS$@pgg;>eOB7fGWkq$Qy_P1KC{_ZBwlyq;=CnCYoHxIXq6!!;cBse z?maxfH?|+9J}Ef0vy}@Mb#l_IdKNZh$x4Tk4}mC|YTUX6Dw!hhjUZ(^u9LEzZG*)S z5diX!8v#VNzP1_`0;EV#4vGv+?jcZtwb;dg>XeTIO!|s9p0bo#b!pyz_io;CMwyqc zSxC|IB0q*2X@F3jK-WfPX*(C8Rj@!ufJH~Tq+P|~i6Xb|9pXp3yXhOvK>|o6YXmAx zaUTO8P6xJxEeU1E1QMLGPc~m6lP@zhG(xta9w*@vgea2$a3p~?;!N5m0!hs82O)Dp zYbt?f+(pO6(A)PKqbHM{PBk_*ojX20UIaLH>=>0w#axzD0^N{?gd0h1>$r8b;~*w- z=tKSJo&nf%3`QpiKLSgZE-AINwOz1f)8_t}9dRZBm|6cv*3zYm#eoBd^w7ZITcc8G z{w%Jz;v5#WH&QJ51X7!#Sp)`TMs@C~Bj5CDyRljzRe^02YBDzTWL>ZIeA_)FIqK+3m3H0m`IbW z1o+C541*GbQ~Q}L^wFH1O+#ibj!d9bFwH5Uwhd4P*To~UsOmU~(3nReg@dQc^o~D4 zIVjlChd?25Y=WR{t36i+R>0}Us9K$({y+_)N z8X^-XrI12WmvR}-mHGPiZhpM;7=4o^^E)Z0dh8Y$39>pPk0lw?EFnTYXHWr+lRk~P z60RSRuT&`dMbdtPx^x;}838DjkdgS0ua(7t*mu#&vPB#!l?q;|f*Kz)`uk-sd^hoo zOD}!)-FM&pM0g0rV$q9^C!0ppXV8ulF-am}E!TnGF?9DJ9O;8yN1#-S?(D@EUOZ6W z+Hn4@xBPPd%GImbvunnb=jpa)K!7vrf06{04;(m@G#g2R)Me*#=V#xx_a zvj}g2#AqHVBU!6LuvxX0kEOP00a__s=@Q`c%sd9-~jae?7*U7~T zS~+!gD{Yw+zE=32BCx?<3lWoYS7uHwl&LZ;lVDNHX-GF|{;Ev-TWTv`ETC_EH&f+7 z9GQx^=2};o3p(ajsFVdR3WL(Gsd}RzYcUHN3z*cAxDZO?O5-G< z6qwan$D21S(>o5dC2ni4uo`3%P7A{=)h40*SlYjB0mvHZI?wQ#TpN4D33t(pb zQS18a|DOBre}D@vJg@EX$G5*fN+K7}}bGr z0YW36NTXc}Ge6e>Qb5Lax$oF8KiqK`?Ko8Blk5l~2yh+2jaQ$;ik5l`fktY>ffjLZ zfG8futbEZHoM>dreF9wR(3Egk)>6l%i#vJg>Uq3m^&GBRHkYn!iYG@Vxb;9kH*Y(_ z!@c876$28kpgt){I+BEtV5@eCk%^VkP{0E1(VSgKUAo;Af>A1B(fq=pe_|iGQa`Sf zu)#mDE%mBPT?AUwx)wV?m8KTy)yEVFrIb++)}dyBHh2Q9HEro6moMqy1#9Lrr=_0# zqf`8R+fjbFe-IbV;>J1}60S8%(zx28qKZtEhVgV%?1S|D*qNaJt6v3H#J-m`=6Z9PcdS5{s(PAw3%HB?+3IMg?=rGGdH5kiyl z6&+I*I;Sc~G*UVUSCT8_nCR()z7a%QGcDOVV?8Y~*1Dk;wG>DxaF9p|2`51%@EIMS zAefkdM|Ywtfd(O5Hzi*F@@voj;uk)@{X-xAF!$egANSt#8$8czoXkz#GB_}3j%?v9 zSg{c5lZH0vxCTS8uN#gHBlaJGy+@ahBuX3q9J_hC3CVlz-O6pd`V2xj)HD|uXF;X;_(i91?b`WFc)o2R z2Po~-?$cpOWaW87h(S1-&{g!FwI4RfY>6Nt!Ic768lL?~vBI&bGEel6@#OF%eT6b9 zDOuE1$A(!=tnFxIRzsE`P?Q4S?wtyR%c9m(aYVv)9~=Yl(~1fnGS=3psR@c>Ld{rkuEL3a#5=6WuZ*7Vb(jn`*(ohqRSG zR#utO6@pAclJf$7+cV6Mcl2=Iv0(@_B;rbw(|jgEH%nqB6>+bF(B@hwQl6%%7*JnP zxIqBII6OE)P^nZn+TV}byc1dRP-m@W(fs+i(lOnWaC8(hO~QLG1QpMxXMBucWDK!w zFM6r~Kq8Ug(n~M>#EoD6@;}`0t#1b(|Mw68lCcd17#cpN~(HFZg5~hh<%jykgA~E?d$? zOFC`*&{0@gJIc|xTGKaKW=G$+rKeScmDC!gG|ykPkgHeDA?N$X7zc%pdBVp^|44=x z9YgJls&S0gh7uTY?5z`_r@{9`)Ot@!$%>{7%bV-D8cnI<)1NQ1Yh;o;j|_0rj&2sT zrg{F#*_<}372j9ne2pT&^UI`CS%c|U9>ww`Q(ozJtY|TJQ7lK{+tfZ>1t*FsReG{ahR_@vWFk< zILvELU&gCXUI;=_@O-qCs6aDO86jU8BUNmqB|DdfRJ*+cCWHlcjG?rl{7K_ENWq_A ztkBC;Y0zj!2qOt>=#%mUrHU2!p$f=ED<&!)r_FBU(-)u2#~#?toVs<)Zc3n}V-+YZ zg-#37NkLM$+}Az8*B?E~_Wn_dfn{o>!fPmwr!~fT^7_Ozl@&XGyaS@FTHuwwl(SGO~LmlgdJx8HXI=*G>x^%U* zyFCN_Gr@l*0hn3;*Ot~=w70gMRIZeb5>GZQGRx-ik_%5kBAJ!VAcbIdLx4-YMWUPb z_-L`rv57p}hR3<{P#=GH&lc(*O!D^AmhrNa7vd|4Z>dOHDO};OZD@$W$zoM1)mFI* z!R-1BZ#`of3E@z|vve}YDxqmRFODIaBSkkN<(E*1$k?h|F9I!*%5u}gi9FzXn&!Lo2XTRv222B@G(`siaZERvU4ITTCK!wBvvFK5xDq5A;Wr8 zYZMNiGAxA^%~?M2jFb7RQU>)q7n)nzYfaaC$vOp#grFt zN@o+-ty{onH|^uIm#swxA{xg_0a-_Ka5TqfHyz}j{evjs8$%okhybk|+sd!XKp!X3 zJN^2GES4Z3;b|I+0gloXZRbd6$LdN1NFgcYixh^(;EDa__dFk+%Tw_@gpZp0{_;6YR{W?f zETyH^X=j>cuZT4At6*nUbpq58n479GuBC!$g@HeXEo|dY0Lo$!B|`dUmM$f(5Y#1H zd?nb}J;*J4yD50^j76QCGq06~q^W{^ZQcG*2yHp=R;JhFC_&8DH5O+=1t1}-k=fi9!9rXkruYj!SaoBZUxQ6`H$6ucaP4sc0=R5pl*xCM>UhRS%{ zR;5FI24ROJ0a`fWl`|E-E4cpt-7Id-@P>6uDCqz+^i37{{;qDmyZs1$#Ww~xGUSxX zX{JxHF2HnJU)&xzyq3N~76PONOFDMYBGH!Vp-9*SY^tXZegEUA!IA1~u3kj)pld%Iz9BPW6z&g-r^m$eH!B1TkI6b4K6v+8P= zwp8+c@=B3*B&*sQxn}u%7PK^Qcr4F&xlC(1LwzE_WTnEtZra6o(YKYE(T1m7;brTV z@b=SJGT~K-3~NNSeQ!Ddu@c7G+(tIU#J%Z5fSss<=R$^|tyryJu^khb_B8RFL|Z<- zt$>SufUkU(HaBp|l6IE0W{h6^lgBtPUSdu|9W5ybpEv`|F@lrt!QFHo#$Z{)el=Fpr;@}G|% z=I+CTENE$DRcjr7B;X{F0wfLm8sSi_yS#YRvbA z7RQ$=0?-ax_|Ygp#F+&oP%_~3SuK2S(*b5RCdfFFuRVT{&pfn`-yR+^-JOIR!}rOE z8W=E6_6nXgtq5aQmHieB|}7dp%pX z&dB}GbO2`7|A}?}`R9uVAAC?JlWAS4l*|^nZUqZZU&;6X{;z1M&*1wWCo;;b1|(fm zJVjJ0G)XD(5fnU+O}!&5X|7|k?DNu}Jz!d^7A%IRSln92k6wHcSx4fjz>b4!r~XLW zz|=Bk^A}eA>I5GIYhxQTg{f&C2t5r4CSoH7B345v)MN03cI<$IBLf^Q>CP4S>SG63 z)!xL*R?o+0x>f=)tKsk?8k!zeM*wlR*XeEj>HlAQ&1?P^b3m+G-NxTP;>}y&WO$uH zBOQT*!?DR6pZV=x9yrv;tIk}`d(K)$5D2`$H%W;-zfdYzh}up?B-p2?yE|&DrEvU4 zrLFN#$Q*EVb+%pw>ub8|liaemj}P4a1of^wxTYJzVH;};)RHei`3v~fmA+~ql5T` zJUp_)27mLLmtK0wv1dL1>ZO18ws(0a`s}{#ZExdCUouv_sdQGCO9m{+>8oI19J>3> zrA{Yc@dB9Biby8VP6D(CI}XB8)AG;MWp@^GK;!Fo%X8j*ouYBbzx%JjtIsg3g zgF}Z7nyA!J4=d;Lyo*ldnzL3>Ec?{bq(bRm5tH?eqt>+rc$v*y+3zJC$+DJu9_kt4 z2fGe)aCiz_0onz8gmn1S#p_wwQjZrH&a#NCaKnzQO%|-f9a7m@zpC=zV~L5BGIISB zS{sSmFzU!E?>?lm2^;*i7HFZ+QkhCs=vZsrP|LJ10bVJIFDo><8Ln6|i<3GV2m)=5 z)&d(;tetPX!;BphgpmIjh;Mq4KmEK;nC(Z`NYpaeVl>05#&E0~!U?XkG8Jx9I>`%G z&7q^Aj?X=`mtDh?T(Gc>w3{Xf0&9jRkixO2AZv~>ehk&)t9Fr2RHYaf-Ri$6>EqbW ziI$KO;3N3X~4sSPUx$g~TXX_VmM}yI^DjVU-D@TkiRS`CaJNMo1?Kq%<9b-a%Au3Lf2w9GfD{ zcQ1eD72e&y{&lOXh1$P=fAur_*MG(KZQB9Zv}qF``N&7k+qZAu&WW+ngqZ*d=o^KJ z9HbMld?DhLmAJFo3=~%g7#M-AdyVmrU1ywr`e1i=_rK5VihmhP&Rl|-_50R$zx!PV z1_qiQeDJ{_D$y3q!gXCO^@|(o>n~ZqZr$dOe&iz$_Vo1Bhq{GY z3PfEBRxU(dd5|%MVx0u%Uk6W;cs_UArGSL-Pj(R$w z*wjD5M6P7PSw>POn-IKu{Zi5)C@SRdpC~#A6$`4mrcFM*RUR1<*_OLyiB-kj;zePI zZVagbVc<}@+6E5gfbFkKZDdx3w(_njYza#{gIBSZxQxA*YS#6~0^bs)gPxJl;B&h+HY|;hg^Naocyydp7yz8#V z**i1=DGTtkqXsRcWrL_lq4IYhlYI~z2azwr?xW~E-RNV3=!7sqKYt*sw4rXkIU;o#g8sL%(FBZSP<90st#V>U(Ub5^9Klt9wca#dn-)!5y{q$&nC4i1* zIB6O3{0%g1SWVlqMWjw$L++GSl!_%d+K(QZsJRMlt?lB<=UnxM@7;XU+kfA^dG2$b zJ+pB>P1XzzaAy6^^^YGlA|g9??w+F!(hc3&0twA)pLG@$-#4D|LdL*w)9U_+lWzat zYP$<f^wR?Xx_!HUphW_ofKPSRYfr@De#PSa_r*}a6C=nPqozMhA;^J;Kv8!Op?im5Z#N80 zg0mc&>!G93PMoSqq?Xh;{b{AmXrONxHt$7ODge5!J}Wvq+s}CNN!Yu0@0RGgPUO+~ zA{-q;kB!3Kqlm##LhZsetJn0u@%`^S^X;#Ey#hGzGDzfeCHQcEV_< ztKz*%ifXkV%Jar-V9oE@prgTv`v@GZkk(&a2?$U)N?Hoz3Fh|V&l9JswE$8i?@?%{!hL#E<(LdJ)0a3jLEihUA|1JXEBLfDnCh<>fACOGE8o9CohHc0)x z5yYM&=)NJ7xIN)ODurmuqLVHt#~xh}F$uK@fr^0V!fID%2DwuS{2KJd-+S_jC+GafKmS{FFE(!6$ORW%@VPBp zw!Hh-zqwlj!t*NO<0xorf#vhi9WA7q>ZxyRLCxu8eED1|4fWuApnQ~@L8McVbdJMA znq-1COvA$F%N6q7$LQ`p7Jh30;1i$vBp>|1-_LBGGYP=VdOEMIk8EqwBu{IibOUeg;EB19_ckdJTp{#d{t z(fA_16NcMmP^|((fSWbwaU$>99oX{LDt;n3`Hd7W9-ok1LjT zl65!m*1NVbQTBNAY0D}5zA?2y8qpnX4SR%J^=Po21!1)vL+$^hW59g}$MW3tL^nU( zbp+*WNJ&r$g!ZjbkX5fyadf|m%y-P&#Qs0h0Z^s_4g&PhBpmF4ql3u($56#m^=|hJ zBGM^zHj7xZ04)Q{c5uL|_nBwLU;)^D2%g+;^!7o_ojW&o#dEIgz43;x0kCGxNqXnb zCm9_b5qLf#Uqm14GZws{rEo-NXWPDG$BwO-KYza1wryMV^j&t@rKj)OwddW1LZRBr zNG71A5thzDc6H#^*O6^)hW1vb7IabRY_*SUV5qL83QkHO+gmAijG#v+!Skx06=f+g zeh?+TCz`&6`SVQhpGg2_)?dJS!(0DmelnSQm)$;LRy&!NIxg9;60hRbRD>a@E^KSp z2H{%tw*k6^d~dU7`C5^Y2_74oAgK5TJf$>=Op>>rx}1F3ptq$G1k$&(xhR_225GhG zKaK{ctE_`6>GzjGsbaTNyc&5 zJ~+WmPaNakgF}qu3y_eIl*Y?mc#+I+4YI%XqCZ7T!|D%6iOvUmf5%b)*(XI=iR z`*%LE{YhZ02t4%m0~UZMkP^|}(YAH&yjAD-4-9hb*f9<8`q#aluiyA}wr$(-@u8t1 zo0&>jI2&fSBf45iv^J5-X3<@3%ewH(w-?FCq&il7$j(Ax|=!A-8lf z#m)}=VuheoMrm^&gdY%uV=CW6D1|P2Q1PHpLKG`d@dbs#%*Oe2`S{LUf|>PH>)Fq` zg4^%Bqe}?cueH*+uHd|rIP0Y4{QG-ff}3!T5B_!oj{tsJM@BXAfNXF9)qe|LBjE@> z^x%{H_=&@4M}p^Z)v5)2?y^%TdD_U-N{QAUf@GxD7V`At^L{C7F|I0RI&?h0%ybSk zB5L327(`r#2>+NF%k!2{yMqy=}Q_|t^M3L9sx|wTF zp2ur9ETiQ4v0svCJV2Vxi&6;3q(qI0B>j1hf7`l;TX**|S@A5rGqi@*MhZDhCr+TA z`1=n!Ft0Z_3H!R?NFVG!hNyT^=yzO)*SzL6eDlU{5omktQo_0G;HNAfe^nrZEK-B4FQGL_GD0L-7ikYmS= zMF04%cf9jMU-*|VevGi^v2GbGn~&4lM53X=NC<}SJU)&dpMcRRBMww9L$M5%01*V>`)I8nzz;5* z**#}E05j`pzHYzs4$eRCy#5D&`&;8A-`S38XyDX!3(2OEc!8ScE*E#At7`0r9QxXp ze9WOPW?5Sf6nh89BZ{_kU7ojUE*0NU&cfckz_qVqX@yS_{38ifrK;vSqRK^x2kyvh zMZ~p(1O%!owmVISzh(#^Vx0v}6#S2OIL2-wZGWP z;>JcUS=vgeV!)h6I@d*Nh1MR@buCC#@XZ|u`P|0c6!Hp@wmkdL0$Btmc~G)OuK&MP z3kk=(_UIVwJXmv^7cN}L*KW9hXFls$Tz%EmTz&P`VOD7beX=R^*=xad?J&m$*MS3l z@W77fUFsX_#NGG&CSjB7nj>gxtY>m6A7W>;10t2pmZ$Q$j>h_WCUZHC9XrDN-uFH} z^O?^85C(rhsLobcFdL_<1Ghel^p(M8^o@`>Hh_>uf?FpY{KhO^U6y=PBYtBYekO%Z zx+vFpQi#AuI~t)}oJXI;9~p%`hv7iaanJEIE{>krIiEgjMhIwTop4=w<#XA$Z!brW z9s5Ys-Cetwrp7F9z2-t@w>JzSTJzZtz3Q=II3^&6mb76)zzIhOLJInFd4Bjr zHxr%*Dqwv_E7z@GO2U!Vma#U$Ra(j4`0K<+05u6mjlx`P<{l~i#ap+bAaJeiu7NgG zI|NnX8XXhM(Xozm2n_taWb?nQo}$&f7eZDOIRw5ASkRDVetnw1y=MojI~rKi(nvW_ zkueiel1#V|Xg2kZasB;I@Pq9~@Nf`GX~!{f8RQVolovO?l8_h_q>-JJ9>1r(n?DqM5eBOSD}!flg(yDE}xHn?zg}FEdWaw zFFr6fKHdxnl1VseDa@aZY-vJx0a}9VIHuC``YFX+TqcGI4g`d2yYRY^4w1BO+7>h&~=n+e9f z`4S_gVzh~$Hn)xDlxteb2s`)JC~II7=keF#5Mtd0Ta}CH!bDmdB|o8TQV}ZSQw8~{ z5dCk}=B?A97PYcQ;kZC(Z9VK&1aOQ?A%r85@VMju9|5a$%v(Ov9@5qFDgsVUQwyyI=v8aS7S`yNO4jhfcK0KIiD9PG7b4nj1ywEXDQGdHN*MDB!#anVH= z|D#f>00=jcc)X>x>2v@K?yFe~7SF%>$kC&-qYu==4w&DC)6#;H8a015{)RP_&RS3L z^fi>%E~m6$E|u06bTVncx}Jyd6^KwIOuE;l`Kh)+Ja z9bA_>q4~Ef&*Ypr?Ua3GRoki}KhtT3@rp#N>Nuj-pFmYHViB@GWaNj5LA*OL%~sd8 zxV5%Pg9PnJL=adYT3pj#ptL|(9RQ&eQc8rh9s$XiD8$<*fksGKz%C3zir;jPj~n6-D}RIC7mRj6x_VC zhkt!|AA^Om8BppNy)wN2@tYLA?Q~IxKNbTJ%2C-&W6M6+u^$fgL_hYzYhJ)NZ~9N_ zvsna^a=FY4Uho2LyY05>Yb}`#FMlSKEAXw`V0aRcI4%$VcGIS3oPFwPmEW@^j|(BR z)~W@dv9XcK$;q0Zc*ZlHv3mdh{X35wIbzPUAq(fPgQbgbl1Y>ZNG8+J(uCj9h;C^{ zB{Lv=WW_2P>cIS|B#sa$J6_XDAY6w;v4nr~ZK#7sj2y6eCp~w;g6`M8{N+nN^65_p zLY!DZ=>^w3pP%0HvzZNarUNjup3bYcyC>|2Lt7INaK%|C;RVW63^G)&Bi<~J>E_o` z0K?9$wt4`>Z0;2rEdq{=Pg#1BrX`hTOID%yZ4rDUpH;>{bDv9LMI7dP#ppgjKWzn8z+>+2}wihw4SN^#TozsKs8tE$iA z!9KWS6FjsNh9>~6laA)Rb1pu7_Nk{;KKjv*{?2!=&(;^TRxLu9>1;gsUuAIz_uO+& zmkIv%Jy$P4&hA8HQv^aIm5VNxp}UvVW4p=TyOsJaJ4hVuhe`nv1Zc-a;vl82(p$Bm zt4cJ^_Wh`dDa5hi=>1z;TF1MO9$oN_AKdIeRqzL9g8xhhU}int*VWfN?_0P3;?}?R zR3Jos2EAbwUGqD*_p^TkQkkHvl#R<_JKVI|<27>#)PrdPYhfpV_`F{8w%fOG|FI#^ zK3A+*#Fwu)g}ilJ(;{RJR6Wwe7Zb5oc~}Y81pjE}Z`yAkcvo9}JZWb+wD3Wn@|G{22-e>Dc&KYfVB*dUIu7d+VcU zrRf>ZK`LR!EKz1D{{PvfZ2P-v3#?&(FXHF`dg~sTiE@p$o!OD^T^dww&sQ9jMr3=3dpop3#H-~F=!rA)ot zP;ZQQHmsnoF3nVK%Buf`Qn)(agN_CN>H9`Jcvk-@oZaUtK1ZhtMpxa3(`Ps1;@ELP zt&MLDen7?a{_VV9$?3sgRl$4F``ZRbY~23)f`3g{!^;0^G>#T{8tRe>5<>8B-zY!X z*~?=`1~@WR1jixiN;$@D@SjHpV3R&Y!V$RA;jV)NjF-yfD#`%x zbgaS;H39zD8#P7+Yh7T2m!a>b~{&JeKr5~Z(riP^Uh<% z$`yR~rki-li(kyZ;Glgb6@Z#EcfRa7di421h~F9f0m7hvqTt`v)-DD{hV}jT-ushs zxugN98nUovDWanTEhRz)=D3A2qFO>Aq{N@qhM%cJn~wlbImo}a?33MzW}Zh!a=W`3$tf&;|H(h(hW-}l)NhFO@Rs#+!!g~P;4g>Z`HMu zygF8an`%!Wg{CiG<~cXti>G}ETz>iT^H|Z^K*=aTn*zY2u_= zEi9-{laj7Ua1h3$1_+cQ5Sq!7&(X;O2PX>b9GK#f-XVIXN>KK3q=TDrxp00LFI+j7 z^A@y_bR>Dtua3T>z;AH~e~t!%8q$u$SDJUJdxmYa; z;=)bJn)yuRVf$etm%D8r42?y<*3#U}SHJufUh;~U1Muzde1|u_;SH2aB{Wh?p+r-2 z%jsidV_V+$!N21(pZKRg`p`b~!Rz_QPkbDJxt(3N^b8JMZHN|*V8e1)w-P$qAux8_ z5(ljUl0qN~d6KCVI+>)rXg1#Bc@QYHuW?FcoMM6GRFPz^NFtXfIa$I{3fBo3&lMRS z7>0+p!FVoepc(6IN?Pf{bDw*q_~kEu)jG3lK7H2=4RB`FtlhhJ^P(5M=(^$I;rHhA zc_U=9U=EG5TlwI%m!qsKZn#-1Yic7krt%~v$@`SSRYb~q+KRm~d!X%*Dj;F?Ou=?H5X-~&={!OY7>d;5=U5DL+X&nL~jB{MbCWu6f z0PP@9I8u@nE_WOn;ElIFN^haUTh3m|CofseE7r{Cv{|jRq*6FSB7|i##B~saKuU*t zH^JhDI!>S6!evW3c-h)TJbOte^V=IKX~-7?cJ&VN%YD84=Ewj-!2HH0>J!pf&jvmS zjS@1dnGFx$jw!-~%g*IvmoyrS{7>U-ZPFCV#fm6_a~;W0!RL*?+QLJJ1|XS0gp$v3 zN}saxe=Vbg>3_ErQq>NUvU99JK_-o8%)oFCx>}%6hP+YqE0s$8_@_T%Vrr7J&pwN@ z&OD1;F2_R;KdiM@V)fd!H~#oXKmOK@H-0_%?E}C4gAU`;%bvlZgNFck{)=AN_TBG& zr{&zU&wbV8#N;D`Bg3o0n<;0tqt`8md0h|~hf0%-DkGENdsGhhQ5l{o!hxjYkaQ$z$0g}VTu0(a(^1e?Q@)xEL{TyN zewFVpqmgrH60e1@u7Xt~nyMgx`EDwiq*M<0%%^5pq^?(z*>vY>^ObSVZZ z(!LL0Q;MoxvIrq&w%zR!Pzn^4z?94F^(oGq+r(AN=kSch9W3f-LOKrnhjZMqvzyxw z^fO-ZXi2+t)n{>qV~vnhRqwzatH8Q8MkYM5yy`e<&JPre;iVYDtbTE?zf2*Qpf)Ozl;MA@&Bm;7bAUuY#JKVkSjr3BMuThnTvGtH$J?P zpZ?^h6p96|eZ{p*OiYN~yY>vUv~~RLr#|`dqrdB|-}|1w<)MeGqk%&Q4{_NuFMspV zBS)9(Ao$VP`1r^6@85rAsZIJON;z|=w^wdLkZ+rqa&SX&+V)|BL<5ANc|P5VJAE?F{%uU&N}1+Q%JSsEcF zbqNPY3OqlcFIS-_muIpPFkUQ^a2*6((filso{NDxwx5Sp?VaAc~&y+``FZO=guqJC6IrT1i*|*WJJ{zIB2D4O1V7LJHZF;ew^;fqS5dVC39o6$*7MI z&nCtHb_YNo?+R7Z8L-!|Sb;+Wh>>yh*d**c1o={pbKZh^3z#)`E`tLDdk!7if4&fM z`1ig07eD`n3x4sdTi^ZQgAXJs<%-|l-u}F?(J=xuf3Kc=CJl4jVQwd4v2ph^Ig*Sz zaYBPG714+L5F2-(iv?(JMa=C$w>9Fr3EWf?XT@Utb*m^hWDr`B=^IAfy^-?JFnVwt zF+7FV71N$fY`iTRGJ%?;!ZaW(tjj&)2bhaYVBwHHM=bcV4Zx)GP zJwR#a9`v@oFqMzg9BU(mbyjo*B$J3_5+o!Q*Oy1fKk-zT@1-w$89%uBW&j@FvAyMW zuYK*$wm!P$bRem; ztUvWS|J?Hy^!4{0IdJfx*@RA8&7w6+`PK(tN^4^_Lf8rW33Y7cq!0)dprrW`!}qps zdP>-;IWTzq$p78?!XrsJaP7}G^60S<@O`d5eHovw!Y3hIdZtRe@t2$NrQrM5oI_WAg1lET;yzL% z)t{zqZK#VfqIgwx{xm{62%)JXg)5=p!OtM-TXl=xCQzSZ@sZ36x?%M_v6Y-wa?_Jq! zhV|>#zwhCV8~=Iwzy0eCU&?;x#&6Hrym|A)bFO;sEssCC_1vDm-s6%SAq3iSp*{;O z^)NIJ#ZowCh<>)Et(6TMHheudmixq}Esq=lxZ;Xua>pHa&1~E=3Bb(yQ>=74HQx_{ zqrT^xdEW)6aQ^8l`L}nz7%3D|7&@Ck5GW{mKBd5mTIX5Eu^RnGsV?a_2rVe8psKwe zwN}j|=m-yGXgCINi#%1$$J=k)iYo*nNij<(6I?Y=)>^mw;c(sYV;nW;O-azC{q>mL>|Vc zU|@FB?KTJyfkrE3 zs(Y=>sLk^bzKi?}eKld8E8*)#{7#`TR?J zdX8CKN^NIDB$MdIEVMKsXSI@SZ9=9J6mxmBy_SrOLCLcKNAqb|yl63p4j+2^wb#C^ z@1~n>{_)JNJ(B>;tUtl};0Lbf6QBC{Y`~=Hby>s(r|?&oZ{P#3xSXUEl!JiB2S?e` zKfy$$g4Tl8M1t83SsX`EpGeS>PBP{Blqvzzb?8VZSk~G=MoKDL;rR+B42NCYwtd<2 zx%}n_jmNtRSUb0i&XmJLhX#1b`h{G3(oz;QWRN1j3j~3-+ zjgKDU@Mw|Mq#nmw#F2x4PSw9jz9Qy?&5-Ps##sKkhAj|iD0`4AAjWg(i5yH7A)hzj z_X6-L<~&^&64os+l|W`vsJbkoK5aBN(n(0CA>kkch4z)H_`QmGok|&eZIX*Z!C(`L zCCC?%Q)SfA-YDsK!HZtVzkcCgxb2SH`07`_%GSrWo*?T_8jzpk!00683joyDWjTE4 z2mzWxp+LD*qEe}l%jbD=+cq9}=pi<5-ZHU#`QnGRKfXP6w7Z*ZU1p9D&Z?=Zf?;i2 z$#G0)qpcZQ>u{T!sjF|KE|tPfxM-#EeV=@>z*HfRp3K9*5F8tXvKLpq7R@cK<$3ex z-uu08efOm&pSphH)vtav-}=_KW;XJf1Yl_yKWe$x@a(L3?(8L%^TIxA_ zb_a7BvUoZ`2L^oSI)Z$~=ko90&qSdBZUW&c>M{;rzG4IC&S|IY1q8y>y2iOp8SxVo zN(!WkG0v2>LO`a~ZQ2g5r38XRAsvSx2)KE7FTdQ^%}drUiX`smIh=w@b zuPVcDszyf|CdNx|d59;vCn4q3&@>SaDBs?zP@6&gSqc{!x+dAQ9vX$WY)1fk~mYMhd8C#biE5p-@6q0yx|QN4mk&RSRN^wR!Dp zU;B+4Z@lrf0PlL&yZFKvzA&?y&m;gd>yKSmTye$F9e3Q(4#0{9G^}364S#zL%NNgQ zSKlyeXSdRsa`Ci-=bP4f#K{-cs#gF)N>YwPLIji)>>M6v|7ecJWP;TlO|+#_2uG0= zlEGq;^S}8ULu*nM<~7yvpU*vmWvva2m;Bm2S?EYVK*j$aI{t}ij)Rs$XbL)q!0{0Q zIKrhdD;Sva_{QV=$p!GTH49kUn5JS|*+QF&)o~OzJa&Yy{B}40de!M%wR{d^g$hFI zh!PlvNrS2vf6_>#V~T|lLMrUp*L+_@Zh;DrLei8>uytU9PdvDjZAVABYTZ2EdHOQi z>r;5j1`R7=9P;(0Rs@bUFcR{Fvk4OvRb=ubwF5H1btE6YXBR)+egv`!6EwAJD(2AE zFWz2xI;@z|WQ}=Ht)!*-UlsdVw8cD_e~;T#N4$Dv6N|VTB-*sVhex4MMC|KE5001) zz*BDKqJ}@RX3ZL2{_>a8+}c7@LnCwM&ZVWf8Lc&U-E|jV{NfiG43!I~M+HZ6_8DiB z&rNak*fA!?$N#W^;yR|wlS)8KBcihvTIzA?vLs!H`gDeDGEG8CYx$uqqgYg*t56DB zf+I8~&u1!Mq!^S?Q$;w?2mOO4!7|6I(TMiew#hTkKI;{ZBX9fVFK^Xno_QvlHf@^O z)MpZane~URb?esa?c2ARt$F=&+SV-Lhu6Q7Ijwahgi9sx@uSU98PJW=$I*S!8jZ9X2GbR?g z#>EdSDXT+4Az={F#5UMSIgq$Qpz$z}!cf(e23I(w5-!^Y#(DVIC<~jjTrjVVR6h(Z}gr_d7oJHl`#KX0VJ6~r;?CK84zD%9n@!W8nYy`8Io?2x(86lvVRlBVPd?a7UTaWQsbj|PJ4OgBGLQ_!+ zWvfK2m1roGV{~n+R;>|oT~;fkK!dL|$z+1Ibb{I0BpZ9j_}54FP*H;WyN4iv)m=@z z`s78FG=}~rO`BL$rBGr!kd8!b#P1FM;jaiBAyJWUy}@U=#2&DxF@p1HJ(fn1({ zeP}laa%Ik&*Ft^D#S4^G5tQ~8E0F5MNsiH@MN5U!5+M{R1basdeB_=T6oQHYxakld zA*#Yae>tC)6Q5HgfF!DapWaQ-v9U*FRH>t`h``WkrJF=Iq)iLGu^yW0p{c=C*6mFO zHJ?nFq(cRN781??1HjOJDk8@25ZcPyG7sU(amtGaZ1L^}CjoQY)p*NcqfD zxbTuw_}V+KLHR~lrrPQ^mcBX=gt1=72E9Urp7&T3yD}A{w#@;HUaw2I+`Ri3AG`B$ zDoF_ypXaYx#3!Dy7Qd{}j-1v~H`11<>v6vKHAq_~04zPL$0j_XJ zCtdD1*w6d_>j^ruNxt;#4J>P^qu_fWTm(K6H|FLjj(Z;^toe)`Pb8C)SO5G`HXj{A zBvPO&Xqhyv|0v+;zmRR`59k1dG*{(B)ouLy5okq)EC@xYIvx2>#42Dx(5p87;~lqEJB<3Z^P9R-jNc)Wk{!JQZsU#K#oEViFvSNk|%3#!M2Ow$**w zeo1MPdMQacF4;_mlgNRt8%^t(5og=m12Y-`JQjK%=#w z;+M%yPT}jo$TL5AsK%=S(AjKObar$uJACBufiurKhfR+>JhREi){GnA%&J++wiJcy zqFu?tjwalsL&5i~G;V0pW`JWRsKn$`<9n8{`eZiZ8?hZjlS4_g49I&GUUTw7QjXxg zcRU8tr7N2vp#>GETA_z!k`4pDl_L)SUx!w})4^;tl|Rv_KnOt)wLzt6g^9p+10X8| zXU%J7_sAq)-*|x6pS6NBXEiceR!9Lp9?qYm>z+MH2M4WuwCf-&|6VEy(jm~AsdAa; zES=4|jwU|*npP=;5aLahgJ{QC&)qD6qzf`+8azimCh=0gLJ zNuu#VCJ~{4QFMKszx=WzeEy_7UK8Mi&x*y4XcO2XVW#lGwcRZf=rt;pg02*Fw4y3L z6pN5AqRSq-IjG_Z0;|p$=&DV&uMB%2%#MXNbUXnc1T#DROad^oo^taN z=!6RbX1COn5DB#QsxrT!MtbPhCZ6Iou%cLsl5!AM6ZXNUH-Nm?)R&$RzmEm8bIE9Y^`c z`*-ue;Zfdy{wmtC2}-`ku_8f4RJhvvErcNLI&2vl=l^5xy#pjWs7~#4tNE9dB3FNzZwnPu#J|QOAOJUUA9^;FKdJW&J%S>Z*t8 zuj@1{Kq@Hh0|DdMG7~VTQK_qK`h8%mBd~I1mjH5|(ADlH652Fjfh}&`)u=Nsb^0F+t#l8x%s1(npn8V~D-5mvvOtv1(n2O5HjT z3EXR#Cghb!FaNfs>^LfXz@AnNyaK7$VkqQW$Y!#XCMT)Qn}zmu!j1uS`yQCA7y%x* z|2|q<+jg9|;-oJDe*y6FSN;v3{q$#!?TT;H<24Q7O>cTr!>&^ZGhhPxdkX1@k*as9 z>Ja9(PEa?cG%5)hOyeKDs$MFtr)rnWlG87tWgM1gGtxMx?)L zz4srx&sj`><}#Sp9Hyg{pr?aOPbc~Q9$IGh(>7}cZ8Q34pV3dpjD9-$`snKKr?a=4 z&Yo`CyE7-MLM~Sz%w#Yoc{-(*(0r##oLU!v(z*a-a%QBzJj6$D`5oP$WUV4o zuBS^R+!R6byv76+T3TssYb9uDfyHy+?2};bjO4CbEEdg%jSsyTSpVLCdEW~^`{~cH zY}vAA0MN9ieei=H{OYTR;yk)uoDQQx3iaAK)Fl1|LGmb_ywWPo*Nx*)Rxvezj}JQzj?m>`|)ifCv&9vVq~|?fY4?dl(6)k@`sE34gQ! z0DqU`dISOo5#M%`DOeLt9c%rXCfpF|R6$Y|nfktty)$=+is$&~yd*JK(-(5>BuHzxIf#DrN|+B?a%v_hc(r!9pumqWhA zg9IZ4mc8SxZ~On2FJJ!E4I4I~s+@k-nau#8X~(v0*|O!5dX#M-8_?0#QpW`}h}a); zgeb}S6M0wl0KP`&pDsK<9wv%arC>t3^8r2iES>qlPrf_Q9thTeu~JVatfr;GgUW_! z5RjCggR~6&a7T}(N0o!M4OL@)xqFzGoVpkrM`?heG8IF0*tG!u$gV-CP$j~ua_!}( z@Hb~I;$_$0&41mqm8=op&o!hn$yn6DWHsh15AJ5tMrq|?iik|p4x`|3>cKBs=ax{_ zx=_~<{Qksu9kVShO{Q_IhK&6j;cF{CxWX`tli8&giVqEH?}yr1HH- zK~^iO#3HB!SQSc9jaRKYp6jk!#kbdQ=bwK10F}s+@#TF{7YvvH?%XrP?Yo9>f)1K0 zDINuJ(J@h^kfW+9<8VjT;J7}*fNV!A*-Q>{1vqILoO-+yR`N&F#*LdU-1yLjA9r_m zykTU-(HFnuB`D2qGLdFO!*^t&kmRu(E69itlu5p7WOkr9N5K=HA{Lwvm5pm;93Rx5I?e)8O=CZlu z0w)P9M$!->5aR$yN6Xt3umuD7R@G!-uLg@ zr(>hVYZotB{Ilz>`|P|geBpnZ0YKA^!DB(|1@t7d&3W;b#%!T6qd#Qk?;GTGFp#A8 zPs;vc+|m=PX{8`CmX4Mz0ggb(sCcC~O{4pI5R$y+I!mA)lK?AaY;YcNXN z^a*vVSnNS#OO2&`nTq!JiglV0rA&X0DSYP%##e|%iK@!1wj2hF#*&f+`QXGme?toG zOM!sy?~a5AiArt^(Fs-dfON%2#nm61452XMAfB;EEK~w`d>m=yzBspz1 zZQ5ja?A$pZa2mjS-}_#k``qU?1AwL-V-|a~zG-lL`f&NdH1MB`#SeiKn3{28)v*W) zRAObQ95JV@fC&=K_y#ANmfY(Mf5{6oB7V$I)3GE0{?Ihk2$Z9kTX!7b>XT+uj`2b` zGG&I@Xi_rgs2FWaM300B6+@tow8;fJmYT+ll_Fk!_Hn%Nyyg7+?Hl>{oey!_?qMfs zi+DIh&};!55!HY???AeJ<=`oeBd@|G4Fq6XpGrzp3jJuJ$!4LW4JAN3+u)27(Bl^- z@81+B##Ke`IqkGnpZeT&|JD8VuYbK605t6w@cD7v-tYr9QYI!V4&Rj=9E}NoTKbn1 z_3s!#JOf!nb}=0Qm^$z@b5ybh`U-hRV{4KLfT@mLadZ7DsW7e+Bce_`^2Y)5luQ5* z4vf;5Z((JBCzWbk7a@{*8>4|u<*2B1r{kOrV}eu0uDslHv0CE^3%Ysl#V7O4_4|pc zRWAV52+nNoqa(9qaH!uOp&w@BIOR0bD)GT8L4dTjK$wFdfaB)F8Ot59l8Jp&V5G`9=Y7;7|b zha9`UL41G^fC>@H-1a;znHYi)wF%#{r(m|h!EK?YHSKW^3fy^OlOjRv$b@LgK}##f z#xS!V&R*$$2Ur{P;M&!>+4C3Z&aGRV!wiou{k&!X(6rQ6oUr^m=?{^k`HUKr;Of0a zZOGh{%-EBMSjAd<=!t>ktIk!;KTSJ&B3Vz6 zWgSs~2Cj|g00TK}Ya3!MroA05I1OfWrYGK>9ox0Dy`u=svQgZiaM}z2nsyY~si&W| zIo&UD47G^Si4uW1l-#Lj+|Z;1Y*FHaoc+>Is5milfOGp(7uXPL)lIH5#8f zrAYNX`o?y{A8TXPm~5cTZ!1uXtp^!49T{p6F}}oaxohtzqt(RWTmRt(o+!v3mJ$g~ zJJ#3m)b%_CzJ!G^hqkt3jY1e8t4?xs!alzl9Up7Km^;Y^Jy_+R-};tj0MN9f$KL$r zH*>)S7mTKRB#OaWM#d%xjA?MxdWao$aOT}8$(ttnUQZw)@^O#l97e(hm=8lt490VP zrxd3o#fAn^np8S;YP;dLo&nR?Pf5r7V7OdmW=kugk(UN`a<|8FHamstDNv$Vxqsgv zaiS!LPILJ7PbtJSt!aMv?BR4s#}<<#k0Ydr|AF7%^^2(i=hKYq?X zb_jiI1Th9RV0+D z1VXU~EtYCAvsweCC;{mxhX_bmS7>Qk z(+($RC$6byC9Y2w`Gmk>1KhfmmK>VPL4=zQSh=~Y*W=Tiz4sxo}FpEE}?4L0A)$iNDJSNF_j{Ca>I&xtH=};=& zm#FvF`^}QbjGFX$r#|lQkr3433#n{SHMaD&6nvlq7B7W+ELQ*$@*}Yr5%!JO*fC!6 zlxuqEY+srsfTkVh<$&MvBN8Cl3}i#7RFFk;Fsqg$nK0$d`t+wh^U-HM^O>(wReAH9 z-`orUns#(pPfxG=N2H(;TMvv8$B`r1F`7EB;9D z&8|W^yE`R_Nb2{J5(3E|g*H!^1GRAqkx~@Vlh012wLM6`{TQnN;Ly{8Bm7%GR3xg| zrhjkR(Nr7oXN^1CG$9hp4!Id{KYSN(d7qKPn!Wi z(~eZ@?d_?1kA ze4XB6{(}U59xeemxK-eX-N*+C`oJP;eEZ=T&Xtl8OBJ%A@W8&|Cdj{OM|W+Yfqz7@ zo+}`(!i*m5IVU>a0MJr-GV{M*{_;&6!P}u305oli&7VKdrt5j4M5$b3V5EpiNqqcR zpvM7NThIKBF==+M)-mQ;(=arUIPhsW!bCH`T1_hl3H@*qJcu^(4g85cW<5BNP@s^> zrV|f>xW?cy?&(}D#DFNV3L8hpU8bbLAFsUBw5AUqYy`bs$f^@a z4n%9M3h4QNagG4=^mH`?fTkU}me1#3lx~EHNh*^Sb`6dZ7&8TN?@DE^M}AP>J$2p( zPYftdUtntf?!-CSB?%-1VrvP3FffiH6a}My6s2(5 zshA$?=%4;|(BnK7=cBP?L>MmD*ga88rJ|eGw4*HoNVk>XtCSY3MY4Gp1XOB{Flf~Z zBn)wNQNtZyx$D5}*)!)34UIGdfTkUp_L|qcn(ut)yFX3c^5{5~a+U4-hJ6<9h;h`n z0wh6*H^}`en$FgyDgx>vY4w!B#%~+-RKTKm7QcjXPV2PZX*td`EZ0ZM`6t{25NnKR z>;eFdQyJnv3Sl6Pm5auSgFpRi`r|w%W|dHcp~)Hp#WI+HRR5uAO*_)jh?i`A4OKH)u<V$)p{4ELKq88&Gk){X%f6?DAI&S}GRzgedmN@b1HFVBdm zdWicycFB!o|GF6fH0{W)X(gH}z{>F>sBuauJ z#Ar(I>(ulVk=V`hTSvJYE6i;xkjsWxtKJEFG(L4IK=~8M{_8?FQjh%8Q9~sZSMJk8 z$RGbv&*vR~BMzeRXZKaVJ~Hij#7{t2Bd93WetL0}Anr7BZ^ z4NYs>u@D1@Ki8~3z=8nDWZYh;#c=WxWL9@VBwb@bq-__TY}>ZE*;{R{%{C|3rp>mk z&92Sb>^5UEHg2}{&A#8CnZHlX{oLoA>s-(*+;7p}g2u%swK#lNy^oE3Tv`}^1jybMuNGP9)%49T8~;t2wd|E z+(3{JNK%-MLhsmGAXWxq{Z%=k1oB8pA5YE9k5?^NeUP2yIw%;df;a#oYNRP)-v%gL zf&N69xWuxA<}}8?n|7|Xy-nOH);+236yR-?Ah^%|whkB3C9-MFh>>SIvq%sPe34I# z(@auSt;e?e{C(K_3~QSe_(!IC|r&l zCD%qHcI)5_8pfsS%U`(pko4#%jDXfA`t;-Botv&~2WM1hHiGu=@L;$S64dP<(t-K3 zzA6pkVywvUgY{&z zQ(F<-&}h14pYo@EP~SyK8t60dFJnIK2NMv2?S5j}RcjV0FeZ7yGoXundONL8Zbx-H z^bg#AX3RiZVhDLW%(@NcAKn+j4|zYm21>aCi3}h6?H=dSyZ@`zk87gcyJS5dzpO+q z9Hg``hE!@Vt57=eiL;Hlqxfrjg6Y^!OKQ-QXo?9(25}2hq`$J;))%_ny8R@E2VdQ$ zzn$7A!ulvZ&Pe{8*nPvuNN_!LbM6cBJ7~2+2ujeUmeS0KF_mWGksim`-6u3_j`*T1 zX{S(#VLX-{(DFU)T_R1VMrXBw0I{Hem_Z{}c=N~kjM@rX4HDr{C9)DIV_uVdxZ}G4 za^P?r9(e_Pai$PM?oWsyu~8TZ@|4|(F|dF*$K0r*zgH@gWEbaNDTN`8F=mKkpgF>Y zMVdou@Q0i^+-L837&-B$p5}rm0PGRy3zD8TuYng0S8y!5}cCEU_8-YCp5p z~*`B9DNDK){8f zy>~{79-R@}UaGkiyNHkq=eKox{{)Dc?%v&LXlEs7W=*1kQ1#2^4~=x|GGDhZjd%As z#i$00rlaUk(xx#%cPrf(6qqHSC3FV@8Z=<#EJ*p-r?SA@mM+JTGfAu%E!&vEv|i{5 z>)$`iyL#7KgpgcnCakCD=d%jRXyp5#&7sma4jUkbb;*L-mZ~s~BO@v0i{%sxEX~5A zF{n}zv*nXxw5X(+GzztC5G0;g8<@|5`)zrs2Tc}76JZO?3Ls_<9xW|&3YBP_-33CJ z!46w_g;REN>cNTgMz^Azz5+QU@SQwM06*%8fp$H2kc2Q(S*Qxll-{e2z>qc}RX++& zTnwFt;7ViG>7TFjWgzpJ(tCPw{FNRrd{`6yIkgB}=tq_KZx+aeoR;3SDj~bhegZMr zzTbPjo>bMEdKRDJc2$_veEEF?(uFJjx^<$o08!5{R98ub?XpLRK|p2A{N3WrLBwxK zU^txi=;UnsbcG~`zbF0cOGoBLT1f)J7=HQ+taSNMeHHiP3>7S6bA+0CyT5S`(Wi?) z-NHpV>_x##`M$)ig5Z?!L2}%pFzp;F<qMh-zFx)bd*{PEigI-dZswzt{k`sQX%DRpF4Az(0&6x1kS+xYJYk~-%#`kR zdex2`_+QqL;>;kb>+y+-hK;d|OYf)>1JNnX2b&?s>(!#nq~&mUQE_xcb85~w&K zlTnc3I+Vm=&8nZ89#fp?>7l4+Eo9cN>pER03k+2#h!%g9V6a2$j!p8jER_4JClDAa zhO^r#Uw~Lnw8is&f$DlPyb+V%%VFF5QEf_Mk|uy?y(``u_1Jt;<(KBRprwJ})Im1? zB$&kMouj^6{rH9A!RM}5>%>AVnO3Wsx28h}r=vsB$ z^Bpol-{4Zm?~(^r6OxPk)sdeALA6FFx+;N;n2vuUyexin{btZ7Bt@Ash#XyW=R ze-nRg7TNv8fxGay^3A=QxuW+IaojPN5=u&~{^)xoS3|T0;@Chz*F@a-|6Lp|spx zivy2+cy70F(jaa20`v&A$P|(y9EXkec%oM1pAN<;K|B*DOh0WM(5xoU51YEbdFwVb zSwf&N$Y7`fBR_YwC5kdD>;PgU38~8jK}OTPW@y+{1aLx-?7YJM3-!0VNUzZEDqJRF zn#e4HNQkiG7QDzfI$i!LHANPbvD$Mh!`GXP6ai9CA^1ys(Q5*lU?-88aQf(B2> zWWQXg@;lsF_8PjCjln1^7l5w?3V`#0FOpFAnR;P=y%pn|;Hwd9y3aN^w(ejIoM?CW z0Qj~096#Ebci%BW@@4+tAeqp0om#g&pZ~6W-M%i>u4V%vrDPa(?|zx-?=7O0;|^(- zZ1EF9HYd-@0h~j*n}0jDE?srOl;33QPl|>uSj~}KCBSgB z6-}5ry}99ew!Q1q!rP2NpE4<3*SPzrXw-^0i?sJn5>dk?Q~kwgiO0=c%%ft1U<5W4p(0o>+GWqaP zP&re6sqOh&hlenhcoii3Ww6-YiUI{eM$YW?UAas!QaxgYoKMUGA6|z_VHg8ymj{Fr zcQqrMxUp+dsGT{Vx0}+fq?9+S+t%!8)Z%HvAiM1zoN_{L z%}+zd3ymc5Bxn@mS>|`8r09w3QyTKeBGmkeC4VmE9m>c{N!cHJX)Fj77&&5h1HS|$ zn35ZG_C^@nEAVUHV>7LHI)>!iul-J&Wu&`rxjEf$-g(W_^*pF z|6LZX_nr}VoKNBbih{+$XEw^a&nI>1+*hRdk_#>`!FtQS#wq7IM^wcZ#} z?)8KF@xUY5yu0h(z|K0WRk@i9{Hq}-kH64gT9^^y{TtX$rj(^luDiyzoEruigE-QL z49<@JQ0wAB_rvqHgqYHs!%+V5?eUAqKgZv0XcyLhSeVyYm{kN)MH!MXx9niOEOX&> zKCH5%WZchT%wJ|L+MzunK-N%QldQzsI8l!E?S`h#DNB})QhyTgNU}?Xh8kPWUqIU$ zwPN0>B1T%hVLr9pZt8NR;7!o7;wwQ8`nq(c(CR;27L<*DI- zk14zO^mzbTiif-5Cs5?u2}F4+0U6VAiSl>TqhTUH`e`pvBbmqHRyDW<_t4#{&h$3E z5IK}kGL-YX(%*cDVrsjd*sWNxA-*Rxi!IK1K=4xB@kBkis?&llU1zB!kB0 zgn%0Q()~0;+TGwS=p+5RI%j2!p|SJn!lwls*0sGtoQ)G;3A4Ri4WRa)e?GzfTtle} z%`43X(cmiTeIa=y`3lZA_}>3g_tq;JKEQ~Y#ae6AGYQVxy#*t)t@$V4jHS36!J^EO zk}}reVaU>M@ePIcV#IHA?Ee1NhuOx^ggvBzW{lOMkSPN@=Xn3AwFS2M|56xH2U_M2d zKiq2XLgr;Wx1nE+5xZ#W0(}`pID89gcP*ShqyUR@qRpX_nekb0R2(iJJL*1XKwJ!J zk2To41Yf@40tGJMnw@4(CQnz1s0^!=zgu!132Ebr_;<$|f`nv+?!YSj2IW|au(_1J~#QAg5LZ zJL!vgAPm=>Xq`ci$Va5|_k$g#pkGtuMOzE8ujUHR* zqW;!wPt^+*9KO_b2z>E279KTr>vToI=zO1hWwcLaG&qKZfFS?!doi`)Xem{@NSfdw z4Z z;x?MW+0@d`;vOUcU5LS9?9KZ)|5ty2RlcvoKRoG=-PY5T2XBo|W*3d;O!m27KUB*LK6tG@^c>kFjB%)7XGdfCco%46+TQ)= zj@eN(;;1%abYtj;C5*YC@q?P)2(T(kum`R;zo8yS^VWbH;K9Bfx&oC^%O5>!BM50b z+Rg`6hHoDN4n1$5{%!cfTfx-=i|Oo)Bu>3YKTItWPRns8UGHH&&E2g%&T2EZiT~WU z^_Ntv%*iLjRk9X}@8cm>=p)*)zImei6xR5&qH|b(hHW6S;i)3;F6I@1)E8a2L)Cvz zZo{+fB_hChRYhh9(QGQLzU($#33kQ?oC%;D*5si7!uMoNOZYs{|K_XR>O})Ms^s8< zfQYCIMT~Ojlq}3NRC)6|nyCb2d_ot6g?P**d}$2iL77Y0Qckvx6UP84R56h}mRZqB}F@ zSIWvTxwSyZR;U-(6#cX==DTfs-u?&aZ2g`R*qy-G{cL?U0}r|GF=FZ0Zj~T`-*Md@ zpb^b8rX7zL?_667L2fC$^!|qkDg*9mt$cKJs7&3V|l+{k!>yf>xv#%E0~lM z1S7sO%QA?7O|K;b ztAG6r3C2Ah+jr-qQ`f1Ax)T&Va!rSBJ7FKW&oQd%!PwmCNg*^U{BJCYF7v4K#l!W& zJ9os`COVFA2BAPnFEO;MF7Qk6?I8xAiwFNQ8A3NYVXC$Xg`Jc0xvhKQzn^@Kwf&Y8 z>|wNogcus62O8M@=^wC>4fl8e)oC+k5wKifh;^AyTkJg2;C71PpxHIy8lmw!2gDrh zBbcZyd=$wG{Vk1Q)(DImFw?wm{;9gV`9LsmX1qel;+k2>+uUV)-=Vnx{v%?Xo~7l# zhtL^1KRKbpZYlg~2PZ3F(Y*H<)tEd;#RBQIk1fnF*b`uKoWeXHPO3ahC=jU8JLYurf#=+>j~?ngZt!YA)i;x}eZ)HI{t=!%_MlRn6

&YZVW3!3DaM$9`2Lh+730 zM)z8Fd(cz9Bnk3$W9!Y}zq4t7;Wh08(Cz>p#oF9}?`#E70?W(eph0$oIs#!aN7=(i zwtWBBi?SyL}9jj0|WEFc|81T)X!@&ttomsIWhUzqo!lao({Svu52MS zlOrJl0ilS+GozmgQ0uiTxcJn~e!tdgp09iwjw^6xr$8_3fOO}0DiW%jmxLCc-&vDn zlIHy>SIX!T>z{ViTK%DSm(ZFR=1=4-lq&7}$nu5$e1!kae;5z=Ye5TYrDQ==LUr1! z;)u#KFb4M3sxXs-r}NeRMVJC1IlM2{de^ScRke7hP^8Z~;YEp5xy*cHOqeEjOv~Tj zIP1qq-_qT-vRK*G8?l6E^%aNvbI0YjHPR_bfUXp8`ftaL2A=N2JRd*Mzdr3}t4GfX z2|)kbiUrb@q$zMKJ|*kYRFf6yvpp4qVjynYRC8{I_GKk)} z`t{BRDUm&!6qto6!oy}TpT$d~z>Xqr2s;|`95 z&ppt#d9_l4;({_DP<8nez=!s6rskw#_!!g%!2=uo?R=HldJ@y;PvKkdoXsVePSZpb_w3M(P%>&2E6 z$i4lZ%;Cy;Z-z(6QD&isz?3GFtNB~4J3;tmbQl**Q;nzAPTs3O`89O7+M8R$J%-;I zkmF9TnT7Tp`eQ6jC@r4h)^`7i|`n=Yih1crxs=)~F zLNb|I;1C}L9d=dJ4mXKZN{jwz+z$1J=kMU}JLz`yAeXVE%-5GxEA~#R=|GoME=%{D zX}p{Oif@t-rd^r=OK{eZV(|s$TBYCp+t#SfLXPkY$)363X-NP%xPzpDBOwZrA#Z<+ z+;2jj`IILAEhOK@?qjTkf|Y%b=a&rb2YNi?ZQ(dakwFccveeV7$ZUSp^y&+5eOtpUs|Mwv|Y^yo-EbD{b(&a z8MbYHZc(#QQt*L3G&FA%77K!E5dk^$S!lIbYh7e=7LaCt&rdrXznku?{e#ovv^#gFI&Dkl_Kw1wvX^hOVzHtD*OjL2TywC?yrz7HxM+i4j#lO_u#N1=pljI5Y>ss#S^ zg|bL+vX#4dO|#PQj2s0Ay1d zY3!7K_{VU9#A10Zz7>dTT`geE7S$FOw(Os9Y`8qG* zq>CPDnBXHrW$aLQxZ(|_z4*6eeRTM9@k7ZDn+!lx;~?1zM94frOAJwB7Mj9;wwVrT zI&`fTWbfDW^Cn|^eXe`@I}K9#?6r$ib{%S!H)J<05;v4h^vC| z6O*D)VOUOU__8j&W^cmlO(is#a6nNIQEOTKhz&zLrU(KpwhtO2ki(&?9CL)DzFE6! zu%0Gv!^6&C#W1F`2YT37S&v3$TSCqU3$c0m%Cc=sOS78qC~f5A##VQpl*8vu^j933 z|1DLH)6RAC$x^i*D!u7ojt654%ScW#-p!GgP-Lh*j102Wsh(wRxMy+NLn*03Hy-0x zpYX!&!xhhfCm?NRz|5XiITTgd-S?p_qtM%|MZvoF`axmsB=@o)@ZS?dL1syxX7}o{ zgl?qYmD|~RMu!@z;c9s~_x0c=1jaW6ma#tj)D00J7t+RAqYa5v&u0%u0n5XH^doA3 z5IT?|Dn)C{4XtOT0nMfT*=BiWKzJ{3bH+$SNZIuS(IB?VC}Z^yW{?ogaz1SBOBbz! zFExh0ab~v7gwDi*hmI_u)$kg0=)gXF z3U&%{^aLa>=oRGQ2q^3qyC3u*T`gDjD=cQYY6R3?(?vc_d5w>Kthl|^V1IuE(jtg2 zGZBAg_+Z95V*ilQ^)1d^dKG?M3aVs#(aWIkJ42Ib4(l}xUHPxVhO!9$@m%@&4wfq% z&n6~PJp4Xa;(MS*AIKMe)35a%&K#^~qcB4^9dw+dn!P1AP9t(u@S{V42oP*r*exf_ z4fi-Uoy+`wRpc3a=nL7R22sx{*$^oy2L+9efL;WRg4r#Ztig*Mcav=Y^7zyuK1}QulsT$gkdxkp&=2vh^7-!&}D0nE5;Q(Cj7SI z-J7QpHH$Ln;~3I^tK0D~HWN1MPIhg&#d4n~!tRfnPty9nQ_Cs^tqlIj0$_!NWCrNd zh9hug^gh1ur$p*L;DdDWvIxZ~<$()T@U#$sbAyuZ_e5mC>r3OeV_z!wnHOJ4r|FJ8 zt}UdA_jLa^z{jhy<9|eNfm0ebzbmHqiz=fx1+e)~?RlHmUj(EAnvtIF0|Ft(A${p8 z4C$IRN$I$C4l;k0iUl<8S#Q$(6iFKZzhV_yak!ybVlTb+ZexSFCH~JHxl3I4m2A_urMpsYQ3a6 zchNrKutDFx_;IpcV$_pjY!4$z?n-2yoUaY{Y_uopPDDa%@!2@RQU@Bbt+Rn0Cx!&>A_|NeBnklsE4iSWnk@D>zm=c!r>7eQ?BI=PVztEvu9Z=!2G%$0wIA*JRmE-0u#ga9HD*2oBx_ zl4MFr>1;0b9dQZpnQ5X$3m{^;$>x{;~tCk~5xqC;D=6sj|P zWlUp8iyBmo zzo)nPUc&M(LlYM?s?9wXctHu`c=rQ4IV!Yed? z9~?H(59o1KH}gP1S5dawwQ?M_d!U##b%~%mfqe#PxAUB+R!JHusRU0{g;bgxkYR)) zmCy7SA(u+EvvEVeu}xCo7-4WpM7^Ap9`BDjo`LmyNV7zil`45au>~n0k%R7JaCKtp3+c z|26OKZcD+`(Z>ktS}n;-2q`S6OL|zq6a%3uWK~?TOsa0lxVcTz)s=JQeuK|7xl=v{ z$d|jB5c~I3B1&A}XgSlBa+mCp9()k;)Au+D5yz2X>5FQR?Ps%?+uPfjwYA@;D~$*P zD&9UmGX3m1F+lxtjY?z`6!*BexCWmGhx@ZNIP|-R$+qu6V2GT1R+J%r|Bep3KkeR4 zNG7qk2plar2zK>kgb9HDLoHbEynLP_=yl)dohJX|_3%HcDJz(2YT@LRpiwo|_Hf>L zA+VTwiJaq0IdNQ8B|L5QzBRAIQJ2lv(EY)}P)=u1j6&d{`wcI1e7t0SDi@Zwmb>LL z+%c(y_dEo8^iychufQK-C8$3KsPahyDj}8~Q@``dPfEYK-2i;RZE>J1%+Nf=NLqm| zPBprYNt;k)Wr228`vVR%G$N%OExh$)$Zd=H(RirazUwVc!-VzN+*THq733->M5b7| zuDm%`abu5Wr7__u>JF#NkOpy*h_4HwP5(Kq`)SY<6cm>S2~-IDVDQLXwV}|)PjFAj zoJM9(vW?{dG=A&m7`0qK<91rbuq`G1+J7NKcvqeel#v7ca9|;La4qMC2B2$yvb917 zHuvvICA!p0mFUwd4KD=s-fi1MVLQ;*F% zD+WauG{5(QM8Lo0|{z{v$y)`s|W?Ooxj@e{CsmQ zrr(F=Jsk;@m6E~ccKYBwrbSm5+VLW+vEEs*mn%5dTR;%hfkFZnqnCr{{>wZ z)A)NF>-KnonrN^aW2o)hPg}Qj6zo#QuffG(ouyW}pd%xVcXp>z#oz55a@%Es$8ZId z5%|m;6hRze^|q;CaulmsiuA6hXGavwy5Z2+W?B_>3^VUrTykF{?qk#LA#iWWopK}6}0pm$adm7 z?_+{rS6|9hnMVc(txuI$s!-9+55|4HgxQU|Otll#qc)_Qj>k8mYP66qi(HTBF|)xrWZyuiS z=$KVrT=uB}U|6F-`88RPUAzr>!_wL=1hr8}UuhtI$v}RK`6DiqL8{Ng7X}G%qVfL; zZORUUaVao*DR7>q8aAe*%@ktqH+Np=r{B$ZjKKglBf||FFZnIaJIY?qtFPf#HxG4p z=WXvqvu(ajI{Lk|jrcs>J=}KNnFC+Xn#;4oZoQuoGnU}?3B?O=u3=1pT}|cjxM*TK zkHT94BTs)PJtUixgiH^?2L8Y5KVEw3L|B)q7+@EgMh1t6huiPp$hezz-TUrI1eLyO zq?(R-?MvhddZ0Luj6!QrDJW>x<5woq%w=S0*z%MRB7rq1i7v5V<_ZWU_9{DfK)=VC zE#Igsmrb~hQHzwK@8^w1q z38-x7;Tu~5ogetN)|&jlznZ1Xo%*fGO2dvWyUm;F4o$tUT`o0lj;$K|<`d0=k%bCP zZEHgL<=}veLp4TD_-p!rGm!Hr8J~_j*^{5+Xb|V8fiY)!Y3ghGbfLA~ zDJd%#0Y9R+M;`1~w1e=H5Z`L}T{KY+^3NMmv0yVPqul=OnYVhiYO;b}-4cfq|Jzk#2W+}^BOP)HTVz=Yjs{6-% z5S~!{VinoUBYu~TMx5FZ`VsDmM~yVZb+{C0Yev>aMN3Qkr@>o{EsK( zoO(z^7=ey8uZ`ceKX74zWGrfx(%LDbw60w$u`JE>w0O|i{Q*<@qcLeht^$qtD3ABg zxu*;uJ|87IWj%rL`RBDUD~U>wS|oGg*5Fs^HJ*|+=h~hETth2c6trH0%DwsAsW$ht1(!L!20!8kC^GL z)?_k=&HZQQmEJ8{2YBu*oPY`(z+Gl85-v)DI6Bc+5~4BzAtn9Fwxv9zT>8mv=u<&J za8X>rloG_eEINLi=({J#arw5=tML%@exF+Rd?ebvKbbwR_U^MaskilfKVbTl>pG>g z{%ws!|E}7q=it5b;;Gest%Z*^I*mD}6?5!h_MR6{0WsbasaIG53L}Bhl!b7S9IM~J z&SV+_prq~hy2RSC9n|w!_t9PZAK!LiEs{yecyjgb3!1;^jFlMBpY9+gb-8W$D=S|h zTF~-y zay)4LW+1Jy9&bEMu2(gpCRGd~NP7V)R$;D-9d>aP4knhsbUP8XC2#Q)G^~5nR!Vl6 z-(Rw@d{@MUTPowE84~i_CgvYS_Phm_bH!R36*h@oRBPoRSaAt;N(Ezf(B%mU)c4C4 z6yU1hj#yA2n*>?In==p&@Rc1}#9+Ubifu zmj@57ol3&Y$RYRSzo*n9$?OTX?d-n&^fC{+{~m|cxdwh$$iQvzyefN>r7Lz!0@~1p zRe^qN`Cz{%aD_`?d=)DB61jjw|!29^N`kK!az+F+S5-*GSm)w>FDm%=$s>!nR z=uBTuemSW5*s5WpI$$vZ3QLfn#=+xu06*s0cnqE;lbOe~+wBAO{pMT|Os&?}p!rFx zCMBmRnX-VdAe@wx94`*o?)d}@7@lrgf&%1fLR|XvYr7<>ZTbXwIw5mJg%OPOxB8F) zH=y`+XAdT$nm&upMC=;3BSeu8)MAI zYdek^pTM!f1vL)1dP4BMVzA^Uz}L8Gwv3_F$C-Rbh;?Br%H( zAu^`Qc4b6{bc@yd&q+hna3%@yNj!w#gyGhSy(Lu(nrm>Hy=DCUKk|qi-~ZU9k+qr% z_IlyvOxO88RZ%@xw_gqCGy8(L@}9HR+Sj4rbTAcn!fD`}1;PbWiX#z0A`YYrM%Cg(LU_>53 zcn#K;bVDvH97BmQ3GD-{xXuxWZUdnCE-4r`hHOhnN&Gfs!3H`01_gDhsKgS?5p_EZ z5I!V1Uf3R_^>5gwLr(M9z6d*+1)!7y$$lQz%)yb5N+c9E%MtQfuB#X5Su=)nOt!C6)}1!#Vc5u#@A2abkAV2vaLtM3kt==;%Rt3Irl z4^oZ?Vv~mi{-vxk1a-`hiUd^_7dz*MsPz`Y8g=*qm3+6SlBJEy0kXHdUEkP$06eLd z&#vgN^OTeB$IufrWYj5{0DXul0n!E-CH;jFye&VJOnq7XXpG%GS(uX&2Yzaw9};rZ zDfA$kl&-meO+}uuSM8L_WKq>vmEEUHthn!0#fuIV@y*f1MS8MVx7}m1MiT4T6ohkI z^(nQl6Y9q+whH84rh4WdgSfPn!BT`+#ng&^>uSuQah?xKhaiRDAM9d+Foc^%8@FcyFR>nKxS;jO2U44ev8XXbNrL zU^-%+a6|8fZD>ur{?>xLF}b|wz#RwAo@YdH*&3QN#;)J|YwvkYr^_sbJ%85#kJZf3 z4lYpxn$DNFssw1ZdJW<4f3N27y$|Ns>#q{9r~*?8Hx)jX>Vw~c{C*-t!L?duG*t;) zf>d+3A$V0M8jn?8i98Ayzl@sy=|x}nCKC`sjCj5ief<~zQQ8Luw^!SF{?zJqbAU`e zMaGwvD@s?VuhWwSMOAxzOTX7^gCvF`g=_km5~&llc&JC7wZm=ekBdQ;5J1sq{q$b& zVy}TtIFamqd-x(B?5=dNJUYs+ip`K(nbD_uy6y)$!>3M1;Xf>fL1(JxyVeah8%z#o zII64&E>fAkU;4Qf8dA3Pn6F=YF75SKPXS%wc2$wA23=|f=O zE;88BezVMol?rhm>u7B5@~K`L-?=xsn3Kxzn2!vRXoS}DM)~|tw>_M-quqW!t4K1K zADMks9?~aZY>_171Cc$JRlZGqI#)JXrH0;qU&L^3Q#87W{nHIV&n6md~tON zM@>ylgUPPs+hM*>;OTPv|Gi^cSh8E4z~!?3KJdjcV|GbYJG!t;O0`(G0&$>dW^0n< zW+3%P*3%6F5{?&-A8g|XqAu(qzs{Jl0-9FjvVJ2Uv{Z2S&aWO5Cz2Qly zU;A`++O58#H_tCm7goaI>3QFHO=iAGyJ!<(tT5V|eY9t#IErD=77>!PCp3bW=Eb{~ z&f_uPnEOHXlr5P24MbG#iXoz7PomNg0les>B{_0CBaf)Pn-Jxn6UNAW(0ZZJ`nn7D z>VdS$i8#NN+YTbrMXz$T4BQu?dsmz7;w#*r!3wmLliE%PclpfA540%^+zKI2-Thrcevg zD9hdCxEKJNZ+UnBv$kzM7G=FBJ z8D*Bruf@=5+*NLo6$*XF6tUrsyXgzb^TYXX{&z2SF)sx25xHwIMb8f-T0t{<2Lo zk$W+^fQ5K*4aEb?4<*To1>D{g#CZxx!2V24*x<^`)tom>Z`()ecx`o$8GsRo8mr$E z1LPQZx2BKOEBgHUgmkX=ZQc2z>+rmD3pRo8!)&9r{eaN-vJcJ&oND8Xy1f_VBS$5npC>IE76^uUM04C%}JF7gn!)OGIOiB@(p2L!8}FS+Wp(a)2yFtl;LtbiCMbre|_L6?^hzlS(z6`)pH~wpc7Hh%E|z;qhC}NKO$ol*O+U4 zlIUOCm6=s2IBS7fC{Vfs$V6eZj}yLnZC8C~vLe$=N}|anH}qNjC|A9Gvj1bi%C?W!%Tk_{Qgl#|6CK~|Dp@Ae2Gb6g#m z_CQr-&?Hx<9`%%#Rz6R$=8t$J?`;JTLIDJ82J?v)t@>{yCqNKL#IRX+lqLxf+# zO{@neldUA1^aB+IO_m^vbrl(>=C(wkVvCmEcSS#LTDLC4J^@9q2C;M+EfrmJdA0TQ z)?DdmX}e*2cle#=)JFFW&;#C0SOQZ1$P=ydwVjIAit_}mkp`&2U}W&S9**lj=ZLXK!eUVJiG7P=_j5y@npu+qx5wh+X}Tl zp!}OtETsbB^edN9gxTb5Ms(zsK-0x1xf&~05%ThMb7or#a`N=CWHiB}(dkl}B^3H* z>vb&I(B;uTQm6_k{ALbx$_4`AWh~jB{e6&p=&F$MMkp}RFzw0#Z7JP)QnZd94;WLgl`uR_fx#9X!QE&ZiuqwjzA z!iFLvBe4Lqw6v&Ic60xz+MXkjm91gzr}_(d1&nefjL67EzPao7+YYN>>l$65a53z% zJ3Md8cCa8t^-W(2V-h64WT-wFK_iBsD9aM|5+3$6dY0{VI8A0;thT#o#kNzV+#Vuo zvykHE6#h#ltX(qQTbRJ*C2;-Lv~Q`> zY+!|{^oGH-yCw7k*CmB3Y$)+lbp8P>U*p@ zBZ8QeKN_;wfNZ3A&SffSrT}APUX*Vqj};(2{3j3Pr@b=cDpnXlb?n2hM>eC|#;w=m zmgvp9T8}F&wl^k+_p!-!ufyC)7=g*|t60ZTupRr=9ypaw6zWG0k>#z#K|BybLDl+N zR4UPqDmH!l9c66$r@m7kj2*bwy2>25>iEwB1cYnJCAGNvaJ?cSk3Sl!O3c(OyUZoK zp0p2&4USON1WRSUClui7ZPlhrk;d9kLNah9DE(%QPYM`=N+N8~xNuUdAf-?xEH^tS zH_GQO5?RV%xTD+qP}nPQ|uuJ30IP{&TVK(spavbFR6@9HaNA*K&P;>G)nF)9Tcv ztzAu)k3dwW03l={k6!HJR9Mz=p8U}3{bi_`IQTfGJf}paa2cGW2k<-`qV(emX;#Eo zIQ#VKhh$q29QFoyLG06jm;A=ZmI%?En{JDSncUXr*Q(OiWIX?dsil=ImnmDqcR(^a z7v$A9-S7k*WcUTrR@@QC%O7TaK6{V#AkB~#Lo$6G93T4JFfFaEX#n%)TI-#jZg{`+?%5S+eU}WjA5cJ* z;|~0(vwQ74W&{qd-sHxBu<84A**MMl*9CCsu4<>6BrG-!Zo{;5Cnhs~F`0Z$3ES^4 zBn~HdkaJLHK>j_pdsF}GwlkS4Xlj|Fz#%$>dupSy#Zt~Ax}FGSjs?~?$1+{2XfoP; zkZQCp@OA0MgCxCGwl84EY0a#|GoW6#?16zB2c6`_8mM7BI19$N&fOQ=a+!~+t}=DK zU(n8^#?cwwqlL~8uoUNxOO`m<(x$^3t&SQ>Ud&du#p0zho-15hLAqbcr9@)@qGb4^ zda#}A&mY`f_;NpzyWP)1b=+7`n-~$z1MU{bx6Kv=7hO3&+)?6q&xN&T0#gBKE|l)Fz)LE zg(&xrR3kNykNO=TWVoZPxAkE=*6XtH*$y-j_c~?Vc*DwS^nly}?;E;QNEPGI(YFYl z-+MF3V(BU~T;lP0DNQm6gX#xz*Ko%7`{8XuwZ}mX@MFUQ1k*v%GBOU!>ZbM^wl*Kb zxqLt1U)Zd+>ROd58o(nD7>FJlFVE=JOY>2;J-dir;4>{Ie=1;#! zEm(5gKe@NtS!s%6HtDg*;JOxW-r073hkkZpJ*0}p zlZA&5zs_*mpN1${^R0ZJpIqWq-nPKX>Q&(scOj~PF^`1V_w!TETmpF{BuIiS7KCA@ z#Z%cmXUXLF&I{&rS&>e@uhZ*?0B9H%DH_ye(LAAkZ3;i%gsWZH5FwkDEWnJM{@hLA zDz+iv3Ru&q_wEH{&$|ygx1YLS`=)$+PXKEFTBF(cUB|os$1g7WwLP0uo%^6Og`^8O&vjP;A(ep$ysx`^ zo?6VQq6;y9JdYQ0`&)ZIaJPT@5wc!lZ9N_=qtYy^G*ma~4(lUL<q>NP#Lm~rezyXq7x5aD&E8(lPqwc!o-KFyvb@PTUMXXuH5&Z8wb(s^ z21w9fR&3^o6z~t*5qcz|%;uq(4gQFlliLcx@Q@?zt~=z|2vLouRYM_5n(3Q7AS|_N zm?HG-5S`D1ePJJKsq_Q%#NFLnmZmc~FM*yn-5>Bks=QAW4udbgc~dC62#u~i4_93e z**C{c3o;9UKUi6EMV}H-p%rrE2wnX#Oanqe{x?n(#If3reZ3Xu72+~{e`KrKX|vUv z<$jzV%0m7>R8m-@YWKVC+aeh+bl-k(WKW0n=yPRtGoFIAo(V#g+Q7uogWCcu?fz#n zEGC`G*J=yip3L54cw1eu)!$KD z(g$w23g&^Fy@Ph`#?pBOz!WFEUp8Iu8*`s7>ur55GPyE3zv3B)MYRhE2HMF4bn%dmV0=95&Fi>+{b~8jPR#m@xCi>mlj#6<6Owk2hJZ zTC<;OZcmT`&448O64X+fmRer-tgNREX*)q|JoT_y7!R>!*nWd20_m+X%Ej;9Pc9TP zIcgni9cThnjlnoi)|+F#o^Na)`x*36=2O#;bZSqs#5{O?z;&TY%l*93rsFJhM`n98 z7(-{Qx^;VfbJw@1dr#W-Pzb*(MI`dr7SL!IMedUa0(2%|uH?x1FRAG6Ayt5?f-RP| zu2f$J)R6ce-q0yh|L*7fJb9f4;{T^swOlVWo@qNzzt6t$)&zzL9>}q%=A?@08fwQ> zW5n>_R%W`gaLN*GG>EV0aJQLP2j*qD>jRJ1 z$1$Xy5lD!bR(UV7^qbMf#<~;09+7jR^|jf(^SZv03v(MprZq9+^Sp38@{MwJ**J6j zykUD1Oy@HP{`1oNd?l=&k^Y70bg(WN%v{Sb10tLM>~t<3U{kU^)d+; z=f*5YBNY0h{hB(N-BU3Y$IDQ=5z}u{Di#Cmz#vRzROg@u5W!t>bM~ae%8~%V*k@YF z(RT$Nw^GmD3EXu8%p093WfD}gDR8UbHMjn{wI|2XogCIK7-ZAuyKU1lDNZf)y`8~5 zULk^~Nobb#QilvO%Us%bP+we?Kw0zU{YY*{Lm@&endZhiD-`8GiJ*iQoY1>k zmRKsx+$zXrB#NNpmZ-Y>@OAdVbN4ED;xObm&Q9|LSgc{cXsT^7ZkCM>3&ja`gU#snk(14ki8m{ zwKhBa#uv1hIs79dv*h7+ICBE7u57_t*M_Az4fpxjHt%z#K;M@XsuKvlc0!G#KTzw5 zIgdr^t~=f@Ga(R=v8sO4E{6boaEptX`IBM#vwkU1!jhV)^`m7cGc@wxHDTKiVO<#m zWh4eo`&W{pY`ekHL~`Mc&r9cjO2mw3wKc$eb|_;B!QrI3_g}929=P{kbh@>A_sQc9 zF_PAoXb|ZA(r>4fX$0QQOQ7M__uxJAShQqk+oM}4RM3fjo3~}mG ziH!E=!7_y_emP~RhshTQ?&R6nlYYG#3uY}vp2rw+Uw<$Lm>qww90(D$VeuARva5V_ z#p4OnX4eCd?@M=Q`)ixdwsSv>!y3rdo4V7HNj!98TisxJOL>P~VT>j{Z5uy8>j{d2 z{Tp*5hJh6K$71Se%tWx|3VScJS7YYI$A__!YN8DOoKqfO1- zTv%xITquD@h!9`c55PvbI=>Hy##WjgZ*~5NkOSb_O+V*EtzRn|f ziTu?!8&Fu2!Tq(k8T;e2NcW}2>HSR-$64`g7;R4Y-K;>?`#!StAHxysJT(wVyusq0 zdO-qUv&(Zd5dRTC`(6~T5&`b+S+}YXhr*WY=g+jpY{-Zt%{>w8J_tB<%o!;Otkf-N z&fh-Mn^-lVUHRwsy1vhz1?U4HG?M3O)_6;sA(Nsl;9=uE74F&TFYhWZzy5s}3m1^6 zd>**h{u1xcFF>C2=WyfO5L)T{0%z#;CdhykUNZ|dB3V`cxgfCRANZmw{!@!zL(PnV z&E0UxF33biLV;<1kS&+TzP=88Y@b%}$N*heMZ~s)c0a;Qyd8=eelSdwS>EnF?>9ZT4xb7<1 z%~=@Sdw-_YSu=B%xeMePl}isvqj_GPEVj6&#C%cKijHY)YBt?YOohkNfY30@7u$Sq z*!k8QGC_-BX1IOu0GA?2dE*9jr0^LB`6zJVu%JiRI3>*UPatUh1ot5jpckoSQPhU5 zf9IV3S*Tvk;C!rZb_!Wd1WI6)NK0+v<=i7`?rcYGr(@w`igT2@9(rW>Uq^x5S3@FR zml1##jIKC24ZFQw=6x%avz$MHT0KQwtp*j7IT^X~FS+Q^{^c_AOJ4f^E6Wzguc;UN znQUxawx89u3uv}Q@+bzUCRg<6_$A*rRo^#R{I@YN9~iqOW!WPDC*8+UkymngeOuJt zD`0y&r&vgc7#r16J_;4)RD?{Z1irSKT5|f-iEnaZnPMR zyR^oHeCZxr`>S|UXfh{_OKJ9IRB%TlIC#nijM}-KE19Qj_|`FjoUNhdGjkNdQQ~0X zkHp>We#rT@c>9*;h?q1T0f}j$OeQb$Iq>Am235Ve5+|z?#R>kZOk;yGU0LK^2*|I1?dDAD$G*}nZe;jz8I=(!!X z1?@VMw%rfJ|I~97;)PgV+VJi_bh|T6wlM00X{UBLhG{CyCeY=-S6_^%hd7SyY?D_K4wZ9uq9h>p>nM7Kd|DUt|+7-7coGiUeX&`(}Oq7YYa^1F(8rUI-o^VDWy_z z9VMOwf!%l%l%j&*;z{XjnhAlJp@dKZjUEqmu=ue{DH#&yH4-=8_neQ+X8oUp@0xVz zKI!1(e(0_Hu?4*gG&XFJVNd;_PfA6L^kCvg!SywIofLlImxMAiMIxU9CXnhj0dqn|H6 zl`OaUbjy{RH~5MeFCw_zN3_`m(Kt&&Gh5;obb~OIXvAh`mOde6peTX^66U%(OGLcY zU5QMfSL)jcz;`qljf-I`WIN7i7~XCu`V4A7pZ5d9mf9Eqd5+^N>A@y!bEATmm6D12|Q^yJw=5tNi;& z&3ydExK4nS7)Fwd0tpCa!?F+1Y&N)tUhvi@K_MfkZ>H~3OKJBShMC4Qu?ks6S!{(r zyE;}r6eXD6I9sj>covvv*~JOt#0sbOavKHQXUp$Mb|=aigNW1@hiZ_4!Oq2_mSd%F zzjJF(*fw16CLCuDKvVewTcY%dDhPslN^d~vsW6F$uo%>_jhndn+gYQalPy>bKDOn3 zzIRn@-k*f3dMp#Mudwi{VLzA!5w+u(-8bipgN;Y&xZXl;es%@?O!;2ay&f)hENq%a z`*S|JPBvejYJCopoamRq#>__tFM0n!jkh$TtgT+~v>~aqc4V1^EcHQxX2dKR^rU&;iu?mcW*{=S*`dQlLQiO=OMV`yvf>^~BH>BI5O6z3R~^R6y&?%Y>;q z9%o`bFWom?-?h5mjNc!PKmWa2mz#*kb-pW9@7H9#*FW&#Q}KKEZAl{xF=SLK=`eZi z`WAfMDA?_?_Vl6N;J#o_>Kv8~Xxp7gWZ6BzAC4dODv^dOERlvrkj?z4ZZ+v7F4G@| zhz!hTf`lniE75)>Ra#+EHnCiJ z0e^+ViHCeJFabXX21=5ViNH(T?a`Qi{p*dEz$NUL`n~+_%hje#o=lg4K1@_HTt$3n zM|~ck(~Aq^=PHgJ%|@Fq*V>NrGp^pR>e?Urw~fy2C)(}17*}St1w*qLulL5ojh(L) z5P*reh|YGa>kT?FF|lz0+sT=Tj5g@{7h^k!0PhWis38es4u_!zI1tq@SU+}dex+cG zVVZyS42L)P7QPf88pW%SqYuNh_g>@+BgM|>4$d=hQfAxQ?-Q=&WvL^b< z1NM7;$aE?G5V#aZF42|-{S$PbZW|O=>$O2|OIL=j7oel9K&2PBLSn<|y$#M4|78vc zlFX@w{UNmC=a!hp7TX;SuOq5&lUqQX#Ilml4gUAulh=%|UAJx3yX!nHmU@4Twr+Zj z8`b|2Kx`RSfyXKh{RQ;*xIg)%-s;FJr@btfDrMSO^e+Ul;HCNybA|hDUVp`2e?HPO zPFkKqWcr3iUTd7Oy((mA1ZEf4toI+S=OE1qKF+4YT}Tdxr2*_vgvmYp>%+ ze@p0Me&_2AHs>WDfBUhpcvyi#mqIls%ckH#wE!a*qMce8DP1t-!PMFDdmtUK=>pxa zz}FprNAVlc)Wf(F9}f8O=KPhqt9PPlxVEicqWt60?PnWeRP;ZKZuhG6`>bOCaH|US>yR&*Sk0(Ae>AxGB*|4S#l9_5(|NfV{_p zJGu)hySodS>GZY!Qk9GcEX`pwy*cqjy+}1a;Sh%dEZDiZWPC_Q+W}Z#D{_?veMx^h z>9Cc=(*^Ejd5*HCgvr;1p-jb-fhQx&Y#afb)X@rXlnQE~y`(R6B>s36pNwih3i%TL zbP>~=1sJg)CjT}VreWD|%9ut(yzz@saP~psz0iyHlwE8f1bZ-(ca-v(x8QR}B* zIGC>Ln#C~6ut!*Ci{gK>rZ0^df16BYNMnZJ?{vDZWLL^?arNAVVAtASSp0@`yKc-K zT&f}<0w`~4t#*2>)lt_LB8NHoRe`eC zARj&$m^{rbulkIHT3roViIBpqafJ-34ZQg+mA`;W{o5c=67?n#kF)I-z7X1X{395U z!O~TQni+d+~i4&|Lw{ww8Ju3nm`Xnh&kzFtMw*EvVXNJrLz(iTFsTv$5{@Dw8F z2yP1v!-ZTB59nRgt!qg1ly&JaXf6-B+PA2$%?MK&7WdOEa8T3_$bG)V^RPq~CvUO1 zN$QxPPM3c8;^*w6`kj-7q`_^#nt2Hj4<7KzY$*jf5wh8>8Dd=2%;Ka|-qZ5dF%3bi zgvNQ>;R6hD0EHD+1C+q-X{4dDaPpnTznVK3O|i&J9J)s1rm>JY2^WMIhIZei^B$!A zI|(ZsLx4VO2H5BZQ6s}?g>9K4sd}ODivWuK>2cxo?E1Sgck8~EPwVIY_)%~ z>1@_ISfGafMHPfmFz#&O0$8C=t@@1WoEu!w1957&qd`v>O3GXJh<%naYW4%X=))Qq z;)*zT=W)L=@x*S_QJUpivXPWExJ6E>2c)}#vd|L(oWdr;S@NUx(G5Mj|s`hRH2TvAjW$KZ4_CNDU zBILwmAgVm1A)RI=Wrpz2YWz&an=I=vA)uxZ%=m0~Yy|Ulo z(9)_tJoo7=vm8MtL=C9)1UOV#@iFd$aPi2uLGafw<;P!Rml)MmPR8luc*YM>s-y}Q zHV5Sj{(2C=DHJZjT){bzJV$hi#s7>@*dm|WOuJ|kMTl*(@6gP+I=4+>n(HVt3Q&vZ zI>vC>%*oxqb)R_O99!FRa5L_G+;r;x_me-?YIiPQueK*{Z*T90r}EwvAoU~MH zrjyIaQ74xzSA;GKTfjN^OwK6&!xZW%=FgYQ>nuzZiNr`X{g-w(0!T^t`AP_b_UQ0T z=d;BdrO_;~_1xG9k>$E#=K5mzuim+>aqYf{_1UTQTB>{lt#ck^+*CO2-^s#{>zCLY?beZnHo(Lj;@O+IqPLg?#QN&YV)<0edj~-zgZwZ)tsz z$G-O~!<6Sl-RlCo7vKG_s_IQue0;wy0kw#~diR(+)!ag=$7OdePE$nKlecxChBL6A z>lo%{lzr4sL?2YUR!loCN6J%ELsMh4`xec=8>@UaII|gJbIVB-2w+jK_HDk>=xVM< zrTTi2sD2FrmYT#24pj*~@go-zFr;D3!1~t|(Ca6UQX6}%GkH`+0SYmOW;Ke9G=n8Z z9a<)>at2Oy!y=2{6siEX!SA%H2491Oy9!1;5i=T>U)n?Ad4lmsM+x$4@U$x}BCQv>_oOKB3vQ&bFe=LGvSAa5hR_2QL)5ZNLut6%w-k(DXU>JR^TlLYbP?9sW@<`)-> zz_fpUK!%2Xmv?ri?(Ov#K2!hC$4gq>S$f0e`(0q!^BnH`@$!SU&nU|N@dt3*cyuL3)i zF&>D(Ad?Ts%3l&34bgUriC##AKFwYky-e5sm$fDR6J-N{Fac!cgt_ozrl9K@_hr#$ z<40p5{dh_008Q^B+yp)7iL$pGVV)J0ZI88m5?@FEzMEC2IM8CMByfXsNrVe<$Xw%2GT91zkvQRZmbpl}VoiufVogz+j5Q0I$a`T6!oQ;rXB>PY}B?W+Au_e)m2-QK|Ymg^1= zDZEzy&*yUME!~axj(%fJ&dWZ==Idmp4Ts}OPd6#tU<-N7AjFqnk(ffS5NjYRjM-oG zb&l@o`;;TdWGss^?q8cN!%ldwHC^vggJ z(AciW$AgKWEn5QoRtHS*vKMwW;NoDl+}f1o)ubV0g?bl@LDKI>%D?CVL;xaRC0q>M zq$LWf`Zd3lsW-a)$n*U2WdGT4pnE^5`*R)%&>NbL#^8$maI89kOLK`zW1EC8g^kS{ z|2@09@qP1l-FgT-;r%&Z$LPHs2Ifbn)iG+dUen;KL!a_rQ0aqq%&Xo-(8mX|!WVA6 zah2)Ta`CzsG88Y5I0iXA3;M<*Kit}DHX`k)+i3==tJx_(@AEZGJPqX1{}NqotL$$s zS-8L7$QV*&9F#h3$Prvl-c79Fx7_xxKz|~nO6hMf7Dp^tV#FGak@bBLRh>cvoR%X}FK(WYkr1_(KN@<-%F!2iI35LrTUadDE;^h zW;E<96IQ1Up1?!W!mC9fh*(mX2B7$0y8$2v3vQw6LZIGMv9Ut!k*0N9wr0gPCs0(m{D3`$l-`u7E!Gf2mG@qtj}sDGw(}4%-=6 z1vpfDl{vacfO0COs{&o!h{~wLjLwM3YDG||gT75?-0ms^h$!Cj8F5Guz8NY!S)Q^PK1O=Yg*qE)=b5)w&ciDE>K(+l={L^j& z+oxFL)$j=jjz@q^UrLnaO<$^11-&gI(|)dSMzBsZFMPe~bh*kXsQSZ8S`gi)A2QqbOb$P-$Af6OCzth#g`@4x8;R^OK-+g`QulklS0^(`&wOTZ_f_DR(>Zs07CqqzfEHW{MSuhI={6FQ`kO!f`388ThZvk$L!@5-iN0$9Az^W~4EqHD9P}Cd^U`eVb0D(OYSqo$Entd$ ze2FqU2h(ARZ*oJ=$w9FIlQUrNIC~VSH*6qfN~KcRQBmDL9xNk8p!u8!Kiykdm{`j5 zMJc1{%!!S^-ly90tQ-P~d#@>(C}VuNuNcoWXeQRr0Y)Vktu67)e{NJXtKl|x@^cc| zic^uvpq_CE4ba|xHDBO)v`bpwZ|rn!PiJ$zr1Cs?V+gw?OElb86(bqG)K&dbQ}d*VDQoJO8e6^eVYtT#~t} zW9IbCF42usT7H@ZfB!?zkHew3O9(~e*Nk})mJ1h?B@smk2ink1ZIC}G8v-!gG)o36 zlna+D6)fuj$(|l+@cO`zFhhk%A%6Z`WxIOeEImENmc+}&p!Q8C08b5b#_BNgV7|qrm*F#RgN9=p>;%#tM zt=wvNHM!<^$vWYN%$*UNJsCZ@+h>vT@`)wA2#3S%wB{;MS`Tl5AB}epRXD_Ba+7(Z zI*ZASnal|r2@59HD}H>+li|ze>ztENR-QPC(+=B9plx3mq z{dDjFG<)sm!^ygyPkOl-slGbQG1XcWFI193HRxeEtWroftha!Nh-`x9tQ$ znU@8=pvGVY6|zpN4oEQ}tSStkB^U$VS;Zzz79xbv$}k) z)>(uN=JeS*{F9Cbc@N|ZDf26!ki?P^upJ!eD=3i`0-Kuncl@^7H%4YD^+~dQP9<+% zyGn>@%mT^bCP$v#)cWeyi(1|#FMBj(fKeL?cE#L~5{Q5E{+CysCmEz;ca1X$tpnBfFOU|$(!Ck)b`yr8jX{iw-z#?-~(Vder9 zBJ%#{%#2VvX}HXPm{`GkDtn9Wh!t08y+48 z0|EX7=6l)nq$@5i{@e}ao7ex>FJN@Vy7($Dp3-=lSu)*C%G}Dq*UPW0q=IR=t17_g`%Gdx$F-C$*ho+bhhYu%O$7VCC7^iT!pM z@D_^I`t|r6yY%F6W}NEyVa>PSev)Ij-Q}KItJY%?!?(*f&F~Ebfd{Ir6{LhNB+u)T zqKiWH(3nrJS_;(ktNObhKBVOgLde~FyhtIW<*-5QAXi>riqEI^iudLg_Ib9Fu=+O7 zB^B7NfmMT(O=wDW&}H4FqqvzA8Ny4a!Rrkb?GPbSvIrO3o>Dqw3%})ZIcHtry;G_l z_qZnqo^Ed_#$-Hi z)Z?{QTon%XZ4U$_Z!aM%ptMt$Gm7u2ReNOJtr2bIRlO~NFw)GKQ)rcwtGmkQ`2KI3 zhXbfI+n(~}XHNj){oQshit8`7Z!ToT1cQZ`UTk#$lF06pxx0Y8o?DZSttVYV155dw z3taMoyj=6k>3p{m$ofYUaa=<_J@&a6fj5#iyu3z*^BWJIwz?iBqIBOf>*`#Jikc!x zF^Q6j^0xPetZl4UR!!o_h$x^E5NmRNTwGj=YBM~lNEUl}d1BbKFRB5ln26H@`ozQC zrla9MG9nD&K!uS-;agBf!Zf1BP6$scihhuj4c33=O#HRFWycwf?Gg(Yc6vE^Yt~nn zGV!i!{TOO$CmgZ~oCW2-KGnx5fDm$Yu%JxYQf&)=^5GPolPw`qBvO2(9~0Sg12@`D zUoY%bqw7>@6=EV@TDW*U_sf0sN0OpSDWU(CAlyu{a@w_ z|6j3-_U`wt>!*<&XCN&v3;QXSl{&XOgKeGe5(Qyq-0~)pPbg=8%VQpiLm9B;?1$5Z#<3 z#ZOO_8sbwDPZx%S#P`Hx)o=VtM<})EM;7?K&LhEb26M!m#>gNJJU2!F7|40VbdiRD zH}pWSu{K>m{^8@>IlZ}2{gBGB;(j|Qy#(ym}a8VnlT%LiozuLo$% ztj$1pO+{8<)fZZ>WVh_Lo}_PBwp*5C=2%~yeb$G_X@_*$_*(Y--PBMPfRc*SKX5_I zqPgO_& zJ^x|{LBv^CkNMeDp5M7$Uf6W()!2G}VgEc_94z1L{A2622M6$wPaNSNj;DIR-cEA4 zT-0!M;xj=FEAzUb7`QW*baf%x1;l)&*QMjgP}12HI+?_WouZ1we7n-WQLKaDC(r)H zH8}klk+cZVo&aHBgwM1qkhOT7)`bs#9;Sd~1{vJ91Yq=eD1iK1dezOf=1z_{hBb21_Va6wm*&XH36@@ zb^?y+Zs1V5e`2m>sf92-$e&(8s{mTen`d?&dg|); zLGK2#v86t$JgGQHgoFH=fcCo)rk*;vP`Ux^-xO+&>wio$pUZ$O`_x3@_%XOFpKhWX z^65z!GijjOYf>{X(AAQ3XdtDP#eeVfs&q6z$Hu9xH|AAq{Z%?4!P3@~g3&g!)TgsR z^UDx{`d=U4P*$tZmMwiTtbY(^|CF1-IlvP10uduG)r1-sdVDZ>F0QYyo0*!P%o{Os zkR?k(b8VoZk<6|~Cx_)VJTRN)HDhP2>w7wSXseQtknp`Puk_xnG|upZdR~7&{XDLV zWB+97EnflvxERZ|y1CHnD7X0*VgxM3h)`z1JrhLa6ZS?&^G3X$X{+&ABO0z_juYdS z8wJid`_Nk#1S!JE&{uXOiW!gz+w~DlC+3jAqr9a`z)Ajuq~S^la({%G@s_s3R%)@uuFU4lNvXCXHx!7)mKWyNpNE?* zmw5qBs*}#h{0pGA)r~s+1Bmx|cdbFC1Qg+PyzYg8`3biac&?7PEG@Xwl(cI+B~_@i znWP5^0sZ_4u|i=(hVG*?c=N!s7eN7Dg(OIy+L&Kz5W(Q!0D1E1J}CN*(?MnL&(}?_ z>-t&g*4wQR0$++0sVVW`KN0<3s2KeANKqA{+#PGNxVMBH>K$Epw{KsHY&Gh-;Foj2 zX?(WdfSqwltSeeJ(9mojK3d<+t0X}9h`>)?!DoFztJa9NHdg{^O41BUkLZ7{kTlBn z=d%z_n$s~S+iP9|gjRzx zz}lWN`+hcGXEInKS9E=|*Ftgb4-+tSx%KF=By10ovE-wos)f9O$L@rz%UM717R>2P zOAkOhkM0({32xc_Or7<3E}#RnKEu*phla26zq zbE1Kb$Yu01)J>cSzy-T;XRupjAl{xIJaHNb@x~HUSS1inuW?H2sk5puf}4HAgkTlG zV(Ep2-=|^5I3nJDK)-*wb>VgS(2+uDr1Z_tg*oxTZTp6+YfRB!aqkLa@aMxJ+zAKx z_an}^X~BZNd1bgZ8bi)6X4vdh7E1BfHdw!H292Yz*=}`wIs4sgdlB!n?^C)8IN<_e zc%pcCc!paJGm?}5uK^F)iL15bV=OgG&u$?UQaaPJB@dj&>b*Q)Y-Q-wD(l+TGQu5T z!`PtlJG&6lWMhiq1Q{I>6%VifwrhJCSF8HW7yD*}cSGC#=G)#u_*Y(rGdJH-=`0-b zf-8|nnnE=ER(4m&!Z0H#NRRFCxf%mYKf7|H+r2+^`GR%fev;dYbP8ONWK3Mo&WJhu zZ)&hbp)9EyI`+!Dt{YsV38DjdRYFsh3vMJn$VTQ5UTkAwgM3Q-+Q#>5%SHx}g{6fM zSB9$@@hTrwK2%N)luB}d5lDbe(wRsW)C9I|7X$Ea$3@Kn;Pa8Ijk2Un?DqAvlFn+K zLG6AgA|@jnu0YP>^T$OSd;)}GX2~0`3(xvBTV=+mgXpE*O^I2han8`W%vllg*YG8J;+vy=p7M`?e>IBUp_DyzJ8p3M~E= zC|^9tTC>#zo-gMf39Z6f)pDsv@p-MzXJMqi-VAjgIzCl}iga1Pk!mr;@Hc75j$gvQ z)VS&nKmHue#g8%f(!pJvWbtDFC!*j}NZdJ$bdO5G!tZLHGTiL-HNwQLU^}?*Q|+>% z1ffo~jcLrgJ@&Vv#OvO#=MB^KFa=QkKkxOrg`Qakm07dP|b}9hrn~fJy4&O_79QIlfs`?GArtBApj`v;eUH z5-yTQ73B1bpSea;fUDRKIb6UO$^)Wlq^BmNZ#xjzC~S0;9xZPx?ae~1mFp=dMu0S% zK#iOln@j(!VSbOkNw^jaq^!$INd}Q?qcj=ji+9RXZltsIUgnV)DK;@|^z7zlkRHCF zA>a_q@%E$JO-j~8jWH_gl@mhU^>OhS_Kdxi9{us6G#?s|&SkEtH|5 zcL=prMTWj)sm<;mLB<&QSSDX+W@B?)y=41E%SHAv324}%TUiRwXu^)h_$7c8H33cB zJGbGIQ_=OhZLZ$+x}TT(Hi0&^wv6*8meyH3Wgh&}wR^SI@p(F$2_4i2N3Yrn5&kZ5 zwQPJA@q&?zB;@jg5eXmNKRh{kgZLhH6N|+~QR{Wdo;G|5$*YEa#)YL2Vwxa^K0O!e z_{e5)Romv=`Xs?xs5a#3AoG)y7*Q8L__rW?GTOT1f_+QOAF5|)e|odfxof6GwfP%A z_h>kRj9^mtywONq)3cP!(1-G`zE}71>CDVX4c&_Km&&}kU)khJ6Id;=tyNgc;MH$_ z=b$)$sE`Gx6k)hC?4W60DEM>Sp0C>2sgoB4Ev16{`+Fc2_z=kdN7FSh*0nb49osgV zHg0SijcuoCoHVu?+qN60v7N?^t;V*o?>gr@_ZRGUt-WU6nRzga4eZU8P;&jutV6R0 zH`_N)(nDCh_2$Tlu&@ZQLE1PtI9NfwTMcS-+61Vf>V}3w@ea_-@>o3{CacdKgMXzB zyKf3+)R{zba}w9`VsLlATH}o5+5a}tMP)ODUd4nJ3qnTyapfrh9Vqhs*RPR#xGcLr zu0tHk{n1>oAu3c!=&>j8V(hpdlQ*u2LaJ4kr(=!}#VVuN=mLa=)ipE(IbOEJCc7`1 zyDbTYd^>cyeLMNz7pd04K+B^xYx1=R$d-x-gIf_9e z;ZQ5n^sm&I$gnPwD&@TZ%wq2zqmM`T?~9o2^~gxKBzJsRn9ASj}fp?jRs zWUolddSGPWErRse`LtjK%JF`_uux3zm}*|MU8w4{sWe6lBx9U=Tf#TsWF^Vl{U^5?I^cI z9r;Ln6v;bE>*Eskw&|(!&6^jYcMSiC`tK{eD|e+oOwq%w_n(cN!x$bM{dbPsG0UUF zlhosuyJO2ko(XNkk7boVL^uck*qiJ6k^$a&y>Rqx{zWvu5>2HNmLKlxs>#Ie_6=rG zoKCen=PP{CnL!Vp*=<_9S`>|8t7Cr&)5TIN+bP;(dG*hNuKZp?K3AKA{7|ODOd$&c zIlekEC;Zsq@Zp_ypo`A!|HeM*qG_1e?mc*&u%D9MT4ie+l3X7iVw!OiNEO5VH_RHi zOodjb7bYk7v$awhz1T^WsS@I(Dc_90Nf8;>Ko~GV2eqXuDnrom<*nkEzFg{feob_Z z*fk34bx87`l5#W<)D{tzom=eZ~Kh`njt6HPi5-b+<244Ddw5;o5L7Y^lfr>N*DqVP!{_5jE;McR4CcTAXI~ zRz^}OmwSqA)b>uM%G}Vtu;CyTomqY?cbC2t!^b|nM}RKp<;aZB&jqkD>R`0HadLb} ztmu_dIDQXRl@&l9o-3CpG0s{jocLY^r_QZC-8>#RO`$DQnd=DV)^H@t{p?sHMhNcn zd^Z$toIKcKxY9Sb3NZGJYIGJvgXW7#7 z(FOxMv|*oEUwX2#h;4rSHqyeH>r@m7HCeu8!8F+>2ZKiw|XN z+fon?K6;uO8#6UBBDekcF}Z%`_RHWSEWUQ}>>k!hT%e5_|1UGX$&c*|SS5 z5G2(dzp8??_ybf%duX)>al=;8V-bUtB`nbX6n%j4ST4K9ENT&!LX_JJlUau6oOVyz zpM>}I^Y82M{{AL1fUXh_o$rtq;1HG+Y!_tvEvJCJ+0@3WS3$E%x@|Z%AuG$Kyu6$v z<+J|J{fW%sk9Y>iJ<(hnho9ZSFvxC*dfqxLp0`?K2o+WtS9xMa5ucRuX$G>g%4{jB zNXoj%Pd>U%)k&kFlPR^(U%2UFbR^3?64ROMocj0Tt`*NAW|>YV1% zx((ONjYq`{<~kuUl9R)}jin-|GGB|*64rV)VrFZQ43afRgucU`TVhj*AvK z27Rsp6&pv}>G$uQxH7U~v#hStd2kKNlsICx--Zl+krd!I)hqL@ZWSl%SQrrbLBK!y z&@nO9(DHGeBxA)0-COm{c2o@B#Fpmp6B}K*EMB-~acw@X$J!|P0t&T`lSYY1+^fXg zSFt zPi&x#V9hCF!9}-Urp2qWdgUJ2bkEu3)-ba&Eu-qiCjdpEQqT^M8A-028UK;qcu&%d zISWB$&#Lqx8CVH<&~^MXqdPSvS$mk&FU#}&>0n)A5=i&=*=SP9J zHc~!wQ#8D7h;QfOD_*s#GQTH9pICcY8UYIC_~dDZb+rgBPI*Pei~6U&)%hULQ<&2U zKBL_5vJPT38Q-t@diO)udmz;kIgdq_dz2qavMf$usQYX|)8jFP1`#S?b!)RxbEAk) z6&44_Qk#qJd^hpUnn!7g*pxF$-o{2CAv_941xpCBBW1c7P@@s)OvClHAt+NtR6*;W zDXff6u5`lZ*VbMtrc)~{t;KMU-%IPIQU)d^B{6&69>z9YEya+mmjA3~LLD}#P#G}; zi5mm!Yd+-HBiFw&=i`n{Lhu#eJdX~=AAP6_W~%C}wW6PyuK98TcmY_nHglacgql9y ze0Nfpm!J6cflku<zzu{t-R|618xWv99#xm1f{x$RSi(T9%17X_-s-a=9eShX)#}+B>mgG9_xkuX z5Vzd^yRUpk`}HV2fF`rdmMU7jJ>MNbb<1ARnOh@$pZXA&8?2T}slI1f%r-yQu%5$V zy`ZRBV=&>esDEQu=<}PHv;+LWC`IBjz>-Lv4`1c@OnR(6Mdk{qvJ_xKD3?>!TT<715G9a6ccb-ROm+Bq&AM7yS%nDZ2?a(B zQ?Qre!HQXij)a5UH|ip%CMHO&KM@M%X2xb$>mOZ+UWkH2S zG=92%eumi_Qgrybp=v22GNkuEbgGDQX|tloV2+zMT+_Sy?a z*3w?s_y*S#yFZcZCMw}^1fAz7YPxfTMJ>l3BH?~J2vqk{-8uc{)^VB|eHpf8Bxkjr zNcGMn9rdsawjwKSv-22`=*Y11(^4c)atwr)fa}c3txw6hu3g4HFLq?5TEx74XXCb? zw(K!4=(C=;sFH^A=k&pHp(y9uPSJ>&q-~ zQp?Hv8d|Lg$(X+pj1C^Nb87y~&50{0ppwR7oxw}Rxnm+oaJ0&^BH!HdpWge}+S*!l zI&sA7>+_QQna}m`01kl%-gfKWyi?A)Sav#axQXVfJ3N&L?P`6V(3=tUxJ&+{1SRpr z+_Zo(FB5O4UuaXRv1w{ToltAluEBOoShla>?pT}>>e{x7Us8UbT|X810N&@4h!wd1 z{dAz`u-(*t-d4fnLoD>Pe3l#Wa$q6!vfOUaevz|zTdCLRNmA>3*5>k1qunm4ol;y4 zpuSKgav24}gUJ20Y|*g^wD1zaRTIyo%hM6l>u^^sM&TbazAZuI3h@BtvM)xoSc3>-L` z$%o#NU7Sl)t(RLbj(t&<;7NZwJE`eB?!L|-qRa6+CjfQ5?lC!?^Bh$3y)~#_Fns0M}trW1ZlO0pP!lO|BRpY3UW z!{=fB<)ONspMUAow<2F7P*ZEvd_h1=Ow84g;LiTQNF2~5!if3ENX`nXP(L%D8IT8U36C2An-_SrdO)y&L$aE9;^kz~lAQ`?PG4RK>5rg8;7 zW$*OS2hn{$G8f$UpjqYXbRS;o)AW#W;5S6l{kUx4lk0Q9x4FGyUE^bWw_1TC?J!;7 z)TODSavimK;Ps)Koa{sP>h}$M(>NUDve&@C^R=}=i^-?I1!O~*j^Kn;gVzKnAwu7p zi#2&&PCp^c=%P%bFP1V0z@POUj}z~+-m7(%d*2Ai-KXoU=p|!86LEMFV_yNQQCH0M zpp?dt+p+pGnk{%)6(&~-bmi$YqqKP`;2(}f)ac}x@cwEVD{!2Uv7#eF9d~ySRe=|i z$vCH8BDDIMfhMl}<&5ijlf=!o3iWCVAbmh%uz-NvOmN|~M)|jbrp6sQmjZH7IZSF>#6HtZy7|~<=XAHN*rwlPlc4X*;kfh>Z)Z6D z$o!06Eu`79&Ho1e>l8eA5Z-pgue|x1<#1}V9VYhUi7j|0aJ@P@;cvp@077&#GI-KD z=f$$ztMn`;G3!NCD%|te{&>0cc9q(xT=4_4U<0u+4q^@R=#Q@o=p*y_@e! z9MtuF#GD!j4-YKpvx(n7*_*~v_`&e;^?&%yKXKT{fVaI_aX2*uI52)Cmh2&eV zAh(}yeh^LK;O2hNyLesm&cCdhLXaY(Bo>h3^W}lCSPKEU8i?4vD2I|IXP@tR5jW2_+fb zkn^jMe-K~|YI)a{VeKP6Ew{%CtozKLV8rkXx13q`rAvin@bli}_&ls@HaIzIKUahh z`$JJj@|p)YY?<|%T1ow8uZ#rN%k0M<>-k;4HREcktG^{0Pa@w~SV^6?;~_>)VYsY& ztQ;~4O0{egZ2K zA?BHgKmBop?&#|ax>M+^Gf=uv2%wq8{wj~z_40AM;Y09Hn;Q=(&#B>vgitV-*}l!; zR;1wPD65l}jt(WLH1~ZO&8H((@75d`FLsZi6uX_$d>l_B&tjHpIj+pt2ZHj);K2#l zo?o-YHQr&yd;3zmZ|z9bj@jwex7!ev$Niqy|0)_Q*$dC7HqE6+4%Fo|pZvkv%34AB z*|Px~o;0>BUi~?PjvgDkASuC!**%iaiHukeGcQt60F~z(=NALd?aP%6PuuoN?2dWp z!KXG-Vx^FOFq<}b{^2jX&A zNboX0<_^H{b}igqld5yh$#^qvWYvMSt`tdlB0bIRq}^ekKsu0_y2?Q;Z?9F+3S(x> zNh)j><9e-IVPd5am4?kjReWIotLF-PhnaHfD4$)xoT9|s;wD!-H60)NmD!SNgLdaK zKkgeOG`|5FFn_E5un%M>F!BTV9s@8Xog6v6L=j6{D3h_DL|r^UdgZjGWNrUy4v#a~ z*DxK((oi9ElJ)E2&295(&}p)@XXono^f2ixtdg3_YkbVpvln6@N6u$B+A6p)iCK|LOAmrN5}c@uuIr|T2OEwvgM>} zSTM2oWiQ!?))enarO?;O%p;8b3+gQ9spYrai__;REZp2G4^ZS3-e(>OE%!KwQxQ@1 zkxT5jPKWJyfukwG=flEvqQjsKkLM2W^CH!b!NHIHg$@PvzkURjN-xMD6&+V5QaKzl zP;6lde|K`)`^Tfk#O+=WXdTFQhK1f8eQf0?R=)+iQP7iHIY&q54;&y#|2dh!wx>7O ziZO0z%x4q#2vLC^W#4$#+;o|Q!8^Zy9Y|Ds&W&0=K;quHS}O?Q<80;Wd$knxh`04W zObSlKq?yFoxeYeS@@!GkjduhI-lR`4kaY!&b@=`Ly*&@vG<*xM!g^mEGSu&s<~~N>E(;pO-z4wP?t((&XGV6IQyy;Nnt%&i z{^bIDTH5@!rkjy{pl+b}brJkn zs7dx2Y3Y`aZ=RA%pqHfSlDjO`G|0J+;&^`50CmU9oxU6JN|?~VPkyZD;-U|H=rTUK z1Vgd%{eO=9|B!do684+^OsK!s|8+3#vB92fH=oi_$M;fO=!n0;sIU$7xR!1~oSB@= zK??0{u>R4`iA|w3g^h%8O$q$Q`{ShlC6KB%Z4Dp{=a`#3Y24Btl0a&7N*4nJi5O`{m0Qudb&F`?kcR zf0~mHzt`*3?xHSVDk84x7kv#oqX3l7 zAuEgA+dQuh_QpNlTMzbEn+{J*6Or5TE+S#=iEVIK0A#vjn7F_ zv$(3EW8gTm{_xs;kLIP79(c{?{*@o=x!mE|H94H%}od+cJLaH*mvo>_}EFwLjs>Gr+nw$ zf^Nh=A>&;+>~lBIs{{ZEfDKJ|7MtHj!SS&bOxer|>*nNyF6RkNK!4tslH0zq^D2KI zZI4xuhW%1QRlczql+qfvT}N;AXU2GI8p&v@Z`#*Wcp5%xrWI8+?Q^(Z>@>lfkx?`v z<`yF67)1>U`M4MJ3ZN0}`c9Nr(xv$r=Z7Hw#RK#6HJ;2(Z)@9JuTpP^mdn49!hGWi z$;mjDb{jk_q_IfwlFaaIpW+QwC46_F+t9Kl@~R@gsUt`NE9xQQrH3#`lnu83do7zg zd}!XWncyoYo7HojcGvzbug;6XRKrnz!MpKUxEzn;qoW&K;x-x~p>8h5*i30Ep2w{q z&G#ckzrRU|imywt0`bxgYY4+P58ZEPUHkiAVaoI~UCqC}7fQvdac3_bqFI0S_AU#J zT?!xH5qdic2+$5Cp80h?F>kdpegwGST0CTqE;ahT4IS+aML+!>nrpMxv}BEkwo&s% z-Q6YMgQ1yq{$>tYl4rAy7S=?n#t(CaZDT*-tzc)jF?x{mazNm8FzITafOeg++8BSs z#1Fpl%~hm~4^wrej3^M@jq{-?BMopH64$|-BzN0!Ril$BDuA|Um!ORI7pJ??R&PwE zb&~{OHsAt6df#C!csXxPwPY)~d1ag0Slrw+)JrpTcnBNC0Cn8XeCd*~@Oe)PC4C>G zHo1%iqSkIIbhx!tA-j#8O=vsq-L?eJ|L^^(U;S&6sZg#5_=KrTdS?KE!OwL0EWcOD zhc1~Aq1L#+1kH!o@MUEYpUrcwq3<tN<_ou0k=Oot<upEUgi6(jT81j2jVUn$+k9Q8z<3CNSRb5_ zMRCKK8*hznf17CIux>pby~sxE-q-m(fc_qY ze#zJBr;qJVBTjpWB*q>PF<@lvG(^Eb`}v8oCx@4#?QzPXRcxFXA2~5M^=7w3UU%~1 z?9Ay|#>=QrIxxDBro848=L5*|Q*_^=fbdoQ-2mdRaCWtAk|>k#H~>S$9rM1A^>bKV zKSu_~x`}-TFf?vp*}>D8;cX09ck_LJqJz+*rqs$9mkaw2Tj7K zpQ*wqt&J&Fow1w#NxfU4s z5QSzy<^h8e&+5*59k=@beX@*Q&+}iNu3{UVdwPGNdEXa*tRa4uAyWl9QJc-_B5TsG z3jU3&#>@!@j2-Y~L~z0cvIDqhpz-twx^b~jb5?uZ>;oY4BfabEs<^OzB>G<2hyazQ z-*x`F7Y}~ozP^HQZ*Sw7T;Op=T~4qaAjXUFz@YgoEKe$9AVb?~dh#t(Fg^*unmC^_ zU6t!i7^f4wb$~4aoG7xI)lwT9qKg^PI@uUB6*R?#RkMwnWXx;W{z!P>k26DLTmPKZ z^LJK|&=t}gKu>#5S;lX;LskZD>6-_DzcA>vTxOb_Kqd6){YIn|sX+xp$%de6q>~<= zE*?eQ+tsS#2O^qTG%I9t{F?7f0DI{@oza5;I%6p?iKe%&*12mZ;dABglZ9;Db1&gk zQBe=~Tfo*qUBer@kVuaZHvAFTm?=!)tVj@j#=)Y3OP4}!r;8r>wYnqzgH&tc*}tPd z@2kH^Og?|Dhk-A;5m`jk<(?9-hw0C&Eeo5OxsHtvy4fF9-yCb9GMC_;(Tj^@O|B-= zoIF=u#-~N%eRk>elVVy5L@6@4`bcl!XWHtu_x{jwgu8yqf)2ligBWagadd_uOxv#} zM=WDBqcwVL9X6ROVPOh2iaXGxM4NARM99w)sbo%DS5ImCiqWynU9N@+%l70q|A+Zn z*{$iHZvY98470lXo_CV_<~Ajgsms0F;|7&6PL0l=5u!NCe-jTL8ZuxP{EXjyTg-H_ zB`#HpLW4}cUee4woKKe_=3y#kEMbB!Bg`Lw{6pD)@x*j8|Av37Ddo+c#d6f_Gaxjs zi;l+XtJ6B|P#aws62ce$8bi(97V|g$?shzP#7LWEw5hJH_g1OHh9qEvnYLTRObrIH zYS9SbZd^f+m|;?iLHFQ{rR1JZKEk1KmHq`veSyDiC-z%y)-~@-B#XtVK6hV)TF-`s zaFlkx_Rn3l{n`;MbXg5?Ue2YtB&=;jacvUSCF>}68kP0nl~6HvI+)tYof5dnIeiEx zs_u@jsOd!XpPBjV7*Kh7$Cv5KjTJ*FL{t)0m{;&)ZMyJV?zHsGg$M&tFnNfK!tCeK z)M~LLnFgxR7^wT+dqVh#9^oGacq!8h4Nx!Xi!Q^GC_-@#Q~rP&VY_coY8&K@94*u% zWa$2Wdb=-S{?vOCutq*=U1IJ-f&zj`$$S2wL)yZW^bSwJTCZ zG-|BD$2Jn*wEK)>2Gg@6u?OukD_I)Kc0>bEY!Cvc@sTB6vUF(Ap9l5P zTG*c7m6dq{&FNFvOlOLg>i5QCG}=lFw(femcHpDROHG^^*Fz_%)O2GoYwMKp;RE-$ zM%LHld{ycHaxjY@+Eq%WBYrGU&%|;6z*4D(h#tEoo+MkxT=Mh43XCJ(1vtUE-wlJgBiL4g$sFo6sE|O`X!55FM|LyrNAvRWz2h zREjTD>YLIhVG3VEMrbGgCev3O`Qdn)(JVAwpf_F=j0w{eP;Z-bMEz&u%gE2FB5y(d zaH@C=i2-_g@?_zpzFL6zM-Xm2h=m?*LEPHBSoyX9ph7$M5Dowb54e3M+%NNmNC+-r zq{1PQp}Y;Kwx+B6NC2G%NIXtUE))z0%f>f4G=xyo&h~Us2YzP*aX;pXb-~*lpC5__ zKtLv&pcFdVf}2t~Mi%j;y+U=Rb9V z?@cXR2`y9c=c7%nYT3EcSE<&D);$KdPhgJY6RSDv8pdP-wi0` zQVUAjf`FcldPY+{e=wN=Y4w)UAehT?=j5n=c23s78tq*Rl7$~%Bcb;i^6%giz6N6N zfHF#7tqOXyF?C{Dt-_*vr$JzE-t^|?MGp3VpH`GK17(VBfWpHGyT2xr>B?>eg;Wo& zv`(Cyr3Q~t#wY8AYL}{!?%w;7Y!yRIEbTUDZQ)W&Zq0rw6yyACL+8&&N&;o4*0UF!o)8sd%Dm5js>lB>>WVwJnK(P|=MeX>Cmp zz`@qS*P!+%bK!behKc95?mQQ5>{kfpuCU3ekzBT@UUz=dej^rJ?MN4wMY@vQfqv=3 zu3VO#R%P1pI<$n%@ky^vKEXdF>PgLv+&oy^$OyzXx(&U2Krx~*m2T=)0`8IzfXLj8 z%Ab~jK~4_v*7zg9X9xXH>i24gLPy;e2eBsmnsCR4BCsHlr&I+kY)6SGtEcoymqe4 zI&REZ)6ha*Pk>a`4BqDIewrXUC;0xqAlOq15#fDiidl-ic5mqQqgIp?ubAT5_5JhPU6*IwPNM;>l6oSi ze{M)u680_&?j230f3N+%7g5WXSbO>VgZuRbm>e@aJ{iZ|X7;%e?r13j0ye^DXq!m= zi?*>KZNQ(OjpCFTm1!^nKDEE}!MW+*p&}v?;GrNJxB ztcG$Ce~c#?kb@}cgO{kobj+?7(FE=8?v^Rh>=OF@FE|Xkbx~liXjGBjmm!-_Qi4_5 z(#OwJ3@ur;X9!8fl*lT&hQMO{fHc=(yl$BE?w`_RWx2zN6Hz%Zp@UqGFj(0@u1C$e z$qoJDEc6}!)>+JgY2ZOA#V{%8A}?GmS>0&Kh&~t}7B*r-Da?WD$I4nnHXgZwj%1#- zznL9p(@d^;Na4WFNL2s+m1kK+jjDb3U6WV6-oI6d7vD7^B7ey+v5F{-K)s%PIy-%P6tXjluqN3p znu&NpM=EhH_CX?tHR8v;Wc-i-X-qM>B-XG`Cb#0Ee>nWvn?==WgTlFaZ1s`nGz$iV zi*3dovds8l%duhGpdC)r>Vm4FF1LHD{tIBNp=iTG4*B!r)(Xc=*g zR^w(cK(m+RqYnMxen7`;>1PYi9}$jHR&JW-2J$$wb@$+?Tt%$Pu7%sl&DYyK_?ycS z9&s!S8G_}5G2M&HC!zQaot_`w-fsE=EjWA-%f0=D#Z>t+t;`JZ111H5q9|Q(G$m;) z*XB)yp&!>9$EN3sJk)2l+4a2n=0FHJ=IJBMZx^PAXBP>?>|dZ1t-BEBF{>vmsp}{ z?qc~f2z8}nl~+~|nbL@3r@+g4p#SKSPII7ww&xP*JKE>N|40x+?gIr4XA)*?RKh@o z9U?yCxCBjaK8O^71PAK6kJXKN-!L|Gv;Y4aKP=O}%i{r$;S1MO_#j34_^FJ9Wwssg@pcL>sUngZtK9lJ)$n9 zMoiy5$_1l@)r-)sFD+uOczH_S-S?MdAI-923mhI(m=s?+-vz+GzoR>j1xlC9vbngl zSUK?bt?jT_F5r_+Qnfbd+R?P<| zO5P1Zt=?lSsQcFwTdB{z7eEezpkm@;YW}(% zA8JS%9dhw>*4gb*R9|v@tH$bK$RGa)I?_M3N90ABqnb2V#VE)asmXY&4x&G=u{lzl z0oA%$gp#L{b=DEe6RsBS@6y|wdjjrPzcjPaKym&zR02NN4zw+_QgGTfxc$FkCzyLL zN!1v-bSCy=C?`Xuoo z+8YIKET5wX+IzZc8S%Wo6v0vo=P4)dX!+9x5k7fRSpI@t=mx}$a!@}W@q((F3OxCM z>QcOKWf${?68@ACG#_q|G^>75IZ)d+EOq`B(n~wXZUM$3iGhvQi;!`-xn4f}qcg=O#6;g`f^3Kc1laSvK4|C$20* zW@bz$GL5nepxNnle~k&NbvaqEKimQFK1&Z`nVp>q--Y(p$7$I#?>x=d`0g2;0&<2v zps*1GoK$KItmrJBjuAv?qK?Vd&*3=n}^Cfjd z$V#rCVuDYwGdfU1?^?@bFqQ1ZniqzdI91=5He4LpkNhObf!kGzif~#XVUfyhlELZ| zN1(s$s^{nAXca^#D6GNib61mWpW12!^JVg~)5=Pe#m(AB-MnHSC|~=vi-!}YC~@f@ zaQW?_YTwW)!;zJ1TUwSnfB&xs|GW`hh({VvxX3M-yfO6477tTVG4|n~?(ddyM z$bA8KuNWb_qvXw2lb6M=eCx-92|jiW9gUyeOZ9PGA}S+Pw5uTjy;0IPMKXzNk*^>8 z$Nufbm6722PL+ygk^GO{Wg>f#ZbZ_^OZ=0lXiQBk*~k^ zmmpvDJlF_7J>=hqMzmwkF+*q!(Ccc#_td_Rd zJe&b|$2h06hG9Gjx&67EEOktOtxeLIvnDn=HY{XGuQ0o;rY^nJ)2Bl;2x)S3HGtIC za+6+~BY5!JGIsR#6^+AJqt1_IjLZhnVc*G*d+xUJBhC`RrewS$Td8O12bxPpD=K1A?mYylI z-uNUXbyMrvGbV>c8T&x_`!2uiaIAPSLv63Z@WJd`l3dlz=KMlPCUJ7iH+YARKlerH0cfLTGMSqSEydSzcUE5N_a0R1}fAMq_0p765C z7uDJOzK>wPD;p-g@@*3-$ND@6@^k>+pajR|uhIV7RpC%#{vH|8 zCP59AqE}K;MoyFxaioy@InN->x7UEAVTNsq9MT3yS;is%he&c@M&6pYjbOo0OMcz0 z`yQu4Ljx)|MI&$n0gDh0FgHBtcT5~mOS_v-8qbwbVAdU@C;Aj<6v2H4nce2MT4JtA ze}zMoS3JS;P80kb6qaS_DWEmtrZ}Hon%#SG0frJrQVM4^T5*qBV>mr<;W06=BNgms zDy^s(vt8T$U-taF4p2Jn3zH(|V}G_|N&QG^vQyJVyG6^(Xj6*$+{v8`BG|DnEriUV zCdVR-`)M*kk;aSriQRuQ^j&W-LY;mL2?>$&w0){;Q^5~xp&)RE#inWDW30S?6=gYF zGd?o9-0FJ9oBO@*1Lo~cE>G}vFkF0MGK>b|sP;Pw!D;aqhN)X1W($K;e4+#R44=3wLYyVb5+a^;jPy4#~JZ%9S z6^rlR7An)1mN@+@Z37*kSK8vMef1G(nmF%6{JEb&CV2y(FA$tR^Dzk}4{1bP2*$JE zgP*tyf@W41xxVl0%WuNm?S3?DJw5UBynK&+Bi8phQwOa*ta`N`M^sF4C{5MqH=hsn z{x)hQO%wJ&=oPb2VRxbQt;tmz6-@;#tq4If*Z`_$hRpi~+=7~JlnD}o9Ydk|?M0tX z9}CE}md6l3FTGG=Rxg|*cxN!V6?wvYGF=UgA&<-RT#{F?-=l*n0DHDP4w!DNEiaF0 zRuU59kKW__TGN`^xSrauHZifmFd~SE~C0ZvtwG0ztk zTOuh)!zXWp7~bnc-CXZuGNHHGpa(Z#4GF>(aGPH5CMv#99Tfij`Ln6I+HRq((VF!1 zY!=za_FkT5R79Rs{{6S-_v;&S^L+Fqtu&e>{IDf_d?R7HWFyU4)P$O<;Ei{=Ybttt zZ+^_^cTE$7;NW0B%y6>-Q$qJw5pPlnb#<4fse_j_dZ26w^pg1Bz*4V+siV_Z{W6Ow z2V4qxypY(g7M$su6RD}`B}7&bmo$m_>RTUq2c zetBrVKtkCZ{Q3F{3D~im6L46~m009@+^5_!F|}=pp0}J#qPeVbZFplX>UrQa{rVtu zbIXS6wOc1e?cTX@@o;zNLBcc)Qu5%DmgmWtZrqKg`G5~kPKn=ikCL>MhB`Y{ixZNM zFE?;x(49UIamS4BI8>P=>PvOW;eS%yngS4X{T6(UjVS={)r+SWK$KJKe5CSF;QH@O zqvdh2NTiiOG;KM);?E8p<$v4h1)2X@+?0CAi2kjsOA!xB0&E9p6KhKTmal@U zyPmD=TDD;yDF4w8{}W-GTbKQ42j!(X0P0k&kdcuwFby@=`ZnYl^;6~4pKM57%=fca z$_9DlcUc(QQWYf-R#MeO`!L`aU}G21i;rKj4}JPAXkwyFypN?Y#J?&lEpT1Q(4N%w zaa#zy$K>ZB^UTfEe##06hMLgK#@*H&rKW5A-cHWV$5M)uR7%2%7M%rL`^BSwiXPK3 zM<9(bejYe^Fb>PXS7i{#E>WS;Wk&Ap=~2*XxO2uZY{cN?Fu#5?hz-3S#c1ZdSbAc7 zh;aJvQMB^&^F?e|o8&(!r2Xmg-5F9DlP!<>?QM==<;<9X^CJVZjLubOxd6tVl@{W| z4t|k@19B|fYE#}Xw8lcB@FAs=@S=o2GZ2jWyy7|aA&fN{4yDKvKDH#LLs3tAs)|BB zUaqb=r3D3n%7ujg%(IR<_EL2Dl2qDRHYElgpA`Kv9{$qTL}>xyzM8653EsALe6Fv0 z`WmkHrq&Bx68t&BWZyF8$N?)EWML1Cp+iC%TJp5iSgx^9O#*4w;P4sJKwDF~?1Kj# zPK{AY;_&Ikg^-R`f|WK_goKU`{^Q}O_x|HO`pL@5Y7|7VG9`4Lpb|^*guyG-XYUVsD39*FAWnNIABC0~XJal~;a##WwVlkxJPy?&0B4L)>~9Wy}nkJcBz)cwc*&2=VD@l@%6+) zk>@?C{i4%;>(MlJXL@)YQQ*HkuLx4$J;Hu}JqRtUuHq>vZ9lk@=BDIc@edRw95qrC zcob05j#Ac*Is3hNsOAq@j09HOXUgsY_%}UD=!(K_@Vs8+#KY3dO9uL`H3hi04<7{H z{s_Uxx2S4glJziC90sk~{GJj?#-$vDQPKk~Yi}*?ugfjt>!gsOA@(o8+0j9X(bn1| z_)zreuP>DsX$YO7^&g`!qxXX9Tv82}{lITro%bu&JBX2^hi69)OrQS$;HaNpPA1k| zZ*f504?~$T9p@!PT}R6MYYtRVrZYIcWKq=tGnD#_O8S9xqcAm#<(Lf{meCyg!ZSZa z;7C=SKqd%>By%AgnDguK$@wS8RoJfl<&Cffj#N26#EJW1`Qqmkf~TNL^8FxvNjA_P zF%s!QuC}qO33mP&mJgEZ}Tb zw$aH^k|3IFxc~!*dAxOpeiX&=G!`*N{kA!jr~hsx?`wx6L;DTzePN9|lrY;vFB1WO$NZIcusliv{c!?uspN6XeJ3vS! zHpp_u`PiHKybh%b1VUJ>Kd^*TLj^XWfCj99zjB)Ui`;eJ|4N zEf~&Emw%a$Bz&ZGaCV%5hh~;kH_^lnT7+vADWmz}>`z|2qH)#44hBvcXgnA%`N2yHe9$qThB|4#n`H19xr4(ASPSk+#OVno zDRpvMm?{eq3{=5Bl;suZuFk?1iq91=N&rW10PD(P3Q$!@oj>mB3pv%G|9>cQblnXw zuHCQLdq)=+D(Jf$VRb{LaoLkj34!@RaAe+pBmntv1>J9^mio>@p9i6PPvxg&9j?4G z`0Kzp66jpCdZ@UwMOvs>xQ>vGjM6NUjx&6BV;Yz^SC*Mhgc)TBjs{VBY8&#HI}H{j znE`UbU}>AO0$~Jqd1+dFeE*owhs1x>;aGQVp@T#^3@(DAcZQgJe2$2OK-}9cJ03s@ zwjSC4U-NO%)74DY|MN@kZ~k0PTf(taCMgqIb#+a39>-kEhwkUmgdjLLIJa1M8mK*% zxGaV;nh;hJ0wq$iKp4TA7((dRXRwhlJt`rr3Edfb8HI9A!&R!YWj>?PDt?m@H70tr z7<&m=aexFBlDEbl-#-{5+_?F^0BCG_!#)wB_QFQh?F`pBzJ<)dAmNJV0K2Y#j~~r? zm@czEi2iSC+2RmCbVZ%jR~X9=-2>D+o@;;&bF36xKgJiERcFz=epaw-DjM#AhzBjS zcZO}QM=DB*<_#=AD!~-vb={bj?8ms%lbAftK1Rk0T7zdzM47^t2TGVR(B{F$%o_E8K>=khJ~L6k@Y-}irWS7FfIxtB7FsHR~i6i z$Sl$=qz`E<_0g3(;IqVnES98Ffc#O`valv;^c6pZqQo*{c&9E|g(45`kc9249C##` zXK!TQzAOD#sVUD%&e+7V(6bFh&q#OIqx{2Zi#t;b@&8I=5c64zsrLKXFnG`FGe0=6 z0@zR`*jQ1zdVY5H5jQd*|M2{fDp@*SH%`jc4mE`48tIyrj;^4gf!%rJW2zp9+xc3` z!}Ho=Qzfgt_p`;Yjpas;&tp-LfmW;a+l6Pro1y#5sNX67UJg@v=;V8A#ooog&#Cu+ ztBJVrez*Jm!W;f}-*0@6-?95y^S?L1-5oDt*U$a%n!9fMeO>pz5)WorpSNB6aTV+H zo#_XU{%$=!mkAX1KMoX_Ce$UL+xd3#zUm{uD-RF+biKF7#W(IJKi}M{3+MfAKW}+b z|N9`YC4PKf+&?Wp-$%mY_iF7Aw5;Y&e#`5>JN?kn{YU?^JL{ZnIPho1O9lo8$r9Iy z66gHf+|;}h2Ir#G#FEq$h4Rdj3Rzg-66OH3-0a&cY?dS4DRmE&%N)x@2{zuGjpoW zw&}gPd-dAkit<22cszIj0DveZDW(hnfPa1k2f#vqUT)pzoOPRc+LK-C1n(dQ3n zLm8kL;NzcHPDgRV=N&kE$sbMtz!&s?-e7>V44luKFwRnP;xH@V@MyTW5&epEpSN(G z#WkEo?QCpJY@Gq3jwS}qCdMRg7S84*Kq)yz^#CMn0DuG_B_^!uzH*xB_S@Jb=|k|K zqsh@lem23$pA><+mo^Zdx}-ZW48CHUj8aTV6;iyrAF$sCUqx*tw64|zD=GiW0L|gr z`Mj#i`NGTBuf3_P{3lpnb`|T+n}7oUy3W=Dq8%uq^T3NlA_|9DmokR$S`rY$wH-Ew zAM4fo8p-(V{G5ICIQcOIq44>yLfL}6Loc3j*@QAT$B%;9EkCT9s z?T&_hVW{K-u93zpaNX@5e*`&9Mli&ul8cINK7Pb})U(RNY|d8;wz^1PBnlQO57R1h zKEjvitLA|o*3CeU?Uw(2K3YYd8_Hjm)+PA>7m6)m{Lr@T^j%>KaN2R83wV8Ln`|YZ z22Q{A^(vHFSbdLsc3NNOZyTVa`p=kC4v&t&^grH^kNJ1wM6(*_clU~O zFWuO?LWnZu?PhaoldiG>p0>WBn<&ztI@2J<<8Y1xhae=LS%^J-G=5^2BU}=vIuB=+ z*3i`QpV1P%6)Ts-A2s6fVMBt!M&QK<|AbakJUl+?FuNJJdpV685KJ+vXOeL0EcG+C zuIC@|gzdfV*{M#78YPaYQB^j#V2>?vvj4zlug`hcQB=ya-Tg75qZ#k%kY~Mij3ADwFa3V5m^9bsq z*@kW@g++B;ya2pkcZflxF&}>;1$tc;b&88K97pUfIzF=Cc0lV$G6y7Q^i0M0e@o#0 zqMu%Jv9N*ThaL;h*A5an38LVC;5b14v&B~huqO4o(aXQrEpB-EU2l9EP!19Cw=^WL z3xr5BvK{f}cdXm1Vz5JVt71QU{h!T0Wz(568zw8a?gl#z_9y-BXOm#zFmfw#m#yH^ zMtiGRN#pIO{dNI0mi&D87;A6T{?BlFftDmxna+8yn=p$O?REb%h(BB>6@T0f=cSYB z*Z01ez4qf){ot>e_5M8#HSPh+?`++E&#Y7Leud?zFYVpTZzH2K~Zv*O=7;2q` z1`oCzg}yN3FX@0#SggKocT9M3jkZ!Osp0MZ$P1XTXuqf>uzz5LBevRmkM8w)v1`R+ zUPZwVRZ%!(;`?twLQ`iE86r(b^V(nx+J@NSZSlye71WrIz%LA&&76d*3+vPGiY=gh2ladPeYE-wk1E{7|7VRiOI{cJU|jcyi#lAI z1UF#Qs_OJ(sto# z$&u|x{v8v{)RkPvhRF>6k!Y92oIQBjq2M%h74C8_LBV!$@Vy7w8{n@_;JK71__|fJ z>M-w>28|UA{JbhmNi$O*A&0^n-WXI zrwGhgwQ>_EgjBXu7Hm}F{o9;Qhd~h2Eix(&ZO&V-;!?{t!i*+}hB-P$6T-qOlYUX2H&SPa&vvJi3z;?l-{4kY&Z zz3v9up%6^v8pL(gmxifl@2!_Vv=I%Qx)aq1iU>dL`fH8~4U7+nf4*;RYXc%Lxpf(~ z=Na}P3H<}LKfDjyks&Uhjr2Y?wzg2UZ%>T&<%7h~T34B(k9<%|f|`xjj8iNXUp_v;`_mc0BdF`mV^q5qTxWk~1(ag~)e&8nej#Xgn;_ zXipPv?K`7aBN4S7J+TVHQ8*vkkEewxxn;YKEs>>i&FS+&yli_l!xS1|wK?$p zET-*I(T(w=dsV6YUiYpZuWoA&bY=Hi3W7It@#l}xHO5#oX+X0FeLm#!W3qQ|B>F_{ z&~DhM6a#kz=+GQxu&IfAq?XORFMf}WDxeX!>J}bdedcY1e#Q(5%lNs^_+tzJxox4ySK;*qSS-hB;oytG88sgd@ zqQ&~1UgL|Lhbmu5>!BWo@eM2_rpBuJWGKPYv3eKw|KIhEvBlZmMZAi1fh0Ecaih&E zZj?J=eoN4~_92E)wCMEyrDn7uJT7`bjcADk7mj>`gp%& z|3(p|9IJ;o!(V$0UUQ;8O@#$_-)5oU7P9;*tDy;m4>eu0GDGsRFbx;+ahc`z%Kzfq^JZeV>L*|eb z|77|jum1}XRP*cg=uQZxQJd)4C*JL3!H{SX@2-@FYCX{Eo*o_DSBaONaoTh8= z@f+GuT>vEsU{yz3VI*WF4Iec-To>&(&9^f$RQwNxj6QH`HcyKQ3eSi6$bvKN-cOEY z^JO*`Hb;l%7krHxw1pftYhew!H&!dFIc@91giQyvd$a|tQyYOw{V}n?m5=Eb9ER>8 zE^DHwiJ+}`Ad$~(p7>jW9!_uA24>@Dhs?{#de+FuiAaQMqtvt z1_Xe?hXg*u2`0%>cmFRKO>zG*8x4HANk{UVH^_L&jUD*%ZNT-XJAwV@h7ohWv(jt(KlBn_VxjdL-+UMJQV*T&=M1LbBP}ABU3oD?sw*!@ev>E zc=a{gW8+5eWo2-%Y$sMw-obk;%l`GsW-rI{hE;)|-|VgR&iZ^cN^?~s zVhX!81&-^@w}+e67aWbqxuIvmNq^XS$ZXxgwO;ry%w+c_QxsNrARape8*}pJ0z6}E1*mipErFh&<1MOlfQfmKrb;~p#66a{R8h4|Zy;>DD zC_7AdIZOoL1RZ$z{eb)^{nC86gDr6J6v_C6(ABopRH^r}&xzE0u+f%~&S5j9T$-1n z=lk?)Vq!uD8U}^}0Rr&;0u=P55xwa1X0+MH?>2?6dns zY89OBMt0E|x4*z7z`#JJiaw?kj`I$HhYvb`$N!gn@sDBB@EOk6@O+GGe+ z4)D56WrH``7}>I|$^EkMGg80}nXhrqXmU?6!`V_TGZM7n6#R1!amL_sR0N>U2xnVx zIM~UPZ^!fX%Z@xuH!Pk;v)$JUZ=__wXh7CQb?Z^1);+H|2;zAs>3@Dj&gd#nJXWyQ z`^m679^|S6a4PPupow{l0Vi^9^v{NbK+|yUrQF@vyG(DJmJSKN$p8KTZ|x3B23^fp z`x=d0_49FTc}xbkfg+yy99&bdL6SvPsOf;`N(=0<{n zE`<;~y=ihamWX^c;Lo7|=l8!*3Kg2Qj>S#wcdDIkckEZ&5vaWXhN+f)*y2J&AC8M|)?o~r#&h&<4IJzx??VQW642wgtA_t(924%=4K`Gj(h z`y(@0n@4Q%%PIz96Vl6WY6>(-4ybW%wrq)+A8hFk+hTA#Ggqb5(b>|?QX$i#zXb5^ zj@z={G-*fz9tCiMD19DUHM^U$;q#6WeB>_83jjvbV-Tp_z;i$FGyK3+;?P5!kDKH2 z2agvmkf%a>iJ|pm829JEU(q*rKk@A$`}MI{XHObRjw+WMxza;cAgGe3ziXwNcSH>b zH(=tsar-HPIqgy2l_M@x$4yn+MAzqs?%0yddf0;HO*kZlcZ%<1QRco7Ly&QTIm5xs zJ)GGbdy;>_LEejT;`swVXJT<9KNMe(C#u6_ESb;FJn)frJJ0K+4-ryWjJ#AYJW4Pu zdIe8L{$9NzCrfw$-u!FumGt@}#B)Qn_Ze?@)v|2Fl_B@1_xx`pgf$`fv7_yMRs5K( z_j*xhiBbe9&Pqd(BGIO$)5oZZ-GpgogiDbwtO6%X89m;{#-Ey4-d3#4pkp`Zv+;Y#!v47~@#5UCk)f_4SB%H6qVp!BgQL^1+8NWf zBRN66IFp0>Dskh&lwd7vGl`LPkOIcak{m(Czm^hXO;zHg^5C*P%Q`p$)yc_iw1X99 zoCMK{aFF|(>wU-jv?y6HT~0bMZA6x(?}SfaaNxjfrzJIL7binXgvCiQG?<_yB&I!P zbNyfkA_IS29A!G}yoN-&zVu%B-YB-u{NIS%w`=@7rcZ#X%8FQ=>(T3x0*ms1wSnLTRiKD@ft|Fa7u+pe3&Pp=nlC+99H z!@80djZpk&Bw_)v-aHYlN$H|1B0Z{Um5-uqGV&rnZ(;}-+L`5otql)yS5oLKpDrgB ze;{+A@wLPZ^R(TNw+^BgeM`fhBDqv?0&kQBANtM$-XJT?KLX?3gkI;3n08Ns>jEAI zI4@Q^VS`u+?V)CIqiyx1_rK%+NFnBV$ba$OXU%Tq)wN)5J*chz)^wW%gU)E)+^Ox4j9JWCG9JftY%#L!qQfZwdG93ngkZKgKB z>E-0Zs1h9a0yO(<=PeL5#OEbK`BviT^PdM!g?m*PQH~WHF|;XjITn6P6@uN7ZG&uL z^YLGFUW}+2?)0izn?X<^M}!kUG}&e|MVShfQ!jiURs|urj!TTTtIGbD24m3PfjoJp zW#<&^tnNM}jBo?R3fg$KCYm*RBt?-sBKNb+!c0z3UkYlpogEW(o0fT=e4_n0?vH0L z-!*R;qd}+*&r-c7E>vVICCvJwyD`A2d8WC?;5-S znf>ndSn$JEmlLm8!S_DU+aYj~kchG2zr*>k&+vPHqDb)NNSFG^N^7?BLZ3-=9eXYr zpvSpXiL;BL+!c?VKq~kH!Lyp7ZEr=C=E$(3K#8aPgcy4uOj-O|I6W{LJX_OXWBv3_ z-=z2Q;vw);=ECbcN;l!_A{!V=(IE2c^pMx`w-D>?k4iHk_g1|u%iHXZBt^4=qI zrJSS!kYC{{pIB$Hs!X^2_`f^jeXIF#JCgfp+-^7qTV_Ib|4*EJ?szISi#kQ7#A>>Z z@oJiA9d2{Ff`--T`D(@k5ot`2zcw|f}%+6!cb`vmT*g^n$U ze*`(TCBzkq)&Z~tlS+WCeAWcYRL)`MZ&(rQk;#{R`bYi$>%S51)@I{%a7D0{bm@Qk9{yX zyC{HdCTrRLkRB&!+>e(Xu-N4+B+V{IeoHkLvZD8Bz-SL20LM?Yht*};>x$+EZ%CGy z6vFAwjO|&GDj9C$m5|+cti)s|-p>jeKs#dOk zt9_#f8f`zDYZ~~%BykG(hw%Hr`bpqT0=N)(8#4Y(y{3kSh9K`MX<}V>g}o{8as7-a zhn(5}W<(P;$hzb3e?xC@Ux$_fG|c&k!Ly;JB7;aY+;?%^Jqghu*@|bJ+1Qn+5UQ4U z8{;KO24J*yfMPa*cga%Xq5%s8X)^hlHs-)D{=vD9Lp?uVkJ}ct$EgIa!rhq%{zJIE zg0_+c*9T5weC1vq{Jc-HVPKxMN|bhsT*(RPr_!Q5Z>@qkZ4`Hn$d2v2e}@V+GymO4 zW&tFK1!M#nif07v;NRAoZPpf(mP{p&UUtNKN35HU|CEN}6XrnTsr(4OkPk7JBbc6l z!BpocMMS#xKC~3B=w3Uz>kQGdeVf(xk7Q^){5YKgJx%y|O)r8Ti_o|IqW(?424Z5q zFt#g#(_!;J?XvRzK+MEUUxAY`&99tZ^V(66?Jh6A!wQnmMdwb?|fgBEQ=Bm>x**jVW95s4X75$jKP&*TF=#&^&BPaZomME z6-RCpKV&dl!X`|1d(`5&8;OGLTK9|}Z@gjcVJKF3_m&qK;hDLfU=(H^Lf8X16{WJ2 z_7g#!0m}Lm402VJZVq@sEbn==w%?n=d(}_x4UYqdgG@Ky!=iNC*0DX>DC$N5$7TQh zYq>i8o

~u8;SN_V?z+tD6(Q9xB^c0&GGLB*17DU#MW$f#0@Y4%feV?iuER-y?a) z`1p7LdL4`-?vj;R@j&BfDn=P3ZrpNF%D%u?SN!AGAPO+)!R*F&NTxA(Fx z;G5q*O~e~S)kbxMD!r;mvGi}rX03c{Qpx&|H<*wtq!b|wJBOWUVKEAqIVB+I@qyzV zfc*N@$#2(sR5S{Sj*59&u>OaZg@>o?0p$15^uVhx=(GJ!g$1tdyvyzV(V6Xf?%O|& zJUAfuA4VtB@E|hYyQe!}TUkriVoQ!Qw(0xj!Cc41U))Uybkb;+Dv#PY<#A zVy+m_mgV2$pb9a;|8&;=aEOkBhYPlu^00O;faby{nNO8?OZ5fQW`4Qb0Xoe|Qf4Cw zZzVl{UD39AYY{-;Jml-QD5~3Fx!2(jMMr_|{>RJXEj@Pov5Ba+oj-X_8%$X2qWw*t zkQ#x(&US(j>~fzUH1*K!_2HIcqCS8&@E;=K3@ujRnd{~B&q3SwDsArK_uatMIREAK zj@Lz?VE!+XYQIJ(x6S;Vwg+i192$fIGVHb^0t+Avw$M+_o@6C?(Ih{yOx`a6F`M89!jx8 z^Nn`rd!AfyU}UHt0r>(Y@f4 z&D`Q}vH)GhxV0ai5Wg%9Zm0K*it&BR!4=-h1jyp;pomP)bChF8bRDQ)yIi{A_y_<1TI$sI3zPF+8FJyTi{{Gmve z+?VXjINL+WW9wBXtZp5b+5OLf;CSq4O1CeLj-fC1SL+8eK>5e z`3T`0r@FmvdFG1ZtB$q^j$Rw_-y+o{fIt<_x2?vkuC88IhjWn62tL=_Wj?j)0BNe3 zrWP-DdwI$e@A&?j6NA}l?tF>H=L6BHMNL`uf5Riq#LFEUk5WoyxnIX|~G9s8X-noK{-I>~nf<@WM+;U}o~_!s*< zPxN)JSYWteQP-^V)3vVrncz9u#H9QF>O7ui#{2RNZT?vkJYQ=$?R+_J^Ld`l_C1{H zMdE-VXs+(q-5!0~7013FR?tQP5&WAe5MoDS)2}pD`)#&&c8*sa_-SJQnzUaBG8!x- z((pA~ekI=nf7D@sKv{wdS~fq_`};1PF9#!rSt+$!$|ife>KN48&*xwArkGFk`k{xf zLA*g#lM7;g=O2CllHxdAYG$Y=83rSPOPBI=J?Xnm;Ugu>#VR#9&Q(K7CXgmARES`S zmyreyljBfd^EfpPoWEqELLV5Ir%M5okJ}RGcuLMrD&zm1{zxkHqbvlOo5q?uf1^5Ezzr4LA9JT zo%2D7Hp$&{oHafDdVDbm*Vf7^9^zh5f45xS_i5zE&A}Y!bwc(lr&-1)22drGnw*{4 z6!TwS_A)lIoOq;?lpI4K^HFpo$MD`aLsWe%-(7@XpfH{-^oOAu@%B&1BrASPz8x;k zc2xM5D*nL0dvl|pGclo3q)d(Vc!N&Ib!C;p(mJSJ@CO~S7jEYs8()iZ;AkPr?yqRF zV9CYJk z>gYZ)n=$$OaHX*cz$l6kh>*eTfLe#g9ezb5tAnzWrA5NUhd+ASA8sx0c3kgrg6~JM zzOMr-P%97hoL6mjKH&u-U!8Fg==8;gzM^H^9*s7iZ&$}zj3gYH=h3H7sygr}e6JPW zgyshmF8r%sDyE1?9UUcFdd<1+W`uC$oaWf_T7S|1fT{LBEr3UVs*`Doz;o`+hTHj| zfTy-c#pC((w1MB~nyRNIl@s;^+2Y2;ey&p1MhzGTlA$!IYrCS8qRVhz|JKfEwq&1M z*grmf04Y2{!Gm@2eevPs0T|SCUti~Z&gXib*>iXZn{|LXr@8zFx$?X9-KrOoJPhZy zYH*5bkqmf_p0tArm&x5kR#NgMaTZSFi2y?;?82y33)V~_#1gRGQYG$_O5h*r8SF`P z8{6Gm-i^~~Kk%|_)`JE;Ai;zaMSWx(dI9n#=M;R+DWBC6mfMXoR%ZGGQ+AAZ0P|%6 z7Ek=Ekg6gA+MF~Z91|wVHbOAGF8Hv?v@+(=kw~@=8h|7vM!H9xarlNd6oUa^H+3f0njKV|&k+6nG8AEg?mbYe4k z^<>c}`|Ad-lq4N8?I@&JsZ5PQ6P1GdEz#X{ooB&@V1F6$jjzL(yq8>DB2)tR1iw2b zI)5I8UM+LP@T*WcrusEpuT%z_75&c64#^mj=;+8Eo%_pC@p`-Xgw!Qpa>qSj<7r}t z+dNz6$a*+I<}oTN`o{VLAlQC1sqND{j=+xxCy;x+`$qxhijeG|z-7t6;mpq``;&N^ zGXb?dby1hC#UUx0HTlWM}sg8 zin!LFDbA>SXOhV(pzuZWi7VJ+H_XQ1f#64f*U{Z1rH((ZiROhxP_L-^ykxv!+c8h4 zXLnWm#nMhmFm%3cSkOG}55ZwDCoI%5r}n>=hXm{*6)Vpsv)#Y0XX~GjSzyof`Fe7~ zmJ!9S_=Cz=n7-@Z9CAVAi!UG}T;GO{SLk-79&jK}3v!KY4uHW2iAF`I&>%*4OM(q# zUXuxLN=q6vhoA?>NiunX3cWYUi*NSHk^Z8Oy4Q*oDi-x|N$A_E!({uc))I8Cio|fg zq2DQ_tizuEH=&4p?|cU>${A`AT_N7^cpZ;<8X+ub1~LWb@cj7biZ5k!8SRAPR%|M1 z0K(EMBf_%cGD!gs%e$Hkw4kZ64BW@!_cZ@Zt+HReONhSzB^v6BZRJvcIQf_^o{D~B zDuloq-^?06;W9Wjtk=$^Nif+_6fD+rzzyo{jguA!nd|Ik$&&DnJMsZA;KfmZ=AsCA zs+Uod;y+JEm%T0~`rXzBgRD672JD#Bl(0n@b{f~y+>A#p)!;+G7j<7cps2E6lau^T zto-^h^|mAEI%_8TvGp9)-V7;KG9KSm+}FW)nN^o01?Hn8$dnT8D#eE-QlzfX^)0{R zqgwCIg;AGP4Q(04x0>ZFg}p0QH4iI|hkqN-tSQlo_Yf%|wG=HgND8QB4jqWRMMS(( z1%0L~Hv6TB=^mzUB$EP7F>>k9rPg@CJxbJx(_5%+NLqCSj@L@s*F8;t%r&WYjPg}0 zx5ESR@~-3)N7Ojfe*WO=Fq^?cW0s$z`8V~g%{S~_aj{{aEjgl~Of4wy$Rt644Imh4 zTI3sWZvYQrsSgQjmh7-??k;Sxf^MrlrPT^=&DWcEkGovACv7XV%#u)IlmE_1Z6s22 zV=BaRl-J2K98+mVnO6m_uBuPwX{X5eE8gK#;2>E%TTfJvjNgv-RtTO2C3wWj_I-Ce zyDM%mOB?P8VQFgm0rDXDTWSc$9%+S0KUqH-%KTe7DI93W%Z}@p`dF4UH^NeR+n*kX zhyjR2SBAa(CpHB2=_(H6bxMrK=f$okE&Y4Ybt_{=lRsv;y5q*r$+p~2VzPRUZc-qg z(f85@G6@AVN$M_yjqR@5lQ&yMoYMdh=@?=2^)QXHBlWCXJNB zk&TU+B|Z}(QX?itA>MZy7)*%~ldSccEVYw`y6YCiwU$?l?-d%Npkp(S{^_6BnaJ7l zE3BV(l##4-riB<0y%4B1xHFG}m-oIwqw`5FGIt99TbJf#h}fG6PQ?m>1}k((d7r?` z_JZcP`Xfh28ZSco)wvlk&b@d;q-lxgPFrc83JJJk3D&={_`Q5~d~Pm!$*8rs79Q+TFHqH-%=Y{6Z87OYUq3E3>&n)Z=aFQ? zxwk1bZ8DcEDruyBXJoYbq83P+6vaZUloHq=-|6;l&4~^Mv13#c%uq-yBye;yZ=~Bp zcOYA=2ro$)jC(d-P$wn5*L_68rpZS>^(!P-set=ul@lZXWp@xEfcX9LXUl2b=sV@2 zPycb!H_e*M+&wz=`UUyjz(wK-cI+%EMMTMG`hqtCX`7Px)Lp${W3;y~ss@ekY1Vr- zBE9T(?ztT7n*RP6WO1^_lAfgF7Qd$jqD9@7zaYw}QnM=KY;Cby{a9j!0twN;GU2FV zRPUSrrX9empw7b7bb{;j*{QsoTWJ++aZXv6Sgibz^A2){>y!5Xltv9+^4XD{V|@wO zOYI!T*@?eLf3`@Z z)rDmkE6@mJ(~*i7#2&K$hSy@&bf^0dtqhPi=LU{qQj_w?A91&R4Zpx*T>L z%zNBxE*Pd(!3+*HF$X1T*@5}W`|DneJDFbJ3RMx;X?oE#&7~-hWD83VI@bFLn__cC zIKm55CZ@v+Livqm28sP%L9$8vLBs-0UQgG1+2x5cHt_DL6lR?l7|9b^(zWnUs)NBd zA=oO2)lMIIu#sWIx(6>IwmiBm$7E;8MUvD% z;UG4q1Nqu$TBCu1Je1GNBq(7GQyWod=B^EXYK#5YNd&hcJm`%m=xqL&E*U}6P+9Jw zj(4$6zCYz;uEg}nA$I^AB8BIlBQGzj^c4;F6_?`t|8~&OCTrGm)L?;%S*uM zgEQ(c7&82(vM|b%6)_!*T;QU=G9_Ec{UEAOmVzA63?$nk9sl8MJtk-LEy_r(gZHA{ zDZ8uxPT;(G=M!T;%%v&NyymjB>@RgQ98bGYpuyx)8KR_eED2#|B@?0CI~DGlLdCxN z!}<2?T3HZ20aO%Dn;-D46if3uV-X1rYSE$;>vr6?+iatz45MQ&=+xi#DScf|$k$#D zfVf`PU$;Wz4<9S;Z*L_P6duIO)vLGLV|^(;(f1#nq^s;F^$%>`j$nM#)~45VvB$v0 zKPU~5d)?kx#cfJ<8(&RuspgGkO(6=#Wo*6YWIwm9fL1G>p>jEyy5#w+gu#j6Fo+fI z9u5#`)E5(0erFcOS(iI4SO$F7sgu6`UV+}8M=VM+cRc%EcbI?%U=Pe8ok75m#M>>E zGp19M_ujKIpD=DY3V7iMWt7%}Spdx*B2Ol|5YbBOLCv}z$N*j%SEU(@A9 zMaeaNeY_ZXJ=PINxlmIboDD||it#ozc~pL5Sn3rv$VR#?Jn~7lgQ3%O9Pf+$ibe6; z{Nl?P>*Vh9N%g^I5VEdXrNr^yR5r5=AC`4`Tm%bjb|7s?jEDhhe!~wTMx2&K!Yb&X z4wHVNlOM740!`x3-8eU|2>z&1fjw`wYH<0{KPHD6RiKDP3wb0A+KJVI*ppGdrdsyj zuoOfAwXEz^-}tkh!Ev`XfzMHC2I4@W0*96k!hobs0CQ*SGJ&Y zQ$korG!JxfS8F8Nfj(JdC=)N=W zlPWKLDH3@4c0rKqUV>Q{Zt_^j`Tetl8ia|v^=({7TFUhNJSvFfKM0Lq&3(*n?6}Oi z2yU9S3K>E+X|poa*7XJ@JtAY(f5)xw*~g>K;OM9byOYeBr~cQE;w2}@k0<#S%FCHEKIyWXget_B|(c|mI00WtTSjL6`C;fHG8Ew2srv-fIARUSC{!W0|F1Jkd*6iDS_4fFLHyGo?42I>uNW32Kmu?HxWmEk{86`@)# zl$IdQ=@w>Tz6vRUU_50+nMXsiLgNGXFuW0i0FgqFjf|)mpJOS~j4vzRTPE9&XNdui zK`W%qLv><=FQ(n9W~Vk9(_6W@JK55FZ^h&3FGq)mVN(A8Fv$Zk;p)T=6e&LY%0&;i zo#jLzC^d~1EM?sD<_q18_lC*9;%}L(v8m&kiqyGT&E|sf!QOZ)X}RU={5-2`ARGFr zX?PtQNg(gc+#FNmBI@Iu=I@1bjazmXp~{YlV9c{4Ax%du*{SljZ|(X9tsL6aWMSdh zwabghfEtgS*n@>i2sBCkHDAUwxStnb!1FJoSk2$NG>sXA3=nwP5OO6tKV`0Ui(?EM z4F}4!x#`MWxv?0y@2$cOyJ$4WmRwrvb|fi|8E}&@Q(Ha4ww-(XuXv0Qbj$ zp9hN!F20lE1YX^?QJ69XK2+!V12h;MrT|@pXcwID80XM0@tXYYp}4B{Eo3C-0lTOQ?x?i_kOa5|VU_4%=_Q z0a*&0zPSDflRXm=7QsL6?w%6P%*?cUetB`Z+U~!K{!hN{V1JqW6JXz6u4jP6d&~58 z7tKkeoRA;y42>ll6rvK}k#f1JWxIc-_ll5(s@q}Bc<3g&SkSUO|94fBG&>{_+1ELx zk;I_SR$XzDtGI_F=FSB~T}rY0N3y@QO{%h^dLM!M_kP7F$K@S z-%XsEl_=S>&`i_bp0=E7-YML-w`38wpQG}@YJ(6ZxV<89p%N#e(W-sXA9o>iv3!XI z2i#c!zrzShC7lt_#4BLK8W?>Dmh02Grh~CS894)?I!elsJr&oV3k#pT- z|4A(7#UO`*&Rb?nT5GWmoDl{UJge3-EP!($Oa1x5RS7m^sxR z4KrYk9q!Rr^Ycu0m*B|OAi3a~8pLKaX+ShtqRFTi}eS7fb zvY#F2oKKq$j={R!%ruA%nVJoCWhZ_4wm0bZ7T)CZPIj-=%z6|SQr&s6vPCA!D6ER4 zNCm5U@|LX#vWR=AjD(^ogC3`#%JW(k;*6cyZmhaB)6D^Wh#RS*Frlgofi3&dv|A$I z>fH<7FXQgZM#8!Y)ov3Y_DLbrDbkXQ_8wlsvMXf_849D=Z;`&#TAA@0?bXRh0eujQ zsxqj8ms$_AF@279B&jl&lvO&jK!-=?sbyt;E}G9NobQ%d<`gYU%Oe3^^rQeZUvPzA zkCv9>1b!{CYNOUDXiM+|6vsum%JlkqlIu!@-{x~LTyXh7lO<;8VJsXC6(|Bp`cWbd ztf{JP<&R<;s?0bh?JWLg2$o5~1s2jS32_vGXrY)AqxiV=cU$2K0`qb!RtEKak_{{q zG{Dor_S6nZjgZU(QFX1`v%>@hftJAunUr_%P4;STmQII%^TJimWCooP17LgJQ5Nrc z=R*$+v9&`$TJzjnR%E;mwuo6d>uEqP6+B z7pifvk~XZl#0Sd=ZS3QF8-tvLL1O5ESTBRx7;X^VYC;Wo}w#YG`4(xqMyT@0NvO zni8+#F``yT{>XBvVdt@SWMt z^7yjmxa}DU2&#c(odtLVZT^mmWbs2{W4^g)QAQM~7GK(jP>RF&axGC&!7G_GkI9q9 zeqGMQEYJ{z%#ie7lUO1o`v<4w(#(s`D4?P->EasJ*T+k12we_QY7JAS(ZJ+mjEV*? zFm>dIG!eSMri~f$>8E&9d51_gD9_KAeRqij$U+jg}IYsrgB{l<1&T*;?zw~4D|DsAxWDkRc1QyZk>1@@ z#IOl#eKF*`ulCYL?k9VMuN8$msz_L$tGRw3E2;^nEb6WaC7`}X-Xhu=6jWEqnx8cUP*Vh94Kv2Zkk ztFf(_ENB$7;o3tC=F1G55yjVM?|#r3(P2sqRPq+Yl@kpvqgSf>F7=2@#rO(dFg{=l z(F0`9QCx{ai<4<=^NxTe-xH8F$hHz~ke;#1qgf3)_)4udh=Z#KB*mdrOi8trc8!y2 zMAI16@IdK9izrk@;@Yd>*I=`v{52-R6L8vsa%}-wph|mW=X=xU1A54M@ZDck*XgGc zbP)C?5C7+QQ6sUlOG{2|Vd2;1+1Y%$?^R)V9jLR@U@)ghZQ~(DW5HVwWQF`naZ`o; z3EMccQi5e?RNA;X%>8=ghwM1^l_s!al)fvP54y&QmGZWcvjYeK_V~sWMln_kl-yLd z?x6-6iOKY#HXPg#IS54txwzFRC)jf{-}0fJEU;PhL^`@u7}Z&j)?4Gk9&huF|Fu1G~En(g9jDA^&eBu=ScD_hf)dTe#fo6Re>L~vKP(d@>V3|A@r zCFdL`yQ`!`yTvuHAG|`HZ~hCicV~y7^|^G6 z)OMb1X>+EStj)AUjn;*-vvC!_h#HxH#6`Z^xR9-2YI-gK8?k`r^ISM`IODW&oEt0hUwQlQa)|JRK(B5%jaY{q`{-V=yAQ>&g$K# zeoC{^D_&FsKh>!R0T;!nwK2cLHsNseB;ASJ1MLt(QJ5oQ!4ONOh0N&#RB2QPFZ;!C z1LK57RfE7w#gL*Y;zs8k(0m6>AdY`vxao>ahq-NzP_e@lpe5qc*@=luQE4&38YRi8 z(uO>bg~`_8DtHf!q|+q-Br608{$gk}Rwgt~7{@^^<1lVtBTn*JOOz@X8%f5Rg#EZb zeq$CQ1Ie<)JIY_lJCP60mZ)V;ryaQiHgiOgqU;#@{`^z0aqVz2qQ-zXW=XyJROg&F zk&R_SdtC&7%ZQ=mPw}lRyo%-&cJ#`!u_WnfkeEF_MtHNiLXf2f;6YmDa|7^rpt^FE zI7>S6Ll$ra_(*bS(zjpy+G8(X50MM%i0BsY z{v5m>CECm%5p8LbEn)%n_#hPNfE4-XVctm45@7DL=^M^_Zk;!oDthOsp9d-ufDA@8 z?(%dX`M$ol{yU6OlfEED`YcBG-0jF7_~3beXWBhOAEQft<`2J zMa~T-r}bwSLx;OV8Wk^-;(nRXs!t~6E;@VNEW4xS<=m@g!Bku}SL54{QkVM4%$V~( z=-=!IvZ*!EWDBb8$e)%g#cs)d3)Qw%sJxW_dEFD2TK~9&1Vp$b*yL!2{N=)kIA4+z zJuw{Tk}hD;Q*(Al7?7c$#f*YAL5&fxciU%cV!}%lhEyoW*|`}T0PDPb(^J03lqMa` z))~zDVn(unIFH(`k*iqN+2?!G*KE8)n(BOJd6?#61p;rkh7sy>5#b8LF9dzgAKnVxR` z?)P~xyj{m6>AmZs?LpuyYgNYcB7{xEKQ3-6NK#2jQL)xPjE9w$HYUc!d7qQq6(|mL zz%clRfl31|{Ut6qSV)8iZdk74Yg2~T2*btm+ts<#xtxeg1nbU^>`6J>bAFfX%#H=m zg+EzTC(|p63Nkjyjr*Etwt)j_5{bt>H_BX^J2Z@qH(zzfqf#jQbCO68h$-0wq`3>6 zLk*9Z`g4c}rIyZ#E_>g}cY{shQYA;MNOsr^RN>?T13_};(wJvpg|f10Y$Pk4e#~rh zrav5B**F@ANlN+Ajy(Ua8T{tLa)es)QKZ=%9#nU@N(bHM6MKLByqGX%*}Zw{S~^i} z0F+3uzb6=d3MW5BZ-V4x6B*o2Ri2;ct*oj(R_<;RhUZp46E|jN(n`f|j{2bYg8)08 zm=n27KDq2x@2m6Aa~3d7QMjzWD_Q()MB$84n)QJeJ8>bb2HTRCb2)gKt`!h^Uk%bo zaT9yS7y_jV6!m zhTqDM=$9KNj2n}c{g6!Mf|Y{_P9fv;-mVufh89fy5>F=id3^4_ao8COeZp!OIr$`szf@u5cMCj_y=zrV33J0^vN#os3Vpdyr>Af_!Pmb zHrm`KDRLU}PW~TF*PvJlv?OCYnb^FsHL>kXY)ow1wkNjDiEZ1?#JI7sd2e^Wq0ebl zS5^P?;ib!hO$ytn;fzGj>u*?0#+~;;s=1@aD2Q3=Qy|YPXGo1QjmK7(r~6t0_~R## z#7$aDY%I|bFj4@DFoYEtA&P~iz83fFzkLfZ-R#6d6I?2~j zn;ft4he~vzUyd$&N;%R=^=bB6kvfoFZw|cF*Xt#-3|%j|1y3YWZUWU@rLOAqJ=YFY z%Z+tbaL>r0xxx9ukiVqD7*b@F04W!(Bfm%>G8lFS0ZcQ95MmL3$1@g zSj0edPuv;7%W%UJ!)nnGw4ng}mu+8JYV3c(001Pa7th=3h6}dqaNKcg5pSCHPazRq z#09G8{Xq+K4bM%J-!TMH$GFaAM(Cs>=8=yiF?@2_&oCii@^s{f#1J&3m+bL!Y{SEX zu9^8LuIh?GP;Hn(==jS&sJ zcSJPicROrgW&eCBet77fBVr)lqKj6A*qfm2{QWJGjPr2=5ClV+sX0zZ;kck&P}!~E zq&x7z$`Z2D&F~(J1rtUWBFBbAWVg7|XbWYH%?&v)X9_*Crq}=cAo$nun#Z9TaLv>H zdP@DzqN-ddy3YasRR;35uhJxer^crimeUnKc)-sHG+wfp8nXLPC|TIk^OgFAM4Flx z1MdmAm!J(~yn`T5x?P+vo@je|dRhyz5v{jkRK6XX$wrV?T3MH6$tF&>DCsVb2*}a9 z_4#;y+23t9>&KyEGj8#N&DXd-eMH6qb;I2@4^NmJ)I0Ej%A zvPw#vYT&M;pd{SjmdS9SM+%|lJDk9KMHK9gelak&7sQsesEYY0CLdi+$nT~~EN^^K zl9D4FB!sR-^~1P>Qj9m%6F9`U*Yg z|DZma$>urzrq#XL9aJU=Q+K{1Oc_fgW;10C8%_a63Ki+*{K}&C^YtRPy6%atD8{ic zD0V!@jeDIi8cXwHb3u)@6*V%|28G1nxYt!B5L<4>!{t7;f*h6P9#RoFRcSvdq!YfR zVFbs0K@*5|wDdHX%w9CP-YbxkI0BJ5 z0lY85f@PPuxh#S6a0>8mJjji{$G-gc!;RR0RC~U-#~eam->;tM%UrGL^eW_ZQRWIBoD|nC;E8`eNGbp-QcOOJBjb>j>b944 zqfCklMlM+T_pG5m&RlQ?7u?!oAehM^dfbfPYx)Bf7&3!yL-My6w@B;1-_hOXW=8+z zC+U9iLV8LH-9=k8j|~a1uwNX#5WoIU+@Ri5Y*09|_C|VU^}zsF9qY|lqkN4*MbbAE5z5=>zofF zb+QD1WNT%8{@y@6%|$MY)owWX@iBI(!wr~|2g1Dy8B2K#NS4)t zkW;@DM|KAlR28DwshHO{Ap9JDg2dH6d+9f|>z!jTv?kH{-f#9rlFp;zhG0UIkRL85 zNU>=J52H13lVYV-t+Vt2rziIvGhu`3Fe#D;$2 z3Y0iI$);=f^}(f#C5kllEkU-ibfri=Yu*T#tK<7T(P0K#bJ+V2$?(2@dwp#Lg0>v@!W0$qEeG+U&7IJB%Gek z%#5f+>&FC+ekJ$Ei)8bij2WY%>QtZ5LM4NJrNkL~sPh}by3p*ALQWXEzn-$o-5t?i z_%?@KUfTIlsq6cgb||0u(}M&X=u_djT^?O{l-@qGR(jm_{bF{^H@C6ktMiz6ECr#A zCYl&eQE;i|dduRDk&Dqi&(#BhM*6tQF}iuft+M;m6ThLJQ0FNp6I z#ps6-KpPBpuNer8Fn;-`J+s$mwKFl5rq|mrhOVUCaPB)NgL9Uw=@ay&hWN1Se%Q%W zrh+W7d4>JFTkK2cc=2&qtO$eSnA>;!!`NsphshU@LkLhP#3t>$`CtYA5>>;SJkM}{ zXtC)MpR4Z$`DH&hedMS%qcSBk0jLI1ZgN^*mi^_#5H?d?IqcMG;NUj*A-qolLZUR$> ztpUfP&xvDH8v1KkXQjUUOVP>`UhL7$g%k;!dQP8LGxu#3YQ&Ri8XbJ!nVc+6}nJRZ@{Ntx(5MB znRaQ0xY0)(uLhZUo8E|b+|Q`hfa?l=*n^EeE=63EiXudi%GdeB)z?t8*cKEKmE$=d z316Ycu+ff-C4Cd-(12J+G<;#@$z%G0fK{X3x%%LGdh37T%pnmHqwDQ=1XsrxGly3C z?;t9}(IxSW#73)awNWk`8=5_Z+3V3Gfz-x00#zwWWLlB{lFQzJ9De?rApP5%75Whs zLW;{Idp2kYxvfYt>LesO-b zr)b8h{piZl-W<`>wI5?{?1MBewT&Io7Jep{0MeHz6D8Dp>#>0C0HkSugN_FfUl0kJ zvc}7b&@?Rfk!c&wfF_3*sYJL<=QN)z|Eg5`DEYrCD(7&(==;bhSN=*1Nof!q=6fg6 z()lDenah^Z-3{8*5=b4Z#@lL(9>@1L$nZgPJ>wjEXTATVg;MLxvaDJL6)H54XjX-0 z7cjM7KfvYtyvDn^J^eRlv-g1U0+f^4{8=S6H|DqmW;R#k1vGI=1JK@o^t+BWjYJ## za6bTx1hyOMPYMr3t~>G5JF_f?iZ2@2G|(BOydLp@CKYS z{LHQ&$T+3PXtkSi+I$&YFfiyFoa?;17>XvE6a9ILCWay=EEh9!Hr4TRqV6kfrHhEg zs4Ga$uf>L>2!Q%0LvfC&(L#$U6cO~tKOiu!unIWyPFB#9p+DfXkB5puurN^OXzw#Ze`RiH#s_NWH-_IXUYsgpV+MQ zp5aHaH~O5Kx`dN4fe>}oDp3?nY+#0LsIJ%3T}tlGFj3C-XuuW2m5(<&-wW@MaKdMx zLisNGP=Wl5Q9_$aNnZ1>R&hi=_Cv|M^YDy`ZiYUTh=J!4PfU4&AwH{?H9S#J$5!YJ ze3@r9sFLW=D?*dJviA0Nz`r{nw6D`AB$mUmoo(%ZW>ax?J?@(BqYt(sOD_eU17{#I zGB3dYY^yu$sr$h0WlZj?_eO8|#ooMpqQO>z2hX=BZhD~WgxKWY=x@xa zoXK?f-wtP4)J?z7Pw9`a0k6A&)Hs5H2r`N5!cxxL2dZUeVqEfQPN@8boHIK86r~L0Nm349>oMLBJ4AUk3}ZYqT9chp#!_Zz05Z{G zMZga!O4dbpq@A~^0q@g}9)qK%xy|b_w44JOm^yyjb!SZ6dD-$dp&;+nf3( zpoPBQ_H=)9=TAtAk=P%DmDg)a@LsMxzd18%eJ;;IWdCsazD^VHaD;(108uJ!zl>k( zt%SN@cZU-FxN&haPOh#_TAyR=x(^@qPS^HZ<%R(GWI@$8a@=y1B4R|bptnG2ub z`FqcO%BHP+EGCeJL@IRQ3Ojy_OJGH6dUl-|cr1{>hr)sHx3+{Hzj=t-?%7gj(#7T& zm2O4I>j>IibvlD58hM^>(}7=+Dd!yahZMEPcffCzu|;GtT6vR1g-&a@FfG>gr4`dK z+K-g_5he!bW&}RB!%~Z)IG)9FG*tN2__G z(``!&W+ieoPA2)z^)h^yYV-9aRiDcES)n#?n0x4xFS~S zV5=$y7Dj>aaq(bkle-(W+P+BX`0n%me0ALX7!()h;BdSv-3}`a-VOle9id2(RYVX* zdOFr@G{x$9K2YIpF~ox}iT>A8t2=UgKslF&EQkk&?)cFo@ZD7pQIE(`B;86b6`c@` zBGXW&>6^&@TexW@Ckl4{A+AUY+Hv&2||jBL9n@?R$#=;&zn^}#}6|}yaf$)%|$&Hti&ix7(F!F zw&oxUlJ#Y}##PeOgjMRB7NJo0k4!xQ2n=oiSxL)mL5_bBC@claVmiKfWwX)35rfSf z`0@6n4*%UR7UI_8UtV@V=CxR?UMw5h(EhdE_(_EzETo9M<&7No@d=Ab$DLDroI8FR z^_$g86>s1yV@^J__X&kM(NQFI+R|ujQWM|(j+^)9!qv9(SSd$fbx4AN8$Q}}_^n%r z8d`~xu5=u2uoyB6IqQV#bl@ZBH6T@a1lC3RdK#GP~OzwyVc;flhd;;L%wg`YeN z$>GRFelXL?4AZzwCh61h7@+Kf0|v;c)NHZ*1iyx_alIg2F{xN_-m z?Yi!;s_jbsk3r=USRU>-$W1%)hxx$WcVjq!v-`APrBor4`JrZKtF1!yHb(fgt}*P_ zUxD8BH+9E>XoqM`rl=oOQ)Z`C5p?OyL9!JQqvXBV(eg|MHL37vvHQX4NzVfdGnx}# zoWjX6y7P??+?!-_4&fxuE{j>OFok(6o%-TX_bAu`@`3vzqZ3peg+x7@TiW0|Lj74M zBr|^Z*};*MwOo?SGo~XmdorbrlxQLtVnt}Mx4sdjEmyw};Jw!Bj2U^5o%dQJ>j!YT zZTb-SIZV;25iOK!f*1ptQA3RUQ49x3lu=$NQm3=}XKK7S?LOWSt+$YI@^zR^@rBnulJpivY4N!?zsL}_%z`#@BRQtL+oM9 ziCsVl*)BjRiU6`zIzPE@E^@Xv&F`MI1;{O^U<)!cXOgIP0ez_DED5_W3NTi{P*Hk7 zS2f+)slmcU{hsde1-W5=@_4m9^raLf5qdol4LW2Q1F&gAL5hqxim0DaS%;e%jOKK{ zU6A6Ok33ItMsKDU^hPe@_y^asH}dmgv!#v2TY7UuT;+Z#Y14$LM~xCCD~Ehlu2fip zDt@D_R3kZjj37*A%YoZ7K6{OoL&4LqQJ7*@%TndH z;LeW^3v)?@g?1q7eRZKf88ldO%gI8Oa^-eCr~{dbPOzAuqTR{2aL-*B;f%ow>I9`C ziD&h%HTlh;R=N(nKle&Hsi&9A;DFTeg4NAC zi;xP;enlR~7wVA0O0~7RZTh~cq!d;r8;QbO`kCnz0yKMU2QFUVj~i^K)>pi1YW!S3 zd{-P`$iR#7OEA#HL5&asB2a7;G}K{{a3yfER`Z!j`^Ahg$W;d`zMG1+cv+3uVAK#U zTvO6$s}yj0i6K>cqS^Y+W_qn((MDoIl4d|dN**$)Hdxz^b6+Hvr$lK=F8kK70$?El zbaXxGoN0&2ucJ~xG)t?v5}>a`K6i-ViFYt37957b0*gV@70T+bop1=~u#~VIVl)xx z%#omId;8C6J1Z+~q)neoKK*@KT7JmhSzzV=qIXy^|B17M(i#Zo1a0Au!~ z&TQIwBehdr-f9c4z63`1^WIZon*Q?|(??ywA2SEZa(R`y|Mn4o@z>r-$Txqypr?j|a zGWvU-yh(-}B}8}(Mw(7@b^-SW3h>NllK9}RM=vd`+Sy~57*kY;R-BhB%qCc_`Y+>$ z%vzljksE(IF7FH}si_F5smB9-Ou9zl_MYGuNQhz;s1lvun=*8PaMt2$*<3`wUkIw8 zj0$b`7J+%^m@kHPlzzgnQr!ucYQF!)IY|5%I%U1h2-0%3<`6jenl2n_{bgj7meLb8Z?S~2sCX1 zj>T@?J^ z+jkU)nxDMOF#$fNL#6Luv@2y5Xa?VC-VREm8PUjiO57$2#9m0!u$;HPlhb+6^6zt1 z3PwzC7-3Ob(E_1E-b=+KOUgY{YY76km2PI)s!CH~;~$GnNEyDDM6)H37ry!0_93B?%>^-3J(WtC&qEw{ z!QNWexvAgDolsHL@Y0%N6u>IC$GaRB3kiY#HMMBR~Ze7jtkxMU{CY9^5%^1sOy!lu%C)b$)zIctm@*J*4q` zgLhvS;_eqDQLtl(J4cEIrF&&e`NwF=Z4H@^%>u`u*&QF&VneP^mmg4XGewudhy3ea z$q=L_iX4r}M&~eSv&G}iBKPB>RKB6K)?GPZ=>L#&bsRhnUijY4bSI6!H>Y^t)YkU^ z2lU}($}CZJ)55CC%r0op>rLm2lHXf%Y)H*xYKgXTVn$2YVn6rljczrxxsvl;D1vS~ zz7|M*BS_`NRH4uV_4hBSCJ(8wstuGUG@4Xo`p1afB~6%=FzgQ2z`$SwnA9j4HVA`; z2Nu{N3}MxWSo)<63qTS`Nj#dgi4R}dmX_n?N^rJSXC!tU30r^4%O46$D`iSESLGua zSEXF%e}c*uuX+|6QTb*88aBaJB5)q+%co@qi_`SPwY9AZlXS1ve*8ZdKyl_dKR4zQ zh}~htEbw+V!u2({#-xZNRmog9@^P*3!G$@QsXz^Q2vMSwiI*(sV#`tC5LGVHoq|qF zaX%i5)HFtqw!Ql^n{o7yTC;|mY~VsEo)Io&bQfCKKQFoOq>SZ-Nm^0VVIB*CQvM+j z)z}4#9M{O&0zUBSlXnaJgZF;XQ#mKdz`mJMpJq-U)m-_6#21v~B~#i#^N0z8(&&5W z#klLLTJMZ7VTp0ondaFuLBoA}7uQtmYzAeof`z1E3&rzuz5@qY$$dM$I#>5@xBt$e zuL4fG75|;7zJ@ivHd#Tw%LD;M9-HZ_YNO4aTISF#1>sIp5GO;rj3D+vIx3~BN~K(j zp(sotZ{REuln#dz&5o~Q*V0dQc^$Uape+9{B^Zz&5J8fK1@Xhqkuy16(NEL*;d2(r z?x}Q?sPY~iLh!@bO$@c@KkLzTgXdbbQ?NB9Jv3iGGfB{*G|ybz>p~&; z-!|;&hZL_hp`kx*+YTweIkQ<0Pg`zwvT;tT2RBKrpHW0cx7UW9hsi3>zq!gtc`cnM z=>5hen2nF{m-)M5(^-FG=4{+&rFdGFL#s=YqlMq1u&L+HkCdw@{|jQ1QWC9+B5S$( zdP<>CyM#$++bm`#K*beN@JkT!z(N%hrWO7r97Q_cVjrW*HW=Ek!4aU$RdB&YQWKg~ zGtqZtyKKEZ4*&KPq=w0-oRN3p)GA;$mMo#I-Mi~SYHF0%uO13Zrp@K>XwvNgw8?Ut zCv|*5n=qR$F0M}L(%n+b6l_BhM#B*RL(-B9!Fs%yMBsD%Qa}3oZ^Qe{I#O_;&}y}D zRILsYPkVdas9o*nu?8cSB6e)8u9|64tjH_Ne^Q77C2M2(@6xH{)=t63KbU=%8vQ(W z3k0A~vy`yYji#kYV!>?U<~OP*AkqmsK0_hFjhwm!G2~AaFHgzsb4&jDxHv>d$e!X| z2D0-y9MNwMZDT!BHW)#&-=G^qeK2W`E;6N|N^)7eI=?-&yoGl%{!o7`h{f|r^e<$Z z|ECiq(*3<5TxyUaN3)PuDu{-MKISVScU8!%HB@0RQ}`-peBpcvjmMz~lq-~8Di=fL z@~QD(XtgXKq^C_cMtXWV+N%!WHgldB(>TsnzuD(rVbvebY~m`@SM#Z+G4$02UwDuN zhuhkRthaCXgqd%)o-Sr~)BWTx1zu%ekxLoyIHc&-1V!|mz4h08uo4bq z=`yYRPCL8ZrMdgj+#?4xQ|WhDH%UA1aOKs_GkaXKt1#7wvvc6#(KtM=z?`iP3DC~B zF5sSo!28M>%zq~vKRVlQ124BAVY6ObEhQUgr`$pQI4zqpkZuLz~`6Hl`y30tOeg(yqPNKB*;QaHV z1{Z>j1dSSr*)y~AM*pkxt|pJq7xOuaf?6o(Y~*HG^{YAt~&Wc=d4A#9_apNeb#qY^ifNY`aM>J zYd>VHR{8Qvi4fY69Ih~Sv&UqxY!Bppf2D`NOA%0D)M`4EVz-|W zrLIULNU9WuCdVAjb2Sw3qiNM`r(51E;vDX%i0ZJ*>8@mgtK?WA73d$_fUG{504_{vqSqfg zJ^j{K>o+x%{*u?+-XG^vwpBtV6xQqva1s_e^=}6$+))kl z1>H_)a1j)i){)ES@ zj_mq1#Z?$Ow>hsYRktSUzg*FI5~hY*?1QgMnt4Kcd4zI!z_olYv8N#bl4AHciJYfG zHk%SmXw-y~2jeW7N9s+me;!YY3c7kFAb-usp~w8QBF{jJ_PnMXV#NV9V)fdaNB`sD zL+2Km(|+yijb!KflE@r*HQ=IqZh#Gs{eTIl)9Fm;k~Dl>$m2J~3jMh20Xv=1)2sE% z_=DJ9SCta{KqBybxIrO--@Z-+r0xAO&F_2|&#vlwbM?GKklT7?R|&m0gZ*vb$M3e| z1C$)08H%|7=Wci>zYN@ra;4CdQAt@UaU?N#nk3WV6tihSEJ|gh*Pa|n%Mq=%N~#qN zGWRE#3k!k^2$$QGHZs@O!-w$igKsG7Lk*0)@R^911;7lA!=kga)dx%*PaUVq>T}D>iQ!;(HAeL?=7)>FTi?&3(wQ4lidM{j0hvq}FrHM(I`H-G^ldUa-dum1sege1+ZsI;Nu(P<_;N6TE|(qh(!_|t zKhmud=Up4(aCLjlAu%tB4v#ZctWcufjCka;8(%5kV9FyIPvq8C)}1woHV8p;g6AlT zL=8kFcyFTT8XU0JZzL;1Z}*2eJ1(aoIgU|pc;lGCKwJh-JP#wd-aqG%olE5L#Q15o zkl8W^f-81F4zJ~Q@>4{OuH?3W)+wqG&j0z^9GYD*aNuJ$EeJdtq_svRyx=4k zWVyyClC$fSp2+k2io&*vZ|~_b;{h#^7qmrbXw!<~+KK)CG2Aafl$TAvCu0m5ijtW> z(~mYAL|TsXV;8n|0!JDyL|2B>7wN#(uKz%g7F3^pk^KMWQzVJ=yEOZJa5!w7*J#qe`-zn<^gv-Bg; zm0(APqEH?^avnk>I+*~&GSiq?eo8-e(3|wg0iiC5J`INW_dy=_Jp-(r_e0>SLmv2u zi+vYH%{d8d+^7@vQ50|MZ*VRKT1;6g;9Ig>>~Qmv!@_#@#d=eM8S>T9169_zTpYh( z5yAN`An=wq*>x^fd>vP@+2Vx2pIFsM^!4?11h}=~+s(Z91j_%irf_p268B!){;B#G zq(aEb=}~87PC%U;EL@cAS?SMzjH73|4^y?}s|oYJ)?1Hrym-*RHFvvE{^mO*gx>D- zK%OTy%BIDFWGo;DvQ+;dMB8esc$9EC1QOxI$jrYc*hcqHd(OBEj~uVRcE{ZWGpxH< zBmj*8!WGCBysQP}kZOGdK=LRlT)wKTEm{P5qr~5O?|#YD7=j5Y<5I=kGEn?}CUTZQ zyGRadE7J%cI8n9)Bq5#T`i$#Wc3V2QHzHdOQh>37ELQKV*6JU6rtzAr6ljUnbM}6Aqn96Btuyrv0^f+7BSGlU_yjJSLPO zB1X7G3@-uQJ3rLBqwxH$jeS4P^?j=m7A2kdR(zkUn@rE*0X(Y-sm(~qF3>v8*E&drx#;nQQ_)y+#LJ5WkW&#RR0Tb%8QjY9z@{uWTXgD$E@eNT%I0^=F ze2n25q772xDrgWI zuoZ#Cdss zylQ*BzCuK9&ss^mb$7{BN}Tji#R}X!Paktwr*7vEh7dJ)JTz|hJX+N7da(g&3v#G_ zfd639s)Fu7jc&_;?1be89q zCy0#>Nt@NPYP2+mD?zIxvDYrOZh4-*sXTHq{Ile5vwif7>pLF zs1-gLSF2ha6~_t*<~@lc^SboNSw2S}V^9TA7h;}nT2A*jlWGg-FqOH}J2a6NkIXX~ zR>Q}zZvWnNQeHeKmL*wc5)Zv;pEsHO3F0usX9Xii-QhXsD4S za5A#F9-!-TsE}fVqFmC2&8E9N08(Kcd>J7E#|s@}!;?QLEUm&?;>C(B+p6oH@RGcl z%7i&sM&U5B?;gh7@S!NtX7IX){^!@Hxtqg@n&^_H=+7iY!mS2#4)4F0D8Xh*duov# z@RKu}3R@bsT>MZmRwpX0ykx-RUT zo7Y|cS*CooB}kc$V%<4E-SclRteAb3w$_!>f@0Jy0F%=tqn$cig_ARv=cdW4NlZX^U zjdL$ylae;MKA*|;m^=(u>$vQBOkxW_3D6M_8&1}#g|aU;z8RGI&_Tw6I$#XLpw@%c zu>2u5y6LpY;`d|u=58i0o9B^}gn2n(vL~z_{kcAb2Qlu@F_opmH-VzS%Idorx$J3u z$db3Aj5e{UXzMGO(@_aW^w0J02_t^B+=x;xy4dR+$R9;dE@+iX z4myrgHvB}-aEDw>mMj`!F&Z2bHAJ0rtx9y{(>iMu6_+ev8WzKs#D%U-=Gz9VakLk+ zPabB5GaD_dEC{GFx{(;kOCg{Fpbx##wXj5fe}0;1htTL+h(n6izdcEKK>Z)H z6oYUshk5K+yruDVzA)ln;6nL<&*8dI0pMYV`%ES`vhGH#|6VW5xV_Md&_-Lf3`C(E zebV(mU(^0}o^Ju$E<*9T-9~mkwsvlY7=7!%8Gi?UdTf82=9kulusHn~eTgeLY!tf9?)@S=45rI35{;uP^gMfTLZk*FB!q!AOE0m~|D=ebHmdA!v^q zU3M6&vLN58YPL@K<6QQOZr2DK@Q`?KiE1pRJya&i4@kH0<=B8UCAEOp4LJ#LLazJ zh0`%(uUm>90yhcYi9a z-QQU8iE{sS@Fz}R2U0GEsQ^+7Z;Xv|k9|2ox_H0Kvm;fbMpNfI)b7z)-FrtaDH zn|0xBg>ca}2<8vPvl%|_d7q5SjnGvMjvr7p9}nQDvemKNV`ElH01em(v7 zi8;l$C*a=~dwneZ&llZJ! z8>c|8t>hLR9@MR;jKrWQ4G#+g*yG2IVjS4AF^KMua1Iad^l)V>{F;r3G)nM6pcorNTiLm{TDDoAq}q8wTGu+0bVo|4|LrM_ARX*Z6T@XB z0T6fE?oZERF(!qad&JH};Y|3a=tfjrR%Ml^H-rfiWG`l7G}JG2nzx>T`?KSx=F@#U zH|aj;Nvh|z_jWlTg*c%iZe?#=Ea$s4p;R7w*hX%D>V3ZQ+5KC~(Iag4qQE~J?uTY* zMXD$#v=}Y0Vs&R{C(ppOSAor3mlZ97kiZw!Z0U}YIY~RYIxSHJ80e&3`A!YA#gDiN z8iQFX!(j!Xpoubc*FN_r!kR0fi@Q#eVxz&vm9%>njP6#jNDS5Zc>+3?{OiRuqWfFN zW1^s_806UszIV$o3|ei$TKiz*)M;FQR^c=TZ>4AeNeI(%(P|gg0)xZZZ(J5f8t)q0 zF9k`zZ?nW54;r3lRkV+UB@HB8|55nm>&;f`a_e`pcPs+3Hz`v(50yJ41z^I`_%@?wir7619QzL zu5_PCnS`WZ@XO04OxzuZe)4;M{B_?C`Q_~T7%yEKJy9T*RahM!9jTaKVEQcvT*)MLS`qMrFr&)8>PfNvo-oAYceyy*gIwjX8(BVGprCN_!D+iii&dl`LK(XY~WU zmGZ!Zd>94-saX?n@r!9gC2-H?+11Wg>R@!psSo!pBTC6}Qigw_L62l`rWc49*U>9u zZ|r@4!1){*QIp`(U^Wmw+0wCp`B0^KbTY(-<%7bq(oBkgo6Ytq$pm3i*g%#$%IL$Q z0j%D-ID6iXp369C$b862+ige@(?8sxn6jX!*x==(VN!2>p9@KtY7h^x$KBo^X8g3D z+cTLy1pZ$NYEBDWb941FoSc947QW9Cru06c6Ec+&hU6>;!nlO+AVq|nmhwMPe_Ip) z?T=@G`yabSo=W|Jw;6$4{cWG8 zohkO$;g#BhTiV(@m;J$x7TdL3A(U|X4h_dIm3Pk@k}R)52MEIup|9UfZG5z5)$Fkc z%CXW%JISasu+8be;Hed*DdsDLxmxG@Rw(cjqD(EIPY9V*U{P;FdYwSrrp#-bl3{ETN&<(A_aJVEPeX*~ zpov7h+ZuU}%QKS|1A(m|NX2y!cGTf=uE^`KFzQ2iQ6ZCS*jOo+rrDFx zrezU{`1w!|)VK&?0_EIFGiMPpC6gwQ=xbB}0dspk=!yfKZy&Q495~bx?s$NLiVxpF zaRZLIW+PD}CwVu~EUzm9R_B3<@AVsWxHNyP@kI?nhzeE3GAh(v>Er!hNx>k>y4v+c z@jS3|31Yw-YFdsn)6=I1u z&tBW;+~pmX3R5cD`2V>8H_yg#?{c*Zhw6HLlWUFGJG@s>!sp1{uVAttG+&>wGlIfsglwvS0UL_${&?J|Z8i9OAF@JFR4~D_;y$~6S@dub)gq0M zB~B`+I50pLFbu5BhlI$B?iQNElKipT#x6^wGIC#!?mogR*M`regLHzAYox6&aPHc4 zr|iXZ$p?<`c)V8Mh3H4Dph}Z*oQO7$Bbk{HH;)-LXdgG?VY zPzb63Qvk@bxYyu4)gpkmXlLlB3MUPf;V1fe3UMTtJ>0YH!zpCo{6+zmEP@hjqKs4X zc@kzHe}62~s$9^-+&V2P*=EoG))Gd%La{#kS$6g zS2IYyIAL4}^$+P_AQ=R1R~Ptj9O#PB)E@&jCJrFmpLjs9#hXw$#KzCy`Gl*>OYX%Q>A56}I~XFkJCH{G-^0ob?R+Lg&<7|st;Ti0;w&W_IaYi$+48tc&S zI|&-cApEke`drjNPx7-1=FZ|zPj|Cm-h!_ke9$3R`hh=U$|>t|G#+;tqIE3&Yu3Yx zSK<_07mKA%9i3Cxx_zET*GCm45*uL<@<)MMWisO1sfo5UCI$QU+A0 zL^A7+k^cfvGPDP?8K#$YACIkANy+y~Wm2Y?CL;4bW(UP;vSD z-_1F1KZwCX(Qwl(zQT&m;)fxt+PaJ;yo%+Jqcn0a~J=SkYxRSD6E-|fT}L$=dkFdoEIPT|s!^=Qb}FsG%J(-$lt zjE0dSL(vZyEDrO`+O@3PzJolhdqv{*QgKpGLEGJup2qjfIN2;(8D>OC+}+niS{NTm6(@-*=|ofn1kBj1ST3S*35m=I zL~Eij;NlYw=h3C>>@~Jtg)uGGzJ3Psux&TY+Rr@i{3+-{8FqFV8EqB8g4xJ?fa>WL zT5J8p6Hm;!_S$RDxccg=@88z}*tg!Y_0f-B#E*V-J6-)f&ZydkPZfrTKBl#8kWCne ze)n;RhI(}9TMcxHQX!&!Ac@B7Hg3`5n#buiudJ!SaRJ#_Cu$bXq3&(-(2k~S#mlH= z8xnN0mHQa6zjR`SDx|RUGa)6?aSL*!Zq_gTn8teLOBu@ zhJ>Xughn_tEc@snLYI8PvX2TvD3uI&DD+La7e)s4QyEZ8K=$?a@Z=MZX+SqNHnMQx z!iS!J{`t$NO`GOlbImnd&OP_s0>Ejfzl#T!{NXLTe))X<)={I!oZH{qbF|hP+WWcn zj^A?FoH=~xn3KtuhtVRoNR4dZ7bp=KaUDCu)s8v%ln{xGzekE7DubIb0o66tut;?N zLsR)0#xYl+m4hZi;t?>+j?NAqTd|b1=T)4F_naf_#p>8ml7I-U;F2>>(Thi;8 zf9U>9ZEi(t$1*GIEIe^Ud@Va-#CzOx>>x(|Z2b2y3<;u;Ao6h?hm`9wu5mPH9`-iQ zIr2~>S>Ao{k#r4q@RhrNO?%G(n>st$*}jvK3eBiUXta=|96=BSoOI}7TqH$DSoL0k zBR%{uPgCO<#??2_GdPG;f{>6|lP2@I_nprHvt}|}$kUijlTNt=zDtC0>}zct&DTHv zk1UuvgQ4LfgZW{kbggu-rRXKqzu`Y9Wx;@vOlYSjO{m6fXi~0$DN5;BjEf-eha56< zG6&9@$P1fxqC7@eI4cp)og{4B1>;8}YjXypamXxq%7>o*B+*a@&w^)G!B9aU&{to5 z^?ipOc38vGrAr5oKmJ4>fBeyX3BbPfzqd{};RJs4quaUZrtcg$sdc}L!!W!gsjz2H zg;S4!x*BxZCy|zs65T(5?&?iWmX6NdqPl}C$25|fGmV=0Ge|eq;rJn)Yqt=sSO&FJ!5gh@OV!@= zUhEnMgm!MN(73jO)d2)ynaKB{93X}Z=-~q73uc~|FF>Ib3$+Lk^!NAcKmYm9rvRsP zc6Rdl&wu_mzze6o!1haGhDpB{Va=(1nblna7Q?R@In zKW5s52^=|N0mJ2jIozdV&2a$j*oxhJEtEjx+90fq{y!cOc_aR#6jHlHluhM?G%kBu z;D}fo-ZcT0k4-q4Ft5Wg<~PIuMnLys+g}#xyoC zYrLh`=?Z>8By)B{{W3DRj$tr3A$LCV06oJ)jLkNh13lR?as9sMK*;<(R3WvwESJ9P zB+fqmD8eW-z6M%W=IdZm4M*_G_HGK1GN7+Gm5Tw`8q-f4!h?MlSwga@+2N! zx{_>-=AB0!#)W5|&V;cos4$D5NKH)*X_=-UAMJ-s7(1G;UGiZLn{^0X`3_u1(?2w1 zmP z>0<7MSfX0T*F6m3rLCwV=h~@^1B>UvGi#uG5L95Sg%{3(WiNvt2!UYh)@>UvxZod; z`Pt9zT(_?Suy6gZt(h}t^4MdKan3pCTzta~*MGgQudgX-*&q2f)X@t~+t3ft(zLCF zP-sWMrmf)n6#vuDpfS8IL3TX_wyz3QtR ze8?d@{KtoXTVLO}uk~MQtW$Gy!bV5hon_wf%Uo=x|3keB)yu=CC5Ch^hek^aBJq3YbV@Ty#?f?J! zMC>)%39mWy4Ju!2MI-^oMM@6`NhB0uxrlbs43|qZWHKDTZ~=$TX+{bM6=W!tL)PtD zPri_6bgqU{6dGWsv>uX8;Dot%| z4cohVXlZQZYnOhM17|P7S1u`$K~X?OmZc&DD$)tkKhknU@Hgj%040-AM54zajT7X% zjyllnCg~z{n2e?Z<#NK?=5qUkPqSmFU_gMnYA?p@Pgg+K0BmSS%$WjygmzuTA#>pA zwdkR|VT{z*!OThU$`&+Q_w@9P`{M)m9|Y`60QRl_`E|`TS98rZ*RpZrM&{0)d+ei+ zKKg^czCIHkT}N=jp{Trh8(-^X2N1#}9bKE8ha`nUXgE?>3`fWg83)u+DW^lcCRami#rv!h$Q{P1&pdcsfm$v=OL zl+0O5mqG|90gP#BxaW@J@#5weQ3~cwnn-Q779DvwB1JhIBAu=ULLBLu>RO}`LJ)-k zX*UfLTs%r)*{ZWj99)EwM5>JIq-<9}B%f~(6&VhP!SNA93>J$lUA~SdmaSm&tR#WfBW})2$do$JrfkPu8bYnlcry3 z{|ccg`aXm{p#oniTLo4+2SNyxRVIuSY}(y}bX`hJj@ zVq60UO`VFbr7u5g7QAV4S=2M0$Bf+*s+gAZWw{CPAs)Z)rovQC2$l?uxU zBxwiIuE(g_9N+%JWgIYN0YR9;5upL%Ti=FI8BB%JW*#4bks;Pq62aQGoAk&JPHKrL zmH5CJ$8yGD3sK4>r`nNb?-~X(GsZS>=)CFt`_n7Yj#II|#$Y-UY@z4C=AG!KQ83E* zHR#$J#DUXc=~_flqg4n~TcM{PvAaivVW9g42JXsab5E9v!#gg&^2>bV>(}o~0QRl_ z{yO{Yv$^J)Yt03f@~F19wkPuWyaJ@INyBl6!y)saSTHSO3vJaRFkcIS*xZKhFm7cc zl}1l%#aX-vr?nY;AL&PgKuSAk72;*nw7&Cb+)UaAe1$59NIx{sZB@LglJErBWG43t zw6s#6CP4^=sZ5nJlAkiBK&dKu&crN48*vqZIhiVIq;$ao&Ftl!1QZ}~u(LRM|r$x(|I5c-i30kRc)?6aVR z##7)25nFb36S{u}m7>L>O8#T&sp>_VeBakc1E; zKcl@g3tmrKK_JZ>-*#6t7|njAfs_H2N)L&|m)h{|6}WE36a;7j;S)wa3Xilf_ov|^ zxaKU84njC6B0MQb*JY5T$hi$@p+HCi9h#QC5X_jkAD=nzTn?VLkb*CP&?r-i*x6B| zkw#a^=2d~x1VCVv|LuLQ?MN@a$wLEaDGc$R6OZA>i_ZqFDV53wx1!B{7TVBAJKZyNjoeslLP z0R~1j)E?+KVtEwl1`#Rr#_imA%g@MVGhBV{xfBCIsFm>su;*1Mz*B++txYs++QG7y zx3cWPXOQEYn7CgHGbW8^!lY5m7(brL&0}dEGm7ShQH-vsA>}B_ei_F}k&+tWgp`8; z0%h>@rE-D(zCrSZVY>SI*xB2|j?Nz1cXzV8tCw9py%b7CqDYbU9BQ*!V;@h5QsCea zq1n~fOIKeXxpafo5~w)s3cDAAs6<4b7dCC+wg>Ju|W zDJM-B*x{CCbi@=utw;6^gq?v)8$7`#z&bX|71b$Fk_^ORO<-`0F%RA>C!v07B(6<` zq!oNp(k9W$j(L<(@e@MCk^vwEk8G(_mDV_9$fZWv5tXUPwF=MzTu1V;v(9AP zsEHK)%C#`p!AT?+6q-mwqy)ZD_y{}yk8`Dp1h9y^NVe-pI>TejUgWZW_4)YOCoylz zc!r8)oCFJO*e8V`nLlk3FK*a^PNymdmu11kMouuXwO{u3x4)gIo_cCu0_q&^QWF@C^tIklHoKZyA{k*Z1MMHPF}yryK<>qd+)_ zP+?enA`yIX;{(LXxk?0q1ED>55TH{SI+9hDi^l;@!l074kpZL0$exu-B_=XTs02`^ zVhdbMg%V+nRYq{5tzw!@%vH>n)*4AyOIvQKi$tvCNouW>_tEqw#|P3ep?C5oaxjnI^R!Ky7>_uaejL(Mhs zdmmvSQErG6nmMvjVH1pPX<=OJ7zWmCf#Cvb`!2R+*R!pm78>htM%9t7%TZIC#m#0& z=d#o{)Z)21ht?_5AijUxqV&qJmKiKbng zBnk{oP{ZKRAlr6#FuAprAPR7$L!`A~HE5020YVhmxMK^S`O)_nE|kc+E<)QtB8+OB zHG#F}FeHj@@eYZT3MnK#y#oY6XlRPcLdp>d-cD!`(xI<^fc|_DGL?$F(nfl-3_uv> zi3Wne0$5**O_(uZJSmx_EXpV(j*io3m9QI77No0{i9<Aj;R0C3Yh81CX z`$~t{BZ<122DGYbwO5UQ92`c~H&9ZFjFR|hLMzZ0CB7K(?B8O1UXu(MiRgQue4eLQ zujjVUeT1VI&1PVD*t||5kV2!BCR3B)($kLM(w8?vy3$$^$=-?#m{tOg18cWIT^2pD z3CbZlh#=Mocx5X(j9^S1Oy3VSwE^gzJ9dBU^wUqvFIn=y7x#4l_O1W)I{w(>c>KvH zxc$x_ic3Fosr&46%eM~>_EkFVQ^zCDJ`pl$2$X60+4-fCkv;Sz+L5re6J||D&X|Y_ zLv!PV_MoPc*xpc@4fjOP#Q;p6KT9KA{A(3#u9{hzCuRk z_c|8HqlG>A;`&BY5$LE={*v*GQ$Z*NXb)rr+uC5oS||)xPP=4eU=C~F_w{{C?q77@ ze)so!p2v(Cv-0nH=b7*P=8f0?>Gac2cb6<#k`TF1JMB~+c;Lae?0OFj8dIinDeAxM zvQK>d)?0765t@y>qoz&WlRnKbkZ3VLXS{HiIlGpP}f+;*w)c(T(iX-{-H+a z3oulG_D&RnLdu~~lR;!_(3!NEb9z>7CFbWTh0{C=-8_aYf*Q*S_oT*g92}u>gppHXgGeAuyi(`{e z5sUr^VI2Nq@Tzt!p&)S?GWb0NLJEe;W&AL(bib%d!q`^07*U$8p#p=&64cfu07nuB z!#5nho5x3{-L3bk2d}}EG}VtX39B;kMClSzq!Bj2Il_SJbev{eilPw0KnyGuQ`&?_ zXb_HJam2FDS_?~yHwuV4mU0$?P=*L?J9W|k=qjB9Y!YtMD`7;HlImqw4TOg-i(otq3#(R(aAi zW-9wM!9Cdhs+F#^?lT#7^$l^(wcqDIuKOeh&YVo4RJIwF!O-Lj0jD24iwP5(*|EC^ z(w_Z!X%7uMVu*1nGJ+R2AZoKvpF^t<5dyO(!9W4Mqtjfo$*s^i0E2@f3>8b3{Bio< zLoC_n1@M32di=>JIPbmZH2wR%|9-jB${!r;GbM}^hy^p?L#Ls$HMRw*QAA0UGyzi~ zw1Wsk#N-y3J=tWcaaNm=sH`MxNKVJ z6YI?jN#scUl*4dsn!ZtKdd6kg*;32)iFNFpP)qOV3j)RH=TBM8)nTjl% zzjAmhOWx7K@Vx~QboIi{ZfF^em^|L_xtkiHp%!W~kaDTw3jq)W0c+R3T>H%%uYV$& ztx-KaJw9;YK?fdq!fm&GHxmc{OE10nExqm+UwkRI-g?VbXPkEWGwD>yNZsTMl$UPc z3pf6VA3pK`DH-BP1EzB@HnI)1^|Vf&6lY%*vy>zhS(;jZ9=)p*UTuR7TjAwbO@*^= z8?4<5>$elF-h`_R88gtvPe8}a4rK$kaBOlYsyef=7NKJ)cebT0Bx|<5iXSS%sAPnC zv;>4Tr7H=K=VUCFLsj`xD3qxD9!I)15g3VI z5W*qUArqU&kj>^OL;=1Q_?7`gtTmzZNWrOi)2VnIW%bj%f58}D5 zRax+ zpL>~4T>E`G2M74_d(Q!tLPg5bpHj@2KOHyi5taiy&*9i(P9TaRHf-2H`(G=wEP#9& z)te`5s>iX1tU;|;ss7o~ja3z}dm?6Y*y*q`V;9d$vAJz0-Tgh(w={qjXjMizd7gY> zDgXAH-_YLKMPu3|v__yvCYtgU#!96!*S1Aus&-*<0F@F`Ntx*D$3teVRbnz@C7hg<>v6^bJt5PwdY6m==9s;z|y{78gWL;?gpUMj*5d_on_ zUntU7D46kut>~3)(`Peja_KbLOokfIC6W?HxVQ=&>7leq41&lqfP|BbO$>e}R#U3# zh9uxhIie#F>Cn#l6+u`c@**5uG%k_yDTjsRTu8Y&i(9Y-h)nyjtw?$3kkvZuNPQDkQnF1Q{H48e0N^oOfvt4x5X3 za+RS6jvoWNyHUG(gbIB6d;6|=`w>T8d&oftvuwrkeF?z6_4?}_r<}q!Z@ivg{o?NS zt2hm=NyAyk!?cN@LL;ZDut;1xdyQ!<(lM=nM& zV;vi5+=7oc9FWTU$g*iUMviII3T1$ZS{tAlfnNdgfXUiD4^kewHV5OdEyTzG0|)c4 zyBj)sAzw7-qtj&PR$m6b_z%=`*L`dL{t~ z{D618>s@@{10Nt?7-seA)qMQ2kJH|^gR{>*i!cn?wrv|qDLQv|5TWSm>>?BSpcZ^o_|4fe=V4>cOsdbyiUsdcs!m^O9QL8@$vJ3n0H`L!FEz27tuuWVwj7TU){76lf31h~ZKrRH15D2AFjwB5F*ge?AL(i|} z`SqJwyR(C#f={vR<3~XSvS>#ut}97-E}5DP_4W0%jvYhGn0h8Rk7B~8dL}e9GA@^9 zOk+KD=@c?lAY7Xi$VBxJD06k-ny>?uy5^k{nJGk^Zna@ z$R8hih%-(*ed+r?@V-MqXr*jv-ZTo%I}uvP7;zgVjqRxvwwf_>PwmBteB91dM$|&t zU@KySktmTnHDBuyg?osRPx+a4xULhqMhWiW`=Ak zrJz1TP?x5lG;Sfl?Jpn(ONouD!e;c5Riuk`!nLSK$HrRW$_VHvFh(fNIcOb+2qN^r z5PJJg*xd`oqCi6!D8isTcEiT?dc(%`+a^z(#HE-0)AXCZ{cmlnURe_?oVS4Yyyrdq z{`bHCU)vXFoNk(!}s5Re~keN1iJj}%i_EFVM@g^*Z#xV)HzKcJZ8+8 zLbf(bDPIIM%ab=PzC zRacoqZE)Bix|K#qOSOzq=sGfhOtk3`#Kyt);wG_E3y_YPJ!^Po^~?OjY42d|)|dI0 zU;K*aURg)h^KfJur7W0E#?_w0wE;_OV+uD46%*rIsS+K19U-J^ zg1@ZjaL8D{A-03odyzawqJ?1C54iB8qqzOSr|?SwcozDvb>b|UbR?BVM-dIRwd6}h zB4yh2LMwYLX%HUh03zQ2O%nsCC}BCcu3*8m35b+8;-gID(c+{fC?UP9>0WvgHt!%x zr(wZVV-OT-Xl#IkX2SF9AXkH!I~BcplK@z;@`aZ8{a*g1EBMAYuiKXZ>|5}Wk9>q5 z|ML&)!l*W=7OlYMx!is4Z~n*k z$C4#WIPJ94#Qpc*pF8oSQ&#-xPfyGbd_PU(!>Uc(@tt3>yQiP8f8;!7kDtK!(et87Gx_r6S8%|>{Sh8CHq=?i zH_(MLQK)bnBf_GTAQX`a9G1Q&laEuQWvu>SX;gToPFEnLBA3pxv8|o&{q7Ik`{?8B z?(Zj8lQzL!X;bwlxGP~`cYJ!{rnhGoZYkC4&3M7)< z{X@L8eWw9|VG~wiB$l<{&4v0@WIijUV7Qc2|8==qhK3EOGwn&58tMpiWT|D6QaFqs z4)D;68+qxO7oe>J(L0O|%6n@vRBm0z1mZm-6#R{={8>d{@6Xc3GsW0IlrDn*Q8MmS#(X>w&?;; z%Fc`{S%iq&f+H+wM+_k=|Bu03bvbArW4bN1HRj)j%SkV!x2MM|6bkPd7#RA8T+VC! z##g?+{a?O)Q}=t{`(Dn3_DU15^Y}nAo)4MvDGI0zCO`pWwk3U1l>dgT3_4abX2S3EvrY3|CyztUWp8m_z z35t6C`t|(&-rur(4la&#>^R=VkMbxTkn(Er zoXiODU-eBMsuH0JQDMaX)Al2iO|xp#cFKK2=KU&Vz|Q3|6wB1*vV7yx^EmCW1uEtJmvCPge&rN18zIxsY-Yj)Qip8bCtqWk^{aY;E%^QZPIWg|d~`t;|Q0 zJfoT}^}o7w)hI#i0VuGq%a08GrYCP6>WF0ih*ir&2m_pq+X^v?IHnJ&YW#z;{ASn4 zyABP()?J2apc1mUa2*$g>OcLo)3@Gt-+gZbIQ!glxc4{r{FmSDJ@@`*^pgKra>q}8 z_S3WC?_G4!CER}d571i6aji}1p3dHaGV>uRgh1D47<1GieDm`c@XU)Fx$~cINS^Q4 zcmJAm&pQ`@pZ@%3Ty)_@guaj7qg^ek{2LGg4wwbgC*tW4M+j0vkP_eujb}O4(tOnR zP*+G(BO0`O93wO+OT!b1n16(}(#9bg*SZ^wgqX+?BcZsJA78u3)~3p`PL!}lkZAgc z%Pd|rhhJWCDZ|CU(A-2UumklqSypatRXWuT#@rGFIBpcnS3JUu)@FiG5fRWkybDmA_1@3%;*-mg z-&0$cqiOUw(%CGI1BKxdQb>k|2N@n7W_WmbFE_{Q-GBn&n9obMjAGoe2XWr1$FZ}k zkF~pc=;|LLEc;|qX zJSH%SnbI21&5(6+q`g`MDF*%B6vF}Pyk@dqZ9;9VP7DDG{vgGu&${zDc#dG(?k=8M zy@@ARZD8Y$PKw1Mxon!F_n*o6Cmz9^{hEoC!gD2UyL))w^*>YW7e43Rc;mP9;>Ab)@%iVUJMl+%-cfbR#Jw6Jm_7+{?1AWs<4oYv!gyBLAf|Oi zu2S3CA88LVrrjr`n@C$~QC;O$1OE1Mj3ga@VG@Z^^^gmozW{zA5nxTUvejFdUMBd2 zs_G*F8wp5D^yINHt^vKfANq%ljIaeXX(16&XoncDC!eaVb6zYq3#ibC zdGxD0VOOUhjEu`1qT#;#?mNJBUHzW-o^{tfzy8gK;^+L@bzkSIE3W)cz12JK{P~hc zAAaa?fZ4NWvwr=0ZomBpagbJy;}n%rqOoz5?(gqMYpoe9i=Ic9a&b>Dt@EbC*ak%R z02)~G-~&klu>ZXIxQ;`R#8`WXX*GgdEn3E)Cyq7pua*jCY*`JMDl#X&nep0l(p2PT zZtYmz^;i!;3fH3c6-qd!dk}%vE>cD)?Ywq&9)n0@8DJ{j@XF4mwbh3=bA8JULEMmR1i4EX#n@5l9h-hKE%JXz?cx4W-uB37*k_XgWCG(bIFEG93$ zp`n3A3l~)$u8=;_XK*Ui#Euo;^H2^y-`LkP~8>u6HGGRmDgvICU>8gey!kBIyTT4V_uB#LpKM0xB+{8yGj_0B?k49*t zC6TR35k(Q@Qb;*6PJe!&nA+ORBR744Ykzbf|MC0_NCaQF3J2hhU9wSEE$ zg(D{E{xtgR^UgY=Wn9bYTeohzG@s9p z%-p3g8ECE+rnSH!b4?363T(A46BRQs^L~+Xjf7>|LpUBuKQXN^Ne=o&OQ0gNa~CBtXrXO(mS zV!;tzg&tHDbvP|dDlLUcFxt8di=bE<@oJ||o4P#;{I6_p+wl{CS#xHyVcnY>4Sn&8 zU*v`xZlJy{_vGNv@G*-QAAb0=&px;G^&WrbJI`ocyMEKkEn7A=M`2`ecaDTP(?Eo< zW-9;_#!sMqhoJ!W5A-v2>U0MCdd=IKGs%30-F*-laGD-J7N#|Wo3b62$aVmXW{~Ls zNL*oE;e<+rcBQaf^rVR&bF^b^`v{>OOgdqup=E_0S4s3lm7t8JdtvkdqSzwZb_imM zcohEudJAPf{hpKf(g)tj;80;i2frqr;_hc&;uGKb1#@RlWbsi4^7GZ}2x4|h3}~$0 z3$N1waCh{f2FvKR8_=sZ*e>5O7xfdVffVnd$`ymCt4=C~6ORw;r z<1a!5Q36sqkI!#t|pC(B;`3cR*#`;aEJ{%x>?=U!Ao1(*wHgY-$0Ra5Llf72m&K@ z>iUPt&*#uCM_3EifjjH$>?9l-j4tpt= zhAo{lKspAX8Fy?X6)_~s{{ty;l))ch4TrMX47+>!K}wn$Y8fn)>~z$4BSdz@f)@;Nl zUx4m@cyWU{D?rblJzMk?`@KWw9UMOJ;F5hEfdALlrI%jJZMXdpfKyLB_0#8`f6lo> zgZaa|J72C2wSr9Ah}ATYhL$nr?_(Pg^);418=rorYS9_b$lazqwCg0THyzKZlG*nj zRleS1&R(4eRLg`WjRKMUUTrHO(U5~sp+i6Mg4g0L%q!zcQ0fs72Lo=bn%k<#gq*rG z4UQiXYHjB6b~QCMF=N{F>A1`d)!Ky9oY~IyJ zQAN~v4z45VFO+z0?Piv)-C|t+>at938pHJQqd8#81ZGcdVZSkTMtk4)@xx&3{Gb(uY?ApP2!DFSjiQ*f07^v+IHu?%mU4K*1<1x*RW?q2lMt6|P$nA!qU z$3t&FV$NiAM-OPt`t|EM{nXQcv*f`gXT4R&=RPICw_tt!+OGj{+igGOny+4cQ6`n{ zedLixZ|LmkKD=BilVF|d>tOy=IQBrqiHF1Shrpq8P4!=&FgdSs2rZ9yb~q z>J9SObt;FXuE?N{jQFq9aEop9;(n^Es%(T9krY&90R-B$x&m=KHqj3dZ&C1%84Yse z->qQG$bYLCt?0%K%xs2_R>DL~`W1Zbimf2LaS& zp*ELvkz_0tttzfN3Zqh22n0$*%x@j$q`3o}yr7Hy8h!c#fgcKrp`;i%D9b(9S|#I# z2x;2>#y-l7Z(^=~g7LJBo}O76NefKU~A2g$tY8+uQH_$1nZUzZbk>ozg)hltY8sB<9FNV9C*l zg-611huYv&8>OU%hY|=U0_h~Q)0_X`6Z^)R~&Q(sfo1TfWBw1$aEPze=a zsz-vRLP;x&j%d&UM52f}(-9}lgT@R(mih=Xw&JxgMnr}u^n-c-&9?z-z98-$gj zI93HDlOe5cdYh$~DPu*Igf5%NSi>Dnpf$%%^7+O&Lwx>>9G4wmWOj$5sA1uhEFV7k zWiC5@3v;_hZO9I!RjSjH0ErX|EeTurVLP{6Tvz0TwHBd4kSXVKC97wpZOhuW{QdAb zHaXE+Ahcv$D_SyXT9b8F0H_pjq+&2%s~Mo9s{;@mdg!5*nf<1hs0PsrA?VvXP`*DAOT4~0voWMnwha{O2+~-WChA&M z(4gd`Sz0zSlx+@2f7)o2()h~5NX=nA?R@t9lljdR@8)|Szku_OnL%wVhNlc#*%q_o zI7FpHN<-1}xOc@m{^ke2p?_qISX59@*)Vr9WyHMIF;NH|SP9=ysm}?4&L#K4zzOxe zthFCXfN>m*wm;I8)IvqL{fSEA7j}t^w#h~`5@G$$e%8Lc16;SdojCC`7v&GDVk(wN zP7JE!Iasj?vSYUErK_aYNAifiL4;$#GsvD63(f|S&*se8XP@1B#~pX@u6Moj%>>|o z;_C6N|vHa<}~ z@UQKtRspgVyNE?$Mmuyj+Ac~d2{7!}+BFAKzRGRs{qK_%{enP2rWTHy1BXwyw?qGd zzz@v-{mH*y-`d)`Y{?m?UjVT1~nP2|$S6=mOFS_Vr zzW@F2uH3S9b4No%!?zlmTPF-!S3L7HfeIKIAEkeIsPe>!i}00ggHCM=ooe(1%UxqM zQo{v@X}+-7r?s(`K-BS@=j!?8@)j;W8s2|$of2J^sYgB$wx=Csz`2V)#K0Uxhd#LY;pNn!qA-j4UUe%2;R668uIg5z0r~A2?Mu#wxTi zmm#IpgqMA3bXQ6AMd%hTx%xv*m2PtPW`Y6tndI-q=4u60|f)EZGjX)xoTv6t80d03ZNKL_t(` z$Rt4N31FmB)m(mijG3r?P@Pm@tVC!mVmAm0Mg=yZ>uiMuhuTq(^&1y}+0)l|#ENI0 zz4fFMPG0uNV-HXGv*(_7Zg*2l^W{~q+U(x7t6}~6^_eey>6%wPU^ja+J=Y6Soy*#wrt#t3POV=*MV3J9pXu7&Omn~LW_wPMPN8)vgX~# zNR(4c!bx)f#u&?9mVD-Pmw8eh9LEYnVMxUyJh!cve_Q$p zqAtZ(FFqYFP&~1HkEM3KY792}UGDaG#tVV9-p%DhuLMCllcuwy1AxVg7ngs-iWRFE z&JN;6BIV0xC|4!=Bj1QEx}v@72uXc1VJGer8i^ugfK*{!N}V53mH-NQ^MXKW#)}2A zg(6LvTHblme7^p^v-$4FFXYnGj-jvB-qLkW$LI+U1}B;rvr$pqcA>ye_KO_VS$}&w_3!4mx3Fbzno{c@H zT(Q7oD>tKE^Xj3oBm-S42#kPa%y!E5-}?$hcy1%?=mRNmf}jM8wI)?Ee2twgwh$2r zN6MBfzxc&Z1HAwJ?|(A^_@8oI`1Xs-w>vvK&8Cf;uIcOF7ed4lB%&~XCi1A+=mm$u z5mTWtWd&@Mwq;K|0Zk3i+-Siij$7Gt-fu);=uSgMiT(3XpExPJh$OxZd>*ucR#(F$5wA)LhK}168 zo}OTnH}Qh2Zb!dTTl&?aV0CMI0yD7UsD%?Mqxl{pSHNU*HW0{?cYwW()(4=YE3&|5 zB1KA6FRX*DsXwN#`Z{#~4I!wg(z3N?NhJVds4OvYSS8{17+X*cpTzUOeS6yKrsrK+zQ12_Ksk*;ez>brq(AI^99L>WaWV2>^YL7 zCPA*~5Oozwy9gD-jVLzs)p6spcJ_?Kh)P38Q<_=b9X#^GK zL6%`Sa=R?FHbrTbFX) z+2@qC@`uN>RTz%3H!K^rwg!fXtQ55NE?t&Yp6Cj=UlpvBwek%e{w8z=w6!7j4LC(j zO)Sa>&pev*PMFK@9(jSA9$!iS@F-8Ld5QNdJO)RAALNNfW2I(2LEr%nwUHQiKfjiL zy#8+bN5{z*eY6lngdiG=kc`J@t4lF&atHIKbuzQ7h3V}rBwUGbLahoFSOBT6rgWOJ zf@DM*p5MHSzL8uA9(c9AsCw_UpjG1th(|5;*BCu>#*D8hr3O~7Ui~klqoW3;V9iz` zjK)mrD0?52O{;{k>#J`c1j_8(wQI`He)_W+z=k&yfWP9SzOkO6fgu*1vhWkjpMCmW zcl`dgc_BMr;z($&hpAmKsSVodG0ho-QkbH(<0TQZRcAC-QCrjcpb6)J@$t`Sx10Ui z)m4(XqErco35dz%VLXos{Ib+QiE?8fs;H<*>w|PD#6%FC+0Uirfa?4WZf%$Ax1#}E0bBO~=-s>fb^zl1 z^Uvk>+wb_3-iCE+*7BbBy_f5L_@m2#%h#@1`}Fo5JC6wsrXU?AqO}Q20VGtGR0gKB zgRc-nInJEpP*eiPkpvD*YgHWH6UReiVh*ln(e3e=WZBD6zHw)SNCc9uVKi6Z>_ZRd z(j_PJ)Y{GXzHf2j6VF8fD3n#VlRA6o5PLyqDg+JBifBFcfj4(ej@d%Z|S8%b+Har05k; z%10GF1_wuQh4pGIvwIGbfR(G}(tR>?+r)wem9|NMV+_Wz20RWDEe!_6@R%VUaryYU zCveWuhj7#5FL2Kbo7md7k69hfctMUtBooStX|xH5xPpBnqkQ4#x6?mVq$wStv%Zen znh4264K=X{t}F3$z^1-^JiTQHLI~1{7+uZv%<61mPEQ+C+gs>rtR*5Nc!9!Ge#q_! zlXw>%eQ^`ox3|l@|AQt0RmGDCH8QkgnLjoumG|6p=czk)^({R6?DNvASFgNw`}Xbj zuC?0)**qLNwY(=<*0RDhWT3tl`iF(@`=o2rpP7BgVRt|D=)=LA3BX_3aq-0$bJI;X zF*GnlLsR2jD_5<2OWyi^TXE6a6k=+-6;GMej%cmJxDq@c6Ny-}j+!_)ZdHa|U7ec) zt9>E%3*7p(2hFk+K$UlTsBC6r$N|a~U@U8;E`>Sxps2(dst)|sM1+!MXo*?yDyd3Y zY0o%s?092>R`GuMlL(RfqKXoswFSW)+67zsESN`@X8u(k1SRK1DsPDh6vlDjkZx$N zhqc=*J*fIn8ksGivjr24MaAaLo4)z{iWP;+mS2+rPWi=xulxZ(1;LNX&xyxvQu)$e zgwb--rcLGpAGq{uKmYl!zW7?+ieLZ7_2t{U_w;^yUw{99mXnf(jO|v`#KNfSTEQe^ z?ERD4sF6G9Ohr*fARX)Umag$Z252LQsThG9L2B@|!|XPfLpv3#dlgYf;Az7llX{px zeG-RHpUhLMH{rUn${A84a0ra91pd;c7k-91qzS4}^)CpmfVFn;gu)n&)|$E*9sKy* z#msN1C+GVJAnHh#u2|2q7dLY1v9q~w!C~}`<+*3e4pgbrBV~A zd&<5J6+k{8E>*+SNmEE?GT~TXuxQZ|T3TD#+t`PQ?#WE)X=UT?er9*J5~u)We5ACt-^M^9662;ds~PkQeCvbf z(A}D$Ig_S7nLxUhzA4MyIfc@Oyyw$DoTYbYlx+he+`Q~X_KxOB#vB&Up2n&3W-_C# z!H%H9F6^Gc0*|eI2^<~nLtz>BszAW1txyU?*>uRTZ*bTLSi1BNU%mJp?^qR!#lN*_ z)5b#p!^?ewqK}z3%VLC#viqMBFrypUKa2*mef!I&ZQimum_P3b@%+jc-jKoSn;3vU z^SJ4zoA}sAKXzGNL;c9$z`$FEhKI|cL{9EP96JYd$W%CDI`lMIGZP~rU2Et2siZ|# zWA@9m#X+L!ezzy^^IvNfY!i(#yRVc~xYBC-4-UcLC?c%LDzj}a*HmiI=L!A=4Vi3m*V#IvP3 zQb;1A0B)X0WR$2JM~DF71V~4qwIuGshmP}!M+Er*a9pOeHj|1ra=}SQQPc)MoZei~ljvw2{Ub$de#U}2RG|0qVLyru*-g#afAsggy{8q@$% zIy5vl^M^Z^a?wQ>F?;rGF1h4lMnkl}@B94bcfV(BJcnaouUAo!^nLZZuY&HLE|IKB z+N@U@9(!sP%h$bx=g9J8%QYI;NQ4v?dY)2q$kOV5=u#N^c z_V$I9aDXy_#U6y~&(n%$x9ntUM=S3;{b-Jw(L+abEy-Afm}3(FM@k$ikkTRQy40nT z%;;)i;o;Ny;NqkB-iI#WUq5&*7au>5+g7aOw5xy2Xf9x5;WJ%jM< zT2RHxcv1V%m_awy0SM3cIpXkn{u>qi-%J2r9z3$MkKNgVy;hB~2)94FmK;lnGlpbQAyC#EzUV>TR`N-@sz@eM?+d|<@or=KmNL1((iod#ZL<m1?Uf=O=;=TlbqHcc zH_Yfn^fZHTFsUS>sUFhFig`o{+$Sdr>`Z9!zmbD*s%G&;ANCDnM#su7d7?ae5KMIV zsiJ_Djdw~)d!gxyvf!XHt3la{S(N2tO_*Kls@L%sQV#qtZxGc((vs|ge6N+qvN ziPk@%%Tn%ugr+8Vfo=P*#!BYlbLqQ0O;#c4)fv2(GYmKjMCm<^gfq@_>aK!X3{&3}IdGxDa;=wO{ zmVdtNoh+U`o1%h1NrZ@?jV2P4?A$lRw{E_lw(d6Gv*>6F$|o=Z4{qIMt#^$DbxyGS zJ;*W=p>n2{hNxB~iaPWkFa-I$wW1E+LA4*QXMZSD{lvbBlHgrBc+{*OKqigWmx5xMwBHsKt+E` zR3!was!K5O3`@^bA@!}KEg*sVcm#yQx*fZTM%=QEvoHc91A0eB85|j>yQv;O2+$IA zC`@F^R6mIn4$@f6NEwi;wFM_ii3$wkd5^uLISy@a;Rhc)hh<;;J1#kK9zVS00iNHu z0}+c_{|WskV5`i;Zv-Nw{o3=cP1Vl($VWf=R)DX6{p)t#E*%kQwKx`w{UQ=^Y=dni zi+*}743B{0qLqS79i&rb$$&3h`MKx8T7tis0Q@%`Z-3jx6!KXT$=bI(`|OI_R;^rh zY#7NTDU0N0&ScEYF3hw}NT)D~gyrz3Q<#Wr(elO$Z-^=&nlNG_r~EHa(h4Chm2Y?q z21l%+g)C8dszhx{igu#f4mVT)EQG$}xjgvA@rOep)=y}VRE&FzTedbpHU%dJ%0195EQXCr168J?v^PYE-o-w67sT~;^dCPbH z`P;QiPCxCBp3&PbyqMK%HkhN1ocr7LYu6ox5XK_UKPnJU=U0JA1xj+hZjL|4G5x^Evp_`{<%(TZ1uA#c3##$UZ&SM!g4bREW+ zM15U-SNQ^sxbzkBXl-=?gjV5rN=y_JoxlbV;a(E5M2rqO_%^v0LLZPtI|SwSfe{8} z46$g0#<9eas}lz1s5eo(*|#jb%d_Kl7+qqUhp2VtktCe%V0wAA4k%~Ux(gILBDng&nt$ZGUuYK)nulw%y zCJ6A49J6Q7=65&W#F=ND*?-Ty_cZ3qp-~7r8ZDYLRRh!8p)O?=)Y7$>SS&>IPi*aL z#fZ8D%xlZ~yPBA?OomflQ?G?N1S`qT!ir4o0&U>F!i6;?hE%V0Wsub+bYs zVo{_~%xrIAc0-1#4Rv&<;v}PS8j^8pgrvrGNQ95e8O2DUh|w;id5^t?JiErn*gQ1G z+I>Up7#$;<4(QnP&z$Mcr% z8*JSz00xJK4DjCeu1W8kJ$Lrv z`|n!%P&5)Hhoy!E3UXeNv*sPi`R{)l*I)59P*xuJxD$@w@xXoezv@Z<-Df|;_rLoC z-v8dqzH{TvzkRy|V~i1|vk}>lLATXgfNEeS(84e-$Or}pv?3k%m|o*E?nBJA&S-%f z#Ss<+Xf$Z0F&YBp;Zr1Te0B{<2%sh=hzf~g48Czm*EH~nb5G{)|MdofXp9QDRPQIW z6DEt*_*0|EBqO#O#~`$|jztSZXbzM2vc#h}-i zliEboR&+Xo5kb|px8Hh0lnt?BMMGUyqoqJ7fv<{?%};pQCRJnI;OaA0g4k%pBrvfE zY}k$jv^L!J%nI zU>t1>t9S0k^E_sCHB;~{FjN?W2yLY8gwB*D%Qe=Dx@=KiRwf0sLgJuAs0`=@_}bt^ zB8Z%CN1w*AUy=J=a~!z&l&Q{+1p!7P7U*3>6bc1)Y}tN*h(n=Z@f~~i^!@!YM;|}w zx#ypLyHW~SD4-hv$kD5J}m0HZ@kFB8~}Kq(ZOfn1Sw`-WKAH^`$q zwzF|yl<}O$nDVTrb|jpgNJx#D~ zC#0gVWiPDSU?o8tY7v=K=o02)B2|h>x-#xC+Ttg~Vbd`Ub+G;=7|#oU-kmR-p@F>* zPM$pZl)-_4^5x=bB zq&8AR*2M9HDB3Xy-%f6g5g0tQal$riK-3f%DEK_PJq>7LP83`x1cz#To#33K=kndw z2k9LewtnhH+ls16lf7(7T}>(VVN!EFfwDUBGGurgX{BLvY7}EUhH?Sly6qvdxja|B z`wZIaGi37xc8z7Zb>j|jWLP=680lAJmy8Mn4wW%hs3IghLu$MjKGcr&bf95;yb?fS z5jb|XO|13~pf|jPkS=EK4CItf^tL_dq6hgR(v#>2h`3v>GxrYky>9#2s#UARk|m4V z$H&6g7f({#)ymmN&Z4`qp6l0a;}`!7xdHsx76`(cP|e|F9Kf|@w`!_6JgW#y%3AjR+~a8n>aZ_ zqP0fKa8yCXtDq#wpp8PB@Ownq&2TDUW+MoMCKHQr%+xOKUA_w9QEMk2vZTx_77hZ<7T+U{ID>exH0J=LN zlSUNw;dwrrU*6V!-$VDir=NOS@MZ$=1|Rc}I+EvCJjY2VpLFSyPdxSQ&6_t@Qos5% zV&)`FTO+h(psNLHQ?_O2I95cXzRhw=_#V5mI9OAOxv7G$m^|yrqG;Z7m$x+Q`iMG+mht z4e=;ne*76k5OD1&M`L6JAsf-cwXvegC`Vv0jv<2B4=ZC?+S(Y90aAH1)_5$MRLiN8 zy7X0-Cdvng zKg*;bok9$a!mP=NbQ(6ijM=<1YzaD$h(julsHwr!ro!7%jO&KU9@gTyt;rfaZQhC4 zwHKq5DCF~c+qP|wQpHLpUtq`B2#1>j-RTy-{gp59q4VBn!JDABZri#J5Dg7=3=UQ( zWbc0WCH(WZzRS12^X*w*`NwPj-{{!rbiimK1v9#A#WAb1s{2zdhGO5(X|Z9>YuHS4 zR5Pkt88M+xkT5m`gu+mSI4Wg|XyxO&Me@ZwKYlb$agT&O001BWNkl3IU;FCQ0%vz3^H-+~uoXc ztQ(;taFq=&1+M@jRmMu)t&mB=OS|C3mk`RgzrMH6GKCs5u)81fMYQ%oyO?OD8#ekn zQUO2qv5(efGMVf8`}f%&bYz$@V+!3(bu_1j8L5huI84w7!x%c!_3RrPW8Zj=j!ZLoFH3+xctuvf zw3DeV^`ujARFzYp6ccp{su>6}G%?d66#dfLY7>+w$y%bMO~xHp(weC$8=skKiS-Gx z;Ro9+Dq=w8{XP1ph1BO?c!rZtJXzfLz`aW@zWCy=KJ?(jA0HUp*8mt+Z4vkiI-4+i z_kn?~uI~5#>kqH{6>#613BVh8G&VPh=T|&ujyQ7u#uZPmn5MNV4X1^e+KK6D!!*>w zj8155wCa71GhsGns)LYtZBfWb5P=5+L(FWbC!KJ4abT2U;FqxiCK9z(MZ~pjN;jn3 zg-B9DNBLMaU!ug%$xi@QIir%{30E zPL8v1N;_jkkDa4=zWwA19@??nGATr8@r45-n5Z34YCrx(fRy3ia~;IwX3XfA#RGIS zLR|u}@+Hi`kR6@)Ss2Y?#DJ}4BM!!OEDf}-7Sc5q2at#$QYp;5S(wfy#EY9T<9S&z zeFzV)$fiAeV6I}!ALG(R3%U72?_%i>e+eLW?AU3Vn(Dv1Z{N^o-}~P8asBoG!GhzD z<2S##kxzg6lV862s;e(67K%NkZO+V|4Bc(WDedTZ1fg}6RD!8c0Ug7`BU9N@XyoFC zRV=6*Kx!x`gDVu$L=b_4kParKdiusE>E_upTI5F$#8}-Mv#OYWsHP~bT&odwjvkRU zoU>pq|M}1}3@I<1l!^WER+U2=2z**v>gZ{0zzYzf1Gq&aMRkY{OI;a zAra*tE;7`_xRnK&31lU>dxpO6nLtn9CkSygex&aSwuXF@k@$d0vR$uG*HZr zTP=-JHs0QX7|X+!ofzeZkTC;U4`~D{75dHxL0O~2L}Ov1p~)8tugfKS;oC0Y)|-Dn zDrKpJ7s6?8;nexFXsL~p_W~MfqP%U^G#=m4%Qv5Sj-%RIIe&ULX(!HzR|pN9j8$&b zww10+P}cCww6NF!9Ri4@z@qD=_17q)eL`=Cns@})aoE;Bz@)|=26N-M61ESHvg+kt zPCa}U^|f)bXmwl}>=#s^y$@<8m&p(`a3>VCt$6&s|=7CtD1t0MG zU;`o0m~;)IDGhrDZSs~#VUC>*FRX{&eHDC#vFr$x)ekV^dDyeBvVqmrVj5}@^=V9f z22MN@)^C9wd&--WFklKE8~X;V^1YGxLBN+U|2R+G`xrwTw%TEmkstolr#|z*4}bWB zJ2UllEPrYlCoeqZ$3OYWPd`?))H56W=S_jm4rEUox*;8c8bi@0Z6wZw@D0Kd zNL89VNsgR0otZstEZ^`_NU1Va60;MpFk`Hp>ij8PwACdU%|lHjq^D|#8iSEVR_+_( zZ*IC9M#i{!;R24F(vI&JiMVl=?doIO-T`nUVeY7GS51rZ=)-R1vLgDkaW|&1)&};# zG8{@Md0!axz*uEefgS6akx>}SQ&NerNtLxgwt65Hu$&>(o{+*OzOU19>&?ICob%2e zzw-}E?G@ZyPpZ9@bB>;cQo`!x>i}sSPMg}viJh(d`^xov_>RXoeOd?SOzokeCV|$5 zLSQujm9$BsV?vJxX$^vu(zp%;%63eo)L|Pw6j>@ya14$#_`XN~NFJ?yg1{qLZ(=?6_q5S-SD>cjxe?Z0JumZuI-!d9L@6M=hyMjj-3#R zgxw5X5m+;ZSFYl!gxd(|(8eI5<Cbu` zM~o>}}JPteLP_Di9THbldCCC5% z)?2S1=--zXr3)*Q6k_%aOj8EY)_|GbWkG(fW7W~r{#xNx!T&V@(LzBSU%}WIGn(p| z-#!W9)XM?*Z$?4AxTojZ%uCU;O5cNzB$o)WljigYxEj3mlK1*3~R_0m>u-@2Xa&p#C@ zBP3&ub_S>gM%o$g!P;XJsY4YmajBatWN11Pn(9~tvLGHw(l@?`&))wmx2#x4B2~jj zjys$y7R+I9F3&fYy~rb5wlm@dA;V5q^w<%987+m085?Fw2MlDbkcaT?ym;O$`#qCZTYx*4ELwQ%9e3S*%9Bq#^)VIr7UJZ%!p!V~u1;ug zLU%XX>n`jN8Bw8umM6W!V1iKjPH0vPPhrJaH#6gd996rQj<`q0Rk#Mm#>d&USM$V6 zF}CcC*bY^s2r3FvS!F?`FcD$tamL!eXklosZQ|_X4(Hi5TTszZ=s@cOakAw~RB*vb zN0BcER(i@fD4}q1@yWAme26bS@FaR?KlSM}?^$#>fe97rjOLaNTPX+`23}p|Wl`GT zO{EJV9Zar(EELgW4zy`XVnIgOPJkC^%-H_={Q=T96^dI&E5>z^oy};WE8_yksp!H7 zL0J;~pj!N|@wnuYOStjI8@cbE`;uiz%%%*-A31}=I$IdY7Q$LyAVh%YNnGjhh2!S2 zZFrR5ZFq@K-TNeyG8yKyW|&={raqY@6>*5W4vqxZSXEPrK}GDiBpR^+-_tHq`(bxL zlqYN27;57&V$mr5BV!n>1E6bM9$&K^q-NgKPJC5D`|pp-o#<5{jaB8;vP90YfKVe1 zIX~c~@o|=K-@`qdw)5!j-K3<%_53PvwXmn5UuA52P$aTVJWZ_90cdY)JL8LAxbl0z z&>#DJx?0+C93hl4nVOoKtw84q$DeTN{SVy#+Y?SWK|J~7lLmNQga4Ze0MOLZEY_}H zXAYk;_g^1=_~B2KDkKAfu2z`djj2z;^e#+K8zL6B!A7faJ}AmrK2BKa1^F*e z&BjSpFZz|%ztYw@ue~0&@4+|@!YHfPfB1~5Bp}3GB@$vSMy_Y?sLv*E+mUpfde|PC6+IXx zM0nc?$MXH(-px=h7h0@RRc%!9a!qD7lc)<35{_L z#bObL$0uGV!{eCR+7K`iUCmoLwk2<8Jixx6e!-Ux_^|U8zP$e-bQRxgyX>D-} zL4X(JafM-|P~iU68)o^2Dpcp8243DvT-!LnC_wa1r z0DajawF0Kp*YbrEj^>N+v(w*p(Ob{HHVHc0pdk%&ry`mgtg5Zn6_Y+kSk$Kj427Kf-GeqUm_Oa>Jik)#H&rw@ z8ER^eje{3Z6OC}$5l0de4n=IRb*dVmDx6ORHXX1Pxs#wJnWipg+h{Lr-$ObU<~@Ua|Gg)YjMou$lc52S zMi>Vnby+Q~S}wFC{4r4+#8{z`((2a$%2I-aAQjQvxOzF4-}MB0_6>06;WPODnWrx_|lWlGB8?%gh417N((zxJ_(kNFN2^sx_-7_4W0a_mCxv7G3}Q+i&|pB9XWY#SV)Gu?qP z0?#OV>KnQ0n$PjU=PrY>oG2Cx2Dp6V#*JkppJ{1;LnmAC;$mua0?GSZqkkUm8t7V__M$kfl(j+1d4{qDR*B@ODu44gjndE_96{YLl ztHE@)Vzh@5QG}6YIp{*5nbpzF;`xVh^ZidDQf`=RyI}>WO5*D{I^Z2=9!Eneg*Fax zH%W~!i8dU;0 zoJSWt#8?h9t;e?aMcDR6Q7jfp^u0=j*gJsfY_lwY(Q(A!2L6}pA zmd*%#6%cqnj<8sQ+E|QxUfjS?{}9I>GKJQe4xU7E{afLa0He`~B);c(1CMI2DXM#GsGNfZccAk&ewhOa$H_mV#mCZv# zE#}Ol?HpdI11rvI8QxM=YFtDwT^BL6ww7@fArVOuag#)a6H@dl++7>ILu_w2>s`BN2j6(~89sjO ze2(kr#K@Y8BAyVT>YqgJCt13GBCvn!(uk6Rmn9DgDM&en?=OFV%a=X^20pRySiW`I zTX39OipmT9!66<^5sAbZ%k9JUhB$9-4@Y&i@QJ%0=Y`$97CEg2;D?CxP>oNzD5LB~ zZscq00=!Ziu$)7L0W=oDG^b(rfW;>u?1)Gkm_OZq)VubgjbdAA4WoO9ShZ~@ z$MwucN(ZS0c|XqwmYl|KKlK6b`Nnl6#~l0O-3UzWgvo7CQv-)}LbApN|I$fnLmW71 z(p>UhAsp9ea>W4<4yjmu_*rWFAi!4{YT}Ldc@dZ0*}#J5N_YoR4f$rGPKB_ob0w@_ zcGyJ6K_iueB*uGAJ&v32eFS4-fMdmm+yGSACie==I$|d8UvfOk_#`7~94Cp;0m+EV z>ODL7-G+^{j{EfW4fCmYoW`uK7KXBUgkxC(w{LjKg1uaMpc`d1t3=vP6?qR`D8T4A zCRem(Sx(fhg;3lk7#V|tKd}QgG>-6!Fu4O(Z??&Ht}yW;OGKfg5$y;V9D~8pu)i(E zz4zSHcGg*Eao1gU{aO3n;?qv$!TTR#<@2i|<-eCnao+LsiN*xkaZ{174y$%YI$&Je zl?gi{<;x`ucnLQ`cb&sz0fIWBG8%ef1V|z%qp)d(AyAN2eyGx??ayU^5Ha#zK%wB_ zl=dJg`NQ)YATS&TBXwbVz}(m8B>P@U+HtBqHz`&gQG=rsWd_%=`ay zjyF2^!~a4hz?m~=^62;K0C z-U!z|zMQt&B%eF(aC}{ZBNLeYXgpHB`fPHde5fcZbcv8c2Fwe8d=JJEiWo=l3{-+2ZfJ9-{9x=Qz;T=xc6 zkxfUjN#5%O5STFj3)u(F^&u6sES7FfP?W&TnF37>rT4`Q4Gmp*%rVD&=Y1DmBCPLu z<#^A#-p&90*-!6!U}@wU|-jY4w+9Df+ho&=rEaP(AUGJyyx9u8KPTC#R%FX#fk2=H|g6;?x@D&hqJ zzET7V0v!+-jZz9fupOh`Y|f(lr3kCZlA~I+K1ImjQ1-(Klq%m{QeRaPyg+dB+}U*W z^gu2M^<=`Y#$a+eI$G-Zw@+R|Q#6Vs!MHb$z{7PV1NkhM-*XS=c6ac^GwW%e)WqMM zbt1W(hcuF?bl5aB%HuoxO3H1op5z&ei!kGPo7DFWLpE<^w2igG6++-Eg&sVJeXsAs z&VJ0KHcU(XfonM;VQMF$w$@(1>&pCbF=g_U9l)O*`~e=k{~@mV@>Q)y5HE{vb~dx* zh?(RIUe(JnR-i~YmH9fMzsG)G1qQ7ZN*PObQHJrrXT&QqQq&9;^NbZdhWvoMwgykG zbco6bE)ruLTopy2QN|#P0mcPKIt+}A^6(2=h$UkznAVN!Ml8loD{u@6*C8H_(NGg* zPIDb+OzPk*(F@9VtB!~Ns}g{Qx<)o`+{m0cbFO%C&5L)eU%w$$ZcKJIBj!#+ zwA91AsmLQ{+6`3MV5K9DRepPRE#|H#5NoztvyW&L>Bj6H=QxPQ4EV|h(^o`~%E~O$ zE5OhYc#2dk%1_QdljdX#zUSE%ne*xnRfghxR+_@8#h$pA;tZl)d&{uKT*LD>A$I z!%RK&FbbknE}DQRH?HANYc_H9aR*YL%;0(T_TDJJr{P`x>q61X-z!X5@q`EXT>j8~ zeEq?vncULMPtQ1x&mV9&u}%_*fU+<#)}qunCmQ?Cq*q5%ZVbpQkrG^S_&$7h!6CF| z(ss>ERF1e78evu4^xI`Rq<1RHghIHT?Rnp^Lf2-!-mg}nlkpF z?|tuk!+!M5zqw`DpU*t~jN-a=>z@(Qeja^!UR<`8-r@j4N49&D6oV2|+DCHv#UF*a z(_o(&#(Ze%c$hX0CXY7z(e_MNZ5;%-l9gS33`Kc7>*OdD2$?prs9IawRb3UAL>cH5 zK~f|P0#GbKsQ`WnN+py0Ooo7{?7c48Rq%=9lC3|=EN#R3kK>3DxmJ#uHx>MX;S%J1 z7%ITv5c6kE8-+3#KOcErAW@44?guIsj;0ncUjj0ucu zZ6J;XN*E3Ogqy;X2?MDU6AP=cVbg@UhwVL8c>~oVPpcRgg<%i~w3IZY61=o|8~=Id zLww@KyZGG`i&0vmL~J)a9J&UF2t%LxR1(*9cw*HCy1V;nXv%QF)GbB2bzjiV4DqAc~0W>yTQagftslcH~(mBNj?NeT9M@16ik3 zYHfh^>+1%}@yT)QS~e)9h@$8pIw$@=GXn6uBt3oIw6(NCXCFbk`*(L>Uy3@&V^zR*FF0Z$4(i;5u?YVMZF1t!g_64agTCAAaGt+@~=f2 zQceQlmN@_JyZF^p&vW3^vHa{k3z*tIg&@`l9a^n#0}MNrRUb1BDUT5xA!$grQH&bs zFK%VQMMZ z8|i55K#&A9u9gf$Mb16yNPhG3au#jaXpw-V8Gn>L1!5!CL#(R%)Ujsu)*bW|hG@@a zOo=KKjudOK}ZmX z;D>A*93WH*C6yVk4cj_YgxckV1NP&;ANU)G&6$ShC1`JGV&=G!oOk?@wB)jAksys( zGs`$RTwUbZtp#Q@yUfqkbIG5c;=uXSIePX)3Soejf{Y{CJlM}2D>mABt*(;)UPbgp z1Nbo_UqTP$jrT?Dpz}q9QkC`Hpja}R5P)=~o<4nsSi5E&K~RFhBCJ@Cm^Tf*&vfW+ zHRrOS&Jf3<0A5;K=8BlRD^?eO``cG9`}C(j&9&EF`<71X@|TtuqQEAjRFYZKr;tjx z1VKc?O;Vp}C+Vb6N)g6I@H4P7u?8uG>%goD=#F-1 z%E5uN5ZM$u)>SvKo+0#KUqo#0V#?&{{MUsa=ji$SGV+`gDFhKDtUReu(AI?T5@yDy zYZ6U)=3j2R90@~t=x0unLx92*A9NU zcsc3%6sJv_h)@#8^N`wF`<6vH?wJL!001BWNkl(zNXNZ5gEWlHB2&)B<_JjtM|6C>if#Tn zD8e|#v1Tu>aP9on>`FTblvaj&5gXR9z!XSnFG127Pj7xFbK70+JnI-fc-KPKcA6r< zE?AlYziTDaa<02sBAY(vho25!0T{koH_$A!*O05kMg-8T(d?YBfzBggHJ<4VF%AfzVaxcqea28u&PNZSGchgbMb)E0@3Kn|2pVTkCTkd0q#Y> zh~kJ+&_gLK5JY*jj%?z0ENQqbifBo`!ZCaJ8XB_o{QRM(x#=&@^7}7-nDMO*c*0?H zV;w(zXc4C#ybn!D2N#Ezw{#;sj|pv!tlr+s^Dl1!5%YmV=i_MC5mL5MM zDYTLORk2N^Rb{Lyj9t~G&j&qx>&X{5dD=MUwzZRUTTogVh)|iNt1W@BoCNo@i(45f zVC;{}-{UzhJ*5FIx#xBsSh1Q9AGjY^z58ey(`^KCY%F7uxHjnvA&vW78MPM@8EcfI zh&4D$0Np?$zoLXTPJ6;(M0N}VrB22-xZHjA0?xnZQJ&en!zw27N?TV^1JUnJ0(-q9 zfHFFwl@Sur8pgE1vLW!KAs-6Yu5>8~1++9GW{yR#*nj|$FBO{R&YQb%$@5E&-IHj@ z!iSCe=j6!~owaK>n7`~B;`T?L2l3kV)C1N@|HD%c%M~ zMl}G0NF5MFc{&RN_$nspcqmK|*A{XPRKTpJ7Op$xB$5fAp&+tFta;f|K_tO7dyqIz zf+x20Fuhsv$dXPT``b$#w9j-7n=!$N+(?CkpsQHq*UQ&Hs^U(|IfF z2*2+V7F|-IhBep2zSE(j4Q7ltkep`(b3_@!S-b-A)KcDm=uzD9jqmcwlio`< zlR;_CfByP_FF&;V_XR!ORM$KM22Atd;bf&7PtAdIMY6I^xNyZFXo2OvZP zLME*qwUuD4$dap95cbN>R|v_@fnNT&YArZ|56_uKG1L|3T2XVAjUKkFo>^_Q^flm# zL4LYq8Ebla`RxAl$t9Z&VP2a=PKCrLYd8R^@;<9>VCBj{pro}!MUe6wx(l6Lc=zo* zuxbNWEjXNOPB@PGbSq(87Cdn*${}&IFivAiRy38QWm*d*aV)&<2#M4h6%`2Mewxxr zk}^SKGQo8V4&$gvV=A_+Em_)OxLAmS zP{a5R#Hd#D6Jo{7t5zQ|d*-ZtU+dY;zn5c-clIh zNsnA2LB{j&c<|9tO|l-;O_+x@594K1#YS4{zGR&c4B_u76n-S68p6D4R`{ zCAISbx)6dNAPQErM`ILxm&wloEC*Sz<>u)~w^wZvQ@&|b6;e{i6dV8A72eENv8_jhY zv~WFnbjI3+E95j;H>K!LUg8EboExFM&=f=>G89^plk1IU`!7E+ilO_|A`<`FP zn3g)mwl{Lc?;hY^e|jfUNb*IWhD?&ih73AZ^bX}&yM719&zXde=J!v(2tmjv7aW4? zc<9(%d4)g?9A6-iHqZ&Xwrb}42IW-3Bzd7FN{EWRv9?A|VH~k$N0&j9gg}=^ zg~QOn|LOJ@d+;AIzloygEo}k3g8;mR$4f80#KDIgy!XOKAG&w@_U#swL@=@yW=@1$ z3g%9N@z#@DDR87g03Kh0+`5bJT=+@OJ^Dm6A;nUOhNeb-cK;t)zitg=Glm<03Ho}k z@kSFMimQYYjgdc%1iCP2VPRt;GP=2epPYCkhmD_(B!iHSowHM!t?hBXZujZS+1(}N z;q_}-zO9?79qk-6x|M<0uHR@?RX5XiVq1ahG)fvau7l62uI*g?=rde?)VrA8)`1c^ z5CKw{?o8SwU%SgM%DMr%>2bT%W#j~##S&aUkj06RYW*-!D&k6y&}*Z=HoiG@42 z?NXuPD+!WG8k!qv%BDygm%yIdwY9x%?dmlzY~QxMOp+FiZb$4r8Jcp){imDcUvZK%201*w z1b6!`e(~k6bKyy+6DhMklBvrwSj_X|yKf^(C9JW8Fyx)ltuU?~VLMsM%3)F<^8s}2 zLi80tDP*8HX4*I&KJQG9ojey;)*~EU4S=d_TPbbluPZlTEKCAcTAAN#2;)4zUA_jQ znA4|E1Sbh`NE}DRQB)1y6}{?;R5}`gtDq1LaLqGInB3OP1@mVUi!82n^TNi$DrZ2~ z!2Y@h;jqn(RzzA+5+&jwAQnCw`c`q$Z|-F6u3m0C=M+xcYd>7Cj!=gnm6_+&YWeSp zGFh41OCt&+L-NJ#^yW8l`|{Yx#u358k&ba&F_Ezd!|jB#=3RugebGIx(DfAzMdNvK7lJkBYBE(=PSRC^4IGL zM73OvO7IeUE)aGPz{8U+xz4LD$zeN4+mf!q$XLpwX#1DRO&3@m# z_In2aqL?p;l`B`gXUwRvWm&?vE%^iZVIa!uzvNQXHRY(!B=BU)c!s_RX4F|M;~V%JP)lT zN$GL_b1RrLdK7z4YUk^BJ_d2X1;-wQ>pFx&TU`MgUn+%PmB5T08ncPy(C-&c$3-@^!j$20mu8FcW~d@wOs$g zayE1hGOfLdOOM)z<0npLQezW!i4=|$l%gW84w=}LLS$@*S&J4ZD;)DGK~-C_q0pp7g8QFe!t={F za><$RX3EGB^cD-oJ6=l?4m`4PE1iYBG0iITbgb=h<=&u%6CecMP=JiBHFxjO@FLOo zp->{!F{ObaGZHYbFh1gtLx1<;3(r@+^|~MZc-VXR z7hkkSa&;LR8?z)Ff#;^HMml>u2ZlSL^{_*3k8%|<({{`wDh*4-_@*ZQkS_uyK6L1z z{Aow4v00ru8r|GzOdn!p-1A%qo?S*;caiJ9@D<)Ydmi0`dE1dl z8k?Hg(%H#(Z~YZPMQFylc~usa=;jwMtm2@ttsF9T3`(YP>>j&vB%Ughx)e$UL~%$Mmx!Vg zaU7%Yjq6sGYme5NwCj=geJ=Xb6SSq1T=$;CXilf;DHhRU2v78q^6JQVb+}H-$fDK~ z3~OSJv@1M9`Q-gBez$BXKY4a38;0_nF>NAO9epJGcZ{Ja)o8ujC9yU{LMgNC7~I6Z zBS-M9BM;>B4?a!_t9!nCa(XjPLVFkim}=BDM6bc(Fj!KT=gwtRAc$bfXhiQ2x~o?J zI$tb4dCA8wIqkV$0Qd z<5~^72ePuQs;+fDwZ-aiCCPH&Qz&he;A%f4t+j=StLtM4Cxes;f~ZI`nXT#kYd=c8 z$6`Z>GG)~2$cH{x-T7zQJ6bsRsJ$upzLm)~|0W0(x2;%Xi~ceurfiYB2lq}Xkg*~? z=o4rSftCNQ{eVg#gb`uEC+x2l09vc)hu8h^`m@h`AGhBAyT5Bpd~VUAM16hzXDgpu zGC^}g9WE}OoBSUWlzz2yGCYu&(TODlhAQBMd9(TCFK%Jkwk=E>*}-WC?8hN9XCg$A zA%6!AsT9}z;R&X+w=ivNE9YMQD-yXBmz;7K4e1QUFv3AmGZeM!ycPwhaR96>SjxAg z80H;G#ned&L8LWF$6>|hU6g{zkTL%sef46Fc{qP{*y%JaDNrvJnG^=r+X zA0QGiYaEOo1u8-XC3II0boCgsk5Y+*bUFWBb6EHGF}2-MVxxuLrkpC@Pp$Iqdt+O6vs$3E-sNaTL)eFjr10_ z;>UUO{>zw0rE)jg{zCP!vU3$@-}whV`R6A&XzWN9o_9JwJn=M+nLLmBWGjL2h_n$l zDZ|O0o1`H#f z5T%*`SqX-E&lQZQ*$Svas}@GJnhe-&4#RbdQ7Rf{`cy3hG;thOYMK~Iy(ljO{_ifnD z`pyBv^U>uE@p8efYU~~=7&5LOlL}(uID$e6T`bjBeGrCd72$XH8h(#`j2K~re*WIc zA7IOtEwaC_e?;Zoc`hxv46c`;%pDaBFSu%pTdm5qQH@@L9n6)_mJqVmIh`ODjBOsl z-jhdj0?}s=yH8gkf6;VIG_!*Zy@02aIgvfH6}Ljz=LXFc@^xo8L_L(0Y1@wvaD&&E38+A*?ZMmAeDpbIP@0-PQP^_hmULLx&?TdFW$b%m|l^>sUGIQHz;ksF3Wf;FwnNbN^R=UhM zR%DV5Bop<-al{u7p3Urz4hWR7rqwlQ<{P;BDXsm;=BP;3DOC&zI*Nj=Gu3f)o*wcRVo8L6W?!gCb&t@~`+e-ocin?trukZ#y8eWM~ z#+*o%YDofCbVZ_cK&VOxsS(;kONA?wG$cpamCtGcBCWh``B!S@z7>mU!1FwI4fXJy z-`~Z!v7Dm#?`&dNf*@4GX1X1W~1^ zLmRTBmR9Y#Mgh^(zGZT zRaf^=$&2Y?p`Pr5ojhiHgVy8bGYjR zr}C@Qj$_}^dl88yLLE`^yU7PT@aZC!MU)<3u(XYQIAFoZkU@V3*ZtuEPWaq4+<5zg zY}ww$Lr*@>x!?FP>vwEIxJJrSD8P|Cv|$TGA5M_x~4q;egps<5L z6)Gebtp|C2+cxf9zlkp#GM^|4=p0;6e|{^2#V$(WAd$A6k(9QY7S;c>w8Aj4kpNX@ zUbrLg^W{hX%9(pj;Oe6fpg#&wDhB0NHV@P=cC6{tr4R&Rk*=XFbmzB_4+ap9&r3U2 z^3i+l<=Vf##HEMt%f08G#SvroCeZaLVc6Z3F1MzVFH12Cs|47XX+vp2LOT59JqIzT zy%|cj`j=P_fj5l(SGN{wzibDBD-q50RMcwh0UfsKP=Qc2V%lhgN$O%?aDbwp{{p~q z#~nB9nfKXe9#1~`^tCN5BW@|DYq|zmc=yA6{kOM}Nq7~aVJstrGT^&ZwOb42F2^w> zJgQ@ZS{Aj|%J4dL8Opb}fr^QBP$}xlr=v^+RXR3ElB#7!OQJX&J_bR*=Fat=x+yby zFz-C+xLkSHAL-lK%^64S%fyjwD6NSt&!yf=@X*FhytKI+67DN5U(JxBrbyEWrO6fz zN)bhYar@j2M$usiaf}KA=&vFGU%c!qGyf6d<8jBH$V<<^Q0VXNsUB4=Xs$~k9oKfw zp1F@ChQsgLbSNAY-f$ZSyPh1^thEj!f$B;VO+F}c^1l0%%cQvKj(g}C8YGT~*tn~Q zi+*w&9V6;kx_%2k_|1bHeaJk1c)`gOeWMB~wIG&NM8P!UqWWbwK(O7uvZz4Cc7pQW zzZFum;$K=zlu&q{!^+KFZ0qa-=atad>+b{fEB}ENRr_Z_1O90_07o5mIQt!PaKl4? ze&FdPFDw~V8N@bZVfGXl)drK>jq6!92br?MpCuxDF1)ysd2M6($wxoI&M4siZEI+9 zGf2myZA1%;US7e!{@0a6ku=h-3Ya_=J*EZnLl6YWM2f>Ej_1_rlR0YKXhznV{pfzb zL`LOtv`@ewo+sF`tDj9>z35nxOQo1Pu8oB26Vp#2Eb-MF?%<~T9ydv%A!BAOiU#!jdJX<}j2uFARtN}Cy)l!7Ss85rC}I$e(^ zJ+vxv>0{4v(cGC#Yp$oe*k{kL?dZxamaeT5#cs21VeLx=jwdPl5#M{}1x}qhfdx~> z(c?$BY$|5HQjySy5=>$U5B$~C0I9SVM~o$*d7^I z0#uB4U6?%){I`pAy z4<zN zK63RBd1&cU_L|hjvh~|py?GbHby)lIR!%x%f4*_hQ$IDOB5Y_{t4c zUFr8k%}A}>2pHXvDo;U|&%4spB|IK{VU5w_NCIzXjxL+30gmI~IL<$`9PmG70Wg35 zzC7~yUnmrdeTx@AUu9u6DEka4AIhM*~ZNbMFI6PjZ%tTg*;n(`ar>qwiX(bE<=GKDC)AlyOj!5S|Fu^BBoI4 zBH<-@bi-D56^nfOfH@45d|Zq{hO$FHsmp49<=L4Wj+58SY7>qmh$6oE*Cl*l=4AHo z7(pS5tR8|9YSG%LbSY(^^F4)PC1Rv>X!MeN`7h7##D*Pw@0dfGIU@+_e9(iWdk82h~zjxtjH#tD1`%*qL_|Mj&B~ZKNtP!Q3gYcbkq(+-*OS45h_O4 zWgwX}*3t4+l2AE!}yV~afbk*7e2V~6oBb7r?G0q>dHU4_~MHZLJUrwJf*o) z%AQy$O(_t;^Gmt>|J=g-@l%;Ns?9Li?KM-vnn#t3k#cSpk|^{^I(2qcuR7;-5csiA z)j6mte;mdIlxVJS9?HR3pzVIY-Ys|wqByXc?WQvmQV{(+V?gfFEONXdWyCXVckUppuSt}u-KvJZ+7yN}%UFx`;~ zz9!1j>{T5Dp>0utz;z{Er4skPuo@B$Z}75(%{MKnJW|x0B0O{FZC~@EAS41CUHvXjGX* zDV3R(5}<+*RD^alj+AWbA7H>Y^EFqn;;?nxIA_r9%{l-1O2) zK7Zieq#cL8*g%~|?58Y_Bg?*6HJyIVAuq3NNy$(UbHfWuxoG|jrnNLMP>Sp%!gK`E zvh3qn*!eH75Q{OLg=8oQ`QpN-Nx3e6{=o4_;gI)3lrGTSzm2BsXk3{<#0po~8~!!U zjFAjAufdZpnN$n?g&k-FhmL9E%$bw;mT|H-}u$9`T1u)g(I~Me#SdtSR%FSp;9`;Iz$oRh=g6=!j{y&BLt3=tnb{x4fj9D?Aen!=it5R zDHKfdCkAP(ZSPpUiGk3^kqKg{UN!j(Ychop&VnW0QRGhCk6a(8c_D)A+)vM|04$G4u?T3?~Q=v};v(Vh6sJs{%DcvN(3or_(jH-~ zNIG>S9W%$&Lg3<(5Bm|S#C^{!<>G68MX6YVmPQK?#U}6y30W614fOQ%nN<|wShqgM z1|%x`OpMAY_AEYe%E|QmC8Tjzpn3tQtX-Br!%|QpmrM?u=bC;-5vvlelc*Fh z0#GU5h|jqW=Fr6jwGMV?&04WvsfBWkGrd#KqeLh#h*Bh!s4O%MdguKo(W zE0f8bH*@-oTQ+UllmlRApQgLt$apzYEMLBS;EHd2ohvT8{O=MYhlUCO=_@Y3;x=GJ zx%o-#KaG!^aTNQFZXu~4<+(WaIu_!H0Y9R6SwsF*~3EcJ7e_?yi0JF!9!j;f9ShUjB z5-lTyHrgc0PVQADR_3Z|F-Qkd@X?Ew^40S{!`vCu$QSag*|weQe|IB)cxWM;c5R0djWo}kz)Abe z;G~(;nAh4tM|~rXlSOGLDP_E-g=J1FZD-E0h0#l_+t$NnH~pSc7$Gug3rT6T^lFsh zY!XbR>`Iw2j*(g!9c!r|mekj$Iqk6hkxmK~M`&Q{V4fh3@e&^6>T^VquFPg7(x{zj ziBq=6)Eb2%={P*TWgEv$8f*3NrPU)aa;nne2S!9V#t}wxH|S@nl<~@L@IH)Uo1f?3E4CctzOF96_Yq* z=1huyp<>}$p5F>#3L{4er0@vhK@@c+848fftc0Q=h)ZOWP3Aq>WGS>DibFil7Ir$O zY+|9cB8ZA4Tq~$=bpw=uK>4KYrbk)PQdH)r+7Q8n{eSGXqc1d`>#)A7i)-%tGY8F| z!GTl9Qwmf?-d8D2+D)=><2Kgy_8U!x3hPk6%EU&Xr6%KR(xE06M&~Oo`l!A^^LgN~ zWXY24b7svx=FmeA`D3Z%d&M|v$R~0HK_FUMnrUrqb^cz-|BN%v6nEZvyBEH?%Wku19MSv!V1}O$5nzLC()MbgH z7(Y_hO51+^w$+a-#jq(O)E<*A9)-f+HV#Mrc7dFt_dkK7M_AAjuF~HISvVpCAHa^wlGZ7Sj8kA!PURLmrYwc zO%YPwpLQIo8s=gc6s(bUC>x<%$0QCs$PeY*@F|R$DfC(dE=~}eb?CR=#Z$op_zQA8=|JmL5`~iTTo^CG=?Yg1s zknU(>V{b3lKk^WV&)f$sd;~GEHXv^KDWyFeuH)cGC1OkLQ(B{>Ld7QGhp|szX=g?L zIgUew)Rdw={J|k3K4jJV4B#Z`54w?|eGWS=a)BuFQK`s`w`>t8aEOVK$^kbvme0z} zmbFF2gkv^al1`fcyyGVHU_T!^<`mLN2R~2-$1po;gmJ`gmaVnul_+n9*7$AgUb2~Q zNEah3b?Xr70M*lvFso>K^w(!Jfhv8;5MS#-EsFiBt zM-ta)`@4?hiIwZ=?Cr0t>gr)8K5qsED6bvqs)V%NU-l9nX|vVyP66;{AN_;<>GRGx zcib(v-nz20tJ6|X5wy3W_n8V4JJ9Wors}d6)2tswPzcZsjuFREpyCj=?qVp4_}q=x z8rZ$1nZ|==an$Uoe0c73jvhae23b!@B&rpj-C0*!5fh?=kdlrnMmWMXD{-DklS`%e zz*qN)7>ODfnyVeRwgk;mZTI}@f!*SPCROVF8|>B@FS-(k=H`f z?S~LYjLX)Mag!9n(9F7o5yCMHYqPZLXpNSFgbPc1dYLhznYM;3K@j1(<_P7XUV zQ3)Ypl$BAIP6B1hOr(-#?;c@|pfoN5t#pM%DkCVICADB;z;4(7-vfjbqSYy*KTFm_HINXxd+T; zPoKZW2^5(?gClWbjUR=m-hpyJ7rtM*dEvrGo)JQD!wtW91+Kel)vCV}H)>y=d+s?V zPo7eD#~rs#srcX2XSm|qpXMXS?1vwusLwW=21b?T#f_!|0$evi(#sldBS!qlxHuLl z1qH&$N9%~B2ggikXTju=4EgZnjvYL_ZVR`qTF->~97m2H$=vo9nlp8zoeZHW+0NKC z%8RzBHx0CPA=I)4ohh&V>0y%8|HF+|vl(E`oDjy}O@Pv|Q7DYyp%>Q?Dp@r+LBGi{ z-|hrN`}?R`U}mxznwy&6DFEK+;~W3+buRnb$tGJ7vVYR*%KipncUjKg6UIu|I8W8YaL12&EZFq zqBa6LLQAxch$xXDB8Yu@@|)cd9@g*dWou^-g+h_A7*N-kWzNKL{O<9^W}fVt z3egpcgyZ08WBTKvZ4NbJH_9==I7S$c5dnVabHc&<@XJqMgb+EDj;)=q2BjzlJ}5D;oD zZQHupvS}-&?g0p+*Ifq>yDj1(+UB{^&TbaJu$sldZ&Ds!doz3OHH}&Gr*P;&`x3Y1 znBURHq=p=W`I2FVOJxmvtevNwqZ{>QZQq;WHUx2rzWfeD478kp3J-Tr`t_BXT_GHY zT&kJ=QYZbf;@#s$F|MVFO?`t#L`p{yVrd0@!fwyV^dwKyQjy9)hJET4;bp|Aq;&W#Ibg}!ou+7=am9F zhX(n#AKk#td><*9pegN<&1CV?E_LZNsbqr2l*fpMda|hm>4Zl^Dv9e^yWxaOI_=^J z2Uj|VaOr^KNE~T|SK>HE3yq2)Mu93&@`n(@K{^Q>$HmiGgyU4!6Qs3gHU2@;$N|TS zZ{6_+DCW8F_yefRxC|5mgfQbK*Q&w&aM7~LIWUE~FQe zN)*=9kZd&XOT|_dR999#RawcgY?qD16A3&C87ECH*@9LPQRL&tMM`mzd{9D*h{H#> zbIkY-x(Y=WZS7*ou5KP!yM^XdiaBjf%pcXvg!+0SVoIS^*(0*!HDR1aE7Q;#Y3|(w ztARWJyOQZyaSfNCWqa;!(l+1$@GC0`Jqf1x+U-r&B%&w~H z|DV0jIk!&Blw^`g?<9mkfKU>uG(|cnC@OZbU=$G)5fSkPc?A^93#izTCLIh_qy|VJ zmGn$9nM|g)Tjt(-%HF>}_PKX%LO{Xyr|9c>o;=TF%Dv~Fv(H{@eb;w=zdW^KBP-T# zrKhcvzSd6Mfebo5WGXu?z_yY5O-I#KA*(78mca1?V#18IL&MMz35Ie;kN#~kUW)8nEkYN)Fk^qyXDaXEwREzwrIVG9Jto?}iql24rbKK2?vifk%t1Y9tB-Ig@Hcr&`LLTKOc7D7HduAgNf+d*wr6GDZM zV(29I#!sS4W+7-u#Hz`;`LG=d$>A$2jhXe7^n!702BoR#9RH% zFzSRGphwri$Pv)hFEpAz-gEc8K*OR%i@4#28%lq=&)$1qvvK|A(?Lzd_X&pb;8^7H zd5TiEN}C5>hjUTJ07vuM<}EzgyoEwM4k~SuKdm7jP+y(I)&YYLS1z=meL4Z zlyGq=V3WjAmBuhg=rZ)i$C6Q=-?W*hUVfSV=FH-xdDF?}Jw!-;b%mxP;;^{6jny69 z;Mhge1w*Kn-kz&}A<%(BxXQH4v>?zvZpP^QYakYjGH3Se#L{KU-ZjA=;EKz?1HkGP zD?gFT=3+(8(_tTZA74J_I7CoIB35mrmUUS*U4+|35Vpt4r+jp%T_p$zu#`Xx3)_hi ziNvW0uTR0xl5&rna5eTa+IV(r&iiqEy&7k(2;2QxTEr&;;%@j*OB;xS=+7`C;^&3R4h&Jsa=lu?W z0L`#3f>)yGh*%^_O?9>UPXh2a9!*V6EMB~r(@#JBo(CR$;Qg-aM~W0aos1i%|Jac* zZ8SO_3E>v8%Raj+8BC)G(&kIIK-7WHEtt>O7al=Le#1~hWL!ufjhbX8lYqz#= z+f%P_&yv;j?$`l4d(eGZ=u3x$z4FClR)Six1`;+TtFanKkQm=UEM{S8jkU{&Ubyju zi`x8kD$?KJUdjH%P6iKeklLye7%H&s?vK6>MgH$DM4=6poR zFBtwDXP$LdMMG`f$G2_Yer5CK&GF`KTkyPqU06E`yuJZC`Ud#@s?FTm;$Mn?z2Cn3aL1kZbOA=L&JAEF2h|A*en4?TU+MsbWs=Y0 z?T|LlH*cjdvKm=kfeMUv1VKQ;j`Gk)j%9=sBky`>ELwVdS=-sey3RhbDk}Et>giq-DD#}vO&`Yv=buJptcFCa z7W@DuWhkXf31%O*^A6jlT9tWll&0uI>VzVY;j@Fl!Y1KV5sy@(0+;@w4)SgaAti~3 z&Ad@{96Y9hl<)Jz=AB&g!Wy)_hEMG?gX1QRMQTkZkVd{+8csmbJ#^DhPC7@UeDI9ZM*ilu+ZR3f;6tYezS1QUcS9}gI~AHnA;ynHI}QZ?@P;Wv z=BE;6!7RM7u8XZTv&W3&yGI<#Nz><%RTi%Ag^R^PO0#sNRP^O~d3Mzb?s#%34?X`X z?C662K}2`DG#XdV1{FeLO98e(xjsR@0Qmx{FN@o{lfG9WF|koM%$g{ingkFS`*F(j zR)j`}n_b=uaNQi~!T`3YF>|-lKxImU6b`oXsEI@j8B3P&W+gZ@HcmXJ=aaDKmkJM+Iz(J zzH|-u{qA8dzWkFMe9&B^tq}zgraNYqzesG9p~*~fL)SPIyfpopc50HNO@}%({}^5l zqGYvfNr{Jt)RIUffs>D*q-I8KHI0cR&8dv(5o#N>|IQGAu(~dp1KEy2qP(EYMGbbH zFevLQmRIT3mB@w>sO|v)=!?Jg^_zj|#aCFq!dSf~6G@pJ%4$>~=uSaX13l?MvO&Ql zPN8&iNvTjl;0CN}YXiqY`2kWpDD8vmbLo-$Gr6*o-a?*4%m}#5oiK{|lSdP=Y*K+o z-sQrG$N&H!07*naR8{QE!(96yR1>ufdW0_Z+jS_nYl{dCRg=i(`bZD;;8Va88aMEX0%y-2&sno3 z@!s}v^HI6mTRMx< zd=o?>4l6fqWy!i0Y{xdmle7TO7-zkse!v?G42?jzehC!l=TVE@k;^%Q*Oug`a=;Pmg`Rx3_n8@#^Ym493|rT08hU&E3yE$4&P?#$zv1-ETzQh{Ld+fp zE0olrY#elDx>wGPe9S;*USvtB0vWPhWre!SHSc02qaNQBXO8mm1I(V zHO+%*P!b{DAxl`7)CWRdf<)VL9u{Cp&7=y4nbl1=(;aduAnW?{ z7hJXvrrD9rvuz;D*8V{{b3^obif!7XDjs1{V=c2QlI-13k8oW+cjIkrZ|$J1zn>|i zMj9#KaHFk=#JTy2d+8hO<5S0y(x!$GnE)s4_s-uBVMXZL1jL|c+-MBG^_ou($ zV59{M`M*d;}zO>S-Nox%kF;; zx_c2`P+|{4_9{H})Z;6K5W$Yl4(K$eF>%VI`-E1>Ll!Q~ zeB|s8HE-L|8oBGPyJl>A_>npJmp0yPA*i3-NZ^K!WwKz%PRc?Guq`MAJ}<9X&;B#_ z3YodP_Q(W+k%^dLQ@a5XDQQn<`RWrd^1_aG)W8s8M-O`K))IMs{P^)QlgXT6SyubP z!w&6kxo!LAZQEMewyl-Q%1SQ2_+q~Gt#1MFX2JiR9L3iJxbn&?xa_jaS-kj>yMene zyy$Bquem!lB&u$8h9 zC{!plY;KU**wVQk5>^E`apIPZEd!Lw(3KfvMaNDy^!2czdytO2M_)FB5`yYTl<6ZX zId1A$7L0A+*^MoDPH{f?omBt3*Aym*V;S(Y=w4>ZO=+xTxAeoT2?)zZD?fBgENT)c z7&QXDHHt_L5%_-X%dae10PKMR~ zT4)+#4h_)}9AHV5GWW;xe0uU8ow+=1sWcn=Q>^dqw=@3{T1I_mI5KnF0IV|S1%jT;~6VlqVhiZY^L1cM;vwZ(Ti5DT=}lqxM$3mAvSE-px3W^{pwN&x~7uPoPQdVM^vFi zBGl|tAyTQ|avAS2P?f1{?*8-g{}!*O)*8o&Qk@t@UuH)c(a^{QXI*nYr`J_8t+twe zH_!6+K5kpJf!~QuoIQIgM~od!PI(Nu${3Al)2|OiIOS!T{*ewnPqY@hl4u!rpVT@a z5sUE3mK{9y+Gea+v~1!=?AF44n~!%$eYqiZ*9 zTHpKXvRCx*Rg*%Gsm0oNFTV4s)A;OhhvND!)9PwCZsKVEXZhQrPUq*3CYjCV8PCxn}?)&Avbhmew z`#gyQ4?IXLUHY;}#1rCx1Lo-szxfS+{__(EA^7T|3%TwFgLY4yK8uQ^tWDs$+T@@@<5<2~%z+>x1>L;^xLyHm zhs8U?qb@?jxavw0ktp3mIaYLcbMF05u(59dgbmF*(HplRvqLD*@mO5gGV-~;zP@__ zZoBOcjz9ib9((Kw0MhC7E`j?0*Kyfp!vZObzH%W~Tyc39(3MVaKM0_XIp2_KRDn+&OS=qURzqGXS z(54nvbao?cn+n@vOjVR=RW(c-JI2T-BWO!yx%}Bzv9Jj&s|?}``2cUb1E9*e6(-Qz zR!M5vjH)VwRMl0$s%A)K(Fe?cNF42ZAhp>91Br;lV9ZE#Y8z-xLqq+QUja(U)-b2*>dw6eU+$B@2tB`DG zRtIS`*kavRsqzpMz%?qnoX<4Xuxh(KMGy&LW@42j6vyxkG{#o_s&j0erCm#RP#@^nZ;W2L~f;DqI z2cNKz?|sE`P7D^kHDdS5oLcM&8`IBcc=kSC0^U7v~_OUHT*p@tC>C%^9 zJ?Nl=#mg_hq+fr1^)8>O82kY?Z`@S+`qWcT<^KEcXH4U`acf^+y?smbHU-G!*lO&g z#FjbY2~B_A#u6G=n+Zp$1%9BYuB^bZBB4*Z>30_aQKV#CMI}`gNmg|BaO$0pv$HR4 z=I=MQA-1)lcl4CxOD)^Fsd?MxnD2hC=3bsght8mNv}frykIV6TuSG?VR>g4IWGu- z7y0)0hg}L!T_Q_jTOsUhnUE=s5R;M?G}R)S+t7bmj+i|e#x#@^^$;eBWo!d9?*KQT zqrHPzG`2Ue4B*EFyV5XCEutTG(gY1Om%K2C76p6;jfb zN#jX@=LVplsk(|U95@T5mGOHJ3Xgn<1_WVuLLjA)Sq(z8!nC76SQ1DQcPh=;WqZ1Vc@L0+QOO9$?LC9rA6~*=R;^{oGr~eKJ3?z;JGVaZ6w{|n z56fnG!C&d$1eEs|kr9Fpx3iOl_6!m6U>XAqRbfr5iY5 z{CLr_efzs=;d3g@{{k3U$EVLej+%-H`GSK}9AOm(jX=k5!ShYVd``(g6hxBa=0Zs|*#*q*0Ixv?8y4d^cBu26ZSKpb%Kf z4mqNsJ*q**2((Yck;G*JNbs2tp2%~*y%(?F#|u36-T&ZE&YyqK@}K_XM{jGK7Um{3*C=$Zt}cXpe_pNK$P7wqUlZ`u(m38Kc08!xwSZ&@USCvSi7bqZ-G)*Ru4VcDA*dDBs;j`lZ$UU~q^(KC_h5jyr@8AGt3hV^Put$%erc zYrA{cnaL6$X-Xtmbih80t4=VsY6MZc3fqnW4oVBM9_Vnwz!)S|GU!SIKg(&;$8yb* zB-{G?dB-9^yCeZ+WHU>a5ejuU{%OW2MO`(zr4u|4ykEziI3yq+;*hV1X}zoVudq|TUvQ==?c!AHy=r))FL&) zK_(!mVjov2zPVsuCRA3DD&#?i!qD152#M6XM8_&=El6ql%c>|c95S)BLTXA*f0nSZ zEgP_i*cD_7X?$G(X(3fWf5Br~V?84pMzDJ8R@U#_$pMolAcf?Xr=KO$Gr-3`a2(YY z5mH${d?yPXD5??>e!Ajy`Ug@F|118kMdq#V!G;~^#u12-^=Ln=FqNi|%OUzQr4H}> z0}sCQ-If4+@2V>=jz(j%a=9E>lF{>K@ZN)Gk;xaRu;K{enD(ajL0AY?w95V83;cVU z(JzvkEg1_HIE(y>qCpSC6}!+zWl>79o<`zx?4%|RZE9r6jt(B#+zJAYoG_aGMvcH% z5;riDEV|q{qHMB5Xe*RKw+Q@zJ6>2t)^m-RRe54qrV#kf5`yA`B!}g~J-teEuBnzu{ue zKYoE3ky8=I)J&u<*+?vwpgI~Q9*dHU#c*VVyjG+=pFz)M$Ssib+)ykh{9xgNEB5|| zdDbdqmIm0iO~*hxr(OPi&iej$x#r$K5UGhV^5FeS=ibt?<@|>qy6v5O%_0^g$EIA~{#41X3Wfa2hJZJ3hwNKP1|X1>*e}i+{b6{d79>Qjt4h2(=s^7J`Htze9m5cVcu-c zoHdbI4K*YqHbcGyQGp5^e5D9bh6Sxn;8G#0DCtzP@WqK27*Yv)n8NEPSGHivE z?eVH?a#WR(#6l}+sdqK;(ORRl#@9X)Njy>$YPB0KhYkewRZ*rjje=~BM_yft6cO47 z2f6>*=V_WShLh({C7W|mA_z4nG>#?d$PV%A@?qha;tp%`q;2&1(6T4k{5t{LU4i!X=aheV}HrDVnrj4b!6pF(pjOH`*rgOsN zu{^S6J6AlvlAW0$Dq|K_NTAlDXjNYJn!+R;QYxA|`*~``CgX~#cIPqZzxg>9yI-54 z--whY<1Dl`)qe;_NK2+>&YHF1-M-)cLlA&hUU^v`a>#=1S6p%BxLvM%!lL591Nq7q z&*Y0I9!5}56kLz`$|h1-j~CZ(p|h`#u2h!1n`gqPQB*n+8tZBqRaZ@QA{l0op$ux6 zh*_mcaKi+*ghFX6gc`z1McPCNcyi4;{(Q${c$>HLN82)+ZEZ#A6uUaRsjIJhTZvLC zm0`q)s$;U*^hH`3b&9&ZM?-a->9rY-nVDiJ5Ja#zdfE_6+9TxMBymfT%jP-vgku=n zFcv=uQ4Vc_QIR}mg^pP#Pae-LudYG39=f#~Uf&d2ml{n>&-13d_`Tv z(9><$l(i#AZJ07?Y@-U?RV!XwF%p3GE~tp2CQV}L;^+9w-c$I@etVJk13cy8Yg0|D z0DKW3(PZ=8__{zthfJD^P?A83l2?MSBtf8#V1doI-X=OlMS;AGtm%tBtKieje%4FVn$S^I2BOb ztOX(2FO)qdUx2pIoiWJ6rk#kr#-VM8Le@q1rAkn4ZEY<}UU@11Zh1ZqU3ds05OcS; zZoj&9#||y9L~?Q?#~-ve5`im1M^IsA_rXRekK%;%F0=L+k(|FSxBFMPE?Smex7eR| zl^YT*i+0pHw3nu2|E-FSqs2r^8b?XLsHi6dlWHpX_M!W+w4#N{P&U8mM>qcXxgY=J#{VDyYd5T`+p=+E1tsxGkag9JKl?=P`T5tm z@RXy-=ksVGiCH6f;DzP<@!2J0b9wfkI*pIMX91sk|M46}oiL5`{%k{X`36c4HCH?`HVZQ!n7Pw3)x~17tP_t=+p^n7RAR9sFBA>*v1sC6XYf zOq%k5>$-pzi4jRg%pObJ(VRTjM~Yf3stI(0`nb(OV*}EGB9%*V;(|l?z%hrT{b=Zi zZESu6{)yDpMBN`3i*7Vf5qdmM;_*9 zKlz`|1Lw~F(8P(84YNjR*s>G)dyxgfpB`JnfbUUI8l^3yGR84Vgz`aJAcRA{Fhq8! z4@+9RW%FSb6#Cwa5U?CwQL(Gjm;PUB8tS)(rbTVFNfLI4tk<`|YwM9Y7oh}d{K%3C zdTVQo{>G)3Pkj8b#az~W6Wdyh=EJO6vo>3nbkPBH^mEsv&+`1H4J0CQEM4@|()h|} zFq`7i!}iCvMHq}RWYW-A!uhhwkY)Qeb!+@ zBEv#c3RC?TT*P1+v0^KzJi4V59Rw7758X9T+Dc~3n7Q$YBaZr~tGRvnBj*C};`2-B z>gze6t-T}c3M!iBPGSFPV~yuYAVNVO5u%EISRm;VQ(cFsVo{e%h_}DQwGJhPwG1g2 zMKUh<+N0p6u`DN)xiHDFC^|waRg&v9WWM4)E=tKk>3LLwY(8M#=mxGlay}!X5pG_w zj#XW~cuM04VSqJl8G@nKL@k?^-hS?QZW*=}iXQETfV?SZXSYngxW>)ZlEaC75g8MN zo*7|c8IlZhxuJd`MD|l;wn9CqIz74aB> z=Ob`PMn`e`Gq2E8ThEtHK9Tnwa3B*#k0Kt6lXT+LB&(S^rioeOCsA8f6)MBMb)QD) zBI*=s1Q7bf3yU57ooskSfX)GK9Es5KL&(4?*n|8p)?WV73o}Zn)eO>$Cara$q{0kqaoOCL;+t1kb&vi<>@_8!#Iwdl4EsI7+Ds*-5xefQq=5Wtm_ zKg(rXZW;}+cJ11qO`0&d571WB1C^RA44B2_>kA)`j0UJePog8KY~dPbN?~k6WL8foIpPLB0q%M z*@u_PLf>HNQ!ZKZ;>Yf|;}70H^Eqg2Y~;4z{hse!dBxEJ=j!xe>K7{T!&|61{Ghos zR3yxVQ*ka{TG-en$?)N2DG*q@sCT}z%Dw&a6%T2>F&OC%G(g- z$kFh58EN;xQsfIRg&^SA$xVD@)?`w-fJe8svc7i!3yCAmxS=HkPSoc5`=4VVohM@3 z;cKgR==oD*wv_#~3JJV2e9(*J(wrA&Qj&NqDgeIsz3>0uP5`dC<{C~s@kD<2+u#0v z#E9C16UhoQzmfN7e)w5FcEL5gwzZvD)FN9LB$XLrXMZ=Zw{2%fPdht%yV$&ACl9{# zGCzLcet!DkpIFghZ@K?>@^7)R?$A=t819MaNkgv#axP}rY7;;cv9X(q|j;#Mzj{iLH(ES{K)REkM=UtDFY#cSkwryDqXuQ6SjB;80 z+)Dhw51GcHJTq3fK^bu(i2aYprA9F5g#t&67?# zV-7{O-nMquuHMAuciv6Zj)xnU$E1cjj+@*VwwnC#TrI#tY0ucY;*?cGVHo)vAY-wI zWJ`w@tV%25b_I?dH5ID_lwwRxCH3`{5RY)nlh4wX8sy~tXOMFh5H>qobpg?i~Ap<2e76h2-48RH8zXaeL{{ZpZa=NMV)a z!uQnwHUanTO$Zj(NJ&ITgs)*aWD5gia($)1Se#-i_GinVyWKemyZ=mS;{_lHQCtmq z4-%0GM~rXexCu?9b3PAm+0LMw#}ZH(bNKU$4cxbM1BqC~AX;HUq~B&TKP(w}zZ(Dm zAOJ~3K~yOoKEYatC88oCEu@sg_TE~RxqT|CDwF>bd+a}?1@Ootj~L?0hV?JUqLKGT zA`w%X`-;tvJjdBz{yt0AZ6g^|eC@3F(^y;2JXDg42U2I#69=@@u-tdJo#_>yxUt_DvMv&&lrR62JAH|N_}Mn$BtrKNu(7+ zS_z_7lBgYHMneV3Xa!LnB?zH3trVGDJF!R=;Fun)CCLo+5@@6FR##I+Ob$QRl${9C3jj`SpI=~KNePy)P1Z_P$_bf!H8uwQ&OgR^z z2>l8$Er<}}jXTwbN2q)df~sVU>5UDbA)U@Jsj-@Ija4YEP{InyZJL;E@t4+4mUs3b zq#Z)hMd!b8b1Ui=sBi)!=fObE+=xuh2rw1H;nohL{+UXbVBCgLBRO!vq5l;4KUryf z?@=u+Eq4zL4#q1`DJT!@OuQlM8lw9}H3x7!0Kjq+(ZTx?03oR=asv@;xa4c!~H*u%K}8>a_$PY8rC zlHZ1?t58xAXdjJFfW%b+jx9NOd>x049m9(DJ~F-{n=f$VLrcuWiWH_*fkX%1I~aj1 zI=5J5Xn^Se#GS}68h~%OLV34@vFv-mJpG>pV7H^DriQ-0zDMn-bG~Cm!h%54`_xiS z|HP&I;<0BLaJxBr&R$%8&WHK#M?b_h=Y52qeCdl^eAd}4oHYw6A@3E8^SIcxx3fE> zrHa-N(ju=0=}EWJKh%k^3fPW71~%{6dkzafbVBKN5A^lZ)HvqX0B3*jL%Y1*LytW8 z*L!v6oPAeufk$eqh}6WfwB*1kNgO+Z6b@2KB9@IUZIrZ;PMi@@K`x)gS3VLOtu^UF zCvm$1X~m4iv9QSIyYW=s3}Xqj7p>*vi5~PTmWjjME>?wp#(_|OPQJ=Wm#5nmueE)5RuY-{_%tXX@-pMLu3XXeb^=h&vEvAu+(dpyrnu>>NQ&C%Z8Iq~j0 ze;@hz?60ez@BQ_gPQUR>0${_Yjknq|+`!hhGPJdYA3ypuB80>hkaK;6uuN4K8sd1; z!?7!fT8VJ&3FEaAl>OLbfh;kROq7+6hH_pQRIII;WS1$L_f@Z z(R#Q8uJvxoU9r#-5--RyklH~Y{1AN&LIkcn^6NeP|BXo_WgGyh1yTuw0x6wvUsokT zC)b6lh~${bO;p(q_bpk&>Xr`Tj%C(KsHiEW{k9Q+(ppw!Z9S!l*bWgpe7)jF3RIW? zXoSE&_>e=c|4#z2+c7XOKs=dXD4qSEL^A%ts_IHnEWLwOTlm`NzQ>oZ{ROLct|MTG zyz7xG6v(NYp@($w+Or$$xU}cWa6<@*Ky7`!oOkt&eCH3h@#KnE=+AZH z;Bdvq&w`ngO3VJa=bt<6;;&uu;XCg9!`uFhPyOYYeTt_QtE)r{o3XVvlNueP{cl6W z0?P`&mJ%s!qK=^8<_L5Fv?N>T0wmE$l^LxPf=rgV>SU%~YiCT=SfRv3Up2xl8+N1%gngV81EbGQ;Q z?V&(xDxy)Mk;vaq{wv!#1ffiIagFW)a}^q>tSHT&x3_n&Wy@AQdFm8aEnoTMr$70z z_agaREE*FSYn##$jYU88gKMv!4shrd7jo~HZqz4!^xUttG&euxtDq>EiEi!Uj^|%w z$>vRHpuWl`Jybv|5i;?M61j>Bs~REA^HXFx54)dggjS)Kyc)iqx~LHVmK0P(6GR*v zX@hM^l931z+X@-r3fqcd+i_I*Kr1voskE`+6_SIdjU~_;p)EWe5Qu=vsKb35T3FN8 ziEu(bgVd$-DjLWXH)t&_B3YNnVBYw{yRLEe+@%~vlPf^)pyAnAl7@!*1i+JzKK2h= z=T~0wT>wUn9JRlVy=v?B7E0m;$vE>rax6Fh{tC`~&jNHl!pO>z?AJJk{Tu6;Q&)v! zNjCPUc)WQh_ibunS!W-fuZT;ZT)vIobPIi%HnLs{B|u__Ntxk(nEM#^;}M|Bc^pgJBMMm}_4nE!dVqyngv4zBq2cmMS9 zPoDRm1Yq|gmmQ+2s*1tE!Mhsj8|IH0GiJDH*WSb3Klm;0`@$96@#51YBNnzL2|@x% z(O9iG@>kTlE-^LBNF-W=3}iU^XFRVxt$20GDt`F=U-6*}ujZ(WujYbZ|B|R9Iro#N zLDVUgd^g_w^UDBEIN^l1_4zv6+x_Be#6~2@doX8G9LEM}3v4GqIstaX!?HBewy}i5 z5{7~7sw_i=E#r4%dlzP z-rm8|Wv`|WK6C*uUj9Rlx#rS~mdO0IJL?l#fD}@|)Ny?BYiIMh_a4B1-TNScZzB}s zJQp9&h){)!ZH|nSOxB{16ze#I2yLj#j9`QqhLxq^5CjCoqYkl1j9dQvB!^yh1v4)A z8v9>zIhWpfH<^3^$8kWLKB_Gwmi7=5QW=-$Uf+iD1+%A&Vd2b)1c5>e)6%hpBwcX% z?`3O@u7VW1x>$#VLbCyw9<2-lD!YaZEG#stZxGCMjIJF~Cr&x#l=IQM2+9+UCOG`? zqx^s5+Wzj9S8>_p-{y?d&zRiV)w$I7{HhX}VazDr_tg*ai~ssO`;VVV!WvC&atzh+ zF;peSQC~Tkrs^@wtgGeFraDfXJemWV>ew-uHkv5T?S~>hf};7ZCY9|7`89T^SrR%0mSFwz%74$W(QsZY zb|VCe($CGB3k|x$_fSG0@JL1@-0|#k*0*+rf>VSot>ISH+in5uB6MWFPC8K%RwPVd z!&zdXO#%?g{zhz*1l{_}U;ifo*wc|pnIN@g%a*0bAAkG__+R}@ixw@~C0+>IMkZqjDVQ_P zBG3ZMQV83{iTX&}$BHO~9bj1wZm5BfbF<`vEb&Mcwv3>ZMr)sJzR!56YuhMlNo5K( zN0WC|S=dqhyC3I&;q!MC=Q>4y2Kt7$>zU;^LK|)Ra5kAxiA;z6z#!b--YnY}rEZ@b zUI&7A<_1{okCx_*6~b4gnfW)}a2y+5l`P%OPk;JTU%l?S8~FWg!=B>n*R6l>h38*t ztgNYCWtlN5p|#d?=IpcWr59h|{9pcb*5)5gtw|F^es{8iV`pBluHf<%d4{v7eUT?V+Je^F8<6{pC|nJ^dfDrX!IE-@fcpzH;H$M%{DoJzL6# zMueC>h4+8)bgui-8H}tRPi3qTOV}a#Tww{Dn4P35KAKV0GpVhdKq6K_Q!K$5drjmU zhwROqx*C49auc6_^f~^xVLN$00Fft^ZKb<^BZEV21VMl!jnIw=t(1e%lijQhF{}Wk zL0cB7p-ysM3QAr8MYMq3`uydIz%D!G9@}ig2{Oa{k>dBXE?Gqj0;174ueWw^^JB}1 zL?gQ;)eNISZ@Y6R!vf4y|3V0=V{zj&T8y4LBpv5+rFWb#VS@Nq*-Pa=^UY5=eik7^5P$G=!eedmya$cxINOGO%%VrN*mbM~ zqxvV5G7|$zk=G2@e^MX|KB8-o;MFy>-}x9c?=*9%67snmPd@eZ#Ls`>f~psufA+6_ zmK$!k!Ss@)A-`EV~cK&LAuoOBRrpAXD%e%6lQJR1l3M zjc$Jf(00RrZLy1G~`O(Ez1N-tuo*a3}>K z0SwTaH*dLi_uu>Kg%>ep%J|Ooz~J1;Q>Q#sTUQ4lRKGCS?8QZA9z`lwAYw_bKKFQj{OE(cuxTs4HWSWLD75yGLgJ|$-Kni~rqG0yljU4i|%joFo;iVs4&#G&$V$*e3bJN$p zz>I0rSoX>?&imOdSkfjR7|zz-FE-I-i~c+E}XmHzAZx7 z0?@Izq1N7i|God;*YxDclW|>_Xe>JA`XByx2S|lR=x7A?o52S@aSA{B>?zbHMpGH7 zC(s@mKiny02+8}ULC%a4zp&leBan{9&`zWMBH-0;de zUTyCu>*pzWJ#=L@(35TzsVSh1~r3 z3lxikOitJdQ#kd2hxV9r34DJCB<=f z-+kBYzxDI{*AM<{VJsG@17j|f7m}K!MLbsYj0&)Xhp@6pnM0yN@>M|pkfL`W8_Ha2 zJm2&yGx;8Toj2-UT4P}$Erl->i*EQmw_SO&VKfVr33;6R@0G8bYych_orzd%+OF<&C&Z#;;TQuopfH)Uogq1C5*pD#BxYD4lx-a(0MZX9=fxw zbf=r?Ol_lUXb0(B7dbae5O@f{v2B`rx;gJhKf(1}?)%n7>_2`yLtdU(G|I;o9>znL zT*ToE7x2V0FYv3UpCu;qXsxk36(%K*Z{A7s;9!}R z>+XSn7#*~fqHZ7`QU^f?KJ*NL>!Lx_)z$g$d++-^fM=h5wGb$O|H|r$?SMG)up_ho zs5RZ(+|1M|Q)k5Yg`cf8Xb*Uf%@U#a? zVOtR@6ZOUbPoHDtmDzG+xg0$mvZB48|h3B5t9Wng*JKy zw=!7hB=8EulD9?iAS9W5AL*fvaLliK5$m@I@a5IMev^dYjnC)qZ2^HmivSxzEb8!! zM_*x8^G+(_kzFABznj7na)X4@2pdKul4cJMO^=L-m@=oIDtSlnp7$Jc@_!P5zwx;0 zs;dB)z1QBnw&KAtY9R!wvzJ$X`v@0&_yQK3_j!KyjU|EbB zyTV7xC>Q_iF7CPRcZhTrfo)_1(8mL}{kyjSjy?8R9(?e@-;AiOGZ)Ksp}(J}S8c(| z`34#kBD8%iN%FrX6lms-4arFf`M+kJS|YCu8R>z{G6sT;n1DS zvwUX{FYWB(#T{KN@91Z3{~&96`bfEoq#Y+_*;uy15+1Ibp>L>-&QuHSgB$6}Y$9Li z;o{%l&bF3zZe6s9{U%N&UC0px5codXg3H8_4gB)+pP;^JG(WumLE1BYSe76evswJ= zdOBLVIroTtnK8PCg71dY=B7J66a?JAej9-jys50a7{26nsRFSg>tBQCy3o~My3T!l z0}uUa@t+@2w@pCnGBkLc^X0z2{gn_B!IOT)K z^38LOLHU|QqycRi;+w6FypK_1EapK0S_D9VqYQFrB*e`&AF<-pRE(rLF^*((JoS|| z95$|jZ!XxM%MRU_o@|Z}-~Sw6cx(yV(ixIbO+MF6cWNX5kG=Db)1#{Q|NESodD`}# zWRq-q=mZja3pFuFlcIpq6cNR8uU#pEf}&Wi0)iCjRRtowm_}%+gcQ>IZnD|->^^;F z&iVau=9y!l~N6&*<8YApv+ zX0_hwrtIAQ7dw5ee=;C;u?Y_x3xt>*%VGYyt=vCjA!Sh~DCqQnPTxP00~GfWtu^Ik z3F3|&GH1XFJcu+RQ-EAHJo9gT_uFf)`0`hFCjcMjShiv*0Lxb_%&c9z_K5rMec-^d zvWkL`0R&Si+>RcWKm06TIsH<`o_-G3J^V+ubabGFAmTU!WhAvm1{txh1;UOnxMCQ$ zedEjg<Fy?<(s2^rt@!TkiFZ4ehS>@)kyf z##7qZ5c?KNS$MugcnOqS3%VXD8?j|MT2>>RM&j`}I#^hqpQqrag4SCgeTtww9^t1C zJk29NzXy^jG!|NT0=OJ_@&EVD|LW&|Ee`w7X#gC0$iaUJBgVEK)~(;l)}Exni4;*I z0lHX9iBdkk@&a_S!IM~0Vo8G|5n3aqB$dlS-V4Ng^oQ>P=z&?KQJ^aX2>FtWG+KgT1d-B2@l80^WdDBJoVBnK0W0i4%?%g&c2N(@&+s>L0O7?p}?5N7Owit z*=%gxLThIyamyl8C~)hG3uqi%!+FO}Ag4T}vhjsR;1jn6GuLfrUR#IZccV?k+n>4? zba;fYNMs9Cr#;*t!gNPNo=%ztFD zIbg;p3Z#fo=2X#CHio*YF+`jMEtM7Ac>F;;eD*QeQt-(~UgVoE&u2?I2eu^VrD*Tj zKxf|u`Z8@K)2(I`6dsl`ju1W=uwXyOWfdr`(W=ON3G9`mfOHN#qaxDW+zi0Y zx8Cxxh^O}dwG&#sdNtqs&iDD;g`Zsn#11~>kefDb+<3|M?b~X?5l}iS+Mb=uH80NP z7kiK6_~Q;|>T$<#&^~)Htf7|Lvhu*$%V?IP4E@W~K3?A8v;z-k!abw-#eIL~!CM}t zcjd-@Gb)HiqZ~7Na^Jc&Yad>{W_4s}^RTU}SFPG*N%+Vkk6d%iF~__;Yu2pCuekiH zOMo4~AbbUR57*Zyr30-9o4f+cjxub_XNWp=Ccr75Ur&gdGw=+mR8ll;F?1{2vWVCY zKY92WZod9@=uQScU%qY`K61v!jq7jY-{YtNau;8CQQ?pG-t$AtvOeYeO4HRXIy-t; zwYh`FstWoFMwdI|d8AyAzJiCV6xq$K0eb{uPJ);np}D+_!43;L;AW#NWBb*5M`S9g_{NwAn>Z+1$ax4-hSI85IL_WP{ z-P%Vo>9oR;QpckZjZ(J9D8`H*&Q)g}&)DV$PQCUnHtt9oK}>DDFjlm6A<)!SRpO&? zeLp;%Ar*0k$ufk{xLyTXXwn6rExkFCxg6`e`$+jdRZfJem_tJ%!VOQ%q@l5nFP=Dw zj#MYJmabuIcb1d(AIIp%!Ps_;s1>IihrNdmMOik!mXyb%{MU<%*tTgKmz;hSBO0m$ zK($GZBGM-9`P?*bsbPND{ku6bkhS&03vU%%>U+T#8Y@u$bn~7O`AKC0;YZQ?hg)yI zZt@Ao47hDK{N#Fs5Zv&S>-oWzKm3<2R5!F z3l;GiW2mD`^Y5bMEV@L`4EvYL8sLi}0^=#Eb%5On8ckM$SlLKiKTmJIgP{qFU!Qm| zmrNMTZHwOJ!Y5~O;Gi1L+jlGnHr1oa(3$B)3M()i(rBp=+C~ax7+N|=&P0D&pV~!3 zZC5Rv{;9C+XPYfbBZlDp#-b4(d}#@KWfWcQgcO2CF*SbO#jUq}(i~#Lx zuq?{!tIRd`gX@R@>7$jAwAMY{;VX?CH7d7t>&Hid-TJ?HQm@W^HT-<*)~zpIblzuY zzqN4wa|cY=|D0{x+KbBS8YM(wdnYU3Sj;oezRWW(yuu6f7O-IRCc3gY?1V!s5}_(u zLBx&|wIf7r3x%X6R>_ou4q)QZ`?58cWy8|-#&aEk=Xtbm+vY{=$nDAAOdYUgsf8Ng-0AZ!bo>KWY<=im_*1;4neER^qK$r#o3dms=v zP83T>q%dnt3K6i9R3Kd}iAHU1n*K7sy!Lk3xQ)O-LmfErAbIAePW!~1IdeMy4XS^x zoBAL5Sr5M8pL*kk$hN{L-}f&~_VfSI>a5D zxErp^vh`ef)^Xf7V-eG5ETE~OmQNkDCwbQ+8nO7*)34Ls(aUE~IDlcbmH0}9rYu?; zFr=$|VooKFU5*er8sZU#R+cfUrjn7>71YEc2uE`NoTa=me{sPqQ>zrOqz7SNho^4`oRo8mA z-hS)1zjFB%%$xsKcx_+#+usKK`>#B*nH+oVyXWuMuiG#Q5W;a_?@@g3@=tQ|q`gUH zGgQPIDUa2d&8TQ=E=nzKLYkY{_1?Ox{~s_8(@4uE;Z!uQH~0VmAOJ~3K~!KlWq7`% zI%aWVOB06+5euH1Ow2i9qpZRWJyxO2nDBYBN{f`#hF3YKAHhJnnCMT+;Chq40dAa+U0A&pvPK4Y(4ZmbZ{50O+3p13pLBfc)YG{4 zp$E4BD<(}m@V^c_`k2QueSN2Qc6XJR?xPUoUHZ0luzBe!7QFO2&p!1$_dN0x_r3fw z&n;faYb%$ruCtBp**<*bQBXb}g5iyWIc4e*l<(2Z+_zVvx=mNGP$)!_y~&eDj~jd4 zoY}L_1GxI?tC=-x)`0Un@4WNI&7C{g%X&h;!U{P2RVR zrMvc#z9f_BprUF7b~IsHOU1<~g^{2SmrhH&Zbv-ciy9F{Fx_WyMPFzbOA27JC@{f4cXOr~7<>Ij2ElVoC1E|`2EBWtT^DvQ%p zo}fM+qb3%i%yDR}s9>)_doixInLTS8*{i;sLx)y#@Zd(CTep>8zOj@|eOb0<(t*^j zdjBZ8>)~M-z@%lNlWD}ZE)&2@(XJF62QZ=n(Vf;EkS_pm&t3OUe{%Yhp+sFKlcTYr z`pcPI?pMC=YXL&r5hh(SjlM{PubpxjCmk@3_1n9-`r#LO^7Umj*46O+vyY~(GLB^l z*0l9<^OJLkmdE+pClANAER;3^TVePW23k^GHi(*dGiA{_1cIEO!B-x(rKxaY3@(rI z(2T`w-P*}92aaR>s3u-rx1B8;+Bkfl(M%dWjHm^PSd=w8I{C^iPx98XHT?F9Gud-+ z1Hb(18_axjIp6rqWTxythLoER7(Nom7PO^ueDk@t$QHXNLWJEE5o|gX?ZC4xwt_OH zu$3w9@@}5)WYQRBYGVFZAF1|0j>*r%Yx2+BI}_^!!n4l>h{T>NxJK z$y|5gG}7rjS_*0t%~--2FhB3_ocEy{Q~eYgi*0s+5dpHWiQDBwohpZ4M0o`AN@FRBmO60c^O3?1oUTQ`O?_9=zx}KK{vbn9>Rf0Y z-tMsTWjl1IbA0KyesmqB$oF;^4U0Y=wXD6J_d zMK+&D=d#93DoBF1ZryUtC7-{vW6`38yGH>3jN>oUp9()8xA%TMzxw%&i-17@C!KU+ z$BQq%oQp=Brh;3rjo^w#D_0k~lEUpul3u-u&CkBZOJF4U;&Dh=P+mc0O%>X*amr#e zR#jj(*W+cgh}N#aj0b1!s?|CYiRcS2yl|ftE0(SYG8Gk7^z|jV;DQUd`|i8HE`<1+ z)>u*B*W@%l6hc7(MPZl=4tQp)HB_RhY?2Ul57g zyt-l?*Ia))nH6gToPwgEzELPoj@hw&a~Hs4k3Gh}<6%kCUXgy(muKC^?abS}olovl zLEiI26-X@wS}LTH_`Zv_BvDyQBw9;4*M*dA+;-Aod~f!A?q9ePoT7EG;3Fvl2b^go z6?FFnvZ$6ZY_UWL2-G4FtWhcqJbI_7_r`)ZE(R6>G&c`p)QFb-H*DN^i|h6n7*aIC zNtd6^%~yVoldispzpYruq2q?}jgt>!&N~~}cVr{Kx%gy8G}V#G`;<9w|Emk>=}mFi zr13OWL`fF{N6dis01QF%zElL&Myv#7kxD~5lNObUX3FD($P~Kh&3EJZDZ0}xYqqrG z+LD@hgintf$*0B+=i9aAeCxI+cxl;24jwgxB^z6LW&UbXnH)D>eg>1rk6_-qR{k<$ zKI8Um<_nW2lFSqk%0_4(goR^C?pU~*u6*7|X9lx>EqoLB1KoLi4Fw+qhbd7%r4(ce zE_C-oZyG>bmL=}I^AG=V>7|!(#~ru-udLfwUU;4pKQZlzSuelb;48qku*MGMhv%I{ zCg|d}GzuuGaK8U&-i$Yb z^R+Cr(%kUKi)`sm5_h6uGVS4-dRBcz=1!PcDlAXoSH_{K8hmYZ5rWQu6yWuvn$wpy zBW9qfsfnh>CUN&&cYJK(r~PpX_P_f1jp65~pMEM&J~_P};H)#xxbn&A(?|K5+S;m` z(>l94MLu6BBECy9VFe!wDM$h&>19j!dR<}MHb_ze)j+JBew5Y^2FsUm#^jD{1`oYjJxl@O$)2wOVXnPhk3s*PY3<%k2ZE8Xv&_?`*=!IVuFMcM=?t;iPgu%k4m-G9IRx)&~5^uMzCUwqL8 z{P7+WH|ETk(d)Va$g?cYIn$1$rKz5L!Qe$~D;92&I!s3Yf!&{hw7SwpYlMC*jIFQM z1~417c^-!hZs6;O?#ls#YRP#X8o#8g9B%d{ zc7Sp0RHghl>=LM5;{pUBwNVR*V)5kb@9^@XwUkGlVAd}T0Fi(OSrjVzu)BYVGF15G zF&I)4bd?ldQ6f2*GzlS$0oxLQR&YU&jfQeHoDk@GD7N<>|IO)%$M~xEYWo4l&;4Y9SJ3Sz3;CF)+ zT`1&PzI?@@*=+Z##~gk5bAOvLC;Xi~_uTW`T|Sk4efWJoi#NFlI#6yOuIk10lcY1f zy!>vIL^O&Qs9XhxnJA&Dh(y@1qnnGbzl)BS=7H-6J}?Lol?SzM-!`+MuAYDQj#?R(Vm2ZRw%*S5X5Ho+ixEMkWQz6SUiEs zgZAQvADmBJEJ8Y0VCsQ;uxe8WkH5Bpm}3V_2aBxlQd1FQXufXoM!%{7pwCX2+?B)fu08Ekp4cA$;&Xl!UlbNn_=3qre!Etl!+lwqz27BJX>A z=ZwR-^Xq5vxl<44i)T;f6DLk$W>1o|QathIDxRFVmQu6qU z^|YmPr7Nz2>nOCrY!zHs+io2HD9taFHioqY*QJoj!IqLUW^F^mS^tx3^z)Z~A^iN0 z_uR+jU%Kq7=Apx<=W^NOik7-%ErU4qnEmlQ6^u4CmW)vJRVYqtO&rs^96NmwzRIo~ z_yU1nqb_RHNsRiV^0Ba}j5lE6(3^89cO>6CasrQ>c^p{qsmEXB#@834(8Mh(u<+F- zleR#uP!_jIVdR;Megk1#*8Sf@KwSvbJQa$BW3ys&D>wi3H4`I)?`fe7-$5JOVf}%o z+Ikn|zcRvcxdPNBAm*5^5~Ws!)S!e2ErylrqPtSztE^eG=E<9Gx~c2q6hG~c`v&mr zb7n4l{%0>h2;tF>3U}}!2S4}b8*jwAySjBsr#bx4!xDS!wdZNw-QC~ZzN3A7Z+8!U zsg!BCi_k#WgnglC8Z-<$0?P9!FRv^#)Hgig`Cd$GJ)-|P%%4C1Q2`J4Yd4r>lk9_R zj+yHsoHTYjzRDt$O~lsBSQq2u<1S&J;e*M$D)fvmN~|WcE?>L(J~lizGjN$Q!?N=} zd;ZZ6J@DXSJMOTfv*X`B0l4cAcRmjMK)?j;`{4QPXzQdslVfzE+_VG(WU?zD7kY7l{LdKgE-7Ht4j+ulPzE>;QDoXk z7Oml&`(9w}{M8I=Zs5Wb4#W+-7zpT?!jh~@_VW1hO@SC=AOTw}9|Jak?#@742RiN` zni|obNu~pkIyvp5c65Mio}t>>8u9MC%T|2;(l2n=9e4gq*XA|XUdgrB{DiyixRc-A zdUMOY_uT*2h4bf)_`@A{CX`ZExEo2ts4*>!9#oI7TqDa2fjN`J3pQybl%c>0t0Z(4 z$RCG(7dy@P{~iY5J^P>Ow+EtWMUbKCIatyTWOoI=0#7T(*H&}aCy(L2WvjXVl?BY* z)Xwjw9l^+efujLSOMGFZxD`e5?x2ekVi1D3D*{eOkt!<%S{Y4`n2eCiYOZ|XC6cKW zjuSx@>4O7Qe@jfRT_s4xC@X{+8Hs?IXmkuTxGp-EGi%E)0ZWVa$EtWeG$`LS7@dq6 zD@B~BXl$r=wzO_#cLMOga6I_Heee0&?{B@;1za$0a@YR&y3}iLynYApfrd2e)^GT` z-#ho*b9wk-qtD*Z)JR!*IcwLfF&X=iT13`IclRJV+F94$!pbg(mYNJo!KVii~4?H;M%B!#BC)fRi-ADh&+sx06 zE0;%WPl|CB6=>hgwPg|HgG3_mRF=-(O+=kIzVDH7QzRlb?YVB;e6S&g@njcm*WzSB z^pgecuS_QbesFKfRR8@0tq^98y?Hw{RHLO8n49dZXcHbGA8_%Kr4_}`s}J3mPal0C zz3CjFa23R&Q7%6AAbxnyGyKQzr!!;8T24QBPoAB>nm@hzHaHe2pHCjPH`DeTO(tDH z*b0=PMoM7}fy(3cM4bdm`TaJNfg0=D^3lFcStQP}`|ZQxcbB8A2+zE>oC^;>o`Rnu z=k}6!(_~Zz<>x7jI-E16k^BDiH?o-==bdsmqZ?~T<#GsNoc)x58q4O+MXO1s(t$}= zu@Vcevy|Yv(AH(f16w-KmE~YX(7tcLT0)S?<)AH0ltoL+h(|8^{3ShKzv8R^l7%>J z+BBYh_F0~O?iuS_U;pOdQ&0Qk@WqSXp8M4=U$N85DK?mdz;S3C)kGp<8zP8h#x0p# z58Yajh}Gd(5hJ@CxS@vab*W1rxL|Xa@3Z;ustYjS){32TTpb!jp%q2x1y5@{A3neD zcqTM9@Qvr@aKimhbJGcjGj;4xli~=ND$iT?WMMx*m z>+reyzUNuBp`EIVIKD1vd<<|De816%5W(8k0bU_U7y{XF?fapfFRo|0cOgBu=zd9< zoOqsV=Km&97iHxM_qY>|-&Pz8?;ZjCA3Lu7@pT{eS1QXAiSM3!{<)|0|KgXv^d*3B z^9MNR%(L{Mrlzlld8p@c+?UQ_>`@1xH?`qqG=E!JMbuKXcKAHKb|T;U%sE6YftCR? zSAmb9A|B((R~K;0Ef2%SR&$Gl5Y0oHHzl(@M+3Vz|DBFlJYGrzTp#jzw)bWbQW%kx zpc*W4r8OEUBzZqWGP{FRJ{fHGiZwlbrm~O*RsMmr#QLH7OB)r?nL^~ff$FEi%oT}5 z5Sgr@bUIFuXoSt!p#5l$n{U4PdVtHm^yM>!GROpkC8o>J$C?YZi!YJ%~&WEQ#*xg{?afIv|8e zC@7zNPcL-#0chK{S+R8avtPgBtJ#0{8a(Zk(@jV6*=IT9j5Dsd`1}ih*4x*+dHPdN z&)u|X^T5o`5>S?amS&odoy0L;JdM+jpG0fAk45br%-h<{#$*a#xn#Xgw)d{0y>BxG zFC7XU>EeGyfdCO0T?z4z+gR^}7x0yfuY%1n=uH^oMW4Qc%K=T*Jaz6=P8&ap|9t*c zel}+jt`AYmC~jyCzVK1nn6sJlRDm=%0qEHdu?~h#=z!KlEWz)ddV}W|t)`};3{|Yw z|IwqUF%SU%C=|l?7AEsyQr~|{VT_6Lo(IVc1O{K--QBO>ci(;Yo_gx3AFJ3YcW)oN zK2ADuN?G&JVb{Fy%yW+cFOMHT_D^%?zBb~v+l=1Mr_VkoOgFE(`fA>ozwmWCP-dee z$%w{E9)0BJocXo$(8)d)t%);tLzKJbjpDkCFJ(kS0@wA;1Ta{0HSq{@S8U*0H{Fk3 zu|B}TC>?d|RCPtwfp5MxzhmOW19sn>osL0629^HD_rX^b3SJ=PU(x{%Bqa%(fkGmr zjkL@Ls5GqV>@f~#B50@nw_ZTIf;DS{M`-UcK*Ayrp;)X)Q~hYmhILyIxeQo#>9u^{ ze3Ys*_pj5ZkD4)K#w{9cI;mw*4%)kge8DsGVl7b0!xoB|V{^@Cj%Tltg98&H4+=hI zu_#|V?J#b<=p?Eu;;2A8M+<=#fps>DM6{Nuoj_^t?^Df+04<@&d3nYT8p2iQoB`=9 z2*Ee*eTc_jpF_fqQXZ>BYr(BAyv`SId4g5z+GuF3=f5tV#@L#2T-P(_iH(KC^EE%7 zyLce}vd9tF1|K2PdGwYpBMD&Ju%;DSccA;yfzQ3B;JLWlyG=z0qPn`e=gf1?+VZbh zgHQeSNv`S6}_zj;@YxwYIemtoX}fu*V2SoH3cRzV}&vbIUil{Wo9X zci;aUQz!1txVj-s9Ma5?iYO~PliayvHP5cy3d$!+ifyU&w58XQbCcM@F}@AK^jd4f zgBMEu(`2lRxkS!Q;VUng-CF@gQ-__dbipHT+1zm4!TkKBLwS73S}uM1Rl40AiAcm~ zn*?g6fx5owbOvVA!c4P_<6n_2fKM!HG5yVVd2H4@RKy)n%2+yU#YaK<4`{vg$9Vak zdESa^?C%f>1V&}h*9zCoBlQp@FI&p$HEXn1QoQxboBZ(N)4217uW|g$ zd0c(_P#Zixv**t=le*bS|+O*J{! z#r6HbD%nB?=cu&877;4r4MuiW$oGx2D(GNqtx4sxd~4cN=C4`HpZ_+Sj=pZryXn{5 zb?_`&8X9d2w$Ns!yFKuz37dt&{T_#N0Hhho$7-fT|sgI9UUEW9(?e@8UM_+*D`bj8@Fs= z+O%muyY;qPzpJ!{zEpoiqG0%74mS!Qe|oHTT9%jrMkS4h!w~8RY2z}b_Y~RoBto2 zt7&{Pg<^-S)PX5F16sH!Y2hj#0h}^^IK!$dx#X!COu6qR9zSOaqpK673hsNVP1TR1 zFSQ?xFwFXnMQxUE+RktOJQL6Jacm2PGBVKrj0Q*e{3=7)mcsliFl;gFy-7gv-RJXp z$Q97Nsp1{hM;>`(*Q1X<`mu|hyAy!-IZi+GjP_SvdfDsh?6QOHBa%!e^&^ixy1yl* z9yM|#Eh9$!=H*vjx&5VCGq)srdVU9d6*SvdY-aVQcJ>@Ti1Q{N#Qvk2nZ0-|rya2m zJ*fghDx|hh0&K1DJdYpV`y_3zyamZru`m;7o_Wq26Zbx_=SSCH%a49|&F-7BtBpvj zfln#W7_$s!T^Ac&MN+6h<745JXiHKcw4^haqrER<1b|e3x|x1&RaFE_$)Ke#Wze3L z#`bq}dtfChcPcpiP_#}5FfhG&I}B}riVB4G(XL;tS`onV<;w?}Rz#vOcn~RDvN@SX zNT`lD_(Bu0BW5nFG$JDT?x&8#wrvWYB9qIKalNofp|OlsLD1?KN>EkNjBUq^bD6;T3{W#>o8?uB#Y0L1*wIZh#w_o~s`qCL*T>K7R#Nmb47Z}Zhh+|azeE82#9mU~$ z4W~Dk#gYLNLknz6)0)n6@7wEe9feSq;rVML(HhJ-5beF_?lju501MJ7bIm%sVS5)k z9!J;Ilj})Aj}i8gQnLTP`=uAXz4)KD?tb};pO*dbnje)98PvS(*=L_El1&95B4sg} z4;;^F=TGId6AxreeGQ;-J&9vg61S^}Maq!M0FZs7@DEy3T{euEU43k0bFB8negSCs%BEgcls%Xn@+%EH4a`@l|o;r65m;UutKK=L$+{(w+!Sh0v ziwIOOwGMa(f^aRx9gEhEZoYHJ^CUAaWf42@Kd{l-MQAGk-hNn*4n3f~A(T1i0g9Y? zFYLYr>O0 z)z;LVkm~DgdC&AnYr49-^}6-z4+E~Sr2G%tb`J48R|6vJyXCs%Ibv6UNnX zKhWJ5!l;&Zr`qs!0U@mLK4>is&@j-BC?f9#hQX0jK7+~MeA zRXGLi1pwQDe0?8@jZf6EXiuj3_TA62VOuAONW=(2YZ0s!i=tq)?uWfGJbkfKvMov- zqab0|MY&+5KzRsda3^6WAeTebS3`BB`G2K|YE9fPN&zc6`+8BE+o3ZFphpZJE_;&6 zYj%oa8jYRLoOSLi3l=Z<3P?+!VQ{Uf`T|MOQs>#lbKTOCE4b8-7{=72 z4?-&+G+9UG4&|Ea>$;XHEuYkj2+G~!yDPJp^~~poXve1W^HcgPb)U^=eO7M^u}#0@9e=s zP!WwXI1wXaTY;;Y!1s07>aQtpCML=ZCL$D2E(9?E03ZNKL_t(63eq6ik9H;vB~27{ z+6_-Hpam+*Vo|0Yus;*Wj-ot~K-M;vfF3ri*}C`cd%t?| z7e3G8g&%E2Kku!1#S6p`qSAO$64&Qeaj#l_8 zN^RLNs^Wu)I&nj*)GFA#jHZDovO1g4k&{~=EJTM0M-AwL>sAJN(z@k8S8I!(N)DTh(tDn9$W`i zRp7Y@1u<l6Pi*9AoG15y1N#2TwYLJN|h4=Fy`^ zvUcry(>-$)L(ZDQ5KB^Ckj#GZ6;xX{GT^#~HIaq|Z!MuGo1r}7&|jj$!_1~FA&E-K zS8jQjuDMGgTR;Kvcp0aha`M{89(&BQV^O?Ze)r9IpJQ|TwtkhUWN2*#W$`GkS3pP+ zXxy7trI|G=g!D^xsX`*8Vp&Hwu5T(Dd;!BJ62@y9#w`bcZ+2jBZXKe_fNXsv54DYoUaIVXJFBQ_1kPU06=U%=6O zj3%AWP$;-ml{Hfx8)WblG7wYJJ8Ag$qu&ik5`*N?1El3p8y`Z2Q%!qj3xmp&{NT`i zSvhVb-OE`VuM z<-9b#x%NQg|GnJ$orTpzal9r1t8FE5?E+=d2)9i;f(xIX!Re2_zzd(7#-Q?YvThbz zL{L(LcF;l*vEZi1W;1u?X5zL(iRxGS8y}|WFIB*>5;Ev&h(K*y4HyR)Orb`&F1jyQ zEbb^tN)zCF5zo zR}T;0^)trQj_2*IYk2APMLak6HP)?LPd=5w_dSM>7|OY)A4gOOG%gaSSWsbW)0(YH z#JK+P7kKNLSD~vrZ2dRXH$3&&V~>5~)KgFW*r7`QCy#G`_dERJ#-HP6bA&)U$ELQX zg7RpbZa>|x-EAs)jRt82bRrRo%6S@A?MQ~6@>=MD0qE~Js)=9|!$ZxYL{b6J8-I$NDV##BAb$no7M^;g-H-_NP9hO>)n8-vgSG~ z2~uNg@F@T`TDp|mQC@4^&O?jW8k~R%IxtFva%O-SD%Ya`|PK?-hwgW-5&n4wCCDIOzPT{PL@3 z(^6MWGTno1C#WxLArY&_S3VX3tz_6{|G-kd+VK2^4_bOeoH#?P#?hVIK{DOS=&Be` zo_PZIy}gF7z3>K~7(0~D?K6(3ou?zUmb6n#b-W4Njt5n`LaAWfP)v+vKsybF*+N_R z_#`u}sG@#`*v058&?G2!(vT{|*a&Utq$o*VdBh_Y51e{5pPT+FUw-a2?mqPh%B%#Q zUqA{ATMBGja@$|u;)%J-NJJwTWJ*xsf8breG!n3MQMgAKu%RL}y9xtwSgk2D_s`}H z_D1QF$y7gKCEr(Md=Ig$D?Fu9qeiiA-MWu$3>CY#k@r7-cEgQ)?+4#yk3IKZ`R?`WAu3>p%>UhU{;9s+AA(mqTaoz^bLX3e}T@sxri3`=clA$+sr&&E@-#C-3_~%f2X1 zGSFR3i2(ek1u7V`3d^jwgdH)brxaUz(=6}k<<-sGSiPf<&Dji%@i>zP*KzpJIwlOR zr!gME^?V9SA*={dr<^jYl9*kFv?GBUoga2KO08FojYVGP+1|T~f|tP(kzh0F@4_Zf zQV>DmY0YPzoW-)%o`Cls%$AGV?v@R0J zz=;!QEnKi*@<*QeI~GTucw+punRAwAGU-vGXbUrP2xoukRIa*U8VScDol6sUs;IAM zAz~X5B^k{64AruzwD-aPwpM=N4?!>{5LgIuewt)v2bp{q>2)5xXpGgA0tRV5m?TY>Zk+Quz+L)2-ns;=TA69pGMe(!SVf z?k<`Y}&=YJqrWKweUnmG75g6IT)Txt5N}IVG+L*a% zJ2N)zVCMQ(o?o|xdD}X0wWcl>p+4>yMOn*Y@%AJSELk0Dl_PdCoDuJX0SI^RV5i^F z+fPlb$d}(a?rYfE4+Bt~!RB({*f4Pq*mn%yKH&haIA9!E*HmxCKU3^37}Z-D=o%2T zm>8?uW)^Zuc0#PFsinaV}}o7>K;RwHmaGyi3F>X=DpCzl7MdCGN3W$x}LC3}f?y!yClY*_=L#ki#T&#Q{+?FaTDn8lS*}3DR ztgqoCT0~b@H=Eb5Tc6JtT8gQk*lQ%0{pV-+&N(Mw2~FN}i8~cERgK1xk-!x%K;Z{U zkg`Yx{SZ8TlSr0~j%;lFNGAMtGny8haP_D z-Q8FFgCC0*FR05E+#teA28|fT0b@rpv?9h{H7)pB(Vfk(E$gzTE5*|7T|B(xO?o}W zr^XHCO9$=A-gVWyzI7WEJVY#JBumxb+2nWGb_`~W8beL9q^U6aa!?%)#|$BLNyvax zy>mM*Kx^+a8b%Cf>Oo`p;sN97%jeOSC^`%W06Kw^M%EW;s$rolq)=fX6v9Vn%Tz`} z8&DXam4#Lw+JcC-X-?R*>`}()dk!JvDi*hO@$}kOzW&_nl*QtlGQOEJ#tvaOE$0BN~b?KRQzt91KT%&_?-PoJsv85aF z9S=)c_`)DHML_#P`Pgkq`nmiDE{Z{SCX*?uChC%KD>`6wGidN2B9Tb?qpq(_8#e0U zBUxRf%81wONl$tkJ=s(s|rReMNJIwv_&%2itFWrBtfIaE>^!NuGUiZFM?;KlpsjZ7DBitEz<%| zYlc@O`0?Zk{Kw00a%@Wza~7}T{+AbE*&?KSY9a{b8@-GVGXl`MlpO~j0msk8y|73cFp z^&?G-_XfdYbs_))l(j9Pz02@~SFATGb(Q6W5~IT41%xjR3t(q}=g>yjdlb$4jpU{& zhZBp4(!8~3fPySZm{PJR4TEu5C>1NuehO@|UlI~n7Av6OyTqJ&$|BXYRLA(l$iaMi z{}Jp_Rl$<&Jv_dABMaM;6g-bI$Dzz|aHJsXrATLcNV(l8<$=s&%Q>WZ=pTOf``! zIx&dKcpa*!Y^MhT{d6dt_aUl(A&^D;-k?1%11a31rLPtS=^u|)k%*L2@bY-R%jx5X z5syUq){J@hzGA|ldK_uv>OAQ}CwVuEWk+$OjT9C_N|Kp2`tt1vDT7Xm2yJ{z#u#EC z7%x->)S**hXlWftIf~*M5E57U?AuraQu4Ex<}rKDa$Hv%5v1ZsLTh6N6xw+2x&sgz zatZp`^@?C+7^lFflvLO@LTL(suQi?yQbeu5EtvP$(*>K`p)!sbJ{a9tZMp+m5>Y;J zPt()UjsNZ%!xj*N9XmR&S-5cFlON~!xmybOLma1`F>SVGJDW8KJf9g)&t%EE4Me14 z3P$DQsY1vw*Md;+rIwW~+Wl><55Y1jdfQ8eGR` z58H>9s(61(fMA}g!(<}#br1e6Qm{;Wmf&9%Y{P*BvNlz?5kWEmRBMH$Eo#e}s7o|c zoftzjI-ELZ2$M&S;)Y`;am&<$Iep9!dU6GxTCVe;{X54xr%AAM|i@+Y2n{E^Q;|NIfA(JZ05oTEN- zJiof^lemQfuB$+M#GE+Q@uq-U8OZbYV=oZi5794q`R@PjG~wEaDjX-V*sYxTZ4X|7%OY_N4iqr-Em?NP$&Y!Xoc_ z6gs*P={yK1OC*?l?9q{rdko#30DQpXh@%eYkp~}NGHm$Ju4079tlGrg&pt!M7J(dw zk0|P^YZ*4jgfI?NRf#w=maXQ&Kfi3M#2}O(cG%(8nsv)xZ64CX-FM%!`(l5<+_;O=E{~&>q7}Am1Qpmdxxd<2a@~dR-SA$@h=ipHs&V#V-`XnSB_CK1i_^ zf&u$s0izL67FeJ?9~Q2HY}N<^iJ;Z#`=Q}am_H03jHoMT)ZQ(eJ8l?xfuM>O!6s!PG*p!h!4fgF_OXQ|>Xeg645BhIg7U;j z8Y+i#;E-m{-eWkI>^G9rMh~GT?(jzI4xU@Rjg=i4q%>#*bI}9C7pcP!q;ZCi2!ZSS z{AkYGc)mtR8M?KZQHD|ci?ye4@}>=}!ob~6lu7xJ3KIZz!U-o{`|i8%UY{@I)`1XZ z73J-p`RwPGe3&&gbM_29<;1CPfLu0n)~xABh6Il@qmP@!bze9QjW$Z%TA-975~;?r zqM$TJf3hS25sD>+z_@<`?pjl-wu|j{0pKCVP~hb$kqSw*Tp2W`aQpDyazNj(KrzZ#jE^K;@bclrRST!TgXFO zchJZ)NkI|cTO7lrQ)zTZ7rNjAl3XUUV#eQQ+^{5V>wwSROtDwWGF%L+q|IsF(G^mk!&%HVH;l#~hF{9G$6ia=X53TvQJNe&o> zr9wE*tW29ytyqi6hb{typ?k!tRb=%R(8k>p;DTJDGgC4;3NW`1J8yvZoVt>pwmeDF zedK)3UNV!0iP8`(i=imR%OL)c^XGJf4>7}#II`i!9VG!C|e)02D1#?u~Ncuc|Pr4Qi@~*#mC36P~ zj?ZsgRjUG_SlQ3siLDqVhz(lkrv4gP)neKEhjFsAEmpY37*D?oP&ROibqW%x(6B;Y z0{-EwmHhRoNAZdqZs+!`d+CTmM^8jyYy%^S?@l=Sp1bdK)?spqs&*%zwoPYC(otBd ziV4;Th9I+UwpK7Uq@zu7^SvAR=1=a!sKk%#RZ9wSh?|h!*Qu>E#ue_r?cH+&f2jyrxey}{3L zefUFH0I+=d3s$9raG5v2E6!d)E(o(ZY*zJJJQdTTBykqcJD=0Zb}={ z$}>N#pHkGdMP6kv$XW?@cocbJ2<^zt*m@nbX?6`}_QT8>oOJBrT(V>?rFz5RnZzK0 z3no@fCQqDp!JD5^Fxuko1HGPpWm-lSO$$|HH0>hX_2e-B@#qF5=e7K^ zmah{BQuTzM{S|)=IEclq2YZ#O*%+n2uLpp`4?kQsY}jyI7)G3R);T)?zV_9xOu0Ps z=g$Y=r7wMHf0WCgJU%|&_}R~H+;i7&f3q;riEZuX&=J9`K3@E`%Q*k|rPLEcDAuz? zESL~W%w%;hdnYzhPilU2?t;GYwL;TY`47Rowpq(P8#9plTpDyB6f1j(wHrrjv5Zw4 zylur|zH`}`eB!r{@coV3K;e7?tnxYqDjPEyYp@b|BQ2Wqb){RNmg!lS&cafdWCGsv z!V(ZEOIxV8;f}R@{<^#T@Jal=<&%eJyD!qL@Ua%9g#NYy1@GDyco3lx&&W!zZIU<~ zfN{PZ+4Azg*=?qTxLQZ=ABC|}w*T*b-}|n3KAfe~3Ba>hH{5W;`Psc>G~d1UXKdQH zm0XZ{m-?w|Dg-A?lq-DaraOr@J(=CQGiJ=V<^TT2zyIS~-u8~^O+AG5xzAtC%{Tpc z-s;tBvU_;RX)8JR=w+1a4Y&KoA4*pI+}(W{ufm8GazV&lL;Hvu+H;~?B4idZpUD~2 z5@oGIa*?|S0-peQK&aic9T^&hNF4Rk13(Ev?1Dj<)6d@>{{oDOUF$TZRJFG6eKm>y z@3ak?9^6yA0_op5nb}rj9cOeD(BHj~Le$x;uElua9fJ^hvlizs#vH(XMdE~!-=z|}ea!9{m`QZTU+_{ql3l@Cijyvx7z7pUC}Cf45-f%L?+ z);csW9|;AUgx-rmykeuJty-tE z*q{+QS4C-UHK)k;^a4*5)8?@n92{KIdTIX8|M~KJUwF=W@jKu7F24HJF9Y!ShD{uM z!ZDv*w`T315A7aWrW4(AbuILEa^_`caLFZSbM)c!>FH{tfuNM7FRz$Yn8jpVW7UqG z-1+1l&Ym}mqh|I{i4$ULPy}e(V5Gc%@Ux%R0$G|juf)9sUhL!wq*Q&l)@$z?ARExXEfXN z6)RSpvTJA;-~9SFrxSobwsrN@S9AGmUd{F2yYBcvskPb|OSvXLyy0fv@RHN%$%VuM z$|i^?jIrc_Z~gFA*t$Ixa}hD-M>}`yxMq4spWRx&e*NsUIP5-gIj=l-CF9ka*YJ1R z>!~PCR?~ZFRlFkLXr<1&-TRS1O*tr^(y4vA;4fLGk(DG41f?7U0K8prIugPiHutaf zR<>zRdKL@}@TV&e$Ix(B`XP+~03ZNKL_t)p5!zYU8pKs-siwP9h!L!^9O#JZ-bNZw z{Co3y`sqQMN}u+1%%Z0-h|$J@@KS)Fa`8LPWdjcJZojDKH}LF+-Z#g0v6f=D-f z{|DOu{_g(I1PJTfF)c0c;iY9O!~MNO;(v--L4 zbr`}4X|l=8#g|&o7=YR;<6(bvY@?# zns&MiR%z-tbW`DGSUU)7Z$kuK+#f- zK3xme1I>KpYOI@a8!W>U+o&hCOs!6NWH07L-s}Fq4=3?JK$dXJ6pou6i>o<_<79S)o{NkR;9`IUn^ftLG^C+vmHM zvM72A3s^CG1@Ag>B`41xQDDfc2xSE$meKMKc8;&7o|HWxusJWc zKC!X((1ZV!7%31)j&gmR(ee;MIyymloQQM2vy%Rvn1(Ubwc$ILp3Nh}`}wccTWF7b zhsh^wmqT_FRr2^#}L^JY`tdTr(;6 zzdcXB(00IF;9x(jusVS_cKDo;2`En0h>}=?PiAeRk%=N~+nxROF~=P9$g5uUD*Jp0 z{?i?R=diB5_WEs$7BBvGE}#2&qtT$Tcbpq<`VE(zcATHDDkM~Blklbgy~80*W7l$Q z@9MUjHa-4%fRBIt_vgt!22lg<4}0r2>zuXbxKp-gyo~M?T={dpB_3j(w0%@z_c8A}OIz zP3RwQpab{5ZA;bJZ2J3>GY}Y^$hLFAy!rpVWy@y%?t#znuP1%a)*7b`A0jlX%*OF8@4WwZst=wTY8-m2%wa=1hO{f%~f6+<2_ZJUR$O&&+ zc^JdBx@Qz)a^|ZF#ot9^;>`yOYPZ57X1$=0{`JCp^zS z$$6@Iu@JXMZ+@_8&Ez7V zhocUIBbUHYO9+o$M(?t@gabW1K0L{Pt$Bi`+9o3aLtD_vto~(0k_Ryuv4|*CN=-b-=a-b*B~4EYD==EzPB|V%N$5qd zYzBB0T$kM%Cz_%jTH)xUkKViLo_k&v$8mqA=iFX^Tn-CnrAaoaG$d&N(^<wD@j_=5^1_9KeCUoxnN?_G}c(HIpujg*#q%=&+qr%8frMzL-Fe(RrcYZR6C5Yyg9 zWFb<5@}!crKgh@ zMO|X2d!Gq-+e}Fxu$8viJxJIBw+((gr4>RW_B&bD1|j?x5GGN8qp5B5E^U(D2qmD zk2=YBABC!H=b~i+XD%M#pYC4A%YOK4t~ljL&Y3reQ3himF)_oXO;j2q^mfgsO|@f5 zaM}zu>v*IWqzUXi;P&%^QZ_J*6^E$R$Gsqs%I*gdakjtynrKN79JNn*)`vA3qXTAj z6u9P+GkD`qe#4xec8=`pp{k7&c1ke|EzeT`Xd8OsfTAPHv1|l0?)4UPoJxd*khs65mD-DqdoRuQ>~HTBPY;k)Un1A1R;9!&g@qNVJJzGxJ_>) zF3GOckln-Bu?d$v1&YL)HSc-Pdx{_V$Vd3>XFvPAI9I1J0MBu4dVIrqD)0j9+VF$_ zy_Jna`{?Uv=g}=YSiOFWbA9vA?TIIzcpJdg|M`vPKXGjY=zIsOHlaK_Pm<+8K++PNpNu)Cd!dO`xsXlv)VIla8@=%sw_+!Oepm!HkQy!aGO znmfSG@e0>(+{$$uc5%=4eQYmHG9JemYl&2VQj*Ez7lgvgPF;ZvEFpZNoD1g@PAit;o%+oK|(iE z_Plea5(sT|=&sbgK7y;YvwGWt4SWI@_$);UdUOnlV>eA19C-Y~mtHgsaPEuFZ5QFr z@v;5$alZjNa|9fdd^0-l`x&ncdG7?T8zCtj)OE#_YIbunz@6{p z2oYLYij4+K`U-sJg(vXYyB=k@S|d=N9xJ}XqimL>BtFTGa9sNvezTU3TyrbcMuS2w zKwH&h-CzhZKFHHg(GJLPm~tzp9Vj3%hGKVH*0s|f-7lFz(bQ3i2pFTO)vFMO=;2Y= zKMG*OFqHGpKmP~aUER{!!DIIbcK0yUot8qFi$>n}u6O?wc-{p6=@GzlTp#}Mhk5af zU(DHOo%7=DPi|iXVD?W?T{w$BJL^Qg{_|gR*DvqIZr=@HyE?mM!^RCKU3~GywauG1 zPjBEeTqm7$k_-(EfpAx;RCMRoteJfLlW*my`7^0E8m=|n;!KuVg-Qy76O>qTp<++D z&PVQi0Hd01e@DBs&wLEfIy`^M;fk~Q-8%t=HaO)d3P&&D11~w551zJ?<$YaD>IR9? z1fsmNogp?*OBys1O=2whK(V-|onvP8a`Zqi^E=xKLSdpFGgPcGTxl>?tr03kqypN* z2<@=|BEHcp(2?t>yD&f?3Vaoxngdz!3V~Vp_047R?R@Vs5U7w!JjuR^&0g|avJpdb zPuyHs8$)j)$1k?+?0j<9{l=J6v#T?!pYGFFa^*Y!guj3J*>rd0sa6|apTi|9#%OY3 zfr0MDbQT8P$Vh3=p?CL?%5)T(;!5I0bDU96Dj{LXMFrZUe(F}3-vJjcn?pIaeEGf& zY#N>5#JMx+&j-}BOR#G3B$dWEiAl%>1ym5CtU`M!W#^tqQ*PQy<}WZ(-o-?D4-$B@ zDDSrDfS`W-W90y@eY2y`91kfJ(19RRv8a0^mKtSMAnkG zmdHAFO|eZZN}AWBgt77@Nh5am;$xdr4+-h&>iPGzYuCI!muvfnMx*XJhl}SrHo*FA zPA>rL$`wbA|IfAGd(UfM`&!nlS@XO(TcyM_C< z?BJmdThV*QvYd9w(j|Ai_dV}PZoc{E>CHQY^}quU*waosZRhUYL!jJFLoWQ?nXDaRKXoHZ=~09cbmrjL z!&rFAa{lMfU&Nb_Swe>qYFZOmoD{2=Or|tFoQ<^@ZAi4H9&7521QA1bAz(>&7sn6u zbJqMB968v-oUSf*7i&B|T4K%qF-nQX29|v2(|e;R)<@Vix|Th~tu&HRLJ2^H80CRo z;M(t^FeKm=0aF=xD~g&avuEsatVuk=UuEVi$_ioxtsL6CGZ*sYM49*f;!#HZXc)BXZx0x*#DlszR0D$?nHjX&*1swoks7AC-j?IGq;@QkT|0KTk zu{ZK(XRRPnLZhB|=7H0qGuF@+^)jdD1r(xwtky2*nikImnjG}j|Ivz>Xz^&U7y=d0 zSC~Uj`%(&Ffj?V5k8fUlDtjiXTz2g(+_iIz!F(G53L}cdXvXTh*g3YI;nEHo)CeW= zltPo~E?|W)2rv?}e{wsMl|2yJZ2zp0Oa#js$?{p33)_~C)l`utunuz}A$8s0b;m4W zs8r*I4Lj(|w`FEPiX2wC0Nc?PQLfhc;5EPE=KD6H0zsuCh~GIkJ9sWVwfI*pl9dW& zAVg8C*BGB1!{qW$+v?9Sxqb|yM5xCxwQ|LoPVE~-jZOmCd_GSu7yb&|XvSr}9zQfX z29qT}4O8;a!;dZixc1s>pI2w=GzQ=~uD8GK?R@iF-zcp-W(AL}UV{OuYqxRLcYn&J zEkiKkWq(D<>eZ{SS-pC7aeCJdaSrGzt(gwlZei(M{^4zxVPhxglWH$1QN9H#erD(o z@Dwno6eEp<8=u(a4k{&HYzHR}WYnR&DQs#Uq)kRGcXM)Y3p}Tvi_SffFJ5{wZIY)P z$4KZANg}So@!WQ8%>k)-vpZqD3ZM9(l^*s5rD$uj%x>?aW)doK%y6y2&e1wy7%|wD zqdg31lMrJQN|ilSYWoRQfv)y`I--6;l_w?j8QVZf=mUe7PF4}x)Y&(&8Bs~56K_)c zWB;8>34w)36cufF&o3XPRGWk_?+^1Jv#v!6QEV72CK%;;;7^x_D=2Kr|X4iS7yTA+~cWnR$3Nbw1zeS~kn;!M8&z!SXjr@!G%$1UZZ zCoZQTikcWg9br|2vC2+L_5E~4y>zzCA|Do9f{AOxmm8yuPVOWz9=vKK3+_s}u}-Gp z4;X8_-arZuI8gP^z3b3A)jUOxNLfC0_DWv;%4P;BQz{;hfVMy$#j4#SY~MQpxuDr9Y^^vBr3K)7<*8zxYq>h@ z_k4Sfzx>k|@!qqJ!T^;xaY4lcvaH}mOT^D&r71^D3pXE!-zKZ%OlG{2zT>KKE&0wU zPfxCmq^pBsJ!XHo%5Gan&~%0lsMV2Epel@%N{ll^KI*1D*GpT}Nf_ikiBB@+L~S)A zrR~&{idVBs+srPIsMLtX8kB?}hOgeYkq3tMB2k+M5e7KgpUO1!XHGaR_7vIwv?12C z=*|n6z57x?Exmm`^>fcY=juwSx-{*>t3`9T{I6clM_>P9I--D5&CPJF62vy8d%N<3 z%;;X|QXgfUxRQ~UaAaDVq=yC$QKW>77!?Y$dJku;+Q~$1hceU5`zkmoJ;VtF_g5vhR?~pv`3}UpxUTA zbcvC~Apo((7kxzLS- z+{`;bjHPa>6zgM@YNOP3g-knFjQeC(dw7M)^!G)Y41!c?&$fOU$*7?z7}JWzC_m~@ z!bq*kE00{n(w=U<@$hE)+uNx$V*cd^_wavie27|-&>l)kutedSV9zf6PfY~Ue<~%E z%4J3-CoxG4)@*^;U~|z^)i+x@FzE;Ygi@vKIQ*H5`6o9Q;w#+9DDTggi2T4#WXAfjRFd-t1x4q@9 z(;Iha>un$xS)jeQlMj91^~~<=h5*`vfVMECGs@AK&(V>~kyDC54A{s8DdQa30$@+6 z%!51jW>PiyL(rPk-R)^Ke_PGYTNVAXz}?bCND{ts!D+nu=tU$t$)s^(bQaL8I2%@M zit`HFb3lt(oOHfxcZOu@#7XY0BmaU9bgbuiE|n}t1tESu58v4dUA z?u;0(mU(FRem3qav%lQHs)V|pWTdo}p^-HVPi$eVyo>SjkQ;Sa>+F=VPDa(Y{zVzI zh0aK^tvJDlZhz46>J=>snwM@PAWWdW7JHty92B{I;Qng`5-1oh!ek{&7am)`E;l|l z)&*FU;&WenH*dZ46s(P%F_HiI01qz2GSI!4p28d;aU%(olUhcTI_x!(_s=4Lxu+ki zbjH88xXw>|u7|$1SyVOTBgMzgTFKQHoy0dE+{BxHyoz#c$SG+8E0r_VQOZYHk<4n? zT8mEiucdROd=+e4lF5uC<0&uJreZ$M6iSRm5uniC!P3p)i*dr=p7a7%4UKZ+V^8qj zZ~TIrAKr{8ji|sYZfciDIQ`S#Z|?KE`)O`&?G{jY-~Ztd;L4AF41l(%y`}5q6ej!n`k6Iz@YfID zcfWbQ9bh_rCY>#V>x5Bac|Ve*MOc7OdF5Zs_kojCH`BN;UJ&Sg>f3+PHBY z-}?5yPjB8cssw^mgk@fe8h`xGa4`3)F+hCTD`8{N&dvKL3*Ac*W847%SJB z4sgCwH>t+G2PZj6_2&FiEY0_kv9)|v=jnFFrk(<>^Pr4!ZFp-Ps@fP2O4Rgp%w?c^ zDayJeAu*bUuF%&QWqxOsnk_RlSz%AD&XeUb1MLO+^8tmNVzM^m+WIQzk5r9#mA-Ul zubdk$Q2^r=!<&A3H|1&qxs;2pJ+Iwi9gMQ%D+yuZ-mCI^k~$tXKX}vK(26BA0Sy7R zY;VcDpjvT4KwVw!^3`iT#`!Njk+I>T3r5N~kfpUGVhL@;K<6Sl^E0#el{)pgF;42* zcL2bTr|057?M;Dz4PD?(brB@RN+`r6XbC9CF_#`bkE34K&0BA}o7aB-PQG-}DJ<)6 zCy5ot8r-Ka**)Yo-ThMuB-R@ywV>@&4Gimzq+Ej_ZI3tE7?RQreFwmSG)%YUHP;uv_(cFVZhE|t9@jG1>jY)M z`ARn&y(v&ipMJ_It2b_3H@$JsxRt5_^%*c90qo0P{bIS|@BfU_c##z|yAb*)C3WhF zW}=?3r(9>-#3c9Zs4_HBrY#CNW>z2PESSlX{%({Ne!6)lHi;n$pQirc>5~9C_(5;6 zu9a+J{$j-o_>&_RGf`?}%mVR;TJ~G4J-}$NHMlfg^bWK;ZC3f|L78F#6viekVrdSE z-r3eqfA<1N)%65IC4{P*j$9{+Nl0{s?tGDIGET8xVzg4FoCs}^akzsZ#8~6H5GZFu zV4HL}BTike8f)Hr`-AKlsUf+bX}Xlk#(H^Vsm6p2jSe769A!(;xPFKOrWuR}a*{C( zOa$!M14B*U_9#;H4fHT)?jRrf^jkUY%#}=zlu!z^ae>L8-RH1|e4&f3j@eifdtoTm z(!w#nQwdTIMZrb{G2S3b9H(FTjzWk~tc_umCG@{?vf5yNPl0Ry^c=3d?Gave!ySC` zykmLA5esM-XC~%s98`9Hq(RnVGyR7t*2}&tkk0zkgi&N_GLvazT2R)h{`u%fdoE&l zvdndNuIJu|H(|RASX(DZ1oJy<_}`x%S?duNso_p~HMC)*I6re@yC@PH#<#HLxwP81JgK`zX_H_5ko+pRqFI#pvPdu@yS@fH! zS&LGtbioA|m6|&z001BWNklldj@}V z^5G;#J7oI-2VzFKno>QCQZJnx~_OiNe45G6cy+TM()NO-uEyk9L1e>?AXz3h|Kjlb{ zICdF}7R+M);@J$&>ZhIyxc%{+v`50>{hjpZ+o>f94Q)ZW;8w4Xvv+a>{T+)5RSs(# zKKut{zRG{7Hb+MpIEbmt=e`QnrK*ZVf|{+~ajag!hn3Ny>>(kaOKcidzqYY^L-0r#UjO0iA1|(HU-KuR&4q{bhRU4t|<&; zyuxRC=4J`8X5aX@>w1(bux*GYQdhom;iWH&fAr()ro64doeSBAI{x_M;~Q_h@kghf zb{hBGbI)`FFuk6-?!R}{oLa3G0@z%H^mJxQSy&4?Ne_Pu@Sb!F_sjyF z-<;Y9hQV0_@`*3JiztdPae@gHfpH~`CGf3nP$q>nY5LmooH{SZSqlc)GG64fcRk8? zAN!5#_{!7T-aNZ^n`k5q`Sc4{GFXTx$JXiCDRt0q7bPuVzx2GeEw-*{HRr)x*7N91 z3N&VB!jk7K}hW_G9+uxWj!pXG4uc>gxomwV0|l z^mi9H>!<~sb;MkboBdjrykG%g6k>IPv4V~hj6mKRPMy=oqkG5r?qfUYiXvXJY$kJi za!&8X3W+2XDq|x8l z1SNT5tTTykw>&_l(clwjtz4A(QZUoSBeiVx(8r7Oh_P6bTS^`)*XU-fs z?d&sG|M2?j;sf8??Afzd1IM_xDe}Mr5A*}i>)=0~06fQ4snmk31=ZJ$Rmwf6;OKvr zDYTgB;Q#yA`LBNwxBd689<*X+Mq$W1-gP-guUJgAUib4;gBCY;4@@e)<8;=QRZeeS zG?eS00~>h6*`kF&N%T1Rt1zR zyO}8O!v+CiDnOIPYwJ1YP83Mc^yNaXUB8ph-SLQ<(_$U>Dpkfy4TMn8NRY(2_$63u zVh|OAHfYfp6oGc1Yi4%`D~?~p87mfW{9$vM)6<1EP_vqPwNBhf#orAC;^7&BR&dh1 zK8~9^gH^kR`PxHI(3i_`!Lr#b=#cg^RNJNAc22?exQ z@3RPXU1PGig;IUgq2+B_ZKv8k3PbEbcvi75uJf9s79kSw!CM|=vfkj+=bhjTl5FfD zjR}GBdJ{|?0azzF(o77@R8~MX22f2c04vb06vM?jpZoa(-1^8Sx^j5}5v+=^HbD>) z5fq7Y&dx?A&-_`MI(~qOVv(`QN!P}29kW>Lp3{lROh(-*pe+wkkWJ(y?E<83mH zh9@Q+aJ5*5q5aw8TCZ2X@x$xC|Lsd&{xWX*@lOsM^Q5s*F2DTpTduqAx<88Zb~*ug zmg}P*`S8r|U3dLUo_J!5JB)kVy?BL5hf0Y3gM^wtn)N5IxV-(5yB_?3C^^9zYtO&v zRQZc{TtXZ>vlNX3Z#i(Ev!)gAO>dR;b3F09c_&+H#qzDy8;NTT$mN&{;Xg2wZv9TPiTi*KmQ_sYM+(}kpRg7pS zC)`;Wpu24@R>v8ZptUh=t+|~L&Qp%K_!lz9IS3emLKO19 zj}P$=w?Ex9;|qP0yhiN+>|*}d(oSU7{zmM`GA!v-1X z?Qs0>*f3J6xWH*Ve_g~m)G61EFrqv#4yv($XkIvf2B*y#;J#hM{9xlwYFcyNqM4jI ze~^w`o^qqX-pNh$w9lrmeIAkI-M!Qr(9#jlQ!;}Vvm`m-kNxEfC7_`zj92zhs_#de z1o4P|t5T;*Ltw=5=S5>B0UHvCP;6*kb;Mi>k>UeCe}H<@;8QO;k-UnCeMct?_P*P4 zAWq@wa0|B8{#Gne7@!T@x@J57aocLP?jNV8Esr8}$%F3{fs@-!te{1qG8WAN`|>-2 zf8f#mrCN=NVu@~BTnDZw8=DOCfQH+SyHb=O^Y(dCz4&h^({Kb-(fuY<2g*Q}l^ ziqo@)ptB=A;T_;63OyiDKf77kAKB{e?&hw$?xb8UU1*H8^B2#NPk;Gc2m!H9Tq_fo zU>PrY>d@|K#qHapVx1$P2$6!JQkkD_*a5karZ@W2uwRt{Z9T=w(iD03EqLF8b^a!n zIb9vR^TZ>auDcOuf$P!D0D+Yzb5J}VTc(1wvU%-+0lP)$$JzC^h@_+mgSAe;Mj0a2 z&Ww(Qh)ui#ViQT2P7>Vy>5LlYUM^v{w4H`d2qeU0T?J1s%Q6?Y?`^q&Tet4zlea%Y z%>se%Fr?-~n5L$JH4r?4=q{GOJ@Tg?vBS#AJ#AX^DQ2MA7)b>t@;RdyH5DC7=UFYFjCmM$tC*{zaj` z&UT9Cz400k7^k%_SO>a9QHeDdFP%sKpGLgn$M>Oln14L~gbahB{E-sal+Y@m62ydF z?aw8@jsoc!Bkr!mcnV=}A!2B<#+QF~A9rooMXU|og;cpwd)z_bl{BrxBX}+DOuQ;Z zJouzGbCnR8GM)&-kXoEDIx$YEQgIb~;2k)p1b+)*h~2pt_769=z0eLF9Y`2rO)@2! zPBjA)ZJ3-aIwP*3y|8yAyPC6R&pJs&^ann81^@JqS3l*^4@CY=so>u`I=eo4XsnO_ zx7V}|z_VOCw(pe5$)dk)72;jXoCKA40~9r-s(aI$-ZZ^&2U#yX?>r_aC#lvdS?9I7^Bh+57rr9=kEne%i0E|Vnb_qsyU^*ndRZT13G&q}< zx~f&Xy|qde-)6Q((bqATAPijqv&|N%YmZ8XIlybgJENZ*`-@wtHYT0zEhcMr7-B>@ zJJ?i@zK|0h-aW!cfAugEN#doHTdUro~(!>}PmAav~Bjf`wJDG3&?ZsSv z=8+8cb|OHn-XO{N`>ob7$|Zd&z4pH9M3 z21a3(a&I#O`vp#r$NOId1WqeJluPPth(Qx7=*>s`YV8i*__d$#^VLsc5b{CL)NM$^ zxis(n6x-1Ii%F4j4?_Tm3Q)BMtlc)H=O$h4 zzWwh!5dtS(jSaj8K%gj&PY@?DH0sD>+p@mb8E2fqrj3t3IDg@Sg9d+q*d%-MZMi!) zZrt!6e=Na&IsteNt5UC$Bsv??W-^v3MJG^@cZl;Kpz!85z4=quTyxFz#vQP_+B&)8 z_S-r2^wUhKRCHj;kGz2uCmv3vTtwmh*nO30TjW2pO4`qzo1Iv}D9uDwbMxk%Gy-wW zuGUt*9Qb8j>pHco&D40(;2a<(ZHw2L-`l~T9krN1LfS-;lK>Ssdsv%-^o;8UDHNiV z^O#ruXbr^E-~8Vji@|uU|7MU74{a2Wj5dCz>!?%~LqbQskIwuItW_;yEcT$I1gEg( zx&forolMmBp*$=?*#I3{uL-ZvMxng`P-hf!_pbfC?WPAAtJIyb$`nULX$3G~O@K52 zNw5-OHS|S_zc_6f|NV{&`SWvLfC``zyC7{b?tOV1ViEV{-i>y@&NdS=KUBby;KY6+ z@CvG!MTg(aLa4XW=0|4W!L|fe|>N>_1KWh31h|W3{5-^ zTDycrLYJ(G>t5i^lG0MuTIK6qH_jL-?_g-`F(;WEh${#LP(tFtnwf|XO%SMiEi=XD z*R%xDYOFbZ&I~?t-m!fBzKvYJeu$o2gc0p5i!mf5p30XdkC7kmYgF?$5{M>J0ppbh zpZwYVyz|=I87pf#^HGZwFIi~+-2;7m@NYhY<^ZOPh!AVd(Ek1Gn;4t&xu%S@l)GcK ze>TkKolfbz8A<&7Hj}DBpee-5uwje?B{( z-0`#@r?Z1`8;9hs3Wes+j7bpL4p9=mV;siV{CBy zuYPs%^sY@^r=Na0t5&U|r>*<^dsp340}7{}y^`0z_2txRbx>hTyL&1+xV6358tD9F zm{0=l*|(oZ_KbLiJmXu$>S+%&(m6IN^R~yP`uBd8tu$5(qd|jD-2MOy`+GR7zni5! z9n9-)qdUrx3mkvFW)d2SA3JC>#X7ht4&?CwO0v4Ywdl%}Uk~z`t+hnb#?0;oo=)ey z*{!uttH_pi5lW3w#!5TfeQFd|G$DpSYmgikP2k5K?V<3)jYE9=_D88E2@*xVOQH^Z z@n#1gNv#9}h!f5^d_M0y;|Pvl*h@nT6O}kKUU51D@)VRs>gix1)9JT1AqsMYDo+#^ z$b|)RK?hM#AP6Fq1c0J5Ka)~*AEWg>Xk8_+0hQR2Q^FU{JC;>PjPsTI)^Y2W-Mr(( zWn8dika{x0&haWUyB5)w@AZkG?*?H!?ybc>8qH*VjPc428gUgRfkU^;R7E=_O$Riiv%rE_og)!tVV5HW%fjySwZC!y_Y= z+ittzWsvbn?#yfY>6wQA(smMSCrQmOViRGRRd$Jy*qL8x}4f3L;b2(}L4CZyWFv!_K^-pr^)?KV0 zDYCy(C6tgk?QL}Cgj^ILR?t>qQZpalkw`n}(%N9nBwwcPoK)K zK3JBcsGBPLicdJ;8&1j1f&ZMXZ&OqV3W4zB&HMQDovSHn15sS?Yv(Z-g%$=)we5Asu3kK-O38U5h zKujU(^U0b<5oPh&UZ3 z#A(|4PRzLrX0fAG=l?#ifpeG6Wv~zu8#e+GtiOiMc75v7*qv8w-CyPtKe?Ch-m{*G zQiJv|@cIHNF2?%b>8_*lGj{PAX|t=OG611?hDv%11j>zMilq|!Mn>GMKQ-I(uPbuE z{gQP~y)NKmTaZ#^>Wz?(V97jKI2$DJiKRuXB2q$9EK%M!;$COnmQ?gdw9)rpcG1P} zTf1R>{JYMf_rL!NuD<&7BLG)@;*;EQ=k0$qXRu6%@@KdH^E=<|`ozaS_Fvn!ZGAa_ zI&2YU`2vU&kkGZN_Km{B8$la8qko1RckJGzuc-0mkZt#>M1xZ3zTf`fV zJ)GAbxsci29Yi8n?YQ2F6)HNW8XIbj2K%aYHjR{6H!{f+#WJO89kG^W{oR~6dj`kM z>St+J8$sl%)I@8qWR{MOnxDy}6`2UiG!+BWz+sG`w_`RldX{427*Wbw5_ntVDRKwR z3QMbm{o_wis*j-p!Dw;qcICiyqCyNYSVdK~pl~`ieaWTp}^jR;(96Y7UPpf}9fS!@zJA`J(p!MEH zVFTw@C?bRbyy}O)Wo9noD;J;SFdcvr4@6Ze6OU>O6a^nNjrba^UdmI)tpjN9fJTgMLTJuSbr$x7l6df4+ z(~e3c*o`~j@h7LYfB<^C;OrCN=%o&boA~=#8`={?W%~}KkzjTV!J4gr*dP$O>}7xQ ziy!^)e=nGhR?`W<|6jZJF@aB63)0hrJ?*F_CshTYHQeE4mM%W* z*AG4NVEQ0ftd(VlE&J`{ z-~1@1e;pu%Pz=}@JKzd#vL)M+Wp%Bj-PQJX_tu#?=ljPwGk5MvPT-g12_`$wvyUIi z+TA;I=g#Nzd4JxeT=s4LJE3LV&(S(ZzUH;}AQn`+-j(DK@3gcCT2HDzpqnv{~PkVp>{ipg@B zk+RRh$yxSI%rICekwUPbG0T$13`<)ZS&+++^*lT&Y;%D%@6oOykO_#?HUYLscq+}J zwv8YZQVM5;BITTZg83!|jhSQ>r3U z%E|*x$`Rj0tZJwYozDND8qnU9;pVH(=DbCnjF&2P1s}J+7eZh{w_=ed!68h#XJ~R> zE1j)t$f^dyFpPcsnd5{Ptv&)_?BFb-XkLTzBsvTkFAgwU8X_>E{fug8^gJrs=dbR0 ziaYiVa_xnidBwU#1cWGZbTqG^G24#s7nv;dGgBNzdd}m(h&USAmrpv33O}3=knm9a;k9#58(% z3<_n;ub+azDmgmZTke~foWA&lFS?RDesu-GM+QcD%@6NGDCt#pd~5zgvKroAmE(2#A%XdOSO zBjSK?!9ZFV8_b8Tkd$6@nQu$kGY|% za|juB+6%4ZZ%Ipz&t7pVr*=0}sJIC~df$wx?@nT*qTZk1m;fOZZP~?iG%iAlEZX?B z6;1r_IR;WU=6Jph(QA;DgFI8kqvR{2?)Q15q`(t~Z$EvA8z0)mrAxZF?xK_EZb(xO zp*hn*u{ukjZ5pASj74nGn-Fu(C6&b2$cSfqy#9K=0r;;wytLXKR>Knv2wEE9tP_zkg_fb6kUR+o2H=^#x`(I)^x|$P`!GHU zVA83SsQUiz^?R~;^Qk=f)m^};Nx*OlZ|9az}h)o$4O>Fla(3Xc-KSRv-gPgV!+A&OgLvEt}(i;y(*Y;$Z1O#aMNX{v9zVhLiA=% zQegaY64Tn81UVB0=FFXdoQs|iAW?+c5F!Y5NHGW)E|wUYtuk5i>Byy7($c`%wnkD) zqP3lVGL5(eQ`4CMkv8-X@Zgb9xL23k;QOLUTHn+C23Ev zYkZn_-LZ{Bg{qtOO?}(y!hw*X)v!m`SZJCAeCCQXc;4bpd>vSFqO=Z#R;&MPQ8Knc zGDe}P;E6QdE$eAax4ImA?OtOfnF|ocJMI&#)&OW52`$7isu688rD~pu(qXFMEZPW^ zft=^DeRz`h{9+rPF?{~2vsu~JNWrh7@a)tnt%b61O`7%oaC9m$r_Z08GAVu=8)|#L zh7f6#W&R6^XB1j!Uh#tmS=HIhS1v!DvOBkLJ=VvU9(;{4JRGBFhDVHk*K@g)$_LkR)l@s;QzmWER67KV8>^;L1 z`(ol=cXyY#;QR~z_@}qs{?%%=(g+|$8Px8*xmQs^KyYSRH}k}5woPj-Q=$0UC@eH&<>@l zh1=R%F{iFZtXu?(7r^&PF{xkaO9u((REo!jC;0MXyQl~fMNY^2^mx)YZha7WH3Wk5 zR(JEIKRk;C=?45TaQgXZ;z>N@h~#wg7-FJv5w^nA_tz%k7H9!Nxquzpkw_`Yr966b zIZkM6Vnb&$#uyGy&vHlKAVY-;LKzk`WJn2#C$nT!mXt`jMkZ=vY}4f7QjCQqS5?Cb zqxrpP?ZjOoz_`d@BP3EN0;5q1^5rUTzjG`5CkyUj9T_MQgH|>(K6(RGO)BYE`Lokk z^JkluTUc6HZN9K5Hb#k>xliH?XZE83L`Yg>Skk_kT)G8AV9kppHjF6o=o0@t^3<9d!(A%2h$~6nQt8avxAK%BhOL|z*+DthNES*Gy^pwkM zpjP~A#0B?zguBOdt?--QJb1_;@LY4Mg}_5%LTftIkV>(xyNOTT`y}VA=wWoG=g*4D z001BWNkl?ylcU<$X5~I3vGI~ngn?$N zP-1v`hMCzC)gZL*SH$j*z8nz{k&yf))=*YT>6%I<5r>B0z<|9nQV36ZU)=V@6Mv(% z{veP>DOlbEs}@^>A8ic-M6rxHGJ?n#Fgy1{Xl+2-+FEZoIyCf!`N}lk0Q{F9Z+Y9B zx#?4XyW_+YPrPJwY;*<27>Z>fCT9_y?N+uT3_^#P#;j$rF7HJw>xFa{0{hTbU2T}5 zF@$eNvo&i^c=yEk#HX(M!zJ}LL*z;_rX$ebn55l+aD%drr$^;pn=y9x?_&szrne!>3GJ<% z*3(Xi=IPN{9_k-sAYY&y&QcA=FeVQ&z(|EBJd`7!X@_t~6rl+jp4m$^m?bK++BHnp zMb}Ql>9n9!uJXn^w(|7AIAkQkq(J!8$pVrD1A)DVji9$N%~?x&c<TD|Ye!v&{D}DVME9C;jcP3IFmp^N ze!~Vp7+kWXa%&yC#!x7P(5!B4;qjpf>kshg0s6-Z$eia2yT+3$<|Ih>dyj1Zl4}TO zN+c2{TfSkkRA6|vNU2h>?~|wOhf=C~4+tp}0ufnvP3+%kckLv|G)zvyll!ALUvzdX z*fu#i`Qq!Y`^X>u>emmv+8CqAWe_VC!HR{oW*37w&<~XWcJ;yZEP!ZfZt>4K_ngn~ z-@pHv`RX*^0Q{F9TONIk4I4JFbLY-)wzsz~4XXZW+89HrEEt`Hl!B%lq*6%jU`#xl z2qv*CvQS_=1!)Dt6Mzu;nSAiZ*S~(pcfR{izcam!3g`C#Zy>%_nzcdJ{YAiCD&TjA=>~vXV$w)5+|1S(}jThC?JIR@4;* z<%o5G2H)A-_BLhM*xAbJ_C~bOJTsc-fg__lIXntFPiLx#)@3R>M9DOsw2i06FgmlB zf4Q1cDIfBi8wX8o$mrSebOI~T02 z6iX)?fxWRuCSY_L{LmJ8Ygq+Tv#@^vQSza!#XdK(X&9XZKR`lyXk;WmJw5$L-5_ z3-nE_ovv#P;cw^Q^r-`;VM zAMPEbG3B$ksYGsDyS$XACE!b2pGlbFdZ6+)E>L&defc#8Xvj5?jav)VPP z)&wMFTYdm|ylm4lK6&XTUbJQ@9jP?Alw@gRj*fJShmMZ%qdon!Wm2qZZA55AVEh`< zPt;KhP{z>Hej*vK8EvY_h}tM>Z?s5ElXWOetdOX~6l~vxhf<1)&NDH4n6biP%KnsH zI0#ikW@JdjoUo3=g3t(*fXi1c#7M!X?t6-CF3ow1yQv0M%jqx)%iM%g!@jr9f;aK9 zqS9-pc~g@?x_=jQ0VCq7&=_gq|JGcZ!I=QmKr6oze|`5;eD0ndJTWj%F_3n6kbu_i z{*ef!QQAuOgbCxxUdGFXr~$BVf|3#`CFMeq(oEhuD~H;e8%g_pO1L&$T5_#OqHH2r z_~TB^B3-r46Ql=~GCcM)6v}`wjg5_R;lhPyfBl=^*alDus;`=wnqCV)b0c!iQcO=L z5F*L}42-~R1-9&n?je2ZDW}QpJGNg9%oqRP;+Q7^{wE!s-Cc~0jB?(&XFvMTLyvDZ z1nIhwq*j9B$aItT;DXJNZnV1hr*^^Mm?KP?FKWzN-u13`@ppgs+>H@_%NzfaFMRoC z`;ZaRgf_@reC>NTu=;r?v7>L4(Mp*k`683EK84W7QS$q2M+?n4MO!NC zqI8;-Xc{*Ny&3EiO2kT!rR%F_K0{p7A)nz9Fk5 zO2BRVNBHc+yXbDo^1d@q;NmM7Hamjkqe@O+J%+lla_{0J+hboyLG<}Pl)#H z?sW()9idSmj7DnB$%{L=?!0xJ(z}3i)h9@*C;$&hLmHl$EbxuT4`Muc{mCm?)z(NQ z2yIxA7OoG{vD_=`wX(QJt*Rb9WTR5&|J%5ap;H+GnaTz;yX2 z+C(@~#0#jQNLq?H;yh-9=n;+dpwcuNH(J||VGyFx{ z`&S}R!k~=R^GjnVd?B0xlOqLU44%8DeyPOF*cjzPnU1!0T5^pxvC&_t$ z+DcWc+Qd=T!~s;H{mg|h8ee5&Ybmr8V{LEaZ%;b=QShWPRag`;v92&4rRz{G`X1-M}m;dzl z;kp=OyyYvF%^W^-BnyZa|Iww~^o0+AUqMRCtPXWR#TX`vCH7Ag*gKhL@8k^6jLk4o zEYqD$b5d6u=PmDIb5AGB8q*+C_@PfOtw`-G-j@(i@8kg2q=MfR}II+AYB61o> zN)$TLXnB-^S;nXLQS>KKDjWZn`bS@aP0H~%3c}e#r=;YD2X^pJPaWZJuh`5>Pgq1T z2%SHUK!w73FgYV0NOA>8@B!=}qGZWPN*JRC(%>11@?ff1<>&hbx#f`q>>rtMk=Dma z7j*F_wTC3BBkjWO8Hp`tq;J$?ru^_*(>Gl!O$2&Y|^GN zn!s4jP1Q+ijWPII*FHnq@@tHVK63^_A9nADJ^iuE_3~vazi{aA!M7z(MM`;x*5(Q& zAl$G5alxsWg*SpcLm1CuC8|e>ZZ5S(ba|@goJ1(TQhh{ z(w@n%dO;IsEm^>2%NFvIbxXNy#X@>o8rVHP#sA%LfZMnCaimyaNlT7(ZH@f$&?q-O zxZOtniiE|2NVwFg$UQ8iy&=aJUvv&9cC=8a`gKWsbufR-9aQ z%`!D2STy0+5yXgB0@7*9qg6#m({j3+m(!SPqcPJ)bEcEVOa~3AR??{~3Md6tgb2BK z*+MQ|(aqMO3BLIF0SvIIyUE(r8s#FC?S$BrN%58K2l(6jc4AV}tt_HlwX`J4Ab>F7 z#O?*W{hYPD=d2SrWpO)xU?{sVmKgp`5d4JG$@^|nT-)Bt#mg5^(E;DvHNY@;T~d*aX@i!wmk^DtUd zDHNC;9-}ZmiC-=`8LdF2QY>g`Mkp1(k210bc0W@Qtpo&~lqiRyC@F2qq_hN7Ej6f= z+h+N&|1j)29KZ4nC!Q$2d&`%v{PNenS-jz|Kfyis+|9e+{qA%2?c4wEVzJOvSLiVGS+QaTSG?c_TzttT7-Km7^wSB$5GobSYzaEDNnije zWx7}_rk=~!W6z#FtY5$WoS~tin~c^-sd(vYE@RWlt0|WQgcPw{%_ip=D#j(~xl}$+ z8CJIESl!ydHS3l!oG z$@^6s9jsG?GIWgmMA%Lw=_6SrOdZT@j>l@B`*(G5xpUnJ6K;0Mcs|uSq_cSi?YUk; zp{?PMBUPnjj#RpVM$rygLtp}m;WSgz2Uy&c<;F`+X6N`c2PR8Q76W=4B~_wGTS?Xv z+`9WH|L1{S=!|C{rVjF!2($^H3=7(_yz`88TzNt-nUo|945eydORY@izt?1Tkx#rq zB6Ub;3`L_cQgZ3icFteY!JP-jc=x|<G0Ay0@P% z+_#eh00Q~xaUu~>bD?M=+)09K!(uko6^w=cq>j#^{YK$>Y_YVwQ z`2FvHpYMPF`||~8z5)2}JwE%noA}g?pLx*-Klt8--g)PZKUc5CNhfXQnrmJn@3`aV@7}d*7oh0qZsGNB zeHo!P7!@EwiE_nX3+p5&qz$7DMTii--9e-90Rlr$V}=i&wU(>bFX7|&KgA9AY_*f9 z%7F1>f)&mf$UX}_2SHYN=Q$g=U~v~yp^xW0@r(?S&NL>T1l=A!@?|%P!Y?E50CDVg zr}oe%mIcOE#!M4o>cg&;F zDMPUmPz?=AdI+u2(od)|!n!123us7;_DQ9iX-{|2kZu9vQKdkBc8Hg+PjT6rEq-57JWPEBLGu2^)NZI0Q z!uT3Xne^y42_8mrSD)l;2tsL-AX7pRI&-R`uJVy{H!?6$q)hnW%YZDBZAT}#>Asz8?HhH(KHC^X1=k3xPC(B|)pLNCb5nNN z0G8-kHJXeBUGXW6jZ&SSwnjQCzVj?he|QMG7m#ktV$urfW05&yjSr+SF~1=+mb-y5 z1lpQUDPxOCV4ckg0Z&S1XY+7)5Oy8H7`r%YX>O6@qr=VHezj#5;45GKdVDHJjt+@R zxnfUBDnxT5Ch#!>BhWV(N&buwLj37#{$%$p-}=Y-!ZW`D_}w`cF6#O8lTSUh4uA!% z(B5KM|G>!TC{t5Y{Nin+}-^{?%zs^#lp{Tx#gB0z3+YR|c!=MMVPUkDcH}{m$1Gd1rAXJq2Z)` zljUJ1XAe8mBRd&~T2nQkwTPRlloCvoE4=exw{d8yP?INW4WXtZo92qui}~0kn|Src zB_IW*swUPCL>vL(IQk;F+7OP*V9%|iaT(oBYiY`KkWy(KIa_ zL0DFQWLjjTdwntC(oWE^vqTaRpw_%a&60k0oaJ( zb<5!XCzwmxiPQj`u@SmEpjv@Pc0#^@QXV}$J>M7{9C+Px^*R`1GVSdh<*BJj1BeT* zIGb;N=dUSN$~7~OIO&fVB8?pPB2ZeoUAblGOPBZuDJj@GJjGw!{xGG$PZ$R!)&Pz` zW&%x5W14SYa}i6Ma#TZ|fRM3dB{2s;H3=PmT(FO))lP&7ibxaSbk!z_49FO&##kTz z7^QGOH#8xhNU^l-6w+Q6?HtpR`2sfkz>)NnN4|8F;hBA|_pve5p(B0aYP%=2-RWw0 z?avRYc0;#p}Cy)ut0TbwM+sg1|RK@j}`a9Fwq87VdpALb+*BpruA> zNq6%anzP-mXy}A3zT0yPMZPk{XmLN%6exy*+xHG~%aey$+??gT=dI(Uu2!bYRkB_a zosG+BNOxLSKqtGCj?X8QV5&UCWd0C7)x=%o?xk1`ntb5R@#&Ao?8G}wBFHByw)TE; zu96xW(~8GOW_k7Z@8>lqui*OUZK4nc&H>a~Alu??CunW#J(@`=GD5IraEh-!et<_0 z4l`A*)*E2C#zW{xO=5qyL|~&v=450G%(YGBh<<7pplvmsSdS@(IxCGRKF;AYT9^ zQi-WIyx|RBdoG^;MVDL%Kx=F3y;Dc=J%Pd0H;i-KDc zFs^X~GWSyBFJbDtf#mB>Y6@$mCUi|et)Va`j3?8smer)Zw2kDA3zCSR^-(&YRDwcv zl(DHpF}Y1k2(@*g6JWz#u+wDLgKO`9nn(L5A?ty!p%ifD@-F`IC1>)!TShi(qdwxQMgV_lKI+|C|oa=Je(V725Ft}@o0v*zjZeeNLNu<36 zcxbL!znFh~>6vsirFrQ;Kf=wA@1rH_5t<_XGut^jvlHJ`5i(^x91Lh>7@O^5bb2qo zyIwI?5?}j-8({Rh9e1Pty^Q`}BnZ{cLfU;_L`W3U-k$>UzUIvCRzCNF)4AozK7M|1 zn6y-`e+?0#QzsZhpcPUm+Or-b`6BQC#SUKky$88#Uq4epXcO_G)sm@IbR%m!et~qk zQ%=fijJqG4Nsp9JE~5_*5F8pr=L@*-0@po?SPe>Az%vJJ1TP>Ovxt;OIhUd+3}qqk zrN9@0P)LmQ&?H~kFDd*HE@qo0HNF-y0S&D;0@aWU7_*-q`8E2f?Ia4fb&t-sxL%q1FTvEg$fi)7J}>Qgj3dFdKTCZ=h#HT64TJy)V}NIci!>gcfIRf zJpAy(&zbY@?Cs&19Xq-B(u@A#@ZlrZ1iqbM|L6@b<`sW*34Tzio6h3`Cu)#uJUvUD z;74fCDU=M+QqU+pc8ulugEO(jjZH~xfx`EB``H`#^UW)mECvxu?jGnhc7L6- zAJi;S6U_D+mC(4tHiyX{&5w}*O!Osnq98?qHc`(|3&&~A_R!Y2+#(Xubr7)?k$sM9 zgOG|+Fw5}N9<;1tQ1*8U_qtsf)IuU*=H;*GRrHL7_YbCLo*Y01+^pKfu&%zb$+u z9QYEwSKU|q%9HP9J$t{-cyO-marAQ&UIG;pu&KM1a-g~8$%DLb?Lso1=K`9XIzcEh z9+WB-zVui>Z@c|*b{rlhP?jxk=D_&z$vBilMz1R(E1Kl)Us!5>rGgk7h5k{flwt@- z$Veh->OqgaN9zkb7$yLLTuGJwdXF(<8q&Ne8O?dPGf(Mqgl zi-^G?#Qq@%_hP!cd&KbYkQ72ZH)AYQqCtl8$6ANa2UxITAz%I84Xj_@O{iI>E&3VJiL%ZE3|osmhHH z?qO^H7_ZyBf>)lr3}po6ARwD=L25-Y7)Qxe+@wU;mxOe)?ri?8?0}?~gE;=#in*53 zxOI*+n85IwA3w^;J*|A=;**)J2BZ|Eq~vJ6#GU&__|~=q93G#7RHhbyAf?L$F*S>V zxy;1KILQ6K$d($dG35%3Pa`I0tYSh*XLBuTTm+IH{1T2Fg&hZKpO>@;r>%!ID_}_% zq8cI{*&%~K8AA$4X_qlzY>1FB8fi3A3WBQ7$k-UgXy<9PGE=)lclQR+w9!#_StFo6rEJy`xQR*s$@nLg%}|bpQY$07*na zR0#9o4}au2ci!)O=X=B-T=e{#jnU6{)sahH^#`1|b}6A&7_I9HS!^5=4_`GBUA$v7 z#zK&;BWOrV9vd0s*L_DJld6gF&0IqlNk=ZryUy8&B8AWbAp$!=C$!(m;vYf5zgg?7 z6H}G0eMN>eqV``wB2XydyB?Po?bFty8gmS>U3@2d%Q1!hruT$ zv-GsAaoZg2h?nNL4$ghQk3E-q9;q;94uT-u+8|mJ7>o5^cXkZzk|b5B}Aqnh8Ki$?|asW;HdZ~rhcJp z`l2ZmF#W@@?+8px*wvEfx%9>ewbJhAD?lOADN8iodB`@_anqi%-`kY6uSy9*B?+aZ zBn(9%CC@3f@C@W2%B%$X~_5+TNPf|QO0^8!^Z$R_>%bx$Ky$288^P7C6Uj3?9 zk8j$z@v_rSJ@u0dy1L-$y%2^Pj9$5NCAZ!7^FIgXi~l?V@Vi_D-_76u{pVP=Xz|r! z6XQQDmdnXSq?`JJxciD8UrUxO;q=o_f7OqF{NsPV@WP9^|NeWQQ|Eo!>8G>x@yAJd zp7EW+p>fS(ZoBhyENW?_;#Zw4OFPq%i0kL}nNGIkW>?FmPMDl{TA`JpQF*-QmydJn z?n5q(OxNGW#zN#&eg5K%4SevN4b1vJMu3XacoRh^Ir+zO%sN(hVqK9WlqEx5WLWoa zjG1ErOTzM3Xt&F^jB!IqgKVX@W0Q+Pb_GV*`$QVg2IDxw+u+1*O2IfnIMXB7C}=m~ zNx~Q{X-=oOW8YC8=%3(SXPiK5P7)Y_2@EJ>f2MTOL=9SMr&KUCGNw=%6CN`?*ANmx zPwNJn(+kihh#BEEkAQmM#1_ubCfs2#B1Dt6p7k-=Eo7!N%5Y&H88lN>&2{(g;?cuL z`OFokamn%?3Zd_0X)@7JnPaZ|Z*m+D?Rhp|0OJCkjB8#68X;0>6fJ4Z7alvnm$n_` z`g1q(<;V7OaC+M2SV&ompw_ZB)w|S5Eslo(*!xL@4k?fZiWSVr1Y)Y-?i1nOe2d>$ zj;X033_?Jt5t+1g&wIMB_SA{`wAN-gYa^Vz)~?iaJ;BiSR|cs~oClD0&81hWGBq?p zaCp#8{yK~?vNyfyO|SaWm%jAR0PlL|+xfe{|A*h`{kZkkTh%+>{*ESuSye7qwoXk> zvTD`po?W|ljlAIvf5}(Aa`SwlnQs7ocaOzAy$lQwarMiu`OwdQcE_86C6!V&g87MJ zP1ETNl}fdL{rU|tpd_UacHK*pZ(-PMoQ&4xF>lx3%~>+ zoeeo|d)39XWztlGa4vpdoBBk8e3+>75fUJxO!pWPr>5hdiwIC}oN_#eK(N|sn|23; zk|mudlT{4_MkBBREZSwwTbDR{K}YlZm?{k-WX8_-&aM{|I`_axeP9t2X`md0v^RKE zLxHc|L?{htg~aN%l|v1LP-tUigAtLED7eP$UreGfVW6XF84H?Lf({*8gR`C$$E&nB zy8|babcN8kARZASTtcB#9@U`0(b;|Y!3>RFikr6`;IohJ;XP-cz-u?Ipz5T4M(enF zi1hL`8o#?Q{*BHcc^A!n-|E*kb}BcKEYhu>tolOZA$eqQlGok-I20?8k_h41Yo<-2 zpgMA<4xIsyYh;rRK!gB9ISW-E#%5r0+9ETass&O-pB-ehVA=~ zIbA@A?hed(n_>OR8lUEPO@MJtkG6b(RIx<$$RG?1!BhJo)HMYqqRU{$-uvG7@|n+k zX1*xQHvs>$j!U2a2i*OOUjp#5m%Z%fyMBHr`NC|>8EeSq#3h&fLE-kF-S%#PHEY(2 zef#!2=l1@ud;J^u`q#d~ilr+r?>lnv&SdMUy%aC=(oH7B*3^P{Jz zsQ21G_7=4dI8RExxqUx>`_R)EJm;BTlTF2jHsvZGyZm%scj8JWDpjNju{I^9#`_nd z=EjRjz|&C_aBYki@l;lm8OB00VUF{hGzmC5=`Lt$jx8EYs9Dgmg7&6m=)e*tE#$9b zCYo_ZD-)%D#tVH`*X|0i?M-UIHcD7~Rv|4(F~qqG>cC=75i}q)B98gh4*8I^pJ}3B zAqgESAhDSU5kEo`(3xGqg4UG?ZP0EPY@DR-c>eu$e`6rYX4Aqs5jrxXy@no`knz$0 z)1?8jUdTNMC-}qzJ2|nZnQPDANOwb)lJDDqA&k8qbp}oLgruG$5uMuv2R+Zk zpIS3uV!lK+t?+}8M+c|*?vBIUwg0G_)+II4OQZ(S$No~l>H3l|i6a0SM7aVpMa=Z9 z)zT|jyV*>Aa}^I4k%~pz*l{s9hIwkQOL2sjmKKc0=`34>Isar>z0AIrsL)3t zKSmP^Vcq{@DsO|!4iDP=5@&3tq$q{joDXcBuLAQ8!2kH;s;jQzr$7Da@AWx;VipG>jODaVu3>8155-BB32vWEvLdH9MX$+yT zGD@M1CAndccxY`f__X8}(c8Ml?u>P z@5LYB?Qeb4HPuR`BVvuOzw`{QJZA$lKd7-V4En7P9X?sYg%e!T8xcZ6w3XFK6R^CYktUU4@5B^4hNt=N*c1n6%A}RYqFkCy-R+#c zu!A)Vax|qpluS_!GyxhRtB6oKjkn_gm;kLjq%%dZ{ZT+pwbIkP%EtEU8b81!A?x32 zws5=;5jtc-V~j$|5QJi;c$Bg7VHAo|;L{;9{KJb*;_n~b&!7Hu3txKCW=`)}K;Bf5 z)F$LOr^uxyI(_FcYl*nflO&?nPDMI|!V>2~n$lVJO-=FnEeE-4&j=M$wYQE^E_V9a zn;#>h={l)&(Q&k|2}9&q9x+=cj0$}O_a`o^iHMfQMF$&&Mq5H(;M;3(WC*tIiN4oJ zPe~nwBBi_+d&)c8?ph=?ORioU;ked`|#)R_~EWW@I%OXsL&R2K@Gw-TGNru@XNzTdFaRpP1zKI z(RfnOl=f&$r|Hb5Y0jj{C_`Eaaw22AFlwOQlh&n4}Gsj#1H-I6HKnv|u1;%CE*r?!gb(-P) zZY89jYEoxJbipM>PF=6bjkZd|dt+Gbc zhj_K5jU&H#iiu*CFFvu0uRV5vs$aD+%En6&R&{MHbzG0 z^T+>$DLuwv!PKkGYm$UaI_lEr6l=JGSv+UKBW0r|>mC16IsiIH+Oo^e= z6cfb?6XlY%p)nFAC2cuLPcF;imK@8P8|iJ%(%q1uHJv7-B!UoM8>+hYoHuS?FXl{> z(V9PoPMw)iJRv(iLtEn#rvwP<^96)P3Xh5|GBUk~P*m}ZEq}rlmbkEn+L`J|cP(u* zQL2WN95gJ2;q*nVJa6d&N;+h$=(Bxff`|I2xVLYZuRqmCQ(ACZcLx`)=;p-UCYCoh z&>$7%076l=)3{3s)G|ZCA4kegJe6_Cw&h}om;m|PtpMU!UpEa40aB!>ge8V&b`$E* zMeJfpbvi%+GlAwWPgzZGW0q@wxr=w6S>cr%ms9fnIFF&u8X$5fF!fbgI^-gX3Kp1{ zu&AU**31hd1{Xhda~VVzNMx0ys4?F z62OroN2pe-_OfJBnC2{`yx3~nB%`a9LQKzM4h~@khGF*+n3yK|2&`JYs@%R{!3B>$ zx@Bnoi8$W?%pd^81)69;K~eA>^81XuJa$nsOMW zVkJpztmP>foW%5xz@ek?%poY3<9GJr3ojmS>S#Xywp)L?Z{3FV?0#lGl;^p2%##4; zkN-#$P}#r#VA?)NQe>Wg9(R8FO)P9{q3ruLH#o=e7D%k;k+zn#IwG6ZpnROP%?L1B z<4KQ@fXlygA4g~M;7Kg0%1u#d2o2p08GiDLi)hPwRJ37E#^7=AX!kl0NM+sV41$?z zg?uGs@Ax#24^8v<&^Y@hOXMqMdRrQ}a7i~8FYDm6g&i!&WeAKW@HL?;{ziy|mAkfk za-r>%>68R3+D}J%Y5PZQ;csc2eX)R}Q@hAlMo=;nYt4c^4302qVsjz1!IL&`zHg?$k9H35<7WmLpDxnd-N>6yUBipl_K@`yg%FepZ9xqc zfvnP?TIp(9Mq|3eH8?d!yCqQ8RyvNzt1^=%UAVMs8-$i+V>$8pp1#tBfy z*+LjtyeD+cpD>n&8S?_%{Uwo9L!YskJbHQ>_3J0mp^ktk@rfHhx$eUs{LmhNkKOQb zI@(*kZ+!jhH*MXv?cD%k#bV4AXCoGMI`m4rcx?#>hM<28`iJ0|J_y5z5+E)-|NIXu zU%vcv|M=~12Nz#@3HRQ8&-?@NIe5%x0n8u2)p6Z*AL9P|AK-!upSR$NC!V@CZX#DM z;WaP6lviB1nb}eq&oR_JDUk*|;~-BZ+-kt008x-n?9ncT-JhEfDIn*0+;?P*?``kH zC`HXa$*mB=5Kjrd`r>n0+ulSmG)QAL&?1=)5ZA**lrP4S6RmA|K!_(5ttrKt_C_vU z+083AEa8tfEaIv)i|J{|@bvgJx9uO|yH6hCp}{HgrI3^-Xi7`cN|F*1+|(|yHnCD# z30P=++8UPAnC-NKVBCs0Hos5|P48v4JcOrGuK0%zQm>`d#iTW3>bV2dWNNWreZqlI zN*Nbn6L}UG%O^0#uppb}vQ=GNvvDbl+MC!nk>|%x9_D-dM({AKY-yx9<+-pVgJ%>~ zU1GXCh96dtDosjymgQ+@;uw92wDel&dXpur{7|`KtbwCbPg4#iK%|@vw5gpx37DRU z00-I_dKyxk+}*+l?%mFY1ud*j4UZcJ{hSX@RJpp_1;vk-vc({i98Y5Qa>k>B?8>&R3Bbq*Mq`GFzNwdf+G=9Y-u^ zqrIWgMo&v@v~CndEd^2v6cQ;RrBYPGfQhMT!s%&vY$v7~8W6(sGUAW__%-MJ-RD00 z)JLwrp8M~+k9+UA8{hX^W@huZjtr03SGK$t)-H#pw3Q7i&vFR%_QR1e#J)qY=Wu)< z84#;iufF?3AHMGWAG!V`C4jzzee(~-c?4ko_@8uib$0C@9UEN>KwA^J^G@MMH@%5j z2}dUL9LX1%DF+mMAJ8VaL!UPmj%Tv{)e{B`aDRIkmTyOleh0Oj0=jI%!0&Y95@f?P^6>xcY$V2tl?AK<~l}d5xrI&ulZ)mdll?>6vMJRu}z0_Rc&^uBy)apL6c5s_yE2PrB3DLlz(*5D1$nn;^=f zA__PzpfWn+I-|~vI)je5z542i<15N2DkyG<$UsmLWDS9YERcQg?sR(JYQOiM^Zs$p zy;ao-s3XpRQzuV9>7}afty@*+w|$qDh5}ffFx`@|apZv^RNtU63mO_bB4B9v6!0(C zU3VQf-BeNKdnvC92B5P3_}2e13*X+mzh}PbA-T}e!e!^2!0fgL4ozlgXlr6teJ$hJ z9EZ|5c8yN*%-{&W7@s7a@ku%k3p?t$YT10wo8LiGRh98WM`3C0C`aRJP5)$`E&bz` zo>mN2QfrjbymrYPE?L}3%J+>i4hmi3313qBM>4$V64bsZ8pmjDD1i~j-Z~L_8hlSg zt@pT;9Me$EqQ+V-L6a-^98TxiHZsY52L`xpOE0sVt9b3=nVdAE8Q)i=e2pT&^YbJU zNrUNE9@+dPQ-vWixd}X#MamcupoJ{60TyK{g-6+vL&2m-inyrm7Zt6cu0hGYmGwr@ zC>(ozJtY|TJYrIFW@j6xbu_d4#0_*4N ztS1L($3@iF+2AkG2M$G>^KOS+>tF~*QKMS)$JQNTnYY_1fa71w=J!;Xl-se zE?>wSC7xuJs9rdWE6zFriDX8y8Yu)b>jGSAEfU?d$49eydM46r8Xo7qef@m&f%Vir z66bvWee^&-#`sVp}=oH&HzT>`6=>Y#;2YDGLInBACUeoKcT4&gyDH>wvzA%_QQrXf5!9JVD?g@QsO!5LTJb(EdUfH&Lzv zW7!17;A5(M6?qVtWans9v~r2tNUTUeEO7CKLWcFG)+ii2WmpQwG$y&>+~fJH6Xx@| z$F}j=`#1CRodbOOWs6xp!+<`Olr}aha{f4d6Qd+!O*Gfcp(fslZ~~MS!*N6mg&^fk zFq+;^t}toZ@zP4`V%qx8MI{uv^g1YmpU@Ja6;oco3GEGBvwSvRT(^rao_8!V5YaeZ z3P?JVy`w3>fl3-x%UZKm=&z*j9c~2Koqz-s#sjWU&MRF;7#U4RDkuYdc3m zJ62aBKnh7Foh36o2G8s^_w#&oDow%j5Kauw_mGZ*(gBVzVo@P5_R!b}g;W}z+-h7# z1zKw@uDRwN-~0BrZ~ki`1lPRd?R@*@??k8fp7*?muYdjP#q+JHMz_?O=dtx5a%2Lv zw-0vp;%HS=*N{aBNjx5B-r_~{4OBq?l@UN?{jXY!7cXWqn_HHioOpI}eB6Y@z7hJt1|wArUP>78nuH^$b{t{|`Z5_F?;GN0+j~gH9j;t5m*YB`a7BRD zF4B=)|M1iNYe}356@Y{+ju)bjbGe?vw7$8OI4<>Cu<;CVw9!`* zR=!qA5XwhL86_487vfHg|J-$mFFn4U{>cpQI%yGaSw5GVgdhln4cun566icyYwF@{ zG$*^LvdK@{8)Y)vN5)GL=m3{ENM(a~h+EJoZK#Y#Y*jkcXApKs5}<_>UO7|YyMm8D zw4Hg4)x2x@d~!Mf4gFJDez>idTQ?uTFZjj)M~0kIInDH`qzf>e)>mo|99~ObAu|Ee zf+Zb0Xpv~k^iafX0yfpxkA7$)YH+0Zm`mppKmHinXUqVtaFlsZM+%XF;&6W-`LPMu zunQ(r0NRbY;=&6qdid_U?>g&kZ@Y$DZu$06Kf_nN@r^(E@sECVIRKq)aOqhvGH&F8 zclN^INZ4aDY=_nsXsUu8z2NyIlgY!Mzu~j5dhZ9{zp=6-zVufG1Xx*r@EREzp{23m zi-Q9LD*!=V4e{lRc*n)3bL^b9h!Is3g~3w&th$<|E#-Wlv{F<#k|izmT(+p2*-drq zA4@Zy&(mC0O>Hd3WTC)U*KK1w>)XoAXv32)@TTSSdEctVOn3z%!x~X+-H$t~Pq{&-SoqJV$3;4NVCLpO3+`oU2*-iB< zX|BPK1e^p?fW)Doa!eG4$>k@R$PF-_>8B9nkVqV1y#uskF&fxTjrqOM;>c1(0NOzd zKN8$o-HEv+_&ym?1540*(`GQC z+M%S3%IGO51m=H75=c-|5Fqdcc*6W&5Q4npke{4HZQg<2*I)j;VlJwy1zA^zZ*6(= zLJ>HUf*&w4FhqWI3^wnEaTEMwF;|>&@+nU(KW^#S-LvNfKls6|&-vOX5>-F$@9&QQ zfFc%$ojtI1pV9XRNG4#;3|Kr5=5<200DU8X#`C;A_ujYW`ggwLoov`pk^8T704nQ$ z#X9rMGsPp1Jfh?ADqSe#%oe%)80M^6%n$$RuV|{R#`isrW|UV9NV=?eil|g*;!@%x z$ao&>4vjFsv4+XK&l`XKuxYJYuo#|VUULmUdBe*|IucI>b{t$j^+(zUrj{i(e__?H zj`BgUHnt_EFlEgHp{L=%M9GMOh}94Z^%y*%9XsIQ$N)!6dQ%y`@$?>+v^MajrQP^U z*GizoYB>CehNefw5kRTi>-4t%^zX~BdD%}T4v0mo+tTAlymWiafE<<(Xuys4MLhKmOc`IQHVN9 zhk)XXBqExq1HKQNx53(HAe}8ctf)z%&pH7)Zw{i`MQU)gKq{ZY!9n~?8lKo_+bHQsbS@6;Ke$YGGXZOADeJ?lOXsmb>RY{%C8L%L$mcYO`^d2^sx+(_qWe)F5T`|i6r^UO1Yef##Bs8m-A zi@Uh=Lq0JKIJs2Q2JMt$oiI|*0lwAnay0;-^Crt!lqgt>l@)m+xD|}cnVwr z+68=sbolHmRsmYzfL{EA(qqg5%!MYs4DC4C&*Infdl0(=DD z-`LA%*Y0FI=P{{#5HX9n5Rvyo>9LMHz777m2+9og69}wqv2?6dv^11KX+^K3#bQ`7 zC?rP7vhOfFwGBol5LTHWddWRs(A|M(;H~`s=ShW7n=-TPMawV`c&*pnnu5Qcx9xMRO1* zEXJMDVxYJ}z`zJ>*lCP^>^gbXs=?mg-v3wG75_4ptXzW1`hDxxTW@7xV4&fVM;-~H z5^eSjT-W7|FJD1kS-@IZjoMMN^setE}k41v$KDJ&^{=^ zD`vN`dUh*$rH@(}PLC3yEldP@qdZ885+0qlq5!40(G)QP#nFK-vyT%L&2n@khpP5H&gXT@l|K#?kVTzOnKKY7Dx92`q= z&7JGnKR!WC+(9aVz(L_h9TOq`wCAG*_Hj)Jb#x3ZB?(vJ`5RmxE&n&vZ9%rO7qpjwz=c8|aNUbBRfiK*VE^${=1P`KM2Od|q8`?b$1qFMslr*I)lgUteEss9UI|K-45)@f_qU zPNw#RrOcc^m+C|uM#m6OZh@z^!c;1{SU^<>iVFGrM~e}8?)+V3cDvu0_Y|GuU#ERl>rA1+gZVagbVc<}@ z*ai;efbHF-HZrS1TX|O%wuGgf!K;#%xGXuEEOSVFF)g8m@ng{14|<_jF#Uc+}^ zcREX3Yq;v?Yq@LpVQNA?eFV&WVUBM=k{WPH#$8Z8ckMpRd+yo52Y>I&x5a}#zKZxGZi|!dj$Ak&`F^sT~3%J?Gvf`tp$uQ+!8 z(iJDH;y1s(PXnBN)+@ws*4)b%zH(#xy!i{i{G%V-z9yH+{&v&m&8wmTmH^rs;kbp! zGgs2Eaw#nf=aM*a8L1PNkjv)a;9>O8MA=nnX>Ju4z53#J{owZ7-uL@no7cShRh5nN zC9*0sz{+~w^{<~aA|hM2Ztv6v>4t7^f|%yo3szI`ed8G~WC<8tDlfC!rD#oD zzV{b{KaqWJ=-*y`I}vsYREdT_N&aEx^bTkrB?1Gd6PiFs939FKQ}hua90%CPf1X+X ziz5RFJKNUdUigOESb$nr^67Jr=ag-S`1k``n8+1)>+-ow6};b5ZU1q{R|u+O4hbo^ zfBz6)dtw*chbJkZ5i$k_VPS7?Dt4{Hv@vw;lSiIYX~Jazin@0QeP{@F_QKF4IE$dM z7TW6V#HpA>YDt;XpH|w82KtBL$(`sz0YKN(CPjOD>&eeP3p;o2TpwN6i8MN$g@Z%r zu~FE05HUDPs9m^h>9WJu{lf=NdEcAgsQ^wr^;FibUCRRxJ*dw+=iJ>N`M`SYT zX8^KA&8YSk^xRHlTO-xY_0%*p;?0`L*xZ@;4Ryqa1_{y`kVl4v$*D+ z;V?CcI8ALGw6%4ROvaee(ec#J?zr>Km7TMa094jr$Xb5Xs)As z!5mgE=^~xan_wq3S{Z20!eI-Fta5{>+FtKrC+AWR0dC==ERgMY*V6WW;VgwakH#e0<$ z#cDs4=Pj{;HTSbYM}raf5ja{Qt-rbw5TJ0Bv=qjp%i3Tzb{s(W51GX6 z83z&xL_-oCcR@M!?1G3%s6_}=1Uw(s?*!^%hXhgf>+Qg zn-`>Wh^&X$ybskkfW1_rySv+a_L*lp|KtCBEqX21u3gK^UiPvttzW>Hgl(xgH`UUTvB-JCSDk&#Ru zgo9Mz;~=bDiJ*wW$6DbQ=kYocBr<>25!-8e!$O2eMIG|-4c{LN_#+x$li?Sq4Z$lX1tY_9lf_YESd66jn2hr8lmAdfN7ah9!rf&kUY}s*o>(*x(9UT#PJ|dk( z_w*YJUeHoFqP@LkS5HsRG2PwWV$-Hg(Yx=w^UhhdZQG6yWipv!FC!jwl^~G5rOidr)HX#xP=WwgTb+I55NXCZjw`8l95xS5aN9FIJh*p= zk#q)P65`T$*$Xd{`7J~CmtXYfXlYpe0V&a`Ec6YV;J>Q}2FA*;CMs-B?CpiB1iHQ& z=Cq@=7rkeqH-h6BP~Y0EkjjP+kqH9Mx%sAVK6&w_m+;G9+{FdwU+~b@XEr|z94i73 zy?KuX;0dHew6?Wu=$f_U%)(>WRPqqyzJKgOjkU z7Y_8p?jA(Ji$cHSI=ubuZ|6HV-$J16xl0MBFNf8~BARN@DzKxXz_=p167Jsszj-n` z+PP<+6Wss6Z(}VjZH$Zzm7dAZfy<_~-*sJ0?Z{L*)dtYrJ%^s21JNHp`2G)k;>-W` zl}{1&JeDtnh21#K4aDl|jD&DoBYu4i@l+lsl|kh5#B&Akd}7M7bE@K~syM2;3ctFV zpgKVz7BeHNpn!T}EBWzp^!NmfP8o5ad>*oSCgqUg`5cmoI9{NpxyzM0(G@lJLk@j;OTNURuEer7A1HPX zjz<)2>AGCHq>F-YC}&~sUf|ltv9!YH2>y|Ts!~OB9Z}>Wlm_m|Y(AZ?PSslQDu4dp#`!CO!A;)nOy&WsTLBBdF;_K*t)mu zWu7x<4&S`#CSG~L1zd9RC0ugJC1F-+1bvbT^r^>!>)K(C3$6ou`r+X%(NSvaYsCEz z{5EEj>#{RwsIO&mDji~Hv;!iMOy;N3skZvsS|(E|dU_7sK>9b!LLrB<1WfIo)jYR(T+wa z7w4&G@kd5s$9~w;cf|X68W%@bcFvd1st5s9)=}3*7rlmEyLNK0r|0^pyL;?B8tRk$ z&1GjXv$c*ufsoot(3;PF=v9vu!!ZFlw4@Ca0**R55K_>eO7r7qdYSM%Pys92nz?4h z0%DFVwv4q2uF^{WmOf7D2%s$CC{vg#nYl+wf2FP4P!PD>cGo}~iXDQYaE&ez%h4qr z=MWh9d&%a1Sv^Ioc`t-4CUOXT9Wc8tNq21(fB(Q1mbTTgtf`)Spdw=?q$D15A<(Ql zG{(mtdWIiuK7faVh)X+;DV0GEQT{=R4)q_|0Wd>uGg3-8h)mW<-`WwE5Q4kz`~~Nn zdoD^VmMmUEYg;S#-m@l30>r>LG}R&6n+&u-NJK6NcRv~m>FC z0_dKJY-&Jw0a}9VIH;N=L0c1kR~xzcU1a8WlbzE|zOx;#p_ZUJVb}^tq^A&phfu;` zGM?FvzHcpT*$F)ZM{QdPA*fDPQ(sq4TWjm#iOI>ED?8{*V^wqjD(k50o_p@*^4DKc zRQ#&1fx0R>S{hk8yB%NIO?z7EU*xP8CDlX;Fs$fPucuMmOfWu_&M}h9Mw|FaT`e>w zT+>oU*tx$(Sp%C=9)CFwp`^QDt8y`2m`H1*GWgxzc@ zX;m5(qO9O_j%u9r2af=xFbMv54Bg%e$IOW^8(M4r`TBohVBj!PNEGnb@4SxpzyH0( z8aS1P-)%(qkDAuM0KH)+>^)@79E50WYWm5Er>s<|iPTX~ipH*Ygm*!tn$9zSUMgL!heS$OAp_+qLMu2aGD9eX`x%-Clcp`$vGc0&jI(=dB&> z9dAAExZ~b>&e`XD6yW;nudi&PFOht`vMTGSt8-RY=1^~66(Cs94RgErtBX$JhHGBK zST>JTfkjW-hIa`tP8`t;)J1%lFc^Tab6^148pn0H?U{Xi=8?_dy3`2G*DgAR(>hzp z`^u`e6-9og(+o>160M5kh;n}dRm6xz$o`O#A0`H+-HB6VMkcQ9h2weiY3&$2B3XuOZ zA8#A}bx|cT?9v#!X2Tq)O(gi*lRLR%dq1~cb_z{ZaguSt?OXf!>f^f@%;e30QkT#x z!`Hv`MT!nPUDV-^#Q=nIR5sICzYDhPhJAg}&0c@m>-f%X-=#L0L?FrM^SthLuj8J3 z?kPUj{F!j&D1j-5&`je6*M*Ax7DMY8d33T5I(YC6%BP@{#O!5 z2$UVKX(bS@LoA!azx^K6-UCJs*c?fB&7R$R?Uh%~zy5Qd3xqhjg3{|Qdo6d|`SZ#K zTIm2()=POE>g@~r;n30m1YEfKIJ`iaib00zb(A*COLX(gDS%<;R$Dy)N^I^G8Z812 zj89p5lBOw9#j=)q0;Qu(UW+2`pfv7>j((w$PpPV3WN=fI^Roe}7$hTY0!0ZSAe`e* zue6QN0ghoY$bxNmV{D8~cf!!(91$S3B<2X>F_&BbBdLJ?be6tMivFnrhbD52=JVtO zpSX;X5E2)VLf~SkX^s{ssVNA73>1zC&>EDGD5Mc$(uOsmMeskE+lz<+A|k(mu&<&G zm{Lln@;TnUav^gXlYC{}4l>H)qrZNZkN;{jgSos>*9+(JrS6BNI{l?zNBr);x|C7< zo7({kx)3e(hOUUT0O3icuvc z1qFc)toUH4RH%zx3@szeV&_FDAf!vi$69M*QgSGj=i0lULMu(*cnT6RGiHf0OYz^c zOWF2!(H2<4?n8)!1LzGq5R<7$8v0ciy^5Q@@lCqBX92Kt$4<^W?_7F%dyA3-QbwPT z&hE~85A__n=#-OBXWf&JJx}nj6RFIU4*x&eZLWIr)vx>6Pk#2Zd_JcnNY&jAr>}sn z&Zq<8D8q_~X$K9sTH_WxgcdliOHf~hUtfo6sH0GuL?^3Ij$_P~gv1RL&fO1^-?I-M z-V|XWO5?@3XP?9U5B#>WQNF}ig#}PqM_mv9?x7ihQl?(6t2IVEE03Y3ri!W5lvV!= zrEqm=54t4yPv196gJ*V3R&Y%n`WK;a7VH7|-QN6_f$s>5>XR)CBmmH!5`zrfGEt z1QOldicVz^CoMs5+6|-Q2m$xrb1#=%atUAi+KrrX#u*&5_!w@z?KZA>!y6bF9JKFA z1)w^+x@F(NgRd1rJa6y^2!sC7f`3O#s~8v=)(<`S;Lq~;oCc(-OTw}Rh_*Jgln51= z^A^g8Y6*dm5`RVuesv8ZHAy_3!^vc*?mdjV|F98BtV*Dgaa1xv5KrJLMK+Toj|_#2 zOt6S0?&|KE>79DYso($Mk8i&d;G&Bz6!+Y-rh@#hbO0*rFJWDF*=5{$=bZp|0T&D5 zpci++%o*JLv8y>}<$N+ZuLycmph5&UMhZ9-+ljf0a0 z(>??)zr6Acj%ltV=LKbn!gQJ+kueY@sQx0=59{3?YV?Q46^J8@g37cCDDkMb2}7t` zfQCRACW5lbPD3I_?^KS@J-Utiw)Np8V!UEr2d8y5aNLY0X4h7ckgiE^5XPeh2$Uia zn#r8c!O0AJCo*gunBs{;L-bAMAn)Ty2e;bgtnLn8zqpGtW;YRcBx%ntj=rP7Z*d4O zMgu_&RgT10nh!m=nP2bd1II14`T>E17G6uD?Y8gm_<9h%_hTMvSk)W&1H_wH2w|M#LN-ApS_EhZfx?lJxNupsZ-DFWeu_hx z0`EC>F`qemDOWA)=A;?TG$j%^LL!7^GnDEe2!WIiwQh`gbv3M-*~EGC+j!Hlb9vSL zcDh^Z$!SPu1GXI+;+MM)@!JCf2m#&o4b;Y@v7QZl5E><9R5KeMz8zD9374JAmt4|l zEb^zu+47_*l#3Nn0_QrCp^VRU|GA#W_6ZFMZa7w$4~G0852{JoOd@<#WR`l{kFslOs<4|dmQDtNje2>EZehR}AXsxLlPZ68QLUTPj=AsjE zg8FK_wnlR8&7`|$GPR(a+{`9|yiX$SlS!wH7}t2lpaUbOigqZumoNXj zOE10j_Vw%6kN>fk{pzc)X3Lf>NB!H0C#%Vgi4Gx?qA@^q%;k3nhxy%seo&gl z?M+;{wA)aULLR>egD^-WF$dy~L)?*6IWBQW;yMyXnvR0Dn)1bDAc~67?~8nY8I7Dn zlXxwJbrmcc(G&#%%x@F%IJtbl7uId(+fVJ~&Bu51rSn&E_UtAS(j^<-_KrT=e0#h!x)+RWktAUFbb#m^!Hs-c9ARUL@!ztEm?d9G*hZ!$;G*!8D z)FyF-V~vnhQSZQ>tH8Q8MkYKZdDRip$p6JS8cu>D#zrv_sCFH;kEHp)Z#MGm;c-aB zis=1NyWb{ONL}*tpBV=rO1~)r7bAUuWEIp`K`I9=^*BiMWGd3hU;Fr4?)cdqWU?8q zzUpcwCMLx8Z94{(G#ix+*@)n<^5mHhUb8w`<^8@-* z1^QBHCJO=M**r1Vp)MYyp(@7A+5~Mi3E~zknDz?zw)#i8NTE^qNbR6RC;@EGx1<#; zLdjxFuQRd80eos)huz~D{_fXX7|rJR;`t}AYDOcz3h-6w2TYW;mrI3-$_(&ySxH{R zQXp_72q}mOP2LMQFje5e1Bbb1#~?cnkI-0C&H0NuxqA65RFZivkt(T6CjuDvod-2IvS3y@RbhRVq8FxREBgv=}Cp73>7QMe8 zv33hOn}OD5L{}TSr5@Lf;U?lZ$IQcDzJz>TH9{+@`-f5YuO&Y;j2;|E3{RnT!E|V< zs?f1Nlp6~zQ2l%%yf2H{I``>@<4{p2daz9WD zbGhuoY&P;rprN6G)Kuyht4>(8@reyjTo3S;x4fC}eec%F?p#R#D(la+KL6Rz)%@^> zKm5VQ&6^D8Xu&MprStjDhcD;EMcpW6j6tN%P}*;F(aAMxI}`HrqslXs z1Qs+_xxD+{r?_XE83A0raxVY(+?9-F^58(N>yRg4)1fKu-rdiA2M#lu&Z0a+$y1K0 z-dqWR?;~AFTe5~Tx|(^}tQO9k(?V;~B~yTc@1u2q6t1BkN^Lm&b`uS4VIyq=2_mo+ zsZ5|%fohpx*Tf|6`o$9zT$i7}_B7g)3Gzx?j`a& zcZi$U?`Qj=3F6f*Z&^N{cbzzwx`ZHC0404>P$Th$zzNxp2EY-GKC~T8{OPgObcci^ z@s*+}5#!O`ajv=NaeUv1Mb$?%93DgNK8((1(c2Hg;ps76BBa)6 zazcn8UY(#iSz})VvwYtto5_&(JtQI~AQ324Hc5#duD%9lwZn`SL{kI0r4j0D&5@MR z$3#dRr3hSs*x!$SW)EV=KAV`^&PH23%pHRnEP6~lg0ZN*i7{0f4(^JA$&4Iz=NB-~D z7amE%fvbP9mZy3~!1uX&)k3~_&I(2gdD2;rHTwp+dE-9%#wTg3tL3!L7FKpPu(Y{> zwz?Xs2+$}rl9V4Xn9A|&@HlJxN7*@&q7X<{cQ$hAqIQn&Xr?yiqO>+be}Kj_vuI`g z1tKhfKq?m{J=2;NJ~83aH_mLW@UYNGEp)SgZ;#Ji7 z(+KS#gr+9uP|%8db`SFHO?%kZGfHby4Ie#yDd*2^MLID86`0P8btN>+3TwZsjc$N= zAu8>NuIZw+N3|1U{oojXeb>{ZRA4!x4hYX2QybK}83DXVQHx;%$BIbdO2~L{a0n(+ zFgSwP-H#rh1mFKt3<=CNa3sXz&|D9*+7K;`P+x6jB&En?MjK$a+4xz>8YvNyo7o{YI%S?l=f7$f}^Iy&tt!&0EkBfD&AK$0O_+ zoPTY zrNEI6t0tTTPzIAK`7Ivu5lf9 zjHh_tJsWVP;OiHi$n1tB8Luc!t0EfK3lo2g+acB>*Njn66zBM893*w|7!&yd_a7MI zdr$9UbN?78ceQcN>Uq4pvy}i%UMZwDU_^~XXrtyRlnfgmFF*od#yW8+*)cZG`|jI9 z??eh@C^Mt1WuRjdg3yQI#kU;^t;+NsqTucr04P%h^h6rQr(j?d4v!+nCXA)9=bJC3 zo;%pP5?mMJF-TTHT`e@#K}#bv)Id!VYHA>vFtpnsKm;1Cl&S8uGNU%nL-;;=cmg(U zhkb`a$SjK%E@0R0-A5MLwMl4iH2ww64e;;=n94zk55@^6oIo;}WOQVNvGH*xCnqUw z)mJC0cV^O=RYHgwwFP5rmscKc5&yLKf3sH_)Y zee54U&JCaa^i05{=`~5j%TD00&R@wtUUfckDaZ!_8wW>Oe|Un4LIJG>&9N9W>ykK* zqBa(zsVdHt=aVZ0NY|mQD#pU*I;y3lpcS64P{MH7wQbwyJ)iS$f5dpatAJy>I%rQg zJhpFuD^|?m>f;tLyRI530=z&FXv^)FAhjSsMW8LynFy<8i6bz&e9|TB2lS0+c%W~X z$9hLt+EmB8R?eZTuA1?JXH^O%N)yQxht*KhaXFOE^47c7lgs;j@3kj0yRn)=!J@{I z#;zEw9PbNKf}*09iipI25N4Jyv_xwehE*J?afC~%;PIOShq?Kwee54i@!Dg%_|WQO zm|0)NMBc|y4hjz`V<@eWLKP{Fe_{flgrZ8unaJmO%Uw^gYa|6R$2iPMX-Dd%Sc_8R z;ESpHH_2DToUj>^z0w%VU)Qh&0u6Z&QW?Z}3O$j6sVt<^=J#FzUco$1*M*pM3rxh2 z)d^Hh5>Z=aG&ic^P*nvn2N@`|uS~`770lxl^5AQeTx2o^n~=>xI*XjjqYfU5l8)D1 z{(8Rp<$vRzHTUq1uYZFLPj5I%)*m+@KgWU5Nl0e^sI5t|f8PNDG?`3>d@e_!P#~2~ z^X#TgJp9;WJo)7MiA9U%J+^t{=ET9?UXnG{okBQEriu!NjupJ(65B>N{l_Dzg2zp0i}XSUHk?-#D*^v+iDUO*sBt!tdylo3Bcp`<{n62_U*RtU(nx=q`` zwUj`RD5T>M1Oc~iKg2J0^>W3rbGUNxOfmrkf$^d*w%QG?PNBH=?hS10ALaHpoW}Cj zIx-$0d^C=Q1}a=!(^h{$Dp~`o69iUq(Q+3wXyJm+Tl|`7p-ZKsmU_%}$oW41vFQN+ zv33`-D#qtuemt*UGLtFKL-^o30j_pRsExMJod$}Wj%X;Q`xRyQP1Wc~!^C*wosaQM z?<6FgGMXmB0p;7*D%55WFG}GeLs!ML*)>HxK&U&VbO|d~7p;mF#t)znm{xY)1aP6k zI#xm~1_>8KXK@X_!w+e$0UQ`cq$be?53+faK;`l}) zg98WllSm}2^0nsS#~q284bhbcK1JqWNtg5E5x`wKR zYe$9xKL|_;tu<0WK`SQHDKeQHst~~bJ~+?|o-SGtTdd8s*IxVWn{U4PT7VCJ@PmB$ z%U`Z+=9L7Xvi{h0;e{6tty#0C6@X)AQ@3;>H~sx(ESlHNw*Fy`o!Lx#!o|}Lo^M*` z5hq_1t6l*JDM>gEF%ghcuyuHx-J>b$<1v=DHPDhsARI+pNCvZ6&iu}A4XsHPnAK3j zcVBZd3!Cd0&-vwhve1!!fGYhtbo>+390x6h&=hnIf#V|raD+>JQZO*(@$HSfNd@qx zWwTjOUq!*TvV}GktK%qcdinrge{?%vy?7NDFY070Q$R=^Q3As-X;Agz1&u_yM6obJ zNQFK7vfqoyEl>ecNE+fXHVjN~!y{YSba0f5m(St@s}|B)o4`{xXjlp3kgqSbB5BHE#|@ez0{^U;?*mgSd_X!qD>2YcoZ^O#I9cS;E3q}Jm+RE%J?J8mM!DTE3c%n zxrv6ldOEwhXliUkYt65I^((&em9H=uDi=-1uWnoW0 z93C_YmN{RIMzl7!OrCP;>Z=?_-t)^}-mOnL^rnsVt#D*Oq-^b3TIcyY7`iY$tqJoL~*{}LoV64$ zFw{XadDnmX-24Si>20M+sZo-^*BYrc$F?=`$^{(^q|$u#vF+?h{+uEKBvJf% zdN)Crj6EWwN*#4Y1cpv4-8j0g%CykyYoVbQ8tP1C-P&MK^YNHTI#lq7LHGZFs!$xI zyFe@kbv1~#2AJ6avuD7(nJ~Kp(b-OQX9qPi+h}TSrnRnthUyw>suILp2iLLYNV;ge zt%ZoxIggeVMl@oZXGuqrh{cG<;^=q`zpe&mG@1KOW&~(_-_u&_(?-WeFKBLTdf7kx z(j#EuZg+bzP*P}-M5iKTtdO;waeym!@0-e=M~zK z(^~4L^3ugDqy!jOln8#V;4if{SOTT3YoWkF;|pz&`zT!3A>{?^9!_!EtX4k1ZacTF z-Nm=BIFsXAYso2PO^SjSSMV>1NzoP3fRyL}t9KCK3Wut=%bLB1`G;RWLwhpLjjvkC z!loKBz6ZiZ;3IKM+#JOb$5FzX&)D%qJT7_LFP`GbgF}c|0(1c_fQb}pDviwLQGv0H7I_bmDWEbL zQx#_mkjWZqVxa(@DrpRqjwyu2Bsdn65I3%j)p2x{t?sMrmy{-{my(3zlB}*K;kr~+ zB}l{#h!1VlI}PnrfU>gNRt8%^xs>Nwz#=0jSuWa%qtKtS&S!GMvmZET7v@4m@)_@y#$oQU>#tlu{ z3~ zqn^pULJIKla9)hAd-h2>IB4agT?b+L_fkoa4uRH8<@3CH!AzF7HSo{BeTFOVSj#8Q zTEayOx&Td}46i_iS`XsL;|T4dMS#?Ty12{NHtgZaeFIP(N8^KxBSHbA==wT;`DI7= z{*&@ZO@O1mS1fi!o4^(cGlg$l+ubsOUZWBT=tw|YGpgW2HVf%2I`5$ygCd?Fu{w_+#}gogWB<1T)s7@)J9w^?#9fzIEKV#Iqbe37=DKD-P?|t1eBato zTbE2}6LLjhK6lo9D@xr%CWwBX>NLay=rG;4=3g2TP6D?nP9~QoCnTJ*6xBBjyL%y> zL1;uKlTrH*?B9L-@)bP$%$6>#^?(o}sObMq4DmUl~QGx_iXFE!F81e3Xd^Jcf37NhSmt0{@Eil8P@VhpvyK~Wj9!}vB)T4F=Ga)%>9Iw6!LwzaotYlx7P6f6Bm#wXzP3^Fw@LGR4(Pe zvoH+-kG`29D~#|Db_Oq`)d3Jp0xQgrLfGSU)t*|7Y*a=Q6|LQrh$_}vj8md03R4_@lEc~vW33-

4d8KB^>|KoW$#oTsWzRNF#S>aPP4 z>p#N+A+J<=`Qa{Q&ruNodzLW>3Zy}cp;qmnTq-j&J4@@7mFQqE>>WY(9Dvz5BfwpE z-a%()*WR-?o%3Sf|Op*vp?oF=qX=`JaeSk`rS5IZk2WK#bA(D3IQ&)TJi z{AMB|*?UV!qlzjL#s)?6vOsO&0u$Z`<2&Jv^U=_)hsOBE-Z9?()U&W9ON<8xCUk3O z6vxM1YB~rsWu+Lhs(w1ICxIHc8KT2qy5Lkk{-Vp-H8I00KX((`j!e@LiI37G6%jHx z@!-gF6Zk?yqZRXx@9v-(Ctj5>JGUlmF`>dOCrQOoe;8aS3-k`!!ddg3;DR-j@AOw~ z*Zvd#J&UnurG)9MV0t>S13i=mdZ`W#(6M5Ou9eH_T0Thk@*#Sb579F?NZ-&9z03OP z9q6aKua}PQPHLSUR4O&1QVCs{}9Qr3xFvS2NJ9i6@`phu_bGR3rc8(-QV5FET(()y<6>3`E~ zKyV5rW9Y5a=!%5iO38Nsiz6{END!wYHZF7Q+3RHyN4}d{vc@V&oBbqngCWfsh;P!! z*7?{!F^W~km$wh|6Ki@od(A2ub4|Zk(yW6a*T8fuiA%D+$@G}h^DkKm1nNn` z6S_M2#EUND!j*me+`r$%cOD!Kl*uVMdz@)IAcDk(vNe2d&mp$#A48%Aq&|}0;ZL*% z!2iv0JqEx*B$VA`UayH}jFlLbA3{@TqQn6v?jiOO_z_fqcYgjx+QJOeJ-2-S|z zBp4&G;g8?)hySv1I-@YAH<)TY3DF8rWC%5g|wd-kZlx?7F>FMfd_XXrc>=zv& zN~8W%-c>^bU*7p=7hV_-6UC`gGZFn&%RseEZ`Fp$ci*%Jf-_*8w1Ww!S!(d8v|$DU z()6><($EjJ^=P(L`L?#vX2Q4kkMZgY*5i^m0~jjvd#H}P62OmGHHZ|N#5h&nb=CR& z%B83AnlIkQKis~XvXM~FHDof$IMl#wGvVLv+0U$tv&_Rh5t+h{BXBr>;}>mnOQ>pF zsA~xypMPcKF)uyQ#(`CM4L9IRKvaL(!0ty^Dm#u-oe))h~E%9Xd@d<%Vj zJp}+L?BunPk&#!=zcQ4_&acyDBRsm$`DzyZF9h$Y^Pd;VsD_3fpT(?1hSi-Nbd@5y zO63KVCb?Hkfk%GKD(g(lOYFKuob$uy8&jshS}Ee2dk!;LEpguR-uBFLZV(}p?>zyc zT2UntLB--!n2B4we)E}pp|Uc*@5mWE*GFV2_jFP&RiILXb2h*QXL@0!ur=L(|Bff$f8X}6_V@Sv z-|=xzU;OG~x4St!< zf37N&jL=bz=&Y5gl%g;}5R~ik3p`~C(>6fJni1hguE~ptA8%498_VanJ;?Jntf6AP zB(NCCAcPg;8<0+v%~R4|2`}@k4yId8Hm@AuL(jdOsixys{`33HCD36@UP4(Csv>;& zjt7D$O~|%L5&bU(M=3JDfmM(b;(AUcmtEFiXfU-JQCFv@7#~^&mu*5$TSbcA4-F6N zrY?*jgNffL#KS~WB*(LfWl6~Z9&@!^fa=q1o4)9w2+VJ7mfTwfxO)eB-!)R zw7(dC>50=UQxF?RPe&PxClE3!K`Bl%bl(Oc>1S@U1nN=IzTt-rMHSy!-4R9Hb$Eg! z^(N0aeF*2I4Oj*hCx-w4AOJ~3K~$8Wf|xueENaJ7I4B5eyncZT{Tt0Brmqt5cUPa! zx}IKs`rp3A-sw7>QAC$5^WFX9+`RXQC;SQB>tNb*?u8xu5P#A8a&p%$H$5Xi+{+x# zma1^83;RX@r^XmcU7b)VL#c|My8*fIOi!W&k~q~}J9jX$RsIjGdDqrSz`v=83O^H$#zQ;Vi^R&lTNJNR7%F3<^28Sk+ zkp%^C5}dywYwgP#0sY@SHE)~F_K}gz`v$p+HT=i@2e@MGa#nSgXe9{}#<8TGDruJ> zP7n~F;xMiRnuJ~m=SR?-mmdC`tIy-*8`tuhFW$cLvlHp)@T5qmEJrRq2l{(ScbgqM zcDTL!_KgT!2ypGS*Ye^QzqkMZg`H%Ugl>J4bA0+x@xg-TKaa&1=@XbAapTmp2nx(4 z%4j2Ibyp2zQ_c9Clg(1@ZHB+}gBg)9=BL?Mk^ql13^f9cIN`>6yQ`6%& z_30^9k=rl4aP#{={E>g?|IBATQviU%P6D5wB;C1RaIrEyJLmhm(v2e@@Mo!i$-4eM zBS>H%%S9Ip8vrv0o<)vI*}!0}>S=6EIsq`>kt=?#UnLX9^X#QwEFOzeK;x{5a(T(kcmH6>E{s4u~pXEj(c@T)fc}D+NS*=bd-F?yuhY zp8Wu)oVLCI0EL~{wrbU?f6cF=IF6a9&-#d5z!}L!-f8VHZSa#Unrth3&hP%$yaL(+ z(vt*7r5w>$EeDBEKOU$-p)M1-Q5Qr+a_VWB>YRC0dzKa9_K|6xvZfE!1ZOlWhn&2= zK>|RqphAqYrn^cQ5uwn=< zJI~(-IG1qGy?0kutzD=4cJJ~IGdi*K^9le^SZ15f+W3X+m)O&M#yKUpc5P8}k$V~$ z2l5c7IOi6h7)Wn>rzLmuN(Rgm%xzi6Zz@*olK=13{MaL;-4j z8P7KiRB)YLh;x|kZn)w?Sl*lMcn9|G(cbQ!I4ZakGch&UfibsGwgWij_uujd1pp}Q#IZNM=}la5#T66T z8i^Bdj`7K9tT8!9t&6Ovqa*LUBySez2R(t5$j85ycNi%fU^R*`37Ek3ol%^UCL401 zG?{eh{Bpy??g0zfPszsnV64$(MMo#1agYY~a$&S$(A4NHfV#!81L_ngpLQ7$V9Z$|qd{NIy z(w;5~0fFxg@Yk($RM1KVV*GT#d1sJQKPbKSmtM2wjcb>oHv!pVk zCVSuculqv;1nu^POg5;QIF@zP0?+|RkitEgGXN?1kvNP9!&5ExPR#_$HC;T~mm&pF z*m0f?c$i-ii^pz5fI6e*W{H|9VxGH@)di1pp}Q#IS*Z zW&R(rg2wDVJV}zoo@B>p=CtRH{c&^(-lzX{Ue93ONiWPCBrai~TJbcy3fb)LJP?uQ z?@fpzW1o zWzV4_v|<-Byy;k6p!$6X;{Evzd6K2wQ?KvG`{onIIHxS@st^T7Z}6|L3roz8NZ{w8 z0)V4S1!35Ys!h8O9HJ(aA5P*}DIKv?p&SW!4UZK~{)L^`xq%%2h?E0YK+=Te1Gvl2 z_Phb0GmY8OzkcEqUttL^hXMc;HqX|sJ;i0$^YjcejTR&0bxcO$6UG8VAAoc1$ln-~ zMfd7FW1cg)p@GzaFX$soH3OW}EOU_352xTkG|xBiC~M4mG>}lBRw`!`4}$o@;7RW3 zd@jU*D2WR9k5BnXN$roWyi{0W$J<4|Fn~#O{owQD*!-YOV_H^>MOH_Fg?rM>>LjsnZz11ujAe{ePeW_ZPRVXww;M>XJR{<*tVTa zJh5%t*2Kodwr!iIpZ8nmU;paWecyG}RaLw8-lb#S(H~{)UPqm=IoOJw-Mt?#n~|>g z={e+XQkj;qy)@^MWK$?0@$5My=n#bhsKpLyppBz3-%GXARa^{%vn`;Bwbg`2fAKgVQmgYpr&)XU=S^nDQS~2-A#i@LSBI)s zYt@^%xOD#a&g8uI@wR)hx^IX$P3%04BHF|g`38)Cz&;Oh;Yx!fxP=`b_+m_&S+in* zJW6VTnbyIKi-Td*Q3VV!nr6*&RJ*6du(pjq);oPsbApg%5NCJ*@}ww4K1f}$CHbA> zbGbYoT7zrv|E4LEpop7mM=jtP(4~Kg7zWe3daVo_3hWkuCXFK}&zQlbJQp5k5w?(& zPMZBh9=W9t^hurq@*b#x5pQ$4>b3pOU)4;Wi26OjZaFzo?`1MU8w^ovKiKRA^2_eh zg`Pa;c)R?Ct(!(|PI8SimK+w>3XCRaxhI*d>f)3nM%%ZKJ2b5&@k#ePR{jqstyqz9 zgixYjzo?Le1cDHgQ3HP9M;OyieijGaL#Ay-zU&fL2ZXrjqFB!J3xotLwsl&XwNT;g z(KlmNT_UvgZ^Ea%r|>-$OK~Z>0XmkUq_SFMpb$`^5;z zq0bcag2sYDjF3dS6{7IQo5Me|b*| zwn@5Vy~Y*ThBx159z2lGm`A$k3$Elb^sjjtumP2e!rzxEfWa1#`)>oG#7^Z z*;$=VFi=d4A4ryr{Qevu`jPRmpKi%gTc2OoFAoV%Y^d*S2-b*6o&2F? zLGEyMIy&~1R3$3#zB=9MU|?`USz1ED^?uR#zh78?UejUceZF)_bVpLxy8`}>D97}Z zIXsz6(d@OP^B4N8Y74x|I9=sp8E(D}!r`bQwb+9S?SmRUAGt`i36|#cMRFYnQp+>>>Eb)qs~B%SrR5RcKQ^CaSTlwEKY(SXCwt@48q=;i@PNv?a{l zov}&e12z@UJJ^qHn1Ri($8^_bBKlb4Rwzq<2J)wtKeJ`(_DlohFdqpqm>A)Iu}ben zWpEAbM~Y5xpY1K6@E$)Rj*bD&hWu65V|X5zgLK4en3WnXgx1&%=KQop{(#XH2v^0Z z?O9O740=ulwvoY%g>aWzlTGkbnOc{NV$$Y(GP!<KV+R+nFbtm zG?^KP8sf4!PENY9NqgT`IX9v_XW8@wb2?d6vk`7J_z-fUKMgsvONvZBL#fI*iYh5~ zK#ep+WduD;^XLqY7+q!ZX{FjJz4q^Ml)!9^HyUy)a+x9Mdf_ap`ik$tih#*k6CA`z z>~tNGtJJIhYsa=~07^UJ+2;P_m0 z{?2D#=igu3+rO{$zYg{N>PLa~=El0U-ut+Y&!PfBjC3*BDuw{xWd5h|M#npo!nQYV zBP+cMJ}do5RSQdv2SR*hyWm6RpZOqe!36NY8I0sM7uWDeHK3)MgSYkekFV33&5up@ z7RTGS!z{j)q0d6sE54uqY)DILU=Bwcs?TLFJbBgH+LtGZ)2qlV_3CY$cMhGj<6 zD6ddIS(;I;fv~HkZ_I;X^9EAT##RfyMUkbxmt<1IgZZKfNACLzb2O~4A>Xu zs_N-l)CDHqCf3n2(x|zX&@-eUM_SCR_4`xt)HU0l{=A5?4oi20zV8i`btSEVt8L(e zh6{0F?g!MXiWdgYFYx9J=fsZXqj5WfKdex~l`x{hskE7BE`T0xmq3hjEXL4|n+eug zE)2dDiD7@E&yEAp)oJUFQ2zX~WI&51UXdeYC6~_VF;`oMiW&Rg7+j7qNR}gZYToe9 z+^{T`I7v0~kEFp=P~32qM6#&q3CC}XY+E!}w^+FXBTY?O=chY62A!?xh$~nU+`BhF+v#JL}8DftSOk+@;Tgs!j0K45uvym zKbgX|gw~JV<5epASOwE=4ktg!SwcYkUpK1~IV?HBd2fZ0uq*X1kjMQFijU3bjW9MH8O3InnJX1oU97@Gxk)q0Q3*x(NWOI$vwMo0PnqPQM?k^M?I zmORUNTBTIe%`8}ksN>g$`~e79eXNp%1lgd8UC`h*WrS8_K+!Q_|E;Aq4Hw_}tC_kS zG=fZ%7ubS8YqDU%%frEq;l$;0{uw&0)9|VJ$H>#=dM(IH^t8_VS&!$fHoseE5;rXE z1(nzJcK5Mm&uwOpYnOA4Y#TV1z0pY%#>aGrFAg4e0(jQjD6{f8t0Bt1pj?`*`t|r6 zytke60KhG8Xi4TzChl<@FkN_;B*%J|%qH(_{9H|FvOz;-ltHd<+zM=K#X^^` zVoWjow4B53YoG<9JN}+0p4wePv~|FsJ+h~(a1fW{MW$6iw%Pla;$f_&9L5ZyC#@m>x-24NA-b{7D3vtATZodzgriB2;0{Ljn;HIs zGVm@HYVX+Ze{ITt7G(Z)7cBu8Hhqu%o#HF}hX{`Y=v6jmbW%r%9>s=hLsaejoDbus zz!t`S^svRi!EnC!@MZUVEJT|7j!a(M!fG#8+a_i6v@*rxnEv_x3-3BuntK6876bqb zaBuq)gxW(v`njaduQ(VGC;%!xEay^uzsCC{#atZF8XhL zDY1I4_pDXZaTTaSn|wOFp#w$ibOq^B7mD<;HGNklGi~J50y6c7Y}NM&s}PRu%QAa{ zvFWKDc9u3ols%J18I{JU9x_ATqK)it>kaN)j@0v@2;$&QD@$nK@;u+o&0||a^a+(_ z$a$l;-8qO#a%xsrO2p$mk@^|A;tF)EyVT(OIcvirsC(3iEGfuCIb zLyFb?+?8)_-iv_D6!*r0Uj-e%?oK^ZXPkTk<6R`c(*JQB`)(W(ll} zw~cq;oK@vRvsSB(u5taQG39qSN8EDVS1S|kTSo`v0RWWLfKhrSof_(4?y$^mSq|0E z%&QQ!sywHsl170?AVYAYa!Rx0Vy*9@y)tcTpJ%D_ zq%y<7ro9K^e52gVAR~|PWo`=tz^d~kHVEQERzro~>ESo1<4MEwqy^%+v2>~L6bF|` zs5#QZpnt-hZ4+nL1ONP%2}U5o=B2N4n$KaoO*5yz^1UZ=6Wy^L*rih9Lt0r@fGK zpLKjQ#OSNk(CcM_sx+Psqi8^1!T3cZiIBo#4Pu#qGK8eu+x>?CeCdxQ99HH{PXt8tl8F#R6Cwv zfF0WyXJDKz&;M^e~;;|0ITyRjrW@bOmXGgDv(zFWH)eND>%ywa`DmHxTXfZWQ zYMg$jZW-L1Y`;_CpY^X1XSP^BUQ#B;kxz@%Lz3&}m-p#!I_I+$CyNaG3+}=6&n_LG zH)J0I(-LiDO1az`^?kJSzRC=8$;jN;;kl@Q5XlNF`sM`FBK~o6VAkx}>^HQOAvm<4*$S;A94v>#=-yjwq0i=YmYlBagh`4f@*Yz98TF;I-#D zzr6lE;xjU!Y6FL*zA~^HjHSm`=RTc7`G$dwR*PMrR(hgq zGhTVm69#--G7C0yi{^Yy*b7JcV5+8N-IGR7^VmXQ)m-(J8&bq5rS1&6f4%R^E`k)+=>um~~tqgce0vmO%t%k{O*tz$|~N}Z1r z>s^{Xemt=k#2Tb-FxdVFb`GHV&9ifZ&V~!%;b(pt6CowN_PDgxAE|ELa+0mx5r)gF z3vK%Etau*}<82d&k^3pd%J)yuaoVnreBGW34wJ6(WH7EJ%7Y(p01kir8ja;^&N?bZ z!{q87It>o~vI<7{+*}!Dnzz~2$)b;U8T;X!QIsB2oQ$mh7pHWjaL*~qKZYydO$Su% z^`GnK$0O_XexraFPNfxr?}8L8M_xaySD4rlD+a{_Kexf=-Np2?-MX3&a4d7P09+An zH~v!kuO}B-d(?kpS=Mom=DVLjxSTlr62ZqOJj{G1DAG#dU^f%I%iuV!C%&w)jed7= zL9S8<_l_F!RlzWx5E1{3Oop0c)1!;vksu+*heQ*98Vr61D-BRkIuj9fmzl;_GJpoB zl%|6TcT5|ck%pIJw!u9y5mPU(j!@Gu3_j#csIrH-btzt@!8r@ekq0=!Gz)y}bAI#m znx^vA12Z#0&r>j?x8X<%y|%CBoX*Y-)da`uhkNVXLJ|`tfivr+iLS-c_%i=`_gpjg zqaQr?L#Xo;(z^#rm2woesIkCa+PEC{?c;aTf}xXUOtGCffjIhpZ#ybx;N(~?OgxVn z>dN1$%)+yRU<|bt5ox6XIL@1! zd^svTv;OHgS8ZNUKz?gjO+)GUqpAiK}byiZ5CT~>;pfgZ!cYxf^G zNJ4g^e&ta8ua+RGu%zK|Bd3%cbH?^VFqx2E14l;@n0x)OnM6`AD7yb1gIAcSi+d}C z!szm>3g;5Pw~zV1H;fTKBJHc|z9+kZ_tfY8!NH&$0G0M=27BT7<-K+@CJh>oryx=A zJ<=H`+3v`q=+XpC&m-;kN4?{pf^Ho7dB5YNXYbUVviS9pqj>qW z8RQ}As`JYt75Z2C6C=X9x_-=6MJF^u61_uZjMLMgEe1e(dingKGOukX|8H3z2Ve#B zo_{eH$%w-#6tol_L)uHgd3~@B6{8qQlFN_faOOZka1OJ_ytR0M3oe)9mbyaR(!1ru43=ClSd5$n51=K+#fa^BX6;mVw zrMG97mzVFKT6-G*7kO?Yy6!Z+XnuQ?b`v!>P>A`%4&(GdAs~+^Dv5)5$cfd4xTI?N zH54}#eg+h9K`KLiTsQ*1eZ90kV9&t>>>H#x?<#m;Y8&Gm&k%eu&# zGJpdR;9-I@_l4{&Dw04{GX)6Rw>>V613|l$gt}b6p-MA`j*q)1*DfC{vaw~m&EbG_ zo?)sA4(p6@$^JPtZXfI-ofSvi1&CuzO`h1QrIp^lXrfaj-r2dkzvV%p?C$GfIh3@-lS(5*t zdsoS%Uq-@k_QYJh%tjVu`Z08A%wo3b663kpfrt3V|K9~bMJS@o0CS7+JgEitswKSw zT;8sRUjoInQ)Jyjw2;3$8qGgGrhDEL{`*so_WC`$ejdY(HMouOpEhTcrq4{W(>ILU ztNmZ6n1_-MP4mMfLd3=>N^$)u@~8mjFlQ*gLd0$iS=IJuBxB-qK_Uf-**kol{ntcSWJ74+RZU4Ey zH41*xYGVaEYy5iGSnE7RZ}uh3OQ%xLY03IUy=Wxg8jl?T6Wb5V`qa23^ z9A)h%UC~T$)Ipl<=S7`2cpd}m1r0;EB@`1uP4ts8lBLMosfh`y-rCQ#+W*T(Umw%o z`2MUMS&lwx9|VNKtC$VeY0sPOff^W@iNiV?-;84b8Cs`XK74NC(ixYr>Fj36F;E5& zG>CtT{jXSRD@JfqQMb|lu)nGc;-LWIWWN^2wm&zw`L2k@F}Gz6V+Za2?m_|(i3r>B zd;E43aHBOTr#v%y`alpTr<|@rnyb!h^3K+A)ExWOdlUvANr>A0A!w7P9%38`8ZIrlByQf8+b;#ePA$fNW2b^c%k}F9a`(S;V;Y z_Mun|CDA6IUFmituG{x~;)y{5Q~cJ~g~B(sKW%O2ol1Wkwin_L<-~>OsJmP3D~ZKf z&_S}k*UUOWda-B^YB2^OEJ0fb><9w~aVgZpRED1z;bW`7)4Z$fcm_*rLnzC{9j6W| ztpuxg(G5k&^{L@q^WRYlyNvyMQFy%<@T1LrohW^VM?{<|xlwDq3Nf4DwA&nWM~a%q z!CBB$>?^+}evSwTcGut$vJ1l=g5xjOK$ke6b8cGcEC?M}d-A8a991-i1qVh6(y=GK z#!p! zm&UgL-$c3T0w_bK;|rwyBn}E{;bHl5C$^JcYzU~{D?dWAGTKn}aa3JaS(HQ!G zg{BO)V0U}(TX!Yau?M5}=vdT;LYxix(<8!+au|*~pGy_J_LR85MU~`f$=vgP`Fhu9 zyBq5mUxC*L;=1e2NbOODd&9!%cFfoJJED<^%$G_~X9gDf4Il<~B87f2)|rd+nC242 zgeL+o;s@Dh0_G1Vc!9b>VM2(CSQtAsjdsSImGR#QB6bbvaD=<{{dLaobjVusL2Q|D z-VK$vW$@HD;C(XeWk~@eFUJvhu9$_O)MGIUfj+f6(hgG|mqz9-M8V}DP)$$5|Bvw{ zT1qgx5MPsL3?;YYSxE2x+wSPii%7I;7eT<0!te3HS#wp@uw}6ydV<4Pujv$B&tpnU zGNW(xojUH%j~g;6X3yyuP2{2XacL~$hV9P*1v`^+7xP--+-N0AU?Z+A}UL<2g9sQyAvgfD>oLI#-z~B1sGVcFSCUqK)=FZ!usEq6m-$=k%Ddo9#9o zt|X=cW^gOecnpcWuPV0gZ$PalTmdV86NaOZOHkm8lHb^Ip7wt!Fl`M^?`AK)`)iB- z%L>ZvB2XM{vprPcE!WF}Skwq4)wR2VEcn|mi$tw*IIub{LeAa4f_`4LqONvpXTbgH z2#f!jZ|k+WB3>^-T(+OC?@S30;8r zhtmP2V;KLtYRPRCyw+G>UPiu8`^dbG;I4q!F1$-O7{-JipHLL{*)82OC ze0{aaWlp`m)xUKEN4Lz4+g}1bL;79swcO_y(ZJ@g!Id;G4CTHE&OsMLEw>}*T<=|0 z{<6Z;h&Vx!<(_@8IAbfbhdEfQY@(JRA|%7y7YuGzmIoyN^m@iFN=NZN`NkWg!Fj2s zGh`X{+sJYu8>YhI4|9l>O2L-J?Io1NYiY-`!#Y@~B#Ghu+2P0Dt2MB34HShuLKRp& z#Q-E>-&$%pYCwg1*h2jPVaI{Xi@0X5TS6Wg!|Qh9-Ck#hPnP!LoLF?g+MIEIJluEY zbmyNHD+FDrjM`xM;QLM+BTxij&BZTCQB z(1Rn=RQfBmJVQn@Ax?Ohm`qZm zNM`n-Y?w}9D{YIC8?eL4fZ(Izd5n_Po@PU#-%q9I+oOe#?$Knql!DNn@ zlzNGo;#l=HiTL(3NVDg62>Q1QS^DVixEQkd(|J>Ris-C>9OkhE?xCB1?>Q0Ivp@g_ zAiAzC73Z~p?v2d^lO)}3crM4eF_3z-9*Tx14kpJykBnb*FbB@?p$G6MA_YM2=TpVY zWWrzsLIFr3DvbIMVxT4W0*YZgbhF)yCb@pdqvA$GPO3$=sYR+)9tzmIMIS6n%5$@H zna%U~!6qm(W%B44Gjov8XwnqJQqUMy!A#%lQk;EQa~=O=WB)T4GiafR0vx7)m9gl5 zYk>MYcu!6G*;REv`g)+-ZD;r%Lj|b%-L|;jy!Skp0P7Xtj$5VvW5u%XopSD5@5V-! zyQ=~h1mC&JN!d*cr`~`JXSHDgj`6}PyNStZ%xh4zba7XHc+36^8-aAqKT9EB;`N6+ zDbT_l*|4#>bi>|og+AT|3422kP7;->9}OX^WM)PjX6y0Pc6d2EQ@hMh@@$e(4f(B! zGRyD|t7E=PkM1+d5n-y9O`xRdFqxUs$e?eAJvd0-qBap;OIqW^lGGKYb@N4w?wWB0X-iq`?h<6q$R0^Rl*io)eH7as}e`>071tGeX)^0V2p7(o(H-*04JxX z++5t;nkE2PUdM|=fp-@ETl-ux8nGVS*1cyCX_Mf|%)HjXGt0`C{_CEwM*@tJOc?nj zi*Qo_8(!%>;>!Ct@@lBXwk0p9yRgGvIUbVbVqN)LTw51NMC_+?pf=><;IfKpJ$95T z4@o3;{;G@YPzAE;?!Hx}=h}8NmQR?zg zI1GUJwjGIvUkXicLn{&p%pc)SEZ{AepOHC6lF9rGhF3)QjK@nQp2W`13aO_~%LqQD z)_;~4rupd_6PvU;0<965L~?Q>sQxq%0a8>67Wsolo#~L}Puu|)Jt}t!03c~33pz!! z(TKL{j11AW^XFdt`tN>C-+w{bze=nBRZ;49?6v*1Hnqw7X>@w+FEbU&JrXS7L-_r0 zW*%_=*iOz)k&=A8ju!&@--4=r4}S)RelB{li#JbXl_JFX;uDz(;)4Icv*-!{tg0D1 zm?}aNRbrkxy6E3mIAkkPmchG4cJ;oi8$M29&(hGaDS=L1MPz9W;od^Gyj8r=f13$K zY_#Hn3+~tNJ`?Wxt=4bIk*MW9WHA1KKSkB=d3$XTpmirSFde1luhER({$9@tf{R9V zWi3AqpamtfU~SI;;J9-2VRD{&oY_(!BW>uhU*2x!Pgmh6kXwinNvZleq^47YqL*05| zDeGjre9=Q|D|A!Jx6 zWU4+pH}{l|b3lY1df!`eog0KorD!p1ix!Bn6q|&XPZhu);7tGWHfhTv8mIpftiMx8 z^l9qKgZ7{{>b_$xzWc=#0ZQcAGpsYWN=3Ot_gR2IPJ~XZ^)8lz8tN(+=4P**OP7r;>AB# z+*^u40So#v!{3C|+yKDRs}gVEPKNV@{IcbOd73qwR z`wTKmgz(X8BqXHLuvwAp90o3D0=jF71tV*WBCSU>&@+drpq#-G7(kiuhOji|rT}cK zEyzqjfG^N+hS$vZe~>4G+j#Y}%g4i_LM0Io+unLlC5FcvIn&HQvGx1Q4PLH-jCM{6 z2bcP`;Z^_NydcQEmV5W|0mSQgSL#yR0Ym&S6&F#V>hD%1fq*rALk$CCh{``0#jRS0TLWmFhj`C*m!oWa7&37Atwv>{D5j(js+BId`K4AkCsgyg z4OJ&)v-K_i>ZVM|DcYo6S=a|f5F0s=i9!!!Q)J5Vd%QF7yRFyE{7lJ3wjfIT3(iiy zvuhGcgw+0b9~+P-3jJq*C-4y)8KW5gFCM%>RP4w8@4(YrsiTt8u6YHoUjrgxhC zo{l>YW4~@tvLAaq)_Gs98GX|6x;;hO)eb-47&P3cH{I2jYXxl2V+eTHiHp$tO6CnV zrDa)#tW}HDM25g83byh~UAP1g0eL^P3lMdpR-n7ieOH_T{*|>~<^LFcPRG0c+bR!g zQI^-7?DlydA5P;=E!e{lxoNu3|F!!l;LO}}KLJoUs0TUw&82m34F|0MM2ABfe9DvZpiflWR#X**R8v8VBLT}hzU=q1G5#0Pr3o!dHVI_9Vs%wiaOd@)^Y5c%W+x9Z9cN@Psn`iI&U! z$C_j3hU}-u=<N92Qf>wJYxpsa-C2iMbyO%-s6H z*oua+k#h3#w>7Oj^G#Zlu0WZ;E=5(mdQIScOM z#a|iWOslfk_Dw6Ciw5T>WZUbU!&uh>qY~F!10&a~fh1LDH8a{Y#?ks&Qb0S-cDL`Y zzfqx`n?WXX(jFB21sOcqb%uERnQ_c2B#{+PW&Go%*PGMY_8a|@d`Fwpongya?vP9V z80T2&_uypFqG^%It6U}NLB=xp%ozyaMOKC+mIs(5%t}$xyuVWS9c@^u6R{cD5`S|u zuO0**Gf4`Iq`!K|Maywwx2+ff&qeQ!$f{Yf)Q`w z88Z`>!fvpE*H;QjOD@^zfuyoXvB<3%k}7xG3Y8H1XeU!Xb*8QEU#tj31r^XhVLVyWjEp zb~ZH&kQIdPc1nKC*m2#>x1E!QFCYV`PTAR$Q>>hw-=4JZI?`++8P5slVV%SdMeT5@ z!O93P#Gq8ED#q0OO^Y(lTTyjIZ@h5#YWvQmXz#dsrkCS9Y{h_oR-zSQ!84+B5jH@Q z!?{+2vl-+5*{0)>c?d6Clq4rQq(PBE-`!;&#AqYX3s%^ewYA;HZeDXFWeruf7PhLk zcYd)~sMKTr9@ac*T66!FHjiF&ENQ+KW*~mmNKDL4Sh}ymMy3^YObb17p!27q5c6?X z>2x5EZ4*EGuRLu!%)W0-Lv-D+<4B(r|L+n0?#_E5eRJydn=~>gwg~v%4|xBO(WyW& zuq5O`ayH6Rix|21iHX-~z3@(|$#_d_es~FrpCZ|r%d(_PxKlsxWm{~wZ{L*Fsx3dy z&h`8TGQW4^cpFu|n*D~gx9%iHh7R3d4^y4yo|XdXPt)H60=`8`|FQTy zc)jK|ZQ9(mwFU&h;c<~U7b4qUe(KEamDX}a_Wa&-PO}^?yR|WSY=d+R>+g_8Aulv^ zTQ!Ob5+@X@?jw((52binX!+cz^Ge&YN2#Q-x0F9pnpM=)}hs7G1;?H+Of(p~M^~p!?YCT)O)A!y=#lTP-7B zTKD$2-kTHuYqia~a-x0UYcdq`yA2^Qh{;N%1eimlt-RXxlRfntcG%ci>U$;Ay z+lp^#p#Jz64yYN_nQ|{r1Tz*!QTh1EdRrD#K6lv1=fLUDZEI@h0lC1-L#cp|5aw`p zH!MeX02}VdKWo1XEWS_tj7doGYIA7#^M&F^eMeyDh~fZa)%jb)B-l>dYejNo5@YJ>daq$IFpGCVPGNFJvqq6sm_4B`Cs>@-i~*$tbtE7h2Dp;LX#`9YfgY1se>HP_$S>tUtmlb*fHCL$-5>I*PsmhWXS*t;@HIRrz~E3jqalE~`S zY;cMx#F0uAIj(7c{@hn{eU_xCu_ddFr5|UVpJ&zeInQy<1#VI)!3G=zNuljKBW1gv z1wQlL!1u0CdqMSdU2{S$e6d(B*>KosNL11IYV#-dEam;c6vLbhE)kb4;E~*Ui>3#7 z%Y2D|udYUGHp4XKS64?HV-Y#u*7|u(ZzhB0p+c!<`F*`QU3WcaNF`G6bsLYwC`a<% z=PMg-a8;0oT>Cxg;`95!msgp;@05_mTVM0R*I}jvMaUfA>cAKXi z@`>175tUFTj#$W$sEj>5FuNhHvF)M#OEwC!J9|g+z5DX+N%!uiHHv3=PJ-bA#b-ppz(6hST zzI&$oeEh`fYJ! zBW=^AjjI%bY0MyIa={sE%eml^#1J*EH~iR9*QDL%0zKX$C|~LYz6H_UcMtRO$Mqvb zmFR$EuD?ci2mfqy3Nx7r4ui+jlZw!fD^q)P{fuGNA*IshV^PhV)2<+eEy7JYgQJA#% zYsmJc^}kt^mZ$Vd3CBc{izScWPGwxrtKuY7QC0K}YzOSmp(uJjhl1JXzxZ?*af~$Ink_ZzwPT zTFUZ|O^}Mk#|`5O7#QTmJHQqwzPso%Jw}Mb&8WpSc*+}6T0jL zORNG;kBfuxvjdaW^B`C?O$Tw=brPpE*J&gWiSKRN@7h|08bEXF9(~S#`)}atWftlB z{PH|A3{VeFmjN*g?p)e*Q;1hfjOu&~$6ruIP@V@?sja8XHzTMdN##-nNA6V|)usJF z1~*&~RsTde?17DOvKxx~x~3@FQOvf);1std93r^IiGK;m4lWRq^B=@%}s_!5JSUu-ZV#jZidT`bWxrs zg9ghm@gJEYDRzVK@G_aU!YND4r0MJs5!>!#=*ee?WRof{1-T;d=B8G^HqCDx3uDx&X6Dzy-w`Dba z_x}24^`Xj3L$1t#!%U%|$MufakJy}E^!{|;b>(Lz4^)P2pV-m-OS``T8F!)t4JR%; zKkTYd;_d0Iw^?!Zvjl0_u)*jsk$(NT8PAeMT0*wo!*Ak3hmAI_z~1J{eH+w}0ii?l z!kf4SrP!m5kCJsM!IKB znib?WcK0LAZ*C4{JihB$v6az=ZrQ|tMqNW(D}#RsrpI-mo`X0Qi?EBM@yOFa5%3&Y z8f$)Jx*6T!go)<266NT|;9!Fef}i{C00khui)vfd^*l{i{bbXaYA9vDdbPPBc zuLVrLK8|+#`U?4`Sr6_C-a=;fwKbP#CFsta9y+CV@Vx8ynqe!$DE+|a*egV1`oXRI zOrJZD&mJmwNWJD-9cYGnIWl{)8l*3xUOI`LlV8uZcXX7w`6SP*mL=BsTh71Wuq`g3u_yh zdUznh+ps{$xegvSNmXYtS7(=GaQ$=1$QJh(j7Pfy4hDC_&Z`n>SDj8C&o2GosX zlHQpr>mSb<6CSZE@1Rl03^ea!ULJ`mHqBlkazojeTq)Q&J*Q zt~|qa{s2Ft-$o_>hO_Fdg5a2)hH6%;g!ILx;+t9o>>r_c;(U+EliB;gHb5O-4$KB3 z#HID{!emjs8LXBUx=YNi3ngDUJ-nIwemcH1KCd1Qy1LLaV8qcPtm9{Aap?5V?hser z_Vk&xv1f+Puu4q2Vb`;8N%(5MpV=c80v`IRO7^|PCY_+J%&B6w(OJx0(F4N^1t={D zr8C^q5t~%ho+KZ&3E!D2fHaoA!h(_naAWVTx(+Bx>0;9Ou!(e^ zQH;_Y-?Pc%Tt8n_1K@*%TIA_EtEl|DAH%EGR`ae2)Q@Fi>i*Y)NATE=2@vj`oyiBy zLz3b2zXp@EwmuJ)5Es|mB1-r^kM&b2K=m_@vL})_u3^}_eW7%I?N^WHQ1k4mC**cQ zEMU*|-7eR8Y#D+#p9^!8f#f^{@7?)ZluW&PZ8T%pnn#ALge^CjD*+#!{3>QB znu>ibmbtz|aZG#!FaX8qL8iDZi)mHFv;L8eN1TngR~d~D4|F{3HT#n3(L zeON5_VQ`8m%RkN?O3-(CoHPC+N}rw=S|NJVEU^UirhJz?e53NPJpWmSf8Jn)-+_)E zcI!y?C$i4bBdA0D66oIT&YUo%dAD2!YOu}c`|x70N*SpP@vV(0xT^J`j1SP)cGBO; z_czWn$98)Z%-b{n5YF3JMoXJs;WQnN!m(Lvq6RSmnc~`q2YO)620Aq}=s1W17o2uR zQ>wLX3H%mp(zyDZ$iLLh1dE>)|8$KQ5T`a9hn~9|EZIXaxi&ZdN-oPlu9bGNTW_)L z`OAO-o`?D_7DXlzHe__*)OK89qs87_7RU&e5HIil%kbggEi% z0--FKC=0rpDGpq%<%bKd^hwB5=Z_-BKB;YFehS$;w>mA^7d{~&q3~C~8;WlS>!gI( zKS~E5h9Qlc=$$SOOes5qj7ylKK`kzSXc19RmYxu9<3rW&Mk{Qa7MC5*(~s{KS*J>d z!{e5PyohgX06&h%%ECF7bFmdvJ3-WkKyyMEJmEAhpp4;jZY`w-xqXhf7_yi{+RwPW z<{+F_*>VsYI$?F8L>j|;$tco@p)bQPu}cXjKdGilQm{boMo|2391p8$jm3ABi_1}^ zp_8yj%?#Gj6sezjrg47_gHmLU>J&+J73MRc!F44Gr#DWi}L+!|dluuCf@V+-X#PJ_?7 zPwvYgqnY7@n9ioyGroKc2$yNhg^0f%NouFM@XBY_T%4qrE)_vP##%nU5>J!RVrv z3LyR?0=*O@;6I|AR=KCP}zs;wrxA<*yxx$X2-Vej&0j^$L!cn z$98h|{k+%tu>QcDwQ7#48a2iv5(Uu-xD>&NFi}GSuR_fWnMdF&a?uM8Ms$D)Xnu;I zC#?ow3G^mX4ZLYL2CsjFX>FdK5atV=j>Mn_o~E9_P8svT?f#W0(MET4nfp_++)+Pg z1Uf7RF1Taa+@vT44OkGCh$m?NbI{9>LhCA6fXak~cRZvu;XWOXl=eXG73e8(^ZlU; zcJlPVan9UY^x-|}K0{3nfTj1j!T)u|zvpD#rf!SX{Yr1ST3b!K%uGd1&DoJHqZ>V- z;=pJdA!5W1HQ@DJ2joX6v)c0LKVGN0%n24H5IaTH6EJl~BFW~NIA9Eih$wJ3A&I7e8kfNz+3mn>H6S`H6&=j>UZ8QM z%V1meqk1nM{a8xwj@@LgFfvL`pF>u&vOmqQFHT9YHAz2MT(9Sl=BoWB=VOR8Tm?TG z!tGDNTyhQ_3Pz{A$=_pHHNFlANKx3Nc^pI}qz38ic3ma??wm?3aw8fK^1y(U=qCoH zV(yHiKevzB`~ZTJY1^Wf)~Kxv0q_dc8w!%hR8o*9X~U=QI}0gMIYtonPA#0jT=laR z+2y{STfX%@@SGgB-ruN@8}6iXE4qtBJ5u#bzKo0tRbF0R>p*Zmj@{?`ekrbL=*x*L z^kQTdc!jBRuB~%E$q1&52*68}zHkr+nb=WM}!U-l(?Mn#lPl zxeOGwR6_0G{4jd&D3#1tOqlv<@*iBBCv zcquBx7dVM`7%_(Zq+bR3gv*a5?H0b!ZOj`JfUGW{MDS5^H1b|1pww}{xT1MwhU%KW zd7cMin6{x4iK}28s!HL@Kg5=HqEJ9|XEUN9LL#vXb(Mvl#pDu4pITC(I<$L5&X8{U zfd7rh&j~(GYbJmd33qlMMeScD58xlpOxFBNc0 z(&}Z13uhG#7PK=@uJP;D;0s)Y=0i~^Nuy6BtrgG=dDbm;4NbH4(YVj27UI6+eFvZW zEO$MxSIS1Ozj(PGACVJbw^D_joqUP2C)b+|04YQeKvqEs(dMba+D9D&i0lm*#50)O z3TXxb)PHYMwO&J^?|k8pg};AWcJ$LGNGs6ZeJM;F**X|%0HZ!E8M0sQRHb#X~EZxO4ATQij#RIWg?7l{!02AF`hWu81-PJSW^KiD!tc@};{ zz6h+va#E6kj2_7Yh5lby&C8-uZV^0T9vngQVX>bwL|Y3(MY`^ZPaNpzCuIt24EdBAE9_PsMrd;5RyA^5Ly4#RJ_-B09- z{_)tY>`(a9K;6HaV*kTiT?Ox_3r$+}fU8}fhm!DuaEQzaDr>ql#v61(EMfW==?%vK zJvQZFBz5jXQEJuC?d6q~w#r8Kk0ZyATk55U$EVn8ee4@DEFv)UF>!`b!)vJWXaPzw z4w^jBvA|e<;~c{GXo(`Hhy4+3VW9Mg`*q#_qI^FfqO_Fi?fsqCe%vunyTRw^BzZh> zp;y?E!Re2>xuWf!u+Xa;RZIJXSmvRG%X7 zsBA&kXdX)diwOgSR>&--r2_`AICcmWW2FI)Q2RJORA3_HO6!AxEf3*){BzHpK`R8)`;ni4sI;IYdoLp8Fcln71Ds*yHfA1eNM#*1r+DDR@|5CKSu^a4QWmJ>DoyU9&UM{1ZTR!)CK5_i!;G9@%L+MM zXPH9X@6)Nzkh9Q#L)^qpGIhlme(YnvAGuaEgU~sO0Ck^@fdSur^8r8Gecw2#%Wc2L z*OD-+0UoxO!onk;ry|g64ZS$l#%5;=XlS#LmrhICAHQu$n$`t_ggG){B|(yeSIl3v zppd5}s+3>)qqu=v<(i)jGT&O3T^sdgZYz8pQ>{`Cu_5W>mLS4ltjRmL2Vgtra z$Q?e3oYns@s?*GR_$j7R%grD?x-38HS~)k$Om*edbs+5eX?XuhC)}5kB@h|UOy@B> z6jCdV-Pv)8thC6Peb6*UJosyw{-2m7DvOY83L{k1)70;L>K`hw;Xx;R-~ba?toW)E zpg9Py&9Rnw>r(zE%vw-91_z`e%Q`X##IV@s)@OYQyw}^MLluE3O{DEATve+Gn?8dD z+AUA6rk3y7QQGHTMp>?q&q$P6SE+oK+0Poi-krqpr)Qp{!{lR!?e16bfP{!4QuG>& zAbeW68-HVXk?@1Ud>>*sNL_*IEvR4_1TlU6oIca>Bx3umPS-~uoO|B6ENtYUb0iso zbnu6M{&?c{xt%oRdory3UXn^J2PRmoO{L*^wXuYBwn+LJ-lXRoXNqZ84O6yIk$GmL z3TTa9PsFg-Ktl+vECZO$H;Gi#Wm)M6E-kBVk(bc{6lcsh9#da&Hp6^pn(4Ozjw;x}%S21l zW<7Jk==cnWT%!C~LiMRx%b96ta1YUZMrf#T578g8;;LPjEVV&_3j`FLi0-hsxQWl^ zfAR#d=y8)xPsiG9Y)}i_{Hv0ygXDSNbUqw-CuT_{+^vfS+NLA|zf?$gtaKn4`Mb}r zHcEPLVPe8Mx%#b}0wRt&B@efWb8!)*$sKlGkjw7CcK>I@ROnA!!38SHzQuCF`GGCAPq3enaB;bLW3YA6u?DugcAQZ&~f}2dhUg$ z@aN~OB?6vV^=Tp#xwwvBB%yBeX=E^YW~CNJ4Z)R<59Ch!xy%#72_v@AyZ!3lXk3}~ zbB(8HV!z=%2E*2mIsf(>;xPZmb3<44tEUy}6dC|B92o&SvW`wZUxTL8_arY!AqG`m z(@ydX3D65ZX)51hHlt>_M&Dh;mg;{a3LibE`I6Z!&u8X%QQ0RD^%0|Oj!o8BpBut4 zr$_!c$pD{TkU!8n>zhNme6zlt>52mBp_r=G7b@mQ|8N;XGaU(2FKv=)VGP`rHM=)mXRhg z;jBWe+@f}csq3p+CW-`ZWx{sU_H&3z?j8f!T+{AH`%t--%ThYUdP|avx#E(W*hbAS(nN; zE`nT{KWw>aO5J!_%S7r-!YjI$K;V!dV!PVeIMs#?GF?5*4)*4@1LADD|*?pCvv|DA34(W`*a2Zn%oP$uz zI7~iETU!d$Xy1dIp<@RR;9t{+c+=`U^E;f#qkiGQpYR}tea2F^)8$O<)7Q5NLByBQ z>5w!%Q>VNVX_W1eI0prA8z0C zxGW2*94Xta&H6m&S*_iYnU?qI`%!+7)-0dJR|A+_W-N(0q_F{U`a@BEhz(d$TJAy^Py= zGKqJ%5Z3y@j$?Q|qFu#y%~*dUrr}63vMt}%F>sd$)hj9M6n8sNwUXycgD@I3w%vAz z{ZHLjeXe(&f#}K`l9R5R*mnfsk-Qu0sqo$?C$Cw+^qkM2UA?LRIT{ z8~j1QZbvZ6z8qT1gJ_f-OuG_@tn}rOX&)eZpmm4ybb5~eYZ&xEw_B{ARVeNN1$Cry z+t1#|oKSoAX6@j(!BQ1*lpCYFe^}DCAYhbk3u6RK{7WRC5+!@vunmmFXl-m00$n$* z|B)~T=YwP|%x(H;GseWd-$-ds2dpsX^X*q_TJI7P93QN#$~m7vy(coU|1M@+*7{7_ zj6injKSz#Hsy)el9DNaRzj8cVTiX0o40u|`U7ab=zJ!vx`mC=9MZJ*nDwLyoCmU>G zUmr+hp_Z`CQpMA&;5}3AUSzzfC`E0QKI-IazAKn{OO?fGrko)-wQ}13FzMpHpe%*gT z-R7eAYXFki>!m=7iTgCUan1IO05`I~xM6M+!qpLrDRcUWdivlr6$Qr%lmb zbvu|@u?AY^KDIB?CBid0hh9_kPK`_=B^VWF3RA1WJ4C9@Z9Z$paiAJDTiAxc1R*0R zoO*y3J9r@gCRh1`AOuEShL{9HUbRja)W|<+nJChd+zv4uC0Qb%6(t7o%9{pB7ex}n zPT}uy&h*xpr;9SBb%5Z8EEx>-#3+5;n~kLzecR^|_kt zc;$2VvtZuW`bzH;KX4K%oaTMq)90ktE2^TeD{f68Y};7>(a_R}FCUeIX*=oM{j-}m|S zzZ`Ob>^KNZeKW;A3&LVEI;CWBx90ACvC3colTpHDh;B!pj z3G`5l3@B+S&3E!A0TwC6s>ATlG-#N}i}PX#6lH@74YGn`cj#DAt8Z)h zi;S(*^}_wx<@&21*j->y68<~{U0J9ALLraIv1VGewMIMovYyL}(RGgp;9cFlD2%%# zpjx8Y5yOQo?8J=-wh1D;v05bfS^7c~bC}lpSx? z5=lo9T%D|sn8PVsg61}f*hPz{AwylA&pS@6>G?2M!)D5KHjh17ik#-qqz;0(+QY31 zDNChfw`!oqh5weL-AnV%N>ShsDYt}4?lT|&fxqthSxxPsNQtCE9amJ?jwU|bN(aXm zeSLEKK_Fy+ng~-TH{}??8Jj7?w;)rI;NBnbq$Y44EsUiGhZH{RsKsP zBq-0AXG4yUJHTyWSTFPhd$rv=qU@*J-SB5p0A zk2&%*z2{q{xXq{7Iz-TH-={T9-ED5tT91>XkBc&4i2}y&D~kiZsIpT!Rs(^Ek2*5^f;>vC#y! za~KFLG*miC}($^pX=fmdg~r&Y`DQA=}djVOG{8It$FwBZ@aIjig=&q zB8Q8RJnK*%N(p0LK-IPfkPqE**m#4Ie)?9-#&B6e#v!eJfEXlX6S6>+Fi>3bAjRFT z@+KXGZhdZc8FSNnt4-O*+~y9IIj%1?3~K}y1pUp_Bpc}V+I_Yt_DEuOJb$`nXT-vL z=YhDBY~~Hh(>@lk+eZFohFGF!TO{1*Kd|n)kfg06ck3hl9iuuKIte({9Z+M&+g# zYKo%GKUB@%VsIlfn#_sbc0ZA;pK=zLZr-&A#o8)geTlbHhp8PcXSxHE4PF<_YKq zZC?FG>KPk`9=?NI)e9*7trgj0VSyC!cIQXW8(rF~Tw$}>K6p~`c{1Dd36H*2f;5#9 zRK)=fNyT@-Blg0XKv)z^F_#-dnOwfwO-;?x>hTG`JV!zfvUsZaNpPgBsmagAk?nJK zT7>;NEBL&bk;;E|jlH)tJC(6W?M)=tX1}$G0T(F45yoo^*W9wtqq6xALPvMm;oOVmmIp{+4F7S*FfPL`QQy`_>OOO|q$F_S&N*_5tnBN0OXbom8BNKwb zE>C5v8B%!qFbKRZBZ3Xu1x zCm`cv7)MSOPhO_q^e^N~c{_Uoi>MS$#)m^CvLUQy2k&cnc;bRpg(MdcEZ$cI>%-%E zL4P}38~rU6wB4-FiksHISno#n3L{Nzko66j2rU82FDc1*YIS_B)o%N0JIVWg%6a~H zs|_El+j5#@+;mw~NXFvJhwy+8i6-T2K&ZN>(K+u(Tr5<8L$8selG z0@33)0#$Z)D@1q!%n%@qzu^P4gaXpSeP)=Z_KZ!}pyb)W^KH(pmtrcKgc@yM7dDiH zUe$Ab?gF4d=paQXk*?ZroAUOSXMI5fko6vCBc*bEtS?#_vli};r+1p{FY)NnAVwP$ zZz(bKVdu4CfSM*_hHiLi-RJ693RaY*WHE<#mIr|BelRT9UH@QmmXycW+sc~mPMdTE z@*z_x1Z|&~pr=l{I0uKrKeq}5Ys(^Pt}*2R<=mECPPa+2!-owQtBDp^6^AIXz4Od( zsTM-ni7K-i41mMmq~F{YvHXl@5gX781T-~+|&DJZE z*L6iGx96nGf8>2OAnZK0=)Fu=X2&0qdMqWW z>=rQ=@){77LB!<|xOFHA(3tBqKcA5sOSxrgciDUSM4ibdmcr=PZA=0uauVoYEYV@m zP~(PPi+rws;7e5GuUsDhe#JT)ZLOK9L6dTeNZP5uG2)HEXzu{@m7)%)I1li}nN9%G z^*!F{n%oz=M+#Y<#=g{oIa@60q1&W5L}7cTG$!3ENS43IYj5wi=TgR#t+AQ;j=K%F zA1C)|zr*nDcY!tzK1Zc5{KKynInzDJx@bpILT`J+rLI|}*Xup!9hmf*%OsRw^z$%N zxk2*Q)L5~o3KTREq8}n>nn2(8o3Yh4NR;ZXLzov&WtBf>yP=#vyv7FS8Wt_c0er`kuQk;mvyCwM{d}h%6 zi^*8B-9i};G4q7ZJDwv-5%^Z0NU&iFp$!s+lZIBI@~8uY-wcKnXtYH4{uzJB&a;=^ zE$G0Bf%sF~1$2y`{J2_LlEBSr#<%jBa(&&F%Fk{U2sp_-t9Vm`#jUi%62dJBCtfaB z#Clf?;`7#P^ZceU`{iI<_?7@h5flaCc+HVUGdI@s4seyjjyz>Q2g^sIXf9E@qdL)rQ18{dvPH z3Pu&PC0hvqfMuu_BcQisf@M4D z->0{__zex(jT*jhf{}ML7nM1|e%%V|4eR%HdiUwtv~7FQa|6w5cP`&|rrHk+qdV@e zx}u0@^Mt>#`Q2>u&OF~D)GHW}kR|*Pid)$4x$WU)wBgG3_M4=&T zxTtV;)pxN;GC*@6x$R@Ke%jXOfs@Nd9!Lo7Vmj@_j-VYnWwb3B`~<=`mB>Dp8G%m* zBF_tB;9Dq}G`@!iGTK5?#yC2a5rE+na{y5UFcxdY0Ial?t!t$Y4gNM)Oy3-AIKa=) z(fq+sNb@4(xihvnA^QPE9w>=B48heMC4#0kf$$*vjcDgmZSrdzIL$`1hbRgT5>fy4 z)$mkGhH+9bRLnRrfdp^XI%@y zM1qYl)eD00Mpv4V(E73HQ^vt3^zt@0D{Ne`Q%Ha{UhlNaI*7nK_arK^?ZrPgI+n1k7X4AUw6c8A z&eYq0ht8)}Hj2|F00ARF-K+&5juo}hl}^S(*d!%qVF}W1Ws-=CK|>vj)zhXq^xu~> z@d(}2wO9I&gI+#th@zpvS-dC%yt!&kBL9oMP$4b;`5#SttKtPM+nFID7O!)7D>(ga zWw9dQ{a%sY2@$LvtOKwInObwpQy0IzM*m8n-bO|RW3dpu1lm-vLSe4&KmnYoq-Q#( z(nP@G0$QpOj~t3Ug4(X!J6#HqiHu`JQ?xKhHXUOfI-o$$lv8C$s@Q74(FY-6a1=+$wgS8OW-ODr@^LP`MpCs4ywXSc?hrEOEC$%%AmJajXB~lSRF0F3 zZ6DJ>mmy96kngXjwh4HAMZU9PR$%!#wF^{JeYrSL66m$`ux!7047qPYQq_#kScbZs zHo~Z_vaGfdkx)Tl>5Y%r#ScbW&Lt)TsLHZxRSs?=|e~jSnC-9=F0v!pY z@bGo*FE6*8)j04dzwsvG|LY{D@_-a|md2?s*mGbTxRCbszB8jcSXo-y;}cwXLm5Ls z0jXwjIq|$ElKnl%RM0J=641VOq4T3yAfjTD#uhQYLBd2dq*&3cy-cH1rPk(4D=Y;K zQIU@t99>8)4K$pbj(TIFG9W9^!fNm9_Fkj;zOgi+%R#JuGD}mXvIIZo?KLG(SZPX> zGxLuEK7E6WYa4XVa!-zjE<$Hq7;FcKao`nnbYu(^6zm+| zcO;G{m+?^NcNh_}ys|2Ax9 zM!&PB$4<;f?%WP2H}>%S{M|A96&3(jaB0TUe{NmU9o^$=RM(pwlbmcp$^C=NH;|Goe&N802-#5afhime9 z90%Kg8^i>bRw?g-aHV`m3N0+Pn3?}jF$XXs#!S>TH4dO7u)uV5gYt+mut>oIR#o(B zC}~VN4Vc1ZN@_~#+Ux0+U+yojf!n8)ky;M)}u_UD!Y20%QqN=2w^Q zvfK?kM{;)F;=e!oZpzGbEoQRg((Iy;V{F%WcviVVhf!1p_dV-9keazj3`ppsw3q^l zNKS@+L5&{=-IDECCu&mW7mUiLz8TbC(|V(EK^#*+QJ0o4E4MWyzwM!Bk|9l_>sS(R z^shci>WpzL%xOv4DPZ1~iwpcyR>K^#jIY#+DL;p}46aYB!<9Y}!52_U9>@A~=o{wD z+c;sS$rWtK@=(%r$boQpZwj9|5F<7Ee3|DH*j*-b0*B!vZh-H^$8&3=@5NYPSBJua zj#xWOU?G@ZjLDNbTD{_*kAg;Cq7(0RxA zc}x3h)MK17?HACN?`vy$X@l7-{Nw3r2g4?neOBOo^d$H5^Fy7hX0)}X*Ehd!XWHD^ zU%L<+5_ODilhEv&#%v{qE;*LyQBbsMY>|ug4G*sObK@Rmb^}`Zg?w}pM1l+z4-Zed z-dM?DHcCRkI!@^7<&bm5=Wh9ame*m!aBjY^RqL@7OsmS zF;@bdMHm2nK>?A;)1wqY+CK@*hV;~^0F;dSWaZY z2W5ee^|h1Sq2Om>kp5=e#kEE&cC}J@E+8YB*>2OhY%sCOcr;|Us~V8kjzpC@a&|gI zjME@PNRMe7L{y9+Kyg)A78|?_)g_vR<|Sgp??48(d=+BXwL9`RVfG**+7Uq(Hjd^O zrlLl+r5dBXD`w;<9|anzP8LaKgbrg+1STt699h;(LCXO9@<#u&58M#0Jb>|Q>K3I+ zvTfOj?>RtIM2gI8{j@S>p7|#gEz1ThJ{Z*nvUGVyesCsHK@5iv&8;88_LBFP2Cg0~HiB<~O}ZVmx(Bbly2r#QPtvkGD6u4w5T$f*EgH&%!5$c!5emw+x;mPoz0Gz6G&0y9 ziPg2Smku_;w=IlwaJfL!1YU}qkz%KWS+S@17W@f0h|mK#$t=`gaOhOAMJ2t71?oxJ znk0EM`LU$Q@@gmwLRl?<%0hypO1{}=$|VCF4G>ye2me7WOM8jJT7Au0Wx~1wK0I=u z3=$)w4Y6JGpe7V-?ks#XC_0*o9Ap5DNAG|fHR~F~Xv1lmb_*__8@3_9Mh?EoeCDle zNBB9MSRtDy5lG@|`x4TUflTF*9!i-;!>1%;H=oJxXnFjcG}M0TA4$_!1+FpqFMm~Oq{JC1m4iTDEBHuJh!upa68Nv3 zQbWN?^mr;HgB^8jkr)>Xys})#QX;&2OhqgTO(mVN%NRgS zkvzAC=>0Y+g^5T~d$4P@rD>>{#{1c<*1G*!<*m56gEiA}k~{tREF8fqN$7c)2>8ux zc*UgMSbPwQolA}VkRWwk6T|~|Kvzr`R#DY(p3i5zMN?EOxCKw*MkW>x6HujG8|@ZE z2BM2m9ssV&00s8xRfI^FCIxnjKNc{KeWBCD(nYC(xAT>RCtqN+h3L$SGd{Q*L0B<$ zWS2Dx5hC}6*VHu+C@67U0wHuJEH1@b+(wv2EYF09I7%NTQ?W+V7$%$V2jjPNTyt8$ z0zr|VrTHjiMhArs$fv1ykIyx_jBkPIWAb45?OuUD9Wa`E39t&NkbC3o%NqOTC`+__i6W+nOs^=TW9N=Zbjl! z$o?gpCxi92%fr+yR^@|lmndCeAV&3Nz*0mD;ufc}7|2AM7-jmc9ZLYMoa$qMKG|_3%=GeMg~i|Aex^+l=~(=DN+-ZGz@*2ug>CdiE|Txy+X!Z z9o8#4(G3Hc-`o3JtNYj;RmwHnXFY@a`*6(N7Lw=WqUkUYns}Sp_UC^&3aC>G*^g_H z?e^G-h(BgM+t<+4M9LjEaeLuJ^=cJyCrV?Wi+$9> zn_0)J{+3q=NC`QVV>MsGXBypwN{<1Qsi+KCX>&we2Xdtc#gBVi?ufrb3d~A*6Roe{ zC>>ZdCQRxmj!Li7?VB|w&~}#+-jyq>ibWHc83J6vtSjvd`)cvpN;4x4cIm<+4$$Hy zBl+wTr!2hR{Su4+W#q$*X#MmTf#VF6E5?>D@)*q@9#|m?^}%A!XaKGep5lk3W|8Ey z?9h>orW<|$iSuuFUE7cGa?IT~WPYFLUC5cA^}ynEpOF|Ii-@$2N&lxj+0N(Jvw7cl zrN05bSpCvyfrDut1fN%~o&;43;8;FzEjjVGj)<;#FDid>UoE`X`(6iUg6!9;VKp5n zytxPfoPZ6~s+xXn3rj$21=gl*urd~;)YmpE+x0l3>?LBm-OqRHcdV}bvj{f{l?rA& zgMi6^S#DXKG^JW`lNHq48!isPW*dkyTm~yFy8|8p8xgKB5mhX*&eKn1{VowrY?rIX zEYA)i(cL9LtXhhoFRe&;Yo(}YJ{T;Qrl=IMz$abxnrinbS)6l&!?{}WRj=v@A1)Ny(GWA`c z`F%z6PbWsl-IXe2f86u?yFRD#x7zcUyac@AE$xf5i1W&y5G`GS%2SbhgXRuCIHs?u z8O^Ax`*N;(P-^Oiw!kY;CDwGYn2q-p)aKrA`w0Q#W}p-i|8)e&0L-6d>!ZwRU;@Id8%`B|xsA{Dsj-)&%GoPMSL*h^>_oigR{gViU-ka* za(lpyfPgeZkV?1D%HzXler%dPZ!eV(N0eV}Ao7bL!H%EB`-vnmLPNHQW5-bbZVy&W zd#|A1AG^?z#x!~aY8>HWHP-fw4oltncqX~U=BFG00Qifksh837w61iD9xoIYZ|IG< z^D?3NoOLMd`{u&suszic8LqVbcdg^H1l#Zdw5+VFY*;IvC!IBxr2+BZxd?WDte8G0 z$BMWsCKVAQDf2p(k_nJCK_#Ri`%g0dsy>Cwu|r!LG`mBk8im;zcXC7FZaF9NS6ibTLQFAhP`r;inn? znYhZ2?`wAF^QUcHt{$)ou(J>>7=0_UkU0r;ksl@KsF)>{G={HaFHM1DS|VpXRHUQ{ z2Hb1YSLW~AJ)biIeZn)FU0o>WY1YU0UX70qaN_;F43a;7-^4aqkL&VgDhspkd7gHs;t}dd&fx1|Q=YQ@$KVSIR zBXHkz-1Ptc#K6EXouMU)zJHxH9G<=Ia)|hw9-PUJ%WKrE2qsRF9l)u(yM~Fzx;^7++}OsxpaHJ^NB4W|kCTOt#8djXE+i5klKArV6p;fTDv zIDa)F&P0Jcz&1nOt5()_IW3to;?4!EycL&nNIR5JG z;r1n{i1B(5ZSb%%5$+Tb>knhTsnjs>FH^o-7xEl~YZ#3oVlXXT(WI6vHCZWaNs8sjsH$XGJvaKcG`%35f@}*ia=;~v79BOQ zNHaDGUM%oc$*#|a?diE$R!$R^4f$Q?a}?EO-*I%DWj>WY5QRzqv>~|g2-5yiHv%kQ zqat?ip{#L|L@d^x^6zZ$yozY(fBaqUe@U#bg6wjwQ$&lBP~kk1_6$@kZen1;m7J{- zNox(w9;SsXHD+_%muR(LlQq+z92psb00aF16@LEuI7#{a`z~15{;&O1AgJjl(o%b( z^zWv#tkSq1Di?caKfl1r@=BKFo*utE0Ai>Z1{NmK%Hr1jSgJ#<3(rfo9Va~uVrsb~ zdBP}LF-cl;pSpY~8_-8!V7ptve^U0$Q}nDM>|kyg@e?&-q$ObjPQ)0gvJ&DpgM_M; zqQ&Rom2jUN|GMpH{{M3UI^SJN{ne_PCO0a3dv9-lz$3HUfA0|zSDhbCrWwo-w(U#+ zYqud_dxgp0`ERD@SHL%q)C)L{2ZFjIs;UOUkJnXgzZ|WMJjBorK8Soz%SYi2qd9qQ zoS1VtsuVWMq)DMr|FBTj&zI|r_ij1nRjIl#j-g;YMetn-I}TTSDo#VhhUQBbIh!15 zoEy*ayCXIA1mR)&#Gkgq6&$!u{;O=&f-NNv4jCr=8Sh>OrqZ?fA4Os^oIZMy9x;{_ zL8&q4?;N!CzTCE3mn_afR$dwg_D_|$+uLVtn@;Q}+0IPQTkh9>JyM-;0ny*q^1Q$9 zQb{l~202P9+@P;P)ST}r(06aiAVbq%JBpox6IKeE?o&_MIOok2aAi01iEllcqXmA? zVH9#%0>)Ii{lDKgfdmy*J-zCvsHk)nM>fD%jLAgtxX$rJ)ZGCz zi<_Z(_+}a?W8e@?uWW1w7u)76S@H)>oY9o8ce$P!(1Bj|=%7lkDW@YMrb;_VXo{!& zwl?sKm(s+-fs#P4??H5HDZyPG)pLe0f=0Q&;mb z{*SXN{_OnHtbAYE7g9ZqbO7W7=qlf5PvHH-E;5aLHd1P=7%QkOT3kj0nr1#rJQ|=rA{y z+rsX>J0)gkLdX`17oJc?e(bo16&a*!k?}1vcWQ72vlkDkShu%{Z$E0%hNjB0p%9Uv z#-7c-fAY;c3?ZG4A3m;z8RJA_F?i&gIh=b6dg(uV?_JY@Fn!rLUbd_>`n)=AYj@Sk zO1SW;TA>o~pz%TFw?VJJH`{CijQDHBQ*#EN-kM9gtgvmjYalE3L|?ljW~1+Dh9Afl zM^D?`CuAbzw2>g0EA#7rO#_EgS%%)Pe*qgC8=xLQRVKnG!5<_jBsefgnTE9ZRyJeh zLVDDmcB`fAHSAQ0%}Yxw&(}89eV>oPdN;54v)(speRda!h&0_qrh_mv6C*UV!}jGN zn*=1Od!N{K6>`0;ZDd=%eBxb&FbweI>A}VO(%%8K*2;z4OTTLeUR=D(N-uNxklZeQ z$VTT^;;A~OjFrLqb8!`kv8vmowUPw>`tHxm^VpBv@z1VJjb`dh2ew0*kOXe>*+*ln zUo-?zsfmlhBv8c;tx zq8>lZsjG>fweumlhg=ePm!s{5BDprVmS4(SR}BvTf@rm~%xfn_ zN~Vm{-8w6$jv|!}b&4o4tuHG22t|Pa&Xic69S8Fkf%txrn zEzbTG>Vzksfm0k{X&Mk12r4LLfIbAawiaQaH(ZO1J0G9UlJ`5pva_GK+>t`P=hZB zZg5r$P%bV53GM3L%CNE#uuLNhj7A~U`{P$-U`)vk@{+rY+wQloa%Zq}{f);rJDk5C zjzZgyd_g0#RA)3G=}^O}mzW2>#kW~h5zKM@uD9lGsmyrtH5 zS8lD)i`r4%|0o&b6Geo(n&1UAx*UIP`z;;o|H=Is(_?%w9-AO7)*q~nL9VY~-=^zO zo8>Nk@6EOyI%7|{;TBv*wBE^rKSoj-B#q;(iy!iqNLVA?XJ7U2*5l&5@3W?>@4wxk z!MgYeS6U~%YeHdu6cOepKeXVEQSz2^Ur}Mcr#yI*aDIK zaNOfKcIgH|m6ee6Y(AWO(QsaDwLW_WfmY7jq`FwKUQU}tveXzo?pX%0<>PO@jbXNv zh`0y>xGrrHl1<1Nt7}xC@jpF~MHe(MSD|Q}iCeAHb*~%@OCGT;Dt+s`f<&x&KKU>% zFJ)4d>&At(u>KW@dG>11@8gKs;^^>@VC(PSlCAZT*Mz)S zQ;Wcf`NqGkq!}S!EUJ2i=y6_M1ts8_8|;Jrt5{|>CKxJI(qK_eDr=(pZ>Bg#+BD)B zCh)+@Z_v>q*YkLV*zaX8nLP0iLbhKI*)`qFB%GxpNZl2cB?S0tX@(=n($ezG+n|{t zQ{Vo=9!KM5w{H&t4eYb;R@5fm$vKlsOsId7MKm z5kF8#ib@USNy*0tGux%k&Q41ysj(zw4b1R8A3FG@8&WD2{6DE1R8 zNYL@&zl*i61sb4d6NpEqf9W~aa&v@)jiq~|1hp0_nnkz}z!zCqWYShbUVOFo`Fj#Jb>!ehI=shfcU$ILl&+;NqAhNmIi95R*7i zsfqRY>~vhJ#UeCsTMzdH!e{EJ&$6ZBU@pYh_c!b9mndsqbp zbp)H>`oiGCl*ezxF22NUJ%qB~>9zLi7BFX%Dfcp>#syJQMG^p3ySs;w=Kcro0uo}{ z3GhBmZ)k?#!Jr`6G@q~i;57gDQBD8HDnsAv=0&CVGx0wEQ>AfJCnh!tJ&a=!M^Fsx zfj@Y|MOmM#pu|bZC6ni%c{{?c_nonS`-LzALgBH5K5mGKU&+Kcf7gV{3B+AK7Qn$3 z)DerR_%>g98*RCnYGx5-r!K*X_(NFBsu1mv+{UxHEM(kY940Gf?%sNB{AX9z2Wt&B zPT}Gr>WCB~R^IJ%VXDggwYHq}(`jh{nwY@%@vmkbh>+8su+1`qf&ZuL@l3}33p{hL z$BhU_64ya$C4=PX5_vDk;Y&fSI=o-}S#w&`;#Z)t zI$(0%?GGiX=g8N z=bMpfYTQw&DvmGeMXr!t&Dp2U6!pSFpyN`3^iL*Lo$6Fj>SrO` z=u}{jIlK(C4h*<&*LMkitf8*a+I(qMGj-@Ig;pL}BJC(-y-AakZb3zk0D+PIa zeR*H!dtYd%;V2Khp0|JDQV(pN)nZk6>e9eOsh*R(E2<$gJn5Sa0+EaZKr?9 zf+B_1$(!gQ5ck8Zh=Cli0aRwZQ~+^paV^lF?rKK4zzeKHqU9 z|M#^xYtETD9YFs+MvI~{P83z0AKbHrG6~o^p3^zAO1T(PQ5JobRf6io`^_zr0gHK1 zowFxt(k_GDUp#^+I}{qD9D}p-bW{Arb~L7MQ&(7xR#Bpbsl!pj^&W%nZbeB&3_h)A zDBU>nE<9uo^e>M?#KeTUP?!+E0AYCO5NaV}(WjC~gajbpsH>=yoI|X5qys2N6xD*E zB=Ho(1N*`Pdu5lpx(@HrzCaESkC38V@C9Dh{w-t}Y{JFhGyLTwL&^50)yZ7J(?XrO%uaS8+ldA0L-a7%6)+&>f{4()q|`$2lP)WK(Q^qi>rtGJP`Vjf18OK*1ITgG5t zu0kl4sE$Tisv7cmg}iFCaVm~Cgj6^yg>L(MyJ(ZuTgZoU%%BKu(hQ!t59~a;usN;c zO#>Rigz351`N`A>QrZziprM4QW=^~ml15EqChCre-HjyG`$II(MXDK@)O|>tXuPr< z(TH-av_U?Gb0tx3dPG<49kRD_&*t50^$uM6Pi~YLMI_65;})yDgaYO7PTiICnwWt-20pr{=I{ zUPD6Aw@)}d;B54)x`@ZlMIV(0v2awdSn#6*vT7~mj?`adrs@0uw2XL3=zS9pW`)9? za)*4>yX}Q-yYCWxyW~4|FE8%Q(gEe=#9ZC@Z{CcAvkAD#UnFHcHd6dw}RtdHA zq}#CX+hCTX_EJumfjvXXzt<_b-`T;8ab$J}V{CLma?Enj{CXtgJJ9=h-!byO@3CG` z9)WQ8gX&TvI}W20OAeV88Y$cd{B9~X|dyd z^z6?WBRIN*dUYODgFPR8Nnkv9em!91rlFO9nvSv4^(@uyQQ*37a|LWgb9K*mSV^t! zp`u2do_psbMc3=O+?KPv%m1DycF1r=Bg2V!M@e4e%QBcUwG=NFm4LwH;wSO|kNMb9 z*T6lVBYrCtq*bQv7LEiicOGxN?}Sc%+2pcANMFV5xNa`Zb{I?jO~kQ>CieJzf0!FDpO)Y6Pa7U~=c2$?!g0;C3fr%l_v1N(9W9ye#-z zEV{qH4_1x~i(GDDX1xqZ4c0dbESfy*J-m&Jq^dU=#SupQg7yWvj+T~|5;~yUtVFq% z79Xi>V}lU2X=e?&}72`Aw5<3df}>*>aPT*76<*_I2zLMpGQrHQ%UMbs<;L zpoJm6+=X1b^FjIx+1J$#KfwI4o^lprR}cx}fDTq9Peh5aKo()cqDX3dLKIOgIWreO zKmSo4$wKQVD5#>M!pH3L@CV`Iwf|jacOXg$kHb1qK;Q-2<<>{TtqNI?P+jGM_5&?u%)P0aLbiLydGDIvjKWH)+XS*Dw|E?M(!kkBv~?@u3Uv zw3;fi4~GM-wGDD4!s(D-NF!bIB*XbadLoS@0~@#q>21^Aj^#TDd^>Gcq9nSCLd^Jn zE=iH#AF9Zc9tY%wJtrvczl~dwq8<|$UJ17@w(&F_xRXobeK`VFctt%{2O)U>wR;cd zX^@X5k@5I5VM{2Z`bX+`#ngnAP^=-HlKE@siOj;BjG1E|aJ%!iZ1WA;H@wz<<)QI3 zFVGMr>~!qj??|t9Z4fNFa91+_JC))up#g6qZ3x5$4Yc``T-pf7puqjPj-TA0-Os0X z8>{O<=I6p_G<{QH-p(e-Y?t$2!o!pcz41 z!w4DBk|w7BM$41Eic|D@rQ!ZN!8v?SFx1aB(RWhZPKRGzNPzl$0Y+P2577ASP7DSI z2Nqqfus(jDqv0^G0eg8G{2d}z3b9?|9GCSs4&ASE)4y-wRnEHh)BQPRRUPSgHf;)P z+LI~(t-pZm;=idzr2%TZl=1b6;hNmd-w4H>?nnt_ojq*S1dxMJV_*u{irfaSPyT)r zcx;}$jsOK0?C3GM>acyiH$bShR#YnMGu1 zGi)`RWDz7vj?{bd>srvJDZ4dup}_~;f3!AfExqSkElSoxi!Cz zRkYmAFxtJIyL_PhMNdSLp>4bnTj7aa(P$4F1XYWT&bt2m!M6+?5>%rq4$4D%)f4vN zH%3-mx_}@PkIA*NX~nV*OHAm)8azU_=*E=s%s&ODq=@_Y_-IH;(Ha-bGGgwE2^uya zrO1_w!`CWYN2;H=Mpzb22mBUg<9?~h&|nglw5$@J9MAfmsf-)`Wu-wX_~v|xU1eT6 zo$WZSlkfTowMI12Wuam>)9DoO_vXaLel}`TzkejDT&)?+*T&~{_47J)lHbJ)7WVwK zJ%X_#we_Oqlx?d%r^@H}r*3+q_inI&)k=L%Tb>nTjVpLTqMuT2_&1a$5<*Pq-0*1Y zY)KFJn_7i^3JE*E2aMDal7w1R%iL?~aRSu04?vLH^WIB9C`mpVobWc&`!)&zl)ZgzL1W{DT8%-FMztPTik2fY0HkuvYu$c_VOpcHz1|F0 z$Qw|L)>J9NMdpN)o`$5w2uejqZ}^t)#8}D^sLv%O%oJM_uA!j;_)lXeNRCDW3mvc$ ziZr-Y&=hN;+gn`bo6Bn?YFsF6zK>VN`OI1*O+foLD?yHiv9~|7NThg=NXCuWo5!)1 z8sxrX?0RFYY!)ZG0&dCE-xr2Hxw)uj)2WU3kw7VZHku!Oe%`mSmTy?>J*cRJyMl|9 zbx%Vnlge3~co#xKDAK<}-PEc%8R7-SlU$qd>fnJyd6AeUuU`NsO(Sy(?hVVA?hvdQKQlfm9koz6>& zn8~`9V(QHY_x4_hr!Wl12NKYO6rpS@X};PT!O=0t04btCq=6uY%GAQf@Nnao#-sDp z+=i@+PiW#1gMT0C(8KS&p!sTdRu+^A&Jz2Enb(n8w zB^V-3uYtJ~0-FE{dN3QSUTcehVD3Q+^J=fx=o25#gJ%T(1ZTe44JMC~-MMcG) zVud{ZxdFpg=kxrQ!W>Tghzii{0)`S~mQBentb%LwtS?Lup9$eC1xh7|5}6fGN6^*q z&>MF)vH>zwSe(ve?r$uY_7X;KO^%MMG&D5Gss2*-et+G3?w;P3-_BZaGo}T#JDlpv=n_`ce+FJV~ zcXMn7ADr|Ry?N-pD5t9fv89zS?GVRLFp{gJmK2UTdMrreR>e) z{YjMJMJnSEaY-@4#4OF-$-ULo)U2#5DOo*qoz!;b7id2fms3&xMM6xQB-(f;)_5UU z8?g1L|MZ?Vd1<*K36flIfxVCxyW$H&xEnGh{z}D1_C3`8J!ZN)ISJ8wwRhR6A%ex@_su8=~CH(U0v_` z(Zaen`1wNU7D=kgLBXW*ttE7O0)t+85t zIEIntt6pOpN2E^HD8aDU^!At)SC={gA#W{DVfkMQ3~A#fjFD&O)BC>BiQ`7(n%^zW z{0e`qj}=m{FC&VIBJn?MeFGq1F&Gq}m$e`ITsD6bXwq{@H_U8m>H;xGGK4V3{Vk8a z8w-)_77O^qq#dVKx*u5%p2z)%_v5Bd9*dx9ZTwsOmj&m`iN`Ej?d#4->@m#x-14-W zoQ(Fj@$uFNt_6?JM-zav>fnYO=U63MQ_sn_;zU7N0MFp%oo5gz_Q~Gf{>l~KMx4{X zFF}I3G+~uIK|d=iM89)!VZnK#)dhWdwxky<(bxbETe zc*1VM0l-_dS-M(vI$fk0t(`;UShKxKlvKhfPSwY8F1%J?fyybaZdczVYt>+GaVH_f zrni$oN95VMr8=C*a!_UasuIKhu-NOD397@kye)oSs;a6dv&(Y5!%ELO?kAT4{@Pwo z+KpUObza;*Ieqn_M{0dExD!JGQ8MfVGd^u)Fb&>KmD-GqKQQ-=&Q=$7J?4Etp=G76 z4{1e!rycChA-BPvdGrRr{M&E!pt;72|4d*~IJO)ncK8{jqOW_PqIFndmy9)w^DI z(`57QfTI}%d~`HlCp4hYv|1dOA3@}4*3GM@%^voiVZNc}#G%!fT7R%4UHPe`49%;# z+Pahtw4Z(NjBR&2*neK9uROdCt(F__U*k;4*VojfeoBE@s`%ELX4~x@qTN1pS?I3Q z+jH{u#rhm6H5R#40hzh#;IoO&T+i*k=bpt0j00IrPeQQ1)BEAjVAM?rkcGDG7lZ7~ zpl+?vHARDylRpyi>29PIN^}O@oN7Ug6*d;e&|Co0*Zawd)=JsdCy;-^$3GMYP?Y67 z(8+6!daaVE%IhzT0juu4y%*FIAb=vPOtV_J+gp-#Hy5>U(< zjfI4h`D|%uxXXmyb$6^}#dh8{rS^@UN0xI}LSL(0@2GivWMZZM?2m)EH_qw0ylT~9 zRfo0s@Af)~p0<))*;Fd6R_UjQpdQ3SxJ_=|Pi^n4>Nih?O@7@uOdw|R7-n=j8T}uc zM655Z-=)HT?x0geeqKy%wmqZ~CAYY&*#6mD!(RD0m%whb@#f%nip`rbY1{VPlP>ML#9R5@6h0LlIYy|FO%rT`3+R4dvYSiIX;HppW7zEX`dXMK?l8r6Z}+Hck+?s06O*pSYvGdZU_6gm1Aq!q5@KM zUJ9D|fmNCa&J=UW@T!@NYqow&#^qbn;ZZD!kagg>Gw^~!mBmU}VK2+8C$kVnFeJF&AQ;wI#;0H9wXtq9zVCEYUdPV0 zEB+5@ICSwa?h};lo7q4-Mht6C-KPb&o*UyH#EH%f2DFY3_3c!y9_HKnofLH20V`O& zL(IKKMt%c3=avk^0gKzSm^HGYab?J`FWxS77L0hl`$|2p?l~ZUR8(aYCdDXQdFQb+o+p3*k0!*|IPaOID3~ zER!--?BLz)_JIGbp~^E#&gYGVvysxaq80hji(!pYLd6Ho%l4DI}wTKEYVs==Pm)Qbq7FLoKV-5;ikV$uq^ zifx~G6Y_fkQG|EqpfQ)Q(Pn6h#*a+Y`(9X^+)=E*J|1-R|Yagq1dZu{P??p`(oQp=kBih($d z{s825pj*%U;TMhf(G<8*#wi~gUb(;4CAKrd+o9?`Z^y#cOb#F3ow^5OS*>7tYfoV# z?GYQgW8AKkfX%j-(t(wh6{W-u!f#OigJh*O8oElxLH@#tiXc|0^K@eE6@~+Ds^5q2 z0G~SrTgUw)v}FbQTWdK++d5?ba|s12;(Bb26jn+~(mOd7m3Svmg2FS?%Yo><7ZjB0INgJ6JO;wp z7``I>PFFuB++b_S+ghO0S95agsh1U?4OWXkm`Ys)Q@|)$<~?#Fg>YSW;HcinXG``h`r?5Gh_q9Uuwm{$8yac?0Q$Sgfk!Q%tGekrrDoiUNcxg8?< zxKbXyIM@thU}c7V(pMzgpfSA8i8Td>wypet*W%*Ud5*Tivze3%OQ-3n4?tC%%xonfwZn+#p7$Y97Zf}Vvs33VA z!hNtCvzQZhcD7a!9H-xcdgBmChKyAhJzsfK|Eha<9Z^by&hJxe`!d}#)cwrmJ#6<4 z7g^*zbTRYkuk$n^k0$jP`S`M|0ZE<76-)OZ1v*7;R^h{kVE_=k|OiS>zfK@iW+c zTh!PDuC7R8K{6u$Vs*B*`G_I(Bjjw-g$vhAh zn*sg&PR_= zPy^QxKA)!?0Z;N>S#rlth`2e9ME$kjUxSfg0-?8_8*m7fk`j|H(|Bw)>IzF7%Np~e z)~6!~qI##S?cj;JOeT2^C4c=|;6%A{b4vMJG0wTKVSbky$1}n6SibkOs^iTs`den? zU)zm00Sdz}kqU-N)VQg%C33?UMEr;OS zhq|9JH&vXyhGFZt`hiMgjF)i&AKO%XVWz_IH0!`_rW*0&-83iSAa?e>{X;(%2@1$C zO4jjWw6H!wGc&VCkm__>w(vicTea)+ap+@eYHD=Uf=I78B2Q63VY8T+3=CJJ z;(yA3>9DwT-9hnYXjc z|6t>FstH(X^lDx_Y-OTDnUnHO!jLmT{%HH-HpzcGCcKKZPE1nj(RW)}>|&Lq;EXQN4>0VHri1fR;1A1r_Wu6ip?dZ<~z`r509{cnXb#`t9e>ydc z>AabtV`ThEp`@XIo6b}cSI$gEU0NX)WkIeJE5ag>VMLl6R`BOx{TW!M1?!bs!@ke~RKe?~n%yrCj^^Q7BFy%Cp~=`;9^T_2 z?2RqKFN~`OG2jJP9&saR%FbBIm_kylxaK!H6_BygBs{BKmwtTb5~@V7u3kC^lfb6? zil)WK7MGFNkO+nkUeh4;+S*!B0%$AMz^)xwH!QUN0QrqY*)WlSUuExaRMS&(4Q+o^ zIRkw`@^}SNx>33{IH&)Z3J1?yze~H>P47sn)y&gHo3BqEKo3x_7M2(RhlAsHIlk+? zJE#aG&2%7eGof%$hCF^Oi_hc!()*D|mg~7M=6wl04015jmew0Gclfim);154 z#;)Ps9!@&h#6RAquhyj@FtlvZcTQ5pN%Yb1p#D%GVL1fAo6}xTq)ME|u@0@bp(jb9 zl~8x%$;3&J6UU9;vpIC3O|J zuAhwUdz$VO>P2rKIUxe50iUyEKKKuw#Xygfxe_{-TlDB-7uI$F21sChSgMr#C+Yd^ zl(A#zDGXiheqe-07$PTFnRXtw+H5u%*%M#)c|;Y5&wQ`G=gt4;Y;SBS3#@w%xf}Hca5jQfI@1JuI>WwMU%_Xr&Blt7&Fj2+F0$V1pgGi!g*3*B~ z#+&%xV;g~kk-QFKRl@rqpV!v1U*%(WQkNI!Ts|vvCE}RaDZJp&prDbn003w=JfUmn zwY?Qyeu@A4_;|`-{mZ<#H2e1ik-!-b-a^IUNm)mjq8Lz-)_Was(VP0v9b^fXSJCFF z%&SvENX|x9Q2=iif_=(d>STZy#K^_C3noby{9#bt&XtFfjFIvOvARk&is6G#>w^6E z19IT-9dV<)_=}D36zL-JKvZ$EyEgVcdyDk3;i`% zQ|j6E&%UqZZ>R;mfKz7@Fa5cJ%+Oze{L(_PeM~Hj)oanmgYk^@h}TbFP{3C5KXn!F z;~XnlG`I6LdX1Vvq7I}2WUV|*6lrT)Xxoce%Yig0A*?~ZVq)hT7T35{J%Kw)PR;#Z z)w=XUxYOBk1K#}!4`≫N)Lm2guLuK(+d>2=oNJ|7K;qxZLk>F*_0gds)|w< zsqQOkts;$#3nn(xrFdhEns(cwp0^Hr-E2ybG6*MiB zKktJWHGBgKzZQF5r9mZ7be+!vh6WNB%IM{fv~WS2K>vG9L0m@}+@N!IW<@O8WMXSg zl!)JzZ36>w7e*ji90E3xZrjt_PvFzaHHcsSmOz}t?H=n2AEPg?rYve^_B<%o?PhVG zerc>6UrTy!#xV3FO=>ZUZtz9C8q-|~1?|6OcB5y-F{S}uGhf85+h`$0DBDSxOCObJ@du4G?D zv93!5(Cb<7CXauR(Q`Xug{!8i7a9XP)_PVmbvK_jJ;2UTME{2YiliW~-(84;@8YT9 zhCTxCR%7zJ9JASo5kuS64)gAy9PFS$&8-rRCc>v4AdM?}tJpmp5AR5aGr_OcAkoUu zFyJ`Hbsrj>PhZhHU}y*)BfY9yf|7X$E`FF?6dE0{snvYq=rXYB^OqSDn?dUgeR1>Z zTV>}(dd#|;*YnJ1hwb5c)4RN2Tn3`j;PFH>OyrCe-i)zNZkI*Z!}q0ic&qlS%(K z0iTzThC1wr(g_Yajik^&Lcz4#%~FceoAkQ5E~Gy^Qu&>}qH4a)7Rh|pB}KmTmxm>O zk%pjT+XC{Yhqq{uhR7CJSZ3eH8$Cf+W>K6)_!vkdcz3pz>=;(#}Qeg?Crxv=0HMN>aI}112k_On8M>!wpV>2Q9n~GCpT=*AXrl#rPga1E~&#NMPkPBDGSED4RtcxD9!5k`&3dgqS)A|LF>N z_du>{LxE&&+dci>;dnML-(x^0dXoCGIt6@}q3>qMjXP=#SYuRZ<6BZiJvuR(h&0r? z7j8tYzGyp7+9&18Lp>H|O43lv{i$V;BDjQ(AhQM9bKY0#G^S)e1pXiO)Yz}lyp{^=W`DmevINw8an8=vRUBOAOBS{}8TJCi_K}Df; ze!%}`4Hx<2!$lm%vpX&q&WV*^-~dp`v1TtmKl~zpaCyH4F0QA&9X`z! z{RS|-PH~w)Xtq2!=XL@7N?9V+6KJf8DQu@8AI8$9XG{zzEg`Fu5OpBno~}j75<8mV zl;{D9{6y=!c-@VFAd=kYbj$A0z8W-1*kcr5#qj8M512&z+j#+4S5WB~G+0znJkA&N zG6nIJ{(7nKRWP19;#)jA1{4zMK@9oWt3#Z@X*?Tx}9r%uN% zNM=`TXB70SW?*64s=T1IE&fAJCcmjgIDt+btMT|p8@$cTz~XvDQAtwUg7sSsq=73_ zIXT2WRA0m`b2)~8SntnH;*5Y67;0WR(?p2 zr%b-8HijB|WkNr?up~5MrH{+)yVztFDs(TU5`6qKWm*ezI=o8n1XRh>@-#p>IUcN~H+fXlIP;LPMH^<3 z&$iS|iT|;CTp1jnk?~VqJ&h;swd*Yi0l@jN)KAu?bJ+s=c>yax@I9j(q_jXEOGKz$ z@!3W_%D5TfwrS4p4JN45My0#H(I@Xu@^`sT>BAGmFLw{SqvQRTw-#11Lhwv4!cQKr z%!$krt9sOti9x7QhT<$3T^Lwcl!Y=G-?u8GPybu@AC-VW5l%v1=>j0m#4d^G7DcRPudaG8yzd(pC!{G8mh*?bXr-8_zALIJ zMWu75Zw%1B<$&ER*z~Tf`pqx@tS?G2GC_8p1UTLc=_7F|i7DwQ2kQGS(Im3q!VVG> zQcP`#=eK+*Cx>qFsKbpQyXJJ}EN$ly^zeACy6pV?;8?@7|M$kwIy;mP7Fu~_L|Try zajoz2amh*z{S90!%o$T4U9FZfQtw=ch{yl)rFR6B8#@@jOHpL0bY|@a_$H)D6(eXn_28946{lHwcu)j#l*>nI$fDrG*uT_9?PNFp>tJV!&rgU~Q za(mHCEea=fk>V;xbl0EViooqo+!0gzmW%HhBAee*4&Do`Nz=!~ zB!3qu97skoxA5z%4RAff0-pI!?od~g#Gi~CjTS@23ZF4}n$wY^(|-HFb726gdi}c; zT=p?zU@)LY7Rr4a5wBgv9x{T%jGO{C@ws; z9K+Tm>_h_*#>r)sdB>rg(SL^g5L*y+5h?Mz9E}X7-fHX&Az=23c*J)7Q)H^X>{v+y#T5fxJi9PDILmvl z!DVZ|p<17(-nolE(1&uLQ~>+4TvB;X8I=kDG9uKuafzly1VU{a%+(^}!;@N?KC5eW zJ_I+ye^8V{2`3JA*cDBY#uDS&we5KW_(U6^(6aE3^=$QH{$?-XL0w*O6sVuATn890fAmg!a z<}#}7`RZMSNon%w<@HjvB!$ck*-9xEHL#HFJwS;_?)amt@dP(r1@(6AFfBQG) z?{Q&9aHpPn%di|h(y-A0C1wH5@9U@PQTXf{w1O{?bB*V#=NlIr>3pYj^B-G%R{3?N%P?iBmc$@5S%0Y`}d z_x6o3RgIQatY(-0jjcd`lBy1zprl<`nj15IfGJw8o$`wcdml)p5&l&bX4iZc-v4@G z)#kcL;N$wZlmFVWcU_=80)dg&r!#AjHHK#!vG*6=EUT)bR{4n3PoJ~L*A#;0rz52b zW%FS&A6M%8vpPBKfCLNNyIr0qL0U2PEmq9$#3RrJj)uBFO)oDf=VxIwor_Y8r#z;X zW%{JHkI$e`-@Hh6lA+?Hi%d>Von{MJy&Z5n`F0;hC!WTQFJ!j;6~}R~bV?w8|pvk&-T8%C%0bjW-dDoR{0cjrZM`R!|s|H%|(P zr0F6M_%ORIlH;-50=W4pp<;D^Tw-+7;Yyl=P7lrx z9zrO3zXa_m<%byjZ7JAq5c*5NLY6FA4QKf#SlC|dh_pE3(edC#jN#+`wxmX?mwr4A z0^0Q*mC;zL9lx(G&>K(Wv*mxwB!qK6QOWhH8zyDz3Q#%)pw05%upMxsmxTgQD~|-P z(VsE1PszhI?BmFecSUFNAho>~J@QsN9?!so9?D$qooRz+0^EeYpboFe2m(H+kDD%= zUZ8M&1&}%#@qDSK?zvjr8<6giSW*i6~p80hWwGHRQ#0-JcgzE+qWev`b4GM z&DBjgYE+SmO*p>y{B~%Ns=2MTI3GnYw5XcQORZhMEr%(~57wC;I?kv?LP;i##jM$* z-=~^s{eST2bg>GCSU})0*p-)IDR&4#kO?o`A+xbdPa+)~fPzOx^)te&3OkH~7~_|3 zeM7@MPVjYq5W+#n%@h&gGPBiyqsHUevklf;M``~qRz=HR%<4>4g+?>Wt+$B@HW!z= zM!I`(77XII5;Mg5IW#e0aERm|UGX)6 zec^DF12wo-Mx$5*Bzl2N$*BfB-YC83-O`iHNYL^9d%l5|{*iEEc~DO6|J!nU?TI<$Z z^dsmQ@*T&oGwWl*CQ&2)KUGwGsi`*Ly; zw82)&;}m(uh{gsljO_%5!v{O^Gj3XDilsi4@vq?_!$P^%v*~E@f!z7}`?VED{qK$0 zW%fCZ-W@1nUB*!i>XKUutRcgchBM+CfRWvnWQw_ZDNf9~fc3g_9$ zpI!2ber}Unt_0n9q9~h54rgrYwjFUZ&2&slm=dFfr815g4HYU)E&u4?fJ(DuR;Vs4 z9FVm?1%SqOlqZdAx9*v_g6aTa)YbV+9NIqi3-@5DaG4;KYyTSngUK1Ev>rq3JIOZ@ zK{|}|iwnZ#rcSRP)cCk*BVRZHhvR?VYw$bgZ?kAO_|3HN0Ov3*w1qy-FPRYUX@j8N z-1pwwD8?qz`49QbPaQF6LNq~S{G?w|gM^Qcjwv(Gg6}o6eE?u#qNJYI6K6>X9Ui?C zms%F)Pm|oIXCEyu+_(K%A>>MX4qP`K$b2Qa5)PW08JT;Z5KH)gh<^JuX0sXcg(}@o zIS?13nRSV99GP4ARSVmESLpLuFbc^@6azNM9#au7B+ENA#jlKHIbb(pWZ%By^7$6% zbD?{Gmgd0ieLX6^qA3rr{4nT_43bz*8)Ax}7UgveD@Deuw9owSxR_32Ap%>Wo8S zd-5x3YBmwdKfybn1sEaY%aY3Gq|&P?y?AdyraFT4keCv{8>8M`kucRn|2Ag>0MK3} zMTL|x8L<#2!bndSD%$OiZweS?GM!~-HCG#L&z&}(m!h^obssSo7Y-p4WR&n!gf@InBxivaWQ#z4F$lf&l?In(b!!6992vN&X1VSFA5H4g ze4Gdt)gC4wOX;9mkwh3`W@M*uVErHbC%i)(tXc9}y5^={OZ-MD;jK&f1< z&c7<2n)X|(I=5TY1>ROW4M%8-JS_*Tdjh{-bbbnT+!aI+Sqsc{d{2{3Ry567QWIYv ztE0x#3K)3_g*DB)yrgrObz*xiAIuR68Lrxd&x8XA(NKhEAmgumy7UGknY_P{MR|f4 zN=a9%+5k1f*R~04K`1Pxi zKT|eFIXk}wdZ0;A2D2WKRo&N{-xRx?ns&xC+7Ve)9?w~bG%D02eWBjPUfD;V{TiK$ zNCOn4Ex)xpBgMq#Y-wS>J0PPE&LN2(#A-m@;NwhdT%$-7B zgQIp!dB%f-bE(_iid<5h~&%nRfiKea=W*5jXv5}f&85YAO1DQEv=6rvEEetHcm z_8mr#tr;JR{hA=cWXBe16)b^s+Z@h*y6|0DyGto)`Z$^gAF{{#WGE9Yh9g@e);q72>HWO`bVQfW>N6Zxo0xQ zS5`p@MUo;-Oi;uG;348<4*2z(8wbmx0UU;A)-+?50cK$?%Y522~@hK6EAX zb$g&rjW{(#+Te9QoT`pz+U=|8o~H_2YOXmwZu;~^e#+2)bSTX7>5Gn%wLV_7Py-(w ztDE$(J}buiD5LXA3*l8g6Kx0=gcg8i=VYN+eYeX^E{qVLAKZ@4*y!{Y78XSAJ1H^a zna&SD#5KoVVXXDqr+32KV{SDx5d;1FIy}Il)8XFjbJ2NuBa&~wK}{QD?)1!pmbYFW zw#0DhiuqnX7Im1A1-f#gUkb*)9X85VDjFC^;K;uIs!l!`SWYM^?n*U;q~q=r zzaL}=e29qW#afzxTFcopkoRLLFT?~CMA;RI%c=(ILG}6K`URK8Xz6OZS8l!DuGcUu ze|U=H_om+o%iL3(@*gJu+HlT2J`8^}WSAhdsL&X(fM8Gl(GTs`;r13(wDo?F(N^s& zOeFfqQ_LEZ1BLDvvZ7j7hI6td)ygZF0 zmHmF{!13VtONi?NE{bnj8Y0A=orDUF7Wu17p&1Y=oP#pRAx9uZ+R9Cw!8+07hcvs% zzwB{G`wO(l6;-sK^?v>wUC?Fxye9~vI`lrLO@8ZbCpx+8*l*NqHtUXh>JER~>3rKU z$?|+DsR7+%A;U&27_MAj1^Y*13!&HIdP9**L7C~Kq^6rs&{Cd%h(Vrd_zKLDGeBlW zQ=E1ku43922VFrd5rQYo)&8N-T3Mg4!VSQR=)W0E zdyOhnv!86&au{b<`RBH;1oez*FL(7WtMqNeDy9w^;f%Bll!r~aMWGnLwN;iss*LQb z2%Y|``gI*RxVZ@T$|Elo>xqR#p|FZfeC#+42Pm#ACy6`rG@D5r4k3D9Cfme!+c^pV zDf!%KK&f?8FfSR{-!%GUIM$WhK&e)DFe%?Ozt@ry+MG%jl=cbGwxC7{-pVT*vR`a* z)0URm;UjizL3>B;qTk8i*-dA&4PTIF;x!Ui*@ReP$?yD)Rz%vIK;FBAR0BmDMPM^F zCQSX`r*-z;9nY#aTH*qFLy-Sn9+KHGrVkIA;@Kf{+u~$Qzp0fI0}j)mYKya#r;ur( zplk)72ijVZ?(+3l`6ccHoTX*EE&{5p7-=&Q$BMD8R8W+zGQ=Zo`B}YQ_&{Rh&9)vp z9gr`4&FwIgXvjvV)=2Um0-1NJ*?hjVO>qP@u7_*=&G|fABbc}sZ<<{taZwpHJaF0o zdH@v}H7E~b1iK#8b4=jWuDUG1&k5Aiu5!oQXUNG6hxZ7^!{xGhVuJJkP?>l*C}z3A za1aTX!}%;{T(fb`O-Bdw#{tY@t{9Stl);oTf{3~QuST5ijGbg(25x95RQ&Unrw*8q zgyQu~30;8^yI4=8hlbt`By`eA5AjSLnV!sy*W~uA9_@kxyQZ3&xa8#D zPB+8oNSk(p$SX;TgGL<@p&f@*0%4yINvhCR8*N;kwwL^7muGro#mv1wrG5f8s;`}( zp=(nizLB%Tnj+Rvvnl6^e;2Z%sBwkLiDx1yh|>aT)p;Q|2Niw;1@@j@-C`UIfqUHn zLqv_;-O)SHlDvc_eZ_H|YMt)m{Q)6J`kxzK&b8|Q0cd{rP>H9$g@w__i**M%?j(kK zXvIDd>?1R`g;3P=`>Jg04guIJD8|l40p;1J=YmILCH|6F;7GeVmpmFz&F5k?ky=?n z7sG1eFf2ug=Faco;=n*s`lTV}q=Fe|>gq7K9qnTw;OWXCE>-sqiop_^S7Fb~jLnKW zl8QY!r$`uXJHLhBffl5XETseNC^A*$;p{JWx@ok-}mh7*aLS{TrgB@=*8?1 z_AQtjj^A{Gek?&grB4&YOghDcQ}EEWQ_Bb;t;Br36R%GsO3qa;yhj&eEiE}bP-%YI zwOgIO&cs;3H;Tp7BJ(OF>`C%Ua0L`7%m?ekpq>n)F%iPA2VDdO(^7ti2|pj=FOK>q z4HiD8GbP1GHwB>Tk)@3RGZwp=b&Udy%@tAA?y3U){ z+%LwP7(Vb+xn^h5*!(0_MSGZP;Z90r8oH)5l%2Q&g@ux`ADt~MXQ1+9nQ*qaDPgh& z5W*6f%hUL0qvXw$R4@0hVeG{$vTXpkLqg7g^8nyDZV~C3f8IF7SLW?^Q^>IXNCM}4g0&iP4-zzOX-k#T- zQqIRL{)7Hp-g$s|mx;EV)1$%CGQ8X(AoKM`!6f6S6hjK#MGaj=4mrF`K&-ygfpZ(= z*V4%J?1k9da52p=7I$zceG-A#uMbfl(TZQM#~h^mTy<*7qb>Q5ns#wbvL$SJ@?{GA zSTs?kX!;Nu3B$R3(dM|ndg)H5%Qq4UEC-}WlN2ff@CQXPkQ{Rx&xPFG$7`S!Vo_y8 zmYYp3uQaj0U8vj6_82)hu<|&cRVNJocZ1l!ISdQvctjB+bNrg8{BT~l{}I9CbfTB3=h_oFSBO2d9 zjG|#CW8{gGX%kHdIp+P@oT)&uq;)^c=aORn3%w4&1)sV`H$_0no4;}mF zPzY5~YIFmtt05kP(inupP#T5Oh}kl5T?lEjG|vYsct0@k!jUb2f{Rh;O;Csms3T`+ z6@(2Wu->ZQL$dwQ*9V#YBNYWoAml(^K~E2~cfjEuQ*|Imyp32aMko||taZ$ZD}TT8 zwI2bTKYI>OKK+!P9M%D_SS*(RKlsF5vsgF(+2Z|4lP0lx^=hO)uZ9dCGI-oclOFx| zS5};vN~MmC2q=wmHBwdrjWtkjA_K||BX|%FnW#ZDVy-M; z(n4Rr_tC!KXS2{Z0Db-DIy(^LAYk_OwFW$NrXT-60(GzxNo7o;;Sqd5k3Mk>TQqo|$sWDZI97m7NII0kBvs7E6IS=U>26Pd)*_g%@5p`?=?ye=3#Ec;fp` z5UM|F=UxsWhr1fgDOevZuJaP&_sTD3u-GIxc+blqvQ1KlI??apT+A@cJ9}54Knbz+$mj z{um1uEa28#Zw27XmtT6zV~_mPM9=do!{O*B)9K!~IRe3nH4;YRF(@sAvY5HJuIW1H zn0$d^GJty9X*jrF>`0g^I0JbT1?cUAbRTs0qWT7Sw*vk0@^aFd{uT9gH9g<`?stDQ zfByWJ>_2I-SS%LHpTMm1=M-=Mer|qlL7-cU%+*S_$E>P#O~| z%Z0j1p`ltBTq_J~6q*{%_3%bvXoJvDBh*$4)p4PsR49oGj()e#_Y1cp(Xfmh*&@J2 zW%duWSS%Kc<-fyicieu={TVZ6G=)N;!Lw)2o-uLa#J*Upq>!io zPDkK-IT;5Y1_X0cc-7R!gh z{Q2{bxi2E2OE10jfk~4lb-Ava01`mbb={ony5cyFXstylB}yw%${2m6RPmy<7RPbK zbzNU6)eCe1iBY3Qb$|XZE?Bz$4}U0ow_~~F!E2nUKmI}`z~>+M`XB7SV|g!Z4uHjC zv3vkby5l@nU;oS>ea%&0{o0K?ckZ0n(befE5()bI`#~!@+Ygh^<|(g?Q(9hz7DYv6 z1=ZEn)YaAX&YL&y#%a^0?R&4!ef6z%&Mhz8J?pK#J4>gxo$=Dz{hNQ@)z|&yHx@j< z=Yj{np`N(x9;@YVu~;k?%ZJ6ux6fSinZN(i(?5La{-zK5v**s8`;N!Xf8c9BKlzT& z{U3l?_g-;P>y77JY5xVw`^B|GV6j*%9~cV(=h{zSaj5O~&)!-Rihi{^6wfxr8-8^5 z#53-`=%n*=f9eM>S+eBa9{x5#P2#gx-Tx@S*oB{AD=WFl zO)@j<%$zf4@3ZHNhMGJEDhVn80KiaG0BQjMuy1c+0mz7Nms{_Jr?(5dm6WO!0ML+# z_F{_g_L<6DK}!_?@TCU;g2MrTe?JL60suTX0e}+|06;hc03dY!-l-}2_64GuvOEv~ z{rAZ4Df{+z2gO<8gBt*VhWGCY1IYSL^mY@;T~SpQX$=+?mzX$aScB!QMSvnuO2>Qc zEXS*x+_L4h??Qy9D{phoPhCMF7!U%O!;#X!m#WS$JnDI;gHIsU@SE~oy}(&dFalF3 z?3^E3@z@5Y`vnO=}rZ>x(Y^&{gR*r}UGvZoSPA%!Z<`3P<;Tegg;|7k@LB@VPEN4S_zYixGaKSMiSs+R~ z!Nlnq0uqG(SQCJR{{0DOS2h+%1JnO2b6%X^@wcE9wJHY2A+(GP`f*wqFW4OP7<1sV zI|^aTRCy>j>?f4OH`KYkd!4xF7}Zye``53x=58F%6o4vIC3jcQ5TIx^*Jx4K1Es|c zhJaTIgS~p5zbgm3>TDziwkyuE#lu#Dd#0vphp$rcXyx7-Fitr-If32ohr^->8l#R9 zH4V$=4(4s+ov0|w1@}Tz+#06mEEArTmJb=~jw7 zN=bL(F^bGkjlY&|G!|T1NHOq->W9X+09-v}&ss zWzAoLk*VYtlElM6`rehm9*K@Aow{&#M_*7r6xlp3n9(rHWL0#OY8l*^`@&;SHO{9p^`@lJQUmd@9I4>FM0i!c6MYHXd){kYjf#|$ zGc3|ll6IFy2{$SW{EFAH_?CY~P8j4~1Q5LJnHvz$Yp{X_#5P&;Uii+$ z*-QRe1)!PF=Z;n27e(_#iA_M^vzIIpQ&&pF;Xd@i_H7bJOqPDHBAx&4-F2cJ^udyR z|HUw0CfOeIojS~P(_&Bxpgs^uv=isAAp%wHVP!wof=yXYW#H=#NXg%F zIGXrBQ)l8bC3INt3lUCZUpplueM!YI((W=DV9odq6EB2JZc(fO;mH(n+EhLu``6(Y z?J||lgRH8*@Trm-7FzYzh<|)I{Y05F;ZZb+G)Pdz_hRcEyjs3$-5gAIVNqeea{Yn- z=Pw-I{^xd}-O4Ixw=-l!6@&<+jsbtp;6tHrlhMY^YE)dEjW@ zhE)^aFHW0kU5Xkn85hKsvda)bAZg_EqNx-L3x`q4|Lm8-Aq_=7JF64ZYcLRI=q)rG zLXrFzH7-}2`U2i!9RY)}pb?o1%=@2ozcOKW*Ym3|w3t$MCB+j{>`(v#oBs2e91(8L zI}wChMC?;t&|V}%e6#0Qp3%Vv%&G?`JD@b29JP`Zb|wS^eGu%330=zqgG;M$MS}a$+5FyxZ?Vl`Z#z9f?-n_{p&> zI6hJ0wNM=Fwgn9YU`pK9cLYIB zm~sdUf+_MN4X%OJx`nW+aCU$uCGukV%DcB`1>z61Vk1qg{8{#R(-H{@1*X4c+&)}*WOd|o8Y z0y1{Adn8mlt6jkNk_7U{(2+>88a7pqHFHqAGY7zR^|w{q`ARJyVz)n(c)NYgi!m+yNt^j3 zWl&v@vvx2{gV8bcp(?JcWbyHn9BaGAEhnbnO}|we#~;tZ7-#+M{MI(%U(Pvu5eULP zDSlW3j~QRl&uC>Za3#k!Y^fdOj!yVF7| z6?hJq9JV80Ul3DyIHy)+K$+cd!MCmQx={2L4ofs++SosntxyM(QC4HG!%n-v#Rp{SiSH6ptWJc-uuKReZ@M0xx;SA5m z2}|n(xcUt*0a;b&5V`;Dwj2AuH5(Bx#PhkgvZCRb7am8R`kP3>d!%!WB*k^HK3v(S zlO(_1xESUg!phNezs;LmhJXv6yj~(4m(8c8CQQ+XZ5d37v--hau9>E;pK~PRU`P)< zw;k--qUUd}%y2M2qkcZ_N;trQ4|^E*dZ^a$PQq*ROc#)DIGRzn?s@6Cv1=v1N`9m{KEE$BOzll>}2g&k!Iow`U7n)W4 zuM5#0U#ujuFT00Kg9Y<{RP0iJ3vZQEpdWb+0Yaepun}51C}B$^(>IK%O3>@&moMu6 zp|R|pM~Yj}--qI(qY|%IcurmCtsJ$Vx|YsQPiga}V^2GNhNlxz!o&1B@uA6t$)K;= zM3L0NtW`opKC<3jAZ@?bP{oMW%BT-z)}?73q?baE>z@+W!KR^_FH_ZSvYNCNye=Pn z*p3n>0hw?ayGJj>jQ%sHIq3BouI}+B&k1hk3*AAv<;)!XO{uj0=}{>u!6ekqq!@X5 z3t@Q^r8n_Zusydes6wanlrn()FlevH=w)?U^!Rz}VMO3IKIr-5=Z(ntr-o6AA_F3> zx`0VL!|{-yc|1}9)vbmAqz$o+Xs){&WS>sIOxV+{y854Sry+-u@@TBzF>lJG*v%80 zY7j&T$uJ;coZpccD!)Zumq+na-HW3346cZyP{Oe%)K&g3?_%A&16>@PrU#_zR_SfL zljU$I^$6KrJ)z7uXf^A{CVi}&lQGDkA%lKT+>T7lMnv`Z*{{7e`G<}nJI z1ZDNTMaY`==iDybF0YFetqPjAwf6G`3{BJvp_i;NEZ}pwb@(CvBW6Q3 z9$wU`sJW*!a$pPC{4ZEgA~TEaW;v*Wm!%wgk@ zX&UA0^~Yn*f30+VJ6xR|DrMdK%70Xbo1|#4EWO;)9KZ~diC>Jz-_Jnyakgs>(W7R- zg*v%;%Pr@~Ppx@ZUM`*D{6yB&{#3H7-b0{z3l*z6A{Pdb$!7&VxwBhl^B&CJ97_y( zD0=u4gTwHja1JBWgiu7!1fMAZR~jEy(!|Qg9*S!T=f-X70h3@p9Ml839NTqXJl9|^ z3WnToLH}eneXd#UvAa)PlIRVY%+96a-Ephjb^wW+Q9Dbbc~dZd3m;+qs$8H&O!uwz z0GQkA?$2F#^(}WphbW*tJQmpWIu%M%E#gL@%Wi4zu?p*?6H^du?NkT4_noekh%S!e_0LA*q1^v2pIcUQ zh^WiA_i(E22$3#G0qXTJqrT>=@GcoNw)TxP4$YP)i)x`1XjC8sN%mf~IQe54d{<;( z!k@T8ct@-DUxe`E@i6FnEXON;(92+6+LKg<4)RyE!bYazrd7QcCEL#eN^v!%vEsLw z)FD{4awXrQ4>f91^SD<;YRQ>Y7^wFRhXeTI$BUDTqtwbcg_P&Nsjc<;aoZgGvVkvJ z622m?C+a7_C72@wCbXt>ClJBNUnF}02aKbcA-0ZMH3tL=#asFdBP1|>zaDYnLm+$( z{m64kjly4)aQG}m8-0)fUK<{xx5Z_N?D!MQ!}=fom#tzFf?k+_LpHXyw%j9?CpM0f zu1wbBR0YHyFR}Dc>;`+E0W5Z`Cwq!D5G5S-b7EM5sl@@^5qYq*CiPzDh6x<2^rpOz7QMw?iJPgkhwPHFsFzScpgHA4&K!urmV zRYdV@QzXoRLF2$BB&Ag`fSg9VUR*hE^h&tZ2+*Jl zm<4T4Sl!Zmy?waa036#%J-U5Knk;w?)cU-5qEq4-Ze&9Z9(pR$Rv4mXm%67JB#BO_ zmH16X*B=(Pkywl??)*21^oKD$;4}zp=6ggWy2UqsOr?PSW>g=XkHpJEZUs(34Mnry zAw0}KD@w*b6ywU0!j=&cY^qC|bu|cv+4&U%Bv-}XTE#SKR^konU}&Q=7?b2VET$`a zbH&P^m*!KR%yAJW=yaAzcuM)G)aYKi?zk-U>&S!9Q%hd$0uY~Dq)oK4RnrdC8V<4D zD|8OtD3iabfH$x$EvoxJ03Iq`0@l?R`I>NWtl9zvQL@TtBp=n%x6ilg%~U!@ZtC5r zqYj-^uz-Rv5*rRLE*>8ip+QQo>KaFSQzxd ze#>tYHyDnoqd$LiLt2el*omqj{hWcAF=u**HHlGP+e)H-bqazu>H@z%RL1@{_CK`k z{)y!{xLxj})@Dqz&-i6Yl?o)8*R*6W*Fm*$Xijx-dzY&CF-mM7sO>=wZwg#CZ~LPw z0W|hT`osW6^9ZP-n!~h4DuMs|0mH6sC0L?i@Gl~^B|?lAgXqx0Esj|VA7$2>A+5+kz zP^f%N&)Oj&Ri#;9=N?eE%2%Eim!?fT&euOGC)AmIrI%Eft95wCAi1!z5s@aj%S7h{ ziQ3kPrIOm5fys~rMzh2WWz=KyeuQU}^L_8h|3Up%hod7hr2a{Pt?p=BLHntKIh)hu zt)x(+*4A4q6+lhGo-UI&c@4snEibjV;W!i_4OvH?gdD>Z;3bN>?n&!dOyJCSMkeWt zRJ~t+7_87t@Ikh1Y)rS_RyrS_yM(-i&-NgkWVk+XaIKaSvNw7x(08SJg+TOwTR>2( zj2;Dif7i4q{p`}F5GOA$FLQw17`20t20JqzLQswTu)FTS_b=j=D&9l^L~?#t*Rb|5 zIu*|f_~o=*l(llE+sOj%x zvHn^5cqK1B{I#MfUkgUQ!1L~7UC?w(nY7{}*(~@OVV%E%9n;n5$Xc2hfroza;GJXd z{sj-<4G$DTn`DAUMK-~45H1pA5mbZSkZe<0~oV9pgh(I~8?mlikVfMY=O&?OY3~B1CXNo^A zSqOXB$?$ufzVsYyy+#W3?j!XJtFMnUf($!ZaSqicH+g_ z&%(AGr3Qm$<=B)^+Iy*%78I`RQ8 zm4i9y)@WbDB=xi3YZzvq`I>7eRqS1j_WfB4^0-9u-hTDF@3I?9f>($2edR z$#O)Ao22xCdd836nLN}x)CrA{Q{S!EbW|(@OMnp}3bXT}?GXnR?&ZMz){mgRKP~9! z7%(Rn{>stT>!T06uUM>BBi+QX{=6WBEXy zJnjLAaWp$SDx}japdisYpLvvDM*MwQsEjFJMI5_io~|KwB&1F9aNU7<`gfw2TS04f z$CeEdF8}4iWWVTEQJ6no2W)mYZgd{EI8EikQmCAgO{s&g?XW?)kUS-`YC8 zx`7>Q*0m%D3l43GZ{iYtahi3OtTV&8?tmDX~VF)poQZX=As&2LJ8U zGHwIr?JtGY**jisuc?38*7Lde#>sTN$f8x@QD4je1|-X4M&TU$%A$ePR0 z{&bJA=U29}V)(|Oo>roqKE7&|2WjSb4!H261U=2A=gw0Ho@nRoSxG#Xyn@^M9Nq}? z@2PgnwUCXan(TEy-zRHF$Il~i#AiMCo66#lV|5AlBU6^Um@u$FUe5!rxX)~a|1}=r zkU-Qwx_GxF_6>Rd-I`zbGFDe_%X!RO2^lYW+?SV_Sa8|(c7_N?j{7)^u)<+y%m#m; zJj#3jTKSZL$%s>Io6Jz@ShSUk#prhi7d?XYK5GEFHPXL!Esh}KSMz6!i%if8Cof=k zl}OWj9EL3}Wy1e%e9KT7)IDoKzq3M)L=R*lRP@zg3Onj7E@g))2eDNfS=)uiVAV|4 zI|vlueEqri{XX{wv^fmD`2Yoh4LD$s;e&@&4Vc;4cD74nZ5mnT4rP!IiM2YO!1 zK&$TR`nXi{akORG_&NX77abG*dY2ON!n;lQf1$*9&Kv5tHM;Re0N$SP*#T0cC!Fy+B1={uEv zj)%4K6wTRC&a^uL*wyM!AMB-BGOBCnOW9G%Df&LgMN7jk&PBUp{b<))X+@JXS`L_Y z3WRn|1m8g`?|jUK9EJE_(yq>y}EjS68wR1@j`Tq ze*MD3QK1ZjFNMvCf6Vk&a=ZWal+Z>A=J1y&?&^xtsu(J*QFni&6>7%rAm4(aG+k|Ru}Q|s-0f%{2TsySoFTmc%owK zfoyQ%bN>ziE}kX`(t%;qPETFJK*g z&rC&V4EQjZQ@OlQ%{;Tg@7HpKYrV-s@U*N1)Fok;ho=p2qBd(;h$YU8 zLwo{#u9g)9_7vLqX1=Q8#59Vl%W+DX5Q@P_l}HCw0Jo7+B2hIeU$jA8OIbS1vK>a7 zd%|iiX>B--5zV>djwDw;tCpjfYuHue_v ze`=WNtpDcXI#Qs=<@k+yqxF+<7%%uvhcvl`7K*Jo4z{c+&|Q3dm7rYsil|#P3WWE( z-=V_`Csr<79~O!0L`U`fLxpVmF|lP&7jx%Kk^iVXi0U%&r&8q_ES#5^ZJyN*Z+GS{ zBSEZn4YF*qBE3Nu1cm+Kr&r-`DQp6+?U0ZUy9Lx}fykDWF$gJo1`%OV3Yp=%t|xyU zMZ2rAkvzdG%N!nRA;@#zLvp2xt1w!8kYHV(bK01K@B5%V{#UV}*Roz{W;mPks45wB z>2)AvqN;F=h2yO%2x`c<&voZc)hHTfcj5f=%>}PILp)u>{tv-Zf$9P>mzk|oHhg4p zcHt_)1XXjWCq9YP@%w!E<=JTD09v2UD70G)!qwU3>C&7H`<2hZ2)J zyi8}S{~3GlCb;uUec`p!Uf*Q&zbK;f==`{+;2rKqS4MrFrk<+O>SaUoIBH}Wu?@JRuu(Hth#q&yIEKOGj!umu~(@SXsyvZoek(={6O^76976 z@d*SsQBI3PZUw5Jt@`fMjh_hEdv28{IC>wN(w8@X0l#W*c_A{?8uUvB5_VWH6v7ke zK8_HDtK9OV)FO4RHEN>bz2{Rxp=tfOW2VvaOOiABrNF2myNIL*J^q}tO6HyH;JRn`{~ab;zGdTC?B{`cx6p2*W`x1~sz*S+@Y1{P#6iGwyw2293pDY$pL z`*_yjWcqi=6P0%GLC!fP*t+meEoEH13nF!(dh(_)VJfMq(Ebm#wObOCv)vv;MaHbitw5zTN;tvtjy?ARD11^*^{2B9t8}7q*4B_N+s6f-a;Zd zxIHDJ2`~aX+?-l_ccAVhc}fsc1#ia8_&q*9N~Q#X&6w1Y%y53pd#aP?XX@P3%Uyl) z!JT<}4NN%jxqY4T_rkmWMZ$FVWFu6>fZ`&AmH+`*|C{WsS2WJ^yvN?@Orh)+(j}M8 zsOhd!1Loz;3ffIKW{~*(Bz!9N@?@cNFlSbK{h_KkFFnQM>Qs6(haWyB~ zU_^p3uS6>)Sz&T~5$D;_;Q(HbV-4p(T84X4mWcu__rkvJ`garcVNrjjfjX6a{4NL7;#G)o> zqoc^}-OX&%=45CplG`}nmZda%EaR|3#jkaaXVH7{PSmeoq93D6@#7l6Jx!&nImp(G zaa7FBDS?2F@QG!0!SA%C>NFr!1@D-jHSu&jC`$YNPfQE)qBZ$UaBzd=Bdm=ZuSX$B z6!vfrmr)YG4ke(ELF3Q8o`b>%Q@J-YSsr%TRSd3Rmc%`I!d%sDB)Z@9T8{4uIu{fY zf7UG+;6UcxO>>{DPM88!HScqmA^DwrhA=RSDWT!%^gH3ar6#VYK+Fw05FM*#!7q)# z=%_YFbG2nbBa9L%$s(Nhf{Q?zXX_#^CFi(8q0_4kJExHNb=$|i!k#pAr!ALH{$bwl zhSY-Jn1JXV!71yF8g%$b2H(!vHR^re7oSn#=iP9-2>S?{#xBYyL~4+v-1XQDCwhGU zHuBeL+I?oyBH(7E(Gft6!5)MVA64HbUlY(uF;>vEq|7a58>^klE`4Sk!ap->sy;}Bj3Qdgd^DN|>Nh2B8f z;GJ=rkqc08@a1^vIa63PxD+o*e_D>Xjr}eu#`~aRO+#HeDOa*oI>%UZWt8a7KRH>| zb``<#f~_PTid$n;+x53|3Ibl|$aRhV2lI_PGX!1CO5PDD6KFV(uE}4*Q6?wp%7}Tc z=PYS_k(-yML`5K?h}^+Ze$zSHnh-rb6_imvJ!#5>>6Po6!_#1dlxZGYG+Q%PG8IYI z&{XX(_R^;ICv2!vCZf_Z8-|l?V&lq2;YnK<^YiizX#HX!$cooG`(vI zJU3K(y^ZPs*M4L>2lZVG^5&DT1aS~;A(~pt6Uaw$EdqEy&x& zc;6wLJO;cDu(Fh{KU-(_&=`E39@4P_^w&|<@3~0a-Pv3k^(75*HV0AoOf#smPw4h7 zs8Sd~%>!G2$qLqraOL}LPEhwX;*{tijojZrUR0~X(&-GaNU(n13-gz^d_1ll;Vn6g zC3+KB`JBI@A;0&*CzK=JSzVN$hSN4Se*HZ&k$t9nZS-Rkl&nA(w)5IpZVu9nkS(^T zJBCPik=LEAD|J;+bB~+y2DkAQ@Lwc2?j{!`B#18)!<(Tu^P8=aI9z~+)UIUNkbF9S zhKv1z=QBw$n3O7kt;*ZZ2*5PC$h?_BN%XH6TixnR$%E{x@5#V@`Bko4tHrprLIH^x zo>@gt?f;C|h4d!Mvrh6Kvw6N4enh&EnH319VeHaN*C2&;$XH3*kuoQuHL1qM&keKv zMMX>NNow93jN|gReK%nr8h8J^_f7ra>ol|var!1rw@<)tzxTV#+yru1aHKnupM@If*zDruqgafuQz7e$$zkpAvJ+-yyF1wu)$3t4vyipp6-uchc)iV{|^ zgtKUI3LEUBF4mW|ane*y_vWK0B!$qguI$u;N#b!M@H$m~eIDr@<9b4lw^3M)kL_@; z;pp`^)q}fSYU{nD4D6d0f3~k}|AVSmYt*rMPwTbg9@DhxCY+;c!^`xMPo6zOPuf(& zu(B&Sx7D@oy^#lu-*iIAf~mN(b_ z@MpTw`zP+3RQCf$$=HG8Ow5JRoe2NM$$$qLcdps-Z6;k*48I`bm(XyCA!jnNx-J{V zms`#y68$ga9(8r@@lt#TRM|h`@Ey!dz|k}&Q;ptYk5+q&Y6ESepR+0wjj8mAKW9|!<8!=xa2U{?& z($G{)aP+;rS-S6W(&_qfI>2#h3;OC+xl1~qxSBYRxs@m_PL*Rn0Q`osi27U2AIKJ5 z_QA=Z>UYts1djREjWt=L-lBYfH%@Nnc%3r-*_IAo*sO&V{=>*9Rm&K`H-CLIuCa}T>l6Pdl4n|7y@*n-f z{%i9!!M_i?3RXOIb?<)JuVOsXeDu8dv#|xiecu-zHu1v5qhP&kxWViIJtl3~^&8Qv zwVp;jn6nv^6FURKief2xo3q?tf3#FTYkq>^V%%TQeAI;jD9DV9JI3?r7Zui?F#ef$ zpwTJ9^CHryl{-HP3xV-vCYb6xyLmZCBR#V&IHeA8B1d$y$q*qIa%XZq+T`@;ZaL)( zWlt+;+iC?AE*DAfe20KPf6$L=Q7(^6wVf)$r)LI#Z2CY&M5>{?@io6Vsu)*+-g2El zl6~2EMzK!xI2F2n|CVjP3{zG_&RK+d^*-V^)`sb!80{C>;-Xa`fXhw>C3Fd#@VLX0 zo!y^cktbI^$;tgFQ=zY%77*^>Viv776c5M!6ZPJxgtp8g+naGVWl;1{sV;yOMRS}w z+n#oxpJo=y;2xP<0P7^-h)^f!`TkcfI-Y&KfT=7Z5~6X_?E3Bf-@nFdYinjWCjZUm zh8pB42M;A~gy=ougRE+L(fkeCFuvM2_T5u#UdKaWp4ZOF>qnpZ!c# z39G1sd1t2)BW^SkgI3eU5nO&(T@>4T8yp4m4A^5j2Ueav%p4q5(sW)9YT?$G420+5 zL@oe!#Dr2=Y%!5{yXDF1NOzSuFHka}zO)3}j`=FuItr>kc81u`+0v5{N+Lc#cN`yN zyF!or0-jFQ;I?;=C~|cJs@$G`?H3a$6EUSJbS(XrZ}woUwgTj$+y(fZz9Y&{)t=~% zgZD5`*W04LwrB4mDREbAFH5P|k4QB^mKPx^(Xb}tRT4@Wl#+`Po8>e6_S2|zB7r+5 zKSi0*2Q`oq22(og#@G*icf_mT*i8dZ7+a$NrKHYjd;3iYRnybc!|k-${UG9tz`*5f=c!%>>swV_4>+lkJYK296b#JZfoa+De|5c4?cSfr8<>qTPydV7<9VEA zYv0^+nf7_ilIl2=bfW~LoKvd}ExO2I&g5kIY0XOKC;T3Fc}#=Xw-av=A2Ie!Jn;lo z#^vKGwleQ&V({)tV5?Jp5d7lr=&TtOw9* zeSOo!e&Tn7&MT}m7RQax0zoJ6)lB%oD0PY-pLs>6 zu)2gFW5%fvWXe#WW39qBpLApb-n;7F*^e?f{`s|ovtjVSp5_*OtMXmM>2J@p-R}RD zMj{gWw%mE@M0Rf#^`7K&FtUCEduTOSE zd6vraCFS38|Amm)?Q+YpiL`<=j__kV+5vKn>J=cIWla#iRS}UfdGhk9ovFe^FZuYY#G*pe zE!?-@@XORM;ZeBez$ zx0bd15n^P15Hi7?pWVqTmmk2k0zvn%r;-*lS*j1uutQUOz@(4P!nX!^ck@y?U#Z<- zu;@MMz@8)d8-5%s*>$*<1QT7jTJF6=4k}AX&BHTNlD}!nK>1&3WVkf-oH0_u>5?{` z1Vi*tIcni7%{mH}MLl3DPEh1-k}d4Ew2bgqkss|>yHgU7+j)`P3%|fMo3z)9i*t_b zBiZ87wx;FkpDD@&Mgpea_=)bgy~P=b%i(2>Qmd8EV8^9Urj_N#17+Vc=BE<+potFR zmMMr*n`tQFC`7zj@h1>*TJgh&GS{*6C#JM#oEk28Z?&vQ3nUZ)MFq(M?tW(*!c@-0 zAJpHh>38|GFe91LkdWg)YkkCX5`V>}OO_JpH|BA8MlE@X;UHbAlh`>bO6=Y}sjAzr zh7QC3pK@?31_h7)a*Q^yK45pL0E2YNi`aa^VSX0=nXO*z;=o>KQC=x9tmQO^FSF$n zab#B(>u{n}{9f`*aFINlXVqfBUHCeDYT##)1*Sj5HI1jO$k(DM zfQndcErQjEv*;htc{-XO$wa~>mZQO?1owxZMnul& z8~kqadjX~S^E`5r4u&Ti%m_P}m?w?VqpVvkiJ?f>*BUkszP+~OH$j#bXWS`$p+od` zHm>E?sN4LK@q-O8`)(c)l`uKjzk-ySD%-lnKSm2Z)sHbk%oBYP8Ko>FQiU*KSMyq) zh}oWj5*;_%vXlhZp%`xxeuPu&FOns4YJm=>;BLL;uN+~7)G^6%nR6Z_S0?;&tqQv3 zPj5%#E+BQ#*I!;7ec#ms|Aaos;r#Zv~GqWc0yqD_WWp_*_74@!gDH+Y!#N!i zcC@-lO!05TIHDBX7o{)mGLlQpmcV1W%7HR?B$4f z{atCXTR!SrNBNW?0}k!LbGS@|UHT?>b;4{(un_NEf}6%H;0J%s1!Ew_w^6gOl2_F* z%|kyU5xWBIZ~=_}6)t~71WxYYEigGomQC}rOtLA2L zDHx-ChG0fjWfgIXKGIdan;Bob?VNS*)5_|f)@H@pKB7AY;uT2t&Z&2Bn}F&Bi*Z$p zapUn{U?OkUnVx-`J*$OMk%{Z#!_#F_G*HkU2Cx@(y1x0xSzrg2!gc zpFRY;_M^C2HMm~G$Cw(}F);FCtm5ZA-sL@vSxOAwvy^wn2N^Q)BI+~bKJqE2xEG5K z%`R!1-rgNfi{AV?44`LD9WOr-KTcLFb0%}%z*iz>Q338S&eZ;JBXh>DU9y%=d1u6{ z5M2i=ZH}CxzDYTtD{O`=4a>BP%znt&@oao`EXJ_~X(o`?kjWoUi}7C0 zfwIeT4mr80n>J}A^a7MtIj58;p*0T4ig-PCB)d|9QEDLp3Q1+YY#K)h;yaF58Gw_uHl?I!iWqB*5S6X3#f4+M{1^V zjxjN!Lsy_Dm-c7g7aa-rUZXD1&X}oHs?FspD$eHqxZ!#`W+iJ0 zSOy{2eCns(Ik;3skzicGE#tamj1w7Qj6Y7DdzaYyTxSlB}AE{$6X$>#SZGFd=n@OjAX=V z34>VE;wsger!&G?L4YQQONPoceBtY5fn>;;w$80m0o;HE&(e8a>9zhe6q9sqg7 zu@z=3${*%h*6*y-(Y=9$Om~m_0*zY`HUihUBvdb^QLFn;eoyA+%8;`LVu|yRyj?nj z=iOCFp0VsI0b@k)egP&&({0}KyLbvSrT=hSz%D&>@RC;Ep$U- zIc5laX{Z(^Q%-@--?BZdT|tzO8*r&6-f=ngam;v%K9d&T_2QU|6g8@EaWY&d{Un+2 z6bUe*TSqw}4d$H08fL2Vx!eCYQ(IX- zEg11pp$+#H{}H3)#a-==-n=ol62PGk-QHL0lz|UBXN0}C5hXt@PHuO0OjYOq`& zf3W$QE8{1V03Kn@VT*V7Z078!$`QgF;p!+#wb|`F`o;HlZ1PGL?*Xw-s}LW*a9>f{ zB<8{NCyCG^dP-#%)j|gR=(rZi7`-9qNPcQ5*&frQOwmAJ|i>w3eKMQzCSB{J)Gn0@TkML4Ry$2+I347;&U;@qOH6Wy|CA0T6u&@n&V|IiBR zLq3NA(bEBcgAD3TUVpWMTdQIs=8S?TKemci)NZucr2}|^IigI*N+(H=U+<>4ox!aR zA3wvA^MRIq=1sN`IPJdI_zp4xn5&gkD>_fy+`p?AU^`S}1=7IO#3z4ZE&9=JYx1by z1mLEZPKdYntF6)%CQ;H*5DE^Fx|}G&_nR#56VAymXruJ8XTdXU{OCi8*{A2N{9AXo{ftn?__@_it-2c29y133(T!wk-Xkb$S%sTmMO;5r@@I&3$JiuBO;ZY2eX z#2cd%=8oIf?{Pfcim2`Q3gR_^{!fkmqVv66z;@XhnLhrw3b?v4c;8F^Vl%(=y9bud zk3fplYb6-hCqN-JFLt+x&c;|2JnBWtU69~;!VqfL|7wOPopvn4Gp!<2nd5kFUs!n(uMNHz;_1#e19d%W&H^dE z<$qhywLkdd#8OU`dR;@vPz3f{Q9gI}(NpW@0O}k4pc5O8s7`Ir%=_UJhId3h>93;e zPM-)|YAnk!b5s*Yf{0z`#NaPb4UV&kXWx~;hbj0XmIFhpU^DA6c0)M~3<@$DPX#N% zAc|J!ZMlBh)-zaylcGGVNToyGU+dAeP;5aRDz%ep7cm;6SBf5v<48J%8k579ucaZ(5 zXJ(#4*4+O;yh7ELQ-wNgIiVN zxq=shXPohz?LUD#BN<-!&QeS#r2>&h-O3_~2~V>@=ztpG_VOi4y6~!}=zuJ>0|RMr zDK`TlYAFX|wAYni0<0~ewUiKK%IZWCJrR0`RjTe~{Q+T(gR!@xYffU-@0EyCFO{^l21G8d=iA@FQl% zJM3TN+?08$lm{zJQ8~4}6kYy2?D&F7m?(a`EiwKMok+L|Z$eF<6{ImcyJX7{kIB~D zJioCaXT>!G5?BjY@NgMVPukQ>(SHwHhB)hypBfDwUp>{7l4kFmbYr8$)`!+Me8Mx} zDMO1|rX$gau33?1+m3J=4Qg>?yrV{^env9mxP1FK|)X^d9k8L}=`1~K-`?C9`cWWj# zC|kzbx>)%4nB~Fj?KZAaad(H}?$mZN$(=B^;of`*8Hf7Wc5QPa+-}{=^Fd;1vo(%A zzM87XjdwBw;q9jgW%KGSvsyFlvlZcCRgGK8`KSAZkZkh9XL>;6yyEZ5R~oDW-4^nZ zToeDrK?(GFg2c>tvCd0Em_+#M&G97NA6Gt4rvyFDaK;GyqN3Co5+-h^##1pOsPnZW z>`xn0Nvo<>lf|cmH1kQ)E)RNDIBV>%Q@ANn5)|K{!|xD|WoOOM(Jm~*=`e3GzkZ?T zoZYRR83@uCJ%glyVR3A~SMIzHRYm@X@y^Sxi_KnLIiaUoBKHSGR*x>@zg&}f{vL<` z%to3Kr&f=q*3ahFWqWzuuBZ1^omThlZm+weQ}_hE?j1`Bf-se=@D?mK6ln0;`C=E` zt|0P5nf9Zr{PI_7u>}n6YKD-wXTPAdM@mNTk1?(_ibxGu%`pF#`a)Q@NQr_WVOXj5 z-==5`X-4(Gu!OZh&5vjW3Xr}x84H=;ZVMAvJlE?SeB*itTEyg>TneX<1y>CaIhhGH z@Z)czCO9Q*FunrcC+5}bfO^2|FvxS_7I>Yz``>L9X9oFaz|h>)LfqNkd1v{zKH0YS z@5IKt_cx(IIgM%MJ=M*WnKJV!ax69MBL#P*CD|Qah^^O7+%s0RFVFSs2^9su_+*f zp$k|J>A6fJIhQuUtWq7wOwNZra|b(+zyxJ74vUvks&vzCvM4dleaa*;jwuFLTh#t~ z8Br)7X&e$zTty87-suB9+gM6M)~3y@c1!b?Y9ScE`0FJU^It`13`R}(ZV=3+)uzvt z-&-!w%4Yz7YjD+~$F54nx=bDnD!>Q1io@>cq#JqnG2-%Qx@QZM89O>|IxeSbxw;42 z@U@9%!+pKGdxXeuaxZNuZ3~9ja~2X~{UT#)RDecznPUAtql3kSpATr% zAsky7z^*K)e~QTGUUQZhFUCxKE3lyOo&Y?e0AE>~6PU;81MX_A_SkmSVP#rPSUDk-)h05M0#XD> z(B%+8gtmZ$ve$($Z7QQ*Qh_(TC)Wo{Fkmx^fX4<}X54+_r*B6XkGlHy$ye18rDK=1 zF3v+m1ar?5`RmRpfZ_I_C%w#swD{6NB2P0mO3o+vgvmBgNg~8D<)r*0@Hu()c}Yysg&b^~C||5URzSd`tWa)VglEY*(WQMV-p z&^0}KcJ~z|DPa3iLI!Goj3kdL)qNJhM__p)B$Tuzlf$F8oN;O1X8eKGjPlMk%faLl zHZ@lPUn3TRdB8J}Sx*Xfhs}s1pW+SE{!!2z3ET6!m{)#}Bo0Iy1X=2D0?DOv(1!b^ zQ(*Uqh_QUny&+>Ck9zw2z`~X*5e*09{2t;SHQdcTDiPXDJj4c>Ujc9>*6#3J?wTUn zK~+%8LCG5QC1gf+4g;2pwdWebHMsO?D|721T!zJyj#iwasrJ$SoB#yWai&Z*a=qVa zOdYOJHEvBQQp=C*YRN%o%kaFIBxJ>U>8eOtY?V=nh@qH+>gBe08|0JOSk385pm?I3 zOxpqE&xOlh|KnN(;qEME2sb*ss@&|Vo|#mdI7JB6e->Ua$n?4q5Y*TRuWpUn4gn)b z0pOZ6ahc3v`{r^-rBj`4_gg;gJ_|_Ukb-9yRrNLUc+8O^aS;L^TCbj9zsSC&m;Y--&-S&70e#?BqjTVOw{6Ys$1{WYF6m1^qoB(HUVEcvL0`Shn zcc{FCi56$RyaT%#B8nJ#y;rdz)irnl$teE%43k^Ub~J zhCIJKHJNGwsZLF|bDTZ!cIO}}BY{(bjG@q5hEnM7-h9%P%gUAuZoq}!J>qfVEEUdl zku$DTDJkaKVjnt>;eC~?}^V3Ob1jNI+HM~+T?VIH{;{7E_&e_G3qQ;s;E5Zx8Gux7GW?4~_=w40?IswQ- zvbg!`jQJsf{kWr}8l9K%oOs7Kbe&%LSjP8?wHXONRVW-HVRc{f^m;W{`Kc*Obw)Q; z$i;)8G88xge6wx0CU7<2$ekJXve9S`^j`7leidv;$RG_M^n;Bq!DG5+WEBS<;? zJ}ug<_M6FVng5*!F!-=NksV4y0kr<`8jNh`*n>YpA+V zH5f$hJ!(Utt{fcmOY@NiNY=o3aVSY)j%1^S7DCL^|g4i3|AB9QCq-(2GPreyZ0;1oPTd9oE^OZ zTg;DihJ%Em#?w)DW-UBYgUY}nF57X_$2_Lo31Y3G^sBbKF3SXxES%8FAK7A+b~Nev zy7d^X$HJ6Wr@B-ueia&@5|29%KU4DxU57*P%8ubEc2tZbcAAn;P)P`&QuBQ>DQ*!~1Y`xV+q5?OSWtz8!>EFZI2)k-GSyE`Pm zeo{^3J5n$3Pt5OrZzX5X_BtTaft6}y5{^QtB@+?*wQ5t`QMgl8M-EB z(*?N7JJi}DxDa?Flt5>C+z@tX87jW`lQ+ky2s2JgG(JrLpH=y zwuKSJgTx0L=8KC28E|m=4A8F-JQgE*$VAcia4h~~_epay{(rI}AC>PNaC>JZop^*j z0N{N)7?nI=x86dH(Quk8x#$Fw*JlB62e0GZMWOZoCc}o%?R`%M&<^)#4VFQ13Bc||qrTqQOrVK3L z!;pFO>EO968*ag{_Bm6}8J#1FL5K3)9USob0FN0<7Xds1t6ttjfnHxg{b8dRY?aCs z8cm47R?H4}-LBAy0sPjRD2I>m^~-?J)|^*(M&F5vL?u<)bmV zwURQf4^oksBn__(z^quQRpjMY{@+*d!xbp{VB+VQx7Tq~XAJlseD|}2z^3HTd^8HX z7R9aARfXlYNA?fMnQ8_CoRj^BvYbA}fY0Q3xeTVySdh{#4*|K}c|+x@go9I9&w zbxRn=_#%!;VWQygssdd`beujnyR}^soSOERpk~)*c2+xId?TFSP?h{iQoV@@U{k_( z7AzGtQ6sHaWXGPq4>`m;8&`V6dhr6`_QVlfG^V<|a`>V0>zE_~&mWj~dszRax8-8j zzT7R!WwD9dZFa1lTH0){EG+ZN3&C#=oOPGwPGHvYrnUB5sGoOQBGr~L3*%~9+>A2W z=%Tw&DjwYrq^VXvZ}fb^`3Jm(ykEYqKi{~u-X^NX?;nUh)yK82DZz`PN$b(I+I-b~ zGaaD>BSSsZR|Mjh<5a0qGtu7O5@aKgcV!XUGF(>iXZqJKdig!rLcxgwmkk~Z_C#@3 zn5(Ugl}z9s29S1QKb}f`EJLfVw1z^{u>Ac$d9PELGG_L<87oYK zlZa;pb$4>vv!54#KRE+`070Dvgr@H)AJV!FrRX=}ran$^gXcrUrcxDxrey*ans_yi zAx8kyS%$7(Vq$`#qpQi#|z)^7SFf<8A7#ixnk;)%gVJTVw z2SM4)?mXG>&DU;0L(2PrMH=vOiR^Oywyj{)hKz?_Q#UvX_qPf=+U(ot`Krq+$n{(2 z@qhPpKVSL(0XOcpn;pNv@U%Oz++5wZTHH6+hJuJ;gF8--mmPrymxil-Z+~w?MY()m z$gt$ki>vApFHEoLh{z~Z?0d((pe{(N#NH8w7W8V}eJ)zTNIE-xV$S=B0T3@7>Zkx?MpK_My8pvy zxeOg(=6Ne)pf1^!JzBT|4M~H|4ea&fw%8s@2?m2h93lLRy|3*;Jr{~bCei2(RJi=r znb^5(YdSDZk)bl>nEk!(FnI$H9w0mD{8az;&H&f+F8N!o)5n1-j96;Z!Xrw zYiIa-9#m_hfH9gTiY#!xCa8Bea{S(gt$WR!qGG=N@yM|4^29F<=6yON$FU;bc)ES(pokGD|w8@A=#}SZQ;^#&7Z1=Rz8PvVpU-+Y^c+ga)aL zRAqnbD;f`}2DFtqF>I&y^r6?1b0&$ZK7xx3p-GECS3#IaY zFQxK|?=KrJGlxmCj8Xq{$N6|cuMgwdS~b5Zmd`vP97q*?*wWeAK&wEJnFpFkTSq$N4fKM z3la5jKI6Vx2+8AIg@6oR?_#cusFAu{=1MaYTu*XeQdo%=<$AKuerBXjQ{%CJN6D67yK~yCQDoiHRXW8C-5q;g$bby27@_fh%Q?*0e zbG6~c*YQz~Cu^ZtHzFE#I21!xKqL}1LP=PQrqQ|2*57$chx?-6q0xK7KBY*gea>B2 zwUz8wvW?|ns5^pP+ny>lR?&6U$e)Qa{-1FsZeY`v--Uq30)BpTR6h?=sdAdmpEUKo zEKr^qP4L-Z`wNHeB0gQGh&37X8e-pwyRNwTFT=3?d5rD;efC0v-T%&iN9ox^FC~Eu zwj5&NlG%mjl9@Hu0S9s2W{yo{OxKwc0sXHGytp`H``lS_^I0GHx)Vq=!hcZA&clqY zYyE>Or{30YM1F_>wEDqQlJmj zM7ra{BIi6S%czilC};Qip|012{6?!2KU-@dXuK8bzS6KBS3!$6ez;?c`jV|u`K;2d zIrLvA`DJRmdJ6>>gUyKlejtv$!9eNwr~}~ZI?jFb?S&-Ap{d;M)Vw<>QoKGfxY~VzW6#;p~K#GFRfFuF&db?SSMpVb+Ni35JU!ZIWshWk?n<2$-pr{jJ_{RdX z;}>)T7|CBrtOM^8V31Z+3On3&-)HeOY&sVk8$?=wtc+@=nVJseX2l(AMffmSfUs06s1| z9Rvk(CjW4;v6zaQ1Io2pzqMQ%JKpF*APl5#wsnLRCx25WmsUz6E0KW{D@yH855$%K z-BwZjpjW4{TxhqW@ujnF@bLbn%RjNbO#OvIfced@OanZc`0v%A!sl^$DvmN+sf%eh zJ!=Q$e8v=Lnk{Xau0(8>u}={Js9N&)^Yq{7a&^BSGqyo}Z5_LYEhpc8&ASTxuVKwtJ8_XV8j*;`o^ zY0-mXXJGfhp;6_9BAF|XNX$g~+z`2EIxb!SVrl>htMyB19wWQ&`6|KA^vT7pk)e3| z|LQ7g8w897ku2Xh(Z~v6VR3M9N%u=v))odFKHbrOw_^-PBpOHc?Hb{^w6FOysNO+E zYEaOHp*LfV3rBTZOdHSrk>=~N=O-|OmFrEEeY7w?zFJ}80z-sz)CGA?rV|P$#44#W zVUKZf$nG8<27Y7p$1a!b*qmU8vT^)9w<_(DL;rbJ@5F|4h23ozEj{#hbJMSE1R zpC{OeoV*J_YoTHhs!6#KW}cxs{)Z|I1%}xBE98IGK?Z*HpHPPHiQ&`I3l({+LVOc zKGJ#pV8Ly7?2rL*zKeVUQUiJ>E|p$4$#t-_k96(p^h&~(U?BwDZ)HR+KRIi3#0%6U zAXRzRwE&h5Y8AoozK(k2iGl5^HVy|Ji&X~hecz6W4SyQk6idYXui`T2{s3ii8-b;>|@;l<3EQXVHDN6}hgd!`x zY#|bG6tU^S#paRxn`>7rLF)a=Q3)*?xsx9%Wch*aF~uA3HHg2Q$Jq9@v!8oy;$bu; z`zo@eXz)~MI$-HSD{E{l8j>!L zpcSUTuIVuuucvz+!xkKcd;1yeTSHMpshIV;8E}80)$*h=?(ann`$H#K4DF)i=Fgc3 zx%k>**V`#|dcb$IC5DzJIN@!_AkZw4bMuXaW=5E)OZ9k&*jjmC8o0EYiA&(L0N zjpK{%yt4O_0w1!`{K}j(#cXRfA62d`#`AlUYP%n9bZ+ZO-e zx4ROLIn#Z#mpFVD7aH(fx|byCMKafk*L$mw^n(>q z<}yhs*GiWX&Icn=Lcc*7ab0_T1atd7OvBVHw>uXW_Yp2ab>-uLStCFfNQ8kioMK=T z_)%LhY+@HJP~TK*$%*_qa}B|YWwz8Kq;f5kcO{irw^k=JCp|pGsl8`9crq-u#dH}~ zV(y>b(s#c{z7?ARL*@g7E$VoC`7Set-+oJRC(|}qObT>jKx|?&y_jJC>qkvYfp1+6 zKEFU%22Hzr0&i}|pLu9?R(o_L0eWxEbH1M&;qwGd8YOPIB%9A!lYjc2@lWC{57{8| zL{0=NWA8>KuLa!1cVXUP(;op~E-m`rzYR$e`~1`9Z{`f5BS(W1^McK4M8?}oSfzpY z&nl)CSsp^wdHK3+Vezno&ETFcp&&%V8R&J4+Wdx%DlS3?p)L_a_K(8}QC+JwykCnw zNQJA=mX~xqJh^tF79eo>t2>R#{T!@@-lv$&ze42eIucX$vV9Fgq7J5D$^|G)O*~0JuBe3FnFzt8dtILzh>DS2r z8Xj}{ZHu0&r5gP=b1(^+jrVKq&YrFgSaEgvV_Wrq38(p5XJtFc$_TzkO)b~qLoUyA z-SI;GjI$N+z+66XrEc}gdIJG`9VK)tWzJ3m&Sk|-`@l1oF`{gkD*IsL{JmraN^ajJ zIRWoccn!HfqNGYfLzlnN!{(6IR-%=o(3J-l-PlXVS&QVw*iC+gHKiL*EeR~y`-g5N zlD3?mn+?S2@y)S{%}6EYK#FD*E|RFFujTX8fmIWxmjI|-n-@|h3{y~^N!Raw{2N!J znDHO)eeA8m8c|>7`8YTYG64+*Y-&5x9v_!X>N+pi#`49P#xws-Qwh9*$8Gu$`Oo%t zNoTb;mNp*sv4e#U)9`KET>f#{8e0ZDBBl}ly&dhmeD-+=OsK^|8-ucE5mrKt`%}i{ znF9*UG*Jo})sSgC z>9dd=PpG+Hgd#t6IKL3H7in#wdb=Tv&b}i|hC;|@q{SSiX}_VfHU8{VV!c|4%Z;PY zJ)~(7nkx-JwM(tQe+$Cg#$?+sgM7G+Zv@(8Tn^?B->;E-gz@msUAT~%nuH`-U6H}a zlFQ^)Tg>i`qQD&ZfpUyrmrwsU0{QfKK2;2OO7@+3hIVk?ka=@=b^R z)pPt`#m7|nmMre|gwpLVW;Yf=uf?jDA)2!Kui|!ui0}k33Izu4IrbP$LgoJ00lm|Nc@SfM*$K9bDtvD{`<(6?Z+)v_)9e}E({+) z>!4xiEc`4bnSCzOkr_I4DYPbucIc70;(2gLv%JtE&#$U^`ac<9x)Q-qhca29)2gqD zY(dN!HMUQwd>aEbjuMSxe2q$L42$ARp_W3bBq9!1kfEI{WV6CQJ8^+57+Y0y-8_EV z7FX)w=qX23mHMwbNdDdj8hEDVr}IH_5ZQgqO^o( z`RSK9W#*4$>tW3J3i)4K9@hfo@+fd%RrSNript7h>a@3k?>|IrsdEc z75-^>zjfY-XkYz8qB6kdqLpZFQ^|fB)CaT1@uox@kmtBd`yjQ4%FespH2r>JEUH2& zr^Ia@9HKb2PMgXMcV~;6KWB`c)vP`5E9TRC=^2TG#GU9bufI!=&ErA}H28RIjlhnf zP!nqr$pe8x93U__wusw8BvH z!BBc6+S`*SPpH7>|3GH~6o^n0F~&WBUyGzL&aH6uPaq?Vm4r6b+xx~r6!H5ile@5T zn+^peN`;0F>pOvm2PVLWH=vChQ^)L>6y}N3gBN8pQ&jFyG}zX{f3SsbhJ>`3p(uam z?$7?2nqB=<)LoINODW#(gu;wdgHlux8lL8w)u_OgHA18_QKI<)jk-G+f?QD3jXr*O zVi)bs+0-h;qs;Gyh%ER#>a{=Owj{x|^?t_+gpVq^5=sheJPR^GA^&NL#P4aESm^;=lP2O{G%d|<~s zY}dz9tdh42Qo1^_j^()wnTh?ED=g8I+}25&n%dzAL92)Q^nGT)6Gn*i?zWDdYjWI{ zet}^~M4L8Lc;GQx#A|%naiMow+BnpGThZ;8v{5I#7p40>k4d0MnSMfX5l2!PyuVT+ z2tRTOsf3Hgzy*_o7hn7B9<1maaaf(GFQ&>II3}SI*&vM0ha~uC#TuPN1Ur_TjajP= zZJ(R2mc2N(f`A~rB!dH7m$ShS{$W~g6JiwCfoq=*w9y9{^qM&wgHJ4Q zRdgf$%(<6Z#}`yp2XGHI$=MTwmhd!wkN~k&h!-+!X{FXh@{3}<)0q)%_R-;{R8o-G z#2vxNHGF~4%g_dJlB;0rg~$?w5UBWVsbc>CeC%*wMVzL}MGR1wYdtm4B1I%9HdJ!G z)oJF_D?T(mo|~r|pG&QGN8RbDQ2k2nY%=Q-oUV8AvGmkoBCs_35dv}Ug}t`0fwn9o zzo-c1``zZ0zY8198qdPUH4t~W`{G5lyi3!}+InQ;O(wMtM%YpvS03?1ywU2^ zdSH%mF*EuzDTbJb8gs>n|6628Umr5-b5b;#7^3nuhks_~LcGcFzw~_>DQftl;57<# z<75Dn3_|S6)0S8zrYb&)T9MpRhOE;0qfpH$A)YWVoW0+*@+UB6`}iU6llJSbar)iV33RWOsZ;ojAR`+~07}li9vTspH#G;?-k0 zqqeQ7uuuqv#L`I@QqNXR_|KHO$`!DC{Y|GqaAy6nmpadV!|*JK-@0|{(cvSh5@)0D zvJ*6c%;$PIP61QLXS)lKP4Bvm10`R)xYhX(#`E1u`4)bPYc-lPj1c+A#Q=GTPfkzg zI5c1pSt%V?`d2Nf(5=AL*mR~&EKpNSY%E5kgB6@l{?X9qu_ZFRpt>XcM!|}4=Z*&% zFk8Q&9L!x!6FTa#;q#|)0Iwm@$Y$AEa`yH+2QPQey~1=av(chn14(9+4p)P) zDIX*(vyC0lW%h9bYebz?FxQhe2J~jS@UO}#G;f%EoKaZ6VR1l1+1s{&3kmlJq{Trq z_NRAhR+fKo_mzH;Ognq6e+HYJ2%!M+`&{q$iOqaXCavr-72PM=+s5%wBs~0U!iN*H zf(W7@5DNxu*)7@#=M%Zt?`d?r6s3qvL^-(6=|pcB|t-`na+#AaE!KtLx?!|MT%;cXxL=`|R9Q z7X6$*qSQ)t)RZM3;c&JHjSC@_&p8UdQ3r8H%K)rKh&z-r2ueD*cK|AU)^hw%pmc^W zuKUp&e^`wgCglC}aeZZO`?ouL5QKpap-`$hm9f9>c|SRJm$bvHtxZ@2XqD0Y%3XWB1Q=WnRAi>x9yuk~D7PC?|uGF35cHxbq z;j~_zugiwDZsiKa-+KZvbgdqrKwK#|VxDnr4rJ9=k|Kt9T|-hxm|9wTu7S8~MJCE; ztX@e*t~?$4*SDCnPjp4_!Tcfyk3ah-c{FGOp@pclMhRSpDXMXwLqGkUqf1!FC@v-ye?NJV%^vV9dH zy1LrG(jhutdjPiE59}Y%QC!Ek8^r^IfxjP5fmXmWGI)xnSP_zD3eG68B=KY(ZrfKV zq#Two$kNGDn#6Ae!6YPXB10**N=xJLZy1r5B7}i$)F%A94|jjGFwXT~M~JpV9U#)C zvZsXndD~5SX?}(f3sI)-Ui&>A?ILD7rL;s}TWa@-eVAc~p@taveL9B?-I+VCB(-CV zAFi4AHgEbVgT;#ZkBhybW7Y+d*CA7*v?BxHv0Txas z*~pCSo5*Us38^~?9bbffSp7w)fJ^o&ye)QL2Tqbii#`tz0WW9C2El(V=g7QH64f!4 zqSpGm9w|+4c26nMl?8 zAu=bS9<{F}Frrno{s!q|$mqs$QO6Pzt0l5Fpf#-o)}7%gEBpi2G1D&^q2u!B76Tg^ z9TM^k?mQd`L6aDnCM;YN53qcZYh5uqP|BBJ!*U8-*I9naJyJXhUdGzuG+o-vZtIJ1 zZTka~z2AXwtb28?*soSm=3u!CF?WP~XqW^i!r3*1r`oVjaI-;JO5Mu*?Z`frZ1&kh71dbilHf6GoNzXlq<$mZ_Zn%yyvLAu ze&qLHYA*TR+3K)cOStak>%kfFLMBX(QEl~Eh*=f4#HGE<1HUXkzdAcu{V0Le%*ImJ znDa5*ypU;Az`Ys?GIxo`C1%mcwD)oP`kMXu=9~%1M2SVPi)!4eYYouf5vpHv7r@rs zaB=WJaMd&AmG{)xALo@mj9`2CAe)&Oj&oKIyozGU9hf#Twk8#7^um;oVX>K?<-HpI z!~!o`ybTW3&&px_mj#K+5`&|xW&`ZtjS`svqg- z^uL@HRvq9{8^|){^2xGv$>u@%{=-F$jj2U(I%6Hp**FAvNmX@U6Pic@C;4?;_Io?I zxtpTsR0{7mgdW??gUWa&l5A*TdzM3kNT#3kEDZ8&P0faKk@N6op@c8ckEd(n{g3*f zAgz+wKDX*^LBRJlN_ZIpF%bynP~l9k?+Rj_G$K8r87PugO)c=gFyc~yF(wq{ZpYK? zY2k5dG(|s()ivPF?&M1@?7^eFRmTVJAP`6aQCkkx=6xuEH@1aU1dfCPj{|gEp1ZE| zr%&$p~q0&62=|N3%lyy6^4_PXr$hPm79pz~Jh zux7a+%4cu8J$5R5fKJh487LIg7VvT5@E@Xs&B#)L5T+6Y2 z&-L7kI=VbGLsU)WTBaOFq)U+W$B^q5Uux8U2IF8Tlb{NEVNLd(b zNQRDwsocM|B2Ft)rEJ!YXD9q-6iKXYq{?`D12~+JrsUV}S!NMYHJTVD;jGq?ci=WH zRuL0(WMeB!DsGk(r4=8Bvz#bB9WSwTRUy|U-EHS0ha1aJDMaCsYFgN=(B6qLytk|> z#A7OHd7t@bzgAS_rdX?A6&vwS2T{$Wk~uWg^5S|Z?=!1Yv*z%kjxYCRfl?JNI?^d) zV^LVs1wGs2VP!;R2M0ycC>8~cdxtjUMpWaRKYbv5+L*~e#OgQnINGcrm+>$3s3ih) zJ{Jf>+tjMqsMwIn^21=(wa>O&%^u!Tjbnw&gAfM+TtTQAo4@_6s3}-<)oReF6C0tJ z1GpA|Bx2tyPEZpJpR(Z$tbuR)X1G|XK6hGMYmNchQ&zFBl-x1e)H*l&Pt35IQY5N> zP9%VNB3|QS=6=}z(Ry`s5AGWe9%j_2!fNP}g$VlZz$})idyL_D!2~91(zO!jozGXv`VuE^I3kaE+?m~!?vC4On+fB=2Gz_0#u37X7J`!} zA{z98ycz?e34TAZr$W_0^d)Yrl)ou82;=#D#dh!lX4ZXyLXuzJ;sf6IeL=a&(V(~5 zpL|Wt9<%EU@*FvDH=@XbDK(pcSW^(1J47}tNyJ263h}LH^^&U|s{#h?#{eG-un|rU zj>>`p(x{nxmw}Kc9gp6jn5WMjP&~RflvH>knT>;2;FW;~>v7McTdZ2)PMFq`AXymZ z*_gV8AAR&-h_GQ*!B#&B?hMD~$T1$b+pcbs{dBEus+4QFy6KMbXgZ9vH)3RcVU3Db z;ZFLPr#!WpHD+ez6P5~z3idoO*z-Xp=5kSN$#ZVIqRjWg$N7uQo&RU4$d@D0A+>WR z!V_Ot)u<5f(hh)}+yPwcI zAWtd5U{^IFuP(Z)MDzVSw%lpWXPf}b((Wqoc$Hn~8{!KNr2D>3;|e}~NW%&FJ4sPuzw3)It5M&D<$b2T5$jAz zZrw}ptm8|2A{Eq6+^68Az$$CvISsZb#U4HTVLQ&g<6?-fyVyc(h$U_MiKYxx)&+SZ zse;AMV-`dae3z^V!E5;C?d{X{74(K36A6>Qp6xkx6OpeLELKT_7g0s&)p3+4bdY=8 zP6HhQ^K!*%Ff;%evf=t*_qP*Smbh()2c#7hb4S>Z?wB=_YiB#D!r`yUNtHuM5{Uh3 z2E@oJ(JXMzO15hawlVq*WMxZ2*l&X|z>St-FhY~|BJ0s&4vE7kO8R7xG}&SGB}jQT zad4o9Lu;zD)4IPeh^|&Z$IADUVGXO>r?7D;I~SssB#?+X&W%&dqERR*un+Z#RRxMy z=N1pMj9Gq-S`H1@bpC2~;)S8l5TR)B5I7AC^WA^qWTD2S=0#mh5t6oaSqKgPBt3}I zW3u7HpuO&eo`t`G{MR&=&we}W{cRLPv5l)+!^|FdG8Pbb0F|a7;o1bbb&tAe1Tux;jtFw-7ma4d8-x0rjq|0lVS&9Z2tA=iMHE$lY?j zzTSN+D+lfm2sn<-()FCDx#?gd;rPD|vF7BKkr|4i@-y$@&V)us7bdwNeWy2aF~7T< zJU_@p!W78cCeBk-f1>|h9`Wbt&HhCzb9QrK@u6adx4VBg0_bzu<1w~mw;ub_De-3H zdDi9k^zoSI@ZJsD9yDR_*zJ47n)i~u^_Em3+kNGC{CWlg#bMg>KA#k;{NMM9H9t;9 z1Z!W9JOJwGRu7u>zd#xO@gEBYMW8dSR>D8S_EU0%x>{>Sz31fz+4zs*!MX7FN9#Uk zk2Aw}m*p|EN(d2avI@$$xI8*S*Ye*%@hpqD+CON?3=e@+seqL`A4p&V zok@w{F=oiug!}5ZgAZkn^NpaN5a=nPy@}CTa^W!8b$k5F?^MWqouRq80xG8|PQRKW zU79cxl~HNcnm9G@#$psk+z5&v?NB_f352g^Gng6XIhyBQ>o$05a8ZWOxLzuNCv<{7 ziyNTKrpCQIc|E3VNGv(3!+)UigW8F6=}t^rA}pM$DY;ZrMwz^SR3$LZ-}4Gj{BKhFVybP;SU>{j578EVYzay5(JQnndKIINu&*B0~J+l&j#F$?3Bo)TmG*6i% zWh-3@C&y~9WEvhe=ykHNdcxY;O0tV~F);~G87auw0oN=!B5OzZ@dhZgG#UEAVkprU zGR0c$cnliyBogX+MNL*JVh-YA-_ZTl2fI94%up<*PJfu#6hm|D$vlX8W@wc}$rt12>Qi<%Vc?f!TuYk9+-A3EYqOiLz2o1j#-J-IK0^gwc>W4P z)H4&7i=v|cD~n6>Hx5e~Mda!X z_%_SF{Bd08?=s?+h<|A>0pt`*O z_IY_>;C6IcHZy+coFfBNvLYOQOWW^Qt@Az2a_dctw!=nrb#-O3nkVP>xZKFSn-Tm1 zG*0u__#FCp0>!a!fcOsYW$h9MfLB@H*KxX&46d7S5X;;}2xUBgWZ(IK>hJU1r|UU* z17(yc{AJzLzDZ|M!ydP<5*>ZyF&=pwx;9xEhCy9|W~EL_pnJLlB#Rp*4^S?EZSL>G zO?OP;1v}LE%H2-)dxA)LL|yY6Vjd>qg`<9r@bPk5cPAi?Y7&uwA^QQIJ>~8CgyeYW z5g<|Cmk1F?0wrcTXgZrkjlpFJ@E?1bw6!uWS8C#OMIYKo8L7PJrc97El26wsY{H4> z7qdh|C#1ju+gw{4U(EY5t^#(rK{P$;I_=cMFjrKB(UwKe?tR;{Z$fm_fJ5bVMm1HH zmxz>>B;dRvQONS37X4&ehYr{3w!x-reQNNPLQelS_5N89j@Stz8)E- zjysA99^FAFNH(=Bm`k*(iHIX9LA)a)LJ#99=FpTi(c@P(Z32tEMx`d4)6$Fpa$)uC zWUz;Uhgc()^p=&hq}3abAv9I5#{a@c+eWsuvESQUP~3&#+*VM#cOo$HFr)s%qudcheMQC{}ENdM& zXDn7JSI)qN9I387Bp5I(A z>RjXXUtC!JS|VZU%hSdBC`Hfj#(hV*03XWl;vx`*e+K1G4kc0iloLG4*bi`h(|aP~ z=3+~zBseOiYDS;T2*twAC9-&Hj!IywnR<1ej zjmvhic|{(N)>i@&hHu>tm*j0PuKLhx3mmM>n8VPTdhc{aO3vjnP5onk#0n^4s8FXq z&rEDhSG-M`Fc~xzvZGaCBISz=job0|%C3^2Wj)?iWq=Rag4c`(3o#ct^oPQQz1$rU z0w%#8#99DZMM&9_zcodRDUwE^SZHW@kT`D8DckV0g}}y7@G*RY)WCCfhVD!8N;y58 zUInsLXbh_{W?5PKOM`?p?AFJ>>$EmBJ4EjGDYw{d1q-stsL^LEC!v8z&g{had89

S$AnaQqXMdB zHxKv@amlxP&W|B#sNCW{?dA|A4~lZpY`z?sZdQ?TCdQe!YN3 zM+;-JgTRRSTcJZuc>4JX*pCzZd`<;z^nTii_d7Sy1-VQ<=z-lMKp#^U++m4`irR`! ze;_bZG?SFB$#Fod4hss20h+0Nrx z1P>#`(I=MXj;q#MU1SPmumF~))sAAG&MB?lw@A? zN>a?3e(JX!GuLijA^YC_KL9F0)xN!#Q3y2Jwa#eDRG5bU3_?njH4QQ&V~KV`WF#$> zOduSWNCmh;gZ6NAiaSh&SjvQYr8_Y$C<6w(^9n2rJ!{so8- zEhGXL6%`pN?nG-rq(X#98Bn1T$*em@{tH0K&~D6Tm|oHY+_(5SioQ=OlQOMrWjAa) zheiu4J1hueCqW}=fJPI9ici1wja+c_fehyhhMR8j6;^Z>KMYy2rPpY}t5^;>dgT#- zz#zp{ENv?xEGO2ZqoZA;qoZGnAL>n;z>)K2A%#b%G4t}c&y%#XD-xn{f7^*IhHR(7 zU_6MaoWi9p>rt1jVorMpXU?Bb7>yxChJqh3To~i=l`C1bc^eC7&g5tJ-p7MWS1~j+ zY_V`2fixmSB?ReMJrPByHSJAJROf0bmBtWQHAbxoe9fe`1{_OaRYKw@qZyTUJg&O* z?VNS&u`F7)5|7ASghXZpqBT(%@ZJ*-@~Jtg)uGGzJG>BVbe~SHNm{@ zyea5>3AXnd8EqB8{MpFS0M*wowAT882OgO7g)e;Jtj~PrGq>*T0PHrfJnSFPQkTiaUovK7n9 za9lvv*NCbGbEw&WAGD+CUA!Fi^qK_SY~?=2tuLKep$aMN{7guRbX-KrMWj99cqyE0 z8Yh)Tq&;LRg>cQh57)s-r%;YWg&|?F1fdZQ4NE>ch|oo!u;inH5Q;?u9twR^?uC&- z{gemP5|9J^eLVQUeHzg9_4O=Ru;8wzo_gxj)22=HKli!MZMg8l3-bVHocRWBzwOVj z+w~hA9lgGxvFXCW{=Q?h*06Pu>wo+Q4xKZHcN}{Pqopylh%Hhh8~6oEL`Gc4&TzG3 zHa;apBIECoB8W=hW=ueJO*JeMo&V5O{uteQEg>RAY7Z&Fkq)5_NJ&Gb6OKezj1Yvh z!-BYlElo>VY7bOIAsV0<#lZCdRbjqAWjF<|RJKXf%)0i?1kqZY5w zf)WC)qOuP_P{wWS+_^(++_Wj_b<8_tU#7NoptWO}6?PV$I3m839Wm}4cON^5@z0IF z4#SWj3JD?~*KtU>F0J*AoO9^@TyW$eNV2@~pd;xW?&h;M{+6wML#*rRVf)tY6jf+O zMM9&6B;^Q#AmHRf4#!1OaD-Lw6*$tv4@YUKZ=$ufj=texq!NUL%$hWrkH6(2_M0`6 zvHU3Y*)-{tOW?ai7{|Vj`bMt);J+|`>I_E43Ji~qA*E}jgDpibss0WBK`9FcjATMP zHEBX6WTjK;yU z;1M7C29rcX9W)CbUjid}fk1!eGoQKT&_fTcTeN7=@ChfJ#Qpc*yEg&Yd;H^$6Hh#m zpZw%UTzB2K4w%$2;k{uPzAve;XHSLGj)0mfbjc@?mXQ)YIE3!)Pj;5>o}HqygDacr zNzIu?)w~&`>uYfQke-zrh!(E`ztWY|YzuYc@T5Gslo|rHtT>*0!Z;Z+b6w4Ff_uw^nFeTfyo8g0Mv7`%nrHV|nyg9!B$K zo;R9@d@&Yk5g-^G9Mlg#{P3y3sXaYC{KtR%$M1k=PdokWw%c#}^XrBn{LB|W%NMTt zJO>|o;I|*T?~!9lenC^p3)XGrBj5aQrge33b>WXZ(!`|blF^L3~~s&iQ`d&9|`f5K6OQD}S(v@Flp!K50FV8!NLBcpz+OnA)y9U^~tDnBXLF#I1 zIBfoWB2`M9ps`&ir8SvMidmB^1s3Ygvsf+`M&xOaA!LDIY zfw2}|Fbkeu4t^j6f{hzDt-bi-e>wISzxe5@y&ZtP$3N_tIddlW-FF`sTyVjAuf6t~ zs|N-KT9TIik^7^LSzy|Ret?#yZ6$<4I|9~i1m7` zw`|3KU{Qh_aI-nw`f9RWEqD!eq-tw$YqB_=XL#FECV|~p#H)nYts?_0i}%e~|6WDP z?z`G@p@pTuSu+t`Hk46zztvW*ReB!EO`)q4x}n}yciObCOTI|}hDTvrH)4A)m8`m5 zyLPc_*RBg^&z^mu*80TP^BR8Ps?T%K!3T5q9e4kswzhsj$uBGcv=|%}15YpGec$*# zw|wqXbToD1hdxqA2qcl!L5thd+L084VT4xXQaM8HAW4A?5keA%B|Mo)W~WM92DS~f z(s2-xnahUwxMV7hb^J36qIbfD~RCNf1}CI<}`#XerS;&l4+O;E#_!LUkr*Gy!bV5hon_rTuuY z=x|3keEDDB$)R(m5CkECQl{Gxw|(t1B;dL(Yj$>{{Lt)_%BU@(Vl_Mc@*@CYAFmTL zdiyJFhyn4@+06d4rywwF45=Ke{r~q*#9pGE@RCj6pz^g=L=tdZr1Wr*L_!gk3TP+I zSgA-|Cc_B}=5xrLHl%P+L55-}WYvz9Py$lGk^Aq_Ii5?j>jFH+Jm^lenY(S%RUteGA9k<_lAh0(9 z*n7P8$LBux89w*9FR*s)TISB3d)&SE-ur`rfdLa9T}N=@A*jO^K(S;v+&Crx3(R64 z9YZXCF;QBxc{9$!Ii!wUh*O=#2_uv;bKKGHe*9ptXK$r5B!%QsTNU3l}cD{^_Tm{^07>t6%r)`OMQ#128;1xb(Es z&)jt99k)#eG~0HG<##{HN4tK;&;IRSNy(h0bSZ>z62O?2hI{Tf9?!3T9;INPNfW8g zR-+>iN2Dl)Bc#*SK!_tf{RBnELn9{iGzz!l1Pg?i>gqP*#~RQm}4k zAJTPEiE&b_UKqVf6Tphz3lNb)+o-?$Q$%YW2Tq-euca|8QWml)Ut);&8YKb}B~{WU zml`~bCxp@^l=RR-;)xWl0$*x$SU?97FI7#H64bg5b0@apIUV@Qj4NCr2nZ0$#lgYR zf*^`G{-FIheBM6P*Hz=nYO+q95tRx{2qb9-(ym8Cb&hX-;sfkAWj;Ze!V#eX;#=Q_ zP#H{x(qD9!S;ukKp$kyTB&XVuX6+gVGc%g&IAovc z{OPgh(2i5KzQ$lW5^SO8!20dzmIi1rehs?13UR=6ShNyR&}bFH)DGwyMC|MnVHoIv zp`jZx+1!K0!q~P?UwJuSzWSQI3Bcate}0^Q{`q|Fb6+qQRLY~aY}xX_=;){dq^?TC z@rS{|`#>RYTErIGszqSF7Xq<<3%c95m5EduJ*@-h@P#-XZQ%PzKOzKD+Ci%jFPo<0 z>|<~+$+%1N`0CHArz)ERmw zRRm^pR^{zp3lf=JEnMMg$P*fli7s*PJ%ylNdw)~sh|-!7EUI-ZitfxnQ#TD z0MNzjPokobB^$PL)WZ3Meq=;|Y{ee?EGVJz6!<~Jh8??zT*u;M5_!K@iM%B0e<-T~ z5basJp{=u-NsTRpp*6#`YItTn?^ysz2r>RM+C#J8<+K$9(#-K~cSVEI>{l8{8BnS8 zkVt%~4ewro>t;+rfF=+=VdSImNDFg+8ZLrs_7dqJgo7f&lY(?j21$yXTZa}3ge1_R zY1s?GjENKY*qblpplJ)p`w|F^GNp)}9W@$hbd_vg6(~&r1V;Ja-sjqm^x~U5G?143 z2yHvG2b7a??#W zam5v%UhvBse*MlZn>K$e4*oRP!)b@X%&AcH?L5)UJFO@=I1ajh2%cVQmczWsFn=aY zYC{VLStwc^bCJwG1(Hmz8le@s7$oBJLI`AJDtv|I8duIFwV|7t_M>U*npkdVMTyNV z(xA@chHkv!DWl|OG;7L2AaSB@9Beg880D`>i*h9-F&yW?Vf32Kuw}dHhQv35>xijS zr#?An&YX|la?34Gc64;GW5Zsx1s`31Rb zhR0|58 z9(MNjv!kz{e6c_jDbk)pbvA44;|Wm;92_DvI|lmc9T*^&uCrPKWv5+X*Fq2#i5TVC zb!+(k?YAPO#EmEiKW&ANRHauynft9O!e6Krn|pe3UDx6vV!ca|py?$Ngr*clZ0+eo zXFU>u{|YDMS1SGu6vmv4@FUX++r!hQPM=81NfQQkxMdj~F$GZT@qGhfXW-HXPp}EF zj?HpKWeSue1F={W7#w5FgExnhP(L*i*QP?!3O*@mlW1kfJj$r}2_a(10FZ)6X{509 z)7Y>|YaBA@%g4kwOV4!2%ohNj?ZUe*RSEO`F8?Yc`?AWmbfDe7(!+huZZ~w1eZ}?)YsrN)R3;pQB|GA&1OjFveed9F1+gvhgY+Xg=NlkYK>FOqd#gtmc17}Ypy0&C4-NEF@T6%r>EQb_vxhX{hu&=i%0 zlp_+nozNhp!@%GWgQEq=lq>Rb8|l?D0AZLX8VCXlV0|ezVMbRcDVe1tN+=|bj?-tA zup3Yoq^p&QLrGUnC-<1P$%zu8>^E!=r43b7CJ9rlwXeq|EV1@}EX5m-L_}=LW0MPI zu{%=RgvB!FoVd#(BBLu|`Ttd^I;8LnE5h>jl@7665;awIXjRc_uNeP0I5gDOQB;bI zlK5ysE6^7uz8LZB-(q}Tk_;G$=$jsVipQ3&=KCLiH^(fT&CuAGd7nZcg+?h&rYgf_ zXB@$0%hy7>+*%RI+KLRARsxO#D>p$+7Co^AN+CLkAl3+2u@N0c&{PA{C&0Qb0DAkj zo&S2~nP-gNcH8Zr+}i=zd;HDE3CA7J{SQ9CkAC_?aoM{sbDwzfna#t)1LaQp)K0|t zCqX6+fif*WJHJ#ivYVbnI}$ebz^uv0852=qXl|U)ZqzoghK|{QN>Za7fp!Fu75va; z4_W)?y;na0rEwHEk;V%nQh_#REJ29pD`aH;u492bTG)**u5UDDfsP90FB#7`6@*fN z_CQ9kX$ve~3Hh<|ZkLP<%x3NTzP{zQTNmCk;nsf7^O!MX*616~KIiPOeD#`#&OGx> z_qN+^ONiWOoN*er-+t%ocD;v&jVV*97!7{l10TBj`s=@QC4dY9{O4BlpFjCE?M+p@ z|KzjChaRDb5-DFHpr*ct=8i_zF56%>|4^ex^DvT!tvx6N`IJMxDuc*Yp)+YS=k%=F zO3cqw3a70B-PS}FL6zl%ds5>#4vx?`!br0TA(BeW2={2pV{{X)g%p&E0ZTS);F$du zCL%kI9rd6Uz8+@hu5SMId*7t5Z-}Z)7RM%`A{PA-!Z`fJ;8pEdLP6p(Wbk_kgcOXF zO88-5>3&g#gt4t~F`_iRBYB1kMX0Vx0FERMhOan$H;<1@yIb#34_<>SX{l{639B;k zMCl?@q!Bj2Il_SJbev{eilPw0KnyGuQ`&?_Xb_HJam2FDS_?~yHwuV4mU0$?P=*L? zJ9W|k=*pb~Y!YtMD`7;Hl zcS}9gRYO$fN(l$MGBqJlE6#Np7bY9YCuaE;^TmLY_#ge%vsHm33 zD|i9Kg{;t~10aP_hpTAemsgsmwYiy?dTB0b%5*h^bfLZL+Y?>N%6iNJXLf)Ea&4w=~2L^hiv9|ibY;9CX|vDSpr z;{~VUMW^C%nEA|wQsBAx`8@yfwV%>EIE?4IR&CL-qEr#Nbc#z(Il{CVDqd4mf-QtL zLK{*-7^0tEgDw@3!a++ro;+YCG}IUkqD&g5cYu^gl=eLDO|$3D`RpT)KlZ;WK(@C7 z@PFv|)F&?ID_^~aH^1}Z%u^3P`ta5*TjnG#p(zheJOq8{zQ{;#nxRbuW-0 zL$qT+JIDx~b1c_c8xxFp;j4JosFLj>_<gK_`D?_ zkuR8Pcz6^>MqxM)g)%mvP{{M-lTT_P#Nw@6w({>E|KuO0PM)&$%FlfI=kIyXd!Ktf zum2B!_jE`QSnpi-zvS^86o z8S|#&rai(^faf_JckGEoQN)@xYuNhN$}9_Dw1ny(C2Xn1v74+xtyif2+0l(v6|id} zW^>r-urgy8&r7j>%XW4R_EFnj2U?(23FVCP;IoVP#_xW|)}CJK(>lrJ+@ z%9XjcEh1C33yT9NmzYY*L|;E1GHb08lNm!P&}`}*pkzg;5=q}gHsWP~fMq}AGVm{7 z82^CybIPQsNm*5GEll7?BD5kBAn@^05q{tks(`_Kfq{J9j4y0OuWXw>n@N*Pr^#kA zRCz9ulsLl0Rp3YurA=ZGM3w<0oMdcb@H4TRQbji;0awa#9f3%PcGj;5!Xl9u;ozci ziIh(%%qROo%FS8af-OL70$|uV0x2A%aIFYcWfR4`yTFf_-PJ~2eH{bcyTH}uWFck% z>4=JXj}>Cn<&WA{@ET=wF)|stcl7X^`xo({H=alknM5a&3aJJ8F`qXaGN0>jdyrj& zqu{#it}a0o*%^fkt_MRS@cahU!E?&{UD|^~=OP|lV(5XLO|WwpYDb??fzM$7z~_!W z;>a%?eBePmz4)2E3Bcat<&V=(J(aI~^%{Qjs~Z=-k+^pD8q-*$V_N@?L@2}mH#cQPUpxl9#HFIB^wv~+*ztA)KP8!Rg%C+a)mi>~ zyT6K^`D>Y2&1#|0jzcNyP|AA7IyTa{c^_{qAT{bEOQz)*Ii^i3lmQ}YZGdJ3ei_IE zCTsURNO|b$9JFFvh>-yX4v)glUC`YRqXn}+YE5@+VSiEyx#%7O&u%Z{NtS zkx{O>_#&jJLE+#Dm_Bm~u4fW}zz=xC8{WX%-u5;|^J6Ssx|9!o;Dc=4vW@f4KaVgB z*|cdBN-27Fb`zoK?dc^bl~5`o>g&gAt~Fy>?CX+VcQDwSKF?!uex>^PcAgo)Vit+q$ zGGKKIVk9|ABws77to*Ma(%JySZ1CCAJ7_j~uVUtJ-LqfS64)lL8pb7*iOIKYzt+_N!^|jQbQ^-((aBWf`6Xi!oxJcgP1aQ$!Z zLe$okixE|U$E>7&L^k=d)YK#)OBP;)ay_12x0N7L2Fnm9hgzc~G}Tsd_CfRc>0OT- zb0o%hvH;UH^RUi<4s7j(l#6rFY-0l)MNpkZA2AmmcpjnvF=q<8cM!rzcXxM-1NT2* z`_qe`>Db!=*n8~pc>ksE<-dOPL+-fiF3vjR%tdc`+glC+p_Q_wc}oMl`6TFQGU7H$ z8rxGTY&B!%p4y8O`M8~_jHrdO!B)fuBT*uEYQERw3jG*NSnhRN$=JBH9Cruw9_FNp zXbj^jsN}UP96Xb1L_5i2%?#O8NWH{bjZTNh`Yb(X&CuDhq4b=Fy9x88bdl>rF^y7a_y z@!ioeiiHwic-Q&VI4vMNX3UsEwmM63v;b(HdFB}|x#SY+>+7kluA#G|gAMD~vuxQC zzVn^yIp&yS>`VHjycA#l(lvbMs;kVVHaun!-AW^*rCP=)bR8K$CfaleV&h&W6Btlz~;SO9K{ zy4qTlitJ})WR(m45CbFKyyKdmv-sH+CeryK1j7*VQ3M_)$>>6+j#%Q_q~)^CXIp!FUkkCA9081n-zIr%7lbmt@Z#Q;1D z{nt8imP|U5N~5EQy6S31iv=QO+VnyzyDe!D9_Rof-vCV$1E?rrIk>K1{0tUb;>IEPn3U_V|21 z{i!SX@>jmJHv!mtz`Ni5ZvOkf|C|5%(GPjwdoJ1Mh8ur#<*j$zen@g>ONp324SnX3 zP?JR#e3X_}0A7P5z%}k%2_VWaX)Tb+0$D^%2-U*(Mj2-GR#Hf~dITC_lD5CNv!ISh6jwNfXwj5Tyt?lt&B|z*mUK26ZjVLN0bJ zvb*4s0ZqknpFx>=SYHdx^`?s3H2~Xtpl`^0Z;RPYTQ+m~r!HSVbM~y_3CAAyzKbuu zc;hdA@r#E6E;|20ZoKJtulf48?Y7%EpkPZRmDWF0^L z)^FI^H^|lRelxQ>yXb7JB{g*->@;RiPd)V%g+hUJI!#SYHIpYz<}vXoOO`C-*kh07 zoO90M@=ssEehc=SxJP!f}iUi&BD6L?&=p`kG8WPK}na`h%rW;h8#J zfsl$^I?LKETlwA}|IAJI-p|g#L2^}T6WonxMy zZNRH0$Qhuiu+qP#C!nQ3BH1}O!V8!n!frnn>RLCPgpT}^v^9c}fs%xte?dUF%g+UjYmtD~c#ij?b- zO*y#Ivw=J^NB}L9nYfAHPT~ToW4%rxiBL$Zpko{)HI8wmukIS?q^G`yq}Czq{%(etFMB+;GR^kWSlIkM}%{ z>nj$_m_o{PDaDfL5+bdPGo{izxqKr!P__e92{S0$S!?B(ajSOCe(N~~J0rBA2U_cD zCUwHD5%jt(Frfvu?SlS60Nv8k;`jFUre5#hAD4rBkAI@$eV1Ow;%A@Xx#ynaJKy=v z!E4s6xnkM!71#6+^dFvVJDCg|yC0lT$jmyWZErh{NdRO8XsL2;7SC*530@jf zDM+Uvn>ApSOcpX3`!5YC&$PLOV+2E#wn%PWhGSRy03|bi@$$oD@scS)#rI;*kKMhS z5T8rT`Sm2aDvhekqN~!jO&5Stc4l18B1GI49A`m0ZU|ZaZw%(D$w6C_>9$l?nct0- zl3qxEU!RxH=g%D)8hKYP=hc7tvsZ8a+BdJ;^`X2GJ3>iDfbe zHjj}>%U@B}iBO`fHBkscCU&&(<`WJzo)dNr$rxcTpr$I#SO0h)4?eTP%x$aFFU7S~ zVqSI^-H`%O2n?QNED!6qfKqs#$G-b6VB7X>ruwR`;<8IGrlF?F=+_7sEA^vA#LsTL zlNWw}uVHGa=+zg9QVFhw(E<#NK<@xzXD_0sA9@C0*AVoL*!NXHlmh%xiIIGfo%sSQ zxAw4T?N%OLzJUjpy~zDb*YeD|ZLHkBi{9Z8f*>U2y3|%>sL7el&{G0V%H<&&iAf|5e`Pp(+xp5EVx3J8c4)Y?>wOHd7iHG3Tq4 z0XvsUP$*H8%kt&R-pm2L_&b$2;E1k|i&^Zt+I!4Y~gu$Ki(`$rDdJ2Ecp%<&x|E zc=OF~9T^)=Yo+R=C@M$srg{_j=S%^@iVY}s>JmvCPge#qN18zIxsY-Yj)Qh88bCtq zVMtjSY;E%^QZP0K`I42_Ezd`jJfo5>^$$IC#VA4S1}L!a%a08Grf<|d)Dg-25v!Jm z5C%9Iw-sU(aZDdlmG}o``OU78cO4mljXMm}KqX{x;W{n~HF)M3XKuXZmRt4*IRC;6 zxaoJl|GUrj_c#5n@wUI*_T!)Z;^*hZKfCnO_wl12{Q#}CZ0%@C_x1GWm6;DoAq2WM zL(@?Q^OgU&n8%-A%TNF9+T`_qd*g4p@XZ$j@bh2(f=e&Cl+gFlyS1xDg?|G=z<#q} z`b0b(;s`-X2vP!Eq46xITAGjAZt4nYYD9x}k7I-eWodXK5%Z7GR@yj3<63uv@emU^ zZX^`9^5bh4+1gZD)`=3<2olZUSc$_I&f(WrT*g=-Ff=z23+zB`RhH-0Z{eiReV5jz zTEfY#^hXinKa{drRf3nPyw?CZP(bY*gq|LF@M+M{-rmmXXP&`NfAZf31K8TYGmGzG zMn@Y#sE7#YAKL*a&U@3xdH%ttlfP44lcS}vm2@_X<3N6_h!m2Mv0=u>#uytL+r!QA zayOtrIOg-x?G3aZcOY**?Rd8L4zO}ZAH9Pkge9L$Dvj%eI3k4<5}`v{>T8(X(#X8d zW)7M=ovCegwASa4!lmH*s7Mj%cuZgtGo>}2n<4AuNPE=?QVjb$DTG7Rcx`08>V(=@ znHU1({b35xfOY3{@EpOWoxMD=bR7>aS;N|GJroKBa@jP;>^qZ-PC9})6WWNB!gD2C zcJ}d>Ykt6n)!Pucw7Ep11-|;JcXR2fM=_Ys0}?3=1yyTJHl5Z|3anzzW4EiAN&A-PkiFz-dDf+pZf5_kG$ilr=C3NCqMmh#V!-~ zYJ_0=B*bwCpeMGPz@>%ptgt~$>#|&>wzEId9%M|rPe?bBw$!4s%B=+a?O_{9I{v~W z5)HMG3t%u0em)UkO|-Jr>zH09_=Jk;BLN!;NK5qOW@xQL?;M1|F(V^v0Zm#+L=@T~ z#>>g4YU`XAi_HQmH1VLi26;d|dfF)Z#qF@8M-WEFWe!ny%PqI;=en*w_f6;B@cZBX z?j7-Ke(_6JbJZ1B{!OR))1UtGwtMfs>o9=XvuCq<^=f|fqaVaUS~-qWP)dpV`UX8X zIEdC-Gh7mV_b%eSef@OoGaZ`i5W9xZz-@Qlo+JSK?lTY9aR`zaYd0~i#&N4fdlPzM zvyp$bR4`-9YQR*H+40Sc*Y1<1A~$nu$Lg-fdH_02()&QGD2zRrL*%G zL>kKgQ}%{eb}p^0KD?RhTV@CnUqMTKEuQD0#!AGq3N19kaZzEwfBgDZT;J!7haJd+ z`9b=34OC3TDiz^gVOfR-sHY2ska#g(h*aMi{R72m`80)%sv21fMPp{g_x*db`kB$=R2-lHp?;mAL?;sB@TSs)~ zqqNslGo!PWh0`W**qo_!HrCKolSQ}=INNb)Vo1Ke>g! zJoPLR!6)8#0hgY641>c%XyM^nKLLfp5t6hk`Tb)rB*||%AsHuDU_go}Xsd%4)|>C= zP6TC{0j`84YY>GzV*lC3*sQS@ao}w9;#Dxc%c!u1N^jk~b>g?b{jG(->zV-U?Ew5Q z9uGe7P~-V;KJSS3*7h?uZrpU)=;-M9%v}nTf##}VT00y(*R-Icz*gHbQ85EE?-wc8 zNLZ#lgyW%QMRlU}%UpInzTN&Zbwo@(!cw`k)-W&xMc;}Isq#2LypA1!3e9(+Z6cy} zb5oIa);Lmt-eH3iz=)ERGknH>R!IjS797zP=s{IhhttBO(o&cNV@t1L5fqB!-tE+B zQ#VI}|Jlu3w*3rX)|}a_S@r5hL!bQQC%N|8YpJctJvclvcI@GYA9mOiPdvHkyKMk9Ttcs0gI==6cKHtHy6djv@WT%` zpNZ%4)_q^k{;S>Ktt}2a-B;`3cR*#`~c!V|E zcCmCzH!p11!nVE<28Ifhg23twKoA(IV^?Te>T8+a)xy4$TbVntgGnv*wA9s*%@|N& z6a|ElvI(Fh>(x?~YAE{}?A8Go3;QV*$1I&QKspAX8Fy?XWicen{{ty;l))ch4TrMX z3_JStpjz|eX1RagA-%O~@nuYk_v#@Iro?m133edA>&lY`!LGO@#4hnC-^R~Sm zfd9W8mtFQ=zW@Cn0&v=Cr+xIoi!QiuWO($jT|LVyL#-f_HexkxjnLj?zHY8Z)K*#k zY`puKszql!BX^tf(5{oT-gG>tN@m}?Rrz|iIeTRyP$?6dGzvuWceSmAL|qO-g%171 z3to%YF|Uj(L8-?<91OUzVs5J<6LMNIKK5ScKdixI`NA)lrzRx z2BA$BYI3ko4kou5TF}PrW>$&NFK&2oQYw}DX*!cWWuN);AAIha#XtOOPVw4nuSIK( zmr7*;y?Vvkp8<1EIN=2DzyJPmk6o}}0e`vW)*b))p${B?+bxBIw`|<@P309EZu!;|zYRM|=|eMY2b0 zZT#XRD+m;6O(X;p+l={6Id&UVdf!N%AK&>X>2!vfbEojfHJc1TPgG91v zG&p`lsI{5L+oPqWg&EVPC-;;JLV9<0)-q_@MD0Ix_kr6E7pGb5(dL$AT+0W2L|*YKrP?n!{#K z;?UWXDfkQN85-rqodZ0(ej7_RY-Rn90SYRj%5!iX$zZ<7lPlM=Xypdu@>i2(a!V7_ zI~&<=N*A-Iwlkrr#%S;RK7Kex#;vs`MeKH66;Tvg10gCD9c7Y4mRUtH4#XspQQU?U zic$prXr7v?ERoP=uAhJxBO>A8T54l9o#u|`7vm3(LQQ73DoDSyW{QAZ&J_AYP~7A2S-{_^+*C%=q7xjaGDh24=Rw#70vEhEX{eiWva$ zXQeB1E>Wg9CfEp3PDDcEFh?eBxx^R}=2jF0};pLuTm zHZop{P(_5QX#F9KHiXbv-w%jXXx5)L>Yg#NG}e_A+UWlarIQXIk(HkoA~8q;V=t~E zWpjy`E-H=mw7o;aDB!n`E;pHL5+36M$$qaZW}J@QA8TvMyXwG@G5;AJHa`n7^Z&6T zJiQX`Sp=JR8VYu8mCf58nX5SN*kfBdIy!Fq z+-JY=!=hiRk5uScIW(xrp%0h?Cmw`2_5e6+t_e;xDPlD|B7tx`sLerJ1GLm3GMVvW z7vpAU>;Yjf#-r?af1LfDh@Ewkq(D~=zHBVj#^j`T2z>v4XP7kZ+$;X={yi1KMxvtK zFEn&Ez`P0QhN?spKv!DPYQ`r)F)Bb;js$g?l9q^$C{Q7IDa8C4h@%!lQyoIaeFT|a z{Oq&d!G|1Ny7YbTecLy_{`K@Lo$A9+JenEKo4_zSI?7#l-PQDRkNwM^{+xV0JUX=T zqKn?L-}GrScGw$Um(K_8xZ^GpgrkVkNCl8gT3X$Vc0)0Xv=LPjDlw5UhC7N-DGr$& z@Rc(M_~a>h-gS71d7Tj@1;uit1RE1lL%IJ- z$?vo2>}#7dYfW{vX#-guL7M7oNx4Q9G>n}z$YvSQN~aNWvw;`nPWl8aR~6|2jQ52~YiSiBa-MoiaBRYG}gnynTS&kMjW{S7EVV`XaPqWS1F~9a$hC`jkV~u1|urrc(!6vuU(}*uGL?W zEW``FGLS}*QOoP=Gjh7INDC$#AFmwv&vsO*0GWziq*E}n112_^E=rsPXm)Gu>X%Z! zlD72jzmsMCf-r)*8aQk|ESO=ww*CWQ5b7WO;Dn+|^nk6})jD#ivdPXltq=6!rZ2*#>^TsFm{%f_ENW zVD1FTyom)aK6E|rJ@!TBP3Z$I2{9d3Khttkm8X-ya^CQa_3t}aIuS+_kcsL!VP!JUt>VZ(OnCb#mHQ;y)C z7dKh03Gp&Zxq?DkiLa4@R3S9?L9u9(V|z@RXe$4sk3KT_*`tpwviVq9k+WxTkUh^D zUW=Sr(9=`SFr-p6)z;ujfs6&0>8cl^O(6)`NBKT z;>RDoh>x6mGzZM>B9-ze`VoOLj3oz$hN=uh`2sgR{sNwpCJ6Hck;M^Vb^aA7LW9uJ zGD$ikZJa@4_>GK&m5(+*a4Kw!BWq(WEu~c3Wgn03%89!=4T&!AU#aj=SL{1G^C&#^O(mc6I@{yBW7EZ|GM|A|Mjv#Ep*BK@@9mfbm zp{Y)LJiBoR|8@IAi27>2bpFZsVZ>vbcN%KfE5=~G+j2LrnJI?GdN*INUI~KQx>~wA zI{`T1gcFiiSiE=%gJb=;o|i12fqaGNkNih$(PiyjM@SlSSu=4T*GLqW0aAf=i90_c zkpQy1c|jN{MoUG;iY1!sYIyTe`*Y1Z&fvPs&gJ5h4yLU>$56gNAqY`IQd?EcZy#99 z`t9AguA~qS+gnrE_vH{NpGYW#R90eIlFg*3%Vnv}rK!$l$fjLf$0D8*`XLr5C=;5r z5+)fCjdARBV||@b0 z7FfR(`uoiHu4_6wQXsM!C?(TTR-{ zGFnRUt7keGC_)q}M#F&6i9O(@QUA05R7I7q?Ht}X*;zL`Ey~>jYnU5ik^$e*#yO72 z1pi1Hs zTTNt>Cv#62Ukt5n+kCg6nfNPMlhx*0}*5SfV*Ebx)16$s51mD%;U7*Oq>zC|KFr9>)wUJ8I!rWwgLYuLeCIdY2LVhhG`91 zMgl?3lf2NUIb*)$z{!v=Ii%c(NV$k8jq63M?yl#?Cp*|VlqMxLoz1n(p4iDl&n+{0 z?XiN~Zc2gW%O}v0xgAupfr>KV&$f9(A&9JIeMm$YIYiBM95a6^hqkq#B84Xe=~Rka z7q8~gXI3$BQY%-VdmP(Ghq!(Hi$)<+=vTkLwDrfZ_h?lF6%l(8WWG&m(iRXWAHPd$jUkJy*rKlD5|J^BK@gTp+w{6*e&?7=t!g0Mg; zm5!VBgrN^O)Ocy`d~OAwyWviHhes)t0+bMVLXb*(#JEfrIUrzyO=ehl^Gqa zWL=4HtX4%78UU%Pq;%>;LDG|&=hkhbdnj+g1Fy6fRqnk8w5lBenUtaaYOQ9?ocYBl ziu#rT5wgpuC5ZQInJ{P-s`fz^8xfPdnn zp{ap^z5$Lq=GgZydgiIO-1?_KFSP7@i6fz<0j5oW$?eeIfNrTnL=n1V?0CthP1Tu7 zm(|vk+GE1`()jpywA=M=?dl3iToG5oHUZK30*n^WVUS1-#FQKJ(1@~{wAw?LLW~E| z>D^pfUQ(U^gIgQAg6>!O-l*_Pu>54A2%2k6HN2r4MvC@S_4tl&oJ@>M(loR-!O?Yy zwcF8Kc9@N!P&AUPN&i)vO{1m?sys1u%Jj$P&6*wD@S9(A?Qx&n50&N*lCm%rTlSA7gCm#^S$?|3`cf9Ja&1wOiB`HH7DZ`pdV zHJE~0n~2tA4FwRZEE#E-+5tg?7|3(#e1}pba2!eK!1T6=1(P!PD0JGv^$of`la@TW zDaBWA^YA>#xtig8ku&Bl;NlaH=7|;S2!g=i{B1y&mIfy6ydOK07L^sKHUdOS7@(i& z0+=flMVe4J=D)crnr5`~iNg;e?YfMHro!$o7WuE+A0`X~Ef658#>Pe(8yWyjDwX2I6Hnmw+iwTpw%hJzN6%Kgnlzdc zZYq`hiIK74*Zel9%H}BfMWQGmD*5#H58(>q)tIn*_K<)jRdf71Y27w4V8KY4B*4)c z?HB_d2Z@pzO~l}cCgZtWcGeM`dC(kgdh~hjdVVb%x_2?VvjsoQllAJXte8US5YH9t z8XD$PKm7~610|YkJ-Qm|sj2eFWvi%4d$_K|S0QV=ck$HvEeIi~&8C^q(!lJlR_0G? zXIe)q6Pjx9q=z3y_)%cl9X5$~;o+rgQGxk7;r;J138*NZgw@DUj$!_oq*UH@*KNmd z-PV2V8E2ebyKLDDS8v|D+5Bq7M!{GC=1xoYM8jH+(2aG_Py@Y#A_xL%Yid6-Z_Yk< zKJf5^;obz`pX@mQ{PVf#rkfb(8=$ed>5dncyl`5<_+8(^-HULA$AMg>TeI4i4;JEce+(J)6#N)@VRW@ zcIX#x0f@rzyUBAh8Ix4L*n`kYu3fuU|I5Ez{N+L&td~H{6 z@9&bNq_NI)E2`2q>bgcSNo(`_$?a6hEp%0+X&30)7VAW#nT z+Fj;$MJ(G9k#YpS(#)AWiT!6xX2FapJh5yot}82?Ar%6LP^)s_kC&dkhRV_eBdhus zS}S0s9DEU>wL&RH{mf3jf7S`?-`YSv2oONZk=(v`6;Cc*!|{jA0w7^whz4h;;x=C?sdM;qNeI~g4f2m+rwpIpk>NA6ErDnc#GG}vTH zrpE>U_?%29%t;c0`1g@5B!no-I2%DHNf3n$k0=`IYk2=zM>BO&8*8@rGOw$RFbauu zfRx7eTWiRAX>MA+jQ*g=SKoam6Wi)&sjHiTcH$)#B@lr ztA8*6xc&B9zI6VD7cNPsGhbc1cFi0>v#DE93eXE@8;p>S%>EY%m^l&IJBR|kdGn@| z)~#O`?!Rz9@!Si~|3e0=docii=W)|bH}SsrzVBW2jSWNneSN153=SrtL{6E2IAlJ0 z&NSF>225%;W+qxfZH<}lSLY0}8ogVlE%p#icl&xAKmTv7f=!~4u>0bq!j(qbzkdMw zhY_|SE6=ud#fni@ct=$z{)w`rur?fS%X=~3$AMRAJJ*b#AB)7u*8$rg_Dp?zSJ@w@;efepC zlukP-ovx1`yR&;o691YfHdE8y3Jui>G4nUS`Q32OoAq>y-`2yOw-8zv=35h6r5A<_{jCCRw(p2Gq%o}dr{ zj?2`x7OGQCyz!_5DJe~0XZV5E1X>X&Nno)6fdv8j8Uh3XP!JI%0fB&g6fokK81n-P zVUZ|bLX8zU>bQfr<6Y-*l^HF1qM^hArAZ2m*fn`#&)< zn#a-5N2_Tdr2PS|X$vSM`to$2eR- z^0=4$hwwdn}h21yu&?9Enh)@-+;xvSV^i^+K)tqc$(Er(N!rchNdYM%(Z{p+uz1b zzx&-SpZV-(kEpM&e;~Q_clN_GD$N8*g_STC2%NIXhEV^UIX4Kzl<% zV#uVkho64>nOEI<>tFun(>w0C6K2)c*8VnWXisQG)>J`*6*du3Mb}6tD#&9_mMw)e zS(FiRkpf3YNLfHTAyOJZm#L04e&jKsL9nnZq7*8$=P;?Y86S@`4n2rz6WbXs6)7Mn z0b%4(BEq*6K3_|GB?z>{*WfFS3RoTf5mlRy1o>M+V{cs`rv(2yt4I zD@6z*;|*W(p4@nN+`ml127&0NWu+D4L4=6x zT_yxtM`#@qsnD`UG*J|ybc9lxFx2?PBGuJt&N^@ww|)AZ{NeJ8nbpzGr9b!;2mZ&m z`N+@j;Fk}-0FH~UkPz4Uuh<+C<1t~zxzg+l>1?J>Yn}bo4Zq^@%P;30Z-3js;Naj1 zu5=!-_zErhhG5ZhWU*w~9vT@*qZDXg{`n;@xcA@vQ0?9X;D7nZWOFQ9w1^W=Jn_t1 zZoB1<;o+e_O>qk2QhOZ%+1;AMx>z|3}?ldrtG` z%@zPVdv^SKczD=c_FNTAX-Cy&ja?~~eh$iFLmcabrdU1ZAss;^1d#%zvV?vuQIsRn zo)O?Na(oCo)1A>;0u+%JwADAFLrr6@p7)$_B&8DgktR@36vCkRBk&`EuQ1;$MW9S4 zU`%R44PjVhzZny_#hO5`iFaI zpV-dZjys5A6cFl=`!{Se*1Ot(I>%Z5?%_5PRyk8iO-e;%OUn8WXu?9lSW(+gFxm~* zvpbY07#!xR@BWmfYqye3rwt9*9)JAfA18hP``>>}*765G_yOMk{ts^1xpU{U$#&2` zL~s8fQkt2#R7Pr7+A2RDQO0b5vi_E+NC6G!GP=5usN{|0WAS~_IoOexi&B9CH``$MI zTyxDeX5KCx5vu5fbUOVr&vQ(JZD?!~5!BT~ZFM3U@Tto`{u~%f@VyDZ z|H5&>o6e_L7$cjjIqjKe7XNw43rh~MkxWu;klf6lf}S-2J-rKRtI^r4;qcd1qdnK4 z<+Tys5EVc)p~ZMk`Rh>93Ly=ZZ*TpPw=Ku}6H zGS8J%r&8q7Y0{o+pAXtEnVINl0g3@SjEp)~rJ2z`X$wHdiA(GsKe-hqv>2^`I1zGW zxoV3Al#-1?*h*g+F%Z{9%$W)Y&o(zYh$xEm$msCdi=KS)YYh!`zX163l~({z^vjjv z!0;GhP~szRdo#5&rzVryp`oGEzW$$It2y!HlV0_V-gNHyEL*->A9%pNzg@Lr<$(yH zH4^4d1}_C&jrKiPoQH7C*h56gSoHSZG(m((`c#S_Oyh^OL_v-y$f84Oq+EnVD@C9} za-K;H8)|Audufz#C#~#SE_6A%DYX^sTVn??* z&t!yCfe+aumd08`D?v>mz>SOxr4)i_c+@D^S%7Im6>M*W*^|-x&9oBHWiYDh-o>|W zdDtXcnX)kCjW^!-i`Qy3fA_oBqqWX9)Hh5>7O3aaT`ZuK(FG7Hvg0W+UQBcx8$j5- z#Ii)RvK)Mq+zX*zl0`d&N&7$xO{6vHlt)v>WyzKvQkD`gg(L`zXdSVwZ-iaLqs(k; zAylF5G@6832#u1;j?r|5Gh|$FSm~4mk7Terr66E1U!=3Sj!&I;9JTe;;EM9NLbw%j zKH}x0f1(y@yMdl-ib2qU?|Z9Pt!k}&R;VJK$z&)Ni~rKp)byX}blPMZV|jRXEwX12 z;YkBP?JNs@KKsIR0DSq&Uw+MZx4j_1S2^a*o5%0}a1*DVa%%5gci+`iNJ66!bT%0@ zXLS|K=z#iaqo7t>gHER{ntyz2UuoA?!dS%p9x}>Gpx^G_S3=Oo(E=Gy<=dSiSV6y2I$~BwEAtxbnATX&#Oe&WREEY}hAJVcaviev zad{mvR4k#D%W%P`r&wUy=m_fuMp&_HfGxu#j1@u%eek4FIIO(Mv=~nh+#M?MO8J8L zd*>-H!~3<@Kx%=K8YZ`x&v3M0=w5z^Xvl%tc-Z5eFJLc^>?}U5rxcz~Ymm-g$hJ_L2{Sv1yJb-iF`6h1o#Frs5 z^1z23arl<|?z#6BPx{|J_7T2$-M4t>+u!x|8~^az3nXZ*wa{Hn$i_NUdxHU}hI$+= z4DEvS&^VwXYBN4Fsscs>NV~=vEp$^j!his^0u?E=f-v$4D3Q?t+Xf_rP?Z*>gv8OB zK)cjdHS+$mj^;nU_Zz}gnliXl?IyHilf_E>sg9`2d8QgiBb2d@MG1s8hbj1DWKu2< ztz6G-4?jm|XFHdka1fDF)Ojg>vtoluYO^U*(J2ot!iu%G+x><}46)KBP5qccNr8w2 zK~#dV!nn7stE-F~Ttl6aAl3>o8Fbo%)tixkQkpxSUJO3QRBC7hK(Ab}y8X4>(`L<@ zby^SwrzFDv6I$tNYUZ{L8#!cR!NG*U}51*zx)=<%BkQmFFpDk#3@>j<#)POS)q zgA@v_B{DM7zDg@5cQ*6vnr)^AFai%0!%>vhEZe#r-}jk4p@m{#fT2Qbgtd`26FQwp zmMe@Ebz)JTD3byzLgEk!s|@Ie1WMz09wHx@(WiFIf04VbIbOQ?Bvfa|fB-$u0KH3y zVzJ1U^_yQJ;!rFae8vtIJof`o!J@;B`KhFJE3eW5$f3yY9X#i4NLx1v9!}>O`okHhSr~oIz;kvS!i6 zvYJ#vnDzL;v^xqtrl9HZzSD_tm)7G0f1*`U25F6xx{c{bF;LGBV0ai&@(n^=+Q6>` z#3*k|aj%w=>THJ2>KunoXk~hR9iMsl84jM*!OiEMisQOSk;0WJ+Z(XvEtpY2q*a0m z(8@Y`>CkKhQAC8IFJEHit^r=??&skxn_1I0%xKk{Uoy$Z!7RUUU} zW$+VXpBd=JdRX-$j1~mIj;)*YKwr=OQ>IKgroXQ*SuXz27{jB3(5(3KB^Pu1AMT+4 z@#h4>=b=X)UbUyw`1mJ2#(#eGIzIf756%DCPk(++sZbCS&{bKO+J&mE zhDj|J`=%`)S|($giRl3jtlG-F>VWyRk{YjyF`Xd@Qz%Cx0yDYQTA=Y!+Ociekd!Xc zR}6S&b1k4qJ1KA-3l3ETD$AJ%?aOs-_p@VQ(Di+x{^{Fz~q(&!pP{v zOUv-q(n!PRqhYl68OVox_0JD5mM?I{TTh{*p^mXak!>Sm+`MKBIMP;*E?Nd<*(Dv> zfJ1qVWmSZPuc;m_*@v33o(dI=j+O&R+Ji&pnZ&B654HM5gmlsS&O}b_LT%iMD)~?- zA$^JRKxEvc&g|*ye$Do?B}~S_ zLalLBWaO8%Kq`e4j%8(3rUEux3dgkEwfR~RSeHoqk;w?94Q?nBATT4aDXsPV*PV;( z=tU5y623o-bUfB>?tyfM_L^#<$RtjVkSL{)(vB)9dlkfz3`$2xZNEp@ZiZ6^GiyO8 z6m@BjgQrd4?nO%=lQMSVmL;WMwuq=m3Z(#yE{9IJrg{g8r4k#rZ+_Y9u>XDs^Yk-M zTzK+{r`-406OW#d&*x1BxOlZ72w`Fu)YT%2yYT&hb(=PJ-1ES_?#aiW6z)v`{=vuo z2Ohw4i=XAFqmR1y@yDL{+PZb?%Bf#NEn?PWbbAxD*TIBVsHrwBJI6618nN5??q)nM zD}ZAIkWkje))--+A`_5P#wAT#baE_38&jpmIoFBud{PTQdM5DaM-lmgbxSkU6Cou! z2rWp>p*dH@g4Ra%ZExj(wkBpZ)H0#2j>b%i&p-M!A`H3un1j&LL&zqSa80bJFv<~V zw4?D5yJ2MvOIv9TGDJo`O;tX}O|Iei$rHHrfZ25C3oP#*;K6M>cy`MUmi6^pUT$Ph zN>)^2jwz;PG+q)pNqqheu-_{{CdSJL+n?1{Lv1x;U>IgkLDbg5>P_f%TWw3wfouk< zGl;4xbWOGWI)!#!o9tmMp4*#^(bKxEh;2RSC=$g&L2cZ)@nI@h$rOrg85v@ME;6yU zm9KsAQ@rQwcNp*{s0|x8tOP`3V?F)-gUM;U^{p52pI^O>uYLV%v%mPctN(j=WOxRk zm5_p&6HLW1yQ`x6Qz?dGKF{gtLC$VmM@vdE9JMi|txu59CInbvC@hXD(j`>IfXk^tKj4 zG@f=qXcP)p3lxe%F;C7-@wNLO=kcdku;0R|y#3hy87hv^=%xAD^0nj#2O*a+bWT|w z$(calll}r$Oc=xCceG=dQB<}PhjIE~XiaBr1G`2> z*fpA`v#y1LKSqc^_$8LTxRq(G4b)a=h$@@{r5LYMP{}}$*2GK+EBd9B(I$u~$x0GQ zlZ-pAq^+(hF+S6k66@n+!}qjVl*NFO{XO;9h1BPsf10C@JX+jy-`yvkfByMjdf@&C zFYD{y)d*;otQQ0kbTy-Uc7cWo6DGd>d*8YK7r;Gx6M%o<(bUo`o?HB^-tU0@*DQW& z@pPr4csMP@v@Z0dc64J6%S;DP2psvq(}br5**0jKbKc$xwymwo3tFg!W6w>MW;BoXn{+rf^Va z6CJrUS=U1dfhTiFC&gpiH}cIVU*L*k4q{$IGg{UnrDsv^yac#tOg$)9P)WPcHR`!K zg^)Qk5lV!pFu>C#TB;n5pOWF&sU3`ze6|i3_}b%(d0@+S!=w<_;tK~vI9@v-Za=;* zKuY`fTn90w1wA}s@Bp1nP@hG-@FKczz>H3UF&G|0i#}7$dJfuk3=Oot25PGe4j}6x zs;kipXQR8C5lh#hM+>rS`d|;g#M+%ZVc&?6V1$d0JC;AZ=Plg+ou329EnBwg=H`a$ zcI_JY*xTR!4sN*NmmGTdVf^~nH}c^Rf8g_1UUB8SO2yKoc$?GnrohB@X$B(SPRhjYc&qZEG=u@It@TW5Ys3#D95*xp zz>$O+O2H_#8Np2}Ht^lQJPg?spE>U&B5i27!-3E5m#;JP+qgTULM!l8PC3l&tP!q6 z4~!u)DRdAkehH*yfGD6eHfppq;%vO56){qP^;^+VU?F1~#(bm}MAg=JJ`59$4xLKd zL_<+17GIMkd+wXw$jyKF)3B6r2`_}x(aQ1r&!)8|L%|PetV;2w+0%J+%MPx6`dJQa zZ{wU96RCAF4EaTC;G~UmqcW{@6+>C=nJHng0m=f1rNE%;rSaED&_34Np(^9yIu09q z`rlBUo*l1u{?a8E5zZ9EbRrQq8cI0od0kO=A&>$m} z5@b>ibtxAq9THzPr7dP9`YS4i3L0pftX8G>Fw5QZ@yKJ3=yT6Kmz!?7>5BJU@}8T2 z^Q+(dF<;0}1Yp%B=xPPW(^YAwFlExDlhG{MI|BFz9amm?C0Ad4HGRFibW=<7(DTne zR~vU~5kiQ4XP~>9p`i|DO@PKaL?(-t+ThssATRs3&Y)w9OFb4KO97ub@?hRLYa#uG zBJ28g@J#o1mhbFkRo@`X`}-N~E0#4p9f|NLql;$?h zpEHfO&Y4bEU5-dc1d&3@G@e^cCY3`9kI|rqA1r#FnT>V)%f7QH$P{&MmWa@}Zb^5~ z?J>J+mf;JACX_g6Dx;Y#w1?w(q`fSmZom%)7%L9Zk*nr`4cl10s}G71oh^+F7seRP zmk_Rpj$6Z)KA3bo{u+G1Yl97hP@!w95Y4r)v)?3d*=qD5^Wgbauwz#lU!e^TA%AHHd~t_h4_kI7o0HI>i#}_*`;79vmIPtQ=RbNGPu%?o z1FJWfVUm`YeCR_Tx$isQ`POZ94fQN~;z^D^_L%Sg;0Hf`U&&CYg6}mc+liE>@ zwHDN9MVpi!-<{GL;Y4gH*6@uT$8g}tCeCYK$Fxj8j*}wNS)}lYLX8j}j#DBXhCI3v ze(`vgo-q$xZAJA}Pn|$} zeU9M*RC$)3svxB`T9$ZW*8u-|)15Fh!uiJ@$^lb52!axxo8ifA-E8dX1J|>;V`RE& zN+hEXvz5!T=+Bz%=%yMI*h9l`h*9!^(5SwV@~8qc*3(17Fj62^i7-i(u|PI@AZ4(e z#%fPUVG`fh=(zb0f8xxu<V!mfOt=ZfT&pqm45UnoSf5qnEEjq;@!IS{FxlweiCj zR&mL#k8twzPR^V*iN>ldN@p&Qpj)|1Yw&AVFQZm8O zI8qY?KD|Q)lnMw#pInv8^BcDjT*KNn~83&L$o)dXG}04Ki4tpXwmLk z;T6IEZvvuOL7X6hkr8G#H?V)lWQ0>iYjuu}x@L}_u>c4eEsZi%$g^d5fM#SQ#r!)9(c=Xj*_$fcXi3{VNQG&9~kwa3O&hss>yxSK1aH65|0ItGC( z$ap!rM|bkEd!ONti&v7ZuHw?e7VwEf=hKrfaP5;zd1(D+hWyYn>||Mw9r5~TDU8q9 z&{I31Z_EgJh``K?7tS`1*|94LB5{)^l}ZV}l#bYm~S-;gY9V)K`Q3_;alm(**?FmDV)5iWq2~A5)GiMyO zfM=GkCrVkN1EpSylT9j7!5fb{kU}Xm(o@E_WfMgU%O`#S&`7fp$eK7Nmvg1o)vskL<4BA0h)? zrnq&spKFOY-H$W5u8#R_bqsupgR4kmV)vfR6U|Q$GEv%fA5(yxR4d(At6H2oXiPuBxhP1JHHE;YVD2?|t|F_J|{n z5RX6pxCUO+;J-Hk0GeA{#EMlb^@92Pe(%8tAAEmYA!!gyXoDFO(GArwV*+|oJ0hJi z!A3=PJ}8nbAIDaDVPrJaUrtJDcTIe2St*o84-6u7$T3r=GO4~56&b)xoM;FHj;x`n zx|+7?Ru1l(4g$tXd4~K^1`7o?4h{0NB`f*k($%0#bk^5#&a5e%GixgQwl~!karlHzQmH09;i8n8>BVxtdlLTG4aHc# zWn!3uH0^t#H4z#qBn|-&Zd}2q?s=3KHg03~gciPV(s8_D=6nW=1Ef8V>rXv`McZfb zUr#OLzKxp==*V-*HiYB40K1K1{$}H(iZ}go_kW~}b6!USY~G1>9E6UHUjKrb6-j`_ zTxGLjdRN!`makpcGDcP@(`zv1X*6HN*AbgrrgqXiYd&LiLV8VGNoq z0?hNQ??D!dMPx36h>S8^BuzIX5(@Bm(-DX8&EMY1Kt69RR;j4ADwrWb#LP(@95sI$ z#ZpKnoduzBv>=ip`Qivad0`d#?q2k8fs;=@fCHvZ~8ys#aTLTurG|g2B=8>tt{gT~lKL6Ct`-goF1%c@ARvdi3^Q z^EfLFjyA$vvAlF`T`fa{L;s_F?#3H$9K+$J;-vCRxd->JMe)7JLBPFgB)TTU|vl(hLX)-B?YU!ec zv}%|zueE`WToq9)CMC+9K`D(bZZQn;!ve0*3>AyqyKD_DO?6CfZA8VLgK?s$;w4|Z zj>L5wLKRX9Beo2Vux!^LFYMUKGu?f3kCmtqFtwqEPaSa(XU?9&^?!Vn8&~Z>duhAO zD)C!;s3 z@&9ZB@Wn5FiL0)W_VH)v z8!kasBO+;~g`EnY1Vcx1lq8a`MD2N{=8SxKgrG3Y3Ef_g=pHcL7EEFwq>J8fmPrn` z^_ciw@Yy*q_$J`g4}bW>wZHhqFD4HT4u~mJX4X%gH0c*hmM@vy-QAn)AtxSp+zo&F z%b&lM&1Nqz6beu%GPJFSjs1Oe)pnw_z}FFz8k)G`s*m&TXWs=Qc~L4AHSp0jYt|%4 zKHb^~bEg>a;`B}fJ_{|#u2|&Xjy;Mu&7RFz5SfssA+JVoltap`LP{4YjFx@gA3_NM zks|9k+`n-P*F3xkT*m<3>T)mjs)*OSUxl97hE_gWq!3yra?r(4F}rgjC+xouf4KJv zM73*^ZP!+SQ7pcWqe3n`^)MQ%t5Mn^IaojyeZ)u}J$;gC?+e@ZCZbd-#`L{%g}9>+ z-PLYb0K=n*{vq@u&za<6tWf@Z>T46hEIp8z0O>;yJ*@ujyYBiQ?|BbCbpO|rZ?YNY zESSb2GbU3k23G$drY&1clY#bAiZrD#z;h%Av^8;1TQeoCDTX0^V+Hz)A>D;MJ4Qy? zGCV?m!6yV<6iQ2c6;V(TZ1)1Qx7t8_$Yd5#aSuC8&{>;MHKSru@Ue? zF4%8Bj+ii&ksv@j!sG{)+3s%Dw$vJpM?MJAdWbJS{xrF?%WvOu9@A=S7>zu#UJlRA zkrIxj=#{y+-?&G7kKLi@yf9xTA^`z5qoEl1zZ~eg`ld8t^GK}PR;raudz3(Ir zoY2bq?|hW!x9>2>X(fQbBGRoIpLB_IWHxdw|F$l`%e4WM9Kr_Bw1;k~h3$O?pMWqU zBBf#f8Rk-N>p|&={=U9bCQO*{$B%yWqvrujKkg>~!JPKjUs()V0)`kJ+C zZ(qH3%_WB%cIf2o+qSWF%T`dD;hq7OY~0FWljb3%gH(b-P~cxqJc-|a=wG<&E7!-4 zIp)o~9!%?kDeX{I1^aYCuF3@e_#~Ak0~|GZUkZNFj%yV8QXdG1>U4v>mWm(@38Ffx zGEL@rp3C;J(17P+yo0EOd^29BLYUThB#d9SZKC6#kdcEV&D)MYj6dA{5L%}J$A}HN zAw;%K?iZQ8-z?sF;^9O(Am`QMI5~t0$$2izc5dPKtJlyr8qnQ6$cHXGiP;lc85k=d z9K#a$%jy>m*vpkKb)&3gl}OX6qTr*7MHn7M=S#*c%SoAg!HV02LnBZO#&^I5MiG7q zrgXxxbtc))7soHMYzjJ?P>z895$GSb{cS1kzU!{`(@#I0JMOsS@7nK9IO%xqzxM%N zcy5W8{Jpwr&OUs9Qfa~1s4h!b+p67>4rteOWo$6pKDiya!3iEzhlnP%~$G7dg)%)FF;=$rl6G z74qauB}PgC`AAbz5mk;uYjuXKbZN-C997-U1+%8nP?a&FLlFcjG8AP2zEZf3M1%o@ zV}%O3X;R|9%AQcUw#&3_;W!C_BnX0p_y6}C|LEWk{|_nw&YCrg2Oqqj(@#6&%sF#r zj|3(E>;zL$yg zfT|oKRIgBER`$RoluGEKAqWj8_SzFqq@;!6u|~YSPQF#zjnVd5x5PagHu3uxR`KtL zAH?M9T5y|atm>l5tHTj8ktD4Q%!#>&b;B$9LtOpnBHC+meEhHl1gZ*0X3@LRc%*#g z+2nZnP?0Ef2}>bzgh1&MpL_UrK6=XoG^R3q>9k|{=BaPM5p{%Nh(Mx*4G~%)rAI?e z2MxI{RFGm)T{VAs^C`UVpoLVa3f+UG?hTD1n@VAlyw?aIFmC*3*#|8RmI|7Pr5h8J zNTBCWh33ZibI}6>1Lq!m@WEey$GH~?<9l8{-u9Na@}r;p_>PAjen_lbxw7<$PkwSs zCY`wfdj|gYUY=RCk-R@_#wcharSNr$?|$gL)Sh~{X|<p%9}14%cOIRSCP6;5dNTIETBGxMI$P`cuMb>Ab1H=- z%cwt!z{hnZeT6YTde>c?HL;V&o?b=AUN-c0nf`V0gi1!WALTLbLjMmxUOd~b}9l#lXV?3sWgpMDdxA-bIRmSPMa~A{aRX>)zZkmt*uON zs3YUK_Wk%20-rE6e@keEYr7DIC}Mlxpy^!2>a58w@ptSM6$R1Q*ciRNz5mql@c*d< zps~J*HEY%|fByVWEM30z)>W%kS0|0ht`@|;(-Ex=uy7i3zgcDjjZCmoo@12Xo>_su z<1xhY4aV#vl|s5{v&T6OqNxso$OO}uMUTqzEYmN-zySCW)#(&JIO9}Wa;*fuZ(3x| zE1LwFOj;mCK<{WjpS<@`W;Zu-P**crX34l!XdR;X|JZx$ILnHw`}Pim-0g^ZJ z{5X92L(fe2wNq7l@3q%nD>SqCgG@d2APS;XE*hU_H?8IVwVS!>*aN7Gr|`TwyEjVj zX>gVQrcm_K&kA#_c)|mUT=wXLT>i-OOl)rAS7#o}m-j!6NXPMoPf3^4TG8(tF9ejdG97B5>z zPre_aLtDK`@_vCy!-jL&g&&1EQ(&)Y#(ZewhjVZ$;!@NGGP|a zIynjjLMDwYs@B$aRae9%Q3g6i5En6n0OWH}$U(6Hg@OrwCPF}1@?Mwh%oT~Eg3Uil zEN#R3kD`zvH7y*y=VU1643{8VgiH3_^U^g$zHckPH%iu(Wv*-J&w=lo3ccVX z3I(IjVfRrn^ie(iyDb;>wsxa5ICm;y#L&t=HPylFNibog+3U;KL7%Dqy;zKM&pqpe zf5zGOzRePfFKCyyeGOi~{KNmnwaCe4iIdgcrt%BZ?DG0&wKg!oG1hY@}d;)fxjeH~Iu zl#pg(%eFjAWW-#dNN+A@+d$SSm1-Mc{pPBH()r{#b}So|QiNgn9~~3_pJ@SjUYzdU zE`~M_`^K8JYraz~6f3>a>EmJ4P;^5L>^%)y>QRxM?C{LIt6sDgmac(9jtOI@vazon zZHZgTLa5ZI(e*VI=zq6?Ta>z4kS~B0YjLFJ`|mo014m6E7Z$9%WMr)|cb})3kr*>` z>jM^QesHnc$quck_$+OE_lIC=PEO zjTUw002J11%ZhuH5(0tqrh5;Kqo)sI(hg%t6ZlKiVDZly z6|fb)QYLswff(6@?(8)rz>-F|R){Dv{t)|2g(sJS3dGKi4zB&_PyPnf)TV31KsNKb zr_E7E996sEl?C+n_Gk)4v1-{`7H`?a$cB*!;(*50lKwEy`9~hXO>363VB;o>1jJ4I zqvREPFIdl3<#(el=bY%zF z)Zar}UoYFT{p`qO>B#2DhmiFH{3w88!1jTD0;Nz=nfBVCsY6AeU5?*>AO868iyS(8 z3Z55ZSbZbY#|-EF#~nd)O&Tp?Br#)VDW?Wk=b67P$FwGwxixis`u^uQVD40onl+wW z;G?A=7N`yz7C**rq2^7yWwFBnY-Ksr)S zojOgdTe}|LFTg+^R%}4*IR(AfROo6k>$1Mq5XV9vmaHprMa=Gs)P+}GdDXIuF1m5p(hVkeC~%E;Wp}lRzm&5ar4GeH6nyN(c7-JH|r< zZAK+ao(W|hoLTRot)4YLb;%Szec(CnUa*AOts{xM9$&rj0kXwBA3o+libaD$ZQR*I zluXjvP*2e>a{nu`mNqr$!}+x@a`ozk4n z<`zrG8dC|2Cc13u>?bM-j;bol^S4_h$V!VblgVItW$z>a|E}x&^UvqT8*k(%*Ig$+ z_nFU}-O=6o9ibx)QV7?9nd8tShe2Zv9554+PM{-QaRcklpkG*w*wM+PiBtLE$3DYR zbN6QWc_)(dLx@>gUmoYk6kdPHsQ@7`#|53Ae@&|8z-!r{WM+4Iu3f4JiG&LjD8KamlHE&inK2Jh*Hr z$Ih9=Z%#Uymh=dMD8jL3FRpNH|JBS&I|!6khIqNS=-EY-a`cJUl|(=7l|c2G2|%*f1#*VPz* z0HG`+-F{9gf|?pQU@APf0*LU7eyTQI(>;*QGyz=r@lWu}U;k>*QyqQOG0c1Hk?#Y? zfH;CMBHFl}ho4)V-b%IDJLLqQ9G$!Kw_}%C7@q6#2-!GyRq+@Xenz$nwSyP81 zVpuvw(sOZzWLQlS0p!Ahv2V4gh9eC@FVYIBONpa_OC4oK?o^~1l1y^?lxb)wO-iVh z9p8({g?T!%J#^Lk$-$o>K<2oSwl6KsMAGKGrglh%Zp9OTTzMJyH*`9l6Z6DExN+NzZ+ z_tc=-+AeeyBBoD-mL{_&f&kjOVC6PL0=6$?(!`0I&pGStr+#qNmH%+?2PgzZSzfEn z4NRLb5|l~c8`C54WD>27Wpcu;BN1;Tj6w>2H-#XFA7;@yw1MBTq~Ve%q9yqX$IRht zs884Nn@6AL4^PeKuCHFe*p_-c;n3Pp%dZ|?z-b5VMPuB-#bM3XE`;YXZfFCmcl7Y; znynxr-h0Sg9PL`-r%@mbtqy!z9t&MQa==V3IdpFvj83{x2CkCAHNmgykf92O zElE*_6u5QyGInDnaQCb;@P??~sErGBU1a~)!TW%>}?2k)7<2f$fg?>JL-|alSVl@{Wun$+f>nIwM zL-C`?SjHl8ZO|7&8uz&pYA+-*(kMp}X>gQ832mJAgu{^ZDEbQ>jIDRM=iC$c@O@A4 z(v~)>n8<5wT}2f{zbgss&9(qa=!jNENJMKG)eOrr;7LP16s{fVQVQjb5=4 z0U}$-HO|>{&b)=ME<9#;q9OAhGwPocCysa4t=nk+vNyx+kI&~T?>UY!O|=jS9Brzf zq7!k@$WgrbkxvjrAcdeV7Q=ORO>(LsPScjk7V`v=-2>WuwvP15?#~sOWr>msp(6y6 z2*E%Q;95Z@Ws@qYC6Y8F>S`HL4-g==j~`~~$n{fH5pl;uVGeO^A!lFt%xrAt7pI;~ zJXR#*hc<~dFIy@ICAek|632=0%+_wEHYpxo*uj%8F5$qvrgG@CaYp1uDjWoz`8vRd-FbZZ@f?z3u-o&6P2r$P}GhG^lSl)~@Jl%_yLDv=8InKM`3e%GCI zW3Km)f=eeeQq z_`~o2p>y!VAO6r@^B$RZ=H@M1070_3hRLIb5Je&B*8@KOd>ZCCoHGMq&eh#GtE&^XG9IG_DvUk^hYtddmqjK4Wp zg^*AT4dkE6KoC;r#<=3x{rL8w`y)g>LdLBgwUuBk%aW_t5cW#WR|rXae-D3MwGJG? z1+%A+4|LhNR#e?(qlYakYgQXAeGPbGfL|?K#@g;4zPRsPYT`|XFt1G@r%d9LRU80S zexDULuu^6qP}16=B1m`+UAYcEcF*lRylNv?oNyS|9Dgiz$rggBBzWRjltbcZVVuU4 zENd!B%d{3s;#hdy5fZ62D$Ef?eKaQH#AS?zc#L11a41Jk7*)1qE!`I(lpQTADZLrv zqPGtF+26O1YuXGNnra{&w`6ID!D1l_0u5tFB1W{BM~D<_R;@mK*7TWsztOXubIyCd zW)>TeDbl}kJ-0r-fP|yU$&Ik`y@epelO8p(7%9)A7)4}?A(>+7{~?)TQ1!h}rdR}f z52T$gK|s>0Lt6JWv@wK9cxk%|jMJe|3Kx@*mAb@^{fr{52%?A}R0N?zpwi@{q)8l9 zv1Icz$bn5ONz8MZ)HnoJNJ@jSqMS#YL)|FQYkZ|RXZln|r)#<9zQ@3G`P6X-Q5%n! z+edNN<+06ewD%5Fbp1=JxVmybMagWcB&nVC(YXMMJ|bsDdz6NJ5rQJZkpz(<= zr0B_HS+}8$<7Q8wh~}>67lR-0xf2e?bv$%r?z}=Eg)sUAwvR6mNPEx;JGN^2`v&Dy z!UTDtB}$00y|K1NPC*p1wyo2kNkX7Yt-?X*;NRQ+VmJOH=9@4K|Dh>>cMyPo;99a| z2?rf~&>r)ic=UlCJ9b!562b5mm_8nA5-?{1jJ2NJN`WH{0`T-gs)wzSKo_LANj@*x_Lr0=S4G148Om!x0kguNQ7bV>QUGfI6RMdvyZ#G=a zacJw`#;Ld5#=7<{u0P{wPMW+Yu2V}GTFq`zrHfEig=t~by#i_YW=4@!fp(BmQVeoH zFF{yjRaX}eZQRO&ZCz~c??Y>cKq$-A@XE1R+e}@Td4rGrYMiHxz+%yEd`0d&5gbNRfxt!>-$fOpC%r*PkW_YHccGtM}JE3Wv#a}y>^ zaMrJ1ZwL)LyZGtdkMV&c4`Nu;IKnWp2U#UqjH>t-ZOpUoJpP<4~82Lhf6=nV>9qV{ebLkb*@vw5IZBDRFypM4>`w3+Q4{dBeG) zG1^KA^7%ZvFH`0+NJr)g;j3T#5?5XQWBg+Af_K07ym^m3{Ky|Vx;h7a?#XmYj2%7p zf%eWF9|79F_{Goj(T{$d>#zUyKjkcJ-@a1?hOZ=u$Ej~>pfQ~w?j-S~XXSIn?z>!e zLzZB1fy9%BEST~jN@C@E12iV7u1}^Y6kf*l1jT~l$wjNJnYHF84?M}CGsZBYK8+v2 z(#`E`&Sg1mzgf&*xtV7cuVK!t37jxz3fW?@j2=QMNL&9wJ-EU)$RvZ>IAzkYuE+=L z(m5ss#UNm7dnX84DY44TF!2UvK)Z502MZGI%6WPR0r(eQ@ucY$wzLczx^DH_MLV|d zD3PQEt-}y|OoYZ7b8G{_2UWmJ6CpUcUaz1wQ8HCD=kECkT4CJ%?{GQtg z6ESNnAq;t^wFSluL)c1|l5&_7$gB^YI}yD(PzvcQj-E1x$KHQ7$4s1qE9(%Bt{i}> zWLqh1<*&;dFcKyJE3M4;8iFXx&CAz97;(nb@!-TE3W%bRC=4rycUiBxER~K%;3~)k z{ao|XLM9Gv;v;is5s5Ueb@RfWg%!?#u7dq_6~bYQ8?6Ynq96)HzE32IZ0udd$v54} zx}81TcHXI+K4TwTua-auAeHIoRcrb0jxt&9+e;$~BLlMe9rR>3bNlk;oO|cP9R7!U zx$5zkS=Zak-Xn(bo*Co$#GX_5@$pA7BN9pU$97NSzjq>3ocAp^ZdH@fGI`tqOi0VVS^m({K z5_96Hu!z=CnWG}A^xcJ!Nb$xsio%%qXjjrX(96y9=A%*`mz;Jug}`VGIF|FczI%XI zwsxRJG`LuE>^>_y!5M)g1USVIFXN+i2>tz4LQj!F1oA$PfFPHLOun4yOr17O16*~r z(cbygXFjcN`O8gz?C9zgfcWW8ui59v*IvCpAoAIqSh;e=Nux%LF3A%9(}F)hG4Mrc z{Fj;pwT(5@rDAw8VLU@#m-AK<1*+mj2yGot&7_D_0#C$9$7-mFHIq^qMN+ zSe8c7P(&&;0bd1#QPKQg6;Ucg=?K?#>FF=<+54X+3IiUz;4G##)RQUXNw}U-mXpeW zxJp}s(QeKlQK_CGMC&};d)jz#-8!ycw499{156p#$fZZ_#c|^&GNGZ7+E@Zd3JPH! zR|kx5O!L8e9%Z2DqaD{KSd`_1wf@H@19VyB#y&eT=YA2Dpjj_qyJ0oc5QKmP3*&O7`N z#tj<-p*DSZUMtGl~`uk`09>DPlbI>Ox*!zKKtt{VpaAA3{$)XT0OJB<8^5o3_!B%NoLn49+&q9Rh$4J@G?F!vew)^nZZe7u?V>WfsQEjXG}}Lyu#@4gAci7@uFADKl+QG z{d~}S_}u5d@bd0Z%YXKD&9&Fc8-Dk@Jr^&wMsl?&8XD5X9D(O1D@HoIT?d9cq4l6e zZkKWeGSjxrBgzF!$k@h4?#z2j(whXjh(JeC6xBYu2804P*BTVR7j2%sRN4^Q%H>#vd0p!5mPWP& zR+Grp+_r2LOCt+k!s|kixXO6TZJVF)87CX6R*;0Nve<>R?SKdZgKzR=_w(!r-t+9<(Q ze@I$u3lUew$6`(jDP#Cyo_IW6RryzclzO+xh7cvnsMV1Vid=E$-xxNsne&g_gIuv_ zWwOoh_<`cK6>DwMU&6$cO>%eR-YEq#QX~h8_*#Q+<$tR`ph5saNRTTM^i>i7tyOs4 zFRr`(+_T@!t+(IuZ#@%VUa%lmS6BDN^5+(h(NtfHi;L&R|89WNueVMHA0(!AVhMqP z@;QFbS$yt>zp!lkR;COe$?5y=!@<+1BSfA|v5opff@|)5hDpPknKHVC^RN07v6=** zKJ`%QlPU5+h=Zc4DQd@gEecTO09c){l(wW81Fa)Kg($y(?(BxnZe#XQC=in_ zAKq^^^FDA6-#+|U#x{<^*REmX3kZckMA8IUX$)}?nusEbK9uf4hykSIn++xmt5s?c zQqYs@<+hb;ARc4($l;_s&yEf%LJ=Vyk8G|TU*#>N723_KKu8LHhV}h@Jh6E@AKPm- z3AYhXNKCSAWH?xg_LI;H~LqMU*huh4GOARS6Mp1>FcH5(j zuS@aM;|`@R7N-zJNHi`kp*B+oo!L$FSbleD$c$0UOxA? zXE|{6aOS=L46ZxzbdH|5Cw1`_eBlvlBWzNFlRY<1eQF3fKhKF%$MF8SGm$}Hy~(Qz zo3~>WG)NCzS01BerCXme%8^x56XjZ@j5=7NQBbz=t#(3;qQIbIN|x7RO`@4d`G(QW>q|+$Mp9av2?Mky?bYy; zhv%_r{TAMH_*{n7))J@?M}t(FhM45RjXT)T(QkM@x-=nPO1M>(-9s5e#w|u9{D>$D zAy+`>3)NX41OZxw6uWv1zsFufh8Urre|PW)*t&JA?Cb3tQhs-yOLI*M*Nai&jtT}R zT-C{~R;ApiN-x1S=1OZz2wCl%jvom|Hw|HriLLzZv1jn4L*DnPOT@_gz0@QV-2U7O z?s@VREYH;b}*3#PkUi3xVy-MO28khGeUSsO;COtyhBoh1T}VAgBiP z7uM?6{AXGKiX|I1+g6XLCJ2;U2yYq*c+J|>?<4^KitG5}j|Jd2zxp-jzUSS4dhXfh z?lz^e0@p#$nPxn@XO4j}LviYAjanZXBF9wl+qw`huAz9~G;X7Zow*FsGQ(4;8ft24 z`12zV@%uY&g_>FeVTKV*XhF=FfXHN_y$d>fAfHD@inP?6I%_JAeeiUCe&PvC8#0;D zNfIeV5M;^wU1Wnk!$g;c-R>Y!I;0qOvvSJ{zVP$kGy5Z#a@seq;??yl!0|29RidOI zB?QlJ+sux>JaNxq-{Fl&;eZfCj=ZCme>55E7Nia9SAFy~e1*=7Iq_1~$>2*+enSlv%wcU5;Yd&hKA+k)!@}57}bC zBkwznpPzgRbB4~ub<;%3Fn*;ntrD~>SD8_yNX6@k$Lffpkgpyzi&-N_g0GA?cX){k- zw_)v|r~S@%zGITzgAUx0PN&R|7kv5_Eahvz`3th#H>FI}RMIG$l~pCH4=E85>7ZPp zSGbL)(h5`&6)B{U2pQS8?oy1hW!?Zt!z)qBm=mc&HA%pVu1J*j2~+_gH9~u6sc>bS z`uGSt@>xkhq?Ok#{hzA7Z`ooR@H~&5nQne`*WHX6J%V%gpNZ0?6yHb<2a)7=iy6>DZ|l*WSO%A`n85&YD1^BMs#dzsiW12to)U%om`i;?{S_K?nBzr<{>peLW16 zCKmvah!JxgJZX~r(mgjwk47sqVWD({AS@?!XhW9N(yBdIDIl8Mw?t0XXdM8O&mVgX z_q_NLI|uskM2td|1sSq(YX@Jr;U2zx{_(uDdIR@8{sPAyychp-`e9`KB9Tx?9ip^j z*HkG+YXru*P&wutj6_w7P*>`IB{U(LP((yRp=4x)t+Yf6Np~j8OKUrAK_{!&MpdZ7 z-zx}8qGD3oNh7t}cECFc!2eIzLl6Cp_rL$Vv4@x$#4}+<# z=pprxN}&?5N|h!M-ihw&fkGaEW@1AlAKPa(cfa>E{&f1W?A3#+Z+sOv~7K{uSD7Nv7dmrZbFI~g$ZhwTWJ34vv*;hIL+dpSR+h&Aoq%4I39Lb{_ zw?Y`u6i+a-WvH3Mm8B4(EV0TV2nzJ)+VEAbOmfkBfLFI~=Yb8I`O3j_2}7TbferL! zw=t0Kq!0`cYFimeX|rij`A`ySxh7nX48VSDqy`R8!>=soat9ZDE> zce%=~%H&H@%)%-GHl&84v>+xOetFV?%pTSR1)Kd#tcSo`#{Mf)3)Nq?0>PDtraH=M zHFkjxnsg{bs2VY)6=8z9=pX1OU(9|5;Mil29rVn5?X@S*KKuN&&CNspQVQ2}4lwVY z$GH6FzmSS~WujpuLxeKmyHwRv3#BT@F(f=HZG&nSwbsh;I&=xjx7$EPMA|PWb*0r& zB7!O%86-(nGovM86bx>Ipx6fA?SMZSUgDBll+f@S!NJi7d~h z&WrKrrp+wb(giX1HMg&-Nl}%gX@t_G^9H2|L*KZ4?gFFeAb==B`9Abj5P+|K^Xt?9 z6VAtDk2#SguP(~<^>kO3suncWCXkM6D`(H_BZ=YgyEYsO2ZcA-#=(v!M^$63gGivd zTtt)g^PIBxzSN`=Tye*JbY}*Lq70jMcJuLH-p0rwwJhDRm7m`92uB^fC)a)C6!Jx* z3MsW9k`+Y36yu`uWhX$e)xNT*K-qSJ(%iolQnTV;T1%8rc%H+`EuC!d=mh7r(Ab-= z1N3Wu!HTN=x1a(4wH$yW4?T>14nC;<(Z4GN0b|}^=X(j2}TTsiNlQRS-J*N zC51mrMD|=*yplbKj^dXe{VeUF&qLeS(&(m;j>pg;%`8~6f=~YN`-Gu1(yj`aI2t{w z8L}DhePk@bq2tGL+SG|0Ii{82wPrrLuUH_ZvN*bk&j6k$XxrJx=FT2;q^L@w)ALHyu(`dPKR)>a-#lj|QY8?sBwNhz(zfm32!__z zF|syEB#hcsNq0bL(?gR|5JpA%2X>N7*5OGHt@2#@bbbfpqY zS7(W0mtME9_N4;HljMsbSHHA~(G zd!Jx!S1-7(d5!<9#aT5HteeuXwaP7Qw~Q+RDnh$1%o-0bE(6dTHf%ijgcDA<=fMXb zJgxetUwLIA0Gl>#x^TpZ5$|nlYg4F5vc8QU{q}aIjTy`P4>^jg&LNaZj$~<&PDsPz z7P6u*p*4Xn5O->;w2?$v_{UcTV$=+3Whku(q5?4|Wm)`KX=s}?=pruhvV5$$*Dj&X zR_0oCW&ZxnR7!(60N^?iFt9J*tm_I`8*fxKb!tS5f@{Sp={Gn>XMpYsdpv^tWG7vI?NR9(Uigdh@LeNhkj2M}!;X8-#%g673 zf`Pyy9n}rde>e%y2o<4gQxK0E>uC8pL8x?s1rZEwg0aJ4Q=0&x=RGp-RDh||r?6_p z>hiB#c;STzAqFN-oYd4IWp|{Mrr-s=0SK^XZ~v)xo?LJFe4 zGj6SSL-E>%D|S)q zY|4Zn1wjy@`ZESC+_glEl#$8qDnsmg_Ut{x`~~y>t-=56U;jGa|Ni&+(wDyS^`BgO z^~vS)QM!1kGzU%?MZFi1RXs>YA(d-j|Dc<`KqIAxBN8OyHN=D|h#alZ(pZW~?HDM& zO0UE0wF(O4qVc1Ev-aPQ%^y6UZ~o;kEZ(@uNbW`vTERu<9mnTSJO~wOqR{sEwSz+7 z3d7hh`Jf1~Ys*~^(j6(|Yoa90UePfS+9nkUTvyUrDDc3d)ev*|XL*7QN={4mTvFmV z&VO_){jW*@_TGD6UVeE#vuBTUf*=TATrj^fv(r=udryI(%`m0aLZBGI9$gVC5ki1; z(Jw9Ml!FgpzZtU$f+AWwq!LML>eAfy^y9qmic9fxIYc6jZmK~{98NNoU_wJ3@0&H9 zv!_p?wV{ce?^93#QV9~mcweI+PzBNnmuHqN=fhY1o}L|DP?ti)Vrb!k_F28Yoo}wV znQQNTlJ1^(afE?#Lpw?(0U;fu zo+pi(phhF5Ll_18VaZCqe83(g9f#h?K%GYHrzDOeOTJiDm44MCFO6(TNyd-(?V_c8 zeC{-+G}qH#2yG|AR0Ptp?4wB7{x7c)i!qgjB;yBsb>8zNT$jJS_c)|*$QA>X&e7Gk zoyK%4u8bifg)8iae}gq+Bty+>@T5yB(M(^i4UOQCQA0U<`UHNzXa#x@YyBTR4}`6b zl!2XVQ^=h?C@IUdyVuPdLeP^(A=FPY^yI0Nx2;;Sy0!Y}e)-E^0`SA1{IKVz z*ZlOHCm(<6wn#;qp1j!b=u>?APk-h&U-&$Z)b{W*-U)*OsT~iM(jn3T3Li(r?D!tm zG)kaUNErFJRppWpk{~J&slcv1Rj&3GKvb*}ZPDd9ZmlCCdw zI@yxF|DLIFDaEaw1`&1d)jcb<_oH7UOT{qOVb?|gUcH!uCh z7s_OgL=xxxV{nHx^7TbaNGw^27J`xK1TpC_ES+RRLmeY)Qq;#hT2gV+g)TfNj_0P0 zop>yPv;yB6*Cuz>9D>s7HZ3Qlz|(?D&pMS!qvL$_xA)WA-^tuPr|^~2j^e;6qv*~Q z3?~Q=v};v(BSMTCsM<|VURnyJ=M+`2TB#*aDqu=tVvaJ2Z!+fc#HvlSZSO=R5`zS$ z{wdI37#cCT|B~y!Dgk);<@ua+^68_VeRkpEb?erZ*Mc6_2zyL1(!S$|7>B4(p;HNT z!mCX9D9~{i)@){2HsA|qegJ_c9Z!<1sbOR1PQH2LulU*RHyff*a|7|Q!KpuS})wl#im4 z>}@IF%JNcQ(a}fTg%c-^p~v^jqlRc<$X?|{fbzjDEYZhtAm(~ymUqUFcy9Z4-ZN_| zqiPala$$LPSZYmVbpssbAgm(WVAj3axJlP#VS5KRtys^|6Gn6Pv~lzmL&7LP3W?)r zieaAa+%}q0BXLEnYOHMcCwfVV(2W0>L%z;!B%__li~y7hiJ~H|TT>R9Dz%@2sE8&)3a?BxD)Gr8RV3ynUsF(5 zPgIt)FLrGc30nfD;z@ot?`e9wy7|#ZPe!Q-jcat@5hx|una}g=hV39-A{kOe_1{g- zRu+P%E*qL^RB3$QM|Sp=>0PN*>iyHFPW#K|&6{fgXz$f@^%)s2M~dakm-m0`+n4jL zZ(jCqIU_Tf96<70mwoFtU`VO>iS0Xu51n}=`?NL_SCH^r9D5&gQAmF=q$^+G`EC8= zLq(t>Tmk8LjA4lw!)p_auWw{zZ4*P%^~BsHN;`mSCA=-~$Y2CG7%dV7Z13I9ku%3} z_az@-M|VH7#*Dy~&^eH|($x|zLxeWkB+7Q~Rr##kUGH6%l_kp@8bMj3L<>=_{zcjE z0X#==_wy^ttsY}$@K&jCuQx8NOUmK^#N%;NsT6tJ9(pGM_y?}x!-jL_xo4#xy8poi z8#ZicECY6}!(i%I1DlR%DUV?(38a%%>Ru5@2azkH7cAwH4}XC<)25KkWm&s@2iM>7 zJMMjS9-DXWfFTVuO&`a}drjly=~LLVWh5i(8gQI6N<%>@<25ZTb6RQJbB-*GUSR$9 zZoc`4yC?)9B9*j|ltxRhN*T@u!9>E2lo{g~sg=>OmI@+CU0ssX58W5(Bv4U^2DS}k z@uLVY<}s$OhA`CS-mF9#wKFYoO7@sqqfo>hho`r0=hz9OtscI#dIUyJRa*SOhzLhG z!bt8W9Z5~nqdOn4c*8c7)(mf~WmQ)%QyUu@QIo(;#%W0l0$-7jLLxszXwzx~h0x}C zq*iDl4H;1=YT|KjU$&lAz5RS_&QvDU*V3O4i3B)OR0wLq!4GqEWw+6s9)T-UgZv08 z@V^y0viH91=Z-)~XiN^L!{0(NRJ7Km_{=`Dx%i=HAt5ax&A54iQ_%>1OKe_4PBI$# z5xOyLA?Pv<@C_0Md*4S5g)JTEOcsP{>FwygL~DJX5F)7lmD5f+m0$n%`t37k&bl?0 zh+S697a$RbbdpC`FJ;b(2^>6qI{9L*Y~fn!-wI(8BS#6O@bIGn6tyN83XsZ-grdQZ z3Z&wV<~`Y9DYPJr0zA(qb~>VDVxhId5A(!aE2wXE1C#(?6-nAjkCLLLDECjbA%Y3} zZ|pLoFEpO(u%WY)YaaX?2hN?w0h7m4@KssfS1C=>jWci4cGmaw8BK;V>rlT=$3~!~ zCRNlV15G51&R3K#qIw6+=Yhk*g$sAgo;mC2Lk>CkuZ2R<%ST~-Hdcf0`=YtIiI$cY z=ie3l&ph*Nap#@4>#^g;zOrfKrfDVxSHhh&k#BtZJkHy18VM06=B1I+BZ!J96`+WS zbYudyj!+tMVZ?wRk@F)q_4cu`x4;vd){u>Sn&WZy89AJNh7D(YQ$3E8CQ=EMbZ~`> zvZ83lB0%GZ1LXYzP3bg4YSV;aL@`v>O51+^w$zWx$*@Ty)NX@ql_7PN^mT>ksBKHn zj5{L)N^4w4u)QzGGt1UN+$~QVY5f+>e{_jBT-Dzy$p@>@CKV8m#i^^QW#`VF?<4?k z_xj$qzRM-w`UY+7ZQOR#t(lI_j`EC>7%>z*b39^VE4sDG%#>A|n>kLoiqKjZ{r5H7 zsfncsP<-|mKj!(xOIWdP1$hVb$Pvsv;#fYo&rD93G=bqYjYyfY@DzkmgwPJkafoRw zsm=DZg<+aTDkAO(uDbaFHgD@NNl0ma+Ht68n2SMButwUZY>09l6FBf7JHRK-J&gk< z&mS>I{s7=K1gMdOIKxre!QMySnB!5`A63>-xy&f3iP$2=$&ED3M77&kV`nAaYU!MNeDbRAl2c6N50Ro~RO zH}FFBuibOsy#RD~cX?4@#|>SFgnP7#~3g9?5kW+x4TxKMN@*8|>o^p{ z0+A*5DXmdbp&}FTgQ!Svp}j2s97O>_Y6@X5#es|wAF}Fw25^$}`CZ7sK8I}=xj+~e zQHjvBw`>w9aEOSI$^kbrme0!cmbFF2gkvUK;!cw9-SG$XKp!7G`c#r}hoY|xj$vlh z2%?aimaVhsl_*VyR{3r0nzET6NajN;b?XplAJyH5Fr#R?b@WIvWy-|FpKko~GavcL zhsN}D_tMqVEnTH46bjVWH!x(#klerPti1Ei+x1yzowMeSJ8qkVKntw|yVj^MAc%Z|s6Y@ENr@r}Cxm3kq=u0QM<7u27a|t6_we-Q zc7C^b87;8{M~xrF5o3olwziq9h~df5Cfl-1 z4%Sq}xn56+au9A-l>{iQj9RHSek4(qw!iC0o>{qpj-I~qsIDGl;`4S;fYR8Ju1HAR z`DHKWku+01?<4?k_v#zyOTPcS^T+(<)>~J0baq(kDS}}w=)ESx_>t&g4JPZdH`9zC zg^=^n^^Ot8QJ|s#w(TSnhJ5LF*BaQpxrv4YXL97M$y_jJDo2eSPra<8AYzpa&(5qX zt%wNFen3HoWg{Hnnvpn9B&kUx`0Fccx#!tej7+d2%dUH_Fidw7+yssd6k3_U6k3u} zXvJ^H!>~3(yN=dqDTukS zw7Z9CLz);`pT_q?T-Pk&qHo;c2Kw{t=;&tY$_=dAu#MF#H?eBv1_~X0P_S%PX#!PX zVcH(0=m{fMM9R1-CR~WeNDOag#;gfUoic{GGbXV2tjP>%sG&Ay^a!FTo7eQnO|>koMJjCX=w-&JDX%5cDUFcYa#bZ- z3JN~tLxnE(Q0o;5DWH|{r*Nf%mJo#ngosd9Mp-&Blu0v@N}9QQgf)WFxCpe;WiqJ> zLK~npnPMMtH-#f(NNq%}9Gd_UnJq4)(G}1_nh{c^NyTHlv|%m3o%aNLPM^dP(5OE;MU zMwR5njiv(vTsKDCOB-$@M*PUQIOZt$IfAf=)**2ZjvhCR6DAHPQ-o*R+IVdJR&HCh zfpK*;95Hq{bA~n3l&U4^qzF{OR>rPTUbIQQDWI(jp_WzXOlj;-50a$*I~%QPGQgTS zA&kG90Hq_NP#D6ai`Nq{ zu&tw;TrN+L_o;12Gkg3PZh86@(@%CyhUf}K%yICvG5zt-HijCp8|9e8I6@eY5dp=Z z$ngj5#qTfrI6~B*bY$&(H7G^iFM?9E)WnE64!JPIQHl_ZAP@?q!t*>lN76HprK79B z@@<{8CgME$>Poh4>tyrR?X+)dr(X`AKj=gYx~{| zx51AJ^k&-(G0<`X$~@fN>DQNYc7<>pY7$NK6*}mP6z>`{f-%jFZ0;Q}B2prxA`tQq z5`(mcR2;hA=rF0)+Lb2gxGrM)SoF)w0rboB=b!tfFMRQ5KfdPbr+0mXhQ``NS9iA& zt5KSK(I?Z{O%N1;0LR+x3Jb%Ro>vO!$PDnQpZ%8hY%d8JqcQ1`PNngZF15)diFk~L zgvXHjI?{<4$(TodB97}>yWyBiGU?(72Uj|VaOr^KNE~T|SE49F3yq2(LV?OrC}t4C zK{_!U$HmiWgyWRQ6Qs3gHU2@;$N@)+AKY;-K_TzJYMgh3tk@doq0RAf~_b$QfNm6RMycG*Zg5yO*^ za+1`5mTA?P=G3h#HdUF)UjAhq|@nl5`edIop8bleDfQohn9$Yiz6jwhhborrsD{vkAv~8 zh>0VhrQWn?OFejW*=K7GKxoH1=WBkP)Rg-fUexk#Zz zgrg)!N2f_SfB0g@9mFJBv28v*_VxxUJzXnnw-c=+lni!|ywh>0^eG?avwk7mQxFBTX;f zjIJvS?Hk^L<+J05S$eZ=G}W~tl!X+nliX|Hi7uOkpdpp0C+qhSL`Bk`;Mj4axqjiY zav!@=9lnk6z(EEo!XyACfdKJFzf(b-@FVnyW*FKCJ9~sibNd~)-3hc@bkRjzd+oL5 zU)^KYtSeWqTze*{afBgJt^l4xzEGefb*r@5@Y>Er83P>6D{I#=Z~Z!o$t0)&ll*B7 zg@_^bX2!>mWSr*O8tURP>XJzs zYEvXUhvvE(8d7m;V=v5Du;G=|(PZ5_io~kv5K|)udHzAIU^URvHJo@5`%$+@h zQ}&udwh$mJ`PCPinwZCf>$kC_tphx_WV&DowKCX!^)CcEQV3s}c9|ALI>gTyeSZxk z5^-kFoSB-xV8MS(@CUg3vTp&fWZ|L@=d<}liSu;m`%mQa=N*fP>PRK(jnuNPs-{bD zyNGOita{2vTkR@AM1-RRS~$2~f>#c8OoSMMYMZ}MtwZRNoSALPt4 z&%EQFd+#~f_rq9;!l%ACu0_F5rfXz!DKLv?j11S`bFX%TzK$)eD#pS z8Il@;9~t6{ud5+Zjg~ozD$DW>o4E1Om$>8kC3J1w3fnu;-C5`!u!Ozp#bZ{2dVVRS zTu9gB3~wYgriDbp!OtO)f$V+MuP!cOQI~U;p8L^4mL5z5USE0huBtU%ir1N?BKRP_)w|;|V5Bo-A5N zwdRHoAO5S_+S-S%yY9M20MEQ0Vfh7>_i^?)=hU<`HGgR1=FQ((zjkeM{l;|!LBt@| zj)I`Om$vR+{=9fCcU*rrU;6q-_~-{u!bOnJ7x92d2jw|n$B||{4T-j7MJ)wdI~2oS zy8EHIZZtxbByV0DY0GDy(nu+AiBS`4q^Gb0l;Gg8!}!aJRpf%G0{siUd)WBRoDEgW zL&RffDa-xA-R4-L`WBcmDwHxl7CUQhWzYjKRer=N{aA%N;ub zBUk4~kjq1Tieea1n$VXzLgAR?vvfP8%QNdYP#jv1tgk^uMmvHiBIU-p@BPQn=p`ul z0UC!*U0p11?_@=LH!IruSk>9XKqd#-9Q5@DeGejxz*WZf8X?h2q8-g0&%eMxp~#m`ImlG6$`EhS3WpFs za`?@{74}Njjp+S?Zd0DEa2T|oiX$eH{Nv7z4zXCW)v!2 zCULhk!Jd<#br@pIP_*Yk6jlyQX_=o&R0T78V|^c2Yi5od%C`?ch*PHQMOHcZVPF@F zgOq0JNU7+~ck$HXh1@)EKKDKIGHl%mJ$;Cdf%0fvH5*h2i7N%T0_BH9g(4J+sO~KO zmhE)E45@L$b<2!#!fQwYk+C1AN^eDIv_0$!L4@z;87TJRiUu=xD-BepG)Up$s(^-A z%#g8U6>nBTOgb!S@8*BzJ;joFufmG;h&5ZPgP7Gl6L_viJQgF9%`Qo#l5+awsbboU zY0GcA>E?3)^2Gv6mM&q*(uz&#*S_{OuDId~UzOBks)Rx9zjXsYwqNDzLm&FkuU~lK zg@aeDSfS&|#JIrs(<)Mc(D@ym;=7-{lDq!&S1!KnBOI{*9HgreMPbt&Gs|BhHcD$U zQ##N!9>rjQp3Dv!(j!cV+M0hApo|zE}H|noyt>d> zy{1!XnayQ2DiU<`Lu(721ASzpqDh>rbaGj#P(kEJEZ(*aJP#E{NbR9?2!6;VN9@gn z+FH7b1yTtk;4)|IF!q};f|%pd9|aVA#r8~rWgT6t=^9{lPahk4`smN(DHcO=VTjhy z;(3g%t)a$|G`I;+KE~`3U^cx=a#*SWgQ#o~?I7s) zi_n`b_jHvX^qqV5*&Dxd@mKlbmH!zCz#envvUt&}OrJ9KmHDr{Y&zR9j}ty|28T=? zPtqL%QHYQVr(}H$yLH_xnfp{<=ChBiny6#YBXqgnuC3gzD`K?NjVGJ$W+2x|NRdEj z{3s+2yl3VZ&Y3ZeXSeL&cS~1u^RjguKWQ|Fj2X$$M9k>+D_vzuq$??iO~CD}l1-|$ zwGS7AOrxqToke-R31TsiMXNXP{EAJuo@UN-&U#z@fY%ln8iDY`GAPj2zH{N{ zF8X}-^Iy2=odjTa*A+kb9$)*POL+B_1srhTA)or|0}p?ytE+2f>C@Hm1dJNOhy!M^ zV@N$T)fgtd3U?{9s{DPW^u0z5<$ZH!asJFXwA3__2{ho_1JN*Bwe|@00JlB; zG{3t0VHPY{0bAOQzIQG+sLKNg*Yg-QbQrl@?zaP(OvkXMCgIg2Y1`J8k0;_^lTsvx zv<%A+^bb53^W0hyaZKCei>aGEN)MURYKC1bvC!2H0Sd=4V^xW`!!K@mkjbNlbHJ>< zNy=JO2{{njm}5vmQ_6@2x#c-}hg=l$tCtq@i}}kKSi1$bb->y!r5CP1%Va7kh7M`j zvT5_?-?z37kIk90*T6mZ-1EIcF3+or7V_$%g`9TUY2u!H?%C~*xZ;W{UjKgX=HI^i z-S6_7-~5IfZn)v&rN2AshC`)*GJ-JV!11k|Gi@CGzNRKV#8^Q)5n&io^aB(D4&X@5 z_!^IC^{seQJn||c>xc9deKz+Eur*s?V{euXJ$8-HmMC(#E!)9wrVOYNUMaL0c0`^6N+Lq`R-1j~;g>#$QPi+LoA|{^qXLn;3`! z%9`Kh_+~3wZ4)ysEB{_7O?~Kczdv6n!a$}J81&59v(t+fE&7iM{s4;?y~^JE?050} z1uvPYO<>4DbNK8zN8^YZq>R~sY4%RpH)A*Lv62n5*hO+r3&$emdQjzEBHWf$N28FM zL<2FIpfk7GxG~!M(^Cv_5gasn1P6^7&a(Dy9@(&!E1!Lt(RH;PIc@}Vhqd4d#XzWR za#|YUvzj7hUyn-ct+*2F!L1F;8;YbsTWeg0|D87Mc>V22FkZk*Qa3eSdKaQa4viQ$vnNi zlkYzHEZIyRJc)2)gWFarFoU~c1fF8Q(PR10+}WHoc^b_%jY#c~@h#krBt+wsJ>wNR z^qIeU9SiP$8alcVK~!cB+u$$8Pnbx|b3eXi+t#I1r%o?E`sm*l2_d4b?QPI*UdFhI zRK!!mz3Rh?tb@7|8O)N1o%^tvgV?ImFgZ^zsd5^8A=F zV`L_iIm>aJ9furxP{*blH?Q5eaSIzaZlSiemWwaGm~VXJ8vwjs@P9j3=`jJm^PS7N z^wP_C@WK0U18)1$SH3*->Z`9DHFVgR|J}M}+kRR_S_Of)_vXLx)T1wP$T>%I(P!Vs z?9oHW=JOP74_he*fkIiSVRM7b!8VZZB<0kAmn7-9xH3Yi3_CM@ENt7(s_sr!b@b6z z2vjanUNYZiyvL0tLew(Hr83{v1&lHof@L^9KWi5`YIDdhp{yh>uAGI-5gx z_0f^(Ctt{usHq1XmPf0E(nwd*lN%rx1$b_ZKm};wP?w1F#eGa39-&Fc8i+Xw6J(Wf z4pd4J=sYS42_m0jYjd9cC_=z z`i*q^K3Y1o4P;oiqm609M-mVq5O|);ww`W&^5DZ9Hg`I6#}6Z~!V;!K67A;!zA9HX|ojO&lTD3~A zT(RtmatFGhmXCk(3??+zp+w4R_9=^0>Ni}*yA4!TDx16hd-WenpQqLu&x=!^8b)_! zYZcMZ$OLD7b3dmv*E6}Po*uuzt2?^6aq%ktB-ZernUgqt)Clq_Am=M%G^S0zJ`#4y z%Q5{UZ9Px47K2H&RNN=Ejz}e9ytHmB55KY&ClRljxDmUwaNpwgE=h%yTcGx3*hwkD z+n+D^esD!YYy@(xjVG_`Wtd zsL*&$XcluMh)F?5S1*20M7y?lr!wjyG>opVB^8U)k;}8Nql5R|{RpeOdqKFcemi>g zMr1aJ0-a1Gg)3thc6WE*32@_$H*?%^$MEpOj{q<*Ffb@k|NnJedTB)<<)SZqiOVm) zY$vdDU|{q908Py;y1T0b5W2UcU;OodZ|C91UgU$HJ&(_xdIT*EH4NnQ$dXUEHm+re z$d2xroIbDmsaGM3+PCt=rY+pJW)lnBJCLqRjq5P7F3#k-1}2XhY2=d;Z0pZ**;6m$ z;1W4b6~t%x0B^YipsKkQCeXW1S!&sgsw#t2HP^u6_0XS1?=ux*Npu*1)aDS3BqEl8 zkwek_8$oMYT84aQ^r+Df&7VJi0l?=zcM(De4nFW8o_+o~^Wrz|Aehj~j{Y8+>za_- zCz1|Qo5qSOB<ZaJ zOHmkzIWALN`PZ9K{r#MK=v-=J4mqoNptQz~AmzsR>*`hP?9Ui9`{L0HP_tzpLB4qTD3~gm@(sp<;#}?jzDT!4%w6U9=bOfKcqe# zLmRm=9KD;U{g3e8s<=z0SXY*8XXK!hUOfq~o4lV#N~g+S!jN~P2&9f^@DjXh+(=HC zG>WIUbnx>9EBNE0ReW~8SP#^)Ko# z{N(3{KJvE*R(ExER>r)&7|ygY9B}+0eE*|ovd_3yIx{(>j1%H8sv*u#k9`-H9GYY6 zK!%P&k*psuDqYX;bR&}*n{nK@F}*2hN{P{1wy#M|Oh!tY9l%}WP;s}ke&4i=Wf-q9l*Vf=UG3%3V`rRc! z6e$^9Q%hYW;Lu}lJ-r8A~FLhk!SL-*f{ngmf@)-}~P8xa5*c=6NapYKnhh>JIqCj4gDEjS-y@(x3rTj6se6TICRW#zOesHCe$}GrlE!UWF3fD zc>@Q<0s8&zM3Lmq)th*=eJA-KvcQXc>*vFu!c&*YlDLkAogEW0r4eFM(t*|{#QJUM zCtgL&oB$(R%8Ggjlf*Kr1=eo`Kca0%8;N*g7O()|r$4=xLk>PfJoD@`!t-J}2m(z< zk5JpYS-5QzdyF1SUe*ER=9#Z0X*?4Uas^l!@awYSws)sw5l}A*72#M6X}u_e^;ZQ zP!pq2^zcd}tipiYMqWcB{)t8Dt|UAoD{Y9$F*ive$XbU;Sxy4V#hlr$!tQ?o=zkZjBIUX{n~Z!Bme+k`N|jh;SaCo)Dur1 z{_~&z>My{NU0t2#mT1s*DOwKOi%(r}1|K|fU(#`pj{YpkL>+0Tflx>s9Z}RUG~K}H zTB~R#je=C96$Kp<`uQ?6sI6>(Lf|OZazw2?szJtxbV$sTBxMRn@$q+`#M6Jglb|Og zhywQ9`+$$^x8MG+{`_Y@c}wFQci(+C7hQDG0r%W>*E1V7ZPI{Dji{&f@F@sSaQy5x zYFx$d=eH0l$L7WkLJE}7Oq(#8WUR&tcG#>}3;UWCW9#Y}(U9WR?Hy+Er(&>eCv4q` zUbEFI38F@i9wRqz-gJ==q8$AH)2>S{xupF4^Uptj_ORijPH-Ik!1it1OqB2FX5fV- zT-BH3_9y3a#<2%-{t0$pck%!o_?4z+61UTfr=oNLbMJ?Z`cZ;9Vu@Be*e`ke1)s7`616d`;4ACb*k*? z>A895&YkZOK)7xT_s(C)*?aAWBvx*b8sQ)l5LBs;s}x^9cu&UG*3n-qfV9HU+CvD5 z)VfT^Dr+rBY5L2mBrq zB;=U!tsK-koaeW;asS#aAmE6xBbYm^kx)te$V{^6YU7Bi$qu0%D}(M3g%LMDyO?a? z8!@Zu#IQ;s@a-i8rHv#ja^XQ(B8}=~A}J<~8Rz_`Cjjza@g)20x4-z|53lC3%Pu|o zp+_EAykyCeBcsTs{sQ#4ksSZ2^SJxki}~bn2b&Q&6=P(>IGWSLNhDI#$Kxauangwd zo{Uk@ih&@cFYw9vMe>1f#d7Q$vkR`&`>XJ*m1UMjxUNfE?+(tm?E9Sa{cm&Soqr+L zkYMNmbIY%N)24Nw{Of&py(O!-x;o<%@`peC>CBB=Haj4MoAMa3|5&mJ4jkXf9>cRt zXelsfR4)UeQOHt2G4vVMRL?=PX5fjWB{-Q%tYmJXwV*a0W1rSmBR%Q4(4T>Ay|830 zckYEY3!s1y;(u%NXG zT*|VF(q1j021La8hC0(;(&Fup2vyAn>rw?Or3s+wHQuIBmxg4byd}k^9q__(bZ4)T z1r`PlW!#AJkE~n2o@=i7@!?lp^TTRrSjA%QuWD=3rdib9$&*jN!b=<00 zGsa{_Kus-&9lkfi>T8h^;J6mODIM|38chuj;?*$zu48t8uLZDc;IAn5iCsQ=Va<3z zTLn>LoTe?u#;NQvZ7j{DP#ijT1RvjP3dc_v#r^9xbNMri*q+Hzn{aR}fm(}_Re9B8 z3X^b1saW6M!=nq=7*|xaE000H>3uAA{cK8pBT|-)v(Va9{}zsrj_jW{W5%lg^z-&# zf&jeq(u?}Q0}tMO`Q_gkJ?N89In?aCFJJh~*?i`tLy3xtq8~7%ww3;Dz;i3t(caz7 z&i*U~zrfgG!>ILQ3~z2?SaUt~skF@?tqiJ7#GLXZxM6}jLZP%{p$1#2NS7E9^OmmQ zv6~+zSi70qUB?`@O*Q40xU;>3<{`~*DN*Y0&(PRdcXT#8@D;6$Iz{uW5m29GN>hfT zr}dMI1Th?rnw;bL9We@inxv!1XA8XV_@f!sGKw&=D2Fz|s6-xftYg-x6UOkHmzN^^ z0KKIHmaVbYrA8Ao2!e^vJ^R#pfNQR~`oAIp=iR!tl~YPgF0#S33qI23># zJE10y8b6--4?fKkvnKNKxzj0x5rOgvwW+361fhtKXtIS4LS3Y#c04+=E_bECtc(S* z79p;*8YdGwuZ|#QCraLG*;IxkOLORUVM=R>TQWfrRkPOdI5Z?7o2iVP3}oPi zr7&$QOdJhLp=%S!;X_f|cLM0EfBw@a0CDVbC-Aq2A7tFv(QMqb*;BwK zIMtP5H9R~RDmF$*wTVVDg&k)9BCT_vWX|{zytH^Vw>|$nm!ESM&#hU<(hXa<{3FLx zpG?!2$=d9~Of)1t$uC~rNN;};5=K;}G!;-ftOb_rXJwBm6k(fnXN(H4W;#!)gX zDe4Kq_=Xz3dC*+uw{`H#1xuMddzma}z+pe7Gnh(t&T#-%Yh2;d<^<>GFT4>1oWh0>qe(~hK2D4>NT;WTp3v#)adQ_qvl7ub8! zWIph&gSqhJ<2Yu{EXIr&LRWte#bQt~jCdW`)o=T5jvF_@Fl&^Cb=#q*3t1FA z@bL5Wh5<#TQQAQ&V;rM|l@HPaAv_Aj9NAnqj&yd(=4};ZeeZ<@EJxJT40ig`|D>j& zeq(4_G}W6VVOPj{2@xQ#`X~6{%PfN0c8kC`UVgSH-IXjH?^aqh+-I^ zclMT#lBrXttv>wlBmeDcZs))MeE>Z7%=7H*?%ZeFjyBsBRJ6{S$ljAj8PAhQSV13Q zQN_>}NV?2a*A`VQ>2eA2)|a@}R#I3?OSveKaUs+JMSlRt@vO{+Nrpwq5mKqLT(2SX zmCkWdP7ccZQ3v!( z0N1giN4p>(uglrlC6h0$ar0@(N+MrE#stc6ue_Qn)q+F!n}QZ_z*x=5x>}TI!gZT*W6k)o zkpoA?adeS`XY9$B-}`Pn(TqkC35BCfzdF#qU3VG>k4Q_BuHX|>r@)%6uzIuUYnuJD zy{miY-Z$TN>o)$2uhULBo!{K>>qqz9f1i_wve-g+OvcP4y-OV|Bs1inv|JvD$T`92N$<28D3eI0)aC~z4Pr= z{?!}+v&W38pkScTNf;F>37H+!-F4|yw;`&Lqsr?t((aL?C=`8)QN%G5T6zDB3H0Y9 z9@?;lm0i6!NIYrA4ILry;x5wcrKmNI~vFU(Ry2i|J6av=&^(j91xhr{P!wwR0 zhitKr{!EVTJsm9DwwbM+JJ{Z}leJs7bMFf;^3!|n=I8f5!165{iL`oSMr+l4sDXTK zuSrN-MTd;3Z(zAf5o&!qt1Qzd4Fze>)bGO=#c;B_|HA} z-OXV~9>Hz5-1@hn!-q|DU00R@8p}44Q9choy@)UhEz{V_Gvn9;%CK{#kQBorL6k?9 z$B0BFKpCjW_|vP1#*}MBdz5}_KH;xlNBrGfLTC-C1R|9z=PgsGPP_K#qmM2L*lUr^ z!J@UWcs-)A&IUQyuztPPS|{u&-(7mlQ%*T+HYK*+#vLqQvWClUxsAA+v)h6XUbPWFpTY0yF|x)$GMQxfuwga-&OLC(S!dGL*2dVeW6!?!$JgA42rq7HYb&Qa z$DDgCpFHgl@_uA0Q6b6rUG!u(lk!VlSC| zcR4VYrkG0o+3J0_D+giMe^c6c0SGLLtDz7;Di-7LF~d1_Y%2r#kiV|mOrKxC5m1}( zcx>S+?wY@fR3c^&Et?SOx0uXVB*pCx*4mbcikNheQdaD}wW@OaRMgd`|0~Yee@P4A z{`>DY#FbSmUrfYfC&XegQ<{g0wf8^Gdp`eto?o$%bVBjvb53S>(-7`>>P7zdfk(LR zzK8kwUH7wc%NFKLp1?H8s5M-uuG z(}%?wQX9i_KDbEpY+X?Mm zJicT-9eo344%xBpVj7eVO@=O%Rf)vRq=VVGRn>XvAX3&vDkdG%zOS+o{>PJmH_j!r z(ncqsxxV~&jZF>Sym|9tM;>|P5klIPtQB(W4)mrrD`)Cx>B`x&XU+H$Kxe)$_~g>7 zJ^^sePp;^^-~%80Ga$(1Ve58&_4us_HETpR0a<4q=L z>&o1-5LPwr?|d-TT!0evE5NiMEX14i>J5)jg&+iV=>$`Tw}6I$fehn^*E4!}9ZD;d za4fk^lW-lL*wW6c?VSkeS}3~Y{AUlhl5T;r6Bzjbdh_N+Wb#IUsT2-3v>El!{(&-# z+cIn@`yPDIzXkqJ*BT%ByY9GC9Ch@&)TT|FZtLyqOIjRX#A{Q0@*5ZM)$d$L7%B?I zES@J2PK45e{z511{cGqL*hn$VTU11r1HIDLPD@JOY7d}1%BN+e*pe>!pr8KSc01~7 z-5a&o&A9z*rw4XT2!t?_--f8GP*M@;5KTyg#8(lXD>-0HGlz~E$-*7oWI{!@P~^J% zo;MRKQkYf+5*-C^V+69~+~QQB0j2|x^kNk>fY5M-3Vs=5*>j)0^g9W_E>}ZC1Kr)- z54myglb#c^1%amP(fOSD;Y+yw;iu^JJ2-0gbS^vZe7^mG_j2V0@8@Tq{R|hM^BxYF zF#{=~5EPB`xES2q*%i`KC2I)jP*8nz4s4+(*N$+CxSl{pF7KK(n?v4veED|wcK6Ua zeB|!|-t+GF4tl)%?!Wi%_v+4j&#k2e9&4&2){w-}l6@zp@!S|vct|OUIWDerQPM?v zNgCsVd?8DyLL@F)YX*w#B;6XMlQ0&?!XaDeAW#J}j3q!T!LSiS%gq(h z15!vFT$DDF*n3WB#Ssc21$#{#MSUWH621klWw{#r^{cB5iOW`ILYV1}GI^`o=}l?e z?kv(b$u--%26u(EhLsyFkH#kQ8#n#vzB})F?C9f<`_84Y#*QB|Ry{WF(Grv? zv~U@<=R|&ZmOoBT+%j>VPR)KPj2aCd3!IN*&IcMIbWhaItJF!Hn5glv72I4 z1R-!liT@qhX^d)!zQTRcy3zsHdY9y`RA>oF5M}A@-%2Dxi@rt{fvb-EdN+T5ZPG{; z2S93pR05$uO3$9_sx0W_`%o8?96h0xI@jZ_=a;f%QyWRoG3&%CYD($8WdxwSmQ__- zPibPVN6fX4S9(j4vI&4j2*LvnJn))#5`bN<-rio4=@hwv>@QR4kTqFDubp zixw`Unq0;Y_l)+x3o!>A$9^v*Qn=^|)Jwzw0J#A9`4v`Ppv#UA`1JJ?6Y zftIF*^7C(R-@*UI>#|F~$zzW_xpnmDv0q80)8-WE&%(|gZhHJB{7_-ywnE|903F z4SK?)i7b9~(Y%j+_2%Fk=6+9 z5a@_VMAXJT?pn2prQ6yOp5-%0U4C691DVnRt))XO>l5oM7=L)*H_o1e%271=B6Rf` zo{b}EX&I6NnD@}b|FU)doy)%sz_6ji_I7a>Z`izvvUou{$$sxYhF|~ra?XC&!RSJa zp|wMqJA5R24{v66a~+-|S>4mm-_~#Et~Hxj(B4fDDv~lJU)V<1z$Usg+sFp}C;<}J zCS`{EVeX^t$0Mu=ncYjmjL_=pP%0o$MS2Fd6H-KKugvQ(rb87c)7@9tmE@wjWmFpT z)WQk~+1Dt9V+4(~B^?5Rf_xa!Gmz(xkH2cW4+dlw*7M=*j`~xzo=TDi^~rbz`OuMJ z{ulhR3ZPOty8N5pe&9nNx!|1yVAm_3%~4lZM_*sxtt~@Z_8U2JWTk1hqm$dN`XeWP z`f_f5?s3vF2iK8AmOxT6Rx6GCm9(zQOwB41iPj(^X-EHz=XIbJFF(JSAAkRMy!T62 zaOA~T@VVdrmbfQ*-$%}XxK}RuuKV@>UJ7vh@yEZV_t(B-M_77{L}Q9V0JFy@@m!Fu z!1W@e7vaVN97iKv7e^=@VHn81%91PYBnW&`u?8cwqBX@ZLm}ux32iJ=waJcS5wx~8 zm!H3{x1ayZ*K^N3`zIBIi*yNo>+EIqn$0}Dd@adj!hS9`o|ndS?D!8_RqR69g~hIo zn2ib7Rh9bN&H+k&XlqubB5P13EQ~E)JAS1##680U0D>T(SS4mz0UF8eV@UwO$_o|lCmZXc4;0;G@vCXMDJ zUw#i4p0E!;xbt43&_yW72RDl%rCM3F)Z)6#K;WT5EtqXkQiu7VVUU92sk&>R4!M=PU<+MPKA3k!|v?gKL&qnjF= z#c8LV_DS?0L3!fw6o(ylWcaUK+u#1q_qg=3Z*ta|XH96|**-rE!n!h3`$}Kys;1sr{RcTed zBY)+I6{iD)0egtmK1Uj^jJE6BWdhpg*0HF z)B-0{K&{?F=JENg{M}t#ckwmsd)gOy^yTF+b3$bdEAXeDeDcY^dg!5tIQWpm{_cCa z=%R}T#S7uO$aDfB1+zyxL|WiD3gP;A@et{TI5CBABOJ%Ww;Bj}KTAH!l8n{i${0#% zv<}G@x{a5*c8#KzRHjh#GzDK(g&oEJ_3M+L{?yH-xlYlOf$ki)KKUx1&_ay+fcvQF=JFhYprL`-ecnn&ppd0fBW+pYqxFvQg@*b_MRy? za4vf4SdM%DiG2S9Cvm~ybLq--a@+jps7t$a^=IuYx0#O7Dnbi~f}g<;vj}P2105tX zDs?$cGgOGsPSt=Ld1wJCFTwhbogDbJOZn7wzo1YE$%TS7tJm`VKiV?=-1#to9bM(SK4t3U^)q zX*AW2C6%b5HId@1>ErmH17|V2xq;s;TEnLvdYao;ZKe=LAPV$nx6skEn!emNqA0?X zMrcP^E9J;~vYWLbDhf~Yq@`ObjSRK~t&!q(Bx!#LhmVmzT2RmWN^eb~BeMp^(or z@6pG{ed^Pnt9$mDr~dAHx%S#?O)pt`9ta%IA#{?o)H@7Gn_Ss(0z9{f<96e@8HD5G z$Rg4aWQrlVLSR{?f_N-#d<#UxKz=77k+Fp(0wM8a49Agt@u#=&*Wcb*x|te{_kTI~ zf8YZj;F@c$xpL&l;pVVb5%l)+$o!RTZtubIq~&m_K?FZdwTr4Rc(>C zVHdh98lY6!TmB6T4yC{nzyQ5=?YbZC`g33W(pQ)`aZLL_Z{M5=lP2ER)Z7dpmMmG! z)jzy);(ZHWI(y^xZNnJIX?il~Nh3+^Go7!TeI)()A~8pD#ruxqrw`rBvuidGYBS+1 zg+l8PDI|f))6u_y_WqT$^{k~Qvz1J-lcLI_bYN>giKAut(2t}dAw8a3y_y5Rd?{_6 zoxJdqYgqil@3H3UEBMuyKh4z1lUeZ60xtN)Z*ZhbAu13kza&b`Ba7G3*V)H0`%mSt zY2(QhO<&ch|0~*ZIc{FE9__jYnk|LwU0oaPNLnfvQZrCQxmJ%pmxrA_2+&eWUU=b! zi*CI8&S2}trC*vech5~ixB}3Lq@mW{efORJzpv>D6DHvMKJi3+;x#}1Q5#5wM(B79 z=1%3@51+lMSZN6xO7cW)Rmi6Em5g$+NOmpL&7}+83qakdmsx` zN%W+2`t}YOqLvaU(2f+x-geuqGvDm{`N35`I3$sXHG?r1DhNqK+98=Jc}7JzB0xA< zq|75xmV6b_lT&o{X06PnCJ0TxGE?Xz)CHsNr8N!?(ouv$anZGZ=Em>*+Ax|0%7i@L z_kTG7_~Re{2*5u3>~le>ZBAPkes6{cUs*{!=2pS`s(knuq)xx4uV0-sTCAJ_zkm*c zvf#%*cG=evD0CF={?SV4sI;#yohrw&l`B`i=Etx8@ej*^W6hd1ryg|hf$xsTGT5DXOHyiNq%d2o}Q+)BH zL&+2Z+sCzDVN&w9wcAlbx@+LCpo5N5H1`%Pbr5tELT4}dJ{m-Gb8~p&2`2^s zPd)W=F;d~)we>Zd0dd5kM`Zt1YkK|q^-P*LX{PJAFAHlDPCN!vM)Sc7PU5>CJdU_i zOUh|NsR(7#m#RRk%LNfYpaW0}*NIV^8p4p8F{Bc$C>og7+`{Mfox(Q{n$4a=n|Wx% zX1?&)e6D+CHSGgA60%69xQ))f4fGY;iGpH9^0p)%gd|hwW+2yQ$NZ`nv3`R9UtR6% z*GULoyFYhr3kU>SM7RhNagXaCdWpsBw^Ngh4T9|dVG57s1_`ARE;Odn<_xx`M@B?U znU~*R_Kx6P?>hR_cM^a%d42DD-veOg^jW;J@Z}%vx##}ri4!M2XQ`xG2!U$v;-x>{ z&*#qn90yd*ZK6VyN8nydOR8(sS zBC^>Gb+xt6?7i2%u{ZNx{6Zli?XFagq!9C{OL-s_N(m$}0__k*X;hR#Yh_5xO0lV< zz|OwD@@6W888XFA{3vf=S&SOHB1FnK7ysf`?zs9-h=D8u*T@E-j{|P}zup2k=9pu+ z_uhN|(Ad;$J}lpdo*o`wypA9r8fZ`mYx`Q3fQrdoKN zpAl4zVkHx0B49^H#~TI?fWO{*->s*da>|Q!sT#J#)a0&L7Hc+l2qFo+z0f~^pAA4o zjBl=?C2dAZht<~;<~6k`kB)qSSGRZa!uD>S+q#oi+j>~u)5p@zZu)&i+D(#hTpU;7 zhydTu(4E^xd;cbO^sQ!RW(|d6Cl~+uCN^%`!3`H(#N2U{7%1k6B8b9}Y|&@j&=!9C zsSh)xbp$`Y`(Acrx^WyqI^pu*%PVQy)WQ1>-;=2$8YqUooi;b!>0A_X_sWe#O7Oa} z?xOOMH}@Awlvw{70^f(7J>}22ySw+k2OfOjA%F>!CbD$V(yspA-myq{@ZksN{HxaU zr#^FGL-Wuf_hqx$dK+P2(r8Y5_c46^yrWT}CKYQzJBIk?Y9sGs)EG;7P=po{5aB6< z92yC6bIiw_Bn>q~sZWh29UsGx+6E3C-NM%o-kVDg+LO*~p7Za1nomFcJR1ixq~n@G zzJreb)pY%T?7elI9o7BE{XS=AuC06ALxKcLaCf)T(n19))ZGOsv{a~jDW#>f6l;qV zw-8(+5aO?IVNhDTD(SR^gEk z2Itjatkyd`lpWjuVuwGgP6otIg7EOMK#bXOJm#+1%%5k^rzYvyf=&MA^^U z)|-_+MNpeg@ZG=M&COR|4+B{=4q5~P_!#iue|zx1?EasKLq2~h00$p*;6LIMV{1Qa z)^28V|A4`XM5qyqE|yZFR7j`-i%vFp5=TlLX>cS$YowH9i$y2}R=h{Q@h*TKo>dwJ zy0S&cSENNMXlI6Zq7p7RR;xb!o$-ETGBN%B^;0;W9l>P(cH+aQSBT$x{bp|wa}6FP)bt{VBVIk z+`M!dcdyvM3!4X6w7rLcVxFXQkWPpa0iILh#wQ-*&WGmk&XW${km@wM~aw2qFH@ zjoh#Pfl-OO@h>-xdhVHLCt9Zn!MIWEf5L%WanUJ+VVO*_g_KNLPP=2UELNIXI@*dj zxpwR!37ycI|H!C0V8$p4q)1TXHPBHrg_edXB)kmc>+AUbaR+eIJC4GYg41t)kS{zu zmrc1MxRPR!rK^7(Jwxjl%5PyH*J*;F2ym2fgb2Za1*;sFD*!-Q^%ViO#jvm8*nkSC zn<`Lu%(@dAM?2)pd4740idTIb`9e_pGT4RXR8h~H^`d4p>^VI$S+Xby$xstDb`D?uQ!uKoyQU@M%&<{7PU;lw^+qO2v zBcNPCY`OO-E`RVTez50m9Cz%YoP6w29I)3OjBRVCxu(`Sdl}7gl%anGIwUB0oVEX< z?0fwresIIzx$##wF}Qqv)r<;~$s|V|ee}?pRjY4WxoTx%%;>S3SFTvG(~|J!n{U4S zsH2X0Y0jKEw|(+spIQiP2SyMoC0>DeofbwU`4=h5TgSq`88? zph_i?X^Wv-xsF4^_4xKp_wdWBu7SP*>+==r@#7}WUcY|rZ~5O?bwKg`7hY8UlE)J#{+ukAr;sYZAS2utzHed}9Sap|QM z+vHRtNwHiakx0CA)tc2e=W{uQC#6m&A(^CR`Xr`I8^@(@KaQ!R+c@)z>sY^izzAY$ zjt(2(+I z%Ov>D?T^vc-ol4Zm_>KChdGN@vAM6niTmuvgdY+JCdA5SLm5>|57=_d{Kloo|0Ny?1pVLIT=zl z6Y;|mgQaf9WE_5S!hw8X->Lj|!7?tqV-EX|XySqyQ`x_x6-}O={2)>|)^JFpr9x;I zDU@MoX`7shYFeM#NkeUCEu899SXS9)i^_<>zTZ?b!Ho|sh?~7k);-pE%&70pk3hd7RA1~_3 zr=E;|zj^cK2QRwdJ&!*>f9`$z?Yqx;Teo&a%IX>=M0r~e%b$Ibd+vRhdmea%2VR)R zyp0>^EfjGx9;rlvhGZQHH%-z_kaQgslBQHWCmpaKGmo6X=3;?$i`E*?bp$~W(6x1I zkZ=>%3=9rjal-M(FIc>I@lLHBOQq5;dwP04o=hg)VzD?I_y{lp*MW{!CXY{Z-~@+q z80{(t6^1x6MPuu91Om@X;s}WpW{*iBEGtP_>0(JT>GH$79_B|^Tm$R3VhuFZ{xc7d z=f3T%Q=WL@iJt#~>Ypo5{#=4L*K*0*kL8Bh3%G0cJUZH%dD{WIQ}P3n35Orw{R~~* zgS_YX{TSO^PpDLE%A&OaL;5Nt<<;Z4wFpt9EuCOYeGQYE>Y3PBM^h?+@FahJViC{I zT~6!RHul(U96$Km9R76w^IUw=EcO`RLcUa>>}Nsb>B?^7lfSu{OpU{5PdkLoeL22- z-F>7}39h>EBdM;o8m6H;4e;(%2mQ`kG&V=@TFOBrnW;KEAh)Jo@OcU;i&xAzx&V8N2^x?V5G7 z03kdN_MF65KXy8&&DxV}Ax~Ypo!V5B2}Y5vxu~?biD_p`pN4B{Bd2fB;EEK~%GQ`g&_C&rt|UK0{l(*|=y0 z^B#JJd+)rT>umJrQ9FG!PrbAp z)n~eb<#IVOFgS498Q=nnoiM_N>Jl@wAa z?cBF!Ge3HE5gUdIY|iJb)UJB%Q*`IU!}tJ`j)NY^A-49K1H5wDRSw5tj3_I*)43f= zWdN?f?oW5!an~KOL|r~#q`j^2RV`)s{hidB+nZYtwxC^h0qS2c?a`R($*l11)K+89`He zG&RW<1cG9iCsYBhqp9;!jI2%a*V!+!d2JFY?yo#TH@?3Tw*~X9l`7Dn;w}j8W>u65eX9`)rWEnmZ&lPOR7Wu+` z&r^uHCql&C6k&r7ksWx!$5l|H6s|JGUCA%eH!xrfvr0aIxZvII{q_9$^B$-U{{L^T z<4!u6wX0Xr+ui?1tyKmPjA-H5w;#=w7oJKkS3*lcb7nM-@P^ILtDW=SaAT@Up)qQ+ z3ycVmgG<`2CFwPww4gSjIc8i3$4?r`<7>P4?vwLbKUCn5u^rSVprka8l4z-|BVULV zu64Q=RY84c(!bT!e>KQZR5}-0$B#Sie7PQdxgsC^`QI7H7ja$3IzAGA|C>nww2)K@ z92kYk#u{j>CFN_<+G2D=h0>a`QWQ!hbg^K}q-+wjdGn^rKk&heyB92&ziR~WpIHC6 z>(2Q1yY0Dm|BtW!{sLeGz=}I8a+heNzM4aq((Wv^Uh@j&3C=6cC-g){F;l^@^1`kx1wZFT8NCrArsB z1@d)u4Gawp@V@uGk3an351$c2d|GQQ2L=WziabFG`2yPqeX_*>tu$qfrAiel%2K&H8P;uyGrw?^Q=B2xApUEd^RCq>_Z8k9H(U*-RqYOs?3Alw0`i ziHGpj$LI3r`OCqJtb+w_N)gy{rj=CCH)Lf|9b?$yh!_y4g%zw(Dn5Ah4yWF;^PYV_ zumE86=&?+iFn*tP>(~Fv_xlYDDVgBJkG+FmUh-Z}yzF`&UAl&YcN@!RPdkJsUS7wH ziS7LK{iiXZqlJ7aq{f3kKRKWN!7PW&nnp)ml3dw3Vp`f$1gcFq8EO*shIS?$>NBIM zO^+a7?q#slM-XP|%lWL@)P?U#n$ij0x!XkEHgz0dYOdvrzrCG@7O&^PNuyY}zLQ7h zt|Xf;^8JsU!_m_w@WPr-{xN$lyX`)j4;?*|fqWUET!aomICzfa+W9N#EtQOPrk(w3 z5t@VF>dq5tD2Et0OojR>r66DSp>Gfda{$_L9P#_#|L$`aU;GiSz4n^_PxkF258TfQ zr<{8GoQEH73l-oxI8(>)jSEgBU-Svkq-2_eo3<@<9aqo8b@kuixVy@mA;QLJt#E8! z8lZ55q%kvsRHB~#d?(}T1lON^1b402z&9U%fk)SF;_@T+=eS9u5Uz&MxN#yplvV$W zD)*?0H{<-uD4?Rk`P!p-Gv2V*>o{no`OeJ`vZ-%?w3m#N=>Xr5Ne}~U^@d+Ku|?BXDDYz%s@v+2OaGl;t$td`<6LB-M7+V|KqE_AOHUBv(My? zJML-)c>B5MTyn=XZ7^A-*dzVdW6YSr`BqV31Am>-EOxwn36& zRRa=EPk^rssZO_?(3*>t+;n4zJ*;<3jZ5mVA8O`62&)vI6mu^h^=u@ANnW@)Pp z36ulM1u1Yv$WsfSV8Gp%gLj)izU&)iOJTIHeW|Gc|3Co0tx59o`pta!%3qUxei6d7 zXtkSgL(h>XELpx}HUHyl^5iM*>eXv07K`X|8A@gDp0}KHW=^9R`gRXkB}rV0xG%=&BOO&_S$W192~GM!GAG7e6{l=QY;G;PH&D-sw(F&9W^&i ze?dp>U2Rp)gfXv)Kcq5W8HsJAP{_Zdx3?!k8gStGC-I#xokwHFW9HNmJoM~RK78y< z(#Zrjf9X8iMe-;VeQFbur&ev@u4fj5(wsAE8p3foZll&~!Phxfb*(o*E+N>^)z7wUoL)Oe?WDil&uP=fanP6!e)Ga2 zzVh%395k|x&m261{YErX3<5M^MOQfv_7!%3aqLu;{5b9ssGZ{i1TnQy3rON{$1^YU z@PgIUCOtdr7Y2Zcr9nnQMQ=3v$0$QZSet@TO}49~2qKAOJ82R^7zJP*B6@~mW>H;T z-4iFCbmG>9FE4z{oS*Wodhp+IhcV_k^^}vi@upk8oy!$IP{`%qzVCiBPpYe{J5xBE zHFM^yzfYbtNz~TV#IArlL7wdJ0a3&M*6!$Xxx|tsOAjs-`kp-M$V2aYboLYR_w2s= z?&t6HQ#mw5I27{Y1|LB;${)g4gZSY9x%?mxFH4e1CJC&{l{L&n2~Axh!Mg2zy#K1} z=zi!0@I&hZgAhr1K)_&qPDaY(4QkL6it-}{+&7{Ns6Sv2zVr2W(~?S%E0#HV|LLsQ(9La6FD2!< zmg(S72z{FBQY_li&DU;tfWGcQ#*Odb%$d`T02LacvBBSTR8nr5x>Sqtnb$HFpAjO2 zFhEI2d-b%}k24C43CY@xy=)yA0HG*_0bf4nP=5cJxAWdJ59Pz}IGR&Vn8joL1LTzA z_UBe`$73(@zT@{})}+xUP)ksbImkUJxozoMw&aSHJFe_~6xv|6%08^_GLC;#<`+sE z!`ia%Q_dG*Q^gsxxvlN(|8MTm4_^GC`1gOj{sunw(T`j@dd#@Hip9dQk)>|U_z|3W z)IJ1(vZD=+BNIfv3emLIoMU>YW2e`{SJ{~ZpB4Bu>Y_%S#Hc^25C@0)bQ=yHgGHZO zPx95n_vPkuj|B(bcH4t||Ctw2Xwr^jEqrywq|K@o$|y_z$PU$_U35%g~a6lxMn1R9Y2MgAyXP z7*@WI?#;%pvTD_;JAU}XANIbL&QJHP9susW&&-A2{hs$Bgb1jj!X0?ff%iT4?6ax9 z-aehxISxJekj(Twc0a4HukQ=nws%b%?CWPJn>8(W5gQ1bV_zsbMvTQxfC>U?YwOEx zt!=jlVUW^VPpH0zxpU{l5jP%*Q7Y@*blJR zxRI266??`<5~~9RpHKht2G-s8n01*l!?FwB^X?=6`j;DDbkiQ&d%FMU6M*Y}_xsy` zuM5~$ham(Z+qd-4l`k?mQ)^m+7MUCh46j`K^yjwVH6%#LS`;CL@&Ho8#(^>e#ggq! zR_mAVylN0uH$6T_;uft1s%`71ii=eNHJ6GoR6upKAqcGTibYTd+6WOg_-D^!kCCnP4i#_(9K72IrcCPK`!_vAOGAct9=r!7Kg3J8-0}QU zzVyd?$QJ`}BwsxH2oed0LcVOSm%vu?#tWgLc8pP@jBU4_7;+Q6)lh}B)@EpFY-Dp^ zKN|)HcyVKaQ)e_#2ug$q4&Hq<$L=)|jYBCY^Q#4`IPZoBSUqmQTb@u0J<*^Te{I{57E(%4oos_LFyEBh}zx_zWEF_H#do8 z%N8&F;Kd)}x@&*`f4Vm>zv2?Excu8(ckS=_#jk%k{!iEc`JeOWzA)i;*Zw}Elyc%| zBoULQjA!zQRzl?)S!S^2Op?F`X(g1QzzL@!bYXZF;@!53 z6JrqUxhpKEBcjSmfmTM-BPA0Q3z|#*@(=^rES{G@MfAa8s=pN`*Ul28=#&-0jEsb3 zCK??B4Ze>q7R}xYE5Opo{#Zr#LxT!^gVD*Gu~NcIiuSfvZ&T-Hb|nD+AFLbya>FbB z>^HyuwGa4U+~ltK)|J_(pMB<9;B^gY)~sFks(*L>`R8-fO-7%+t)rcq+FDkxT4gf! zQO$@#i0<_u z**LE_@wnrc{`D_6K5@xqm+9b`tf~I14_YD29DCz7 zXlq1E$C{h$sAv`4V^zsF2eS*^^WEo=iShMz{);p+-t!41sFXtt7n+N`+OyWVpt< zc0zRMQj8 zzg6;)#PK1&I{4_kW8cwkdEy1o{i1Ud{2 zSW5`<#UgBp6J;@e{Dhk?`rrrpKl8~?{hw^aQ%^mWd+)uMyYIWl`Qm53F!Ic^P9OK; zf|s89)W<)$!_J8sOhVv!v`^|FlW+|Y#4+QRe6gQCEy$!=@SKE^UAAthaeH0r3JA^y zcljE@e`j5QVUJeqnB(f$APTLBq!$9M2}1bbjA`uK-o|I|dxGQtd^bNl{!mVyItCR6 zMow4@>n$MBG91=b(-EsdhjtVo(L!1yHy_&G>OcJGM?VS>2Y-O`&V9Qc(b4glI1dd1j{WF)Og&;h z^oA`2dCjBC8%R2e&hC)ASI^{&?>dj9Bhb<^a}|UL>e4Chcyb=U`qfRazSBG+A;joW zqc;o``i}&51^*pZDxI#R0e%Rj659sz2q}z6ime7CuCzuYg`^bb87OQgTN<#zUa_iw z$W#{6pvqsDmRJ?4zY?f`o-Cpi3|BuDX0AvgfyfsOrPK3lq7gS^ZTr!zU;gr!R{?zF zqaQz4D1%HuNDe=Gf0`Ro_<@ncmeQeE3^;Ap6pr3^3JAFCiI@4nPyfc>o_x`O4}Hb) z`%UB0cN|Sw3vd-$86AFvaZmJQg8Fp3(Mxy@JyoGhzzLM%W5*szrmhhLJg{Is|D3yk z)|$~Y*N&s3ZW`kn_hmxMG+tWY%ZGmXPX@dD*>BJB96fUi#XzBjV-)|jrq*+LYI85Q zE?#4(m=UN?RQ1;!5L^2Z`64(HJv0cLwT%o_{iDO`F8$?|+i-J+S~kgrs8>H?)ROgeYyy+01n+ zE6t4sJ-ad1!O#gk(3*rJ_{E*ia{q#rG}YChqH6u$U6ICs1^!Vk$L}pp=HsNkdP-r8 ziAq5L19`9pUwwUj&)jgs4SzcG%roCoXQ$j1K6buNJmI98(PPG5{=hx=-3mNBZQ9ho zJ@wSn6Mp+!qqp8+orFm*y zlIvcW#Fg*Am7?go8|xbOf9~nI-7{zI zx9j2Tuttm;QTdNBgiui~2Ug0zq62ItC5fAXLL#J#bW8wL8dmi58wWID+o}K33utGs zW^M2YUHt|~7y%KYVnv$jM>{U8*@P(O!Er0E6^7=kQlvuDr#l}4LRYE6;@ z_8d>C9GH2r7AO_q3Ps9ux%^$nvB$)b)`Td4a!5@o$*0dcgzsN;B8_!vloij>LZF4U z&PI_*Hj{KSC>^{y)hq&N2}Lm|F?GZ!E{lHu&E)J3))O_oy7l-37BaXN>_z00Jp*Qs!NdVV{ zRh`he9X*t@KKGh(;Nx%WGZh_(#>U3}bI*JGrvHmQc;`Rw;FBN!)Oq!Fb@xB{VuSwa=q*}Y>a znmX=u<;nqR$K^Z69>~=v9?WeES99^*PtxZX$s`g++r+AwT6KNX>9l6k!c4P_<6p!U zAS9J^xa+xP+&brF>e3!4Wh|Yw;>{rahqYd+FQc(km3jscxnf+k z#`AroQLU4J zdf~~8Zb*|YnOUqv5~`3)!r`w=*Rgy{KO`f0TUCXvFsHU&--QSj+A+)l(KCo%-w7Sf z=yVdP9dg+r*xqZC3+V3de&WU(Z=C&~+MU?OKg2OlLJ zd=(;qGp3DWY-2qixN|lq-S7~%op%zG8#83f{wu0YRmIVlIQY%%ARNkH`OOQjMN%jm&u^n~@{hacX1%PqIO z<<8Ds3BYTtv(G)J>yd{Z4tjffT^l|U0|Nv4=38&s$B|M`nmCd16DIuh;YS|1=Ak){ zZ5rtB{{`?V&}>_}k(C>|*nQjxE;#xC_L(%A$6s8{S%>XKf3}Q}3aK5G09Px5AmAH+ zx`Qo`JP!les4x@fo_pT2GxyxT|C?7`!8gBg`L2huvp}TP@J}hwo^lLkT}O?sh!iT& zggAH=+L9CqE$Jy1=^Dx#0U%XPH`A}Isv@wIv@LxpZF^Q4+uw~{)=E_FP;i8?Xq~n& zFuidbjA?_qI)o0F>!yrzp%w@knhOBO@xU|ljOIbYGb(-|eEw}maOfW67%UcWq-A1gf$L~Gb0z-t z(i(hEA(Ufy{@O^i+BpZJYY^R+LwgS3KrUqV#2=%!YR{aNTY!d_BJ_L;GF zZox}0{>S#+kACponr~eG&Dv2TMsL0M-g_gmsQ^TxCdKIer*YQ1Pv)!>_Ge0K6QJ<} ziRaXlb{j|~YLLnRkVB*J4_eb$GnSOwfG4+b@%|}JojQu&zqFi>J@^c#Oc}#5quY@5 z(A76cCfQ6wrVXu)QB9~r99wNyq;spLP*EN%c2*LLSG50grGCmm-p<4A-o zFJF5<19_jCglqi|T(tHP+OfdfH|o)$hqX6^GS@szk+T%U-8UmLRS_|Y?oQD!L#_n5 zeDqn+x7>2eY3H1C4!7Ta`&;VlbasW0ov#y4I+1_gdDr6Rrk3NgLxbaAF+I|n-o8G) zX6@QTfKNJ7e$I8hgMz@F74 zFW}cdzZtb+L;PtRIeOGX&p-F<(dV3VF2DWNuXjC^S6LmcEg$Lb?imR{LoJMK<&)dK~wZrZ(+y!oGXcIWWlL)$5GBwrktJ%Hg8pX7b5X52ECU)}%L#lO#_{ zZeF~GyO(c{$rr-{hP2h$x-O)$ph*b~WD%RTn#8LnjY=iZ0&*KR!}_h!wHB`a=?~w1 z```cZZ&POysU)BH>g9>MZ@>NT-Cf(S>Fe){13w9msfX{)M=p6kmwx#IPM9^7jO(F; z6iKI*hV%$(lg+qJ0#s;_{Z<-R+BUw{3eQQAPBamOE(yoysBtaq)!NKs8@jk<#aem` z0plA})H)>wiUWiw5;BP+y~sz^+&O6_Y%Aj=E1slxfD2e8zSZ3q!l;(^Ww#LOGD0}< zbI@8EprO@{h>-UJ!{8{YkP$T*PMtD_`P+K<{k-KIG`gK}4YibYU;(zn`T8Lemyo3A z&^3_bOMkeRbz6JLBoamtS_`{Z93sJLU4^|dJbkf4vMnkdBb%`6NG@0@Pys?2+)3OC zC>9Z|jnG(c{#z-MT9XbVDPTp<&>(7K7xWAO=n3P-$^L@`RjmFNq z-hTcg^In|y36PFJ!^mb+^;t>LO6S=p@cqh`EBiE07|Y2=9)MOMD%6xhzv3rtN&Q~J zV{=z8AHM1uaxW}G24U2!zB@ZKbS9vdEnB+lfxO15uc`Y;-$1`j0BUHPHh~YFav+Z5 zTJ3K0sC1+t8*O`GRLit51h=_cd$?=m2IIFb%uE`gDzm{?v=J-Gfv~e_oh`ufjTIDe zlq6JrzlaW?&g~`v04SEAwFyyE2OBm+-w?yhsrQ=(Cmlq`aWnbk$w%;sgLdcbyN%XJ!DW>O?v$GVyc!cfPp z{-)Z|q(qIuM8twcHVu+hv@>ZaX(G~TH#|K{3slsklAOBVKFpjtiP}sC?Lu39hA*9a zBo`jHpY7UM;EOQToFfI@g#urnJ)c|N zphvdi7mMf(TcQqt9y@ll^QS-j=~M6j&mwiVxpu#Nug?==Oq+4tKM8dfIH>N#1 z%1^)2G(Zy?;+u3B%x@!K9zfz)GMtPj_}XG*OhRor`&PA22tio|WSj)YO&G!at$qCJ zg+-h=c`T!AQ}{vjxsjH-sABqau^jTv8y;Zcx^1L9*Wx+MYlhJ!TgqU>eArn6psGKY zXe0GYMd4B?WBrYeTvZH%NEGtukuA{B0D+HCkkaPM1xkei{n;!mUvECMAkH}B^vf15 zeEIRW;@P=t1n?T`z*z@z?H{k%IC=6!RfkR+w#6TiBN-lrBpp^O63=^D;B8uzAEX=cp|A;XGYs*nh&Slr!*ADW6)DCc#l zt_f{|qXvW{jbKwbG(sX#@*zb<93|2LkiuXEq8BRpuxT5*x!zdTMn{>OL?1U34w=q7 z_L{`k58Z>tM4Ce2$9AbL=^CcC)gu*Ly!RAB4QmJbS-7pAhc|5HuI1~w`T6B|nG^?& zZRXU8V>xVGJ7XF$=0_KOLg~;ou!erOo4Q03sdOElmx3U)Aaer}R2I`Hg^W7_T33AB zwFci;NU1qv-vc;xzrEQ&21rD?4_}0 z6g7!P+bJ<(16r6)S7fg%;;~M37r?Zsib0OSVwctUe}V&=9y={ z}$W<;(ow`&Z)^io`%W&!xGkj@o3JzA#tS?lzUYMuT)Lok+x@a)E{w+XrG# zc`fwt1L)Np)r1XVgy>K}!Zo~fWs`zPctuokmvz+A-r+?zZ-H^6VaO%`HMMZ!{v>Da z&LQmGvlBjTyoDJ;(*E&^7q=pcS z$fn}rrnN#yVG;y9azQ^^2iFm(g1OI1g4DPgLdt-PmOiy^lBYYj@z)nu8=Qc$9T+8I zxmb;WO+D5_LB}&)9jK~=$^OlTE~Mk4@&y2$Oee%uSAFlVpa1-4`SFi``lj~UcfR*s zKK7B1?U6_(9#a}G9wfKcalpGz=0~4;2jg2B8OZhHx*1w)#*;}k5~>gffmSkZv%hXB zUu}5)A_Of15?-1y4ZG1-+|EF*lgSM!?l|{&Zg^=GpMKz3PMJD}_wKbDNw-9Ib~QP# znZ|SnuA8=1xCedGB3M^6~qg<_~8cMvapp2+K&};7Wn(N`Cv#=ehl<#blBR3^K)5_^&(a zS4IMkj)Z%J0UIh}v#av{K=f5On5c`@pH@|3A7RFB}JU8_z`-pTmzob_N5vJW?2xyA;A8{)Hy+H3bpkhh`!ul_nd8 zoO;uPY|j-DQrecGif5@i2LY5em;v~b})s(Q{KP^yp%qkqS-!g8(T%J;F9?Y?% zdypqLZe`{6AvPBBw5QX|8rj03V_MjEWGn6I1bz@wRtn)HNP4x@IQ6958l;=BYII@T z*{HN$H7*V%U1Hnd3d%tqMR%F;5_$4%o+GL8lq@X5c9HsJs zarVQiTnS|=Hb)4GWyM#nxrLQ?KW17=pxfKp#gRuGarn!NUhWg6G1_=`dpo zUpjt2KDpm+6ns;?ML#C$E*RBYX>|>-EoNdz$*8ql4i$c=2sP9vJtj5RbIiCAoIHIL zr%oEp$V`S6eSO@xbR9Rnyq1@H`e?05Gpa5_ohQhba}1OR$d~&mm5l+4bkjJ}H3xKL za3myw^4U7HnsS(bg;%?kVM0m;3et|?x`nIx=aNozqRNt0%ZPXl`7&aCpY7O~gF9}c z_h(`AwwUS{U5isH$6=|iuI}`no}TS*W`B*FFkbZb_OWs8nzf};d3==mi9IIrkpR`v;N5f=1nXs;S7KLw>AZ0`aeFHpwlSo#Kj$Cbmqm&*s$p(^MJ-Ol# z8876d$zz$?P{S|gE#vVG+c;+Y2x`3)gQWoqK|dkXHJY3f`36qtg*3zkT%i?=cNi=qb0f=mY6~bZyG(u}!1fJs%YDK72{rJ()(r7@X3Q|gw)(XE=Cc9}XYSl(S>tr$|wr$z+jf>uY(boC%=f5S-&s`&c z*SYrCd#~+UIxJrFvH-z`Idi%1#Ra_ku%mIXn@UNFeu*&f(ZWLtO<*R?C>`QRjT5>! z35UNwHJ2yudj|SV`%*|Ddi#3M`s+=9UAF6Pzy9^&i}PBFW#68#k`WWevftE+jHyep zN7Hyht>`P{*;?>f)thC}wq9;p_#A_Q;%&Q);iCua&YmreJhOQ#lmkR6Wh6`0s|5L- zwjJ$^QDdlSjx-g5h&%;J+z*3 zP{JW;s&yHdcE8XTL9WsETGtO2xpmQcLNCBk4xuneO<`$Ys1SF{097u()1E26PZ2!m!f(vzsel zDiUt%i#6LPO`4QD{P2T|*Is+=TlW0i)d6^&Yw@DRJ-KYIM=5Ui}9Ko_^W1pAd{6H-7myzxjtFqSgNKL8KNbPhr8)kzBe>}JeMrd!o-}f#P3bff8)`UsR12p~9mD(fp30QQ z2JTqCmfydyoQ}F0?pd{g&TP&A`J(x}P*tR9@ybIms!jxeMOnKNx_S*ycumE-hc#dg@Jtr}G?}_~Iq(ez1L}lI@8K5955~frvO5?*gE|j9mvr2(Y zRwW_UvRDD-&?n`!Qj=(8d}E4JCXVEt`%GYZLmdmZ^>f>j^~~=Ypd19$cpf#LhbIMv zAWN>$PuA~4DWAbY4>^Cp>e1_pvzrA`iD(QUG)dv|%lXTgvvxB`4{gU4=AIhbnb(&` z_vNj8ETA+MQk#N}TcK|dkfN=vc>qC|@B59>?Ho0F%@?NhgwgarO&@p<>?=t$5PK*Clf09!h=z$4%l% z7bzTslnmszFjVS7NNGDMBDV3Z7-NXxV7yorP{&S%v8A<@aum@X5E5U7%xG@{Df!+* zFYx#iOYnVdM3AD9gx1CkD7Nw5c?TdiBveQ`(DZlr5iVP0*aAYZeS6R4^XJdMw|23>Ln-@ zqph9woXm$l^O-NK`@jb-+I6E}=lZ~f7mXM*X7t(7X_RPf=CE12p|pe2AxdjP4dpN- z9|ZIjOY{{=1X^?E)KT1i-f^5iVyjtR@I>Y#bGTN#<`CFIFT^DHAlk2 z6$UZvM4AAqGFuHRVm|<+5-@cF&d3(tbI4wdZ%9{L0@!(~j+2Sl*WLaaQLs#V7W=ER zVc1F_Yg2_A5hQbfYOQdzLvu|BEt%0YW~Pu#j-$mJ#nBTd@tvb)@vD;$a;F2Hj@iXy$aE#&>d9n5H|U1p+S5t4Bo=5OoaFAGER0xK2LA4 zNQ0X~;!rGS=^9u`*U&}^ewLwP7ej@umhW#8O(R-mrFT`->eo>N-XPK&&c;y$iMcU z%9#JJ9Rb@0%-;pdex@S|tillvB|o6t-HXVTKtN3wmQQwHvEb6 zhjAkjEwxPAb3EtoHkOhKk!tv1SNW20)n%+yl@)l20)A+}w9OZ6_dr=e6)kL#au6CC zYDVFR6k3P4LXz}q$z(=QpP4{yW+H9%93R+wB4)vSnA5%EdJxL`_|7*Sp^H-i2>uPd)bdY<@r@~dcH#kyZK~z%w>`$oJ-yT?lkp|x{T{l8*3p;iv{Nr>X7H#AgGHNt zg|%xoVME59ol3~3qO55va4n)&4b8Jpxcud@`TYDJ&r;`lxNgMNf8+PXB(wSz-)g)E zG)>7g35dn3!dT+l02^fxnx9)P!InPT$TLYngzt^UFu80F-Q9~W`+%gF&o7<*=BVB&9vR8vwG#qeYM$Rnjqw_x7^K|?)4-RDSYMIOxYaljuy5{t8k>GR4Q`C z4R^uH^;YX&kVquNGtWGoIr`{h+1$B)*NuJyYkP0Em(Ar&mgTzaeaPO7ZLULw5re-1 zQj*Fs^Yc)mkvO3yM4}bs^T7_out*5!^_6MEsuitKN!LUG*EJupLIJUG4TQ?<2{1t} z2xC(+YSJ*O2|c=%&mA;_hE$RusBpEb;~%!Ov|~5fXyaJ!ymIW9jH{#A#0AHi$4F2i z3Acv2REwcQ3M0!aH3&i^63iM1^IZ&i#ph#FvmDE+QBZNU|7vthy zfA_oJdqfDKrca+f1e)HS-j{yy)1N;1u}^*aH6P)jhaT>odg|#NhaYytde?FF0}tJQ zkU;I>mxCrt-xGCX+xg7L&t+6=+VJ_6scNMo7|L&F+rV0s6bS89(M|0$(z433_dnxg zr>m@Rl~R^|=ODFX6ze1eB2QThlEUGehtJ?+2kpVxx6Nku+HKT$uAwI)QM!y0f$dHh z`kvW$VccOdiE3z0zED@3Er~{9kt!x=B~UoAb+gt2rCn-LlKY-p#_#TW9wh@ivX@mU z#2dT`(Y}skh3#ia3Qc1sO|nYoK<=;$L7{>GJPF%+pj@o{U8t*6E(N|Slh0-=j2*2R zKWRc<2odZ`0RD&8@}&l!H)+zOm!ln6nzxD{-El98h@KLmy=?2%n576@*Wqu^z0Au` zz64$UQSr~a-}An&0X+8Dqq}bK>s(*^>X!kSK7F@mqCvPA-OAZV>_x(H<2h_x^=d2? zQzJ!SI+~8c5dob;d7jv^4IvZ5+K^hj{=@neMP16XDuYhkO3>ZCh}E5hhTM!Ul^|4= zu0dNfw6!p6pQ)TSaTM87+2EOkLO3RvXrW?x;;0K=d5;1WTD(AHDO?R*&{Z+ip50mm zNFiyh8;j$3XrV1l&Ak7px>5)NX*vo?nWnX79AldHprdXY38$5oWG(x&w=li6(bBI} z)ySe^p{i6!MhKqV(9IuST82niE&sUXYs7(MDWG9{-aZ3%VsUH1UfDuCMrm$p0AT9W zsbbl(W&66W$Ki(`xe4GmzxesE$1`Tk7ywQ^_0(oBkvyQkzrTF%y?1YY@~J1r1!178 zyE)W&(9y*47oWj#`%R)0C|sc}OGJZm(fAA&wy|wsIi;XzN9QK!D_bj6Y?c2L%xfLD z+~Y9=kE0xXNSN2fS!p_~zm$E91 zXhFhpd9t$$zZ_albXA0mBj)QlgQ}vemWYIB_JCs(01F7!E7v1Bd%+Wi`e^~6I4*i@ zJB)1Rll$$4Qod=OMwF`R_PwnpvHu;lL8F6vcvm3$J0mk&ZLDLAjvSin$C37GE7i47 zR(MAtaIIO3@fR{iN{UeX2rWo?b+puurM-SSuG@egnpv@`YR~E_u^=e~*&yKObC=@# z678s0c&-ZtjXg!&a$qWIb_o8lJ%gwSCV`qUV}=8;a^*@5Fm3nUfBDs~d}Y`nz1#Gu z0BqW{iLqnHUh~*vkNr&wo?o(LQFQxOb99YNBOmhL8y!XaNCV$0A<26LT+gb3kP+T>NqnBK{JTfdhTCFTnioA0BRF$ zAuU)?Vn}xe=i*3>a2&3^?*)E#`_o9F@LUJ9z(M|NR)pC3JsNfk<78D(n@W;!BuX2U zLX=`FT{WoC0!k$_N*l;W=4-b4SCs_7;v4*dEMjZ7899L(J!&+c`uHaw{qRRW{FXmU zchLaf;QI2Hzs$^;GkXs^;_&iQPdu3b7<_IK*FF3gm%Q_IgcNq8MDsC;bTo4ot>J|y zUqTM$P@t3Plt^bXH`CLjue(;2^7Q5&e62vZRaR*`1pZemP$Da^NaaUpLtk^GY5zN7_)BPwUbq};Q;4!( z0US1DpuL`br;XvjQ7vSB-_oc;8}Ko5!eIU^LS>7JDUYa9EQ=*fb;RQ~Xl!lU^9n_% zH0^a`sZX|`l{MyxX7IMH5$Osa5Y}BL*C2EJtlwIShD5_h{5%N8Hzym{3^H{dGw@<8oG{5@Q z&pvvaz=~xn*=PT~uUxWd@dce*IwyxgSoL%@G}dz18HaM(X-BZ< z)G;*Fr6?niQqz=_bfh~N^ou;RaT9YkY~_g29qiH8K;94VwL;<$>M}jKt>nu6wAM`| z<<=60=6S}?Dl)Q(@gvG43va4^v-5f3fC!MKHynBH8=uTMFM z_ucaZ14YGE$L!5OzJwBrP`gNr5sCc+c1!}|y=Rk31VTx)2u!A^ZCl^*aHZxaw>`tX z&o3kC$zl6c*?aI>sgKaQ$_ct+&n1OMso~6knpA?6=f-N05%Cfo$*^f0B&Y&T5E6P4 zv8kdVVdl2P{C}iG2YGZ~A7X27eAD;ZYp(-0cW&l)zx~~=1mJ&dU48Y{ocFGGa_h~v z?B__iI8;iLD~j81yN~ysa0m?v7hizX0YXTW(jhK{zB1e_#5r@NE9co>8-RXRuQl_Ut-CY?FdH>J1Ae#seQHJ zFXBuiE=ddsN*V?LSi9h8B!oF^URZ3cY@?oZ2eh{Gwi#1Vl#OddXe?|M!c=IHrn{5~ zCD2l{qa&)hj3}VkYqNU#(LowXpElKW(2#CNh01{NB7oXXRNo>YD{?V98qptJu~Jo9Bk@r9BwdFMgJpj7{1Vfw))Ji1jxUUDveb%(zLFW$sLFUn+3ON9 zv>rsL(R~B4AkuAr`^P$fPrh)KgCIP5)-nFLaTEB(FMh`7KmXapKmKt?b1I$Q^3wc; zfTLrIn$W`OXy&AMpU8(VJehqbbP)PJML#ej6%>w;)TKw#kRHKEr5RDz%F6C_+`W1W zkF43u8M}{TY^H`{Xml5}3@HT#I(wJXR6Byk^hi^QDrMN0HW3vv0`a9V>W6Qv4IUW= znePjb!lSRSm3%&DgMWyKj(DMs{IyaPghNZp+bp<_UHj>IA0$A5pCJDyoiG9fKvp%U0tEYu@jd)g7D z@YS-s+U(n?%alx~NhdvY7$RP!br&VS6w8D{L#d4J9UT5o1Iu`@iLf5X8;fZ}*VVPP zwc>#XADH*8Z+(kPFTHfv2;hHl-FovaoPYj#`LW~2ZH_**>z-T0qw^QzNC$yME-OWS zO_F=(FJbQE3m{vHlFVT2xCzezTzTb{yKd;~T&JCO3IKcWv(L){X=oOX;QVusqa~9e z^h30;CO@!4@Yiw0tx&kQEbi%N!%*G?X!-Agvm#!y0#715$M^!o=tq5l zDd=eAz&*!v+QgBF&_yc4(^pzp$s5MOdwr+^hw*Nt? zfQ;Knb9$`F4@`A!$gDWv>x?@tK)3IABaW*T1-uU%a%O)dPcgjv^^Nq!uWl>CJ6q zQ~y#*LCyjKEAw(~6C17Hc<>(|$38l505PQ*ChX%YP#pR!VvLd6ZI zAHj>=+xhdtHDo;7VY11dmX%;g)ksH(>HrRbaIBt$1NeAJLAFrjTYr6=TOVIaCXv92 z`~m(0pE9&*uBnLopGlHTr*@bN?ChH*It;+~4L+x50EUKZLs89I8YD-$m>^6Zj zkKTuTF|gH8_zFyMb&K2}oHfExJiDofVmUAYN$Y>(L}K{pKsspGsm$w9!>&iP)kA9w zI`SQFt!G4gBgIftpMXpzMWGZ>RvKRmq}4zd@f=hV3#^DLT>)KrzY>8`QJ^u56Qu*v zZY?bh6OcG2C{$9Ho#y}+Z65L1l@6_?t)_cu4aM>xQaTn_Q5m)#C}=()70_rz4eB5zUD7&kI|&^S5Q|afHixyN_k>jz$JbKB1EMewJ+m ztEfx1P+!wV!l^}tWiz4H;!OpAT~(1wprnfQWH-h4OzWthUFBDyT@b!??b8Hdh$|)E zJ9ZYIe`p@*gy5nXQ|K<1ETbSq2^n9Vs#pk`BwGk0mLna6Htv+^RFbt@`uM>ub9i}u zHw~GT9gS(5@VxmX=auHg0zc!CNF@#3_FufX(i&ANS^+Exo4Vr9eT)#0fC`P*M6rnO z?2a%3x~8U9ELpPn;-{Z}`oG4bWtS4*zp)1T`yUI#@LZq+t=Z7m&+#W7!l>p(l+x6v zQrtIx8Na#VE?BcMQU?+5|G)>&n>Y7`rB_^W1&=-U*sdG-2G&c97N1!z7T>0|f&3o# z?h|?E$%hzo9oy<8nq5a~eUWW#RfsDG0pELO5q-s?Y1i+x{r!51e*MbRNeV zXk}6Qs!E%k7zI7N^QkM002C>wmX7Ahcp?cxp@c>ViHxX;J9+;i;&zFOr-c^KJG7ph z-;ETm6}{3i;8kF{>{>zEkvy}xm+w5bkdmX3+NnTfg{jJfQjFYQ#0dk#)z%p4-%t~3 zO{l6I8kHTZEM5&c0|MN-ZOaG3Fx>L|?;fS8xs75W&z^hkx$T)}pFPv}{pMKDIg^Hc zcjx0@zJTw3;tZyYX+wt!Uj?8{5~GwN?bb80VG5aKqfMTS_^@%7Gju!S=PaN) z8IchjFv5K9zyI7amURzu=%`lGu18rIdT=q!k}vfkw9#2Gx72_w-;hgSC8Sy49c<67 zr4$ybTDnyZjdo1nAkhSNPekZ=L9OR<^tg7u`q)c!q*KgjZK4?ZR=u=JzF3Hu@+t&4 zDnv;Kp+gj!nq-0{8@6-BpC4x3wgJ+fG1ZbPL`lzRq*U!OZGSIbB?;0o#kTVEwf&51 zCCO)8R3?R|!IJ`Mjk1IV^G01ir44g2^nHqjoKfrSAA;rUhXsFA5<4)m4aT;^)^1p^ z3Wl-(qOq~z?n^Jd^mh+D@Id*$;-`LBVo<4+|h+WX$5F4rL)QI)n zbR{3qo&%n=ZBhvhHL(9QnA}cg^hl1`Ya*Z9cPdjGYsiNoJ;f4R2a2p1$g-rnm!CYp z2nU$a-pm1`+t{nQf%=ru|5s&=BMjwKRSV7thB@;|GdOb3vE+&&Wk0YpY?r_-BbA^b(@I<2B$SkB6?Hq5 zF{Tlr!7jK89RN}jBFK2PB|Epb3n<0W`z z=|--&aSr*SPdZ_=5+vr{8BKvVSNTVutC-lMAz$N>txJ*dE!Z>+5&uF?pj$L%;vav1kma3SG}UByY0X9!E?r|>-|Xjh=FFLo09^h3@9w&JZ(!a3 zz};-!(tFynm8;^0`}7kJ;;4Og!`C_%Cyg4G!cyn7ig@!DaD^i6IQ(P9x=0Yu1~By| z+mjIwU&b}J%`z&IwWFHh$bAs|?Z*Cx?#a*3ID+3CwLjzPGYpgh0-z<8Vc(IBynD|{ zeD|pR`RiFn@RQ>YWY(xwHudMZb@^IuS+<#H*LSf#J4nCpqqN484pNF(emDOAD98$p z<49T?Cz6mELggcHtecuN)JO~Jiz$P)+SaIHC$SKcTzQcG>?T`@8KuG4 zl2Y);g=<)_aXSdt%#`@sZnA6|4eGKL&Ky3o&fa#q4{*$=zviESrjPc}(fenH-;Sd3d(4#ps zj@G(K<_?BoOo!A$;AnxXJX~eKaY)PX(Z;4$3Qb4t1Tx7XnYWV9 z%zlBz-2=F;gDYHw@W}c7Z0lV{Z*CJoY*HgFwj-izvxPR2w)r;y59$R|QTe_iSv=rQg*YkzXeDZ6Ba8u7h_RK9k?x|2R)R{2Y4y764sW zTPKz+UpDKMQ%)(aTD5A|4Sbzz)~s2gv$GQfPiC`2=G^LN>(NJC{)CigcZ#(Mm>>)geKvo$#~6_ zv|vmPoHThPIbZX$=a;dvcYv9r+GtKX6ho6>75zc-<$eMckZ{sS$3<#MXr+{mdmr)I#3EvYm!>yX``+wbOnnN<@HEGUv7|~?3=y#@~X%~Le$kY{C@G`Mej)@ zQr|3>OQv%;VU%G5EL~^x0zl8$YmffF-gNWl&OiTr7A;!zUvswZ>Hz#3>$~4IRs8g6 z(@$|->%10*+^Oh73=Ve5opM<2j?3u{LPsh z8pM9&Mi$Yda6PC^z&=wLci?pXdcm>0fA5LZC_ym{aWqDXRj62|G&-D>)~HYsgdrtA zq*M+NLQ$V~m{?!OeyzZJ#6k> z%+{f`l!IPe;ed2e(gM4{wBLn95r9<$jAY=okQ7ypt$i!dDzFHD8Jn+2Ef7i&N`p49 zO}K0r$nk}TUNST?X`BaR8knUm)aOEKi&eS?uU4hlHnT=U-beHp0AMneV%qMz)d0Az z>_*BIafN3og(}uvKnq;QK?$GjgXve@j9-!@t>?*(+NHO_GFi0;lhR2FI>2AXxCkPgL6PrX|)+-yM{@l_~ylD zpnW6g6KO9=A#Dp(*qNa{z$3t%l=PGX?q0pw98^+Ru^o&!kdklYqR^3fP^e;RxtWt& zTi}t+oP5+wesuZ)q(qXO?;~7`ND{(SIF{QUYPCaZUg=IKtHLL2(25TGw3MV$nh}{M ziYg%Q`*at}Z0arHx*qLy2{NurO1LN;kj-x;U)+u>)6`{}sqva|Ws->0r*s)9TpJjy zbh7jaRf(>FRR|fxI`Jy9Keqo;N`a%n6Ow$W_}s%Uku45_o3w|y6I<6J1)i^H9|};? z^1xp$0~5mNy4Xl2dj?VYoDCdm`LZQTuWoK_S>4yu*Az+BiOFNw^OVE*M5c%9 z&OVIa&Rxxg|9par_MOD1W=^yN2^Ep4aPYos>SLDEf|1QXMS&y{=W z9o$5qEO=FkIJiq`#yYWvKcKX-dIJ$WU`N$IbJeaks(F$Gp45Enh#9=|&ZpS7qk+kd z4U_^!r~_QB@e&>{ukYhKe|?Zmy#;E$1R=h8{qW6&l#0q<#PyHR2O3SJyv;5O}Ujp=yMt*KCQilRall z>lM|iV!IN6T`O9@yY_c{?JHm1?}tDBapeyuj^v?d7eap)d>;^^p}tnn*mKYPlTSah z>!!WIHKJqWTmcD%;ecQGp|jX~@<@iVMLXZqNU39klwlQ*ML=sHiR76rJ*?k0012nk zDy*(J-bf3;_R1s0JkxSD+V9Csf)BjySU!LF9w;F12PUXkK$aF*(Gp>2v7#bJOcggD zgWo2urRi!&GKyB-a0JStWHI$Az;>fG>*}|l#4==}$f=xCfuU!j(P zVke(DU<$KFH*(42FY^4R?R@>veb|3=69Jk)30zXBFkm3q&OoV$q)3r)Gav+hP@o(Z z49i3q5T&qsBSI=8^s{4WYz@goRgkSDG!>r=qu?kA@lj>Tq^3r`c);#_W%hh-IQ7+-fG)g#@TcCL}9J!dLTLoX$*7BiLEVF%Z02TNk9Yn$; z`0*G@RKJGJ$*r_UzFekIE*W*so*_Fr0u6pgd;2{?h!TM3Rg@TY=k|zZs%z`&#NwBi zw(POj?qbQJrTV|^Y~3{i_&3&--?|EbTW-7cF5kDzkfu8H*byef?$0Aav#E=v@{>L3 z5Q5sgA`xnoH1qY>46#BO#JUhrF2lBXD=>c4xakWQFM4;WR50Q&?ah4o$`5kMdrrX9 zf^5+TD}*d6!mu>gj-{o3qG_>fRpGQ#oqWkRbvzD(ktk{RT}VT^owl0E^!cz)TRk_O zaX1HzY~zD>J;hI+U51p9aLq`_%)A|h(v(zzp;8~&VlSmIPpq9QlzC@5wD1ZU>+cIu zVGu-0d%F5diI^H1fiblRQPPe&q@br*;N0EEGpV7TYZk1cIg=q@_W8*_p5<3}&!-p! zWLyyuERmQd*qaOg!xMq%S1ASAT#lZ>K~zwLMQgxU=!Ex5_06gdOf&)jK{lT=oPGqX z-wc5vnl?8yxyx28|7rAnVfAaR>5N}4nMz)@-+>3n|Hk0ID*^a7*JYP}1Aw(_){G$v zDN`mygCxl2;t!;QGa!U0U;M!j?YePqY+VfEWDR5*Yx(Mz-ouE-dT=1+IHX*cS}#Fu zGC@ruK|)F#p+I{kNGapU<^Wr>Ip%HL7E9G&4?(RWcehv3{H-=SuU7Pn19w#yAqe>S zi3jt}J;xJ-K`f2y6UG5e3uD8IuF^8sSV>-D+LHieY`!8aSjwWB9UZqwRjgoR!?QMB z5#RU8cr~=vj9^?tJCj=)*r&aY5w#xug&gy@Y-f2_j_tWJS_YKDL3*-l>FilV_rMzZ za+~STb(&F!*2Yd5ZDdq!>t9GksG-)AtQ#8OtFz}BUcIC$L9^0rIJg01ioWG(i=863 zcf9|h1mQ^N9)iJqoG!e)bV;JWudfc!NXd79^I1N0`hjTe8)G8-{SFpfh^DoE0uAYr zKww4^NF%jONaV0rLEgWK0A@b@Xc@-*dyVP*WD*TDr8+2tkn|*%96p1qPoBl^=B?zS zJD(xvD-u#vfR)mi>PTrLtPru)u-2L|x_?!jBWbH(U6oA692rY_(K-_IF{V&LX(SGk z&^lO}IsA|x@QGQw@l0ngcfY)v&tLNp_bph3kRd`kR&g^ld4$nF{nzF`uiZ~Gb9*cC z+uPSq?_icdD0pr;^bHsv4Lhc)_E%Iw3>zjm3JQLaY%z~?UFaS}Y>V~$#bsaonhS90 zH!cAnj|PBX*xQed*HW%Qa}B zo9dyt2BEY8?&J%xcgEQ9(X?j6O5{_q0UieETA-DDDhmyyv{yW4Hm(zs#7A({8!T>k1SAk z9-E8_inNnoE&1LF`*QZ4qv^{PD-LkBQdg12y#*&3N%hM7QfMmI5wo>yRcGmTN=Kdo zrt=_`G;MgT4XRox3rY-Ws2N3T{UoF|NkX7P%3+?SaxY_Q3lw#Z&cQreizPPXa3CUow)3o(v!XBw1!m9K|Gka;=aPb`I&nqta=hNg00VEP-5&hfFY%%784j zCJ-7|d$iV$r#9IZUsvSRXT~^@Yu^q4KVF@S|Eik;0opZzH_}BA5mrJXR6r;ka=y>$ zQ%AGMyX*PTJx_D~-{$bslMiHabB4f|D6KH>LdAQ?+;sD+6cA`@m{f(fk2El}HIgz7 zf~Y-SVPlAhZfH9I2BfLtgwqj%(Y3WqYpCU8e|wzKc|p?i5K7s9q7cfAbrc|#fPcZo zr^*N@a+j#+WSfK~Une~Q}8Qa0uZJR2eYav7~m;LFIB}*QhK7BgNmMzm)lD>VevgI=ReD_Qxxcdy+zXW9e?vgMdrAnc(Q{}iovFdD25 zE)^HO9qmplRep3(MwkGJ(m|D2nn9x1rkZK49}AJXo&Z-0Tv<;|qLx4f1Yw@~vAV_)2;0_!YrIqPIAdL-yuF&C>FzRvzKjibX=drP;h)6gU)1^o@*2*J` zf{$Ac2_5hPL)j99n0|->rYV#KauPEQlm~3w3Y`_-cF&VEwKgzvR6Ae&_J=t5uo(>Y zWRVg=Wdf5TH19(zlIc3?YDS=yZ-t>`RSQSGrV^xhBMLS`Ae1$T5{A<+ZAZaHFjVYA zNsViNQ%us(&{6kx6)T59YXK&QhLRuo7LLM(YwzAW*Ma!~g5_NNbC* zhzxh4rx7Z8h6czMau%5D8g%daZRVS66Oc-qq&QHq-%6Ayn+}!06_R{8PcD~3BvR;A z>mXME&<*vCV(W&^F_R}xW%cTnm7-q_&swCE*%MDZan9X$-~C@3{C6b)|K>X8xZ^H< z?wM!y$mjEjL;~I1VAWcU5Q;G?5vWiVumAJ)U)y!ZUiV~581$D3{xc7lF0S~&#|iR9 zJV#g%y&~;-)VK*+(=fHAj>B~;F#!l@^jsi#J@(U2<9l-kZfvBz{AG_fOJsO_vcdL3aX zeM&$=NPhaH_iat6! zgtKZb<0p+|zXNw?+CGyRKemH06GqV9(M&1fFnh%&GM->+b1luu48YG}B8A65xsReh6c_Q4wL#Gjs84wO_>@`v z^7-X_@&3828!YmO*mwd z4dlu_CNK&~h&0T55ySrM?{%ym*PIai_NBG_`K2`o&oz#Nii&5vvY!Pdpyb;zdu7~V zzKpYBh(YRy0ThZpg;3F4pXTsA#&Y@5&Qf29MYNaBYfp-^0U@Lr5>%<$C*=8`X$x%}`M3Arl_&Z+Ph!G9^ zMJUYN-BFSFj?r0{S{l815rT5@b&1`Z8~EV~2Xg42?lI5Cao%{<@@koiG6(GyNAAPE z9WC@)+0f`viUeY!sw=J!hoQ8o3i`Z)(gebS=VctAD)Vvd+%^QIQ97WtVLX{+GbrD{ z0fbvMt_Wkv;+PYUKud>QehUM+F0|v|MglZ(yw;XuZbX3uAx#OFo0e|kyN|tS=Co+T zy^56aA_E~LlmkRyT>JtwI#3AdLZ}Euh(h9o=6$u**Ra=q<2iJ%vFtZx6eAnz2o)4{ zNU2c5FGu3<3LIhK8G=y4tkF&EJF10eHh1%z`KxJ4Bsg*M2*x(nl9CAm8Bh*}*wVe2 zmimd*B%4k1IpU7}CsINIp;hnG2ufj*!J#!|OT7jyucK-^()N)kd;`MMk}ki*yY?85 z5Ds5?U><{|GT%OCe`AoOeG6#}aHQ3nVE70?8_AJMVxWez0^%`%tY`sf0U0Uj9xCzO z`{(lDiz}&1Byog5OAoCB1cE>aB!O|xjz=c1|FblF`~U+(L-Y*}nl^s*m_=*zIUN{` zWz@9yHoiyDDC8Pz$LBSUwLXIBO z!oee3d46*@|5(0>ViRG+u%wXG9zfpjK&j5vzMv^S~TK$MP^WC zmLzugWBd4A;ZP3q^yjydEo~=M0m35swTzr96^;^yKQBVG2td0yLNHVgdHb|cq&>-( z?w?C3DD$mjXOfg2zU}D5!QOUTcEl;X8g4;X+usU}=Q@N69$d7ZKRmLKwcGn?NF|ZD zCV8-(A~15hffj^9B4ZZK4)^6Xg1=+Y{n=uXfuSsgLf%aKq^__*qKzvxVtJ>f@B!&0 z)YViV8(Q1%sOWzPA?VKz5tIYt>bGhml#K~nT|FN7~5aJcVA3#c31Qz^)SdF?PLGA}LYAptTXOkqS>{XsH>8(1BGztRM-aNrJh5VN4A(FBj0AT~9d- zaD_aKzsJVy7;krF;DY9Q6+?kQYQ-UA zTRC7<6N|ft_}j7#T(@u?AKrHo$4}^>;0N^Qw^8s1>8P1NI@wI9d}76bs6^jMqNr@( zHM4Bvf5Qznh3`E4E_ zx$}7>3;6zV`^OjzX^#{~M}$@ZGC(NTs{NVd*H9oWW5n!Al%)_hrad|bi~Q`~=XrA3 zX8cf5pN^CpLyJ3btdgcScm%7(9g9~*hzFb0#;y`V3>#0lu1nDm=pE=Mo6nny-LVdw z!-BsC*F|sI2HU$Uw>_PKni_=bqE#>~nT|9AgHSOzIAn~tI=8{Lp7?2YjOdspgb2U% zl`r#y?_d3jkG>ncx$g+Isk8SZCt-e3=R(2Z7UJhwaiFR32T5N zhgEeKU3Af|8@H2n^fAXUI51 zZEjk;+GqhNjR-@NV8jQeLDFkkvGR?Av#P4Ast_fhe(jqnO zQ4wPfup05k=qJJUp|upsgU0q26*oH+K0+Eh*hr5)oe(V8(!)0%UBEyPSSjV|YB|nK z%#j`dKBkIPJ_<>`q-d;h`O=vOaP22f;k?6kr@gTj0TfGRf|$QwZ5<;`(kG*5Z>xSJ zLP*oekX8grfmUTeQwn`T6nnPS@vWowg_f*`6=bnDp?&A{%>`(w$## zDpa8eBMhq4v9V3;42U91Ma@GCZ6)PWEa%xc@DhE4+XyV%Kr4&XkGT03_dxYCm3A)+ zs{vp~Cq+Nt;1O;7_Oye!bLAF(`uqy&Jj2F7Nwk#aGGnlxV+47u|Am8Nv;u@QNu734 zgt!tKlOB&Q-pGZ&xr_T3Za^VOI!;BmAqwZBviBowN7di~S*gP-L4U_?gp~C453+Gf zCqvn+O$@3`ij?^xT8*L|w+V|BWYtW5lb`j@1BgBt!iJ_<;}Q65{1` zao_9ELl0%;@)h&Oj2pYt;1A%dU~4j!n6rHOvOoN<1pi$Lz`wEbr2;_^#zWdz#xkPl zI1-Wuaqc*z-+$5jzjgif*YCPy``BydRPwnYB-W4J zR++j={xhzm?cBN2i4`arGEfM)Z`CHsjxf!x>Q=tk@k^W5b!1l?tMNp^*+HnNEnZ?w zV-4@vV*-wFNeM|pI7r9X!|Dj6r%X3UA`wy=k9ld2R!3O+oBeyGQ7EhRUkMVzLK}re zMk_nhHB>5%BA_POL~XJKt!0%Mi{9xd!6>YmZa{Bg69dIAq=iLD?GU=!YQjrGB?+wn zP_5_k^yckce9t`k@+D)eGRzTCR09~$%0ZL?5uk;K4x!1Dy!YVA{N*Djalw(hAsxv3 zCP-_Pxh`u%EQI+oR}-2arz;7W9V(y+Fk(L*NvD>^Ob6|C6LH0V&XlA=;oYia9UGtTJA zZKSjBWh0sF2vZOUKnem2){I4bsDMDtYpG#2zp5&T7W|MyMz(O(G5he_=a+Nq(oPx@ z9!iA9vKU1`V5xjj^61&|eu%96L>v*~Nr(P?nJe#oflu8uo4#B~ZPKff;w294uRYMm z2LH-uQ0>5U5klaHA)VW|(>2gH?0pRzYe}eLIcyO%ohf&J#lTS6q78|IGQj zYXtBnS2~%*bq#gIba$&xStSsTgH9!2D34Ownf>Ua2kg3Q!`C5)9KtitJVQgO{|_{MI6T|6ofo(EScN=gTg38J4>Y1V zHZu0MM@Rbic9tzebSUU`%3MBsF5{XTn9^L&q=p(s*QcoW5+oeMUoWbFa$v^}p&Di# zToDJdcmOHly1%;Uij`k?@}9NUcp^nx{a8zsM7|i@FHeaxZ<^jb@)Ji54L) z3MULfB+!I7cI=UH1-CEnQ3wKr=h-fa-0{UL9e^OR5_G^1ICAP3K6U6c_8Zqo zITQ@!{n&WL=nRNgpe!O!2Mw`Kzt#bslfacpJU30kO_OkH@SHS`;~|9uNNSU9WD8yN zmbMax1sv^=_caMA_~9}8@XWM+e*XLt9$d49kIbCRi4)r?1wCx)FVI#uo>a2YCW5vb zgtEA|D*I?c21|YP=QmRJ3rOJ@bh{X?XeUL*flur>i?8D3$D<#Muot!yQAG2uJ;t$l zsK{3ydXBoJs$@x~rQae`9KN18EV<}uK9!N4FC@IM!i#GFzCl|3|Yag|qherh> z8p%>e7SaC-7^&ich8~6h5JFH6dFXF*G0@d(lINZw*s>i!C%lBHudn-JcTZ3Lkw+eR&G#~T%-DysgSq7Zmw)TZ z|Cuw`*%gM~+&b*A!#akBhCbTU(_=ou9W79ou27$(Kn&%f-6ce9^{dA+qik@CT?E3fd|)aW@*n5+w%on;W9FlqBbE&cn(4fLM>5| znUC#AL>+Wd-C&I+Uxy#8l`nH1Z<}74IPo9Iuwo;Q2^cJ=QK54JXCTk%QFTTH0I`}$A&(M1M z@|y`&fRv66f->f@$AV3EugWU0-Ye$JvVyq~LKqz-gweFMotUG>cCay9;*WEeanz(y zw5MHsWkw(ZZJ%MKT_3qL)+Z%vx97P0uIIS%*`*9*%Vb=~>I+1;7;S&1d5+S~*oDnV zD_tcS0|

s6<=9k!B<_l+DuB(_?1+k=d4gT_JYZFLCG8>H@yJ29eDV-v~($CXR-2 zBS1JdvD64H@uVOa%988qF|V^^O(gmwLKVJn#>uCAVezu1{%f5>U;N^ix%%qw^#ELP z`IS62XZHWh87y{%@;A5sbi<8xmtS_tpVzHhdlrD4G9ER3EcgKk*R-m-dSStG2$gPW zZV~(Lv)_jvnf>r}0PlO>dry7*iO23)w{|1%de;Td-hA_44*?iAZVVeXZ2GUie+M2o zi|3wuftJ>mkM{QT{s!P9S65WgynJ{SWhdualk^fS>FVR` z+vb>xUOH9&;^GzE1gqL&!wr^FBq0c>OL@F+pQ)U``#46_*Wd|(4h`2k(1LvEQ}7kV za+$6|iIqKBmh=p=dMHP>P(or zsVa(rQQ%NY(O5HrmWD}a-$zJkEeWix@i4iAN`)25fbIRO$(H(%jzERNwA-Zt(+TOK z@IgyzJ&zZ+^>fjk&yWoRke;PJDvR8iBGSs0=b*LblXRPybqc z;hT<&lGdS5TPbGe6;*yz{fiyw88N;?Q0W*{?`ZxI2wVr=e*06jB|Lt9$}EHF z0Hm-$R4HTesFWkYQQW?ulOH|2fT2>6TIr!xXc&{So77lZbhSv)j=?|bsCWXsd?T#bFuVl>&{zjY><@cR zGCQPjTDBKl*>zd+%^Nj{5%pHM4u_?OnZh z*^=en8#Wk&jp@ZCfawr=AP@`zLJOfK1cJc<0vJp;VBCUn#g-*Ywj^7<>-Jtw-`$zt zA2YjW&y`F`$nT5E9Y6Pxb#?DK+s=I2yHF~5#{ZqbAnvDeokLyo>OF`E)z(~wT{ z`r9AjuAPSvY1am+X^3t;z1M7aXRRU7WL%eLEt$)^&RWTemIkK0GG1VCZ8Gc=ScNr5 z8wWKhC21j%E;u-hl}ZejJPwWJ*grZ+Z@x$ZL0es#d37n~H`URWNs)G4Tq#U)ff4Uf zHX)F)7O6=BOptJ$By*bAfN+pfSRo`)OU8-)1UO`9ZCFHIx&_ZGFqZFTvM_{nt;T^C zku|c`VGkz+(8b#Q5l-bq4_;V=>snj;5b5q%;U1+)ItdO=O!Cs7JiztmpThH3&86%s z3s_VTND_`Q5Zc){!I$oTlHWXem~`4D;}{UER2nHv#qTI-5*MwJ%24&N-6R=yU_zrT z6?Op3c*haOufPui#wI5ipO~;pNKQ?He*A|n1aKOVBncOW$6@1>HcQYEloT{{wZcWG zAyzCx2RZNm0Qd6qLgUW3xiOsz;O^b(tHU^U>+~~j2BA`mwbi`B`QIH(u(?2f|gW*j!c@4`ZP&tj=QV^ z3plF*gRu8l}DJh$i}Zj%%rFeInh4@E9Z|e~R%!A5-Na`+hD7DR716rYDc^ zsfTxS>AViEzvyH-vq?$;G^AQ7RC4&rxDlGlSVR)NF*4_LP)T%+w0Np5SJ!j~suWF= zD7nf(+5WuNnmQ-R*S78D#>WrwtCw6%b0&coXk00%OC&iwHpRCe-OG<3Kg2}7Oug&i zSPcc&R`Sw1EjV^$DbP4dSLvmp<+KGj8*09cs&H4xr}Dog;gDdPPffqZk{XoZ(;3Bmn<=%S}3af=aMlgP^ev&O8Yz6DS#&3dxml zum^S>uGvH-pyqZ$$%BzG0G&)EM8)&|qVLK2^&8l>?J-(f>mL~#&7BEw{ioi-U%%nG zR7zz#2Q?Lh(y=N}hrlah=xOr^M^0u!k(MdmaM#1!v+tPEV!+b>bTF+Vt|GdPyejBY zz^U`w_{`;}GQY9jwCMFTr@-iNV%6F-2RR)Y=1i}EtcsoxAaMwkCO{CVfP(KcP$<%$ zt1wpdXw4*<*O+BRa~%msqLiW(7^XmTW;Sh&i%`n6ZA1Hdp*2#Nd2!t8MmU08ag@QS zy@t4@Ly6%kz0zpbOOmc&_s9hAy!|nbIK8E8BEH_4UM)#MCmgRW8(%M~W`1xlqdzVAofCG*Iu z*vN_6*1wSEc@p;XsLeCOz1LlME zsq_q>M<)^cyU}|O142t7#G-`@Uv%*Bp`Xk|r{BM3K!E?l_0f-gboe*--18!V)RZfN zsRDXlt9{6A#@p6}XlsFD#kAX+o6sAUA{Nhqxot3(heAmNM#}CZz(@a5uh+mpKc}5` z#&?e%?R~aV0UOR(&EI|WHHIc<T}MdEt$m&e9NB?E1uXUM@XlW#{mgir7XEi_-Jbxtc64h2VW~32c}9D-gf6!4vgjPW*rJB z5jCxhXMA`AoGMk)tMIDRmh!5#3r$;E7;e5WU2L=?s^UJeFRa*)0uTX7kz!uUdNRpI zG`&74+ne9m61ZYj{EPA zJ^uJVDWyIDByk*A*ab`G8i5~W1Or5&gg!Qin98Gf9)Q5efHpTbeXOs)|0^?*X(j>q zUte$en>X{BPyh21C!KWCB}2nQi_ltAC0A>6$AknF7D(j&pLy8CrL?FOn_IqW(*Mz{^A5ct~g>kZ2D^*mm3haP*zd( z=-6Y^+RXkvG`?2M%BES~(!{AW5H+2 zb~q#sfesj$+(*UF5r$c16DFggYpUU7Qcx^ac*E^md9r5&QWBvPAUtYl0datVz&yiR zFsm-fne)1M&si&QEg&w?VUu2>ovI1aiQ16bde){A4RkfGB<0i@{f7`yZ`BD+LS_@i z-znG}r#yU$ncC2H@7!D3XD3&%gvZa62=mTszNcV6a znQ?7kSGdxNFbUGW@9_yhd<3KAR=q7 ziTR$g*G_^=!q^yWI}qM{(caqj*x1fM{%J^v*u#>@OcUaA4O=bec&3{@2&$O^>pA^=fwR-1)7RmZtfB#XD7L zttplSLt~I|pgseM1X9^HCa!S=lNc0PAkeM@Ne2c-0U@R)r~Eg(_O(xZ@8<9S#YF$N zzV$6^-n^NSk+Gi)4-c;g^vhm-rFg^JUq~@m!Vyl@@J1*C6UHL9GHn^ohL=wa4`6=9 z5e|o@3ViP2Cnzd)0-g4FKp@&osQ6sDdI6ui^mMYWpd19opWK4!b)>8(A{x_iqA8)t zO3YnN#l72QwL&rz4iTeRQ4us_eN~+v*V`_b+1f#PA3GD6`!}?`50Tfhar=+ErghE zLfH1#VJBCCSD~pc!z*;D-PSUM6_=HGiR!n0XN}gJ-HN+68h!(1~Faj~c!4Gnb6?z%TAErevA* zS*%b9(h14sOS%{@RrvhIz09ghaY{!EUNjb(u7$6wY|@AwQB7Ws>kj;$(SYeBIacD@ zj9$_SNj52Yynmd3x_<|c9vooYFXQ_H>4cvT-{3qfIMIpp`ko>I5JcS+S4eaa;QIlk zVu`6ziHhf2zYS?{HPgmg$0dgGu0Sj~2orDNx-gZ4$M#ywbkw|g^TbC!{E=tgdfTrC z>oVDYJ$&%sN~JYqGq8LfVs^WIcpVrTMU0O_?+6@>7*lG=(j~9kxN+mnXPC zPhY$qR|qO9eU`Gp(3wh>nqcD7LP6gNF_h@bB3r7qzyx4uH5G=>7wZUX}o`LIyMRw#x|S=K&8IbyB$JTLuglPy zOz?2uFhASdO>-*2vZgwOa`3fR1^S5^XaSDabhVsB%56aD3NnN?it3FPv1+oW3llLU zYI+JL@504#9Lj2n(cDpn^G7Lp<7VI>oN8xA28757qc|)Gw7?PY%q6qYQt;{fwv)~z zId^U+6~AII9XckN8)Isidut_lV}})nUQ^BMDh<;9T!aM-fvZBHrD^{+Ws>wx7Wv2D zZ08I2Ji+5VBNTjTiU$cOWuG63a1@R*ls%z?sIr&Qa3M?p%uR5lL`q31U!XWSWt5cz zWyFo7`8`M2G+Y{Rt%!HoL_F|EnVRWzRWnbJE|g2~=#!8y0YcZ+)ydhjXP@L6K#;PP%ZxdPvq8-uw35&^v4aQ~KW(`YrE# z=R5i07r*%Q9h1D_jeO;6H<(RENF5j>bMYTP{1{8mJDDdA4>43Oacru3|9>CpoON z6hb+iJgbp!TyYMWgz+|07L8rwfn%%9XyjmJTSGcxsDrMRo)(mJL}rSDR@GlO{E@0% za9Ftt#ffYrwF))kv3z|^+L1T{Zapx_=Qr-AvoX!zp0S*Doy|xmL$Q*t%GZV}h_=-( z3>}}O)O`Apef;Ov1I9cdoU_~G5K3A=qd;hdREl+T+qwSSm7FrGjZ($KkFzKM7fCh= zyTNY%6)9o!AQjQQ(ry!TTUH^oV?eZ_y>RF~uSKmxqO$6a zLK{FJ!~~)&v_pA}=X;na^`UgwM+$KP)h?2fVj4NmN)l_0QZ5Zihktx%C*OKxFJE}> z8C#6BA|B6dh|8W$&vL)0`fa9f#QGM?1#E%E9W{3k#rA(llT~?!PO^RXo1^ z=mBonw3|xaGu=f1=|C30i>wz`@E2vCUx~mG8b=#GztpC}7s3iKSx_Ka|&s<=6n92|34Uy$CYWp7O zAC8h7A;fc)Qop+X??1@LKluryXIN6c!5VI;qo_k zZ05FIhaiph)kxn<_`vH|;5?__@gTVL!2u)K$QV8JRx9sKS zo!y+))xuj(Tf*x07CdFt;zRmXn0z`~l1>V~_V`ggbMH1tCJo9yvb)uhSPX%}#bH%P zJ+C}@G1n}cjVmSj5CI;VBt?1!Ca`5(jpI1{=I{_d-P6mQh74CM?&PHQMjTgC@%>11 z-i%EGS~K%$t(#vRorgfo6WH?V5Xh-5C{d_bqUBQbbBs*vr{Im@IO*tJYPY@^nv@ey z6oi$BPDshe9(aQ9Z$HLAU$LHRmd~N!2UZ_P-~_^GFj*lUh+_qa;Q`EFLTAa4N*Hww zq{h_}$A$4ig**25^6f_sa$s=OT3VmLUDN_pg%Aj(Z1)3Pn*fC9{ty-5+MlZw3KS0z&LGct?;$M+*B;3R%?x?RP{5Y48BI|@H3|&@L1Ax$(Y+9^e zzkb8Uhc`Yx6M<$%0RK-{Z*L#7X3Y{m|M|}k1%7bD>8GFm=&_^6zPoz$>R0-nk01Cb zrEna_aL)k>WyHb`~se(;_{ zhYw$Y*0Q6cg@5?WTWRfR#`6OLl%=g{Tu0K9O0l%9o-^mQaruJTJa6TEE?+d8uEs2T zM#lNiCl2zf9fvtq$TP1o!^-A5?mjZaXCB&NEPq8zVnM`I>YPwLETAQu;oq-3o0D1_ z$ydA@C%&3Ce}o>dy6?r?{1Lc07Cho=ebtzyt3a@@!mj~{5sd_-<&=k`iq`stbTlla zF40U~s+opVJ9Vj6vWX^=i8KyS^eYGvaPflKT)L=}t^K3?`<8=fU~Ol;k*U>=wNN${ zVtp#X*LNJ`pYPj=PDnel2xryOfGB+*0-uvQ+j!gAD|q*r%QWX{Tl=L z3ColBY^AuOrHP9dwoz6-Kiu8JuMZ6|w=u)wmJCvBJevSH4iqX=I8K60q5-8t+uh@V zb6Qugk!iwPVw;c%nP9Rw!0^-o%BqMXleQAKU74tDUA=$Di`K-_1T%+1NVsgtY$iO9 z&)&a_Rh`YOYOTk&{Q3BpXL=GD1-D2G$7oW7Eqi4XK?gxyGQm{E=Z8Cv@|oZ4;0KQ# zW~}HTQnEUZs%aw~U(K18J&|dT=`ujlb`DHJAMfsk4elrt<{>U|B2J|Of?|#?&`1}_>qk-PGj&^TwXjnb-nOCSF@L05H z5m!9xSzLU{C1|ZV?X=Sff&j{8bgl@k>3CxRDP^)yC?uZF*JJPAy{uZb>g@jh{?BNo zkka9rYcFT*x}}s#K0=C!u4bI`G-Yia^sFnN>u46YWLVmi)P*|4f^w!pUNp6O-y+eV;!s#1TwIQ{FvEJNa-UUBy>%i zS)T~iKK*+&cDd8l2xDq?$f!P5Dxke#5iOZn1VS0X9}B8V$P9^OmO9Y_X^pRa3c&>9 z69<`FpXO7StYhcM1P8~8j1_!l)k!LZmbQ|#E4XD(AOHHmZdA%Oo2hMiO9V>$P=dDR zH19ZlCC^{okuJyHF=yBatc~(3*l)XeqgLehcT%Yvs;^!@TRi z9%Ef+BOf?-HFN9JOqCUZ1%M9a4v~~8vguBAP&r|rvZ_ZAf+>};Wfp>=$$jKXgJ?XY zOhlHuI>sNZ-XrmpfI^K%Drv8bBJefkz~@8foJ_&;CU+(MXEBEc>;7ATn2!!iIY!t^d*u&9xHTgPD z{K(wzgpg=uq>-iL;7#P18W~09@>V2EgGiVTlu{%d2ggkiD1{?Mjqz0U6+&zGqvt|tsZG6}Sf4hA}#f;}gAGl(%*mLf= z=Z-vGuf@qHujd6Xc%Hod_B-CSd-ra@p|!J-*S__I1WKbF9}!3#8~l|pN^(LPGul7| z2;rF-G!7nsuj#5w@qsf}@cdQt`1t+X`Pe;MO(p82Kzk9u3M&j`_CnXTAj`bt?A2T_ zw}bJ(!?l`tS_Vif8WUB5b`Brvvg=sjm!WomIDWcQ-SmlQfsvGP=q?z!|0o-1Ogk7m z+t*6bluaA}}p>S=mab*IpT)@)-LON*Wb8<%uXLK}CMBsS>DGVvlEnBb~|=o(8I*XY+V97cRrAIEG60%@Ee z6G9MJajJr<@S$_o&@)=#9d~TwXD>dRgqtJ?6iPUjKFV?9B&B^L-K+#s#&qzdPa4T% zeWQHlzMX76JY<1=CNT&Dt`>%!fSTs2XB%EtP1$+_7@%iGD^e0v*`qi-L}g;a2z?G6*ZVHa} z!tNtzZ3btJ4UKYSXrSS-2RG*czJB93qEk86*DuPYvNzK8A^gu}fd8! zhLsEL)8B7@R#GVB@A&q&zx}hn{oB9gp@*Jcz?S#F|NZ>*r$1qIbo}LyJ+}43VGsPH z|NJ+cd(kQ6rplHX7wV_SN2Jnf;A2towz_c@js+v-eMNgJ$#a&?D-1RRmP-p;#X{U~^h80#hPsAjKt^BPOLc>z~#!3T><&Ij>BU2d%N>S0El!%h5 zgd-R&m3ha1J;ssoe3hQ46am zgE_a>x&?IBub@8FO2SE!kO|UmBMs?Ucv_)?0#_~XU|DAa-+b&4zu4PPb2h=!<~m$l zJbVh?1leS>p*31MUlsTtBK-x@k(B%b1LJ#{sthAV5`;nZhoVJV+T)7=m!^V_lqKRF z0jkMcn5?Pj9L>E-Iu2*f@8G995Asm&6jv{wQ^k=~Vf-~gS`t$F%r#6o#=z-`!3jS9 z;BG$on&3Tx_Lc}INRn349Oz8-TDBJfNsob&Qk>TU^j@;DLh9K~t2S9TjV%dBsddU6V=-r2-3~j;EB|p3WzWZMI zf@_{HcJ1Ch6L|icYX$`PCtk0(_7%5(@22lv0T_$ml?&kh$C(b=3E2Rgz6Ls5p;CrN zcEVI1$8qWE>iTAHZ_jm4*Xy9QPPMeOmd3}&G$1ax;w--Py?>-oE>*=mBBwv17HO!s z7dEA(os}DezO;^ikdT6{1LM5zR~sq%UQ9SBHU_W&GVLq6>XO{_f{U16pP>?{SPK~g zRua=1s5-{uj{^3IxY{u@K@oBSEU#L}I|DLmRilj#f7GS0uN&w9S0tF}ZBkAcbkHuo_$)PV(kVPm^1l$q%&c+G8(u<7s!q#bj7HO9Pm9&XfLE}z|k=&Wnu4=7LKh31xhL$CFyKfMnk&O1`QRH#kX^A;V@Mm zXQ*%hsq+*9!LRo9^6hO$ncI-&J?F0EJ?(W1$tK&4Dxjs^NsH$bj$pjh z&)C!vJSwrL$UaLE9W=h-P1ETQ%k0>lCT8Rl23zyISXD^{bxDUUgE?ODy}iNIKm zO!LSHA2%tD*-yTJ8W~6B^B8xnNRBb|+kvEm*n0%M=LpPchjlCISU8VVI)w}Z!yrJ} zW|fXfXA_N6%ww+!kSG-(ghmB|;i+*7{R6Od50olcQ3BbR&90j)JaAzDIrA1Rr2FuZnV|DOSaRkP{At(e zr=9xQ=r8#a)Mt%~)wG;TISz8&a%i`n3IGZU2-7+O-)Vr zj*pK6h-5ayJ3sg;yh;E%up6qjt<10luhwOetDUeAJRJsP6;Z4buHc*74^S+XEY}#K zAI3=T$`C28;GZr#i)GDO%7LP`Y|>F>69u)kG{x;7h#A9tKnSPeCS zO#-S3h1Nk-nRYZTCE+HGC2tgvM6}n3?tsz}|gOghuC}|(h4?rpcp$Md|g6AUImafkE2@tl; zPT9*mbc)_ZohAsPP zOuGcSK=)GLXueM}87JZ_8KsJ)lrzlDTQ zWhJET?}dOwAcoo^=}E-gcNf4h@i$j?G^KL}1woTH`ARDI8kTE`w7A z-uvq(c+C$V;;#MOjQfFc#0y7Dx*E~7tj_oa()vzWDy!D^d9WfqQbMVOI@*JOq!%@n z$C?+|>`_E)P?7?69WoZYfT&9&5-z1of`ZVLgus&mPY41b(b7dZpe=3(A&`z^l^P{3 zkdzXMWH_Ir(Ay82p0vT=a2roQ{fzd>LViakl|EtczwWy0+E=Vv@ek2P(C9+hgPr?q z@E3a4>{-lPFz@Wf{7w&3rhAM`Mzhnx^`e-FMu1`v>3o&UdnLgSg@!g^&QLYSX-ap|T({74B*N<;A}J!Xk1LIk4n;r5!1!L2te|nsdkTBpHVi5u zkuo5WP~5cr7~kBo59K&GLBQhH20nDjTCTrnEnRhKDqaO8WMuKHv?hUw+U`P&*c@I& zh<7uEcTu`RYkEHI^-ECNwAO2x5V78j47D944Vg{?Ehv;HNlC#~OXskny^c>ku#1Pf zhdH&Yoz_epQ{_?erD4!M=|n3CpMj}^jOV&d;3KBM7t6hBzM>i&1$MhuK1(v1)MX#ldnJLOq6ZIhi%pP+&4bwXZmJ)!ubZZsD3@IkybNLuvKMv z-jSl6viWxa7%l(V%_otN2|}HFgW30~2P zITZX69GQrcl<@izqi)um&F}IKh-*2B6Q8Y^E-8&2=SYqAHP`-p6YIK~_{7EQ$W?q2 z4kVq?h`v>{%V+T1pG7gDU)c`?C>j|Q(5(U$diJ@?i{kKq-8l}*sGK@?h#wHD8 z!jV?yT2!$J#5MRO9P5K84pu)eNf%CC1}u z(9EB|;MQZuj$YN=+QRtg*i4|A83FuxuIE4h1=qB;wgM!ji)UPP*$rB&%WQPyl9xS$lUB?p zP!3wDnm`r_$3(?f6+{=!7_~MnNShI4lafaVhxzT{K1e01WPCkc&_&XkN%PLL*Wi#q zD1i{Zsi0%r?|ASJTfu)=>a1c_m8yP)f;6J~ryyo16w_UgLW}Zf&MqL~BqPvS_2+HU zB1}722^gH%PsyJ|%9u)CID*jCj)FqtAo4fTFM*53BO%jtH7>K$9A$x*`h?|%jwJ&w8gxLQ0_qdZ%xzjrSHm)L zDocy&@Tm*e^8WMI^35Gbx$YN_(wDE$l1|}yIf}s;GVWAJ5VK|GILE>1_xt#Bsl|~B zt*3PmgdH1%V*-t~=2cQbI^po43)b+noyYjq!DGyANKy3R8;>30bw7KQPu>3nN5_kZ zR5ofa2&>-rlor8Z@Q+pf!ZGfPI-f^(55WFoFgj{RORj6(8^f-Zvajy|4kDQ_K;xZ9 zOky1+?FsX{^=Wfdjv#O(fs_=5rXU1)0eJ~|2MP|99EI;l0@tPF`Sgv9QRo|l$D-h` zL2=pTmwkHQp+oolAs?w%yzCVtYuBu~{L~E_KH1jM0Z;COAW)#y;>C-(_0~IH4a@}p znGV38a}azN|MD+iV8NWZ&mSHg`Dvk4iVq@f)#pdqSGax6n>UZsPCM;oKmYm9e{kW2 z7jysp_dc!8`_$7;W9ybJBwSZ}mf=vhY%aIn`32@Q)=~BPF&@n98I0$^6tC0aLb+}){RWnKE~R#$fGkxdkot?(p4)GcX9Cb)fn9}jeo^3Kzj)0C0;TA+OmjyA6;Ej3Yr zlFBj_bQO##9JCIOtDdVJ5;8wV6Lou@N*6#|Lnm#M zSAjx^1PX`7q~a@&9^|W!9pc01tl?{q9^lZ#gz>SEvT8xCWVNcdu9Hffr~_c0ClT0A zfz(haqX$P3<9Yj>2z&EQ|HfcUb+yAF1Oy6^N*eXNCl6P5oiI;pYJfA>z`7M?q^4>C zh9-C~9D{z3esy{7V4LDVCA)0^J(vaf#it3LpE=R4lU7yso;f6)E7 z<(6BVx4-S}^$5MBR4Q*B9~)!IlBHd{_v{{g{p;Vz*S~(lOrV)b0RDW}+^$*l4D|E- z7ro%`@3`&uHv{v^#Y))bC$u$9CR3ElmF`umR`>7Tz4Hu!Yp%J5TW-1KX?4D{I%m^A z*vCmHpRAwQu|tKOr8j^1yB?jce@uMaKdY z8d~cY&{n?~RA9R`Sm{}DqDYICJFqlK8wj;E;t>JDIuuIBrQ+x5%k9VWC#iE2-0;{z zKEG)%?>=ieuUWH*ilzE#rK02^wdKb3S~%0gmBF@Q#uw;Qy53l$HBCt+;DbY@(qYDg7+ zcC@nNCTYADBoG7!BXD#8cI-dybO9kcThZsPhgFNKc$yO>0oo=#%HRPKg(8(>z0lJS z+YdmXstig*hei*-=RNP?bD#U%Oi-9f0RC^SOD}r{zxnmu0KD*pFTCNdJMLsEpNlYK z*>px+a>+CDzq;+#cL6M0wnFURzxQc3_rLD7ujd>8@pTr>U;NC&#}3^Y78R`*ZQ#!D zeV95oK@j+MPHVL0q_TB>xQmKft^MO4QM19hQu3`G2l(fQpG4zY&HO5DDiX9QRru&L zPvg3i7BgC|Aa#I|DbZEjzYtY5UUaNI9a;fb%Xkr0WmTGCL^Kon1pB0pwWH(eg1V~M zqCf|Vw#G%Y)Gt8!1~6$_{whMEX)ClcTI^;df7tNaZ2&g8N!8fK5k{U>NCQ#~upl{pYWtGn=O9dB$J}ZLUX+ zK$AHksisjxrzZh|8uh-~!!+kpO$Ky?mq;faJU?Jl?*unLag@6b^x0}%QU$$)Yyfrq zn*x^C7jKhT0H8*c$}m|#Pvi`j-jUUZP1hz@QE?HnSd_6H7rn#i?fa~YBQ!QPq7`~7 zH)&31!5sAY>tN{ub1Y$?4^4iwA|k@te`9>g7?&OGHU1@5*vyfl7$|){uyrO1%p?H+ z=hszNUBxed`OClPbNu>$d~5Cd{`TGXkByDC2oSoto{xV0{rvT%XE0SN*;%+WOyDq< zN?jF^)w;%UFCIii*dmnzUj@AO7mu)YU>F>iDuBR(>9hl$$H{YA`O)*w#}5=rn6ZNE zy9CmeliU?Zv>GNlZw!I4P@C-yK>I!v9Dp}$n%llSdo*VqJKzI+2KI~vLR6@;=$VT~}( zbW1*c!mY2SsS^cyJCczCsjTXtb%#v2ka8S0_Kfh&$B*#Hu`%Ng=vdPL8^FzLh1`2< z`5a03YN}8eU9|w#8cH5wERQY~!B@n={}C78WDn+dg3$EJs$Yhc|FM3=wtZ;R1yfQ= z`Rr#u`-07zH-C0;aPTaoFqQxL>tJqYO#%?kmIU_W6@pj$#$ad^b{{slCi847={U09 zkt-)F-rlD`fy}Hwvo#|H{J*^Z(t|(1+ur)77gWmS)(|zm>eADB?%AuEER_(#(7m*( zI_OEKDzq~_`0Htoe8TeEla9ltzJ9h2jG8v3lHeEwy+P932RiNWj~ARmQ^uuS@eta@ zLl8(sQaE_pCr~o#aGEhh*xs~$@Dh9-7=V`*@CnUYOg~;nGQ(O`w>l9sAF4@Y!ho$q zH#!GFKy&?kW7DGbG!r3H$qHAHD~~cXu@9t+6cU7I0DICg=b#L&PHLZp**fZ-6#GWU zd17FKn}^3aG+83)xXj5US=-sdS+iSN)|R0@;o`^y1z+K#5VC>@q~&;99Dw#wj*GOS z2qr)B$v91PH7qfdOLb+s|2D@dvpa^zEFT@x+8^SH4@6zGWqQLCpSZHK}D=K|`J zY4(qg^X1KlxNGkqWnD3kj^kL{>8DP9vS{;4A!{tPZZ-Q5db02vo2 zFo9f9ZDDJrXicZM`)D5z9~-1Toxs-$R|@KrE_KNy?dc>9sU#^!lXL_bCqV*P^_9n{ znmO7*YBM8OA{0=m()mOrj6=0r3?~}eAn>DVQimWzGdmT5CX;NUF4=-a5kz7+_63x{ zk&;4XlD_dh#?239D1pifNrjbOWFzk&grGBV&Nhtg2uY;EEJDo{u|KM2;7X3!ftigs@iB!pi?w>43gAMny=45&~rt2s{re z9%5t+{rKJp#2}>z5(JH9VCU{#?o>V$;*p4kdUQ5v)hR`U%dxIxCdV%OhbXS7gev{W=QG+N?FNpnWhl}R(VF~fp}I%YMb z>CC2RN+wA;5Ji)qzlIOdO9r&i1;s*o+7p}B6JWdiuM{sKZFg-cl# z7@XKkAS$@pgg;>eOB7fGWkq$Qy_P1KC{_ZBwlyq;=CnCYoHxIXq6!!;cBse z?maxfH?|+9J}Ef0vy}@Mb#l_IdKNZh$x4Tk4}mC|YTUX6Dw!hhjUZ(^u9LEzZG*)S z5diX!8v#VNzP1_`0;EV#4vGv+?jcZtwb;dg>XeTIO!|s9p0bo#b!pyz_io;CMwyqc zSxC|IB0q*2X@F3jK-WfPX*(C8Rj@!ufJH~Tq+P|~i6Xb|9pXp3yXhOvK>|o6YXmAx zaUTO8P6xJxEeU1E1QMLGPc~m6lP@zhG(xta9w*@vgea2$a3p~?;!N5m0!hs82O)Dp zYbt?f+(pO6(A)PKqbHM{PBk_*ojX20UIaLH>=>0w#axzD0^N{?gd0h1>$r8b;~*w- z=tKSJo&nf%3`QpiKLSgZE-AINwOz1f)8_t}9dRZBm|6cv*3zYm#eoBd^w7ZITcc8G z{w%Jz;v5#WH&QJ51X7!#Sp)`TMs@C~Bj5CDyRljzRe^02YBDzTWL>ZIeA_)FIqK+3m3H0m`IbW z1o+C541*GbQ~Q}L^wFH1O+#ibj!d9bFwH5Uwhd4P*To~UsOmU~(3nReg@dQc^o~D4 zIVjlChd?25Y=WR{t36i+R>0}Us9K$({y+_)N z8X^-XrI12WmvR}-mHGPiZhpM;7=4o^^E)Z0dh8Y$39>pPk0lw?EFnTYXHWr+lRk~P z60RSRuT&`dMbdtPx^x;}838DjkdgS0ua(7t*mu#&vPB#!l?q;|f*Kz)`uk-sd^hoo zOD}!)-FM&pM0g0rV$q9^C!0ppXV8ulF-am}E!TnGF?9DJ9O;8yN1#-S?(D@EUOZ6W z+Hn4@xBPPd%GImbvunnb=jpa)K!7vrf06{04;(m@G#g2R)Me*#=V#xx_a zvj}g2#AqHVBU!6LuvxX0kEOP00a__s=@Q`c%sd9-~jae?7*U7~T zS~+!gD{Yw+zE=32BCx?<3lWoYS7uHwl&LZ;lVDNHX-GF|{;Ev-TWTv`ETC_EH&f+7 z9GQx^=2};o3p(ajsFVdR3WL(Gsd}RzYcUHN3z*cAxDZO?O5-G< z6qwan$D21S(>o5dC2ni4uo`3%P7A{=)h40*SlYjB0mvHZI?wQ#TpN4D33t(pb zQS18a|DOBre}D@vJg@EX$G5*fN+K7}}bGr z0YW36NTXc}Ge6e>Qb5Lax$oF8KiqK`?Ko8Blk5l~2yh+2jaQ$;ik5l`fktY>ffjLZ zfG8futbEZHoM>dreF9wR(3Egk)>6l%i#vJg>Uq3m^&GBRHkYn!iYG@Vxb;9kH*Y(_ z!@c876$28kpgt){I+BEtV5@eCk%^VkP{0E1(VSgKUAo;Af>A1B(fq=pe_|iGQa`Sf zu)#mDE%mBPT?AUwx)wV?m8KTy)yEVFrIb++)}dyBHh2Q9HEro6moMqy1#9Lrr=_0# zqf`8R+fjbFe-IbV;>J1}60S8%(zx28qKZtEhVgV%?1S|D*qNaJt6v3H#J-m`=6Z9PcdS5{s(PAw3%HB?+3IMg?=rGGdH5kiyl z6&+I*I;Sc~G*UVUSCT8_nCR()z7a%QGcDOVV?8Y~*1Dk;wG>DxaF9p|2`51%@EIMS zAefkdM|Ywtfd(O5Hzi*F@@voj;uk)@{X-xAF!$egANSt#8$8czoXkz#GB_}3j%?v9 zSg{c5lZH0vxCTS8uN#gHBlaJGy+@ahBuX3q9J_hC3CVlz-O6pd`V2xj)HD|uXF;X;_(i91?b`WFc)o2R z2Po~-?$cpOWaW87h(S1-&{g!FwI4RfY>6Nt!Ic768lL?~vBI&bGEel6@#OF%eT6b9 zDOuE1$A(!=tnFxIRzsE`P?Q4S?wtyR%c9m(aYVv)9~=Yl(~1fnGS=3psR@c>Ld{rkuEL3a#5=6WuZ*7Vb(jn`*(ohqRSG zR#utO6@pAclJf$7+cV6Mcl2=Iv0(@_B;rbw(|jgEH%nqB6>+bF(B@hwQl6%%7*JnP zxIqBII6OE)P^nZn+TV}byc1dRP-m@W(fs+i(lOnWaC8(hO~QLG1QpMxXMBucWDK!w zFM6r~Kq8Ug(n~M>#EoD6@;}`0t#1b(|Mw68lCcd17#cpN~(HFZg5~hh<%jykgA~E?d$? zOFC`*&{0@gJIc|xTGKaKW=G$+rKeScmDC!gG|ykPkgHeDA?N$X7zc%pdBVp^|44=x z9YgJls&S0gh7uTY?5z`_r@{9`)Ot@!$%>{7%bV-D8cnI<)1NQ1Yh;o;j|_0rj&2sT zrg{F#*_<}372j9ne2pT&^UI`CS%c|U9>ww`Q(ozJtY|TJQ7lK{+tfZ>1t*FsReG{ahR_@vWFk< zILvELU&gCXUI;=_@O-qCs6aDO86jU8BUNmqB|DdfRJ*+cCWHlcjG?rl{7K_ENWq_A ztkBC;Y0zj!2qOt>=#%mUrHU2!p$f=ED<&!)r_FBU(-)u2#~#?toVs<)Zc3n}V-+YZ zg-#37NkLM$+}Az8*B?E~_Wn_dfn{o>!fPmwr!~fT^7_Ozl@&XGyaS@FTHuwwl(SGO~LmlgdJx8HXI=*G>x^%U* zyFCN_Gr@l*0hn3;*Ot~=w70gMRIZeb5>GZQGRx-ik_%5kBAJ!VAcbIdLx4-YMWUPb z_-L`rv57p}hR3<{P#=GH&lc(*O!D^AmhrNa7vd|4Z>dOHDO};OZD@$W$zoM1)mFI* z!R-1BZ#`of3E@z|vve}YDxqmRFODIaBSkkN<(E*1$k?h|F9I!*%5u}gi9FzXn&!Lo2XTRv222B@G(`siaZERvU4ITTCK!wBvvFK5xDq5A;Wr8 zYZMNiGAxA^%~?M2jFb7RQU>)q7n)nzYfaaC$vOp#grFt zN@o+-ty{onH|^uIm#swxA{xg_0a-_Ka5TqfHyz}j{evjs8$%okhybk|+sd!XKp!X3 zJN^2GES4Z3;b|I+0gloXZRbd6$LdN1NFgcYixh^(;EDa__dFk+%Tw_@gpZp0{_;6YR{W?f zETyH^X=j>cuZT4At6*nUbpq58n479GuBC!$g@HeXEo|dY0Lo$!B|`dUmM$f(5Y#1H zd?nb}J;*J4yD50^j76QCGq06~q^W{^ZQcG*2yHp=R;JhFC_&8DH5O+=1t1}-k=fi9!9rXkruYj!SaoBZUxQ6`H$6ucaP4sc0=R5pl*xCM>UhRS%{ zR;5FI24ROJ0a`fWl`|E-E4cpt-7Id-@P>6uDCqz+^i37{{;qDmyZs1$#Ww~xGUSxX zX{JxHF2HnJU)&xzyq3N~76PONOFDMYBGH!Vp-9*SY^tXZegEUA!IA1~u3kj)pld%Iz9BPW6z&g-r^m$eH!B1TkI6b4K6v+8P= zwp8+c@=B3*B&*sQxn}u%7PK^Qcr4F&xlC(1LwzE_WTnEtZra6o(YKYE(T1m7;brTV z@b=SJGT~K-3~NNSeQ!Ddu@c7G+(tIU#J%Z5fSss<=R$^|tyryJu^khb_B8RFL|Z<- zt$>SufUkU(HaBp|l6IE0W{h6^lgBtPUSdu|9W5ybpEv`|F@lrt!QFHo#$Z{)el=Fpr;@}G|% z=I+CTENE$DRcjr7B;X{F0wfLm8sSi_yS#YRvbA z7RQ$=0?-ax_|Ygp#F+&oP%_~3SuK2S(*b5RCdfFFuRVT{&pfn`-yR+^-JOIR!}rOE z8W=E6_6nXgtq5aQmHieB|}7dp%pX z&dB}GbO2`7|A}?}`R9uVAAC?JlWAS4l*|^nZUqZZU&;6X{;z1M&*1wWCo;;b1|(fm zJVjJ0G)XD(5fnU+O}!&5X|7|k?DNu}Jz!d^7A%IRSln92k6wHcSx4fjz>b4!r~XLW zz|=Bk^A}eA>I5GIYhxQTg{f&C2t5r4CSoH7B345v)MN03cI<$IBLf^Q>CP4S>SG63 z)!xL*R?o+0x>f=)tKsk?8k!zeM*wlR*XeEj>HlAQ&1?P^b3m+G-NxTP;>}y&WO$uH zBOQT*!?DR6pZV=x9yrv;tIk}`d(K)$5D2`$H%W;-zfdYzh}up?B-p2?yE|&DrEvU4 zrLFN#$Q*EVb+%pw>ub8|liaemj}P4a1of^wxTYJzVH;};)RHei`3v~fmA+~ql5T` zJUp_)27mLLmtK0wv1dL1>ZO18ws(0a`s}{#ZExdCUouv_sdQGCO9m{+>8oI19J>3> zrA{Yc@dB9Biby8VP6D(CI}XB8)AG;MWp@^GK;!Fo%X8j*ouYBbzx%JjtIsg3g zgF}Z7nyA!J4=d;Lyo*ldnzL3>Ec?{bq(bRm5tH?eqt>+rc$v*y+3zJC$+DJu9_kt4 z2fGe)aCiz_0onz8gmn1S#p_wwQjZrH&a#NCaKnzQO%|-f9a7m@zpC=zV~L5BGIISB zS{sSmFzU!E?>?lm2^;*i7HFZ+QkhCs=vZsrP|LJ10bVJIFDo><8Ln6|i<3GV2m)=5 z)&d(;tetPX!;BphgpmIjh;Mq4KmEK;nC(Z`NYpaeVl>05#&E0~!U?XkG8Jx9I>`%G z&7q^Aj?X=`mtDh?T(Gc>w3{Xf0&9jRkixO2AZv~>ehk&)t9Fr2RHYaf-Ri$6>EqbW ziI$KO;3N3X~4sSPUx$g~TXX_VmM}yI^DjVU-D@TkiRS`CaJNMo1?Kq%<9b-a%Au3Lf2w9GfD{ zcQ1eD72e&y{&lOXh1$P=fAur_*MG(KZQB9Zv}qF``N&7k+qZAu&WW+ngqZ*d=o^KJ z9HbMld?DhLmAJFo3=~%g7#M-AdyVmrU1ywr`e1i=_rK5VihmhP&Rl|-_50R$zx!PV z1_qiQeDJ{_D$y3q!gXCO^@|(o>n~ZqZr$dOe&iz$_Vo1Bhq{GY z3PfEBRxU(dd5|%MVx0u%Uk6W;cs_UArGSL-Pj(R$w z*wjD5M6P7PSw>POn-IKu{Zi5)C@SRdpC~#A6$`4mrcFM*RUR1<*_OLyiB-kj;zePI zZVagbVc<}@+6E5gfbFkKZDdx3w(_njYza#{gIBSZxQxA*YS#6~0^bs)gPxJl;B&h+HY|;hg^Naocyydp7yz8#V z**i1=DGTtkqXsRcWrL_lq4IYhlYI~z2azwr?xW~E-RNV3=!7sqKYt*sw4rXkIU;o#g8sL%(FBZSP<90st#V>U(Ub5^9Klt9wca#dn-)!5y{q$&nC4i1* zIB6O3{0%g1SWVlqMWjw$L++GSl!_%d+K(QZsJRMlt?lB<=UnxM@7;XU+kfA^dG2$b zJ+pB>P1XzzaAy6^^^YGlA|g9??w+F!(hc3&0twA)pLG@$-#4D|LdL*w)9U_+lWzat zYP$<f^wR?Xx_!HUphW_ofKPSRYfr@De#PSa_r*}a6C=nPqozMhA;^J;Kv8!Op?im5Z#N80 zg0mc&>!G93PMoSqq?Xh;{b{AmXrONxHt$7ODge5!J}Wvq+s}CNN!Yu0@0RGgPUO+~ zA{-q;kB!3Kqlm##LhZsetJn0u@%`^S^X;#Ey#hGzGDzfeCHQcEV_< ztKz*%ifXkV%Jar-V9oE@prgTv`v@GZkk(&a2?$U)N?Hoz3Fh|V&l9JswE$8i?@?%{!hL#E<(LdJ)0a3jLEihUA|1JXEBLfDnCh<>fACOGE8o9CohHc0)x z5yYM&=)NJ7xIN)ODurmuqLVHt#~xh}F$uK@fr^0V!fID%2DwuS{2KJd-+S_jC+GafKmS{FFE(!6$ORW%@VPBp zw!Hh-zqwlj!t*NO<0xorf#vhi9WA7q>ZxyRLCxu8eED1|4fWuApnQ~@L8McVbdJMA znq-1COvA$F%N6q7$LQ`p7Jh30;1i$vBp>|1-_LBGGYP=VdOEMIk8EqwBu{IibOUeg;EB19_ckdJTp{#d{t z(fA_16NcMmP^|((fSWbwaU$>99oX{LDt;n3`Hd7W9-ok1LjT zl65!m*1NVbQTBNAY0D}5zA?2y8qpnX4SR%J^=Po21!1)vL+$^hW59g}$MW3tL^nU( zbp+*WNJ&r$g!ZjbkX5fyadf|m%y-P&#Qs0h0Z^s_4g&PhBpmF4ql3u($56#m^=|hJ zBGM^zHj7xZ04)Q{c5uL|_nBwLU;)^D2%g+;^!7o_ojW&o#dEIgz43;x0kCGxNqXnb zCm9_b5qLf#Uqm14GZws{rEo-NXWPDG$BwO-KYza1wryMV^j&t@rKj)OwddW1LZRBr zNG71A5thzDc6H#^*O6^)hW1vb7IabRY_*SUV5qL83QkHO+gmAijG#v+!Skx06=f+g zeh?+TCz`&6`SVQhpGg2_)?dJS!(0DmelnSQm)$;LRy&!NIxg9;60hRbRD>a@E^KSp z2H{%tw*k6^d~dU7`C5^Y2_74oAgK5TJf$>=Op>>rx}1F3ptq$G1k$&(xhR_225GhG zKaK{ctE_`6>GzjGsbaTNyc&5 zJ~+WmPaNakgF}qu3y_eIl*Y?mc#+I+4YI%XqCZ7T!|D%6iOvUmf5%b)*(XI=iR z`*%LE{YhZ02t4%m0~UZMkP^|}(YAH&yjAD-4-9hb*f9<8`q#aluiyA}wr$(-@u8t1 zo0&>jI2&fSBf45iv^J5-X3<@3%ewH(w-?FCq&il7$j(Ax|=!A-8lf z#m)}=VuheoMrm^&gdY%uV=CW6D1|P2Q1PHpLKG`d@dbs#%*Oe2`S{LUf|>PH>)Fq` zg4^%Bqe}?cueH*+uHd|rIP0Y4{QG-ff}3!T5B_!oj{tsJM@BXAfNXF9)qe|LBjE@> z^x%{H_=&@4M}p^Z)v5)2?y^%TdD_U-N{QAUf@GxD7V`At^L{C7F|I0RI&?h0%ybSk zB5L327(`r#2>+NF%k!2{yMqy=}Q_|t^M3L9sx|wTF zp2ur9ETiQ4v0svCJV2Vxi&6;3q(qI0B>j1hf7`l;TX**|S@A5rGqi@*MhZDhCr+TA z`1=n!Ft0Z_3H!R?NFVG!hNyT^=yzO)*SzL6eDlU{5omktQo_0G;HNAfe^nrZEK-B4FQGL_GD0L-7ikYmS= zMF04%cf9jMU-*|VevGi^v2GbGn~&4lM53X=NC<}SJU)&dpMcRRBMww9L$M5%01*V>`)I8nzz;5* z**#}E05j`pzHYzs4$eRCy#5D&`&;8A-`S38XyDX!3(2OEc!8ScE*E#At7`0r9QxXp ze9WOPW?5Sf6nh89BZ{_kU7ojUE*0NU&cfckz_qVqX@yS_{38ifrK;vSqRK^x2kyvh zMZ~p(1O%!owmVISzh(#^Vx0v}6#S2OIL2-wZGWP z;>JcUS=vgeV!)h6I@d*Nh1MR@buCC#@XZ|u`P|0c6!Hp@wmkdL0$Btmc~G)OuK&MP z3kk=(_UIVwJXmv^7cN}L*KW9hXFls$Tz%EmTz&P`VOD7beX=R^*=xad?J&m$*MS3l z@W77fUFsX_#NGG&CSjB7nj>gxtY>m6A7W>;10t2pmZ$Q$j>h_WCUZHC9XrDN-uFH} z^O?^85C(rhsLobcFdL_<1Ghel^p(M8^o@`>Hh_>uf?FpY{KhO^U6y=PBYtBYekO%Z zx+vFpQi#AuI~t)}oJXI;9~p%`hv7iaanJEIE{>krIiEgjMhIwTop4=w<#XA$Z!brW z9s5Ys-Cetwrp7F9z2-t@w>JzSTJzZtz3Q=II3^&6mb76)zzIhOLJInFd4Bjr zHxr%*Dqwv_E7z@GO2U!Vma#U$Ra(j4`0K<+05u6mjlx`P<{l~i#ap+bAaJeiu7NgG zI|NnX8XXhM(Xozm2n_taWb?nQo}$&f7eZDOIRw5ASkRDVetnw1y=MojI~rKi(nvW_ zkueiel1#V|Xg2kZasB;I@Pq9~@Nf`GX~!{f8RQVolovO?l8_h_q>-JJ9>1r(n?DqM5eBOSD}!flg(yDE}xHn?zg}FEdWaw zFFr6fKHdxnl1VseDa@aZY-vJx0a}9VIHuC``YFX+TqcGI4g`d2yYRY^4w1BO+7>h&~=n+e9f z`4S_gVzh~$Hn)xDlxteb2s`)JC~II7=keF#5Mtd0Ta}CH!bDmdB|o8TQV}ZSQw8~{ z5dCk}=B?A97PYcQ;kZC(Z9VK&1aOQ?A%r85@VMju9|5a$%v(Ov9@5qFDgsVUQwyyI=v8aS7S`yNO4jhfcK0KIiD9PG7b4nj1ywEXDQGdHN*MDB!#anVH= z|D#f>00=jcc)X>x>2v@K?yFe~7SF%>$kC&-qYu==4w&DC)6#;H8a015{)RP_&RS3L z^fi>%E~m6$E|u06bTVncx}Jyd6^KwIOuE;l`Kh)+Ja z9bA_>q4~Ef&*Ypr?Ua3GRoki}KhtT3@rp#N>Nuj-pFmYHViB@GWaNj5LA*OL%~sd8 zxV5%Pg9PnJL=adYT3pj#ptL|(9RQ&eQc8rh9s$XiD8$<*fksGKz%C3zir;jPj~n6-D}RIC7mRj6x_VC zhkt!|AA^Om8BppNy)wN2@tYLA?Q~IxKNbTJ%2C-&W6M6+u^$fgL_hYzYhJ)NZ~9N_ zvsna^a=FY4Uho2LyY05>Yb}`#FMlSKEAXw`V0aRcI4%$VcGIS3oPFwPmEW@^j|(BR z)~W@dv9XcK$;q0Zc*ZlHv3mdh{X35wIbzPUAq(fPgQbgbl1Y>ZNG8+J(uCj9h;C^{ zB{Lv=WW_2P>cIS|B#sa$J6_XDAY6w;v4nr~ZK#7sj2y6eCp~w;g6`M8{N+nN^65_p zLY!DZ=>^w3pP%0HvzZNarUNjup3bYcyC>|2Lt7INaK%|C;RVW63^G)&Bi<~J>E_o` z0K?9$wt4`>Z0;2rEdq{=Pg#1BrX`hTOID%yZ4rDUpH;>{bDv9LMI7dP#ppgjKWzn8z+>+2}wihw4SN^#TozsKs8tE$iA z!9KWS6FjsNh9>~6laA)Rb1pu7_Nk{;KKjv*{?2!=&(;^TRxLu9>1;gsUuAIz_uO+& zmkIv%Jy$P4&hA8HQv^aIm5VNxp}UvVW4p=TyOsJaJ4hVuhe`nv1Zc-a;vl82(p$Bm zt4cJ^_Wh`dDa5hi=>1z;TF1MO9$oN_AKdIeRqzL9g8xhhU}int*VWfN?_0P3;?}?R zR3Jos2EAbwUGqD*_p^TkQkkHvl#R<_JKVI|<27>#)PrdPYhfpV_`F{8w%fOG|FI#^ zK3A+*#Fwu)g}ilJ(;{RJR6Wwe7Zb5oc~}Y81pjE}Z`yAkcvo9}JZWb+wD3Wn@|G{22-e>Dc&KYfVB*dUIu7d+VcU zrRf>ZK`LR!EKz1D{{PvfZ2P-v3#?&(FXHF`dg~sTiE@p$o!OD^T^dww&sQ9jMr3=3dpop3#H-~F=!rA)ot zP;ZQQHmsnoF3nVK%Buf`Qn)(agN_CN>H9`Jcvk-@oZaUtK1ZhtMpxa3(`Ps1;@ELP zt&MLDen7?a{_VV9$?3sgRl$4F``ZRbY~23)f`3g{!^;0^G>#T{8tRe>5<>8B-zY!X z*~?=`1~@WR1jixiN;$@D@SjHpV3R&Y!V$RA;jV)NjF-yfD#`%x zbgaS;H39zD8#P7+Yh7T2m!a>b~{&JeKr5~Z(riP^Uh<% z$`yR~rki-li(kyZ;Glgb6@Z#EcfRa7di421h~F9f0m7hvqTt`v)-DD{hV}jT-ushs zxugN98nUovDWanTEhRz)=D3A2qFO>Aq{N@qhM%cJn~wlbImo}a?33MzW}Zh!a=W`3$tf&;|H(h(hW-}l)NhFO@Rs#+!!g~P;4g>Z`HMu zygF8an`%!Wg{CiG<~cXti>G}ETz>iT^H|Z^K*=aTn*zY2u_= zEi9-{laj7Ua1h3$1_+cQ5Sq!7&(X;O2PX>b9GK#f-XVIXN>KK3q=TDrxp00LFI+j7 z^A@y_bR>Dtua3T>z;AH~e~t!%8q$u$SDJUJdxmYa; z;=)bJn)yuRVf$etm%D8r42?y<*3#U}SHJufUh;~U1Muzde1|u_;SH2aB{Wh?p+r-2 z%jsidV_V+$!N21(pZKRg`p`b~!Rz_QPkbDJxt(3N^b8JMZHN|*V8e1)w-P$qAux8_ z5(ljUl0qN~d6KCVI+>)rXg1#Bc@QYHuW?FcoMM6GRFPz^NFtXfIa$I{3fBo3&lMRS z7>0+p!FVoepc(6IN?Pf{bDw*q_~kEu)jG3lK7H2=4RB`FtlhhJ^P(5M=(^$I;rHhA zc_U=9U=EG5TlwI%m!qsKZn#-1Yic7krt%~v$@`SSRYb~q+KRm~d!X%*Dj;F?Ou=?H5X-~&={!OY7>d;5=U5DL+X&nL~jB{MbCWu6f z0PP@9I8u@nE_WOn;ElIFN^haUTh3m|CofseE7r{Cv{|jRq*6FSB7|i##B~saKuU*t zH^JhDI!>S6!evW3c-h)TJbOte^V=IKX~-7?cJ&VN%YD84=Ewj-!2HH0>J!pf&jvmS zjS@1dnGFx$jw!-~%g*IvmoyrS{7>U-ZPFCV#fm6_a~;W0!RL*?+QLJJ1|XS0gp$v3 zN}saxe=Vbg>3_ErQq>NUvU99JK_-o8%)oFCx>}%6hP+YqE0s$8_@_T%Vrr7J&pwN@ z&OD1;F2_R;KdiM@V)fd!H~#oXKmOK@H-0_%?E}C4gAU`;%bvlZgNFck{)=AN_TBG& zr{&zU&wbV8#N;D`Bg3o0n<;0tqt`8md0h|~hf0%-DkGENdsGhhQ5l{o!hxjYkaQ$z$0g}VTu0(a(^1e?Q@)xEL{TyN zewFVpqmgrH60e1@u7Xt~nyMgx`EDwiq*M<0%%^5pq^?(z*>vY>^ObSVZZ z(!LL0Q;MoxvIrq&w%zR!Pzn^4z?94F^(oGq+r(AN=kSch9W3f-LOKrnhjZMqvzyxw z^fO-ZXi2+t)n{>qV~vnhRqwzatH8Q8MkYM5yy`e<&JPre;iVYDtbTE?zf2*Qpf)Ozl;MA@&Bm;7bAUuY#JKVkSjr3BMuThnTvGtH$J?P zpZ?^h6p96|eZ{p*OiYN~yY>vUv~~RLr#|`dqrdB|-}|1w<)MeGqk%&Q4{_NuFMspV zBS)9(Ao$VP`1r^6@85rAsZIJON;z|=w^wdLkZ+rqa&SX&+V)|BL<5ANc|P5VJAE?F{%uU&N}1+Q%JSsEcF zbqNPY3OqlcFIS-_muIpPFkUQ^a2*6((filso{NDxwx5Sp?VaAc~&y+``FZO=guqJC6IrT1i*|*WJJ{zIB2D4O1V7LJHZF;ew^;fqS5dVC39o6$*7MI z&nCtHb_YNo?+R7Z8L-!|Sb;+Wh>>yh*d**c1o={pbKZh^3z#)`E`tLDdk!7if4&fM z`1ig07eD`n3x4sdTi^ZQgAXJs<%-|l-u}F?(J=xuf3Kc=CJl4jVQwd4v2ph^Ig*Sz zaYBPG714+L5F2-(iv?(JMa=C$w>9Fr3EWf?XT@Utb*m^hWDr`B=^IAfy^-?JFnVwt zF+7FV71N$fY`iTRGJ%?;!ZaW(tjj&)2bhaYVBwHHM=bcV4Zx)GP zJwR#a9`v@oFqMzg9BU(mbyjo*B$J3_5+o!Q*Oy1fKk-zT@1-w$89%uBW&j@FvAyMW zuYK*$wm!P$bRem; ztUvWS|J?Hy^!4{0IdJfx*@RA8&7w6+`PK(tN^4^_Lf8rW33Y7cq!0)dprrW`!}qps zdP>-;IWTzq$p78?!XrsJaP7}G^60S<@O`d5eHovw!Y3hIdZtRe@t2$NrQrM5oI_WAg1lET;yzL% z)t{zqZK#VfqIgwx{xm{62%)JXg)5=p!OtM-TXl=xCQzSZ@sZ36x?%M_v6Y-wa?_Jq! zhV|>#zwhCV8~=Iwzy0eCU&?;x#&6Hrym|A)bFO;sEssCC_1vDm-s6%SAq3iSp*{;O z^)NIJ#ZowCh<>)Et(6TMHheudmixq}Esq=lxZ;Xua>pHa&1~E=3Bb(yQ>=74HQx_{ zqrT^xdEW)6aQ^8l`L}nz7%3D|7&@Ck5GW{mKBd5mTIX5Eu^RnGsV?a_2rVe8psKwe zwN}j|=m-yGXgCINi#%1$$J=k)iYo*nNij<(6I?Y=)>^mw;c(sYV;nW;O-azC{q>mL>|Vc zU|@FB?KTJyfkrE3 zs(Y=>sLk^bzKi?}eKld8E8*)#{7#`TR?J zdX8CKN^NIDB$MdIEVMKsXSI@SZ9=9J6mxmBy_SrOLCLcKNAqb|yl63p4j+2^wb#C^ z@1~n>{_)JNJ(B>;tUtl};0Lbf6QBC{Y`~=Hby>s(r|?&oZ{P#3xSXUEl!JiB2S?e` zKfy$$g4Tl8M1t83SsX`EpGeS>PBP{Blqvzzb?8VZSk~G=MoKDL;rR+B42NCYwtd<2 zx%}n_jmNtRSUb0i&XmJLhX#1b`h{G3(oz;QWRN1j3j~3-+ zjgKDU@Mw|Mq#nmw#F2x4PSw9jz9Qy?&5-Ps##sKkhAj|iD0`4AAjWg(i5yH7A)hzj z_X6-L<~&^&64os+l|W`vsJbkoK5aBN(n(0CA>kkch4z)H_`QmGok|&eZIX*Z!C(`L zCCC?%Q)SfA-YDsK!HZtVzkcCgxb2SH`07`_%GSrWo*?T_8jzpk!00683joyDWjTE4 z2mzWxp+LD*qEe}l%jbD=+cq9}=pi<5-ZHU#`QnGRKfXP6w7Z*ZU1p9D&Z?=Zf?;i2 z$#G0)qpcZQ>u{T!sjF|KE|tPfxM-#EeV=@>z*HfRp3K9*5F8tXvKLpq7R@cK<$3ex z-uu08efOm&pSphH)vtav-}=_KW;XJf1Yl_yKWe$x@a(L3?(8L%^TIxA_ zb_a7BvUoZ`2L^oSI)Z$~=ko90&qSdBZUW&c>M{;rzG4IC&S|IY1q8y>y2iOp8SxVo zN(!WkG0v2>LO`a~ZQ2g5r38XRAsvSx2)KE7FTdQ^%}drUiX`smIh=w@b zuPVcDszyf|CdNx|d59;vCn4q3&@>SaDBs?zP@6&gSqc{!x+dAQ9vX$WY)1fk~mYMhd8C#biE5p-@6q0yx|QN4mk&RSRN^wR!Dp zU;B+4Z@lrf0PlL&yZFKvzA&?y&m;gd>yKSmTye$F9e3Q(4#0{9G^}364S#zL%NNgQ zSKlyeXSdRsa`Ci-=bP4f#K{-cs#gF)N>YwPLIji)>>M6v|7ecJWP;TlO|+#_2uG0= zlEGq;^S}8ULu*nM<~7yvpU*vmWvva2m;Bm2S?EYVK*j$aI{t}ij)Rs$XbL)q!0{0Q zIKrhdD;Sva_{QV=$p!GTH49kUn5JS|*+QF&)o~OzJa&Yy{B}40de!M%wR{d^g$hFI zh!PlvNrS2vf6_>#V~T|lLMrUp*L+_@Zh;DrLei8>uytU9PdvDjZAVABYTZ2EdHOQi z>r;5j1`R7=9P;(0Rs@bUFcR{Fvk4OvRb=ubwF5H1btE6YXBR)+egv`!6EwAJD(2AE zFWz2xI;@z|WQ}=Ht)!*-UlsdVw8cD_e~;T#N4$Dv6N|VTB-*sVhex4MMC|KE5001) zz*BDKqJ}@RX3ZL2{_>a8+}c7@LnCwM&ZVWf8Lc&U-E|jV{NfiG43!I~M+HZ6_8DiB z&rNak*fA!?$N#W^;yR|wlS)8KBcihvTIzA?vLs!H`gDeDGEG8CYx$uqqgYg*t56DB zf+I8~&u1!Mq!^S?Q$;w?2mOO4!7|6I(TMiew#hTkKI;{ZBX9fVFK^Xno_QvlHf@^O z)MpZane~URb?esa?c2ARt$F=&+SV-Lhu6Q7Ijwahgi9sx@uSU98PJW=$I*S!8jZ9X2GbR?g z#>EdSDXT+4Az={F#5UMSIgq$Qpz$z}!cf(e23I(w5-!^Y#(DVIC<~jjTrjVVR6h(Z}gr_d7oJHl`#KX0VJ6~r;?CK84zD%9n@!W8nYy`8Io?2x(86lvVRlBVPd?a7UTaWQsbj|PJ4OgBGLQ_!+ zWvfK2m1roGV{~n+R;>|oT~;fkK!dL|$z+1Ibb{I0BpZ9j_}54FP*H;WyN4iv)m=@z z`s78FG=}~rO`BL$rBGr!kd8!b#P1FM;jaiBAyJWUy}@U=#2&DxF@p1HJ(fn1({ zeP}laa%Ik&*Ft^D#S4^G5tQ~8E0F5MNsiH@MN5U!5+M{R1basdeB_=T6oQHYxakld zA*#Yae>tC)6Q5HgfF!DapWaQ-v9U*FRH>t`h``WkrJF=Iq)iLGu^yW0p{c=C*6mFO zHJ?nFq(cRN781??1HjOJDk8@25ZcPyG7sU(amtGaZ1L^}CjoQY)p*NcqfD zxbTuw_}V+KLHR~lrrPQ^mcBX=gt1=72E9Urp7&T3yD}A{w#@;HUaw2I+`Ri3AG`B$ zDoF_ypXaYx#3!Dy7Qd{}j-1v~H`11<>v6vKHAq_~04zPL$0j_XJ zCtdD1*w6d_>j^ruNxt;#4J>P^qu_fWTm(K6H|FLjj(Z;^toe)`Pb8C)SO5G`HXj{A zBvPO&Xqhyv|0v+;zmRR`59k1dG*{(B)ouLy5okq)EC@xYIvx2>#42Dx(5p87;~lqEJB<3Z^P9R-jNc)Wk{!JQZsU#K#oEViFvSNk|%3#!M2Ow$**w zeo1MPdMQacF4;_mlgNRt8%^t(5og=m12Y-`JQjK%=#w z;+M%yPT}jo$TL5AsK%=S(AjKObar$uJACBufiurKhfR+>JhREi){GnA%&J++wiJcy zqFu?tjwalsL&5i~G;V0pW`JWRsKn$`<9n8{`eZiZ8?hZjlS4_g49I&GUUTw7QjXxg zcRU8tr7N2vp#>GETA_z!k`4pDl_L)SUx!w})4^;tl|Rv_KnOt)wLzt6g^9p+10X8| zXU%J7_sAq)-*|x6pS6NBXEiceR!9Lp9?qYm>z+MH2M4WuwCf-&|6VEy(jm~AsdAa; zES=4|jwU|*npP=;5aLahgJ{QC&)qD6qzf`+8azimCh=0gLJ zNuu#VCJ~{4QFMKszx=WzeEy_7UK8Mi&x*y4XcO2XVW#lGwcRZf=rt;pg02*Fw4y3L z6pN5AqRSq-IjG_Z0;|p$=&DV&uMB%2%#MXNbUXnc1T#DROad^oo^taN z=!6RbX1COn5DB#QsxrT!MtbPhCZ6Iou%cLsl5!AM6ZXNUH-Nm?)R&$RzmEm8bIE9Y^`c z`*-ue;Zfdy{wmtC2}-`ku_8f4RJhvvErcNLI&2vl=l^5xy#pjWs7~#4tNE9dB3FNzZwnPu#J|QOAOJUUA9^;FKdJW&J%S>Z*t8 zuj@1{Kq@Hh0|DdMG7~VTQK_qK`h8%mBd~I1mjH5|(ADlH652Fjfh}&`)u=Nsb^0F+t#l8x%s1(npn8V~D-5mvvOtv1(n2O5HjT z3EXR#Cghb!FaNfs>^LfXz@AnNyaK7$VkqQW$Y!#XCMT)Qn}zmu!j1uS`yQCA7y%x* z|2|q<+jg9|;-oJDe*y6FSN;v3{q$#!?TT;H<24Q7O>cTr!>&^ZGhhPxdkX1@k*as9 z>Ja9(PEa?cG%5)hOyeKDs$MFtr)rnWlG87tWgM1gGtxMx?)L zz4srx&sj`><}#Sp9Hyg{pr?aOPbc~Q9$IGh(>7}cZ8Q34pV3dpjD9-$`snKKr?a=4 z&Yo`CyE7-MLM~Sz%w#Yoc{-(*(0r##oLU!v(z*a-a%QBzJj6$D`5oP$WUV4o zuBS^R+!R6byv76+T3TssYb9uDfyHy+?2};bjO4CbEEdg%jSsyTSpVLCdEW~^`{~cH zY}vAA0MN9ieei=H{OYTR;yk)uoDQQx3iaAK)Fl1|LGmb_ywWPo*Nx*)Rxvezj}JQzj?m>`|)ifCv&9vVq~|?fY4?dl(6)k@`sE34gQ! z0DqU`dISOo5#M%`DOeLt9c%rXCfpF|R6$Y|nfktty)$=+is$&~yd*JK(-(5>BuHzxIf#DrN|+B?a%v_hc(r!9pumqWhA zg9IZ4mc8SxZ~On2FJJ!E4I4I~s+@k-nau#8X~(v0*|O!5dX#M-8_?0#QpW`}h}a); zgeb}S6M0wl0KP`&pDsK<9wv%arC>t3^8r2iES>qlPrf_Q9thTeu~JVatfr;GgUW_! z5RjCggR~6&a7T}(N0o!M4OL@)xqFzGoVpkrM`?heG8IF0*tG!u$gV-CP$j~ua_!}( z@Hb~I;$_$0&41mqm8=op&o!hn$yn6DWHsh15AJ5tMrq|?iik|p4x`|3>cKBs=ax{_ zx=_~<{Qksu9kVShO{Q_IhK&6j;cF{CxWX`tli8&giVqEH?}yr1HH- zK~^iO#3HB!SQSc9jaRKYp6jk!#kbdQ=bwK10F}s+@#TF{7YvvH?%XrP?Yo9>f)1K0 zDINuJ(J@h^kfW+9<8VjT;J7}*fNV!A*-Q>{1vqILoO-+yR`N&F#*LdU-1yLjA9r_m zykTU-(HFnuB`D2qGLdFO!*^t&kmRu(E69itlu5p7WOkr9N5K=HA{Lwvm5pm;93Rx5I?e)8O=CZlu z0w)P9M$!->5aR$yN6Xt3umuD7R@G!-uLg@ zr(>hVYZotB{Ilz>`|P|geBpnZ0YKA^!DB(|1@t7d&3W;b#%!T6qd#Qk?;GTGFp#A8 zPs;vc+|m=PX{8`CmX4Mz0ggb(sCcC~O{4pI5R$y+I!mA)lK?AaY;YcNXN z^a*vVSnNS#OO2&`nTq!JiglV0rA&X0DSYP%##e|%iK@!1wj2hF#*&f+`QXGme?toG zOM!sy?~a5AiArt^(Fs-dfON%2#nm61452XMAfB;EEK~w`d>m=yzBspz1 zZQ5ja?A$pZa2mjS-}_#k``qU?1AwL-V-|a~zG-lL`f&NdH1MB`#SeiKn3{28)v*W) zRAObQ95JV@fC&=K_y#ANmfY(Mf5{6oB7V$I)3GE0{?Ihk2$Z9kTX!7b>XT+uj`2b` zGG&I@Xi_rgs2FWaM300B6+@tow8;fJmYT+ll_Fk!_Hn%Nyyg7+?Hl>{oey!_?qMfs zi+DIh&};!55!HY???AeJ<=`oeBd@|G4Fq6XpGrzp3jJuJ$!4LW4JAN3+u)27(Bl^- z@81+B##Ke`IqkGnpZeT&|JD8VuYbK605t6w@cD7v-tYr9QYI!V4&Rj=9E}NoTKbn1 z_3s!#JOf!nb}=0Qm^$z@b5ybh`U-hRV{4KLfT@mLadZ7DsW7e+Bce_`^2Y)5luQ5* z4vf;5Z((JBCzWbk7a@{*8>4|u<*2B1r{kOrV}eu0uDslHv0CE^3%Ysl#V7O4_4|pc zRWAV52+nNoqa(9qaH!uOp&w@BIOR0bD)GT8L4dTjK$wFdfaB)F8Ot59l8Jp&V5G`9=Y7;7|b zha9`UL41G^fC>@H-1a;znHYi)wF%#{r(m|h!EK?YHSKW^3fy^OlOjRv$b@LgK}##f z#xS!V&R*$$2Ur{P;M&!>+4C3Z&aGRV!wiou{k&!X(6rQ6oUr^m=?{^k`HUKr;Of0a zZOGh{%-EBMSjAd<=!t>ktIk!;KTSJ&B3Vz6 zWgSs~2Cj|g00TK}Ya3!MroA05I1OfWrYGK>9ox0Dy`u=svQgZiaM}z2nsyY~si&W| zIo&UD47G^Si4uW1l-#Lj+|Z;1Y*FHaoc+>Is5milfOGp(7uXPL)lIH5#8f zrAYNX`o?y{A8TXPm~5cTZ!1uXtp^!49T{p6F}}oaxohtzqt(RWTmRt(o+!v3mJ$g~ zJJ#3m)b%_CzJ!G^hqkt3jY1e8t4?xs!alzl9Up7Km^;Y^Jy_+R-};tj0MN9f$KL$r zH*>)S7mTKRB#OaWM#d%xjA?MxdWao$aOT}8$(ttnUQZw)@^O#l97e(hm=8lt490VP zrxd3o#fAn^np8S;YP;dLo&nR?Pf5r7V7OdmW=kugk(UN`a<|8FHamstDNv$Vxqsgv zaiS!LPILJ7PbtJSt!aMv?BR4s#}<<#k0Ydr|AF7%^^2(i=hKYq?X zb_jiI1Th9RV0+D z1VXU~EtYCAvsweCC;{mxhX_bmS7>Qk z(+($RC$6byC9Y2w`Gmk>1KhfmmK>VPL4=zQSh=~Y*W=Tiz4sxo}FpEE}?4L0A)$iNDJSNF_j{Ca>I&xtH=};=& zm#FvF`^}QbjGFX$r#|lQkr3433#n{SHMaD&6nvlq7B7W+ELQ*$@*}Yr5%!JO*fC!6 zlxuqEY+srsfTkVh<$&MvBN8Cl3}i#7RFFk;Fsqg$nK0$d`t+wh^U-HM^O>(wReAH9 z-`orUns#(pPfxG=N2H(;TMvv8$B`r1F`7EB;9D z&8|W^yE`R_Nb2{J5(3E|g*H!^1GRAqkx~@Vlh012wLM6`{TQnN;Ly{8Bm7%GR3xg| zrhjkR(Nr7oXN^1CG$9hp4!Id{KYSN(d7qKPn!Wi z(~eZ@?d_?1kA ze4XB6{(}U59xeemxK-eX-N*+C`oJP;eEZ=T&Xtl8OBJ%A@W8&|Cdj{OM|W+Yfqz7@ zo+}`(!i*m5IVU>a0MJr-GV{M*{_;&6!P}u305oli&7VKdrt5j4M5$b3V5EpiNqqcR zpvM7NThIKBF==+M)-mQ;(=arUIPhsW!bCH`T1_hl3H@*qJcu^(4g85cW<5BNP@s^> zrV|f>xW?cy?&(}D#DFNV3L8hpU8bbLAFsUBw5AUqYy`bs$f^@a z4n%9M3h4QNagG4=^mH`?fTkU}me1#3lx~EHNh*^Sb`6dZ7&8TN?@DE^M}AP>J$2p( zPYftdUtntf?!-CSB?%-1VrvP3FffiH6a}My6s2(5 zshA$?=%4;|(BnK7=cBP?L>MmD*ga88rJ|eGw4*HoNVk>XtCSY3MY4Gp1XOB{Flf~Z zBn)wNQNtZyx$D5}*)!)34UIGdfTkUp_L|qcn(ut)yFX3c^5{5~a+U4-hJ6<9h;h`n z0wh6*H^}`en$FgyDgx>vY4w!B#%~+-RKTKm7QcjXPV2PZX*td`EZ0ZM`6t{25NnKR z>;eFdQyJnv3Sl6Pm5auSgFpRi`r|w%W|dHcp~)Hp#WI+HRR5uAO*_)jh?i`A4OKH)u<V$)p{4ELKq88&Gk){X%f6?DAI&S}GRzgedmN@b1HFVBdm zdWicycFB!o|GF6fH0{W)X(gH}z{>F>sBuauJ z#Ar(I>(ulVk=V`hTSvJYE6i;xkjsWxtKJEFG(L4IK=~8M{_8?FQjh%8Q9~sZSMJk8 z$RGbv&*vR~BMzeRXZKaVJ~Hij#7{t2Bd93WetL0}Anr7BZ^ z4NYs>u@D1@Ki8~3z=8nDWZYh;#c=WxWL9@VBwb@bq-__TY}>ZE*;{R{%{C|3rp>mk z&92Sb>^5UEHg2}{&A#8CnZHlX{oLoA>s-(*+;7p}g2u%swK#lNy^oE3Tv`}^1jybMuNGP9)%49T8~;t2wd|E z+(3{JNK%-MLhsmGAXWxq{Z%=k1oB8pA5YE9k5?^NeUP2yIw%;df;a#oYNRP)-v%gL zf&N69xWuxA<}}8?n|7|Xy-nOH);+236yR-?Ah^%|whkB3C9-MFh>>SIvq%sPe34I# z(@auSt;e?e{C(K_3~QSe_(!IC|r&l zCD%qHcI)5_8pfsS%U`(pko4#%jDXfA`t;-Botv&~2WM1hHiGu=@L;$S64dP<(t-K3 zzA6pkVywvUgY{&z zQ(F<-&}h14pYo@EP~SyK8t60dFJnIK2NMv2?S5j}RcjV0FeZ7yGoXundONL8Zbx-H z^bg#AX3RiZVhDLW%(@NcAKn+j4|zYm21>aCi3}h6?H=dSyZ@`zk87gcyJS5dzpO+q z9Hg``hE!@Vt57=eiL;Hlqxfrjg6Y^!OKQ-QXo?9(25}2hq`$J;))%_ny8R@E2VdQ$ zzn$7A!ulvZ&Pe{8*nPvuNN_!LbM6cBJ7~2+2ujeUmeS0KF_mWGksim`-6u3_j`*T1 zX{S(#VLX-{(DFU)T_R1VMrXBw0I{Hem_Z{}c=N~kjM@rX4HDr{C9)DIV_uVdxZ}G4 za^P?r9(e_Pai$PM?oWsyu~8TZ@|4|(F|dF*$K0r*zgH@gWEbaNDTN`8F=mKkpgF>Y zMVdou@Q0i^+-L837&-B$p5}rm0PGRy3zD8TuYng0S8y!5}cCEU_8-YCp5p z~*`B9DNDK){8f zy>~{79-R@}UaGkiyNHkq=eKox{{)Dc?%v&LXlEs7W=*1kQ1#2^4~=x|GGDhZjd%As z#i$00rlaUk(xx#%cPrf(6qqHSC3FV@8Z=<#EJ*p-r?SA@mM+JTGfAu%E!&vEv|i{5 z>)$`iyL#7KgpgcnCakCD=d%jRXyp5#&7sma4jUkbb;*L-mZ~s~BO@v0i{%sxEX~5A zF{n}zv*nXxw5X(+GzztC5G0;g8<@|5`)zrs2Tc}76JZO?3Ls_<9xW|&3YBP_-33CJ z!46w_g;REN>cNTgMz^Azz5+QU@SQwM06*%8fp$H2kc2Q(S*Qxll-{e2z>qc}RX++& zTnwFt;7ViG>7TFjWgzpJ(tCPw{FNRrd{`6yIkgB}=tq_KZx+aeoR;3SDj~bhegZMr zzTbPjo>bMEdKRDJc2$_veEEF?(uFJjx^<$o08!5{R98ub?XpLRK|p2A{N3WrLBwxK zU^txi=;UnsbcG~`zbF0cOGoBLT1f)J7=HQ+taSNMeHHiP3>7S6bA+0CyT5S`(Wi?) z-NHpV>_x##`M$)ig5Z?!L2}%pFzp;F<qMh-zFx)bd*{PEigI-dZswzt{k`sQX%DRpF4Az(0&6x1kS+xYJYk~-%#`kR zdex2`_+QqL;>;kb>+y+-hK;d|OYf)>1JNnX2b&?s>(!#nq~&mUQE_xcb85~w&K zlTnc3I+Vm=&8nZ89#fp?>7l4+Eo9cN>pER03k+2#h!%g9V6a2$j!p8jER_4JClDAa zhO^r#Uw~Lnw8is&f$DlPyb+V%%VFF5QEf_Mk|uy?y(``u_1Jt;<(KBRprwJ})Im1? zB$&kMouj^6{rH9A!RM}5>%>AVnO3Wsx28h}r=vsB$ z^Bpol-{4Zm?~(^r6OxPk)sdeALA6FFx+;N;n2vuUyexin{btZ7Bt@Ash#XyW=R ze-nRg7TNv8fxGay^3A=QxuW+IaojPN5=u&~{^)xoS3|T0;@Chz*F@a-|6Lp|spx zivy2+cy70F(jaa20`v&A$P|(y9EXkec%oM1pAN<;K|B*DOh0WM(5xoU51YEbdFwVb zSwf&N$Y7`fBR_YwC5kdD>;PgU38~8jK}OTPW@y+{1aLx-?7YJM3-!0VNUzZEDqJRF zn#e4HNQkiG7QDzfI$i!LHANPbvD$Mh!`GXP6ai9CA^1ys(Q5*lU?-88aQf(B2> zWWQXg@;lsF_8PjCjln1^7l5w?3V`#0FOpFAnR;P=y%pn|;Hwd9y3aN^w(ejIoM?CW z0Qj~096#Ebci%BW@@4+tAeqp0om#g&pZ~6W-M%i>u4V%vrDPa(?|zx-?=7O0;|^(- zZ1EF9HYd-@0h~j*n}0jDE?srOl;33QPl|>uSj~}KCBSgB z6-}5ry}99ew!Q1q!rP2NpE4<3*SPzrXw-^0i?sJn5>dk?Q~kwgiO0=c%%ft1U<5W4p(0o>+GWqaP zP&re6sqOh&hlenhcoii3Ww6-YiUI{eM$YW?UAas!QaxgYoKMUGA6|z_VHg8ymj{Fr zcQqrMxUp+dsGT{Vx0}+fq?9+S+t%!8)Z%HvAiM1zoN_{L z%}+zd3ymc5Bxn@mS>|`8r09w3QyTKeBGmkeC4VmE9m>c{N!cHJX)Fj77&&5h1HS|$ zn35ZG_C^@nEAVUHV>7LHI)>!iul-J&Wu&`rxjEf$-g(W_^*pF z|6LZX_nr}VoKNBbih{+$XEw^a&nI>1+*hRdk_#>`!FtQS#wq7IM^wcZ#} z?)8KF@xUY5yu0h(z|K0WRk@i9{Hq}-kH64gT9^^y{TtX$rj(^luDiyzoEruigE-QL z49<@JQ0wAB_rvqHgqYHs!%+V5?eUAqKgZv0XcyLhSeVyYm{kN)MH!MXx9niOEOX&> zKCH5%WZchT%wJ|L+MzunK-N%QldQzsI8l!E?S`h#DNB})QhyTgNU}?Xh8kPWUqIU$ zwPN0>B1T%hVLr9pZt8NR;7!o7;wwQ8`nq(c(CR;27L<*DI- zk14zO^mzbTiif-5Cs5?u2}F4+0U6VAiSl>TqhTUH`e`pvBbmqHRyDW<_t4#{&h$3E z5IK}kGL-YX(%*cDVrsjd*sWNxA-*Rxi!IK1K=4xB@kBkis?&llU1zB!kB0 zgn%0Q()~0;+TGwS=p+5RI%j2!p|SJn!lwls*0sGtoQ)G;3A4Ri4WRa)e?GzfTtle} z%`43X(cmiTeIa=y`3lZA_}>3g_tq;JKEQ~Y#ae6AGYQVxy#*t)t@$V4jHS36!J^EO zk}}reVaU>M@ePIcV#IHA?Ee1NhuOx^ggvBzW{lOMkSPN@=Xn3AwFS2M|56xH2U_M2d zKiq2XLgr;Wx1nE+5xZ#W0(}`pID89gcP*ShqyUR@qRpX_nekb0R2(iJJL*1XKwJ!J zk2To41Yf@40tGJMnw@4(CQnz1s0^!=zgu!132Ebr_;<$|f`nv+?!YSj2IW|au(_1J~#QAg5LZ zJL!vgAPm=>Xq`ci$Va5|_k$g#pkGtuMOzE8ujUHR* zqW;!wPt^+*9KO_b2z>E279KTr>vToI=zO1hWwcLaG&qKZfFS?!doi`)Xem{@NSfdw z4Z z;x?MW+0@d`;vOUcU5LS9?9KZ)|5ty2RlcvoKRoG=-PY5T2XBo|W*3d;O!m27KUB*LK6tG@^c>kFjB%)7XGdfCco%46+TQ)= zj@eN(;;1%abYtj;C5*YC@q?P)2(T(kum`R;zo8yS^VWbH;K9Bfx&oC^%O5>!BM50b z+Rg`6hHoDN4n1$5{%!cfTfx-=i|Oo)Bu>3YKTItWPRns8UGHH&&E2g%&T2EZiT~WU z^_Ntv%*iLjRk9X}@8cm>=p)*)zImei6xR5&qH|b(hHW6S;i)3;F6I@1)E8a2L)Cvz zZo{+fB_hChRYhh9(QGQLzU($#33kQ?oC%;D*5si7!uMoNOZYs{|K_XR>O})Ms^s8< zfQYCIMT~Ojlq}3NRC)6|nyCb2d_ot6g?P**d}$2iL77Y0Qckvx6UP84R56h}mRZqB}F@ zSIWvTxwSyZR;U-(6#cX==DTfs-u?&aZ2g`R*qy-G{cL?U0}r|GF=FZ0Zj~T`-*Md@ zpb^b8rX7zL?_667L2fC$^!|qkDg*9mt$cKJs7&3V|l+{k!>yf>xv#%E0~lM z1S7sO%QA?7O|K;b ztAG6r3C2Ah+jr-qQ`f1Ax)T&Va!rSBJ7FKW&oQd%!PwmCNg*^U{BJCYF7v4K#l!W& zJ9os`COVFA2BAPnFEO;MF7Qk6?I8xAiwFNQ8A3NYVXC$Xg`Jc0xvhKQzn^@Kwf&Y8 z>|wNogcus62O8M@=^wC>4fl8e)oC+k5wKifh;^AyTkJg2;C71PpxHIy8lmw!2gDrh zBbcZyd=$wG{Vk1Q)(DImFw?wm{;9gV`9LsmX1qel;+k2>+uUV)-=Vnx{v%?Xo~7l# zhtL^1KRKbpZYlg~2PZ3F(Y*H<)tEd;#RBQIk1fnF*b`uKoWeXHPO3ahC=jU8JLYurf#=+>j~?ngZt!YA)i;x}eZ)HI{t=!%_MlRn6

&YZVW3!3DaM$9`2Lh+730 zM)z8Fd(cz9Bnk3$W9!Y}zq4t7;Wh08(Cz>p#oF9}?`#E70?W(eph0$oIs#!aN7=(i zwtWBBi?SyL}9jj0|WEFc|81T)X!@&ttomsIWhUzqo!lao({Svu52MS zlOrJl0ilS+GozmgQ0uiTxcJn~e!tdgp09iwjw^6xr$8_3fOO}0DiW%jmxLCc-&vDn zlIHy>SIX!T>z{ViTK%DSm(ZFR=1=4-lq&7}$nu5$e1!kae;5z=Ye5TYrDQ==LUr1! z;)u#KFb4M3sxXs-r}NeRMVJC1IlM2{de^ScRke7hP^8Z~;YEp5xy*cHOqeEjOv~Tj zIP1qq-_qT-vRK*G8?l6E^%aNvbI0YjHPR_bfUXp8`ftaL2A=N2JRd*Mzdr3}t4GfX z2|)kbiUrb@q$zMKJ|*kYRFf6yvpp4qVjynYRC8{I_GKk)} z`t{BRDUm&!6qto6!oy}TpT$d~z>Xqr2s;|`95 z&ppt#d9_l4;({_DP<8nez=!s6rskw#_!!g%!2=uo?R=HldJ@y;PvKkdoXsVePSZpb_w3M(P%>&2E6 z$i4lZ%;Cy;Z-z(6QD&isz?3GFtNB~4J3;tmbQl**Q;nzAPTs3O`89O7+M8R$J%-;I zkmF9TnT7Tp`eQ6jC@r4h)^`7i|`n=Yih1crxs=)~F zLNb|I;1C}L9d=dJ4mXKZN{jwz+z$1J=kMU}JLz`yAeXVE%-5GxEA~#R=|GoME=%{D zX}p{Oif@t-rd^r=OK{eZV(|s$TBYCp+t#SfLXPkY$)363X-NP%xPzpDBOwZrA#Z<+ z+;2jj`IILAEhOK@?qjTkf|Y%b=a&rb2YNi?ZQ(dakwFccveeV7$ZUSp^y&+5eOtpUs|Mwv|Y^yo-EbD{b(&a z8MbYHZc(#QQt*L3G&FA%77K!E5dk^$S!lIbYh7e=7LaCt&rdrXznku?{e#ovv^#gFI&Dkl_Kw1wvX^hOVzHtD*OjL2TywC?yrz7HxM+i4j#lO_u#N1=pljI5Y>ss#S^ zg|bL+vX#4dO|#PQj2s0Ay1d zY3!7K_{VU9#A10Zz7>dTT`geE7S$FOw(Os9Y`8qG* zq>CPDnBXHrW$aLQxZ(|_z4*6eeRTM9@k7ZDn+!lx;~?1zM94frOAJwB7Mj9;wwVrT zI&`fTWbfDW^Cn|^eXe`@I}K9#?6r$ib{%S!H)J<05;v4h^vC| z6O*D)VOUOU__8j&W^cmlO(is#a6nNIQEOTKhz&zLrU(KpwhtO2ki(&?9CL)DzFE6! zu%0Gv!^6&C#W1F`2YT37S&v3$TSCqU3$c0m%Cc=sOS78qC~f5A##VQpl*8vu^j933 z|1DLH)6RAC$x^i*D!u7ojt654%ScW#-p!GgP-Lh*j102Wsh(wRxMy+NLn*03Hy-0x zpYX!&!xhhfCm?NRz|5XiITTgd-S?p_qtM%|MZvoF`axmsB=@o)@ZS?dL1syxX7}o{ zgl?qYmD|~RMu!@z;c9s~_x0c=1jaW6ma#tj)D00J7t+RAqYa5v&u0%u0n5XH^doA3 z5IT?|Dn)C{4XtOT0nMfT*=BiWKzJ{3bH+$SNZIuS(IB?VC}Z^yW{?ogaz1SBOBbz! zFExh0ab~v7gwDi*hmI_u)$kg0=)gXF z3U&%{^aLa>=oRGQ2q^3qyC3u*T`gDjD=cQYY6R3?(?vc_d5w>Kthl|^V1IuE(jtg2 zGZBAg_+Z95V*ilQ^)1d^dKG?M3aVs#(aWIkJ42Ib4(l}xUHPxVhO!9$@m%@&4wfq% z&n6~PJp4Xa;(MS*AIKMe)35a%&K#^~qcB4^9dw+dn!P1AP9t(u@S{V42oP*r*exf_ z4fi-Uoy+`wRpc3a=nL7R22sx{*$^oy2L+9efL;WRg4r#Ztig*Mcav=Y^7zyuK1}QulsT$gkdxkp&=2vh^7-!&}D0nE5;Q(Cj7SI z-J7QpHH$Ln;~3I^tK0D~HWN1MPIhg&#d4n~!tRfnPty9nQ_Cs^tqlIj0$_!NWCrNd zh9hug^gh1ur$p*L;DdDWvIxZ~<$()T@U#$sbAyuZ_e5mC>r3OeV_z!wnHOJ4r|FJ8 zt}UdA_jLa^z{jhy<9|eNfm0ebzbmHqiz=fx1+e)~?RlHmUj(EAnvtIF0|Ft(A${p8 z4C$IRN$I$C4l;k0iUl<8S#Q$(6iFKZzhV_yak!ybVlTb+ZexSFCH~JHxl3I4m2A_urMpsYQ3a6 zchNrKutDFx_;IpcV$_pjY!4$z?n-2yoUaY{Y_uopPDDa%@!2@RQU@Bbt+Rn0Cx!&>A_|NeBnklsE4iSWnk@D>zm=c!r>7eQ?BI=PVztEvu9Z=!2G%$0wIA*JRmE-0u#ga9HD*2oBx_ zl4MFr>1;0b9dQZpnQ5X$3m{^;$>x{;~tCk~5xqC;D=6sj|P zWlUp8iyBmo zzo)nPUc&M(LlYM?s?9wXctHu`c=rQ4IV!Yed? z9~?H(59o1KH}gP1S5dawwQ?M_d!U##b%~%mfqe#PxAUB+R!JHusRU0{g;bgxkYR)) zmCy7SA(u+EvvEVeu}xCo7-4WpM7^Ap9`BDjo`LmyNV7zil`45au>~n0k%R7JaCKtp3+c z|26OKZcD+`(Z>ktS}n;-2q`S6OL|zq6a%3uWK~?TOsa0lxVcTz)s=JQeuK|7xl=v{ z$d|jB5c~I3B1&A}XgSlBa+mCp9()k;)Au+D5yz2X>5FQR?Ps%?+uPfjwYA@;D~$*P zD&9UmGX3m1F+lxtjY?z`6!*BexCWmGhx@ZNIP|-R$+qu6V2GT1R+J%r|Bep3KkeR4 zNG7qk2plar2zK>kgb9HDLoHbEynLP_=yl)dohJX|_3%HcDJz(2YT@LRpiwo|_Hf>L zA+VTwiJaq0IdNQ8B|L5QzBRAIQJ2lv(EY)}P)=u1j6&d{`wcI1e7t0SDi@Zwmb>LL z+%c(y_dEo8^iychufQK-C8$3KsPahyDj}8~Q@``dPfEYK-2i;RZE>J1%+Nf=NLqm| zPBprYNt;k)Wr228`vVR%G$N%OExh$)$Zd=H(RirazUwVc!-VzN+*THq733->M5b7| zuDm%`abu5Wr7__u>JF#NkOpy*h_4HwP5(Kq`)SY<6cm>S2~-IDVDQLXwV}|)PjFAj zoJM9(vW?{dG=A&m7`0qK<91rbuq`G1+J7NKcvqeel#v7ca9|;La4qMC2B2$yvb917 zHuvvICA!p0mFUwd4KD=s-fi1MVLQ;*F% zD+WauG{5(QM8Lo0|{z{v$y)`s|W?Ooxj@e{CsmQ zrr(F=Jsk;@m6E~ccKYBwrbSm5+VLW+vEEs*mn%5dTR;%hfkFZnqnCr{{>wZ z)A)NF>-KnonrN^aW2o)hPg}Qj6zo#QuffG(ouyW}pd%xVcXp>z#oz55a@%Es$8ZId z5%|m;6hRze^|q;CaulmsiuA6hXGavwy5Z2+W?B_>3^VUrTykF{?qk#LA#iWWopK}6}0pm$adm7 z?_+{rS6|9hnMVc(txuI$s!-9+55|4HgxQU|Otll#qc)_Qj>k8mYP66qi(HTBF|)xrWZyuiS z=$KVrT=uB}U|6F-`88RPUAzr>!_wL=1hr8}UuhtI$v}RK`6DiqL8{Ng7X}G%qVfL; zZORUUaVao*DR7>q8aAe*%@ktqH+Np=r{B$ZjKKglBf||FFZnIaJIY?qtFPf#HxG4p z=WXvqvu(ajI{Lk|jrcs>J=}KNnFC+Xn#;4oZoQuoGnU}?3B?O=u3=1pT}|cjxM*TK zkHT94BTs)PJtUixgiH^?2L8Y5KVEw3L|B)q7+@EgMh1t6huiPp$hezz-TUrI1eLyO zq?(R-?MvhddZ0Luj6!QrDJW>x<5woq%w=S0*z%MRB7rq1i7v5V<_ZWU_9{DfK)=VC zE#Igsmrb~hQHzwK@8^w1q z38-x7;Tu~5ogetN)|&jlznZ1Xo%*fGO2dvWyUm;F4o$tUT`o0lj;$K|<`d0=k%bCP zZEHgL<=}veLp4TD_-p!rGm!Hr8J~_j*^{5+Xb|V8fiY)!Y3ghGbfLA~ zDJd%#0Y9R+M;`1~w1e=H5Z`L}T{KY+^3NMmv0yVPqul=OnYVhiYO;b}-4cfq|Jzk#2W+}^BOP)HTVz=Yjs{6-% z5S~!{VinoUBYu~TMx5FZ`VsDmM~yVZb+{C0Yev>aMN3Qkr@>o{EsK( zoO(z^7=ey8uZ`ceKX74zWGrfx(%LDbw60w$u`JE>w0O|i{Q*<@qcLeht^$qtD3ABg zxu*;uJ|87IWj%rL`RBDUD~U>wS|oGg*5Fs^HJ*|+=h~hETth2c6trH0%DwsAsW$ht1(!L!20!8kC^GL z)?_k=&HZQQmEJ8{2YBu*oPY`(z+Gl85-v)DI6Bc+5~4BzAtn9Fwxv9zT>8mv=u<&J za8X>rloG_eEINLi=({J#arw5=tML%@exF+Rd?ebvKbbwR_U^MaskilfKVbTl>pG>g z{%ws!|E}7q=it5b;;Gest%Z*^I*mD}6?5!h_MR6{0WsbasaIG53L}Bhl!b7S9IM~J z&SV+_prq~hy2RSC9n|w!_t9PZAK!LiEs{yecyjgb3!1;^jFlMBpY9+gb-8W$D=S|h zTF~-y zay)4LW+1Jy9&bEMu2(gpCRGd~NP7V)R$;D-9d>aP4knhsbUP8XC2#Q)G^~5nR!Vl6 z-(Rw@d{@MUTPowE84~i_CgvYS_Phm_bH!R36*h@oRBPoRSaAt;N(Ezf(B%mU)c4C4 z6yU1hj#yA2n*>?In==p&@Rc1}#9+Ubifu zmj@57ol3&Y$RYRSzo*n9$?OTX?d-n&^fC{+{~m|cxdwh$$iQvzyefN>r7Lz!0@~1p zRe^qN`Cz{%aD_`?d=)DB61jjw|!29^N`kK!az+F+S5-*GSm)w>FDm%=$s>!nR z=uBTuemSW5*s5WpI$$vZ3QLfn#=+xu06*s0cnqE;lbOe~+wBAO{pMT|Os&?}p!rFx zCMBmRnX-VdAe@wx94`*o?)d}@7@lrgf&%1fLR|XvYr7<>ZTbXwIw5mJg%OPOxB8F) zH=y`+XAdT$nm&upMC=;3BSeu8)MAI zYdek^pTM!f1vL)1dP4BMVzA^Uz}L8Gwv3_F$C-Rbh;?Br%H( zAu^`Qc4b6{bc@yd&q+hna3%@yNj!w#gyGhSy(Lu(nrm>Hy=DCUKk|qi-~ZU9k+qr% z_IlyvOxO88RZ%@xw_gqCGy8(L@}9HR+Sj4rbTAcn!fD`}1;PbWiX#z0A`YYrM%Cg(LU_>53 zcn#K;bVDvH97BmQ3GD-{xXuxWZUdnCE-4r`hHOhnN&Gfs!3H`01_gDhsKgS?5p_EZ z5I!V1Uf3R_^>5gwLr(M9z6d*+1)!7y$$lQz%)yb5N+c9E%MtQfuB#X5Su=)nOt!C6)}1!#Vc5u#@A2abkAV2vaLtM3kt==;%Rt3Irl z4^oZ?Vv~mi{-vxk1a-`hiUd^_7dz*MsPz`Y8g=*qm3+6SlBJEy0kXHdUEkP$06eLd z&#vgN^OTeB$IufrWYj5{0DXul0n!E-CH;jFye&VJOnq7XXpG%GS(uX&2Yzaw9};rZ zDfA$kl&-meO+}uuSM8L_WKq>vmEEUHthn!0#fuIV@y*f1MS8MVx7}m1MiT4T6ohkI z^(nQl6Y9q+whH84rh4WdgSfPn!BT`+#ng&^>uSuQah?xKhaiRDAM9d+Foc^%8@FcyFR>nKxS;jO2U44ev8XXbNrL zU^-%+a6|8fZD>ur{?>xLF}b|wz#RwAo@YdH*&3QN#;)J|YwvkYr^_sbJ%85#kJZf3 z4lYpxn$DNFssw1ZdJW<4f3N27y$|Ns>#q{9r~*?8Hx)jX>Vw~c{C*-t!L?duG*t;) zf>d+3A$V0M8jn?8i98Ayzl@sy=|x}nCKC`sjCj5ief<~zQQ8Luw^!SF{?zJqbAU`e zMaGwvD@s?VuhWwSMOAxzOTX7^gCvF`g=_km5~&llc&JC7wZm=ekBdQ;5J1sq{q$b& zVy}TtIFamqd-x(B?5=dNJUYs+ip`K(nbD_uy6y)$!>3M1;Xf>fL1(JxyVeah8%z#o zII64&E>fAkU;4Qf8dA3Pn6F=YF75SKPXS%wc2$wA23=|f=O zE;88BezVMol?rhm>u7B5@~K`L-?=xsn3Kxzn2!vRXoS}DM)~|tw>_M-quqW!t4K1K zADMks9?~aZY>_171Cc$JRlZGqI#)JXrH0;qU&L^3Q#87W{nHIV&n6md~tON zM@>ylgUPPs+hM*>;OTPv|Gi^cSh8E4z~!?3KJdjcV|GbYJG!t;O0`(G0&$>dW^0n< zW+3%P*3%6F5{?&-A8g|XqAu(qzs{Jl0-9FjvVJ2Uv{Z2S&aWO5Cz2Qly zU;A`++O58#H_tCm7goaI>3QFHO=iAGyJ!<(tT5V|eY9t#IErD=77>!PCp3bW=Eb{~ z&f_uPnEOHXlr5P24MbG#iXoz7PomNg0les>B{_0CBaf)Pn-Jxn6UNAW(0ZZJ`nn7D z>VdS$i8#NN+YTbrMXz$T4BQu?dsmz7;w#*r!3wmLliE%PclpfA540%^+zKI2-Thrcevg zD9hdCxEKJNZ+UnBv$kzM7G=FBJ z8D*Bruf@=5+*NLo6$*XF6tUrsyXgzb^TYXX{&z2SF)sx25xHwIMb8f-T0t{<2Lo zk$W+^fQ5K*4aEb?4<*To1>D{g#CZxx!2V24*x<^`)tom>Z`()ecx`o$8GsRo8mr$E z1LPQZx2BKOEBgHUgmkX=ZQc2z>+rmD3pRo8!)&9r{eaN-vJcJ&oND8Xy1f_VBS$5npC>IE76^uUM04C%}JF7gn!)OGIOiB@(p2L!8}FS+Wp(a)2yFtl;LtbiCMbre|_L6?^hzlS(z6`)pH~wpc7Hh%E|z;qhC}NKO$ol*O+U4 zlIUOCm6=s2IBS7fC{Vfs$V6eZj}yLnZC8C~vLe$=N}|anH}qNjC|A9Gvj1bi%C?W!%Tk_{Qgl#|6CK~|Dp@Ae2Gb6g#m z_CQr-&?Hx<9`%%#Rz6R$=8t$J?`;JTLIDJ82J?v)t@>{yCqNKL#IRX+lqLxf+# zO{@neldUA1^aB+IO_m^vbrl(>=C(wkVvCmEcSS#LTDLC4J^@9q2C;M+EfrmJdA0TQ z)?DdmX}e*2cle#=)JFFW&;#C0SOQZ1$P=ydwVjIAit_}mkp`&2U}W&S9**lj=ZLXK!eUVJiG7P=_j5y@npu+qx5wh+X}Tl zp!}OtETsbB^edN9gxTb5Ms(zsK-0x1xf&~05%ThMb7or#a`N=CWHiB}(dkl}B^3H* z>vb&I(B;uTQm6_k{ALbx$_4`AWh~jB{e6&p=&F$MMkp}RFzw0#Z7JP)QnZd94;WLgl`uR_fx#9X!QE&ZiuqwjzA z!iFLvBe4Lqw6v&Ic60xz+MXkjm91gzr}_(d1&nefjL67EzPao7+YYN>>l$65a53z% zJ3Md8cCa8t^-W(2V-h64WT-wFK_iBsD9aM|5+3$6dY0{VI8A0;thT#o#kNzV+#Vuo zvykHE6#h#ltX(qQTbRJ*C2;-Lv~Q`> zY+!|{^oGH-yCw7k*CmB3Y$)+lbp8P>U*p@ zBZ8QeKN_;wfNZ3A&SffSrT}APUX*Vqj};(2{3j3Pr@b=cDpnXlb?n2hM>eC|#;w=m zmgvp9T8}F&wl^k+_p!-!ufyC)7=g*|t60ZTupRr=9ypaw6zWG0k>#z#K|BybLDl+N zR4UPqDmH!l9c66$r@m7kj2*bwy2>25>iEwB1cYnJCAGNvaJ?cSk3Sl!O3c(OyUZoK zp0p2&4USON1WRSUClui7ZPlhrk;d9kLNah9DE(%QPYM`=N+N8~xNuUdAf-?xEH^tS zH_GQO5?RV%xTD+qP}nPQ|uuJ30IP{&TVK(spavbFR6@9HaNA*K&P;>G)nF)9Tcv ztzAu)k3dwW03l={k6!HJR9Mz=p8U}3{bi_`IQTfGJf}paa2cGW2k<-`qV(emX;#Eo zIQ#VKhh$q29QFoyLG06jm;A=ZmI%?En{JDSncUXr*Q(OiWIX?dsil=ImnmDqcR(^a z7v$A9-S7k*WcUTrR@@QC%O7TaK6{V#AkB~#Lo$6G93T4JFfFaEX#n%)TI-#jZg{`+?%5S+eU}WjA5cJ* z;|~0(vwQ74W&{qd-sHxBu<84A**MMl*9CCsu4<>6BrG-!Zo{;5Cnhs~F`0Z$3ES^4 zBn~HdkaJLHK>j_pdsF}GwlkS4Xlj|Fz#%$>dupSy#Zt~Ax}FGSjs?~?$1+{2XfoP; zkZQCp@OA0MgCxCGwl84EY0a#|GoW6#?16zB2c6`_8mM7BI19$N&fOQ=a+!~+t}=DK zU(n8^#?cwwqlL~8uoUNxOO`m<(x$^3t&SQ>Ud&du#p0zho-15hLAqbcr9@)@qGb4^ zda#}A&mY`f_;NpzyWP)1b=+7`n-~$z1MU{bx6Kv=7hO3&+)?6q&xN&T0#gBKE|l)Fz)LE zg(&xrR3kNykNO=TWVoZPxAkE=*6XtH*$y-j_c~?Vc*DwS^nly}?;E;QNEPGI(YFYl z-+MF3V(BU~T;lP0DNQm6gX#xz*Ko%7`{8XuwZ}mX@MFUQ1k*v%GBOU!>ZbM^wl*Kb zxqLt1U)Zd+>ROd58o(nD7>FJlFVE=JOY>2;J-dir;4>{Ie=1;#! zEm(5gKe@NtS!s%6HtDg*;JOxW-r073hkkZpJ*0}p zlZA&5zs_*mpN1${^R0ZJpIqWq-nPKX>Q&(scOj~PF^`1V_w!TETmpF{BuIiS7KCA@ z#Z%cmXUXLF&I{&rS&>e@uhZ*?0B9H%DH_ye(LAAkZ3;i%gsWZH5FwkDEWnJM{@hLA zDz+iv3Ru&q_wEH{&$|ygx1YLS`=)$+PXKEFTBF(cUB|os$1g7WwLP0uo%^6Og`^8O&vjP;A(ep$ysx`^ zo?6VQq6;y9JdYQ0`&)ZIaJPT@5wc!lZ9N_=qtYy^G*ma~4(lUL<q>NP#Lm~rezyXq7x5aD&E8(lPqwc!o-KFyvb@PTUMXXuH5&Z8wb(s^ z21w9fR&3^o6z~t*5qcz|%;uq(4gQFlliLcx@Q@?zt~=z|2vLouRYM_5n(3Q7AS|_N zm?HG-5S`D1ePJJKsq_Q%#NFLnmZmc~FM*yn-5>Bks=QAW4udbgc~dC62#u~i4_93e z**C{c3o;9UKUi6EMV}H-p%rrE2wnX#Oanqe{x?n(#If3reZ3Xu72+~{e`KrKX|vUv z<$jzV%0m7>R8m-@YWKVC+aeh+bl-k(WKW0n=yPRtGoFIAo(V#g+Q7uogWCcu?fz#n zEGC`G*J=yip3L54cw1eu)!$KD z(g$w23g&^Fy@Ph`#?pBOz!WFEUp8Iu8*`s7>ur55GPyE3zv3B)MYRhE2HMF4bn%dmV0=95&Fi>+{b~8jPR#m@xCi>mlj#6<6Owk2hJZ zTC<;OZcmT`&448O64X+fmRer-tgNREX*)q|JoT_y7!R>!*nWd20_m+X%Ej;9Pc9TP zIcgni9cThnjlnoi)|+F#o^Na)`x*36=2O#;bZSqs#5{O?z;&TY%l*93rsFJhM`n98 z7(-{Qx^;VfbJw@1dr#W-Pzb*(MI`dr7SL!IMedUa0(2%|uH?x1FRAG6Ayt5?f-RP| zu2f$J)R6ce-q0yh|L*7fJb9f4;{T^swOlVWo@qNzzt6t$)&zzL9>}q%=A?@08fwQ> zW5n>_R%W`gaLN*GG>EV0aJQLP2j*qD>jRJ1 z$1$Xy5lD!bR(UV7^qbMf#<~;09+7jR^|jf(^SZv03v(MprZq9+^Sp38@{MwJ**J6j zykUD1Oy@HP{`1oNd?l=&k^Y70bg(WN%v{Sb10tLM>~t<3U{kU^)d+; z=f*5YBNY0h{hB(N-BU3Y$IDQ=5z}u{Di#Cmz#vRzROg@u5W!t>bM~ae%8~%V*k@YF z(RT$Nw^GmD3EXu8%p093WfD}gDR8UbHMjn{wI|2XogCIK7-ZAuyKU1lDNZf)y`8~5 zULk^~Nobb#QilvO%Us%bP+we?Kw0zU{YY*{Lm@&endZhiD-`8GiJ*iQoY1>k zmRKsx+$zXrB#NNpmZ-Y>@OAdVbN4ED;xObm&Q9|LSgc{cXsT^7ZkCM>3&ja`gU#snk(14ki8m{ zwKhBa#uv1hIs79dv*h7+ICBE7u57_t*M_Az4fpxjHt%z#K;M@XsuKvlc0!G#KTzw5 zIgdr^t~=f@Ga(R=v8sO4E{6boaEptX`IBM#vwkU1!jhV)^`m7cGc@wxHDTKiVO<#m zWh4eo`&W{pY`ekHL~`Mc&r9cjO2mw3wKc$eb|_;B!QrI3_g}929=P{kbh@>A_sQc9 zF_PAoXb|ZA(r>4fX$0QQOQ7M__uxJAShQqk+oM}4RM3fjo3~}mG ziH!E=!7_y_emP~RhshTQ?&R6nlYYG#3uY}vp2rw+Uw<$Lm>qww90(D$VeuARva5V_ z#p4OnX4eCd?@M=Q`)ixdwsSv>!y3rdo4V7HNj!98TisxJOL>P~VT>j{Z5uy8>j{d2 z{Tp*5hJh6K$71Se%tWx|3VScJS7YYI$A__!YN8DOoKqfO1- zTv%xITquD@h!9`c55PvbI=>Hy##WjgZ*~5NkOSb_O+V*EtzRn|f ziTu?!8&Fu2!Tq(k8T;e2NcW}2>HSR-$64`g7;R4Y-K;>?`#!StAHxysJT(wVyusq0 zdO-qUv&(Zd5dRTC`(6~T5&`b+S+}YXhr*WY=g+jpY{-Zt%{>w8J_tB<%o!;Otkf-N z&fh-Mn^-lVUHRwsy1vhz1?U4HG?M3O)_6;sA(Nsl;9=uE74F&TFYhWZzy5s}3m1^6 zd>**h{u1xcFF>C2=WyfO5L)T{0%z#;CdhykUNZ|dB3V`cxgfCRANZmw{!@!zL(PnV z&E0UxF33biLV;<1kS&+TzP=88Y@b%}$N*heMZ~s)c0a;Qyd8=eelSdwS>EnF?>9ZT4xb7<1 z%~=@Sdw-_YSu=B%xeMePl}isvqj_GPEVj6&#C%cKijHY)YBt?YOohkNfY30@7u$Sq z*!k8QGC_-BX1IOu0GA?2dE*9jr0^LB`6zJVu%JiRI3>*UPatUh1ot5jpckoSQPhU5 zf9IV3S*Tvk;C!rZb_!Wd1WI6)NK0+v<=i7`?rcYGr(@w`igT2@9(rW>Uq^x5S3@FR zml1##jIKC24ZFQw=6x%avz$MHT0KQwtp*j7IT^X~FS+Q^{^c_AOJ4f^E6Wzguc;UN znQUxawx89u3uv}Q@+bzUCRg<6_$A*rRo^#R{I@YN9~iqOW!WPDC*8+UkymngeOuJt zD`0y&r&vgc7#r16J_;4)RD?{Z1irSKT5|f-iEnaZnPMR zyR^oHeCZxr`>S|UXfh{_OKJ9IRB%TlIC#nijM}-KE19Qj_|`FjoUNhdGjkNdQQ~0X zkHp>We#rT@c>9*;h?q1T0f}j$OeQb$Iq>Am235Ve5+|z?#R>kZOk;yGU0LK^2*|I1?dDAD$G*}nZe;jz8I=(!!X z1?@VMw%rfJ|I~97;)PgV+VJi_bh|T6wlM00X{UBLhG{CyCeY=-S6_^%hd7SyY?D_K4wZ9uq9h>p>nM7Kd|DUt|+7-7coGiUeX&`(}Oq7YYa^1F(8rUI-o^VDWy_z z9VMOwf!%l%l%j&*;z{XjnhAlJp@dKZjUEqmu=ue{DH#&yH4-=8_neQ+X8oUp@0xVz zKI!1(e(0_Hu?4*gG&XFJVNd;_PfA6L^kCvg!SywIofLlImxMAiMIxU9CXnhj0dqn|H6 zl`OaUbjy{RH~5MeFCw_zN3_`m(Kt&&Gh5;obb~OIXvAh`mOde6peTX^66U%(OGLcY zU5QMfSL)jcz;`qljf-I`WIN7i7~XCu`V4A7pZ5d9mf9Eqd5+^N>A@y!bEATmm6D12|Q^yJw=5tNi;& z&3ydExK4nS7)Fwd0tpCa!?F+1Y&N)tUhvi@K_MfkZ>H~3OKJBShMC4Qu?ks6S!{(r zyE;}r6eXD6I9sj>covvv*~JOt#0sbOavKHQXUp$Mb|=aigNW1@hiZ_4!Oq2_mSd%F zzjJF(*fw16CLCuDKvVewTcY%dDhPslN^d~vsW6F$uo%>_jhndn+gYQalPy>bKDOn3 zzIRn@-k*f3dMp#Mudwi{VLzA!5w+u(-8bipgN;Y&xZXl;es%@?O!;2ay&f)hENq%a z`*S|JPBvejYJCopoamRq#>__tFM0n!jkh$TtgT+~v>~aqc4V1^EcHQxX2dKR^rU&;iu?mcW*{=S*`dQlLQiO=OMV`yvf>^~BH>BI5O6z3R~^R6y&?%Y>;q z9%o`bFWom?-?h5mjNc!PKmWa2mz#*kb-pW9@7H9#*FW&#Q}KKEZAl{xF=SLK=`eZi z`WAfMDA?_?_Vl6N;J#o_>Kv8~Xxp7gWZ6BzAC4dODv^dOERlvrkj?z4ZZ+v7F4G@| zhz!hTf`lniE75)>Ra#+EHnCiJ z0e^+ViHCeJFabXX21=5ViNH(T?a`Qi{p*dEz$NUL`n~+_%hje#o=lg4K1@_HTt$3n zM|~ck(~Aq^=PHgJ%|@Fq*V>NrGp^pR>e?Urw~fy2C)(}17*}St1w*qLulL5ojh(L) z5P*reh|YGa>kT?FF|lz0+sT=Tj5g@{7h^k!0PhWis38es4u_!zI1tq@SU+}dex+cG zVVZyS42L)P7QPf88pW%SqYuNh_g>@+BgM|>4$d=hQfAxQ?-Q=&WvL^b< z1NM7;$aE?G5V#aZF42|-{S$PbZW|O=>$O2|OIL=j7oel9K&2PBLSn<|y$#M4|78vc zlFX@w{UNmC=a!hp7TX;SuOq5&lUqQX#Ilml4gUAulh=%|UAJx3yX!nHmU@4Twr+Zj z8`b|2Kx`RSfyXKh{RQ;*xIg)%-s;FJr@btfDrMSO^e+Ul;HCNybA|hDUVp`2e?HPO zPFkKqWcr3iUTd7Oy((mA1ZEf4toI+S=OE1qKF+4YT}Tdxr2*_vgvmYp>%+ ze@p0Me&_2AHs>WDfBUhpcvyi#mqIls%ckH#wE!a*qMce8DP1t-!PMFDdmtUK=>pxa zz}FprNAVlc)Wf(F9}f8O=KPhqt9PPlxVEicqWt60?PnWeRP;ZKZuhG6`>bOCaH|US>yR&*Sk0(Ae>AxGB*|4S#l9_5(|NfV{_p zJGu)hySodS>GZY!Qk9GcEX`pwy*cqjy+}1a;Sh%dEZDiZWPC_Q+W}Z#D{_?veMx^h z>9Cc=(*^Ejd5*HCgvr;1p-jb-fhQx&Y#afb)X@rXlnQE~y`(R6B>s36pNwih3i%TL zbP>~=1sJg)CjT}VreWD|%9ut(yzz@saP~psz0iyHlwE8f1bZ-(ca-v(x8QR}B* zIGC>Ln#C~6ut!*Ci{gK>rZ0^df16BYNMnZJ?{vDZWLL^?arNAVVAtASSp0@`yKc-K zT&f}<0w`~4t#*2>)lt_LB8NHoRe`eC zARj&$m^{rbulkIHT3roViIBpqafJ-34ZQg+mA`;W{o5c=67?n#kF)I-z7X1X{395U z!O~TQni+d+~i4&|Lw{ww8Ju3nm`Xnh&kzFtMw*EvVXNJrLz(iTFsTv$5{@Dw8F z2yP1v!-ZTB59nRgt!qg1ly&JaXf6-B+PA2$%?MK&7WdOEa8T3_$bG)V^RPq~CvUO1 zN$QxPPM3c8;^*w6`kj-7q`_^#nt2Hj4<7KzY$*jf5wh8>8Dd=2%;Ka|-qZ5dF%3bi zgvNQ>;R6hD0EHD+1C+q-X{4dDaPpnTznVK3O|i&J9J)s1rm>JY2^WMIhIZei^B$!A zI|(ZsLx4VO2H5BZQ6s}?g>9K4sd}ODivWuK>2cxo?E1Sgck8~EPwVIY_)%~ z>1@_ISfGafMHPfmFz#&O0$8C=t@@1WoEu!w1957&qd`v>O3GXJh<%naYW4%X=))Qq z;)*zT=W)L=@x*S_QJUpivXPWExJ6E>2c)}#vd|L(oWdr;S@NUx(G5Mj|s`hRH2TvAjW$KZ4_CNDU zBILwmAgVm1A)RI=Wrpz2YWz&an=I=vA)uxZ%=m0~Yy|Ulo z(9)_tJoo7=vm8MtL=C9)1UOV#@iFd$aPi2uLGafw<;P!Rml)MmPR8luc*YM>s-y}Q zHV5Sj{(2C=DHJZjT){bzJV$hi#s7>@*dm|WOuJ|kMTl*(@6gP+I=4+>n(HVt3Q&vZ zI>vC>%*oxqb)R_O99!FRa5L_G+;r;x_me-?YIiPQueK*{Z*T90r}EwvAoU~MH zrjyIaQ74xzSA;GKTfjN^OwK6&!xZW%=FgYQ>nuzZiNr`X{g-w(0!T^t`AP_b_UQ0T z=d;BdrO_;~_1xG9k>$E#=K5mzuim+>aqYf{_1UTQTB>{lt#ck^+*CO2-^s#{>zCLY?beZnHo(Lj;@O+IqPLg?#QN&YV)<0edj~-zgZwZ)tsz z$G-O~!<6Sl-RlCo7vKG_s_IQue0;wy0kw#~diR(+)!ag=$7OdePE$nKlecxChBL6A z>lo%{lzr4sL?2YUR!loCN6J%ELsMh4`xec=8>@UaII|gJbIVB-2w+jK_HDk>=xVM< zrTTi2sD2FrmYT#24pj*~@go-zFr;D3!1~t|(Ca6UQX6}%GkH`+0SYmOW;Ke9G=n8Z z9a<)>at2Oy!y=2{6siEX!SA%H2491Oy9!1;5i=T>U)n?Ad4lmsM+x$4@U$x}BCQv>_oOKB3vQ&bFe=LGvSAa5hR_2QL)5ZNLut6%w-k(DXU>JR^TlLYbP?9sW@<`)-> zz_fpUK!%2Xmv?ri?(Ov#K2!hC$4gq>S$f0e`(0q!^BnH`@$!SU&nU|N@dt3*cyuL3)i zF&>D(Ad?Ts%3l&34bgUriC##AKFwYky-e5sm$fDR6J-N{Fac!cgt_ozrl9K@_hr#$ z<40p5{dh_008Q^B+yp)7iL$pGVV)J0ZI88m5?@FEzMEC2IM8CMByfXsNrVe<$Xw%2GT91zkvQRZmbpl}VoiufVogz+j5Q0I$a`T6!oQ;rXB>PY}B?W+Au_e)m2-QK|Ymg^1= zDZEzy&*yUME!~axj(%fJ&dWZ==Idmp4Ts}OPd6#tU<-N7AjFqnk(ffS5NjYRjM-oG zb&l@o`;;TdWGss^?q8cN!%ldwHC^vggJ z(AciW$AgKWEn5QoRtHS*vKMwW;NoDl+}f1o)ubV0g?bl@LDKI>%D?CVL;xaRC0q>M zq$LWf`Zd3lsW-a)$n*U2WdGT4pnE^5`*R)%&>NbL#^8$maI89kOLK`zW1EC8g^kS{ z|2@09@qP1l-FgT-;r%&Z$LPHs2Ifbn)iG+dUen;KL!a_rQ0aqq%&Xo-(8mX|!WVA6 zah2)Ta`CzsG88Y5I0iXA3;M<*Kit}DHX`k)+i3==tJx_(@AEZGJPqX1{}NqotL$$s zS-8L7$QV*&9F#h3$Prvl-c79Fx7_xxKz|~nO6hMf7Dp^tV#FGak@bBLRh>cvoR%X}FK(WYkr1_(KN@<-%F!2iI35LrTUadDE;^h zW;E<96IQ1Up1?!W!mC9fh*(mX2B7$0y8$2v3vQw6LZIGMv9Ut!k*0N9wr0gPCs0(m{D3`$l-`u7E!Gf2mG@qtj}sDGw(}4%-=6 z1vpfDl{vacfO0COs{&o!h{~wLjLwM3YDG||gT75?-0ms^h$!Cj8F5Guz8NY!S)Q^PK1O=Yg*qE)=b5)w&ciDE>K(+l={L^j& z+oxFL)$j=jjz@q^UrLnaO<$^11-&gI(|)dSMzBsZFMPe~bh*kXsQSZ8S`gi)A2QqbOb$P-$Af6OCzth#g`@4x8;R^OK-+g`QulklS0^(`&wOTZ_f_DR(>Zs07CqqzfEHW{MSuhI={6FQ`kO!f`388ThZvk$L!@5-iN0$9Az^W~4EqHD9P}Cd^U`eVb0D(OYSqo$Entd$ ze2FqU2h(ARZ*oJ=$w9FIlQUrNIC~VSH*6qfN~KcRQBmDL9xNk8p!u8!Kiykdm{`j5 zMJc1{%!!S^-ly90tQ-P~d#@>(C}VuNuNcoWXeQRr0Y)Vktu67)e{NJXtKl|x@^cc| zic^uvpq_CE4ba|xHDBO)v`bpwZ|rn!PiJ$zr1Cs?V+gw?OElb86(bqG)K&dbQ}d*VDQoJO8e6^eVYtT#~t} zW9IbCF42usT7H@ZfB!?zkHew3O9(~e*Nk})mJ1h?B@smk2ink1ZIC}G8v-!gG)o36 zlna+D6)fuj$(|l+@cO`zFhhk%A%6Z`WxIOeEImENmc+}&p!Q8C08b5b#_BNgV7|qrm*F#RgN9=p>;%#tM zt=wvNHM!<^$vWYN%$*UNJsCZ@+h>vT@`)wA2#3S%wB{;MS`Tl5AB}epRXD_Ba+7(Z zI*ZASnal|r2@59HD}H>+li|ze>ztENR-QPC(+=B9plx3mq z{dDjFG<)sm!^ygyPkOl-slGbQG1XcWFI193HRxeEtWroftha!Nh-`x9tQ$ znU@8=pvGVY6|zpN4oEQ}tSStkB^U$VS;Zzz79xbv$}k) z)>(uN=JeS*{F9Cbc@N|ZDf26!ki?P^upJ!eD=3i`0-Kuncl@^7H%4YD^+~dQP9<+% zyGn>@%mT^bCP$v#)cWeyi(1|#FMBj(fKeL?cE#L~5{Q5E{+CysCmEz;ca1X$tpnBfFOU|$(!Ck)b`yr8jX{iw-z#?-~(Vder9 zBJ%#{%#2VvX}HXPm{`GkDtn9Wh!t08y+48 z0|EX7=6l)nq$@5i{@e}ao7ex>FJN@Vy7($Dp3-=lSu)*C%G}Dq*UPW0q=IR=t17_g`%Gdx$F-C$*ho+bhhYu%O$7VCC7^iT!pM z@D_^I`t|r6yY%F6W}NEyVa>PSev)Ij-Q}KItJY%?!?(*f&F~Ebfd{Ir6{LhNB+u)T zqKiWH(3nrJS_;(ktNObhKBVOgLde~FyhtIW<*-5QAXi>riqEI^iudLg_Ib9Fu=+O7 zB^B7NfmMT(O=wDW&}H4FqqvzA8Ny4a!Rrkb?GPbSvIrO3o>Dqw3%})ZIcHtry;G_l z_qZnqo^Ed_#$-Hi z)Z?{QTon%XZ4U$_Z!aM%ptMt$Gm7u2ReNOJtr2bIRlO~NFw)GKQ)rcwtGmkQ`2KI3 zhXbfI+n(~}XHNj){oQshit8`7Z!ToT1cQZ`UTk#$lF06pxx0Y8o?DZSttVYV155dw z3taMoyj=6k>3p{m$ofYUaa=<_J@&a6fj5#iyu3z*^BWJIwz?iBqIBOf>*`#Jikc!x zF^Q6j^0xPetZl4UR!!o_h$x^E5NmRNTwGj=YBM~lNEUl}d1BbKFRB5ln26H@`ozQC zrla9MG9nD&K!uS-;agBf!Zf1BP6$scihhuj4c33=O#HRFWycwf?Gg(Yc6vE^Yt~nn zGV!i!{TOO$CmgZ~oCW2-KGnx5fDm$Yu%JxYQf&)=^5GPolPw`qBvO2(9~0Sg12@`D zUoY%bqw7>@6=EV@TDW*U_sf0sN0OpSDWU(CAlyu{a@w_ z|6j3-_U`wt>!*<&XCN&v3;QXSl{&XOgKeGe5(Qyq-0~)pPbg=8%VQpiLm9B;?1$5Z#<3 z#ZOO_8sbwDPZx%S#P`Hx)o=VtM<})EM;7?K&LhEb26M!m#>gNJJU2!F7|40VbdiRD zH}pWSu{K>m{^8@>IlZ}2{gBGB;(j|Qy#(ym}a8VnlT%LiozuLo$% ztj$1pO+{8<)fZZ>WVh_Lo}_PBwp*5C=2%~yeb$G_X@_*$_*(Y--PBMPfRc*SKX5_I zqPgO_& zJ^x|{LBv^CkNMeDp5M7$Uf6W()!2G}VgEc_94z1L{A2622M6$wPaNSNj;DIR-cEA4 zT-0!M;xj=FEAzUb7`QW*baf%x1;l)&*QMjgP}12HI+?_WouZ1we7n-WQLKaDC(r)H zH8}klk+cZVo&aHBgwM1qkhOT7)`bs#9;Sd~1{vJ91Yq=eD1iK1dezOf=1z_{hBb21_Va6wm*&XH36@@ zb^?y+Zs1V5e`2m>sf92-$e&(8s{mTen`d?&dg|); zLGK2#v86t$JgGQHgoFH=fcCo)rk*;vP`Ux^-xO+&>wio$pUZ$O`_x3@_%XOFpKhWX z^65z!GijjOYf>{X(AAQ3XdtDP#eeVfs&q6z$Hu9xH|AAq{Z%?4!P3@~g3&g!)TgsR z^UDx{`d=U4P*$tZmMwiTtbY(^|CF1-IlvP10uduG)r1-sdVDZ>F0QYyo0*!P%o{Os zkR?k(b8VoZk<6|~Cx_)VJTRN)HDhP2>w7wSXseQtknp`Puk_xnG|upZdR~7&{XDLV zWB+97EnflvxERZ|y1CHnD7X0*VgxM3h)`z1JrhLa6ZS?&^G3X$X{+&ABO0z_juYdS z8wJid`_Nk#1S!JE&{uXOiW!gz+w~DlC+3jAqr9a`z)Ajuq~S^la({%G@s_s3R%)@uuFU4lNvXCXHx!7)mKWyNpNE?* zmw5qBs*}#h{0pGA)r~s+1Bmx|cdbFC1Qg+PyzYg8`3biac&?7PEG@Xwl(cI+B~_@i znWP5^0sZ_4u|i=(hVG*?c=N!s7eN7Dg(OIy+L&Kz5W(Q!0D1E1J}CN*(?MnL&(}?_ z>-t&g*4wQR0$++0sVVW`KN0<3s2KeANKqA{+#PGNxVMBH>K$Epw{KsHY&Gh-;Foj2 zX?(WdfSqwltSeeJ(9mojK3d<+t0X}9h`>)?!DoFztJa9NHdg{^O41BUkLZ7{kTlBn z=d%z_n$s~S+iP9|gjRzx zz}lWN`+hcGXEInKS9E=|*Ftgb4-+tSx%KF=By10ovE-wos)f9O$L@rz%UM717R>2P zOAkOhkM0({32xc_Or7<3E}#RnKEu*phla26zq zbE1Kb$Yu01)J>cSzy-T;XRupjAl{xIJaHNb@x~HUSS1inuW?H2sk5puf}4HAgkTlG zV(Ep2-=|^5I3nJDK)-*wb>VgS(2+uDr1Z_tg*oxTZTp6+YfRB!aqkLa@aMxJ+zAKx z_an}^X~BZNd1bgZ8bi)6X4vdh7E1BfHdw!H292Yz*=}`wIs4sgdlB!n?^C)8IN<_e zc%pcCc!paJGm?}5uK^F)iL15bV=OgG&u$?UQaaPJB@dj&>b*Q)Y-Q-wD(l+TGQu5T z!`PtlJG&6lWMhiq1Q{I>6%VifwrhJCSF8HW7yD*}cSGC#=G)#u_*Y(rGdJH-=`0-b zf-8|nnnE=ER(4m&!Z0H#NRRFCxf%mYKf7|H+r2+^`GR%fev;dYbP8ONWK3Mo&WJhu zZ)&hbp)9EyI`+!Dt{YsV38DjdRYFsh3vMJn$VTQ5UTkAwgM3Q-+Q#>5%SHx}g{6fM zSB9$@@hTrwK2%N)luB}d5lDbe(wRsW)C9I|7X$Ea$3@Kn;Pa8Ijk2Un?DqAvlFn+K zLG6AgA|@jnu0YP>^T$OSd;)}GX2~0`3(xvBTV=+mgXpE*O^I2han8`W%vllg*YG8J;+vy=p7M`?e>IBUp_DyzJ8p3M~E= zC|^9tTC>#zo-gMf39Z6f)pDsv@p-MzXJMqi-VAjgIzCl}iga1Pk!mr;@Hc75j$gvQ z)VS&nKmHue#g8%f(!pJvWbtDFC!*j}NZdJ$bdO5G!tZLHGTiL-HNwQLU^}?*Q|+>% z1ffo~jcLrgJ@&Vv#OvO#=MB^KFa=QkKkxOrg`Qakm07dP|b}9hrn~fJy4&O_79QIlfs`?GArtBApj`v;eUH z5-yTQ73B1bpSea;fUDRKIb6UO$^)Wlq^BmNZ#xjzC~S0;9xZPx?ae~1mFp=dMu0S% zK#iOln@j(!VSbOkNw^jaq^!$INd}Q?qcj=ji+9RXZltsIUgnV)DK;@|^z7zlkRHCF zA>a_q@%E$JO-j~8jWH_gl@mhU^>OhS_Kdxi9{us6G#?s|&SkEtH|5 zcL=prMTWj)sm<;mLB<&QSSDX+W@B?)y=41E%SHAv324}%TUiRwXu^)h_$7c8H33cB zJGbGIQ_=OhZLZ$+x}TT(Hi0&^wv6*8meyH3Wgh&}wR^SI@p(F$2_4i2N3Yrn5&kZ5 zwQPJA@q&?zB;@jg5eXmNKRh{kgZLhH6N|+~QR{Wdo;G|5$*YEa#)YL2Vwxa^K0O!e z_{e5)Romv=`Xs?xs5a#3AoG)y7*Q8L__rW?GTOT1f_+QOAF5|)e|odfxof6GwfP%A z_h>kRj9^mtywONq)3cP!(1-G`zE}71>CDVX4c&_Km&&}kU)khJ6Id;=tyNgc;MH$_ z=b$)$sE`Gx6k)hC?4W60DEM>Sp0C>2sgoB4Ev16{`+Fc2_z=kdN7FSh*0nb49osgV zHg0SijcuoCoHVu?+qN60v7N?^t;V*o?>gr@_ZRGUt-WU6nRzga4eZU8P;&jutV6R0 zH`_N)(nDCh_2$Tlu&@ZQLE1PtI9NfwTMcS-+61Vf>V}3w@ea_-@>o3{CacdKgMXzB zyKf3+)R{zba}w9`VsLlATH}o5+5a}tMP)ODUd4nJ3qnTyapfrh9Vqhs*RPR#xGcLr zu0tHk{n1>oAu3c!=&>j8V(hpdlQ*u2LaJ4kr(=!}#VVuN=mLa=)ipE(IbOEJCc7`1 zyDbTYd^>cyeLMNz7pd04K+B^xYx1=R$d-x-gIf_9e z;ZQ5n^sm&I$gnPwD&@TZ%wq2zqmM`T?~9o2^~gxKBzJsRn9ASj}fp?jRs zWUolddSGPWErRse`LtjK%JF`_uux3zm}*|MU8w4{sWe6lBx9U=Tf#TsWF^Vl{U^5?I^cI z9r;Ln6v;bE>*Eskw&|(!&6^jYcMSiC`tK{eD|e+oOwq%w_n(cN!x$bM{dbPsG0UUF zlhosuyJO2ko(XNkk7boVL^uck*qiJ6k^$a&y>Rqx{zWvu5>2HNmLKlxs>#Ie_6=rG zoKCen=PP{CnL!Vp*=<_9S`>|8t7Cr&)5TIN+bP;(dG*hNuKZp?K3AKA{7|ODOd$&c zIlekEC;Zsq@Zp_ypo`A!|HeM*qG_1e?mc*&u%D9MT4ie+l3X7iVw!OiNEO5VH_RHi zOodjb7bYk7v$awhz1T^WsS@I(Dc_90Nf8;>Ko~GV2eqXuDnrom<*nkEzFg{feob_Z z*fk34bx87`l5#W<)D{tzom=eZ~Kh`njt6HPi5-b+<244Ddw5;o5L7Y^lfr>N*DqVP!{_5jE;McR4CcTAXI~ zRz^}OmwSqA)b>uM%G}Vtu;CyTomqY?cbC2t!^b|nM}RKp<;aZB&jqkD>R`0HadLb} ztmu_dIDQXRl@&l9o-3CpG0s{jocLY^r_QZC-8>#RO`$DQnd=DV)^H@t{p?sHMhNcn zd^Z$toIKcKxY9Sb3NZGJYIGJvgXW7#7 z(FOxMv|*oEUwX2#h;4rSHqyeH>r@m7HCeu8!8F+>2ZKiw|XN z+fon?K6;uO8#6UBBDekcF}Z%`_RHWSEWUQ}>>k!hT%e5_|1UGX$&c*|SS5 z5G2(dzp8??_ybf%duX)>al=;8V-bUtB`nbX6n%j4ST4K9ENT&!LX_JJlUau6oOVyz zpM>}I^Y82M{{AL1fUXh_o$rtq;1HG+Y!_tvEvJCJ+0@3WS3$E%x@|Z%AuG$Kyu6$v z<+J|J{fW%sk9Y>iJ<(hnho9ZSFvxC*dfqxLp0`?K2o+WtS9xMa5ucRuX$G>g%4{jB zNXoj%Pd>U%)k&kFlPR^(U%2UFbR^3?64ROMocj0Tt`*NAW|>YV1% zx((ONjYq`{<~kuUl9R)}jin-|GGB|*64rV)VrFZQ43afRgucU`TVhj*AvK z27Rsp6&pv}>G$uQxH7U~v#hStd2kKNlsICx--Zl+krd!I)hqL@ZWSl%SQrrbLBK!y z&@nO9(DHGeBxA)0-COm{c2o@B#Fpmp6B}K*EMB-~acw@X$J!|P0t&T`lSYY1+^fXg zSFt zPi&x#V9hCF!9}-Urp2qWdgUJ2bkEu3)-ba&Eu-qiCjdpEQqT^M8A-028UK;qcu&%d zISWB$&#Lqx8CVH<&~^MXqdPSvS$mk&FU#}&>0n)A5=i&=*=SP9J zHc~!wQ#8D7h;QfOD_*s#GQTH9pICcY8UYIC_~dDZb+rgBPI*Pei~6U&)%hULQ<&2U zKBL_5vJPT38Q-t@diO)udmz;kIgdq_dz2qavMf$usQYX|)8jFP1`#S?b!)RxbEAk) z6&44_Qk#qJd^hpUnn!7g*pxF$-o{2CAv_941xpCBBW1c7P@@s)OvClHAt+NtR6*;W zDXff6u5`lZ*VbMtrc)~{t;KMU-%IPIQU)d^B{6&69>z9YEya+mmjA3~LLD}#P#G}; zi5mm!Yd+-HBiFw&=i`n{Lhu#eJdX~=AAP6_W~%C}wW6PyuK98TcmY_nHglacgql9y ze0Nfpm!J6cflku<zzu{t-R|618xWv99#xm1f{x$RSi(T9%17X_-s-a=9eShX)#}+B>mgG9_xkuX z5Vzd^yRUpk`}HV2fF`rdmMU7jJ>MNbb<1ARnOh@$pZXA&8?2T}slI1f%r-yQu%5$V zy`ZRBV=&>esDEQu=<}PHv;+LWC`IBjz>-Lv4`1c@OnR(6Mdk{qvJ_xKD3?>!TT<715G9a6ccb-ROm+Bq&AM7yS%nDZ2?a(B zQ?Qre!HQXij)a5UH|ip%CMHO&KM@M%X2xb$>mOZ+UWkH2S zG=92%eumi_Qgrybp=v22GNkuEbgGDQX|tloV2+zMT+_Sy?a z*3w?s_y*S#yFZcZCMw}^1fAz7YPxfTMJ>l3BH?~J2vqk{-8uc{)^VB|eHpf8Bxkjr zNcGMn9rdsawjwKSv-22`=*Y11(^4c)atwr)fa}c3txw6hu3g4HFLq?5TEx74XXCb? zw(K!4=(C=;sFH^A=k&pHp(y9uPSJ>&q-~ zQp?Hv8d|Lg$(X+pj1C^Nb87y~&50{0ppwR7oxw}Rxnm+oaJ0&^BH!HdpWge}+S*!l zI&sA7>+_QQna}m`01kl%-gfKWyi?A)Sav#axQXVfJ3N&L?P`6V(3=tUxJ&+{1SRpr z+_Zo(FB5O4UuaXRv1w{ToltAluEBOoShla>?pT}>>e{x7Us8UbT|X810N&@4h!wd1 z{dAz`u-(*t-d4fnLoD>Pe3l#Wa$q6!vfOUaevz|zTdCLRNmA>3*5>k1qunm4ol;y4 zpuSKgav24}gUJ20Y|*g^wD1zaRTIyo%hM6l>u^^sM&TbazAZuI3h@BtvM)xoSc3>-L` z$%o#NU7Sl)t(RLbj(t&<;7NZwJE`eB?!L|-qRa6+CjfQ5?lC!?^Bh$3y)~#_Fns0M}trW1ZlO0pP!lO|BRpY3UW z!{=fB<)ONspMUAow<2F7P*ZEvd_h1=Ow84g;LiTQNF2~5!if3ENX`nXP(L%D8IT8U36C2An-_SrdO)y&L$aE9;^kz~lAQ`?PG4RK>5rg8;7 zW$*OS2hn{$G8f$UpjqYXbRS;o)AW#W;5S6l{kUx4lk0Q9x4FGyUE^bWw_1TC?J!;7 z)TODSavimK;Ps)Koa{sP>h}$M(>NUDve&@C^R=}=i^-?I1!O~*j^Kn;gVzKnAwu7p zi#2&&PCp^c=%P%bFP1V0z@POUj}z~+-m7(%d*2Ai-KXoU=p|!86LEMFV_yNQQCH0M zpp?dt+p+pGnk{%)6(&~-bmi$YqqKP`;2(}f)ac}x@cwEVD{!2Uv7#eF9d~ySRe=|i z$vCH8BDDIMfhMl}<&5ijlf=!o3iWCVAbmh%uz-NvOmN|~M)|jbrp6sQmjZH7IZSF>#6HtZy7|~<=XAHN*rwlPlc4X*;kfh>Z)Z6D z$o!06Eu`79&Ho1e>l8eA5Z-pgue|x1<#1}V9VYhUi7j|0aJ@P@;cvp@077&#GI-KD z=f$$ztMn`;G3!NCD%|te{&>0cc9q(xT=4_4U<0u+4q^@R=#Q@o=p*y_@e! z9MtuF#GD!j4-YKpvx(n7*_*~v_`&e;^?&%yKXKT{fVaI_aX2*uI52)Cmh2&eV zAh(}yeh^LK;O2hNyLesm&cCdhLXaY(Bo>h3^W}lCSPKEU8i?4vD2I|IXP@tR5jW2_+fb zkn^jMe-K~|YI)a{VeKP6Ew{%CtozKLV8rkXx13q`rAvin@bli}_&ls@HaIzIKUahh z`$JJj@|p)YY?<|%T1ow8uZ#rN%k0M<>-k;4HREcktG^{0Pa@w~SV^6?;~_>)VYsY& ztQ;~4O0{egZ2K zA?BHgKmBop?&#|ax>M+^Gf=uv2%wq8{wj~z_40AM;Y09Hn;Q=(&#B>vgitV-*}l!; zR;1wPD65l}jt(WLH1~ZO&8H((@75d`FLsZi6uX_$d>l_B&tjHpIj+pt2ZHj);K2#l zo?o-YHQr&yd;3zmZ|z9bj@jwex7!ev$Niqy|0)_Q*$dC7HqE6+4%Fo|pZvkv%34AB z*|Px~o;0>BUi~?PjvgDkASuC!**%iaiHukeGcQt60F~z(=NALd?aP%6PuuoN?2dWp z!KXG-Vx^FOFq<}b{^2jX&A zNboX0<_^H{b}igqld5yh$#^qvWYvMSt`tdlB0bIRq}^ekKsu0_y2?Q;Z?9F+3S(x> zNh)j><9e-IVPd5am4?kjReWIotLF-PhnaHfD4$)xoT9|s;wD!-H60)NmD!SNgLdaK zKkgeOG`|5FFn_E5un%M>F!BTV9s@8Xog6v6L=j6{D3h_DL|r^UdgZjGWNrUy4v#a~ z*DxK((oi9ElJ)E2&295(&}p)@XXono^f2ixtdg3_YkbVpvln6@N6u$B+A6p)iCK|LOAmrN5}c@uuIr|T2OEwvgM>} zSTM2oWiQ!?))enarO?;O%p;8b3+gQ9spYrai__;REZp2G4^ZS3-e(>OE%!KwQxQ@1 zkxT5jPKWJyfukwG=flEvqQjsKkLM2W^CH!b!NHIHg$@PvzkURjN-xMD6&+V5QaKzl zP;6lde|K`)`^Tfk#O+=WXdTFQhK1f8eQf0?R=)+iQP7iHIY&q54;&y#|2dh!wx>7O ziZO0z%x4q#2vLC^W#4$#+;o|Q!8^Zy9Y|Ds&W&0=K;quHS}O?Q<80;Wd$knxh`04W zObSlKq?yFoxeYeS@@!GkjduhI-lR`4kaY!&b@=`Ly*&@vG<*xM!g^mEGSu&s<~~N>E(;pO-z4wP?t((&XGV6IQyy;Nnt%&i z{^bIDTH5@!rkjy{pl+b}brJkn zs7dx2Y3Y`aZ=RA%pqHfSlDjO`G|0J+;&^`50CmU9oxU6JN|?~VPkyZD;-U|H=rTUK z1Vgd%{eO=9|B!do684+^OsK!s|8+3#vB92fH=oi_$M;fO=!n0;sIU$7xR!1~oSB@= zK??0{u>R4`iA|w3g^h%8O$q$Q`{ShlC6KB%Z4Dp{=a`#3Y24Btl0a&7N*4nJi5O`{m0Qudb&F`?kcR zf0~mHzt`*3?xHSVDk84x7kv#oqX3l7 zAuEgA+dQuh_QpNlTMzbEn+{J*6Or5TE+S#=iEVIK0A#vjn7F_ zv$(3EW8gTm{_xs;kLIP79(c{?{*@o=x!mE|H94H%}od+cJLaH*mvo>_}EFwLjs>Gr+nw$ zf^Nh=A>&;+>~lBIs{{ZEfDKJ|7MtHj!SS&bOxer|>*nNyF6RkNK!4tslH0zq^D2KI zZI4xuhW%1QRlczql+qfvT}N;AXU2GI8p&v@Z`#*Wcp5%xrWI8+?Q^(Z>@>lfkx?`v z<`yF67)1>U`M4MJ3ZN0}`c9Nr(xv$r=Z7Hw#RK#6HJ;2(Z)@9JuTpP^mdn49!hGWi z$;mjDb{jk_q_IfwlFaaIpW+QwC46_F+t9Kl@~R@gsUt`NE9xQQrH3#`lnu83do7zg zd}!XWncyoYo7HojcGvzbug;6XRKrnz!MpKUxEzn;qoW&K;x-x~p>8h5*i30Ep2w{q z&G#ckzrRU|imywt0`bxgYY4+P58ZEPUHkiAVaoI~UCqC}7fQvdac3_bqFI0S_AU#J zT?!xH5qdic2+$5Cp80h?F>kdpegwGST0CTqE;ahT4IS+aML+!>nrpMxv}BEkwo&s% z-Q6YMgQ1yq{$>tYl4rAy7S=?n#t(CaZDT*-tzc)jF?x{mazNm8FzITafOeg++8BSs z#1Fpl%~hm~4^wrej3^M@jq{-?BMopH64$|-BzN0!Ril$BDuA|Um!ORI7pJ??R&PwE zb&~{OHsAt6df#C!csXxPwPY)~d1ag0Slrw+)JrpTcnBNC0Cn8XeCd*~@Oe)PC4C>G zHo1%iqSkIIbhx!tA-j#8O=vsq-L?eJ|L^^(U;S&6sZg#5_=KrTdS?KE!OwL0EWcOD zhc1~Aq1L#+1kH!o@MUEYpUrcwq3<tN<_ou0k=Oot<upEUgi6(jT81j2jVUn$+k9Q8z<3CNSRb5_ zMRCKK8*hznf17CIux>pby~sxE-q-m(fc_qY ze#zJBr;qJVBTjpWB*q>PF<@lvG(^Eb`}v8oCx@4#?QzPXRcxFXA2~5M^=7w3UU%~1 z?9Ay|#>=QrIxxDBro848=L5*|Q*_^=fbdoQ-2mdRaCWtAk|>k#H~>S$9rM1A^>bKV zKSu_~x`}-TFf?vp*}>D8;cX09ck_LJqJz+*rqs$9mkaw2Tj7K zpQ*wqt&J&Fow1w#NxfU4s z5QSzy<^h8e&+5*59k=@beX@*Q&+}iNu3{UVdwPGNdEXa*tRa4uAyWl9QJc-_B5TsG z3jU3&#>@!@j2-Y~L~z0cvIDqhpz-twx^b~jb5?uZ>;oY4BfabEs<^OzB>G<2hyazQ z-*x`F7Y}~ozP^HQZ*Sw7T;Op=T~4qaAjXUFz@YgoEKe$9AVb?~dh#t(Fg^*unmC^_ zU6t!i7^f4wb$~4aoG7xI)lwT9qKg^PI@uUB6*R?#RkMwnWXx;W{z!P>k26DLTmPKZ z^LJK|&=t}gKu>#5S;lX;LskZD>6-_DzcA>vTxOb_Kqd6){YIn|sX+xp$%de6q>~<= zE*?eQ+tsS#2O^qTG%I9t{F?7f0DI{@oza5;I%6p?iKe%&*12mZ;dABglZ9;Db1&gk zQBe=~Tfo*qUBer@kVuaZHvAFTm?=!)tVj@j#=)Y3OP4}!r;8r>wYnqzgH&tc*}tPd z@2kH^Og?|Dhk-A;5m`jk<(?9-hw0C&Eeo5OxsHtvy4fF9-yCb9GMC_;(Tj^@O|B-= zoIF=u#-~N%eRk>elVVy5L@6@4`bcl!XWHtu_x{jwgu8yqf)2ligBWagadd_uOxv#} zM=WDBqcwVL9X6ROVPOh2iaXGxM4NARM99w)sbo%DS5ImCiqWynU9N@+%l70q|A+Zn z*{$iHZvY98470lXo_CV_<~Ajgsms0F;|7&6PL0l=5u!NCe-jTL8ZuxP{EXjyTg-H_ zB`#HpLW4}cUee4woKKe_=3y#kEMbB!Bg`Lw{6pD)@x*j8|Av37Ddo+c#d6f_Gaxjs zi;l+XtJ6B|P#aws62ce$8bi(97V|g$?shzP#7LWEw5hJH_g1OHh9qEvnYLTRObrIH zYS9SbZd^f+m|;?iLHFQ{rR1JZKEk1KmHq`veSyDiC-z%y)-~@-B#XtVK6hV)TF-`s zaFlkx_Rn3l{n`;MbXg5?Ue2YtB&=;jacvUSCF>}68kP0nl~6HvI+)tYof5dnIeiEx zs_u@jsOd!XpPBjV7*Kh7$Cv5KjTJ*FL{t)0m{;&)ZMyJV?zHsGg$M&tFnNfK!tCeK z)M~LLnFgxR7^wT+dqVh#9^oGacq!8h4Nx!Xi!Q^GC_-@#Q~rP&VY_coY8&K@94*u% zWa$2Wdb=-S{?vOCutq*=U1IJ-f&zj`$$S2wL)yZW^bSwJTCZ zG-|BD$2Jn*wEK)>2Gg@6u?OukD_I)Kc0>bEY!Cvc@sTB6vUF(Ap9l5P zTG*c7m6dq{&FNFvOlOLg>i5QCG}=lFw(femcHpDROHG^^*Fz_%)O2GoYwMKp;RE-$ zM%LHld{ycHaxjY@+Eq%WBYrGU&%|;6z*4D(h#tEoo+MkxT=Mh43XCJ(1vtUE-wlJgBiL4g$sFo6sE|O`X!55FM|LyrNAvRWz2h zREjTD>YLIhVG3VEMrbGgCev3O`Qdn)(JVAwpf_F=j0w{eP;Z-bMEz&u%gE2FB5y(d zaH@C=i2-_g@?_zpzFL6zM-Xm2h=m?*LEPHBSoyX9ph7$M5Dowb54e3M+%NNmNC+-r zq{1PQp}Y;Kwx+B6NC2G%NIXtUE))z0%f>f4G=xyo&h~Us2YzP*aX;pXb-~*lpC5__ zKtLv&pcFdVf}2t~Mi%j;y+U=Rb9V z?@cXR2`y9c=c7%nYT3EcSE<&D);$KdPhgJY6RSDv8pdP-wi0` zQVUAjf`FcldPY+{e=wN=Y4w)UAehT?=j5n=c23s78tq*Rl7$~%Bcb;i^6%giz6N6N zfHF#7tqOXyF?C{Dt-_*vr$JzE-t^|?MGp3VpH`GK17(VBfWpHGyT2xr>B?>eg;Wo& zv`(Cyr3Q~t#wY8AYL}{!?%w;7Y!yRIEbTUDZQ)W&Zq0rw6yyACL+8&&N&;o4*0UF!o)8sd%Dm5js>lB>>WVwJnK(P|=MeX>Cmp zz`@qS*P!+%bK!behKc95?mQQ5>{kfpuCU3ekzBT@UUz=dej^rJ?MN4wMY@vQfqv=3 zu3VO#R%P1pI<$n%@ky^vKEXdF>PgLv+&oy^$OyzXx(&U2Krx~*m2T=)0`8IzfXLj8 z%Ab~jK~4_v*7zg9X9xXH>i24gLPy;e2eBsmnsCR4BCsHlr&I+kY)6SGtEcoymqe4 zI&REZ)6ha*Pk>a`4BqDIewrXUC;0xqAlOq15#fDiidl-ic5mqQqgIp?ubAT5_5JhPU6*IwPNM;>l6oSi ze{M)u680_&?j230f3N+%7g5WXSbO>VgZuRbm>e@aJ{iZ|X7;%e?r13j0ye^DXq!m= zi?*>KZNQ(OjpCFTm1!^nKDEE}!MW+*p&}v?;GrNJxB ztcG$Ce~c#?kb@}cgO{kobj+?7(FE=8?v^Rh>=OF@FE|Xkbx~liXjGBjmm!-_Qi4_5 z(#OwJ3@ur;X9!8fl*lT&hQMO{fHc=(yl$BE?w`_RWx2zN6Hz%Zp@UqGFj(0@u1C$e z$qoJDEc6}!)>+JgY2ZOA#V{%8A}?GmS>0&Kh&~t}7B*r-Da?WD$I4nnHXgZwj%1#- zznL9p(@d^;Na4WFNL2s+m1kK+jjDb3U6WV6-oI6d7vD7^B7ey+v5F{-K)s%PIy-%P6tXjluqN3p znu&NpM=EhH_CX?tHR8v;Wc-i-X-qM>B-XG`Cb#0Ee>nWvn?==WgTlFaZ1s`nGz$iV zi*3dovds8l%duhGpdC)r>Vm4FF1LHD{tIBNp=iTG4*B!r)(Xc=*g zR^w(cK(m+RqYnMxen7`;>1PYi9}$jHR&JW-2J$$wb@$+?Tt%$Pu7%sl&DYyK_?ycS z9&s!S8G_}5G2M&HC!zQaot_`w-fsE=EjWA-%f0=D#Z>t+t;`JZ111H5q9|Q(G$m;) z*XB)yp&!>9$EN3sJk)2l+4a2n=0FHJ=IJBMZx^PAXBP>?>|dZ1t-BEBF{>vmsp}{ z?qc~f2z8}nl~+~|nbL@3r@+g4p#SKSPII7ww&xP*JKE>N|40x+?gIr4XA)*?RKh@o z9U?yCxCBjaK8O^71PAK6kJXKN-!L|Gv;Y4aKP=O}%i{r$;S1MO_#j34_^FJ9Wwssg@pcL>sUngZtK9lJ)$n9 zMoiy5$_1l@)r-)sFD+uOczH_S-S?MdAI-923mhI(m=s?+-vz+GzoR>j1xlC9vbngl zSUK?bt?jT_F5r_+Qnfbd+R?P<| zO5P1Zt=?lSsQcFwTdB{z7eEezpkm@;YW}(% zA8JS%9dhw>*4gb*R9|v@tH$bK$RGa)I?_M3N90ABqnb2V#VE)asmXY&4x&G=u{lzl z0oA%$gp#L{b=DEe6RsBS@6y|wdjjrPzcjPaKym&zR02NN4zw+_QgGTfxc$FkCzyLL zN!1v-bSCy=C?`Xuoo z+8YIKET5wX+IzZc8S%Wo6v0vo=P4)dX!+9x5k7fRSpI@t=mx}$a!@}W@q((F3OxCM z>QcOKWf${?68@ACG#_q|G^>75IZ)d+EOq`B(n~wXZUM$3iGhvQi;!`-xn4f}qcg=O#6;g`f^3Kc1laSvK4|C$20* zW@bz$GL5nepxNnle~k&NbvaqEKimQFK1&Z`nVp>q--Y(p$7$I#?>x=d`0g2;0&<2v zps*1GoK$KItmrJBjuAv?qK?Vd&*3=n}^Cfjd z$V#rCVuDYwGdfU1?^?@bFqQ1ZniqzdI91=5He4LpkNhObf!kGzif~#XVUfyhlELZ| zN1(s$s^{nAXca^#D6GNib61mWpW12!^JVg~)5=Pe#m(AB-MnHSC|~=vi-!}YC~@f@ zaQW?_YTwW)!;zJ1TUwSnfB&xs|GW`hh({VvxX3M-yfO6477tTVG4|n~?(ddyM z$bA8KuNWb_qvXw2lb6M=eCx-92|jiW9gUyeOZ9PGA}S+Pw5uTjy;0IPMKXzNk*^>8 z$Nufbm6722PL+ygk^GO{Wg>f#ZbZ_^OZ=0lXiQBk*~k^ zmmpvDJlF_7J>=hqMzmwkF+*q!(Ccc#_td_Rd zJe&b|$2h06hG9Gjx&67EEOktOtxeLIvnDn=HY{XGuQ0o;rY^nJ)2Bl;2x)S3HGtIC za+6+~BY5!JGIsR#6^+AJqt1_IjLZhnVc*G*d+xUJBhC`RrewS$Td8O12bxPpD=K1A?mYylI z-uNUXbyMrvGbV>c8T&x_`!2uiaIAPSLv63Z@WJd`l3dlz=KMlPCUJ7iH+YARKlerH0cfLTGMSqSEydSzcUE5N_a0R1}fAMq_0p765C z7uDJOzK>wPD;p-g@@*3-$ND@6@^k>+pajR|uhIV7RpC%#{vH|8 zCP59AqE}K;MoyFxaioy@InN->x7UEAVTNsq9MT3yS;is%he&c@M&6pYjbOo0OMcz0 z`yQu4Ljx)|MI&$n0gDh0FgHBtcT5~mOS_v-8qbwbVAdU@C;Aj<6v2H4nce2MT4JtA ze}zMoS3JS;P80kb6qaS_DWEmtrZ}Hon%#SG0frJrQVM4^T5*qBV>mr<;W06=BNgms zDy^s(vt8T$U-taF4p2Jn3zH(|V}G_|N&QG^vQyJVyG6^(Xj6*$+{v8`BG|DnEriUV zCdVR-`)M*kk;aSriQRuQ^j&W-LY;mL2?>$&w0){;Q^5~xp&)RE#inWDW30S?6=gYF zGd?o9-0FJ9oBO@*1Lo~cE>G}vFkF0MGK>b|sP;Pw!D;aqhN)X1W($K;e4+#R44=3wLYyVb5+a^;jPy4#~JZ%9S z6^rlR7An)1mN@+@Z37*kSK8vMef1G(nmF%6{JEb&CV2y(FA$tR^Dzk}4{1bP2*$JE zgP*tyf@W41xxVl0%WuNm?S3?DJw5UBynK&+Bi8phQwOa*ta`N`M^sF4C{5MqH=hsn z{x)hQO%wJ&=oPb2VRxbQt;tmz6-@;#tq4If*Z`_$hRpi~+=7~JlnD}o9Ydk|?M0tX z9}CE}md6l3FTGG=Rxg|*cxN!V6?wvYGF=UgA&<-RT#{F?-=l*n0DHDP4w!DNEiaF0 zRuU59kKW__TGN`^xSrauHZifmFd~SE~C0ZvtwG0ztk zTOuh)!zXWp7~bnc-CXZuGNHHGpa(Z#4GF>(aGPH5CMv#99Tfij`Ln6I+HRq((VF!1 zY!=za_FkT5R79Rs{{6S-_v;&S^L+Fqtu&e>{IDf_d?R7HWFyU4)P$O<;Ei{=Ybttt zZ+^_^cTE$7;NW0B%y6>-Q$qJw5pPlnb#<4fse_j_dZ26w^pg1Bz*4V+siV_Z{W6Ow z2V4qxypY(g7M$su6RD}`B}7&bmo$m_>RTUq2c zetBrVKtkCZ{Q3F{3D~im6L46~m009@+^5_!F|}=pp0}J#qPeVbZFplX>UrQa{rVtu zbIXS6wOc1e?cTX@@o;zNLBcc)Qu5%DmgmWtZrqKg`G5~kPKn=ikCL>MhB`Y{ixZNM zFE?;x(49UIamS4BI8>P=>PvOW;eS%yngS4X{T6(UjVS={)r+SWK$KJKe5CSF;QH@O zqvdh2NTiiOG;KM);?E8p<$v4h1)2X@+?0CAi2kjsOA!xB0&E9p6KhKTmal@U zyPmD=TDD;yDF4w8{}W-GTbKQ42j!(X0P0k&kdcuwFby@=`ZnYl^;6~4pKM57%=fca z$_9DlcUc(QQWYf-R#MeO`!L`aU}G21i;rKj4}JPAXkwyFypN?Y#J?&lEpT1Q(4N%w zaa#zy$K>ZB^UTfEe##06hMLgK#@*H&rKW5A-cHWV$5M)uR7%2%7M%rL`^BSwiXPK3 zM<9(bejYe^Fb>PXS7i{#E>WS;Wk&Ap=~2*XxO2uZY{cN?Fu#5?hz-3S#c1ZdSbAc7 zh;aJvQMB^&^F?e|o8&(!r2Xmg-5F9DlP!<>?QM==<;<9X^CJVZjLubOxd6tVl@{W| z4t|k@19B|fYE#}Xw8lcB@FAs=@S=o2GZ2jWyy7|aA&fN{4yDKvKDH#LLs3tAs)|BB zUaqb=r3D3n%7ujg%(IR<_EL2Dl2qDRHYElgpA`Kv9{$qTL}>xyzM8653EsALe6Fv0 z`WmkHrq&Bx68t&BWZyF8$N?)EWML1Cp+iC%TJp5iSgx^9O#*4w;P4sJKwDF~?1Kj# zPK{AY;_&Ikg^-R`f|WK_goKU`{^Q}O_x|HO`pL@5Y7|7VG9`4Lpb|^*guyG-XYUVsD39*FAWnNIABC0~XJal~;a##WwVlkxJPy?&0B4L)>~9Wy}nkJcBz)cwc*&2=VD@l@%6+) zk>@?C{i4%;>(MlJXL@)YQQ*HkuLx4$J;Hu}JqRtUuHq>vZ9lk@=BDIc@edRw95qrC zcob05j#Ac*Is3hNsOAq@j09HOXUgsY_%}UD=!(K_@Vs8+#KY3dO9uL`H3hi04<7{H z{s_Uxx2S4glJziC90sk~{GJj?#-$vDQPKk~Yi}*?ugfjt>!gsOA@(o8+0j9X(bn1| z_)zreuP>DsX$YO7^&g`!qxXX9Tv82}{lITro%bu&JBX2^hi69)OrQS$;HaNpPA1k| zZ*f504?~$T9p@!PT}R6MYYtRVrZYIcWKq=tGnD#_O8S9xqcAm#<(Lf{meCyg!ZSZa z;7C=SKqd%>By%AgnDguK$@wS8RoJfl<&Cffj#N26#EJW1`Qqmkf~TNL^8FxvNjA_P zF%s!QuC}qO33mP&mJgEZ}Tb zw$aH^k|3IFxc~!*dAxOpeiX&=G!`*N{kA!jr~hsx?`wx6L;DTzePN9|lrY;vFB1WO$NZIcusliv{c!?uspN6XeJ3vS! zHpp_u`PiHKybh%b1VUJ>Kd^*TLj^XWfCj99zjB)Ui`;eJ|4N zEf~&Emw%a$Bz&ZGaCV%5hh~;kH_^lnT7+vADWmz}>`z|2qH)#44hBvcXgnA%`N2yHe9$qThB|4#n`H19xr4(ASPSk+#OVno zDRpvMm?{eq3{=5Bl;suZuFk?1iq91=N&rW10PD(P3Q$!@oj>mB3pv%G|9>cQblnXw zuHCQLdq)=+D(Jf$VRb{LaoLkj34!@RaAe+pBmntv1>J9^mio>@p9i6PPvxg&9j?4G z`0Kzp66jpCdZ@UwMOvs>xQ>vGjM6NUjx&6BV;Yz^SC*Mhgc)TBjs{VBY8&#HI}H{j znE`UbU}>AO0$~Jqd1+dFeE*owhs1x>;aGQVp@T#^3@(DAcZQgJe2$2OK-}9cJ03s@ zwjSC4U-NO%)74DY|MN@kZ~k0PTf(taCMgqIb#+a39>-kEhwkUmgdjLLIJa1M8mK*% zxGaV;nh;hJ0wq$iKp4TA7((dRXRwhlJt`rr3Edfb8HI9A!&R!YWj>?PDt?m@H70tr z7<&m=aexFBlDEbl-#-{5+_?F^0BCG_!#)wB_QFQh?F`pBzJ<)dAmNJV0K2Y#j~~r? zm@czEi2iSC+2RmCbVZ%jR~X9=-2>D+o@;;&bF36xKgJiERcFz=epaw-DjM#AhzBjS zcZO}QM=DB*<_#=AD!~-vb={bj?8ms%lbAftK1Rk0T7zdzM47^t2TGVR(B{F$%o_E8K>=khJ~L6k@Y-}irWS7FfIxtB7FsHR~i6i z$Sl$=qz`E<_0g3(;IqVnES98Ffc#O`valv;^c6pZqQo*{c&9E|g(45`kc9249C##` zXK!TQzAOD#sVUD%&e+7V(6bFh&q#OIqx{2Zi#t;b@&8I=5c64zsrLKXFnG`FGe0=6 z0@zR`*jQ1zdVY5H5jQd*|M2{fDp@*SH%`jc4mE`48tIyrj;^4gf!%rJW2zp9+xc3` z!}Ho=Qzfgt_p`;Yjpas;&tp-LfmW;a+l6Pro1y#5sNX67UJg@v=;V8A#ooog&#Cu+ ztBJVrez*Jm!W;f}-*0@6-?95y^S?L1-5oDt*U$a%n!9fMeO>pz5)WorpSNB6aTV+H zo#_XU{%$=!mkAX1KMoX_Ce$UL+xd3#zUm{uD-RF+biKF7#W(IJKi}M{3+MfAKW}+b z|N9`YC4PKf+&?Wp-$%mY_iF7Aw5;Y&e#`5>JN?kn{YU?^JL{ZnIPho1O9lo8$r9Iy z66gHf+|;}h2Ir#G#FEq$h4Rdj3Rzg-66OH3-0a&cY?dS4DRmE&%N)x@2{zuGjpoW zw&}gPd-dAkit<22cszIj0DveZDW(hnfPa1k2f#vqUT)pzoOPRc+LK-C1n(dQ3n zLm8kL;NzcHPDgRV=N&kE$sbMtz!&s?-e7>V44luKFwRnP;xH@V@MyTW5&epEpSN(G z#WkEo?QCpJY@Gq3jwS}qCdMRg7S84*Kq)yz^#CMn0DuG_B_^!uzH*xB_S@Jb=|k|K zqsh@lem23$pA><+mo^Zdx}-ZW48CHUj8aTV6;iyrAF$sCUqx*tw64|zD=GiW0L|gr z`Mj#i`NGTBuf3_P{3lpnb`|T+n}7oUy3W=Dq8%uq^T3NlA_|9DmokR$S`rY$wH-Ew zAM4fo8p-(V{G5ICIQcOIq44>yLfL}6Loc3j*@QAT$B%;9EkCT9s z?T&_hVW{K-u93zpaNX@5e*`&9Mli&ul8cINK7Pb})U(RNY|d8;wz^1PBnlQO57R1h zKEjvitLA|o*3CeU?Uw(2K3YYd8_Hjm)+PA>7m6)m{Lr@T^j%>KaN2R83wV8Ln`|YZ z22Q{A^(vHFSbdLsc3NNOZyTVa`p=kC4v&t&^grH^kNJ1wM6(*_clU~O zFWuO?LWnZu?PhaoldiG>p0>WBn<&ztI@2J<<8Y1xhae=LS%^J-G=5^2BU}=vIuB=+ z*3i`QpV1P%6)Ts-A2s6fVMBt!M&QK<|AbakJUl+?FuNJJdpV685KJ+vXOeL0EcG+C zuIC@|gzdfV*{M#78YPaYQB^j#V2>?vvj4zlug`hcQB=ya-Tg75qZ#k%kY~Mij3ADwFa3V5m^9bsq z*@kW@g++B;ya2pkcZflxF&}>;1$tc;b&88K97pUfIzF=Cc0lV$G6y7Q^i0M0e@o#0 zqMu%Jv9N*ThaL;h*A5an38LVC;5b14v&B~huqO4o(aXQrEpB-EU2l9EP!19Cw=^WL z3xr5BvK{f}cdXm1Vz5JVt71QU{h!T0Wz(568zw8a?gl#z_9y-BXOm#zFmfw#m#yH^ zMtiGRN#pIO{dNI0mi&D87;A6T{?BlFftDmxna+8yn=p$O?REb%h(BB>6@T0f=cSYB z*Z01ez4qf){ot>e_5M8#HSPh+?`++E&#Y7Leud?zFYVpTZzH2K~Zv*O=7;2q` z1`oCzg}yN3FX@0#SggKocT9M3jkZ!Osp0MZ$P1XTXuqf>uzz5LBevRmkM8w)v1`R+ zUPZwVRZ%!(;`?twLQ`iE86r(b^V(nx+J@NSZSlye71WrIz%LA&&76d*3+vPGiY=gh2ladPeYE-wk1E{7|7VRiOI{cJU|jcyi#lAI z1UF#Qs_OJ(sto# z$&u|x{v8v{)RkPvhRF>6k!Y92oIQBjq2M%h74C8_LBV!$@Vy7w8{n@_;JK71__|fJ z>M-w>28|UA{JbhmNi$O*A&0^n-WXI zrwGhgwQ>_EgjBXu7Hm}F{o9;Qhd~h2Eix(&ZO&V-;!?{t!i*+}hB-P$6T-qOlYUX2H&SPa&vvJi3z;?l-{4kY&Z zz3v9up%6^v8pL(gmxifl@2!_Vv=I%Qx)aq1iU>dL`fH8~4U7+nf4*;RYXc%Lxpf(~ z=Na}P3H<}LKfDjyks&Uhjr2Y?wzg2UZ%>T&<%7h~T34B(k9<%|f|`xjj8iNXUp_v;`_mc0BdF`mV^q5qTxWk~1(ag~)e&8nej#Xgn;_ zXipPv?K`7aBN4S7J+TVHQ8*vkkEewxxn;YKEs>>i&FS+&yli_l!xS1|wK?$p zET-*I(T(w=dsV6YUiYpZuWoA&bY=Hi3W7It@#l}xHO5#oX+X0FeLm#!W3qQ|B>F_{ z&~DhM6a#kz=+GQxu&IfAq?XORFMf}WDxeX!>J}bdedcY1e#Q(5%lNs^_+tzJxox4ySK;*qSS-hB;oytG88sgd@ zqQ&~1UgL|Lhbmu5>!BWo@eM2_rpBuJWGKPYv3eKw|KIhEvBlZmMZAi1fh0Ecaih&E zZj?J=eoN4~_92E)wCMEyrDn7uJT7`bjcADk7mj>`gp%& z|3(p|9IJ;o!(V$0UUQ;8O@#$_-)5oU7P9;*tDy;m4>eu0GDGsRFbx;+ahc`z%Kzfq^JZeV>L*|eb z|77|jum1}XRP*cg=uQZxQJd)4C*JL3!H{SX@2-@FYCX{Eo*o_DSBaONaoTh8= z@f+GuT>vEsU{yz3VI*WF4Iec-To>&(&9^f$RQwNxj6QH`HcyKQ3eSi6$bvKN-cOEY z^JO*`Hb;l%7krHxw1pftYhew!H&!dFIc@91giQyvd$a|tQyYOw{V}n?m5=Eb9ER>8 zE^DHwiJ+}`Ad$~(p7>jW9!_uA24>@Dhs?{#de+FuiAaQMqtvt z1_Xe?hXg*u2`0%>cmFRKO>zG*8x4HANk{UVH^_L&jUD*%ZNT-XJAwV@h7ohWv(jt(KlBn_VxjdL-+UMJQV*T&=M1LbBP}ABU3oD?sw*!@ev>E zc=a{gW8+5eWo2-%Y$sMw-obk;%l`GsW-rI{hE;)|-|VgR&iZ^cN^?~s zVhX!81&-^@w}+e67aWbqxuIvmNq^XS$ZXxgwO;ry%w+c_QxsNrARape8*}pJ0z6}E1*mipErFh&<1MOlfQfmKrb;~p#66a{R8h4|Zy;>DD zC_7AdIZOoL1RZ$z{eb)^{nC86gDr6J6v_C6(ABopRH^r}&xzE0u+f%~&S5j9T$-1n z=lk?)Vq!uD8U}^}0Rr&;0u=P55xwa1X0+MH?>2?6dns zY89OBMt0E|x4*z7z`#JJiaw?kj`I$HhYvb`$N!gn@sDBB@EOk6@O+GGe+ z4)D56WrH``7}>I|$^EkMGg80}nXhrqXmU?6!`V_TGZM7n6#R1!amL_sR0N>U2xnVx zIM~UPZ^!fX%Z@xuH!Pk;v)$JUZ=__wXh7CQb?Z^1);+H|2;zAs>3@Dj&gd#nJXWyQ z`^m679^|S6a4PPupow{l0Vi^9^v{NbK+|yUrQF@vyG(DJmJSKN$p8KTZ|x3B23^fp z`x=d0_49FTc}xbkfg+yy99&bdL6SvPsOf;`N(=0<{n zE`<;~y=ihamWX^c;Lo7|=l8!*3Kg2Qj>S#wcdDIkckEZ&5vaWXhN+f)*y2J&AC8M|)?o~r#&h&<4IJzx??VQW642wgtA_t(924%=4K`Gj(h z`y(@0n@4Q%%PIz96Vl6WY6>(-4ybW%wrq)+A8hFk+hTA#Ggqb5(b>|?QX$i#zXb5^ zj@z={G-*fz9tCiMD19DUHM^U$;q#6WeB>_83jjvbV-Tp_z;i$FGyK3+;?P5!kDKH2 z2agvmkf%a>iJ|pm829JEU(q*rKk@A$`}MI{XHObRjw+WMxza;cAgGe3ziXwNcSH>b zH(=tsar-HPIqgy2l_M@x$4yn+MAzqs?%0yddf0;HO*kZlcZ%<1QRco7Ly&QTIm5xs zJ)GGbdy;>_LEejT;`swVXJT<9KNMe(C#u6_ESb;FJn)frJJ0K+4-ryWjJ#AYJW4Pu zdIe8L{$9NzCrfw$-u!FumGt@}#B)Qn_Ze?@)v|2Fl_B@1_xx`pgf$`fv7_yMRs5K( z_j*xhiBbe9&Pqd(BGIO$)5oZZ-GpgogiDbwtO6%X89m;{#-Ey4-d3#4pkp`Zv+;Y#!v47~@#5UCk)f_4SB%H6qVp!BgQL^1+8NWf zBRN66IFp0>Dskh&lwd7vGl`LPkOIcak{m(Czm^hXO;zHg^5C*P%Q`p$)yc_iw1X99 zoCMK{aFF|(>wU-jv?y6HT~0bMZA6x(?}SfaaNxjfrzJIL7binXgvCiQG?<_yB&I!P zbNyfkA_IS29A!G}yoN-&zVu%B-YB-u{NIS%w`=@7rcZ#X%8FQ=>(T3x0*ms1wSnLTRiKD@ft|Fa7u+pe3&Pp=nlC+99H z!@80djZpk&Bw_)v-aHYlN$H|1B0Z{Um5-uqGV&rnZ(;}-+L`5otql)yS5oLKpDrgB ze;{+A@wLPZ^R(TNw+^BgeM`fhBDqv?0&kQBANtM$-XJT?KLX?3gkI;3n08Ns>jEAI zI4@Q^VS`u+?V)CIqiyx1_rK%+NFnBV$ba$OXU%Tq)wN)5J*chz)^wW%gU)E)+^Ox4j9JWCG9JftY%#L!qQfZwdG93ngkZKgKB z>E-0Zs1h9a0yO(<=PeL5#OEbK`BviT^PdM!g?m*PQH~WHF|;XjITn6P6@uN7ZG&uL z^YLGFUW}+2?)0izn?X<^M}!kUG}&e|MVShfQ!jiURs|urj!TTTtIGbD24m3PfjoJp zW#<&^tnNM}jBo?R3fg$KCYm*RBt?-sBKNb+!c0z3UkYlpogEW(o0fT=e4_n0?vH0L z-!*R;qd}+*&r-c7E>vVICCvJwyD`A2d8WC?;5-S znf>ndSn$JEmlLm8!S_DU+aYj~kchG2zr*>k&+vPHqDb)NNSFG^N^7?BLZ3-=9eXYr zpvSpXiL;BL+!c?VKq~kH!Lyp7ZEr=C=E$(3K#8aPgcy4uOj-O|I6W{LJX_OXWBv3_ z-=z2Q;vw);=ECbcN;l!_A{!V=(IE2c^pMx`w-D>?k4iHk_g1|u%iHXZBt^4=qI zrJSS!kYC{{pIB$Hs!X^2_`f^jeXIF#JCgfp+-^7qTV_Ib|4*EJ?szISi#kQ7#A>>Z z@oJiA9d2{Ff`--T`D(@k5ot`2zcw|f}%+6!cb`vmT*g^n$U ze*`(TCBzkq)&Z~tlS+WCeAWcYRL)`MZ&(rQk;#{R`bYi$>%S51)@I{%a7D0{bm@Qk9{yX zyC{HdCTrRLkRB&!+>e(Xu-N4+B+V{IeoHkLvZD8Bz-SL20LM?Yht*};>x$+EZ%CGy z6vFAwjO|&GDj9C$m5|+cti)s|-p>jeKs#dOk zt9_#f8f`zDYZ~~%BykG(hw%Hr`bpqT0=N)(8#4Y(y{3kSh9K`MX<}V>g}o{8as7-a zhn(5}W<(P;$hzb3e?xC@Ux$_fG|c&k!Ly;JB7;aY+;?%^Jqghu*@|bJ+1Qn+5UQ4U z8{;KO24J*yfMPa*cga%Xq5%s8X)^hlHs-)D{=vD9Lp?uVkJ}ct$EgIa!rhq%{zJIE zg0_+c*9T5weC1vq{Jc-HVPKxMN|bhsT*(RPr_!Q5Z>@qkZ4`Hn$d2v2e}@V+GymO4 zW&tFK1!M#nif07v;NRAoZPpf(mP{p&UUtNKN35HU|CEN}6XrnTsr(4OkPk7JBbc6l z!BpocMMS#xKC~3B=w3Uz>kQGdeVf(xk7Q^){5YKgJx%y|O)r8Ti_o|IqW(?424Z5q zFt#g#(_!;J?XvRzK+MEUUxAY`&99tZ^V(66?Jh6A!wQnmMdwb?|fgBEQ=Bm>x**jVW95s4X75$jKP&*TF=#&^&BPaZomME z6-RCpKV&dl!X`|1d(`5&8;OGLTK9|}Z@gjcVJKF3_m&qK;hDLfU=(H^Lf8X16{WJ2 z_7g#!0m}Lm402VJZVq@sEbn==w%?n=d(}_x4UYqdgG@Ky!=iNC*0DX>DC$N5$7TQh zYq>i8o

~u8;SN_V?z+tD6(Q9xB^c0&GGLB*17DU#MW$f#0@Y4%feV?iuER-y?a) z`1p7LdL4`-?vj;R@j&BfDn=P3ZrpNF%D%u?SN!AGAPO+)!R*F&NTxA(Fx z;G5q*O~e~S)kbxMD!r;mvGi}rX03c{Qpx&|H<*wtq!b|wJBOWUVKEAqIVB+I@qyzV zfc*N@$#2(sR5S{Sj*59&u>OaZg@>o?0p$15^uVhx=(GJ!g$1tdyvyzV(V6Xf?%O|& zJUAfuA4VtB@E|hYyQe!}TUkriVoQ!Qw(0xj!Cc41U))Uybkb;+Dv#PY<#A zVy+m_mgV2$pb9a;|8&;=aEOkBhYPlu^00O;faby{nNO8?OZ5fQW`4Qb0Xoe|Qf4Cw zZzVl{UD39AYY{-;Jml-QD5~3Fx!2(jMMr_|{>RJXEj@Pov5Ba+oj-X_8%$X2qWw*t zkQ#x(&US(j>~fzUH1*K!_2HIcqCS8&@E;=K3@ujRnd{~B&q3SwDsArK_uatMIREAK zj@Lz?VE!+XYQIJ(x6S;Vwg+i192$fIGVHb^0t+Avw$M+_o@6C?(Ih{yOx`a6F`M89!jx8 z^Nn`rd!AfyU}UHt0r>(Y@f4 z&D`Q}vH)GhxV0ai5Wg%9Zm0K*it&BR!4=-h1jyp;pomP)bChF8bRDQ)yIi{A_y_<1TI$sI3zPF+8FJyTi{{Gmve z+?VXjINL+WW9wBXtZp5b+5OLf;CSq4O1CeLj-fC1SL+8eK>5e z`3T`0r@FmvdFG1ZtB$q^j$Rw_-y+o{fIt<_x2?vkuC88IhjWn62tL=_Wj?j)0BNe3 zrWP-DdwI$e@A&?j6NA}l?tF>H=L6BHMNL`uf5Riq#LFEUk5WoyxnIX|~G9s8X-noK{-I>~nf<@WM+;U}o~_!s*< zPxN)JSYWteQP-^V)3vVrncz9u#H9QF>O7ui#{2RNZT?vkJYQ=$?R+_J^Ld`l_C1{H zMdE-VXs+(q-5!0~7013FR?tQP5&WAe5MoDS)2}pD`)#&&c8*sa_-SJQnzUaBG8!x- z((pA~ekI=nf7D@sKv{wdS~fq_`};1PF9#!rSt+$!$|ife>KN48&*xwArkGFk`k{xf zLA*g#lM7;g=O2CllHxdAYG$Y=83rSPOPBI=J?Xnm;Ugu>#VR#9&Q(K7CXgmARES`S zmyreyljBfd^EfpPoWEqELLV5Ir%M5okJ}RGcuLMrD&zm1{zxkHqbvlOo5q?uf1^5Ezzr4LA9JT zo%2D7Hp$&{oHafDdVDbm*Vf7^9^zh5f45xS_i5zE&A}Y!bwc(lr&-1)22drGnw*{4 z6!TwS_A)lIoOq;?lpI4K^HFpo$MD`aLsWe%-(7@XpfH{-^oOAu@%B&1BrASPz8x;k zc2xM5D*nL0dvl|pGclo3q)d(Vc!N&Ib!C;p(mJSJ@CO~S7jEYs8()iZ;AkPr?yqRF zV9CYJk z>gYZ)n=$$OaHX*cz$l6kh>*eTfLe#g9ezb5tAnzWrA5NUhd+ASA8sx0c3kgrg6~JM zzOMr-P%97hoL6mjKH&u-U!8Fg==8;gzM^H^9*s7iZ&$}zj3gYH=h3H7sygr}e6JPW zgyshmF8r%sDyE1?9UUcFdd<1+W`uC$oaWf_T7S|1fT{LBEr3UVs*`Doz;o`+hTHj| zfTy-c#pC((w1MB~nyRNIl@s;^+2Y2;ey&p1MhzGTlA$!IYrCS8qRVhz|JKfEwq&1M z*grmf04Y2{!Gm@2eevPs0T|SCUti~Z&gXib*>iXZn{|LXr@8zFx$?X9-KrOoJPhZy zYH*5bkqmf_p0tArm&x5kR#NgMaTZSFi2y?;?82y33)V~_#1gRGQYG$_O5h*r8SF`P z8{6Gm-i^~~Kk%|_)`JE;Ai;zaMSWx(dI9n#=M;R+DWBC6mfMXoR%ZGGQ+AAZ0P|%6 z7Ek=Ekg6gA+MF~Z91|wVHbOAGF8Hv?v@+(=kw~@=8h|7vM!H9xarlNd6oUa^H+3f0njKV|&k+6nG8AEg?mbYe4k z^<>c}`|Ad-lq4N8?I@&JsZ5PQ6P1GdEz#X{ooB&@V1F6$jjzL(yq8>DB2)tR1iw2b zI)5I8UM+LP@T*WcrusEpuT%z_75&c64#^mj=;+8Eo%_pC@p`-Xgw!Qpa>qSj<7r}t z+dNz6$a*+I<}oTN`o{VLAlQC1sqND{j=+xxCy;x+`$qxhijeG|z-7t6;mpq``;&N^ zGXb?dby1hC#UUx0HTlWM}sg8 zin!LFDbA>SXOhV(pzuZWi7VJ+H_XQ1f#64f*U{Z1rH((ZiROhxP_L-^ykxv!+c8h4 zXLnWm#nMhmFm%3cSkOG}55ZwDCoI%5r}n>=hXm{*6)Vpsv)#Y0XX~GjSzyof`Fe7~ zmJ!9S_=Cz=n7-@Z9CAVAi!UG}T;GO{SLk-79&jK}3v!KY4uHW2iAF`I&>%*4OM(q# zUXuxLN=q6vhoA?>NiunX3cWYUi*NSHk^Z8Oy4Q*oDi-x|N$A_E!({uc))I8Cio|fg zq2DQ_tizuEH=&4p?|cU>${A`AT_N7^cpZ;<8X+ub1~LWb@cj7biZ5k!8SRAPR%|M1 z0K(EMBf_%cGD!gs%e$Hkw4kZ64BW@!_cZ@Zt+HReONhSzB^v6BZRJvcIQf_^o{D~B zDuloq-^?06;W9Wjtk=$^Nif+_6fD+rzzyo{jguA!nd|Ik$&&DnJMsZA;KfmZ=AsCA zs+Uod;y+JEm%T0~`rXzBgRD672JD#Bl(0n@b{f~y+>A#p)!;+G7j<7cps2E6lau^T zto-^h^|mAEI%_8TvGp9)-V7;KG9KSm+}FW)nN^o01?Hn8$dnT8D#eE-QlzfX^)0{R zqgwCIg;AGP4Q(04x0>ZFg}p0QH4iI|hkqN-tSQlo_Yf%|wG=HgND8QB4jqWRMMS(( z1%0L~Hv6TB=^mzUB$EP7F>>k9rPg@CJxbJx(_5%+NLqCSj@L@s*F8;t%r&WYjPg}0 zx5ESR@~-3)N7Ojfe*WO=Fq^?cW0s$z`8V~g%{S~_aj{{aEjgl~Of4wy$Rt644Imh4 zTI3sWZvYQrsSgQjmh7-??k;Sxf^MrlrPT^=&DWcEkGovACv7XV%#u)IlmE_1Z6s22 zV=BaRl-J2K98+mVnO6m_uBuPwX{X5eE8gK#;2>E%TTfJvjNgv-RtTO2C3wWj_I-Ce zyDM%mOB?P8VQFgm0rDXDTWSc$9%+S0KUqH-%KTe7DI93W%Z}@p`dF4UH^NeR+n*kX zhyjR2SBAa(CpHB2=_(H6bxMrK=f$okE&Y4Ybt_{=lRsv;y5q*r$+p~2VzPRUZc-qg z(f85@G6@AVN$M_yjqR@5lQ&yMoYMdh=@?=2^)QXHBlWCXJNB zk&TU+B|Z}(QX?itA>MZy7)*%~ldSccEVYw`y6YCiwU$?l?-d%Npkp(S{^_6BnaJ7l zE3BV(l##4-riB<0y%4B1xHFG}m-oIwqw`5FGIt99TbJf#h}fG6PQ?m>1}k((d7r?` z_JZcP`Xfh28ZSco)wvlk&b@d;q-lxgPFrc83JJJk3D&={_`Q5~d~Pm!$*8rs79Q+TFHqH-%=Y{6Z87OYUq3E3>&n)Z=aFQ? zxwk1bZ8DcEDruyBXJoYbq83P+6vaZUloHq=-|6;l&4~^Mv13#c%uq-yBye;yZ=~Bp zcOYA=2ro$)jC(d-P$wn5*L_68rpZS>^(!P-set=ul@lZXWp@xEfcX9LXUl2b=sV@2 zPycb!H_e*M+&wz=`UUyjz(wK-cI+%EMMTMG`hqtCX`7Px)Lp${W3;y~ss@ekY1Vr- zBE9T(?ztT7n*RP6WO1^_lAfgF7Qd$jqD9@7zaYw}QnM=KY;Cby{a9j!0twN;GU2FV zRPUSrrX9empw7b7bb{;j*{QsoTWJ++aZXv6Sgibz^A2){>y!5Xltv9+^4XD{V|@wO zOYI!T*@?eLf3`@Z z)rDmkE6@mJ(~*i7#2&K$hSy@&bf^0dtqhPi=LU{qQj_w?A91&R4Zpx*T>L z%zNBxE*Pd(!3+*HF$X1T*@5}W`|DneJDFbJ3RMx;X?oE#&7~-hWD83VI@bFLn__cC zIKm55CZ@v+Livqm28sP%L9$8vLBs-0UQgG1+2x5cHt_DL6lR?l7|9b^(zWnUs)NBd zA=oO2)lMIIu#sWIx(6>IwmiBm$7E;8MUvD% z;UG4q1Nqu$TBCu1Je1GNBq(7GQyWod=B^EXYK#5YNd&hcJm`%m=xqL&E*U}6P+9Jw zj(4$6zCYz;uEg}nA$I^AB8BIlBQGzj^c4;F6_?`t|8~&OCTrGm)L?;%S*uM zgEQ(c7&82(vM|b%6)_!*T;QU=G9_Ec{UEAOmVzA63?$nk9sl8MJtk-LEy_r(gZHA{ zDZ8uxPT;(G=M!T;%%v&NyymjB>@RgQ98bGYpuyx)8KR_eED2#|B@?0CI~DGlLdCxN z!}<2?T3HZ20aO%Dn;-D46if3uV-X1rYSE$;>vr6?+iatz45MQ&=+xi#DScf|$k$#D zfVf`PU$;Wz4<9S;Z*L_P6duIO)vLGLV|^(;(f1#nq^s;F^$%>`j$nM#)~45VvB$v0 zKPU~5d)?kx#cfJ<8(&RuspgGkO(6=#Wo*6YWIwm9fL1G>p>jEyy5#w+gu#j6Fo+fI z9u5#`)E5(0erFcOS(iI4SO$F7sgu6`UV+}8M=VM+cRc%EcbI?%U=Pe8ok75m#M>>E zGp19M_ujKIpD=DY3V7iMWt7%}Spdx*B2Ol|5YbBOLCv}z$N*j%SEU(@A9 zMaeaNeY_ZXJ=PINxlmIboDD||it#ozc~pL5Sn3rv$VR#?Jn~7lgQ3%O9Pf+$ibe6; z{Nl?P>*Vh9N%g^I5VEdXrNr^yR5r5=AC`4`Tm%bjb|7s?jEDhhe!~wTMx2&K!Yb&X z4wHVNlOM740!`x3-8eU|2>z&1fjw`wYH<0{KPHD6RiKDP3wb0A+KJVI*ppGdrdsyj zuoOfAwXEz^-}tkh!Ev`XfzMHC2I4@W0*96k!hobs0CQ*SGJ&Y zQ$korG!JxfS8F8Nfj(JdC=)N=W zlPWKLDH3@4c0rKqUV>Q{Zt_^j`Tetl8ia|v^=({7TFUhNJSvFfKM0Lq&3(*n?6}Oi z2yU9S3K>E+X|poa*7XJ@JtAY(f5)xw*~g>K;OM9byOYeBr~cQE;w2}@k0<#S%FCHEKIyWXget_B|(c|mI00WtTSjL6`C;fHG8Ew2srv-fIARUSC{!W0|F1Jkd*6iDS_4fFLHyGo?42I>uNW32Kmu?HxWmEk{86`@)# zl$IdQ=@w>Tz6vRUU_50+nMXsiLgNGXFuW0i0FgqFjf|)mpJOS~j4vzRTPE9&XNdui zK`W%qLv><=FQ(n9W~Vk9(_6W@JK55FZ^h&3FGq)mVN(A8Fv$Zk;p)T=6e&LY%0&;i zo#jLzC^d~1EM?sD<_q18_lC*9;%}L(v8m&kiqyGT&E|sf!QOZ)X}RU={5-2`ARGFr zX?PtQNg(gc+#FNmBI@Iu=I@1bjazmXp~{YlV9c{4Ax%du*{SljZ|(X9tsL6aWMSdh zwabghfEtgS*n@>i2sBCkHDAUwxStnb!1FJoSk2$NG>sXA3=nwP5OO6tKV`0Ui(?EM z4F}4!x#`MWxv?0y@2$cOyJ$4WmRwrvb|fi|8E}&@Q(Ha4ww-(XuXv0Qbj$ zp9hN!F20lE1YX^?QJ69XK2+!V12h;MrT|@pXcwID80XM0@tXYYp}4B{Eo3C-0lTOQ?x?i_kOa5|VU_4%=_Q z0a*&0zPSDflRXm=7QsL6?w%6P%*?cUetB`Z+U~!K{!hN{V1JqW6JXz6u4jP6d&~58 z7tKkeoRA;y42>ll6rvK}k#f1JWxIc-_ll5(s@q}Bc<3g&SkSUO|94fBG&>{_+1ELx zk;I_SR$XzDtGI_F=FSB~T}rY0N3y@QO{%h^dLM!M_kP7F$K@S z-%XsEl_=S>&`i_bp0=E7-YML-w`38wpQG}@YJ(6ZxV<89p%N#e(W-sXA9o>iv3!XI z2i#c!zrzShC7lt_#4BLK8W?>Dmh02Grh~CS894)?I!elsJr&oV3k#pT- z|4A(7#UO`*&Rb?nT5GWmoDl{UJge3-EP!($Oa1x5RS7m^sxR z4KrYk9q!Rr^Ycu0m*B|OAi3a~8pLKaX+ShtqRFTi}eS7fb zvY#F2oKKq$j={R!%ruA%nVJoCWhZ_4wm0bZ7T)CZPIj-=%z6|SQr&s6vPCA!D6ER4 zNCm5U@|LX#vWR=AjD(^ogC3`#%JW(k;*6cyZmhaB)6D^Wh#RS*Frlgofi3&dv|A$I z>fH<7FXQgZM#8!Y)ov3Y_DLbrDbkXQ_8wlsvMXf_849D=Z;`&#TAA@0?bXRh0eujQ zsxqj8ms$_AF@279B&jl&lvO&jK!-=?sbyt;E}G9NobQ%d<`gYU%Oe3^^rQeZUvPzA zkCv9>1b!{CYNOUDXiM+|6vsum%JlkqlIu!@-{x~LTyXh7lO<;8VJsXC6(|Bp`cWbd ztf{JP<&R<;s?0bh?JWLg2$o5~1s2jS32_vGXrY)AqxiV=cU$2K0`qb!RtEKak_{{q zG{Dor_S6nZjgZU(QFX1`v%>@hftJAunUr_%P4;STmQII%^TJimWCooP17LgJQ5Nrc z=R*$+v9&`$TJzjnR%E;mwuo6d>uEqP6+B z7pifvk~XZl#0Sd=ZS3QF8-tvLL1O5ESTBRx7;X^VYC;Wo}w#YG`4(xqMyT@0NvO zni8+#F``yT{>XBvVdt@SWMt z^7yjmxa}DU2&#c(odtLVZT^mmWbs2{W4^g)QAQM~7GK(jP>RF&axGC&!7G_GkI9q9 zeqGMQEYJ{z%#ie7lUO1o`v<4w(#(s`D4?P->EasJ*T+k12we_QY7JAS(ZJ+mjEV*? zFm>dIG!eSMri~f$>8E&9d51_gD9_KAeRqij$U+jg}IYsrgB{l<1&T*;?zw~4D|DsAxWDkRc1QyZk>1@@ z#IOl#eKF*`ulCYL?k9VMuN8$msz_L$tGRw3E2;^nEb6WaC7`}X-Xhu=6jWEqnx8cUP*Vh94Kv2Zkk ztFf(_ENB$7;o3tC=F1G55yjVM?|#r3(P2sqRPq+Yl@kpvqgSf>F7=2@#rO(dFg{=l z(F0`9QCx{ai<4<=^NxTe-xH8F$hHz~ke;#1qgf3)_)4udh=Z#KB*mdrOi8trc8!y2 zMAI16@IdK9izrk@;@Yd>*I=`v{52-R6L8vsa%}-wph|mW=X=xU1A54M@ZDck*XgGc zbP)C?5C7+QQ6sUlOG{2|Vd2;1+1Y%$?^R)V9jLR@U@)ghZQ~(DW5HVwWQF`naZ`o; z3EMccQi5e?RNA;X%>8=ghwM1^l_s!al)fvP54y&QmGZWcvjYeK_V~sWMln_kl-yLd z?x6-6iOKY#HXPg#IS54txwzFRC)jf{-}0fJEU;PhL^`@u7}Z&j)?4Gk9&huF|Fu1G~En(g9jDA^&eBu=ScD_hf)dTe#fo6Re>L~vKP(d@>V3|A@r zCFdL`yQ`!`yTvuHAG|`HZ~hCicV~y7^|^G6 z)OMb1X>+EStj)AUjn;*-vvC!_h#HxH#6`Z^xR9-2YI-gK8?k`r^ISM`IODW&oEt0hUwQlQa)|JRK(B5%jaY{q`{-V=yAQ>&g$K# zeoC{^D_&FsKh>!R0T;!nwK2cLHsNseB;ASJ1MLt(QJ5oQ!4ONOh0N&#RB2QPFZ;!C z1LK57RfE7w#gL*Y;zs8k(0m6>AdY`vxao>ahq-NzP_e@lpe5qc*@=luQE4&38YRi8 z(uO>bg~`_8DtHf!q|+q-Br608{$gk}Rwgt~7{@^^<1lVtBTn*JOOz@X8%f5Rg#EZb zeq$CQ1Ie<)JIY_lJCP60mZ)V;ryaQiHgiOgqU;#@{`^z0aqVz2qQ-zXW=XyJROg&F zk&R_SdtC&7%ZQ=mPw}lRyo%-&cJ#`!u_WnfkeEF_MtHNiLXf2f;6YmDa|7^rpt^FE zI7>S6Ll$ra_(*bS(zjpy+G8(X50MM%i0BsY z{v5m>CECm%5p8LbEn)%n_#hPNfE4-XVctm45@7DL=^M^_Zk;!oDthOsp9d-ufDA@8 z?(%dX`M$ol{yU6OlfEED`YcBG-0jF7_~3beXWBhOAEQft<`2J zMa~T-r}bwSLx;OV8Wk^-;(nRXs!t~6E;@VNEW4xS<=m@g!Bku}SL54{QkVM4%$V~( z=-=!IvZ*!EWDBb8$e)%g#cs)d3)Qw%sJxW_dEFD2TK~9&1Vp$b*yL!2{N=)kIA4+z zJuw{Tk}hD;Q*(Al7?7c$#f*YAL5&fxciU%cV!}%lhEyoW*|`}T0PDPb(^J03lqMa` z))~zDVn(unIFH(`k*iqN+2?!G*KE8)n(BOJd6?#61p;rkh7sy>5#b8LF9dzgAKnVxR` z?)P~xyj{m6>AmZs?LpuyYgNYcB7{xEKQ3-6NK#2jQL)xPjE9w$HYUc!d7qQq6(|mL zz%clRfl31|{Ut6qSV)8iZdk74Yg2~T2*btm+ts<#xtxeg1nbU^>`6J>bAFfX%#H=m zg+EzTC(|p63Nkjyjr*Etwt)j_5{bt>H_BX^J2Z@qH(zzfqf#jQbCO68h$-0wq`3>6 zLk*9Z`g4c}rIyZ#E_>g}cY{shQYA;MNOsr^RN>?T13_};(wJvpg|f10Y$Pk4e#~rh zrav5B**F@ANlN+Ajy(Ua8T{tLa)es)QKZ=%9#nU@N(bHM6MKLByqGX%*}Zw{S~^i} z0F+3uzb6=d3MW5BZ-V4x6B*o2Ri2;ct*oj(R_<;RhUZp46E|jN(n`f|j{2bYg8)08 zm=n27KDq2x@2m6Aa~3d7QMjzWD_Q()MB$84n)QJeJ8>bb2HTRCb2)gKt`!h^Uk%bo zaT9yS7y_jV6!m zhTqDM=$9KNj2n}c{g6!Mf|Y{_P9fv;-mVufh89fy5>F=id3^4_ao8COeZp!OIr$`szf@u5cMCj_y=zrV33J0^vN#os3Vpdyr>Af_!Pmb zHrm`KDRLU}PW~TF*PvJlv?OCYnb^FsHL>kXY)ow1wkNjDiEZ1?#JI7sd2e^Wq0ebl zS5^P?;ib!hO$ytn;fzGj>u*?0#+~;;s=1@aD2Q3=Qy|YPXGo1QjmK7(r~6t0_~R## z#7$aDY%I|bFj4@DFoYEtA&P~iz83fFzkLfZ-R#6d6I?2~j zn;ft4he~vzUyd$&N;%R=^=bB6kvfoFZw|cF*Xt#-3|%j|1y3YWZUWU@rLOAqJ=YFY z%Z+tbaL>r0xxx9ukiVqD7*b@F04W!(Bfm%>G8lFS0ZcQ95MmL3$1@g zSj0edPuv;7%W%UJ!)nnGw4ng}mu+8JYV3c(001Pa7th=3h6}dqaNKcg5pSCHPazRq z#09G8{Xq+K4bM%J-!TMH$GFaAM(Cs>=8=yiF?@2_&oCii@^s{f#1J&3m+bL!Y{SEX zu9^8LuIh?GP;Hn(==jS&sJ zcSJPicROrgW&eCBet77fBVr)lqKj6A*qfm2{QWJGjPr2=5ClV+sX0zZ;kck&P}!~E zq&x7z$`Z2D&F~(J1rtUWBFBbAWVg7|XbWYH%?&v)X9_*Crq}=cAo$nun#Z9TaLv>H zdP@DzqN-ddy3YasRR;35uhJxer^crimeUnKc)-sHG+wfp8nXLPC|TIk^OgFAM4Flx z1MdmAm!J(~yn`T5x?P+vo@je|dRhyz5v{jkRK6XX$wrV?T3MH6$tF&>DCsVb2*}a9 z_4#;y+23t9>&KyEGj8#N&DXd-eMH6qb;I2@4^NmJ)I0Ej%A zvPw#vYT&M;pd{SjmdS9SM+%|lJDk9KMHK9gelak&7sQsesEYY0CLdi+$nT~~EN^^K zl9D4FB!sR-^~1P>Qj9m%6F9`U*Yg z|DZma$>urzrq#XL9aJU=Q+K{1Oc_fgW;10C8%_a63Ki+*{K}&C^YtRPy6%atD8{ic zD0V!@jeDIi8cXwHb3u)@6*V%|28G1nxYt!B5L<4>!{t7;f*h6P9#RoFRcSvdq!YfR zVFbs0K@*5|wDdHX%w9CP-YbxkI0BJ5 z0lY85f@PPuxh#S6a0>8mJjji{$G-gc!;RR0RC~U-#~eam->;tM%UrGL^eW_ZQRWIBoD|nC;E8`eNGbp-QcOOJBjb>j>b944 zqfCklMlM+T_pG5m&RlQ?7u?!oAehM^dfbfPYx)Bf7&3!yL-My6w@B;1-_hOXW=8+z zC+U9iLV8LH-9=k8j|~a1uwNX#5WoIU+@Ri5Y*09|_C|VU^}zsF9qY|lqkN4*MbbAE5z5=>zofF zb+QD1WNT%8{@y@6%|$MY)owWX@iBI(!wr~|2g1Dy8B2K#NS4)t zkW;@DM|KAlR28DwshHO{Ap9JDg2dH6d+9f|>z!jTv?kH{-f#9rlFp;zhG0UIkRL85 zNU>=J52H13lVYV-t+Vt2rziIvGhu`3Fe#D;$2 z3Y0iI$);=f^}(f#C5kllEkU-ibfri=Yu*T#tK<7T(P0K#bJ+V2$?(2@dwp#Lg0>v@!W0$qEeG+U&7IJB%Gek z%#5f+>&FC+ekJ$Ei)8bij2WY%>QtZ5LM4NJrNkL~sPh}by3p*ALQWXEzn-$o-5t?i z_%?@KUfTIlsq6cgb||0u(}M&X=u_djT^?O{l-@qGR(jm_{bF{^H@C6ktMiz6ECr#A zCYl&eQE;i|dduRDk&Dqi&(#BhM*6tQF}iuft+M;m6ThLJQ0FNp6I z#ps6-KpPBpuNer8Fn;-`J+s$mwKFl5rq|mrhOVUCaPB)NgL9Uw=@ay&hWN1Se%Q%W zrh+W7d4>JFTkK2cc=2&qtO$eSnA>;!!`NsphshU@LkLhP#3t>$`CtYA5>>;SJkM}{ zXtC)MpR4Z$`DH&hedMS%qcSBk0jLI1ZgN^*mi^_#5H?d?IqcMG;NUj*A-qolLZUR$> ztpUfP&xvDH8v1KkXQjUUOVP>`UhL7$g%k;!dQP8LGxu#3YQ&Ri8XbJ!nVc+6}nJRZ@{Ntx(5MB znRaQ0xY0)(uLhZUo8E|b+|Q`hfa?l=*n^EeE=63EiXudi%GdeB)z?t8*cKEKmE$=d z316Ycu+ff-C4Cd-(12J+G<;#@$z%G0fK{X3x%%LGdh37T%pnmHqwDQ=1XsrxGly3C z?;t9}(IxSW#73)awNWk`8=5_Z+3V3Gfz-x00#zwWWLlB{lFQzJ9De?rApP5%75Whs zLW;{Idp2kYxvfYt>LesO-b zr)b8h{piZl-W<`>wI5?{?1MBewT&Io7Jep{0MeHz6D8Dp>#>0C0HkSugN_FfUl0kJ zvc}7b&@?Rfk!c&wfF_3*sYJL<=QN)z|Eg5`DEYrCD(7&(==;bhSN=*1Nof!q=6fg6 z()lDenah^Z-3{8*5=b4Z#@lL(9>@1L$nZgPJ>wjEXTATVg;MLxvaDJL6)H54XjX-0 z7cjM7KfvYtyvDn^J^eRlv-g1U0+f^4{8=S6H|DqmW;R#k1vGI=1JK@o^t+BWjYJ## za6bTx1hyOMPYMr3t~>G5JF_f?iZ2@2G|(BOydLp@CKYS z{LHQ&$T+3PXtkSi+I$&YFfiyFoa?;17>XvE6a9ILCWay=EEh9!Hr4TRqV6kfrHhEg zs4Ga$uf>L>2!Q%0LvfC&(L#$U6cO~tKOiu!unIWyPFB#9p+DfXkB5puurN^OXzw#Ze`RiH#s_NWH-_IXUYsgpV+MQ zp5aHaH~O5Kx`dN4fe>}oDp3?nY+#0LsIJ%3T}tlGFj3C-XuuW2m5(<&-wW@MaKdMx zLisNGP=Wl5Q9_$aNnZ1>R&hi=_Cv|M^YDy`ZiYUTh=J!4PfU4&AwH{?H9S#J$5!YJ ze3@r9sFLW=D?*dJviA0Nz`r{nw6D`AB$mUmoo(%ZW>ax?J?@(BqYt(sOD_eU17{#I zGB3dYY^yu$sr$h0WlZj?_eO8|#ooMpqQO>z2hX=BZhD~WgxKWY=x@xa zoXK?f-wtP4)J?z7Pw9`a0k6A&)Hs5H2r`N5!cxxL2dZUeVqEfQPN@8boHIK86r~L0Nm349>oMLBJ4AUk3}ZYqT9chp#!_Zz05Z{G zMZga!O4dbpq@A~^0q@g}9)qK%xy|b_w44JOm^yyjb!SZ6dD-$dp&;+nf3( zpoPBQ_H=)9=TAtAk=P%DmDg)a@LsMxzd18%eJ;;IWdCsazD^VHaD;(108uJ!zl>k( zt%SN@cZU-FxN&haPOh#_TAyR=x(^@qPS^HZ<%R(GWI@$8a@=y1B4R|bptnG2ub z`FqcO%BHP+EGCeJL@IRQ3Ojy_OJGH6dUl-|cr1{>hr)sHx3+{Hzj=t-?%7gj(#7T& zm2O4I>j>IibvlD58hM^>(}7=+Dd!yahZMEPcffCzu|;GtT6vR1g-&a@FfG>gr4`dK z+K-g_5he!bW&}RB!%~Z)IG)9FG*tN2__G z(``!&W+ieoPA2)z^)h^yYV-9aRiDcES)n#?n0x4xFS~S zV5=$y7Dj>aaq(bkle-(W+P+BX`0n%me0ALX7!()h;BdSv-3}`a-VOle9id2(RYVX* zdOFr@G{x$9K2YIpF~ox}iT>A8t2=UgKslF&EQkk&?)cFo@ZD7pQIE(`B;86b6`c@` zBGXW&>6^&@TexW@Ckl4{A+AUY+Hv&2||jBL9n@?R$#=;&zn^}#}6|}yaf$)%|$&Hti&ix7(F!F zw&oxUlJ#Y}##PeOgjMRB7NJo0k4!xQ2n=oiSxL)mL5_bBC@claVmiKfWwX)35rfSf z`0@6n4*%UR7UI_8UtV@V=CxR?UMw5h(EhdE_(_EzETo9M<&7No@d=Ab$DLDroI8FR z^_$g86>s1yV@^J__X&kM(NQFI+R|ujQWM|(j+^)9!qv9(SSd$fbx4AN8$Q}}_^n%r z8d`~xu5=u2uoyB6IqQV#bl@ZBH6T@a1lC3RdK#GP~OzwyVc;flhd;;L%wg`YeN z$>GRFelXL?4AZzwCh61h7@+Kf0|v;c)NHZ*1iyx_alIg2F{xN_-m z?Yi!;s_jbsk3r=USRU>-$W1%)hxx$WcVjq!v-`APrBor4`JrZKtF1!yHb(fgt}*P_ zUxD8BH+9E>XoqM`rl=oOQ)Z`C5p?OyL9!JQqvXBV(eg|MHL37vvHQX4NzVfdGnx}# zoWjX6y7P??+?!-_4&fxuE{j>OFok(6o%-TX_bAu`@`3vzqZ3peg+x7@TiW0|Lj74M zBr|^Z*};*MwOo?SGo~XmdorbrlxQLtVnt}Mx4sdjEmyw};Jw!Bj2U^5o%dQJ>j!YT zZTb-SIZV;25iOK!f*1ptQA3RUQ49x3lu=$NQm3=}XKK7S?LOWSt+$YI@^zR^@rBnulJpivY4N!?zsL}_%z`#@BRQtL+oM9 ziCsVl*)BjRiU6`zIzPE@E^@Xv&F`MI1;{O^U<)!cXOgIP0ez_DED5_W3NTi{P*Hk7 zS2f+)slmcU{hsde1-W5=@_4m9^raLf5qdol4LW2Q1F&gAL5hqxim0DaS%;e%jOKK{ zU6A6Ok33ItMsKDU^hPe@_y^asH}dmgv!#v2TY7UuT;+Z#Y14$LM~xCCD~Ehlu2fip zDt@D_R3kZjj37*A%YoZ7K6{OoL&4LqQJ7*@%TndH z;LeW^3v)?@g?1q7eRZKf88ldO%gI8Oa^-eCr~{dbPOzAuqTR{2aL-*B;f%ow>I9`C ziD&h%HTlh;R=N(nKle&Hsi&9A;DFTeg4NAC zi;xP;enlR~7wVA0O0~7RZTh~cq!d;r8;QbO`kCnz0yKMU2QFUVj~i^K)>pi1YW!S3 zd{-P`$iR#7OEA#HL5&asB2a7;G}K{{a3yfER`Z!j`^Ahg$W;d`zMG1+cv+3uVAK#U zTvO6$s}yj0i6K>cqS^Y+W_qn((MDoIl4d|dN**$)Hdxz^b6+Hvr$lK=F8kK70$?El zbaXxGoN0&2ucJ~xG)t?v5}>a`K6i-ViFYt37957b0*gV@70T+bop1=~u#~VIVl)xx z%#omId;8C6J1Z+~q)neoKK*@KT7JmhSzzV=qIXy^|B17M(i#Zo1a0Au!~ z&TQIwBehdr-f9c4z63`1^WIZon*Q?|(??ywA2SEZa(R`y|Mn4o@z>r-$Txqypr?j|a zGWvU-yh(-}B}8}(Mw(7@b^-SW3h>NllK9}RM=vd`+Sy~57*kY;R-BhB%qCc_`Y+>$ z%vzljksE(IF7FH}si_F5smB9-Ou9zl_MYGuNQhz;s1lvun=*8PaMt2$*<3`wUkIw8 zj0$b`7J+%^m@kHPlzzgnQr!ucYQF!)IY|5%I%U1h2-0%3<`6jenl2n_{bgj7meLb8Z?S~2sCX1 zj>T@?J^ z+jkU)nxDMOF#$fNL#6Luv@2y5Xa?VC-VREm8PUjiO57$2#9m0!u$;HPlhb+6^6zt1 z3PwzC7-3Ob(E_1E-b=+KOUgY{YY76km2PI)s!CH~;~$GnNEyDDM6)H37ry!0_93B?%>^-3J(WtC&qEw{ z!QNWexvAgDolsHL@Y0%N6u>IC$GaRB3kiY#HMMBR~Ze7jtkxMU{CY9^5%^1sOy!lu%C)b$)zIctm@*J*4q` zgLhvS;_eqDQLtl(J4cEIrF&&e`NwF=Z4H@^%>u`u*&QF&VneP^mmg4XGewudhy3ea z$q=L_iX4r}M&~eSv&G}iBKPB>RKB6K)?GPZ=>L#&bsRhnUijY4bSI6!H>Y^t)YkU^ z2lU}($}CZJ)55CC%r0op>rLm2lHXf%Y)H*xYKgXTVn$2YVn6rljczrxxsvl;D1vS~ zz7|M*BS_`NRH4uV_4hBSCJ(8wstuGUG@4Xo`p1afB~6%=FzgQ2z`$SwnA9j4HVA`; z2Nu{N3}MxWSo)<63qTS`Nj#dgi4R}dmX_n?N^rJSXC!tU30r^4%O46$D`iSESLGua zSEXF%e}c*uuX+|6QTb*88aBaJB5)q+%co@qi_`SPwY9AZlXS1ve*8ZdKyl_dKR4zQ zh}~htEbw+V!u2({#-xZNRmog9@^P*3!G$@QsXz^Q2vMSwiI*(sV#`tC5LGVHoq|qF zaX%i5)HFtqw!Ql^n{o7yTC;|mY~VsEo)Io&bQfCKKQFoOq>SZ-Nm^0VVIB*CQvM+j z)z}4#9M{O&0zUBSlXnaJgZF;XQ#mKdz`mJMpJq-U)m-_6#21v~B~#i#^N0z8(&&5W z#klLLTJMZ7VTp0ondaFuLBoA}7uQtmYzAeof`z1E3&rzuz5@qY$$dM$I#>5@xBt$e zuL4fG75|;7zJ@ivHd#Tw%LD;M9-HZ_YNO4aTISF#1>sIp5GO;rj3D+vIx3~BN~K(j zp(sotZ{REuln#dz&5o~Q*V0dQc^$Uape+9{B^Zz&5J8fK1@Xhqkuy16(NEL*;d2(r z?x}Q?sPY~iLh!@bO$@c@KkLzTgXdbbQ?NB9Jv3iGGfB{*G|ybz>p~&; z-!|;&hZL_hp`kx*+YTweIkQ<0Pg`zwvT;tT2RBKrpHW0cx7UW9hsi3>zq!gtc`cnM z=>5hen2nF{m-)M5(^-FG=4{+&rFdGFL#s=YqlMq1u&L+HkCdw@{|jQ1QWC9+B5S$( zdP<>CyM#$++bm`#K*beN@JkT!z(N%hrWO7r97Q_cVjrW*HW=Ek!4aU$RdB&YQWKg~ zGtqZtyKKEZ4*&KPq=w0-oRN3p)GA;$mMo#I-Mi~SYHF0%uO13Zrp@K>XwvNgw8?Ut zCv|*5n=qR$F0M}L(%n+b6l_BhM#B*RL(-B9!Fs%yMBsD%Qa}3oZ^Qe{I#O_;&}y}D zRILsYPkVdas9o*nu?8cSB6e)8u9|64tjH_Ne^Q77C2M2(@6xH{)=t63KbU=%8vQ(W z3k0A~vy`yYji#kYV!>?U<~OP*AkqmsK0_hFjhwm!G2~AaFHgzsb4&jDxHv>d$e!X| z2D0-y9MNwMZDT!BHW)#&-=G^qeK2W`E;6N|N^)7eI=?-&yoGl%{!o7`h{f|r^e<$Z z|ECiq(*3<5TxyUaN3)PuDu{-MKISVScU8!%HB@0RQ}`-peBpcvjmMz~lq-~8Di=fL z@~QD(XtgXKq^C_cMtXWV+N%!WHgldB(>TsnzuD(rVbvebY~m`@SM#Z+G4$02UwDuN zhuhkRthaCXgqd%)o-Sr~)BWTx1zu%ekxLoyIHc&-1V!|mz4h08uo4bq z=`yYRPCL8ZrMdgj+#?4xQ|WhDH%UA1aOKs_GkaXKt1#7wvvc6#(KtM=z?`iP3DC~B zF5sSo!28M>%zq~vKRVlQ124BAVY6ObEhQUgr`$pQI4zqpkZuLz~`6Hl`y30tOeg(yqPNKB*;QaHV z1{Z>j1dSSr*)y~AM*pkxt|pJq7xOuaf?6o(Y~*HG^{YAt~&Wc=d4A#9_apNeb#qY^ifNY`aM>J zYd>VHR{8Qvi4fY69Ih~Sv&UqxY!Bppf2D`NOA%0D)M`4EVz-|W zrLIULNU9WuCdVAjb2Sw3qiNM`r(51E;vDX%i0ZJ*>8@mgtK?WA73d$_fUG{504_{vqSqfg zJ^j{K>o+x%{*u?+-XG^vwpBtV6xQqva1s_e^=}6$+))kl z1>H_)a1j)i){)ES@ zj_mq1#Z?$Ow>hsYRktSUzg*FI5~hY*?1QgMnt4Kcd4zI!z_olYv8N#bl4AHciJYfG zHk%SmXw-y~2jeW7N9s+me;!YY3c7kFAb-usp~w8QBF{jJ_PnMXV#NV9V)fdaNB`sD zL+2Km(|+yijb!KflE@r*HQ=IqZh#Gs{eTIl)9Fm;k~Dl>$m2J~3jMh20Xv=1)2sE% z_=DJ9SCta{KqBybxIrO--@Z-+r0xAO&F_2|&#vlwbM?GKklT7?R|&m0gZ*vb$M3e| z1C$)08H%|7=Wci>zYN@ra;4CdQAt@UaU?N#nk3WV6tihSEJ|gh*Pa|n%Mq=%N~#qN zGWRE#3k!k^2$$QGHZs@O!-w$igKsG7Lk*0)@R^911;7lA!=kga)dx%*PaUVq>T}D>iQ!;(HAeL?=7)>FTi?&3(wQ4lidM{j0hvq}FrHM(I`H-G^ldUa-dum1sege1+ZsI;Nu(P<_;N6TE|(qh(!_|t zKhmud=Up4(aCLjlAu%tB4v#ZctWcufjCka;8(%5kV9FyIPvq8C)}1woHV8p;g6AlT zL=8kFcyFTT8XU0JZzL;1Z}*2eJ1(aoIgU|pc;lGCKwJh-JP#wd-aqG%olE5L#Q15o zkl8W^f-81F4zJ~Q@>4{OuH?3W)+wqG&j0z^9GYD*aNuJ$EeJdtq_svRyx=4k zWVyyClC$fSp2+k2io&*vZ|~_b;{h#^7qmrbXw!<~+KK)CG2Aafl$TAvCu0m5ijtW> z(~mYAL|TsXV;8n|0!JDyL|2B>7wN#(uKz%g7F3^pk^KMWQzVJ=yEOZJa5!w7*J#qe`-zn<^gv-Bg; zm0(APqEH?^avnk>I+*~&GSiq?eo8-e(3|wg0iiC5J`INW_dy=_Jp-(r_e0>SLmv2u zi+vYH%{d8d+^7@vQ50|MZ*VRKT1;6g;9Ig>>~Qmv!@_#@#d=eM8S>T9169_zTpYh( z5yAN`An=wq*>x^fd>vP@+2Vx2pIFsM^!4?11h}=~+s(Z91j_%irf_p268B!){;B#G zq(aEb=}~87PC%U;EL@cAS?SMzjH73|4^y?}s|oYJ)?1Hrym-*RHFvvE{^mO*gx>D- zK%OTy%BIDFWGo;DvQ+;dMB8esc$9EC1QOxI$jrYc*hcqHd(OBEj~uVRcE{ZWGpxH< zBmj*8!WGCBysQP}kZOGdK=LRlT)wKTEm{P5qr~5O?|#YD7=j5Y<5I=kGEn?}CUTZQ zyGRadE7J%cI8n9)Bq5#T`i$#Wc3V2QHzHdOQh>37ELQKV*6JU6rtzAr6ljUnbM}6Aqn96Btuyrv0^f+7BSGlU_yjJSLPO zB1X7G3@-uQJ3rLBqwxH$jeS4P^?j=m7A2kdR(zkUn@rE*0X(Y-sm(~qF3>v8*E&drx#;nQQ_)y+#LJ5WkW&#RR0Tb%8QjY9z@{uWTXgD$E@eNT%I0^=F ze2n25q772xDrgWI zuoZ#Cdss zylQ*BzCuK9&ss^mb$7{BN}Tji#R}X!Paktwr*7vEh7dJ)JTz|hJX+N7da(g&3v#G_ zfd639s)Fu7jc&_;?1be89q zCy0#>Nt@NPYP2+mD?zIxvDYrOZh4-*sXTHq{Ile5vwif7>pLF zs1-gLSF2ha6~_t*<~@lc^SboNSw2S}V^9TA7h;}nT2A*jlWGg-FqOH}J2a6NkIXX~ zR>Q}zZvWnNQeHeKmL*wc5)Zv;pEsHO3F0usX9Xii-QhXsD4S za5A#F9-!-TsE}fVqFmC2&8E9N08(Kcd>J7E#|s@}!;?QLEUm&?;>C(B+p6oH@RGcl z%7i&sM&U5B?;gh7@S!NtX7IX){^!@Hxtqg@n&^_H=+7iY!mS2#4)4F0D8Xh*duov# z@RKu}3R@bsT>MZmRwpX0ykx-RUT zo7Y|cS*CooB}kc$V%<4E-SclRteAb3w$_!>f@0Jy0F%=tqn$cig_ARv=cdW4NlZX^U zjdL$ylae;MKA*|;m^=(u>$vQBOkxW_3D6M_8&1}#g|aU;z8RGI&_Tw6I$#XLpw@%c zu>2u5y6LpY;`d|u=58i0o9B^}gn2n(vL~z_{kcAb2Qlu@F_opmH-VzS%Idorx$J3u z$db3Aj5e{UXzMGO(@_aW^w0J02_t^B+=x;xy4dR+$R9;dE@+iX z4myrgHvB}-aEDw>mMj`!F&Z2bHAJ0rtx9y{(>iMu6_+ev8WzKs#D%U-=Gz9VakLk+ zPabB5GaD_dEC{GFx{(;kOCg{Fpbx##wXj5fe}0;1htTL+h(n6izdcEKK>Z)H z6oYUshk5K+yruDVzA)ln;6nL<&*8dI0pMYV`%ES`vhGH#|6VW5xV_Md&_-Lf3`C(E zebV(mU(^0}o^Ju$E<*9T-9~mkwsvlY7=7!%8Gi?UdTf82=9kulusHn~eTgeLY!tf9?)@S=45rI35{;uP^gMfTLZk*FB!q!AOE0m~|D=ebHmdA!v^q zU3M6&vLN58YPL@K<6QQOZr2DK@Q`?KiE1pRJya&i4@kH0<=B8UCAEOp4LJ#LLazJ zh0`%(uUm>90yhcYi9a z-QQU8iE{sS@Fz}R2U0GEsQ^+7Z;Xv|k9|2ox_H0Kvm;fbMpNfI)b7z)-FrtaDH zn|0xBg>ca}2<8vPvl%|_d7q5SjnGvMjvr7p9}nQDvemKNV`ElH01em(v7 zi8;l$C*a=~dwneZ&llZJ! z8>c|8t>hLR9@MR;jKrWQ4G#+g*yG2IVjS4AF^KMua1Iad^l)V>{F;r3G)nM6pcorNTiLm{TDDoAq}q8wTGu+0bVo|4|LrM_ARX*Z6T@XB z0T6fE?oZERF(!qad&JH};Y|3a=tfjrR%Ml^H-rfiWG`l7G}JG2nzx>T`?KSx=F@#U zH|aj;Nvh|z_jWlTg*c%iZe?#=Ea$s4p;R7w*hX%D>V3ZQ+5KC~(Iag4qQE~J?uTY* zMXD$#v=}Y0Vs&R{C(ppOSAor3mlZ97kiZw!Z0U}YIY~RYIxSHJ80e&3`A!YA#gDiN z8iQFX!(j!Xpoubc*FN_r!kR0fi@Q#eVxz&vm9%>njP6#jNDS5Zc>+3?{OiRuqWfFN zW1^s_806UszIV$o3|ei$TKiz*)M;FQR^c=TZ>4AeNeI(%(P|gg0)xZZZ(J5f8t)q0 zF9k`zZ?nW54;r3lRkV+UB@HB8|55nm>&;f`a_e`pcPs+3Hz`v(50yJ41z^I`_%@?wir7619QzL zu5_PCnS`WZ@XO04OxzuZe)4;M{B_?C`Q_~T7%yEKJy9T*RahM!9jTaKVEQcvT*)MLS`qMrFr&)8>PfNvo-oAYceyy*gIwjX8(BVGprCN_!D+iii&dl`LK(XY~WU zmGZ!Zd>94-saX?n@r!9gC2-H?+11Wg>R@!psSo!pBTC6}Qigw_L62l`rWc49*U>9u zZ|r@4!1){*QIp`(U^Wmw+0wCp`B0^KbTY(-<%7bq(oBkgo6Ytq$pm3i*g%#$%IL$Q z0j%D-ID6iXp369C$b862+ige@(?8sxn6jX!*x==(VN!2>p9@KtY7h^x$KBo^X8g3D z+cTLy1pZ$NYEBDWb941FoSc947QW9Cru06c6Ec+&hU6>;!nlO+AVq|nmhwMPe_Ip) z?T=@G`yabSo=W|Jw;6$4{cWG8 zohkO$;g#BhTiV(@m;J$x7TdL3A(U|X4h_dIm3Pk@k}R)52MEIup|9UfZG5z5)$Fkc z%CXW%JISasu+8be;Hed*DdsDLxmxG@Rw(cjqD(EIPY9V*U{P;FdYwSrrp#-bl3{ETN&<(A_aJVEPeX*~ zpov7h+ZuU}%QKS|1A(m|NX2y!cGTf=uE^`KFzQ2iQ6ZCS*jOo+rrDFx zrezU{`1w!|)VK&?0_EIFGiMPpC6gwQ=xbB}0dspk=!yfKZy&Q495~bx?s$NLiVxpF zaRZLIW+PD}CwVu~EUzm9R_B3<@AVsWxHNyP@kI?nhzeE3GAh(v>Er!hNx>k>y4v+c z@jS3|31Yw-YFdsn)6=I1u z&tBW;+~pmX3R5cD`2V>8H_yg#?{c*Zhw6HLlWUFGJG@s>!sp1{uVAttG+&>wGlIfsglwvS0UL_${&?J|Z8i9OAF@JFR4~D_;y$~6S@dub)gq0M zB~B`+I50pLFbu5BhlI$B?iQNElKipT#x6^wGIC#!?mogR*M`regLHzAYox6&aPHc4 zr|iXZ$p?<`c)V8Mh3H4Dph}Z*oQO7$Bbk{HH;)-LXdgG?VY zPzb63Qvk@bxYyu4)gpkmXlLlB3MUPf;V1fe3UMTtJ>0YH!zpCo{6+zmEP@hjqKs4X zc@kzHe}62~s$9^-+&V2P*=EoG))Gd%La{#kS$6g zS2IYyIAL4}^$+P_AQ=R1R~Ptj9O#PB)E@&jCJrFmpLjs9#hXw$#KzCy`Gl*>OYX%Q>A56}I~XFkJCH{G-^0ob?R+Lg&<7|st;Ti0;w&W_IaYi$+48tc&S zI|&-cApEke`drjNPx7-1=FZ|zPj|Cm-h!_ke9$3R`hh=U$|>t|G#+;tqIE3&Yu3Yx zSK<_07mKA%9i3Cxx_zET*GCm45*uL<@<)MMWisO1sfo5UCI$QU+A0 zL^A7+k^cfvGPDP?8K#$YACIkANy+y~Wm2Y?CL;4bW(UP;vSD z-_1F1KZwCX(Qwl(zQT&m;)fxt+PaJ;yo%+Jqcn0a~J=SkYxRSD6E-|fT}L$=dkFdoEIPT|s!^=Qb}FsG%J(-$lt zjE0dSL(vZyEDrO`+O@3PzJolhdqv{*QgKpGLEGJup2qjfIN2;(8D>OC+}+niS{NTm6(@-*=|ofn1kBj1ST3S*35m=I zL~Eij;NlYw=h3C>>@~Jtg)uGGzJ3Psux&TY+Rr@i{3+-{8FqFV8EqB8g4xJ?fa>WL zT5J8p6Hm;!_S$RDxccg=@88z}*tg!Y_0f-B#E*V-J6-)f&ZydkPZfrTKBl#8kWCne ze)n;RhI(}9TMcxHQX!&!Ac@B7Hg3`5n#buiudJ!SaRJ#_Cu$bXq3&(-(2k~S#mlH= z8xnN0mHQa6zjR`SDx|RUGa)6?aSL*!Zq_gTn8teLOBu@ zhJ>Xughn_tEc@snLYI8PvX2TvD3uI&DD+La7e)s4QyEZ8K=$?a@Z=MZX+SqNHnMQx z!iS!J{`t$NO`GOlbImnd&OP_s0>Ejfzl#T!{NXLTe))X<)={I!oZH{qbF|hP+WWcn zj^A?FoH=~xn3KtuhtVRoNR4dZ7bp=KaUDCu)s8v%ln{xGzekE7DubIb0o66tut;?N zLsR)0#xYl+m4hZi;t?>+j?NAqTd|b1=T)4F_naf_#p>8ml7I-U;F2>>(Thi;8 zf9U>9ZEi(t$1*GIEIe^Ud@Va-#CzOx>>x(|Z2b2y3<;u;Ao6h?hm`9wu5mPH9`-iQ zIr2~>S>Ao{k#r4q@RhrNO?%G(n>st$*}jvK3eBiUXta=|96=BSoOI}7TqH$DSoL0k zBR%{uPgCO<#??2_GdPG;f{>6|lP2@I_nprHvt}|}$kUijlTNt=zDtC0>}zct&DTHv zk1UuvgQ4LfgZW{kbggu-rRXKqzu`Y9Wx;@vOlYSjO{m6fXi~0$DN5;BjEf-eha56< zG6&9@$P1fxqC7@eI4cp)og{4B1>;8}YjXypamXxq%7>o*B+*a@&w^)G!B9aU&{to5 z^?ipOc38vGrAr5oKmJ4>fBeyX3BbPfzqd{};RJs4quaUZrtcg$sdc}L!!W!gsjz2H zg;S4!x*BxZCy|zs65T(5?&?iWmX6NdqPl}C$25|fGmV=0Ge|eq;rJn)Yqt=sSO&FJ!5gh@OV!@= zUhEnMgm!MN(73jO)d2)ynaKB{93X}Z=-~q73uc~|FF>Ib3$+Lk^!NAcKmYm9rvRsP zc6Rdl&wu_mzze6o!1haGhDpB{Va=(1nblna7Q?R@In zKW5s52^=|N0mJ2jIozdV&2a$j*oxhJEtEjx+90fq{y!cOc_aR#6jHlHluhM?G%kBu z;D}fo-ZcT0k4-q4Ft5Wg<~PIuMnLys+g}#xyoC zYrLh`=?Z>8By)B{{W3DRj$tr3A$LCV06oJ)jLkNh13lR?as9sMK*;<(R3WvwESJ9P zB+fqmD8eW-z6M%W=IdZm4M*_G_HGK1GN7+Gm5Tw`8q-f4!h?MlSwga@+2N! zx{_>-=AB0!#)W5|&V;cos4$D5NKH)*X_=-UAMJ-s7(1G;UGiZLn{^0X`3_u1(?2w1 zmP z>0<7MSfX0T*F6m3rLCwV=h~@^1B>UvGi#uG5L95Sg%{3(WiNvt2!UYh)@>UvxZod; z`Pt9zT(_?Suy6gZt(h}t^4MdKan3pCTzta~*MGgQudgX-*&q2f)X@t~+t3ft(zLCF zP-sWMrmf)n6#vuDpfS8IL3TX_wyz3QtR ze8?d@{KtoXTVLO}uk~MQtW$Gy!bV5hon_wf%Uo=x|3keB)yu=CC5Ch^hek^aBJq3YbV@Ty#?f?J! zMC>)%39mWy4Ju!2MI-^oMM@6`NhB0uxrlbs43|qZWHKDTZ~=$TX+{bM6=W!tL)PtD zPri_6bgqU{6dGWsv>uX8;Dot%| z4cohVXlZQZYnOhM17|P7S1u`$K~X?OmZc&DD$)tkKhknU@Hgj%040-AM54zajT7X% zjyllnCg~z{n2e?Z<#NK?=5qUkPqSmFU_gMnYA?p@Pgg+K0BmSS%$WjygmzuTA#>pA zwdkR|VT{z*!OThU$`&+Q_w@9P`{M)m9|Y`60QRl_`E|`TS98rZ*RpZrM&{0)d+ei+ zKKg^czCIHkT}N=jp{Trh8(-^X2N1#}9bKE8ha`nUXgE?>3`fWg83)u+DW^lcCRami#rv!h$Q{P1&pdcsfm$v=OL zl+0O5mqG|90gP#BxaW@J@#5weQ3~cwnn-Q779DvwB1JhIBAu=ULLBLu>RO}`LJ)-k zX*UfLTs%r)*{ZWj99)EwM5>JIq-<9}B%f~(6&VhP!SNA93>J$lUA~SdmaSm&tR#WfBW})2$do$JrfkPu8bYnlcry3 z{|ccg`aXm{p#oniTLo4+2SNyxRVIuSY}(y}bX`hJj@ zVq60UO`VFbr7u5g7QAV4S=2M0$Bf+*s+gAZWw{CPAs)Z)rovQC2$l?uxU zBxwiIuE(g_9N+%JWgIYN0YR9;5upL%Ti=FI8BB%JW*#4bks;Pq62aQGoAk&JPHKrL zmH5CJ$8yGD3sK4>r`nNb?-~X(GsZS>=)CFt`_n7Yj#II|#$Y-UY@z4C=AG!KQ83E* zHR#$J#DUXc=~_flqg4n~TcM{PvAaivVW9g42JXsab5E9v!#gg&^2>bV>(}o~0QRl_ z{yO{Yv$^J)Yt03f@~F19wkPuWyaJ@INyBl6!y)saSTHSO3vJaRFkcIS*xZKhFm7cc zl}1l%#aX-vr?nY;AL&PgKuSAk72;*nw7&Cb+)UaAe1$59NIx{sZB@LglJErBWG43t zw6s#6CP4^=sZ5nJlAkiBK&dKu&crN48*vqZIhiVIq;$ao&Ftl!1QZ}~u(LRM|r$x(|I5c-i30kRc)?6aVR z##7)25nFb36S{u}m7>L>O8#T&sp>_VeBakc1E; zKcl@g3tmrKK_JZ>-*#6t7|njAfs_H2N)L&|m)h{|6}WE36a;7j;S)wa3Xilf_ov|^ zxaKU84njC6B0MQb*JY5T$hi$@p+HCi9h#QC5X_jkAD=nzTn?VLkb*CP&?r-i*x6B| zkw#a^=2d~x1VCVv|LuLQ?MN@a$wLEaDGc$R6OZA>i_ZqFDV53wx1!B{7TVBAJKZyNjoeslLP z0R~1j)E?+KVtEwl1`#Rr#_imA%g@MVGhBV{xfBCIsFm>su;*1Mz*B++txYs++QG7y zx3cWPXOQEYn7CgHGbW8^!lY5m7(brL&0}dEGm7ShQH-vsA>}B_ei_F}k&+tWgp`8; z0%h>@rE-D(zCrSZVY>SI*xB2|j?Nz1cXzV8tCw9py%b7CqDYbU9BQ*!V;@h5QsCea zq1n~fOIKeXxpafo5~w)s3cDAAs6<4b7dCC+wg>Ju|W zDJM-B*x{CCbi@=utw;6^gq?v)8$7`#z&bX|71b$Fk_^ORO<-`0F%RA>C!v07B(6<` zq!oNp(k9W$j(L<(@e@MCk^vwEk8G(_mDV_9$fZWv5tXUPwF=MzTu1V;v(9AP zsEHK)%C#`p!AT?+6q-mwqy)ZD_y{}yk8`Dp1h9y^NVe-pI>TejUgWZW_4)YOCoylz zc!r8)oCFJO*e8V`nLlk3FK*a^PNymdmu11kMouuXwO{u3x4)gIo_cCu0_q&^QWF@C^tIklHoKZyA{k*Z1MMHPF}yryK<>qd+)_ zP+?enA`yIX;{(LXxk?0q1ED>55TH{SI+9hDi^l;@!l074kpZL0$exu-B_=XTs02`^ zVhdbMg%V+nRYq{5tzw!@%vH>n)*4AyOIvQKi$tvCNouW>_tEqw#|P3ep?C5oaxjnI^R!Ky7>_uaejL(Mhs zdmmvSQErG6nmMvjVH1pPX<=OJ7zWmCf#Cvb`!2R+*R!pm78>htM%9t7%TZIC#m#0& z=d#o{)Z)21ht?_5AijUxqV&qJmKiKbng zBnk{oP{ZKRAlr6#FuAprAPR7$L!`A~HE5020YVhmxMK^S`O)_nE|kc+E<)QtB8+OB zHG#F}FeHj@@eYZT3MnK#y#oY6XlRPcLdp>d-cD!`(xI<^fc|_DGL?$F(nfl-3_uv> zi3Wne0$5**O_(uZJSmx_EXpV(j*io3m9QI77No0{i9<Aj;R0C3Yh81CX z`$~t{BZ<122DGYbwO5UQ92`c~H&9ZFjFR|hLMzZ0CB7K(?B8O1UXu(MiRgQue4eLQ zujjVUeT1VI&1PVD*t||5kV2!BCR3B)($kLM(w8?vy3$$^$=-?#m{tOg18cWIT^2pD z3CbZlh#=Mocx5X(j9^S1Oy3VSwE^gzJ9dBU^wUqvFIn=y7x#4l_O1W)I{w(>c>KvH zxc$x_ic3Fosr&46%eM~>_EkFVQ^zCDJ`pl$2$X60+4-fCkv;Sz+L5re6J||D&X|Y_ zLv!PV_MoPc*xpc@4fjOP#Q;p6KT9KA{A(3#u9{hzCuRk z_c|8HqlG>A;`&BY5$LE={*v*GQ$Z*NXb)rr+uC5oS||)xPP=4eU=C~F_w{{C?q77@ ze)so!p2v(Cv-0nH=b7*P=8f0?>Gac2cb6<#k`TF1JMB~+c;Lae?0OFj8dIinDeAxM zvQK>d)?0765t@y>qoz&WlRnKbkZ3VLXS{HiIlGpP}f+;*w)c(T(iX-{-H+a z3oulG_D&RnLdu~~lR;!_(3!NEb9z>7CFbWTh0{C=-8_aYf*Q*S_oT*g92}u>gppHXgGeAuyi(`{e z5sUr^VI2Nq@Tzt!p&)S?GWb0NLJEe;W&AL(bib%d!q`^07*U$8p#p=&64cfu07nuB z!#5nho5x3{-L3bk2d}}EG}VtX39B;kMClSzq!Bj2Il_SJbev{eilPw0KnyGuQ`&?_ zXb_HJam2FDS_?~yHwuV4mU0$?P=*L?J9W|k=qjB9Y!YtMD`7;HlImqw4TOg-i(otq3#(R(aAi zW-9wM!9Cdhs+F#^?lT#7^$l^(wcqDIuKOeh&YVo4RJIwF!O-Lj0jD24iwP5(*|EC^ z(w_Z!X%7uMVu*1nGJ+R2AZoKvpF^t<5dyO(!9W4Mqtjfo$*s^i0E2@f3>8b3{Bio< zLoC_n1@M32di=>JIPbmZH2wR%|9-jB${!r;GbM}^hy^p?L#Ls$HMRw*QAA0UGyzi~ zw1Wsk#N-y3J=tWcaaNm=sH`MxNKVJ z6YI?jN#scUl*4dsn!ZtKdd6kg*;32)iFNFpP)qOV3j)RH=TBM8)nTjl% zzjAmhOWx7K@Vx~QboIi{ZfF^em^|L_xtkiHp%!W~kaDTw3jq)W0c+R3T>H%%uYV$& ztx-KaJw9;YK?fdq!fm&GHxmc{OE10nExqm+UwkRI-g?VbXPkEWGwD>yNZsTMl$UPc z3pf6VA3pK`DH-BP1EzB@HnI)1^|Vf&6lY%*vy>zhS(;jZ9=)p*UTuR7TjAwbO@*^= z8?4<5>$elF-h`_R88gtvPe8}a4rK$kaBOlYsyef=7NKJ)cebT0Bx|<5iXSS%sAPnC zv;>4Tr7H=K=VUCFLsj`xD3qxD9!I)15g3VI z5W*qUArqU&kj>^OL;=1Q_?7`gtTmzZNWrOi)2VnIW%bj%f58}D5 zRax+ zpL>~4T>E`G2M74_d(Q!tLPg5bpHj@2KOHyi5taiy&*9i(P9TaRHf-2H`(G=wEP#9& z)te`5s>iX1tU;|;ss7o~ja3z}dm?6Y*y*q`V;9d$vAJz0-Tgh(w={qjXjMizd7gY> zDgXAH-_YLKMPu3|v__yvCYtgU#!96!*S1Aus&-*<0F@F`Ntx*D$3teVRbnz@C7hg<>v6^bJt5PwdY6m==9s;z|y{78gWL;?gpUMj*5d_on_ zUntU7D46kut>~3)(`Peja_KbLOokfIC6W?HxVQ=&>7leq41&lqfP|BbO$>e}R#U3# zh9uxhIie#F>Cn#l6+u`c@**5uG%k_yDTjsRTu8Y&i(9Y-h)nyjtw?$3kkvZuNPQDkQnF1Q{H48e0N^oOfvt4x5X3 za+RS6jvoWNyHUG(gbIB6d;6|=`w>T8d&oftvuwrkeF?z6_4?}_r<}q!Z@ivg{o?NS zt2hm=NyAyk!?cN@LL;ZDut;1xdyQ!<(lM=nM& zV;vi5+=7oc9FWTU$g*iUMviII3T1$ZS{tAlfnNdgfXUiD4^kewHV5OdEyTzG0|)c4 zyBj)sAzw7-qtj&PR$m6b_z%=`*L`dL{t~ z{D618>s@@{10Nt?7-seA)qMQ2kJH|^gR{>*i!cn?wrv|qDLQv|5TWSm>>?BSpcZ^o_|4fe=V4>cOsdbyiUsdcs!m^O9QL8@$vJ3n0H`L!FEz27tuuWVwj7TU){76lf31h~ZKrRH15D2AFjwB5F*ge?AL(i|} z`SqJwyR(C#f={vR<3~XSvS>#ut}97-E}5DP_4W0%jvYhGn0h8Rk7B~8dL}e9GA@^9 zOk+KD=@c?lAY7Xi$VBxJD06k-ny>?uy5^k{nJGk^Zna@ z$R8hih%-(*ed+r?@V-MqXr*jv-ZTo%I}uvP7;zgVjqRxvwwf_>PwmBteB91dM$|&t zU@KySktmTnHDBuyg?osRPx+a4xULhqMhWiW`=Ak zrJz1TP?x5lG;Sfl?Jpn(ONouD!e;c5Riuk`!nLSK$HrRW$_VHvFh(fNIcOb+2qN^r z5PJJg*xd`oqCi6!D8isTcEiT?dc(%`+a^z(#HE-0)AXCZ{cmlnURe_?oVS4Yyyrdq z{`bHCU)vXFoNk(!}s5Re~keN1iJj}%i_EFVM@g^*Z#xV)HzKcJZ8+8 zLbf(bDPIIM%ab=PzC zRacoqZE)Bix|K#qOSOzq=sGfhOtk3`#Kyt);wG_E3y_YPJ!^Po^~?OjY42d|)|dI0 zU;K*aURg)h^KfJur7W0E#?_w0wE;_OV+uD46%*rIsS+K19U-J^ zg1@ZjaL8D{A-03odyzawqJ?1C54iB8qqzOSr|?SwcozDvb>b|UbR?BVM-dIRwd6}h zB4yh2LMwYLX%HUh03zQ2O%nsCC}BCcu3*8m35b+8;-gID(c+{fC?UP9>0WvgHt!%x zr(wZVV-OT-Xl#IkX2SF9AXkH!I~BcplK@z;@`aZ8{a*g1EBMAYuiKXZ>|5}Wk9>q5 z|ML&)!l*W=7OlYMx!is4Z~n*k z$C4#WIPJ94#Qpc*pF8oSQ&#-xPfyGbd_PU(!>Uc(@tt3>yQiP8f8;!7kDtK!(et87Gx_r6S8%|>{Sh8CHq=?i zH_(MLQK)bnBf_GTAQX`a9G1Q&laEuQWvu>SX;gToPFEnLBA3pxv8|o&{q7Ik`{?8B z?(Zj8lQzL!X;bwlxGP~`cYJ!{rnhGoZYkC4&3M7)< z{X@L8eWw9|VG~wiB$l<{&4v0@WIijUV7Qc2|8==qhK3EOGwn&58tMpiWT|D6QaFqs z4)D;68+qxO7oe>J(L0O|%6n@vRBm0z1mZm-6#R{={8>d{@6Xc3GsW0IlrDn*Q8MmS#(X>w&?;; z%Fc`{S%iq&f+H+wM+_k=|Bu03bvbArW4bN1HRj)j%SkV!x2MM|6bkPd7#RA8T+VC! z##g?+{a?O)Q}=t{`(Dn3_DU15^Y}nAo)4MvDGI0zCO`pWwk3U1l>dgT3_4abX2S3EvrY3|CyztUWp8m_z z35t6C`t|(&-rur(4la&#>^R=VkMbxTkn(Er zoXiODU-eBMsuH0JQDMaX)Al2iO|xp#cFKK2=KU&Vz|Q3|6wB1*vV7yx^EmCW1uEtJmvCPge&rN18zIxsY-Yj)Qip8bCtqWk^{aY;E%^QZPIWg|d~`t;|Q0 zJfoT}^}o7w)hI#i0VuGq%a08GrYCP6>WF0ih*ir&2m_pq+X^v?IHnJ&YW#z;{ASn4 zyABP()?J2apc1mUa2*$g>OcLo)3@Gt-+gZbIQ!glxc4{r{FmSDJ@@`*^pgKra>q}8 z_S3WC?_G4!CER}d571i6aji}1p3dHaGV>uRgh1D47<1GieDm`c@XU)Fx$~cINS^Q4 zcmJAm&pQ`@pZ@%3Ty)_@guaj7qg^ek{2LGg4wwbgC*tW4M+j0vkP_eujb}O4(tOnR zP*+G(BO0`O93wO+OT!b1n16(}(#9bg*SZ^wgqX+?BcZsJA78u3)~3p`PL!}lkZAgc z%Pd|rhhJWCDZ|CU(A-2UumklqSypatRXWuT#@rGFIBpcnS3JUu)@FiG5fRWkybDmA_1@3%;*-mg z-&0$cqiOUw(%CGI1BKxdQb>k|2N@n7W_WmbFE_{Q-GBn&n9obMjAGoe2XWr1$FZ}k zkF~pc=;|LLEc;|qX zJSH%SnbI21&5(6+q`g`MDF*%B6vF}Pyk@dqZ9;9VP7DDG{vgGu&${zDc#dG(?k=8M zy@@ARZD8Y$PKw1Mxon!F_n*o6Cmz9^{hEoC!gD2UyL))w^*>YW7e43Rc;mP9;>Ab)@%iVUJMl+%-cfbR#Jw6Jm_7+{?1AWs<4oYv!gyBLAf|Oi zu2S3CA88LVrrjr`n@C$~QC;O$1OE1Mj3ga@VG@Z^^^gmozW{zA5nxTUvejFdUMBd2 zs_G*F8wp5D^yINHt^vKfANq%ljIaeXX(16&XoncDC!eaVb6zYq3#ibC zdGxD0VOOUhjEu`1qT#;#?mNJBUHzW-o^{tfzy8gK;^+L@bzkSIE3W)cz12JK{P~hc zAAaa?fZ4NWvwr=0ZomBpagbJy;}n%rqOoz5?(gqMYpoe9i=Ic9a&b>Dt@EbC*ak%R z02)~G-~&klu>ZXIxQ;`R#8`WXX*GgdEn3E)Cyq7pua*jCY*`JMDl#X&nep0l(p2PT zZtYmz^;i!;3fH3c6-qd!dk}%vE>cD)?Ywq&9)n0@8DJ{j@XF4mwbh3=bA8JULEMmR1i4EX#n@5l9h-hKE%JXz?cx4W-uB37*k_XgWCG(bIFEG93$ zp`n3A3l~)$u8=;_XK*Ui#Euo;^H2^y-`LkP~8>u6HGGRmDgvICU>8gey!kBIyTT4V_uB#LpKM0xB+{8yGj_0B?k49*t zC6TR35k(Q@Qb;*6PJe!&nA+ORBR744Ykzbf|MC0_NCaQF3J2hhU9wSEE$ zg(D{E{xtgR^UgY=Wn9bYTeohzG@s9p z%-p3g8ECE+rnSH!b4?363T(A46BRQs^L~+Xjf7>|LpUBuKQXN^Ne=o&OQ0gNa~CBtXrXO(mS zV!;tzg&tHDbvP|dDlLUcFxt8di=bE<@oJ||o4P#;{I6_p+wl{CS#xHyVcnY>4Sn&8 zU*v`xZlJy{_vGNv@G*-QAAb0=&px;G^&WrbJI`ocyMEKkEn7A=M`2`ecaDTP(?Eo< zW-9;_#!sMqhoJ!W5A-v2>U0MCdd=IKGs%30-F*-laGD-J7N#|Wo3b62$aVmXW{~Ls zNL*oE;e<+rcBQaf^rVR&bF^b^`v{>OOgdqup=E_0S4s3lm7t8JdtvkdqSzwZb_imM zcohEudJAPf{hpKf(g)tj;80;i2frqr;_hc&;uGKb1#@RlWbsi4^7GZ}2x4|h3}~$0 z3$N1waCh{f2FvKR8_=sZ*e>5O7xfdVffVnd$`ymCt4=C~6ORw;r z<1a!5Q36sqkI!#t|pC(B;`3cR*#`;aEJ{%x>?=U!Ao1(*wHgY-$0Ra5Llf72m&K@ z>iUPt&*#uCM_3EifjjH$>?9l-j4tpt= zhAo{lKspAX8Fy?X6)_~s{{ty;l))ch4TrMX47+>!K}wn$Y8fn)>~z$4BSdz@f)@;Nl zUx4m@cyWU{D?rblJzMk?`@KWw9UMOJ;F5hEfdALlrI%jJZMXdpfKyLB_0#8`f6lo> zgZaa|J72C2wSr9Ah}ATYhL$nr?_(Pg^);418=rorYS9_b$lazqwCg0THyzKZlG*nj zRleS1&R(4eRLg`WjRKMUUTrHO(U5~sp+i6Mg4g0L%q!zcQ0fs72Lo=bn%k<#gq*rG z4UQiXYHjB6b~QCMF=N{F>A1`d)!Ky9oY~IyJ zQAN~v4z45VFO+z0?Piv)-C|t+>at938pHJQqd8#81ZGcdVZSkTMtk4)@xx&3{Gb(uY?ApP2!DFSjiQ*f07^v+IHu?%mU4K*1<1x*RW?q2lMt6|P$nA!qU z$3t&FV$NiAM-OPt`t|EM{nXQcv*f`gXT4R&=RPICw_tt!+OGj{+igGOny+4cQ6`n{ zedLixZ|LmkKD=BilVF|d>tOy=IQBrqiHF1Shrpq8P4!=&FgdSs2rZ9yb~q z>J9SObt;FXuE?N{jQFq9aEop9;(n^Es%(T9krY&90R-B$x&m=KHqj3dZ&C1%84Yse z->qQG$bYLCt?0%K%xs2_R>DL~`W1Zbimf2LaS& zp*ELvkz_0tttzfN3Zqh22n0$*%x@j$q`3o}yr7Hy8h!c#fgcKrp`;i%D9b(9S|#I# z2x;2>#y-l7Z(^=~g7LJBo}O76NefKU~A2g$tY8+uQH_$1nZUzZbk>ozg)hltY8sB<9FNV9C*l zg-611huYv&8>OU%hY|=U0_h~Q)0_X`6Z^)R~&Q(sfo1TfWBw1$aEPze=a zsz-vRLP;x&j%d&UM52f}(-9}lgT@R(mih=Xw&JxgMnr}u^n-c-&9?z-z98-$gj zI93HDlOe5cdYh$~DPu*Igf5%NSi>Dnpf$%%^7+O&Lwx>>9G4wmWOj$5sA1uhEFV7k zWiC5@3v;_hZO9I!RjSjH0ErX|EeTurVLP{6Tvz0TwHBd4kSXVKC97wpZOhuW{QdAb zHaXE+Ahcv$D_SyXT9b8F0H_pjq+&2%s~Mo9s{;@mdg!5*nf<1hs0PsrA?VvXP`*DAOT4~0voWMnwha{O2+~-WChA&M z(4gd`Sz0zSlx+@2f7)o2()h~5NX=nA?R@t9lljdR@8)|Szku_OnL%wVhNlc#*%q_o zI7FpHN<-1}xOc@m{^ke2p?_qISX59@*)Vr9WyHMIF;NH|SP9=ysm}?4&L#K4zzOxe zthFCXfN>m*wm;I8)IvqL{fSEA7j}t^w#h~`5@G$$e%8Lc16;SdojCC`7v&GDVk(wN zP7JE!Iasj?vSYUErK_aYNAifiL4;$#GsvD63(f|S&*se8XP@1B#~pX@u6Moj%>>|o z;_C6N|vHa<}~ z@UQKtRspgVyNE?$Mmuyj+Ac~d2{7!}+BFAKzRGRs{qK_%{enP2rWTHy1BXwyw?qGd zzz@v-{mH*y-`d)`Y{?m?UjVT1~nP2|$S6=mOFS_Vr zzW@F2uH3S9b4No%!?zlmTPF-!S3L7HfeIKIAEkeIsPe>!i}00ggHCM=ooe(1%UxqM zQo{v@X}+-7r?s(`K-BS@=j!?8@)j;W8s2|$of2J^sYgB$wx=Csz`2V)#K0Uxhd#LY;pNn!qA-j4UUe%2;R668uIg5z0r~A2?Mu#wxTi zmm#IpgqMA3bXQ6AMd%hTx%xv*m2PtPW`Y6tndI-q=4u60|f)EZGjX)xoTv6t80d03ZNKL_t(` z$Rt4N31FmB)m(mijG3r?P@Pm@tVC!mVmAm0Mg=yZ>uiMuhuTq(^&1y}+0)l|#ENI0 zz4fFMPG0uNV-HXGv*(_7Zg*2l^W{~q+U(x7t6}~6^_eey>6%wPU^ja+J=Y6Soy*#wrt#t3POV=*MV3J9pXu7&Omn~LW_wPMPN8)vgX~# zNR(4c!bx)f#u&?9mVD-Pmw8eh9LEYnVMxUyJh!cve_Q$p zqAtZ(FFqYFP&~1HkEM3KY792}UGDaG#tVV9-p%DhuLMCllcuwy1AxVg7ngs-iWRFE z&JN;6BIV0xC|4!=Bj1QEx}v@72uXc1VJGer8i^ugfK*{!N}V53mH-NQ^MXKW#)}2A zg(6LvTHblme7^p^v-$4FFXYnGj-jvB-qLkW$LI+U1}B;rvr$pqcA>ye_KO_VS$}&w_3!4mx3Fbzno{c@H zT(Q7oD>tKE^Xj3oBm-S42#kPa%y!E5-}?$hcy1%?=mRNmf}jM8wI)?Ee2twgwh$2r zN6MBfzxc&Z1HAwJ?|(A^_@8oI`1Xs-w>vvK&8Cf;uIcOF7ed4lB%&~XCi1A+=mm$u z5mTWtWd&@Mwq;K|0Zk3i+-Siij$7Gt-fu);=uSgMiT(3XpExPJh$OxZd>*ucR#(F$5wA)LhK}168 zo}OTnH}Qh2Zb!dTTl&?aV0CMI0yD7UsD%?Mqxl{pSHNU*HW0{?cYwW()(4=YE3&|5 zB1KA6FRX*DsXwN#`Z{#~4I!wg(z3N?NhJVds4OvYSS8{17+X*cpTzUOeS6yKrsrK+zQ12_Ksk*;ez>brq(AI^99L>WaWV2>^YL7 zCPA*~5Oozwy9gD-jVLzs)p6spcJ_?Kh)P38Q<_=b9X#^GK zL6%`Sa=R?FHbrTbFX) z+2@qC@`uN>RTz%3H!K^rwg!fXtQ55NE?t&Yp6Cj=UlpvBwek%e{w8z=w6!7j4LC(j zO)Sa>&pev*PMFK@9(jSA9$!iS@F-8Ld5QNdJO)RAALNNfW2I(2LEr%nwUHQiKfjiL zy#8+bN5{z*eY6lngdiG=kc`J@t4lF&atHIKbuzQ7h3V}rBwUGbLahoFSOBT6rgWOJ zf@DM*p5MHSzL8uA9(c9AsCw_UpjG1th(|5;*BCu>#*D8hr3O~7Ui~klqoW3;V9iz` zjK)mrD0?52O{;{k>#J`c1j_8(wQI`He)_W+z=k&yfWP9SzOkO6fgu*1vhWkjpMCmW zcl`dgc_BMr;z($&hpAmKsSVodG0ho-QkbH(<0TQZRcAC-QCrjcpb6)J@$t`Sx10Ui z)m4(XqErco35dz%VLXos{Ib+QiE?8fs;H<*>w|PD#6%FC+0Uirfa?4WZf%$Ax1#}E0bBO~=-s>fb^zl1 z^Uvk>+wb_3-iCE+*7BbBy_f5L_@m2#%h#@1`}Fo5JC6wsrXU?AqO}Q20VGtGR0gKB zgRc-nInJEpP*eiPkpvD*YgHWH6UReiVh*ln(e3e=WZBD6zHw)SNCc9uVKi6Z>_ZRd z(j_PJ)Y{GXzHf2j6VF8fD3n#VlRA6o5PLyqDg+JBifBFcfj4(ej@d%Z|S8%b+Har05k; z%10GF1_wuQh4pGIvwIGbfR(G}(tR>?+r)wem9|NMV+_Wz20RWDEe!_6@R%VUaryYU zCveWuhj7#5FL2Kbo7md7k69hfctMUtBooStX|xH5xPpBnqkQ4#x6?mVq$wStv%Zen znh4264K=X{t}F3$z^1-^JiTQHLI~1{7+uZv%<61mPEQ+C+gs>rtR*5Nc!9!Ge#q_! zlXw>%eQ^`ox3|l@|AQt0RmGDCH8QkgnLjoumG|6p=czk)^({R6?DNvASFgNw`}Xbj zuC?0)**qLNwY(=<*0RDhWT3tl`iF(@`=o2rpP7BgVRt|D=)=LA3BX_3aq-0$bJI;X zF*GnlLsR2jD_5<2OWyi^TXE6a6k=+-6;GMej%cmJxDq@c6Ny-}j+!_)ZdHa|U7ec) zt9>E%3*7p(2hFk+K$UlTsBC6r$N|a~U@U8;E`>Sxps2(dst)|sM1+!MXo*?yDyd3Y zY0o%s?092>R`GuMlL(RfqKXoswFSW)+67zsESN`@X8u(k1SRK1DsPDh6vlDjkZx$N zhqc=*J*fIn8ksGivjr24MaAaLo4)z{iWP;+mS2+rPWi=xulxZ(1;LNX&xyxvQu)$e zgwb--rcLGpAGq{uKmYl!zW7?+ieLZ7_2t{U_w;^yUw{99mXnf(jO|v`#KNfSTEQe^ z?ERD4sF6G9Ohr*fARX)Umag$Z252LQsThG9L2B@|!|XPfLpv3#dlgYf;Az7llX{px zeG-RHpUhLMH{rUn${A84a0ra91pd;c7k-91qzS4}^)CpmfVFn;gu)n&)|$E*9sKy* z#msN1C+GVJAnHh#u2|2q7dLY1v9q~w!C~}`<+*3e4pgbrBV~A zd&<5J6+k{8E>*+SNmEE?GT~TXuxQZ|T3TD#+t`PQ?#WE)X=UT?er9*J5~u)We5ACt-^M^9662;ds~PkQeCvbf z(A}D$Ig_S7nLxUhzA4MyIfc@Oyyw$DoTYbYlx+he+`Q~X_KxOB#vB&Up2n&3W-_C# z!H%H9F6^Gc0*|eI2^<~nLtz>BszAW1txyU?*>uRTZ*bTLSi1BNU%mJp?^qR!#lN*_ z)5b#p!^?ewqK}z3%VLC#viqMBFrypUKa2*mef!I&ZQimum_P3b@%+jc-jKoSn;3vU z^SJ4zoA}sAKXzGNL;c9$z`$FEhKI|cL{9EP96JYd$W%CDI`lMIGZP~rU2Et2siZ|# zWA@9m#X+L!ezzy^^IvNfY!i(#yRVc~xYBC-4-UcLC?c%LDzj}a*HmiI=L!A=4Vi3m*V#IvP3 zQb;1A0B)X0WR$2JM~DF71V~4qwIuGshmP}!M+Er*a9pOeHj|1ra=}SQQPc)MoZei~ljvw2{Ub$de#U}2RG|0qVLyru*-g#afAsggy{8q@$% zIy5vl^M^Z^a?wQ>F?;rGF1h4lMnkl}@B94bcfV(BJcnaouUAo!^nLZZuY&HLE|IKB z+N@U@9(!sP%h$bx=g9J8%QYI;NQ4v?dY)2q$kOV5=u#N^c z_V$I9aDXy_#U6y~&(n%$x9ntUM=S3;{b-Jw(L+abEy-Afm}3(FM@k$ikkTRQy40nT z%;;)i;o;Ny;NqkB-iI#WUq5&*7au>5+g7aOw5xy2Xf9x5;WJ%jM< zT2RHxcv1V%m_awy0SM3cIpXkn{u>qi-%J2r9z3$MkKNgVy;hB~2)94FmK;lnGlpbQAyC#EzUV>TR`N-@sz@eM?+d|<@or=KmNL1((iod#ZL<m1?Uf=O=;=TlbqHcc zH_Yfn^fZHTFsUS>sUFhFig`o{+$Sdr>`Z9!zmbD*s%G&;ANCDnM#su7d7?ae5KMIV zsiJ_Djdw~)d!gxyvf!XHt3la{S(N2tO_*Kls@L%sQV#qtZxGc((vs|ge6N+qvN ziPk@%%Tn%ugr+8Vfo=P*#!BYlbLqQ0O;#c4)fv2(GYmKjMCm<^gfq@_>aK!X3{&3}IdGxDa;=wO{ zmVdtNoh+U`o1%h1NrZ@?jV2P4?A$lRw{E_lw(d6Gv*>6F$|o=Z4{qIMt#^$DbxyGS zJ;*W=p>n2{hNxB~iaPWkFa-I$wW1E+LA4*QXMZSD{lvbBlHgrBc+{*OKqigWmx5xMwBHsKt+E` zR3!was!K5O3`@^bA@!}KEg*sVcm#yQx*fZTM%=QEvoHc91A0eB85|j>yQv;O2+$IA zC`@F^R6mIn4$@f6NEwi;wFM_ii3$wkd5^uLISy@a;Rhc)hh<;;J1#kK9zVS00iNHu z0}+c_{|WskV5`i;Zv-Nw{o3=cP1Vl($VWf=R)DX6{p)t#E*%kQwKx`w{UQ=^Y=dni zi+*}743B{0qLqS79i&rb$$&3h`MKx8T7tis0Q@%`Z-3jx6!KXT$=bI(`|OI_R;^rh zY#7NTDU0N0&ScEYF3hw}NT)D~gyrz3Q<#Wr(elO$Z-^=&nlNG_r~EHa(h4Chm2Y?q z21l%+g)C8dszhx{igu#f4mVT)EQG$}xjgvA@rOep)=y}VRE&FzTedbpHU%dJ%0195EQXCr168J?v^PYE-o-w67sT~;^dCPbH z`P;QiPCxCBp3&PbyqMK%HkhN1ocr7LYu6ox5XK_UKPnJU=U0JA1xj+hZjL|4G5x^Evp_`{<%(TZ1uA#c3##$UZ&SM!g4bREW+ zM15U-SNQ^sxbzkBXl-=?gjV5rN=y_JoxlbV;a(E5M2rqO_%^v0LLZPtI|SwSfe{8} z46$g0#<9eas}lz1s5eo(*|#jb%d_Kl7+qqUhp2VtktCe%V0wAA4k%~Ux(gILBDng&nt$ZGUuYK)nulw%y zCJ6A49J6Q7=65&W#F=ND*?-Ty_cZ3qp-~7r8ZDYLRRh!8p)O?=)Y7$>SS&>IPi*aL z#fZ8D%xlZ~yPBA?OomflQ?G?N1S`qT!ir4o0&U>F!i6;?hE%V0Wsub+bYs zVo{_~%xrIAc0-1#4Rv&<;v}PS8j^8pgrvrGNQ95e8O2DUh|w;id5^t?JiErn*gQ1G z+I>Up7#$;<4(QnP&z$Mcr% z8*JSz00xJK4DjCeu1W8kJ$Lrv z`|n!%P&5)Hhoy!E3UXeNv*sPi`R{)l*I)59P*xuJxD$@w@xXoezv@Z<-Df|;_rLoC z-v8dqzH{TvzkRy|V~i1|vk}>lLATXgfNEeS(84e-$Or}pv?3k%m|o*E?nBJA&S-%f z#Ss<+Xf$Z0F&YBp;Zr1Te0B{<2%sh=hzf~g48Czm*EH~nb5G{)|MdofXp9QDRPQIW z6DEt*_*0|EBqO#O#~`$|jztSZXbzM2vc#h}-i zliEboR&+Xo5kb|px8Hh0lnt?BMMGUyqoqJ7fv<{?%};pQCRJnI;OaA0g4k%pBrvfE zY}k$jv^L!J%nI zU>t1>t9S0k^E_sCHB;~{FjN?W2yLY8gwB*D%Qe=Dx@=KiRwf0sLgJuAs0`=@_}bt^ zB8Z%CN1w*AUy=J=a~!z&l&Q{+1p!7P7U*3>6bc1)Y}tN*h(n=Z@f~~i^!@!YM;|}w zx#ypLyHW~SD4-hv$kD5J}m0HZ@kFB8~}Kq(ZOfn1Sw`-WKAH^`$q zwzF|yl<}O$nDVTrb|jpgNJx#D~ zC#0gVWiPDSU?o8tY7v=K=o02)B2|h>x-#xC+Ttg~Vbd`Ub+G;=7|#oU-kmR-p@F>* zPM$pZl)-_4^5x=bB zq&8AR*2M9HDB3Xy-%f6g5g0tQal$riK-3f%DEK_PJq>7LP83`x1cz#To#33K=kndw z2k9LewtnhH+ls16lf7(7T}>(VVN!EFfwDUBGGurgX{BLvY7}EUhH?Sly6qvdxja|B z`wZIaGi37xc8z7Zb>j|jWLP=680lAJmy8Mn4wW%hs3IghLu$MjKGcr&bf95;yb?fS z5jb|XO|13~pf|jPkS=EK4CItf^tL_dq6hgR(v#>2h`3v>GxrYky>9#2s#UARk|m4V z$H&6g7f({#)ymmN&Z4`qp6l0a;}`!7xdHsx76`(cP|e|F9Kf|@w`!_6JgW#y%3AjR+~a8n>aZ_ zqP0fKa8yCXtDq#wpp8PB@Ownq&2TDUW+MoMCKHQr%+xOKUA_w9QEMk2vZTx_77hZ<7T+U{ID>exH0J=LN zlSUNw;dwrrU*6V!-$VDir=NOS@MZ$=1|Rc}I+EvCJjY2VpLFSyPdxSQ&6_t@Qos5% zV&)`FTO+h(psNLHQ?_O2I95cXzRhw=_#V5mI9OAOxv7G$m^|yrqG;Z7m$x+Q`iMG+mht z4e=;ne*76k5OD1&M`L6JAsf-cwXvegC`Vv0jv<2B4=ZC?+S(Y90aAH1)_5$MRLiN8 zy7X0-Cdvng zKg*;bok9$a!mP=NbQ(6ijM=<1YzaD$h(julsHwr!ro!7%jO&KU9@gTyt;rfaZQhC4 zwHKq5DCF~c+qP|wQpHLpUtq`B2#1>j-RTy-{gp59q4VBn!JDABZri#J5Dg7=3=UQ( zWbc0WCH(WZzRS12^X*w*`NwPj-{{!rbiimK1v9#A#WAb1s{2zdhGO5(X|Z9>YuHS4 zR5Pkt88M+xkT5m`gu+mSI4Wg|XyxO&Me@ZwKYlb$agT&O001BWNkl3IU;FCQ0%vz3^H-+~uoXc ztQ(;taFq=&1+M@jRmMu)t&mB=OS|C3mk`RgzrMH6GKCs5u)81fMYQ%oyO?OD8#ekn zQUO2qv5(efGMVf8`}f%&bYz$@V+!3(bu_1j8L5huI84w7!x%c!_3RrPW8Zj=j!ZLoFH3+xctuvf zw3DeV^`ujARFzYp6ccp{su>6}G%?d66#dfLY7>+w$y%bMO~xHp(weC$8=skKiS-Gx z;Ro9+Dq=w8{XP1ph1BO?c!rZtJXzfLz`aW@zWCy=KJ?(jA0HUp*8mt+Z4vkiI-4+i z_kn?~uI~5#>kqH{6>#613BVh8G&VPh=T|&ujyQ7u#uZPmn5MNV4X1^e+KK6D!!*>w zj8155wCa71GhsGns)LYtZBfWb5P=5+L(FWbC!KJ4abT2U;FqxiCK9z(MZ~pjN;jn3 zg-B9DNBLMaU!ug%$xi@QIir%{30E zPL8v1N;_jkkDa4=zWwA19@??nGATr8@r45-n5Z34YCrx(fRy3ia~;IwX3XfA#RGIS zLR|u}@+Hi`kR6@)Ss2Y?#DJ}4BM!!OEDf}-7Sc5q2at#$QYp;5S(wfy#EY9T<9S&z zeFzV)$fiAeV6I}!ALG(R3%U72?_%i>e+eLW?AU3Vn(Dv1Z{N^o-}~P8asBoG!GhzD z<2S##kxzg6lV862s;e(67K%NkZO+V|4Bc(WDedTZ1fg}6RD!8c0Ug7`BU9N@XyoFC zRV=6*Kx!x`gDVu$L=b_4kParKdiusE>E_upTI5F$#8}-Mv#OYWsHP~bT&odwjvkRU zoU>pq|M}1}3@I<1l!^WER+U2=2z**v>gZ{0zzYzf1Gq&aMRkY{OI;a zAra*tE;7`_xRnK&31lU>dxpO6nLtn9CkSygex&aSwuXF@k@$d0vR$uG*HZr zTP=-JHs0QX7|X+!ofzeZkTC;U4`~D{75dHxL0O~2L}Ov1p~)8tugfKS;oC0Y)|-Dn zDrKpJ7s6?8;nexFXsL~p_W~MfqP%U^G#=m4%Qv5Sj-%RIIe&ULX(!HzR|pN9j8$&b zww10+P}cCww6NF!9Ri4@z@qD=_17q)eL`=Cns@})aoE;Bz@)|=26N-M61ESHvg+kt zPCa}U^|f)bXmwl}>=#s^y$@<8m&p(`a3>VCt$6&s|=7CtD1t0MG zU;`o0m~;)IDGhrDZSs~#VUC>*FRX{&eHDC#vFr$x)ekV^dDyeBvVqmrVj5}@^=V9f z22MN@)^C9wd&--WFklKE8~X;V^1YGxLBN+U|2R+G`xrwTw%TEmkstolr#|z*4}bWB zJ2UllEPrYlCoeqZ$3OYWPd`?))H56W=S_jm4rEUox*;8c8bi@0Z6wZw@D0Kd zNL89VNsgR0otZstEZ^`_NU1Va60;MpFk`Hp>ij8PwACdU%|lHjq^D|#8iSEVR_+_( zZ*IC9M#i{!;R24F(vI&JiMVl=?doIO-T`nUVeY7GS51rZ=)-R1vLgDkaW|&1)&};# zG8{@Md0!axz*uEefgS6akx>}SQ&NerNtLxgwt65Hu$&>(o{+*OzOU19>&?ICob%2e zzw-}E?G@ZyPpZ9@bB>;cQo`!x>i}sSPMg}viJh(d`^xov_>RXoeOd?SOzokeCV|$5 zLSQujm9$BsV?vJxX$^vu(zp%;%63eo)L|Pw6j>@ya14$#_`XN~NFJ?yg1{qLZ(=?6_q5S-SD>cjxe?Z0JumZuI-!d9L@6M=hyMjj-3#R zgxw5X5m+;ZSFYl!gxd(|(8eI5<Cbu` zM~o>}}JPteLP_Di9THbldCCC5% z)?2S1=--zXr3)*Q6k_%aOj8EY)_|GbWkG(fW7W~r{#xNx!T&V@(LzBSU%}WIGn(p| z-#!W9)XM?*Z$?4AxTojZ%uCU;O5cNzB$o)WljigYxEj3mlK1*3~R_0m>u-@2Xa&p#C@ zBP3&ub_S>gM%o$g!P;XJsY4YmajBatWN11Pn(9~tvLGHw(l@?`&))wmx2#x4B2~jj zjys$y7R+I9F3&fYy~rb5wlm@dA;V5q^w<%987+m085?Fw2MlDbkcaT?ym;O$`#qCZTYx*4ELwQ%9e3S*%9Bq#^)VIr7UJZ%!p!V~u1;ug zLU%XX>n`jN8Bw8umM6W!V1iKjPH0vPPhrJaH#6gd996rQj<`q0Rk#Mm#>d&USM$V6 zF}CcC*bY^s2r3FvS!F?`FcD$tamL!eXklosZQ|_X4(Hi5TTszZ=s@cOakAw~RB*vb zN0BcER(i@fD4}q1@yWAme26bS@FaR?KlSM}?^$#>fe97rjOLaNTPX+`23}p|Wl`GT zO{EJV9Zar(EELgW4zy`XVnIgOPJkC^%-H_={Q=T96^dI&E5>z^oy};WE8_yksp!H7 zL0J;~pj!N|@wnuYOStjI8@cbE`;uiz%%%*-A31}=I$IdY7Q$LyAVh%YNnGjhh2!S2 zZFrR5ZFq@K-TNeyG8yKyW|&={raqY@6>*5W4vqxZSXEPrK}GDiBpR^+-_tHq`(bxL zlqYN27;57&V$mr5BV!n>1E6bM9$&K^q-NgKPJC5D`|pp-o#<5{jaB8;vP90YfKVe1 zIX~c~@o|=K-@`qdw)5!j-K3<%_53PvwXmn5UuA52P$aTVJWZ_90cdY)JL8LAxbl0z z&>#DJx?0+C93hl4nVOoKtw84q$DeTN{SVy#+Y?SWK|J~7lLmNQga4Ze0MOLZEY_}H zXAYk;_g^1=_~B2KDkKAfu2z`djj2z;^e#+K8zL6B!A7faJ}AmrK2BKa1^F*e z&BjSpFZz|%ztYw@ue~0&@4+|@!YHfPfB1~5Bp}3GB@$vSMy_Y?sLv*E+mUpfde|PC6+IXx zM0nc?$MXH(-px=h7h0@RRc%!9a!qD7lc)<35{_L z#bObL$0uGV!{eCR+7K`iUCmoLwk2<8Jixx6e!-Ux_^|U8zP$e-bQRxgyX>D-} zL4X(JafM-|P~iU68)o^2Dpcp8243DvT-!LnC_wa1r z0DajawF0Kp*YbrEj^>N+v(w*p(Ob{HHVHc0pdk%&ry`mgtg5Zn6_Y+kSk$Kj427Kf-GeqUm_Oa>Jik)#H&rw@ z8ER^eje{3Z6OC}$5l0de4n=IRb*dVmDx6ORHXX1Pxs#wJnWipg+h{Lr-$ObU<~@Ua|Gg)YjMou$lc52S zMi>Vnby+Q~S}wFC{4r4+#8{z`((2a$%2I-aAQjQvxOzF4-}MB0_6>06;WPODnWrx_|lWlGB8?%gh417N((zxJ_(kNFN2^sx_-7_4W0a_mCxv7G3}Q+i&|pB9XWY#SV)Gu?qP z0?#OV>KnQ0n$PjU=PrY>oG2Cx2Dp6V#*JkppJ{1;LnmAC;$mua0?GSZqkkUm8t7V__M$kfl(j+1d4{qDR*B@ODu44gjndE_96{YLl ztHE@)Vzh@5QG}6YIp{*5nbpzF;`xVh^ZidDQf`=RyI}>WO5*D{I^Z2=9!Eneg*Fax zH%W~!i8dU;0 zoJSWt#8?h9t;e?aMcDR6Q7jfp^u0=j*gJsfY_lwY(Q(A!2L6}pA zmd*%#6%cqnj<8sQ+E|QxUfjS?{}9I>GKJQe4xU7E{afLa0He`~B);c(1CMI2DXM#GsGNfZccAk&ewhOa$H_mV#mCZv# zE#}Ol?HpdI11rvI8QxM=YFtDwT^BL6ww7@fArVOuag#)a6H@dl++7>ILu_w2>s`BN2j6(~89sjO ze2(kr#K@Y8BAyVT>YqgJCt13GBCvn!(uk6Rmn9DgDM&en?=OFV%a=X^20pRySiW`I zTX39OipmT9!66<^5sAbZ%k9JUhB$9-4@Y&i@QJ%0=Y`$97CEg2;D?CxP>oNzD5LB~ zZscq00=!Ziu$)7L0W=oDG^b(rfW;>u?1)Gkm_OZq)VubgjbdAA4WoO9ShZ~@ z$MwucN(ZS0c|XqwmYl|KKlK6b`Nnl6#~l0O-3UzWgvo7CQv-)}LbApN|I$fnLmW71 z(p>UhAsp9ea>W4<4yjmu_*rWFAi!4{YT}Ldc@dZ0*}#J5N_YoR4f$rGPKB_ob0w@_ zcGyJ6K_iueB*uGAJ&v32eFS4-fMdmm+yGSACie==I$|d8UvfOk_#`7~94Cp;0m+EV z>ODL7-G+^{j{EfW4fCmYoW`uK7KXBUgkxC(w{LjKg1uaMpc`d1t3=vP6?qR`D8T4A zCRem(Sx(fhg;3lk7#V|tKd}QgG>-6!Fu4O(Z??&Ht}yW;OGKfg5$y;V9D~8pu)i(E zz4zSHcGg*Eao1gU{aO3n;?qv$!TTR#<@2i|<-eCnao+LsiN*xkaZ{174y$%YI$&Je zl?gi{<;x`ucnLQ`cb&sz0fIWBG8%ef1V|z%qp)d(AyAN2eyGx??ayU^5Ha#zK%wB_ zl=dJg`NQ)YATS&TBXwbVz}(m8B>P@U+HtBqHz`&gQG=rsWd_%=`ay zjyF2^!~a4hz?m~=^62;K0C z-U!z|zMQt&B%eF(aC}{ZBNLeYXgpHB`fPHde5fcZbcv8c2Fwe8d=JJEiWo=l3{-+2ZfJ9-{9x=Qz;T=xc6 zkxfUjN#5%O5STFj3)u(F^&u6sES7FfP?W&TnF37>rT4`Q4Gmp*%rVD&=Y1DmBCPLu z<#^A#-p&90*-!6!U}@wU|-jY4w+9Df+ho&=rEaP(AUGJyyx9u8KPTC#R%FX#fk2=H|g6;?x@D&hqJ zzET7V0v!+-jZz9fupOh`Y|f(lr3kCZlA~I+K1ImjQ1-(Klq%m{QeRaPyg+dB+}U*W z^gu2M^<=`Y#$a+eI$G-Zw@+R|Q#6Vs!MHb$z{7PV1NkhM-*XS=c6ac^GwW%e)WqMM zbt1W(hcuF?bl5aB%HuoxO3H1op5z&ei!kGPo7DFWLpE<^w2igG6++-Eg&sVJeXsAs z&VJ0KHcU(XfonM;VQMF$w$@(1>&pCbF=g_U9l)O*`~e=k{~@mV@>Q)y5HE{vb~dx* zh?(RIUe(JnR-i~YmH9fMzsG)G1qQ7ZN*PObQHJrrXT&QqQq&9;^NbZdhWvoMwgykG zbco6bE)ruLTopy2QN|#P0mcPKIt+}A^6(2=h$UkznAVN!Ml8loD{u@6*C8H_(NGg* zPIDb+OzPk*(F@9VtB!~Ns}g{Qx<)o`+{m0cbFO%C&5L)eU%w$$ZcKJIBj!#+ zwA91AsmLQ{+6`3MV5K9DRepPRE#|H#5NoztvyW&L>Bj6H=QxPQ4EV|h(^o`~%E~O$ zE5OhYc#2dk%1_QdljdX#zUSE%ne*xnRfghxR+_@8#h$pA;tZl)d&{uKT*LD>A$I z!%RK&FbbknE}DQRH?HANYc_H9aR*YL%;0(T_TDJJr{P`x>q61X-z!X5@q`EXT>j8~ zeEq?vncULMPtQ1x&mV9&u}%_*fU+<#)}qunCmQ?Cq*q5%ZVbpQkrG^S_&$7h!6CF| z(ss>ERF1e78evu4^xI`Rq<1RHghIHT?Rnp^Lf2-!-mg}nlkpF z?|tuk!+!M5zqw`DpU*t~jN-a=>z@(Qeja^!UR<`8-r@j4N49&D6oV2|+DCHv#UF*a z(_o(&#(Ze%c$hX0CXY7z(e_MNZ5;%-l9gS33`Kc7>*OdD2$?prs9IawRb3UAL>cH5 zK~f|P0#GbKsQ`WnN+py0Ooo7{?7c48Rq%=9lC3|=EN#R3kK>3DxmJ#uHx>MX;S%J1 z7%ITv5c6kE8-+3#KOcErAW@44?guIsj;0ncUjj0ucu zZ6J;XN*E3Ogqy;X2?MDU6AP=cVbg@UhwVL8c>~oVPpcRgg<%i~w3IZY61=o|8~=Id zLww@KyZGG`i&0vmL~J)a9J&UF2t%LxR1(*9cw*HCy1V;nXv%QF)GbB2bzjiV4DqAc~0W>yTQagftslcH~(mBNj?NeT9M@16ik3 zYHfh^>+1%}@yT)QS~e)9h@$8pIw$@=GXn6uBt3oIw6(NCXCFbk`*(L>Uy3@&V^zR*FF0Z$4(i;5u?YVMZF1t!g_64agTCAAaGt+@~=f2 zQceQlmN@_JyZF^p&vW3^vHa{k3z*tIg&@`l9a^n#0}MNrRUb1BDUT5xA!$grQH&bs zFK%VQMMZ z8|i55K#&A9u9gf$Mb16yNPhG3au#jaXpw-V8Gn>L1!5!CL#(R%)Ujsu)*bW|hG@@a zOo=KKjudOK}ZmX z;D>A*93WH*C6yVk4cj_YgxckV1NP&;ANU)G&6$ShC1`JGV&=G!oOk?@wB)jAksys( zGs`$RTwUbZtp#Q@yUfqkbIG5c;=uXSIePX)3Soejf{Y{CJlM}2D>mABt*(;)UPbgp z1Nbo_UqTP$jrT?Dpz}q9QkC`Hpja}R5P)=~o<4nsSi5E&K~RFhBCJ@Cm^Tf*&vfW+ zHRrOS&Jf3<0A5;K=8BlRD^?eO``cG9`}C(j&9&EF`<71X@|TtuqQEAjRFYZKr;tjx z1VKc?O;Vp}C+Vb6N)g6I@H4P7u?8uG>%goD=#F-1 z%E5uN5ZM$u)>SvKo+0#KUqo#0V#?&{{MUsa=ji$SGV+`gDFhKDtUReu(AI?T5@yDy zYZ6U)=3j2R90@~t=x0unLx92*A9NU zcsc3%6sJv_h)@#8^N`wF`<6vH?wJL!001BWNkl(zNXNZ5gEWlHB2&)B<_JjtM|6C>if#Tn zD8e|#v1Tu>aP9on>`FTblvaj&5gXR9z!XSnFG127Pj7xFbK70+JnI-fc-KPKcA6r< zE?AlYziTDaa<02sBAY(vho25!0T{koH_$A!*O05kMg-8T(d?YBfzBggHJ<4VF%AfzVaxcqea28u&PNZSGchgbMb)E0@3Kn|2pVTkCTkd0q#Y> zh~kJ+&_gLK5JY*jj%?z0ENQqbifBo`!ZCaJ8XB_o{QRM(x#=&@^7}7-nDMO*c*0?H zV;w(zXc4C#ybn!D2N#Ezw{#;sj|pv!tlr+s^Dl1!5%YmV=i_MC5mL5MM zDYTLORk2N^Rb{Lyj9t~G&j&qx>&X{5dD=MUwzZRUTTogVh)|iNt1W@BoCNo@i(45f zVC;{}-{UzhJ*5FIx#xBsSh1Q9AGjY^z58ey(`^KCY%F7uxHjnvA&vW78MPM@8EcfI zh&4D$0Np?$zoLXTPJ6;(M0N}VrB22-xZHjA0?xnZQJ&en!zw27N?TV^1JUnJ0(-q9 zfHFFwl@Sur8pgE1vLW!KAs-6Yu5>8~1++9GW{yR#*nj|$FBO{R&YQb%$@5E&-IHj@ z!iSCe=j6!~owaK>n7`~B;`T?L2l3kV)C1N@|HD%c%M~ zMl}G0NF5MFc{&RN_$nspcqmK|*A{XPRKTpJ7Op$xB$5fAp&+tFta;f|K_tO7dyqIz zf+x20Fuhsv$dXPT``b$#w9j-7n=!$N+(?CkpsQHq*UQ&Hs^U(|IfF z2*2+V7F|-IhBep2zSE(j4Q7ltkep`(b3_@!S-b-A)KcDm=uzD9jqmcwlio`< zlR;_CfByP_FF&;V_XR!ORM$KM22Atd;bf&7PtAdIMY6I^xNyZFXo2OvZP zLME*qwUuD4$dap95cbN>R|v_@fnNT&YArZ|56_uKG1L|3T2XVAjUKkFo>^_Q^flm# zL4LYq8Ebla`RxAl$t9Z&VP2a=PKCrLYd8R^@;<9>VCBj{pro}!MUe6wx(l6Lc=zo* zuxbNWEjXNOPB@PGbSq(87Cdn*${}&IFivAiRy38QWm*d*aV)&<2#M4h6%`2Mewxxr zk}^SKGQo8V4&$gvV=A_+Em_)OxLAmS zP{a5R#Hd#D6Jo{7t5zQ|d*-ZtU+dY;zn5c-clIh zNsnA2LB{j&c<|9tO|l-;O_+x@594K1#YS4{zGR&c4B_u76n-S68p6D4R`{ zCAISbx)6dNAPQErM`ILxm&wloEC*Sz<>u)~w^wZvQ@&|b6;e{i6dV8A72eENv8_jhY zv~WFnbjI3+E95j;H>K!LUg8EboExFM&=f=>G89^plk1IU`!7E+ilO_|A`<`FP zn3g)mwl{Lc?;hY^e|jfUNb*IWhD?&ih73AZ^bX}&yM719&zXde=J!v(2tmjv7aW4? zc<9(%d4)g?9A6-iHqZ&Xwrb}42IW-3Bzd7FN{EWRv9?A|VH~k$N0&j9gg}=^ zg~QOn|LOJ@d+;AIzloygEo}k3g8;mR$4f80#KDIgy!XOKAG&w@_U#swL@=@yW=@1$ z3g%9N@z#@DDR87g03Kh0+`5bJT=+@OJ^Dm6A;nUOhNeb-cK;t)zitg=Glm<03Ho}k z@kSFMimQYYjgdc%1iCP2VPRt;GP=2epPYCkhmD_(B!iHSowHM!t?hBXZujZS+1(}N z;q_}-zO9?79qk-6x|M<0uHR@?RX5XiVq1ahG)fvau7l62uI*g?=rde?)VrA8)`1c^ z5CKw{?o8SwU%SgM%DMr%>2bT%W#j~##S&aUkj06RYW*-!D&k6y&}*Z=HoiG@42 z?NXuPD+!WG8k!qv%BDygm%yIdwY9x%?dmlzY~QxMOp+FiZb$4r8Jcp){imDcUvZK%201*w z1b6!`e(~k6bKyy+6DhMklBvrwSj_X|yKf^(C9JW8Fyx)ltuU?~VLMsM%3)F<^8s}2 zLi80tDP*8HX4*I&KJQG9ojey;)*~EU4S=d_TPbbluPZlTEKCAcTAAN#2;)4zUA_jQ znA4|E1Sbh`NE}DRQB)1y6}{?;R5}`gtDq1LaLqGInB3OP1@mVUi!82n^TNi$DrZ2~ z!2Y@h;jqn(RzzA+5+&jwAQnCw`c`q$Z|-F6u3m0C=M+xcYd>7Cj!=gnm6_+&YWeSp zGFh41OCt&+L-NJ#^yW8l`|{Yx#u358k&ba&F_Ezd!|jB#=3RugebGIx(DfAzMdNvK7lJkBYBE(=PSRC^4IGL zM73OvO7IeUE)aGPz{8U+xz4LD$zeN4+mf!q$XLpwX#1DRO&3@m# z_In2aqL?p;l`B`gXUwRvWm&?vE%^iZVIa!uzvNQXHRY(!B=BU)c!s_RX4F|M;~V%JP)lT zN$GL_b1RrLdK7z4YUk^BJ_d2X1;-wQ>pFx&TU`MgUn+%PmB5T08ncPy(C-&c$3-@^!j$20mu8FcW~d@wOs$g zayE1hGOfLdOOM)z<0npLQezW!i4=|$l%gW84w=}LLS$@*S&J4ZD;)DGK~-C_q0pp7g8QFe!t={F za><$RX3EGB^cD-oJ6=l?4m`4PE1iYBG0iITbgb=h<=&u%6CecMP=JiBHFxjO@FLOo zp->{!F{ObaGZHYbFh1gtLx1<;3(r@+^|~MZc-VXR z7hkkSa&;LR8?z)Ff#;^HMml>u2ZlSL^{_*3k8%|<({{`wDh*4-_@*ZQkS_uyK6L1z z{Aow4v00ru8r|GzOdn!p-1A%qo?S*;caiJ9@D<)Ydmi0`dE1dl z8k?Hg(%H#(Z~YZPMQFylc~usa=;jwMtm2@ttsF9T3`(YP>>j&vB%Ughx)e$UL~%$Mmx!Vg zaU7%Yjq6sGYme5NwCj=geJ=Xb6SSq1T=$;CXilf;DHhRU2v78q^6JQVb+}H-$fDK~ z3~OSJv@1M9`Q-gBez$BXKY4a38;0_nF>NAO9epJGcZ{Ja)o8ujC9yU{LMgNC7~I6Z zBS-M9BM;>B4?a!_t9!nCa(XjPLVFkim}=BDM6bc(Fj!KT=gwtRAc$bfXhiQ2x~o?J zI$tb4dCA8wIqkV$0Qd z<5~^72ePuQs;+fDwZ-aiCCPH&Qz&he;A%f4t+j=StLtM4Cxes;f~ZI`nXT#kYd=c8 z$6`Z>GG)~2$cH{x-T7zQJ6bsRsJ$upzLm)~|0W0(x2;%Xi~ceurfiYB2lq}Xkg*~? z=o4rSftCNQ{eVg#gb`uEC+x2l09vc)hu8h^`m@h`AGhBAyT5Bpd~VUAM16hzXDgpu zGC^}g9WE}OoBSUWlzz2yGCYu&(TODlhAQBMd9(TCFK%Jkwk=E>*}-WC?8hN9XCg$A zA%6!AsT9}z;R&X+w=ivNE9YMQD-yXBmz;7K4e1QUFv3AmGZeM!ycPwhaR96>SjxAg z80H;G#ned&L8LWF$6>|hU6g{zkTL%sef46Fc{qP{*y%JaDNrvJnG^=r+X zA0QGiYaEOo1u8-XC3II0boCgsk5Y+*bUFWBb6EHGF}2-MVxxuLrkpC@Pp$Iqdt+O6vs$3E-sNaTL)eFjr10_ z;>UUO{>zw0rE)jg{zCP!vU3$@-}whV`R6A&XzWN9o_9JwJn=M+nLLmBWGjL2h_n$l zDZ|O0o1`H#f z5T%*`SqX-E&lQZQ*$Svas}@GJnhe-&4#RbdQ7Rf{`cy3hG;thOYMK~Iy(ljO{_ifnD z`pyBv^U>uE@p8efYU~~=7&5LOlL}(uID$e6T`bjBeGrCd72$XH8h(#`j2K~re*WIc zA7IOtEwaC_e?;Zoc`hxv46c`;%pDaBFSu%pTdm5qQH@@L9n6)_mJqVmIh`ODjBOsl z-jhdj0?}s=yH8gkf6;VIG_!*Zy@02aIgvfH6}Ljz=LXFc@^xo8L_L(0Y1@wvaD&&E38+A*?ZMmAeDpbIP@0-PQP^_hmULLx&?TdFW$b%m|l^>sUGIQHz;ksF3Wf;FwnNbN^R=UhM zR%DV5Bop<-al{u7p3Urz4hWR7rqwlQ<{P;BDXsm;=BP;3DOC&zI*Nj=Gu3f)o*wcRVo8L6W?!gCb&t@~`+e-ocin?trukZ#y8eWM~ z#+*o%YDofCbVZ_cK&VOxsS(;kONA?wG$cpamCtGcBCWh``B!S@z7>mU!1FwI4fXJy z-`~Z!v7Dm#?`&dNf*@4GX1X1W~1^ zLmRTBmR9Y#Mgh^(zGZT zRaf^=$&2Y?p`Pr5ojhiHgVy8bGYjR zr}C@Qj$_}^dl88yLLE`^yU7PT@aZC!MU)<3u(XYQIAFoZkU@V3*ZtuEPWaq4+<5zg zY}ww$Lr*@>x!?FP>vwEIxJJrSD8P|Cv|$TGA5M_x~4q;egps<5L z6)Gebtp|C2+cxf9zlkp#GM^|4=p0;6e|{^2#V$(WAd$A6k(9QY7S;c>w8Aj4kpNX@ zUbrLg^W{hX%9(pj;Oe6fpg#&wDhB0NHV@P=cC6{tr4R&Rk*=XFbmzB_4+ap9&r3U2 z^3i+l<=Vf##HEMt%f08G#SvroCeZaLVc6Z3F1MzVFH12Cs|47XX+vp2LOT59JqIzT zy%|cj`j=P_fj5l(SGN{wzibDBD-q50RMcwh0UfsKP=Qc2V%lhgN$O%?aDbwp{{p~q z#~nB9nfKXe9#1~`^tCN5BW@|DYq|zmc=yA6{kOM}Nq7~aVJstrGT^&ZwOb42F2^w> zJgQ@ZS{Aj|%J4dL8Opb}fr^QBP$}xlr=v^+RXR3ElB#7!OQJX&J_bR*=Fat=x+yby zFz-C+xLkSHAL-lK%^64S%fyjwD6NSt&!yf=@X*FhytKI+67DN5U(JxBrbyEWrO6fz zN)bhYar@j2M$usiaf}KA=&vFGU%c!qGyf6d<8jBH$V<<^Q0VXNsUB4=Xs$~k9oKfw zp1F@ChQsgLbSNAY-f$ZSyPh1^thEj!f$B;VO+F}c^1l0%%cQvKj(g}C8YGT~*tn~Q zi+*w&9V6;kx_%2k_|1bHeaJk1c)`gOeWMB~wIG&NM8P!UqWWbwK(O7uvZz4Cc7pQW zzZFum;$K=zlu&q{!^+KFZ0qa-=atad>+b{fEB}ENRr_Z_1O90_07o5mIQt!PaKl4? ze&FdPFDw~V8N@bZVfGXl)drK>jq6!92br?MpCuxDF1)ysd2M6($wxoI&M4siZEI+9 zGf2myZA1%;US7e!{@0a6ku=h-3Ya_=J*EZnLl6YWM2f>Ej_1_rlR0YKXhznV{pfzb zL`LOtv`@ewo+sF`tDj9>z35nxOQo1Pu8oB26Vp#2Eb-MF?%<~T9ydv%A!BAOiU#!jdJX<}j2uFARtN}Cy)l!7Ss85rC}I$e(^ zJ+vxv>0{4v(cGC#Yp$oe*k{kL?dZxamaeT5#cs21VeLx=jwdPl5#M{}1x}qhfdx~> z(c?$BY$|5HQjySy5=>$U5B$~C0I9SVM~o$*d7^I z0#uB4U6?%){I`pAy z4<zN zK63RBd1&cU_L|hjvh~|py?GbHby)lIR!%x%f4*_hQ$IDOB5Y_{t4c zUFr8k%}A}>2pHXvDo;U|&%4spB|IK{VU5w_NCIzXjxL+30gmI~IL<$`9PmG70Wg35 zzC7~yUnmrdeTx@AUu9u6DEka4AIhM*~ZNbMFI6PjZ%tTg*;n(`ar>qwiX(bE<=GKDC)AlyOj!5S|Fu^BBoI4 zBH<-@bi-D56^nfOfH@45d|Zq{hO$FHsmp49<=L4Wj+58SY7>qmh$6oE*Cl*l=4AHo z7(pS5tR8|9YSG%LbSY(^^F4)PC1Rv>X!MeN`7h7##D*Pw@0dfGIU@+_e9(iWdk82h~zjxtjH#tD1`%*qL_|Mj&B~ZKNtP!Q3gYcbkq(+-*OS45h_O4 zWgwX}*3t4+l2AE!}yV~afbk*7e2V~6oBb7r?G0q>dHU4_~MHZLJUrwJf*o) z%AQy$O(_t;^Gmt>|J=g-@l%;Ns?9Li?KM-vnn#t3k#cSpk|^{^I(2qcuR7;-5csiA z)j6mte;mdIlxVJS9?HR3pzVIY-Ys|wqByXc?WQvmQV{(+V?gfFEONXdWyCXVckUppuSt}u-KvJZ+7yN}%UFx`;~ zz9!1j>{T5Dp>0utz;z{Er4skPuo@B$Z}75(%{MKnJW|x0B0O{FZC~@EAS41CUHvXjGX* zDV3R(5}<+*RD^alj+AWbA7H>Y^EFqn;;?nxIA_r9%{l-1O2) zK7Zieq#cL8*g%~|?58Y_Bg?*6HJyIVAuq3NNy$(UbHfWuxoG|jrnNLMP>Sp%!gK`E zvh3qn*!eH75Q{OLg=8oQ`QpN-Nx3e6{=o4_;gI)3lrGTSzm2BsXk3{<#0po~8~!!U zjFAjAufdZpnN$n?g&k-FhmL9E%$bw;mT|H-}u$9`T1u)g(I~Me#SdtSR%FSp;9`;Iz$oRh=g6=!j{y&BLt3=tnb{x4fj9D?Aen!=it5R zDHKfdCkAP(ZSPpUiGk3^kqKg{UN!j(Ychop&VnW0QRGhCk6a(8c_D)A+)vM|04$G4u?T3?~Q=v};v(Vh6sJs{%DcvN(3or_(jH-~ zNIG>S9W%$&Lg3<(5Bm|S#C^{!<>G68MX6YVmPQK?#U}6y30W614fOQ%nN<|wShqgM z1|%x`OpMAY_AEYe%E|QmC8Tjzpn3tQtX-Br!%|QpmrM?u=bC;-5vvlelc*Fh z0#GU5h|jqW=Fr6jwGMV?&04WvsfBWkGrd#KqeLh#h*Bh!s4O%MdguKo(W zE0f8bH*@-oTQ+UllmlRApQgLt$apzYEMLBS;EHd2ohvT8{O=MYhlUCO=_@Y3;x=GJ zx%o-#KaG!^aTNQFZXu~4<+(WaIu_!H0Y9R6SwsF*~3EcJ7e_?yi0JF!9!j;f9ShUjB z5-lTyHrgc0PVQADR_3Z|F-Qkd@X?Ew^40S{!`vCu$QSag*|weQe|IB)cxWM;c5R0djWo}kz)Abe z;G~(;nAh4tM|~rXlSOGLDP_E-g=J1FZD-E0h0#l_+t$NnH~pSc7$Gug3rT6T^lFsh zY!XbR>`Iw2j*(g!9c!r|mekj$Iqk6hkxmK~M`&Q{V4fh3@e&^6>T^VquFPg7(x{zj ziBq=6)Eb2%={P*TWgEv$8f*3NrPU)aa;nne2S!9V#t}wxH|S@nl<~@L@IH)Uo1f?3E4CctzOF96_Yq* z=1huyp<>}$p5F>#3L{4er0@vhK@@c+848fftc0Q=h)ZOWP3Aq>WGS>DibFil7Ir$O zY+|9cB8ZA4Tq~$=bpw=uK>4KYrbk)PQdH)r+7Q8n{eSGXqc1d`>#)A7i)-%tGY8F| z!GTl9Qwmf?-d8D2+D)=><2Kgy_8U!x3hPk6%EU&Xr6%KR(xE06M&~Oo`l!A^^LgN~ zWXY24b7svx=FmeA`D3Z%d&M|v$R~0HK_FUMnrUrqb^cz-|BN%v6nEZvyBEH?%Wku19MSv!V1}O$5nzLC()MbgH z7(Y_hO51+^w$+a-#jq(O)E<*A9)-f+HV#Mrc7dFt_dkK7M_AAjuF~HISvVpCAHa^wlGZ7Sj8kA!PURLmrYwc zO%YPwpLQIo8s=gc6s(bUC>x<%$0QCs$PeY*@F|R$DfC(dE=~}eb?CR=#Z$op_zQA8=|JmL5`~iTTo^CG=?Yg1s zknU(>V{b3lKk^WV&)f$sd;~GEHXv^KDWyFeuH)cGC1OkLQ(B{>Ld7QGhp|szX=g?L zIgUew)Rdw={J|k3K4jJV4B#Z`54w?|eGWS=a)BuFQK`s`w`>t8aEOVK$^kbvme0z} zmbFF2gkv^al1`fcyyGVHU_T!^<`mLN2R~2-$1po;gmJ`gmaVnul_+n9*7$AgUb2~Q zNEah3b?Xr70M*lvFso>K^w(!Jfhv8;5MS#-EsFiBt zM-ta)`@4?hiIwZ=?Cr0t>gr)8K5qsED6bvqs)V%NU-l9nX|vVyP66;{AN_;<>GRGx zcib(v-nz20tJ6|X5wy3W_n8V4JJ9Wors}d6)2tswPzcZsjuFREpyCj=?qVp4_}q=x z8rZ$1nZ|==an$Uoe0c73jvhae23b!@B&rpj-C0*!5fh?=kdlrnMmWMXD{-DklS`%e zz*qN)7>ODfnyVeRwgk;mZTI}@f!*SPCROVF8|>B@FS-(k=H`f z?S~LYjLX)Mag!9n(9F7o5yCMHYqPZLXpNSFgbPc1dYLhznYM;3K@j1(<_P7XUV zQ3)Ypl$BAIP6B1hOr(-#?;c@|pfoN5t#pM%DkCVICADB;z;4(7-vfjbqSYy*KTFm_HINXxd+T; zPoKZW2^5(?gClWbjUR=m-hpyJ7rtM*dEvrGo)JQD!wtW91+Kel)vCV}H)>y=d+s?V zPo7eD#~rs#srcX2XSm|qpXMXS?1vwusLwW=21b?T#f_!|0$evi(#sldBS!qlxHuLl z1qH&$N9%~B2ggikXTju=4EgZnjvYL_ZVR`qTF->~97m2H$=vo9nlp8zoeZHW+0NKC z%8RzBHx0CPA=I)4ohh&V>0y%8|HF+|vl(E`oDjy}O@Pv|Q7DYyp%>Q?Dp@r+LBGi{ z-|hrN`}?R`U}mxznwy&6DFEK+;~W3+buRnb$tGJ7vVYR*%KipncUjKg6UIu|I8W8YaL12&EZFq zqBa6LLQAxch$xXDB8Yu@@|)cd9@g*dWou^-g+h_A7*N-kWzNKL{O<9^W}fVt z3egpcgyZ08WBTKvZ4NbJH_9==I7S$c5dnVabHc&<@XJqMgb+EDj;)=q2BjzlJ}5D;oD zZQHupvS}-&?g0p+*Ifq>yDj1(+UB{^&TbaJu$sldZ&Ds!doz3OHH}&Gr*P;&`x3Y1 znBURHq=p=W`I2FVOJxmvtevNwqZ{>QZQq;WHUx2rzWfeD478kp3J-Tr`t_BXT_GHY zT&kJ=QYZbf;@#s$F|MVFO?`t#L`p{yVrd0@!fwyV^dwKyQjy9)hJET4;bp|Aq;&W#Ibg}!ou+7=am9F zhX(n#AKk#td><*9pegN<&1CV?E_LZNsbqr2l*fpMda|hm>4Zl^Dv9e^yWxaOI_=^J z2Uj|VaOr^KNE~T|SK>HE3yq2)Mu93&@`n(@K{^Q>$HmiGgyU4!6Qs3gHU2@;$N|TS zZ{6_+DCW8F_yefRxC|5mgfQbK*Q&w&aM7~LIWUE~FQe zN)*=9kZd&XOT|_dR999#RawcgY?qD16A3&C87ECH*@9LPQRL&tMM`mzd{9D*h{H#> zbIkY-x(Y=WZS7*ou5KP!yM^XdiaBjf%pcXvg!+0SVoIS^*(0*!HDR1aE7Q;#Y3|(w ztARWJyOQZyaSfNCWqa;!(l+1$@GC0`Jqf1x+U-r&B%&w~H z|DV0jIk!&Blw^`g?<9mkfKU>uG(|cnC@OZbU=$G)5fSkPc?A^93#izTCLIh_qy|VJ zmGn$9nM|g)Tjt(-%HF>}_PKX%LO{Xyr|9c>o;=TF%Dv~Fv(H{@eb;w=zdW^KBP-T# zrKhcvzSd6Mfebo5WGXu?z_yY5O-I#KA*(78mca1?V#18IL&MMz35Ie;kN#~kUW)8nEkYN)Fk^qyXDaXEwREzwrIVG9Jto?}iql24rbKK2?vifk%t1Y9tB-Ig@Hcr&`LLTKOc7D7HduAgNf+d*wr6GDZM zV(29I#!sS4W+7-u#Hz`;`LG=d$>A$2jhXe7^n!702BoR#9RH% zFzSRGphwri$Pv)hFEpAz-gEc8K*OR%i@4#28%lq=&)$1qvvK|A(?Lzd_X&pb;8^7H zd5TiEN}C5>hjUTJ07vuM<}EzgyoEwM4k~SuKdm7jP+y(I)&YYLS1z=meL4Z zlyGq=V3WjAmBuhg=rZ)i$C6Q=-?W*hUVfSV=FH-xdDF?}Jw!-;b%mxP;;^{6jny69 z;Mhge1w*Kn-kz&}A<%(BxXQH4v>?zvZpP^QYakYjGH3Se#L{KU-ZjA=;EKz?1HkGP zD?gFT=3+(8(_tTZA74J_I7CoIB35mrmUUS*U4+|35Vpt4r+jp%T_p$zu#`Xx3)_hi ziNvW0uTR0xl5&rna5eTa+IV(r&iiqEy&7k(2;2QxTEr&;;%@j*OB;xS=+7`C;^&3R4h&Jsa=lu?W z0L`#3f>)yGh*%^_O?9>UPXh2a9!*V6EMB~r(@#JBo(CR$;Qg-aM~W0aos1i%|Jac* zZ8SO_3E>v8%Raj+8BC)G(&kIIK-7WHEtt>O7al=Le#1~hWL!ufjhbX8lYqz#= z+f%P_&yv;j?$`l4d(eGZ=u3x$z4FClR)Six1`;+TtFanKkQm=UEM{S8jkU{&Ubyju zi`x8kD$?KJUdjH%P6iKeklLye7%H&s?vK6>MgH$DM4=6poR zFBtwDXP$LdMMG`f$G2_Yer5CK&GF`KTkyPqU06E`yuJZC`Ud#@s?FTm;$Mn?z2Cn3aL1kZbOA=L&JAEF2h|A*en4?TU+MsbWs=Y0 z?T|LlH*cjdvKm=kfeMUv1VKQ;j`Gk)j%9=sBky`>ELwVdS=-sey3RhbDk}Et>giq-DD#}vO&`Yv=buJptcFCa z7W@DuWhkXf31%O*^A6jlT9tWll&0uI>VzVY;j@Fl!Y1KV5sy@(0+;@w4)SgaAti~3 z&Ad@{96Y9hl<)Jz=AB&g!Wy)_hEMG?gX1QRMQTkZkVd{+8csmbJ#^DhPC7@UeDI9ZM*ilu+ZR3f;6tYezS1QUcS9}gI~AHnA;ynHI}QZ?@P;Wv z=BE;6!7RM7u8XZTv&W3&yGI<#Nz><%RTi%Ag^R^PO0#sNRP^O~d3Mzb?s#%34?X`X z?C662K}2`DG#XdV1{FeLO98e(xjsR@0Qmx{FN@o{lfG9WF|koM%$g{ingkFS`*F(j zR)j`}n_b=uaNQi~!T`3YF>|-lKxImU6b`oXsEI@j8B3P&W+gZ@HcmXJ=aaDKmkJM+Iz(J zzH|-u{qA8dzWkFMe9&B^tq}zgraNYqzesG9p~*~fL)SPIyfpopc50HNO@}%({}^5l zqGYvfNr{Jt)RIUffs>D*q-I8KHI0cR&8dv(5o#N>|IQGAu(~dp1KEy2qP(EYMGbbH zFevLQmRIT3mB@w>sO|v)=!?Jg^_zj|#aCFq!dSf~6G@pJ%4$>~=uSaX13l?MvO&Ql zPN8&iNvTjl;0CN}YXiqY`2kWpDD8vmbLo-$Gr6*o-a?*4%m}#5oiK{|lSdP=Y*K+o z-sQrG$N&H!07*naR8{QE!(96yR1>ufdW0_Z+jS_nYl{dCRg=i(`bZD;;8Va88aMEX0%y-2&sno3 z@!s}v^HI6mTRMx< zd=o?>4l6fqWy!i0Y{xdmle7TO7-zkse!v?G42?jzehC!l=TVE@k;^%Q*Oug`a=;Pmg`Rx3_n8@#^Ym493|rT08hU&E3yE$4&P?#$zv1-ETzQh{Ld+fp zE0olrY#elDx>wGPe9S;*USvtB0vWPhWre!SHSc02qaNQBXO8mm1I(V zHO+%*P!b{DAxl`7)CWRdf<)VL9u{Cp&7=y4nbl1=(;aduAnW?{ z7hJXvrrD9rvuz;D*8V{{b3^obif!7XDjs1{V=c2QlI-13k8oW+cjIkrZ|$J1zn>|i zMj9#KaHFk=#JTy2d+8hO<5S0y(x!$GnE)s4_s-uBVMXZL1jL|c+-MBG^_ou($ zV59{M`M*d;}zO>S-Nox%kF;; zx_c2`P+|{4_9{H})Z;6K5W$Yl4(K$eF>%VI`-E1>Ll!Q~ zeB|s8HE-L|8oBGPyJl>A_>npJmp0yPA*i3-NZ^K!WwKz%PRc?Guq`MAJ}<9X&;B#_ z3YodP_Q(W+k%^dLQ@a5XDQQn<`RWrd^1_aG)W8s8M-O`K))IMs{P^)QlgXT6SyubP z!w&6kxo!LAZQEMewyl-Q%1SQ2_+q~Gt#1MFX2JiR9L3iJxbn&?xa_jaS-kj>yMene zyy$Bquem!lB&u$8h9 zC{!plY;KU**wVQk5>^E`apIPZEd!Lw(3KfvMaNDy^!2czdytO2M_)FB5`yYTl<6ZX zId1A$7L0A+*^MoDPH{f?omBt3*Aym*V;S(Y=w4>ZO=+xTxAeoT2?)zZD?fBgENT)c z7&QXDHHt_L5%_-X%dae10PKMR~ zT4)+#4h_)}9AHV5GWW;xe0uU8ow+=1sWcn=Q>^dqw=@3{T1I_mI5KnF0IV|S1%jT;~6VlqVhiZY^L1cM;vwZ(Ti5DT=}lqxM$3mAvSE-px3W^{pwN&x~7uPoPQdVM^vFi zBGl|tAyTQ|avAS2P?f1{?*8-g{}!*O)*8o&Qk@t@UuH)c(a^{QXI*nYr`J_8t+twe zH_!6+K5kpJf!~QuoIQIgM~od!PI(Nu${3Al)2|OiIOS!T{*ewnPqY@hl4u!rpVT@a z5sUE3mK{9y+Gea+v~1!=?AF44n~!%$eYqiZ*9 zTHpKXvRCx*Rg*%Gsm0oNFTV4s)A;OhhvND!)9PwCZsKVEXZhQrPUq*3CYjCV8PCxn}?)&Avbhmew z`#gyQ4?IXLUHY;}#1rCx1Lo-szxfS+{__(EA^7T|3%TwFgLY4yK8uQ^tWDs$+T@@@<5<2~%z+>x1>L;^xLyHm zhs8U?qb@?jxavw0ktp3mIaYLcbMF05u(59dgbmF*(HplRvqLD*@mO5gGV-~;zP@__ zZoBOcjz9ib9((Kw0MhC7E`j?0*Kyfp!vZObzH%W~Tyc39(3MVaKM0_XIp2_KRDn+&OS=qURzqGXS z(54nvbao?cn+n@vOjVR=RW(c-JI2T-BWO!yx%}Bzv9Jj&s|?}``2cUb1E9*e6(-Qz zR!M5vjH)VwRMl0$s%A)K(Fe?cNF42ZAhp>91Br;lV9ZE#Y8z-xLqq+QUja(U)-b2*>dw6eU+$B@2tB`DG zRtIS`*kavRsqzpMz%?qnoX<4Xuxh(KMGy&LW@42j6vyxkG{#o_s&j0erCm#RP#@^nZ;W2L~f;DqI z2cNKz?|sE`P7D^kHDdS5oLcM&8`IBcc=kSC0^U7v~_OUHT*p@tC>C%^9 zJ?Nl=#mg_hq+fr1^)8>O82kY?Z`@S+`qWcT<^KEcXH4U`acf^+y?smbHU-G!*lO&g z#FjbY2~B_A#u6G=n+Zp$1%9BYuB^bZBB4*Z>30_aQKV#CMI}`gNmg|BaO$0pv$HR4 z=I=MQA-1)lcl4CxOD)^Fsd?MxnD2hC=3bsght8mNv}frykIV6TuSG?VR>g4IWGu- z7y0)0hg}L!T_Q_jTOsUhnUE=s5R;M?G}R)S+t7bmj+i|e#x#@^^$;eBWo!d9?*KQT zqrHPzG`2Ue4B*EFyV5XCEutTG(gY1Om%K2C76p6;jfb zN#jX@=LVplsk(|U95@T5mGOHJ3Xgn<1_WVuLLjA)Sq(z8!nC76SQ1DQcPh=;WqZ1Vc@L0+QOO9$?LC9rA6~*=R;^{oGr~eKJ3?z;JGVaZ6w{|n z56fnG!C&d$1eEs|kr9Fpx3iOl_6!m6U>XAqRbfr5iY5 z{CLr_efzs=;d3g@{{k3U$EVLej+%-H`GSK}9AOm(jX=k5!ShYVd``(g6hxBa=0Zs|*#*q*0Ixv?8y4d^cBu26ZSKpb%Kf z4mqNsJ*q**2((Yck;G*JNbs2tp2%~*y%(?F#|u36-T&ZE&YyqK@}K_XM{jGK7Um{3*C=$Zt}cXpe_pNK$P7wqUlZ`u(m38Kc08!xwSZ&@USCvSi7bqZ-G)*Ru4VcDA*dDBs;j`lZ$UU~q^(KC_h5jyr@8AGt3hV^Put$%erc zYrA{cnaL6$X-Xtmbih80t4=VsY6MZc3fqnW4oVBM9_Vnwz!)S|GU!SIKg(&;$8yb* zB-{G?dB-9^yCeZ+WHU>a5ejuU{%OW2MO`(zr4u|4ykEziI3yq+;*hV1X}zoVudq|TUvQ==?c!AHy=r))FL&) zK_(!mVjov2zPVsuCRA3DD&#?i!qD152#M6XM8_&=El6ql%c>|c95S)BLTXA*f0nSZ zEgP_i*cD_7X?$G(X(3fWf5Br~V?84pMzDJ8R@U#_$pMolAcf?Xr=KO$Gr-3`a2(YY z5mH${d?yPXD5??>e!Ajy`Ug@F|118kMdq#V!G;~^#u12-^=Ln=FqNi|%OUzQr4H}> z0}sCQ-If4+@2V>=jz(j%a=9E>lF{>K@ZN)Gk;xaRu;K{enD(ajL0AY?w95V83;cVU z(JzvkEg1_HIE(y>qCpSC6}!+zWl>79o<`zx?4%|RZE9r6jt(B#+zJAYoG_aGMvcH% z5;riDEV|q{qHMB5Xe*RKw+Q@zJ6>2t)^m-RRe54qrV#kf5`yA`B!}g~J-teEuBnzu{ue zKYoE3ky8=I)J&u<*+?vwpgI~Q9*dHU#c*VVyjG+=pFz)M$Ssib+)ykh{9xgNEB5|| zdDbdqmIm0iO~*hxr(OPi&iej$x#r$K5UGhV^5FeS=ibt?<@|>qy6v5O%_0^g$EIA~{#41X3Wfa2hJZJ3hwNKP1|X1>*e}i+{b6{d79>Qjt4h2(=s^7J`Htze9m5cVcu-c zoHdbI4K*YqHbcGyQGp5^e5D9bh6Sxn;8G#0DCtzP@WqK27*Yv)n8NEPSGHivE z?eVH?a#WR(#6l}+sdqK;(ORRl#@9X)Njy>$YPB0KhYkewRZ*rjje=~BM_yft6cO47 z2f6>*=V_WShLh({C7W|mA_z4nG>#?d$PV%A@?qha;tp%`q;2&1(6T4k{5t{LU4i!X=aheV}HrDVnrj4b!6pF(pjOH`*rgOsN zu{^S6J6AlvlAW0$Dq|K_NTAlDXjNYJn!+R;QYxA|`*~``CgX~#cIPqZzxg>9yI-54 z--whY<1Dl`)qe;_NK2+>&YHF1-M-)cLlA&hUU^v`a>#=1S6p%BxLvM%!lL591Nq7q z&*Y0I9!5}56kLz`$|h1-j~CZ(p|h`#u2h!1n`gqPQB*n+8tZBqRaZ@QA{l0op$ux6 zh*_mcaKi+*ghFX6gc`z1McPCNcyi4;{(Q${c$>HLN82)+ZEZ#A6uUaRsjIJhTZvLC zm0`q)s$;U*^hH`3b&9&ZM?-a->9rY-nVDiJ5Ja#zdfE_6+9TxMBymfT%jP-vgku=n zFcv=uQ4Vc_QIR}mg^pP#Pae-LudYG39=f#~Uf&d2ml{n>&-13d_`Tv z(9><$l(i#AZJ07?Y@-U?RV!XwF%p3GE~tp2CQV}L;^+9w-c$I@etVJk13cy8Yg0|D z0DKW3(PZ=8__{zthfJD^P?A83l2?MSBtf8#V1doI-X=OlMS;AGtm%tBtKieje%4FVn$S^I2BOb ztOX(2FO)qdUx2pIoiWJ6rk#kr#-VM8Le@q1rAkn4ZEY<}UU@11Zh1ZqU3ds05OcS; zZoj&9#||y9L~?Q?#~-ve5`im1M^IsA_rXRekK%;%F0=L+k(|FSxBFMPE?Smex7eR| zl^YT*i+0pHw3nu2|E-FSqs2r^8b?XLsHi6dlWHpX_M!W+w4#N{P&U8mM>qcXxgY=J#{VDyYd5T`+p=+E1tsxGkag9JKl?=P`T5tm z@RXy-=ksVGiCH6f;DzP<@!2J0b9wfkI*pIMX91sk|M46}oiL5`{%k{X`36c4HCH?`HVZQ!n7Pw3)x~17tP_t=+p^n7RAR9sFBA>*v1sC6XYf zOq%k5>$-pzi4jRg%pObJ(VRTjM~Yf3stI(0`nb(OV*}EGB9%*V;(|l?z%hrT{b=Zi zZESu6{)yDpMBN`3i*7Vf5qdmM;_*9 zKlz`|1Lw~F(8P(84YNjR*s>G)dyxgfpB`JnfbUUI8l^3yGR84Vgz`aJAcRA{Fhq8! z4@+9RW%FSb6#Cwa5U?CwQL(Gjm;PUB8tS)(rbTVFNfLI4tk<`|YwM9Y7oh}d{K%3C zdTVQo{>G)3Pkj8b#az~W6Wdyh=EJO6vo>3nbkPBH^mEsv&+`1H4J0CQEM4@|()h|} zFq`7i!}iCvMHq}RWYW-A!uhhwkY)Qeb!+@ zBEv#c3RC?TT*P1+v0^KzJi4V59Rw7758X9T+Dc~3n7Q$YBaZr~tGRvnBj*C};`2-B z>gze6t-T}c3M!iBPGSFPV~yuYAVNVO5u%EISRm;VQ(cFsVo{e%h_}DQwGJhPwG1g2 zMKUh<+N0p6u`DN)xiHDFC^|waRg&v9WWM4)E=tKk>3LLwY(8M#=mxGlay}!X5pG_w zj#XW~cuM04VSqJl8G@nKL@k?^-hS?QZW*=}iXQETfV?SZXSYngxW>)ZlEaC75g8MN zo*7|c8IlZhxuJd`MD|l;wn9CqIz74aB> z=Ob`PMn`e`Gq2E8ThEtHK9Tnwa3B*#k0Kt6lXT+LB&(S^rioeOCsA8f6)MBMb)QD) zBI*=s1Q7bf3yU57ooskSfX)GK9Es5KL&(4?*n|8p)?WV73o}Zn)eO>$Cara$q{0kqaoOCL;+t1kb&vi<>@_8!#Iwdl4EsI7+Ds*-5xefQq=5Wtm_ zKg(rXZW;}+cJ11qO`0&d571WB1C^RA44B2_>kA)`j0UJePog8KY~dPbN?~k6WL8foIpPLB0q%M z*@u_PLf>HNQ!ZKZ;>Yf|;}70H^Eqg2Y~;4z{hse!dBxEJ=j!xe>K7{T!&|61{Ghos zR3yxVQ*ka{TG-en$?)N2DG*q@sCT}z%Dw&a6%T2>F&OC%G(g- z$kFh58EN;xQsfIRg&^SA$xVD@)?`w-fJe8svc7i!3yCAmxS=HkPSoc5`=4VVohM@3 z;cKgR==oD*wv_#~3JJV2e9(*J(wrA&Qj&NqDgeIsz3>0uP5`dC<{C~s@kD<2+u#0v z#E9C16UhoQzmfN7e)w5FcEL5gwzZvD)FN9LB$XLrXMZ=Zw{2%fPdht%yV$&ACl9{# zGCzLcet!DkpIFghZ@K?>@^7)R?$A=t819MaNkgv#axP}rY7;;cv9X(q|j;#Mzj{iLH(ES{K)REkM=UtDFY#cSkwryDqXuQ6SjB;80 z+)Dhw51GcHJTq3fK^bu(i2aYprA9F5g#t&67?# zV-7{O-nMquuHMAuciv6Zj)xnU$E1cjj+@*VwwnC#TrI#tY0ucY;*?cGVHo)vAY-wI zWJ`w@tV%25b_I?dH5ID_lwwRxCH3`{5RY)nlh4wX8sy~tXOMFh5H>qobpg?i~Ap<2e76h2-48RH8zXaeL{{ZpZa=NMV)a z!uQnwHUanTO$Zj(NJ&ITgs)*aWD5gia($)1Se#-i_GinVyWKemyZ=mS;{_lHQCtmq z4-%0GM~rXexCu?9b3PAm+0LMw#}ZH(bNKU$4cxbM1BqC~AX;HUq~B&TKP(w}zZ(Dm zAOJ~3K~yOoKEYatC88oCEu@sg_TE~RxqT|CDwF>bd+a}?1@Ootj~L?0hV?JUqLKGT zA`w%X`-;tvJjdBz{yt0AZ6g^|eC@3F(^y;2JXDg42U2I#69=@@u-tdJo#_>yxUt_DvMv&&lrR62JAH|N_}Mn$BtrKNu(7+ zS_z_7lBgYHMneV3Xa!LnB?zH3trVGDJF!R=;Fun)CCLo+5@@6FR##I+Ob$QRl${9C3jj`SpI=~KNePy)P1Z_P$_bf!H8uwQ&OgR^z z2>l8$Er<}}jXTwbN2q)df~sVU>5UDbA)U@Jsj-@Ija4YEP{InyZJL;E@t4+4mUs3b zq#Z)hMd!b8b1Ui=sBi)!=fObE+=xuh2rw1H;nohL{+UXbVBCgLBRO!vq5l;4KUryf z?@=u+Eq4zL4#q1`DJT!@OuQlM8lw9}H3x7!0Kjq+(ZTx?03oR=asv@;xa4c!~H*u%K}8>a_$PY8rC zlHZ1?t58xAXdjJFfW%b+jx9NOd>x049m9(DJ~F-{n=f$VLrcuWiWH_*fkX%1I~aj1 zI=5J5Xn^Se#GS}68h~%OLV34@vFv-mJpG>pV7H^DriQ-0zDMn-bG~Cm!h%54`_xiS z|HP&I;<0BLaJxBr&R$%8&WHK#M?b_h=Y52qeCdl^eAd}4oHYw6A@3E8^SIcxx3fE> zrHa-N(ju=0=}EWJKh%k^3fPW71~%{6dkzafbVBKN5A^lZ)HvqX0B3*jL%Y1*LytW8 z*L!v6oPAeufk$eqh}6WfwB*1kNgO+Z6b@2KB9@IUZIrZ;PMi@@K`x)gS3VLOtu^UF zCvm$1X~m4iv9QSIyYW=s3}Xqj7p>*vi5~PTmWjjME>?wp#(_|OPQJ=Wm#5nmueE)5RuY-{_%tXX@-pMLu3XXeb^=h&vEvAu+(dpyrnu>>NQ&C%Z8Iq~j0 ze;@hz?60ez@BQ_gPQUR>0${_Yjknq|+`!hhGPJdYA3ypuB80>hkaK;6uuN4K8sd1; z!?7!fT8VJ&3FEaAl>OLbfh;kROq7+6hH_pQRIII;WS1$L_f@Z z(R#Q8uJvxoU9r#-5--RyklH~Y{1AN&LIkcn^6NeP|BXo_WgGyh1yTuw0x6wvUsokT zC)b6lh~${bO;p(q_bpk&>Xr`Tj%C(KsHiEW{k9Q+(ppw!Z9S!l*bWgpe7)jF3RIW? zXoSE&_>e=c|4#z2+c7XOKs=dXD4qSEL^A%ts_IHnEWLwOTlm`NzQ>oZ{ROLct|MTG zyz7xG6v(NYp@($w+Or$$xU}cWa6<@*Ky7`!oOkt&eCH3h@#KnE=+AZH z;Bdvq&w`ngO3VJa=bt<6;;&uu;XCg9!`uFhPyOYYeTt_QtE)r{o3XVvlNueP{cl6W z0?P`&mJ%s!qK=^8<_L5Fv?N>T0wmE$l^LxPf=rgV>SU%~YiCT=SfRv3Up2xl8+N1%gngV81EbGQ;Q z?V&(xDxy)Mk;vaq{wv!#1ffiIagFW)a}^q>tSHT&x3_n&Wy@AQdFm8aEnoTMr$70z z_agaREE*FSYn##$jYU88gKMv!4shrd7jo~HZqz4!^xUttG&euxtDq>EiEi!Uj^|%w z$>vRHpuWl`Jybv|5i;?M61j>Bs~REA^HXFx54)dggjS)Kyc)iqx~LHVmK0P(6GR*v zX@hM^l931z+X@-r3fqcd+i_I*Kr1voskE`+6_SIdjU~_;p)EWe5Qu=vsKb35T3FN8 ziEu(bgVd$-DjLWXH)t&_B3YNnVBYw{yRLEe+@%~vlPf^)pyAnAl7@!*1i+JzKK2h= z=T~0wT>wUn9JRlVy=v?B7E0m;$vE>rax6Fh{tC`~&jNHl!pO>z?AJJk{Tu6;Q&)v! zNjCPUc)WQh_ibunS!W-fuZT;ZT)vIobPIi%HnLs{B|u__Ntxk(nEM#^;}M|Bc^pgJBMMm}_4nE!dVqyngv4zBq2cmMS9 zPoDRm1Yq|gmmQ+2s*1tE!Mhsj8|IH0GiJDH*WSb3Klm;0`@$96@#51YBNnzL2|@x% z(O9iG@>kTlE-^LBNF-W=3}iU^XFRVxt$20GDt`F=U-6*}ujZ(WujYbZ|B|R9Iro#N zLDVUgd^g_w^UDBEIN^l1_4zv6+x_Be#6~2@doX8G9LEM}3v4GqIstaX!?HBewy}i5 z5{7~7sw_i=E#r4%dlzP z-rm8|Wv`|WK6C*uUj9Rlx#rS~mdO0IJL?l#fD}@|)Ny?BYiIMh_a4B1-TNScZzB}s zJQp9&h){)!ZH|nSOxB{16ze#I2yLj#j9`QqhLxq^5CjCoqYkl1j9dQvB!^yh1v4)A z8v9>zIhWpfH<^3^$8kWLKB_Gwmi7=5QW=-$Uf+iD1+%A&Vd2b)1c5>e)6%hpBwcX% z?`3O@u7VW1x>$#VLbCyw9<2-lD!YaZEG#stZxGCMjIJF~Cr&x#l=IQM2+9+UCOG`? zqx^s5+Wzj9S8>_p-{y?d&zRiV)w$I7{HhX}VazDr_tg*ai~ssO`;VVV!WvC&atzh+ zF;peSQC~Tkrs^@wtgGeFraDfXJemWV>ew-uHkv5T?S~>hf};7ZCY9|7`89T^SrR%0mSFwz%74$W(QsZY zb|VCe($CGB3k|x$_fSG0@JL1@-0|#k*0*+rf>VSot>ISH+in5uB6MWFPC8K%RwPVd z!&zdXO#%?g{zhz*1l{_}U;ifo*wc|pnIN@g%a*0bAAkG__+R}@ixw@~C0+>IMkZqjDVQ_P zBG3ZMQV83{iTX&}$BHO~9bj1wZm5BfbF<`vEb&Mcwv3>ZMr)sJzR!56YuhMlNo5K( zN0WC|S=dqhyC3I&;q!MC=Q>4y2Kt7$>zU;^LK|)Ra5kAxiA;z6z#!b--YnY}rEZ@b zUI&7A<_1{okCx_*6~b4gnfW)}a2y+5l`P%OPk;JTU%l?S8~FWg!=B>n*R6l>h38*t ztgNYCWtlN5p|#d?=IpcWr59h|{9pcb*5)5gtw|F^es{8iV`pBluHf<%d4{v7eUT?V+Je^F8<6{pC|nJ^dfDrX!IE-@fcpzH;H$M%{DoJzL6# zMueC>h4+8)bgui-8H}tRPi3qTOV}a#Tww{Dn4P35KAKV0GpVhdKq6K_Q!K$5drjmU zhwROqx*C49auc6_^f~^xVLN$00Fft^ZKb<^BZEV21VMl!jnIw=t(1e%lijQhF{}Wk zL0cB7p-ysM3QAr8MYMq3`uydIz%D!G9@}ig2{Oa{k>dBXE?Gqj0;174ueWw^^JB}1 zL?gQ;)eNISZ@Y6R!vf4y|3V0=V{zj&T8y4LBpv5+rFWb#VS@Nq*-Pa=^UY5=eik7^5P$G=!eedmya$cxINOGO%%VrN*mbM~ zqxvV5G7|$zk=G2@e^MX|KB8-o;MFy>-}x9c?=*9%67snmPd@eZ#Ls`>f~psufA+6_ zmK$!k!Ss@)A-`EV~cK&LAuoOBRrpAXD%e%6lQJR1l3M zjc$Jf(00RrZLy1G~`O(Ez1N-tuo*a3}>K z0SwTaH*dLi_uu>Kg%>ep%J|Ooz~J1;Q>Q#sTUQ4lRKGCS?8QZA9z`lwAYw_bKKFQj{OE(cuxTs4HWSWLD75yGLgJ|$-Kni~rqG0yljU4i|%joFo;iVs4&#G&$V$*e3bJN$p zz>I0rSoX>?&imOdSkfjR7|zz-FE-I-i~c+E}XmHzAZx7 z0?@Izq1N7i|God;*YxDclW|>_Xe>JA`XByx2S|lR=x7A?o52S@aSA{B>?zbHMpGH7 zC(s@mKiny02+8}ULC%a4zp&leBan{9&`zWMBH-0;de zUTyCu>*pzWJ#=L@(35TzsVSh1~r3 z3lxikOitJdQ#kd2hxV9r34DJCB<=f z-+kBYzxDI{*AM<{VJsG@17j|f7m}K!MLbsYj0&)Xhp@6pnM0yN@>M|pkfL`W8_Ha2 zJm2&yGx;8Toj2-UT4P}$Erl->i*EQmw_SO&VKfVr33;6R@0G8bYych_orzd%+OF<&C&Z#;;TQuopfH)Uogq1C5*pD#BxYD4lx-a(0MZX9=fxw zbf=r?Ol_lUXb0(B7dbae5O@f{v2B`rx;gJhKf(1}?)%n7>_2`yLtdU(G|I;o9>znL zT*ToE7x2V0FYv3UpCu;qXsxk36(%K*Z{A7s;9!}R z>+XSn7#*~fqHZ7`QU^f?KJ*NL>!Lx_)z$g$d++-^fM=h5wGb$O|H|r$?SMG)up_ho zs5RZ(+|1M|Q)k5Yg`cf8Xb*Uf%@U#a? zVOtR@6ZOUbPoHDtmDzG+xg0$mvZB48|h3B5t9Wng*JKy zw=!7hB=8EulD9?iAS9W5AL*fvaLliK5$m@I@a5IMev^dYjnC)qZ2^HmivSxzEb8!! zM_*x8^G+(_kzFABznj7na)X4@2pdKul4cJMO^=L-m@=oIDtSlnp7$Jc@_!P5zwx;0 zs;dB)z1QBnw&KAtY9R!wvzJ$X`v@0&_yQK3_j!KyjU|EbB zyTV7xC>Q_iF7CPRcZhTrfo)_1(8mL}{kyjSjy?8R9(?e@-;AiOGZ)Ksp}(J}S8c(| z`34#kBD8%iN%FrX6lms-4arFf`M+kJS|YCu8R>z{G6sT;n1DS zvwUX{FYWB(#T{KN@91Z3{~&96`bfEoq#Y+_*;uy15+1Ibp>L>-&QuHSgB$6}Y$9Li z;o{%l&bF3zZe6s9{U%N&UC0px5codXg3H8_4gB)+pP;^JG(WumLE1BYSe76evswJ= zdOBLVIroTtnK8PCg71dY=B7J66a?JAej9-jys50a7{26nsRFSg>tBQCy3o~My3T!l z0}uUa@t+@2w@pCnGBkLc^X0z2{gn_B!IOT)K z^38LOLHU|QqycRi;+w6FypK_1EapK0S_D9VqYQFrB*e`&AF<-pRE(rLF^*((JoS|| z95$|jZ!XxM%MRU_o@|Z}-~Sw6cx(yV(ixIbO+MF6cWNX5kG=Db)1#{Q|NESodD`}# zWRq-q=mZja3pFuFlcIpq6cNR8uU#pEf}&Wi0)iCjRRtowm_}%+gcQ>IZnD|->^^;F z&iVau=9y!l~N6&*<8YApv+ zX0_hwrtIAQ7dw5ee=;C;u?Y_x3xt>*%VGYyt=vCjA!Sh~DCqQnPTxP00~GfWtu^Ik z3F3|&GH1XFJcu+RQ-EAHJo9gT_uFf)`0`hFCjcMjShiv*0Lxb_%&c9z_K5rMec-^d zvWkL`0R&Si+>RcWKm06TIsH<`o_-G3J^V+ubabGFAmTU!WhAvm1{txh1;UOnxMCQ$ zedEjg<Fy?<(s2^rt@!TkiFZ4ehS>@)kyf z##7qZ5c?KNS$MugcnOqS3%VXD8?j|MT2>>RM&j`}I#^hqpQqrag4SCgeTtww9^t1C zJk29NzXy^jG!|NT0=OJ_@&EVD|LW&|Ee`w7X#gC0$iaUJBgVEK)~(;l)}Exni4;*I z0lHX9iBdkk@&a_S!IM~0Vo8G|5n3aqB$dlS-V4Ng^oQ>P=z&?KQJ^aX2>FtWG+KgT1d-B2@l80^WdDBJoVBnK0W0i4%?%g&c2N(@&+s>L0O7?p}?5N7Owit z*=%gxLThIyamyl8C~)hG3uqi%!+FO}Ag4T}vhjsR;1jn6GuLfrUR#IZccV?k+n>4? zba;fYNMs9Cr#;*t!gNPNo=%ztFD zIbg;p3Z#fo=2X#CHio*YF+`jMEtM7Ac>F;;eD*QeQt-(~UgVoE&u2?I2eu^VrD*Tj zKxf|u`Z8@K)2(I`6dsl`ju1W=uwXyOWfdr`(W=ON3G9`mfOHN#qaxDW+zi0Y zx8Cxxh^O}dwG&#sdNtqs&iDD;g`Zsn#11~>kefDb+<3|M?b~X?5l}iS+Mb=uH80NP z7kiK6_~Q;|>T$<#&^~)Htf7|Lvhu*$%V?IP4E@W~K3?A8v;z-k!abw-#eIL~!CM}t zcjd-@Gb)HiqZ~7Na^Jc&Yad>{W_4s}^RTU}SFPG*N%+Vkk6d%iF~__;Yu2pCuekiH zOMo4~AbbUR57*Zyr30-9o4f+cjxub_XNWp=Ccr75Ur&gdGw=+mR8ll;F?1{2vWVCY zKY92WZod9@=uQScU%qY`K61v!jq7jY-{YtNau;8CQQ?pG-t$AtvOeYeO4HRXIy-t; zwYh`FstWoFMwdI|d8AyAzJiCV6xq$K0eb{uPJ);np}D+_!43;L;AW#NWBb*5M`S9g_{NwAn>Z+1$ax4-hSI85IL_WP{ z-P%Vo>9oR;QpckZjZ(J9D8`H*&Q)g}&)DV$PQCUnHtt9oK}>DDFjlm6A<)!SRpO&? zeLp;%Ar*0k$ufk{xLyTXXwn6rExkFCxg6`e`$+jdRZfJem_tJ%!VOQ%q@l5nFP=Dw zj#MYJmabuIcb1d(AIIp%!Ps_;s1>IihrNdmMOik!mXyb%{MU<%*tTgKmz;hSBO0m$ zK($GZBGM-9`P?*bsbPND{ku6bkhS&03vU%%>U+T#8Y@u$bn~7O`AKC0;YZQ?hg)yI zZt@Ao47hDK{N#Fs5Zv&S>-oWzKm3<2R5!F z3l;GiW2mD`^Y5bMEV@L`4EvYL8sLi}0^=#Eb%5On8ckM$SlLKiKTmJIgP{qFU!Qm| zmrNMTZHwOJ!Y5~O;Gi1L+jlGnHr1oa(3$B)3M()i(rBp=+C~ax7+N|=&P0D&pV~!3 zZC5Rv{;9C+XPYfbBZlDp#-b4(d}#@KWfWcQgcO2CF*SbO#jUq}(i~#Lx zuq?{!tIRd`gX@R@>7$jAwAMY{;VX?CH7d7t>&Hid-TJ?HQm@W^HT-<*)~zpIblzuY zzqN4wa|cY=|D0{x+KbBS8YM(wdnYU3Sj;oezRWW(yuu6f7O-IRCc3gY?1V!s5}_(u zLBx&|wIf7r3x%X6R>_ou4q)QZ`?58cWy8|-#&aEk=Xtbm+vY{=$nDAAOdYUgsf8Ng-0AZ!bo>KWY<=im_*1;4neER^qK$r#o3dms=v zP83T>q%dnt3K6i9R3Kd}iAHU1n*K7sy!Lk3xQ)O-LmfErAbIAePW!~1IdeMy4XS^x zoBAL5Sr5M8pL*kk$hN{L-}f&~_VfSI>a5D zxErp^vh`ef)^Xf7V-eG5ETE~OmQNkDCwbQ+8nO7*)34Ls(aUE~IDlcbmH0}9rYu?; zFr=$|VooKFU5*er8sZU#R+cfUrjn7>71YEc2uE`NoTa=me{sPqQ>zrOqz7SNho^4`oRo8mA z-hS)1zjFB%%$xsKcx_+#+usKK`>#B*nH+oVyXWuMuiG#Q5W;a_?@@g3@=tQ|q`gUH zGgQPIDUa2d&8TQ=E=nzKLYkY{_1?Ox{~s_8(@4uE;Z!uQH~0VmAOJ~3K~!KlWq7`% zI%aWVOB06+5euH1Ow2i9qpZRWJyxO2nDBYBN{f`#hF3YKAHhJnnCMT+;Chq40dAa+U0A&pvPK4Y(4ZmbZ{50O+3p13pLBfc)YG{4 zp$E4BD<(}m@V^c_`k2QueSN2Qc6XJR?xPUoUHZ0luzBe!7QFO2&p!1$_dN0x_r3fw z&n;faYb%$ruCtBp**<*bQBXb}g5iyWIc4e*l<(2Z+_zVvx=mNGP$)!_y~&eDj~jd4 zoY}L_1GxI?tC=-x)`0Un@4WNI&7C{g%X&h;!U{P2RVR zrMvc#z9f_BprUF7b~IsHOU1<~g^{2SmrhH&Zbv-ciy9F{Fx_WyMPFzbOA27JC@{f4cXOr~7<>Ij2ElVoC1E|`2EBWtT^DvQ%p zo}fM+qb3%i%yDR}s9>)_doixInLTS8*{i;sLx)y#@Zd(CTep>8zOj@|eOb0<(t*^j zdjBZ8>)~M-z@%lNlWD}ZE)&2@(XJF62QZ=n(Vf;EkS_pm&t3OUe{%Yhp+sFKlcTYr z`pcPI?pMC=YXL&r5hh(SjlM{PubpxjCmk@3_1n9-`r#LO^7Umj*46O+vyY~(GLB^l z*0l9<^OJLkmdE+pClANAER;3^TVePW23k^GHi(*dGiA{_1cIEO!B-x(rKxaY3@(rI z(2T`w-P*}92aaR>s3u-rx1B8;+Bkfl(M%dWjHm^PSd=w8I{C^iPx98XHT?F9Gud-+ z1Hb(18_axjIp6rqWTxythLoER7(Nom7PO^ueDk@t$QHXNLWJEE5o|gX?ZC4xwt_OH zu$3w9@@}5)WYQRBYGVFZAF1|0j>*r%Yx2+BI}_^!!n4l>h{T>NxJK z$y|5gG}7rjS_*0t%~--2FhB3_ocEy{Q~eYgi*0s+5dpHWiQDBwohpZ4M0o`AN@FRBmO60c^O3?1oUTQ`O?_9=zx}KK{vbn9>Rf0Y z-tMsTWjl1IbA0KyesmqB$oF;^4U0Y=wXD6J_d zMK+&D=d#93DoBF1ZryUtC7-{vW6`38yGH>3jN>oUp9()8xA%TMzxw%&i-17@C!KU+ z$BQq%oQp=Brh;3rjo^w#D_0k~lEUpul3u-u&CkBZOJF4U;&Dh=P+mc0O%>X*amr#e zR#jj(*W+cgh}N#aj0b1!s?|CYiRcS2yl|ftE0(SYG8Gk7^z|jV;DQUd`|i8HE`<1+ z)>u*B*W@%l6hc7(MPZl=4tQp)HB_RhY?2Ul57g zyt-l?*Ia))nH6gToPwgEzELPoj@hw&a~Hs4k3Gh}<6%kCUXgy(muKC^?abS}olovl zLEiI26-X@wS}LTH_`Zv_BvDyQBw9;4*M*dA+;-Aod~f!A?q9ePoT7EG;3Fvl2b^go z6?FFnvZ$6ZY_UWL2-G4FtWhcqJbI_7_r`)ZE(R6>G&c`p)QFb-H*DN^i|h6n7*aIC zNtd6^%~yVoldispzpYruq2q?}jgt>!&N~~}cVr{Kx%gy8G}V#G`;<9w|Emk>=}mFi zr13OWL`fF{N6dis01QF%zElL&Myv#7kxD~5lNObUX3FD($P~Kh&3EJZDZ0}xYqqrG z+LD@hgintf$*0B+=i9aAeCxI+cxl;24jwgxB^z6LW&UbXnH)D>eg>1rk6_-qR{k<$ zKI8Um<_nW2lFSqk%0_4(goR^C?pU~*u6*7|X9lx>EqoLB1KoLi4Fw+qhbd7%r4(ce zE_C-oZyG>bmL=}I^AG=V>7|!(#~ru-udLfwUU;4pKQZlzSuelb;48qku*MGMhv%I{ zCg|d}GzuuGaK8U&-i$Yb z^R+Cr(%kUKi)`sm5_h6uGVS4-dRBcz=1!PcDlAXoSH_{K8hmYZ5rWQu6yWuvn$wpy zBW9qfsfnh>CUN&&cYJK(r~PpX_P_f1jp65~pMEM&J~_P};H)#xxbn&A(?|K5+S;m` z(>l94MLu6BBECy9VFe!wDM$h&>19j!dR<}MHb_ze)j+JBew5Y^2FsUm#^jD{1`oYjJxl@O$)2wOVXnPhk3s*PY3<%k2ZE8Xv&_?`*=!IVuFMcM=?t;iPgu%k4m-G9IRx)&~5^uMzCUwqL8 z{P7+WH|ETk(d)Va$g?cYIn$1$rKz5L!Qe$~D;92&I!s3Yf!&{hw7SwpYlMC*jIFQM z1~417c^-!hZs6;O?#ls#YRP#X8o#8g9B%d{ zc7Sp0RHghl>=LM5;{pUBwNVR*V)5kb@9^@XwUkGlVAd}T0Fi(OSrjVzu)BYVGF15G zF&I)4bd?ldQ6f2*GzlS$0oxLQR&YU&jfQeHoDk@GD7N<>|IO)%$M~xEYWo4l&;4Y9SJ3Sz3;CF)+ zT`1&PzI?@@*=+Z##~gk5bAOvLC;Xi~_uTW`T|Sk4efWJoi#NFlI#6yOuIk10lcY1f zy!>vIL^O&Qs9XhxnJA&Dh(y@1qnnGbzl)BS=7H-6J}?Lol?SzM-!`+MuAYDQj#?R(Vm2ZRw%*S5X5Ho+ixEMkWQz6SUiEs zgZAQvADmBJEJ8Y0VCsQ;uxe8WkH5Bpm}3V_2aBxlQd1FQXufXoM!%{7pwCX2+?B)fu08Ekp4cA$;&Xl!UlbNn_=3qre!Etl!+lwqz27BJX>A z=ZwR-^Xq5vxl<44i)T;f6DLk$W>1o|QathIDxRFVmQu6qU z^|YmPr7Nz2>nOCrY!zHs+io2HD9taFHioqY*QJoj!IqLUW^F^mS^tx3^z)Z~A^iN0 z_uR+jU%Kq7=Apx<=W^NOik7-%ErU4qnEmlQ6^u4CmW)vJRVYqtO&rs^96NmwzRIo~ z_yU1nqb_RHNsRiV^0Ba}j5lE6(3^89cO>6CasrQ>c^p{qsmEXB#@834(8Mh(u<+F- zleR#uP!_jIVdR;Megk1#*8Sf@KwSvbJQa$BW3ys&D>wi3H4`I)?`fe7-$5JOVf}%o z+Ikn|zcRvcxdPNBAm*5^5~Ws!)S!e2ErylrqPtSztE^eG=E<9Gx~c2q6hG~c`v&mr zb7n4l{%0>h2;tF>3U}}!2S4}b8*jwAySjBsr#bx4!xDS!wdZNw-QC~ZzN3A7Z+8!U zsg!BCi_k#WgnglC8Z-<$0?P9!FRv^#)Hgig`Cd$GJ)-|P%%4C1Q2`J4Yd4r>lk9_R zj+yHsoHTYjzRDt$O~lsBSQq2u<1S&J;e*M$D)fvmN~|WcE?>L(J~lizGjN$Q!?N=} zd;ZZ6J@DXSJMOTfv*X`B0l4cAcRmjMK)?j;`{4QPXzQdslVfzE+_VG(WU?zD7kY7l{LdKgE-7Ht4j+ulPzE>;QDoXk z7Oml&`(9w}{M8I=Zs5Wb4#W+-7zpT?!jh~@_VW1hO@SC=AOTw}9|Jak?#@742RiN` zni|obNu~pkIyvp5c65Mio}t>>8u9MC%T|2;(l2n=9e4gq*XA|XUdgrB{DiyixRc-A zdUMOY_uT*2h4bf)_`@A{CX`ZExEo2ts4*>!9#oI7TqDa2fjN`J3pQybl%c>0t0Z(4 z$RCG(7dy@P{~iY5J^P>Ow+EtWMUbKCIatyTWOoI=0#7T(*H&}aCy(L2WvjXVl?BY* z)Xwjw9l^+efujLSOMGFZxD`e5?x2ekVi1D3D*{eOkt!<%S{Y4`n2eCiYOZ|XC6cKW zjuSx@>4O7Qe@jfRT_s4xC@X{+8Hs?IXmkuTxGp-EGi%E)0ZWVa$EtWeG$`LS7@dq6 zD@B~BXl$r=wzO_#cLMOga6I_Heee0&?{B@;1za$0a@YR&y3}iLynYApfrd2e)^GT` z-#ho*b9wk-qtD*Z)JR!*IcwLfF&X=iT13`IclRJV+F94$!pbg(mYNJo!KVii~4?H;M%B!#BC)fRi-ADh&+sx06 zE0;%WPl|CB6=>hgwPg|HgG3_mRF=-(O+=kIzVDH7QzRlb?YVB;e6S&g@njcm*WzSB z^pgecuS_QbesFKfRR8@0tq^98y?Hw{RHLO8n49dZXcHbGA8_%Kr4_}`s}J3mPal0C zz3CjFa23R&Q7%6AAbxnyGyKQzr!!;8T24QBPoAB>nm@hzHaHe2pHCjPH`DeTO(tDH z*b0=PMoM7}fy(3cM4bdm`TaJNfg0=D^3lFcStQP}`|ZQxcbB8A2+zE>oC^;>o`Rnu z=k}6!(_~Zz<>x7jI-E16k^BDiH?o-==bdsmqZ?~T<#GsNoc)x58q4O+MXO1s(t$}= zu@Vcevy|Yv(AH(f16w-KmE~YX(7tcLT0)S?<)AH0ltoL+h(|8^{3ShKzv8R^l7%>J z+BBYh_F0~O?iuS_U;pOdQ&0Qk@WqSXp8M4=U$N85DK?mdz;S3C)kGp<8zP8h#x0p# z58Yajh}Gd(5hJ@CxS@vab*W1rxL|Xa@3Z;ustYjS){32TTpb!jp%q2x1y5@{A3neD zcqTM9@Qvr@aKimhbJGcjGj;4xli~=ND$iT?WMMx*m z>+reyzUNuBp`EIVIKD1vd<<|De816%5W(8k0bU_U7y{XF?fapfFRo|0cOgBu=zd9< zoOqsV=Km&97iHxM_qY>|-&Pz8?;ZjCA3Lu7@pT{eS1QXAiSM3!{<)|0|KgXv^d*3B z^9MNR%(L{Mrlzlld8p@c+?UQ_>`@1xH?`qqG=E!JMbuKXcKAHKb|T;U%sE6YftCR? zSAmb9A|B((R~K;0Ef2%SR&$Gl5Y0oHHzl(@M+3Vz|DBFlJYGrzTp#jzw)bWbQW%kx zpc*W4r8OEUBzZqWGP{FRJ{fHGiZwlbrm~O*RsMmr#QLH7OB)r?nL^~ff$FEi%oT}5 z5Sgr@bUIFuXoSt!p#5l$n{U4PdVtHm^yM>!GROpkC8o>J$C?YZi!YJ%~&WEQ#*xg{?afIv|8e zC@7zNPcL-#0chK{S+R8avtPgBtJ#0{8a(Zk(@jV6*=IT9j5Dsd`1}ih*4x*+dHPdN z&)u|X^T5o`5>S?amS&odoy0L;JdM+jpG0fAk45br%-h<{#$*a#xn#Xgw)d{0y>BxG zFC7XU>EeGyfdCO0T?z4z+gR^}7x0yfuY%1n=uH^oMW4Qc%K=T*Jaz6=P8&ap|9t*c zel}+jt`AYmC~jyCzVK1nn6sJlRDm=%0qEHdu?~h#=z!KlEWz)ddV}W|t)`};3{|Yw z|IwqUF%SU%C=|l?7AEsyQr~|{VT_6Lo(IVc1O{K--QBO>ci(;Yo_gx3AFJ3YcW)oN zK2ADuN?G&JVb{Fy%yW+cFOMHT_D^%?zBb~v+l=1Mr_VkoOgFE(`fA>ozwmWCP-dee z$%w{E9)0BJocXo$(8)d)t%);tLzKJbjpDkCFJ(kS0@wA;1Ta{0HSq{@S8U*0H{Fk3 zu|B}TC>?d|RCPtwfp5MxzhmOW19sn>osL0629^HD_rX^b3SJ=PU(x{%Bqa%(fkGmr zjkL@Ls5GqV>@f~#B50@nw_ZTIf;DS{M`-UcK*Ayrp;)X)Q~hYmhILyIxeQo#>9u^{ ze3Ys*_pj5ZkD4)K#w{9cI;mw*4%)kge8DsGVl7b0!xoB|V{^@Cj%Tltg98&H4+=hI zu_#|V?J#b<=p?Eu;;2A8M+<=#fps>DM6{Nuoj_^t?^Df+04<@&d3nYT8p2iQoB`=9 z2*Ee*eTc_jpF_fqQXZ>BYr(BAyv`SId4g5z+GuF3=f5tV#@L#2T-P(_iH(KC^EE%7 zyLce}vd9tF1|K2PdGwYpBMD&Ju%;DSccA;yfzQ3B;JLWlyG=z0qPn`e=gf1?+VZbh zgHQeSNv`S6}_zj;@YxwYIemtoX}fu*V2SoH3cRzV}&vbIUil{Wo9X zci;aUQz!1txVj-s9Ma5?iYO~PliayvHP5cy3d$!+ifyU&w58XQbCcM@F}@AK^jd4f zgBMEu(`2lRxkS!Q;VUng-CF@gQ-__dbipHT+1zm4!TkKBLwS73S}uM1Rl40AiAcm~ zn*?g6fx5owbOvVA!c4P_<6n_2fKM!HG5yVVd2H4@RKy)n%2+yU#YaK<4`{vg$9Vak zdESa^?C%f>1V&}h*9zCoBlQp@FI&p$HEXn1QoQxboBZ(N)4217uW|g$ zd0c(_P#Zixv**t=le*bS|+O*J{! z#r6HbD%nB?=cu&877;4r4MuiW$oGx2D(GNqtx4sxd~4cN=C4`HpZ_+Sj=pZryXn{5 zb?_`&8X9d2w$Ns!yFKuz37dt&{T_#N0Hhho$7-fT|sgI9UUEW9(?e@8UM_+*D`bj8@Fs= z+O%muyY;qPzpJ!{zEpoiqG0%74mS!Qe|oHTT9%jrMkS4h!w~8RY2z}b_Y~RoBto2 zt7&{Pg<^-S)PX5F16sH!Y2hj#0h}^^IK!$dx#X!COu6qR9zSOaqpK673hsNVP1TR1 zFSQ?xFwFXnMQxUE+RktOJQL6Jacm2PGBVKrj0Q*e{3=7)mcsliFl;gFy-7gv-RJXp z$Q97Nsp1{hM;>`(*Q1X<`mu|hyAy!-IZi+GjP_SvdfDsh?6QOHBa%!e^&^ixy1yl* z9yM|#Eh9$!=H*vjx&5VCGq)srdVU9d6*SvdY-aVQcJ>@Ti1Q{N#Qvk2nZ0-|rya2m zJ*fghDx|hh0&K1DJdYpV`y_3zyamZru`m;7o_Wq26Zbx_=SSCH%a49|&F-7BtBpvj zfln#W7_$s!T^Ac&MN+6h<745JXiHKcw4^haqrER<1b|e3x|x1&RaFE_$)Ke#Wze3L z#`bq}dtfChcPcpiP_#}5FfhG&I}B}riVB4G(XL;tS`onV<;w?}Rz#vOcn~RDvN@SX zNT`lD_(Bu0BW5nFG$JDT?x&8#wrvWYB9qIKalNofp|OlsLD1?KN>EkNjBUq^bD6;T3{W#>o8?uB#Y0L1*wIZh#w_o~s`qCL*T>K7R#Nmb47Z}Zhh+|azeE82#9mU~$ z4W~Dk#gYLNLknz6)0)n6@7wEe9feSq;rVML(HhJ-5beF_?lju501MJ7bIm%sVS5)k z9!J;Ilj})Aj}i8gQnLTP`=uAXz4)KD?tb};pO*dbnje)98PvS(*=L_El1&95B4sg} z4;;^F=TGId6AxreeGQ;-J&9vg61S^}Maq!M0FZs7@DEy3T{euEU43k0bFB8negSCs%BEgcls%Xn@+%EH4a`@l|o;r65m;UutKK=L$+{(w+!Sh0v ziwIOOwGMa(f^aRx9gEhEZoYHJ^CUAaWf42@Kd{l-MQAGk-hNn*4n3f~A(T1i0g9Y? zFYLYr>O0 z)z;LVkm~DgdC&AnYr49-^}6-z4+E~Sr2G%tb`J48R|6vJyXCs%Ibv6UNnX zKhWJ5!l;&Zr`qs!0U@mLK4>is&@j-BC?f9#hQX0jK7+~MeA zRXGLi1pwQDe0?8@jZf6EXiuj3_TA62VOuAONW=(2YZ0s!i=tq)?uWfGJbkfKvMov- zqab0|MY&+5KzRsda3^6WAeTebS3`BB`G2K|YE9fPN&zc6`+8BE+o3ZFphpZJE_;&6 zYj%oa8jYRLoOSLi3l=Z<3P?+!VQ{Uf`T|MOQs>#lbKTOCE4b8-7{=72 z4?-&+G+9UG4&|Ea>$;XHEuYkj2+G~!yDPJp^~~poXve1W^HcgPb)U^=eO7M^u}#0@9e=s zP!WwXI1wXaTY;;Y!1s07>aQtpCML=ZCL$D2E(9?E03ZNKL_t(63eq6ik9H;vB~27{ z+6_-Hpam+*Vo|0Yus;*Wj-ot~K-M;vfF3ri*}C`cd%t?| z7e3G8g&%E2Kku!1#S6p`qSAO$64&Qeaj#l_8 zN^RLNs^Wu)I&nj*)GFA#jHZDovO1g4k&{~=EJTM0M-AwL>sAJN(z@k8S8I!(N)DTh(tDn9$W`i zRp7Y@1u<l6Pi*9AoG15y1N#2TwYLJN|h4=Fy`^ zvUcry(>-$)L(ZDQ5KB^Ckj#GZ6;xX{GT^#~HIaq|Z!MuGo1r}7&|jj$!_1~FA&E-K zS8jQjuDMGgTR;Kvcp0aha`M{89(&BQV^O?Ze)r9IpJQ|TwtkhUWN2*#W$`GkS3pP+ zXxy7trI|G=g!D^xsX`*8Vp&Hwu5T(Dd;!BJ62@y9#w`bcZ+2jBZXKe_fNXsv54DYoUaIVXJFBQ_1kPU06=U%=6O zj3%AWP$;-ml{Hfx8)WblG7wYJJ8Ag$qu&ik5`*N?1El3p8y`Z2Q%!qj3xmp&{NT`i zSvhVb-OE`VuM z<-9b#x%NQg|GnJ$orTpzal9r1t8FE5?E+=d2)9i;f(xIX!Re2_zzd(7#-Q?YvThbz zL{L(LcF;l*vEZi1W;1u?X5zL(iRxGS8y}|WFIB*>5;Ev&h(K*y4HyR)Orb`&F1jyQ zEbb^tN)zCF5zo zR}T;0^)trQj_2*IYk2APMLak6HP)?LPd=5w_dSM>7|OY)A4gOOG%gaSSWsbW)0(YH z#JK+P7kKNLSD~vrZ2dRXH$3&&V~>5~)KgFW*r7`QCy#G`_dERJ#-HP6bA&)U$ELQX zg7RpbZa>|x-EAs)jRt82bRrRo%6S@A?MQ~6@>=MD0qE~Js)=9|!$ZxYL{b6J8-I$NDV##BAb$no7M^;g-H-_NP9hO>)n8-vgSG~ z2~uNg@F@T`TDp|mQC@4^&O?jW8k~R%IxtFva%O-SD%Ya`|PK?-hwgW-5&n4wCCDIOzPT{PL@3 z(^6MWGTno1C#WxLArY&_S3VX3tz_6{|G-kd+VK2^4_bOeoH#?P#?hVIK{DOS=&Be` zo_PZIy}gF7z3>K~7(0~D?K6(3ou?zUmb6n#b-W4Njt5n`LaAWfP)v+vKsybF*+N_R z_#`u}sG@#`*v058&?G2!(vT{|*a&Utq$o*VdBh_Y51e{5pPT+FUw-a2?mqPh%B%#Q zUqA{ATMBGja@$|u;)%J-NJJwTWJ*xsf8breG!n3MQMgAKu%RL}y9xtwSgk2D_s`}H z_D1QF$y7gKCEr(Md=Ig$D?Fu9qeiiA-MWu$3>CY#k@r7-cEgQ)?+4#yk3IKZ`R?`WAu3>p%>UhU{;9s+AA(mqTaoz^bLX3e}T@sxri3`=clA$+sr&&E@-#C-3_~%f2X1 zGSFR3i2(ek1u7V`3d^jwgdH)brxaUz(=6}k<<-sGSiPf<&Dji%@i>zP*KzpJIwlOR zr!gME^?V9SA*={dr<^jYl9*kFv?GBUoga2KO08FojYVGP+1|T~f|tP(kzh0F@4_Zf zQV>DmY0YPzoW-)%o`Cls%$AGV?v@R0J zz=;!QEnKi*@<*QeI~GTucw+punRAwAGU-vGXbUrP2xoukRIa*U8VScDol6sUs;IAM zAz~X5B^k{64AruzwD-aPwpM=N4?!>{5LgIuewt)v2bp{q>2)5xXpGgA0tRV5m?TY>Zk+Quz+L)2-ns;=TA69pGMe(!SVf z?k<`Y}&=YJqrWKweUnmG75g6IT)Txt5N}IVG+L*a% zJ2N)zVCMQ(o?o|xdD}X0wWcl>p+4>yMOn*Y@%AJSELk0Dl_PdCoDuJX0SI^RV5i^F z+fPlb$d}(a?rYfE4+Bt~!RB({*f4Pq*mn%yKH&haIA9!E*HmxCKU3^37}Z-D=o%2T zm>8?uW)^Zuc0#PFsinaV}}o7>K;RwHmaGyi3F>X=DpCzl7MdCGN3W$x}LC3}f?y!yClY*_=L#ki#T&#Q{+?FaTDn8lS*}3DR ztgqoCT0~b@H=Eb5Tc6JtT8gQk*lQ%0{pV-+&N(Mw2~FN}i8~cERgK1xk-!x%K;Z{U zkg`Yx{SZ8TlSr0~j%;lFNGAMtGny8haP_D z-Q8FFgCC0*FR05E+#teA28|fT0b@rpv?9h{H7)pB(Vfk(E$gzTE5*|7T|B(xO?o}W zr^XHCO9$=A-gVWyzI7WEJVY#JBumxb+2nWGb_`~W8beL9q^U6aa!?%)#|$BLNyvax zy>mM*Kx^+a8b%Cf>Oo`p;sN97%jeOSC^`%W06Kw^M%EW;s$rolq)=fX6v9Vn%Tz`} z8&DXam4#Lw+JcC-X-?R*>`}()dk!JvDi*hO@$}kOzW&_nl*QtlGQOEJ#tvaOE$0BN~b?KRQzt91KT%&_?-PoJsv85aF z9S=)c_`)DHML_#P`Pgkq`nmiDE{Z{SCX*?uChC%KD>`6wGidN2B9Tb?qpq(_8#e0U zBUxRf%81wONl$tkJ=s(s|rReMNJIwv_&%2itFWrBtfIaE>^!NuGUiZFM?;KlpsjZ7DBitEz<%| zYlc@O`0?Zk{Kw00a%@Wza~7}T{+AbE*&?KSY9a{b8@-GVGXl`MlpO~j0msk8y|73cFp z^&?G-_XfdYbs_))l(j9Pz02@~SFATGb(Q6W5~IT41%xjR3t(q}=g>yjdlb$4jpU{& zhZBp4(!8~3fPySZm{PJR4TEu5C>1NuehO@|UlI~n7Av6OyTqJ&$|BXYRLA(l$iaMi z{}Jp_Rl$<&Jv_dABMaM;6g-bI$Dzz|aHJsXrATLcNV(l8<$=s&%Q>WZ=pTOf``! zIx&dKcpa*!Y^MhT{d6dt_aUl(A&^D;-k?1%11a31rLPtS=^u|)k%*L2@bY-R%jx5X z5syUq){J@hzGA|ldK_uv>OAQ}CwVuEWk+$OjT9C_N|Kp2`tt1vDT7Xm2yJ{z#u#EC z7%x->)S**hXlWftIf~*M5E57U?AuraQu4Ex<}rKDa$Hv%5v1ZsLTh6N6xw+2x&sgz zatZp`^@?C+7^lFflvLO@LTL(suQi?yQbeu5EtvP$(*>K`p)!sbJ{a9tZMp+m5>Y;J zPt()UjsNZ%!xj*N9XmR&S-5cFlON~!xmybOLma1`F>SVGJDW8KJf9g)&t%EE4Me14 z3P$DQsY1vw*Md;+rIwW~+Wl><55Y1jdfQ8eGR` z58H>9s(61(fMA}g!(<}#br1e6Qm{;Wmf&9%Y{P*BvNlz?5kWEmRBMH$Eo#e}s7o|c zoftzjI-ELZ2$M&S;)Y`;am&<$Iep9!dU6GxTCVe;{X54xr%AAM|i@+Y2n{E^Q;|NIfA(JZ05oTEN- zJiof^lemQfuB$+M#GE+Q@uq-U8OZbYV=oZi5794q`R@PjG~wEaDjX-V*sYxTZ4X|7%OY_N4iqr-Em?NP$&Y!Xoc_ z6gs*P={yK1OC*?l?9q{rdko#30DQpXh@%eYkp~}NGHm$Ju4079tlGrg&pt!M7J(dw zk0|P^YZ*4jgfI?NRf#w=maXQ&Kfi3M#2}O(cG%(8nsv)xZ64CX-FM%!`(l5<+_;O=E{~&>q7}Am1Qpmdxxd<2a@~dR-SA$@h=ipHs&V#V-`XnSB_CK1i_^ zf&u$s0izL67FeJ?9~Q2HY}N<^iJ;Z#`=Q}am_H03jHoMT)ZQ(eJ8l?xfuM>O!6s!PG*p!h!4fgF_OXQ|>Xeg645BhIg7U;j z8Y+i#;E-m{-eWkI>^G9rMh~GT?(jzI4xU@Rjg=i4q%>#*bI}9C7pcP!q;ZCi2!ZSS z{AkYGc)mtR8M?KZQHD|ci?ye4@}>=}!ob~6lu7xJ3KIZz!U-o{`|i8%UY{@I)`1XZ z73J-p`RwPGe3&&gbM_29<;1CPfLu0n)~xABh6Il@qmP@!bze9QjW$Z%TA-975~;?r zqM$TJf3hS25sD>+z_@<`?pjl-wu|j{0pKCVP~hb$kqSw*Tp2W`aQpDyazNj(KrzZ#jE^K;@bclrRST!TgXFO zchJZ)NkI|cTO7lrQ)zTZ7rNjAl3XUUV#eQQ+^{5V>wwSROtDwWGF%L+q|IsF(G^mk!&%HVH;l#~hF{9G$6ia=X53TvQJNe&o> zr9wE*tW29ytyqi6hb{typ?k!tRb=%R(8k>p;DTJDGgC4;3NW`1J8yvZoVt>pwmeDF zedK)3UNV!0iP8`(i=imR%OL)c^XGJf4>7}#II`i!9VG!C|e)02D1#?u~Ncuc|Pr4Qi@~*#mC36P~ zj?ZsgRjUG_SlQ3siLDqVhz(lkrv4gP)neKEhjFsAEmpY37*D?oP&ROibqW%x(6B;Y z0{-EwmHhRoNAZdqZs+!`d+CTmM^8jyYy%^S?@l=Sp1bdK)?spqs&*%zwoPYC(otBd ziV4;Th9I+UwpK7Uq@zu7^SvAR=1=a!sKk%#RZ9wSh?|h!*Qu>E#ue_r?cH+&f2jyrxey}{3L zefUFH0I+=d3s$9raG5v2E6!d)E(o(ZY*zJJJQdTTBykqcJD=0Zb}={ z$}>N#pHkGdMP6kv$XW?@cocbJ2<^zt*m@nbX?6`}_QT8>oOJBrT(V>?rFz5RnZzK0 z3no@fCQqDp!JD5^Fxuko1HGPpWm-lSO$$|HH0>hX_2e-B@#qF5=e7K^ zmah{BQuTzM{S|)=IEclq2YZ#O*%+n2uLpp`4?kQsY}jyI7)G3R);T)?zV_9xOu0Ps z=g$Y=r7wMHf0WCgJU%|&_}R~H+;i7&f3q;riEZuX&=J9`K3@E`%Q*k|rPLEcDAuz? zESL~W%w%;hdnYzhPilU2?t;GYwL;TY`47Rowpq(P8#9plTpDyB6f1j(wHrrjv5Zw4 zylur|zH`}`eB!r{@coV3K;e7?tnxYqDjPEyYp@b|BQ2Wqb){RNmg!lS&cafdWCGsv z!V(ZEOIxV8;f}R@{<^#T@Jal=<&%eJyD!qL@Ua%9g#NYy1@GDyco3lx&&W!zZIU<~ zfN{PZ+4Azg*=?qTxLQZ=ABC|}w*T*b-}|n3KAfe~3Ba>hH{5W;`Psc>G~d1UXKdQH zm0XZ{m-?w|Dg-A?lq-DaraOr@J(=CQGiJ=V<^TT2zyIS~-u8~^O+AG5xzAtC%{Tpc z-s;tBvU_;RX)8JR=w+1a4Y&KoA4*pI+}(W{ufm8GazV&lL;Hvu+H;~?B4idZpUD~2 z5@oGIa*?|S0-peQK&aic9T^&hNF4Rk13(Ev?1Dj<)6d@>{{oDOUF$TZRJFG6eKm>y z@3ak?9^6yA0_op5nb}rj9cOeD(BHj~Le$x;uElua9fJ^hvlizs#vH(XMdE~!-=z|}ea!9{m`QZTU+_{ql3l@Cijyvx7z7pUC}Cf45-f%L?+ z);csW9|;AUgx-rmykeuJty-tE z*q{+QS4C-UHK)k;^a4*5)8?@n92{KIdTIX8|M~KJUwF=W@jKu7F24HJF9Y!ShD{uM z!ZDv*w`T315A7aWrW4(AbuILEa^_`caLFZSbM)c!>FH{tfuNM7FRz$Yn8jpVW7UqG z-1+1l&Ym}mqh|I{i4$ULPy}e(V5Gc%@Ux%R0$G|juf)9sUhL!wq*Q&l)@$z?ARExXEfXN z6)RSpvTJA;-~9SFrxSobwsrN@S9AGmUd{F2yYBcvskPb|OSvXLyy0fv@RHN%$%VuM z$|i^?jIrc_Z~gFA*t$Ixa}hD-M>}`yxMq4spWRx&e*NsUIP5-gIj=l-CF9ka*YJ1R z>!~PCR?~ZFRlFkLXr<1&-TRS1O*tr^(y4vA;4fLGk(DG41f?7U0K8prIugPiHutaf zR<>zRdKL@}@TV&e$Ix(B`XP+~03ZNKL_t)p5!zYU8pKs-siwP9h!L!^9O#JZ-bNZw z{Co3y`sqQMN}u+1%%Z0-h|$J@@KS)Fa`8LPWdjcJZojDKH}LF+-Z#g0v6f=D-f z{|DOu{_g(I1PJTfF)c0c;iY9O!~MNO;(v--L4 zbr`}4X|l=8#g|&o7=YR;<6(bvY@?# zns&MiR%z-tbW`DGSUU)7Z$kuK+#f- zK3xme1I>KpYOI@a8!W>U+o&hCOs!6NWH07L-s}Fq4=3?JK$dXJ6pou6i>o<_<79S)o{NkR;9`IUn^ftLG^C+vmHM zvM72A3s^CG1@Ag>B`41xQDDfc2xSE$meKMKc8;&7o|HWxusJWc zKC!X((1ZV!7%31)j&gmR(ee;MIyymloQQM2vy%Rvn1(Ubwc$ILp3Nh}`}wccTWF7b zhsh^wmqT_FRr2^#}L^JY`tdTr(;6 zzdcXB(00IF;9x(jusVS_cKDo;2`En0h>}=?PiAeRk%=N~+nxROF~=P9$g5uUD*Jp0 z{?i?R=diB5_WEs$7BBvGE}#2&qtT$Tcbpq<`VE(zcATHDDkM~Blklbgy~80*W7l$Q z@9MUjHa-4%fRBIt_vgt!22lg<4}0r2>zuXbxKp-gyo~M?T={dpB_3j(w0%@z_c8A}OIz zP3RwQpab{5ZA;bJZ2J3>GY}Y^$hLFAy!rpVWy@y%?t#znuP1%a)*7b`A0jlX%*OF8@4WwZst=wTY8-m2%wa=1hO{f%~f6+<2_ZJUR$O&&+ zc^JdBx@Qz)a^|ZF#ot9^;>`yOYPZ57X1$=0{`JCp^zS z$$6@Iu@JXMZ+@_8&Ez7V zhocUIBbUHYO9+o$M(?t@gabW1K0L{Pt$Bi`+9o3aLtD_vto~(0k_Ryuv4|*CN=-b-=a-b*B~4EYD==EzPB|V%N$5qd zYzBB0T$kM%Cz_%jTH)xUkKViLo_k&v$8mqA=iFX^Tn-CnrAaoaG$d&N(^<wD@j_=5^1_9KeCUoxnN?_G}c(HIpujg*#q%=&+qr%8frMzL-Fe(RrcYZR6C5Yyg9 zWFb<5@}!crKgh@ zMO|X2d!Gq-+e}Fxu$8viJxJIBw+((gr4>RW_B&bD1|j?x5GGN8qp5B5E^U(D2qmD zk2=YBABC!H=b~i+XD%M#pYC4A%YOK4t~ljL&Y3reQ3himF)_oXO;j2q^mfgsO|@f5 zaM}zu>v*IWqzUXi;P&%^QZ_J*6^E$R$Gsqs%I*gdakjtynrKN79JNn*)`vA3qXTAj z6u9P+GkD`qe#4xec8=`pp{k7&c1ke|EzeT`Xd8OsfTAPHv1|l0?)4UPoJxd*khs65mD-DqdoRuQ>~HTBPY;k)Un1A1R;9!&g@qNVJJzGxJ_>) zF3GOckln-Bu?d$v1&YL)HSc-Pdx{_V$Vd3>XFvPAI9I1J0MBu4dVIrqD)0j9+VF$_ zy_Jna`{?Uv=g}=YSiOFWbA9vA?TIIzcpJdg|M`vPKXGjY=zIsOHlaK_Pm<+8K++PNpNu)Cd!dO`xsXlv)VIla8@=%sw_+!Oepm!HkQy!aGO znmfSG@e0>(+{$$uc5%=4eQYmHG9JemYl&2VQj*Ez7lgvgPF;ZvEFpZNoD1g@PAit;o%+oK|(iE z_Plea5(sT|=&sbgK7y;YvwGWt4SWI@_$);UdUOnlV>eA19C-Y~mtHgsaPEuFZ5QFr z@v;5$alZjNa|9fdd^0-l`x&ncdG7?T8zCtj)OE#_YIbunz@6{p z2oYLYij4+K`U-sJg(vXYyB=k@S|d=N9xJ}XqimL>BtFTGa9sNvezTU3TyrbcMuS2w zKwH&h-CzhZKFHHg(GJLPm~tzp9Vj3%hGKVH*0s|f-7lFz(bQ3i2pFTO)vFMO=;2Y= zKMG*OFqHGpKmP~aUER{!!DIIbcK0yUot8qFi$>n}u6O?wc-{p6=@GzlTp#}Mhk5af zU(DHOo%7=DPi|iXVD?W?T{w$BJL^Qg{_|gR*DvqIZr=@HyE?mM!^RCKU3~GywauG1 zPjBEeTqm7$k_-(EfpAx;RCMRoteJfLlW*my`7^0E8m=|n;!KuVg-Qy76O>qTp<++D z&PVQi0Hd01e@DBs&wLEfIy`^M;fk~Q-8%t=HaO)d3P&&D11~w551zJ?<$YaD>IR9? z1fsmNogp?*OBys1O=2whK(V-|onvP8a`Zqi^E=xKLSdpFGgPcGTxl>?tr03kqypN* z2<@=|BEHcp(2?t>yD&f?3Vaoxngdz!3V~Vp_047R?R@Vs5U7w!JjuR^&0g|avJpdb zPuyHs8$)j)$1k?+?0j<9{l=J6v#T?!pYGFFa^*Y!guj3J*>rd0sa6|apTi|9#%OY3 zfr0MDbQT8P$Vh3=p?CL?%5)T(;!5I0bDU96Dj{LXMFrZUe(F}3-vJjcn?pIaeEGf& zY#N>5#JMx+&j-}BOR#G3B$dWEiAl%>1ym5CtU`M!W#^tqQ*PQy<}WZ(-o-?D4-$B@ zDDSrDfS`W-W90y@eY2y`91kfJ(19RRv8a0^mKtSMAnkG zmdHAFO|eZZN}AWBgt77@Nh5am;$xdr4+-h&>iPGzYuCI!muvfnMx*XJhl}SrHo*FA zPA>rL$`wbA|IfAGd(UfM`&!nlS@XO(TcyM_C< z?BJmdThV*QvYd9w(j|Ai_dV}PZoc{E>CHQY^}quU*waosZRhUYL!jJFLoWQ?nXDaRKXoHZ=~09cbmrjL z!&rFAa{lMfU&Nb_Swe>qYFZOmoD{2=Or|tFoQ<^@ZAi4H9&7521QA1bAz(>&7sn6u zbJqMB968v-oUSf*7i&B|T4K%qF-nQX29|v2(|e;R)<@Vix|Th~tu&HRLJ2^H80CRo z;M(t^FeKm=0aF=xD~g&avuEsatVuk=UuEVi$_ioxtsL6CGZ*sYM49*f;!#HZXc)BXZx0x*#DlszR0D$?nHjX&*1swoks7AC-j?IGq;@QkT|0KTk zu{ZK(XRRPnLZhB|=7H0qGuF@+^)jdD1r(xwtky2*nikImnjG}j|Ivz>Xz^&U7y=d0 zSC~Uj`%(&Ffj?V5k8fUlDtjiXTz2g(+_iIz!F(G53L}cdXvXTh*g3YI;nEHo)CeW= zltPo~E?|W)2rv?}e{wsMl|2yJZ2zp0Oa#js$?{p33)_~C)l`utunuz}A$8s0b;m4W zs8r*I4Lj(|w`FEPiX2wC0Nc?PQLfhc;5EPE=KD6H0zsuCh~GIkJ9sWVwfI*pl9dW& zAVg8C*BGB1!{qW$+v?9Sxqb|yM5xCxwQ|LoPVE~-jZOmCd_GSu7yb&|XvSr}9zQfX z29qT}4O8;a!;dZixc1s>pI2w=GzQ=~uD8GK?R@iF-zcp-W(AL}UV{OuYqxRLcYn&J zEkiKkWq(D<>eZ{SS-pC7aeCJdaSrGzt(gwlZei(M{^4zxVPhxglWH$1QN9H#erD(o z@Dwno6eEp<8=u(a4k{&HYzHR}WYnR&DQs#Uq)kRGcXM)Y3p}Tvi_SffFJ5{wZIY)P z$4KZANg}So@!WQ8%>k)-vpZqD3ZM9(l^*s5rD$uj%x>?aW)doK%y6y2&e1wy7%|wD zqdg31lMrJQN|ilSYWoRQfv)y`I--6;l_w?j8QVZf=mUe7PF4}x)Y&(&8Bs~56K_)c zWB;8>34w)36cufF&o3XPRGWk_?+^1Jv#v!6QEV72CK%;;;7^x_D=2Kr|X4iS7yTA+~cWnR$3Nbw1zeS~kn;!M8&z!SXjr@!G%$1UZZ zCoZQTikcWg9br|2vC2+L_5E~4y>zzCA|Do9f{AOxmm8yuPVOWz9=vKK3+_s}u}-Gp z4;X8_-arZuI8gP^z3b3A)jUOxNLfC0_DWv;%4P;BQz{;hfVMy$#j4#SY~MQpxuDr9Y^^vBr3K)7<*8zxYq>h@ z_k4Sfzx>k|@!qqJ!T^;xaY4lcvaH}mOT^D&r71^D3pXE!-zKZ%OlG{2zT>KKE&0wU zPfxCmq^pBsJ!XHo%5Gan&~%0lsMV2Epel@%N{ll^KI*1D*GpT}Nf_ikiBB@+L~S)A zrR~&{idVBs+srPIsMLtX8kB?}hOgeYkq3tMB2k+M5e7KgpUO1!XHGaR_7vIwv?12C z=*|n6z57x?Exmm`^>fcY=juwSx-{*>t3`9T{I6clM_>P9I--D5&CPJF62vy8d%N<3 z%;;X|QXgfUxRQ~UaAaDVq=yC$QKW>77!?Y$dJku;+Q~$1hceU5`zkmoJ;VtF_g5vhR?~pv`3}UpxUTA zbcvC~Apo((7kxzLS- z+{`;bjHPa>6zgM@YNOP3g-knFjQeC(dw7M)^!G)Y41!c?&$fOU$*7?z7}JWzC_m~@ z!bq*kE00{n(w=U<@$hE)+uNx$V*cd^_wavie27|-&>l)kutedSV9zf6PfY~Ue<~%E z%4J3-CoxG4)@*^;U~|z^)i+x@FzE;Ygi@vKIQ*H5`6o9Q;w#+9DDTggi2T4#WXAfjRFd-t1x4q@9 z(;Iha>un$xS)jeQlMj91^~~<=h5*`vfVMECGs@AK&(V>~kyDC54A{s8DdQa30$@+6 z%!51jW>PiyL(rPk-R)^Ke_PGYTNVAXz}?bCND{ts!D+nu=tU$t$)s^(bQaL8I2%@M zit`HFb3lt(oOHfxcZOu@#7XY0BmaU9bgbuiE|n}t1tESu58v4dUA z?u;0(mU(FRem3qav%lQHs)V|pWTdo}p^-HVPi$eVyo>SjkQ;Sa>+F=VPDa(Y{zVzI zh0aK^tvJDlZhz46>J=>snwM@PAWWdW7JHty92B{I;Qng`5-1oh!ek{&7am)`E;l|l z)&*FU;&WenH*dZ46s(P%F_HiI01qz2GSI!4p28d;aU%(olUhcTI_x!(_s=4Lxu+ki zbjH88xXw>|u7|$1SyVOTBgMzgTFKQHoy0dE+{BxHyoz#c$SG+8E0r_VQOZYHk<4n? zT8mEiucdROd=+e4lF5uC<0&uJreZ$M6iSRm5uniC!P3p)i*dr=p7a7%4UKZ+V^8qj zZ~TIrAKr{8ji|sYZfciDIQ`S#Z|?KE`)O`&?G{jY-~Ztd;L4AF41l(%y`}5q6ej!n`k6Iz@YfID zcfWbQ9bh_rCY>#V>x5Bac|Ve*MOc7OdF5Zs_kojCH`BN;UJ&Sg>f3+PHBY z-}?5yPjB8cssw^mgk@fe8h`xGa4`3)F+hCTD`8{N&dvKL3*Ac*W847%SJB z4sgCwH>t+G2PZj6_2&FiEY0_kv9)|v=jnFFrk(<>^Pr4!ZFp-Ps@fP2O4Rgp%w?c^ zDayJeAu*bUuF%&QWqxOsnk_RlSz%AD&XeUb1MLO+^8tmNVzM^m+WIQzk5r9#mA-Ul zubdk$Q2^r=!<&A3H|1&qxs;2pJ+Iwi9gMQ%D+yuZ-mCI^k~$tXKX}vK(26BA0Sy7R zY;VcDpjvT4KwVw!^3`iT#`!Njk+I>T3r5N~kfpUGVhL@;K<6Sl^E0#el{)pgF;42* zcL2bTr|057?M;Dz4PD?(brB@RN+`r6XbC9CF_#`bkE34K&0BA}o7aB-PQG-}DJ<)6 zCy5ot8r-Ka**)Yo-ThMuB-R@ywV>@&4Gimzq+Ej_ZI3tE7?RQreFwmSG)%YUHP;uv_(cFVZhE|t9@jG1>jY)M z`ARn&y(v&ipMJ_It2b_3H@$JsxRt5_^%*c90qo0P{bIS|@BfU_c##z|yAb*)C3WhF zW}=?3r(9>-#3c9Zs4_HBrY#CNW>z2PESSlX{%({Ne!6)lHi;n$pQirc>5~9C_(5;6 zu9a+J{$j-o_>&_RGf`?}%mVR;TJ~G4J-}$NHMlfg^bWK;ZC3f|L78F#6viekVrdSE z-r3eqfA<1N)%65IC4{P*j$9{+Nl0{s?tGDIGET8xVzg4FoCs}^akzsZ#8~6H5GZFu zV4HL}BTike8f)Hr`-AKlsUf+bX}Xlk#(H^Vsm6p2jSe769A!(;xPFKOrWuR}a*{C( zOa$!M14B*U_9#;H4fHT)?jRrf^jkUY%#}=zlu!z^ae>L8-RH1|e4&f3j@eifdtoTm z(!w#nQwdTIMZrb{G2S3b9H(FTjzWk~tc_umCG@{?vf5yNPl0Ry^c=3d?Gave!ySC` zykmLA5esM-XC~%s98`9Hq(RnVGyR7t*2}&tkk0zkgi&N_GLvazT2R)h{`u%fdoE&l zvdndNuIJu|H(|RASX(DZ1oJy<_}`x%S?duNso_p~HMC)*I6re@yC@PH#<#HLxwP81JgK`zX_H_5ko+pRqFI#pvPdu@yS@fH! zS&LGtbioA|m6|&z001BWNklldj@}V z^5G;#J7oI-2VzFKno>QCQZJnx~_OiNe45G6cy+TM()NO-uEyk9L1e>?AXz3h|Kjlb{ zICdF}7R+M);@J$&>ZhIyxc%{+v`50>{hjpZ+o>f94Q)ZW;8w4Xvv+a>{T+)5RSs(# zKKut{zRG{7Hb+MpIEbmt=e`QnrK*ZVf|{+~ajag!hn3Ny>>(kaOKcidzqYY^L-0r#UjO0iA1|(HU-KuR&4q{bhRU4t|<&; zyuxRC=4J`8X5aX@>w1(bux*GYQdhom;iWH&fAr()ro64doeSBAI{x_M;~Q_h@kghf zb{hBGbI)`FFuk6-?!R}{oLa3G0@z%H^mJxQSy&4?Ne_Pu@Sb!F_sjyF z-<;Y9hQV0_@`*3JiztdPae@gHfpH~`CGf3nP$q>nY5LmooH{SZSqlc)GG64fcRk8? zAN!5#_{!7T-aNZ^n`k5q`Sc4{GFXTx$JXiCDRt0q7bPuVzx2GeEw-*{HRr)x*7N91 z3N&VB!jk7K}hW_G9+uxWj!pXG4uc>gxomwV0|l z^mi9H>!<~sb;MkboBdjrykG%g6k>IPv4V~hj6mKRPMy=oqkG5r?qfUYiXvXJY$kJi za!&8X3W+2XDq|x8l z1SNT5tTTykw>&_l(clwjtz4A(QZUoSBeiVx(8r7Oh_P6bTS^`)*XU-fs z?d&sG|M2?j;sf8??Afzd1IM_xDe}Mr5A*}i>)=0~06fQ4snmk31=ZJ$Rmwf6;OKvr zDYTgB;Q#yA`LBNwxBd689<*X+Mq$W1-gP-guUJgAUib4;gBCY;4@@e)<8;=QRZeeS zG?eS00~>h6*`kF&N%T1Rt1zR zyO}8O!v+CiDnOIPYwJ1YP83Mc^yNaXUB8ph-SLQ<(_$U>Dpkfy4TMn8NRY(2_$63u zVh|OAHfYfp6oGc1Yi4%`D~?~p87mfW{9$vM)6<1EP_vqPwNBhf#orAC;^7&BR&dh1 zK8~9^gH^kR`PxHI(3i_`!Lr#b=#cg^RNJNAc22?exQ z@3RPXU1PGig;IUgq2+B_ZKv8k3PbEbcvi75uJf9s79kSw!CM|=vfkj+=bhjTl5FfD zjR}GBdJ{|?0azzF(o77@R8~MX22f2c04vb06vM?jpZoa(-1^8Sx^j5}5v+=^HbD>) z5fq7Y&dx?A&-_`MI(~qOVv(`QN!P}29kW>Lp3{lROh(-*pe+wkkWJ(y?E<83mH zh9@Q+aJ5*5q5aw8TCZ2X@x$xC|Lsd&{xWX*@lOsM^Q5s*F2DTpTduqAx<88Zb~*ug zmg}P*`S8r|U3dLUo_J!5JB)kVy?BL5hf0Y3gM^wtn)N5IxV-(5yB_?3C^^9zYtO&v zRQZc{TtXZ>vlNX3Z#i(Ev!)gAO>dR;b3F09c_&+H#qzDy8;NTT$mN&{;Xg2wZv9TPiTi*KmQ_sYM+(}kpRg7pS zC)`;Wpu24@R>v8ZptUh=t+|~L&Qp%K_!lz9IS3emLKO19 zj}P$=w?Ex9;|qP0yhiN+>|*}d(oSU7{zmM`GA!v-1X z?Qs0>*f3J6xWH*Ve_g~m)G61EFrqv#4yv($XkIvf2B*y#;J#hM{9xlwYFcyNqM4jI ze~^w`o^qqX-pNh$w9lrmeIAkI-M!Qr(9#jlQ!;}Vvm`m-kNxEfC7_`zj92zhs_#de z1o4P|t5T;*Ltw=5=S5>B0UHvCP;6*kb;Mi>k>UeCe}H<@;8QO;k-UnCeMct?_P*P4 zAWq@wa0|B8{#Gne7@!T@x@J57aocLP?jNV8Esr8}$%F3{fs@-!te{1qG8WAN`|>-2 zf8f#mrCN=NVu@~BTnDZw8=DOCfQH+SyHb=O^Y(dCz4&h^({Kb-(fuY<2g*Q}l^ ziqo@)ptB=A;T_;63OyiDKf77kAKB{e?&hw$?xb8UU1*H8^B2#NPk;Gc2m!H9Tq_fo zU>PrY>d@|K#qHapVx1$P2$6!JQkkD_*a5karZ@W2uwRt{Z9T=w(iD03EqLF8b^a!n zIb9vR^TZ>auDcOuf$P!D0D+Yzb5J}VTc(1wvU%-+0lP)$$JzC^h@_+mgSAe;Mj0a2 z&Ww(Qh)ui#ViQT2P7>Vy>5LlYUM^v{w4H`d2qeU0T?J1s%Q6?Y?`^q&Tet4zlea%Y z%>se%Fr?-~n5L$JH4r?4=q{GOJ@Tg?vBS#AJ#AX^DQ2MA7)b>t@;RdyH5DC7=UFYFjCmM$tC*{zaj` z&UT9Cz400k7^k%_SO>a9QHeDdFP%sKpGLgn$M>Oln14L~gbahB{E-sal+Y@m62ydF z?aw8@jsoc!Bkr!mcnV=}A!2B<#+QF~A9rooMXU|og;cpwd)z_bl{BrxBX}+DOuQ;Z zJouzGbCnR8GM)&-kXoEDIx$YEQgIb~;2k)p1b+)*h~2pt_769=z0eLF9Y`2rO)@2! zPBjA)ZJ3-aIwP*3y|8yAyPC6R&pJs&^ann81^@JqS3l*^4@CY=so>u`I=eo4XsnO_ zx7V}|z_VOCw(pe5$)dk)72;jXoCKA40~9r-s(aI$-ZZ^&2U#yX?>r_aC#lvdS?9I7^Bh+57rr9=kEne%i0E|Vnb_qsyU^*ndRZT13G&q}< zx~f&Xy|qde-)6Q((bqATAPijqv&|N%YmZ8XIlybgJENZ*`-@wtHYT0zEhcMr7-B>@ zJJ?i@zK|0h-aW!cfAugEN#doHTdUro~(!>}PmAav~Bjf`wJDG3&?ZsSv z=8+8cb|OHn-XO{N`>ob7$|Zd&z4pH9M3 z21a3(a&I#O`vp#r$NOId1WqeJluPPth(Qx7=*>s`YV8i*__d$#^VLsc5b{CL)NM$^ zxis(n6x-1Ii%F4j4?_Tm3Q)BMtlc)H=O$h4 zzWwh!5dtS(jSaj8K%gj&PY@?DH0sD>+p@mb8E2fqrj3t3IDg@Sg9d+q*d%-MZMi!) zZrt!6e=Na&IsteNt5UC$Bsv??W-^v3MJG^@cZl;Kpz!85z4=quTyxFz#vQP_+B&)8 z_S-r2^wUhKRCHj;kGz2uCmv3vTtwmh*nO30TjW2pO4`qzo1Iv}D9uDwbMxk%Gy-wW zuGUt*9Qb8j>pHco&D40(;2a<(ZHw2L-`l~T9krN1LfS-;lK>Ssdsv%-^o;8UDHNiV z^O#ruXbr^E-~8Vji@|uU|7MU74{a2Wj5dCz>!?%~LqbQskIwuItW_;yEcT$I1gEg( zx&forolMmBp*$=?*#I3{uL-ZvMxng`P-hf!_pbfC?WPAAtJIyb$`nULX$3G~O@K52 zNw5-OHS|S_zc_6f|NV{&`SWvLfC``zyC7{b?tOV1ViEV{-i>y@&NdS=KUBby;KY6+ z@CvG!MTg(aLa4XW=0|4W!L|fe|>N>_1KWh31h|W3{5-^ zTDycrLYJ(G>t5i^lG0MuTIK6qH_jL-?_g-`F(;WEh${#LP(tFtnwf|XO%SMiEi=XD z*R%xDYOFbZ&I~?t-m!fBzKvYJeu$o2gc0p5i!mf5p30XdkC7kmYgF?$5{M>J0ppbh zpZwYVyz|=I87pf#^HGZwFIi~+-2;7m@NYhY<^ZOPh!AVd(Ek1Gn;4t&xu%S@l)GcK ze>TkKolfbz8A<&7Hj}DBpee-5uwje?B{( z-0`#@r?Z1`8;9hs3Wes+j7bpL4p9=mV;siV{CBy zuYPs%^sY@^r=Na0t5&U|r>*<^dsp340}7{}y^`0z_2txRbx>hTyL&1+xV6358tD9F zm{0=l*|(oZ_KbLiJmXu$>S+%&(m6IN^R~yP`uBd8tu$5(qd|jD-2MOy`+GR7zni5! z9n9-)qdUrx3mkvFW)d2SA3JC>#X7ht4&?CwO0v4Ywdl%}Uk~z`t+hnb#?0;oo=)ey z*{!uttH_pi5lW3w#!5TfeQFd|G$DpSYmgikP2k5K?V<3)jYE9=_D88E2@*xVOQH^Z z@n#1gNv#9}h!f5^d_M0y;|Pvl*h@nT6O}kKUU51D@)VRs>gix1)9JT1AqsMYDo+#^ z$b|)RK?hM#AP6Fq1c0J5Ka)~*AEWg>Xk8_+0hQR2Q^FU{JC;>PjPsTI)^Y2W-Mr(( zWn8dika{x0&haWUyB5)w@AZkG?*?H!?ybc>8qH*VjPc428gUgRfkU^;R7E=_O$Riiv%rE_og)!tVV5HW%fjySwZC!y_Y= z+ittzWsvbn?#yfY>6wQA(smMSCrQmOViRGRRd$Jy*qL8x}4f3L;b2(}L4CZyWFv!_K^-pr^)?KV0 zDYCy(C6tgk?QL}Cgj^ILR?t>qQZpalkw`n}(%N9nBwwcPoK)K zK3JBcsGBPLicdJ;8&1j1f&ZMXZ&OqV3W4zB&HMQDovSHn15sS?Yv(Z-g%$=)we5Asu3kK-O38U5h zKujU(^U0b<5oPh&UZ3 z#A(|4PRzLrX0fAG=l?#ifpeG6Wv~zu8#e+GtiOiMc75v7*qv8w-CyPtKe?Ch-m{*G zQiJv|@cIHNF2?%b>8_*lGj{PAX|t=OG611?hDv%11j>zMilq|!Mn>GMKQ-I(uPbuE z{gQP~y)NKmTaZ#^>Wz?(V97jKI2$DJiKRuXB2q$9EK%M!;$COnmQ?gdw9)rpcG1P} zTf1R>{JYMf_rL!NuD<&7BLG)@;*;EQ=k0$qXRu6%@@KdH^E=<|`ozaS_Fvn!ZGAa_ zI&2YU`2vU&kkGZN_Km{B8$la8qko1RckJGzuc-0mkZt#>M1xZ3zTf`fV zJ)GAbxsci29Yi8n?YQ2F6)HNW8XIbj2K%aYHjR{6H!{f+#WJO89kG^W{oR~6dj`kM z>St+J8$sl%)I@8qWR{MOnxDy}6`2UiG!+BWz+sG`w_`RldX{427*Wbw5_ntVDRKwR z3QMbm{o_wis*j-p!Dw;qcICiyqCyNYSVdK~pl~`ieaWTp}^jR;(96Y7UPpf}9fS!@zJA`J(p!MEH zVFTw@C?bRbyy}O)Wo9noD;J;SFdcvr4@6Ze6OU>O6a^nNjrba^UdmI)tpjN9fJTgMLTJuSbr$x7l6df4+ z(~e3c*o`~j@h7LYfB<^C;OrCN=%o&boA~=#8`={?W%~}KkzjTV!J4gr*dP$O>}7xQ ziy!^)e=nGhR?`W<|6jZJF@aB63)0hrJ?*F_CshTYHQeE4mM%W* z*AG4NVEQ0ftd(VlE&J`{ z-~1@1e;pu%Pz=}@JKzd#vL)M+Wp%Bj-PQJX_tu#?=ljPwGk5MvPT-g12_`$wvyUIi z+TA;I=g#Nzd4JxeT=s4LJE3LV&(S(ZzUH;}AQn`+-j(DK@3gcCT2HDzpqnv{~PkVp>{ipg@B zk+RRh$yxSI%rICekwUPbG0T$13`<)ZS&+++^*lT&Y;%D%@6oOykO_#?HUYLscq+}J zwv8YZQVM5;BITTZg83!|jhSQ>r3U z%E|*x$`Rj0tZJwYozDND8qnU9;pVH(=DbCnjF&2P1s}J+7eZh{w_=ed!68h#XJ~R> zE1j)t$f^dyFpPcsnd5{Ptv&)_?BFb-XkLTzBsvTkFAgwU8X_>E{fug8^gJrs=dbR0 ziaYiVa_xnidBwU#1cWGZbTqG^G24#s7nv;dGgBNzdd}m(h&USAmrpv33O}3=knm9a;k9#58(% z3<_n;ub+azDmgmZTke~foWA&lFS?RDesu-GM+QcD%@6NGDCt#pd~5zgvKroAmE(2#A%XdOSO zBjSK?!9ZFV8_b8Tkd$6@nQu$kGY|% za|juB+6%4ZZ%Ipz&t7pVr*=0}sJIC~df$wx?@nT*qTZk1m;fOZZP~?iG%iAlEZX?B z6;1r_IR;WU=6Jph(QA;DgFI8kqvR{2?)Q15q`(t~Z$EvA8z0)mrAxZF?xK_EZb(xO zp*hn*u{ukjZ5pASj74nGn-Fu(C6&b2$cSfqy#9K=0r;;wytLXKR>Knv2wEE9tP_zkg_fb6kUR+o2H=^#x`(I)^x|$P`!GHU zVA83SsQUiz^?R~;^Qk=f)m^};Nx*OlZ|9az}h)o$4O>Fla(3Xc-KSRv-gPgV!+A&OgLvEt}(i;y(*Y;$Z1O#aMNX{v9zVhLiA=% zQegaY64Tn81UVB0=FFXdoQs|iAW?+c5F!Y5NHGW)E|wUYtuk5i>Byy7($c`%wnkD) zqP3lVGL5(eQ`4CMkv8-X@Zgb9xL23k;QOLUTHn+C23Ev zYkZn_-LZ{Bg{qtOO?}(y!hw*X)v!m`SZJCAeCCQXc;4bpd>vSFqO=Z#R;&MPQ8Knc zGDe}P;E6QdE$eAax4ImA?OtOfnF|ocJMI&#)&OW52`$7isu688rD~pu(qXFMEZPW^ zft=^DeRz`h{9+rPF?{~2vsu~JNWrh7@a)tnt%b61O`7%oaC9m$r_Z08GAVu=8)|#L zh7f6#W&R6^XB1j!Uh#tmS=HIhS1v!DvOBkLJ=VvU9(;{4JRGBFhDVHk*K@g)$_LkR)l@s;QzmWER67KV8>^;L1 z`(ol=cXyY#;QR~z_@}qs{?%%=(g+|$8Px8*xmQs^KyYSRH}k}5woPj-Q=$0UC@eH&<>@l zh1=R%F{iFZtXu?(7r^&PF{xkaO9u((REo!jC;0MXyQl~fMNY^2^mx)YZha7WH3Wk5 zR(JEIKRk;C=?45TaQgXZ;z>N@h~#wg7-FJv5w^nA_tz%k7H9!Nxquzpkw_`Yr966b zIZkM6Vnb&$#uyGy&vHlKAVY-;LKzk`WJn2#C$nT!mXt`jMkZ=vY}4f7QjCQqS5?Cb zqxrpP?ZjOoz_`d@BP3EN0;5q1^5rUTzjG`5CkyUj9T_MQgH|>(K6(RGO)BYE`Lokk z^JkluTUc6HZN9K5Hb#k>xliH?XZE83L`Yg>Skk_kT)G8AV9kppHjF6o=o0@t^3<9d!(A%2h$~6nQt8avxAK%BhOL|z*+DthNES*Gy^pwkM zpjP~A#0B?zguBOdt?--QJb1_;@LY4Mg}_5%LTftIkV>(xyNOTT`y}VA=wWoG=g*4D z001BWNkl?ylcU<$X5~I3vGI~ngn?$N zP-1v`hMCzC)gZL*SH$j*z8nz{k&yf))=*YT>6%I<5r>B0z<|9nQV36ZU)=V@6Mv(% z{veP>DOlbEs}@^>A8ic-M6rxHGJ?n#Fgy1{Xl+2-+FEZoIyCf!`N}lk0Q{F9Z+Y9B zx#?4XyW_+YPrPJwY;*<27>Z>fCT9_y?N+uT3_^#P#;j$rF7HJw>xFa{0{hTbU2T}5 zF@$eNvo&i^c=yEk#HX(M!zJ}LL*z;_rX$ebn55l+aD%drr$^;pn=y9x?_&szrne!>3GJ<% z*3(Xi=IPN{9_k-sAYY&y&QcA=FeVQ&z(|EBJd`7!X@_t~6rl+jp4m$^m?bK++BHnp zMb}Ql>9n9!uJXn^w(|7AIAkQkq(J!8$pVrD1A)DVji9$N%~?x&c<TD|Ye!v&{D}DVME9C;jcP3IFmp^N ze!~Vp7+kWXa%&yC#!x7P(5!B4;qjpf>kshg0s6-Z$eia2yT+3$<|Ih>dyj1Zl4}TO zN+c2{TfSkkRA6|vNU2h>?~|wOhf=C~4+tp}0ufnvP3+%kckLv|G)zvyll!ALUvzdX z*fu#i`Qq!Y`^X>u>emmv+8CqAWe_VC!HR{oW*37w&<~XWcJ;yZEP!ZfZt>4K_ngn~ z-@pHv`RX*^0Q{F9TONIk4I4JFbLY-)wzsz~4XXZW+89HrEEt`Hl!B%lq*6%jU`#xl z2qv*CvQS_=1!)Dt6Mzu;nSAiZ*S~(pcfR{izcam!3g`C#Zy>%_nzcdJ{YAiCD&TjA=>~vXV$w)5+|1S(}jThC?JIR@4;* z<%o5G2H)A-_BLhM*xAbJ_C~bOJTsc-fg__lIXntFPiLx#)@3R>M9DOsw2i06FgmlB zf4Q1cDIfBi8wX8o$mrSebOI~T02 z6iX)?fxWRuCSY_L{LmJ8Ygq+Tv#@^vQSza!#XdK(X&9XZKR`lyXk;WmJw5$L-5_ z3-nE_ovv#P;cw^Q^r-`;VM zAMPEbG3B$ksYGsDyS$XACE!b2pGlbFdZ6+)E>L&defc#8Xvj5?jav)VPP z)&wMFTYdm|ylm4lK6&XTUbJQ@9jP?Alw@gRj*fJShmMZ%qdon!Wm2qZZA55AVEh`< zPt;KhP{z>Hej*vK8EvY_h}tM>Z?s5ElXWOetdOX~6l~vxhf<1)&NDH4n6biP%KnsH zI0#ikW@JdjoUo3=g3t(*fXi1c#7M!X?t6-CF3ow1yQv0M%jqx)%iM%g!@jr9f;aK9 zqS9-pc~g@?x_=jQ0VCq7&=_gq|JGcZ!I=QmKr6oze|`5;eD0ndJTWj%F_3n6kbu_i z{*ef!QQAuOgbCxxUdGFXr~$BVf|3#`CFMeq(oEhuD~H;e8%g_pO1L&$T5_#OqHH2r z_~TB^B3-r46Ql=~GCcM)6v}`wjg5_R;lhPyfBl=^*alDus;`=wnqCV)b0c!iQcO=L z5F*L}42-~R1-9&n?je2ZDW}QpJGNg9%oqRP;+Q7^{wE!s-Cc~0jB?(&XFvMTLyvDZ z1nIhwq*j9B$aItT;DXJNZnV1hr*^^Mm?KP?FKWzN-u13`@ppgs+>H@_%NzfaFMRoC z`;ZaRgf_@reC>NTu=;r?v7>L4(Mp*k`683EK84W7QS$q2M+?n4MO!NC zqI8;-Xc{*Ny&3EiO2kT!rR%F_K0{p7A)nz9Fk5 zO2BRVNBHc+yXbDo^1d@q;NmM7Hamjkqe@O+J%+lla_{0J+hboyLG<}Pl)#H z?sW()9idSmj7DnB$%{L=?!0xJ(z}3i)h9@*C;$&hLmHl$EbxuT4`Muc{mCm?)z(NQ z2yIxA7OoG{vD_=`wX(QJt*Rb9WTR5&|J%5ap;H+GnaTz;yX2 z+C(@~#0#jQNLq?H;yh-9=n;+dpwcuNH(J||VGyFx{ z`&S}R!k~=R^GjnVd?B0xlOqLU44%8DeyPOF*cjzPnU1!0T5^pxvC&_t$ z+DcWc+Qd=T!~s;H{mg|h8ee5&Ybmr8V{LEaZ%;b=QShWPRag`;v92&4rRz{G`X1-M}m;dzl z;kp=OyyYvF%^W^-BnyZa|Iww~^o0+AUqMRCtPXWR#TX`vCH7Ag*gKhL@8k^6jLk4o zEYqD$b5d6u=PmDIb5AGB8q*+C_@PfOtw`-G-j@(i@8kg2q=MfR}II+AYB61o> zN)$TLXnB-^S;nXLQS>KKDjWZn`bS@aP0H~%3c}e#r=;YD2X^pJPaWZJuh`5>Pgq1T z2%SHUK!w73FgYV0NOA>8@B!=}qGZWPN*JRC(%>11@?ff1<>&hbx#f`q>>rtMk=Dma z7j*F_wTC3BBkjWO8Hp`tq;J$?ru^_*(>Gl!O$2&Y|^GN zn!s4jP1Q+ijWPII*FHnq@@tHVK63^_A9nADJ^iuE_3~vazi{aA!M7z(MM`;x*5(Q& zAl$G5alxsWg*SpcLm1CuC8|e>ZZ5S(ba|@goJ1(TQhh{ z(w@n%dO;IsEm^>2%NFvIbxXNy#X@>o8rVHP#sA%LfZMnCaimyaNlT7(ZH@f$&?q-O zxZOtniiE|2NVwFg$UQ8iy&=aJUvv&9cC=8a`gKWsbufR-9aQ z%`!D2STy0+5yXgB0@7*9qg6#m({j3+m(!SPqcPJ)bEcEVOa~3AR??{~3Md6tgb2BK z*+MQ|(aqMO3BLIF0SvIIyUE(r8s#FC?S$BrN%58K2l(6jc4AV}tt_HlwX`J4Ab>F7 z#O?*W{hYPD=d2SrWpO)xU?{sVmKgp`5d4JG$@^|nT-)Bt#mg5^(E;DvHNY@;T~d*aX@i!wmk^DtUd zDHNC;9-}ZmiC-=`8LdF2QY>g`Mkp1(k210bc0W@Qtpo&~lqiRyC@F2qq_hN7Ej6f= z+h+N&|1j)29KZ4nC!Q$2d&`%v{PNenS-jz|Kfyis+|9e+{qA%2?c4wEVzJOvSLiVGS+QaTSG?c_TzttT7-Km7^wSB$5GobSYzaEDNnije zWx7}_rk=~!W6z#FtY5$WoS~tin~c^-sd(vYE@RWlt0|WQgcPw{%_ip=D#j(~xl}$+ z8CJIESl!ydHS3l!oG z$@^6s9jsG?GIWgmMA%Lw=_6SrOdZT@j>l@B`*(G5xpUnJ6K;0Mcs|uSq_cSi?YUk; zp{?PMBUPnjj#RpVM$rygLtp}m;WSgz2Uy&c<;F`+X6N`c2PR8Q76W=4B~_wGTS?Xv z+`9WH|L1{S=!|C{rVjF!2($^H3=7(_yz`88TzNt-nUo|945eydORY@izt?1Tkx#rq zB6Ub;3`L_cQgZ3icFteY!JP-jc=x|<G0Ay0@P% z+_#eh00Q~xaUu~>bD?M=+)09K!(uko6^w=cq>j#^{YK$>Y_YVwQ z`2FvHpYMPF`||~8z5)2}JwE%noA}g?pLx*-Klt8--g)PZKUc5CNhfXQnrmJn@3`aV@7}d*7oh0qZsGNB zeHo!P7!@EwiE_nX3+p5&qz$7DMTii--9e-90Rlr$V}=i&wU(>bFX7|&KgA9AY_*f9 z%7F1>f)&mf$UX}_2SHYN=Q$g=U~v~yp^xW0@r(?S&NL>T1l=A!@?|%P!Y?E50CDVg zr}oe%mIcOE#!M4o>cg&;F zDMPUmPz?=AdI+u2(od)|!n!123us7;_DQ9iX-{|2kZu9vQKdkBc8Hg+PjT6rEq-57JWPEBLGu2^)NZI0Q z!uT3Xne^y42_8mrSD)l;2tsL-AX7pRI&-R`uJVy{H!?6$q)hnW%YZDBZAT}#>Asz8?HhH(KHC^X1=k3xPC(B|)pLNCb5nNN z0G8-kHJXeBUGXW6jZ&SSwnjQCzVj?he|QMG7m#ktV$urfW05&yjSr+SF~1=+mb-y5 z1lpQUDPxOCV4ckg0Z&S1XY+7)5Oy8H7`r%YX>O6@qr=VHezj#5;45GKdVDHJjt+@R zxnfUBDnxT5Ch#!>BhWV(N&buwLj37#{$%$p-}=Y-!ZW`D_}w`cF6#O8lTSUh4uA!% z(B5KM|G>!TC{t5Y{Nin+}-^{?%zs^#lp{Tx#gB0z3+YR|c!=MMVPUkDcH}{m$1Gd1rAXJq2Z)` zljUJ1XAe8mBRd&~T2nQkwTPRlloCvoE4=exw{d8yP?INW4WXtZo92qui}~0kn|Src zB_IW*swUPCL>vL(IQk;F+7OP*V9%|iaT(oBYiY`KkWy(KIa_ zL0DFQWLjjTdwntC(oWE^vqTaRpw_%a&60k0oaJ( zb<5!XCzwmxiPQj`u@SmEpjv@Pc0#^@QXV}$J>M7{9C+Px^*R`1GVSdh<*BJj1BeT* zIGb;N=dUSN$~7~OIO&fVB8?pPB2ZeoUAblGOPBZuDJj@GJjGw!{xGG$PZ$R!)&Pz` zW&%x5W14SYa}i6Ma#TZ|fRM3dB{2s;H3=PmT(FO))lP&7ibxaSbk!z_49FO&##kTz z7^QGOH#8xhNU^l-6w+Q6?HtpR`2sfkz>)NnN4|8F;hBA|_pve5p(B0aYP%=2-RWw0 z?avRYc0;#p}Cy)ut0TbwM+sg1|RK@j}`a9Fwq87VdpALb+*BpruA> zNq6%anzP-mXy}A3zT0yPMZPk{XmLN%6exy*+xHG~%aey$+??gT=dI(Uu2!bYRkB_a zosG+BNOxLSKqtGCj?X8QV5&UCWd0C7)x=%o?xk1`ntb5R@#&Ao?8G}wBFHByw)TE; zu96xW(~8GOW_k7Z@8>lqui*OUZK4nc&H>a~Alu??CunW#J(@`=GD5IraEh-!et<_0 z4l`A*)*E2C#zW{xO=5qyL|~&v=450G%(YGBh<<7pplvmsSdS@(IxCGRKF;AYT9^ zQi-WIyx|RBdoG^;MVDL%Kx=F3y;Dc=J%Pd0H;i-KDc zFs^X~GWSyBFJbDtf#mB>Y6@$mCUi|et)Va`j3?8smer)Zw2kDA3zCSR^-(&YRDwcv zl(DHpF}Y1k2(@*g6JWz#u+wDLgKO`9nn(L5A?ty!p%ifD@-F`IC1>)!TShi(qdwxQMgV_lKI+|C|oa=Je(V725Ft}@o0v*zjZeeNLNu<36 zcxbL!znFh~>6vsirFrQ;Kf=wA@1rH_5t<_XGut^jvlHJ`5i(^x91Lh>7@O^5bb2qo zyIwI?5?}j-8({Rh9e1Pty^Q`}BnZ{cLfU;_L`W3U-k$>UzUIvCRzCNF)4AozK7M|1 zn6y-`e+?0#QzsZhpcPUm+Or-b`6BQC#SUKky$88#Uq4epXcO_G)sm@IbR%m!et~qk zQ%=fijJqG4Nsp9JE~5_*5F8pr=L@*-0@po?SPe>Az%vJJ1TP>Ovxt;OIhUd+3}qqk zrN9@0P)LmQ&?H~kFDd*HE@qo0HNF-y0S&D;0@aWU7_*-q`8E2f?Ia4fb&t-sxL%q1FTvEg$fi)7J}>Qgj3dFdKTCZ=h#HT64TJy)V}NIci!>gcfIRf zJpAy(&zbY@?Cs&19Xq-B(u@A#@ZlrZ1iqbM|L6@b<`sW*34Tzio6h3`Cu)#uJUvUD z;74fCDU=M+QqU+pc8ulugEO(jjZH~xfx`EB``H`#^UW)mECvxu?jGnhc7L6- zAJi;S6U_D+mC(4tHiyX{&5w}*O!Osnq98?qHc`(|3&&~A_R!Y2+#(Xubr7)?k$sM9 zgOG|+Fw5}N9<;1tQ1*8U_qtsf)IuU*=H;*GRrHL7_YbCLo*Y01+^pKfu&%zb$+u z9QYEwSKU|q%9HP9J$t{-cyO-marAQ&UIG;pu&KM1a-g~8$%DLb?Lso1=K`9XIzcEh z9+WB-zVui>Z@c|*b{rlhP?jxk=D_&z$vBilMz1R(E1Kl)Us!5>rGgk7h5k{flwt@- z$Veh->OqgaN9zkb7$yLLTuGJwdXF(<8q&Ne8O?dPGf(Mqgl zi-^G?#Qq@%_hP!cd&KbYkQ72ZH)AYQqCtl8$6ANa2UxITAz%I84Xj_@O{iI>E&3VJiL%ZE3|osmhHH z?qO^H7_ZyBf>)lr3}po6ARwD=L25-Y7)Qxe+@wU;mxOe)?ri?8?0}?~gE;=#in*53 zxOI*+n85IwA3w^;J*|A=;**)J2BZ|Eq~vJ6#GU&__|~=q93G#7RHhbyAf?L$F*S>V zxy;1KILQ6K$d($dG35%3Pa`I0tYSh*XLBuTTm+IH{1T2Fg&hZKpO>@;r>%!ID_}_% zq8cI{*&%~K8AA$4X_qlzY>1FB8fi3A3WBQ7$k-UgXy<9PGE=)lclQR+w9!#_StFo6rEJy`xQR*s$@nLg%}|bpQY$07*na zR0#9o4}au2ci!)O=X=B-T=e{#jnU6{)sahH^#`1|b}6A&7_I9HS!^5=4_`GBUA$v7 z#zK&;BWOrV9vd0s*L_DJld6gF&0IqlNk=ZryUy8&B8AWbAp$!=C$!(m;vYf5zgg?7 z6H}G0eMN>eqV``wB2XydyB?Po?bFty8gmS>U3@2d%Q1!hruT$ zv-GsAaoZg2h?nNL4$ghQk3E-q9;q;94uT-u+8|mJ7>o5^cXkZzk|b5B}Aqnh8Ki$?|asW;HdZ~rhcJp z`l2ZmF#W@@?+8px*wvEfx%9>ewbJhAD?lOADN8iodB`@_anqi%-`kY6uSy9*B?+aZ zBn(9%CC@3f@C@W2%B%$X~_5+TNPf|QO0^8!^Z$R_>%bx$Ky$288^P7C6Uj3?9 zk8j$z@v_rSJ@u0dy1L-$y%2^Pj9$5NCAZ!7^FIgXi~l?V@Vi_D-_76u{pVP=Xz|r! z6XQQDmdnXSq?`JJxciD8UrUxO;q=o_f7OqF{NsPV@WP9^|NeWQQ|Eo!>8G>x@yAJd zp7EW+p>fS(ZoBhyENW?_;#Zw4OFPq%i0kL}nNGIkW>?FmPMDl{TA`JpQF*-QmydJn z?n5q(OxNGW#zN#&eg5K%4SevN4b1vJMu3XacoRh^Ir+zO%sN(hVqK9WlqEx5WLWoa zjG1ErOTzM3Xt&F^jB!IqgKVX@W0Q+Pb_GV*`$QVg2IDxw+u+1*O2IfnIMXB7C}=m~ zNx~Q{X-=oOW8YC8=%3(SXPiK5P7)Y_2@EJ>f2MTOL=9SMr&KUCGNw=%6CN`?*ANmx zPwNJn(+kihh#BEEkAQmM#1_ubCfs2#B1Dt6p7k-=Eo7!N%5Y&H88lN>&2{(g;?cuL z`OFokamn%?3Zd_0X)@7JnPaZ|Z*m+D?Rhp|0OJCkjB8#68X;0>6fJ4Z7alvnm$n_` z`g1q(<;V7OaC+M2SV&ompw_ZB)w|S5Eslo(*!xL@4k?fZiWSVr1Y)Y-?i1nOe2d>$ zj;X033_?Jt5t+1g&wIMB_SA{`wAN-gYa^Vz)~?iaJ;BiSR|cs~oClD0&81hWGBq?p zaCp#8{yK~?vNyfyO|SaWm%jAR0PlL|+xfe{|A*h`{kZkkTh%+>{*ESuSye7qwoXk> zvTD`po?W|ljlAIvf5}(Aa`SwlnQs7ocaOzAy$lQwarMiu`OwdQcE_86C6!V&g87MJ zP1ETNl}fdL{rU|tpd_UacHK*pZ(-PMoQ&4xF>lx3%~>+ zoeeo|d)39XWztlGa4vpdoBBk8e3+>75fUJxO!pWPr>5hdiwIC}oN_#eK(N|sn|23; zk|mudlT{4_MkBBREZSwwTbDR{K}YlZm?{k-WX8_-&aM{|I`_axeP9t2X`md0v^RKE zLxHc|L?{htg~aN%l|v1LP-tUigAtLED7eP$UreGfVW6XF84H?Lf({*8gR`C$$E&nB zy8|babcN8kARZASTtcB#9@U`0(b;|Y!3>RFikr6`;IohJ;XP-cz-u?Ipz5T4M(enF zi1hL`8o#?Q{*BHcc^A!n-|E*kb}BcKEYhu>tolOZA$eqQlGok-I20?8k_h41Yo<-2 zpgMA<4xIsyYh;rRK!gB9ISW-E#%5r0+9ETass&O-pB-ehVA=~ zIbA@A?hed(n_>OR8lUEPO@MJtkG6b(RIx<$$RG?1!BhJo)HMYqqRU{$-uvG7@|n+k zX1*xQHvs>$j!U2a2i*OOUjp#5m%Z%fyMBHr`NC|>8EeSq#3h&fLE-kF-S%#PHEY(2 zef#!2=l1@ud;J^u`q#d~ilr+r?>lnv&SdMUy%aC=(oH7B*3^P{Jz zsQ21G_7=4dI8RExxqUx>`_R)EJm;BTlTF2jHsvZGyZm%scj8JWDpjNju{I^9#`_nd z=EjRjz|&C_aBYki@l;lm8OB00VUF{hGzmC5=`Lt$jx8EYs9Dgmg7&6m=)e*tE#$9b zCYo_ZD-)%D#tVH`*X|0i?M-UIHcD7~Rv|4(F~qqG>cC=75i}q)B98gh4*8I^pJ}3B zAqgESAhDSU5kEo`(3xGqg4UG?ZP0EPY@DR-c>eu$e`6rYX4Aqs5jrxXy@no`knz$0 z)1?8jUdTNMC-}qzJ2|nZnQPDANOwb)lJDDqA&k8qbp}oLgruG$5uMuv2R+Zk zpIS3uV!lK+t?+}8M+c|*?vBIUwg0G_)+II4OQZ(S$No~l>H3l|i6a0SM7aVpMa=Z9 z)zT|jyV*>Aa}^I4k%~pz*l{s9hIwkQOL2sjmKKc0=`34>Isar>z0AIrsL)3t zKSmP^Vcq{@DsO|!4iDP=5@&3tq$q{joDXcBuLAQ8!2kH;s;jQzr$7Da@AWx;VipG>jODaVu3>8155-BB32vWEvLdH9MX$+yT zGD@M1CAndccxY`f__X8}(c8Ml?u>P z@5LYB?Qeb4HPuR`BVvuOzw`{QJZA$lKd7-V4En7P9X?sYg%e!T8xcZ6w3XFK6R^CYktUU4@5B^4hNt=N*c1n6%A}RYqFkCy-R+#c zu!A)Vax|qpluS_!GyxhRtB6oKjkn_gm;kLjq%%dZ{ZT+pwbIkP%EtEU8b81!A?x32 zws5=;5jtc-V~j$|5QJi;c$Bg7VHAo|;L{;9{KJb*;_n~b&!7Hu3txKCW=`)}K;Bf5 z)F$LOr^uxyI(_FcYl*nflO&?nPDMI|!V>2~n$lVJO-=FnEeE-4&j=M$wYQE^E_V9a zn;#>h={l)&(Q&k|2}9&q9x+=cj0$}O_a`o^iHMfQMF$&&Mq5H(;M;3(WC*tIiN4oJ zPe~nwBBi_+d&)c8?ph=?ORioU;ked`|#)R_~EWW@I%OXsL&R2K@Gw-TGNru@XNzTdFaRpP1zKI z(RfnOl=f&$r|Hb5Y0jj{C_`Eaaw22AFlwOQlh&n4}Gsj#1H-I6HKnv|u1;%CE*r?!gb(-P) zZY89jYEoxJbipM>PF=6bjkZd|dt+Gbc zhj_K5jU&H#iiu*CFFvu0uRV5vs$aD+%En6&R&{MHbzG0 z^T+>$DLuwv!PKkGYm$UaI_lEr6l=JGSv+UKBW0r|>mC16IsiIH+Oo^e= z6cfb?6XlY%p)nFAC2cuLPcF;imK@8P8|iJ%(%q1uHJv7-B!UoM8>+hYoHuS?FXl{> z(V9PoPMw)iJRv(iLtEn#rvwP<^96)P3Xh5|GBUk~P*m}ZEq}rlmbkEn+L`J|cP(u* zQL2WN95gJ2;q*nVJa6d&N;+h$=(Bxff`|I2xVLYZuRqmCQ(ACZcLx`)=;p-UCYCoh z&>$7%076l=)3{3s)G|ZCA4kegJe6_Cw&h}om;m|PtpMU!UpEa40aB!>ge8V&b`$E* zMeJfpbvi%+GlAwWPgzZGW0q@wxr=w6S>cr%ms9fnIFF&u8X$5fF!fbgI^-gX3Kp1{ zu&AU**31hd1{Xhda~VVzNMx0ys4?F z62OroN2pe-_OfJBnC2{`yx3~nB%`a9LQKzM4h~@khGF*+n3yK|2&`JYs@%R{!3B>$ zx@Bnoi8$W?%pd^81)69;K~eA>^81XuJa$nsOMW zVkJpztmP>foW%5xz@ek?%poY3<9GJr3ojmS>S#Xywp)L?Z{3FV?0#lGl;^p2%##4; zkN-#$P}#r#VA?)NQe>Wg9(R8FO)P9{q3ruLH#o=e7D%k;k+zn#IwG6ZpnROP%?L1B z<4KQ@fXlygA4g~M;7Kg0%1u#d2o2p08GiDLi)hPwRJ37E#^7=AX!kl0NM+sV41$?z zg?uGs@Ax#24^8v<&^Y@hOXMqMdRrQ}a7i~8FYDm6g&i!&WeAKW@HL?;{ziy|mAkfk za-r>%>68R3+D}J%Y5PZQ;csc2eX)R}Q@hAlMo=;nYt4c^4302qVsjz1!IL&`zHg?$k9H35<7WmLpDxnd-N>6yUBipl_K@`yg%FepZ9xqc zfvnP?TIp(9Mq|3eH8?d!yCqQ8RyvNzt1^=%UAVMs8-$i+V>$8pp1#tBfy z*+LjtyeD+cpD>n&8S?_%{Uwo9L!YskJbHQ>_3J0mp^ktk@rfHhx$eUs{LmhNkKOQb zI@(*kZ+!jhH*MXv?cD%k#bV4AXCoGMI`m4rcx?#>hM<28`iJ0|J_y5z5+E)-|NIXu zU%vcv|M=~12Nz#@3HRQ8&-?@NIe5%x0n8u2)p6Z*AL9P|AK-!upSR$NC!V@CZX#DM z;WaP6lviB1nb}eq&oR_JDUk*|;~-BZ+-kt008x-n?9ncT-JhEfDIn*0+;?P*?``kH zC`HXa$*mB=5Kjrd`r>n0+ulSmG)QAL&?1=)5ZA**lrP4S6RmA|K!_(5ttrKt_C_vU z+083AEa8tfEaIv)i|J{|@bvgJx9uO|yH6hCp}{HgrI3^-Xi7`cN|F*1+|(|yHnCD# z30P=++8UPAnC-NKVBCs0Hos5|P48v4JcOrGuK0%zQm>`d#iTW3>bV2dWNNWreZqlI zN*Nbn6L}UG%O^0#uppb}vQ=GNvvDbl+MC!nk>|%x9_D-dM({AKY-yx9<+-pVgJ%>~ zU1GXCh96dtDosjymgQ+@;uw92wDel&dXpur{7|`KtbwCbPg4#iK%|@vw5gpx37DRU z00-I_dKyxk+}*+l?%mFY1ud*j4UZcJ{hSX@RJpp_1;vk-vc({i98Y5Qa>k>B?8>&R3Bbq*Mq`GFzNwdf+G=9Y-u^ zqrIWgMo&v@v~CndEd^2v6cQ;RrBYPGfQhMT!s%&vY$v7~8W6(sGUAW__%-MJ-RD00 z)JLwrp8M~+k9+UA8{hX^W@huZjtr03SGK$t)-H#pw3Q7i&vFR%_QR1e#J)qY=Wu)< z84#;iufF?3AHMGWAG!V`C4jzzee(~-c?4ko_@8uib$0C@9UEN>KwA^J^G@MMH@%5j z2}dUL9LX1%DF+mMAJ8VaL!UPmj%Tv{)e{B`aDRIkmTyOleh0Oj0=jI%!0&Y95@f?P^6>xcY$V2tl?AK<~l}d5xrI&ulZ)mdll?>6vMJRu}z0_Rc&^uBy)apL6c5s_yE2PrB3DLlz(*5D1$nn;^=f zA__PzpfWn+I-|~vI)je5z542i<15N2DkyG<$UsmLWDS9YERcQg?sR(JYQOiM^Zs$p zy;ao-s3XpRQzuV9>7}afty@*+w|$qDh5}ffFx`@|apZv^RNtU63mO_bB4B9v6!0(C zU3VQf-BeNKdnvC92B5P3_}2e13*X+mzh}PbA-T}e!e!^2!0fgL4ozlgXlr6teJ$hJ z9EZ|5c8yN*%-{&W7@s7a@ku%k3p?t$YT10wo8LiGRh98WM`3C0C`aRJP5)$`E&bz` zo>mN2QfrjbymrYPE?L}3%J+>i4hmi3313qBM>4$V64bsZ8pmjDD1i~j-Z~L_8hlSg zt@pT;9Me$EqQ+V-L6a-^98TxiHZsY52L`xpOE0sVt9b3=nVdAE8Q)i=e2pT&^YbJU zNrUNE9@+dPQ-vWixd}X#MamcupoJ{60TyK{g-6+vL&2m-inyrm7Zt6cu0hGYmGwr@ zC>(ozJtY|TJYrIFW@j6xbu_d4#0_*4N ztS1L($3@iF+2AkG2M$G>^KOS+>tF~*QKMS)$JQNTnYY_1fa71w=J!;Xl-se zE?>wSC7xuJs9rdWE6zFriDX8y8Yu)b>jGSAEfU?d$49eydM46r8Xo7qef@m&f%Vir z66bvWee^&-#`sVp}=oH&HzT>`6=>Y#;2YDGLInBACUeoKcT4&gyDH>wvzA%_QQrXf5!9JVD?g@QsO!5LTJb(EdUfH&Lzv zW7!17;A5(M6?qVtWans9v~r2tNUTUeEO7CKLWcFG)+ii2WmpQwG$y&>+~fJH6Xx@| z$F}j=`#1CRodbOOWs6xp!+<`Olr}aha{f4d6Qd+!O*Gfcp(fslZ~~MS!*N6mg&^fk zFq+;^t}toZ@zP4`V%qx8MI{uv^g1YmpU@Ja6;oco3GEGBvwSvRT(^rao_8!V5YaeZ z3P?JVy`w3>fl3-x%UZKm=&z*j9c~2Koqz-s#sjWU&MRF;7#U4RDkuYdc3m zJ62aBKnh7Foh36o2G8s^_w#&oDow%j5Kauw_mGZ*(gBVzVo@P5_R!b}g;W}z+-h7# z1zKw@uDRwN-~0BrZ~ki`1lPRd?R@*@??k8fp7*?muYdjP#q+JHMz_?O=dtx5a%2Lv zw-0vp;%HS=*N{aBNjx5B-r_~{4OBq?l@UN?{jXY!7cXWqn_HHioOpI}eB6Y@z7hJt1|wArUP>78nuH^$b{t{|`Z5_F?;GN0+j~gH9j;t5m*YB`a7BRD zF4B=)|M1iNYe}356@Y{+ju)bjbGe?vw7$8OI4<>Cu<;CVw9!`* zR=!qA5XwhL86_487vfHg|J-$mFFn4U{>cpQI%yGaSw5GVgdhln4cun566icyYwF@{ zG$*^LvdK@{8)Y)vN5)GL=m3{ENM(a~h+EJoZK#Y#Y*jkcXApKs5}<_>UO7|YyMm8D zw4Hg4)x2x@d~!Mf4gFJDez>idTQ?uTFZjj)M~0kIInDH`qzf>e)>mo|99~ObAu|Ee zf+Zb0Xpv~k^iafX0yfpxkA7$)YH+0Zm`mppKmHinXUqVtaFlsZM+%XF;&6W-`LPMu zunQ(r0NRbY;=&6qdid_U?>g&kZ@Y$DZu$06Kf_nN@r^(E@sECVIRKq)aOqhvGH&F8 zclN^INZ4aDY=_nsXsUu8z2NyIlgY!Mzu~j5dhZ9{zp=6-zVufG1Xx*r@EREzp{23m zi-Q9LD*!=V4e{lRc*n)3bL^b9h!Is3g~3w&th$<|E#-Wlv{F<#k|izmT(+p2*-drq zA4@Zy&(mC0O>Hd3WTC)U*KK1w>)XoAXv32)@TTSSdEctVOn3z%!x~X+-H$t~Pq{&-SoqJV$3;4NVCLpO3+`oU2*-iB< zX|BPK1e^p?fW)Doa!eG4$>k@R$PF-_>8B9nkVqV1y#uskF&fxTjrqOM;>c1(0NOzd zKN8$o-HEv+_&ym?1540*(`GQC z+M%S3%IGO51m=H75=c-|5Fqdcc*6W&5Q4npke{4HZQg<2*I)j;VlJwy1zA^zZ*6(= zLJ>HUf*&w4FhqWI3^wnEaTEMwF;|>&@+nU(KW^#S-LvNfKls6|&-vOX5>-F$@9&QQ zfFc%$ojtI1pV9XRNG4#;3|Kr5=5<200DU8X#`C;A_ujYW`ggwLoov`pk^8T704nQ$ z#X9rMGsPp1Jfh?ADqSe#%oe%)80M^6%n$$RuV|{R#`isrW|UV9NV=?eil|g*;!@%x z$ao&>4vjFsv4+XK&l`XKuxYJYuo#|VUULmUdBe*|IucI>b{t$j^+(zUrj{i(e__?H zj`BgUHnt_EFlEgHp{L=%M9GMOh}94Z^%y*%9XsIQ$N)!6dQ%y`@$?>+v^MajrQP^U z*GizoYB>CehNefw5kRTi>-4t%^zX~BdD%}T4v0mo+tTAlymWiafE<<(Xuys4MLhKmOc`IQHVN9 zhk)XXBqExq1HKQNx53(HAe}8ctf)z%&pH7)Zw{i`MQU)gKq{ZY!9n~?8lKo_+bHQsbS@6;Ke$YGGXZOADeJ?lOXsmb>RY{%C8L%L$mcYO`^d2^sx+(_qWe)F5T`|i6r^UO1Yef##Bs8m-A zi@Uh=Lq0JKIJs2Q2JMt$oiI|*0lwAnay0;-^Crt!lqgt>l@)m+xD|}cnVwr z+68=sbolHmRsmYzfL{EA(qqg5%!MYs4DC4C&*Infdl0(=DD z-`LA%*Y0FI=P{{#5HX9n5Rvyo>9LMHz777m2+9og69}wqv2?6dv^11KX+^K3#bQ`7 zC?rP7vhOfFwGBol5LTHWddWRs(A|M(;H~`s=ShW7n=-TPMawV`c&*pnnu5Qcx9xMRO1* zEXJMDVxYJ}z`zJ>*lCP^>^gbXs=?mg-v3wG75_4ptXzW1`hDxxTW@7xV4&fVM;-~H z5^eSjT-W7|FJD1kS-@IZjoMMN^setE}k41v$KDJ&^{=^ zD`vN`dUh*$rH@(}PLC3yEldP@qdZ885+0qlq5!40(G)QP#nFK-vyT%L&2n@khpP5H&gXT@l|K#?kVTzOnKKY7Dx92`q= z&7JGnKR!WC+(9aVz(L_h9TOq`wCAG*_Hj)Jb#x3ZB?(vJ`5RmxE&n&vZ9%rO7qpjwz=c8|aNUbBRfiK*VE^${=1P`KM2Od|q8`?b$1qFMslr*I)lgUteEss9UI|K-45)@f_qU zPNw#RrOcc^m+C|uM#m6OZh@z^!c;1{SU^<>iVFGrM~e}8?)+V3cDvu0_Y|GuU#ERl>rA1+gZVagbVc<}@ z*ai;efbHF-HZrS1TX|O%wuGgf!K;#%xGXuEEOSVFF)g8m@ng{14|<_jF#Uc+}^ zcREX3Yq;v?Yq@LpVQNA?eFV&WVUBM=k{WPH#$8Z8ckMpRd+yo52Y>I&x5a}#zKZxGZi|!dj$Ak&`F^sT~3%J?Gvf`tp$uQ+!8 z(iJDH;y1s(PXnBN)+@ws*4)b%zH(#xy!i{i{G%V-z9yH+{&v&m&8wmTmH^rs;kbp! zGgs2Eaw#nf=aM*a8L1PNkjv)a;9>O8MA=nnX>Ju4z53#J{owZ7-uL@no7cShRh5nN zC9*0sz{+~w^{<~aA|hM2Ztv6v>4t7^f|%yo3szI`ed8G~WC<8tDlfC!rD#oD zzV{b{KaqWJ=-*y`I}vsYREdT_N&aEx^bTkrB?1Gd6PiFs939FKQ}hua90%CPf1X+X ziz5RFJKNUdUigOESb$nr^67Jr=ag-S`1k``n8+1)>+-ow6};b5ZU1q{R|u+O4hbo^ zfBz6)dtw*chbJkZ5i$k_VPS7?Dt4{Hv@vw;lSiIYX~Jazin@0QeP{@F_QKF4IE$dM z7TW6V#HpA>YDt;XpH|w82KtBL$(`sz0YKN(CPjOD>&eeP3p;o2TpwN6i8MN$g@Z%r zu~FE05HUDPs9m^h>9WJu{lf=NdEcAgsQ^wr^;FibUCRRxJ*dw+=iJ>N`M`SYT zX8^KA&8YSk^xRHlTO-xY_0%*p;?0`L*xZ@;4Ryqa1_{y`kVl4v$*D+ z;V?CcI8ALGw6%4ROvaee(ec#J?zr>Km7TMa094jr$Xb5Xs)As z!5mgE=^~xan_wq3S{Z20!eI-Fta5{>+FtKrC+AWR0dC==ERgMY*V6WW;VgwakH#e0<$ z#cDs4=Pj{;HTSbYM}raf5ja{Qt-rbw5TJ0Bv=qjp%i3Tzb{s(W51GX6 z83z&xL_-oCcR@M!?1G3%s6_}=1Uw(s?*!^%hXhgf>+Qg zn-`>Wh^&X$ybskkfW1_rySv+a_L*lp|KtCBEqX21u3gK^UiPvttzW>Hgl(xgH`UUTvB-JCSDk&#Ru zgo9Mz;~=bDiJ*wW$6DbQ=kYocBr<>25!-8e!$O2eMIG|-4c{LN_#+x$li?Sq4Z$lX1tY_9lf_YESd66jn2hr8lmAdfN7ah9!rf&kUY}s*o>(*x(9UT#PJ|dk( z_w*YJUeHoFqP@LkS5HsRG2PwWV$-Hg(Yx=w^UhhdZQG6yWipv!FC!jwl^~G5rOidr)HX#xP=WwgTb+I55NXCZjw`8l95xS5aN9FIJh*p= zk#q)P65`T$*$Xd{`7J~CmtXYfXlYpe0V&a`Ec6YV;J>Q}2FA*;CMs-B?CpiB1iHQ& z=Cq@=7rkeqH-h6BP~Y0EkjjP+kqH9Mx%sAVK6&w_m+;G9+{FdwU+~b@XEr|z94i73 zy?KuX;0dHew6?Wu=$f_U%)(>WRPqqyzJKgOjkU z7Y_8p?jA(Ji$cHSI=ubuZ|6HV-$J16xl0MBFNf8~BARN@DzKxXz_=p167Jsszj-n` z+PP<+6Wss6Z(}VjZH$Zzm7dAZfy<_~-*sJ0?Z{L*)dtYrJ%^s21JNHp`2G)k;>-W` zl}{1&JeDtnh21#K4aDl|jD&DoBYu4i@l+lsl|kh5#B&Akd}7M7bE@K~syM2;3ctFV zpgKVz7BeHNpn!T}EBWzp^!NmfP8o5ad>*oSCgqUg`5cmoI9{NpxyzM0(G@lJLk@j;OTNURuEer7A1HPX zjz<)2>AGCHq>F-YC}&~sUf|ltv9!YH2>y|Ts!~OB9Z}>Wlm_m|Y(AZ?PSslQDu4dp#`!CO!A;)nOy&WsTLBBdF;_K*t)mu zWu7x<4&S`#CSG~L1zd9RC0ugJC1F-+1bvbT^r^>!>)K(C3$6ou`r+X%(NSvaYsCEz z{5EEj>#{RwsIO&mDji~Hv;!iMOy;N3skZvsS|(E|dU_7sK>9b!LLrB<1WfIo)jYR(T+wa z7w4&G@kd5s$9~w;cf|X68W%@bcFvd1st5s9)=}3*7rlmEyLNK0r|0^pyL;?B8tRk$ z&1GjXv$c*ufsoot(3;PF=v9vu!!ZFlw4@Ca0**R55K_>eO7r7qdYSM%Pys92nz?4h z0%DFVwv4q2uF^{WmOf7D2%s$CC{vg#nYl+wf2FP4P!PD>cGo}~iXDQYaE&ez%h4qr z=MWh9d&%a1Sv^Ioc`t-4CUOXT9Wc8tNq21(fB(Q1mbTTgtf`)Spdw=?q$D15A<(Ql zG{(mtdWIiuK7faVh)X+;DV0GEQT{=R4)q_|0Wd>uGg3-8h)mW<-`WwE5Q4kz`~~Nn zdoD^VmMmUEYg;S#-m@l30>r>LG}R&6n+&u-NJK6NcRv~m>FC z0_dKJY-&Jw0a}9VIH;N=L0c1kR~xzcU1a8WlbzE|zOx;#p_ZUJVb}^tq^A&phfu;` zGM?FvzHcpT*$F)ZM{QdPA*fDPQ(sq4TWjm#iOI>ED?8{*V^wqjD(k50o_p@*^4DKc zRQ#&1fx0R>S{hk8yB%NIO?z7EU*xP8CDlX;Fs$fPucuMmOfWu_&M}h9Mw|FaT`e>w zT+>oU*tx$(Sp%C=9)CFwp`^QDt8y`2m`H1*GWgxzc@ zX;m5(qO9O_j%u9r2af=xFbMv54Bg%e$IOW^8(M4r`TBohVBj!PNEGnb@4SxpzyH0( z8aS1P-)%(qkDAuM0KH)+>^)@79E50WYWm5Er>s<|iPTX~ipH*Ygm*!tn$9zSUMgL!heS$OAp_+qLMu2aGD9eX`x%-Clcp`$vGc0&jI(=dB&> z9dAAExZ~b>&e`XD6yW;nudi&PFOht`vMTGSt8-RY=1^~66(Cs94RgErtBX$JhHGBK zST>JTfkjW-hIa`tP8`t;)J1%lFc^Tab6^148pn0H?U{Xi=8?_dy3`2G*DgAR(>hzp z`^u`e6-9og(+o>160M5kh;n}dRm6xz$o`O#A0`H+-HB6VMkcQ9h2weiY3&$2B3XuOZ zA8#A}bx|cT?9v#!X2Tq)O(gi*lRLR%dq1~cb_z{ZaguSt?OXf!>f^f@%;e30QkT#x z!`Hv`MT!nPUDV-^#Q=nIR5sICzYDhPhJAg}&0c@m>-f%X-=#L0L?FrM^SthLuj8J3 z?kPUj{F!j&D1j-5&`je6*M*Ax7DMY8d33T5I(YC6%BP@{#O!5 z2$UVKX(bS@LoA!azx^K6-UCJs*c?fB&7R$R?Uh%~zy5Qd3xqhjg3{|Qdo6d|`SZ#K zTIm2()=POE>g@~r;n30m1YEfKIJ`iaib00zb(A*COLX(gDS%<;R$Dy)N^I^G8Z812 zj89p5lBOw9#j=)q0;Qu(UW+2`pfv7>j((w$PpPV3WN=fI^Roe}7$hTY0!0ZSAe`e* zue6QN0ghoY$bxNmV{D8~cf!!(91$S3B<2X>F_&BbBdLJ?be6tMivFnrhbD52=JVtO zpSX;X5E2)VLf~SkX^s{ssVNA73>1zC&>EDGD5Mc$(uOsmMeskE+lz<+A|k(mu&<&G zm{Lln@;TnUav^gXlYC{}4l>H)qrZNZkN;{jgSos>*9+(JrS6BNI{l?zNBr);x|C7< zo7({kx)3e(hOUUT0O3icuvc z1qFc)toUH4RH%zx3@szeV&_FDAf!vi$69M*QgSGj=i0lULMu(*cnT6RGiHf0OYz^c zOWF2!(H2<4?n8)!1LzGq5R<7$8v0ciy^5Q@@lCqBX92Kt$4<^W?_7F%dyA3-QbwPT z&hE~85A__n=#-OBXWf&JJx}nj6RFIU4*x&eZLWIr)vx>6Pk#2Zd_JcnNY&jAr>}sn z&Zq<8D8q_~X$K9sTH_WxgcdliOHf~hUtfo6sH0GuL?^3Ij$_P~gv1RL&fO1^-?I-M z-V|XWO5?@3XP?9U5B#>WQNF}ig#}PqM_mv9?x7ihQl?(6t2IVEE03Y3ri!W5lvV!= zrEqm=54t4yPv196gJ*V3R&Y%n`WK;a7VH7|-QN6_f$s>5>XR)CBmmH!5`zrfGEt z1QOldicVz^CoMs5+6|-Q2m$xrb1#=%atUAi+KrrX#u*&5_!w@z?KZA>!y6bF9JKFA z1)w^+x@F(NgRd1rJa6y^2!sC7f`3O#s~8v=)(<`S;Lq~;oCc(-OTw}Rh_*Jgln51= z^A^g8Y6*dm5`RVuesv8ZHAy_3!^vc*?mdjV|F98BtV*Dgaa1xv5KrJLMK+Toj|_#2 zOt6S0?&|KE>79DYso($Mk8i&d;G&Bz6!+Y-rh@#hbO0*rFJWDF*=5{$=bZp|0T&D5 zpci++%o*JLv8y>}<$N+ZuLycmph5&UMhZ9-+ljf0a0 z(>??)zr6Acj%ltV=LKbn!gQJ+kueY@sQx0=59{3?YV?Q46^J8@g37cCDDkMb2}7t` zfQCRACW5lbPD3I_?^KS@J-Utiw)Np8V!UEr2d8y5aNLY0X4h7ckgiE^5XPeh2$Uia zn#r8c!O0AJCo*gunBs{;L-bAMAn)Ty2e;bgtnLn8zqpGtW;YRcBx%ntj=rP7Z*d4O zMgu_&RgT10nh!m=nP2bd1II14`T>E17G6uD?Y8gm_<9h%_hTMvSk)W&1H_wH2w|M#LN-ApS_EhZfx?lJxNupsZ-DFWeu_hx z0`EC>F`qemDOWA)=A;?TG$j%^LL!7^GnDEe2!WIiwQh`gbv3M-*~EGC+j!Hlb9vSL zcDh^Z$!SPu1GXI+;+MM)@!JCf2m#&o4b;Y@v7QZl5E><9R5KeMz8zD9374JAmt4|l zEb^zu+47_*l#3Nn0_QrCp^VRU|GA#W_6ZFMZa7w$4~G0852{JoOd@<#WR`l{kFslOs<4|dmQDtNje2>EZehR}AXsxLlPZ68QLUTPj=AsjE zg8FK_wnlR8&7`|$GPR(a+{`9|yiX$SlS!wH7}t2lpaUbOigqZumoNXj zOE10j_Vw%6kN>fk{pzc)X3Lf>NB!H0C#%Vgi4Gx?qA@^q%;k3nhxy%seo&gl z?M+;{wA)aULLR>egD^-WF$dy~L)?*6IWBQW;yMyXnvR0Dn)1bDAc~67?~8nY8I7Dn zlXxwJbrmcc(G&#%%x@F%IJtbl7uId(+fVJ~&Bu51rSn&E_UtAS(j^<-_KrT=e0#h!x)+RWktAUFbb#m^!Hs-c9ARUL@!ztEm?d9G*hZ!$;G*!8D z)FyF-V~vnhQSZQ>tH8Q8MkYKZdDRip$p6JS8cu>D#zrv_sCFH;kEHp)Z#MGm;c-aB zis=1NyWb{ONL}*tpBV=rO1~)r7bAUuWEIp`K`I9=^*BiMWGd3hU;Fr4?)cdqWU?8q zzUpcwCMLx8Z94{(G#ix+*@)n<^5mHhUb8w`<^8@-* z1^QBHCJO=M**r1Vp)MYyp(@7A+5~Mi3E~zknDz?zw)#i8NTE^qNbR6RC;@EGx1<#; zLdjxFuQRd80eos)huz~D{_fXX7|rJR;`t}AYDOcz3h-6w2TYW;mrI3-$_(&ySxH{R zQXp_72q}mOP2LMQFje5e1Bbb1#~?cnkI-0C&H0NuxqA65RFZivkt(T6CjuDvod-2IvS3y@RbhRVq8FxREBgv=}Cp73>7QMe8 zv33hOn}OD5L{}TSr5@Lf;U?lZ$IQcDzJz>TH9{+@`-f5YuO&Y;j2;|E3{RnT!E|V< zs?f1Nlp6~zQ2l%%yf2H{I``>@<4{p2daz9WD zbGhuoY&P;rprN6G)Kuyht4>(8@reyjTo3S;x4fC}eec%F?p#R#D(la+KL6Rz)%@^> zKm5VQ&6^D8Xu&MprStjDhcD;EMcpW6j6tN%P}*;F(aAMxI}`HrqslXs z1Qs+_xxD+{r?_XE83A0raxVY(+?9-F^58(N>yRg4)1fKu-rdiA2M#lu&Z0a+$y1K0 z-dqWR?;~AFTe5~Tx|(^}tQO9k(?V;~B~yTc@1u2q6t1BkN^Lm&b`uS4VIyq=2_mo+ zsZ5|%fohpx*Tf|6`o$9zT$i7}_B7g)3Gzx?j`a& zcZi$U?`Qj=3F6f*Z&^N{cbzzwx`ZHC0404>P$Th$zzNxp2EY-GKC~T8{OPgObcci^ z@s*+}5#!O`ajv=NaeUv1Mb$?%93DgNK8((1(c2Hg;ps76BBa)6 zazcn8UY(#iSz})VvwYtto5_&(JtQI~AQ324Hc5#duD%9lwZn`SL{kI0r4j0D&5@MR z$3#dRr3hSs*x!$SW)EV=KAV`^&PH23%pHRnEP6~lg0ZN*i7{0f4(^JA$&4Iz=NB-~D z7amE%fvbP9mZy3~!1uX&)k3~_&I(2gdD2;rHTwp+dE-9%#wTg3tL3!L7FKpPu(Y{> zwz?Xs2+$}rl9V4Xn9A|&@HlJxN7*@&q7X<{cQ$hAqIQn&Xr?yiqO>+be}Kj_vuI`g z1tKhfKq?m{J=2;NJ~83aH_mLW@UYNGEp)SgZ;#Ji7 z(+KS#gr+9uP|%8db`SFHO?%kZGfHby4Ie#yDd*2^MLID86`0P8btN>+3TwZsjc$N= zAu8>NuIZw+N3|1U{oojXeb>{ZRA4!x4hYX2QybK}83DXVQHx;%$BIbdO2~L{a0n(+ zFgSwP-H#rh1mFKt3<=CNa3sXz&|D9*+7K;`P+x6jB&En?MjK$a+4xz>8YvNyo7o{YI%S?l=f7$f}^Iy&tt!&0EkBfD&AK$0O_+ zoPTY zrNEI6t0tTTPzIAK`7Ivu5lf9 zjHh_tJsWVP;OiHi$n1tB8Luc!t0EfK3lo2g+acB>*Njn66zBM893*w|7!&yd_a7MI zdr$9UbN?78ceQcN>Uq4pvy}i%UMZwDU_^~XXrtyRlnfgmFF*od#yW8+*)cZG`|jI9 z??eh@C^Mt1WuRjdg3yQI#kU;^t;+NsqTucr04P%h^h6rQr(j?d4v!+nCXA)9=bJC3 zo;%pP5?mMJF-TTHT`e@#K}#bv)Id!VYHA>vFtpnsKm;1Cl&S8uGNU%nL-;;=cmg(U zhkb`a$SjK%E@0R0-A5MLwMl4iH2ww64e;;=n94zk55@^6oIo;}WOQVNvGH*xCnqUw z)mJC0cV^O=RYHgwwFP5rmscKc5&yLKf3sH_)Y zee54U&JCaa^i05{=`~5j%TD00&R@wtUUfckDaZ!_8wW>Oe|Un4LIJG>&9N9W>ykK* zqBa(zsVdHt=aVZ0NY|mQD#pU*I;y3lpcS64P{MH7wQbwyJ)iS$f5dpatAJy>I%rQg zJhpFuD^|?m>f;tLyRI530=z&FXv^)FAhjSsMW8LynFy<8i6bz&e9|TB2lS0+c%W~X z$9hLt+EmB8R?eZTuA1?JXH^O%N)yQxht*KhaXFOE^47c7lgs;j@3kj0yRn)=!J@{I z#;zEw9PbNKf}*09iipI25N4Jyv_xwehE*J?afC~%;PIOShq?Kwee54i@!Dg%_|WQO zm|0)NMBc|y4hjz`V<@eWLKP{Fe_{flgrZ8unaJmO%Uw^gYa|6R$2iPMX-Dd%Sc_8R z;ESpHH_2DToUj>^z0w%VU)Qh&0u6Z&QW?Z}3O$j6sVt<^=J#FzUco$1*M*pM3rxh2 z)d^Hh5>Z=aG&ic^P*nvn2N@`|uS~`770lxl^5AQeTx2o^n~=>xI*XjjqYfU5l8)D1 z{(8Rp<$vRzHTUq1uYZFLPj5I%)*m+@KgWU5Nl0e^sI5t|f8PNDG?`3>d@e_!P#~2~ z^X#TgJp9;WJo)7MiA9U%J+^t{=ET9?UXnG{okBQEriu!NjupJ(65B>N{l_Dzg2zp0i}XSUHk?-#D*^v+iDUO*sBt!tdylo3Bcp`<{n62_U*RtU(nx=q`` zwUj`RD5T>M1Oc~iKg2J0^>W3rbGUNxOfmrkf$^d*w%QG?PNBH=?hS10ALaHpoW}Cj zIx-$0d^C=Q1}a=!(^h{$Dp~`o69iUq(Q+3wXyJm+Tl|`7p-ZKsmU_%}$oW41vFQN+ zv33`-D#qtuemt*UGLtFKL-^o30j_pRsExMJod$}Wj%X;Q`xRyQP1Wc~!^C*wosaQM z?<6FgGMXmB0p;7*D%55WFG}GeLs!ML*)>HxK&U&VbO|d~7p;mF#t)znm{xY)1aP6k zI#xm~1_>8KXK@X_!w+e$0UQ`cq$be?53+faK;`l}) zg98WllSm}2^0nsS#~q284bhbcK1JqWNtg5E5x`wKR zYe$9xKL|_;tu<0WK`SQHDKeQHst~~bJ~+?|o-SGtTdd8s*IxVWn{U4PT7VCJ@PmB$ z%U`Z+=9L7Xvi{h0;e{6tty#0C6@X)AQ@3;>H~sx(ESlHNw*Fy`o!Lx#!o|}Lo^M*` z5hq_1t6l*JDM>gEF%ghcuyuHx-J>b$<1v=DHPDhsARI+pNCvZ6&iu}A4XsHPnAK3j zcVBZd3!Cd0&-vwhve1!!fGYhtbo>+390x6h&=hnIf#V|raD+>JQZO*(@$HSfNd@qx zWwTjOUq!*TvV}GktK%qcdinrge{?%vy?7NDFY070Q$R=^Q3As-X;Agz1&u_yM6obJ zNQFK7vfqoyEl>ecNE+fXHVjN~!y{YSba0f5m(St@s}|B)o4`{xXjlp3kgqSbB5BHE#|@ez0{^U;?*mgSd_X!qD>2YcoZ^O#I9cS;E3q}Jm+RE%J?J8mM!DTE3c%n zxrv6ldOEwhXliUkYt65I^((&em9H=uDi=-1uWnoW0 z93C_YmN{RIMzl7!OrCP;>Z=?_-t)^}-mOnL^rnsVt#D*Oq-^b3TIcyY7`iY$tqJoL~*{}LoV64$ zFw{XadDnmX-24Si>20M+sZo-^*BYrc$F?=`$^{(^q|$u#vF+?h{+uEKBvJf% zdN)Crj6EWwN*#4Y1cpv4-8j0g%CykyYoVbQ8tP1C-P&MK^YNHTI#lq7LHGZFs!$xI zyFe@kbv1~#2AJ6avuD7(nJ~Kp(b-OQX9qPi+h}TSrnRnthUyw>suILp2iLLYNV;ge zt%ZoxIggeVMl@oZXGuqrh{cG<;^=q`zpe&mG@1KOW&~(_-_u&_(?-WeFKBLTdf7kx z(j#EuZg+bzP*P}-M5iKTtdO;waeym!@0-e=M~zK z(^~4L^3ugDqy!jOln8#V;4if{SOTT3YoWkF;|pz&`zT!3A>{?^9!_!EtX4k1ZacTF z-Nm=BIFsXAYso2PO^SjSSMV>1NzoP3fRyL}t9KCK3Wut=%bLB1`G;RWLwhpLjjvkC z!loKBz6ZiZ;3IKM+#JOb$5FzX&)D%qJT7_LFP`GbgF}c|0(1c_fQb}pDviwLQGv0H7I_bmDWEbL zQx#_mkjWZqVxa(@DrpRqjwyu2Bsdn65I3%j)p2x{t?sMrmy{-{my(3zlB}*K;kr~+ zB}l{#h!1VlI}PnrfU>gNRt8%^xs>Nwz#=0jSuWa%qtKtS&S!GMvmZET7v@4m@)_@y#$oQU>#tlu{ z3~ zqn^pULJIKla9)hAd-h2>IB4agT?b+L_fkoa4uRH8<@3CH!AzF7HSo{BeTFOVSj#8Q zTEayOx&Td}46i_iS`XsL;|T4dMS#?Ty12{NHtgZaeFIP(N8^KxBSHbA==wT;`DI7= z{*&@ZO@O1mS1fi!o4^(cGlg$l+ubsOUZWBT=tw|YGpgW2HVf%2I`5$ygCd?Fu{w_+#}gogWB<1T)s7@)J9w^?#9fzIEKV#Iqbe37=DKD-P?|t1eBato zTbE2}6LLjhK6lo9D@xr%CWwBX>NLay=rG;4=3g2TP6D?nP9~QoCnTJ*6xBBjyL%y> zL1;uKlTrH*?B9L-@)bP$%$6>#^?(o}sObMq4DmUl~QGx_iXFE!F81e3Xd^Jcf37NhSmt0{@Eil8P@VhpvyK~Wj9!}vB)T4F=Ga)%>9Iw6!LwzaotYlx7P6f6Bm#wXzP3^Fw@LGR4(Pe zvoH+-kG`29D~#|Db_Oq`)d3Jp0xQgrLfGSU)t*|7Y*a=Q6|LQrh$_}vj8md03R4_@lEc~vW33-

4d8KB^>|KoW$#oTsWzRNF#S>aPP4 z>p#N+A+J<=`Qa{Q&ruNodzLW>3Zy}cp;qmnTq-j&J4@@7mFQqE>>WY(9Dvz5BfwpE z-a%()*WR-?o%3Sf|Op*vp?oF=qX=`JaeSk`rS5IZk2WK#bA(D3IQ&)TJi z{AMB|*?UV!qlzjL#s)?6vOsO&0u$Z`<2&Jv^U=_)hsOBE-Z9?()U&W9ON<8xCUk3O z6vxM1YB~rsWu+Lhs(w1ICxIHc8KT2qy5Lkk{-Vp-H8I00KX((`j!e@LiI37G6%jHx z@!-gF6Zk?yqZRXx@9v-(Ctj5>JGUlmF`>dOCrQOoe;8aS3-k`!!ddg3;DR-j@AOw~ z*Zvd#J&UnurG)9MV0t>S13i=mdZ`W#(6M5Ou9eH_T0Thk@*#Sb579F?NZ-&9z03OP z9q6aKua}PQPHLSUR4O&1QVCs{}9Qr3xFvS2NJ9i6@`phu_bGR3rc8(-QV5FET(()y<6>3`E~ zKyV5rW9Y5a=!%5iO38Nsiz6{END!wYHZF7Q+3RHyN4}d{vc@V&oBbqngCWfsh;P!! z*7?{!F^W~km$wh|6Ki@od(A2ub4|Zk(yW6a*T8fuiA%D+$@G}h^DkKm1nNn` z6S_M2#EUND!j*me+`r$%cOD!Kl*uVMdz@)IAcDk(vNe2d&mp$#A48%Aq&|}0;ZL*% z!2iv0JqEx*B$VA`UayH}jFlLbA3{@TqQn6v?jiOO_z_fqcYgjx+QJOeJ-2-S|z zBp4&G;g8?)hySv1I-@YAH<)TY3DF8rWC%5g|wd-kZlx?7F>FMfd_XXrc>=zv& zN~8W%-c>^bU*7p=7hV_-6UC`gGZFn&%RseEZ`Fp$ci*%Jf-_*8w1Ww!S!(d8v|$DU z()6><($EjJ^=P(L`L?#vX2Q4kkMZgY*5i^m0~jjvd#H}P62OmGHHZ|N#5h&nb=CR& z%B83AnlIkQKis~XvXM~FHDof$IMl#wGvVLv+0U$tv&_Rh5t+h{BXBr>;}>mnOQ>pF zsA~xypMPcKF)uyQ#(`CM4L9IRKvaL(!0ty^Dm#u-oe))h~E%9Xd@d<%Vj zJp}+L?BunPk&#!=zcQ4_&acyDBRsm$`DzyZF9h$Y^Pd;VsD_3fpT(?1hSi-Nbd@5y zO63KVCb?Hkfk%GKD(g(lOYFKuob$uy8&jshS}Ee2dk!;LEpguR-uBFLZV(}p?>zyc zT2UntLB--!n2B4we)E}pp|Uc*@5mWE*GFV2_jFP&RiILXb2h*QXL@0!ur=L(|Bff$f8X}6_V@Sv z-|=xzU;OG~x4St!< zf37N&jL=bz=&Y5gl%g;}5R~ik3p`~C(>6fJni1hguE~ptA8%498_VanJ;?Jntf6AP zB(NCCAcPg;8<0+v%~R4|2`}@k4yId8Hm@AuL(jdOsixys{`33HCD36@UP4(Csv>;& zjt7D$O~|%L5&bU(M=3JDfmM(b;(AUcmtEFiXfU-JQCFv@7#~^&mu*5$TSbcA4-F6N zrY?*jgNffL#KS~WB*(LfWl6~Z9&@!^fa=q1o4)9w2+VJ7mfTwfxO)eB-!)R zw7(dC>50=UQxF?RPe&PxClE3!K`Bl%bl(Oc>1S@U1nN=IzTt-rMHSy!-4R9Hb$Eg! z^(N0aeF*2I4Oj*hCx-w4AOJ~3K~$8Wf|xueENaJ7I4B5eyncZT{Tt0Brmqt5cUPa! zx}IKs`rp3A-sw7>QAC$5^WFX9+`RXQC;SQB>tNb*?u8xu5P#A8a&p%$H$5Xi+{+x# zma1^83;RX@r^XmcU7b)VL#c|My8*fIOi!W&k~q~}J9jX$RsIjGdDqrSz`v=83O^H$#zQ;Vi^R&lTNJNR7%F3<^28Sk+ zkp%^C5}dywYwgP#0sY@SHE)~F_K}gz`v$p+HT=i@2e@MGa#nSgXe9{}#<8TGDruJ> zP7n~F;xMiRnuJ~m=SR?-mmdC`tIy-*8`tuhFW$cLvlHp)@T5qmEJrRq2l{(ScbgqM zcDTL!_KgT!2ypGS*Ye^QzqkMZg`H%Ugl>J4bA0+x@xg-TKaa&1=@XbAapTmp2nx(4 z%4j2Ibyp2zQ_c9Clg(1@ZHB+}gBg)9=BL?Mk^ql13^f9cIN`>6yQ`6%& z_30^9k=rl4aP#{={E>g?|IBATQviU%P6D5wB;C1RaIrEyJLmhm(v2e@@Mo!i$-4eM zBS>H%%S9Ip8vrv0o<)vI*}!0}>S=6EIsq`>kt=?#UnLX9^X#QwEFOzeK;x{5a(T(kcmH6>E{s4u~pXEj(c@T)fc}D+NS*=bd-F?yuhY zp8Wu)oVLCI0EL~{wrbU?f6cF=IF6a9&-#d5z!}L!-f8VHZSa#Unrth3&hP%$yaL(+ z(vt*7r5w>$EeDBEKOU$-p)M1-Q5Qr+a_VWB>YRC0dzKa9_K|6xvZfE!1ZOlWhn&2= zK>|RqphAqYrn^cQ5uwn=< zJI~(-IG1qGy?0kutzD=4cJJ~IGdi*K^9le^SZ15f+W3X+m)O&M#yKUpc5P8}k$V~$ z2l5c7IOi6h7)Wn>rzLmuN(Rgm%xzi6Zz@*olK=13{MaL;-4j z8P7KiRB)YLh;x|kZn)w?Sl*lMcn9|G(cbQ!I4ZakGch&UfibsGwgWij_uujd1pp}Q#IZNM=}la5#T66T z8i^Bdj`7K9tT8!9t&6Ovqa*LUBySez2R(t5$j85ycNi%fU^R*`37Ek3ol%^UCL401 zG?{eh{Bpy??g0zfPszsnV64$(MMo#1agYY~a$&S$(A4NHfV#!81L_ngpLQ7$V9Z$|qd{NIy z(w;5~0fFxg@Yk($RM1KVV*GT#d1sJQKPbKSmtM2wjcb>oHv!pVk zCVSuculqv;1nu^POg5;QIF@zP0?+|RkitEgGXN?1kvNP9!&5ExPR#_$HC;T~mm&pF z*m0f?c$i-ii^pz5fI6e*W{H|9VxGH@)di1pp}Q#IS*Z zW&R(rg2wDVJV}zoo@B>p=CtRH{c&^(-lzX{Ue93ONiWPCBrai~TJbcy3fb)LJP?uQ z?@fpzW1o zWzV4_v|<-Byy;k6p!$6X;{Evzd6K2wQ?KvG`{onIIHxS@st^T7Z}6|L3roz8NZ{w8 z0)V4S1!35Ys!h8O9HJ(aA5P*}DIKv?p&SW!4UZK~{)L^`xq%%2h?E0YK+=Te1Gvl2 z_Phb0GmY8OzkcEqUttL^hXMc;HqX|sJ;i0$^YjcejTR&0bxcO$6UG8VAAoc1$ln-~ zMfd7FW1cg)p@GzaFX$soH3OW}EOU_352xTkG|xBiC~M4mG>}lBRw`!`4}$o@;7RW3 zd@jU*D2WR9k5BnXN$roWyi{0W$J<4|Fn~#O{owQD*!-YOV_H^>MOH_Fg?rM>>LjsnZz11ujAe{ePeW_ZPRVXww;M>XJR{<*tVTa zJh5%t*2Kodwr!iIpZ8nmU;paWecyG}RaLw8-lb#S(H~{)UPqm=IoOJw-Mt?#n~|>g z={e+XQkj;qy)@^MWK$?0@$5My=n#bhsKpLyppBz3-%GXARa^{%vn`;Bwbg`2fAKgVQmgYpr&)XU=S^nDQS~2-A#i@LSBI)s zYt@^%xOD#a&g8uI@wR)hx^IX$P3%04BHF|g`38)Cz&;Oh;Yx!fxP=`b_+m_&S+in* zJW6VTnbyIKi-Td*Q3VV!nr6*&RJ*6du(pjq);oPsbApg%5NCJ*@}ww4K1f}$CHbA> zbGbYoT7zrv|E4LEpop7mM=jtP(4~Kg7zWe3daVo_3hWkuCXFK}&zQlbJQp5k5w?(& zPMZBh9=W9t^hurq@*b#x5pQ$4>b3pOU)4;Wi26OjZaFzo?`1MU8w^ovKiKRA^2_eh zg`Pa;c)R?Ct(!(|PI8SimK+w>3XCRaxhI*d>f)3nM%%ZKJ2b5&@k#ePR{jqstyqz9 zgixYjzo?Le1cDHgQ3HP9M;OyieijGaL#Ay-zU&fL2ZXrjqFB!J3xotLwsl&XwNT;g z(KlmNT_UvgZ^Ea%r|>-$OK~Z>0XmkUq_SFMpb$`^5;z zq0bcag2sYDjF3dS6{7IQo5Me|b*| zwn@5Vy~Y*ThBx159z2lGm`A$k3$Elb^sjjtumP2e!rzxEfWa1#`)>oG#7^Z z*;$=VFi=d4A4ryr{Qevu`jPRmpKi%gTc2OoFAoV%Y^d*S2-b*6o&2F? zLGEyMIy&~1R3$3#zB=9MU|?`USz1ED^?uR#zh78?UejUceZF)_bVpLxy8`}>D97}Z zIXsz6(d@OP^B4N8Y74x|I9=sp8E(D}!r`bQwb+9S?SmRUAGt`i36|#cMRFYnQp+>>>Eb)qs~B%SrR5RcKQ^CaSTlwEKY(SXCwt@48q=;i@PNv?a{l zov}&e12z@UJJ^qHn1Ri($8^_bBKlb4Rwzq<2J)wtKeJ`(_DlohFdqpqm>A)Iu}ben zWpEAbM~Y5xpY1K6@E$)Rj*bD&hWu65V|X5zgLK4en3WnXgx1&%=KQop{(#XH2v^0Z z?O9O740=ulwvoY%g>aWzlTGkbnOc{NV$$Y(GP!<KV+R+nFbtm zG?^KP8sf4!PENY9NqgT`IX9v_XW8@wb2?d6vk`7J_z-fUKMgsvONvZBL#fI*iYh5~ zK#ep+WduD;^XLqY7+q!ZX{FjJz4q^Ml)!9^HyUy)a+x9Mdf_ap`ik$tih#*k6CA`z z>~tNGtJJIhYsa=~07^UJ+2;P_m0 z{?2D#=igu3+rO{$zYg{N>PLa~=El0U-ut+Y&!PfBjC3*BDuw{xWd5h|M#npo!nQYV zBP+cMJ}do5RSQdv2SR*hyWm6RpZOqe!36NY8I0sM7uWDeHK3)MgSYkekFV33&5up@ z7RTGS!z{j)q0d6sE54uqY)DILU=Bwcs?TLFJbBgH+LtGZ)2qlV_3CY$cMhGj<6 zD6ddIS(;I;fv~HkZ_I;X^9EAT##RfyMUkbxmt<1IgZZKfNACLzb2O~4A>Xu zs_N-l)CDHqCf3n2(x|zX&@-eUM_SCR_4`xt)HU0l{=A5?4oi20zV8i`btSEVt8L(e zh6{0F?g!MXiWdgYFYx9J=fsZXqj5WfKdex~l`x{hskE7BE`T0xmq3hjEXL4|n+eug zE)2dDiD7@E&yEAp)oJUFQ2zX~WI&51UXdeYC6~_VF;`oMiW&Rg7+j7qNR}gZYToe9 z+^{T`I7v0~kEFp=P~32qM6#&q3CC}XY+E!}w^+FXBTY?O=chY62A!?xh$~nU+`BhF+v#JL}8DftSOk+@;Tgs!j0K45uvym zKbgX|gw~JV<5epASOwE=4ktg!SwcYkUpK1~IV?HBd2fZ0uq*X1kjMQFijU3bjW9MH8O3InnJX1oU97@Gxk)q0Q3*x(NWOI$vwMo0PnqPQM?k^M?I zmORUNTBTIe%`8}ksN>g$`~e79eXNp%1lgd8UC`h*WrS8_K+!Q_|E;Aq4Hw_}tC_kS zG=fZ%7ubS8YqDU%%frEq;l$;0{uw&0)9|VJ$H>#=dM(IH^t8_VS&!$fHoseE5;rXE z1(nzJcK5Mm&uwOpYnOA4Y#TV1z0pY%#>aGrFAg4e0(jQjD6{f8t0Bt1pj?`*`t|r6 zytke60KhG8Xi4TzChl<@FkN_;B*%J|%qH(_{9H|FvOz;-ltHd<+zM=K#X^^` zVoWjow4B53YoG<9JN}+0p4wePv~|FsJ+h~(a1fW{MW$6iw%Pla;$f_&9L5ZyC#@m>x-24NA-b{7D3vtATZodzgriB2;0{Ljn;HIs zGVm@HYVX+Ze{ITt7G(Z)7cBu8Hhqu%o#HF}hX{`Y=v6jmbW%r%9>s=hLsaejoDbus zz!t`S^svRi!EnC!@MZUVEJT|7j!a(M!fG#8+a_i6v@*rxnEv_x3-3BuntK6876bqb zaBuq)gxW(v`njaduQ(VGC;%!xEay^uzsCC{#atZF8XhL zDY1I4_pDXZaTTaSn|wOFp#w$ibOq^B7mD<;HGNklGi~J50y6c7Y}NM&s}PRu%QAa{ zvFWKDc9u3ols%J18I{JU9x_ATqK)it>kaN)j@0v@2;$&QD@$nK@;u+o&0||a^a+(_ z$a$l;-8qO#a%xsrO2p$mk@^|A;tF)EyVT(OIcvirsC(3iEGfuCIb zLyFb?+?8)_-iv_D6!*r0Uj-e%?oK^ZXPkTk<6R`c(*JQB`)(W(ll} zw~cq;oK@vRvsSB(u5taQG39qSN8EDVS1S|kTSo`v0RWWLfKhrSof_(4?y$^mSq|0E z%&QQ!sywHsl170?AVYAYa!Rx0Vy*9@y)tcTpJ%D_ zq%y<7ro9K^e52gVAR~|PWo`=tz^d~kHVEQERzro~>ESo1<4MEwqy^%+v2>~L6bF|` zs5#QZpnt-hZ4+nL1ONP%2}U5o=B2N4n$KaoO*5yz^1UZ=6Wy^L*rih9Lt0r@fGK zpLKjQ#OSNk(CcM_sx+Psqi8^1!T3cZiIBo#4Pu#qGK8eu+x>?CeCdxQ99HH{PXt8tl8F#R6Cwv zfF0WyXJDKz&;M^e~;;|0ITyRjrW@bOmXGgDv(zFWH)eND>%ywa`DmHxTXfZWQ zYMg$jZW-L1Y`;_CpY^X1XSP^BUQ#B;kxz@%Lz3&}m-p#!I_I+$CyNaG3+}=6&n_LG zH)J0I(-LiDO1az`^?kJSzRC=8$;jN;;kl@Q5XlNF`sM`FBK~o6VAkx}>^HQOAvm<4*$S;A94v>#=-yjwq0i=YmYlBagh`4f@*Yz98TF;I-#D zzr6lE;xjU!Y6FL*zA~^HjHSm`=RTc7`G$dwR*PMrR(hgq zGhTVm69#--G7C0yi{^Yy*b7JcV5+8N-IGR7^VmXQ)m-(J8&bq5rS1&6f4%R^E`k)+=>um~~tqgce0vmO%t%k{O*tz$|~N}Z1r z>s^{Xemt=k#2Tb-FxdVFb`GHV&9ifZ&V~!%;b(pt6CowN_PDgxAE|ELa+0mx5r)gF z3vK%Etau*}<82d&k^3pd%J)yuaoVnreBGW34wJ6(WH7EJ%7Y(p01kir8ja;^&N?bZ z!{q87It>o~vI<7{+*}!Dnzz~2$)b;U8T;X!QIsB2oQ$mh7pHWjaL*~qKZYydO$Su% z^`GnK$0O_XexraFPNfxr?}8L8M_xaySD4rlD+a{_Kexf=-Np2?-MX3&a4d7P09+An zH~v!kuO}B-d(?kpS=Mom=DVLjxSTlr62ZqOJj{G1DAG#dU^f%I%iuV!C%&w)jed7= zL9S8<_l_F!RlzWx5E1{3Oop0c)1!;vksu+*heQ*98Vr61D-BRkIuj9fmzl;_GJpoB zl%|6TcT5|ck%pIJw!u9y5mPU(j!@Gu3_j#csIrH-btzt@!8r@ekq0=!Gz)y}bAI#m znx^vA12Z#0&r>j?x8X<%y|%CBoX*Y-)da`uhkNVXLJ|`tfivr+iLS-c_%i=`_gpjg zqaQr?L#Xo;(z^#rm2woesIkCa+PEC{?c;aTf}xXUOtGCffjIhpZ#ybx;N(~?OgxVn z>dN1$%)+yRU<|bt5ox6XIL@1! zd^svTv;OHgS8ZNUKz?gjO+)GUqpAiK}byiZ5CT~>;pfgZ!cYxf^G zNJ4g^e&ta8ua+RGu%zK|Bd3%cbH?^VFqx2E14l;@n0x)OnM6`AD7yb1gIAcSi+d}C z!szm>3g;5Pw~zV1H;fTKBJHc|z9+kZ_tfY8!NH&$0G0M=27BT7<-K+@CJh>oryx=A zJ<=H`+3v`q=+XpC&m-;kN4?{pf^Ho7dB5YNXYbUVviS9pqj>qW z8RQ}As`JYt75Z2C6C=X9x_-=6MJF^u61_uZjMLMgEe1e(dingKGOukX|8H3z2Ve#B zo_{eH$%w-#6tol_L)uHgd3~@B6{8qQlFN_faOOZka1OJ_ytR0M3oe)9mbyaR(!1ru43=ClSd5$n51=K+#fa^BX6;mVw zrMG97mzVFKT6-G*7kO?Yy6!Z+XnuQ?b`v!>P>A`%4&(GdAs~+^Dv5)5$cfd4xTI?N zH54}#eg+h9K`KLiTsQ*1eZ90kV9&t>>>H#x?<#m;Y8&Gm&k%eu&# zGJpdR;9-I@_l4{&Dw04{GX)6Rw>>V613|l$gt}b6p-MA`j*q)1*DfC{vaw~m&EbG_ zo?)sA4(p6@$^JPtZXfI-ofSvi1&CuzO`h1QrIp^lXrfaj-r2dkzvV%p?C$GfIh3@-lS(5*t zdsoS%Uq-@k_QYJh%tjVu`Z08A%wo3b663kpfrt3V|K9~bMJS@o0CS7+JgEitswKSw zT;8sRUjoInQ)Jyjw2;3$8qGgGrhDEL{`*so_WC`$ejdY(HMouOpEhTcrq4{W(>ILU ztNmZ6n1_-MP4mMfLd3=>N^$)u@~8mjFlQ*gLd0$iS=IJuBxB-qK_Uf-**kol{ntcSWJ74+RZU4Ey zH41*xYGVaEYy5iGSnE7RZ}uh3OQ%xLY03IUy=Wxg8jl?T6Wb5V`qa23^ z9A)h%UC~T$)Ipl<=S7`2cpd}m1r0;EB@`1uP4ts8lBLMosfh`y-rCQ#+W*T(Umw%o z`2MUMS&lwx9|VNKtC$VeY0sPOff^W@iNiV?-;84b8Cs`XK74NC(ixYr>Fj36F;E5& zG>CtT{jXSRD@JfqQMb|lu)nGc;-LWIWWN^2wm&zw`L2k@F}Gz6V+Za2?m_|(i3r>B zd;E43aHBOTr#v%y`alpTr<|@rnyb!h^3K+A)ExWOdlUvANr>A0A!w7P9%38`8ZIrlByQf8+b;#ePA$fNW2b^c%k}F9a`(S;V;Y z_Mun|CDA6IUFmituG{x~;)y{5Q~cJ~g~B(sKW%O2ol1Wkwin_L<-~>OsJmP3D~ZKf z&_S}k*UUOWda-B^YB2^OEJ0fb><9w~aVgZpRED1z;bW`7)4Z$fcm_*rLnzC{9j6W| ztpuxg(G5k&^{L@q^WRYlyNvyMQFy%<@T1LrohW^VM?{<|xlwDq3Nf4DwA&nWM~a%q z!CBB$>?^+}evSwTcGut$vJ1l=g5xjOK$ke6b8cGcEC?M}d-A8a991-i1qVh6(y=GK z#!p! zm&UgL-$c3T0w_bK;|rwyBn}E{;bHl5C$^JcYzU~{D?dWAGTKn}aa3JaS(HQ!G zg{BO)V0U}(TX!Yau?M5}=vdT;LYxix(<8!+au|*~pGy_J_LR85MU~`f$=vgP`Fhu9 zyBq5mUxC*L;=1e2NbOODd&9!%cFfoJJED<^%$G_~X9gDf4Il<~B87f2)|rd+nC242 zgeL+o;s@Dh0_G1Vc!9b>VM2(CSQtAsjdsSImGR#QB6bbvaD=<{{dLaobjVusL2Q|D z-VK$vW$@HD;C(XeWk~@eFUJvhu9$_O)MGIUfj+f6(hgG|mqz9-M8V}DP)$$5|Bvw{ zT1qgx5MPsL3?;YYSxE2x+wSPii%7I;7eT<0!te3HS#wp@uw}6ydV<4Pujv$B&tpnU zGNW(xojUH%j~g;6X3yyuP2{2XacL~$hV9P*1v`^+7xP--+-N0AU?Z+A}UL<2g9sQyAvgfD>oLI#-z~B1sGVcFSCUqK)=FZ!usEq6m-$=k%Ddo9#9o zt|X=cW^gOecnpcWuPV0gZ$PalTmdV86NaOZOHkm8lHb^Ip7wt!Fl`M^?`AK)`)iB- z%L>ZvB2XM{vprPcE!WF}Skwq4)wR2VEcn|mi$tw*IIub{LeAa4f_`4LqONvpXTbgH z2#f!jZ|k+WB3>^-T(+OC?@S30;8r zhtmP2V;KLtYRPRCyw+G>UPiu8`^dbG;I4q!F1$-O7{-JipHLL{*)82OC ze0{aaWlp`m)xUKEN4Lz4+g}1bL;79swcO_y(ZJ@g!Id;G4CTHE&OsMLEw>}*T<=|0 z{<6Z;h&Vx!<(_@8IAbfbhdEfQY@(JRA|%7y7YuGzmIoyN^m@iFN=NZN`NkWg!Fj2s zGh`X{+sJYu8>YhI4|9l>O2L-J?Io1NYiY-`!#Y@~B#Ghu+2P0Dt2MB34HShuLKRp& z#Q-E>-&$%pYCwg1*h2jPVaI{Xi@0X5TS6Wg!|Qh9-Ck#hPnP!LoLF?g+MIEIJluEY zbmyNHD+FDrjM`xM;QLM+BTxij&BZTCQB z(1Rn=RQfBmJVQn@Ax?Ohm`qZm zNM`n-Y?w}9D{YIC8?eL4fZ(Izd5n_Po@PU#-%q9I+oOe#?$Knql!DNn@ zlzNGo;#l=HiTL(3NVDg62>Q1QS^DVixEQkd(|J>Ris-C>9OkhE?xCB1?>Q0Ivp@g_ zAiAzC73Z~p?v2d^lO)}3crM4eF_3z-9*Tx14kpJykBnb*FbB@?p$G6MA_YM2=TpVY zWWrzsLIFr3DvbIMVxT4W0*YZgbhF)yCb@pdqvA$GPO3$=sYR+)9tzmIMIS6n%5$@H zna%U~!6qm(W%B44Gjov8XwnqJQqUMy!A#%lQk;EQa~=O=WB)T4GiafR0vx7)m9gl5 zYk>MYcu!6G*;REv`g)+-ZD;r%Lj|b%-L|;jy!Skp0P7Xtj$5VvW5u%XopSD5@5V-! zyQ=~h1mC&JN!d*cr`~`JXSHDgj`6}PyNStZ%xh4zba7XHc+36^8-aAqKT9EB;`N6+ zDbT_l*|4#>bi>|og+AT|3422kP7;->9}OX^WM)PjX6y0Pc6d2EQ@hMh@@$e(4f(B! zGRyD|t7E=PkM1+d5n-y9O`xRdFqxUs$e?eAJvd0-qBap;OIqW^lGGKYb@N4w?wWB0X-iq`?h<6q$R0^Rl*io)eH7as}e`>071tGeX)^0V2p7(o(H-*04JxX z++5t;nkE2PUdM|=fp-@ETl-ux8nGVS*1cyCX_Mf|%)HjXGt0`C{_CEwM*@tJOc?nj zi*Qo_8(!%>;>!Ct@@lBXwk0p9yRgGvIUbVbVqN)LTw51NMC_+?pf=><;IfKpJ$95T z4@o3;{;G@YPzAE;?!Hx}=h}8NmQR?zg zI1GUJwjGIvUkXicLn{&p%pc)SEZ{AepOHC6lF9rGhF3)QjK@nQp2W`13aO_~%LqQD z)_;~4rupd_6PvU;0<965L~?Q>sQxq%0a8>67Wsolo#~L}Puu|)Jt}t!03c~33pz!! z(TKL{j11AW^XFdt`tN>C-+w{bze=nBRZ;49?6v*1Hnqw7X>@w+FEbU&JrXS7L-_r0 zW*%_=*iOz)k&=A8ju!&@--4=r4}S)RelB{li#JbXl_JFX;uDz(;)4Icv*-!{tg0D1 zm?}aNRbrkxy6E3mIAkkPmchG4cJ;oi8$M29&(hGaDS=L1MPz9W;od^Gyj8r=f13$K zY_#Hn3+~tNJ`?Wxt=4bIk*MW9WHA1KKSkB=d3$XTpmirSFde1luhER({$9@tf{R9V zWi3AqpamtfU~SI;;J9-2VRD{&oY_(!BW>uhU*2x!Pgmh6kXwinNvZleq^47YqL*05| zDeGjre9=Q|D|A!Jx6 zWU4+pH}{l|b3lY1df!`eog0KorD!p1ix!Bn6q|&XPZhu);7tGWHfhTv8mIpftiMx8 z^l9qKgZ7{{>b_$xzWc=#0ZQcAGpsYWN=3Ot_gR2IPJ~XZ^)8lz8tN(+=4P**OP7r;>AB# z+*^u40So#v!{3C|+yKDRs}gVEPKNV@{IcbOd73qwR z`wTKmgz(X8BqXHLuvwAp90o3D0=jF71tV*WBCSU>&@+drpq#-G7(kiuhOji|rT}cK zEyzqjfG^N+hS$vZe~>4G+j#Y}%g4i_LM0Io+unLlC5FcvIn&HQvGx1Q4PLH-jCM{6 z2bcP`;Z^_NydcQEmV5W|0mSQgSL#yR0Ym&S6&F#V>hD%1fq*rALk$CCh{``0#jRS0TLWmFhj`C*m!oWa7&37Atwv>{D5j(js+BId`K4AkCsgyg z4OJ&)v-K_i>ZVM|DcYo6S=a|f5F0s=i9!!!Q)J5Vd%QF7yRFyE{7lJ3wjfIT3(iiy zvuhGcgw+0b9~+P-3jJq*C-4y)8KW5gFCM%>RP4w8@4(YrsiTt8u6YHoUjrgxhC zo{l>YW4~@tvLAaq)_Gs98GX|6x;;hO)eb-47&P3cH{I2jYXxl2V+eTHiHp$tO6CnV zrDa)#tW}HDM25g83byh~UAP1g0eL^P3lMdpR-n7ieOH_T{*|>~<^LFcPRG0c+bR!g zQI^-7?DlydA5P;=E!e{lxoNu3|F!!l;LO}}KLJoUs0TUw&82m34F|0MM2ABfe9DvZpiflWR#X**R8v8VBLT}hzU=q1G5#0Pr3o!dHVI_9Vs%wiaOd@)^Y5c%W+x9Z9cN@Psn`iI&U! z$C_j3hU}-u=<N92Qf>wJYxpsa-C2iMbyO%-s6H z*oua+k#h3#w>7Oj^G#Zlu0WZ;E=5(mdQIScOM z#a|iWOslfk_Dw6Ciw5T>WZUbU!&uh>qY~F!10&a~fh1LDH8a{Y#?ks&Qb0S-cDL`Y zzfqx`n?WXX(jFB21sOcqb%uERnQ_c2B#{+PW&Go%*PGMY_8a|@d`Fwpongya?vP9V z80T2&_uypFqG^%It6U}NLB=xp%ozyaMOKC+mIs(5%t}$xyuVWS9c@^u6R{cD5`S|u zuO0**Gf4`Iq`!K|Maywwx2+ff&qeQ!$f{Yf)Q`w z88Z`>!fvpE*H;QjOD@^zfuyoXvB<3%k}7xG3Y8H1XeU!Xb*8QEU#tj31r^XhVLVyWjEp zb~ZH&kQIdPc1nKC*m2#>x1E!QFCYV`PTAR$Q>>hw-=4JZI?`++8P5slVV%SdMeT5@ z!O93P#Gq8ED#q0OO^Y(lTTyjIZ@h5#YWvQmXz#dsrkCS9Y{h_oR-zSQ!84+B5jH@Q z!?{+2vl-+5*{0)>c?d6Clq4rQq(PBE-`!;&#AqYX3s%^ewYA;HZeDXFWeruf7PhLk zcYd)~sMKTr9@ac*T66!FHjiF&ENQ+KW*~mmNKDL4Sh}ymMy3^YObb17p!27q5c6?X z>2x5EZ4*EGuRLu!%)W0-Lv-D+<4B(r|L+n0?#_E5eRJydn=~>gwg~v%4|xBO(WyW& zuq5O`ayH6Rix|21iHX-~z3@(|$#_d_es~FrpCZ|r%d(_PxKlsxWm{~wZ{L*Fsx3dy z&h`8TGQW4^cpFu|n*D~gx9%iHh7R3d4^y4yo|XdXPt)H60=`8`|FQTy zc)jK|ZQ9(mwFU&h;c<~U7b4qUe(KEamDX}a_Wa&-PO}^?yR|WSY=d+R>+g_8Aulv^ zTQ!Ob5+@X@?jw((52binX!+cz^Ge&YN2#Q-x0F9pnpM=)}hs7G1;?H+Of(p~M^~p!?YCT)O)A!y=#lTP-7B zTKD$2-kTHuYqia~a-x0UYcdq`yA2^Qh{;N%1eimlt-RXxlRfntcG%ci>U$;Ay z+lp^#p#Jz64yYN_nQ|{r1Tz*!QTh1EdRrD#K6lv1=fLUDZEI@h0lC1-L#cp|5aw`p zH!MeX02}VdKWo1XEWS_tj7doGYIA7#^M&F^eMeyDh~fZa)%jb)B-l>dYejNo5@YJ>daq$IFpGCVPGNFJvqq6sm_4B`Cs>@-i~*$tbtE7h2Dp;LX#`9YfgY1se>HP_$S>tUtmlb*fHCL$-5>I*PsmhWXS*t;@HIRrz~E3jqalE~`S zY;cMx#F0uAIj(7c{@hn{eU_xCu_ddFr5|UVpJ&zeInQy<1#VI)!3G=zNuljKBW1gv z1wQlL!1u0CdqMSdU2{S$e6d(B*>KosNL11IYV#-dEam;c6vLbhE)kb4;E~*Ui>3#7 z%Y2D|udYUGHp4XKS64?HV-Y#u*7|u(ZzhB0p+c!<`F*`QU3WcaNF`G6bsLYwC`a<% z=PMg-a8;0oT>Cxg;`95!msgp;@05_mTVM0R*I}jvMaUfA>cAKXi z@`>175tUFTj#$W$sEj>5FuNhHvF)M#OEwC!J9|g+z5DX+N%!uiHHv3=PJ-bA#b-ppz(6hST zzI&$oeEh`fYJ! zBW=^AjjI%bY0MyIa={sE%eml^#1J*EH~iR9*QDL%0zKX$C|~LYz6H_UcMtRO$Mqvb zmFR$EuD?ci2mfqy3Nx7r4ui+jlZw!fD^q)P{fuGNA*IshV^PhV)2<+eEy7JYgQJA#% zYsmJc^}kt^mZ$Vd3CBc{izScWPGwxrtKuY7QC0K}YzOSmp(uJjhl1JXzxZ?*af~$Ink_ZzwPT zTFUZ|O^}Mk#|`5O7#QTmJHQqwzPso%Jw}Mb&8WpSc*+}6T0jL zORNG;kBfuxvjdaW^B`C?O$Tw=brPpE*J&gWiSKRN@7h|08bEXF9(~S#`)}atWftlB z{PH|A3{VeFmjN*g?p)e*Q;1hfjOu&~$6ruIP@V@?sja8XHzTMdN##-nNA6V|)usJF z1~*&~RsTde?17DOvKxx~x~3@FQOvf);1std93r^IiGK;m4lWRq^B=@%}s_!5JSUu-ZV#jZidT`bWxrs zg9ghm@gJEYDRzVK@G_aU!YND4r0MJs5!>!#=*ee?WRof{1-T;d=B8G^HqCDx3uDx&X6Dzy-w`Dba z_x}24^`Xj3L$1t#!%U%|$MufakJy}E^!{|;b>(Lz4^)P2pV-m-OS``T8F!)t4JR%; zKkTYd;_d0Iw^?!Zvjl0_u)*jsk$(NT8PAeMT0*wo!*Ak3hmAI_z~1J{eH+w}0ii?l z!kf4SrP!m5kCJsM!IKB znib?WcK0LAZ*C4{JihB$v6az=ZrQ|tMqNW(D}#RsrpI-mo`X0Qi?EBM@yOFa5%3&Y z8f$)Jx*6T!go)<266NT|;9!Fef}i{C00khui)vfd^*l{i{bbXaYA9vDdbPPBc zuLVrLK8|+#`U?4`Sr6_C-a=;fwKbP#CFsta9y+CV@Vx8ynqe!$DE+|a*egV1`oXRI zOrJZD&mJmwNWJD-9cYGnIWl{)8l*3xUOI`LlV8uZcXX7w`6SP*mL=BsTh71Wuq`g3u_yh zdUznh+ps{$xegvSNmXYtS7(=GaQ$=1$QJh(j7Pfy4hDC_&Z`n>SDj8C&o2GosX zlHQpr>mSb<6CSZE@1Rl03^ea!ULJ`mHqBlkazojeTq)Q&J*Q zt~|qa{s2Ft-$o_>hO_Fdg5a2)hH6%;g!ILx;+t9o>>r_c;(U+EliB;gHb5O-4$KB3 z#HID{!emjs8LXBUx=YNi3ngDUJ-nIwemcH1KCd1Qy1LLaV8qcPtm9{Aap?5V?hser z_Vk&xv1f+Puu4q2Vb`;8N%(5MpV=c80v`IRO7^|PCY_+J%&B6w(OJx0(F4N^1t={D zr8C^q5t~%ho+KZ&3E!D2fHaoA!h(_naAWVTx(+Bx>0;9Ou!(e^ zQH;_Y-?Pc%Tt8n_1K@*%TIA_EtEl|DAH%EGR`ae2)Q@Fi>i*Y)NATE=2@vj`oyiBy zLz3b2zXp@EwmuJ)5Es|mB1-r^kM&b2K=m_@vL})_u3^}_eW7%I?N^WHQ1k4mC**cQ zEMU*|-7eR8Y#D+#p9^!8f#f^{@7?)ZluW&PZ8T%pnn#ALge^CjD*+#!{3>QB znu>ibmbtz|aZG#!FaX8qL8iDZi)mHFv;L8eN1TngR~d~D4|F{3HT#n3(L zeON5_VQ`8m%RkN?O3-(CoHPC+N}rw=S|NJVEU^UirhJz?e53NPJpWmSf8Jn)-+_)E zcI!y?C$i4bBdA0D66oIT&YUo%dAD2!YOu}c`|x70N*SpP@vV(0xT^J`j1SP)cGBO; z_czWn$98)Z%-b{n5YF3JMoXJs;WQnN!m(Lvq6RSmnc~`q2YO)620Aq}=s1W17o2uR zQ>wLX3H%mp(zyDZ$iLLh1dE>)|8$KQ5T`a9hn~9|EZIXaxi&ZdN-oPlu9bGNTW_)L z`OAO-o`?D_7DXlzHe__*)OK89qs87_7RU&e5HIil%kbggEi% z0--FKC=0rpDGpq%<%bKd^hwB5=Z_-BKB;YFehS$;w>mA^7d{~&q3~C~8;WlS>!gI( zKS~E5h9Qlc=$$SOOes5qj7ylKK`kzSXc19RmYxu9<3rW&Mk{Qa7MC5*(~s{KS*J>d z!{e5PyohgX06&h%%ECF7bFmdvJ3-WkKyyMEJmEAhpp4;jZY`w-xqXhf7_yi{+RwPW z<{+F_*>VsYI$?F8L>j|;$tco@p)bQPu}cXjKdGilQm{boMo|2391p8$jm3ABi_1}^ zp_8yj%?#Gj6sezjrg47_gHmLU>J&+J73MRc!F44Gr#DWi}L+!|dluuCf@V+-X#PJ_?7 zPwvYgqnY7@n9ioyGroKc2$yNhg^0f%NouFM@XBY_T%4qrE)_vP##%nU5>J!RVrv z3LyR?0=*O@;6I|AR=KCP}zs;wrxA<*yxx$X2-Vej&0j^$L!cn z$98h|{k+%tu>QcDwQ7#48a2iv5(Uu-xD>&NFi}GSuR_fWnMdF&a?uM8Ms$D)Xnu;I zC#?ow3G^mX4ZLYL2CsjFX>FdK5atV=j>Mn_o~E9_P8svT?f#W0(MET4nfp_++)+Pg z1Uf7RF1Taa+@vT44OkGCh$m?NbI{9>LhCA6fXak~cRZvu;XWOXl=eXG73e8(^ZlU; zcJlPVan9UY^x-|}K0{3nfTj1j!T)u|zvpD#rf!SX{Yr1ST3b!K%uGd1&DoJHqZ>V- z;=pJdA!5W1HQ@DJ2joX6v)c0LKVGN0%n24H5IaTH6EJl~BFW~NIA9Eih$wJ3A&I7e8kfNz+3mn>H6S`H6&=j>UZ8QM z%V1meqk1nM{a8xwj@@LgFfvL`pF>u&vOmqQFHT9YHAz2MT(9Sl=BoWB=VOR8Tm?TG z!tGDNTyhQ_3Pz{A$=_pHHNFlANKx3Nc^pI}qz38ic3ma??wm?3aw8fK^1y(U=qCoH zV(yHiKevzB`~ZTJY1^Wf)~Kxv0q_dc8w!%hR8o*9X~U=QI}0gMIYtonPA#0jT=laR z+2y{STfX%@@SGgB-ruN@8}6iXE4qtBJ5u#bzKo0tRbF0R>p*Zmj@{?`ekrbL=*x*L z^kQTdc!jBRuB~%E$q1&52*68}zHkr+nb=WM}!U-l(?Mn#lPl zxeOGwR6_0G{4jd&D3#1tOqlv<@*iBBCv zcquBx7dVM`7%_(Zq+bR3gv*a5?H0b!ZOj`JfUGW{MDS5^H1b|1pww}{xT1MwhU%KW zd7cMin6{x4iK}28s!HL@Kg5=HqEJ9|XEUN9LL#vXb(Mvl#pDu4pITC(I<$L5&X8{U zfd7rh&j~(GYbJmd33qlMMeScD58xlpOxFBNc0 z(&}Z13uhG#7PK=@uJP;D;0s)Y=0i~^Nuy6BtrgG=dDbm;4NbH4(YVj27UI6+eFvZW zEO$MxSIS1Ozj(PGACVJbw^D_joqUP2C)b+|04YQeKvqEs(dMba+D9D&i0lm*#50)O z3TXxb)PHYMwO&J^?|k8pg};AWcJ$LGNGs6ZeJM;F**X|%0HZ!E8M0sQRHb#X~EZxO4ATQij#RIWg?7l{!02AF`hWu81-PJSW^KiD!tc@};{ zz6h+va#E6kj2_7Yh5lby&C8-uZV^0T9vngQVX>bwL|Y3(MY`^ZPaNpzCuIt24EdBAE9_PsMrd;5RyA^5Ly4#RJ_-B09- z{_)tY>`(a9K;6HaV*kTiT?Ox_3r$+}fU8}fhm!DuaEQzaDr>ql#v61(EMfW==?%vK zJvQZFBz5jXQEJuC?d6q~w#r8Kk0ZyATk55U$EVn8ee4@DEFv)UF>!`b!)vJWXaPzw z4w^jBvA|e<;~c{GXo(`Hhy4+3VW9Mg`*q#_qI^FfqO_Fi?fsqCe%vunyTRw^BzZh> zp;y?E!Re2>xuWf!u+Xa;RZIJXSmvRG%X7 zsBA&kXdX)diwOgSR>&--r2_`AICcmWW2FI)Q2RJORA3_HO6!AxEf3*){BzHpK`R8)`;ni4sI;IYdoLp8Fcln71Ds*yHfA1eNM#*1r+DDR@|5CKSu^a4QWmJ>DoyU9&UM{1ZTR!)CK5_i!;G9@%L+MM zXPH9X@6)Nzkh9Q#L)^qpGIhlme(YnvAGuaEgU~sO0Ck^@fdSur^8r8Gecw2#%Wc2L z*OD-+0UoxO!onk;ry|g64ZS$l#%5;=XlS#LmrhICAHQu$n$`t_ggG){B|(yeSIl3v zppd5}s+3>)qqu=v<(i)jGT&O3T^sdgZYz8pQ>{`Cu_5W>mLS4ltjRmL2Vgtra z$Q?e3oYns@s?*GR_$j7R%grD?x-38HS~)k$Om*edbs+5eX?XuhC)}5kB@h|UOy@B> z6jCdV-Pv)8thC6Peb6*UJosyw{-2m7DvOY83L{k1)70;L>K`hw;Xx;R-~ba?toW)E zpg9Py&9Rnw>r(zE%vw-91_z`e%Q`X##IV@s)@OYQyw}^MLluE3O{DEATve+Gn?8dD z+AUA6rk3y7QQGHTMp>?q&q$P6SE+oK+0Poi-krqpr)Qp{!{lR!?e16bfP{!4QuG>& zAbeW68-HVXk?@1Ud>>*sNL_*IEvR4_1TlU6oIca>Bx3umPS-~uoO|B6ENtYUb0iso zbnu6M{&?c{xt%oRdory3UXn^J2PRmoO{L*^wXuYBwn+LJ-lXRoXNqZ84O6yIk$GmL z3TTa9PsFg-Ktl+vECZO$H;Gi#Wm)M6E-kBVk(bc{6lcsh9#da&Hp6^pn(4Ozjw;x}%S21l zW<7Jk==cnWT%!C~LiMRx%b96ta1YUZMrf#T578g8;;LPjEVV&_3j`FLi0-hsxQWl^ zfAR#d=y8)xPsiG9Y)}i_{Hv0ygXDSNbUqw-CuT_{+^vfS+NLA|zf?$gtaKn4`Mb}r zHcEPLVPe8Mx%#b}0wRt&B@efWb8!)*$sKlGkjw7CcK>I@ROnA!!38SHzQuCF`GGCAPq3enaB;bLW3YA6u?DugcAQZ&~f}2dhUg$ z@aN~OB?6vV^=Tp#xwwvBB%yBeX=E^YW~CNJ4Z)R<59Ch!xy%#72_v@AyZ!3lXk3}~ zbB(8HV!z=%2E*2mIsf(>;xPZmb3<44tEUy}6dC|B92o&SvW`wZUxTL8_arY!AqG`m z(@ydX3D65ZX)51hHlt>_M&Dh;mg;{a3LibE`I6Z!&u8X%QQ0RD^%0|Oj!o8BpBut4 zr$_!c$pD{TkU!8n>zhNme6zlt>52mBp_r=G7b@mQ|8N;XGaU(2FKv=)VGP`rHM=)mXRhg z;jBWe+@f}csq3p+CW-`ZWx{sU_H&3z?j8f!T+{AH`%t--%ThYUdP|avx#E(W*hbAS(nN; zE`nT{KWw>aO5J!_%S7r-!YjI$K;V!dV!PVeIMs#?GF?5*4)*4@1LADD|*?pCvv|DA34(W`*a2Zn%oP$uz zI7~iETU!d$Xy1dIp<@RR;9t{+c+=`U^E;f#qkiGQpYR}tea2F^)8$O<)7Q5NLByBQ z>5w!%Q>VNVX_W1eI0prA8z0C zxGW2*94Xta&H6m&S*_iYnU?qI`%!+7)-0dJR|A+_W-N(0q_F{U`a@BEhz(d$TJAy^Py= zGKqJ%5Z3y@j$?Q|qFu#y%~*dUrr}63vMt}%F>sd$)hj9M6n8sNwUXycgD@I3w%vAz z{ZHLjeXe(&f#}K`l9R5R*mnfsk-Qu0sqo$?C$Cw+^qkM2UA?LRIT{ z8~j1QZbvZ6z8qT1gJ_f-OuG_@tn}rOX&)eZpmm4ybb5~eYZ&xEw_B{ARVeNN1$Cry z+t1#|oKSoAX6@j(!BQ1*lpCYFe^}DCAYhbk3u6RK{7WRC5+!@vunmmFXl-m00$n$* z|B)~T=YwP|%x(H;GseWd-$-ds2dpsX^X*q_TJI7P93QN#$~m7vy(coU|1M@+*7{7_ zj6injKSz#Hsy)el9DNaRzj8cVTiX0o40u|`U7ab=zJ!vx`mC=9MZJ*nDwLyoCmU>G zUmr+hp_Z`CQpMA&;5}3AUSzzfC`E0QKI-IazAKn{OO?fGrko)-wQ}13FzMpHpe%*gT z-R7eAYXFki>!m=7iTgCUan1IO05`I~xM6M+!qpLrDRcUWdivlr6$Qr%lmb zbvu|@u?AY^KDIB?CBid0hh9_kPK`_=B^VWF3RA1WJ4C9@Z9Z$paiAJDTiAxc1R*0R zoO*y3J9r@gCRh1`AOuEShL{9HUbRja)W|<+nJChd+zv4uC0Qb%6(t7o%9{pB7ex}n zPT}uy&h*xpr;9SBb%5Z8EEx>-#3+5;n~kLzecR^|_kt zc;$2VvtZuW`bzH;KX4K%oaTMq)90ktE2^TeD{f68Y};7>(a_R}FCUeIX*=oM{j-}m|S zzZ`Ob>^KNZeKW;A3&LVEI;CWBx90ACvC3colTpHDh;B!pj z3G`5l3@B+S&3E!A0TwC6s>ATlG-#N}i}PX#6lH@74YGn`cj#DAt8Z)h zi;S(*^}_wx<@&21*j->y68<~{U0J9ALLraIv1VGewMIMovYyL}(RGgp;9cFlD2%%# zpjx8Y5yOQo?8J=-wh1D;v05bfS^7c~bC}lpSx? z5=lo9T%D|sn8PVsg61}f*hPz{AwylA&pS@6>G?2M!)D5KHjh17ik#-qqz;0(+QY31 zDNChfw`!oqh5weL-AnV%N>ShsDYt}4?lT|&fxqthSxxPsNQtCE9amJ?jwU|bN(aXm zeSLEKK_Fy+ng~-TH{}??8Jj7?w;)rI;NBnbq$Y44EsUiGhZH{RsKsP zBq-0AXG4yUJHTyWSTFPhd$rv=qU@*J-SB5p0A zk2&%*z2{q{xXq{7Iz-TH-={T9-ED5tT91>XkBc&4i2}y&D~kiZsIpT!Rs(^Ek2*5^f;>vC#y! za~KFLG*miC}($^pX=fmdg~r&Y`DQA=}djVOG{8It$FwBZ@aIjig=&q zB8Q8RJnK*%N(p0LK-IPfkPqE**m#4Ie)?9-#&B6e#v!eJfEXlX6S6>+Fi>3bAjRFT z@+KXGZhdZc8FSNnt4-O*+~y9IIj%1?3~K}y1pUp_Bpc}V+I_Yt_DEuOJb$`nXT-vL z=YhDBY~~Hh(>@lk+eZFohFGF!TO{1*Kd|n)kfg06ck3hl9iuuKIte({9Z+M&+g# zYKo%GKUB@%VsIlfn#_sbc0ZA;pK=zLZr-&A#o8)geTlbHhp8PcXSxHE4PF<_YKq zZC?FG>KPk`9=?NI)e9*7trgj0VSyC!cIQXW8(rF~Tw$}>K6p~`c{1Dd36H*2f;5#9 zRK)=fNyT@-Blg0XKv)z^F_#-dnOwfwO-;?x>hTG`JV!zfvUsZaNpPgBsmagAk?nJK zT7>;NEBL&bk;;E|jlH)tJC(6W?M)=tX1}$G0T(F45yoo^*W9wtqq6xALPvMm;oOVmmIp{+4F7S*FfPL`QQy`_>OOO|q$F_S&N*_5tnBN0OXbom8BNKwb zE>C5v8B%!qFbKRZBZ3Xu1x zCm`cv7)MSOPhO_q^e^N~c{_Uoi>MS$#)m^CvLUQy2k&cnc;bRpg(MdcEZ$cI>%-%E zL4P}38~rU6wB4-FiksHISno#n3L{Nzko66j2rU82FDc1*YIS_B)o%N0JIVWg%6a~H zs|_El+j5#@+;mw~NXFvJhwy+8i6-T2K&ZN>(K+u(Tr5<8L$8selG z0@33)0#$Z)D@1q!%n%@qzu^P4gaXpSeP)=Z_KZ!}pyb)W^KH(pmtrcKgc@yM7dDiH zUe$Ab?gF4d=paQXk*?ZroAUOSXMI5fko6vCBc*bEtS?#_vli};r+1p{FY)NnAVwP$ zZz(bKVdu4CfSM*_hHiLi-RJ693RaY*WHE<#mIr|BelRT9UH@QmmXycW+sc~mPMdTE z@*z_x1Z|&~pr=l{I0uKrKeq}5Ys(^Pt}*2R<=mECPPa+2!-owQtBDp^6^AIXz4Od( zsTM-ni7K-i41mMmq~F{YvHXl@5gX781T-~+|&DJZE z*L6iGx96nGf8>2OAnZK0=)Fu=X2&0qdMqWW z>=rQ=@){77LB!<|xOFHA(3tBqKcA5sOSxrgciDUSM4ibdmcr=PZA=0uauVoYEYV@m zP~(PPi+rws;7e5GuUsDhe#JT)ZLOK9L6dTeNZP5uG2)HEXzu{@m7)%)I1li}nN9%G z^*!F{n%oz=M+#Y<#=g{oIa@60q1&W5L}7cTG$!3ENS43IYj5wi=TgR#t+AQ;j=K%F zA1C)|zr*nDcY!tzK1Zc5{KKynInzDJx@bpILT`J+rLI|}*Xup!9hmf*%OsRw^z$%N zxk2*Q)L5~o3KTREq8}n>nn2(8o3Yh4NR;ZXLzov&WtBf>yP=#vyv7FS8Wt_c0er`kuQk;mvyCwM{d}h%6 zi^*8B-9i};G4q7ZJDwv-5%^Z0NU&iFp$!s+lZIBI@~8uY-wcKnXtYH4{uzJB&a;=^ zE$G0Bf%sF~1$2y`{J2_LlEBSr#<%jBa(&&F%Fk{U2sp_-t9Vm`#jUi%62dJBCtfaB z#Clf?;`7#P^ZceU`{iI<_?7@h5flaCc+HVUGdI@s4seyjjyz>Q2g^sIXf9E@qdL)rQ18{dvPH z3Pu&PC0hvqfMuu_BcQisf@M4D z->0{__zex(jT*jhf{}ML7nM1|e%%V|4eR%HdiUwtv~7FQa|6w5cP`&|rrHk+qdV@e zx}u0@^Mt>#`Q2>u&OF~D)GHW}kR|*Pid)$4x$WU)wBgG3_M4=&T zxTtV;)pxN;GC*@6x$R@Ke%jXOfs@Nd9!Lo7Vmj@_j-VYnWwb3B`~<=`mB>Dp8G%m* zBF_tB;9Dq}G`@!iGTK5?#yC2a5rE+na{y5UFcxdY0Ial?t!t$Y4gNM)Oy3-AIKa=) z(fq+sNb@4(xihvnA^QPE9w>=B48heMC4#0kf$$*vjcDgmZSrdzIL$`1hbRgT5>fy4 z)$mkGhH+9bRLnRrfdp^XI%@y zM1qYl)eD00Mpv4V(E73HQ^vt3^zt@0D{Ne`Q%Ha{UhlNaI*7nK_arK^?ZrPgI+n1k7X4AUw6c8A z&eYq0ht8)}Hj2|F00ARF-K+&5juo}hl}^S(*d!%qVF}W1Ws-=CK|>vj)zhXq^xu~> z@d(}2wO9I&gI+#th@zpvS-dC%yt!&kBL9oMP$4b;`5#SttKtPM+nFID7O!)7D>(ga zWw9dQ{a%sY2@$LvtOKwInObwpQy0IzM*m8n-bO|RW3dpu1lm-vLSe4&KmnYoq-Q#( z(nP@G0$QpOj~t3Ug4(X!J6#HqiHu`JQ?xKhHXUOfI-o$$lv8C$s@Q74(FY-6a1=+$wgS8OW-ODr@^LP`MpCs4ywXSc?hrEOEC$%%AmJajXB~lSRF0F3 zZ6DJ>mmy96kngXjwh4HAMZU9PR$%!#wF^{JeYrSL66m$`ux!7047qPYQq_#kScbZs zHo~Z_vaGfdkx)Tl>5Y%r#ScbW&Lt)TsLHZxRSs?=|e~jSnC-9=F0v!pY z@bGo*FE6*8)j04dzwsvG|LY{D@_-a|md2?s*mGbTxRCbszB8jcSXo-y;}cwXLm5Ls z0jXwjIq|$ElKnl%RM0J=641VOq4T3yAfjTD#uhQYLBd2dq*&3cy-cH1rPk(4D=Y;K zQIU@t99>8)4K$pbj(TIFG9W9^!fNm9_Fkj;zOgi+%R#JuGD}mXvIIZo?KLG(SZPX> zGxLuEK7E6WYa4XVa!-zjE<$Hq7;FcKao`nnbYu(^6zm+| zcO;G{m+?^NcNh_}ys|2Ax9 zM!&PB$4<;f?%WP2H}>%S{M|A96&3(jaB0TUe{NmU9o^$=RM(pwlbmcp$^C=NH;|Goe&N802-#5afhime9 z90%Kg8^i>bRw?g-aHV`m3N0+Pn3?}jF$XXs#!S>TH4dO7u)uV5gYt+mut>oIR#o(B zC}~VN4Vc1ZN@_~#+Ux0+U+yojf!n8)ky;M)}u_UD!Y20%QqN=2w^Q zvfK?kM{;)F;=e!oZpzGbEoQRg((Iy;V{F%WcviVVhf!1p_dV-9keazj3`ppsw3q^l zNKS@+L5&{=-IDECCu&mW7mUiLz8TbC(|V(EK^#*+QJ0o4E4MWyzwM!Bk|9l_>sS(R z^shci>WpzL%xOv4DPZ1~iwpcyR>K^#jIY#+DL;p}46aYB!<9Y}!52_U9>@A~=o{wD z+c;sS$rWtK@=(%r$boQpZwj9|5F<7Ee3|DH*j*-b0*B!vZh-H^$8&3=@5NYPSBJua zj#xWOU?G@ZjLDNbTD{_*kAg;Cq7(0RxA zc}x3h)MK17?HACN?`vy$X@l7-{Nw3r2g4?neOBOo^d$H5^Fy7hX0)}X*Ehd!XWHD^ zU%L<+5_ODilhEv&#%v{qE;*LyQBbsMY>|ug4G*sObK@Rmb^}`Zg?w}pM1l+z4-Zed z-dM?DHcCRkI!@^7<&bm5=Wh9ame*m!aBjY^RqL@7OsmS zF;@bdMHm2nK>?A;)1wqY+CK@*hV;~^0F;dSWaZY z2W5ee^|h1Sq2Om>kp5=e#kEE&cC}J@E+8YB*>2OhY%sCOcr;|Us~V8kjzpC@a&|gI zjME@PNRMe7L{y9+Kyg)A78|?_)g_vR<|Sgp??48(d=+BXwL9`RVfG**+7Uq(Hjd^O zrlLl+r5dBXD`w;<9|anzP8LaKgbrg+1STt699h;(LCXO9@<#u&58M#0Jb>|Q>K3I+ zvTfOj?>RtIM2gI8{j@S>p7|#gEz1ThJ{Z*nvUGVyesCsHK@5iv&8;88_LBFP2Cg0~HiB<~O}ZVmx(Bbly2r#QPtvkGD6u4w5T$f*EgH&%!5$c!5emw+x;mPoz0Gz6G&0y9 ziPg2Smku_;w=IlwaJfL!1YU}qkz%KWS+S@17W@f0h|mK#$t=`gaOhOAMJ2t71?oxJ znk0EM`LU$Q@@gmwLRl?<%0hypO1{}=$|VCF4G>ye2me7WOM8jJT7Au0Wx~1wK0I=u z3=$)w4Y6JGpe7V-?ks#XC_0*o9Ap5DNAG|fHR~F~Xv1lmb_*__8@3_9Mh?EoeCDle zNBB9MSRtDy5lG@|`x4TUflTF*9!i-;!>1%;H=oJxXnFjcG}M0TA4$_!1+FpqFMm~Oq{JC1m4iTDEBHuJh!upa68Nv3 zQbWN?^mr;HgB^8jkr)>Xys})#QX;&2OhqgTO(mVN%NRgS zkvzAC=>0Y+g^5T~d$4P@rD>>{#{1c<*1G*!<*m56gEiA}k~{tREF8fqN$7c)2>8ux zc*UgMSbPwQolA}VkRWwk6T|~|Kvzr`R#DY(p3i5zMN?EOxCKw*MkW>x6HujG8|@ZE z2BM2m9ssV&00s8xRfI^FCIxnjKNc{KeWBCD(nYC(xAT>RCtqN+h3L$SGd{Q*L0B<$ zWS2Dx5hC}6*VHu+C@67U0wHuJEH1@b+(wv2EYF09I7%NTQ?W+V7$%$V2jjPNTyt8$ z0zr|VrTHjiMhArs$fv1ykIyx_jBkPIWAb45?OuUD9Wa`E39t&NkbC3o%NqOTC`+__i6W+nOs^=TW9N=Zbjl! z$o?gpCxi92%fr+yR^@|lmndCeAV&3Nz*0mD;ufc}7|2AM7-jmc9ZLYMoa$qMKG|_3%=GeMg~i|Aex^+l=~(=DN+-ZGz@*2ug>CdiE|Txy+X!Z z9o8#4(G3Hc-`o3JtNYj;RmwHnXFY@a`*6(N7Lw=WqUkUYns}Sp_UC^&3aC>G*^g_H z?e^G-h(BgM+t<+4M9LjEaeLuJ^=cJyCrV?Wi+$9> zn_0)J{+3q=NC`QVV>MsGXBypwN{<1Qsi+KCX>&we2Xdtc#gBVi?ufrb3d~A*6Roe{ zC>>ZdCQRxmj!Li7?VB|w&~}#+-jyq>ibWHc83J6vtSjvd`)cvpN;4x4cIm<+4$$Hy zBl+wTr!2hR{Su4+W#q$*X#MmTf#VF6E5?>D@)*q@9#|m?^}%A!XaKGep5lk3W|8Ey z?9h>orW<|$iSuuFUE7cGa?IT~WPYFLUC5cA^}ynEpOF|Ii-@$2N&lxj+0N(Jvw7cl zrN05bSpCvyfrDut1fN%~o&;43;8;FzEjjVGj)<;#FDid>UoE`X`(6iUg6!9;VKp5n zytxPfoPZ6~s+xXn3rj$21=gl*urd~;)YmpE+x0l3>?LBm-OqRHcdV}bvj{f{l?rA& zgMi6^S#DXKG^JW`lNHq48!isPW*dkyTm~yFy8|8p8xgKB5mhX*&eKn1{VowrY?rIX zEYA)i(cL9LtXhhoFRe&;Yo(}YJ{T;Qrl=IMz$abxnrinbS)6l&!?{}WRj=v@A1)Ny(GWA`c z`F%z6PbWsl-IXe2f86u?yFRD#x7zcUyac@AE$xf5i1W&y5G`GS%2SbhgXRuCIHs?u z8O^Ax`*N;(P-^Oiw!kY;CDwGYn2q-p)aKrA`w0Q#W}p-i|8)e&0L-6d>!ZwRU;@Id8%`B|xsA{Dsj-)&%GoPMSL*h^>_oigR{gViU-ka* za(lpyfPgeZkV?1D%HzXler%dPZ!eV(N0eV}Ao7bL!H%EB`-vnmLPNHQW5-bbZVy&W zd#|A1AG^?z#x!~aY8>HWHP-fw4oltncqX~U=BFG00Qifksh837w61iD9xoIYZ|IG< z^D?3NoOLMd`{u&suszic8LqVbcdg^H1l#Zdw5+VFY*;IvC!IBxr2+BZxd?WDte8G0 z$BMWsCKVAQDf2p(k_nJCK_#Ri`%g0dsy>Cwu|r!LG`mBk8im;zcXC7FZaF9NS6ibTLQFAhP`r;inn? znYhZ2?`wAF^QUcHt{$)ou(J>>7=0_UkU0r;ksl@KsF)>{G={HaFHM1DS|VpXRHUQ{ z2Hb1YSLW~AJ)biIeZn)FU0o>WY1YU0UX70qaN_;F43a;7-^4aqkL&VgDhspkd7gHs;t}dd&fx1|Q=YQ@$KVSIR zBXHkz-1Ptc#K6EXouMU)zJHxH9G<=Ia)|hw9-PUJ%WKrE2qsRF9l)u(yM~Fzx;^7++}OsxpaHJ^NB4W|kCTOt#8djXE+i5klKArV6p;fTDv zIDa)F&P0Jcz&1nOt5()_IW3to;?4!EycL&nNIR5JG z;r1n{i1B(5ZSb%%5$+Tb>knhTsnjs>FH^o-7xEl~YZ#3oVlXXT(WI6vHCZWaNs8sjsH$XGJvaKcG`%35f@}*ia=;~v79BOQ zNHaDGUM%oc$*#|a?diE$R!$R^4f$Q?a}?EO-*I%DWj>WY5QRzqv>~|g2-5yiHv%kQ zqat?ip{#L|L@d^x^6zZ$yozY(fBaqUe@U#bg6wjwQ$&lBP~kk1_6$@kZen1;m7J{- zNox(w9;SsXHD+_%muR(LlQq+z92psb00aF16@LEuI7#{a`z~15{;&O1AgJjl(o%b( z^zWv#tkSq1Di?caKfl1r@=BKFo*utE0Ai>Z1{NmK%Hr1jSgJ#<3(rfo9Va~uVrsb~ zdBP}LF-cl;pSpY~8_-8!V7ptve^U0$Q}nDM>|kyg@e?&-q$ObjPQ)0gvJ&DpgM_M; zqQ&Rom2jUN|GMpH{{M3UI^SJN{ne_PCO0a3dv9-lz$3HUfA0|zSDhbCrWwo-w(U#+ zYqud_dxgp0`ERD@SHL%q)C)L{2ZFjIs;UOUkJnXgzZ|WMJjBorK8Soz%SYi2qd9qQ zoS1VtsuVWMq)DMr|FBTj&zI|r_ij1nRjIl#j-g;YMetn-I}TTSDo#VhhUQBbIh!15 zoEy*ayCXIA1mR)&#Gkgq6&$!u{;O=&f-NNv4jCr=8Sh>OrqZ?fA4Os^oIZMy9x;{_ zL8&q4?;N!CzTCE3mn_afR$dwg_D_|$+uLVtn@;Q}+0IPQTkh9>JyM-;0ny*q^1Q$9 zQb{l~202P9+@P;P)ST}r(06aiAVbq%JBpox6IKeE?o&_MIOok2aAi01iEllcqXmA? zVH9#%0>)Ii{lDKgfdmy*J-zCvsHk)nM>fD%jLAgtxX$rJ)ZGCz zi<_Z(_+}a?W8e@?uWW1w7u)76S@H)>oY9o8ce$P!(1Bj|=%7lkDW@YMrb;_VXo{!& zwl?sKm(s+-fs#P4??H5HDZyPG)pLe0f=0Q&;mb z{*SXN{_OnHtbAYE7g9ZqbO7W7=qlf5PvHH-E;5aLHd1P=7%QkOT3kj0nr1#rJQ|=rA{y z+rsX>J0)gkLdX`17oJc?e(bo16&a*!k?}1vcWQ72vlkDkShu%{Z$E0%hNjB0p%9Uv z#-7c-fAY;c3?ZG4A3m;z8RJA_F?i&gIh=b6dg(uV?_JY@Fn!rLUbd_>`n)=AYj@Sk zO1SW;TA>o~pz%TFw?VJJH`{CijQDHBQ*#EN-kM9gtgvmjYalE3L|?ljW~1+Dh9Afl zM^D?`CuAbzw2>g0EA#7rO#_EgS%%)Pe*qgC8=xLQRVKnG!5<_jBsefgnTE9ZRyJeh zLVDDmcB`fAHSAQ0%}Yxw&(}89eV>oPdN;54v)(speRda!h&0_qrh_mv6C*UV!}jGN zn*=1Od!N{K6>`0;ZDd=%eBxb&FbweI>A}VO(%%8K*2;z4OTTLeUR=D(N-uNxklZeQ z$VTT^;;A~OjFrLqb8!`kv8vmowUPw>`tHxm^VpBv@z1VJjb`dh2ew0*kOXe>*+*ln zUo-?zsfmlhBv8c;tx zq8>lZsjG>fweumlhg=ePm!s{5BDprVmS4(SR}BvTf@rm~%xfn_ zN~Vm{-8w6$jv|!}b&4o4tuHG22t|Pa&Xic69S8Fkf%txrn zEzbTG>Vzksfm0k{X&Mk12r4LLfIbAawiaQaH(ZO1J0G9UlJ`5pva_GK+>t`P=hZB zZg5r$P%bV53GM3L%CNE#uuLNhj7A~U`{P$-U`)vk@{+rY+wQloa%Zq}{f);rJDk5C zjzZgyd_g0#RA)3G=}^O}mzW2>#kW~h5zKM@uD9lGsmyrtH5 zS8lD)i`r4%|0o&b6Geo(n&1UAx*UIP`z;;o|H=Is(_?%w9-AO7)*q~nL9VY~-=^zO zo8>Nk@6EOyI%7|{;TBv*wBE^rKSoj-B#q;(iy!iqNLVA?XJ7U2*5l&5@3W?>@4wxk z!MgYeS6U~%YeHdu6cOepKeXVEQSz2^Ur}Mcr#yI*aDIK zaNOfKcIgH|m6ee6Y(AWO(QsaDwLW_WfmY7jq`FwKUQU}tveXzo?pX%0<>PO@jbXNv zh`0y>xGrrHl1<1Nt7}xC@jpF~MHe(MSD|Q}iCeAHb*~%@OCGT;Dt+s`f<&x&KKU>% zFJ)4d>&At(u>KW@dG>11@8gKs;^^>@VC(PSlCAZT*Mz)S zQ;Wcf`NqGkq!}S!EUJ2i=y6_M1ts8_8|;Jrt5{|>CKxJI(qK_eDr=(pZ>Bg#+BD)B zCh)+@Z_v>q*YkLV*zaX8nLP0iLbhKI*)`qFB%GxpNZl2cB?S0tX@(=n($ezG+n|{t zQ{Vo=9!KM5w{H&t4eYb;R@5fm$vKlsOsId7MKm z5kF8#ib@USNy*0tGux%k&Q41ysj(zw4b1R8A3FG@8&WD2{6DE1R8 zNYL@&zl*i61sb4d6NpEqf9W~aa&v@)jiq~|1hp0_nnkz}z!zCqWYShbUVOFo`Fj#Jb>!ehI=shfcU$ILl&+;NqAhNmIi95R*7i zsfqRY>~vhJ#UeCsTMzdH!e{EJ&$6ZBU@pYh_c!b9mndsqbp zbp)H>`oiGCl*ezxF22NUJ%qB~>9zLi7BFX%Dfcp>#syJQMG^p3ySs;w=Kcro0uo}{ z3GhBmZ)k?#!Jr`6G@q~i;57gDQBD8HDnsAv=0&CVGx0wEQ>AfJCnh!tJ&a=!M^Fsx zfj@Y|MOmM#pu|bZC6ni%c{{?c_nonS`-LzALgBH5K5mGKU&+Kcf7gV{3B+AK7Qn$3 z)DerR_%>g98*RCnYGx5-r!K*X_(NFBsu1mv+{UxHEM(kY940Gf?%sNB{AX9z2Wt&B zPT}Gr>WCB~R^IJ%VXDggwYHq}(`jh{nwY@%@vmkbh>+8su+1`qf&ZuL@l3}33p{hL z$BhU_64ya$C4=PX5_vDk;Y&fSI=o-}S#w&`;#Z)t zI$(0%?GGiX=g8N z=bMpfYTQw&DvmGeMXr!t&Dp2U6!pSFpyN`3^iL*Lo$6Fj>SrO` z=u}{jIlK(C4h*<&*LMkitf8*a+I(qMGj-@Ig;pL}BJC(-y-AakZb3zk0D+PIa zeR*H!dtYd%;V2Khp0|JDQV(pN)nZk6>e9eOsh*R(E2<$gJn5Sa0+EaZKr?9 zf+B_1$(!gQ5ck8Zh=Cli0aRwZQ~+^paV^lF?rKK4zzeKHqU9 z|M#^xYtETD9YFs+MvI~{P83z0AKbHrG6~o^p3^zAO1T(PQ5JobRf6io`^_zr0gHK1 zowFxt(k_GDUp#^+I}{qD9D}p-bW{Arb~L7MQ&(7xR#Bpbsl!pj^&W%nZbeB&3_h)A zDBU>nE<9uo^e>M?#KeTUP?!+E0AYCO5NaV}(WjC~gajbpsH>=yoI|X5qys2N6xD*E zB=Ho(1N*`Pdu5lpx(@HrzCaESkC38V@C9Dh{w-t}Y{JFhGyLTwL&^50)yZ7J(?XrO%uaS8+ldA0L-a7%6)+&>f{4()q|`$2lP)WK(Q^qi>rtGJP`Vjf18OK*1ITgG5t zu0kl4sE$Tisv7cmg}iFCaVm~Cgj6^yg>L(MyJ(ZuTgZoU%%BKu(hQ!t59~a;usN;c zO#>Rigz351`N`A>QrZziprM4QW=^~ml15EqChCre-HjyG`$II(MXDK@)O|>tXuPr< z(TH-av_U?Gb0tx3dPG<49kRD_&*t50^$uM6Pi~YLMI_65;})yDgaYO7PTiICnwWt-20pr{=I{ zUPD6Aw@)}d;B54)x`@ZlMIV(0v2awdSn#6*vT7~mj?`adrs@0uw2XL3=zS9pW`)9? za)*4>yX}Q-yYCWxyW~4|FE8%Q(gEe=#9ZC@Z{CcAvkAD#UnFHcHd6dw}RtdHA zq}#CX+hCTX_EJumfjvXXzt<_b-`T;8ab$J}V{CLma?Enj{CXtgJJ9=h-!byO@3CG` z9)WQ8gX&TvI}W20OAeV88Y$cd{B9~X|dyd z^z6?WBRIN*dUYODgFPR8Nnkv9em!91rlFO9nvSv4^(@uyQQ*37a|LWgb9K*mSV^t! zp`u2do_psbMc3=O+?KPv%m1DycF1r=Bg2V!M@e4e%QBcUwG=NFm4LwH;wSO|kNMb9 z*T6lVBYrCtq*bQv7LEiicOGxN?}Sc%+2pcANMFV5xNa`Zb{I?jO~kQ>CieJzf0!FDpO)Y6Pa7U~=c2$?!g0;C3fr%l_v1N(9W9ye#-z zEV{qH4_1x~i(GDDX1xqZ4c0dbESfy*J-m&Jq^dU=#SupQg7yWvj+T~|5;~yUtVFq% z79Xi>V}lU2X=e?&}72`Aw5<3df}>*>aPT*76<*_I2zLMpGQrHQ%UMbs<;L zpoJm6+=X1b^FjIx+1J$#KfwI4o^lprR}cx}fDTq9Peh5aKo()cqDX3dLKIOgIWreO zKmSo4$wKQVD5#>M!pH3L@CV`Iwf|jacOXg$kHb1qK;Q-2<<>{TtqNI?P+jGM_5&?u%)P0aLbiLydGDIvjKWH)+XS*Dw|E?M(!kkBv~?@u3Uv zw3;fi4~GM-wGDD4!s(D-NF!bIB*XbadLoS@0~@#q>21^Aj^#TDd^>Gcq9nSCLd^Jn zE=iH#AF9Zc9tY%wJtrvczl~dwq8<|$UJ17@w(&F_xRXobeK`VFctt%{2O)U>wR;cd zX^@X5k@5I5VM{2Z`bX+`#ngnAP^=-HlKE@siOj;BjG1E|aJ%!iZ1WA;H@wz<<)QI3 zFVGMr>~!qj??|t9Z4fNFa91+_JC))up#g6qZ3x5$4Yc``T-pf7puqjPj-TA0-Os0X z8>{O<=I6p_G<{QH-p(e-Y?t$2!o!pcz41 z!w4DBk|w7BM$41Eic|D@rQ!ZN!8v?SFx1aB(RWhZPKRGzNPzl$0Y+P2577ASP7DSI z2Nqqfus(jDqv0^G0eg8G{2d}z3b9?|9GCSs4&ASE)4y-wRnEHh)BQPRRUPSgHf;)P z+LI~(t-pZm;=idzr2%TZl=1b6;hNmd-w4H>?nnt_ojq*S1dxMJV_*u{irfaSPyT)r zcx;}$jsOK0?C3GM>acyiH$bShR#YnMGu1 zGi)`RWDz7vj?{bd>srvJDZ4dup}_~;f3!AfExqSkElSoxi!Cz zRkYmAFxtJIyL_PhMNdSLp>4bnTj7aa(P$4F1XYWT&bt2m!M6+?5>%rq4$4D%)f4vN zH%3-mx_}@PkIA*NX~nV*OHAm)8azU_=*E=s%s&ODq=@_Y_-IH;(Ha-bGGgwE2^uya zrO1_w!`CWYN2;H=Mpzb22mBUg<9?~h&|nglw5$@J9MAfmsf-)`Wu-wX_~v|xU1eT6 zo$WZSlkfTowMI12Wuam>)9DoO_vXaLel}`TzkejDT&)?+*T&~{_47J)lHbJ)7WVwK zJ%X_#we_Oqlx?d%r^@H}r*3+q_inI&)k=L%Tb>nTjVpLTqMuT2_&1a$5<*Pq-0*1Y zY)KFJn_7i^3JE*E2aMDal7w1R%iL?~aRSu04?vLH^WIB9C`mpVobWc&`!)&zl)ZgzL1W{DT8%-FMztPTik2fY0HkuvYu$c_VOpcHz1|F0 z$Qw|L)>J9NMdpN)o`$5w2uejqZ}^t)#8}D^sLv%O%oJM_uA!j;_)lXeNRCDW3mvc$ ziZr-Y&=hN;+gn`bo6Bn?YFsF6zK>VN`OI1*O+foLD?yHiv9~|7NThg=NXCuWo5!)1 z8sxrX?0RFYY!)ZG0&dCE-xr2Hxw)uj)2WU3kw7VZHku!Oe%`mSmTy?>J*cRJyMl|9 zbx%Vnlge3~co#xKDAK<}-PEc%8R7-SlU$qd>fnJyd6AeUuU`NsO(Sy(?hVVA?hvdQKQlfm9koz6>& zn8~`9V(QHY_x4_hr!Wl12NKYO6rpS@X};PT!O=0t04btCq=6uY%GAQf@Nnao#-sDp z+=i@+PiW#1gMT0C(8KS&p!sTdRu+^A&Jz2Enb(n8w zB^V-3uYtJ~0-FE{dN3QSUTcehVD3Q+^J=fx=o25#gJ%T(1ZTe44JMC~-MMcG) zVud{ZxdFpg=kxrQ!W>Tghzii{0)`S~mQBentb%LwtS?Lup9$eC1xh7|5}6fGN6^*q z&>MF)vH>zwSe(ve?r$uY_7X;KO^%MMG&D5Gss2*-et+G3?w;P3-_BZaGo}T#JDlpv=n_`ce+FJV~ zcXMn7ADr|Ry?N-pD5t9fv89zS?GVRLFp{gJmK2UTdMrreR>e) z{YjMJMJnSEaY-@4#4OF-$-ULo)U2#5DOo*qoz!;b7id2fms3&xMM6xQB-(f;)_5UU z8?g1L|MZ?Vd1<*K36flIfxVCxyW$H&xEnGh{z}D1_C3`8J!ZN)ISJ8wwRhR6A%ex@_su8=~CH(U0v_` z(Zaen`1wNU7D=kgLBXW*ttE7O0)t+85t zIEIntt6pOpN2E^HD8aDU^!At)SC={gA#W{DVfkMQ3~A#fjFD&O)BC>BiQ`7(n%^zW z{0e`qj}=m{FC&VIBJn?MeFGq1F&Gq}m$e`ITsD6bXwq{@H_U8m>H;xGGK4V3{Vk8a z8w-)_77O^qq#dVKx*u5%p2z)%_v5Bd9*dx9ZTwsOmj&m`iN`Ej?d#4->@m#x-14-W zoQ(Fj@$uFNt_6?JM-zav>fnYO=U63MQ_sn_;zU7N0MFp%oo5gz_Q~Gf{>l~KMx4{X zFF}I3G+~uIK|d=iM89)!VZnK#)dhWdwxky<(bxbETe zc*1VM0l-_dS-M(vI$fk0t(`;UShKxKlvKhfPSwY8F1%J?fyybaZdczVYt>+GaVH_f zrni$oN95VMr8=C*a!_UasuIKhu-NOD397@kye)oSs;a6dv&(Y5!%ELO?kAT4{@Pwo z+KpUObza;*Ieqn_M{0dExD!JGQ8MfVGd^u)Fb&>KmD-GqKQQ-=&Q=$7J?4Etp=G76 z4{1e!rycChA-BPvdGrRr{M&E!pt;72|4d*~IJO)ncK8{jqOW_PqIFndmy9)w^DI z(`57QfTI}%d~`HlCp4hYv|1dOA3@}4*3GM@%^voiVZNc}#G%!fT7R%4UHPe`49%;# z+Pahtw4Z(NjBR&2*neK9uROdCt(F__U*k;4*VojfeoBE@s`%ELX4~x@qTN1pS?I3Q z+jH{u#rhm6H5R#40hzh#;IoO&T+i*k=bpt0j00IrPeQQ1)BEAjVAM?rkcGDG7lZ7~ zpl+?vHARDylRpyi>29PIN^}O@oN7Ug6*d;e&|Co0*Zawd)=JsdCy;-^$3GMYP?Y67 z(8+6!daaVE%IhzT0juu4y%*FIAb=vPOtV_J+gp-#Hy5>U(< zjfI4h`D|%uxXXmyb$6^}#dh8{rS^@UN0xI}LSL(0@2GivWMZZM?2m)EH_qw0ylT~9 zRfo0s@Af)~p0<))*;Fd6R_UjQpdQ3SxJ_=|Pi^n4>Nih?O@7@uOdw|R7-n=j8T}uc zM655Z-=)HT?x0geeqKy%wmqZ~CAYY&*#6mD!(RD0m%whb@#f%nip`rbY1{VPlP>ML#9R5@6h0LlIYy|FO%rT`3+R4dvYSiIX;HppW7zEX`dXMK?l8r6Z}+Hck+?s06O*pSYvGdZU_6gm1Aq!q5@KM zUJ9D|fmNCa&J=UW@T!@NYqow&#^qbn;ZZD!kagg>Gw^~!mBmU}VK2+8C$kVnFeJF&AQ;wI#;0H9wXtq9zVCEYUdPV0 zEB+5@ICSwa?h};lo7q4-Mht6C-KPb&o*UyH#EH%f2DFY3_3c!y9_HKnofLH20V`O& zL(IKKMt%c3=avk^0gKzSm^HGYab?J`FWxS77L0hl`$|2p?l~ZUR8(aYCdDXQdFQb+o+p3*k0!*|IPaOID3~ zER!--?BLz)_JIGbp~^E#&gYGVvysxaq80hji(!pYLd6Ho%l4DI}wTKEYVs==Pm)Qbq7FLoKV-5;ikV$uq^ zifx~G6Y_fkQG|EqpfQ)Q(Pn6h#*a+Y`(9X^+)=E*J|1-R|Yagq1dZu{P??p`(oQp=kBih($d z{s825pj*%U;TMhf(G<8*#wi~gUb(;4CAKrd+o9?`Z^y#cOb#F3ow^5OS*>7tYfoV# z?GYQgW8AKkfX%j-(t(wh6{W-u!f#OigJh*O8oElxLH@#tiXc|0^K@eE6@~+Ds^5q2 z0G~SrTgUw)v}FbQTWdK++d5?ba|s12;(Bb26jn+~(mOd7m3Svmg2FS?%Yo><7ZjB0INgJ6JO;wp z7``I>PFFuB++b_S+ghO0S95agsh1U?4OWXkm`Ys)Q@|)$<~?#Fg>YSW;HcinXG``h`r?5Gh_q9Uuwm{$8yac?0Q$Sgfk!Q%tGekrrDoiUNcxg8?< zxKbXyIM@thU}c7V(pMzgpfSA8i8Td>wypet*W%*Ud5*Tivze3%OQ-3n4?tC%%xonfwZn+#p7$Y97Zf}Vvs33VA z!hNtCvzQZhcD7a!9H-xcdgBmChKyAhJzsfK|Eha<9Z^by&hJxe`!d}#)cwrmJ#6<4 z7g^*zbTRYkuk$n^k0$jP`S`M|0ZE<76-)OZ1v*7;R^h{kVE_=k|OiS>zfK@iW+c zTh!PDuC7R8K{6u$Vs*B*`G_I(Bjjw-g$vhAh zn*sg&PR_= zPy^QxKA)!?0Z;N>S#rlth`2e9ME$kjUxSfg0-?8_8*m7fk`j|H(|Bw)>IzF7%Np~e z)~6!~qI##S?cj;JOeT2^C4c=|;6%A{b4vMJG0wTKVSbky$1}n6SibkOs^iTs`den? zU)zm00Sdz}kqU-N)VQg%C33?UMEr;OS zhq|9JH&vXyhGFZt`hiMgjF)i&AKO%XVWz_IH0!`_rW*0&-83iSAa?e>{X;(%2@1$C zO4jjWw6H!wGc&VCkm__>w(vicTea)+ap+@eYHD=Uf=I78B2Q63VY8T+3=CJJ z;(yA3>9DwT-9hnYXjc z|6t>FstH(X^lDx_Y-OTDnUnHO!jLmT{%HH-HpzcGCcKKZPE1nj(RW)}>|&Lq;EXQN4>0VHri1fR;1A1r_Wu6ip?dZ<~z`r509{cnXb#`t9e>ydc z>AabtV`ThEp`@XIo6b}cSI$gEU0NX)WkIeJE5ag>VMLl6R`BOx{TW!M1?!bs!@ke~RKe?~n%yrCj^^Q7BFy%Cp~=`;9^T_2 z?2RqKFN~`OG2jJP9&saR%FbBIm_kylxaK!H6_BygBs{BKmwtTb5~@V7u3kC^lfb6? zil)WK7MGFNkO+nkUeh4;+S*!B0%$AMz^)xwH!QUN0QrqY*)WlSUuExaRMS&(4Q+o^ zIRkw`@^}SNx>33{IH&)Z3J1?yze~H>P47sn)y&gHo3BqEKo3x_7M2(RhlAsHIlk+? zJE#aG&2%7eGof%$hCF^Oi_hc!()*D|mg~7M=6wl04015jmew0Gclfim);154 z#;)Ps9!@&h#6RAquhyj@FtlvZcTQ5pN%Yb1p#D%GVL1fAo6}xTq)ME|u@0@bp(jb9 zl~8x%$;3&J6UU9;vpIC3O|J zuAhwUdz$VO>P2rKIUxe50iUyEKKKuw#Xygfxe_{-TlDB-7uI$F21sChSgMr#C+Yd^ zl(A#zDGXiheqe-07$PTFnRXtw+H5u%*%M#)c|;Y5&wQ`G=gt4;Y;SBS3#@w%xf}Hca5jQfI@1JuI>WwMU%_Xr&Blt7&Fj2+F0$V1pgGi!g*3*B~ z#+&%xV;g~kk-QFKRl@rqpV!v1U*%(WQkNI!Ts|vvCE}RaDZJp&prDbn003w=JfUmn zwY?Qyeu@A4_;|`-{mZ<#H2e1ik-!-b-a^IUNm)mjq8Lz-)_Was(VP0v9b^fXSJCFF z%&SvENX|x9Q2=iif_=(d>STZy#K^_C3noby{9#bt&XtFfjFIvOvARk&is6G#>w^6E z19IT-9dV<)_=}D36zL-JKvZ$EyEgVcdyDk3;i`% zQ|j6E&%UqZZ>R;mfKz7@Fa5cJ%+Oze{L(_PeM~Hj)oanmgYk^@h}TbFP{3C5KXn!F z;~XnlG`I6LdX1Vvq7I}2WUV|*6lrT)Xxoce%Yig0A*?~ZVq)hT7T35{J%Kw)PR;#Z z)w=XUxYOBk1K#}!4`≫N)Lm2guLuK(+d>2=oNJ|7K;qxZLk>F*_0gds)|w< zsqQOkts;$#3nn(xrFdhEns(cwp0^Hr-E2ybG6*MiB zKktJWHGBgKzZQF5r9mZ7be+!vh6WNB%IM{fv~WS2K>vG9L0m@}+@N!IW<@O8WMXSg zl!)JzZ36>w7e*ji90E3xZrjt_PvFzaHHcsSmOz}t?H=n2AEPg?rYve^_B<%o?PhVG zerc>6UrTy!#xV3FO=>ZUZtz9C8q-|~1?|6OcB5y-F{S}uGhf85+h`$0DBDSxOCObJ@du4G?D zv93!5(Cb<7CXauR(Q`Xug{!8i7a9XP)_PVmbvK_jJ;2UTME{2YiliW~-(84;@8YT9 zhCTxCR%7zJ9JASo5kuS64)gAy9PFS$&8-rRCc>v4AdM?}tJpmp5AR5aGr_OcAkoUu zFyJ`Hbsrj>PhZhHU}y*)BfY9yf|7X$E`FF?6dE0{snvYq=rXYB^OqSDn?dUgeR1>Z zTV>}(dd#|;*YnJ1hwb5c)4RN2Tn3`j;PFH>OyrCe-i)zNZkI*Z!}q0ic&qlS%(K z0iTzThC1wr(g_Yajik^&Lcz4#%~FceoAkQ5E~Gy^Qu&>}qH4a)7Rh|pB}KmTmxm>O zk%pjT+XC{Yhqq{uhR7CJSZ3eH8$Cf+W>K6)_!vkdcz3pz>=;(#}Qeg?Crxv=0HMN>aI}112k_On8M>!wpV>2Q9n~GCpT=*AXrl#rPga1E~&#NMPkPBDGSED4RtcxD9!5k`&3dgqS)A|LF>N z_du>{LxE&&+dci>;dnML-(x^0dXoCGIt6@}q3>qMjXP=#SYuRZ<6BZiJvuR(h&0r? z7j8tYzGyp7+9&18Lp>H|O43lv{i$V;BDjQ(AhQM9bKY0#G^S)e1pXiO)Yz}lyp{^=W`DmevINw8an8=vRUBOAOBS{}8TJCi_K}Df; ze!%}`4Hx<2!$lm%vpX&q&WV*^-~dp`v1TtmKl~zpaCyH4F0QA&9X`z! z{RS|-PH~w)Xtq2!=XL@7N?9V+6KJf8DQu@8AI8$9XG{zzEg`Fu5OpBno~}j75<8mV zl;{D9{6y=!c-@VFAd=kYbj$A0z8W-1*kcr5#qj8M512&z+j#+4S5WB~G+0znJkA&N zG6nIJ{(7nKRWP19;#)jA1{4zMK@9oWt3#Z@X*?Tx}9r%uN% zNM=`TXB70SW?*64s=T1IE&fAJCcmjgIDt+btMT|p8@$cTz~XvDQAtwUg7sSsq=73_ zIXT2WRA0m`b2)~8SntnH;*5Y67;0WR(?p2 zr%b-8HijB|WkNr?up~5MrH{+)yVztFDs(TU5`6qKWm*ezI=o8n1XRh>@-#p>IUcN~H+fXlIP;LPMH^<3 z&$iS|iT|;CTp1jnk?~VqJ&h;swd*Yi0l@jN)KAu?bJ+s=c>yax@I9j(q_jXEOGKz$ z@!3W_%D5TfwrS4p4JN45My0#H(I@Xu@^`sT>BAGmFLw{SqvQRTw-#11Lhwv4!cQKr z%!$krt9sOti9x7QhT<$3T^Lwcl!Y=G-?u8GPybu@AC-VW5l%v1=>j0m#4d^G7DcRPudaG8yzd(pC!{G8mh*?bXr-8_zALIJ zMWu75Zw%1B<$&ER*z~Tf`pqx@tS?G2GC_8p1UTLc=_7F|i7DwQ2kQGS(Im3q!VVG> zQcP`#=eK+*Cx>qFsKbpQyXJJ}EN$ly^zeACy6pV?;8?@7|M$kwIy;mP7Fu~_L|Try zajoz2amh*z{S90!%o$T4U9FZfQtw=ch{yl)rFR6B8#@@jOHpL0bY|@a_$H)D6(eXn_28946{lHwcu)j#l*>nI$fDrG*uT_9?PNFp>tJV!&rgU~Q za(mHCEea=fk>V;xbl0EViooqo+!0gzmW%HhBAee*4&Do`Nz=!~ zB!3qu97skoxA5z%4RAff0-pI!?od~g#Gi~CjTS@23ZF4}n$wY^(|-HFb726gdi}c; zT=p?zU@)LY7Rr4a5wBgv9x{T%jGO{C@ws; z9K+Tm>_h_*#>r)sdB>rg(SL^g5L*y+5h?Mz9E}X7-fHX&Az=23c*J)7Q)H^X>{v+y#T5fxJi9PDILmvl z!DVZ|p<17(-nolE(1&uLQ~>+4TvB;X8I=kDG9uKuafzly1VU{a%+(^}!;@N?KC5eW zJ_I+ye^8V{2`3JA*cDBY#uDS&we5KW_(U6^(6aE3^=$QH{$?-XL0w*O6sVuATn890fAmg!a z<}#}7`RZMSNon%w<@HjvB!$ck*-9xEHL#HFJwS;_?)amt@dP(r1@(6AFfBQG) z?{Q&9aHpPn%di|h(y-A0C1wH5@9U@PQTXf{w1O{?bB*V#=NlIr>3pYj^B-G%R{3?N%P?iBmc$@5S%0Y`}d z_x6o3RgIQatY(-0jjcd`lBy1zprl<`nj15IfGJw8o$`wcdml)p5&l&bX4iZc-v4@G z)#kcL;N$wZlmFVWcU_=80)dg&r!#AjHHK#!vG*6=EUT)bR{4n3PoJ~L*A#;0rz52b zW%FS&A6M%8vpPBKfCLNNyIr0qL0U2PEmq9$#3RrJj)uBFO)oDf=VxIwor_Y8r#z;X zW%{JHkI$e`-@Hh6lA+?Hi%d>Von{MJy&Z5n`F0;hC!WTQFJ!j;6~}R~bV?w8|pvk&-T8%C%0bjW-dDoR{0cjrZM`R!|s|H%|(P zr0F6M_%ORIlH;-50=W4pp<;D^Tw-+7;Yyl=P7lrx z9zrO3zXa_m<%byjZ7JAq5c*5NLY6FA4QKf#SlC|dh_pE3(edC#jN#+`wxmX?mwr4A z0^0Q*mC;zL9lx(G&>K(Wv*mxwB!qK6QOWhH8zyDz3Q#%)pw05%upMxsmxTgQD~|-P z(VsE1PszhI?BmFecSUFNAho>~J@QsN9?!so9?D$qooRz+0^EeYpboFe2m(H+kDD%= zUZ8M&1&}%#@qDSK?zvjr8<6giSW*i6~p80hWwGHRQ#0-JcgzE+qWev`b4GM z&DBjgYE+SmO*p>y{B~%Ns=2MTI3GnYw5XcQORZhMEr%(~57wC;I?kv?LP;i##jM$* z-=~^s{eST2bg>GCSU})0*p-)IDR&4#kO?o`A+xbdPa+)~fPzOx^)te&3OkH~7~_|3 zeM7@MPVjYq5W+#n%@h&gGPBiyqsHUevklf;M``~qRz=HR%<4>4g+?>Wt+$B@HW!z= zM!I`(77XII5;Mg5IW#e0aERm|UGX)6 zec^DF12wo-Mx$5*Bzl2N$*BfB-YC83-O`iHNYL^9d%l5|{*iEEc~DO6|J!nU?TI<$Z z^dsmQ@*T&oGwWl*CQ&2)KUGwGsi`*Ly; zw82)&;}m(uh{gsljO_%5!v{O^Gj3XDilsi4@vq?_!$P^%v*~E@f!z7}`?VED{qK$0 zW%fCZ-W@1nUB*!i>XKUutRcgchBM+CfRWvnWQw_ZDNf9~fc3g_9$ zpI!2ber}Unt_0n9q9~h54rgrYwjFUZ&2&slm=dFfr815g4HYU)E&u4?fJ(DuR;Vs4 z9FVm?1%SqOlqZdAx9*v_g6aTa)YbV+9NIqi3-@5DaG4;KYyTSngUK1Ev>rq3JIOZ@ zK{|}|iwnZ#rcSRP)cCk*BVRZHhvR?VYw$bgZ?kAO_|3HN0Ov3*w1qy-FPRYUX@j8N z-1pwwD8?qz`49QbPaQF6LNq~S{G?w|gM^Qcjwv(Gg6}o6eE?u#qNJYI6K6>X9Ui?C zms%F)Pm|oIXCEyu+_(K%A>>MX4qP`K$b2Qa5)PW08JT;Z5KH)gh<^JuX0sXcg(}@o zIS?13nRSV99GP4ARSVmESLpLuFbc^@6azNM9#au7B+ENA#jlKHIbb(pWZ%By^7$6% zbD?{Gmgd0ieLX6^qA3rr{4nT_43bz*8)Ax}7UgveD@Deuw9owSxR_32Ap%>Wo8S zd-5x3YBmwdKfybn1sEaY%aY3Gq|&P?y?AdyraFT4keCv{8>8M`kucRn|2Ag>0MK3} zMTL|x8L<#2!bndSD%$OiZweS?GM!~-HCG#L&z&}(m!h^obssSo7Y-p4WR&n!gf@InBxivaWQ#z4F$lf&l?In(b!!6992vN&X1VSFA5H4g ze4Gdt)gC4wOX;9mkwh3`W@M*uVErHbC%i)(tXc9}y5^={OZ-MD;jK&f1< z&c7<2n)X|(I=5TY1>ROW4M%8-JS_*Tdjh{-bbbnT+!aI+Sqsc{d{2{3Ry567QWIYv ztE0x#3K)3_g*DB)yrgrObz*xiAIuR68Lrxd&x8XA(NKhEAmgumy7UGknY_P{MR|f4 zN=a9%+5k1f*R~04K`1Pxi zKT|eFIXk}wdZ0;A2D2WKRo&N{-xRx?ns&xC+7Ve)9?w~bG%D02eWBjPUfD;V{TiK$ zNCOn4Ex)xpBgMq#Y-wS>J0PPE&LN2(#A-m@;NwhdT%$-7B zgQIp!dB%f-bE(_iid<5h~&%nRfiKea=W*5jXv5}f&85YAO1DQEv=6rvEEetHcm z_8mr#tr;JR{hA=cWXBe16)b^s+Z@h*y6|0DyGto)`Z$^gAF{{#WGE9Yh9g@e);q72>HWO`bVQfW>N6Zxo0xQ zS5`p@MUo;-Oi;uG;348<4*2z(8wbmx0UU;A)-+?50cK$?%Y522~@hK6EAX zb$g&rjW{(#+Te9QoT`pz+U=|8o~H_2YOXmwZu;~^e#+2)bSTX7>5Gn%wLV_7Py-(w ztDE$(J}buiD5LXA3*l8g6Kx0=gcg8i=VYN+eYeX^E{qVLAKZ@4*y!{Y78XSAJ1H^a zna&SD#5KoVVXXDqr+32KV{SDx5d;1FIy}Il)8XFjbJ2NuBa&~wK}{QD?)1!pmbYFW zw#0DhiuqnX7Im1A1-f#gUkb*)9X85VDjFC^;K;uIs!l!`SWYM^?n*U;q~q=r zzaL}=e29qW#afzxTFcopkoRLLFT?~CMA;RI%c=(ILG}6K`URK8Xz6OZS8l!DuGcUu ze|U=H_om+o%iL3(@*gJu+HlT2J`8^}WSAhdsL&X(fM8Gl(GTs`;r13(wDo?F(N^s& zOeFfqQ_LEZ1BLDvvZ7j7hI6td)ygZF0 zmHmF{!13VtONi?NE{bnj8Y0A=orDUF7Wu17p&1Y=oP#pRAx9uZ+R9Cw!8+07hcvs% zzwB{G`wO(l6;-sK^?v>wUC?Fxye9~vI`lrLO@8ZbCpx+8*l*NqHtUXh>JER~>3rKU z$?|+DsR7+%A;U&27_MAj1^Y*13!&HIdP9**L7C~Kq^6rs&{Cd%h(Vrd_zKLDGeBlW zQ=E1ku43922VFrd5rQYo)&8N-T3Mg4!VSQR=)W0E zdyOhnv!86&au{b<`RBH;1oez*FL(7WtMqNeDy9w^;f%Bll!r~aMWGnLwN;iss*LQb z2%Y|``gI*RxVZ@T$|Elo>xqR#p|FZfeC#+42Pm#ACy6`rG@D5r4k3D9Cfme!+c^pV zDf!%KK&f?8FfSR{-!%GUIM$WhK&e)DFe%?Ozt@ry+MG%jl=cbGwxC7{-pVT*vR`a* z)0URm;UjizL3>B;qTk8i*-dA&4PTIF;x!Ui*@ReP$?yD)Rz%vIK;FBAR0BmDMPM^F zCQSX`r*-z;9nY#aTH*qFLy-Sn9+KHGrVkIA;@Kf{+u~$Qzp0fI0}j)mYKya#r;ur( zplk)72ijVZ?(+3l`6ccHoTX*EE&{5p7-=&Q$BMD8R8W+zGQ=Zo`B}YQ_&{Rh&9)vp z9gr`4&FwIgXvjvV)=2Um0-1NJ*?hjVO>qP@u7_*=&G|fABbc}sZ<<{taZwpHJaF0o zdH@v}H7E~b1iK#8b4=jWuDUG1&k5Aiu5!oQXUNG6hxZ7^!{xGhVuJJkP?>l*C}z3A za1aTX!}%;{T(fb`O-Bdw#{tY@t{9Stl);oTf{3~QuST5ijGbg(25x95RQ&Unrw*8q zgyQu~30;8^yI4=8hlbt`By`eA5AjSLnV!sy*W~uA9_@kxyQZ3&xa8#D zPB+8oNSk(p$SX;TgGL<@p&f@*0%4yINvhCR8*N;kwwL^7muGro#mv1wrG5f8s;`}( zp=(nizLB%Tnj+Rvvnl6^e;2Z%sBwkLiDx1yh|>aT)p;Q|2Niw;1@@j@-C`UIfqUHn zLqv_;-O)SHlDvc_eZ_H|YMt)m{Q)6J`kxzK&b8|Q0cd{rP>H9$g@w__i**M%?j(kK zXvIDd>?1R`g;3P=`>Jg04guIJD8|l40p;1J=YmILCH|6F;7GeVmpmFz&F5k?ky=?n z7sG1eFf2ug=Faco;=n*s`lTV}q=Fe|>gq7K9qnTw;OWXCE>-sqiop_^S7Fb~jLnKW zl8QY!r$`uXJHLhBffl5XETseNC^A*$;p{JWx@ok-}mh7*aLS{TrgB@=*8?1 z_AQtjj^A{Gek?&grB4&YOghDcQ}EEWQ_Bb;t;Br36R%GsO3qa;yhj&eEiE}bP-%YI zwOgIO&cs;3H;Tp7BJ(OF>`C%Ua0L`7%m?ekpq>n)F%iPA2VDdO(^7ti2|pj=FOK>q z4HiD8GbP1GHwB>Tk)@3RGZwp=b&Udy%@tAA?y3U){ z+%LwP7(Vb+xn^h5*!(0_MSGZP;Z90r8oH)5l%2Q&g@ux`ADt~MXQ1+9nQ*qaDPgh& z5W*6f%hUL0qvXw$R4@0hVeG{$vTXpkLqg7g^8nyDZV~C3f8IF7SLW?^Q^>IXNCM}4g0&iP4-zzOX-k#T- zQqIRL{)7Hp-g$s|mx;EV)1$%CGQ8X(AoKM`!6f6S6hjK#MGaj=4mrF`K&-ygfpZ(= z*V4%J?1k9da52p=7I$zceG-A#uMbfl(TZQM#~h^mTy<*7qb>Q5ns#wbvL$SJ@?{GA zSTs?kX!;Nu3B$R3(dM|ndg)H5%Qq4UEC-}WlN2ff@CQXPkQ{Rx&xPFG$7`S!Vo_y8 zmYYp3uQaj0U8vj6_82)hu<|&cRVNJocZ1l!ISdQvctjB+bNrg8{BT~l{}I9CbfTB3=h_oFSBO2d9 zjG|#CW8{gGX%kHdIp+P@oT)&uq;)^c=aORn3%w4&1)sV`H$_0no4;}mF zPzY5~YIFmtt05kP(inupP#T5Oh}kl5T?lEjG|vYsct0@k!jUb2f{Rh;O;Csms3T`+ z6@(2Wu->ZQL$dwQ*9V#YBNYWoAml(^K~E2~cfjEuQ*|Imyp32aMko||taZ$ZD}TT8 zwI2bTKYI>OKK+!P9M%D_SS*(RKlsF5vsgF(+2Z|4lP0lx^=hO)uZ9dCGI-oclOFx| zS5};vN~MmC2q=wmHBwdrjWtkjA_K||BX|%FnW#ZDVy-M; z(n4Rr_tC!KXS2{Z0Db-DIy(^LAYk_OwFW$NrXT-60(GzxNo7o;;Sqd5k3Mk>TQqo|$sWDZI97m7NII0kBvs7E6IS=U>26Pd)*_g%@5p`?=?ye=3#Ec;fp` z5UM|F=UxsWhr1fgDOevZuJaP&_sTD3u-GIxc+blqvQ1KlI??apT+A@cJ9}54Knbz+$mj z{um1uEa28#Zw27XmtT6zV~_mPM9=do!{O*B)9K!~IRe3nH4;YRF(@sAvY5HJuIW1H zn0$d^GJty9X*jrF>`0g^I0JbT1?cUAbRTs0qWT7Sw*vk0@^aFd{uT9gH9g<`?stDQ zfByWJ>_2I-SS%LHpTMm1=M-=Mer|qlL7-cU%+*S_$E>P#O~| z%Z0j1p`ltBTq_J~6q*{%_3%bvXoJvDBh*$4)p4PsR49oGj()e#_Y1cp(Xfmh*&@J2 zW%duWSS%Kc<-fyicieu={TVZ6G=)N;!Lw)2o-uLa#J*Upq>!io zPDkK-IT;5Y1_X0cc-7R!gh z{Q2{bxi2E2OE10jfk~4lb-Ava01`mbb={ony5cyFXstylB}yw%${2m6RPmy<7RPbK zbzNU6)eCe1iBY3Qb$|XZE?Bz$4}U0ow_~~F!E2nUKmI}`z~>+M`XB7SV|g!Z4uHjC zv3vkby5l@nU;oS>ea%&0{o0K?ckZ0n(befE5()bI`#~!@+Ygh^<|(g?Q(9hz7DYv6 z1=ZEn)YaAX&YL&y#%a^0?R&4!ef6z%&Mhz8J?pK#J4>gxo$=Dz{hNQ@)z|&yHx@j< z=Yj{np`N(x9;@YVu~;k?%ZJ6ux6fSinZN(i(?5La{-zK5v**s8`;N!Xf8c9BKlzT& z{U3l?_g-;P>y77JY5xVw`^B|GV6j*%9~cV(=h{zSaj5O~&)!-Rihi{^6wfxr8-8^5 z#53-`=%n*=f9eM>S+eBa9{x5#P2#gx-Tx@S*oB{ATQ*XqAZf42ZAa#FHV05C8xz}L?o;O{n|SJKnk0sv4{1keEh09XJF7#jfm zlf(E-CJVE-KdMG#OB{}41JBm@);Gz`o?2^J0k z4i*+376t|$5gs1l%O}CWAt57vLHdXPN6A0p|44lvUtnQi|Ecl+M}K<(sIcIly$1nC z1^`C|gFprQ+Ycc8>>4o0&z}5mf`x*Hfdhkp1pmB@|2Y=m5TDt9)8_>!XfT++D}XPb zV&EtcD4!jb-TmJc04SaL;P1svwvWYaV}XF54X}z?dFf42?sjANx%)Z)qvF3=s21m5 z>R6M@^Vf!3`=Xj?uClulrl2J58avg&Maj&hx*`46>-T7AFIgqwyyE%5|3?A9rqk2b zTM_frdaq$K%9QVY&0PNBv3Ak7<=V@!C+ZS-)Z~LU+`76<$z1ncOkkhv&i&zkD*-Ei z4IgVR-WCYJ_&Cj`zr6MqfTIWU30549COyEH+{0&gK2A8_Ug5rvh8Ar+)cM<51bUuVovP0TNQZ z>c-31ELdBkk?S`*8KLsV$IoXseOYx}=#gJH9(9`MTbxIl|7Y7mwaikZoQ$1!^^nZ} z%%6e^@8ypDS@q6x*vbrwJ>UK14`P!Ijc5I+x}Q61ESgGx#MP3^F%IE>Kf(A5Xlnpv zg6)CYOWvt8_6drO9t8zJ>cbr-%>5j$eX=SPv!G@1S^!b zt3*KRCaVpJpo!z#Sa~$=%vRCjhWa`OP9s(Z;H*UZklv#|=4aipy;7Fb$7p>~5*ESt z>31yRZR@s}O0}@KxZZ(Q1GDyTK3qY~N)hxP!ClphJ_UB9zZS0g9xU7k^$^XTCR@!{ z)CD`0an}Fw5zG-Au>v(;O80g2hu*{5Gf=qsf;q;04(LZv(2zFNTd{#-zXK%xizMNCxw%g@O^NO*uamfm+XMyTD^HRC7W&v za&1weKeW!;JKrs`SC8S5a&O@JQE7dGJ{oaH)^vqAi{5}^dumPkET5oBs2wC8d{9-{ zzM5h0dNq9|1B|+D|_=Hp~^@ z`RzeXN~z>_agobQC1&IJX7aJDH}?LH$vKdosBKW)R$R`x`ryr&(io;pGUH}SD& zj~$-v_Xwe|?ukLl2A)LPe5}i6(E4x+QRIaY+O2zOV*<^8dXRmGb zpCy$ee*xN3@dP(Q-@z1LrQ7F%%ho^K>R+dFLzVz|Z%f2cdo~lX(C3Aa zHBZ+AFV6!Lu_xj#tHRC{62l>e4~QLw>1!kPq<)2SbWS3}8|VRP!vY%!<#blu{uC zric~^j2ph&)&`CC?^FU0Z}#3zb7%PE&}QL{1xQByO_Qmv_ojNFwFLUS%_7m#n5U1f zC_W(c`dYn8TH;43k?sz%Cwm6#(``)j=DegQ1Aj3?8;$<&PTG6nNYm>3_XJi)wLz~B z|5EPz4*q}zs>x%&FRZNq0PCPMO6U}CmT4JWb|$C3Zd@|jB;psLX4~m%zvKqPo3kyz zZftqUA=IHzQW9Du?<3%%Q+Mz&>YF3;m)`F)(ZzpiJ-XOeTV-ky5A6(59muNknRZUo zB1&lwhU;A8@AR*4jk&#fZN470Mh;=sU=&plIA#dxDH$N%)jNzAJ`H-YEqteU*)5nY zTWmFTKm7vo{tLiPp5Hra5iacj3s;}~!ktR{&OsFT`S%i3XS42Q_Z6ROb3rry`Dl6N zbLFy};9jft0a@{SySYJ6k z!H{>TNWz}r+gwWUX%?*0BWCTJ{qg4?ue=0J72PTVPtzHFo0c@Qn;`bK_kZD#Gxs(- zkMlyuN*&VZvYKoU8!%7Uu+i5{ydzBPmC~&0b_4=9p%-T$KEwn{HOOiFAEo9M>UgA~-PbnLCjdozPbwWgN(S)y#C6 z7ih7VGmn&yaZY~F5v`K!gbe)0F#yg2m_0!>`^dKxL7cPjI4OErMM{KhbaU+=L`mN` zuR$V{@H1=A3yzgQD-Wf(#pBGR_tf@>#8asXxw=OS5AQMmQb|4AntaptL_4*z`Bl3$ z_3E?dLDoy-g0W_yu-VybL5=_@!-+AAg^qm<|4G_4j_4Mzh)}D{#I#L`0k^gB8xik+ zdGb%TXwmInM}V$b(-+^n)U8AGxa^wD3|*Y>v^&LHsQzR+7VSIri?2QQ0pU-0+$DrhNTrM0UY=g*Ir0lJJGk`rJ`EH2L}hz= z*&DHSsE;OawG1TkgthDoy#T8YNiQ?BxnB{33;9Xy(TGkgB&IN7Ht7X+_+QtU(&78Y zQO`la*JUUE_;A@|_ffX{My~cCC7MTU*iQiPZ?e76mb6wZE;-pAj9I0-FPLX9Ka4i1 zlfJvxpa>+-0MH05ItQnrPOj}{o$hXDh=485ug;%k8VMT-O`_b%5f8`XBB1Y+wMAqB!0<(&sHyCeMH{le`3iujDr+iR=IiwD^vm9DDr-V`Z+GqI zpX{vMsA9Ntdvx26Ngg}78Ihh^Twc5&ER7S+V1BX?t(lXX zv1m6?AOHXZBV=QrC`i+?ml$hW^X#GAQ362vN2A%v^UL!?K=elC8uP>T6w2j4t$eFH zJia^{BW6yX-;ayQ{+wpk_(~d>p|QCrDahV(itoPu+Yq3@X4MXdeb~kwmYn0+o3o+q z)`&hnB4BsGA^51uXCLOG{+13#W7JEs{ASRQ^+2**k*KQ#y_Mr`lWzd&BD0Hy==pyR zx_`x@O={%Ux_YP8qf$^8yD(D`?U@G&NbCH^NFZ1xVT>*D%2HERUFGA%o69J}`A)H| zChFyX8T*{B6bP652uRj`7K&%;qo=2orEs>ECn`4C-d8*yFIrzJIb%lq`71#i8u{S_ zAlvQy@`$9m>`3ShpKsx2OySL>)WT-J^{()dXSgXtTMIsWdIhldvl~;mcN~@L?0M7p zD#4_}@ME@-{Kq0{k+gNdN}Lkvyz|~$Vc-76i1w7-8qb2oE)he&7ddX92kYw7#zM`| zej9u)X23Pg%jJbf4n=eXZIoPd+}QLW4juY>sXJ{q_Y`0`^6Rfd!Ag-8Wvq2kNS8aB_F z#TNV9=&VA$!~vC&vv4`3q3AO&8|L=AEm!`@HX^^2tu)i%C|tDq4_grzc_F# zMV?9V$k;H?n%j;RM*P;UX#l_%MU`y)$uz5Ww`!IF*DE8Uo>BAsl`wfJwD^CC1E7R* zIL^HkG6R%)eI7`m8A8*eZNX*wR!0wT8`_hkm#*@`%_}>8zhj4ZJ2I5T5j)?l-U$pZw;J7R1L>XlK8X z1vpYx=94hSS{>>B+*LO^P5}@KI zX>1y<5m0}iKGtU&RS4nZ2g>2w`_VCtZc00r^s67b*;S{j&uM=x*XxuCANQ)*A{C>* z{}_BJN?s+tBLfbAWNVPx@#w~> ztBp%${>35DASi1x_+#?85q++PhE8pPVX*@rzNA)DyfHUX*N;wVfH!%Di&)2zdgs^U zuwuxRabtp&68(K`?U(izau!F0MYf(8$-sCwFELkG{Z=kEnl$0Hi{D!;JkLT1)J_H? z;PK>aQpIFhdVJ0!4Y}VfnG1-@S}qPi4>gLZ4ir=O!~$lV)Eq$>rU&Y#(+$?TSY$kw zB$Sctm$QFPIN@6lNc7j)ZeRNX+9g6i;=PS7Yh+*KGLWM%(a1R(%`Opt;<9@*nI5O* zphNmwXGgf8cFpQ|Xs?vhUvO!3#!a6Y5sMrax)rF|?yI8Zo}obH?Gcj*E4r@_+eih` zEXrmRQP5G4Pm3wg3Qu`c5xbF(NjQ7*ThzhG4s4DiQ6xg zgv#&TBaKDK;U%HzxGuqg(hO-?-W0<0e3{b2%{YtXvbm~4V%NpJL7w*n)If} zk!h81ObF`gauvp6W57KKjazB$t?L&41*jM<-TewVZV1L9Nq-40rBUkZW3r}O?b<>^M5s|V9DqIgjP9V;D* zA-LFX@@`z(#d>12ZhVR@j9p|;K)K?E?zX{%SWm0rkwHf{S2OYD+$kB=5jbdq%@z$z z{Z(iDec=^uaXEHLftkqzGV*?U@!SBjen!fz;<$N{@A@FF9d$J-Af(2cam3-YMX{h! zH-azjcfhGkMj8-L@OP?%bAtu4Okf^zI=b|Y=;$gnlg+i>3vC2U#q$U&L$|(S5i1$CaO17wtM_^kt1iBI;?Ka^*kRjDLb@ZzAac5mW7 z^6bU1510c#{9I7mxa8_Kn^O2R+2&bm1n0OBh=I4@#qxF9)~mzAV{R`;7?TsW9eWjv zqgdzHDwUFsx#cKGHoB&FTw&d2&DV(|8BVadX2o#?h8s3&?c(j6E0OA)T@>5FenKR@ z&S#V(o83&$B}Uc^*3B>}qBX%TU5ML%1iDYLuQ|jmi*COUhT^#Bo?|r2wlZ~(+3AN- zksY6;SI)IAb%l$_kH3K6U`>+hV65Ffz0dbQ+|Rhdg=8-lUzoQMKK`_J1q-AWhjGbd zn+A{s=Rhy)yKu3V*@LoMxNFchlo6)=q%0z)OCN;27q%E?3U=gJAKRkkBXF9%JC^Od z&(cb%f1&EoSx368=ir`;G1M?y2YaXN0LueLi!+)j{i8ASP zo;N>vd|yW~lPHULkQipWpkJV}T3O{aL5xl;n#U-u90E}|_77XVqq+I@J1|VTa*GO( z$MS)&=_Ko(sr~{sHQGh7zBKy2^&c7v_V0sNo>7d-YiI8yE9iYKZ&ciQbg76DkFQNa zIpTu_u~s^$E-(@hZY7+VT9q0R-3ZD>Ew2%H*)JqsuQT;N%J6eSiY{@_n~0QC4rs4J zQ@a7779PgtUp_GTDBPOd*wF4L+pX_I z;mOh6c($Dszbc+F)y5)=jHG45{j49E1>>8Y8GL#Fwsz zN-TGk`iqS(nONKFfS7KXROF!(2suv^%DVRdbo*l2oca0gC7tKMdOry*k7H-nASi%!qb{Cq+eoQIAu=Wt0+lTekLQG%S&b#u8V5?d?X>YPCzgFxksYr z$W=mc#>N9vh1^Bp-Em{=mLiXBw3O|+BT6A?jYc;*=c`pfAMlC6EPQVb9 z1CQ}h%-UOflF->)<{Mb{E7EP9g1B+1{Es@U^pxp@Z4wYDv+vLX=AIlUMbY((O=AdZ zoV}^Xu}POp$kv>$qIJWv%A*C0RHeCj2Lg|U_yA(V4W9#iT)mi&h(;L2FDLDj#58Q` z-hk<=8SBghMPPl}*q_MH<0A4$zR$N*$jsm|Kgkw@8h(KUU9i#!)&UI6$I8mk&wp(+s+@ZsdD30BJJgtT6rr{E@IY!{i zMwPgyVp?pP6p5eAVT?PfL-fS?9!K7>my94DLOYfm=cYpPS@K4WvEqoGzihK&2ADX1 zf8&H+M`t>6!8C`%U2{zFAF@zgP&0rl>-L1!4We;&E!7pMq>W@CXHN{L{8gW-sbk6F48#Z1ol+fv_zmo3wEO2(0rCk zUFh|cY^irMGi?c!L&Bt}zW3rPq+w|Exb=LfjC$TOuxGl185fwnzuIG50A&|MdJ(!g z4qXDPr4E-roTqrADDeJ%+eFk^*R-D~>M&AvA-U97N$>p~u|UzC&`Q^f?WVipi*7U5 zNE;d@Ex3{Cn;%ADku8ezu3ylwiL}L@wB3v&#|szXjQC$b$1!XIuc8h?o;*G{k)-o& z1p6+cBzz3kc*-vi_&)h-`9^gl!DgEPk{&vLjKmMA?L9rMVaSJ}FD8&C_JccAk zm4B;5lVMCT1wS{V=sY6GnH*p**KOPO;}8>0iT^ZU#X(I+Lm1ek$uOEWtdp;eLB2U3 z!V$?-NRT1E{QZdZ2&}$nHFX#!y;toK-8ndWp-MR1S#{`44D%ZBU@rE3O{JD1!9L{W zTp^uX_|pnUp`qv|r)$^}>$vwV`rtbAy7mnx#N1HKn43Ha@OROl>f|G@b%d z+CcR!L5zst$kn^-#2zrZ(WowHP@rG0yC}-tC4jiG?(e^k{jRAU&c#63*Yw(azw~*fkkJS)L)hx=dfbA0&E8 zbkJXo%95`76eDlHgFv?mpXsVlc!Rj4j3Ix;xNa|mNF zT^hWY6ko9jMIX_y)b9D2&tt-2+9w>6AFzL5E09kKh5SPG`?2#xMx;qSCyk!pO?A<;Qf)BHm!_#HyGhuk zV0>PgwRV5@_BvaGsLXMVbt$EKD^w!X5%~E%a;%_6w2sk06s6=YMEC=s8ly?pqiO|e z=rOxaLKbg(qbnXBw3+XX#(aadlb(!B`n9Taq{m=YO>DgIXu30Q;6@k|+-0)Cd})SL z!j`Fazx80OlQpfu#2uMtT}X`);i({1<@NyhxoeWE}v+9Ov|7Sk#n z&gT2#M3x;mueK-zL}UQ2ldK?P1pP_V90E`V4XqHBoLa6wy3voS2BSlkAfIG8duD}!_e9_2VI@nQc-6@(`pfl8;JT#9)52sQMc~(i!4r21^(o!(VDEoMEy^{I;Q%(Ez>bEb2}FNL^wz7RQ$lMHR<(VKwl%h+d=`yB*VlkeZJ?7hGG8d z@QCq)z;;;Tl6n8b?@t zLOIAp;Vxr}7nLJEFel@@CpE8!u6Bk~K!y^bpcqFGLQcOa)J}Y*Hc6NynEWb5lM%uh zv%zNHS6Ir_YUhilyU4t4QPFXb287c7N?q@%6*GRmG!$>#-iVZJx3WgcW7CMeyAjst z3eStN#gYOv3~+>f;SQL_rP8OrUjf7K!|Do7O^VZ715J?vS0QHUgqybMkj!Hh`0#Kx zw`$A*4LP&dnD0X*Q{;f=>JQ3YJuJ4}QR7b2x$1|oj@b0|3yt8>=|&CKlEjiR>qHTPjRR}?nYC4}?voH(#d;B2$O z`jrr8)4eT*s%odvU<@f$ASKiN1u$d(WU~<@c)0XNvh}<42}egM@yz6AYaBUSghP6f zZ7g88x93>56UEshlR#qCOiv$v=GJHdo(&Fi8M14H`Sw3QSJaus9Sz6I$@GKu&in61 z;XP{0{snL+Ol^cIUKa@$c|R706Y@+D>{+EL&h;>nfaHz{IJSN%E9uZMyYK2W(=AtN zV_6m%?XW!cHd8;MKic8nmh|w6ff?r?an2GUx|Zk=xY@8B4C*o9Q@e#fRUU z*EUI0ouAg4Gf1r{aLsyGx@(STDv+?f8uCMeWlYCd`%;aXRZo9tajp#%S*cOShk)TA zEQGOS{3>QsvT9^6vS99rz?-c?rOb-4_;E7iXfh|sLxo^6e6X_q(?cog%a{sRz9QNW zztNT1iiI7-_k!9&*<$s{)*;AA%WxwG>-eT(V1abk#M=Hhv}3h2NT;BZ$Hp5D+3B7f z4MUfXN&47SJ-3mv8{U*UOL=tct)e3nLiqlZr{C82ddgUHKi2lf3Z?VC79JS_Fj5~k z+czA!vnQ=`w&amoFQL8<$aWWeabTLC?O-1+Iu#CxnZU>)eTUmH#ukbF3lN+a_2TufM<#FFvfOo5DVFLh3uWXNc>y^Np62`oxLz63 zb#6l6dbMK({JPsz+^W_VAaW#3>u%5D+&Gkxd}@!1xsU`pr@lHW3(G+xqUQWr%aq}$ zBZNs;-U5>AL**`h9Kzh$o4$mZbc8xeZK<_>l{X}~)`Sq$rZh1(FGt*7J^6q1b4SaL z)2v9%K$XG0Ny2rPhgX}FR&F|4uB$3>7TEW5L#(w#(Fax>1j9x=ai>pg)xCuly*NUB z@7cQjY*L#`U>bZ!V;6REbuQbm?Xj|j3Uk_`{q5CXzz?tX4Fus~Z^xo5Z3ZG_?(avh zxk*_NlwSrhpOOeD1w)Z?_N99YH`!_t)Dyj(C=D(@JNf(64N>}WI~D@WkBO~TUWm?! za3nn=d4FaGTg6&Fb@VNuDKU9}7(P-0g-gbTtpUo-s27BsN85jF-FgcA%T|})T!uJ> zq*`|PM}HD5`{dYZWAFCY^v{ZuEso>d4G5M9k$^5RF7dlU?V%gqJ z?}qj~3&X=DcY2TIGZH~{{Zgm4s=gA1=0inmex?kU5}swTNvE(jqGXkBE7x{Dhn2_o zqZg0ws}ij6yvqKZ&#EB{p{fhG(~q&7cnqtg0~SdwR8u;_Tt0c@z+S@yTc5>t(xra2 zuX2#V6%eJ|@QYIg${GEk?w`$1@0$x|QHUctX{8=`wySqGq?Xv-udgNlD!b5Ah0o9k zv8>)(nBL>|H749uXrZn3&0pO4@#I})5tszAr%+|>c27>)9w5u382QCFXivCjwlk5m zV4MOtymb7S}G^ zAC1}#!@TO^RQb?h_xVaqAF?BF?w>ia-dtE=20zuZQjAH9g0&5g-$xop*Of$pv+dOB zWkrYcBPUxooxJkqAgO7J2)SQwPYQd%oWnk_dg*cYzS&2Bl^+zTDuz;;RG?HxJ<^a~ zEjyv4b_t(OO@v87vxYE2)=dP_&`$K)>f%p{Lc*E;K3rK*jC%r_npBrgl}qpJ-&p9H zBbiQni>Qlaics*iEGm|*l$%`1C7}E96oBnvYIz_bV57|-x!+z8d^)4w-21Cx8Y>i; z9%7f@IVvGrRy~t~i=R2U)sQU^5aL!WqtV4H=^1qQ`g;>Aw`QwJ^ZFt3MWqU>2bVzJ zEoXZQO89DrVUIhSKpBX1!l#h3xk4%!+7XP;_QG=C0^uLmK^$sr~4f3Bv6b7j@birwexPb>T-5 zu2#5aHB`qx?p}SmN@c|LVBpj0)$#9@VjG{?K-xF3GluQ$Ug-A1*z)^2IV$f;m75`F zd#ZF(im}OXb$wxJ6kIfS>u9^CQp+Vqi?>EiM+;MRj;JVJZPHt9ynM#R_2qVva1_g< zs=4URC_-yC{1pwaRytdoRr~p1G3s|ZhDo)Og%=nFljywm)!Og9L_b;%u~b^*4O8)q z3Q84~@NCq_&w@G1!IR|0h%WvD49}M2SG9_W^(NGd!Fx?(F4cGMHT>ChW#8+{F!P#i zs?W93M;uKopikn8v^-^arIBbgXeBAXCck>>}x++RAzc2kn~p#wPc; z@Q&lu<-$F~eNmMkqBo9`l=E_UB*QH)qo|xjw$@RbS0BrqJevHI`mJWVKD1~!QxyLP z@5kss`SMxFaxsB9=4cRmZzD^ETzlOT8hwvADkx#}TNh?0N)X~nCeOQps0s=Oo3Zn^*qZ4p5|-Q^ataYK)$MCcN_O#o?ZAG< zSqp=`L)=z0p5O>l?qBJB&a#Y#JiqtIWLmZ5vW^M<0@P)|ix|S@mGt&^e?e#IM+>d+ z*?Cif8G$6&G1e$k~BE-NHmn*wcba5H9iITZKM|uV%^Nouv+R& zPV$#Ib}}3{=-j$XpL1MJC2> z5p~$)?A zV2FxE@cRr2js?Xsa#@E}$b>y}bhu@123#;4=iRy)$?^~<-40tr4Iu);8Qq~)CTfB zKJ_Sr7g1#$!T};pHciuYM(hp>{UWWtzKzDHQxpEqaIvF`q#%0wm694?YT(c?*m;W8 zhTvNOD=ue^ohM~&n==1FGK*?SCl<9h zjYy^D5Iuf3%`;xLLUh zNI&1)md501bzPTIuk?yTvUpqLMyoAk(=p zU2cs8SyI{jCOV$Tk8DqcZZ(f|&QbbKMx9-58_E`6kv=}HXlJWJ#<5=+^rG()J9B-7 z&B+PP=xlXMeB*kKrxx=bc*ZBbrc(H5H%-wte*wm!Kaxu>!G>pg0OB(fEi)*Z8t#DE zmtJrzHqP^pJg=S86P++ARCbDlN($v&t9jnGvF-YEDGJ?%&VXjG&~vGlyPL{}SG7|_ z9i|m@N;a$I7s)8|Cd;u9)U2mi^I|3bRyvon_1$b=_Qne5Gr|m?w-RIlsXouL4eAZn ziBx+irE@Jdk9%*}CObwA3-dTJzDGY>;D#bm{lcHKsaiThha2wxxAa+=*3~97*FIvN z_-b=pGp>3l)b?*kM=KZ)El8+Q)~!_K2M1VK9n-doaG+$?H;~$jsdRzY_yRA$WIRz| z1j3hPvfMqz^GqyF7K3GrvFfWtN{1G5yX|Eyfq8@5fU#656$AUT%I6#sm}u3ErtXQ{ z&TYAZRlZ_D3>@AKJPX$O?Excs;xHnFD$w7n3V}~UKxPoi2^^=@;1E)wspp$4j1&QA za#|#yB*_G>&l_s`--H_2Bwcuj{kSPRtxn^PssVtD>Me@&AAl@Jt>AKQP* zvW{1X6rTHV8P1pX;By~DOJO%q!Csmy07M}hz(^zp3rw#rR8|)^2@8st4D>LCvq$`% zupcQmmK*XzF&u34RrFLj{ASt1PDXx6R_&JRag`MaaEv<0{ zj0aYK7>LZvR}b`F)+-h>-sg*>HmX-Ingt?jc%S)L21odzqnFyTi{FsgqtJv1$|r zT9RF?`i+*+FF_=l414-XA}3GbkY8i5Cu>W#5yQ`YX@M)R{=FQj*6b&6>oPUke*s4x z+i1dxVriQ09H*ht8~mK(v5#Xo7RSIz<+IY6yoAU}|9n4k8HgXoyZMz=giOu){JYX=k&vrE)X3AM-~E2w?*;qG&SJ*j7sK-g05-I8aS=Cgf^r!g#Ypmco`7 z_S2Z!olq;i=Q2Aby_;d<>f{KKT3RvMLT-X6Ma6E6=L$`Z0~{oeP?DK_Itl#&WGwXx=pafvu*rfjGGc_e~sCnQ2UR%XsY157!fwn@W`WwHy7# zVXBm?)&rQE}S!+;&pWjQuUplWH zj%{7c>X%A(Y?TU4B^mqp;2jcaEL@b7iT9ARp82|=Fa2vg`@cCmb~ZkivClzY-T*u; zL@$chp2cH+(LhhHUwX9frgD`VV#gRQImA3YKr=>kqy!kUV4NBV<_-mTZmw^`YAd&= z%+R}yeHcV%-S)kHm*o^laxc1zPaEu7vQ)$&zeW)aw&qQF9*9_eBi(zvOCPm29ln}#B15y(5^o?Z*A0RDs(&mD%eAE-zjLE zngsb zrz*-X3ft5Wwhe6#?WUy3ym26mZl8982CB^YDfY2r$3iW;Q&1TZMS{(dy2D%>g-p*v zRowaOf$Yv#|eB+X=WVph;#Cs<<*lvUs*)!s&sjWQ9sb`T3^3-Ya%=^na- z*hh%@>zs>$JH*i&5Ko7=&M3E}E!sQWq+WyR!a7AMHeqFhRv_xVYisng)tzlhI@Dw2y`jfO+=kX1udx2u#9jV15 zug<5-S5`L6rg2jw?OSilqnP=seDGW((9hXwcr(SqnYU5t+f*M}`aQ zo~D88^Y82?s<>6UL=p3>w9Z(QqZ#W-OIDTjPxmlnis@G6s+G%m&Bo~Q)M_cGnO4RW zzj%D49jt%oe1^0Q>&fZfD6Q@^-ql@uMP=DkoUFyR4+fRDG3*W9Xkwnc10$P57-4ih zpa@`M`m9(8MUk0)p4^Anfeh{YSt5Ss64vCQ6&a4%!&FV(^T~c~F6P~<^m#WKo@w>} za^dS|T)gULXtx;WFqfQsTt zoNuLz;hx0mJ*S-@0O=`qdfCERb2_L1O!P+h6PNLR;xY(u2q;K6i2wT3^`Ea=AyGeJ z85GJVE+b)KQ^6n?5i@pf_~MvZ;SoPmy53vpJ}%Jll)xyq^kY4MP743W~nuiX3F*8kg{yXFj(aTBQaF! zGwNgFOyXOqsk7DR_FFKgufjgw@0|e5IN=RCrz{thS)Rz`Jh>ug<6adm_{=w%ns>i& zZ)c{Gfj>kNi~9NuvXdI_l54R?K@xl5u6}l=hYxC25rOkidiC3dh&vhUd3M!uyW|F8 zvN#~q5xe6nVdOL)`}J>b2inUz#`JKTDumD9qYJMiAWxn#;#)SzsuJgU8M!;hd&W4}IESPj zymq!MRuSRXll2gEm4oEH+ffYNf^Fz$ZYgdQ5O=1 zlj=4h`wJNDpPg16#6__Ja=Cb9o0l{3l8Afh7G%~$n+ps|o6t^9h3Qu9-*@ z7Kq=XPQYbio57)oWuMT=G|bo$rt~|S^=nXESKlv%;K;V@v^dQS2CEUSIO(>ZXYnAX z$8i5Cm|peR5$q9&s3!O%)u+D9QkP%u8jM)2Sprzt6MBCExvynA0C?2}4CM zVSe4!v3cx*Eni~0H0pA96ohc|3a&v$V7QTg>?h(Szki0YtEU`Gm~L{7sL0$xfL&|T z$5)xcnGKX#coNSG00kR3A*m8-_8e9f_)zTwG`9Np;uqfc+gL1;^P`wJK>#X|PcAkPQzWby@6QPys8vA3x`s0zJitN*cEn_W9IKP*LpQlcV6 z1?xT6vQaYWuBP=O$i#G`8GPbfwd~&60H6*|JL&eg(L^c?5@cVc| zq6-ilI3i1~&B`lOGE*Od;HyR)WDGi{#Hm&4xX^$CbKVh_0Pl}z@rmQ-yw{dSY^_KH z_%^@Ax__@K^{tvBZKdIL=H;vfe&DmK3}I66CNeEKhOoLl6Ov!c--#}&sdGz}?Km<| zvsQZb&db(0MT}(~WZBXp15ZAzS1z-R@mUk>Ze3iJ8|vL21GY6Zlu{SH2i=tW4_&DR zZ(=e0)NE*vbiTDus*O>q3|?-lHstuK-!l^AbBr*t@ZUa377$RXoTchJcP03r&{^eT zMba1Z08&mZs@9Ea3?F6Q5RV$o2xM=M8WYvb<6(KB0^Mk&WC5jN-2^;yF2*NfcHCEo zk1sSCy}XzT70^ArjpJ4&AoZDpv+u?E;e?#G`Vx=NWLMK>N&yThI7WLJ4i0LRtg7hq ze*xz1ZUj=9fp6ZY&!vUSb&5IF>gilG{*-d~(=HSA=lEIX*N_2jPY;Al}U~C!z ze3M!@vpXKMw7)xxnw0kWKLDseSHDqG47<&%P5tKny||$#nb{9N^r&lDP|LSoz})0_ zwG{5~fJKU`q~N~S$#C!CD};Le*Q*~DiM~sVZwO9tal4fJ&{5A&x20w6_JaO?&CZ;&Smh2(Ps9dj@gwgod#Oulc15YjlqVh0viX$xIt6|ASjso+ z?I)F;sNl;Jl}NF-w8@z4wA(~vH@Q^~yZxp&^eNGKA~yySvT7w0?M-F+m0*QDJd`5ELUaLQ;{Tu^?h{ zg2B-hBrr2TLr_zaqVP0hbF#wH;TAPSRD+Y0qwxnNHe__O!{X!r+5iXv0RRR+0{w$0 z2EYh=6GxMJR`%kaAbQI83c-~z^~sd0|)@TU}~>QJd)< z!@TrX-R^Vi)RRx*uIm>APIUa|4>cd^KU99zn~F-l!V5*!0li%Vyy;VM+(OEcEyCfp zh@qmM!Nq8CL#lSK=5BAtiVHV~K2gvr+sVfZ@@aJA?V% zQ11ml3dpQe#nMgulPGNaK)oR27_6zOO0#8k!lckh8txT@;7sOMjJ}jFF9GQu;eTZ| z%Si}rl!PT9SO7n2;$*1~HHT$kIaP2njYqdNTmwPnsc5ooVaB=1QoB`JFyFGYZ9dA; zBf)c^pyDsH+>`5d)O=qLTA7sw*2Ksb^;N`3GkX zI*;cS(s<<@dxsjAI%12GWw=~%O5UP%H~fYq>k8OmcvA{`L+8^VTqJhVZ~B#G?xi+; zDwlvrR#@1;%*FR5)bQ^Y9icxV+&$OjNq#!AJL2r-OKRdSZSJoc!X~vT3G>sr#=eqH zqLQ>JD?-K6pl%5LohA~Nq(Q?RF>mT2yXGUb=J!@18Y3xUG-8IEK;Qxs;3_7;I+{w; zdnjB|VuYznBINK-g{&ST!)3vqL%+Ij@1{93hJ?0dft(LJW(~aT= z+WadI#n`^m8|iyPZO8id)M=5{9AZ;Rd9@EoDi;UCjdE+0P$MfFE^OLVgl9{Z^O7&q z=MIrkaqdAh2w6K=g}@Mwk*OC!=;2@fALQ@x{{a5gb#hM!SpMxLe+R1gpCgg88}c&i zUh|rW#5pq|pYY%N(kaK%#wFuuwphw+0<-k4MTL0A2ZF@HAuF8Iu7vFtKk*HZa%&9a z=PNMi`R6*81IbR!+pShgv^faBKp(O(3_fzxw%ff8O5vY1z2tlA5%J_@edji|z4@ni z!o1N=0qG=)XXp=wOMLHI@(#h^TZhpe+K%cMN9a#OHIU(oS=1r4KJlNhX)GOvjD}>o#Bp^75t&x|sy;4T@mxOuLR~|7hS20UNAsJWuh`&oC1UbN;?ZyX z>*!C%hY}yhF?UwEvlX1%neg3F7c$R38Lfhz^qxpO+}(Pec-NXMO)A58hi0;%o8OyP z*@Z9XbB!UU({i(wDI85V8%?UY&o9*as8;00NUI4&;(VMGK3t z;`4XhQ?24Wl<{e07HLW=N;CA3Mx(0q?lXJPAtB2l>_Q@L+E`3R`t7WhajD@vJYC9Flh?BI+}}%|X5Q z4t9dTU%s8fv8hUjJ%wdZTz3BLdq#${DaaBKIF>E&Gz6?N8>9QRsR!++ksdUt&c^__ z7A~EBb#_*D)$7NQoX=sWGP>J7ce6uGV|aDS5^~69_Dje+(toWDjYY)Zx|d_hMqy*- z^rZEV*jQ#ehp=V-1u8Nb-^|eFw-7C_Z*3>Uq{oMe<*|t=S#qnZ)*Y3WegMWN6z?$~ z4j=rt0Kc}MmxL)$UtkjB4j`i`-(r)heieGu5ngq9!o1;D8VU&jl5_xZrliY;CeA$c zGU3Y}H(Q6&JwP9}tt%2#$vh%JZshe?U0%`!D;UQV)*98eEHG7@#nMjot9E5rbqiK3 z@K|s;Da8c?aG{$@z)*L(l(>KL$KT*-q#Gt=cbZ>V%bVhX;J_!dF|=cm75Rax%U*C< z=(2}?W6@ZzFELbJW+v*JiY?7;9+4mA9YFNb*2_swHwgt%9URiX?#bvrm?7q$3+WY}A!}u>4bI7Qj8GDEEXrE{7 zH)lsH!SN?fWjesR7Os+xp37D_fnrjmxcnY!T6JXX@+hTt9k!*CE*u$E(`u0o(PhV3 zPiWwNN?DH6k2<}`K)E!T_??W;)wDI(_5Ck}d3Kc}sn-;w`!`nI&liOe8YtT$M@2lt zudZ8eq@iuL!BAM}*Gh4`J8ojQ<(S%wF2{kjVKDyy?$N*F?C@coX@CC!+H#BO**%HM z=0ssfdG(LYA8@4d!yI+j@eE#2+9hM0+Egx*dN*3!1*;6hn+OSq8Me8i!9*uh-gT#B zKH?f-gclrIje-(2B-TAXA{^La65Vl>s99E0$sPLE(nId;fYdgd>(DxDGmI-B*1&>C zcY-VTw#DQx*s6~#D(or6MrZsyssr1)h#A#BVjQB>X!!}tSqknuhEv{i%V^`Gbu_o2^}=!F))7_!%+UsGE4bO ziQ=ne_IMm+4z{P6v2g)cQZKsWh5rC09~lTOVVKd{Ec!g{9ryFTwIxX*Nm#feaiHdN z7Fq>^sTa8DBaJIyV$4Y0mCS_q8n@uNKI$2xH5?u;x<1R$RwFr1e|Exhk7=!(7_G1l z^$k|8)4#(z3thIH_FZ9n&9u1bsZkZFjOv@eO^qU&Fn_3p0 zkZ)LyAZ)d}72wxE8BVl35oVzwYlz@v*kkr()mShq7)u&9>;ibKl-YJ2~ax2#KeAiROByk-^iV8$bVk&PYHx7*G z`M(R>tp0}M@*QoKS{atLt141D%{_r&E*9`M&7{iR<6r*(UyVYHj%d%Ao#(ckjmf4J zgkk5JWxH*%y808{bJs%?f~WCSsF5=|kK=&(+UwhWb*1>HCL=PFY@274ti3n$Z&yor zO91fM-roAZjNwV@42tuxwcGoVufCDv*c=&XPoJ_XZA$Od4`n61NfPi`K9F@gMz4Qa zI{QGTrABjW9rWgHcD7;D;dO@4pTbc5yfxcg+);jod~MN3lUSisIIbCVHkWy-T1TVw zlhOBh0q_o^;4evirW+oT)s#{en-H;aQs+8s7(pZFD}eUbj3vb(@T}o!HXzcF(p4&K zrDs|AsPqaXG+uQ zkGD=7MKg%AURDvIFN!esP>UaN--e?<$kJY*pc7n`~E=XmnMUaVlkDqnA={JzgnKY zo}K+SOD?GlV+<$Cv%6{YlTxt!5=@tqI3ea@+h`SZ>y#eDPDh`DpuWYniClG|Xy~}% zMUjTVVRpYbDE+iRlGI>-bkH9f+RKpimpx|}nxV~*@*6~UvO2XJ1m)B0p&l+|;jxX= zeeWyQ`@9iA-0Myt{{RjC%5~GZq!s%sXm`2JJ^Ip*RXy8k!()zWW5sD6#0tpnEr%gP zfqgY*@oYI~ph!(!w-B-OP5d3Ew~c6ub70aNFRZ%dy)_;tu{5Y#Xt3&f!AL#?K#szF6 z9rTA@&^k|L7~Ge`7d?OXi6EsN$QqvVEAW>n zcz&#^FNKO@qu0$sP z0PJ!(?RO3zR@9i-t*|^xaZAebD?Ll$*nR#8T$yubmCb~y33E2N^Jt5G5VP#0@`sU^ zhl(`4qmf%yM7i^u=sjDHR~!cx#3L#;FM&9gr3|@Cxfgv$1H2JYaXc1lkzd4MwCY@G zRtw&pdPg*Gufo{E+A>37u3|!N2W4|orCXq0-T@D6=Zd9!O_lk%x_mLu23d7y_-*#k z!`WV0Se@Iy?wa)1?9;xor_CA)Uu8|kbtz{NZa?uQ#eb%!KOIFXeU{omA3TBZyohVuIkxOg*Oj)dBBXod=I*|ac0ML#coDytM(cc z+m9{S(wP}j^L8fP1aYGD$qU6fr73M~gdkj6_PM#H-&EGz!dhO?BFAj5gdQFBK0r2g z#B5snO4IK>-U8WHM-q95f`>&ZT-M|uYLmvE zOv1348LsLcW+VMM+X^201K(VpP~5CGIsX9KPlA28JjwoXSQ%wONfA<$)UH1N00z!v zW@IOZbm}_|CSD07u=^?wC8tfr$3nPw({8w&j+ArL>Z^$M-lRsta9+!q^_PW@T+rM=sr(H1KUz&+2ER}X&L)}m?w4cp`A;H_Ce&26{4#P{vKj9Sy zLxDN6sP6aLjunnDrXCu$=JYzAka&v1@x)(b)0re&iVlkYUxhaFOGB+XkhCoZ=~z36 zKa*Y|ib_OSsM6&1xMl=NPEdTLg#7dVk*949F6R?g8d6e_N|bVdIGVJW z@+1EMh}lhf$@b7gNh?yfSYCp>TVR!OeC79VsVqA*2BKLjaim-qIHX^rrn%E+DE(3P zSCGVHB>eORebl8gwk07t=yD%_-&Q{$rCrCOj?to|CqhzpR!0t>I8Zoi>BKOStj@z) zuAZ_w4_~^uT*Js)ad|@2hg;4DcCPMpp3zvJAu*39Dl@8bA>hARJ>tqATAg8sn|mI8 z7LOcrws-W^)$ymX35rva<*2x|D^)0+=98LASW-wS(^KH&{3eu_6x8#jJL7SJmLHHN*^*Ct}9^rH;9js7QUZ@h5n0+=97jq`{5Z=b=@MeQlBA{2 z^%@e@zYvi0ui{y^xDNuEkkfCnzc~v|WSYd8X+cb~`jXX+z)kc6sCY0L4U(0&HM<^; zc%?zaTIUOv9|OuqS4jJ~(ZcbBW?}GrR#J6s+kZn&7pyfHq<7d`0HK2J_gVB0WwaeY zen~IPyV9S(i^W0byY~*dIEFCtgmkOOurzIf(2@Nbd&MI<^Kn4iEwuAn;4>?QIHd%k zruYH8_!Egdk|9AiMgIU==loTUqN3pKM2wkI{HxC)q~~R!$F!X&2$7JL`sY=i`Ur{= zX3JK_I(~8E*f;l6QIJZCbz08%6~#xi_#BZT#4^i6GS;oagR+CLuo0_ld9KatUqX7R zF&v1D7@Zj5O3$(oZr&>{y=itFPf@mT+BI)Qwv`*M0Z8`r`0?UL8dV* z4pi8T%4<6gF!s^2+81-D5plY(Tg9U z92MH1g(_|!sS~ESb16%@$vw3+VsPKuFr@6sDsP%^_gD5ucmDl|si@&lUxy9bDN-IzRD|_((L*3Mh>Yb$ z_aPv8-`4X}@tJ@1mLuiWn|LSlX#4x!>%q_UA=289> zr`bpix0SREsRMwl>u3jkbn_SO6iAslq>WFOxE|ZnQ9|c0#xABGeY+w>wdShY>0GTW z>ipS_Kw{ihSwc_SQDL={@n(|VyR;Q;utDiUKKs|>OO-5ouDo*p00^+GQ(}ZR$da_7 zDHZ?&Zv=M+g||VZ9+Zl0GUG8NEVv$QI)JQ;8KK}q02g)zEqJS!56h;NP#32Y29Ycs)N*RLEZjw4{6vq@lwm-6G zsibbJ@TYNC50GN<;f@yc*WPsO6~6tHx1HuT-tuV@u|yQaXy%Uy?g!U%rCnSrnn9r% zv^g?z#nT;;b#|XrcF_`KL&Kx2ShCw&b&=Lpr@E5kYE#i2HqC2fS4V|t=^9Z=g~8B@ z{{W+t+`bozF7cLsQt|s0ySCkQ);Sb@J%OCc;hmGe*ld4_qev?TY)}}KIOZIC{z*?w z3)Ynz2o_XaG$vI40G@wV(fyz>HEyh;ecNZMQmHn3Q zrD6_=n0&`Ib#T^{2aigD2VToo-V}Ev%;6?dgN~=OKnHN};?Hx6Vz}Z3_+>^2hvy0=udgm zda(>m)ybP7S(K*^V}81i8QCqvZS~|+%iPj8!x~-T;UptLwj`L5T`c14Td#fa6mK)rs z{V%Ea(wl9tjiI`iy-Pnh@$fjy?S~pzveI~pej4=%H$uI1oyWr9;d|B5aO+&=$leV! zW)#0RDDg?5L-U$>$LS}3UFpb}T8gl_c~rRSR_2xH{azH?&6~FJ0@K(<=|iH3zM_+E znif1f5~siBMn&z#YT%ypPt2Zw9Fv-C<^1EVyM~n_Tb_J{m7c0KjY`7+ThJVBC_;`@ zyL;c9c#8wyShgvR#PL^MVKL*`$ELfmxZRMexMvGWI`^tbj>WXp==_uc0y#=Ndm*VjNZhsZ*GcayV7 z_R?fxWjKVPxi<1m_i^v2ZNtM*?~Q^RaYoHHM+*u}nR3;F!+TJdSFtw#01Z6v;ZEsSrccep?Dj%M>sw!`@sY8gU2%8l$+HrY8Rk$mG>#S8N->@gy ztulyNBuh+m49CoDX#azc1he486kgdfesC0yeDa`KPoi+@n}7JeL0e7Ja`Id1+6Yut^s^X(r!5 z))4AV!;sql04S-bOOB;0eOcC(5wmSNd?*$j#ADx!Q=JFiNUOu;CN$quj%_PUao51< z2>$?5KH6^z#vLxVE-IX1OKr3gw4FyYew7yu^P*t3nJb}ApUoq?&h}GSauv^&Q1h2`lQj>BJz$l9a#QaRS_UjG1X=rit4uo`K#tCd=?fe=&Vwu8Q#VV2O-ETka_ zNU~6oxDS%_96~#CqP{G))-*r!QQVCoYQrV3X%*0|;2luE>s$LH&tbF_$!s{49&)wo zt#_uLR~FoDe*1mC7XFPy$h0)4RvONul_=MFG`uq!inx=Qve2#JePE3bbu`=RY|oI+ zLgKd~OMaGvOWOYcTA$>$BX;o&A!-N&>tK1w?lmF(7b0uRTZ`(L zRfNqM?ZpbwLY$o_<$n-Tr%6%an@~HGVNxb5bBg8ex4-zS;$OOo7z>K4LtTPTr zn+h{*?zQZl{u`Q;$v#Xr_ANGlk#Xh)+ZyT<>vrzzs8Ag(_|=P&GMn?y^=i=H!3XNTqv20Uu}r1;CJ=b6@$4JusYI0>N$K!fxi=eUwH`K=sXaj4 z`-kLRjU}evVdUjoYffaWbP-Ntyo8YRtd4V#NzAY}*bmkxtIqAA50nhA1fHI1l%PvD z_@};u(Ihh|rEXhG3kTU)ekp)>(EJ^rZeuUXBpYzzG^kkCWxtF@T26E#%X=>aZTe|Z zF&OvROKdCyy$6acj2b}V~QCPn&CbZl**vb~uEQ{TDT25}xZMyaObE2U)nG|@`UYzOlez3Uj zr(n9PxrVu9{RMx`{j{K`nonwgsYN6xD`qYa&mIsxRM9@7fvha!QBd#U2u(=Lo@&`z zn+E7SH`ge+Cxg#UFw~ckvXIX-u(NQq_Sg-_OI9N}Q5Odqj^bQOo%5LHX9C>^TlG{q zieX7IL3=3YTQZ5SC^CH@Q&Di-Eo_PNF10-8IS|?#+&w)*roRos#;0QN*yqiSDZt=y zzA8n$(l^#0f`fSA`1IR;?0KpB#*v3KLR^{Wf#|kA{{RF`J%CpH*HYS2HNDM+a&CSU zmQw;c+D;uB17!na$ET<<;-R6t5~B=Dsc z&*D*hn**n%UH%m;?^fzEa}Y3?jygVZHg4bhhuQfuoKp^E*KN&x9LJIMhP}s1FLHO3 z^RV-KfZ#VDSp}{4?LrpZ0lpzAiNazFQ z*y;^q7(XzwJ+I1lOO*w*cZRfE(OB_C4QkGUg zJJh9idnzm@e8}ykr1uI5BX=6a@T@_+&0?^UnEK=TV^JOy1oiM4p+i3^K?Aib!#E8LHN zJL-5;{J9LqVIFgitRW-3)QGrBpT%coQc&Y5@-3@(oP6%!LFuV@)X;o-d!-02`Pq1$ z^YE@|1bA$q2&K7&x*{*qXp6A#YIq*8Ml6<$IqB50qj0h7Ao@eXyc!#v<$r2gcn?$W z@PrZD1ple~hz@U&iMPZn>Er>dXpackwyi1u-k2N50O(`WfT-Mesq%0|{!}*0Q zegbz1EAyRgy|NG1P0gsOnGL#rVZEzD4K_=vi8>+89#VI={{R$>M;^rvF7#jQz?CT| z`P$Mjrd7^!%1E~X!9Q(m#`SOPsk-w>HthnQ#aF$$vh1hGwfsmnWuoV zWhbYpLx`^yjHIg)d}+sEJ!AG#l%*9ZT9S944o*1#wJ8h+x(JDlqt zuq>ae`FtamSa>2v7V27kLi!8c3hd2s^@U;hoMU#Tv>dmpc#h+GP8khH@Rl#k8GPh7 z$GqZ1PuG<)y)8BX;4M@6LvFs~VqjL{-<*VonGKnnmj z0mH%u>hnwr`B2b>8&!w{^%lsrA*sQ_`PSXI)lh zcGA|a+It^{m!6g}RKwV$eyu?~?!I!<@2IiV>rvui%psiXR#c<_2J=QX6x-PBpl#&2 zjE}5$_X0ZVPb;}f6!eGPDvry(k@cV=LHQElhO|ZNp4#9jH^UR z-LFG~f$QDbLi$^Wg)Ab@Vpk3_0o8-+pSz7X`|DG$I;_i4-cN_JoC9(j%UCW5fte0G z3%@{fmHeR4NYD)j<>z5?e=|9f(zL!?@$Nd-HOU-JTNm)RR_X$d;52jZsaU*#P8ovv zR3xV9(AlJXRrOEgp>kpoDw~bClHwD;W)-0CU-?Zy!w?1IH{}nkv#O7_rAt4lY?0P@ zd+4a@PN%^5`Ls(2Q!&npaatyfAr+}%O3bI3dz^l%fcV!qIML{FIcrTtZ56wK@L!4C zD5*!Rn%T0i#G>fm&pcIKLY_QG$~)_m@g7R0V$a6fw+l6ucL`Zix)KQ^uiIo|JfoQG z3><3AbPS-6n2+@u2*aQ<$E@;(XI%Qmwn}Ui`^9H!^I0B^?CN_D9{&Js8!I+V6bQ1> z^o3jyM}sPS!SAIZX-d$cVv;TmA~MNTS2?UKo0iY+&)9ps3W*4%>HJRgvD??xOL^s~ z*IYT2rD{}s7U``iM~L0qN=(+4!=a6-O7u2TLX+(TRx!$Ffz09YHhL|hmHwa53Y0=p zok=_^8|4!O$4bDk>hCupr2568N3>p|LXPSjL*89Q2H=gu?e=(7 zxfezr-izsQ`l6eU8Kg4HV#z{9fbiJ@%08}@cHBz(w^mn~DK(i?yecC3>e5QbqCHQ( zt>9&dksq70P+HK_WqsOHyrtz@1CwMgJ5Y}1N28c<0B94y4(hqKRPYt2g%7r+MwXv3 z*8Jhs);f(QB9%UHDgtL35m&p~-`Ly=mz1 z>%XF;A3=eXcF|GXDl`*+!SK(FOai!cqXWhk*&_C8D4d=2AjB z>6nmZMJQxgBrIm_?fDsxoUe6eJB4OF!=jZA8iJ>*&Q}IM=8BX`iPV$EgT~P!EA^`$ zchMYZ702<{2c-W1IDZc6*|5@3k?5f|00B*u9{CI@h4ne?{#ZlLi=s}C@H>&2reDtm+f z03>ww(Nc<>al@%Pl^RUEVV#U*>W19(&(7!_v@L6JwR9wJHDrqq2b9qJ=~CdhBTeFM z%zvq4?cOO&ycHf)f6lP2>FeuHU&vXNArS%&cHU9^+Q#B34M1cv@lTa`TG;%-_tKtu z#k%W;>Qar#t#qp)H|sTZs`OT~WTvrBRL#!BHk63idVlW@6^r)-=I`vLmaRFtsm@Sh zEoZ|p#o2@?b6$IXzehvt{Spt1VGyxj8I`iUl&Z{(r1Mmg3RR%)2C)Ser^Utg=}buN zt2}(S=UkDSLAzdxn$0I%IIN$3&kld=~@DXOfn05II!E z!$l}>40I&r5ABAdr(J1yo*^N;LmG7@8PYtQar1Aj&rY2kza|GEFqI6Uz`4#1!CfC! zI-cIDjRq=mM~K*M1E_ceR4UHSIZx0V{_18Uce2gauTeZrHp58B(<#c4&^}GLo%ORv zd8@jxg!G-%<{+n8#HA?ctifq$Z~%A$Q>itSZ{mCkY4*~zuYJWSDqFK4@lfYH$8WBm zctdnKP^qbO%Jsq{p4>$fB%TL>0M-raV`Nb}e z<`t@-&PQQkf9e(Z%MZmKvW8?2tUlV>?GR7}(r=-xt(%j_qr;i#tgU{&TQAx*tk`}a z;J4~!`DV|5oGB>8SU7u%=7%qyI{vo~`WgABr-f-&K?Q#bzZz5V(o9tx&oG}u=b(H= z1*JhqP`D#;6sFidJs@yF<_^_;)O=;{CBdXS^V5q!+pJe36ok%8B<6r&}g-A)3%pBK+eoX zTwl|3{x|zRP<6b_s`pmR!-|V98|8VZw+!{OtlT8sX)&rQoUjanmR9~ zL23>hxR`teDNTi{>Ul=mtA`E4r0Y$}pLs95bWa4tLfn`~w|&gzpNlel96h`PAz zrpRxi=cM#h>A0tehU7)qq%ge3`I34%zfQyw6p*>fL}7jA=H}hN*Nha|$XkX2L+cN^vdEHzx_34?>pxU$S1n>FPpqg;+u>J^`%hbbQ>gCnDQi$d5H3`A z0a>HE<{trDoy+Cl9U}f{>)%&-r==^_dG)BDeO;7Eh_6|P)SA3ZML2_BxtN}J@rq1o z%(;fjSDKf+$3BYpAChB5%IxwxQqON+RV~*PR^x{Ye729}F9k-~^VPg$35+h-@&?3E{A5xZ>2%U<$Jlu_J(604s?x@04 zWZ~FMMP@{FsGWUf9w)e3iuWb4WQs~3PR)L>(ASG4=U&>Ug03k^!7+8mVQbncg}0ds zI%{GGy@1xR+*1%lcBM^gXr!O!-<{0ZlG)KdX?IDn%`NSX)0LUy~-W?>nU2K zwZN(m5YkJ6)I#u`=g5IxBeQBz}C@~ z9%-`Dp=Gvu6gVFTlOW8IqeIpC)TOOOYgxG`dHH@-me<-V`#AR3l4Z0Wn^)rRpr@lP zjR7P&>H)p4NkTaqj4E4c2t)AXDI-r=B_u23*G(zd&PYRKb60VgbY6-R$-Yd%2a7m* za}M)*YAl>~aw4*jgfy3kNY46ndNoX&t#097Np9`N74AK>iMV9OCPrVR+OL%Fu^bOk*YuuDMX<`#ZnzK9Qb+nJqz^#>KJN-7 zdboYR_dY_)U!QW#HT2b>`}?V=?Rku*-MxP-Nnw61H5;7+&iSeykfpUPA}p3uooOeU zr26SRN5Y?!Z;?jLk5xQBE9R%!UTS@xD5YrxSK$l>Taldfo8E^K2r`nKHyTL( z&ZEtL=pVCxZ|NMBm9BR-?ViMz$o~K_rW_xvZ7TMU3y%K)`D7#cmGUFsa{*3$Z!~;Q zU@Ym?lkdnEB>MVP(PdJ?nibRIpvcj(wYA_9ux zP1*GXtv5dOCa|Z0z2l`m%|6cwJTm-+ADRcp@;GxG4tEc@eg6QYbSQ3DMI)0q>zBmi zqS0h1>nS7AS4zO+#15VR0HWh9q!lhRel#q7Lzw%oOM|vkZa{O zoAW}w6?ZG#qxv=-%BZPUN39xJ9*T#UuJLj82Teqqm?^@Xj{Pye@9+G(s{-nbpzqjz zKcyx1l%zWuVZPo+!_zN+4*-{bOO_eDP8(F)2+7Pd9*BqtZrE8{Uy=!4M0Hvc%!beI{D>a z>irp>S7GQmTu^FyQa2w(&i%))FHIn+cbOOjyV9Y-UzHv*@=~>Vt&Vew>`wZ~@>hjn zCwdR(QXE0Dl6QmpL!U&`B|w1Wr&Kz|pQA~`=CqgM z%WSsd4-xm%kX;H~aIDPVbe0rV5Q89y$`@yyp)&#eHM1 zgu06{H6uqYqWYCZiESyR@aR`z{HHlW{T1k^=^cHQ;`n@Nb6-1~VX{f~Ye_9&PcoMU z!H}Te`HgDK2ELSp{gkDMQRJmO8hr$w>(`0nP$Xf}Ivqhx_+PWGt_{b?cdTWs0y53i zVuy~Fw$PU?-J0K{me~Meux{)nlWlmQ^(x-bDa;cWeoQQ@Et{KoyO-h*zQ4E2?#cez z%*6RgbNkb^LGJslR(cCk2d^FLU+Syxullle`&<72by*SPLQkyn_Nx9A>F=byA#O~4 z9%`N3kD{H!@)iQ*)@Rjjs#|hfO5-GECC@{y{3y-A9aPAKkPxwzdUSfil-sCVZX4p7(M`+M&LZWib9M{khAM=QjTUMK-S& zgAz0*FPmn=LA2kne1*WonF~(#oF01$^^$84z^3Z-2MPi8lfd>7W8d;Hd=&#QlK3u< znY~}i4O^r1g=4r2NpBl#SDG3LgZ=*i8cqp}FJmd6Ceqx{^ki4{)%jDEDa?4D6ph*eVnq+aVOVw)4g66m^3pz;;5w--ur>&6WlBcjS!G6QMYk(*$9*YSd-wk7 z{SUUSDl@EuxkPhMe(#ZUpcUr}(jN&{8-pzCEz$YG^GBuduNT6ige^nLNMAYUzLLJp z-;ly*p(sb;2)P$+>rx39J;fut!lkP~ooa6?rM2ZGlO7&q`KcayhkrNfpVF0!;Cm=| z*ww`OsF&N&uD(2I;9RLg%sm-fEvnPcX!I(O^DZIgTo+2vZWKQub*U&FDmJZ}Ww!gC zqZf5w%X;z<9_@WWq4uA3els&>pWVeyPv$!ODb=vb5bC_;?^?S~^YT1GIljwTE|1lZ zP<5YhqBeP&wxcc6MEJjptolrxzU|ai4r5OwaCBrpbvVM@Wo|d6(6F@ox6+Y-k(>fcG3k0}`5BYWjP+1u_ucYm^ygd`yd761zXKO)pd9NIO4#|=5H)3i5I zt?fwd2g4Twh843a&ndyVrpELAaU!EYgwk1y5wP26902_q&x?cl*#mcCH~Vc{SuObdgT2WdCbRjuMhWo+aUU(Iy)$XN6!blB+ zmD!f^O?@9-Ug}F|)D23Oby4C^U1yy-G+;e-fKPV%S}>Te;x3;y{Ko$CN5&gC9vri5 zk6t*p(esaeZLw7^9+`XH(UGM6OY7cGbs>oCwH=o9OKqejDeMFCON_#iD;<)XF&!rR z8~SVL9bT8bJ1SDt?5RpFIJFy+Pl2d$5T~X}P;I0qc_&KB{#D}BtmMZ5xE%-`L*h^A z%UjrRhb4cnhIUFF-f8a?oKp?uTEbm(X4@G`9CY+rQICHAAJ)ZJ8dZMRk_E%f6BYkW3}|$0=%vy!RkfV z@T8+>DtJNF7P3{_uf~xJlYE>Ca@K7KZBHu0p(&uLaz6vda>t(FXxRMJ^S!hr@{1Rj zial_m(>_fHq!k;ej?A>5!FW_St|v{PMcn=)uY+3IPQ~!JPFne2l!ni|*OcWJ6tD1~ z4*vj_^=A1+h9~@2HecqoCAKmA755fwl(#vx6Ys4EKOtX)@ks4F1^itnJI70oVAs6q zN{7jKtANV1RJW{MKSXX%y!KM%%yn|6Jgn<+X5^FLOHCxY`??_s7b-L{ymhoYjlHW) zo^Xag-|+oA8jpozahT-<2N_CQLxXCQv_Uop&gS0x`stC6;Yh?-R=zaHl5mcjd8hen z@Qxr1d^S0>SitjIPufot_E=MGGK}u8M5I$wFFU(b{ zeB2isEXIoN$O#W$`t{{SfN0=7|@W;R&Lce7|MHobOFj&WRleKjH zWeJlR^^3@ zbJCS%S7yC6f-^l%A|!{~3sY*!q=H7{(@sZs8kvjodU!1d9!_L^1yoy2w{~!c;O_1& zMT5J$ySr0b3c=kqSa7GfQ=Fp3wM7dQEfgpe?VtC%_xtW$|DClmnR#ZCGnsR8WcJ?A zvmqsIZ8#NLVwBcn=%vEpnWK^p6t8vUc3zuR?_Y@+%iQDn7F!6BhMCe4cB+PB-O-Mf zekV!Z#1w7K`a}>X(b6_*M6aF&9~o)WYs{2Gg54W$-fyN&o#g2q%*>3CUzd|}S}b^c zU%I9o^;SkpA?-&Y6lp|L+IQCG*=od(u-MRgU-#l-xGr!3tw<_89aC1+YA}#!hcXQa z)oyuwH(l6vHvxQz|7dcg>D1^F-bXBo-mO)(&zT$Kqh64EMJo|^A|VsuWwJTr{l+r) z#}A9A7_H-d{}+kzdv`otqXT-se!}5GKe6lO>cAgOzTg!jJEsJtu`7L1(p`kSNfrqe zY2}MfbJT12jj^VT%nB10@LjyKuBnaeiDrVP^#%7j#>QIPK>Vpl^ke->t{~uf|6w9HMBsxdu5r4sdt%D zMNQpyg%Nk`o!F3Z8iyIOO-AO`PHO+q--Ml+!0BH)o6CU=c4@)c2@gM=&jrIv7HrzO zj?Z=DweG1g`!sy>MdrV9u~(R*QQ94gIql<5Iv_AD*hI|OOF4^cQVjwYCzb9XY7}hz ziw9jk6&)G5#rBLpwQQV5<{Q+4UbStji-o@{&BnZm?TH8}|EzNPTR!c%{Z9v46o04z zo8&3XtZWr}vUG2tc$LVze9Oisd5RjCu^tRsn<#GyscskP(u4)gO&l?H1|*ergR1`m z2wC=wp5FpI)FO#qNvj(_px?~EqFEBczO$8lZ&u%AXF)@Y zni@4n7bcS(yv@iot{V?v=1v~IX2Q0%^<#ihkgbmi*^T1JM1V2MyYjdFgHQS^(qifB zt7(ze&N~l3Bv6m{m0v&hWDp@pdse@Ft4gJR^L5Za^yY!NIZ?k}NYq4mj&?O8_gAN~ zgsiRweN4#=H=NUH{>?#%SZL07GiYWeR%Srzp!PObY3R}u>gRmYI5#{3)3Jno?Bl`WjQ_Dw=dcF^U0zopPu^oe=!dTB1L^_>?^&i$!#kueDJ7Q!CzEIPW$oE zpDzdQnK2gdJVu4Sn^N~{;2<&Xr(|7)o3$<3>g{pPqBsjYL^%7Pw0DJ< zs7PtF0QHF7ay@(KeG;hnE)GpS&%>ekcJuR;AXYm}*#Htum*71AwzNrrl@;S{`zQC$ zqRS=Ex7&S6;}YV6yt`3xsKE>rJ-Q#sl${hH^cp{2QuKo%de~i=X-n1uRoP zQsw%e5SM17#E)qflzb{}(f8*LxnIHxKCP!>)sYwpXRz&5#UPsXZ^D?Le_M`o}5iGa(7zqB6D@{+fq0y_)bIYs*U1{!@kUa_KPew z78~vzZ_{e_tId)^@|_ebt7ma=-&>U`Q*!SVSH$m>B%k_Wc|@)B?lERcug}1Qgy;=9 zSFLPjgmlB!0AO-^)Jai6XQw~!tWV)=N=lPhHp$0ek^OkmVHMZ(j#}{ zoyXHra=|lAKP68OHqDj2afjajCZJVOex)hiRG$X7x>AgMPSalUD174kKpE0mv6s8- zXgy_hsAEP%*G~+r{i?_&Tc)L38bup-q9I1uFW!-2dUAQUJwUB?&Up1^(z~IQds+7m zENx32nHt1)A~~%ag*|>>3%8E#}{3VNPRI6=Rxs9R^RfSZ%t708{Tg+ zrj@7c`cJ*0bp_>Nh4A?58l&^KR2uXJ*oVrenol*cS{rgf&1q>J3*B_(vgt|n&h9li z+V31yqGIn1ldX+Ry%`QTe_(SevhLNqR5g!TU)&jT_9Rg`9z#sm`LdGs`ruKrL1&6j zp6e{_ob8JKOjC#^<9&ClIO;Czl8?_@mUa^o{{2#L7K{|L{NZDDW!wxL%x zsTISXTIH4!9J||{`d(wa~&K{njE0EU0-mibFKTFZRMrAzNVa1fi82W)+^Iu-s-##v$C4nzEh|}$t zCt?&JY;k|S9vfRFj+4Oa=+=I`E7QG@TM7G8Y?_^=srPJ+0sGd_KBj=p%mN#ekSg5Z_ zb)tE2OF5hIO@4BLsr@xwDm=YBZ~p?eSQL0eZ7vl;2f?vTO}x(WSRguq5)=k}$=E?o zn>8)98fhq?N&2N$y|2MhJJMP}(WIc(LIy@Qi7q>_Lg?e)CPyYh7!^{@Lze`^sH?zF zXA^qQPG<;)iTWnDiEFDE-TQOVSKCr=lDP|{_z1bs^P$y2Z^u^;>ieCfk>XP-ppAs* zMMq`V$4tcR+ub)ZCkP`I7>r}a%iR$l>DG?leh6xgva0Nqb&FGmmix>?t$bvObi#R< zN>7)4wyE4(23Y`PFZKN1)fEvJL)0Tvefjw?8rtjvzP#qlc2Uze)P78B$% zbj4VL;kqTVDptbBs_G@G8KhkkZ*)`+g$=A?w5_`lfKQ1&P;DpFBd?U`t(QMBO^~;v4$(~JAM5VHq zH<@ktjRS;^a)NgIJz$TzCN#T0qc}3o8h3E>snGmdRo8 zJo+&`tNOvgiiI#~N$D82F6oTe%pr&zm!s1cAtFcd;p1_KUXi5ba89ro1E6XCm##6z zHnxe;Tb=o+@3zv}r9@)R(wKJ@VJ=%pNy<)Q3r%6h$KyS9HCZnd>rjB(=xLNUlRiwV zy}8@lJzhU8c+)=J2|J^~E;Lb5mFQo8&0xM5TO8;D53%!K!02Lm>Y>9&>a>`j9?9x< z!jMd1-0D{O%Fos;4HLZ$wRjgO8LujPat4PivdJY!!NAm6q`Q|)DZOZ==?WyFbp!5x zn@cAYI?%)zR$u59x)*WIHv;Aot7%lSUYd<^l-77kk}iS7>Ih8ut2t&XR}Rz=N&z3? z2$@*?0>VF7b_-Ias(%V^)Lc=Mc6s69ZE6t8lZh^dGn^fmUJ=>I3w+=v+c+r+$=v!+ z4sYTIBN|}NuMUv|=`IwWJ&P?~Xa>tZ&%5LFBfvjQ49kJ9t(CeyOaiQmnL>k%2Jt^% zca_xA2rl|tDo?cMky^?gIgd-@Ei*PS!ad#j!E&9^Ak}VgeV)I}JTLN1eFrnc1YZ(J zM7^`Zo*Jtxdy22q%~KX1G~Fa?UEcm_Sxj0jIga3q3WpY9kj{50F)eNk3j;rfD;q$UJGV+9ua4Ba`xpGwP(y`M2T&>#bU>E9t%+9AlP>B>i%g#2XSrY~wB zJI*Z2alZu;S~gRFtM*RxQW(Bmdeo?z?R@fy$dA6J(Ie`1Qda8>j3vK;1vjl9^yygR zkO1FL=`nBF@O~P$eZ5~To$M2zMRo$bQ&#FjOTW{~@OgV(yR?0{%f+ta{54&PJ}P{1%^~iv^z~6OSeJo9L5nZE-^S%^ zzlPsAo19~9z9z@$iqe*VvM+bP0WLa`_0(F_zf!uL)}Q%wmC$;xz6PY4@Ii%CLlQkU zd7jmQAlR?~r2fR(xe=a2msO6|PIJI^{@NQi(UaL4$nf<~gg}s0OGS7ruL>)%>_=o< z&T3})@k|1BNJ<0i*^ z^VY{F0*x&%YPcH$h&$9CAe37F!O0LLM-A^6^5U^wPxJ*ulqlV$r^A@uW%Ny&F{pHD zND~WUJ}a$Ovey;C@;35g#*SQh)%*<(TSt0G z^IqJ!ZDHCC6bRu$64hOV>C4TTM1pmn<8%%_b3igm^Tk9_^05>tl}wy&3$<0c?f`DpV z9;X5B)7u-T6)-)hPwaL`B?JAZ<^kK3QxDR!wxEG&=BxfN+Fc#r-5)rG2{tPl-2`NZ zlwgLlIBLkjQrulBm5Yi1>p49tQ=%$saPf-w`?i&Ga|ThK=fYYSM>#F+d84XBTOeS(1ac?F6q^e;!^BmDOnd&y+yIBk; zdH6YzK4s?;9h3uUVk5NY~OKkd&RflUN->pUl1$|tG8wrxU4Jj0i_D{=U-?Lbs%D{8^0->WeI*N5)Kc`H8ede z(^qG&wC(P5sGP7`yh2(?rr}KKaxT&iW3xA&fmg-6i4?LkFPVvGA__tY7Fd&&FdvFJ!OJ=6?BA1(ajQz& zEN4wD@aFN7aLRCskhl}PYDf$zI{-Yee}9gzMK}a$ExCK*uQ6_qv;6puE!}j;6j<^c zNfKR!h7*il*i`3{c_2Ijju>;XV=Z-CoVn_3U^^UrMKVrfeP1U`5bPz&SelhZr3 z+g-yTHzzKnI$xS|XHKecYu|FGGh&AlkVq+@nb84oRLCh6!j8DChXgNk<*Hn_ZT118 zKiP3?sTZzs#NM7duh_i%Qf>cc{s+-QtPF4WErQ&AmU_Kiq2p15UR$zQZiV}sW?t){ z8KIsrxQI+z6H|*XN!-3z%gk=r-viK7n(#~zpc8N8OSPq+eFPQ#Ed>J=Ygpeo%X{38 z6FG-yG<;N~5DN-7%r=i#Xy+Rh&O}Xpu0_qrr}5kg7pfMgj{Wc@Jb^A9+oYQ(qi-c5l0iSzTvng4=ZmOIfrX8W0fVbW5iN zC-vwV9k2NLg%21W0iM{bSM+$j;7p*D;AL00E_KB1k(=vaMzvJp;bsOq{o*r>kSmR^ zV%UhXL*KPBp>9hZr^%ca4aoXLv|RqJ#&AEfTYfV~3EEl_&j6)Zuo-4n?paW4B6K}7 zR1ujx_mrFONSdN&iM1agiWF;Oz(ot>x^>bz_YAW4mfq`0bj(fI&S#VTK|;MFAZF=v zF5J)O`VEiD=d42fq}6x`C#py?oF-o(;V+<=paun(mP_D|VHa~!bj9 zI&!p;kgbE5E{fDopsK%=0#UEsxi&mz-wnH|8Lpdx&lb(JZyzKcF{ zL#xr<4zG>Y+ck%&vJF2|>wrx52f01qJEQ=zFn2MgXxdZ!+uKlwLL(N7(@0l5qEcyK zzrwZpuGFl{+-e3kOaoA-r?}<@dWv1 z%b5AeWGj@4RUDmaBRJ$yYdp57nw*gMEXIm4Jr^PEJ3?Jxda2OaLJq$!IJrjp!8PQM zjupD)F8pZ+{F#E3tVY5H@6qxMPW;dS^1b&&yrviGxTZTRu>q+u15pffl7yxHd3+r<17Fy8*jE!k5yxRCIj>9itLk> z0fm*}vSArJEP1!--ytKo;B=qY#M>le=filthd`^=_?dUCV(4MPnk)3e5L?Nnk+$Gm zuDVl{Lv%(8WjUm_67fBy7n&(KDrvE$eKg!fI94vAYZyNVoYDc8{4IuVCZ{>_Gn<)M zd1X_bl*#f-_KwpX04vUFIH7Xa$UuI(r$JZi*C;)I19XL;eW*(SF5Ixk;TB1-n?qIX zi#ykEaeWoRim6)c-}6e(){K|QQHnqcr{=>|R1e0RogPjfZCNBbo#7z)DU@KkYufg`*aBa*soy0L%_uJC=#4oeZItR~cD?sUoMfg}Yc5eQ`L42vU+u=(1bl4=jyLAZjznwB zMqtc9;x91!9O=)KyY|nZbod-49lqEoQWlYdKlEmMtSW}KR5|70_nn&>v!oJv`Ot1f z)`5?NmYgp2YxcszY&&v!ka0IO2Vq|s6*&|ey`M^(rGKK;_d`xxvzR!O2j95xuz`MV zPwHNo0bV89Zlcp9ffczOcA4cAWfj=&N&U(TYzfp7+1EzFYw<|ynWq&ALs9H<5I#=m zBThs%%SzNaHp^Wl1DB;d{?rDP#)yrjPLWYV_7P80kj{PM++fMUPCh^W2hpBU4Wv+k z=PNTrf{I`+rM|{efGAA*j$RuXRr++SfDx*|6E)=3_k}Z&Uw4f0#f$!{vx|P^9Z;Dq zQ~UEKlZ{eX)?y0#SGc6#3_B47net(>+PBE}p4FtfHjcWvCAgnG&PIU-FA+4d7jkVT zT1T{`Y7sPrEb0>1K=?s`;?nz%hZ8QCao%Ix<1#>c4^&Y=PI@jQ`)+P#$CyH+(wRyk zd;P0q^nfiy`qTGFg)pX{W46s!5*))WEwZS~+KR~}Ued~lh}_!sDEU$bZgz#$F5$9P z6x8f$uQJY1Q{>diGMcxvlqa*IpY}c{Iy1UwMD5>0SYtI)p5iUof4W6qkCAb%f0@wk znY#W2oq+TAt5}yaa4e&VUFTy%Mx9iAGlRRKYfGW6!J6%e+k66+su9!w14+Z~yWIh+ zzwFap>->1x$|SNbf?j;J+&!!YIFS6%BMbo4XJ{s)2tnn?2iL9nb3B z^XcbFgW8O~G4k?i&A80c;ra@?=0ObQ{J$*hdpSjC4)cFsMmK>EQ^})dSB6wZ%6QBO zl6q`@JoIBBT3wTL)NnX4z<80DUqMr7f<<1)RyeZRzDo=s;8`3cNG1vgJ%XDuO;V+( zAuT!gKDkler3_hMomRB+Y0<&#I@QfxS;Xi+*a3R4aAEX$M9eM*q_4GUm$K+kO!hse zRi9=V9J%PuT{tU~t(pkuM?C60F^l-$?a9+%Q|KatU)iMtD*$dvccX#oz=ZDC?m&r~ z_LWNtL|Y3vY*%V0M%{m(c^amn{ueN2IEKxJ=M#Rpz}&*3N6W9gZOl47S8a|f1F(0V z-rn$kYcX`n+l7OUOtY*c89se?{&CP~hCzkNgPC3z7cQyv`)af{CdceDLE1EZ)U*z1 zi@Q21mL5FFWlT`1cHJDW6CPP^PToiiJeY8c=U4vrSxooP09|RO0*mnk`yB#5DDps+ z1}RM7adr@qK04dm8t*hZxA0UzmKIg(F?9=#L?6*UZ~@*F*{Kq-2)5kDnwSSHQfa=Q z+d`r799I8WPaQ&}XhYO1Xo_q=g@=(u!;$yN4h;H67g8Au)AbWLBFI1*mjBVMF)|DW z4`#w1RTNyRP#o8PLrfY;qqib%_9bcC860& zf5*_CmM6C86S&=rf(Q>8b(Oeb_Nk1#TCIrj%(W&09Vr|d+1F+#yoHkXwefN2ydnQM zxZOzkY3H%*eNf|Y5_mwiWplbwUJ8^Kt7=v(PakL#p^x!+o^IL(?US1@S zZbtXpgNR5MrS*^&AwR(d=S-CfzqBAb3DxODIt0(vdNRz6HCP>!V&pfP8~S~Fg0!Psvb&1Eibx`v&M@}UIRgaNW+S!xW`8Lnn;{p;j zRG4_{#8i^ovo-BUM)NrgBvez!jtl=%Als^1JU}6yDOFY?h2H13`4LUOl-nqyy*;>3wyn{d}5f z?#g^RHde}~_X!Mc9EwILv_^T%%3%u}BrWXfYm-R9>QQntH_CUQa3Dv)r~*IoAtuP` zFQALLNr#HkX8m3s7Qel9`xCkCJCY*zcR>=e@~=&sFDv*H@nYXcKq~m!tvYa>{j-E@ zmVLTgcl#^(sADN#cE2~6#B)&u$`=!`Xp&5Fey7Ka71ZYcIO=uNZv+1ZG0@z%8HEt& z^F8vLj|A(irPuA(hA0yazA&)Rp$vg~}F zyl`z7$ZMdjJGOQyck@50G*1vVD)nzIaZzXNU53<#e14*q8pNWd1#DHze!o>{h+xPn z*NSG?{N;^(^7N*T#la9@LMl5`U!C2=$x)D?2-?6sL%r0nqGy<0D%O!c^4Y1*QRy7o zB*Zs@q6xEa{RO!8zR9^%iLBWS7AU5Vu&Gea;$Eu6Cx5| zTc)>O!MR3XKg++~$@GWvtb8c~S^Y|+f{B2;7u-GLeQcAw!KvpUD0|405Jjt?b}DYo z*(rQykQ*7qbcoBbb@;;iR!19n5%|P1NJ~;ZzAnGzK@>CT28L2rPeIS&*yUbSF_8rm zf6i4Ba{lbpa?+E?Slq%o*gDghP=P?&uPg{2Y;H8_N!GQUNiZTl?mI)|k4o75UAVt- zWgMP1&teTQ{WwW0HA41SZ$}LsEVU>r6q3k~^kWUJ^ckEYzvfm`86>1}xJOcAx{(zV z$<>aWAdicOw@LvzY6jZhSCjQhb?7X~^x67w&^^#h<}cLq;m?wr({p zXU)Ws7XDEP43rz|vo9Hp_FU!G3d#(Fbl^Mjp(+1#M)6Rx`g!P@?aVbFL;pZ?a|}GL z{rts^?-?=|Ssd1gu3dD9ff9Ne8YO%FrgvCeFhIHDm-VuCA+6rg$FF76!GUXL?x6?+ z#;6K1DLrk>Ls;SOyo4e*p(eCL6yCgup`7sOqkTudSs&Gr)zW{zOCy#tM ze^9T&S{B1-LKs1Zsj8}!K5|~rEDN!p)9UyNT^_NS9>o6A2$W`Yzq9S$ukN@kUlJ0Y zjnrJfU9~p}@E-Qbm{rxGZSE3!*Rfqf^TES4>yCxRZs1wiUM}u1>?mgk?k_-WjVcL# zLdNGxl5@C(x1%JV4B~VgZ|~y5sdCO#@r}%`UzE`MMm$MTn~ZViF zV(jJ~=2v}T(#8fP9o9>DwJ0#im)5T^(?dYfvdS~%(D(%bIy)lLV8y;=J7Q3k4j^|K zk^vpt^)v&T)wS3D#BWVy3&iLEJs8?QX{=M5=MKxP(o~ z2g_cxM5DHCLDCUxo!^y0o_lOCZxLxq=bU;vD<^67m-?h!0W> zNbHoJ>&mP7){es*8Xtzgh8;6=k;Kj*RY%Z&f-tOoU*VRr(|chEzwy%#>WhwR3+yY4 zPA{f;W^*!P)o$~$4(ea|me?ir)A`n|n=EDw0Wzj}VkM1za#K8D~7uV+2GiUF;P z2q|+O6#yu88KS7yBCFjsz_8Kl^IU~K4Yg(+>g)H^{soAmNJ>D{MzC-*RHCc-aCruN zxq~xHW_h6HL13aR#G~#X;S!TO2c>7KMxQH}m&qwSbAL9AKYlLPLo$LpPj-qC)+t=; znpUcr8_bb+3lmZ(TLQz8UZi~cB^NmduNz>2)q$fLJV@=&-d8QRlA%h3Svxd~zATdy z?-FLS+Ahl|2I44#x6OjT7!-8Vm&m0eg#{=vt+!Cf zB7IKlQrrFhMS7TleA4s%28hKIH= z%I=5kp6i0bK)36|hZu&$kHt_DWr~#~n9}4oKSk{pheDm6G(1Ntcy=ek8$|FoL$)n_ zkChf#wvCM`oG)og%rdlcrcHxH7!x%tLn znd;Ewx$?DuBBNbF{0JRrC$_3zrRdVPfn`Mi0|%j1D8OlTF!=_&ANO-;yJ1Ibtu$hl z9r>+Zg-qUy&9k#g=BdutV1ZINowE@GH|O5%qTke6J_DAa?o$Jw&nwC4PPH3XfNVy! zxL68m4nxSXTpQXXk!c7VS`i7ND;XY&TLuB~F*o(kKu&vAv)=(GU>HpRZHu2*YGLiD z1?Y!-iQs%+Ua5GcHG%;z1Gwfn^TZWbM@)8>G8Jo`s+-`W`sXLrv%+QZqR~4xTxisa zOSiFwWuv$WGc58u&ciA53oQ-T`zka1z{b5>ujk*E%}I{N1_J2}kPq)whLOlzsTBlv z2^+P&o;7LDy`$x9@@klor#93YhfR^Bk{MdNJ14Uc;us$}1(r1ga6+DgsUWv<2k)uv ziGw=ItIuI~Cyr!aTI$*5oyrKa1XIeWRvHrvv<3FP)=0S>yA^FIH$(T$EWc0CtvayW zDH=2;_DfF za~Y|E^39=1l>R_o`}Ll#dJauQ>Da|ny_v`rZYznpvge|6eMU~d$w8Q0lFJ@z*FzLJ z;J{-ZVNZ2T$=a0p3ndXG=OlQ;68?qZ&QRlK&2Pn*chUG){iob&;*%o%vR6$4s@sIV z54SFvIb!%J@sxRI+z)r&^=E9uZ3gkY#=1t2ycZ@fYR*-usiX914AoOVfcWrsBFd|( zqcD#$jvBuC2s>3-xuSj(;sn)Df1%s>`1quG4Q7*8jR=xWV(iZl$lKgC#;NPa&kH?W zMG)%YXnCzo22LRxx0eD}(W#~e!qP+oy;aG?cLoEx=wNj=3>p}D5uI5mX;kr)f!bB{ zA*zt^(lzJ(=Va`YS8Drz_8?(tn|AyZO@q!szC=G-=xNX>ec0w5JKlx}Phd#m|J}M1)!J^2WTJrCvsfsJ zV+MmU2T_asDO<{<`@*}PYk`otE5vuBpvqvg87&1zIYfpQk3O$D6Pwp~x+Nky8C%>>q~xlqR2DJ4K9D{0P0*)S-VDVf3jR@X^YJk|I@v9gHNV8RMFjd&z$mpv&#D5Frx`(#gD9Dm=9%jAG5Q2{ZOmTOSWxH9$5xKH=g zV}Pul-a5FgQh{7vUU9Qf(SR`X04Jw+KMDY*CLGiy#~z2wwC6ngqMCiu>!7 zpY!4)9%MzAk>U7H9qPXtz4ME!RJQS-F$cElHai7Ig!G8JteACuT>8)^&!_w|rA$?w z=POQ=VNj#Op6{AMirOcSTr(tmqQxK_gJya7@+~?>p|SItZLR6|mROJrX^PdLz6RZ_ ziikQ&g30xA8Lx8BixM5>$jm$4<9?6>{-F_ufj24(MKaNo5w-II!%X;BySQvbd|AeJ z*2TIyw#ExbnOpkIl5KDG!v}19etXYaUfk!^WPEy)E240&!_`|`Q4w|_^Gg*Qd-4MnV&_z!F*<^!}0MEmzQn(ne2TbLPmfo zUv+?*g;2DW&WO)ir9Bm5x)CaFlLRF07>W{l|qH$QKfhJdJ6Tq?m<5$sBBLm~TTpd=9rM z%WPD+tE>T{EL>0LfaP^5pXfHanvwwM&#ct>#|Ja~3f{mK1&+r7zQnX3XKL={#Y#o5 zM|mKYi39TVM_H3M)Lg<$oI>y87)=;z*!l7`aa|_61_}k6GB=fKI8qRSS-rZz!Yh~T zXa|_(9yr=+t%}H`X@U!H5xomX1xge1U3?5Y(&R}3S z05O$6cHYy^8CzA?=yDd27L1x1h<7R14#*5Y7vz`W`2eXP0B6p9A6d@ku%lTnAH~wr z5f$=(C1_Y(MpdF>g;+(VtZ6tUp5P`4!OedDlu_#5iEMPH+`uq;i@w4zL7-wZxufR^ z2@{G6xD6i!hjwP;xa2A9SDZu$b(gwrncfGBjBxkB$GQ;c#b#?Ou9kUP^Bqec-*5no zq)Kc9NYXy^FI14>k-eu+KDCM@gpYM?>ex5FqRc{J7gHFUEh`l&p*Tq^Py8Aaqarki zs#FwvKqd!QO+%h&jGot4nS|gZgd7tbJ&D8xuc6B9vRGIbC&qZb2>0&bpe_Re%Z=DM zv?a0Z9ZDk)Hes19d6x^+%u=5JPN$V{FJcO;d&S$^y}Q1Cn3dAXGLTEgp`xmmOB5qC zmK?SlJDA$nA+4H9Qf1Wj94fcWg&|F&3{(jlhzxTlDCJ1=4Mcvpp{wWXN=j8bPE&#Z zlxoxQhkyK(p)w8~fgc0U#wKcDCU!JZ*v0g%S$(S!EuVoLUho$+ak;E;opX?e$y*FG z`{{rOOBWfUb-qR^?syO8eFqMCC~y5_Bu*>0<<-}%fH&4KLFwNlF71J)0HQL0NKJt?hx0HFnL$mIdF7vSq)+4ma;bUG+A|$K+O5M1ikfY! zc>+c{PvEF^){O9+9IJnsUKP!=GbKAjvr}dT?PyFY5}V$ITE}m{UA9`apiZ~g;ch8+ zx6?!^CEEOnF37BMl>q?$C)EaO-v8v`B+doo*&oKo_ zB$>!8#5@*fwb0-orja^fUhR|lO=20|Uea(y*OXu_ho{Np(CTm97Af7+6ttZNA8cZu&*;Hu1Qz##sp8kK16WkyNZ!s3kqkc1~)g&VSxLIR6htg+x)m zmxxf&BU}8#b{C~o%i?eInj#aisjp}pyi24kYiSF^X3q5z6Q#<=HON#SoY&bRY{tXY zNZ*_(g!i4fFjsr3VJB|%>(y8l5QC{R;+N8yxydpWM(T7UpaTa2K%}smH^{YDIu}Ok ziI!WWgNwJ~SANu*k6WHHoOsg8qYUNkqK^GxMCbFbGjc4NqO0`SWe%(Ea2xEDM7E|n zdZixn7PQV7bW+zb3Y7M^o}tEdS^YIu2sK0vyO`>#j_GT^h8P%;rU}+DY1Q zYu{f3IN+-8feTS9`|vDy&C@rKFx57td-;?;cGILuvA+_e&?HN>y@=Q(wV2 zx&l0E@p(*{Tv{Tj=wX|f6U=|4V9wT<2r%_=00IC20K#7XNooLq4D>&>{}g~UVMt;B zsr^rZWFC7^-5`T05KAMc6)y-6 zfc`g*nhKbp!8W3U1JOk4fdDkI|AoT?*#ro%fdDNkL}YXtL;xK<{67tdVX=g8ut1Q= z`e;xrY|D7SNJJQnX@%H?2V4b29peEyVZT!;6~GFD^;QbU^KwEuNK_*zpyfaXutb93 zF?RuQT6E~3FaSU+jF*9e1fB&BZZOOi9tHpaDl~(zoRS9s2jBvrmnJcV!K$zX6oF+n zw1bgRJV-R@0BIxGD#%c&Yz^0q{0}bX+Z<7XTR^ zKn6wnPeakkU>E=Z>j)o@t`krA&oulif$)H+W2jF5;A}eaaQ}t@7)CTo|El~Kj`{Bf zxPK-V5tZj({bS)U|25D5G{OOtWZ6fr%hME^H%cJpaMr z9~siT-pnAt!N#)i9~1yUM?^$bQVJspgMFpdf5r&_(4Ya}pa4!18X9!g|JD6pMb!Tq zxb**z0{|@lK+yk-<01~D6oCFO4u|*Ozx$ss1yGygTj-y*Q9PI+{{?)UZx559f9tv& z(@2-j3MclW;1T*IUk!0A4D6RVySG`^tjx)hkBDCbAB@*K21lxg;6Em-3z$uEGS<&oLXh0)>v>Z<${tj2ei75Y`5^bw422ZoC z0Ymd^yICehaSb#*QDFZ!9VBk!4<8kba3F!FRTYku8?OzdkR+2y$5d*}x?lpAP_h;t z;i-ITe2hPhq8c^iE~?gYmz<&Aozxt<>Wr{+q!ouRluXVo zl}u_*K+MlbWywPJt%xt8;09U~d)nX};@lz^<54A;-f#5T10&35dvi!2pO#+xp@C5T z!nVD4`N^~JEy+pMWj~A2>D~syYB`;;@*FD;E~t!U{X)h7871Slrap^&A)mYSs#i#K z?!m%42f~E774Nm?Ms#Z+a3xAKksHe$%^x1m-dDw=;TbxS=DAC+IR->$1Bz_- zBbnxcHMtr0Z6qX4=+CKIe@UZ4G3T0}>S78W*bwon5tcuxXut)G?DZoiVnQ^2G{7Iu zr}OxZjHz7*G2s*~fM{)gSc?|T=Jtj0NO=){G1DQ(dmHS2IVqFqaHaD$@XVN@oRmHS znQ7Gotw5WB8RaLA33B$n*SIyu-G?Zy$1lYn34_VcaJZ%S+kqGxS%|7Kx57{cUTt$C z9%7|T3gR!U{CMyf=|BpTyRofJ*<81uB7Xs%$^!KYa#2y=g+?_{p?nd&e)o(N(qZL* zYNMXPD-N-zC33Vq>EDk?{6r!Pu>Ldi!C&`obR5$3;<}9Sxi+;(&2Yd}WK=f4@Og=5 zak_y1xT*%SLdnS~BnN-!E8{lUmzon(qa?<&>g3_l{Mx7AJ002GIZ5)pG%dGfz?eK##txg91 zGzii?fofXoKQj(f*bsmV-Fxk59fTpyz{4ld;Jj&9T10kQ}bg}|vi4o4PxQz#-D_PMX;M3dp@s>ybUd`I)_*{v%sNweS?(48MBhM2_%*36Ff3 ziZAa>dEfIKEm(^XeGpiX4AW%l#k=m@!U{Br4Rk*o2xCbGMwHx=pQ0!*au-osWL1j| z2WOlqAv3i|Fq3Dn8&@kJmEn#$FVs=a2hNqR>Wghz8vS`fOw-tN@4mVIuxJWSy5PchslOnqM~?q*1V*h0Z=K*LLy=X_VopTB@W~RAiXHf42FE z`Ss1#<+)yUm7(p?Ux1X4vFe)VR=L~a=Q!WxL{mYgpr!jA4biXX;Pm+iDLXLX$o?lmXAR`3oX%bR4ZzBRLZVAktN;M3%Ez zs}T;icwBpzcaT-S`;P9ORx)EmeD@W06;R7U2;kqFTquCk#n$w|r|&B7*WNUD*7j5)QAeT(6W% z%SKw_3$OcO`r@tBB7R?ljvSZ+RzmBEp{o(_yH}{>?CRL2c{b zqvblQR?zEa^}Cv(aJN_>-RjJD^%XB3->1y6BrTwSo+u(w5^Gkqb_hD83-8k)JTEIV z@6o_xoFJAw@hwOi%Bj@;v8-D_g2V~Y5UuD#2~jZ_mP) zW5lizQ=dwU>P8rxik}WqW7h8eR*ep%)xo3PcFRyp!YfC}KtFFj@MDdFFDH}8P{h$D zPiI77N@4m@6J2f@XLJ^0V?G?2SfhjC+WCp;aSE?(T0c>UOL=wfx)fIu+af^VEbc>{ z57YRW>;Gfx&EKK^|<|_}tQg%hMXD4RtTlOu)*vcA8r6ObB zmn2CNA$#`hy^rgBzn^oy=eo`xFh9JW*K1za^KoBpkI2VdhKI&S-{BUo7=r_F2e1j)AJm5E8 zjH)=ic_6d!A*_QHm+iRH{gm1twCAdfoR`)Z^%-kUv5nbHR~9-k3NItQvPtbSF@GdF z>C-gw0feZ*bKmFhefekPfn;*d-(;!X&UX3L#dhK?JK@)-pu+LrqNNlK=Y z_1Nurd5t1(jSn2!hg=(!#MAO^GzxnUmxN_mEVa#)dsscv0n2l#ne3U>7>DaDFTP1g z|MSv?RQ~W+<~pKIw0YOIlKyUOwF-Yw2G3{0jL>^hk*il?(#yz=aT&Yc10`Q4_?84F zU!;ubznxXO$!jl(#=dK4_;#*7tj=LW{q%ZVnBN1WW5mqX!PtoPU%$=2!tLc5&UY>~ zG!5N9e0TAKyLt=NTd7tDXSwtO?YR%>TgCaC!h;qE@g4-U7k|i$*2d6sv{4*h2KT+wR%Gj!HtPK{d_?(ur70PR4cGWWFk8@jPW z*OM&!9mtHEm;yi#1GD@z*46qXdBb0-A`O{qpYi(;Wr{RuAbl7qa&<^bDwbR&dnv3w zl3q1nSYfe;T&{b!cUD`~l%87>u^cgoY4ZQ15OlzqpBz8ueBnYZ9=_I{09&V%Zr@SP zNNkS_Z4o++{%+7lll(Xd2Pe`x-mQFM6a6xPNuhNSbep-{;Zs;nXbdXP2c7C`V5p(s z(sue9B<1l}-eE`nshq@5-pR0VM@*QA*1PH4ND1G-%ST(963#L2*j~YuZHehd&Y`rX zU>ywKXR6<<`5-oe8ELp0(trx<;1O$oq4kC~x@sV!dkQ$>JB`q`r9J#Q81Y(eC+OT$QtYx-|JGcVZ_W(;m1S93)h{; z@5&@N2yDe-fIQ@(1<)Nqpv@7xUR3i?{0J z%T!{-R-F}PCH!~fV|Ugt-fCoky4RGRe&q9z2Yh2B_K2 z&VQS)wbh|YHrxLJqiHwTT7k5cvu+JN1AVTxyMHU|wBJ1rSw6!vMt2Jp3OYK-`q)~VYu>6d z(|YsF`B&ha-=%e>CT6B0&=hLX$egb-J!sueDgMSd%hujFU@XOi!$U>)!L5`b;Mlk)^lg zuT&evX8ZS5dRF;v6G=B*40P)FupPf%s1;50e&ZII&5pT~tjQa;%G-OYEpk*ku<*5+ z;al72X*Yq$SH9^`*b~jW;PyJQteXzWK=jhBz9+|={C$pBP}%li>TkUl znL+oulCx>ytRi{t(p35Foj}x|_f2J%<7pmYG4spYlb7oAGty=vPt21V#xq8oit=qO z+i;MKtu&tKg9^URj$ynSWS7rSVpCi{h+y`3s4c9LZ+LdO_ITWz#QX7;i44m}+k%I~ z`nkckTPANQ{rr^~{ab1;Jj8N}?*%L3iPxPYITnU`W?JV2VjlM&bI$f5?!HR)E+zqf z@1Qr!hQm3F5s$zbcduXF)($!M+pW_a-FmHZxn=pqnfYlyUn%I%)WPO*i z#k6N2o#mBcj*ab%NT|)O2r~G*c5HrW3LPL?_z|kHj`+~oR;YI;C;UHPSc^LcKSg@SIsxvTLr-fh7OU8~1aDm>x)P<#Hw zf5?`pXKjUqQH7}@WkmE!e&gY-N)@Ht*tn}p#_2pgw= zP}?XVSoV}$N|W%_W0vc50vBcR<&-#17SE|`mH10;6>=*7J|glM$oywYlXAi<`{rtu zz=KNnf}-C~u1E>8_+hU+;49gi?g+@o%mOzDgA-3~zTVxj=5BSf zyRE7DXP*l8xVi&*wds7plFeLtFMeUgoR}-!#)_N%vt-|3^=)goWm}B7Sk|Y@x0F#u zY=bftFt@cPH(_6~!yDej>HQz@Sov5U1zq~GzL^LeyrEIgbN{;J8bfLarvFv=9qDC4 z!s{(rM6p`|O@N@yoqhG!64wl$_8rv7)4dP=)x=)2xu=CrzbnA$+H**DEU65AvdX8S z?MR;4I@C?*&zP{z{>!7b25tUhs}nXy?$YD83|}4i0#9%x`kP&DYhnAO&f_8G?4^^l zPY(*;nJk9nse1QY(aALz@k*-P(Fuh8l{s%k@O1^w*>Clf6A2H+oc)onh40b6zS!jj zEwzm~?N;Ia*o3wag0iz06p~$HYP3S)#_9HvH4@KVe^C4>uVXXYca9)6&U&8WLfH4173~O4P1wY}?@Zrk-^0={ zMXEJUk`r4bO@AvT?6T~aH#`a#vzbZXAGT^T3H;sha$8&sL@Q@kkLJI&TbrG%rs~h> zaYSERdYJI~Is3S}0!uFGR*-P+MxK&w@3+-s%2n=-f!(!iGF(@cr*-pKsDCgqkjM z+`WDG+cWxN>m-~z!%^f^6*K;{%iEkd6s4zN_D#mkBm@?zcumx`FzQ$Qb-@C&7hw|0 zH?NxoRQWI`^8ga+9WuhDoH^yK!}>yr3HgU&8q;nB1yw=UAXMQ|d^bp+>7VnosyF>$ z^uD|s;{Lyk#Bf)3=V zXhTXc0JW5$bY$X*GNN9Tg^v6urD@xJI)WF zM;v&;pfu`CeZy9?$p{67=iwiIdj2r`x;AwEoxp`rzIj`fG~lAsBPB$rEQ||AX++E0 zRM!*=YG^pDlLID+}U0kx>B4;ljAqWB`Na6+i# zu)ock$fkdUw(MdYnBKX=eR}}cGGh~$3}v1NGV(u;n*GuEAa^Nk46h-A9e|dEMf-K#*UHjyMx$X!VuO8Yg6^qeBhhobgu0*E zg$pmOb+zDthlZ#u$2)Q3^H(lXt${%%hJXO#wAH}89AS=gf}&xmZF|XxD{4$gg?Lcg zKH=2y9l!7WPg0F2Fs!;%;qeY&Ztym#J|}G!U|| zD=QV-HfRGq{i_shYFyQV(F?=a-k#$QvY)YWBBG|BIt&9UwjfOz^B61IMDeI!Y&r2a z`bfvm->9H-Tq9GM84A1F5%=Tt9^Z8LR)qqq0Jw|pFWtvyd>EaZ#5_I^WwsYMH5Fum zsZ?d3#V+3m8sKoJcb;vZhE`c>{#WbJ6G1bJ&l(|%oyc21R-guc!l2=K9=`msI^fV4 z2f~X%2IiU&=gMgMRzVUTMZI=!j^AR)Jf2PiZFp*rp38^X8q)VCPP-P#^$R$*N*5h@ z_W+rzdxiGZg9sa-3h5 z#Op|X!=K|6J$bOI`=?<$i1Ao*{FL2lOtdhYrR#l=hH`_=G4 zywWA)09J5kB0l;&vna8YXUcB#c&Fy30``3h#YMI&JHL7 zpt(*aNc$P@;j5fKO2O)fThyEJbiK`|5vd=&G++Mq592xeRi5C}5z3rCuDB-Hz!yR# z4ozRGh_uOPwZHV)_`(n>jTgytKoP-wz=$S-CEM*3~-IW9cl4YRh%e=fuZ%J z3?a!+XcKMUPQeaDRM)p-JRPrZ;_0$wM|veFDcOiV1zA$6XKR zR@{q~C0^}3;|dvj)S0*~67XFWdBU0R4GZy$9lgOFV-fb_rBs2U6po?ip7$RyklrhI z96=fTW7b4zgik&=XeWq42JKD=0D%x!63~V8hNfG@kM-Lwej)UTKDAaJG zZMG=9_o@FoXYt>#Ecdwcb$Yl`mczk6~e#3+E%VvJoLN!at}3B{o) zGF*}sJl&wd??Rub-uPo#q#6t(y#mU$q>?kmp<! zTV4B3OE5$-fwbt}Y_14O$|yMy;@sYbmgMleVH1t@PUyhOa*T_FReoHp)WtWQY@n>$ zq9YWa#A_fs*q(or zHb>+#=qp`PL(g0d;{DGND^Wf>ET138be=YP!XKLcTlKMwYP7t@XHFQfN}vPN1|Swx z&Kk8~0v80^QTBOxb}vn}m1!E{Wi_AY%HI4^f+!tYFEJH;i#wcpk2fWwS5?M_#l0n+A8~6&5;S2OdYR~Uz%Ge z=*=Q5_07j6IuP}|`I%3iNOnDnx`!s4;ba8Y`v)z0>FU^UuOgmj)R=h8tN7i|8Z$NC z^qMLmu}5LifVRf03X19|D2ROB=x{M@(Ov-=ma%GI{0*4Wq0RmTVChx@71gj&Jcuoe zMru}`@&{%Rn*trKW?};IT-V0Ru&?Mbipsq97Gp(Sf*vj66jBA3pr&SYN#p|xfN?wD zj|iR-qEGt=jAnnk1W~)Yn&_=l157ib(i}_L?^siG8=R3@y6gUg23AT`Lt=piZdUYD z6AszmnAJzX46dvnp7a$9o^G5kpT)|l-=hhavZih*!m^IlKa;scudlUlw6HJUs9TBT z`6#V(x9p3*`9>$ec?k(XZNMaRZZc*}xG?S$i#H?eR=3q5VwvYB=WrR!N0z6pI`YYc zme#XV0U&{#dQXwqfVd2P$YSdWR4ShWXM@Rj)?_ff9}%8lkCwC=f$xTW^hxGF6F(cA zRVMEAc?njR`Hq(nPiV-rd`a6V^fcnSvxtT_@N zgB>Bir!l|)L=ygHkwzl6Mo;F#;mTa2N$TlCz4}^;mW1~S{ZcRyEPH#aTo;t#m_PMH z{uNq_9%QOqK&BHdq{Nx2^09L-uX)ml^4^e_s;ucohu{n3v>jBWtioOmOBcbRjobZH z&DB_kuy-n?RQ$(*Bk3t-Nqz51SYZ`!F7Gy5W3cnb3j@GW3hBD>ajJ(@wXA1#x)7zW zb>xNB5Ix)x_SVvkOI}A@*v30WwP1K}G6s;}wD}zgy|!0q1e*g$nIHnmbTwRiez>~} zbLkHx3+-9@QqhYjR0Z0c;9lkcLa$iex zX?;CB9+wo{bcBPQx!?e8%hWt~C0%oQygiF*orgj|E^V444GsbNWzRXA7Vc|osJ4T@ zLHh)^{ba;2Q)w*Xr1&&DGxOG&9sL_?td?GCph~j9k0s-9T{LVQiZ!_FYP}_2#uZ86 zd)C7tWaUQCQI_VaF2&XpSDA)?4tBGMh}_7}oldVQ{6bFH|Ez zm=U*?*^>Cpseh`%#Bzi-TI1COG4%X+HO=s99rf74`^wS#={?VMK#81$v}d>?bTR-n zLxQxJp?@Eyq=88>{*^>cmZ`(@xS|yyUlH~NsBscIx9o_rAQ?Sxd);`6DNcd{0TIlR z3$`MMdN^pLSPhx>D=SS%MT#xs6}e@ksfi$;t_R3M>jhdSEp<^zbP4@^Z-mQnC_}{7 z&gp8>=tXn>nymX$)Io69{j%%DE-uR|wV;OG5AD!)qZ=IsY9~ASnO!AIk!l>yWBNda z>Bq#EbnKX(X=_>vHaSH*QIYD49&;%vCKsB8a}{n+(2K%#5TUqEt&%@}3^ICGg|kMZ zocBNa&Xo-txNhJ6(4~z>vSq%g0t0B*3|DI{?>GCY_(&yLZ{3;{`<}vkJ;^U0{}N+R zcc9wXd^nn6A8h(h>uiWA`rkbbILxB3d1P>syVZ7RbY5?wxa~R7Qjx{SI926kF+hX- z517ekHyJV6aAG5oZ}@@%Stkr&z+TX;{OonMYaajXCHV9E!qxwvZM(6ZJOz4TQ7fq7 zzAH0!Gtdx3%P;3o>?#uXovvU}V0ZAF_O5jNkSpPLCq9idkbOd8n**~~aj--p;}g}t zBbYp|To=SVum*VpuNWjTDwr{t8Ae6-!-c)e<@`hy!ce&hn`)*HLt$ox6JCXbgylD49r5b8KLpYrs>+Ks)GOh{$66&t;$OgThL z%ZW)pR5a(p_PNBf65$e*_`KSu;ACI+yP5-=Nx#7X7YW_$Ji;EEB~%s1iE9!eR!UXQ zV4$tdrXK`bhzjx@CDW;OKMEr$dr-Q$T2iQG6f@vRhEE2f3o;K)T?)M}FuftE zUnoeO(O*_oLkq{IG>I9dT~JOnnsj&>Tx$Elp!n+(cxqI89sU>SmW21q9!C~DMi)OO z2T!JRXrEzNlr}lLkcEnTj?=E(P=l};qwBAHWctint_Jfw%d{F(%x=_lKoaD7%eX2h zdvXqDkyI?`kfy3M*d;#9JKDF{R*p3>t;-x*LTf<1xXDJsP1U+5-(b;VFQS+~S=;A-4fPUn2H~|t0jgKN^tYfK!;9||E>VLi zCJZ0myCV=9^=5BT`F~_fT@0WCH3ZPh23jb^iN>9zQCr3Hqy=V)pt*_1eSSjn&a5uKB;;ms7VektP@j5`(ljQ8b=Q;x`hd_wKlaE?OzxW*#SKUl}@{T zT=#|{O~Bem2-e79GVu)!Bo}1Gbjh{i8(o(@b8Mx&`IrY_foqOr9-zuT)fW^m8IT162-& zG6Gg*=LIjp9OyNn3NC_7YNRN+-j&9o)^m<4avdhrO7A8AoK=I0)#)`k+u*$jm|$dh z(-m~<-X(yQ4kxVwd+OCtid<8y4o!N!JIAj1B_|WU(qHrrw7O5N*-13c`F0iD)DiNC zM%D!DG535qc^xzD4u}F-fEXJVOyOkZ{6PJ*>awm*vCpJ_44L~*Q7%tSRENPZ{~Na2 z1K&m3!^BCVc^2CTx}61nKEznyF&o*0g2+Sy5=6l?NIOy11~Ze^!nJ#!4+9W0Vz*Vi zBYlc8sBj}h)i-x(tF^ucLe&UTccwCqCsjaI#>0x*^Z*8Ns{+YU_EF5X>{W?G*+tBL zs$xNq9wFfe;+z6)I~ls(GRBrvjLoAlXQ=Ei|E_FmBz&Wqw*m z_R&Im!YBccb^y9OVgQ}@`m7?cU-X5L9y$e1CJ6kSQ2lIQ>SF8TK#U>~&K!{Xo?j$) z&tWAo{{bewr>1<+bRqND@tZQPb2LfsEf$K1W4hLn*L3yFqxtYX8n7rjYfLwG?%N#J zS3W?Dn_H@#2*wRmg9ix+F&0M3wvGYe4g96VB?gA4Jk__ls0u=;L+Ji2$%B^p$5dx{ zn|gb|e7ZfPS><3jUjqvcfY18ov8D1k$HjciLvq7AlH{SCC3oPFk^|-HN;+6oTJs>` zKW2A=^ifO>f!X2GV74Iv2jfvH@>JFW6(wI&|8(UDVRxM?Qfnkc@^vvAs%RQdYIIaW_Y=X|V`l&z8$f`z2;MApd9tB^65f!whz1~!|=xR+UrP#R&{Y(b26 zk`aqZr84lAGStbE{X`DTjyJ;lad10*0Dn*?owCnEUFswr)i5J{wvHa3gL?U&^c#eR zP(#u222^zC+|^&KtE+2bErx?YJSIKbPC4#U@#Lbm^M~V*3qXNG9kVDkrkem*iZ3}s zX5H7pWMK;SSAdL>V}Y_9Lu^~tM{uju6UHaA3GV}FRkoB?#MsyYAbO9>4-lPZTm)em zNF*`fX>!m_q{b=MS8pI0^dGYjxI*=(y^-Zr^ zmOrf~ivhqNJ-PMtDGT+z-~ zdRbx0W#@Yt7lGsp?3g_j6L!pcWex{5z!!tA$>5~QVHo;YfuyKkdWMi@AY$i3W}=ge zan17?J4Hp>Ic6Bg%InVDp=7JMFy)7f!TltLu_N#LI>*@eN?x}PDN=l=0|3*TwK0}& zsFiC~aHePWSToqY7|I-HCG$^AUonn@j`&FCS|nE#XgF!qXhltSj9*}kK01|&1#520 zI+9Bru{(c@b3s8WH$QR>cr+S3x}bQ?$Mkw7k}2$(R0h!&qWkv}E;NRGRRagsm6+pn zl4Zsqqk*N{=6?!bc=`TRb);UTewYuAuebaZIy~T#COkY}34t@B-F(*t#%7~DN?G+T z%qT$F@V;SP&El@+qRpIKtaS%B-o-!Y${e_W@6qTR6_QzbfD_S!tc7;FWRAGdEdOQe z>OUFxEsz37b6G)RUCpN_n#!cHbYx{Ov$|cSd+w5PCg%%4=_}RLC8-5Pr_&)07FsB? z$|Q}BV!ZErZ*x&45*d;Xgk!y>WES(jM22%rnDR5{E5DxczD}3&%W_cFSU75Ics^$2 zp8m%EnNn5los)WA1)q4@^vKTk`1Q%rRH$zpA!*HK{#WD)Q$*n664KFi?IBskeL2lL zPWXI9UEIMk;)eYi8X-1!E&-2O(l?!e$7mQQy-`5*6l9I^TQ^_iF|E53If>U6qD&Ow z8gO2V=gSf-TYt(=O*9LrD6*9p9W(tQY=eQgZAEohb(`Y)PIPbX6z%T;nLbN|qZ-w} zen@>61x1(1oQwj;b~AX^>#wF4i`@q@aVZgCwqwuaf)YVubrpoVk z7miy?Lr`J!?(2dKDsw4v-$rOxdS&k~g=*d~E!>eI8K)Cis{__xa#K5Gzq{f-$HJlZ z{9Y8myZ#NNZ8H_}ftu#`FxpM~`#_j+BZAQ|cz4cyc;88MMk<{%=F)8pLBqZZ*uCfM7``9kN%lR*7tO{q; z01K4ShIHus9(}_Jr*j(-ty38FDT)XcMLNp95c{(O-QqDk9K-l5euTm&7-JP z8(X!Ef9BCq;0@A236CtkCwc4c8mlE-Os3jz)k>M+-jZLefhXWfc+B#1r94zsI;K0t zsPT@b#hv$8RP*>#hZkMmb5XR55@ z9_qX!Z1L64&0p^=vIimWPGm%5#`)Q_kKcUH^s5JnftYdZxb5u5N4M!|nD{?yGR<&? zGO0OI6o=AK*5XkYr4rY*-}LkVQ$GALL=Y!Satp?#vNd1TxYm2N@RRu|8^^7+fl%Y! zte%qzK6(O( zE&It1FMAtA@yRh)12k&TJT^}QX>+CNQ2B#fuS5oT60w7C-0ogZBB zJNU1Zp1Te(T@Ucu_f#Y5sZ>{2ip4prd2=CdwBJK``opD=330R9#(;iatzfA>K{u`E z-Nm90z;r_?!T$%Mq{o8p6xP6%C~Q}!33(fRUb-p>H~R?Toskq;=FHoCCIg^qgiT8B ztFLg|^Wim1!F=U2N-C_Rd=s z=IKpmgEKSUrG1&zgS>H1xO8kBdw9;Tv@2gk9Qf)qPyYY{P_Yyus-CS28WrX3V2yMH z=5%m;gNW(X&WLaK3=NDVUh8?=@8yvB?uJCa_R$%G{fPyKB^1{1jgaPUb5v3UR))!v#>$@~Bjr^@EqX>##d zUuwFkDg0g8O&^@`(5$5QTRzBToG(GnZ767nGSfb3`eoc~Rkmn^WF&%F zt`Gb@r#F8YaJU`vju9!u;4+puI7%jkC9LlCJkUr*ufc^)qpl-GXtsKyr!+ZDSzXzu z&?FoX5oSw+>;D>rQG`sWYa)}Kdw#8Y>^`^q=Ej^~CG??=b}C*bJ%xP^)Pe`?o5zi@ zE~pH$nUhiAcUqf+EnoDcnuXq7dRQwUq#O2(Bg>!$%t@P-%jM?cJFU7GSGv0hn~qqn z$){3c{SSCvSm4~pnc30%>Q#v=;D2B`U1#xoAq}ZMZ{SyK(R1J4mVblkUmPULwKGL3 zXrWd{$o5e1+N4@4+g(x2mgoV7E)xo@m>_`-{K948g${t+K+L852iP9#EW7Z;C5wRN zuRYr?k74eJ&SrQ(OYLOcZ}0uE6crR2pggG-G@SRXsfe2wi?AQ&dYBH6)uadC4plx3 z+$?M`%C?jI))t%%fCH)i140*v^&c^)Opi?117PG$KIrpIpxYfmt$@*s&$Nk%BnU17 zx<1cu;mPvW{J`V&_2d~X+Qgv`(Xf6-?44ZvcL)>s-+RBS{$MIb9VS!8G^5HGH5;1% zs-}u?I+-C_kK>(VMjza|`29PLFI6~_7YTXvU}Q=(Jfb^ZXOu&*c<$v|YVE%pKeinO zc>KA2$#(Tw@{{c6S1}f3S>zdtMhka?CWN{YX7ZYk0zIhz6?y5!) z%=PaJ;E5cspEdn*yK4m9+@rUfq{3|tE`@q$F3aKDj(-%L^iqtjcAl2r99LkFGAnCe zuUVZ3^5i>L3@O@GuU;+P#Uz1API5K=Lz7)X5?Hp6tfBM?6xTdM7t}wtYWzy7Q|?YN z6Z_whSCkc+2ysea?tN9f>DBibz$%BT4uAh=3Cn(eOCOY6V#S)xyFEwRh@|@u$jjie z>Hy{Tqcx}q!RDH5S{kcD6w3?7kU0SiC~yt5Na1kkwx0&$CxySOqb2gLrCmG1MG3D! zhx`Qmg(09w%v_`mPrm+MB8^jh&&R3yoWP`(cXwd_0oNyeVs>2K`I2j; z3M(f*G0!b4F`H-`i9r51h5WFk8xkED=XEK-OlWeMk{FDp#Pyj>}>YfqqviJi@_J<;%v{eAW@;Wb8KDDo-x z!$msRDKE4yat=`U^wPWCJCb`4MT3%f`s4m8DD>U$KKAY4qfP=!5#eyw=Kfl$>bXHm zljcZpk1R$K6pN-(j_#T8MOy+}FRk^c9c}(R4pcT$7ocYaS@6FD^r9~oH|o8d{tsXn zh-R+%7VhbwhcN?{QpSx|Q{MM50I3}%#CWvGx%LP`PXsTY@patkX8bGSmqGJQo}Ja> zfjJv!eN5dV%`4=65xejBDV4rb-ALTwW~fELeC>Ch$G@5Zgx51njrmsRLh=W*>4&Qk zUcH5)zpl^+pQc#xdkeP+!{B4hYYNjJx>md+wo1|=#I}{4$Yy?`4#a2mjTB@2Vmw^$ z5!p-Yag+m*1A^ty+KEz~hbwBtQ)l7mC0??nwhu59I&~JQD^=c~LcUlnJ!~Uho`TGO z+B_?M1IARlhDXr>+9;I9OHmf8-dRz`SAXXPV3xf26p(~UocX#3mxvUIUQ&FZ(010t z`w6TSfF{|)GrhMjLx)$oFYuoiAiVl(-wR~|$>2;#x9{Eg(q@s=go0A0agL-A(mE-l z64ueDR`^bkPwyMgEjxxua|naEgJV-FR!N+-PaSYskhk|1_`$dH$Xl{1U9FoJp=w2c zK=rq5Go8S4NMYkiY8p&)idVC#FKT?wH5JVMuowsWs83&&dW8rC2_EVnwdahlY@=B< z!t0gj0Dg__RNZhj?|zQb)K^dE07S+?7+W7me|m59BSWQW*&}}WG%>R$av(n_Yob7y zV>TG4?(Jf4bEELL&?^y+4@K4o!!+YHajG<>l$#T)e@#*iiJU>C1hnXOmj;f_08Paw ziKD|aA<<*=Oo8hz!xyPa-wr`jLWQAOY>c5RSe#Je)@VSoxNrvIqhwL!C|8b1#IR`! zY6yhX3ha+-XY%iGjlFRp_@RK^1d3en%_mv+f7A_J5ISGY1EZwPQ_O;sMQ}TRrr^3b!oSug8u8fU~C|0ky(n~nm;+Z9KZJ<;e zhfDiMGvNT76(=7Nm8BJd5`mU@pgL9xPmWDX@E6Vy_ORfogFY3`7RFI9fH&+}b~gHQ zG7!1;X06zL&#LF-1hq()wb66e-qCq_0m7*J?fBPx$9Abs( zyG|>(0t$xlH?Eap3Y>AGm|&*Mew=65Qs)Fl7&6%bz7wSHFw*zkrR_-ATSa63w46Uw z+23n}z;)geWl^#PK2boY$gWdBgA>u7O{`o{<4Qg{ZfM=GMQ`7W6lu zj+}XY&R!J*iKm!zzk{y(9wYQ(f@(M9AfT@cH%{R0^MvotVjO_j0-4390~&0fjMH}c zX!txAzwP+K)bA`-Wn$%C(9th79dQQoqlptSABmT9KTC%=h+lw`9qxV8akdPML5&9I zb*d4rM~2d9;q-N;s4HcZsR{6kk`;zyIG>x~U8|YEWgpXYGlQg^2$);M=`j0FN9)`J zYj#ZQ*iUrlaZnAQ;f9Q%8Qst8L;^)7Xx_5j4N}s)Q6LKCuyuuS&=}gGzfSIsOlem+_=`JbrF%coqxDsW&`Iz6@ea#c;|8%4Z<0 zW!2bNLM`sFGfcRlZS*kd-1BLcRR9W+)}Y8MU%mn`C4VCxvOSM@kb}JsZ?w8^()1Ny z_gI<>%vfv{c0aA@9aTFaygVtLjs94E8}^-22)p`ykp>zExUBQY=8p9Q65nA?QqYFYbJWDc!lhwmBjd(oh`f{)%~erzI!FGcQbdTS%8NXW0G)g+F!q(=b`<$ zLQ*K)SGp`SV(R>Oc(eGex+j}=@A?SM!rs1m?q}a_u*Ia95h`n34yqHw^Rg1{eS?%7 z*)DedpCZLFlLSwdD*SrmiG$c%ue$EI`a%Mw34cVFTFzT|Ex|YclB8)d z#R@7?y`{?s2zURb9%~`a`bYk5jW{0GxV?g6p`>L;A=2+0(ghLYew#}F+E-EBLPN89pO5pZc|s zy?1#fLh{*C3VYYzlS?C;ADch&%tQJ<be4$BKXjyvc3Dgv5%{JU74C4{SqNEJOC58LQtgzm-^|-y=Ui+C3{=tOg?#IDIN-9}I-?}=$9ms9JF1i0dXQAvu zLxom97XEis_#k%hk9r^#>?w$_fvSh_^uW=!9{dbl z;tPSaJ46+0KPF}pXzlZxuLmxYsbyz-&3#C$1}Zb^kqeq=S#}m_FEgf1M+O>Rx>In| z&L3n*6}nA�rLq;cE%8ZFLLi{SsXY{hhH6Tai-9xnN;VK*0X~TS#DOJgSF86G*fUdE%(lcq{m=xv`O}}atg`H zICR=&gACg48xgfYB%bjrC2?EXvA)M6@gd7T{c>uc7)4@Ut_N3nzinXlRKo~u0q%%@ z--m%MbsA zjAmB(A^BY7;bobjw=gQ6$6`ZAE^=9NpGWxVfK-7_$aq-@KcbAZTsR&NHi?#!&%BH_ z8VFW1WTjX~?IcXVN_Z_oj(P}R8D&!h@FuUnKP0#wc&TZe07z#f#c%6}k2h54jyAfL zdDjUEvFYfiVw=o;NFqHUi%WEfyVLD-_uWMMTY)T34Op-g6gjj}vg<>ELftB)hv?w-oG~FcvH^cdu?$%Hj)4v`zbOe$Rew6GGw}LFBvE_Dj zX8taPDTgwyJT#-?yz81h|52#X8yqRvSht#_FI*K?_dQWW-{VB;H$RS|L+m)3j_)zN zQ%W~VtPVRBpndM%2a`dO|(60&aeX@AEkalXzJ1aLN@;UHkOw;Y(BZ`t+yJ=l#y>AOuz<$(W9~V~G1PWM zB9RZp=E2%aou~^@ktl;eSKGcPZbijR!T0LrR2qIyG_pOo0tawag!8{X{qcB)`WrQ5 zcsT`+;+)+8u6Ro{P8m^;rpY!C!7Uo~QJuSh>TAekY7aa4a?65a%MwAMBf6F+qMVfu z#lYR1lYoyO^Mqrra4;Jq!I8P#m``PC+EO#?t1v%K%i8;xE>1&PYX?RVEwu1`XcGZO z>c9y1@#kW4pFHfNv{4rJWFy3*b@)+q!l`{{jyfpM(h65{cfJge;f-8@RWXV_Oi%h8 zR`@uct}zyS8GkcRs#jK=D1+$uklMlz-=^r~l*DpX}4N6b8< zxtBzyR?rSx=?S=(>XJ!okjgJ3KXElMwgKq4+HRH5?r%^a@*i97uQ%sCd@hx3=baJT5-;@rx?`$Y9sWtD#pM@=j5@Pd z{qYT3=K2}UOxnx8llk`a=QCOulM(Jq8({2%DZSdyFI@({c$-yWP^Az4Y7(rFTZ?xa zxqFkM>;pD!iUwtal4mNOV#sy0dH|o#ePSwRn?_Iw%(eDRYnKfRyZ>vd!kwd~{Rn~&E+>RUcBl$yqav;bJXb%&!w z>;Dz^0|@+(i{Oj34kTa_NQjP+H6NzL1$lsw3Cgr)Y>Z5KZAR0kFscpbbtYGD_@f>WWH|RKS}+BJ_em01-4V=`pl2{nm{wLNrqa ztOc1AF@OV3tU5b`K5_``VhJ$#VHh;+C>0P zC_CZ)%K|`x#A{2F5UxW-F(A3(&qEA@MnC`>k58&qd6&+6E&!^pb+4SF96V`$Ksx|x zL;ZPA!TNvmi7p^d%lpM3L^8Bt>u2_Ekq=W{DM>3vOcY=adTpwz^JRHnF_0vXk2f{w z!ySOzZG~Q4)%M4@F^8Q$oU@QZp>ff>dj9}mF0rchQi2_T)z%nKVEg^4@Zh)x>Nt~H z!MZib)GmsOe76pgA`AUhU?Uv}KI6X_;DA0J+8A0&3z(pTj?|5$OdAv?{{SE>dq?if z;esque3V@|TI9(Q5#??GRxmMA5DG(x2e_@-Ab+n|WdhoS2-OL6j!DKj=M@T7qgsTS z@4!UxpZ3Sb8VJ7yX-2B1keR}v0P@dGK!jQ;{ZJzg09g?Xr2*G8un#Dyfp<=BhG+#4 z=WojLuK94214%DCmC_}RWJ*9=5Q{-mK<;;j;F+cD90+)HcmB(BfG<~x6??Wxb^#hX zE`_jG3J}F2h=Wgm59bFuXhlIK3`T--;gLzB1Q}_*tz9uRf|7mT&86ceQ4emy529sK z0ksNPn`n?_VCzs*MuL)(QUi-UR0K+ab;1ll0L=si1p`26{xO6>85BiO2|!9ji6e3t z4%OPCg(|Ay)3i}gQXwvp-YFmxU_nB*i?8-%Dw=t{0~Jz+(6H?Sn3cWPKpTiM+yKc0 zfQZo=JZDOTalZ@vIpRccej&#G2nXtC7zHKx%aATp;qCY_(pB^UIl-{VZ9^(>(=kA4 z+tzdt(=Nh7KtKQh0si9J24IvFRy7x8yTMHmY5QrK?MJ5Bf1k|noVnkxd6jYQ{RR4sUhK`1snwFZ1ik5+vmX01MR5XlC4D^iu>i=%?ulc`L zz(G$>B723mG{J*+nM^3}{IKSp1*S|7#(;M1Glq66g{w z9dJPnGthl<@=HKxDJ}!1Bnt-q54y}k!FpBtJ|&yJE!8!zD>CmBvZ#d~RJ5@hj9`Ri z?cRjY&~k8car0ciA#(GUsGPilqSBqa4P#-2SD*D@P}17jGY5 zKYwVz+t3eT;SrG^qY{%oC#R%-`I`1KJ0~|Uzo4+FvZ}hK7ExE<(B9G6)!p;Ew{LXp z@A$;z)btE`X?bOJZGB^N3wv;QbbNA(J3IfU7a5@Ee=Gk*vHwXg7C^5{z&p51^-nLd zOa6e6vs|XQDox3HU!Tg>i|v}sd+I9>60$1VXoO@9Fzj}3Mrb*N<q6Y^3B^GiP5ClXd{EWH@`u~ygZYG?RB7vVgm(-WqB8-#8TypX) z|2QFe4y#%ECf)!K%QLJsy=p*R*Jy3@kvJ#Owy^cPnTf!My#P`C9KQfL!0F9M!w|~j z{zh>0g5vud6TYfkA8y2pvviCW(%Z-Yl(fGQ<_P7>hPssJA=D<@!tcnoT$Xj}>U}g4;)Z_VUR%-Af8R28Qx6cH_2|8R z_!d0rNMK!HVv{1Ul`jrX#?G!Sd z`$l>lEdmvo)QBCQ?=lm-{EANzaigO%*Jt^g^a~!T^Cv$CQT-@RrYgIluMYYr>}TA7 zf~^;z(3DcReLN2;h?AJ<=99@scoEZ_QBl-OO3K4Me&P4UPpaPwnyIiNE)@2TmFfjn z@&ZKQLjY}y|3Y5C!xbP@Fm@MCg$odGi;#IqaexPS5Z!!hMssGB@2Ea`Bs&_kLnr># z*z^>3gVYbNYDTt~lGW_m6U8iB3{}SZ4`tTZB$9@aDyJ$L3fby^{nRvKlp2{5Y*kB$ zTZyC6dw8U1E$;%e9a|_<2dT)rCXcbqkKX(;bMMi; zko(G4hv@@U;bj+~>G(y;FuW*fSb!Gifll{D{2{PqTR5F$(+b$qyOfHD89me%qD(-6 z8XKio(n!9@#Tn$ZKZ!S$L`P9ZFd0v9#2{MxAHv<^iZ;Cpby^k%ZwIv7EqQLATF;0R zw@6>ML@m-rrcNrgmh#`{8uAjfgjXG2rcd;bz4#d=%Jl5!&nVD;q=*e6UE^n5J5Uw* zJA=#cC~MKf+4~r^B!xonD|BDWp3rO1`k{owgbX}?)Cs>&ROLXjz!wkVXT|W!X#WoI zH1c6xf^R(7g>K2sr+cSG_q+QbL$!OO=e9&!%F_r6oe04Q$`D7TcF8v*5@u)ic*s`9 zbzC9UVNcZ8Fyn=$@vsWx1Y z#YT8#X82A}xvU2EMtW&wqnkee_uiHy0g_em3x6ecj}s3}b7luB;^eNJ^qH*q6PzlJ zFIeMkDv4%xi5Ci4TmgqDnoJs>)TWgB{4`r(>HguI+UgL`m$cCQWaL?g8F;Ws=)2Ld z5((N%VE%B%>5yZB@`D>bHyOy}yZ|j$gDc^!gV(f&nPGo2X*I+3FQ?3yL<&wwu|$fb zyUL2UdQHBfBEKU9Q3%oo=0o)b$X*Jxl{cw}^@wh=0jGd>?<$6uaj@#bY>qOoS3>4{ zR9*WaxlE&5Vpx$SPJ%!c2J3Tj0s6qS2}gn)+7v7Jm2ZJSdnt4l$kIs7@$H=-dLE+adO9t zYe$~q?YI!wICTxK&W=W6^!I0x?Qo0^YMQDmlfB8xi!DxaB=?`;Dz7^u~7-+8d1KgGmxA;ZEQyL7up;0SYxs@!T#_aN#7@H^Z?BKOk>} z??px`X(lk+Ld#Gm<+u+>dKk0In0S<=JM(O(M&WXN=X=~_F%;fzjHD0ZXQ*cRsrhl` zQ89sg3)ZX!d2)6E>dd6|Wtz=CIl}2-q|_~<<8fNYv#!d+RpAo!6o=l@GbKiLVXyq$ za&AUea8WkXbm`~1=P#P6$soAAp1T^6u2}7kJia@-{`1fu5&&5ohfmcWo;eNo>Q_Mj(PDDY2E5@&>^5l}j`5`G z+{|gL_*)$x@oM&7t*dst8W(Bs5{;0sEQRmaGWNgruEm$gFNvLolIV1RX7(7srL!8I zJgLL_^yaw=s9`V1=HVb6r?QJ%CV_9pen&kDp8y%y!p8h&sDg$Fr4#4|W^{-C7t+-r*##z-kJA<~k-5*-#?%t9# zLRs-Qv#FMi@_xL*dY^A#%b!wRh35bsi~6+#5g-II)&zUO9am??8Td4_2iio0GfRWT zcrIHNT`Jg7x|He`XpqG%rb&|ThnDlEnw$@j9q10)_`eDoL?dxGB0}Zb^OhFYHXF|- zsi-jAM6njk{*Kk64U^kJwW^%V>Fs@wfy_P z%uo_|2l*v7`!f zxGr@)oHJ2b^YP=;gijzD5S2Haw)$_ukFsHl2&g~jx1|YQ`lglh>nH-USK$Q;ng`)F ze^_8vk~uxJ&)-xceey1!@*bo?_ulX`SsO*tr~ogPsudL_0LC?ANaxFsur^^HOXK4E z60InD%&$+(OjMUSX5LUQPzx?KXD`Oph(xN0r<lP44sN>QyaKwU6a%C=!D% zu`=~U9hi6F(5gkINJ;D24mg*f;$50#EPq+KOW8Jfpv`3Hot}WFSx)%;y|Y2M7W=Z6 z+|KY0LGl_`lyteyf{a%A7hrD1wnq^TiKWQJ_5Ep$69{g(n4mU(d;wyIX4+tO`=_=B z(SzV!zXsnvX){6R9O(Ewbw_|jd+qb@eSK;<#E*bq&dQ{MFJ@hU7}C4I)C7-QT+z_n z&6a9|KQ26m-_Vk7IdtNWl3#OJl~;d$W$i>hbF=8&xY)I9({FM@QQRO1BB`jf;V=$8$sZdA~8O~iiGU#m+h!9VR{TR z+kdK`r40=~4N#w}2r*Oay=!^JwoQsfsG$52@mGrgfQ3AEld*IiFqRRwYA`+Sl?A_u zPGuN0ifcz=$n?N$`r|9V>t8B_6Sc~@fY-x_ivmyOljv-)#N|D|XHMeVn3DrbJc{a&{a{jQ{5ANZ);O^B6s-FIQQBKFzBLQlTg zpqENCAIHY%@AaReF-bTw%X8?7x<}fAYRka=;i?x2x!keDGgXmi~ zqy>WeE9aV%r|U*>oV% zKJ*RMR&Y`y-x_Zes7^+gIow&Eq9p51pA|ObtR)aW0s0bnf0+|ZA zEG<~ZqMleG-KU&_zRtXYqKsM&8#K1Z8Uzmb5+W4-!edJLKJhDw_n}9g*3y)nBBr}_ z?ne5RV&SBx8WIwJu?6C=gPiO<6;py%xVX)}N$~f|% z`BD+u$YfO=R+MbA-m7u{3WpDrq}KqZSGB9TLwnCQrsf?B|+C8`ux7k=iA1g5E zL==#wFF>5)1lb&qQG&>i&P12Ako1kSorjs?FjKt0K>r`aTi*Tk%HHOK|1jfceFQ7{LdA)xusqlRmrE+V~T1q(fma4NNIAw## z_%rHEghc244+zGSXd*5^mvLCfPBE=)8%`GrA10d44e-FYI|~6Z)7SS%I;ZN>vMV+1 zfhl<(>vp*1$z_-lXZ3FP&x>5 zKc0=8BU|r=s@(LjC6*%>BW-v95BnX3$Pa_5klNlpee*C_?qf0TN$`W4uV2d!d}A?Z)B#4*7wseuJ%0Tw?>a99RXKPbb9kxW#PzY^5H?0&8#em_LO>< zAbSDY*_+2mnPd`5Oztefako+l?EUScqn5DV3lP=*wTHtezSXBODD`ObS46QBa@w0S zEzue$$#ALq3((hco38!NnsCj`si7sMtr2`zqy8RM z-q32q}#h?)ng5PdW|E4889s=~4 zjG+5I3vlLyTjd&pGyMh5w=KypK*6_4v(vP9H2_ZH-78|lxEx6brU*|s8xI6}{FyWW z!Q>rFycxTP`@A4orKye#m#qGsl}Iw7g7xPlY8os3?vPEkulLIiY72S`!HH@R*vUz> zLW}DFW&q~O0xRy}Vl;x2$GW&k!-JR|$ZY9m@^^*hX$tP>U5nqz zhQuFbax1pMsiwAP_(vC}o2v~p+z+M1)+~z8WNxbLz7!I4j1#LP79pL2rGTZFqBQ6c zmN9zC&E!7jNK9hjF8{m6dd(^X^g-Wc7f(7zT58ohTz1|c^RgZ&dLRi@q(?*5%N*-3 zQyt+W;Is=+MFfG53U5ZBAhxt{!-n8BsU4Y&HS2LTu2zhyb_;);&nps779YC#1byWh za=IK>h%dwSlLxpeQYnt&ioQ8d*cJVIK;{2k z*be}(&F)H~ZN#jTXvFZUJ=rg9Wb8C1Y^8S{WCfWi3C3BaO0F$mjxX_ z%1vI#)h0j>N5U1UWmu-il1BujQYS}%weEu!xn7ow$>5uuME>iC*XC%Kd7s4*w;XPE zS?hM{=3K>AH|s4#;XFumR>0J6#6SqF57AdV3#zatUHfeJdOEDx&1hPCZE6?XuKuhs zUZjus`d$-fCLDd((*wcyo$iuhWZTbc)3IzPh92~|N>?_@1aJTA$GK@X%$IuQWYilp z5#FmgMLm1_U?|KF3PvMh;7*X}8AP{7?9BLSbc-PL=lbrURsr)s$vwKy&sgQvX$!Bo zRCGrbL>2vDC>ZkvHw3M-dKpvQXjd`5X5yjQrTP*tHGU+BQ4DSJ!s`&cCrL^{R^$6p zLC(u!p@DZk8V`Ptd{$yC`15vAB>QuQEY7;}!WL=RpM`70EGdFe;Ie$Y>12>%4&2sq z`~HcgtMN#G%ilT4+m3oN4$fr6MN!SmtkAgRKTyMtfgyyUBzr)t9^9KKHj#V(M&bti zrWYswE2T4&!jGBtM%Q~sg!ivB#r9JhRE= z1%Eci_g^>A^Lyy{s#an9ifgUBa2R=5?-0b?hhx*7*G_cLZk@bXARk+JD`}{9L@usP zpK?v)*AL6lq+z(0_%a~BRVhx-2~}9%8)D*aTdrfbZ8Cd7MF?`- zh$XSdmf@zq3v=wAK%cXYA{gS$%E=#ka>(;u!UmoGUD? z9sTeriZV&thkQ(B6iymyS`Fx+O8I+_0B7Pw9&`H@2Hvs6?cF>T<*se z;w>LCmb%(Ag*NdkaQp81DH;YrHYcX+v?7Rdb_p2+<0s&@ecW~HRQ%N-Z=CCrHkeyy zX`fZQlv?Q5U!Tb38W!r8f$2F1D-663X&Z&4z1FziU;d==K4$n=wTG_69oL`xYbOxP zUV{A4At$}H4576At%rp|O^kI*x=q$m#Eu?bViR6541k3^s9R9{ZeR$)e121qw{iM* z?tRkI%Hz;Kj>SBO9ysykB2t_AAG@q{v#|&3^@ksqF~i$70B~({2UeZzhP?N9N1POT zI6|IA;>ac}t>t_9w)OKc<3j@`zD?fceQ{~_<-9YChN$y?V0~P28s5>c`-SK)!KL)P zARSP3>o`Xk{VHAJ?`qO4%(-4eV`852*Cvi(lML9p+ zwfV`P8zXBr^Y5iaAd2VmB`+NJ_JV?!ZCa8E1bCa-N)q~%z#olKG#kH~GOIf-;lo~& zraqJ8upTO^cbP`ba8InS^u~{wg#qF=`;CI$vH{{CrtB+Y?2nn**$)0D>F#1a%{tRh z^rG+Xf_{KhDV)N~e-Gm%_6b*pPeMi@9>_3c71K^?@%7BkV1wRr-=DP;hG*q6so_+v z)lN&M=#Oi!&UA&X-_qhf!`u9kZcOhWd^H|n5S}J|-^F3DlOpBl8t*=n^Q;-JBPii@ z0-tT7=9ivpzh2tqICgZb);Lo1d!)lxhQ!^Kx2mliX`V=YbK)4|Bw={*SEd` zD-Kprou=oXo%8tUeDynKIrcCl!N0>O`T-ZYO)P8y-$VG{jd({;w`Jtgk_;DWRiTf} zc{ubo-uwt04#xPvJ9Q*}#&?0~gTTe@$lxRVZ1gRr!ZX5%xk^3yV3#Bq)2im6*5rIu_o)Uid57 zUqf6s*HUSZHt{x8a6A^QX#v$C?$6tNHL4exy8zucdmH!TJbC#E5l8;#t%-2XGH)~L z*#DeYwFdGv6L-^Nr+#@KCxjqeu_ZWT;LraCDHl4KXqVyq_NF6w!ZWXm^d`V|e%NVV zkFBiy@Z$db@X>X^w|D^>SK#zWw3B#o3tWe`g(`1%8gFStbdXZjev(#WxA7yYHHAZv zwc;JVyR6nCJp*uzHNfSY!Q^1Qz01+OHr1|RhE+vHG82g#>C(>uJ{sw^+PhPH;(q*p0$yU4UlEAL6DlJH7JXn=)TvIilC)j2q@Zd1^T0_;+4_s>I*mw7V3+j;`A8-#t=)Ld;`qG#6^*qAz$OcGR2tW-%tT zjj9>;8s4T2S)78r13>O@%&{IH)X!o+^a8}{>pVEWQ2wL6(iAnv?5%R5onX}!-Jtfx!MGl9BDo0 zn}?-V$-1NUF~`p|H^8+-@lR;yY3n`}vs z`sL>`Ydz>u{MeK&vx2ZfdpPJTT;rn?af!bRTgFneq3gZe3EOJ zChGN87T3f7u14c=llf;09bX-%k(pUsO5X+nL7P89vROBVRPO@V9}EN#P^*^b^`UKApAMt|B~a|#Pr>48181VLvz zgFm`!Oqm0lvz|pH7Z{hZ=`SE?d`H?PEv#$2{=9w94iaV3y>^yUgtU)W!B)(w=_AhJCh-=trJY?Z5B(TzT{&=>v=|28}Gnhf1GPDcKD%oVa^qecY9d>E# z^4M=;Hgm_?T%dcJ(=xyALJeoQN@gDn!XfW;>kG>xf>_YJil*+ung&CoBHob)%w#F< zRD6kItC=&vu3H)}Jh-@Pe{WpAf1h*nyrv|@qyhFdYuJ}zMOUHe^-CH7YE^%xXK%#T zmcza^PpP+@EG!rs+d!I#hHOf<J~e8B+>3JE4C1$NSCI5pQRhuBL1#$uOyFU zaTC_%&$zLM9T{9$aCfk_9?q9ouNdYl@#tYzUOBA>tU|L@_)UrXcD=USZ~HnBRQUZl zz>`u`HULyJXFHrSJE(;hGeo<-x0=Foe&5E{I1O4NXQD20st%5Oh0EuQ2Se68&D}~a zKz-}&`vi#j24ry_%!>+A20U8mQK{sRo+PSUKwv^HeVmH;^49A~TloI!XN}CgNr;pf z?(YQ%^T0bEr-VmGi!oPPxK0aXcaEg-~zLyGNVhBi8BF4o)sPkO*LUg23&;CM*0Wk z38J5(pXdcMZSssoS(aL#Tl8+AezxRqAqc!8c!llE8vkx^6cQ29Ea0FJ5Bse^xarr^+~F_3&9s z<7ah>nhC zY~1@5X0J@oVA1aQJozyxu%Y&1JVzH^2R4lo2nt4vsoryfGdGzPyO>KfcU}{Vh}$~| zu+_LXP<++w6EoMlY0xKGn>SE@5{+9PR2gmP0u!1%_SlU?8z-vDOgpM4|Ki{pdBP^iW(-L>JFm5_&d(VB?v3YGOd)$YO30AYByyeU@?MT8QrQ`$5ml zYAOOJs&f*|DU^=Rh_Iy!J(^nm$Y${|E!g~VtJ%u)7j{N%VqC8Y)ArwP;9}<;ASkt;WjpPx0b0T+nuEPkB$_ro zotLzmz0gx-!5`UXiw^&6CC@%HNL=3#X)VV|z9MZY#hElR$Z z#7y^2c9J2!!S!qkcYkRdnVqncchEX9 z{>FrNyubafvPY7>Y~$8|7Gbb~x2dheQ6yPRRIiuE5>xowxe?R3?yl=j%fXo6C3kq2 zr0ayf?UrvklBfY_Ou<(LwE7A>P%Q|&tR1~=rs9#^DksHdrXeJkG7|&7`W12W%-x=4 zPEt|ytV>b$F%D1r_slw7wlP9h%l`IU4f3PTLI1e#8OdL*^=FhA+s37+n?L@yQndYc zJ~Q0Mbx_-&sb=hmsK!~}&`_Uj7d|6wFf7!_TvYTUvGW~Bc-(^QE}M(aGZ#!?pM zZ=^{kky|dHP?i$SH91dYhJ|Au6utkO6!kBg24RD-h-U?KF;H(dq$_gg32fnEr?g9m}{JockHzat4(|k zTbslx5TV z99|!T+8O&XA9M{Dculn_Lwr04xm#R)HS{;1d)(Nn3UyHL^D?w(;w5K;=$Lwr66`^S zP{*jE7&abruZd;9nxy|Ld{emLmsu#+ z(~8grX+aH9Q-(GR?zU1<566e0)CMqmO+@8>NI8JYw;M5-ZzaKm!| zU&gXRTn?AQcYg1TxlX%k>R@rS-IYrW5r0#T}n>i*NqIbkfw-psV+%?WS z#3&G~l0)!{Ouz+3OJL99j7idhmQkO$|#Mr`LrCQqZ!$*lG}GI7d?lW({H)ezkN zqW}9KD_eKeW_)hHcmBMU6kbMbn9mW_XS=I6t>a^#|J~sjEH2j8GS^QS-l&WshnL?G^p9h@6m!^7&syG|0 z@&nv32Cs!R3HPNK4}z4JsBsq7;m?R$WY6F-MW$1pjZIpZjpf8 zqpXukcpC@sz*P^XAcydwU@3HFcRi%Kd{y0}s%maG^f_-d|4>zePe%-ISo`~0WS|@# zCm*b~ur=XSCgE|-EGtEUiLanl=9f?iwP5HR&zU2MZWdU$n`(fG{*%;xwsYzE%` z8{-@t*fv?p^D%7n>Y+Gcz}t>67}vggTBVWr$h-5&Srm=Z)lf-2VJ{m{ z&{LqZ^n}+K-{aqZUSY~(B(6Tgs+MJ)+*zZ#BVdWXXZt>(DgMig3@^OWU|Q6xp44lf z?kNpdET3I~L{~dr8DX$1p<`8Q57jWI*9VK5)S*g$1N$Tg&r1zqe#oylFcX0lbrO=X z+;0=sB0RtK=stYE6i0OZg;6B1cr2gBl-X&=Gi<`ZQ4gdg3yV6l1sd&S6gO=U7-R}S z$NK&zoPmdaIvz}b&mAR)TUVIY#ESCZk*<$Yftb$ML%ATH-fXd&_UqqlPq5o+mQ z-e=k-?OMZx_>F%OcdAJZV6V@fW%{4Xg7~?*EL=vHcV)Vsh>gtG>3MG%ENeY4E0`KX*-b>ha3Zs-C;m{d_zO9}-(Xpv&B;XX(YZ zhJ{4m?{8W*^{0M0=l&ZbxGwV3L?yiyT&vh_gS!a{Yx2j`VwZxoiL#HzkLVVQReE`= z-Q-l39-Tcb&U?bgdL@cLM$A%U9maSp?MF2U`7HP>aF4tD^nAJi_3Mc~zK6mHk`Y|G z;$wYdAzi&o%2p5dI;`V%P(6XJvg#^qDH6^6y3hAS60AhR)cArP5bImiEX_6*5Z0pD z{3uE5^AkTZPVtU`y07o(_+I?#_oTeXElj@QaFBeBz_{bxXG}Xb=M5 z-1_z7Oh1r5=}^{W#bg(OC4=20O`)#H|DKZL6u910`z|h)y^)wEqgG4}iS>7Y4wt=> zDQe;B?q8cgs_I2A?@*n1FdBAfFBj@79>i3iIUlOz;)7ivxT})644DKz2xj7ZYl+T6 zTSD2oF2nhou$SP-G3&qp6hxk=2civHcX1p`!{Ivs1lI@~fL9}83ED0QhGHw6q7i2A z8&+$zn$5*n@73r!)tKwDPxpP0VXI3h_#-!$t+}I_d9@4B0Mo;e} zoPHM_=ca8sYHoGa1`N;*WNb4BZ#mNBEPNcXrWboqv> zov~qlA=egfgZi(+7J-(L^ zZ#6_CQs%n8&kJv>gD|X61o1D&Ux8Z7K*N`YP|w2PQn!#Yu2UUra@PqK<;eg;lj`mo@zyk zYomFHB+V4fgC8tMCNsM(4Q zMjTxkQ{i!W^s+8PhZp^_nO#7D(Pv9Ty=n=!|CEmWBis0#lG82>rb2S7YAD$ z`khHI?n$;z^z?nU`#$qlD&b%#o>v^M;985jj(xSiDAEn5#VxeY@b>T1Y-&THxK6JmMlna_%v$fy=2vV z4jQd2?+c|E{&6`TLTn&$Z@|fb1ZV&S%Xa)+#)I2W^*8^hcI>73X$rAES;r6GI1%)e zecu&K$#|=Ox}_MS<`>7B#}QI+qT72`exL}u0dIS80dg7)>;cbyBIt})!zHb-&NHv| zALjqq3Fptzgly+61-l+Op7`O8sR$eqBpL(|duMXdqD;W@J~2YnD}3md@YVG4%HLx4 z{%n#!`S?w)!!u8H*i~Hk>Co5WBUuu|_rLNE#Jm=v+4d^99VGl(%4T>_O`SzuC--h$ zv0nTO*NK5&a)oHs8oBJ7W_iu}aq4N4rC*v<&F(zN9n(SOZC4yn?PlRMwry%Wx>K+s z(bZ0JNFIw#jx?#r)enS*n$@4xU>E7d0QV7b&E7=CN1ClyHDZG9jKf6WZ7OOqo5(9I zl(=F;OiS&bRHNG9iL~Y_nd+3WN7GvN3(*bS_pN@H-0ll+*#c0-9<1*phWuox0sA=J zZ3PEkdMRQWa}9m9nW1)1`uI)dGAW&9ro{oLqn5esc4NKmyzP>5p6uo!xcTzbSqMI( zZo^aK?Kz)#;nFW`A%EIffB%u1qs*`@Uo_Z|_4}E_e)(Gbp+!0D#G?=o5R{jJ*B*k# z0m&fCm-Xw-lW@jfxIBWTm^0@3F`0e*WRt1HWkz!*sue?3Q0v631=2Z6YNI z!FX2Eh`CgkRK(llo(MHT=#34V8EbRm>=eeRvRPOorc%W%LHPAX>q;o`3B2tZ;NJ2` zKmvM5F{$URRHqKRi5`}sY+knOty;IuPOv`9(}J%eK2iz7I(12WQM|4Z>Pv+>?Z%F~ z(~JQTgPsXpwhQsTvm`3V^SSeosGB9jPXFs@LeuFxX+c`zxa)%M^a~>gb= zGj9?F<3p?^8ByLgKI+lfjtI~5?^{8eEMQ*N9h2ac-Rir zXnPB6GF07iHYU8Lr)J7nm3j>4zZ{FdO$?Bq*+4Png!J)3C2Xr|5cm1?cUf|tP=aXh zl5IxK)L{6$;unT`X5?oe<|j98iD_frXL>Oz>ZRW%n@#$4rRGEYwFggAGj&t84@rf1 zsVUrk&;F9sm4XS$E7ZHM=XR^AV^|;TZeLwVvy0t8fnR1nMM$e@n`ca$lWKab-%r_N@+Ie#odb3gYBc_KQa zF4^y}p4V6v_3Mw|XsPkSgp!-BepnoJiX8Y|Yi^RpLX%c}K`G6mtMiN^m(#4Xzz4&( z6R;ui{dl%lVn!yI_%kkqHQ(3wQzM8?)3n-n-`BZm+_dj|$vuf;HCSBhb%}mhIn%VK)8fJ36^T2I5b|?D(L0k@LYzjjArlRfJ{vMBQjPk{tp$ZHGez& zj+|e{6pMc9YX!2?9@$ia34957A<`7szP1vV!1P|exZ(mNh~#-B7hv}q+4t&|tAXb` zLe=fFzm8s_kZ-fiBeJ*VO7btWgfIn7@-Blvw1BbUrwwE1IKOQb^1dXsoH%5pe48PS zo89pAn|jH?uMxSAY(pDN^*>lqa>7MSZfnboHRHi;59(iOs^ zW-L{R+`4!RBbHqLB&ERYd!mwA#AojBQ|bPZRnj6NX~arEPe*v$KMoiE+SDyb7Hjew z$BVt{ML%)gHA&Et%IPb!ZSwqit#iHqo8(AqfOOr#6Gr9CfcFEKso#g_yxi6Cx23~> zT?l|j3ypy+#ltpLPp%SUzHu$ulGyDXTldh0t^q5`X9psW4G8iZ|;f<#YR7@B{vzVTFuKTy3<%g zwSTMIjOykaF9a817f`tpHV3YW*a4slMKM+n0KFlw8(4)3*X4qeno`d8@T&!Fo}=dE zq84p}ZuL+HWkc>eUBTSI)qsgZJ!^u&OAN?eCOlWk0s}592lf4-Ato=~v)1oCTGn0B zJkY_Irh~2J(jx;Q2bEf#B$7U9EE8h_;Ubt55iR5d3jjnlW-JF->}z_xbF2PEoBo~uRB7gjIp{#-K|IX3sLMXELXqPBIw zB*qkCNelD#OlCw-0LHrAE%3f{UcOr(8sD$nuVDLSpduv08r`>g&vxuu1LQKiZ4S)d zatj*b#=#U$qWZJ1QVvnnx6*0~Y33Z_QfgbPXTsfKTJq>*n&u_Z`J&+;GbvQu3UMY@ zxQ~l&QYN*3<%+Yf`1h5o)@hl1P7|?k8tP?Fu9Oj5mWsXr38+cHX5lpt0rk3qbBC9l zj(+?6cDC9mm9}*7>Z>HgDXKC#A_m*6pOyzj+~I z0~`;G;RaN-Mkn6+T6AZFUN|}l=MyWcG!2Wrallkpo({W4Fu*EytNPaHaX_OjunIrt zg0l^q0`v7Z8b8vire3Op(94~Fdo8iMC#jNi}Zs(fM9fhpuP8FESSIsZ(ESVa#T3vP2u2A@B+mF{&#!$8)w$2 zBs&+`RztV^I2@@mKs!RgLgLC)3UjBtvt7Pt-$*v@_J&KO{ z?_r4P;wR44uP_l@$T}K`!@9ZZtFa?mg0{?Q5Hec}`OPMS^XeK(BwCYZAbE|KYae5B1+{2_$o1u*KqTceEvMgCyor0?Q z-#vxS{5c|637ZNq#uzYKD2ZL9jam)7aT@Kmg#5Uzkh%W8X_LnwOK~zxLpZWGmdYpI+4G3v4+VX&r76s|ve)5PNGJ?lN&^bF3!Y{j{C!J3XIuMI+3l z2FWx~TB36jEV-n&_h=AE`cEUw;WqF5ZMnUz46|P^dAL19G33@pzoH7IHv{LTKeRmx`TI$Q2eF4geg0O7cXvM*{9=FhGRYXaU1~JtcozfVu8@G2QLn)>- zfZN}6<=K=v8G`H+IXJ!@9gLJqulbHFZz9g81ss%GoBIZ zuGK_`*PGf-YfX6MXMP&)IOg`mJJB(2YZJkETjd*H#^XC@A}8~}uzyMdQo1xU!w@#C z@|he^JAB)@(E@^TTg>_kI`amxU(eZYyR2~ z08xfnGorfW15A(ttkZ^xB_FyCX&cBWYrkf(pujhK#x^8#Nu{N3X`HMViWt1jDTTupMVg-lb{Z`*En zq#6B~NYV2>EzZtoO1BkjG%QHpt-@#I=LbpSEPfEAN93h;RBsIHB-u2j8~@D^?pT=D z>F*cveWgN{@eXvG0L>BR+Ysf8@L6)5Ny#R+{4F@mQTox}r7CES)vFbu{kWm~h`!l6&=_U^O{IH!0xe=n z{aCs6$JwLv8Rh+hV764uo^wbc?NQ=db6SI+HB9gKIq)r_HvT5OLx@w2wQyfW}wvMs{O2+Fo4UPGb480Jna!!#=V3{Zy6^S*%nmS*rA9V%UE6e^qJ;MVLBsWe{#S~#kZn>$-u;eGL1L{) z@GFc|SHMxPq*_P8%u|NXM4`Ia)@us8-}qi&ytb{Iv834!Wc6@+U~$OFxku#d#m%_N<3Ex0rSVYyU)WlttRdM=g=9~*ESWZ2k~V~x zWH)x%$4n8*T7;rZ_NpOy80?hv(Azt6lPc*JF$ymaxjWsn< z|3zW+DMJY|lgJ-@Is*@>mTE&ySk2{vN?yfin=3!bn22@J7rcWhDcb=jbFti46jl28 z-rYU9p>G#qW=op|pRpl`O+ccbFmA3qLuC}pMjp6fMM5{%Nu=P{KNviDOyR3*O~EB| zs{Lf4izzSu@F^ZSD=_+BGx5H^7FT$t+yfccv+*12$Tz4KGu+%7ngzj*9c>b2^sAYH z!0Zx#h@tjv!_>AT<)SN2F;43JadYSFBOc&qWx|D#w}A>0t^+qkoqvwhrhmtRU0i`R zn`iMv!n|k7fI`-lp_}n1H_cQZ8cIY;r0v2cxAry3;6+&*e)F|`a+9O{9vFm2 zazjL`iv2$Zd1rNoe}80?E5d5o$8ZJ(0J3I2t$#As{g*><4`$J6*U?ev#D*zgRN^OS33({ zI_9c|IyjEeW>HT>UVZ;+>bw_Yp=Y)_6IB^jQHn5;r2p{`w#L?^nsby(#w&|!`LkxH zK=0KVO8R>ZwT=}i7<4_k_mAme)PtzLFXKv6qjYB9U|h@+b~@!SOc6E@B?0D52yt-J zJOK&g#35_-Na33`wM_4;x|@2aCMelckAUx(NAwKvRYxDpp4U+T(r=Avd$I@Xzdh-n zdX$m+(mvi;_jQo`rEA;`J$kpd?T&rDaxzRm$?AG*=h`=yDcCPMmn?bfdhy)2n0b2n z(t#O%B#mHULxr$=^eb$__d2^697_P49kwE-M(Jq(+-X{pEx6b93C`7lBYPY~ELC}~ zL*HeHSEWM~r`*2R-={`w53W6j>$L9SKtk-DwPg~N`^wCdnC&MChq(Yc`Na^-0pSVW z(gnmbz!dHskWF+JlP#+;`|vrB%06|D$I#+uI1`u-2b*{Cn+;nG4E<`bc!oK7Es>M+ z^jz$LAm55DrBb$NIMJU`WrY?@x7UcYP&E-XY-z+)RPV#}x9zUna2~i)`c3eU$U&Tr z=p@j2*+*wEC?Um96h##6TC-7|M{~{qHuMco@$EmW#TphYg&BLhs`fxzs~PdykbPCH zDMy%X5=6y#m1{?IP2=v7T)Ixi`Fr22Z2^qQHZ|evRz&M0Zu0J_Iri`AI#!U|`r>O- z!`P&GSiH*ARKic7rWNm>dapKmmEhpmRj72rYhQ!!FNzy$5lU{|_Wj|)``p4xBi^DU zr?>f5*FaPa_2$CL^O@O>!IQL`Bgl>d!)hsp@Q-_+bTU)5Olnm-9_8l_PM6dkQ|qq32{kJ{d{ z&*ThMc-#qnk;@xOW$bLSA|fyF!XQ=zqf1x?!WsPc9uTk5B(zqIJFCOn?~f10ge#V6 z_XcoP8c8@H11}T8dA^IwuyroTgyI-yIPw851}oTHWPU&|-IaG7*fAmJZ*b)RQKlo0 zx33d+jDo73HdTL!kVO0qw5xij^~^pzZLUbs@oR3`QLc8YsuyE~OTqnR)zD038r(?z zZv%Q5x?V)R2RQ9_(7$4ZDR){b`k|3D_uP(x$)IMr-z*UAYY`G>?7S$oCtv?<=8eUJ zXD6F`0vGsOKu{r*^5zFTkT)2_&~$t~L$1L4w=q3%VASY5wU{7YuFy(h{{ zCZOc!I6wgsj+#qFGy7SexH+yuw_E6Ja1{Lq@Cgoxk?0op5 zf7P5m^fO;xVhWRWG6#6o6Bw7A_m31)PuA~eGk^=WnfUEbY}9)=cMVfUA{eNGxX#$ptmz6Z=pTq zh+`~=((fT8KYYLE4#(RMb-zS-(RN@QeA4W&r(~KQ9qmCYHCrb{d-Rs37=>~zbIJ}% zrF$F8sli-2&qvgKdRm1|{xiI7xmC7*K7xAD1qmUSMv-QuA9uAJxji`8FI&7ko_}~d zX#J`sv}r(jCo$&W7RxefiZI+c+a<lqrefZ!;6n$O&t z9_EZb|N1gHrEtY3XMe<6ZS2757fJ*vusU0@+zI6k6t^)=Fef)Ysue>ACZ20`zg>}+;zcJvKBcD7|Eu+$ zL;gyOTHl%D;-k4y_OKbEG3LX4X2%cjn|S8sZ!OjNx$&7zymb;hZE~M?9Y(&1o-ArT zK#@(LtUwHy>66EEOI_3QG7BtS`3d)ViMm__p({Q2R;|qs?#6N-6ou?lD9!Z3CLI@4 z1vJ9L-b#4kd<8}9Xr`MnIF#*R`_ifsZ&K#JcUn*H3`PnPz5KZCiCNsN3N{J9y;VA6 zlG(eRdRwJJW~9OYPna1tr_%V)GjF`9r>hfP)fKOZ4JA)K0~Y5Ea%%7lm4R2#6Dt*= z|K(v1W@^6N26@soPPTST0WZ$PzP|%&5`_r!`UY|o;#l%nG^cl%tt8lP< z=Qhg|CpBkQrnXVy9|ITI+W86TRo&)HC*e2&k1lan}6@8HF(Y3)4AT6XWdgLVe{1}fhTmOnpd4E6~oHPNXxi&s}QmsK0RfImHeKQrV zhOsODn{gKZw8@^o{*}6tl4lUl6~`kZSj{Z?eyH9J7~@O@^~OvWqjZgwA9dLz+r_^f zrOD7jKo>$oT0z|dssj=M|6vS`6n<8T7aHrnqToJkAMYU8S{ARz@#fbQeF!#&rwOl6 zlpg|B;D^DUj`lNttedig2OA_mT8_`NvAr*TAt3hAN>6!oK`Ig6mmRe)UAj@RJALZf z^{6MQ*)ZQ&OVs;)U8FmB*%RYFHmDXpM95;^maN54j)%@){vmt(iX;-0sI*L=t1f>d zvoX#nVgQ?44!$Kci!phGdOo4YGQmXd^)M zmadtoY1zTE0J9dBAAE;IO|*Q_lxYB_kK$F8c|}h)#2H(!3U>B6>JlgcbNb=P8-H<= zjBDh9xOpu$p>YXjGn?GE=z8HZFm+k_Dypm`~LlJ$lq}k2Ie0Th`p0a$~OY<-Aow1a4x_P%eDd>J-a5UWV1={4Mc6UnFd<&o?=N>TD<4<2s;io{Iw^ z1t>J#7)D5i(31<{gs6AoBl5<7qct4DBrl|FxBp<{?d4JGG|6Z5*=WSvM8y)cw+lN+ zP=V(%Dcbs;0WO{eP7|l<(2PS2$Xy6~N$dx|Vwzm%r)AGHT?~w|q*zE57!@5Nz)Ba= zF1kTtK_J9X_ujan))cY9N@d^rSF+34{wrJc^CRv>uo+jySL0hXcfOMYHux!bTXEzR z#A&=r)3xEhNXd~s2N-aok_+G%8(l$HnS?pu-CxC7Jxy&n8ryNJ{z;LqOw+D0rcYRU zmGu#a8iY3Ws~%CzBPuasfa{tbX$=XkluHhhM+n{BTkT;#@$N4oy-s)efeZ)u}_WK*ecg| zBL~z4S(^Md|A{2(2>&F*Hr`Xjb%#B&8irItgI7n4t`0awvgv|-x40Pf&4t_CHzk;` z<_QCVd`Efak#X!2(p^XM%DCcxKT2BUhwemvq%!%%7&%>1HnWVM6huVK3)O@z4YyJl3 zP6@J_3nhB}SVv+$&0TQ}l9cfq@6I{OOSgpdDz2wfA6lbYv_LNzC|i?;g-T5Bie{Px z@J8I4==ZkAwpKW3+PI+(wx9j@su!HfO`d%Z(xn9h15CzMV%BavF&uNx#+El$d~>S7 zhUs#Nl>N#n%9ds?2D9}GAK(C}J_~z~YSBT0pWYUET96_b*<#Pj`hABF-DB`kO!HP$ z=#MVh_Gkz)v*|ZoZtGaOc%i5OI+RZnHkyaMCv?$x6iJOy9bBC7dXA-Vkrbhmgu-&; zLg&mHi~D@j^_^uksbY&aUq)YgooS{q>e6H%Vj(J`Cl)oPBvk8+))zzj_rEIN(*Zzc zu`+@6O4jTD{TxCWtRN6&egoKnAu0*D;aLiFFOAcll%C;lBc3n&B)M7o_tcWyt+UNJ zKU|)PoM)0%@3jF}9djdiQ(J%{9~KqujS)xnZ!zyZ}T2kn*Ti0kLkKMlWL*UEd&)pO4Gnt9rl|RkTlQLdBb%H!bzCc zaz0|eKeUo2qHt^5oiu1&_~!GHK7p+&xHRPzI$Z47xNs{{cuchs+WJwKUKW&3s35GQ z&%8|7Fh6!rw{FtZyg>f7?8+b@g;|$@f`=EJnJfW*Gxz~Dzv^+A$tTJE5+%X&X28;Q zK*ydQTioiCY(bBL)LFviX4=lgrMw=dOv zyZF-3@m*OD<*(kO9QwB#Ff*ihZ1Vz;&AQXKpPd_lpB#RG-vI;X%I`zSTvUfKe15#{ z$8&3axLxkbYUahT8=Z#2*V#9cngtg`KJH@frLh+ty>>cn?+j4Fz1IY%?0Kp&S;Sis}8GDOWRlG=XW zgH|d=J*>ETJ;KE648nU`Oz(57pPY)K>DpAmp&0*L3gXt6o(vPc(Ii7HOKF9YrlUqb zWQYKYtPh)5r7j$FX_>sY>@WTRh&S(ial2perpWaI;*Bqjo3}CHhw0`7Jt$4JzS=pD zP38X8N1cn%H}iFOJx?L~aiB??Q5;JPlJ|EexA?S)X!5tOc6k=ROplVfb@FN|VLUEP zmwsOuEA|r>p1Hir?aQ};U6aR_aif*24b7hWe(;V4-2AUSODoM`Z2n?k=ZNRqycpIZ z%=|%~QZr3W-}n!!5fM~h1P>5E$)CqZAh}j-xXELfXoO`#;hJSfN~%X{+U2A(hdJg` z+r293FK^%KwEpR(yn(K$Syv_x?%Vu~hn@jE2F5Ao@Y!EY?th34d2TqJ*KgKkTcC63 z49TR0{C0FSL_|Rx1PE{2tQkE+>U&X!x104agWR8#CZ9n(!q{;IwHPj^$Y>zv+}nS8GF?RI}ie9erBtcEAr7K zV8a%Kh0pgU47XGOFgi{YrB#B%RGY10(NUIH;WeXpVOAvXpY(MSBhF~M2`0pLAO;yYf=}=Tyjn1 ztr$VgN^NQTRv1B-{W?13OQZO6Mx(68gR{fNifg;HsT=o2i^c*c-N|jV8z7g&vkFE2 zahTRGz-A$)P1%eiH?-8JzQgJkO#VGm_;{uki>>$icr$$TKw^&R+OrQ#5^q3eVmwlF z1J4$&#?-_-p4r$S!{OhGB#ATQTvV_;llPLObyi*{Kc3 zMeH0h%yKz;496$7x3MRgc)tr`VSaq+Mn4k7y!v2;;hSaZy48FLC@ZY59mifQ>|T_d zYA(Bx+|3;OpkO=V1=~e|U(DXg%PZx@W8H-U?-e`}a7n}X-C*?KSHEV=>D(_4mH9%V zPfIpu3!e`laPx*3oO2~YGXs92<^GwhrW|15L@afd{I%yl)lGPZ$8ym{x&wG9rD*YSFt zJ!LGbFkxq-c~4g2qZM+>!hJAW}ozBbMvYbJc;0M%wStHTQs?j>qiXIws6v6Yr9(I-yT8-aD0*M=EGFLb zB`TfVkIC=b5Qh-UGWZkqH@DSps@`F6fF}&gwLyZP-70b9fR6TPnn}bzrgMsKn*^|E z*V33`1JiT-j>5LJrrfoMWiqW#uLPZ;rZPAQ;QtFSqTU60Y5HA?tSvQNkQ0vZ^lE*B z{-qdM>93GfUo5ZOy+#fn9GELb-ET^koGl~ z4g2XCNz+x`^$i?prRZk@Sv+n1{7T=?XmJ^S@EE+^(!2tDncMzRVa!o?_sMJ7p0*{P zHbtlF))*+jGT=0+rmmW~{&OP#_SaPGCr{Zu^Ch!&e8?*D4tRo#;PKInWAr?l(tDdzLc%{M#m_$CDsmUw_jrCN$ zhJ(H$vIV;GEyH( zsezew^eToDt{+bi4BI3a`SerU#Rd1~3p4CjhF@i#UabmIqt=XN*vPg8^C=Yx>T_S0 zl$2!l&~*xt%mo|pAc=1>4?>vTzXZh1q2(n;Jt_-4D^tWjV>Y_b9{PFK$07UHMP#Ra z@NtHz&;sd&2sjBS)#kzks<#}KcLaFP%fFmj-=|or31Dx%b9r8HXsR!WxaY*~#mh;tCVH$#686?l^{BXl=`gCTj(SZ9DaOJGzMA*sPRb+Z!R8@OM10qhKj?v4pn(yl=jljsodVD;`}dkvJBzqJ-#Ec@hQ&t+wmalOE+6$TjwxwaJ3;l; zk(&8n#SJ_?dwvSS0zh@E>PD+jXIEKM#{GZUr>)+;>)jcx;ppVWBx)R}kd(6~)L4?- z`6&kS9;;cBZ}V&*TJm(Ue|7h%YuEyo4^Pc!U}U3zOi{DsaWE=an@k?G0rAGrHuEzW zV$g@6p<@o7@;kDa`&z9Z!vas~Vy3x(D^fJ!8&nXawA^k|evY_3mPLtb`^O~UdVhPh zrirt$rXs=eOWBvwOKE35^tSYNiaRM7rCt{wEP@i%P`X|N=8}oOBcsil3Rh+<`(0k) z(T*quBp(^_PWx7f=bZ6*L4+YicwQ}+`K{XdQi%`UvJnQoPQqW(ML^_`$kdOrhmnn; zlgy|W=m~XFK&$dAMU1v!mcHkYX^9MbU)a6=8&i7z1>14$6>iLTP7*i`Bo4V~yh)7H zqErp=qLudY@K|1uH`1P=JWYhXrvf*9nT67M- z6BASS@r^_{+|yOZ%{J@02>8{zl}w{B`VZ7*D={=tJOys~#9I{?vBz<{RY{}!{f69l zclBQDdvTu|39ifSPrY)bONKqkDxLR6Ew>yF8j$%LY9HrZCgzw<6p+ zD-e0^;g3Sx3@ejZYn|sggap{XjP~=#VTTtIp1$DQD*3j)B`kWvnA`mN!R5xW<5^6# z#{y3b7ZO*hkHQ#70*eO@%R89pqZrFpV`a_H_k0uNhT#>K5a=}M6+iMl(V6D7P@+IQ z=OQ6x#iK9u+E8vJ=kvp3;Cnb;hkgsI#7FEw&#j2@h3$0l&yqh%9B7`Z!?=`ipx>FP z@?5W~-5#=MgACL?sypT&cMAUdACrekgil~PNOkxI&mv447eb>-?W2kOatB62hl#hd z8w`askNw{23O?NF1dFYg0V~RJ#dxtxzs3r2^;R0qiu|RJHh%5mgRd63<;mCgv+|zK1MT0keX)>jUb~)Z)Z>HoDO`_ zLNK2&XK=?|p1Oa^&rVn%>#1GDh3#f^XOk@bosNhrta7$1PPSdB1M3qABl(y80FoZp zvP)EtBb<=bMT5`Y62Y&;o*wJe{~~tlLNxvO#+t+%4mDMiKa<2KGBE~Es>>0m1vn~_aSX4m8@MJ~8lFG+qi@}d?_yjIGz-t6 zS#@cH#c477hMXQ3*CQlDyZcozrtU9F163n&1cLNxsg7e=7LzMS+G3ZRYRaptV)fat zb|~L{!*}zTSNNMX8zb)nxOs=rE>VWUnOXS!yt+_wU#d@1x4d{Nw4k^sp#fGtk|3$d zG9-SunKQcD1HU_kdcTOPw8^|2&K2c%;9$URk&-&Odm>s7V-PafO4ch|KfZ(DKJz7UM`GPogm z&Rk=!<$p%MeCZ1iK^F)oP5Q?gfdLAogD)qzOD^tbqP$Y}s~>jeW>`r0@Nqxov3SRH z+?dJ5dEu+&NzDzTf-Hf)zSp_iDxs ztps%mEx+=xd+~z^q8H4$P6_~ZR7n%iQ1E;p>@j7jvFOswjH{(VsD--}>dUb4cid-z zuXW7Nwgnrwzv=j$>Ap;@SgwtEC!S1_dKahhG?A)gyt=;xcUT(y%3xs(1`o#4eEleF z^Zo^)^Pa+i(F+>^>Xx52yp?|ehkyJfl14BuSeRbWALZZ5`p49&PnzX$%>cP^!g*^o zF;2e4#HL@b8eXuOcsEPb#-5EnCNF-Wba`%&#v8B@&}D3P9VA6$Tr8_`JlxugaU7Aq zB$m6x*6{aDLKX4@qidFYcb1uUDPy)B#%o^%M9kNY2B~dv3z>bJj)>h+cEY|^g!pRX z9o)LOBEw^?XFt+bqDYJj^H^erZG0a6llAP41vdGt$_8uEq@CdD?S8HO$aGV3Yz8+y z3dv*RnwFD>&=e13{9`h5SG+U);{CmxANXTJnBQJw3AAEZ;AZ2ncq3Jjoi3aO? zk=4NsflY#>5kJ}Yh!REPMA5o;EduO)e95n;v&Cvv$y;GKy97WcfW`-=aP1j#6hC|m zjAf0z{FZ0otSHZu6I!x-BO9Nl6=v#=lU_QRJ!U&KV+@KHFKfxJFZW}p2zSO zXV@O1GjA*5GjvpeBJvo{$%GKq0cBA|p9R!AGNj2q2{ka_@w`=uI&uSZLixMWw4Rql zjC^HcZcR~PzlbQSj48a-pSp?@rY~O(dEF=dB=)LWuAZ#37W{AG$jI0?mW>YZ>7M{{ zsfaaAQ+zwerd>`!@oK@N9z>E+YDVqRYmIZS05nEjXpiSUOAsd89uH7~ST-dG%q+lt8-dR7-scgT?|#`ET9=dfKK znd~udnXNIQ@e8-kmciEXSrdTxx{f%-p(e`hqWU$_ea%-(!%7v-(57S)(~~k80!hi3 zk0?9O33UeR8Sp`-03mP+>@lzyN?vPjx}3PM&THcuU^X(-p6~gExum}Eo#2~?cP?n1 zVbwcBS#c0Z8xy;f-{4Pdz@>Ux4`%kjA9cJK=Q@6veY%s=a8gzx&Ddj@NVt5^6t&Tw zN)!bQNwQiRrMoEhzri=kEvF>MM*XYze`ZDK&RhhiE&SQTpqmsy9Wc&eD@^E-WsXYH zXz^W|VXL?lI;Zng>cXE_m`sKU2=?-EWr|_inkky-Hr!dDb>+c>%p#!XaWv^@?|jlN z{zZWmYZbtsztN&*C4bp>MW;kk?3qdvjQl7Gba`bRqRP^|DGnLAQeBG2VtNJDT`c_z ze2(1wz#g>`+&ED?0eb@zZ(B*F)VsCL#YK?yXn8Y;$HCoit z+_!Q|X*07l=De=Ipl297LnFDErXHdek-w=lz4jv-&(6Z0;yP(PgFRs8Pb~c75d4qn z4e~sBtA%P52faUHTgLdEI#7pobn(DQt~AX%N-o;bmn9f{hmtv{mZu=O5(QcZ#_pn` zP}R$A)Ipv=GxDLOVtWGD$y%!Yy}s{Sc@y~#Y)QiJJWSOpvRNLZj8IM}LKJCh!->2< z+X3aES!V+kck6Fm%w5hZr$N_!;oH*zdOcwb{Z)R&g-by%%mzJ z0`Lf7M8AqZ&lxulgJx`H(o*!JJsYlUS2&{{r8Vor?@lewh#B5K7jOM;DGzrWu;^eWfX|w6V5_ zfMVd0>Z>O6nqSJ{FepuL*!(7?GxvC@__Z$&?Eu&kB*hyr|9ui4k3d#zBWzFNb_kQc zTamWbejLEPig@|9oFp1pjOp731%up49Y|5$XV{;vM^I!iX;0%T!P z8=i_fUF3s>*DwzF)iU3c0gta!B}h*f`r`i-M!uM`tN+ZT?jeS}1a*N7edYf=@RbO& zGAebR-SXdto9^5YZ?CC=kUc>S8Sjrk6H@5t0gO%ixqRss0_yu}{ijR7iw3LI7Xhjb zEJ|7)?uBo@r2DGxnv*T&snS(v0l3;H9q&-f>0wje9X6za$c!W4GT_Vykz4iJ#n*wNrEe-C8FC zI<5lLeI?*dk=3tq{U3o^hA(=2)Y%M@qvo0uTCpMnUxS_=t%v3~Twic_KwOK4k7+^M zKJ6N)o{VP9pMPZ*TNKx)$<2TcROE~;2+0i{zBU&A5ROjg_y~(`x&hc>kTYoVQ;g6v z!m4FSRmoDL*FkD^&EqaQI&bRdJMOC2EWLM4*DX4b@A^TISWH&S&hEM#RfNzblad1@ z(qQp>&h|D+2li6Atf)l&%H^`cF?wC3Dcy@&O^bS+#-*Z zc5cWaqc$Wd*~U{nx<6K>3%>6zOaEi~j+cV2H&S09Zb)VW%SCG+I+126Y?3}&4hn8F zhDX1Y*Phb~);2CRK22RJ_8%Q6Q$cTeRml^z%W3B@03^F-%B&Vb@ZEns1d3SEuaQ?M z`?XWW2zC3B95zPz(H!YQ^{tu3{CJnR{85g=_D3Tio z^1nYPy3~h$9k#LTVIL~8Xpo4$BtdI2fxPm&0oyPtxI;B%OlR-|uILpcH=yt{u(v~c zT=<*K!#1OG@85?mO^a{#VuSG}GGWW<52S5YW>o*sh#C2}`;*<23-lC}J(HznRTWkL zG;ZBBr>7$Lq`-StgJ)c$?DimR=k@C-n0Q62f`*UxBbiWjCv9zY_nss)!ahI*7+1g% zT}`t8jps^Nh6RQl8Fe3nuC_svS;|Yt#Cl|R^%-ndRNa~gq`(T4)6K(wHn5;GvmnCr zvjteoy;M`tr@Zwijn*x3p?l6xW5Wi|Zu^HM=MIa`9vMQl(0HI|gz12|wy}0r_C+=3+~(Nmt0}lFTfyV; z*{6mCzhtxd+uZi=U&b51jq4TnIen}F6W^o+J3~{VoX_d6Ss#xDIiXlRmL1H5Cjj!1 z_Pssd;>h<tlsGk8|RV7%W(uc&Nes*nGP~h`Xor9-w5vs=KH)}vLV~V_M&yjF? zkd#Gfj661x&p|CE#E6fSL#p^lmDlBKpV@=j=RQ!GD`>MXZan))*N%3Zvj35s->kVD zt$iyv%_E%Ds1y3+alU4LlU#gxXu^#M0mJ4-h2XJMSVNR{WX zwM{Ssk{5Jqf0AuJtbJapy$idxi8>0X*?H;sFhEP&S*f-j8H#FQ#?2++K=0Q;+*5i! z!n?>~f@T1Gsxhyy0HVh&mOd(q+{Zt8_vc;lwz9ID)awNqF21E%vhghID(D&yqn%gp zn61RO8>{Jpc_nd47RKg`_l}H1lyBI&wk12p1x)vMpE8HEHgnAeW<8CSi7RYm!a%Ne zsLh;4FhX?}qPPuThISI7Lq$u+8xEmezqd~-GOh+XZ`M|kGk(@}Z`;>Z56-oEF3I#k zD?JLn|6}^qF&7$q8Xr|Ve9zUOX-VP|sz=$TtUR+}goM3sEaHQq-s1>t8h8Z2X6eYc zp=LR#s7JJQ{5%HuihGUJ1oY>{98mRPvF7C z56>~1IiCAxET9vmKNq3R_#_=TF%$(sKPiv1^oc82udE*5t})TOk4b|4hf96H>9?)fSr~Rk+bd8!+2bMDK9)J=!hs8@zxV9ipM=rH*7` zs`oMwK*Ad5-2FRg6f=Cs`j^&=tIwk7-cpSr+FId(v2LD~q08G-l(IRBqr=|)dVl0@ z{l82qeraA0Szy6iiuWYJjO-i0(Nvmht~7Pf$=8Igr0Kfp8w* zB_={~ESrymKc^>eD!6~wyc{Pqg^9vcU#i10A!&U*gY3g8&nDBZic1KhzFYpHY`uO3 zjm}^j(^j9i7Jq=Rx@t zAzfVg?OlUttKaUGzdqY-w&z|%V?tv!)`oE)s)Q#17XrFKUwy95nL7*l>*DjGPEUvI z__XlA+eY4vofM=`#M$8Rdv;;xzDYUmZsK5LI9wLp z?qh7YTwnj{16P*xWoOd%pW3H#WhtE|Zd6`k8AF6-LZ0p9;=EHFsNb$B6|IsU!Ns?k z6e{|M=ft$On=TRtE=dqCFyma~?U+;rae84MlOtXA}>Q-q9P&M#RX>_x{x$&+BL93*tj=dY6r;p2qO zy15w-P&cGTWW!@N+%3nALeLT&`GcAThnH&Qc>7G9P19MN`RL-PmMbc=F*X9=k`JXR zlefCK*bPar_cq+aPi~G~aMzoC$p7Aj8WV!kJhNo(QZg*%^9-WWz5S*J+RYV-`)?4K z5Ef1i2Ba3u35u$Nu{MH@RUbXweb{mNuA(o0}g5uJnT*0^od}hSD`L;d;0yByfL2TZ&X5J~3?3uW7Jjy&-iynyBIb zll>%yNt^@r5kfYAPPjr(BIN&LjhMdiPz}8`#dELW;2vsR9U9_+_!)XPsxg!UY&9eU ziG!W;RH??;@uSF?fFk<`JYnUQh3VuU7?qIIjkQ^B*wlm^lFz+?yuOpjA_OmmkUskpM@;&&{Fq~A`v z>0L(-Q8C(V1unrkNJn&uWw(RMUBs~NrBAm1m=H<3m~a1>Y#TzY+Jy4s<@`b+X2a`t zqa_(Ebv4drd&cD{N}DIV%ml7)bvy%KdK9YV7M2SPHO7<=hYM)OwUysXJFy=x6W7WhgJ%E$gOSxqnGM`cF6T^X@i^P$1%b-n;x+fv}sC)QBM5x4wAP@o3HH8sFS`iXd_pO&z2`Jog-g1DhBcHxfmOZG_@>zo&S zPxEi%}i4tHj^$!v~{H@Ss{_7^xL2T=E(DT3_(Jv-M!*jHrzjtJro`xO6EJ^K;(m&{kgS)y0M}COmTm@Oe z%!~Lo$a!K@CdvA-R$_w0qhC#a5%b4&?9Fw3^tyR;{j|b!P-D6XFcvWH{I~tUo*pwF z_zUP*-Ma5zq#jFCJQ0}PT3S$VhO5-`^}r?oKumvlQl-j|cG0jnp^Ay6PFvgeIe$kd z=_|YNej(V&Dz4Ks3-Dt#DCVpg`gNRfdF1=(hQ|`bxt2}l6u}{MFj=Bt`G@M3>=- zv0e9a(P69VRuonXva|Bv4uN}axGQ#|C!9>l3I%>ks}K%9MTO}GMC-t^Z^SaSyf}(M zctgNF)jqM%&t(L!E!~S#7@H_CP1(HOy|xOUqksKt=U}*T1WtJtSvbAs+=$lo%chw{ z^`Xhn2RXZnkX@D?y~mbZ(&EztqaYp2DlDLv*{5iltElXL5;$YC#OgV+jVPT)boRJd z=dLM{sBt2jH$-qQUdw!bLWA!>M485lUO**6zas2n%>r1&Di{7SM4ZHc`7Wd)YSXl%+inZMX<@XUpw7mB)~g)p(Q+;cFf86ifSyUi2J2TwXAFQ>uN3 zBHk)*hjPlXc0KsG@{+OY>*?vZap`TM1(OzcKw^J*#A7cwe19Ae2W@%oQIbKrL7dom z962?#idBDs-@%L-9XO6L-|L8qASa^9tVVuy@e21#PvKB(_aY027%u9cYpZ)|r z;zOC&Kr5u$Fn}BwyC5V4sQ#C=Ekd=nk{^7WhgMo*Cbv|KrW$pmWA}YxD<8zkzVLaA zC@szXbeNnTTe*sQOm38U*4Om4P%-#Znn~f>fyHD=!U@366AlKgbKv4@3bsivwRYJK z+-bLznvfdxc!X_$@U9%1HlSowxr;FZAH$@d8YRBgxrzWuF%I;mJq}ol<-vLdg|}~n zae*d|tqW^CvuO6Ag?&*${>;fR@-Km~oJebcbPXw3O~;#IuCSf|-5lSVjg6g*S6kiFZQ2HE=f-`1 z$IR$B0jYjb&)n*Um~qe#v#KgUxuEcG8=9qK;gue@NK9XD;V|suSZ?Io7@V5vf!jgbfZzpk4*kJNY&F`mq@j@$Sx6 z?JHg%T`+!a!OTLNz>zkaE2DFxwxh3Fn@s{Z41S8LPS{WalZm@b6QNj0z2&*<%k72~$Zm1o(*&}Kpe)eAHf(x&&JXdiUviDXp=ebs9Wee&%OwP6R^y0vL-qD5KWVD_Ul%sHl#8m>E_+l5kcnPaSUQxffH ztl32#?%xA6x@>ThPV08$%Y*wb=pUN|K?@JF^Ncg(&TrWs&L_E)Tio7lYjU1wi1c6E zQRXpR!b$6Bpjrww6{EmrKREuSq6^Ks@yZIt1O!tJYJj-x>1malahlv0M=y1ttOE|f8z6qUqlfmXF zgZypru;7alPmza(un1VQY(ar5pTW{FLrr+@dnYZ{*IO%g35`W`I*wj$zP3^% z^YxB9*QGzpzV#~iAMx0yZi2<{0~+@%X_m&zKi4OlKRE@@xH10yNl9RQp#C=>@4iR& zj@OU<#d@qx&nb#23JS?4!==jUu+-&)sSHz)Fz>_xv*|rrw*zU|AU1(R0jaKayE)9U z)kK$-`Aqh-gm=T^rk_h_%L;WOKXuQD>9g2&>V|gM{kVe?`+M2Yya|M5vXBlK+b&eF zrQ+d;yW_5%P$E<*dWQ}JXYpboO7&#e`_1oczecLGiI(UC!OzAJ+9~U7YVtOAEL%z% z9)Mb72ru~}_oK@bu5Aa?2TiPz`acWiBcbwv>NM5Jd~ycGT}Ltyxp1pmj$8HDnfhT6 zn2i`F-?2gmE!^GxfG@B_JRSB!bLM5{&*+DUww`+3NlJVXe6}~);o#(W2JwuIB?{*K z3Z%l+2;4AR`HL^~N2bAlmo1d|Xo*U1_}0U7rz%mbM`@&6zxMKHV1_@eu_J0L5*nA2 zuJe)Rl{kwxd6FkNGxMib#~%}BZgGqixAEMOIV0}9nI8_|p)Pa17?y4{*G##EnAJV3 zf8r!+EoK|s*!AlAe`Ch$J+d+zu#ug^7Mqgs!Xd9*Bop-rWm#bspF#T%!y6G!f~r|p z3-0kC2L14u*(0|=ecCy${a;c0cj+mrI9`=&RzMaYDto&;T{x%d;{%D4A}Zbr_7Z-C zb8}z0mUqnRQy{*rk zX~JCOAfzg|8+`34veSm_&@GRZ_SK&og?r_sE9+xFt%CUEekC@Mq#9cm=VBnqbPBlX~gGjf4`B#cKbax&>zZ-e2g=Y!FW>&pm?H{X6po?lzfA(ky5a;T- zx!Y+7;5*4ET_My{Qx~a+Xe|54Of0dfaeUuIM0nJ(~21hCL)OWF-OhQrfyP zeMgbB;a_hqA6yU3OndkvP|H_i_gPf>V2%lJThOEnIKY!az3Pcu2$!kf;a7v@+wh+`s3I72 z{a7v8CpZ9|bX&6_;i0YZfG?GE-}NtMnqK3qO&xf(?S@naiYegPySM4fuS5z8uzPVl z&pj$+X<#$T6PeU96@210+$Z$oll^0*pND5ZNIGOLiWKPrL8r?`0Us6N4R~lasX~by zg_rg#BzpYxes>}zXMaBU^4M1ML^mgk0^)I~t-1U=EG0I)v9hjd3j|&tZ?d$DpUmj; z8m+OaheLx-%iIcA(K{SuEs`DaF^Q@2zY1>wW9C4?bdz2f_jUoinn zTPn*F0`o8`2F}E7NiE7DJn|fFf9n z)_wZOn8ckbf+0Yj@I+A9I5f_(;Ov{+@tAgx^Yg0HlW1qAO!pfy>}$p!Zwr`n{y+etRJ>%$rT8Tn-3DP}lAVxSCR2P;@UfU@H3_XN6z-m^ zos0@oQXHOT1Oz&+cx!u|ILKO zvEr{xt59IrlM1{Kf`>ukKy=6E!?~OMLReLGyv}vY;7;-VA3wuw-`JX5;JqY(320F& zT%SZYOVw7WFAq8F&)H0I87B=%@4x^dd$mp^tQUj#g>=tEGsh`Q#j9!s-R`9j^gjXW zExhZoQpMkgvm;HY5@Q%gmx+?J=O@1vSf;9l_l`}C>k~lTl;87@W;IwJSj4S(sR+Q= zXlKxZ@94{GYpl?8^K-Sk71?j}JVDn_|MH1B&c~qI?#=9vL_ z({*f!4!XK|mFj)jSe5Al;*nde!B>!JZP>`hoJ+E4`)*WaINko*ht!f`NZD0gVK%lx zY_$i$V^t`j>YL*&6K%7cAJ8Gtb&5s$bY)q&exuv5TwAl94Kg`~2#SZ_%zS{i69NUE z8rI0J?TTGQ4qSuFFRII0QyC}T?>R|P-?>hfi8#0W(^3hL+Hq*X5qaUSEydkCb4k6l zJq)ZJm;aX0`jI^O3h+KJ0*Q7qshJ40<-&Xr4os2!ESVN{q-?^%k5ijiTOZeG$Li6W zwe`AscRR(C^NHVk?w=&`_g|(y}#|as7PU}&ghaB?tC+*H{ErAyP|8|Csem@XEfn9%@>ompM6;#P4&@u1ZxA5`9(GG zkJH3<$Q0UgQe7likF=!3y%)2)C)ApJ+0i=L%G#>BMEs-dZIh=02HoE&ic|AqqitaQ zBJ1g4S3IWY)NR{?Z7|}mq6KU^&o)wf)?M(0#?43?Xf}l@3 zzf$K6|H*R4HHiFNjsBh9S#WOY={0EASdVhjS_!$Y;@LCPz&RTTOU-&(Y2Wr+oN(aa zAX#22=2>jhh^TW}yO*$=O~#DZx>Oi~z5>n@td7To9)=7%EuAUP=+(cxYke!;IDoIF zw(2y4=uBZMn%$_H>AOnZIDds>#cS6P(bLkq$kelNk+ibfI6~1VblJCir2y#W?(a2f z%om-laH3w+jsrpQ+{LPaw$dM1Nyaz}_sZ&^BFrGjHq5&~SJ~j+VNFxj36ua{Vv3{~ z1B(VpLgG=&j9FN2oo*QIw55LlWwj<*E8%v2mt+L|Ey0SHH;WxW+iQ(#?rWmjXgL9y_vUbUGY&3y*Z@2gS&cm3@aGp=BBgYqp__iP0lk0hR@GFQRqDJ&?TK1 zbrFho#yqwsN5zp~7%Q1YX|kv1e^I45t@7&4JHNNouS~xH`3Y|Bct?Ef3e=YE76 z7ZDg0<$414MM6Sh*#=;x=_^wv{kJoZ{;*V2yVE{ z?tC=srW$tn?3epN$l6331?@*Ycs24n*wqd9Fu=_$0-dz%t){K4_&bjKaDk+VAUY=! zfqq2j6gsXB?7yc9#!L1XycVzeAdvQt=CgQ|5S#s%=_RuZku^47P{XLp)ZhC+wY~`F zAdAQyz8HJ8#&cDRzdg|_F0oJr``_5kOK@thBET_S%;E0sHgFWScE#DCh0p5Yr_S|p zMEowThG{_eY?dro`}g;Dk=7P12Vr}7{0}Rzcy;-TRAgT-bwL-CQKPeEzzXfe;4P5A zK-l+)#U$9(9oyt7RT#mkTbgAFbG2J?I7Phhbf@RBY3Z-$H1q?wmoyivwSL0ChQtGE zen5iE z$8=a$1T7aOs1JHNJC&^0$7Dz%{SJC6-9<0#oZ|(DU3=CofV<%Z6QKO3d$gvGF5qnp zLFU00XBDb$mHsebD9hTq`n54T_6mkPX`lUy88K(}%jeA>rr)4_*8QE6S_uDzz-ui` z^%6D5b~rjP^euOrB8utA+NVrA^lKh_JRgqL5p&aOG$@67XFZuWg^d|I)j%?zI)rdv zp$H??(kY-Vo34>ZMK*z=zHmrD_Eqxuo(ro2E~r`y`R0Xw#9Nm1hxu zaRWJ(GiSp->wDFYj-O8DJIuQNq_V&#xnc40h;22Op*^5X6G3lKus~~$SMK9__RPQe zE0{`PtK1`+f+KR^aC_DTWm z3*CS{b~$YcRL>Uf!uU%6*zNreve=*L?~~dS%Fs+tjRo~Ic>YOra^Rb%=7bEr_GM4? z{xn(USnE1c0o|(keSnNW)bgrJ5yW%Y2qNiz7gcXjbO*+o{V*{Y830i8s7wxZW2sAE) z!rNb=P}Rt7mi3b-Or2O&HH)qa^t7ZFJ$`gr(4fd4{Ke0 zPEnFuKC6}3Y(r+#@CjbyRl`Tau5F|G4;Qq{^ABsSQ;wu$1u%-3#X2PZsmbVJ^KckH z02`7dawjAN;^An z8FaVy`pK#*ebkTXDv3_r3(_z2tvkLd;Lya;mIGqVS*AB=hMxF}&jnnGq$zNC<*#rGtHyvdG07hO^igy*B!>s-|&0 z)a0X^?s&1zhi7e)UjO|A+4Bh!)Sh+#^sH3H}qd^7i|+S-B)5K)N`KyB@*zfM(i5=AUEdJ zcd-<+C6>1!!^?v*hq$Dw;4WCH(U zH<2GOj>s!pJ8R~an>O4Nkd=hIuP(A1*z4$*7hel{Qv377b{V`N-$C0Yc4TIFFMu+! zbK-RsjXWIZ4v&W5Hct)bt$rDXjMmtlr5a5)p{8|~S1>Z#ythl`4AgaBT*M7z zw>^3qR2vsYKn+!Wo^FV))9Pbo1^JLKdi2I~V^2 zUG}-M^fJYQS>`U4C6b0}4;`?8bgLlvf`uk_g{Iif3bJCo*n?7U-USMt7|rew2SP_b zS#wFDnd3}34fOs}3qTNA0+N(qQXSdf<%Yr6DXUjhP|C5Qa_W#R`uRQ4Am*`e)937Z z==4^)C!e>TG=p73n8_SbtoYRGCZw6~r#m`nef7JQ%gGb-a|#QtIb}fHbAV`9`gT?Y zan>S;MvJ$NEP*b+Bp&#m2zS~F@b5$Vshf?cjR*9vws&xmtO=a9Pm_ANBh1FH(bBvD zGG;nG(jN6nCYjYgk9s8)|HP2Ccgb3?`}^!%Na3E@NL`(NBmVBYnc3c}A2Eu$m-JZ@ zTsLExqBBDNz-o1hH)L|IS;XhfR3ncQp8lixVHQK_SL;?aKzPnGPY+R12B@_WL85qD zb=KxfuqfByS^h+BZJf!dp@B83%#pa)^ImeS_n;WpV4iClpY~`b5A0yMuH_41q_BH% z$I>t%Ivfr1m4)jLO9Tv#1UgOk*Xd%sNa&R39ck))OjGx_#Ds6w1XDv&bt>&DyI z$-Me0+{_(7LkCWn&|4t-6Z|@{#!Cxau+7OTL>YRr%16%bx7GP%WO?E(l)JIHx;R1A zhI6c?r_)fBS?3J5b;x#TocDyaLNu4!H2bXoJC+!ukZxM*F;PMFQ=P|ktKVw)?gp`n zvl!%}4b@#0ZwpsotJ?mhUf422Oa^kjeCh!3p&TW0xC{teauO{p!s_-aEu+7|%HA3} zTnmB*mB8x$9#~sHR#dQ0)={~CAz62w2K15b1keJ|ik?+7?Pw7^$Pn!YiA4;3b9)gj zM1nFW)TG{ARi}16u&VMgQYyzTwgw~Q?DSJLq$-ldF>XDS-`+iD?hVciJ-pNAGbeVxyK){dPwjih8n5+8ln98+EKp598jHKB88&vH9zCAgUnSs3jPq^=5`)REr>f?SAzL zbuPraezG3l&iV!{mt4puld zQR-V~jhMw<$U9I?Jz6S~%Ichf?e$>O0pH)rPqEAG*t9mIZ)DE#rF|ZD@!7-8sT-kp z;flb4Axmvn7dmUfID6cHV-dCaeiqnhpFtZ-4CDIg_j?VgjI_PUlvv9*?3{uZUNO^L z8o!D#MA#0Kg#7>^)f7|b-9Ho+Jb&!B+^?3|?yKkg%3Ln`%z53Ed>b%b@YL66wC&48 z8?!&c8oxlap3J;h|H}^?GG&L@D~pr)zIin%=4AS$;IWCAcDR)>*^LvPkHD`>2)lasQ}%Y+J2>#X1NT#?tOUS$S0BAroywKL<2xQ=V7xIu{Ehz|k}foQJEZtq_Y|6c2pGSU`HWm?&U687SbJfd?X#(j3) zp5mTQ%DYB3wlrmQe7B($Fx{dSMY>_%iH;lL>{y;nbHu8ALo&Hu_M%1zF3J zP9_C%jl41sUgz;=iWI#yQf4&AG=ZghJbQ~Y>imIrp0V||g7hEfWJcjJIiE z&~ypi9^1rcS|tc-QH71gp{g|0Ce#{6}-0dh-?LO3S%Q|FW*Yh_{Dj}s#P}}bPZ|IT~g~el01Pwe&T>twfXrDEy`W3h+=5Qb_a+o50jfHG0Z=pdB z=;r4>;Q?>%M;GfwI_p>U=SdR**dL%mmVi>}HOT(Gg2^LSbACZgiwJ6z^b^d_m2N%4U+FqjT%bq9cwhMjRbbQ&o7RBTPd2+A zSo`rL=4)Wp`L^4@yXdEmo+6@EuPlLRNr>k)sPoNfLp~Wwwhu;rD2m+-rP}tE zzic}luX7DyGH7gT`Qo;{y&SNXn!tX0L|>L=`y2#tbWlftvA}kuIl@A>4LEdizGudA zTqtAy@=LR{du^Ncw=Z};rROj2{_qzodUeqj#nSQO=hn5mk-Hf$9tY21}n4)aXH4=`aU%UOI8Flk+tjr7Dd&XWpNE<3kGpeKo z@zK4v)eZlm9K+lU$$B-Cty`>NT{DAu;Xx7|N7ifC_=GGA$|F0^q`MS{zL@(c-Gewr z6LGW)Bn_Ik+7L4e{h|TKl1I4Qf1q3s{pt~KYnfXN71{YO@8ufp%;w~0B|p&>X^@)g z?^(DSEW60S)1gjFFpOBO9$CEJ>B>gYf4f%pXuV4*=}+2AZCyK?lAEu7&Xza+wYQTe zQA0AI-Pq%?IMcq31Goo3`mt?SRSN(0UChYEE3GEk4_h5_V`d0zr#Xp+FieMk$fnWiaQp_}UIKu=R*23q*H=HP$;?UheGqV1ubC2cs zkj4o#8{a@?>GFc4&xrCvD=Fd6Ohe%Qr0e^=^R_2fYl=5- z%vl-u_{gQRJRTIU{<$&_wM!l_6iP|f-O4zIObJr2WE1F#rFXZC#o;XY)E-V3G=V)R z{~t|}zrVBW)Q9IlaD0dw!~Y4EG!Co%o4mOIJ$s$5c~WBM*%oHF$uJHS6>J2UdiZ0%k~BM%|Ix(H7&avkPlt8KR$3Mg7^)Q0D&i`4 zG4pI^EWsSWy?PSNMSA>kFa$^)Ne1$_zr)8+iqitKDzTo?n7smziV(3S*p===b4ld4 z4PT<^$HcVBjw#zn>9O6LSJjk#QJLMI5h}|5uasbAWB3WG&h8f}h9{ACI9oKK@!RRX z6~2^~rX$F0#9{^ruVd{;3@1&M0VU=-pDg9{c#4L zcr+qnZYPD|&x zH2k6YyjK^gSE;|@e5ARhKYO(y4<^^SxH zDx#(qRSHy=`oJA`2F4LSEw1(R_AG+pQR7@6SQWQz#azGwg-^NVn zm|0i9-E7C7USghR4er`hI_vW|^1|&|KGJ6_whrL0D)k?JHt80e85`G4(JN(D#PT6h zfdiTu&by9b59agxx;5z{b}SR zEko_w4cPpt+haWrS4EmL##^kZE|McOiRZ8I zSQfKI|DK-8*bi`G-*O2{x}7fAZ~uY|cC+kG(oXOqEWGPok7h@c38l!5x+CHeglOm~`z(Kw4adpsVH6SB?N!oH(Nq86v*-d~qRMrq_e`gFY z@qa7UZOk7>eTil1cLM?$h{b3Y%1DdL@ellQLcK!n=##sNnQjVHUHN08TEE%2;HbBf zq@#*mgrXt_jT>!TAc=@>YZN2eErDKk5kC)JwNH@(-n#^3cvm>$J&f2NjZU)DZU1q6 zY7wB?Y#ZNwFCCdxvIftx*r*d?o9W?+L9}6}W zjUb|R{wQ3zYZDNz8{8!W+;o<{=f>l>_0O>ZuJDQIkXxzH`& zm7;gQBka~yw);j))c;Pdm(EZa-U7l&9k*C1PlvL%T_3BJqCe^8l0b2ZMiN)=^1S_C zzi&$$dASjJk$~QI!9kuF>DD&^v80B^|G;-xpPu`_e>PWF$D1T}q0VpF@J%r1kI8Rw z9d6YbN4|25&wImkPsNN_;d1)|342zFu>$~Ph;~tgi_~?B04d4AlQB_v9BadkwUDUK zSb6`pYW5cGJI1dbk5gE7O^+&}?KbM9Y&>#F@k1MkB)YuYxP*v+-)pjLb<+JlZo#=X zW2aRW!`#ZnTPCttO_MnhBMJE`MN;9x^+v)k!MmumfNLjqi76C*NAv^5R4yW=s~*j7 z6U$YX;S}Ur=KL~edS(9h8xuUC_fGZq4azDh2fJuff%jVG16YrVEnD&4Ea^S)y!7baRH}G>SerVGtoYQhTmZXbIrYnR-t^g%xo1IY zeg_as%p%s11Qv}}zZ48dpQXTsH#2g8cfood2*T>Xv8ndI*B&NKca_D@Kitf}3GI5; z!zy@X3P+6qlK>D-=+h1E-VeaKMJ-ehA)R^0TqiAdvL}vHnZM*F+_g{rd<|cfACY)p zCeRD^he7M%r}6|!5%aUQ8*DBV0~f5N0_vcSYOBTiJSY0UJ_@u0hPOeG#C9vlH1Hv1 z!w4#GS4L4UEY8oVGw1Ty$m0~tpJcn_lc(2YA3DU{d@YvtP)Me%AJS4CD`SS{Y{J1zk~02U&+?#K$B)JM>jh8nmjds2Z;fi6S@o6NO{z&*<>&O z1L86%&sApQWk9eJzFDuizwnC#KWPg0z})Dij`y!D)ng7rtPlZLmDFkEQ?P$v{~URz zkqBT1nTR*)&cYCm^dS1$UMoUe%A!tauvs^%MJlf)ifXAvgZ>P17M$)psFdygM|0sQF-lo&vSKkY+F~tg z#^A$lMt>KFVfp%QH2vL=j~^2xf5Tt><h?6W>9(UyC@!|9?OJ+H$%mAB^A_k|kOw$=?v!pLngP!I6< zNAru<$od=VWK|+v?@%&YNBQ*;ftEUv(TIzi?@rvo-?JlLvQr1Jks^B zpv=e(y5d|8CIh{#IgVzj;Y;&e?e>3sH0k-^(w1mRG*-a3!OF9;?_f#TVFCN$gR>(CP`)&ux zbdG*%Tw#L~q2vL?c7;VdV&v#iC4s_0T-*g@9lf}YtXWs`i+TO4Ft&#rIyn_ z{8}dUiR9pf@K5LO=atNHA6BM!%=4ynbCIS#HjK5}PAEnP)%xdLcEj#_DI| zvb@?k^5Fjd1?Guob+4^(5uKZVw|A&Pmcw`*enkZ{Rr$x->LYRTZfc<1ImH=k3*DMe zz$Ow4UmyY^U(qO7r#e?dB(8TlOX(ubR&H14hb-@d%j9UUvt{Xb3#m{vI!Aaizo8*{ z>*=`9mHs}Vh=Pn&=<8%d;V+-b$p#@HJkSI>AQ%(73A{OCgp29i{FxPx-FNF+9XMxg z+?AwQRb|(zRE#;>d)ZFu$nx+G7!$%_C1y)&bm$vOV5u%!hs8QaPM2$hTO!k<|%xi<#_gc*Yu!f?4gy z@%aW94Dx4L`uLw{YNk-0vbF!sJA{A}x?g(fk^?h@a{<}jX{*QI#EEJ~p1h=`kOW3X z*8nx8848Pj?r4AW>&;-$Vqc4iSN0%Zxzi2(1?+`|6KLV9Q~9>2SKlpqs(P3p^Ikxx z1yiPoo)vL)!WC+P)fFQ*lX!&`_SEi%*_@tG-2|r(neXR05!=4Y5A+j?m9eAT@B)w0 z=_?g0=6UWiMThE9f3Vt6y(~dTz_>8zXXqLTG79Z7s^GZugb2+3sWE&`$$0$bM=#E5 zFQLNQx#HO6agsq|(%6~b%4~>#DZd=)Q-=GNwNjd8g64pdS!-0u8SNXE$Hy|Y$+EhF zyfxB&ka(xWfs$@zBRyDBt6tx$0BqMnD9b!47uP*cH!g@Dj@P42_DfVy-V~jUp$d~J zZ-lM%`Tbw28>8_UVrm0v(8()z>$)`w(QN~|+|(B4y*TJ@IQNCuQ>_`;l=8xUzxxrh z(HXSdz!bl5X_avNr*4mFuJ8kHn6Zox^t|`yuYe%^)PFQ-X`{GnMXC23IvInT?&bKC zxhwnDkshM+keH1L$klrOf-A}-o2FlU!gG}|u<-hHU8x6jBJZvI+7n|<|Ix5hB!oMs z2J^NotafZGoMn*<&d}&{{vW8qHzRd;m1Vwfz5h*0@0#`qQ-%1HxtvDiq!;`t`l2>B z+kfpYiu}0i9A(h!R~8Q9BwRU3#T5EI>oP9UH4Qs<3pxo{aP?`MGhisQ@gW;`FCj_B zel?`LE>m^p$exESV?JeH&MRahI0i3Ph4nYM7dMI*q+gUqr9oT}BnkDXrQ5r5i4muP zq%flu#u|7$UmV@!y@mk8W;Y}11U!)9OxjuAo2KukGbcnghg8C@mD>a@gB>94taewp z$+x-oGRW7E;RGN1GSjnJKkD(^*xIq|L5>iCMdI5P+c*6)x@9U5AH>WYVrQXMb{jQ) zflBXFvBiI_YBZQGw=-|c%i`vQeC9`yM{6@tWL};4%xaUBzV-_*1OXmibPKf9f2)hb zqNlESesj9;n^@ZF?yh5o^Pgi!cf&&Eb3eMhu&1B6pR4-}jC67XI)*Ix1uVW&vkSvL zIn80MAaC+i-)iV?Dcu`L38n1tnxuI|yG}Y2E2?>uiYV+|#Y|77dC03ipG}_0hxR$c z_q;}gn-WHEjyCo16dKN-LS>f?qjz3esDO?Het60_F|=ioiiwiz+mo_4bKAjsHT#0bbKd!(^a%-xc1slk%csOwJ8o{{HO*PK z*~Wk)UktODI)4|~T4&)S?;i&iMZy7N@gWm4DMIiMwwjiS2sX8?+s!uj8rR?r)wx*f z*(dMvK)OjSI7+B%l{3*v;%1u|JQm16+Ev~AiQJR_RVdq4)WzWAZ3<-H_lsvDtNooY zriv*&fa0i8q91Z&=!f0sTlJO|!yma{u(GT)@Nu-$_anjq757j|kaypWvoDoTaPRc( z54P{>5>b;t5d8Pm0u5yG3zC+4-CxCU)LV*i&cASev{Sd<#IR<1%KT?lxog(8@tx3s zm2^>2WFO)^tOg1kUW-KwwR@p}2MQCJv^+g|d&YX)Y6m^KBQQgZ{lJv#bWU4eN$Y}0 zy$C7Q$sthxncppAYO$ zoj_PZeG+Ep!(CU2F28NgG4O249?ir%0EC4tdb%d|kkRfpi0Xed+cQg$KLC*?1dr^5 zTyWkh^oO=L1v(S&?%dzKWWM?_x3qTj=de)XI~!fTL~+-aN+*%IspE#%YN~3tNAfE; z%Y=Z@se*5EV{X&@e_R(c3NH$1#hOuo^gyU3}t0UJJ@*%Y9 z4C|np-VP80Kmw`9yu|N?AChWkE`L`H@T^p;cfCTN}{d8y+R?3dI*3cu2w>jlMYC(uOqP3c-g+qq9m?`K6#?sjeoEI8_j% zC$ZH|qamSxOk{~|*=Towt~K}x!lF_zEkX5fpP>^Ll64Ntd?NGz zXbf6v$IGRz>w5UO$_!rH43tq$<_uwgYXBe5W2#~wp`Qp?R)@g`1^)K&Ook>(oY6@6 zcSiwnQR~ z>JyP9TrNq+(A-p|Pj!YI{!A-1_eHGgf(Q;@HYph259cPGrHj>`IBBf=LBD;m<}3Szs0?)B|!8nBIp*Z?Ee zfpd5XzZY4>_2k0LcwuXWrK0bc(FV`kX7vhK-I30#dwIUDLrx^7l0U)I07sDD`7Kiu znq_A5V`Ay-!vP)2HBg{K3xqvb05{NtS4?<~o#Z;?*$&ZYh)7%vZFBw8PGPZ0*g7z! z7`C3SJi^RBOKmRG4e2|8P%a*Z&NO-H6+5Jwn0)#Cu2co-0u+mve0%e>n!Bd?TbInR zd$Y4YB+KoNU8CtsrO3}-gY=H1!o4;E2bW!t)9kY5y_^}-&$GG34n|VnPyYyF>0^`b zd}16YoEs7tLgst!I#zn};%KwpbwUj~$afqTtkA|aGRjgrEIKU9xU)g>u5?;9ObA{+ zb<3pWt>kE_A^y;vAUh|^{nwTsOHa#JX3F%7e_@h2j6+lhrEE>NQ0ff=l_HhzMor+! zK8T`|?9@BvZ@Y#Gpm;gdr4Hc&NN+zZN7KLJ3U8Icn7xcDY+-6>b?Di0LVg)VVc#`|g!2+kJmqaeJ^w*2qr} zY8tY)2d>Q7!D=V;tvHDf!0q}(Gtv#l)+Y9F^=Q*%^Czr`#P2AsarF!S!#@zfsF$`| zE=DK8@f_Xn>*CdI&qkyLHl>RFdJC-ai91n#cyt$g8iLtdtc~AA@rlH@@p+?wCGwgY zoBNORGIPlOE)h&mY&Rp4^BuTrNI!69BJ7w;kMDoFD%#_z%6;Y}jnnc7x)jHjv# zp}Ohruj;I@L-`{!i&}?^#jVVTPd`~4KT%o6{zzn?yu$Cyr&n&&qtlMxaosTM1m9hO z@nsv{8jl2o!>(&?1}(N^!Ode+G<3QsPW5WZ2lqVRhDkZrUP|4}fsN(+p=~bQg`}H* zL&R{%=)3E_6@Z6tFnB@gm*(XV-5sQc&C7kcYPq<9QE73r9NjJKmW{eYOu?168ZgY! z$O%fv=i3VI`}Y$0XPGO-ZKIS7vVPxbVNPjfeEAe9R;O-Uj$9VBqfQjgnO~mQ5HjxR zyz{Fw^zvcZecWWrFcd$qaPG)5JE(KAdT`0Igdb=5d#Bx_s%i!G8n>;{m&W$vjeha` zWyHhp<2y&z>OB3H(eC2A0_Mv(iVVC--)DLGGat1N7x>pX7n6TaN}bjmPzK(RK0Lt} zSI9T5Q?NdyiZ3s8-#>00w;g-!*w~c8W9jNGqc1ml8TUcQ)bSn-lW})&H(4Jbh*Cim zCPfS1FaZ*->*F_q~+EhQGXi%#mu<%Gfmw;NWutq~t}F_OKgUPcojI5jGUe zLwi)cPtKkEJbK$Z-xdX4vT~FhD{j0sw|mC^k0vCEpsKa308O(=72R?1jU5T>_egHu zO*+Ev{O5#}#7A``#u;rPuZcu;O;hR<3tfZqZ1Z7V-{M;`+pisH-cm8YG#NjqA2O;A zI{OL~5qW{0?w=+Cyw#^zhdv!$Z8&E>4U{=mmtddxXA&&=bSp*NX^k7wL!YCbRQ!f+ zG{OzT+l7`!l^z_&+6MRxqRK~ zyLN$V*UA+_S!EL^V5EC6qAke}*#C2ZxB%ge07AcO-eMAm9<2V@$77WqMIYsf1^$9* zyOvu;CPw0;^lX~%O3SKDOqibrOl*nlun^sEEFtVTmkA$W+r8+_gYBlkof88GveI!AY6RJrQJ?;OoD4e6A#+ zB(?>wxJ0e_fpc_lz6sZD8#Kfr!tQdZmOQ zNTqKlY^2GS0CU+u5vcR7RADm+w&5JL*SUEmZKwT#SL%B{`;XGnTB1kHWLfH98^hU0 z_(hV_5~lNvdqD%A7`{WB9g%PCnLI3rhNkIq{q<9AZkGO=QALJOhp7x_X>i7M^>ZY| zS2L1RhdMW!tbi=CkQ9t~YyLSUd1!lJds|;c763BHPeC)q6n2N#gW0bp+=%(6VJ_7> zcCRqci=r!m-H^q(2_0tR>@8vW5W{}V9rXBjEwVYuhU-EAbK<;q z7maVKsQiDK1rKI1j{h={qudV`o~)gdGE3>9-XmDgSh?niH;r{?VLibhf$4iKeb=7$ z6bS{y*=YL-osUL3j6Cz+FIy-E>c!Up%Q(&dp9_341+1Zbh>L+25h#6yCIl;;eG29h zSa{XOkTZ>Y9(t*-4J-Aggr~ZS#}@7X=}kGx>kZG%|BCi;Fg9->1G!8w!6h;qNMNEU zJb80l8Cg}mtE#^B-&^*pQH1N!U5rN*;9s<#3zjaYE`adQrJ|9wkT{8vJt{V6+1bSW zZ{+0as_CO!ag7pniVgR5Z@EQ@vPFWg7aOHI5rLJ|zvskgYu*w6^=w0)?Or0RtibP>&QC{f|iwxjugUo~gck_JZk4Gbyu6DU|svfZ}G)a&D z-ie`P}>NX!??E$6Xut|zTR_>Qc>#J3~~oD{dS0x?j&C*4lsK31#}RfY%+K@}qL3_s|c6{9~BVujW}AZfJ|}B$J;Viz8Ya8VY3<&2eU4Mt_{e|!H1AYUW4|k!^>_92V1{hN8u}m)5)qu2bb9v!dY9@we^~xUuE!<8 zmXU>X==pc`ugi_Lc%)7(LC&H+1FbAEI=E&fk|{N{v)4x_;D2Ab%`1CGlW-j2oxhyy zoQHloD$`T+&MboNAXi=(6jhR{cQ?CnVyATfa9h$#kB;?^lYYb;k9dqq$u+tapqKLc zw$)SZSHp5o&()W1ajPMtur{$-6r^6Td^2&yCv>i)sX5B)%tsPpiT0v^(nqcojOVZ6#>scf&cW=?)^3x+v3|< zqn+{rHd^%S!}RCJsHdm%j%v8N)JY)xh z|Ky*xaC0NWDrT7u)G0Tc?=&7f0BMG0Vz@AFAl_iu7)s7zT==)Dpr@A{ex2L9yuN-z z&|TV{yvHf@vD`QAV`&~uz)dUTDp>-ILLxk;J=<2Btl zi6K05^S`zp?tGtpfzYr*#86fIfvr;F`|sU4Fk*-AfuV$*DP8|R8h>i4CNVR!D-B6^ z1Wu%%<@BNVYz(bj^#{149^Wc}yjmEL%%PTsDQr$r z=KI|8Bvw#L0nc!^41V0X^-18|C=RN6j78S(p9QdL3)b~5D<|rH6l_&l@1|M5Rfh)MG#QwHBv&TiF5&x z-a-w%1rll?#l7F1{mstK>^{5uhY37L67K!H{k-QGuIfPwj`L>LR2YEJip^b++X<}^ za(fx1Ph6jY&qX@U)=6g+%$f;|e}$ zFhe&_D+x3PCV|+IF5DleRfx;B8$j>S*VpBa$bN&zY{*Pm+P6*;Xi<0z$Y##B0qmjh zHf!C^>s0{_3v45Dx|Sm6R->8>e31|8GcI(KRUL(U%+2{Pl(A)nRl}6wEw6w?qnuYB zxMXzF0VpPRvWAIR!A)f{+J&3FwfRd@hD|aP)Kw3bU;G5 zSvw!9t1E#G>Pl)!M}tfBkjFXn zut9ir*3lLoR}Sj1QFT_;MnISqqbKKFOXuYw;C%IJiBx}G*5q?K;U564=%ZGc z03oZRD{iG}Y=1^szCIaW6`DvVqf^Aq^7gLs7qhOpYQC*g#4|Jo1aY+;%|p$CajY4v z*|0wl$}QO#`mp75@XGX-z)s@I6NB2$cb{wP&%CHQyr^fVT}2ygtU)2` zQ5ly)Hu=&`os#3WbH~NS);KACz~Afz+`))BAn{4(t2v5S^&o0DG4bXsNL|XhK6d#E zXbhid7uvqkGw6C(ch6RIwDv6rFf66>}BYT zG54Y~XL6Esx5>WJ$?%~lNnnFq@4dy%Orzl4w984tamMrw}KI5?n2g+{)0YM{Te{!ovR5qSxkGdqbU(f1Dir2~Hm)-E5P z-l2gbr=f9xOJJ)_SdhXOlGR8;uG$cCEBKF%F}Y1V{EQ|o9F-Cdk>SKC}nz;d;nMB|E}FYZjW*lljvB1{CP;H#6%z zCG(`KSX?i-J}Fn9DYDR{cErQpo~Ye8XR`i!XZagZiIFHroY)}wB&9sA&-W)h6z#cF zSb%DbLyXQ&$HHsb!}WKBhhVoSE#qOs-t*-Kwr55XFWwAJv`%|VlL!DWq?GF6`rz7Q zspc77?2-W#2?Q!{6Kr)F5tvgJl6P%=+o6yk4F6h8NxSZnLm@+UG|~`0zKnAj1k;V&vf)4Mvq>n0gY}5?dj|h z$_|d27VzxM7607@K;4CY_*g4g5nji52rhR;$$p`2>%PTcP1^?3=}-)6o>g{;^gx8- z=oUTRp6IZtmz4pIfSpC}dfYN1BUm;D=hLl#2|Tj0b9rr-@aF2E)|GsrCF*D?WEbUM z1y)Oby&ygG-q@CJR(n$8Xd8=ZNG&ftBxPvCxcPVTA$c=U01QZuDH46AUZAC5xsPl$?;6VD%lTukmRu0J2v8lsFZr6uYzCPk7h-Ccw~^(3yW7r8#ngENKx)Up zW}@`1GTnK)GhYi$bFgf-1w3_9!j5|ov%O=18W~zg+o;vVL`l`gQUwM-(O87g3$8s- zy}n7ih$PgWmvKt{$A8Tk*AE(%tpo zu-vNWAC!7^j0(EW6`~PxN*k4dz(3U;DyttqYToJCKR3Yni)-!Erh z7Z_Zey+}pu*F()ba5+3q*t9kz|<$5g9rY)m~SQuK9 z@WFhYW%6q+vM@!=WLO|VpCcgL=CY9RDfI8Jw%ebBOJ1L&k9b3W^Dg37 zIoPa$c%|GoB*a^8`CutdcJKG{(&vfg&ruuN0?A;_i4s}j zm(!%Sw$4!ZZ1ypUYUR{bl7zp@5GkSEY*uO z&+xdUuiwA%9b*z}Y?4S>R_b}PlH3UFDiRWIOp}ALj6wO!-3@(=L3C%npqxVp(-kjy1;KWz z;{~b_R<~L;^Y9O~77Z*xwwTgxL)D1Fof22}<~=$u$Z_%Tcg+e8$sX1ZHfa}lyjaFK zvC0yx+pY?l7<%2tdGCH7-^TpRAt?fi199h8k2rajOkj8jvWPwjmSOD0@?~A5c)B+ zYZGP@PXKzMPJ+x@|1<$6`%;+cFoPwwDFZ@urqOS8;Q>w#`fwVMUS9$_(S*x6@#>;3 zA8~GR@u^t*xNeblKAFweU(aI;kCc`^a@_zWg9wIvq&ps+2_#9gb}*yXLIUFyMTMk~ zQ%P<3L7;SyfjrI$_RHq;Mh=&Owqnj*=J5AK#kP zN6586O@W=aCngDzzP%h0_mAx?ZMkD8T}z^=OljtjH9auPaylyF=bJ%~XF+iXTi-ME zN3+rrpq2#`Hj=m8%1G$=v-esaS9zY?cz#ah@C_A3<0Gw?Z~0F74kNf2P8@=Np*k{+Yziz%I6(9OPd*ygec3@Czx} z!`_a}IY|*Cx@S7GWkod41BhhnDXm(83!w{Rmd^ZjIL%c-d-q*Op^_Kfo&K>tTZ8fR zZP04Aw4PL{>sjV1#lu`M@YYOB2Mbl1Z*dVJHR)01*RTCHoyZO=w z+n71dkF_#hvta^eB}@USn>Irga{7!L>Nl&0SEH~)M4>qMS7wX@pIJ*w6nm1&E-*g1 zxd(np2?4H<5NzyvvN@L4hp7g=yY+?DyhcB=7UL2ZL?@6{V9!7LFr&5Ec`Ris#OxyB z(7G*M-(!PP_QvnWC1TZaj1x>Kv3OkrSTvz8Fq8Kc?iEsGJ zV_A(f?3iT{%dY0xS{$*rl>9h^>2DN)Aag()YYR`l_~Pjt3lJ)`?vLEM0I$R~kYPV? zBUN{+P)uHxZ~xN0cz*L2u=Gd+SE%}uO#oW_^T{|c3)F|$kq|Dc>m*+0lj-K*B;j^5 z;ufn{o`Hu`l!^bC+C}hGbZujJ0d%E1-;WNqcqbCw% zAWdn}fn5L|A2sn%D+y@}=c5+aXZF>W76wJ(1un@jF42os{?Mtu0y&OL1GFlx z#8I;|^r9!S8E@aJ8Bg2fs}5g%+hhi4q(;zgj#4-lbkECJT05gW+{B*-s8};pEqU!G zwzQnDc;P>=M`&`3{BrDd)zg}1=V&cw#+xkv9g~$q63(IU1QJya&91{PQHv>{kVWcw zCdpZVA3f*Qw(LBz8fHXTF5m<^=bd0^r0pCtMJ zxf@7>f#&y^ZuFPa#^BZL;TAW>#&w4e^qwhs@2N~rV>^2^l|`x_D$)2!Gz7^}&zi4| z)8xxbQS*rw_pd&uZkzD+V8npCqt7t82Ij-qd$0Mc;GhXd4;P?h|O zDIVULmztm;(~VteU?nvx!SJ`93GsTm+)fmloB8s9lb6+oOEY?)M`95as;jQ{OK!w2 zdhJuWwvn|jJc*1tu8zo3cYVC6TiDPn>qePL2H4e34MmGoc-Q^+8`#16ocpNlv$t0q&^pKPnR= zcO+sWoXwdG(h~<3i{4y$fY3cdA6?2Qe$c3`UP>8Hn{o4)UuCmPvn^SX-CurYXf5c` zqYo)R^dFl0GKWm-A|tSNi|G1=Vl23FT6f9$M?J8P75rG>@mIfJ#|h-8qpPyh-p>#- zclT{IGxGJ!HOzzfNq^}$VoIYBsv3@g+O>0;|D4{5<$sZt+)StB#2M%8z}Vd3^`ud4 z8u7&B@mhgt+73*Pb@3u;qzV}3cYd!U=foMzoMwN(Uu4gycA-z1=k_4MVr*h{Oc1!L z4``JxeHe|h65c}#Y|s_du*7$A?crvZ)6e3$*i*wpDe9{@ZQ)tA4vGG{)-5v_@Q&$F zq}vHh&d{ULFv#GJ72G1<{|Lm;=tXr&nVbGg_jc^VpTbsev={-O6D7WkYC^?3O}pLt z#4DCW;v%vvj8j;07j`KRNS7C=x^2oC^VaJdH2c)zt4eqEFRds&KQupu_59V-@??9b z0cj7GT;}I6!q%kR=rd1z*Dr1E26m22%`%!iL9FLA!wH(e>?arCNM@xuQ7$dSSi&Rb zIPr_GX8G#UsmWFsWOi)%=c`4|Wt^uj6glv|Dy^c$nGqcUUOUzx>L?nKKdqk!!TQ8_ zIl^65l)ffjc+VOW4hbN($rzBxU2)mK9JFqm2>7yg5|uWp?X4s{Ij zYg@4WSc#qO9k5P($Gv(8-=893fQ+VyB9vfEji+6qJdRhX2i92^&4wd>s;1+2+$^*?NWawG;u;W&$5Tp+ ze0qRSS40bH5gmcuRfF;_;jEQ_H)EqyN`mv?o2zruanky$fzAs-ODYx{l6P+! z9N_U(pY>`lOKGw-w-g}6rdwWg#5Be_@pnLU~_9NA$j~5ynEMIv>bON2k-19Dx77$?4s?5NF7^yhl%m@7vOWfOLZAQ zh%}LsiQtE$n5rpUY9`{>oNQ1>!iRnBk%R4G_NJC);BU81w_uIomN1(JktRL<)$;~Rodv*u-?Gx!tYgmZ+Z(Gw2>h~-v?;nn4-7Kqgnx_y^XmCDBBJG zH+zW(v7Gg8!ky)oD;a#@C(NkF%yTZ!F!8sHEU7w>MK7BwGjg&ALCF;I%;U)5OY`Pa@`6^CzD#A%K|hvX*jd1t3>i6 zyIr}=Z)`Q=i!{x_PUGOAB!ILAu6?iid%bN5splt*{CGf4aOY6XVE!ZZ`iokc`yH-@ zzKT=~QF*B80d8+*d+X`gU%I1{>E0W>TfIhG4m6$+PI$yhj#VC7rE63ceOOM)GJ&20 z^3YDAQ6A`ute~sbE%eB1s{{U?DA1Rj&xl4lESQYL7BEE<_B?)#|izZ|k_@TB{49yupmASb}EaGG*QfZSS_Uw?GNI(lcASdtuqt)+rEixp;y z)kHp3fXWRU$vFhh|Kx`4=X_myo7OGTW-O|9l+85M`dL^Vy9YwVqDa+*s{XDMB~xC# z5n&&826ZQ{zjRS*T?v>`oV(wRJR{J4`8=nA`}mDfAG`U(T8qlWU%q zxuX^T_@&9|+X+U3kK9wDi1Jy|&NgxtnXE*(grq-$;W;QoMEsNRjP3hi7 z#{Mx|o+csf;v>ueqJ-xu6f)qXXEBu~<1KJ3AFc~;fD5+FuO4f{Tn=b>!bAzS{&~;d z`v~QpdP=~Y?sldkCi>YMgr;0^PwZh5>R`=t#n{m>>=4d88dPq0j9=>?t38&v(5cu` z)O~=s4mA9suu;Hy)oN{};Xqu1?FyWq#uoZbCt&!k`xh_rpq5|r4lx{N7hrhX4YD|^ z^3{f`kGWq25zC*++13C_B|;rno94!9Dzw0sw`2TG8L{ zb{Dyr%2!Etk9B%`NVFbItswryboZy4#KR61^9YV@<@C6j&tVS+eP(#&mubDHJBM<1 zRH&D4{o7sTo+k*wEbL+DgM&6x+OeeHsHCf?o+w{DW@?QQjRD{n}VgP3&+b?y!evCyxuvyyfU;w zDc3cwNsZB+onh(@66s?j+fp+AW6%8o2rzD7WE(&g1suOOV5-!`{gSA`r{%(P6c@3C z`u~)f-TF6+FKMH`8qI{om>W+VRn7Ej138tpIw4=bo@A(f6z-+#y?wWlZLV<9M2P&q z$-n01{1#6}#V|ltd8+(cmj3%*^v1t<7VT$!Dx!n4g+%((zMhx_Cp4N0uBoTkEN+|p z>Qwo(ZMXM4{`gPG<{A^}CKEo_AE@0Af#X!O#;H0U=SJ9E{H%XvQ@&qvD!@Ife^S!Z z{JE+bBfGbwtC`VT8I6ETf9Wjt=Hdrtozc9=@tVfW7#?t&f1-=Lzv;Fi#NYIWuWe6N z?bz8j3})Ab6yo}k^OP1`B{2rJMIGOpBBB=HZmedBw4XpN-i*N~kXb3>q+G^SJ>fXY zJ-ZScEvIE1vMIpW+A=hdI{Gt}KiiuFVTF*T{#zyRe<|n0I^gr)<|;t|BlkaoZI$Ek z>eooo##Jby$-DSo1Nm0me$0ppz9Qu!SL~aTq;H?9wyk?^WE_@=oH-5$E&@Gl6c7oz zN46s69>Pf3NdYh%Qg{G)Nw?UzBB!Vo&#hm_oUiL1+mMuRBY!rQlRDX=i473-e1Pa- zBB`*`F6Jt;e82*osUr?lHZ0X!Om`6=c1vamM&*paF5?Xi#gI^1j~;cd2iGK z`jyc8v^hTzfO}}MmFU~;TV!HvV=E|&hX?xdPHXtkd(PW7^H`3Ubr5YVeJX3Hf+wIs zNC>GPkFdmj%%Q69ft694+zvOS4JJn2dP!&5@Im%(`qhkX#Aw2l5$)pOH_B_0SpFnQSntOmRAavP(fI^` zSV+pP^9AC+@}>$WrE*+WZ0^#ge~^1V#LKSeMbChh<)3hY2n|KipZm8l zuYT>7D24O7z?o;%C^`Lm12mh3ZMKfrb=el(in=e5FtFlgMJA-wG(@MyKqJ_(`(Mm7 zSM`s8NDP_<>7f3n?SJ<%64O2cL;|B1fkZ$&2Tm-iP+wg%_P_rDUS?74G3fH+f5iMT z6M3~Q)SID@{?;V@raMO4FxI3HoR#4;Iaad6e;p|8(0I$Ba+xna3witBpV!flIy>9& zpDz1AedxGXqVP5xq%+7dLVDV`U2g85C1yx2HML&VSu3nxcolmb#FTGVM^1TV6Si)$ zt-fp(Ygcdbm#*9!&g=>#QZ33gPw%1sfCshNhCl~pe7w&jDE!4rG%oD~nj(ZDlNSvZ zDs3s>#@ss*0K)%sv_RkD4(WFPTUYxC#jf{AH?US*noEMg@!_wX9^6OYbm#O;|>0AxU9C zEklI2m>w{l-bkF84S4C@&)5gbVV}86Fkz=04m7V5O_YFNm~+ZFsG7k(RTR`Wv7JnL zXG;IEN6TgH9{4>#5S>60ai}D#Ltl@eFF_@zJWlDI*W`0M3TP-kULB>(!5J`Xm3hA1HDwPA$_TFxOSHB&ysH^D#^LH~t8h7%6A7u-@3g_2H z=v)~s?hefVjoGzC?r8^B58cylXd=_tm$TLh zk(7J$rKaTZppN5F_Yrutn>(}WU%F-`-p;g9$HNTp;VvcFWBVznrWk*r8{NZ9!D>UX zDnPwa`jh~Q+(x=Vo>vdm^h!4bHx@rOc&uWdz#;rrIeDng5Z5`1swB;VO!e2Vq~BTARC)AkOaaCFjpjv`tLr__r2I+TbiZ#(K;R0bYIU=5y)z z6y>oZ)y0mOxUF@<6h`qVl3tIKlQ>0j7l`4D^DEn0T@jx%(l)~1k@!yYpd`s2DyHR? zNPTiUuIFZ?iI5TzSq+Zwp-Nxd;meEGV;Kt?yl9OwSEhmAAkI>Mf_F!@^rBG-#} z4)p^>r1;|CVpn0t(`wpn4Y_q=qZfsIxDF{Gvt#!|KTS*Pgm-?)-`GO0?H2AmU7+27 z_1jz`Df!BcM^Zp`&c#-%c+O9a6~32}f_CaY)f9quUNy>b8xA}Z6HRe6v>N5|XdK!2 z7MZWf`zO}eZc-p^Is(PEH;%6aj?XdS2yb85U1HwE$rOiQm^`1yPaRzYH}dqvzwo;v z(<6QKb_)D>YN|Wf^G6$(ws<5%w2VdLWiea|I_;(VLGQcMcDxqq(g$k&KPrCLz9{hx zsb$+mju-a#{#yMl^F`e*GL@a}oQOJAb$D%D6A8+h1Df_{R80tHI+>kd;zN=?rK8<( z>FyEhr#eY_d}4??RsWWS`kMiW84MsH41Ws~BLT&hK2b6g0>_m)%`RyB-e%bfHctI4 zfcxGWws-o9GO+{Z0(}I;Ux-2iMOZivePLsq_a5QXa4)y1|3_r`Zu%dtZbt^xwXlyj z&IyFxoe;u2?Fp!e3)o!<8Oy3ix51jFCMlmOn;q($3!ZEqX&A`$OoL&pK)HYKVN%1W z|0w@51hC|DR# zPT4G$e+?~C@;_nP9BQ&Nq~;-aqO%oI1bEvFy(Q8A1M(uHe2`7Jo8V|iFP-+Kke)v}N)k)pi6( z$;=>^-g@?Ydp~~7>!vN{9AtmJKW(Oy4GZA9-q6;gfs$C>w*%WT% zr3-;eu=$IznMwXsI+sH?o+po2!Y8QCA>ULP5Yf zGO*+Z5HBcKcN97)zfRV>T_pJ7Ny_p~#w0(2*ffnB-olS@$6!xeY6G&iL9=llMVb!L z@T=BZh2d5#d(`j7qR*6N!m>xHCQt#A@ci6cb!J{Zg7AB&^nCd_2gtjEHDxPKx37tB z8EM9%#dYCUUtZ4#ndzG=4>^wFNM;gw$jEy;LUTCOJX|tJfx@Lt4uT3gFg% zo_7+D-}{SV4l4K-(LZG25e>QSZF)CQ;5SQ5%gH1&&%bnI-$NBwE98`bHPUxYh z+=#l+__t(}IDcrZ^JmE$Dd#>()Oc6&e_chsc_rvny-{a(o~RVA=<{r65Qyk!R^ZP7 z^wLAnJAZI>4u$#BJX3^6!Cu7@p~hnRYp0zPmtm5gR`<)m89r=N^>zdrSr4JDxyJKUHW_M`|P}kcC??T(=!^3{n1M ziO3kVP1RNT4j)hYjQi#?k0VK4yr46>>>7imyCFu~nDS@b4op}%)9hsHAi2q7*qx1r z!oy4FO|fmxMxjhM@}{CG0F*7%3EmRW^nk2H8q$9UMhXJzMVq`Fb+m44L)uKoVTvde ztv8hOd4SQj-c$N$Bo0%_%SNcBh^6%5TJiF+y=Og(2 z7}MHT#03$JNnLN+e4`;=P5Bi>PheSRymxCmQ z$XklPhbfj`B-*uS-_j?2B+*;kLT{bme+NC~pGNEmQ&hh~3O9UHtKyn{C|kg>bFsBV zDix~_9%URDG$$An`eX74Wk#975dXT&ce0-)I8RRPSn+ixU{xNGLf{al4|3W&a(!BH zDwDI*U9!xSJu|qSFQq~?>OL_m zh4u2Ch2A2x9O%w4X;fE_R@{*2*gPY#+>>~em({C%OW@j`^tyGOg=ewIK(YL|{r8UoUS0*=8^0P1log`efx` zfem?7?E&~G4%XZd&V^AOe@pQuVLXVSE;!*`z#EfvXYpiGnsH3d7HLvjS8=Ll?}|QU zFF_*icS?%#=q_o`)}=`~*? zg%CXsgNdl0rO1R17}uz5z>;G0#uF5_pSIMSK1Fa@ykxesNwP+UoOa68Bb%n$O^SPX ztXO_p56xra-(%a`=|GT#v|0f4wz^LaAs!VeCDcuR7Ns!hmps>d>pMl>tUPQnT{cxR z(*|O41ln_4I!1+!em~yb=+QlP%q5Q{tR#}iN(&{wWk!!2J20f%;1By=YF%MXwt1WK zm7xolP5JGVMOM?S2fz3WzdSKpWy0Sg7HU(oC?-Wt{@93^kfQbNSAnjG#U`W!kDsdG z`}8%xFQ=t5PPVRig>_W8usoaEhb;Anm$#UYGW3K$RjoKgX29iqe8!WzAS}B4WnNvq z_qat9ylnu*oWt}%7~jN4)V0stJh5%Sd~o_%`GF$q&Scu5D>WB0U&?#Ct`gWYQZq9e zbY0%{P}PE7?|<^cBTdu+s8^Q<~)O<%b;chz5>7^w-kXdfgH@;pti(~?fyl_ zcKh^a5{_Dcs`!Vs(z9>nCbum-uTs7~t`o5_;pGPeGC8^7-oO>L}aL3wGDK&brVUn{bQ1r31+Ni#Pv#`jRzCcA%GPn_m~b;Z)S& z2ekV0w*I~EPXoNgJYGMHK#>OCx*RG^W5!`E=dYUs)>7$WRf}~r^Kln^Nz!m zUsR|zyan4U&isu}&{}0rjMv>;MC+9K$W#(IS=};yiN%|}Ln957+ooCK!O{n8MYRy6bQ!m!Vj zqULpxT&vUirhZBe-oW<3D{X=Co%aH9B@z&7kv|!a0BDoJgFEa#>n=x0)(IONDYAGVOb`&Wvyx(^UFZ5&NKwCFe`ooa+*R0#` z*^|uAI)7w$a=vD{Oq>>bSlAo^MbvIm#uwK-yUv+j>4En4`|eqQ8dqQ|j;GTU5j~iR z1llEkBAfcP0AHGfQwBUnszM@FH|}8v`?F@HH5)lz-7j!oBX#5-=2FF`2?;{t6N_B5%0OxlhWqwk zAI)5De1=uBkfh3~fBFOYLL3LwRVlL9;)1P)YbGnMOi1LV`HuGbz4&U?drSR8-guT1 zxSGPp^3@Wry8s~Ty$XNJu;`7JZ;8LA$9AwL0=oucXp%2MzZHIAR$EmCM^(_RPk&{Z zm*6|nMy=13QCR3~nl$=$Sx{JbQVb>qlqzqtk*b<9Rn3Yb9S5K4b7*IH_-N-HX97?i z*@`v06s25XXsE*27H8Ie^(s;7D7VT`z@h8Gy~n3Em>%`Npmo4bHI0GIi0TF5y_2ig1X`P|k|oV8~5XHJ@FmVxZzwQ;8T(KdtS^-0b_ zT9D&Oj7&}>RIQNoNY7G@U%zt5b^P7AtOm?Kb_oS-rQ+Z?O%L8V@y%7JAjs1qHIQ26jUXzgt{19+;SeYQ@~cv zVQger*uYx)Fk>ZCJ8&(y8PjfkJs>QkL6P)l+|&@H^Q{zWH7tJHj_I?HG0R8Q8s4Ss zxo{{PV8&!{B=F%}#j%C$&F3|r!~N}7Z0?1qB5%@siAQ)1zc{N4G_V48Y{jv#u?Vf;Ef?AI7(#XnWDL7UZcj`&axqD z8Wu`QSVYBvAZj{0ZJ>)w5fU;=dbOpCLb2%Nym{QvWP{Djsh^k9Kkjys^edsf)Grh< z!lf3|6Z`1E!PY+2BeN>^q-}qtq`(){W9xbc*W@j_Gel)F?MfY~mpFFP-@;c7-&*DA z{A%k|v#BDXylL6EyZEqg2|FcP60RYBUz33~`KMga@F57Wu^M=b1|>7$dO!?~bte)j z7=2#~sVMuInIljMRm0>N8@3}*60dBh)P>^C&efJ}L_7M!PK0XKYIFjRce zV3j+zBm=w}BN+Ooi$yl(6k$R|J(0!qbI(-MyE54kyWz88vSDhW6(Jgab5(N`j>`G= z@oz+7JR8xwBZpNkB1tUDrLlQsr5d8q<8*tCF}@kKZZv`NC}tiyfn&W9tAF4yb(} zjWC3_r**?K|I!J-c=#p(%@A9lYRN<;Hfa=g6F|6`eYBA|=UK+yWk}WKKaN~kE=;US+MEir{HsG9qfO^4{+d|n-A!AUVL!?xkVvg^$!)Ey&*7Mt^fFiw(b??b{$ zLOu!pc-W|?W_W+<3BZ$NB!G_>`T3YbV4hA!&&4c_VnMA_XP}%OXV(Q-(*gJejbS81 z`fkm5lZjoypXd8-$vWjV^Ye>rOLJE-^L6kl_BKJIV%Q*rpT!v;~V zV3OoSnbD(LJP#FJjYs}XgAA-l!{!i7=O*W97mw{c)rFzY2`kCvkFF-Ff}BB92gOI4 zLs~J4{yNb(&#EWPs#VLK4-lPjl87*cCz*KfFb7pnfN#~~fIbD?+Bnxdz+3PmvA6VT znf$`6REC&cY}Rp-%>%GVg|2qMiu7YTiSwA-Tm$<6E`Xn!c`&U`ZqrK709E0Z(Z6&G zNxPJudv8YDC=ZD8#igVeZGy-9GIzP08>H_WY9QT8r1fsEYz6;)`lFbutUkiop_#-- z3yn_x*ReLqZtBGdm-rtqUQBhq&REcLE8eYmvHanbmUsXg87LOcAHe_V2;8u2BQ`D; z26?!V@ttAWgUR^$<%yqDjcb+JxuCh;L_CoO12wmdqbdpW$Y}r*g~*B-QF{ zT{^O7HOqkg`j5lv|JSeCjthYsxCGq5)&Tx_;Vl(nX&V3^q{#<(JfMD6r7v1b9Xqkk z&Sl;h+pEpDlkMh~fp@jWJQDeIGtrn``>wwTm52DO4$VR6%rBOOy;?u4n*Q`>26wgg z-jpI@fsET}Q{kIR?t-(Z-z2q?4QV4p`Va0%;YPCNx9X9r z_lsBr(M~_jW^#S{a*nh>Dgp@k5DzRFpew#kJ}dzP3#?c9(||wgG6f{2f%9P0xCPM@ zo%o^h;AY@(H`2oV*SQJ0)0&l?%_c|fZd|xX3d^o;49Cq;e2q_1Pmj5sDf3;s$TI-h z${ubmDuXpuU{*BZ9)9Mv}VZYq+MPAEdi>YR=fqf~g{$XVDd>lF} zZ|%@w&jc-Y8QG-W+^s5FGQT(ABm9wWrHUrC21YV%ea5Ltb;8+TOr)I_8q;Xrfc5cK?eG$mEk>ZQ*F^U~#QrD0f7z(PvD8 z4a~n~HfSyIeKzE+vhqjnVy6k2yHAO1C7QVjcBr=`1;LIbSuc}f(WH`!rGp^U_kGoV zoK_bC528cFsDg^DC)mRC9IERAUdY5Irre}Kq(0JkD1l$|sw z9|fqwZgl5&@qO@34RBw*vm*02j&))pLjKiHrr9Dx&!5my@@c42T|G69CiryM!Y1&C zuEe`&1Aa@)$Bs_W`!7=Tbq8!@IlwaQ!D~k#f-XP+*k;EfRP44`+EQHKDPZU3V#gmp zi059-=;wLJc8lKh&Wx`aq|L@P>ua}bF+TmNaF-Z>*-QaI zZQ^l$OK)_C_mTe@fINK{KKMTm{A(*+SV7L2h`U|qQL*nN7rYsjVj@mr% zOgEr5qe4x|J3R7S!L}D^^CtJT_jx0U+~=Fguc6P!Dg>A*kBBjvTYh3LNn&<$&V2dM z8S+hvK?7-%kZUuBvETuy=m%l$*xriVLu*^EUWJG;pyvD-7mbU}k;+Flm7O0vFcX8udZPoyM71jH!x zd8GrI6*@jSO<(eRGAA{JQ8~D|O*h8{a8%QC0onlZd~=bc46v_>Ni~T7652J^#NIV4 zMLYr`I+ni;PETVZ!4^BvAmXFr>xZTtj}vY&c1d=aT)SpIGc$P2;PZrtPy(2k;L2iY z8K7sDD{u0aHA~YQDV0qOyl~~hi)Ddpw>ig}Qh?hmcyxwV+muQ;vu^HMCE&^CVz<;Sf4qM8>{4jU zGF=hwT_3FAA4yJvd(KuOna^1sQUH}0rr4KT)V!%hEnesB*xKd4Cx-U~K=|?(B5sU^ zRy^RBJ37a@BL+;Je#J!WoPCZt4 zE(j@mD5YWQAo}5V(ZqqKTdwe1C4oZ(p!WP7_`F_6TL9AaEOESoa?cmhN95`nvtO(O z#yH`eDgXpao6&=9v~x%3qDf-QhsqS4xL@Bs<#f)GL{=&6g^S}9wk~i3A+pV&1S&{U zSe1P>*7K&J0R8TRx#Tv>S;=XZv#z%dVGf^4*a!(g30fH$sm{~I)3NpFIR^as^Pio} z8O-PGu3cXl z+Ox`j;$YG_Ft{V)^;XlUs4pnKaKW1C=OHk!y`JjQbS%vTWc5GIa{kmYvBJi(uMw7F zt8BFD;oVi!K8h=tW+}+g#Cp!51VJ^-sX7HdZ=y*)q$kAf<_PJQ`l;RR>!PV@t($wo zX3=~poog1LqwmQl4k+1#DZ4h*#FSbnS^FLkTE9s=Z4SeBY4YZ<+fq0FAZ91^TLJ!0 za5U}eoObX$(}!6RLiy4MJ7*ufj-}RX0p|SgB2NU)gnIo%ydnV&jB~uyW{~|Cg-CVf zfK2o1h*Pc~A-Y$P44oHLB}Tl@soHtA+40Nutn<~Rrj*=t!o~Zl;kT0vPE1D&JKe5t z6(v?k=$9qFhCwnqjb9yV4cG=0%I9v6W>NCeD4+%ZL7*`LZ2f%CApfQNPSF{h?*7%1r5bV#mYhMUED zW^lLCEI`S&n(&)t$0o6WWTsCTt?IIO;}(s1_YSaRrZ%?vU}a0qp(mT%kZuRXGem?E zDTTPIMbHTA7W@tAWSb-PlP`^8QruW`OH>&(T%XA}>(zH}A>nTT7YVllIMZw$Ki9^; z^|#v+>y>JCC{)h>jvhpydOcKMm!N3O~jm)GLAnsr*}UN*jrVL0n#)qT^M zi!&WjeP(l4{i0RxwRC7M4Zeg9Nk{`aMiGEsg*xDX&ypLFq;g_Vh)Nfj3&F2Fe_mQH z;lI`P9Y9UB-cNAtXc%GTTtqp zK~&-Ox#_b^x99**=26g6`BSHsPVUr5VuXIx2_MtrskP2c*r%IEmHUmfky8s;&3{7% zo+Gi@pcusYEY=2w>#n*YQPOyru{LoT5MffV&6Nff<^m z*{^Z2c)h@6ri*!oHk%NlRs?*YId3@OE4hOU8{1!&#}CEPsc!I#g%WU(dy&@tcYPyIWrW1Lz9^%{EIlc zH^p!mWz^pFEO;qJOeOl9m#QjH?G6-nmkaux$P_HzT>*JpV)meqZpqK+>C0cxX4O;E z5I%rm`r~9%OH*6xV-d;u#_9KFcMAQkDT%th5|7Gj-t%XQZL#>rXauH6>SrLE_G@M2 zBlN^=hcm=ZoE=^1O6&>p1vdpYP;h{|Z*XNU5a-R}2eZ#O3m_S^>SgExsqR3kzd$}6 zNllz_IlucnHap!Gc#Qo4O{j^rRmX%xaoc8U3qsrIbE>+C@9=H?Wn-Y!IqxmW- z_3a&hHJ|qv(P~pVHPyGc!4xfK9X&G=-H*oQ&^05*F`x zZAou=@B93A;6zu8jX=~xdzz3 z16`Ld#0}l~0m6!RgU?LaX#Y zSI`%Uf0AV2SRP=V|7Wjwu{rg$Q{8cyFk8>)7%Ss-VdtDS>YB!-wF-4s&sW7R>|?Bi zA!pM?>IwM>-up4NJTr1;U6zoGlHPnr$w^%855SH)XIHe1J$-f+2R;De-y>4ruHFSn ziDOd_)`lLr8$^44>gJWr)IW7);AD6Y#tAcc5A^KNNOu^hG`$~uc1>ncsiejHO1NbD zoQvaZjET8}x%oA4SQiEcxa&YUWOWBTa0mZ#snJt^WIP+*Afo+-nBmcZS)y747)= z9;_y@2DwV4+E0__6uXF%Ahc~izapdcgEd<2QJaLbX;`$XJ}&0a1-l!g>mznb6ytY@ zSZ|*QIz-~*;e22k$j`~y@P(=IW_tNN`ttOPb0;6)OcS12yOKS#b=5J-D$=5qGU!{NW#f?wEY7y?}H38G`f z0HioN26%!ZBNH*wV}@>2Te~YEL1oKg8)2%|cKVuWncAPv6t{+=5EL%3{{~*7Ghyl% zi2~{RvLUeS0 z+ffiQ#Jqcu11EnWq(e{KXc&VBKpu}lA-C6a6tYPyC~x^}PgZGB)&=LEQ0b)kz>nwj zy^zJwx+td9D7b_pV!0s^v<(L!y~54T-^0FFs%@O0G5u2O!E^3?2kFA&56on}2Mq%mN0~xE>YE2R55SZ*;?%$unzBT4 z4u1U)+iVM+kOHS&07vkb<~XxY6jU*cm_`jLdVz<3H`WGZYszxnZM5fozpHw|Faz~x zQ0efd|J)K&vWKC@v}*sM(I#Apwg$Xn483lz-97L)tEM~r@o-qiy1u#(*O4c?PX@@b zJ!m{VnZ-v12FRLWdR?F|Hat$5)BKGub{VY?Mcenc>;d0(DBS51P<<4Jci#rB5q&t5x6Lj!@Qgt~!IK5d^ zPp}K2m=?#C>W-PwTox0WnnkQ|zrBdAL{fO zHOJNSK#@|G9CSC|%6OWphO}-(Jr`EE%A;wj`mI&nS%PFGOIE2nCXiD9giJkWul9ED zsXn%A4Y<`Yw|DR08P*Fj1xl%0Rn7Bcr-?2lx1HdT3}*UL->^P?y*IP(l)}dvs^PhqhCS$0A zS?|V^wCiqM4r;vEUsB_jxjMOlrTO-C?m!zf*0`vxh;w*r8Y{>5H7Wd*bFN~+q7|Fu zUWaePP0P6jnXacVU$kXZwqziat5ns6V9#NLQ$+K>#JqW|2@6U)NKV)`Fw(H8ssDcW zr?E&=Lw!S{SKO2wyOW>@hZEbsFO>z*#Ag|b2=hRPqV+W^vNiwuypiDxQD0+JAWfS#MkRYJu(9`^zexli3vvaKc3YzhJKf~kLI;u8N5=e2M4;^)GVn{#x3iBokwYJvaGd(7 zlr$RUv8sp9&7%j#MGp-_c6sSYaF4|dgZd}*e6XCGfD1EWuXwwKI#q1Fs%;Ow^|1SV ziS2Cr4?q2fD(TW~PqZp7b+u>x4+8^&B4|tOMMwZOBgaW1w5Xm9j=%z)FQ=LjZ%;R8 zA!63#p?!R`7F%J#PR*8eN0WXzm&z*_pd%X06FUs;K=>hI0CW=9$CCd3`YY3TO06%} z#qRrR*0}B0s!BhrD(}Y*M=lItLyve};0@}N>}$t%zQ%Kb257A;ZX-I%jGmXQV=wyq z{A`c(L`Z%6&0g5FL5Z!lbp%8t#p(T!{YmmebJ$MZT=MEH?eA_rZJ_{1m;LxlkiPq* z>}M(i1r-cDb}RDB^&@wMD#Kw)p;_mX4xhVY@B_~Q_b0NkhB2ae6VQqie-wb2wzQy@ z!MaCaS!~~YToa~{_f{{y8n(WY-$s`-}kIsw(@qbOHT6BLTmK}_;t`A z;zqUjZUL}S%K9{0my9!(Lm@Kq$hL7*?6_RqdN{p%x+3-9%kD_`n=?l4aaW5_0H2A_r{<~UiTt)v* zElcZAjV>~88)tgFn^|cRwj5e`Q{WP5@GKXuZLDQQi8))!2u8bRcm6t-YE$cn`a>1d zv2%M>D~`J%S@Wl{)qXOnYk-1`zjs}w)!m0LdYj#1Q;}YV>4ewK!<)baew+e%7{L+P z2KTP$AXb#87wFd4ShSq!7;`MT5_H@kR@(NX;kNNpVw8D5D{L_EAGS)vK*#nVFWYv* z;v!@WV*$*^nAlFWN-X&~^!*!L&|6bkFd!%LN&QU=mJ9u5OFE_LrtrqhQhn<~W@_GTh*if1e&{mK`y{Gy|3&a0@PL_WQi2ef3Jn zI>=ntg0?mGUrIDz(uA3RJ{$n16yNO-hl#;2I0zi>n3&!h02uVLxiY3Wc5c=998iu`cuZD1{`9M%!7WcU4fBUD z->08%BRur7td9 z&gki$#GSGywC$(w{*1Upe@g*M7r*TxZP&26bYwz3G;x+~XR==U-0HTG3cO~rUxceY zGhA+dAKiNGE?ZMM;mZb~RYAFa9=WPV2aW54#U1ETIDu!sKgRg+!j$CFf9woo?MLXd z$bShVVD8?)gbToZ%C{NLn{(5<(F`#I>!lSNe>!0rhqnRj=E| zbQr@Jm&Y#JRckvvL+T5dtp^2`E{d5V0-CYR7 z9LZ>(wP`}BK|X+U+FSNh{~`g0{(roQVp#GH{nSCaF+}tqHb=uibx_Fs2pa2t@P;r1 zUXFn&S*(y=#yYw~H9}lYRBQ&q34y=lpNnzk`Zo%UW#69Sc8L3JJx@N8IAG`i@uq*G zJa%PC2g;x4b+A~$zIp(b*_@97Hh{?DNvD76O%E+*2@<*a3Ir)OWtdOPe}6`mfNOL3$+GqwW42#IK*ex19P{|b+gmNWA80na_8m#P zE2zlYG1lp6%gBj5>ZR|YLA;aeQ&S$NA+24r%#1J@eHouc71V`DY;3W+$=q)1@jgJTJ-qduvE?$!*#LS@F z{XO~S7iK9+%(dE6Fa`A9G1Z$o8bBYtf}Gcd#bN8~ry#4K{PLfDEJzq4O!(66nj++; zaF1v7)uQQ{<&ftuEqG4nq`|DVvN(T~4sM8+ZyB0A%uq>~ORuDuzDo@xx`hyY|JHqN zJH-e>TZ1}CCh{H0Qoz-&-6e57hiW-lM#{Z)iLOl<1_sg+yNDj9Be8sa$bK=*lY@$jhl-&g6g(U2 ztEUQWv9tu>>btkS?-yTw9i19ApQ!G1Z_meI?T&7%nflD?xj(t5Z&_cBih^r*(lETz zN!<<~9j*mzTI<@l>AtY)s9K-3@7{;8c%`Y@fwXCpZ%(y;^Ed|M#}}cauzhfIkHezR zHURnzKC}#&k=vf=NGAVO8Flu4E|O|l3pxC9sR0YaHay4~U-M-km>e{j939yGxgdna zH?=8?X{nK@aFLTWOKdtMMJ_g%ojp{**!S!DF9OZF<1SR2Pnh?3R6I0B=0)l2`z=Wv zR_!V?iu}4=aLhOS6M%qRyfwU~w=zHQwkQR(ef^)jOi+*E|LO4(OAUSIYlj{hM%RmD zS_HHtC%1W&dIYqTmPeX|qr!PfIx&tC!4_UQC(~#q)p03oEQ70*0&vLV$jm_l6ALb; zbWt9ur6kkc?&E4}Q^+rq(1h5hSqfHMhm(WZB?!KBjbzm}ucBe^2T~)bP~!D_f~**> zZ$uv~nSumPYcP!rD4fr!vuus{5)df6&x^e|Gvs_^d`&MVz06jRcC4p>3teQnUUqY6 zQ)7$q8XZFSU+tkQFetcQ9RJEM2;DqhV=`E6M}kl5A~rE8+Q)0~y}YC)nCglCOs=jP zkfjlXq9MXA!UuIZ3JYynzy7RgfHPDv?F@Z17WfKYNGPxqF}D%7pQW2uaWdZJOEpzb zD!747K1VL~R-LMMHRp!8-my@Vey@x-Db1em6%!1duh?+BT9z+^gLI?TJ^aLi zD6$!^E0zsBBs=j%UJw)9Ft|Bh8KY&&%~ z3`Dv*iN1uCdr}&>s2n@?N2Q5T$ z(d_=$wDQ{PuSK>A}qZrU+(mB#-|3xwV@SJ}lh6f0b80~2bn=Z@a zc=eX!S!~zaUhEYj9fuq2CECF<@+g;AftSi6l9GINaK{wQjpjK`d7)tJusPw$B(@;AI`XLIHIg zlUckj3|;q?vD#Z=GAEKeFgFr#r|-iI^7CUPGGc=Zn~alVe-W$R?GbiCnW?x7m|@WN zbfkNXp4UZ4+z&}WUmnv6e8W<^xVvay*FQKSAw0Cgu2dFV09&?}hqY$MclGg`T}c9O zWh%(o7FBfkza(z|cj6jo{QRGM&*d|mb_EG2gn%$Tpv*m|s%Ynl=M5s^8b!;1%xuH<~k|hl2Q0 zLI(#YI=N29*W;{NeXymGX$uxNf(B}h^EP5rX8FKoqwP&;??BG_nuh9%5EHjkTp{9qmuLsi}!*()yI+s10|eQ2T+L1Jy$o9SWQeQx95 zPpkE}75Alj$64%veNP2rO_w{TI?XxaL$1R^LF^6boF?~^pT1wtDuHGNgE3+PJGBoL=&Xo_Q1v=P9#4666Qt}5 zfy8HQ?URd5>00-^JRTW6K$UvG-p+#S=Os$Cowf08{)JS$3+AWj@oATt2Q6_k@Y0kC@QZa-D4=%%JLYr;yKC+5^=6gxIAx50% zc8f25sYI(4PAh($ From cb30c8442b3355d190dafa12ba4e1bb31ba245e7 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Tue, 26 Feb 2019 08:38:17 -0500 Subject: [PATCH 159/531] clarification --- Makefile | 92 ++++++++++++++++++++++++++++++++++++++++++++++++++++++-- hydra.c | 2 +- 2 files changed, 91 insertions(+), 3 deletions(-) diff --git a/Makefile b/Makefile index 372e67e..9ff7d16 100644 --- a/Makefile +++ b/Makefile @@ -1,5 +1,93 @@ -all: - @echo Error: you must run "./configure" first +STRIP=strip +XDEFINES= -DLIBOPENSSL -DHAVE_PCRE -DLIBSVN -DLIBSSH -DHAVE_ZLIB -DHAVE_MATH_H +XLIBS= -lz -lssl -lpcre -lsvn_client-1 -lapr-1 -laprutil-1 -lsvn_subr-1 -lssh -lcrypto +XLIBPATHS=-L/usr/lib -L/usr/local/lib -L/lib -L/lib -L/usr/local/lib -L/lib +XIPATHS= -I/usr/include -I/usr/local/include -I/usr/include/subversion-1 -I/usr/include/apr-1 -I/usr/include/subversion-1 +PREFIX=/usr/local +XHYDRA_SUPPORT= +STRIP=strip + +HYDRA_LOGO=hydra-logo.o +PWI_LOGO=pw-inspector-logo.o +SEC=-pie -fPIE -fstack-protector-all --param ssp-buffer-size=4 -D_FORTIFY_SOURCE=2 + +# +# Makefile for Hydra - (c) 2001-2019 by van Hauser / THC +# +OPTS=-I. -O3 +# -Wall -g -pedantic +LIBS=-lm +BINDIR = /bin +MANDIR ?= /man/man1/ +DATADIR ?= /etc +DESTDIR ?= + +SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ + hydra-telnet.c hydra-cisco.c hydra-http.c hydra-ftp.c hydra-imap.c \ + hydra-pop3.c hydra-smb.c hydra-icq.c hydra-cisco-enable.c hydra-ldap.c \ + hydra-mysql.c hydra-mssql.c hydra-xmpp.c hydra-http-proxy-urlenum.c \ + hydra-snmp.c hydra-cvs.c hydra-smtp.c hydra-smtp-enum.c hydra-sapr3.c \ + hydra-ssh.c hydra-sshkey.c hydra-teamspeak.c hydra-postgres.c \ + hydra-rsh.c hydra-rlogin.c hydra-oracle-listener.c hydra-svn.c \ + hydra-pcanywhere.c hydra-sip.c hydra-oracle.c hydra-vmauthd.c \ + hydra-asterisk.c hydra-firebird.c hydra-afp.c hydra-ncp.c hydra-rdp.c \ + hydra-oracle-sid.c hydra-http-proxy.c hydra-http-form.c hydra-irc.c \ + hydra-s7-300.c hydra-redis.c hydra-adam6500.c hydra-rtsp.c \ + hydra-rpcap.c hydra-radmin2.c \ + hydra-time.c crc32.c d3des.c bfg.c ntlm.c sasl.c hmacmd5.c hydra-mod.c +OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ + hydra-telnet.o hydra-cisco.o hydra-http.o hydra-ftp.o hydra-imap.o \ + hydra-pop3.o hydra-smb.o hydra-icq.o hydra-cisco-enable.o hydra-ldap.o \ + hydra-mysql.o hydra-mssql.o hydra-xmpp.o hydra-http-proxy-urlenum.o \ + hydra-snmp.o hydra-cvs.o hydra-smtp.o hydra-smtp-enum.o hydra-sapr3.o \ + hydra-ssh.o hydra-sshkey.o hydra-teamspeak.o hydra-postgres.o \ + hydra-rsh.o hydra-rlogin.o hydra-oracle-listener.o hydra-svn.o \ + hydra-pcanywhere.o hydra-sip.o hydra-oracle-sid.o hydra-oracle.o \ + hydra-vmauthd.o hydra-asterisk.o hydra-firebird.o hydra-afp.o \ + hydra-ncp.o hydra-http-proxy.o hydra-http-form.o hydra-irc.o \ + hydra-redis.o hydra-rdp.o hydra-s7-300.c hydra-adam6500.o hydra-rtsp.o \ + hydra-rpcap.o hydra-radmin2.o \ + crc32.o d3des.o bfg.o ntlm.o sasl.o hmacmd5.o hydra-mod.o hydra-time.o +BINS = hydra pw-inspector + +EXTRA_DIST = README README.arm README.palm CHANGES TODO INSTALL LICENSE \ + hydra-mod.h hydra.h crc32.h d3des.h + +all: pw-inspector hydra $(XHYDRA_SUPPORT) + @echo + @echo Now type "make install" + +hydra: hydra.c $(OBJ) + $(CC) $(OPTS) $(SEC) $(LIBS) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o hydra $(HYDRA_LOGO) hydra.c $(OBJ) $(LIBS) $(XLIBS) $(XLIBPATHS) $(XIPATHS) $(XDEFINES) + @echo + @echo If men could get pregnant, abortion would be a sacrament + @echo + +xhydra: + -cd hydra-gtk && sh ./make_xhydra.sh + +pw-inspector: pw-inspector.c + -$(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o pw-inspector $(PWI_LOGO) pw-inspector.c + +.c.o: + $(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) -c $< $(XDEFINES) $(XIPATHS) + +strip: all + strip $(BINS) + -echo OK > /dev/null && test -x xhydra && strip xhydra || echo OK > /dev/null + +install: strip + -mkdir -p $(DESTDIR)$(PREFIX)$(BINDIR) + cp -f hydra-wizard.sh $(BINS) $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 hydra-wizard.sh $(BINS) + -echo OK > /dev/null && test -x xhydra && cp xhydra $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 xhydra || echo OK > /dev/null + -sed -e "s|^INSTALLDIR=.*|INSTALLDIR="$(PREFIX)"|" dpl4hydra.sh | sed -e "s|^LOCATION=.*|LOCATION="$(DATADIR)"|" > $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh + -chmod 755 $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh + -mkdir -p $(DESTDIR)$(PREFIX)$(DATADIR) + -cp -f *.csv $(DESTDIR)$(PREFIX)$(DATADIR) + -mkdir -p $(DESTDIR)$(PREFIX)$(MANDIR) + -cp -f hydra.1 xhydra.1 pw-inspector.1 $(DESTDIR)$(PREFIX)$(MANDIR) clean: + rm -rf xhydra pw-inspector hydra *.o core *.core *.stackdump *~ Makefile.in Makefile dev_rfc hydra.restore arm/*.ipk arm/ipkg/usr/bin/* hydra-gtk/src/*.o hydra-gtk/src/xhydra hydra-gtk/stamp-h hydra-gtk/config.status hydra-gtk/errors hydra-gtk/config.log hydra-gtk/src/.deps hydra-gtk/src/Makefile hydra-gtk/Makefile cp -f Makefile.orig Makefile + diff --git a/hydra.c b/hydra.c index 0a923b3..2b10b0f 100644 --- a/hydra.c +++ b/hydra.c @@ -3026,7 +3026,7 @@ int main(int argc, char *argv[]) { //if (conwait == 0) // hydra_options.conwait = conwait = 1; //printf("[WARNING] the rdp module is currently reported to be unreliable, most likely against new Windows version. Please test, report - and if possible, fix.\n"); - printf("[ERROR] the rdp module does not support the current protocol, hence it is disabled. If you want to add it, please contact vh@thc.org\n"); + printf("[ERROR] the rdp module does not support the current protocol, hence it is disabled. If you want to develop it, please contact vh@thc.org\n"); exit(-1); i = 1; } From d863927a5345c8eadfb6aca7e68c5c7cf52b56c6 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Tue, 26 Feb 2019 08:38:29 -0500 Subject: [PATCH 160/531] clarification --- Makefile | 92 ++------------------------------------------------------ 1 file changed, 2 insertions(+), 90 deletions(-) diff --git a/Makefile b/Makefile index 9ff7d16..372e67e 100644 --- a/Makefile +++ b/Makefile @@ -1,93 +1,5 @@ -STRIP=strip -XDEFINES= -DLIBOPENSSL -DHAVE_PCRE -DLIBSVN -DLIBSSH -DHAVE_ZLIB -DHAVE_MATH_H -XLIBS= -lz -lssl -lpcre -lsvn_client-1 -lapr-1 -laprutil-1 -lsvn_subr-1 -lssh -lcrypto -XLIBPATHS=-L/usr/lib -L/usr/local/lib -L/lib -L/lib -L/usr/local/lib -L/lib -XIPATHS= -I/usr/include -I/usr/local/include -I/usr/include/subversion-1 -I/usr/include/apr-1 -I/usr/include/subversion-1 -PREFIX=/usr/local -XHYDRA_SUPPORT= -STRIP=strip - -HYDRA_LOGO=hydra-logo.o -PWI_LOGO=pw-inspector-logo.o -SEC=-pie -fPIE -fstack-protector-all --param ssp-buffer-size=4 -D_FORTIFY_SOURCE=2 - -# -# Makefile for Hydra - (c) 2001-2019 by van Hauser / THC -# -OPTS=-I. -O3 -# -Wall -g -pedantic -LIBS=-lm -BINDIR = /bin -MANDIR ?= /man/man1/ -DATADIR ?= /etc -DESTDIR ?= - -SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ - hydra-telnet.c hydra-cisco.c hydra-http.c hydra-ftp.c hydra-imap.c \ - hydra-pop3.c hydra-smb.c hydra-icq.c hydra-cisco-enable.c hydra-ldap.c \ - hydra-mysql.c hydra-mssql.c hydra-xmpp.c hydra-http-proxy-urlenum.c \ - hydra-snmp.c hydra-cvs.c hydra-smtp.c hydra-smtp-enum.c hydra-sapr3.c \ - hydra-ssh.c hydra-sshkey.c hydra-teamspeak.c hydra-postgres.c \ - hydra-rsh.c hydra-rlogin.c hydra-oracle-listener.c hydra-svn.c \ - hydra-pcanywhere.c hydra-sip.c hydra-oracle.c hydra-vmauthd.c \ - hydra-asterisk.c hydra-firebird.c hydra-afp.c hydra-ncp.c hydra-rdp.c \ - hydra-oracle-sid.c hydra-http-proxy.c hydra-http-form.c hydra-irc.c \ - hydra-s7-300.c hydra-redis.c hydra-adam6500.c hydra-rtsp.c \ - hydra-rpcap.c hydra-radmin2.c \ - hydra-time.c crc32.c d3des.c bfg.c ntlm.c sasl.c hmacmd5.c hydra-mod.c -OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ - hydra-telnet.o hydra-cisco.o hydra-http.o hydra-ftp.o hydra-imap.o \ - hydra-pop3.o hydra-smb.o hydra-icq.o hydra-cisco-enable.o hydra-ldap.o \ - hydra-mysql.o hydra-mssql.o hydra-xmpp.o hydra-http-proxy-urlenum.o \ - hydra-snmp.o hydra-cvs.o hydra-smtp.o hydra-smtp-enum.o hydra-sapr3.o \ - hydra-ssh.o hydra-sshkey.o hydra-teamspeak.o hydra-postgres.o \ - hydra-rsh.o hydra-rlogin.o hydra-oracle-listener.o hydra-svn.o \ - hydra-pcanywhere.o hydra-sip.o hydra-oracle-sid.o hydra-oracle.o \ - hydra-vmauthd.o hydra-asterisk.o hydra-firebird.o hydra-afp.o \ - hydra-ncp.o hydra-http-proxy.o hydra-http-form.o hydra-irc.o \ - hydra-redis.o hydra-rdp.o hydra-s7-300.c hydra-adam6500.o hydra-rtsp.o \ - hydra-rpcap.o hydra-radmin2.o \ - crc32.o d3des.o bfg.o ntlm.o sasl.o hmacmd5.o hydra-mod.o hydra-time.o -BINS = hydra pw-inspector - -EXTRA_DIST = README README.arm README.palm CHANGES TODO INSTALL LICENSE \ - hydra-mod.h hydra.h crc32.h d3des.h - -all: pw-inspector hydra $(XHYDRA_SUPPORT) - @echo - @echo Now type "make install" - -hydra: hydra.c $(OBJ) - $(CC) $(OPTS) $(SEC) $(LIBS) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o hydra $(HYDRA_LOGO) hydra.c $(OBJ) $(LIBS) $(XLIBS) $(XLIBPATHS) $(XIPATHS) $(XDEFINES) - @echo - @echo If men could get pregnant, abortion would be a sacrament - @echo - -xhydra: - -cd hydra-gtk && sh ./make_xhydra.sh - -pw-inspector: pw-inspector.c - -$(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o pw-inspector $(PWI_LOGO) pw-inspector.c - -.c.o: - $(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) -c $< $(XDEFINES) $(XIPATHS) - -strip: all - strip $(BINS) - -echo OK > /dev/null && test -x xhydra && strip xhydra || echo OK > /dev/null - -install: strip - -mkdir -p $(DESTDIR)$(PREFIX)$(BINDIR) - cp -f hydra-wizard.sh $(BINS) $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 hydra-wizard.sh $(BINS) - -echo OK > /dev/null && test -x xhydra && cp xhydra $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 xhydra || echo OK > /dev/null - -sed -e "s|^INSTALLDIR=.*|INSTALLDIR="$(PREFIX)"|" dpl4hydra.sh | sed -e "s|^LOCATION=.*|LOCATION="$(DATADIR)"|" > $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh - -chmod 755 $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh - -mkdir -p $(DESTDIR)$(PREFIX)$(DATADIR) - -cp -f *.csv $(DESTDIR)$(PREFIX)$(DATADIR) - -mkdir -p $(DESTDIR)$(PREFIX)$(MANDIR) - -cp -f hydra.1 xhydra.1 pw-inspector.1 $(DESTDIR)$(PREFIX)$(MANDIR) +all: + @echo Error: you must run "./configure" first clean: - rm -rf xhydra pw-inspector hydra *.o core *.core *.stackdump *~ Makefile.in Makefile dev_rfc hydra.restore arm/*.ipk arm/ipkg/usr/bin/* hydra-gtk/src/*.o hydra-gtk/src/xhydra hydra-gtk/stamp-h hydra-gtk/config.status hydra-gtk/errors hydra-gtk/config.log hydra-gtk/src/.deps hydra-gtk/src/Makefile hydra-gtk/Makefile cp -f Makefile.orig Makefile - From 3a9a3c1eba7211928d4d54b4e129595576ac79ac Mon Sep 17 00:00:00 2001 From: van Hauser Date: Tue, 26 Feb 2019 08:41:10 -0500 Subject: [PATCH 161/531] v8.9.1 release --- CHANGES | 4 ++-- hydra.c | 3 +-- web/CHANGES | 4 ++++ 3 files changed, 7 insertions(+), 4 deletions(-) diff --git a/CHANGES b/CHANGES index c9d0618..32d5458 100644 --- a/CHANGES +++ b/CHANGES @@ -1,8 +1,8 @@ Changelog for hydra ------------------- -Release 8.9-dev -* your patch? :) +Release 8.9.1 +* Clarification for rdp error message * CIDR notation (hydra -l test -p test 192.168.0.0/24 ftp) was not detected, fixed diff --git a/hydra.c b/hydra.c index 2b10b0f..b155004 100644 --- a/hydra.c +++ b/hydra.c @@ -204,7 +204,7 @@ char *SERVICES = #define RESTOREFILE "./hydra.restore" #define PROGRAM "Hydra" -#define VERSION "v8.9-dev" +#define VERSION "v8.9.1" #define AUTHOR "van Hauser/THC" #define EMAIL "" #define RESOURCE "https://github.com/vanhauser-thc/thc-hydra" @@ -3028,7 +3028,6 @@ int main(int argc, char *argv[]) { //printf("[WARNING] the rdp module is currently reported to be unreliable, most likely against new Windows version. Please test, report - and if possible, fix.\n"); printf("[ERROR] the rdp module does not support the current protocol, hence it is disabled. If you want to develop it, please contact vh@thc.org\n"); exit(-1); - i = 1; } if (strcmp(hydra_options.service, "radmin2") == 0) { #ifdef HAVE_GCRYPT diff --git a/web/CHANGES b/web/CHANGES index 76354e3..32d5458 100644 --- a/web/CHANGES +++ b/web/CHANGES @@ -1,6 +1,10 @@ Changelog for hydra ------------------- +Release 8.9.1 +* Clarification for rdp error message +* CIDR notation (hydra -l test -p test 192.168.0.0/24 ftp) was not detected, fixed + Release 8.8 * New web page: https://github.com/vanhauser-thc/thc-hydra From ce2fd05edfdb643adb03953190f6fd709ee0497f Mon Sep 17 00:00:00 2001 From: van Hauser Date: Tue, 26 Feb 2019 08:43:25 -0500 Subject: [PATCH 162/531] new 8.9-dev init --- CHANGES | 4 ++++ hydra.c | 2 +- 2 files changed, 5 insertions(+), 1 deletion(-) diff --git a/CHANGES b/CHANGES index 32d5458..0bc312f 100644 --- a/CHANGES +++ b/CHANGES @@ -1,6 +1,10 @@ Changelog for hydra ------------------- +Release 8.9-dev +* your patch? :) + + Release 8.9.1 * Clarification for rdp error message * CIDR notation (hydra -l test -p test 192.168.0.0/24 ftp) was not detected, fixed diff --git a/hydra.c b/hydra.c index b155004..a81613a 100644 --- a/hydra.c +++ b/hydra.c @@ -204,7 +204,7 @@ char *SERVICES = #define RESTOREFILE "./hydra.restore" #define PROGRAM "Hydra" -#define VERSION "v8.9.1" +#define VERSION "v8.9-dev" #define AUTHOR "van Hauser/THC" #define EMAIL "" #define RESOURCE "https://github.com/vanhauser-thc/thc-hydra" From d5fb1142b286812fc12ff0e689e895690351f377 Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Sun, 3 Mar 2019 22:50:22 +0800 Subject: [PATCH 163/531] Missing carriage return when printing error --- hydra-rtsp.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-rtsp.c b/hydra-rtsp.c index e0eb6b5..ee09996 100644 --- a/hydra-rtsp.c +++ b/hydra-rtsp.c @@ -95,7 +95,7 @@ int32_t start_rtsp(int32_t s, char *ip, int32_t port, unsigned char options, cha lresp = hydra_receive_line(s); if (lresp == NULL) { - fprintf(stderr, "[ERROR] no server reply"); + fprintf(stderr, "[ERROR] no server reply\n"); return 1; } From bdf0475b48faf301e3af39721daf944fa2862c0d Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Sun, 3 Mar 2019 22:54:36 +0800 Subject: [PATCH 164/531] Update dependencies for Ubuntu/Debian remove libncp, rename firebird dev libs --- INSTALL | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/INSTALL b/INSTALL index 8e33f87..2258405 100644 --- a/INSTALL +++ b/INSTALL @@ -2,7 +2,7 @@ type "./configure", then "make" and finally "sudo make install" For special modules you need to install software packages before you run "./configure": - Ubuntu/Debian: apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev firebird2.1-dev libncp-dev libncurses5-dev + Ubuntu/Debian: apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev firebird-dev libncurses5-dev Redhat/Fedora: yum install openssl-devel pcre-devel ncpfs-devel postgresql-devel libssh-devel subversion-devel libncurses-devel OpenSuSE: zypper install libopenssl-devel pcre-devel libidn-devel ncpfs-devel libssh-devel postgresql-devel subversion-devel libncurses-devel From 87e410e5a14dfe25950cd0ca5e47656ea32a9831 Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Sun, 3 Mar 2019 23:08:47 +0800 Subject: [PATCH 165/531] Fix compilation warning MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Fix the compilation warning below: hydra-smtp-enum.c: In function ‘service_smtp_enum’: hydra-mod.h:72:22: warning: statement will never be executed [-Wswitch-unreachable] #define hydra_report fprintf hydra-smtp-enum.c:220:11: note: in expansion of macro ‘hydra_report’ hydra_report(stdout, "[VERBOSE] "); ^~~~~~~~~~~~ --- hydra-smtp-enum.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-smtp-enum.c b/hydra-smtp-enum.c index ebcd379..c26ac63 100644 --- a/hydra-smtp-enum.c +++ b/hydra-smtp-enum.c @@ -216,8 +216,8 @@ void service_smtp_enum(char *ip, int32_t sp, unsigned char options, char *miscpt smtp_enum_cmd = RCPT; } if (debug) { + hydra_report(stdout, "[VERBOSE] "); switch (smtp_enum_cmd) { - hydra_report(stdout, "[VERBOSE] "); case VRFY: hydra_report(stdout, "using SMTP VRFY command\n"); break; From e759b3768c3087303caffed0bb47c6a416d1bc78 Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Sun, 3 Mar 2019 23:24:09 +0800 Subject: [PATCH 166/531] Fix compilation warning MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit hydra-redis.c: In function ‘start_redis’: hydra-redis.c:18:51: warning: ‘%.250s’ directive writing up to 250 bytes into a region of size between 243 and 493 [-Wformat-overflow=] sprintf(buffer, "*2\r\n$4\r\nAUTH\r\n$%.250s\r\n%.250s\r\n", pass_num, pass); ^~~~~~ In file included from /usr/include/stdio.h:862:0, from hydra.h:3, from hydra-mod.h:4, from hydra-redis.c:1: /usr/include/x86_64-linux-gnu/bits/stdio2.h:33:10: note: ‘__builtin___sprintf_chk’ output between 20 and 520 bytes into a destination of size 510 return __builtin___sprintf_chk (__s, __USE_FORTIFY_LEVEL - 1, ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ __bos (__s), __fmt, __va_arg_pack ()); ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ --- hydra-redis.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-redis.c b/hydra-redis.c index 76a6afb..c010577 100644 --- a/hydra-redis.c +++ b/hydra-redis.c @@ -15,7 +15,7 @@ int32_t start_redis(int32_t s, char *ip, int32_t port, unsigned char options, ch snprintf(pass_num, 50, "%d", pass_len); memset(buffer, 0, sizeof(buffer)); - sprintf(buffer, "*2\r\n$4\r\nAUTH\r\n$%.250s\r\n%.250s\r\n", pass_num, pass); + sprintf(buffer, "*2\r\n$4\r\nAUTH\r\n$%.50s\r\n%.250s\r\n", pass_num, pass); if (debug) hydra_report(stderr, "[DEBUG] Auth:\n %s\n", buffer); From edc01ed0492ebe4ab046b39381fb3a0d8c7f3db3 Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Tue, 5 Mar 2019 12:45:41 +0800 Subject: [PATCH 167/531] Fix compilation warning MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit See below full log: hydra-http-proxy.c: In function ‘start_http_proxy’: hydra-http-proxy.c:26:26: warning: ‘%.200s’ directive writing up to 200 bytes into a region of size 24 [-Wformat-overflow=] sprintf(host, "Host: %.200s", ptr + 3); ^~~~~~ In file included from /usr/include/stdio.h:862:0, from hydra.h:3, from hydra-mod.h:4, from hydra-http-proxy.c:1: /usr/include/x86_64-linux-gnu/bits/stdio2.h:33:10: note: ‘__builtin___sprintf_chk’ output between 7 and 207 bytes into a destination of size 30 return __builtin___sprintf_chk (__s, __USE_FORTIFY_LEVEL - 1, ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ __bos (__s), __fmt, __va_arg_pack ()); ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ --- hydra-http-proxy.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/hydra-http-proxy.c b/hydra-http-proxy.c index cc9ad6b..cdeb714 100644 --- a/hydra-http-proxy.c +++ b/hydra-http-proxy.c @@ -8,7 +8,7 @@ char *http_proxy_buf = NULL; int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp, char *hostname) { char *empty = ""; char *login, *pass, buffer[500], buffer2[500]; - char url[210], host[30]; + char url[210], host[60]; char *header = ""; /* XXX TODO */ char *ptr, *fooptr; @@ -23,7 +23,7 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option } else { sprintf(url, "%.200s", miscptr); ptr = strstr(miscptr, "://"); // :// check is in hydra.c - sprintf(host, "Host: %.200s", ptr + 3); + sprintf(host, "Host: %.50s", ptr + 3); if ((ptr = index(host, '/')) != NULL) *ptr = 0; if ((ptr = index(host + 6, ':')) != NULL && host[0] != '[') From 26e69be9a98c7f71b67579d0aedde2972b693708 Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Tue, 5 Mar 2019 18:49:37 +0800 Subject: [PATCH 168/531] Missing error log carriage return --- hydra-afp.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-afp.c b/hydra-afp.c index c940ce1..0e55f6f 100644 --- a/hydra-afp.c +++ b/hydra-afp.c @@ -54,7 +54,7 @@ static int32_t server_subconnect(struct afp_url url) { if (strlen(url.uamname) > 0) { if ((conn_req->uam_mask = find_uam_by_name(url.uamname)) == 0) { - fprintf(stderr, "[ERROR] Unknown UAM: %s", url.uamname); + fprintf(stderr, "[ERROR] Unknown UAM: %s\n", url.uamname); FREE(conn_req); FREE(server); return -1; From 4d9740836fb9c622cb8d5e596b7c99605e17d5b8 Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Tue, 5 Mar 2019 19:00:07 +0800 Subject: [PATCH 169/531] Remove the extra CR To have the perror log details on the same error line --- hydra.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra.c b/hydra.c index a81613a..20f4b93 100644 --- a/hydra.c +++ b/hydra.c @@ -648,7 +648,7 @@ void hydra_restore_write(int32_t print_msg) { } if ((f = fopen(RESTOREFILE, "w")) == NULL) { - fprintf(stderr, "[ERROR] Can not create restore file (%s) - \n", RESTOREFILE); + fprintf(stderr, "[ERROR] Can not create restore file (%s) - ", RESTOREFILE); perror(""); process_restore = 0; return; From 59ef84522b19c8cc50a725ef716216375e7f655d Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Tue, 5 Mar 2019 19:23:43 +0800 Subject: [PATCH 170/531] Clean unsupported ftps helper message Just for the code and message to look like unsupported pop3s, imaps, ... --- hydra.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/hydra.c b/hydra.c index 20f4b93..bc355a8 100644 --- a/hydra.c +++ b/hydra.c @@ -186,7 +186,7 @@ extern int32_t service_rpcap_init(char *ip, int32_t sp, unsigned char options, c // ADD NEW SERVICES HERE char *SERVICES = - "adam6500 asterisk afp cisco cisco-enable cvs firebird ftp ftps http[s]-{head|get|post} http[s]-{get|post}-form http-proxy http-proxy-urlenum icq imap[s] irc ldap2[s] ldap3[-{cram|digest}md5][s] mssql mysql ncp nntp oracle oracle-listener oracle-sid pcanywhere pcnfs pop3[s] postgres radmin2 rdp redis rexec rlogin rpcap rsh rtsp s7-300 sapr3 sip smb smtp[s] smtp-enum snmp socks5 ssh sshkey svn teamspeak telnet[s] vmauthd vnc xmpp"; + "adam6500 asterisk afp cisco cisco-enable cvs firebird ftp[s] http[s]-{head|get|post} http[s]-{get|post}-form http-proxy http-proxy-urlenum icq imap[s] irc ldap2[s] ldap3[-{cram|digest}md5][s] mssql mysql ncp nntp oracle oracle-listener oracle-sid pcanywhere pcnfs pop3[s] postgres radmin2 rdp redis rexec rlogin rpcap rsh rtsp s7-300 sapr3 sip smb smtp[s] smtp-enum snmp socks5 ssh sshkey svn teamspeak telnet[s] vmauthd vnc xmpp"; #define MAXBUF 520 #define MAXLINESIZE ( ( MAXBUF / 2 ) - 4 ) @@ -2108,7 +2108,7 @@ int main(int argc, char *argv[]) { #endif #ifndef LIBOPENSSL // for ftps - SERVICES = hydra_string_replace(SERVICES, " ftps", ""); + SERVICES = hydra_string_replace(SERVICES, "ftp[s]", "ftp"); // for pop3 SERVICES = hydra_string_replace(SERVICES, "pop3[s]", "pop3"); // for imap From 91825f0fef86d6a6019d7599fdf0d0656c8fb2ea Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Thu, 7 Mar 2019 08:12:04 +0800 Subject: [PATCH 171/531] Fix svn module memory leaks --- CHANGES | 1 + hydra-svn.c | 6 +++--- 2 files changed, 4 insertions(+), 3 deletions(-) diff --git a/CHANGES b/CHANGES index 0bc312f..fe676fe 100644 --- a/CHANGES +++ b/CHANGES @@ -3,6 +3,7 @@ Changelog for hydra Release 8.9-dev * your patch? :) +* Fix svn module memory leaks Release 8.9.1 diff --git a/hydra-svn.c b/hydra-svn.c index 207b32f..eaf51f2 100644 --- a/hydra-svn.c +++ b/hydra-svn.c @@ -78,17 +78,19 @@ int32_t start_svn(int32_t s, char *ip, int32_t port, unsigned char options, char err = svn_config_ensure(NULL, pool); if (err) { + svn_pool_destroy(pool); svn_handle_error2(err, stderr, FALSE, "hydra: "); return 4; } - //if ((err = svn_client_create_context(&ctx, pool))) { if ((err = svn_client_create_context2(&ctx, NULL, pool))) { + svn_pool_destroy(pool); svn_handle_error2(err, stderr, FALSE, "hydra: "); return 4; } if ((err = svn_config_get_config(&(ctx->config), NULL, pool))) { + svn_pool_destroy(pool); svn_handle_error2(err, stderr, FALSE, "hydra: "); return 4; } @@ -106,10 +108,8 @@ int32_t start_svn(int32_t s, char *ip, int32_t port, unsigned char options, char snprintf(URL, sizeof(URL), "svn://%s:%d/%s", hydra_address2string_beautiful(ip), port, URLBRANCH); dirents = SVN_DIRENT_KIND; canonical = svn_uri_canonicalize(URL, pool); - //err = svn_client_list2(canonical, &revision, &revision, svn_depth_unknown, dirents, FALSE, print_dirdummy, NULL, ctx, pool); err = svn_client_list3(canonical, &revision, &revision, svn_depth_unknown, dirents, FALSE, FALSE, (svn_client_list_func2_t) print_dirdummy, NULL, ctx, pool); - svn_pool_clear(pool); svn_pool_destroy(pool); if (err) { From 4a87be9c488087a89f5ceab60321b9391aa0176e Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Thu, 7 Mar 2019 08:20:15 +0800 Subject: [PATCH 172/531] Fix rtsp module potential buffer overflow --- CHANGES | 1 + hydra-rtsp.c | 10 +++++----- 2 files changed, 6 insertions(+), 5 deletions(-) diff --git a/CHANGES b/CHANGES index fe676fe..b919c6a 100644 --- a/CHANGES +++ b/CHANGES @@ -4,6 +4,7 @@ Changelog for hydra Release 8.9-dev * your patch? :) * Fix svn module memory leaks +* Fix rtsp module potential buffer overflow Release 8.9.1 diff --git a/hydra-rtsp.c b/hydra-rtsp.c index ee09996..020b64d 100644 --- a/hydra-rtsp.c +++ b/hydra-rtsp.c @@ -78,7 +78,7 @@ void create_core_packet(int32_t control, char *ip, int32_t port) { } int32_t start_rtsp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; - char *login, *pass, buffer[500], buffer2[500]; + char *login, *pass, buffer[1030], buffer2[500]; char *lresp; @@ -112,10 +112,10 @@ int32_t start_rtsp(int32_t s, char *ip, int32_t port, unsigned char options, cha if (use_Basic_Auth(lresp) == 1) { - sprintf(buffer2, "%.260s:%.260s", login, pass); + sprintf(buffer2, "%.249s:%.249s", login, pass); hydra_tobase64((unsigned char *) buffer2, strlen(buffer2), sizeof(buffer2)); - sprintf(buffer, "%sAuthorization: : Basic %s\r\n\r\n", packet2, buffer2); + sprintf(buffer, "%.500sAuthorization: : Basic %.500s\r\n\r\n", packet2, buffer2); if (debug) { hydra_report(stderr, "C:%s\n", buffer); @@ -128,7 +128,7 @@ int32_t start_rtsp(int32_t s, char *ip, int32_t port, unsigned char options, cha char *pbuffer = hydra_strcasestr(lresp, "WWW-Authenticate: Digest "); - strncpy(aux, pbuffer + strlen("WWW-Authenticate: Digest "), sizeof(buffer)); + strncpy(aux, pbuffer + strlen("WWW-Authenticate: Digest "), sizeof(aux)); aux[sizeof(aux) - 1] = '\0'; #ifdef LIBOPENSSL sasl_digest_md5(dbuf, login, pass, aux, miscptr, "rtsp", hydra_address2string(ip), port, ""); @@ -141,7 +141,7 @@ int32_t start_rtsp(int32_t s, char *ip, int32_t port, unsigned char options, cha fprintf(stderr, "[ERROR] digest generation failed\n"); return 3; } - sprintf(buffer, "%sAuthorization: Digest %s\r\n\r\n", packet2, dbuf); + sprintf(buffer, "%.500sAuthorization: Digest %.500s\r\n\r\n", packet2, dbuf); if (debug) { hydra_report(stderr, "C:%s\n", buffer); From 8e209b14f49e1722908138c58a204d12f7ce756f Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Sat, 9 Mar 2019 08:30:16 +0800 Subject: [PATCH 173/531] add memcached module --- Android.mk | 4 +- CHANGES | 5 +- Makefile.am | 20 ++-- configure | 65 ++++++++++++- hydra-gtk/src/interface.c | 1 + hydra-memcached.c | 189 ++++++++++++++++++++++++++++++++++++++ hydra.c | 26 +++++- hydra.h | 2 + 8 files changed, 293 insertions(+), 19 deletions(-) create mode 100644 hydra-memcached.c diff --git a/Android.mk b/Android.mk index 2638e06..30ff6fa 100644 --- a/Android.mk +++ b/Android.mk @@ -40,6 +40,7 @@ LOCAL_SRC_FILES:= \ hydra-irc.c\ hydra-ldap.c\ hydra-mod.c\ + hydra-memcached.c\ hydra-mssql.c\ hydra-mysql.c\ hydra-ncp.c\ @@ -90,7 +91,8 @@ LOCAL_STATIC_LIBRARIES := \ libiconv\ libneon\ libssl_static\ - libcrypto_static + libcrypto_static\ + libmemcached LOCAL_SHARED_LIBRARIES := \ libsqlite\ diff --git a/CHANGES b/CHANGES index b919c6a..d9dce31 100644 --- a/CHANGES +++ b/CHANGES @@ -3,8 +3,9 @@ Changelog for hydra Release 8.9-dev * your patch? :) -* Fix svn module memory leaks -* Fix rtsp module potential buffer overflow +* Fixed svn module memory leaks +* Fixed rtsp module potential buffer overflow +* Added memcached module Release 8.9.1 diff --git a/Makefile.am b/Makefile.am index d65f7d7..236719d 100644 --- a/Makefile.am +++ b/Makefile.am @@ -12,11 +12,11 @@ DESTDIR ?= SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ hydra-telnet.c hydra-cisco.c hydra-http.c hydra-ftp.c hydra-imap.c \ hydra-pop3.c hydra-smb.c hydra-icq.c hydra-cisco-enable.c hydra-ldap.c \ - hydra-mysql.c hydra-mssql.c hydra-xmpp.c hydra-http-proxy-urlenum.c \ - hydra-snmp.c hydra-cvs.c hydra-smtp.c hydra-smtp-enum.c hydra-sapr3.c \ - hydra-ssh.c hydra-sshkey.c hydra-teamspeak.c hydra-postgres.c \ - hydra-rsh.c hydra-rlogin.c hydra-oracle-listener.c hydra-svn.c \ - hydra-pcanywhere.c hydra-sip.c hydra-oracle.c hydra-vmauthd.c \ + hydra-memcached.c hydra-mysql.c hydra-mssql.c hydra-xmpp.c \ + hydra-http-proxy-urlenum.c hydra-snmp.c hydra-cvs.c hydra-smtp.c \ + hydra-smtp-enum.c hydra-sapr3.c hydra-ssh.c hydra-sshkey.c hydra-teamspeak.c \ + hydra-postgres.c hydra-rsh.c hydra-rlogin.c hydra-oracle-listener.c \ + hydra-svn.c hydra-pcanywhere.c hydra-sip.c hydra-oracle.c hydra-vmauthd.c \ hydra-asterisk.c hydra-firebird.c hydra-afp.c hydra-ncp.c hydra-rdp.c \ hydra-oracle-sid.c hydra-http-proxy.c hydra-http-form.c hydra-irc.c \ hydra-s7-300.c hydra-redis.c hydra-adam6500.c hydra-rtsp.c \ @@ -25,11 +25,11 @@ SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ hydra-telnet.o hydra-cisco.o hydra-http.o hydra-ftp.o hydra-imap.o \ hydra-pop3.o hydra-smb.o hydra-icq.o hydra-cisco-enable.o hydra-ldap.o \ - hydra-mysql.o hydra-mssql.o hydra-xmpp.o hydra-http-proxy-urlenum.o \ - hydra-snmp.o hydra-cvs.o hydra-smtp.o hydra-smtp-enum.o hydra-sapr3.o \ - hydra-ssh.o hydra-sshkey.o hydra-teamspeak.o hydra-postgres.o \ - hydra-rsh.o hydra-rlogin.o hydra-oracle-listener.o hydra-svn.o \ - hydra-pcanywhere.o hydra-sip.o hydra-oracle-sid.o hydra-oracle.o \ + hydra-memcached.o hydra-mysql.o hydra-mssql.o hydra-xmpp.o \ + hydra-http-proxy-urlenum.o hydra-snmp.o hydra-cvs.o hydra-smtp.o \ + hydra-smtp-enum.o hydra-sapr3.o hydra-ssh.o hydra-sshkey.o hydra-teamspeak.o \ + hydra-postgres.o hydra-rsh.o hydra-rlogin.o hydra-oracle-listener.o \ + hydra-svn.o hydra-pcanywhere.o hydra-sip.o hydra-oracle-sid.o hydra-oracle.o \ hydra-vmauthd.o hydra-asterisk.o hydra-firebird.o hydra-afp.o \ hydra-ncp.o hydra-http-proxy.o hydra-http-form.o hydra-irc.o \ hydra-redis.o hydra-rdp.o hydra-s7-300.c hydra-adam6500.o hydra-rtsp.o \ diff --git a/configure b/configure index 88b1a05..f51bcf4 100755 --- a/configure +++ b/configure @@ -48,6 +48,8 @@ FIREBIRD_PATH="" FIREBIRD_IPATH="" MYSQL_PATH="" MYSQL_IPATH="" +MCACHED_PATH="" +MCACHED_IPATH="" AFP_PATH="" AFP_IPATH="" NCP_PATH="" @@ -940,6 +942,55 @@ if [ "X" = "X$ORACLE_PATH" -o "X" = "X$ORACLE_IPATH" ]; then ORACLE_IPATH="" fi +echo "Checking for Memcached (libmemcached.so, memcached.h) ..." + + for i in $LIBDIRS ; do + if [ "X" = "X$MCACHED_PATH" ]; then + if [ -f "$i/libmemcached.so" -o -f "$i/libmemcached.dylib" -o -f "$i/libmemcached.a" ]; then + MCACHED_PATH="$i" + fi + fi + if [ "X" = "X$MCACHED_PATH" ]; then + TMP_LIB=`/bin/ls $i/libmemcached.so* 2> /dev/null | grep memcached` + if [ -n "$TMP_LIB" ]; then + MCACHED_PATH="$i" + fi + fi + if [ "X" = "X$MCACHED_PATH" ]; then + TMP_LIB=`/bin/ls $i/libmemcached.dll* 2> /dev/null | grep memcached` + if [ -n "$TMP_LIB" ]; then + MCACHED_PATH="$i" + fi + fi + done + + MCACHED_IPATH= + for i in $INCDIRS ; do + if [ "X" = "X$MCACHED_IPATH" ]; then + if [ -f "$i/memcached.h" ]; then + MCACHED_IPATH="$i" + fi + if [ -f "$i/libmemcached/memcached.h" ]; then + MCACHED_IPATH="$i/libmemcached" + fi + if [ -f "$i/libmemcached-1.0/memcached.h" ]; then + MCACHED_IPATH="$i/libmemcached-1.0" + fi + fi + done + +if [ "X" != "X$DEBUG" ]; then + echo DEBUG: MCACHED_PATH=$MCACHED_PATH/libmemcached + echo DEBUG: MCACHED_IPATH=$MCACHED_IPATH/memcached.h +fi + if [ -n "$MCACHED_PATH" -a -n "$MCACHED_IPATH" ]; then + echo " ... found" + fi + if [ "X" = "X$MCACHED_PATH" -o "X" = "X$MCACHED_IPATH" ]; then + echo " ... NOT found, module memcached disabled" + MCACHED_PATH="" + MCACHED_IPATH="" + fi if [ "X" = "X$XHYDRA_SUPPORT" ]; then echo "Checking for GUI req's (pkg-config, gtk+-2.0) ..." @@ -1034,7 +1085,7 @@ XLIBS="" XLIBPATHS="" XIPATHS="" -if [ -n "$FIREBIRD_PATH" -o -n "$PCRE_PATH" -o -n "$IDN_PATH" -o -n "$SSL_PATH" -o -n "$CRYPTO_PATH" -o -n "$NSL_PATH" -o -n "$SOCKET_PATH" -o -n "$RESOLV_PATH" -o -n "$SAPR3_PATH" -o -n "$SSH_PATH" -o -n "$POSTGRES_PATH" -o -n "$SVN_PATH" -o -n "$NCP_PATH" -o -n "$CURSES_PATH" -o -n "$ORACLE_PATH" -o -n "$AFP_PATH" -o -n "$MYSQL_PATH" ]; then +if [ -n "$FIREBIRD_PATH" -o -n "$PCRE_PATH" -o -n "$IDN_PATH" -o -n "$SSL_PATH" -o -n "$CRYPTO_PATH" -o -n "$NSL_PATH" -o -n "$SOCKET_PATH" -o -n "$RESOLV_PATH" -o -n "$SAPR3_PATH" -o -n "$SSH_PATH" -o -n "$POSTGRES_PATH" -o -n "$SVN_PATH" -o -n "$NCP_PATH" -o -n "$CURSES_PATH" -o -n "$ORACLE_PATH" -o -n "$AFP_PATH" -o -n "$MYSQL_PATH" -o -n "$MCACHED_PATH" ]; then XLIBPATHS="-L/usr/lib -L/usr/local/lib -L/lib" fi if [ -n "$MYSQL_IPATH" ]; then @@ -1098,10 +1149,13 @@ fi if [ -n "$HAVE_GCRYPT" ]; then XDEFINES="$XDEFINES -DHAVE_GCRYPT" fi +if [ -n "$MCACHED_PATH" ]; then + XDEFINES="$XDEFINES -DLIBMCACHED" +fi OLDPATH="" -for i in $SSL_PATH $FIREBIRD_PATH $WORACLE_LIB_PATH $PCRE_PATH $IDN_PATH $CRYPTO_PATH $SSH_PATH $NSL_PATH $SOCKET_PATH $RESOLV_PATH $SAPR3_PATH $POSTGRES_PATH $SVN_PATH $NCP_PATH $CURSES_PATH $ORACLE_PATH $AFP_PATH $MYSQL_PATH; do +for i in $SSL_PATH $FIREBIRD_PATH $WORACLE_LIB_PATH $PCRE_PATH $IDN_PATH $CRYPTO_PATH $SSH_PATH $NSL_PATH $SOCKET_PATH $RESOLV_PATH $SAPR3_PATH $POSTGRES_PATH $SVN_PATH $NCP_PATH $CURSES_PATH $ORACLE_PATH $AFP_PATH $MYSQL_PATH $MCACHED_PATH; do if [ "$OLDPATH" = "$i" ]; then OLDPATH="$i" else @@ -1154,6 +1208,9 @@ fi if [ -n "$ORACLE_IPATH" ]; then XIPATHS="$XIPATHS -I$ORACLE_IPATH" fi +if [ -n "$MCACHED_IPATH" ]; then + XIPATHS="$XIPATHS -I$MCACHED_IPATH" +fi if [ -n "$HAVE_GCRYPT" ]; then XLIBS="$XLIBS -lgcrypt" fi @@ -1217,7 +1274,9 @@ fi if [ -n "$RESOLV_PATH" ]; then XLIBS="$XLIBS -lresolv" fi - +if [ -n "$MCACHED_PATH" ]; then + XLIBS="$XLIBS -lmemcached" +fi if [ -d /usr/kerberos/include ]; then XIPATHS="$XIPATHS -I/usr/kerberos/include" fi diff --git a/hydra-gtk/src/interface.c b/hydra-gtk/src/interface.c index f501d0b..1afccf9 100644 --- a/hydra-gtk/src/interface.c +++ b/hydra-gtk/src/interface.c @@ -248,6 +248,7 @@ GtkWidget *create_wndMain(void) { cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "ldap3"); cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "ldap3-crammd5"); cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "ldap3-digestmd5"); + cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "memcached"); cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "mssql"); cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "mysql"); cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "ncp"); diff --git a/hydra-memcached.c b/hydra-memcached.c new file mode 100644 index 0000000..9cbd7ac --- /dev/null +++ b/hydra-memcached.c @@ -0,0 +1,189 @@ +//This plugin was written by +//Tested on memcached 1.5.6-0ubuntu1 + +#ifdef LIBMCACHED +#include +#endif + +#include "hydra-mod.h" + +#ifndef LIBMCACHED +void dummy_mcached() { + printf("\n"); +} +#else + +extern int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec); + +extern char *HYDRA_EXIT; +char *buf; + +int mcached_send_com_quit(int32_t sock) { + char *com_quit = "quit\r\n"; + + if (hydra_send(sock, com_quit, strlen(com_quit), 0) < 0) + return 1; + return 0; +} + +int mcached_send_com_version(int32_t sock) { + char *com_version = "version\r\n"; + + if (hydra_send(sock, com_version, strlen(com_version), 0) < 0) + return 1; + return 0; +} + + + +int32_t start_mcached(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { + char *empty = ""; + char *login, *pass; + + memcached_server_st *servers = NULL; + memcached_return_t rc; + memcached_st *cache; + + if (strlen(login = hydra_get_next_login()) == 0) + login = empty; + if (strlen(pass = hydra_get_next_password()) == 0) + pass = empty; + + cache = memcached_create(NULL); + + rc = memcached_set_sasl_auth_data(cache, login, pass); + if (rc != MEMCACHED_SUCCESS) { + if (verbose) + hydra_report(stderr, "[ERROR] Couldn't setup SASL auth: %s\n", memcached_strerror(cache, rc)); + memcached_free(cache); + return 4; + } + + rc = memcached_behavior_set(cache, MEMCACHED_BEHAVIOR_BINARY_PROTOCOL, 1); + if (rc != MEMCACHED_SUCCESS) { + if (verbose) + hydra_report(stderr, "[ERROR] Couldn't use the binary protocol: %s\n", memcached_strerror(cache, rc)); + memcached_destroy_sasl_auth_data(cache); + memcached_free(cache); + return 4; + } + rc = memcached_behavior_set(cache, MEMCACHED_BEHAVIOR_CONNECT_TIMEOUT, 10000); + if (rc != MEMCACHED_SUCCESS) { + if (verbose) + hydra_report(stderr, "[ERROR] Couldn't set the connect timeout: %s\n", memcached_strerror(cache, rc)); + memcached_destroy_sasl_auth_data(cache); + memcached_free(cache); + return 4; + } + + servers = memcached_server_list_append(servers, hydra_address2string(ip), port, &rc); + rc = memcached_server_push(cache, servers); + if (rc != MEMCACHED_SUCCESS) { + if (verbose) + hydra_report(stderr, "[ERROR] Couldn't add server: %s\n", memcached_strerror(cache, rc)); + memcached_destroy_sasl_auth_data(cache); + memcached_free(cache); + return 4; + } + + rc = memcached_stat_execute(cache, "", NULL, NULL); + if (rc != MEMCACHED_SUCCESS) { + if (verbose) + hydra_report(stderr, "[ERROR] Couldn't get server stats: %s\n", memcached_strerror(cache, rc)); + memcached_destroy_sasl_auth_data(cache); + memcached_free(cache); + hydra_completed_pair_skip(); + if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) { + return 4; + } + return 3; + } + + memcached_destroy_sasl_auth_data(cache); + memcached_free(cache); + + hydra_report_found_host(port, ip, "memcached", fp); + hydra_completed_pair_found(); + if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) + return 4; + + return 3; +} + +void service_mcached(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_MCACHED; + + hydra_register_socket(sp); + + while (1) { + if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) + return; + + switch (run) { + case 1: /* connect and service init function */ + if (sock >= 0) + sock = hydra_disconnect(sock); + + if (port != 0) + myport = port; + + sock = hydra_connect_tcp(ip, myport); + port = myport; + + if (sock < 0) { + if (verbose || debug) + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_child_exit(1); + } + + if (mcached_send_com_version(sock)) { + return; + } + if (hydra_data_ready_timed(sock, 0, 1000) > 0) { + buf = hydra_receive_line(sock); + if (strstr(buf, "VERSION ")) { + hydra_report_found_host(port, ip, "memcached", fp); + free(buf); + mcached_send_com_quit(sock); + if (sock >= 0) + sock = hydra_disconnect(sock); + hydra_report(stderr, "[ERROR] Memcached server does not need any authentication\n"); + return; + } + free(buf); + } + sock = hydra_disconnect(sock); + //authentication is required, let's use libmemcached + next_run = 2; + break; + case 2: + next_run = start_mcached(sock, ip, port, options, miscptr, fp); + break; + case 3: + hydra_child_exit(0); + return; + default: + if (!verbose) + hydra_report(stderr, "[ERROR] Caught unknown return code, try verbose option for more details\n"); + hydra_child_exit(2); + } + run = next_run; + } +} + +#endif + +int32_t service_mcached_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + // called before the childrens are forked off, so this is the function + // which should be filled if initial connections and service setup has to be + // performed once only. + // + // fill if needed. + // + // return codes: + // 0 all OK + // -1 error, hydra will exit, so print a good error message here + + return 0; +} diff --git a/hydra.c b/hydra.c index bc355a8..e184abc 100644 --- a/hydra.c +++ b/hydra.c @@ -146,7 +146,10 @@ extern int32_t service_oracle_init(char *ip, int32_t sp, unsigned char options, extern void service_radmin2(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); extern int32_t service_radmin2_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); #endif - +#ifdef LIBMCACHED +extern void service_mcached(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); +extern int32_t service_mcached_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); +#endif extern int32_t service_adam6500_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); extern int32_t service_cisco_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); @@ -186,7 +189,7 @@ extern int32_t service_rpcap_init(char *ip, int32_t sp, unsigned char options, c // ADD NEW SERVICES HERE char *SERVICES = - "adam6500 asterisk afp cisco cisco-enable cvs firebird ftp[s] http[s]-{head|get|post} http[s]-{get|post}-form http-proxy http-proxy-urlenum icq imap[s] irc ldap2[s] ldap3[-{cram|digest}md5][s] mssql mysql ncp nntp oracle oracle-listener oracle-sid pcanywhere pcnfs pop3[s] postgres radmin2 rdp redis rexec rlogin rpcap rsh rtsp s7-300 sapr3 sip smb smtp[s] smtp-enum snmp socks5 ssh sshkey svn teamspeak telnet[s] vmauthd vnc xmpp"; + "adam6500 asterisk afp cisco cisco-enable cvs firebird ftp[s] http[s]-{head|get|post} http[s]-{get|post}-form http-proxy http-proxy-urlenum icq imap[s] irc ldap2[s] ldap3[-{cram|digest}md5][s] memcached mssql mysql ncp nntp oracle oracle-listener oracle-sid pcanywhere pcnfs pop3[s] postgres radmin2 rdp redis rexec rlogin rpcap rsh rtsp s7-300 sapr3 sip smb smtp[s] smtp-enum snmp socks5 ssh sshkey svn teamspeak telnet[s] vmauthd vnc xmpp"; #define MAXBUF 520 #define MAXLINESIZE ( ( MAXBUF / 2 ) - 4 ) @@ -381,6 +384,9 @@ static const struct { { "ldap3", service_ldap_init, service_ldap3, usage_ldap }, { "ldap3-crammd5", service_ldap_init, service_ldap3_cram_md5, usage_ldap }, { "ldap3-digestmd5", service_ldap_init, service_ldap3_digest_md5, usage_ldap }, +#ifdef LIBMCACHED + {"memcached", service_mcached_init, service_mcached, NULL}, +#endif SERVICE(mssql), #ifdef HAVE_MATH_H SERVICE3("mysql", mysql), @@ -1239,6 +1245,7 @@ int32_t hydra_lookup_port(char *service) { {"oracle-listener", PORT_ORACLE, PORT_ORACLE_SSL}, {"oracle-sid", PORT_ORACLE, PORT_ORACLE_SSL}, {"oracle", PORT_ORACLE, PORT_ORACLE_SSL}, + {"memcached", PORT_MCACHED, PORT_MCACHED_SSL}, {"mssql", PORT_MSSQL, PORT_MSSQL_SSL}, {"mysql", PORT_MYSQL, PORT_MYSQL_SSL}, {"postgres", PORT_POSTGRES, PORT_POSTGRES_SSL}, @@ -2072,6 +2079,10 @@ int main(int argc, char *argv[]) { SERVICES = hydra_string_replace(SERVICES, "firebird ", ""); strcat(unsupported, "firebird "); #endif +#ifndef LIBMCACHED + SERVICES = hydra_string_replace(SERVICES, "memcached ", ""); + strcat(unsupported, "memcached "); +#endif #ifndef LIBMYSQLCLIENT SERVICES = hydra_string_replace(SERVICES, "mysql ", "mysql(v4) "); strcat(unsupported, "mysql5 "); @@ -2106,6 +2117,7 @@ int main(int argc, char *argv[]) { SERVICES = hydra_string_replace(SERVICES, "svn ", ""); strcat(unsupported, "svn "); #endif + #ifndef LIBOPENSSL // for ftps SERVICES = hydra_string_replace(SERVICES, "ftp[s]", "ftp"); @@ -2527,7 +2539,7 @@ int main(int argc, char *argv[]) { if (strcmp(hydra_options.service, "afp") == 0 || strcmp(hydra_options.service, "firebird") == 0 || strncmp(hydra_options.service, "mysql", 5) == 0 || strcmp(hydra_options.service, "ncp") == 0 || strcmp(hydra_options.service, "oracle") == 0 || strcmp(hydra_options.service, "postgres") == 0 || strncmp(hydra_options.service, "ssh", 3) == 0 || strcmp(hydra_options.service, "sshkey") == 0 || strcmp(hydra_options.service, "svn") == 0 || - strcmp(hydra_options.service, "sapr3") == 0) { + strcmp(hydra_options.service, "sapr3") == 0 || strcmp(hydra_options.service, "memcached") == 0) { fprintf(stderr, "[WARNING] module %s does not support HYDRA_PROXY* !\n", hydra_options.service); proxy_string = NULL; } @@ -2604,6 +2616,13 @@ int main(int argc, char *argv[]) { fprintf(stderr, "[WARNING] The icq module is not working with the modern protocol version! (somebody else will need to fix this as I don't care for icq)\n"); i = 1; } + if (strcmp(hydra_options.service, "memcached") == 0) +#ifdef LIBMCACHED + i = 1; +#else + bail("Compiled without LIBMCACHED support, module not available!"); +#endif + if (strcmp(hydra_options.service, "mysql") == 0) { i = 1; if (hydra_options.tasks > 4) { @@ -2660,6 +2679,7 @@ int main(int argc, char *argv[]) { #else bail("Compiled without LIBNCP support, module not available!"); #endif + if (strcmp(hydra_options.service, "pcanywhere") == 0) i = 1; if (strcmp(hydra_options.service, "http-proxy") == 0) { diff --git a/hydra.h b/hydra.h index d1fcc60..2c83b63 100644 --- a/hydra.h +++ b/hydra.h @@ -144,6 +144,8 @@ #define PORT_RPCAP 2002 #define PORT_RPCAP_SSL 2002 #define PORT_RADMIN2 4899 +#define PORT_MCACHED 11211 +#define PORT_MCACHED_SSL 11211 #define False 0 #define True 1 From 09b2af9c8c66ec6550afcb9be86262dc11696f48 Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Sat, 9 Mar 2019 08:38:32 +0800 Subject: [PATCH 174/531] update README for new memcached module --- README | 4 ++-- README.md | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/README b/README index 3847215..8efea25 100644 --- a/README +++ b/README @@ -34,7 +34,7 @@ Currently this tool supports the following protocols: Asterisk, AFP, Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird, FTP, HTTP-FORM-GET, HTTP-FORM-POST, HTTP-GET, HTTP-HEAD, HTTP-POST, HTTP-PROXY, HTTPS-FORM-GET, HTTPS-FORM-POST, HTTPS-GET, HTTPS-HEAD, HTTPS-POST, - HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, + HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MEMCACHED, MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, Oracle SID, Oracle, PC-Anywhere, PCNFS, POP3, POSTGRES, RDP, Rexec, Rlogin, Rsh, RTSP, SAP/R3, SIP, SMB, SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, @@ -81,7 +81,7 @@ for a few optional modules (note that some might not be available on your distri ``` apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev \ libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev \ - firebird-dev + firebird-dev libmemcached-dev ``` This enables all optional modules and features with the exception of Oracle, diff --git a/README.md b/README.md index 3847215..8efea25 100644 --- a/README.md +++ b/README.md @@ -34,7 +34,7 @@ Currently this tool supports the following protocols: Asterisk, AFP, Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird, FTP, HTTP-FORM-GET, HTTP-FORM-POST, HTTP-GET, HTTP-HEAD, HTTP-POST, HTTP-PROXY, HTTPS-FORM-GET, HTTPS-FORM-POST, HTTPS-GET, HTTPS-HEAD, HTTPS-POST, - HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, + HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MEMCACHED, MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, Oracle SID, Oracle, PC-Anywhere, PCNFS, POP3, POSTGRES, RDP, Rexec, Rlogin, Rsh, RTSP, SAP/R3, SIP, SMB, SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, @@ -81,7 +81,7 @@ for a few optional modules (note that some might not be available on your distri ``` apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev \ libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev \ - firebird-dev + firebird-dev libmemcached-dev ``` This enables all optional modules and features with the exception of Oracle, From 1ad374b6a1f4677440fb88fbb242028fd9679dde Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Fri, 15 Mar 2019 22:39:37 +0800 Subject: [PATCH 175/531] Fix hydra child exit --- hydra-memcached.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/hydra-memcached.c b/hydra-memcached.c index 9cbd7ac..ffce020 100644 --- a/hydra-memcached.c +++ b/hydra-memcached.c @@ -148,8 +148,9 @@ void service_mcached(char *ip, int32_t sp, unsigned char options, char *miscptr, mcached_send_com_quit(sock); if (sock >= 0) sock = hydra_disconnect(sock); - hydra_report(stderr, "[ERROR] Memcached server does not need any authentication\n"); - return; + hydra_report(stderr, "[ERROR] Memcached server does not require any authentication\n"); + next_run = 3; + break; } free(buf); } From af808bc4d90a0d9ff1b3993414ec7cc40f911913 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Sat, 16 Mar 2019 18:20:08 -0400 Subject: [PATCH 176/531] http md5-digest fix --- CHANGES | 1 + hydra-http.c | 9 +++++---- 2 files changed, 6 insertions(+), 4 deletions(-) diff --git a/CHANGES b/CHANGES index d9dce31..edf5588 100644 --- a/CHANGES +++ b/CHANGES @@ -5,6 +5,7 @@ Release 8.9-dev * your patch? :) * Fixed svn module memory leaks * Fixed rtsp module potential buffer overflow +* Fixed http module DIGEST-MD5 mode * Added memcached module diff --git a/hydra-http.c b/hydra-http.c index db9b500..8b19b28 100644 --- a/hydra-http.c +++ b/hydra-http.c @@ -13,7 +13,7 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha char *login, *pass, *buffer, buffer2[500]; char *header; char *ptr, *fooptr; - int32_t complete_line = 0; + int32_t complete_line = 0, buffer_size; char tmpreplybuf[1024] = "", *tmpreplybufptr; if (strlen(login = hydra_get_next_login()) == 0) @@ -26,7 +26,8 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha header = stringify_headers(&ptr_head); - if(!(buffer = malloc(strlen(header) + 500))) { + buffer_size = strlen(header) + 500; + if(!(buffer = malloc(buffer_size))) { free(header); return 3; } @@ -63,8 +64,8 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha char *pbuffer; pbuffer = hydra_strcasestr(http_buf, "WWW-Authenticate: Digest "); - strncpy(buffer, pbuffer + strlen("WWW-Authenticate: Digest "), sizeof(buffer)); - buffer[sizeof(buffer) - 1] = '\0'; + strncpy(buffer, pbuffer + strlen("WWW-Authenticate: Digest "), buffer_size - 1); + buffer[buffer_size - 1] = '\0'; fooptr = buffer2; sasl_digest_md5(fooptr, login, pass, buffer, miscptr, type, webtarget, webport, header); From 95819bf458bd051c64ed77b8adb38db4ad0e0969 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Sun, 17 Mar 2019 09:39:03 -0400 Subject: [PATCH 177/531] return 255 fix --- hydra.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/hydra.c b/hydra.c index e184abc..2f42e95 100644 --- a/hydra.c +++ b/hydra.c @@ -3985,8 +3985,8 @@ int main(int argc, char *argv[]) { error += j; k = 0; - for (j = 0; j < hydra_options.max_use; j++) - if (hydra_heads[j]->active == HEAD_ACTIVE) + for (i = 0; i < hydra_options.max_use; i++) + if (hydra_heads[i]->active == HEAD_ACTIVE) k++; if (error == 0 && k == 0) { From 6575bf964d8df241cbd48477edbc9339d18196ba Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Wed, 20 Mar 2019 10:35:51 +0800 Subject: [PATCH 178/531] Fix unauthenticated memcached server detection --- hydra-memcached.c | 99 +++++++++++++++++++++-------------------------- 1 file changed, 44 insertions(+), 55 deletions(-) diff --git a/hydra-memcached.c b/hydra-memcached.c index ffce020..83970fd 100644 --- a/hydra-memcached.c +++ b/hydra-memcached.c @@ -16,7 +16,6 @@ void dummy_mcached() { extern int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec); extern char *HYDRA_EXIT; -char *buf; int mcached_send_com_quit(int32_t sock) { char *com_quit = "quit\r\n"; @@ -56,7 +55,7 @@ int32_t start_mcached(int32_t s, char *ip, int32_t port, unsigned char options, if (verbose) hydra_report(stderr, "[ERROR] Couldn't setup SASL auth: %s\n", memcached_strerror(cache, rc)); memcached_free(cache); - return 4; + return 3; } rc = memcached_behavior_set(cache, MEMCACHED_BEHAVIOR_BINARY_PROTOCOL, 1); @@ -65,7 +64,7 @@ int32_t start_mcached(int32_t s, char *ip, int32_t port, unsigned char options, hydra_report(stderr, "[ERROR] Couldn't use the binary protocol: %s\n", memcached_strerror(cache, rc)); memcached_destroy_sasl_auth_data(cache); memcached_free(cache); - return 4; + return 3; } rc = memcached_behavior_set(cache, MEMCACHED_BEHAVIOR_CONNECT_TIMEOUT, 10000); if (rc != MEMCACHED_SUCCESS) { @@ -73,7 +72,7 @@ int32_t start_mcached(int32_t s, char *ip, int32_t port, unsigned char options, hydra_report(stderr, "[ERROR] Couldn't set the connect timeout: %s\n", memcached_strerror(cache, rc)); memcached_destroy_sasl_auth_data(cache); memcached_free(cache); - return 4; + return 3; } servers = memcached_server_list_append(servers, hydra_address2string(ip), port, &rc); @@ -83,7 +82,7 @@ int32_t start_mcached(int32_t s, char *ip, int32_t port, unsigned char options, hydra_report(stderr, "[ERROR] Couldn't add server: %s\n", memcached_strerror(cache, rc)); memcached_destroy_sasl_auth_data(cache); memcached_free(cache); - return 4; + return 3; } rc = memcached_stat_execute(cache, "", NULL, NULL); @@ -94,9 +93,9 @@ int32_t start_mcached(int32_t s, char *ip, int32_t port, unsigned char options, memcached_free(cache); hydra_completed_pair_skip(); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) { - return 4; + return 3; } - return 3; + return 2; } memcached_destroy_sasl_auth_data(cache); @@ -105,14 +104,13 @@ int32_t start_mcached(int32_t s, char *ip, int32_t port, unsigned char options, hydra_report_found_host(port, ip, "memcached", fp); hydra_completed_pair_found(); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) - return 4; + return 3; - return 3; + return 2; } void service_mcached(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; - int32_t myport = PORT_MCACHED; hydra_register_socket(sp); @@ -121,47 +119,10 @@ void service_mcached(char *ip, int32_t sp, unsigned char options, char *miscptr, return; switch (run) { - case 1: /* connect and service init function */ - if (sock >= 0) - sock = hydra_disconnect(sock); - - if (port != 0) - myport = port; - - sock = hydra_connect_tcp(ip, myport); - port = myport; - - if (sock < 0) { - if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); - hydra_child_exit(1); - } - - if (mcached_send_com_version(sock)) { - return; - } - if (hydra_data_ready_timed(sock, 0, 1000) > 0) { - buf = hydra_receive_line(sock); - if (strstr(buf, "VERSION ")) { - hydra_report_found_host(port, ip, "memcached", fp); - free(buf); - mcached_send_com_quit(sock); - if (sock >= 0) - sock = hydra_disconnect(sock); - hydra_report(stderr, "[ERROR] Memcached server does not require any authentication\n"); - next_run = 3; - break; - } - free(buf); - } - sock = hydra_disconnect(sock); - //authentication is required, let's use libmemcached - next_run = 2; - break; - case 2: + case 1: next_run = start_mcached(sock, ip, port, options, miscptr, fp); break; - case 3: + case 2: hydra_child_exit(0); return; default: @@ -179,12 +140,40 @@ int32_t service_mcached_init(char *ip, int32_t sp, unsigned char options, char * // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. - // - // fill if needed. - // - // return codes: - // 0 all OK - // -1 error, hydra will exit, so print a good error message here + int32_t sock = -1; + int32_t myport = PORT_MCACHED; + char *buf; + + if (port != 0) + myport = port; + + sock = hydra_connect_tcp(ip, myport); + if (sock < 0) { + if (verbose || debug) + hydra_report(stderr, "[ERROR] Can not connect\n"); + return -1; + } + + if (mcached_send_com_version(sock)) { + if (verbose || debug) + hydra_report(stderr, "[ERROR] Can not send request\n"); + return -1; + } + + if (hydra_data_ready_timed(sock, 0, 1000) > 0) { + buf = hydra_receive_line(sock); + if (strstr(buf, "VERSION ")) { + hydra_report_found_host(port, ip, "memcached", fp); + mcached_send_com_quit(sock); + if (sock >= 0) + sock = hydra_disconnect(sock); + hydra_report(stderr, "[ERROR] Memcached server does not require any authentication\n"); + } + free(buf); + return -1; + } + if (sock >= 0) + sock = hydra_disconnect(sock); return 0; } From 012fbe6d1b75eca528b017925d0781d0ce007176 Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Wed, 20 Mar 2019 10:45:42 +0800 Subject: [PATCH 179/531] Add module for mongodb --- Android.mk | 1 + CHANGES | 1 + Makefile.am | 4 +- README | 2 +- README.md | 2 +- configure | 115 +++++++++++++++++++++++- hydra-gtk/src/interface.c | 1 + hydra-mongodb.c | 184 ++++++++++++++++++++++++++++++++++++++ hydra.c | 28 +++++- hydra.h | 1 + 10 files changed, 330 insertions(+), 9 deletions(-) create mode 100644 hydra-mongodb.c diff --git a/Android.mk b/Android.mk index 30ff6fa..8e414d1 100644 --- a/Android.mk +++ b/Android.mk @@ -41,6 +41,7 @@ LOCAL_SRC_FILES:= \ hydra-ldap.c\ hydra-mod.c\ hydra-memcached.c\ + hydra-mongodb.c\ hydra-mssql.c\ hydra-mysql.c\ hydra-ncp.c\ diff --git a/CHANGES b/CHANGES index d9dce31..a1e040e 100644 --- a/CHANGES +++ b/CHANGES @@ -6,6 +6,7 @@ Release 8.9-dev * Fixed svn module memory leaks * Fixed rtsp module potential buffer overflow * Added memcached module +* Added mongodb module Release 8.9.1 diff --git a/Makefile.am b/Makefile.am index 236719d..046aded 100644 --- a/Makefile.am +++ b/Makefile.am @@ -12,7 +12,7 @@ DESTDIR ?= SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ hydra-telnet.c hydra-cisco.c hydra-http.c hydra-ftp.c hydra-imap.c \ hydra-pop3.c hydra-smb.c hydra-icq.c hydra-cisco-enable.c hydra-ldap.c \ - hydra-memcached.c hydra-mysql.c hydra-mssql.c hydra-xmpp.c \ + hydra-memcached.c hydra-mongodb.c hydra-mysql.c hydra-mssql.c hydra-xmpp.c \ hydra-http-proxy-urlenum.c hydra-snmp.c hydra-cvs.c hydra-smtp.c \ hydra-smtp-enum.c hydra-sapr3.c hydra-ssh.c hydra-sshkey.c hydra-teamspeak.c \ hydra-postgres.c hydra-rsh.c hydra-rlogin.c hydra-oracle-listener.c \ @@ -25,7 +25,7 @@ SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ hydra-telnet.o hydra-cisco.o hydra-http.o hydra-ftp.o hydra-imap.o \ hydra-pop3.o hydra-smb.o hydra-icq.o hydra-cisco-enable.o hydra-ldap.o \ - hydra-memcached.o hydra-mysql.o hydra-mssql.o hydra-xmpp.o \ + hydra-memcached.o hydra-mongodb.o hydra-mysql.o hydra-mssql.o hydra-xmpp.o \ hydra-http-proxy-urlenum.o hydra-snmp.o hydra-cvs.o hydra-smtp.o \ hydra-smtp-enum.o hydra-sapr3.o hydra-ssh.o hydra-sshkey.o hydra-teamspeak.o \ hydra-postgres.o hydra-rsh.o hydra-rlogin.o hydra-oracle-listener.o \ diff --git a/README b/README index 8efea25..442c827 100644 --- a/README +++ b/README @@ -34,7 +34,7 @@ Currently this tool supports the following protocols: Asterisk, AFP, Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird, FTP, HTTP-FORM-GET, HTTP-FORM-POST, HTTP-GET, HTTP-HEAD, HTTP-POST, HTTP-PROXY, HTTPS-FORM-GET, HTTPS-FORM-POST, HTTPS-GET, HTTPS-HEAD, HTTPS-POST, - HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MEMCACHED, MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, + HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MEMCACHED, MONGODB, MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, Oracle SID, Oracle, PC-Anywhere, PCNFS, POP3, POSTGRES, RDP, Rexec, Rlogin, Rsh, RTSP, SAP/R3, SIP, SMB, SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, diff --git a/README.md b/README.md index 8efea25..442c827 100644 --- a/README.md +++ b/README.md @@ -34,7 +34,7 @@ Currently this tool supports the following protocols: Asterisk, AFP, Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird, FTP, HTTP-FORM-GET, HTTP-FORM-POST, HTTP-GET, HTTP-HEAD, HTTP-POST, HTTP-PROXY, HTTPS-FORM-GET, HTTPS-FORM-POST, HTTPS-GET, HTTPS-HEAD, HTTPS-POST, - HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MEMCACHED, MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, + HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MEMCACHED, MONGODB, MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, Oracle SID, Oracle, PC-Anywhere, PCNFS, POP3, POSTGRES, RDP, Rexec, Rlogin, Rsh, RTSP, SAP/R3, SIP, SMB, SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, diff --git a/configure b/configure index f51bcf4..0945974 100755 --- a/configure +++ b/configure @@ -50,6 +50,10 @@ MYSQL_PATH="" MYSQL_IPATH="" MCACHED_PATH="" MCACHED_IPATH="" +MONGODB_PATH="" +MONGODB_IPATH="" +BSON_PATH="" +BSON_IPATH="" AFP_PATH="" AFP_IPATH="" NCP_PATH="" @@ -992,6 +996,97 @@ fi MCACHED_IPATH="" fi + +echo "Checking for Mongodb (libmongoc-1.0.so, mongoc.h, libbson-1.0.so, bson.h) ..." + + for i in $LIBDIRS ; do + if [ "X" = "X$MONGODB_PATH" ]; then + if [ -f "$i/libmongoc-1.0.so" -o -f "$i/libmongoc-1.0.dylib" -o -f "$i/libmongoc-1.0.a" ]; then + MONGODB_PATH="$i" + fi + fi + if [ "X" = "X$MONGODB_PATH" ]; then + TMP_LIB=`/bin/ls $i/libmongoc-*.so* 2> /dev/null | grep mongoc` + if [ -n "$TMP_LIB" ]; then + MONGODB_PATH="$i" + fi + fi + if [ "X" = "X$MONGODB_PATH" ]; then + TMP_LIB=`/bin/ls $i/libmongoc.dll* 2> /dev/null | grep mongoc` + if [ -n "$TMP_LIB" ]; then + MONGODB_PATH="$i" + fi + fi + done + + MONGODB_IPATH= + for i in $INCDIRS ; do + if [ "X" = "X$MONGODB_IPATH" ]; then + if [ -f "$i/mongoc.h" ]; then + MONGODB_IPATH="$i" + fi + if [ -f "$i/libmongoc/mongoc.h" ]; then + MONGODB_IPATH="$i/libmongoc" + fi + if [ -f "$i/libmongoc-1.0/mongoc.h" ]; then + MONGODB_IPATH="$i/libmongoc-1.0" + fi + fi + done + + for i in $LIBDIRS ; do + if [ "X" = "X$BSON_PATH" ]; then + if [ -f "$i/libbson-1.0.so" -o -f "$i/libbson-1.0.dylib" -o -f "$i/libbson-1.0.a" ]; then + BSON_PATH="$i" + fi + fi + if [ "X" = "X$BSON_PATH" ]; then + TMP_LIB=`/bin/ls $i/libbson-*.so* 2> /dev/null | grep mongoc` + if [ -n "$TMP_LIB" ]; then + BSON_PATH="$i" + fi + fi + if [ "X" = "X$BSON_PATH" ]; then + TMP_LIB=`/bin/ls $i/libbson.dll* 2> /dev/null | grep mongoc` + if [ -n "$TMP_LIB" ]; then + BSON_PATH="$i" + fi + fi + done + + BSON_IPATH= + for i in $INCDIRS ; do + if [ "X" = "X$BSON_IPATH" ]; then + if [ -f "$i/bson.h" ]; then + BSON_IPATH="$i" + fi + if [ -f "$i/libbson/bson.h" ]; then + BSON_IPATH="$i/libbson" + fi + if [ -f "$i/libbson-1.0/bson.h" ]; then + BSON_IPATH="$i/libbson-1.0" + fi + fi + done + +if [ "X" != "X$DEBUG" ]; then + echo DEBUG: MONGODB_PATH=$MONGODB_PATH/libmongoc + echo DEBUG: MONGODB_IPATH=$MONGODB_IPATH/libmongoc.h + echo DEBUG: BSON_PATH=$BSON_PATH/libbson + echo DEBUG: BSON_IPATH=$BSON_IPATH/libbson.h +fi + + if [ -n "$MONGODB_PATH" -a -n "$MONGODB_IPATH" -a -n "$BSON_PATH" -a -n "$BSON_IPATH" ]; then + echo " ... found" + fi + if [ "X" = "X$MONGODB_PATH" -o "X" = "X$MONGODB_IPATH" -o "X" = "X$BSON_PATH" -o "X" = "X$BSON_IPATH" ]; then + echo " ... NOT found, module mongodb disabled" + MONGODB_PATH="" + MONGODB_IPATH="" + BSON_PATH="" + BSON_IPATH="" + fi + if [ "X" = "X$XHYDRA_SUPPORT" ]; then echo "Checking for GUI req's (pkg-config, gtk+-2.0) ..." XHYDRA_SUPPORT=`pkg-config --help > /dev/null 2>&1 || echo disabled` @@ -1085,7 +1180,7 @@ XLIBS="" XLIBPATHS="" XIPATHS="" -if [ -n "$FIREBIRD_PATH" -o -n "$PCRE_PATH" -o -n "$IDN_PATH" -o -n "$SSL_PATH" -o -n "$CRYPTO_PATH" -o -n "$NSL_PATH" -o -n "$SOCKET_PATH" -o -n "$RESOLV_PATH" -o -n "$SAPR3_PATH" -o -n "$SSH_PATH" -o -n "$POSTGRES_PATH" -o -n "$SVN_PATH" -o -n "$NCP_PATH" -o -n "$CURSES_PATH" -o -n "$ORACLE_PATH" -o -n "$AFP_PATH" -o -n "$MYSQL_PATH" -o -n "$MCACHED_PATH" ]; then +if [ -n "$FIREBIRD_PATH" -o -n "$PCRE_PATH" -o -n "$IDN_PATH" -o -n "$SSL_PATH" -o -n "$CRYPTO_PATH" -o -n "$NSL_PATH" -o -n "$SOCKET_PATH" -o -n "$RESOLV_PATH" -o -n "$SAPR3_PATH" -o -n "$SSH_PATH" -o -n "$POSTGRES_PATH" -o -n "$SVN_PATH" -o -n "$NCP_PATH" -o -n "$CURSES_PATH" -o -n "$ORACLE_PATH" -o -n "$AFP_PATH" -o -n "$MYSQL_PATH" -o -n "$MCACHED_PATH" -o -n "$MONGOD_PATH" ]; then XLIBPATHS="-L/usr/lib -L/usr/local/lib -L/lib" fi if [ -n "$MYSQL_IPATH" ]; then @@ -1152,10 +1247,15 @@ fi if [ -n "$MCACHED_PATH" ]; then XDEFINES="$XDEFINES -DLIBMCACHED" fi - +if [ -n "$MONGODB_PATH" ]; then + XDEFINES="$XDEFINES -DLIBMONGODB" +fi +if [ -n "$BSON_PATH" ]; then + XDEFINES="$XDEFINES -DLIBBSON" +fi OLDPATH="" -for i in $SSL_PATH $FIREBIRD_PATH $WORACLE_LIB_PATH $PCRE_PATH $IDN_PATH $CRYPTO_PATH $SSH_PATH $NSL_PATH $SOCKET_PATH $RESOLV_PATH $SAPR3_PATH $POSTGRES_PATH $SVN_PATH $NCP_PATH $CURSES_PATH $ORACLE_PATH $AFP_PATH $MYSQL_PATH $MCACHED_PATH; do +for i in $SSL_PATH $FIREBIRD_PATH $WORACLE_LIB_PATH $PCRE_PATH $IDN_PATH $CRYPTO_PATH $SSH_PATH $NSL_PATH $SOCKET_PATH $RESOLV_PATH $SAPR3_PATH $POSTGRES_PATH $SVN_PATH $NCP_PATH $CURSES_PATH $ORACLE_PATH $AFP_PATH $MYSQL_PATH $MCACHED_PATH $MONGODB_PATH $BSON_PATH; do if [ "$OLDPATH" = "$i" ]; then OLDPATH="$i" else @@ -1211,6 +1311,9 @@ fi if [ -n "$MCACHED_IPATH" ]; then XIPATHS="$XIPATHS -I$MCACHED_IPATH" fi +if [ -n "$MONGODB_IPATH" ]; then + XIPATHS="$XIPATHS -I$MONGODB_IPATH -I$BSON_IPATH" +fi if [ -n "$HAVE_GCRYPT" ]; then XLIBS="$XLIBS -lgcrypt" fi @@ -1277,6 +1380,12 @@ fi if [ -n "$MCACHED_PATH" ]; then XLIBS="$XLIBS -lmemcached" fi +if [ -n "$MONGODB_PATH" ]; then + XLIBS="$XLIBS -lmongoc-1.0" +fi +if [ -n "$BSON_PATH" ]; then + XLIBS="$XLIBS -lbson-1.0" +fi if [ -d /usr/kerberos/include ]; then XIPATHS="$XIPATHS -I/usr/kerberos/include" fi diff --git a/hydra-gtk/src/interface.c b/hydra-gtk/src/interface.c index 1afccf9..6b665eb 100644 --- a/hydra-gtk/src/interface.c +++ b/hydra-gtk/src/interface.c @@ -249,6 +249,7 @@ GtkWidget *create_wndMain(void) { cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "ldap3-crammd5"); cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "ldap3-digestmd5"); cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "memcached"); + cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "mongodb"); cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "mssql"); cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "mysql"); cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "ncp"); diff --git a/hydra-mongodb.c b/hydra-mongodb.c new file mode 100644 index 0000000..c5b69a6 --- /dev/null +++ b/hydra-mongodb.c @@ -0,0 +1,184 @@ +//This plugin was written by +//Tested on mongodb-server 1:3.6.3-0ubuntu1 +//MONGODB-CR is been deprecated + +#ifdef LIBMONGODB +#include +#endif + +#include "hydra-mod.h" + +#ifndef LIBMONGODB +void dummy_mcached() { + printf("\n"); +} +#else + +extern int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec); + +extern char *HYDRA_EXIT; +char *buf; + +#define DEFAULT_DB "admin" + +int is_error_msg(char *msg) { + if (strstr(msg, "errmsg ")) { + if (debug) + hydra_report(stderr, "[ERROR] %s\n", msg); + return 1; + } + return 0; +} + +int require_auth(int32_t sock) { + unsigned char m_hdr[] = + "\x3f\x00\x00\x00" //messageLength (63) + "\x00\x00\x00\x41" //requestID + "\xff\xff\xff\xff" //responseTo + "\xd4\x07\x00\x00" //opCode (2004 OP_QUERY) + "\x00\x00\x00\x00" //flags + "\x61\x64\x6d\x69\x6e\x2e\x24\x63\x6d\x64\x00" //fullCollectionName (admin.$cmd) + "\x00\x00\x00\x00" //numberToSkip (0) + "\x01\x00\x00\x00" //numberToReturn (1) + "\x18\x00\x00\x00\x10\x6c\x69\x73\x74\x44\x61\x74\x61\x62\x61\x73\x65\x73\x00\x01\x00\x00\x00\x00"; //query ({"listDatabases"=>1}) + + if (hydra_send(sock, m_hdr, sizeof(m_hdr), 0) > 0) { + if (hydra_data_ready_timed(sock, 0, 1000) > 0) { + buf = hydra_receive_line(sock); + return is_error_msg(buf); + } + } + return 2; +} + +int32_t start_mongodb(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { + char *empty = ""; + char *login, *pass; + char uri[256]; + mongoc_client_t *client; + mongoc_database_t *database; + mongoc_collection_t *collection; + mongoc_cursor_t *cursor; + bson_t q; + const bson_t *doc; + bson_error_t error; + bool r; + + if (strlen(login = hydra_get_next_login()) == 0) + login = empty; + if (strlen(pass = hydra_get_next_password()) == 0) + pass = empty; + + mongoc_init(); + mongoc_log_set_handler (NULL, NULL); + bson_init(&q); + + snprintf(uri, sizeof(uri), "mongodb://%s:%s@%s/?authSource=%s",login, pass, hydra_address2string(ip), miscptr); + client = mongoc_client_new(uri); + if (!client) + return 3; + + mongoc_client_set_appname(client, "hydra"); + collection = mongoc_client_get_collection(client, miscptr, "test"); + cursor = mongoc_collection_find_with_opts(collection, &q, NULL, NULL); + r = mongoc_cursor_next(cursor, &doc); + if (!r) { + r = mongoc_cursor_error(cursor, &error); + if (r) { + if (verbose) + hydra_report(stderr, "[ERROR] Can not read document: %s\n", error.message); + mongoc_cursor_destroy(cursor); + mongoc_collection_destroy(collection); + mongoc_client_destroy(client); + mongoc_cleanup(); + hydra_completed_pair_skip(); + if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) { + return 3; + } + return 2; + } + } + + mongoc_cursor_destroy(cursor); + mongoc_collection_destroy(collection); + mongoc_client_destroy(client); + mongoc_cleanup(); + + hydra_report_found_host(port, ip, "mongodb", fp); + hydra_completed_pair_found(); + if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) + return 3; + + return 2; +} + +void service_mongodb(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + + if (!miscptr) { + if (verbose) + hydra_report(stderr, "[INFO] Using default database \"admin\"\n"); + miscptr = DEFAULT_DB; + } + + hydra_register_socket(sp); + + while (1) { + if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) + return; + + switch (run) { + case 1: + next_run = start_mongodb(sock, ip, port, options, miscptr, fp); + break; + case 2: + hydra_child_exit(0); + return; + default: + if (!verbose) + hydra_report(stderr, "[ERROR] Caught unknown return code, try verbose option for more details\n"); + hydra_child_exit(2); + } + run = next_run; + } +} + +#endif + +int32_t service_mongodb_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { + // called before the childrens are forked off, so this is the function + // which should be filled if initial connections and service setup has to be + // performed once only. + + int32_t myport = PORT_MONGODB; + int32_t sock = -1; + + if (port != 0) + myport = port; + + if ((options & OPTION_SSL) == 0) + sock = hydra_connect_tcp(ip, myport); + else + sock = hydra_connect_ssl(ip, myport, hostname); + + if (sock < 0) { + if (verbose || debug) + hydra_report(stderr, "[ERROR] Can not connect\n"); + return -1; + } + + if (!require_auth(sock)) { + hydra_report_found_host(port, ip, "mongodb", fp); + hydra_report(stderr, "[ERROR] Mongodb server does not require any authentication\n"); + if (sock >= 0) + sock = hydra_disconnect(sock); + return -1; + } + if (sock >= 0) + sock = hydra_disconnect(sock); + return 0; +} + +void usage_mongodb(const char* service) { + printf("Module mongodb is optionally taking a database name to attack, default is \"admin\"\n\n"); +} diff --git a/hydra.c b/hydra.c index e184abc..abd773c 100644 --- a/hydra.c +++ b/hydra.c @@ -30,6 +30,7 @@ void usage_svn(const char* service); void usage_ncp(const char* service); void usage_firebird(const char* service); void usage_mysql(const char* service); +void usage_mongodb(const char* service); void usage_irc(const char* service); void usage_postgres(const char* service); void usage_telnet(const char* service); @@ -150,6 +151,10 @@ extern int32_t service_radmin2_init(char *ip, int32_t sp, unsigned char options, extern void service_mcached(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); extern int32_t service_mcached_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); #endif +#ifdef LIBMONGODB +extern void service_mongodb(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); +extern int32_t service_mongodb_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); +#endif extern int32_t service_adam6500_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); extern int32_t service_cisco_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); @@ -189,7 +194,7 @@ extern int32_t service_rpcap_init(char *ip, int32_t sp, unsigned char options, c // ADD NEW SERVICES HERE char *SERVICES = - "adam6500 asterisk afp cisco cisco-enable cvs firebird ftp[s] http[s]-{head|get|post} http[s]-{get|post}-form http-proxy http-proxy-urlenum icq imap[s] irc ldap2[s] ldap3[-{cram|digest}md5][s] memcached mssql mysql ncp nntp oracle oracle-listener oracle-sid pcanywhere pcnfs pop3[s] postgres radmin2 rdp redis rexec rlogin rpcap rsh rtsp s7-300 sapr3 sip smb smtp[s] smtp-enum snmp socks5 ssh sshkey svn teamspeak telnet[s] vmauthd vnc xmpp"; + "adam6500 asterisk afp cisco cisco-enable cvs firebird ftp[s] http[s]-{head|get|post} http[s]-{get|post}-form http-proxy http-proxy-urlenum icq imap[s] irc ldap2[s] ldap3[-{cram|digest}md5][s] memcached mongodb mssql mysql ncp nntp oracle oracle-listener oracle-sid pcanywhere pcnfs pop3[s] postgres radmin2 rdp redis rexec rlogin rpcap rsh rtsp s7-300 sapr3 sip smb smtp[s] smtp-enum snmp socks5 ssh sshkey svn teamspeak telnet[s] vmauthd vnc xmpp"; #define MAXBUF 520 #define MAXLINESIZE ( ( MAXBUF / 2 ) - 4 ) @@ -388,6 +393,9 @@ static const struct { {"memcached", service_mcached_init, service_mcached, NULL}, #endif SERVICE(mssql), +#ifdef LIBMONGODB +SERVICE3("mongodb", mongodb), +#endif #ifdef HAVE_MATH_H SERVICE3("mysql", mysql), #endif @@ -1246,6 +1254,7 @@ int32_t hydra_lookup_port(char *service) { {"oracle-sid", PORT_ORACLE, PORT_ORACLE_SSL}, {"oracle", PORT_ORACLE, PORT_ORACLE_SSL}, {"memcached", PORT_MCACHED, PORT_MCACHED_SSL}, + {"mongodb", PORT_MONGODB, PORT_MONGODB}, {"mssql", PORT_MSSQL, PORT_MSSQL_SSL}, {"mysql", PORT_MYSQL, PORT_MYSQL_SSL}, {"postgres", PORT_POSTGRES, PORT_POSTGRES_SSL}, @@ -2083,6 +2092,10 @@ int main(int argc, char *argv[]) { SERVICES = hydra_string_replace(SERVICES, "memcached ", ""); strcat(unsupported, "memcached "); #endif +#ifndef LIBMONGODB + SERVICES = hydra_string_replace(SERVICES, "mongodb ", ""); + strcat(unsupported, "mongodb "); +#endif #ifndef LIBMYSQLCLIENT SERVICES = hydra_string_replace(SERVICES, "mysql ", "mysql(v4) "); strcat(unsupported, "mysql5 "); @@ -2539,7 +2552,7 @@ int main(int argc, char *argv[]) { if (strcmp(hydra_options.service, "afp") == 0 || strcmp(hydra_options.service, "firebird") == 0 || strncmp(hydra_options.service, "mysql", 5) == 0 || strcmp(hydra_options.service, "ncp") == 0 || strcmp(hydra_options.service, "oracle") == 0 || strcmp(hydra_options.service, "postgres") == 0 || strncmp(hydra_options.service, "ssh", 3) == 0 || strcmp(hydra_options.service, "sshkey") == 0 || strcmp(hydra_options.service, "svn") == 0 || - strcmp(hydra_options.service, "sapr3") == 0 || strcmp(hydra_options.service, "memcached") == 0) { + strcmp(hydra_options.service, "sapr3") == 0 || strcmp(hydra_options.service, "memcached") == 0 || strcmp(hydra_options.service, "mongodb") == 0) { fprintf(stderr, "[WARNING] module %s does not support HYDRA_PROXY* !\n", hydra_options.service); proxy_string = NULL; } @@ -2623,6 +2636,17 @@ int main(int argc, char *argv[]) { bail("Compiled without LIBMCACHED support, module not available!"); #endif + if (strcmp(hydra_options.service, "mongodb") == 0) +#ifdef LIBMONGODB + { + i = 1; + if (hydra_options.miscptr == NULL || (strlen(hydra_options.miscptr) == 0)) + fprintf(stderr, "[INFO] The mongodb db wasn't passed so using admin by default\n"); + } +#else + bail("Compiled without LIBMONGODB support, module not available!"); +#endif + if (strcmp(hydra_options.service, "mysql") == 0) { i = 1; if (hydra_options.tasks > 4) { diff --git a/hydra.h b/hydra.h index 2c83b63..e12fdfe 100644 --- a/hydra.h +++ b/hydra.h @@ -146,6 +146,7 @@ #define PORT_RADMIN2 4899 #define PORT_MCACHED 11211 #define PORT_MCACHED_SSL 11211 +#define PORT_MONGODB 27017 #define False 0 #define True 1 From 0d4bcb548f426cd8dbcf3a76b81439f892d735b3 Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Wed, 20 Mar 2019 11:35:35 +0800 Subject: [PATCH 180/531] Fix conditional compilation when the proper libs are not present --- hydra-memcached.c | 4 ++-- hydra-mongodb.c | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/hydra-memcached.c b/hydra-memcached.c index 83970fd..9065c1e 100644 --- a/hydra-memcached.c +++ b/hydra-memcached.c @@ -134,8 +134,6 @@ void service_mcached(char *ip, int32_t sp, unsigned char options, char *miscptr, } } -#endif - int32_t service_mcached_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be @@ -177,3 +175,5 @@ int32_t service_mcached_init(char *ip, int32_t sp, unsigned char options, char * sock = hydra_disconnect(sock); return 0; } + +#endif diff --git a/hydra-mongodb.c b/hydra-mongodb.c index c5b69a6..9dd9a6a 100644 --- a/hydra-mongodb.c +++ b/hydra-mongodb.c @@ -143,8 +143,6 @@ void service_mongodb(char *ip, int32_t sp, unsigned char options, char *miscptr, } } -#endif - int32_t service_mongodb_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be @@ -179,6 +177,8 @@ int32_t service_mongodb_init(char *ip, int32_t sp, unsigned char options, char * return 0; } +#endif + void usage_mongodb(const char* service) { printf("Module mongodb is optionally taking a database name to attack, default is \"admin\"\n\n"); } From 14d74ff619600b1ce81caf7c671856f41bb3da70 Mon Sep 17 00:00:00 2001 From: Marco Slaviero Date: Fri, 22 Mar 2019 11:09:05 +0200 Subject: [PATCH 181/531] Fix compilation error when Mongo and Memcache libraries are absent --- hydra-mongodb.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-mongodb.c b/hydra-mongodb.c index 9dd9a6a..f017c4c 100644 --- a/hydra-mongodb.c +++ b/hydra-mongodb.c @@ -9,7 +9,7 @@ #include "hydra-mod.h" #ifndef LIBMONGODB -void dummy_mcached() { +void dummy_mongodb() { printf("\n"); } #else From caa3f0ac8f0d41cc7cd32aee3394f0e8bd4978ef Mon Sep 17 00:00:00 2001 From: Stefan Pietsch Date: Thu, 11 Apr 2019 21:36:38 +0200 Subject: [PATCH 182/531] Fix typo in man page --- hydra.1 | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra.1 b/hydra.1 index 37ddf3e..b8033b7 100644 --- a/hydra.1 +++ b/hydra.1 @@ -1,6 +1,6 @@ .TH "HYDRA" "1" "01/01/2019" .SH NAME -hydra \- a very fast network logon cracker which support many different services +hydra \- a very fast network logon cracker which supports many different services .SH SYNOPSIS .B hydra [[[\-l LOGIN|\-L FILE] [\-p PASS|\-P FILE|\-x OPT \-y]] | [\-C FILE]] From f93b799384bd91e3f6d35cb84aec3482aabf423d Mon Sep 17 00:00:00 2001 From: Tuan Date: Tue, 23 Apr 2019 18:32:22 +0700 Subject: [PATCH 183/531] replace rdesktop with freerdp for rdp module --- configure | 93 +- hydra-rdp.c | 3174 +-------------------------------------------------- hydra.c | 40 +- 3 files changed, 156 insertions(+), 3151 deletions(-) diff --git a/configure b/configure index 0945974..d09ac9d 100755 --- a/configure +++ b/configure @@ -69,6 +69,8 @@ NSL_PATH="" SOCKET_PATH="" MANDIR="" XHYDRA_SUPPORT="" +FREERDP2_PATH="" +WINPR2_PATH="" if [ '!' "X" = "X$*" ]; then while [ $# -gt 0 ] ; do @@ -997,6 +999,78 @@ fi fi +echo "Checking for Freerdp2 (libfreerdp2.so, freerdp/*.h, libwinpr2.so, winpr/*.h) ..." + + for i in $LIBDIRS ; do + if [ "X" = "X$FREERDP2_PATH" ]; then + if [ -f "$i/libfreerdp2.so" -o -f "$i/libfreerdp2.dylib" -o -f "$i/libfreerdp2.a" ]; then + FREERDP2_PATH="$i" + fi + fi + if [ "X" = "X$FREERDP2_PATH" ]; then + TMP_LIB=`/bin/ls $i/libfreerdp2*.so* 2> /dev/null | grep libfreerdp2` + if [ -n "$TMP_LIB" ]; then + FREERDP2_PATH="$i" + fi + fi + done + + FREERDP2_IPATH= + for i in $INCDIRS ; do + if [ "X" = "X$FREERDP2_IPATH" ]; then + if [ -f "$i/freerdp/freerdp.h" ]; then + FREERDP2_IPATH="$i/freerdp2" + fi + if [ -f "$i/freerdp2/freerdp/freerdp.h" ]; then + FREERDP2_IPATH="$i/freerdp2" + fi + fi + done + + for i in $LIBDIRS ; do + if [ "X" = "X$WINPR2_PATH" ]; then + if [ -f "$i/libwinpr2.so" -o -f "$i/libwinpr2.dylib" -o -f "$i/libwinpr2.a" ]; then + WINPR2_PATH="$i" + fi + fi + if [ "X" = "X$WINPR2_PATH" ]; then + TMP_LIB=`/bin/ls $i/winpr.dll* 2> /dev/null | grep winpr` + if [ -n "$TMP_LIB" ]; then + WINPR2_PATH="$i" + fi + fi + done + + WINPR2_IPATH= + for i in $INCDIRS ; do + if [ "X" = "X$WINPR2_IPATH" ]; then + if [ -f "$i/winpr.h" ]; then + WINPR2_IPATH="$i" + fi + if [ -f "$i/winpr2/winpr/winpr.h" ]; then + WINPR2_IPATH="$i/winpr2" + fi + fi + done + +if [ "X" != "X$DEBUG" ]; then + echo DEBUG: FREERDP2_PATH=$FREERDP2_PATH/ + echo DEBUG: FREERDP2_IPATH=$FREERDP2_IPATH/ + echo DEBUG: WINPR2_PATH=$WINPR2_PATH/ + echo DEBUG: WINPR2_IPATH=$WINPR2_IPATH/ +fi + + if [ -n "$FREERDP2_PATH" -a -n "$FREERDP2_IPATH" -a -n "$WINPR2_PATH" -a -n "$WINPR2_IPATH" ]; then + echo " ... found" + fi + if [ "X" = "X$FREERDP2_PATH" -o "X" = "X$FREERDP2_IPATH" -o "X" = "X$WINPR2_PATH" -o "X" = "X$WINPR2_IPATH" ]; then + echo " ... NOT found, module rdp disabled" + FREERDP2_PATH="" + FREERDP2_IPATH="" + WINPR2_PATH="" + WINPR2_IPATH="" + fi + echo "Checking for Mongodb (libmongoc-1.0.so, mongoc.h, libbson-1.0.so, bson.h) ..." for i in $LIBDIRS ; do @@ -1180,7 +1254,7 @@ XLIBS="" XLIBPATHS="" XIPATHS="" -if [ -n "$FIREBIRD_PATH" -o -n "$PCRE_PATH" -o -n "$IDN_PATH" -o -n "$SSL_PATH" -o -n "$CRYPTO_PATH" -o -n "$NSL_PATH" -o -n "$SOCKET_PATH" -o -n "$RESOLV_PATH" -o -n "$SAPR3_PATH" -o -n "$SSH_PATH" -o -n "$POSTGRES_PATH" -o -n "$SVN_PATH" -o -n "$NCP_PATH" -o -n "$CURSES_PATH" -o -n "$ORACLE_PATH" -o -n "$AFP_PATH" -o -n "$MYSQL_PATH" -o -n "$MCACHED_PATH" -o -n "$MONGOD_PATH" ]; then +if [ -n "$FIREBIRD_PATH" -o -n "$PCRE_PATH" -o -n "$IDN_PATH" -o -n "$SSL_PATH" -o -n "$CRYPTO_PATH" -o -n "$NSL_PATH" -o -n "$SOCKET_PATH" -o -n "$RESOLV_PATH" -o -n "$SAPR3_PATH" -o -n "$SSH_PATH" -o -n "$POSTGRES_PATH" -o -n "$SVN_PATH" -o -n "$NCP_PATH" -o -n "$CURSES_PATH" -o -n "$ORACLE_PATH" -o -n "$AFP_PATH" -o -n "$MYSQL_PATH" -o -n "$MCACHED_PATH" -o -n "$MONGOD_PATH" -o -n "$FREERDP2_PATH" -o -n "$WINPR2_PATH" ]; then XLIBPATHS="-L/usr/lib -L/usr/local/lib -L/lib" fi if [ -n "$MYSQL_IPATH" ]; then @@ -1253,9 +1327,15 @@ fi if [ -n "$BSON_PATH" ]; then XDEFINES="$XDEFINES -DLIBBSON" fi +if [ -n "$FREERDP2_PATH" ]; then + XDEFINES="$XDEFINES -DLIBFREERDP2" +fi +if [ -n "$WINPR2_PATH" ]; then + XDEFINES="$XDEFINES -DLIBWINPR2" +fi OLDPATH="" -for i in $SSL_PATH $FIREBIRD_PATH $WORACLE_LIB_PATH $PCRE_PATH $IDN_PATH $CRYPTO_PATH $SSH_PATH $NSL_PATH $SOCKET_PATH $RESOLV_PATH $SAPR3_PATH $POSTGRES_PATH $SVN_PATH $NCP_PATH $CURSES_PATH $ORACLE_PATH $AFP_PATH $MYSQL_PATH $MCACHED_PATH $MONGODB_PATH $BSON_PATH; do +for i in $SSL_PATH $FIREBIRD_PATH $WORACLE_LIB_PATH $PCRE_PATH $IDN_PATH $CRYPTO_PATH $SSH_PATH $NSL_PATH $SOCKET_PATH $RESOLV_PATH $SAPR3_PATH $POSTGRES_PATH $SVN_PATH $NCP_PATH $CURSES_PATH $ORACLE_PATH $AFP_PATH $MYSQL_PATH $MCACHED_PATH $MONGODB_PATH $BSON_PATH $FREERDP2_PATH $WINPR2_PATH; do if [ "$OLDPATH" = "$i" ]; then OLDPATH="$i" else @@ -1314,6 +1394,9 @@ fi if [ -n "$MONGODB_IPATH" ]; then XIPATHS="$XIPATHS -I$MONGODB_IPATH -I$BSON_IPATH" fi +if [ -n "$FREERDP2_IPATH" ]; then + XIPATHS="$XIPATHS -I$FREERDP2_IPATH -I$WINPR2_IPATH" +fi if [ -n "$HAVE_GCRYPT" ]; then XLIBS="$XLIBS -lgcrypt" fi @@ -1386,6 +1469,12 @@ fi if [ -n "$BSON_PATH" ]; then XLIBS="$XLIBS -lbson-1.0" fi +if [ -n "$FREERDP2_PATH" ]; then + XLIBS="$XLIBS -lfreerdp2" +fi +if [ -n "$WINPR2_PATH" ]; then + XLIBS="$XLIBS -lwinpr2" +fi if [ -d /usr/kerberos/include ]; then XIPATHS="$XIPATHS -I/usr/kerberos/include" fi diff --git a/hydra-rdp.c b/hydra-rdp.c index 8b9394c..cfa2e12 100644 --- a/hydra-rdp.c +++ b/hydra-rdp.c @@ -36,2421 +36,36 @@ It's particularly true on windows XP #include "hydra-mod.h" -#ifndef LIBOPENSSL -#include +extern char *HYDRA_EXIT; +#ifndef LIBFREERDP2 void dummy_rdp() { printf("\n"); } #else -#include "rdp.h" -extern char *HYDRA_EXIT; - -BOOL g_encryption = True; -BOOL g_use_rdp5 = True; -BOOL g_console_session = False; -BOOL g_bitmap_cache = True; -BOOL g_bitmap_cache_persist_enable = False; -BOOL g_bitmap_compression = True; -BOOL g_desktop_save = True; -int32_t g_server_depth = -1; -int32_t os_version = 0; //2000 - -uint32 g_rdp5_performanceflags = RDP5_NO_WALLPAPER | RDP5_NO_FULLWINDOWDRAG | RDP5_NO_MENUANIMATIONS; - -/* Session Directory redirection */ -BOOL g_redirect = False; -uint32 g_redirect_flags = 0; - -uint32 g_reconnect_logonid = 0; -char g_reconnect_random[16]; -BOOL g_has_reconnect_random = False; -uint8 g_client_random[SEC_RANDOM_SIZE]; - -/* - 0 unknown - 1 success - 2 failed -*/ -#define LOGIN_UNKN 0 -#define LOGIN_SUCC 1 -#define LOGIN_FAIL 2 -int32_t login_result = LOGIN_UNKN; - -uint8 *g_next_packet; -uint32 g_rdp_shareid; - -/* Called during redirection to reset the state to support redirection */ -void rdp_reset_state(void) { - g_next_packet = NULL; /* reset the packet information */ - g_rdp_shareid = 0; - sec_reset_state(); -} - -static void rdesktop_reset_state(void) { - rdp_reset_state(); -} - -static RDP_ORDER_STATE g_order_state; - -#define TCP_STRERROR strerror(errno) -#define TCP_BLOCKS (errno == EWOULDBLOCK) - - -#ifndef INADDR_NONE -#define INADDR_NONE ((unsigned long) -1) -#endif - -#define STREAM_COUNT 1 - - -int32_t g_sock; -static struct stream g_in; -static struct stream g_out[STREAM_COUNT]; - -/* wait till socket is ready to write or timeout */ -static BOOL tcp_can_send(int32_t sck, int32_t millis) { - fd_set wfds; - struct timeval time; - int32_t sel_count; - - time.tv_sec = millis / 1000; - time.tv_usec = (millis * 1000) % 1000000; - FD_ZERO(&wfds); - FD_SET(sck, &wfds); - sel_count = select(sck + 1, 0, &wfds, 0, &time); - if (sel_count > 0) { - return True; - } - return False; -} - -/* Initialise TCP transport data packet */ -STREAM tcp_init(uint32 maxlen) { - static int32_t cur_stream_id = 0; - STREAM result = NULL; - - result = &g_out[cur_stream_id]; - cur_stream_id = (cur_stream_id + 1) % STREAM_COUNT; - - - if (maxlen > result->size) { - result->data = (uint8 *) xrealloc(result->data, maxlen); - result->size = maxlen; - } - - result->p = result->data; - result->end = result->data; // + result->size; - return result; -} - -/* Send TCP transport data packet */ -void tcp_send(STREAM s) { - int32_t length = s->end - s->data; - int32_t sent, total = 0; - - - while (total < length) { - sent = hydra_send(g_sock, (char *) (s->data + total), length - total, 0); - if (sent <= 0) { - if (sent == -1 && TCP_BLOCKS) { - tcp_can_send(g_sock, 100); - sent = 0; - } else { - if (g_sock && !login_result) - error("send: %s\n", TCP_STRERROR); - return; - } - } - total += sent; - } -} - -/* Receive a message on the TCP layer */ -STREAM tcp_recv(STREAM s, uint32 length) { - uint32 new_length, end_offset, p_offset; - int32_t rcvd = 0; - - if (s == NULL) { - /* read into "new" stream */ - g_in.data = (uint8 *) xmalloc(length); - g_in.size = length; - g_in.end = g_in.p = g_in.data; - s = &g_in; - } else { - /* append to existing stream */ - new_length = (s->end - s->data) + length; - if (new_length > s->size) { - p_offset = s->p - s->data; - end_offset = s->end - s->data; -//printf("length: %d, %p s->data, %p +%d s->p, %p +%d s->end, end-data %d, size %d\n", length, s->data, s->p, s->p - s->data, s->end, s->end - s->p, s->end - s->data, s->size); - s->data = (uint8 *) xrealloc(s->data, new_length); - s->size = new_length; - s->p = s->data + p_offset; - s->end = s->data + end_offset; - } - } - - - while (length > 0) { - rcvd = hydra_recv(g_sock, (char *) s->end, length); - if (rcvd < 0) { - if (rcvd == -1 && TCP_BLOCKS) { - rcvd = 0; - } else { - //error("recv: %s\n", TCP_STRERROR); - return NULL; - } - } else if (rcvd == 0) { - error("Connection closed\n"); - return NULL; - } - s->end += rcvd; - length -= rcvd; - } - - - return s; -} - -char *tcp_get_address() { - static char ipaddr[32]; - struct sockaddr_in sockaddr; - socklen_t len = sizeof(sockaddr); - - if (getsockname(g_sock, (struct sockaddr *) &sockaddr, &len) == 0) { - uint8 *ip = (uint8 *) & sockaddr.sin_addr; - - sprintf(ipaddr, "%d.%d.%d.%d", ip[0], ip[1], ip[2], ip[3]); - } else - strcpy(ipaddr, "127.0.0.1"); - return ipaddr; -} - -/* reset the state of the tcp layer */ -void tcp_reset_state(void) { - int32_t i; - - g_sock = -1; /* reset socket */ - - /* Clear the incoming stream */ - if (g_in.data != NULL) - free(g_in.data); - g_in.p = NULL; - g_in.end = NULL; - g_in.data = NULL; - g_in.size = 0; - g_in.iso_hdr = NULL; - g_in.mcs_hdr = NULL; - g_in.sec_hdr = NULL; - g_in.rdp_hdr = NULL; - g_in.channel_hdr = NULL; - - /* Clear the outgoing stream(s) */ - for (i = 0; i < STREAM_COUNT; i++) { - if (g_out[i].data != NULL) - free(g_out[i].data); - g_out[i].p = NULL; - g_out[i].end = NULL; - g_out[i].data = NULL; - g_out[i].size = 0; - g_out[i].iso_hdr = NULL; - g_out[i].mcs_hdr = NULL; - g_out[i].sec_hdr = NULL; - g_out[i].rdp_hdr = NULL; - g_out[i].channel_hdr = NULL; - } -} - -uint16 g_mcs_userid; - -/* Parse an ASN.1 BER header */ -static BOOL ber_parse_header(STREAM s, int32_t tagval, int32_t *length) { - int32_t tag, len; - - - if (tagval > 0xff) { - in_uint16_be(s, tag); - } else { - in_uint8(s, tag); - } - - if (tag != tagval) { - error("expected tag %d, got %d\n", tagval, tag); - return False; - } - - in_uint8(s, len); - - if (len & 0x80) { - len &= ~0x80; - *length = 0; - while (len--) - next_be(s, *length); - } else - *length = len; - - return s_check(s); -} - -/* Output an ASN.1 BER header */ -static void ber_out_header(STREAM s, int32_t tagval, int32_t length) { - - - if (tagval > 0xff) { - out_uint16_be(s, tagval); - } else { - out_uint8(s, tagval); - } - - if (length >= 0x80) { - out_uint8(s, 0x82); - out_uint16_be(s, length); - } else - out_uint8(s, length); -} - -/* Output an ASN.1 BER integer */ -static void ber_out_integer(STREAM s, int32_t value) { - ber_out_header(s, BER_TAG_INTEGER, 2); - out_uint16_be(s, value); -} - -/* Output a DOMAIN_PARAMS structure (ASN.1 BER) */ -static void mcs_out_domain_params(STREAM s, int32_t max_channels, int32_t max_users, int32_t max_tokens, int32_t max_pdusize) { - ber_out_header(s, MCS_TAG_DOMAIN_PARAMS, 32); - ber_out_integer(s, max_channels); - ber_out_integer(s, max_users); - ber_out_integer(s, max_tokens); - ber_out_integer(s, 1); /* num_priorities */ - ber_out_integer(s, 0); /* min_throughput */ - ber_out_integer(s, 1); /* max_height */ - ber_out_integer(s, max_pdusize); - ber_out_integer(s, 2); /* ver_protocol */ -} - -/* Parse a DOMAIN_PARAMS structure (ASN.1 BER) */ -static BOOL mcs_parse_domain_params(STREAM s) { - int32_t length = 0; - - ber_parse_header(s, MCS_TAG_DOMAIN_PARAMS, &length); - in_uint8s(s, length); - - return s_check(s); -} - -/* Send an MCS_CONNECT_INITIAL message (ASN.1 BER) */ -static void mcs_send_connect_initial(STREAM mcs_data) { - int32_t datalen = mcs_data->end - mcs_data->data; - int32_t length = 9 + 3 * 34 + 4 + datalen; - STREAM s; - - s = iso_init(length + 5); - - ber_out_header(s, MCS_CONNECT_INITIAL, length); - ber_out_header(s, BER_TAG_OCTET_STRING, 1); /* calling domain */ - out_uint8(s, 1); - ber_out_header(s, BER_TAG_OCTET_STRING, 1); /* called domain */ - out_uint8(s, 1); - - ber_out_header(s, BER_TAG_BOOLEAN, 1); - out_uint8(s, 0xff); /* upward flag */ - - mcs_out_domain_params(s, 34, 2, 0, 0xffff); /* target params */ - mcs_out_domain_params(s, 1, 1, 1, 0x420); /* min params */ - mcs_out_domain_params(s, 0xffff, 0xfc17, 0xffff, 0xffff); /* max params */ - - ber_out_header(s, BER_TAG_OCTET_STRING, datalen); - out_uint8p(s, mcs_data->data, datalen); - - s_mark_end(s); - iso_send(s); -} - -/* Expect a MCS_CONNECT_RESPONSE message (ASN.1 BER) */ -static BOOL mcs_recv_connect_response(STREAM mcs_data) { - uint8 result; - int32_t length = 0; - STREAM s; - - s = iso_recv(NULL); - if (s == NULL) - return False; - - ber_parse_header(s, MCS_CONNECT_RESPONSE, &length); - - ber_parse_header(s, BER_TAG_RESULT, &length); - in_uint8(s, result); - if (result != 0) { - error("MCS connect: %d\n", result); - return False; - } - - ber_parse_header(s, BER_TAG_INTEGER, &length); - in_uint8s(s, length); /* connect id */ - mcs_parse_domain_params(s); - - ber_parse_header(s, BER_TAG_OCTET_STRING, &length); - - sec_process_mcs_data(s); - /* - if (length > mcs_data->size) - { - error("MCS data length %d, expected %d\n", length, - mcs_data->size); - length = mcs_data->size; - } - - in_uint8a(s, mcs_data->data, length); - mcs_data->p = mcs_data->data; - mcs_data->end = mcs_data->data + length; - */ - return s_check_end(s); -} - -/* Send an EDrq message (ASN.1 PER) */ -static void mcs_send_edrq(void) { - STREAM s; - - s = iso_init(5); - - out_uint8(s, (MCS_EDRQ << 2)); - out_uint16_be(s, 1); /* height */ - out_uint16_be(s, 1); /* interval */ - - s_mark_end(s); - iso_send(s); -} - -/* Send an AUrq message (ASN.1 PER) */ -static void mcs_send_aurq(void) { - STREAM s; - - s = iso_init(1); - - out_uint8(s, (MCS_AURQ << 2)); - - s_mark_end(s); - iso_send(s); -} - -/* Expect a AUcf message (ASN.1 PER) */ -static BOOL mcs_recv_aucf(uint16 * mcs_userid) { - uint8 opcode, result; - STREAM s; - - s = iso_recv(NULL); - if (s == NULL) - return False; - - in_uint8(s, opcode); - if ((opcode >> 2) != MCS_AUCF) { - error("expected AUcf, got %d\n", opcode); - return False; - } - - in_uint8(s, result); - if (result != 0) { - error("AUrq: %d\n", result); - return False; - } - - if (opcode & 2) - in_uint16_be(s, *mcs_userid); - - return s_check_end(s); -} - -/* Send a CJrq message (ASN.1 PER) */ -static void mcs_send_cjrq(uint16 chanid) { - STREAM s; - - DEBUG_RDP5(("Sending CJRQ for channel #%d\n", chanid)); - - s = iso_init(5); - - out_uint8(s, (MCS_CJRQ << 2)); - out_uint16_be(s, g_mcs_userid); - out_uint16_be(s, chanid); - - s_mark_end(s); - iso_send(s); -} - -/* Expect a CJcf message (ASN.1 PER) */ -static BOOL mcs_recv_cjcf(void) { - uint8 opcode, result; - STREAM s; - - s = iso_recv(NULL); - if (s == NULL) - return False; - - in_uint8(s, opcode); - if ((opcode >> 2) != MCS_CJCF) { - error("expected CJcf, got %d\n", opcode); - return False; - } - - in_uint8(s, result); - if (result != 0) { - error("CJrq: %d\n", result); - return False; - } - - in_uint8s(s, 4); /* mcs_userid, req_chanid */ - if (opcode & 2) - in_uint8s(s, 2); /* join_chanid */ - - return s_check_end(s); -} - -/* Initialise an MCS transport data packet */ -STREAM mcs_init(int32_t length) { - STREAM s; - - s = iso_init(length + 8); - s_push_layer(s, mcs_hdr, 8); - - return s; -} - -/* Send an MCS transport data packet to a specific channel */ -void mcs_send_to_channel(STREAM s, uint16 channel) { - uint16 length; - - s_pop_layer(s, mcs_hdr); - length = s->end - s->p - 8; - length |= 0x8000; - - out_uint8(s, (MCS_SDRQ << 2)); - out_uint16_be(s, g_mcs_userid); - out_uint16_be(s, channel); - out_uint8(s, 0x70); /* flags */ - out_uint16_be(s, length); - - iso_send(s); -} - -/* Send an MCS transport data packet to the global channel */ -void mcs_send(STREAM s) { - mcs_send_to_channel(s, MCS_GLOBAL_CHANNEL); -} - -/* Receive an MCS transport data packet */ -STREAM mcs_recv(uint16 * channel, uint8 * rdpver) { - uint8 opcode, appid, length; - STREAM s; - - s = iso_recv(rdpver); - if (s == NULL) - return NULL; - if (rdpver != NULL) - if (*rdpver != 3) - return s; - in_uint8(s, opcode); - appid = opcode >> 2; - if (appid != MCS_SDIN) { - if (appid != MCS_DPUM) { - error("expected data, got %d\n", opcode); - } - return NULL; - } - in_uint8s(s, 2); /* userid */ - in_uint16_be(s, *channel); - in_uint8s(s, 1); /* flags */ - in_uint8(s, length); - if (length & 0x80) - in_uint8s(s, 1); /* second byte of length */ - return s; -} - -BOOL mcs_connect(char *server, STREAM mcs_data, char *username, BOOL reconnect) { - if (!iso_connect(server, username, reconnect)) - return False; - mcs_send_connect_initial(mcs_data); - if (!mcs_recv_connect_response(mcs_data)) - goto error; - mcs_send_edrq(); - mcs_send_aurq(); - if (!mcs_recv_aucf(&g_mcs_userid)) - goto error; - mcs_send_cjrq(g_mcs_userid + MCS_USERCHANNEL_BASE); - if (!mcs_recv_cjcf()) - goto error; - mcs_send_cjrq(MCS_GLOBAL_CHANNEL); - if (!mcs_recv_cjcf()) - goto error; - return True; -error: - iso_disconnect(); - return False; -} - -/* Disconnect from the MCS layer */ -void mcs_disconnect(void) { - iso_disconnect(); -} - -/* reset the state of the mcs layer */ -void mcs_reset_state(void) { - g_mcs_userid = 0; - iso_reset_state(); -} - -/* Send a self-contained ISO PDU */ -static void iso_send_msg(uint8 code) { - STREAM s; - - s = tcp_init(11); - - out_uint8(s, 3); /* version */ - out_uint8(s, 0); /* reserved */ - out_uint16_be(s, 11); /* length */ - - out_uint8(s, 6); /* hdrlen */ - out_uint8(s, code); - out_uint16(s, 0); /* dst_ref */ - out_uint16(s, 0); /* src_ref */ - out_uint8(s, 0); /* class */ - - s_mark_end(s); - tcp_send(s); -} - -static void iso_send_connection_request(char *username) { - STREAM s; - int32_t length = 30 + strlen(username); - - s = tcp_init(length); - - out_uint8(s, 3); /* version */ - out_uint8(s, 0); /* reserved */ - out_uint16_be(s, length); /* length */ - - out_uint8(s, length - 5); /* hdrlen */ - out_uint8(s, ISO_PDU_CR); - out_uint16(s, 0); /* dst_ref */ - out_uint16(s, 0); /* src_ref */ - out_uint8(s, 0); /* class */ - - out_uint8p(s, "Cookie: mstshash=", strlen("Cookie: mstshash=")); - out_uint8p(s, username, strlen(username)); - - out_uint8(s, 0x0d); /* Unknown */ - out_uint8(s, 0x0a); /* Unknown */ - - s_mark_end(s); - tcp_send(s); -} - -/* Send a single input event fast JL, this is required for win8 */ -void rdp_send_fast_input_kbd(uint32 time, uint16 flags, uint16 param1) { - STREAM s; - uint8 fast_flags = 0; - uint8 len = 4; - - fast_flags |= (flags & RDP_KEYRELEASE) ? FASTPATH_INPUT_KBDFLAGS_RELEASE : 0; - s = tcp_init(len); - out_uint8(s, (1 << 2)); //one event - out_uint8(s, len); - out_uint8(s, fast_flags | (FASTPATH_INPUT_EVENT_SCANCODE << 5)); - out_uint8(s, param1); - s_mark_end(s); - tcp_send(s); -} - -/* Send a single input event fast JL, this is required for win8 */ -void rdp_send_fast_input_mouse(uint32 time, uint16 flags, uint16 param1, uint16 param2) { - STREAM s; - uint8 len = 9; - - s = tcp_init(len); - out_uint8(s, (1 << 2)); //one event - out_uint8(s, len); - out_uint8(s, (FASTPATH_INPUT_EVENT_MOUSE << 5)); - out_uint16(s, flags); - out_uint16(s, param1); - out_uint16(s, param2); - s_mark_end(s); - tcp_send(s); -} - - -/* Receive a message on the ISO layer, return code */ -static STREAM iso_recv_msg(uint8 * code, uint8 * rdpver) { - STREAM s; - uint16 length; - uint8 version; - - s = tcp_recv(NULL, 4); - if (s == NULL) - return NULL; - in_uint8(s, version); - if (rdpver != NULL) - *rdpver = version; - if (version == 3) { - in_uint8s(s, 1); /* pad */ - in_uint16_be(s, length); - } else { - in_uint8(s, length); - if (length & 0x80) { - length &= ~0x80; - next_be(s, length); - } - } - if (length < 5) { - error("Bad packet header\n"); - return NULL; - } - s = tcp_recv(s, length - 4); - if (s == NULL) - return NULL; - if (version != 3) - return s; - in_uint8s(s, 1); /* hdrlen */ - in_uint8(s, *code); - if (*code == ISO_PDU_DT) { - in_uint8s(s, 1); /* eot */ - return s; - } - in_uint8s(s, 5); /* dst_ref, src_ref, class */ - return s; -} - -/* Initialise ISO transport data packet */ -STREAM iso_init(int32_t length) { - STREAM s; - - s = tcp_init(length + 7); - s_push_layer(s, iso_hdr, 7); - - return s; -} - -/* Send an ISO data PDU */ -void iso_send(STREAM s) { - uint16 length; - - s_pop_layer(s, iso_hdr); - length = s->end - s->p; - - out_uint8(s, 3); /* version */ - out_uint8(s, 0); /* reserved */ - out_uint16_be(s, length); - - out_uint8(s, 2); /* hdrlen */ - out_uint8(s, ISO_PDU_DT); /* code */ - out_uint8(s, 0x80); /* eot */ - - tcp_send(s); -} - -/* Receive ISO transport data packet */ -STREAM iso_recv(uint8 * rdpver) { - STREAM s; - uint8 code = 0; - - s = iso_recv_msg(&code, rdpver); - if (s == NULL) - return NULL; - if (rdpver != NULL) - if (*rdpver != 3) - return s; - if (code != ISO_PDU_DT) { - error("expected DT, got 0x%x\n", code); - return NULL; - } - return s; -} - -/* Establish a connection up to the ISO layer */ -BOOL iso_connect(char *server, char *username, BOOL reconnect) { - uint8 code = 0; - - if (reconnect) { - iso_send_msg(ISO_PDU_CR); - } else { - iso_send_connection_request(username); - } - if (iso_recv_msg(&code, NULL) == NULL) { - return False; - } - if (code != ISO_PDU_CC) { - error("expected CC, got 0x%x\n", code); - hydra_disconnect(g_sock); - return False; - } - - return True; -} - -/* Disconnect from the ISO layer */ -void iso_disconnect(void) { - iso_send_msg(ISO_PDU_DR); - g_sock = hydra_disconnect(g_sock); -} - -/* reset the state to support reconnecting */ -void iso_reset_state(void) { - tcp_reset_state(); -} - -static int32_t g_rc4_key_len; -static SSL_RC4 g_rc4_decrypt_key; -static SSL_RC4 g_rc4_encrypt_key; -static uint32 g_server_public_key_len; - -static uint8 g_sec_sign_key[16]; -static uint8 g_sec_decrypt_key[16]; -static uint8 g_sec_encrypt_key[16]; -static uint8 g_sec_decrypt_update_key[16]; -static uint8 g_sec_encrypt_update_key[16]; -static uint8 g_sec_crypted_random[SEC_MAX_MODULUS_SIZE]; - -uint16 g_server_rdp_version = 0; - -/* These values must be available to reset state - Session Directory */ -static int32_t g_sec_encrypt_use_count = 0; -static int32_t g_sec_decrypt_use_count = 0; - - -void ssl_sha1_init(SSL_SHA1 * sha1) { - SHA1_Init(sha1); -} - -void ssl_sha1_update(SSL_SHA1 * sha1, uint8 * data, uint32 len) { - SHA1_Update(sha1, data, len); -} - -void ssl_sha1_final(SSL_SHA1 * sha1, uint8 * out_data) { - SHA1_Final(out_data, sha1); -} - -void ssl_md5_init(SSL_MD5 * md5) { - MD5_Init(md5); -} - -void ssl_md5_update(SSL_MD5 * md5, uint8 * data, uint32 len) { - MD5_Update(md5, data, len); -} - -void ssl_md5_final(SSL_MD5 * md5, uint8 * out_data) { - MD5_Final(out_data, md5); -} - -void ssl_rc4_set_key(SSL_RC4 * rc4, uint8 * key, uint32 len) { - RC4_set_key(rc4, len, key); -} - -void ssl_rc4_crypt(SSL_RC4 * rc4, uint8 * in_data, uint8 * out_data, uint32 len) { - RC4(rc4, len, in_data, out_data); -} - -static void reverse(uint8 * p, int32_t len) { - int32_t i, j; - uint8 temp; - - for (i = 0, j = len - 1; i < j; i++, j--) { - temp = p[i]; - p[i] = p[j]; - p[j] = temp; - } -} - -void ssl_rsa_encrypt(uint8 * out, uint8 * in, int32_t len, uint32 modulus_size, uint8 * modulus, uint8 * exponent) { - BN_CTX *ctx; - BIGNUM *mod, *exp, *x, *y; - uint8 inr[SEC_MAX_MODULUS_SIZE]; - int32_t outlen; - - reverse(modulus, modulus_size); - reverse(exponent, SEC_EXPONENT_SIZE); - memcpy(inr, in, len); - reverse(inr, len); - - ctx = BN_CTX_new(); - mod = BN_new(); - exp = BN_new(); - x = BN_new(); - y = BN_new(); - - BN_bin2bn(modulus, modulus_size, mod); - BN_bin2bn(exponent, SEC_EXPONENT_SIZE, exp); - BN_bin2bn(inr, len, x); - BN_mod_exp(y, x, exp, mod, ctx); - outlen = BN_bn2bin(y, out); - reverse(out, outlen); - if (outlen < (int32_t) modulus_size) - memset(out + outlen, 0, modulus_size - outlen); - - BN_free(y); - BN_free(x); - BN_free(exp); - BN_free(mod); - BN_CTX_free(ctx); -} - -/* returns newly allocated X509 or NULL */ -X509 *ssl_cert_read(uint8 * data, uint32 len) { - /* this will move the data pointer but we don't care, we don't use it again */ - return d2i_X509(NULL, (D2I_X509_CONST unsigned char **) &data, len); -} - -static void ssl_cert_free(X509 * cert) { - X509_free(cert); -} - -/* returns newly allocated SSL_RKEY or NULL */ -SSL_RKEY *ssl_cert_to_rkey(X509 * cert, uint32 * key_len) { - EVP_PKEY *epk = NULL; - SSL_RKEY *lkey; - int32_t nid; - - /* By some reason, Microsoft sets the OID of the Public RSA key to - the oid for "MD5 with RSA Encryption" instead of "RSA Encryption" - - Kudos to Richard Levitte for the following (. intuitive .) - lines of code that resets the OID and let's us extract the key. */ -#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) - nid = X509_get_signature_nid(cert); -#else - nid = OBJ_obj2nid(cert->cert_info->key->algor->algorithm); -#endif - if ((nid == NID_md5WithRSAEncryption) || (nid == NID_shaWithRSAEncryption)) { -#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) -// fprintf(stderr, "[ERROR] the current experimental openssl-1.1 support in hydra does not support RDP :( \n"); -// hydra_child_exit(2); - X509_ALGOR *algor = X509_get0_tbs_sigalg(cert); - DEBUG_RDP5(("Re-setting algorithm type to RSA in server certificate\n")); - ASN1_OBJECT_free(algor->algorithm); - algor->algorithm = OBJ_nid2obj(NID_rsaEncryption); - //X509_ALGOR_set0(algor, OBJ_nid2obj(NID_rsaEncryption), V_ASN1_SEQUENCE, NULL /*pbe_str*/); -#else - DEBUG_RDP5(("Re-setting algorithm type to RSA in server certificate\n")); - ASN1_OBJECT_free(cert->cert_info->key->algor->algorithm); - cert->cert_info->key->algor->algorithm = OBJ_nid2obj(NID_rsaEncryption); -#endif - } - epk = X509_get_pubkey(cert); - if (NULL == epk) { - error("Failed to extract public key from certificate\n"); - return NULL; - } - - lkey = RSAPublicKey_dup(EVP_PKEY_get1_RSA(epk)); - EVP_PKEY_free(epk); - *key_len = RSA_size(lkey); - return lkey; -} - -int32_t ssl_cert_print_fp(FILE * fp, X509 * cert) { - return X509_print_fp(fp, cert); -} - -void ssl_rkey_free(SSL_RKEY * rkey) { - RSA_free(rkey); -} - -/* returns error */ -int32_t ssl_rkey_get_exp_mod(SSL_RKEY * rkey, uint8 * exponent, uint32 max_exp_len, uint8 * modulus, uint32 max_mod_len) { - int32_t len; - -#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) - BIGNUM *n, *e, *d; - - n = BN_new(); - e = BN_new(); - RSA_get0_key(rkey, &n, &e, NULL); - if ((BN_num_bytes(e) > (int32_t) max_exp_len) || (BN_num_bytes(n) > (int32_t) max_mod_len)) { - return 1; - } - len = BN_bn2bin(e, exponent); - reverse(exponent, len); - len = BN_bn2bin(n, modulus); - reverse(modulus, len); - BN_free(n); - BN_free(e); -#else - if ((BN_num_bytes(rkey->e) > (int32_t) max_exp_len) || (BN_num_bytes(rkey->n) > (int32_t) max_mod_len)) - return 1; - len = BN_bn2bin(rkey->e, exponent); - reverse(exponent, len); - len = BN_bn2bin(rkey->n, modulus); - reverse(modulus, len); -#endif - return 0; -} - -/* returns boolean */ -BOOL ssl_sig_ok(uint8 * exponent, uint32 exp_len, uint8 * modulus, uint32 mod_len, uint8 * signature, uint32 sig_len) { - return True; -} - - -void ssl_hmac_md5(const void *key, int32_t key_len, const unsigned char *msg, int32_t msg_len, unsigned char *md) { -#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) - HMAC_CTX *ctx; - ctx = HMAC_CTX_new(); - HMAC(EVP_md5(), key, key_len, msg, msg_len, md, NULL); - HMAC_CTX_free(ctx); -#else - HMAC_CTX ctx; - HMAC_CTX_init(&ctx); - HMAC(EVP_md5(), key, key_len, msg, msg_len, md, NULL); - HMAC_CTX_cleanup(&ctx); -#endif -} - - -/* - * I believe this is based on SSLv3 with the following differences: - * MAC algorithm (5.2.3.1) uses only 32-bit length in place of seq_num/type/length fields - * MAC algorithm uses SHA1 and MD5 for the two hash functions instead of one or other - * key_block algorithm (6.2.2) uses 'X', 'YY', 'ZZZ' instead of 'A', 'BB', 'CCC' - * key_block partitioning is different (16 bytes each: MAC secret, decrypt key, encrypt key) - * encryption/decryption keys updated every 4096 packets - * See http://wp.netscape.com/eng/ssl3/draft302.txt - */ - -/* - * 48-byte transformation used to generate master secret (6.1) and key material (6.2.2). - * Both SHA1 and MD5 algorithms are used. - */ -void sec_hash_48(uint8 * out, uint8 * in, uint8 * salt1, uint8 * salt2, uint8 salt) { - uint8 shasig[20]; - uint8 pad[4]; - SSL_SHA1 sha1; - SSL_MD5 md5; - int32_t i; - - for (i = 0; i < 3; i++) { - memset(pad, salt + i, i + 1); - - ssl_sha1_init(&sha1); - ssl_sha1_update(&sha1, pad, i + 1); - ssl_sha1_update(&sha1, in, 48); - ssl_sha1_update(&sha1, salt1, 32); - ssl_sha1_update(&sha1, salt2, 32); - ssl_sha1_final(&sha1, shasig); - - ssl_md5_init(&md5); - ssl_md5_update(&md5, in, 48); - ssl_md5_update(&md5, shasig, 20); - ssl_md5_final(&md5, &out[i * 16]); - } -} - -/* - * 16-byte transformation used to generate export keys (6.2.2). - */ -void sec_hash_16(uint8 * out, uint8 * in, uint8 * salt1, uint8 * salt2) { - SSL_MD5 md5; - - ssl_md5_init(&md5); - ssl_md5_update(&md5, in, 16); - ssl_md5_update(&md5, salt1, 32); - ssl_md5_update(&md5, salt2, 32); - ssl_md5_final(&md5, out); -} - -/* Reduce key entropy from 64 to 40 bits */ -static void sec_make_40bit(uint8 * key) { - key[0] = 0xd1; - key[1] = 0x26; - key[2] = 0x9e; -} - -/* Generate encryption keys given client and server randoms */ -static void sec_generate_keys(uint8 * client_random, uint8 * server_random, int32_t rc4_key_size) { - uint8 pre_master_secret[48]; - uint8 master_secret[48]; - uint8 key_block[48]; - - /* Construct pre-master secret */ - memcpy(pre_master_secret, client_random, 24); - memcpy(pre_master_secret + 24, server_random, 24); - - /* Generate master secret and then key material */ - sec_hash_48(master_secret, pre_master_secret, client_random, server_random, 'A'); - sec_hash_48(key_block, master_secret, client_random, server_random, 'X'); - - /* First 16 bytes of key material is MAC secret */ - memcpy(g_sec_sign_key, key_block, 16); - - /* Generate export keys from next two blocks of 16 bytes */ - sec_hash_16(g_sec_decrypt_key, &key_block[16], client_random, server_random); - sec_hash_16(g_sec_encrypt_key, &key_block[32], client_random, server_random); - - if (rc4_key_size == 1) { - DEBUG(("40-bit encryption enabled\n")); - sec_make_40bit(g_sec_sign_key); - sec_make_40bit(g_sec_decrypt_key); - sec_make_40bit(g_sec_encrypt_key); - g_rc4_key_len = 8; - } else { - DEBUG(("rc_4_key_size == %d, 128-bit encryption enabled\n", rc4_key_size)); - g_rc4_key_len = 16; - } - - /* Save initial RC4 keys as update keys */ - memcpy(g_sec_decrypt_update_key, g_sec_decrypt_key, 16); - memcpy(g_sec_encrypt_update_key, g_sec_encrypt_key, 16); - - /* Initialise RC4 state arrays */ - ssl_rc4_set_key(&g_rc4_decrypt_key, g_sec_decrypt_key, g_rc4_key_len); - ssl_rc4_set_key(&g_rc4_encrypt_key, g_sec_encrypt_key, g_rc4_key_len); -} - -static uint8 pad_54[40] = { - 54, 54, 54, 54, 54, 54, 54, 54, 54, 54, 54, 54, 54, 54, 54, 54, 54, - 54, 54, 54, - 54, 54, 54, 54, 54, 54, 54, 54, 54, 54, 54, 54, 54, 54, 54, 54, 54, - 54, 54, 54 -}; - -static uint8 pad_92[48] = { - 92, 92, 92, 92, 92, 92, 92, 92, 92, 92, 92, 92, 92, 92, 92, 92, 92, - 92, 92, 92, 92, 92, 92, 92, - 92, 92, 92, 92, 92, 92, 92, 92, 92, 92, 92, 92, 92, 92, 92, 92, 92, - 92, 92, 92, 92, 92, 92, 92 -}; - -/* Output a uint32 into a buffer (little-endian) */ -void buf_out_uint32(uint8 * buffer, uint32 value) { - buffer[0] = (value) & 0xff; - buffer[1] = (value >> 8) & 0xff; - buffer[2] = (value >> 16) & 0xff; - buffer[3] = (value >> 24) & 0xff; -} - -/* Generate a MAC hash (5.2.3.1), using a combination of SHA1 and MD5 */ -void sec_sign(uint8 * signature, int32_t siglen, uint8 * session_key, int32_t keylen, uint8 * data, int32_t datalen) { - uint8 shasig[20]; - uint8 md5sig[16]; - uint8 lenhdr[4]; - SSL_SHA1 sha1; - SSL_MD5 md5; - - buf_out_uint32(lenhdr, datalen); - - ssl_sha1_init(&sha1); - ssl_sha1_update(&sha1, session_key, keylen); - ssl_sha1_update(&sha1, pad_54, 40); - ssl_sha1_update(&sha1, lenhdr, 4); - ssl_sha1_update(&sha1, data, datalen); - ssl_sha1_final(&sha1, shasig); - - ssl_md5_init(&md5); - ssl_md5_update(&md5, session_key, keylen); - ssl_md5_update(&md5, pad_92, 48); - ssl_md5_update(&md5, shasig, 20); - ssl_md5_final(&md5, md5sig); - - memcpy(signature, md5sig, siglen); -} - -/* Update an encryption key */ -static void sec_update(uint8 * key, uint8 * update_key) { - uint8 shasig[20]; - SSL_SHA1 sha1; - SSL_MD5 md5; - SSL_RC4 update; - - ssl_sha1_init(&sha1); - ssl_sha1_update(&sha1, update_key, g_rc4_key_len); - ssl_sha1_update(&sha1, pad_54, 40); - ssl_sha1_update(&sha1, key, g_rc4_key_len); - ssl_sha1_final(&sha1, shasig); - - ssl_md5_init(&md5); - ssl_md5_update(&md5, update_key, g_rc4_key_len); - ssl_md5_update(&md5, pad_92, 48); - ssl_md5_update(&md5, shasig, 20); - ssl_md5_final(&md5, key); - - ssl_rc4_set_key(&update, key, g_rc4_key_len); - ssl_rc4_crypt(&update, key, key, g_rc4_key_len); - - if (g_rc4_key_len == 8) - sec_make_40bit(key); -} - -/* Encrypt data using RC4 */ -static void sec_encrypt(uint8 * data, int32_t length) { - if (g_sec_encrypt_use_count == 4096) { - sec_update(g_sec_encrypt_key, g_sec_encrypt_update_key); - ssl_rc4_set_key(&g_rc4_encrypt_key, g_sec_encrypt_key, g_rc4_key_len); - g_sec_encrypt_use_count = 0; - } - - ssl_rc4_crypt(&g_rc4_encrypt_key, data, data, length); - g_sec_encrypt_use_count++; -} - -/* Decrypt data using RC4 */ -void sec_decrypt(uint8 * data, int32_t length) { - if (g_sec_decrypt_use_count == 4096) { - sec_update(g_sec_decrypt_key, g_sec_decrypt_update_key); - ssl_rc4_set_key(&g_rc4_decrypt_key, g_sec_decrypt_key, g_rc4_key_len); - g_sec_decrypt_use_count = 0; - } - - ssl_rc4_crypt(&g_rc4_decrypt_key, data, data, length); - g_sec_decrypt_use_count++; -} - -/* Perform an RSA public key encryption operation */ -static void sec_rsa_encrypt(uint8 * out, uint8 * in, int32_t len, uint32 modulus_size, uint8 * modulus, uint8 * exponent) { - ssl_rsa_encrypt(out, in, len, modulus_size, modulus, exponent); -} - -/* Initialise secure transport packet */ -STREAM sec_init(uint32 flags, int32_t maxlen) { - int32_t hdrlen; - STREAM s; - -// if (!g_licence_issued) - hdrlen = (flags & SEC_ENCRYPT) ? 12 : 4; -// else - -// hdrlen = (flags & SEC_ENCRYPT) ? 12 : 0; - s = mcs_init(maxlen + hdrlen); - s_push_layer(s, sec_hdr, hdrlen); - - return s; -} - -/* Transmit secure transport packet over specified channel */ -void sec_send_to_channel(STREAM s, uint32 flags, uint16 channel) { - int32_t datalen; - - s_pop_layer(s, sec_hdr); - out_uint32_le(s, flags); - - if (flags & SEC_ENCRYPT) { - flags &= ~SEC_ENCRYPT; - datalen = s->end - s->p - 8; - - sec_sign(s->p, 8, g_sec_sign_key, g_rc4_key_len, s->p + 8, datalen); - sec_encrypt(s->p + 8, datalen); - } - - mcs_send_to_channel(s, channel); -} - -/* Transmit secure transport packet */ - -void sec_send(STREAM s, uint32 flags) { - sec_send_to_channel(s, flags, MCS_GLOBAL_CHANNEL); -} - - -/* Transfer the client random to the server */ -static void sec_establish_key(void) { - uint32 length = g_server_public_key_len + SEC_PADDING_SIZE; - uint32 flags = SEC_CLIENT_RANDOM; - STREAM s; - - s = sec_init(flags, length + 4); - - out_uint32_le(s, length); - out_uint8p(s, g_sec_crypted_random, g_server_public_key_len); - out_uint8s(s, SEC_PADDING_SIZE); - - s_mark_end(s); - sec_send(s, flags); -} - -/* Output a string in Unicode */ -void rdp_out_unistr(STREAM s, char *string, int32_t len) { - int32_t i = 0, j = 0; - - len += 2; - while (i < len) { - s->p[i++] = string[j++]; - s->p[i++] = 0; - } - s->p += len; -} - -/* Output connect initial data blob */ -static void sec_out_mcs_data(STREAM s) { - char *g_hostname = "hydra"; - int32_t hostlen = 2 * strlen(g_hostname); - int32_t length = 158 + 76 + 12 + 4; - -/* - if (g_num_channels > 0) - length += g_num_channels * 12 + 8; -*/ - if (hostlen > 30) - hostlen = 30; - - /* Generic Conference Control (T.124) ConferenceCreateRequest */ - out_uint16_be(s, 5); - out_uint16_be(s, 0x14); - out_uint8(s, 0x7c); - out_uint16_be(s, 1); - - out_uint16_be(s, (length | 0x8000)); /* remaining length */ - - out_uint16_be(s, 8); /* length? */ - out_uint16_be(s, 16); - out_uint8(s, 0); - out_uint16_le(s, 0xc001); - out_uint8(s, 0); - - out_uint32_le(s, 0x61637544); /* OEM ID: "Duca", as in Ducati. */ - out_uint16_be(s, ((length - 14) | 0x8000)); /* remaining length */ - - /* Client information */ - out_uint16_le(s, SEC_TAG_CLI_INFO); - out_uint16_le(s, 212); /* length */ - out_uint16_le(s, g_use_rdp5 ? 4 : 1); /* RDP version. 1 == RDP4, 4 == RDP5. */ - out_uint16_le(s, 8); - out_uint16_le(s, 800); - out_uint16_le(s, 600); - out_uint16_le(s, 0xca01); - out_uint16_le(s, 0xaa03); - out_uint32_le(s, 0x409); - out_uint32_le(s, 2600); /* Client build. We are now 2600 compatible :-) */ - - /* Unicode name of client, padded to 32 bytes */ - rdp_out_unistr(s, g_hostname, hostlen); - out_uint8s(s, 30 - hostlen); - - /* See - http://msdn.microsoft.com/library/default.asp?url=/library/en-us/wceddk40/html/cxtsksupportingremotedesktopprotocol.asp */ - out_uint32_le(s, 0x4); - out_uint32_le(s, 0x0); - out_uint32_le(s, 0xc); - out_uint8s(s, 64); /* reserved? 4 + 12 doublewords */ - out_uint16_le(s, 0xca01); /* colour depth? */ - out_uint16_le(s, 1); - - out_uint32(s, 0); - out_uint8(s, g_server_depth); - out_uint16_le(s, 0x0700); - out_uint8(s, 0); - out_uint32_le(s, 1); - out_uint8s(s, 64); /* End of client info */ - - out_uint16_le(s, SEC_TAG_CLI_4); - out_uint16_le(s, 12); - out_uint32_le(s, g_console_session ? 0xb : 9); - out_uint32(s, 0); - - /* Client encryption settings */ - out_uint16_le(s, SEC_TAG_CLI_CRYPT); - out_uint16_le(s, 12); /* length */ - out_uint32_le(s, g_encryption ? 0x3 : 0); /* encryption supported, 128-bit supported */ - out_uint32(s, 0); /* Unknown */ - -/* - DEBUG_RDP5(("g_num_channels is %d\n", g_num_channels)); - if (g_num_channels > 0) - { - out_uint16_le(s, SEC_TAG_CLI_CHANNELS); - out_uint16_le(s, g_num_channels * 12 + 8); // length - out_uint32_le(s, g_num_channels); // number of virtual channels - for (i = 0; i < g_num_channels; i++) - { - DEBUG_RDP5(("Requesting channel %s\n", g_channels[i].name)); - out_uint8a(s, g_channels[i].name, 8); - out_uint32_be(s, g_channels[i].flags); - } - } -*/ - s_mark_end(s); -} - -/* Parse a public key structure */ -static BOOL sec_parse_public_key(STREAM s, uint8 * modulus, uint8 * exponent) { - uint32 magic, modulus_len; - - in_uint32_le(s, magic); - - if (magic != SEC_RSA_MAGIC) { - error("RSA magic 0x%x\n", magic); - return False; - } - - in_uint32_le(s, modulus_len); - modulus_len -= SEC_PADDING_SIZE; - if ((modulus_len < SEC_MODULUS_SIZE) || (modulus_len > SEC_MAX_MODULUS_SIZE)) { - error("Bad server public key size (%u bits)\n", modulus_len * 8); - return False; - } - - in_uint8s(s, 8); /* modulus_bits, unknown */ - in_uint8a(s, exponent, SEC_EXPONENT_SIZE); - in_uint8a(s, modulus, modulus_len); - in_uint8s(s, SEC_PADDING_SIZE); - g_server_public_key_len = modulus_len; - - return s_check(s); -} - -/* Parse a public signature structure */ -static BOOL sec_parse_public_sig(STREAM s, uint32 len, uint8 * modulus, uint8 * exponent) { - uint8 signature[SEC_MAX_MODULUS_SIZE]; - uint32 sig_len; - - if (len != 72) { - return True; - } - memset(signature, 0, sizeof(signature)); - sig_len = len - 8; - in_uint8a(s, signature, sig_len); - return ssl_sig_ok(exponent, SEC_EXPONENT_SIZE, modulus, g_server_public_key_len, signature, sig_len); -} - -/* Parse a crypto information structure */ -static BOOL sec_parse_crypt_info(STREAM s, uint32 * rc4_key_size, uint8 ** server_random, uint8 * modulus, uint8 * exponent) { - uint32 crypt_level, random_len, rsa_info_len; - uint32 cacert_len, cert_len, flags; - X509 *cacert, *server_cert; - SSL_RKEY *server_public_key; - uint16 tag, length; - uint8 *next_tag, *end; - - in_uint32_le(s, *rc4_key_size); /* 1 = 40-bit, 2 = 128-bit */ - in_uint32_le(s, crypt_level); /* 1 = low, 2 = medium, 3 = high */ - if (crypt_level == 0) /* no encryption */ - return False; - in_uint32_le(s, random_len); - in_uint32_le(s, rsa_info_len); - - if (random_len != SEC_RANDOM_SIZE) { - error("random len %d, expected %d\n", random_len, SEC_RANDOM_SIZE); - return False; - } - - in_uint8p(s, *server_random, random_len); - - /* RSA info */ - end = s->p + rsa_info_len; - if (end > s->end) - return False; - - in_uint32_le(s, flags); /* 1 = RDP4-style, 0x80000002 = X.509 */ - if (flags & 1) { - DEBUG_RDP5(("We're going for the RDP4-style encryption\n")); - in_uint8s(s, 8); /* unknown */ - - while (s->p < end) { - in_uint16_le(s, tag); - in_uint16_le(s, length); - - next_tag = s->p + length; - - switch (tag) { - case SEC_TAG_PUBKEY: - if (!sec_parse_public_key(s, modulus, exponent)) - return False; - DEBUG_RDP5(("Got Public key, RDP4-style\n")); - - break; - - case SEC_TAG_KEYSIG: - if (!sec_parse_public_sig(s, length, modulus, exponent)) - return False; - break; - - default: - unimpl("crypt tag 0x%x\n", tag); - } - - s->p = next_tag; - } - } else { - uint32 certcount; - - DEBUG_RDP5(("We're going for the RDP5-style encryption\n")); - in_uint32_le(s, certcount); /* Number of certificates */ - if (certcount < 2) { - error("Server didn't send enough X509 certificates\n"); - return False; - } - for (; certcount > 2; certcount--) { /* ignore all the certificates between the root and the signing CA */ - uint32 ignorelen; - X509 *ignorecert; - - DEBUG_RDP5(("Ignored certs left: %d\n", certcount)); - in_uint32_le(s, ignorelen); - DEBUG_RDP5(("Ignored Certificate length is %d\n", ignorelen)); - ignorecert = ssl_cert_read(s->p, ignorelen); - in_uint8s(s, ignorelen); - if (ignorecert == NULL) { /* XXX: error out? */ - DEBUG_RDP5(("got a bad cert: this will probably screw up the rest of the communication\n")); - } -#ifdef WITH_DEBUG_RDP5 - DEBUG_RDP5(("cert #%d (ignored):\n", certcount)); - ssl_cert_print_fp(stdout, ignorecert); -#endif - } - /* Do da funky X.509 stuffy - - "How did I find out about this? I looked up and saw a - bright light and when I came to I had a scar on my forehead - and knew about X.500" - - Peter Gutman in a early version of - http://www.cs.auckland.ac.nz/~pgut001/pubs/x509guide.txt - */ - in_uint32_le(s, cacert_len); - DEBUG_RDP5(("CA Certificate length is %d\n", cacert_len)); - cacert = ssl_cert_read(s->p, cacert_len); - in_uint8s(s, cacert_len); - if (NULL == cacert) { - error("Couldn't load CA Certificate from server\n"); - return False; - } - in_uint32_le(s, cert_len); - DEBUG_RDP5(("Certificate length is %d\n", cert_len)); - server_cert = ssl_cert_read(s->p, cert_len); - in_uint8s(s, cert_len); - if (NULL == server_cert) { - ssl_cert_free(cacert); - error("Couldn't load Certificate from server\n"); - return False; - } - ssl_cert_free(cacert); - in_uint8s(s, 16); /* Padding */ - server_public_key = ssl_cert_to_rkey(server_cert, &g_server_public_key_len); - if (NULL == server_public_key) { - DEBUG_RDP5(("Didn't parse X509 correctly\n")); - ssl_cert_free(server_cert); - return False; - } - ssl_cert_free(server_cert); - if ((g_server_public_key_len < SEC_MODULUS_SIZE) || (g_server_public_key_len > SEC_MAX_MODULUS_SIZE)) { - error("Bad server public key size (%u bits)\n", g_server_public_key_len * 8); - ssl_rkey_free(server_public_key); - return False; - } - if (ssl_rkey_get_exp_mod(server_public_key, exponent, SEC_EXPONENT_SIZE, modulus, SEC_MAX_MODULUS_SIZE) != 0) { - error("Problem extracting RSA exponent, modulus"); - ssl_rkey_free(server_public_key); - return False; - } - ssl_rkey_free(server_public_key); - return True; /* There's some garbage here we don't care about */ - } - return s_check_end(s); -} - -/* Process crypto information blob */ -static void sec_process_crypt_info(STREAM s) { - uint8 *server_random = NULL; - uint8 modulus[SEC_MAX_MODULUS_SIZE]; - uint8 exponent[SEC_EXPONENT_SIZE]; - uint32 rc4_key_size; - - memset(modulus, 0, sizeof(modulus)); - memset(exponent, 0, sizeof(exponent)); - if (!sec_parse_crypt_info(s, &rc4_key_size, &server_random, modulus, exponent)) { - DEBUG(("Failed to parse crypt info\n")); - return; - } - DEBUG(("Generating client random\n")); - generate_random(g_client_random); - sec_rsa_encrypt(g_sec_crypted_random, g_client_random, SEC_RANDOM_SIZE, g_server_public_key_len, modulus, exponent); - sec_generate_keys(g_client_random, server_random, rc4_key_size); -} - - -/* Process SRV_INFO, find RDP version supported by server */ -static void sec_process_srv_info(STREAM s) { - in_uint16_le(s, g_server_rdp_version); - if (verbose) - hydra_report(stderr, "[VERBOSE] Server RDP version is %d\n", g_server_rdp_version); - if (1 == g_server_rdp_version) { - g_use_rdp5 = 0; - g_server_depth = 8; - } -} - - -/* Process connect response data blob */ -void sec_process_mcs_data(STREAM s) { - uint16 tag, length; - uint8 *next_tag; - uint8 len; - - in_uint8s(s, 21); /* header (T.124 ConferenceCreateResponse) */ - in_uint8(s, len); - if (len & 0x80) - in_uint8(s, len); - - while (s->p < s->end) { - in_uint16_le(s, tag); - in_uint16_le(s, length); - - if (length <= 4) - return; - - next_tag = s->p + length - 4; - - switch (tag) { - case SEC_TAG_SRV_INFO: - sec_process_srv_info(s); - break; - - case SEC_TAG_SRV_CRYPT: - sec_process_crypt_info(s); - break; - - case SEC_TAG_SRV_CHANNELS: - break; - - default: - unimpl("response tag 0x%x\n", tag); - } - - s->p = next_tag; - } -} - -/* Receive secure transport packet */ -STREAM sec_recv(uint8 * rdpver) { - uint32 sec_flags; - uint16 channel = 0; - STREAM s; - - while ((s = mcs_recv(&channel, rdpver)) != NULL) { - if (rdpver != NULL) { - if (*rdpver != 3) { - if (*rdpver & 0x80) { - in_uint8s(s, 8); /* signature */ - sec_decrypt(s->p, s->end - s->p); - } - return s; - } - } - //if (g_encryption || !g_licence_issued) - if (g_encryption) { - in_uint32_le(s, sec_flags); - - if (sec_flags & SEC_ENCRYPT) { - in_uint8s(s, 8); /* signature */ - sec_decrypt(s->p, s->end - s->p); - } - - if (sec_flags & SEC_LICENCE_NEG) { - //licence_process(s); - continue; - } - - if (sec_flags & 0x0400) { /* SEC_REDIRECT_ENCRYPT */ - uint8 swapbyte; - - in_uint8s(s, 8); /* signature */ - sec_decrypt(s->p, s->end - s->p); - - /* Check for a redirect packet, starts with 00 04 */ - if (s->p[0] == 0 && s->p[1] == 4) { - /* for some reason the PDU and the length seem to be swapped. - This isn't good, but we're going to do a byte for byte - swap. So the first foure value appear as: 00 04 XX YY, - where XX YY is the little endian length. We're going to - use 04 00 as the PDU type, so after our swap this will look - like: XX YY 04 00 */ - swapbyte = s->p[0]; - s->p[0] = s->p[2]; - s->p[2] = swapbyte; - - swapbyte = s->p[1]; - s->p[1] = s->p[3]; - s->p[3] = swapbyte; - - swapbyte = s->p[2]; - s->p[2] = s->p[3]; - s->p[3] = swapbyte; - } -#ifdef WITH_DEBUG - /* warning! this debug statement will show passwords in the clear! */ - hexdump(s->p, s->end - s->p); -#endif - } - - } - - if (channel != MCS_GLOBAL_CHANNEL) { - if (rdpver != NULL) - *rdpver = 0xff; - return s; - } - - return s; - } - - return NULL; -} - -/* Establish a secure connection */ -BOOL sec_connect(char *server, char *username, BOOL reconnect) { - struct stream mcs_data; - - /* We exchange some RDP data during the MCS-Connect */ - mcs_data.size = 512; - mcs_data.end = mcs_data.p = mcs_data.data = (uint8 *) xmalloc(mcs_data.size); - sec_out_mcs_data(&mcs_data); - - if (!mcs_connect(server, &mcs_data, username, reconnect)) - return False; - if (g_encryption) - sec_establish_key(); - free(mcs_data.data); - mcs_data.data = NULL; - return True; -} - -/* Disconnect a connection */ -void sec_disconnect(void) { - mcs_disconnect(); -} - -/* reset the state of the sec layer */ -void sec_reset_state(void) { - g_server_rdp_version = 0; - g_sec_encrypt_use_count = 0; - g_sec_decrypt_use_count = 0; - mcs_reset_state(); -} - - - -/* Read field indicating which parameters are present */ -static void rdp_in_present(STREAM s, uint32 * present, uint8 flags, int32_t size) { - uint8 bits; - int32_t i; - - if (flags & RDP_ORDER_SMALL) { - size--; - } - - if (flags & RDP_ORDER_TINY) { - if (size < 2) - size = 0; - else - size -= 2; - } - - *present = 0; - for (i = 0; i < size; i++) { - in_uint8(s, bits); - *present |= bits << (i * 8); - } -} - -/* Read a co-ordinate (16-bit, or 8-bit delta) */ -static void rdp_in_coord(STREAM s, sint16 * coord, BOOL delta) { - sint8 change; - - if (delta) { - in_uint8(s, change); - *coord += change; - } else { - in_uint16_le(s, *coord); - } -} - -/* Read a colour entry */ -static void rdp_in_colour(STREAM s, uint32 * colour) { - uint32 i; - - in_uint8(s, i); - *colour = i; - in_uint8(s, i); - *colour |= i << 8; - in_uint8(s, i); - *colour |= i << 16; -} - -/* Parse bounds information */ -static BOOL rdp_parse_bounds(STREAM s, BOUNDS * bounds) { - uint8 present; - - in_uint8(s, present); - - if (present & 1) - rdp_in_coord(s, &bounds->left, False); - else if (present & 16) - rdp_in_coord(s, &bounds->left, True); - - if (present & 2) - rdp_in_coord(s, &bounds->top, False); - else if (present & 32) - rdp_in_coord(s, &bounds->top, True); - - if (present & 4) - rdp_in_coord(s, &bounds->right, False); - else if (present & 64) - rdp_in_coord(s, &bounds->right, True); - - if (present & 8) - rdp_in_coord(s, &bounds->bottom, False); - else if (present & 128) - rdp_in_coord(s, &bounds->bottom, True); - - return s_check(s); -} - -/* Process an opaque rectangle order */ -static void process_rect(STREAM s, RECT_ORDER * os, uint32 present, BOOL delta) { - uint32 i; - - if (present & 0x01) - rdp_in_coord(s, &os->x, delta); - - if (present & 0x02) - rdp_in_coord(s, &os->y, delta); - - if (present & 0x04) - rdp_in_coord(s, &os->cx, delta); - - if (present & 0x08) - rdp_in_coord(s, &os->cy, delta); - - if (present & 0x10) { - in_uint8(s, i); - os->colour = (os->colour & 0xffffff00) | i; - } - - if (present & 0x20) { - in_uint8(s, i); - os->colour = (os->colour & 0xffff00ff) | (i << 8); - } - - if (present & 0x40) { - in_uint8(s, i); - os->colour = (os->colour & 0xff00ffff) | (i << 16); - } - - DEBUG(("RECT(x=%d,y=%d,cx=%d,cy=%d,fg=0x%x)\n", os->x, os->y, os->cx, os->cy, os->colour)); -} - -/* Process a desktop save order */ -static void process_desksave(STREAM s, DESKSAVE_ORDER * os, uint32 present, BOOL delta) { - //int32_t width, height; - - if (present & 0x01) - in_uint32_le(s, os->offset); - - if (present & 0x02) - rdp_in_coord(s, &os->left, delta); - - if (present & 0x04) - rdp_in_coord(s, &os->top, delta); - - if (present & 0x08) - rdp_in_coord(s, &os->right, delta); - - if (present & 0x10) - rdp_in_coord(s, &os->bottom, delta); - - if (present & 0x20) - in_uint8(s, os->action); - - DEBUG(("DESKSAVE(l=%d,t=%d,r=%d,b=%d,off=%d,op=%d)\n", os->left, os->top, os->right, os->bottom, os->offset, os->action)); - - //width = os->right - os->left + 1; - //height = os->bottom - os->top + 1; -} - -/* Process a memory blt order */ -static void process_memblt(STREAM s, MEMBLT_ORDER * os, uint32 present, BOOL delta) { - //on win 7, vista, 2008, the login failed has to be catched here - if (present & 0x0001) { - in_uint8(s, os->cache_id); - in_uint8(s, os->colour_table); - } - - if (present & 0x0002) - rdp_in_coord(s, &os->x, delta); - - if (present & 0x0004) - rdp_in_coord(s, &os->y, delta); - - if (present & 0x0008) - rdp_in_coord(s, &os->cx, delta); - - if (present & 0x0010) - rdp_in_coord(s, &os->cy, delta); - - if (present & 0x0020) - in_uint8(s, os->opcode); - - if (present & 0x0040) - rdp_in_coord(s, &os->srcx, delta); - - if (present & 0x0080) - rdp_in_coord(s, &os->srcy, delta); - - if (present & 0x0100) - in_uint16_le(s, os->cache_idx); - - DEBUG(("MEMBLT(op=0x%x,x=%d,y=%d,cx=%d,cy=%d,id=%d,idx=%d)\n", os->opcode, os->x, os->y, os->cx, os->cy, os->cache_id, os->cache_idx)); - //MEMBLT(op=0xcc,x=640,y=128,cx=64,cy=64,id=2,idx=117) => win8 failed - - if ((os->opcode == 0xcc && os->x == 740 && os->y == 448 && os->cx == 60 && os->cy == 56 && os->cache_id == 2) || - (os->opcode == 0xcc && os->x == 640 && os->y == 128 && os->cx == 64 && os->cy == 64 && os->cache_id == 2 && os->cache_idx > 100)) { - if (debug) - hydra_report(stderr, "[DEBUG] Login failed from process_memblt\n"); - login_result = LOGIN_FAIL; - } -} - -/* Process a text order */ -static void process_text2(STREAM s, TEXT2_ORDER * os, uint32 present, BOOL delta) { - int32_t i; - - if (present & 0x000001) - in_uint8(s, os->font); - - if (present & 0x000002) - in_uint8(s, os->flags); - - if (present & 0x000004) - in_uint8(s, os->opcode); - - if (present & 0x000008) - in_uint8(s, os->mixmode); - - if (present & 0x000010) - rdp_in_colour(s, &os->fgcolour); - - if (present & 0x000020) - rdp_in_colour(s, &os->bgcolour); - - if (present & 0x000040) - in_uint16_le(s, os->clipleft); - - if (present & 0x000080) - in_uint16_le(s, os->cliptop); - - if (present & 0x000100) - in_uint16_le(s, os->clipright); - - if (present & 0x000200) - in_uint16_le(s, os->clipbottom); - - if (present & 0x000400) - in_uint16_le(s, os->boxleft); - - if (present & 0x000800) - in_uint16_le(s, os->boxtop); - - if (present & 0x001000) - in_uint16_le(s, os->boxright); - - if (present & 0x002000) - in_uint16_le(s, os->boxbottom); - - //rdp_parse_brush(s, &os->brush, present >> 14); - - if (present & 0x080000) - in_uint16_le(s, os->x); - - if (present & 0x100000) - in_uint16_le(s, os->y); - - if (present & 0x200000) { - in_uint8(s, os->length); - in_uint8a(s, os->text, os->length); - } - //printf("TEXT2(x=%d,y=%d,cl=%d,ct=%d,cr=%d,cb=%d,bl=%d,bt=%d,br=%d,bb=%d,bs=%d,bg=0x%x,fg=0x%x,font=%d,fl=0x%x,op=0x%x,mix=%d,n=%d)\n", os->x, os->y, os->clipleft, os->cliptop, os->clipright, os->clipbottom, os->boxleft, os->boxtop, os->boxright, os->boxbottom, , os->bgcolour, os->fgcolour, os->font, os->flags, os->opcode, os->mixmode, os->length); - - if (debug) { - printf("[DEBUG] process_text2: "); - - for (i = 0; i < os->length; i++) - printf("%02x ", os->text[i]); - printf(" *** "); - - printf("size: %d\n", os->length); - } - //there is no way to determine if the message from w2k is a success or failure at first - //so we identify it here and set the os version as win 2000 same for win2k3 - if (!memcmp(os->text, LOGON_MESSAGE_2K, 31)) { - os_version = 2000; - } - if (!memcmp(os->text, LOGON_MESSAGE_FAILED_2K3, 18)) { - os_version = 2003; - } - //on win2k, error can be fe 00 00 or fe 02 00 - if (((os->text[0] == 254) && (os->text[2] == 0)) || (!memcmp(os->text, LOGON_MESSAGE_FAILED_XP, 18))) { - if (debug) - hydra_report(stderr, "[DEBUG] login failed from process_text2\n"); - login_result = LOGIN_FAIL; - } else { - //if it's not an well known error and if it's not just traffic from win 2000 server - - if ((os_version == 2000) && (os->length > 50)) { - if (debug) - hydra_report(stderr, "[DEBUG] login success from process_text2\n"); - login_result = LOGIN_SUCC; - } - } -} - -/* Process a secondary order */ -static void process_secondary_order(STREAM s) { - /* The length isn't calculated correctly by the server. - * For very compact orders the length becomes negative - * so a signed integer must be used. */ - uint16 length; - //uint16 flags; - //uint8 type; - uint8 *next_order; - - in_uint16_le(s, length); - //in_uint16_le(s, flags); /* used by bmpcache2 */ - //in_uint8(s, type); - - next_order = s->p + (sint16) length + 7; - - /* - switch (type) - { - case RDP_ORDER_RAW_BMPCACHE: - break; - - case RDP_ORDER_COLCACHE: - break; - - case RDP_ORDER_BMPCACHE: - break; - - case RDP_ORDER_FONTCACHE: - process_fontcache(s); - break; - - case RDP_ORDER_RAW_BMPCACHE2: - break; - - case RDP_ORDER_BMPCACHE2: - break; - - case RDP_ORDER_BRUSHCACHE: - process_brushcache(s, flags); - break; - - default: - unimpl("secondary order %d\n", type); - } - */ - s->p = next_order; -} - -/* Process an order PDU */ -void process_orders(STREAM s, uint16 num_orders) { - RDP_ORDER_STATE *os = &g_order_state; - uint32 present; - uint8 order_flags; - int32_t size, processed = 0; - BOOL delta; - - while (processed < num_orders) { - in_uint8(s, order_flags); - - if (os_version == 2003) - os_version = 0; - - if (!(order_flags & RDP_ORDER_STANDARD)) { - //error("order parsing failed\n"); - //we detected the os is a win 2000 version and the next text msg will be either an error LOGON_MESSAGE_FAILED_2K - //or any other traffic indicating the logon was successfull, so we reset the os_version and let process_text2 handle the msg - if (os_version == 2003) - login_result = LOGIN_SUCC; - break; - } - - if (order_flags & RDP_ORDER_SECONDARY) { - process_secondary_order(s); - } else { - if (order_flags & RDP_ORDER_CHANGE) { - in_uint8(s, os->order_type); - } - - switch (os->order_type) { - case RDP_ORDER_TRIBLT: - case RDP_ORDER_TEXT2: - size = 3; - break; - - case RDP_ORDER_PATBLT: - case RDP_ORDER_MEMBLT: - case RDP_ORDER_LINE: - case RDP_ORDER_POLYGON2: - case RDP_ORDER_ELLIPSE2: - size = 2; - break; - - default: - size = 1; - } - - rdp_in_present(s, &present, order_flags, size); - - if (order_flags & RDP_ORDER_BOUNDS) { - if (!(order_flags & RDP_ORDER_LASTBOUNDS)) - rdp_parse_bounds(s, &os->bounds); - - } - - delta = order_flags & RDP_ORDER_DELTA; - -//printf("order %d\n", os->order_type); - - if (login_result) - return; - - switch (os->order_type) { - - case RDP_ORDER_RECT: - process_rect(s, &os->rect, present, delta); - break; - - case RDP_ORDER_DESKSAVE: - process_desksave(s, &os->desksave, present, delta); - break; - - case RDP_ORDER_MEMBLT: - process_memblt(s, &os->memblt, present, delta); - break; - - case RDP_ORDER_TEXT2: - process_text2(s, &os->text2, present, delta); - break; - - default: - if (debug) - printf("[DEBUG] unknown order_type: %d\n", os->order_type); - - } - } - - processed++; - } -} - -/* Reset order state */ -void reset_order_state(void) { - memset(&g_order_state, 0, sizeof(g_order_state)); - g_order_state.order_type = RDP_ORDER_PATBLT; -} - -/* Disconnect from the RDP layer */ -void rdp_disconnect(void) { - sec_disconnect(); -} - - -void rdp5_process(STREAM s) { - uint16 length, count; - uint8 type/*, ctype*/; - uint8 *next; - - struct stream *ts; - - while (s->p < s->end) { - in_uint8(s, type); - if (type & RDP5_COMPRESSED) { - //in_uint8(s, ctype); - in_uint16_le(s, length); - type ^= RDP5_COMPRESSED; - } else { - //ctype = 0; - in_uint16_le(s, length); - } - g_next_packet = next = s->p + length; - ts = s; -//printf("type: %d\n", type); - switch (type) { - case 0: /* update orders */ - in_uint16_le(ts, count); - process_orders(ts, count); - break; - - } - - s->p = next; - } -} - - -/* Receive an RDP packet */ -static STREAM rdp_recv(uint8 * type) { - static STREAM rdp_s; - uint16 length, pdu_type; - uint8 rdpver; - - if ((rdp_s == NULL) || (g_next_packet >= rdp_s->end) || (g_next_packet == NULL)) { - rdp_s = sec_recv(&rdpver); - if (rdp_s == NULL) - return NULL; - if (rdpver == 0xff) { - g_next_packet = rdp_s->end; - *type = 0; - return rdp_s; - } else if (rdpver != 3) { - /* rdp5_process should move g_next_packet ok */ - rdp5_process(rdp_s); - *type = 0; - return rdp_s; - } - - g_next_packet = rdp_s->p; - } else { - rdp_s->p = g_next_packet; - } - - in_uint16_le(rdp_s, length); - /* 32k packets are really 8, keepalive fix */ - if (length == 0x8000) { - g_next_packet += 8; - *type = 0; - return rdp_s; - } - in_uint16_le(rdp_s, pdu_type); - in_uint8s(rdp_s, 2); /* userid */ - *type = pdu_type & 0xf; - - g_next_packet += length; - return rdp_s; -} - -/* used in uiports and rdp_main_loop, processes the rdp packets waiting */ -BOOL rdp_loop(BOOL * deactivated, uint32 * ext_disc_reason) { - uint8 type; - BOOL cont = True; - STREAM s; - - while (cont) { - s = rdp_recv(&type); - - if (s == NULL) - return False; - switch (type) { - case RDP_PDU_DEMAND_ACTIVE: - process_demand_active(s); - *deactivated = False; - break; - case RDP_PDU_DEACTIVATE: - DEBUG(("RDP_PDU_DEACTIVATE\n")); - *deactivated = True; - break; - case RDP_PDU_REDIRECT: - break; - case RDP_PDU_DATA: - process_data_pdu(s, ext_disc_reason); - break; - case 0: - break; - default: - unimpl("PDU %d\n", type); - } - cont = g_next_packet < s->end; - } - return True; -} - -/* Process incoming packets */ -int32_t rdp_main_loop(BOOL * deactivated, uint32 * ext_disc_reason) { - while (rdp_loop(deactivated, ext_disc_reason)) { - if (login_result != LOGIN_UNKN) { - return login_result; - } - } - return 0; -} - - - -/* Parse a logon info packet */ -static void rdp_send_logon_info(uint32 flags, char *domain, char *user, char *password, char *program, char *directory) { - char *ipaddr = tcp_get_address(); - int32_t len_domain = 2 * strlen(domain); - int32_t len_user = 2 * strlen(user); - int32_t len_password = 2 * strlen(password); - int32_t len_program = 2 * strlen(program); - int32_t len_directory = 2 * strlen(directory); - int32_t len_ip = 2 * strlen(ipaddr); - int32_t len_dll = 2 * strlen("C:\\WINNT\\System32\\mstscax.dll"); - int32_t packetlen = 0; - uint32 sec_flags = g_encryption ? (SEC_LOGON_INFO | SEC_ENCRYPT) : SEC_LOGON_INFO; - STREAM s = NULL; - time_t t = time(NULL); - time_t tzone; - uint8 security_verifier[16]; - - if (!g_use_rdp5 || 1 == g_server_rdp_version) { - DEBUG_RDP5(("Sending RDP4-style Logon packet\n")); - - s = sec_init(sec_flags, 18 + len_domain + len_user + len_password + len_program + len_directory + 10); - - out_uint32(s, 0); - out_uint32_le(s, flags); - out_uint16_le(s, len_domain); - out_uint16_le(s, len_user); - out_uint16_le(s, len_password); - out_uint16_le(s, len_program); - out_uint16_le(s, len_directory); - rdp_out_unistr(s, domain, len_domain); - rdp_out_unistr(s, user, len_user); - rdp_out_unistr(s, password, len_password); - rdp_out_unistr(s, program, len_program); - rdp_out_unistr(s, directory, len_directory); - } else { - - flags |= RDP_LOGON_BLOB; - DEBUG_RDP5(("Sending RDP5-style Logon packet\n")); - packetlen = 4 + /* Unknown uint32 */ - 4 + /* flags */ - 2 + /* len_domain */ - 2 + /* len_user */ - (flags & RDP_LOGON_AUTO ? 2 : 0) + /* len_password */ - (flags & RDP_LOGON_BLOB && !(flags & RDP_LOGON_AUTO) ? 2 : 0) + /* Length of BLOB */ - 2 + /* len_program */ - 2 + /* len_directory */ - (0 < len_domain ? len_domain : 2) + /* domain */ - len_user + /* len user */ - (flags & RDP_LOGON_AUTO ? len_password : 0) + /* len pass */ - 0 + /* We have no 512 byte BLOB. Perhaps we must? */ - (flags & RDP_LOGON_BLOB && !(flags & RDP_LOGON_AUTO) ? 2 : 0) + /* After the BLOB is a unknown int16. If there is a BLOB, that is. */ - (0 < len_program ? len_program : 2) + /* program */ - (0 < len_directory ? len_directory : 2) + /* dir */ - 2 + /* Unknown (2) */ - 2 + /* Client ip length */ - len_ip + /* Client ip */ - 2 + /* DLL string length */ - len_dll + /* DLL string */ - 4 + /* zone */ - strlen("GTB, normaltid") * 2 + /* zonestring */ - 1 + /* len */ - 5 * 4 + /* some int32 */ - 2 * strlen("GTB, sommartid") + /* zonestring */ - 1 + /* len */ - 5 * 4 + /* some int32 */ - 2 * 4 + /* some int32 */ - (g_has_reconnect_random ? 14 + sizeof(security_verifier) : 2) + 105 + /* ??? we need this */ - 0; // end -//printf("pl: %d - flags %d - AUTO %d - BLOB %d\n", packetlen, flags, RDP_LOGON_AUTO, RDP_LOGON_BLOB); - - s = sec_init(sec_flags, packetlen); - DEBUG_RDP5(("Called sec_init with packetlen %d\n", packetlen)); - - out_uint32(s, 0); /* Unknown */ - out_uint32_le(s, flags); - out_uint16_le(s, len_domain); - out_uint16_le(s, len_user); - if (flags & RDP_LOGON_AUTO) { - out_uint16_le(s, len_password); - } - if (flags & RDP_LOGON_BLOB && !(flags & RDP_LOGON_AUTO)) { - out_uint16_le(s, 0); - } - out_uint16_le(s, len_program); - out_uint16_le(s, len_directory); - if (0 < len_domain) - rdp_out_unistr(s, domain, len_domain); - else - out_uint16_le(s, 0); - rdp_out_unistr(s, user, len_user); - if (flags & RDP_LOGON_AUTO) { - rdp_out_unistr(s, password, len_password); - } - if (flags & RDP_LOGON_BLOB && !(flags & RDP_LOGON_AUTO)) { - out_uint16_le(s, 0); - } - if (0 < len_program) { - rdp_out_unistr(s, program, len_program); - } else { - out_uint16_le(s, 0); - } - if (0 < len_directory) { - rdp_out_unistr(s, directory, len_directory); - } else { - out_uint16_le(s, 0); - } - /* TS_EXTENDED_INFO_PACKET */ - out_uint16_le(s, 2); /* clientAddressFamily = AF_INET */ - out_uint16_le(s, len_ip + 2); /* cbClientAddress, Length of client ip */ - rdp_out_unistr(s, ipaddr, len_ip); /* clientAddress */ - out_uint16_le(s, len_dll + 2); /* cbClientDir */ - rdp_out_unistr(s, "C:\\WINNT\\System32\\mstscax.dll", len_dll); /* clientDir */ - - /* TS_TIME_ZONE_INFORMATION */ - tzone = (mktime(gmtime(&t)) - mktime(localtime(&t))) / 60; - out_uint32_le(s, tzone); - rdp_out_unistr(s, "GTB, normaltid", 2 * strlen("GTB, normaltid")); - out_uint8s(s, 62 - 2 * strlen("GTB, normaltid")); - out_uint32_le(s, 0x0a0000); - out_uint32_le(s, 0x050000); - out_uint32_le(s, 3); - out_uint32_le(s, 0); - out_uint32_le(s, 0); - rdp_out_unistr(s, "GTB, sommartid", 2 * strlen("GTB, sommartid")); - out_uint8s(s, 62 - 2 * strlen("GTB, sommartid")); - out_uint32_le(s, 0x30000); - out_uint32_le(s, 0x050000); - out_uint32_le(s, 2); - out_uint32(s, 0); - out_uint32_le(s, 0xffffffc4); /* DaylightBias */ - - /* Rest of TS_EXTENDED_INFO_PACKET */ - out_uint32_le(s, 0xfffffffe); /* clientSessionId, consider changing to 0 */ - out_uint32_le(s, g_rdp5_performanceflags); - - /* Client Auto-Reconnect */ - if (g_has_reconnect_random) { - out_uint16_le(s, 28); /* cbAutoReconnectLen */ - /* ARC_CS_PRIVATE_PACKET */ - out_uint32_le(s, 28); /* cbLen */ - out_uint32_le(s, 1); /* Version */ - out_uint32_le(s, g_reconnect_logonid); /* LogonId */ - ssl_hmac_md5(g_reconnect_random, sizeof(g_reconnect_random), g_client_random, SEC_RANDOM_SIZE, security_verifier); - out_uint8a(s, security_verifier, sizeof(security_verifier)); - } else { - out_uint16_le(s, 0); /* cbAutoReconnectLen */ - } - - } - s_mark_end(s); - sec_send(s, sec_flags); -} - -/* Establish a connection up to the RDP layer */ -BOOL rdp_connect(char *server, uint32 flags, char *domain, char *login, char *password, char *command, char *directory, BOOL reconnect) { - - if (!sec_connect(server, login, reconnect)) - return False; - - rdp_send_logon_info(flags, domain, login, password, command, directory); - return True; -} - -int32_t start_rdp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +#include +freerdp * instance; +BOOL rdp_connect(char *server, int32_t port, char *domain, char *login, char *password) { + instance->settings->Username = login; + instance->settings->Password = password; + int32_t ret = 0; + instance->settings->IgnoreCertificate = TRUE; + instance->settings->AuthenticationOnly = TRUE; + instance->settings->ServerHostname = server; + instance->settings->ServerPort = port; + instance->settings->Domain = domain; + ret = freerdp_connect(instance); + return ret==1? True : False; +} + +/* Client program */ +int32_t start_rdp(char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *login, *pass; char server[64]; char domain[256]; - char shell[256]; - char directory[256]; - BOOL deactivated = 0; - uint32 flags, ext_disc_reason = 0; - - flags = RDP_LOGON_NORMAL; - flags |= RDP_LOGON_AUTO; - - os_version = 0; - g_redirect = False; - g_redirect_flags = 0; - login_result = LOGIN_UNKN; - - shell[0] = directory[0] = 0; + + BOOL login_result = False; memset(domain, 0, sizeof(domain)); if (strlen(login = hydra_get_next_login()) == 0) @@ -2465,27 +80,28 @@ int32_t start_rdp(int32_t s, char *ip, int32_t port, unsigned char options, char domain[sizeof(domain) - 1] = 0; } - if (!rdp_connect(server, flags, domain, login, pass, shell, directory, g_redirect)) + login_result = rdp_connect(server, port, domain, login, pass); + + int x = 0; + x = freerdp_get_last_error(instance->context); + int err = freerdp_get_last_error(instance->context); + if ( err != 0 && err != 0x00020014) { //0x00020014 == logon failed return 3; + } - rdp_main_loop(&deactivated, &ext_disc_reason); - - if (login_result == LOGIN_SUCC) { + if (login_result == True) { hydra_report_found_host(port, ip, "rdp", fp); hydra_completed_pair_found(); } else { hydra_completed_pair(); } - rdp_disconnect(); - if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) return 2; return 1; } -/* Client program */ void service_rdp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1; int32_t myport = PORT_RDP; @@ -2496,25 +112,18 @@ void service_rdp(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) return; - while (1) { next_run = 0; switch (run) { case 1: /* run the cracking function */ - rdesktop_reset_state(); - g_sock = hydra_connect_tcp(ip, myport); - if (g_sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); - hydra_child_exit(1); - } - next_run = start_rdp(g_sock, ip, port, options, miscptr, fp); + next_run = start_rdp(ip, port, options, miscptr, fp); break; case 2: /* clean exit */ - if (g_sock >= 0) - rdp_disconnect(); + freerdp_disconnect(instance); hydra_child_exit(0); return; case 3: /* connection error case */ + hydra_report(stderr, "[ERROR] freerdp: %s\n", freerdp_get_last_error_string(freerdp_get_last_error(instance->context))); hydra_child_exit(1); return; default: @@ -2525,717 +134,6 @@ void service_rdp(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL } } -/* Generate a 32-byte random for the secure transport code. */ -void generate_random(uint8 * random) { - struct stat st; - struct tms tmsbuf; - SSL_MD5 md5; - uint32 *r; - int32_t fd, n; - - /* If we have a kernel random device, try that first */ - if (((fd = open("/dev/urandom", O_RDONLY)) != -1) - || ((fd = open("/dev/random", O_RDONLY)) != -1)) { - n = read(fd, random, 32); - close(fd); - if (n == 32) - return; - } - - r = (uint32 *) random; - r[0] = (getpid()) | (getppid() << 16); - r[1] = (getuid()) | (getgid() << 16); - r[2] = times(&tmsbuf); /* system uptime (clocks) */ - gettimeofday((struct timeval *) &r[3], NULL); /* sec and usec */ - stat("/tmp", &st); - r[5] = st.st_atime; - r[6] = st.st_mtime; - r[7] = st.st_ctime; - - /* Hash both halves with MD5 to obscure possible patterns */ - ssl_md5_init(&md5); - ssl_md5_update(&md5, random, 16); - ssl_md5_final(&md5, random); - ssl_md5_update(&md5, random + 16, 16); - ssl_md5_final(&md5, random + 16); -} - -/* malloc; exit if out of memory */ -void *xmalloc(int32_t size) { - void *mem = malloc(size); - - if (mem == NULL) { - error("xmalloc %d\n", size); - return NULL; - } - return mem; -} - -/* strdup */ -char *xstrdup(const char *s) { - char *mem = strdup(s); - - if (mem == NULL) { - perror("strdup"); - return NULL; - } - return mem; -} - -/* realloc; exit if out of memory */ -void *xrealloc(void *oldmem, size_t size) { - void *mem; - - if (size == 0) - size = 1; -//printf("---? %p %d\n", oldmem, size); - mem = realloc(oldmem, size); -//printf("---!\n"); - if (mem == NULL) { - error("xrealloc %ld\n", size); - return NULL; - } - return mem; -} - -/* report an error */ -void error(char *format, ...) { - va_list ap; - - fprintf(stderr, "[ERROR]: "); - - va_start(ap, format); - hydra_report(stderr, format, ap); - va_end(ap); -} - -/* report a warning */ -void warning(char *format, ...) { - if (verbose) { - va_list ap; - - fprintf(stderr, "[VERBOSE]: "); - - va_start(ap, format); - hydra_report(stderr, format, ap); - va_end(ap); - } -} - -/* report an unimplemented protocol feature */ -void unimpl(char *format, ...) { - if (debug) { - va_list ap; - - fprintf(stderr, "[DEBUG] not implemented: "); - - va_start(ap, format); - hydra_report(stderr, format, ap); - va_end(ap); - } -} - -/* produce a hex dump */ -void hexdump(unsigned char *p, uint32_t len) { - unsigned char *line = p; - int32_t i, thisline, offset = 0; - - while (offset < len) { - printf("%04x ", offset); - thisline = len - offset; - if (thisline > 16) - thisline = 16; - - for (i = 0; i < thisline; i++) - printf("%02x ", line[i]); - - for (; i < 16; i++) - printf(" "); - - for (i = 0; i < thisline; i++) - printf("%c", (line[i] >= 0x20 && line[i] < 0x7f) ? line[i] : '.'); - - printf("\n"); - offset += thisline; - line += thisline; - } -} - -/* Initialise an RDP data packet */ -static STREAM rdp_init_data(int32_t maxlen) { - STREAM s; - - s = sec_init(g_encryption ? SEC_ENCRYPT : 0, maxlen + 18); - s_push_layer(s, rdp_hdr, 18); - - return s; -} - -/* Send an RDP data packet */ -static void rdp_send_data(STREAM s, uint8 data_pdu_type) { - uint16 length; - - s_pop_layer(s, rdp_hdr); - length = s->end - s->p; - - out_uint16_le(s, length); - out_uint16_le(s, (RDP_PDU_DATA | 0x10)); - out_uint16_le(s, (g_mcs_userid + 1001)); - - out_uint32_le(s, g_rdp_shareid); - out_uint8(s, 0); /* pad */ - out_uint8(s, 1); /* streamid */ - out_uint16_le(s, (length - 14)); - out_uint8(s, data_pdu_type); - out_uint8(s, 0); /* compress_type */ - out_uint16(s, 0); /* compress_len */ - - sec_send(s, g_encryption ? SEC_ENCRYPT : 0); -} - -/* Input a string in Unicode - * - * Returns str_len of string - */ -int32_t rdp_in_unistr(STREAM s, char *string, int32_t str_size, int32_t in_len) { - int32_t i = 0; - int32_t len = in_len / 2; - int32_t rem = 0; - - if (len > str_size - 1) { - warning("server sent an unexpectedly long string, truncating\n"); - len = str_size - 1; - rem = in_len - 2 * len; - } - - while (i < len) { - in_uint8a(s, &string[i++], 1); - in_uint8s(s, 1); - } - - in_uint8s(s, rem); - string[len] = 0; - return len; -} - -/* Send a control PDU */ -static void rdp_send_control(uint16 action) { - STREAM s; - - s = rdp_init_data(8); - - out_uint16_le(s, action); - out_uint16(s, 0); /* userid */ - out_uint32(s, 0); /* control id */ - - s_mark_end(s); - rdp_send_data(s, RDP_DATA_PDU_CONTROL); -} - -/* Send a synchronisation PDU */ -static void rdp_send_synchronise(void) { - STREAM s; - - s = rdp_init_data(4); - out_uint16_le(s, 1); /* type */ - out_uint16_le(s, 1002); - - s_mark_end(s); - rdp_send_data(s, RDP_DATA_PDU_SYNCHRONISE); -} - -/* Send a single input event */ -void rdp_send_input(uint32 time, uint16 message_type, uint16 device_flags, uint16 param1, uint16 param2) { - STREAM s; - - switch (message_type) { - case RDP_INPUT_MOUSE: - rdp_send_fast_input_mouse(time, device_flags, param1, param2); - break; - case RDP_INPUT_SCANCODE: - rdp_send_fast_input_kbd(time, device_flags, param1); - break; - default: - s = rdp_init_data(16); - out_uint16_le(s, 1); /* number of events */ - out_uint16(s, 0); /* pad */ - out_uint32_le(s, time); - out_uint16_le(s, message_type); - out_uint16_le(s, device_flags); - out_uint16_le(s, param1); - out_uint16_le(s, param2); - s_mark_end(s); - rdp_send_data(s, RDP_DATA_PDU_INPUT); - } -} - -/* Send an (empty) font information PDU */ -static void rdp_send_fonts(uint16 seq) { - STREAM s; - - s = rdp_init_data(8); - - out_uint16(s, 0); /* number of fonts */ - out_uint16_le(s, 0); /* pad? */ - out_uint16_le(s, seq); /* unknown */ - out_uint16_le(s, 0x32); /* entry size */ - - s_mark_end(s); - rdp_send_data(s, RDP_DATA_PDU_FONT2); -} - -/* Output general capability set */ -static void rdp_out_general_caps(STREAM s) { - out_uint16_le(s, RDP_CAPSET_GENERAL); - out_uint16_le(s, RDP_CAPLEN_GENERAL); - out_uint16_le(s, 1); /* OS major type */ - out_uint16_le(s, 3); /* OS minor type */ - out_uint16_le(s, 0x200); /* Protocol version */ - out_uint16(s, 0); /* Pad */ - out_uint16(s, 0); /* Compression types */ - out_uint16_le(s, g_use_rdp5 ? 0x40d : 0); - /* Pad, according to T.128. 0x40d seems to - trigger - the server to start sending RDP5 packets. - However, the value is 0x1d04 with W2KTSK and - NT4MS. Hmm.. Anyway, thankyou, Microsoft, - for sending such information in a padding - field.. */ - out_uint16(s, 0); /* Update capability */ - out_uint16(s, 0); /* Remote unshare capability */ - out_uint16(s, 0); /* Compression level */ - out_uint16(s, 0); /* Pad */ -} - -/* Output bitmap capability set */ -static void rdp_out_bitmap_caps(STREAM s) { - out_uint16_le(s, RDP_CAPSET_BITMAP); - out_uint16_le(s, RDP_CAPLEN_BITMAP); - out_uint16_le(s, g_server_depth); /* Preferred colour depth */ - out_uint16_le(s, 1); /* Receive 1 BPP */ - out_uint16_le(s, 1); /* Receive 4 BPP */ - out_uint16_le(s, 1); /* Receive 8 BPP */ - out_uint16_le(s, 800); /* Desktop width */ - out_uint16_le(s, 600); /* Desktop height */ - out_uint16(s, 0); /* Pad */ - out_uint16(s, 1); /* Allow resize */ - out_uint16_le(s, g_bitmap_compression ? 1 : 0); /* Support compression */ - out_uint16(s, 0); /* Unknown */ - out_uint16_le(s, 1); /* Unknown */ - out_uint16(s, 0); /* Pad */ -} - -/* Output order capability set */ -static void rdp_out_order_caps(STREAM s) { - uint8 order_caps[32]; - - memset(order_caps, 0, 32); - order_caps[0] = 1; /* dest blt */ - order_caps[1] = 1; /* pat blt */ - order_caps[2] = 1; /* screen blt */ - order_caps[3] = (g_bitmap_cache ? 1 : 0); /* memblt */ - order_caps[4] = 0; /* triblt */ - order_caps[8] = 1; /* line */ - order_caps[9] = 1; /* line */ - order_caps[10] = 1; /* rect */ - order_caps[11] = (g_desktop_save ? 1 : 0); /* desksave */ - order_caps[13] = 1; /* memblt */ - order_caps[14] = 1; /* triblt */ - order_caps[20] = 1; /* polygon */ - order_caps[21] = 1; /* polygon2 */ - order_caps[22] = 1; /* polyline */ - order_caps[25] = 1; /* ellipse */ - order_caps[26] = 1; /* ellipse2 */ - order_caps[27] = 1; /* text2 */ - out_uint16_le(s, RDP_CAPSET_ORDER); - out_uint16_le(s, RDP_CAPLEN_ORDER); - - out_uint8s(s, 20); /* Terminal desc, pad */ - out_uint16_le(s, 1); /* Cache X granularity */ - out_uint16_le(s, 20); /* Cache Y granularity */ - out_uint16(s, 0); /* Pad */ - out_uint16_le(s, 1); /* Max order level */ - out_uint16_le(s, 0x147); /* Number of fonts */ - out_uint16_le(s, 0x2a); /* Capability flags */ - out_uint8p(s, order_caps, 32); /* Orders supported */ - out_uint16_le(s, 0x6a1); /* Text capability flags */ - out_uint8s(s, 6); /* Pad */ - out_uint32_le(s, g_desktop_save == False ? 0 : 0x38400); /* Desktop cache size */ - out_uint32(s, 0); /* Unknown */ - out_uint32_le(s, 0x4e4); /* Unknown */ -} - -/* Output bitmap cache capability set */ -static void rdp_out_bmpcache_caps(STREAM s) { - int32_t Bpp; - - out_uint16_le(s, RDP_CAPSET_BMPCACHE); - out_uint16_le(s, RDP_CAPLEN_BMPCACHE); - Bpp = (g_server_depth + 7) / 8; /* bytes per pixel */ - out_uint8s(s, 24); /* unused */ - out_uint16_le(s, 0x258); /* entries */ - out_uint16_le(s, 0x100 * Bpp); /* max cell size */ - out_uint16_le(s, 0x12c); /* entries */ - out_uint16_le(s, 0x400 * Bpp); /* max cell size */ - out_uint16_le(s, 0x106); /* entries */ - out_uint16_le(s, 0x1000 * Bpp); /* max cell size */ -} - -/* Output bitmap cache v2 capability set */ -static void rdp_out_bmpcache2_caps(STREAM s) { - out_uint16_le(s, RDP_CAPSET_BMPCACHE2); - out_uint16_le(s, RDP_CAPLEN_BMPCACHE2); - out_uint16_le(s, g_bitmap_cache_persist_enable ? 2 : 0); /* version */ - out_uint16_be(s, 3); /* number of caches in this set */ - - /* max cell size for cache 0 is 16x16, 1 = 32x32, 2 = 64x64, etc */ - out_uint32_le(s, BMPCACHE2_C0_CELLS); - out_uint32_le(s, BMPCACHE2_C1_CELLS); - out_uint32_le(s, BMPCACHE2_C2_CELLS); - out_uint8s(s, 20); /* other bitmap caches not used */ -} - -/* Output control capability set */ -static void rdp_out_control_caps(STREAM s) { - out_uint16_le(s, RDP_CAPSET_CONTROL); - out_uint16_le(s, RDP_CAPLEN_CONTROL); - out_uint16(s, 0); /* Control capabilities */ - out_uint16(s, 0); /* Remote detach */ - out_uint16_le(s, 2); /* Control interest */ - out_uint16_le(s, 2); /* Detach interest */ -} - -/* Output activation capability set */ -static void rdp_out_activate_caps(STREAM s) { - out_uint16_le(s, RDP_CAPSET_ACTIVATE); - out_uint16_le(s, RDP_CAPLEN_ACTIVATE); - out_uint16(s, 0); /* Help key */ - out_uint16(s, 0); /* Help index key */ - out_uint16(s, 0); /* Extended help key */ - out_uint16(s, 0); /* Window activate */ -} - -/* Output pointer capability set */ -static void rdp_out_pointer_caps(STREAM s) { - out_uint16_le(s, RDP_CAPSET_POINTER); - out_uint16_le(s, RDP_CAPLEN_POINTER); - out_uint16(s, 0); /* Colour pointer */ - out_uint16_le(s, 20); /* Cache size */ -} - -/* Output new pointer capability set */ -static void rdp_out_newpointer_caps(STREAM s) { - out_uint16_le(s, RDP_CAPSET_POINTER); - out_uint16_le(s, RDP_CAPLEN_NEWPOINTER); - out_uint16_le(s, 1); /* Colour pointer */ - out_uint16_le(s, 20); /* Cache size */ - out_uint16_le(s, 20); /* Cache size for new pointers */ -} - -/* Output share capability set */ -static void rdp_out_share_caps(STREAM s) { - out_uint16_le(s, RDP_CAPSET_SHARE); - out_uint16_le(s, RDP_CAPLEN_SHARE); - out_uint16(s, 0); /* userid */ - out_uint16(s, 0); /* pad */ -} - -/* Output colour cache capability set */ -static void rdp_out_colcache_caps(STREAM s) { - out_uint16_le(s, RDP_CAPSET_COLCACHE); - out_uint16_le(s, RDP_CAPLEN_COLCACHE); - out_uint16_le(s, 6); /* cache size */ - out_uint16(s, 0); /* pad */ -} - -/* Output brush cache capability set */ -static void rdp_out_brushcache_caps(STREAM s) { - out_uint16_le(s, RDP_CAPSET_BRUSHCACHE); - out_uint16_le(s, RDP_CAPLEN_BRUSHCACHE); - out_uint32_le(s, 1); /* cache type */ -} - -static uint8 caps_0x0d[] = { - 0x01, 0x00, 0x00, 0x00, 0x09, 0x04, 0x00, 0x00, - 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x0C, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00 -}; - -static uint8 caps_0x0c[] = { 0x01, 0x00, 0x00, 0x00 }; - -static uint8 caps_0x0e[] = { 0x01, 0x00, 0x00, 0x00 }; - -static uint8 caps_0x10[] = { - 0xFE, 0x00, 0x04, 0x00, 0xFE, 0x00, 0x04, 0x00, - 0xFE, 0x00, 0x08, 0x00, 0xFE, 0x00, 0x08, 0x00, - 0xFE, 0x00, 0x10, 0x00, 0xFE, 0x00, 0x20, 0x00, - 0xFE, 0x00, 0x40, 0x00, 0xFE, 0x00, 0x80, 0x00, - 0xFE, 0x00, 0x00, 0x01, 0x40, 0x00, 0x00, 0x08, - 0x00, 0x01, 0x00, 0x01, 0x02, 0x00, 0x00, 0x00 -}; - -/* Output unknown capability sets */ -static void rdp_out_unknown_caps(STREAM s, uint16 id, uint16 length, uint8 * caps) { - out_uint16_le(s, id); - out_uint16_le(s, length); - out_uint8p(s, caps, length - 4); -} - -#define RDP5_FLAG 0x0030 - -/* Send a confirm active PDU */ -static void rdp_send_confirm_active(void) { - STREAM s; - uint32 sec_flags = g_encryption ? (RDP5_FLAG | SEC_ENCRYPT) : RDP5_FLAG; - uint16 caplen = - RDP_CAPLEN_GENERAL + RDP_CAPLEN_BITMAP + RDP_CAPLEN_ORDER + - RDP_CAPLEN_COLCACHE + RDP_CAPLEN_ACTIVATE + RDP_CAPLEN_CONTROL + RDP_CAPLEN_SHARE + RDP_CAPLEN_BRUSHCACHE + 0x58 + 0x08 + 0x08 + 0x34 /* unknown caps */ + - 4 /* w2k fix, sessionid */ ; - - if (g_use_rdp5) { - caplen += RDP_CAPLEN_BMPCACHE2; - caplen += RDP_CAPLEN_NEWPOINTER; - } else { - caplen += RDP_CAPLEN_BMPCACHE; - caplen += RDP_CAPLEN_POINTER; - } - - s = sec_init(sec_flags, 6 + 14 + caplen + sizeof(RDP_SOURCE)); - - out_uint16_le(s, 2 + 14 + caplen + sizeof(RDP_SOURCE)); - out_uint16_le(s, (RDP_PDU_CONFIRM_ACTIVE | 0x10)); /* Version 1 */ - out_uint16_le(s, (g_mcs_userid + 1001)); - - out_uint32_le(s, g_rdp_shareid); - out_uint16_le(s, 0x3ea); /* userid */ - out_uint16_le(s, sizeof(RDP_SOURCE)); - out_uint16_le(s, caplen); - - out_uint8p(s, RDP_SOURCE, sizeof(RDP_SOURCE)); - out_uint16_le(s, 0xe); /* num_caps */ - out_uint8s(s, 2); /* pad */ - - rdp_out_general_caps(s); - rdp_out_bitmap_caps(s); - rdp_out_order_caps(s); - if (g_use_rdp5) { - rdp_out_bmpcache2_caps(s); - rdp_out_newpointer_caps(s); - } else { - rdp_out_bmpcache_caps(s); - rdp_out_pointer_caps(s); - } - - rdp_out_colcache_caps(s); - rdp_out_activate_caps(s); - rdp_out_control_caps(s); - rdp_out_share_caps(s); - rdp_out_brushcache_caps(s); - - rdp_out_unknown_caps(s, 0x0d, 0x58, caps_0x0d); /* CAPSTYPE_INPUT */ - rdp_out_unknown_caps(s, 0x0c, 0x08, caps_0x0c); /* CAPSTYPE_SOUND */ - rdp_out_unknown_caps(s, 0x0e, 0x08, caps_0x0e); /* CAPSTYPE_FONT */ - rdp_out_unknown_caps(s, 0x10, 0x34, caps_0x10); /* CAPSTYPE_GLYPHCACHE */ - - s_mark_end(s); - sec_send(s, sec_flags); -} - -/* Process a general capability set */ -static void rdp_process_general_caps(STREAM s) { - uint16 pad2octetsB; /* rdp5 flags? */ - - in_uint8s(s, 10); - in_uint16_le(s, pad2octetsB); - if (!pad2octetsB) - g_use_rdp5 = False; -} - -/* Process a bitmap capability set */ -static void rdp_process_bitmap_caps(STREAM s) { - uint16 width, height, depth; - - in_uint16_le(s, depth); - in_uint8s(s, 6); - in_uint16_le(s, width); - in_uint16_le(s, height); - DEBUG(("setting desktop size and depth to: %dx%dx%d\n", width, height, depth)); -} - -/* Process server capabilities */ -static void rdp_process_server_caps(STREAM s, uint16 length) { - int32_t n; - uint8 *next, *start; - uint16 ncapsets, capset_type, capset_length; - - start = s->p; - - in_uint16_le(s, ncapsets); - in_uint8s(s, 2); /* pad */ - - for (n = 0; n < ncapsets; n++) { - if (s->p > start + length) - return; - - in_uint16_le(s, capset_type); - in_uint16_le(s, capset_length); - - next = s->p + capset_length - 4; - - switch (capset_type) { - case RDP_CAPSET_GENERAL: - rdp_process_general_caps(s); - break; - - case RDP_CAPSET_BITMAP: - rdp_process_bitmap_caps(s); - break; - } - - s->p = next; - } -} - -/* Respond to a demand active PDU */ -static void process_demand_active(STREAM s) { - uint8 type; - uint16 len_src_descriptor, len_combined_caps; - - in_uint32_le(s, g_rdp_shareid); - in_uint16_le(s, len_src_descriptor); - in_uint16_le(s, len_combined_caps); - in_uint8s(s, len_src_descriptor); - - DEBUG(("DEMAND_ACTIVE(id=0x%x)\n", g_rdp_shareid)); - rdp_process_server_caps(s, len_combined_caps); - - rdp_send_confirm_active(); - rdp_send_synchronise(); - rdp_send_control(RDP_CTL_COOPERATE); - rdp_send_control(RDP_CTL_REQUEST_CONTROL); - rdp_recv(&type); /* RDP_PDU_SYNCHRONIZE */ - rdp_recv(&type); /* RDP_CTL_COOPERATE */ - rdp_recv(&type); /* RDP_CTL_GRANT_CONTROL */ - rdp_send_input(0, 0, 0, 0, 0); /* RDP_INPUT_SYNCHRONIZE */ - // here? XXX TODO BUGFIX - - if (g_use_rdp5) { - rdp_send_fonts(3); - } else { - rdp_send_fonts(1); - rdp_send_fonts(2); - } - - rdp_recv(&type); /* RDP_PDU_UNKNOWN 0x28 (Fonts?) */ - reset_order_state(); -} - -/* Process an update PDU */ -static void process_update_pdu(STREAM s) { - uint16 update_type, count; - - in_uint16_le(s, update_type); - - //ui_begin_update(); - switch (update_type) { - case RDP_UPDATE_ORDERS: - in_uint8s(s, 2); /* pad */ - in_uint16_le(s, count); - in_uint8s(s, 2); /* pad */ - process_orders(s, count); - break; - - case RDP_UPDATE_BITMAP: - //process_bitmap_updates(s); - break; - - case RDP_UPDATE_PALETTE: - //process_palette(s); - break; - - case RDP_UPDATE_SYNCHRONIZE: - break; - - default: - unimpl("update %d\n", update_type); - } -} - - -/* Process a disconnect PDU */ -void process_disconnect_pdu(STREAM s, uint32 * ext_disc_reason) { - in_uint32_le(s, *ext_disc_reason); - - DEBUG(("Received disconnect PDU\n")); -} - -/* Process data PDU */ -static BOOL process_data_pdu(STREAM s, uint32 * ext_disc_reason) { - uint8 data_pdu_type; - //uint8 ctype; - uint16 clen; - //uint32 len; - - in_uint8s(s, 6); /* shareid, pad, streamid */ - //in_uint16_le(s, len); - in_uint8(s, data_pdu_type); - //in_uint8(s, ctype); - in_uint16_le(s, clen); - clen -= 18; - - switch (data_pdu_type) { - case RDP_DATA_PDU_UPDATE: - process_update_pdu(s); - break; - - case RDP_DATA_PDU_CONTROL: - DEBUG(("Received Control PDU\n")); - break; - - case RDP_DATA_PDU_SYNCHRONISE: - DEBUG(("Received Sync PDU\n")); - break; - - case RDP_DATA_PDU_POINTER: - //process_pointer_pdu(s); - break; - - case RDP_DATA_PDU_BELL: - //ui_bell(); - break; - - case RDP_DATA_PDU_LOGON: - DEBUG(("Received Logon PDU\n")); - /* User logged on */ - login_result = LOGIN_SUCC; - return 1; - break; - - case RDP_DATA_PDU_DISCONNECT: - process_disconnect_pdu(s, ext_disc_reason); - - /* We used to return true and disconnect immediately here, but - * Windows Vista sends a disconnect PDU with reason 0 when - * reconnecting to a disconnected session, and MSTSC doesn't - * drop the connection. I think we should just save the status. - */ - break; - - default: - unimpl("data PDU %d\n", data_pdu_type); - } - return False; -} -#endif - int32_t service_rdp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be @@ -3247,9 +145,17 @@ int32_t service_rdp_init(char *ip, int32_t sp, unsigned char options, char *misc // 0 all OK // -1 error, hydra will exit, so print a good error message here + // Disable freerdp output + wLog* root = WLog_GetRoot(); + WLog_SetStringLogLevel(root, "OFF"); + + // Init freerdp instance + instance = freerdp_new(); + freerdp_context_new(instance); return 0; } void usage_rdp(const char* service) { printf("Module rdp is optionally taking the windows domain name.\n" "For example:\nhydra rdp://192.168.0.1/firstdomainname -l john -p doe\n\n"); } +#endif \ No newline at end of file diff --git a/hydra.c b/hydra.c index 0f9de0d..1f27988 100644 --- a/hydra.c +++ b/hydra.c @@ -110,6 +110,8 @@ extern void service_oracle_sid(char *ip, int32_t sp, unsigned char options, char extern int32_t service_oracle_sid_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); extern void service_sip(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); extern int32_t service_sip_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); +#endif +#ifdef LIBFREERDP2 extern void service_rdp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); extern int32_t service_rdp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); #endif @@ -418,7 +420,7 @@ SERVICE3("mongodb", mongodb), #endif SERVICE(redis), SERVICE(rexec), -#ifdef LIBOPENSSL +#ifdef LIBFREERDP2 SERVICE3("rdp", rdp), #endif SERVICE(rlogin), @@ -2150,8 +2152,6 @@ int main(int argc, char *argv[]) { SERVICES = hydra_string_replace(SERVICES, "[-{cram|digest}md5]", ""); // for sip SERVICES = hydra_string_replace(SERVICES, " sip", ""); - // for rdp - SERVICES = hydra_string_replace(SERVICES, " rdp", ""); // for oracle-listener SERVICES = hydra_string_replace(SERVICES, " oracle-listener", ""); // general @@ -2160,6 +2160,12 @@ int main(int argc, char *argv[]) { SERVICES = hydra_string_replace(SERVICES, " oracle-sid", ""); strcat(unsupported, "SSL-services (ftps, sip, rdp, oracle-services, ...) "); #endif + +#ifndef LIBFREERDP2 + // for rdp + SERVICES = hydra_string_replace(SERVICES, " rdp", ""); +#endif + #ifndef HAVE_MATH_H if (strlen(unsupported) > 0) strcat(unsupported, "and "); @@ -2759,10 +2765,15 @@ int main(int argc, char *argv[]) { #endif } if ((strcmp(hydra_options.service, "smb") == 0) || (strcmp(hydra_options.service, "smbnt") == 0) || - (strcmp(hydra_options.service, "sip") == 0) || (strcmp(hydra_options.service, "rdp") == 0) || + (strcmp(hydra_options.service, "sip") == 0) || (strcmp(hydra_options.service, "oracle-listener") == 0) || (strcmp(hydra_options.service, "oracle-sid") == 0)) { #ifndef LIBOPENSSL bail("Compiled without OPENSSL support, module not available!"); +#endif + } + if (strcmp(hydra_options.service, "rdp") == 0){ +#ifndef LIBFREERDP2 + bail("Compiled without FREERDP2 support, module not available!"); #endif } if (strcmp(hydra_options.service, "pcnfs") == 0) { @@ -3061,17 +3072,16 @@ int main(int argc, char *argv[]) { if (strcmp(hydra_options.service, "irc") == 0) i = 1; if (strcmp(hydra_options.service, "rdp") == 0) { - //if (hydra_options.tasks > 4) - // fprintf(stderr, "[WARNING] rdp servers often don't like many connections, use -t 1 or -t 4 to reduce the number of parallel connections and -W 1 or -W 3 to wait between connection to allow the server to recover\n"); - //if (hydra_options.tasks > 4) { - // fprintf(stderr, "[INFO] Reduced number of tasks to 4 (rdp does not like many parallel connections)\n"); - // hydra_options.tasks = 4; - //} - //if (conwait == 0) - // hydra_options.conwait = conwait = 1; - //printf("[WARNING] the rdp module is currently reported to be unreliable, most likely against new Windows version. Please test, report - and if possible, fix.\n"); - printf("[ERROR] the rdp module does not support the current protocol, hence it is disabled. If you want to develop it, please contact vh@thc.org\n"); - exit(-1); + if (hydra_options.tasks > 4) + fprintf(stderr, "[WARNING] rdp servers often don't like many connections, use -t 1 or -t 4 to reduce the number of parallel connections and -W 1 or -W 3 to wait between connection to allow the server to recover\n"); + if (hydra_options.tasks > 4) { + fprintf(stderr, "[INFO] Reduced number of tasks to 4 (rdp does not like many parallel connections)\n"); + hydra_options.tasks = 4; + } + if (conwait == 0) + hydra_options.conwait = conwait = 1; + printf("[WARNING] the rdp module is experimental. Please test, report - and if possible, fix.\n"); + i = 1; } if (strcmp(hydra_options.service, "radmin2") == 0) { #ifdef HAVE_GCRYPT From c06685c308e28d92a5b3105866d04f8eeca0a6eb Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Thu, 25 Apr 2019 15:02:04 +0800 Subject: [PATCH 184/531] Clean the code and handle more freerdp error code --- hydra-rdp.c | 103 +++++++++++++++++++++++----------------------------- 1 file changed, 45 insertions(+), 58 deletions(-) diff --git a/hydra-rdp.c b/hydra-rdp.c index cfa2e12..69feee5 100644 --- a/hydra-rdp.c +++ b/hydra-rdp.c @@ -1,37 +1,10 @@ /* - david: this module is heavily based on rdesktop v 1.7.0 - - rdesktop: A Remote Desktop Protocol client. - Protocol services - RDP layer - Copyright (C) Matthew Chapman 1999-2008 - Copyright 2003-2011 Peter Astrand for Cendio AB - - This program is free software: you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation, either version 3 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program. If not, see . - -note: - -this module was tested on w2k, xp, w2k3, w2k8 - -in terminal services configuration, in rdp-tcp properties -in Logon Settings tab, if 'Always prompt for password' is checked, -the password can't be passed interactively so there is no way -to test the credential (unless manually). - -it's advised to lower the number of parallel tasks as RDP server -can't handle multiple connections at the same time. -It's particularly true on windows XP - + This module is using freerdp2 lib + + Tested on: + - Windows 7 pro SP1 + - Windows 10 pro build 1809 + - Windows Server 2016 build 1607 */ #include "hydra-mod.h" @@ -44,18 +17,20 @@ void dummy_rdp() { #else #include -freerdp * instance; +freerdp * instance = 0; BOOL rdp_connect(char *server, int32_t port, char *domain, char *login, char *password) { + int32_t err = 0; + instance->settings->Username = login; instance->settings->Password = password; - int32_t ret = 0; instance->settings->IgnoreCertificate = TRUE; instance->settings->AuthenticationOnly = TRUE; instance->settings->ServerHostname = server; instance->settings->ServerPort = port; instance->settings->Domain = domain; - ret = freerdp_connect(instance); - return ret==1? True : False; + freerdp_connect(instance); + err = freerdp_get_last_error(instance->context); + return err; } /* Client program */ @@ -64,8 +39,8 @@ int32_t start_rdp(char *ip, int32_t port, unsigned char options, char *miscptr, char *login, *pass; char server[64]; char domain[256]; - - BOOL login_result = False; + int32_t login_result = 0; + memset(domain, 0, sizeof(domain)); if (strlen(login = hydra_get_next_login()) == 0) @@ -81,25 +56,33 @@ int32_t start_rdp(char *ip, int32_t port, unsigned char options, char *miscptr, } login_result = rdp_connect(server, port, domain, login, pass); - - int x = 0; - x = freerdp_get_last_error(instance->context); - int err = freerdp_get_last_error(instance->context); - if ( err != 0 && err != 0x00020014) { //0x00020014 == logon failed - return 3; + switch(login_result){ + case 0: + // login success + hydra_report_found_host(port, ip, "rdp", fp); + hydra_completed_pair_found(); + break; + case 0x00020009: + case 0x00020014: + case 0x00020015: + // login failure + hydra_completed_pair(); + break; + case 0x00020006: + case 0x00020008: + case 0x0002000c: + case 0x0002000d: + // cannot establish rdp connection, either the port is not opened or it's not rdp + return 3; + default: + if (verbose) { + hydra_report(stderr, "[ERROR] freerdp: %s (0x%.8x)\n", freerdp_get_last_error_string(login_result), login_result); + } + return login_result; } - - if (login_result == True) { - hydra_report_found_host(port, ip, "rdp", fp); - hydra_completed_pair_found(); - } else { - hydra_completed_pair(); - } - if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) return 2; return 1; - } void service_rdp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { @@ -120,14 +103,15 @@ void service_rdp(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL break; case 2: /* clean exit */ freerdp_disconnect(instance); + freerdp_free(instance); hydra_child_exit(0); return; case 3: /* connection error case */ - hydra_report(stderr, "[ERROR] freerdp: %s\n", freerdp_get_last_error_string(freerdp_get_last_error(instance->context))); + hydra_report(stderr, "[ERROR] freerdp: %s\n", "The connection failed to establish."); + freerdp_free(instance); hydra_child_exit(1); return; default: - hydra_report(stderr, "[ERROR] Caught unknown return code, exiting!\n"); hydra_child_exit(2); } run = next_run; @@ -151,11 +135,14 @@ int32_t service_rdp_init(char *ip, int32_t sp, unsigned char options, char *misc // Init freerdp instance instance = freerdp_new(); - freerdp_context_new(instance); + if (instance == NULL || freerdp_context_new(instance) == FALSE) { + hydra_report(stderr, "[ERROR] freerdp init failed\n"); + return -1; + } return 0; } void usage_rdp(const char* service) { printf("Module rdp is optionally taking the windows domain name.\n" "For example:\nhydra rdp://192.168.0.1/firstdomainname -l john -p doe\n\n"); } -#endif \ No newline at end of file +#endif From 0fa7a484b390357adbb1872d2fcd71c4fc7853ba Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Thu, 25 Apr 2019 22:16:32 +0800 Subject: [PATCH 185/531] Add ref to rdp module change --- CHANGES | 1 + 1 file changed, 1 insertion(+) diff --git a/CHANGES b/CHANGES index 4e2cab1..30c71a9 100644 --- a/CHANGES +++ b/CHANGES @@ -3,6 +3,7 @@ Changelog for hydra Release 8.9-dev * your patch? :) +* Revamped rdp module to use FreeRDP library (thanks to loianhtuan@github for the patch) * Fixed svn module memory leaks * Fixed rtsp module potential buffer overflow * Fixed http module DIGEST-MD5 mode From e82e395dadd03efe3f7c4b35fdc8d6d1780492bd Mon Sep 17 00:00:00 2001 From: van Hauser Date: Fri, 26 Apr 2019 14:28:40 +0200 Subject: [PATCH 186/531] Changelog update and compiler warning fix --- CHANGES | 3 ++- hydra-mod.c | 2 +- 2 files changed, 3 insertions(+), 2 deletions(-) diff --git a/CHANGES b/CHANGES index 30c71a9..e7a85e0 100644 --- a/CHANGES +++ b/CHANGES @@ -3,7 +3,8 @@ Changelog for hydra Release 8.9-dev * your patch? :) -* Revamped rdp module to use FreeRDP library (thanks to loianhtuan@github for the patch) +* Revamped rdp module to use FreeRDP library (thanks to loianhtuan@github for the patch!) +* JSON output does now truncate the file if exists. Beware when using -R * Fixed svn module memory leaks * Fixed rtsp module potential buffer overflow * Fixed http module DIGEST-MD5 mode diff --git a/hydra-mod.c b/hydra-mod.c index 251ef27..f3d0015 100644 --- a/hydra-mod.c +++ b/hydra-mod.c @@ -468,7 +468,7 @@ RSA *ssl_temp_rsa_cb(SSL * ssl, int32_t export, int32_t keylength) { #if !defined(LIBRESSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L BIGNUM *n; n = BN_new(); - RSA_get0_key(rsa, &n, NULL, NULL); + RSA_get0_key(rsa, (const struct bignum_st **)&n, NULL, NULL); ok = BN_zero(n); #else if (rsa->n == 0) From 5120f036450f2cdee3d1a62a3995f1c20dc7bde5 Mon Sep 17 00:00:00 2001 From: Galaxy-cst Date: Sat, 27 Apr 2019 00:37:27 +0800 Subject: [PATCH 187/531] Rebuild JSON report file in first time and append while using -R --- hydra.c | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/hydra.c b/hydra.c index 1f27988..8a9b396 100644 --- a/hydra.c +++ b/hydra.c @@ -3552,11 +3552,15 @@ int main(int argc, char *argv[]) { // printf("[DATA] with additional data %s\n", hydra_options.miscptr); if (hydra_options.outfile_ptr != NULL) { - if ((hydra_brains.ofp = fopen(hydra_options.outfile_ptr, "a+")) == NULL) { + char outfile_open_type[] = "a+"; //Default open in a+ mode + if (hydra_options.outfile_format == FORMAT_JSONV1 && hydra_options.restore != 1) { + outfile_open_type[0] = 'w'; //Creat new outfile, if using JSON output and not using -R. The open mode should be "w+". + } + if ((hydra_brains.ofp = fopen(hydra_options.outfile_ptr, outfile_open_type)) == NULL) { perror("[ERROR] Error creating outputfile"); exit(-1); } - if (hydra_options.outfile_format == FORMAT_JSONV1) { + if (hydra_options.outfile_format == FORMAT_JSONV1 && hydra_options.restore != 1) { // No JSON head while using -R fprintf(hydra_brains.ofp, "{ \"generator\": {\n" "\t\"software\": \"%s\", \"version\": \"%s\", \"built\": \"%s\",\n" "\t\"server\": \"%s\", \"service\": \"%s\", \"jsonoutputversion\": \"1.00\",\n" From 486f33cd5f46a4c6ab9390fa2d538bbb6ad30722 Mon Sep 17 00:00:00 2001 From: Galaxy-cst Date: Sat, 27 Apr 2019 10:11:02 +0800 Subject: [PATCH 188/531] Fix logical issue. It cause adding wrong output file head when restore session using JSON format --- hydra.c | 16 +++++++++------- 1 file changed, 9 insertions(+), 7 deletions(-) diff --git a/hydra.c b/hydra.c index 8a9b396..3cc593e 100644 --- a/hydra.c +++ b/hydra.c @@ -3560,19 +3560,21 @@ int main(int argc, char *argv[]) { perror("[ERROR] Error creating outputfile"); exit(-1); } - if (hydra_options.outfile_format == FORMAT_JSONV1 && hydra_options.restore != 1) { // No JSON head while using -R - fprintf(hydra_brains.ofp, "{ \"generator\": {\n" + if (hydra_options.outfile_format == FORMAT_JSONV1) { + if (hydra_options.restore != 1) { // No JSON head while using -R + fprintf(hydra_brains.ofp, "{ \"generator\": {\n" "\t\"software\": \"%s\", \"version\": \"%s\", \"built\": \"%s\",\n" "\t\"server\": \"%s\", \"service\": \"%s\", \"jsonoutputversion\": \"1.00\",\n" "\t\"commandline\": \"%s", PROGRAM, VERSION, hydra_build_time(), hydra_options.server == NULL ? hydra_options.infile_ptr : hydra_options.server, hydra_options.service, prg); - for (i = 1; i < argc; i++) { - char *t = hydra_string_replace(argv[i],"\"","\\\""); - fprintf(hydra_brains.ofp, " %s", t); - free(t); + for (i = 1; i < argc; i++) { + char *t = hydra_string_replace(argv[i],"\"","\\\""); + fprintf(hydra_brains.ofp, " %s", t); + free(t); + } + fprintf(hydra_brains.ofp, "\"\n\t},\n\"results\": ["); } - fprintf(hydra_brains.ofp, "\"\n\t},\n\"results\": ["); } else { // else default is plain text aka == 0 fprintf(hydra_brains.ofp, "# %s %s run at %s on %s %s (%s", PROGRAM, VERSION, hydra_build_time(), hydra_options.server == NULL ? hydra_options.infile_ptr : hydra_options.server, hydra_options.service, prg); From 96641d26314b16b88c6ef7a2d7711ca4e97b8b78 Mon Sep 17 00:00:00 2001 From: Hashir Baig Date: Sun, 28 Apr 2019 14:48:55 +0500 Subject: [PATCH 189/531] Fixed a typo in readme --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 442c827..a5e095c 100644 --- a/README.md +++ b/README.md @@ -24,7 +24,7 @@ access from remote to a system. THIS TOOL IS FOR LEGAL PURPOSES ONLY! There are already several login hacker tools available, however, none does -either support more than one protocol to attack or support parallized +either support more than one protocol to attack or support parallelized connects. It was tested to compile cleanly on Linux, Windows/Cygwin, Solaris, From 2c7df66d4215ef708f01fd5bf6e3705bdba1a53b Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Mon, 29 Apr 2019 09:54:30 +0800 Subject: [PATCH 190/531] Use specific RDP port if requested --- hydra-rdp.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-rdp.c b/hydra-rdp.c index 69feee5..f2fbfce 100644 --- a/hydra-rdp.c +++ b/hydra-rdp.c @@ -99,7 +99,7 @@ void service_rdp(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL next_run = 0; switch (run) { case 1: /* run the cracking function */ - next_run = start_rdp(ip, port, options, miscptr, fp); + next_run = start_rdp(ip, myport, options, miscptr, fp); break; case 2: /* clean exit */ freerdp_disconnect(instance); From 2bcd7229414abdc1f3d9233b93292c0286ee144d Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Mon, 29 Apr 2019 09:55:57 +0800 Subject: [PATCH 191/531] Free the memory allocated by setupterm() --- hydra.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/hydra.c b/hydra.c index 3cc593e..92c053e 100644 --- a/hydra.c +++ b/hydra.c @@ -2397,6 +2397,9 @@ int main(int argc, char *argv[]) { if (!setupterm(NULL, 1, NULL) && (tigetnum("colors") <= 0)) { colored_output = 0; } + if (cur_term) { + del_curterm(cur_term); + } } #else //don't want border line effect so disabling color output From 34247865309a5f157ff69b7dab9468cdbaf9672e Mon Sep 17 00:00:00 2001 From: Roman Maksimov Date: Sat, 11 May 2019 14:11:25 +0300 Subject: [PATCH 192/531] fix NTLM authentication --- hydra-http.c | 45 +++++++++++++----------- hydra-mod.c | 99 ++++++++++++++++++++++++++-------------------------- 2 files changed, 73 insertions(+), 71 deletions(-) diff --git a/hydra-http.c b/hydra-http.c index 8b19b28..4fba1f9 100644 --- a/hydra-http.c +++ b/hydra-http.c @@ -70,8 +70,8 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha fooptr = buffer2; sasl_digest_md5(fooptr, login, pass, buffer, miscptr, type, webtarget, webport, header); if (fooptr == NULL) { - free(buffer); - free(header); + free(buffer); + free(header); return 3; } @@ -96,38 +96,37 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha //send the first.. if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) sprintf(buffer, - "%s http://%s:%d%s HTTP/1.1\r\nHost: %s\r\nConnection: close\r\nAuthorization: NTLM %s\r\nProxy-Authorization: Basic %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\nConnection: keep-alive\r\n%s\r\n", + "%s http://%s:%d%s HTTP/1.1\r\nHost: %s\r\nAuthorization: NTLM %s\r\nProxy-Authorization: Basic %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", type, webtarget, webport, miscptr, webtarget, buf1, proxy_authentication[selected_proxy], header); else { if (use_proxy == 1) - sprintf(buffer, "%s http://%s:%d%s HTTP/1.1\r\nHost: %s\r\nConnection: close\r\nAuthorization: NTLM %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\nConnection: keep-alive\r\n%s\r\n", + sprintf(buffer, "%s http://%s:%d%s HTTP/1.1\r\nHost: %s\r\nAuthorization: NTLM %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", type, webtarget, webport, miscptr, webtarget, buf1, header); else - sprintf(buffer, "%s %s HTTP/1.1\r\nHost: %s\r\nConnection: close\r\nAuthorization: NTLM %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\nConnection: keep-alive\r\n%s\r\n", type, miscptr, webtarget, + sprintf(buffer, "%s %s HTTP/1.1\r\nHost: %s\r\nAuthorization: NTLM %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", type, miscptr, webtarget, buf1, header); } if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { - free(buffer); - free(header); + free(buffer); + free(header); return 1; } //receive challenge if (http_buf != NULL) free(http_buf); + http_buf = hydra_receive_line(s); - while (http_buf != NULL && (pos = hydra_strcasestr(http_buf, "WWW-Authenticate: NTLM ")) == NULL) { - free(http_buf); - http_buf = hydra_receive_line(s); - } - if (http_buf == NULL) { - free(buffer); - free(header); - return 1; + if (verbose) + hydra_report(stderr, "[ERROR] Server did not answer\n"); + free(buffer); + free(header); + return 3; } + pos = hydra_strcasestr(http_buf, "WWW-Authenticate: NTLM "); if (pos != NULL) { char *str; @@ -138,7 +137,11 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha if ((str = strchr(pos, '\n')) != NULL) { pos[str - pos] = 0; } + } else { + hydra_report(stderr, "[ERROR] It is not NTLM authentication type\n"); + return 3; } + //recover challenge from64tobits((char *) buf1, pos); free(http_buf); @@ -151,14 +154,14 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha //create the auth response if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) sprintf(buffer, - "%s http://%s:%d%s HTTP/1.1\r\nHost: %s\r\nConnection: close\r\nAuthorization: NTLM %s\r\nProxy-Authorization: Basic %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\nConnection: keep-alive\r\n%s\r\n", + "%s http://%s:%d%s HTTP/1.1\r\nHost: %s\r\nAuthorization: NTLM %s\r\nProxy-Authorization: Basic %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", type, webtarget, webport, miscptr, webtarget, buf1, proxy_authentication[selected_proxy], header); else { if (use_proxy == 1) - sprintf(buffer, "%s http://%s:%d%s HTTP/1.1\r\nHost: %s\r\nConnection: close\r\nAuthorization: NTLM %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\nConnection: keep-alive\r\n%s\r\n", + sprintf(buffer, "%s http://%s:%d%s HTTP/1.1\r\nHost: %s\r\nAuthorization: NTLM %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", type, webtarget, webport, miscptr, webtarget, buf1, header); else - sprintf(buffer, "%s %s HTTP/1.1\r\nHost: %s\r\nConnection: close\r\nAuthorization: NTLM %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\nConnection: keep-alive\r\n%s\r\n", type, miscptr, webtarget, + sprintf(buffer, "%s %s HTTP/1.1\r\nHost: %s\r\nAuthorization: NTLM %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", type, miscptr, webtarget, buf1, header); } @@ -231,7 +234,7 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha //the first authentication type failed, check the type from server header if ((hydra_strcasestr(http_buf, "WWW-Authenticate: Basic") == NULL) && (http_auth_mechanism == AUTH_BASIC)) { - //seems the auth supported is not Basic shceme so testing further + //seems the auth supported is not Basic scheme so testing further int32_t find_auth = 0; if (hydra_strcasestr(http_buf, "WWW-Authenticate: NTLM") != NULL) { @@ -248,8 +251,8 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha if (find_auth) { // free(http_buf); // http_buf = NULL; - free(buffer); - free(header); + free(buffer); + free(header); return 1; } } diff --git a/hydra-mod.c b/hydra-mod.c index f3d0015..fcc9bbe 100644 --- a/hydra-mod.c +++ b/hydra-mod.c @@ -935,74 +935,73 @@ int32_t hydra_recv_nb(int32_t socket, char *buf, uint32_t length) { } char *hydra_receive_line(int32_t socket) { - char buf[1024], *buff, *buff2, text[64]; - int32_t i, j = 1, k, got = 0; + char buf[1024], *buff, *buff2, pid[64]; + int32_t i, j, k, got = 0; if ((buff = malloc(sizeof(buf))) == NULL) { fprintf(stderr, "[ERROR] could not malloc\n"); return NULL; } + memset(buff, 0, sizeof(buf)); + if (debug) printf("[DEBUG] hydra_receive_line: waittime: %d, conwait: %d, socket: %d, pid: %d\n", waittime, conwait, socket, getpid()); if ((i = hydra_data_ready_timed(socket, (long) waittime, 0)) > 0) { - if ((got = internal__hydra_recv(socket, buff, sizeof(buf) - 1)) < 0) { + do { + j = internal__hydra_recv(socket, buf, sizeof(buf) - 1); + if (j > 0) { + for (k = 0; k < j; k++) + if (buf[k] == 0) + buf[k] = 32; + + buf[j] = 0; + + if ((buff2 = realloc(buff, got + j + 1)) == NULL) { + free(buff); + return NULL; + } + + buff = buff2; + memcpy(buff + got, &buf, j + 1); + got += j; + buff[got] = 0; + } else if (j < 0) { + // some error occured + got = -1; + } + } while (hydra_data_ready(socket) > 0 && j > 0 +#ifdef LIBOPENSSL + || use_ssl && SSL_pending(ssl) +#endif + ); + + if (got > 0) { + if (debug) { + sprintf(pid, "[DEBUG] RECV [pid:%d]", getpid()); + hydra_dump_data(buff, got, pid); + //hydra_report_debug(stderr, "DEBUG_RECV_BEGIN [pid:%d len:%d]|%s|END", getpid(), got, buff); + } + } else { + if (got < 0) { + if (debug) { + sprintf(pid, "[DEBUG] RECV [pid:%d]", getpid()); + hydra_dump_data((unsigned char*)"", -1, pid); + //hydra_report_debug(stderr, "DEBUG_RECV_BEGIN||END [pid:%d %d]", getpid(), i); + perror("recv"); + } + } free(buff); return NULL; } + + usleepn(100); } else { if (debug) printf("[DEBUG] hydra_data_ready_timed: %d, waittime: %d, conwait: %d, socket: %d\n", i, waittime, conwait, socket); } - if (got < 0) { - if (debug) { - sprintf(text, "[DEBUG] RECV [pid:%d]", getpid()); - hydra_dump_data((unsigned char*)"", -1, text); - //hydra_report_debug(stderr, "DEBUG_RECV_BEGIN||END [pid:%d %d]", getpid(), i); - perror("recv"); - } - free(buff); - return NULL; - } else { - if (got > 0) { - for (k = 0; k < got; k++) - if (buff[k] == 0) - buff[k] = 32; - buff[got] = 0; - usleepn(100); - } - } - - while (hydra_data_ready(socket) > 0 && j > 0) { - j = internal__hydra_recv(socket, buf, sizeof(buf) - 1); - if (j > 0) { - for (k = 0; k < j; k++) - if (buf[k] == 0) - buf[k] = 32; - buf[j] = 0; - if ((buff2 = realloc(buff, got + j + 1)) == NULL) { - free(buff); - return NULL; - } else - buff = buff2; - memcpy(buff + got, &buf, j + 1); - got += j; - buff[got] = 0; - } - usleepn(100); - } - - if (debug) { - sprintf(text, "[DEBUG] RECV [pid:%d]", getpid()); - hydra_dump_data(buff, got, text); - //hydra_report_debug(stderr, "DEBUG_RECV_BEGIN [pid:%d len:%d]|%s|END", getpid(), got, buff); - } - if (got == 0) { - free(buff); - return NULL; - } return buff; } From 59241d6b8f862242abc4f90894bfc94d6d0c1fc9 Mon Sep 17 00:00:00 2001 From: Roman Maksimov Date: Sat, 11 May 2019 15:14:57 +0300 Subject: [PATCH 193/531] change the order of the parameters as in the socket manual --- hydra-mod.c | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/hydra-mod.c b/hydra-mod.c index f3d0015..5d07e27 100644 --- a/hydra-mod.c +++ b/hydra-mod.c @@ -85,7 +85,7 @@ void interrupt() { /* ----------------- internal functions ----------------- */ -int32_t internal__hydra_connect(char *host, int32_t port, int32_t protocol, int32_t type) { +int32_t internal__hydra_connect(char *host, int32_t port, int32_t type, int32_t protocol) { int32_t s, ret = -1, ipv6 = 0, reset_selected = 0; #ifdef AF_INET6 @@ -111,10 +111,10 @@ int32_t internal__hydra_connect(char *host, int32_t port, int32_t protocol, int3 #ifdef AF_INET6 if (ipv6) - s = socket(AF_INET6, protocol, type); + s = socket(AF_INET6, type, protocol); else #endif - s = socket(PF_INET, protocol, type); + s = socket(PF_INET, type, protocol); if (s >= 0) { if (src_port != 0) { int32_t bind_ok = 0; @@ -580,10 +580,10 @@ int32_t internal__hydra_connect_to_ssl(int32_t socket, char *hostname) { return socket; } -int32_t internal__hydra_connect_ssl(char *host, int32_t port, int32_t protocol, int32_t type, char *hostname) { +int32_t internal__hydra_connect_ssl(char *host, int32_t port, int32_t type, int32_t protocol, char *hostname) { int32_t socket; - if ((socket = internal__hydra_connect(host, port, protocol, type)) < 0) + if ((socket = internal__hydra_connect(host, port, type, protocol)) < 0) return -1; return internal__hydra_connect_to_ssl(socket, hostname); From f7f3aa1686cde9046399a424d22cba4cbf485485 Mon Sep 17 00:00:00 2001 From: Roman Maksimov Date: Sat, 11 May 2019 15:19:52 +0300 Subject: [PATCH 194/531] change the order of the comparison operands --- hydra.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/hydra.c b/hydra.c index 92c053e..41ee8fc 100644 --- a/hydra.c +++ b/hydra.c @@ -2296,11 +2296,11 @@ int main(int argc, char *argv[]) { break; case 'b': outfile_format_tmp = optarg; - if (0==strcasecmp(outfile_format_tmp,"text")) + if (strcasecmp(outfile_format_tmp,"text") == 0) hydra_options.outfile_format = FORMAT_PLAIN_TEXT; - else if (0==strcasecmp(outfile_format_tmp,"json")) // latest json formatting. + else if (strcasecmp(outfile_format_tmp,"json") == 0) // latest json formatting. hydra_options.outfile_format = FORMAT_JSONV1; - else if (0==strcasecmp(outfile_format_tmp,"jsonv1")) + else if (strcasecmp(outfile_format_tmp,"jsonv1") == 0) hydra_options.outfile_format = FORMAT_JSONV1; else { fprintf(stderr, "[ERROR] Output file format must be (text, json, jsonv1)\n"); From f6723f61b1f9d1cfd963148d8b40708df86c5596 Mon Sep 17 00:00:00 2001 From: Roman Maksimov Date: Wed, 15 May 2019 22:50:14 +0300 Subject: [PATCH 195/531] fix parsing of header value in http(s) modules --- hydra-http-form.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 875222f..c1801cc 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -416,7 +416,7 @@ int32_t parse_options(char *miscptr, ptr_header_node *ptr_head) { *(ptr - 1) = 0; if (*ptr != 0) { *ptr = 0; - ptr += 2; + ptr += 1; } ptr2 = ptr; while (*ptr2 != 0 && (*ptr2 != ':' || *(ptr2 - 1) == '\\')) @@ -447,7 +447,7 @@ int32_t parse_options(char *miscptr, ptr_header_node *ptr_head) { if (*ptr != 0) { *ptr = 0; - ptr += 2; + ptr += 1; } ptr2 = ptr; while (*ptr2 != 0 && (*ptr2 != ':' || *(ptr2 - 1) == '\\')) From 6a57bd6877d562f5b653a4957de1f776c1a98f66 Mon Sep 17 00:00:00 2001 From: Roman Maksimov Date: Wed, 15 May 2019 22:58:49 +0300 Subject: [PATCH 196/531] add newline characters, fix option description in hydra-http-form.c --- hydra-http-form.c | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index c1801cc..10d08b4 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -323,7 +323,7 @@ void hdrrep(ptr_header_node *ptr_head, char *oldvalue, char *newvalue) { if (cur_ptr->value) strcpy(cur_ptr->value, newvalue); else { - hydra_report(stderr, "[ERROR] Out of memory (hddrep)."); + hydra_report(stderr, "[ERROR] Out of memory (hddrep).\n"); hydra_child_exit(0); } } @@ -342,7 +342,7 @@ void hdrrepv(ptr_header_node *ptr_head, char *hdrname, char *new_value) { if (cur_ptr->value) strcpy(cur_ptr->value, new_value); else { - hydra_report(stderr, "[ERROR] Out of memory (hdrrepv %lu)", strlen(new_value) + 1); + hydra_report(stderr, "[ERROR] Out of memory (hdrrepv %lu)\n", strlen(new_value) + 1); hydra_child_exit(0); } } @@ -434,7 +434,7 @@ int32_t parse_options(char *miscptr, ptr_header_node *ptr_head) { break; } // Error: abort execution - hydra_report(stderr, "[ERROR] Out of memory for HTTP headers (h)."); + hydra_report(stderr, "[ERROR] Out of memory for HTTP headers (h).\n"); return 0; case 'H': // add a new header, or replace an existing one's value @@ -465,7 +465,7 @@ int32_t parse_options(char *miscptr, ptr_header_node *ptr_head) { break; } // Error: abort execution - hydra_report(stderr, "[ERROR] Out of memory for HTTP headers (H)."); + hydra_report(stderr, "[ERROR] Out of memory for HTTP headers (H).\n"); return 0; // no default } @@ -1299,7 +1299,7 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { strncat(proxy_string, proxy_authentication[selected_proxy], strlen(proxy_authentication[selected_proxy]) - 6); add_header(&ptr_head, "Proxy-Authorization", proxy_string, HEADER_TYPE_DEFAULT); } else { - hydra_report(stderr, "Out of memory for \"Proxy-Authorization\" header."); + hydra_report(stderr, "Out of memory for \"Proxy-Authorization\" header.\n"); return NULL; } if (getcookie) { @@ -1362,7 +1362,7 @@ void usage_http_form(const char *service) { " This is where most people get it wrong. You have to check the webapp what a\n" " failed string looks like and put it in this parameter!\n" "The following parameters are optional:\n" - " C=/page/uri to define a different page to gather initial cookies from\n" + " (c|C)=/page/uri to define a different page to gather initial cookies from\n" " (h|H)=My-Hdr\\: foo to send a user defined HTTP header with each request\n" " ^USER[64]^ and ^PASS[64]^ can also be put into these headers!\n" " Note: 'h' will add the user-defined header at the end\n" From 0a0dd605ffa94d9ad291b02db5e1cecc94a8941b Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 16 May 2019 06:06:52 +0200 Subject: [PATCH 197/531] http module a= option --- CHANGES | 3 ++- hydra-http-form.c | 14 ++++++++++++++ hydra-http.c | 10 +++++++--- sasl.h | 1 + 4 files changed, 24 insertions(+), 4 deletions(-) diff --git a/CHANGES b/CHANGES index e7a85e0..c9a75e1 100644 --- a/CHANGES +++ b/CHANGES @@ -3,7 +3,8 @@ Changelog for hydra Release 8.9-dev * your patch? :) -* Revamped rdp module to use FreeRDP library (thanks to loianhtuan@github for the patch!) +* http: http module now supports a= option to select http authentication type +* rdp: Revamped rdp module to use FreeRDP library (thanks to loianhtuan@github for the patch!) * JSON output does now truncate the file if exists. Beware when using -R * Fixed svn module memory leaks * Fixed rtsp module potential buffer overflow diff --git a/hydra-http-form.c b/hydra-http-form.c index 10d08b4..f322fe6 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -50,10 +50,12 @@ Added fail or success condition, getting cookies, and allow 5 redirections by da */ #include "hydra-http.h" +#include "sasl.h" extern char *HYDRA_EXIT; char *buf; char *cond; +extern int32_t http_auth_mechanism; struct header_node { char *header; @@ -397,6 +399,18 @@ int32_t parse_options(char *miscptr, ptr_header_node *ptr_head) { */ while (*miscptr != 0) { switch (miscptr[0]) { + case 'a': // fall through + case 'A': // only for http, not http-form! + ptr = miscptr + 2; + if (strncasecmp(miscptr, "NTML", 4) == 0) + http_auth_mechanism = AUTH_NTLM; + else if (strncasecmp(miscptr, "MD5", 3) == 0 || strncasecmp(miscptr, "DIGEST", 6) == 0) + http_auth_mechanism = AUTH_DIGESTMD5; + else if (strncasecmp(miscptr, "BASIC", 4) == 0) + http_auth_mechanism = AUTH_BASIC; + else + fprintf(stderr, "[WARNING] unknown http auth type: %s\n", miscptr); + break; case 'c': // fall through case 'C': ptr = miscptr + 2; diff --git a/hydra-http.c b/hydra-http.c index 4fba1f9..61f7c65 100644 --- a/hydra-http.c +++ b/hydra-http.c @@ -6,7 +6,7 @@ char *webtarget = NULL; char *slash = "/"; char *http_buf = NULL; int32_t webport, freemischttp = 0; -int32_t http_auth_mechanism = AUTH_BASIC; +int32_t http_auth_mechanism = AUTH_UNASSIGNED; int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp, char *type, ptr_header_node ptr_head) { char *empty = ""; @@ -314,9 +314,12 @@ void service_http(char *ip, int32_t sp, unsigned char options, char *miscptr, FI *ptr++ = 0; optional1 = ptr; - if (!parse_options(optional1, &ptr_head)) + if (!parse_options(optional1, &ptr_head)) // this function is in hydra-http-form.c !! run = 4; + if (http_auth_mechanism == AUTH_UNASSIGNED) + http_auth_mechanism = AUTH_BASIC; + while (1) { next_run = 0; switch (run) { @@ -393,6 +396,7 @@ int32_t service_http_init(char *ip, int32_t sp, unsigned char options, char *mis void usage_http(const char* service) { printf("Module %s requires the page to authenticate.\n" "The following parameters are optional:\n" + " (a|A)=auth-type specify authentication mechanism to use: BASIC, NTLM or MD5\n" " (h|H)=My-Hdr\\: foo to send a user defined HTTP header with each request\n" - "For example: \"/secret\" or \"http://bla.com/foo/bar:H=Cookie\\: sessid=aaaa\" or \"https://test.com:8080/members\"\n\n", service); + "For example: \"/secret\" or \"http://bla.com/foo/bar:H=Cookie\\: sessid=aaaa\" or \"https://test.com:8080/members:A=NTLM\"\n\n", service); } diff --git a/sasl.h b/sasl.h index 29622d7..459a5ab 100644 --- a/sasl.h +++ b/sasl.h @@ -19,6 +19,7 @@ #define AUTH_BASIC 11 #define AUTH_LM 12 #define AUTH_LMv2 13 +#define AUTH_UNASSIGNED 14 #if LIBIDN #include From c3c23bbd9464863af34757297c5132fa1e8c56c4 Mon Sep 17 00:00:00 2001 From: Roman Maksimov Date: Thu, 16 May 2019 12:19:40 +0300 Subject: [PATCH 198/531] fix typo and the offset value of miscptr --- hydra-http-form.c | 19 +++++++++++++++---- 1 file changed, 15 insertions(+), 4 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index f322fe6..77559df 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -402,14 +402,25 @@ int32_t parse_options(char *miscptr, ptr_header_node *ptr_head) { case 'a': // fall through case 'A': // only for http, not http-form! ptr = miscptr + 2; - if (strncasecmp(miscptr, "NTML", 4) == 0) + + if (strncasecmp(ptr, "NTLM", 4) == 0) http_auth_mechanism = AUTH_NTLM; - else if (strncasecmp(miscptr, "MD5", 3) == 0 || strncasecmp(miscptr, "DIGEST", 6) == 0) + else if (strncasecmp(ptr, "MD5", 3) == 0 || strncasecmp(ptr, "DIGEST", 6) == 0) http_auth_mechanism = AUTH_DIGESTMD5; - else if (strncasecmp(miscptr, "BASIC", 4) == 0) + else if (strncasecmp(ptr, "BASIC", 4) == 0) http_auth_mechanism = AUTH_BASIC; else - fprintf(stderr, "[WARNING] unknown http auth type: %s\n", miscptr); + fprintf(stderr, "[WARNING] unknown http auth type: %s\n", ptr); + + while (*ptr != 0 && *ptr != ':') + ptr++; + + if (*ptr != 0) { + *ptr = 0; + ptr += 1; + } + + miscptr = ptr; break; case 'c': // fall through case 'C': From ab467e0a3b266cd7426f7c329d7a5f94b86ae9fb Mon Sep 17 00:00:00 2001 From: van Hauser Date: Fri, 17 May 2019 08:50:01 +0200 Subject: [PATCH 199/531] v9.0 release --- CHANGES | 11 +++++------ README | 3 ++- hydra.c | 2 +- 3 files changed, 8 insertions(+), 8 deletions(-) diff --git a/CHANGES b/CHANGES index c9a75e1..48dd919 100644 --- a/CHANGES +++ b/CHANGES @@ -1,16 +1,15 @@ Changelog for hydra ------------------- -Release 8.9-dev -* your patch? :) -* http: http module now supports a= option to select http authentication type +Release 9.0 * rdp: Revamped rdp module to use FreeRDP library (thanks to loianhtuan@github for the patch!) -* JSON output does now truncate the file if exists. Beware when using -R +* Added memcached module +* Added mongodb module +* http: http module now supports a= option to select http authentication type +* JSON output does now truncate the file if exists. * Fixed svn module memory leaks * Fixed rtsp module potential buffer overflow * Fixed http module DIGEST-MD5 mode -* Added memcached module -* Added mongodb module Release 8.9.1 diff --git a/README b/README index 442c827..fcd354e 100644 --- a/README +++ b/README @@ -81,7 +81,8 @@ for a few optional modules (note that some might not be available on your distri ``` apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev \ libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev \ - firebird-dev libmemcached-dev + firebird-dev libmemcached-dev libmongoc-dev \ + libfreerdp-client2-2 ``` This enables all optional modules and features with the exception of Oracle, diff --git a/hydra.c b/hydra.c index 41ee8fc..0199729 100644 --- a/hydra.c +++ b/hydra.c @@ -214,7 +214,7 @@ char *SERVICES = #define RESTOREFILE "./hydra.restore" #define PROGRAM "Hydra" -#define VERSION "v8.9-dev" +#define VERSION "v9.0" #define AUTHOR "van Hauser/THC" #define EMAIL "" #define RESOURCE "https://github.com/vanhauser-thc/thc-hydra" From ce3ae5764595985631c8827be95ffb1e142a66e5 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Fri, 17 May 2019 09:04:33 +0200 Subject: [PATCH 200/531] remove outdated directory --- web/CHANGES | 818 ---------- web/README | 530 ------- web/index.html | 206 --- web/network_password_cracker_comparison.html | 917 ----------- web/webfiles/css/commonPrint.css | 267 ---- web/webfiles/css/index.css | 2 - web/webfiles/css/index_002.css | 1 - web/webfiles/css/index_003.css | 1 - web/webfiles/css/index_004.css | 20 - web/webfiles/css/main.css | 1461 ------------------ web/webfiles/css/shared.css | 320 ---- web/webfiles/img/Cross.png | Bin 953 -> 0 bytes web/webfiles/img/Tick.png | Bin 871 -> 0 bytes web/webfiles/img/Unknown.png | Bin 1359 -> 0 bytes web/webfiles/img/gnu-fdl.png | Bin 1748 -> 0 bytes web/webfiles/img/hydra_pass.jpg | Bin 29906 -> 0 bytes web/webfiles/img/hydra_start.jpg | Bin 44345 -> 0 bytes web/webfiles/img/hydra_target.jpg | Bin 24547 -> 0 bytes web/webfiles/img/xhydra.png | Bin 217839 -> 0 bytes web/xhydra.png | Bin 217839 -> 0 bytes 20 files changed, 4543 deletions(-) delete mode 100644 web/CHANGES delete mode 100644 web/README delete mode 100644 web/index.html delete mode 100644 web/network_password_cracker_comparison.html delete mode 100644 web/webfiles/css/commonPrint.css delete mode 100644 web/webfiles/css/index.css delete mode 100644 web/webfiles/css/index_002.css delete mode 100644 web/webfiles/css/index_003.css delete mode 100644 web/webfiles/css/index_004.css delete mode 100644 web/webfiles/css/main.css delete mode 100644 web/webfiles/css/shared.css delete mode 100644 web/webfiles/img/Cross.png delete mode 100644 web/webfiles/img/Tick.png delete mode 100644 web/webfiles/img/Unknown.png delete mode 100644 web/webfiles/img/gnu-fdl.png delete mode 100644 web/webfiles/img/hydra_pass.jpg delete mode 100644 web/webfiles/img/hydra_start.jpg delete mode 100644 web/webfiles/img/hydra_target.jpg delete mode 100644 web/webfiles/img/xhydra.png delete mode 100644 web/xhydra.png diff --git a/web/CHANGES b/web/CHANGES deleted file mode 100644 index 32d5458..0000000 --- a/web/CHANGES +++ /dev/null @@ -1,818 +0,0 @@ -Changelog for hydra -------------------- - -Release 8.9.1 -* Clarification for rdp error message -* CIDR notation (hydra -l test -p test 192.168.0.0/24 ftp) was not detected, fixed - - -Release 8.8 -* New web page: https://github.com/vanhauser-thc/thc-hydra -* added PROBLEMS file with known issues -* rdp: disabled the module as it does not support the current protocol. If you want to add it contact me -* ldap: fixed a dumb strlen on a potential null pointer -* http-get/http-post: - - now supports H=/h= parameters same as http-form (thanks to mathewmarcus@github for the patch) - - 403/404 errors are now always registered as failed attempts -* mysql module: a non-default port was not working, fixed -* added -w timeout support to ssh module -* fixed various memory leaks in http-form module -* corrected hydra return code to be 0 on success -* added patch from debian maintainers which fixes spellings -* fixed weird crash on x64 systems -* many warning fixes by crondaemon - - -Release 8.6 -* added radmin2 module by catatonic prime - great work! -* smb module now checks if SMBv1 is supported by the server and if signing is required -* http-form module now supports URLs up to 6000 bytes (thanks to petrock6@github for the patch) -* Fix for SSL connections that failed with error:00000000:lib(0):func(0):reason(0) (thanks gaia@github for reporting) -* Added new command line option: - -c TIME: seconds between login attempts (over all threads, so -t 1 is recommended) -* Options put after -R (for loading a restore file) are now honored (and were disallowed before) -* merged several patches by Diadlo@github to make the code easier readable. thanks for that! -* merged a patch by Diadlo@github that moves the help output to the invididual module - - -Release 8.5 -* New command line option: - -b : format option for -o output file (json only so far, happy for patches supporting others :) ) - thanks to veggiespam for the patch -* ./configure now honors the CC enviroment variable if present -* Fix for the restore file crash on some x64 platforms (finally! thanks to lukas227!) -* Changed the format of the restore file to detect cross platform copies -* Fixed a bug in the NCP module -* Favor strrchr() over rindex() -* Added refactoring patch by diadlo -* Updated man page with missing command line options - - -Release 8.4 -! Reports came in that the rdp module is not working reliable sometimes, most likely against new Windows versions. please test, report and if possible send a fix -* Proxy support re-implemented: - - HYDRA_PROXY[_HTTP] environment can be a text file with up to 64 entries - - HYDRA_PROXY_AUTH was deprecated, set login/password in HTTP_PROXY[_HTTP] -* New protocol: adam6500 - this one is work in progress, please test and report -* New protocol: rpcap - thanks to Petar Kaleychev -* New command line options: - -y : disables -x 1aA interpretation, thanks to crondaemon for the patch - -I : ignore an existing hydra.restore file (don't wait for 10 seconds) -* hydra-svn: works now with the current libsvn version -* hydra-ssh: initial check for password auth support now uses login supplied -* Fixed dpl4hydra to be able to update from the web again -* Fixed crash when -U was used without any service (thanks to thecarterb for reporting) -* Updated default password lists -* The protocols vnc, xmpp, telnet, imap, nntp and pcanywhere got accidentially long sleep commands due a patch in 8.2, fixed -* Added special error message for clueless users :) - - -Release 8.3 -* Support for upcoming OpenSSL 1.1 added. needs testing. -* Fixed hydra redo bug (issue #113) -* Updated xhydra for new hydra features and options -* Some more command line error checking -* Ensured unneeded sockets are closed - -Release 8.2 -* Added RTSP module, thanks to jjavi89 for supplying! -* Added patch for ssh that fixes hydra stopping to connect, thanks to ShantonRU for the patch -* Added new -O option to hydra to support SSL servers that do not suport TLS -* Added xhydra gtk patche by Petar Kaleychev to support modules that do not use usernames -* Added patch to redis for initial service checking by Petar Kaleychev - thanks a lot! -* Added support in hydra-http for http-post (content length 0) -* Fixed important bug in http-*://server/url command line processing -* Added SSL SNI support -* Fixed bug in HTTP Form redirection following - thanks for everyone who reported and especially to Hayden Young for setting up a test page for debugging -* Better library finding in ./configure for SVN + support for Darwin Homebrew (and further enhanced) -* Fixed http-form module crash that only occurs on *BSD/OSX systems. Thanks to zdk for reporting! -* Fixed for SSL connection to support TLSv1.2 etc. -* Support for different RSA keylengths, thanks to fann95 for the patch -* Fixed a bug where the cisco-enable module was not working with the password-only logon mode -* Fixed an out of memory bug in http-form -* Fixed imap PLAIN method -* Fixed -x option to bail if it would generate too many passwords (more than 4 billion) -* Added warning if HYDRA_PROXY_CONNECT environment is detected, that is an outdated setting -* Added --fhs switch to configure (for Linux distribution usage) -* ... your patch? - - -Release 8.1 -* David Maciejak, my co-maintainer moved to a different job and country and can not help with Hydra anymore - sadly! Wish you all the best! -* Added patch from Ander Juaristi which adds h/H header options for http-form-*, great work, thanks! -* Fixed the -M option, works now with many many targets :-) -* -M option now supports ports, add a colon in between: "host:port", or, if IPv6, "[ipv6ipaddress]:port" -* Found login:password combinations are now printed with the name specified (hostname or IP), not always IP -* Fixed for cisco-enable if an intial Login/Password is used (thanks to joswr1te for reporting) -* Added patch by tux-mind for better MySQL compilation and an Android patches and Makefile. Thanks! -* Added xhydra gtk patches by Petar Kaleychev to support -h, -U, -f, -F, -q and -e r options, thanks! -* Added patch for teamspeak to better identify server errors and auth failures (thanks to Petar Kaleychev) -* Fixed a crash in the cisco module (thanks to Anatoly Mamaev for reporting) -* Small fix for HTTP form module for redirect pages where a S= string match would not work (thanks to mkosmach for reporting) -* Updated configure to detect subversion packages on current Cygwin -* Fixed RDP module to support the port option (thanks to and.enshin(at)gmail.com) - - -Release 8.0 -! Development moved to a public github repository: https://github.com/vanhauser-thc/thc-hydra -* Added module for redis (submitted by Alejandro Ramos, thanks!) -* Added patch which adds Unicode support for the SMB module (thanks to Max Kosmach) -* Added initial interactive password authentication test for ssh (thanks to Joshua Houghton) -* Added patch for xhydra that adds bruteforce generator to the GUI (thanks to Petar Kaleychev) -* Target on the command line can now be a CIDR definition, e.g. 192.168.0.0/24 -* with -M , you can now specify a port for each entry (use "target:port" per line) -* Verified that hydra compiles cleanly on QNX / Blackberry 10 :-) -* Bugfixes for -x option: - - password tries were lost when connection errors happened (thanks to Vineet Kumar for reporting) - - fixed crash when used together with -e option -* Fixed a bug that hydra would not compile without libssh (introduced in v7.6) -* Various bugfixes if many targets where attacked in parallel -* Cygwin's Postgresql is working again, hence configure detection re-enabled -* Added gcc compilation security options (if detected to be supported by configure script) -* Enhancements to the secure compilation options -* Checked code with cppcheck and fixed some minor issues. -* Checked code with Coverity. Fixed a lot of small and medium issues. - - -Release 7.6 -* Added a wizard script for hydra based on a script by Shivang Desai -* Added module for Siemens S7-300 (submitted by Alexander Timorin and Sergey Gordeychik, thanks!) -* HTTP HEAD/GET: MD5 digest auth was not working, fixed (thanks to Paul Kenyon) -* SMTP Enum: HELO is now always sent, better 500 error detection -* hydra main: - - fixed a bug in the IPv6 address parsing when a port was supplied - - added info message for pop3, imap and smtp protocol usage -* hydra GTK: missed some services, added -* dpl4hydra.sh: - - added Siemens S7-300 common passwords to default password list - - more broad searching in the list -* Performed code indention on all C files :-) -* Makefile patch to ensure .../etc directory is there (thanks to vonnyfly) - - -Release 7.5 -* Moved the license from GPLv3 to AGPLv3 (see LICENSE file) -* Added module for Asterisk Call Manager -* Added support for Android where some functions are not available -* hydra main: - - reduced the screen output if run without -h, full screen with -h - - fix for IPv6 and port parsing with service://[ipv6address]:port/OPTIONS - - fixed -o output (thanks to www417) - - warning if HYDRA_PROXY is defined but the module does not use it - - fixed an issue with large input files and long entries -* hydra library: - - SSL connections are now fixed to SSLv3 as some SSL servers fail otherwise, report if this gives you problems - - removed support for old OPENSSL libraries -* HTTP Form module: - - login and password values are now encoded if special characters are present - - ^USER^ and ^PASS^ are now also supported in H= header values - - if you the colon as a value in your option string, you can now escape it with \: - but do not encode a \ with \\ -* Mysql module: protocol 10 is now supported -* SMTP, POP3, IMAP modules: Disabled the TLS in default. TLS must now be - defined as an option "TLS" if required. This increases performance. -* Cisco module: fixed a small bug (thanks to Vitaly McLain) -* Postgres module: libraries on Cygwin are buggy at the moment, module is therefore - disabled on Cygwin - - -Release 7.4.3 FIX RELEASES for bugs introduced in 7.4 -* Quickfix for people who do not have libssh installed (won't compile otherwise) -* Quickfix for http-get/http-head and irc module which would not run due a new feature. -* Fix for the ssh module that breaks an endless loop if a service becomes unavailable (thanks to shark0der(at)gmail(dot)com for reporting) - - -Release 7.4 -* New module: SSHKEY - for testing for ssh private keys (thanks to deadbyte(at)toucan-system(dot)com!) -* Added support for win8 and win2012 server to the RDP module -* Better target distribution if -M is used -* Added colored output (needs libcurses) -* Better library detection for current Cygwin and OS X -* Fixed the -W option -* Fixed a bug when the -e option was used without -u, -l, -L or -C, only half of the logins were tested -* Fixed HTTP Form module false positive when no answer was received from the server -* Fixed SMB module return code for invalid hours logon and LM auth disabled -* Fixed http-{get|post-form} from xhydra -* Added OS/390 mainframe 64bit support (thanks to dan(at)danny(dot)cz) -* Added limits to input files for -L, -P, -C and -M - people were using unhealthy large files! ;-) -* Added debug mode option to usage (thanks to Anold Black) - - -Release 7.3 -* Hydra main: - - Added -F switch to quit all targets if one pair was found (for -M) - - Fixed a bug where hydra would terminate after reporting a successful - login when an account would accept any password - - Fixed a bug with very large wordlists (thanks to sheepdestroyer for reporting!) - - Enhanced the module help -* configure script: - - Added fix Oracle library inclusion, thanks to Brandon Archer! - - Added --nostrip option to prevent binary stripping (requested by Fedora - maintainer) -* Added a Makefile patch by the Debian maintainers to support their - SecurityHardeningBuildFlags for the wheezy build as requested -* dpl4hydra: added install directory support -* All code: message cleanups -* SNMP module - - originally already supported write and v2 although this was not in the - module help output. Added :-) - - added SNMPv3 MD5/SHA1 authentication support, though beta still -* HTTP module: - - fixed HTTP NTLM auth session - - implemented errata fix for HTTP digest md5-sess algorithm - - set default path to / -* HTTP Form module: - - set default path to / - - support HTTP/1.0 redirects - - fix failed condition check when pcre is not used -* IMAP module: fixed auth detection -* POP3 module: Updated auth and capability detection -* Oracle module: fixed bad handling -* Oracle listener module: fixed hash size handling -* Telnet/Cisco/Cisco-enable modules: support "press ENTER" prompts -* FTP module: - - Fixed a bug where 530 messages were incorrectly handled - - Clarification for the usage of ftps -* Mysql module: added patch from Redhat/Fedora that fixes compile problems -* Added IDN and PCRE support for Cygwin - - -Release 7.2 -* Speed-up http modules auth mechanism detection -* Fixed -C colonfile mode when empty login/passwords were used (thanks to - will(at)configitnow(dot)com for reporting) -* The -f switch was not working for postgres, afp, socks5, firebird and ncp, - thanks to Richard Whitcroft for reporting! -* Fixed NTLM auth in http-proxy/http-proxy-url module -* Fixed URL when being redirected in http-form module, thanks to gash(at)chaostreff(dot)at -* Fix MSSQL success login condition, thanks to whistle_master(at)live(dot)com -* Fix http form module: optional headers and 3xx status redirect, thx to Gash -* Fix in configure script for --prefix option, thanks to dazzlepod -* Update of the dpl4hydra script by Roland Kessler, thanks! -* Small fix for hydra man page, thanks to brad(at)comstyle(dot)com - - -Release 7.1 -* Added HTTP Proxy URL enumeration module -* Added SOCKS4/SOCKS5 proxy support with authentication -* Added IPv6 support for SOCKS5 module -* Added -e r option to try the reversed login as password -* Rewrote -x functionality as the code caused too much trouble (thanks to - murder.net7(at)gmail.com for reporting one of the issues) -* Fixed a bug with multiple hosts (-M) and http modules against targets that - are virtual servers. Well spotted by Tyler Krpata! -* Fixed SVN IPv6 support and updated deprecated calls -* Fixed RDP failed child connection returned value and false positive issues - reported by Wangchaohui, thanks! -* Fixed restore file functionality, was not working together with -o option -* Fix in http-form module for bug introduced in 7.0 -* Fixed xhydra specific parameter value for http-proxy module -* minor enhancements - - -Release 7.0 -* New main engine for hydra: better performance, flexibility and stability -* New option -u - loop around users, not passwords -* Option -e now also works with -x and -C -* Added RDP module, domain can be passed as argument -* Added other_domain option to smb module to test trusted domains -* Small enhancement for http and http-proxy module for standard ignoring servers -* Lots of bugfixes, especially with many tasks, multiple targets and restore file -* Fixes for a few http-form issues -* Fix smb module NTLM hash use -* Fixed Firebird module deprecated API call -* Fixed for dpl4hydra to work on old sed implementations (OS/X ...) -* Fixed makefile to install dpl4hydra (thx @sitecrea) -* Fixed local buffer overflow in debug output function (required -d to be used) -* Fixed xhydra running warnings and correct quit action event - - -Release 6.5 -* Improved HTTP form module: getting cookie, fail or success condition, follow - multiple redirections, support cookie gathering URL, multiple user defined - headers -* Added interface support for IPv6, needed for connecting to link local fe80:: - addresses. Works only on Linux and OS/X. Information for Solaris and *BSD welcome -* Added -W waittime between connects option -* The -x bruteforce mode now allows for generated password amounts > 2 billion -* Fix if -L was used together with -x -* Fixes for http- modules when the http-...://target/options format was used -* Fixed a bug in the restore file write function that could lead to a crash -* Fixed XMPP module jabber init request and challenge response check, thx "F e L o R e T" -* Fix: if a proxy was used, unresolveable targets were disabled. now its fine -* Fix for service://host/ usage if a colon was used after the URI without a - port defined - - -Release 6.4 -* Update SIP module to extract and use external IP addr return from server error to bypass NAT -* Update SIP module to use SASL lib -* Update email modules to check clear mode when TLS mode failed -* Update Oracle Listener module to work with Oracle DB 9.2 -* Update LDAP module to support Windows 2008 active directory simple auth -* Fix to the connection adaptation engine which would loose planned attempts -* Fix make script for CentOS, reported by ya0wei -* Print error when a service limits connections and few pairs have to be tested -* Improved Mysql module to only init/close when needed -* Added patch from the FreeBSD maintainers -* Module usage help does not need a target to be specified anymore -* Configure script now honors /etc/ld.so.conf.d/ directory -* Add more SMB dialects - - -Release 6.3 -* Added patch by Petar Kaleychev which adds nice icons to cygwin hydra files -* Added patch by Gauillaume Rousse which fixes a warning display -* New Oracle module (for databases via OCI, for TNS Listener passwd, for SID enumeration) -* New SMTP user enum module (using VRFY, EXPN or RCPT command) -* Memory leak fix for -x bruteforcing option reported by Alex Lau -* Fix for svn module, for some versions it needs one more lib, thanks to the - Debian team for reporting! -* Fix ssh module, on connection refused a credential could be lost -* Fix http-form module, a redirect was not always followed -* QA on all modules for memory leaks -* Better gtk detection (to not even try xhydra compilation when its useless) -* First blant attempt for configuring to x64 systems (Linux and *BSD) -* Updated network password cracker comparison on the web page (for hydra and new ncrack) -* Indented all source code - - -Release 6.2 -* Added a patch by Jan Dlabal which adds password generation bruteforcing (no more password files :-) ) -* Forgot to rename ssh2 to ssh in xhydra, fixed -* Add support for CRAM-MD5 and DIGEST-MD5 auth to ldap module -* Fix SASL PLAIN auth method issue -* Add TLS negotiation support for smtp-auth, pop3, imap, ftp and ldap -* Added man pages from Debian maintainers -* Checked Teamspeak module, works on TS2 protocol -* Add support for SCRAM-SHA1 (RFC 5802), first auth cracker to support it, yeah ! -* New module: XMPP with TLS negotiation and LOGIN, PLAIN, CRAM-MD5, DIGEST-MD5, SCRAM-SHA1 support -* Add SCRAM-SHA1 auth to IMAP module -* Add module usage help (-U) -* Add support for RFC 4013: Internationalized Strings in SASL ("SASLPrep") -* Rename smtpauth module to smtp -* Add SASL + TLS support for NNTP -* Bugfix SASL DIGEST-MD5, response could be wrong sometime, mainly on 64bits systems -* Bugfix rlogin module, some auth failure could not be detected accurately -* Bugfix rsh module, some auth failure could not be detected accurately -* New module: IRC is not dead ! use to find general server password and /oper credential -* Add SSL support for VMware Authentication Daemon module -* Bugfix CVS module, should work now, why does nobody report this ?? -* Bugfix Telnet module, when line mode is not available -* Add support for new syntax ://[:][/] -* Add TLS support for SIP -* STILL OPEN: Fixed a problem in hydra where a login+pw test was lost when an arm/child was quitting - - -Release 6.1 -* More license updates for the files for the Debian guys -* Fix for the configure script to correctly detect postgresql -* Add checks for libssh v0.4 and support for ssh v1 -* Merge all latest crypto code in sasl files -* Fix SVN compilation issue on openSUSE (tested with v11.3) - - -Release 6.0 -* Added GPL exception clause to license to allow linking to OpenSSL - Debian people need this -* IPv6 support finally added. Note: sip and socks5 modules do not support IPv6 yet -* Changes to code and configure script to ensure clean compile on Solaris 11, - OSX, FreeBSD 8.1, Cygwin and Linux -* Bugfix for SIP module, thanks to yori(at)counterhackchallenges(dot)com -* Compile fixes for systems without OpenSSL or old OpenSSL installations -* Eliminated compile time warnings -* xhydra updates to support the new features (david@) -* Added CRAM-MD5, DIGEST-MD5 auth mechanism to the smtp-auth module (david@) -* Added LOGIN, PLAIN, CRAM-(MD5,SHA1,SHA256) and DIGEST-MD5 auth mechanisms to the imap and pop3 modules (david@) -* Added APOP auth to POP3 module (david@) -* Added NTLM and DIGEST-MD5 to http-auth module and DIGEST-MD5 to http-proxy module (david@) -* Fixed VNC module for None and VLC auth (david@) -* Fixes for LDAP module (david@) -* Bugfix Telnet module linemode option negotiation using win7 (david@) -* Bugfix SSH module when max auth connection is reached (david@) - - -Release 5.9 -* Update for the subversion module for newer SVN versions (thanks to David Maciejak @ GMAIL dot com) -* Another patch by David to add the PLAIN auth mechanism to the smtp-auth module -* mysql module now has two implementations and uses a library when found (again - thanks to David Maciejak @ GMAIL dot com - what would hydra be without him) -* camiloculpian @ gmail dot com submitted a logo for hydra - looks cool, thanks! -* better FTP 530 error code detection -* bugfix for the SVN module for non-standard ports (again david@) - - -Release 5.8 -* Added Apple Filing Protocol (thank to "never tired" David Maciejak @ GMAIL dot com) -* Fixed a big bug in the SSL option (-S) - - -Release 5.7 -* Added ncp support plus minor fixes (by David Maciejak @ GMAIL dot com) -* Added an old patch to fix a memory from SSL and speed it up too from kan(at)dcit.cz -* Removed unnecessary compiler warnings -* Enhanced the SSH2 module based on an old patch from aris(at)0xbadc0de.be -* Fixed small local defined overflow in the teamspeak module. Does it still work anyway?? - - -Release 5.6 PRIVATE VERSION -########### -* Moved to GPLv3 License (lots of people wanted that) -* Upgraded ssh2 module to libssh-0.4.x (thanks to aris (at) 0xbadc0de.be for - the 0.2 basis) -* Added firebird support (by David Maciejak @ GMAIL dot com) -* Added SIP MD5 auth patch (by Jean-Baptiste Aviat 100 -! Soon to come: v5.0 - some cool new features to arrive on your pentest - machine! - - -Release 4.6 -########### -* Snakebyte delivered a module for Teamspeak -* Snakebyte updated the rexec module for the Hydra Palm version -* Snakebyte updated xhydra to support the new Telnet success response option -* Clarified the Licence -* Updated the ldap module to support v3, note that "ldap" is now specified as - "ldap2" or "ldap3". Added wrong version detection. - - -Release 4.5 -########### -* The configure script now detects Cygwin automatically :-) -* The telnet module now handles the OPT special input. Specify the string - which is displayed after successfully a login. Use this if you have false - positives. -* Made smtp-auth module more flexible in EHLO/HELO handling -* Fixed some glitches in the SAP/R3 module (correct sysnr, better port - handling) thanks to ngregoire@exaprobe.com ! -* Fixed some glitches in the http/https module -* Fixed a big bug in snakebyte's snmp module -* Warning msg is now displayed if the deprecated icq module is used -* Added warning message to the ssh2 module during compilation as many people - use the newest libssh version which is broken. - - -Release 4.4 -########### -* Fixed another floating point exception *sigh* -* Fixed -C colon mode -* Added EHLO support for the smtp-auth module, required for some smtpd - - -Release 4.3 -########### -* Fixed a divide by zero bug in the status report function -* Added functionality for skipping accounts (cvs is so nice to report this) -* Snakebyte sent in a patch for cvs for skipping nonexisting accounts -* sent in a patch to fix proxy support for the HTTP module - without proxy authentication - - -Release 4.2 -########### -* Snakebyte sent in modules for SNMP and CVS - great work! -* Snakebyte also expanded the gtk gui to support the two new modules -* Justin sent in a module for smtp-auth ... thanks! -* master_up@post.cz sent in some few patches to fix small glitches -* Incorporated a check from the openbsd port - - -Release 4.1 -########### -* Snakebyte wrote a very nice GTK GUI for hydra! enjoy! -* due a bug, sometimes hydra would kill process -1 ... baaaad boy! -* found passwords are now also printed to stdout if -o option is used -* reported that hydra wouldn't complain on ssh2 option if - compiled without support, fixed -* made an official port for FreeBSD and sent me a - diff to exchange the MD4 of libdes to openssl -* noticed that hydra will crash on big wordlists as - the result of the mallocs there were not checked, fixed -* Snakebyte expanded his PalmOS Version of hydra to nntp and fixed vnc -* Increased the wait time for children from 5 to 15 seconds, as e.g. - snakebyte reported detection problems -* Fixed some display glitches - - -Release v4.0 -############ -# -# This is a summary of changes of the D1 to D5 beta releases and shows -# what makes v4.0 different from 3.1. -# Have fun. Lots of it. -# -# By the way: I need someone to program a nice GTK frontend for hydra, -# would YOU like to do that and receive the fame? Send an email to vh@thc.org ! -# -* For the first time there is not only a UNIX/source release but additionally: - ! Windows release (cygwin compile with dll's) - ! PalmPilot release - ! ARM processor release (for all your Zaurus, iPaq etc. running Linux) -* There are new service attack modules: - ! ms-sql - ! sap r/3 (requires a library) - ! ssh v2 (requires a library) -* Enhancements/Fixes to service attack modules: - ! vnc module didnt work correctly, fixed - ! mysql module supports newer versions now - ! http module received a minor fix and has better virtual host support now - ! http-proxy supports now an optional URL - ! socks5 checks now for false positives and daemons without authentication -* The core code (hydra.c) was rewritten from scratch - ! rewrote the internal distribution functions from scratch. code is now - safer, less error prone, easier to read. - ! multiple target support rewritten which now includes intelligent load - balancing based on success, error and load rate - ! intelligently detect maximum connect numbers for services (per server if - multiple targets are used) - ! intelligent restore file writing - ! Faster (up to 15%) - ! Full Cygwin and Cygwin IPv6 support -* added new tool: pw-inspector - it can be used to just try passwords which - matches the target's password policy -# -# This should be more than enough! :-) -# - -... the rest below is history ... - -########################################################################### -# -# New Hydra v4.0 code branch -# -Release D5 -* added patches by kan@dcit.cz which enhance the proxy module and provide - a small fix for the http module -* small beautifcations to make the compiler happy -! This is the final beta version before public release - - please test everything! - -Release D4 -* Tick made an update to his configure-arm -* snakebyte@gmx.de added imap, vnc and cisco module support to PalmPilot -* fixed VNC module -* enhanced mysql module to work also with 4.0.x (and all future protocol 10 - mysql protocol types) -* enhanced socks5 module to identify daemons which do not require - authentication, and false positive check (otherwise dante would report all - tries as successful) -* fixed a bug in configure for D3 which resulted in compile problems on - several platforms requiring libcrypto - -Release D3 -* added sapr3 attack module (requires libsdk.a and saprfc.h) -* added ssh2 attack module (requires libssh) -* snakebyte@gmx.de added telnet module support for PalmPilot -* fixed the mssql module, should work now -* fixed -e option bug -* fixed -C option bug (didnt work at all!!) -* fixed double detection (with -e option) plus added simple dictionary - double detection -* target port is now displayed on start - -Release D2 -* added better virtual host support to the www/http/https/ssl module - (based on a patch from alla@scanit.be) -* added ARM support (does not work for libdes yet, ssl works), done by - Tick -* added Palm support (well, in reality it is more a rewrite which can use - the hydra-modules), done by snakebyte -* added ms-sql attack module (code based on perl script form HD Moore - , thanks for contributing) - -Release D1 (3 March 2003) -* rewrote the internal distribution functions from scratch. code is now - safer, less error prone, easier to read. -* multiple target support rewritten which now includes intelligent load - balancing based on success, error and load rate -* intelligently detect maximum connect numbers for services (per server if - multiple targets are used) -* intelligent restore file writing -* Faster (up to 15%) -* Full Cygwin and Cygwin IPv6 support -* added new tool: pw-inspector - it can be used to just try passwords which - matches the target's password policy - -########################################################################### - -v3.0 (FEBRUARY 2004) PUBLIC RELEASE -* added a restore function to enable you to continue aborted/crashed - sessions. Just type "hydra -R" to continue a session. - NOTE: this does not work with the -M option! This feature is then disabled! -* added a module for http proxy authentication cracking ("http-proxy") :-) -* added HTTP and SSL/CONNECT proxy support. SSL/CONNECT proxy support works - for *all* TCP protocols, you just need to find a proxy which allows you to - CONNECT on port 23 ... - The environment variable HYDRA_PROXY_HTTP defines the web proxy. The - following syntax is valid: HYDRA_PROXY_HTTP="http://123.45.67.89:8080/" - Same for HYDRA_PROXY_CONNECT. - If you require authentication for the proxy, use the HYDRA_PROXY_AUTH - environment variable: - HYDRA_PROXY_AUTH="login:password" -* fixed parallel host scanning engine (thanks to m0j0.j0j0 for reporting) -* A status, speed and time to completion report is now printed every minute. -* finally updated the README - -v2.9 (FEBRUARY 2004) PRIVATE RELEASE -... - -v2.8 (JANUARY 2004) PRIVATE RELEASE -... - -v2.7 (JANUARY 2004) PUBLIC RELEASE -* small fix for the parallel host code (thanks to m0j0@foofus.net) - -v2.6 (DECEMBER 2003) PUBLIC RELEASE -* fixed a compiling problem for picky compilers. - -v2.5 (NOVEMBER 2003) PUBLIC RELEASE -* added a big patch from m0j0@foofus.net which adds: - - AAA authentication to the cisco-enable module - - Running the attacks on hosts in parallel - - new smbnt module, which uses lanman hashes for authentication, needs libdes - ! great work and thanks ! -* changed code to compile easily on FreeBSD -* changed configure to compile easily on MacOS X - Panther (cool OS btw ...) - -v2.4 (AUGUST 2003) PUBLIC RELEASE -* public release -=== 2.3 stuff=== -* added mysql module (thanks to mcbethh@u-n-f.com) -* small fix in vnc (thanks to the Nessus team) -* added credits for vnc-module (FX/Phenolite) -* new ./configure script for better Solaris and *BSD support (copied from amap) -* updated to new email/www addresses => www.thc.org - -v2.2 (OCTOBER 2002) PUBLIC RELEASE -* fixed a bug in the -P passwordfile handling ... uhhh ... thanks to all - the many people who reported that bug! -* added check if a password in -P passwordfile was already done via the - -e n|s switch - -v2.1 (APRIL 2002) PUBLIC RELEASE -* added ldap cracking mode (thanks to myself, eh ;-) -* added -e option to try null passwords ("-e n") and passwords equal to the - login ("-e s"). When specifying -e, -p/-P is optional (and vice versa) -* when a login is found, hydra will now go on with the next login - -v2.0 (APRIL 2002) PRIVATE RELEASE -! with v1.1.14 of Nessus, Hydra is a Nessus plugin! -* incorporated code to make hydra a nessus plugin (thanks to deraison@cvs.nessus.org !) -* added smb/samba/CIFS cracking mode (thanks to deraison@cvs.nessus.org !) -* added cisco-enable cracking mode (thanks to J.Marx@secunet.de !) -* minor enhancements and fixes - -v1.7 (MARCH 2002) PRIVATE RELEASE -* configure change to better detect OpenSSL -* ported to Solaris - -v1.6 (FEBRUARY 2002) PUBLIC RELEASE -* added socks5 support (thanks to bigbud@weed.tc !) - -v1.5 (DECEMBER 2001) PRIVATE RELEASE -* added -S option for SSL support (for all TCP based protocols) -* added -f option to stop attacking once a valid login/pw has been discovered -* made modules more hydra-mod compliant -* configure stuff thrown out - was not really used and too complicated, - wrote my own, lets hope it works everywhere ;-) - -v1.4 (DECEMBER 2001) PUBLIC RELEASE -* added REXEC cracking module -* added NNTP cracking module -* added VNC cracking module (plus the 3DES library, which is needed) - some - of the code ripped from FX/Phenolite :-) thanks a lot -* added PCNFS cracking module -* added ICQ cracking module (thanks to ocsic !!) -* for the pcnfs cracking module, I had to add the hydra_connect_udp function -* added several compactibility stuff to work with all the M$ crap - -v1.3 (September 2001) PUBLIC RELEASE -* uh W2K telnetd sends null bytes in negotiation mode. workaround implemented. -* Rewrote the finish functions which would sometimes hang. Shutdowns are faster - now as well. -* Fixed the line count (it was always one to much) -* Put more information in the outpufile (-o) -* Removed some configure crap. - -v1.2 (August 2001) PRIVATE RELEASE -* Fixed a BIG bug which resulted in accounts being checked serveral times. ugh -* Fixed the bug which showed the wrong password for a telnet hack. Works for - me. please test. -* Added http basic authentication cracking. Works for me. please test. -* Fixed the ftp cracker module for occasions where a long welcome message was - displayed for ftp. -* Removed some compiler warnings. - -v1.1 (May 2001) PUBLIC RELEASE -* Added wait+reconnect functionality to hydra-mod -* Additional wait+reconnect for cisco module -* Added small waittimes to all attack modules to prevent too fast reconnects -* Added cisco Username/Password support to the telnet module -* Fixed a deadlock in the modules, plus an additional one in the telnet module - -v1.0 (April 2001) PUBLIC RELEASE -* Verified that all service modules really work, no fix necessary ;-) - ... so let's make it public -* Changed the LICENCE - -v0.6 (April 2001) PRIVATE RELEASE -* Added hydra-cisco.c for the cisco 3 times "Password:" type -* Added hydra-imap.c for the imap service -* Fixed a bug in hydra-mod.c: empty logins resulted in an empty - hydra_get_next_password() :-(, additionally the blocking/recv works better - now. (no, not better - perfect ;-) -* Fixed a bug in hydra-telnet.c: too many false alarms for success due some - mis-thinking on my side and I also implemented a more flexible checking -* Fixed hydra-ftp.c to allow more weird reactions -* Fixed all ;-) memory leaks - -v0.5 (December 2000) PUBLIC RELEASE -* NOTE WE HAVE GOT A NEW WWW ADDRESS -> www.thehackerschoice.com -* added telnet protocol -* exchanged snprintf with sprintf(%.250s) to let it compile on more platforms - but still have buffer overflow protection. -* fixed a bug in Makefile.in (introduced by Plasmo ,-) - -v0.4 (August 2000) PUBLIC RELEASE -* Plasmoid added a ./configure script. thanks! - -v0.3 (August 2000) -* first release diff --git a/web/README b/web/README deleted file mode 100644 index 3847215..0000000 --- a/web/README +++ /dev/null @@ -1,530 +0,0 @@ - - H Y D R A - - (c) 2001-2019 by van Hauser / THC - https://github.com/vanhauser-thc/thc-hydra - many modules were written by David (dot) Maciejak @ gmail (dot) com - BFG code by Jan Dlabal - - Licensed under AGPLv3 (see LICENSE file) - - Please do not use in military or secret service organizations, - or for illegal purposes. - - - -INTRODUCTION ------------- -Number one of the biggest security holes are passwords, as every password -security study shows. -This tool is a proof of concept code, to give researchers and security -consultants the possibility to show how easy it would be to gain unauthorized -access from remote to a system. - -THIS TOOL IS FOR LEGAL PURPOSES ONLY! - -There are already several login hacker tools available, however, none does -either support more than one protocol to attack or support parallized -connects. - -It was tested to compile cleanly on Linux, Windows/Cygwin, Solaris, -FreeBSD/OpenBSD, QNX (Blackberry 10) and MacOS. - -Currently this tool supports the following protocols: - Asterisk, AFP, Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird, FTP, - HTTP-FORM-GET, HTTP-FORM-POST, HTTP-GET, HTTP-HEAD, HTTP-POST, HTTP-PROXY, - HTTPS-FORM-GET, HTTPS-FORM-POST, HTTPS-GET, HTTPS-HEAD, HTTPS-POST, - HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, - Oracle SID, Oracle, PC-Anywhere, PCNFS, POP3, POSTGRES, RDP, Rexec, Rlogin, - Rsh, RTSP, SAP/R3, SIP, SMB, SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, - SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, - VNC and XMPP. - -However the module engine for new services is very easy so it won't take a -long time until even more services are supported. -Your help in writing, enhancing or fixing modules is highly appreciated!! :-) - - - -WHERE TO GET ------------- -You can always find the newest release/production version of hydra at its -project page at https://github.com/vanhauser-thc/thc-hydra/releases -If you are interested in the current development state, the public development -repository is at Github: - svn co https://github.com/vanhauser-thc/thc-hydra - or - git clone https://github.com/vanhauser-thc/thc-hydra -Use the development version at your own risk. It contains new features and -new bugs. Things might not work! - - - -HOW TO COMPILE --------------- -To configure, compile and install hydra, just type: - -``` -./configure -make -make install -``` - -If you want the ssh module, you have to setup libssh (not libssh2!) on your -system, get it from http://www.libssh.org, for ssh v1 support you also need -to add "-DWITH_SSH1=On" option in the cmake command line. -IMPORTANT: If you compile on MacOS then you must do this - do not install libssh via brew! - -If you use Ubuntu/Debian, this will install supplementary libraries needed -for a few optional modules (note that some might not be available on your distribution): - -``` -apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev \ - libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev \ - firebird-dev -``` - -This enables all optional modules and features with the exception of Oracle, -SAP R/3, NCP and the apple filing protocol - which you will need to download and -install from the vendor's web sites. - -For all other Linux derivates and BSD based systems, use the system -software installer and look for similarly named libraries like in the -command above. In all other cases, you have to download all source libraries -and compile them manually. - - - -SUPPORTED PLATFORMS -------------------- -- All UNIX platforms (Linux, *BSD, Solaris, etc.) -- MacOS (basically a BSD clone) -- Windows with Cygwin (both IPv4 and IPv6) -- Mobile systems based on Linux, MacOS or QNX (e.g. Android, iPhone, Blackberry 10, Zaurus, iPaq) - - - -HOW TO USE ----------- -If you just enter `hydra`, you will see a short summary of the important -options available. -Type `./hydra -h` to see all available command line options. - -Note that NO login/password file is included. Generate them yourself. -A default password list is however present, use "dpl4hydra.sh" to generate -a list. - -For Linux users, a GTK GUI is available, try `./xhydra` - -For the command line usage, the syntax is as follows: - For attacking one target or a network, you can use the new "://" style: - hydra [some command line options] PROTOCOL://TARGET:PORT/MODULE-OPTIONS - The old mode can be used for these too, and additionally if you want to - specify your targets from a text file, you *must* use this one: - -``` -hydra [some command line options] [-s PORT] TARGET PROTOCOL [MODULE-OPTIONS] -``` - -Via the command line options you specify which logins to try, which passwords, -if SSL should be used, how many parallel tasks to use for attacking, etc. - -PROTOCOL is the protocol you want to use for attacking, e.g. ftp, smtp, -http-get or many others are available -TARGET is the target you want to attack -MODULE-OPTIONS are optional values which are special per PROTOCOL module - -FIRST - select your target - you have three options on how to specify the target you want to attack: - 1. a single target on the command line: just put the IP or DNS address in - 2. a network range on the command line: CIDR specification like "192.168.0.0/24" - 3. a list of hosts in a text file: one line per entry (see below) - -SECOND - select your protocol - Try to avoid telnet, as it is unreliable to detect a correct or false login attempt. - Use a port scanner to see which protocols are enabled on the target. - -THIRD - check if the module has optional parameters - hydra -U PROTOCOL - e.g. hydra -U smtp - -FOURTH - the destination port - this is optional! if no port is supplied the default common port for the - PROTOCOL is used. - If you specify SSL to use ("-S" option), the SSL common port is used by default. - - -If you use "://" notation, you must use "[" "]" brackets if you want to supply -IPv6 addresses or CIDR ("192.168.0.0/24") notations to attack: - hydra [some command line options] ftp://[192.168.0.0/24]/ - hydra [some command line options] -6 smtps://[2001:db8::1]/NTLM - -Note that everything hydra does is IPv4 only! -If you want to attack IPv6 addresses, you must add the "-6" command line option. -All attacks are then IPv6 only! - -If you want to supply your targets via a text file, you can not use the :// -notation but use the old style and just supply the protocol (and module options): - hydra [some command line options] -M targets.txt ftp -You can supply also the port for each target entry by adding ":" after a -target entry in the file, e.g.: - -``` -foo.bar.com -target.com:21 -unusual.port.com:2121 -default.used.here.com -127.0.0.1 -127.0.0.1:2121 -``` - -Note that if you want to attach IPv6 targets, you must supply the -6 option -and *must* put IPv6 addresses in brackets in the file(!) like this: - -``` -foo.bar.com -target.com:21 -[fe80::1%eth0] -[2001::1] -[2002::2]:8080 -[2a01:24a:133:0:00:123:ff:1a] -``` - -LOGINS AND PASSWORDS --------------------- -You have many options on how to attack with logins and passwords -With -l for login and -p for password you tell hydra that this is the only -login and/or password to try. -With -L for logins and -P for passwords you supply text files with entries. -e.g.: - -``` -hydra -l admin -p password ftp://localhost/ -hydra -L default_logins.txt -p test ftp://localhost/ -hydra -l admin -P common_passwords.txt ftp://localhost/ -hydra -L logins.txt -P passwords.txt ftp://localhost/ -``` - -Additionally, you can try passwords based on the login via the "-e" option. -The "-e" option has three parameters: - -``` -s - try the login as password -n - try an empty password -r - reverse the login and try it as password -``` - -If you want to, e.g. try "try login as password and "empty password", you -specify "-e sn" on the command line. - -But there are two more modes for trying passwords than -p/-P: -You can use text file which where a login and password pair is separated by a colon, -e.g.: - -``` -admin:password -test:test -foo:bar -``` - -This is a common default account style listing, that is also generated by the -dpl4hydra.sh default account file generator supplied with hydra. -You use such a text file with the -C option - note that in this mode you -can not use -l/-L/-p/-P options (-e nsr however you can). -Example: - -``` -hydra -C default_accounts.txt ftp://localhost/ -``` - -And finally, there is a bruteforce mode with the -x option (which you can not -use with -p/-P/-C): - -``` --x minimum_length:maximum_length:charset -``` - -the charset definition is `a` for lowercase letters, `A` for uppercase letters, -`1` for numbers and for anything else you supply it is their real representation. -Examples: - -``` --x 1:3:a generate passwords from length 1 to 3 with all lowercase letters --x 2:5:/ generate passwords from length 2 to 5 containing only slashes --x 5:8:A1 generate passwords from length 5 to 8 with uppercase and numbers -``` - -Example: - -``` -hydra -l ftp -x 3:3:a ftp://localhost/ -``` - -SPECIAL OPTIONS FOR MODULES ---------------------------- -Via the third command line parameter (TARGET SERVICE OPTIONAL) or the -m -command line option, you can pass one option to a module. -Many modules use this, a few require it! - -To see the special option of a module, type: - - hydra -U - -e.g. - - ./hydra -U http-post-form - -The special options can be passed via the -m parameter, as 3rd command line -option or in the service://target/option format. - -Examples (they are all equal): - -``` -./hydra -l test -p test -m PLAIN 127.0.0.1 imap -./hydra -l test -p test 127.0.0.1 imap PLAIN -./hydra -l test -p test imap://127.0.0.1/PLAIN -``` - -RESTORING AN ABORTED/CRASHED SESSION ------------------------------------- -When hydra is aborted with Control-C, killed or crashes, it leaves a -"hydra.restore" file behind which contains all necessary information to -restore the session. This session file is written every 5 minutes. -NOTE: the hydra.restore file can NOT be copied to a different platform (e.g. -from little endian to big endian, or from Solaris to AIX) - -HOW TO SCAN/CRACK OVER A PROXY ------------------------------- -The environment variable HYDRA_PROXY_HTTP defines the web proxy (this works -just for the http services!). -The following syntax is valid: - -``` -HYDRA_PROXY_HTTP="http://123.45.67.89:8080/" -HYDRA_PROXY_HTTP="http://login:password@123.45.67.89:8080/" -HYDRA_PROXY_HTTP="proxylist.txt" -``` - -The last example is a text file containing up to 64 proxies (in the same -format definition as the other examples). - -For all other services, use the HYDRA_PROXY variable to scan/crack. -It uses the same syntax. eg: - -``` -HYDRA_PROXY=[connect|socks4|socks5]://[login:password@]proxy_addr:proxy_port -``` - -for example: - -``` -HYDRA_PROXY=connect://proxy.anonymizer.com:8000 -HYDRA_PROXY=socks4://auth:pw@127.0.0.1:1080 -HYDRA_PROXY=socksproxylist.txt -``` - -ADDITIONAL HINTS ----------------- -* sort your password files by likelihood and use the -u option to find - passwords much faster! -* uniq your dictionary files! this can save you a lot of time :-) - cat words.txt | sort | uniq > dictionary.txt -* if you know that the target is using a password policy (allowing users - only to choose a password with a minimum length of 6, containing a least one - letter and one number, etc. use the tool pw-inspector which comes along - with the hydra package to reduce the password list: - cat dictionary.txt | pw-inspector -m 6 -c 2 -n > passlist.txt - - -RESULTS OUTPUT --------------- - -The results are output to stdio along with the other information. Via the -o -command line option, the results can also be written to a file. Using -b, -the format of the output can be specified. Currently, these are supported: - -* `text` - plain text format -* `jsonv1` - JSON data using version 1.x of the schema (defined below). -* `json` - JSON data using the latest version of the schema, currently there - is only version 1. - -If using JSON output, the results file may not be valid JSON if there are -serious errors in booting Hydra. - - -JSON Schema ------------ -Here is an example of the JSON output. Notes on some of the fields: - -* `errormessages` - an array of zero or more strings that are normally printed - to stderr at the end of the Hydra's run. The text is very free form. -* `success` - indication if Hydra ran correctly without error (**NOT** if - passwords were detected). This parameter is either the JSON value `true` - or `false` depending on completion. -* `quantityfound` - How many username+password combinations discovered. -* `jsonoutputversion` - Version of the schema, 1.00, 1.01, 1.11, 2.00, - 2.03, etc. Hydra will make second tuple of the version to always be two - digits to make it easier for downstream processors (as opposed to v1.1 vs - v1.10). The minor-level versions are additive, so 1.02 will contain more - fields than version 1.00 and will be backward compatible. Version 2.x will - break something from version 1.x output. - -Version 1.00 example: -``` -{ - "errormessages": [ - "[ERROR] Error Message of Something", - "[ERROR] Another Message", - "These are very free form" - ], - "generator": { - "built": "2019-03-01 14:44:22", - "commandline": "hydra -b jsonv1 -o results.json ... ...", - "jsonoutputversion": "1.00", - "server": "127.0.0.1", - "service": "http-post-form", - "software": "Hydra", - "version": "v8.5" - }, - "quantityfound": 2, - "results": [ - { - "host": "127.0.0.1", - "login": "bill@example.com", - "password": "bill", - "port": 9999, - "service": "http-post-form" - }, - { - "host": "127.0.0.1", - "login": "joe@example.com", - "password": "joe", - "port": 9999, - "service": "http-post-form" - } - ], - "success": false -} -``` - - -SPEED ------ -through the parallelizing feature, this password cracker tool can be very -fast, however it depends on the protocol. The fastest are generally POP3 -and FTP. -Experiment with the task option (-t) to speed things up! The higher - the -faster ;-) (but too high - and it disables the service) - - - -STATISTICS ----------- -Run against a SuSE Linux 7.2 on localhost with a "-C FILE" containing -295 entries (294 tries invalid logins, 1 valid). Every test was run three -times (only for "1 task" just once), and the average noted down. - -``` - P A R A L L E L T A S K S -SERVICE 1 4 8 16 32 50 64 100 128 -------- -------------------------------------------------------------------- -telnet 23:20 5:58 2:58 1:34 1:05 0:33 0:45* 0:25* 0:55* -ftp 45:54 11:51 5:54 3:06 1:25 0:58 0:46 0:29 0:32 -pop3 92:10 27:16 13:56 6:42 2:55 1:57 1:24 1:14 0:50 -imap 31:05 7:41 3:51 1:58 1:01 0:39 0:32 0:25 0:21 -``` - -(*) -Note: telnet timings can be VERY different for 64 to 128 tasks! e.g. with -128 tasks, running four times resulted in timings between 28 and 97 seconds! -The reason for this is unknown... - -guesses per task (rounded up): - - 295 74 38 19 10 6 5 3 3 - -guesses possible per connect (depends on the server software and config): - - telnet 4 - ftp 6 - pop3 1 - imap 3 - - - -BUGS & FEATURES ---------------- -Hydra: -Email me or David if you find bugs or if you have written a new module. -vh@thc.org (and put "antispam" in the subject line) - - -You should use PGP to encrypt emails to vh@thc.org : - -``` ------BEGIN PGP PUBLIC KEY BLOCK----- -Version: GnuPG v3.3.3 (vh@thc.org) - -mQINBFIp+7QBEADQcJctjohuYjBxq7MELAlFDvXRTeIqqh8kqHPOR018xKL09pZT -KiBWFBkU48xlR3EtV5fC1yEt8gDEULe5o0qtK1aFlYBtAWkflVNjDrs+Y2BpjITQ -FnAPHw0SOOT/jfcvmhNOZMzMU8lIubAVC4cVWoSWJbLTv6e0DRIPiYgXNT5Quh6c -vqhnI1C39pEo/W/nh3hSa16oTc5dtTLbi5kEbdzml78TnT0OASmWLI+xtYKnP+5k -Xv4xrXRMVk4L1Bv9WpCY/Jb6J8K8SJYdXPtbaIi4VjgVr5gvg9QC/d/QP2etmw3p -lJ1Ldv63x6nXsxnPq6MSOOw8+QqKc1dAgIA43k6SU4wLq9TB3x0uTKnnB8pA3ACI -zPeRN9LFkr7v1KUMeKKEdu8jUut5iKUJVu63lVYxuM5ODb6Owt3+UXgsSaQLu9nI -DZqnp/M6YTCJTJ+cJANN+uQzESI4Z2m9ITg/U/cuccN/LIDg8/eDXW3VsCqJz8Bf -lBSwMItMhs/Qwzqc1QCKfY3xcNGc4aFlJz4Bq3zSdw3mUjHYJYv1UkKntCtvvTCN -DiomxyBEKB9J7KNsOLI/CSst3MQWSG794r9ZjcfA0EWZ9u6929F2pGDZ3LiS7Jx5 -n+gdBDMe0PuuonLIGXzyIuMrkfoBeW/WdnOxh+27eemcdpCb68XtQCw6UQARAQAB -tB52YW4gSGF1c2VyICgyMDEzKSA8dmhAdGhjLm9yZz6JAjkEEwECACMCGwMCHgEC -F4AFAlIp/QcGCwkIAwcCBhUKCQgLAgUWAwIBAAAKCRDI8AEqhCFiv2R9D/9qTCJJ -xCH4BUbWIUhw1zRkn9iCVSwZMmfaAhz5PdVTjeTelimMh5qwK2MNAjpR7vCCd3BH -Z2VLB2Eoz9MOgSCxcMOnCDJjtCdCOeaxiASJt8qLeRMwdMOtznM8MnKCIO8X4oo4 -qH8eNj83KgpI50ERBCj/EMsgg07vSyZ9i1UXjFofFnbHRWSW9yZO16qD4F6r4SGz -dsfXARcO3QRI5lbjdGqm+g+HOPj1EFLAOxJAQOygz7ZN5fj+vPp+G/drONxNyVKp -QFtENpvqPdU9CqYh8ssazXTWeBi/TIs0q0EXkzqo7CQjfNb6tlRsg18FxnJDK/ga -V/1umTg41bQuVP9gGmycsiNI8Atr5DWqaF+O4uDmQxcxS0kX2YXQ4CSQJFi0pml5 -slAGL8HaAUbV7UnQEqpayPyyTEx1i0wK5ZCHYjLBfJRZCbmHX7SbviSAzKdo5JIl -Atuk+atgW3vC3hDTrBu5qlsFCZvbxS21PJ+9zmK7ySjAEFH/NKFmx4B8kb7rPAOM -0qCTv0pD/e4ogJCxVrqQ2XcCSJWxJL31FNAMnBZpVzidudNURG2v61h3ckkSB/fP -JnkRy/yxYWrdFBYkURImxD8iFD1atj1n3EI5HBL7p/9mHxf1DVJWz7rYQk+3czvs -IhBz7xGBz4nhpCi87VDEYttghYlJanbiRfNh3okCOAQTAQIAIgUCUin7tAIbAwYL -CQgHAwIGFQgCCQoLBBYCAwECHgECF4AACgkQyPABKoQhYr8OIA//cvkhoKay88yS -AjMQypach8C5CvP7eFCT11pkCt1DMAO/8Dt6Y/Ts10dPjohGdIX4PkoLTkQDwBDJ -HoLO75oqj0CYLlqDI4oHgf2uzd0Zv8f/11CQQCtut5oEK72mGNzv3GgVqg60z2KR -2vpxvGQmDwpDOPP620tf/LuRQgBpks7uazcbkAE2Br09YrUQSCBNHy8kirHW5m5C -nupMrcvuFx7mHKW1z3FuhM8ijG7oRmcBWfVoneQgIT3l2WBniXg1mKFhuUSV8Erc -XIcc11qsKshyqh0GWb2JfeXbAcTW8/4IwrCP+VfAyLO9F9khP6SnCmcNF9EVJyR6 -Aw+JMNRin7PgvsqbFhpkq9N+gVBAufz3DZoMTEbsMTtW4lYG6HMWhza2+8G9XyaL -ARAWhkNVsmQQ5T6qGkI19thB6E/T6ZorTxqeopNVA7VNK3RVlKpkmUu07w5bTD6V -l3Ti6XfcSQqzt6YX2/WUE8ekEG3rSesuJ5fqjuTnIIOjBxr+pPxkzdoazlu2zJ9F -n24fHvlU20TccEWXteXj9VFzV/zbPEQbEqmE16lV+bO8U7UHqCOdE83OMrbNKszl -7LSCbFhCDtflUsyClBt/OPnlLEHgEE1j9QkqdFFy90l4HqGwKvx7lUFDnuF8LYsb -/hcP4XhqjiGcjTPYBDK254iYrpOSMZSIRgQQEQIABgUCUioGfQAKCRBDlBVOdiii -tuddAJ4zMrge4qzajScIQcXYgIWMXVenCQCfYTNQPGkHVyp3dMhJ0NR21TYoYMC5 -Ag0EUin7tAEQAK5/AEIBLlA/TTgjUF3im6nu/rkWTM7/gs5H4W0a04kF4UPhaJUR -gCNlDfUnBFA0QD7Jja5LHYgLdoHXiFelPhGrbZel/Sw6sH2gkGCBtFMrVkm3u7tt -x3AZlprqqRH68Y5xTCEjGRncCAmaDgd2apgisJqXpu0dRDroFYpJFNH3vw9N2a62 -0ShNakYP4ykVG3jTDC4MSl2q3BO5dzn8GYFHU0CNz6nf3gZR+48BG+zmAT77peTS -+C4Mbd6LmMmB0cuS2kYiFRwE2B69UWguLHjpXFcu9/85JJVCl2CIab7l5hpqGmgw -G/yW8HFK04Yhew7ZJOXJfUYlv1EZzR5bOsZ8Z9inC6hvFmxuCYCFnvkiEI+pOxPA -oeNOkMaT/W4W+au0ZVt3Hx+oD0pkJb5if0jrCaoAD4gpWOte6LZA8mAbKTxkHPBr -rA9/JFis5CVNI688O6eDiJqCCJjPOQA+COJI+0V+tFa6XyHPB4LxA46RxtumUZMC -v/06sDJlXMNpZbSd5Fq95YfZd4l9Vr9VrvKXfbomn+akwUymP8RDyc6Z8BzjF4Y5 -02m6Ts0J0MnSYfEDqJPPZbMGB+GAgAqLs7FrZJQzOZTiOXOSIJsKMYsPIDWE8lXv -s77rs0rGvgvQfWzPsJlMIx6ryrMnAsfOkzM2GChGNX9+pABpgOdYII4bABEBAAGJ -Ah8EGAECAAkFAlIp+7QCGwwACgkQyPABKoQhYr+hrg/9Er0+HN78y6UWGFHu/KVK -d8M6ekaqjQndQXmzQaPQwsOHOvWdC+EtBoTdR3VIjAtX96uvzCRV3sb0XPB9S9eP -gRrO/t5+qTVTtjua1zzjZsMOr1SxhBgZ5+0U2aoY1vMhyIjUuwpKKNqj2uf+uj5Y -ZQbCNklghf7EVDHsYQ4goB9gsNT7rnmrzSc6UUuJOYI2jjtHp5BPMBHh2WtUVfYP -8JqDfQ+eJQr5NCFB24xMW8OxMJit3MGckUbcZlUa1wKiTb0b76fOjt0y/+9u1ykd -X+i27DAM6PniFG8BfqPq/E3iU20IZGYtaAFBuhhDWR3vGY4+r3OxdlFAJfBG9XDD -aEDTzv1XF+tEBo69GFaxXZGdk9//7qxcgiya4LL9Kltuvs82+ZzQhC09p8d3YSQN -cfaYObm4EwbINdKP7cr4anGFXvsLC9urhow/RNBLiMbRX/5qBzx2DayXtxEnDlSC -Mh7wCkNDYkSIZOrPVUFOCGxu7lloRgPxEetM5x608HRa3hDHoe5KvUBmmtavB/aR -zlGuZP1S6Y7S13ytiULSzTfUxJmyGYgNo+4ygh0i6Dudf9NLmV+i9aEIbLbd6bni -1B/y8hBSx3SVb4sQVRe3clBkfS1/mYjlldtYjzOwcd02x599KJlcChf8HnWFB7qT -zB3yrr+vYBT0uDWmxwPjiJs= -=ytEf ------END PGP PUBLIC KEY BLOCK----- -``` diff --git a/web/index.html b/web/index.html deleted file mode 100644 index 6786d7f..0000000 --- a/web/index.html +++ /dev/null @@ -1,206 +0,0 @@ - - -THC-HYDRA - fast and flexible network login hacker - -

-
-
-
-
-
-
-
- - -
-

THC-Hydra

-

- A very fast network logon cracker which support many different services. - See feature sets and services coverage page - incl. a speed comparison against ncrack and medusa
-

- Current Version: 8.6 - Last update 2017-07-21 -

-
-
-
-
- [0x00] News and Changelog
-
-
-        Check out the feature sets and services coverage page - including a speed comparison against ncrack and medusa (yes, we win :-) )
-        Development code is available at a public github repository: https://github.com/vanhauser-thc/thc-hydra
-        There is a new section below for online tutorials.
-        Read below for Linux compilation notes.
-        
-
-        CHANGELOG for 8.6
-        ===================
-        ! Development moved to a public github repository: https://github.com/vanhauser-thc/thc-hydra
-        
-        ! Reports came in that the rdp module is not working reliable sometimes, most likely against new Windows versions. please test, report and if possible send a fix
-        * added radmin2 module by catatonic prime - great work!
-        * smb module now checks if SMBv1 is supported by the server and if signing is required
-        * http-form module now supports URLs up to 6000 bytes (thanks to petrock6@github for the patch)
-        * Fix for SSL connections that failed with error:00000000:lib(0):func(0):reason(0) (thanks gaia@github for reporting)
-        * Added new command line option:
-          -c TIME: seconds between login attempts (over all threads, so -t 1 is recommended)
-        * Options put after -R (for loading a restore file) are now honored (and were disallowed before)
-        * merged several patches by Diadlo@github to make the code easier readable. thanks for that!
-        * merged a patch by Diadlo@github that moves the help output to the invididual module
-
-	You can also take a look at the full CHANGES file
-
-
- [0x01] Introduction
-
-	Welcome to the mini website of the THC Hydra project.
-
-	Number one of the biggest security holes are passwords, as every password security study shows.
-	Hydra is a parallized login cracker which supports numerous protocols to attack. New modules
-	are easy to add, beside that, it is flexible and very fast.
-
-        Hydra was tested to compile on Linux, Windows/Cygwin, Solaris 11, FreeBSD 8.1, OpenBSD, OSX,
-        QNX/Blackberry, and is made available under GPLv3 with a special OpenSSL license expansion.
-
-	Currently this tool supports:
-	  Asterisk, AFP, Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird, FTP, HTTP-FORM-GET, HTTP-FORM-POST,
-	  HTTP-GET, HTTP-HEAD, HTTP-POST, HTTP-PROXY, HTTPS-FORM-GET, HTTPS-FORM-POST, HTTPS-GET, HTTPS-POST, HTTPS-HEAD,
-	  HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, Oracle SID, Oracle,
-	  PC-Anywhere, PCNFS, POP3, POSTGRES, RDP, Rexec, Rlogin, Rsh, RTSP, S7-300, SAP/R3, SIP, SMB, SMTP,
-	  SMTP Enum, SNMP, SOCKS5, SSH (v1 and v2), Subversion, Teamspeak (TS2), Telnet, VMware-Auth, VNC and XMPP.
-
-        For HTTP, POP3, IMAP and SMTP, several login mechanisms like plain and MD5 digest etc. are supported.
-
-	This tool is a proof of concept code, to give researchers and security consultants the 
-	possiblity to show how easy it would be to gain unauthorized access from remote to a system.
-
-        The program was written van Hauser and is additiionally supported by David Maciejak.
-
-
- [0x02] Screenshots
-
-	
-	(1) Target selection
-
-	
-	(2) Login/Password setup
-
-	
-	(3) Hydra start and output
-
-
- [0x03] Documentation 
- 
-	Hydra comes with a rather long README file that describes the
-	details about the usage and special options.
-	
-	But sometimes detailed online help can vastly improve your efficency.
-	The following links on the global internet are a recommended read.
-	
-          General usage and options: http://www.aldeid.com/wiki/Thc-hydra
-                                     http://resources.infosecinstitute.com/online-dictionary-attack-with-hydra/
-
-          HTTP basic auth: https://www.owasp.org/index.php/Testing_for_Brute_Force_%28OWASP-AT-004%29
-                           http://www.sillychicken.co.nz/Security/how-to-brute-force-your-router-in-windows.html
-
-          HTTP form based auth: http://www.art0.org/security/performing-a-dictionary-attack-on-an-http-login-form-using-hydra
-                                http://insidetrust.blogspot.com/2011/08/using-hydra-to-dictionary-attack-web.html
-                                http://www.sillychicken.co.nz/Security/how-to-brute-force-http-forms-in-windows.html
-                                https://www.owasp.org/index.php/Testing_for_Brute_Force_%28OWASP-AT-004%29
-
-          Multiple protocols: http://wiki.bywire.org/Hydra
-                              http://www.attackvector.org/brute-force-with-thc-hydra/
-                              http://www.madirish.net/content/hydra-brute-force-utility
-          
-          Telnet: http://www.theprohack.com/2009/04/basics-of-cracking-ftp-and-telnet.html
-                  http://www.adeptus-mechanicus.com/codex/bflog/bflog.html
-	
-        For those people testing with DVWA, this is what you want:
-          hydra -l admin -p password   http-get-form "/dvwa/login.php:username=^USER^&password=^PASS^&submit=Login:Login failed"
-
-	If you find other good ones, just email them in ( vh(at)thc(dot)org ).
-
-
- [0x04] Disclaimer
-
-	1. Please do not use in military or secret service organizations or for illegal purposes.
-	2. The Affero General Public License Version 3 (AGPLv3) applies to this code.
-	3. A special license expansion for OpenSSL is included which is required for the Debian people
-
-
- [0x05] The Art of Downloading: Source and Binaries
- 
-	1. PRODUCTION/RELEASE VERSION:
-	   The source code of state-of-the-art Hydra: hydra-8.6.tar.gz
-	   (compiles on all UNIX based platforms - even MacOS X, Cygwin on Windows, ARM-Linux, Android, iPhone, Blackberry 10, etc.)
-
-        2. DEVELOPMENT VERSION:
-           You can download and compile the current development version of hydra always in its public GITHUB repository:
-           https://github.com/vanhauser-thc/thc-hydra by either
-             svn co https://github.com/vanhauser-thc/thc-hydra
-           or
-             git clone https://github.com/vanhauser-thc/thc-hydra.git
-           Note that this is the development state! New features - and new bugs. Things might not work!
-
-	3. The source code of an old, deprecated version of Hydra ONLY in case v7.x gives you problems on unusual and old platforms:
-	   hydra-5.9.1-src.tar.gz
-
-	4. The Win32/Cywin binary release: --- not anymore ---
-	   Install cygwin from http://www.cygwin.com
-	   and compile it yourself. If you do not have cygwin installed - how
-	   do you think you will do proper securiy testing? duh ...
-
-        5. ARM and Palm binaries here are old and not longer maintained:
-	     ARM:  hydra-5.0-arm.tar.gz
-             Palm: hydra-4.6-palm.zip
-
-
- [0x06] Compilation Help
-
-        Hydra compiles fine on all platforms that have gcc - Linux, all BSD, Mac OS/X, Cygwin on Windows, Solaris, etc.
-        It should even compile on historical SunOS, Ultrix etc. platforms :-)
-        
-        There are many optional modules for network protocols like SSH, SVN etc. that require libraries.
-        If they are not found, these optional libraries will not be supported in your binary.
-        
-        If you are on Linux, the following commands install all necessary libraries:
- 
-        Ubuntu/Debian:  apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev firebird2.1-dev libncp-dev libncurses5-dev
-        Redhat/Fedora:  yum install openssl-devel pcre-devel ncpfs-devel postgresql-devel libssh-devel subversion-devel libncurses-devel
-        OpenSuSE:       zypper install libopenssl-devel pcre-devel libidn-devel ncpfs-devel libssh-devel postgresql-devel subversion-devel libncurses-devel
-        
-        This enables all optional modules and features with the exception of Oracle, SAP R/3 and the
-        Apple filing protocol - which you will need to download and install from the vendor's web sites.
-        For Oracle this is (install the basic and SDK packages): http://www.oracle.com/technetwork/database/features/instant-client/index.html
-
-        For all other Linux derivates and BSD based systems, use the system software installer and look for
-        similar named libraries like in the command above.
-        In all other cases you have to download all source libraries and compile them manually; 
-        the configure script output tells you what is missing and where to get it from.
-        
-
- [0x07] Development & Contributions
-
-	Your contributions are more than welcomed!
-	
-	If you find bugs, coded enhancements or wrote a new attack module for a service,
-	please send them to vh (at) thc (dot) org
-
-	Interesting attack modules would be:
-	OSPF, BGP, PIM, PPTP, ...
-	(or anything else you might be able to do (and is not there yet))
-	
-	Please note that you can also download and commit via github: https://github.com/vanhauser-thc/thc-hydra
-
- 
- Comments and suggestions are welcome.
-
- Yours sincerly,
-
- van Hauser
- The Hackers Choice
- http://www.thc.org/thc-hydra
-
-
- diff --git a/web/network_password_cracker_comparison.html b/web/network_password_cracker_comparison.html deleted file mode 100644 index ac3aa69..0000000 --- a/web/network_password_cracker_comparison.html +++ /dev/null @@ -1,917 +0,0 @@ - - - - - - - - - - - - State of network password cracker art - Comparison Of Features and Services - hydra - - - - - - - -
-
-
- -

Comparison of Features and Services Coverage

- - - -
-
-

Contents

- -
-

Introduction

-

Hydra is born more than 10 years ago, this page is used as a recap of the functionalities it provides, but also -the differences in feature sets, services coverage and code between the most -popular network authentication cracker tools available. Each feature is compared against -Hydra as of the current version. This table is updated as new -features are added to the project. If you find any inaccuracies - on this page please do not hesitate to contact us. -

Below, Yes means it is supported, No means it is not supported, Unknown means the support is partial -

-

- -

Code Comparison

-

This table just lists latest available versions and platforms compatibility.

- - - - - - - - - - -
Code - Hydra - Medusa - Ncrack -
Version - 8.6 - 2.2 - 0.4 alpha -
Last Update - July 2017 - November 2015 - April 2011 -
Supported Platforms - Linux, *BSD, Solaris, Mac OS X, any Unix, Windows (Cygwin) - Linux, *BSD, Solaris and Mac OS X - Linux, *BSD, Mac OS X, Windows -

- -

Features Table

-

This table lists the feature sets of each tools. -

- - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Feature - Hydra - Medusa - Ncrack -
License - AGPLv3 - GPLv2 - GPLv2 + Nmap terms -
IPv6 Support -Yes -No -Yes -
Graphic User Interface -Yes -Yes -No -
Internationalized support (RFC 4013) -Yes -No -No -
HTTP proxy support -Yes -Yes -No -
SOCKS proxy support -Yes -No -No -
# of supported protocols - 51 - 22 - 7 -

- -

Services Coverage

-

This table lists the services coverage of each tools. For each services, many authentication methods are possible. If you require other ways or find issues in Hydra, please -contact us as the service depends on RFC implementations, some adjustements may be needed. -

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service - Details - Hydra - Medusa - Ncrack -
ADAM-6500 - -Yes -No -No -
AFP - -Yes -Yes -No -
Asterisk - -Yes -No -No -
Cisco Password - -Yes -No -No -
Cisco Enable - -Yes -No -No -
CVS - -Yes -Yes -No -
Firebird - -Yes -No -No -
FTP -Yes -Yes -Yes -
SSL supportAUTH TLS & FTP over SSL -AUTH TLS & FTP over SSL -No -
HTTP -Method(s)GET, HEAD, POST -GET -GET -
Basic AuthYes -Yes -Yes -
DIGEST-MD5 AuthYes -Yes -No -
NTLM AuthYes -Yes -No -
SSL supportHTTPS -HTTPS -HTTPS -
HTTP Form -Method(s)GET, POST -GET, POST -No -
SSL supportHTTPS -HTTPS -No -
HTTP Proxy -Basic AuthYes -No -No -
DIGEST-MD5 AuthYes -No -No -
NTLM AuthYes -No -No -
SSL supportHTTPS -No -No -
HTTP PROXY URL Enumeration - -Yes -No -No -
ICQ -v5 -Yes 1 -No -No -
IMAP -LOGIN supportYes -Yes -No -
AUTH LOGIN supportYes -No -No -
AUTH PLAIN supportYes -Yes -No -
AUTH CRAM-MD5 supportYes -No -No -
AUTH CRAM-SHA1 supportYes -No -No -
AUTH CRAM-SHA256 supportYes -No -No -
AUTH DIGEST-MD5 supportYes -No -No -
AUTH NTLM supportYes -Yes -No -
AUTH SCRAM-SHA1 supportYes -No -No -
SSL supportIMAPS & STARTTLS -IMAPS & STARTTLS -No -
IRC -General server password -Yes -No -No -
OPER mode password -Yes -No -No -
LDAP -v2, Simple supportYes -No -No -
v3, Simple supportYes -No -No -
v3, AUTH CRAM-MD5 supportYes -No -No -
v3, AUTH DIGEST-MD5 supportYes -No -No -
MS-SQL - -Yes -Yes -No -
MySQL -v3.x -Yes -Yes -No -
v4.x -Yes -Yes -No -
v5.x -Yes -Yes -No -
NCP - -Yes -Yes -No -
NNTP -USER support -Yes -Yes -No -
AUTH LOGIN support -Yes -No -No -
AUTH PLAIN support -Yes -No -No -
AUTH CRAM-MD5 support -Yes -No -No -
AUTH DIGEST-MD5 support -Yes -No -No -
AUTH NTLM support -Yes -No -No -
SSL support -STARTTLS & NNTP over SSL -No -No -
Oracle -DatabaseYes -Yes 2 -No -
TNS ListenerYes -No -No -
SID EnumerationYes -No -No -
PC-NFS -Yes -No -No -
pcAnywhere -Native Authentication -Yes 1 -Yes -No -
OS Based Authentication (MS) -No -Yes -No -
POP3 -USER supportYes -Yes -Yes -
APOP supportYes -No -No -
AUTH LOGIN supportYes -Yes -No -
AUTH PLAIN supportYes -Yes -No -
AUTH CRAM-MD5 supportYes -No -No -
AUTH CRAM-SHA1 supportYes -No -No -
AUTH CRAM-SHA256 supportYes -No -No -
AUTH DIGEST-MD5 supportYes -No -No -
AUTH NTLM supportYes -Yes -No -
SSL SupportPOP3S & STARTTLS -POP3S & STARTTLS -POP3S -
PostgreSQL - -Yes -Yes -No -
Asterisk - -Yes -No -No -
RDP -Windows Workstation -Yes -Yes 2 -Yes -
Windows Server -Yes -Yes 2 -Partial -
Domain Auth -Yes -Yes 2 -No -
REDIS - -Yes -No -No -
REXEC - -Yes -Yes -No -
RLOGIN - -Yes -Yes -No -
RPCAP - -Yes -No -No -
RSH - -Yes -Yes -No -
RTSP - -Yes -No -No -
SAP R/3 - -Yes 1 -No -No -
Siemens S7-300 - -Yes -No -No -
SIP -Yes 1 -No -No -
SSL supportSIP over SSL -No -No -
SMB -NetBIOS ModeYes -Yes -No -
W2K Native ModeYes -Yes -Yes -
Hash modeYes -Yes -No -
Clear Text AuthYes -Yes -No -
LMv1 AuthYes -Yes -Yes -
LMv2 AuthYes -Yes -Yes -
NTLMv1 AuthYes -Yes -Yes -
NTLMv2 AuthYes -Yes -Yes -
SMTP -AUTH LOGIN supportYes -Yes -No -
AUTH PLAIN supportYes -Yes -No -
AUTH CRAM-MD5 supportYes -No -No -
AUTH DIGEST-MD5 supportYes -No -No -
AUTH NTLM supportYes -Yes -No -
SSL supportSMTPS & STARTTLS -SMTPS & STARTTLS -No -
SMTP User Enum -VRFY cmdYes -Yes -No -
EXPN cmdYes -Yes -No -
RCPT TO cmdYes -Yes -No -
SNMP -v1 -Yes -Yes -No -
v2c -Yes -Yes -No -
v3 -Partial (MD5/SHA1 auth only)(MD5/SHA1 auth only) -No -No -
SOCKS -v5, Password Auth -Yes -No -No -
SSH -v1Yes -No -No -
v2Yes -Yes -Yes -
SSH Keys -v1, v2 -Yes -No -No -
Subversion (SVN) - -Yes -Yes -No -
TeamSpeak -TS2 -Yes 1 -No -No -
Telnet - -Yes -Yes -Yes -
XMPP -AUTH LOGIN supportYes -No -No -
AUTH PLAIN supportYes -No -No -
AUTH CRAM-MD5 supportYes -No -No -
AUTH DIGEST-MD5 supportYes -No -No -
AUTH SCRAM-SHA1 supportYes -No -No -
VMware Auth Daemon -v1.00 / v1.10 -Yes -Yes -No -
SSL support -Yes -Yes -No -
VNC -RFB 3.x password support -Yes -Yes -No -
RFB 3.x user+password support -No -Partial(UltraVNC only) -No -
RFB 4.x password support -Yes -Yes -No -
RFB 4.x user+password support -No -Partial(UltraVNC only) -No -

- -

Speed Comparison

-

This table gives some speed data (in second) for 2 popular services supported by each cracking tool (as of September 2011). The value displayed is the min value of 3 consecutive runs. -Each tool was configured to run 1, 4 and 16 task(s)/job(s) at a time. A login and password lists corresponding to 20 attempts was used. The smaller the value the better.

- - - - - - - - - - - - - - - - -
Speed (in s) - Hydra - Medusa - Ncrack -
1 Task / FTP module - 11.93 - 12.97 - 18.01 -
4 Tasks / FTP module - 4.20 - 5.24 - 9.01 -
16 Tasks / FTP module - 2.44 - 2.71 - 12.01 -
1 Task / SSH v2 module - 32.56 - 33.84 - 45.02 -
4 Tasks / SSH v2 module - 10.95 - Broken - Missed -
16 Tasks / SSH v2 module - 5.14 - Broken - Missed -

- - -

Notes

-
  1. These Hydra modules have not been checked with latest version of softwares/protocols available. -
  2. -
  3. Medusa support is relying on a script or a wrapper. -
- -
- -
-
-
-
- -
- -
- - diff --git a/web/webfiles/css/commonPrint.css b/web/webfiles/css/commonPrint.css deleted file mode 100644 index ecf146d..0000000 --- a/web/webfiles/css/commonPrint.css +++ /dev/null @@ -1,267 +0,0 @@ -/* -** MediaWiki Print style sheet for CSS2-capable browsers. -** Copyright Gabriel Wicke, http://www.aulinx.de/ -** -** Derived from the plone (http://plone.org/) styles -** Copyright Alexander Limi -*/ - -/* Thanks to A List Apart (http://alistapart.com/) for useful extras */ -a.stub, -a.new{ color:#ba0000; text-decoration:none; } - -#toc { - /*border:1px solid #2f6fab;*/ - border:1px solid #aaaaaa; - background-color:#f9f9f9; - padding:5px; -} -.tocindent { - margin-left: 2em; -} -.tocline { - margin-bottom: 0px; -} - -/* images */ -div.floatright { - float: right; - clear: right; - margin: 0; - position:relative; - border: 0.5em solid White; - border-width: 0.5em 0 0.8em 1.4em; -} -div.floatright p { font-style: italic;} -div.floatleft { - float: left; - margin: 0.3em 0.5em 0.5em 0; - position:relative; - border: 0.5em solid White; - border-width: 0.5em 1.4em 0.8em 0; -} -div.floatleft p { font-style: italic; } -/* thumbnails */ -div.thumb { - margin-bottom: 0.5em; - border-style: solid; border-color: White; - width: auto; - overflow: hidden; -} -div.thumb div { - border:1px solid #cccccc; - padding: 3px !important; - background-color:#f9f9f9; - font-size: 94%; - text-align: center; -} -div.thumb div a img { - border:1px solid #cccccc; -} -div.thumb div div.thumbcaption { - border: none; - padding: 0.3em 0 0.1em 0; -} -div.magnify { display: none; } -div.tright { - float: right; - clear: right; - border-width: 0.5em 0 0.8em 1.4em; -} -div.tleft { - float: left; - margin-right:0.5em; - border-width: 0.5em 1.4em 0.8em 0; -} -img.thumbborder { - border: 1px solid #dddddd; -} - -/* table standards */ -table.rimage { - float:right; - width:1pt; - position:relative; - margin-left:1em; - margin-bottom:1em; - text-align:center; -} - -body { - background: White; - /*font-size: 11pt !important;*/ - color: Black; - margin: 0; - padding: 0; -} - -.noprint, -div#jump-to-nav, -div.top, -div#column-one, -#colophon, -.editsection, -.toctoggle, -.tochidden, -div#f-poweredbyico, -div#f-copyrightico, -li#viewcount, -li#about, -li#disclaimer, -li#privacy { - /* Hides all the elements irrelevant for printing */ - display: none; -} - -ul { - list-style-type: square; -} - -#content { - background: none; - border: none ! important; - padding: 0 ! important; - margin: 0 ! important; -} -#footer { - background : white; - color : black; - border-top: 1px solid black; -} - -h1, h2, h3, h4, h5, h6 { - font-weight: bold; -} - -p, .documentDescription { - margin: 1em 0 ! important; - line-height: 1.2em; -} - -.tocindent p { - margin: 0 0 0 0 ! important; -} - -pre { - border: 1pt dashed black; - white-space: pre; - font-size: 8pt; - overflow: auto; - padding: 1em 0; - background : white; - color : black; -} - -table.listing, -table.listing td { - border: 1pt solid black; - border-collapse: collapse; -} - -a { - color: Black !important; - background: none !important; - padding: 0 !important; -} - -a:link, a:visited { - color: #520; - background: transparent; - text-decoration: underline; -} - -#content a.external.text:after, #content a.external.autonumber:after { - /* Expand URLs for printing */ - content: " (" attr(href) ") "; -} - -#globalWrapper { - width: 100% !important; - min-width: 0 !important; -} - -#content { - background : white; - color : black; -} - -#column-content { - margin: 0 !important; -} - -#column-content #content { - padding: 1em; - margin: 0 !important; -} -/* MSIE/Win doesn't understand 'inherit' */ -a, a.external, a.new, a.stub { - color: black ! important; - text-decoration: none ! important; -} - -/* Continue ... */ -a, a.external, a.new, a.stub { - color: inherit ! important; - text-decoration: inherit ! important; -} - -img { border: none; } -img.tex { vertical-align: middle; } -span.texhtml { font-family: serif; } - -#siteNotice { display: none; } - -table.gallery { - border: 1px solid #cccccc; - margin: 2px; - padding: 2px; - background-color:#ffffff; -} - -table.gallery tr { - vertical-align:top; -} - -div.gallerybox { - border: 1px solid #cccccc; - margin: 2px; - background-color:#f9f9f9; - width: 150px; -} - -div.gallerybox div.thumb { - text-align: center; - border: 1px solid #cccccc; - margin: 2px; -} - -div.gallerytext { - font-size: 94%; - padding: 2px 4px; -} - -/* -** Diff rendering -*/ -table.diff { background:white; } -td.diff-otitle { background:#ffffff; } -td.diff-ntitle { background:#ffffff; } -td.diff-addedline { - background:#ccffcc; - font-size: smaller; - border: solid 2px black; -} -td.diff-deletedline { - background:#ffffaa; - font-size: smaller; - border: dotted 2px black; -} -td.diff-context { - background:#eeeeee; - font-size: smaller; -} -.diffchange { - color: silver; - font-weight: bold; - text-decoration: underline; -} diff --git a/web/webfiles/css/index.css b/web/webfiles/css/index.css deleted file mode 100644 index f010367..0000000 --- a/web/webfiles/css/index.css +++ /dev/null @@ -1,2 +0,0 @@ -/* generated user stylesheet */ -a.new, #quickbar a.new { color: #CC2200; } diff --git a/web/webfiles/css/index_002.css b/web/webfiles/css/index_002.css deleted file mode 100644 index aba5a86..0000000 --- a/web/webfiles/css/index_002.css +++ /dev/null @@ -1 +0,0 @@ -/* CSS placed here will affect the print output */ \ No newline at end of file diff --git a/web/webfiles/css/index_003.css b/web/webfiles/css/index_003.css deleted file mode 100644 index bf5c91c..0000000 --- a/web/webfiles/css/index_003.css +++ /dev/null @@ -1 +0,0 @@ -/** CSS placed here will be applied to all skins */ \ No newline at end of file diff --git a/web/webfiles/css/index_004.css b/web/webfiles/css/index_004.css deleted file mode 100644 index 3b97146..0000000 --- a/web/webfiles/css/index_004.css +++ /dev/null @@ -1,20 +0,0 @@ -/**
 */
-#footer { text-align: center; border: none; padding: 0; }
-#p-cactions li.selected { border-color: #708090; padding: 0 0 .2em 0; font-weight: bold; }
-pre
-{
-    generic-family: "Envy Code R", "Liberation Mono", Consolas, "Lucida Console", monospace;
-
-    /* border: 1px solid #dbdbdb; */
-
-    border: 1px solid #cfcfcf;
-    background-color: #fefefe;
-    line-height: 1.1em;
-    padding: 0.55em;
-/*
-    -moz-border-radius-topright: 0.5em;
-    -webkit-border-top-right-radius: 0.5em;
-    border-radius-topright: 0.5em;
-*/
-}
-/** 
*/ \ No newline at end of file diff --git a/web/webfiles/css/main.css b/web/webfiles/css/main.css deleted file mode 100644 index a864cc9..0000000 --- a/web/webfiles/css/main.css +++ /dev/null @@ -1,1461 +0,0 @@ -/* -** MediaWiki 'monobook' style sheet for CSS2-capable browsers. -** Copyright Gabriel Wicke - http://wikidev.net/ -** License: GPL (http://www.gnu.org/copyleft/gpl.html) -** -** Loosely based on http://www.positioniseverything.net/ordered-floats.html by Big John -** and the Plone 2.0 styles, see http://plone.org/ (Alexander Limi,Joe Geldart & Tom Croucher, -** Michael Zeltner and Geir Bækholt) -** All you guys rock :) -*/ - -#column-content { - width: 100%; - float: right; - margin: 0 0 .6em -12.2em; - padding: 0; -} - -#content { - margin: 2.2em 0 0 2.2em; - padding: 0 1em 1.5em 1em; - background: white; - color: black; - border: 1px solid #aaa; - border-right: none; - line-height: 1.5em; - position: relative; - z-index: 2; -} - -#column-one { - padding-top: 30px; -} - -#content { - background: white; - color: black; - border: 1px solid #aaa; - border-right: none; - line-height: 1.5em; -} - -/* Font size: -** We take advantage of keyword scaling- browsers won't go below 9px -** More at http://www.w3.org/2003/07/30-font-size -** http://style.cleverchimp.com/font_size_intervals/altintervals.html -*/ - -body { - font: x-small sans-serif; - background-color: #ffffff; - font-family: Verdana, helvetica, sans-serif; - font-size: 10px; - color: black; - margin: 0; - padding: 0; -} - -/* scale back up to a sane default */ -#globalWrapper { - font-size: 127%; - width: 100%; - margin: 0; - padding: 0; -} -.visualClear { - clear: both; -} - -/* general styles */ - -table { - font-size: 100%; - color: black; - /* we don't want the bottom borders of

s to be visible through - floated tables */ - background-color: white; -} -fieldset table { - /* but keep table layouts in forms clean... */ - background: none; -} - -a:link, a:visited, a:active { text-decoration: underline; color: #173F99 } -a:hover { color: #505050 } - -a.stub { - color: #772233; -} -a.new, #p-personal a.new { - color: #ba0000; -} -a.new:visited, #p-personal a.new:visited { - color: #a55858; -} - -img { - border: none; - vertical-align: middle; -} -p { - margin: .4em 0 .5em 0; - line-height: 1.5em; -} -p img { - margin: 0; -} - -hr { - height: 1px; - color: #aaa; - background-color: #aaa; - border: 0; - margin: .2em 0 .2em 0; -} - -h1, h2, h3, h4, h5, h6 { - color: black; - background: none; - font-weight: normal; - margin: 0; - padding-top: .5em; - padding-bottom: .17em; - border-bottom: 1px solid #aaa; -} -h1 { font-size: 188%; } -h1 .editsection { font-size: 53%; } -h2 { font-size: 150%; } -h2 .editsection { font-size: 67%; } -h3, h4, h5, h6 { - border-bottom: none; - font-weight: bold; -} -h3 { font-size: 132%; } -h3 .editsection { font-size: 76%; font-weight: normal; } -h4 { font-size: 116%; } -h4 .editsection { font-size: 86%; font-weight: normal; } -h5 { font-size: 100%; } -h5 .editsection { font-weight: normal; } -h6 { font-size: 80%; } -h6 .editsection { font-size: 125%; font-weight: normal; } - -ul { - line-height: 1.5em; - list-style-type: square; - margin: .3em 0 0 1.5em; - padding: 0; - list-style-image: url(bullet.gif); -} -ol { - line-height: 1.5em; - margin: .3em 0 0 3.2em; - padding: 0; - list-style-image: none; -} -li { - margin-bottom: .1em; -} -dt { - font-weight: bold; - margin-bottom: .1em; -} -dl { - margin-top: .2em; - margin-bottom: .5em; -} -dd { - line-height: 1.5em; - margin-left: 2em; - margin-bottom: .1em; -} - -fieldset { - border: 1px solid #2f6fab; - margin: 1em 0 1em 0; - padding: 0 1em 1em; - line-height: 1.5em; -} -fieldset.nested { - margin: 0 0 0.5em 0; - padding: 0 0.5em 0.5em; -} -legend { - padding: .5em; - font-size: 95%; -} -form { - border: none; - margin: 0; -} - -textarea { - width: 100%; - padding: .1em; -} - -input.historysubmit { - padding: 0 .3em .3em .3em !important; - font-size: 94%; - cursor: pointer; - height: 1.7em !important; - margin-left: 1.6em; -} -select { - vertical-align: top; -} -abbr, acronym, .explain { - border-bottom: 1px dotted black; - color: black; - background: none; - cursor: help; -} -q { - font-family: Times, "Times New Roman", serif; - font-style: italic; -} -/* disabled for now -blockquote { - font-family: Times, "Times New Roman", serif; - font-style: italic; -}*/ -code { - background-color: #f9f9f9; -} -pre { - padding: 1em; - border: 1px dashed #2f6fab; - color: black; - background-color: #f9f9f9; - line-height: 1.1em; -} - -/* -** the main content area -*/ - -#siteSub { - display: none; -} -#jump-to-nav { - display: none; -} - -#contentSub, #contentSub2 { - font-size: 84%; - line-height: 1.2em; - margin: 0 0 1.4em 1em; - color: #7d7d7d; - width: auto; -} -span.subpages { - display: block; -} - -/* Some space under the headers in the content area */ -#bodyContent h1, #bodyContent h2 { - margin-bottom: .6em; -} -#bodyContent h3, #bodyContent h4, #bodyContent h5 { - margin-bottom: .3em; -} -.firstHeading { - margin-bottom: .1em; - /* These two rules hack around bug 2013 (fix for more limited bug 11325). - When bug 2013 is fixed properly, they should be removed. */ - line-height: 1.2em; - padding-bottom: 0; -} - -/* user notification thing */ -.usermessage { - background-color: #ffce7b; - border: 1px solid #ffa500; - color: black; - font-weight: bold; - margin: 2em 0 1em; - padding: .5em 1em; - vertical-align: middle; -} -#siteNotice { - text-align: center; - font-size: 95%; - padding: 0 .9em; -} -#siteNotice p { - margin: 0; - padding: 0; -} -.success { - color: green; - font-size: larger; -} -.error { - color: red; - font-size: larger; -} -.errorbox, .successbox { - font-size: larger; - border: 2px solid; - padding: .5em 1em; - float: left; - margin-bottom: 2em; - color: #000; -} -.errorbox { - border-color: red; - background-color: #fff2f2; -} -.successbox { - border-color: green; - background-color: #dfd; -} -.errorbox h2, .successbox h2 { - font-size: 1em; - font-weight: bold; - display: inline; - margin: 0 .5em 0 0; - border: none; -} - -.catlinks { - border: 1px solid #aaa; - background-color: #f9f9f9; - padding: 5px; - margin-top: 1em; - clear: both; -} -/* currently unused, intended to be used by a metadata box -in the bottom-right corner of the content area */ -.documentDescription { - /* The summary text describing the document */ - font-weight: bold; - display: block; - margin: 1em 0; - line-height: 1.5em; -} -.documentByLine { - text-align: right; - font-size: 90%; - clear: both; - font-weight: normal; - color: #76797c; -} - -/* emulate center */ -.center { - width: 100%; - text-align: center; -} -*.center * { - margin-left: auto; - margin-right: auto; -} -/* small for tables and similar */ -.small, .small * { - font-size: 94%; -} -table.small { - font-size: 100%; -} - -/* -** content styles -*/ - -#toc, -.toc, -.mw-warning { - border: 1px solid #aaa; - background-color: #f9f9f9; - padding: 5px; - font-size: 95%; -} -#toc h2, -.toc h2 { - display: inline; - border: none; - padding: 0; - font-size: 100%; - font-weight: bold; -} -#toc #toctitle, -.toc #toctitle, -#toc .toctitle, -.toc .toctitle { - text-align: center; -} -#toc ul, -.toc ul { - list-style-type: none; - list-style-image: none; - margin-left: 0; - padding-left: 0; - text-align: left; -} -#toc ul ul, -.toc ul ul { - margin: 0 0 0 2em; -} -#toc .toctoggle, -.toc .toctoggle { - font-size: 94%; -} - -.mw-warning { - margin-left: 50px; - margin-right: 50px; - text-align: center; -} - -/* images */ -div.floatright, table.floatright { - clear: right; - float: right; - position: relative; - margin: 0 0 .5em .5em; - border: 0; -/* - border: .5em solid white; - border-width: .5em 0 .8em 1.4em; -*/ -} -div.floatright p { font-style: italic; } -div.floatleft, table.floatleft { - float: left; - clear: left; - position: relative; - margin: 0 .5em .5em 0; - border: 0; -/* - margin: .3em .5em .5em 0; - border: .5em solid white; - border-width: .5em 1.4em .8em 0; -*/ -} -div.floatleft p { font-style: italic; } -/* thumbnails */ -div.thumb { - margin-bottom: .5em; - border-style: solid; - border-color: white; - width: auto; -} -div.thumbinner { - border: 1px solid #ccc; - padding: 3px !important; - background-color: #f9f9f9; - font-size: 94%; - text-align: center; - overflow: hidden; -} -html .thumbimage { - border: 1px solid #ccc; -} -html .thumbcaption { - border: none; - text-align: left; - line-height: 1.4em; - padding: 3px !important; - font-size: 94%; -} -div.magnify { - float: right; - border: none !important; - background: none !important; -} -div.magnify a, div.magnify img { - display: block; - border: none !important; - background: none !important; -} -div.tright { - clear: right; - float: right; - border-width: .5em 0 .8em 1.4em; -} -div.tleft { - float: left; - clear: left; - margin-right: .5em; - border-width: .5em 1.4em .8em 0; -} -img.thumbborder { - border: 1px solid #dddddd; -} -.hiddenStructure { - display: none; -} - -/* -** classes for special content elements like town boxes -** intended to be referenced directly from the wiki src -*/ - -/* -** User styles -*/ -/* table standards */ -table.rimage { - float: right; - position: relative; - margin-left: 1em; - margin-bottom: 1em; - text-align: center; -} -.toccolours { - border: 1px solid #aaa; - background-color: #f9f9f9; - padding: 5px; - font-size: 95%; -} - -/* -** edit views etc -*/ -.special li { - line-height: 1.4em; - margin: 0; - padding: 0; -} - -/* -** keep the whitespace in front of the ^=, hides rule from konqueror -** this is css3, the validator doesn't like it when validating as css2 -*/ -#bodyContent a.external, -#bodyContent a[href ^="gopher://"] { - background: url(external.png) center right no-repeat; - padding-right: 13px; -} -#bodyContent a[href ^="https://"], -.link-https { - background: url(lock_icon.gif) center right no-repeat; - padding-right: 16px; -} -#bodyContent a[href ^="mailto:"], -.link-mailto { - background: url(mail_icon.gif) center right no-repeat; - padding-right: 18px; -} -#bodyContent a[href ^="news://"] { - background: url(news_icon.png) center right no-repeat; - padding-right: 18px; -} -#bodyContent a[href ^="ftp://"], -.link-ftp { - background: url(file_icon.gif) center right no-repeat; - padding-right: 18px; -} -#bodyContent a[href ^="irc://"], -#bodyContent a.extiw[href ^="irc://"], -.link-irc { - background: url(discussionitem_icon.gif) center right no-repeat; - padding-right: 18px; -} -#bodyContent a.external[href $=".ogg"], #bodyContent a.external[href $=".OGG"], -#bodyContent a.external[href $=".mid"], #bodyContent a.external[href $=".MID"], -#bodyContent a.external[href $=".midi"], #bodyContent a.external[href $=".MIDI"], -#bodyContent a.external[href $=".mp3"], #bodyContent a.external[href $=".MP3"], -#bodyContent a.external[href $=".wav"], #bodyContent a.external[href $=".WAV"], -#bodyContent a.external[href $=".wma"], #bodyContent a.external[href $=".WMA"], -.link-audio { - background: url("audio.png") center right no-repeat; - padding-right: 13px; -} -#bodyContent a.external[href $=".ogm"], #bodyContent a.external[href $=".OGM"], -#bodyContent a.external[href $=".avi"], #bodyContent a.external[href $=".AVI"], -#bodyContent a.external[href $=".mpeg"], #bodyContent a.external[href $=".MPEG"], -#bodyContent a.external[href $=".mpg"], #bodyContent a.external[href $=".MPG"], -.link-video { - background: url("video.png") center right no-repeat; - padding-right: 13px; -} -#bodyContent a.external[href $=".pdf"], #bodyContent a.external[href $=".PDF"], -#bodyContent a.external[href *=".pdf#"], #bodyContent a.external[href *=".PDF#"], -#bodyContent a.external[href *=".pdf?"], #bodyContent a.external[href *=".PDF?"], -.link-document { - background: url("document.png") center right no-repeat; - padding-right: 12px; -} - -/* disable interwiki styling */ -#bodyContent a.extiw, -#bodyContent a.extiw:active { - color: #36b; - background: none; - padding: 0; -} -#bodyContent a.external { - color: #36b; -} -/* this can be used in the content area to switch off -special external link styling */ -#bodyContent .plainlinks a { - background: none !important; - padding: 0 !important; -} - -/* -** the personal toolbar -*/ - -#p-personal { - width: 100%; - white-space: nowrap; - padding: 0; - margin: 0; - position: absolute; - top: 9.2em; - z-index: 0; - border: none; - background: none; - overflow: visible; - line-height: 1.2em; -} - -#p-personal h5 { - display: none; -} -#p-personal .portlet, -#p-personal .pBody { - padding: 0; - margin: 0; - border: none; - z-index: 0; - overflow: visible; - background: none; -} -/* this is the ul contained in the portlet */ -#p-personal ul { - border: none; - line-height: 1.4em; - color: #2f6fab; - padding: 0 2em 0 3em; - margin: 0; - text-align: right; - text-transform: lowercase; - list-style: none; - z-index: 0; - background: none; - cursor: default; -} -#p-personal li { - z-index: 0; - border: none; - padding: 0; - display: inline; - color: #2f6fab; - margin-left: 1em; - line-height: 1.2em; - background: none; -} -#p-personal li.active { - font-weight: bold; -} -#p-personal li a { - text-decoration: none; - color: #005896; - padding-bottom: 0.2em; - background: none; -} -#p-personal li a:hover { - background-color: white; - padding-bottom: 0.2em; - text-decoration: none; -} - - -/* the icon in front of the user name, single quotes -in bg url to hide it from iemac */ -li#pt-userpage, -li#pt-anonuserpage, -li#pt-login { - background: url(user.gif) top left no-repeat; - padding-left: 20px; - text-transform: none; -} -#p-personal ul { - text-transform: lowercase; -} -#p-personal li.active { - font-weight: bold; -} -/* -** the page-related actions- page/talk, edit etc -*/ - -/* -** the page-related actions- page/talk, edit etc -*/ -#p-cactions { - position: absolute; - top: 10.5em; - left: 12.2em; - margin: 0; - white-space: nowrap; - width: 76%; - line-height: 1.1em; - overflow: visible; - background: none; - border-collapse: collapse; - padding-left: 1em; - list-style: none; - font-size: 95%; -} -#p-cactions .hiddenStructure { - display: none; -} -#p-cactions ul { - list-style: none; -} -#p-cactions li { - display: inline; - border: 1px solid #aaa; - border-bottom: none; - padding: 0 0 .1em 0; - margin: 0 .3em 0 0; - overflow: visible; - background: white; -} -#p-cactions li.selected { - border-color: #fabd23; - padding: 0 0 .2em 0; - font-weight: bold; -} -#p-cactions li a { - background-color: #fbfbfb; - color: #002bb8; - border: none; - padding: 0 .8em .3em; - text-decoration: none; - text-transform: lowercase; - position: relative; - z-index: 0; - margin: 0; -} -#p-cactions li.selected a { - z-index: 3; - background-color: #fff; - padding: 0 1em .2em!important; -} -#p-cactions .new a { - color: #ba0000; -} -#p-cactions li a:hover { - z-index: 3; - text-decoration: none; - background-color: #fff; -} -#p-cactions h5 { - display: none; -} -#p-cactions li.istalk { - margin-right: 0; -} -#p-cactions li.istalk a { - padding-right: .5em; -} -#p-cactions #ca-addsection a { - padding-left: .4em; - padding-right: .4em; -} -/* offsets to distinguish the tab groups */ -li#ca-talk { - margin-right: 1.6em; -} -li#ca-watch, li#ca-unwatch, li#ca-varlang-0, li#ca-print { - margin-left: 1.6em; -} - - -#p-cactions .pBody { - font-size: 1em; - background-color: transparent; - color: inherit; - border-collapse: inherit; - border: 0; - padding: 0; -} -#p-cactions .hiddenStructure { - display: none; -} -#p-cactions li a { - text-transform: lowercase; -} - -#p-lang { - position: relative; - z-index: 3; -} - -/* TODO: #t-iscite is only used by the Cite extension, come up with some - * system which allows extensions to add to this file on the fly - */ -#t-ispermalink, #t-iscite { - color: #999; -} -/* -** footer -*/ -#footer { - background-color: white; - border-top: 1px solid #fabd23; - border-bottom: 1px solid #fabd23; - margin: .6em 0 1em 0; - padding: .4em 0 1.2em 0; - text-align: center; - font-size: 90%; - margin-left: 20px; -} -#footer li { - display: inline; - margin: 0 1.3em; -} -#f-poweredbyico, #f-copyrightico { - margin: 0 8px; - position: relative; - top: -2px; /* Bump it up just a tad */ -} -#f-poweredbyico { - float: right; - height: 1%; -} -#f-copyrightico { - float: left; - height: 1%; -} - -/* js pref toc */ -#preftoc { - margin: 0; - padding: 0; - width: 100%; - clear: both; -} -#preftoc li { - background-color: #f0f0f0; - color: #000; -} -#preftoc li { - margin: 1px -2px 1px 2px; - float: left; - padding: 2px 0 3px 0; - border: 1px solid #fff; - border-right-color: #716f64; - border-bottom: 0; - position: relative; - white-space: nowrap; - list-style-type: none; - list-style-image: none; - z-index: 3; -} -#preftoc li.selected { - font-weight: bold; - background-color: #f9f9f9; - border: 1px solid #aaa; - border-bottom: none; - cursor: default; - top: 1px; - padding-top: 2px; - margin-right: -3px; -} -#preftoc > li.selected { - top: 2px; -} -#preftoc a, -#preftoc a:active { - display: block; - color: #000; - padding: 0 .7em; - position: relative; - text-decoration: none; -} -#preftoc li.selected a { - cursor: default; - text-decoration: none; -} -#prefcontrol { - padding-top: 2em; - clear: both; -} -#preferences { - margin: 0; - border: 1px solid #aaa; - clear: both; - padding: 1.5em; - background-color: #F9F9F9; -} -.prefsection { - border: none; - padding: 0; - margin: 0; -} -.prefsection fieldset { - border: 1px solid #aaa; - float: left; - margin-right: 2em; -} -.prefsection legend { - font-weight: bold; -} -.prefsection table, .prefsection legend { - background-color: #F9F9F9; -} -.mainLegend { - display: none; -} -div.prefsectiontip { - font-size: x-small; - padding: .2em 2em; - color: #666; -} -.btnSavePrefs { - font-weight: bold; - padding-left: .3em; - padding-right: .3em; -} - -.preferences-login { - clear: both; - margin-bottom: 1.5em; -} - -.prefcache { - font-size: 90%; - margin-top: 2em; -} - -div#userloginForm form, -div#userlogin form#userlogin2 { - margin: 0 3em 1em 0; - border: 1px solid #aaa; - clear: both; - padding: 1.5em 2em; - background-color: #f9f9f9; - float: left; -} -.rtl div#userloginForm form, -.rtl div#userlogin form#userlogin2 { - float: right; -} - -div#userloginForm table, -div#userlogin form#userlogin2 table { - background-color: #f9f9f9; -} - -div#userloginForm h2, -div#userlogin form#userlogin2 h2 { - padding-top: 0; -} - -div#userlogin .captcha, -div#userloginForm .captcha { - border: 1px solid #bbb; - padding: 1.5em 2em; - background-color: white; -} - -#loginend, #signupend { - clear: both; -} - -#userloginprompt, #languagelinks { - font-size: 85%; -} - -#login-sectiontip { - font-size: 85%; - line-height: 1.2; - padding-top: 2em; -} - -#userlogin .loginText, #userlogin .loginPassword { - width: 12em; -} - -#userloginlink a, #wpLoginattempt, #wpCreateaccount { - font-weight: bold; -} - -/* -** IE/Mac fixes, hope to find a validating way to move this -** to a separate stylesheet. This would work but doesn't validate: -** @import("IEMacFixes.css"); -*/ -/* tabs: border on the a, not the div */ -* > html #p-cactions li { border: none; } -* > html #p-cactions li a { - border: 1px solid #aaa; - border-bottom: none; -} -* > html #p-cactions li.selected a { border-color: #fabd23; } -/* footer icons need a fixed width */ -* > html #f-poweredbyico, -* > html #f-copyrightico { width: 88px; } -* > html #bodyContent, -* > html #bodyContent pre { - overflow-x: auto; - width: 100%; - padding-bottom: 25px; -} - -/* more IE fixes */ -/* float/negative margin brokenness */ -* html #footer {margin-top: 0;} -* html #column-content { - display: inline; - margin-bottom: 0; -} -* html div.editsection { font-size: smaller; } -#pagehistory li.selected { position: relative; } - -/* Mac IE 5.0 fix; floated content turns invisible */ -* > html #column-content { - float: none; -} -* > html #column-one { - position: absolute; - left: 0; - top: 0; -} -* > html #footer { - margin-left: 13.2em; -} -.redirectText { - font-size: 150%; - margin: 5px; -} - -.printfooter { - display: none; -} - -.not-patrolled { - background-color: #ffa; -} -div.patrollink { - clear: both; - font-size: 75%; - text-align: right; -} -span.newpage, span.minor, span.bot { - font-weight: bold; -} -span.unpatrolled { - font-weight: bold; - color: red; -} - -.sharedUploadNotice { - font-style: italic; -} - -span.updatedmarker { - color: black; - background-color: #0f0; -} - -table.gallery { - border: 1px solid #ccc; - margin: 2px; - padding: 2px; - background-color: white; -} - -table.gallery tr { - vertical-align: top; -} - -table.gallery td { - vertical-align: top; - background-color: #f9f9f9; - border: solid 2px white; -} -/* Keep this temporarily so that cached pages will display right */ -table.gallery td.galleryheader { - text-align: center; - font-weight: bold; -} -table.gallery caption { - font-weight: bold; -} - -div.gallerybox { - margin: 2px; -} - -div.gallerybox div.thumb { - text-align: center; - border: 1px solid #ccc; - margin: 2px; -} - -div.gallerytext { - overflow: hidden; - font-size: 94%; - padding: 2px 4px; -} - -span.comment { - font-style: italic; -} - -span.changedby { - font-size: 95%; -} - -.previewnote { - text-indent: 3em; - color: #c00; - border-bottom: 1px solid #aaa; - padding-bottom: 1em; - margin-bottom: 1em; -} - -.previewnote p { - margin: 0; - padding: 0; -} - -.editExternally { - border: 1px solid gray; - background-color: #ffffff; - padding: 3px; - margin-top: 0.5em; - float: left; - font-size: small; - text-align: center; -} -.editExternallyHelp { - font-style: italic; - color: gray; -} - -.toggle { - margin-left: 2em; - text-indent: -2em; -} - -/* Classes for EXIF data display */ -table.mw_metadata { - font-size: 0.8em; - margin-left: 0.5em; - margin-bottom: 0.5em; - width: 300px; -} - -table.mw_metadata caption { - font-weight: bold; -} - -table.mw_metadata th { - font-weight: normal; -} - -table.mw_metadata td { - padding: 0.1em; -} - -table.mw_metadata { - border: none; - border-collapse: collapse; -} - -table.mw_metadata td, table.mw_metadata th { - text-align: center; - border: 1px solid #aaaaaa; - padding-left: 0.1em; - padding-right: 0.1em; -} - -table.mw_metadata th { - background-color: #f9f9f9; -} - -table.mw_metadata td { - background-color: #fcfcfc; -} - -table.collapsed tr.collapsable { - display: none; -} - - -/* filetoc */ -ul#filetoc { - text-align: center; - border: 1px solid #aaaaaa; - background-color: #f9f9f9; - padding: 5px; - font-size: 95%; - margin-bottom: 0.5em; - margin-left: 0; - margin-right: 0; -} - -#filetoc li { - display: inline; - list-style-type: none; - padding-right: 2em; -} - -input#wpSummary { - width: 80%; -} - -/* @bug 1714 */ -input#wpSave, input#wpDiff { - margin-right: 0.33em; -} - -#wpSave { - font-weight: bold; -} - -/* Classes for article validation */ - -table.revisionform_default { - border: 1px solid #000000; -} - -table.revisionform_focus { - border: 1px solid #000000; - background-color:#00BBFF; -} - -tr.revision_tr_default { - background-color:#EEEEEE; -} - -tr.revision_tr_first { - background-color:#DDDDDD; -} - -p.revision_saved { - color: green; - font-weight:bold; -} - -#mw_trackbacks { - border: solid 1px #bbbbff; - background-color: #eeeeff; - padding: 0.2em; -} - - -/* Allmessages table */ - -#allmessagestable th { - background-color: #b2b2ff; -} - -#allmessagestable tr.orig { - background-color: #ffe2e2; -} - -#allmessagestable tr.new { - background-color: #e2ffe2; -} - -#allmessagestable tr.def { - background-color: #f0f0ff; -} - - -/* noarticletext */ -div.noarticletext { - border: 1px solid #ccc; - background: #fff; - padding: .2em 1em; - color: #000; -} - -div#searchTargetContainer { - left: 10px; - top: 10px; - width: 90%; - background: white; -} - -div#searchTarget { - padding: 3px; - margin: 5px; - background: #F0F0F0; - border: solid 1px blue; -} - -div#searchTarget ul li { - list-style: none; -} - -div#searchTarget ul li:before { - color: orange; - content: "\00BB \0020"; -} - -div#searchTargetHide { - float:right; - border:solid 1px black; - background:#DCDCDC; - padding:2px; -} - -#powersearch p { - margin-top:0px; -} - -div.multipageimagenavbox { - border: solid 1px silver; - padding: 4px; - margin: 1em; - background: #f0f0f0; -} - -div.multipageimagenavbox div.thumb { - border: none; - margin-left: 2em; - margin-right: 2em; -} - -div.multipageimagenavbox hr { - margin: 6px; -} - -table.multipageimage td { - text-align: center; -} - -/** Special:Version */ - -table#sv-ext, table#sv-hooks, table#sv-software { - margin: 1em; - padding:0em; -} - -#sv-ext td, #sv-hooks td, #sv-software td, -#sv-ext th, #sv-hooks th, #sv-software th { - border: 1px solid #A0A0A0; - padding: 0 0.15em 0 0.15em; -} -#sv-ext th, #sv-hooks th, #sv-software th { - background-color: #F0F0F0; - color: black; - padding: 0 0.15em 0 0.15em; -} -tr.sv-space{ - height: 0.8em; - border:none; -} -tr.sv-space td { display: none; } - -/* - Table pager (e.g. Special:Imagelist) - - remove underlines from the navigation link - - collapse borders - - set the borders to outsets (similar to Special:Allmessages) - - remove line wrapping for all td and th, set background color - - restore line wrapping for the last two table cells (description and size) -*/ -.TablePager { min-width: 80%; } -.TablePager_nav a { text-decoration: none; } -.TablePager { border-collapse: collapse; } -.TablePager, .TablePager td, .TablePager th { - border: 1px solid #aaaaaa; - padding: 0 0.15em 0 0.15em; -} -.TablePager th { background-color: #eeeeff } -.TablePager td { background-color: #ffffff } -.TablePager tr:hover td { background-color: #eeeeff } - -.imagelist td, .imagelist th { white-space: nowrap } -.imagelist .TablePager_col_links { background-color: #eeeeff } -.imagelist .TablePager_col_img_description { white-space: normal } -.imagelist th.TablePager_sort { background-color: #ccccff } - -.templatesUsed { margin-top: 1.5em; } - -.mw-summary-preview { - margin: 0.1em 0; -} - -/* Friendlier slave lag warnings */ -div.mw-lag-warn-normal, -div.mw-lag-warn-high { - padding: 3px; - text-align: center; - margin: 3px auto; -} -div.mw-lag-warn-normal { - border: 1px solid #FFCC66; - background-color: #FFFFCC; -} -div.mw-lag-warn-high { - font-weight: bold; - border: 2px solid #FF0033; - background-color: #FFCCCC; -} - -.MediaTransformError { - background-color: #ccc; - padding: 0.1em; -} -.MediaTransformError td { - text-align: center; - vertical-align: middle; - font-size: 90%; -} - -/** Special:Search stuff */ -div#mw-search-interwiki-caption { - text-align: center; - font-weight: bold; - font-size: 95%; -} - -.mw-search-interwiki-project { - font-size: 97%; - text-align: left; - padding-left: 0.2em; - padding-right: 0.15em; - padding-bottom: 0.2em; - padding-top: 0.15em; - background: #cae8ff; -} - -/* God-damned hack for the crappy layout */ -.os-suggest { - font-size: 127%; -} - - -.top { vertical-align: middle; text-align: center; padding: 0px; font-family: Verdana, helvitica, sans-serif; font-size: 12px; } - -.sidebar { - position: absolute; - padding-left: 3px; - top: 11.5em; -} - -.inspbox { - margin-left: 5px; - margin-top: 5px; - margin-bottom: 5px; - width: 145px; -} - -#footer { text-align: center; border: none; padding: 0; } -#p-cactions li.selected { border-color: #708090; padding: 0 0 .2em 0; font-weight: bold; } -pre -{ - generic-family: "Envy Code R", "Liberation Mono", Consolas, "Lucida Console", monospace; - - /* border: 1px solid #dbdbdb; */ - - border: 1px solid #cfcfcf; - background-color: #fefefe; - line-height: 1.1em; - padding: 0.55em; - -} diff --git a/web/webfiles/css/shared.css b/web/webfiles/css/shared.css deleted file mode 100644 index 7404a15..0000000 --- a/web/webfiles/css/shared.css +++ /dev/null @@ -1,320 +0,0 @@ -/** - * CSS in this file is used by *all* skins (that have any CSS at all). Be - * careful what you put in here, since what looks good in one skin may not in - * another, but don't ignore the poor non-Monobook users either. - */ -.mw-plusminus-null { color: #aaa; } - -.texvc { direction: ltr; unicode-bidi: embed; } -img.tex { vertical-align: middle; } -span.texhtml { font-family: serif; } - -/* add a bit of margin space between the preview and the toolbar */ -/* this replaces the ugly


we used to insert into the page source */ -#wikiPreview.ontop { margin-bottom: 1em; } - -/* Stop floats from intruding into edit area in previews */ -#toolbar, #wpTextbox1 { clear: both; } - -div#mw-js-message { - margin: 1em 5%; - padding: 0.5em 2.5%; - border: solid 1px #ddd; - background-color: #fcfcfc; -} - -/* Edit section links */ -.editsection { - float: right; - margin-left: 5px; -} - -/** - * File histories - */ -table.filehistory { - border:1px solid #ccc; - border-collapse:collapse; -} - -table.filehistory th, -table.filehistory td { - padding: 0 0.2em 0 0.2em; - vertical-align:top; - border:1px solid #ccc; -} -table.filehistory th { - text-align: left; -} -table.filehistory td.mw-imagepage-filesize, -table.filehistory th.mw-imagepage-filesize { - white-space:nowrap; -} - -table.filehistory td.filehistory-selected { - font-weight: bold; -} - -/* - * rev_deleted stuff - */ -li span.deleted, span.history-deleted { - text-decoration: line-through; - color: #888; - font-style: italic; -} - -/** - * Forms - */ -body.ltr td.mw-label { text-align: right; } -body.ltr td.mw-input { text-align: left; } -body.ltr td.mw-submit { text-align: left; } -body.rtl td.mw-label { text-align: left; } -body.rtl td.mw-input { text-align: right; } -body.rtl td.mw-submit { text-align: right; } - -td.mw-label { vertical-align: top; } -td.mw-submit { white-space: nowrap; } - -/** - * Image captions - */ -body.rtl .thumbcaption { text-align:right; } -body.rtl .magnify { float:left; } - -body.ltr .thumbcaption { text-align:left; } -body.ltr .magnify { float:right; } - -/** - * Hidden categories - */ -.mw-hidden-cats-hidden { display: none; } -.catlinks-allhidden { display: none; } - -/* Convenience links to edit block, delete and protect reasons */ -p.mw-ipb-conveniencelinks, p.mw-protect-editreasons, -p.mw-filedelete-editreasons, p.mw-delete-editreasons { - font-size: 90%; - float: right; -} - -/* Search results */ -div.searchresult { - font-size: 95%; - width:38em; -} -.mw-search-results li { - padding-bottom: 1em; - list-style:none; -} -.mw-search-result-data { - color: green; - font-size: 97%; -} - -td#mw-search-menu { - padding-left:6em; - font-size:85%; -} - -div#mw-search-interwiki { - float: right; - width: 18em; - border-style: solid; - border-color: #AAAAAA; - border-width: 1px; - margin-top: 2ex; -} - -div#mw-search-interwiki li { - font-size: 95%; -} - -.mw-search-interwiki-more { - float: right; - font-size: 90%; -} - -span.searchalttitle { - font-size: 95%; -} - -div.searchdidyoumean { - font-size: 127%; - margin-bottom: 1ex; - margin-top: 1ex; - /* Note that this color won't affect the link, as desired. */ - color: #c00; -} - -div.searchdidyoumean em { - font-weight: bold; -} - -.searchmatch { - font-weight: bold; -} - -div.searchresults { - border:1px solid darkblue; - padding-top: 10px; - padding-bottom: 10px; - padding-left: 20px; - padding-right: 20px; -} - -/* - * UserRights stuff - */ -.mw-userrights-disabled { - color: #888; -} - -table.mw-userrights-groups * td,table.mw-userrights-groups * th { - padding-right: 1.5em; -} - -/* - * OpenSearch ajax suggestions - */ -.os-suggest { - overflow: auto; - overflow-x: hidden; - position: absolute; - top: 0px; - left: 0px; - width: 0px; - background-color: white; - background-color: Window; - border-style: solid; - border-color: #AAAAAA; - border-width: 1px; - z-index:99; - visibility:hidden; - font-size:95%; -} - -table.os-suggest-results { - font-size: 95%; - cursor: pointer; - border: 0; - border-collapse: collapse; - width: 100%; -} - -td.os-suggest-result, td.os-suggest-result-hl { - white-space: nowrap; - background-color: white; - background-color: Window; - color: black; - color: WindowText; - padding: 2px; -} -td.os-suggest-result-hl, -td.os-suggest-result-hl-webkit { - background-color: #4C59A6; - color: white; -} -td.os-suggest-result-hl { - /* System colors are misimplemented in Safari 3.0 and earlier, - making highlighted text illegible... */ - background-color: Highlight; - color: HighlightText; -} - -.os-suggest-toggle { - position: relative; - left: 1ex; - font-size: 65%; -} -.os-suggest-toggle-def { - position: absolute; - top: 0px; - left: 0px; - font-size: 65%; - visibility: hidden; -} - -/* Page history styling */ -/* the auto-generated edit comments */ -.autocomment { color: gray; } -#pagehistory .history-user { - margin-left: 0.4em; - margin-right: 0.2em; -} -#pagehistory span.minor { font-weight: bold; } -#pagehistory li { border: 1px solid white; } -#pagehistory li.selected { - background-color: #f9f9f9; - border: 1px dashed #aaa; -} - -/* - * Special:ListGroupRights styling - * Special:Statistics styling -*/ - -table.mw-listgrouprights-table, -table.mw-statistics-table { - border: 1px solid #ccc; - border-collapse: collapse; -} - -table.mw-listgrouprights-table tr { - vertical-align: top; -} - -table.mw-listgrouprights-table td, table.mw-listgrouprights-table th, -table.mw-statistics-table td, table.mw-statistics-table th { - padding: 0.5em 0.2em 0.5em 0.2em; - border: 1px solid #ccc; -} - -td.mw-statistics-numbers { - text-align: right; -} - -/* Special:SpecialPages styling */ -h4.mw-specialpagesgroup { - background-color: #dcdcdc; - padding: 2px; - margin: .3em 0em 0em 0em; -} -.mw-specialpagerestricted { - font-weight: bold; -} - -#shared-image-dup, #shared-image-conflict { - font-style: italic; -} - -/* Special:EmailUser styling */ -table.mw-emailuser-table { - width: 98%; -} -td#mw-emailuser-sender, td#mw-emailuser-recipient { - font-weight: bold; -} - -/* - * Recreating deleted page warning - * Reupload file warning - * Page protection warning - * incl. log entries for these warnings - */ -div.mw-warning-with-logexcerpt { - padding: 3px; - margin-bottom: 3px; - border: 2px solid #2F6FAB; -} -div.mw-warning-with-logexcerpt ul li { - font-size: 90%; -} - -/* (show/hide) revision deletion links */ -span.mw-revdelundel-link, -strong.mw-revdelundel-link { - font-family: monospace; - font-size: smaller -} \ No newline at end of file diff --git a/web/webfiles/img/Cross.png b/web/webfiles/img/Cross.png deleted file mode 100644 index b96b6d27a90130d671fd8c237a5085c421e70db1..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 953 zcmeAS@N?(olHy`uVBq!ia0vp^Vn8g!!3-obe&3S^QY`6?zK#qG8~eHcB(ehe3dtTp zz6=aiY77hwEes65fIcEW#v{iwNFt||HQ?g1qW9vDn7e)>%z8e-7+%&L`DBe zN;UvVZSCI-3?Bpq|LN#_Vqkb7EBi!B>J0dR|upFMka|Ni}R=gw{4zP&d+z1rD%?xaZz z7cQJXfBugjKi7!A{WTvEbxddW?YD278HB?^g2EaiAhqkfIczlvOfV1%r`+p{1^Yk*=Y6 yh=GxniG`JcskVWEm4SixVoaH;91_n=8KbLh*2~7aTf`P^W diff --git a/web/webfiles/img/Tick.png b/web/webfiles/img/Tick.png deleted file mode 100644 index d5f75bac554e3875f7ca4ce4c18e63eb3b01e505..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 871 zcmV-t1DO1YP)eSad^gZEa<4bO1wgWnpw>WFU8GbZ8()Nlj2!fese{00O^B zL_t(I%caxHPZLoT$MNqBZD-m^G1QbwMQe%;F^DURJ2&o4e55g{@d0b1|A2`xDmG30 z3tSLfXo3`0#x-t?O)x~nS1}9@wGS*MbYz$*b6t?Aq>}hJySuobobx;P!hh6@*%xAX zWLP|ycp&)S%FpG+k;_L!YC0v7x050}niT-jzhE=-GvZ?AB7Il;C^n09YMtm$b*?9` z)Alb|I+Nz;)uSv}3lwSv0^R`OjxegB{#}Q&?`B2%UYg!Zy%ekhpI1I}ICPlER)pe{ zBDqWs`A@OeA6|>}-EHjs#(S2EON8Yxk*x^jsWQ1tj#xA%wSan27sDgN;{Mou@hf)W z)&&xm6TC6sU@RGQs-5(<_fnoJGk#~BSTrWJEJZKs;{1*CM9)R3Ez}s;9AN0o5UHCf z5?8jd%5sISU>Aw@1f|K+4y*-C4kbl*s+(2cDnW0M`l~u0pMB)SwG+&Jo1#GhvE74(C{}Pt4OF?njgbGldzRe|pa9;wlHi2Z#sbR41#uV!wUZ+0m?cIRB9N={VCbr`fW$ zi1oxcq#dFylY z3^z75gl*f{wvFRBtgo*#IWbB6R2<`xL1r*RwN&M6`xn5K#2I4mzOv$C>6{%xMRS*Pz{ADW^e%Q7C1hqkshyk0MXK!8XjLPtjj zilPt<27ivcwzej0+h%if6UT9AG#Xfzh2uB~A!s(6NRre7`u%>qUN4HGplMobhNfu> x*L87Smu9nx>$<-U-{bKh%kqz|{eHg$@EvRDDSDtx55KmK}&J+V?8*X6yHGikZo z&c|OLZ1y}x$74lpGJWptNd<#_&pi`j+jpliO&!zJ@qoi6)qJwEn6+CD@WYWyec*-D z0@${RZ5ix7aDl}$^O-zmXa*1=-8ulX=S~iAq@;=-$HUMSrlGUOaK{(L@i*%g#5u&#GBD|4MSHLhC){wrlDh* z20q(h_0maw;ES~_*p`W98Ca%4UE^H}Lw+HpnAcnJL?BU^@29e^1*J4}UG>Q@Qs1(6 z`D7+Pod>|RrhCLn>aZ;X+cYpuo%*Kxj2)GO=XqlR6wn4pAp}yBC{06Y5j*9>s$0eyG!6E&rsBUx}$36LASDZLiTJOxC8o)ACDmjo& znc$U0V^|Xj^Xj4kva>9Fwu!DZq$UwkU>l0UU=GD+t2%*_2fl?YA4GJB0uD5W8VKxu--Q->4q_hbF$eI0*XYS>tNVAGCX z*1yMQrVwI#R)+cV7aNvjOdmIt^H*+ht@%DTTH4WdjZyvqjL6HPFffQSWewh@FAsFI zcXWU7AoL+HDZ?`Tv)+u@*&}w$nG*EPpB6I1qw_@mh(Q2UH~d9;%`NxnnJdY&r8Tv; ztB!4Gtv+@cX!Sg=?U7(1L^d!G7^G+94Cxn`yU@tY37c6@6`(S51di);wl*hP8>_lo z8!xxk96t@-ZQu@Y8@TCtUgB{TE5HVPKvr7)fXuYn2~ugjpWfTk>hvCf{SCq*=OFh! Rj6eVY002ovPDHLkV1hz8a+v@C diff --git a/web/webfiles/img/gnu-fdl.png b/web/webfiles/img/gnu-fdl.png deleted file mode 100644 index 1371aba886e5fbefc5b9ea6749a893ba440729e1..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1748 zcmV;_1}piAP)P%~FqR%=x^SzB0bS2jTBo}itqpN_4dkD{cZuA-2wqn59uk))=hu%wcur=+i?n5L+u zu%?=)sivr^r>d-}x2&MJt)aQDqPnl6yRf9Pw6VOhrMmCa#=pnO#>mRY(a6Ec%gEHs#Ldsk)y>A%&d1Nu z&ezY#(9+M?(8*eI;=;i0>=IH9@>Fem~?CJ07=`~Ls@o3YLe00009 za7bBm000XU000XU0RWnu7ytkO2XskIMF-Rb3jrA~R_QA)0000TbVXQnLvL+uWo~o; zLvm$dbY)~9cWHEJAXI2&AV*0}Q14_VZU6uSo=HSORCwC8mWNLiK@`TFY(P)2m%Fo} zSWdwp$eq1_VvEEs7HkL>>|(Fj3&e(sAoi|EP7i`DDhZ;XfPm<6i{$%PoY_9-fr*4k zZr<#>%x~Ym`R2{E+R{R;)fQV5ZR2hHXETCh4?Bz9?qX-^EDrpBLMP(aE*Kyropth0 z?wDasvi<{a>3$tN->JVYe~}LU7-%|I^Yig$Hl>d*FjSjs7ViE99()O?&RP=_85xt5 zSp{4UQNfeQeyDRvc2i)SBca}4$1{j$>}mocPk4|wQUP})pEdBX0ZoESiOCBb@(dM= zjEgp}9C;x!n2>r6e23iknPcU#o(Nvx3{*thY`brM`2M@*ZQ5As8DEY}8Qh+fNYkY$ z{f9RlaaSH32QiLP)TI-5u(kAHsRWK9yP&PvRp|{KNg2vW+rPjU$TS|Dk2CE1KOBm4 zgw4#LUPeBKLRl37tpDoDa$L$~vPEdW(Cq~#rV(#+VKZWM1U~QY?Zcg+4cIwF>P* zCGaoUIq)c;N&^3uz{=tP5By{c-AE%(Zcse7^>vA^AWGg4{6Z|bs-$8%2VM<0shNyQ z4(vG_nd{oiXBC>y5@DcJ)#sw$g}Q8aNi!;gWtg#)R9K-J|(mNuTW1Sit8vr(2~@ zu$bF#CsO(rhy}qk$7}mM7E8~oTl$pEP%C~Uu&0wu%p4d~#`so6Po{q?|uLGclTG_Rb8vQy4t(fTKCKM>i`TnDOo815C{MOAr^4I3J?b%z`?=8!6LxJ z!y_UhAfe!(q97xq5Mp7YO+Kr>yv*Wu%|jd*w{Qj^YLw}QRWqPyO867@&w`L$yvMY z3jyW2sFYAw?v(7bzNd_+&8)Yp1U^Sm%G_{N_9oX&Yy$5HqU%DBm-|nhOt}Wh+sv>h zdcyvU#Y`3Fwkaj2X@HN|SIEbd@f%9CXQC0}6*?KVfE975e#`p|lrOncL_dLD-@7uQ;!_3Jwx!}~rMb9^P;pU)w!e8&nncH_@H(vy^ zYNct|1X?w9<9zN~ocTEC*nV-M)*B%5bG@i`NZfeYT-9{E=5T89#<;A|HzhlxQD#A^ zYi4-iq`Fx)JRUOQ#ODy3cCp`*?sgYv%soh+SwQw?TB85d%j8AJ_+dO{T!a`sLgDW` zup1ltXh=@A9Cra0zmF7Zm2>EE|G43#ci8W_{`kxvF&=X9)5goRnk8_9TP_G7P%*~W z8GJH1G+jrRqt-(_jzBI^Vg1l>vI}16TU{4@V{^{g_pW5u>!bM}&j~HfmkIYenKstm5$iIDsv026wvnvixl-;|x?t4*T{ZksrGJa9 zd!zqeFAVPd0+*Y6N!~0CwASpGndm=sqt+&q=&a+=6Y`GWZ-B?^Qp`UT2%;Q-^P6Fw zXN06~A<7w>_)WQ|(+^c7cS5DBsg*2Qq-vv~r-}D#pwxX!LIgeg>T!0>_<&DKQDzYk zfSw_g+#6pyx@TSb+?vA+JpU3eJ$uX#lFWl7UC9F9ES_ZcA$+}mS$tD&$x>|U@1ssO_yiR7kj(jW`zfCZ$(IHqIxRQYB7wB}O+)IjNPLtEJ zSfqNgw`1VRZg1(oc45E02zlD*8Pp9xN;x176#0=l!fcxyCBD<>FQEhe;du^NM#r~{6V$c zp1lqKgP_xbxrR`9{O~)qR!Hu=ozJiMZk;DAy$c$cY&m#{mB16UZi-x1&^D>#Z$I@l zL+{=N?oN$M<t{ffq9 ztdu?v)D?2r9ia@Sjlc36vqd@wz)#)6PvxXV3yYuR)Zs4jNXMKE3ab)12 z6TMUT79)XOtMRgi_&bJ!S-d+*%JVo++j7Cr;1`lysg#M@;6Qnq%Qv&=nckp3@h*Il zeIyvqvVF5oi03Y^X-f=D3d{&>&jyJ)*g_`csLbA()S%Rr9jh#yGC2$pIJk}weJhPd zOE*)}6*qciym$e!XB!-MfqP>h+SE^M|2y!8#CB&FCB|xZqYE-sGGPFKFc1q30|l8* ze^eo4s)WJ9#Kyq|gD5CrS=mI`IWVYIIH@4>Cjx{82n#h(RXq^?rIBE3R?y7crG|JF zju^2q5Kj9YPh<|Jsv#5`Yt$eI!Z;OMR4>FcV}*DG<5d3=k-gBFvDpC+AzqV#b5(`J zI-c|iX{UP+zRZ(M7V~P8kwm#!#>&bgsSzecDTVQm4GDrem4?M{Bea^&*$ftR@MIzYHPG&%Fk}Nq^m9AV5mmyzMU}YE31^R7w(g?AazS0<)|}PX|o9S zMjiM>DPU<9|-r8r|k`@q#F)#_noZz$QT=!4BC#pXHtY zb7~Jm@Qkni%t;+*_@}x>YI%BrF>d1vl5`n+-E=}r%cZVcE?237QlCLwB~2} zS1MbTTkio=#Y-s~Uv6zP?g2?5)bW(j)XU+pW*Tl79ZuGJrmnu^9v{B+;u>aL>xgkN z9BK_f6D)r;H4l;bTNl_Rl=(zgedzWkX++_#TjaV5#PKI_jg)L181irHyY&nBx?YGC=( zhWyvWqAt%OWm2<6PmGf{0c~oty2Q-PBhRailWNT|T50Y9c@I@_59k0VaDF#p?KJV~ zy$n7@-oYP#oc3p^Lfua)tnQDAp)O&RxR7i=Bex)=Vk+2@uhhAW-+5CYrRa%}_~nB7 z)K}5>r^fJYjO-IPSruihP5rDcjf18<+w6d8LDPk*wj`&v>_y>koVVN2q%0qspAv`s zJwQHa+)ftoeV-vqbo1xJ{XukEohyeI7Ruxcrkgs$9h;3NrYVd{IxW!}?!^TuTh_;R zn!Gcgp17x*#G6O6(6Wy2(_Fi}sMqtf+I{oHRYSjOb?5a?1HQfl-t2MHTfuL|Zu145 zSz1aL2H$FS=YF)`lGzX~O6y3nhUHN2cHFlq3BxNkPvr+(VTuAl!842$8JzC8ZVKVL zk5>~X^u{7>H=K(s(ixbHl)N8}(!g`Z{{*$JXZ#I`o%|l~NL*wxc-t50o|FSFpRTqDtL#9oE7vIdkmXCAMySUM9SCP%F5EV6s zA5~F5RpYzlcf5Ta{_a`tF=z7yBO~>eTKG{WUfSz{VrDj*NCiF9x&K#4%ENGa;7Lp+ zy!WH8-@u;;eIQyHY;vy3va|XJ0cJbvoLI>p<0<1pM1Qy%0V&736`I<;V*TZTCvJ5( zb^>uB8;_y{2N5eF3jIqj5F5$G+p1tt%)yh4f z;!5d`<<4m5$M}lDZLV!Ak0m!>nc++n9i8d$k#&PZh}c=Ku7En$8LL3=J!R#-YP4qg zJ3`gUXQ<7RP|}o3wpmiSgX>fJ!ry#lKMZ^ryZNbLFm}&e)j2u-!m&T}Q=e~N{y(Vl zAJhf&WsxxXTqcaG_63J=j3kvV*#r$ZX;xiU@$bB7gUU05(+D5oV(z(!#+UD&A2+OT zC-B;>xE-fhNeff@sIA6RMaXh*H&VOSzt9@5mml`tS9_!r&s2EIv=;cz#e$;F(!99* zz{uhrutc;VS0|FZ;bpxcOKbKq^TkvPr9ui5ufFLEk}>R#&lBzYOye`mvLi9$lTvRJ z@oq)Gk689ITvqb&bfoXK?Bd+`DyTNmX}XgQ4lkHm>5-#f+F(Xe?1{aB&E$x_}h9V3OJPu*Xne^DB206XyqZ=Vi^6fHu?W z{RF;Nx$Jiu#p?F4@tuZB2a+Cgl{Vx6udv zo`qiA-k&O`dRyhviAze# zOA;H5tJaX7#h0&T=Nd}m#UP7o)lwZCJxS8&ZxCI+xUWshNcA>3t;#`*_Rv%aN7GA= zKW1CgUuwvZCO%HaOq+y({1a2or?9uB1DoZ()ttuG-vXox^6cEJIbyM%4*s=es$`E! zpU?^OseuL^=MsO*70>VK5*irtpt;B-D1VLj^u(6B8{n$!E_M5`MCz91~ua>VjWBAW(u)-zsRq2xC zX#Oq$ZazC5Lyz5j14)_`k~Cx+3iZ3Bp|F6MAT|*vzaQyBJ*2z#v8}I&l+UWq_X*Q= zhCbdvo&8?|t&_+vZ_amaIU%V_LiWQ@P>?fkI2br6AS`4@{E!tU7DVg>7;H)o(fGuV zU{w=m*ZLU@DzUt}SrDs;zlxfvOV4MVe05lHw}vlYf8Hp=2}9Y~*Ebi3iMj`vZ>9~KuP*3* zRqd-c$iiz{to1l&NhS|dN30bmmsHY2f7X7eM_3@dYe9oW=#O~n%}hJ;#zI9g?2DMQ z4P>-VPMNkV3z$Vcm?NQ~J3$X$hUcxKt6aixW070J6nP& zt3HefTxicxWucsDAvv2J(wJjcBDa{RFZa5te91v8xl!+^e732=uu)HI!LF%7?roLF zf{ngr_1h{&+s0MRA_uKD+rMJXzCFB3Mq=WbH{sIAlv&af{(yd)u zu;R?finCn|?l1UH!H(q@Ri3q{dKV@;jmLcxc59&-OKs?!H6CPkPYwkZ{|BPMCokku z^wf@wH@QrwxgBd4qO9$+UF$qko$#65Z# z?NZ)RPG-fxVpoxldZv*rlnXb%{@DaCJnpWDQBf0Z-VkLRO8N_r5Atp3weFejsL%e? zEPFCyTUR4ow?`zfGE*+(9I=(SOuokIQq@K*?>K8wA-co53#?!MIyxp@*)H?(^9_DW zs~aWq07!%5%jZj?CB;*&DYLDQK~AZlTW>+xk;na7p9JOG3uCSXqvN|tE?GXx!=jf} z5U^c3`kX~Cs^q^6lszz4LYRL%_5ZKH)=-E9D#j~tnshxT`FDz2+%6i&5&f@PH_2Tz zMn+o=16JujV-I9ivN;_GO-3KN4+(F!sxE&7XnkoACplA~Y=1oCIKnQq9F6C3SKym; zP4S%dE?B&P@Ce;DlSZ#IU8{7(Lq_5 zCW0x&tYj5Vc(_z+Q2{4y?<{^WBV+1!Wv?PRlIc8tJCGKXbD`-X07li_Ht_9YSK~Lw zCkF)1_^%U#_+or0FdAalPA)KFV48mOdIC8iXTmyK@YC^=J_ zsI~5>N`LmOJb0tw(^d4H`eE>T-xW@;4>ovHwl~o_-2q{ya90hjsf{|^+0(#ChH#M~ z!K|#)A-m18%WVVpDF=h2{SLJqXAr5xxcmkq4{?!0scZ^g+KI;A67Q}`y(`SpmCSQah_B#m?+jkj`1|fS_C~VzD9mV(j@9>ZJ>mPYyw6@ z4B1uCu>H1}_b7HYMyI1E-LQR5eyE(ADVO`qrCj54lbsqAfrXEu8SSj6+971NpZg}B z5J1K?bk6@JQOLdFhk+kOHJ%JMyJK=@vaX0ZR*osZ1Oc%KN zj0OEsF;&yb@Y#v=6bq4k!+JmGUxU7@_)<1Xk!bOJgTAtMsFq>`#-}WpD=~Ix#`9Ev z(~{U|ThPUhIMMt!k>J=T=Y$84dm|sDzKP0?2e3vdg6!*SGGf@5)$HudSLyj1YE}{v zmv~H#n)Q^avDT*n@u`#6{pqtoyGv5l+hnR!twH2&T6Sj=jXPnU#Po>Tk3ZOko(z}Z z9=0+-`9zTLwrBIUBw3p8J1BT=%S7j7!ViY-=$d8hVwrKaF{IftWtLaOXo}S80m36dNBN#>)|TIS%YSc_9viN8zh(iZR+QvF9sDy{k{%;H zswWRb-pk|WMZ<7%&Qe`qnJ&ZI1@8qSXdKUvGI?h0?}aN>s91+$4n|W^7>gG2S<*UK z_k|slsH`kT;|VVK(YzkDWm=YmpGm5yWvuSiTry$!RGaL+EZ2HSW9WfZ-G-=b7*z2; z8BzKKMcJGj3CUb{%?9fvHQzc7i(?iW)^fi#Jh2F^e2zG)tO_+VllxiVV!lKP<<79C z$)`&g4mLV#IKn0mdbY0=AII4nq~s`E_wiek6IO1des1ws-xY!uQzh7E*;hDSX*b9v z|6@RcUM{I3b>pF(iGI$#lL{(p4r%hXP$N_yy9&cm5wzLm2c)$7Bk4&=cc`*{p!ZkO zR4Av2O&YTqEekTW+)zmd?dxHuKT@ngd0&fNJr4a5L{OU1YCNZVws5dvX>}y55QSaMw z>?k=&zsZWBnjJ0c!D%~r-2w|W)j-N=d)1->!GxQ`*z2`z;qqUE?<5fy_ORrZbN7VjM0j6LB<{+3;(R^K!|S2|iFSE`K9?B-t+COG@?fc_NB_=K`5w9Sj?^ z^zckQ)(yV0c`o+?$yj$|L?{lQcicD=_yQ^L8PF!GX}X{x8S>Rr z_J=Acb+G4CaMQ!SExEhE0R-Yq3RhO1J&XOw(2 zDU&|scs5@XO*14DahnN!JLKu@WWz344{L7I>C)nN_En#Tj7)a6VXrFTWF2U@>T$^p zpy4?eN1gN)@-my$6VzOxEI#jO$|R)pM0}ekJ_*kmUEuM)2nl&p6Tx~0tHwlk_OlfV zXK$?bJ)kT5=jNv!^6k0fzXzyn;2(?+cqeENe)Dqt7r@`-{~%cKy4V#icl(l+Eln(^ ze!UEPe4)g`Zz}`%#yPv7Ue|XUL^JGVErT*#@#$dS7m9zma`-P66~BuT|7`TIfK$nz zc1@cWO*U7yEi~rmP*9tx+A!2lJXLT7hGKKF(HpKca&y2Qh88HOCcB05&3lB*SO{X) zcSjRgCao3jU_Sm}t%`_6iClJ_|43_&Z{{8li+E@r;)IvYaObJPs(akfP>`9=k{w>c z@%W{9$4Y%ihdeDDnP2E5a1YDuv8p~Ej!e9~;7Wmo5jC+`N+v_nd9Vtn6#K`kVk~Ow z>nRU?p;NwvP)scnNgZcglYY(rmY_;I-K$|C9P+^(9>r=b;r?H`QMW!Ej#RxpOS=7e ztmf>;&o8P|(E}&kn!U*Eiu%@14Oz(HGxnXn3oOZp_UyD82%&TSi%g|nWVS{Dzbw97 zQYDIIA}Q#C?2!_oOPFgO9pnNWg`}NTZ3`FciVe4lTY5>}?W4aa=upQh9Uh+Gro;3r zDiZORl6%qRt`tna#Lsl1ve&?KGxy|b+qQ7|$pPeKEY+Yxg&odPGadLoZ(JPB=~a>} z>Zf--g>>+X`|ei^r7Go1BMax0H*?}PDT*^Rjbb3MII}myRRk`0mWZMz{a8?riW1DF zU=zpjNwtiSvrcDltjRFD6dq5V#rt9g3oXH3YWZZ?D&VBTS4#B;qn)nvL6v>@a@YI1 z76z%*KbkzFJ9>twz@I5(9X{vP9tBfqLN;xJ+dQJiQ!GEa{&J zIX!^slg~JsJrh?P2TeLC=3dk`y%cZcSEAC*w6i32s1Q9dW0;03Tnyz=ees;Ca%uru zaYv)-s8NND5^q!yW=+YPyJHf7wRJF=*mn29srz_m(%c7{i$>IUj4VVyMMivBcR`~3C7(Z7>R$cK|RPv|MVCFk?hLqYf;}H zzyGGc5}Na}>acIBL+jjR_kD#Y>*v^7rEc*9(r8WZnmF8qkIQ0pntFlMeyp z$nK|%I*#R*u`(*fF-i3s?DM&DuT+7Bi+k;{;o|-<5pQ>usMi(_g2hA= zea%`s%fS^hAw;N&)WP=v{Iy*gxvcV37d8Z(RW$mhDtuWX5;;yVkLpoQeq6pD$>M1E z>Z-8@xn#aMP~z5}J}z$>Cqv;KUtw7U5i`w1zGBdE-M@B%1hvVo!zi3|ybXoy!lN{r zgPLU1S30f_ric(MszOaaMy7G+dG*=P0_Pq;f22x?6poP>YNL?onE%4Q!BkDq=3`~1 z&H?*G^VCHhyKb2fRT=}Qocm1@7dID)_>Rn-It}4QOcY~wZnJOD*A>hD!k3FGUot0p zxEwg4GA6Kw1nP@3s#dQb&Dz;a7g7ud3ZK3&-spS8l@e|PILDDSF6G_wRVWt9|kD6O%l?qqp zu;?r^5VIy8#X0K*k^#%Q$I1pR@W&vp0`G#ym!4OyKTU2b7F^PsWuPXUFA^&UnK&CLQGEhz(7zeM#OV0EexLMeV5d%cJw6YEK;xE?NC*L89n*q6zt z5!$|bmyfGk?9i@VHcCXI2)i ztEpOlejq4;`!|){SU#K-TS}tvG$qj@D}Q~J->RH>Z1`y6f+cb1I#u@6d#v!Xb9>h7 zgUh~vb0vt4CjAV28sAX%*dFnjEtKzr^G`@Rn!fJUI4z)z5 z7*2&07<;14Dd%&+CbTjlVNZ|XM&SGMlJ04GHF0^)d1aEq7{Aq_IuTX8GM%R^$X6|l zd#Y?X*N8LxW<5%{WR+Q z)kpaR&#Wuu33Vv3*ykyeXZo@WDKec=pWK=lNikyflaq43PaD`EZ4j;I^J74k!A*wS z7A*GST;}VCZ)7dVZmvsBK{KR{UMXr{h&2wswpt`L&5>lCymxKa8WKKM;SKbZaPUB-#tPm-*`|wia#N= zx_|*$fgQ5CKHaJBY@EEj_H8b%tKHyAERvV%JeYa>8jH&}7H%&fsyfIIGROjj{5@3O+Y=W8E?wrMkOP&$fz8)+v6Hp1|?ITx0k0x z&A`NMNo|{8=iQ%aTweG-w!k8p=_9MnJpkOlu*dHaU0Q2NN35?A57R@j7#^{($2B=) z3pPYh7$50vlspdlIB$T9*NH(Y+Jj2RiHI~HDn}U5b4v|d6&l8DFCc1XvVp9Rj-j{w zJYcb}AFqiF1QG2oBBNwn?>?$g@r+Vk4JIsdPI5r5rex2>ES)zZiG<|!G1c6pvk7(I z)kysBby?yc44R%**-Px~8tI(-Lhh;=Aa~W!P_WQ2zr48(xvR#cVEZhpYSQy1K5quY z*}o2QJ+1Qbmp8YCDH7gmihQT|9Ca%XgT$#Ivga=+!aO~vIuByzqG4H~>?LM;cUa|+ zvhj5)p|ME}+PE3RD~Slqihwa1ozwdm0Hg`14pKuTrQ)(+SgzCcUSO|^#7$jO|Fb6A498S;6aIQ5rpvG#}bwmuWDhB?c}#)Q>9 z`D#?s{0L*?kOoTb6Oj(?qrp<~uuWQ$gYvT=*w_~wpL4T;slYx{f0&$h00emPi;g36jO{#|Q=B<5?B;bTMD ze<}f~%)$D9D$TY>E9}usR=m3B!ZAl`Jm+^ zD5J|{`r?2i<~X`GRPWXsD0NdYcwoA(pNp7Un4$!H*k5%aYm7}xKnu^oHN?n;9k=2p zonr$>HNu2SxM1d>>H4MQa}Ch=6$nDdOE!X?q5Mzovfohb(a=tX%B7bg4X@}DKModI zQ`z3{hCNfn6i8w`4;1m;=u;r$E{uu>haWMl+jbNBSnf`0~LDQMKgjH1)8Ns)gA z2ml0hF@TzrdBQJ`vNwAMBLv>!2%3$AqfnrW?}_UG){TsblqEo(FavSy=KHny$Qq1Q5oKsr#+?RdMzRORVW{E73)}~X++UBGhSPWaXN~~gvOV%rJy|Lh2jw< ziH7p6zaulQnW)vf?W#T ztgaO>dzeLGg&k)T;Gw4%zs#Ln^?#^hZsZ~)coYFfXk&#ouX+dgES*V zb{dQom#u3UE*A9>D!>pcff5R(#xZynCB&9Pwg+2=eGrXrXqKIY1?WFZKe_~u0V7k0 zy@Cjv;G%xb#u3nu0fgm{!`ySyv_zI>v7Rtfmr&-X$Ik`ZBTc1V(Y@@>b%7t5ZecFFKm##m_2hh&@9CB(RG(5vM~L zPPs0yN77=EZ1@2HD6oLrCi}3oG@USMgT)qddqwe8Lte^&`eU(YHCjl~C)&-JozRqk z(#`ViRHhb-F&15yu@r;)Ul6s+>z{S>A&e*DZzBJ|2|*+hA$R;gX*8V`b(%<|cM@U! z9>6~>I*S+nfDJ)KRD2Z$>0)co5n}HNZO4%GkC?OAC z8t(hp*aT;P1#8cIIT#57C5jFluUe!KG{a3K>8OHpoqAu|-IbqnT}BegXg-dBg=U7y zfDyqW5nnFNa|d}*s=)Y{CC2U3n6vpcP%Xf~m5LD&@4YHTgLVbUw;aDLf63HyL7{4G z3G;z23uG@Fh=;1|mv&U6WK=&9|F??yO`ktvicZgc87+MRZT(nfVUka{Mo{JOCm{vc31=XFe;oI(^5AU+b0 zIl>9*T@afeAS>2Ovtm)umi?ia@YEQ!*69x_mLv}aU{ zimAV34WZ~;5Vzz)jNkh#>LHj2n1-?Mcc+M8)5MNUr;T=1K{KUANuuwd%0=bv=GBxT z50V6|bFnmedKf){e!sNpf(@Xt6nbH0x9R>QVfSUU zsc=tUZAohUV=%-GTi-zEbu7VF=Dj8r90P~ju7>2Rt-C!Uw8>x(Gl%~YS zj%{S!(?YO9%9_>1@H_pfe6F*+tP7@ zzC6J#7&6iUtEpyE zRp=6=0;hW&hdXY?>N`Oj6cEx(gLJRf=hR5LG@ zt)Qz89a%bj8EAIPOE+cK7zMJUltdIEOls6c-EhWF~-oda+Lls6THDvGI6fSh%bC(OhR4T#t%YlvG~;v_m;TnhM8bQ&&5PBBMP*n z`#rSa4!YNLh%2Dojh|McF8H_Ba{rr2A99M8j3#!v;Y)@0^*PR3Kiwe)h8vI&#%@}@ zda?VfOQ$GIATc;X^F{tKRN%*BOF^H(tCcXZRYeW3hN&NrUjr5VIN33&x1sYfW>w#Q ze-Br^#`{KE({QMd@jyAmFybf*UEzpD<34rolotXL3wzipjcQBs`I>Tu6MpCFVR$ zaAjL+7=el+VuLe_;@5NCOvg?HFP_T#4Al_(kQ)=x#?p?{rg%|ynj`tsLJpV-76a$1npCvJAMp*k+ zLdHn4l*8v5_>^1-&ond(MK)rF3Rc2KCD7;&Ukav0{WlR18VeJlfToj!-#Bj^TF_@i z#A4!lsj7sq)1DH7fweg4qLgZ$XS-rm!J%x;xu-flX@9v7P4 z8Y0H9tT1NB;m;C8C=rN92n1D-%wZ1bGF3}J)bOU@q#h*0A-aZIC=LlA))l)5J6%!| ziWxuFvN2&^IkP`veAJ;Njv65fJK_3*eo3ALj``fl)GJg;wS{p`Tx%r>Gzue5S7syg36%SkWWE5+dUAyhP5=?2CPf%&>W{NoQC=BT!@E&&ywcqeUtLT< zmsQ8%f)Ke_h2U};*6_~4$RvEk&nYl2SV8b0!cT|A6kKt=QqAM$w!wkmB>R`h{quKt z??U(T0J_ucGn0`TSCv4&?*W_55{qRyP*Z1^a+ozLh>|EwM*Z-P^&xZ;A$=-)_FL2b z0Q>*|9AIpnv~$#}2c{d1PKT&F=@N^A9momdhiVLBhYJA1B4vs}!Bd!Va%#$K$ROfS z^JC-Ef29^Phq4v%fEAy<2|>rb_?sN!bzNj3Xp&Pt?@iw>{~{lDFy^#Jr;eQ zk<+^xcMo_P{Dxwm+LfYAM3BD%=mB*IyNq0mZ_Ltd=-2iiLz^NM&{Vla1kKS#FJM6^ zNE{7f9Kr@+0OzPe>t2mexg^wTMV?x}I2z6mSMXrvM-^exZFuB#f_zNf=(!P zLqyK#W4iVk;Z0Ha55?pRZGq81fq>F(Q8QC;vyL*J*f+ zBuv_xbQ3E>oPq)Ei)|M6==wEZC#}WB(4l?q1QB6V#HmOrYo2a7* zUQcBTkJ2arUO`E84+P@`Z3&`nCEf!hUIL&L0a27j2>DFGc`$4waRZ2P%Y&>`1m$|4+rkK&Lsh4wp;6gFs5!r?RePCA z_yYS8T4)2)HD&1;NlK zWY>Vwjd6QPFqBWl#G)CAi_neJc&GPaEZ&vWi6FderG~Zz$pDu2D5+H+xxunlrdCm^ zWvk>$`2mz*=uAM!K>U?c(t7t`uPy0j5XG=6P6H6iPh>1a%kgV;vE0T@Jo0w}ln7j# zr+zSs!!p)^Y!vS`j-Ps^TneUGeTM<#Boa{$ z>fNG!{YES0V0KMUze3*K=4lo4LQ(4iXk28Lrh=B1bzgB!Ak(O>wCz4=^pU2_Y?B>@CKKgX^`v_E+7-khG? z10cydo}zJ6l0bw`t-a=RY;C12vA^)}gp^t~u zezh9df5f{`1$Zzx%uuh-pFrV#5$+{oQx77!sHr&64lK znF^omW4yDVms3kB`T^+fc;~hB_qzYw$Q?XkvXk;&x~`b%3;g=AFBHwo$v2%nKkxgz z#)DDIzXu>a{1)m#49It{zyFOQ5EBC;hKUHPsOqnu*iD75lywZN|3;UyZ#G@zZ^af(s*a?3_Y`0#TZR`6e43_xCa3;SeM~+ZCmHfqs zzcBo`&7eGi`HMldcosT(M_2lbab#>4x*K>;-beV0VQuT{B_}1~9C>zy|J>K~1igKH zycat`BdY}VJ^72S#+#+*zRVAT=>$x;Y*kpJsVqUfozSmArLxRtT#gJUXNE}UV@50(?6f&I`m1nRl5kxEL05!1h zSxEBHIoymY9vf(wOzR{q3HQa-bDJyWl0`Tc^#ZeD_Y~WoE!7meHV?Yjka)c3rzGKP zh{^V?1QAX@30fWUetBiZA7!QYWyoQ(o}#aUXMgGH|33E5sKn+hTz`Vz-D3UdN<}oI zz0g5Sg3ruqhL8=jjx6nXPYZMi29sI@_Y(q*oE&CI64o@iO7pPKG$ixEItZ<2Llu#J z8+7Fi&`M1tEC>-$+4$Hw`qj%eFZHpmgS9WwvW6$vg>&1_--C**DNHG__K1&Ir|~15 z=v3?dO`%NpOXTx}@@hF#0>tB#!t$QRLLeXI*SrKE{4Xnai_QLFpU`kaC zsUYQT&DCxV*1Zykm$vdtR8UON9V(H<-&;TL6P?bqD|a0-s@Bvhf8%fuD7g}jqHc&) zN_afea}*Mo$F-!f8`EV_UZweT^&X&n=1U-JMV3u%R1mm|3NPkRT{cDP)1s+YzV_xW zXYYpk|qh_1qt?;voFVviF9TdCYXVGC{ z(ql){SNX)#BNB_L@z_;wj>MAm283fDj^aF(DF3>|`08;E{#4{vxhV|a zWq_!JvX1y6&y+~mQIq%T0IsHuZ{jiJ{+#k;xu zcaTHUy;uxyJik#^Bvdqy5)n6SB&fLFwC6-L3utVls&Y@yG6``cbq9$&DEm=S)w2_; z;LOxO)RKx&Yy~y9DltB*UJX3}*thU>U8NX;4nmb<^i0Bmu=U~L`7{XMZUJu>U5Rg4 zje7#&PzZQT&}#0~pWPcYW_o<7xXG)QOn*Owh-_r2XOv}M@u3jr-jlSZEZGCQ>?=ko~ z3|!sVELJ9(t^pF~QeF1{*uVUxAiR_p@8;Vk%0*b*3%PIl)s3-;LM!wV=^~nNW1;m{ zx<_q!im>nN^O3d;C$dN^uhO`MVtH8nAwN>2f}w!U64|%ox2M+RLHeBeScXG-&sX{E zJD1GlnCU059RYXx*(~NayO=jza@%aL-GP(vbCv9=e8l-rJ{h)mPk{NLr3@;F5F9v8 zteNqi)bAvB(@?z6U;a2-*H;~z%RyBdW%#Ojjw+-uq@PolxyZ(~xt9Au4%5m>~<2lQ4iFNEU_+0x}F)f*=S;kbxlyhy=+wBOroE5{V*75G4oU zf8*}I`~J7JTl?PIeO0fzZgt;2b#LEJ=bY~I-P6)gL1Mq2AWeBAeLY|yTLzENd(e{5 zy-hJ|qL=+t^aJS|U$Z$2fa*eEa1o=6y~}X4JV5nOhcHQSqLf9EYu&Ng6uXGQ~~kP0w%4B1GTm$u?aUmj|COegTjb8uCPR zr;u0{XdCsbq4i~QaRO0?pMzGh2QsbBBi2ZkBXU-Wv>qZ`0e(4nb z9}*Z7DEjnvV#zu&m!#Tc8WicJp|;ZkI+BEe3>7`g&S9pK;2n-UHO@9+&}&LFvv^__ zI7~dNAAJ?X~r+|C0=jXxb>2&B}?T!&Cj)g|t?Owwt;4X|O*9)NZ*M#KnbG zFVT;x0B%#})l8h)s5k;z;g;etE<>!4+AwKh3?VJIqCA}* zm_T7VuD^1KQEdlB0oc$H5w|C3o z`nK#lA%D-F-^`+AB?C-=Uvp(nSuND`guMv^3j80x&3S) zS)kZg?D>&_x>#N(cz9Z?lX({*|98z6qpV`nFNRzQct|o_B8F`7b?< z>-WPo)4->9{KwfiTYn!X7v0J*Qb&Ef?!Ir}T|+K1*|C>P&FjVeLB-m{mA4L&QXSNtJ}p^+}$_5GaZ| zf2H}WgHMTq{u|*M99#JC^RKqkEwONcLa03F6t9;$neGhdJu|6;1l-dfeKGg+f0KoC zy#5j^(1H8=$MCPt?m z1R9NoPe99xkncAYB_ltuq_um|1SRy@^88?oYtvYj_*ZX0G;uD;D3_htUlWwg@qCtH zK|j8AtC5A1^pxC3Zs^8!XO-b(9CQ%IY`lSIta)s_U?c6G4W6b@jSPA4;AoHkDeIv; z&4z1x;z&N8a)U8K?k6JvUPGWMQkD1PB@XPk`8)4g@)Q$Ifh02znp~>>CkW-w?YK<= z_<%9ADYzHC&h~Kc&r|P|-l;*lb!>&f+|Ng#^3`jYr-z(hB`-BKI5^(mA}Z@XS||yn zueh6?f(4-5WPyg_3-aG`s0(Pt;xH0qxTx!mB4w?GFr;0j<*&8e^PtVHbRImSjO zng^X#_D)b6_(F&te_UMw{u`jXzJGu6uUs~XJT6&24s(rW1sgBNSNqsI;&|n2FCZR# z8^k#f)_yCncObKJE3>r8?TxoA%5Cun_1Y*QzE3vyl;|ww46{ZypSA*Y5veu)slP!V zr;(GZ!1~5)YtbB)Y_`d_C-{Lhb=r+`_oDu$+$91!D5D*=iZQrdYpUxAdBd8@0{@>T zfK93ZvE}@~aE+@AZ&$|%Q{)≤X&{{|NXIFfeo>D#k)1Ru3paUbeTR9XMj&Hn==0;jl%GPH zUU<29;lk_cTY;-y;uJSbRo=K_xsK7V6}fw>3Yj`bR_aMG!uUqipusF3Q&nLP2bT19 z*H6i+1j%#Q8Chj*+UtT8q;Ob&y7r4sj)>`*QfPP3RS;V5E}ue{W0NSHxg?Dx)zBo?8Gokou8K(pEHsFNxJP!t|2b2(#a?$WYnucR?$g$`9 zL9UI)hZ~`etBg`$;@P+W5!q*j<=x<>2#)pdS!TUxZNclh@&TK8>k(kS87j#KUWm(| zcf?czal$($*ouqJSqX9QT6Qq*S^sMfEI zaDmZXLA}ufUqq=>+4GR*679Jn1NrOc8!66z2=)lfmTF?)06kc|u!5q6u2|{?Z=PJN{j=xah6&Bog`L`VS1ua`?m4wmpSs#9LK4SUY6v=S46JK!Ha3;w6lyNB7mJVfVKdy(ez{%Ituukuo&gbq}F z?(%9!B#FDAO%M|JRQw~Rhg>xu*?ssrIdo{&sM!!DrXb;oNFZrW^08Z)4%)T)DZq2^ z7IWg*itv0pkxpew8M*Q2hq)Tl!%!Mk<6;>UI({28bKCJ2A~Au5Ko1gVM#AWFv)WJQ zg)wc0-5aU583165=@-ZoV@)M~={_Cz%ep(bJ>A@i3V9+@ zH5hjFkXCzPa;bQ*KF(_3pR0HmfCUg*ViBHxQQCnG-WY-G)jfcYEd5Ih)H#5i9DaR# zZu!VI_NL4uDu;f$omhc&sT$)*VGWV$NAU^LG%}Q>8oL2|ar-qwOsN2#ExK3S=%x`t zHl9{wo`CRXOCkgPeD^#D@(ov*BkLpv##~b+6uxzU;k> ziQ;m81I*zzoBr`A{(CgBYlOD&fQsSY0Fjvq54}+<_LaW@?$ZLyZWG~{qUfeVno45% z8!IC^_EG{Z^Jgm5D;D*yYlHJb-kipgw!bV+8~wUy&?j%Udtdaqv+e#v?w(ifu8s%L zle8a{^dSgc!DlmV`EkgKj~^|S#@g3@szuvQzkjptzbClL203oXFpzo`{I9^_(|C!R_d)VT1Dd{hEf)q)IayT}>Ea2htcT=KWBzM=n z+U2EAS1nrIu#QLyPS?@q4)IEw3W^XyOer45Z}B0mBX+FztOld1w^;MFav5Qt!&A}J5o26_^?41nkT1v{LbHI*)wAbg0A+q9 zh+xrzpqSi{Cp8P+n4(_Wa%2NL65ri8cgK|Ty-;M!S61@_&wMKm7TtL+PPUwY@r0CG zu1O<=Y^G?<3oD+P6y(Qi-DTXe?<4Ms+SvND4rh3F?RnP4V(JXzX9YX={a(?TmgO>6K(kmwXf<_>w)eIBXR@NWksrTVNPGu zz=@<~Tskom7P%A<^tH&8?gBqAOO@7pcbuZ#@Mc=$Rm{IjNZ88DP%xFdeK?3(|Gd-D zWDOT|Bm;hMi!}hlzXSVuN~RyF$nH^6@mX`f%@=k`xlQ_(P@%m6_dAadwgscl%xY`C)G6I zj<5M{s1IkbngB|;G(DXPylmch?xI76J^2MRI3}V3;ZFPfx2AgMaa9`ws zyze}z8VD~b7l#II#dEf#Wfp?_&9}~Z`$il;jKUI^EIu<8Bx!*hS*e8HMAPLwJtsK9 z&OlSo^GnbRC&PF<;N(K&*Q2&LViN_}_&9Y*v$rHG`zav_As9pN(#;R(Q8+Bwkh8WA z+vXd!As6{Zo~8wMl_iSu7GZ z3Y2Z+$P&aj!EM+)E9%WuZL3g_T?UWXgs=H|XEsb4W_#Oy1U;I<$8#BiJY_OA2|aFdE8#GzQgV4s?@%LVe2ZYhDe*em z7=`6PwZCr$tHuzR-q(|`esMJ7n7)`*ywkpaw=S^{vOCU9;_)`ctksTwlex?0IaH{} zFN-v#Te2*ttLrG_GXv%$DTrB}^)0zkk!&^WBjwol-KWaU9#3*6!R?tHA{8~lt?!_V z0#p~V&KSx5i030whW8WH#&@Ii%(8a_EFXC1{|Fn4Q3)0JAes4y>--tCpI_AnK@%bo zy2f$$GB!Nag+U;rnnRst&0vD-g*^+5zSWL(lSxP($j_p*&vjXw%8bda4-WV&KgTdx zn>-fzvUO!xikMyf#MpN$Q?CN1FivqA^vqnp(RQ`}u>aT{F>lrC?`4Bb9yMiuRHAr0 zoy;(JS!7{8!Cgq^+lL^9ks!QO7=idQ>rTK>5B3H@?x|YnX8!>H&EUw!sWF|OIoqN= z3dovSBBn%DdlKLwIG|p zdOfD+ZNzHY43t$Bw&Cib+!IWBLRZn*+;!Smi=y!9P~IhFn!S9`$-AhKjh-6^D;#Iv iABUc5b^N~}tgP$Ov1(0T8Eo1NxjVSZZQOEqrY7M diff --git a/web/webfiles/img/hydra_start.jpg b/web/webfiles/img/hydra_start.jpg deleted file mode 100644 index e6187355212dcc069e45d13abb2f70596ca5b37d..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 44345 zcmeFY1yo$iwkX=T2WVUp+$GRBfdp-=ap*wf?hZi$!M#avhv4qecu0a<1C2BuLI@Hh z2@nV*A$+psoW0+;cbt3Qf9H>P$M|c)?3z-uR>_(*SJkTPrR%o(Qjk*Krf0fyo1T%8nO%^JnU$Z7k&#=1 zhhIooR8*9SOG;J}BqJyy3i@RPgMfg5n24B`goGBv!pH*pZ(rB_0CIc`4@`b63|0Up zIR+Lv#`Pe8;pQeWv3}j|KQ1gBOl({Xyc;16#;@xif?o*?Oswk_05R50E;1~#8@l>j z^VSdl7tgWi77eF0LV6g37gG#fysZmmuVhuPzRr(~3Cq}hVCws3^FF%}^yS$`i0}zS zn=VM@Q(yKaCl~w$+t&?9a2mz1dCK=s75CNRx9;9#n`2@hJkBb6^8LfJRO^5V)U3~9 zZ_q?zfrISQm?4WpzaQiBW4kT=$q)BvtBtgvLk_K!EwChdBlCyLs@7}sJv8qeyA51z(ez2QOWc7%B;+bofT}Pw2JC zt$>ffkLW}W#}?>+jNFwYdX4yoBHE1klvDpJ=zhq`vEdsxr+p3g$}_k5K57O(SoM># z95+L9nuP3$dUa$v!eFwUP)Z|2lOK3wR@31u|EMgvXSu#WeC_aqzgc;w@n1U$<7B$} zM@vs*aHg4R9gaPE6t$x2EIwRkvZakg6@UC`+4X*J(TM+jXx)9OaC!7d!r%o9w$72k z+=0Cv1<>gSyg$TP(=8+)vKwhR`(}>82%-7RgfnKU*S6(@t&!S}ovrxF4#Uc0+@Q;S z3fK8%dWyv*T03ISwQrB3?$`*6lDpA=m(IkkL|o+cWc09iBW)g!4i5%(Wx0ynG#d94 zpD!NyBQ~=>{@^z+?2p_J9qj`@_QsgZi?jFD5NV zbe5Qoy$wv}xCPTf5+zhu?9O1w&6D?m8#`fmL$4D(-L2b(q zj5}Qmo5-gHNcX%|(?Kp+Rrx(CWvc}h7xPO&>ZYO$-E;}k3V!5{BIpLy3Ys>b0Y-RR+MPSc;q-MjCkO&wKK zvP9;7wJC<;>GRUyoqKoE@;0PZBxKFIWZzvPFU(z0Q?RaQw~D97&AN(bZ_2HoJj!zS z#;O``@$nje=l9gY=+F?x1>SbkFvJP(+p5Nqw*?Xf3N1v+6O#|dSa-do{bZ$75$1$Y$-+_KOf@Rm8yxJMGC7+4$Mk=1P%BS}!C0CRDMJpTA1 zyz$7c>(-B=U*>;Z#h25lKA+pqG$+5<*PZ22z2wY{cPcEzH96}j3lfhgcNG&}r>ApI zNYaW^#NBHg9(}lFD<&oo)BYl^VR%x$-csx&TfW+s&-M*{pIgFF^{d~k-k?A4-Ti~~ zY|Fg`y~Q(y7(ux1(oxu-8h`u!^GQUXm^ld*{Y~^w;?Hh4>&=2exc|xjTk6m8F6+U8 zP9yxA=r6<{^+sM9hD&2>f9wUHBs$mqn3)x@uXz(cL+}f(7Do#nig^S!GHQrHkEJnw z!GrEging-)%ocIjlRP&I&1|6tL7m^Uf7dr==|eLJVD!yRE=LGpZUYJcsLREfCm|M! zO^r>M=Q>Iw8o zV1)%f06=F$P;BPNYu8NY=$^3Ww#8e|F?Tl%$78xL@^pWntFcpTl}si6JmLKbebOfq z&T~8O0l8y00`q11$@3(RYk;(Uca@Mf!Mgw~4}~(k0k|JC2;-Of*y!Nc7LPrSXq-w(BI%gi=9)F(3LiLOiU-_=(#eGCy;z?|bv@lO)! zep+U7;F$Em1*btQVsRzKF^X1j+mamVXT-`}uY%tt5 z5~mxo$VK&r#Dam_NF3>BZ%8?G$_@G7Q!WzjVu4X4q8V>*!i1yvG`CFk+$D332AS_2 zUgEm7a#QP=rrH@j;}Z;MQ`J>2a&#dn(3FULeO~IQ40l_4#J1D=&A!$6O2oMCXHFeD z6oPhnP~jr>d`>KP`a>?#;S19KUn)djY65}L0m*(xKh@3GH%Aek$D=yKKfwjyHm?46 zM~u8=&y1*lg5928#D(iL{7S~pb zrR|SL;Af1Iy$G}ZmpFMFrV8u1Q+k8CN!dN4Nt6`u<7>d@&`a&$^887JN^MhYVJ=a zoHTs0FzO&lDn!z||_fp{1y|KgnCALxPX4@hg+7p*Q zOG&5Kf*tcE)5-a*zk6k$_Wd{#tlS9fS#-!8a7PG(wp1R{^H1vu-m|#Kr%ho-jMco3 zZN6^7dp1Vb)JU#OB8RdDjWJ1gb z>OaAIv0M4?z?Hu0oA?JLc(5w|gZRaS|A=gmUt~T=_5)ESrrM2x-sgBjx;RbK1l6+G zC;m4XVrgQo`YX=|@>{}0xCu>C-^oTCBn>CmB$v^oo|tQl1>WU&-<$P+D#`cK^d9AT z<>!x_+$;|vtE5j0={Rh{83#$q%h6ddGbg|Q4}KOlo({=Y|B!JfRwCKc;v5uxxFc>Q zLI$@r0Ob0#B<$ksY$Y0235-8BGc zI66oR0~7?PHcE5~se7^TbULc1kDgRYRa@14=47fNDGYTW`{JeT9C{0LmjxD1 z-VDIM>q+iKkL$D^H#WtP?mxu*YJknVlve#MbKzS$u_iU7J67GI$_pZS7DBIRpV|h; z78X`++07mF0Biq6oVzEC)RUY=6EM_p%R!ic;L#mmN7-7%<5-zkR%_yEo?bkPbc74F z3bEU?j%%}=Mk9k~=ZRQi9qo%qTUKG^t6`SCcZKsm?}!fT(Ko~y)dY$x3a-nM2{Mn3 zN)OV#6^UwUP(^1;(25dJC=#>l3eBo9Dlv0Fy`5i6W=D!l8N4Tx*|rwP-NtsgowHwX zNZ5>9s+45BzVZmH0Dhs5ojL5yGcQ^!UFQ819&K+}A$6P}9MP+QG);?GfSgShS%XKX=qJ}hONHp+F0&QL7uohW_a zE#XxRoKXtpNlq60fw*bRCVqwfZ7i+M2FGo)qxa?JyU0OQdf(LVjd**LRajzbrpl|$O3=0D zjt@_plTWw0ing$;3&=mVQpwU?R#wdbv(CWmdteLw#gOs*&48hryK;l0*ZQA5_M zp)Ag%6VU<6ly)0lulJo~3~IGlYx-RlM{*{C<8LOSI53Jpq|)=apB>R~S|KO(HDlyZ zet2Av`(0+VHEdw3l(dmkif8C8)0d^#(uBwQ7hXcNNwz?p4x`jXygaj7F1R9ILD*B1 z<0?9YNO(8WbTkvXvKWNa*lk=-GwE4hHTw%er%pe?w%e{pvZ&0 zS%)iDUF2I;s{BZ6XE(?ZchCC)?(r!rC2yf3S3o1L55Uz#y3igOaUhK zoM|Czil|?n^PY%Wzme9f+a+G^ubMA;GRaGfUvV-a?8&$3CZ?%P;qPD7$PaE$B=dLS zIiBn06vNo_p0<6pq8;~OO%*HVY;^XFx0D^T3d?7+I9AZl?MAIf#f{>K=8+awrj0+U z?s*X)GSy^Dm)+%!hd)4Gd4*pvGTboJw}+;EwWCf8`Rcly$NBU0cRxg0aaTA_ zR}8kW>4=>rNO>U6#-rR+k^mHHlbsO$sr#(v=jyFVHhgfI5i|igN+H2qca>%&^!lY! zwyk%+NV7ynL{l^?c%h!r0asNMIKrJR5>-;)+Et=we-CO-IVPnxs->wmWf|jHZ%!6I zjvV!p%j6!7jBKyER3r+EenED^mpa^JaZ=-x$%~!iV7i^Q#J_3XR#_G3%`3t;Iem{c z{F&LP#P`nMd)_k!q6%QmjH`^gBWUG@b zsIq}b?nPoN3}UwqTocyO@Njz1aMlGrFbIDa6N+Ki#JG*G>GnEZj$3k2SbR;yvCRN1 zDWkwWG=j$kZ12E-Lv9cERnewp@W!tsA)k{}O7Tq4x5TL=OQ7(2y8!jx--AgN-i)moHLgVvsoRYq5kjD{#~xj}!uxz&Zd1vujW2+d~85v(vsLThRE7k}bBWg}35`bCn5s z=h<`ernCLLCmrX1++(0_&f&vy^SXLedKD(TM8n8(yxwYgju~vnD^`97$1HoMo|5bp zW`Pj7;;kCV@y>EuR6W+jt!fs9rWpAst1Au&g^yL_mO+0m){TymP`CpGTdCBvkx{yi zgIBD~FQ|0&nTfuNiN4b3{WN&>!}Lmpwh=LZ4gPz05z$4jdP*Ettr}jgNJ(IlgZqa!6LTF;ex$_J|8ScRgsa z&xoWKy;Kelx3&k17HJKwYoV+cRdvyi_2TKbx-(|gdyh%lshQ8Iyr+zU8&hq>cP40O z^C3PwX6&!+C#~qHhnM)D$+27W_B5F23++nfiff2Kk}T(x-=qgBFIT8hH-4r4W5~tl z&=wq#;)iH1xENw>SvxD@}qZ z2)TNpL$qwmR4ecv*=U$`$1Q0kPW)@YpEKeKCV+`d#%+Q!Y_;I_sr5$x5n$%2fVpRV zJlGRnDtQg){$uL={7wlbsOPt#JG1&+^Gd`jMT&uNHc~F)cF;i0gRe$^c+n?J7yQ5b zG0B&tKd66q-i#KpKZ*VbQSJ_0190MkBr6dQVre$70TF+gPyBohcy0Z=V;Q;#efwL_ z#R&Y6ea?wS)Vt`-BLviT(}=&9{GwpLp&OQlUf}zI`+NUjp?|S{y4Xi?gy>3@9n{Fo!0P>27fIg5!fgeEZCDrvj(vpu^mt^xKe#}}0d z?ZvC;ZwWyq6*9?@RS}W+23JhYKRKpwR|;Ddq~)pYv{B!g-d(mO(%p0VS;zcs`wLrZ zz0?#rQpQ}N=i=w|#s1b(J_+YaNKJ7d+2yPEPMU8RGI4NI15`8W?1rzhV@KW*RR=TtOSx?0;jZH@B*`d^;B)?!v^s_G$3{42`65_j(} zX?E{2IZS_t{rK;~9>N3~o?Eif%GT@N9fyPWA5fl`)x-~vw>@Qyec+EEQT#cG=+vmw#eUDrDoB)&Ji200n;yr^rIDeAi{2_ z`u`q`Rzcik^jB^P;$wAVJ{2*Je=~1(r2Ky?(i`3%>nRf4BOJ1M7jv_Y$4m~u0$^fb zWBqdt76XV$&WuIIA`FsC{%zszW+UEfryHQ=U%J2xfVto_|=Xa1uIOdtk1vn7`BANDbS*6YYUw>v6Qq;3PW|z~kjChBmU(!#d)cVJQCGG=Ey%yc1=v9ox1144VOD zr(>;Nl_-@Xw(h+_ECO;aN|WnQ$V}sh^*Z7&SK71L7RWQO9}c?CwUW1J6(yxUvKDt* zj$7u^0gv4iW)QuRq*dK0Whdp{NYv(UlqSK*8wvY9{xX+6oBfR>)eqY>t(Cm>MlvQH zA+C0l{oiPq)d-Yk{N&Ycq9Vr_&#rd5KwTDlv8AAPI&Pp8ag&RNCFwX$jucU%9ODvh z#+lp$=;)9pj)BEtxM?1{w7g~p&12>$WnEj-lH{nj98dQ;H1Rxmc9Muuji=>RIsBvP zXOCeT$_wTF)HaD!d5)KDrF?u=uq9r3bRT&%kL; zE{ejAN2AgNvxA&YN`u*PrT7*4V!W_cLqPql2mBkt&ARMOg|Kj+u-kEb(s7~(9O3~t z3AVNgwqD($VA!JGpv~T(ZNC^Cz8LBl=9Cx~==*Of^WC=l1YgT)+Qou}RHX^}ta`qy zKz!Ft=}~nW?V3;rqA&6fSjtLedU*9F)zrKXK+CP5w&uV@3XWO(09X!ewU2b2jQ8BN z#{E>DZY%W5kGH%?QKq@mq~`tMr867Xpk`>H){*M!ojSK?Q1Ovk2AhRHMDFVr`EIMV zr%642PrN$Z8>hsN7A}X^yI)GKc0Al=c(ngx>wlmM&vf3)%3a#0B*$`MG!~J;x^Zte zD6w??E+mG2F%_pecZO=5f^}#=DGNQ>_XoRc*1Jhm)RTPazB;}ul0gmaE4v#7b3O$~ z4B+AF>gqA&^2B#L*;}z2A=gXvd z%%3=)Wp8D&FlJ>=7wYMDWN@2BSjg6Jf17*}NQ!>Z7xRvrTR_ zwI;2P*Q34SAGt1-!d~Vk7smGtYSE3AjG+hwOEGq$1rtrE^R)8WBy59LVi$;uaTdB4 zelVl>ifAq3ch2MLpK&=4)qLv5$&twDsPE=5z?=-PfgyufWO@CE%5o=y5&%-0c0gE- zX6gQMqP1baQMPYUO`_6dYsfsRPS?(f#L9)}!=>U29%nO4qXvoOyO^{qA|3!te#EiW zg5i%({>*bF)p&gMZWnZp*+8t(TgIN zfbQfZw|&G&h?Ojbf1J;c;R@OnD<{`n4>AIOQRcZRX4!U8_Aq~iEuYnd6&EptgP#>< zPkl!7qhn07juvX9)F4;6)%4!#cyT|TAa!8?Il>i0KL#?$J#QGi*7gaLDN0R zG-NiH$1O^lah#l-L|A(i2|KT@HuPPrKycGJJ8xFKS`Wn{UgsF)&ie)zQ@Y=KTbocF zL#@`vp9j%Im6h!+qa~infOJrCT&h1ilp56wzkXxAc}%0TCmaQ}`RC?sk{_4`j4(gx zJbo&7<+a5a{%vbm3hQhHZgLGc{^Xp#LQ4Cdbn%YxC{u&Xf2!+^ckqms`sMK_uZEfb z(AaMZ+#45PdA&{|f4Bb|>pw7^01y9mu*LY)!7SJ&W%8gA?k!c|cl=aEq@hnpz*d9= zU;0KG{Y&M40;0&KXmTWu4^0IAj>Rx|O43CnLI4 zeQOgN!Be3~Ojun83G}W2wj41u=xfwc05Zf{{TbLo-UzMmmy={d*MWQV4XTx5!gUan z`w(vK&^#vmpDqQ9?9#YCtBsjb$moW?3t>IiDF}A#ud#ao! zXva&vE?6CHLIJSnrcJEj+XSZCl(5y(H-nvd5C^%Wq^wl$?#QYrr#(_ zte!c?^A#=YM20@tD@+Kj8>R=X3?Y7S5-E?Xo5PtCVhK z3Q6HIO=3jZ+6vC#UL>huHlcv}?9Znkg)sTLm~}|b`nX$mL`du~&pt$rbLv3N+BfOF zE2_K05|NrLfXr9BgwpNO<-IJJ57k5ptFqy3X@Z6=8x3)D8Dg6A*yheo_?wOzMWyc5 zn4*#Ker%F{?g@1I59KRp zYl1Wv^6hEB{V;I*K}n41YtTae`ogD*J(zl~S&ggSF=js`r_^ltheNL<6-z?)_^kem2U6FK^7Ccu%a+Kzx^pJw_ zQ^U1FdedTFu{k_Tz)a{Ib;bRF^o3uTxLM3Ywg?>~;Et$L(D zedAAb=6q(66@4wAD#cu=@7R?AC(9|zDPKE%w3l71*GoUUoCL+#*HZVU^>NSDazjM; zmtN8jj?B*a*b0@?_^RhQX9_bRkw-DvoZPj1gypK`5~pUswlmJQNvWe?oivx4y0#CM zQBv)q6?mlr;CgN=buB<*sErT(V0GX^2{UY|H*iE$beaR~0-i52fg9KR=5*%1f-UBs zW;-pQ<=XZd;aVvkPVV2Vocn~PSv@s^UT5}oB5w<89C^f!&0~Z0y4movr=>KcYYsnl zo(8?;0gaKmV%=3NnKYsf`~n?~5UCAr&oW)#=|Nr$NKcmT`Xo5TBxS2Obz9rDi=z8K zS#DCh@sXWJw^jA0S1Lgv3t-kHHUFR@+dAj29_(+$FxLY}TRAXW=s~(e{WX9>Nu zKk-qBeGaOJ2y)rPzD&l(}_C$ z>u9d=b+5A@aDryjKdj&=>w(?^j=}2Lavs4VRAKr#*ehAUvlLod2waP(1-0LuJ&T*l;HiKX zc7v^yYStUY$7C^+X(WoKMoDV-W!_Y!Lr2oD0ZV9XA`n%Z8-<6;yi+jy>qx?DK+c5p zUmf~#%XarphH^2?W(#P`V`!iKZu}Z>VC`}V)=Twy0%M^S_z+fT<@nfvDORUUG{06)=l7c z{u^hbA~x#J@%rf+Q@j~=oChCXE>PrTTUHc#5Sv6FXEJg6q@wk9kjfq#2N7XB5-v(L z$?BRN3h!t1(i?tQnP!OFQ@@y^`S{9)jlvTAk8sVg{r2j<@R^Y?Z< zwbgESAtp!nw08o1adlsz)VI4?NlLF8j5s^zc#allEuSb((S<_B$bsZ8A3Z-k;?pURB_EUAf1**Rprg%l!lc z%{XL=?ka36t2K&~@d8A9Nl&F5~LbBv#_b-k}|^c-HaKQ$ygb+zabV7f~$vrZ;+$=LzAv{Q8yB-8&48tGOf|{WTCcL z)sF??G0ZSNF@v662sfVn)ahjNMLpeb$BMWFGQsU=Z>Dv@f!YqsL9!$aWU0mJ<+58m zA=4yGb~J3p6@hP3qhMVXxXA)qnFuN>w;A-PI=$gj38+XodWg@tLjgiTiAM#J)6HmXH=Ct^c3bo4r#5$s&j8iz^;b?m z`TljV+6M?n*V<>v8B&SQe72$hB5T!^`P2uI)HLM+#%)fAQQ70)O~A{r{S=cDJNNW< zcq+oQdy?K~?%-o%V^G=J zcHNoR?PIZ1;|eDZlJ+*D0Hq1g@*_K_%?f*UgRrgawPozQg8tMAY$)I6WxME?%tsMnd%3|}+kNC{ zOdXNYLKjz+<7-^N!*yxzLTjeK8=L8EZQI3RS36VLPHEh}oS|N;gL`@!=Sxrwa)xx6 z@@U6!F|gN87rn&`2x9`cP;9d}_=C}JoQUnZ4-=yJUczk=rIbOE}H(p6Zv(Tg-&MT8vmt{KNvNRKS zT<=m9C54zNU3(gYVe7h48h-+)2s?0#-4ulb9MD688NZk405yBZCnT!%wRafT$u5-z zh>ym0T5y6w{W5*;Y!dA)b~Ai#`3}dm6p80VxzOH)VBOW7a)*1 z9{50_Km}fGP5dHA_nTE6NqAO4nninx1a|Q>(5uyt@fMqBpvuOy^>Xc>O)!I!G`G$+vQv5|A1f4{TuK^5!IsQd zwfe_&;cfFd$kc?3r73hKI?xdsm?xo;?KHO#rH)i{dZJuwSbk=)V2yU16vx4d0N;yS zxE~O7uu9DUQp5TLjkw>Es+QlHpQ5p>!So4;QoNaCGX3+^wQrneHpuC&fPjF!V!%cz zg#?QYBxV8RnU(<+`M%}8|%aeGpYb!{V#E{7Od$m99IMKLu zze;KY>(|Ogd@Ae@_W~rObbbaI4zekv( zRAJL88Ic)X9M?bw7`IIgty3D?Y+kfpTVH+4hg9YQz(gLQ*ZJ%_UR4io0)RN4r>`?_ zyTPFyuhTgv?BBG9$4m-Y3rat#-Z_=aG;_c~_*2out@dF)lg)_kW>Yyyg&04*B}^|k+Dqj5gvq-a`Ms<2zYWFo zYGV1Z)a{WYrHqFe_cLBVqXjqUtRygm9w!1@MwE%f+LCJbRyy=cIKQ!favX2*eq#)u zsqUT6^&h+j@Wvt4%eEJLd~Lg_9}KiV6R)#P<0;QC4}FK?c%w8?v8+y2&i`CSU3-iF z5`GPMbPf3SIwMV6#5m=MBbm@NRFc|(f3R5tD%a%VJvjJNL_2frtNS&e?XMYzwFZ-Y z+;Ov%)NK6&lTx#K(O0wu4&0b#)W>3lF}+`UPNFjj*rd!JTSsPpqAFA4^j()aCHs&s z+RM^g>NxgX(d45u(L3*6bh8zMW^Ew5yb6_mH%QbNvNt=_!wyaFzZfkHT25!Dn%(W$ z1ro27jpc$oxed%iyu>P+jHhkuB1*M3{pp8QCsi^1PxTM8(>IrMDkmwqa@VoxwMy-? z`*OTV*UQ(*g>VJbE%MuYZ6w?xuI#7c%a?0jOH1+3lIfxfdY$9wUD zx4)dkCn(oeSN1G?KWr`fif;jaF|!e!wPxi2bIx%t_kYrO)q7S^Wy0eBq~Yr97Snqk zO4`tZzXjY}&El$K`VgW;7zdwP#x@33y8Gk48F+bAj%C?v+vNczg>A4&R3X}pUhlcX z*=~IL*tX+@f~fLvJ)L7!y#uLJ{2|ofK(xvStkD716qcVILmtI141-kKR@L=7oZD3S zIm6Oi!}DCeXda(MfC4ismlx(3n&Ak0$YZ+KP|hnucrkwo2|cgX%T)@_P&$VRgYO-o zD;$uUVVT|d^=1pUPE~yLMB5+Ap>30&?QNf;;S0sp~O4&;@PI~%2#OpJz z)_n*gw9dYBuIE}2|My2v;*4)>2jv}Eq zK91mfdQ3rOaxvsQ^2nQk(=Xk~i8nDNNvf1nVb=X_sSphJ3dL`~V%p{2p^@p@+|h$1 z0^6OWe*WGM%A#<}E(b=c?~U5`?yq|L_|i*rf*hRMThD5A9M>($LZnU|*7R)8oaPjM~jtR^(Y_=D9Gybxx1hjj`nKpfuO7mxe zORSeF3!ZKNeehXoweh!=>$UCt{0uWKQ}E(#i$T%D7Hz226J_QT4XFB?^FhfkPmTMq zAn8xRIGIgcFlq%VBCVhRxhmYOXQG5*P64N2fAO5@o$}8sY#Ojb>;7?N7&_b%!reYh zqVaYTzkNzTW79Yt*a;L0S2BrCd4x&GpJQc0Mnj81Za~b<>?kl?a&!z?@u2nD!UiRN zFe#ZFBJQ2!BQE7ir)s9g`AlA3%l(R+xUa(4``gou-8N3IL&t3C;wd)FxdV!S`H+`?GN-(Jr(w_d@4BlQnd9Wdo?_$oi4iL^)3!ZgZM_F5EkscI&AS`%=bpkz7NMR$ooX ztmp?V%H?XxdmreCb`8wmMlmjJVaeJ^^$n9>1CrCd>p2X{`UOp`o#?dm&x8Si%lh*j6w0oT-~Cj4|f%741rNaSVZPqX*D)-59zhbICz#J|p@^*vY0 zpHZ0Oj1MvoaKcub=9?`N#@%1T`Alb9uQaUU!XB|i}pBEZjcnHX?zM;tWDMFx*|>+BQ<+y zg7X_oX%1SBa1^PPlUsd`QD`S`D8VpL<2Kj2$(Dta=SJ>#?<8TSHLh zCyCiRj`SWHDkYpN>bp+vry)Y|(cANr%!nUL%HgcX|O{0Tt8h+&=Tth{RgTtkufgLPtHHwR@Vu5&w2cjvIb zNTu@|F51VKnJcId@N*Zf_U4UgRSKXgF`vfNg$oFrTwMQEaRL~fHC)l0i*!tLp@4nq zpFlcRSM@H!3B1wcaJ&o$gW;4I5J0aeLkBJaoU4coaMhpDxc-}ca95VseU}6T)!TSM$i@b*OIJwymKCqVt z2|qYFCY3RkQ;YI>m9*M2%j*`@7YU<(O!C<~@eCQ(`^Twy&)jR`Je8NfdOHiQqMCi9 z2J<4n>6;k!+FUVtnhRyyS(F{@ORl`KiL3q2C((*%YZSOjEvjTAC|9}7puUZs)EOZu zPeBE=d`vTm>hBz4SHCs!_`~}CZoE&P+GNwnw6D0E-6}LIYC<8p8i^-v@IY!E6Q<4o zbQ9{AGO2dz9`7ABLAuTR*2Z?0U9=n1$KGnEO?k#{B0Fcls@#K$8CuvG=xnymh22&J zO>b1f$&uU@FfLocZ4^VLmyMM2%}~-h#$`j!bNC$-XT5xBNahIwe-G~5)ZZs51l<;F8*}* z+gl2SN3Dk8=G8lcrm_ZKqf8{N3XO$Tvre zFbwSF&YYb))k-$OOl76`gxv7fwDXiJVVh>)PfewFiT=SbJ^Wp!gTTM8MD}Z|IQi6J zI9U}`yjhk?^$lshIoxvA*I0WL?fQ{UG9|X1i>HuJ2%}UmV#}0`+diaPLDbLnYk#+< zL4Li?1UCjs)%V+6pjz~DL_+RRyuv$YXRinUOA#Tcp96oJdMQ3WJHPYScRZozzM)Nj z^V(70ORr-8wlKoA&U7gAS5ISgfA1P#^|#$Dg0CvyN&g(b1cv2xg+`54Ll{MSNjCjr z&+ySQY!=J(KSvkO!7p3*^3N3@*r;e_R9yhLd6Rx5%H0Rw2P)` zS>x&1K7>CQ1k_B?=ALxHTgIkd44ysDDY>57AD6x+pjPE z?cy6m2_d@l9k^#q6%9_NGRFpD755!=w3>^)(Ji423a>SYY4q}}X1Ud{KH zcvD12x6$uqD;1^XaRR7la9@Vv*HsIqeo;)&tC+bQJQW~RXML-Dcf%il?27*DlMhu) zKUoox#pO2M=xe|@kL^-@C)IFA9#cM_PF`F$(X#Y}pA;MyG&L7=4S*1`AY2!!yPGv| zKd_ritOKjKMXGzIzjqClcioc5f%Y`T-)z_zW*K7nL72FV?Javiax|d=)=+Qb5(i-z ziIr-G^q8HFd<&oY>_v`@hG%>Ex(1TIY*wV6qxvl2OU$ZJ^cp3UCQ%9Ht8B$j3pMd+rWzv?yTWIGZ6pI8Z6I}qHC@8e6aAnkxy8!)8H>UPj&CY z|6-tIIul0?{fnt??30oworQH}(fZ&c?ad1^Dn)}BI$uWnd|PH%O8dpJ3eVR*?(O?u zhZrm0T$HAN-=Oq<{`lQf{ZGNV;~}3C{(lvK%(v>!B)*%oN53}M;d!68Zu~h4)GB~Y zB(x?}-RR3awPYNfkV}kvM_2%R9cbT5COj8Kd^mnGVGh_C*rgLOIGD}oF&L;JMD{?g z0YoLDcFf2RKwJS}rX6uDafpBLyM^Ee>%O2_PW~E#M`YhVT`IL#_nDYk^w4ovSNN0a zM(N5V1}avwlkUfd=Ptyyx)gGx38am^Kx+Bzz>CTzSPhEa>X>_cjvsZPkV_W_pQ-{| zqXJ!SB8^Nw6tJN3p`^HPKP7?d!W$l6+o=}Yi6ZC}&+PqCwa`hAy(s1Ul|ZFens{eQ zC39{te+6!dhy9?yBnhbk6LciKqB@;&SZbu@U5Wn5Hm^*=869Zh&8W$CoO}hqNxMXI z5u_1tDvELQ?6aN5mza&nYEy!F!WSRs2$PuGV|98tSz)|83@lvG7OU08u)OljG1MUik2`z*=@Xms*QDg z2NT_feM3}jILg(I_mHp}twsCvVyl$J-bQfd2 zsM*0dCC8Z`BlcoW+;X{F$BYvwNAf!Ap_Jgu0A=|!*djUHMZNntAlgKa2nT>zoTazv z&8h-mD$h5p=$ES;}1^A6zSL*kg9#$zYB)Sft?HrdvpUF)zKxyP|LBKlRJjQ z08Vv)r2ziQ#KFJyACaHs@+cdXRD*+eIh_7$YD>=*y((U+%*0wz|6fZhSi3{2WS|% z#nu^S>I#FcP_o$d;$FOXacikSsZhWC<(zY$Gv~fD&)m85+;`sn?fiE4E4$y#WOlQg?|xQ+VFhla z$!dJv;O#gA^7Tg+;JL5{Ay$cR+Yp5`DeppQRUV*D_~nYSP}m~koHHi-^K$*_%o9jUGU6>*aQARfR5cpb_8 z?%$#<_JO*|C-H+8Egw?pYsYE#wL%B|4X0Wne0CJ4itIOqGP zC`X&GNth$UPaexu0Na%3pAH#NnYl4M%dGJA1apEYa)mJm%6`O|a;~nNQHcBEDahdp z`{iOOV~oR5deSC0Ls?0{QSirZ5F%2i|1V1Kc|p>(3-Hro`ePN|t^X$ZR{ya?($+T=e6JpSrdKyCqR%#K|JgC$4$QzgnE7(0-f8!5nrZN6_U&;krFlJE0bRK=J zjwVbv?#ZCt995de2g?npopFqxJ*J;zEt4kHKA}x zvt;tuMpoIsRw}OW0$Y$2kY()zB5I0u%hQekAh`*zUej?r0Y=U|rz(SdFHJ9W0NmMRIj1Z^c zG>y`fhubf-6o>dl4x>5XYDiH5n}OK;k4PF6uq@NHz5BNI(AFkA>S8nob)rA)ET_{N72g! z@Gf@ftHD{eLn|3k{^L(-2O4sd;)gd@GwBS0Rl7tidNaS-b>Jqmn9YAqF3-%+=1~4v z9Zk4U)e2zSM^9IEG;39s)d|y*&)xqzKO`@+EvAaq>69Ubh7n1*_LEh2jm{Tbm-*)XarRa9?1lgDi(Y(yU#@%Vm(o(m z8Hy^%;bUdy%kEdkHwu{Z#Xo!ZvJk0I!${B%>Nu+gm@X$J8Y^xSNfBMcVhX{ry>+F_ zOJC)28FC2*zm%%s=q0`@(dYVFE}_DLmIlZwtVTe%nvV0SdLKKO^-uI^B5wwmII6SW z&PoG-f@f1TON=_@H_>7Atiw1~ztWx__psy=n`_bK)Hi7WZi#{BvcJ?z5v`d-XEUD6 z`-mqdt0I@6h!b^^mdR>-eRdd&7yyCc66@8l012`tMk)j*B9rMv6MAG-h|fo{AaHgU-F_e9Mfz#W1)m?1Q_Px~X2%2Kq%-mqT7 zs4DOo@%wxZPF9Iwi!({#Xuh zPmJ}m`Qgok%dJu5O|`H)9N*7iY2vO4JPdX?b3SSc*@wS`mFS8bYkUEolR_#m(6kHGj|fUmc-J#Hk1*jy>Ro(tn+{OqlmwXZ>;Q*hW~SiVt|2CZgOFsc4F z5v{wppjbGFGNA1?WbqOKGJ6niO!s0Wd$7nig6%G$$*ekngOCl%pb6P2BWJ){T+%ZL zD-RH!5OGN7rw4LPqwT!kjeXC5d4};w@4U+xkr{(B_0GD|yR8WWJpWpwwD$~fvn%(R zUYAXEys99giGI1Tcrpcx56mp4le4MU$nDp1qO<&Jy3HZ1d4g{S)XQdFjQ4mZV6md?Hgt2VL&95(qCEm9ZDFZ+*4rL z3tJbDV4z`Ey?a*;(jRqD<{6Z^J5Ni8vcN+(Hpq~-jWCo03nPh&H*Qy6fpiKNx_!x3 zpvkf-;);&GZ6ge?Y2*sr4SLlX^lJVhn!y$Z6Iu^*X0jP}s=PxP^km`Yo@>2t1D2N2 zBI6*->~Vgm)l+-9}Hn80MslHgA)e$aC_p*ifV}ah7;LHSUPT zMzzP=N5=r@BAsPohzJ<7a|&x65gD$_jmrS?l?d=#kwRFlaX_*AstD0(Ovzj22-c(AkLOg-Jtu|@W1w0BGL>d0+*!-WBF8YX@-TFiM*tFZ$>SsRin2hFNd>9~ zO$o$e^LgZyE1WJu*m(4SCjRXkH=HY|u;XE@jS{q|g+ig19uis1`kCm{@A{JejvN4y zr4NELI8%9UXMbTh7Y8AYQtSZ*ka$hPP}q61HxUo;)fc-N$dT$Duh8*qMXC<01hQt2 zbob_#)C7RcHr=ogBzCHa-$9ykCwD}`3}vC`5XB(dmXhA2))}VTL}$?qxsTrU%!hn2 z-oH9Cfh{}0J5f)0CS1g~F33%F2$}L2Pa*U$u`A+bp!^KO1|__3IAe_Qq-ea28&BvZ zTt*R|Q+cdKV~vA$a(6a_zbpKMu8q}0EQ>ZP#^ZwjYQFGn6fvcG#YE#x`n<0vXtrtH z)+djoF#v(Hviglmrila7_-sO>XuISBW2f7+$U~3mAJkDPNKvu32E`7l0t!utl8v5H z;q>Lb3Urb&-)4xdO|s%I6jL*uNZfc2SW7UBDe4dwATEl zI^0yc85@YVS{MNW>9>Rc-GaCb8v}R*juX%nr@4=@;K7(*LZp6K=AjC%3#BCa!)*|Hl{I6 z2a|0tHBOEd&o^vZ>vP0h&Q(yiLF#ZakicSGip0Py{oYP2rcVByV`#Fr90Dm)NvEQm z&=xNs(w@YX(F8yUV#v&r&vIl^1mv59B?l_F)(`7OMvj{sRX9l-uA=8MBK9M04` z@<1QMX*+3!a$QtOo){WNW8=JIUstrrIMQ#!a3TJXc4iS%Q#bn?AZj$8V>9S5ys@72 zfFeuvp2AyPULWaWAUsVzheJ~~5>LUfMmduM|>w|JbH%jbkLE4T(v>Vm z%D^=w5Z?Gq(~6fTyUFx7K*wl2HnlZR?l?9Q#D5A6)YUY^8~4J@el67lHgrR}=o4(d z&>S4Y8ZaeoMafz{zDE9YYqI7M_w}Bw=j=*fGkBdd;pZGtwvkG(D28?;ZzE%fQ_fS^ z6BGriABcakv1m3KE6WqC0A+NbuMx@a?f|6N0r+2>zuut{%w>3WyEDF2$JactX>_ZG z0!FVu`E+qCrDm{%phuJ&JfYyJf5a+_;~_(P1i_G{s!pYmerSS&63~Z_sEr0>}<#S$?wV}vbsc7bZ0fSXnNDcC(yfL-u~=!sOtvY znd7L@Rg{cXGou+ic5l^V4mUw)T1rBu;oN%WNKPD;;hJ8WA#o0A7Rdth^n^(BmX^oQ z$J#mx7{h|jHRVcZeW0qc^t8PhC-xgKJsZLUWWu-)D_lAAFOb1_3Y38eN~&yU?iuJM z_vjK3Gu*-gKqO++j$~Fx^GY}?3|KY@uQ3E`7=8P*EUmKU?k>+C)v<4KRo*mmJnglw#g;7uu5fn5GWw@1iuyE&%r zjf*kVhOM9JpSUV3^+D?K>bylhw*Xj=F^{4EO=^`wsWfL+6$?M|g&JvG>6(1R``~#30JpGHO&nN6rH@z2Tj&DJQ)PTf#g}^U-r9E%DwhpET+@5V@s5@7*Ws z2d_Fa$U7{q5HymY$k0By(K#uCy#o}g9URyHp0dM*+!*z*qMF?aDFj3*7YM{Nh4!V1X zmQmS|jUBLugdY*n7jP!P7ea+9Z@!R7+7RTqSeLmyh8}!o1~rJYu%+Z z%#1>pgNZUTtl%QhG@Yho3PH^m5lf`Kr@6F$scXd6nW8Y#DO8M@Snkp_%VxFahmYqM>5g_dC+VDgt?oqrB`F)?OZ1k7~JH%$Fa+f5!MYK+fGs~{l)2(t-% zWSufJ`G(=4hH;&4XxuB|G-dRsR$UmQ5%$qosB`wyjyT2kWZqSkD#D&fY;Si)tit#{ zgFx*hRMejafYffnV&Kfs5wRJVF5UjPPY4I4@x9(QzT6P0pNONhMKJ%OPhf^7ak_fr zX~)8i8z47t!>yZ0mqGelvh6$^m8I%R7fj`>m-;)ASCPysO2q0S?Y#mf>r;_#WBl5i>AjqD3g_9MqS_&hf zci`Hu{LJu~%{}gZJkky>GcmX1oJetH3@u? z{XnNmEY9*5cDPl&gH65_c?vHLwd#s7A+js-v z3>-V}5O^=P=m%AMdQHm&K4S`({3bMJI1b7dj&mN;?rc7TUcfuRByIF+O6&5PGZEAU zP!b)k2k@f=?w@0+ikaytDQZ)@!Td7cPC)0T^RM03B~J`dRn`|QZ zy|i;qBPN4bJ&2{HVV?qHrp$ng5i8$FuPY#oo-no6Q8Cc%d?_8lLcN61l@f*d1nzZHBp^Kr{jBw9vrNoGbUZ0)kmxR&$*yv*=%OK?J&8fz2U|k2YI0v z1S%{ZgPy8S{S8>14H0c9kulVH1Wz+IG?b z4d5-iCz4Iv`O`+19F zRqfSS&TNv(MjHpUL;>Ii7;c48Z&+T%KFF6-6+J}11Kez{e%Xzj;F}6wv`WZoiHH;9 zre}GS$04+s2sAZWNr5R)oCjRh3LNe|r2^2(Fno!vEGV`I;^DPajIutxx;~p-IhZDY zwynS%=yqpIGK-*d+Uc~mn0nhI36pXrq=Nt#%K7z{`xIDio2{@w?Hv!&-32{+$cW;h~zx;JvJZ5+*j%MiL5 z+Can8p)|wLhM?lX4@1je?u_5yr#Yc^)n_jQWbyJD@O@Hy=iQmRC(7&p7o;tqX7dPpk&k?y9V$1 z4Op8EITz|8#|)QMdUk~?S}*^!=tkBj@4{;` zkx+d2L$2_4)bnSXp)Y%BpW|hD@siKfKM| zm$HB4y+MKy#MQc2fK;(N1cfc^H0_^ifAjtp2Vrh;_xrc6xQ}bf>H^>YsrK(RVX%}z zKeSi;+YS3QEQnmk|7-+y+5L^m(ASrEQ{z=N{MVXcg~f~js+vS;?P(o6K#Y8acDjv< zFH1vDf`*;YupbJ853f9BGK^}t+bgwq-t#3xS}-&$Spu>;{ZTF5zS#HDQA%fez6Esv zG{gj{f&LK(X;r_CBlwv@usk4emc|ip1?*D%(hm)Bw>=kV3x2iKRKdGQ^E%y5z%UV{ z7YG_xZoyz;9SF@x@<~h5XNsd`ybu+1UwXz0!d&>b^!*F` z9z&9dPw%kZ%|8VTmVWS_8Dv4ppUgO43#D$5l%r8B&t5fCRW7H&F-d_2-s|HspkSW5 zkDo{#&K30L*FaW$gw&A`cjnx-`-ob|Lt08ez&WU7`Z~VMzih$1=f?JmuOT4q`Efd!RM@(ON zMas7y{go0ZRHE_{`;n`=u^^g9yws6Ww}i#{?RVDLoTCNNqp8d4|CUoAD)W<@H0=j>k7Un4gr@-5?_*zo$c|8CCmzFA zLNA=ModE?0uy(H+oUcAw;Nvpp-ZQ9A^H9W5q}y&V98sP^et>QO)c|*i7rF)iM+xie zF6O3RUt+?o1FZm4z5W|1ck62aZuZI3q-NSB9J@nNkUFTlWBb_~+N0tNw=5d{O%B12 zPQCaBjwVgnhugh{uA&z%ws@xXvt16N_l~NC1kw+Sk>NtiXa_cv$;k1{MMgN$;x&66Z3CnyE^mt|{m_Sm9wlj?Mt(Em6N@cxg^FzV zioE3}Y9RZ_Pp%>XFa%a-O-N>n50seunIz=loGp~;tnbqjah2=)t5q*1W_2ZLc%94e zRkuS+#*vY^)?X9(s;BBcswotoqghxcGmwm*CNw8@x<3Ws$j1N`W}X}rPsOa*7aS`` zR*%>oJvK?Mq;GZDD<6XOi%(#)@D~cEr?|q_!+s_IjWdYLfe&nfZvsv>k#x(9Y9y&f z!gO=*r!c}d0Q52X$R-M+(PW>!+v=CZ1l)Wf*Ab5>gvnsB_{2Efc2BzhsdH8q0DyXc z#E%w#==*p+I0LYF;NE`y!r5kDo00V^ZZ_8?zf)vp7gmE0KMIFE>UM3_8}0TGwOtRRWM4+a2`jqMUm zGZGGu7sNk}JqdpQkIZtM4xj{_A~~iKJju~IBzFAIOy6_4YKdoOpuPY0{Q7sozsku? z06rp|v4;lNjaqwl{mc44qt~#)F|Eo;BCeHI`mWl)H2!PuG}rGxH27a-{_mw<{6vBd z+>{2_8-pR@`FMsI%R!9O6DlW@DwOVg#8@1tTV^&!#SAEe?f!%KX9Q99BFsQyCt83~ zGLmSB$TEPK(*YPRsGM|XOMgtzRWe9bKZw=t5S(4T*&eas0vRPS8-t z1?d7pXmC8e3g9G!+drB+;?HOvMo9G`0>?OTlVZ)2f6D*Kg8g ztFU4uGy8Ax_1SU0J{Db{CmFkMK3`QWp1jn$^dB?ldxAUN#H22BuL*ATsYS2d&<=Wb z`-Glh>)M5}gezi-2Tl8BeZ@Cv{}hID2pJS}oLP!%#+(6hPjCLys}%{&vzxZGXk2*EyXHuMB`2xUrz$f&}ypG#M^%4uW!t2%#i#AiOnh67(2eF`LAB3uzzQ#o9iRa|vbzRwZ4 zri|rKzQh^v(*-aQ`_ZT?YTZv)@NCp-oB}dB7>|k3jK1IkuGV{S} z;Io|3kNwv%*cf5$pk`Q?W0RF1#@H{D(Wfg6P|IbcLTl*Dx`PWnIzo9TwHPRTe696e zLA7Zr)ab!-$WZjP+6K#jm0yz|qtSYoxbEmayF}5>Mw`_B*f{e2`&`S~hLz~0U+LSF zV%xL#Sl(=W?juagEqG6I{`^q;!1D3s?`qROT=f&2`s-=+mqfQ_U&hIy+64JQMN;Byr9}LUXWdQg{#LtUrb^CwOPQE?G!-bL# z;WsE)59qn%CdVSnY8xaz+^_)<5@Ey`!@~bc3j{S9-Z)2CqPL zQd>W)3Dwpa{J5J3K$m0a8QY~-sm z5K6D=Lf5^m3gR7H`g)ns(z5c`g)zYY)>fkjQjgG?M^*k>>JZDubQQl&bxLiiH_|>L zNNhuB)V9YcQeX0xOQESr43ls9Bo}{ngJjK)(v1lizMR-Tej2TU6R1OCg0U<)^->BC zIT?jC^?%{e=hkk3&wy?QoG&32hE_{yzclVXf624VtEK4p#jIk;TDHlua#nap=h@Hq z$;Wr0n|JB<&n|PB0YDw;x9D1?ShazK(uuhPT2e2u0$0TaOA6CS(XlWqd?GNYMQ;_9 zaEIIs*09)je-|ft4~fE7#h|Abetj8;oQyphJ(SfgHwV$`atwTn0l%zXks39i+vxEt zbM;D6SN#om34*}Sc9>)SYXU={6|0gQAs0)eo#> zSfb{}hx`lhAu8dK5*dxGel0cv`!3=MwKcHX#eN`2Kjh1ERQLyiSNAV@+9wf|Hn+hB zjvDQ0%d@BFNuybIJyj;A_F7TkdB}s$8#C8b%8F(WxMXb=LJ!eEE(x;i6hSgP=x=h*zCdgD#+C65xA zGW17^zz~eQ&|{l#k^9IGuqiaA6ss&w`T8ebbh+cI0Q-fBU`n5aGjya?%6PyKz1Weg zcBVD5p_jiHUbOu@xWieD?ri$)zd_x{+;I?3ty_5agN)a7xk12FUMiy~?x9m7wm-_+ zY2xlY*^VZ^0h#66scbhSbE^3zetD*zF=sb1lnjZ{$BMzbqjyg@q`Zz2f3d|=F$$TK zs{iMNA+kkXw<=j#;BM=Y6So1i<{J$ysEdfy*2y|h-Bb?9_GXQ%FeoiTL|%v*(dHm= zNlNV9TOrzah1#+o`7d#5q`mh)$ka)+TU7c^rt^w^mq^Q@5ctOu=f9Ig*sa{-92l+! zcb$D-DpSjvDUujS`ht{c)&3<1JxsEeciuj~(bN+MZj$ufd(FbJ4B#~_B>1N*KwI@? z@B7A77HqwzA6C(%0t-htp4@G^^oI32>_*T3bjDdBsX_9O9>sRuH8ll-NiVMDdpR(6 zCtLe?FCNDm1rD=OMbMlLtZ1J|426eACzXj7`w^qeyj)G!&I*bL(>@g_{^R!J@XvIo zvtLpd1&+b=;2+?&*OxWwc=QO?mUI)+sqQjGjClU3Ls%KdD3&Evv_U>L$CshTn0TKk z%jv;+OXj&HeIT{on)laI2#z{%{T#Jq@bO}ngx}KU6@@|XerCCsc-t29SS%M4p55Du z{fB+5Nv4-#`@OdHlZ-C+9j(kJM$lW{1Wgs2jfO;4)^jD-rp1YHcIJ@szEsYRx6LMa z5dyf_)#ro7)FVWW+f(tGx}UvEj?lw25toPOTw}t8SiHNcSON6vCO+LuizF2#Z!?xj zklX0cr=XqQTIKiC4T=Z7)Q5hlTr-Q%lN>crBpebIxh zkfTBeKPvhB>G5E;`M2q$yhF}s%@87Eby-@b4)z;?%3AyE(yie1!8%y-iUn7ER8S}$ zz|*PC$GMA43_~L!O+?Pz+x5o&rs}lXlXE}3m zFN^nx$$9x+8HRukcIflmUXKC=+R6NVn}ACIDn3w5`{1B*OAQE~R6!2i{*m?cY&LSs zyBnN(^KpH__qN9C-HX~FlwC6%r;3y|(29j8UA1HG~U2@LKX;ZDr0k zCXc96z&BedSG~aMTFWAHVI@2CI;NS`RE@ZjM?}_ltf5X2sXkp|Rs@Kpsi9HhIWNPa ze`cZZFizt&ro{qY#YrqJqGoR*=Dj9Vw+bhWl%m|!iI-h3-S%8KQM&W+3d_X^a;N2^ zJDxuTzHp9f#KTQf>+?nGC2vxp8p z>&=UUZsAmVH?HNay7&?qr|_EEiS{`2<_B}|ES8&3a4iC}olrOV)t(i@ zSA32^>X3OTD&fxgvlY7HE9L(4Wz_umWS2!M^c`ePDYo+hO_U?;@+Cd&VKP#n`Rj1$ z-jLE-!#Y~`QvBj_TB0^YBo(AF724*`JDpTivX$0N-DLHEi)yh48#QZ`vlGcHdEaTn z{OXZjq)dQdxDOn_bg{SSA>ZSUnu?i_UOWq>hC4N*eqQRELz}{FoA?s{npy1~C1PpT zWB&sqv{MqUn_! z8_q8CA`r>Z%?>QHcb)MQPGyP^@8+=#{j@?^rKhS1@%iNWp4N`TW|o}rKK8L}t3;5b zqE(TKjgK$jN{lL>&y5)ut)r&=~HpC*7i%Y4_d5Z@Ew`p z>ns3e?Tg+wM7<3M%bJ~x$;OY;5JNfd^kR}vK@4~tnG6VbIiBp2sdv9m^f&{ zL|C$YdbilLTWJ>g(gg*83%AWK7kPQVgm|cfratrQxW+Vc$KL1>o5qNDqbhOy7ns7|bdmZ|HDm}%&K1qo6iSGb!$ zwR(718vtlZkij|E(9#SXHUe3qP3^7(=}FBquy&iUhK1UWDJ>%iT)H*sGcZxgPqy>{ zdW3wVR6eqb5$PnPBii{5G_g_Sv{!^w@l^vd&h|da@8_>U($0_EGVXfW;3c{FYWf~f zTzP7tjLrB3_)1`B+t3JFsHRPVzS@=_b!zgmSi@Q?CsO@jth@7oSMGUCZxKzerhTT8 zQXjjs+`AsitT!56x>rgcXueiu?+M@$WkU+gSzpeaICA*Fp(``uMf>t?b?47A{;_Lr zAt~^8tN;a7gi6MpbGKk{8YXMpvlPPK=ft^8u{Gb-tYjb_uV27$JApB|2Q)SBKgWLd zf5C>Z91x|%ITH7b-6KT>`CKN9_qlVKpRSM!?mPGA%4;l%Gu_+DZneS&L$Ylhl=uN{ za}Q}dC&lOMZwSDdmF6<-kj#e=p;uwK3mmp-Q%0E$-XvpY-iIb)X4;OJ>+YclSX=YE^&zkEJJn_hJF)ui$Fno1jGDFrey zia{@ilrQ3IO+>v_6|IML*ES()Bp1RLaX&T^n_KWDH9g#fD`RENBh1QeMxp1WZt}$S z_&%dK!BzM{VeS5$JZn$mP|8jBiDZ>$9^hVm4u&x5&N1*)5ug6vP&V02v$aBR*x7=e zl{`5J1Y0yIwn3Rn|I6a6h`UE$#N09RR*0($t zG+p_q1Uzm-H=!&(8$8Y8Qo`KO;o|Cjz3PJ`3vXvJ@SC?W%Pt>ZFMo(x`R*((o7#tD zIpP?(T+xWT^?6aAcNCMHU#lQ1Y-Hp$^D2VO=VD?PPF*6VS9vZ>4JP?(NpKn0CE}I| zBU_|cHVcwYGG;Ufb{}!4#A5iidSbL+@)8TbYZhMPB|S3CORKa-J)5PZf?`T`pHLW` zb(Z7L0eb34Q#1MC>;`Vv9W1a3if54{D+{!N+NlP?_qbc6JsIw>pCMNh{YPJiu42*p zKYcAKDub`5Fz!15q0JiufC(;IDg3V&##v05*%()BvedMX&t>#{92Wo1jM0_kU=uZ7 zo!D-D6_#MZMla`nlmJb%^=u(AGwV`u6dRy@N&TKIj9KfJZnisd~O***GF1((V zk05k7RYjD>NQO4>3&dnGSnKzN@*f&<+-~kg*&A5!Xf=v|oHO&BkmJl%l5}L_HI88u zgbyW>0uA&qMkOG;vLn+gJDO3Z*OIyi6C1o3+ zM%J$dSR1LT+wKaDYNu+kG9`$oXFpVT$H7Hzi6_PdQi64rumbD~Qgje(rB8Huq)kJu$RHqQ&M!1!uxU@wV7Yh?&J=?mwIc3tmimf=u-#~)mnZR+{+ z-cpsq@e{f?if?YxIsoLN2Shiz&ga39=Rf$>$cr~8n0o~l)r^-k)#H{6LNSGzGhP;z zJH35`npk}r&J>x`Ad&1){k)L_yP>{kC%}6x5x-abcP~K$KN;uro#ahQ^ z5ow8;qOG-#%cJ;_B^EOdcBNsndlxua#wS{)0!a}msCjttPzH6#^hqk2$-~qHn_9_k(iRz&3{LTMjA13SvDDS@SVwC#L>XtJ4dg^H%c2jioxfKVxd{7*-9)oL9 z>r~|cv?b|ks1p+MINzswU%JYJEZ7&xxfyqDho`6oZz7uRntmmO0pgCtl(CcM=p}SB zYnZ&BoY)7;3b`1dEH#lP7J=FnO2Kixq}PJKH2)ki$nTN$RU~wSXqO_Y-XM>YPF&Ee zp#2f!K_3M#v`D7pV+T(6R|0@t-0Y+JBk^vzSa1OSRr*gy=Ylz1Y!)pYv#(v|TNh)+ zMYeO>pamvn32Z2uB_Z-fdEOjNnWD$t9Z%Avh@E&oX>qRcG4Mdfd2Ira^AN@mw zo)0$#SJb$a95vv;g(U(<;S#3%2maVb;Ol2PjLp6Tt=7Ua8sFE+4KMYml%XnWe%o~z zXlbfK(H3;8Ol8kBO05W$#ZTC>TBy?e=KO~xE>oxdq&^TOxSdal<$nERCIj%4B=3ys zPgRiB4DoGs(G3eM1-AM|{(Tt>akE%@6_lR)goLn@)d^ zCmfqODEXxmbZ@uvCq8uPHw@r2(!bdR?z5ni=`jc_J=?P>i86mBK48-G385P*aZ&St zHyNIt5vsb7UeYyd)?ruL8g-DDXF=f~xL;;xYvTB@Czi;Q&Hs2!RkDN)FGLlN71X`E zpZmwQ3Vo&A9ODzyp+|4~D4VioC8>Ow0kOSp+uy z1~8H1Mq(tuN}FYUFDehp=VO|NwhEhw4?VXG}ezC;p=ck+#8mZezP5d(Lug1TX~p{ikyH2gyJfnlE~q57Ou_j<;%dt7Xi zd(sv%7s*;}ch=_p0oHy4PAbpR+I!#ou0i;0_(YV8>+hq-mpkUZzCsm$J953 zV!GkFoI+{0 zC)DjgWm+aj#=WT$AXnp`JJcUKSBza6R59L^jL$)CJA^Co@M>W&ma$b`ugrf()x_3zK=)(N9PIWz#*)SlKzHKXXKs~N_9bhD z8mppQ3c0YHK?3zO;Yk54F;E5=P1GuloXgs8{p&W-$E)m?W`Q`@&rAPE5i zCiLD#2wmwQBy>0~* z@7{UupZD*ZIWuR^oVEAtnX~uWYkhmI^|?03mcE1)EB(dm0WL}^7P|+Gx-De0h7*B4 zuJJy@L&su3SDabuWRxtEFn(ioGLKl_63aA-H1^^kN%C7u?g_F9=HzII@`U73xN;>b zIQyYiX-3)iHMs4(zK{0Jk@H>%&AQnJi_q5!w6l^k6dV2DYGwIJ&(!c>Cqqzgm!_j@ zsReGgT%_(u@xj#Y&5j?px=|{34egTnZtLkA-zO@;ng%@P(Ix0XTYKf+X8AcSPM@#-`QM(ZAeiGw5 z8+Vh@*8Ij_aj&pLvqTpVqXA+Gy}`Xwm^Wz1()K6usJtvh$=0Y-scTeJOnI}qAc6jh zp+jTeDrn+qFf#h#dU80dMvhAbFKsf#f#z__-U=Gq;jcw8sJ?1Q#DS+c1gs|*PW z$$O<8W{{?E1KI8bDWk^4x($x)UaF^1v3yM&fR8)_T-8{ZkLrGvnlDR z^{q1vIZeV8FryE}K2I$&k15#5^qR+(cTi1R0r&(hrY+@&RUxvyk#^yV-&kuGbCw^P z$HIU_#%1K_D{_QIxtjNLQ+Z@&EoN%cp#{rnPIpF-*Kek>h1RpIBPwoeTcBkx@l67k zwcNyp)1}JgGd|@Pzhq3LU%(+@4&)4-^?E6rDLuh67j1>z-o8A$p$orXjYC4 z^Mj9!tI0>x)tXIngsDMZs-g@$)qM8bs~w*A8C9TS7o-PVzn%Vd9uNz88@0mKK2dX! zo>$so46Lj$l>%enw#r^xq$1Jw-j-fTexAiTb9)vWX zp3iGhU&^rQdI8I{ptNBQQr`y4n>cErLg)YmMb^rklXYp=p*URAr*|6}?V6PxcV(6J z$!k-ElY+b+tc%0yaXxF0vNOx;##O09&$_$o8z!Qo?>70dYQsO@Xw7~r=O581(gEJq z@>$~+R2Q%MvT)PyUOGF*f1t@M(nYl81)oCW}o{5 zBBA7ut;gI{DWJS`b7ddg^k|0BshPjw8O#8UotUKp3s zO|Dk~@py`94_v7(k%(+Df1X@X54vl%OjL8sZsr3Fpd4p7XYx5qld&pL^_w$yDkriq zKTJQowjhYNZ5kab04HiNaa$(`wFqb_qRUlRa}M}39zQwE3AT5nmdo~cuG$tFvH zmQa`fRIIH}f`FNuM((UbfH6NBlsvAX|ALt$_ta;Xj7&2%=a~uzY^FK$RZ;LBwK;kQ z*a!DPc2BKavZ|h&)|cxkIGs)2Zf1&oQMnC5^_rl|E)iKO8XHzBLK5%jx^;T_clp_z z9~6fo>8&qArfe(1vOnu>z^Li#9QP%y#yX-r&dEukl34K%)sCE)?X$l#S1H0;*}u_s zNt=*|lnE>NQrX)a<&jEfHWReLNru<_&r~n#E3>aQG+`WbUcp zO1bb%kD&7MVqYP4F2#|9JwfE!DKoY)g>V<)fHy@!UW!@*fHXGF>le5JOG4i0On?JJ zIzmoEMa}BCHYrMR#-Y^(v1s4CRpyq2sD{Q4<O!O0%&Q-Ziwi$&D!VnTjVHI0 zLfz$G5^_yYQ?Vl-^J#Tro30LBXRN&xY^MR|P`2Zf#L!}^q4tC$x{Klo!6^mhtrO^u z{M(gG8K41i3o>pBiAxWRH2LnL(M1&7WQlW`3i=WNPP35$CV^08q~$qIF^Yg#LC~1t zJp6=>Nd$U-B=AXU8x-{CQ!I~JrQ|s{>C`#Y?B?0lIgtr0r11V@?ik+6PhIy?y$n*T z&CV`y$kyYr7R@BHv^JYlN{MKRE~F1jysVw~m;unLrHapLj0E~*6 z>Cq_i5|0?8q^#H==C&Q?%)OLdPy>PZRGbqWjmKbxPlSZ0oV_Vwr;B$hNS&5{+59qP z-1oK4e1Ht2LadJ8q^tq;W#YoPz%6BZc*A+nG_@EMrMc{r@!(+mGTQuW_rV3b=y5U7 zpVn9W@a?8*=blac1i&knCd?^oXL{#(yBxfjh*DnZ@?ijJstyMF{Z?a%uQx& z-8w_d^+HUg?z?`w^}UZb$3yGNC52i`d$|Ekxyn1A+4CJ#8W3La>|}I(>;f{cnad0j zRTH=JN^~9cjj?Q&&J(f5#;Fi^UiaX)iXV6zee3Jr_j=3Px`(E&;D!C>-ABSdBz`;b zN0z5f*zAeX@v?C>w|@c{f1CI^wmm-qNx$7nVd;gRfNt6}VYc6V*|Og{Q1joUOm*?- z(wCk+7%sT6`o41qjIXubI-q5bO+#^(sO}HiSd_;Do$wWxqdkSVqx@HK@8)&9xBrnJ zL9;wMnWrV9;Zr&GVY1{w5JcK@_1_|U|L!XYf=_L4eftUEq9ug!o1T55qQ|0>_^$DP zkNi(JO{i$g{LI#g+>4n&)ogDU|0KS6hJ1&A&!?!)yh?FKaE+JdJ?}1$&k9MlG+kws zFK$#ZUlCJd+_W?l`%XYDI!hJD`hAXUAO_gFW*S2LuqAR!&_NH3ZeRc5HqRwRo=|Db z#0|bVO^qCPt5eXQ0DJOEoG$g=&Ya?+2x0Xj{0BvX!&*zH9$L#N1eiWM-uqDj2WPw5v~2tQHy9WM0~kT3s&vZGQGHfb8M{Hk(0 zc(e#J>3n{Ne3iK^7nm2NV+V$C2wt(e6Ems&&Ig}jMP)^TScR!dueAE%mi4+GZzVXP`}hPPGU;l~NyntB-%N!xJ5sz9v=XA4z--u>!97 z)UNsF)b%5#IIi!YU3qp#*;Z@QIi=js9#rwn5e!8{*%zKIwpd0=NgF`wLue2!XAh5%yLEDK^>8 zc?fjfl&wHnSZ|G9nWO(oPEKnLz3F>9^=oMJOlCYQ^&@vraXcsEEhYe?ONZO#YdE)Q zel9;|L3RiNMA_5ezZ|?6TK?VwGJ~l0BLn55W)C-op9=3BKKZ>CmfD(~9ms=5{K`pM z55v-T{JbA2I4{rkJ(JO8f4|1g%Ib{*+_!$Z= zP#=Zw#~llUkNdMe)ZlONe4(&<>-O=6=|d_5g}fE+#0-=6ehKIr|5t+^YnP9C6xVnx z%>7Ci-z(za@2z`&iPZUd-Gu-Yc!39`v3~AZ(xLaxUu7;&~iNKm|-|-dM~} zKt{}JAzK2CnIh*`E`^&Rjg4R`X7$nk@d^K0R{j-OoolBrdBGZlGR2TB>Jk^Z*_w15RTieU|SOpat%#j=rp6jdM3~2Uxe1E_1tG{9=$| z26tB7J#=!S#FsWp5jU5__=GWE?eFi z}Iy6cjF~uGUZ^IfbH|PT! zJnuN2W(>g$5m8}Y41y5gP$b$exY&BWVEkY`ejwd~mn#|15XV&h0L(E&y5?*5MJU#k zMxh902uP?fS6Z^#wWt?}5hi{kj!ZuBjnomcFU)8rpGIXxn`G`UR4a|`quxy_-xvrY zN7%u0@0&}Tt3On4kbc_fik?VV=z?>W?4fYxj~*;0D7x328(OD<5&a+D4`QFRzaBo$ zmB&FjEdg6`H$1d3;+KwYkk-EgZ!-7LVFr%m}i`x&2lz0@)4i( zvk5lX3L#uvRhU#V3|c!~=(1ZgA(w3%>yh7m^ybdcIe5cMl-KDNRrKX8tUZ2+ZgYoZ z#9oK3gRwKEb-+&94=MSx;PJRzbjL^^pMC&{1;4p>ir04I!5isLr3(vj)V6lEqW61` zsWcd-H7b@Kc7=Dd)etiI?EER-{=pX|xls|CGebNE<8ZqQf}OBJafl#Cr6^)e*z5Z3 z?+HBmuEQkJWb{J}z|G@BL?FHo^0nviY(k-z1ae#S!h2iz_)27Gr~K-Jj#gwUYm(d( z(dE?WZe>TG)Jrc%EZc1_`7Crb*pe9q_2#1*Qm|623^}*X6pQEz!2!+$rhOsBa$s|D zg7)`-D=($IvMS;wpN}Is2Kg9f>masEp$EfBH&*{2eRvm)5Hr$Ri8p-U3ikrkg2#u{N`FrM E2O-$IzyJUM diff --git a/web/webfiles/img/hydra_target.jpg b/web/webfiles/img/hydra_target.jpg deleted file mode 100644 index 72c4bb3703d705f1ef949c51fd369448aa54d698..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 24547 zcmeFZ1za4tGaCdiiNkVY<;7)LN4TK0D++Bi%U?B+sLI?zS z6Oz5p-bda&=iPhmeee5y)itZCR{eX`s;bph)78~|y>Pt_0Ljb9$pC;r004+M0N2X^ zDF6l<8af&(20A)ACME_J4iPR6HZ~3!0UGx*q9?{!(hEhW z2kH+WFyAtNyxbu7ZoSy(??4usW%4@gJTI5YeQx=FI|iGmmba~Dt-lO;j5F4}9QxJa zIa_Msp#J|UX}{cW+J382r>nCOV|Ay&y@;&U^F7I>T&9y2X-uCo_j~mwD|RiRv@Y3{ zr!!N*MpZ4^AK)A_nb?M;CsXgncR0MNyzv4dzuKPnezVHsII$P)WoG0Vj%qqB&CD;F zvL^3H-{uHa{pK(9$p^>EkwY3yp<(3Fv<1t_xrF#DB7fs(Kj&b2#`MjY;R9>SD56kx zFkG7E55Z)8v6v?B`L<{pSgUBlJUYiao56(+nh-6?j8Xhg1hf(p$1TTPCWehQje&u< zGDoJURr_AHDT?xpMKQ9Zd`w;<%wd9MGvyYw4Nukj%4cZq>8~81i-sr zxZ|*G{<7W5zzPVkI5jge=VLzSDr!nGt7|3FrYJ&lMTkLa{VHW$|6vn645W&sbt@Gh zxA>iy>(Y|~&_yOa{-O_Bd;Q#)TtUu)gC%!MskH-c0zw8bM*S|8$5`k;@|xD;!2sac ziQxy|5uJIqD#v^XTI;}gL|2*AES?SDoP~n%jEDC{K0*|L)kj#wex#d+Gj@cQ2jdSB zuJz&QzY_8T|C`exVUr)~E7dI*DD3^g6M7SqTbCJq{w~!i1qA@WvnY#F3O=#=4bFPN zI^xHH^GyELBUpI#^I^xobIva;)=^hE|5Aw458_o^GncSxhud2CgHvW|p`g0>R}BrQ ztMAl4IM@e&U6Gk@JE90ghylvohr4`uSW~ilBNJoqqy1|xv!@j#;(utBr?jj@g|=r( zlnmXR+=X0tH_Ow9fd@)_x_r zr2Kf|=1jnR!<=?n*d{B9dG>OUO8lXkks_jd{$#5^fq$YqK7Z5-Jh3{g>$;#J;}m_V z{?T`~UC`kzyT!OJ$%9IsboJS#pQo}O*RVXjl?67-3K4S2&TbPB|C3pS$`Q$d>0pTj zuwMcFpHjc);WYe)*zv)_`j${vuv6C-=iQI-InTD%X24$HIdAqfYZ^Ivj3fP{`()Ki zz2=B3s!>l`!Gqaw;bhKc{;mqWso{s${CnvCdoS?eD%CeqXUgf@$Y(#X0L$iKMK*8d zuv&RDholU{ecPDFc46`QiFQdjdSk@~${8*P(=m4(P+MO{Hm2&fr$Rc^v0MH=iQ{j7 z7+gel{MiIC1F?YsKolSf5&#wTx0whr1ECOr35kfIyr>WwPH`@79zIoC5FKJ#!az(` zKvbl@n%cgo&n=`|Q+F*a-Rmg!LU2Quxi08Dui!9R^iWsb2 z7YA=wYjaFHNwXR_cNfQ0)Jn3R^5zEVdlBY~}#^ z$b-TAMpj1P7B9Hde3}CDcY5I{d-^j2EsDcZt``={4Q0BMCjz&s?dEvjlY7Mp_vczD zx8VJk9TEQ?sl5}s0YQ5yz=e&nqjH5&?G6Q9PK)GJPXzB`hWkCc`-NS z|7w^u^%ZFK;j?3}?f0Ye*>wWO&d;Cp#ybC=XflWIe|-KsB0h6>>3HCL`39KvkUa0P z!`YDki;QHSkx$j^nNN+JwG)+iTg$Gxj_&y=D2L@dz9>l-R(7Whn@uZDBy(E!er1(2 zS^my4=e1My{$rZ?XHL@}Y$4_^cB&)P4mcq1bttJ_)N&~7FcVPEfxBg=la3`5Mj}0fGOA#C>KOZ=b&(OWR zcYFSG%4I;Rx%prS4ykDm8YyR2I1Z=juDQ=|32Gd5o?mP;1g6M5F7_v+$gSeD(YB@kWnTX)){|$2Levy=Bxp`OS`FD;v;osCA5!lI zj6S6;sOWEXtI2V&Az%CtBNnuYQOEkHLr-1}3%8FK*kkiBQzlz3-_hD>H}x7Vlj7D7 zMoG0f;FVoYtxn#=iMMZ*qYH4^q@Ex9re{699e1uYQol!akKSkKV`5X)JC#Vk!FwiI z^R1d+u5`F=(~{3pDAkY|HN4b!krA%avant@Am>_r#MxpjN7<6>&Xjbg{WJdiH3ImK z#+)}SHt|c6%mEL^dph&p7=e}KFW+h&S*e&DTgElM&dRL#hd%n*_tO`RWp&>g2NsIn z6(BCI2zESu%4Q*3_lduk40U%F*uH74EIaQ+Atho@M{jL8f(M!gAV_2X%s{&?v}4_uJ^sKgb0@0?g`!`z(kQr|O9 zS!I7zJ4jrE-bL$=%+qWwYsYDL%r!ud`t0-?;8>pX`1^}X|7f0-Uw}k#VIM_a3whbw z<;%*2G{uBL?3bE`3r|k%TVH;tbF4trB_=78`G?P{dvntWBUyF^{I^E#WSDTiH1qBL z7Iuui{dbaYh{5;;Y;6ihH_9$N{pIeg-vfkFCA{r4?8Tg_*?_b;m4j0A6w-szif68mC@cl|1|W%vv#e+pl0EjIe2yD!VZqis9(D&)fiJ-oG>^1D@%4Fq#((oZnye56IyOP~4UU~I2= zw6MdPbT-;Y>x?D`&6`Tod>;D_t6eA<+sN-XR?rJ+>96Sh$w>Qtno`5hjulCl>3wP) z7RB*64^zkuFN>cd7Cf*OKjU6~-z@e1rbaTL3HI2k+=N_+GA|@IV$s3r9d8AWV?%X} zHIao?+-?(Wl9)2j`exX;e+{6zhjoXIYnWGcxPy|rj~dGx*D_%;zUuuj5qHaTxjD@D zLOmJZZr2aC=+!w=hnQ$Se>c-SFN_Tyb*ru6nY2hx=zqz~e97#W{i7Mb^TJeyeANa| zKm2Igfg{n!wEtNGou69YW~+WrCp?JPC{>;CKN8tE2zZyLcBF)zWM}221Fx+TjepV; zaPA0Ow0_(9zEv$rCHp*UVBkRLnXmjZPhxyxZ1q!r3#*-fmbnpa;A+@sQYFK~!sFPQEu zW2a}XEF#ldWmp#`E2}I^yCJPvy={Y6o|?6?F=&F7B(3++p}@i;f*!tV_F&9EwMjY% z)k%vmKJueTVr^JWVuAwqiwszTG#WAgbbKgSJDArBrfC16Xv5yQ|DQkDs<~q`M|C6p z?;t}y=2Lvm8f1K=`pKT^gVc-i`z?5<1#f0VmLmSUSaj0wgd58AQXyEuL`mUmdaPbPs4OUAuI?aPc-?u?G4tHvQ+;PYv?l_Q;P|>lF(GaU(s0jUklm#Y0=*@!yl}JoV-T)Eus+oBd zG)_*@x-~#J#odFtBvsYTiKH|<3lBe|(pfZZ{<;}KyN6`wNFq4lq$%yi;z^^RY+9j` z6+vrls=i(Dv73mdn}?e$2qrpmFG8b9S^?{Jr{N9{UhF$zpqbPH#$*VVL^#L2d zb9c9Or>^2^Sor9IuHphVCIYqCfe3(RJl-S}2r!Q+8-sIq4+6~Kh#HDO{fi>87(0Xa zmrxn-W+&b6KEY_-%H(5iHYBJ!fq}09rNQiI#xaFkrL6J2ojFe6S4yF z*ufWU^oR2Jhhj=Za2@g-%H-#g4dk0^Smy1tQ%m$euuL^q8I|a3r#duO$xqdIr`qXj z)lSv0%C{_OmDp)_{6lE&x5Y0kM7nO}-HsLfiM7oEqW3EFET|JLU*WTmA@gJVB{!e7z?=4ZNd9Jl_ z4Y=bDb*ihsNd4>RHtewwZg19!|MQ5Wrrq{7-a4C?I+hNpT6?PBa?0ClYb^yP)jiJx z$u&Z{LiHJ>&QogmG)2@rc{nktM>f9R*}9jSCq1TdrtI&QQm(WnHbVhitVU~eVxd@I z*mW-9ctQOvMxGcybi2{g?!EN)NoV3>ThF0KhKs(k;ANhB+pZVsM^Z%QqR$BN9GLw` z&@|fJJBRLbNaYMdUuvrl4qhhELLNYSu1L?>aLU}@g`_we);Gotr;(_&yLS%>aOmpE zyc@=5T4^`4qDW_BD{_Aq_Wv-%q6dl=sX{hFn?&t~z3V?C6j1!BT>FgGm-r>t8mde1 z(=LPcnnR^Rr$^Gcm49KV-JaHU()trBDla&6hkO{w_mhho|*Y%gUqy}L5Gz+|?aL@WF?Fq-p4}wc^%d4+ zR#A#n3(<2DSt4Q%G~7m4d=`5pm-}93FQLqKw$kN=amM;z_Sfp;Znvz3> z``fcI}rMz=ry;vtLM5GCQho&Ji-jCEmssitFIXJ5k3Fwa zaKHNeiq<6MNa`bvAC?_-FGJ&z4HvCmHFUvLIl~K+B*-?VsR-GIoGBWw}RT(Pk$FfvuzU^b>qqS=Bg zvM0sXU+0!MJ}5ge+JN>>qkNc*-iy78oPQ^pa1m)Dbs92ky-rt)>dG2qh_$YR)JEJH z#$;Y3B9DmNa7lzo+4<+RekN`pxDF_R3Ds3U@RE+iWJ_8>y2Ss1mx}lvTIcU1&y90WD&-)?|1wPGn(MBvQH< zur&MWtg6Q*`Z@oD|5t)?qZwuR-5FviLl{5bRHK5ta4aQq?~AgtWtMHu_YZRYbY)82May3kuK_fA zf_5(aI|E-9G-52|*4{}Xd0yF7J8OVq#!>jiy>tt@A_%jy4foae(<`q5#4O(`-7ksY zTu_fB2P1hSj}t{R_U)Y4Al}_C-|0B^@6g@e$6umy;z6-hrm04qeHKHnurn|@24l0! z)>V=~N3t*3w9Z8XMM;d{X1Jzn`GQ?NvNrcU$XSw78AV!#Xd^yn=BjHx97vJE22^$z zw#4}sMkxv^d|8hPm2D>Ep0H=`B#?0P@?pHuU3Kt@MFp<<<@DxLrs(bqE7?hypNC&X z9s$GyRuLo5c?}pYkPMHa{S3WDWW~=ukQ6E=#Am zGvXM=VY~h!X%xw(s=+D_)Dx0D$78RC_R!%C6{o=+&C~YAvv}H8YrBaN^m%Z9$}-FN zs1$Bk-bhP$z3jlD+V)b;y2K^mV&NK)aK&-U>sAuJ7y2jURos&9Zt1+>D9py}&?quFCc zOZ9ccTE@`%b4}|;_xv7%sH@snFMnN|7i}q~T_}A4eNSA+?&dukx(!v^wqlU~B9FXE zwo20pK#Mks3|W&pW=gy_=J>$L=3Uh_V4g!`Rb;mg_X!K1$B1?Oyx++$GhLmb3t8z; z$Hv5xj!WQaQrV=rKk#V*R+NPUh)1#?`2Cwm-UC0P)G!ItTPqSX{xiSoveJ{h zFr-pwc!4S{`n;7^Umtk`+d6jRrP53LQO!KunfC7fX1f{?O)tl-EL10ToJXVNGLiL6 z;gvK~E<@s1*8o3?%N&zM%b5-Ho;!55O;1~-&fLhMnDuQ2X9PJ`Vtu3hDE{v5MKGW0 zQoBMz0PH29EINpDUQIW04I4R|L;OFKlTu>E*a zJ%S{Py>KsTRH%lJP{&H#f9+S9NB%h6!%wSE^q8Z+^J8+yMsiP|5kz~cc8v+b+b#2Q zzNswzHZl^f);>U!P~jqgob<&DRbgI9oKsuxD2{jU={tYobyG zv?M%$m5d^QSC2&Kz}lE!D_}*S--&LjL(v#RZgvY>JgIFpg?=x$ zA`byGbRKG3O?B&F`R`_9w+A2wR;=K&3`wtCblH!E{h?N9DMD?!4s~7V$KioPbhs?F zYzyOD-!_@lugHx|=;l1aUVmrZoByt*p99HE#^)WgM-e30A>SSV8pvc`MN9HZQ9NNU zfUlP9l}LaT$IooY406?NgKpDi*iP}5(Zb!-$i_ka{b?SfDK;$ngg9&GnN?$lI=Sn0 zB3;J!gP(swefS3J_&M>;1J?g0cGxQH$J~5DB&#Ppa@7Z(Q*OGq&H2j+$IO0?=Kdeq z1l{!e8*2C(y~m$6Abl^0cTtVFv#OqQ95`p0HLt6`bIVKKxMHjXvTTh3t6y~NEqxm5bc3bZL6 zB#qQkd0O+9YBoYTVRQHdgM|cv+Fq20*7t4~k&MkHn1M9;w*ETRqL5GFzDyCb8qZ8n zvBLzpO$Fx5N%;cdXII<52GfskpU2Mgr1$U@Q_#DAk_^jC2tkJ9B_#+;}xuCc2 z2Xv8@Ob6%4XJjVBP;0HoInU2epkIgF(`a+QD0;wg8yRhLt^uD$g+5&I4~)@fvul^f znK`+UZ;v-VF5DRx7(=34oYlNk^S2TZOwKWo8OGl&lTY+OHdI(yD=Fu-CAf(EHIwc9 zbsq%$HrQWwF((?}GbS%lG92$d7A3{G1_X|(Itui9mP&atOz}zu@p!4H!qp?^#s;&s zPM29dD}wO{VX20z#h03pc^z71<@>(i&1Q}Ey`zGqXl|IqlP)b9pY`FCfVPy+) zhs*TGf?xkwJa%DceunB2VsuP7@nj7`e#henY9#^dGGX?GSfwD zb~VUp6IGZV$w30#BPsVasb$jj!xaU1HeQw~)VzRqFJsJn z>Cv$Z;B*>7ZYDp#6 zUAijOmx17vJlS8%xN7JdiyO(o30#IUT4WXXJ{@49BzXZOt{Sh3rl52 zM$=vb<8i{htSz+>=LV7^2Rpnu;{X<`(cP|-W{?hjQ`rq_AFu>oO16w%13v5qD5>k! z28+QMnuT#$Xi8>nn1RVb%(jMWoduVCa&mQ{fC)+xw!8TaW*<;v@NL<2A4!<^EMb$} zp3tp74epC*{y)gnYoHlF#!94o%k=mY*)X`)EjQvqg^t1FF_G@%dV@KOa^!I~tC;+W z(*LzyuJ`VjVcAjhUS${I^Vf`sClD-%ClJU;C}@A#mJ0-cX}At0)XYA+B^ESvO@e|D zPaRY@em!IW-lIu+qa}Vua~S)57zK+@QG6>%UYvbkT5SZv&QH&=2<@g|TREt4!5(CLFSs4NJ zeRD(Eq%=awmou_ZKq@|;#c-pv?8((KP6%xH#NeMon9sc~=%@-wK3a&~NtY<(jHttT zTof$0bP87P>|ir2p3ESKD@=JAX}|yU4m2w^x=Pb~vxT{AiBEUCa+a#CM&9l;PFtw5 zMb?>BJ_TG|zU{BJ1A|W@Jr{*NXV0j>ief3TeG7~(s6&`faw6Ls!bM^Yl0KJXDYw=%~GUfWxC zr{;T{k%SkOM{Jmok2+$*zpBB-8{2{sLFW$6!_x~)E9CE^4=lQioG9JG>xLBc{wnt= z&1WsSZ>qCdfi-uqrVd}`c6rFol>s7|?H!Ht z6YlJPCbSPESg}A}`CIyU(!Ypg8XnyMtHeMvWz6p+5`cj(2~c;nOd<(Mv=u@S?zTr^ z7$KKLVpd3KffkYOfqh6g8mn5fqQo3=BsidO-DA-Q-5esgm`#*}e1)EF5mCHxEP^Us zB+~U<@>LB&aB}$! zZ7dY}5yCPIF45Fu7I2jh5==BsEwl#NEn|jJI7!*iEC&>VoGm6fE+-R!0Vxc z4qB;)1^UN@oJh=Q^^?X*pp$ZEog=GA6JQAG?qIvJika*d95V@)&+Y2Q_ZDeHlS)AX zt;>tRU`+t7cs)U=i6#lC-^@s!g&82mIQr!bN|ba=2{?>~Z(9&5$s=*~OOc~xnFdDP zC*>kvKPyjlRTgp$8sM-j-?Y)Ii~_o$qoIi~&_%l7u)S?!-PSxCAR-6(LRuBudV|M= zQPA3=@Lul+ihVhsWA+53Gu-M{jDqnSwu>TB++yBJ47A9=VMGJ7+$Xm~lj0*QUXLm! zvp}b^XyoSL00vDl56z>4P~gRciT^77QGJc*x3(^(Nv-OZd3j7ON{a^rbKGEpbzjC~(hh!#ntsI}xDsJ(V)8IJR zQ&qSol|rm7fF zw;klFa~9)xR=SCf8u^fbSdYATXl{i7~IsSmx5Lhgoe&PeyLy`aLXv5 zJz-Vod*;rQhkx;zq@{gToL%EPj^mr}>$dC_wpW0JVvcLJUrQyB!_m1Cl^=!>a7*y; zVxeaMYSl|3oJpp{XGxebK@31b6vj$&QLM)e+hu4Vw8ThWCi6-<2C~?Qu5i-be0t&h zVp+6GaT&!cwYO-y5hSHtOvaJebjW1*OX35R{D}c6G~Kj3i55~#n`DU~`wg{_;#1~< zo_v%EB*$U=OOL_i#1J?zAEr0$g@P(RKYH=#3HmQJKXU*DduzoeH>$bPs@=3IgV9ie zGeq5Fb0IWiugbO5Lu3eizcGl;xNZ$dlbSc_(j^Yc=C{3BKU5CN?HAW94M{=;6oZC& zqB6E&fr<}6eqy9Vz<4P-WrI(r36sFc(Wz~iS$m?mBRn6L*yW8w3M^~pWH5u+Mm?}I z3kGBy4#2(df~3$saSo`-A2YpSJL`&C&3oFu?(aQv#qsPK;DL;d+!SV!`cE8r6E&IN zjl8aQ$N(Yqb`P}E!~S`qA_-!rIl7nIbT6j%RStWVL7wk)g2z#e9tsU9FatkQTO+^F zriTVgbLjxjHx;B^6s9FpkNq-%G*dSO(un7nHWGNMQUIWpMFO}_yCq)(#*3~nMSg4M zZOkoY8#oHwm5X@n(maZylxt;da4Iaug6mEbKo*yjQfCs zURuT$z|A@N>fjn69Rr2zw?r}r6+FVv9&-r~jS!2w_*sDNCJIV2uy|HoV;{b*hGZ8D zHq-cg6~hnH1#$sQH=kN{u#wILDftVfx4X}035cy2-Vs6hR2*>?+}xXT`&L~cu*0is+N?Ged=#^qu8aeh;I2SQvMFDJqKw(AG>4Dud;P&~l&*L-{T%@d4S zqV14?kkVw!qs~N$?|0FA(cn0AL4If^84fr7)G{F)Nn|c@H`se)PsH^kx6Ma+xdAf}NfkcQ3@ANSR#0q&WO)J_Pr1f8%6mhXfsl#)(kzn9r`C;kCq#h|13!1lmU{SX?YAW{d6 zhO!~HFHTBpk1lvhtUo%h=bBz*_R7CpfTB;=k63Fp8 zx~g>JP91i9rH1D`hnTihAfc7;_JL#WGFlfU@W25B_`D!bneAjym{B|#o*>dDV8k9* zzTEAc{YE|a8gOr-ST7JXauyp+VFRD+q)N;-Jy1gDK%&8jFJCZc?#3@6Nr94a?UsO!UQMJK76;xnbdiRe^R?_Jqgf_+kK5_1$7A&H%uv6B!$?>qb_uX^c~CfuS3KMIuw zg;JA93k;AP0XgD4G21yMe9bLm2fDFbBo&#B5p|79x@1 z$eNx19Frxt0CEc~0aZc|W9}I>-3#K1un+)fEQplV-&ZmH_@ry~ZpgDo=$@x|dk0k0 z|JSf55+q^{&cDl14%n;WD_3?J1$F?vkq%H7u`7G8=>rQ|bN%au#FqY%gsL3AOFr*F6&SjPjSEpP+i- z;z!K!ul88c&2dE9LQ|g2Ad@3KL{$q6?(em8t$)JydQyk-8}o9fEv~8S<{JDcE$99M zbA|-8e8mxi<$)=8H&1K_+8`+u7a2297@|txR>0eAP|(wk{<;ciFGuPACEwH=KNI`T z1Q^^nmg3_ky&^8y7NOh`gaiZGbKO-9=_3t+0xz5^+M*33-6&HeTqBVT&O;6XCJpc$k9ony!t0RE>Zs`5Dq<2bxJH4A@F& z7`e89JmP+TN2(Z{uKuJCK(oJ_fLk5}K{oCJL!(6UnZqn!*b$`chavF-kX&h`Faf$4 z8W^PHJPh6TcpvV(hLKp2ikK82vbM1sz#m`FT;-QdG}Q<7Y8 z08rmptK{9kPWXY#1ap<;l$Lgnc?2d&wItDWP518MHBbS_15q7OWndC)Dur*Vd}{We zR{lEzPHl0cg@6eIpcZMc#2I2a@aDaI#LjB~094z0r+(^=VaGhjm*E%gpAeBdO-$$MJ9VxBhiH^; z5g;x!kOU&}=i>nAqV#9Z-%nkL>#RLm6TJqk1t8?wVL;*q5&Oae{7z8)5HI_zU430c z6nIKh7{k^$%$E0c?FRn+hpZoZ7+rjN`NRLjf4v60yartU(2x>=M)>rb6A-}P{F}?K zKg#(b{_C2H%5VH@fC}Rc2qFG==<&Gd=YGoL@mDwKrMIhyod*a|jfyBD=Xi)3A=^gm z;?p1Nb%DtE;a~k=p5U4UT#N_&G5_zyZ;C|hY8d}1{_9%6xbN|&Un&MXzqkh6|EbgR zrx!Q1`-6_ZEBg~Z4?FaMU^5yJgiAtP^)FlhK``)3 zL+B@1n);nAm;jl)dP)iNPjau;i#Y9^^Y1%?XX#bslX+fOL6m~7JMlLJ|4@VFcgL(2 z5cXpu{|_~8K5g-rFIWJy!4R!IJQI*NG`21O%^{Fi>K+I}e`K_A`Ih#V zV?=#J&F*_EfU)a-#MhtAwcgRg?56N-{(*1VoUhIUU)4qb^svpF(#0^T*PhQKpcl6u z1cd)=-ojoQjGHq5LKFjT9y%aiokm7Dl;1uE0t5qSxFpmL&AL8=+=4h03nn4r4S#s( z076aEv#m^J^_sPPnwB78UPyZlaGm@Tnq02uscd1JVTn71lFvj(!h+Y&VOdJLG#N-j zHcyNKDRo1>)s~hAGbSjNUYMhuB(TPis3rig2D>PPq)3b`-&)m}Cnn{`3{6_R;6qJ( z3grXrmYifkaNMyAZn?d9c2a#{K|USpo#Q+N2MJCWJZ>)AnZ7N86h#&aR*T zg#Zl>p9Q(YSs~yxdVE=sS7EO4yg;D^KIO*0cNshOVy!P}K`uWO8 zmrhnfIcH<->NX>hDT8;VS6rN5u!@lOH@~GY&Q1s?Z;0djt_HA3Fv94F`!HW(V?jEX zW8pCE4(ie7Dt#6GKUk$Iu|$?{R)ls@T~A9;$Wpfwy)ZHCl=5Jf-Lza(%&QaC67}^1 z{1sunIDr}~w`}8JPqh>(h@d_!(1|!~K#X(B7uR~yD1yR#wxx~2^~ikY!VR+b{7Z3n z=-uwPruuI*aq}oXUQqUa0V%PiF$0Av1^E@m0Y!C!Bx90Lx{=iPii&qtRNKhREeY@> zgrSnwubI&N)l2pw&&8qQN$`FS$b5`9)^I3_wK)xum9cQ37M=n>8FMvHFDI|#I+U&3 zFv=n#86JAU>0Q`Wz|mSh#`m>Ci?`AmvBFVy=vV&#=l=UzqdG8MYsPsxsp0<7s2l2X zFMnC3T~TdYQV($ut3XojJAWWXJOT6eLis0kv#*&7ovS%a7@^WoE-Q8yxV)s4tsG6b z{u{(CqFMfpP@)Oj`-Hevs4cH?+gWEFh$LQd~tNdBb_oI zr|wB>>D^iRrV2y_3wPrOMel-fo4Af%FjZF3U*xd>Acc&&5{FzyNHne1Vmc+nT9&Uo z-if0S!QNwtp|R$}_(xt3ofKA9r+@S<2LwmvnxS|0d18bwW_&YF(b7t~98U#+)Cj8~ zXQZ`3pk*Fv)~V>qMw9lV{QoYM%VV%!Y!(nH*7zZZiR2ovn>Ipq*Cqrt+GiW*u%YyE zm&k=g(W(z9F6%N|TrYMz)2hXT20{r_6i}sN+$L!xp$Z?wyKEjFlD{f3Wd#Yot}eiJ zaWc363KM|YmTLG}5hN-65X(R6@L%3s+LTIup>d7$* z1B*#D@X%n{aP!1jqLPn;Zjoxl7DRRnVUc9ma@mR1Aza0gn4k(%DV(@h`=Qyo_n{w2 z0Svoj(qGW_cn}iGKNAoGrB;Yg!W1d) zNg>|bu%+K=I`FFs^sWUiwV~UuQ~e=Yu^+8sPCBEp{pXBy1&;=6fa*77s&gx(UmrIaMv_7Q=Bp&9QiMMz%| zw{b*v>FZ|~S9eZ5MUs*0rsFc*;?lKDsNa1gyk=Fw9GfvXv?pLxEiDjBW<)m1nFb+d zz@U1bZ%Bz#9Fu)cn7qD_n4Mk848(v!OoL8oRZOScluTC z)e%&^f(a7tq51*HGo8`=YTaCO`=NC(+{LyDhhLjqc;OtGG!AAaAUrK2iz|m4$u2!j zmRa=V8;%)ZVoQ;tgfP@1INGwF3^d3YS%ml>2RHX5(MFnflj?IFWboVXIe`#K21&?4 zo=V2ZXfg+)5EjA-aS~7T`lC|i5(Q9)C)l@^zM-_!d6LmLuyzX2UId8Nwob`tI4+v_ z#E!5=N&twGxY$%}5`_u+oD$QNtSUgNbg#)!6U{qP6F{`Cqe4N>Z9*qAvqf~`X)hq( zN0FesIKY&|;$(p=jpsD3=`;;6?2>(3)xa64`s#9}SoNeGLN8EFSjct@%j^!BhT$Em!uSKB}kSq=O`WcTl2bX|TH~Cc$!g zKf7csIvK4}tktJ#{Q@go$7T<~>N}EfQ!`jz9~u)3TAai{6bjdO3j(lVpfE^qx7*)G zi)n)3631|~7lx@-ME530HXzYQRwJW8D43q=`Z#4t4crnp4Gs-;RzmS22Mj%{(uNIz z0K1WlElgln*L)zS5lJ5@UJQ3`_8keHM;g{|%RABAVX(2Z0+gz9#Pb74SN2D1E&pOh*k<=()T0D5mxH@laBNuE5Z#-` zL^cel6$n!x-G}=fGhaWR;-X$FIVZ`pl%r&zWriW0KGcv%ekYXVR$3$Xq<4@j3@*vh z1&NgJAA~Gf+%tbZ^~6qvw=7FzlzBVlSpH#&=)a2r(^X>%J8R*Ewecwi8x&ZJ4ZN;0as8a z9l83J4Uj2qR!(QUX?=fNM<`ffNrp%sySKH|+)-JxK9ZA`90sbi?umYMpR#xwhcLep z-yDP@yflad&03iXeyq#^(Mt{OnzKa5lQe6jP(eFS$hEnn?aATbtivZ^JaD`1Pu zAgz)ZwPf0b;pMZjQL98Rl?s<~RS2?m3}%dQLN$?DxM6`to)vr5ABi$7F?hIq%#%`w zbEBBCw5LhvM*YpM#F&T*RzWY(?(m2peX#Cg3$e4#v<^0{PLiNg+<5h#QM*Y*@Nn}FldjYIpA7;u7+-z+bs=nXe-J>oagFS; zOs1bCGr$-iMCLU5o~BIKpkB?6M&H_(dRi*ooS9)8Wm>u^`GM+1D&RJQJRzq6pHsp_ z>_=B;He)3oa(G}ORvHTDz)~t^h@J-yCdZz*eRH&4dQz2})j~!1Y*2=H*R2E&$xCBa zmwijbk`GVx+FrNQm)qNr?l!s4mkgoqP(3zmG)HzXTj6FZeY_fU?T{*o+5G*9f51S8 zVU=LEgs3im`+Q@s2W>T1ISgx`WkvDC4<+c-$6j?`UL2JKPKDu+O7Vf`Nw5>ngLiby zkSCZ9ZB^w2xoqZc?7)vpzj-<>M9?5VxBN4v1f#cNw3(l7L1MlP^DV^k1>U_z?C6V_ z<_p)saB7>nI^KLtww*<*^Oc{SSE~L^5{sp^vU0!W+kQBy+-D7@9RgB#b861es|C~d zKRjLSmTx+A5Jl!4m>E?TQk6O8ja%boq*@ zo-L_`G{%?xA?j}jHi~1@m!H*JHFTj@qY8clptuJ7;Suf4WFl~2rdx*G&xRU@Ve!cr z`MiXqLjllh?CiwVrobJ}x{YernO``N%|&ofEW zblFN7y|NPEfobcI!t|@h?+`CnMdid}nZoJ&Cic}|eiP4$To1Q~l0{y*JhAHf< zPcin{Z)<$dGuF@?a~bt96eVZv=ZXaBqPZ>l2`zfit$Sy(AlM{?HfZL(FQk;5@2IPq z3N7A=(ZCc2g_gS5jW$ic_n?@Grn0MqcQ8+s=_~J39l_L5bhC#7WRDQ<1qEb(XIgG) zb$#XXC`0z>QJ>4n2LIJwm1w?PxQt#5`L@&l#=8Dsf6xRvUP7~3<%BLat6(D>oy^H% zm)>Ut?@L>o4ZTQ+4nfN2Vk7B5>hCd3Z(%~B2Bd1%tA-|g zo+^&0H~)HzHR-ghJC-e+0qHz=UZ7TCsr`=q){Cm7)Bl-hCD5=NH6A}ej3eY7&3n%$*?)>K8zKBG7}TI)&>&Vk2ycsZ=gcZ+*xa zcLTQ;W~~q3;xp)*i@Z%5&JNoyr8hrTodxR?wI&2_0>rh}wmz;rQzNkDLQyM1d{hIz z2i0v%k^tLEWF|4vR7MN)$A%L|lA=lu%{XvX_cxJ`{Fem7+UnuG^}*&i=!il2kku=t zZvxOvtJddjD@RzgHpHrdFED5(1epNb9v)IG_K1ciQ36Z4R^16i zk2&9qq^X!}KO3lwqf}_+=VNlN!?{Oc){gP0N#jV+R+2~uvz3voYVz!mZUI?Tu;xwA zdlrd1n2}zkKA_rCNOVDH6LA#jx5&82c9Q)st~3hdy~y;zV>8%5)lT)SPLwyG9?%L; z*dBL`SDv83-f_>Tn`>bJ;2GIb8$VG1OWWO^U?P zB#err-$dsT>xzd*%NEJAcsqVY>qa9vA=<+aYD4PgMaj|pbW#XGYHSLGQQ0+$me>Kp zuyL$0DMk~SecEtR3500W-O$Y{7y4EfJTgmD1+#F)3mA3pzAFCPVv2Q!#2rb%q#iIU z$0n#=Xs(O5@5@*(Dpmt z6pCq<#uPL=7!Ad>b`5%pzy!=GCQ`vJK^t-B6zNYsxJ8_%kdaqXH>2D&!0JzZ8nAft zkLG`EUxSz6U|ca|Pj6!3U) zUwG1;)}PW(j>ekb_$aLQUEsD^=7d=eDvoN4ls5%$X$ZI~ly5xEXvy^IV+szNo*ns9 zav)>F8lLU{Lb`c&>|TCzR`V)X3qH>o9pr`r8uEDV=-cAXB*1%Q^I!D~I$C*i?9qkPgMQ?l>R~C44rEna&l>94Tl3$91Kqre|?+f1vS`4l$ug#P{&=RmW5l%sR+^2`HzUer&=--75z9{~1y&3LYMA=L60)5KCovFGvcC z3FdsU=~@TJyb~K$w`~7s`Fvi6OH)q0I&i7t+ygDU>dzr9SwvpGh{T@Ar{eNgEm+2x zZBtcq>CP?}3!|13JzH9)$>^QXO>qSdmhIpYGvZWc_jUyidTFz^v}U}Sc30}kzuc6~ zi+SFw2To2VR}H4nE};M(W!oun z#%4!-PCl8r^z6YoRv`kxVqR}%iX8g2(Z8|!m`t}@&7-0-{j()>S=)k*jUHXGU){^d zrRu`imKU%wuqi3bC1PjI$z*;_jt$o)YBp}VI9EyP5S#EqcI9Ld_sokkXS8m55!p65 zr{RHuk&FMUuFg*nPaVBANk9}dvWx%PmEo3n)#$j z#%ASPvez!*;+!}kR8+!KV_(@Uqm}I%+blL3ac#Kc9Wt3wOebQohN=daL<#F%)fItU z5&}!of=;jXsx7)P$@^xjdg{H!qBG7oYL^`d5xO~B!0YS{rdXy8;_1De63QM6LfSYE zElOu*yn1iOR<;WP4oNPOXIeEbN!?ILbKJQ{I%N5E-AV@rY zd-e65rukiyD{D@p|{rv?TYNt_Tge# zbTe?%J@ci9CZ>e{oc;Kt+gC-y4ZQo;O;mE}6jJd(ro@txa?B;I<*QRIStjrPWa0bp zR?t!9>kTg=nGRfCb$Y%_jlhdGWlwphvjRJp1ZG~6f3(BB>Y?oGmhyFi_XY#A-zdVz Vtl$4rE%%((ZPF_7%a{MZ2>=&MP67Y` diff --git a/web/webfiles/img/xhydra.png b/web/webfiles/img/xhydra.png deleted file mode 100644 index e52eaf3122f0f1834a9038d18d91afcc5c737818..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 217839 zcmX_n1yozX)^%`qDDD(@cMa}NDJ5uecXugHi&Na)-HR5AI}|H!#e;_Y^u6!>D=WFl zO)@j<%$zf4@3ZHNhMGJEDhVn80KiaG0BQjMuy1c+0mz7Nms{_Jr?(5dm6WO!0ML+# z_F{_g_L<6DK}!_?@TCU;g2MrTe?JL60suTX0e}+|06;hc03dY!-l-}2_64GuvOEv~ z{rAZ4Df{+z2gO<8gBt*VhWGCY1IYSL^mY@;T~SpQX$=+?mzX$aScB!QMSvnuO2>Qc zEXS*x+_L4h??Qy9D{phoPhCMF7!U%O!;#X!m#WS$JnDI;gHIsU@SE~oy}(&dFalF3 z?3^E3@z@5Y`vnO=}rZ>x(Y^&{gR*r}UGvZoSPA%!Z<`3P<;Tegg;|7k@LB@VPEN4S_zYixGaKSMiSs+R~ z!Nlnq0uqG(SQCJR{{0DOS2h+%1JnO2b6%X^@wcE9wJHY2A+(GP`f*wqFW4OP7<1sV zI|^aTRCy>j>?f4OH`KYkd!4xF7}Zye``53x=58F%6o4vIC3jcQ5TIx^*Jx4K1Es|c zhJaTIgS~p5zbgm3>TDziwkyuE#lu#Dd#0vphp$rcXyx7-Fitr-If32ohr^->8l#R9 zH4V$=4(4s+ov0|w1@}Tz+#06mEEArTmJb=~jw7 zN=bL(F^bGkjlY&|G!|T1NHOq->W9X+09-v}&ss zWzAoLk*VYtlElM6`rehm9*K@Aow{&#M_*7r6xlp3n9(rHWL0#OY8l*^`@&;SHO{9p^`@lJQUmd@9I4>FM0i!c6MYHXd){kYjf#|$ zGc3|ll6IFy2{$SW{EFAH_?CY~P8j4~1Q5LJnHvz$Yp{X_#5P&;Uii+$ z*-QRe1)!PF=Z;n27e(_#iA_M^vzIIpQ&&pF;Xd@i_H7bJOqPDHBAx&4-F2cJ^udyR z|HUw0CfOeIojS~P(_&Bxpgs^uv=isAAp%wHVP!wof=yXYW#H=#NXg%F zIGXrBQ)l8bC3INt3lUCZUpplueM!YI((W=DV9odq6EB2JZc(fO;mH(n+EhLu``6(Y z?J||lgRH8*@Trm-7FzYzh<|)I{Y05F;ZZb+G)Pdz_hRcEyjs3$-5gAIVNqeea{Yn- z=Pw-I{^xd}-O4Ixw=-l!6@&<+jsbtp;6tHrlhMY^YE)dEjW@ zhE)^aFHW0kU5Xkn85hKsvda)bAZg_EqNx-L3x`q4|Lm8-Aq_=7JF64ZYcLRI=q)rG zLXrFzH7-}2`U2i!9RY)}pb?o1%=@2ozcOKW*Ym3|w3t$MCB+j{>`(v#oBs2e91(8L zI}wChMC?;t&|V}%e6#0Qp3%Vv%&G?`JD@b29JP`Zb|wS^eGu%330=zqgG;M$MS}a$+5FyxZ?Vl`Z#z9f?-n_{p&> zI6hJ0wNM=Fwgn9YU`pK9cLYIB zm~sdUf+_MN4X%OJx`nW+aCU$uCGukV%DcB`1>z61Vk1qg{8{#R(-H{@1*X4c+&)}*WOd|o8Y z0y1{Adn8mlt6jkNk_7U{(2+>88a7pqHFHqAGY7zR^|w{q`ARJyVz)n(c)NYgi!m+yNt^j3 zWl&v@vvx2{gV8bcp(?JcWbyHn9BaGAEhnbnO}|we#~;tZ7-#+M{MI(%U(Pvu5eULP zDSlW3j~QRl&uC>Za3#k!Y^fdOj!yVF7| z6?hJq9JV80Ul3DyIHy)+K$+cd!MCmQx={2L4ofs++SosntxyM(QC4HG!%n-v#Rp{SiSH6ptWJc-uuKReZ@M0xx;SA5m z2}|n(xcUt*0a;b&5V`;Dwj2AuH5(Bx#PhkgvZCRb7am8R`kP3>d!%!WB*k^HK3v(S zlO(_1xESUg!phNezs;LmhJXv6yj~(4m(8c8CQQ+XZ5d37v--hau9>E;pK~PRU`P)< zw;k--qUUd}%y2M2qkcZ_N;trQ4|^E*dZ^a$PQq*ROc#)DIGRzn?s@6Cv1=v1N`9m{KEE$BOzll>}2g&k!Iow`U7n)W4 zuM5#0U#ujuFT00Kg9Y<{RP0iJ3vZQEpdWb+0Yaepun}51C}B$^(>IK%O3>@&moMu6 zp|R|pM~Yj}--qI(qY|%IcurmCtsJ$Vx|YsQPiga}V^2GNhNlxz!o&1B@uA6t$)K;= zM3L0NtW`opKC<3jAZ@?bP{oMW%BT-z)}?73q?baE>z@+W!KR^_FH_ZSvYNCNye=Pn z*p3n>0hw?ayGJj>jQ%sHIq3BouI}+B&k1hk3*AAv<;)!XO{uj0=}{>u!6ekqq!@X5 z3t@Q^r8n_Zusydes6wanlrn()FlevH=w)?U^!Rz}VMO3IKIr-5=Z(ntr-o6AA_F3> zx`0VL!|{-yc|1}9)vbmAqz$o+Xs){&WS>sIOxV+{y854Sry+-u@@TBzF>lJG*v%80 zY7j&T$uJ;coZpccD!)Zumq+na-HW3346cZyP{Oe%)K&g3?_%A&16>@PrU#_zR_SfL zljU$I^$6KrJ)z7uXf^A{CVi}&lQGDkA%lKT+>T7lMnv`Z*{{7e`G<}nJI z1ZDNTMaY`==iDybF0YFetqPjAwf6G`3{BJvp_i;NEZ}pwb@(CvBW6Q3 z9$wU`sJW*!a$pPC{4ZEgA~TEaW;v*Wm!%wgk@ zX&UA0^~Yn*f30+VJ6xR|DrMdK%70Xbo1|#4EWO;)9KZ~diC>Jz-_Jnyakgs>(W7R- zg*v%;%Pr@~Ppx@ZUM`*D{6yB&{#3H7-b0{z3l*z6A{Pdb$!7&VxwBhl^B&CJ97_y( zD0=u4gTwHja1JBWgiu7!1fMAZR~jEy(!|Qg9*S!T=f-X70h3@p9Ml839NTqXJl9|^ z3WnToLH}eneXd#UvAa)PlIRVY%+96a-Ephjb^wW+Q9Dbbc~dZd3m;+qs$8H&O!uwz z0GQkA?$2F#^(}WphbW*tJQmpWIu%M%E#gL@%Wi4zu?p*?6H^du?NkT4_noekh%S!e_0LA*q1^v2pIcUQ zh^WiA_i(E22$3#G0qXTJqrT>=@GcoNw)TxP4$YP)i)x`1XjC8sN%mf~IQe54d{<;( z!k@T8ct@-DUxe`E@i6FnEXON;(92+6+LKg<4)RyE!bYazrd7QcCEL#eN^v!%vEsLw z)FD{4awXrQ4>f91^SD<;YRQ>Y7^wFRhXeTI$BUDTqtwbcg_P&Nsjc<;aoZgGvVkvJ z622m?C+a7_C72@wCbXt>ClJBNUnF}02aKbcA-0ZMH3tL=#asFdBP1|>zaDYnLm+$( z{m64kjly4)aQG}m8-0)fUK<{xx5Z_N?D!MQ!}=fom#tzFf?k+_LpHXyw%j9?CpM0f zu1wbBR0YHyFR}Dc>;`+E0W5Z`Cwq!D5G5S-b7EM5sl@@^5qYq*CiPzDh6x<2^rpOz7QMw?iJPgkhwPHFsFzScpgHA4&K!urmV zRYdV@QzXoRLF2$BB&Ag`fSg9VUR*hE^h&tZ2+*Jl zm<4T4Sl!Zmy?waa036#%J-U5Knk;w?)cU-5qEq4-Ze&9Z9(pR$Rv4mXm%67JB#BO_ zmH16X*B=(Pkywl??)*21^oKD$;4}zp=6ggWy2UqsOr?PSW>g=XkHpJEZUs(34Mnry zAw0}KD@w*b6ywU0!j=&cY^qC|bu|cv+4&U%Bv-}XTE#SKR^konU}&Q=7?b2VET$`a zbH&P^m*!KR%yAJW=yaAzcuM)G)aYKi?zk-U>&S!9Q%hd$0uY~Dq)oK4RnrdC8V<4D zD|8OtD3iabfH$x$EvoxJ03Iq`0@l?R`I>NWtl9zvQL@TtBp=n%x6ilg%~U!@ZtC5r zqYj-^uz-Rv5*rRLE*>8ip+QQo>KaFSQzxd ze#>tYHyDnoqd$LiLt2el*omqj{hWcAF=u**HHlGP+e)H-bqazu>H@z%RL1@{_CK`k z{)y!{xLxj})@Dqz&-i6Yl?o)8*R*6W*Fm*$Xijx-dzY&CF-mM7sO>=wZwg#CZ~LPw z0W|hT`osW6^9ZP-n!~h4DuMs|0mH6sC0L?i@Gl~^B|?lAgXqx0Esj|VA7$2>A+5+kz zP^f%N&)Oj&Ri#;9=N?eE%2%Eim!?fT&euOGC)AmIrI%Eft95wCAi1!z5s@aj%S7h{ ziQ3kPrIOm5fys~rMzh2WWz=KyeuQU}^L_8h|3Up%hod7hr2a{Pt?p=BLHntKIh)hu zt)x(+*4A4q6+lhGo-UI&c@4snEibjV;W!i_4OvH?gdD>Z;3bN>?n&!dOyJCSMkeWt zRJ~t+7_87t@Ikh1Y)rS_RyrS_yM(-i&-NgkWVk+XaIKaSvNw7x(08SJg+TOwTR>2( zj2;Dif7i4q{p`}F5GOA$FLQw17`20t20JqzLQswTu)FTS_b=j=D&9l^L~?#t*Rb|5 zIu*|f_~o=*l(llE+sOj%x zvHn^5cqK1B{I#MfUkgUQ!1L~7UC?w(nY7{}*(~@OVV%E%9n;n5$Xc2hfroza;GJXd z{sj-<4G$DTn`DAUMK-~45H1pA5mbZSkZe<0~oV9pgh(I~8?mlikVfMY=O&?OY3~B1CXNo^A zSqOXB$?$ufzVsYyy+#W3?j!XJtFMnUf($!ZaSqicH+g_ z&%(AGr3Qm$<=B)^+Iy*%78I`RQ8 zm4i9y)@WbDB=xi3YZzvq`I>7eRqS1j_WfB4^0-9u-hTDF@3I?9f>($2edR z$#O)Ao22xCdd836nLN}x)CrA{Q{S!EbW|(@OMnp}3bXT}?GXnR?&ZMz){mgRKP~9! z7%(Rn{>stT>!T06uUM>BBi+QX{=6WBEXy zJnjLAaWp$SDx}japdisYpLvvDM*MwQsEjFJMI5_io~|KwB&1F9aNU7<`gfw2TS04f z$CeEdF8}4iWWVTEQJ6no2W)mYZgd{EI8EikQmCAgO{s&g?XW?)kUS-`YC8 zx`7>Q*0m%D3l43GZ{iYtahi3OtTV&8?tmDX~VF)poQZX=As&2LJ8U zGHwIr?JtGY**jisuc?38*7Lde#>sTN$f8x@QD4je1|-X4M&TU$%A$ePR0 z{&bJA=U29}V)(|Oo>roqKE7&|2WjSb4!H261U=2A=gw0Ho@nRoSxG#Xyn@^M9Nq}? z@2PgnwUCXan(TEy-zRHF$Il~i#AiMCo66#lV|5AlBU6^Um@u$FUe5!rxX)~a|1}=r zkU-Qwx_GxF_6>Rd-I`zbGFDe_%X!RO2^lYW+?SV_Sa8|(c7_N?j{7)^u)<+y%m#m; zJj#3jTKSZL$%s>Io6Jz@ShSUk#prhi7d?XYK5GEFHPXL!Esh}KSMz6!i%if8Cof=k zl}OWj9EL3}Wy1e%e9KT7)IDoKzq3M)L=R*lRP@zg3Onj7E@g))2eDNfS=)uiVAV|4 zI|vlueEqri{XX{wv^fmD`2Yoh4LD$s;e&@&4Vc;4cD74nZ5mnT4rP!IiM2YO!1 zK&$TR`nXi{akORG_&NX77abG*dY2ON!n;lQf1$*9&Kv5tHM;Re0N$SP*#T0cC!Fy+B1={uEv zj)%4K6wTRC&a^uL*wyM!AMB-BGOBCnOW9G%Df&LgMN7jk&PBUp{b<))X+@JXS`L_Y z3WRn|1m8g`?|jUK9EJE_(yq>y}EjS68wR1@j`Tq ze*MD3QK1ZjFNMvCf6Vk&a=ZWal+Z>A=J1y&?&^xtsu(J*QFni&6>7%rAm4(aG+k|Ru}Q|s-0f%{2TsySoFTmc%owK zfoyQ%bN>ziE}kX`(t%;qPETFJK*g z&rC&V4EQjZQ@OlQ%{;Tg@7HpKYrV-s@U*N1)Fok;ho=p2qBd(;h$YU8 zLwo{#u9g)9_7vLqX1=Q8#59Vl%W+DX5Q@P_l}HCw0Jo7+B2hIeU$jA8OIbS1vK>a7 zd%|iiX>B--5zV>djwDw;tCpjfYuHue_v ze`=WNtpDcXI#Qs=<@k+yqxF+<7%%uvhcvl`7K*Jo4z{c+&|Q3dm7rYsil|#P3WWE( z-=V_`Csr<79~O!0L`U`fLxpVmF|lP&7jx%Kk^iVXi0U%&r&8q_ES#5^ZJyN*Z+GS{ zBSEZn4YF*qBE3Nu1cm+Kr&r-`DQp6+?U0ZUy9Lx}fykDWF$gJo1`%OV3Yp=%t|xyU zMZ2rAkvzdG%N!nRA;@#zLvp2xt1w!8kYHV(bK01K@B5%V{#UV}*Roz{W;mPks45wB z>2)AvqN;F=h2yO%2x`c<&voZc)hHTfcj5f=%>}PILp)u>{tv-Zf$9P>mzk|oHhg4p zcHt_)1XXjWCq9YP@%w!E<=JTD09v2UD70G)!qwU3>C&7H`<2hZ2)J zyi8}S{~3GlCb;uUec`p!Uf*Q&zbK;f==`{+;2rKqS4MrFrk<+O>SaUoIBH}Wu?@JRuu(Hth#q&yIEKOGj!umu~(@SXsyvZoek(={6O^76976 z@d*SsQBI3PZUw5Jt@`fMjh_hEdv28{IC>wN(w8@X0l#W*c_A{?8uUvB5_VWH6v7ke zK8_HDtK9OV)FO4RHEN>bz2{Rxp=tfOW2VvaOOiABrNF2myNIL*J^q}tO6HyH;JRn`{~ab;zGdTC?B{`cx6p2*W`x1~sz*S+@Y1{P#6iGwyw2293pDY$pL z`*_yjWcqi=6P0%GLC!fP*t+meEoEH13nF!(dh(_)VJfMq(Ebm#wObOCv)vv;MaHbitw5zTN;tvtjy?ARD11^*^{2B9t8}7q*4B_N+s6f-a;Zd zxIHDJ2`~aX+?-l_ccAVhc}fsc1#ia8_&q*9N~Q#X&6w1Y%y53pd#aP?XX@P3%Uyl) z!JT<}4NN%jxqY4T_rkmWMZ$FVWFu6>fZ`&AmH+`*|C{WsS2WJ^yvN?@Orh)+(j}M8 zsOhd!1Loz;3ffIKW{~*(Bz!9N@?@cNFlSbK{h_KkFFnQM>Qs6(haWyB~ zU_^p3uS6>)Sz&T~5$D;_;Q(HbV-4p(T84X4mWcu__rkvJ`garcVNrjjfjX6a{4NL7;#G)o> zqoc^}-OX&%=45CplG`}nmZda%EaR|3#jkaaXVH7{PSmeoq93D6@#7l6Jx!&nImp(G zaa7FBDS?2F@QG!0!SA%C>NFr!1@D-jHSu&jC`$YNPfQE)qBZ$UaBzd=Bdm=ZuSX$B z6!vfrmr)YG4ke(ELF3Q8o`b>%Q@J-YSsr%TRSd3Rmc%`I!d%sDB)Z@9T8{4uIu{fY zf7UG+;6UcxO>>{DPM88!HScqmA^DwrhA=RSDWT!%^gH3ar6#VYK+Fw05FM*#!7q)# z=%_YFbG2nbBa9L%$s(Nhf{Q?zXX_#^CFi(8q0_4kJExHNb=$|i!k#pAr!ALH{$bwl zhSY-Jn1JXV!71yF8g%$b2H(!vHR^re7oSn#=iP9-2>S?{#xBYyL~4+v-1XQDCwhGU zHuBeL+I?oyBH(7E(Gft6!5)MVA64HbUlY(uF;>vEq|7a58>^klE`4Sk!ap->sy;}Bj3Qdgd^DN|>Nh2B8f z;GJ=rkqc08@a1^vIa63PxD+o*e_D>Xjr}eu#`~aRO+#HeDOa*oI>%UZWt8a7KRH>| zb``<#f~_PTid$n;+x53|3Ibl|$aRhV2lI_PGX!1CO5PDD6KFV(uE}4*Q6?wp%7}Tc z=PYS_k(-yML`5K?h}^+Ze$zSHnh-rb6_imvJ!#5>>6Po6!_#1dlxZGYG+Q%PG8IYI z&{XX(_R^;ICv2!vCZf_Z8-|l?V&lq2;YnK<^YiizX#HX!$cooG`(vI zJU3K(y^ZPs*M4L>2lZVG^5&DT1aS~;A(~pt6Uaw$EdqEy&x& zc;6wLJO;cDu(Fh{KU-(_&=`E39@4P_^w&|<@3~0a-Pv3k^(75*HV0AoOf#smPw4h7 zs8Sd~%>!G2$qLqraOL}LPEhwX;*{tijojZrUR0~X(&-GaNU(n13-gz^d_1ll;Vn6g zC3+KB`JBI@A;0&*CzK=JSzVN$hSN4Se*HZ&k$t9nZS-Rkl&nA(w)5IpZVu9nkS(^T zJBCPik=LEAD|J;+bB~+y2DkAQ@Lwc2?j{!`B#18)!<(Tu^P8=aI9z~+)UIUNkbF9S zhKv1z=QBw$n3O7kt;*ZZ2*5PC$h?_BN%XH6TixnR$%E{x@5#V@`Bko4tHrprLIH^x zo>@gt?f;C|h4d!Mvrh6Kvw6N4enh&EnH319VeHaN*C2&;$XH3*kuoQuHL1qM&keKv zMMX>NNow93jN|gReK%nr8h8J^_f7ra>ol|var!1rw@<)tzxTV#+yru1aHKnupM@If*zDruqgafuQz7e$$zkpAvJ+-yyF1wu)$3t4vyipp6-uchc)iV{|^ zgtKUI3LEUBF4mW|ane*y_vWK0B!$qguI$u;N#b!M@H$m~eIDr@<9b4lw^3M)kL_@; z;pp`^)q}fSYU{nD4D6d0f3~k}|AVSmYt*rMPwTbg9@DhxCY+;c!^`xMPo6zOPuf(& zu(B&Sx7D@oy^#lu-*iIAf~mN(b_ z@MpTw`zP+3RQCf$$=HG8Ow5JRoe2NM$$$qLcdps-Z6;k*48I`bm(XyCA!jnNx-J{V zms`#y68$ga9(8r@@lt#TRM|h`@Ey!dz|k}&Q;ptYk5+q&Y6ESepR+0wjj8mAKW9|!<8!=xa2U{?& z($G{)aP+;rS-S6W(&_qfI>2#h3;OC+xl1~qxSBYRxs@m_PL*Rn0Q`osi27U2AIKJ5 z_QA=Z>UYts1djREjWt=L-lBYfH%@Nnc%3r-*_IAo*sO&V{=>*9Rm&K`H-CLIuCa}T>l6Pdl4n|7y@*n-f z{%i9!!M_i?3RXOIb?<)JuVOsXeDu8dv#|xiecu-zHu1v5qhP&kxWViIJtl3~^&8Qv zwVp;jn6nv^6FURKief2xo3q?tf3#FTYkq>^V%%TQeAI;jD9DV9JI3?r7Zui?F#ef$ zpwTJ9^CHryl{-HP3xV-vCYb6xyLmZCBR#V&IHeA8B1d$y$q*qIa%XZq+T`@;ZaL)( zWlt+;+iC?AE*DAfe20KPf6$L=Q7(^6wVf)$r)LI#Z2CY&M5>{?@io6Vsu)*+-g2El zl6~2EMzK!xI2F2n|CVjP3{zG_&RK+d^*-V^)`sb!80{C>;-Xa`fXhw>C3Fd#@VLX0 zo!y^cktbI^$;tgFQ=zY%77*^>Viv776c5M!6ZPJxgtp8g+naGVWl;1{sV;yOMRS}w z+n#oxpJo=y;2xP<0P7^-h)^f!`TkcfI-Y&KfT=7Z5~6X_?E3Bf-@nFdYinjWCjZUm zh8pB42M;A~gy=ougRE+L(fkeCFuvM2_T5u#UdKaWp4ZOF>qnpZ!c# z39G1sd1t2)BW^SkgI3eU5nO&(T@>4T8yp4m4A^5j2Ueav%p4q5(sW)9YT?$G420+5 zL@oe!#Dr2=Y%!5{yXDF1NOzSuFHka}zO)3}j`=FuItr>kc81u`+0v5{N+Lc#cN`yN zyF!or0-jFQ;I?;=C~|cJs@$G`?H3a$6EUSJbS(XrZ}woUwgTj$+y(fZz9Y&{)t=~% zgZD5`*W04LwrB4mDREbAFH5P|k4QB^mKPx^(Xb}tRT4@Wl#+`Po8>e6_S2|zB7r+5 zKSi0*2Q`oq22(og#@G*icf_mT*i8dZ7+a$NrKHYjd;3iYRnybc!|k-${UG9tz`*5f=c!%>>swV_4>+lkJYK296b#JZfoa+De|5c4?cSfr8<>qTPydV7<9VEA zYv0^+nf7_ilIl2=bfW~LoKvd}ExO2I&g5kIY0XOKC;T3Fc}#=Xw-av=A2Ie!Jn;lo z#^vKGwleQ&V({)tV5?Jp5d7lr=&TtOw9* zeSOo!e&Tn7&MT}m7RQax0zoJ6)lB%oD0PY-pLs>6 zu)2gFW5%fvWXe#WW39qBpLApb-n;7F*^e?f{`s|ovtjVSp5_*OtMXmM>2J@p-R}RD zMj{gWw%mE@M0Rf#^`7K&FtUCEduTOSE zd6vraCFS38|Amm)?Q+YpiL`<=j__kV+5vKn>J=cIWla#iRS}UfdGhk9ovFe^FZuYY#G*pe zE!?-@@XORM;ZeBez$ zx0bd15n^P15Hi7?pWVqTmmk2k0zvn%r;-*lS*j1uutQUOz@(4P!nX!^ck@y?U#Z<- zu;@MMz@8)d8-5%s*>$*<1QT7jTJF6=4k}AX&BHTNlD}!nK>1&3WVkf-oH0_u>5?{` z1Vi*tIcni7%{mH}MLl3DPEh1-k}d4Ew2bgqkss|>yHgU7+j)`P3%|fMo3z)9i*t_b zBiZ87wx;FkpDD@&Mgpea_=)bgy~P=b%i(2>Qmd8EV8^9Urj_N#17+Vc=BE<+potFR zmMMr*n`tQFC`7zj@h1>*TJgh&GS{*6C#JM#oEk28Z?&vQ3nUZ)MFq(M?tW(*!c@-0 zAJpHh>38|GFe91LkdWg)YkkCX5`V>}OO_JpH|BA8MlE@X;UHbAlh`>bO6=Y}sjAzr zh7QC3pK@?31_h7)a*Q^yK45pL0E2YNi`aa^VSX0=nXO*z;=o>KQC=x9tmQO^FSF$n zab#B(>u{n}{9f`*aFINlXVqfBUHCeDYT##)1*Sj5HI1jO$k(DM zfQndcErQjEv*;htc{-XO$wa~>mZQO?1owxZMnul& z8~kqadjX~S^E`5r4u&Ti%m_P}m?w?VqpVvkiJ?f>*BUkszP+~OH$j#bXWS`$p+od` zHm>E?sN4LK@q-O8`)(c)l`uKjzk-ySD%-lnKSm2Z)sHbk%oBYP8Ko>FQiU*KSMyq) zh}oWj5*;_%vXlhZp%`xxeuPu&FOns4YJm=>;BLL;uN+~7)G^6%nR6Z_S0?;&tqQv3 zPj5%#E+BQ#*I!;7ec#ms|Aaos;r#Zv~GqWc0yqD_WWp_*_74@!gDH+Y!#N!i zcC@-lO!05TIHDBX7o{)mGLlQpmcV1W%7HR?B$4f z{atCXTR!SrNBNW?0}k!LbGS@|UHT?>b;4{(un_NEf}6%H;0J%s1!Ew_w^6gOl2_F* z%|kyU5xWBIZ~=_}6)t~71WxYYEigGomQC}rOtLA2L zDHx-ChG0fjWfgIXKGIdan;Bob?VNS*)5_|f)@H@pKB7AY;uT2t&Z&2Bn}F&Bi*Z$p zapUn{U?OkUnVx-`J*$OMk%{Z#!_#F_G*HkU2Cx@(y1x0xSzrg2!gc zpFRY;_M^C2HMm~G$Cw(}F);FCtm5ZA-sL@vSxOAwvy^wn2N^Q)BI+~bKJqE2xEG5K z%`R!1-rgNfi{AV?44`LD9WOr-KTcLFb0%}%z*iz>Q338S&eZ;JBXh>DU9y%=d1u6{ z5M2i=ZH}CxzDYTtD{O`=4a>BP%znt&@oao`EXJ_~X(o`?kjWoUi}7C0 zfwIeT4mr80n>J}A^a7MtIj58;p*0T4ig-PCB)d|9QEDLp3Q1+YY#K)h;yaF58Gw_uHl?I!iWqB*5S6X3#f4+M{1^V zjxjN!Lsy_Dm-c7g7aa-rUZXD1&X}oHs?FspD$eHqxZ!#`W+iJ0 zSOy{2eCns(Ik;3skzicGE#tamj1w7Qj6Y7DdzaYyTxSlB}AE{$6X$>#SZGFd=n@OjAX=V z34>VE;wsger!&G?L4YQQONPoceBtY5fn>;;w$80m0o;HE&(e8a>9zhe6q9sqg7 zu@z=3${*%h*6*y-(Y=9$Om~m_0*zY`HUihUBvdb^QLFn;eoyA+%8;`LVu|yRyj?nj z=iOCFp0VsI0b@k)egP&&({0}KyLbvSrT=hSz%D&>@RC;Ep$U- zIc5laX{Z(^Q%-@--?BZdT|tzO8*r&6-f=ngam;v%K9d&T_2QU|6g8@EaWY&d{Un+2 z6bUe*TSqw}4d$H08fL2Vx!eCYQ(IX- zEg11pp$+#H{}H3)#a-==-n=ol62PGk-QHL0lz|UBXN0}C5hXt@PHuO0OjYOq`& zf3W$QE8{1V03Kn@VT*V7Z078!$`QgF;p!+#wb|`F`o;HlZ1PGL?*Xw-s}LW*a9>f{ zB<8{NCyCG^dP-#%)j|gR=(rZi7`-9qNPcQ5*&frQOwmAJ|i>w3eKMQzCSB{J)Gn0@TkML4Ry$2+I347;&U;@qOH6Wy|CA0T6u&@n&V|IiBR zLq3NA(bEBcgAD3TUVpWMTdQIs=8S?TKemci)NZucr2}|^IigI*N+(H=U+<>4ox!aR zA3wvA^MRIq=1sN`IPJdI_zp4xn5&gkD>_fy+`p?AU^`S}1=7IO#3z4ZE&9=JYx1by z1mLEZPKdYntF6)%CQ;H*5DE^Fx|}G&_nR#56VAymXruJ8XTdXU{OCi8*{A2N{9AXo{ftn?__@_it-2c29y133(T!wk-Xkb$S%sTmMO;5r@@I&3$JiuBO;ZY2eX z#2cd%=8oIf?{Pfcim2`Q3gR_^{!fkmqVv66z;@XhnLhrw3b?v4c;8F^Vl%(=y9bud zk3fplYb6-hCqN-JFLt+x&c;|2JnBWtU69~;!VqfL|7wOPopvn4Gp!<2nd5kFUs!n(uMNHz;_1#e19d%W&H^dE z<$qhywLkdd#8OU`dR;@vPz3f{Q9gI}(NpW@0O}k4pc5O8s7`Ir%=_UJhId3h>93;e zPM-)|YAnk!b5s*Yf{0z`#NaPb4UV&kXWx~;hbj0XmIFhpU^DA6c0)M~3<@$DPX#N% zAc|J!ZMlBh)-zaylcGGVNToyGU+dAeP;5aRDz%ep7cm;6SBf5v<48J%8k579ucaZ(5 zXJ(#4*4+O;yh7ELQ-wNgIiVN zxq=shXPohz?LUD#BN<-!&QeS#r2>&h-O3_~2~V>@=ztpG_VOi4y6~!}=zuJ>0|RMr zDK`TlYAFX|wAYni0<0~ewUiKK%IZWCJrR0`RjTe~{Q+T(gR!@xYffU-@0EyCFO{^l21G8d=iA@FQl% zJM3TN+?08$lm{zJQ8~4}6kYy2?D&F7m?(a`EiwKMok+L|Z$eF<6{ImcyJX7{kIB~D zJioCaXT>!G5?BjY@NgMVPukQ>(SHwHhB)hypBfDwUp>{7l4kFmbYr8$)`!+Me8Mx} zDMO1|rX$gau33?1+m3J=4Qg>?yrV{^env9mxP1FK|)X^d9k8L}=`1~K-`?C9`cWWj# zC|kzbx>)%4nB~Fj?KZAaad(H}?$mZN$(=B^;of`*8Hf7Wc5QPa+-}{=^Fd;1vo(%A zzM87XjdwBw;q9jgW%KGSvsyFlvlZcCRgGK8`KSAZkZkh9XL>;6yyEZ5R~oDW-4^nZ zToeDrK?(GFg2c>tvCd0Em_+#M&G97NA6Gt4rvyFDaK;GyqN3Co5+-h^##1pOsPnZW z>`xn0Nvo<>lf|cmH1kQ)E)RNDIBV>%Q@ANn5)|K{!|xD|WoOOM(Jm~*=`e3GzkZ?T zoZYRR83@uCJ%glyVR3A~SMIzHRYm@X@y^Sxi_KnLIiaUoBKHSGR*x>@zg&}f{vL<` z%to3Kr&f=q*3ahFWqWzuuBZ1^omThlZm+weQ}_hE?j1`Bf-se=@D?mK6ln0;`C=E` zt|0P5nf9Zr{PI_7u>}n6YKD-wXTPAdM@mNTk1?(_ibxGu%`pF#`a)Q@NQr_WVOXj5 z-==5`X-4(Gu!OZh&5vjW3Xr}x84H=;ZVMAvJlE?SeB*itTEyg>TneX<1y>CaIhhGH z@Z)czCO9Q*FunrcC+5}bfO^2|FvxS_7I>Yz``>L9X9oFaz|h>)LfqNkd1v{zKH0YS z@5IKt_cx(IIgM%MJ=M*WnKJV!ax69MBL#P*CD|Qah^^O7+%s0RFVFSs2^9su_+*f zp$k|J>A6fJIhQuUtWq7wOwNZra|b(+zyxJ74vUvks&vzCvM4dleaa*;jwuFLTh#t~ z8Br)7X&e$zTty87-suB9+gM6M)~3y@c1!b?Y9ScE`0FJU^It`13`R}(ZV=3+)uzvt z-&-!w%4Yz7YjD+~$F54nx=bDnD!>Q1io@>cq#JqnG2-%Qx@QZM89O>|IxeSbxw;42 z@U@9%!+pKGdxXeuaxZNuZ3~9ja~2X~{UT#)RDecznPUAtql3kSpATr% zAsky7z^*K)e~QTGUUQZhFUCxKE3lyOo&Y?e0AE>~6PU;81MX_A_SkmSVP#rPSUDk-)h05M0#XD> z(B%+8gtmZ$ve$($Z7QQ*Qh_(TC)Wo{Fkmx^fX4<}X54+_r*B6XkGlHy$ye18rDK=1 zF3v+m1ar?5`RmRpfZ_I_C%w#swD{6NB2P0mO3o+vgvmBgNg~8D<)r*0@Hu()c}Yysg&b^~C||5URzSd`tWa)VglEY*(WQMV-p z&^0}KcJ~z|DPa3iLI!Goj3kdL)qNJhM__p)B$Tuzlf$F8oN;O1X8eKGjPlMk%faLl zHZ@lPUn3TRdB8J}Sx*Xfhs}s1pW+SE{!!2z3ET6!m{)#}Bo0Iy1X=2D0?DOv(1!b^ zQ(*Uqh_QUny&+>Ck9zw2z`~X*5e*09{2t;SHQdcTDiPXDJj4c>Ujc9>*6#3J?wTUn zK~+%8LCG5QC1gf+4g;2pwdWebHMsO?D|721T!zJyj#iwasrJ$SoB#yWai&Z*a=qVa zOdYOJHEvBQQp=C*YRN%o%kaFIBxJ>U>8eOtY?V=nh@qH+>gBe08|0JOSk385pm?I3 zOxpqE&xOlh|KnN(;qEME2sb*ss@&|Vo|#mdI7JB6e->Ua$n?4q5Y*TRuWpUn4gn)b z0pOZ6ahc3v`{r^-rBj`4_gg;gJ_|_Ukb-9yRrNLUc+8O^aS;L^TCbj9zsSC&m;Y--&-S&70e#?BqjTVOw{6Ys$1{WYF6m1^qoB(HUVEcvL0`Shn zcc{FCi56$RyaT%#B8nJ#y;rdz)irnl$teE%43k^Ub~J zhCIJKHJNGwsZLF|bDTZ!cIO}}BY{(bjG@q5hEnM7-h9%P%gUAuZoq}!J>qfVEEUdl zku$DTDJkaKVjnt>;eC~?}^V3Ob1jNI+HM~+T?VIH{;{7E_&e_G3qQ;s;E5Zx8Gux7GW?4~_=w40?IswQ- zvbg!`jQJsf{kWr}8l9K%oOs7Kbe&%LSjP8?wHXONRVW-HVRc{f^m;W{`Kc*Obw)Q; z$i;)8G88xge6wx0CU7<2$ekJXve9S`^j`7leidv;$RG_M^n;Bq!DG5+WEBS<;? zJ}ug<_M6FVng5*!F!-=NksV4y0kr<`8jNh`*n>YpA+V zH5f$hJ!(Utt{fcmOY@NiNY=o3aVSY)j%1^S7DCL^|g4i3|AB9QCq-(2GPreyZ0;1oPTd9oE^OZ zTg;DihJ%Em#?w)DW-UBYgUY}nF57X_$2_Lo31Y3G^sBbKF3SXxES%8FAK7A+b~Nev zy7d^X$HJ6Wr@B-ueia&@5|29%KU4DxU57*P%8ubEc2tZbcAAn;P)P`&QuBQ>DQ*!~1Y`xV+q5?OSWtz8!>EFZI2)k-GSyE`Pm zeo{^3J5n$3Pt5OrZzX5X_BtTaft6}y5{^QtB@+?*wQ5t`QMgl8M-EB z(*?N7JJi}DxDa?Flt5>C+z@tX87jW`lQ+ky2s2JgG(JrLpH=y zwuKSJgTx0L=8KC28E|m=4A8F-JQgE*$VAcia4h~~_epay{(rI}AC>PNaC>JZop^*j z0N{N)7?nI=x86dH(Quk8x#$Fw*JlB62e0GZMWOZoCc}o%?R`%M&<^)#4VFQ13Bc||qrTqQOrVK3L z!;pFO>EO968*ag{_Bm6}8J#1FL5K3)9USob0FN0<7Xds1t6ttjfnHxg{b8dRY?aCs z8cm47R?H4}-LBAy0sPjRD2I>m^~-?J)|^*(M&F5vL?u<)bmV zwURQf4^oksBn__(z^quQRpjMY{@+*d!xbp{VB+VQx7Tq~XAJlseD|}2z^3HTd^8HX z7R9aARfXlYNA?fMnQ8_CoRj^BvYbA}fY0Q3xeTVySdh{#4*|K}c|+x@go9I9&w zbxRn=_#%!;VWQygssdd`beujnyR}^soSOERpk~)*c2+xId?TFSP?h{iQoV@@U{k_( z7AzGtQ6sHaWXGPq4>`m;8&`V6dhr6`_QVlfG^V<|a`>V0>zE_~&mWj~dszRax8-8j zzT7R!WwD9dZFa1lTH0){EG+ZN3&C#=oOPGwPGHvYrnUB5sGoOQBGr~L3*%~9+>A2W z=%Tw&DjwYrq^VXvZ}fb^`3Jm(ykEYqKi{~u-X^NX?;nUh)yK82DZz`PN$b(I+I-b~ zGaaD>BSSsZR|Mjh<5a0qGtu7O5@aKgcV!XUGF(>iXZqJKdig!rLcxgwmkk~Z_C#@3 zn5(Ugl}z9s29S1QKb}f`EJLfVw1z^{u>Ac$d9PELGG_L<87oYK zlZa;pb$4>vv!54#KRE+`070Dvgr@H)AJV!FrRX=}ran$^gXcrUrcxDxrey*ans_yi zAx8kyS%$7(Vq$`#qpQi#|z)^7SFf<8A7#ixnk;)%gVJTVw z2SM4)?mXG>&DU;0L(2PrMH=vOiR^Oywyj{)hKz?_Q#UvX_qPf=+U(ot`Krq+$n{(2 z@qhPpKVSL(0XOcpn;pNv@U%Oz++5wZTHH6+hJuJ;gF8--mmPrymxil-Z+~w?MY()m z$gt$ki>vApFHEoLh{z~Z?0d((pe{(N#NH8w7W8V}eJ)zTNIE-xV$S=B0T3@7>Zkx?MpK_My8pvy zxeOg(=6Ne)pf1^!JzBT|4M~H|4ea&fw%8s@2?m2h93lLRy|3*;Jr{~bCei2(RJi=r znb^5(YdSDZk)bl>nEk!(FnI$H9w0mD{8az;&H&f+F8N!o)5n1-j96;Z!Xrw zYiIa-9#m_hfH9gTiY#!xCa8Bea{S(gt$WR!qGG=N@yM|4^29F<=6yON$FU;bc)ES(pokGD|w8@A=#}SZQ;^#&7Z1=Rz8PvVpU-+Y^c+ga)aL zRAqnbD;f`}2DFtqF>I&y^r6?1b0&$ZK7xx3p-GECS3#IaY zFQxK|?=KrJGlxmCj8Xq{$N6|cuMgwdS~b5Zmd`vP97q*?*wWeAK&wEJnFpFkTSq$N4fKM z3la5jKI6Vx2+8AIg@6oR?_#cusFAu{=1MaYTu*XeQdo%=<$AKuerBXjQ{%CJN6D67yK~yCQDoiHRXW8C-5q;g$bby27@_fh%Q?*0e zbG6~c*YQz~Cu^ZtHzFE#I21!xKqL}1LP=PQrqQ|2*57$chx?-6q0xK7KBY*gea>B2 zwUz8wvW?|ns5^pP+ny>lR?&6U$e)Qa{-1FsZeY`v--Uq30)BpTR6h?=sdAdmpEUKo zEKr^qP4L-Z`wNHeB0gQGh&37X8e-pwyRNwTFT=3?d5rD;efC0v-T%&iN9ox^FC~Eu zwj5&NlG%mjl9@Hu0S9s2W{yo{OxKwc0sXHGytp`H``lS_^I0GHx)Vq=!hcZA&clqY zYyE>Or{30YM1F_>wEDqQlJmj zM7ra{BIi6S%czilC};Qip|012{6?!2KU-@dXuK8bzS6KBS3!$6ez;?c`jV|u`K;2d zIrLvA`DJRmdJ6>>gUyKlejtv$!9eNwr~}~ZI?jFb?S&-Ap{d;M)Vw<>QoKGfxY~VzW6#;p~K#GFRfFuF&db?SSMpVb+Ni35JU!ZIWshWk?n<2$-pr{jJ_{RdX z;}>)T7|CBrtOM^8V31Z+3On3&-)HeOY&sVk8$?=wtc+@=nVJseX2l(AMffmSfUs06s1| z9Rvk(CjW4;v6zaQ1Io2pzqMQ%JKpF*APl5#wsnLRCx25WmsUz6E0KW{D@yH855$%K z-BwZjpjW4{TxhqW@ujnF@bLbn%RjNbO#OvIfced@OanZc`0v%A!sl^$DvmN+sf%eh zJ!=Q$e8v=Lnk{Xau0(8>u}={Js9N&)^Yq{7a&^BSGqyo}Z5_LYEhpc8&ASTxuVKwtJ8_XV8j*;`o^ zY0-mXXJGfhp;6_9BAF|XNX$g~+z`2EIxb!SVrl>htMyB19wWQ&`6|KA^vT7pk)e3| z|LQ7g8w897ku2Xh(Z~v6VR3M9N%u=v))odFKHbrOw_^-PBpOHc?Hb{^w6FOysNO+E zYEaOHp*LfV3rBTZOdHSrk>=~N=O-|OmFrEEeY7w?zFJ}80z-sz)CGA?rV|P$#44#W zVUKZf$nG8<27Y7p$1a!b*qmU8vT^)9w<_(DL;rbJ@5F|4h23ozEj{#hbJMSE1R zpC{OeoV*J_YoTHhs!6#KW}cxs{)Z|I1%}xBE98IGK?Z*HpHPPHiQ&`I3l({+LVOc zKGJ#pV8Ly7?2rL*zKeVUQUiJ>E|p$4$#t-_k96(p^h&~(U?BwDZ)HR+KRIi3#0%6U zAXRzRwE&h5Y8AoozK(k2iGl5^HVy|Ji&X~hecz6W4SyQk6idYXui`T2{s3ii8-b;>|@;l<3EQXVHDN6}hgd!`x zY#|bG6tU^S#paRxn`>7rLF)a=Q3)*?xsx9%Wch*aF~uA3HHg2Q$Jq9@v!8oy;$bu; z`zo@eXz)~MI$-HSD{E{l8j>!L zpcSUTuIVuuucvz+!xkKcd;1yeTSHMpshIV;8E}80)$*h=?(ann`$H#K4DF)i=Fgc3 zx%k>**V`#|dcb$IC5DzJIN@!_AkZw4bMuXaW=5E)OZ9k&*jjmC8o0EYiA&(L0N zjpK{%yt4O_0w1!`{K}j(#cXRfA62d`#`AlUYP%n9bZ+ZO-e zx4ROLIn#Z#mpFVD7aH(fx|byCMKafk*L$mw^n(>q z<}yhs*GiWX&Icn=Lcc*7ab0_T1atd7OvBVHw>uXW_Yp2ab>-uLStCFfNQ8kioMK=T z_)%LhY+@HJP~TK*$%*_qa}B|YWwz8Kq;f5kcO{irw^k=JCp|pGsl8`9crq-u#dH}~ zV(y>b(s#c{z7?ARL*@g7E$VoC`7Set-+oJRC(|}qObT>jKx|?&y_jJC>qkvYfp1+6 zKEFU%22Hzr0&i}|pLu9?R(o_L0eWxEbH1M&;qwGd8YOPIB%9A!lYjc2@lWC{57{8| zL{0=NWA8>KuLa!1cVXUP(;op~E-m`rzYR$e`~1`9Z{`f5BS(W1^McK4M8?}oSfzpY z&nl)CSsp^wdHK3+Vezno&ETFcp&&%V8R&J4+Wdx%DlS3?p)L_a_K(8}QC+JwykCnw zNQJA=mX~xqJh^tF79eo>t2>R#{T!@@-lv$&ze42eIucX$vV9Fgq7J5D$^|G)O*~0JuBe3FnFzt8dtILzh>DS2r z8Xj}{ZHu0&r5gP=b1(^+jrVKq&YrFgSaEgvV_Wrq38(p5XJtFc$_TzkO)b~qLoUyA z-SI;GjI$N+z+66XrEc}gdIJG`9VK)tWzJ3m&Sk|-`@l1oF`{gkD*IsL{JmraN^ajJ zIRWoccn!HfqNGYfLzlnN!{(6IR-%=o(3J-l-PlXVS&QVw*iC+gHKiL*EeR~y`-g5N zlD3?mn+?S2@y)S{%}6EYK#FD*E|RFFujTX8fmIWxmjI|-n-@|h3{y~^N!Raw{2N!J znDHO)eeA8m8c|>7`8YTYG64+*Y-&5x9v_!X>N+pi#`49P#xws-Qwh9*$8Gu$`Oo%t zNoTb;mNp*sv4e#U)9`KET>f#{8e0ZDBBl}ly&dhmeD-+=OsK^|8-ucE5mrKt`%}i{ znF9*UG*Jo})sSgC z>9dd=PpG+Hgd#t6IKL3H7in#wdb=Tv&b}i|hC;|@q{SSiX}_VfHU8{VV!c|4%Z;PY zJ)~(7nkx-JwM(tQe+$Cg#$?+sgM7G+Zv@(8Tn^?B->;E-gz@msUAT~%nuH`-U6H}a zlFQ^)Tg>i`qQD&ZfpUyrmrwsU0{QfKK2;2OO7@+3hIVk?ka=@=b^R z)pPt`#m7|nmMre|gwpLVW;Yf=uf?jDA)2!Kui|!ui0}k33Izu4IrbP$LgoJ00lm|Nc@SfM*$K9bDtvD{`<(6?Z+)v_)9e}E({+) z>!4xiEc`4bnSCzOkr_I4DYPbucIc70;(2gLv%JtE&#$U^`ac<9x)Q-qhca29)2gqD zY(dN!HMUQwd>aEbjuMSxe2q$L42$ARp_W3bBq9!1kfEI{WV6CQJ8^+57+Y0y-8_EV z7FX)w=qX23mHMwbNdDdj8hEDVr}IH_5ZQgqO^o( z`RSK9W#*4$>tW3J3i)4K9@hfo@+fd%RrSNript7h>a@3k?>|IrsdEc z75-^>zjfY-XkYz8qB6kdqLpZFQ^|fB)CaT1@uox@kmtBd`yjQ4%FespH2r>JEUH2& zr^Ia@9HKb2PMgXMcV~;6KWB`c)vP`5E9TRC=^2TG#GU9bufI!=&ErA}H28RIjlhnf zP!nqr$pe8x93U__wusw8BvH z!BBc6+S`*SPpH7>|3GH~6o^n0F~&WBUyGzL&aH6uPaq?Vm4r6b+xx~r6!H5ile@5T zn+^peN`;0F>pOvm2PVLWH=vChQ^)L>6y}N3gBN8pQ&jFyG}zX{f3SsbhJ>`3p(uam z?$7?2nqB=<)LoINODW#(gu;wdgHlux8lL8w)u_OgHA18_QKI<)jk-G+f?QD3jXr*O zVi)bs+0-h;qs;Gyh%ER#>a{=Owj{x|^?t_+gpVq^5=sheJPR^GA^&NL#P4aESm^;=lP2O{G%d|<~s zY}dz9tdh42Qo1^_j^()wnTh?ED=g8I+}25&n%dzAL92)Q^nGT)6Gn*i?zWDdYjWI{ zet}^~M4L8Lc;GQx#A|%naiMow+BnpGThZ;8v{5I#7p40>k4d0MnSMfX5l2!PyuVT+ z2tRTOsf3Hgzy*_o7hn7B9<1maaaf(GFQ&>II3}SI*&vM0ha~uC#TuPN1Ur_TjajP= zZJ(R2mc2N(f`A~rB!dH7m$ShS{$W~g6JiwCfoq=*w9y9{^qM&wgHJ4Q zRdgf$%(<6Z#}`yp2XGHI$=MTwmhd!wkN~k&h!-+!X{FXh@{3}<)0q)%_R-;{R8o-G z#2vxNHGF~4%g_dJlB;0rg~$?w5UBWVsbc>CeC%*wMVzL}MGR1wYdtm4B1I%9HdJ!G z)oJF_D?T(mo|~r|pG&QGN8RbDQ2k2nY%=Q-oUV8AvGmkoBCs_35dv}Ug}t`0fwn9o zzo-c1``zZ0zY8198qdPUH4t~W`{G5lyi3!}+InQ;O(wMtM%YpvS03?1ywU2^ zdSH%mF*EuzDTbJb8gs>n|6628Umr5-b5b;#7^3nuhks_~LcGcFzw~_>DQftl;57<# z<75Dn3_|S6)0S8zrYb&)T9MpRhOE;0qfpH$A)YWVoW0+*@+UB6`}iU6llJSbar)iV33RWOsZ;ojAR`+~07}li9vTspH#G;?-k0 zqqeQ7uuuqv#L`I@QqNXR_|KHO$`!DC{Y|GqaAy6nmpadV!|*JK-@0|{(cvSh5@)0D zvJ*6c%;$PIP61QLXS)lKP4Bvm10`R)xYhX(#`E1u`4)bPYc-lPj1c+A#Q=GTPfkzg zI5c1pSt%V?`d2Nf(5=AL*mR~&EKpNSY%E5kgB6@l{?X9qu_ZFRpt>XcM!|}4=Z*&% zFk8Q&9L!x!6FTa#;q#|)0Iwm@$Y$AEa`yH+2QPQey~1=av(chn14(9+4p)P) zDIX*(vyC0lW%h9bYebz?FxQhe2J~jS@UO}#G;f%EoKaZ6VR1l1+1s{&3kmlJq{Trq z_NRAhR+fKo_mzH;Ognq6e+HYJ2%!M+`&{q$iOqaXCavr-72PM=+s5%wBs~0U!iN*H zf(W7@5DNxu*)7@#=M%Zt?`d?r6s3qvL^-(6=|pcB|t-`na+#AaE!KtLx?!|MT%;cXxL=`|R9Q z7X6$*qSQ)t)RZM3;c&JHjSC@_&p8UdQ3r8H%K)rKh&z-r2ueD*cK|AU)^hw%pmc^W zuKUp&e^`wgCglC}aeZZO`?ouL5QKpap-`$hm9f9>c|SRJm$bvHtxZ@2XqD0Y%3XWB1Q=WnRAi>x9yuk~D7PC?|uGF35cHxbq z;j~_zugiwDZsiKa-+KZvbgdqrKwK#|VxDnr4rJ9=k|Kt9T|-hxm|9wTu7S8~MJCE; ztX@e*t~?$4*SDCnPjp4_!Tcfyk3ah-c{FGOp@pclMhRSpDXMXwLqGkUqf1!FC@v-ye?NJV%^vV9dH zy1LrG(jhutdjPiE59}Y%QC!Ek8^r^IfxjP5fmXmWGI)xnSP_zD3eG68B=KY(ZrfKV zq#Two$kNGDn#6Ae!6YPXB10**N=xJLZy1r5B7}i$)F%A94|jjGFwXT~M~JpV9U#)C zvZsXndD~5SX?}(f3sI)-Ui&>A?ILD7rL;s}TWa@-eVAc~p@taveL9B?-I+VCB(-CV zAFi4AHgEbVgT;#ZkBhybW7Y+d*CA7*v?BxHv0Txas z*~pCSo5*Us38^~?9bbffSp7w)fJ^o&ye)QL2Tqbii#`tz0WW9C2El(V=g7QH64f!4 zqSpGm9w|+4c26nMl?8 zAu=bS9<{F}Frrno{s!q|$mqs$QO6Pzt0l5Fpf#-o)}7%gEBpi2G1D&^q2u!B76Tg^ z9TM^k?mQd`L6aDnCM;YN53qcZYh5uqP|BBJ!*U8-*I9naJyJXhUdGzuG+o-vZtIJ1 zZTka~z2AXwtb28?*soSm=3u!CF?WP~XqW^i!r3*1r`oVjaI-;JO5Mu*?Z`frZ1&kh71dbilHf6GoNzXlq<$mZ_Zn%yyvLAu ze&qLHYA*TR+3K)cOStak>%kfFLMBX(QEl~Eh*=f4#HGE<1HUXkzdAcu{V0Le%*ImJ znDa5*ypU;Az`Ys?GIxo`C1%mcwD)oP`kMXu=9~%1M2SVPi)!4eYYouf5vpHv7r@rs zaB=WJaMd&AmG{)xALo@mj9`2CAe)&Oj&oKIyozGU9hf#Twk8#7^um;oVX>K?<-HpI z!~!o`ybTW3&&px_mj#K+5`&|xW&`ZtjS`svqg- z^uL@HRvq9{8^|){^2xGv$>u@%{=-F$jj2U(I%6Hp**FAvNmX@U6Pic@C;4?;_Io?I zxtpTsR0{7mgdW??gUWa&l5A*TdzM3kNT#3kEDZ8&P0faKk@N6op@c8ckEd(n{g3*f zAgz+wKDX*^LBRJlN_ZIpF%bynP~l9k?+Rj_G$K8r87PugO)c=gFyc~yF(wq{ZpYK? zY2k5dG(|s()ivPF?&M1@?7^eFRmTVJAP`6aQCkkx=6xuEH@1aU1dfCPj{|gEp1ZE| zr%&$p~q0&62=|N3%lyy6^4_PXr$hPm79pz~Jh zux7a+%4cu8J$5R5fKJh487LIg7VvT5@E@Xs&B#)L5T+6Y2 z&-L7kI=VbGLsU)WTBaOFq)U+W$B^q5Uux8U2IF8Tlb{NEVNLd(b zNQRDwsocM|B2Ft)rEJ!YXD9q-6iKXYq{?`D12~+JrsUV}S!NMYHJTVD;jGq?ci=WH zRuL0(WMeB!DsGk(r4=8Bvz#bB9WSwTRUy|U-EHS0ha1aJDMaCsYFgN=(B6qLytk|> z#A7OHd7t@bzgAS_rdX?A6&vwS2T{$Wk~uWg^5S|Z?=!1Yv*z%kjxYCRfl?JNI?^d) zV^LVs1wGs2VP!;R2M0ycC>8~cdxtjUMpWaRKYbv5+L*~e#OgQnINGcrm+>$3s3ih) zJ{Jf>+tjMqsMwIn^21=(wa>O&%^u!Tjbnw&gAfM+TtTQAo4@_6s3}-<)oReF6C0tJ z1GpA|Bx2tyPEZpJpR(Z$tbuR)X1G|XK6hGMYmNchQ&zFBl-x1e)H*l&Pt35IQY5N> zP9%VNB3|QS=6=}z(Ry`s5AGWe9%j_2!fNP}g$VlZz$})idyL_D!2~91(zO!jozGXv`VuE^I3kaE+?m~!?vC4On+fB=2Gz_0#u37X7J`!} zA{z98ycz?e34TAZr$W_0^d)Yrl)ou82;=#D#dh!lX4ZXyLXuzJ;sf6IeL=a&(V(~5 zpL|Wt9<%EU@*FvDH=@XbDK(pcSW^(1J47}tNyJ263h}LH^^&U|s{#h?#{eG-un|rU zj>>`p(x{nxmw}Kc9gp6jn5WMjP&~RflvH>knT>;2;FW;~>v7McTdZ2)PMFq`AXymZ z*_gV8AAR&-h_GQ*!B#&B?hMD~$T1$b+pcbs{dBEus+4QFy6KMbXgZ9vH)3RcVU3Db z;ZFLPr#!WpHD+ez6P5~z3idoO*z-Xp=5kSN$#ZVIqRjWg$N7uQo&RU4$d@D0A+>WR z!V_Ot)u<5f(hh)}+yPwcI zAWtd5U{^IFuP(Z)MDzVSw%lpWXPf}b((Wqoc$Hn~8{!KNr2D>3;|e}~NW%&FJ4sPuzw3)It5M&D<$b2T5$jAz zZrw}ptm8|2A{Eq6+^68Az$$CvISsZb#U4HTVLQ&g<6?-fyVyc(h$U_MiKYxx)&+SZ zse;AMV-`dae3z^V!E5;C?d{X{74(K36A6>Qp6xkx6OpeLELKT_7g0s&)p3+4bdY=8 zP6HhQ^K!*%Ff;%evf=t*_qP*Smbh()2c#7hb4S>Z?wB=_YiB#D!r`yUNtHuM5{Uh3 z2E@oJ(JXMzO15hawlVq*WMxZ2*l&X|z>St-FhY~|BJ0s&4vE7kO8R7xG}&SGB}jQT zad4o9Lu;zD)4IPeh^|&Z$IADUVGXO>r?7D;I~SssB#?+X&W%&dqERR*un+Z#RRxMy z=N1pMj9Gq-S`H1@bpC2~;)S8l5TR)B5I7AC^WA^qWTD2S=0#mh5t6oaSqKgPBt3}I zW3u7HpuO&eo`t`G{MR&=&we}W{cRLPv5l)+!^|FdG8Pbb0F|a7;o1bbb&tAe1Tux;jtFw-7ma4d8-x0rjq|0lVS&9Z2tA=iMHE$lY?j zzTSN+D+lfm2sn<-()FCDx#?gd;rPD|vF7BKkr|4i@-y$@&V)us7bdwNeWy2aF~7T< zJU_@p!W78cCeBk-f1>|h9`Wbt&HhCzb9QrK@u6adx4VBg0_bzu<1w~mw;ub_De-3H zdDi9k^zoSI@ZJsD9yDR_*zJ47n)i~u^_Em3+kNGC{CWlg#bMg>KA#k;{NMM9H9t;9 z1Z!W9JOJwGRu7u>zd#xO@gEBYMW8dSR>D8S_EU0%x>{>Sz31fz+4zs*!MX7FN9#Uk zk2Aw}m*p|EN(d2avI@$$xI8*S*Ye*%@hpqD+CON?3=e@+seqL`A4p&V zok@w{F=oiug!}5ZgAZkn^NpaN5a=nPy@}CTa^W!8b$k5F?^MWqouRq80xG8|PQRKW zU79cxl~HNcnm9G@#$psk+z5&v?NB_f352g^Gng6XIhyBQ>o$05a8ZWOxLzuNCv<{7 ziyNTKrpCQIc|E3VNGv(3!+)UigW8F6=}t^rA}pM$DY;ZrMwz^SR3$LZ-}4Gj{BKhFVybP;SU>{j578EVYzay5(JQnndKIINu&*B0~J+l&j#F$?3Bo)TmG*6i% zWh-3@C&y~9WEvhe=ykHNdcxY;O0tV~F);~G87auw0oN=!B5OzZ@dhZgG#UEAVkprU zGR0c$cnliyBogX+MNL*JVh-YA-_ZTl2fI94%up<*PJfu#6hm|D$vlX8W@wc}$rt12>Qi<%Vc?f!TuYk9+-A3EYqOiLz2o1j#-J-IK0^gwc>W4P z)H4&7i=v|cD~n6>Hx5e~Mda!X z_%_SF{Bd08?=s?+h<|A>0pt`*O z_IY_>;C6IcHZy+coFfBNvLYOQOWW^Qt@Az2a_dctw!=nrb#-O3nkVP>xZKFSn-Tm1 zG*0u__#FCp0>!a!fcOsYW$h9MfLB@H*KxX&46d7S5X;;}2xUBgWZ(IK>hJU1r|UU* z17(yc{AJzLzDZ|M!ydP<5*>ZyF&=pwx;9xEhCy9|W~EL_pnJLlB#Rp*4^S?EZSL>G zO?OP;1v}LE%H2-)dxA)LL|yY6Vjd>qg`<9r@bPk5cPAi?Y7&uwA^QQIJ>~8CgyeYW z5g<|Cmk1F?0wrcTXgZrkjlpFJ@E?1bw6!uWS8C#OMIYKo8L7PJrc97El26wsY{H4> z7qdh|C#1ju+gw{4U(EY5t^#(rK{P$;I_=cMFjrKB(UwKe?tR;{Z$fm_fJ5bVMm1HH zmxz>>B;dRvQONS37X4&ehYr{3w!x-reQNNPLQelS_5N89j@Stz8)E- zjysA99^FAFNH(=Bm`k*(iHIX9LA)a)LJ#99=FpTi(c@P(Z32tEMx`d4)6$Fpa$)uC zWUz;Uhgc()^p=&hq}3abAv9I5#{a@c+eWsuvESQUP~3&#+*VM#cOo$HFr)s%qudcheMQC{}ENdM& zXDn7JSI)qN9I387Bp5I(A z>RjXXUtC!JS|VZU%hSdBC`Hfj#(hV*03XWl;vx`*e+K1G4kc0iloLG4*bi`h(|aP~ z=3+~zBseOiYDS;T2*twAC9-&Hj!IywnR<1ej zjmvhic|{(N)>i@&hHu>tm*j0PuKLhx3mmM>n8VPTdhc{aO3vjnP5onk#0n^4s8FXq z&rEDhSG-M`Fc~xzvZGaCBISz=job0|%C3^2Wj)?iWq=Rag4c`(3o#ct^oPQQz1$rU z0w%#8#99DZMM&9_zcodRDUwE^SZHW@kT`D8DckV0g}}y7@G*RY)WCCfhVD!8N;y58 zUInsLXbh_{W?5PKOM`?p?AFJ>>$EmBJ4EjGDYw{d1q-stsL^LEC!v8z&g{had89

S$AnaQqXMdB zHxKv@amlxP&W|B#sNCW{?dA|A4~lZpY`z?sZdQ?TCdQe!YN3 zM+;-JgTRRSTcJZuc>4JX*pCzZd`<;z^nTii_d7Sy1-VQ<=z-lMKp#^U++m4`irR`! ze;_bZG?SFB$#Fod4hss20h+0Nrx z1P>#`(I=MXj;q#MU1SPmumF~))sAAG&MB?lw@A? zN>a?3e(JX!GuLijA^YC_KL9F0)xN!#Q3y2Jwa#eDRG5bU3_?njH4QQ&V~KV`WF#$> zOduSWNCmh;gZ6NAiaSh&SjvQYr8_Y$C<6w(^9n2rJ!{so8- zEhGXL6%`pN?nG-rq(X#98Bn1T$*em@{tH0K&~D6Tm|oHY+_(5SioQ=OlQOMrWjAa) zheiu4J1hueCqW}=fJPI9ici1wja+c_fehyhhMR8j6;^Z>KMYy2rPpY}t5^;>dgT#- zz#zp{ENv?xEGO2ZqoZA;qoZGnAL>n;z>)K2A%#b%G4t}c&y%#XD-xn{f7^*IhHR(7 zU_6MaoWi9p>rt1jVorMpXU?Bb7>yxChJqh3To~i=l`C1bc^eC7&g5tJ-p7MWS1~j+ zY_V`2fixmSB?ReMJrPByHSJAJROf0bmBtWQHAbxoe9fe`1{_OaRYKw@qZyTUJg&O* z?VNS&u`F7)5|7ASghXZpqBT(%@ZJ*-@~Jtg)uGGzJG>BVbe~SHNm{@ zyea5>3AXnd8EqB8{MpFS0M*wowAT882OgO7g)e;Jtj~PrGq>*T0PHrfJnSFPQkTiaUovK7n9 za9lvv*NCbGbEw&WAGD+CUA!Fi^qK_SY~?=2tuLKep$aMN{7guRbX-KrMWj99cqyE0 z8Yh)Tq&;LRg>cQh57)s-r%;YWg&|?F1fdZQ4NE>ch|oo!u;inH5Q;?u9twR^?uC&- z{gemP5|9J^eLVQUeHzg9_4O=Ru;8wzo_gxj)22=HKli!MZMg8l3-bVHocRWBzwOVj z+w~hA9lgGxvFXCW{=Q?h*06Pu>wo+Q4xKZHcN}{Pqopylh%Hhh8~6oEL`Gc4&TzG3 zHa;apBIECoB8W=hW=ueJO*JeMo&V5O{uteQEg>RAY7Z&Fkq)5_NJ&Gb6OKezj1Yvh z!-BYlElo>VY7bOIAsV0<#lZCdRbjqAWjF<|RJKXf%)0i?1kqZY5w zf)WC)qOuP_P{wWS+_^(++_Wj_b<8_tU#7NoptWO}6?PV$I3m839Wm}4cON^5@z0IF z4#SWj3JD?~*KtU>F0J*AoO9^@TyW$eNV2@~pd;xW?&h;M{+6wML#*rRVf)tY6jf+O zMM9&6B;^Q#AmHRf4#!1OaD-Lw6*$tv4@YUKZ=$ufj=texq!NUL%$hWrkH6(2_M0`6 zvHU3Y*)-{tOW?ai7{|Vj`bMt);J+|`>I_E43Ji~qA*E}jgDpibss0WBK`9FcjATMP zHEBX6WTjK;yU z;1M7C29rcX9W)CbUjid}fk1!eGoQKT&_fTcTeN7=@ChfJ#Qpc*yEg&Yd;H^$6Hh#m zpZw%UTzB2K4w%$2;k{uPzAve;XHSLGj)0mfbjc@?mXQ)YIE3!)Pj;5>o}HqygDacr zNzIu?)w~&`>uYfQke-zrh!(E`ztWY|YzuYc@T5Gslo|rHtT>*0!Z;Z+b6w4Ff_uw^nFeTfyo8g0Mv7`%nrHV|nyg9!B$K zo;R9@d@&Yk5g-^G9Mlg#{P3y3sXaYC{KtR%$M1k=PdokWw%c#}^XrBn{LB|W%NMTt zJO>|o;I|*T?~!9lenC^p3)XGrBj5aQrge33b>WXZ(!`|blF^L3~~s&iQ`d&9|`f5K6OQD}S(v@Flp!K50FV8!NLBcpz+OnA)y9U^~tDnBXLF#I1 zIBfoWB2`M9ps`&ir8SvMidmB^1s3Ygvsf+`M&xOaA!LDIY zfw2}|Fbkeu4t^j6f{hzDt-bi-e>wISzxe5@y&ZtP$3N_tIddlW-FF`sTyVjAuf6t~ zs|N-KT9TIik^7^LSzy|Ret?#yZ6$<4I|9~i1m7` zw`|3KU{Qh_aI-nw`f9RWEqD!eq-tw$YqB_=XL#FECV|~p#H)nYts?_0i}%e~|6WDP z?z`G@p@pTuSu+t`Hk46zztvW*ReB!EO`)q4x}n}yciObCOTI|}hDTvrH)4A)m8`m5 zyLPc_*RBg^&z^mu*80TP^BR8Ps?T%K!3T5q9e4kswzhsj$uBGcv=|%}15YpGec$*# zw|wqXbToD1hdxqA2qcl!L5thd+L084VT4xXQaM8HAW4A?5keA%B|Mo)W~WM92DS~f z(s2-xnahUwxMV7hb^J36qIbfD~RCNf1}CI<}`#XerS;&l4+O;E#_!LUkr*Gy!bV5hon_rTuuY z=x|3keEDDB$)R(m5CkECQl{Gxw|(t1B;dL(Yj$>{{Lt)_%BU@(Vl_Mc@*@CYAFmTL zdiyJFhyn4@+06d4rywwF45=Ke{r~q*#9pGE@RCj6pz^g=L=tdZr1Wr*L_!gk3TP+I zSgA-|Cc_B}=5xrLHl%P+L55-}WYvz9Py$lGk^Aq_Ii5?j>jFH+Jm^lenY(S%RUteGA9k<_lAh0(9 z*n7P8$LBux89w*9FR*s)TISB3d)&SE-ur`rfdLa9T}N=@A*jO^K(S;v+&Crx3(R64 z9YZXCF;QBxc{9$!Ii!wUh*O=#2_uv;bKKGHe*9ptXK$r5B!%QsTNU3l}cD{^_Tm{^07>t6%r)`OMQ#128;1xb(Es z&)jt99k)#eG~0HG<##{HN4tK;&;IRSNy(h0bSZ>z62O?2hI{Tf9?!3T9;INPNfW8g zR-+>iN2Dl)Bc#*SK!_tf{RBnELn9{iGzz!l1Pg?i>gqP*#~RQm}4k zAJTPEiE&b_UKqVf6Tphz3lNb)+o-?$Q$%YW2Tq-euca|8QWml)Ut);&8YKb}B~{WU zml`~bCxp@^l=RR-;)xWl0$*x$SU?97FI7#H64bg5b0@apIUV@Qj4NCr2nZ0$#lgYR zf*^`G{-FIheBM6P*Hz=nYO+q95tRx{2qb9-(ym8Cb&hX-;sfkAWj;Ze!V#eX;#=Q_ zP#H{x(qD9!S;ukKp$kyTB&XVuX6+gVGc%g&IAovc z{OPgh(2i5KzQ$lW5^SO8!20dzmIi1rehs?13UR=6ShNyR&}bFH)DGwyMC|MnVHoIv zp`jZx+1!K0!q~P?UwJuSzWSQI3Bcate}0^Q{`q|Fb6+qQRLY~aY}xX_=;){dq^?TC z@rS{|`#>RYTErIGszqSF7Xq<<3%c95m5EduJ*@-h@P#-XZQ%PzKOzKD+Ci%jFPo<0 z>|<~+$+%1N`0CHArz)ERmw zRRm^pR^{zp3lf=JEnMMg$P*fli7s*PJ%ylNdw)~sh|-!7EUI-ZitfxnQ#TD z0MNzjPokobB^$PL)WZ3Meq=;|Y{ee?EGVJz6!<~Jh8??zT*u;M5_!K@iM%B0e<-T~ z5basJp{=u-NsTRpp*6#`YItTn?^ysz2r>RM+C#J8<+K$9(#-K~cSVEI>{l8{8BnS8 zkVt%~4ewro>t;+rfF=+=VdSImNDFg+8ZLrs_7dqJgo7f&lY(?j21$yXTZa}3ge1_R zY1s?GjENKY*qblpplJ)p`w|F^GNp)}9W@$hbd_vg6(~&r1V;Ja-sjqm^x~U5G?143 z2yHvG2b7a??#W zam5v%UhvBse*MlZn>K$e4*oRP!)b@X%&AcH?L5)UJFO@=I1ajh2%cVQmczWsFn=aY zYC{VLStwc^bCJwG1(Hmz8le@s7$oBJLI`AJDtv|I8duIFwV|7t_M>U*npkdVMTyNV z(xA@chHkv!DWl|OG;7L2AaSB@9Beg880D`>i*h9-F&yW?Vf32Kuw}dHhQv35>xijS zr#?An&YX|la?34Gc64;GW5Zsx1s`31Rb zhR0|58 z9(MNjv!kz{e6c_jDbk)pbvA44;|Wm;92_DvI|lmc9T*^&uCrPKWv5+X*Fq2#i5TVC zb!+(k?YAPO#EmEiKW&ANRHauynft9O!e6Krn|pe3UDx6vV!ca|py?$Ngr*clZ0+eo zXFU>u{|YDMS1SGu6vmv4@FUX++r!hQPM=81NfQQkxMdj~F$GZT@qGhfXW-HXPp}EF zj?HpKWeSue1F={W7#w5FgExnhP(L*i*QP?!3O*@mlW1kfJj$r}2_a(10FZ)6X{509 z)7Y>|YaBA@%g4kwOV4!2%ohNj?ZUe*RSEO`F8?Yc`?AWmbfDe7(!+huZZ~w1eZ}?)YsrN)R3;pQB|GA&1OjFveed9F1+gvhgY+Xg=NlkYK>FOqd#gtmc17}Ypy0&C4-NEF@T6%r>EQb_vxhX{hu&=i%0 zlp_+nozNhp!@%GWgQEq=lq>Rb8|l?D0AZLX8VCXlV0|ezVMbRcDVe1tN+=|bj?-tA zup3Yoq^p&QLrGUnC-<1P$%zu8>^E!=r43b7CJ9rlwXeq|EV1@}EX5m-L_}=LW0MPI zu{%=RgvB!FoVd#(BBLu|`Ttd^I;8LnE5h>jl@7665;awIXjRc_uNeP0I5gDOQB;bI zlK5ysE6^7uz8LZB-(q}Tk_;G$=$jsVipQ3&=KCLiH^(fT&CuAGd7nZcg+?h&rYgf_ zXB@$0%hy7>+*%RI+KLRARsxO#D>p$+7Co^AN+CLkAl3+2u@N0c&{PA{C&0Qb0DAkj zo&S2~nP-gNcH8Zr+}i=zd;HDE3CA7J{SQ9CkAC_?aoM{sbDwzfna#t)1LaQp)K0|t zCqX6+fif*WJHJ#ivYVbnI}$ebz^uv0852=qXl|U)ZqzoghK|{QN>Za7fp!Fu75va; z4_W)?y;na0rEwHEk;V%nQh_#REJ29pD`aH;u492bTG)**u5UDDfsP90FB#7`6@*fN z_CQ9kX$ve~3Hh<|ZkLP<%x3NTzP{zQTNmCk;nsf7^O!MX*616~KIiPOeD#`#&OGx> z_qN+^ONiWOoN*er-+t%ocD;v&jVV*97!7{l10TBj`s=@QC4dY9{O4BlpFjCE?M+p@ z|KzjChaRDb5-DFHpr*ct=8i_zF56%>|4^ex^DvT!tvx6N`IJMxDuc*Yp)+YS=k%=F zO3cqw3a70B-PS}FL6zl%ds5>#4vx?`!br0TA(BeW2={2pV{{X)g%p&E0ZTS);F$du zCL%kI9rd6Uz8+@hu5SMId*7t5Z-}Z)7RM%`A{PA-!Z`fJ;8pEdLP6p(Wbk_kgcOXF zO88-5>3&g#gt4t~F`_iRBYB1kMX0Vx0FERMhOan$H;<1@yIb#34_<>SX{l{639B;k zMCl?@q!Bj2Il_SJbev{eilPw0KnyGuQ`&?_Xb_HJam2FDS_?~yHwuV4mU0$?P=*L? zJ9W|k=*pb~Y!YtMD`7;Hl zcS}9gRYO$fN(l$MGBqJlE6#Np7bY9YCuaE;^TmLY_#ge%vsHm33 zD|i9Kg{;t~10aP_hpTAemsgsmwYiy?dTB0b%5*h^bfLZL+Y?>N%6iNJXLf)Ea&4w=~2L^hiv9|ibY;9CX|vDSpr z;{~VUMW^C%nEA|wQsBAx`8@yfwV%>EIE?4IR&CL-qEr#Nbc#z(Il{CVDqd4mf-QtL zLK{*-7^0tEgDw@3!a++ro;+YCG}IUkqD&g5cYu^gl=eLDO|$3D`RpT)KlZ;WK(@C7 z@PFv|)F&?ID_^~aH^1}Z%u^3P`ta5*TjnG#p(zheJOq8{zQ{;#nxRbuW-0 zL$qT+JIDx~b1c_c8xxFp;j4JosFLj>_<gK_`D?_ zkuR8Pcz6^>MqxM)g)%mvP{{M-lTT_P#Nw@6w({>E|KuO0PM)&$%FlfI=kIyXd!Ktf zum2B!_jE`QSnpi-zvS^86o z8S|#&rai(^faf_JckGEoQN)@xYuNhN$}9_Dw1ny(C2Xn1v74+xtyif2+0l(v6|id} zW^>r-urgy8&r7j>%XW4R_EFnj2U?(23FVCP;IoVP#_xW|)}CJK(>lrJ+@ z%9XjcEh1C33yT9NmzYY*L|;E1GHb08lNm!P&}`}*pkzg;5=q}gHsWP~fMq}AGVm{7 z82^CybIPQsNm*5GEll7?BD5kBAn@^05q{tks(`_Kfq{J9j4y0OuWXw>n@N*Pr^#kA zRCz9ulsLl0Rp3YurA=ZGM3w<0oMdcb@H4TRQbji;0awa#9f3%PcGj;5!Xl9u;ozci ziIh(%%qROo%FS8af-OL70$|uV0x2A%aIFYcWfR4`yTFf_-PJ~2eH{bcyTH}uWFck% z>4=JXj}>Cn<&WA{@ET=wF)|stcl7X^`xo({H=alknM5a&3aJJ8F`qXaGN0>jdyrj& zqu{#it}a0o*%^fkt_MRS@cahU!E?&{UD|^~=OP|lV(5XLO|WwpYDb??fzM$7z~_!W z;>a%?eBePmz4)2E3Bcat<&V=(J(aI~^%{Qjs~Z=-k+^pD8q-*$V_N@?L@2}mH#cQPUpxl9#HFIB^wv~+*ztA)KP8!Rg%C+a)mi>~ zyT6K^`D>Y2&1#|0jzcNyP|AA7IyTa{c^_{qAT{bEOQz)*Ii^i3lmQ}YZGdJ3ei_IE zCTsURNO|b$9JFFvh>-yX4v)glUC`YRqXn}+YE5@+VSiEyx#%7O&u%Z{NtS zkx{O>_#&jJLE+#Dm_Bm~u4fW}zz=xC8{WX%-u5;|^J6Ssx|9!o;Dc=4vW@f4KaVgB z*|cdBN-27Fb`zoK?dc^bl~5`o>g&gAt~Fy>?CX+VcQDwSKF?!uex>^PcAgo)Vit+q$ zGGKKIVk9|ABws77to*Ma(%JySZ1CCAJ7_j~uVUtJ-LqfS64)lL8pb7*iOIKYzt+_N!^|jQbQ^-((aBWf`6Xi!oxJcgP1aQ$!Z zLe$okixE|U$E>7&L^k=d)YK#)OBP;)ay_12x0N7L2Fnm9hgzc~G}Tsd_CfRc>0OT- zb0o%hvH;UH^RUi<4s7j(l#6rFY-0l)MNpkZA2AmmcpjnvF=q<8cM!rzcXxM-1NT2* z`_qe`>Db!=*n8~pc>ksE<-dOPL+-fiF3vjR%tdc`+glC+p_Q_wc}oMl`6TFQGU7H$ z8rxGTY&B!%p4y8O`M8~_jHrdO!B)fuBT*uEYQERw3jG*NSnhRN$=JBH9Cruw9_FNp zXbj^jsN}UP96Xb1L_5i2%?#O8NWH{bjZTNh`Yb(X&CuDhq4b=Fy9x88bdl>rF^y7a_y z@!ioeiiHwic-Q&VI4vMNX3UsEwmM63v;b(HdFB}|x#SY+>+7kluA#G|gAMD~vuxQC zzVn^yIp&yS>`VHjycA#l(lvbMs;kVVHaun!-AW^*rCP=)bR8K$CfaleV&h&W6Btlz~;SO9K{ zy4qTlitJ})WR(m45CbFKyyKdmv-sH+CeryK1j7*VQ3M_)$>>6+j#%Q_q~)^CXIp!FUkkCA9081n-zIr%7lbmt@Z#Q;1D z{nt8imP|U5N~5EQy6S31iv=QO+VnyzyDe!D9_Rof-vCV$1E?rrIk>K1{0tUb;>IEPn3U_V|21 z{i!SX@>jmJHv!mtz`Ni5ZvOkf|C|5%(GPjwdoJ1Mh8ur#<*j$zen@g>ONp324SnX3 zP?JR#e3X_}0A7P5z%}k%2_VWaX)Tb+0$D^%2-U*(Mj2-GR#Hf~dITC_lD5CNv!ISh6jwNfXwj5Tyt?lt&B|z*mUK26ZjVLN0bJ zvb*4s0ZqknpFx>=SYHdx^`?s3H2~Xtpl`^0Z;RPYTQ+m~r!HSVbM~y_3CAAyzKbuu zc;hdA@r#E6E;|20ZoKJtulf48?Y7%EpkPZRmDWF0^L z)^FI^H^|lRelxQ>yXb7JB{g*->@;RiPd)V%g+hUJI!#SYHIpYz<}vXoOO`C-*kh07 zoO90M@=ssEehc=SxJP!f}iUi&BD6L?&=p`kG8WPK}na`h%rW;h8#J zfsl$^I?LKETlwA}|IAJI-p|g#L2^}T6WonxMy zZNRH0$Qhuiu+qP#C!nQ3BH1}O!V8!n!frnn>RLCPgpT}^v^9c}fs%xte?dUF%g+UjYmtD~c#ij?b- zO*y#Ivw=J^NB}L9nYfAHPT~ToW4%rxiBL$Zpko{)HI8wmukIS?q^G`yq}Czq{%(etFMB+;GR^kWSlIkM}%{ z>nj$_m_o{PDaDfL5+bdPGo{izxqKr!P__e92{S0$S!?B(ajSOCe(N~~J0rBA2U_cD zCUwHD5%jt(Frfvu?SlS60Nv8k;`jFUre5#hAD4rBkAI@$eV1Ow;%A@Xx#ynaJKy=v z!E4s6xnkM!71#6+^dFvVJDCg|yC0lT$jmyWZErh{NdRO8XsL2;7SC*530@jf zDM+Uvn>ApSOcpX3`!5YC&$PLOV+2E#wn%PWhGSRy03|bi@$$oD@scS)#rI;*kKMhS z5T8rT`Sm2aDvhekqN~!jO&5Stc4l18B1GI49A`m0ZU|ZaZw%(D$w6C_>9$l?nct0- zl3qxEU!RxH=g%D)8hKYP=hc7tvsZ8a+BdJ;^`X2GJ3>iDfbe zHjj}>%U@B}iBO`fHBkscCU&&(<`WJzo)dNr$rxcTpr$I#SO0h)4?eTP%x$aFFU7S~ zVqSI^-H`%O2n?QNED!6qfKqs#$G-b6VB7X>ruwR`;<8IGrlF?F=+_7sEA^vA#LsTL zlNWw}uVHGa=+zg9QVFhw(E<#NK<@xzXD_0sA9@C0*AVoL*!NXHlmh%xiIIGfo%sSQ zxAw4T?N%OLzJUjpy~zDb*YeD|ZLHkBi{9Z8f*>U2y3|%>sL7el&{G0V%H<&&iAf|5e`Pp(+xp5EVx3J8c4)Y?>wOHd7iHG3Tq4 z0XvsUP$*H8%kt&R-pm2L_&b$2;E1k|i&^Zt+I!4Y~gu$Ki(`$rDdJ2Ecp%<&x|E zc=OF~9T^)=Yo+R=C@M$srg{_j=S%^@iVY}s>JmvCPge#qN18zIxsY-Yj)Qh88bCtq zVMtjSY;E%^QZP0K`I42_Ezd`jJfo5>^$$IC#VA4S1}L!a%a08Grf<|d)Dg-25v!Jm z5C%9Iw-sU(aZDdlmG}o``OU78cO4mljXMm}KqX{x;W{n~HF)M3XKuXZmRt4*IRC;6 zxaoJl|GUrj_c#5n@wUI*_T!)Z;^*hZKfCnO_wl12{Q#}CZ0%@C_x1GWm6;DoAq2WM zL(@?Q^OgU&n8%-A%TNF9+T`_qd*g4p@XZ$j@bh2(f=e&Cl+gFlyS1xDg?|G=z<#q} z`b0b(;s`-X2vP!Eq46xITAGjAZt4nYYD9x}k7I-eWodXK5%Z7GR@yj3<63uv@emU^ zZX^`9^5bh4+1gZD)`=3<2olZUSc$_I&f(WrT*g=-Ff=z23+zB`RhH-0Z{eiReV5jz zTEfY#^hXinKa{drRf3nPyw?CZP(bY*gq|LF@M+M{-rmmXXP&`NfAZf31K8TYGmGzG zMn@Y#sE7#YAKL*a&U@3xdH%ttlfP44lcS}vm2@_X<3N6_h!m2Mv0=u>#uytL+r!QA zayOtrIOg-x?G3aZcOY**?Rd8L4zO}ZAH9Pkge9L$Dvj%eI3k4<5}`v{>T8(X(#X8d zW)7M=ovCegwASa4!lmH*s7Mj%cuZgtGo>}2n<4AuNPE=?QVjb$DTG7Rcx`08>V(=@ znHU1({b35xfOY3{@EpOWoxMD=bR7>aS;N|GJroKBa@jP;>^qZ-PC9})6WWNB!gD2C zcJ}d>Ykt6n)!Pucw7Ep11-|;JcXR2fM=_Ys0}?3=1yyTJHl5Z|3anzzW4EiAN&A-PkiFz-dDf+pZf5_kG$ilr=C3NCqMmh#V!-~ zYJ_0=B*bwCpeMGPz@>%ptgt~$>#|&>wzEId9%M|rPe?bBw$!4s%B=+a?O_{9I{v~W z5)HMG3t%u0em)UkO|-Jr>zH09_=Jk;BLN!;NK5qOW@xQL?;M1|F(V^v0Zm#+L=@T~ z#>>g4YU`XAi_HQmH1VLi26;d|dfF)Z#qF@8M-WEFWe!ny%PqI;=en*w_f6;B@cZBX z?j7-Ke(_6JbJZ1B{!OR))1UtGwtMfs>o9=XvuCq<^=f|fqaVaUS~-qWP)dpV`UX8X zIEdC-Gh7mV_b%eSef@OoGaZ`i5W9xZz-@Qlo+JSK?lTY9aR`zaYd0~i#&N4fdlPzM zvyp$bR4`-9YQR*H+40Sc*Y1<1A~$nu$Lg-fdH_02()&QGD2zRrL*%G zL>kKgQ}%{eb}p^0KD?RhTV@CnUqMTKEuQD0#!AGq3N19kaZzEwfBgDZT;J!7haJd+ z`9b=34OC3TDiz^gVOfR-sHY2ska#g(h*aMi{R72m`80)%sv21fMPp{g_x*db`kB$=R2-lHp?;mAL?;sB@TSs)~ zqqNslGo!PWh0`W**qo_!HrCKolSQ}=INNb)Vo1Ke>g! zJoPLR!6)8#0hgY641>c%XyM^nKLLfp5t6hk`Tb)rB*||%AsHuDU_go}Xsd%4)|>C= zP6TC{0j`84YY>GzV*lC3*sQS@ao}w9;#Dxc%c!u1N^jk~b>g?b{jG(->zV-U?Ew5Q z9uGe7P~-V;KJSS3*7h?uZrpU)=;-M9%v}nTf##}VT00y(*R-Icz*gHbQ85EE?-wc8 zNLZ#lgyW%QMRlU}%UpInzTN&Zbwo@(!cw`k)-W&xMc;}Isq#2LypA1!3e9(+Z6cy} zb5oIa);Lmt-eH3iz=)ERGknH>R!IjS797zP=s{IhhttBO(o&cNV@t1L5fqB!-tE+B zQ#VI}|Jlu3w*3rX)|}a_S@r5hL!bQQC%N|8YpJctJvclvcI@GYA9mOiPdvHkyKMk9Ttcs0gI==6cKHtHy6djv@WT%` zpNZ%4)_q^k{;S>Ktt}2a-B;`3cR*#`~c!V|E zcCmCzH!p11!nVE<28Ifhg23twKoA(IV^?Te>T8+a)xy4$TbVntgGnv*wA9s*%@|N& z6a|ElvI(Fh>(x?~YAE{}?A8Go3;QV*$1I&QKspAX8Fy?XWicen{{ty;l))ch4TrMX z3_JStpjz|eX1RagA-%O~@nuYk_v#@Iro?m133edA>&lY`!LGO@#4hnC-^R~Sm zfd9W8mtFQ=zW@Cn0&v=Cr+xIoi!QiuWO($jT|LVyL#-f_HexkxjnLj?zHY8Z)K*#k zY`puKszql!BX^tf(5{oT-gG>tN@m}?Rrz|iIeTRyP$?6dGzvuWceSmAL|qO-g%171 z3to%YF|Uj(L8-?<91OUzVs5J<6LMNIKK5ScKdixI`NA)lrzRx z2BA$BYI3ko4kou5TF}PrW>$&NFK&2oQYw}DX*!cWWuN);AAIha#XtOOPVw4nuSIK( zmr7*;y?Vvkp8<1EIN=2DzyJPmk6o}}0e`vW)*b))p${B?+bxBIw`|<@P309EZu!;|zYRM|=|eMY2b0 zZT#XRD+m;6O(X;p+l={6Id&UVdf!N%AK&>X>2!vfbEojfHJc1TPgG91v zG&p`lsI{5L+oPqWg&EVPC-;;JLV9<0)-q_@MD0Ix_kr6E7pGb5(dL$AT+0W2L|*YKrP?n!{#K z;?UWXDfkQN85-rqodZ0(ej7_RY-Rn90SYRj%5!iX$zZ<7lPlM=Xypdu@>i2(a!V7_ zI~&<=N*A-Iwlkrr#%S;RK7Kex#;vs`MeKH66;Tvg10gCD9c7Y4mRUtH4#XspQQU?U zic$prXr7v?ERoP=uAhJxBO>A8T54l9o#u|`7vm3(LQQ73DoDSyW{QAZ&J_AYP~7A2S-{_^+*C%=q7xjaGDh24=Rw#70vEhEX{eiWva$ zXQeB1E>Wg9CfEp3PDDcEFh?eBxx^R}=2jF0};pLuTm zHZop{P(_5QX#F9KHiXbv-w%jXXx5)L>Yg#NG}e_A+UWlarIQXIk(HkoA~8q;V=t~E zWpjy`E-H=mw7o;aDB!n`E;pHL5+36M$$qaZW}J@QA8TvMyXwG@G5;AJHa`n7^Z&6T zJiQX`Sp=JR8VYu8mCf58nX5SN*kfBdIy!Fq z+-JY=!=hiRk5uScIW(xrp%0h?Cmw`2_5e6+t_e;xDPlD|B7tx`sLerJ1GLm3GMVvW z7vpAU>;Yjf#-r?af1LfDh@Ewkq(D~=zHBVj#^j`T2z>v4XP7kZ+$;X={yi1KMxvtK zFEn&Ez`P0QhN?spKv!DPYQ`r)F)Bb;js$g?l9q^$C{Q7IDa8C4h@%!lQyoIaeFT|a z{Oq&d!G|1Ny7YbTecLy_{`K@Lo$A9+JenEKo4_zSI?7#l-PQDRkNwM^{+xV0JUX=T zqKn?L-}GrScGw$Um(K_8xZ^GpgrkVkNCl8gT3X$Vc0)0Xv=LPjDlw5UhC7N-DGr$& z@Rc(M_~a>h-gS71d7Tj@1;uit1RE1lL%IJ- z$?vo2>}#7dYfW{vX#-guL7M7oNx4Q9G>n}z$YvSQN~aNWvw;`nPWl8aR~6|2jQ52~YiSiBa-MoiaBRYG}gnynTS&kMjW{S7EVV`XaPqWS1F~9a$hC`jkV~u1|urrc(!6vuU(}*uGL?W zEW``FGLS}*QOoP=Gjh7INDC$#AFmwv&vsO*0GWziq*E}n112_^E=rsPXm)Gu>X%Z! zlD72jzmsMCf-r)*8aQk|ESO=ww*CWQ5b7WO;Dn+|^nk6})jD#ivdPXltq=6!rZ2*#>^TsFm{%f_ENW zVD1FTyom)aK6E|rJ@!TBP3Z$I2{9d3Khttkm8X-ya^CQa_3t}aIuS+_kcsL!VP!JUt>VZ(OnCb#mHQ;y)C z7dKh03Gp&Zxq?DkiLa4@R3S9?L9u9(V|z@RXe$4sk3KT_*`tpwviVq9k+WxTkUh^D zUW=Sr(9=`SFr-p6)z;ujfs6&0>8cl^O(6)`NBKT z;>RDoh>x6mGzZM>B9-ze`VoOLj3oz$hN=uh`2sgR{sNwpCJ6Hck;M^Vb^aA7LW9uJ zGD$ikZJa@4_>GK&m5(+*a4Kw!BWq(WEu~c3Wgn03%89!=4T&!AU#aj=SL{1G^C&#^O(mc6I@{yBW7EZ|GM|A|Mjv#Ep*BK@@9mfbm zp{Y)LJiBoR|8@IAi27>2bpFZsVZ>vbcN%KfE5=~G+j2LrnJI?GdN*INUI~KQx>~wA zI{`T1gcFiiSiE=%gJb=;o|i12fqaGNkNih$(PiyjM@SlSSu=4T*GLqW0aAf=i90_c zkpQy1c|jN{MoUG;iY1!sYIyTe`*Y1Z&fvPs&gJ5h4yLU>$56gNAqY`IQd?EcZy#99 z`t9AguA~qS+gnrE_vH{NpGYW#R90eIlFg*3%Vnv}rK!$l$fjLf$0D8*`XLr5C=;5r z5+)fCjdARBV||@b0 z7FfR(`uoiHu4_6wQXsM!C?(TTR-{ zGFnRUt7keGC_)q}M#F&6i9O(@QUA05R7I7q?Ht}X*;zL`Ey~>jYnU5ik^$e*#yO72 z1pi1Hs zTTNt>Cv#62Ukt5n+kCg6nfNPMlhx*0}*5SfV*Ebx)16$s51mD%;U7*Oq>zC|KFr9>)wUJ8I!rWwgLYuLeCIdY2LVhhG`91 zMgl?3lf2NUIb*)$z{!v=Ii%c(NV$k8jq63M?yl#?Cp*|VlqMxLoz1n(p4iDl&n+{0 z?XiN~Zc2gW%O}v0xgAupfr>KV&$f9(A&9JIeMm$YIYiBM95a6^hqkq#B84Xe=~Rka z7q8~gXI3$BQY%-VdmP(Ghq!(Hi$)<+=vTkLwDrfZ_h?lF6%l(8WWG&m(iRXWAHPd$jUkJy*rKlD5|J^BK@gTp+w{6*e&?7=t!g0Mg; zm5!VBgrN^O)Ocy`d~OAwyWviHhes)t0+bMVLXb*(#JEfrIUrzyO=ehl^Gqa zWL=4HtX4%78UU%Pq;%>;LDG|&=hkhbdnj+g1Fy6fRqnk8w5lBenUtaaYOQ9?ocYBl ziu#rT5wgpuC5ZQInJ{P-s`fz^8xfPdnn zp{ap^z5$Lq=GgZydgiIO-1?_KFSP7@i6fz<0j5oW$?eeIfNrTnL=n1V?0CthP1Tu7 zm(|vk+GE1`()jpywA=M=?dl3iToG5oHUZK30*n^WVUS1-#FQKJ(1@~{wAw?LLW~E| z>D^pfUQ(U^gIgQAg6>!O-l*_Pu>54A2%2k6HN2r4MvC@S_4tl&oJ@>M(loR-!O?Yy zwcF8Kc9@N!P&AUPN&i)vO{1m?sys1u%Jj$P&6*wD@S9(A?Qx&n50&N*lCm%rTlSA7gCm#^S$?|3`cf9Ja&1wOiB`HH7DZ`pdV zHJE~0n~2tA4FwRZEE#E-+5tg?7|3(#e1}pba2!eK!1T6=1(P!PD0JGv^$of`la@TW zDaBWA^YA>#xtig8ku&Bl;NlaH=7|;S2!g=i{B1y&mIfy6ydOK07L^sKHUdOS7@(i& z0+=flMVe4J=D)crnr5`~iNg;e?YfMHro!$o7WuE+A0`X~Ef658#>Pe(8yWyjDwX2I6Hnmw+iwTpw%hJzN6%Kgnlzdc zZYq`hiIK74*Zel9%H}BfMWQGmD*5#H58(>q)tIn*_K<)jRdf71Y27w4V8KY4B*4)c z?HB_d2Z@pzO~l}cCgZtWcGeM`dC(kgdh~hjdVVb%x_2?VvjsoQllAJXte8US5YH9t z8XD$PKm7~610|YkJ-Qm|sj2eFWvi%4d$_K|S0QV=ck$HvEeIi~&8C^q(!lJlR_0G? zXIe)q6Pjx9q=z3y_)%cl9X5$~;o+rgQGxk7;r;J138*NZgw@DUj$!_oq*UH@*KNmd z-PV2V8E2ebyKLDDS8v|D+5Bq7M!{GC=1xoYM8jH+(2aG_Py@Y#A_xL%Yid6-Z_Yk< zKJf5^;obz`pX@mQ{PVf#rkfb(8=$ed>5dncyl`5<_+8(^-HULA$AMg>TeI4i4;JEce+(J)6#N)@VRW@ zcIX#x0f@rzyUBAh8Ix4L*n`kYu3fuU|I5Ez{N+L&td~H{6 z@9&bNq_NI)E2`2q>bgcSNo(`_$?a6hEp%0+X&30)7VAW#nT z+Fj;$MJ(G9k#YpS(#)AWiT!6xX2FapJh5yot}82?Ar%6LP^)s_kC&dkhRV_eBdhus zS}S0s9DEU>wL&RH{mf3jf7S`?-`YSv2oONZk=(v`6;Cc*!|{jA0w7^whz4h;;x=C?sdM;qNeI~g4f2m+rwpIpk>NA6ErDnc#GG}vTH zrpE>U_?%29%t;c0`1g@5B!no-I2%DHNf3n$k0=`IYk2=zM>BO&8*8@rGOw$RFbauu zfRx7eTWiRAX>MA+jQ*g=SKoam6Wi)&sjHiTcH$)#B@lr ztA8*6xc&B9zI6VD7cNPsGhbc1cFi0>v#DE93eXE@8;p>S%>EY%m^l&IJBR|kdGn@| z)~#O`?!Rz9@!Si~|3e0=docii=W)|bH}SsrzVBW2jSWNneSN153=SrtL{6E2IAlJ0 z&NSF>225%;W+qxfZH<}lSLY0}8ogVlE%p#icl&xAKmTv7f=!~4u>0bq!j(qbzkdMw zhY_|SE6=ud#fni@ct=$z{)w`rur?fS%X=~3$AMRAJJ*b#AB)7u*8$rg_Dp?zSJ@w@;efepC zlukP-ovx1`yR&;o691YfHdE8y3Jui>G4nUS`Q32OoAq>y-`2yOw-8zv=35h6r5A<_{jCCRw(p2Gq%o}dr{ zj?2`x7OGQCyz!_5DJe~0XZV5E1X>X&Nno)6fdv8j8Uh3XP!JI%0fB&g6fokK81n-P zVUZ|bLX8zU>bQfr<6Y-*l^HF1qM^hArAZ2m*fn`#&)< zn#a-5N2_Tdr2PS|X$vSM`to$2eR- z^0=4$hwwdn}h21yu&?9Enh)@-+;xvSV^i^+K)tqc$(Er(N!rchNdYM%(Z{p+uz1b zzx&-SpZV-(kEpM&e;~Q_clN_GD$N8*g_STC2%NIXhEV^UIX4Kzl<% zV#uVkho64>nOEI<>tFun(>w0C6K2)c*8VnWXisQG)>J`*6*du3Mb}6tD#&9_mMw)e zS(FiRkpf3YNLfHTAyOJZm#L04e&jKsL9nnZq7*8$=P;?Y86S@`4n2rz6WbXs6)7Mn z0b%4(BEq*6K3_|GB?z>{*WfFS3RoTf5mlRy1o>M+V{cs`rv(2yt4I zD@6z*;|*W(p4@nN+`ml127&0NWu+D4L4=6x zT_yxtM`#@qsnD`UG*J|ybc9lxFx2?PBGuJt&N^@ww|)AZ{NeJ8nbpzGr9b!;2mZ&m z`N+@j;Fk}-0FH~UkPz4Uuh<+C<1t~zxzg+l>1?J>Yn}bo4Zq^@%P;30Z-3js;Naj1 zu5=!-_zErhhG5ZhWU*w~9vT@*qZDXg{`n;@xcA@vQ0?9X;D7nZWOFQ9w1^W=Jn_t1 zZoB1<;o+e_O>qk2QhOZ%+1;AMx>z|3}?ldrtG` z%@zPVdv^SKczD=c_FNTAX-Cy&ja?~~eh$iFLmcabrdU1ZAss;^1d#%zvV?vuQIsRn zo)O?Na(oCo)1A>;0u+%JwADAFLrr6@p7)$_B&8DgktR@36vCkRBk&`EuQ1;$MW9S4 zU`%R44PjVhzZny_#hO5`iFaI zpV-dZjys5A6cFl=`!{Se*1Ot(I>%Z5?%_5PRyk8iO-e;%OUn8WXu?9lSW(+gFxm~* zvpbY07#!xR@BWmfYqye3rwt9*9)JAfA18hP``>>}*765G_yOMk{ts^1xpU{U$#&2` zL~s8fQkt2#R7Pr7+A2RDQO0b5vi_E+NC6G!GP=5usN{|0WAS~_IoOexi&B9CH``$MI zTyxDeX5KCx5vu5fbUOVr&vQ(JZD?!~5!BT~ZFM3U@Tto`{u~%f@VyDZ z|H5&>o6e_L7$cjjIqjKe7XNw43rh~MkxWu;klf6lf}S-2J-rKRtI^r4;qcd1qdnK4 z<+Tys5EVc)p~ZMk`Rh>93Ly=ZZ*TpPw=Ku}6H zGS8J%r&8q7Y0{o+pAXtEnVINl0g3@SjEp)~rJ2z`X$wHdiA(GsKe-hqv>2^`I1zGW zxoV3Al#-1?*h*g+F%Z{9%$W)Y&o(zYh$xEm$msCdi=KS)YYh!`zX163l~({z^vjjv z!0;GhP~szRdo#5&rzVryp`oGEzW$$It2y!HlV0_V-gNHyEL*->A9%pNzg@Lr<$(yH zH4^4d1}_C&jrKiPoQH7C*h56gSoHSZG(m((`c#S_Oyh^OL_v-y$f84Oq+EnVD@C9} za-K;H8)|Audufz#C#~#SE_6A%DYX^sTVn??* z&t!yCfe+aumd08`D?v>mz>SOxr4)i_c+@D^S%7Im6>M*W*^|-x&9oBHWiYDh-o>|W zdDtXcnX)kCjW^!-i`Qy3fA_oBqqWX9)Hh5>7O3aaT`ZuK(FG7Hvg0W+UQBcx8$j5- z#Ii)RvK)Mq+zX*zl0`d&N&7$xO{6vHlt)v>WyzKvQkD`gg(L`zXdSVwZ-iaLqs(k; zAylF5G@6832#u1;j?r|5Gh|$FSm~4mk7Terr66E1U!=3Sj!&I;9JTe;;EM9NLbw%j zKH}x0f1(y@yMdl-ib2qU?|Z9Pt!k}&R;VJK$z&)Ni~rKp)byX}blPMZV|jRXEwX12 z;YkBP?JNs@KKsIR0DSq&Uw+MZx4j_1S2^a*o5%0}a1*DVa%%5gci+`iNJ66!bT%0@ zXLS|K=z#iaqo7t>gHER{ntyz2UuoA?!dS%p9x}>Gpx^G_S3=Oo(E=Gy<=dSiSV6y2I$~BwEAtxbnATX&#Oe&WREEY}hAJVcaviev zad{mvR4k#D%W%P`r&wUy=m_fuMp&_HfGxu#j1@u%eek4FIIO(Mv=~nh+#M?MO8J8L zd*>-H!~3<@Kx%=K8YZ`x&v3M0=w5z^Xvl%tc-Z5eFJLc^>?}U5rxcz~Ymm-g$hJ_L2{Sv1yJb-iF`6h1o#Frs5 z^1z23arl<|?z#6BPx{|J_7T2$-M4t>+u!x|8~^az3nXZ*wa{Hn$i_NUdxHU}hI$+= z4DEvS&^VwXYBN4Fsscs>NV~=vEp$^j!his^0u?E=f-v$4D3Q?t+Xf_rP?Z*>gv8OB zK)cjdHS+$mj^;nU_Zz}gnliXl?IyHilf_E>sg9`2d8QgiBb2d@MG1s8hbj1DWKu2< ztz6G-4?jm|XFHdka1fDF)Ojg>vtoluYO^U*(J2ot!iu%G+x><}46)KBP5qccNr8w2 zK~#dV!nn7stE-F~Ttl6aAl3>o8Fbo%)tixkQkpxSUJO3QRBC7hK(Ab}y8X4>(`L<@ zby^SwrzFDv6I$tNYUZ{L8#!cR!NG*U}51*zx)=<%BkQmFFpDk#3@>j<#)POS)q zgA@v_B{DM7zDg@5cQ*6vnr)^AFai%0!%>vhEZe#r-}jk4p@m{#fT2Qbgtd`26FQwp zmMe@Ebz)JTD3byzLgEk!s|@Ie1WMz09wHx@(WiFIf04VbIbOQ?Bvfa|fB-$u0KH3y zVzJ1U^_yQJ;!rFae8vtIJof`o!J@;B`KhFJE3eW5$f3yY9X#i4NLx1v9!}>O`okHhSr~oIz;kvS!i6 zvYJ#vnDzL;v^xqtrl9HZzSD_tm)7G0f1*`U25F6xx{c{bF;LGBV0ai&@(n^=+Q6>` z#3*k|aj%w=>THJ2>KunoXk~hR9iMsl84jM*!OiEMisQOSk;0WJ+Z(XvEtpY2q*a0m z(8@Y`>CkKhQAC8IFJEHit^r=??&skxn_1I0%xKk{Uoy$Z!7RUUU} zW$+VXpBd=JdRX-$j1~mIj;)*YKwr=OQ>IKgroXQ*SuXz27{jB3(5(3KB^Pu1AMT+4 z@#h4>=b=X)UbUyw`1mJ2#(#eGIzIf756%DCPk(++sZbCS&{bKO+J&mE zhDj|J`=%`)S|($giRl3jtlG-F>VWyRk{YjyF`Xd@Qz%Cx0yDYQTA=Y!+Ociekd!Xc zR}6S&b1k4qJ1KA-3l3ETD$AJ%?aOs-_p@VQ(Di+x{^{Fz~q(&!pP{v zOUv-q(n!PRqhYl68OVox_0JD5mM?I{TTh{*p^mXak!>Sm+`MKBIMP;*E?Nd<*(Dv> zfJ1qVWmSZPuc;m_*@v33o(dI=j+O&R+Ji&pnZ&B654HM5gmlsS&O}b_LT%iMD)~?- zA$^JRKxEvc&g|*ye$Do?B}~S_ zLalLBWaO8%Kq`e4j%8(3rUEux3dgkEwfR~RSeHoqk;w?94Q?nBATT4aDXsPV*PV;( z=tU5y623o-bUfB>?tyfM_L^#<$RtjVkSL{)(vB)9dlkfz3`$2xZNEp@ZiZ6^GiyO8 z6m@BjgQrd4?nO%=lQMSVmL;WMwuq=m3Z(#yE{9IJrg{g8r4k#rZ+_Y9u>XDs^Yk-M zTzK+{r`-406OW#d&*x1BxOlZ72w`Fu)YT%2yYT&hb(=PJ-1ES_?#aiW6z)v`{=vuo z2Ohw4i=XAFqmR1y@yDL{+PZb?%Bf#NEn?PWbbAxD*TIBVsHrwBJI6618nN5??q)nM zD}ZAIkWkje))--+A`_5P#wAT#baE_38&jpmIoFBud{PTQdM5DaM-lmgbxSkU6Cou! z2rWp>p*dH@g4Ra%ZExj(wkBpZ)H0#2j>b%i&p-M!A`H3un1j&LL&zqSa80bJFv<~V zw4?D5yJ2MvOIv9TGDJo`O;tX}O|Iei$rHHrfZ25C3oP#*;K6M>cy`MUmi6^pUT$Ph zN>)^2jwz;PG+q)pNqqheu-_{{CdSJL+n?1{Lv1x;U>IgkLDbg5>P_f%TWw3wfouk< zGl;4xbWOGWI)!#!o9tmMp4*#^(bKxEh;2RSC=$g&L2cZ)@nI@h$rOrg85v@ME;6yU zm9KsAQ@rQwcNp*{s0|x8tOP`3V?F)-gUM;U^{p52pI^O>uYLV%v%mPctN(j=WOxRk zm5_p&6HLW1yQ`x6Qz?dGKF{gtLC$VmM@vdE9JMi|txu59CInbvC@hXD(j`>IfXk^tKj4 zG@f=qXcP)p3lxe%F;C7-@wNLO=kcdku;0R|y#3hy87hv^=%xAD^0nj#2O*a+bWT|w z$(calll}r$Oc=xCceG=dQB<}PhjIE~XiaBr1G`2> z*fpA`v#y1LKSqc^_$8LTxRq(G4b)a=h$@@{r5LYMP{}}$*2GK+EBd9B(I$u~$x0GQ zlZ-pAq^+(hF+S6k66@n+!}qjVl*NFO{XO;9h1BPsf10C@JX+jy-`yvkfByMjdf@&C zFYD{y)d*;otQQ0kbTy-Uc7cWo6DGd>d*8YK7r;Gx6M%o<(bUo`o?HB^-tU0@*DQW& z@pPr4csMP@v@Z0dc64J6%S;DP2psvq(}br5**0jKbKc$xwymwo3tFg!W6w>MW;BoXn{+rf^Va z6CJrUS=U1dfhTiFC&gpiH}cIVU*L*k4q{$IGg{UnrDsv^yac#tOg$)9P)WPcHR`!K zg^)Qk5lV!pFu>C#TB;n5pOWF&sU3`ze6|i3_}b%(d0@+S!=w<_;tK~vI9@v-Za=;* zKuY`fTn90w1wA}s@Bp1nP@hG-@FKczz>H3UF&G|0i#}7$dJfuk3=Oot25PGe4j}6x zs;kipXQR8C5lh#hM+>rS`d|;g#M+%ZVc&?6V1$d0JC;AZ=Plg+ou329EnBwg=H`a$ zcI_JY*xTR!4sN*NmmGTdVf^~nH}c^Rf8g_1UUB8SO2yKoc$?GnrohB@X$B(SPRhjYc&qZEG=u@It@TW5Ys3#D95*xp zz>$O+O2H_#8Np2}Ht^lQJPg?spE>U&B5i27!-3E5m#;JP+qgTULM!l8PC3l&tP!q6 z4~!u)DRdAkehH*yfGD6eHfppq;%vO56){qP^;^+VU?F1~#(bm}MAg=JJ`59$4xLKd zL_<+17GIMkd+wXw$jyKF)3B6r2`_}x(aQ1r&!)8|L%|PetV;2w+0%J+%MPx6`dJQa zZ{wU96RCAF4EaTC;G~UmqcW{@6+>C=nJHng0m=f1rNE%;rSaED&_34Np(^9yIu09q z`rlBUo*l1u{?a8E5zZ9EbRrQq8cI0od0kO=A&>$m} z5@b>ibtxAq9THzPr7dP9`YS4i3L0pftX8G>Fw5QZ@yKJ3=yT6Kmz!?7>5BJU@}8T2 z^Q+(dF<;0}1Yp%B=xPPW(^YAwFlExDlhG{MI|BFz9amm?C0Ad4HGRFibW=<7(DTne zR~vU~5kiQ4XP~>9p`i|DO@PKaL?(-t+ThssATRs3&Y)w9OFb4KO97ub@?hRLYa#uG zBJ28g@J#o1mhbFkRo@`X`}-N~E0#4p9f|NLql;$?h zpEHfO&Y4bEU5-dc1d&3@G@e^cCY3`9kI|rqA1r#FnT>V)%f7QH$P{&MmWa@}Zb^5~ z?J>J+mf;JACX_g6Dx;Y#w1?w(q`fSmZom%)7%L9Zk*nr`4cl10s}G71oh^+F7seRP zmk_Rpj$6Z)KA3bo{u+G1Yl97hP@!w95Y4r)v)?3d*=qD5^Wgbauwz#lU!e^TA%AHHd~t_h4_kI7o0HI>i#}_*`;79vmIPtQ=RbNGPu%?o z1FJWfVUm`YeCR_Tx$isQ`POZ94fQN~;z^D^_L%Sg;0Hf`U&&CYg6}mc+liE>@ zwHDN9MVpi!-<{GL;Y4gH*6@uT$8g}tCeCYK$Fxj8j*}wNS)}lYLX8j}j#DBXhCI3v ze(`vgo-q$xZAJA}Pn|$} zeU9M*RC$)3svxB`T9$ZW*8u-|)15Fh!uiJ@$^lb52!axxo8ifA-E8dX1J|>;V`RE& zN+hEXvz5!T=+Bz%=%yMI*h9l`h*9!^(5SwV@~8qc*3(17Fj62^i7-i(u|PI@AZ4(e z#%fPUVG`fh=(zb0f8xxu<V!mfOt=ZfT&pqm45UnoSf5qnEEjq;@!IS{FxlweiCj zR&mL#k8twzPR^V*iN>ldN@p&Qpj)|1Yw&AVFQZm8O zI8qY?KD|Q)lnMw#pInv8^BcDjT*KNn~83&L$o)dXG}04Ki4tpXwmLk z;T6IEZvvuOL7X6hkr8G#H?V)lWQ0>iYjuu}x@L}_u>c4eEsZi%$g^d5fM#SQ#r!)9(c=Xj*_$fcXi3{VNQG&9~kwa3O&hss>yxSK1aH65|0ItGC( z$ap!rM|bkEd!ONti&v7ZuHw?e7VwEf=hKrfaP5;zd1(D+hWyYn>||Mw9r5~TDU8q9 z&{I31Z_EgJh``K?7tS`1*|94LB5{)^l}ZV}l#bYm~S-;gY9V)K`Q3_;alm(**?FmDV)5iWq2~A5)GiMyO zfM=GkCrVkN1EpSylT9j7!5fb{kU}Xm(o@E_WfMgU%O`#S&`7fp$eK7Nmvg1o)vskL<4BA0h)? zrnq&spKFOY-H$W5u8#R_bqsupgR4kmV)vfR6U|Q$GEv%fA5(yxR4d(At6H2oXiPuBxhP1JHHE;YVD2?|t|F_J|{n z5RX6pxCUO+;J-Hk0GeA{#EMlb^@92Pe(%8tAAEmYA!!gyXoDFO(GArwV*+|oJ0hJi z!A3=PJ}8nbAIDaDVPrJaUrtJDcTIe2St*o84-6u7$T3r=GO4~56&b)xoM;FHj;x`n zx|+7?Ru1l(4g$tXd4~K^1`7o?4h{0NB`f*k($%0#bk^5#&a5e%GixgQwl~!karlHzQmH09;i8n8>BVxtdlLTG4aHc# zWn!3uH0^t#H4z#qBn|-&Zd}2q?s=3KHg03~gciPV(s8_D=6nW=1Ef8V>rXv`McZfb zUr#OLzKxp==*V-*HiYB40K1K1{$}H(iZ}go_kW~}b6!USY~G1>9E6UHUjKrb6-j`_ zTxGLjdRN!`makpcGDcP@(`zv1X*6HN*AbgrrgqXiYd&LiLV8VGNoq z0?hNQ??D!dMPx36h>S8^BuzIX5(@Bm(-DX8&EMY1Kt69RR;j4ADwrWb#LP(@95sI$ z#ZpKnoduzBv>=ip`Qivad0`d#?q2k8fs;=@fCHvZ~8ys#aTLTurG|g2B=8>tt{gT~lKL6Ct`-goF1%c@ARvdi3^Q z^EfLFjyA$vvAlF`T`fa{L;s_F?#3H$9K+$J;-vCRxd->JMe)7JLBPFgB)TTU|vl(hLX)-B?YU!ec zv}%|zueE`WToq9)CMC+9K`D(bZZQn;!ve0*3>AyqyKD_DO?6CfZA8VLgK?s$;w4|Z zj>L5wLKRX9Beo2Vux!^LFYMUKGu?f3kCmtqFtwqEPaSa(XU?9&^?!Vn8&~Z>duhAO zD)C!;s3 z@&9ZB@Wn5FiL0)W_VH)v z8!kasBO+;~g`EnY1Vcx1lq8a`MD2N{=8SxKgrG3Y3Ef_g=pHcL7EEFwq>J8fmPrn` z^_ciw@Yy*q_$J`g4}bW>wZHhqFD4HT4u~mJX4X%gH0c*hmM@vy-QAn)AtxSp+zo&F z%b&lM&1Nqz6beu%GPJFSjs1Oe)pnw_z}FFz8k)G`s*m&TXWs=Qc~L4AHSp0jYt|%4 zKHb^~bEg>a;`B}fJ_{|#u2|&Xjy;Mu&7RFz5SfssA+JVoltap`LP{4YjFx@gA3_NM zks|9k+`n-P*F3xkT*m<3>T)mjs)*OSUxl97hE_gWq!3yra?r(4F}rgjC+xouf4KJv zM73*^ZP!+SQ7pcWqe3n`^)MQ%t5Mn^IaojyeZ)u}J$;gC?+e@ZCZbd-#`L{%g}9>+ z-PLYb0K=n*{vq@u&za<6tWf@Z>T46hEIp8z0O>;yJ*@ujyYBiQ?|BbCbpO|rZ?YNY zESSb2GbU3k23G$drY&1clY#bAiZrD#z;h%Av^8;1TQeoCDTX0^V+Hz)A>D;MJ4Qy? zGCV?m!6yV<6iQ2c6;V(TZ1)1Qx7t8_$Yd5#aSuC8&{>;MHKSru@Ue? zF4%8Bj+ii&ksv@j!sG{)+3s%Dw$vJpM?MJAdWbJS{xrF?%WvOu9@A=S7>zu#UJlRA zkrIxj=#{y+-?&G7kKLi@yf9xTA^`z5qoEl1zZ~eg`ld8t^GK}PR;raudz3(Ir zoY2bq?|hW!x9>2>X(fQbBGRoIpLB_IWHxdw|F$l`%e4WM9Kr_Bw1;k~h3$O?pMWqU zBBf#f8Rk-N>p|&={=U9bCQO*{$B%yWqvrujKkg>~!JPKjUs()V0)`kJ+C zZ(qH3%_WB%cIf2o+qSWF%T`dD;hq7OY~0FWljb3%gH(b-P~cxqJc-|a=wG<&E7!-4 zIp)o~9!%?kDeX{I1^aYCuF3@e_#~Ak0~|GZUkZNFj%yV8QXdG1>U4v>mWm(@38Ffx zGEL@rp3C;J(17P+yo0EOd^29BLYUThB#d9SZKC6#kdcEV&D)MYj6dA{5L%}J$A}HN zAw;%K?iZQ8-z?sF;^9O(Am`QMI5~t0$$2izc5dPKtJlyr8qnQ6$cHXGiP;lc85k=d z9K#a$%jy>m*vpkKb)&3gl}OX6qTr*7MHn7M=S#*c%SoAg!HV02LnBZO#&^I5MiG7q zrgXxxbtc))7soHMYzjJ?P>z895$GSb{cS1kzU!{`(@#I0JMOsS@7nK9IO%xqzxM%N zcy5W8{Jpwr&OUs9Qfa~1s4h!b+p67>4rteOWo$6pKDiya!3iEzhlnP%~$G7dg)%)FF;=$rl6G z74qauB}PgC`AAbz5mk;uYjuXKbZN-C997-U1+%8nP?a&FLlFcjG8AP2zEZf3M1%o@ zV}%O3X;R|9%AQcUw#&3_;W!C_BnX0p_y6}C|LEWk{|_nw&YCrg2Oqqj(@#6&%sF#r zj|3(E>;zL$yg zfT|oKRIgBER`$RoluGEKAqWj8_SzFqq@;!6u|~YSPQF#zjnVd5x5PagHu3uxR`KtL zAH?M9T5y|atm>l5tHTj8ktD4Q%!#>&b;B$9LtOpnBHC+meEhHl1gZ*0X3@LRc%*#g z+2nZnP?0Ef2}>bzgh1&MpL_UrK6=XoG^R3q>9k|{=BaPM5p{%Nh(Mx*4G~%)rAI?e z2MxI{RFGm)T{VAs^C`UVpoLVa3f+UG?hTD1n@VAlyw?aIFmC*3*#|8RmI|7Pr5h8J zNTBCWh33ZibI}6>1Lq!m@WEey$GH~?<9l8{-u9Na@}r;p_>PAjen_lbxw7<$PkwSs zCY`wfdj|gYUY=RCk-R@_#wcharSNr$?|$gL)Sh~{X|<p%9}14%cOIRSCP6;5dNTIETBGxMI$P`cuMb>Ab1H=- z%cwt!z{hnZeT6YTde>c?HL;V&o?b=AUN-c0nf`V0gi1!WALTLbLjMmxUOd~b}9l#lXV?3sWgpMDdxA-bIRmSPMa~A{aRX>)zZkmt*uON zs3YUK_Wk%20-rE6e@keEYr7DIC}Mlxpy^!2>a58w@ptSM6$R1Q*ciRNz5mql@c*d< zps~J*HEY%|fByVWEM30z)>W%kS0|0ht`@|;(-Ex=uy7i3zgcDjjZCmoo@12Xo>_su z<1xhY4aV#vl|s5{v&T6OqNxso$OO}uMUTqzEYmN-zySCW)#(&JIO9}Wa;*fuZ(3x| zE1LwFOj;mCK<{WjpS<@`W;Zu-P**crX34l!XdR;X|JZx$ILnHw`}Pim-0g^ZJ z{5X92L(fe2wNq7l@3q%nD>SqCgG@d2APS;XE*hU_H?8IVwVS!>*aN7Gr|`TwyEjVj zX>gVQrcm_K&kA#_c)|mUT=wXLT>i-OOl)rAS7#o}m-j!6NXPMoPf3^4TG8(tF9ejdG97B5>z zPre_aLtDK`@_vCy!-jL&g&&1EQ(&)Y#(ZewhjVZ$;!@NGGP|a zIynjjLMDwYs@B$aRae9%Q3g6i5En6n0OWH}$U(6Hg@OrwCPF}1@?Mwh%oT~Eg3Uil zEN#R3kD`zvH7y*y=VU1643{8VgiH3_^U^g$zHckPH%iu(Wv*-J&w=lo3ccVX z3I(IjVfRrn^ie(iyDb;>wsxa5ICm;y#L&t=HPylFNibog+3U;KL7%Dqy;zKM&pqpe zf5zGOzRePfFKCyyeGOi~{KNmnwaCe4iIdgcrt%BZ?DG0&wKg!oG1hY@}d;)fxjeH~Iu zl#pg(%eFjAWW-#dNN+A@+d$SSm1-Mc{pPBH()r{#b}So|QiNgn9~~3_pJ@SjUYzdU zE`~M_`^K8JYraz~6f3>a>EmJ4P;^5L>^%)y>QRxM?C{LIt6sDgmac(9jtOI@vazon zZHZgTLa5ZI(e*VI=zq6?Ta>z4kS~B0YjLFJ`|mo014m6E7Z$9%WMr)|cb})3kr*>` z>jM^QesHnc$quck_$+OE_lIC=PEO zjTUw002J11%ZhuH5(0tqrh5;Kqo)sI(hg%t6ZlKiVDZly z6|fb)QYLswff(6@?(8)rz>-F|R){Dv{t)|2g(sJS3dGKi4zB&_PyPnf)TV31KsNKb zr_E7E996sEl?C+n_Gk)4v1-{`7H`?a$cB*!;(*50lKwEy`9~hXO>363VB;o>1jJ4I zqvREPFIdl3<#(el=bY%zF z)Zar}UoYFT{p`qO>B#2DhmiFH{3w88!1jTD0;Nz=nfBVCsY6AeU5?*>AO868iyS(8 z3Z55ZSbZbY#|-EF#~nd)O&Tp?Br#)VDW?Wk=b67P$FwGwxixis`u^uQVD40onl+wW z;G?A=7N`yz7C**rq2^7yWwFBnY-Ksr)S zojOgdTe}|LFTg+^R%}4*IR(AfROo6k>$1Mq5XV9vmaHprMa=Gs)P+}GdDXIuF1m5p(hVkeC~%E;Wp}lRzm&5ar4GeH6nyN(c7-JH|r< zZAK+ao(W|hoLTRot)4YLb;%Szec(CnUa*AOts{xM9$&rj0kXwBA3o+libaD$ZQR*I zluXjvP*2e>a{nu`mNqr$!}+x@a`ozk4n z<`zrG8dC|2Cc13u>?bM-j;bol^S4_h$V!VblgVItW$z>a|E}x&^UvqT8*k(%*Ig$+ z_nFU}-O=6o9ibx)QV7?9nd8tShe2Zv9554+PM{-QaRcklpkG*w*wM+PiBtLE$3DYR zbN6QWc_)(dLx@>gUmoYk6kdPHsQ@7`#|53Ae@&|8z-!r{WM+4Iu3f4JiG&LjD8KamlHE&inK2Jh*Hr z$Ih9=Z%#Uymh=dMD8jL3FRpNH|JBS&I|!6khIqNS=-EY-a`cJUl|(=7l|c2G2|%*f1#*VPz* z0HG`+-F{9gf|?pQU@APf0*LU7eyTQI(>;*QGyz=r@lWu}U;k>*QyqQOG0c1Hk?#Y? zfH;CMBHFl}ho4)V-b%IDJLLqQ9G$!Kw_}%C7@q6#2-!GyRq+@Xenz$nwSyP81 zVpuvw(sOZzWLQlS0p!Ahv2V4gh9eC@FVYIBONpa_OC4oK?o^~1l1y^?lxb)wO-iVh z9p8({g?T!%J#^Lk$-$o>K<2oSwl6KsMAGKGrglh%Zp9OTTzMJyH*`9l6Z6DExN+NzZ+ z_tc=-+AeeyBBoD-mL{_&f&kjOVC6PL0=6$?(!`0I&pGStr+#qNmH%+?2PgzZSzfEn z4NRLb5|l~c8`C54WD>27Wpcu;BN1;Tj6w>2H-#XFA7;@yw1MBTq~Ve%q9yqX$IRht zs884Nn@6AL4^PeKuCHFe*p_-c;n3Pp%dZ|?z-b5VMPuB-#bM3XE`;YXZfFCmcl7Y; znynxr-h0Sg9PL`-r%@mbtqy!z9t&MQa==V3IdpFvj83{x2CkCAHNmgykf92O zElE*_6u5QyGInDnaQCb;@P??~sErGBU1a~)!TW%>}?2k)7<2f$fg?>JL-|alSVl@{Wun$+f>nIwM zL-C`?SjHl8ZO|7&8uz&pYA+-*(kMp}X>gQ832mJAgu{^ZDEbQ>jIDRM=iC$c@O@A4 z(v~)>n8<5wT}2f{zbgss&9(qa=!jNENJMKG)eOrr;7LP16s{fVQVQjb5=4 z0U}$-HO|>{&b)=ME<9#;q9OAhGwPocCysa4t=nk+vNyx+kI&~T?>UY!O|=jS9Brzf zq7!k@$WgrbkxvjrAcdeV7Q=ORO>(LsPScjk7V`v=-2>WuwvP15?#~sOWr>msp(6y6 z2*E%Q;95Z@Ws@qYC6Y8F>S`HL4-g==j~`~~$n{fH5pl;uVGeO^A!lFt%xrAt7pI;~ zJXR#*hc<~dFIy@ICAek|632=0%+_wEHYpxo*uj%8F5$qvrgG@CaYp1uDjWoz`8vRd-FbZZ@f?z3u-o&6P2r$P}GhG^lSl)~@Jl%_yLDv=8InKM`3e%GCI zW3Km)f=eeeQq z_`~o2p>y!VAO6r@^B$RZ=H@M1070_3hRLIb5Je&B*8@KOd>ZCCoHGMq&eh#GtE&^XG9IG_DvUk^hYtddmqjK4Wp zg^*AT4dkE6KoC;r#<=3x{rL8w`y)g>LdLBgwUuBk%aW_t5cW#WR|rXae-D3MwGJG? z1+%A+4|LhNR#e?(qlYakYgQXAeGPbGfL|?K#@g;4zPRsPYT`|XFt1G@r%d9LRU80S zexDULuu^6qP}16=B1m`+UAYcEcF*lRylNv?oNyS|9Dgiz$rggBBzWRjltbcZVVuU4 zENd!B%d{3s;#hdy5fZ62D$Ef?eKaQH#AS?zc#L11a41Jk7*)1qE!`I(lpQTADZLrv zqPGtF+26O1YuXGNnra{&w`6ID!D1l_0u5tFB1W{BM~D<_R;@mK*7TWsztOXubIyCd zW)>TeDbl}kJ-0r-fP|yU$&Ik`y@epelO8p(7%9)A7)4}?A(>+7{~?)TQ1!h}rdR}f z52T$gK|s>0Lt6JWv@wK9cxk%|jMJe|3Kx@*mAb@^{fr{52%?A}R0N?zpwi@{q)8l9 zv1Icz$bn5ONz8MZ)HnoJNJ@jSqMS#YL)|FQYkZ|RXZln|r)#<9zQ@3G`P6X-Q5%n! z+edNN<+06ewD%5Fbp1=JxVmybMagWcB&nVC(YXMMJ|bsDdz6NJ5rQJZkpz(<= zr0B_HS+}8$<7Q8wh~}>67lR-0xf2e?bv$%r?z}=Eg)sUAwvR6mNPEx;JGN^2`v&Dy z!UTDtB}$00y|K1NPC*p1wyo2kNkX7Yt-?X*;NRQ+VmJOH=9@4K|Dh>>cMyPo;99a| z2?rf~&>r)ic=UlCJ9b!562b5mm_8nA5-?{1jJ2NJN`WH{0`T-gs)wzSKo_LANj@*x_Lr0=S4G148Om!x0kguNQ7bV>QUGfI6RMdvyZ#G=a zacJw`#;Ld5#=7<{u0P{wPMW+Yu2V}GTFq`zrHfEig=t~by#i_YW=4@!fp(BmQVeoH zFF{yjRaX}eZQRO&ZCz~c??Y>cKq$-A@XE1R+e}@Td4rGrYMiHxz+%yEd`0d&5gbNRfxt!>-$fOpC%r*PkW_YHccGtM}JE3Wv#a}y>^ zaMrJ1ZwL)LyZGtdkMV&c4`Nu;IKnWp2U#UqjH>t-ZOpUoJpP<4~82Lhf6=nV>9qV{ebLkb*@vw5IZBDRFypM4>`w3+Q4{dBeG) zG1^KA^7%ZvFH`0+NJr)g;j3T#5?5XQWBg+Af_K07ym^m3{Ky|Vx;h7a?#XmYj2%7p zf%eWF9|79F_{Goj(T{$d>#zUyKjkcJ-@a1?hOZ=u$Ej~>pfQ~w?j-S~XXSIn?z>!e zLzZB1fy9%BEST~jN@C@E12iV7u1}^Y6kf*l1jT~l$wjNJnYHF84?M}CGsZBYK8+v2 z(#`E`&Sg1mzgf&*xtV7cuVK!t37jxz3fW?@j2=QMNL&9wJ-EU)$RvZ>IAzkYuE+=L z(m5ss#UNm7dnX84DY44TF!2UvK)Z502MZGI%6WPR0r(eQ@ucY$wzLczx^DH_MLV|d zD3PQEt-}y|OoYZ7b8G{_2UWmJ6CpUcUaz1wQ8HCD=kECkT4CJ%?{GQtg z6ESNnAq;t^wFSluL)c1|l5&_7$gB^YI}yD(PzvcQj-E1x$KHQ7$4s1qE9(%Bt{i}> zWLqh1<*&;dFcKyJE3M4;8iFXx&CAz97;(nb@!-TE3W%bRC=4rycUiBxER~K%;3~)k z{ao|XLM9Gv;v;is5s5Ueb@RfWg%!?#u7dq_6~bYQ8?6Ynq96)HzE32IZ0udd$v54} zx}81TcHXI+K4TwTua-auAeHIoRcrb0jxt&9+e;$~BLlMe9rR>3bNlk;oO|cP9R7!U zx$5zkS=Zak-Xn(bo*Co$#GX_5@$pA7BN9pU$97NSzjq>3ocAp^ZdH@fGI`tqOi0VVS^m({K z5_96Hu!z=CnWG}A^xcJ!Nb$xsio%%qXjjrX(96y9=A%*`mz;Jug}`VGIF|FczI%XI zwsxRJG`LuE>^>_y!5M)g1USVIFXN+i2>tz4LQj!F1oA$PfFPHLOun4yOr17O16*~r z(cbygXFjcN`O8gz?C9zgfcWW8ui59v*IvCpAoAIqSh;e=Nux%LF3A%9(}F)hG4Mrc z{Fj;pwT(5@rDAw8VLU@#m-AK<1*+mj2yGot&7_D_0#C$9$7-mFHIq^qMN+ zSe8c7P(&&;0bd1#QPKQg6;Ucg=?K?#>FF=<+54X+3IiUz;4G##)RQUXNw}U-mXpeW zxJp}s(QeKlQK_CGMC&};d)jz#-8!ycw499{156p#$fZZ_#c|^&GNGZ7+E@Zd3JPH! zR|kx5O!L8e9%Z2DqaD{KSd`_1wf@H@19VyB#y&eT=YA2Dpjj_qyJ0oc5QKmP3*&O7`N z#tj<-p*DSZUMtGl~`uk`09>DPlbI>Ox*!zKKtt{VpaAA3{$)XT0OJB<8^5o3_!B%NoLn49+&q9Rh$4J@G?F!vew)^nZZe7u?V>WfsQEjXG}}Lyu#@4gAci7@uFADKl+QG z{d~}S_}u5d@bd0Z%YXKD&9&Fc8-Dk@Jr^&wMsl?&8XD5X9D(O1D@HoIT?d9cq4l6e zZkKWeGSjxrBgzF!$k@h4?#z2j(whXjh(JeC6xBYu2804P*BTVR7j2%sRN4^Q%H>#vd0p!5mPWP& zR+Grp+_r2LOCt+k!s|kixXO6TZJVF)87CX6R*;0Nve<>R?SKdZgKzR=_w(!r-t+9<(Q ze@I$u3lUew$6`(jDP#Cyo_IW6RryzclzO+xh7cvnsMV1Vid=E$-xxNsne&g_gIuv_ zWwOoh_<`cK6>DwMU&6$cO>%eR-YEq#QX~h8_*#Q+<$tR`ph5saNRTTM^i>i7tyOs4 zFRr`(+_T@!t+(IuZ#@%VUa%lmS6BDN^5+(h(NtfHi;L&R|89WNueVMHA0(!AVhMqP z@;QFbS$yt>zp!lkR;COe$?5y=!@<+1BSfA|v5opff@|)5hDpPknKHVC^RN07v6=** zKJ`%QlPU5+h=Zc4DQd@gEecTO09c){l(wW81Fa)Kg($y(?(BxnZe#XQC=in_ zAKq^^^FDA6-#+|U#x{<^*REmX3kZckMA8IUX$)}?nusEbK9uf4hykSIn++xmt5s?c zQqYs@<+hb;ARc4($l;_s&yEf%LJ=Vyk8G|TU*#>N723_KKu8LHhV}h@Jh6E@AKPm- z3AYhXNKCSAWH?xg_LI;H~LqMU*huh4GOARS6Mp1>FcH5(j zuS@aM;|`@R7N-zJNHi`kp*B+oo!L$FSbleD$c$0UOxA? zXE|{6aOS=L46ZxzbdH|5Cw1`_eBlvlBWzNFlRY<1eQF3fKhKF%$MF8SGm$}Hy~(Qz zo3~>WG)NCzS01BerCXme%8^x56XjZ@j5=7NQBbz=t#(3;qQIbIN|x7RO`@4d`G(QW>q|+$Mp9av2?Mky?bYy; zhv%_r{TAMH_*{n7))J@?M}t(FhM45RjXT)T(QkM@x-=nPO1M>(-9s5e#w|u9{D>$D zAy+`>3)NX41OZxw6uWv1zsFufh8Urre|PW)*t&JA?Cb3tQhs-yOLI*M*Nai&jtT}R zT-C{~R;ApiN-x1S=1OZz2wCl%jvom|Hw|HriLLzZv1jn4L*DnPOT@_gz0@QV-2U7O z?s@VREYH;b}*3#PkUi3xVy-MO28khGeUSsO;COtyhBoh1T}VAgBiP z7uM?6{AXGKiX|I1+g6XLCJ2;U2yYq*c+J|>?<4^KitG5}j|Jd2zxp-jzUSS4dhXfh z?lz^e0@p#$nPxn@XO4j}LviYAjanZXBF9wl+qw`huAz9~G;X7Zow*FsGQ(4;8ft24 z`12zV@%uY&g_>FeVTKV*XhF=FfXHN_y$d>fAfHD@inP?6I%_JAeeiUCe&PvC8#0;D zNfIeV5M;^wU1Wnk!$g;c-R>Y!I;0qOvvSJ{zVP$kGy5Z#a@seq;??yl!0|29RidOI zB?QlJ+sux>JaNxq-{Fl&;eZfCj=ZCme>55E7Nia9SAFy~e1*=7Iq_1~$>2*+enSlv%wcU5;Yd&hKA+k)!@}57}bC zBkwznpPzgRbB4~ub<;%3Fn*;ntrD~>SD8_yNX6@k$Lffpkgpyzi&-N_g0GA?cX){k- zw_)v|r~S@%zGITzgAUx0PN&R|7kv5_Eahvz`3th#H>FI}RMIG$l~pCH4=E85>7ZPp zSGbL)(h5`&6)B{U2pQS8?oy1hW!?Zt!z)qBm=mc&HA%pVu1J*j2~+_gH9~u6sc>bS z`uGSt@>xkhq?Ok#{hzA7Z`ooR@H~&5nQne`*WHX6J%V%gpNZ0?6yHb<2a)7=iy6>DZ|l*WSO%A`n85&YD1^BMs#dzsiW12to)U%om`i;?{S_K?nBzr<{>peLW16 zCKmvah!JxgJZX~r(mgjwk47sqVWD({AS@?!XhW9N(yBdIDIl8Mw?t0XXdM8O&mVgX z_q_NLI|uskM2td|1sSq(YX@Jr;U2zx{_(uDdIR@8{sPAyychp-`e9`KB9Tx?9ip^j z*HkG+YXru*P&wutj6_w7P*>`IB{U(LP((yRp=4x)t+Yf6Np~j8OKUrAK_{!&MpdZ7 z-zx}8qGD3oNh7t}cECFc!2eIzLl6Cp_rL$Vv4@x$#4}+<# z=pprxN}&?5N|h!M-ihw&fkGaEW@1AlAKPa(cfa>E{&f1W?A3#+Z+sOv~7K{uSD7Nv7dmrZbFI~g$ZhwTWJ34vv*;hIL+dpSR+h&Aoq%4I39Lb{_ zw?Y`u6i+a-WvH3Mm8B4(EV0TV2nzJ)+VEAbOmfkBfLFI~=Yb8I`O3j_2}7TbferL! zw=t0Kq!0`cYFimeX|rij`A`ySxh7nX48VSDqy`R8!>=soat9ZDE> zce%=~%H&H@%)%-GHl&84v>+xOetFV?%pTSR1)Kd#tcSo`#{Mf)3)Nq?0>PDtraH=M zHFkjxnsg{bs2VY)6=8z9=pX1OU(9|5;Mil29rVn5?X@S*KKuN&&CNspQVQ2}4lwVY z$GH6FzmSS~WujpuLxeKmyHwRv3#BT@F(f=HZG&nSwbsh;I&=xjx7$EPMA|PWb*0r& zB7!O%86-(nGovM86bx>Ipx6fA?SMZSUgDBll+f@S!NJi7d~h z&WrKrrp+wb(giX1HMg&-Nl}%gX@t_G^9H2|L*KZ4?gFFeAb==B`9Abj5P+|K^Xt?9 z6VAtDk2#SguP(~<^>kO3suncWCXkM6D`(H_BZ=YgyEYsO2ZcA-#=(v!M^$63gGivd zTtt)g^PIBxzSN`=Tye*JbY}*Lq70jMcJuLH-p0rwwJhDRm7m`92uB^fC)a)C6!Jx* z3MsW9k`+Y36yu`uWhX$e)xNT*K-qSJ(%iolQnTV;T1%8rc%H+`EuC!d=mh7r(Ab-= z1N3Wu!HTN=x1a(4wH$yW4?T>14nC;<(Z4GN0b|}^=X(j2}TTsiNlQRS-J*N zC51mrMD|=*yplbKj^dXe{VeUF&qLeS(&(m;j>pg;%`8~6f=~YN`-Gu1(yj`aI2t{w z8L}DhePk@bq2tGL+SG|0Ii{82wPrrLuUH_ZvN*bk&j6k$XxrJx=FT2;q^L@w)ALHyu(`dPKR)>a-#lj|QY8?sBwNhz(zfm32!__z zF|syEB#hcsNq0bL(?gR|5JpA%2X>N7*5OGHt@2#@bbbfpqY zS7(W0mtME9_N4;HljMsbSHHA~(G zd!Jx!S1-7(d5!<9#aT5HteeuXwaP7Qw~Q+RDnh$1%o-0bE(6dTHf%ijgcDA<=fMXb zJgxetUwLIA0Gl>#x^TpZ5$|nlYg4F5vc8QU{q}aIjTy`P4>^jg&LNaZj$~<&PDsPz z7P6u*p*4Xn5O->;w2?$v_{UcTV$=+3Whku(q5?4|Wm)`KX=s}?=pruhvV5$$*Dj&X zR_0oCW&ZxnR7!(60N^?iFt9J*tm_I`8*fxKb!tS5f@{Sp={Gn>XMpYsdpv^tWG7vI?NR9(Uigdh@LeNhkj2M}!;X8-#%g673 zf`Pyy9n}rde>e%y2o<4gQxK0E>uC8pL8x?s1rZEwg0aJ4Q=0&x=RGp-RDh||r?6_p z>hiB#c;STzAqFN-oYd4IWp|{Mrr-s=0SK^XZ~v)xo?LJFe4 zGj6SSL-E>%D|S)q zY|4Zn1wjy@`ZESC+_glEl#$8qDnsmg_Ut{x`~~y>t-=56U;jGa|Ni&+(wDyS^`BgO z^~vS)QM!1kGzU%?MZFi1RXs>YA(d-j|Dc<`KqIAxBN8OyHN=D|h#alZ(pZW~?HDM& zO0UE0wF(O4qVc1Ev-aPQ%^y6UZ~o;kEZ(@uNbW`vTERu<9mnTSJO~wOqR{sEwSz+7 z3d7hh`Jf1~Ys*~^(j6(|Yoa90UePfS+9nkUTvyUrDDc3d)ev*|XL*7QN={4mTvFmV z&VO_){jW*@_TGD6UVeE#vuBTUf*=TATrj^fv(r=udryI(%`m0aLZBGI9$gVC5ki1; z(Jw9Ml!FgpzZtU$f+AWwq!LML>eAfy^y9qmic9fxIYc6jZmK~{98NNoU_wJ3@0&H9 zv!_p?wV{ce?^93#QV9~mcweI+PzBNnmuHqN=fhY1o}L|DP?ti)Vrb!k_F28Yoo}wV znQQNTlJ1^(afE?#Lpw?(0U;fu zo+pi(phhF5Ll_18VaZCqe83(g9f#h?K%GYHrzDOeOTJiDm44MCFO6(TNyd-(?V_c8 zeC{-+G}qH#2yG|AR0Ptp?4wB7{x7c)i!qgjB;yBsb>8zNT$jJS_c)|*$QA>X&e7Gk zoyK%4u8bifg)8iae}gq+Bty+>@T5yB(M(^i4UOQCQA0U<`UHNzXa#x@YyBTR4}`6b zl!2XVQ^=h?C@IUdyVuPdLeP^(A=FPY^yI0Nx2;;Sy0!Y}e)-E^0`SA1{IKVz z*ZlOHCm(<6wn#;qp1j!b=u>?APk-h&U-&$Z)b{W*-U)*OsT~iM(jn3T3Li(r?D!tm zG)kaUNErFJRppWpk{~J&slcv1Rj&3GKvb*}ZPDd9ZmlCCdw zI@yxF|DLIFDaEaw1`&1d)jcb<_oH7UOT{qOVb?|gUcH!uCh z7s_OgL=xxxV{nHx^7TbaNGw^27J`xK1TpC_ES+RRLmeY)Qq;#hT2gV+g)TfNj_0P0 zop>yPv;yB6*Cuz>9D>s7HZ3Qlz|(?D&pMS!qvL$_xA)WA-^tuPr|^~2j^e;6qv*~Q z3?~Q=v};v(BSMTCsM<|VURnyJ=M+`2TB#*aDqu=tVvaJ2Z!+fc#HvlSZSO=R5`zS$ z{wdI37#cCT|B~y!Dgk);<@ua+^68_VeRkpEb?erZ*Mc6_2zyL1(!S$|7>B4(p;HNT z!mCX9D9~{i)@){2HsA|qegJ_c9Z!<1sbOR1PQH2LulU*RHyff*a|7|Q!KpuS})wl#im4 z>}@IF%JNcQ(a}fTg%c-^p~v^jqlRc<$X?|{fbzjDEYZhtAm(~ymUqUFcy9Z4-ZN_| zqiPala$$LPSZYmVbpssbAgm(WVAj3axJlP#VS5KRtys^|6Gn6Pv~lzmL&7LP3W?)r zieaAa+%}q0BXLEnYOHMcCwfVV(2W0>L%z;!B%__li~y7hiJ~H|TT>R9Dz%@2sE8&)3a?BxD)Gr8RV3ynUsF(5 zPgIt)FLrGc30nfD;z@ot?`e9wy7|#ZPe!Q-jcat@5hx|una}g=hV39-A{kOe_1{g- zRu+P%E*qL^RB3$QM|Sp=>0PN*>iyHFPW#K|&6{fgXz$f@^%)s2M~dakm-m0`+n4jL zZ(jCqIU_Tf96<70mwoFtU`VO>iS0Xu51n}=`?NL_SCH^r9D5&gQAmF=q$^+G`EC8= zLq(t>Tmk8LjA4lw!)p_auWw{zZ4*P%^~BsHN;`mSCA=-~$Y2CG7%dV7Z13I9ku%3} z_az@-M|VH7#*Dy~&^eH|($x|zLxeWkB+7Q~Rr##kUGH6%l_kp@8bMj3L<>=_{zcjE z0X#==_wy^ttsY}$@K&jCuQx8NOUmK^#N%;NsT6tJ9(pGM_y?}x!-jL_xo4#xy8poi z8#ZicECY6}!(i%I1DlR%DUV?(38a%%>Ru5@2azkH7cAwH4}XC<)25KkWm&s@2iM>7 zJMMjS9-DXWfFTVuO&`a}drjly=~LLVWh5i(8gQI6N<%>@<25ZTb6RQJbB-*GUSR$9 zZoc`4yC?)9B9*j|ltxRhN*T@u!9>E2lo{g~sg=>OmI@+CU0ssX58W5(Bv4U^2DS}k z@uLVY<}s$OhA`CS-mF9#wKFYoO7@sqqfo>hho`r0=hz9OtscI#dIUyJRa*SOhzLhG z!bt8W9Z5~nqdOn4c*8c7)(mf~WmQ)%QyUu@QIo(;#%W0l0$-7jLLxszXwzx~h0x}C zq*iDl4H;1=YT|KjU$&lAz5RS_&QvDU*V3O4i3B)OR0wLq!4GqEWw+6s9)T-UgZv08 z@V^y0viH91=Z-)~XiN^L!{0(NRJ7Km_{=`Dx%i=HAt5ax&A54iQ_%>1OKe_4PBI$# z5xOyLA?Pv<@C_0Md*4S5g)JTEOcsP{>FwygL~DJX5F)7lmD5f+m0$n%`t37k&bl?0 zh+S697a$RbbdpC`FJ;b(2^>6qI{9L*Y~fn!-wI(8BS#6O@bIGn6tyN83XsZ-grdQZ z3Z&wV<~`Y9DYPJr0zA(qb~>VDVxhId5A(!aE2wXE1C#(?6-nAjkCLLLDECjbA%Y3} zZ|pLoFEpO(u%WY)YaaX?2hN?w0h7m4@KssfS1C=>jWci4cGmaw8BK;V>rlT=$3~!~ zCRNlV15G51&R3K#qIw6+=Yhk*g$sAgo;mC2Lk>CkuZ2R<%ST~-Hdcf0`=YtIiI$cY z=ie3l&ph*Nap#@4>#^g;zOrfKrfDVxSHhh&k#BtZJkHy18VM06=B1I+BZ!J96`+WS zbYudyj!+tMVZ?wRk@F)q_4cu`x4;vd){u>Sn&WZy89AJNh7D(YQ$3E8CQ=EMbZ~`> zvZ83lB0%GZ1LXYzP3bg4YSV;aL@`v>O51+^w$zWx$*@Ty)NX@ql_7PN^mT>ksBKHn zj5{L)N^4w4u)QzGGt1UN+$~QVY5f+>e{_jBT-Dzy$p@>@CKV8m#i^^QW#`VF?<4?k z_xj$qzRM-w`UY+7ZQOR#t(lI_j`EC>7%>z*b39^VE4sDG%#>A|n>kLoiqKjZ{r5H7 zsfncsP<-|mKj!(xOIWdP1$hVb$Pvsv;#fYo&rD93G=bqYjYyfY@DzkmgwPJkafoRw zsm=DZg<+aTDkAO(uDbaFHgD@NNl0ma+Ht68n2SMButwUZY>09l6FBf7JHRK-J&gk< z&mS>I{s7=K1gMdOIKxre!QMySnB!5`A63>-xy&f3iP$2=$&ED3M77&kV`nAaYU!MNeDbRAl2c6N50Ro~RO zH}FFBuibOsy#RD~cX?4@#|>SFgnP7#~3g9?5kW+x4TxKMN@*8|>o^p{ z0+A*5DXmdbp&}FTgQ!Svp}j2s97O>_Y6@X5#es|wAF}Fw25^$}`CZ7sK8I}=xj+~e zQHjvBw`>w9aEOSI$^kbrme0!cmbFF2gkvUK;!cw9-SG$XKp!7G`c#r}hoY|xj$vlh z2%?aimaVhsl_*VyR{3r0nzET6NajN;b?XplAJyH5Fr#R?b@WIvWy-|FpKko~GavcL zhsN}D_tMqVEnTH46bjVWH!x(#klerPti1Ei+x1yzowMeSJ8qkVKntw|yVj^MAc%Z|s6Y@ENr@r}Cxm3kq=u0QM<7u27a|t6_we-Q zc7C^b87;8{M~xrF5o3olwziq9h~df5Cfl-1 z4%Sq}xn56+au9A-l>{iQj9RHSek4(qw!iC0o>{qpj-I~qsIDGl;`4S;fYR8Ju1HAR z`DHKWku+01?<4?k_v#zyOTPcS^T+(<)>~J0baq(kDS}}w=)ESx_>t&g4JPZdH`9zC zg^=^n^^Ot8QJ|s#w(TSnhJ5LF*BaQpxrv4YXL97M$y_jJDo2eSPra<8AYzpa&(5qX zt%wNFen3HoWg{Hnnvpn9B&kUx`0Fccx#!tej7+d2%dUH_Fidw7+yssd6k3_U6k3u} zXvJ^H!>~3(yN=dqDTukS zw7Z9CLz);`pT_q?T-Pk&qHo;c2Kw{t=;&tY$_=dAu#MF#H?eBv1_~X0P_S%PX#!PX zVcH(0=m{fMM9R1-CR~WeNDOag#;gfUoic{GGbXV2tjP>%sG&Ay^a!FTo7eQnO|>koMJjCX=w-&JDX%5cDUFcYa#bZ- z3JN~tLxnE(Q0o;5DWH|{r*Nf%mJo#ngosd9Mp-&Blu0v@N}9QQgf)WFxCpe;WiqJ> zLK~npnPMMtH-#f(NNq%}9Gd_UnJq4)(G}1_nh{c^NyTHlv|%m3o%aNLPM^dP(5OE;MU zMwR5njiv(vTsKDCOB-$@M*PUQIOZt$IfAf=)**2ZjvhCR6DAHPQ-o*R+IVdJR&HCh zfpK*;95Hq{bA~n3l&U4^qzF{OR>rPTUbIQQDWI(jp_WzXOlj;-50a$*I~%QPGQgTS zA&kG90Hq_NP#D6ai`Nq{ zu&tw;TrN+L_o;12Gkg3PZh86@(@%CyhUf}K%yICvG5zt-HijCp8|9e8I6@eY5dp=Z z$ngj5#qTfrI6~B*bY$&(H7G^iFM?9E)WnE64!JPIQHl_ZAP@?q!t*>lN76HprK79B z@@<{8CgME$>Poh4>tyrR?X+)dr(X`AKj=gYx~{| zx51AJ^k&-(G0<`X$~@fN>DQNYc7<>pY7$NK6*}mP6z>`{f-%jFZ0;Q}B2prxA`tQq z5`(mcR2;hA=rF0)+Lb2gxGrM)SoF)w0rboB=b!tfFMRQ5KfdPbr+0mXhQ``NS9iA& zt5KSK(I?Z{O%N1;0LR+x3Jb%Ro>vO!$PDnQpZ%8hY%d8JqcQ1`PNngZF15)diFk~L zgvXHjI?{<4$(TodB97}>yWyBiGU?(72Uj|VaOr^KNE~T|SE49F3yq2(LV?OrC}t4C zK{_!U$HmiWgyWRQ6Qs3gHU2@;$N@)+AKY;-K_TzJYMgh3tk@doq0RAf~_b$QfNm6RMycG*Zg5yO*^ za+1`5mTA?P=G3h#HdUF)UjAhq|@nl5`edIop8bleDfQohn9$Yiz6jwhhborrsD{vkAv~8 zh>0VhrQWn?OFejW*=K7GKxoH1=WBkP)Rg-fUexk#Zz zgrg)!N2f_SfB0g@9mFJBv28v*_VxxUJzXnnw-c=+lni!|ywh>0^eG?avwk7mQxFBTX;f zjIJvS?Hk^L<+J05S$eZ=G}W~tl!X+nliX|Hi7uOkpdpp0C+qhSL`Bk`;Mj4axqjiY zav!@=9lnk6z(EEo!XyACfdKJFzf(b-@FVnyW*FKCJ9~sibNd~)-3hc@bkRjzd+oL5 zU)^KYtSeWqTze*{afBgJt^l4xzEGefb*r@5@Y>Er83P>6D{I#=Z~Z!o$t0)&ll*B7 zg@_^bX2!>mWSr*O8tURP>XJzs zYEvXUhvvE(8d7m;V=v5Du;G=|(PZ5_io~kv5K|)udHzAIU^URvHJo@5`%$+@h zQ}&udwh$mJ`PCPinwZCf>$kC_tphx_WV&DowKCX!^)CcEQV3s}c9|ALI>gTyeSZxk z5^-kFoSB-xV8MS(@CUg3vTp&fWZ|L@=d<}liSu;m`%mQa=N*fP>PRK(jnuNPs-{bD zyNGOita{2vTkR@AM1-RRS~$2~f>#c8OoSMMYMZ}MtwZRNoSALPt4 z&%EQFd+#~f_rq9;!l%ACu0_F5rfXz!DKLv?j11S`bFX%TzK$)eD#pS z8Il@;9~t6{ud5+Zjg~ozD$DW>o4E1Om$>8kC3J1w3fnu;-C5`!u!Ozp#bZ{2dVVRS zTu9gB3~wYgriDbp!OtO)f$V+MuP!cOQI~U;p8L^4mL5z5USE0huBtU%ir1N?BKRP_)w|;|V5Bo-A5N zwdRHoAO5S_+S-S%yY9M20MEQ0Vfh7>_i^?)=hU<`HGgR1=FQ((zjkeM{l;|!LBt@| zj)I`Om$vR+{=9fCcU*rrU;6q-_~-{u!bOnJ7x92d2jw|n$B||{4T-j7MJ)wdI~2oS zy8EHIZZtxbByV0DY0GDy(nu+AiBS`4q^Gb0l;Gg8!}!aJRpf%G0{siUd)WBRoDEgW zL&RffDa-xA-R4-L`WBcmDwHxl7CUQhWzYjKRer=N{aA%N;ub zBUk4~kjq1Tieea1n$VXzLgAR?vvfP8%QNdYP#jv1tgk^uMmvHiBIU-p@BPQn=p`ul z0UC!*U0p11?_@=LH!IruSk>9XKqd#-9Q5@DeGejxz*WZf8X?h2q8-g0&%eMxp~#m`ImlG6$`EhS3WpFs za`?@{74}Njjp+S?Zd0DEa2T|oiX$eH{Nv7z4zXCW)v!2 zCULhk!Jd<#br@pIP_*Yk6jlyQX_=o&R0T78V|^c2Yi5od%C`?ch*PHQMOHcZVPF@F zgOq0JNU7+~ck$HXh1@)EKKDKIGHl%mJ$;Cdf%0fvH5*h2i7N%T0_BH9g(4J+sO~KO zmhE)E45@L$b<2!#!fQwYk+C1AN^eDIv_0$!L4@z;87TJRiUu=xD-BepG)Up$s(^-A z%#g8U6>nBTOgb!S@8*BzJ;joFufmG;h&5ZPgP7Gl6L_viJQgF9%`Qo#l5+awsbboU zY0GcA>E?3)^2Gv6mM&q*(uz&#*S_{OuDId~UzOBks)Rx9zjXsYwqNDzLm&FkuU~lK zg@aeDSfS&|#JIrs(<)Mc(D@ym;=7-{lDq!&S1!KnBOI{*9HgreMPbt&Gs|BhHcD$U zQ##N!9>rjQp3Dv!(j!cV+M0hApo|zE}H|noyt>d> zy{1!XnayQ2DiU<`Lu(721ASzpqDh>rbaGj#P(kEJEZ(*aJP#E{NbR9?2!6;VN9@gn z+FH7b1yTtk;4)|IF!q};f|%pd9|aVA#r8~rWgT6t=^9{lPahk4`smN(DHcO=VTjhy z;(3g%t)a$|G`I;+KE~`3U^cx=a#*SWgQ#o~?I7s) zi_n`b_jHvX^qqV5*&Dxd@mKlbmH!zCz#envvUt&}OrJ9KmHDr{Y&zR9j}ty|28T=? zPtqL%QHYQVr(}H$yLH_xnfp{<=ChBiny6#YBXqgnuC3gzD`K?NjVGJ$W+2x|NRdEj z{3s+2yl3VZ&Y3ZeXSeL&cS~1u^RjguKWQ|Fj2X$$M9k>+D_vzuq$??iO~CD}l1-|$ zwGS7AOrxqToke-R31TsiMXNXP{EAJuo@UN-&U#z@fY%ln8iDY`GAPj2zH{N{ zF8X}-^Iy2=odjTa*A+kb9$)*POL+B_1srhTA)or|0}p?ytE+2f>C@Hm1dJNOhy!M^ zV@N$T)fgtd3U?{9s{DPW^u0z5<$ZH!asJFXwA3__2{ho_1JN*Bwe|@00JlB; zG{3t0VHPY{0bAOQzIQG+sLKNg*Yg-QbQrl@?zaP(OvkXMCgIg2Y1`J8k0;_^lTsvx zv<%A+^bb53^W0hyaZKCei>aGEN)MURYKC1bvC!2H0Sd=4V^xW`!!K@mkjbNlbHJ>< zNy=JO2{{njm}5vmQ_6@2x#c-}hg=l$tCtq@i}}kKSi1$bb->y!r5CP1%Va7kh7M`j zvT5_?-?z37kIk90*T6mZ-1EIcF3+or7V_$%g`9TUY2u!H?%C~*xZ;W{UjKgX=HI^i z-S6_7-~5IfZn)v&rN2AshC`)*GJ-JV!11k|Gi@CGzNRKV#8^Q)5n&io^aB(D4&X@5 z_!^IC^{seQJn||c>xc9deKz+Eur*s?V{euXJ$8-HmMC(#E!)9wrVOYNUMaL0c0`^6N+Lq`R-1j~;g>#$QPi+LoA|{^qXLn;3`! z%9`Kh_+~3wZ4)ysEB{_7O?~Kczdv6n!a$}J81&59v(t+fE&7iM{s4;?y~^JE?050} z1uvPYO<>4DbNK8zN8^YZq>R~sY4%RpH)A*Lv62n5*hO+r3&$emdQjzEBHWf$N28FM zL<2FIpfk7GxG~!M(^Cv_5gasn1P6^7&a(Dy9@(&!E1!Lt(RH;PIc@}Vhqd4d#XzWR za#|YUvzj7hUyn-ct+*2F!L1F;8;YbsTWeg0|D87Mc>V22FkZk*Qa3eSdKaQa4viQ$vnNi zlkYzHEZIyRJc)2)gWFarFoU~c1fF8Q(PR10+}WHoc^b_%jY#c~@h#krBt+wsJ>wNR z^qIeU9SiP$8alcVK~!cB+u$$8Pnbx|b3eXi+t#I1r%o?E`sm*l2_d4b?QPI*UdFhI zRK!!mz3Rh?tb@7|8O)N1o%^tvgV?ImFgZ^zsd5^8A=F zV`L_iIm>aJ9furxP{*blH?Q5eaSIzaZlSiemWwaGm~VXJ8vwjs@P9j3=`jJm^PS7N z^wP_C@WK0U18)1$SH3*->Z`9DHFVgR|J}M}+kRR_S_Of)_vXLx)T1wP$T>%I(P!Vs z?9oHW=JOP74_he*fkIiSVRM7b!8VZZB<0kAmn7-9xH3Yi3_CM@ENt7(s_sr!b@b6z z2vjanUNYZiyvL0tLew(Hr83{v1&lHof@L^9KWi5`YIDdhp{yh>uAGI-5gx z_0f^(Ctt{usHq1XmPf0E(nwd*lN%rx1$b_ZKm};wP?w1F#eGa39-&Fc8i+Xw6J(Wf z4pd4J=sYS42_m0jYjd9cC_=z z`i*q^K3Y1o4P;oiqm609M-mVq5O|);ww`W&^5DZ9Hg`I6#}6Z~!V;!K67A;!zA9HX|ojO&lTD3~A zT(RtmatFGhmXCk(3??+zp+w4R_9=^0>Ni}*yA4!TDx16hd-WenpQqLu&x=!^8b)_! zYZcMZ$OLD7b3dmv*E6}Po*uuzt2?^6aq%ktB-ZernUgqt)Clq_Am=M%G^S0zJ`#4y z%Q5{UZ9Px47K2H&RNN=Ejz}e9ytHmB55KY&ClRljxDmUwaNpwgE=h%yTcGx3*hwkD z+n+D^esD!YYy@(xjVG_`Wtd zsL*&$XcluMh)F?5S1*20M7y?lr!wjyG>opVB^8U)k;}8Nql5R|{RpeOdqKFcemi>g zMr1aJ0-a1Gg)3thc6WE*32@_$H*?%^$MEpOj{q<*Ffb@k|NnJedTB)<<)SZqiOVm) zY$vdDU|{q908Py;y1T0b5W2UcU;OodZ|C91UgU$HJ&(_xdIT*EH4NnQ$dXUEHm+re z$d2xroIbDmsaGM3+PCt=rY+pJW)lnBJCLqRjq5P7F3#k-1}2XhY2=d;Z0pZ**;6m$ z;1W4b6~t%x0B^YipsKkQCeXW1S!&sgsw#t2HP^u6_0XS1?=ux*Npu*1)aDS3BqEl8 zkwek_8$oMYT84aQ^r+Df&7VJi0l?=zcM(De4nFW8o_+o~^Wrz|Aehj~j{Y8+>za_- zCz1|Qo5qSOB<ZaJ zOHmkzIWALN`PZ9K{r#MK=v-=J4mqoNptQz~AmzsR>*`hP?9Ui9`{L0HP_tzpLB4qTD3~gm@(sp<;#}?jzDT!4%w6U9=bOfKcqe# zLmRm=9KD;U{g3e8s<=z0SXY*8XXK!hUOfq~o4lV#N~g+S!jN~P2&9f^@DjXh+(=HC zG>WIUbnx>9EBNE0ReW~8SP#^)Ko# z{N(3{KJvE*R(ExER>r)&7|ygY9B}+0eE*|ovd_3yIx{(>j1%H8sv*u#k9`-H9GYY6 zK!%P&k*psuDqYX;bR&}*n{nK@F}*2hN{P{1wy#M|Oh!tY9l%}WP;s}ke&4i=Wf-q9l*Vf=UG3%3V`rRc! z6e$^9Q%hYW;Lu}lJ-r8A~FLhk!SL-*f{ngmf@)-}~P8xa5*c=6NapYKnhh>JIqCj4gDEjS-y@(x3rTj6se6TICRW#zOesHCe$}GrlE!UWF3fD zc>@Q<0s8&zM3Lmq)th*=eJA-KvcQXc>*vFu!c&*YlDLkAogEW0r4eFM(t*|{#QJUM zCtgL&oB$(R%8Ggjlf*Kr1=eo`Kca0%8;N*g7O()|r$4=xLk>PfJoD@`!t-J}2m(z< zk5JpYS-5QzdyF1SUe*ER=9#Z0X*?4Uas^l!@awYSws)sw5l}A*72#M6X}u_e^;ZQ zP!pq2^zcd}tipiYMqWcB{)t8Dt|UAoD{Y9$F*ive$XbU;Sxy4V#hlr$!tQ?o=zkZjBIUX{n~Z!Bme+k`N|jh;SaCo)Dur1 z{_~&z>My{NU0t2#mT1s*DOwKOi%(r}1|K|fU(#`pj{YpkL>+0Tflx>s9Z}RUG~K}H zTB~R#je=C96$Kp<`uQ?6sI6>(Lf|OZazw2?szJtxbV$sTBxMRn@$q+`#M6Jglb|Og zhywQ9`+$$^x8MG+{`_Y@c}wFQci(+C7hQDG0r%W>*E1V7ZPI{Dji{&f@F@sSaQy5x zYFx$d=eH0l$L7WkLJE}7Oq(#8WUR&tcG#>}3;UWCW9#Y}(U9WR?Hy+Er(&>eCv4q` zUbEFI38F@i9wRqz-gJ==q8$AH)2>S{xupF4^Uptj_ORijPH-Ik!1it1OqB2FX5fV- zT-BH3_9y3a#<2%-{t0$pck%!o_?4z+61UTfr=oNLbMJ?Z`cZ;9Vu@Be*e`ke1)s7`616d`;4ACb*k*? z>A895&YkZOK)7xT_s(C)*?aAWBvx*b8sQ)l5LBs;s}x^9cu&UG*3n-qfV9HU+CvD5 z)VfT^Dr+rBY5L2mBrq zB;=U!tsK-koaeW;asS#aAmE6xBbYm^kx)te$V{^6YU7Bi$qu0%D}(M3g%LMDyO?a? z8!@Zu#IQ;s@a-i8rHv#ja^XQ(B8}=~A}J<~8Rz_`Cjjza@g)20x4-z|53lC3%Pu|o zp+_EAykyCeBcsTs{sQ#4ksSZ2^SJxki}~bn2b&Q&6=P(>IGWSLNhDI#$Kxauangwd zo{Uk@ih&@cFYw9vMe>1f#d7Q$vkR`&`>XJ*m1UMjxUNfE?+(tm?E9Sa{cm&Soqr+L zkYMNmbIY%N)24Nw{Of&py(O!-x;o<%@`peC>CBB=Haj4MoAMa3|5&mJ4jkXf9>cRt zXelsfR4)UeQOHt2G4vVMRL?=PX5fjWB{-Q%tYmJXwV*a0W1rSmBR%Q4(4T>Ay|830 zckYEY3!s1y;(u%NXG zT*|VF(q1j021La8hC0(;(&Fup2vyAn>rw?Or3s+wHQuIBmxg4byd}k^9q__(bZ4)T z1r`PlW!#AJkE~n2o@=i7@!?lp^TTRrSjA%QuWD=3rdib9$&*jN!b=<00 zGsa{_Kus-&9lkfi>T8h^;J6mODIM|38chuj;?*$zu48t8uLZDc;IAn5iCsQ=Va<3z zTLn>LoTe?u#;NQvZ7j{DP#ijT1RvjP3dc_v#r^9xbNMri*q+Hzn{aR}fm(}_Re9B8 z3X^b1saW6M!=nq=7*|xaE000H>3uAA{cK8pBT|-)v(Va9{}zsrj_jW{W5%lg^z-&# zf&jeq(u?}Q0}tMO`Q_gkJ?N89In?aCFJJh~*?i`tLy3xtq8~7%ww3;Dz;i3t(caz7 z&i*U~zrfgG!>ILQ3~z2?SaUt~skF@?tqiJ7#GLXZxM6}jLZP%{p$1#2NS7E9^OmmQ zv6~+zSi70qUB?`@O*Q40xU;>3<{`~*DN*Y0&(PRdcXT#8@D;6$Iz{uW5m29GN>hfT zr}dMI1Th?rnw;bL9We@inxv!1XA8XV_@f!sGKw&=D2Fz|s6-xftYg-x6UOkHmzN^^ z0KKIHmaVbYrA8Ao2!e^vJ^R#pfNQR~`oAIp=iR!tl~YPgF0#S33qI23># zJE10y8b6--4?fKkvnKNKxzj0x5rOgvwW+361fhtKXtIS4LS3Y#c04+=E_bECtc(S* z79p;*8YdGwuZ|#QCraLG*;IxkOLORUVM=R>TQWfrRkPOdI5Z?7o2iVP3}oPi zr7&$QOdJhLp=%S!;X_f|cLM0EfBw@a0CDVbC-Aq2A7tFv(QMqb*;BwK zIMtP5H9R~RDmF$*wTVVDg&k)9BCT_vWX|{zytH^Vw>|$nm!ESM&#hU<(hXa<{3FLx zpG?!2$=d9~Of)1t$uC~rNN;};5=K;}G!;-ftOb_rXJwBm6k(fnXN(H4W;#!)gX zDe4Kq_=Xz3dC*+uw{`H#1xuMddzma}z+pe7Gnh(t&T#-%Yh2;d<^<>GFT4>1oWh0>qe(~hK2D4>NT;WTp3v#)adQ_qvl7ub8! zWIph&gSqhJ<2Yu{EXIr&LRWte#bQt~jCdW`)o=T5jvF_@Fl&^Cb=#q*3t1FA z@bL5Wh5<#TQQAQ&V;rM|l@HPaAv_Aj9NAnqj&yd(=4};ZeeZ<@EJxJT40ig`|D>j& zeq(4_G}W6VVOPj{2@xQ#`X~6{%PfN0c8kC`UVgSH-IXjH?^aqh+-I^ zclMT#lBrXttv>wlBmeDcZs))MeE>Z7%=7H*?%ZeFjyBsBRJ6{S$ljAj8PAhQSV13Q zQN_>}NV?2a*A`VQ>2eA2)|a@}R#I3?OSveKaUs+JMSlRt@vO{+Nrpwq5mKqLT(2SX zmCkWdP7ccZQ3v!( z0N1giN4p>(uglrlC6h0$ar0@(N+MrE#stc6ue_Qn)q+F!n}QZ_z*x=5x>}TI!gZT*W6k)o zkpoA?adeS`XY9$B-}`Pn(TqkC35BCfzdF#qU3VG>k4Q_BuHX|>r@)%6uzIuUYnuJD zy{miY-Z$TN>o)$2uhULBo!{K>>qqz9f1i_wve-g+OvcP4y-OV|Bs1inv|JvD$T`92N$<28D3eI0)aC~z4Pr= z{?!}+v&W38pkScTNf;F>37H+!-F4|yw;`&Lqsr?t((aL?C=`8)QN%G5T6zDB3H0Y9 z9@?;lm0i6!NIYrA4ILry;x5wcrKmNI~vFU(Ry2i|J6av=&^(j91xhr{P!wwR0 zhitKr{!EVTJsm9DwwbM+JJ{Z}leJs7bMFf;^3!|n=I8f5!165{iL`oSMr+l4sDXTK zuSrN-MTd;3Z(zAf5o&!qt1Qzd4Fze>)bGO=#c;B_|HA} z-OXV~9>Hz5-1@hn!-q|DU00R@8p}44Q9choy@)UhEz{V_Gvn9;%CK{#kQBorL6k?9 z$B0BFKpCjW_|vP1#*}MBdz5}_KH;xlNBrGfLTC-C1R|9z=PgsGPP_K#qmM2L*lUr^ z!J@UWcs-)A&IUQyuztPPS|{u&-(7mlQ%*T+HYK*+#vLqQvWClUxsAA+v)h6XUbPWFpTY0yF|x)$GMQxfuwga-&OLC(S!dGL*2dVeW6!?!$JgA42rq7HYb&Qa z$DDgCpFHgl@_uA0Q6b6rUG!u(lk!VlSC| zcR4VYrkG0o+3J0_D+giMe^c6c0SGLLtDz7;Di-7LF~d1_Y%2r#kiV|mOrKxC5m1}( zcx>S+?wY@fR3c^&Et?SOx0uXVB*pCx*4mbcikNheQdaD}wW@OaRMgd`|0~Yee@P4A z{`>DY#FbSmUrfYfC&XegQ<{g0wf8^Gdp`eto?o$%bVBjvb53S>(-7`>>P7zdfk(LR zzK8kwUH7wc%NFKLp1?H8s5M-uuG z(}%?wQX9i_KDbEpY+X?Mm zJicT-9eo344%xBpVj7eVO@=O%Rf)vRq=VVGRn>XvAX3&vDkdG%zOS+o{>PJmH_j!r z(ncqsxxV~&jZF>Sym|9tM;>|P5klIPtQB(W4)mrrD`)Cx>B`x&XU+H$Kxe)$_~g>7 zJ^^sePp;^^-~%80Ga$(1Ve58&_4us_HETpR0a<4q=L z>&o1-5LPwr?|d-TT!0evE5NiMEX14i>J5)jg&+iV=>$`Tw}6I$fehn^*E4!}9ZD;d za4fk^lW-lL*wW6c?VSkeS}3~Y{AUlhl5T;r6Bzjbdh_N+Wb#IUsT2-3v>El!{(&-# z+cIn@`yPDIzXkqJ*BT%ByY9GC9Ch@&)TT|FZtLyqOIjRX#A{Q0@*5ZM)$d$L7%B?I zES@J2PK45e{z511{cGqL*hn$VTU11r1HIDLPD@JOY7d}1%BN+e*pe>!pr8KSc01~7 z-5a&o&A9z*rw4XT2!t?_--f8GP*M@;5KTyg#8(lXD>-0HGlz~E$-*7oWI{!@P~^J% zo;MRKQkYf+5*-C^V+69~+~QQB0j2|x^kNk>fY5M-3Vs=5*>j)0^g9W_E>}ZC1Kr)- z54myglb#c^1%amP(fOSD;Y+yw;iu^JJ2-0gbS^vZe7^mG_j2V0@8@Tq{R|hM^BxYF zF#{=~5EPB`xES2q*%i`KC2I)jP*8nz4s4+(*N$+CxSl{pF7KK(n?v4veED|wcK6Ua zeB|!|-t+GF4tl)%?!Wi%_v+4j&#k2e9&4&2){w-}l6@zp@!S|vct|OUIWDerQPM?v zNgCsVd?8DyLL@F)YX*w#B;6XMlQ0&?!XaDeAW#J}j3q!T!LSiS%gq(h z15!vFT$DDF*n3WB#Ssc21$#{#MSUWH621klWw{#r^{cB5iOW`ILYV1}GI^`o=}l?e z?kv(b$u--%26u(EhLsyFkH#kQ8#n#vzB})F?C9f<`_84Y#*QB|Ry{WF(Grv? zv~U@<=R|&ZmOoBT+%j>VPR)KPj2aCd3!IN*&IcMIbWhaItJF!Hn5glv72I4 z1R-!liT@qhX^d)!zQTRcy3zsHdY9y`RA>oF5M}A@-%2Dxi@rt{fvb-EdN+T5ZPG{; z2S93pR05$uO3$9_sx0W_`%o8?96h0xI@jZ_=a;f%QyWRoG3&%CYD($8WdxwSmQ__- zPibPVN6fX4S9(j4vI&4j2*LvnJn))#5`bN<-rio4=@hwv>@QR4kTqFDubp zixw`Unq0;Y_l)+x3o!>A$9^v*Qn=^|)Jwzw0J#A9`4v`Ppv#UA`1JJ?6Y zftIF*^7C(R-@*UI>#|F~$zzW_xpnmDv0q80)8-WE&%(|gZhHJB{7_-ywnE|903F z4SK?)i7b9~(Y%j+_2%Fk=6+9 z5a@_VMAXJT?pn2prQ6yOp5-%0U4C691DVnRt))XO>l5oM7=L)*H_o1e%271=B6Rf` zo{b}EX&I6NnD@}b|FU)doy)%sz_6ji_I7a>Z`izvvUou{$$sxYhF|~ra?XC&!RSJa zp|wMqJA5R24{v66a~+-|S>4mm-_~#Et~Hxj(B4fDDv~lJU)V<1z$Usg+sFp}C;<}J zCS`{EVeX^t$0Mu=ncYjmjL_=pP%0o$MS2Fd6H-KKugvQ(rb87c)7@9tmE@wjWmFpT z)WQk~+1Dt9V+4(~B^?5Rf_xa!Gmz(xkH2cW4+dlw*7M=*j`~xzo=TDi^~rbz`OuMJ z{ulhR3ZPOty8N5pe&9nNx!|1yVAm_3%~4lZM_*sxtt~@Z_8U2JWTk1hqm$dN`XeWP z`f_f5?s3vF2iK8AmOxT6Rx6GCm9(zQOwB41iPj(^X-EHz=XIbJFF(JSAAkRMy!T62 zaOA~T@VVdrmbfQ*-$%}XxK}RuuKV@>UJ7vh@yEZV_t(B-M_77{L}Q9V0JFy@@m!Fu z!1W@e7vaVN97iKv7e^=@VHn81%91PYBnW&`u?8cwqBX@ZLm}ux32iJ=waJcS5wx~8 zm!H3{x1ayZ*K^N3`zIBIi*yNo>+EIqn$0}Dd@adj!hS9`o|ndS?D!8_RqR69g~hIo zn2ib7Rh9bN&H+k&XlqubB5P13EQ~E)JAS1##680U0D>T(SS4mz0UF8eV@UwO$_o|lCmZXc4;0;G@vCXMDJ zUw#i4p0E!;xbt43&_yW72RDl%rCM3F)Z)6#K;WT5EtqXkQiu7VVUU92sk&>R4!M=PU<+MPKA3k!|v?gKL&qnjF= z#c8LV_DS?0L3!fw6o(ylWcaUK+u#1q_qg=3Z*ta|XH96|**-rE!n!h3`$}Kys;1sr{RcTed zBY)+I6{iD)0egtmK1Uj^jJE6BWdhpg*0HF z)B-0{K&{?F=JENg{M}t#ckwmsd)gOy^yTF+b3$bdEAXeDeDcY^dg!5tIQWpm{_cCa z=%R}T#S7uO$aDfB1+zyxL|WiD3gP;A@et{TI5CBABOJ%Ww;Bj}KTAH!l8n{i${0#% zv<}G@x{a5*c8#KzRHjh#GzDK(g&oEJ_3M+L{?yH-xlYlOf$ki)KKUx1&_ay+fcvQF=JFhYprL`-ecnn&ppd0fBW+pYqxFvQg@*b_MRy? za4vf4SdM%DiG2S9Cvm~ybLq--a@+jps7t$a^=IuYx0#O7Dnbi~f}g<;vj}P2105tX zDs?$cGgOGsPSt=Ld1wJCFTwhbogDbJOZn7wzo1YE$%TS7tJm`VKiV?=-1#to9bM(SK4t3U^)q zX*AW2C6%b5HId@1>ErmH17|V2xq;s;TEnLvdYao;ZKe=LAPV$nx6skEn!emNqA0?X zMrcP^E9J;~vYWLbDhf~Yq@`ObjSRK~t&!q(Bx!#LhmVmzT2RmWN^eb~BeMp^(or z@6pG{ed^Pnt9$mDr~dAHx%S#?O)pt`9ta%IA#{?o)H@7Gn_Ss(0z9{f<96e@8HD5G z$Rg4aWQrlVLSR{?f_N-#d<#UxKz=77k+Fp(0wM8a49Agt@u#=&*Wcb*x|te{_kTI~ zf8YZj;F@c$xpL&l;pVVb5%l)+$o!RTZtubIq~&m_K?FZdwTr4Rc(>C zVHdh98lY6!TmB6T4yC{nzyQ5=?YbZC`g33W(pQ)`aZLL_Z{M5=lP2ER)Z7dpmMmG! z)jzy);(ZHWI(y^xZNnJIX?il~Nh3+^Go7!TeI)()A~8pD#ruxqrw`rBvuidGYBS+1 zg+l8PDI|f))6u_y_WqT$^{k~Qvz1J-lcLI_bYN>giKAut(2t}dAw8a3y_y5Rd?{_6 zoxJdqYgqil@3H3UEBMuyKh4z1lUeZ60xtN)Z*ZhbAu13kza&b`Ba7G3*V)H0`%mSt zY2(QhO<&ch|0~*ZIc{FE9__jYnk|LwU0oaPNLnfvQZrCQxmJ%pmxrA_2+&eWUU=b! zi*CI8&S2}trC*vech5~ixB}3Lq@mW{efORJzpv>D6DHvMKJi3+;x#}1Q5#5wM(B79 z=1%3@51+lMSZN6xO7cW)Rmi6Em5g$+NOmpL&7}+83qakdmsx` zN%W+2`t}YOqLvaU(2f+x-geuqGvDm{`N35`I3$sXHG?r1DhNqK+98=Jc}7JzB0xA< zq|75xmV6b_lT&o{X06PnCJ0TxGE?Xz)CHsNr8N!?(ouv$anZGZ=Em>*+Ax|0%7i@L z_kTG7_~Re{2*5u3>~le>ZBAPkes6{cUs*{!=2pS`s(knuq)xx4uV0-sTCAJ_zkm*c zvf#%*cG=evD0CF={?SV4sI;#yohrw&l`B`i=Etx8@ej*^W6hd1ryg|hf$xsTGT5DXOHyiNq%d2o}Q+)BH zL&+2Z+sCzDVN&w9wcAlbx@+LCpo5N5H1`%Pbr5tELT4}dJ{m-Gb8~p&2`2^s zPd)W=F;d~)we>Zd0dd5kM`Zt1YkK|q^-P*LX{PJAFAHlDPCN!vM)Sc7PU5>CJdU_i zOUh|NsR(7#m#RRk%LNfYpaW0}*NIV^8p4p8F{Bc$C>og7+`{Mfox(Q{n$4a=n|Wx% zX1?&)e6D+CHSGgA60%69xQ))f4fGY;iGpH9^0p)%gd|hwW+2yQ$NZ`nv3`R9UtR6% z*GULoyFYhr3kU>SM7RhNagXaCdWpsBw^Ngh4T9|dVG57s1_`ARE;Odn<_xx`M@B?U znU~*R_Kx6P?>hR_cM^a%d42DD-veOg^jW;J@Z}%vx##}ri4!M2XQ`xG2!U$v;-x>{ z&*#qn90yd*ZK6VyN8nydOR8(sS zBC^>Gb+xt6?7i2%u{ZNx{6Zli?XFagq!9C{OL-s_N(m$}0__k*X;hR#Yh_5xO0lV< zz|OwD@@6W888XFA{3vf=S&SOHB1FnK7ysf`?zs9-h=D8u*T@E-j{|P}zup2k=9pu+ z_uhN|(Ad;$J}lpdo*o`wypA9r8fZ`mYx`Q3fQrdoKN zpAl4zVkHx0B49^H#~TI?fWO{*->s*da>|Q!sT#J#)a0&L7Hc+l2qFo+z0f~^pAA4o zjBl=?C2dAZht<~;<~6k`kB)qSSGRZa!uD>S+q#oi+j>~u)5p@zZu)&i+D(#hTpU;7 zhydTu(4E^xd;cbO^sQ!RW(|d6Cl~+uCN^%`!3`H(#N2U{7%1k6B8b9}Y|&@j&=!9C zsSh)xbp$`Y`(Acrx^WyqI^pu*%PVQy)WQ1>-;=2$8YqUooi;b!>0A_X_sWe#O7Oa} z?xOOMH}@Awlvw{70^f(7J>}22ySw+k2OfOjA%F>!CbD$V(yspA-myq{@ZksN{HxaU zr#^FGL-Wuf_hqx$dK+P2(r8Y5_c46^yrWT}CKYQzJBIk?Y9sGs)EG;7P=po{5aB6< z92yC6bIiw_Bn>q~sZWh29UsGx+6E3C-NM%o-kVDg+LO*~p7Za1nomFcJR1ixq~n@G zzJreb)pY%T?7elI9o7BE{XS=AuC06ALxKcLaCf)T(n19))ZGOsv{a~jDW#>f6l;qV zw-8(+5aO?IVNhDTD(SR^gEk z2Itjatkyd`lpWjuVuwGgP6otIg7EOMK#bXOJm#+1%%5k^rzYvyf=&MA^^U z)|-_+MNpeg@ZG=M&COR|4+B{=4q5~P_!#iue|zx1?EasKLq2~h00$p*;6LIMV{1Qa z)^28V|A4`XM5qyqE|yZFR7j`-i%vFp5=TlLX>cS$YowH9i$y2}R=h{Q@h*TKo>dwJ zy0S&cSENNMXlI6Zq7p7RR;xb!o$-ETGBN%B^;0;W9l>P(cH+aQSBT$x{bp|wa}6FP)bt{VBVIk z+`M!dcdyvM3!4X6w7rLcVxFXQkWPpa0iILh#wQ-*&WGmk&XW${km@wM~aw2qFH@ zjoh#Pfl-OO@h>-xdhVHLCt9Zn!MIWEf5L%WanUJ+VVO*_g_KNLPP=2UELNIXI@*dj zxpwR!37ycI|H!C0V8$p4q)1TXHPBHrg_edXB)kmc>+AUbaR+eIJC4GYg41t)kS{zu zmrc1MxRPR!rK^7(Jwxjl%5PyH*J*;F2ym2fgb2Za1*;sFD*!-Q^%ViO#jvm8*nkSC zn<`Lu%(@dAM?2)pd4740idTIb`9e_pGT4RXR8h~H^`d4p>^VI$S+Xby$xstDb`D?uQ!uKoyQU@M%&<{7PU;lw^+qO2v zBcNPCY`OO-E`RVTez50m9Cz%YoP6w29I)3OjBRVCxu(`Sdl}7gl%anGIwUB0oVEX< z?0fwresIIzx$##wF}Qqv)r<;~$s|V|ee}?pRjY4WxoTx%%;>S3SFTvG(~|J!n{U4S zsH2X0Y0jKEw|(+spIQiP2SyMoC0>DeofbwU`4=h5TgSq`88? zph_i?X^Wv-xsF4^_4xKp_wdWBu7SP*>+==r@#7}WUcY|rZ~5O?bwKg`7hY8UlE)J#{+ukAr;sYZAS2utzHed}9Sap|QM z+vHRtNwHiakx0CA)tc2e=W{uQC#6m&A(^CR`Xr`I8^@(@KaQ!R+c@)z>sY^izzAY$ zjt(2(+I z%Ov>D?T^vc-ol4Zm_>KChdGN@vAM6niTmuvgdY+JCdA5SLm5>|57=_d{Kloo|0Ny?1pVLIT=zl z6Y;|mgQaf9WE_5S!hw8X->Lj|!7?tqV-EX|XySqyQ`x_x6-}O={2)>|)^JFpr9x;I zDU@MoX`7shYFeM#NkeUCEu899SXS9)i^_<>zTZ?b!Ho|sh?~7k);-pE%&70pk3hd7RA1~_3 zr=E;|zj^cK2QRwdJ&!*>f9`$z?Yqx;Teo&a%IX>=M0r~e%b$Ibd+vRhdmea%2VR)R zyp0>^EfjGx9;rlvhGZQHH%-z_kaQgslBQHWCmpaKGmo6X=3;?$i`E*?bp$~W(6x1I zkZ=>%3=9rjal-M(FIc>I@lLHBOQq5;dwP04o=hg)VzD?I_y{lp*MW{!CXY{Z-~@+q z80{(t6^1x6MPuu91Om@X;s}WpW{*iBEGtP_>0(JT>GH$79_B|^Tm$R3VhuFZ{xc7d z=f3T%Q=WL@iJt#~>Ypo5{#=4L*K*0*kL8Bh3%G0cJUZH%dD{WIQ}P3n35Orw{R~~* zgS_YX{TSO^PpDLE%A&OaL;5Nt<<;Z4wFpt9EuCOYeGQYE>Y3PBM^h?+@FahJViC{I zT~6!RHul(U96$Km9R76w^IUw=EcO`RLcUa>>}Nsb>B?^7lfSu{OpU{5PdkLoeL22- z-F>7}39h>EBdM;o8m6H;4e;(%2mQ`kG&V=@TFOBrnW;KEAh)Jo@OcU;i&xAzx&V8N2^x?V5G7 z03kdN_MF65KXy8&&DxV}Ax~Ypo!V5B2}Y5vxu~?biD_p`pN4B{Bd2fB;EEK~%GQ`g&_C&rt|UK0{l(*|=y0 z^B#JJd+)rT>umJrQ9FG!PrbAp z)n~eb<#IVOFgS498Q=nnoiM_N>Jl@wAa z?cBF!Ge3HE5gUdIY|iJb)UJB%Q*`IU!}tJ`j)NY^A-49K1H5wDRSw5tj3_I*)43f= zWdN?f?oW5!an~KOL|r~#q`j^2RV`)s{hidB+nZYtwxC^h0qS2c?a`R($*l11)K+89`He zG&RW<1cG9iCsYBhqp9;!jI2%a*V!+!d2JFY?yo#TH@?3Tw*~X9l`7Dn;w}j8W>u65eX9`)rWEnmZ&lPOR7Wu+` z&r^uHCql&C6k&r7ksWx!$5l|H6s|JGUCA%eH!xrfvr0aIxZvII{q_9$^B$-U{{L^T z<4!u6wX0Xr+ui?1tyKmPjA-H5w;#=w7oJKkS3*lcb7nM-@P^ILtDW=SaAT@Up)qQ+ z3ycVmgG<`2CFwPww4gSjIc8i3$4?r`<7>P4?vwLbKUCn5u^rSVprka8l4z-|BVULV zu64Q=RY84c(!bT!e>KQZR5}-0$B#Sie7PQdxgsC^`QI7H7ja$3IzAGA|C>nww2)K@ z92kYk#u{j>CFN_<+G2D=h0>a`QWQ!hbg^K}q-+wjdGn^rKk&heyB92&ziR~WpIHC6 z>(2Q1yY0Dm|BtW!{sLeGz=}I8a+heNzM4aq((Wv^Uh@j&3C=6cC-g){F;l^@^1`kx1wZFT8NCrArsB z1@d)u4Gawp@V@uGk3an351$c2d|GQQ2L=WziabFG`2yPqeX_*>tu$qfrAiel%2K&H8P;uyGrw?^Q=B2xApUEd^RCq>_Z8k9H(U*-RqYOs?3Alw0`i ziHGpj$LI3r`OCqJtb+w_N)gy{rj=CCH)Lf|9b?$yh!_y4g%zw(Dn5Ah4yWF;^PYV_ zumE86=&?+iFn*tP>(~Fv_xlYDDVgBJkG+FmUh-Z}yzF`&UAl&YcN@!RPdkJsUS7wH ziS7LK{iiXZqlJ7aq{f3kKRKWN!7PW&nnp)ml3dw3Vp`f$1gcFq8EO*shIS?$>NBIM zO^+a7?q#slM-XP|%lWL@)P?U#n$ij0x!XkEHgz0dYOdvrzrCG@7O&^PNuyY}zLQ7h zt|Xf;^8JsU!_m_w@WPr-{xN$lyX`)j4;?*|fqWUET!aomICzfa+W9N#EtQOPrk(w3 z5t@VF>dq5tD2Et0OojR>r66DSp>Gfda{$_L9P#_#|L$`aU;GiSz4n^_PxkF258TfQ zr<{8GoQEH73l-oxI8(>)jSEgBU-Svkq-2_eo3<@<9aqo8b@kuixVy@mA;QLJt#E8! z8lZ55q%kvsRHB~#d?(}T1lON^1b402z&9U%fk)SF;_@T+=eS9u5Uz&MxN#yplvV$W zD)*?0H{<-uD4?Rk`P!p-Gv2V*>o{no`OeJ`vZ-%?w3m#N=>Xr5Ne}~U^@d+Ku|?BXDDYz%s@v+2OaGl;t$td`<6LB-M7+V|KqE_AOHUBv(My? zJML-)c>B5MTyn=XZ7^A-*dzVdW6YSr`BqV31Am>-EOxwn36& zRRa=EPk^rssZO_?(3*>t+;n4zJ*;<3jZ5mVA8O`62&)vI6mu^h^=u@ANnW@)Pp z36ulM1u1Yv$WsfSV8Gp%gLj)izU&)iOJTIHeW|Gc|3Co0tx59o`pta!%3qUxei6d7 zXtkSgL(h>XELpx}HUHyl^5iM*>eXv07K`X|8A@gDp0}KHW=^9R`gRXkB}rV0xG%=&BOO&_S$W192~GM!GAG7e6{l=QY;G;PH&D-sw(F&9W^&i ze?dp>U2Rp)gfXv)Kcq5W8HsJAP{_Zdx3?!k8gStGC-I#xokwHFW9HNmJoM~RK78y< z(#Zrjf9X8iMe-;VeQFbur&ev@u4fj5(wsAE8p3foZll&~!Phxfb*(o*E+N>^)z7wUoL)Oe?WDil&uP=fanP6!e)Ga2 zzVh%395k|x&m261{YErX3<5M^MOQfv_7!%3aqLu;{5b9ssGZ{i1TnQy3rON{$1^YU z@PgIUCOtdr7Y2Zcr9nnQMQ=3v$0$QZSet@TO}49~2qKAOJ82R^7zJP*B6@~mW>H;T z-4iFCbmG>9FE4z{oS*Wodhp+IhcV_k^^}vi@upk8oy!$IP{`%qzVCiBPpYe{J5xBE zHFM^yzfYbtNz~TV#IArlL7wdJ0a3&M*6!$Xxx|tsOAjs-`kp-M$V2aYboLYR_w2s= z?&t6HQ#mw5I27{Y1|LB;${)g4gZSY9x%?mxFH4e1CJC&{l{L&n2~Axh!Mg2zy#K1} z=zi!0@I&hZgAhr1K)_&qPDaY(4QkL6it-}{+&7{Ns6Sv2zVr2W(~?S%E0#HV|LLsQ(9La6FD2!< zmg(S72z{FBQY_li&DU;tfWGcQ#*Odb%$d`T02LacvBBSTR8nr5x>Sqtnb$HFpAjO2 zFhEI2d-b%}k24C43CY@xy=)yA0HG*_0bf4nP=5cJxAWdJ59Pz}IGR&Vn8joL1LTzA z_UBe`$73(@zT@{})}+xUP)ksbImkUJxozoMw&aSHJFe_~6xv|6%08^_GLC;#<`+sE z!`ia%Q_dG*Q^gsxxvlN(|8MTm4_^GC`1gOj{sunw(T`j@dd#@Hip9dQk)>|U_z|3W z)IJ1(vZD=+BNIfv3emLIoMU>YW2e`{SJ{~ZpB4Bu>Y_%S#Hc^25C@0)bQ=yHgGHZO zPx95n_vPkuj|B(bcH4t||Ctw2Xwr^jEqrywq|K@o$|y_z$PU$_U35%g~a6lxMn1R9Y2MgAyXP z7*@WI?#;%pvTD_;JAU}XANIbL&QJHP9susW&&-A2{hs$Bgb1jj!X0?ff%iT4?6ax9 z-aehxISxJekj(Twc0a4HukQ=nws%b%?CWPJn>8(W5gQ1bV_zsbMvTQxfC>U?YwOEx zt!=jlVUW^VPpH0zxpU{l5jP%*Q7Y@*blJR zxRI266??`<5~~9RpHKht2G-s8n01*l!?FwB^X?=6`j;DDbkiQ&d%FMU6M*Y}_xsy` zuM5~$ham(Z+qd-4l`k?mQ)^m+7MUCh46j`K^yjwVH6%#LS`;CL@&Ho8#(^>e#ggq! zR_mAVylN0uH$6T_;uft1s%`71ii=eNHJ6GoR6upKAqcGTibYTd+6WOg_-D^!kCCnP4i#_(9K72IrcCPK`!_vAOGAct9=r!7Kg3J8-0}QU zzVyd?$QJ`}BwsxH2oed0LcVOSm%vu?#tWgLc8pP@jBU4_7;+Q6)lh}B)@EpFY-Dp^ zKN|)HcyVKaQ)e_#2ug$q4&Hq<$L=)|jYBCY^Q#4`IPZoBSUqmQTb@u0J<*^Te{I{57E(%4oos_LFyEBh}zx_zWEF_H#do8 z%N8&F;Kd)}x@&*`f4Vm>zv2?Excu8(ckS=_#jk%k{!iEc`JeOWzA)i;*Zw}Elyc%| zBoULQjA!zQRzl?)S!S^2Op?F`X(g1QzzL@!bYXZF;@!53 z6JrqUxhpKEBcjSmfmTM-BPA0Q3z|#*@(=^rES{G@MfAa8s=pN`*Ul28=#&-0jEsb3 zCK??B4Ze>q7R}xYE5Opo{#Zr#LxT!^gVD*Gu~NcIiuSfvZ&T-Hb|nD+AFLbya>FbB z>^HyuwGa4U+~ltK)|J_(pMB<9;B^gY)~sFks(*L>`R8-fO-7%+t)rcq+FDkxT4gf! zQO$@#i0<_u z**LE_@wnrc{`D_6K5@xqm+9b`tf~I14_YD29DCz7 zXlq1E$C{h$sAv`4V^zsF2eS*^^WEo=iShMz{);p+-t!41sFXtt7n+N`+OyWVpt< zc0zRMQj8 zzg6;)#PK1&I{4_kW8cwkdEy1o{i1Ud{2 zSW5`<#UgBp6J;@e{Dhk?`rrrpKl8~?{hw^aQ%^mWd+)uMyYIWl`Qm53F!Ic^P9OK; zf|s89)W<)$!_J8sOhVv!v`^|FlW+|Y#4+QRe6gQCEy$!=@SKE^UAAthaeH0r3JA^y zcljE@e`j5QVUJeqnB(f$APTLBq!$9M2}1bbjA`uK-o|I|dxGQtd^bNl{!mVyItCR6 zMow4@>n$MBG91=b(-EsdhjtVo(L!1yHy_&G>OcJGM?VS>2Y-O`&V9Qc(b4glI1dd1j{WF)Og&;h z^oA`2dCjBC8%R2e&hC)ASI^{&?>dj9Bhb<^a}|UL>e4Chcyb=U`qfRazSBG+A;joW zqc;o``i}&51^*pZDxI#R0e%Rj659sz2q}z6ime7CuCzuYg`^bb87OQgTN<#zUa_iw z$W#{6pvqsDmRJ?4zY?f`o-Cpi3|BuDX0AvgfyfsOrPK3lq7gS^ZTr!zU;gr!R{?zF zqaQz4D1%HuNDe=Gf0`Ro_<@ncmeQeE3^;Ap6pr3^3JAFCiI@4nPyfc>o_x`O4}Hb) z`%UB0cN|Sw3vd-$86AFvaZmJQg8Fp3(Mxy@JyoGhzzLM%W5*szrmhhLJg{Is|D3yk z)|$~Y*N&s3ZW`kn_hmxMG+tWY%ZGmXPX@dD*>BJB96fUi#XzBjV-)|jrq*+LYI85Q zE?#4(m=UN?RQ1;!5L^2Z`64(HJv0cLwT%o_{iDO`F8$?|+i-J+S~kgrs8>H?)ROgeYyy+01n+ zE6t4sJ-ad1!O#gk(3*rJ_{E*ia{q#rG}YChqH6u$U6ICs1^!Vk$L}pp=HsNkdP-r8 ziAq5L19`9pUwwUj&)jgs4SzcG%roCoXQ$j1K6buNJmI98(PPG5{=hx=-3mNBZQ9ho zJ@wSn6Mp+!qqp8+orFm*y zlIvcW#Fg*Am7?go8|xbOf9~nI-7{zI zx9j2Tuttm;QTdNBgiui~2Ug0zq62ItC5fAXLL#J#bW8wL8dmi58wWID+o}K33utGs zW^M2YUHt|~7y%KYVnv$jM>{U8*@P(O!Er0E6^7=kQlvuDr#l}4LRYE6;@ z_8d>C9GH2r7AO_q3Ps9ux%^$nvB$)b)`Td4a!5@o$*0dcgzsN;B8_!vloij>LZF4U z&PI_*Hj{KSC>^{y)hq&N2}Lm|F?GZ!E{lHu&E)J3))O_oy7l-37BaXN>_z00Jp*Qs!NdVV{ zRh`he9X*t@KKGh(;Nx%WGZh_(#>U3}bI*JGrvHmQc;`Rw;FBN!)Oq!Fb@xB{VuSwa=q*}Y>a znmX=u<;nqR$K^Z69>~=v9?WeES99^*PtxZX$s`g++r+AwT6KNX>9l6k!c4P_<6p!U zAS9J^xa+xP+&brF>e3!4Wh|Yw;>{rahqYd+FQc(km3jscxnf+k z#`AroQLU4J zdf~~8Zb*|YnOUqv5~`3)!r`w=*Rgy{KO`f0TUCXvFsHU&--QSj+A+)l(KCo%-w7Sf z=yVdP9dg+r*xqZC3+V3de&WU(Z=C&~+MU?OKg2OlLJ zd=(;qGp3DWY-2qixN|lq-S7~%op%zG8#83f{wu0YRmIVlIQY%%ARNkH`OOQjMN%jm&u^n~@{hacX1%PqIO z<<8Ds3BYTtv(G)J>yd{Z4tjffT^l|U0|Nv4=38&s$B|M`nmCd16DIuh;YS|1=Ak){ zZ5rtB{{`?V&}>_}k(C>|*nQjxE;#xC_L(%A$6s8{S%>XKf3}Q}3aK5G09Px5AmAH+ zx`Qo`JP!les4x@fo_pT2GxyxT|C?7`!8gBg`L2huvp}TP@J}hwo^lLkT}O?sh!iT& zggAH=+L9CqE$Jy1=^Dx#0U%XPH`A}Isv@wIv@LxpZF^Q4+uw~{)=E_FP;i8?Xq~n& zFuidbjA?_qI)o0F>!yrzp%w@knhOBO@xU|ljOIbYGb(-|eEw}maOfW67%UcWq-A1gf$L~Gb0z-t z(i(hEA(Ufy{@O^i+BpZJYY^R+LwgS3KrUqV#2=%!YR{aNTY!d_BJ_L;GF zZox}0{>S#+kACponr~eG&Dv2TMsL0M-g_gmsQ^TxCdKIer*YQ1Pv)!>_Ge0K6QJ<} ziRaXlb{j|~YLLnRkVB*J4_eb$GnSOwfG4+b@%|}JojQu&zqFi>J@^c#Oc}#5quY@5 z(A76cCfQ6wrVXu)QB9~r99wNyq;spLP*EN%c2*LLSG50grGCmm-p<4A-o zFJF5<19_jCglqi|T(tHP+OfdfH|o)$hqX6^GS@szk+T%U-8UmLRS_|Y?oQD!L#_n5 zeDqn+x7>2eY3H1C4!7Ta`&;VlbasW0ov#y4I+1_gdDr6Rrk3NgLxbaAF+I|n-o8G) zX6@QTfKNJ7e$I8hgMz@F74 zFW}cdzZtb+L;PtRIeOGX&p-F<(dV3VF2DWNuXjC^S6LmcEg$Lb?imR{LoJMK<&)dK~wZrZ(+y!oGXcIWWlL)$5GBwrktJ%Hg8pX7b5X52ECU)}%L#lO#_{ zZeF~GyO(c{$rr-{hP2h$x-O)$ph*b~WD%RTn#8LnjY=iZ0&*KR!}_h!wHB`a=?~w1 z```cZZ&POysU)BH>g9>MZ@>NT-Cf(S>Fe){13w9msfX{)M=p6kmwx#IPM9^7jO(F; z6iKI*hV%$(lg+qJ0#s;_{Z<-R+BUw{3eQQAPBamOE(yoysBtaq)!NKs8@jk<#aem` z0plA})H)>wiUWiw5;BP+y~sz^+&O6_Y%Aj=E1slxfD2e8zSZ3q!l;(^Ww#LOGD0}< zbI@8EprO@{h>-UJ!{8{YkP$T*PMtD_`P+K<{k-KIG`gK}4YibYU;(zn`T8Lemyo3A z&^3_bOMkeRbz6JLBoamtS_`{Z93sJLU4^|dJbkf4vMnkdBb%`6NG@0@Pys?2+)3OC zC>9Z|jnG(c{#z-MT9XbVDPTp<&>(7K7xWAO=n3P-$^L@`RjmFNq z-hTcg^In|y36PFJ!^mb+^;t>LO6S=p@cqh`EBiE07|Y2=9)MOMD%6xhzv3rtN&Q~J zV{=z8AHM1uaxW}G24U2!zB@ZKbS9vdEnB+lfxO15uc`Y;-$1`j0BUHPHh~YFav+Z5 zTJ3K0sC1+t8*O`GRLit51h=_cd$?=m2IIFb%uE`gDzm{?v=J-Gfv~e_oh`ufjTIDe zlq6JrzlaW?&g~`v04SEAwFyyE2OBm+-w?yhsrQ=(Cmlq`aWnbk$w%;sgLdcbyN%XJ!DW>O?v$GVyc!cfPp z{-)Z|q(qIuM8twcHVu+hv@>ZaX(G~TH#|K{3slsklAOBVKFpjtiP}sC?Lu39hA*9a zBo`jHpY7UM;EOQToFfI@g#urnJ)c|N zphvdi7mMf(TcQqt9y@ll^QS-j=~M6j&mwiVxpu#Nug?==Oq+4tKM8dfIH>N#1 z%1^)2G(Zy?;+u3B%x@!K9zfz)GMtPj_}XG*OhRor`&PA22tio|WSj)YO&G!at$qCJ zg+-h=c`T!AQ}{vjxsjH-sABqau^jTv8y;Zcx^1L9*Wx+MYlhJ!TgqU>eArn6psGKY zXe0GYMd4B?WBrYeTvZH%NEGtukuA{B0D+HCkkaPM1xkei{n;!mUvECMAkH}B^vf15 zeEIRW;@P=t1n?T`z*z@z?H{k%IC=6!RfkR+w#6TiBN-lrBpp^O63=^D;B8uzAEX=cp|A;XGYs*nh&Slr!*ADW6)DCc#l zt_f{|qXvW{jbKwbG(sX#@*zb<93|2LkiuXEq8BRpuxT5*x!zdTMn{>OL?1U34w=q7 z_L{`k58Z>tM4Ce2$9AbL=^CcC)gu*Ly!RAB4QmJbS-7pAhc|5HuI1~w`T6B|nG^?& zZRXU8V>xVGJ7XF$=0_KOLg~;ou!erOo4Q03sdOElmx3U)Aaer}R2I`Hg^W7_T33AB zwFci;NU1qv-vc;xzrEQ&21rD?4_}0 z6g7!P+bJ<(16r6)S7fg%;;~M37r?Zsib0OSVwctUe}V&=9y={ z}$W<;(ow`&Z)^io`%W&!xGkj@o3JzA#tS?lzUYMuT)Lok+x@a)E{w+XrG# zc`fwt1L)Np)r1XVgy>K}!Zo~fWs`zPctuokmvz+A-r+?zZ-H^6VaO%`HMMZ!{v>Da z&LQmGvlBjTyoDJ;(*E&^7q=pcS z$fn}rrnN#yVG;y9azQ^^2iFm(g1OI1g4DPgLdt-PmOiy^lBYYj@z)nu8=Qc$9T+8I zxmb;WO+D5_LB}&)9jK~=$^OlTE~Mk4@&y2$Oee%uSAFlVpa1-4`SFi``lj~UcfR*s zKK7B1?U6_(9#a}G9wfKcalpGz=0~4;2jg2B8OZhHx*1w)#*;}k5~>gffmSkZv%hXB zUu}5)A_Of15?-1y4ZG1-+|EF*lgSM!?l|{&Zg^=GpMKz3PMJD}_wKbDNw-9Ib~QP# znZ|SnuA8=1xCedGB3M^6~qg<_~8cMvapp2+K&};7Wn(N`Cv#=ehl<#blBR3^K)5_^&(a zS4IMkj)Z%J0UIh}v#av{K=f5On5c`@pH@|3A7RFB}JU8_z`-pTmzob_N5vJW?2xyA;A8{)Hy+H3bpkhh`!ul_nd8 zoO;uPY|j-DQrecGif5@i2LY5em;v~b})s(Q{KP^yp%qkqS-!g8(T%J;F9?Y?% zdypqLZe`{6AvPBBw5QX|8rj03V_MjEWGn6I1bz@wRtn)HNP4x@IQ6958l;=BYII@T z*{HN$H7*V%U1Hnd3d%tqMR%F;5_$4%o+GL8lq@X5c9HsJs zarVQiTnS|=Hb)4GWyM#nxrLQ?KW17=pxfKp#gRuGarn!NUhWg6G1_=`dpo zUpjt2KDpm+6ns;?ML#C$E*RBYX>|>-EoNdz$*8ql4i$c=2sP9vJtj5RbIiCAoIHIL zr%oEp$V`S6eSO@xbR9Rnyq1@H`e?05Gpa5_ohQhba}1OR$d~&mm5l+4bkjJ}H3xKL za3myw^4U7HnsS(bg;%?kVM0m;3et|?x`nIx=aNozqRNt0%ZPXl`7&aCpY7O~gF9}c z_h(`AwwUS{U5isH$6=|iuI}`no}TS*W`B*FFkbZb_OWs8nzf};d3==mi9IIrkpR`v;N5f=1nXs;S7KLw>AZ0`aeFHpwlSo#Kj$Cbmqm&*s$p(^MJ-Ol# z8876d$zz$?P{S|gE#vVG+c;+Y2x`3)gQWoqK|dkXHJY3f`36qtg*3zkT%i?=cNi=qb0f=mY6~bZyG(u}!1fJs%YDK72{rJ()(r7@X3Q|gw)(XE=Cc9}XYSl(S>tr$|wr$z+jf>uY(boC%=f5S-&s`&c z*SYrCd#~+UIxJrFvH-z`Idi%1#Ra_ku%mIXn@UNFeu*&f(ZWLtO<*R?C>`QRjT5>! z35UNwHJ2yudj|SV`%*|Ddi#3M`s+=9UAF6Pzy9^&i}PBFW#68#k`WWevftE+jHyep zN7Hyht>`P{*;?>f)thC}wq9;p_#A_Q;%&Q);iCua&YmreJhOQ#lmkR6Wh6`0s|5L- zwjJ$^QDdlSjx-g5h&%;J+z*3 zP{JW;s&yHdcE8XTL9WsETGtO2xpmQcLNCBk4xuneO<`$Ys1SF{097u()1E26PZ2!m!f(vzsel zDiUt%i#6LPO`4QD{P2T|*Is+=TlW0i)d6^&Yw@DRJ-KYIM=5Ui}9Ko_^W1pAd{6H-7myzxjtFqSgNKL8KNbPhr8)kzBe>}JeMrd!o-}f#P3bff8)`UsR12p~9mD(fp30QQ z2JTqCmfydyoQ}F0?pd{g&TP&A`J(x}P*tR9@ybIms!jxeMOnKNx_S*ycumE-hc#dg@Jtr}G?}_~Iq(ez1L}lI@8K5955~frvO5?*gE|j9mvr2(Y zRwW_UvRDD-&?n`!Qj=(8d}E4JCXVEt`%GYZLmdmZ^>f>j^~~=Ypd19$cpf#LhbIMv zAWN>$PuA~4DWAbY4>^Cp>e1_pvzrA`iD(QUG)dv|%lXTgvvxB`4{gU4=AIhbnb(&` z_vNj8ETA+MQk#N}TcK|dkfN=vc>qC|@B59>?Ho0F%@?NhgwgarO&@p<>?=t$5PK*Clf09!h=z$4%l% z7bzTslnmszFjVS7NNGDMBDV3Z7-NXxV7yorP{&S%v8A<@aum@X5E5U7%xG@{Df!+* zFYx#iOYnVdM3AD9gx1CkD7Nw5c?TdiBveQ`(DZlr5iVP0*aAYZeS6R4^XJdMw|23>Ln-@ zqph9woXm$l^O-NK`@jb-+I6E}=lZ~f7mXM*X7t(7X_RPf=CE12p|pe2AxdjP4dpN- z9|ZIjOY{{=1X^?E)KT1i-f^5iVyjtR@I>Y#bGTN#<`CFIFT^DHAlk2 z6$UZvM4AAqGFuHRVm|<+5-@cF&d3(tbI4wdZ%9{L0@!(~j+2Sl*WLaaQLs#V7W=ER zVc1F_Yg2_A5hQbfYOQdzLvu|BEt%0YW~Pu#j-$mJ#nBTd@tvb)@vD;$a;F2Hj@iXy$aE#&>d9n5H|U1p+S5t4Bo=5OoaFAGER0xK2LA4 zNQ0X~;!rGS=^9u`*U&}^ewLwP7ej@umhW#8O(R-mrFT`->eo>N-XPK&&c;y$iMcU z%9#JJ9Rb@0%-;pdex@S|tillvB|o6t-HXVTKtN3wmQQwHvEb6 zhjAkjEwxPAb3EtoHkOhKk!tv1SNW20)n%+yl@)l20)A+}w9OZ6_dr=e6)kL#au6CC zYDVFR6k3P4LXz}q$z(=QpP4{yW+H9%93R+wB4)vSnA5%EdJxL`_|7*Sp^H-i2>uPd)bdY<@r@~dcH#kyZK~z%w>`$oJ-yT?lkp|x{T{l8*3p;iv{Nr>X7H#AgGHNt zg|%xoVME59ol3~3qO55va4n)&4b8Jpxcud@`TYDJ&r;`lxNgMNf8+PXB(wSz-)g)E zG)>7g35dn3!dT+l02^fxnx9)P!InPT$TLYngzt^UFu80F-Q9~W`+%gF&o7<*=BVB&9vR8vwG#qeYM$Rnjqw_x7^K|?)4-RDSYMIOxYaljuy5{t8k>GR4Q`C z4R^uH^;YX&kVquNGtWGoIr`{h+1$B)*NuJyYkP0Em(Ar&mgTzaeaPO7ZLULw5re-1 zQj*Fs^Yc)mkvO3yM4}bs^T7_out*5!^_6MEsuitKN!LUG*EJupLIJUG4TQ?<2{1t} z2xC(+YSJ*O2|c=%&mA;_hE$RusBpEb;~%!Ov|~5fXyaJ!ymIW9jH{#A#0AHi$4F2i z3Acv2REwcQ3M0!aH3&i^63iM1^IZ&i#ph#FvmDE+QBZNU|7vthy zfA_oJdqfDKrca+f1e)HS-j{yy)1N;1u}^*aH6P)jhaT>odg|#NhaYytde?FF0}tJQ zkU;I>mxCrt-xGCX+xg7L&t+6=+VJ_6scNMo7|L&F+rV0s6bS89(M|0$(z433_dnxg zr>m@Rl~R^|=ODFX6ze1eB2QThlEUGehtJ?+2kpVxx6Nku+HKT$uAwI)QM!y0f$dHh z`kvW$VccOdiE3z0zED@3Er~{9kt!x=B~UoAb+gt2rCn-LlKY-p#_#TW9wh@ivX@mU z#2dT`(Y}skh3#ia3Qc1sO|nYoK<=;$L7{>GJPF%+pj@o{U8t*6E(N|Slh0-=j2*2R zKWRc<2odZ`0RD&8@}&l!H)+zOm!ln6nzxD{-El98h@KLmy=?2%n576@*Wqu^z0Au` zz64$UQSr~a-}An&0X+8Dqq}bK>s(*^>X!kSK7F@mqCvPA-OAZV>_x(H<2h_x^=d2? zQzJ!SI+~8c5dob;d7jv^4IvZ5+K^hj{=@neMP16XDuYhkO3>ZCh}E5hhTM!Ul^|4= zu0dNfw6!p6pQ)TSaTM87+2EOkLO3RvXrW?x;;0K=d5;1WTD(AHDO?R*&{Z+ip50mm zNFiyh8;j$3XrV1l&Ak7px>5)NX*vo?nWnX79AldHprdXY38$5oWG(x&w=li6(bBI} z)ySe^p{i6!MhKqV(9IuST82niE&sUXYs7(MDWG9{-aZ3%VsUH1UfDuCMrm$p0AT9W zsbbl(W&66W$Ki(`xe4GmzxesE$1`Tk7ywQ^_0(oBkvyQkzrTF%y?1YY@~J1r1!178 zyE)W&(9y*47oWj#`%R)0C|sc}OGJZm(fAA&wy|wsIi;XzN9QK!D_bj6Y?c2L%xfLD z+~Y9=kE0xXNSN2fS!p_~zm$E91 zXhFhpd9t$$zZ_albXA0mBj)QlgQ}vemWYIB_JCs(01F7!E7v1Bd%+Wi`e^~6I4*i@ zJB)1Rll$$4Qod=OMwF`R_PwnpvHu;lL8F6vcvm3$J0mk&ZLDLAjvSin$C37GE7i47 zR(MAtaIIO3@fR{iN{UeX2rWo?b+puurM-SSuG@egnpv@`YR~E_u^=e~*&yKObC=@# z678s0c&-ZtjXg!&a$qWIb_o8lJ%gwSCV`qUV}=8;a^*@5Fm3nUfBDs~d}Y`nz1#Gu z0BqW{iLqnHUh~*vkNr&wo?o(LQFQxOb99YNBOmhL8y!XaNCV$0A<26LT+gb3kP+T>NqnBK{JTfdhTCFTnioA0BRF$ zAuU)?Vn}xe=i*3>a2&3^?*)E#`_o9F@LUJ9z(M|NR)pC3JsNfk<78D(n@W;!BuX2U zLX=`FT{WoC0!k$_N*l;W=4-b4SCs_7;v4*dEMjZ7899L(J!&+c`uHaw{qRRW{FXmU zchLaf;QI2Hzs$^;GkXs^;_&iQPdu3b7<_IK*FF3gm%Q_IgcNq8MDsC;bTo4ot>J|y zUqTM$P@t3Plt^bXH`CLjue(;2^7Q5&e62vZRaR*`1pZemP$Da^NaaUpLtk^GY5zN7_)BPwUbq};Q;4!( z0US1DpuL`br;XvjQ7vSB-_oc;8}Ko5!eIU^LS>7JDUYa9EQ=*fb;RQ~Xl!lU^9n_% zH0^a`sZX|`l{MyxX7IMH5$Osa5Y}BL*C2EJtlwIShD5_h{5%N8Hzym{3^H{dGw@<8oG{5@Q z&pvvaz=~xn*=PT~uUxWd@dce*IwyxgSoL%@G}dz18HaM(X-BZ< z)G;*Fr6?niQqz=_bfh~N^ou;RaT9YkY~_g29qiH8K;94VwL;<$>M}jKt>nu6wAM`| z<<=60=6S}?Dl)Q(@gvG43va4^v-5f3fC!MKHynBH8=uTMFM z_ucaZ14YGE$L!5OzJwBrP`gNr5sCc+c1!}|y=Rk31VTx)2u!A^ZCl^*aHZxaw>`tX z&o3kC$zl6c*?aI>sgKaQ$_ct+&n1OMso~6knpA?6=f-N05%Cfo$*^f0B&Y&T5E6P4 zv8kdVVdl2P{C}iG2YGZ~A7X27eAD;ZYp(-0cW&l)zx~~=1mJ&dU48Y{ocFGGa_h~v z?B__iI8;iLD~j81yN~ysa0m?v7hizX0YXTW(jhK{zB1e_#5r@NE9co>8-RXRuQl_Ut-CY?FdH>J1Ae#seQHJ zFXBuiE=ddsN*V?LSi9h8B!oF^URZ3cY@?oZ2eh{Gwi#1Vl#OddXe?|M!c=IHrn{5~ zCD2l{qa&)hj3}VkYqNU#(LowXpElKW(2#CNh01{NB7oXXRNo>YD{?V98qptJu~Jo9Bk@r9BwdFMgJpj7{1Vfw))Ji1jxUUDveb%(zLFW$sLFUn+3ON9 zv>rsL(R~B4AkuAr`^P$fPrh)KgCIP5)-nFLaTEB(FMh`7KmXapKmKt?b1I$Q^3wc; zfTLrIn$W`OXy&AMpU8(VJehqbbP)PJML#ej6%>w;)TKw#kRHKEr5RDz%F6C_+`W1W zkF43u8M}{TY^H`{Xml5}3@HT#I(wJXR6Byk^hi^QDrMN0HW3vv0`a9V>W6Qv4IUW= znePjb!lSRSm3%&DgMWyKj(DMs{IyaPghNZp+bp<_UHj>IA0$A5pCJDyoiG9fKvp%U0tEYu@jd)g7D z@YS-s+U(n?%alx~NhdvY7$RP!br&VS6w8D{L#d4J9UT5o1Iu`@iLf5X8;fZ}*VVPP zwc>#XADH*8Z+(kPFTHfv2;hHl-FovaoPYj#`LW~2ZH_**>z-T0qw^QzNC$yME-OWS zO_F=(FJbQE3m{vHlFVT2xCzezTzTb{yKd;~T&JCO3IKcWv(L){X=oOX;QVusqa~9e z^h30;CO@!4@Yiw0tx&kQEbi%N!%*G?X!-Agvm#!y0#715$M^!o=tq5l zDd=eAz&*!v+QgBF&_yc4(^pzp$s5MOdwr+^hw*Nt? zfQ;Knb9$`F4@`A!$gDWv>x?@tK)3IABaW*T1-uU%a%O)dPcgjv^^Nq!uWl>CJ6q zQ~y#*LCyjKEAw(~6C17Hc<>(|$38l505PQ*ChX%YP#pR!VvLd6ZI zAHj>=+xhdtHDo;7VY11dmX%;g)ksH(>HrRbaIBt$1NeAJLAFrjTYr6=TOVIaCXv92 z`~m(0pE9&*uBnLopGlHTr*@bN?ChH*It;+~4L+x50EUKZLs89I8YD-$m>^6Zj zkKTuTF|gH8_zFyMb&K2}oHfExJiDofVmUAYN$Y>(L}K{pKsspGsm$w9!>&iP)kA9w zI`SQFt!G4gBgIftpMXpzMWGZ>RvKRmq}4zd@f=hV3#^DLT>)KrzY>8`QJ^u56Qu*v zZY?bh6OcG2C{$9Ho#y}+Z65L1l@6_?t)_cu4aM>xQaTn_Q5m)#C}=()70_rz4eB5zUD7&kI|&^S5Q|afHixyN_k>jz$JbKB1EMewJ+m ztEfx1P+!wV!l^}tWiz4H;!OpAT~(1wprnfQWH-h4OzWthUFBDyT@b!??b8Hdh$|)E zJ9ZYIe`p@*gy5nXQ|K<1ETbSq2^n9Vs#pk`BwGk0mLna6Htv+^RFbt@`uM>ub9i}u zHw~GT9gS(5@VxmX=auHg0zc!CNF@#3_FufX(i&ANS^+Exo4Vr9eT)#0fC`P*M6rnO z?2a%3x~8U9ELpPn;-{Z}`oG4bWtS4*zp)1T`yUI#@LZq+t=Z7m&+#W7!l>p(l+x6v zQrtIx8Na#VE?BcMQU?+5|G)>&n>Y7`rB_^W1&=-U*sdG-2G&c97N1!z7T>0|f&3o# z?h|?E$%hzo9oy<8nq5a~eUWW#RfsDG0pELO5q-s?Y1i+x{r!51e*MbRNeV zXk}6Qs!E%k7zI7N^QkM002C>wmX7Ahcp?cxp@c>ViHxX;J9+;i;&zFOr-c^KJG7ph z-;ETm6}{3i;8kF{>{>zEkvy}xm+w5bkdmX3+NnTfg{jJfQjFYQ#0dk#)z%p4-%t~3 zO{l6I8kHTZEM5&c0|MN-ZOaG3Fx>L|?;fS8xs75W&z^hkx$T)}pFPv}{pMKDIg^Hc zcjx0@zJTw3;tZyYX+wt!Uj?8{5~GwN?bb80VG5aKqfMTS_^@%7Gju!S=PaN) z8IchjFv5K9zyI7amURzu=%`lGu18rIdT=q!k}vfkw9#2Gx72_w-;hgSC8Sy49c<67 zr4$ybTDnyZjdo1nAkhSNPekZ=L9OR<^tg7u`q)c!q*KgjZK4?ZR=u=JzF3Hu@+t&4 zDnv;Kp+gj!nq-0{8@6-BpC4x3wgJ+fG1ZbPL`lzRq*U!OZGSIbB?;0o#kTVEwf&51 zCCO)8R3?R|!IJ`Mjk1IV^G01ir44g2^nHqjoKfrSAA;rUhXsFA5<4)m4aT;^)^1p^ z3Wl-(qOq~z?n^Jd^mh+D@Id*$;-`LBVo<4+|h+WX$5F4rL)QI)n zbR{3qo&%n=ZBhvhHL(9QnA}cg^hl1`Ya*Z9cPdjGYsiNoJ;f4R2a2p1$g-rnm!CYp z2nU$a-pm1`+t{nQf%=ru|5s&=BMjwKRSV7thB@;|GdOb3vE+&&Wk0YpY?r_-BbA^b(@I<2B$SkB6?Hq5 zF{Tlr!7jK89RN}jBFK2PB|Epb3n<0W`z z=|--&aSr*SPdZ_=5+vr{8BKvVSNTVutC-lMAz$N>txJ*dE!Z>+5&uF?pj$L%;vav1kma3SG}UByY0X9!E?r|>-|Xjh=FFLo09^h3@9w&JZ(!a3 zz};-!(tFynm8;^0`}7kJ;;4Og!`C_%Cyg4G!cyn7ig@!DaD^i6IQ(P9x=0Yu1~By| z+mjIwU&b}J%`z&IwWFHh$bAs|?Z*Cx?#a*3ID+3CwLjzPGYpgh0-z<8Vc(IBynD|{ zeD|pR`RiFn@RQ>YWY(xwHudMZb@^IuS+<#H*LSf#J4nCpqqN484pNF(emDOAD98$p z<49T?Cz6mELggcHtecuN)JO~Jiz$P)+SaIHC$SKcTzQcG>?T`@8KuG4 zl2Y);g=<)_aXSdt%#`@sZnA6|4eGKL&Ky3o&fa#q4{*$=zviESrjPc}(fenH-;Sd3d(4#ps zj@G(K<_?BoOo!A$;AnxXJX~eKaY)PX(Z;4$3Qb4t1Tx7XnYWV9 z%zlBz-2=F;gDYHw@W}c7Z0lV{Z*CJoY*HgFwj-izvxPR2w)r;y59$R|QTe_iSv=rQg*YkzXeDZ6Ba8u7h_RK9k?x|2R)R{2Y4y764sW zTPKz+UpDKMQ%)(aTD5A|4Sbzz)~s2gv$GQfPiC`2=G^LN>(NJC{)CigcZ#(Mm>>)geKvo$#~6_ zv|vmPoHThPIbZX$=a;dvcYv9r+GtKX6ho6>75zc-<$eMckZ{sS$3<#MXr+{mdmr)I#3EvYm!>yX``+wbOnnN<@HEGUv7|~?3=y#@~X%~Le$kY{C@G`Mej)@ zQr|3>OQv%;VU%G5EL~^x0zl8$YmffF-gNWl&OiTr7A;!zUvswZ>Hz#3>$~4IRs8g6 z(@$|->%10*+^Oh73=Ve5opM<2j?3u{LPsh z8pM9&Mi$Yda6PC^z&=wLci?pXdcm>0fA5LZC_ym{aWqDXRj62|G&-D>)~HYsgdrtA zq*M+NLQ$V~m{?!OeyzZJ#6k> z%+{f`l!IPe;ed2e(gM4{wBLn95r9<$jAY=okQ7ypt$i!dDzFHD8Jn+2Ef7i&N`p49 zO}K0r$nk}TUNST?X`BaR8knUm)aOEKi&eS?uU4hlHnT=U-beHp0AMneV%qMz)d0Az z>_*BIafN3og(}uvKnq;QK?$GjgXve@j9-!@t>?*(+NHO_GFi0;lhR2FI>2AXxCkPgL6PrX|)+-yM{@l_~ylD zpnW6g6KO9=A#Dp(*qNa{z$3t%l=PGX?q0pw98^+Ru^o&!kdklYqR^3fP^e;RxtWt& zTi}t+oP5+wesuZ)q(qXO?;~7`ND{(SIF{QUYPCaZUg=IKtHLL2(25TGw3MV$nh}{M ziYg%Q`*at}Z0arHx*qLy2{NurO1LN;kj-x;U)+u>)6`{}sqva|Ws->0r*s)9TpJjy zbh7jaRf(>FRR|fxI`Jy9Keqo;N`a%n6Ow$W_}s%Uku45_o3w|y6I<6J1)i^H9|};? z^1xp$0~5mNy4Xl2dj?VYoDCdm`LZQTuWoK_S>4yu*Az+BiOFNw^OVE*M5c%9 z&OVIa&Rxxg|9par_MOD1W=^yN2^Ep4aPYos>SLDEf|1QXMS&y{=W z9o$5qEO=FkIJiq`#yYWvKcKX-dIJ$WU`N$IbJeaks(F$Gp45Enh#9=|&ZpS7qk+kd z4U_^!r~_QB@e&>{ukYhKe|?Zmy#;E$1R=h8{qW6&l#0q<#PyHR2O3SJyv;5O}Ujp=yMt*KCQilRall z>lM|iV!IN6T`O9@yY_c{?JHm1?}tDBapeyuj^v?d7eap)d>;^^p}tnn*mKYPlTSah z>!!WIHKJqWTmcD%;ecQGp|jX~@<@iVMLXZqNU39klwlQ*ML=sHiR76rJ*?k0012nk zDy*(J-bf3;_R1s0JkxSD+V9Csf)BjySU!LF9w;F12PUXkK$aF*(Gp>2v7#bJOcggD zgWo2urRi!&GKyB-a0JStWHI$Az;>fG>*}|l#4==}$f=xCfuU!j(P zVke(DU<$KFH*(42FY^4R?R@>veb|3=69Jk)30zXBFkm3q&OoV$q)3r)Gav+hP@o(Z z49i3q5T&qsBSI=8^s{4WYz@goRgkSDG!>r=qu?kA@lj>Tq^3r`c);#_W%hh-IQ7+-fG)g#@TcCL}9J!dLTLoX$*7BiLEVF%Z02TNk9Yn$; z`0*G@RKJGJ$*r_UzFekIE*W*so*_Fr0u6pgd;2{?h!TM3Rg@TY=k|zZs%z`&#NwBi zw(POj?qbQJrTV|^Y~3{i_&3&--?|EbTW-7cF5kDzkfu8H*byef?$0Aav#E=v@{>L3 z5Q5sgA`xnoH1qY>46#BO#JUhrF2lBXD=>c4xakWQFM4;WR50Q&?ah4o$`5kMdrrX9 zf^5+TD}*d6!mu>gj-{o3qG_>fRpGQ#oqWkRbvzD(ktk{RT}VT^owl0E^!cz)TRk_O zaX1HzY~zD>J;hI+U51p9aLq`_%)A|h(v(zzp;8~&VlSmIPpq9QlzC@5wD1ZU>+cIu zVGu-0d%F5diI^H1fiblRQPPe&q@br*;N0EEGpV7TYZk1cIg=q@_W8*_p5<3}&!-p! zWLyyuERmQd*qaOg!xMq%S1ASAT#lZ>K~zwLMQgxU=!Ex5_06gdOf&)jK{lT=oPGqX z-wc5vnl?8yxyx28|7rAnVfAaR>5N}4nMz)@-+>3n|Hk0ID*^a7*JYP}1Aw(_){G$v zDN`mygCxl2;t!;QGa!U0U;M!j?YePqY+VfEWDR5*Yx(Mz-ouE-dT=1+IHX*cS}#Fu zGC@ruK|)F#p+I{kNGapU<^Wr>Ip%HL7E9G&4?(RWcehv3{H-=SuU7Pn19w#yAqe>S zi3jt}J;xJ-K`f2y6UG5e3uD8IuF^8sSV>-D+LHieY`!8aSjwWB9UZqwRjgoR!?QMB z5#RU8cr~=vj9^?tJCj=)*r&aY5w#xug&gy@Y-f2_j_tWJS_YKDL3*-l>FilV_rMzZ za+~STb(&F!*2Yd5ZDdq!>t9GksG-)AtQ#8OtFz}BUcIC$L9^0rIJg01ioWG(i=863 zcf9|h1mQ^N9)iJqoG!e)bV;JWudfc!NXd79^I1N0`hjTe8)G8-{SFpfh^DoE0uAYr zKww4^NF%jONaV0rLEgWK0A@b@Xc@-*dyVP*WD*TDr8+2tkn|*%96p1qPoBl^=B?zS zJD(xvD-u#vfR)mi>PTrLtPru)u-2L|x_?!jBWbH(U6oA692rY_(K-_IF{V&LX(SGk z&^lO}IsA|x@QGQw@l0ngcfY)v&tLNp_bph3kRd`kR&g^ld4$nF{nzF`uiZ~Gb9*cC z+uPSq?_icdD0pr;^bHsv4Lhc)_E%Iw3>zjm3JQLaY%z~?UFaS}Y>V~$#bsaonhS90 zH!cAnj|PBX*xQed*HW%Qa}B zo9dyt2BEY8?&J%xcgEQ9(X?j6O5{_q0UieETA-DDDhmyyv{yW4Hm(zs#7A({8!T>k1SAk z9-E8_inNnoE&1LF`*QZ4qv^{PD-LkBQdg12y#*&3N%hM7QfMmI5wo>yRcGmTN=Kdo zrt=_`G;MgT4XRox3rY-Ws2N3T{UoF|NkX7P%3+?SaxY_Q3lw#Z&cQreizPPXa3CUow)3o(v!XBw1!m9K|Gka;=aPb`I&nqta=hNg00VEP-5&hfFY%%784j zCJ-7|d$iV$r#9IZUsvSRXT~^@Yu^q4KVF@S|Eik;0opZzH_}BA5mrJXR6r;ka=y>$ zQ%AGMyX*PTJx_D~-{$bslMiHabB4f|D6KH>LdAQ?+;sD+6cA`@m{f(fk2El}HIgz7 zf~Y-SVPlAhZfH9I2BfLtgwqj%(Y3WqYpCU8e|wzKc|p?i5K7s9q7cfAbrc|#fPcZo zr^*N@a+j#+WSfK~Une~Q}8Qa0uZJR2eYav7~m;LFIB}*QhK7BgNmMzm)lD>VevgI=ReD_Qxxcdy+zXW9e?vgMdrAnc(Q{}iovFdD25 zE)^HO9qmplRep3(MwkGJ(m|D2nn9x1rkZK49}AJXo&Z-0Tv<;|qLx4f1Yw@~vAV_)2;0_!YrIqPIAdL-yuF&C>FzRvzKjibX=drP;h)6gU)1^o@*2*J` zf{$Ac2_5hPL)j99n0|->rYV#KauPEQlm~3w3Y`_-cF&VEwKgzvR6Ae&_J=t5uo(>Y zWRVg=Wdf5TH19(zlIc3?YDS=yZ-t>`RSQSGrV^xhBMLS`Ae1$T5{A<+ZAZaHFjVYA zNsViNQ%us(&{6kx6)T59YXK&QhLRuo7LLM(YwzAW*Ma!~g5_NNbC* zhzxh4rx7Z8h6czMau%5D8g%daZRVS66Oc-qq&QHq-%6Ayn+}!06_R{8PcD~3BvR;A z>mXME&<*vCV(W&^F_R}xW%cTnm7-q_&swCE*%MDZan9X$-~C@3{C6b)|K>X8xZ^H< z?wM!y$mjEjL;~I1VAWcU5Q;G?5vWiVumAJ)U)y!ZUiV~581$D3{xc7lF0S~&#|iR9 zJV#g%y&~;-)VK*+(=fHAj>B~;F#!l@^jsi#J@(U2<9l-kZfvBz{AG_fOJsO_vcdL3aX zeM&$=NPhaH_iat6! zgtKZb<0p+|zXNw?+CGyRKemH06GqV9(M&1fFnh%&GM->+b1luu48YG}B8A65xsReh6c_Q4wL#Gjs84wO_>@`v z^7-X_@&3828!YmO*mwd z4dlu_CNK&~h&0T55ySrM?{%ym*PIai_NBG_`K2`o&oz#Nii&5vvY!Pdpyb;zdu7~V zzKpYBh(YRy0ThZpg;3F4pXTsA#&Y@5&Qf29MYNaBYfp-^0U@Lr5>%<$C*=8`X$x%}`M3Arl_&Z+Ph!G9^ zMJUYN-BFSFj?r0{S{l815rT5@b&1`Z8~EV~2Xg42?lI5Cao%{<@@koiG6(GyNAAPE z9WC@)+0f`viUeY!sw=J!hoQ8o3i`Z)(gebS=VctAD)Vvd+%^QIQ97WtVLX{+GbrD{ z0fbvMt_Wkv;+PYUKud>QehUM+F0|v|MglZ(yw;XuZbX3uAx#OFo0e|kyN|tS=Co+T zy^56aA_E~LlmkRyT>JtwI#3AdLZ}Euh(h9o=6$u**Ra=q<2iJ%vFtZx6eAnz2o)4{ zNU2c5FGu3<3LIhK8G=y4tkF&EJF10eHh1%z`KxJ4Bsg*M2*x(nl9CAm8Bh*}*wVe2 zmimd*B%4k1IpU7}CsINIp;hnG2ufj*!J#!|OT7jyucK-^()N)kd;`MMk}ki*yY?85 z5Ds5?U><{|GT%OCe`AoOeG6#}aHQ3nVE70?8_AJMVxWez0^%`%tY`sf0U0Uj9xCzO z`{(lDiz}&1Byog5OAoCB1cE>aB!O|xjz=c1|FblF`~U+(L-Y*}nl^s*m_=*zIUN{` zWz@9yHoiyDDC8Pz$LBSUwLXIBO z!oee3d46*@|5(0>ViRG+u%wXG9zfpjK&j5vzMv^S~TK$MP^WC zmLzugWBd4A;ZP3q^yjydEo~=M0m35swTzr96^;^yKQBVG2td0yLNHVgdHb|cq&>-( z?w?C3DD$mjXOfg2zU}D5!QOUTcEl;X8g4;X+usU}=Q@N69$d7ZKRmLKwcGn?NF|ZD zCV8-(A~15hffj^9B4ZZK4)^6Xg1=+Y{n=uXfuSsgLf%aKq^__*qKzvxVtJ>f@B!&0 z)YViV8(Q1%sOWzPA?VKz5tIYt>bGhml#K~nT|FN7~5aJcVA3#c31Qz^)SdF?PLGA}LYAptTXOkqS>{XsH>8(1BGztRM-aNrJh5VN4A(FBj0AT~9d- zaD_aKzsJVy7;krF;DY9Q6+?kQYQ-UA zTRC7<6N|ft_}j7#T(@u?AKrHo$4}^>;0N^Qw^8s1>8P1NI@wI9d}76bs6^jMqNr@( zHM4Bvf5Qznh3`E4E_ zx$}7>3;6zV`^OjzX^#{~M}$@ZGC(NTs{NVd*H9oWW5n!Al%)_hrad|bi~Q`~=XrA3 zX8cf5pN^CpLyJ3btdgcScm%7(9g9~*hzFb0#;y`V3>#0lu1nDm=pE=Mo6nny-LVdw z!-BsC*F|sI2HU$Uw>_PKni_=bqE#>~nT|9AgHSOzIAn~tI=8{Lp7?2YjOdspgb2U% zl`r#y?_d3jkG>ncx$g+Isk8SZCt-e3=R(2Z7UJhwaiFR32T5N zhgEeKU3Af|8@H2n^fAXUI51 zZEjk;+GqhNjR-@NV8jQeLDFkkvGR?Av#P4Ast_fhe(jqnO zQ4wPfup05k=qJJUp|upsgU0q26*oH+K0+Eh*hr5)oe(V8(!)0%UBEyPSSjV|YB|nK z%#j`dKBkIPJ_<>`q-d;h`O=vOaP22f;k?6kr@gTj0TfGRf|$QwZ5<;`(kG*5Z>xSJ zLP*oekX8grfmUTeQwn`T6nnPS@vWowg_f*`6=bnDp?&A{%>`(w$## zDpa8eBMhq4v9V3;42U91Ma@GCZ6)PWEa%xc@DhE4+XyV%Kr4&XkGT03_dxYCm3A)+ zs{vp~Cq+Nt;1O;7_Oye!bLAF(`uqy&Jj2F7Nwk#aGGnlxV+47u|Am8Nv;u@QNu734 zgt!tKlOB&Q-pGZ&xr_T3Za^VOI!;BmAqwZBviBowN7di~S*gP-L4U_?gp~C453+Gf zCqvn+O$@3`ij?^xT8*L|w+V|BWYtW5lb`j@1BgBt!iJ_<;}Q65{1` zao_9ELl0%;@)h&Oj2pYt;1A%dU~4j!n6rHOvOoN<1pi$Lz`wEbr2;_^#zWdz#xkPl zI1-Wuaqc*z-+$5jzjgif*YCPy``BydRPwnYB-W4J zR++j={xhzm?cBN2i4`arGEfM)Z`CHsjxf!x>Q=tk@k^W5b!1l?tMNp^*+HnNEnZ?w zV-4@vV*-wFNeM|pI7r9X!|Dj6r%X3UA`wy=k9ld2R!3O+oBeyGQ7EhRUkMVzLK}re zMk_nhHB>5%BA_POL~XJKt!0%Mi{9xd!6>YmZa{Bg69dIAq=iLD?GU=!YQjrGB?+wn zP_5_k^yckce9t`k@+D)eGRzTCR09~$%0ZL?5uk;K4x!1Dy!YVA{N*Djalw(hAsxv3 zCP-_Pxh`u%EQI+oR}-2arz;7W9V(y+Fk(L*NvD>^Ob6|C6LH0V&XlA=;oYia9UGtTJA zZKSjBWh0sF2vZOUKnem2){I4bsDMDtYpG#2zp5&T7W|MyMz(O(G5he_=a+Nq(oPx@ z9!iA9vKU1`V5xjj^61&|eu%96L>v*~Nr(P?nJe#oflu8uo4#B~ZPKff;w294uRYMm z2LH-uQ0>5U5klaHA)VW|(>2gH?0pRzYe}eLIcyO%ohf&J#lTS6q78|IGQj zYXtBnS2~%*bq#gIba$&xStSsTgH9!2D34Ownf>Ua2kg3Q!`C5)9KtitJVQgO{|_{MI6T|6ofo(EScN=gTg38J4>Y1V zHZu0MM@Rbic9tzebSUU`%3MBsF5{XTn9^L&q=p(s*QcoW5+oeMUoWbFa$v^}p&Di# zToDJdcmOHly1%;Uij`k?@}9NUcp^nx{a8zsM7|i@FHeaxZ<^jb@)Ji54L) z3MULfB+!I7cI=UH1-CEnQ3wKr=h-fa-0{UL9e^OR5_G^1ICAP3K6U6c_8Zqo zITQ@!{n&WL=nRNgpe!O!2Mw`Kzt#bslfacpJU30kO_OkH@SHS`;~|9uNNSU9WD8yN zmbMax1sv^=_caMA_~9}8@XWM+e*XLt9$d49kIbCRi4)r?1wCx)FVI#uo>a2YCW5vb zgtEA|D*I?c21|YP=QmRJ3rOJ@bh{X?XeUL*flur>i?8D3$D<#Muot!yQAG2uJ;t$l zsK{3ydXBoJs$@x~rQae`9KN18EV<}uK9!N4FC@IM!i#GFzCl|3|Yag|qherh> z8p%>e7SaC-7^&ich8~6h5JFH6dFXF*G0@d(lINZw*s>i!C%lBHudn-JcTZ3Lkw+eR&G#~T%-DysgSq7Zmw)TZ z|Cuw`*%gM~+&b*A!#akBhCbTU(_=ou9W79ou27$(Kn&%f-6ce9^{dA+qik@CT?E3fd|)aW@*n5+w%on;W9FlqBbE&cn(4fLM>5| znUC#AL>+Wd-C&I+Uxy#8l`nH1Z<}74IPo9Iuwo;Q2^cJ=QK54JXCTk%QFTTH0I`}$A&(M1M z@|y`&fRv66f->f@$AV3EugWU0-Ye$JvVyq~LKqz-gweFMotUG>cCay9;*WEeanz(y zw5MHsWkw(ZZJ%MKT_3qL)+Z%vx97P0uIIS%*`*9*%Vb=~>I+1;7;S&1d5+S~*oDnV zD_tcS0|

s6<=9k!B<_l+DuB(_?1+k=d4gT_JYZFLCG8>H@yJ29eDV-v~($CXR-2 zBS1JdvD64H@uVOa%988qF|V^^O(gmwLKVJn#>uCAVezu1{%f5>U;N^ix%%qw^#ELP z`IS62XZHWh87y{%@;A5sbi<8xmtS_tpVzHhdlrD4G9ER3EcgKk*R-m-dSStG2$gPW zZV~(Lv)_jvnf>r}0PlO>dry7*iO23)w{|1%de;Td-hA_44*?iAZVVeXZ2GUie+M2o zi|3wuftJ>mkM{QT{s!P9S65WgynJ{SWhdualk^fS>FVR` z+vb>xUOH9&;^GzE1gqL&!wr^FBq0c>OL@F+pQ)U``#46_*Wd|(4h`2k(1LvEQ}7kV za+$6|iIqKBmh=p=dMHP>P(or zsVa(rQQ%NY(O5HrmWD}a-$zJkEeWix@i4iAN`)25fbIRO$(H(%jzERNwA-Zt(+TOK z@IgyzJ&zZ+^>fjk&yWoRke;PJDvR8iBGSs0=b*LblXRPybqc z;hT<&lGdS5TPbGe6;*yz{fiyw88N;?Q0W*{?`ZxI2wVr=e*06jB|Lt9$}EHF z0Hm-$R4HTesFWkYQQW?ulOH|2fT2>6TIr!xXc&{So77lZbhSv)j=?|bsCWXsd?T#bFuVl>&{zjY><@cR zGCQPjTDBKl*>zd+%^Nj{5%pHM4u_?OnZh z*^=en8#Wk&jp@ZCfawr=AP@`zLJOfK1cJc<0vJp;VBCUn#g-*Ywj^7<>-Jtw-`$zt zA2YjW&y`F`$nT5E9Y6Pxb#?DK+s=I2yHF~5#{ZqbAnvDeokLyo>OF`E)z(~wT{ z`r9AjuAPSvY1am+X^3t;z1M7aXRRU7WL%eLEt$)^&RWTemIkK0GG1VCZ8Gc=ScNr5 z8wWKhC21j%E;u-hl}ZejJPwWJ*grZ+Z@x$ZL0es#d37n~H`URWNs)G4Tq#U)ff4Uf zHX)F)7O6=BOptJ$By*bAfN+pfSRo`)OU8-)1UO`9ZCFHIx&_ZGFqZFTvM_{nt;T^C zku|c`VGkz+(8b#Q5l-bq4_;V=>snj;5b5q%;U1+)ItdO=O!Cs7JiztmpThH3&86%s z3s_VTND_`Q5Zc){!I$oTlHWXem~`4D;}{UER2nHv#qTI-5*MwJ%24&N-6R=yU_zrT z6?Op3c*haOufPui#wI5ipO~;pNKQ?He*A|n1aKOVBncOW$6@1>HcQYEloT{{wZcWG zAyzCx2RZNm0Qd6qLgUW3xiOsz;O^b(tHU^U>+~~j2BA`mwbi`B`QIH(u(?2f|gW*j!c@4`ZP&tj=QV^ z3plF*gRu8l}DJh$i}Zj%%rFeInh4@E9Z|e~R%!A5-Na`+hD7DR716rYDc^ zsfTxS>AViEzvyH-vq?$;G^AQ7RC4&rxDlGlSVR)NF*4_LP)T%+w0Np5SJ!j~suWF= zD7nf(+5WuNnmQ-R*S78D#>WrwtCw6%b0&coXk00%OC&iwHpRCe-OG<3Kg2}7Oug&i zSPcc&R`Sw1EjV^$DbP4dSLvmp<+KGj8*09cs&H4xr}Dog;gDdPPffqZk{XoZ(;3Bmn<=%S}3af=aMlgP^ev&O8Yz6DS#&3dxml zum^S>uGvH-pyqZ$$%BzG0G&)EM8)&|qVLK2^&8l>?J-(f>mL~#&7BEw{ioi-U%%nG zR7zz#2Q?Lh(y=N}hrlah=xOr^M^0u!k(MdmaM#1!v+tPEV!+b>bTF+Vt|GdPyejBY zz^U`w_{`;}GQY9jwCMFTr@-iNV%6F-2RR)Y=1i}EtcsoxAaMwkCO{CVfP(KcP$<%$ zt1wpdXw4*<*O+BRa~%msqLiW(7^XmTW;Sh&i%`n6ZA1Hdp*2#Nd2!t8MmU08ag@QS zy@t4@Ly6%kz0zpbOOmc&_s9hAy!|nbIK8E8BEH_4UM)#MCmgRW8(%M~W`1xlqdzVAofCG*Iu z*vN_6*1wSEc@p;XsLeCOz1LlME zsq_q>M<)^cyU}|O142t7#G-`@Uv%*Bp`Xk|r{BM3K!E?l_0f-gboe*--18!V)RZfN zsRDXlt9{6A#@p6}XlsFD#kAX+o6sAUA{Nhqxot3(heAmNM#}CZz(@a5uh+mpKc}5` z#&?e%?R~aV0UOR(&EI|WHHIc<T}MdEt$m&e9NB?E1uXUM@XlW#{mgir7XEi_-Jbxtc64h2VW~32c}9D-gf6!4vgjPW*rJB z5jCxhXMA`AoGMk)tMIDRmh!5#3r$;E7;e5WU2L=?s^UJeFRa*)0uTX7kz!uUdNRpI zG`&74+ne9m61ZYj{EPA zJ^uJVDWyIDByk*A*ab`G8i5~W1Or5&gg!Qin98Gf9)Q5efHpTbeXOs)|0^?*X(j>q zUte$en>X{BPyh21C!KWCB}2nQi_ltAC0A>6$AknF7D(j&pLy8CrL?FOn_IqW(*Mz{^A5ct~g>kZ2D^*mm3haP*zd( z=-6Y^+RXkvG`?2M%BES~(!{AW5H+2 zb~q#sfesj$+(*UF5r$c16DFggYpUU7Qcx^ac*E^md9r5&QWBvPAUtYl0datVz&yiR zFsm-fne)1M&si&QEg&w?VUu2>ovI1aiQ16bde){A4RkfGB<0i@{f7`yZ`BD+LS_@i z-znG}r#yU$ncC2H@7!D3XD3&%gvZa62=mTszNcV6a znQ?7kSGdxNFbUGW@9_yhd<3KAR=q7 ziTR$g*G_^=!q^yWI}qM{(caqj*x1fM{%J^v*u#>@OcUaA4O=bec&3{@2&$O^>pA^=fwR-1)7RmZtfB#XD7L zttplSLt~I|pgseM1X9^HCa!S=lNc0PAkeM@Ne2c-0U@R)r~Eg(_O(xZ@8<9S#YF$N zzV$6^-n^NSk+Gi)4-c;g^vhm-rFg^JUq~@m!Vyl@@J1*C6UHL9GHn^ohL=wa4`6=9 z5e|o@3ViP2Cnzd)0-g4FKp@&osQ6sDdI6ui^mMYWpd19opWK4!b)>8(A{x_iqA8)t zO3YnN#l72QwL&rz4iTeRQ4us_eN~+v*V`_b+1f#PA3GD6`!}?`50Tfhar=+ErghE zLfH1#VJBCCSD~pc!z*;D-PSUM6_=HGiR!n0XN}gJ-HN+68h!(1~Faj~c!4Gnb6?z%TAErevA* zS*%b9(h14sOS%{@RrvhIz09ghaY{!EUNjb(u7$6wY|@AwQB7Ws>kj;$(SYeBIacD@ zj9$_SNj52Yynmd3x_<|c9vooYFXQ_H>4cvT-{3qfIMIpp`ko>I5JcS+S4eaa;QIlk zVu`6ziHhf2zYS?{HPgmg$0dgGu0Sj~2orDNx-gZ4$M#ywbkw|g^TbC!{E=tgdfTrC z>oVDYJ$&%sN~JYqGq8LfVs^WIcpVrTMU0O_?+6@>7*lG=(j~9kxN+mnXPC zPhY$qR|qO9eU`Gp(3wh>nqcD7LP6gNF_h@bB3r7qzyx4uH5G=>7wZUX}o`LIyMRw#x|S=K&8IbyB$JTLuglPy zOz?2uFhASdO>-*2vZgwOa`3fR1^S5^XaSDabhVsB%56aD3NnN?it3FPv1+oW3llLU zYI+JL@504#9Lj2n(cDpn^G7Lp<7VI>oN8xA28757qc|)Gw7?PY%q6qYQt;{fwv)~z zId^U+6~AII9XckN8)Isidut_lV}})nUQ^BMDh<;9T!aM-fvZBHrD^{+Ws>wx7Wv2D zZ08I2Ji+5VBNTjTiU$cOWuG63a1@R*ls%z?sIr&Qa3M?p%uR5lL`q31U!XWSWt5cz zWyFo7`8`M2G+Y{Rt%!HoL_F|EnVRWzRWnbJE|g2~=#!8y0YcZ+)ydhjXP@L6K#;PP%ZxdPvq8-uw35&^v4aQ~KW(`YrE# z=R5i07r*%Q9h1D_jeO;6H<(RENF5j>bMYTP{1{8mJDDdA4>43Oacru3|9>CpoON z6hb+iJgbp!TyYMWgz+|07L8rwfn%%9XyjmJTSGcxsDrMRo)(mJL}rSDR@GlO{E@0% za9Ftt#ffYrwF))kv3z|^+L1T{Zapx_=Qr-AvoX!zp0S*Doy|xmL$Q*t%GZV}h_=-( z3>}}O)O`Apef;Ov1I9cdoU_~G5K3A=qd;hdREl+T+qwSSm7FrGjZ($KkFzKM7fCh= zyTNY%6)9o!AQjQQ(ry!TTUH^oV?eZ_y>RF~uSKmxqO$6a zLK{FJ!~~)&v_pA}=X;na^`UgwM+$KP)h?2fVj4NmN)l_0QZ5Zihktx%C*OKxFJE}> z8C#6BA|B6dh|8W$&vL)0`fa9f#QGM?1#E%E9W{3k#rA(llT~?!PO^RXo1^ z=mBonw3|xaGu=f1=|C30i>wz`@E2vCUx~mG8b=#GztpC}7s3iKSx_Ka|&s<=6n92|34Uy$CYWp7O zAC8h7A;fc)Qop+X??1@LKluryXIN6c!5VI;qo_k zZ05FIhaiph)kxn<_`vH|;5?__@gTVL!2u)K$QV8JRx9sKS zo!y+))xuj(Tf*x07CdFt;zRmXn0z`~l1>V~_V`ggbMH1tCJo9yvb)uhSPX%}#bH%P zJ+C}@G1n}cjVmSj5CI;VBt?1!Ca`5(jpI1{=I{_d-P6mQh74CM?&PHQMjTgC@%>11 z-i%EGS~K%$t(#vRorgfo6WH?V5Xh-5C{d_bqUBQbbBs*vr{Im@IO*tJYPY@^nv@ey z6oi$BPDshe9(aQ9Z$HLAU$LHRmd~N!2UZ_P-~_^GFj*lUh+_qa;Q`EFLTAa4N*Hww zq{h_}$A$4ig**25^6f_sa$s=OT3VmLUDN_pg%Aj(Z1)3Pn*fC9{ty-5+MlZw3KS0z&LGct?;$M+*B;3R%?x?RP{5Y48BI|@H3|&@L1Ax$(Y+9^e zzkb8Uhc`Yx6M<$%0RK-{Z*L#7X3Y{m|M|}k1%7bD>8GFm=&_^6zPoz$>R0-nk01Cb zrEna_aL)k>WyHb`~se(;_{ zhYw$Y*0Q6cg@5?WTWRfR#`6OLl%=g{Tu0K9O0l%9o-^mQaruJTJa6TEE?+d8uEs2T zM#lNiCl2zf9fvtq$TP1o!^-A5?mjZaXCB&NEPq8zVnM`I>YPwLETAQu;oq-3o0D1_ z$ydA@C%&3Ce}o>dy6?r?{1Lc07Cho=ebtzyt3a@@!mj~{5sd_-<&=k`iq`stbTlla zF40U~s+opVJ9Vj6vWX^=i8KyS^eYGvaPflKT)L=}t^K3?`<8=fU~Ol;k*U>=wNN${ zVtp#X*LNJ`pYPj=PDnel2xryOfGB+*0-uvQ+j!gAD|q*r%QWX{Tl=L z3ColBY^AuOrHP9dwoz6-Kiu8JuMZ6|w=u)wmJCvBJevSH4iqX=I8K60q5-8t+uh@V zb6Qugk!iwPVw;c%nP9Rw!0^-o%BqMXleQAKU74tDUA=$Di`K-_1T%+1NVsgtY$iO9 z&)&a_Rh`YOYOTk&{Q3BpXL=GD1-D2G$7oW7Eqi4XK?gxyGQm{E=Z8Cv@|oZ4;0KQ# zW~}HTQnEUZs%aw~U(K18J&|dT=`ujlb`DHJAMfsk4elrt<{>U|B2J|Of?|#?&`1}_>qk-PGj&^TwXjnb-nOCSF@L05H z5m!9xSzLU{C1|ZV?X=Sff&j{8bgl@k>3CxRDP^)yC?uZF*JJPAy{uZb>g@jh{?BNo zkka9rYcFT*x}}s#K0=C!u4bI`G-Yia^sFnN>u46YWLVmi)P*|4f^w!pUNp6O-y+eV;!s#1TwIQ{FvEJNa-UUBy>%i zS)T~iKK*+&cDd8l2xDq?$f!P5Dxke#5iOZn1VS0X9}B8V$P9^OmO9Y_X^pRa3c&>9 z69<`FpXO7StYhcM1P8~8j1_!l)k!LZmbQ|#E4XD(AOHHmZdA%Oo2hMiO9V>$P=dDR zH19ZlCC^{okuJyHF=yBatc~(3*l)XeqgLehcT%Yvs;^!@TRi z9%Ef+BOf?-HFN9JOqCUZ1%M9a4v~~8vguBAP&r|rvZ_ZAf+>};Wfp>=$$jKXgJ?XY zOhlHuI>sNZ-XrmpfI^K%Drv8bBJefkz~@8foJ_&;CU+(MXEBEc>;7ATn2!!iIY!t^d*u&9xHTgPD z{K(wzgpg=uq>-iL;7#P18W~09@>V2EgGiVTlu{%d2ggkiD1{?Mjqz0U6+&zGqvt|tsZG6}Sf4hA}#f;}gAGl(%*mLf= z=Z-vGuf@qHujd6Xc%Hod_B-CSd-ra@p|!J-*S__I1WKbF9}!3#8~l|pN^(LPGul7| z2;rF-G!7nsuj#5w@qsf}@cdQt`1t+X`Pe;MO(p82Kzk9u3M&j`_CnXTAj`bt?A2T_ zw}bJ(!?l`tS_Vif8WUB5b`Brvvg=sjm!WomIDWcQ-SmlQfsvGP=q?z!|0o-1Ogk7m z+t*6bluaA}}p>S=mab*IpT)@)-LON*Wb8<%uXLK}CMBsS>DGVvlEnBb~|=o(8I*XY+V97cRrAIEG60%@Ee z6G9MJajJr<@S$_o&@)=#9d~TwXD>dRgqtJ?6iPUjKFV?9B&B^L-K+#s#&qzdPa4T% zeWQHlzMX76JY<1=CNT&Dt`>%!fSTs2XB%EtP1$+_7@%iGD^e0v*`qi-L}g;a2z?G6*ZVHa} z!tNtzZ3btJ4UKYSXrSS-2RG*czJB93qEk86*DuPYvNzK8A^gu}fd8! zhLsEL)8B7@R#GVB@A&q&zx}hn{oB9gp@*Jcz?S#F|NZ>*r$1qIbo}LyJ+}43VGsPH z|NJ+cd(kQ6rplHX7wV_SN2Jnf;A2towz_c@js+v-eMNgJ$#a&?D-1RRmP-p;#X{U~^h80#hPsAjKt^BPOLc>z~#!3T><&Ij>BU2d%N>S0El!%h5 zgd-R&m3ha1J;ssoe3hQ46am zgE_a>x&?IBub@8FO2SE!kO|UmBMs?Ucv_)?0#_~XU|DAa-+b&4zu4PPb2h=!<~m$l zJbVh?1leS>p*31MUlsTtBK-x@k(B%b1LJ#{sthAV5`;nZhoVJV+T)7=m!^V_lqKRF z0jkMcn5?Pj9L>E-Iu2*f@8G995Asm&6jv{wQ^k=~Vf-~gS`t$F%r#6o#=z-`!3jS9 z;BG$on&3Tx_Lc}INRn349Oz8-TDBJfNsob&Qk>TU^j@;DLh9K~t2S9TjV%dBsddU6V=-r2-3~j;EB|p3WzWZMI zf@_{HcJ1Ch6L|icYX$`PCtk0(_7%5(@22lv0T_$ml?&kh$C(b=3E2Rgz6Ls5p;CrN zcEVI1$8qWE>iTAHZ_jm4*Xy9QPPMeOmd3}&G$1ax;w--Py?>-oE>*=mBBwv17HO!s z7dEA(os}DezO;^ikdT6{1LM5zR~sq%UQ9SBHU_W&GVLq6>XO{_f{U16pP>?{SPK~g zRua=1s5-{uj{^3IxY{u@K@oBSEU#L}I|DLmRilj#f7GS0uN&w9S0tF}ZBkAcbkHuo_$)PV(kVPm^1l$q%&c+G8(u<7s!q#bj7HO9Pm9&XfLE}z|k=&Wnu4=7LKh31xhL$CFyKfMnk&O1`QRH#kX^A;V@Mm zXQ*%hsq+*9!LRo9^6hO$ncI-&J?F0EJ?(W1$tK&4Dxjs^NsH$bj$pjh z&)C!vJSwrL$UaLE9W=h-P1ETQ%k0>lCT8Rl23zyISXD^{bxDUUgE?ODy}iNIKm zO!LSHA2%tD*-yTJ8W~6B^B8xnNRBb|+kvEm*n0%M=LpPchjlCISU8VVI)w}Z!yrJ} zW|fXfXA_N6%ww+!kSG-(ghmB|;i+*7{R6Od50olcQ3BbR&90j)JaAzDIrA1Rr2FuZnV|DOSaRkP{At(e zr=9xQ=r8#a)Mt%~)wG;TISz8&a%i`n3IGZU2-7+O-)Vr zj*pK6h-5ayJ3sg;yh;E%up6qjt<10luhwOetDUeAJRJsP6;Z4buHc*74^S+XEY}#K zAI3=T$`C28;GZr#i)GDO%7LP`Y|>F>69u)kG{x;7h#A9tKnSPeCS zO#-S3h1Nk-nRYZTCE+HGC2tgvM6}n3?tsz}|gOghuC}|(h4?rpcp$Md|g6AUImafkE2@tl; zPT9*mbc)_ZohAsPP zOuGcSK=)GLXueM}87JZ_8KsJ)lrzlDTQ zWhJET?}dOwAcoo^=}E-gcNf4h@i$j?G^KL}1woTH`ARDI8kTE`w7A z-uvq(c+C$V;;#MOjQfFc#0y7Dx*E~7tj_oa()vzWDy!D^d9WfqQbMVOI@*JOq!%@n z$C?+|>`_E)P?7?69WoZYfT&9&5-z1of`ZVLgus&mPY41b(b7dZpe=3(A&`z^l^P{3 zkdzXMWH_Ir(Ay82p0vT=a2roQ{fzd>LViakl|EtczwWy0+E=Vv@ek2P(C9+hgPr?q z@E3a4>{-lPFz@Wf{7w&3rhAM`Mzhnx^`e-FMu1`v>3o&UdnLgSg@!g^&QLYSX-ap|T({74B*N<;A}J!Xk1LIk4n;r5!1!L2te|nsdkTBpHVi5u zkuo5WP~5cr7~kBo59K&GLBQhH20nDjTCTrnEnRhKDqaO8WMuKHv?hUw+U`P&*c@I& zh<7uEcTu`RYkEHI^-ECNwAO2x5V78j47D944Vg{?Ehv;HNlC#~OXskny^c>ku#1Pf zhdH&Yoz_epQ{_?erD4!M=|n3CpMj}^jOV&d;3KBM7t6hBzM>i&1$MhuK1(v1)MX#ldnJLOq6ZIhi%pP+&4bwXZmJ)!ubZZsD3@IkybNLuvKMv z-jSl6viWxa7%l(V%_otN2|}HFgW30~2P zITZX69GQrcl<@izqi)um&F}IKh-*2B6Q8Y^E-8&2=SYqAHP`-p6YIK~_{7EQ$W?q2 z4kVq?h`v>{%V+T1pG7gDU)c`?C>j|Q(5(U$diJ@?i{kKq-8l}*sGK@?h#wHD8 z!jV?yT2!$J#5MRO9P5K84pu)eNf%CC1}u z(9EB|;MQZuj$YN=+QRtg*i4|A83FuxuIE4h1=qB;wgM!ji)UPP*$rB&%WQPyl9xS$lUB?p zP!3wDnm`r_$3(?f6+{=!7_~MnNShI4lafaVhxzT{K1e01WPCkc&_&XkN%PLL*Wi#q zD1i{Zsi0%r?|ASJTfu)=>a1c_m8yP)f;6J~ryyo16w_UgLW}Zf&MqL~BqPvS_2+HU zB1}722^gH%PsyJ|%9u)CID*jCj)FqtAo4fTFM*53BO%jtH7>K$9A$x*`h?|%jwJ&w8gxLQ0_qdZ%xzjrSHm)L zDocy&@Tm*e^8WMI^35Gbx$YN_(wDE$l1|}yIf}s;GVWAJ5VK|GILE>1_xt#Bsl|~B zt*3PmgdH1%V*-t~=2cQbI^po43)b+noyYjq!DGyANKy3R8;>30bw7KQPu>3nN5_kZ zR5ofa2&>-rlor8Z@Q+pf!ZGfPI-f^(55WFoFgj{RORj6(8^f-Zvajy|4kDQ_K;xZ9 zOky1+?FsX{^=Wfdjv#O(fs_=5rXU1)0eJ~|2MP|99EI;l0@tPF`Sgv9QRo|l$D-h` zL2=pTmwkHQp+oolAs?w%yzCVtYuBu~{L~E_KH1jM0Z;COAW)#y;>C-(_0~IH4a@}p znGV38a}azN|MD+iV8NWZ&mSHg`Dvk4iVq@f)#pdqSGax6n>UZsPCM;oKmYm9e{kW2 z7jysp_dc!8`_$7;W9ybJBwSZ}mf=vhY%aIn`32@Q)=~BPF&@n98I0$^6tC0aLb+}){RWnKE~R#$fGkxdkot?(p4)GcX9Cb)fn9}jeo^3Kzj)0C0;TA+OmjyA6;Ej3Yr zlFBj_bQO##9JCIOtDdVJ5;8wV6Lou@N*6#|Lnm#M zSAjx^1PX`7q~a@&9^|W!9pc01tl?{q9^lZ#gz>SEvT8xCWVNcdu9Hffr~_c0ClT0A zfz(haqX$P3<9Yj>2z&EQ|HfcUb+yAF1Oy6^N*eXNCl6P5oiI;pYJfA>z`7M?q^4>C zh9-C~9D{z3esy{7V4LDVCA)0^J(vaf#it3LpE=R4lU7yso;f6)E7 z<(6BVx4-S}^$5MBR4Q*B9~)!IlBHd{_v{{g{p;Vz*S~(lOrV)b0RDW}+^$*l4D|E- z7ro%`@3`&uHv{v^#Y))bC$u$9CR3ElmF`umR`>7Tz4Hu!Yp%J5TW-1KX?4D{I%m^A z*vCmHpRAwQu|tKOr8j^1yB?jce@uMaKdY z8d~cY&{n?~RA9R`Sm{}DqDYICJFqlK8wj;E;t>JDIuuIBrQ+x5%k9VWC#iE2-0;{z zKEG)%?>=ieuUWH*ilzE#rK02^wdKb3S~%0gmBF@Q#uw;Qy53l$HBCt+;DbY@(qYDg7+ zcC@nNCTYADBoG7!BXD#8cI-dybO9kcThZsPhgFNKc$yO>0oo=#%HRPKg(8(>z0lJS z+YdmXstig*hei*-=RNP?bD#U%Oi-9f0RC^SOD}r{zxnmu0KD*pFTCNdJMLsEpNlYK z*>px+a>+CDzq;+#cL6M0wnFURzxQc3_rLD7ujd>8@pTr>U;NC&#}3^Y78R`*ZQ#!D zeV95oK@j+MPHVL0q_TB>xQmKft^MO4QM19hQu3`G2l(fQpG4zY&HO5DDiX9QRru&L zPvg3i7BgC|Aa#I|DbZEjzYtY5UUaNI9a;fb%Xkr0WmTGCL^Kon1pB0pwWH(eg1V~M zqCf|Vw#G%Y)Gt8!1~6$_{whMEX)ClcTI^;df7tNaZ2&g8N!8fK5k{U>NCQ#~upl{pYWtGn=O9dB$J}ZLUX+ zK$AHksisjxrzZh|8uh-~!!+kpO$Ky?mq;faJU?Jl?*unLag@6b^x0}%QU$$)Yyfrq zn*x^C7jKhT0H8*c$}m|#Pvi`j-jUUZP1hz@QE?HnSd_6H7rn#i?fa~YBQ!QPq7`~7 zH)&31!5sAY>tN{ub1Y$?4^4iwA|k@te`9>g7?&OGHU1@5*vyfl7$|){uyrO1%p?H+ z=hszNUBxed`OClPbNu>$d~5Cd{`TGXkByDC2oSoto{xV0{rvT%XE0SN*;%+WOyDq< zN?jF^)w;%UFCIii*dmnzUj@AO7mu)YU>F>iDuBR(>9hl$$H{YA`O)*w#}5=rn6ZNE zy9CmeliU?Zv>GNlZw!I4P@C-yK>I!v9Dp}$n%llSdo*VqJKzI+2KI~vLR6@;=$VT~}( zbW1*c!mY2SsS^cyJCczCsjTXtb%#v2ka8S0_Kfh&$B*#Hu`%Ng=vdPL8^FzLh1`2< z`5a03YN}8eU9|w#8cH5wERQY~!B@n={}C78WDn+dg3$EJs$Yhc|FM3=wtZ;R1yfQ= z`Rr#u`-07zH-C0;aPTaoFqQxL>tJqYO#%?kmIU_W6@pj$#$ad^b{{slCi847={U09 zkt-)F-rlD`fy}Hwvo#|H{J*^Z(t|(1+ur)77gWmS)(|zm>eADB?%AuEER_(#(7m*( zI_OEKDzq~_`0Htoe8TeEla9ltzJ9h2jG8v3lHeEwy+P932RiNWj~ARmQ^uuS@eta@ zLl8(sQaE_pCr~o#aGEhh*xs~$@Dh9-7=V`*@CnUYOg~;nGQ(O`w>l9sAF4@Y!ho$q zH#!GFKy&?kW7DGbG!r3H$qHAHD~~cXu@9t+6cU7I0DICg=b#L&PHLZp**fZ-6#GWU zd17FKn}^3aG+83)xXj5US=-sdS+iSN)|R0@;o`^y1z+K#5VC>@q~&;99Dw#wj*GOS z2qr)B$v91PH7qfdOLb+s|2D@dvpa^zEFT@x+8^SH4@6zGWqQLCpSZHK}D=K|`J zY4(qg^X1KlxNGkqWnD3kj^kL{>8DP9vS{;4A!{tPZZ-Q5db02vo2 zFo9f9ZDDJrXicZM`)D5z9~-1Toxs-$R|@KrE_KNy?dc>9sU#^!lXL_bCqV*P^_9n{ znmO7*YBM8OA{0=m()mOrj6=0r3?~}eAn>DVQimWzGdmT5CX;NUF4=-a5kz7+_63x{ zk&;4XlD_dh#?239D1pifNrjbOWFzk&grGBV&Nhtg2uY;EEJDo{u|KM2;7X3!ftigs@iB!pi?w>43gAMny=45&~rt2s{re z9%5t+{rKJp#2}>z5(JH9VCU{#?o>V$;*p4kdUQ5v)hR`U%dxIxCdV%OhbXS7gev{W=QG+N?FNpnWhl}R(VF~fp}I%YMb z>CC2RN+wA;5Ji)qzlIOdO9r&i1;s*o+7p}B6JWdiuM{sKZFg-cl# z7@XKkAS$@pgg;>eOB7fGWkq$Qy_P1KC{_ZBwlyq;=CnCYoHxIXq6!!;cBse z?maxfH?|+9J}Ef0vy}@Mb#l_IdKNZh$x4Tk4}mC|YTUX6Dw!hhjUZ(^u9LEzZG*)S z5diX!8v#VNzP1_`0;EV#4vGv+?jcZtwb;dg>XeTIO!|s9p0bo#b!pyz_io;CMwyqc zSxC|IB0q*2X@F3jK-WfPX*(C8Rj@!ufJH~Tq+P|~i6Xb|9pXp3yXhOvK>|o6YXmAx zaUTO8P6xJxEeU1E1QMLGPc~m6lP@zhG(xta9w*@vgea2$a3p~?;!N5m0!hs82O)Dp zYbt?f+(pO6(A)PKqbHM{PBk_*ojX20UIaLH>=>0w#axzD0^N{?gd0h1>$r8b;~*w- z=tKSJo&nf%3`QpiKLSgZE-AINwOz1f)8_t}9dRZBm|6cv*3zYm#eoBd^w7ZITcc8G z{w%Jz;v5#WH&QJ51X7!#Sp)`TMs@C~Bj5CDyRljzRe^02YBDzTWL>ZIeA_)FIqK+3m3H0m`IbW z1o+C541*GbQ~Q}L^wFH1O+#ibj!d9bFwH5Uwhd4P*To~UsOmU~(3nReg@dQc^o~D4 zIVjlChd?25Y=WR{t36i+R>0}Us9K$({y+_)N z8X^-XrI12WmvR}-mHGPiZhpM;7=4o^^E)Z0dh8Y$39>pPk0lw?EFnTYXHWr+lRk~P z60RSRuT&`dMbdtPx^x;}838DjkdgS0ua(7t*mu#&vPB#!l?q;|f*Kz)`uk-sd^hoo zOD}!)-FM&pM0g0rV$q9^C!0ppXV8ulF-am}E!TnGF?9DJ9O;8yN1#-S?(D@EUOZ6W z+Hn4@xBPPd%GImbvunnb=jpa)K!7vrf06{04;(m@G#g2R)Me*#=V#xx_a zvj}g2#AqHVBU!6LuvxX0kEOP00a__s=@Q`c%sd9-~jae?7*U7~T zS~+!gD{Yw+zE=32BCx?<3lWoYS7uHwl&LZ;lVDNHX-GF|{;Ev-TWTv`ETC_EH&f+7 z9GQx^=2};o3p(ajsFVdR3WL(Gsd}RzYcUHN3z*cAxDZO?O5-G< z6qwan$D21S(>o5dC2ni4uo`3%P7A{=)h40*SlYjB0mvHZI?wQ#TpN4D33t(pb zQS18a|DOBre}D@vJg@EX$G5*fN+K7}}bGr z0YW36NTXc}Ge6e>Qb5Lax$oF8KiqK`?Ko8Blk5l~2yh+2jaQ$;ik5l`fktY>ffjLZ zfG8futbEZHoM>dreF9wR(3Egk)>6l%i#vJg>Uq3m^&GBRHkYn!iYG@Vxb;9kH*Y(_ z!@c876$28kpgt){I+BEtV5@eCk%^VkP{0E1(VSgKUAo;Af>A1B(fq=pe_|iGQa`Sf zu)#mDE%mBPT?AUwx)wV?m8KTy)yEVFrIb++)}dyBHh2Q9HEro6moMqy1#9Lrr=_0# zqf`8R+fjbFe-IbV;>J1}60S8%(zx28qKZtEhVgV%?1S|D*qNaJt6v3H#J-m`=6Z9PcdS5{s(PAw3%HB?+3IMg?=rGGdH5kiyl z6&+I*I;Sc~G*UVUSCT8_nCR()z7a%QGcDOVV?8Y~*1Dk;wG>DxaF9p|2`51%@EIMS zAefkdM|Ywtfd(O5Hzi*F@@voj;uk)@{X-xAF!$egANSt#8$8czoXkz#GB_}3j%?v9 zSg{c5lZH0vxCTS8uN#gHBlaJGy+@ahBuX3q9J_hC3CVlz-O6pd`V2xj)HD|uXF;X;_(i91?b`WFc)o2R z2Po~-?$cpOWaW87h(S1-&{g!FwI4RfY>6Nt!Ic768lL?~vBI&bGEel6@#OF%eT6b9 zDOuE1$A(!=tnFxIRzsE`P?Q4S?wtyR%c9m(aYVv)9~=Yl(~1fnGS=3psR@c>Ld{rkuEL3a#5=6WuZ*7Vb(jn`*(ohqRSG zR#utO6@pAclJf$7+cV6Mcl2=Iv0(@_B;rbw(|jgEH%nqB6>+bF(B@hwQl6%%7*JnP zxIqBII6OE)P^nZn+TV}byc1dRP-m@W(fs+i(lOnWaC8(hO~QLG1QpMxXMBucWDK!w zFM6r~Kq8Ug(n~M>#EoD6@;}`0t#1b(|Mw68lCcd17#cpN~(HFZg5~hh<%jykgA~E?d$? zOFC`*&{0@gJIc|xTGKaKW=G$+rKeScmDC!gG|ykPkgHeDA?N$X7zc%pdBVp^|44=x z9YgJls&S0gh7uTY?5z`_r@{9`)Ot@!$%>{7%bV-D8cnI<)1NQ1Yh;o;j|_0rj&2sT zrg{F#*_<}372j9ne2pT&^UI`CS%c|U9>ww`Q(ozJtY|TJQ7lK{+tfZ>1t*FsReG{ahR_@vWFk< zILvELU&gCXUI;=_@O-qCs6aDO86jU8BUNmqB|DdfRJ*+cCWHlcjG?rl{7K_ENWq_A ztkBC;Y0zj!2qOt>=#%mUrHU2!p$f=ED<&!)r_FBU(-)u2#~#?toVs<)Zc3n}V-+YZ zg-#37NkLM$+}Az8*B?E~_Wn_dfn{o>!fPmwr!~fT^7_Ozl@&XGyaS@FTHuwwl(SGO~LmlgdJx8HXI=*G>x^%U* zyFCN_Gr@l*0hn3;*Ot~=w70gMRIZeb5>GZQGRx-ik_%5kBAJ!VAcbIdLx4-YMWUPb z_-L`rv57p}hR3<{P#=GH&lc(*O!D^AmhrNa7vd|4Z>dOHDO};OZD@$W$zoM1)mFI* z!R-1BZ#`of3E@z|vve}YDxqmRFODIaBSkkN<(E*1$k?h|F9I!*%5u}gi9FzXn&!Lo2XTRv222B@G(`siaZERvU4ITTCK!wBvvFK5xDq5A;Wr8 zYZMNiGAxA^%~?M2jFb7RQU>)q7n)nzYfaaC$vOp#grFt zN@o+-ty{onH|^uIm#swxA{xg_0a-_Ka5TqfHyz}j{evjs8$%okhybk|+sd!XKp!X3 zJN^2GES4Z3;b|I+0gloXZRbd6$LdN1NFgcYixh^(;EDa__dFk+%Tw_@gpZp0{_;6YR{W?f zETyH^X=j>cuZT4At6*nUbpq58n479GuBC!$g@HeXEo|dY0Lo$!B|`dUmM$f(5Y#1H zd?nb}J;*J4yD50^j76QCGq06~q^W{^ZQcG*2yHp=R;JhFC_&8DH5O+=1t1}-k=fi9!9rXkruYj!SaoBZUxQ6`H$6ucaP4sc0=R5pl*xCM>UhRS%{ zR;5FI24ROJ0a`fWl`|E-E4cpt-7Id-@P>6uDCqz+^i37{{;qDmyZs1$#Ww~xGUSxX zX{JxHF2HnJU)&xzyq3N~76PONOFDMYBGH!Vp-9*SY^tXZegEUA!IA1~u3kj)pld%Iz9BPW6z&g-r^m$eH!B1TkI6b4K6v+8P= zwp8+c@=B3*B&*sQxn}u%7PK^Qcr4F&xlC(1LwzE_WTnEtZra6o(YKYE(T1m7;brTV z@b=SJGT~K-3~NNSeQ!Ddu@c7G+(tIU#J%Z5fSss<=R$^|tyryJu^khb_B8RFL|Z<- zt$>SufUkU(HaBp|l6IE0W{h6^lgBtPUSdu|9W5ybpEv`|F@lrt!QFHo#$Z{)el=Fpr;@}G|% z=I+CTENE$DRcjr7B;X{F0wfLm8sSi_yS#YRvbA z7RQ$=0?-ax_|Ygp#F+&oP%_~3SuK2S(*b5RCdfFFuRVT{&pfn`-yR+^-JOIR!}rOE z8W=E6_6nXgtq5aQmHieB|}7dp%pX z&dB}GbO2`7|A}?}`R9uVAAC?JlWAS4l*|^nZUqZZU&;6X{;z1M&*1wWCo;;b1|(fm zJVjJ0G)XD(5fnU+O}!&5X|7|k?DNu}Jz!d^7A%IRSln92k6wHcSx4fjz>b4!r~XLW zz|=Bk^A}eA>I5GIYhxQTg{f&C2t5r4CSoH7B345v)MN03cI<$IBLf^Q>CP4S>SG63 z)!xL*R?o+0x>f=)tKsk?8k!zeM*wlR*XeEj>HlAQ&1?P^b3m+G-NxTP;>}y&WO$uH zBOQT*!?DR6pZV=x9yrv;tIk}`d(K)$5D2`$H%W;-zfdYzh}up?B-p2?yE|&DrEvU4 zrLFN#$Q*EVb+%pw>ub8|liaemj}P4a1of^wxTYJzVH;};)RHei`3v~fmA+~ql5T` zJUp_)27mLLmtK0wv1dL1>ZO18ws(0a`s}{#ZExdCUouv_sdQGCO9m{+>8oI19J>3> zrA{Yc@dB9Biby8VP6D(CI}XB8)AG;MWp@^GK;!Fo%X8j*ouYBbzx%JjtIsg3g zgF}Z7nyA!J4=d;Lyo*ldnzL3>Ec?{bq(bRm5tH?eqt>+rc$v*y+3zJC$+DJu9_kt4 z2fGe)aCiz_0onz8gmn1S#p_wwQjZrH&a#NCaKnzQO%|-f9a7m@zpC=zV~L5BGIISB zS{sSmFzU!E?>?lm2^;*i7HFZ+QkhCs=vZsrP|LJ10bVJIFDo><8Ln6|i<3GV2m)=5 z)&d(;tetPX!;BphgpmIjh;Mq4KmEK;nC(Z`NYpaeVl>05#&E0~!U?XkG8Jx9I>`%G z&7q^Aj?X=`mtDh?T(Gc>w3{Xf0&9jRkixO2AZv~>ehk&)t9Fr2RHYaf-Ri$6>EqbW ziI$KO;3N3X~4sSPUx$g~TXX_VmM}yI^DjVU-D@TkiRS`CaJNMo1?Kq%<9b-a%Au3Lf2w9GfD{ zcQ1eD72e&y{&lOXh1$P=fAur_*MG(KZQB9Zv}qF``N&7k+qZAu&WW+ngqZ*d=o^KJ z9HbMld?DhLmAJFo3=~%g7#M-AdyVmrU1ywr`e1i=_rK5VihmhP&Rl|-_50R$zx!PV z1_qiQeDJ{_D$y3q!gXCO^@|(o>n~ZqZr$dOe&iz$_Vo1Bhq{GY z3PfEBRxU(dd5|%MVx0u%Uk6W;cs_UArGSL-Pj(R$w z*wjD5M6P7PSw>POn-IKu{Zi5)C@SRdpC~#A6$`4mrcFM*RUR1<*_OLyiB-kj;zePI zZVagbVc<}@+6E5gfbFkKZDdx3w(_njYza#{gIBSZxQxA*YS#6~0^bs)gPxJl;B&h+HY|;hg^Naocyydp7yz8#V z**i1=DGTtkqXsRcWrL_lq4IYhlYI~z2azwr?xW~E-RNV3=!7sqKYt*sw4rXkIU;o#g8sL%(FBZSP<90st#V>U(Ub5^9Klt9wca#dn-)!5y{q$&nC4i1* zIB6O3{0%g1SWVlqMWjw$L++GSl!_%d+K(QZsJRMlt?lB<=UnxM@7;XU+kfA^dG2$b zJ+pB>P1XzzaAy6^^^YGlA|g9??w+F!(hc3&0twA)pLG@$-#4D|LdL*w)9U_+lWzat zYP$<f^wR?Xx_!HUphW_ofKPSRYfr@De#PSa_r*}a6C=nPqozMhA;^J;Kv8!Op?im5Z#N80 zg0mc&>!G93PMoSqq?Xh;{b{AmXrONxHt$7ODge5!J}Wvq+s}CNN!Yu0@0RGgPUO+~ zA{-q;kB!3Kqlm##LhZsetJn0u@%`^S^X;#Ey#hGzGDzfeCHQcEV_< ztKz*%ifXkV%Jar-V9oE@prgTv`v@GZkk(&a2?$U)N?Hoz3Fh|V&l9JswE$8i?@?%{!hL#E<(LdJ)0a3jLEihUA|1JXEBLfDnCh<>fACOGE8o9CohHc0)x z5yYM&=)NJ7xIN)ODurmuqLVHt#~xh}F$uK@fr^0V!fID%2DwuS{2KJd-+S_jC+GafKmS{FFE(!6$ORW%@VPBp zw!Hh-zqwlj!t*NO<0xorf#vhi9WA7q>ZxyRLCxu8eED1|4fWuApnQ~@L8McVbdJMA znq-1COvA$F%N6q7$LQ`p7Jh30;1i$vBp>|1-_LBGGYP=VdOEMIk8EqwBu{IibOUeg;EB19_ckdJTp{#d{t z(fA_16NcMmP^|((fSWbwaU$>99oX{LDt;n3`Hd7W9-ok1LjT zl65!m*1NVbQTBNAY0D}5zA?2y8qpnX4SR%J^=Po21!1)vL+$^hW59g}$MW3tL^nU( zbp+*WNJ&r$g!ZjbkX5fyadf|m%y-P&#Qs0h0Z^s_4g&PhBpmF4ql3u($56#m^=|hJ zBGM^zHj7xZ04)Q{c5uL|_nBwLU;)^D2%g+;^!7o_ojW&o#dEIgz43;x0kCGxNqXnb zCm9_b5qLf#Uqm14GZws{rEo-NXWPDG$BwO-KYza1wryMV^j&t@rKj)OwddW1LZRBr zNG71A5thzDc6H#^*O6^)hW1vb7IabRY_*SUV5qL83QkHO+gmAijG#v+!Skx06=f+g zeh?+TCz`&6`SVQhpGg2_)?dJS!(0DmelnSQm)$;LRy&!NIxg9;60hRbRD>a@E^KSp z2H{%tw*k6^d~dU7`C5^Y2_74oAgK5TJf$>=Op>>rx}1F3ptq$G1k$&(xhR_225GhG zKaK{ctE_`6>GzjGsbaTNyc&5 zJ~+WmPaNakgF}qu3y_eIl*Y?mc#+I+4YI%XqCZ7T!|D%6iOvUmf5%b)*(XI=iR z`*%LE{YhZ02t4%m0~UZMkP^|}(YAH&yjAD-4-9hb*f9<8`q#aluiyA}wr$(-@u8t1 zo0&>jI2&fSBf45iv^J5-X3<@3%ewH(w-?FCq&il7$j(Ax|=!A-8lf z#m)}=VuheoMrm^&gdY%uV=CW6D1|P2Q1PHpLKG`d@dbs#%*Oe2`S{LUf|>PH>)Fq` zg4^%Bqe}?cueH*+uHd|rIP0Y4{QG-ff}3!T5B_!oj{tsJM@BXAfNXF9)qe|LBjE@> z^x%{H_=&@4M}p^Z)v5)2?y^%TdD_U-N{QAUf@GxD7V`At^L{C7F|I0RI&?h0%ybSk zB5L327(`r#2>+NF%k!2{yMqy=}Q_|t^M3L9sx|wTF zp2ur9ETiQ4v0svCJV2Vxi&6;3q(qI0B>j1hf7`l;TX**|S@A5rGqi@*MhZDhCr+TA z`1=n!Ft0Z_3H!R?NFVG!hNyT^=yzO)*SzL6eDlU{5omktQo_0G;HNAfe^nrZEK-B4FQGL_GD0L-7ikYmS= zMF04%cf9jMU-*|VevGi^v2GbGn~&4lM53X=NC<}SJU)&dpMcRRBMww9L$M5%01*V>`)I8nzz;5* z**#}E05j`pzHYzs4$eRCy#5D&`&;8A-`S38XyDX!3(2OEc!8ScE*E#At7`0r9QxXp ze9WOPW?5Sf6nh89BZ{_kU7ojUE*0NU&cfckz_qVqX@yS_{38ifrK;vSqRK^x2kyvh zMZ~p(1O%!owmVISzh(#^Vx0v}6#S2OIL2-wZGWP z;>JcUS=vgeV!)h6I@d*Nh1MR@buCC#@XZ|u`P|0c6!Hp@wmkdL0$Btmc~G)OuK&MP z3kk=(_UIVwJXmv^7cN}L*KW9hXFls$Tz%EmTz&P`VOD7beX=R^*=xad?J&m$*MS3l z@W77fUFsX_#NGG&CSjB7nj>gxtY>m6A7W>;10t2pmZ$Q$j>h_WCUZHC9XrDN-uFH} z^O?^85C(rhsLobcFdL_<1Ghel^p(M8^o@`>Hh_>uf?FpY{KhO^U6y=PBYtBYekO%Z zx+vFpQi#AuI~t)}oJXI;9~p%`hv7iaanJEIE{>krIiEgjMhIwTop4=w<#XA$Z!brW z9s5Ys-Cetwrp7F9z2-t@w>JzSTJzZtz3Q=II3^&6mb76)zzIhOLJInFd4Bjr zHxr%*Dqwv_E7z@GO2U!Vma#U$Ra(j4`0K<+05u6mjlx`P<{l~i#ap+bAaJeiu7NgG zI|NnX8XXhM(Xozm2n_taWb?nQo}$&f7eZDOIRw5ASkRDVetnw1y=MojI~rKi(nvW_ zkueiel1#V|Xg2kZasB;I@Pq9~@Nf`GX~!{f8RQVolovO?l8_h_q>-JJ9>1r(n?DqM5eBOSD}!flg(yDE}xHn?zg}FEdWaw zFFr6fKHdxnl1VseDa@aZY-vJx0a}9VIHuC``YFX+TqcGI4g`d2yYRY^4w1BO+7>h&~=n+e9f z`4S_gVzh~$Hn)xDlxteb2s`)JC~II7=keF#5Mtd0Ta}CH!bDmdB|o8TQV}ZSQw8~{ z5dCk}=B?A97PYcQ;kZC(Z9VK&1aOQ?A%r85@VMju9|5a$%v(Ov9@5qFDgsVUQwyyI=v8aS7S`yNO4jhfcK0KIiD9PG7b4nj1ywEXDQGdHN*MDB!#anVH= z|D#f>00=jcc)X>x>2v@K?yFe~7SF%>$kC&-qYu==4w&DC)6#;H8a015{)RP_&RS3L z^fi>%E~m6$E|u06bTVncx}Jyd6^KwIOuE;l`Kh)+Ja z9bA_>q4~Ef&*Ypr?Ua3GRoki}KhtT3@rp#N>Nuj-pFmYHViB@GWaNj5LA*OL%~sd8 zxV5%Pg9PnJL=adYT3pj#ptL|(9RQ&eQc8rh9s$XiD8$<*fksGKz%C3zir;jPj~n6-D}RIC7mRj6x_VC zhkt!|AA^Om8BppNy)wN2@tYLA?Q~IxKNbTJ%2C-&W6M6+u^$fgL_hYzYhJ)NZ~9N_ zvsna^a=FY4Uho2LyY05>Yb}`#FMlSKEAXw`V0aRcI4%$VcGIS3oPFwPmEW@^j|(BR z)~W@dv9XcK$;q0Zc*ZlHv3mdh{X35wIbzPUAq(fPgQbgbl1Y>ZNG8+J(uCj9h;C^{ zB{Lv=WW_2P>cIS|B#sa$J6_XDAY6w;v4nr~ZK#7sj2y6eCp~w;g6`M8{N+nN^65_p zLY!DZ=>^w3pP%0HvzZNarUNjup3bYcyC>|2Lt7INaK%|C;RVW63^G)&Bi<~J>E_o` z0K?9$wt4`>Z0;2rEdq{=Pg#1BrX`hTOID%yZ4rDUpH;>{bDv9LMI7dP#ppgjKWzn8z+>+2}wihw4SN^#TozsKs8tE$iA z!9KWS6FjsNh9>~6laA)Rb1pu7_Nk{;KKjv*{?2!=&(;^TRxLu9>1;gsUuAIz_uO+& zmkIv%Jy$P4&hA8HQv^aIm5VNxp}UvVW4p=TyOsJaJ4hVuhe`nv1Zc-a;vl82(p$Bm zt4cJ^_Wh`dDa5hi=>1z;TF1MO9$oN_AKdIeRqzL9g8xhhU}int*VWfN?_0P3;?}?R zR3Jos2EAbwUGqD*_p^TkQkkHvl#R<_JKVI|<27>#)PrdPYhfpV_`F{8w%fOG|FI#^ zK3A+*#Fwu)g}ilJ(;{RJR6Wwe7Zb5oc~}Y81pjE}Z`yAkcvo9}JZWb+wD3Wn@|G{22-e>Dc&KYfVB*dUIu7d+VcU zrRf>ZK`LR!EKz1D{{PvfZ2P-v3#?&(FXHF`dg~sTiE@p$o!OD^T^dww&sQ9jMr3=3dpop3#H-~F=!rA)ot zP;ZQQHmsnoF3nVK%Buf`Qn)(agN_CN>H9`Jcvk-@oZaUtK1ZhtMpxa3(`Ps1;@ELP zt&MLDen7?a{_VV9$?3sgRl$4F``ZRbY~23)f`3g{!^;0^G>#T{8tRe>5<>8B-zY!X z*~?=`1~@WR1jixiN;$@D@SjHpV3R&Y!V$RA;jV)NjF-yfD#`%x zbgaS;H39zD8#P7+Yh7T2m!a>b~{&JeKr5~Z(riP^Uh<% z$`yR~rki-li(kyZ;Glgb6@Z#EcfRa7di421h~F9f0m7hvqTt`v)-DD{hV}jT-ushs zxugN98nUovDWanTEhRz)=D3A2qFO>Aq{N@qhM%cJn~wlbImo}a?33MzW}Zh!a=W`3$tf&;|H(h(hW-}l)NhFO@Rs#+!!g~P;4g>Z`HMu zygF8an`%!Wg{CiG<~cXti>G}ETz>iT^H|Z^K*=aTn*zY2u_= zEi9-{laj7Ua1h3$1_+cQ5Sq!7&(X;O2PX>b9GK#f-XVIXN>KK3q=TDrxp00LFI+j7 z^A@y_bR>Dtua3T>z;AH~e~t!%8q$u$SDJUJdxmYa; z;=)bJn)yuRVf$etm%D8r42?y<*3#U}SHJufUh;~U1Muzde1|u_;SH2aB{Wh?p+r-2 z%jsidV_V+$!N21(pZKRg`p`b~!Rz_QPkbDJxt(3N^b8JMZHN|*V8e1)w-P$qAux8_ z5(ljUl0qN~d6KCVI+>)rXg1#Bc@QYHuW?FcoMM6GRFPz^NFtXfIa$I{3fBo3&lMRS z7>0+p!FVoepc(6IN?Pf{bDw*q_~kEu)jG3lK7H2=4RB`FtlhhJ^P(5M=(^$I;rHhA zc_U=9U=EG5TlwI%m!qsKZn#-1Yic7krt%~v$@`SSRYb~q+KRm~d!X%*Dj;F?Ou=?H5X-~&={!OY7>d;5=U5DL+X&nL~jB{MbCWu6f z0PP@9I8u@nE_WOn;ElIFN^haUTh3m|CofseE7r{Cv{|jRq*6FSB7|i##B~saKuU*t zH^JhDI!>S6!evW3c-h)TJbOte^V=IKX~-7?cJ&VN%YD84=Ewj-!2HH0>J!pf&jvmS zjS@1dnGFx$jw!-~%g*IvmoyrS{7>U-ZPFCV#fm6_a~;W0!RL*?+QLJJ1|XS0gp$v3 zN}saxe=Vbg>3_ErQq>NUvU99JK_-o8%)oFCx>}%6hP+YqE0s$8_@_T%Vrr7J&pwN@ z&OD1;F2_R;KdiM@V)fd!H~#oXKmOK@H-0_%?E}C4gAU`;%bvlZgNFck{)=AN_TBG& zr{&zU&wbV8#N;D`Bg3o0n<;0tqt`8md0h|~hf0%-DkGENdsGhhQ5l{o!hxjYkaQ$z$0g}VTu0(a(^1e?Q@)xEL{TyN zewFVpqmgrH60e1@u7Xt~nyMgx`EDwiq*M<0%%^5pq^?(z*>vY>^ObSVZZ z(!LL0Q;MoxvIrq&w%zR!Pzn^4z?94F^(oGq+r(AN=kSch9W3f-LOKrnhjZMqvzyxw z^fO-ZXi2+t)n{>qV~vnhRqwzatH8Q8MkYM5yy`e<&JPre;iVYDtbTE?zf2*Qpf)Ozl;MA@&Bm;7bAUuY#JKVkSjr3BMuThnTvGtH$J?P zpZ?^h6p96|eZ{p*OiYN~yY>vUv~~RLr#|`dqrdB|-}|1w<)MeGqk%&Q4{_NuFMspV zBS)9(Ao$VP`1r^6@85rAsZIJON;z|=w^wdLkZ+rqa&SX&+V)|BL<5ANc|P5VJAE?F{%uU&N}1+Q%JSsEcF zbqNPY3OqlcFIS-_muIpPFkUQ^a2*6((filso{NDxwx5Sp?VaAc~&y+``FZO=guqJC6IrT1i*|*WJJ{zIB2D4O1V7LJHZF;ew^;fqS5dVC39o6$*7MI z&nCtHb_YNo?+R7Z8L-!|Sb;+Wh>>yh*d**c1o={pbKZh^3z#)`E`tLDdk!7if4&fM z`1ig07eD`n3x4sdTi^ZQgAXJs<%-|l-u}F?(J=xuf3Kc=CJl4jVQwd4v2ph^Ig*Sz zaYBPG714+L5F2-(iv?(JMa=C$w>9Fr3EWf?XT@Utb*m^hWDr`B=^IAfy^-?JFnVwt zF+7FV71N$fY`iTRGJ%?;!ZaW(tjj&)2bhaYVBwHHM=bcV4Zx)GP zJwR#a9`v@oFqMzg9BU(mbyjo*B$J3_5+o!Q*Oy1fKk-zT@1-w$89%uBW&j@FvAyMW zuYK*$wm!P$bRem; ztUvWS|J?Hy^!4{0IdJfx*@RA8&7w6+`PK(tN^4^_Lf8rW33Y7cq!0)dprrW`!}qps zdP>-;IWTzq$p78?!XrsJaP7}G^60S<@O`d5eHovw!Y3hIdZtRe@t2$NrQrM5oI_WAg1lET;yzL% z)t{zqZK#VfqIgwx{xm{62%)JXg)5=p!OtM-TXl=xCQzSZ@sZ36x?%M_v6Y-wa?_Jq! zhV|>#zwhCV8~=Iwzy0eCU&?;x#&6Hrym|A)bFO;sEssCC_1vDm-s6%SAq3iSp*{;O z^)NIJ#ZowCh<>)Et(6TMHheudmixq}Esq=lxZ;Xua>pHa&1~E=3Bb(yQ>=74HQx_{ zqrT^xdEW)6aQ^8l`L}nz7%3D|7&@Ck5GW{mKBd5mTIX5Eu^RnGsV?a_2rVe8psKwe zwN}j|=m-yGXgCINi#%1$$J=k)iYo*nNij<(6I?Y=)>^mw;c(sYV;nW;O-azC{q>mL>|Vc zU|@FB?KTJyfkrE3 zs(Y=>sLk^bzKi?}eKld8E8*)#{7#`TR?J zdX8CKN^NIDB$MdIEVMKsXSI@SZ9=9J6mxmBy_SrOLCLcKNAqb|yl63p4j+2^wb#C^ z@1~n>{_)JNJ(B>;tUtl};0Lbf6QBC{Y`~=Hby>s(r|?&oZ{P#3xSXUEl!JiB2S?e` zKfy$$g4Tl8M1t83SsX`EpGeS>PBP{Blqvzzb?8VZSk~G=MoKDL;rR+B42NCYwtd<2 zx%}n_jmNtRSUb0i&XmJLhX#1b`h{G3(oz;QWRN1j3j~3-+ zjgKDU@Mw|Mq#nmw#F2x4PSw9jz9Qy?&5-Ps##sKkhAj|iD0`4AAjWg(i5yH7A)hzj z_X6-L<~&^&64os+l|W`vsJbkoK5aBN(n(0CA>kkch4z)H_`QmGok|&eZIX*Z!C(`L zCCC?%Q)SfA-YDsK!HZtVzkcCgxb2SH`07`_%GSrWo*?T_8jzpk!00683joyDWjTE4 z2mzWxp+LD*qEe}l%jbD=+cq9}=pi<5-ZHU#`QnGRKfXP6w7Z*ZU1p9D&Z?=Zf?;i2 z$#G0)qpcZQ>u{T!sjF|KE|tPfxM-#EeV=@>z*HfRp3K9*5F8tXvKLpq7R@cK<$3ex z-uu08efOm&pSphH)vtav-}=_KW;XJf1Yl_yKWe$x@a(L3?(8L%^TIxA_ zb_a7BvUoZ`2L^oSI)Z$~=ko90&qSdBZUW&c>M{;rzG4IC&S|IY1q8y>y2iOp8SxVo zN(!WkG0v2>LO`a~ZQ2g5r38XRAsvSx2)KE7FTdQ^%}drUiX`smIh=w@b zuPVcDszyf|CdNx|d59;vCn4q3&@>SaDBs?zP@6&gSqc{!x+dAQ9vX$WY)1fk~mYMhd8C#biE5p-@6q0yx|QN4mk&RSRN^wR!Dp zU;B+4Z@lrf0PlL&yZFKvzA&?y&m;gd>yKSmTye$F9e3Q(4#0{9G^}364S#zL%NNgQ zSKlyeXSdRsa`Ci-=bP4f#K{-cs#gF)N>YwPLIji)>>M6v|7ecJWP;TlO|+#_2uG0= zlEGq;^S}8ULu*nM<~7yvpU*vmWvva2m;Bm2S?EYVK*j$aI{t}ij)Rs$XbL)q!0{0Q zIKrhdD;Sva_{QV=$p!GTH49kUn5JS|*+QF&)o~OzJa&Yy{B}40de!M%wR{d^g$hFI zh!PlvNrS2vf6_>#V~T|lLMrUp*L+_@Zh;DrLei8>uytU9PdvDjZAVABYTZ2EdHOQi z>r;5j1`R7=9P;(0Rs@bUFcR{Fvk4OvRb=ubwF5H1btE6YXBR)+egv`!6EwAJD(2AE zFWz2xI;@z|WQ}=Ht)!*-UlsdVw8cD_e~;T#N4$Dv6N|VTB-*sVhex4MMC|KE5001) zz*BDKqJ}@RX3ZL2{_>a8+}c7@LnCwM&ZVWf8Lc&U-E|jV{NfiG43!I~M+HZ6_8DiB z&rNak*fA!?$N#W^;yR|wlS)8KBcihvTIzA?vLs!H`gDeDGEG8CYx$uqqgYg*t56DB zf+I8~&u1!Mq!^S?Q$;w?2mOO4!7|6I(TMiew#hTkKI;{ZBX9fVFK^Xno_QvlHf@^O z)MpZane~URb?esa?c2ARt$F=&+SV-Lhu6Q7Ijwahgi9sx@uSU98PJW=$I*S!8jZ9X2GbR?g z#>EdSDXT+4Az={F#5UMSIgq$Qpz$z}!cf(e23I(w5-!^Y#(DVIC<~jjTrjVVR6h(Z}gr_d7oJHl`#KX0VJ6~r;?CK84zD%9n@!W8nYy`8Io?2x(86lvVRlBVPd?a7UTaWQsbj|PJ4OgBGLQ_!+ zWvfK2m1roGV{~n+R;>|oT~;fkK!dL|$z+1Ibb{I0BpZ9j_}54FP*H;WyN4iv)m=@z z`s78FG=}~rO`BL$rBGr!kd8!b#P1FM;jaiBAyJWUy}@U=#2&DxF@p1HJ(fn1({ zeP}laa%Ik&*Ft^D#S4^G5tQ~8E0F5MNsiH@MN5U!5+M{R1basdeB_=T6oQHYxakld zA*#Yae>tC)6Q5HgfF!DapWaQ-v9U*FRH>t`h``WkrJF=Iq)iLGu^yW0p{c=C*6mFO zHJ?nFq(cRN781??1HjOJDk8@25ZcPyG7sU(amtGaZ1L^}CjoQY)p*NcqfD zxbTuw_}V+KLHR~lrrPQ^mcBX=gt1=72E9Urp7&T3yD}A{w#@;HUaw2I+`Ri3AG`B$ zDoF_ypXaYx#3!Dy7Qd{}j-1v~H`11<>v6vKHAq_~04zPL$0j_XJ zCtdD1*w6d_>j^ruNxt;#4J>P^qu_fWTm(K6H|FLjj(Z;^toe)`Pb8C)SO5G`HXj{A zBvPO&Xqhyv|0v+;zmRR`59k1dG*{(B)ouLy5okq)EC@xYIvx2>#42Dx(5p87;~lqEJB<3Z^P9R-jNc)Wk{!JQZsU#K#oEViFvSNk|%3#!M2Ow$**w zeo1MPdMQacF4;_mlgNRt8%^t(5og=m12Y-`JQjK%=#w z;+M%yPT}jo$TL5AsK%=S(AjKObar$uJACBufiurKhfR+>JhREi){GnA%&J++wiJcy zqFu?tjwalsL&5i~G;V0pW`JWRsKn$`<9n8{`eZiZ8?hZjlS4_g49I&GUUTw7QjXxg zcRU8tr7N2vp#>GETA_z!k`4pDl_L)SUx!w})4^;tl|Rv_KnOt)wLzt6g^9p+10X8| zXU%J7_sAq)-*|x6pS6NBXEiceR!9Lp9?qYm>z+MH2M4WuwCf-&|6VEy(jm~AsdAa; zES=4|jwU|*npP=;5aLahgJ{QC&)qD6qzf`+8azimCh=0gLJ zNuu#VCJ~{4QFMKszx=WzeEy_7UK8Mi&x*y4XcO2XVW#lGwcRZf=rt;pg02*Fw4y3L z6pN5AqRSq-IjG_Z0;|p$=&DV&uMB%2%#MXNbUXnc1T#DROad^oo^taN z=!6RbX1COn5DB#QsxrT!MtbPhCZ6Iou%cLsl5!AM6ZXNUH-Nm?)R&$RzmEm8bIE9Y^`c z`*-ue;Zfdy{wmtC2}-`ku_8f4RJhvvErcNLI&2vl=l^5xy#pjWs7~#4tNE9dB3FNzZwnPu#J|QOAOJUUA9^;FKdJW&J%S>Z*t8 zuj@1{Kq@Hh0|DdMG7~VTQK_qK`h8%mBd~I1mjH5|(ADlH652Fjfh}&`)u=Nsb^0F+t#l8x%s1(npn8V~D-5mvvOtv1(n2O5HjT z3EXR#Cghb!FaNfs>^LfXz@AnNyaK7$VkqQW$Y!#XCMT)Qn}zmu!j1uS`yQCA7y%x* z|2|q<+jg9|;-oJDe*y6FSN;v3{q$#!?TT;H<24Q7O>cTr!>&^ZGhhPxdkX1@k*as9 z>Ja9(PEa?cG%5)hOyeKDs$MFtr)rnWlG87tWgM1gGtxMx?)L zz4srx&sj`><}#Sp9Hyg{pr?aOPbc~Q9$IGh(>7}cZ8Q34pV3dpjD9-$`snKKr?a=4 z&Yo`CyE7-MLM~Sz%w#Yoc{-(*(0r##oLU!v(z*a-a%QBzJj6$D`5oP$WUV4o zuBS^R+!R6byv76+T3TssYb9uDfyHy+?2};bjO4CbEEdg%jSsyTSpVLCdEW~^`{~cH zY}vAA0MN9ieei=H{OYTR;yk)uoDQQx3iaAK)Fl1|LGmb_ywWPo*Nx*)Rxvezj}JQzj?m>`|)ifCv&9vVq~|?fY4?dl(6)k@`sE34gQ! z0DqU`dISOo5#M%`DOeLt9c%rXCfpF|R6$Y|nfktty)$=+is$&~yd*JK(-(5>BuHzxIf#DrN|+B?a%v_hc(r!9pumqWhA zg9IZ4mc8SxZ~On2FJJ!E4I4I~s+@k-nau#8X~(v0*|O!5dX#M-8_?0#QpW`}h}a); zgeb}S6M0wl0KP`&pDsK<9wv%arC>t3^8r2iES>qlPrf_Q9thTeu~JVatfr;GgUW_! z5RjCggR~6&a7T}(N0o!M4OL@)xqFzGoVpkrM`?heG8IF0*tG!u$gV-CP$j~ua_!}( z@Hb~I;$_$0&41mqm8=op&o!hn$yn6DWHsh15AJ5tMrq|?iik|p4x`|3>cKBs=ax{_ zx=_~<{Qksu9kVShO{Q_IhK&6j;cF{CxWX`tli8&giVqEH?}yr1HH- zK~^iO#3HB!SQSc9jaRKYp6jk!#kbdQ=bwK10F}s+@#TF{7YvvH?%XrP?Yo9>f)1K0 zDINuJ(J@h^kfW+9<8VjT;J7}*fNV!A*-Q>{1vqILoO-+yR`N&F#*LdU-1yLjA9r_m zykTU-(HFnuB`D2qGLdFO!*^t&kmRu(E69itlu5p7WOkr9N5K=HA{Lwvm5pm;93Rx5I?e)8O=CZlu z0w)P9M$!->5aR$yN6Xt3umuD7R@G!-uLg@ zr(>hVYZotB{Ilz>`|P|geBpnZ0YKA^!DB(|1@t7d&3W;b#%!T6qd#Qk?;GTGFp#A8 zPs;vc+|m=PX{8`CmX4Mz0ggb(sCcC~O{4pI5R$y+I!mA)lK?AaY;YcNXN z^a*vVSnNS#OO2&`nTq!JiglV0rA&X0DSYP%##e|%iK@!1wj2hF#*&f+`QXGme?toG zOM!sy?~a5AiArt^(Fs-dfON%2#nm61452XMAfB;EEK~w`d>m=yzBspz1 zZQ5ja?A$pZa2mjS-}_#k``qU?1AwL-V-|a~zG-lL`f&NdH1MB`#SeiKn3{28)v*W) zRAObQ95JV@fC&=K_y#ANmfY(Mf5{6oB7V$I)3GE0{?Ihk2$Z9kTX!7b>XT+uj`2b` zGG&I@Xi_rgs2FWaM300B6+@tow8;fJmYT+ll_Fk!_Hn%Nyyg7+?Hl>{oey!_?qMfs zi+DIh&};!55!HY???AeJ<=`oeBd@|G4Fq6XpGrzp3jJuJ$!4LW4JAN3+u)27(Bl^- z@81+B##Ke`IqkGnpZeT&|JD8VuYbK605t6w@cD7v-tYr9QYI!V4&Rj=9E}NoTKbn1 z_3s!#JOf!nb}=0Qm^$z@b5ybh`U-hRV{4KLfT@mLadZ7DsW7e+Bce_`^2Y)5luQ5* z4vf;5Z((JBCzWbk7a@{*8>4|u<*2B1r{kOrV}eu0uDslHv0CE^3%Ysl#V7O4_4|pc zRWAV52+nNoqa(9qaH!uOp&w@BIOR0bD)GT8L4dTjK$wFdfaB)F8Ot59l8Jp&V5G`9=Y7;7|b zha9`UL41G^fC>@H-1a;znHYi)wF%#{r(m|h!EK?YHSKW^3fy^OlOjRv$b@LgK}##f z#xS!V&R*$$2Ur{P;M&!>+4C3Z&aGRV!wiou{k&!X(6rQ6oUr^m=?{^k`HUKr;Of0a zZOGh{%-EBMSjAd<=!t>ktIk!;KTSJ&B3Vz6 zWgSs~2Cj|g00TK}Ya3!MroA05I1OfWrYGK>9ox0Dy`u=svQgZiaM}z2nsyY~si&W| zIo&UD47G^Si4uW1l-#Lj+|Z;1Y*FHaoc+>Is5milfOGp(7uXPL)lIH5#8f zrAYNX`o?y{A8TXPm~5cTZ!1uXtp^!49T{p6F}}oaxohtzqt(RWTmRt(o+!v3mJ$g~ zJJ#3m)b%_CzJ!G^hqkt3jY1e8t4?xs!alzl9Up7Km^;Y^Jy_+R-};tj0MN9f$KL$r zH*>)S7mTKRB#OaWM#d%xjA?MxdWao$aOT}8$(ttnUQZw)@^O#l97e(hm=8lt490VP zrxd3o#fAn^np8S;YP;dLo&nR?Pf5r7V7OdmW=kugk(UN`a<|8FHamstDNv$Vxqsgv zaiS!LPILJ7PbtJSt!aMv?BR4s#}<<#k0Ydr|AF7%^^2(i=hKYq?X zb_jiI1Th9RV0+D z1VXU~EtYCAvsweCC;{mxhX_bmS7>Qk z(+($RC$6byC9Y2w`Gmk>1KhfmmK>VPL4=zQSh=~Y*W=Tiz4sxo}FpEE}?4L0A)$iNDJSNF_j{Ca>I&xtH=};=& zm#FvF`^}QbjGFX$r#|lQkr3433#n{SHMaD&6nvlq7B7W+ELQ*$@*}Yr5%!JO*fC!6 zlxuqEY+srsfTkVh<$&MvBN8Cl3}i#7RFFk;Fsqg$nK0$d`t+wh^U-HM^O>(wReAH9 z-`orUns#(pPfxG=N2H(;TMvv8$B`r1F`7EB;9D z&8|W^yE`R_Nb2{J5(3E|g*H!^1GRAqkx~@Vlh012wLM6`{TQnN;Ly{8Bm7%GR3xg| zrhjkR(Nr7oXN^1CG$9hp4!Id{KYSN(d7qKPn!Wi z(~eZ@?d_?1kA ze4XB6{(}U59xeemxK-eX-N*+C`oJP;eEZ=T&Xtl8OBJ%A@W8&|Cdj{OM|W+Yfqz7@ zo+}`(!i*m5IVU>a0MJr-GV{M*{_;&6!P}u305oli&7VKdrt5j4M5$b3V5EpiNqqcR zpvM7NThIKBF==+M)-mQ;(=arUIPhsW!bCH`T1_hl3H@*qJcu^(4g85cW<5BNP@s^> zrV|f>xW?cy?&(}D#DFNV3L8hpU8bbLAFsUBw5AUqYy`bs$f^@a z4n%9M3h4QNagG4=^mH`?fTkU}me1#3lx~EHNh*^Sb`6dZ7&8TN?@DE^M}AP>J$2p( zPYftdUtntf?!-CSB?%-1VrvP3FffiH6a}My6s2(5 zshA$?=%4;|(BnK7=cBP?L>MmD*ga88rJ|eGw4*HoNVk>XtCSY3MY4Gp1XOB{Flf~Z zBn)wNQNtZyx$D5}*)!)34UIGdfTkUp_L|qcn(ut)yFX3c^5{5~a+U4-hJ6<9h;h`n z0wh6*H^}`en$FgyDgx>vY4w!B#%~+-RKTKm7QcjXPV2PZX*td`EZ0ZM`6t{25NnKR z>;eFdQyJnv3Sl6Pm5auSgFpRi`r|w%W|dHcp~)Hp#WI+HRR5uAO*_)jh?i`A4OKH)u<V$)p{4ELKq88&Gk){X%f6?DAI&S}GRzgedmN@b1HFVBdm zdWicycFB!o|GF6fH0{W)X(gH}z{>F>sBuauJ z#Ar(I>(ulVk=V`hTSvJYE6i;xkjsWxtKJEFG(L4IK=~8M{_8?FQjh%8Q9~sZSMJk8 z$RGbv&*vR~BMzeRXZKaVJ~Hij#7{t2Bd93WetL0}Anr7BZ^ z4NYs>u@D1@Ki8~3z=8nDWZYh;#c=WxWL9@VBwb@bq-__TY}>ZE*;{R{%{C|3rp>mk z&92Sb>^5UEHg2}{&A#8CnZHlX{oLoA>s-(*+;7p}g2u%swK#lNy^oE3Tv`}^1jybMuNGP9)%49T8~;t2wd|E z+(3{JNK%-MLhsmGAXWxq{Z%=k1oB8pA5YE9k5?^NeUP2yIw%;df;a#oYNRP)-v%gL zf&N69xWuxA<}}8?n|7|Xy-nOH);+236yR-?Ah^%|whkB3C9-MFh>>SIvq%sPe34I# z(@auSt;e?e{C(K_3~QSe_(!IC|r&l zCD%qHcI)5_8pfsS%U`(pko4#%jDXfA`t;-Botv&~2WM1hHiGu=@L;$S64dP<(t-K3 zzA6pkVywvUgY{&z zQ(F<-&}h14pYo@EP~SyK8t60dFJnIK2NMv2?S5j}RcjV0FeZ7yGoXundONL8Zbx-H z^bg#AX3RiZVhDLW%(@NcAKn+j4|zYm21>aCi3}h6?H=dSyZ@`zk87gcyJS5dzpO+q z9Hg``hE!@Vt57=eiL;Hlqxfrjg6Y^!OKQ-QXo?9(25}2hq`$J;))%_ny8R@E2VdQ$ zzn$7A!ulvZ&Pe{8*nPvuNN_!LbM6cBJ7~2+2ujeUmeS0KF_mWGksim`-6u3_j`*T1 zX{S(#VLX-{(DFU)T_R1VMrXBw0I{Hem_Z{}c=N~kjM@rX4HDr{C9)DIV_uVdxZ}G4 za^P?r9(e_Pai$PM?oWsyu~8TZ@|4|(F|dF*$K0r*zgH@gWEbaNDTN`8F=mKkpgF>Y zMVdou@Q0i^+-L837&-B$p5}rm0PGRy3zD8TuYng0S8y!5}cCEU_8-YCp5p z~*`B9DNDK){8f zy>~{79-R@}UaGkiyNHkq=eKox{{)Dc?%v&LXlEs7W=*1kQ1#2^4~=x|GGDhZjd%As z#i$00rlaUk(xx#%cPrf(6qqHSC3FV@8Z=<#EJ*p-r?SA@mM+JTGfAu%E!&vEv|i{5 z>)$`iyL#7KgpgcnCakCD=d%jRXyp5#&7sma4jUkbb;*L-mZ~s~BO@v0i{%sxEX~5A zF{n}zv*nXxw5X(+GzztC5G0;g8<@|5`)zrs2Tc}76JZO?3Ls_<9xW|&3YBP_-33CJ z!46w_g;REN>cNTgMz^Azz5+QU@SQwM06*%8fp$H2kc2Q(S*Qxll-{e2z>qc}RX++& zTnwFt;7ViG>7TFjWgzpJ(tCPw{FNRrd{`6yIkgB}=tq_KZx+aeoR;3SDj~bhegZMr zzTbPjo>bMEdKRDJc2$_veEEF?(uFJjx^<$o08!5{R98ub?XpLRK|p2A{N3WrLBwxK zU^txi=;UnsbcG~`zbF0cOGoBLT1f)J7=HQ+taSNMeHHiP3>7S6bA+0CyT5S`(Wi?) z-NHpV>_x##`M$)ig5Z?!L2}%pFzp;F<qMh-zFx)bd*{PEigI-dZswzt{k`sQX%DRpF4Az(0&6x1kS+xYJYk~-%#`kR zdex2`_+QqL;>;kb>+y+-hK;d|OYf)>1JNnX2b&?s>(!#nq~&mUQE_xcb85~w&K zlTnc3I+Vm=&8nZ89#fp?>7l4+Eo9cN>pER03k+2#h!%g9V6a2$j!p8jER_4JClDAa zhO^r#Uw~Lnw8is&f$DlPyb+V%%VFF5QEf_Mk|uy?y(``u_1Jt;<(KBRprwJ})Im1? zB$&kMouj^6{rH9A!RM}5>%>AVnO3Wsx28h}r=vsB$ z^Bpol-{4Zm?~(^r6OxPk)sdeALA6FFx+;N;n2vuUyexin{btZ7Bt@Ash#XyW=R ze-nRg7TNv8fxGay^3A=QxuW+IaojPN5=u&~{^)xoS3|T0;@Chz*F@a-|6Lp|spx zivy2+cy70F(jaa20`v&A$P|(y9EXkec%oM1pAN<;K|B*DOh0WM(5xoU51YEbdFwVb zSwf&N$Y7`fBR_YwC5kdD>;PgU38~8jK}OTPW@y+{1aLx-?7YJM3-!0VNUzZEDqJRF zn#e4HNQkiG7QDzfI$i!LHANPbvD$Mh!`GXP6ai9CA^1ys(Q5*lU?-88aQf(B2> zWWQXg@;lsF_8PjCjln1^7l5w?3V`#0FOpFAnR;P=y%pn|;Hwd9y3aN^w(ejIoM?CW z0Qj~096#Ebci%BW@@4+tAeqp0om#g&pZ~6W-M%i>u4V%vrDPa(?|zx-?=7O0;|^(- zZ1EF9HYd-@0h~j*n}0jDE?srOl;33QPl|>uSj~}KCBSgB z6-}5ry}99ew!Q1q!rP2NpE4<3*SPzrXw-^0i?sJn5>dk?Q~kwgiO0=c%%ft1U<5W4p(0o>+GWqaP zP&re6sqOh&hlenhcoii3Ww6-YiUI{eM$YW?UAas!QaxgYoKMUGA6|z_VHg8ymj{Fr zcQqrMxUp+dsGT{Vx0}+fq?9+S+t%!8)Z%HvAiM1zoN_{L z%}+zd3ymc5Bxn@mS>|`8r09w3QyTKeBGmkeC4VmE9m>c{N!cHJX)Fj77&&5h1HS|$ zn35ZG_C^@nEAVUHV>7LHI)>!iul-J&Wu&`rxjEf$-g(W_^*pF z|6LZX_nr}VoKNBbih{+$XEw^a&nI>1+*hRdk_#>`!FtQS#wq7IM^wcZ#} z?)8KF@xUY5yu0h(z|K0WRk@i9{Hq}-kH64gT9^^y{TtX$rj(^luDiyzoEruigE-QL z49<@JQ0wAB_rvqHgqYHs!%+V5?eUAqKgZv0XcyLhSeVyYm{kN)MH!MXx9niOEOX&> zKCH5%WZchT%wJ|L+MzunK-N%QldQzsI8l!E?S`h#DNB})QhyTgNU}?Xh8kPWUqIU$ zwPN0>B1T%hVLr9pZt8NR;7!o7;wwQ8`nq(c(CR;27L<*DI- zk14zO^mzbTiif-5Cs5?u2}F4+0U6VAiSl>TqhTUH`e`pvBbmqHRyDW<_t4#{&h$3E z5IK}kGL-YX(%*cDVrsjd*sWNxA-*Rxi!IK1K=4xB@kBkis?&llU1zB!kB0 zgn%0Q()~0;+TGwS=p+5RI%j2!p|SJn!lwls*0sGtoQ)G;3A4Ri4WRa)e?GzfTtle} z%`43X(cmiTeIa=y`3lZA_}>3g_tq;JKEQ~Y#ae6AGYQVxy#*t)t@$V4jHS36!J^EO zk}}reVaU>M@ePIcV#IHA?Ee1NhuOx^ggvBzW{lOMkSPN@=Xn3AwFS2M|56xH2U_M2d zKiq2XLgr;Wx1nE+5xZ#W0(}`pID89gcP*ShqyUR@qRpX_nekb0R2(iJJL*1XKwJ!J zk2To41Yf@40tGJMnw@4(CQnz1s0^!=zgu!132Ebr_;<$|f`nv+?!YSj2IW|au(_1J~#QAg5LZ zJL!vgAPm=>Xq`ci$Va5|_k$g#pkGtuMOzE8ujUHR* zqW;!wPt^+*9KO_b2z>E279KTr>vToI=zO1hWwcLaG&qKZfFS?!doi`)Xem{@NSfdw z4Z z;x?MW+0@d`;vOUcU5LS9?9KZ)|5ty2RlcvoKRoG=-PY5T2XBo|W*3d;O!m27KUB*LK6tG@^c>kFjB%)7XGdfCco%46+TQ)= zj@eN(;;1%abYtj;C5*YC@q?P)2(T(kum`R;zo8yS^VWbH;K9Bfx&oC^%O5>!BM50b z+Rg`6hHoDN4n1$5{%!cfTfx-=i|Oo)Bu>3YKTItWPRns8UGHH&&E2g%&T2EZiT~WU z^_Ntv%*iLjRk9X}@8cm>=p)*)zImei6xR5&qH|b(hHW6S;i)3;F6I@1)E8a2L)Cvz zZo{+fB_hChRYhh9(QGQLzU($#33kQ?oC%;D*5si7!uMoNOZYs{|K_XR>O})Ms^s8< zfQYCIMT~Ojlq}3NRC)6|nyCb2d_ot6g?P**d}$2iL77Y0Qckvx6UP84R56h}mRZqB}F@ zSIWvTxwSyZR;U-(6#cX==DTfs-u?&aZ2g`R*qy-G{cL?U0}r|GF=FZ0Zj~T`-*Md@ zpb^b8rX7zL?_667L2fC$^!|qkDg*9mt$cKJs7&3V|l+{k!>yf>xv#%E0~lM z1S7sO%QA?7O|K;b ztAG6r3C2Ah+jr-qQ`f1Ax)T&Va!rSBJ7FKW&oQd%!PwmCNg*^U{BJCYF7v4K#l!W& zJ9os`COVFA2BAPnFEO;MF7Qk6?I8xAiwFNQ8A3NYVXC$Xg`Jc0xvhKQzn^@Kwf&Y8 z>|wNogcus62O8M@=^wC>4fl8e)oC+k5wKifh;^AyTkJg2;C71PpxHIy8lmw!2gDrh zBbcZyd=$wG{Vk1Q)(DImFw?wm{;9gV`9LsmX1qel;+k2>+uUV)-=Vnx{v%?Xo~7l# zhtL^1KRKbpZYlg~2PZ3F(Y*H<)tEd;#RBQIk1fnF*b`uKoWeXHPO3ahC=jU8JLYurf#=+>j~?ngZt!YA)i;x}eZ)HI{t=!%_MlRn6

&YZVW3!3DaM$9`2Lh+730 zM)z8Fd(cz9Bnk3$W9!Y}zq4t7;Wh08(Cz>p#oF9}?`#E70?W(eph0$oIs#!aN7=(i zwtWBBi?SyL}9jj0|WEFc|81T)X!@&ttomsIWhUzqo!lao({Svu52MS zlOrJl0ilS+GozmgQ0uiTxcJn~e!tdgp09iwjw^6xr$8_3fOO}0DiW%jmxLCc-&vDn zlIHy>SIX!T>z{ViTK%DSm(ZFR=1=4-lq&7}$nu5$e1!kae;5z=Ye5TYrDQ==LUr1! z;)u#KFb4M3sxXs-r}NeRMVJC1IlM2{de^ScRke7hP^8Z~;YEp5xy*cHOqeEjOv~Tj zIP1qq-_qT-vRK*G8?l6E^%aNvbI0YjHPR_bfUXp8`ftaL2A=N2JRd*Mzdr3}t4GfX z2|)kbiUrb@q$zMKJ|*kYRFf6yvpp4qVjynYRC8{I_GKk)} z`t{BRDUm&!6qto6!oy}TpT$d~z>Xqr2s;|`95 z&ppt#d9_l4;({_DP<8nez=!s6rskw#_!!g%!2=uo?R=HldJ@y;PvKkdoXsVePSZpb_w3M(P%>&2E6 z$i4lZ%;Cy;Z-z(6QD&isz?3GFtNB~4J3;tmbQl**Q;nzAPTs3O`89O7+M8R$J%-;I zkmF9TnT7Tp`eQ6jC@r4h)^`7i|`n=Yih1crxs=)~F zLNb|I;1C}L9d=dJ4mXKZN{jwz+z$1J=kMU}JLz`yAeXVE%-5GxEA~#R=|GoME=%{D zX}p{Oif@t-rd^r=OK{eZV(|s$TBYCp+t#SfLXPkY$)363X-NP%xPzpDBOwZrA#Z<+ z+;2jj`IILAEhOK@?qjTkf|Y%b=a&rb2YNi?ZQ(dakwFccveeV7$ZUSp^y&+5eOtpUs|Mwv|Y^yo-EbD{b(&a z8MbYHZc(#QQt*L3G&FA%77K!E5dk^$S!lIbYh7e=7LaCt&rdrXznku?{e#ovv^#gFI&Dkl_Kw1wvX^hOVzHtD*OjL2TywC?yrz7HxM+i4j#lO_u#N1=pljI5Y>ss#S^ zg|bL+vX#4dO|#PQj2s0Ay1d zY3!7K_{VU9#A10Zz7>dTT`geE7S$FOw(Os9Y`8qG* zq>CPDnBXHrW$aLQxZ(|_z4*6eeRTM9@k7ZDn+!lx;~?1zM94frOAJwB7Mj9;wwVrT zI&`fTWbfDW^Cn|^eXe`@I}K9#?6r$ib{%S!H)J<05;v4h^vC| z6O*D)VOUOU__8j&W^cmlO(is#a6nNIQEOTKhz&zLrU(KpwhtO2ki(&?9CL)DzFE6! zu%0Gv!^6&C#W1F`2YT37S&v3$TSCqU3$c0m%Cc=sOS78qC~f5A##VQpl*8vu^j933 z|1DLH)6RAC$x^i*D!u7ojt654%ScW#-p!GgP-Lh*j102Wsh(wRxMy+NLn*03Hy-0x zpYX!&!xhhfCm?NRz|5XiITTgd-S?p_qtM%|MZvoF`axmsB=@o)@ZS?dL1syxX7}o{ zgl?qYmD|~RMu!@z;c9s~_x0c=1jaW6ma#tj)D00J7t+RAqYa5v&u0%u0n5XH^doA3 z5IT?|Dn)C{4XtOT0nMfT*=BiWKzJ{3bH+$SNZIuS(IB?VC}Z^yW{?ogaz1SBOBbz! zFExh0ab~v7gwDi*hmI_u)$kg0=)gXF z3U&%{^aLa>=oRGQ2q^3qyC3u*T`gDjD=cQYY6R3?(?vc_d5w>Kthl|^V1IuE(jtg2 zGZBAg_+Z95V*ilQ^)1d^dKG?M3aVs#(aWIkJ42Ib4(l}xUHPxVhO!9$@m%@&4wfq% z&n6~PJp4Xa;(MS*AIKMe)35a%&K#^~qcB4^9dw+dn!P1AP9t(u@S{V42oP*r*exf_ z4fi-Uoy+`wRpc3a=nL7R22sx{*$^oy2L+9efL;WRg4r#Ztig*Mcav=Y^7zyuK1}QulsT$gkdxkp&=2vh^7-!&}D0nE5;Q(Cj7SI z-J7QpHH$Ln;~3I^tK0D~HWN1MPIhg&#d4n~!tRfnPty9nQ_Cs^tqlIj0$_!NWCrNd zh9hug^gh1ur$p*L;DdDWvIxZ~<$()T@U#$sbAyuZ_e5mC>r3OeV_z!wnHOJ4r|FJ8 zt}UdA_jLa^z{jhy<9|eNfm0ebzbmHqiz=fx1+e)~?RlHmUj(EAnvtIF0|Ft(A${p8 z4C$IRN$I$C4l;k0iUl<8S#Q$(6iFKZzhV_yak!ybVlTb+ZexSFCH~JHxl3I4m2A_urMpsYQ3a6 zchNrKutDFx_;IpcV$_pjY!4$z?n-2yoUaY{Y_uopPDDa%@!2@RQU@Bbt+Rn0Cx!&>A_|NeBnklsE4iSWnk@D>zm=c!r>7eQ?BI=PVztEvu9Z=!2G%$0wIA*JRmE-0u#ga9HD*2oBx_ zl4MFr>1;0b9dQZpnQ5X$3m{^;$>x{;~tCk~5xqC;D=6sj|P zWlUp8iyBmo zzo)nPUc&M(LlYM?s?9wXctHu`c=rQ4IV!Yed? z9~?H(59o1KH}gP1S5dawwQ?M_d!U##b%~%mfqe#PxAUB+R!JHusRU0{g;bgxkYR)) zmCy7SA(u+EvvEVeu}xCo7-4WpM7^Ap9`BDjo`LmyNV7zil`45au>~n0k%R7JaCKtp3+c z|26OKZcD+`(Z>ktS}n;-2q`S6OL|zq6a%3uWK~?TOsa0lxVcTz)s=JQeuK|7xl=v{ z$d|jB5c~I3B1&A}XgSlBa+mCp9()k;)Au+D5yz2X>5FQR?Ps%?+uPfjwYA@;D~$*P zD&9UmGX3m1F+lxtjY?z`6!*BexCWmGhx@ZNIP|-R$+qu6V2GT1R+J%r|Bep3KkeR4 zNG7qk2plar2zK>kgb9HDLoHbEynLP_=yl)dohJX|_3%HcDJz(2YT@LRpiwo|_Hf>L zA+VTwiJaq0IdNQ8B|L5QzBRAIQJ2lv(EY)}P)=u1j6&d{`wcI1e7t0SDi@Zwmb>LL z+%c(y_dEo8^iychufQK-C8$3KsPahyDj}8~Q@``dPfEYK-2i;RZE>J1%+Nf=NLqm| zPBprYNt;k)Wr228`vVR%G$N%OExh$)$Zd=H(RirazUwVc!-VzN+*THq733->M5b7| zuDm%`abu5Wr7__u>JF#NkOpy*h_4HwP5(Kq`)SY<6cm>S2~-IDVDQLXwV}|)PjFAj zoJM9(vW?{dG=A&m7`0qK<91rbuq`G1+J7NKcvqeel#v7ca9|;La4qMC2B2$yvb917 zHuvvICA!p0mFUwd4KD=s-fi1MVLQ;*F% zD+WauG{5(QM8Lo0|{z{v$y)`s|W?Ooxj@e{CsmQ zrr(F=Jsk;@m6E~ccKYBwrbSm5+VLW+vEEs*mn%5dTR;%hfkFZnqnCr{{>wZ z)A)NF>-KnonrN^aW2o)hPg}Qj6zo#QuffG(ouyW}pd%xVcXp>z#oz55a@%Es$8ZId z5%|m;6hRze^|q;CaulmsiuA6hXGavwy5Z2+W?B_>3^VUrTykF{?qk#LA#iWWopK}6}0pm$adm7 z?_+{rS6|9hnMVc(txuI$s!-9+55|4HgxQU|Otll#qc)_Qj>k8mYP66qi(HTBF|)xrWZyuiS z=$KVrT=uB}U|6F-`88RPUAzr>!_wL=1hr8}UuhtI$v}RK`6DiqL8{Ng7X}G%qVfL; zZORUUaVao*DR7>q8aAe*%@ktqH+Np=r{B$ZjKKglBf||FFZnIaJIY?qtFPf#HxG4p z=WXvqvu(ajI{Lk|jrcs>J=}KNnFC+Xn#;4oZoQuoGnU}?3B?O=u3=1pT}|cjxM*TK zkHT94BTs)PJtUixgiH^?2L8Y5KVEw3L|B)q7+@EgMh1t6huiPp$hezz-TUrI1eLyO zq?(R-?MvhddZ0Luj6!QrDJW>x<5woq%w=S0*z%MRB7rq1i7v5V<_ZWU_9{DfK)=VC zE#Igsmrb~hQHzwK@8^w1q z38-x7;Tu~5ogetN)|&jlznZ1Xo%*fGO2dvWyUm;F4o$tUT`o0lj;$K|<`d0=k%bCP zZEHgL<=}veLp4TD_-p!rGm!Hr8J~_j*^{5+Xb|V8fiY)!Y3ghGbfLA~ zDJd%#0Y9R+M;`1~w1e=H5Z`L}T{KY+^3NMmv0yVPqul=OnYVhiYO;b}-4cfq|Jzk#2W+}^BOP)HTVz=Yjs{6-% z5S~!{VinoUBYu~TMx5FZ`VsDmM~yVZb+{C0Yev>aMN3Qkr@>o{EsK( zoO(z^7=ey8uZ`ceKX74zWGrfx(%LDbw60w$u`JE>w0O|i{Q*<@qcLeht^$qtD3ABg zxu*;uJ|87IWj%rL`RBDUD~U>wS|oGg*5Fs^HJ*|+=h~hETth2c6trH0%DwsAsW$ht1(!L!20!8kC^GL z)?_k=&HZQQmEJ8{2YBu*oPY`(z+Gl85-v)DI6Bc+5~4BzAtn9Fwxv9zT>8mv=u<&J za8X>rloG_eEINLi=({J#arw5=tML%@exF+Rd?ebvKbbwR_U^MaskilfKVbTl>pG>g z{%ws!|E}7q=it5b;;Gest%Z*^I*mD}6?5!h_MR6{0WsbasaIG53L}Bhl!b7S9IM~J z&SV+_prq~hy2RSC9n|w!_t9PZAK!LiEs{yecyjgb3!1;^jFlMBpY9+gb-8W$D=S|h zTF~-y zay)4LW+1Jy9&bEMu2(gpCRGd~NP7V)R$;D-9d>aP4knhsbUP8XC2#Q)G^~5nR!Vl6 z-(Rw@d{@MUTPowE84~i_CgvYS_Phm_bH!R36*h@oRBPoRSaAt;N(Ezf(B%mU)c4C4 z6yU1hj#yA2n*>?In==p&@Rc1}#9+Ubifu zmj@57ol3&Y$RYRSzo*n9$?OTX?d-n&^fC{+{~m|cxdwh$$iQvzyefN>r7Lz!0@~1p zRe^qN`Cz{%aD_`?d=)DB61jjw|!29^N`kK!az+F+S5-*GSm)w>FDm%=$s>!nR z=uBTuemSW5*s5WpI$$vZ3QLfn#=+xu06*s0cnqE;lbOe~+wBAO{pMT|Os&?}p!rFx zCMBmRnX-VdAe@wx94`*o?)d}@7@lrgf&%1fLR|XvYr7<>ZTbXwIw5mJg%OPOxB8F) zH=y`+XAdT$nm&upMC=;3BSeu8)MAI zYdek^pTM!f1vL)1dP4BMVzA^Uz}L8Gwv3_F$C-Rbh;?Br%H( zAu^`Qc4b6{bc@yd&q+hna3%@yNj!w#gyGhSy(Lu(nrm>Hy=DCUKk|qi-~ZU9k+qr% z_IlyvOxO88RZ%@xw_gqCGy8(L@}9HR+Sj4rbTAcn!fD`}1;PbWiX#z0A`YYrM%Cg(LU_>53 zcn#K;bVDvH97BmQ3GD-{xXuxWZUdnCE-4r`hHOhnN&Gfs!3H`01_gDhsKgS?5p_EZ z5I!V1Uf3R_^>5gwLr(M9z6d*+1)!7y$$lQz%)yb5N+c9E%MtQfuB#X5Su=)nOt!C6)}1!#Vc5u#@A2abkAV2vaLtM3kt==;%Rt3Irl z4^oZ?Vv~mi{-vxk1a-`hiUd^_7dz*MsPz`Y8g=*qm3+6SlBJEy0kXHdUEkP$06eLd z&#vgN^OTeB$IufrWYj5{0DXul0n!E-CH;jFye&VJOnq7XXpG%GS(uX&2Yzaw9};rZ zDfA$kl&-meO+}uuSM8L_WKq>vmEEUHthn!0#fuIV@y*f1MS8MVx7}m1MiT4T6ohkI z^(nQl6Y9q+whH84rh4WdgSfPn!BT`+#ng&^>uSuQah?xKhaiRDAM9d+Foc^%8@FcyFR>nKxS;jO2U44ev8XXbNrL zU^-%+a6|8fZD>ur{?>xLF}b|wz#RwAo@YdH*&3QN#;)J|YwvkYr^_sbJ%85#kJZf3 z4lYpxn$DNFssw1ZdJW<4f3N27y$|Ns>#q{9r~*?8Hx)jX>Vw~c{C*-t!L?duG*t;) zf>d+3A$V0M8jn?8i98Ayzl@sy=|x}nCKC`sjCj5ief<~zQQ8Luw^!SF{?zJqbAU`e zMaGwvD@s?VuhWwSMOAxzOTX7^gCvF`g=_km5~&llc&JC7wZm=ekBdQ;5J1sq{q$b& zVy}TtIFamqd-x(B?5=dNJUYs+ip`K(nbD_uy6y)$!>3M1;Xf>fL1(JxyVeah8%z#o zII64&E>fAkU;4Qf8dA3Pn6F=YF75SKPXS%wc2$wA23=|f=O zE;88BezVMol?rhm>u7B5@~K`L-?=xsn3Kxzn2!vRXoS}DM)~|tw>_M-quqW!t4K1K zADMks9?~aZY>_171Cc$JRlZGqI#)JXrH0;qU&L^3Q#87W{nHIV&n6md~tON zM@>ylgUPPs+hM*>;OTPv|Gi^cSh8E4z~!?3KJdjcV|GbYJG!t;O0`(G0&$>dW^0n< zW+3%P*3%6F5{?&-A8g|XqAu(qzs{Jl0-9FjvVJ2Uv{Z2S&aWO5Cz2Qly zU;A`++O58#H_tCm7goaI>3QFHO=iAGyJ!<(tT5V|eY9t#IErD=77>!PCp3bW=Eb{~ z&f_uPnEOHXlr5P24MbG#iXoz7PomNg0les>B{_0CBaf)Pn-Jxn6UNAW(0ZZJ`nn7D z>VdS$i8#NN+YTbrMXz$T4BQu?dsmz7;w#*r!3wmLliE%PclpfA540%^+zKI2-Thrcevg zD9hdCxEKJNZ+UnBv$kzM7G=FBJ z8D*Bruf@=5+*NLo6$*XF6tUrsyXgzb^TYXX{&z2SF)sx25xHwIMb8f-T0t{<2Lo zk$W+^fQ5K*4aEb?4<*To1>D{g#CZxx!2V24*x<^`)tom>Z`()ecx`o$8GsRo8mr$E z1LPQZx2BKOEBgHUgmkX=ZQc2z>+rmD3pRo8!)&9r{eaN-vJcJ&oND8Xy1f_VBS$5npC>IE76^uUM04C%}JF7gn!)OGIOiB@(p2L!8}FS+Wp(a)2yFtl;LtbiCMbre|_L6?^hzlS(z6`)pH~wpc7Hh%E|z;qhC}NKO$ol*O+U4 zlIUOCm6=s2IBS7fC{Vfs$V6eZj}yLnZC8C~vLe$=N}|anH}qNjC|A9Gvj1bi%C?W!%Tk_{Qgl#|6CK~|Dp@Ae2Gb6g#m z_CQr-&?Hx<9`%%#Rz6R$=8t$J?`;JTLIDJ82J?v)t@>{yCqNKL#IRX+lqLxf+# zO{@neldUA1^aB+IO_m^vbrl(>=C(wkVvCmEcSS#LTDLC4J^@9q2C;M+EfrmJdA0TQ z)?DdmX}e*2cle#=)JFFW&;#C0SOQZ1$P=ydwVjIAit_}mkp`&2U}W&S9**lj=ZLXK!eUVJiG7P=_j5y@npu+qx5wh+X}Tl zp!}OtETsbB^edN9gxTb5Ms(zsK-0x1xf&~05%ThMb7or#a`N=CWHiB}(dkl}B^3H* z>vb&I(B;uTQm6_k{ALbx$_4`AWh~jB{e6&p=&F$MMkp}RFzw0#Z7JP)QnZd94;WLgl`uR_fx#9X!QE&ZiuqwjzA z!iFLvBe4Lqw6v&Ic60xz+MXkjm91gzr}_(d1&nefjL67EzPao7+YYN>>l$65a53z% zJ3Md8cCa8t^-W(2V-h64WT-wFK_iBsD9aM|5+3$6dY0{VI8A0;thT#o#kNzV+#Vuo zvykHE6#h#ltX(qQTbRJ*C2;-Lv~Q`> zY+!|{^oGH-yCw7k*CmB3Y$)+lbp8P>U*p@ zBZ8QeKN_;wfNZ3A&SffSrT}APUX*Vqj};(2{3j3Pr@b=cDpnXlb?n2hM>eC|#;w=m zmgvp9T8}F&wl^k+_p!-!ufyC)7=g*|t60ZTupRr=9ypaw6zWG0k>#z#K|BybLDl+N zR4UPqDmH!l9c66$r@m7kj2*bwy2>25>iEwB1cYnJCAGNvaJ?cSk3Sl!O3c(OyUZoK zp0p2&4USON1WRSUClui7ZPlhrk;d9kLNah9DE(%QPYM`=N+N8~xNuUdAf-?xEH^tS zH_GQO5?RV%xTD+qP}nPQ|uuJ30IP{&TVK(spavbFR6@9HaNA*K&P;>G)nF)9Tcv ztzAu)k3dwW03l={k6!HJR9Mz=p8U}3{bi_`IQTfGJf}paa2cGW2k<-`qV(emX;#Eo zIQ#VKhh$q29QFoyLG06jm;A=ZmI%?En{JDSncUXr*Q(OiWIX?dsil=ImnmDqcR(^a z7v$A9-S7k*WcUTrR@@QC%O7TaK6{V#AkB~#Lo$6G93T4JFfFaEX#n%)TI-#jZg{`+?%5S+eU}WjA5cJ* z;|~0(vwQ74W&{qd-sHxBu<84A**MMl*9CCsu4<>6BrG-!Zo{;5Cnhs~F`0Z$3ES^4 zBn~HdkaJLHK>j_pdsF}GwlkS4Xlj|Fz#%$>dupSy#Zt~Ax}FGSjs?~?$1+{2XfoP; zkZQCp@OA0MgCxCGwl84EY0a#|GoW6#?16zB2c6`_8mM7BI19$N&fOQ=a+!~+t}=DK zU(n8^#?cwwqlL~8uoUNxOO`m<(x$^3t&SQ>Ud&du#p0zho-15hLAqbcr9@)@qGb4^ zda#}A&mY`f_;NpzyWP)1b=+7`n-~$z1MU{bx6Kv=7hO3&+)?6q&xN&T0#gBKE|l)Fz)LE zg(&xrR3kNykNO=TWVoZPxAkE=*6XtH*$y-j_c~?Vc*DwS^nly}?;E;QNEPGI(YFYl z-+MF3V(BU~T;lP0DNQm6gX#xz*Ko%7`{8XuwZ}mX@MFUQ1k*v%GBOU!>ZbM^wl*Kb zxqLt1U)Zd+>ROd58o(nD7>FJlFVE=JOY>2;J-dir;4>{Ie=1;#! zEm(5gKe@NtS!s%6HtDg*;JOxW-r073hkkZpJ*0}p zlZA&5zs_*mpN1${^R0ZJpIqWq-nPKX>Q&(scOj~PF^`1V_w!TETmpF{BuIiS7KCA@ z#Z%cmXUXLF&I{&rS&>e@uhZ*?0B9H%DH_ye(LAAkZ3;i%gsWZH5FwkDEWnJM{@hLA zDz+iv3Ru&q_wEH{&$|ygx1YLS`=)$+PXKEFTBF(cUB|os$1g7WwLP0uo%^6Og`^8O&vjP;A(ep$ysx`^ zo?6VQq6;y9JdYQ0`&)ZIaJPT@5wc!lZ9N_=qtYy^G*ma~4(lUL<q>NP#Lm~rezyXq7x5aD&E8(lPqwc!o-KFyvb@PTUMXXuH5&Z8wb(s^ z21w9fR&3^o6z~t*5qcz|%;uq(4gQFlliLcx@Q@?zt~=z|2vLouRYM_5n(3Q7AS|_N zm?HG-5S`D1ePJJKsq_Q%#NFLnmZmc~FM*yn-5>Bks=QAW4udbgc~dC62#u~i4_93e z**C{c3o;9UKUi6EMV}H-p%rrE2wnX#Oanqe{x?n(#If3reZ3Xu72+~{e`KrKX|vUv z<$jzV%0m7>R8m-@YWKVC+aeh+bl-k(WKW0n=yPRtGoFIAo(V#g+Q7uogWCcu?fz#n zEGC`G*J=yip3L54cw1eu)!$KD z(g$w23g&^Fy@Ph`#?pBOz!WFEUp8Iu8*`s7>ur55GPyE3zv3B)MYRhE2HMF4bn%dmV0=95&Fi>+{b~8jPR#m@xCi>mlj#6<6Owk2hJZ zTC<;OZcmT`&448O64X+fmRer-tgNREX*)q|JoT_y7!R>!*nWd20_m+X%Ej;9Pc9TP zIcgni9cThnjlnoi)|+F#o^Na)`x*36=2O#;bZSqs#5{O?z;&TY%l*93rsFJhM`n98 z7(-{Qx^;VfbJw@1dr#W-Pzb*(MI`dr7SL!IMedUa0(2%|uH?x1FRAG6Ayt5?f-RP| zu2f$J)R6ce-q0yh|L*7fJb9f4;{T^swOlVWo@qNzzt6t$)&zzL9>}q%=A?@08fwQ> zW5n>_R%W`gaLN*GG>EV0aJQLP2j*qD>jRJ1 z$1$Xy5lD!bR(UV7^qbMf#<~;09+7jR^|jf(^SZv03v(MprZq9+^Sp38@{MwJ**J6j zykUD1Oy@HP{`1oNd?l=&k^Y70bg(WN%v{Sb10tLM>~t<3U{kU^)d+; z=f*5YBNY0h{hB(N-BU3Y$IDQ=5z}u{Di#Cmz#vRzROg@u5W!t>bM~ae%8~%V*k@YF z(RT$Nw^GmD3EXu8%p093WfD}gDR8UbHMjn{wI|2XogCIK7-ZAuyKU1lDNZf)y`8~5 zULk^~Nobb#QilvO%Us%bP+we?Kw0zU{YY*{Lm@&endZhiD-`8GiJ*iQoY1>k zmRKsx+$zXrB#NNpmZ-Y>@OAdVbN4ED;xObm&Q9|LSgc{cXsT^7ZkCM>3&ja`gU#snk(14ki8m{ zwKhBa#uv1hIs79dv*h7+ICBE7u57_t*M_Az4fpxjHt%z#K;M@XsuKvlc0!G#KTzw5 zIgdr^t~=f@Ga(R=v8sO4E{6boaEptX`IBM#vwkU1!jhV)^`m7cGc@wxHDTKiVO<#m zWh4eo`&W{pY`ekHL~`Mc&r9cjO2mw3wKc$eb|_;B!QrI3_g}929=P{kbh@>A_sQc9 zF_PAoXb|ZA(r>4fX$0QQOQ7M__uxJAShQqk+oM}4RM3fjo3~}mG ziH!E=!7_y_emP~RhshTQ?&R6nlYYG#3uY}vp2rw+Uw<$Lm>qww90(D$VeuARva5V_ z#p4OnX4eCd?@M=Q`)ixdwsSv>!y3rdo4V7HNj!98TisxJOL>P~VT>j{Z5uy8>j{d2 z{Tp*5hJh6K$71Se%tWx|3VScJS7YYI$A__!YN8DOoKqfO1- zTv%xITquD@h!9`c55PvbI=>Hy##WjgZ*~5NkOSb_O+V*EtzRn|f ziTu?!8&Fu2!Tq(k8T;e2NcW}2>HSR-$64`g7;R4Y-K;>?`#!StAHxysJT(wVyusq0 zdO-qUv&(Zd5dRTC`(6~T5&`b+S+}YXhr*WY=g+jpY{-Zt%{>w8J_tB<%o!;Otkf-N z&fh-Mn^-lVUHRwsy1vhz1?U4HG?M3O)_6;sA(Nsl;9=uE74F&TFYhWZzy5s}3m1^6 zd>**h{u1xcFF>C2=WyfO5L)T{0%z#;CdhykUNZ|dB3V`cxgfCRANZmw{!@!zL(PnV z&E0UxF33biLV;<1kS&+TzP=88Y@b%}$N*heMZ~s)c0a;Qyd8=eelSdwS>EnF?>9ZT4xb7<1 z%~=@Sdw-_YSu=B%xeMePl}isvqj_GPEVj6&#C%cKijHY)YBt?YOohkNfY30@7u$Sq z*!k8QGC_-BX1IOu0GA?2dE*9jr0^LB`6zJVu%JiRI3>*UPatUh1ot5jpckoSQPhU5 zf9IV3S*Tvk;C!rZb_!Wd1WI6)NK0+v<=i7`?rcYGr(@w`igT2@9(rW>Uq^x5S3@FR zml1##jIKC24ZFQw=6x%avz$MHT0KQwtp*j7IT^X~FS+Q^{^c_AOJ4f^E6Wzguc;UN znQUxawx89u3uv}Q@+bzUCRg<6_$A*rRo^#R{I@YN9~iqOW!WPDC*8+UkymngeOuJt zD`0y&r&vgc7#r16J_;4)RD?{Z1irSKT5|f-iEnaZnPMR zyR^oHeCZxr`>S|UXfh{_OKJ9IRB%TlIC#nijM}-KE19Qj_|`FjoUNhdGjkNdQQ~0X zkHp>We#rT@c>9*;h?q1T0f}j$OeQb$Iq>Am235Ve5+|z?#R>kZOk;yGU0LK^2*|I1?dDAD$G*}nZe;jz8I=(!!X z1?@VMw%rfJ|I~97;)PgV+VJi_bh|T6wlM00X{UBLhG{CyCeY=-S6_^%hd7SyY?D_K4wZ9uq9h>p>nM7Kd|DUt|+7-7coGiUeX&`(}Oq7YYa^1F(8rUI-o^VDWy_z z9VMOwf!%l%l%j&*;z{XjnhAlJp@dKZjUEqmu=ue{DH#&yH4-=8_neQ+X8oUp@0xVz zKI!1(e(0_Hu?4*gG&XFJVNd;_PfA6L^kCvg!SywIofLlImxMAiMIxU9CXnhj0dqn|H6 zl`OaUbjy{RH~5MeFCw_zN3_`m(Kt&&Gh5;obb~OIXvAh`mOde6peTX^66U%(OGLcY zU5QMfSL)jcz;`qljf-I`WIN7i7~XCu`V4A7pZ5d9mf9Eqd5+^N>A@y!bEATmm6D12|Q^yJw=5tNi;& z&3ydExK4nS7)Fwd0tpCa!?F+1Y&N)tUhvi@K_MfkZ>H~3OKJBShMC4Qu?ks6S!{(r zyE;}r6eXD6I9sj>covvv*~JOt#0sbOavKHQXUp$Mb|=aigNW1@hiZ_4!Oq2_mSd%F zzjJF(*fw16CLCuDKvVewTcY%dDhPslN^d~vsW6F$uo%>_jhndn+gYQalPy>bKDOn3 zzIRn@-k*f3dMp#Mudwi{VLzA!5w+u(-8bipgN;Y&xZXl;es%@?O!;2ay&f)hENq%a z`*S|JPBvejYJCopoamRq#>__tFM0n!jkh$TtgT+~v>~aqc4V1^EcHQxX2dKR^rU&;iu?mcW*{=S*`dQlLQiO=OMV`yvf>^~BH>BI5O6z3R~^R6y&?%Y>;q z9%o`bFWom?-?h5mjNc!PKmWa2mz#*kb-pW9@7H9#*FW&#Q}KKEZAl{xF=SLK=`eZi z`WAfMDA?_?_Vl6N;J#o_>Kv8~Xxp7gWZ6BzAC4dODv^dOERlvrkj?z4ZZ+v7F4G@| zhz!hTf`lniE75)>Ra#+EHnCiJ z0e^+ViHCeJFabXX21=5ViNH(T?a`Qi{p*dEz$NUL`n~+_%hje#o=lg4K1@_HTt$3n zM|~ck(~Aq^=PHgJ%|@Fq*V>NrGp^pR>e?Urw~fy2C)(}17*}St1w*qLulL5ojh(L) z5P*reh|YGa>kT?FF|lz0+sT=Tj5g@{7h^k!0PhWis38es4u_!zI1tq@SU+}dex+cG zVVZyS42L)P7QPf88pW%SqYuNh_g>@+BgM|>4$d=hQfAxQ?-Q=&WvL^b< z1NM7;$aE?G5V#aZF42|-{S$PbZW|O=>$O2|OIL=j7oel9K&2PBLSn<|y$#M4|78vc zlFX@w{UNmC=a!hp7TX;SuOq5&lUqQX#Ilml4gUAulh=%|UAJx3yX!nHmU@4Twr+Zj z8`b|2Kx`RSfyXKh{RQ;*xIg)%-s;FJr@btfDrMSO^e+Ul;HCNybA|hDUVp`2e?HPO zPFkKqWcr3iUTd7Oy((mA1ZEf4toI+S=OE1qKF+4YT}Tdxr2*_vgvmYp>%+ ze@p0Me&_2AHs>WDfBUhpcvyi#mqIls%ckH#wE!a*qMce8DP1t-!PMFDdmtUK=>pxa zz}FprNAVlc)Wf(F9}f8O=KPhqt9PPlxVEicqWt60?PnWeRP;ZKZuhG6`>bOCaH|US>yR&*Sk0(Ae>AxGB*|4S#l9_5(|NfV{_p zJGu)hySodS>GZY!Qk9GcEX`pwy*cqjy+}1a;Sh%dEZDiZWPC_Q+W}Z#D{_?veMx^h z>9Cc=(*^Ejd5*HCgvr;1p-jb-fhQx&Y#afb)X@rXlnQE~y`(R6B>s36pNwih3i%TL zbP>~=1sJg)CjT}VreWD|%9ut(yzz@saP~psz0iyHlwE8f1bZ-(ca-v(x8QR}B* zIGC>Ln#C~6ut!*Ci{gK>rZ0^df16BYNMnZJ?{vDZWLL^?arNAVVAtASSp0@`yKc-K zT&f}<0w`~4t#*2>)lt_LB8NHoRe`eC zARj&$m^{rbulkIHT3roViIBpqafJ-34ZQg+mA`;W{o5c=67?n#kF)I-z7X1X{395U z!O~TQni+d+~i4&|Lw{ww8Ju3nm`Xnh&kzFtMw*EvVXNJrLz(iTFsTv$5{@Dw8F z2yP1v!-ZTB59nRgt!qg1ly&JaXf6-B+PA2$%?MK&7WdOEa8T3_$bG)V^RPq~CvUO1 zN$QxPPM3c8;^*w6`kj-7q`_^#nt2Hj4<7KzY$*jf5wh8>8Dd=2%;Ka|-qZ5dF%3bi zgvNQ>;R6hD0EHD+1C+q-X{4dDaPpnTznVK3O|i&J9J)s1rm>JY2^WMIhIZei^B$!A zI|(ZsLx4VO2H5BZQ6s}?g>9K4sd}ODivWuK>2cxo?E1Sgck8~EPwVIY_)%~ z>1@_ISfGafMHPfmFz#&O0$8C=t@@1WoEu!w1957&qd`v>O3GXJh<%naYW4%X=))Qq z;)*zT=W)L=@x*S_QJUpivXPWExJ6E>2c)}#vd|L(oWdr;S@NUx(G5Mj|s`hRH2TvAjW$KZ4_CNDU zBILwmAgVm1A)RI=Wrpz2YWz&an=I=vA)uxZ%=m0~Yy|Ulo z(9)_tJoo7=vm8MtL=C9)1UOV#@iFd$aPi2uLGafw<;P!Rml)MmPR8luc*YM>s-y}Q zHV5Sj{(2C=DHJZjT){bzJV$hi#s7>@*dm|WOuJ|kMTl*(@6gP+I=4+>n(HVt3Q&vZ zI>vC>%*oxqb)R_O99!FRa5L_G+;r;x_me-?YIiPQueK*{Z*T90r}EwvAoU~MH zrjyIaQ74xzSA;GKTfjN^OwK6&!xZW%=FgYQ>nuzZiNr`X{g-w(0!T^t`AP_b_UQ0T z=d;BdrO_;~_1xG9k>$E#=K5mzuim+>aqYf{_1UTQTB>{lt#ck^+*CO2-^s#{>zCLY?beZnHo(Lj;@O+IqPLg?#QN&YV)<0edj~-zgZwZ)tsz z$G-O~!<6Sl-RlCo7vKG_s_IQue0;wy0kw#~diR(+)!ag=$7OdePE$nKlecxChBL6A z>lo%{lzr4sL?2YUR!loCN6J%ELsMh4`xec=8>@UaII|gJbIVB-2w+jK_HDk>=xVM< zrTTi2sD2FrmYT#24pj*~@go-zFr;D3!1~t|(Ca6UQX6}%GkH`+0SYmOW;Ke9G=n8Z z9a<)>at2Oy!y=2{6siEX!SA%H2491Oy9!1;5i=T>U)n?Ad4lmsM+x$4@U$x}BCQv>_oOKB3vQ&bFe=LGvSAa5hR_2QL)5ZNLut6%w-k(DXU>JR^TlLYbP?9sW@<`)-> zz_fpUK!%2Xmv?ri?(Ov#K2!hC$4gq>S$f0e`(0q!^BnH`@$!SU&nU|N@dt3*cyuL3)i zF&>D(Ad?Ts%3l&34bgUriC##AKFwYky-e5sm$fDR6J-N{Fac!cgt_ozrl9K@_hr#$ z<40p5{dh_008Q^B+yp)7iL$pGVV)J0ZI88m5?@FEzMEC2IM8CMByfXsNrVe<$Xw%2GT91zkvQRZmbpl}VoiufVogz+j5Q0I$a`T6!oQ;rXB>PY}B?W+Au_e)m2-QK|Ymg^1= zDZEzy&*yUME!~axj(%fJ&dWZ==Idmp4Ts}OPd6#tU<-N7AjFqnk(ffS5NjYRjM-oG zb&l@o`;;TdWGss^?q8cN!%ldwHC^vggJ z(AciW$AgKWEn5QoRtHS*vKMwW;NoDl+}f1o)ubV0g?bl@LDKI>%D?CVL;xaRC0q>M zq$LWf`Zd3lsW-a)$n*U2WdGT4pnE^5`*R)%&>NbL#^8$maI89kOLK`zW1EC8g^kS{ z|2@09@qP1l-FgT-;r%&Z$LPHs2Ifbn)iG+dUen;KL!a_rQ0aqq%&Xo-(8mX|!WVA6 zah2)Ta`CzsG88Y5I0iXA3;M<*Kit}DHX`k)+i3==tJx_(@AEZGJPqX1{}NqotL$$s zS-8L7$QV*&9F#h3$Prvl-c79Fx7_xxKz|~nO6hMf7Dp^tV#FGak@bBLRh>cvoR%X}FK(WYkr1_(KN@<-%F!2iI35LrTUadDE;^h zW;E<96IQ1Up1?!W!mC9fh*(mX2B7$0y8$2v3vQw6LZIGMv9Ut!k*0N9wr0gPCs0(m{D3`$l-`u7E!Gf2mG@qtj}sDGw(}4%-=6 z1vpfDl{vacfO0COs{&o!h{~wLjLwM3YDG||gT75?-0ms^h$!Cj8F5Guz8NY!S)Q^PK1O=Yg*qE)=b5)w&ciDE>K(+l={L^j& z+oxFL)$j=jjz@q^UrLnaO<$^11-&gI(|)dSMzBsZFMPe~bh*kXsQSZ8S`gi)A2QqbOb$P-$Af6OCzth#g`@4x8;R^OK-+g`QulklS0^(`&wOTZ_f_DR(>Zs07CqqzfEHW{MSuhI={6FQ`kO!f`388ThZvk$L!@5-iN0$9Az^W~4EqHD9P}Cd^U`eVb0D(OYSqo$Entd$ ze2FqU2h(ARZ*oJ=$w9FIlQUrNIC~VSH*6qfN~KcRQBmDL9xNk8p!u8!Kiykdm{`j5 zMJc1{%!!S^-ly90tQ-P~d#@>(C}VuNuNcoWXeQRr0Y)Vktu67)e{NJXtKl|x@^cc| zic^uvpq_CE4ba|xHDBO)v`bpwZ|rn!PiJ$zr1Cs?V+gw?OElb86(bqG)K&dbQ}d*VDQoJO8e6^eVYtT#~t} zW9IbCF42usT7H@ZfB!?zkHew3O9(~e*Nk})mJ1h?B@smk2ink1ZIC}G8v-!gG)o36 zlna+D6)fuj$(|l+@cO`zFhhk%A%6Z`WxIOeEImENmc+}&p!Q8C08b5b#_BNgV7|qrm*F#RgN9=p>;%#tM zt=wvNHM!<^$vWYN%$*UNJsCZ@+h>vT@`)wA2#3S%wB{;MS`Tl5AB}epRXD_Ba+7(Z zI*ZASnal|r2@59HD}H>+li|ze>ztENR-QPC(+=B9plx3mq z{dDjFG<)sm!^ygyPkOl-slGbQG1XcWFI193HRxeEtWroftha!Nh-`x9tQ$ znU@8=pvGVY6|zpN4oEQ}tSStkB^U$VS;Zzz79xbv$}k) z)>(uN=JeS*{F9Cbc@N|ZDf26!ki?P^upJ!eD=3i`0-Kuncl@^7H%4YD^+~dQP9<+% zyGn>@%mT^bCP$v#)cWeyi(1|#FMBj(fKeL?cE#L~5{Q5E{+CysCmEz;ca1X$tpnBfFOU|$(!Ck)b`yr8jX{iw-z#?-~(Vder9 zBJ%#{%#2VvX}HXPm{`GkDtn9Wh!t08y+48 z0|EX7=6l)nq$@5i{@e}ao7ex>FJN@Vy7($Dp3-=lSu)*C%G}Dq*UPW0q=IR=t17_g`%Gdx$F-C$*ho+bhhYu%O$7VCC7^iT!pM z@D_^I`t|r6yY%F6W}NEyVa>PSev)Ij-Q}KItJY%?!?(*f&F~Ebfd{Ir6{LhNB+u)T zqKiWH(3nrJS_;(ktNObhKBVOgLde~FyhtIW<*-5QAXi>riqEI^iudLg_Ib9Fu=+O7 zB^B7NfmMT(O=wDW&}H4FqqvzA8Ny4a!Rrkb?GPbSvIrO3o>Dqw3%})ZIcHtry;G_l z_qZnqo^Ed_#$-Hi z)Z?{QTon%XZ4U$_Z!aM%ptMt$Gm7u2ReNOJtr2bIRlO~NFw)GKQ)rcwtGmkQ`2KI3 zhXbfI+n(~}XHNj){oQshit8`7Z!ToT1cQZ`UTk#$lF06pxx0Y8o?DZSttVYV155dw z3taMoyj=6k>3p{m$ofYUaa=<_J@&a6fj5#iyu3z*^BWJIwz?iBqIBOf>*`#Jikc!x zF^Q6j^0xPetZl4UR!!o_h$x^E5NmRNTwGj=YBM~lNEUl}d1BbKFRB5ln26H@`ozQC zrla9MG9nD&K!uS-;agBf!Zf1BP6$scihhuj4c33=O#HRFWycwf?Gg(Yc6vE^Yt~nn zGV!i!{TOO$CmgZ~oCW2-KGnx5fDm$Yu%JxYQf&)=^5GPolPw`qBvO2(9~0Sg12@`D zUoY%bqw7>@6=EV@TDW*U_sf0sN0OpSDWU(CAlyu{a@w_ z|6j3-_U`wt>!*<&XCN&v3;QXSl{&XOgKeGe5(Qyq-0~)pPbg=8%VQpiLm9B;?1$5Z#<3 z#ZOO_8sbwDPZx%S#P`Hx)o=VtM<})EM;7?K&LhEb26M!m#>gNJJU2!F7|40VbdiRD zH}pWSu{K>m{^8@>IlZ}2{gBGB;(j|Qy#(ym}a8VnlT%LiozuLo$% ztj$1pO+{8<)fZZ>WVh_Lo}_PBwp*5C=2%~yeb$G_X@_*$_*(Y--PBMPfRc*SKX5_I zqPgO_& zJ^x|{LBv^CkNMeDp5M7$Uf6W()!2G}VgEc_94z1L{A2622M6$wPaNSNj;DIR-cEA4 zT-0!M;xj=FEAzUb7`QW*baf%x1;l)&*QMjgP}12HI+?_WouZ1we7n-WQLKaDC(r)H zH8}klk+cZVo&aHBgwM1qkhOT7)`bs#9;Sd~1{vJ91Yq=eD1iK1dezOf=1z_{hBb21_Va6wm*&XH36@@ zb^?y+Zs1V5e`2m>sf92-$e&(8s{mTen`d?&dg|); zLGK2#v86t$JgGQHgoFH=fcCo)rk*;vP`Ux^-xO+&>wio$pUZ$O`_x3@_%XOFpKhWX z^65z!GijjOYf>{X(AAQ3XdtDP#eeVfs&q6z$Hu9xH|AAq{Z%?4!P3@~g3&g!)TgsR z^UDx{`d=U4P*$tZmMwiTtbY(^|CF1-IlvP10uduG)r1-sdVDZ>F0QYyo0*!P%o{Os zkR?k(b8VoZk<6|~Cx_)VJTRN)HDhP2>w7wSXseQtknp`Puk_xnG|upZdR~7&{XDLV zWB+97EnflvxERZ|y1CHnD7X0*VgxM3h)`z1JrhLa6ZS?&^G3X$X{+&ABO0z_juYdS z8wJid`_Nk#1S!JE&{uXOiW!gz+w~DlC+3jAqr9a`z)Ajuq~S^la({%G@s_s3R%)@uuFU4lNvXCXHx!7)mKWyNpNE?* zmw5qBs*}#h{0pGA)r~s+1Bmx|cdbFC1Qg+PyzYg8`3biac&?7PEG@Xwl(cI+B~_@i znWP5^0sZ_4u|i=(hVG*?c=N!s7eN7Dg(OIy+L&Kz5W(Q!0D1E1J}CN*(?MnL&(}?_ z>-t&g*4wQR0$++0sVVW`KN0<3s2KeANKqA{+#PGNxVMBH>K$Epw{KsHY&Gh-;Foj2 zX?(WdfSqwltSeeJ(9mojK3d<+t0X}9h`>)?!DoFztJa9NHdg{^O41BUkLZ7{kTlBn z=d%z_n$s~S+iP9|gjRzx zz}lWN`+hcGXEInKS9E=|*Ftgb4-+tSx%KF=By10ovE-wos)f9O$L@rz%UM717R>2P zOAkOhkM0({32xc_Or7<3E}#RnKEu*phla26zq zbE1Kb$Yu01)J>cSzy-T;XRupjAl{xIJaHNb@x~HUSS1inuW?H2sk5puf}4HAgkTlG zV(Ep2-=|^5I3nJDK)-*wb>VgS(2+uDr1Z_tg*oxTZTp6+YfRB!aqkLa@aMxJ+zAKx z_an}^X~BZNd1bgZ8bi)6X4vdh7E1BfHdw!H292Yz*=}`wIs4sgdlB!n?^C)8IN<_e zc%pcCc!paJGm?}5uK^F)iL15bV=OgG&u$?UQaaPJB@dj&>b*Q)Y-Q-wD(l+TGQu5T z!`PtlJG&6lWMhiq1Q{I>6%VifwrhJCSF8HW7yD*}cSGC#=G)#u_*Y(rGdJH-=`0-b zf-8|nnnE=ER(4m&!Z0H#NRRFCxf%mYKf7|H+r2+^`GR%fev;dYbP8ONWK3Mo&WJhu zZ)&hbp)9EyI`+!Dt{YsV38DjdRYFsh3vMJn$VTQ5UTkAwgM3Q-+Q#>5%SHx}g{6fM zSB9$@@hTrwK2%N)luB}d5lDbe(wRsW)C9I|7X$Ea$3@Kn;Pa8Ijk2Un?DqAvlFn+K zLG6AgA|@jnu0YP>^T$OSd;)}GX2~0`3(xvBTV=+mgXpE*O^I2han8`W%vllg*YG8J;+vy=p7M`?e>IBUp_DyzJ8p3M~E= zC|^9tTC>#zo-gMf39Z6f)pDsv@p-MzXJMqi-VAjgIzCl}iga1Pk!mr;@Hc75j$gvQ z)VS&nKmHue#g8%f(!pJvWbtDFC!*j}NZdJ$bdO5G!tZLHGTiL-HNwQLU^}?*Q|+>% z1ffo~jcLrgJ@&Vv#OvO#=MB^KFa=QkKkxOrg`Qakm07dP|b}9hrn~fJy4&O_79QIlfs`?GArtBApj`v;eUH z5-yTQ73B1bpSea;fUDRKIb6UO$^)Wlq^BmNZ#xjzC~S0;9xZPx?ae~1mFp=dMu0S% zK#iOln@j(!VSbOkNw^jaq^!$INd}Q?qcj=ji+9RXZltsIUgnV)DK;@|^z7zlkRHCF zA>a_q@%E$JO-j~8jWH_gl@mhU^>OhS_Kdxi9{us6G#?s|&SkEtH|5 zcL=prMTWj)sm<;mLB<&QSSDX+W@B?)y=41E%SHAv324}%TUiRwXu^)h_$7c8H33cB zJGbGIQ_=OhZLZ$+x}TT(Hi0&^wv6*8meyH3Wgh&}wR^SI@p(F$2_4i2N3Yrn5&kZ5 zwQPJA@q&?zB;@jg5eXmNKRh{kgZLhH6N|+~QR{Wdo;G|5$*YEa#)YL2Vwxa^K0O!e z_{e5)Romv=`Xs?xs5a#3AoG)y7*Q8L__rW?GTOT1f_+QOAF5|)e|odfxof6GwfP%A z_h>kRj9^mtywONq)3cP!(1-G`zE}71>CDVX4c&_Km&&}kU)khJ6Id;=tyNgc;MH$_ z=b$)$sE`Gx6k)hC?4W60DEM>Sp0C>2sgoB4Ev16{`+Fc2_z=kdN7FSh*0nb49osgV zHg0SijcuoCoHVu?+qN60v7N?^t;V*o?>gr@_ZRGUt-WU6nRzga4eZU8P;&jutV6R0 zH`_N)(nDCh_2$Tlu&@ZQLE1PtI9NfwTMcS-+61Vf>V}3w@ea_-@>o3{CacdKgMXzB zyKf3+)R{zba}w9`VsLlATH}o5+5a}tMP)ODUd4nJ3qnTyapfrh9Vqhs*RPR#xGcLr zu0tHk{n1>oAu3c!=&>j8V(hpdlQ*u2LaJ4kr(=!}#VVuN=mLa=)ipE(IbOEJCc7`1 zyDbTYd^>cyeLMNz7pd04K+B^xYx1=R$d-x-gIf_9e z;ZQ5n^sm&I$gnPwD&@TZ%wq2zqmM`T?~9o2^~gxKBzJsRn9ASj}fp?jRs zWUolddSGPWErRse`LtjK%JF`_uux3zm}*|MU8w4{sWe6lBx9U=Tf#TsWF^Vl{U^5?I^cI z9r;Ln6v;bE>*Eskw&|(!&6^jYcMSiC`tK{eD|e+oOwq%w_n(cN!x$bM{dbPsG0UUF zlhosuyJO2ko(XNkk7boVL^uck*qiJ6k^$a&y>Rqx{zWvu5>2HNmLKlxs>#Ie_6=rG zoKCen=PP{CnL!Vp*=<_9S`>|8t7Cr&)5TIN+bP;(dG*hNuKZp?K3AKA{7|ODOd$&c zIlekEC;Zsq@Zp_ypo`A!|HeM*qG_1e?mc*&u%D9MT4ie+l3X7iVw!OiNEO5VH_RHi zOodjb7bYk7v$awhz1T^WsS@I(Dc_90Nf8;>Ko~GV2eqXuDnrom<*nkEzFg{feob_Z z*fk34bx87`l5#W<)D{tzom=eZ~Kh`njt6HPi5-b+<244Ddw5;o5L7Y^lfr>N*DqVP!{_5jE;McR4CcTAXI~ zRz^}OmwSqA)b>uM%G}Vtu;CyTomqY?cbC2t!^b|nM}RKp<;aZB&jqkD>R`0HadLb} ztmu_dIDQXRl@&l9o-3CpG0s{jocLY^r_QZC-8>#RO`$DQnd=DV)^H@t{p?sHMhNcn zd^Z$toIKcKxY9Sb3NZGJYIGJvgXW7#7 z(FOxMv|*oEUwX2#h;4rSHqyeH>r@m7HCeu8!8F+>2ZKiw|XN z+fon?K6;uO8#6UBBDekcF}Z%`_RHWSEWUQ}>>k!hT%e5_|1UGX$&c*|SS5 z5G2(dzp8??_ybf%duX)>al=;8V-bUtB`nbX6n%j4ST4K9ENT&!LX_JJlUau6oOVyz zpM>}I^Y82M{{AL1fUXh_o$rtq;1HG+Y!_tvEvJCJ+0@3WS3$E%x@|Z%AuG$Kyu6$v z<+J|J{fW%sk9Y>iJ<(hnho9ZSFvxC*dfqxLp0`?K2o+WtS9xMa5ucRuX$G>g%4{jB zNXoj%Pd>U%)k&kFlPR^(U%2UFbR^3?64ROMocj0Tt`*NAW|>YV1% zx((ONjYq`{<~kuUl9R)}jin-|GGB|*64rV)VrFZQ43afRgucU`TVhj*AvK z27Rsp6&pv}>G$uQxH7U~v#hStd2kKNlsICx--Zl+krd!I)hqL@ZWSl%SQrrbLBK!y z&@nO9(DHGeBxA)0-COm{c2o@B#Fpmp6B}K*EMB-~acw@X$J!|P0t&T`lSYY1+^fXg zSFt zPi&x#V9hCF!9}-Urp2qWdgUJ2bkEu3)-ba&Eu-qiCjdpEQqT^M8A-028UK;qcu&%d zISWB$&#Lqx8CVH<&~^MXqdPSvS$mk&FU#}&>0n)A5=i&=*=SP9J zHc~!wQ#8D7h;QfOD_*s#GQTH9pICcY8UYIC_~dDZb+rgBPI*Pei~6U&)%hULQ<&2U zKBL_5vJPT38Q-t@diO)udmz;kIgdq_dz2qavMf$usQYX|)8jFP1`#S?b!)RxbEAk) z6&44_Qk#qJd^hpUnn!7g*pxF$-o{2CAv_941xpCBBW1c7P@@s)OvClHAt+NtR6*;W zDXff6u5`lZ*VbMtrc)~{t;KMU-%IPIQU)d^B{6&69>z9YEya+mmjA3~LLD}#P#G}; zi5mm!Yd+-HBiFw&=i`n{Lhu#eJdX~=AAP6_W~%C}wW6PyuK98TcmY_nHglacgql9y ze0Nfpm!J6cflku<zzu{t-R|618xWv99#xm1f{x$RSi(T9%17X_-s-a=9eShX)#}+B>mgG9_xkuX z5Vzd^yRUpk`}HV2fF`rdmMU7jJ>MNbb<1ARnOh@$pZXA&8?2T}slI1f%r-yQu%5$V zy`ZRBV=&>esDEQu=<}PHv;+LWC`IBjz>-Lv4`1c@OnR(6Mdk{qvJ_xKD3?>!TT<715G9a6ccb-ROm+Bq&AM7yS%nDZ2?a(B zQ?Qre!HQXij)a5UH|ip%CMHO&KM@M%X2xb$>mOZ+UWkH2S zG=92%eumi_Qgrybp=v22GNkuEbgGDQX|tloV2+zMT+_Sy?a z*3w?s_y*S#yFZcZCMw}^1fAz7YPxfTMJ>l3BH?~J2vqk{-8uc{)^VB|eHpf8Bxkjr zNcGMn9rdsawjwKSv-22`=*Y11(^4c)atwr)fa}c3txw6hu3g4HFLq?5TEx74XXCb? zw(K!4=(C=;sFH^A=k&pHp(y9uPSJ>&q-~ zQp?Hv8d|Lg$(X+pj1C^Nb87y~&50{0ppwR7oxw}Rxnm+oaJ0&^BH!HdpWge}+S*!l zI&sA7>+_QQna}m`01kl%-gfKWyi?A)Sav#axQXVfJ3N&L?P`6V(3=tUxJ&+{1SRpr z+_Zo(FB5O4UuaXRv1w{ToltAluEBOoShla>?pT}>>e{x7Us8UbT|X810N&@4h!wd1 z{dAz`u-(*t-d4fnLoD>Pe3l#Wa$q6!vfOUaevz|zTdCLRNmA>3*5>k1qunm4ol;y4 zpuSKgav24}gUJ20Y|*g^wD1zaRTIyo%hM6l>u^^sM&TbazAZuI3h@BtvM)xoSc3>-L` z$%o#NU7Sl)t(RLbj(t&<;7NZwJE`eB?!L|-qRa6+CjfQ5?lC!?^Bh$3y)~#_Fns0M}trW1ZlO0pP!lO|BRpY3UW z!{=fB<)ONspMUAow<2F7P*ZEvd_h1=Ow84g;LiTQNF2~5!if3ENX`nXP(L%D8IT8U36C2An-_SrdO)y&L$aE9;^kz~lAQ`?PG4RK>5rg8;7 zW$*OS2hn{$G8f$UpjqYXbRS;o)AW#W;5S6l{kUx4lk0Q9x4FGyUE^bWw_1TC?J!;7 z)TODSavimK;Ps)Koa{sP>h}$M(>NUDve&@C^R=}=i^-?I1!O~*j^Kn;gVzKnAwu7p zi#2&&PCp^c=%P%bFP1V0z@POUj}z~+-m7(%d*2Ai-KXoU=p|!86LEMFV_yNQQCH0M zpp?dt+p+pGnk{%)6(&~-bmi$YqqKP`;2(}f)ac}x@cwEVD{!2Uv7#eF9d~ySRe=|i z$vCH8BDDIMfhMl}<&5ijlf=!o3iWCVAbmh%uz-NvOmN|~M)|jbrp6sQmjZH7IZSF>#6HtZy7|~<=XAHN*rwlPlc4X*;kfh>Z)Z6D z$o!06Eu`79&Ho1e>l8eA5Z-pgue|x1<#1}V9VYhUi7j|0aJ@P@;cvp@077&#GI-KD z=f$$ztMn`;G3!NCD%|te{&>0cc9q(xT=4_4U<0u+4q^@R=#Q@o=p*y_@e! z9MtuF#GD!j4-YKpvx(n7*_*~v_`&e;^?&%yKXKT{fVaI_aX2*uI52)Cmh2&eV zAh(}yeh^LK;O2hNyLesm&cCdhLXaY(Bo>h3^W}lCSPKEU8i?4vD2I|IXP@tR5jW2_+fb zkn^jMe-K~|YI)a{VeKP6Ew{%CtozKLV8rkXx13q`rAvin@bli}_&ls@HaIzIKUahh z`$JJj@|p)YY?<|%T1ow8uZ#rN%k0M<>-k;4HREcktG^{0Pa@w~SV^6?;~_>)VYsY& ztQ;~4O0{egZ2K zA?BHgKmBop?&#|ax>M+^Gf=uv2%wq8{wj~z_40AM;Y09Hn;Q=(&#B>vgitV-*}l!; zR;1wPD65l}jt(WLH1~ZO&8H((@75d`FLsZi6uX_$d>l_B&tjHpIj+pt2ZHj);K2#l zo?o-YHQr&yd;3zmZ|z9bj@jwex7!ev$Niqy|0)_Q*$dC7HqE6+4%Fo|pZvkv%34AB z*|Px~o;0>BUi~?PjvgDkASuC!**%iaiHukeGcQt60F~z(=NALd?aP%6PuuoN?2dWp z!KXG-Vx^FOFq<}b{^2jX&A zNboX0<_^H{b}igqld5yh$#^qvWYvMSt`tdlB0bIRq}^ekKsu0_y2?Q;Z?9F+3S(x> zNh)j><9e-IVPd5am4?kjReWIotLF-PhnaHfD4$)xoT9|s;wD!-H60)NmD!SNgLdaK zKkgeOG`|5FFn_E5un%M>F!BTV9s@8Xog6v6L=j6{D3h_DL|r^UdgZjGWNrUy4v#a~ z*DxK((oi9ElJ)E2&295(&}p)@XXono^f2ixtdg3_YkbVpvln6@N6u$B+A6p)iCK|LOAmrN5}c@uuIr|T2OEwvgM>} zSTM2oWiQ!?))enarO?;O%p;8b3+gQ9spYrai__;REZp2G4^ZS3-e(>OE%!KwQxQ@1 zkxT5jPKWJyfukwG=flEvqQjsKkLM2W^CH!b!NHIHg$@PvzkURjN-xMD6&+V5QaKzl zP;6lde|K`)`^Tfk#O+=WXdTFQhK1f8eQf0?R=)+iQP7iHIY&q54;&y#|2dh!wx>7O ziZO0z%x4q#2vLC^W#4$#+;o|Q!8^Zy9Y|Ds&W&0=K;quHS}O?Q<80;Wd$knxh`04W zObSlKq?yFoxeYeS@@!GkjduhI-lR`4kaY!&b@=`Ly*&@vG<*xM!g^mEGSu&s<~~N>E(;pO-z4wP?t((&XGV6IQyy;Nnt%&i z{^bIDTH5@!rkjy{pl+b}brJkn zs7dx2Y3Y`aZ=RA%pqHfSlDjO`G|0J+;&^`50CmU9oxU6JN|?~VPkyZD;-U|H=rTUK z1Vgd%{eO=9|B!do684+^OsK!s|8+3#vB92fH=oi_$M;fO=!n0;sIU$7xR!1~oSB@= zK??0{u>R4`iA|w3g^h%8O$q$Q`{ShlC6KB%Z4Dp{=a`#3Y24Btl0a&7N*4nJi5O`{m0Qudb&F`?kcR zf0~mHzt`*3?xHSVDk84x7kv#oqX3l7 zAuEgA+dQuh_QpNlTMzbEn+{J*6Or5TE+S#=iEVIK0A#vjn7F_ zv$(3EW8gTm{_xs;kLIP79(c{?{*@o=x!mE|H94H%}od+cJLaH*mvo>_}EFwLjs>Gr+nw$ zf^Nh=A>&;+>~lBIs{{ZEfDKJ|7MtHj!SS&bOxer|>*nNyF6RkNK!4tslH0zq^D2KI zZI4xuhW%1QRlczql+qfvT}N;AXU2GI8p&v@Z`#*Wcp5%xrWI8+?Q^(Z>@>lfkx?`v z<`yF67)1>U`M4MJ3ZN0}`c9Nr(xv$r=Z7Hw#RK#6HJ;2(Z)@9JuTpP^mdn49!hGWi z$;mjDb{jk_q_IfwlFaaIpW+QwC46_F+t9Kl@~R@gsUt`NE9xQQrH3#`lnu83do7zg zd}!XWncyoYo7HojcGvzbug;6XRKrnz!MpKUxEzn;qoW&K;x-x~p>8h5*i30Ep2w{q z&G#ckzrRU|imywt0`bxgYY4+P58ZEPUHkiAVaoI~UCqC}7fQvdac3_bqFI0S_AU#J zT?!xH5qdic2+$5Cp80h?F>kdpegwGST0CTqE;ahT4IS+aML+!>nrpMxv}BEkwo&s% z-Q6YMgQ1yq{$>tYl4rAy7S=?n#t(CaZDT*-tzc)jF?x{mazNm8FzITafOeg++8BSs z#1Fpl%~hm~4^wrej3^M@jq{-?BMopH64$|-BzN0!Ril$BDuA|Um!ORI7pJ??R&PwE zb&~{OHsAt6df#C!csXxPwPY)~d1ag0Slrw+)JrpTcnBNC0Cn8XeCd*~@Oe)PC4C>G zHo1%iqSkIIbhx!tA-j#8O=vsq-L?eJ|L^^(U;S&6sZg#5_=KrTdS?KE!OwL0EWcOD zhc1~Aq1L#+1kH!o@MUEYpUrcwq3<tN<_ou0k=Oot<upEUgi6(jT81j2jVUn$+k9Q8z<3CNSRb5_ zMRCKK8*hznf17CIux>pby~sxE-q-m(fc_qY ze#zJBr;qJVBTjpWB*q>PF<@lvG(^Eb`}v8oCx@4#?QzPXRcxFXA2~5M^=7w3UU%~1 z?9Ay|#>=QrIxxDBro848=L5*|Q*_^=fbdoQ-2mdRaCWtAk|>k#H~>S$9rM1A^>bKV zKSu_~x`}-TFf?vp*}>D8;cX09ck_LJqJz+*rqs$9mkaw2Tj7K zpQ*wqt&J&Fow1w#NxfU4s z5QSzy<^h8e&+5*59k=@beX@*Q&+}iNu3{UVdwPGNdEXa*tRa4uAyWl9QJc-_B5TsG z3jU3&#>@!@j2-Y~L~z0cvIDqhpz-twx^b~jb5?uZ>;oY4BfabEs<^OzB>G<2hyazQ z-*x`F7Y}~ozP^HQZ*Sw7T;Op=T~4qaAjXUFz@YgoEKe$9AVb?~dh#t(Fg^*unmC^_ zU6t!i7^f4wb$~4aoG7xI)lwT9qKg^PI@uUB6*R?#RkMwnWXx;W{z!P>k26DLTmPKZ z^LJK|&=t}gKu>#5S;lX;LskZD>6-_DzcA>vTxOb_Kqd6){YIn|sX+xp$%de6q>~<= zE*?eQ+tsS#2O^qTG%I9t{F?7f0DI{@oza5;I%6p?iKe%&*12mZ;dABglZ9;Db1&gk zQBe=~Tfo*qUBer@kVuaZHvAFTm?=!)tVj@j#=)Y3OP4}!r;8r>wYnqzgH&tc*}tPd z@2kH^Og?|Dhk-A;5m`jk<(?9-hw0C&Eeo5OxsHtvy4fF9-yCb9GMC_;(Tj^@O|B-= zoIF=u#-~N%eRk>elVVy5L@6@4`bcl!XWHtu_x{jwgu8yqf)2ligBWagadd_uOxv#} zM=WDBqcwVL9X6ROVPOh2iaXGxM4NARM99w)sbo%DS5ImCiqWynU9N@+%l70q|A+Zn z*{$iHZvY98470lXo_CV_<~Ajgsms0F;|7&6PL0l=5u!NCe-jTL8ZuxP{EXjyTg-H_ zB`#HpLW4}cUee4woKKe_=3y#kEMbB!Bg`Lw{6pD)@x*j8|Av37Ddo+c#d6f_Gaxjs zi;l+XtJ6B|P#aws62ce$8bi(97V|g$?shzP#7LWEw5hJH_g1OHh9qEvnYLTRObrIH zYS9SbZd^f+m|;?iLHFQ{rR1JZKEk1KmHq`veSyDiC-z%y)-~@-B#XtVK6hV)TF-`s zaFlkx_Rn3l{n`;MbXg5?Ue2YtB&=;jacvUSCF>}68kP0nl~6HvI+)tYof5dnIeiEx zs_u@jsOd!XpPBjV7*Kh7$Cv5KjTJ*FL{t)0m{;&)ZMyJV?zHsGg$M&tFnNfK!tCeK z)M~LLnFgxR7^wT+dqVh#9^oGacq!8h4Nx!Xi!Q^GC_-@#Q~rP&VY_coY8&K@94*u% zWa$2Wdb=-S{?vOCutq*=U1IJ-f&zj`$$S2wL)yZW^bSwJTCZ zG-|BD$2Jn*wEK)>2Gg@6u?OukD_I)Kc0>bEY!Cvc@sTB6vUF(Ap9l5P zTG*c7m6dq{&FNFvOlOLg>i5QCG}=lFw(femcHpDROHG^^*Fz_%)O2GoYwMKp;RE-$ zM%LHld{ycHaxjY@+Eq%WBYrGU&%|;6z*4D(h#tEoo+MkxT=Mh43XCJ(1vtUE-wlJgBiL4g$sFo6sE|O`X!55FM|LyrNAvRWz2h zREjTD>YLIhVG3VEMrbGgCev3O`Qdn)(JVAwpf_F=j0w{eP;Z-bMEz&u%gE2FB5y(d zaH@C=i2-_g@?_zpzFL6zM-Xm2h=m?*LEPHBSoyX9ph7$M5Dowb54e3M+%NNmNC+-r zq{1PQp}Y;Kwx+B6NC2G%NIXtUE))z0%f>f4G=xyo&h~Us2YzP*aX;pXb-~*lpC5__ zKtLv&pcFdVf}2t~Mi%j;y+U=Rb9V z?@cXR2`y9c=c7%nYT3EcSE<&D);$KdPhgJY6RSDv8pdP-wi0` zQVUAjf`FcldPY+{e=wN=Y4w)UAehT?=j5n=c23s78tq*Rl7$~%Bcb;i^6%giz6N6N zfHF#7tqOXyF?C{Dt-_*vr$JzE-t^|?MGp3VpH`GK17(VBfWpHGyT2xr>B?>eg;Wo& zv`(Cyr3Q~t#wY8AYL}{!?%w;7Y!yRIEbTUDZQ)W&Zq0rw6yyACL+8&&N&;o4*0UF!o)8sd%Dm5js>lB>>WVwJnK(P|=MeX>Cmp zz`@qS*P!+%bK!behKc95?mQQ5>{kfpuCU3ekzBT@UUz=dej^rJ?MN4wMY@vQfqv=3 zu3VO#R%P1pI<$n%@ky^vKEXdF>PgLv+&oy^$OyzXx(&U2Krx~*m2T=)0`8IzfXLj8 z%Ab~jK~4_v*7zg9X9xXH>i24gLPy;e2eBsmnsCR4BCsHlr&I+kY)6SGtEcoymqe4 zI&REZ)6ha*Pk>a`4BqDIewrXUC;0xqAlOq15#fDiidl-ic5mqQqgIp?ubAT5_5JhPU6*IwPNM;>l6oSi ze{M)u680_&?j230f3N+%7g5WXSbO>VgZuRbm>e@aJ{iZ|X7;%e?r13j0ye^DXq!m= zi?*>KZNQ(OjpCFTm1!^nKDEE}!MW+*p&}v?;GrNJxB ztcG$Ce~c#?kb@}cgO{kobj+?7(FE=8?v^Rh>=OF@FE|Xkbx~liXjGBjmm!-_Qi4_5 z(#OwJ3@ur;X9!8fl*lT&hQMO{fHc=(yl$BE?w`_RWx2zN6Hz%Zp@UqGFj(0@u1C$e z$qoJDEc6}!)>+JgY2ZOA#V{%8A}?GmS>0&Kh&~t}7B*r-Da?WD$I4nnHXgZwj%1#- zznL9p(@d^;Na4WFNL2s+m1kK+jjDb3U6WV6-oI6d7vD7^B7ey+v5F{-K)s%PIy-%P6tXjluqN3p znu&NpM=EhH_CX?tHR8v;Wc-i-X-qM>B-XG`Cb#0Ee>nWvn?==WgTlFaZ1s`nGz$iV zi*3dovds8l%duhGpdC)r>Vm4FF1LHD{tIBNp=iTG4*B!r)(Xc=*g zR^w(cK(m+RqYnMxen7`;>1PYi9}$jHR&JW-2J$$wb@$+?Tt%$Pu7%sl&DYyK_?ycS z9&s!S8G_}5G2M&HC!zQaot_`w-fsE=EjWA-%f0=D#Z>t+t;`JZ111H5q9|Q(G$m;) z*XB)yp&!>9$EN3sJk)2l+4a2n=0FHJ=IJBMZx^PAXBP>?>|dZ1t-BEBF{>vmsp}{ z?qc~f2z8}nl~+~|nbL@3r@+g4p#SKSPII7ww&xP*JKE>N|40x+?gIr4XA)*?RKh@o z9U?yCxCBjaK8O^71PAK6kJXKN-!L|Gv;Y4aKP=O}%i{r$;S1MO_#j34_^FJ9Wwssg@pcL>sUngZtK9lJ)$n9 zMoiy5$_1l@)r-)sFD+uOczH_S-S?MdAI-923mhI(m=s?+-vz+GzoR>j1xlC9vbngl zSUK?bt?jT_F5r_+Qnfbd+R?P<| zO5P1Zt=?lSsQcFwTdB{z7eEezpkm@;YW}(% zA8JS%9dhw>*4gb*R9|v@tH$bK$RGa)I?_M3N90ABqnb2V#VE)asmXY&4x&G=u{lzl z0oA%$gp#L{b=DEe6RsBS@6y|wdjjrPzcjPaKym&zR02NN4zw+_QgGTfxc$FkCzyLL zN!1v-bSCy=C?`Xuoo z+8YIKET5wX+IzZc8S%Wo6v0vo=P4)dX!+9x5k7fRSpI@t=mx}$a!@}W@q((F3OxCM z>QcOKWf${?68@ACG#_q|G^>75IZ)d+EOq`B(n~wXZUM$3iGhvQi;!`-xn4f}qcg=O#6;g`f^3Kc1laSvK4|C$20* zW@bz$GL5nepxNnle~k&NbvaqEKimQFK1&Z`nVp>q--Y(p$7$I#?>x=d`0g2;0&<2v zps*1GoK$KItmrJBjuAv?qK?Vd&*3=n}^Cfjd z$V#rCVuDYwGdfU1?^?@bFqQ1ZniqzdI91=5He4LpkNhObf!kGzif~#XVUfyhlELZ| zN1(s$s^{nAXca^#D6GNib61mWpW12!^JVg~)5=Pe#m(AB-MnHSC|~=vi-!}YC~@f@ zaQW?_YTwW)!;zJ1TUwSnfB&xs|GW`hh({VvxX3M-yfO6477tTVG4|n~?(ddyM z$bA8KuNWb_qvXw2lb6M=eCx-92|jiW9gUyeOZ9PGA}S+Pw5uTjy;0IPMKXzNk*^>8 z$Nufbm6722PL+ygk^GO{Wg>f#ZbZ_^OZ=0lXiQBk*~k^ zmmpvDJlF_7J>=hqMzmwkF+*q!(Ccc#_td_Rd zJe&b|$2h06hG9Gjx&67EEOktOtxeLIvnDn=HY{XGuQ0o;rY^nJ)2Bl;2x)S3HGtIC za+6+~BY5!JGIsR#6^+AJqt1_IjLZhnVc*G*d+xUJBhC`RrewS$Td8O12bxPpD=K1A?mYylI z-uNUXbyMrvGbV>c8T&x_`!2uiaIAPSLv63Z@WJd`l3dlz=KMlPCUJ7iH+YARKlerH0cfLTGMSqSEydSzcUE5N_a0R1}fAMq_0p765C z7uDJOzK>wPD;p-g@@*3-$ND@6@^k>+pajR|uhIV7RpC%#{vH|8 zCP59AqE}K;MoyFxaioy@InN->x7UEAVTNsq9MT3yS;is%he&c@M&6pYjbOo0OMcz0 z`yQu4Ljx)|MI&$n0gDh0FgHBtcT5~mOS_v-8qbwbVAdU@C;Aj<6v2H4nce2MT4JtA ze}zMoS3JS;P80kb6qaS_DWEmtrZ}Hon%#SG0frJrQVM4^T5*qBV>mr<;W06=BNgms zDy^s(vt8T$U-taF4p2Jn3zH(|V}G_|N&QG^vQyJVyG6^(Xj6*$+{v8`BG|DnEriUV zCdVR-`)M*kk;aSriQRuQ^j&W-LY;mL2?>$&w0){;Q^5~xp&)RE#inWDW30S?6=gYF zGd?o9-0FJ9oBO@*1Lo~cE>G}vFkF0MGK>b|sP;Pw!D;aqhN)X1W($K;e4+#R44=3wLYyVb5+a^;jPy4#~JZ%9S z6^rlR7An)1mN@+@Z37*kSK8vMef1G(nmF%6{JEb&CV2y(FA$tR^Dzk}4{1bP2*$JE zgP*tyf@W41xxVl0%WuNm?S3?DJw5UBynK&+Bi8phQwOa*ta`N`M^sF4C{5MqH=hsn z{x)hQO%wJ&=oPb2VRxbQt;tmz6-@;#tq4If*Z`_$hRpi~+=7~JlnD}o9Ydk|?M0tX z9}CE}md6l3FTGG=Rxg|*cxN!V6?wvYGF=UgA&<-RT#{F?-=l*n0DHDP4w!DNEiaF0 zRuU59kKW__TGN`^xSrauHZifmFd~SE~C0ZvtwG0ztk zTOuh)!zXWp7~bnc-CXZuGNHHGpa(Z#4GF>(aGPH5CMv#99Tfij`Ln6I+HRq((VF!1 zY!=za_FkT5R79Rs{{6S-_v;&S^L+Fqtu&e>{IDf_d?R7HWFyU4)P$O<;Ei{=Ybttt zZ+^_^cTE$7;NW0B%y6>-Q$qJw5pPlnb#<4fse_j_dZ26w^pg1Bz*4V+siV_Z{W6Ow z2V4qxypY(g7M$su6RD}`B}7&bmo$m_>RTUq2c zetBrVKtkCZ{Q3F{3D~im6L46~m009@+^5_!F|}=pp0}J#qPeVbZFplX>UrQa{rVtu zbIXS6wOc1e?cTX@@o;zNLBcc)Qu5%DmgmWtZrqKg`G5~kPKn=ikCL>MhB`Y{ixZNM zFE?;x(49UIamS4BI8>P=>PvOW;eS%yngS4X{T6(UjVS={)r+SWK$KJKe5CSF;QH@O zqvdh2NTiiOG;KM);?E8p<$v4h1)2X@+?0CAi2kjsOA!xB0&E9p6KhKTmal@U zyPmD=TDD;yDF4w8{}W-GTbKQ42j!(X0P0k&kdcuwFby@=`ZnYl^;6~4pKM57%=fca z$_9DlcUc(QQWYf-R#MeO`!L`aU}G21i;rKj4}JPAXkwyFypN?Y#J?&lEpT1Q(4N%w zaa#zy$K>ZB^UTfEe##06hMLgK#@*H&rKW5A-cHWV$5M)uR7%2%7M%rL`^BSwiXPK3 zM<9(bejYe^Fb>PXS7i{#E>WS;Wk&Ap=~2*XxO2uZY{cN?Fu#5?hz-3S#c1ZdSbAc7 zh;aJvQMB^&^F?e|o8&(!r2Xmg-5F9DlP!<>?QM==<;<9X^CJVZjLubOxd6tVl@{W| z4t|k@19B|fYE#}Xw8lcB@FAs=@S=o2GZ2jWyy7|aA&fN{4yDKvKDH#LLs3tAs)|BB zUaqb=r3D3n%7ujg%(IR<_EL2Dl2qDRHYElgpA`Kv9{$qTL}>xyzM8653EsALe6Fv0 z`WmkHrq&Bx68t&BWZyF8$N?)EWML1Cp+iC%TJp5iSgx^9O#*4w;P4sJKwDF~?1Kj# zPK{AY;_&Ikg^-R`f|WK_goKU`{^Q}O_x|HO`pL@5Y7|7VG9`4Lpb|^*guyG-XYUVsD39*FAWnNIABC0~XJal~;a##WwVlkxJPy?&0B4L)>~9Wy}nkJcBz)cwc*&2=VD@l@%6+) zk>@?C{i4%;>(MlJXL@)YQQ*HkuLx4$J;Hu}JqRtUuHq>vZ9lk@=BDIc@edRw95qrC zcob05j#Ac*Is3hNsOAq@j09HOXUgsY_%}UD=!(K_@Vs8+#KY3dO9uL`H3hi04<7{H z{s_Uxx2S4glJziC90sk~{GJj?#-$vDQPKk~Yi}*?ugfjt>!gsOA@(o8+0j9X(bn1| z_)zreuP>DsX$YO7^&g`!qxXX9Tv82}{lITro%bu&JBX2^hi69)OrQS$;HaNpPA1k| zZ*f504?~$T9p@!PT}R6MYYtRVrZYIcWKq=tGnD#_O8S9xqcAm#<(Lf{meCyg!ZSZa z;7C=SKqd%>By%AgnDguK$@wS8RoJfl<&Cffj#N26#EJW1`Qqmkf~TNL^8FxvNjA_P zF%s!QuC}qO33mP&mJgEZ}Tb zw$aH^k|3IFxc~!*dAxOpeiX&=G!`*N{kA!jr~hsx?`wx6L;DTzePN9|lrY;vFB1WO$NZIcusliv{c!?uspN6XeJ3vS! zHpp_u`PiHKybh%b1VUJ>Kd^*TLj^XWfCj99zjB)Ui`;eJ|4N zEf~&Emw%a$Bz&ZGaCV%5hh~;kH_^lnT7+vADWmz}>`z|2qH)#44hBvcXgnA%`N2yHe9$qThB|4#n`H19xr4(ASPSk+#OVno zDRpvMm?{eq3{=5Bl;suZuFk?1iq91=N&rW10PD(P3Q$!@oj>mB3pv%G|9>cQblnXw zuHCQLdq)=+D(Jf$VRb{LaoLkj34!@RaAe+pBmntv1>J9^mio>@p9i6PPvxg&9j?4G z`0Kzp66jpCdZ@UwMOvs>xQ>vGjM6NUjx&6BV;Yz^SC*Mhgc)TBjs{VBY8&#HI}H{j znE`UbU}>AO0$~Jqd1+dFeE*owhs1x>;aGQVp@T#^3@(DAcZQgJe2$2OK-}9cJ03s@ zwjSC4U-NO%)74DY|MN@kZ~k0PTf(taCMgqIb#+a39>-kEhwkUmgdjLLIJa1M8mK*% zxGaV;nh;hJ0wq$iKp4TA7((dRXRwhlJt`rr3Edfb8HI9A!&R!YWj>?PDt?m@H70tr z7<&m=aexFBlDEbl-#-{5+_?F^0BCG_!#)wB_QFQh?F`pBzJ<)dAmNJV0K2Y#j~~r? zm@czEi2iSC+2RmCbVZ%jR~X9=-2>D+o@;;&bF36xKgJiERcFz=epaw-DjM#AhzBjS zcZO}QM=DB*<_#=AD!~-vb={bj?8ms%lbAftK1Rk0T7zdzM47^t2TGVR(B{F$%o_E8K>=khJ~L6k@Y-}irWS7FfIxtB7FsHR~i6i z$Sl$=qz`E<_0g3(;IqVnES98Ffc#O`valv;^c6pZqQo*{c&9E|g(45`kc9249C##` zXK!TQzAOD#sVUD%&e+7V(6bFh&q#OIqx{2Zi#t;b@&8I=5c64zsrLKXFnG`FGe0=6 z0@zR`*jQ1zdVY5H5jQd*|M2{fDp@*SH%`jc4mE`48tIyrj;^4gf!%rJW2zp9+xc3` z!}Ho=Qzfgt_p`;Yjpas;&tp-LfmW;a+l6Pro1y#5sNX67UJg@v=;V8A#ooog&#Cu+ ztBJVrez*Jm!W;f}-*0@6-?95y^S?L1-5oDt*U$a%n!9fMeO>pz5)WorpSNB6aTV+H zo#_XU{%$=!mkAX1KMoX_Ce$UL+xd3#zUm{uD-RF+biKF7#W(IJKi}M{3+MfAKW}+b z|N9`YC4PKf+&?Wp-$%mY_iF7Aw5;Y&e#`5>JN?kn{YU?^JL{ZnIPho1O9lo8$r9Iy z66gHf+|;}h2Ir#G#FEq$h4Rdj3D=WFl zO)@j<%$zf4@3ZHNhMGJEDhVn80KiaG0BQjMuy1c+0mz7Nms{_Jr?(5dm6WO!0ML+# z_F{_g_L<6DK}!_?@TCU;g2MrTe?JL60suTX0e}+|06;hc03dY!-l-}2_64GuvOEv~ z{rAZ4Df{+z2gO<8gBt*VhWGCY1IYSL^mY@;T~SpQX$=+?mzX$aScB!QMSvnuO2>Qc zEXS*x+_L4h??Qy9D{phoPhCMF7!U%O!;#X!m#WS$JnDI;gHIsU@SE~oy}(&dFalF3 z?3^E3@z@5Y`vnO=}rZ>x(Y^&{gR*r}UGvZoSPA%!Z<`3P<;Tegg;|7k@LB@VPEN4S_zYixGaKSMiSs+R~ z!Nlnq0uqG(SQCJR{{0DOS2h+%1JnO2b6%X^@wcE9wJHY2A+(GP`f*wqFW4OP7<1sV zI|^aTRCy>j>?f4OH`KYkd!4xF7}Zye``53x=58F%6o4vIC3jcQ5TIx^*Jx4K1Es|c zhJaTIgS~p5zbgm3>TDziwkyuE#lu#Dd#0vphp$rcXyx7-Fitr-If32ohr^->8l#R9 zH4V$=4(4s+ov0|w1@}Tz+#06mEEArTmJb=~jw7 zN=bL(F^bGkjlY&|G!|T1NHOq->W9X+09-v}&ss zWzAoLk*VYtlElM6`rehm9*K@Aow{&#M_*7r6xlp3n9(rHWL0#OY8l*^`@&;SHO{9p^`@lJQUmd@9I4>FM0i!c6MYHXd){kYjf#|$ zGc3|ll6IFy2{$SW{EFAH_?CY~P8j4~1Q5LJnHvz$Yp{X_#5P&;Uii+$ z*-QRe1)!PF=Z;n27e(_#iA_M^vzIIpQ&&pF;Xd@i_H7bJOqPDHBAx&4-F2cJ^udyR z|HUw0CfOeIojS~P(_&Bxpgs^uv=isAAp%wHVP!wof=yXYW#H=#NXg%F zIGXrBQ)l8bC3INt3lUCZUpplueM!YI((W=DV9odq6EB2JZc(fO;mH(n+EhLu``6(Y z?J||lgRH8*@Trm-7FzYzh<|)I{Y05F;ZZb+G)Pdz_hRcEyjs3$-5gAIVNqeea{Yn- z=Pw-I{^xd}-O4Ixw=-l!6@&<+jsbtp;6tHrlhMY^YE)dEjW@ zhE)^aFHW0kU5Xkn85hKsvda)bAZg_EqNx-L3x`q4|Lm8-Aq_=7JF64ZYcLRI=q)rG zLXrFzH7-}2`U2i!9RY)}pb?o1%=@2ozcOKW*Ym3|w3t$MCB+j{>`(v#oBs2e91(8L zI}wChMC?;t&|V}%e6#0Qp3%Vv%&G?`JD@b29JP`Zb|wS^eGu%330=zqgG;M$MS}a$+5FyxZ?Vl`Z#z9f?-n_{p&> zI6hJ0wNM=Fwgn9YU`pK9cLYIB zm~sdUf+_MN4X%OJx`nW+aCU$uCGukV%DcB`1>z61Vk1qg{8{#R(-H{@1*X4c+&)}*WOd|o8Y z0y1{Adn8mlt6jkNk_7U{(2+>88a7pqHFHqAGY7zR^|w{q`ARJyVz)n(c)NYgi!m+yNt^j3 zWl&v@vvx2{gV8bcp(?JcWbyHn9BaGAEhnbnO}|we#~;tZ7-#+M{MI(%U(Pvu5eULP zDSlW3j~QRl&uC>Za3#k!Y^fdOj!yVF7| z6?hJq9JV80Ul3DyIHy)+K$+cd!MCmQx={2L4ofs++SosntxyM(QC4HG!%n-v#Rp{SiSH6ptWJc-uuKReZ@M0xx;SA5m z2}|n(xcUt*0a;b&5V`;Dwj2AuH5(Bx#PhkgvZCRb7am8R`kP3>d!%!WB*k^HK3v(S zlO(_1xESUg!phNezs;LmhJXv6yj~(4m(8c8CQQ+XZ5d37v--hau9>E;pK~PRU`P)< zw;k--qUUd}%y2M2qkcZ_N;trQ4|^E*dZ^a$PQq*ROc#)DIGRzn?s@6Cv1=v1N`9m{KEE$BOzll>}2g&k!Iow`U7n)W4 zuM5#0U#ujuFT00Kg9Y<{RP0iJ3vZQEpdWb+0Yaepun}51C}B$^(>IK%O3>@&moMu6 zp|R|pM~Yj}--qI(qY|%IcurmCtsJ$Vx|YsQPiga}V^2GNhNlxz!o&1B@uA6t$)K;= zM3L0NtW`opKC<3jAZ@?bP{oMW%BT-z)}?73q?baE>z@+W!KR^_FH_ZSvYNCNye=Pn z*p3n>0hw?ayGJj>jQ%sHIq3BouI}+B&k1hk3*AAv<;)!XO{uj0=}{>u!6ekqq!@X5 z3t@Q^r8n_Zusydes6wanlrn()FlevH=w)?U^!Rz}VMO3IKIr-5=Z(ntr-o6AA_F3> zx`0VL!|{-yc|1}9)vbmAqz$o+Xs){&WS>sIOxV+{y854Sry+-u@@TBzF>lJG*v%80 zY7j&T$uJ;coZpccD!)Zumq+na-HW3346cZyP{Oe%)K&g3?_%A&16>@PrU#_zR_SfL zljU$I^$6KrJ)z7uXf^A{CVi}&lQGDkA%lKT+>T7lMnv`Z*{{7e`G<}nJI z1ZDNTMaY`==iDybF0YFetqPjAwf6G`3{BJvp_i;NEZ}pwb@(CvBW6Q3 z9$wU`sJW*!a$pPC{4ZEgA~TEaW;v*Wm!%wgk@ zX&UA0^~Yn*f30+VJ6xR|DrMdK%70Xbo1|#4EWO;)9KZ~diC>Jz-_Jnyakgs>(W7R- zg*v%;%Pr@~Ppx@ZUM`*D{6yB&{#3H7-b0{z3l*z6A{Pdb$!7&VxwBhl^B&CJ97_y( zD0=u4gTwHja1JBWgiu7!1fMAZR~jEy(!|Qg9*S!T=f-X70h3@p9Ml839NTqXJl9|^ z3WnToLH}eneXd#UvAa)PlIRVY%+96a-Ephjb^wW+Q9Dbbc~dZd3m;+qs$8H&O!uwz z0GQkA?$2F#^(}WphbW*tJQmpWIu%M%E#gL@%Wi4zu?p*?6H^du?NkT4_noekh%S!e_0LA*q1^v2pIcUQ zh^WiA_i(E22$3#G0qXTJqrT>=@GcoNw)TxP4$YP)i)x`1XjC8sN%mf~IQe54d{<;( z!k@T8ct@-DUxe`E@i6FnEXON;(92+6+LKg<4)RyE!bYazrd7QcCEL#eN^v!%vEsLw z)FD{4awXrQ4>f91^SD<;YRQ>Y7^wFRhXeTI$BUDTqtwbcg_P&Nsjc<;aoZgGvVkvJ z622m?C+a7_C72@wCbXt>ClJBNUnF}02aKbcA-0ZMH3tL=#asFdBP1|>zaDYnLm+$( z{m64kjly4)aQG}m8-0)fUK<{xx5Z_N?D!MQ!}=fom#tzFf?k+_LpHXyw%j9?CpM0f zu1wbBR0YHyFR}Dc>;`+E0W5Z`Cwq!D5G5S-b7EM5sl@@^5qYq*CiPzDh6x<2^rpOz7QMw?iJPgkhwPHFsFzScpgHA4&K!urmV zRYdV@QzXoRLF2$BB&Ag`fSg9VUR*hE^h&tZ2+*Jl zm<4T4Sl!Zmy?waa036#%J-U5Knk;w?)cU-5qEq4-Ze&9Z9(pR$Rv4mXm%67JB#BO_ zmH16X*B=(Pkywl??)*21^oKD$;4}zp=6ggWy2UqsOr?PSW>g=XkHpJEZUs(34Mnry zAw0}KD@w*b6ywU0!j=&cY^qC|bu|cv+4&U%Bv-}XTE#SKR^konU}&Q=7?b2VET$`a zbH&P^m*!KR%yAJW=yaAzcuM)G)aYKi?zk-U>&S!9Q%hd$0uY~Dq)oK4RnrdC8V<4D zD|8OtD3iabfH$x$EvoxJ03Iq`0@l?R`I>NWtl9zvQL@TtBp=n%x6ilg%~U!@ZtC5r zqYj-^uz-Rv5*rRLE*>8ip+QQo>KaFSQzxd ze#>tYHyDnoqd$LiLt2el*omqj{hWcAF=u**HHlGP+e)H-bqazu>H@z%RL1@{_CK`k z{)y!{xLxj})@Dqz&-i6Yl?o)8*R*6W*Fm*$Xijx-dzY&CF-mM7sO>=wZwg#CZ~LPw z0W|hT`osW6^9ZP-n!~h4DuMs|0mH6sC0L?i@Gl~^B|?lAgXqx0Esj|VA7$2>A+5+kz zP^f%N&)Oj&Ri#;9=N?eE%2%Eim!?fT&euOGC)AmIrI%Eft95wCAi1!z5s@aj%S7h{ ziQ3kPrIOm5fys~rMzh2WWz=KyeuQU}^L_8h|3Up%hod7hr2a{Pt?p=BLHntKIh)hu zt)x(+*4A4q6+lhGo-UI&c@4snEibjV;W!i_4OvH?gdD>Z;3bN>?n&!dOyJCSMkeWt zRJ~t+7_87t@Ikh1Y)rS_RyrS_yM(-i&-NgkWVk+XaIKaSvNw7x(08SJg+TOwTR>2( zj2;Dif7i4q{p`}F5GOA$FLQw17`20t20JqzLQswTu)FTS_b=j=D&9l^L~?#t*Rb|5 zIu*|f_~o=*l(llE+sOj%x zvHn^5cqK1B{I#MfUkgUQ!1L~7UC?w(nY7{}*(~@OVV%E%9n;n5$Xc2hfroza;GJXd z{sj-<4G$DTn`DAUMK-~45H1pA5mbZSkZe<0~oV9pgh(I~8?mlikVfMY=O&?OY3~B1CXNo^A zSqOXB$?$ufzVsYyy+#W3?j!XJtFMnUf($!ZaSqicH+g_ z&%(AGr3Qm$<=B)^+Iy*%78I`RQ8 zm4i9y)@WbDB=xi3YZzvq`I>7eRqS1j_WfB4^0-9u-hTDF@3I?9f>($2edR z$#O)Ao22xCdd836nLN}x)CrA{Q{S!EbW|(@OMnp}3bXT}?GXnR?&ZMz){mgRKP~9! z7%(Rn{>stT>!T06uUM>BBi+QX{=6WBEXy zJnjLAaWp$SDx}japdisYpLvvDM*MwQsEjFJMI5_io~|KwB&1F9aNU7<`gfw2TS04f z$CeEdF8}4iWWVTEQJ6no2W)mYZgd{EI8EikQmCAgO{s&g?XW?)kUS-`YC8 zx`7>Q*0m%D3l43GZ{iYtahi3OtTV&8?tmDX~VF)poQZX=As&2LJ8U zGHwIr?JtGY**jisuc?38*7Lde#>sTN$f8x@QD4je1|-X4M&TU$%A$ePR0 z{&bJA=U29}V)(|Oo>roqKE7&|2WjSb4!H261U=2A=gw0Ho@nRoSxG#Xyn@^M9Nq}? z@2PgnwUCXan(TEy-zRHF$Il~i#AiMCo66#lV|5AlBU6^Um@u$FUe5!rxX)~a|1}=r zkU-Qwx_GxF_6>Rd-I`zbGFDe_%X!RO2^lYW+?SV_Sa8|(c7_N?j{7)^u)<+y%m#m; zJj#3jTKSZL$%s>Io6Jz@ShSUk#prhi7d?XYK5GEFHPXL!Esh}KSMz6!i%if8Cof=k zl}OWj9EL3}Wy1e%e9KT7)IDoKzq3M)L=R*lRP@zg3Onj7E@g))2eDNfS=)uiVAV|4 zI|vlueEqri{XX{wv^fmD`2Yoh4LD$s;e&@&4Vc;4cD74nZ5mnT4rP!IiM2YO!1 zK&$TR`nXi{akORG_&NX77abG*dY2ON!n;lQf1$*9&Kv5tHM;Re0N$SP*#T0cC!Fy+B1={uEv zj)%4K6wTRC&a^uL*wyM!AMB-BGOBCnOW9G%Df&LgMN7jk&PBUp{b<))X+@JXS`L_Y z3WRn|1m8g`?|jUK9EJE_(yq>y}EjS68wR1@j`Tq ze*MD3QK1ZjFNMvCf6Vk&a=ZWal+Z>A=J1y&?&^xtsu(J*QFni&6>7%rAm4(aG+k|Ru}Q|s-0f%{2TsySoFTmc%owK zfoyQ%bN>ziE}kX`(t%;qPETFJK*g z&rC&V4EQjZQ@OlQ%{;Tg@7HpKYrV-s@U*N1)Fok;ho=p2qBd(;h$YU8 zLwo{#u9g)9_7vLqX1=Q8#59Vl%W+DX5Q@P_l}HCw0Jo7+B2hIeU$jA8OIbS1vK>a7 zd%|iiX>B--5zV>djwDw;tCpjfYuHue_v ze`=WNtpDcXI#Qs=<@k+yqxF+<7%%uvhcvl`7K*Jo4z{c+&|Q3dm7rYsil|#P3WWE( z-=V_`Csr<79~O!0L`U`fLxpVmF|lP&7jx%Kk^iVXi0U%&r&8q_ES#5^ZJyN*Z+GS{ zBSEZn4YF*qBE3Nu1cm+Kr&r-`DQp6+?U0ZUy9Lx}fykDWF$gJo1`%OV3Yp=%t|xyU zMZ2rAkvzdG%N!nRA;@#zLvp2xt1w!8kYHV(bK01K@B5%V{#UV}*Roz{W;mPks45wB z>2)AvqN;F=h2yO%2x`c<&voZc)hHTfcj5f=%>}PILp)u>{tv-Zf$9P>mzk|oHhg4p zcHt_)1XXjWCq9YP@%w!E<=JTD09v2UD70G)!qwU3>C&7H`<2hZ2)J zyi8}S{~3GlCb;uUec`p!Uf*Q&zbK;f==`{+;2rKqS4MrFrk<+O>SaUoIBH}Wu?@JRuu(Hth#q&yIEKOGj!umu~(@SXsyvZoek(={6O^76976 z@d*SsQBI3PZUw5Jt@`fMjh_hEdv28{IC>wN(w8@X0l#W*c_A{?8uUvB5_VWH6v7ke zK8_HDtK9OV)FO4RHEN>bz2{Rxp=tfOW2VvaOOiABrNF2myNIL*J^q}tO6HyH;JRn`{~ab;zGdTC?B{`cx6p2*W`x1~sz*S+@Y1{P#6iGwyw2293pDY$pL z`*_yjWcqi=6P0%GLC!fP*t+meEoEH13nF!(dh(_)VJfMq(Ebm#wObOCv)vv;MaHbitw5zTN;tvtjy?ARD11^*^{2B9t8}7q*4B_N+s6f-a;Zd zxIHDJ2`~aX+?-l_ccAVhc}fsc1#ia8_&q*9N~Q#X&6w1Y%y53pd#aP?XX@P3%Uyl) z!JT<}4NN%jxqY4T_rkmWMZ$FVWFu6>fZ`&AmH+`*|C{WsS2WJ^yvN?@Orh)+(j}M8 zsOhd!1Loz;3ffIKW{~*(Bz!9N@?@cNFlSbK{h_KkFFnQM>Qs6(haWyB~ zU_^p3uS6>)Sz&T~5$D;_;Q(HbV-4p(T84X4mWcu__rkvJ`garcVNrjjfjX6a{4NL7;#G)o> zqoc^}-OX&%=45CplG`}nmZda%EaR|3#jkaaXVH7{PSmeoq93D6@#7l6Jx!&nImp(G zaa7FBDS?2F@QG!0!SA%C>NFr!1@D-jHSu&jC`$YNPfQE)qBZ$UaBzd=Bdm=ZuSX$B z6!vfrmr)YG4ke(ELF3Q8o`b>%Q@J-YSsr%TRSd3Rmc%`I!d%sDB)Z@9T8{4uIu{fY zf7UG+;6UcxO>>{DPM88!HScqmA^DwrhA=RSDWT!%^gH3ar6#VYK+Fw05FM*#!7q)# z=%_YFbG2nbBa9L%$s(Nhf{Q?zXX_#^CFi(8q0_4kJExHNb=$|i!k#pAr!ALH{$bwl zhSY-Jn1JXV!71yF8g%$b2H(!vHR^re7oSn#=iP9-2>S?{#xBYyL~4+v-1XQDCwhGU zHuBeL+I?oyBH(7E(Gft6!5)MVA64HbUlY(uF;>vEq|7a58>^klE`4Sk!ap->sy;}Bj3Qdgd^DN|>Nh2B8f z;GJ=rkqc08@a1^vIa63PxD+o*e_D>Xjr}eu#`~aRO+#HeDOa*oI>%UZWt8a7KRH>| zb``<#f~_PTid$n;+x53|3Ibl|$aRhV2lI_PGX!1CO5PDD6KFV(uE}4*Q6?wp%7}Tc z=PYS_k(-yML`5K?h}^+Ze$zSHnh-rb6_imvJ!#5>>6Po6!_#1dlxZGYG+Q%PG8IYI z&{XX(_R^;ICv2!vCZf_Z8-|l?V&lq2;YnK<^YiizX#HX!$cooG`(vI zJU3K(y^ZPs*M4L>2lZVG^5&DT1aS~;A(~pt6Uaw$EdqEy&x& zc;6wLJO;cDu(Fh{KU-(_&=`E39@4P_^w&|<@3~0a-Pv3k^(75*HV0AoOf#smPw4h7 zs8Sd~%>!G2$qLqraOL}LPEhwX;*{tijojZrUR0~X(&-GaNU(n13-gz^d_1ll;Vn6g zC3+KB`JBI@A;0&*CzK=JSzVN$hSN4Se*HZ&k$t9nZS-Rkl&nA(w)5IpZVu9nkS(^T zJBCPik=LEAD|J;+bB~+y2DkAQ@Lwc2?j{!`B#18)!<(Tu^P8=aI9z~+)UIUNkbF9S zhKv1z=QBw$n3O7kt;*ZZ2*5PC$h?_BN%XH6TixnR$%E{x@5#V@`Bko4tHrprLIH^x zo>@gt?f;C|h4d!Mvrh6Kvw6N4enh&EnH319VeHaN*C2&;$XH3*kuoQuHL1qM&keKv zMMX>NNow93jN|gReK%nr8h8J^_f7ra>ol|var!1rw@<)tzxTV#+yru1aHKnupM@If*zDruqgafuQz7e$$zkpAvJ+-yyF1wu)$3t4vyipp6-uchc)iV{|^ zgtKUI3LEUBF4mW|ane*y_vWK0B!$qguI$u;N#b!M@H$m~eIDr@<9b4lw^3M)kL_@; z;pp`^)q}fSYU{nD4D6d0f3~k}|AVSmYt*rMPwTbg9@DhxCY+;c!^`xMPo6zOPuf(& zu(B&Sx7D@oy^#lu-*iIAf~mN(b_ z@MpTw`zP+3RQCf$$=HG8Ow5JRoe2NM$$$qLcdps-Z6;k*48I`bm(XyCA!jnNx-J{V zms`#y68$ga9(8r@@lt#TRM|h`@Ey!dz|k}&Q;ptYk5+q&Y6ESepR+0wjj8mAKW9|!<8!=xa2U{?& z($G{)aP+;rS-S6W(&_qfI>2#h3;OC+xl1~qxSBYRxs@m_PL*Rn0Q`osi27U2AIKJ5 z_QA=Z>UYts1djREjWt=L-lBYfH%@Nnc%3r-*_IAo*sO&V{=>*9Rm&K`H-CLIuCa}T>l6Pdl4n|7y@*n-f z{%i9!!M_i?3RXOIb?<)JuVOsXeDu8dv#|xiecu-zHu1v5qhP&kxWViIJtl3~^&8Qv zwVp;jn6nv^6FURKief2xo3q?tf3#FTYkq>^V%%TQeAI;jD9DV9JI3?r7Zui?F#ef$ zpwTJ9^CHryl{-HP3xV-vCYb6xyLmZCBR#V&IHeA8B1d$y$q*qIa%XZq+T`@;ZaL)( zWlt+;+iC?AE*DAfe20KPf6$L=Q7(^6wVf)$r)LI#Z2CY&M5>{?@io6Vsu)*+-g2El zl6~2EMzK!xI2F2n|CVjP3{zG_&RK+d^*-V^)`sb!80{C>;-Xa`fXhw>C3Fd#@VLX0 zo!y^cktbI^$;tgFQ=zY%77*^>Viv776c5M!6ZPJxgtp8g+naGVWl;1{sV;yOMRS}w z+n#oxpJo=y;2xP<0P7^-h)^f!`TkcfI-Y&KfT=7Z5~6X_?E3Bf-@nFdYinjWCjZUm zh8pB42M;A~gy=ougRE+L(fkeCFuvM2_T5u#UdKaWp4ZOF>qnpZ!c# z39G1sd1t2)BW^SkgI3eU5nO&(T@>4T8yp4m4A^5j2Ueav%p4q5(sW)9YT?$G420+5 zL@oe!#Dr2=Y%!5{yXDF1NOzSuFHka}zO)3}j`=FuItr>kc81u`+0v5{N+Lc#cN`yN zyF!or0-jFQ;I?;=C~|cJs@$G`?H3a$6EUSJbS(XrZ}woUwgTj$+y(fZz9Y&{)t=~% zgZD5`*W04LwrB4mDREbAFH5P|k4QB^mKPx^(Xb}tRT4@Wl#+`Po8>e6_S2|zB7r+5 zKSi0*2Q`oq22(og#@G*icf_mT*i8dZ7+a$NrKHYjd;3iYRnybc!|k-${UG9tz`*5f=c!%>>swV_4>+lkJYK296b#JZfoa+De|5c4?cSfr8<>qTPydV7<9VEA zYv0^+nf7_ilIl2=bfW~LoKvd}ExO2I&g5kIY0XOKC;T3Fc}#=Xw-av=A2Ie!Jn;lo z#^vKGwleQ&V({)tV5?Jp5d7lr=&TtOw9* zeSOo!e&Tn7&MT}m7RQax0zoJ6)lB%oD0PY-pLs>6 zu)2gFW5%fvWXe#WW39qBpLApb-n;7F*^e?f{`s|ovtjVSp5_*OtMXmM>2J@p-R}RD zMj{gWw%mE@M0Rf#^`7K&FtUCEduTOSE zd6vraCFS38|Amm)?Q+YpiL`<=j__kV+5vKn>J=cIWla#iRS}UfdGhk9ovFe^FZuYY#G*pe zE!?-@@XORM;ZeBez$ zx0bd15n^P15Hi7?pWVqTmmk2k0zvn%r;-*lS*j1uutQUOz@(4P!nX!^ck@y?U#Z<- zu;@MMz@8)d8-5%s*>$*<1QT7jTJF6=4k}AX&BHTNlD}!nK>1&3WVkf-oH0_u>5?{` z1Vi*tIcni7%{mH}MLl3DPEh1-k}d4Ew2bgqkss|>yHgU7+j)`P3%|fMo3z)9i*t_b zBiZ87wx;FkpDD@&Mgpea_=)bgy~P=b%i(2>Qmd8EV8^9Urj_N#17+Vc=BE<+potFR zmMMr*n`tQFC`7zj@h1>*TJgh&GS{*6C#JM#oEk28Z?&vQ3nUZ)MFq(M?tW(*!c@-0 zAJpHh>38|GFe91LkdWg)YkkCX5`V>}OO_JpH|BA8MlE@X;UHbAlh`>bO6=Y}sjAzr zh7QC3pK@?31_h7)a*Q^yK45pL0E2YNi`aa^VSX0=nXO*z;=o>KQC=x9tmQO^FSF$n zab#B(>u{n}{9f`*aFINlXVqfBUHCeDYT##)1*Sj5HI1jO$k(DM zfQndcErQjEv*;htc{-XO$wa~>mZQO?1owxZMnul& z8~kqadjX~S^E`5r4u&Ti%m_P}m?w?VqpVvkiJ?f>*BUkszP+~OH$j#bXWS`$p+od` zHm>E?sN4LK@q-O8`)(c)l`uKjzk-ySD%-lnKSm2Z)sHbk%oBYP8Ko>FQiU*KSMyq) zh}oWj5*;_%vXlhZp%`xxeuPu&FOns4YJm=>;BLL;uN+~7)G^6%nR6Z_S0?;&tqQv3 zPj5%#E+BQ#*I!;7ec#ms|Aaos;r#Zv~GqWc0yqD_WWp_*_74@!gDH+Y!#N!i zcC@-lO!05TIHDBX7o{)mGLlQpmcV1W%7HR?B$4f z{atCXTR!SrNBNW?0}k!LbGS@|UHT?>b;4{(un_NEf}6%H;0J%s1!Ew_w^6gOl2_F* z%|kyU5xWBIZ~=_}6)t~71WxYYEigGomQC}rOtLA2L zDHx-ChG0fjWfgIXKGIdan;Bob?VNS*)5_|f)@H@pKB7AY;uT2t&Z&2Bn}F&Bi*Z$p zapUn{U?OkUnVx-`J*$OMk%{Z#!_#F_G*HkU2Cx@(y1x0xSzrg2!gc zpFRY;_M^C2HMm~G$Cw(}F);FCtm5ZA-sL@vSxOAwvy^wn2N^Q)BI+~bKJqE2xEG5K z%`R!1-rgNfi{AV?44`LD9WOr-KTcLFb0%}%z*iz>Q338S&eZ;JBXh>DU9y%=d1u6{ z5M2i=ZH}CxzDYTtD{O`=4a>BP%znt&@oao`EXJ_~X(o`?kjWoUi}7C0 zfwIeT4mr80n>J}A^a7MtIj58;p*0T4ig-PCB)d|9QEDLp3Q1+YY#K)h;yaF58Gw_uHl?I!iWqB*5S6X3#f4+M{1^V zjxjN!Lsy_Dm-c7g7aa-rUZXD1&X}oHs?FspD$eHqxZ!#`W+iJ0 zSOy{2eCns(Ik;3skzicGE#tamj1w7Qj6Y7DdzaYyTxSlB}AE{$6X$>#SZGFd=n@OjAX=V z34>VE;wsger!&G?L4YQQONPoceBtY5fn>;;w$80m0o;HE&(e8a>9zhe6q9sqg7 zu@z=3${*%h*6*y-(Y=9$Om~m_0*zY`HUihUBvdb^QLFn;eoyA+%8;`LVu|yRyj?nj z=iOCFp0VsI0b@k)egP&&({0}KyLbvSrT=hSz%D&>@RC;Ep$U- zIc5laX{Z(^Q%-@--?BZdT|tzO8*r&6-f=ngam;v%K9d&T_2QU|6g8@EaWY&d{Un+2 z6bUe*TSqw}4d$H08fL2Vx!eCYQ(IX- zEg11pp$+#H{}H3)#a-==-n=ol62PGk-QHL0lz|UBXN0}C5hXt@PHuO0OjYOq`& zf3W$QE8{1V03Kn@VT*V7Z078!$`QgF;p!+#wb|`F`o;HlZ1PGL?*Xw-s}LW*a9>f{ zB<8{NCyCG^dP-#%)j|gR=(rZi7`-9qNPcQ5*&frQOwmAJ|i>w3eKMQzCSB{J)Gn0@TkML4Ry$2+I347;&U;@qOH6Wy|CA0T6u&@n&V|IiBR zLq3NA(bEBcgAD3TUVpWMTdQIs=8S?TKemci)NZucr2}|^IigI*N+(H=U+<>4ox!aR zA3wvA^MRIq=1sN`IPJdI_zp4xn5&gkD>_fy+`p?AU^`S}1=7IO#3z4ZE&9=JYx1by z1mLEZPKdYntF6)%CQ;H*5DE^Fx|}G&_nR#56VAymXruJ8XTdXU{OCi8*{A2N{9AXo{ftn?__@_it-2c29y133(T!wk-Xkb$S%sTmMO;5r@@I&3$JiuBO;ZY2eX z#2cd%=8oIf?{Pfcim2`Q3gR_^{!fkmqVv66z;@XhnLhrw3b?v4c;8F^Vl%(=y9bud zk3fplYb6-hCqN-JFLt+x&c;|2JnBWtU69~;!VqfL|7wOPopvn4Gp!<2nd5kFUs!n(uMNHz;_1#e19d%W&H^dE z<$qhywLkdd#8OU`dR;@vPz3f{Q9gI}(NpW@0O}k4pc5O8s7`Ir%=_UJhId3h>93;e zPM-)|YAnk!b5s*Yf{0z`#NaPb4UV&kXWx~;hbj0XmIFhpU^DA6c0)M~3<@$DPX#N% zAc|J!ZMlBh)-zaylcGGVNToyGU+dAeP;5aRDz%ep7cm;6SBf5v<48J%8k579ucaZ(5 zXJ(#4*4+O;yh7ELQ-wNgIiVN zxq=shXPohz?LUD#BN<-!&QeS#r2>&h-O3_~2~V>@=ztpG_VOi4y6~!}=zuJ>0|RMr zDK`TlYAFX|wAYni0<0~ewUiKK%IZWCJrR0`RjTe~{Q+T(gR!@xYffU-@0EyCFO{^l21G8d=iA@FQl% zJM3TN+?08$lm{zJQ8~4}6kYy2?D&F7m?(a`EiwKMok+L|Z$eF<6{ImcyJX7{kIB~D zJioCaXT>!G5?BjY@NgMVPukQ>(SHwHhB)hypBfDwUp>{7l4kFmbYr8$)`!+Me8Mx} zDMO1|rX$gau33?1+m3J=4Qg>?yrV{^env9mxP1FK|)X^d9k8L}=`1~K-`?C9`cWWj# zC|kzbx>)%4nB~Fj?KZAaad(H}?$mZN$(=B^;of`*8Hf7Wc5QPa+-}{=^Fd;1vo(%A zzM87XjdwBw;q9jgW%KGSvsyFlvlZcCRgGK8`KSAZkZkh9XL>;6yyEZ5R~oDW-4^nZ zToeDrK?(GFg2c>tvCd0Em_+#M&G97NA6Gt4rvyFDaK;GyqN3Co5+-h^##1pOsPnZW z>`xn0Nvo<>lf|cmH1kQ)E)RNDIBV>%Q@ANn5)|K{!|xD|WoOOM(Jm~*=`e3GzkZ?T zoZYRR83@uCJ%glyVR3A~SMIzHRYm@X@y^Sxi_KnLIiaUoBKHSGR*x>@zg&}f{vL<` z%to3Kr&f=q*3ahFWqWzuuBZ1^omThlZm+weQ}_hE?j1`Bf-se=@D?mK6ln0;`C=E` zt|0P5nf9Zr{PI_7u>}n6YKD-wXTPAdM@mNTk1?(_ibxGu%`pF#`a)Q@NQr_WVOXj5 z-==5`X-4(Gu!OZh&5vjW3Xr}x84H=;ZVMAvJlE?SeB*itTEyg>TneX<1y>CaIhhGH z@Z)czCO9Q*FunrcC+5}bfO^2|FvxS_7I>Yz``>L9X9oFaz|h>)LfqNkd1v{zKH0YS z@5IKt_cx(IIgM%MJ=M*WnKJV!ax69MBL#P*CD|Qah^^O7+%s0RFVFSs2^9su_+*f zp$k|J>A6fJIhQuUtWq7wOwNZra|b(+zyxJ74vUvks&vzCvM4dleaa*;jwuFLTh#t~ z8Br)7X&e$zTty87-suB9+gM6M)~3y@c1!b?Y9ScE`0FJU^It`13`R}(ZV=3+)uzvt z-&-!w%4Yz7YjD+~$F54nx=bDnD!>Q1io@>cq#JqnG2-%Qx@QZM89O>|IxeSbxw;42 z@U@9%!+pKGdxXeuaxZNuZ3~9ja~2X~{UT#)RDecznPUAtql3kSpATr% zAsky7z^*K)e~QTGUUQZhFUCxKE3lyOo&Y?e0AE>~6PU;81MX_A_SkmSVP#rPSUDk-)h05M0#XD> z(B%+8gtmZ$ve$($Z7QQ*Qh_(TC)Wo{Fkmx^fX4<}X54+_r*B6XkGlHy$ye18rDK=1 zF3v+m1ar?5`RmRpfZ_I_C%w#swD{6NB2P0mO3o+vgvmBgNg~8D<)r*0@Hu()c}Yysg&b^~C||5URzSd`tWa)VglEY*(WQMV-p z&^0}KcJ~z|DPa3iLI!Goj3kdL)qNJhM__p)B$Tuzlf$F8oN;O1X8eKGjPlMk%faLl zHZ@lPUn3TRdB8J}Sx*Xfhs}s1pW+SE{!!2z3ET6!m{)#}Bo0Iy1X=2D0?DOv(1!b^ zQ(*Uqh_QUny&+>Ck9zw2z`~X*5e*09{2t;SHQdcTDiPXDJj4c>Ujc9>*6#3J?wTUn zK~+%8LCG5QC1gf+4g;2pwdWebHMsO?D|721T!zJyj#iwasrJ$SoB#yWai&Z*a=qVa zOdYOJHEvBQQp=C*YRN%o%kaFIBxJ>U>8eOtY?V=nh@qH+>gBe08|0JOSk385pm?I3 zOxpqE&xOlh|KnN(;qEME2sb*ss@&|Vo|#mdI7JB6e->Ua$n?4q5Y*TRuWpUn4gn)b z0pOZ6ahc3v`{r^-rBj`4_gg;gJ_|_Ukb-9yRrNLUc+8O^aS;L^TCbj9zsSC&m;Y--&-S&70e#?BqjTVOw{6Ys$1{WYF6m1^qoB(HUVEcvL0`Shn zcc{FCi56$RyaT%#B8nJ#y;rdz)irnl$teE%43k^Ub~J zhCIJKHJNGwsZLF|bDTZ!cIO}}BY{(bjG@q5hEnM7-h9%P%gUAuZoq}!J>qfVEEUdl zku$DTDJkaKVjnt>;eC~?}^V3Ob1jNI+HM~+T?VIH{;{7E_&e_G3qQ;s;E5Zx8Gux7GW?4~_=w40?IswQ- zvbg!`jQJsf{kWr}8l9K%oOs7Kbe&%LSjP8?wHXONRVW-HVRc{f^m;W{`Kc*Obw)Q; z$i;)8G88xge6wx0CU7<2$ekJXve9S`^j`7leidv;$RG_M^n;Bq!DG5+WEBS<;? zJ}ug<_M6FVng5*!F!-=NksV4y0kr<`8jNh`*n>YpA+V zH5f$hJ!(Utt{fcmOY@NiNY=o3aVSY)j%1^S7DCL^|g4i3|AB9QCq-(2GPreyZ0;1oPTd9oE^OZ zTg;DihJ%Em#?w)DW-UBYgUY}nF57X_$2_Lo31Y3G^sBbKF3SXxES%8FAK7A+b~Nev zy7d^X$HJ6Wr@B-ueia&@5|29%KU4DxU57*P%8ubEc2tZbcAAn;P)P`&QuBQ>DQ*!~1Y`xV+q5?OSWtz8!>EFZI2)k-GSyE`Pm zeo{^3J5n$3Pt5OrZzX5X_BtTaft6}y5{^QtB@+?*wQ5t`QMgl8M-EB z(*?N7JJi}DxDa?Flt5>C+z@tX87jW`lQ+ky2s2JgG(JrLpH=y zwuKSJgTx0L=8KC28E|m=4A8F-JQgE*$VAcia4h~~_epay{(rI}AC>PNaC>JZop^*j z0N{N)7?nI=x86dH(Quk8x#$Fw*JlB62e0GZMWOZoCc}o%?R`%M&<^)#4VFQ13Bc||qrTqQOrVK3L z!;pFO>EO968*ag{_Bm6}8J#1FL5K3)9USob0FN0<7Xds1t6ttjfnHxg{b8dRY?aCs z8cm47R?H4}-LBAy0sPjRD2I>m^~-?J)|^*(M&F5vL?u<)bmV zwURQf4^oksBn__(z^quQRpjMY{@+*d!xbp{VB+VQx7Tq~XAJlseD|}2z^3HTd^8HX z7R9aARfXlYNA?fMnQ8_CoRj^BvYbA}fY0Q3xeTVySdh{#4*|K}c|+x@go9I9&w zbxRn=_#%!;VWQygssdd`beujnyR}^soSOERpk~)*c2+xId?TFSP?h{iQoV@@U{k_( z7AzGtQ6sHaWXGPq4>`m;8&`V6dhr6`_QVlfG^V<|a`>V0>zE_~&mWj~dszRax8-8j zzT7R!WwD9dZFa1lTH0){EG+ZN3&C#=oOPGwPGHvYrnUB5sGoOQBGr~L3*%~9+>A2W z=%Tw&DjwYrq^VXvZ}fb^`3Jm(ykEYqKi{~u-X^NX?;nUh)yK82DZz`PN$b(I+I-b~ zGaaD>BSSsZR|Mjh<5a0qGtu7O5@aKgcV!XUGF(>iXZqJKdig!rLcxgwmkk~Z_C#@3 zn5(Ugl}z9s29S1QKb}f`EJLfVw1z^{u>Ac$d9PELGG_L<87oYK zlZa;pb$4>vv!54#KRE+`070Dvgr@H)AJV!FrRX=}ran$^gXcrUrcxDxrey*ans_yi zAx8kyS%$7(Vq$`#qpQi#|z)^7SFf<8A7#ixnk;)%gVJTVw z2SM4)?mXG>&DU;0L(2PrMH=vOiR^Oywyj{)hKz?_Q#UvX_qPf=+U(ot`Krq+$n{(2 z@qhPpKVSL(0XOcpn;pNv@U%Oz++5wZTHH6+hJuJ;gF8--mmPrymxil-Z+~w?MY()m z$gt$ki>vApFHEoLh{z~Z?0d((pe{(N#NH8w7W8V}eJ)zTNIE-xV$S=B0T3@7>Zkx?MpK_My8pvy zxeOg(=6Ne)pf1^!JzBT|4M~H|4ea&fw%8s@2?m2h93lLRy|3*;Jr{~bCei2(RJi=r znb^5(YdSDZk)bl>nEk!(FnI$H9w0mD{8az;&H&f+F8N!o)5n1-j96;Z!Xrw zYiIa-9#m_hfH9gTiY#!xCa8Bea{S(gt$WR!qGG=N@yM|4^29F<=6yON$FU;bc)ES(pokGD|w8@A=#}SZQ;^#&7Z1=Rz8PvVpU-+Y^c+ga)aL zRAqnbD;f`}2DFtqF>I&y^r6?1b0&$ZK7xx3p-GECS3#IaY zFQxK|?=KrJGlxmCj8Xq{$N6|cuMgwdS~b5Zmd`vP97q*?*wWeAK&wEJnFpFkTSq$N4fKM z3la5jKI6Vx2+8AIg@6oR?_#cusFAu{=1MaYTu*XeQdo%=<$AKuerBXjQ{%CJN6D67yK~yCQDoiHRXW8C-5q;g$bby27@_fh%Q?*0e zbG6~c*YQz~Cu^ZtHzFE#I21!xKqL}1LP=PQrqQ|2*57$chx?-6q0xK7KBY*gea>B2 zwUz8wvW?|ns5^pP+ny>lR?&6U$e)Qa{-1FsZeY`v--Uq30)BpTR6h?=sdAdmpEUKo zEKr^qP4L-Z`wNHeB0gQGh&37X8e-pwyRNwTFT=3?d5rD;efC0v-T%&iN9ox^FC~Eu zwj5&NlG%mjl9@Hu0S9s2W{yo{OxKwc0sXHGytp`H``lS_^I0GHx)Vq=!hcZA&clqY zYyE>Or{30YM1F_>wEDqQlJmj zM7ra{BIi6S%czilC};Qip|012{6?!2KU-@dXuK8bzS6KBS3!$6ez;?c`jV|u`K;2d zIrLvA`DJRmdJ6>>gUyKlejtv$!9eNwr~}~ZI?jFb?S&-Ap{d;M)Vw<>QoKGfxY~VzW6#;p~K#GFRfFuF&db?SSMpVb+Ni35JU!ZIWshWk?n<2$-pr{jJ_{RdX z;}>)T7|CBrtOM^8V31Z+3On3&-)HeOY&sVk8$?=wtc+@=nVJseX2l(AMffmSfUs06s1| z9Rvk(CjW4;v6zaQ1Io2pzqMQ%JKpF*APl5#wsnLRCx25WmsUz6E0KW{D@yH855$%K z-BwZjpjW4{TxhqW@ujnF@bLbn%RjNbO#OvIfced@OanZc`0v%A!sl^$DvmN+sf%eh zJ!=Q$e8v=Lnk{Xau0(8>u}={Js9N&)^Yq{7a&^BSGqyo}Z5_LYEhpc8&ASTxuVKwtJ8_XV8j*;`o^ zY0-mXXJGfhp;6_9BAF|XNX$g~+z`2EIxb!SVrl>htMyB19wWQ&`6|KA^vT7pk)e3| z|LQ7g8w897ku2Xh(Z~v6VR3M9N%u=v))odFKHbrOw_^-PBpOHc?Hb{^w6FOysNO+E zYEaOHp*LfV3rBTZOdHSrk>=~N=O-|OmFrEEeY7w?zFJ}80z-sz)CGA?rV|P$#44#W zVUKZf$nG8<27Y7p$1a!b*qmU8vT^)9w<_(DL;rbJ@5F|4h23ozEj{#hbJMSE1R zpC{OeoV*J_YoTHhs!6#KW}cxs{)Z|I1%}xBE98IGK?Z*HpHPPHiQ&`I3l({+LVOc zKGJ#pV8Ly7?2rL*zKeVUQUiJ>E|p$4$#t-_k96(p^h&~(U?BwDZ)HR+KRIi3#0%6U zAXRzRwE&h5Y8AoozK(k2iGl5^HVy|Ji&X~hecz6W4SyQk6idYXui`T2{s3ii8-b;>|@;l<3EQXVHDN6}hgd!`x zY#|bG6tU^S#paRxn`>7rLF)a=Q3)*?xsx9%Wch*aF~uA3HHg2Q$Jq9@v!8oy;$bu; z`zo@eXz)~MI$-HSD{E{l8j>!L zpcSUTuIVuuucvz+!xkKcd;1yeTSHMpshIV;8E}80)$*h=?(ann`$H#K4DF)i=Fgc3 zx%k>**V`#|dcb$IC5DzJIN@!_AkZw4bMuXaW=5E)OZ9k&*jjmC8o0EYiA&(L0N zjpK{%yt4O_0w1!`{K}j(#cXRfA62d`#`AlUYP%n9bZ+ZO-e zx4ROLIn#Z#mpFVD7aH(fx|byCMKafk*L$mw^n(>q z<}yhs*GiWX&Icn=Lcc*7ab0_T1atd7OvBVHw>uXW_Yp2ab>-uLStCFfNQ8kioMK=T z_)%LhY+@HJP~TK*$%*_qa}B|YWwz8Kq;f5kcO{irw^k=JCp|pGsl8`9crq-u#dH}~ zV(y>b(s#c{z7?ARL*@g7E$VoC`7Set-+oJRC(|}qObT>jKx|?&y_jJC>qkvYfp1+6 zKEFU%22Hzr0&i}|pLu9?R(o_L0eWxEbH1M&;qwGd8YOPIB%9A!lYjc2@lWC{57{8| zL{0=NWA8>KuLa!1cVXUP(;op~E-m`rzYR$e`~1`9Z{`f5BS(W1^McK4M8?}oSfzpY z&nl)CSsp^wdHK3+Vezno&ETFcp&&%V8R&J4+Wdx%DlS3?p)L_a_K(8}QC+JwykCnw zNQJA=mX~xqJh^tF79eo>t2>R#{T!@@-lv$&ze42eIucX$vV9Fgq7J5D$^|G)O*~0JuBe3FnFzt8dtILzh>DS2r z8Xj}{ZHu0&r5gP=b1(^+jrVKq&YrFgSaEgvV_Wrq38(p5XJtFc$_TzkO)b~qLoUyA z-SI;GjI$N+z+66XrEc}gdIJG`9VK)tWzJ3m&Sk|-`@l1oF`{gkD*IsL{JmraN^ajJ zIRWoccn!HfqNGYfLzlnN!{(6IR-%=o(3J-l-PlXVS&QVw*iC+gHKiL*EeR~y`-g5N zlD3?mn+?S2@y)S{%}6EYK#FD*E|RFFujTX8fmIWxmjI|-n-@|h3{y~^N!Raw{2N!J znDHO)eeA8m8c|>7`8YTYG64+*Y-&5x9v_!X>N+pi#`49P#xws-Qwh9*$8Gu$`Oo%t zNoTb;mNp*sv4e#U)9`KET>f#{8e0ZDBBl}ly&dhmeD-+=OsK^|8-ucE5mrKt`%}i{ znF9*UG*Jo})sSgC z>9dd=PpG+Hgd#t6IKL3H7in#wdb=Tv&b}i|hC;|@q{SSiX}_VfHU8{VV!c|4%Z;PY zJ)~(7nkx-JwM(tQe+$Cg#$?+sgM7G+Zv@(8Tn^?B->;E-gz@msUAT~%nuH`-U6H}a zlFQ^)Tg>i`qQD&ZfpUyrmrwsU0{QfKK2;2OO7@+3hIVk?ka=@=b^R z)pPt`#m7|nmMre|gwpLVW;Yf=uf?jDA)2!Kui|!ui0}k33Izu4IrbP$LgoJ00lm|Nc@SfM*$K9bDtvD{`<(6?Z+)v_)9e}E({+) z>!4xiEc`4bnSCzOkr_I4DYPbucIc70;(2gLv%JtE&#$U^`ac<9x)Q-qhca29)2gqD zY(dN!HMUQwd>aEbjuMSxe2q$L42$ARp_W3bBq9!1kfEI{WV6CQJ8^+57+Y0y-8_EV z7FX)w=qX23mHMwbNdDdj8hEDVr}IH_5ZQgqO^o( z`RSK9W#*4$>tW3J3i)4K9@hfo@+fd%RrSNript7h>a@3k?>|IrsdEc z75-^>zjfY-XkYz8qB6kdqLpZFQ^|fB)CaT1@uox@kmtBd`yjQ4%FespH2r>JEUH2& zr^Ia@9HKb2PMgXMcV~;6KWB`c)vP`5E9TRC=^2TG#GU9bufI!=&ErA}H28RIjlhnf zP!nqr$pe8x93U__wusw8BvH z!BBc6+S`*SPpH7>|3GH~6o^n0F~&WBUyGzL&aH6uPaq?Vm4r6b+xx~r6!H5ile@5T zn+^peN`;0F>pOvm2PVLWH=vChQ^)L>6y}N3gBN8pQ&jFyG}zX{f3SsbhJ>`3p(uam z?$7?2nqB=<)LoINODW#(gu;wdgHlux8lL8w)u_OgHA18_QKI<)jk-G+f?QD3jXr*O zVi)bs+0-h;qs;Gyh%ER#>a{=Owj{x|^?t_+gpVq^5=sheJPR^GA^&NL#P4aESm^;=lP2O{G%d|<~s zY}dz9tdh42Qo1^_j^()wnTh?ED=g8I+}25&n%dzAL92)Q^nGT)6Gn*i?zWDdYjWI{ zet}^~M4L8Lc;GQx#A|%naiMow+BnpGThZ;8v{5I#7p40>k4d0MnSMfX5l2!PyuVT+ z2tRTOsf3Hgzy*_o7hn7B9<1maaaf(GFQ&>II3}SI*&vM0ha~uC#TuPN1Ur_TjajP= zZJ(R2mc2N(f`A~rB!dH7m$ShS{$W~g6JiwCfoq=*w9y9{^qM&wgHJ4Q zRdgf$%(<6Z#}`yp2XGHI$=MTwmhd!wkN~k&h!-+!X{FXh@{3}<)0q)%_R-;{R8o-G z#2vxNHGF~4%g_dJlB;0rg~$?w5UBWVsbc>CeC%*wMVzL}MGR1wYdtm4B1I%9HdJ!G z)oJF_D?T(mo|~r|pG&QGN8RbDQ2k2nY%=Q-oUV8AvGmkoBCs_35dv}Ug}t`0fwn9o zzo-c1``zZ0zY8198qdPUH4t~W`{G5lyi3!}+InQ;O(wMtM%YpvS03?1ywU2^ zdSH%mF*EuzDTbJb8gs>n|6628Umr5-b5b;#7^3nuhks_~LcGcFzw~_>DQftl;57<# z<75Dn3_|S6)0S8zrYb&)T9MpRhOE;0qfpH$A)YWVoW0+*@+UB6`}iU6llJSbar)iV33RWOsZ;ojAR`+~07}li9vTspH#G;?-k0 zqqeQ7uuuqv#L`I@QqNXR_|KHO$`!DC{Y|GqaAy6nmpadV!|*JK-@0|{(cvSh5@)0D zvJ*6c%;$PIP61QLXS)lKP4Bvm10`R)xYhX(#`E1u`4)bPYc-lPj1c+A#Q=GTPfkzg zI5c1pSt%V?`d2Nf(5=AL*mR~&EKpNSY%E5kgB6@l{?X9qu_ZFRpt>XcM!|}4=Z*&% zFk8Q&9L!x!6FTa#;q#|)0Iwm@$Y$AEa`yH+2QPQey~1=av(chn14(9+4p)P) zDIX*(vyC0lW%h9bYebz?FxQhe2J~jS@UO}#G;f%EoKaZ6VR1l1+1s{&3kmlJq{Trq z_NRAhR+fKo_mzH;Ognq6e+HYJ2%!M+`&{q$iOqaXCavr-72PM=+s5%wBs~0U!iN*H zf(W7@5DNxu*)7@#=M%Zt?`d?r6s3qvL^-(6=|pcB|t-`na+#AaE!KtLx?!|MT%;cXxL=`|R9Q z7X6$*qSQ)t)RZM3;c&JHjSC@_&p8UdQ3r8H%K)rKh&z-r2ueD*cK|AU)^hw%pmc^W zuKUp&e^`wgCglC}aeZZO`?ouL5QKpap-`$hm9f9>c|SRJm$bvHtxZ@2XqD0Y%3XWB1Q=WnRAi>x9yuk~D7PC?|uGF35cHxbq z;j~_zugiwDZsiKa-+KZvbgdqrKwK#|VxDnr4rJ9=k|Kt9T|-hxm|9wTu7S8~MJCE; ztX@e*t~?$4*SDCnPjp4_!Tcfyk3ah-c{FGOp@pclMhRSpDXMXwLqGkUqf1!FC@v-ye?NJV%^vV9dH zy1LrG(jhutdjPiE59}Y%QC!Ek8^r^IfxjP5fmXmWGI)xnSP_zD3eG68B=KY(ZrfKV zq#Two$kNGDn#6Ae!6YPXB10**N=xJLZy1r5B7}i$)F%A94|jjGFwXT~M~JpV9U#)C zvZsXndD~5SX?}(f3sI)-Ui&>A?ILD7rL;s}TWa@-eVAc~p@taveL9B?-I+VCB(-CV zAFi4AHgEbVgT;#ZkBhybW7Y+d*CA7*v?BxHv0Txas z*~pCSo5*Us38^~?9bbffSp7w)fJ^o&ye)QL2Tqbii#`tz0WW9C2El(V=g7QH64f!4 zqSpGm9w|+4c26nMl?8 zAu=bS9<{F}Frrno{s!q|$mqs$QO6Pzt0l5Fpf#-o)}7%gEBpi2G1D&^q2u!B76Tg^ z9TM^k?mQd`L6aDnCM;YN53qcZYh5uqP|BBJ!*U8-*I9naJyJXhUdGzuG+o-vZtIJ1 zZTka~z2AXwtb28?*soSm=3u!CF?WP~XqW^i!r3*1r`oVjaI-;JO5Mu*?Z`frZ1&kh71dbilHf6GoNzXlq<$mZ_Zn%yyvLAu ze&qLHYA*TR+3K)cOStak>%kfFLMBX(QEl~Eh*=f4#HGE<1HUXkzdAcu{V0Le%*ImJ znDa5*ypU;Az`Ys?GIxo`C1%mcwD)oP`kMXu=9~%1M2SVPi)!4eYYouf5vpHv7r@rs zaB=WJaMd&AmG{)xALo@mj9`2CAe)&Oj&oKIyozGU9hf#Twk8#7^um;oVX>K?<-HpI z!~!o`ybTW3&&px_mj#K+5`&|xW&`ZtjS`svqg- z^uL@HRvq9{8^|){^2xGv$>u@%{=-F$jj2U(I%6Hp**FAvNmX@U6Pic@C;4?;_Io?I zxtpTsR0{7mgdW??gUWa&l5A*TdzM3kNT#3kEDZ8&P0faKk@N6op@c8ckEd(n{g3*f zAgz+wKDX*^LBRJlN_ZIpF%bynP~l9k?+Rj_G$K8r87PugO)c=gFyc~yF(wq{ZpYK? zY2k5dG(|s()ivPF?&M1@?7^eFRmTVJAP`6aQCkkx=6xuEH@1aU1dfCPj{|gEp1ZE| zr%&$p~q0&62=|N3%lyy6^4_PXr$hPm79pz~Jh zux7a+%4cu8J$5R5fKJh487LIg7VvT5@E@Xs&B#)L5T+6Y2 z&-L7kI=VbGLsU)WTBaOFq)U+W$B^q5Uux8U2IF8Tlb{NEVNLd(b zNQRDwsocM|B2Ft)rEJ!YXD9q-6iKXYq{?`D12~+JrsUV}S!NMYHJTVD;jGq?ci=WH zRuL0(WMeB!DsGk(r4=8Bvz#bB9WSwTRUy|U-EHS0ha1aJDMaCsYFgN=(B6qLytk|> z#A7OHd7t@bzgAS_rdX?A6&vwS2T{$Wk~uWg^5S|Z?=!1Yv*z%kjxYCRfl?JNI?^d) zV^LVs1wGs2VP!;R2M0ycC>8~cdxtjUMpWaRKYbv5+L*~e#OgQnINGcrm+>$3s3ih) zJ{Jf>+tjMqsMwIn^21=(wa>O&%^u!Tjbnw&gAfM+TtTQAo4@_6s3}-<)oReF6C0tJ z1GpA|Bx2tyPEZpJpR(Z$tbuR)X1G|XK6hGMYmNchQ&zFBl-x1e)H*l&Pt35IQY5N> zP9%VNB3|QS=6=}z(Ry`s5AGWe9%j_2!fNP}g$VlZz$})idyL_D!2~91(zO!jozGXv`VuE^I3kaE+?m~!?vC4On+fB=2Gz_0#u37X7J`!} zA{z98ycz?e34TAZr$W_0^d)Yrl)ou82;=#D#dh!lX4ZXyLXuzJ;sf6IeL=a&(V(~5 zpL|Wt9<%EU@*FvDH=@XbDK(pcSW^(1J47}tNyJ263h}LH^^&U|s{#h?#{eG-un|rU zj>>`p(x{nxmw}Kc9gp6jn5WMjP&~RflvH>knT>;2;FW;~>v7McTdZ2)PMFq`AXymZ z*_gV8AAR&-h_GQ*!B#&B?hMD~$T1$b+pcbs{dBEus+4QFy6KMbXgZ9vH)3RcVU3Db z;ZFLPr#!WpHD+ez6P5~z3idoO*z-Xp=5kSN$#ZVIqRjWg$N7uQo&RU4$d@D0A+>WR z!V_Ot)u<5f(hh)}+yPwcI zAWtd5U{^IFuP(Z)MDzVSw%lpWXPf}b((Wqoc$Hn~8{!KNr2D>3;|e}~NW%&FJ4sPuzw3)It5M&D<$b2T5$jAz zZrw}ptm8|2A{Eq6+^68Az$$CvISsZb#U4HTVLQ&g<6?-fyVyc(h$U_MiKYxx)&+SZ zse;AMV-`dae3z^V!E5;C?d{X{74(K36A6>Qp6xkx6OpeLELKT_7g0s&)p3+4bdY=8 zP6HhQ^K!*%Ff;%evf=t*_qP*Smbh()2c#7hb4S>Z?wB=_YiB#D!r`yUNtHuM5{Uh3 z2E@oJ(JXMzO15hawlVq*WMxZ2*l&X|z>St-FhY~|BJ0s&4vE7kO8R7xG}&SGB}jQT zad4o9Lu;zD)4IPeh^|&Z$IADUVGXO>r?7D;I~SssB#?+X&W%&dqERR*un+Z#RRxMy z=N1pMj9Gq-S`H1@bpC2~;)S8l5TR)B5I7AC^WA^qWTD2S=0#mh5t6oaSqKgPBt3}I zW3u7HpuO&eo`t`G{MR&=&we}W{cRLPv5l)+!^|FdG8Pbb0F|a7;o1bbb&tAe1Tux;jtFw-7ma4d8-x0rjq|0lVS&9Z2tA=iMHE$lY?j zzTSN+D+lfm2sn<-()FCDx#?gd;rPD|vF7BKkr|4i@-y$@&V)us7bdwNeWy2aF~7T< zJU_@p!W78cCeBk-f1>|h9`Wbt&HhCzb9QrK@u6adx4VBg0_bzu<1w~mw;ub_De-3H zdDi9k^zoSI@ZJsD9yDR_*zJ47n)i~u^_Em3+kNGC{CWlg#bMg>KA#k;{NMM9H9t;9 z1Z!W9JOJwGRu7u>zd#xO@gEBYMW8dSR>D8S_EU0%x>{>Sz31fz+4zs*!MX7FN9#Uk zk2Aw}m*p|EN(d2avI@$$xI8*S*Ye*%@hpqD+CON?3=e@+seqL`A4p&V zok@w{F=oiug!}5ZgAZkn^NpaN5a=nPy@}CTa^W!8b$k5F?^MWqouRq80xG8|PQRKW zU79cxl~HNcnm9G@#$psk+z5&v?NB_f352g^Gng6XIhyBQ>o$05a8ZWOxLzuNCv<{7 ziyNTKrpCQIc|E3VNGv(3!+)UigW8F6=}t^rA}pM$DY;ZrMwz^SR3$LZ-}4Gj{BKhFVybP;SU>{j578EVYzay5(JQnndKIINu&*B0~J+l&j#F$?3Bo)TmG*6i% zWh-3@C&y~9WEvhe=ykHNdcxY;O0tV~F);~G87auw0oN=!B5OzZ@dhZgG#UEAVkprU zGR0c$cnliyBogX+MNL*JVh-YA-_ZTl2fI94%up<*PJfu#6hm|D$vlX8W@wc}$rt12>Qi<%Vc?f!TuYk9+-A3EYqOiLz2o1j#-J-IK0^gwc>W4P z)H4&7i=v|cD~n6>Hx5e~Mda!X z_%_SF{Bd08?=s?+h<|A>0pt`*O z_IY_>;C6IcHZy+coFfBNvLYOQOWW^Qt@Az2a_dctw!=nrb#-O3nkVP>xZKFSn-Tm1 zG*0u__#FCp0>!a!fcOsYW$h9MfLB@H*KxX&46d7S5X;;}2xUBgWZ(IK>hJU1r|UU* z17(yc{AJzLzDZ|M!ydP<5*>ZyF&=pwx;9xEhCy9|W~EL_pnJLlB#Rp*4^S?EZSL>G zO?OP;1v}LE%H2-)dxA)LL|yY6Vjd>qg`<9r@bPk5cPAi?Y7&uwA^QQIJ>~8CgyeYW z5g<|Cmk1F?0wrcTXgZrkjlpFJ@E?1bw6!uWS8C#OMIYKo8L7PJrc97El26wsY{H4> z7qdh|C#1ju+gw{4U(EY5t^#(rK{P$;I_=cMFjrKB(UwKe?tR;{Z$fm_fJ5bVMm1HH zmxz>>B;dRvQONS37X4&ehYr{3w!x-reQNNPLQelS_5N89j@Stz8)E- zjysA99^FAFNH(=Bm`k*(iHIX9LA)a)LJ#99=FpTi(c@P(Z32tEMx`d4)6$Fpa$)uC zWUz;Uhgc()^p=&hq}3abAv9I5#{a@c+eWsuvESQUP~3&#+*VM#cOo$HFr)s%qudcheMQC{}ENdM& zXDn7JSI)qN9I387Bp5I(A z>RjXXUtC!JS|VZU%hSdBC`Hfj#(hV*03XWl;vx`*e+K1G4kc0iloLG4*bi`h(|aP~ z=3+~zBseOiYDS;T2*twAC9-&Hj!IywnR<1ej zjmvhic|{(N)>i@&hHu>tm*j0PuKLhx3mmM>n8VPTdhc{aO3vjnP5onk#0n^4s8FXq z&rEDhSG-M`Fc~xzvZGaCBISz=job0|%C3^2Wj)?iWq=Rag4c`(3o#ct^oPQQz1$rU z0w%#8#99DZMM&9_zcodRDUwE^SZHW@kT`D8DckV0g}}y7@G*RY)WCCfhVD!8N;y58 zUInsLXbh_{W?5PKOM`?p?AFJ>>$EmBJ4EjGDYw{d1q-stsL^LEC!v8z&g{had89

S$AnaQqXMdB zHxKv@amlxP&W|B#sNCW{?dA|A4~lZpY`z?sZdQ?TCdQe!YN3 zM+;-JgTRRSTcJZuc>4JX*pCzZd`<;z^nTii_d7Sy1-VQ<=z-lMKp#^U++m4`irR`! ze;_bZG?SFB$#Fod4hss20h+0Nrx z1P>#`(I=MXj;q#MU1SPmumF~))sAAG&MB?lw@A? zN>a?3e(JX!GuLijA^YC_KL9F0)xN!#Q3y2Jwa#eDRG5bU3_?njH4QQ&V~KV`WF#$> zOduSWNCmh;gZ6NAiaSh&SjvQYr8_Y$C<6w(^9n2rJ!{so8- zEhGXL6%`pN?nG-rq(X#98Bn1T$*em@{tH0K&~D6Tm|oHY+_(5SioQ=OlQOMrWjAa) zheiu4J1hueCqW}=fJPI9ici1wja+c_fehyhhMR8j6;^Z>KMYy2rPpY}t5^;>dgT#- zz#zp{ENv?xEGO2ZqoZA;qoZGnAL>n;z>)K2A%#b%G4t}c&y%#XD-xn{f7^*IhHR(7 zU_6MaoWi9p>rt1jVorMpXU?Bb7>yxChJqh3To~i=l`C1bc^eC7&g5tJ-p7MWS1~j+ zY_V`2fixmSB?ReMJrPByHSJAJROf0bmBtWQHAbxoe9fe`1{_OaRYKw@qZyTUJg&O* z?VNS&u`F7)5|7ASghXZpqBT(%@ZJ*-@~Jtg)uGGzJG>BVbe~SHNm{@ zyea5>3AXnd8EqB8{MpFS0M*wowAT882OgO7g)e;Jtj~PrGq>*T0PHrfJnSFPQkTiaUovK7n9 za9lvv*NCbGbEw&WAGD+CUA!Fi^qK_SY~?=2tuLKep$aMN{7guRbX-KrMWj99cqyE0 z8Yh)Tq&;LRg>cQh57)s-r%;YWg&|?F1fdZQ4NE>ch|oo!u;inH5Q;?u9twR^?uC&- z{gemP5|9J^eLVQUeHzg9_4O=Ru;8wzo_gxj)22=HKli!MZMg8l3-bVHocRWBzwOVj z+w~hA9lgGxvFXCW{=Q?h*06Pu>wo+Q4xKZHcN}{Pqopylh%Hhh8~6oEL`Gc4&TzG3 zHa;apBIECoB8W=hW=ueJO*JeMo&V5O{uteQEg>RAY7Z&Fkq)5_NJ&Gb6OKezj1Yvh z!-BYlElo>VY7bOIAsV0<#lZCdRbjqAWjF<|RJKXf%)0i?1kqZY5w zf)WC)qOuP_P{wWS+_^(++_Wj_b<8_tU#7NoptWO}6?PV$I3m839Wm}4cON^5@z0IF z4#SWj3JD?~*KtU>F0J*AoO9^@TyW$eNV2@~pd;xW?&h;M{+6wML#*rRVf)tY6jf+O zMM9&6B;^Q#AmHRf4#!1OaD-Lw6*$tv4@YUKZ=$ufj=texq!NUL%$hWrkH6(2_M0`6 zvHU3Y*)-{tOW?ai7{|Vj`bMt);J+|`>I_E43Ji~qA*E}jgDpibss0WBK`9FcjATMP zHEBX6WTjK;yU z;1M7C29rcX9W)CbUjid}fk1!eGoQKT&_fTcTeN7=@ChfJ#Qpc*yEg&Yd;H^$6Hh#m zpZw%UTzB2K4w%$2;k{uPzAve;XHSLGj)0mfbjc@?mXQ)YIE3!)Pj;5>o}HqygDacr zNzIu?)w~&`>uYfQke-zrh!(E`ztWY|YzuYc@T5Gslo|rHtT>*0!Z;Z+b6w4Ff_uw^nFeTfyo8g0Mv7`%nrHV|nyg9!B$K zo;R9@d@&Yk5g-^G9Mlg#{P3y3sXaYC{KtR%$M1k=PdokWw%c#}^XrBn{LB|W%NMTt zJO>|o;I|*T?~!9lenC^p3)XGrBj5aQrge33b>WXZ(!`|blF^L3~~s&iQ`d&9|`f5K6OQD}S(v@Flp!K50FV8!NLBcpz+OnA)y9U^~tDnBXLF#I1 zIBfoWB2`M9ps`&ir8SvMidmB^1s3Ygvsf+`M&xOaA!LDIY zfw2}|Fbkeu4t^j6f{hzDt-bi-e>wISzxe5@y&ZtP$3N_tIddlW-FF`sTyVjAuf6t~ zs|N-KT9TIik^7^LSzy|Ret?#yZ6$<4I|9~i1m7` zw`|3KU{Qh_aI-nw`f9RWEqD!eq-tw$YqB_=XL#FECV|~p#H)nYts?_0i}%e~|6WDP z?z`G@p@pTuSu+t`Hk46zztvW*ReB!EO`)q4x}n}yciObCOTI|}hDTvrH)4A)m8`m5 zyLPc_*RBg^&z^mu*80TP^BR8Ps?T%K!3T5q9e4kswzhsj$uBGcv=|%}15YpGec$*# zw|wqXbToD1hdxqA2qcl!L5thd+L084VT4xXQaM8HAW4A?5keA%B|Mo)W~WM92DS~f z(s2-xnahUwxMV7hb^J36qIbfD~RCNf1}CI<}`#XerS;&l4+O;E#_!LUkr*Gy!bV5hon_rTuuY z=x|3keEDDB$)R(m5CkECQl{Gxw|(t1B;dL(Yj$>{{Lt)_%BU@(Vl_Mc@*@CYAFmTL zdiyJFhyn4@+06d4rywwF45=Ke{r~q*#9pGE@RCj6pz^g=L=tdZr1Wr*L_!gk3TP+I zSgA-|Cc_B}=5xrLHl%P+L55-}WYvz9Py$lGk^Aq_Ii5?j>jFH+Jm^lenY(S%RUteGA9k<_lAh0(9 z*n7P8$LBux89w*9FR*s)TISB3d)&SE-ur`rfdLa9T}N=@A*jO^K(S;v+&Crx3(R64 z9YZXCF;QBxc{9$!Ii!wUh*O=#2_uv;bKKGHe*9ptXK$r5B!%QsTNU3l}cD{^_Tm{^07>t6%r)`OMQ#128;1xb(Es z&)jt99k)#eG~0HG<##{HN4tK;&;IRSNy(h0bSZ>z62O?2hI{Tf9?!3T9;INPNfW8g zR-+>iN2Dl)Bc#*SK!_tf{RBnELn9{iGzz!l1Pg?i>gqP*#~RQm}4k zAJTPEiE&b_UKqVf6Tphz3lNb)+o-?$Q$%YW2Tq-euca|8QWml)Ut);&8YKb}B~{WU zml`~bCxp@^l=RR-;)xWl0$*x$SU?97FI7#H64bg5b0@apIUV@Qj4NCr2nZ0$#lgYR zf*^`G{-FIheBM6P*Hz=nYO+q95tRx{2qb9-(ym8Cb&hX-;sfkAWj;Ze!V#eX;#=Q_ zP#H{x(qD9!S;ukKp$kyTB&XVuX6+gVGc%g&IAovc z{OPgh(2i5KzQ$lW5^SO8!20dzmIi1rehs?13UR=6ShNyR&}bFH)DGwyMC|MnVHoIv zp`jZx+1!K0!q~P?UwJuSzWSQI3Bcate}0^Q{`q|Fb6+qQRLY~aY}xX_=;){dq^?TC z@rS{|`#>RYTErIGszqSF7Xq<<3%c95m5EduJ*@-h@P#-XZQ%PzKOzKD+Ci%jFPo<0 z>|<~+$+%1N`0CHArz)ERmw zRRm^pR^{zp3lf=JEnMMg$P*fli7s*PJ%ylNdw)~sh|-!7EUI-ZitfxnQ#TD z0MNzjPokobB^$PL)WZ3Meq=;|Y{ee?EGVJz6!<~Jh8??zT*u;M5_!K@iM%B0e<-T~ z5basJp{=u-NsTRpp*6#`YItTn?^ysz2r>RM+C#J8<+K$9(#-K~cSVEI>{l8{8BnS8 zkVt%~4ewro>t;+rfF=+=VdSImNDFg+8ZLrs_7dqJgo7f&lY(?j21$yXTZa}3ge1_R zY1s?GjENKY*qblpplJ)p`w|F^GNp)}9W@$hbd_vg6(~&r1V;Ja-sjqm^x~U5G?143 z2yHvG2b7a??#W zam5v%UhvBse*MlZn>K$e4*oRP!)b@X%&AcH?L5)UJFO@=I1ajh2%cVQmczWsFn=aY zYC{VLStwc^bCJwG1(Hmz8le@s7$oBJLI`AJDtv|I8duIFwV|7t_M>U*npkdVMTyNV z(xA@chHkv!DWl|OG;7L2AaSB@9Beg880D`>i*h9-F&yW?Vf32Kuw}dHhQv35>xijS zr#?An&YX|la?34Gc64;GW5Zsx1s`31Rb zhR0|58 z9(MNjv!kz{e6c_jDbk)pbvA44;|Wm;92_DvI|lmc9T*^&uCrPKWv5+X*Fq2#i5TVC zb!+(k?YAPO#EmEiKW&ANRHauynft9O!e6Krn|pe3UDx6vV!ca|py?$Ngr*clZ0+eo zXFU>u{|YDMS1SGu6vmv4@FUX++r!hQPM=81NfQQkxMdj~F$GZT@qGhfXW-HXPp}EF zj?HpKWeSue1F={W7#w5FgExnhP(L*i*QP?!3O*@mlW1kfJj$r}2_a(10FZ)6X{509 z)7Y>|YaBA@%g4kwOV4!2%ohNj?ZUe*RSEO`F8?Yc`?AWmbfDe7(!+huZZ~w1eZ}?)YsrN)R3;pQB|GA&1OjFveed9F1+gvhgY+Xg=NlkYK>FOqd#gtmc17}Ypy0&C4-NEF@T6%r>EQb_vxhX{hu&=i%0 zlp_+nozNhp!@%GWgQEq=lq>Rb8|l?D0AZLX8VCXlV0|ezVMbRcDVe1tN+=|bj?-tA zup3Yoq^p&QLrGUnC-<1P$%zu8>^E!=r43b7CJ9rlwXeq|EV1@}EX5m-L_}=LW0MPI zu{%=RgvB!FoVd#(BBLu|`Ttd^I;8LnE5h>jl@7665;awIXjRc_uNeP0I5gDOQB;bI zlK5ysE6^7uz8LZB-(q}Tk_;G$=$jsVipQ3&=KCLiH^(fT&CuAGd7nZcg+?h&rYgf_ zXB@$0%hy7>+*%RI+KLRARsxO#D>p$+7Co^AN+CLkAl3+2u@N0c&{PA{C&0Qb0DAkj zo&S2~nP-gNcH8Zr+}i=zd;HDE3CA7J{SQ9CkAC_?aoM{sbDwzfna#t)1LaQp)K0|t zCqX6+fif*WJHJ#ivYVbnI}$ebz^uv0852=qXl|U)ZqzoghK|{QN>Za7fp!Fu75va; z4_W)?y;na0rEwHEk;V%nQh_#REJ29pD`aH;u492bTG)**u5UDDfsP90FB#7`6@*fN z_CQ9kX$ve~3Hh<|ZkLP<%x3NTzP{zQTNmCk;nsf7^O!MX*616~KIiPOeD#`#&OGx> z_qN+^ONiWOoN*er-+t%ocD;v&jVV*97!7{l10TBj`s=@QC4dY9{O4BlpFjCE?M+p@ z|KzjChaRDb5-DFHpr*ct=8i_zF56%>|4^ex^DvT!tvx6N`IJMxDuc*Yp)+YS=k%=F zO3cqw3a70B-PS}FL6zl%ds5>#4vx?`!br0TA(BeW2={2pV{{X)g%p&E0ZTS);F$du zCL%kI9rd6Uz8+@hu5SMId*7t5Z-}Z)7RM%`A{PA-!Z`fJ;8pEdLP6p(Wbk_kgcOXF zO88-5>3&g#gt4t~F`_iRBYB1kMX0Vx0FERMhOan$H;<1@yIb#34_<>SX{l{639B;k zMCl?@q!Bj2Il_SJbev{eilPw0KnyGuQ`&?_Xb_HJam2FDS_?~yHwuV4mU0$?P=*L? zJ9W|k=*pb~Y!YtMD`7;Hl zcS}9gRYO$fN(l$MGBqJlE6#Np7bY9YCuaE;^TmLY_#ge%vsHm33 zD|i9Kg{;t~10aP_hpTAemsgsmwYiy?dTB0b%5*h^bfLZL+Y?>N%6iNJXLf)Ea&4w=~2L^hiv9|ibY;9CX|vDSpr z;{~VUMW^C%nEA|wQsBAx`8@yfwV%>EIE?4IR&CL-qEr#Nbc#z(Il{CVDqd4mf-QtL zLK{*-7^0tEgDw@3!a++ro;+YCG}IUkqD&g5cYu^gl=eLDO|$3D`RpT)KlZ;WK(@C7 z@PFv|)F&?ID_^~aH^1}Z%u^3P`ta5*TjnG#p(zheJOq8{zQ{;#nxRbuW-0 zL$qT+JIDx~b1c_c8xxFp;j4JosFLj>_<gK_`D?_ zkuR8Pcz6^>MqxM)g)%mvP{{M-lTT_P#Nw@6w({>E|KuO0PM)&$%FlfI=kIyXd!Ktf zum2B!_jE`QSnpi-zvS^86o z8S|#&rai(^faf_JckGEoQN)@xYuNhN$}9_Dw1ny(C2Xn1v74+xtyif2+0l(v6|id} zW^>r-urgy8&r7j>%XW4R_EFnj2U?(23FVCP;IoVP#_xW|)}CJK(>lrJ+@ z%9XjcEh1C33yT9NmzYY*L|;E1GHb08lNm!P&}`}*pkzg;5=q}gHsWP~fMq}AGVm{7 z82^CybIPQsNm*5GEll7?BD5kBAn@^05q{tks(`_Kfq{J9j4y0OuWXw>n@N*Pr^#kA zRCz9ulsLl0Rp3YurA=ZGM3w<0oMdcb@H4TRQbji;0awa#9f3%PcGj;5!Xl9u;ozci ziIh(%%qROo%FS8af-OL70$|uV0x2A%aIFYcWfR4`yTFf_-PJ~2eH{bcyTH}uWFck% z>4=JXj}>Cn<&WA{@ET=wF)|stcl7X^`xo({H=alknM5a&3aJJ8F`qXaGN0>jdyrj& zqu{#it}a0o*%^fkt_MRS@cahU!E?&{UD|^~=OP|lV(5XLO|WwpYDb??fzM$7z~_!W z;>a%?eBePmz4)2E3Bcat<&V=(J(aI~^%{Qjs~Z=-k+^pD8q-*$V_N@?L@2}mH#cQPUpxl9#HFIB^wv~+*ztA)KP8!Rg%C+a)mi>~ zyT6K^`D>Y2&1#|0jzcNyP|AA7IyTa{c^_{qAT{bEOQz)*Ii^i3lmQ}YZGdJ3ei_IE zCTsURNO|b$9JFFvh>-yX4v)glUC`YRqXn}+YE5@+VSiEyx#%7O&u%Z{NtS zkx{O>_#&jJLE+#Dm_Bm~u4fW}zz=xC8{WX%-u5;|^J6Ssx|9!o;Dc=4vW@f4KaVgB z*|cdBN-27Fb`zoK?dc^bl~5`o>g&gAt~Fy>?CX+VcQDwSKF?!uex>^PcAgo)Vit+q$ zGGKKIVk9|ABws77to*Ma(%JySZ1CCAJ7_j~uVUtJ-LqfS64)lL8pb7*iOIKYzt+_N!^|jQbQ^-((aBWf`6Xi!oxJcgP1aQ$!Z zLe$okixE|U$E>7&L^k=d)YK#)OBP;)ay_12x0N7L2Fnm9hgzc~G}Tsd_CfRc>0OT- zb0o%hvH;UH^RUi<4s7j(l#6rFY-0l)MNpkZA2AmmcpjnvF=q<8cM!rzcXxM-1NT2* z`_qe`>Db!=*n8~pc>ksE<-dOPL+-fiF3vjR%tdc`+glC+p_Q_wc}oMl`6TFQGU7H$ z8rxGTY&B!%p4y8O`M8~_jHrdO!B)fuBT*uEYQERw3jG*NSnhRN$=JBH9Cruw9_FNp zXbj^jsN}UP96Xb1L_5i2%?#O8NWH{bjZTNh`Yb(X&CuDhq4b=Fy9x88bdl>rF^y7a_y z@!ioeiiHwic-Q&VI4vMNX3UsEwmM63v;b(HdFB}|x#SY+>+7kluA#G|gAMD~vuxQC zzVn^yIp&yS>`VHjycA#l(lvbMs;kVVHaun!-AW^*rCP=)bR8K$CfaleV&h&W6Btlz~;SO9K{ zy4qTlitJ})WR(m45CbFKyyKdmv-sH+CeryK1j7*VQ3M_)$>>6+j#%Q_q~)^CXIp!FUkkCA9081n-zIr%7lbmt@Z#Q;1D z{nt8imP|U5N~5EQy6S31iv=QO+VnyzyDe!D9_Rof-vCV$1E?rrIk>K1{0tUb;>IEPn3U_V|21 z{i!SX@>jmJHv!mtz`Ni5ZvOkf|C|5%(GPjwdoJ1Mh8ur#<*j$zen@g>ONp324SnX3 zP?JR#e3X_}0A7P5z%}k%2_VWaX)Tb+0$D^%2-U*(Mj2-GR#Hf~dITC_lD5CNv!ISh6jwNfXwj5Tyt?lt&B|z*mUK26ZjVLN0bJ zvb*4s0ZqknpFx>=SYHdx^`?s3H2~Xtpl`^0Z;RPYTQ+m~r!HSVbM~y_3CAAyzKbuu zc;hdA@r#E6E;|20ZoKJtulf48?Y7%EpkPZRmDWF0^L z)^FI^H^|lRelxQ>yXb7JB{g*->@;RiPd)V%g+hUJI!#SYHIpYz<}vXoOO`C-*kh07 zoO90M@=ssEehc=SxJP!f}iUi&BD6L?&=p`kG8WPK}na`h%rW;h8#J zfsl$^I?LKETlwA}|IAJI-p|g#L2^}T6WonxMy zZNRH0$Qhuiu+qP#C!nQ3BH1}O!V8!n!frnn>RLCPgpT}^v^9c}fs%xte?dUF%g+UjYmtD~c#ij?b- zO*y#Ivw=J^NB}L9nYfAHPT~ToW4%rxiBL$Zpko{)HI8wmukIS?q^G`yq}Czq{%(etFMB+;GR^kWSlIkM}%{ z>nj$_m_o{PDaDfL5+bdPGo{izxqKr!P__e92{S0$S!?B(ajSOCe(N~~J0rBA2U_cD zCUwHD5%jt(Frfvu?SlS60Nv8k;`jFUre5#hAD4rBkAI@$eV1Ow;%A@Xx#ynaJKy=v z!E4s6xnkM!71#6+^dFvVJDCg|yC0lT$jmyWZErh{NdRO8XsL2;7SC*530@jf zDM+Uvn>ApSOcpX3`!5YC&$PLOV+2E#wn%PWhGSRy03|bi@$$oD@scS)#rI;*kKMhS z5T8rT`Sm2aDvhekqN~!jO&5Stc4l18B1GI49A`m0ZU|ZaZw%(D$w6C_>9$l?nct0- zl3qxEU!RxH=g%D)8hKYP=hc7tvsZ8a+BdJ;^`X2GJ3>iDfbe zHjj}>%U@B}iBO`fHBkscCU&&(<`WJzo)dNr$rxcTpr$I#SO0h)4?eTP%x$aFFU7S~ zVqSI^-H`%O2n?QNED!6qfKqs#$G-b6VB7X>ruwR`;<8IGrlF?F=+_7sEA^vA#LsTL zlNWw}uVHGa=+zg9QVFhw(E<#NK<@xzXD_0sA9@C0*AVoL*!NXHlmh%xiIIGfo%sSQ zxAw4T?N%OLzJUjpy~zDb*YeD|ZLHkBi{9Z8f*>U2y3|%>sL7el&{G0V%H<&&iAf|5e`Pp(+xp5EVx3J8c4)Y?>wOHd7iHG3Tq4 z0XvsUP$*H8%kt&R-pm2L_&b$2;E1k|i&^Zt+I!4Y~gu$Ki(`$rDdJ2Ecp%<&x|E zc=OF~9T^)=Yo+R=C@M$srg{_j=S%^@iVY}s>JmvCPge#qN18zIxsY-Yj)Qh88bCtq zVMtjSY;E%^QZP0K`I42_Ezd`jJfo5>^$$IC#VA4S1}L!a%a08Grf<|d)Dg-25v!Jm z5C%9Iw-sU(aZDdlmG}o``OU78cO4mljXMm}KqX{x;W{n~HF)M3XKuXZmRt4*IRC;6 zxaoJl|GUrj_c#5n@wUI*_T!)Z;^*hZKfCnO_wl12{Q#}CZ0%@C_x1GWm6;DoAq2WM zL(@?Q^OgU&n8%-A%TNF9+T`_qd*g4p@XZ$j@bh2(f=e&Cl+gFlyS1xDg?|G=z<#q} z`b0b(;s`-X2vP!Eq46xITAGjAZt4nYYD9x}k7I-eWodXK5%Z7GR@yj3<63uv@emU^ zZX^`9^5bh4+1gZD)`=3<2olZUSc$_I&f(WrT*g=-Ff=z23+zB`RhH-0Z{eiReV5jz zTEfY#^hXinKa{drRf3nPyw?CZP(bY*gq|LF@M+M{-rmmXXP&`NfAZf31K8TYGmGzG zMn@Y#sE7#YAKL*a&U@3xdH%ttlfP44lcS}vm2@_X<3N6_h!m2Mv0=u>#uytL+r!QA zayOtrIOg-x?G3aZcOY**?Rd8L4zO}ZAH9Pkge9L$Dvj%eI3k4<5}`v{>T8(X(#X8d zW)7M=ovCegwASa4!lmH*s7Mj%cuZgtGo>}2n<4AuNPE=?QVjb$DTG7Rcx`08>V(=@ znHU1({b35xfOY3{@EpOWoxMD=bR7>aS;N|GJroKBa@jP;>^qZ-PC9})6WWNB!gD2C zcJ}d>Ykt6n)!Pucw7Ep11-|;JcXR2fM=_Ys0}?3=1yyTJHl5Z|3anzzW4EiAN&A-PkiFz-dDf+pZf5_kG$ilr=C3NCqMmh#V!-~ zYJ_0=B*bwCpeMGPz@>%ptgt~$>#|&>wzEId9%M|rPe?bBw$!4s%B=+a?O_{9I{v~W z5)HMG3t%u0em)UkO|-Jr>zH09_=Jk;BLN!;NK5qOW@xQL?;M1|F(V^v0Zm#+L=@T~ z#>>g4YU`XAi_HQmH1VLi26;d|dfF)Z#qF@8M-WEFWe!ny%PqI;=en*w_f6;B@cZBX z?j7-Ke(_6JbJZ1B{!OR))1UtGwtMfs>o9=XvuCq<^=f|fqaVaUS~-qWP)dpV`UX8X zIEdC-Gh7mV_b%eSef@OoGaZ`i5W9xZz-@Qlo+JSK?lTY9aR`zaYd0~i#&N4fdlPzM zvyp$bR4`-9YQR*H+40Sc*Y1<1A~$nu$Lg-fdH_02()&QGD2zRrL*%G zL>kKgQ}%{eb}p^0KD?RhTV@CnUqMTKEuQD0#!AGq3N19kaZzEwfBgDZT;J!7haJd+ z`9b=34OC3TDiz^gVOfR-sHY2ska#g(h*aMi{R72m`80)%sv21fMPp{g_x*db`kB$=R2-lHp?;mAL?;sB@TSs)~ zqqNslGo!PWh0`W**qo_!HrCKolSQ}=INNb)Vo1Ke>g! zJoPLR!6)8#0hgY641>c%XyM^nKLLfp5t6hk`Tb)rB*||%AsHuDU_go}Xsd%4)|>C= zP6TC{0j`84YY>GzV*lC3*sQS@ao}w9;#Dxc%c!u1N^jk~b>g?b{jG(->zV-U?Ew5Q z9uGe7P~-V;KJSS3*7h?uZrpU)=;-M9%v}nTf##}VT00y(*R-Icz*gHbQ85EE?-wc8 zNLZ#lgyW%QMRlU}%UpInzTN&Zbwo@(!cw`k)-W&xMc;}Isq#2LypA1!3e9(+Z6cy} zb5oIa);Lmt-eH3iz=)ERGknH>R!IjS797zP=s{IhhttBO(o&cNV@t1L5fqB!-tE+B zQ#VI}|Jlu3w*3rX)|}a_S@r5hL!bQQC%N|8YpJctJvclvcI@GYA9mOiPdvHkyKMk9Ttcs0gI==6cKHtHy6djv@WT%` zpNZ%4)_q^k{;S>Ktt}2a-B;`3cR*#`~c!V|E zcCmCzH!p11!nVE<28Ifhg23twKoA(IV^?Te>T8+a)xy4$TbVntgGnv*wA9s*%@|N& z6a|ElvI(Fh>(x?~YAE{}?A8Go3;QV*$1I&QKspAX8Fy?XWicen{{ty;l))ch4TrMX z3_JStpjz|eX1RagA-%O~@nuYk_v#@Iro?m133edA>&lY`!LGO@#4hnC-^R~Sm zfd9W8mtFQ=zW@Cn0&v=Cr+xIoi!QiuWO($jT|LVyL#-f_HexkxjnLj?zHY8Z)K*#k zY`puKszql!BX^tf(5{oT-gG>tN@m}?Rrz|iIeTRyP$?6dGzvuWceSmAL|qO-g%171 z3to%YF|Uj(L8-?<91OUzVs5J<6LMNIKK5ScKdixI`NA)lrzRx z2BA$BYI3ko4kou5TF}PrW>$&NFK&2oQYw}DX*!cWWuN);AAIha#XtOOPVw4nuSIK( zmr7*;y?Vvkp8<1EIN=2DzyJPmk6o}}0e`vW)*b))p${B?+bxBIw`|<@P309EZu!;|zYRM|=|eMY2b0 zZT#XRD+m;6O(X;p+l={6Id&UVdf!N%AK&>X>2!vfbEojfHJc1TPgG91v zG&p`lsI{5L+oPqWg&EVPC-;;JLV9<0)-q_@MD0Ix_kr6E7pGb5(dL$AT+0W2L|*YKrP?n!{#K z;?UWXDfkQN85-rqodZ0(ej7_RY-Rn90SYRj%5!iX$zZ<7lPlM=Xypdu@>i2(a!V7_ zI~&<=N*A-Iwlkrr#%S;RK7Kex#;vs`MeKH66;Tvg10gCD9c7Y4mRUtH4#XspQQU?U zic$prXr7v?ERoP=uAhJxBO>A8T54l9o#u|`7vm3(LQQ73DoDSyW{QAZ&J_AYP~7A2S-{_^+*C%=q7xjaGDh24=Rw#70vEhEX{eiWva$ zXQeB1E>Wg9CfEp3PDDcEFh?eBxx^R}=2jF0};pLuTm zHZop{P(_5QX#F9KHiXbv-w%jXXx5)L>Yg#NG}e_A+UWlarIQXIk(HkoA~8q;V=t~E zWpjy`E-H=mw7o;aDB!n`E;pHL5+36M$$qaZW}J@QA8TvMyXwG@G5;AJHa`n7^Z&6T zJiQX`Sp=JR8VYu8mCf58nX5SN*kfBdIy!Fq z+-JY=!=hiRk5uScIW(xrp%0h?Cmw`2_5e6+t_e;xDPlD|B7tx`sLerJ1GLm3GMVvW z7vpAU>;Yjf#-r?af1LfDh@Ewkq(D~=zHBVj#^j`T2z>v4XP7kZ+$;X={yi1KMxvtK zFEn&Ez`P0QhN?spKv!DPYQ`r)F)Bb;js$g?l9q^$C{Q7IDa8C4h@%!lQyoIaeFT|a z{Oq&d!G|1Ny7YbTecLy_{`K@Lo$A9+JenEKo4_zSI?7#l-PQDRkNwM^{+xV0JUX=T zqKn?L-}GrScGw$Um(K_8xZ^GpgrkVkNCl8gT3X$Vc0)0Xv=LPjDlw5UhC7N-DGr$& z@Rc(M_~a>h-gS71d7Tj@1;uit1RE1lL%IJ- z$?vo2>}#7dYfW{vX#-guL7M7oNx4Q9G>n}z$YvSQN~aNWvw;`nPWl8aR~6|2jQ52~YiSiBa-MoiaBRYG}gnynTS&kMjW{S7EVV`XaPqWS1F~9a$hC`jkV~u1|urrc(!6vuU(}*uGL?W zEW``FGLS}*QOoP=Gjh7INDC$#AFmwv&vsO*0GWziq*E}n112_^E=rsPXm)Gu>X%Z! zlD72jzmsMCf-r)*8aQk|ESO=ww*CWQ5b7WO;Dn+|^nk6})jD#ivdPXltq=6!rZ2*#>^TsFm{%f_ENW zVD1FTyom)aK6E|rJ@!TBP3Z$I2{9d3Khttkm8X-ya^CQa_3t}aIuS+_kcsL!VP!JUt>VZ(OnCb#mHQ;y)C z7dKh03Gp&Zxq?DkiLa4@R3S9?L9u9(V|z@RXe$4sk3KT_*`tpwviVq9k+WxTkUh^D zUW=Sr(9=`SFr-p6)z;ujfs6&0>8cl^O(6)`NBKT z;>RDoh>x6mGzZM>B9-ze`VoOLj3oz$hN=uh`2sgR{sNwpCJ6Hck;M^Vb^aA7LW9uJ zGD$ikZJa@4_>GK&m5(+*a4Kw!BWq(WEu~c3Wgn03%89!=4T&!AU#aj=SL{1G^C&#^O(mc6I@{yBW7EZ|GM|A|Mjv#Ep*BK@@9mfbm zp{Y)LJiBoR|8@IAi27>2bpFZsVZ>vbcN%KfE5=~G+j2LrnJI?GdN*INUI~KQx>~wA zI{`T1gcFiiSiE=%gJb=;o|i12fqaGNkNih$(PiyjM@SlSSu=4T*GLqW0aAf=i90_c zkpQy1c|jN{MoUG;iY1!sYIyTe`*Y1Z&fvPs&gJ5h4yLU>$56gNAqY`IQd?EcZy#99 z`t9AguA~qS+gnrE_vH{NpGYW#R90eIlFg*3%Vnv}rK!$l$fjLf$0D8*`XLr5C=;5r z5+)fCjdARBV||@b0 z7FfR(`uoiHu4_6wQXsM!C?(TTR-{ zGFnRUt7keGC_)q}M#F&6i9O(@QUA05R7I7q?Ht}X*;zL`Ey~>jYnU5ik^$e*#yO72 z1pi1Hs zTTNt>Cv#62Ukt5n+kCg6nfNPMlhx*0}*5SfV*Ebx)16$s51mD%;U7*Oq>zC|KFr9>)wUJ8I!rWwgLYuLeCIdY2LVhhG`91 zMgl?3lf2NUIb*)$z{!v=Ii%c(NV$k8jq63M?yl#?Cp*|VlqMxLoz1n(p4iDl&n+{0 z?XiN~Zc2gW%O}v0xgAupfr>KV&$f9(A&9JIeMm$YIYiBM95a6^hqkq#B84Xe=~Rka z7q8~gXI3$BQY%-VdmP(Ghq!(Hi$)<+=vTkLwDrfZ_h?lF6%l(8WWG&m(iRXWAHPd$jUkJy*rKlD5|J^BK@gTp+w{6*e&?7=t!g0Mg; zm5!VBgrN^O)Ocy`d~OAwyWviHhes)t0+bMVLXb*(#JEfrIUrzyO=ehl^Gqa zWL=4HtX4%78UU%Pq;%>;LDG|&=hkhbdnj+g1Fy6fRqnk8w5lBenUtaaYOQ9?ocYBl ziu#rT5wgpuC5ZQInJ{P-s`fz^8xfPdnn zp{ap^z5$Lq=GgZydgiIO-1?_KFSP7@i6fz<0j5oW$?eeIfNrTnL=n1V?0CthP1Tu7 zm(|vk+GE1`()jpywA=M=?dl3iToG5oHUZK30*n^WVUS1-#FQKJ(1@~{wAw?LLW~E| z>D^pfUQ(U^gIgQAg6>!O-l*_Pu>54A2%2k6HN2r4MvC@S_4tl&oJ@>M(loR-!O?Yy zwcF8Kc9@N!P&AUPN&i)vO{1m?sys1u%Jj$P&6*wD@S9(A?Qx&n50&N*lCm%rTlSA7gCm#^S$?|3`cf9Ja&1wOiB`HH7DZ`pdV zHJE~0n~2tA4FwRZEE#E-+5tg?7|3(#e1}pba2!eK!1T6=1(P!PD0JGv^$of`la@TW zDaBWA^YA>#xtig8ku&Bl;NlaH=7|;S2!g=i{B1y&mIfy6ydOK07L^sKHUdOS7@(i& z0+=flMVe4J=D)crnr5`~iNg;e?YfMHro!$o7WuE+A0`X~Ef658#>Pe(8yWyjDwX2I6Hnmw+iwTpw%hJzN6%Kgnlzdc zZYq`hiIK74*Zel9%H}BfMWQGmD*5#H58(>q)tIn*_K<)jRdf71Y27w4V8KY4B*4)c z?HB_d2Z@pzO~l}cCgZtWcGeM`dC(kgdh~hjdVVb%x_2?VvjsoQllAJXte8US5YH9t z8XD$PKm7~610|YkJ-Qm|sj2eFWvi%4d$_K|S0QV=ck$HvEeIi~&8C^q(!lJlR_0G? zXIe)q6Pjx9q=z3y_)%cl9X5$~;o+rgQGxk7;r;J138*NZgw@DUj$!_oq*UH@*KNmd z-PV2V8E2ebyKLDDS8v|D+5Bq7M!{GC=1xoYM8jH+(2aG_Py@Y#A_xL%Yid6-Z_Yk< zKJf5^;obz`pX@mQ{PVf#rkfb(8=$ed>5dncyl`5<_+8(^-HULA$AMg>TeI4i4;JEce+(J)6#N)@VRW@ zcIX#x0f@rzyUBAh8Ix4L*n`kYu3fuU|I5Ez{N+L&td~H{6 z@9&bNq_NI)E2`2q>bgcSNo(`_$?a6hEp%0+X&30)7VAW#nT z+Fj;$MJ(G9k#YpS(#)AWiT!6xX2FapJh5yot}82?Ar%6LP^)s_kC&dkhRV_eBdhus zS}S0s9DEU>wL&RH{mf3jf7S`?-`YSv2oONZk=(v`6;Cc*!|{jA0w7^whz4h;;x=C?sdM;qNeI~g4f2m+rwpIpk>NA6ErDnc#GG}vTH zrpE>U_?%29%t;c0`1g@5B!no-I2%DHNf3n$k0=`IYk2=zM>BO&8*8@rGOw$RFbauu zfRx7eTWiRAX>MA+jQ*g=SKoam6Wi)&sjHiTcH$)#B@lr ztA8*6xc&B9zI6VD7cNPsGhbc1cFi0>v#DE93eXE@8;p>S%>EY%m^l&IJBR|kdGn@| z)~#O`?!Rz9@!Si~|3e0=docii=W)|bH}SsrzVBW2jSWNneSN153=SrtL{6E2IAlJ0 z&NSF>225%;W+qxfZH<}lSLY0}8ogVlE%p#icl&xAKmTv7f=!~4u>0bq!j(qbzkdMw zhY_|SE6=ud#fni@ct=$z{)w`rur?fS%X=~3$AMRAJJ*b#AB)7u*8$rg_Dp?zSJ@w@;efepC zlukP-ovx1`yR&;o691YfHdE8y3Jui>G4nUS`Q32OoAq>y-`2yOw-8zv=35h6r5A<_{jCCRw(p2Gq%o}dr{ zj?2`x7OGQCyz!_5DJe~0XZV5E1X>X&Nno)6fdv8j8Uh3XP!JI%0fB&g6fokK81n-P zVUZ|bLX8zU>bQfr<6Y-*l^HF1qM^hArAZ2m*fn`#&)< zn#a-5N2_Tdr2PS|X$vSM`to$2eR- z^0=4$hwwdn}h21yu&?9Enh)@-+;xvSV^i^+K)tqc$(Er(N!rchNdYM%(Z{p+uz1b zzx&-SpZV-(kEpM&e;~Q_clN_GD$N8*g_STC2%NIXhEV^UIX4Kzl<% zV#uVkho64>nOEI<>tFun(>w0C6K2)c*8VnWXisQG)>J`*6*du3Mb}6tD#&9_mMw)e zS(FiRkpf3YNLfHTAyOJZm#L04e&jKsL9nnZq7*8$=P;?Y86S@`4n2rz6WbXs6)7Mn z0b%4(BEq*6K3_|GB?z>{*WfFS3RoTf5mlRy1o>M+V{cs`rv(2yt4I zD@6z*;|*W(p4@nN+`ml127&0NWu+D4L4=6x zT_yxtM`#@qsnD`UG*J|ybc9lxFx2?PBGuJt&N^@ww|)AZ{NeJ8nbpzGr9b!;2mZ&m z`N+@j;Fk}-0FH~UkPz4Uuh<+C<1t~zxzg+l>1?J>Yn}bo4Zq^@%P;30Z-3js;Naj1 zu5=!-_zErhhG5ZhWU*w~9vT@*qZDXg{`n;@xcA@vQ0?9X;D7nZWOFQ9w1^W=Jn_t1 zZoB1<;o+e_O>qk2QhOZ%+1;AMx>z|3}?ldrtG` z%@zPVdv^SKczD=c_FNTAX-Cy&ja?~~eh$iFLmcabrdU1ZAss;^1d#%zvV?vuQIsRn zo)O?Na(oCo)1A>;0u+%JwADAFLrr6@p7)$_B&8DgktR@36vCkRBk&`EuQ1;$MW9S4 zU`%R44PjVhzZny_#hO5`iFaI zpV-dZjys5A6cFl=`!{Se*1Ot(I>%Z5?%_5PRyk8iO-e;%OUn8WXu?9lSW(+gFxm~* zvpbY07#!xR@BWmfYqye3rwt9*9)JAfA18hP``>>}*765G_yOMk{ts^1xpU{U$#&2` zL~s8fQkt2#R7Pr7+A2RDQO0b5vi_E+NC6G!GP=5usN{|0WAS~_IoOexi&B9CH``$MI zTyxDeX5KCx5vu5fbUOVr&vQ(JZD?!~5!BT~ZFM3U@Tto`{u~%f@VyDZ z|H5&>o6e_L7$cjjIqjKe7XNw43rh~MkxWu;klf6lf}S-2J-rKRtI^r4;qcd1qdnK4 z<+Tys5EVc)p~ZMk`Rh>93Ly=ZZ*TpPw=Ku}6H zGS8J%r&8q7Y0{o+pAXtEnVINl0g3@SjEp)~rJ2z`X$wHdiA(GsKe-hqv>2^`I1zGW zxoV3Al#-1?*h*g+F%Z{9%$W)Y&o(zYh$xEm$msCdi=KS)YYh!`zX163l~({z^vjjv z!0;GhP~szRdo#5&rzVryp`oGEzW$$It2y!HlV0_V-gNHyEL*->A9%pNzg@Lr<$(yH zH4^4d1}_C&jrKiPoQH7C*h56gSoHSZG(m((`c#S_Oyh^OL_v-y$f84Oq+EnVD@C9} za-K;H8)|Audufz#C#~#SE_6A%DYX^sTVn??* z&t!yCfe+aumd08`D?v>mz>SOxr4)i_c+@D^S%7Im6>M*W*^|-x&9oBHWiYDh-o>|W zdDtXcnX)kCjW^!-i`Qy3fA_oBqqWX9)Hh5>7O3aaT`ZuK(FG7Hvg0W+UQBcx8$j5- z#Ii)RvK)Mq+zX*zl0`d&N&7$xO{6vHlt)v>WyzKvQkD`gg(L`zXdSVwZ-iaLqs(k; zAylF5G@6832#u1;j?r|5Gh|$FSm~4mk7Terr66E1U!=3Sj!&I;9JTe;;EM9NLbw%j zKH}x0f1(y@yMdl-ib2qU?|Z9Pt!k}&R;VJK$z&)Ni~rKp)byX}blPMZV|jRXEwX12 z;YkBP?JNs@KKsIR0DSq&Uw+MZx4j_1S2^a*o5%0}a1*DVa%%5gci+`iNJ66!bT%0@ zXLS|K=z#iaqo7t>gHER{ntyz2UuoA?!dS%p9x}>Gpx^G_S3=Oo(E=Gy<=dSiSV6y2I$~BwEAtxbnATX&#Oe&WREEY}hAJVcaviev zad{mvR4k#D%W%P`r&wUy=m_fuMp&_HfGxu#j1@u%eek4FIIO(Mv=~nh+#M?MO8J8L zd*>-H!~3<@Kx%=K8YZ`x&v3M0=w5z^Xvl%tc-Z5eFJLc^>?}U5rxcz~Ymm-g$hJ_L2{Sv1yJb-iF`6h1o#Frs5 z^1z23arl<|?z#6BPx{|J_7T2$-M4t>+u!x|8~^az3nXZ*wa{Hn$i_NUdxHU}hI$+= z4DEvS&^VwXYBN4Fsscs>NV~=vEp$^j!his^0u?E=f-v$4D3Q?t+Xf_rP?Z*>gv8OB zK)cjdHS+$mj^;nU_Zz}gnliXl?IyHilf_E>sg9`2d8QgiBb2d@MG1s8hbj1DWKu2< ztz6G-4?jm|XFHdka1fDF)Ojg>vtoluYO^U*(J2ot!iu%G+x><}46)KBP5qccNr8w2 zK~#dV!nn7stE-F~Ttl6aAl3>o8Fbo%)tixkQkpxSUJO3QRBC7hK(Ab}y8X4>(`L<@ zby^SwrzFDv6I$tNYUZ{L8#!cR!NG*U}51*zx)=<%BkQmFFpDk#3@>j<#)POS)q zgA@v_B{DM7zDg@5cQ*6vnr)^AFai%0!%>vhEZe#r-}jk4p@m{#fT2Qbgtd`26FQwp zmMe@Ebz)JTD3byzLgEk!s|@Ie1WMz09wHx@(WiFIf04VbIbOQ?Bvfa|fB-$u0KH3y zVzJ1U^_yQJ;!rFae8vtIJof`o!J@;B`KhFJE3eW5$f3yY9X#i4NLx1v9!}>O`okHhSr~oIz;kvS!i6 zvYJ#vnDzL;v^xqtrl9HZzSD_tm)7G0f1*`U25F6xx{c{bF;LGBV0ai&@(n^=+Q6>` z#3*k|aj%w=>THJ2>KunoXk~hR9iMsl84jM*!OiEMisQOSk;0WJ+Z(XvEtpY2q*a0m z(8@Y`>CkKhQAC8IFJEHit^r=??&skxn_1I0%xKk{Uoy$Z!7RUUU} zW$+VXpBd=JdRX-$j1~mIj;)*YKwr=OQ>IKgroXQ*SuXz27{jB3(5(3KB^Pu1AMT+4 z@#h4>=b=X)UbUyw`1mJ2#(#eGIzIf756%DCPk(++sZbCS&{bKO+J&mE zhDj|J`=%`)S|($giRl3jtlG-F>VWyRk{YjyF`Xd@Qz%Cx0yDYQTA=Y!+Ociekd!Xc zR}6S&b1k4qJ1KA-3l3ETD$AJ%?aOs-_p@VQ(Di+x{^{Fz~q(&!pP{v zOUv-q(n!PRqhYl68OVox_0JD5mM?I{TTh{*p^mXak!>Sm+`MKBIMP;*E?Nd<*(Dv> zfJ1qVWmSZPuc;m_*@v33o(dI=j+O&R+Ji&pnZ&B654HM5gmlsS&O}b_LT%iMD)~?- zA$^JRKxEvc&g|*ye$Do?B}~S_ zLalLBWaO8%Kq`e4j%8(3rUEux3dgkEwfR~RSeHoqk;w?94Q?nBATT4aDXsPV*PV;( z=tU5y623o-bUfB>?tyfM_L^#<$RtjVkSL{)(vB)9dlkfz3`$2xZNEp@ZiZ6^GiyO8 z6m@BjgQrd4?nO%=lQMSVmL;WMwuq=m3Z(#yE{9IJrg{g8r4k#rZ+_Y9u>XDs^Yk-M zTzK+{r`-406OW#d&*x1BxOlZ72w`Fu)YT%2yYT&hb(=PJ-1ES_?#aiW6z)v`{=vuo z2Ohw4i=XAFqmR1y@yDL{+PZb?%Bf#NEn?PWbbAxD*TIBVsHrwBJI6618nN5??q)nM zD}ZAIkWkje))--+A`_5P#wAT#baE_38&jpmIoFBud{PTQdM5DaM-lmgbxSkU6Cou! z2rWp>p*dH@g4Ra%ZExj(wkBpZ)H0#2j>b%i&p-M!A`H3un1j&LL&zqSa80bJFv<~V zw4?D5yJ2MvOIv9TGDJo`O;tX}O|Iei$rHHrfZ25C3oP#*;K6M>cy`MUmi6^pUT$Ph zN>)^2jwz;PG+q)pNqqheu-_{{CdSJL+n?1{Lv1x;U>IgkLDbg5>P_f%TWw3wfouk< zGl;4xbWOGWI)!#!o9tmMp4*#^(bKxEh;2RSC=$g&L2cZ)@nI@h$rOrg85v@ME;6yU zm9KsAQ@rQwcNp*{s0|x8tOP`3V?F)-gUM;U^{p52pI^O>uYLV%v%mPctN(j=WOxRk zm5_p&6HLW1yQ`x6Qz?dGKF{gtLC$VmM@vdE9JMi|txu59CInbvC@hXD(j`>IfXk^tKj4 zG@f=qXcP)p3lxe%F;C7-@wNLO=kcdku;0R|y#3hy87hv^=%xAD^0nj#2O*a+bWT|w z$(calll}r$Oc=xCceG=dQB<}PhjIE~XiaBr1G`2> z*fpA`v#y1LKSqc^_$8LTxRq(G4b)a=h$@@{r5LYMP{}}$*2GK+EBd9B(I$u~$x0GQ zlZ-pAq^+(hF+S6k66@n+!}qjVl*NFO{XO;9h1BPsf10C@JX+jy-`yvkfByMjdf@&C zFYD{y)d*;otQQ0kbTy-Uc7cWo6DGd>d*8YK7r;Gx6M%o<(bUo`o?HB^-tU0@*DQW& z@pPr4csMP@v@Z0dc64J6%S;DP2psvq(}br5**0jKbKc$xwymwo3tFg!W6w>MW;BoXn{+rf^Va z6CJrUS=U1dfhTiFC&gpiH}cIVU*L*k4q{$IGg{UnrDsv^yac#tOg$)9P)WPcHR`!K zg^)Qk5lV!pFu>C#TB;n5pOWF&sU3`ze6|i3_}b%(d0@+S!=w<_;tK~vI9@v-Za=;* zKuY`fTn90w1wA}s@Bp1nP@hG-@FKczz>H3UF&G|0i#}7$dJfuk3=Oot25PGe4j}6x zs;kipXQR8C5lh#hM+>rS`d|;g#M+%ZVc&?6V1$d0JC;AZ=Plg+ou329EnBwg=H`a$ zcI_JY*xTR!4sN*NmmGTdVf^~nH}c^Rf8g_1UUB8SO2yKoc$?GnrohB@X$B(SPRhjYc&qZEG=u@It@TW5Ys3#D95*xp zz>$O+O2H_#8Np2}Ht^lQJPg?spE>U&B5i27!-3E5m#;JP+qgTULM!l8PC3l&tP!q6 z4~!u)DRdAkehH*yfGD6eHfppq;%vO56){qP^;^+VU?F1~#(bm}MAg=JJ`59$4xLKd zL_<+17GIMkd+wXw$jyKF)3B6r2`_}x(aQ1r&!)8|L%|PetV;2w+0%J+%MPx6`dJQa zZ{wU96RCAF4EaTC;G~UmqcW{@6+>C=nJHng0m=f1rNE%;rSaED&_34Np(^9yIu09q z`rlBUo*l1u{?a8E5zZ9EbRrQq8cI0od0kO=A&>$m} z5@b>ibtxAq9THzPr7dP9`YS4i3L0pftX8G>Fw5QZ@yKJ3=yT6Kmz!?7>5BJU@}8T2 z^Q+(dF<;0}1Yp%B=xPPW(^YAwFlExDlhG{MI|BFz9amm?C0Ad4HGRFibW=<7(DTne zR~vU~5kiQ4XP~>9p`i|DO@PKaL?(-t+ThssATRs3&Y)w9OFb4KO97ub@?hRLYa#uG zBJ28g@J#o1mhbFkRo@`X`}-N~E0#4p9f|NLql;$?h zpEHfO&Y4bEU5-dc1d&3@G@e^cCY3`9kI|rqA1r#FnT>V)%f7QH$P{&MmWa@}Zb^5~ z?J>J+mf;JACX_g6Dx;Y#w1?w(q`fSmZom%)7%L9Zk*nr`4cl10s}G71oh^+F7seRP zmk_Rpj$6Z)KA3bo{u+G1Yl97hP@!w95Y4r)v)?3d*=qD5^Wgbauwz#lU!e^TA%AHHd~t_h4_kI7o0HI>i#}_*`;79vmIPtQ=RbNGPu%?o z1FJWfVUm`YeCR_Tx$isQ`POZ94fQN~;z^D^_L%Sg;0Hf`U&&CYg6}mc+liE>@ zwHDN9MVpi!-<{GL;Y4gH*6@uT$8g}tCeCYK$Fxj8j*}wNS)}lYLX8j}j#DBXhCI3v ze(`vgo-q$xZAJA}Pn|$} zeU9M*RC$)3svxB`T9$ZW*8u-|)15Fh!uiJ@$^lb52!axxo8ifA-E8dX1J|>;V`RE& zN+hEXvz5!T=+Bz%=%yMI*h9l`h*9!^(5SwV@~8qc*3(17Fj62^i7-i(u|PI@AZ4(e z#%fPUVG`fh=(zb0f8xxu<V!mfOt=ZfT&pqm45UnoSf5qnEEjq;@!IS{FxlweiCj zR&mL#k8twzPR^V*iN>ldN@p&Qpj)|1Yw&AVFQZm8O zI8qY?KD|Q)lnMw#pInv8^BcDjT*KNn~83&L$o)dXG}04Ki4tpXwmLk z;T6IEZvvuOL7X6hkr8G#H?V)lWQ0>iYjuu}x@L}_u>c4eEsZi%$g^d5fM#SQ#r!)9(c=Xj*_$fcXi3{VNQG&9~kwa3O&hss>yxSK1aH65|0ItGC( z$ap!rM|bkEd!ONti&v7ZuHw?e7VwEf=hKrfaP5;zd1(D+hWyYn>||Mw9r5~TDU8q9 z&{I31Z_EgJh``K?7tS`1*|94LB5{)^l}ZV}l#bYm~S-;gY9V)K`Q3_;alm(**?FmDV)5iWq2~A5)GiMyO zfM=GkCrVkN1EpSylT9j7!5fb{kU}Xm(o@E_WfMgU%O`#S&`7fp$eK7Nmvg1o)vskL<4BA0h)? zrnq&spKFOY-H$W5u8#R_bqsupgR4kmV)vfR6U|Q$GEv%fA5(yxR4d(At6H2oXiPuBxhP1JHHE;YVD2?|t|F_J|{n z5RX6pxCUO+;J-Hk0GeA{#EMlb^@92Pe(%8tAAEmYA!!gyXoDFO(GArwV*+|oJ0hJi z!A3=PJ}8nbAIDaDVPrJaUrtJDcTIe2St*o84-6u7$T3r=GO4~56&b)xoM;FHj;x`n zx|+7?Ru1l(4g$tXd4~K^1`7o?4h{0NB`f*k($%0#bk^5#&a5e%GixgQwl~!karlHzQmH09;i8n8>BVxtdlLTG4aHc# zWn!3uH0^t#H4z#qBn|-&Zd}2q?s=3KHg03~gciPV(s8_D=6nW=1Ef8V>rXv`McZfb zUr#OLzKxp==*V-*HiYB40K1K1{$}H(iZ}go_kW~}b6!USY~G1>9E6UHUjKrb6-j`_ zTxGLjdRN!`makpcGDcP@(`zv1X*6HN*AbgrrgqXiYd&LiLV8VGNoq z0?hNQ??D!dMPx36h>S8^BuzIX5(@Bm(-DX8&EMY1Kt69RR;j4ADwrWb#LP(@95sI$ z#ZpKnoduzBv>=ip`Qivad0`d#?q2k8fs;=@fCHvZ~8ys#aTLTurG|g2B=8>tt{gT~lKL6Ct`-goF1%c@ARvdi3^Q z^EfLFjyA$vvAlF`T`fa{L;s_F?#3H$9K+$J;-vCRxd->JMe)7JLBPFgB)TTU|vl(hLX)-B?YU!ec zv}%|zueE`WToq9)CMC+9K`D(bZZQn;!ve0*3>AyqyKD_DO?6CfZA8VLgK?s$;w4|Z zj>L5wLKRX9Beo2Vux!^LFYMUKGu?f3kCmtqFtwqEPaSa(XU?9&^?!Vn8&~Z>duhAO zD)C!;s3 z@&9ZB@Wn5FiL0)W_VH)v z8!kasBO+;~g`EnY1Vcx1lq8a`MD2N{=8SxKgrG3Y3Ef_g=pHcL7EEFwq>J8fmPrn` z^_ciw@Yy*q_$J`g4}bW>wZHhqFD4HT4u~mJX4X%gH0c*hmM@vy-QAn)AtxSp+zo&F z%b&lM&1Nqz6beu%GPJFSjs1Oe)pnw_z}FFz8k)G`s*m&TXWs=Qc~L4AHSp0jYt|%4 zKHb^~bEg>a;`B}fJ_{|#u2|&Xjy;Mu&7RFz5SfssA+JVoltap`LP{4YjFx@gA3_NM zks|9k+`n-P*F3xkT*m<3>T)mjs)*OSUxl97hE_gWq!3yra?r(4F}rgjC+xouf4KJv zM73*^ZP!+SQ7pcWqe3n`^)MQ%t5Mn^IaojyeZ)u}J$;gC?+e@ZCZbd-#`L{%g}9>+ z-PLYb0K=n*{vq@u&za<6tWf@Z>T46hEIp8z0O>;yJ*@ujyYBiQ?|BbCbpO|rZ?YNY zESSb2GbU3k23G$drY&1clY#bAiZrD#z;h%Av^8;1TQeoCDTX0^V+Hz)A>D;MJ4Qy? zGCV?m!6yV<6iQ2c6;V(TZ1)1Qx7t8_$Yd5#aSuC8&{>;MHKSru@Ue? zF4%8Bj+ii&ksv@j!sG{)+3s%Dw$vJpM?MJAdWbJS{xrF?%WvOu9@A=S7>zu#UJlRA zkrIxj=#{y+-?&G7kKLi@yf9xTA^`z5qoEl1zZ~eg`ld8t^GK}PR;raudz3(Ir zoY2bq?|hW!x9>2>X(fQbBGRoIpLB_IWHxdw|F$l`%e4WM9Kr_Bw1;k~h3$O?pMWqU zBBf#f8Rk-N>p|&={=U9bCQO*{$B%yWqvrujKkg>~!JPKjUs()V0)`kJ+C zZ(qH3%_WB%cIf2o+qSWF%T`dD;hq7OY~0FWljb3%gH(b-P~cxqJc-|a=wG<&E7!-4 zIp)o~9!%?kDeX{I1^aYCuF3@e_#~Ak0~|GZUkZNFj%yV8QXdG1>U4v>mWm(@38Ffx zGEL@rp3C;J(17P+yo0EOd^29BLYUThB#d9SZKC6#kdcEV&D)MYj6dA{5L%}J$A}HN zAw;%K?iZQ8-z?sF;^9O(Am`QMI5~t0$$2izc5dPKtJlyr8qnQ6$cHXGiP;lc85k=d z9K#a$%jy>m*vpkKb)&3gl}OX6qTr*7MHn7M=S#*c%SoAg!HV02LnBZO#&^I5MiG7q zrgXxxbtc))7soHMYzjJ?P>z895$GSb{cS1kzU!{`(@#I0JMOsS@7nK9IO%xqzxM%N zcy5W8{Jpwr&OUs9Qfa~1s4h!b+p67>4rteOWo$6pKDiya!3iEzhlnP%~$G7dg)%)FF;=$rl6G z74qauB}PgC`AAbz5mk;uYjuXKbZN-C997-U1+%8nP?a&FLlFcjG8AP2zEZf3M1%o@ zV}%O3X;R|9%AQcUw#&3_;W!C_BnX0p_y6}C|LEWk{|_nw&YCrg2Oqqj(@#6&%sF#r zj|3(E>;zL$yg zfT|oKRIgBER`$RoluGEKAqWj8_SzFqq@;!6u|~YSPQF#zjnVd5x5PagHu3uxR`KtL zAH?M9T5y|atm>l5tHTj8ktD4Q%!#>&b;B$9LtOpnBHC+meEhHl1gZ*0X3@LRc%*#g z+2nZnP?0Ef2}>bzgh1&MpL_UrK6=XoG^R3q>9k|{=BaPM5p{%Nh(Mx*4G~%)rAI?e z2MxI{RFGm)T{VAs^C`UVpoLVa3f+UG?hTD1n@VAlyw?aIFmC*3*#|8RmI|7Pr5h8J zNTBCWh33ZibI}6>1Lq!m@WEey$GH~?<9l8{-u9Na@}r;p_>PAjen_lbxw7<$PkwSs zCY`wfdj|gYUY=RCk-R@_#wcharSNr$?|$gL)Sh~{X|<p%9}14%cOIRSCP6;5dNTIETBGxMI$P`cuMb>Ab1H=- z%cwt!z{hnZeT6YTde>c?HL;V&o?b=AUN-c0nf`V0gi1!WALTLbLjMmxUOd~b}9l#lXV?3sWgpMDdxA-bIRmSPMa~A{aRX>)zZkmt*uON zs3YUK_Wk%20-rE6e@keEYr7DIC}Mlxpy^!2>a58w@ptSM6$R1Q*ciRNz5mql@c*d< zps~J*HEY%|fByVWEM30z)>W%kS0|0ht`@|;(-Ex=uy7i3zgcDjjZCmoo@12Xo>_su z<1xhY4aV#vl|s5{v&T6OqNxso$OO}uMUTqzEYmN-zySCW)#(&JIO9}Wa;*fuZ(3x| zE1LwFOj;mCK<{WjpS<@`W;Zu-P**crX34l!XdR;X|JZx$ILnHw`}Pim-0g^ZJ z{5X92L(fe2wNq7l@3q%nD>SqCgG@d2APS;XE*hU_H?8IVwVS!>*aN7Gr|`TwyEjVj zX>gVQrcm_K&kA#_c)|mUT=wXLT>i-OOl)rAS7#o}m-j!6NXPMoPf3^4TG8(tF9ejdG97B5>z zPre_aLtDK`@_vCy!-jL&g&&1EQ(&)Y#(ZewhjVZ$;!@NGGP|a zIynjjLMDwYs@B$aRae9%Q3g6i5En6n0OWH}$U(6Hg@OrwCPF}1@?Mwh%oT~Eg3Uil zEN#R3kD`zvH7y*y=VU1643{8VgiH3_^U^g$zHckPH%iu(Wv*-J&w=lo3ccVX z3I(IjVfRrn^ie(iyDb;>wsxa5ICm;y#L&t=HPylFNibog+3U;KL7%Dqy;zKM&pqpe zf5zGOzRePfFKCyyeGOi~{KNmnwaCe4iIdgcrt%BZ?DG0&wKg!oG1hY@}d;)fxjeH~Iu zl#pg(%eFjAWW-#dNN+A@+d$SSm1-Mc{pPBH()r{#b}So|QiNgn9~~3_pJ@SjUYzdU zE`~M_`^K8JYraz~6f3>a>EmJ4P;^5L>^%)y>QRxM?C{LIt6sDgmac(9jtOI@vazon zZHZgTLa5ZI(e*VI=zq6?Ta>z4kS~B0YjLFJ`|mo014m6E7Z$9%WMr)|cb})3kr*>` z>jM^QesHnc$quck_$+OE_lIC=PEO zjTUw002J11%ZhuH5(0tqrh5;Kqo)sI(hg%t6ZlKiVDZly z6|fb)QYLswff(6@?(8)rz>-F|R){Dv{t)|2g(sJS3dGKi4zB&_PyPnf)TV31KsNKb zr_E7E996sEl?C+n_Gk)4v1-{`7H`?a$cB*!;(*50lKwEy`9~hXO>363VB;o>1jJ4I zqvREPFIdl3<#(el=bY%zF z)Zar}UoYFT{p`qO>B#2DhmiFH{3w88!1jTD0;Nz=nfBVCsY6AeU5?*>AO868iyS(8 z3Z55ZSbZbY#|-EF#~nd)O&Tp?Br#)VDW?Wk=b67P$FwGwxixis`u^uQVD40onl+wW z;G?A=7N`yz7C**rq2^7yWwFBnY-Ksr)S zojOgdTe}|LFTg+^R%}4*IR(AfROo6k>$1Mq5XV9vmaHprMa=Gs)P+}GdDXIuF1m5p(hVkeC~%E;Wp}lRzm&5ar4GeH6nyN(c7-JH|r< zZAK+ao(W|hoLTRot)4YLb;%Szec(CnUa*AOts{xM9$&rj0kXwBA3o+libaD$ZQR*I zluXjvP*2e>a{nu`mNqr$!}+x@a`ozk4n z<`zrG8dC|2Cc13u>?bM-j;bol^S4_h$V!VblgVItW$z>a|E}x&^UvqT8*k(%*Ig$+ z_nFU}-O=6o9ibx)QV7?9nd8tShe2Zv9554+PM{-QaRcklpkG*w*wM+PiBtLE$3DYR zbN6QWc_)(dLx@>gUmoYk6kdPHsQ@7`#|53Ae@&|8z-!r{WM+4Iu3f4JiG&LjD8KamlHE&inK2Jh*Hr z$Ih9=Z%#Uymh=dMD8jL3FRpNH|JBS&I|!6khIqNS=-EY-a`cJUl|(=7l|c2G2|%*f1#*VPz* z0HG`+-F{9gf|?pQU@APf0*LU7eyTQI(>;*QGyz=r@lWu}U;k>*QyqQOG0c1Hk?#Y? zfH;CMBHFl}ho4)V-b%IDJLLqQ9G$!Kw_}%C7@q6#2-!GyRq+@Xenz$nwSyP81 zVpuvw(sOZzWLQlS0p!Ahv2V4gh9eC@FVYIBONpa_OC4oK?o^~1l1y^?lxb)wO-iVh z9p8({g?T!%J#^Lk$-$o>K<2oSwl6KsMAGKGrglh%Zp9OTTzMJyH*`9l6Z6DExN+NzZ+ z_tc=-+AeeyBBoD-mL{_&f&kjOVC6PL0=6$?(!`0I&pGStr+#qNmH%+?2PgzZSzfEn z4NRLb5|l~c8`C54WD>27Wpcu;BN1;Tj6w>2H-#XFA7;@yw1MBTq~Ve%q9yqX$IRht zs884Nn@6AL4^PeKuCHFe*p_-c;n3Pp%dZ|?z-b5VMPuB-#bM3XE`;YXZfFCmcl7Y; znynxr-h0Sg9PL`-r%@mbtqy!z9t&MQa==V3IdpFvj83{x2CkCAHNmgykf92O zElE*_6u5QyGInDnaQCb;@P??~sErGBU1a~)!TW%>}?2k)7<2f$fg?>JL-|alSVl@{Wun$+f>nIwM zL-C`?SjHl8ZO|7&8uz&pYA+-*(kMp}X>gQ832mJAgu{^ZDEbQ>jIDRM=iC$c@O@A4 z(v~)>n8<5wT}2f{zbgss&9(qa=!jNENJMKG)eOrr;7LP16s{fVQVQjb5=4 z0U}$-HO|>{&b)=ME<9#;q9OAhGwPocCysa4t=nk+vNyx+kI&~T?>UY!O|=jS9Brzf zq7!k@$WgrbkxvjrAcdeV7Q=ORO>(LsPScjk7V`v=-2>WuwvP15?#~sOWr>msp(6y6 z2*E%Q;95Z@Ws@qYC6Y8F>S`HL4-g==j~`~~$n{fH5pl;uVGeO^A!lFt%xrAt7pI;~ zJXR#*hc<~dFIy@ICAek|632=0%+_wEHYpxo*uj%8F5$qvrgG@CaYp1uDjWoz`8vRd-FbZZ@f?z3u-o&6P2r$P}GhG^lSl)~@Jl%_yLDv=8InKM`3e%GCI zW3Km)f=eeeQq z_`~o2p>y!VAO6r@^B$RZ=H@M1070_3hRLIb5Je&B*8@KOd>ZCCoHGMq&eh#GtE&^XG9IG_DvUk^hYtddmqjK4Wp zg^*AT4dkE6KoC;r#<=3x{rL8w`y)g>LdLBgwUuBk%aW_t5cW#WR|rXae-D3MwGJG? z1+%A+4|LhNR#e?(qlYakYgQXAeGPbGfL|?K#@g;4zPRsPYT`|XFt1G@r%d9LRU80S zexDULuu^6qP}16=B1m`+UAYcEcF*lRylNv?oNyS|9Dgiz$rggBBzWRjltbcZVVuU4 zENd!B%d{3s;#hdy5fZ62D$Ef?eKaQH#AS?zc#L11a41Jk7*)1qE!`I(lpQTADZLrv zqPGtF+26O1YuXGNnra{&w`6ID!D1l_0u5tFB1W{BM~D<_R;@mK*7TWsztOXubIyCd zW)>TeDbl}kJ-0r-fP|yU$&Ik`y@epelO8p(7%9)A7)4}?A(>+7{~?)TQ1!h}rdR}f z52T$gK|s>0Lt6JWv@wK9cxk%|jMJe|3Kx@*mAb@^{fr{52%?A}R0N?zpwi@{q)8l9 zv1Icz$bn5ONz8MZ)HnoJNJ@jSqMS#YL)|FQYkZ|RXZln|r)#<9zQ@3G`P6X-Q5%n! z+edNN<+06ewD%5Fbp1=JxVmybMagWcB&nVC(YXMMJ|bsDdz6NJ5rQJZkpz(<= zr0B_HS+}8$<7Q8wh~}>67lR-0xf2e?bv$%r?z}=Eg)sUAwvR6mNPEx;JGN^2`v&Dy z!UTDtB}$00y|K1NPC*p1wyo2kNkX7Yt-?X*;NRQ+VmJOH=9@4K|Dh>>cMyPo;99a| z2?rf~&>r)ic=UlCJ9b!562b5mm_8nA5-?{1jJ2NJN`WH{0`T-gs)wzSKo_LANj@*x_Lr0=S4G148Om!x0kguNQ7bV>QUGfI6RMdvyZ#G=a zacJw`#;Ld5#=7<{u0P{wPMW+Yu2V}GTFq`zrHfEig=t~by#i_YW=4@!fp(BmQVeoH zFF{yjRaX}eZQRO&ZCz~c??Y>cKq$-A@XE1R+e}@Td4rGrYMiHxz+%yEd`0d&5gbNRfxt!>-$fOpC%r*PkW_YHccGtM}JE3Wv#a}y>^ zaMrJ1ZwL)LyZGtdkMV&c4`Nu;IKnWp2U#UqjH>t-ZOpUoJpP<4~82Lhf6=nV>9qV{ebLkb*@vw5IZBDRFypM4>`w3+Q4{dBeG) zG1^KA^7%ZvFH`0+NJr)g;j3T#5?5XQWBg+Af_K07ym^m3{Ky|Vx;h7a?#XmYj2%7p zf%eWF9|79F_{Goj(T{$d>#zUyKjkcJ-@a1?hOZ=u$Ej~>pfQ~w?j-S~XXSIn?z>!e zLzZB1fy9%BEST~jN@C@E12iV7u1}^Y6kf*l1jT~l$wjNJnYHF84?M}CGsZBYK8+v2 z(#`E`&Sg1mzgf&*xtV7cuVK!t37jxz3fW?@j2=QMNL&9wJ-EU)$RvZ>IAzkYuE+=L z(m5ss#UNm7dnX84DY44TF!2UvK)Z502MZGI%6WPR0r(eQ@ucY$wzLczx^DH_MLV|d zD3PQEt-}y|OoYZ7b8G{_2UWmJ6CpUcUaz1wQ8HCD=kECkT4CJ%?{GQtg z6ESNnAq;t^wFSluL)c1|l5&_7$gB^YI}yD(PzvcQj-E1x$KHQ7$4s1qE9(%Bt{i}> zWLqh1<*&;dFcKyJE3M4;8iFXx&CAz97;(nb@!-TE3W%bRC=4rycUiBxER~K%;3~)k z{ao|XLM9Gv;v;is5s5Ueb@RfWg%!?#u7dq_6~bYQ8?6Ynq96)HzE32IZ0udd$v54} zx}81TcHXI+K4TwTua-auAeHIoRcrb0jxt&9+e;$~BLlMe9rR>3bNlk;oO|cP9R7!U zx$5zkS=Zak-Xn(bo*Co$#GX_5@$pA7BN9pU$97NSzjq>3ocAp^ZdH@fGI`tqOi0VVS^m({K z5_96Hu!z=CnWG}A^xcJ!Nb$xsio%%qXjjrX(96y9=A%*`mz;Jug}`VGIF|FczI%XI zwsxRJG`LuE>^>_y!5M)g1USVIFXN+i2>tz4LQj!F1oA$PfFPHLOun4yOr17O16*~r z(cbygXFjcN`O8gz?C9zgfcWW8ui59v*IvCpAoAIqSh;e=Nux%LF3A%9(}F)hG4Mrc z{Fj;pwT(5@rDAw8VLU@#m-AK<1*+mj2yGot&7_D_0#C$9$7-mFHIq^qMN+ zSe8c7P(&&;0bd1#QPKQg6;Ucg=?K?#>FF=<+54X+3IiUz;4G##)RQUXNw}U-mXpeW zxJp}s(QeKlQK_CGMC&};d)jz#-8!ycw499{156p#$fZZ_#c|^&GNGZ7+E@Zd3JPH! zR|kx5O!L8e9%Z2DqaD{KSd`_1wf@H@19VyB#y&eT=YA2Dpjj_qyJ0oc5QKmP3*&O7`N z#tj<-p*DSZUMtGl~`uk`09>DPlbI>Ox*!zKKtt{VpaAA3{$)XT0OJB<8^5o3_!B%NoLn49+&q9Rh$4J@G?F!vew)^nZZe7u?V>WfsQEjXG}}Lyu#@4gAci7@uFADKl+QG z{d~}S_}u5d@bd0Z%YXKD&9&Fc8-Dk@Jr^&wMsl?&8XD5X9D(O1D@HoIT?d9cq4l6e zZkKWeGSjxrBgzF!$k@h4?#z2j(whXjh(JeC6xBYu2804P*BTVR7j2%sRN4^Q%H>#vd0p!5mPWP& zR+Grp+_r2LOCt+k!s|kixXO6TZJVF)87CX6R*;0Nve<>R?SKdZgKzR=_w(!r-t+9<(Q ze@I$u3lUew$6`(jDP#Cyo_IW6RryzclzO+xh7cvnsMV1Vid=E$-xxNsne&g_gIuv_ zWwOoh_<`cK6>DwMU&6$cO>%eR-YEq#QX~h8_*#Q+<$tR`ph5saNRTTM^i>i7tyOs4 zFRr`(+_T@!t+(IuZ#@%VUa%lmS6BDN^5+(h(NtfHi;L&R|89WNueVMHA0(!AVhMqP z@;QFbS$yt>zp!lkR;COe$?5y=!@<+1BSfA|v5opff@|)5hDpPknKHVC^RN07v6=** zKJ`%QlPU5+h=Zc4DQd@gEecTO09c){l(wW81Fa)Kg($y(?(BxnZe#XQC=in_ zAKq^^^FDA6-#+|U#x{<^*REmX3kZckMA8IUX$)}?nusEbK9uf4hykSIn++xmt5s?c zQqYs@<+hb;ARc4($l;_s&yEf%LJ=Vyk8G|TU*#>N723_KKu8LHhV}h@Jh6E@AKPm- z3AYhXNKCSAWH?xg_LI;H~LqMU*huh4GOARS6Mp1>FcH5(j zuS@aM;|`@R7N-zJNHi`kp*B+oo!L$FSbleD$c$0UOxA? zXE|{6aOS=L46ZxzbdH|5Cw1`_eBlvlBWzNFlRY<1eQF3fKhKF%$MF8SGm$}Hy~(Qz zo3~>WG)NCzS01BerCXme%8^x56XjZ@j5=7NQBbz=t#(3;qQIbIN|x7RO`@4d`G(QW>q|+$Mp9av2?Mky?bYy; zhv%_r{TAMH_*{n7))J@?M}t(FhM45RjXT)T(QkM@x-=nPO1M>(-9s5e#w|u9{D>$D zAy+`>3)NX41OZxw6uWv1zsFufh8Urre|PW)*t&JA?Cb3tQhs-yOLI*M*Nai&jtT}R zT-C{~R;ApiN-x1S=1OZz2wCl%jvom|Hw|HriLLzZv1jn4L*DnPOT@_gz0@QV-2U7O z?s@VREYH;b}*3#PkUi3xVy-MO28khGeUSsO;COtyhBoh1T}VAgBiP z7uM?6{AXGKiX|I1+g6XLCJ2;U2yYq*c+J|>?<4^KitG5}j|Jd2zxp-jzUSS4dhXfh z?lz^e0@p#$nPxn@XO4j}LviYAjanZXBF9wl+qw`huAz9~G;X7Zow*FsGQ(4;8ft24 z`12zV@%uY&g_>FeVTKV*XhF=FfXHN_y$d>fAfHD@inP?6I%_JAeeiUCe&PvC8#0;D zNfIeV5M;^wU1Wnk!$g;c-R>Y!I;0qOvvSJ{zVP$kGy5Z#a@seq;??yl!0|29RidOI zB?QlJ+sux>JaNxq-{Fl&;eZfCj=ZCme>55E7Nia9SAFy~e1*=7Iq_1~$>2*+enSlv%wcU5;Yd&hKA+k)!@}57}bC zBkwznpPzgRbB4~ub<;%3Fn*;ntrD~>SD8_yNX6@k$Lffpkgpyzi&-N_g0GA?cX){k- zw_)v|r~S@%zGITzgAUx0PN&R|7kv5_Eahvz`3th#H>FI}RMIG$l~pCH4=E85>7ZPp zSGbL)(h5`&6)B{U2pQS8?oy1hW!?Zt!z)qBm=mc&HA%pVu1J*j2~+_gH9~u6sc>bS z`uGSt@>xkhq?Ok#{hzA7Z`ooR@H~&5nQne`*WHX6J%V%gpNZ0?6yHb<2a)7=iy6>DZ|l*WSO%A`n85&YD1^BMs#dzsiW12to)U%om`i;?{S_K?nBzr<{>peLW16 zCKmvah!JxgJZX~r(mgjwk47sqVWD({AS@?!XhW9N(yBdIDIl8Mw?t0XXdM8O&mVgX z_q_NLI|uskM2td|1sSq(YX@Jr;U2zx{_(uDdIR@8{sPAyychp-`e9`KB9Tx?9ip^j z*HkG+YXru*P&wutj6_w7P*>`IB{U(LP((yRp=4x)t+Yf6Np~j8OKUrAK_{!&MpdZ7 z-zx}8qGD3oNh7t}cECFc!2eIzLl6Cp_rL$Vv4@x$#4}+<# z=pprxN}&?5N|h!M-ihw&fkGaEW@1AlAKPa(cfa>E{&f1W?A3#+Z+sOv~7K{uSD7Nv7dmrZbFI~g$ZhwTWJ34vv*;hIL+dpSR+h&Aoq%4I39Lb{_ zw?Y`u6i+a-WvH3Mm8B4(EV0TV2nzJ)+VEAbOmfkBfLFI~=Yb8I`O3j_2}7TbferL! zw=t0Kq!0`cYFimeX|rij`A`ySxh7nX48VSDqy`R8!>=soat9ZDE> zce%=~%H&H@%)%-GHl&84v>+xOetFV?%pTSR1)Kd#tcSo`#{Mf)3)Nq?0>PDtraH=M zHFkjxnsg{bs2VY)6=8z9=pX1OU(9|5;Mil29rVn5?X@S*KKuN&&CNspQVQ2}4lwVY z$GH6FzmSS~WujpuLxeKmyHwRv3#BT@F(f=HZG&nSwbsh;I&=xjx7$EPMA|PWb*0r& zB7!O%86-(nGovM86bx>Ipx6fA?SMZSUgDBll+f@S!NJi7d~h z&WrKrrp+wb(giX1HMg&-Nl}%gX@t_G^9H2|L*KZ4?gFFeAb==B`9Abj5P+|K^Xt?9 z6VAtDk2#SguP(~<^>kO3suncWCXkM6D`(H_BZ=YgyEYsO2ZcA-#=(v!M^$63gGivd zTtt)g^PIBxzSN`=Tye*JbY}*Lq70jMcJuLH-p0rwwJhDRm7m`92uB^fC)a)C6!Jx* z3MsW9k`+Y36yu`uWhX$e)xNT*K-qSJ(%iolQnTV;T1%8rc%H+`EuC!d=mh7r(Ab-= z1N3Wu!HTN=x1a(4wH$yW4?T>14nC;<(Z4GN0b|}^=X(j2}TTsiNlQRS-J*N zC51mrMD|=*yplbKj^dXe{VeUF&qLeS(&(m;j>pg;%`8~6f=~YN`-Gu1(yj`aI2t{w z8L}DhePk@bq2tGL+SG|0Ii{82wPrrLuUH_ZvN*bk&j6k$XxrJx=FT2;q^L@w)ALHyu(`dPKR)>a-#lj|QY8?sBwNhz(zfm32!__z zF|syEB#hcsNq0bL(?gR|5JpA%2X>N7*5OGHt@2#@bbbfpqY zS7(W0mtME9_N4;HljMsbSHHA~(G zd!Jx!S1-7(d5!<9#aT5HteeuXwaP7Qw~Q+RDnh$1%o-0bE(6dTHf%ijgcDA<=fMXb zJgxetUwLIA0Gl>#x^TpZ5$|nlYg4F5vc8QU{q}aIjTy`P4>^jg&LNaZj$~<&PDsPz z7P6u*p*4Xn5O->;w2?$v_{UcTV$=+3Whku(q5?4|Wm)`KX=s}?=pruhvV5$$*Dj&X zR_0oCW&ZxnR7!(60N^?iFt9J*tm_I`8*fxKb!tS5f@{Sp={Gn>XMpYsdpv^tWG7vI?NR9(Uigdh@LeNhkj2M}!;X8-#%g673 zf`Pyy9n}rde>e%y2o<4gQxK0E>uC8pL8x?s1rZEwg0aJ4Q=0&x=RGp-RDh||r?6_p z>hiB#c;STzAqFN-oYd4IWp|{Mrr-s=0SK^XZ~v)xo?LJFe4 zGj6SSL-E>%D|S)q zY|4Zn1wjy@`ZESC+_glEl#$8qDnsmg_Ut{x`~~y>t-=56U;jGa|Ni&+(wDyS^`BgO z^~vS)QM!1kGzU%?MZFi1RXs>YA(d-j|Dc<`KqIAxBN8OyHN=D|h#alZ(pZW~?HDM& zO0UE0wF(O4qVc1Ev-aPQ%^y6UZ~o;kEZ(@uNbW`vTERu<9mnTSJO~wOqR{sEwSz+7 z3d7hh`Jf1~Ys*~^(j6(|Yoa90UePfS+9nkUTvyUrDDc3d)ev*|XL*7QN={4mTvFmV z&VO_){jW*@_TGD6UVeE#vuBTUf*=TATrj^fv(r=udryI(%`m0aLZBGI9$gVC5ki1; z(Jw9Ml!FgpzZtU$f+AWwq!LML>eAfy^y9qmic9fxIYc6jZmK~{98NNoU_wJ3@0&H9 zv!_p?wV{ce?^93#QV9~mcweI+PzBNnmuHqN=fhY1o}L|DP?ti)Vrb!k_F28Yoo}wV znQQNTlJ1^(afE?#Lpw?(0U;fu zo+pi(phhF5Ll_18VaZCqe83(g9f#h?K%GYHrzDOeOTJiDm44MCFO6(TNyd-(?V_c8 zeC{-+G}qH#2yG|AR0Ptp?4wB7{x7c)i!qgjB;yBsb>8zNT$jJS_c)|*$QA>X&e7Gk zoyK%4u8bifg)8iae}gq+Bty+>@T5yB(M(^i4UOQCQA0U<`UHNzXa#x@YyBTR4}`6b zl!2XVQ^=h?C@IUdyVuPdLeP^(A=FPY^yI0Nx2;;Sy0!Y}e)-E^0`SA1{IKVz z*ZlOHCm(<6wn#;qp1j!b=u>?APk-h&U-&$Z)b{W*-U)*OsT~iM(jn3T3Li(r?D!tm zG)kaUNErFJRppWpk{~J&slcv1Rj&3GKvb*}ZPDd9ZmlCCdw zI@yxF|DLIFDaEaw1`&1d)jcb<_oH7UOT{qOVb?|gUcH!uCh z7s_OgL=xxxV{nHx^7TbaNGw^27J`xK1TpC_ES+RRLmeY)Qq;#hT2gV+g)TfNj_0P0 zop>yPv;yB6*Cuz>9D>s7HZ3Qlz|(?D&pMS!qvL$_xA)WA-^tuPr|^~2j^e;6qv*~Q z3?~Q=v};v(BSMTCsM<|VURnyJ=M+`2TB#*aDqu=tVvaJ2Z!+fc#HvlSZSO=R5`zS$ z{wdI37#cCT|B~y!Dgk);<@ua+^68_VeRkpEb?erZ*Mc6_2zyL1(!S$|7>B4(p;HNT z!mCX9D9~{i)@){2HsA|qegJ_c9Z!<1sbOR1PQH2LulU*RHyff*a|7|Q!KpuS})wl#im4 z>}@IF%JNcQ(a}fTg%c-^p~v^jqlRc<$X?|{fbzjDEYZhtAm(~ymUqUFcy9Z4-ZN_| zqiPala$$LPSZYmVbpssbAgm(WVAj3axJlP#VS5KRtys^|6Gn6Pv~lzmL&7LP3W?)r zieaAa+%}q0BXLEnYOHMcCwfVV(2W0>L%z;!B%__li~y7hiJ~H|TT>R9Dz%@2sE8&)3a?BxD)Gr8RV3ynUsF(5 zPgIt)FLrGc30nfD;z@ot?`e9wy7|#ZPe!Q-jcat@5hx|una}g=hV39-A{kOe_1{g- zRu+P%E*qL^RB3$QM|Sp=>0PN*>iyHFPW#K|&6{fgXz$f@^%)s2M~dakm-m0`+n4jL zZ(jCqIU_Tf96<70mwoFtU`VO>iS0Xu51n}=`?NL_SCH^r9D5&gQAmF=q$^+G`EC8= zLq(t>Tmk8LjA4lw!)p_auWw{zZ4*P%^~BsHN;`mSCA=-~$Y2CG7%dV7Z13I9ku%3} z_az@-M|VH7#*Dy~&^eH|($x|zLxeWkB+7Q~Rr##kUGH6%l_kp@8bMj3L<>=_{zcjE z0X#==_wy^ttsY}$@K&jCuQx8NOUmK^#N%;NsT6tJ9(pGM_y?}x!-jL_xo4#xy8poi z8#ZicECY6}!(i%I1DlR%DUV?(38a%%>Ru5@2azkH7cAwH4}XC<)25KkWm&s@2iM>7 zJMMjS9-DXWfFTVuO&`a}drjly=~LLVWh5i(8gQI6N<%>@<25ZTb6RQJbB-*GUSR$9 zZoc`4yC?)9B9*j|ltxRhN*T@u!9>E2lo{g~sg=>OmI@+CU0ssX58W5(Bv4U^2DS}k z@uLVY<}s$OhA`CS-mF9#wKFYoO7@sqqfo>hho`r0=hz9OtscI#dIUyJRa*SOhzLhG z!bt8W9Z5~nqdOn4c*8c7)(mf~WmQ)%QyUu@QIo(;#%W0l0$-7jLLxszXwzx~h0x}C zq*iDl4H;1=YT|KjU$&lAz5RS_&QvDU*V3O4i3B)OR0wLq!4GqEWw+6s9)T-UgZv08 z@V^y0viH91=Z-)~XiN^L!{0(NRJ7Km_{=`Dx%i=HAt5ax&A54iQ_%>1OKe_4PBI$# z5xOyLA?Pv<@C_0Md*4S5g)JTEOcsP{>FwygL~DJX5F)7lmD5f+m0$n%`t37k&bl?0 zh+S697a$RbbdpC`FJ;b(2^>6qI{9L*Y~fn!-wI(8BS#6O@bIGn6tyN83XsZ-grdQZ z3Z&wV<~`Y9DYPJr0zA(qb~>VDVxhId5A(!aE2wXE1C#(?6-nAjkCLLLDECjbA%Y3} zZ|pLoFEpO(u%WY)YaaX?2hN?w0h7m4@KssfS1C=>jWci4cGmaw8BK;V>rlT=$3~!~ zCRNlV15G51&R3K#qIw6+=Yhk*g$sAgo;mC2Lk>CkuZ2R<%ST~-Hdcf0`=YtIiI$cY z=ie3l&ph*Nap#@4>#^g;zOrfKrfDVxSHhh&k#BtZJkHy18VM06=B1I+BZ!J96`+WS zbYudyj!+tMVZ?wRk@F)q_4cu`x4;vd){u>Sn&WZy89AJNh7D(YQ$3E8CQ=EMbZ~`> zvZ83lB0%GZ1LXYzP3bg4YSV;aL@`v>O51+^w$zWx$*@Ty)NX@ql_7PN^mT>ksBKHn zj5{L)N^4w4u)QzGGt1UN+$~QVY5f+>e{_jBT-Dzy$p@>@CKV8m#i^^QW#`VF?<4?k z_xj$qzRM-w`UY+7ZQOR#t(lI_j`EC>7%>z*b39^VE4sDG%#>A|n>kLoiqKjZ{r5H7 zsfncsP<-|mKj!(xOIWdP1$hVb$Pvsv;#fYo&rD93G=bqYjYyfY@DzkmgwPJkafoRw zsm=DZg<+aTDkAO(uDbaFHgD@NNl0ma+Ht68n2SMButwUZY>09l6FBf7JHRK-J&gk< z&mS>I{s7=K1gMdOIKxre!QMySnB!5`A63>-xy&f3iP$2=$&ED3M77&kV`nAaYU!MNeDbRAl2c6N50Ro~RO zH}FFBuibOsy#RD~cX?4@#|>SFgnP7#~3g9?5kW+x4TxKMN@*8|>o^p{ z0+A*5DXmdbp&}FTgQ!Svp}j2s97O>_Y6@X5#es|wAF}Fw25^$}`CZ7sK8I}=xj+~e zQHjvBw`>w9aEOSI$^kbrme0!cmbFF2gkvUK;!cw9-SG$XKp!7G`c#r}hoY|xj$vlh z2%?aimaVhsl_*VyR{3r0nzET6NajN;b?XplAJyH5Fr#R?b@WIvWy-|FpKko~GavcL zhsN}D_tMqVEnTH46bjVWH!x(#klerPti1Ei+x1yzowMeSJ8qkVKntw|yVj^MAc%Z|s6Y@ENr@r}Cxm3kq=u0QM<7u27a|t6_we-Q zc7C^b87;8{M~xrF5o3olwziq9h~df5Cfl-1 z4%Sq}xn56+au9A-l>{iQj9RHSek4(qw!iC0o>{qpj-I~qsIDGl;`4S;fYR8Ju1HAR z`DHKWku+01?<4?k_v#zyOTPcS^T+(<)>~J0baq(kDS}}w=)ESx_>t&g4JPZdH`9zC zg^=^n^^Ot8QJ|s#w(TSnhJ5LF*BaQpxrv4YXL97M$y_jJDo2eSPra<8AYzpa&(5qX zt%wNFen3HoWg{Hnnvpn9B&kUx`0Fccx#!tej7+d2%dUH_Fidw7+yssd6k3_U6k3u} zXvJ^H!>~3(yN=dqDTukS zw7Z9CLz);`pT_q?T-Pk&qHo;c2Kw{t=;&tY$_=dAu#MF#H?eBv1_~X0P_S%PX#!PX zVcH(0=m{fMM9R1-CR~WeNDOag#;gfUoic{GGbXV2tjP>%sG&Ay^a!FTo7eQnO|>koMJjCX=w-&JDX%5cDUFcYa#bZ- z3JN~tLxnE(Q0o;5DWH|{r*Nf%mJo#ngosd9Mp-&Blu0v@N}9QQgf)WFxCpe;WiqJ> zLK~npnPMMtH-#f(NNq%}9Gd_UnJq4)(G}1_nh{c^NyTHlv|%m3o%aNLPM^dP(5OE;MU zMwR5njiv(vTsKDCOB-$@M*PUQIOZt$IfAf=)**2ZjvhCR6DAHPQ-o*R+IVdJR&HCh zfpK*;95Hq{bA~n3l&U4^qzF{OR>rPTUbIQQDWI(jp_WzXOlj;-50a$*I~%QPGQgTS zA&kG90Hq_NP#D6ai`Nq{ zu&tw;TrN+L_o;12Gkg3PZh86@(@%CyhUf}K%yICvG5zt-HijCp8|9e8I6@eY5dp=Z z$ngj5#qTfrI6~B*bY$&(H7G^iFM?9E)WnE64!JPIQHl_ZAP@?q!t*>lN76HprK79B z@@<{8CgME$>Poh4>tyrR?X+)dr(X`AKj=gYx~{| zx51AJ^k&-(G0<`X$~@fN>DQNYc7<>pY7$NK6*}mP6z>`{f-%jFZ0;Q}B2prxA`tQq z5`(mcR2;hA=rF0)+Lb2gxGrM)SoF)w0rboB=b!tfFMRQ5KfdPbr+0mXhQ``NS9iA& zt5KSK(I?Z{O%N1;0LR+x3Jb%Ro>vO!$PDnQpZ%8hY%d8JqcQ1`PNngZF15)diFk~L zgvXHjI?{<4$(TodB97}>yWyBiGU?(72Uj|VaOr^KNE~T|SE49F3yq2(LV?OrC}t4C zK{_!U$HmiWgyWRQ6Qs3gHU2@;$N@)+AKY;-K_TzJYMgh3tk@doq0RAf~_b$QfNm6RMycG*Zg5yO*^ za+1`5mTA?P=G3h#HdUF)UjAhq|@nl5`edIop8bleDfQohn9$Yiz6jwhhborrsD{vkAv~8 zh>0VhrQWn?OFejW*=K7GKxoH1=WBkP)Rg-fUexk#Zz zgrg)!N2f_SfB0g@9mFJBv28v*_VxxUJzXnnw-c=+lni!|ywh>0^eG?avwk7mQxFBTX;f zjIJvS?Hk^L<+J05S$eZ=G}W~tl!X+nliX|Hi7uOkpdpp0C+qhSL`Bk`;Mj4axqjiY zav!@=9lnk6z(EEo!XyACfdKJFzf(b-@FVnyW*FKCJ9~sibNd~)-3hc@bkRjzd+oL5 zU)^KYtSeWqTze*{afBgJt^l4xzEGefb*r@5@Y>Er83P>6D{I#=Z~Z!o$t0)&ll*B7 zg@_^bX2!>mWSr*O8tURP>XJzs zYEvXUhvvE(8d7m;V=v5Du;G=|(PZ5_io~kv5K|)udHzAIU^URvHJo@5`%$+@h zQ}&udwh$mJ`PCPinwZCf>$kC_tphx_WV&DowKCX!^)CcEQV3s}c9|ALI>gTyeSZxk z5^-kFoSB-xV8MS(@CUg3vTp&fWZ|L@=d<}liSu;m`%mQa=N*fP>PRK(jnuNPs-{bD zyNGOita{2vTkR@AM1-RRS~$2~f>#c8OoSMMYMZ}MtwZRNoSALPt4 z&%EQFd+#~f_rq9;!l%ACu0_F5rfXz!DKLv?j11S`bFX%TzK$)eD#pS z8Il@;9~t6{ud5+Zjg~ozD$DW>o4E1Om$>8kC3J1w3fnu;-C5`!u!Ozp#bZ{2dVVRS zTu9gB3~wYgriDbp!OtO)f$V+MuP!cOQI~U;p8L^4mL5z5USE0huBtU%ir1N?BKRP_)w|;|V5Bo-A5N zwdRHoAO5S_+S-S%yY9M20MEQ0Vfh7>_i^?)=hU<`HGgR1=FQ((zjkeM{l;|!LBt@| zj)I`Om$vR+{=9fCcU*rrU;6q-_~-{u!bOnJ7x92d2jw|n$B||{4T-j7MJ)wdI~2oS zy8EHIZZtxbByV0DY0GDy(nu+AiBS`4q^Gb0l;Gg8!}!aJRpf%G0{siUd)WBRoDEgW zL&RffDa-xA-R4-L`WBcmDwHxl7CUQhWzYjKRer=N{aA%N;ub zBUk4~kjq1Tieea1n$VXzLgAR?vvfP8%QNdYP#jv1tgk^uMmvHiBIU-p@BPQn=p`ul z0UC!*U0p11?_@=LH!IruSk>9XKqd#-9Q5@DeGejxz*WZf8X?h2q8-g0&%eMxp~#m`ImlG6$`EhS3WpFs za`?@{74}Njjp+S?Zd0DEa2T|oiX$eH{Nv7z4zXCW)v!2 zCULhk!Jd<#br@pIP_*Yk6jlyQX_=o&R0T78V|^c2Yi5od%C`?ch*PHQMOHcZVPF@F zgOq0JNU7+~ck$HXh1@)EKKDKIGHl%mJ$;Cdf%0fvH5*h2i7N%T0_BH9g(4J+sO~KO zmhE)E45@L$b<2!#!fQwYk+C1AN^eDIv_0$!L4@z;87TJRiUu=xD-BepG)Up$s(^-A z%#g8U6>nBTOgb!S@8*BzJ;joFufmG;h&5ZPgP7Gl6L_viJQgF9%`Qo#l5+awsbboU zY0GcA>E?3)^2Gv6mM&q*(uz&#*S_{OuDId~UzOBks)Rx9zjXsYwqNDzLm&FkuU~lK zg@aeDSfS&|#JIrs(<)Mc(D@ym;=7-{lDq!&S1!KnBOI{*9HgreMPbt&Gs|BhHcD$U zQ##N!9>rjQp3Dv!(j!cV+M0hApo|zE}H|noyt>d> zy{1!XnayQ2DiU<`Lu(721ASzpqDh>rbaGj#P(kEJEZ(*aJP#E{NbR9?2!6;VN9@gn z+FH7b1yTtk;4)|IF!q};f|%pd9|aVA#r8~rWgT6t=^9{lPahk4`smN(DHcO=VTjhy z;(3g%t)a$|G`I;+KE~`3U^cx=a#*SWgQ#o~?I7s) zi_n`b_jHvX^qqV5*&Dxd@mKlbmH!zCz#envvUt&}OrJ9KmHDr{Y&zR9j}ty|28T=? zPtqL%QHYQVr(}H$yLH_xnfp{<=ChBiny6#YBXqgnuC3gzD`K?NjVGJ$W+2x|NRdEj z{3s+2yl3VZ&Y3ZeXSeL&cS~1u^RjguKWQ|Fj2X$$M9k>+D_vzuq$??iO~CD}l1-|$ zwGS7AOrxqToke-R31TsiMXNXP{EAJuo@UN-&U#z@fY%ln8iDY`GAPj2zH{N{ zF8X}-^Iy2=odjTa*A+kb9$)*POL+B_1srhTA)or|0}p?ytE+2f>C@Hm1dJNOhy!M^ zV@N$T)fgtd3U?{9s{DPW^u0z5<$ZH!asJFXwA3__2{ho_1JN*Bwe|@00JlB; zG{3t0VHPY{0bAOQzIQG+sLKNg*Yg-QbQrl@?zaP(OvkXMCgIg2Y1`J8k0;_^lTsvx zv<%A+^bb53^W0hyaZKCei>aGEN)MURYKC1bvC!2H0Sd=4V^xW`!!K@mkjbNlbHJ>< zNy=JO2{{njm}5vmQ_6@2x#c-}hg=l$tCtq@i}}kKSi1$bb->y!r5CP1%Va7kh7M`j zvT5_?-?z37kIk90*T6mZ-1EIcF3+or7V_$%g`9TUY2u!H?%C~*xZ;W{UjKgX=HI^i z-S6_7-~5IfZn)v&rN2AshC`)*GJ-JV!11k|Gi@CGzNRKV#8^Q)5n&io^aB(D4&X@5 z_!^IC^{seQJn||c>xc9deKz+Eur*s?V{euXJ$8-HmMC(#E!)9wrVOYNUMaL0c0`^6N+Lq`R-1j~;g>#$QPi+LoA|{^qXLn;3`! z%9`Kh_+~3wZ4)ysEB{_7O?~Kczdv6n!a$}J81&59v(t+fE&7iM{s4;?y~^JE?050} z1uvPYO<>4DbNK8zN8^YZq>R~sY4%RpH)A*Lv62n5*hO+r3&$emdQjzEBHWf$N28FM zL<2FIpfk7GxG~!M(^Cv_5gasn1P6^7&a(Dy9@(&!E1!Lt(RH;PIc@}Vhqd4d#XzWR za#|YUvzj7hUyn-ct+*2F!L1F;8;YbsTWeg0|D87Mc>V22FkZk*Qa3eSdKaQa4viQ$vnNi zlkYzHEZIyRJc)2)gWFarFoU~c1fF8Q(PR10+}WHoc^b_%jY#c~@h#krBt+wsJ>wNR z^qIeU9SiP$8alcVK~!cB+u$$8Pnbx|b3eXi+t#I1r%o?E`sm*l2_d4b?QPI*UdFhI zRK!!mz3Rh?tb@7|8O)N1o%^tvgV?ImFgZ^zsd5^8A=F zV`L_iIm>aJ9furxP{*blH?Q5eaSIzaZlSiemWwaGm~VXJ8vwjs@P9j3=`jJm^PS7N z^wP_C@WK0U18)1$SH3*->Z`9DHFVgR|J}M}+kRR_S_Of)_vXLx)T1wP$T>%I(P!Vs z?9oHW=JOP74_he*fkIiSVRM7b!8VZZB<0kAmn7-9xH3Yi3_CM@ENt7(s_sr!b@b6z z2vjanUNYZiyvL0tLew(Hr83{v1&lHof@L^9KWi5`YIDdhp{yh>uAGI-5gx z_0f^(Ctt{usHq1XmPf0E(nwd*lN%rx1$b_ZKm};wP?w1F#eGa39-&Fc8i+Xw6J(Wf z4pd4J=sYS42_m0jYjd9cC_=z z`i*q^K3Y1o4P;oiqm609M-mVq5O|);ww`W&^5DZ9Hg`I6#}6Z~!V;!K67A;!zA9HX|ojO&lTD3~A zT(RtmatFGhmXCk(3??+zp+w4R_9=^0>Ni}*yA4!TDx16hd-WenpQqLu&x=!^8b)_! zYZcMZ$OLD7b3dmv*E6}Po*uuzt2?^6aq%ktB-ZernUgqt)Clq_Am=M%G^S0zJ`#4y z%Q5{UZ9Px47K2H&RNN=Ejz}e9ytHmB55KY&ClRljxDmUwaNpwgE=h%yTcGx3*hwkD z+n+D^esD!YYy@(xjVG_`Wtd zsL*&$XcluMh)F?5S1*20M7y?lr!wjyG>opVB^8U)k;}8Nql5R|{RpeOdqKFcemi>g zMr1aJ0-a1Gg)3thc6WE*32@_$H*?%^$MEpOj{q<*Ffb@k|NnJedTB)<<)SZqiOVm) zY$vdDU|{q908Py;y1T0b5W2UcU;OodZ|C91UgU$HJ&(_xdIT*EH4NnQ$dXUEHm+re z$d2xroIbDmsaGM3+PCt=rY+pJW)lnBJCLqRjq5P7F3#k-1}2XhY2=d;Z0pZ**;6m$ z;1W4b6~t%x0B^YipsKkQCeXW1S!&sgsw#t2HP^u6_0XS1?=ux*Npu*1)aDS3BqEl8 zkwek_8$oMYT84aQ^r+Df&7VJi0l?=zcM(De4nFW8o_+o~^Wrz|Aehj~j{Y8+>za_- zCz1|Qo5qSOB<ZaJ zOHmkzIWALN`PZ9K{r#MK=v-=J4mqoNptQz~AmzsR>*`hP?9Ui9`{L0HP_tzpLB4qTD3~gm@(sp<;#}?jzDT!4%w6U9=bOfKcqe# zLmRm=9KD;U{g3e8s<=z0SXY*8XXK!hUOfq~o4lV#N~g+S!jN~P2&9f^@DjXh+(=HC zG>WIUbnx>9EBNE0ReW~8SP#^)Ko# z{N(3{KJvE*R(ExER>r)&7|ygY9B}+0eE*|ovd_3yIx{(>j1%H8sv*u#k9`-H9GYY6 zK!%P&k*psuDqYX;bR&}*n{nK@F}*2hN{P{1wy#M|Oh!tY9l%}WP;s}ke&4i=Wf-q9l*Vf=UG3%3V`rRc! z6e$^9Q%hYW;Lu}lJ-r8A~FLhk!SL-*f{ngmf@)-}~P8xa5*c=6NapYKnhh>JIqCj4gDEjS-y@(x3rTj6se6TICRW#zOesHCe$}GrlE!UWF3fD zc>@Q<0s8&zM3Lmq)th*=eJA-KvcQXc>*vFu!c&*YlDLkAogEW0r4eFM(t*|{#QJUM zCtgL&oB$(R%8Ggjlf*Kr1=eo`Kca0%8;N*g7O()|r$4=xLk>PfJoD@`!t-J}2m(z< zk5JpYS-5QzdyF1SUe*ER=9#Z0X*?4Uas^l!@awYSws)sw5l}A*72#M6X}u_e^;ZQ zP!pq2^zcd}tipiYMqWcB{)t8Dt|UAoD{Y9$F*ive$XbU;Sxy4V#hlr$!tQ?o=zkZjBIUX{n~Z!Bme+k`N|jh;SaCo)Dur1 z{_~&z>My{NU0t2#mT1s*DOwKOi%(r}1|K|fU(#`pj{YpkL>+0Tflx>s9Z}RUG~K}H zTB~R#je=C96$Kp<`uQ?6sI6>(Lf|OZazw2?szJtxbV$sTBxMRn@$q+`#M6Jglb|Og zhywQ9`+$$^x8MG+{`_Y@c}wFQci(+C7hQDG0r%W>*E1V7ZPI{Dji{&f@F@sSaQy5x zYFx$d=eH0l$L7WkLJE}7Oq(#8WUR&tcG#>}3;UWCW9#Y}(U9WR?Hy+Er(&>eCv4q` zUbEFI38F@i9wRqz-gJ==q8$AH)2>S{xupF4^Uptj_ORijPH-Ik!1it1OqB2FX5fV- zT-BH3_9y3a#<2%-{t0$pck%!o_?4z+61UTfr=oNLbMJ?Z`cZ;9Vu@Be*e`ke1)s7`616d`;4ACb*k*? z>A895&YkZOK)7xT_s(C)*?aAWBvx*b8sQ)l5LBs;s}x^9cu&UG*3n-qfV9HU+CvD5 z)VfT^Dr+rBY5L2mBrq zB;=U!tsK-koaeW;asS#aAmE6xBbYm^kx)te$V{^6YU7Bi$qu0%D}(M3g%LMDyO?a? z8!@Zu#IQ;s@a-i8rHv#ja^XQ(B8}=~A}J<~8Rz_`Cjjza@g)20x4-z|53lC3%Pu|o zp+_EAykyCeBcsTs{sQ#4ksSZ2^SJxki}~bn2b&Q&6=P(>IGWSLNhDI#$Kxauangwd zo{Uk@ih&@cFYw9vMe>1f#d7Q$vkR`&`>XJ*m1UMjxUNfE?+(tm?E9Sa{cm&Soqr+L zkYMNmbIY%N)24Nw{Of&py(O!-x;o<%@`peC>CBB=Haj4MoAMa3|5&mJ4jkXf9>cRt zXelsfR4)UeQOHt2G4vVMRL?=PX5fjWB{-Q%tYmJXwV*a0W1rSmBR%Q4(4T>Ay|830 zckYEY3!s1y;(u%NXG zT*|VF(q1j021La8hC0(;(&Fup2vyAn>rw?Or3s+wHQuIBmxg4byd}k^9q__(bZ4)T z1r`PlW!#AJkE~n2o@=i7@!?lp^TTRrSjA%QuWD=3rdib9$&*jN!b=<00 zGsa{_Kus-&9lkfi>T8h^;J6mODIM|38chuj;?*$zu48t8uLZDc;IAn5iCsQ=Va<3z zTLn>LoTe?u#;NQvZ7j{DP#ijT1RvjP3dc_v#r^9xbNMri*q+Hzn{aR}fm(}_Re9B8 z3X^b1saW6M!=nq=7*|xaE000H>3uAA{cK8pBT|-)v(Va9{}zsrj_jW{W5%lg^z-&# zf&jeq(u?}Q0}tMO`Q_gkJ?N89In?aCFJJh~*?i`tLy3xtq8~7%ww3;Dz;i3t(caz7 z&i*U~zrfgG!>ILQ3~z2?SaUt~skF@?tqiJ7#GLXZxM6}jLZP%{p$1#2NS7E9^OmmQ zv6~+zSi70qUB?`@O*Q40xU;>3<{`~*DN*Y0&(PRdcXT#8@D;6$Iz{uW5m29GN>hfT zr}dMI1Th?rnw;bL9We@inxv!1XA8XV_@f!sGKw&=D2Fz|s6-xftYg-x6UOkHmzN^^ z0KKIHmaVbYrA8Ao2!e^vJ^R#pfNQR~`oAIp=iR!tl~YPgF0#S33qI23># zJE10y8b6--4?fKkvnKNKxzj0x5rOgvwW+361fhtKXtIS4LS3Y#c04+=E_bECtc(S* z79p;*8YdGwuZ|#QCraLG*;IxkOLORUVM=R>TQWfrRkPOdI5Z?7o2iVP3}oPi zr7&$QOdJhLp=%S!;X_f|cLM0EfBw@a0CDVbC-Aq2A7tFv(QMqb*;BwK zIMtP5H9R~RDmF$*wTVVDg&k)9BCT_vWX|{zytH^Vw>|$nm!ESM&#hU<(hXa<{3FLx zpG?!2$=d9~Of)1t$uC~rNN;};5=K;}G!;-ftOb_rXJwBm6k(fnXN(H4W;#!)gX zDe4Kq_=Xz3dC*+uw{`H#1xuMddzma}z+pe7Gnh(t&T#-%Yh2;d<^<>GFT4>1oWh0>qe(~hK2D4>NT;WTp3v#)adQ_qvl7ub8! zWIph&gSqhJ<2Yu{EXIr&LRWte#bQt~jCdW`)o=T5jvF_@Fl&^Cb=#q*3t1FA z@bL5Wh5<#TQQAQ&V;rM|l@HPaAv_Aj9NAnqj&yd(=4};ZeeZ<@EJxJT40ig`|D>j& zeq(4_G}W6VVOPj{2@xQ#`X~6{%PfN0c8kC`UVgSH-IXjH?^aqh+-I^ zclMT#lBrXttv>wlBmeDcZs))MeE>Z7%=7H*?%ZeFjyBsBRJ6{S$ljAj8PAhQSV13Q zQN_>}NV?2a*A`VQ>2eA2)|a@}R#I3?OSveKaUs+JMSlRt@vO{+Nrpwq5mKqLT(2SX zmCkWdP7ccZQ3v!( z0N1giN4p>(uglrlC6h0$ar0@(N+MrE#stc6ue_Qn)q+F!n}QZ_z*x=5x>}TI!gZT*W6k)o zkpoA?adeS`XY9$B-}`Pn(TqkC35BCfzdF#qU3VG>k4Q_BuHX|>r@)%6uzIuUYnuJD zy{miY-Z$TN>o)$2uhULBo!{K>>qqz9f1i_wve-g+OvcP4y-OV|Bs1inv|JvD$T`92N$<28D3eI0)aC~z4Pr= z{?!}+v&W38pkScTNf;F>37H+!-F4|yw;`&Lqsr?t((aL?C=`8)QN%G5T6zDB3H0Y9 z9@?;lm0i6!NIYrA4ILry;x5wcrKmNI~vFU(Ry2i|J6av=&^(j91xhr{P!wwR0 zhitKr{!EVTJsm9DwwbM+JJ{Z}leJs7bMFf;^3!|n=I8f5!165{iL`oSMr+l4sDXTK zuSrN-MTd;3Z(zAf5o&!qt1Qzd4Fze>)bGO=#c;B_|HA} z-OXV~9>Hz5-1@hn!-q|DU00R@8p}44Q9choy@)UhEz{V_Gvn9;%CK{#kQBorL6k?9 z$B0BFKpCjW_|vP1#*}MBdz5}_KH;xlNBrGfLTC-C1R|9z=PgsGPP_K#qmM2L*lUr^ z!J@UWcs-)A&IUQyuztPPS|{u&-(7mlQ%*T+HYK*+#vLqQvWClUxsAA+v)h6XUbPWFpTY0yF|x)$GMQxfuwga-&OLC(S!dGL*2dVeW6!?!$JgA42rq7HYb&Qa z$DDgCpFHgl@_uA0Q6b6rUG!u(lk!VlSC| zcR4VYrkG0o+3J0_D+giMe^c6c0SGLLtDz7;Di-7LF~d1_Y%2r#kiV|mOrKxC5m1}( zcx>S+?wY@fR3c^&Et?SOx0uXVB*pCx*4mbcikNheQdaD}wW@OaRMgd`|0~Yee@P4A z{`>DY#FbSmUrfYfC&XegQ<{g0wf8^Gdp`eto?o$%bVBjvb53S>(-7`>>P7zdfk(LR zzK8kwUH7wc%NFKLp1?H8s5M-uuG z(}%?wQX9i_KDbEpY+X?Mm zJicT-9eo344%xBpVj7eVO@=O%Rf)vRq=VVGRn>XvAX3&vDkdG%zOS+o{>PJmH_j!r z(ncqsxxV~&jZF>Sym|9tM;>|P5klIPtQB(W4)mrrD`)Cx>B`x&XU+H$Kxe)$_~g>7 zJ^^sePp;^^-~%80Ga$(1Ve58&_4us_HETpR0a<4q=L z>&o1-5LPwr?|d-TT!0evE5NiMEX14i>J5)jg&+iV=>$`Tw}6I$fehn^*E4!}9ZD;d za4fk^lW-lL*wW6c?VSkeS}3~Y{AUlhl5T;r6Bzjbdh_N+Wb#IUsT2-3v>El!{(&-# z+cIn@`yPDIzXkqJ*BT%ByY9GC9Ch@&)TT|FZtLyqOIjRX#A{Q0@*5ZM)$d$L7%B?I zES@J2PK45e{z511{cGqL*hn$VTU11r1HIDLPD@JOY7d}1%BN+e*pe>!pr8KSc01~7 z-5a&o&A9z*rw4XT2!t?_--f8GP*M@;5KTyg#8(lXD>-0HGlz~E$-*7oWI{!@P~^J% zo;MRKQkYf+5*-C^V+69~+~QQB0j2|x^kNk>fY5M-3Vs=5*>j)0^g9W_E>}ZC1Kr)- z54myglb#c^1%amP(fOSD;Y+yw;iu^JJ2-0gbS^vZe7^mG_j2V0@8@Tq{R|hM^BxYF zF#{=~5EPB`xES2q*%i`KC2I)jP*8nz4s4+(*N$+CxSl{pF7KK(n?v4veED|wcK6Ua zeB|!|-t+GF4tl)%?!Wi%_v+4j&#k2e9&4&2){w-}l6@zp@!S|vct|OUIWDerQPM?v zNgCsVd?8DyLL@F)YX*w#B;6XMlQ0&?!XaDeAW#J}j3q!T!LSiS%gq(h z15!vFT$DDF*n3WB#Ssc21$#{#MSUWH621klWw{#r^{cB5iOW`ILYV1}GI^`o=}l?e z?kv(b$u--%26u(EhLsyFkH#kQ8#n#vzB})F?C9f<`_84Y#*QB|Ry{WF(Grv? zv~U@<=R|&ZmOoBT+%j>VPR)KPj2aCd3!IN*&IcMIbWhaItJF!Hn5glv72I4 z1R-!liT@qhX^d)!zQTRcy3zsHdY9y`RA>oF5M}A@-%2Dxi@rt{fvb-EdN+T5ZPG{; z2S93pR05$uO3$9_sx0W_`%o8?96h0xI@jZ_=a;f%QyWRoG3&%CYD($8WdxwSmQ__- zPibPVN6fX4S9(j4vI&4j2*LvnJn))#5`bN<-rio4=@hwv>@QR4kTqFDubp zixw`Unq0;Y_l)+x3o!>A$9^v*Qn=^|)Jwzw0J#A9`4v`Ppv#UA`1JJ?6Y zftIF*^7C(R-@*UI>#|F~$zzW_xpnmDv0q80)8-WE&%(|gZhHJB{7_-ywnE|903F z4SK?)i7b9~(Y%j+_2%Fk=6+9 z5a@_VMAXJT?pn2prQ6yOp5-%0U4C691DVnRt))XO>l5oM7=L)*H_o1e%271=B6Rf` zo{b}EX&I6NnD@}b|FU)doy)%sz_6ji_I7a>Z`izvvUou{$$sxYhF|~ra?XC&!RSJa zp|wMqJA5R24{v66a~+-|S>4mm-_~#Et~Hxj(B4fDDv~lJU)V<1z$Usg+sFp}C;<}J zCS`{EVeX^t$0Mu=ncYjmjL_=pP%0o$MS2Fd6H-KKugvQ(rb87c)7@9tmE@wjWmFpT z)WQk~+1Dt9V+4(~B^?5Rf_xa!Gmz(xkH2cW4+dlw*7M=*j`~xzo=TDi^~rbz`OuMJ z{ulhR3ZPOty8N5pe&9nNx!|1yVAm_3%~4lZM_*sxtt~@Z_8U2JWTk1hqm$dN`XeWP z`f_f5?s3vF2iK8AmOxT6Rx6GCm9(zQOwB41iPj(^X-EHz=XIbJFF(JSAAkRMy!T62 zaOA~T@VVdrmbfQ*-$%}XxK}RuuKV@>UJ7vh@yEZV_t(B-M_77{L}Q9V0JFy@@m!Fu z!1W@e7vaVN97iKv7e^=@VHn81%91PYBnW&`u?8cwqBX@ZLm}ux32iJ=waJcS5wx~8 zm!H3{x1ayZ*K^N3`zIBIi*yNo>+EIqn$0}Dd@adj!hS9`o|ndS?D!8_RqR69g~hIo zn2ib7Rh9bN&H+k&XlqubB5P13EQ~E)JAS1##680U0D>T(SS4mz0UF8eV@UwO$_o|lCmZXc4;0;G@vCXMDJ zUw#i4p0E!;xbt43&_yW72RDl%rCM3F)Z)6#K;WT5EtqXkQiu7VVUU92sk&>R4!M=PU<+MPKA3k!|v?gKL&qnjF= z#c8LV_DS?0L3!fw6o(ylWcaUK+u#1q_qg=3Z*ta|XH96|**-rE!n!h3`$}Kys;1sr{RcTed zBY)+I6{iD)0egtmK1Uj^jJE6BWdhpg*0HF z)B-0{K&{?F=JENg{M}t#ckwmsd)gOy^yTF+b3$bdEAXeDeDcY^dg!5tIQWpm{_cCa z=%R}T#S7uO$aDfB1+zyxL|WiD3gP;A@et{TI5CBABOJ%Ww;Bj}KTAH!l8n{i${0#% zv<}G@x{a5*c8#KzRHjh#GzDK(g&oEJ_3M+L{?yH-xlYlOf$ki)KKUx1&_ay+fcvQF=JFhYprL`-ecnn&ppd0fBW+pYqxFvQg@*b_MRy? za4vf4SdM%DiG2S9Cvm~ybLq--a@+jps7t$a^=IuYx0#O7Dnbi~f}g<;vj}P2105tX zDs?$cGgOGsPSt=Ld1wJCFTwhbogDbJOZn7wzo1YE$%TS7tJm`VKiV?=-1#to9bM(SK4t3U^)q zX*AW2C6%b5HId@1>ErmH17|V2xq;s;TEnLvdYao;ZKe=LAPV$nx6skEn!emNqA0?X zMrcP^E9J;~vYWLbDhf~Yq@`ObjSRK~t&!q(Bx!#LhmVmzT2RmWN^eb~BeMp^(or z@6pG{ed^Pnt9$mDr~dAHx%S#?O)pt`9ta%IA#{?o)H@7Gn_Ss(0z9{f<96e@8HD5G z$Rg4aWQrlVLSR{?f_N-#d<#UxKz=77k+Fp(0wM8a49Agt@u#=&*Wcb*x|te{_kTI~ zf8YZj;F@c$xpL&l;pVVb5%l)+$o!RTZtubIq~&m_K?FZdwTr4Rc(>C zVHdh98lY6!TmB6T4yC{nzyQ5=?YbZC`g33W(pQ)`aZLL_Z{M5=lP2ER)Z7dpmMmG! z)jzy);(ZHWI(y^xZNnJIX?il~Nh3+^Go7!TeI)()A~8pD#ruxqrw`rBvuidGYBS+1 zg+l8PDI|f))6u_y_WqT$^{k~Qvz1J-lcLI_bYN>giKAut(2t}dAw8a3y_y5Rd?{_6 zoxJdqYgqil@3H3UEBMuyKh4z1lUeZ60xtN)Z*ZhbAu13kza&b`Ba7G3*V)H0`%mSt zY2(QhO<&ch|0~*ZIc{FE9__jYnk|LwU0oaPNLnfvQZrCQxmJ%pmxrA_2+&eWUU=b! zi*CI8&S2}trC*vech5~ixB}3Lq@mW{efORJzpv>D6DHvMKJi3+;x#}1Q5#5wM(B79 z=1%3@51+lMSZN6xO7cW)Rmi6Em5g$+NOmpL&7}+83qakdmsx` zN%W+2`t}YOqLvaU(2f+x-geuqGvDm{`N35`I3$sXHG?r1DhNqK+98=Jc}7JzB0xA< zq|75xmV6b_lT&o{X06PnCJ0TxGE?Xz)CHsNr8N!?(ouv$anZGZ=Em>*+Ax|0%7i@L z_kTG7_~Re{2*5u3>~le>ZBAPkes6{cUs*{!=2pS`s(knuq)xx4uV0-sTCAJ_zkm*c zvf#%*cG=evD0CF={?SV4sI;#yohrw&l`B`i=Etx8@ej*^W6hd1ryg|hf$xsTGT5DXOHyiNq%d2o}Q+)BH zL&+2Z+sCzDVN&w9wcAlbx@+LCpo5N5H1`%Pbr5tELT4}dJ{m-Gb8~p&2`2^s zPd)W=F;d~)we>Zd0dd5kM`Zt1YkK|q^-P*LX{PJAFAHlDPCN!vM)Sc7PU5>CJdU_i zOUh|NsR(7#m#RRk%LNfYpaW0}*NIV^8p4p8F{Bc$C>og7+`{Mfox(Q{n$4a=n|Wx% zX1?&)e6D+CHSGgA60%69xQ))f4fGY;iGpH9^0p)%gd|hwW+2yQ$NZ`nv3`R9UtR6% z*GULoyFYhr3kU>SM7RhNagXaCdWpsBw^Ngh4T9|dVG57s1_`ARE;Odn<_xx`M@B?U znU~*R_Kx6P?>hR_cM^a%d42DD-veOg^jW;J@Z}%vx##}ri4!M2XQ`xG2!U$v;-x>{ z&*#qn90yd*ZK6VyN8nydOR8(sS zBC^>Gb+xt6?7i2%u{ZNx{6Zli?XFagq!9C{OL-s_N(m$}0__k*X;hR#Yh_5xO0lV< zz|OwD@@6W888XFA{3vf=S&SOHB1FnK7ysf`?zs9-h=D8u*T@E-j{|P}zup2k=9pu+ z_uhN|(Ad;$J}lpdo*o`wypA9r8fZ`mYx`Q3fQrdoKN zpAl4zVkHx0B49^H#~TI?fWO{*->s*da>|Q!sT#J#)a0&L7Hc+l2qFo+z0f~^pAA4o zjBl=?C2dAZht<~;<~6k`kB)qSSGRZa!uD>S+q#oi+j>~u)5p@zZu)&i+D(#hTpU;7 zhydTu(4E^xd;cbO^sQ!RW(|d6Cl~+uCN^%`!3`H(#N2U{7%1k6B8b9}Y|&@j&=!9C zsSh)xbp$`Y`(Acrx^WyqI^pu*%PVQy)WQ1>-;=2$8YqUooi;b!>0A_X_sWe#O7Oa} z?xOOMH}@Awlvw{70^f(7J>}22ySw+k2OfOjA%F>!CbD$V(yspA-myq{@ZksN{HxaU zr#^FGL-Wuf_hqx$dK+P2(r8Y5_c46^yrWT}CKYQzJBIk?Y9sGs)EG;7P=po{5aB6< z92yC6bIiw_Bn>q~sZWh29UsGx+6E3C-NM%o-kVDg+LO*~p7Za1nomFcJR1ixq~n@G zzJreb)pY%T?7elI9o7BE{XS=AuC06ALxKcLaCf)T(n19))ZGOsv{a~jDW#>f6l;qV zw-8(+5aO?IVNhDTD(SR^gEk z2Itjatkyd`lpWjuVuwGgP6otIg7EOMK#bXOJm#+1%%5k^rzYvyf=&MA^^U z)|-_+MNpeg@ZG=M&COR|4+B{=4q5~P_!#iue|zx1?EasKLq2~h00$p*;6LIMV{1Qa z)^28V|A4`XM5qyqE|yZFR7j`-i%vFp5=TlLX>cS$YowH9i$y2}R=h{Q@h*TKo>dwJ zy0S&cSENNMXlI6Zq7p7RR;xb!o$-ETGBN%B^;0;W9l>P(cH+aQSBT$x{bp|wa}6FP)bt{VBVIk z+`M!dcdyvM3!4X6w7rLcVxFXQkWPpa0iILh#wQ-*&WGmk&XW${km@wM~aw2qFH@ zjoh#Pfl-OO@h>-xdhVHLCt9Zn!MIWEf5L%WanUJ+VVO*_g_KNLPP=2UELNIXI@*dj zxpwR!37ycI|H!C0V8$p4q)1TXHPBHrg_edXB)kmc>+AUbaR+eIJC4GYg41t)kS{zu zmrc1MxRPR!rK^7(Jwxjl%5PyH*J*;F2ym2fgb2Za1*;sFD*!-Q^%ViO#jvm8*nkSC zn<`Lu%(@dAM?2)pd4740idTIb`9e_pGT4RXR8h~H^`d4p>^VI$S+Xby$xstDb`D?uQ!uKoyQU@M%&<{7PU;lw^+qO2v zBcNPCY`OO-E`RVTez50m9Cz%YoP6w29I)3OjBRVCxu(`Sdl}7gl%anGIwUB0oVEX< z?0fwresIIzx$##wF}Qqv)r<;~$s|V|ee}?pRjY4WxoTx%%;>S3SFTvG(~|J!n{U4S zsH2X0Y0jKEw|(+spIQiP2SyMoC0>DeofbwU`4=h5TgSq`88? zph_i?X^Wv-xsF4^_4xKp_wdWBu7SP*>+==r@#7}WUcY|rZ~5O?bwKg`7hY8UlE)J#{+ukAr;sYZAS2utzHed}9Sap|QM z+vHRtNwHiakx0CA)tc2e=W{uQC#6m&A(^CR`Xr`I8^@(@KaQ!R+c@)z>sY^izzAY$ zjt(2(+I z%Ov>D?T^vc-ol4Zm_>KChdGN@vAM6niTmuvgdY+JCdA5SLm5>|57=_d{Kloo|0Ny?1pVLIT=zl z6Y;|mgQaf9WE_5S!hw8X->Lj|!7?tqV-EX|XySqyQ`x_x6-}O={2)>|)^JFpr9x;I zDU@MoX`7shYFeM#NkeUCEu899SXS9)i^_<>zTZ?b!Ho|sh?~7k);-pE%&70pk3hd7RA1~_3 zr=E;|zj^cK2QRwdJ&!*>f9`$z?Yqx;Teo&a%IX>=M0r~e%b$Ibd+vRhdmea%2VR)R zyp0>^EfjGx9;rlvhGZQHH%-z_kaQgslBQHWCmpaKGmo6X=3;?$i`E*?bp$~W(6x1I zkZ=>%3=9rjal-M(FIc>I@lLHBOQq5;dwP04o=hg)VzD?I_y{lp*MW{!CXY{Z-~@+q z80{(t6^1x6MPuu91Om@X;s}WpW{*iBEGtP_>0(JT>GH$79_B|^Tm$R3VhuFZ{xc7d z=f3T%Q=WL@iJt#~>Ypo5{#=4L*K*0*kL8Bh3%G0cJUZH%dD{WIQ}P3n35Orw{R~~* zgS_YX{TSO^PpDLE%A&OaL;5Nt<<;Z4wFpt9EuCOYeGQYE>Y3PBM^h?+@FahJViC{I zT~6!RHul(U96$Km9R76w^IUw=EcO`RLcUa>>}Nsb>B?^7lfSu{OpU{5PdkLoeL22- z-F>7}39h>EBdM;o8m6H;4e;(%2mQ`kG&V=@TFOBrnW;KEAh)Jo@OcU;i&xAzx&V8N2^x?V5G7 z03kdN_MF65KXy8&&DxV}Ax~Ypo!V5B2}Y5vxu~?biD_p`pN4B{Bd2fB;EEK~%GQ`g&_C&rt|UK0{l(*|=y0 z^B#JJd+)rT>umJrQ9FG!PrbAp z)n~eb<#IVOFgS498Q=nnoiM_N>Jl@wAa z?cBF!Ge3HE5gUdIY|iJb)UJB%Q*`IU!}tJ`j)NY^A-49K1H5wDRSw5tj3_I*)43f= zWdN?f?oW5!an~KOL|r~#q`j^2RV`)s{hidB+nZYtwxC^h0qS2c?a`R($*l11)K+89`He zG&RW<1cG9iCsYBhqp9;!jI2%a*V!+!d2JFY?yo#TH@?3Tw*~X9l`7Dn;w}j8W>u65eX9`)rWEnmZ&lPOR7Wu+` z&r^uHCql&C6k&r7ksWx!$5l|H6s|JGUCA%eH!xrfvr0aIxZvII{q_9$^B$-U{{L^T z<4!u6wX0Xr+ui?1tyKmPjA-H5w;#=w7oJKkS3*lcb7nM-@P^ILtDW=SaAT@Up)qQ+ z3ycVmgG<`2CFwPww4gSjIc8i3$4?r`<7>P4?vwLbKUCn5u^rSVprka8l4z-|BVULV zu64Q=RY84c(!bT!e>KQZR5}-0$B#Sie7PQdxgsC^`QI7H7ja$3IzAGA|C>nww2)K@ z92kYk#u{j>CFN_<+G2D=h0>a`QWQ!hbg^K}q-+wjdGn^rKk&heyB92&ziR~WpIHC6 z>(2Q1yY0Dm|BtW!{sLeGz=}I8a+heNzM4aq((Wv^Uh@j&3C=6cC-g){F;l^@^1`kx1wZFT8NCrArsB z1@d)u4Gawp@V@uGk3an351$c2d|GQQ2L=WziabFG`2yPqeX_*>tu$qfrAiel%2K&H8P;uyGrw?^Q=B2xApUEd^RCq>_Z8k9H(U*-RqYOs?3Alw0`i ziHGpj$LI3r`OCqJtb+w_N)gy{rj=CCH)Lf|9b?$yh!_y4g%zw(Dn5Ah4yWF;^PYV_ zumE86=&?+iFn*tP>(~Fv_xlYDDVgBJkG+FmUh-Z}yzF`&UAl&YcN@!RPdkJsUS7wH ziS7LK{iiXZqlJ7aq{f3kKRKWN!7PW&nnp)ml3dw3Vp`f$1gcFq8EO*shIS?$>NBIM zO^+a7?q#slM-XP|%lWL@)P?U#n$ij0x!XkEHgz0dYOdvrzrCG@7O&^PNuyY}zLQ7h zt|Xf;^8JsU!_m_w@WPr-{xN$lyX`)j4;?*|fqWUET!aomICzfa+W9N#EtQOPrk(w3 z5t@VF>dq5tD2Et0OojR>r66DSp>Gfda{$_L9P#_#|L$`aU;GiSz4n^_PxkF258TfQ zr<{8GoQEH73l-oxI8(>)jSEgBU-Svkq-2_eo3<@<9aqo8b@kuixVy@mA;QLJt#E8! z8lZ55q%kvsRHB~#d?(}T1lON^1b402z&9U%fk)SF;_@T+=eS9u5Uz&MxN#yplvV$W zD)*?0H{<-uD4?Rk`P!p-Gv2V*>o{no`OeJ`vZ-%?w3m#N=>Xr5Ne}~U^@d+Ku|?BXDDYz%s@v+2OaGl;t$td`<6LB-M7+V|KqE_AOHUBv(My? zJML-)c>B5MTyn=XZ7^A-*dzVdW6YSr`BqV31Am>-EOxwn36& zRRa=EPk^rssZO_?(3*>t+;n4zJ*;<3jZ5mVA8O`62&)vI6mu^h^=u@ANnW@)Pp z36ulM1u1Yv$WsfSV8Gp%gLj)izU&)iOJTIHeW|Gc|3Co0tx59o`pta!%3qUxei6d7 zXtkSgL(h>XELpx}HUHyl^5iM*>eXv07K`X|8A@gDp0}KHW=^9R`gRXkB}rV0xG%=&BOO&_S$W192~GM!GAG7e6{l=QY;G;PH&D-sw(F&9W^&i ze?dp>U2Rp)gfXv)Kcq5W8HsJAP{_Zdx3?!k8gStGC-I#xokwHFW9HNmJoM~RK78y< z(#Zrjf9X8iMe-;VeQFbur&ev@u4fj5(wsAE8p3foZll&~!Phxfb*(o*E+N>^)z7wUoL)Oe?WDil&uP=fanP6!e)Ga2 zzVh%395k|x&m261{YErX3<5M^MOQfv_7!%3aqLu;{5b9ssGZ{i1TnQy3rON{$1^YU z@PgIUCOtdr7Y2Zcr9nnQMQ=3v$0$QZSet@TO}49~2qKAOJ82R^7zJP*B6@~mW>H;T z-4iFCbmG>9FE4z{oS*Wodhp+IhcV_k^^}vi@upk8oy!$IP{`%qzVCiBPpYe{J5xBE zHFM^yzfYbtNz~TV#IArlL7wdJ0a3&M*6!$Xxx|tsOAjs-`kp-M$V2aYboLYR_w2s= z?&t6HQ#mw5I27{Y1|LB;${)g4gZSY9x%?mxFH4e1CJC&{l{L&n2~Axh!Mg2zy#K1} z=zi!0@I&hZgAhr1K)_&qPDaY(4QkL6it-}{+&7{Ns6Sv2zVr2W(~?S%E0#HV|LLsQ(9La6FD2!< zmg(S72z{FBQY_li&DU;tfWGcQ#*Odb%$d`T02LacvBBSTR8nr5x>Sqtnb$HFpAjO2 zFhEI2d-b%}k24C43CY@xy=)yA0HG*_0bf4nP=5cJxAWdJ59Pz}IGR&Vn8joL1LTzA z_UBe`$73(@zT@{})}+xUP)ksbImkUJxozoMw&aSHJFe_~6xv|6%08^_GLC;#<`+sE z!`ia%Q_dG*Q^gsxxvlN(|8MTm4_^GC`1gOj{sunw(T`j@dd#@Hip9dQk)>|U_z|3W z)IJ1(vZD=+BNIfv3emLIoMU>YW2e`{SJ{~ZpB4Bu>Y_%S#Hc^25C@0)bQ=yHgGHZO zPx95n_vPkuj|B(bcH4t||Ctw2Xwr^jEqrywq|K@o$|y_z$PU$_U35%g~a6lxMn1R9Y2MgAyXP z7*@WI?#;%pvTD_;JAU}XANIbL&QJHP9susW&&-A2{hs$Bgb1jj!X0?ff%iT4?6ax9 z-aehxISxJekj(Twc0a4HukQ=nws%b%?CWPJn>8(W5gQ1bV_zsbMvTQxfC>U?YwOEx zt!=jlVUW^VPpH0zxpU{l5jP%*Q7Y@*blJR zxRI266??`<5~~9RpHKht2G-s8n01*l!?FwB^X?=6`j;DDbkiQ&d%FMU6M*Y}_xsy` zuM5~$ham(Z+qd-4l`k?mQ)^m+7MUCh46j`K^yjwVH6%#LS`;CL@&Ho8#(^>e#ggq! zR_mAVylN0uH$6T_;uft1s%`71ii=eNHJ6GoR6upKAqcGTibYTd+6WOg_-D^!kCCnP4i#_(9K72IrcCPK`!_vAOGAct9=r!7Kg3J8-0}QU zzVyd?$QJ`}BwsxH2oed0LcVOSm%vu?#tWgLc8pP@jBU4_7;+Q6)lh}B)@EpFY-Dp^ zKN|)HcyVKaQ)e_#2ug$q4&Hq<$L=)|jYBCY^Q#4`IPZoBSUqmQTb@u0J<*^Te{I{57E(%4oos_LFyEBh}zx_zWEF_H#do8 z%N8&F;Kd)}x@&*`f4Vm>zv2?Excu8(ckS=_#jk%k{!iEc`JeOWzA)i;*Zw}Elyc%| zBoULQjA!zQRzl?)S!S^2Op?F`X(g1QzzL@!bYXZF;@!53 z6JrqUxhpKEBcjSmfmTM-BPA0Q3z|#*@(=^rES{G@MfAa8s=pN`*Ul28=#&-0jEsb3 zCK??B4Ze>q7R}xYE5Opo{#Zr#LxT!^gVD*Gu~NcIiuSfvZ&T-Hb|nD+AFLbya>FbB z>^HyuwGa4U+~ltK)|J_(pMB<9;B^gY)~sFks(*L>`R8-fO-7%+t)rcq+FDkxT4gf! zQO$@#i0<_u z**LE_@wnrc{`D_6K5@xqm+9b`tf~I14_YD29DCz7 zXlq1E$C{h$sAv`4V^zsF2eS*^^WEo=iShMz{);p+-t!41sFXtt7n+N`+OyWVpt< zc0zRMQj8 zzg6;)#PK1&I{4_kW8cwkdEy1o{i1Ud{2 zSW5`<#UgBp6J;@e{Dhk?`rrrpKl8~?{hw^aQ%^mWd+)uMyYIWl`Qm53F!Ic^P9OK; zf|s89)W<)$!_J8sOhVv!v`^|FlW+|Y#4+QRe6gQCEy$!=@SKE^UAAthaeH0r3JA^y zcljE@e`j5QVUJeqnB(f$APTLBq!$9M2}1bbjA`uK-o|I|dxGQtd^bNl{!mVyItCR6 zMow4@>n$MBG91=b(-EsdhjtVo(L!1yHy_&G>OcJGM?VS>2Y-O`&V9Qc(b4glI1dd1j{WF)Og&;h z^oA`2dCjBC8%R2e&hC)ASI^{&?>dj9Bhb<^a}|UL>e4Chcyb=U`qfRazSBG+A;joW zqc;o``i}&51^*pZDxI#R0e%Rj659sz2q}z6ime7CuCzuYg`^bb87OQgTN<#zUa_iw z$W#{6pvqsDmRJ?4zY?f`o-Cpi3|BuDX0AvgfyfsOrPK3lq7gS^ZTr!zU;gr!R{?zF zqaQz4D1%HuNDe=Gf0`Ro_<@ncmeQeE3^;Ap6pr3^3JAFCiI@4nPyfc>o_x`O4}Hb) z`%UB0cN|Sw3vd-$86AFvaZmJQg8Fp3(Mxy@JyoGhzzLM%W5*szrmhhLJg{Is|D3yk z)|$~Y*N&s3ZW`kn_hmxMG+tWY%ZGmXPX@dD*>BJB96fUi#XzBjV-)|jrq*+LYI85Q zE?#4(m=UN?RQ1;!5L^2Z`64(HJv0cLwT%o_{iDO`F8$?|+i-J+S~kgrs8>H?)ROgeYyy+01n+ zE6t4sJ-ad1!O#gk(3*rJ_{E*ia{q#rG}YChqH6u$U6ICs1^!Vk$L}pp=HsNkdP-r8 ziAq5L19`9pUwwUj&)jgs4SzcG%roCoXQ$j1K6buNJmI98(PPG5{=hx=-3mNBZQ9ho zJ@wSn6Mp+!qqp8+orFm*y zlIvcW#Fg*Am7?go8|xbOf9~nI-7{zI zx9j2Tuttm;QTdNBgiui~2Ug0zq62ItC5fAXLL#J#bW8wL8dmi58wWID+o}K33utGs zW^M2YUHt|~7y%KYVnv$jM>{U8*@P(O!Er0E6^7=kQlvuDr#l}4LRYE6;@ z_8d>C9GH2r7AO_q3Ps9ux%^$nvB$)b)`Td4a!5@o$*0dcgzsN;B8_!vloij>LZF4U z&PI_*Hj{KSC>^{y)hq&N2}Lm|F?GZ!E{lHu&E)J3))O_oy7l-37BaXN>_z00Jp*Qs!NdVV{ zRh`he9X*t@KKGh(;Nx%WGZh_(#>U3}bI*JGrvHmQc;`Rw;FBN!)Oq!Fb@xB{VuSwa=q*}Y>a znmX=u<;nqR$K^Z69>~=v9?WeES99^*PtxZX$s`g++r+AwT6KNX>9l6k!c4P_<6p!U zAS9J^xa+xP+&brF>e3!4Wh|Yw;>{rahqYd+FQc(km3jscxnf+k z#`AroQLU4J zdf~~8Zb*|YnOUqv5~`3)!r`w=*Rgy{KO`f0TUCXvFsHU&--QSj+A+)l(KCo%-w7Sf z=yVdP9dg+r*xqZC3+V3de&WU(Z=C&~+MU?OKg2OlLJ zd=(;qGp3DWY-2qixN|lq-S7~%op%zG8#83f{wu0YRmIVlIQY%%ARNkH`OOQjMN%jm&u^n~@{hacX1%PqIO z<<8Ds3BYTtv(G)J>yd{Z4tjffT^l|U0|Nv4=38&s$B|M`nmCd16DIuh;YS|1=Ak){ zZ5rtB{{`?V&}>_}k(C>|*nQjxE;#xC_L(%A$6s8{S%>XKf3}Q}3aK5G09Px5AmAH+ zx`Qo`JP!les4x@fo_pT2GxyxT|C?7`!8gBg`L2huvp}TP@J}hwo^lLkT}O?sh!iT& zggAH=+L9CqE$Jy1=^Dx#0U%XPH`A}Isv@wIv@LxpZF^Q4+uw~{)=E_FP;i8?Xq~n& zFuidbjA?_qI)o0F>!yrzp%w@knhOBO@xU|ljOIbYGb(-|eEw}maOfW67%UcWq-A1gf$L~Gb0z-t z(i(hEA(Ufy{@O^i+BpZJYY^R+LwgS3KrUqV#2=%!YR{aNTY!d_BJ_L;GF zZox}0{>S#+kACponr~eG&Dv2TMsL0M-g_gmsQ^TxCdKIer*YQ1Pv)!>_Ge0K6QJ<} ziRaXlb{j|~YLLnRkVB*J4_eb$GnSOwfG4+b@%|}JojQu&zqFi>J@^c#Oc}#5quY@5 z(A76cCfQ6wrVXu)QB9~r99wNyq;spLP*EN%c2*LLSG50grGCmm-p<4A-o zFJF5<19_jCglqi|T(tHP+OfdfH|o)$hqX6^GS@szk+T%U-8UmLRS_|Y?oQD!L#_n5 zeDqn+x7>2eY3H1C4!7Ta`&;VlbasW0ov#y4I+1_gdDr6Rrk3NgLxbaAF+I|n-o8G) zX6@QTfKNJ7e$I8hgMz@F74 zFW}cdzZtb+L;PtRIeOGX&p-F<(dV3VF2DWNuXjC^S6LmcEg$Lb?imR{LoJMK<&)dK~wZrZ(+y!oGXcIWWlL)$5GBwrktJ%Hg8pX7b5X52ECU)}%L#lO#_{ zZeF~GyO(c{$rr-{hP2h$x-O)$ph*b~WD%RTn#8LnjY=iZ0&*KR!}_h!wHB`a=?~w1 z```cZZ&POysU)BH>g9>MZ@>NT-Cf(S>Fe){13w9msfX{)M=p6kmwx#IPM9^7jO(F; z6iKI*hV%$(lg+qJ0#s;_{Z<-R+BUw{3eQQAPBamOE(yoysBtaq)!NKs8@jk<#aem` z0plA})H)>wiUWiw5;BP+y~sz^+&O6_Y%Aj=E1slxfD2e8zSZ3q!l;(^Ww#LOGD0}< zbI@8EprO@{h>-UJ!{8{YkP$T*PMtD_`P+K<{k-KIG`gK}4YibYU;(zn`T8Lemyo3A z&^3_bOMkeRbz6JLBoamtS_`{Z93sJLU4^|dJbkf4vMnkdBb%`6NG@0@Pys?2+)3OC zC>9Z|jnG(c{#z-MT9XbVDPTp<&>(7K7xWAO=n3P-$^L@`RjmFNq z-hTcg^In|y36PFJ!^mb+^;t>LO6S=p@cqh`EBiE07|Y2=9)MOMD%6xhzv3rtN&Q~J zV{=z8AHM1uaxW}G24U2!zB@ZKbS9vdEnB+lfxO15uc`Y;-$1`j0BUHPHh~YFav+Z5 zTJ3K0sC1+t8*O`GRLit51h=_cd$?=m2IIFb%uE`gDzm{?v=J-Gfv~e_oh`ufjTIDe zlq6JrzlaW?&g~`v04SEAwFyyE2OBm+-w?yhsrQ=(Cmlq`aWnbk$w%;sgLdcbyN%XJ!DW>O?v$GVyc!cfPp z{-)Z|q(qIuM8twcHVu+hv@>ZaX(G~TH#|K{3slsklAOBVKFpjtiP}sC?Lu39hA*9a zBo`jHpY7UM;EOQToFfI@g#urnJ)c|N zphvdi7mMf(TcQqt9y@ll^QS-j=~M6j&mwiVxpu#Nug?==Oq+4tKM8dfIH>N#1 z%1^)2G(Zy?;+u3B%x@!K9zfz)GMtPj_}XG*OhRor`&PA22tio|WSj)YO&G!at$qCJ zg+-h=c`T!AQ}{vjxsjH-sABqau^jTv8y;Zcx^1L9*Wx+MYlhJ!TgqU>eArn6psGKY zXe0GYMd4B?WBrYeTvZH%NEGtukuA{B0D+HCkkaPM1xkei{n;!mUvECMAkH}B^vf15 zeEIRW;@P=t1n?T`z*z@z?H{k%IC=6!RfkR+w#6TiBN-lrBpp^O63=^D;B8uzAEX=cp|A;XGYs*nh&Slr!*ADW6)DCc#l zt_f{|qXvW{jbKwbG(sX#@*zb<93|2LkiuXEq8BRpuxT5*x!zdTMn{>OL?1U34w=q7 z_L{`k58Z>tM4Ce2$9AbL=^CcC)gu*Ly!RAB4QmJbS-7pAhc|5HuI1~w`T6B|nG^?& zZRXU8V>xVGJ7XF$=0_KOLg~;ou!erOo4Q03sdOElmx3U)Aaer}R2I`Hg^W7_T33AB zwFci;NU1qv-vc;xzrEQ&21rD?4_}0 z6g7!P+bJ<(16r6)S7fg%;;~M37r?Zsib0OSVwctUe}V&=9y={ z}$W<;(ow`&Z)^io`%W&!xGkj@o3JzA#tS?lzUYMuT)Lok+x@a)E{w+XrG# zc`fwt1L)Np)r1XVgy>K}!Zo~fWs`zPctuokmvz+A-r+?zZ-H^6VaO%`HMMZ!{v>Da z&LQmGvlBjTyoDJ;(*E&^7q=pcS z$fn}rrnN#yVG;y9azQ^^2iFm(g1OI1g4DPgLdt-PmOiy^lBYYj@z)nu8=Qc$9T+8I zxmb;WO+D5_LB}&)9jK~=$^OlTE~Mk4@&y2$Oee%uSAFlVpa1-4`SFi``lj~UcfR*s zKK7B1?U6_(9#a}G9wfKcalpGz=0~4;2jg2B8OZhHx*1w)#*;}k5~>gffmSkZv%hXB zUu}5)A_Of15?-1y4ZG1-+|EF*lgSM!?l|{&Zg^=GpMKz3PMJD}_wKbDNw-9Ib~QP# znZ|SnuA8=1xCedGB3M^6~qg<_~8cMvapp2+K&};7Wn(N`Cv#=ehl<#blBR3^K)5_^&(a zS4IMkj)Z%J0UIh}v#av{K=f5On5c`@pH@|3A7RFB}JU8_z`-pTmzob_N5vJW?2xyA;A8{)Hy+H3bpkhh`!ul_nd8 zoO;uPY|j-DQrecGif5@i2LY5em;v~b})s(Q{KP^yp%qkqS-!g8(T%J;F9?Y?% zdypqLZe`{6AvPBBw5QX|8rj03V_MjEWGn6I1bz@wRtn)HNP4x@IQ6958l;=BYII@T z*{HN$H7*V%U1Hnd3d%tqMR%F;5_$4%o+GL8lq@X5c9HsJs zarVQiTnS|=Hb)4GWyM#nxrLQ?KW17=pxfKp#gRuGarn!NUhWg6G1_=`dpo zUpjt2KDpm+6ns;?ML#C$E*RBYX>|>-EoNdz$*8ql4i$c=2sP9vJtj5RbIiCAoIHIL zr%oEp$V`S6eSO@xbR9Rnyq1@H`e?05Gpa5_ohQhba}1OR$d~&mm5l+4bkjJ}H3xKL za3myw^4U7HnsS(bg;%?kVM0m;3et|?x`nIx=aNozqRNt0%ZPXl`7&aCpY7O~gF9}c z_h(`AwwUS{U5isH$6=|iuI}`no}TS*W`B*FFkbZb_OWs8nzf};d3==mi9IIrkpR`v;N5f=1nXs;S7KLw>AZ0`aeFHpwlSo#Kj$Cbmqm&*s$p(^MJ-Ol# z8876d$zz$?P{S|gE#vVG+c;+Y2x`3)gQWoqK|dkXHJY3f`36qtg*3zkT%i?=cNi=qb0f=mY6~bZyG(u}!1fJs%YDK72{rJ()(r7@X3Q|gw)(XE=Cc9}XYSl(S>tr$|wr$z+jf>uY(boC%=f5S-&s`&c z*SYrCd#~+UIxJrFvH-z`Idi%1#Ra_ku%mIXn@UNFeu*&f(ZWLtO<*R?C>`QRjT5>! z35UNwHJ2yudj|SV`%*|Ddi#3M`s+=9UAF6Pzy9^&i}PBFW#68#k`WWevftE+jHyep zN7Hyht>`P{*;?>f)thC}wq9;p_#A_Q;%&Q);iCua&YmreJhOQ#lmkR6Wh6`0s|5L- zwjJ$^QDdlSjx-g5h&%;J+z*3 zP{JW;s&yHdcE8XTL9WsETGtO2xpmQcLNCBk4xuneO<`$Ys1SF{097u()1E26PZ2!m!f(vzsel zDiUt%i#6LPO`4QD{P2T|*Is+=TlW0i)d6^&Yw@DRJ-KYIM=5Ui}9Ko_^W1pAd{6H-7myzxjtFqSgNKL8KNbPhr8)kzBe>}JeMrd!o-}f#P3bff8)`UsR12p~9mD(fp30QQ z2JTqCmfydyoQ}F0?pd{g&TP&A`J(x}P*tR9@ybIms!jxeMOnKNx_S*ycumE-hc#dg@Jtr}G?}_~Iq(ez1L}lI@8K5955~frvO5?*gE|j9mvr2(Y zRwW_UvRDD-&?n`!Qj=(8d}E4JCXVEt`%GYZLmdmZ^>f>j^~~=Ypd19$cpf#LhbIMv zAWN>$PuA~4DWAbY4>^Cp>e1_pvzrA`iD(QUG)dv|%lXTgvvxB`4{gU4=AIhbnb(&` z_vNj8ETA+MQk#N}TcK|dkfN=vc>qC|@B59>?Ho0F%@?NhgwgarO&@p<>?=t$5PK*Clf09!h=z$4%l% z7bzTslnmszFjVS7NNGDMBDV3Z7-NXxV7yorP{&S%v8A<@aum@X5E5U7%xG@{Df!+* zFYx#iOYnVdM3AD9gx1CkD7Nw5c?TdiBveQ`(DZlr5iVP0*aAYZeS6R4^XJdMw|23>Ln-@ zqph9woXm$l^O-NK`@jb-+I6E}=lZ~f7mXM*X7t(7X_RPf=CE12p|pe2AxdjP4dpN- z9|ZIjOY{{=1X^?E)KT1i-f^5iVyjtR@I>Y#bGTN#<`CFIFT^DHAlk2 z6$UZvM4AAqGFuHRVm|<+5-@cF&d3(tbI4wdZ%9{L0@!(~j+2Sl*WLaaQLs#V7W=ER zVc1F_Yg2_A5hQbfYOQdzLvu|BEt%0YW~Pu#j-$mJ#nBTd@tvb)@vD;$a;F2Hj@iXy$aE#&>d9n5H|U1p+S5t4Bo=5OoaFAGER0xK2LA4 zNQ0X~;!rGS=^9u`*U&}^ewLwP7ej@umhW#8O(R-mrFT`->eo>N-XPK&&c;y$iMcU z%9#JJ9Rb@0%-;pdex@S|tillvB|o6t-HXVTKtN3wmQQwHvEb6 zhjAkjEwxPAb3EtoHkOhKk!tv1SNW20)n%+yl@)l20)A+}w9OZ6_dr=e6)kL#au6CC zYDVFR6k3P4LXz}q$z(=QpP4{yW+H9%93R+wB4)vSnA5%EdJxL`_|7*Sp^H-i2>uPd)bdY<@r@~dcH#kyZK~z%w>`$oJ-yT?lkp|x{T{l8*3p;iv{Nr>X7H#AgGHNt zg|%xoVME59ol3~3qO55va4n)&4b8Jpxcud@`TYDJ&r;`lxNgMNf8+PXB(wSz-)g)E zG)>7g35dn3!dT+l02^fxnx9)P!InPT$TLYngzt^UFu80F-Q9~W`+%gF&o7<*=BVB&9vR8vwG#qeYM$Rnjqw_x7^K|?)4-RDSYMIOxYaljuy5{t8k>GR4Q`C z4R^uH^;YX&kVquNGtWGoIr`{h+1$B)*NuJyYkP0Em(Ar&mgTzaeaPO7ZLULw5re-1 zQj*Fs^Yc)mkvO3yM4}bs^T7_out*5!^_6MEsuitKN!LUG*EJupLIJUG4TQ?<2{1t} z2xC(+YSJ*O2|c=%&mA;_hE$RusBpEb;~%!Ov|~5fXyaJ!ymIW9jH{#A#0AHi$4F2i z3Acv2REwcQ3M0!aH3&i^63iM1^IZ&i#ph#FvmDE+QBZNU|7vthy zfA_oJdqfDKrca+f1e)HS-j{yy)1N;1u}^*aH6P)jhaT>odg|#NhaYytde?FF0}tJQ zkU;I>mxCrt-xGCX+xg7L&t+6=+VJ_6scNMo7|L&F+rV0s6bS89(M|0$(z433_dnxg zr>m@Rl~R^|=ODFX6ze1eB2QThlEUGehtJ?+2kpVxx6Nku+HKT$uAwI)QM!y0f$dHh z`kvW$VccOdiE3z0zED@3Er~{9kt!x=B~UoAb+gt2rCn-LlKY-p#_#TW9wh@ivX@mU z#2dT`(Y}skh3#ia3Qc1sO|nYoK<=;$L7{>GJPF%+pj@o{U8t*6E(N|Slh0-=j2*2R zKWRc<2odZ`0RD&8@}&l!H)+zOm!ln6nzxD{-El98h@KLmy=?2%n576@*Wqu^z0Au` zz64$UQSr~a-}An&0X+8Dqq}bK>s(*^>X!kSK7F@mqCvPA-OAZV>_x(H<2h_x^=d2? zQzJ!SI+~8c5dob;d7jv^4IvZ5+K^hj{=@neMP16XDuYhkO3>ZCh}E5hhTM!Ul^|4= zu0dNfw6!p6pQ)TSaTM87+2EOkLO3RvXrW?x;;0K=d5;1WTD(AHDO?R*&{Z+ip50mm zNFiyh8;j$3XrV1l&Ak7px>5)NX*vo?nWnX79AldHprdXY38$5oWG(x&w=li6(bBI} z)ySe^p{i6!MhKqV(9IuST82niE&sUXYs7(MDWG9{-aZ3%VsUH1UfDuCMrm$p0AT9W zsbbl(W&66W$Ki(`xe4GmzxesE$1`Tk7ywQ^_0(oBkvyQkzrTF%y?1YY@~J1r1!178 zyE)W&(9y*47oWj#`%R)0C|sc}OGJZm(fAA&wy|wsIi;XzN9QK!D_bj6Y?c2L%xfLD z+~Y9=kE0xXNSN2fS!p_~zm$E91 zXhFhpd9t$$zZ_albXA0mBj)QlgQ}vemWYIB_JCs(01F7!E7v1Bd%+Wi`e^~6I4*i@ zJB)1Rll$$4Qod=OMwF`R_PwnpvHu;lL8F6vcvm3$J0mk&ZLDLAjvSin$C37GE7i47 zR(MAtaIIO3@fR{iN{UeX2rWo?b+puurM-SSuG@egnpv@`YR~E_u^=e~*&yKObC=@# z678s0c&-ZtjXg!&a$qWIb_o8lJ%gwSCV`qUV}=8;a^*@5Fm3nUfBDs~d}Y`nz1#Gu z0BqW{iLqnHUh~*vkNr&wo?o(LQFQxOb99YNBOmhL8y!XaNCV$0A<26LT+gb3kP+T>NqnBK{JTfdhTCFTnioA0BRF$ zAuU)?Vn}xe=i*3>a2&3^?*)E#`_o9F@LUJ9z(M|NR)pC3JsNfk<78D(n@W;!BuX2U zLX=`FT{WoC0!k$_N*l;W=4-b4SCs_7;v4*dEMjZ7899L(J!&+c`uHaw{qRRW{FXmU zchLaf;QI2Hzs$^;GkXs^;_&iQPdu3b7<_IK*FF3gm%Q_IgcNq8MDsC;bTo4ot>J|y zUqTM$P@t3Plt^bXH`CLjue(;2^7Q5&e62vZRaR*`1pZemP$Da^NaaUpLtk^GY5zN7_)BPwUbq};Q;4!( z0US1DpuL`br;XvjQ7vSB-_oc;8}Ko5!eIU^LS>7JDUYa9EQ=*fb;RQ~Xl!lU^9n_% zH0^a`sZX|`l{MyxX7IMH5$Osa5Y}BL*C2EJtlwIShD5_h{5%N8Hzym{3^H{dGw@<8oG{5@Q z&pvvaz=~xn*=PT~uUxWd@dce*IwyxgSoL%@G}dz18HaM(X-BZ< z)G;*Fr6?niQqz=_bfh~N^ou;RaT9YkY~_g29qiH8K;94VwL;<$>M}jKt>nu6wAM`| z<<=60=6S}?Dl)Q(@gvG43va4^v-5f3fC!MKHynBH8=uTMFM z_ucaZ14YGE$L!5OzJwBrP`gNr5sCc+c1!}|y=Rk31VTx)2u!A^ZCl^*aHZxaw>`tX z&o3kC$zl6c*?aI>sgKaQ$_ct+&n1OMso~6knpA?6=f-N05%Cfo$*^f0B&Y&T5E6P4 zv8kdVVdl2P{C}iG2YGZ~A7X27eAD;ZYp(-0cW&l)zx~~=1mJ&dU48Y{ocFGGa_h~v z?B__iI8;iLD~j81yN~ysa0m?v7hizX0YXTW(jhK{zB1e_#5r@NE9co>8-RXRuQl_Ut-CY?FdH>J1Ae#seQHJ zFXBuiE=ddsN*V?LSi9h8B!oF^URZ3cY@?oZ2eh{Gwi#1Vl#OddXe?|M!c=IHrn{5~ zCD2l{qa&)hj3}VkYqNU#(LowXpElKW(2#CNh01{NB7oXXRNo>YD{?V98qptJu~Jo9Bk@r9BwdFMgJpj7{1Vfw))Ji1jxUUDveb%(zLFW$sLFUn+3ON9 zv>rsL(R~B4AkuAr`^P$fPrh)KgCIP5)-nFLaTEB(FMh`7KmXapKmKt?b1I$Q^3wc; zfTLrIn$W`OXy&AMpU8(VJehqbbP)PJML#ej6%>w;)TKw#kRHKEr5RDz%F6C_+`W1W zkF43u8M}{TY^H`{Xml5}3@HT#I(wJXR6Byk^hi^QDrMN0HW3vv0`a9V>W6Qv4IUW= znePjb!lSRSm3%&DgMWyKj(DMs{IyaPghNZp+bp<_UHj>IA0$A5pCJDyoiG9fKvp%U0tEYu@jd)g7D z@YS-s+U(n?%alx~NhdvY7$RP!br&VS6w8D{L#d4J9UT5o1Iu`@iLf5X8;fZ}*VVPP zwc>#XADH*8Z+(kPFTHfv2;hHl-FovaoPYj#`LW~2ZH_**>z-T0qw^QzNC$yME-OWS zO_F=(FJbQE3m{vHlFVT2xCzezTzTb{yKd;~T&JCO3IKcWv(L){X=oOX;QVusqa~9e z^h30;CO@!4@Yiw0tx&kQEbi%N!%*G?X!-Agvm#!y0#715$M^!o=tq5l zDd=eAz&*!v+QgBF&_yc4(^pzp$s5MOdwr+^hw*Nt? zfQ;Knb9$`F4@`A!$gDWv>x?@tK)3IABaW*T1-uU%a%O)dPcgjv^^Nq!uWl>CJ6q zQ~y#*LCyjKEAw(~6C17Hc<>(|$38l505PQ*ChX%YP#pR!VvLd6ZI zAHj>=+xhdtHDo;7VY11dmX%;g)ksH(>HrRbaIBt$1NeAJLAFrjTYr6=TOVIaCXv92 z`~m(0pE9&*uBnLopGlHTr*@bN?ChH*It;+~4L+x50EUKZLs89I8YD-$m>^6Zj zkKTuTF|gH8_zFyMb&K2}oHfExJiDofVmUAYN$Y>(L}K{pKsspGsm$w9!>&iP)kA9w zI`SQFt!G4gBgIftpMXpzMWGZ>RvKRmq}4zd@f=hV3#^DLT>)KrzY>8`QJ^u56Qu*v zZY?bh6OcG2C{$9Ho#y}+Z65L1l@6_?t)_cu4aM>xQaTn_Q5m)#C}=()70_rz4eB5zUD7&kI|&^S5Q|afHixyN_k>jz$JbKB1EMewJ+m ztEfx1P+!wV!l^}tWiz4H;!OpAT~(1wprnfQWH-h4OzWthUFBDyT@b!??b8Hdh$|)E zJ9ZYIe`p@*gy5nXQ|K<1ETbSq2^n9Vs#pk`BwGk0mLna6Htv+^RFbt@`uM>ub9i}u zHw~GT9gS(5@VxmX=auHg0zc!CNF@#3_FufX(i&ANS^+Exo4Vr9eT)#0fC`P*M6rnO z?2a%3x~8U9ELpPn;-{Z}`oG4bWtS4*zp)1T`yUI#@LZq+t=Z7m&+#W7!l>p(l+x6v zQrtIx8Na#VE?BcMQU?+5|G)>&n>Y7`rB_^W1&=-U*sdG-2G&c97N1!z7T>0|f&3o# z?h|?E$%hzo9oy<8nq5a~eUWW#RfsDG0pELO5q-s?Y1i+x{r!51e*MbRNeV zXk}6Qs!E%k7zI7N^QkM002C>wmX7Ahcp?cxp@c>ViHxX;J9+;i;&zFOr-c^KJG7ph z-;ETm6}{3i;8kF{>{>zEkvy}xm+w5bkdmX3+NnTfg{jJfQjFYQ#0dk#)z%p4-%t~3 zO{l6I8kHTZEM5&c0|MN-ZOaG3Fx>L|?;fS8xs75W&z^hkx$T)}pFPv}{pMKDIg^Hc zcjx0@zJTw3;tZyYX+wt!Uj?8{5~GwN?bb80VG5aKqfMTS_^@%7Gju!S=PaN) z8IchjFv5K9zyI7amURzu=%`lGu18rIdT=q!k}vfkw9#2Gx72_w-;hgSC8Sy49c<67 zr4$ybTDnyZjdo1nAkhSNPekZ=L9OR<^tg7u`q)c!q*KgjZK4?ZR=u=JzF3Hu@+t&4 zDnv;Kp+gj!nq-0{8@6-BpC4x3wgJ+fG1ZbPL`lzRq*U!OZGSIbB?;0o#kTVEwf&51 zCCO)8R3?R|!IJ`Mjk1IV^G01ir44g2^nHqjoKfrSAA;rUhXsFA5<4)m4aT;^)^1p^ z3Wl-(qOq~z?n^Jd^mh+D@Id*$;-`LBVo<4+|h+WX$5F4rL)QI)n zbR{3qo&%n=ZBhvhHL(9QnA}cg^hl1`Ya*Z9cPdjGYsiNoJ;f4R2a2p1$g-rnm!CYp z2nU$a-pm1`+t{nQf%=ru|5s&=BMjwKRSV7thB@;|GdOb3vE+&&Wk0YpY?r_-BbA^b(@I<2B$SkB6?Hq5 zF{Tlr!7jK89RN}jBFK2PB|Epb3n<0W`z z=|--&aSr*SPdZ_=5+vr{8BKvVSNTVutC-lMAz$N>txJ*dE!Z>+5&uF?pj$L%;vav1kma3SG}UByY0X9!E?r|>-|Xjh=FFLo09^h3@9w&JZ(!a3 zz};-!(tFynm8;^0`}7kJ;;4Og!`C_%Cyg4G!cyn7ig@!DaD^i6IQ(P9x=0Yu1~By| z+mjIwU&b}J%`z&IwWFHh$bAs|?Z*Cx?#a*3ID+3CwLjzPGYpgh0-z<8Vc(IBynD|{ zeD|pR`RiFn@RQ>YWY(xwHudMZb@^IuS+<#H*LSf#J4nCpqqN484pNF(emDOAD98$p z<49T?Cz6mELggcHtecuN)JO~Jiz$P)+SaIHC$SKcTzQcG>?T`@8KuG4 zl2Y);g=<)_aXSdt%#`@sZnA6|4eGKL&Ky3o&fa#q4{*$=zviESrjPc}(fenH-;Sd3d(4#ps zj@G(K<_?BoOo!A$;AnxXJX~eKaY)PX(Z;4$3Qb4t1Tx7XnYWV9 z%zlBz-2=F;gDYHw@W}c7Z0lV{Z*CJoY*HgFwj-izvxPR2w)r;y59$R|QTe_iSv=rQg*YkzXeDZ6Ba8u7h_RK9k?x|2R)R{2Y4y764sW zTPKz+UpDKMQ%)(aTD5A|4Sbzz)~s2gv$GQfPiC`2=G^LN>(NJC{)CigcZ#(Mm>>)geKvo$#~6_ zv|vmPoHThPIbZX$=a;dvcYv9r+GtKX6ho6>75zc-<$eMckZ{sS$3<#MXr+{mdmr)I#3EvYm!>yX``+wbOnnN<@HEGUv7|~?3=y#@~X%~Le$kY{C@G`Mej)@ zQr|3>OQv%;VU%G5EL~^x0zl8$YmffF-gNWl&OiTr7A;!zUvswZ>Hz#3>$~4IRs8g6 z(@$|->%10*+^Oh73=Ve5opM<2j?3u{LPsh z8pM9&Mi$Yda6PC^z&=wLci?pXdcm>0fA5LZC_ym{aWqDXRj62|G&-D>)~HYsgdrtA zq*M+NLQ$V~m{?!OeyzZJ#6k> z%+{f`l!IPe;ed2e(gM4{wBLn95r9<$jAY=okQ7ypt$i!dDzFHD8Jn+2Ef7i&N`p49 zO}K0r$nk}TUNST?X`BaR8knUm)aOEKi&eS?uU4hlHnT=U-beHp0AMneV%qMz)d0Az z>_*BIafN3og(}uvKnq;QK?$GjgXve@j9-!@t>?*(+NHO_GFi0;lhR2FI>2AXxCkPgL6PrX|)+-yM{@l_~ylD zpnW6g6KO9=A#Dp(*qNa{z$3t%l=PGX?q0pw98^+Ru^o&!kdklYqR^3fP^e;RxtWt& zTi}t+oP5+wesuZ)q(qXO?;~7`ND{(SIF{QUYPCaZUg=IKtHLL2(25TGw3MV$nh}{M ziYg%Q`*at}Z0arHx*qLy2{NurO1LN;kj-x;U)+u>)6`{}sqva|Ws->0r*s)9TpJjy zbh7jaRf(>FRR|fxI`Jy9Keqo;N`a%n6Ow$W_}s%Uku45_o3w|y6I<6J1)i^H9|};? z^1xp$0~5mNy4Xl2dj?VYoDCdm`LZQTuWoK_S>4yu*Az+BiOFNw^OVE*M5c%9 z&OVIa&Rxxg|9par_MOD1W=^yN2^Ep4aPYos>SLDEf|1QXMS&y{=W z9o$5qEO=FkIJiq`#yYWvKcKX-dIJ$WU`N$IbJeaks(F$Gp45Enh#9=|&ZpS7qk+kd z4U_^!r~_QB@e&>{ukYhKe|?Zmy#;E$1R=h8{qW6&l#0q<#PyHR2O3SJyv;5O}Ujp=yMt*KCQilRall z>lM|iV!IN6T`O9@yY_c{?JHm1?}tDBapeyuj^v?d7eap)d>;^^p}tnn*mKYPlTSah z>!!WIHKJqWTmcD%;ecQGp|jX~@<@iVMLXZqNU39klwlQ*ML=sHiR76rJ*?k0012nk zDy*(J-bf3;_R1s0JkxSD+V9Csf)BjySU!LF9w;F12PUXkK$aF*(Gp>2v7#bJOcggD zgWo2urRi!&GKyB-a0JStWHI$Az;>fG>*}|l#4==}$f=xCfuU!j(P zVke(DU<$KFH*(42FY^4R?R@>veb|3=69Jk)30zXBFkm3q&OoV$q)3r)Gav+hP@o(Z z49i3q5T&qsBSI=8^s{4WYz@goRgkSDG!>r=qu?kA@lj>Tq^3r`c);#_W%hh-IQ7+-fG)g#@TcCL}9J!dLTLoX$*7BiLEVF%Z02TNk9Yn$; z`0*G@RKJGJ$*r_UzFekIE*W*so*_Fr0u6pgd;2{?h!TM3Rg@TY=k|zZs%z`&#NwBi zw(POj?qbQJrTV|^Y~3{i_&3&--?|EbTW-7cF5kDzkfu8H*byef?$0Aav#E=v@{>L3 z5Q5sgA`xnoH1qY>46#BO#JUhrF2lBXD=>c4xakWQFM4;WR50Q&?ah4o$`5kMdrrX9 zf^5+TD}*d6!mu>gj-{o3qG_>fRpGQ#oqWkRbvzD(ktk{RT}VT^owl0E^!cz)TRk_O zaX1HzY~zD>J;hI+U51p9aLq`_%)A|h(v(zzp;8~&VlSmIPpq9QlzC@5wD1ZU>+cIu zVGu-0d%F5diI^H1fiblRQPPe&q@br*;N0EEGpV7TYZk1cIg=q@_W8*_p5<3}&!-p! zWLyyuERmQd*qaOg!xMq%S1ASAT#lZ>K~zwLMQgxU=!Ex5_06gdOf&)jK{lT=oPGqX z-wc5vnl?8yxyx28|7rAnVfAaR>5N}4nMz)@-+>3n|Hk0ID*^a7*JYP}1Aw(_){G$v zDN`mygCxl2;t!;QGa!U0U;M!j?YePqY+VfEWDR5*Yx(Mz-ouE-dT=1+IHX*cS}#Fu zGC@ruK|)F#p+I{kNGapU<^Wr>Ip%HL7E9G&4?(RWcehv3{H-=SuU7Pn19w#yAqe>S zi3jt}J;xJ-K`f2y6UG5e3uD8IuF^8sSV>-D+LHieY`!8aSjwWB9UZqwRjgoR!?QMB z5#RU8cr~=vj9^?tJCj=)*r&aY5w#xug&gy@Y-f2_j_tWJS_YKDL3*-l>FilV_rMzZ za+~STb(&F!*2Yd5ZDdq!>t9GksG-)AtQ#8OtFz}BUcIC$L9^0rIJg01ioWG(i=863 zcf9|h1mQ^N9)iJqoG!e)bV;JWudfc!NXd79^I1N0`hjTe8)G8-{SFpfh^DoE0uAYr zKww4^NF%jONaV0rLEgWK0A@b@Xc@-*dyVP*WD*TDr8+2tkn|*%96p1qPoBl^=B?zS zJD(xvD-u#vfR)mi>PTrLtPru)u-2L|x_?!jBWbH(U6oA692rY_(K-_IF{V&LX(SGk z&^lO}IsA|x@QGQw@l0ngcfY)v&tLNp_bph3kRd`kR&g^ld4$nF{nzF`uiZ~Gb9*cC z+uPSq?_icdD0pr;^bHsv4Lhc)_E%Iw3>zjm3JQLaY%z~?UFaS}Y>V~$#bsaonhS90 zH!cAnj|PBX*xQed*HW%Qa}B zo9dyt2BEY8?&J%xcgEQ9(X?j6O5{_q0UieETA-DDDhmyyv{yW4Hm(zs#7A({8!T>k1SAk z9-E8_inNnoE&1LF`*QZ4qv^{PD-LkBQdg12y#*&3N%hM7QfMmI5wo>yRcGmTN=Kdo zrt=_`G;MgT4XRox3rY-Ws2N3T{UoF|NkX7P%3+?SaxY_Q3lw#Z&cQreizPPXa3CUow)3o(v!XBw1!m9K|Gka;=aPb`I&nqta=hNg00VEP-5&hfFY%%784j zCJ-7|d$iV$r#9IZUsvSRXT~^@Yu^q4KVF@S|Eik;0opZzH_}BA5mrJXR6r;ka=y>$ zQ%AGMyX*PTJx_D~-{$bslMiHabB4f|D6KH>LdAQ?+;sD+6cA`@m{f(fk2El}HIgz7 zf~Y-SVPlAhZfH9I2BfLtgwqj%(Y3WqYpCU8e|wzKc|p?i5K7s9q7cfAbrc|#fPcZo zr^*N@a+j#+WSfK~Une~Q}8Qa0uZJR2eYav7~m;LFIB}*QhK7BgNmMzm)lD>VevgI=ReD_Qxxcdy+zXW9e?vgMdrAnc(Q{}iovFdD25 zE)^HO9qmplRep3(MwkGJ(m|D2nn9x1rkZK49}AJXo&Z-0Tv<;|qLx4f1Yw@~vAV_)2;0_!YrIqPIAdL-yuF&C>FzRvzKjibX=drP;h)6gU)1^o@*2*J` zf{$Ac2_5hPL)j99n0|->rYV#KauPEQlm~3w3Y`_-cF&VEwKgzvR6Ae&_J=t5uo(>Y zWRVg=Wdf5TH19(zlIc3?YDS=yZ-t>`RSQSGrV^xhBMLS`Ae1$T5{A<+ZAZaHFjVYA zNsViNQ%us(&{6kx6)T59YXK&QhLRuo7LLM(YwzAW*Ma!~g5_NNbC* zhzxh4rx7Z8h6czMau%5D8g%daZRVS66Oc-qq&QHq-%6Ayn+}!06_R{8PcD~3BvR;A z>mXME&<*vCV(W&^F_R}xW%cTnm7-q_&swCE*%MDZan9X$-~C@3{C6b)|K>X8xZ^H< z?wM!y$mjEjL;~I1VAWcU5Q;G?5vWiVumAJ)U)y!ZUiV~581$D3{xc7lF0S~&#|iR9 zJV#g%y&~;-)VK*+(=fHAj>B~;F#!l@^jsi#J@(U2<9l-kZfvBz{AG_fOJsO_vcdL3aX zeM&$=NPhaH_iat6! zgtKZb<0p+|zXNw?+CGyRKemH06GqV9(M&1fFnh%&GM->+b1luu48YG}B8A65xsReh6c_Q4wL#Gjs84wO_>@`v z^7-X_@&3828!YmO*mwd z4dlu_CNK&~h&0T55ySrM?{%ym*PIai_NBG_`K2`o&oz#Nii&5vvY!Pdpyb;zdu7~V zzKpYBh(YRy0ThZpg;3F4pXTsA#&Y@5&Qf29MYNaBYfp-^0U@Lr5>%<$C*=8`X$x%}`M3Arl_&Z+Ph!G9^ zMJUYN-BFSFj?r0{S{l815rT5@b&1`Z8~EV~2Xg42?lI5Cao%{<@@koiG6(GyNAAPE z9WC@)+0f`viUeY!sw=J!hoQ8o3i`Z)(gebS=VctAD)Vvd+%^QIQ97WtVLX{+GbrD{ z0fbvMt_Wkv;+PYUKud>QehUM+F0|v|MglZ(yw;XuZbX3uAx#OFo0e|kyN|tS=Co+T zy^56aA_E~LlmkRyT>JtwI#3AdLZ}Euh(h9o=6$u**Ra=q<2iJ%vFtZx6eAnz2o)4{ zNU2c5FGu3<3LIhK8G=y4tkF&EJF10eHh1%z`KxJ4Bsg*M2*x(nl9CAm8Bh*}*wVe2 zmimd*B%4k1IpU7}CsINIp;hnG2ufj*!J#!|OT7jyucK-^()N)kd;`MMk}ki*yY?85 z5Ds5?U><{|GT%OCe`AoOeG6#}aHQ3nVE70?8_AJMVxWez0^%`%tY`sf0U0Uj9xCzO z`{(lDiz}&1Byog5OAoCB1cE>aB!O|xjz=c1|FblF`~U+(L-Y*}nl^s*m_=*zIUN{` zWz@9yHoiyDDC8Pz$LBSUwLXIBO z!oee3d46*@|5(0>ViRG+u%wXG9zfpjK&j5vzMv^S~TK$MP^WC zmLzugWBd4A;ZP3q^yjydEo~=M0m35swTzr96^;^yKQBVG2td0yLNHVgdHb|cq&>-( z?w?C3DD$mjXOfg2zU}D5!QOUTcEl;X8g4;X+usU}=Q@N69$d7ZKRmLKwcGn?NF|ZD zCV8-(A~15hffj^9B4ZZK4)^6Xg1=+Y{n=uXfuSsgLf%aKq^__*qKzvxVtJ>f@B!&0 z)YViV8(Q1%sOWzPA?VKz5tIYt>bGhml#K~nT|FN7~5aJcVA3#c31Qz^)SdF?PLGA}LYAptTXOkqS>{XsH>8(1BGztRM-aNrJh5VN4A(FBj0AT~9d- zaD_aKzsJVy7;krF;DY9Q6+?kQYQ-UA zTRC7<6N|ft_}j7#T(@u?AKrHo$4}^>;0N^Qw^8s1>8P1NI@wI9d}76bs6^jMqNr@( zHM4Bvf5Qznh3`E4E_ zx$}7>3;6zV`^OjzX^#{~M}$@ZGC(NTs{NVd*H9oWW5n!Al%)_hrad|bi~Q`~=XrA3 zX8cf5pN^CpLyJ3btdgcScm%7(9g9~*hzFb0#;y`V3>#0lu1nDm=pE=Mo6nny-LVdw z!-BsC*F|sI2HU$Uw>_PKni_=bqE#>~nT|9AgHSOzIAn~tI=8{Lp7?2YjOdspgb2U% zl`r#y?_d3jkG>ncx$g+Isk8SZCt-e3=R(2Z7UJhwaiFR32T5N zhgEeKU3Af|8@H2n^fAXUI51 zZEjk;+GqhNjR-@NV8jQeLDFkkvGR?Av#P4Ast_fhe(jqnO zQ4wPfup05k=qJJUp|upsgU0q26*oH+K0+Eh*hr5)oe(V8(!)0%UBEyPSSjV|YB|nK z%#j`dKBkIPJ_<>`q-d;h`O=vOaP22f;k?6kr@gTj0TfGRf|$QwZ5<;`(kG*5Z>xSJ zLP*oekX8grfmUTeQwn`T6nnPS@vWowg_f*`6=bnDp?&A{%>`(w$## zDpa8eBMhq4v9V3;42U91Ma@GCZ6)PWEa%xc@DhE4+XyV%Kr4&XkGT03_dxYCm3A)+ zs{vp~Cq+Nt;1O;7_Oye!bLAF(`uqy&Jj2F7Nwk#aGGnlxV+47u|Am8Nv;u@QNu734 zgt!tKlOB&Q-pGZ&xr_T3Za^VOI!;BmAqwZBviBowN7di~S*gP-L4U_?gp~C453+Gf zCqvn+O$@3`ij?^xT8*L|w+V|BWYtW5lb`j@1BgBt!iJ_<;}Q65{1` zao_9ELl0%;@)h&Oj2pYt;1A%dU~4j!n6rHOvOoN<1pi$Lz`wEbr2;_^#zWdz#xkPl zI1-Wuaqc*z-+$5jzjgif*YCPy``BydRPwnYB-W4J zR++j={xhzm?cBN2i4`arGEfM)Z`CHsjxf!x>Q=tk@k^W5b!1l?tMNp^*+HnNEnZ?w zV-4@vV*-wFNeM|pI7r9X!|Dj6r%X3UA`wy=k9ld2R!3O+oBeyGQ7EhRUkMVzLK}re zMk_nhHB>5%BA_POL~XJKt!0%Mi{9xd!6>YmZa{Bg69dIAq=iLD?GU=!YQjrGB?+wn zP_5_k^yckce9t`k@+D)eGRzTCR09~$%0ZL?5uk;K4x!1Dy!YVA{N*Djalw(hAsxv3 zCP-_Pxh`u%EQI+oR}-2arz;7W9V(y+Fk(L*NvD>^Ob6|C6LH0V&XlA=;oYia9UGtTJA zZKSjBWh0sF2vZOUKnem2){I4bsDMDtYpG#2zp5&T7W|MyMz(O(G5he_=a+Nq(oPx@ z9!iA9vKU1`V5xjj^61&|eu%96L>v*~Nr(P?nJe#oflu8uo4#B~ZPKff;w294uRYMm z2LH-uQ0>5U5klaHA)VW|(>2gH?0pRzYe}eLIcyO%ohf&J#lTS6q78|IGQj zYXtBnS2~%*bq#gIba$&xStSsTgH9!2D34Ownf>Ua2kg3Q!`C5)9KtitJVQgO{|_{MI6T|6ofo(EScN=gTg38J4>Y1V zHZu0MM@Rbic9tzebSUU`%3MBsF5{XTn9^L&q=p(s*QcoW5+oeMUoWbFa$v^}p&Di# zToDJdcmOHly1%;Uij`k?@}9NUcp^nx{a8zsM7|i@FHeaxZ<^jb@)Ji54L) z3MULfB+!I7cI=UH1-CEnQ3wKr=h-fa-0{UL9e^OR5_G^1ICAP3K6U6c_8Zqo zITQ@!{n&WL=nRNgpe!O!2Mw`Kzt#bslfacpJU30kO_OkH@SHS`;~|9uNNSU9WD8yN zmbMax1sv^=_caMA_~9}8@XWM+e*XLt9$d49kIbCRi4)r?1wCx)FVI#uo>a2YCW5vb zgtEA|D*I?c21|YP=QmRJ3rOJ@bh{X?XeUL*flur>i?8D3$D<#Muot!yQAG2uJ;t$l zsK{3ydXBoJs$@x~rQae`9KN18EV<}uK9!N4FC@IM!i#GFzCl|3|Yag|qherh> z8p%>e7SaC-7^&ich8~6h5JFH6dFXF*G0@d(lINZw*s>i!C%lBHudn-JcTZ3Lkw+eR&G#~T%-DysgSq7Zmw)TZ z|Cuw`*%gM~+&b*A!#akBhCbTU(_=ou9W79ou27$(Kn&%f-6ce9^{dA+qik@CT?E3fd|)aW@*n5+w%on;W9FlqBbE&cn(4fLM>5| znUC#AL>+Wd-C&I+Uxy#8l`nH1Z<}74IPo9Iuwo;Q2^cJ=QK54JXCTk%QFTTH0I`}$A&(M1M z@|y`&fRv66f->f@$AV3EugWU0-Ye$JvVyq~LKqz-gweFMotUG>cCay9;*WEeanz(y zw5MHsWkw(ZZJ%MKT_3qL)+Z%vx97P0uIIS%*`*9*%Vb=~>I+1;7;S&1d5+S~*oDnV zD_tcS0|

s6<=9k!B<_l+DuB(_?1+k=d4gT_JYZFLCG8>H@yJ29eDV-v~($CXR-2 zBS1JdvD64H@uVOa%988qF|V^^O(gmwLKVJn#>uCAVezu1{%f5>U;N^ix%%qw^#ELP z`IS62XZHWh87y{%@;A5sbi<8xmtS_tpVzHhdlrD4G9ER3EcgKk*R-m-dSStG2$gPW zZV~(Lv)_jvnf>r}0PlO>dry7*iO23)w{|1%de;Td-hA_44*?iAZVVeXZ2GUie+M2o zi|3wuftJ>mkM{QT{s!P9S65WgynJ{SWhdualk^fS>FVR` z+vb>xUOH9&;^GzE1gqL&!wr^FBq0c>OL@F+pQ)U``#46_*Wd|(4h`2k(1LvEQ}7kV za+$6|iIqKBmh=p=dMHP>P(or zsVa(rQQ%NY(O5HrmWD}a-$zJkEeWix@i4iAN`)25fbIRO$(H(%jzERNwA-Zt(+TOK z@IgyzJ&zZ+^>fjk&yWoRke;PJDvR8iBGSs0=b*LblXRPybqc z;hT<&lGdS5TPbGe6;*yz{fiyw88N;?Q0W*{?`ZxI2wVr=e*06jB|Lt9$}EHF z0Hm-$R4HTesFWkYQQW?ulOH|2fT2>6TIr!xXc&{So77lZbhSv)j=?|bsCWXsd?T#bFuVl>&{zjY><@cR zGCQPjTDBKl*>zd+%^Nj{5%pHM4u_?OnZh z*^=en8#Wk&jp@ZCfawr=AP@`zLJOfK1cJc<0vJp;VBCUn#g-*Ywj^7<>-Jtw-`$zt zA2YjW&y`F`$nT5E9Y6Pxb#?DK+s=I2yHF~5#{ZqbAnvDeokLyo>OF`E)z(~wT{ z`r9AjuAPSvY1am+X^3t;z1M7aXRRU7WL%eLEt$)^&RWTemIkK0GG1VCZ8Gc=ScNr5 z8wWKhC21j%E;u-hl}ZejJPwWJ*grZ+Z@x$ZL0es#d37n~H`URWNs)G4Tq#U)ff4Uf zHX)F)7O6=BOptJ$By*bAfN+pfSRo`)OU8-)1UO`9ZCFHIx&_ZGFqZFTvM_{nt;T^C zku|c`VGkz+(8b#Q5l-bq4_;V=>snj;5b5q%;U1+)ItdO=O!Cs7JiztmpThH3&86%s z3s_VTND_`Q5Zc){!I$oTlHWXem~`4D;}{UER2nHv#qTI-5*MwJ%24&N-6R=yU_zrT z6?Op3c*haOufPui#wI5ipO~;pNKQ?He*A|n1aKOVBncOW$6@1>HcQYEloT{{wZcWG zAyzCx2RZNm0Qd6qLgUW3xiOsz;O^b(tHU^U>+~~j2BA`mwbi`B`QIH(u(?2f|gW*j!c@4`ZP&tj=QV^ z3plF*gRu8l}DJh$i}Zj%%rFeInh4@E9Z|e~R%!A5-Na`+hD7DR716rYDc^ zsfTxS>AViEzvyH-vq?$;G^AQ7RC4&rxDlGlSVR)NF*4_LP)T%+w0Np5SJ!j~suWF= zD7nf(+5WuNnmQ-R*S78D#>WrwtCw6%b0&coXk00%OC&iwHpRCe-OG<3Kg2}7Oug&i zSPcc&R`Sw1EjV^$DbP4dSLvmp<+KGj8*09cs&H4xr}Dog;gDdPPffqZk{XoZ(;3Bmn<=%S}3af=aMlgP^ev&O8Yz6DS#&3dxml zum^S>uGvH-pyqZ$$%BzG0G&)EM8)&|qVLK2^&8l>?J-(f>mL~#&7BEw{ioi-U%%nG zR7zz#2Q?Lh(y=N}hrlah=xOr^M^0u!k(MdmaM#1!v+tPEV!+b>bTF+Vt|GdPyejBY zz^U`w_{`;}GQY9jwCMFTr@-iNV%6F-2RR)Y=1i}EtcsoxAaMwkCO{CVfP(KcP$<%$ zt1wpdXw4*<*O+BRa~%msqLiW(7^XmTW;Sh&i%`n6ZA1Hdp*2#Nd2!t8MmU08ag@QS zy@t4@Ly6%kz0zpbOOmc&_s9hAy!|nbIK8E8BEH_4UM)#MCmgRW8(%M~W`1xlqdzVAofCG*Iu z*vN_6*1wSEc@p;XsLeCOz1LlME zsq_q>M<)^cyU}|O142t7#G-`@Uv%*Bp`Xk|r{BM3K!E?l_0f-gboe*--18!V)RZfN zsRDXlt9{6A#@p6}XlsFD#kAX+o6sAUA{Nhqxot3(heAmNM#}CZz(@a5uh+mpKc}5` z#&?e%?R~aV0UOR(&EI|WHHIc<T}MdEt$m&e9NB?E1uXUM@XlW#{mgir7XEi_-Jbxtc64h2VW~32c}9D-gf6!4vgjPW*rJB z5jCxhXMA`AoGMk)tMIDRmh!5#3r$;E7;e5WU2L=?s^UJeFRa*)0uTX7kz!uUdNRpI zG`&74+ne9m61ZYj{EPA zJ^uJVDWyIDByk*A*ab`G8i5~W1Or5&gg!Qin98Gf9)Q5efHpTbeXOs)|0^?*X(j>q zUte$en>X{BPyh21C!KWCB}2nQi_ltAC0A>6$AknF7D(j&pLy8CrL?FOn_IqW(*Mz{^A5ct~g>kZ2D^*mm3haP*zd( z=-6Y^+RXkvG`?2M%BES~(!{AW5H+2 zb~q#sfesj$+(*UF5r$c16DFggYpUU7Qcx^ac*E^md9r5&QWBvPAUtYl0datVz&yiR zFsm-fne)1M&si&QEg&w?VUu2>ovI1aiQ16bde){A4RkfGB<0i@{f7`yZ`BD+LS_@i z-znG}r#yU$ncC2H@7!D3XD3&%gvZa62=mTszNcV6a znQ?7kSGdxNFbUGW@9_yhd<3KAR=q7 ziTR$g*G_^=!q^yWI}qM{(caqj*x1fM{%J^v*u#>@OcUaA4O=bec&3{@2&$O^>pA^=fwR-1)7RmZtfB#XD7L zttplSLt~I|pgseM1X9^HCa!S=lNc0PAkeM@Ne2c-0U@R)r~Eg(_O(xZ@8<9S#YF$N zzV$6^-n^NSk+Gi)4-c;g^vhm-rFg^JUq~@m!Vyl@@J1*C6UHL9GHn^ohL=wa4`6=9 z5e|o@3ViP2Cnzd)0-g4FKp@&osQ6sDdI6ui^mMYWpd19opWK4!b)>8(A{x_iqA8)t zO3YnN#l72QwL&rz4iTeRQ4us_eN~+v*V`_b+1f#PA3GD6`!}?`50Tfhar=+ErghE zLfH1#VJBCCSD~pc!z*;D-PSUM6_=HGiR!n0XN}gJ-HN+68h!(1~Faj~c!4Gnb6?z%TAErevA* zS*%b9(h14sOS%{@RrvhIz09ghaY{!EUNjb(u7$6wY|@AwQB7Ws>kj;$(SYeBIacD@ zj9$_SNj52Yynmd3x_<|c9vooYFXQ_H>4cvT-{3qfIMIpp`ko>I5JcS+S4eaa;QIlk zVu`6ziHhf2zYS?{HPgmg$0dgGu0Sj~2orDNx-gZ4$M#ywbkw|g^TbC!{E=tgdfTrC z>oVDYJ$&%sN~JYqGq8LfVs^WIcpVrTMU0O_?+6@>7*lG=(j~9kxN+mnXPC zPhY$qR|qO9eU`Gp(3wh>nqcD7LP6gNF_h@bB3r7qzyx4uH5G=>7wZUX}o`LIyMRw#x|S=K&8IbyB$JTLuglPy zOz?2uFhASdO>-*2vZgwOa`3fR1^S5^XaSDabhVsB%56aD3NnN?it3FPv1+oW3llLU zYI+JL@504#9Lj2n(cDpn^G7Lp<7VI>oN8xA28757qc|)Gw7?PY%q6qYQt;{fwv)~z zId^U+6~AII9XckN8)Isidut_lV}})nUQ^BMDh<;9T!aM-fvZBHrD^{+Ws>wx7Wv2D zZ08I2Ji+5VBNTjTiU$cOWuG63a1@R*ls%z?sIr&Qa3M?p%uR5lL`q31U!XWSWt5cz zWyFo7`8`M2G+Y{Rt%!HoL_F|EnVRWzRWnbJE|g2~=#!8y0YcZ+)ydhjXP@L6K#;PP%ZxdPvq8-uw35&^v4aQ~KW(`YrE# z=R5i07r*%Q9h1D_jeO;6H<(RENF5j>bMYTP{1{8mJDDdA4>43Oacru3|9>CpoON z6hb+iJgbp!TyYMWgz+|07L8rwfn%%9XyjmJTSGcxsDrMRo)(mJL}rSDR@GlO{E@0% za9Ftt#ffYrwF))kv3z|^+L1T{Zapx_=Qr-AvoX!zp0S*Doy|xmL$Q*t%GZV}h_=-( z3>}}O)O`Apef;Ov1I9cdoU_~G5K3A=qd;hdREl+T+qwSSm7FrGjZ($KkFzKM7fCh= zyTNY%6)9o!AQjQQ(ry!TTUH^oV?eZ_y>RF~uSKmxqO$6a zLK{FJ!~~)&v_pA}=X;na^`UgwM+$KP)h?2fVj4NmN)l_0QZ5Zihktx%C*OKxFJE}> z8C#6BA|B6dh|8W$&vL)0`fa9f#QGM?1#E%E9W{3k#rA(llT~?!PO^RXo1^ z=mBonw3|xaGu=f1=|C30i>wz`@E2vCUx~mG8b=#GztpC}7s3iKSx_Ka|&s<=6n92|34Uy$CYWp7O zAC8h7A;fc)Qop+X??1@LKluryXIN6c!5VI;qo_k zZ05FIhaiph)kxn<_`vH|;5?__@gTVL!2u)K$QV8JRx9sKS zo!y+))xuj(Tf*x07CdFt;zRmXn0z`~l1>V~_V`ggbMH1tCJo9yvb)uhSPX%}#bH%P zJ+C}@G1n}cjVmSj5CI;VBt?1!Ca`5(jpI1{=I{_d-P6mQh74CM?&PHQMjTgC@%>11 z-i%EGS~K%$t(#vRorgfo6WH?V5Xh-5C{d_bqUBQbbBs*vr{Im@IO*tJYPY@^nv@ey z6oi$BPDshe9(aQ9Z$HLAU$LHRmd~N!2UZ_P-~_^GFj*lUh+_qa;Q`EFLTAa4N*Hww zq{h_}$A$4ig**25^6f_sa$s=OT3VmLUDN_pg%Aj(Z1)3Pn*fC9{ty-5+MlZw3KS0z&LGct?;$M+*B;3R%?x?RP{5Y48BI|@H3|&@L1Ax$(Y+9^e zzkb8Uhc`Yx6M<$%0RK-{Z*L#7X3Y{m|M|}k1%7bD>8GFm=&_^6zPoz$>R0-nk01Cb zrEna_aL)k>WyHb`~se(;_{ zhYw$Y*0Q6cg@5?WTWRfR#`6OLl%=g{Tu0K9O0l%9o-^mQaruJTJa6TEE?+d8uEs2T zM#lNiCl2zf9fvtq$TP1o!^-A5?mjZaXCB&NEPq8zVnM`I>YPwLETAQu;oq-3o0D1_ z$ydA@C%&3Ce}o>dy6?r?{1Lc07Cho=ebtzyt3a@@!mj~{5sd_-<&=k`iq`stbTlla zF40U~s+opVJ9Vj6vWX^=i8KyS^eYGvaPflKT)L=}t^K3?`<8=fU~Ol;k*U>=wNN${ zVtp#X*LNJ`pYPj=PDnel2xryOfGB+*0-uvQ+j!gAD|q*r%QWX{Tl=L z3ColBY^AuOrHP9dwoz6-Kiu8JuMZ6|w=u)wmJCvBJevSH4iqX=I8K60q5-8t+uh@V zb6Qugk!iwPVw;c%nP9Rw!0^-o%BqMXleQAKU74tDUA=$Di`K-_1T%+1NVsgtY$iO9 z&)&a_Rh`YOYOTk&{Q3BpXL=GD1-D2G$7oW7Eqi4XK?gxyGQm{E=Z8Cv@|oZ4;0KQ# zW~}HTQnEUZs%aw~U(K18J&|dT=`ujlb`DHJAMfsk4elrt<{>U|B2J|Of?|#?&`1}_>qk-PGj&^TwXjnb-nOCSF@L05H z5m!9xSzLU{C1|ZV?X=Sff&j{8bgl@k>3CxRDP^)yC?uZF*JJPAy{uZb>g@jh{?BNo zkka9rYcFT*x}}s#K0=C!u4bI`G-Yia^sFnN>u46YWLVmi)P*|4f^w!pUNp6O-y+eV;!s#1TwIQ{FvEJNa-UUBy>%i zS)T~iKK*+&cDd8l2xDq?$f!P5Dxke#5iOZn1VS0X9}B8V$P9^OmO9Y_X^pRa3c&>9 z69<`FpXO7StYhcM1P8~8j1_!l)k!LZmbQ|#E4XD(AOHHmZdA%Oo2hMiO9V>$P=dDR zH19ZlCC^{okuJyHF=yBatc~(3*l)XeqgLehcT%Yvs;^!@TRi z9%Ef+BOf?-HFN9JOqCUZ1%M9a4v~~8vguBAP&r|rvZ_ZAf+>};Wfp>=$$jKXgJ?XY zOhlHuI>sNZ-XrmpfI^K%Drv8bBJefkz~@8foJ_&;CU+(MXEBEc>;7ATn2!!iIY!t^d*u&9xHTgPD z{K(wzgpg=uq>-iL;7#P18W~09@>V2EgGiVTlu{%d2ggkiD1{?Mjqz0U6+&zGqvt|tsZG6}Sf4hA}#f;}gAGl(%*mLf= z=Z-vGuf@qHujd6Xc%Hod_B-CSd-ra@p|!J-*S__I1WKbF9}!3#8~l|pN^(LPGul7| z2;rF-G!7nsuj#5w@qsf}@cdQt`1t+X`Pe;MO(p82Kzk9u3M&j`_CnXTAj`bt?A2T_ zw}bJ(!?l`tS_Vif8WUB5b`Brvvg=sjm!WomIDWcQ-SmlQfsvGP=q?z!|0o-1Ogk7m z+t*6bluaA}}p>S=mab*IpT)@)-LON*Wb8<%uXLK}CMBsS>DGVvlEnBb~|=o(8I*XY+V97cRrAIEG60%@Ee z6G9MJajJr<@S$_o&@)=#9d~TwXD>dRgqtJ?6iPUjKFV?9B&B^L-K+#s#&qzdPa4T% zeWQHlzMX76JY<1=CNT&Dt`>%!fSTs2XB%EtP1$+_7@%iGD^e0v*`qi-L}g;a2z?G6*ZVHa} z!tNtzZ3btJ4UKYSXrSS-2RG*czJB93qEk86*DuPYvNzK8A^gu}fd8! zhLsEL)8B7@R#GVB@A&q&zx}hn{oB9gp@*Jcz?S#F|NZ>*r$1qIbo}LyJ+}43VGsPH z|NJ+cd(kQ6rplHX7wV_SN2Jnf;A2towz_c@js+v-eMNgJ$#a&?D-1RRmP-p;#X{U~^h80#hPsAjKt^BPOLc>z~#!3T><&Ij>BU2d%N>S0El!%h5 zgd-R&m3ha1J;ssoe3hQ46am zgE_a>x&?IBub@8FO2SE!kO|UmBMs?Ucv_)?0#_~XU|DAa-+b&4zu4PPb2h=!<~m$l zJbVh?1leS>p*31MUlsTtBK-x@k(B%b1LJ#{sthAV5`;nZhoVJV+T)7=m!^V_lqKRF z0jkMcn5?Pj9L>E-Iu2*f@8G995Asm&6jv{wQ^k=~Vf-~gS`t$F%r#6o#=z-`!3jS9 z;BG$on&3Tx_Lc}INRn349Oz8-TDBJfNsob&Qk>TU^j@;DLh9K~t2S9TjV%dBsddU6V=-r2-3~j;EB|p3WzWZMI zf@_{HcJ1Ch6L|icYX$`PCtk0(_7%5(@22lv0T_$ml?&kh$C(b=3E2Rgz6Ls5p;CrN zcEVI1$8qWE>iTAHZ_jm4*Xy9QPPMeOmd3}&G$1ax;w--Py?>-oE>*=mBBwv17HO!s z7dEA(os}DezO;^ikdT6{1LM5zR~sq%UQ9SBHU_W&GVLq6>XO{_f{U16pP>?{SPK~g zRua=1s5-{uj{^3IxY{u@K@oBSEU#L}I|DLmRilj#f7GS0uN&w9S0tF}ZBkAcbkHuo_$)PV(kVPm^1l$q%&c+G8(u<7s!q#bj7HO9Pm9&XfLE}z|k=&Wnu4=7LKh31xhL$CFyKfMnk&O1`QRH#kX^A;V@Mm zXQ*%hsq+*9!LRo9^6hO$ncI-&J?F0EJ?(W1$tK&4Dxjs^NsH$bj$pjh z&)C!vJSwrL$UaLE9W=h-P1ETQ%k0>lCT8Rl23zyISXD^{bxDUUgE?ODy}iNIKm zO!LSHA2%tD*-yTJ8W~6B^B8xnNRBb|+kvEm*n0%M=LpPchjlCISU8VVI)w}Z!yrJ} zW|fXfXA_N6%ww+!kSG-(ghmB|;i+*7{R6Od50olcQ3BbR&90j)JaAzDIrA1Rr2FuZnV|DOSaRkP{At(e zr=9xQ=r8#a)Mt%~)wG;TISz8&a%i`n3IGZU2-7+O-)Vr zj*pK6h-5ayJ3sg;yh;E%up6qjt<10luhwOetDUeAJRJsP6;Z4buHc*74^S+XEY}#K zAI3=T$`C28;GZr#i)GDO%7LP`Y|>F>69u)kG{x;7h#A9tKnSPeCS zO#-S3h1Nk-nRYZTCE+HGC2tgvM6}n3?tsz}|gOghuC}|(h4?rpcp$Md|g6AUImafkE2@tl; zPT9*mbc)_ZohAsPP zOuGcSK=)GLXueM}87JZ_8KsJ)lrzlDTQ zWhJET?}dOwAcoo^=}E-gcNf4h@i$j?G^KL}1woTH`ARDI8kTE`w7A z-uvq(c+C$V;;#MOjQfFc#0y7Dx*E~7tj_oa()vzWDy!D^d9WfqQbMVOI@*JOq!%@n z$C?+|>`_E)P?7?69WoZYfT&9&5-z1of`ZVLgus&mPY41b(b7dZpe=3(A&`z^l^P{3 zkdzXMWH_Ir(Ay82p0vT=a2roQ{fzd>LViakl|EtczwWy0+E=Vv@ek2P(C9+hgPr?q z@E3a4>{-lPFz@Wf{7w&3rhAM`Mzhnx^`e-FMu1`v>3o&UdnLgSg@!g^&QLYSX-ap|T({74B*N<;A}J!Xk1LIk4n;r5!1!L2te|nsdkTBpHVi5u zkuo5WP~5cr7~kBo59K&GLBQhH20nDjTCTrnEnRhKDqaO8WMuKHv?hUw+U`P&*c@I& zh<7uEcTu`RYkEHI^-ECNwAO2x5V78j47D944Vg{?Ehv;HNlC#~OXskny^c>ku#1Pf zhdH&Yoz_epQ{_?erD4!M=|n3CpMj}^jOV&d;3KBM7t6hBzM>i&1$MhuK1(v1)MX#ldnJLOq6ZIhi%pP+&4bwXZmJ)!ubZZsD3@IkybNLuvKMv z-jSl6viWxa7%l(V%_otN2|}HFgW30~2P zITZX69GQrcl<@izqi)um&F}IKh-*2B6Q8Y^E-8&2=SYqAHP`-p6YIK~_{7EQ$W?q2 z4kVq?h`v>{%V+T1pG7gDU)c`?C>j|Q(5(U$diJ@?i{kKq-8l}*sGK@?h#wHD8 z!jV?yT2!$J#5MRO9P5K84pu)eNf%CC1}u z(9EB|;MQZuj$YN=+QRtg*i4|A83FuxuIE4h1=qB;wgM!ji)UPP*$rB&%WQPyl9xS$lUB?p zP!3wDnm`r_$3(?f6+{=!7_~MnNShI4lafaVhxzT{K1e01WPCkc&_&XkN%PLL*Wi#q zD1i{Zsi0%r?|ASJTfu)=>a1c_m8yP)f;6J~ryyo16w_UgLW}Zf&MqL~BqPvS_2+HU zB1}722^gH%PsyJ|%9u)CID*jCj)FqtAo4fTFM*53BO%jtH7>K$9A$x*`h?|%jwJ&w8gxLQ0_qdZ%xzjrSHm)L zDocy&@Tm*e^8WMI^35Gbx$YN_(wDE$l1|}yIf}s;GVWAJ5VK|GILE>1_xt#Bsl|~B zt*3PmgdH1%V*-t~=2cQbI^po43)b+noyYjq!DGyANKy3R8;>30bw7KQPu>3nN5_kZ zR5ofa2&>-rlor8Z@Q+pf!ZGfPI-f^(55WFoFgj{RORj6(8^f-Zvajy|4kDQ_K;xZ9 zOky1+?FsX{^=Wfdjv#O(fs_=5rXU1)0eJ~|2MP|99EI;l0@tPF`Sgv9QRo|l$D-h` zL2=pTmwkHQp+oolAs?w%yzCVtYuBu~{L~E_KH1jM0Z;COAW)#y;>C-(_0~IH4a@}p znGV38a}azN|MD+iV8NWZ&mSHg`Dvk4iVq@f)#pdqSGax6n>UZsPCM;oKmYm9e{kW2 z7jysp_dc!8`_$7;W9ybJBwSZ}mf=vhY%aIn`32@Q)=~BPF&@n98I0$^6tC0aLb+}){RWnKE~R#$fGkxdkot?(p4)GcX9Cb)fn9}jeo^3Kzj)0C0;TA+OmjyA6;Ej3Yr zlFBj_bQO##9JCIOtDdVJ5;8wV6Lou@N*6#|Lnm#M zSAjx^1PX`7q~a@&9^|W!9pc01tl?{q9^lZ#gz>SEvT8xCWVNcdu9Hffr~_c0ClT0A zfz(haqX$P3<9Yj>2z&EQ|HfcUb+yAF1Oy6^N*eXNCl6P5oiI;pYJfA>z`7M?q^4>C zh9-C~9D{z3esy{7V4LDVCA)0^J(vaf#it3LpE=R4lU7yso;f6)E7 z<(6BVx4-S}^$5MBR4Q*B9~)!IlBHd{_v{{g{p;Vz*S~(lOrV)b0RDW}+^$*l4D|E- z7ro%`@3`&uHv{v^#Y))bC$u$9CR3ElmF`umR`>7Tz4Hu!Yp%J5TW-1KX?4D{I%m^A z*vCmHpRAwQu|tKOr8j^1yB?jce@uMaKdY z8d~cY&{n?~RA9R`Sm{}DqDYICJFqlK8wj;E;t>JDIuuIBrQ+x5%k9VWC#iE2-0;{z zKEG)%?>=ieuUWH*ilzE#rK02^wdKb3S~%0gmBF@Q#uw;Qy53l$HBCt+;DbY@(qYDg7+ zcC@nNCTYADBoG7!BXD#8cI-dybO9kcThZsPhgFNKc$yO>0oo=#%HRPKg(8(>z0lJS z+YdmXstig*hei*-=RNP?bD#U%Oi-9f0RC^SOD}r{zxnmu0KD*pFTCNdJMLsEpNlYK z*>px+a>+CDzq;+#cL6M0wnFURzxQc3_rLD7ujd>8@pTr>U;NC&#}3^Y78R`*ZQ#!D zeV95oK@j+MPHVL0q_TB>xQmKft^MO4QM19hQu3`G2l(fQpG4zY&HO5DDiX9QRru&L zPvg3i7BgC|Aa#I|DbZEjzYtY5UUaNI9a;fb%Xkr0WmTGCL^Kon1pB0pwWH(eg1V~M zqCf|Vw#G%Y)Gt8!1~6$_{whMEX)ClcTI^;df7tNaZ2&g8N!8fK5k{U>NCQ#~upl{pYWtGn=O9dB$J}ZLUX+ zK$AHksisjxrzZh|8uh-~!!+kpO$Ky?mq;faJU?Jl?*unLag@6b^x0}%QU$$)Yyfrq zn*x^C7jKhT0H8*c$}m|#Pvi`j-jUUZP1hz@QE?HnSd_6H7rn#i?fa~YBQ!QPq7`~7 zH)&31!5sAY>tN{ub1Y$?4^4iwA|k@te`9>g7?&OGHU1@5*vyfl7$|){uyrO1%p?H+ z=hszNUBxed`OClPbNu>$d~5Cd{`TGXkByDC2oSoto{xV0{rvT%XE0SN*;%+WOyDq< zN?jF^)w;%UFCIii*dmnzUj@AO7mu)YU>F>iDuBR(>9hl$$H{YA`O)*w#}5=rn6ZNE zy9CmeliU?Zv>GNlZw!I4P@C-yK>I!v9Dp}$n%llSdo*VqJKzI+2KI~vLR6@;=$VT~}( zbW1*c!mY2SsS^cyJCczCsjTXtb%#v2ka8S0_Kfh&$B*#Hu`%Ng=vdPL8^FzLh1`2< z`5a03YN}8eU9|w#8cH5wERQY~!B@n={}C78WDn+dg3$EJs$Yhc|FM3=wtZ;R1yfQ= z`Rr#u`-07zH-C0;aPTaoFqQxL>tJqYO#%?kmIU_W6@pj$#$ad^b{{slCi847={U09 zkt-)F-rlD`fy}Hwvo#|H{J*^Z(t|(1+ur)77gWmS)(|zm>eADB?%AuEER_(#(7m*( zI_OEKDzq~_`0Htoe8TeEla9ltzJ9h2jG8v3lHeEwy+P932RiNWj~ARmQ^uuS@eta@ zLl8(sQaE_pCr~o#aGEhh*xs~$@Dh9-7=V`*@CnUYOg~;nGQ(O`w>l9sAF4@Y!ho$q zH#!GFKy&?kW7DGbG!r3H$qHAHD~~cXu@9t+6cU7I0DICg=b#L&PHLZp**fZ-6#GWU zd17FKn}^3aG+83)xXj5US=-sdS+iSN)|R0@;o`^y1z+K#5VC>@q~&;99Dw#wj*GOS z2qr)B$v91PH7qfdOLb+s|2D@dvpa^zEFT@x+8^SH4@6zGWqQLCpSZHK}D=K|`J zY4(qg^X1KlxNGkqWnD3kj^kL{>8DP9vS{;4A!{tPZZ-Q5db02vo2 zFo9f9ZDDJrXicZM`)D5z9~-1Toxs-$R|@KrE_KNy?dc>9sU#^!lXL_bCqV*P^_9n{ znmO7*YBM8OA{0=m()mOrj6=0r3?~}eAn>DVQimWzGdmT5CX;NUF4=-a5kz7+_63x{ zk&;4XlD_dh#?239D1pifNrjbOWFzk&grGBV&Nhtg2uY;EEJDo{u|KM2;7X3!ftigs@iB!pi?w>43gAMny=45&~rt2s{re z9%5t+{rKJp#2}>z5(JH9VCU{#?o>V$;*p4kdUQ5v)hR`U%dxIxCdV%OhbXS7gev{W=QG+N?FNpnWhl}R(VF~fp}I%YMb z>CC2RN+wA;5Ji)qzlIOdO9r&i1;s*o+7p}B6JWdiuM{sKZFg-cl# z7@XKkAS$@pgg;>eOB7fGWkq$Qy_P1KC{_ZBwlyq;=CnCYoHxIXq6!!;cBse z?maxfH?|+9J}Ef0vy}@Mb#l_IdKNZh$x4Tk4}mC|YTUX6Dw!hhjUZ(^u9LEzZG*)S z5diX!8v#VNzP1_`0;EV#4vGv+?jcZtwb;dg>XeTIO!|s9p0bo#b!pyz_io;CMwyqc zSxC|IB0q*2X@F3jK-WfPX*(C8Rj@!ufJH~Tq+P|~i6Xb|9pXp3yXhOvK>|o6YXmAx zaUTO8P6xJxEeU1E1QMLGPc~m6lP@zhG(xta9w*@vgea2$a3p~?;!N5m0!hs82O)Dp zYbt?f+(pO6(A)PKqbHM{PBk_*ojX20UIaLH>=>0w#axzD0^N{?gd0h1>$r8b;~*w- z=tKSJo&nf%3`QpiKLSgZE-AINwOz1f)8_t}9dRZBm|6cv*3zYm#eoBd^w7ZITcc8G z{w%Jz;v5#WH&QJ51X7!#Sp)`TMs@C~Bj5CDyRljzRe^02YBDzTWL>ZIeA_)FIqK+3m3H0m`IbW z1o+C541*GbQ~Q}L^wFH1O+#ibj!d9bFwH5Uwhd4P*To~UsOmU~(3nReg@dQc^o~D4 zIVjlChd?25Y=WR{t36i+R>0}Us9K$({y+_)N z8X^-XrI12WmvR}-mHGPiZhpM;7=4o^^E)Z0dh8Y$39>pPk0lw?EFnTYXHWr+lRk~P z60RSRuT&`dMbdtPx^x;}838DjkdgS0ua(7t*mu#&vPB#!l?q;|f*Kz)`uk-sd^hoo zOD}!)-FM&pM0g0rV$q9^C!0ppXV8ulF-am}E!TnGF?9DJ9O;8yN1#-S?(D@EUOZ6W z+Hn4@xBPPd%GImbvunnb=jpa)K!7vrf06{04;(m@G#g2R)Me*#=V#xx_a zvj}g2#AqHVBU!6LuvxX0kEOP00a__s=@Q`c%sd9-~jae?7*U7~T zS~+!gD{Yw+zE=32BCx?<3lWoYS7uHwl&LZ;lVDNHX-GF|{;Ev-TWTv`ETC_EH&f+7 z9GQx^=2};o3p(ajsFVdR3WL(Gsd}RzYcUHN3z*cAxDZO?O5-G< z6qwan$D21S(>o5dC2ni4uo`3%P7A{=)h40*SlYjB0mvHZI?wQ#TpN4D33t(pb zQS18a|DOBre}D@vJg@EX$G5*fN+K7}}bGr z0YW36NTXc}Ge6e>Qb5Lax$oF8KiqK`?Ko8Blk5l~2yh+2jaQ$;ik5l`fktY>ffjLZ zfG8futbEZHoM>dreF9wR(3Egk)>6l%i#vJg>Uq3m^&GBRHkYn!iYG@Vxb;9kH*Y(_ z!@c876$28kpgt){I+BEtV5@eCk%^VkP{0E1(VSgKUAo;Af>A1B(fq=pe_|iGQa`Sf zu)#mDE%mBPT?AUwx)wV?m8KTy)yEVFrIb++)}dyBHh2Q9HEro6moMqy1#9Lrr=_0# zqf`8R+fjbFe-IbV;>J1}60S8%(zx28qKZtEhVgV%?1S|D*qNaJt6v3H#J-m`=6Z9PcdS5{s(PAw3%HB?+3IMg?=rGGdH5kiyl z6&+I*I;Sc~G*UVUSCT8_nCR()z7a%QGcDOVV?8Y~*1Dk;wG>DxaF9p|2`51%@EIMS zAefkdM|Ywtfd(O5Hzi*F@@voj;uk)@{X-xAF!$egANSt#8$8czoXkz#GB_}3j%?v9 zSg{c5lZH0vxCTS8uN#gHBlaJGy+@ahBuX3q9J_hC3CVlz-O6pd`V2xj)HD|uXF;X;_(i91?b`WFc)o2R z2Po~-?$cpOWaW87h(S1-&{g!FwI4RfY>6Nt!Ic768lL?~vBI&bGEel6@#OF%eT6b9 zDOuE1$A(!=tnFxIRzsE`P?Q4S?wtyR%c9m(aYVv)9~=Yl(~1fnGS=3psR@c>Ld{rkuEL3a#5=6WuZ*7Vb(jn`*(ohqRSG zR#utO6@pAclJf$7+cV6Mcl2=Iv0(@_B;rbw(|jgEH%nqB6>+bF(B@hwQl6%%7*JnP zxIqBII6OE)P^nZn+TV}byc1dRP-m@W(fs+i(lOnWaC8(hO~QLG1QpMxXMBucWDK!w zFM6r~Kq8Ug(n~M>#EoD6@;}`0t#1b(|Mw68lCcd17#cpN~(HFZg5~hh<%jykgA~E?d$? zOFC`*&{0@gJIc|xTGKaKW=G$+rKeScmDC!gG|ykPkgHeDA?N$X7zc%pdBVp^|44=x z9YgJls&S0gh7uTY?5z`_r@{9`)Ot@!$%>{7%bV-D8cnI<)1NQ1Yh;o;j|_0rj&2sT zrg{F#*_<}372j9ne2pT&^UI`CS%c|U9>ww`Q(ozJtY|TJQ7lK{+tfZ>1t*FsReG{ahR_@vWFk< zILvELU&gCXUI;=_@O-qCs6aDO86jU8BUNmqB|DdfRJ*+cCWHlcjG?rl{7K_ENWq_A ztkBC;Y0zj!2qOt>=#%mUrHU2!p$f=ED<&!)r_FBU(-)u2#~#?toVs<)Zc3n}V-+YZ zg-#37NkLM$+}Az8*B?E~_Wn_dfn{o>!fPmwr!~fT^7_Ozl@&XGyaS@FTHuwwl(SGO~LmlgdJx8HXI=*G>x^%U* zyFCN_Gr@l*0hn3;*Ot~=w70gMRIZeb5>GZQGRx-ik_%5kBAJ!VAcbIdLx4-YMWUPb z_-L`rv57p}hR3<{P#=GH&lc(*O!D^AmhrNa7vd|4Z>dOHDO};OZD@$W$zoM1)mFI* z!R-1BZ#`of3E@z|vve}YDxqmRFODIaBSkkN<(E*1$k?h|F9I!*%5u}gi9FzXn&!Lo2XTRv222B@G(`siaZERvU4ITTCK!wBvvFK5xDq5A;Wr8 zYZMNiGAxA^%~?M2jFb7RQU>)q7n)nzYfaaC$vOp#grFt zN@o+-ty{onH|^uIm#swxA{xg_0a-_Ka5TqfHyz}j{evjs8$%okhybk|+sd!XKp!X3 zJN^2GES4Z3;b|I+0gloXZRbd6$LdN1NFgcYixh^(;EDa__dFk+%Tw_@gpZp0{_;6YR{W?f zETyH^X=j>cuZT4At6*nUbpq58n479GuBC!$g@HeXEo|dY0Lo$!B|`dUmM$f(5Y#1H zd?nb}J;*J4yD50^j76QCGq06~q^W{^ZQcG*2yHp=R;JhFC_&8DH5O+=1t1}-k=fi9!9rXkruYj!SaoBZUxQ6`H$6ucaP4sc0=R5pl*xCM>UhRS%{ zR;5FI24ROJ0a`fWl`|E-E4cpt-7Id-@P>6uDCqz+^i37{{;qDmyZs1$#Ww~xGUSxX zX{JxHF2HnJU)&xzyq3N~76PONOFDMYBGH!Vp-9*SY^tXZegEUA!IA1~u3kj)pld%Iz9BPW6z&g-r^m$eH!B1TkI6b4K6v+8P= zwp8+c@=B3*B&*sQxn}u%7PK^Qcr4F&xlC(1LwzE_WTnEtZra6o(YKYE(T1m7;brTV z@b=SJGT~K-3~NNSeQ!Ddu@c7G+(tIU#J%Z5fSss<=R$^|tyryJu^khb_B8RFL|Z<- zt$>SufUkU(HaBp|l6IE0W{h6^lgBtPUSdu|9W5ybpEv`|F@lrt!QFHo#$Z{)el=Fpr;@}G|% z=I+CTENE$DRcjr7B;X{F0wfLm8sSi_yS#YRvbA z7RQ$=0?-ax_|Ygp#F+&oP%_~3SuK2S(*b5RCdfFFuRVT{&pfn`-yR+^-JOIR!}rOE z8W=E6_6nXgtq5aQmHieB|}7dp%pX z&dB}GbO2`7|A}?}`R9uVAAC?JlWAS4l*|^nZUqZZU&;6X{;z1M&*1wWCo;;b1|(fm zJVjJ0G)XD(5fnU+O}!&5X|7|k?DNu}Jz!d^7A%IRSln92k6wHcSx4fjz>b4!r~XLW zz|=Bk^A}eA>I5GIYhxQTg{f&C2t5r4CSoH7B345v)MN03cI<$IBLf^Q>CP4S>SG63 z)!xL*R?o+0x>f=)tKsk?8k!zeM*wlR*XeEj>HlAQ&1?P^b3m+G-NxTP;>}y&WO$uH zBOQT*!?DR6pZV=x9yrv;tIk}`d(K)$5D2`$H%W;-zfdYzh}up?B-p2?yE|&DrEvU4 zrLFN#$Q*EVb+%pw>ub8|liaemj}P4a1of^wxTYJzVH;};)RHei`3v~fmA+~ql5T` zJUp_)27mLLmtK0wv1dL1>ZO18ws(0a`s}{#ZExdCUouv_sdQGCO9m{+>8oI19J>3> zrA{Yc@dB9Biby8VP6D(CI}XB8)AG;MWp@^GK;!Fo%X8j*ouYBbzx%JjtIsg3g zgF}Z7nyA!J4=d;Lyo*ldnzL3>Ec?{bq(bRm5tH?eqt>+rc$v*y+3zJC$+DJu9_kt4 z2fGe)aCiz_0onz8gmn1S#p_wwQjZrH&a#NCaKnzQO%|-f9a7m@zpC=zV~L5BGIISB zS{sSmFzU!E?>?lm2^;*i7HFZ+QkhCs=vZsrP|LJ10bVJIFDo><8Ln6|i<3GV2m)=5 z)&d(;tetPX!;BphgpmIjh;Mq4KmEK;nC(Z`NYpaeVl>05#&E0~!U?XkG8Jx9I>`%G z&7q^Aj?X=`mtDh?T(Gc>w3{Xf0&9jRkixO2AZv~>ehk&)t9Fr2RHYaf-Ri$6>EqbW ziI$KO;3N3X~4sSPUx$g~TXX_VmM}yI^DjVU-D@TkiRS`CaJNMo1?Kq%<9b-a%Au3Lf2w9GfD{ zcQ1eD72e&y{&lOXh1$P=fAur_*MG(KZQB9Zv}qF``N&7k+qZAu&WW+ngqZ*d=o^KJ z9HbMld?DhLmAJFo3=~%g7#M-AdyVmrU1ywr`e1i=_rK5VihmhP&Rl|-_50R$zx!PV z1_qiQeDJ{_D$y3q!gXCO^@|(o>n~ZqZr$dOe&iz$_Vo1Bhq{GY z3PfEBRxU(dd5|%MVx0u%Uk6W;cs_UArGSL-Pj(R$w z*wjD5M6P7PSw>POn-IKu{Zi5)C@SRdpC~#A6$`4mrcFM*RUR1<*_OLyiB-kj;zePI zZVagbVc<}@+6E5gfbFkKZDdx3w(_njYza#{gIBSZxQxA*YS#6~0^bs)gPxJl;B&h+HY|;hg^Naocyydp7yz8#V z**i1=DGTtkqXsRcWrL_lq4IYhlYI~z2azwr?xW~E-RNV3=!7sqKYt*sw4rXkIU;o#g8sL%(FBZSP<90st#V>U(Ub5^9Klt9wca#dn-)!5y{q$&nC4i1* zIB6O3{0%g1SWVlqMWjw$L++GSl!_%d+K(QZsJRMlt?lB<=UnxM@7;XU+kfA^dG2$b zJ+pB>P1XzzaAy6^^^YGlA|g9??w+F!(hc3&0twA)pLG@$-#4D|LdL*w)9U_+lWzat zYP$<f^wR?Xx_!HUphW_ofKPSRYfr@De#PSa_r*}a6C=nPqozMhA;^J;Kv8!Op?im5Z#N80 zg0mc&>!G93PMoSqq?Xh;{b{AmXrONxHt$7ODge5!J}Wvq+s}CNN!Yu0@0RGgPUO+~ zA{-q;kB!3Kqlm##LhZsetJn0u@%`^S^X;#Ey#hGzGDzfeCHQcEV_< ztKz*%ifXkV%Jar-V9oE@prgTv`v@GZkk(&a2?$U)N?Hoz3Fh|V&l9JswE$8i?@?%{!hL#E<(LdJ)0a3jLEihUA|1JXEBLfDnCh<>fACOGE8o9CohHc0)x z5yYM&=)NJ7xIN)ODurmuqLVHt#~xh}F$uK@fr^0V!fID%2DwuS{2KJd-+S_jC+GafKmS{FFE(!6$ORW%@VPBp zw!Hh-zqwlj!t*NO<0xorf#vhi9WA7q>ZxyRLCxu8eED1|4fWuApnQ~@L8McVbdJMA znq-1COvA$F%N6q7$LQ`p7Jh30;1i$vBp>|1-_LBGGYP=VdOEMIk8EqwBu{IibOUeg;EB19_ckdJTp{#d{t z(fA_16NcMmP^|((fSWbwaU$>99oX{LDt;n3`Hd7W9-ok1LjT zl65!m*1NVbQTBNAY0D}5zA?2y8qpnX4SR%J^=Po21!1)vL+$^hW59g}$MW3tL^nU( zbp+*WNJ&r$g!ZjbkX5fyadf|m%y-P&#Qs0h0Z^s_4g&PhBpmF4ql3u($56#m^=|hJ zBGM^zHj7xZ04)Q{c5uL|_nBwLU;)^D2%g+;^!7o_ojW&o#dEIgz43;x0kCGxNqXnb zCm9_b5qLf#Uqm14GZws{rEo-NXWPDG$BwO-KYza1wryMV^j&t@rKj)OwddW1LZRBr zNG71A5thzDc6H#^*O6^)hW1vb7IabRY_*SUV5qL83QkHO+gmAijG#v+!Skx06=f+g zeh?+TCz`&6`SVQhpGg2_)?dJS!(0DmelnSQm)$;LRy&!NIxg9;60hRbRD>a@E^KSp z2H{%tw*k6^d~dU7`C5^Y2_74oAgK5TJf$>=Op>>rx}1F3ptq$G1k$&(xhR_225GhG zKaK{ctE_`6>GzjGsbaTNyc&5 zJ~+WmPaNakgF}qu3y_eIl*Y?mc#+I+4YI%XqCZ7T!|D%6iOvUmf5%b)*(XI=iR z`*%LE{YhZ02t4%m0~UZMkP^|}(YAH&yjAD-4-9hb*f9<8`q#aluiyA}wr$(-@u8t1 zo0&>jI2&fSBf45iv^J5-X3<@3%ewH(w-?FCq&il7$j(Ax|=!A-8lf z#m)}=VuheoMrm^&gdY%uV=CW6D1|P2Q1PHpLKG`d@dbs#%*Oe2`S{LUf|>PH>)Fq` zg4^%Bqe}?cueH*+uHd|rIP0Y4{QG-ff}3!T5B_!oj{tsJM@BXAfNXF9)qe|LBjE@> z^x%{H_=&@4M}p^Z)v5)2?y^%TdD_U-N{QAUf@GxD7V`At^L{C7F|I0RI&?h0%ybSk zB5L327(`r#2>+NF%k!2{yMqy=}Q_|t^M3L9sx|wTF zp2ur9ETiQ4v0svCJV2Vxi&6;3q(qI0B>j1hf7`l;TX**|S@A5rGqi@*MhZDhCr+TA z`1=n!Ft0Z_3H!R?NFVG!hNyT^=yzO)*SzL6eDlU{5omktQo_0G;HNAfe^nrZEK-B4FQGL_GD0L-7ikYmS= zMF04%cf9jMU-*|VevGi^v2GbGn~&4lM53X=NC<}SJU)&dpMcRRBMww9L$M5%01*V>`)I8nzz;5* z**#}E05j`pzHYzs4$eRCy#5D&`&;8A-`S38XyDX!3(2OEc!8ScE*E#At7`0r9QxXp ze9WOPW?5Sf6nh89BZ{_kU7ojUE*0NU&cfckz_qVqX@yS_{38ifrK;vSqRK^x2kyvh zMZ~p(1O%!owmVISzh(#^Vx0v}6#S2OIL2-wZGWP z;>JcUS=vgeV!)h6I@d*Nh1MR@buCC#@XZ|u`P|0c6!Hp@wmkdL0$Btmc~G)OuK&MP z3kk=(_UIVwJXmv^7cN}L*KW9hXFls$Tz%EmTz&P`VOD7beX=R^*=xad?J&m$*MS3l z@W77fUFsX_#NGG&CSjB7nj>gxtY>m6A7W>;10t2pmZ$Q$j>h_WCUZHC9XrDN-uFH} z^O?^85C(rhsLobcFdL_<1Ghel^p(M8^o@`>Hh_>uf?FpY{KhO^U6y=PBYtBYekO%Z zx+vFpQi#AuI~t)}oJXI;9~p%`hv7iaanJEIE{>krIiEgjMhIwTop4=w<#XA$Z!brW z9s5Ys-Cetwrp7F9z2-t@w>JzSTJzZtz3Q=II3^&6mb76)zzIhOLJInFd4Bjr zHxr%*Dqwv_E7z@GO2U!Vma#U$Ra(j4`0K<+05u6mjlx`P<{l~i#ap+bAaJeiu7NgG zI|NnX8XXhM(Xozm2n_taWb?nQo}$&f7eZDOIRw5ASkRDVetnw1y=MojI~rKi(nvW_ zkueiel1#V|Xg2kZasB;I@Pq9~@Nf`GX~!{f8RQVolovO?l8_h_q>-JJ9>1r(n?DqM5eBOSD}!flg(yDE}xHn?zg}FEdWaw zFFr6fKHdxnl1VseDa@aZY-vJx0a}9VIHuC``YFX+TqcGI4g`d2yYRY^4w1BO+7>h&~=n+e9f z`4S_gVzh~$Hn)xDlxteb2s`)JC~II7=keF#5Mtd0Ta}CH!bDmdB|o8TQV}ZSQw8~{ z5dCk}=B?A97PYcQ;kZC(Z9VK&1aOQ?A%r85@VMju9|5a$%v(Ov9@5qFDgsVUQwyyI=v8aS7S`yNO4jhfcK0KIiD9PG7b4nj1ywEXDQGdHN*MDB!#anVH= z|D#f>00=jcc)X>x>2v@K?yFe~7SF%>$kC&-qYu==4w&DC)6#;H8a015{)RP_&RS3L z^fi>%E~m6$E|u06bTVncx}Jyd6^KwIOuE;l`Kh)+Ja z9bA_>q4~Ef&*Ypr?Ua3GRoki}KhtT3@rp#N>Nuj-pFmYHViB@GWaNj5LA*OL%~sd8 zxV5%Pg9PnJL=adYT3pj#ptL|(9RQ&eQc8rh9s$XiD8$<*fksGKz%C3zir;jPj~n6-D}RIC7mRj6x_VC zhkt!|AA^Om8BppNy)wN2@tYLA?Q~IxKNbTJ%2C-&W6M6+u^$fgL_hYzYhJ)NZ~9N_ zvsna^a=FY4Uho2LyY05>Yb}`#FMlSKEAXw`V0aRcI4%$VcGIS3oPFwPmEW@^j|(BR z)~W@dv9XcK$;q0Zc*ZlHv3mdh{X35wIbzPUAq(fPgQbgbl1Y>ZNG8+J(uCj9h;C^{ zB{Lv=WW_2P>cIS|B#sa$J6_XDAY6w;v4nr~ZK#7sj2y6eCp~w;g6`M8{N+nN^65_p zLY!DZ=>^w3pP%0HvzZNarUNjup3bYcyC>|2Lt7INaK%|C;RVW63^G)&Bi<~J>E_o` z0K?9$wt4`>Z0;2rEdq{=Pg#1BrX`hTOID%yZ4rDUpH;>{bDv9LMI7dP#ppgjKWzn8z+>+2}wihw4SN^#TozsKs8tE$iA z!9KWS6FjsNh9>~6laA)Rb1pu7_Nk{;KKjv*{?2!=&(;^TRxLu9>1;gsUuAIz_uO+& zmkIv%Jy$P4&hA8HQv^aIm5VNxp}UvVW4p=TyOsJaJ4hVuhe`nv1Zc-a;vl82(p$Bm zt4cJ^_Wh`dDa5hi=>1z;TF1MO9$oN_AKdIeRqzL9g8xhhU}int*VWfN?_0P3;?}?R zR3Jos2EAbwUGqD*_p^TkQkkHvl#R<_JKVI|<27>#)PrdPYhfpV_`F{8w%fOG|FI#^ zK3A+*#Fwu)g}ilJ(;{RJR6Wwe7Zb5oc~}Y81pjE}Z`yAkcvo9}JZWb+wD3Wn@|G{22-e>Dc&KYfVB*dUIu7d+VcU zrRf>ZK`LR!EKz1D{{PvfZ2P-v3#?&(FXHF`dg~sTiE@p$o!OD^T^dww&sQ9jMr3=3dpop3#H-~F=!rA)ot zP;ZQQHmsnoF3nVK%Buf`Qn)(agN_CN>H9`Jcvk-@oZaUtK1ZhtMpxa3(`Ps1;@ELP zt&MLDen7?a{_VV9$?3sgRl$4F``ZRbY~23)f`3g{!^;0^G>#T{8tRe>5<>8B-zY!X z*~?=`1~@WR1jixiN;$@D@SjHpV3R&Y!V$RA;jV)NjF-yfD#`%x zbgaS;H39zD8#P7+Yh7T2m!a>b~{&JeKr5~Z(riP^Uh<% z$`yR~rki-li(kyZ;Glgb6@Z#EcfRa7di421h~F9f0m7hvqTt`v)-DD{hV}jT-ushs zxugN98nUovDWanTEhRz)=D3A2qFO>Aq{N@qhM%cJn~wlbImo}a?33MzW}Zh!a=W`3$tf&;|H(h(hW-}l)NhFO@Rs#+!!g~P;4g>Z`HMu zygF8an`%!Wg{CiG<~cXti>G}ETz>iT^H|Z^K*=aTn*zY2u_= zEi9-{laj7Ua1h3$1_+cQ5Sq!7&(X;O2PX>b9GK#f-XVIXN>KK3q=TDrxp00LFI+j7 z^A@y_bR>Dtua3T>z;AH~e~t!%8q$u$SDJUJdxmYa; z;=)bJn)yuRVf$etm%D8r42?y<*3#U}SHJufUh;~U1Muzde1|u_;SH2aB{Wh?p+r-2 z%jsidV_V+$!N21(pZKRg`p`b~!Rz_QPkbDJxt(3N^b8JMZHN|*V8e1)w-P$qAux8_ z5(ljUl0qN~d6KCVI+>)rXg1#Bc@QYHuW?FcoMM6GRFPz^NFtXfIa$I{3fBo3&lMRS z7>0+p!FVoepc(6IN?Pf{bDw*q_~kEu)jG3lK7H2=4RB`FtlhhJ^P(5M=(^$I;rHhA zc_U=9U=EG5TlwI%m!qsKZn#-1Yic7krt%~v$@`SSRYb~q+KRm~d!X%*Dj;F?Ou=?H5X-~&={!OY7>d;5=U5DL+X&nL~jB{MbCWu6f z0PP@9I8u@nE_WOn;ElIFN^haUTh3m|CofseE7r{Cv{|jRq*6FSB7|i##B~saKuU*t zH^JhDI!>S6!evW3c-h)TJbOte^V=IKX~-7?cJ&VN%YD84=Ewj-!2HH0>J!pf&jvmS zjS@1dnGFx$jw!-~%g*IvmoyrS{7>U-ZPFCV#fm6_a~;W0!RL*?+QLJJ1|XS0gp$v3 zN}saxe=Vbg>3_ErQq>NUvU99JK_-o8%)oFCx>}%6hP+YqE0s$8_@_T%Vrr7J&pwN@ z&OD1;F2_R;KdiM@V)fd!H~#oXKmOK@H-0_%?E}C4gAU`;%bvlZgNFck{)=AN_TBG& zr{&zU&wbV8#N;D`Bg3o0n<;0tqt`8md0h|~hf0%-DkGENdsGhhQ5l{o!hxjYkaQ$z$0g}VTu0(a(^1e?Q@)xEL{TyN zewFVpqmgrH60e1@u7Xt~nyMgx`EDwiq*M<0%%^5pq^?(z*>vY>^ObSVZZ z(!LL0Q;MoxvIrq&w%zR!Pzn^4z?94F^(oGq+r(AN=kSch9W3f-LOKrnhjZMqvzyxw z^fO-ZXi2+t)n{>qV~vnhRqwzatH8Q8MkYM5yy`e<&JPre;iVYDtbTE?zf2*Qpf)Ozl;MA@&Bm;7bAUuY#JKVkSjr3BMuThnTvGtH$J?P zpZ?^h6p96|eZ{p*OiYN~yY>vUv~~RLr#|`dqrdB|-}|1w<)MeGqk%&Q4{_NuFMspV zBS)9(Ao$VP`1r^6@85rAsZIJON;z|=w^wdLkZ+rqa&SX&+V)|BL<5ANc|P5VJAE?F{%uU&N}1+Q%JSsEcF zbqNPY3OqlcFIS-_muIpPFkUQ^a2*6((filso{NDxwx5Sp?VaAc~&y+``FZO=guqJC6IrT1i*|*WJJ{zIB2D4O1V7LJHZF;ew^;fqS5dVC39o6$*7MI z&nCtHb_YNo?+R7Z8L-!|Sb;+Wh>>yh*d**c1o={pbKZh^3z#)`E`tLDdk!7if4&fM z`1ig07eD`n3x4sdTi^ZQgAXJs<%-|l-u}F?(J=xuf3Kc=CJl4jVQwd4v2ph^Ig*Sz zaYBPG714+L5F2-(iv?(JMa=C$w>9Fr3EWf?XT@Utb*m^hWDr`B=^IAfy^-?JFnVwt zF+7FV71N$fY`iTRGJ%?;!ZaW(tjj&)2bhaYVBwHHM=bcV4Zx)GP zJwR#a9`v@oFqMzg9BU(mbyjo*B$J3_5+o!Q*Oy1fKk-zT@1-w$89%uBW&j@FvAyMW zuYK*$wm!P$bRem; ztUvWS|J?Hy^!4{0IdJfx*@RA8&7w6+`PK(tN^4^_Lf8rW33Y7cq!0)dprrW`!}qps zdP>-;IWTzq$p78?!XrsJaP7}G^60S<@O`d5eHovw!Y3hIdZtRe@t2$NrQrM5oI_WAg1lET;yzL% z)t{zqZK#VfqIgwx{xm{62%)JXg)5=p!OtM-TXl=xCQzSZ@sZ36x?%M_v6Y-wa?_Jq! zhV|>#zwhCV8~=Iwzy0eCU&?;x#&6Hrym|A)bFO;sEssCC_1vDm-s6%SAq3iSp*{;O z^)NIJ#ZowCh<>)Et(6TMHheudmixq}Esq=lxZ;Xua>pHa&1~E=3Bb(yQ>=74HQx_{ zqrT^xdEW)6aQ^8l`L}nz7%3D|7&@Ck5GW{mKBd5mTIX5Eu^RnGsV?a_2rVe8psKwe zwN}j|=m-yGXgCINi#%1$$J=k)iYo*nNij<(6I?Y=)>^mw;c(sYV;nW;O-azC{q>mL>|Vc zU|@FB?KTJyfkrE3 zs(Y=>sLk^bzKi?}eKld8E8*)#{7#`TR?J zdX8CKN^NIDB$MdIEVMKsXSI@SZ9=9J6mxmBy_SrOLCLcKNAqb|yl63p4j+2^wb#C^ z@1~n>{_)JNJ(B>;tUtl};0Lbf6QBC{Y`~=Hby>s(r|?&oZ{P#3xSXUEl!JiB2S?e` zKfy$$g4Tl8M1t83SsX`EpGeS>PBP{Blqvzzb?8VZSk~G=MoKDL;rR+B42NCYwtd<2 zx%}n_jmNtRSUb0i&XmJLhX#1b`h{G3(oz;QWRN1j3j~3-+ zjgKDU@Mw|Mq#nmw#F2x4PSw9jz9Qy?&5-Ps##sKkhAj|iD0`4AAjWg(i5yH7A)hzj z_X6-L<~&^&64os+l|W`vsJbkoK5aBN(n(0CA>kkch4z)H_`QmGok|&eZIX*Z!C(`L zCCC?%Q)SfA-YDsK!HZtVzkcCgxb2SH`07`_%GSrWo*?T_8jzpk!00683joyDWjTE4 z2mzWxp+LD*qEe}l%jbD=+cq9}=pi<5-ZHU#`QnGRKfXP6w7Z*ZU1p9D&Z?=Zf?;i2 z$#G0)qpcZQ>u{T!sjF|KE|tPfxM-#EeV=@>z*HfRp3K9*5F8tXvKLpq7R@cK<$3ex z-uu08efOm&pSphH)vtav-}=_KW;XJf1Yl_yKWe$x@a(L3?(8L%^TIxA_ zb_a7BvUoZ`2L^oSI)Z$~=ko90&qSdBZUW&c>M{;rzG4IC&S|IY1q8y>y2iOp8SxVo zN(!WkG0v2>LO`a~ZQ2g5r38XRAsvSx2)KE7FTdQ^%}drUiX`smIh=w@b zuPVcDszyf|CdNx|d59;vCn4q3&@>SaDBs?zP@6&gSqc{!x+dAQ9vX$WY)1fk~mYMhd8C#biE5p-@6q0yx|QN4mk&RSRN^wR!Dp zU;B+4Z@lrf0PlL&yZFKvzA&?y&m;gd>yKSmTye$F9e3Q(4#0{9G^}364S#zL%NNgQ zSKlyeXSdRsa`Ci-=bP4f#K{-cs#gF)N>YwPLIji)>>M6v|7ecJWP;TlO|+#_2uG0= zlEGq;^S}8ULu*nM<~7yvpU*vmWvva2m;Bm2S?EYVK*j$aI{t}ij)Rs$XbL)q!0{0Q zIKrhdD;Sva_{QV=$p!GTH49kUn5JS|*+QF&)o~OzJa&Yy{B}40de!M%wR{d^g$hFI zh!PlvNrS2vf6_>#V~T|lLMrUp*L+_@Zh;DrLei8>uytU9PdvDjZAVABYTZ2EdHOQi z>r;5j1`R7=9P;(0Rs@bUFcR{Fvk4OvRb=ubwF5H1btE6YXBR)+egv`!6EwAJD(2AE zFWz2xI;@z|WQ}=Ht)!*-UlsdVw8cD_e~;T#N4$Dv6N|VTB-*sVhex4MMC|KE5001) zz*BDKqJ}@RX3ZL2{_>a8+}c7@LnCwM&ZVWf8Lc&U-E|jV{NfiG43!I~M+HZ6_8DiB z&rNak*fA!?$N#W^;yR|wlS)8KBcihvTIzA?vLs!H`gDeDGEG8CYx$uqqgYg*t56DB zf+I8~&u1!Mq!^S?Q$;w?2mOO4!7|6I(TMiew#hTkKI;{ZBX9fVFK^Xno_QvlHf@^O z)MpZane~URb?esa?c2ARt$F=&+SV-Lhu6Q7Ijwahgi9sx@uSU98PJW=$I*S!8jZ9X2GbR?g z#>EdSDXT+4Az={F#5UMSIgq$Qpz$z}!cf(e23I(w5-!^Y#(DVIC<~jjTrjVVR6h(Z}gr_d7oJHl`#KX0VJ6~r;?CK84zD%9n@!W8nYy`8Io?2x(86lvVRlBVPd?a7UTaWQsbj|PJ4OgBGLQ_!+ zWvfK2m1roGV{~n+R;>|oT~;fkK!dL|$z+1Ibb{I0BpZ9j_}54FP*H;WyN4iv)m=@z z`s78FG=}~rO`BL$rBGr!kd8!b#P1FM;jaiBAyJWUy}@U=#2&DxF@p1HJ(fn1({ zeP}laa%Ik&*Ft^D#S4^G5tQ~8E0F5MNsiH@MN5U!5+M{R1basdeB_=T6oQHYxakld zA*#Yae>tC)6Q5HgfF!DapWaQ-v9U*FRH>t`h``WkrJF=Iq)iLGu^yW0p{c=C*6mFO zHJ?nFq(cRN781??1HjOJDk8@25ZcPyG7sU(amtGaZ1L^}CjoQY)p*NcqfD zxbTuw_}V+KLHR~lrrPQ^mcBX=gt1=72E9Urp7&T3yD}A{w#@;HUaw2I+`Ri3AG`B$ zDoF_ypXaYx#3!Dy7Qd{}j-1v~H`11<>v6vKHAq_~04zPL$0j_XJ zCtdD1*w6d_>j^ruNxt;#4J>P^qu_fWTm(K6H|FLjj(Z;^toe)`Pb8C)SO5G`HXj{A zBvPO&Xqhyv|0v+;zmRR`59k1dG*{(B)ouLy5okq)EC@xYIvx2>#42Dx(5p87;~lqEJB<3Z^P9R-jNc)Wk{!JQZsU#K#oEViFvSNk|%3#!M2Ow$**w zeo1MPdMQacF4;_mlgNRt8%^t(5og=m12Y-`JQjK%=#w z;+M%yPT}jo$TL5AsK%=S(AjKObar$uJACBufiurKhfR+>JhREi){GnA%&J++wiJcy zqFu?tjwalsL&5i~G;V0pW`JWRsKn$`<9n8{`eZiZ8?hZjlS4_g49I&GUUTw7QjXxg zcRU8tr7N2vp#>GETA_z!k`4pDl_L)SUx!w})4^;tl|Rv_KnOt)wLzt6g^9p+10X8| zXU%J7_sAq)-*|x6pS6NBXEiceR!9Lp9?qYm>z+MH2M4WuwCf-&|6VEy(jm~AsdAa; zES=4|jwU|*npP=;5aLahgJ{QC&)qD6qzf`+8azimCh=0gLJ zNuu#VCJ~{4QFMKszx=WzeEy_7UK8Mi&x*y4XcO2XVW#lGwcRZf=rt;pg02*Fw4y3L z6pN5AqRSq-IjG_Z0;|p$=&DV&uMB%2%#MXNbUXnc1T#DROad^oo^taN z=!6RbX1COn5DB#QsxrT!MtbPhCZ6Iou%cLsl5!AM6ZXNUH-Nm?)R&$RzmEm8bIE9Y^`c z`*-ue;Zfdy{wmtC2}-`ku_8f4RJhvvErcNLI&2vl=l^5xy#pjWs7~#4tNE9dB3FNzZwnPu#J|QOAOJUUA9^;FKdJW&J%S>Z*t8 zuj@1{Kq@Hh0|DdMG7~VTQK_qK`h8%mBd~I1mjH5|(ADlH652Fjfh}&`)u=Nsb^0F+t#l8x%s1(npn8V~D-5mvvOtv1(n2O5HjT z3EXR#Cghb!FaNfs>^LfXz@AnNyaK7$VkqQW$Y!#XCMT)Qn}zmu!j1uS`yQCA7y%x* z|2|q<+jg9|;-oJDe*y6FSN;v3{q$#!?TT;H<24Q7O>cTr!>&^ZGhhPxdkX1@k*as9 z>Ja9(PEa?cG%5)hOyeKDs$MFtr)rnWlG87tWgM1gGtxMx?)L zz4srx&sj`><}#Sp9Hyg{pr?aOPbc~Q9$IGh(>7}cZ8Q34pV3dpjD9-$`snKKr?a=4 z&Yo`CyE7-MLM~Sz%w#Yoc{-(*(0r##oLU!v(z*a-a%QBzJj6$D`5oP$WUV4o zuBS^R+!R6byv76+T3TssYb9uDfyHy+?2};bjO4CbEEdg%jSsyTSpVLCdEW~^`{~cH zY}vAA0MN9ieei=H{OYTR;yk)uoDQQx3iaAK)Fl1|LGmb_ywWPo*Nx*)Rxvezj}JQzj?m>`|)ifCv&9vVq~|?fY4?dl(6)k@`sE34gQ! z0DqU`dISOo5#M%`DOeLt9c%rXCfpF|R6$Y|nfktty)$=+is$&~yd*JK(-(5>BuHzxIf#DrN|+B?a%v_hc(r!9pumqWhA zg9IZ4mc8SxZ~On2FJJ!E4I4I~s+@k-nau#8X~(v0*|O!5dX#M-8_?0#QpW`}h}a); zgeb}S6M0wl0KP`&pDsK<9wv%arC>t3^8r2iES>qlPrf_Q9thTeu~JVatfr;GgUW_! z5RjCggR~6&a7T}(N0o!M4OL@)xqFzGoVpkrM`?heG8IF0*tG!u$gV-CP$j~ua_!}( z@Hb~I;$_$0&41mqm8=op&o!hn$yn6DWHsh15AJ5tMrq|?iik|p4x`|3>cKBs=ax{_ zx=_~<{Qksu9kVShO{Q_IhK&6j;cF{CxWX`tli8&giVqEH?}yr1HH- zK~^iO#3HB!SQSc9jaRKYp6jk!#kbdQ=bwK10F}s+@#TF{7YvvH?%XrP?Yo9>f)1K0 zDINuJ(J@h^kfW+9<8VjT;J7}*fNV!A*-Q>{1vqILoO-+yR`N&F#*LdU-1yLjA9r_m zykTU-(HFnuB`D2qGLdFO!*^t&kmRu(E69itlu5p7WOkr9N5K=HA{Lwvm5pm;93Rx5I?e)8O=CZlu z0w)P9M$!->5aR$yN6Xt3umuD7R@G!-uLg@ zr(>hVYZotB{Ilz>`|P|geBpnZ0YKA^!DB(|1@t7d&3W;b#%!T6qd#Qk?;GTGFp#A8 zPs;vc+|m=PX{8`CmX4Mz0ggb(sCcC~O{4pI5R$y+I!mA)lK?AaY;YcNXN z^a*vVSnNS#OO2&`nTq!JiglV0rA&X0DSYP%##e|%iK@!1wj2hF#*&f+`QXGme?toG zOM!sy?~a5AiArt^(Fs-dfON%2#nm61452XMAfB;EEK~w`d>m=yzBspz1 zZQ5ja?A$pZa2mjS-}_#k``qU?1AwL-V-|a~zG-lL`f&NdH1MB`#SeiKn3{28)v*W) zRAObQ95JV@fC&=K_y#ANmfY(Mf5{6oB7V$I)3GE0{?Ihk2$Z9kTX!7b>XT+uj`2b` zGG&I@Xi_rgs2FWaM300B6+@tow8;fJmYT+ll_Fk!_Hn%Nyyg7+?Hl>{oey!_?qMfs zi+DIh&};!55!HY???AeJ<=`oeBd@|G4Fq6XpGrzp3jJuJ$!4LW4JAN3+u)27(Bl^- z@81+B##Ke`IqkGnpZeT&|JD8VuYbK605t6w@cD7v-tYr9QYI!V4&Rj=9E}NoTKbn1 z_3s!#JOf!nb}=0Qm^$z@b5ybh`U-hRV{4KLfT@mLadZ7DsW7e+Bce_`^2Y)5luQ5* z4vf;5Z((JBCzWbk7a@{*8>4|u<*2B1r{kOrV}eu0uDslHv0CE^3%Ysl#V7O4_4|pc zRWAV52+nNoqa(9qaH!uOp&w@BIOR0bD)GT8L4dTjK$wFdfaB)F8Ot59l8Jp&V5G`9=Y7;7|b zha9`UL41G^fC>@H-1a;znHYi)wF%#{r(m|h!EK?YHSKW^3fy^OlOjRv$b@LgK}##f z#xS!V&R*$$2Ur{P;M&!>+4C3Z&aGRV!wiou{k&!X(6rQ6oUr^m=?{^k`HUKr;Of0a zZOGh{%-EBMSjAd<=!t>ktIk!;KTSJ&B3Vz6 zWgSs~2Cj|g00TK}Ya3!MroA05I1OfWrYGK>9ox0Dy`u=svQgZiaM}z2nsyY~si&W| zIo&UD47G^Si4uW1l-#Lj+|Z;1Y*FHaoc+>Is5milfOGp(7uXPL)lIH5#8f zrAYNX`o?y{A8TXPm~5cTZ!1uXtp^!49T{p6F}}oaxohtzqt(RWTmRt(o+!v3mJ$g~ zJJ#3m)b%_CzJ!G^hqkt3jY1e8t4?xs!alzl9Up7Km^;Y^Jy_+R-};tj0MN9f$KL$r zH*>)S7mTKRB#OaWM#d%xjA?MxdWao$aOT}8$(ttnUQZw)@^O#l97e(hm=8lt490VP zrxd3o#fAn^np8S;YP;dLo&nR?Pf5r7V7OdmW=kugk(UN`a<|8FHamstDNv$Vxqsgv zaiS!LPILJ7PbtJSt!aMv?BR4s#}<<#k0Ydr|AF7%^^2(i=hKYq?X zb_jiI1Th9RV0+D z1VXU~EtYCAvsweCC;{mxhX_bmS7>Qk z(+($RC$6byC9Y2w`Gmk>1KhfmmK>VPL4=zQSh=~Y*W=Tiz4sxo}FpEE}?4L0A)$iNDJSNF_j{Ca>I&xtH=};=& zm#FvF`^}QbjGFX$r#|lQkr3433#n{SHMaD&6nvlq7B7W+ELQ*$@*}Yr5%!JO*fC!6 zlxuqEY+srsfTkVh<$&MvBN8Cl3}i#7RFFk;Fsqg$nK0$d`t+wh^U-HM^O>(wReAH9 z-`orUns#(pPfxG=N2H(;TMvv8$B`r1F`7EB;9D z&8|W^yE`R_Nb2{J5(3E|g*H!^1GRAqkx~@Vlh012wLM6`{TQnN;Ly{8Bm7%GR3xg| zrhjkR(Nr7oXN^1CG$9hp4!Id{KYSN(d7qKPn!Wi z(~eZ@?d_?1kA ze4XB6{(}U59xeemxK-eX-N*+C`oJP;eEZ=T&Xtl8OBJ%A@W8&|Cdj{OM|W+Yfqz7@ zo+}`(!i*m5IVU>a0MJr-GV{M*{_;&6!P}u305oli&7VKdrt5j4M5$b3V5EpiNqqcR zpvM7NThIKBF==+M)-mQ;(=arUIPhsW!bCH`T1_hl3H@*qJcu^(4g85cW<5BNP@s^> zrV|f>xW?cy?&(}D#DFNV3L8hpU8bbLAFsUBw5AUqYy`bs$f^@a z4n%9M3h4QNagG4=^mH`?fTkU}me1#3lx~EHNh*^Sb`6dZ7&8TN?@DE^M}AP>J$2p( zPYftdUtntf?!-CSB?%-1VrvP3FffiH6a}My6s2(5 zshA$?=%4;|(BnK7=cBP?L>MmD*ga88rJ|eGw4*HoNVk>XtCSY3MY4Gp1XOB{Flf~Z zBn)wNQNtZyx$D5}*)!)34UIGdfTkUp_L|qcn(ut)yFX3c^5{5~a+U4-hJ6<9h;h`n z0wh6*H^}`en$FgyDgx>vY4w!B#%~+-RKTKm7QcjXPV2PZX*td`EZ0ZM`6t{25NnKR z>;eFdQyJnv3Sl6Pm5auSgFpRi`r|w%W|dHcp~)Hp#WI+HRR5uAO*_)jh?i`A4OKH)u<V$)p{4ELKq88&Gk){X%f6?DAI&S}GRzgedmN@b1HFVBdm zdWicycFB!o|GF6fH0{W)X(gH}z{>F>sBuauJ z#Ar(I>(ulVk=V`hTSvJYE6i;xkjsWxtKJEFG(L4IK=~8M{_8?FQjh%8Q9~sZSMJk8 z$RGbv&*vR~BMzeRXZKaVJ~Hij#7{t2Bd93WetL0}Anr7BZ^ z4NYs>u@D1@Ki8~3z=8nDWZYh;#c=WxWL9@VBwb@bq-__TY}>ZE*;{R{%{C|3rp>mk z&92Sb>^5UEHg2}{&A#8CnZHlX{oLoA>s-(*+;7p}g2u%swK#lNy^oE3Tv`}^1jybMuNGP9)%49T8~;t2wd|E z+(3{JNK%-MLhsmGAXWxq{Z%=k1oB8pA5YE9k5?^NeUP2yIw%;df;a#oYNRP)-v%gL zf&N69xWuxA<}}8?n|7|Xy-nOH);+236yR-?Ah^%|whkB3C9-MFh>>SIvq%sPe34I# z(@auSt;e?e{C(K_3~QSe_(!IC|r&l zCD%qHcI)5_8pfsS%U`(pko4#%jDXfA`t;-Botv&~2WM1hHiGu=@L;$S64dP<(t-K3 zzA6pkVywvUgY{&z zQ(F<-&}h14pYo@EP~SyK8t60dFJnIK2NMv2?S5j}RcjV0FeZ7yGoXundONL8Zbx-H z^bg#AX3RiZVhDLW%(@NcAKn+j4|zYm21>aCi3}h6?H=dSyZ@`zk87gcyJS5dzpO+q z9Hg``hE!@Vt57=eiL;Hlqxfrjg6Y^!OKQ-QXo?9(25}2hq`$J;))%_ny8R@E2VdQ$ zzn$7A!ulvZ&Pe{8*nPvuNN_!LbM6cBJ7~2+2ujeUmeS0KF_mWGksim`-6u3_j`*T1 zX{S(#VLX-{(DFU)T_R1VMrXBw0I{Hem_Z{}c=N~kjM@rX4HDr{C9)DIV_uVdxZ}G4 za^P?r9(e_Pai$PM?oWsyu~8TZ@|4|(F|dF*$K0r*zgH@gWEbaNDTN`8F=mKkpgF>Y zMVdou@Q0i^+-L837&-B$p5}rm0PGRy3zD8TuYng0S8y!5}cCEU_8-YCp5p z~*`B9DNDK){8f zy>~{79-R@}UaGkiyNHkq=eKox{{)Dc?%v&LXlEs7W=*1kQ1#2^4~=x|GGDhZjd%As z#i$00rlaUk(xx#%cPrf(6qqHSC3FV@8Z=<#EJ*p-r?SA@mM+JTGfAu%E!&vEv|i{5 z>)$`iyL#7KgpgcnCakCD=d%jRXyp5#&7sma4jUkbb;*L-mZ~s~BO@v0i{%sxEX~5A zF{n}zv*nXxw5X(+GzztC5G0;g8<@|5`)zrs2Tc}76JZO?3Ls_<9xW|&3YBP_-33CJ z!46w_g;REN>cNTgMz^Azz5+QU@SQwM06*%8fp$H2kc2Q(S*Qxll-{e2z>qc}RX++& zTnwFt;7ViG>7TFjWgzpJ(tCPw{FNRrd{`6yIkgB}=tq_KZx+aeoR;3SDj~bhegZMr zzTbPjo>bMEdKRDJc2$_veEEF?(uFJjx^<$o08!5{R98ub?XpLRK|p2A{N3WrLBwxK zU^txi=;UnsbcG~`zbF0cOGoBLT1f)J7=HQ+taSNMeHHiP3>7S6bA+0CyT5S`(Wi?) z-NHpV>_x##`M$)ig5Z?!L2}%pFzp;F<qMh-zFx)bd*{PEigI-dZswzt{k`sQX%DRpF4Az(0&6x1kS+xYJYk~-%#`kR zdex2`_+QqL;>;kb>+y+-hK;d|OYf)>1JNnX2b&?s>(!#nq~&mUQE_xcb85~w&K zlTnc3I+Vm=&8nZ89#fp?>7l4+Eo9cN>pER03k+2#h!%g9V6a2$j!p8jER_4JClDAa zhO^r#Uw~Lnw8is&f$DlPyb+V%%VFF5QEf_Mk|uy?y(``u_1Jt;<(KBRprwJ})Im1? zB$&kMouj^6{rH9A!RM}5>%>AVnO3Wsx28h}r=vsB$ z^Bpol-{4Zm?~(^r6OxPk)sdeALA6FFx+;N;n2vuUyexin{btZ7Bt@Ash#XyW=R ze-nRg7TNv8fxGay^3A=QxuW+IaojPN5=u&~{^)xoS3|T0;@Chz*F@a-|6Lp|spx zivy2+cy70F(jaa20`v&A$P|(y9EXkec%oM1pAN<;K|B*DOh0WM(5xoU51YEbdFwVb zSwf&N$Y7`fBR_YwC5kdD>;PgU38~8jK}OTPW@y+{1aLx-?7YJM3-!0VNUzZEDqJRF zn#e4HNQkiG7QDzfI$i!LHANPbvD$Mh!`GXP6ai9CA^1ys(Q5*lU?-88aQf(B2> zWWQXg@;lsF_8PjCjln1^7l5w?3V`#0FOpFAnR;P=y%pn|;Hwd9y3aN^w(ejIoM?CW z0Qj~096#Ebci%BW@@4+tAeqp0om#g&pZ~6W-M%i>u4V%vrDPa(?|zx-?=7O0;|^(- zZ1EF9HYd-@0h~j*n}0jDE?srOl;33QPl|>uSj~}KCBSgB z6-}5ry}99ew!Q1q!rP2NpE4<3*SPzrXw-^0i?sJn5>dk?Q~kwgiO0=c%%ft1U<5W4p(0o>+GWqaP zP&re6sqOh&hlenhcoii3Ww6-YiUI{eM$YW?UAas!QaxgYoKMUGA6|z_VHg8ymj{Fr zcQqrMxUp+dsGT{Vx0}+fq?9+S+t%!8)Z%HvAiM1zoN_{L z%}+zd3ymc5Bxn@mS>|`8r09w3QyTKeBGmkeC4VmE9m>c{N!cHJX)Fj77&&5h1HS|$ zn35ZG_C^@nEAVUHV>7LHI)>!iul-J&Wu&`rxjEf$-g(W_^*pF z|6LZX_nr}VoKNBbih{+$XEw^a&nI>1+*hRdk_#>`!FtQS#wq7IM^wcZ#} z?)8KF@xUY5yu0h(z|K0WRk@i9{Hq}-kH64gT9^^y{TtX$rj(^luDiyzoEruigE-QL z49<@JQ0wAB_rvqHgqYHs!%+V5?eUAqKgZv0XcyLhSeVyYm{kN)MH!MXx9niOEOX&> zKCH5%WZchT%wJ|L+MzunK-N%QldQzsI8l!E?S`h#DNB})QhyTgNU}?Xh8kPWUqIU$ zwPN0>B1T%hVLr9pZt8NR;7!o7;wwQ8`nq(c(CR;27L<*DI- zk14zO^mzbTiif-5Cs5?u2}F4+0U6VAiSl>TqhTUH`e`pvBbmqHRyDW<_t4#{&h$3E z5IK}kGL-YX(%*cDVrsjd*sWNxA-*Rxi!IK1K=4xB@kBkis?&llU1zB!kB0 zgn%0Q()~0;+TGwS=p+5RI%j2!p|SJn!lwls*0sGtoQ)G;3A4Ri4WRa)e?GzfTtle} z%`43X(cmiTeIa=y`3lZA_}>3g_tq;JKEQ~Y#ae6AGYQVxy#*t)t@$V4jHS36!J^EO zk}}reVaU>M@ePIcV#IHA?Ee1NhuOx^ggvBzW{lOMkSPN@=Xn3AwFS2M|56xH2U_M2d zKiq2XLgr;Wx1nE+5xZ#W0(}`pID89gcP*ShqyUR@qRpX_nekb0R2(iJJL*1XKwJ!J zk2To41Yf@40tGJMnw@4(CQnz1s0^!=zgu!132Ebr_;<$|f`nv+?!YSj2IW|au(_1J~#QAg5LZ zJL!vgAPm=>Xq`ci$Va5|_k$g#pkGtuMOzE8ujUHR* zqW;!wPt^+*9KO_b2z>E279KTr>vToI=zO1hWwcLaG&qKZfFS?!doi`)Xem{@NSfdw z4Z z;x?MW+0@d`;vOUcU5LS9?9KZ)|5ty2RlcvoKRoG=-PY5T2XBo|W*3d;O!m27KUB*LK6tG@^c>kFjB%)7XGdfCco%46+TQ)= zj@eN(;;1%abYtj;C5*YC@q?P)2(T(kum`R;zo8yS^VWbH;K9Bfx&oC^%O5>!BM50b z+Rg`6hHoDN4n1$5{%!cfTfx-=i|Oo)Bu>3YKTItWPRns8UGHH&&E2g%&T2EZiT~WU z^_Ntv%*iLjRk9X}@8cm>=p)*)zImei6xR5&qH|b(hHW6S;i)3;F6I@1)E8a2L)Cvz zZo{+fB_hChRYhh9(QGQLzU($#33kQ?oC%;D*5si7!uMoNOZYs{|K_XR>O})Ms^s8< zfQYCIMT~Ojlq}3NRC)6|nyCb2d_ot6g?P**d}$2iL77Y0Qckvx6UP84R56h}mRZqB}F@ zSIWvTxwSyZR;U-(6#cX==DTfs-u?&aZ2g`R*qy-G{cL?U0}r|GF=FZ0Zj~T`-*Md@ zpb^b8rX7zL?_667L2fC$^!|qkDg*9mt$cKJs7&3V|l+{k!>yf>xv#%E0~lM z1S7sO%QA?7O|K;b ztAG6r3C2Ah+jr-qQ`f1Ax)T&Va!rSBJ7FKW&oQd%!PwmCNg*^U{BJCYF7v4K#l!W& zJ9os`COVFA2BAPnFEO;MF7Qk6?I8xAiwFNQ8A3NYVXC$Xg`Jc0xvhKQzn^@Kwf&Y8 z>|wNogcus62O8M@=^wC>4fl8e)oC+k5wKifh;^AyTkJg2;C71PpxHIy8lmw!2gDrh zBbcZyd=$wG{Vk1Q)(DImFw?wm{;9gV`9LsmX1qel;+k2>+uUV)-=Vnx{v%?Xo~7l# zhtL^1KRKbpZYlg~2PZ3F(Y*H<)tEd;#RBQIk1fnF*b`uKoWeXHPO3ahC=jU8JLYurf#=+>j~?ngZt!YA)i;x}eZ)HI{t=!%_MlRn6

&YZVW3!3DaM$9`2Lh+730 zM)z8Fd(cz9Bnk3$W9!Y}zq4t7;Wh08(Cz>p#oF9}?`#E70?W(eph0$oIs#!aN7=(i zwtWBBi?SyL}9jj0|WEFc|81T)X!@&ttomsIWhUzqo!lao({Svu52MS zlOrJl0ilS+GozmgQ0uiTxcJn~e!tdgp09iwjw^6xr$8_3fOO}0DiW%jmxLCc-&vDn zlIHy>SIX!T>z{ViTK%DSm(ZFR=1=4-lq&7}$nu5$e1!kae;5z=Ye5TYrDQ==LUr1! z;)u#KFb4M3sxXs-r}NeRMVJC1IlM2{de^ScRke7hP^8Z~;YEp5xy*cHOqeEjOv~Tj zIP1qq-_qT-vRK*G8?l6E^%aNvbI0YjHPR_bfUXp8`ftaL2A=N2JRd*Mzdr3}t4GfX z2|)kbiUrb@q$zMKJ|*kYRFf6yvpp4qVjynYRC8{I_GKk)} z`t{BRDUm&!6qto6!oy}TpT$d~z>Xqr2s;|`95 z&ppt#d9_l4;({_DP<8nez=!s6rskw#_!!g%!2=uo?R=HldJ@y;PvKkdoXsVePSZpb_w3M(P%>&2E6 z$i4lZ%;Cy;Z-z(6QD&isz?3GFtNB~4J3;tmbQl**Q;nzAPTs3O`89O7+M8R$J%-;I zkmF9TnT7Tp`eQ6jC@r4h)^`7i|`n=Yih1crxs=)~F zLNb|I;1C}L9d=dJ4mXKZN{jwz+z$1J=kMU}JLz`yAeXVE%-5GxEA~#R=|GoME=%{D zX}p{Oif@t-rd^r=OK{eZV(|s$TBYCp+t#SfLXPkY$)363X-NP%xPzpDBOwZrA#Z<+ z+;2jj`IILAEhOK@?qjTkf|Y%b=a&rb2YNi?ZQ(dakwFccveeV7$ZUSp^y&+5eOtpUs|Mwv|Y^yo-EbD{b(&a z8MbYHZc(#QQt*L3G&FA%77K!E5dk^$S!lIbYh7e=7LaCt&rdrXznku?{e#ovv^#gFI&Dkl_Kw1wvX^hOVzHtD*OjL2TywC?yrz7HxM+i4j#lO_u#N1=pljI5Y>ss#S^ zg|bL+vX#4dO|#PQj2s0Ay1d zY3!7K_{VU9#A10Zz7>dTT`geE7S$FOw(Os9Y`8qG* zq>CPDnBXHrW$aLQxZ(|_z4*6eeRTM9@k7ZDn+!lx;~?1zM94frOAJwB7Mj9;wwVrT zI&`fTWbfDW^Cn|^eXe`@I}K9#?6r$ib{%S!H)J<05;v4h^vC| z6O*D)VOUOU__8j&W^cmlO(is#a6nNIQEOTKhz&zLrU(KpwhtO2ki(&?9CL)DzFE6! zu%0Gv!^6&C#W1F`2YT37S&v3$TSCqU3$c0m%Cc=sOS78qC~f5A##VQpl*8vu^j933 z|1DLH)6RAC$x^i*D!u7ojt654%ScW#-p!GgP-Lh*j102Wsh(wRxMy+NLn*03Hy-0x zpYX!&!xhhfCm?NRz|5XiITTgd-S?p_qtM%|MZvoF`axmsB=@o)@ZS?dL1syxX7}o{ zgl?qYmD|~RMu!@z;c9s~_x0c=1jaW6ma#tj)D00J7t+RAqYa5v&u0%u0n5XH^doA3 z5IT?|Dn)C{4XtOT0nMfT*=BiWKzJ{3bH+$SNZIuS(IB?VC}Z^yW{?ogaz1SBOBbz! zFExh0ab~v7gwDi*hmI_u)$kg0=)gXF z3U&%{^aLa>=oRGQ2q^3qyC3u*T`gDjD=cQYY6R3?(?vc_d5w>Kthl|^V1IuE(jtg2 zGZBAg_+Z95V*ilQ^)1d^dKG?M3aVs#(aWIkJ42Ib4(l}xUHPxVhO!9$@m%@&4wfq% z&n6~PJp4Xa;(MS*AIKMe)35a%&K#^~qcB4^9dw+dn!P1AP9t(u@S{V42oP*r*exf_ z4fi-Uoy+`wRpc3a=nL7R22sx{*$^oy2L+9efL;WRg4r#Ztig*Mcav=Y^7zyuK1}QulsT$gkdxkp&=2vh^7-!&}D0nE5;Q(Cj7SI z-J7QpHH$Ln;~3I^tK0D~HWN1MPIhg&#d4n~!tRfnPty9nQ_Cs^tqlIj0$_!NWCrNd zh9hug^gh1ur$p*L;DdDWvIxZ~<$()T@U#$sbAyuZ_e5mC>r3OeV_z!wnHOJ4r|FJ8 zt}UdA_jLa^z{jhy<9|eNfm0ebzbmHqiz=fx1+e)~?RlHmUj(EAnvtIF0|Ft(A${p8 z4C$IRN$I$C4l;k0iUl<8S#Q$(6iFKZzhV_yak!ybVlTb+ZexSFCH~JHxl3I4m2A_urMpsYQ3a6 zchNrKutDFx_;IpcV$_pjY!4$z?n-2yoUaY{Y_uopPDDa%@!2@RQU@Bbt+Rn0Cx!&>A_|NeBnklsE4iSWnk@D>zm=c!r>7eQ?BI=PVztEvu9Z=!2G%$0wIA*JRmE-0u#ga9HD*2oBx_ zl4MFr>1;0b9dQZpnQ5X$3m{^;$>x{;~tCk~5xqC;D=6sj|P zWlUp8iyBmo zzo)nPUc&M(LlYM?s?9wXctHu`c=rQ4IV!Yed? z9~?H(59o1KH}gP1S5dawwQ?M_d!U##b%~%mfqe#PxAUB+R!JHusRU0{g;bgxkYR)) zmCy7SA(u+EvvEVeu}xCo7-4WpM7^Ap9`BDjo`LmyNV7zil`45au>~n0k%R7JaCKtp3+c z|26OKZcD+`(Z>ktS}n;-2q`S6OL|zq6a%3uWK~?TOsa0lxVcTz)s=JQeuK|7xl=v{ z$d|jB5c~I3B1&A}XgSlBa+mCp9()k;)Au+D5yz2X>5FQR?Ps%?+uPfjwYA@;D~$*P zD&9UmGX3m1F+lxtjY?z`6!*BexCWmGhx@ZNIP|-R$+qu6V2GT1R+J%r|Bep3KkeR4 zNG7qk2plar2zK>kgb9HDLoHbEynLP_=yl)dohJX|_3%HcDJz(2YT@LRpiwo|_Hf>L zA+VTwiJaq0IdNQ8B|L5QzBRAIQJ2lv(EY)}P)=u1j6&d{`wcI1e7t0SDi@Zwmb>LL z+%c(y_dEo8^iychufQK-C8$3KsPahyDj}8~Q@``dPfEYK-2i;RZE>J1%+Nf=NLqm| zPBprYNt;k)Wr228`vVR%G$N%OExh$)$Zd=H(RirazUwVc!-VzN+*THq733->M5b7| zuDm%`abu5Wr7__u>JF#NkOpy*h_4HwP5(Kq`)SY<6cm>S2~-IDVDQLXwV}|)PjFAj zoJM9(vW?{dG=A&m7`0qK<91rbuq`G1+J7NKcvqeel#v7ca9|;La4qMC2B2$yvb917 zHuvvICA!p0mFUwd4KD=s-fi1MVLQ;*F% zD+WauG{5(QM8Lo0|{z{v$y)`s|W?Ooxj@e{CsmQ zrr(F=Jsk;@m6E~ccKYBwrbSm5+VLW+vEEs*mn%5dTR;%hfkFZnqnCr{{>wZ z)A)NF>-KnonrN^aW2o)hPg}Qj6zo#QuffG(ouyW}pd%xVcXp>z#oz55a@%Es$8ZId z5%|m;6hRze^|q;CaulmsiuA6hXGavwy5Z2+W?B_>3^VUrTykF{?qk#LA#iWWopK}6}0pm$adm7 z?_+{rS6|9hnMVc(txuI$s!-9+55|4HgxQU|Otll#qc)_Qj>k8mYP66qi(HTBF|)xrWZyuiS z=$KVrT=uB}U|6F-`88RPUAzr>!_wL=1hr8}UuhtI$v}RK`6DiqL8{Ng7X}G%qVfL; zZORUUaVao*DR7>q8aAe*%@ktqH+Np=r{B$ZjKKglBf||FFZnIaJIY?qtFPf#HxG4p z=WXvqvu(ajI{Lk|jrcs>J=}KNnFC+Xn#;4oZoQuoGnU}?3B?O=u3=1pT}|cjxM*TK zkHT94BTs)PJtUixgiH^?2L8Y5KVEw3L|B)q7+@EgMh1t6huiPp$hezz-TUrI1eLyO zq?(R-?MvhddZ0Luj6!QrDJW>x<5woq%w=S0*z%MRB7rq1i7v5V<_ZWU_9{DfK)=VC zE#Igsmrb~hQHzwK@8^w1q z38-x7;Tu~5ogetN)|&jlznZ1Xo%*fGO2dvWyUm;F4o$tUT`o0lj;$K|<`d0=k%bCP zZEHgL<=}veLp4TD_-p!rGm!Hr8J~_j*^{5+Xb|V8fiY)!Y3ghGbfLA~ zDJd%#0Y9R+M;`1~w1e=H5Z`L}T{KY+^3NMmv0yVPqul=OnYVhiYO;b}-4cfq|Jzk#2W+}^BOP)HTVz=Yjs{6-% z5S~!{VinoUBYu~TMx5FZ`VsDmM~yVZb+{C0Yev>aMN3Qkr@>o{EsK( zoO(z^7=ey8uZ`ceKX74zWGrfx(%LDbw60w$u`JE>w0O|i{Q*<@qcLeht^$qtD3ABg zxu*;uJ|87IWj%rL`RBDUD~U>wS|oGg*5Fs^HJ*|+=h~hETth2c6trH0%DwsAsW$ht1(!L!20!8kC^GL z)?_k=&HZQQmEJ8{2YBu*oPY`(z+Gl85-v)DI6Bc+5~4BzAtn9Fwxv9zT>8mv=u<&J za8X>rloG_eEINLi=({J#arw5=tML%@exF+Rd?ebvKbbwR_U^MaskilfKVbTl>pG>g z{%ws!|E}7q=it5b;;Gest%Z*^I*mD}6?5!h_MR6{0WsbasaIG53L}Bhl!b7S9IM~J z&SV+_prq~hy2RSC9n|w!_t9PZAK!LiEs{yecyjgb3!1;^jFlMBpY9+gb-8W$D=S|h zTF~-y zay)4LW+1Jy9&bEMu2(gpCRGd~NP7V)R$;D-9d>aP4knhsbUP8XC2#Q)G^~5nR!Vl6 z-(Rw@d{@MUTPowE84~i_CgvYS_Phm_bH!R36*h@oRBPoRSaAt;N(Ezf(B%mU)c4C4 z6yU1hj#yA2n*>?In==p&@Rc1}#9+Ubifu zmj@57ol3&Y$RYRSzo*n9$?OTX?d-n&^fC{+{~m|cxdwh$$iQvzyefN>r7Lz!0@~1p zRe^qN`Cz{%aD_`?d=)DB61jjw|!29^N`kK!az+F+S5-*GSm)w>FDm%=$s>!nR z=uBTuemSW5*s5WpI$$vZ3QLfn#=+xu06*s0cnqE;lbOe~+wBAO{pMT|Os&?}p!rFx zCMBmRnX-VdAe@wx94`*o?)d}@7@lrgf&%1fLR|XvYr7<>ZTbXwIw5mJg%OPOxB8F) zH=y`+XAdT$nm&upMC=;3BSeu8)MAI zYdek^pTM!f1vL)1dP4BMVzA^Uz}L8Gwv3_F$C-Rbh;?Br%H( zAu^`Qc4b6{bc@yd&q+hna3%@yNj!w#gyGhSy(Lu(nrm>Hy=DCUKk|qi-~ZU9k+qr% z_IlyvOxO88RZ%@xw_gqCGy8(L@}9HR+Sj4rbTAcn!fD`}1;PbWiX#z0A`YYrM%Cg(LU_>53 zcn#K;bVDvH97BmQ3GD-{xXuxWZUdnCE-4r`hHOhnN&Gfs!3H`01_gDhsKgS?5p_EZ z5I!V1Uf3R_^>5gwLr(M9z6d*+1)!7y$$lQz%)yb5N+c9E%MtQfuB#X5Su=)nOt!C6)}1!#Vc5u#@A2abkAV2vaLtM3kt==;%Rt3Irl z4^oZ?Vv~mi{-vxk1a-`hiUd^_7dz*MsPz`Y8g=*qm3+6SlBJEy0kXHdUEkP$06eLd z&#vgN^OTeB$IufrWYj5{0DXul0n!E-CH;jFye&VJOnq7XXpG%GS(uX&2Yzaw9};rZ zDfA$kl&-meO+}uuSM8L_WKq>vmEEUHthn!0#fuIV@y*f1MS8MVx7}m1MiT4T6ohkI z^(nQl6Y9q+whH84rh4WdgSfPn!BT`+#ng&^>uSuQah?xKhaiRDAM9d+Foc^%8@FcyFR>nKxS;jO2U44ev8XXbNrL zU^-%+a6|8fZD>ur{?>xLF}b|wz#RwAo@YdH*&3QN#;)J|YwvkYr^_sbJ%85#kJZf3 z4lYpxn$DNFssw1ZdJW<4f3N27y$|Ns>#q{9r~*?8Hx)jX>Vw~c{C*-t!L?duG*t;) zf>d+3A$V0M8jn?8i98Ayzl@sy=|x}nCKC`sjCj5ief<~zQQ8Luw^!SF{?zJqbAU`e zMaGwvD@s?VuhWwSMOAxzOTX7^gCvF`g=_km5~&llc&JC7wZm=ekBdQ;5J1sq{q$b& zVy}TtIFamqd-x(B?5=dNJUYs+ip`K(nbD_uy6y)$!>3M1;Xf>fL1(JxyVeah8%z#o zII64&E>fAkU;4Qf8dA3Pn6F=YF75SKPXS%wc2$wA23=|f=O zE;88BezVMol?rhm>u7B5@~K`L-?=xsn3Kxzn2!vRXoS}DM)~|tw>_M-quqW!t4K1K zADMks9?~aZY>_171Cc$JRlZGqI#)JXrH0;qU&L^3Q#87W{nHIV&n6md~tON zM@>ylgUPPs+hM*>;OTPv|Gi^cSh8E4z~!?3KJdjcV|GbYJG!t;O0`(G0&$>dW^0n< zW+3%P*3%6F5{?&-A8g|XqAu(qzs{Jl0-9FjvVJ2Uv{Z2S&aWO5Cz2Qly zU;A`++O58#H_tCm7goaI>3QFHO=iAGyJ!<(tT5V|eY9t#IErD=77>!PCp3bW=Eb{~ z&f_uPnEOHXlr5P24MbG#iXoz7PomNg0les>B{_0CBaf)Pn-Jxn6UNAW(0ZZJ`nn7D z>VdS$i8#NN+YTbrMXz$T4BQu?dsmz7;w#*r!3wmLliE%PclpfA540%^+zKI2-Thrcevg zD9hdCxEKJNZ+UnBv$kzM7G=FBJ z8D*Bruf@=5+*NLo6$*XF6tUrsyXgzb^TYXX{&z2SF)sx25xHwIMb8f-T0t{<2Lo zk$W+^fQ5K*4aEb?4<*To1>D{g#CZxx!2V24*x<^`)tom>Z`()ecx`o$8GsRo8mr$E z1LPQZx2BKOEBgHUgmkX=ZQc2z>+rmD3pRo8!)&9r{eaN-vJcJ&oND8Xy1f_VBS$5npC>IE76^uUM04C%}JF7gn!)OGIOiB@(p2L!8}FS+Wp(a)2yFtl;LtbiCMbre|_L6?^hzlS(z6`)pH~wpc7Hh%E|z;qhC}NKO$ol*O+U4 zlIUOCm6=s2IBS7fC{Vfs$V6eZj}yLnZC8C~vLe$=N}|anH}qNjC|A9Gvj1bi%C?W!%Tk_{Qgl#|6CK~|Dp@Ae2Gb6g#m z_CQr-&?Hx<9`%%#Rz6R$=8t$J?`;JTLIDJ82J?v)t@>{yCqNKL#IRX+lqLxf+# zO{@neldUA1^aB+IO_m^vbrl(>=C(wkVvCmEcSS#LTDLC4J^@9q2C;M+EfrmJdA0TQ z)?DdmX}e*2cle#=)JFFW&;#C0SOQZ1$P=ydwVjIAit_}mkp`&2U}W&S9**lj=ZLXK!eUVJiG7P=_j5y@npu+qx5wh+X}Tl zp!}OtETsbB^edN9gxTb5Ms(zsK-0x1xf&~05%ThMb7or#a`N=CWHiB}(dkl}B^3H* z>vb&I(B;uTQm6_k{ALbx$_4`AWh~jB{e6&p=&F$MMkp}RFzw0#Z7JP)QnZd94;WLgl`uR_fx#9X!QE&ZiuqwjzA z!iFLvBe4Lqw6v&Ic60xz+MXkjm91gzr}_(d1&nefjL67EzPao7+YYN>>l$65a53z% zJ3Md8cCa8t^-W(2V-h64WT-wFK_iBsD9aM|5+3$6dY0{VI8A0;thT#o#kNzV+#Vuo zvykHE6#h#ltX(qQTbRJ*C2;-Lv~Q`> zY+!|{^oGH-yCw7k*CmB3Y$)+lbp8P>U*p@ zBZ8QeKN_;wfNZ3A&SffSrT}APUX*Vqj};(2{3j3Pr@b=cDpnXlb?n2hM>eC|#;w=m zmgvp9T8}F&wl^k+_p!-!ufyC)7=g*|t60ZTupRr=9ypaw6zWG0k>#z#K|BybLDl+N zR4UPqDmH!l9c66$r@m7kj2*bwy2>25>iEwB1cYnJCAGNvaJ?cSk3Sl!O3c(OyUZoK zp0p2&4USON1WRSUClui7ZPlhrk;d9kLNah9DE(%QPYM`=N+N8~xNuUdAf-?xEH^tS zH_GQO5?RV%xTD+qP}nPQ|uuJ30IP{&TVK(spavbFR6@9HaNA*K&P;>G)nF)9Tcv ztzAu)k3dwW03l={k6!HJR9Mz=p8U}3{bi_`IQTfGJf}paa2cGW2k<-`qV(emX;#Eo zIQ#VKhh$q29QFoyLG06jm;A=ZmI%?En{JDSncUXr*Q(OiWIX?dsil=ImnmDqcR(^a z7v$A9-S7k*WcUTrR@@QC%O7TaK6{V#AkB~#Lo$6G93T4JFfFaEX#n%)TI-#jZg{`+?%5S+eU}WjA5cJ* z;|~0(vwQ74W&{qd-sHxBu<84A**MMl*9CCsu4<>6BrG-!Zo{;5Cnhs~F`0Z$3ES^4 zBn~HdkaJLHK>j_pdsF}GwlkS4Xlj|Fz#%$>dupSy#Zt~Ax}FGSjs?~?$1+{2XfoP; zkZQCp@OA0MgCxCGwl84EY0a#|GoW6#?16zB2c6`_8mM7BI19$N&fOQ=a+!~+t}=DK zU(n8^#?cwwqlL~8uoUNxOO`m<(x$^3t&SQ>Ud&du#p0zho-15hLAqbcr9@)@qGb4^ zda#}A&mY`f_;NpzyWP)1b=+7`n-~$z1MU{bx6Kv=7hO3&+)?6q&xN&T0#gBKE|l)Fz)LE zg(&xrR3kNykNO=TWVoZPxAkE=*6XtH*$y-j_c~?Vc*DwS^nly}?;E;QNEPGI(YFYl z-+MF3V(BU~T;lP0DNQm6gX#xz*Ko%7`{8XuwZ}mX@MFUQ1k*v%GBOU!>ZbM^wl*Kb zxqLt1U)Zd+>ROd58o(nD7>FJlFVE=JOY>2;J-dir;4>{Ie=1;#! zEm(5gKe@NtS!s%6HtDg*;JOxW-r073hkkZpJ*0}p zlZA&5zs_*mpN1${^R0ZJpIqWq-nPKX>Q&(scOj~PF^`1V_w!TETmpF{BuIiS7KCA@ z#Z%cmXUXLF&I{&rS&>e@uhZ*?0B9H%DH_ye(LAAkZ3;i%gsWZH5FwkDEWnJM{@hLA zDz+iv3Ru&q_wEH{&$|ygx1YLS`=)$+PXKEFTBF(cUB|os$1g7WwLP0uo%^6Og`^8O&vjP;A(ep$ysx`^ zo?6VQq6;y9JdYQ0`&)ZIaJPT@5wc!lZ9N_=qtYy^G*ma~4(lUL<q>NP#Lm~rezyXq7x5aD&E8(lPqwc!o-KFyvb@PTUMXXuH5&Z8wb(s^ z21w9fR&3^o6z~t*5qcz|%;uq(4gQFlliLcx@Q@?zt~=z|2vLouRYM_5n(3Q7AS|_N zm?HG-5S`D1ePJJKsq_Q%#NFLnmZmc~FM*yn-5>Bks=QAW4udbgc~dC62#u~i4_93e z**C{c3o;9UKUi6EMV}H-p%rrE2wnX#Oanqe{x?n(#If3reZ3Xu72+~{e`KrKX|vUv z<$jzV%0m7>R8m-@YWKVC+aeh+bl-k(WKW0n=yPRtGoFIAo(V#g+Q7uogWCcu?fz#n zEGC`G*J=yip3L54cw1eu)!$KD z(g$w23g&^Fy@Ph`#?pBOz!WFEUp8Iu8*`s7>ur55GPyE3zv3B)MYRhE2HMF4bn%dmV0=95&Fi>+{b~8jPR#m@xCi>mlj#6<6Owk2hJZ zTC<;OZcmT`&448O64X+fmRer-tgNREX*)q|JoT_y7!R>!*nWd20_m+X%Ej;9Pc9TP zIcgni9cThnjlnoi)|+F#o^Na)`x*36=2O#;bZSqs#5{O?z;&TY%l*93rsFJhM`n98 z7(-{Qx^;VfbJw@1dr#W-Pzb*(MI`dr7SL!IMedUa0(2%|uH?x1FRAG6Ayt5?f-RP| zu2f$J)R6ce-q0yh|L*7fJb9f4;{T^swOlVWo@qNzzt6t$)&zzL9>}q%=A?@08fwQ> zW5n>_R%W`gaLN*GG>EV0aJQLP2j*qD>jRJ1 z$1$Xy5lD!bR(UV7^qbMf#<~;09+7jR^|jf(^SZv03v(MprZq9+^Sp38@{MwJ**J6j zykUD1Oy@HP{`1oNd?l=&k^Y70bg(WN%v{Sb10tLM>~t<3U{kU^)d+; z=f*5YBNY0h{hB(N-BU3Y$IDQ=5z}u{Di#Cmz#vRzROg@u5W!t>bM~ae%8~%V*k@YF z(RT$Nw^GmD3EXu8%p093WfD}gDR8UbHMjn{wI|2XogCIK7-ZAuyKU1lDNZf)y`8~5 zULk^~Nobb#QilvO%Us%bP+we?Kw0zU{YY*{Lm@&endZhiD-`8GiJ*iQoY1>k zmRKsx+$zXrB#NNpmZ-Y>@OAdVbN4ED;xObm&Q9|LSgc{cXsT^7ZkCM>3&ja`gU#snk(14ki8m{ zwKhBa#uv1hIs79dv*h7+ICBE7u57_t*M_Az4fpxjHt%z#K;M@XsuKvlc0!G#KTzw5 zIgdr^t~=f@Ga(R=v8sO4E{6boaEptX`IBM#vwkU1!jhV)^`m7cGc@wxHDTKiVO<#m zWh4eo`&W{pY`ekHL~`Mc&r9cjO2mw3wKc$eb|_;B!QrI3_g}929=P{kbh@>A_sQc9 zF_PAoXb|ZA(r>4fX$0QQOQ7M__uxJAShQqk+oM}4RM3fjo3~}mG ziH!E=!7_y_emP~RhshTQ?&R6nlYYG#3uY}vp2rw+Uw<$Lm>qww90(D$VeuARva5V_ z#p4OnX4eCd?@M=Q`)ixdwsSv>!y3rdo4V7HNj!98TisxJOL>P~VT>j{Z5uy8>j{d2 z{Tp*5hJh6K$71Se%tWx|3VScJS7YYI$A__!YN8DOoKqfO1- zTv%xITquD@h!9`c55PvbI=>Hy##WjgZ*~5NkOSb_O+V*EtzRn|f ziTu?!8&Fu2!Tq(k8T;e2NcW}2>HSR-$64`g7;R4Y-K;>?`#!StAHxysJT(wVyusq0 zdO-qUv&(Zd5dRTC`(6~T5&`b+S+}YXhr*WY=g+jpY{-Zt%{>w8J_tB<%o!;Otkf-N z&fh-Mn^-lVUHRwsy1vhz1?U4HG?M3O)_6;sA(Nsl;9=uE74F&TFYhWZzy5s}3m1^6 zd>**h{u1xcFF>C2=WyfO5L)T{0%z#;CdhykUNZ|dB3V`cxgfCRANZmw{!@!zL(PnV z&E0UxF33biLV;<1kS&+TzP=88Y@b%}$N*heMZ~s)c0a;Qyd8=eelSdwS>EnF?>9ZT4xb7<1 z%~=@Sdw-_YSu=B%xeMePl}isvqj_GPEVj6&#C%cKijHY)YBt?YOohkNfY30@7u$Sq z*!k8QGC_-BX1IOu0GA?2dE*9jr0^LB`6zJVu%JiRI3>*UPatUh1ot5jpckoSQPhU5 zf9IV3S*Tvk;C!rZb_!Wd1WI6)NK0+v<=i7`?rcYGr(@w`igT2@9(rW>Uq^x5S3@FR zml1##jIKC24ZFQw=6x%avz$MHT0KQwtp*j7IT^X~FS+Q^{^c_AOJ4f^E6Wzguc;UN znQUxawx89u3uv}Q@+bzUCRg<6_$A*rRo^#R{I@YN9~iqOW!WPDC*8+UkymngeOuJt zD`0y&r&vgc7#r16J_;4)RD?{Z1irSKT5|f-iEnaZnPMR zyR^oHeCZxr`>S|UXfh{_OKJ9IRB%TlIC#nijM}-KE19Qj_|`FjoUNhdGjkNdQQ~0X zkHp>We#rT@c>9*;h?q1T0f}j$OeQb$Iq>Am235Ve5+|z?#R>kZOk;yGU0LK^2*|I1?dDAD$G*}nZe;jz8I=(!!X z1?@VMw%rfJ|I~97;)PgV+VJi_bh|T6wlM00X{UBLhG{CyCeY=-S6_^%hd7SyY?D_K4wZ9uq9h>p>nM7Kd|DUt|+7-7coGiUeX&`(}Oq7YYa^1F(8rUI-o^VDWy_z z9VMOwf!%l%l%j&*;z{XjnhAlJp@dKZjUEqmu=ue{DH#&yH4-=8_neQ+X8oUp@0xVz zKI!1(e(0_Hu?4*gG&XFJVNd;_PfA6L^kCvg!SywIofLlImxMAiMIxU9CXnhj0dqn|H6 zl`OaUbjy{RH~5MeFCw_zN3_`m(Kt&&Gh5;obb~OIXvAh`mOde6peTX^66U%(OGLcY zU5QMfSL)jcz;`qljf-I`WIN7i7~XCu`V4A7pZ5d9mf9Eqd5+^N>A@y!bEATmm6D12|Q^yJw=5tNi;& z&3ydExK4nS7)Fwd0tpCa!?F+1Y&N)tUhvi@K_MfkZ>H~3OKJBShMC4Qu?ks6S!{(r zyE;}r6eXD6I9sj>covvv*~JOt#0sbOavKHQXUp$Mb|=aigNW1@hiZ_4!Oq2_mSd%F zzjJF(*fw16CLCuDKvVewTcY%dDhPslN^d~vsW6F$uo%>_jhndn+gYQalPy>bKDOn3 zzIRn@-k*f3dMp#Mudwi{VLzA!5w+u(-8bipgN;Y&xZXl;es%@?O!;2ay&f)hENq%a z`*S|JPBvejYJCopoamRq#>__tFM0n!jkh$TtgT+~v>~aqc4V1^EcHQxX2dKR^rU&;iu?mcW*{=S*`dQlLQiO=OMV`yvf>^~BH>BI5O6z3R~^R6y&?%Y>;q z9%o`bFWom?-?h5mjNc!PKmWa2mz#*kb-pW9@7H9#*FW&#Q}KKEZAl{xF=SLK=`eZi z`WAfMDA?_?_Vl6N;J#o_>Kv8~Xxp7gWZ6BzAC4dODv^dOERlvrkj?z4ZZ+v7F4G@| zhz!hTf`lniE75)>Ra#+EHnCiJ z0e^+ViHCeJFabXX21=5ViNH(T?a`Qi{p*dEz$NUL`n~+_%hje#o=lg4K1@_HTt$3n zM|~ck(~Aq^=PHgJ%|@Fq*V>NrGp^pR>e?Urw~fy2C)(}17*}St1w*qLulL5ojh(L) z5P*reh|YGa>kT?FF|lz0+sT=Tj5g@{7h^k!0PhWis38es4u_!zI1tq@SU+}dex+cG zVVZyS42L)P7QPf88pW%SqYuNh_g>@+BgM|>4$d=hQfAxQ?-Q=&WvL^b< z1NM7;$aE?G5V#aZF42|-{S$PbZW|O=>$O2|OIL=j7oel9K&2PBLSn<|y$#M4|78vc zlFX@w{UNmC=a!hp7TX;SuOq5&lUqQX#Ilml4gUAulh=%|UAJx3yX!nHmU@4Twr+Zj z8`b|2Kx`RSfyXKh{RQ;*xIg)%-s;FJr@btfDrMSO^e+Ul;HCNybA|hDUVp`2e?HPO zPFkKqWcr3iUTd7Oy((mA1ZEf4toI+S=OE1qKF+4YT}Tdxr2*_vgvmYp>%+ ze@p0Me&_2AHs>WDfBUhpcvyi#mqIls%ckH#wE!a*qMce8DP1t-!PMFDdmtUK=>pxa zz}FprNAVlc)Wf(F9}f8O=KPhqt9PPlxVEicqWt60?PnWeRP;ZKZuhG6`>bOCaH|US>yR&*Sk0(Ae>AxGB*|4S#l9_5(|NfV{_p zJGu)hySodS>GZY!Qk9GcEX`pwy*cqjy+}1a;Sh%dEZDiZWPC_Q+W}Z#D{_?veMx^h z>9Cc=(*^Ejd5*HCgvr;1p-jb-fhQx&Y#afb)X@rXlnQE~y`(R6B>s36pNwih3i%TL zbP>~=1sJg)CjT}VreWD|%9ut(yzz@saP~psz0iyHlwE8f1bZ-(ca-v(x8QR}B* zIGC>Ln#C~6ut!*Ci{gK>rZ0^df16BYNMnZJ?{vDZWLL^?arNAVVAtASSp0@`yKc-K zT&f}<0w`~4t#*2>)lt_LB8NHoRe`eC zARj&$m^{rbulkIHT3roViIBpqafJ-34ZQg+mA`;W{o5c=67?n#kF)I-z7X1X{395U z!O~TQni+d+~i4&|Lw{ww8Ju3nm`Xnh&kzFtMw*EvVXNJrLz(iTFsTv$5{@Dw8F z2yP1v!-ZTB59nRgt!qg1ly&JaXf6-B+PA2$%?MK&7WdOEa8T3_$bG)V^RPq~CvUO1 zN$QxPPM3c8;^*w6`kj-7q`_^#nt2Hj4<7KzY$*jf5wh8>8Dd=2%;Ka|-qZ5dF%3bi zgvNQ>;R6hD0EHD+1C+q-X{4dDaPpnTznVK3O|i&J9J)s1rm>JY2^WMIhIZei^B$!A zI|(ZsLx4VO2H5BZQ6s}?g>9K4sd}ODivWuK>2cxo?E1Sgck8~EPwVIY_)%~ z>1@_ISfGafMHPfmFz#&O0$8C=t@@1WoEu!w1957&qd`v>O3GXJh<%naYW4%X=))Qq z;)*zT=W)L=@x*S_QJUpivXPWExJ6E>2c)}#vd|L(oWdr;S@NUx(G5Mj|s`hRH2TvAjW$KZ4_CNDU zBILwmAgVm1A)RI=Wrpz2YWz&an=I=vA)uxZ%=m0~Yy|Ulo z(9)_tJoo7=vm8MtL=C9)1UOV#@iFd$aPi2uLGafw<;P!Rml)MmPR8luc*YM>s-y}Q zHV5Sj{(2C=DHJZjT){bzJV$hi#s7>@*dm|WOuJ|kMTl*(@6gP+I=4+>n(HVt3Q&vZ zI>vC>%*oxqb)R_O99!FRa5L_G+;r;x_me-?YIiPQueK*{Z*T90r}EwvAoU~MH zrjyIaQ74xzSA;GKTfjN^OwK6&!xZW%=FgYQ>nuzZiNr`X{g-w(0!T^t`AP_b_UQ0T z=d;BdrO_;~_1xG9k>$E#=K5mzuim+>aqYf{_1UTQTB>{lt#ck^+*CO2-^s#{>zCLY?beZnHo(Lj;@O+IqPLg?#QN&YV)<0edj~-zgZwZ)tsz z$G-O~!<6Sl-RlCo7vKG_s_IQue0;wy0kw#~diR(+)!ag=$7OdePE$nKlecxChBL6A z>lo%{lzr4sL?2YUR!loCN6J%ELsMh4`xec=8>@UaII|gJbIVB-2w+jK_HDk>=xVM< zrTTi2sD2FrmYT#24pj*~@go-zFr;D3!1~t|(Ca6UQX6}%GkH`+0SYmOW;Ke9G=n8Z z9a<)>at2Oy!y=2{6siEX!SA%H2491Oy9!1;5i=T>U)n?Ad4lmsM+x$4@U$x}BCQv>_oOKB3vQ&bFe=LGvSAa5hR_2QL)5ZNLut6%w-k(DXU>JR^TlLYbP?9sW@<`)-> zz_fpUK!%2Xmv?ri?(Ov#K2!hC$4gq>S$f0e`(0q!^BnH`@$!SU&nU|N@dt3*cyuL3)i zF&>D(Ad?Ts%3l&34bgUriC##AKFwYky-e5sm$fDR6J-N{Fac!cgt_ozrl9K@_hr#$ z<40p5{dh_008Q^B+yp)7iL$pGVV)J0ZI88m5?@FEzMEC2IM8CMByfXsNrVe<$Xw%2GT91zkvQRZmbpl}VoiufVogz+j5Q0I$a`T6!oQ;rXB>PY}B?W+Au_e)m2-QK|Ymg^1= zDZEzy&*yUME!~axj(%fJ&dWZ==Idmp4Ts}OPd6#tU<-N7AjFqnk(ffS5NjYRjM-oG zb&l@o`;;TdWGss^?q8cN!%ldwHC^vggJ z(AciW$AgKWEn5QoRtHS*vKMwW;NoDl+}f1o)ubV0g?bl@LDKI>%D?CVL;xaRC0q>M zq$LWf`Zd3lsW-a)$n*U2WdGT4pnE^5`*R)%&>NbL#^8$maI89kOLK`zW1EC8g^kS{ z|2@09@qP1l-FgT-;r%&Z$LPHs2Ifbn)iG+dUen;KL!a_rQ0aqq%&Xo-(8mX|!WVA6 zah2)Ta`CzsG88Y5I0iXA3;M<*Kit}DHX`k)+i3==tJx_(@AEZGJPqX1{}NqotL$$s zS-8L7$QV*&9F#h3$Prvl-c79Fx7_xxKz|~nO6hMf7Dp^tV#FGak@bBLRh>cvoR%X}FK(WYkr1_(KN@<-%F!2iI35LrTUadDE;^h zW;E<96IQ1Up1?!W!mC9fh*(mX2B7$0y8$2v3vQw6LZIGMv9Ut!k*0N9wr0gPCs0(m{D3`$l-`u7E!Gf2mG@qtj}sDGw(}4%-=6 z1vpfDl{vacfO0COs{&o!h{~wLjLwM3YDG||gT75?-0ms^h$!Cj8F5Guz8NY!S)Q^PK1O=Yg*qE)=b5)w&ciDE>K(+l={L^j& z+oxFL)$j=jjz@q^UrLnaO<$^11-&gI(|)dSMzBsZFMPe~bh*kXsQSZ8S`gi)A2QqbOb$P-$Af6OCzth#g`@4x8;R^OK-+g`QulklS0^(`&wOTZ_f_DR(>Zs07CqqzfEHW{MSuhI={6FQ`kO!f`388ThZvk$L!@5-iN0$9Az^W~4EqHD9P}Cd^U`eVb0D(OYSqo$Entd$ ze2FqU2h(ARZ*oJ=$w9FIlQUrNIC~VSH*6qfN~KcRQBmDL9xNk8p!u8!Kiykdm{`j5 zMJc1{%!!S^-ly90tQ-P~d#@>(C}VuNuNcoWXeQRr0Y)Vktu67)e{NJXtKl|x@^cc| zic^uvpq_CE4ba|xHDBO)v`bpwZ|rn!PiJ$zr1Cs?V+gw?OElb86(bqG)K&dbQ}d*VDQoJO8e6^eVYtT#~t} zW9IbCF42usT7H@ZfB!?zkHew3O9(~e*Nk})mJ1h?B@smk2ink1ZIC}G8v-!gG)o36 zlna+D6)fuj$(|l+@cO`zFhhk%A%6Z`WxIOeEImENmc+}&p!Q8C08b5b#_BNgV7|qrm*F#RgN9=p>;%#tM zt=wvNHM!<^$vWYN%$*UNJsCZ@+h>vT@`)wA2#3S%wB{;MS`Tl5AB}epRXD_Ba+7(Z zI*ZASnal|r2@59HD}H>+li|ze>ztENR-QPC(+=B9plx3mq z{dDjFG<)sm!^ygyPkOl-slGbQG1XcWFI193HRxeEtWroftha!Nh-`x9tQ$ znU@8=pvGVY6|zpN4oEQ}tSStkB^U$VS;Zzz79xbv$}k) z)>(uN=JeS*{F9Cbc@N|ZDf26!ki?P^upJ!eD=3i`0-Kuncl@^7H%4YD^+~dQP9<+% zyGn>@%mT^bCP$v#)cWeyi(1|#FMBj(fKeL?cE#L~5{Q5E{+CysCmEz;ca1X$tpnBfFOU|$(!Ck)b`yr8jX{iw-z#?-~(Vder9 zBJ%#{%#2VvX}HXPm{`GkDtn9Wh!t08y+48 z0|EX7=6l)nq$@5i{@e}ao7ex>FJN@Vy7($Dp3-=lSu)*C%G}Dq*UPW0q=IR=t17_g`%Gdx$F-C$*ho+bhhYu%O$7VCC7^iT!pM z@D_^I`t|r6yY%F6W}NEyVa>PSev)Ij-Q}KItJY%?!?(*f&F~Ebfd{Ir6{LhNB+u)T zqKiWH(3nrJS_;(ktNObhKBVOgLde~FyhtIW<*-5QAXi>riqEI^iudLg_Ib9Fu=+O7 zB^B7NfmMT(O=wDW&}H4FqqvzA8Ny4a!Rrkb?GPbSvIrO3o>Dqw3%})ZIcHtry;G_l z_qZnqo^Ed_#$-Hi z)Z?{QTon%XZ4U$_Z!aM%ptMt$Gm7u2ReNOJtr2bIRlO~NFw)GKQ)rcwtGmkQ`2KI3 zhXbfI+n(~}XHNj){oQshit8`7Z!ToT1cQZ`UTk#$lF06pxx0Y8o?DZSttVYV155dw z3taMoyj=6k>3p{m$ofYUaa=<_J@&a6fj5#iyu3z*^BWJIwz?iBqIBOf>*`#Jikc!x zF^Q6j^0xPetZl4UR!!o_h$x^E5NmRNTwGj=YBM~lNEUl}d1BbKFRB5ln26H@`ozQC zrla9MG9nD&K!uS-;agBf!Zf1BP6$scihhuj4c33=O#HRFWycwf?Gg(Yc6vE^Yt~nn zGV!i!{TOO$CmgZ~oCW2-KGnx5fDm$Yu%JxYQf&)=^5GPolPw`qBvO2(9~0Sg12@`D zUoY%bqw7>@6=EV@TDW*U_sf0sN0OpSDWU(CAlyu{a@w_ z|6j3-_U`wt>!*<&XCN&v3;QXSl{&XOgKeGe5(Qyq-0~)pPbg=8%VQpiLm9B;?1$5Z#<3 z#ZOO_8sbwDPZx%S#P`Hx)o=VtM<})EM;7?K&LhEb26M!m#>gNJJU2!F7|40VbdiRD zH}pWSu{K>m{^8@>IlZ}2{gBGB;(j|Qy#(ym}a8VnlT%LiozuLo$% ztj$1pO+{8<)fZZ>WVh_Lo}_PBwp*5C=2%~yeb$G_X@_*$_*(Y--PBMPfRc*SKX5_I zqPgO_& zJ^x|{LBv^CkNMeDp5M7$Uf6W()!2G}VgEc_94z1L{A2622M6$wPaNSNj;DIR-cEA4 zT-0!M;xj=FEAzUb7`QW*baf%x1;l)&*QMjgP}12HI+?_WouZ1we7n-WQLKaDC(r)H zH8}klk+cZVo&aHBgwM1qkhOT7)`bs#9;Sd~1{vJ91Yq=eD1iK1dezOf=1z_{hBb21_Va6wm*&XH36@@ zb^?y+Zs1V5e`2m>sf92-$e&(8s{mTen`d?&dg|); zLGK2#v86t$JgGQHgoFH=fcCo)rk*;vP`Ux^-xO+&>wio$pUZ$O`_x3@_%XOFpKhWX z^65z!GijjOYf>{X(AAQ3XdtDP#eeVfs&q6z$Hu9xH|AAq{Z%?4!P3@~g3&g!)TgsR z^UDx{`d=U4P*$tZmMwiTtbY(^|CF1-IlvP10uduG)r1-sdVDZ>F0QYyo0*!P%o{Os zkR?k(b8VoZk<6|~Cx_)VJTRN)HDhP2>w7wSXseQtknp`Puk_xnG|upZdR~7&{XDLV zWB+97EnflvxERZ|y1CHnD7X0*VgxM3h)`z1JrhLa6ZS?&^G3X$X{+&ABO0z_juYdS z8wJid`_Nk#1S!JE&{uXOiW!gz+w~DlC+3jAqr9a`z)Ajuq~S^la({%G@s_s3R%)@uuFU4lNvXCXHx!7)mKWyNpNE?* zmw5qBs*}#h{0pGA)r~s+1Bmx|cdbFC1Qg+PyzYg8`3biac&?7PEG@Xwl(cI+B~_@i znWP5^0sZ_4u|i=(hVG*?c=N!s7eN7Dg(OIy+L&Kz5W(Q!0D1E1J}CN*(?MnL&(}?_ z>-t&g*4wQR0$++0sVVW`KN0<3s2KeANKqA{+#PGNxVMBH>K$Epw{KsHY&Gh-;Foj2 zX?(WdfSqwltSeeJ(9mojK3d<+t0X}9h`>)?!DoFztJa9NHdg{^O41BUkLZ7{kTlBn z=d%z_n$s~S+iP9|gjRzx zz}lWN`+hcGXEInKS9E=|*Ftgb4-+tSx%KF=By10ovE-wos)f9O$L@rz%UM717R>2P zOAkOhkM0({32xc_Or7<3E}#RnKEu*phla26zq zbE1Kb$Yu01)J>cSzy-T;XRupjAl{xIJaHNb@x~HUSS1inuW?H2sk5puf}4HAgkTlG zV(Ep2-=|^5I3nJDK)-*wb>VgS(2+uDr1Z_tg*oxTZTp6+YfRB!aqkLa@aMxJ+zAKx z_an}^X~BZNd1bgZ8bi)6X4vdh7E1BfHdw!H292Yz*=}`wIs4sgdlB!n?^C)8IN<_e zc%pcCc!paJGm?}5uK^F)iL15bV=OgG&u$?UQaaPJB@dj&>b*Q)Y-Q-wD(l+TGQu5T z!`PtlJG&6lWMhiq1Q{I>6%VifwrhJCSF8HW7yD*}cSGC#=G)#u_*Y(rGdJH-=`0-b zf-8|nnnE=ER(4m&!Z0H#NRRFCxf%mYKf7|H+r2+^`GR%fev;dYbP8ONWK3Mo&WJhu zZ)&hbp)9EyI`+!Dt{YsV38DjdRYFsh3vMJn$VTQ5UTkAwgM3Q-+Q#>5%SHx}g{6fM zSB9$@@hTrwK2%N)luB}d5lDbe(wRsW)C9I|7X$Ea$3@Kn;Pa8Ijk2Un?DqAvlFn+K zLG6AgA|@jnu0YP>^T$OSd;)}GX2~0`3(xvBTV=+mgXpE*O^I2han8`W%vllg*YG8J;+vy=p7M`?e>IBUp_DyzJ8p3M~E= zC|^9tTC>#zo-gMf39Z6f)pDsv@p-MzXJMqi-VAjgIzCl}iga1Pk!mr;@Hc75j$gvQ z)VS&nKmHue#g8%f(!pJvWbtDFC!*j}NZdJ$bdO5G!tZLHGTiL-HNwQLU^}?*Q|+>% z1ffo~jcLrgJ@&Vv#OvO#=MB^KFa=QkKkxOrg`Qakm07dP|b}9hrn~fJy4&O_79QIlfs`?GArtBApj`v;eUH z5-yTQ73B1bpSea;fUDRKIb6UO$^)Wlq^BmNZ#xjzC~S0;9xZPx?ae~1mFp=dMu0S% zK#iOln@j(!VSbOkNw^jaq^!$INd}Q?qcj=ji+9RXZltsIUgnV)DK;@|^z7zlkRHCF zA>a_q@%E$JO-j~8jWH_gl@mhU^>OhS_Kdxi9{us6G#?s|&SkEtH|5 zcL=prMTWj)sm<;mLB<&QSSDX+W@B?)y=41E%SHAv324}%TUiRwXu^)h_$7c8H33cB zJGbGIQ_=OhZLZ$+x}TT(Hi0&^wv6*8meyH3Wgh&}wR^SI@p(F$2_4i2N3Yrn5&kZ5 zwQPJA@q&?zB;@jg5eXmNKRh{kgZLhH6N|+~QR{Wdo;G|5$*YEa#)YL2Vwxa^K0O!e z_{e5)Romv=`Xs?xs5a#3AoG)y7*Q8L__rW?GTOT1f_+QOAF5|)e|odfxof6GwfP%A z_h>kRj9^mtywONq)3cP!(1-G`zE}71>CDVX4c&_Km&&}kU)khJ6Id;=tyNgc;MH$_ z=b$)$sE`Gx6k)hC?4W60DEM>Sp0C>2sgoB4Ev16{`+Fc2_z=kdN7FSh*0nb49osgV zHg0SijcuoCoHVu?+qN60v7N?^t;V*o?>gr@_ZRGUt-WU6nRzga4eZU8P;&jutV6R0 zH`_N)(nDCh_2$Tlu&@ZQLE1PtI9NfwTMcS-+61Vf>V}3w@ea_-@>o3{CacdKgMXzB zyKf3+)R{zba}w9`VsLlATH}o5+5a}tMP)ODUd4nJ3qnTyapfrh9Vqhs*RPR#xGcLr zu0tHk{n1>oAu3c!=&>j8V(hpdlQ*u2LaJ4kr(=!}#VVuN=mLa=)ipE(IbOEJCc7`1 zyDbTYd^>cyeLMNz7pd04K+B^xYx1=R$d-x-gIf_9e z;ZQ5n^sm&I$gnPwD&@TZ%wq2zqmM`T?~9o2^~gxKBzJsRn9ASj}fp?jRs zWUolddSGPWErRse`LtjK%JF`_uux3zm}*|MU8w4{sWe6lBx9U=Tf#TsWF^Vl{U^5?I^cI z9r;Ln6v;bE>*Eskw&|(!&6^jYcMSiC`tK{eD|e+oOwq%w_n(cN!x$bM{dbPsG0UUF zlhosuyJO2ko(XNkk7boVL^uck*qiJ6k^$a&y>Rqx{zWvu5>2HNmLKlxs>#Ie_6=rG zoKCen=PP{CnL!Vp*=<_9S`>|8t7Cr&)5TIN+bP;(dG*hNuKZp?K3AKA{7|ODOd$&c zIlekEC;Zsq@Zp_ypo`A!|HeM*qG_1e?mc*&u%D9MT4ie+l3X7iVw!OiNEO5VH_RHi zOodjb7bYk7v$awhz1T^WsS@I(Dc_90Nf8;>Ko~GV2eqXuDnrom<*nkEzFg{feob_Z z*fk34bx87`l5#W<)D{tzom=eZ~Kh`njt6HPi5-b+<244Ddw5;o5L7Y^lfr>N*DqVP!{_5jE;McR4CcTAXI~ zRz^}OmwSqA)b>uM%G}Vtu;CyTomqY?cbC2t!^b|nM}RKp<;aZB&jqkD>R`0HadLb} ztmu_dIDQXRl@&l9o-3CpG0s{jocLY^r_QZC-8>#RO`$DQnd=DV)^H@t{p?sHMhNcn zd^Z$toIKcKxY9Sb3NZGJYIGJvgXW7#7 z(FOxMv|*oEUwX2#h;4rSHqyeH>r@m7HCeu8!8F+>2ZKiw|XN z+fon?K6;uO8#6UBBDekcF}Z%`_RHWSEWUQ}>>k!hT%e5_|1UGX$&c*|SS5 z5G2(dzp8??_ybf%duX)>al=;8V-bUtB`nbX6n%j4ST4K9ENT&!LX_JJlUau6oOVyz zpM>}I^Y82M{{AL1fUXh_o$rtq;1HG+Y!_tvEvJCJ+0@3WS3$E%x@|Z%AuG$Kyu6$v z<+J|J{fW%sk9Y>iJ<(hnho9ZSFvxC*dfqxLp0`?K2o+WtS9xMa5ucRuX$G>g%4{jB zNXoj%Pd>U%)k&kFlPR^(U%2UFbR^3?64ROMocj0Tt`*NAW|>YV1% zx((ONjYq`{<~kuUl9R)}jin-|GGB|*64rV)VrFZQ43afRgucU`TVhj*AvK z27Rsp6&pv}>G$uQxH7U~v#hStd2kKNlsICx--Zl+krd!I)hqL@ZWSl%SQrrbLBK!y z&@nO9(DHGeBxA)0-COm{c2o@B#Fpmp6B}K*EMB-~acw@X$J!|P0t&T`lSYY1+^fXg zSFt zPi&x#V9hCF!9}-Urp2qWdgUJ2bkEu3)-ba&Eu-qiCjdpEQqT^M8A-028UK;qcu&%d zISWB$&#Lqx8CVH<&~^MXqdPSvS$mk&FU#}&>0n)A5=i&=*=SP9J zHc~!wQ#8D7h;QfOD_*s#GQTH9pICcY8UYIC_~dDZb+rgBPI*Pei~6U&)%hULQ<&2U zKBL_5vJPT38Q-t@diO)udmz;kIgdq_dz2qavMf$usQYX|)8jFP1`#S?b!)RxbEAk) z6&44_Qk#qJd^hpUnn!7g*pxF$-o{2CAv_941xpCBBW1c7P@@s)OvClHAt+NtR6*;W zDXff6u5`lZ*VbMtrc)~{t;KMU-%IPIQU)d^B{6&69>z9YEya+mmjA3~LLD}#P#G}; zi5mm!Yd+-HBiFw&=i`n{Lhu#eJdX~=AAP6_W~%C}wW6PyuK98TcmY_nHglacgql9y ze0Nfpm!J6cflku<zzu{t-R|618xWv99#xm1f{x$RSi(T9%17X_-s-a=9eShX)#}+B>mgG9_xkuX z5Vzd^yRUpk`}HV2fF`rdmMU7jJ>MNbb<1ARnOh@$pZXA&8?2T}slI1f%r-yQu%5$V zy`ZRBV=&>esDEQu=<}PHv;+LWC`IBjz>-Lv4`1c@OnR(6Mdk{qvJ_xKD3?>!TT<715G9a6ccb-ROm+Bq&AM7yS%nDZ2?a(B zQ?Qre!HQXij)a5UH|ip%CMHO&KM@M%X2xb$>mOZ+UWkH2S zG=92%eumi_Qgrybp=v22GNkuEbgGDQX|tloV2+zMT+_Sy?a z*3w?s_y*S#yFZcZCMw}^1fAz7YPxfTMJ>l3BH?~J2vqk{-8uc{)^VB|eHpf8Bxkjr zNcGMn9rdsawjwKSv-22`=*Y11(^4c)atwr)fa}c3txw6hu3g4HFLq?5TEx74XXCb? zw(K!4=(C=;sFH^A=k&pHp(y9uPSJ>&q-~ zQp?Hv8d|Lg$(X+pj1C^Nb87y~&50{0ppwR7oxw}Rxnm+oaJ0&^BH!HdpWge}+S*!l zI&sA7>+_QQna}m`01kl%-gfKWyi?A)Sav#axQXVfJ3N&L?P`6V(3=tUxJ&+{1SRpr z+_Zo(FB5O4UuaXRv1w{ToltAluEBOoShla>?pT}>>e{x7Us8UbT|X810N&@4h!wd1 z{dAz`u-(*t-d4fnLoD>Pe3l#Wa$q6!vfOUaevz|zTdCLRNmA>3*5>k1qunm4ol;y4 zpuSKgav24}gUJ20Y|*g^wD1zaRTIyo%hM6l>u^^sM&TbazAZuI3h@BtvM)xoSc3>-L` z$%o#NU7Sl)t(RLbj(t&<;7NZwJE`eB?!L|-qRa6+CjfQ5?lC!?^Bh$3y)~#_Fns0M}trW1ZlO0pP!lO|BRpY3UW z!{=fB<)ONspMUAow<2F7P*ZEvd_h1=Ow84g;LiTQNF2~5!if3ENX`nXP(L%D8IT8U36C2An-_SrdO)y&L$aE9;^kz~lAQ`?PG4RK>5rg8;7 zW$*OS2hn{$G8f$UpjqYXbRS;o)AW#W;5S6l{kUx4lk0Q9x4FGyUE^bWw_1TC?J!;7 z)TODSavimK;Ps)Koa{sP>h}$M(>NUDve&@C^R=}=i^-?I1!O~*j^Kn;gVzKnAwu7p zi#2&&PCp^c=%P%bFP1V0z@POUj}z~+-m7(%d*2Ai-KXoU=p|!86LEMFV_yNQQCH0M zpp?dt+p+pGnk{%)6(&~-bmi$YqqKP`;2(}f)ac}x@cwEVD{!2Uv7#eF9d~ySRe=|i z$vCH8BDDIMfhMl}<&5ijlf=!o3iWCVAbmh%uz-NvOmN|~M)|jbrp6sQmjZH7IZSF>#6HtZy7|~<=XAHN*rwlPlc4X*;kfh>Z)Z6D z$o!06Eu`79&Ho1e>l8eA5Z-pgue|x1<#1}V9VYhUi7j|0aJ@P@;cvp@077&#GI-KD z=f$$ztMn`;G3!NCD%|te{&>0cc9q(xT=4_4U<0u+4q^@R=#Q@o=p*y_@e! z9MtuF#GD!j4-YKpvx(n7*_*~v_`&e;^?&%yKXKT{fVaI_aX2*uI52)Cmh2&eV zAh(}yeh^LK;O2hNyLesm&cCdhLXaY(Bo>h3^W}lCSPKEU8i?4vD2I|IXP@tR5jW2_+fb zkn^jMe-K~|YI)a{VeKP6Ew{%CtozKLV8rkXx13q`rAvin@bli}_&ls@HaIzIKUahh z`$JJj@|p)YY?<|%T1ow8uZ#rN%k0M<>-k;4HREcktG^{0Pa@w~SV^6?;~_>)VYsY& ztQ;~4O0{egZ2K zA?BHgKmBop?&#|ax>M+^Gf=uv2%wq8{wj~z_40AM;Y09Hn;Q=(&#B>vgitV-*}l!; zR;1wPD65l}jt(WLH1~ZO&8H((@75d`FLsZi6uX_$d>l_B&tjHpIj+pt2ZHj);K2#l zo?o-YHQr&yd;3zmZ|z9bj@jwex7!ev$Niqy|0)_Q*$dC7HqE6+4%Fo|pZvkv%34AB z*|Px~o;0>BUi~?PjvgDkASuC!**%iaiHukeGcQt60F~z(=NALd?aP%6PuuoN?2dWp z!KXG-Vx^FOFq<}b{^2jX&A zNboX0<_^H{b}igqld5yh$#^qvWYvMSt`tdlB0bIRq}^ekKsu0_y2?Q;Z?9F+3S(x> zNh)j><9e-IVPd5am4?kjReWIotLF-PhnaHfD4$)xoT9|s;wD!-H60)NmD!SNgLdaK zKkgeOG`|5FFn_E5un%M>F!BTV9s@8Xog6v6L=j6{D3h_DL|r^UdgZjGWNrUy4v#a~ z*DxK((oi9ElJ)E2&295(&}p)@XXono^f2ixtdg3_YkbVpvln6@N6u$B+A6p)iCK|LOAmrN5}c@uuIr|T2OEwvgM>} zSTM2oWiQ!?))enarO?;O%p;8b3+gQ9spYrai__;REZp2G4^ZS3-e(>OE%!KwQxQ@1 zkxT5jPKWJyfukwG=flEvqQjsKkLM2W^CH!b!NHIHg$@PvzkURjN-xMD6&+V5QaKzl zP;6lde|K`)`^Tfk#O+=WXdTFQhK1f8eQf0?R=)+iQP7iHIY&q54;&y#|2dh!wx>7O ziZO0z%x4q#2vLC^W#4$#+;o|Q!8^Zy9Y|Ds&W&0=K;quHS}O?Q<80;Wd$knxh`04W zObSlKq?yFoxeYeS@@!GkjduhI-lR`4kaY!&b@=`Ly*&@vG<*xM!g^mEGSu&s<~~N>E(;pO-z4wP?t((&XGV6IQyy;Nnt%&i z{^bIDTH5@!rkjy{pl+b}brJkn zs7dx2Y3Y`aZ=RA%pqHfSlDjO`G|0J+;&^`50CmU9oxU6JN|?~VPkyZD;-U|H=rTUK z1Vgd%{eO=9|B!do684+^OsK!s|8+3#vB92fH=oi_$M;fO=!n0;sIU$7xR!1~oSB@= zK??0{u>R4`iA|w3g^h%8O$q$Q`{ShlC6KB%Z4Dp{=a`#3Y24Btl0a&7N*4nJi5O`{m0Qudb&F`?kcR zf0~mHzt`*3?xHSVDk84x7kv#oqX3l7 zAuEgA+dQuh_QpNlTMzbEn+{J*6Or5TE+S#=iEVIK0A#vjn7F_ zv$(3EW8gTm{_xs;kLIP79(c{?{*@o=x!mE|H94H%}od+cJLaH*mvo>_}EFwLjs>Gr+nw$ zf^Nh=A>&;+>~lBIs{{ZEfDKJ|7MtHj!SS&bOxer|>*nNyF6RkNK!4tslH0zq^D2KI zZI4xuhW%1QRlczql+qfvT}N;AXU2GI8p&v@Z`#*Wcp5%xrWI8+?Q^(Z>@>lfkx?`v z<`yF67)1>U`M4MJ3ZN0}`c9Nr(xv$r=Z7Hw#RK#6HJ;2(Z)@9JuTpP^mdn49!hGWi z$;mjDb{jk_q_IfwlFaaIpW+QwC46_F+t9Kl@~R@gsUt`NE9xQQrH3#`lnu83do7zg zd}!XWncyoYo7HojcGvzbug;6XRKrnz!MpKUxEzn;qoW&K;x-x~p>8h5*i30Ep2w{q z&G#ckzrRU|imywt0`bxgYY4+P58ZEPUHkiAVaoI~UCqC}7fQvdac3_bqFI0S_AU#J zT?!xH5qdic2+$5Cp80h?F>kdpegwGST0CTqE;ahT4IS+aML+!>nrpMxv}BEkwo&s% z-Q6YMgQ1yq{$>tYl4rAy7S=?n#t(CaZDT*-tzc)jF?x{mazNm8FzITafOeg++8BSs z#1Fpl%~hm~4^wrej3^M@jq{-?BMopH64$|-BzN0!Ril$BDuA|Um!ORI7pJ??R&PwE zb&~{OHsAt6df#C!csXxPwPY)~d1ag0Slrw+)JrpTcnBNC0Cn8XeCd*~@Oe)PC4C>G zHo1%iqSkIIbhx!tA-j#8O=vsq-L?eJ|L^^(U;S&6sZg#5_=KrTdS?KE!OwL0EWcOD zhc1~Aq1L#+1kH!o@MUEYpUrcwq3<tN<_ou0k=Oot<upEUgi6(jT81j2jVUn$+k9Q8z<3CNSRb5_ zMRCKK8*hznf17CIux>pby~sxE-q-m(fc_qY ze#zJBr;qJVBTjpWB*q>PF<@lvG(^Eb`}v8oCx@4#?QzPXRcxFXA2~5M^=7w3UU%~1 z?9Ay|#>=QrIxxDBro848=L5*|Q*_^=fbdoQ-2mdRaCWtAk|>k#H~>S$9rM1A^>bKV zKSu_~x`}-TFf?vp*}>D8;cX09ck_LJqJz+*rqs$9mkaw2Tj7K zpQ*wqt&J&Fow1w#NxfU4s z5QSzy<^h8e&+5*59k=@beX@*Q&+}iNu3{UVdwPGNdEXa*tRa4uAyWl9QJc-_B5TsG z3jU3&#>@!@j2-Y~L~z0cvIDqhpz-twx^b~jb5?uZ>;oY4BfabEs<^OzB>G<2hyazQ z-*x`F7Y}~ozP^HQZ*Sw7T;Op=T~4qaAjXUFz@YgoEKe$9AVb?~dh#t(Fg^*unmC^_ zU6t!i7^f4wb$~4aoG7xI)lwT9qKg^PI@uUB6*R?#RkMwnWXx;W{z!P>k26DLTmPKZ z^LJK|&=t}gKu>#5S;lX;LskZD>6-_DzcA>vTxOb_Kqd6){YIn|sX+xp$%de6q>~<= zE*?eQ+tsS#2O^qTG%I9t{F?7f0DI{@oza5;I%6p?iKe%&*12mZ;dABglZ9;Db1&gk zQBe=~Tfo*qUBer@kVuaZHvAFTm?=!)tVj@j#=)Y3OP4}!r;8r>wYnqzgH&tc*}tPd z@2kH^Og?|Dhk-A;5m`jk<(?9-hw0C&Eeo5OxsHtvy4fF9-yCb9GMC_;(Tj^@O|B-= zoIF=u#-~N%eRk>elVVy5L@6@4`bcl!XWHtu_x{jwgu8yqf)2ligBWagadd_uOxv#} zM=WDBqcwVL9X6ROVPOh2iaXGxM4NARM99w)sbo%DS5ImCiqWynU9N@+%l70q|A+Zn z*{$iHZvY98470lXo_CV_<~Ajgsms0F;|7&6PL0l=5u!NCe-jTL8ZuxP{EXjyTg-H_ zB`#HpLW4}cUee4woKKe_=3y#kEMbB!Bg`Lw{6pD)@x*j8|Av37Ddo+c#d6f_Gaxjs zi;l+XtJ6B|P#aws62ce$8bi(97V|g$?shzP#7LWEw5hJH_g1OHh9qEvnYLTRObrIH zYS9SbZd^f+m|;?iLHFQ{rR1JZKEk1KmHq`veSyDiC-z%y)-~@-B#XtVK6hV)TF-`s zaFlkx_Rn3l{n`;MbXg5?Ue2YtB&=;jacvUSCF>}68kP0nl~6HvI+)tYof5dnIeiEx zs_u@jsOd!XpPBjV7*Kh7$Cv5KjTJ*FL{t)0m{;&)ZMyJV?zHsGg$M&tFnNfK!tCeK z)M~LLnFgxR7^wT+dqVh#9^oGacq!8h4Nx!Xi!Q^GC_-@#Q~rP&VY_coY8&K@94*u% zWa$2Wdb=-S{?vOCutq*=U1IJ-f&zj`$$S2wL)yZW^bSwJTCZ zG-|BD$2Jn*wEK)>2Gg@6u?OukD_I)Kc0>bEY!Cvc@sTB6vUF(Ap9l5P zTG*c7m6dq{&FNFvOlOLg>i5QCG}=lFw(femcHpDROHG^^*Fz_%)O2GoYwMKp;RE-$ zM%LHld{ycHaxjY@+Eq%WBYrGU&%|;6z*4D(h#tEoo+MkxT=Mh43XCJ(1vtUE-wlJgBiL4g$sFo6sE|O`X!55FM|LyrNAvRWz2h zREjTD>YLIhVG3VEMrbGgCev3O`Qdn)(JVAwpf_F=j0w{eP;Z-bMEz&u%gE2FB5y(d zaH@C=i2-_g@?_zpzFL6zM-Xm2h=m?*LEPHBSoyX9ph7$M5Dowb54e3M+%NNmNC+-r zq{1PQp}Y;Kwx+B6NC2G%NIXtUE))z0%f>f4G=xyo&h~Us2YzP*aX;pXb-~*lpC5__ zKtLv&pcFdVf}2t~Mi%j;y+U=Rb9V z?@cXR2`y9c=c7%nYT3EcSE<&D);$KdPhgJY6RSDv8pdP-wi0` zQVUAjf`FcldPY+{e=wN=Y4w)UAehT?=j5n=c23s78tq*Rl7$~%Bcb;i^6%giz6N6N zfHF#7tqOXyF?C{Dt-_*vr$JzE-t^|?MGp3VpH`GK17(VBfWpHGyT2xr>B?>eg;Wo& zv`(Cyr3Q~t#wY8AYL}{!?%w;7Y!yRIEbTUDZQ)W&Zq0rw6yyACL+8&&N&;o4*0UF!o)8sd%Dm5js>lB>>WVwJnK(P|=MeX>Cmp zz`@qS*P!+%bK!behKc95?mQQ5>{kfpuCU3ekzBT@UUz=dej^rJ?MN4wMY@vQfqv=3 zu3VO#R%P1pI<$n%@ky^vKEXdF>PgLv+&oy^$OyzXx(&U2Krx~*m2T=)0`8IzfXLj8 z%Ab~jK~4_v*7zg9X9xXH>i24gLPy;e2eBsmnsCR4BCsHlr&I+kY)6SGtEcoymqe4 zI&REZ)6ha*Pk>a`4BqDIewrXUC;0xqAlOq15#fDiidl-ic5mqQqgIp?ubAT5_5JhPU6*IwPNM;>l6oSi ze{M)u680_&?j230f3N+%7g5WXSbO>VgZuRbm>e@aJ{iZ|X7;%e?r13j0ye^DXq!m= zi?*>KZNQ(OjpCFTm1!^nKDEE}!MW+*p&}v?;GrNJxB ztcG$Ce~c#?kb@}cgO{kobj+?7(FE=8?v^Rh>=OF@FE|Xkbx~liXjGBjmm!-_Qi4_5 z(#OwJ3@ur;X9!8fl*lT&hQMO{fHc=(yl$BE?w`_RWx2zN6Hz%Zp@UqGFj(0@u1C$e z$qoJDEc6}!)>+JgY2ZOA#V{%8A}?GmS>0&Kh&~t}7B*r-Da?WD$I4nnHXgZwj%1#- zznL9p(@d^;Na4WFNL2s+m1kK+jjDb3U6WV6-oI6d7vD7^B7ey+v5F{-K)s%PIy-%P6tXjluqN3p znu&NpM=EhH_CX?tHR8v;Wc-i-X-qM>B-XG`Cb#0Ee>nWvn?==WgTlFaZ1s`nGz$iV zi*3dovds8l%duhGpdC)r>Vm4FF1LHD{tIBNp=iTG4*B!r)(Xc=*g zR^w(cK(m+RqYnMxen7`;>1PYi9}$jHR&JW-2J$$wb@$+?Tt%$Pu7%sl&DYyK_?ycS z9&s!S8G_}5G2M&HC!zQaot_`w-fsE=EjWA-%f0=D#Z>t+t;`JZ111H5q9|Q(G$m;) z*XB)yp&!>9$EN3sJk)2l+4a2n=0FHJ=IJBMZx^PAXBP>?>|dZ1t-BEBF{>vmsp}{ z?qc~f2z8}nl~+~|nbL@3r@+g4p#SKSPII7ww&xP*JKE>N|40x+?gIr4XA)*?RKh@o z9U?yCxCBjaK8O^71PAK6kJXKN-!L|Gv;Y4aKP=O}%i{r$;S1MO_#j34_^FJ9Wwssg@pcL>sUngZtK9lJ)$n9 zMoiy5$_1l@)r-)sFD+uOczH_S-S?MdAI-923mhI(m=s?+-vz+GzoR>j1xlC9vbngl zSUK?bt?jT_F5r_+Qnfbd+R?P<| zO5P1Zt=?lSsQcFwTdB{z7eEezpkm@;YW}(% zA8JS%9dhw>*4gb*R9|v@tH$bK$RGa)I?_M3N90ABqnb2V#VE)asmXY&4x&G=u{lzl z0oA%$gp#L{b=DEe6RsBS@6y|wdjjrPzcjPaKym&zR02NN4zw+_QgGTfxc$FkCzyLL zN!1v-bSCy=C?`Xuoo z+8YIKET5wX+IzZc8S%Wo6v0vo=P4)dX!+9x5k7fRSpI@t=mx}$a!@}W@q((F3OxCM z>QcOKWf${?68@ACG#_q|G^>75IZ)d+EOq`B(n~wXZUM$3iGhvQi;!`-xn4f}qcg=O#6;g`f^3Kc1laSvK4|C$20* zW@bz$GL5nepxNnle~k&NbvaqEKimQFK1&Z`nVp>q--Y(p$7$I#?>x=d`0g2;0&<2v zps*1GoK$KItmrJBjuAv?qK?Vd&*3=n}^Cfjd z$V#rCVuDYwGdfU1?^?@bFqQ1ZniqzdI91=5He4LpkNhObf!kGzif~#XVUfyhlELZ| zN1(s$s^{nAXca^#D6GNib61mWpW12!^JVg~)5=Pe#m(AB-MnHSC|~=vi-!}YC~@f@ zaQW?_YTwW)!;zJ1TUwSnfB&xs|GW`hh({VvxX3M-yfO6477tTVG4|n~?(ddyM z$bA8KuNWb_qvXw2lb6M=eCx-92|jiW9gUyeOZ9PGA}S+Pw5uTjy;0IPMKXzNk*^>8 z$Nufbm6722PL+ygk^GO{Wg>f#ZbZ_^OZ=0lXiQBk*~k^ zmmpvDJlF_7J>=hqMzmwkF+*q!(Ccc#_td_Rd zJe&b|$2h06hG9Gjx&67EEOktOtxeLIvnDn=HY{XGuQ0o;rY^nJ)2Bl;2x)S3HGtIC za+6+~BY5!JGIsR#6^+AJqt1_IjLZhnVc*G*d+xUJBhC`RrewS$Td8O12bxPpD=K1A?mYylI z-uNUXbyMrvGbV>c8T&x_`!2uiaIAPSLv63Z@WJd`l3dlz=KMlPCUJ7iH+YARKlerH0cfLTGMSqSEydSzcUE5N_a0R1}fAMq_0p765C z7uDJOzK>wPD;p-g@@*3-$ND@6@^k>+pajR|uhIV7RpC%#{vH|8 zCP59AqE}K;MoyFxaioy@InN->x7UEAVTNsq9MT3yS;is%he&c@M&6pYjbOo0OMcz0 z`yQu4Ljx)|MI&$n0gDh0FgHBtcT5~mOS_v-8qbwbVAdU@C;Aj<6v2H4nce2MT4JtA ze}zMoS3JS;P80kb6qaS_DWEmtrZ}Hon%#SG0frJrQVM4^T5*qBV>mr<;W06=BNgms zDy^s(vt8T$U-taF4p2Jn3zH(|V}G_|N&QG^vQyJVyG6^(Xj6*$+{v8`BG|DnEriUV zCdVR-`)M*kk;aSriQRuQ^j&W-LY;mL2?>$&w0){;Q^5~xp&)RE#inWDW30S?6=gYF zGd?o9-0FJ9oBO@*1Lo~cE>G}vFkF0MGK>b|sP;Pw!D;aqhN)X1W($K;e4+#R44=3wLYyVb5+a^;jPy4#~JZ%9S z6^rlR7An)1mN@+@Z37*kSK8vMef1G(nmF%6{JEb&CV2y(FA$tR^Dzk}4{1bP2*$JE zgP*tyf@W41xxVl0%WuNm?S3?DJw5UBynK&+Bi8phQwOa*ta`N`M^sF4C{5MqH=hsn z{x)hQO%wJ&=oPb2VRxbQt;tmz6-@;#tq4If*Z`_$hRpi~+=7~JlnD}o9Ydk|?M0tX z9}CE}md6l3FTGG=Rxg|*cxN!V6?wvYGF=UgA&<-RT#{F?-=l*n0DHDP4w!DNEiaF0 zRuU59kKW__TGN`^xSrauHZifmFd~SE~C0ZvtwG0ztk zTOuh)!zXWp7~bnc-CXZuGNHHGpa(Z#4GF>(aGPH5CMv#99Tfij`Ln6I+HRq((VF!1 zY!=za_FkT5R79Rs{{6S-_v;&S^L+Fqtu&e>{IDf_d?R7HWFyU4)P$O<;Ei{=Ybttt zZ+^_^cTE$7;NW0B%y6>-Q$qJw5pPlnb#<4fse_j_dZ26w^pg1Bz*4V+siV_Z{W6Ow z2V4qxypY(g7M$su6RD}`B}7&bmo$m_>RTUq2c zetBrVKtkCZ{Q3F{3D~im6L46~m009@+^5_!F|}=pp0}J#qPeVbZFplX>UrQa{rVtu zbIXS6wOc1e?cTX@@o;zNLBcc)Qu5%DmgmWtZrqKg`G5~kPKn=ikCL>MhB`Y{ixZNM zFE?;x(49UIamS4BI8>P=>PvOW;eS%yngS4X{T6(UjVS={)r+SWK$KJKe5CSF;QH@O zqvdh2NTiiOG;KM);?E8p<$v4h1)2X@+?0CAi2kjsOA!xB0&E9p6KhKTmal@U zyPmD=TDD;yDF4w8{}W-GTbKQ42j!(X0P0k&kdcuwFby@=`ZnYl^;6~4pKM57%=fca z$_9DlcUc(QQWYf-R#MeO`!L`aU}G21i;rKj4}JPAXkwyFypN?Y#J?&lEpT1Q(4N%w zaa#zy$K>ZB^UTfEe##06hMLgK#@*H&rKW5A-cHWV$5M)uR7%2%7M%rL`^BSwiXPK3 zM<9(bejYe^Fb>PXS7i{#E>WS;Wk&Ap=~2*XxO2uZY{cN?Fu#5?hz-3S#c1ZdSbAc7 zh;aJvQMB^&^F?e|o8&(!r2Xmg-5F9DlP!<>?QM==<;<9X^CJVZjLubOxd6tVl@{W| z4t|k@19B|fYE#}Xw8lcB@FAs=@S=o2GZ2jWyy7|aA&fN{4yDKvKDH#LLs3tAs)|BB zUaqb=r3D3n%7ujg%(IR<_EL2Dl2qDRHYElgpA`Kv9{$qTL}>xyzM8653EsALe6Fv0 z`WmkHrq&Bx68t&BWZyF8$N?)EWML1Cp+iC%TJp5iSgx^9O#*4w;P4sJKwDF~?1Kj# zPK{AY;_&Ikg^-R`f|WK_goKU`{^Q}O_x|HO`pL@5Y7|7VG9`4Lpb|^*guyG-XYUVsD39*FAWnNIABC0~XJal~;a##WwVlkxJPy?&0B4L)>~9Wy}nkJcBz)cwc*&2=VD@l@%6+) zk>@?C{i4%;>(MlJXL@)YQQ*HkuLx4$J;Hu}JqRtUuHq>vZ9lk@=BDIc@edRw95qrC zcob05j#Ac*Is3hNsOAq@j09HOXUgsY_%}UD=!(K_@Vs8+#KY3dO9uL`H3hi04<7{H z{s_Uxx2S4glJziC90sk~{GJj?#-$vDQPKk~Yi}*?ugfjt>!gsOA@(o8+0j9X(bn1| z_)zreuP>DsX$YO7^&g`!qxXX9Tv82}{lITro%bu&JBX2^hi69)OrQS$;HaNpPA1k| zZ*f504?~$T9p@!PT}R6MYYtRVrZYIcWKq=tGnD#_O8S9xqcAm#<(Lf{meCyg!ZSZa z;7C=SKqd%>By%AgnDguK$@wS8RoJfl<&Cffj#N26#EJW1`Qqmkf~TNL^8FxvNjA_P zF%s!QuC}qO33mP&mJgEZ}Tb zw$aH^k|3IFxc~!*dAxOpeiX&=G!`*N{kA!jr~hsx?`wx6L;DTzePN9|lrY;vFB1WO$NZIcusliv{c!?uspN6XeJ3vS! zHpp_u`PiHKybh%b1VUJ>Kd^*TLj^XWfCj99zjB)Ui`;eJ|4N zEf~&Emw%a$Bz&ZGaCV%5hh~;kH_^lnT7+vADWmz}>`z|2qH)#44hBvcXgnA%`N2yHe9$qThB|4#n`H19xr4(ASPSk+#OVno zDRpvMm?{eq3{=5Bl;suZuFk?1iq91=N&rW10PD(P3Q$!@oj>mB3pv%G|9>cQblnXw zuHCQLdq)=+D(Jf$VRb{LaoLkj34!@RaAe+pBmntv1>J9^mio>@p9i6PPvxg&9j?4G z`0Kzp66jpCdZ@UwMOvs>xQ>vGjM6NUjx&6BV;Yz^SC*Mhgc)TBjs{VBY8&#HI}H{j znE`UbU}>AO0$~Jqd1+dFeE*owhs1x>;aGQVp@T#^3@(DAcZQgJe2$2OK-}9cJ03s@ zwjSC4U-NO%)74DY|MN@kZ~k0PTf(taCMgqIb#+a39>-kEhwkUmgdjLLIJa1M8mK*% zxGaV;nh;hJ0wq$iKp4TA7((dRXRwhlJt`rr3Edfb8HI9A!&R!YWj>?PDt?m@H70tr z7<&m=aexFBlDEbl-#-{5+_?F^0BCG_!#)wB_QFQh?F`pBzJ<)dAmNJV0K2Y#j~~r? zm@czEi2iSC+2RmCbVZ%jR~X9=-2>D+o@;;&bF36xKgJiERcFz=epaw-DjM#AhzBjS zcZO}QM=DB*<_#=AD!~-vb={bj?8ms%lbAftK1Rk0T7zdzM47^t2TGVR(B{F$%o_E8K>=khJ~L6k@Y-}irWS7FfIxtB7FsHR~i6i z$Sl$=qz`E<_0g3(;IqVnES98Ffc#O`valv;^c6pZqQo*{c&9E|g(45`kc9249C##` zXK!TQzAOD#sVUD%&e+7V(6bFh&q#OIqx{2Zi#t;b@&8I=5c64zsrLKXFnG`FGe0=6 z0@zR`*jQ1zdVY5H5jQd*|M2{fDp@*SH%`jc4mE`48tIyrj;^4gf!%rJW2zp9+xc3` z!}Ho=Qzfgt_p`;Yjpas;&tp-LfmW;a+l6Pro1y#5sNX67UJg@v=;V8A#ooog&#Cu+ ztBJVrez*Jm!W;f}-*0@6-?95y^S?L1-5oDt*U$a%n!9fMeO>pz5)WorpSNB6aTV+H zo#_XU{%$=!mkAX1KMoX_Ce$UL+xd3#zUm{uD-RF+biKF7#W(IJKi}M{3+MfAKW}+b z|N9`YC4PKf+&?Wp-$%mY_iF7Aw5;Y&e#`5>JN?kn{YU?^JL{ZnIPho1O9lo8$r9Iy z66gHf+|;}h2Ir#G#FEq$h4Rdj3 Date: Fri, 17 May 2019 09:05:44 +0200 Subject: [PATCH 201/531] v9.1-dev init --- CHANGES | 4 ++++ hydra.c | 2 +- 2 files changed, 5 insertions(+), 1 deletion(-) diff --git a/CHANGES b/CHANGES index 48dd919..6ef0ff4 100644 --- a/CHANGES +++ b/CHANGES @@ -1,6 +1,10 @@ Changelog for hydra ------------------- +Release 9.1-dev +* your patch? :) + + Release 9.0 * rdp: Revamped rdp module to use FreeRDP library (thanks to loianhtuan@github for the patch!) * Added memcached module diff --git a/hydra.c b/hydra.c index 0199729..2b6e3a7 100644 --- a/hydra.c +++ b/hydra.c @@ -214,7 +214,7 @@ char *SERVICES = #define RESTOREFILE "./hydra.restore" #define PROGRAM "Hydra" -#define VERSION "v9.0" +#define VERSION "v9.1-dev" #define AUTHOR "van Hauser/THC" #define EMAIL "" #define RESOURCE "https://github.com/vanhauser-thc/thc-hydra" From db9025bf86e79f1af1e1d70bdc6ea133e486c781 Mon Sep 17 00:00:00 2001 From: Hank Leininger Date: Sat, 18 May 2019 15:56:08 -0600 Subject: [PATCH 202/531] Worked around APR_PATH_MAX errors on some Linuxes when SVN is enabled. On Gentoo Linux (and possibly others?) with Subversion 1.12.0, compilation of hydra-svn.c fails with: In file included from /usr/include/subversion-1/svn_client.h:34, from hydra-svn.c:9: /usr/include/apr-1/apr.h:632:2: error: #error no decision has been made on APR_PATH_MAX for your platform #error no decision has been made on APR_PATH_MAX for your platform ^~~~~ This happens when PATH_MAX is not defined. PATH_MAX is defined by /usr/include/linux/limits.h, but rather than include'ing that directly and possibly breaking other platforms, include sys/param.h (which will include linux/limits.h indirectly) iff PATH_MAX is not defined and sys/param.h exists. I based the approach on how math.h is handled. --- configure | 8 ++++++-- hydra-svn.c | 4 ++++ 2 files changed, 10 insertions(+), 2 deletions(-) diff --git a/configure b/configure index d09ac9d..0309e53 100755 --- a/configure +++ b/configure @@ -557,6 +557,10 @@ for i in $INCDIRS ; do fi fi done +SYS_PARAM="" +if [ -f "$SDK_PATH/usr/include/sys/param.h" ]; then + SYS_PARAM=-DHAVE_SYS_PARAM_H +fi if [ "X" != "X$DEBUG" ]; then echo DEBUG: SVN_PATH=$SVN_PATH/libsvn_client-1 echo DEBUG: APR_PATH=$APR_PATH/libapr @@ -1501,7 +1505,7 @@ else fi if [ "X" != "X$DEBUG" ]; then - echo DEBUG: XDEFINES=$XDEFINES $MATH + echo DEBUG: XDEFINES=$XDEFINES $MATH $SYS_PARAM echo DEBUG: XLIBS=$XLIBS echo DEBUG: XLIBPATHS=$XLIBPATHS echo DEBUG: XIPATHS=$XIPATHS @@ -1519,7 +1523,7 @@ if [ "X" != "X$FHS" ]; then echo "MANDIR = /share/man/man1" >> Makefile.in echo "DATADIR = /share/hydra" >> Makefile.in fi -echo "XDEFINES=$XDEFINES $MATH" >> Makefile.in +echo "XDEFINES=$XDEFINES $MATH $SYS_PARAM" >> Makefile.in echo "XLIBS=$XLIBS" >> Makefile.in echo "XLIBPATHS=$XLIBPATHS" >> Makefile.in echo "XIPATHS=$XIPATHS" >> Makefile.in diff --git a/hydra-svn.c b/hydra-svn.c index eaf51f2..f180fbd 100644 --- a/hydra-svn.c +++ b/hydra-svn.c @@ -6,6 +6,10 @@ /* needed on openSUSE */ #define _GNU_SOURCE +#if !defined PATH_MAX && defined HAVE_SYS_PARAM_H +#include +#endif + #include #include #include From 30e5d53fce14af9f8f38694fa0fdf81d69d956d6 Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Thu, 23 May 2019 13:31:37 +0800 Subject: [PATCH 203/531] Delete rdp header file We don't need that header file anymore as we are relying on freerdp now. --- rdp.h | 634 ---------------------------------------------------------- 1 file changed, 634 deletions(-) delete mode 100644 rdp.h diff --git a/rdp.h b/rdp.h deleted file mode 100644 index 1d3c7c4..0000000 --- a/rdp.h +++ /dev/null @@ -1,634 +0,0 @@ -/* - david: this file is based on header files from rdesktop project - - rdesktop: A Remote Desktop Protocol client. - Master include file - Copyright (C) Matthew Chapman 1999-2008 - - This program is free software: you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation, either version 3 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program. If not, see . - -*/ - -#include "hydra-mod.h" - -#include -#include -#include -#ifdef _WIN32 -#define WINVER 0x0400 -#include -#include -#include -#define DIR int32_t -#else -#include -#include -#ifdef HAVE_SYS_SELECT_H -#include -#else -#include -#include -#endif -#endif -#include /* PATH_MAX */ -#ifdef HAVE_SYSEXITS_H -#include -#endif - -#include /* stat */ -#include /* gettimeofday */ -#include /* times */ -#include -#include - -//fixme - -/* The system could not log you on. Make sure your User name and domain are correct [FAILED] */ -#define LOGON_MESSAGE_FAILED_XP "\x00\x00\x01\x06\x02\x06\x04\x09\x05\x05\x04\x06\x06\x05\x02\x04\x07\x06" -#define LOGON_MESSAGE_FAILED_2K3 "\x00\x00\x01\x08\x02\x07\x03\x07\x04\x07\x05\x05\x01\x05\x04\x07\x03\x05" -#define LOGON_MESSAGE_FAILED_2K8 "not needed" - -#define LOGON_MESSAGE_2K "\x00\x00\x01\x06\x02\x07\x04\x0a\x05\x08\x06\x0a\x01\x05\x07\x0a\x08\x0b\x05\x03\x09\x07\x01\x07\x0a\x07\x0b\x09\xff\x00\x1c" - -/* The local policy of this system does not permit you to logon interactively. [SUCCESS] */ -#define LOGON_MESSAGE_NO_INTERACTIVE_XP "\x00\x00\x01\x06\x02\x06\x04\x09\x05\x02\x06\x06\x07\x05\x04\x06\x08\x05" -#define LOGON_MESSAGE_NO_INTERACTIVE_2K3 "??" - -/* Unable to log you on because your account has been locked out [FAILED] */ -#define LOGON_MESSAGE_LOCKED_XP "\x00\x00\x01\x07\x02\x06\x03\x06\x04\x06\x05\x02\x07\x09\x08\x04\x04\x09" -#define LOGON_MESSAGE_LOCKED_2K3 "??" - -/* Your account has been disabled. Please see your system administrator. [ERROR] */ -/* Your account has expired. Please see your system administrator. [ERROR] */ -#define LOGON_MESSAGE_DISABLED_XP "\x00\x00\x01\x06\x02\x06\x03\x06\x05\x07\x06\x06\x06\x05\x01\x05\x02\x06" -#define LOGON_MESSAGE_DISABLED_2K3 "??" - -/* Your password has expired and must be changed. [SUCCESS] */ -#define LOGON_MESSAGE_EXPIRED_XP "\x00\x00\x01\x06\x02\x06\x03\x06\x05\x07\x06\x06\x07\x06\x07\x05\x08\x05" -#define LOGON_MESSAGE_EXPIRED_2K3 "??" - -/* You are required to change your password at first logon. [SUCCESS] */ -#define LOGON_MESSAGE_MUST_CHANGE_XP "\x00\x00\x01\x06\x02\x06\x04\x09\x05\x06\x06\x04\x05\x09\x06\x04\x07\x06" -#define LOGON_MESSAGE_MUST_CHANGE_2K3 "??" - -/* The terminal server has exceeded the maximum number of allowed connections. [SUCCESS] */ -#define LOGON_MESSAGE_MSTS_MAX_2K3 "\x00\x00\x01\x06\x02\x07\x01\x07\x05\x07\x24\x0a\x25\x0a\x0b\x07\x0b\x06\x26" - - -#define DEBUG(args) { if (debug) {hydra_report(stderr, "[DEBUG] "); printf args; }} -#define DEBUG_RDP5(args){ if (debug) {hydra_report(stderr, "[DEBUG] RDP5 "); printf args; }} - -#define STRNCPY(dst,src,n) { strncpy(dst,src,n-1); dst[n-1] = 0; } - -#ifndef MIN -#define MIN(x,y) (((x) < (y)) ? (x) : (y)) -#endif - -#ifndef MAX -#define MAX(x,y) (((x) > (y)) ? (x) : (y)) -#endif - -/* timeval macros */ -#ifndef timerisset -#define timerisset(tvp)\ - ((tvp)->tv_sec || (tvp)->tv_usec) -#endif -#ifndef timercmp -#define timercmp(tvp, uvp, cmp)\ - ((tvp)->tv_sec cmp (uvp)->tv_sec ||\ - (tvp)->tv_sec == (uvp)->tv_sec &&\ - (tvp)->tv_usec cmp (uvp)->tv_usec) -#endif -#ifndef timerclear -#define timerclear(tvp)\ - ((tvp)->tv_sec = (tvp)->tv_usec = 0) -#endif - -/* If configure does not define the endianess, try - to find it out */ -#if !defined(L_ENDIAN) && !defined(B_ENDIAN) -#if __BYTE_ORDER == __LITTLE_ENDIAN -#define L_ENDIAN -#elif __BYTE_ORDER == __BIG_ENDIAN -#define B_ENDIAN -#else -#error Unknown endianness. Edit rdp.h. -#endif -#endif /* B_ENDIAN, L_ENDIAN from configure */ - -/* No need for alignment on x86 and amd64 */ -#if !defined(NEED_ALIGN) -#if !(defined(__x86__) || defined(__x86_64__) || \ - defined(__AMD64__) || defined(_M_IX86) || \ - defined(__i386__)) -#define NEED_ALIGN -#endif -#endif - -/* Parser state */ -typedef struct stream -{ - unsigned char *p; - unsigned char *end; - unsigned char *data; - uint32_t size; - - /* Offsets of various headers */ - unsigned char *iso_hdr; - unsigned char *mcs_hdr; - unsigned char *sec_hdr; - unsigned char *rdp_hdr; - unsigned char *channel_hdr; - -} - *STREAM; - -#define s_push_layer(s,h,n) { (s)->h = (s)->p; (s)->p += n; } -#define s_pop_layer(s,h) (s)->p = (s)->h; -#define s_mark_end(s) (s)->end = (s)->p; -#define s_check(s) ((s)->p <= (s)->end) -#define s_check_rem(s,n) ((s)->p + n <= (s)->end) -#define s_check_end(s) ((s)->p == (s)->end) - -#if defined(L_ENDIAN) && !defined(NEED_ALIGN) -#define in_uint16_le(s,v) { v = *(uint16 *)((s)->p); (s)->p += 2; } -#define in_uint32_le(s,v) { v = *(uint32 *)((s)->p); (s)->p += 4; } -#define out_uint16_le(s,v) { *(uint16 *)((s)->p) = v; (s)->p += 2; } -#define out_uint32_le(s,v) { *(uint32 *)((s)->p) = v; (s)->p += 4; } - -#else -#define in_uint16_le(s,v) { v = *((s)->p++); v += *((s)->p++) << 8; } -#define in_uint32_le(s,v) { in_uint16_le(s,v) \ - v += *((s)->p++) << 16; v += *((s)->p++) << 24; } -#define out_uint16_le(s,v) { *((s)->p++) = (v) & 0xff; *((s)->p++) = ((v) >> 8) & 0xff; } -#define out_uint32_le(s,v) { out_uint16_le(s, (v) & 0xffff); out_uint16_le(s, ((v) >> 16) & 0xffff); } -#endif - -#if defined(B_ENDIAN) && !defined(NEED_ALIGN) -#define in_uint16_be(s,v) { v = *(uint16 *)((s)->p); (s)->p += 2; } -#define in_uint32_be(s,v) { v = *(uint32 *)((s)->p); (s)->p += 4; } -#define out_uint16_be(s,v) { *(uint16 *)((s)->p) = v; (s)->p += 2; } -#define out_uint32_be(s,v) { *(uint32 *)((s)->p) = v; (s)->p += 4; } - -#define B_ENDIAN_PREFERRED -#define in_uint16(s,v) in_uint16_be(s,v) -#define in_uint32(s,v) in_uint32_be(s,v) -#define out_uint16(s,v) out_uint16_be(s,v) -#define out_uint32(s,v) out_uint32_be(s,v) - -#else -#define in_uint16_be(s,v) { v = *((s)->p++); next_be(s,v); } -#define in_uint32_be(s,v) { in_uint16_be(s,v); next_be(s,v); next_be(s,v); } -#define out_uint16_be(s,v) { *((s)->p++) = ((v) >> 8) & 0xff; *((s)->p++) = (v) & 0xff; } -#define out_uint32_be(s,v) { out_uint16_be(s, ((v) >> 16) & 0xffff); out_uint16_be(s, (v) & 0xffff); } -#endif - -#ifndef B_ENDIAN_PREFERRED -#define in_uint16(s,v) in_uint16_le(s,v) -#define in_uint32(s,v) in_uint32_le(s,v) -#define out_uint16(s,v) out_uint16_le(s,v) -#define out_uint32(s,v) out_uint32_le(s,v) -#endif - -#define in_uint8(s,v) v = *((s)->p++); -#define in_uint8p(s,v,n) { v = (s)->p; (s)->p += n; } -#define in_uint8a(s,v,n) { memcpy(v,(s)->p,n); (s)->p += n; } -#define in_uint8s(s,n) (s)->p += n; -#define out_uint8(s,v) *((s)->p++) = v; -#define out_uint8p(s,v,n) { memcpy((s)->p,v,n); (s)->p += n; } -#define out_uint8a(s,v,n) out_uint8p(s,v,n); -#define out_uint8s(s,n) { memset((s)->p,0,n); (s)->p += n; } - -#define next_be(s,v) v = ((v) << 8) + *((s)->p++); - -typedef unsigned char uint8; -typedef signed char sint8; -typedef unsigned short uint16; -typedef signed short sint16; -typedef uint32_t uint32; -typedef int32_t sint32; - -typedef struct _BOUNDS -{ - sint16 left; - sint16 top; - sint16 right; - sint16 bottom; - -} -BOUNDS; - -/* PSTCACHE */ -typedef uint8 HASH_KEY[8]; - -#ifndef PATH_MAX -#define PATH_MAX 256 -#endif - -#define RDP_ORDER_STANDARD 0x01 -#define RDP_ORDER_SECONDARY 0x02 -#define RDP_ORDER_BOUNDS 0x04 -#define RDP_ORDER_CHANGE 0x08 -#define RDP_ORDER_DELTA 0x10 -#define RDP_ORDER_LASTBOUNDS 0x20 -#define RDP_ORDER_SMALL 0x40 -#define RDP_ORDER_TINY 0x80 - -enum RDP_ORDER_TYPE -{ - RDP_ORDER_DESTBLT = 0, - RDP_ORDER_PATBLT = 1, - RDP_ORDER_SCREENBLT = 2, - RDP_ORDER_LINE = 9, - RDP_ORDER_RECT = 10, - RDP_ORDER_DESKSAVE = 11, - RDP_ORDER_MEMBLT = 13, - RDP_ORDER_TRIBLT = 14, - RDP_ORDER_POLYGON = 20, - RDP_ORDER_POLYGON2 = 21, - RDP_ORDER_POLYLINE = 22, - RDP_ORDER_ELLIPSE = 25, - RDP_ORDER_ELLIPSE2 = 26, - RDP_ORDER_TEXT2 = 27 -}; - -enum RDP_SECONDARY_ORDER_TYPE -{ - RDP_ORDER_RAW_BMPCACHE = 0, - RDP_ORDER_COLCACHE = 1, - RDP_ORDER_BMPCACHE = 2, - RDP_ORDER_FONTCACHE = 3, - RDP_ORDER_RAW_BMPCACHE2 = 4, - RDP_ORDER_BMPCACHE2 = 5, - RDP_ORDER_BRUSHCACHE = 7 -}; - -typedef struct _RECT_ORDER -{ - sint16 x; - sint16 y; - sint16 cx; - sint16 cy; - uint32 colour; - -} -RECT_ORDER; - -typedef struct _DESKSAVE_ORDER -{ - uint32 offset; - sint16 left; - sint16 top; - sint16 right; - sint16 bottom; - uint8 action; - -} -DESKSAVE_ORDER; - -typedef struct _MEMBLT_ORDER -{ - uint8 colour_table; - uint8 cache_id; - sint16 x; - sint16 y; - sint16 cx; - sint16 cy; - uint8 opcode; - sint16 srcx; - sint16 srcy; - uint16 cache_idx; - -} -MEMBLT_ORDER; - -#define MAX_DATA 256 -#define MAX_TEXT 256 - -typedef struct _TEXT2_ORDER -{ - uint8 font; - uint8 flags; - uint8 opcode; - uint8 mixmode; - uint32 bgcolour; - uint32 fgcolour; - sint16 clipleft; - sint16 cliptop; - sint16 clipright; - sint16 clipbottom; - sint16 boxleft; - sint16 boxtop; - sint16 boxright; - sint16 boxbottom; - sint16 x; - sint16 y; - uint8 length; - uint8 text[MAX_TEXT]; - -} -TEXT2_ORDER; - -typedef struct _RDP_ORDER_STATE -{ - uint8 order_type; - BOUNDS bounds; - - RECT_ORDER rect; - DESKSAVE_ORDER desksave; - MEMBLT_ORDER memblt; - TEXT2_ORDER text2; -} -RDP_ORDER_STATE; - -#define WINDOWS_CODEPAGE "UTF-16LE" - -/* ISO PDU codes */ -enum ISO_PDU_CODE -{ - ISO_PDU_CR = 0xE0, /* Connection Request */ - ISO_PDU_CC = 0xD0, /* Connection Confirm */ - ISO_PDU_DR = 0x80, /* Disconnect Request */ - ISO_PDU_DT = 0xF0, /* Data */ - ISO_PDU_ER = 0x70 /* Error */ -}; - -/* MCS PDU codes */ -enum MCS_PDU_TYPE -{ - MCS_EDRQ = 1, /* Erect Domain Request */ - MCS_DPUM = 8, /* Disconnect Provider Ultimatum */ - MCS_AURQ = 10, /* Attach User Request */ - MCS_AUCF = 11, /* Attach User Confirm */ - MCS_CJRQ = 14, /* Channel Join Request */ - MCS_CJCF = 15, /* Channel Join Confirm */ - MCS_SDRQ = 25, /* Send Data Request */ - MCS_SDIN = 26 /* Send Data Indication */ -}; - -#define MCS_CONNECT_INITIAL 0x7f65 -#define MCS_CONNECT_RESPONSE 0x7f66 - -#define BER_TAG_BOOLEAN 1 -#define BER_TAG_INTEGER 2 -#define BER_TAG_OCTET_STRING 4 -#define BER_TAG_RESULT 10 -#define MCS_TAG_DOMAIN_PARAMS 0x30 - -#define MCS_GLOBAL_CHANNEL 1003 -#define MCS_USERCHANNEL_BASE 1001 - -/* RDP secure transport constants */ -#define SEC_RANDOM_SIZE 32 -#define SEC_MODULUS_SIZE 64 -#define SEC_MAX_MODULUS_SIZE 256 -#define SEC_PADDING_SIZE 8 -#define SEC_EXPONENT_SIZE 4 - -#define SEC_CLIENT_RANDOM 0x0001 -#define SEC_ENCRYPT 0x0008 -#define SEC_LOGON_INFO 0x0040 -#define SEC_LICENCE_NEG 0x0080 -#define SEC_REDIRECT_ENCRYPT 0x0C00 - -#define SEC_TAG_SRV_INFO 0x0c01 -#define SEC_TAG_SRV_CRYPT 0x0c02 -#define SEC_TAG_SRV_CHANNELS 0x0c03 - -#define SEC_TAG_CLI_INFO 0xc001 -#define SEC_TAG_CLI_CRYPT 0xc002 -#define SEC_TAG_CLI_CHANNELS 0xc003 -#define SEC_TAG_CLI_4 0xc004 - -#define SEC_TAG_PUBKEY 0x0006 -#define SEC_TAG_KEYSIG 0x0008 - -#define SEC_RSA_MAGIC 0x31415352 /* RSA1 */ - -/* RDP PDU codes */ -enum RDP_PDU_TYPE -{ - RDP_PDU_DEMAND_ACTIVE = 1, - RDP_PDU_CONFIRM_ACTIVE = 3, - RDP_PDU_REDIRECT = 4, /* MS Server 2003 Session Redirect */ - RDP_PDU_DEACTIVATE = 6, - RDP_PDU_DATA = 7 -}; - -enum RDP_DATA_PDU_TYPE -{ - RDP_DATA_PDU_UPDATE = 2, - RDP_DATA_PDU_CONTROL = 20, - RDP_DATA_PDU_POINTER = 27, - RDP_DATA_PDU_INPUT = 28, - RDP_DATA_PDU_SYNCHRONISE = 31, - RDP_DATA_PDU_BELL = 34, - RDP_DATA_PDU_CLIENT_WINDOW_STATUS = 35, - RDP_DATA_PDU_LOGON = 38, /* PDUTYPE2_SAVE_SESSION_INFO */ - RDP_DATA_PDU_FONT2 = 39, - RDP_DATA_PDU_KEYBOARD_INDICATORS = 41, - RDP_DATA_PDU_DISCONNECT = 47 -}; - -enum RDP_SAVE_SESSION_PDU_TYPE -{ - INFOTYPE_LOGON = 0, - INFOTYPE_LOGON_LONG = 1, - INFOTYPE_LOGON_PLAINNOTIFY = 2, - INFOTYPE_LOGON_EXTENDED_INF = 3 -}; - -enum RDP_LOGON_INFO_EXTENDED_TYPE -{ - LOGON_EX_AUTORECONNECTCOOKIE = 1, - LOGON_EX_LOGONERRORS = 2 -}; - -enum RDP_CONTROL_PDU_TYPE -{ - RDP_CTL_REQUEST_CONTROL = 1, - RDP_CTL_GRANT_CONTROL = 2, - RDP_CTL_DETACH = 3, - RDP_CTL_COOPERATE = 4 -}; - -enum RDP_UPDATE_PDU_TYPE -{ - RDP_UPDATE_ORDERS = 0, - RDP_UPDATE_BITMAP = 1, - RDP_UPDATE_PALETTE = 2, - RDP_UPDATE_SYNCHRONIZE = 3 -}; - -/* RDP bitmap cache (version 2) constants */ -#define BMPCACHE2_C0_CELLS 0x78 -#define BMPCACHE2_C1_CELLS 0x78 -#define BMPCACHE2_C2_CELLS 0x150 -#define BMPCACHE2_NUM_PSTCELLS 0x9f6 - -#define PDU_FLAG_FIRST 0x01 -#define PDU_FLAG_LAST 0x02 - -/* RDP capabilities */ -#define RDP_CAPSET_GENERAL 1 /* Maps to generalCapabilitySet in T.128 page 138 */ -#define RDP_CAPLEN_GENERAL 0x18 -#define OS_MAJOR_TYPE_UNIX 4 -#define OS_MINOR_TYPE_XSERVER 7 - -#define RDP_CAPSET_BITMAP 2 -#define RDP_CAPLEN_BITMAP 0x1C - -#define RDP_CAPSET_ORDER 3 -#define RDP_CAPLEN_ORDER 0x58 - -#define RDP_CAPSET_BMPCACHE 4 -#define RDP_CAPLEN_BMPCACHE 0x28 - -#define RDP_CAPSET_CONTROL 5 -#define RDP_CAPLEN_CONTROL 0x0C - -#define RDP_CAPSET_ACTIVATE 7 -#define RDP_CAPLEN_ACTIVATE 0x0C - -#define RDP_CAPSET_POINTER 8 -#define RDP_CAPLEN_POINTER 0x08 -#define RDP_CAPLEN_NEWPOINTER 0x0a - -#define RDP_CAPSET_SHARE 9 -#define RDP_CAPLEN_SHARE 0x08 - -#define RDP_CAPSET_COLCACHE 10 -#define RDP_CAPLEN_COLCACHE 0x08 - -#define RDP_CAPSET_BRUSHCACHE 15 -#define RDP_CAPLEN_BRUSHCACHE 0x08 - -#define RDP_CAPSET_BMPCACHE2 19 -#define RDP_CAPLEN_BMPCACHE2 0x28 - -#define RDP_SOURCE "MSTSC" - -/* Logon flags */ -#define RDP_LOGON_AUTO 0x0008 -#define RDP_LOGON_NORMAL 0x0033 -#define RDP_LOGON_COMPRESSION 0x0080 /* mppc compression with 8kB histroy buffer */ -#define RDP_LOGON_BLOB 0x0100 -#define RDP_LOGON_COMPRESSION2 0x0200 /* rdp5 mppc compression with 64kB history buffer */ -#define RDP_LOGON_LEAVE_AUDIO 0x2000 - -#define RDP5_DISABLE_NOTHING 0x00 -#define RDP5_NO_WALLPAPER 0x01 -#define RDP5_NO_FULLWINDOWDRAG 0x02 -#define RDP5_NO_MENUANIMATIONS 0x04 -#define RDP5_NO_THEMING 0x08 -#define RDP5_NO_CURSOR_SHADOW 0x20 -#define RDP5_NO_CURSORSETTINGS 0x40 /* disables cursor blinking */ - -/* compression types */ -#define RDP_MPPC_BIG 0x01 -#define RDP_MPPC_COMPRESSED 0x20 -#define RDP_MPPC_RESET 0x40 -#define RDP_MPPC_FLUSH 0x80 -#define RDP_MPPC_DICT_SIZE 65536 - -#define RDP5_COMPRESSED 0x80 - -#ifndef _SSL_H -#define _SSL_H - -#include -#include -#include -#include -#include -#include -#include - -#if defined(OPENSSL_VERSION_NUMBER) && (OPENSSL_VERSION_NUMBER >= 0x0090800f) -#define D2I_X509_CONST const -#else -#define D2I_X509_CONST -#endif - -#define SSL_RC4 RC4_KEY -#define SSL_SHA1 SHA_CTX -#define SSL_MD5 MD5_CTX -#define SSL_CERT X509 -#define SSL_RKEY RSA -#endif - -/* for win8 */ -#define KBD_FLAG_DOWN 0x4000 -#define KBD_FLAG_UP 0x8000 -#define RDP_KEYRELEASE (KBD_FLAG_DOWN | KBD_FLAG_UP) -#define FASTPATH_INPUT_KBDFLAGS_RELEASE 1 -#define FASTPATH_INPUT_EVENT_SCANCODE 0 -#define FASTPATH_INPUT_EVENT_MOUSE 1 -#define RDP_INPUT_MOUSE 0x8001 -#define RDP_INPUT_SCANCODE 4 - -/* iso.c */ -STREAM iso_init(int32_t length); -void iso_send(STREAM s); -STREAM iso_recv(uint8 * rdpver); -BOOL iso_connect(char *server, char *username, BOOL reconnect); -void iso_disconnect(void); -void iso_reset_state(void); -/* mcs.c */ -STREAM mcs_init(int32_t length); -void mcs_send_to_channel(STREAM s, uint16 channel); -void mcs_send(STREAM s); -STREAM mcs_recv(uint16 * channel, uint8 * rdpver); -BOOL mcs_connect(char *server, STREAM mcs_data, char *username, BOOL reconnect); -void mcs_disconnect(void); -void mcs_reset_state(void); -/* orders.c */ -void process_orders(STREAM s, uint16 num_orders); -void reset_order_state(void); -/* rdesktop.c */ -void generate_random(uint8 * random); -void *xmalloc(int32_t size); -void exit_if_null(void *ptr); -char *xstrdup(const char *s); -void *xrealloc(void *oldmem, size_t size); -void error(char *format, ...); -void warning(char *format, ...); -void unimpl(char *format, ...); -void hexdump(unsigned char *p, uint32_t len); -/* rdp.c */ -static void process_demand_active(STREAM s); -static BOOL process_data_pdu(STREAM s, uint32 * ext_disc_reason); -/* secure.c */ -void sec_hash_48(uint8 * out, uint8 * in, uint8 * salt1, uint8 * salt2, uint8 salt); -void sec_hash_16(uint8 * out, uint8 * in, uint8 * salt1, uint8 * salt2); -void buf_out_uint32(uint8 * buffer, uint32 value); -void sec_sign(uint8 * signature, int32_t siglen, uint8 * session_key, int32_t keylen, uint8 * data, - int32_t datalen); -void sec_decrypt(uint8 * data, int32_t length); -STREAM sec_init(uint32 flags, int32_t maxlen); -void sec_send_to_channel(STREAM s, uint32 flags, uint16 channel); -void sec_send(STREAM s, uint32 flags); -void sec_process_mcs_data(STREAM s); -STREAM sec_recv(uint8 * rdpver); -BOOL sec_connect(char *server, char *username, BOOL reconnect); -void sec_disconnect(void); -void sec_reset_state(void); -/* tcp.c */ -STREAM tcp_init(uint32 maxlen); -void tcp_send(STREAM s); -STREAM tcp_recv(STREAM s, uint32 length); -BOOL tcp_connect(char *server); -void tcp_disconnect(void); -char *tcp_get_address(void); -void tcp_reset_state(void); From b9c5e7e125497b3dc45d9bc0311c25ca27ee3ae0 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 23 May 2019 14:04:14 +0200 Subject: [PATCH 204/531] better compile options --- Makefile.am | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Makefile.am b/Makefile.am index 046aded..ca82167 100644 --- a/Makefile.am +++ b/Makefile.am @@ -1,7 +1,7 @@ # # Makefile for Hydra - (c) 2001-2019 by van Hauser / THC # -OPTS=-I. -O3 +OPTS=-I. -O3 -march=native -flto # -Wall -g -pedantic LIBS=-lm BINDIR = /bin From bd70ea79c29dc460efd2c3672bee87cee9bdd909 Mon Sep 17 00:00:00 2001 From: raynull <51116855+raynull@users.noreply.github.com> Date: Tue, 28 May 2019 12:52:27 +0300 Subject: [PATCH 205/531] Update hydra-redis.c --- hydra-redis.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-redis.c b/hydra-redis.c index c010577..e97dd1c 100644 --- a/hydra-redis.c +++ b/hydra-redis.c @@ -167,7 +167,7 @@ int32_t service_redis_init(char *ip, int32_t sp, unsigned char options, char *mi printf("[DEBUG] buf = %s\n", buf); // authentication test if (strstr(buf, "+PONG") != NULL) { // the server does not require password - hydra_report(stderr, "[!] The server does not require password.\n"); + hydra_report(stderr, "[!] The server %s does not require password.\n", hostname); free(buf); return 1; } From d24d7a86657e9e880ddf2c7ba139dae960a774fb Mon Sep 17 00:00:00 2001 From: van Hauser Date: Wed, 29 May 2019 08:54:16 +0200 Subject: [PATCH 206/531] hydra -m help --- CHANGES | 1 + hydra.c | 3 ++- 2 files changed, 3 insertions(+), 1 deletion(-) diff --git a/CHANGES b/CHANGES index 6ef0ff4..627882f 100644 --- a/CHANGES +++ b/CHANGES @@ -3,6 +3,7 @@ Changelog for hydra Release 9.1-dev * your patch? :) +* forgot to have the -m option in the hydra help output Release 9.0 diff --git a/hydra.c b/hydra.c index 2b6e3a7..3b5aa3a 100644 --- a/hydra.c +++ b/hydra.c @@ -475,7 +475,7 @@ void help(int32_t ext) { #ifdef HAVE_MATH_H " [-x MIN:MAX:CHARSET]" #endif - " [-c TIME] [-ISOuvVd46] " + " [-c TIME] [-ISOuvVd46] [-m MODULE_OPT] " //"[server service [OPT]]|" "[service://server[:PORT][/OPT]]\n"); PRINT_NORMAL(ext, "\nOptions:\n"); @@ -512,6 +512,7 @@ void help(int32_t ext) { MAXTASKS, WAITTIME, conwait ); PRINT_NORMAL(ext, " -U service module usage details\n" + " -m OPT options specific for a module, see -U output for information\n" " -h more command line options (COMPLETE HELP)\n" " server the target: DNS, IP or 192.168.0.0/24 (this OR the -M option)\n" " service the service to crack (see below for supported protocols)\n" From f6001f39e239b1a8d844118b003cf7962de8018d Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Thu, 30 May 2019 23:43:45 +0800 Subject: [PATCH 207/531] Initialize properly sockaddr_in structs --- hydra-mod.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/hydra-mod.c b/hydra-mod.c index b53390a..7df7928 100644 --- a/hydra-mod.c +++ b/hydra-mod.c @@ -102,6 +102,8 @@ int32_t internal__hydra_connect(char *host, int32_t port, int32_t type, int32_t selected_proxy = random() % proxy_count; } + memset(&target, 0, sizeof(target)); + memset(&sin, 0, sizeof(sin)); #ifdef AF_INET6 memset(&target6, 0, sizeof(target6)); memset(&sin6, 0, sizeof(sin6)); From 5df0ab39c0fe65f4878f2da4b9e80716d30ce704 Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Fri, 31 May 2019 17:14:45 +0800 Subject: [PATCH 208/531] Fixing memory leak lresp variable is not freed properly, also taking the chance to switch the printf calls to hydra_report function --- hydra-rtsp.c | 62 ++++++++++++++++++++++++++++++++-------------------- 1 file changed, 38 insertions(+), 24 deletions(-) diff --git a/hydra-rtsp.c b/hydra-rtsp.c index 020b64d..444ba0c 100644 --- a/hydra-rtsp.c +++ b/hydra-rtsp.c @@ -79,9 +79,11 @@ void create_core_packet(int32_t control, char *ip, int32_t port) { int32_t start_rtsp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; char *login, *pass, buffer[1030], buffer2[500]; - char *lresp; + memset(buffer, 0, sizeof(buffer)); + memset(buffer2, 0, sizeof(buffer2)); + if (strlen(login = hydra_get_next_login()) == 0) login = empty; if (strlen(pass = hydra_get_next_password()) == 0) @@ -95,12 +97,13 @@ int32_t start_rtsp(int32_t s, char *ip, int32_t port, unsigned char options, cha lresp = hydra_receive_line(s); if (lresp == NULL) { - fprintf(stderr, "[ERROR] no server reply\n"); + hydra_report(stderr, "[ERROR] no server reply\n"); return 1; } if (is_NotFound(lresp)) { - printf("[INFO] Server does not need credentials\n"); + free(lresp); + hydra_report(stderr, "[INFO] Server does not need credentials\n"); hydra_completed_pair_found(); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) { return 3; @@ -112,6 +115,7 @@ int32_t start_rtsp(int32_t s, char *ip, int32_t port, unsigned char options, cha if (use_Basic_Auth(lresp) == 1) { + free(lresp); sprintf(buffer2, "%.249s:%.249s", login, pass); hydra_tobase64((unsigned char *) buffer2, strlen(buffer2), sizeof(buffer2)); @@ -121,43 +125,53 @@ int32_t start_rtsp(int32_t s, char *ip, int32_t port, unsigned char options, cha hydra_report(stderr, "C:%s\n", buffer); } } + else { + if (use_Digest_Auth(lresp) == 1) { + char *dbuf = NULL; + char aux[500] = ""; + char *pbuffer = hydra_strcasestr(lresp, "WWW-Authenticate: Digest "); - if (use_Digest_Auth(lresp) == 1) { - char *dbuf = NULL; - char aux[500] = ""; - - char *pbuffer = hydra_strcasestr(lresp, "WWW-Authenticate: Digest "); - - strncpy(aux, pbuffer + strlen("WWW-Authenticate: Digest "), sizeof(aux)); - aux[sizeof(aux) - 1] = '\0'; + strncpy(aux, pbuffer + strlen("WWW-Authenticate: Digest "), sizeof(aux)); + aux[sizeof(aux) - 1] = '\0'; + free(lresp); #ifdef LIBOPENSSL - sasl_digest_md5(dbuf, login, pass, aux, miscptr, "rtsp", hydra_address2string(ip), port, ""); + sasl_digest_md5(dbuf, login, pass, aux, miscptr, "rtsp", hydra_address2string(ip), port, ""); #else - printf("[ERROR] Digest auth required but compiled without OpenSSL/MD5 support\n"); - return 3; + hydra_report(stderr, "[ERROR] Digest auth required but compiled without OpenSSL/MD5 support\n"); + return 3; #endif - if (dbuf == NULL) { - fprintf(stderr, "[ERROR] digest generation failed\n"); - return 3; - } - sprintf(buffer, "%.500sAuthorization: Digest %.500s\r\n\r\n", packet2, dbuf); + if (dbuf == NULL) { + hydra_report(stderr, "[ERROR] digest generation failed\n"); + return 3; + } + sprintf(buffer, "%.500sAuthorization: Digest %.500s\r\n\r\n", packet2, dbuf); - if (debug) { - hydra_report(stderr, "C:%s\n", buffer); + if (debug) { + hydra_report(stderr, "C:%s\n", buffer); + } } } + if (strlen(buffer) == 0) { + hydra_report(stderr, "[ERROR] could not identify HTTP authentication used\n"); + return 1; + } + if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { return 1; } lresp = NULL; - lresp = hydra_receive_line(s); + + if (lresp == NULL) { + hydra_report(stderr, "[ERROR] no server reply\n"); + return 1; + } if ((is_NotFound(lresp))) { - + free(lresp); hydra_completed_pair_found(); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) { @@ -165,8 +179,8 @@ int32_t start_rtsp(int32_t s, char *ip, int32_t port, unsigned char options, cha } return 1; - } + free(lresp); hydra_completed_pair(); } From 392bb0e3b30c6b70517318a41e7465eea3109494 Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Fri, 31 May 2019 18:38:10 +0800 Subject: [PATCH 209/531] Fixing open() off by one error As reported by coverity: off_by_one: Testing whether handle fd is strictly greater than zero is suspicious. fd leaks when it is zero --- hydra-gtk/src/callbacks.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-gtk/src/callbacks.c b/hydra-gtk/src/callbacks.c index 62c441c..5600f15 100644 --- a/hydra-gtk/src/callbacks.c +++ b/hydra-gtk/src/callbacks.c @@ -690,7 +690,7 @@ void on_btnSave_clicked(GtkButton * button, gpointer user_data) { text = gtk_text_buffer_get_text(outputbuf, &start, &end, TRUE); fd = open(filename, O_CREAT | O_TRUNC | O_WRONLY, 0644); - if (fd > 0) { + if (fd >= 0) { write(fd, text, strlen(text)); close(fd); } From d01f473d2ed7ff30ad8e621e5638a903bdb50f79 Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Sat, 1 Jun 2019 09:27:23 +0800 Subject: [PATCH 210/531] Fixing distinct used types --- hydra-mod.c | 2 +- hydra.c | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/hydra-mod.c b/hydra-mod.c index 7df7928..9e7d862 100644 --- a/hydra-mod.c +++ b/hydra-mod.c @@ -33,7 +33,7 @@ int32_t do_retry = 1; int32_t module_auth_type = -1; int32_t intern_socket, extern_socket; char pair[260]; -char HYDRA_EXIT[5] = "\x00\xff\x00\xff\x00"; +char *HYDRA_EXIT = "\x00\xff\x00\xff\x00"; char *HYDRA_EMPTY = "\x00\x00\x00\x00"; char *fe80 = "\xfe\x80\x00"; int32_t fail = 0; diff --git a/hydra.c b/hydra.c index 3b5aa3a..a0735f0 100644 --- a/hydra.c +++ b/hydra.c @@ -305,7 +305,7 @@ typedef struct { } hydra_portlist; // external vars -extern char HYDRA_EXIT[5]; +extern char *HYDRA_EXIT; #if !defined(ANDROID) && !defined(__BIONIC__) extern int32_t errno; #endif From 99205f0410291c2fd63279288cafb0348e586ec7 Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Sun, 2 Jun 2019 11:11:30 +0800 Subject: [PATCH 211/531] Add length check for fixed-size string To prevent possible overflow. --- hydra-rdp.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-rdp.c b/hydra-rdp.c index f2fbfce..c75e722 100644 --- a/hydra-rdp.c +++ b/hydra-rdp.c @@ -48,7 +48,7 @@ int32_t start_rdp(char *ip, int32_t port, unsigned char options, char *miscptr, if (strlen(pass = hydra_get_next_password()) == 0) pass = empty; - strcpy(server, hydra_address2string(ip)); + strncpy(server, hydra_address2string(ip), sizeof(server) - 1); if ((miscptr != NULL) && (strlen(miscptr) > 0)) { strncpy(domain, miscptr, sizeof(domain) - 1); From f1e0df4080342646bff3adc3bc88abacb83fba90 Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Sun, 2 Jun 2019 11:18:27 +0800 Subject: [PATCH 212/531] Add length check for fixed-size string --- hydra-smb.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-smb.c b/hydra-smb.c index 0337ffd..ffea905 100644 --- a/hydra-smb.c +++ b/hydra-smb.c @@ -1212,7 +1212,7 @@ int32_t start_smb(int32_t s, char *ip, int32_t port, unsigned char options, char if (strlen(pass = hydra_get_next_password()) == 0) pass = empty; - strcpy(ipaddr_str, hydra_address2string(ip)); + strncpy(ipaddr_str, hydra_address2string(ip), sizeof(ipaddr_str) - 1); SMBSessionRet = SMBSessionSetup(s, login, pass, miscptr); if (SMBSessionRet == -1) From 87a6e9385ee2109a7fc9cb0937ab43397acfa8d6 Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Sun, 2 Jun 2019 11:21:54 +0800 Subject: [PATCH 213/531] Cosmetic change to please code scanner --- hydra-asterisk.c | 1 + hydra-ftp.c | 2 ++ hydra-icq.c | 1 + hydra-redis.c | 1 + hydra-rpcap.c | 1 + hydra-ssh.c | 3 +++ hydra-sshkey.c | 3 +++ hydra-vmauthd.c | 1 + hydra-vnc.c | 2 ++ 9 files changed, 15 insertions(+) diff --git a/hydra-asterisk.c b/hydra-asterisk.c index 5be7896..1ec351d 100644 --- a/hydra-asterisk.c +++ b/hydra-asterisk.c @@ -114,6 +114,7 @@ void service_asterisk(char *ip, int32_t sp, unsigned char options, char *miscptr if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); + break; default: hydra_report(stderr, "[ERROR] Caught unknown return code, exiting!\n"); hydra_child_exit(2); diff --git a/hydra-ftp.c b/hydra-ftp.c index 6b853eb..504c0bd 100644 --- a/hydra-ftp.c +++ b/hydra-ftp.c @@ -155,10 +155,12 @@ void service_ftp_core(char *ip, int32_t sp, unsigned char options, char *miscptr if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(2); + break; case 4: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); + break; default: hydra_report(stderr, "[ERROR] Caught unknown return code, exiting!\n"); hydra_child_exit(2); diff --git a/hydra-icq.c b/hydra-icq.c index 68fd667..eba21bc 100644 --- a/hydra-icq.c +++ b/hydra-icq.c @@ -236,6 +236,7 @@ void service_icq(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL default: fprintf(stderr, "[ERROR] Caught unknown return code, exiting!\n"); hydra_child_exit(2); + break; } run = next_run; } diff --git a/hydra-redis.c b/hydra-redis.c index e97dd1c..a2b9757 100644 --- a/hydra-redis.c +++ b/hydra-redis.c @@ -95,6 +95,7 @@ void service_redis_core(char *ip, int32_t sp, unsigned char options, char *miscp if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); + break; default: hydra_report(stderr, "[ERROR] Caught unknown return code, exiting!\n"); hydra_child_exit(2); diff --git a/hydra-rpcap.c b/hydra-rpcap.c index a1cb9d3..ff15956 100644 --- a/hydra-rpcap.c +++ b/hydra-rpcap.c @@ -111,6 +111,7 @@ void service_rpcap(char *ip, int32_t sp, unsigned char options, char *miscptr, F if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); + break; default: hydra_report(stderr, "[ERROR] Caught unknown return code, exiting!\n"); hydra_child_exit(2); diff --git a/hydra-ssh.c b/hydra-ssh.c index 2f1d2d5..1ca2815 100644 --- a/hydra-ssh.c +++ b/hydra-ssh.c @@ -126,6 +126,7 @@ void service_ssh(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL ssh_finalize(); ssh_free(session); hydra_child_exit(0); + break; case 3: ssh_disconnect(session); ssh_finalize(); @@ -133,12 +134,14 @@ void service_ssh(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL if (verbose) fprintf(stderr, "[ERROR] ssh protocol error\n"); hydra_child_exit(2); + break; case 4: ssh_disconnect(session); ssh_finalize(); ssh_free(session); fprintf(stderr, "[ERROR] ssh target does not support password auth\n"); hydra_child_exit(2); + break; default: ssh_disconnect(session); ssh_finalize(); diff --git a/hydra-sshkey.c b/hydra-sshkey.c index a9b85b2..7a51389 100644 --- a/hydra-sshkey.c +++ b/hydra-sshkey.c @@ -124,18 +124,21 @@ void service_sshkey(char *ip, int32_t sp, unsigned char options, char *miscptr, ssh_finalize(); ssh_free(session); hydra_child_exit(0); + break; case 3: ssh_disconnect(session); ssh_finalize(); ssh_free(session); fprintf(stderr, "[ERROR] ssh protocol error\n"); hydra_child_exit(2); + break; case 4: ssh_disconnect(session); ssh_finalize(); ssh_free(session); fprintf(stderr, "[ERROR] ssh target does not support pubkey auth\n"); hydra_child_exit(2); + break; default: ssh_disconnect(session); ssh_finalize(); diff --git a/hydra-vmauthd.c b/hydra-vmauthd.c index 95ba53f..06f656f 100644 --- a/hydra-vmauthd.c +++ b/hydra-vmauthd.c @@ -134,6 +134,7 @@ void service_vmauthd(char *ip, int32_t sp, unsigned char options, char *miscptr, if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); + break; default: hydra_report(stderr, "[ERROR] Caught unknown return code, exiting!\n"); hydra_child_exit(2); diff --git a/hydra-vnc.c b/hydra-vnc.c index 6dc3cdd..227f053 100644 --- a/hydra-vnc.c +++ b/hydra-vnc.c @@ -77,6 +77,7 @@ int32_t start_vnc(int32_t s, char *ip, int32_t port, unsigned char options, char case 0x0: hydra_report(stderr, "[ERROR] VNC server told us to quit %c\n", buf[3]); hydra_child_exit(0); + break; case 0x1: hydra_report(fp, "VNC server does not require authentication.\n"); if (fp != stdout) @@ -84,6 +85,7 @@ int32_t start_vnc(int32_t s, char *ip, int32_t port, unsigned char options, char hydra_report_found_host(port, ip, "vnc", fp); hydra_completed_pair_found(); hydra_child_exit(2); + break; case 0x2: //VNC security type supported is the only type supported for now if (vnc_client_version == RFB37) { From f2d2cd338e18208a0a80f20ce32622ba01bf56d1 Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Sun, 2 Jun 2019 11:32:21 +0800 Subject: [PATCH 214/531] Add length check for fixed-size string --- hydra-snmp.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-snmp.c b/hydra-snmp.c index 5ffc4ef..a9adb17 100644 --- a/hydra-snmp.c +++ b/hydra-snmp.c @@ -111,7 +111,7 @@ void password_to_key_md5(u_char * password, /* IN */ if (mylen < 8) { memset(bpass, 0, sizeof(bpass)); - strcpy(bpass, password); + strncpy(bpass, password, sizeof(bpass) - 1); while (mylen < 8) { strcat(bpass, password); mylen += passwordlen; From 2f1c1438ea8e3c520a0ec96e60d2329235ba2fdc Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Sun, 2 Jun 2019 11:44:47 +0800 Subject: [PATCH 215/531] Cosmetic change Missed that one in the previous commit. --- hydra-icq.c | 1 + 1 file changed, 1 insertion(+) diff --git a/hydra-icq.c b/hydra-icq.c index eba21bc..86c968c 100644 --- a/hydra-icq.c +++ b/hydra-icq.c @@ -233,6 +233,7 @@ void service_icq(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(2); + break; default: fprintf(stderr, "[ERROR] Caught unknown return code, exiting!\n"); hydra_child_exit(2); From 85d51ba494074872163d8ed54e863a669de02768 Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Tue, 4 Jun 2019 13:53:08 +0800 Subject: [PATCH 216/531] Fix memory leak buf variable is not freed properly from the hydra_receive_line call --- hydra-ldap.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/hydra-ldap.c b/hydra-ldap.c index e00265e..d04d180 100644 --- a/hydra-ldap.c +++ b/hydra-ldap.c @@ -393,6 +393,7 @@ void service_ldap(char *ip, int32_t sp, unsigned char options, char *miscptr, FI if ((buf[0] != 0 && buf[9] == 0) || (buf[0] != 32 && buf[9] == 32)) { /* TLS option negociation goes well, now trying to connect */ + free(buf); if ((hydra_connect_to_ssl(sock, hostname) == -1) && verbose) { hydra_report(stderr, "[ERROR] Can't use TLS\n"); hydra_child_exit(1); @@ -403,6 +404,7 @@ void service_ldap(char *ip, int32_t sp, unsigned char options, char *miscptr, FI } } else { hydra_report(stderr, "[ERROR] Can't use TLS %s\n", buf); + free(buf); hydra_child_exit(1); } } From 5ea9c47bb56e39106b5c324d24f70bbec4a23c00 Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Tue, 4 Jun 2019 13:56:48 +0800 Subject: [PATCH 217/531] Fix initialization of pool struct variable --- hydra-pop3.c | 1 + 1 file changed, 1 insertion(+) diff --git a/hydra-pop3.c b/hydra-pop3.c index fe07eed..91d9c48 100644 --- a/hydra-pop3.c +++ b/hydra-pop3.c @@ -523,6 +523,7 @@ int32_t service_pop3_init(char *ip, int32_t sp, unsigned char options, char *mis p.pop3_auth_mechanism = AUTH_CLEAR; p.disable_tls = 1; + p.next = NULL; memcpy(p.ip, ip, 36); if ((options & OPTION_SSL) == 0) { From 6d70d30c51776e482672858271d0c74d456bb8fb Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Sat, 8 Jun 2019 11:24:41 +0800 Subject: [PATCH 218/531] Fixed a typo in readme --- README | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README b/README index fcd354e..b2895c6 100644 --- a/README +++ b/README @@ -24,7 +24,7 @@ access from remote to a system. THIS TOOL IS FOR LEGAL PURPOSES ONLY! There are already several login hacker tools available, however, none does -either support more than one protocol to attack or support parallized +either support more than one protocol to attack or support parallelized connects. It was tested to compile cleanly on Linux, Windows/Cygwin, Solaris, From f4b48c0513967c4e6aa932a00fe5634630e71e6e Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Sat, 8 Jun 2019 11:38:14 +0800 Subject: [PATCH 219/531] Add radmin entry and describe dependencies --- README | 6 +++--- README.md | 5 +++-- 2 files changed, 6 insertions(+), 5 deletions(-) diff --git a/README b/README index b2895c6..129a9f1 100644 --- a/README +++ b/README @@ -35,7 +35,7 @@ Currently this tool supports the following protocols: HTTP-FORM-GET, HTTP-FORM-POST, HTTP-GET, HTTP-HEAD, HTTP-POST, HTTP-PROXY, HTTPS-FORM-GET, HTTPS-FORM-POST, HTTPS-GET, HTTPS-HEAD, HTTPS-POST, HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MEMCACHED, MONGODB, MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, - Oracle SID, Oracle, PC-Anywhere, PCNFS, POP3, POSTGRES, RDP, Rexec, Rlogin, + Oracle SID, Oracle, PC-Anywhere, PCNFS, POP3, POSTGRES, Radmin, RDP, Rexec, Rlogin, Rsh, RTSP, SAP/R3, SIP, SMB, SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, VNC and XMPP. @@ -81,8 +81,8 @@ for a few optional modules (note that some might not be available on your distri ``` apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev \ libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev \ - firebird-dev libmemcached-dev libmongoc-dev \ - libfreerdp-client2-2 + firebird-dev libmemcached-dev libgpg-error-dev \ + libgcrypt11-dev libgcrypt20-dev ``` This enables all optional modules and features with the exception of Oracle, diff --git a/README.md b/README.md index a5e095c..129a9f1 100644 --- a/README.md +++ b/README.md @@ -35,7 +35,7 @@ Currently this tool supports the following protocols: HTTP-FORM-GET, HTTP-FORM-POST, HTTP-GET, HTTP-HEAD, HTTP-POST, HTTP-PROXY, HTTPS-FORM-GET, HTTPS-FORM-POST, HTTPS-GET, HTTPS-HEAD, HTTPS-POST, HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MEMCACHED, MONGODB, MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, - Oracle SID, Oracle, PC-Anywhere, PCNFS, POP3, POSTGRES, RDP, Rexec, Rlogin, + Oracle SID, Oracle, PC-Anywhere, PCNFS, POP3, POSTGRES, Radmin, RDP, Rexec, Rlogin, Rsh, RTSP, SAP/R3, SIP, SMB, SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, VNC and XMPP. @@ -81,7 +81,8 @@ for a few optional modules (note that some might not be available on your distri ``` apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev \ libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev \ - firebird-dev libmemcached-dev + firebird-dev libmemcached-dev libgpg-error-dev \ + libgcrypt11-dev libgcrypt20-dev ``` This enables all optional modules and features with the exception of Oracle, From 6e3f02b419ce2eeb6b4918cedd63ea258c1771ad Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Sat, 8 Jun 2019 11:45:54 +0800 Subject: [PATCH 220/531] Add more check to detect missing header file for radmin support --- configure | 29 +++++++++++++++++++++-------- 1 file changed, 21 insertions(+), 8 deletions(-) diff --git a/configure b/configure index 0309e53..9c2e248 100755 --- a/configure +++ b/configure @@ -38,6 +38,7 @@ WSSL_LIB_PATH="" CURSES_PATH="" CURSES_IPATH="" CRYPTO_PATH="" +GPGERROR_IPATH="" IDN_PATH="" IDN_IPATH="" PR29_IPATH="" @@ -125,6 +126,7 @@ echo "Starting hydra auto configuration ..." rm -f Makefile.in SYSS=`uname -s 2> /dev/null` SYSO=`uname -o 2> /dev/null` +SYSM=`uname -m 2> /dev/null` if [ "$SYSS" = "Linux" -o "$SYSS" = "OpenBSD" -o "$SYSS" = "FreeBSD" -o "$SYSS" = "NetBSD" -o "$SYSS" = "Darwin" ]; then SF=`uname -m | grep 64` if [ `uname -m` = "s390x" ]; then @@ -260,22 +262,33 @@ if [ "$SSL_IPATH" = "/usr/include" ]; then SSL_IPATH="" fi -echo "Checking for gcrypt (libgcrypt.so) ..." +echo "Checking for gcrypt (libgcrypt.so, gpg-error.h) ..." for i in $LIBDIRS ; do - if [ "X" = "X$GCRYPT_PATH" ]; then - if [ -f "$i/libgcrypt.so" -o -f "$i/libgcrypt.dylib" -o -f "$i/libgcrypt.a" -o -f "$i/libgcrypt.dll.a" -o -f "$i/libgcrypt.la" ]; then + if [ -f "$i/libgcrypt.so" -o -f "$i/libgcrypt.dylib" -o -f "$i/libgcrypt.a" -o -f "$i/libgcrypt.dll.a" -o -f "$i/libgcrypt.la" ]; then HAVE_GCRYPT="y" + fi +done + +for i in $INCDIRS ; do + if [ "X" = "X$GPGERROR_IPATH" ]; then + TMP_PATH=`/bin/ls $i/$SYSM*/gpg-error.h 2> /dev/null` + if [ -n "$TMP_PATH" ]; then + GPGERROR_IPATH="$i" + else + if [ -f "$i/gpg-error.h" ]; then + GPGERROR_IPATH="$i" + fi fi fi done -if [ -n "$HAVE_GCRYPT" ]; then - echo " ... found" + +if [ -n "$HAVE_GCRYPT" -a "X" != "X$GPGERROR_IPATH" ]; then + echo " ... found" else - echo " ... gcrypt not found, radmin2 module disabled" + echo " ... gcrypt not found, radmin2 module disabled" + HAVE_GCRYPT="" fi - - echo "Checking for idn (libidn.so) ..." for i in $LIBDIRS ; do if [ "X" = "X$IDN_PATH" ]; then From 1213174e9a2c180473fe2c338293622d18141684 Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Tue, 11 Jun 2019 17:22:07 +0800 Subject: [PATCH 221/531] Remove RDP related entry --- PROBLEMS | 2 -- 1 file changed, 2 deletions(-) diff --git a/PROBLEMS b/PROBLEMS index 74dafd2..4fcbf44 100644 --- a/PROBLEMS +++ b/PROBLEMS @@ -3,5 +3,3 @@ List of known issues: * Cygwin: more than 30 tasks (-t 31 or more) will lead to a stack smash * OS X: brew installed modules are not compiled correctly and will crash hydra -* RDP module: disabled as it does not support the current protocol. Help needed! - From 41300792097d3a1ccfacf229c597d5c081050f4b Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Tue, 11 Jun 2019 17:24:18 +0800 Subject: [PATCH 222/531] Remove README file Duplicated from README.md which will be used as default readme file. --- README | 531 --------------------------------------------------------- 1 file changed, 531 deletions(-) delete mode 100644 README diff --git a/README b/README deleted file mode 100644 index 129a9f1..0000000 --- a/README +++ /dev/null @@ -1,531 +0,0 @@ - - H Y D R A - - (c) 2001-2019 by van Hauser / THC - https://github.com/vanhauser-thc/thc-hydra - many modules were written by David (dot) Maciejak @ gmail (dot) com - BFG code by Jan Dlabal - - Licensed under AGPLv3 (see LICENSE file) - - Please do not use in military or secret service organizations, - or for illegal purposes. - - - -INTRODUCTION ------------- -Number one of the biggest security holes are passwords, as every password -security study shows. -This tool is a proof of concept code, to give researchers and security -consultants the possibility to show how easy it would be to gain unauthorized -access from remote to a system. - -THIS TOOL IS FOR LEGAL PURPOSES ONLY! - -There are already several login hacker tools available, however, none does -either support more than one protocol to attack or support parallelized -connects. - -It was tested to compile cleanly on Linux, Windows/Cygwin, Solaris, -FreeBSD/OpenBSD, QNX (Blackberry 10) and MacOS. - -Currently this tool supports the following protocols: - Asterisk, AFP, Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird, FTP, - HTTP-FORM-GET, HTTP-FORM-POST, HTTP-GET, HTTP-HEAD, HTTP-POST, HTTP-PROXY, - HTTPS-FORM-GET, HTTPS-FORM-POST, HTTPS-GET, HTTPS-HEAD, HTTPS-POST, - HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MEMCACHED, MONGODB, MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, - Oracle SID, Oracle, PC-Anywhere, PCNFS, POP3, POSTGRES, Radmin, RDP, Rexec, Rlogin, - Rsh, RTSP, SAP/R3, SIP, SMB, SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, - SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, - VNC and XMPP. - -However the module engine for new services is very easy so it won't take a -long time until even more services are supported. -Your help in writing, enhancing or fixing modules is highly appreciated!! :-) - - - -WHERE TO GET ------------- -You can always find the newest release/production version of hydra at its -project page at https://github.com/vanhauser-thc/thc-hydra/releases -If you are interested in the current development state, the public development -repository is at Github: - svn co https://github.com/vanhauser-thc/thc-hydra - or - git clone https://github.com/vanhauser-thc/thc-hydra -Use the development version at your own risk. It contains new features and -new bugs. Things might not work! - - - -HOW TO COMPILE --------------- -To configure, compile and install hydra, just type: - -``` -./configure -make -make install -``` - -If you want the ssh module, you have to setup libssh (not libssh2!) on your -system, get it from http://www.libssh.org, for ssh v1 support you also need -to add "-DWITH_SSH1=On" option in the cmake command line. -IMPORTANT: If you compile on MacOS then you must do this - do not install libssh via brew! - -If you use Ubuntu/Debian, this will install supplementary libraries needed -for a few optional modules (note that some might not be available on your distribution): - -``` -apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev \ - libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev \ - firebird-dev libmemcached-dev libgpg-error-dev \ - libgcrypt11-dev libgcrypt20-dev -``` - -This enables all optional modules and features with the exception of Oracle, -SAP R/3, NCP and the apple filing protocol - which you will need to download and -install from the vendor's web sites. - -For all other Linux derivates and BSD based systems, use the system -software installer and look for similarly named libraries like in the -command above. In all other cases, you have to download all source libraries -and compile them manually. - - - -SUPPORTED PLATFORMS -------------------- -- All UNIX platforms (Linux, *BSD, Solaris, etc.) -- MacOS (basically a BSD clone) -- Windows with Cygwin (both IPv4 and IPv6) -- Mobile systems based on Linux, MacOS or QNX (e.g. Android, iPhone, Blackberry 10, Zaurus, iPaq) - - - -HOW TO USE ----------- -If you just enter `hydra`, you will see a short summary of the important -options available. -Type `./hydra -h` to see all available command line options. - -Note that NO login/password file is included. Generate them yourself. -A default password list is however present, use "dpl4hydra.sh" to generate -a list. - -For Linux users, a GTK GUI is available, try `./xhydra` - -For the command line usage, the syntax is as follows: - For attacking one target or a network, you can use the new "://" style: - hydra [some command line options] PROTOCOL://TARGET:PORT/MODULE-OPTIONS - The old mode can be used for these too, and additionally if you want to - specify your targets from a text file, you *must* use this one: - -``` -hydra [some command line options] [-s PORT] TARGET PROTOCOL [MODULE-OPTIONS] -``` - -Via the command line options you specify which logins to try, which passwords, -if SSL should be used, how many parallel tasks to use for attacking, etc. - -PROTOCOL is the protocol you want to use for attacking, e.g. ftp, smtp, -http-get or many others are available -TARGET is the target you want to attack -MODULE-OPTIONS are optional values which are special per PROTOCOL module - -FIRST - select your target - you have three options on how to specify the target you want to attack: - 1. a single target on the command line: just put the IP or DNS address in - 2. a network range on the command line: CIDR specification like "192.168.0.0/24" - 3. a list of hosts in a text file: one line per entry (see below) - -SECOND - select your protocol - Try to avoid telnet, as it is unreliable to detect a correct or false login attempt. - Use a port scanner to see which protocols are enabled on the target. - -THIRD - check if the module has optional parameters - hydra -U PROTOCOL - e.g. hydra -U smtp - -FOURTH - the destination port - this is optional! if no port is supplied the default common port for the - PROTOCOL is used. - If you specify SSL to use ("-S" option), the SSL common port is used by default. - - -If you use "://" notation, you must use "[" "]" brackets if you want to supply -IPv6 addresses or CIDR ("192.168.0.0/24") notations to attack: - hydra [some command line options] ftp://[192.168.0.0/24]/ - hydra [some command line options] -6 smtps://[2001:db8::1]/NTLM - -Note that everything hydra does is IPv4 only! -If you want to attack IPv6 addresses, you must add the "-6" command line option. -All attacks are then IPv6 only! - -If you want to supply your targets via a text file, you can not use the :// -notation but use the old style and just supply the protocol (and module options): - hydra [some command line options] -M targets.txt ftp -You can supply also the port for each target entry by adding ":" after a -target entry in the file, e.g.: - -``` -foo.bar.com -target.com:21 -unusual.port.com:2121 -default.used.here.com -127.0.0.1 -127.0.0.1:2121 -``` - -Note that if you want to attach IPv6 targets, you must supply the -6 option -and *must* put IPv6 addresses in brackets in the file(!) like this: - -``` -foo.bar.com -target.com:21 -[fe80::1%eth0] -[2001::1] -[2002::2]:8080 -[2a01:24a:133:0:00:123:ff:1a] -``` - -LOGINS AND PASSWORDS --------------------- -You have many options on how to attack with logins and passwords -With -l for login and -p for password you tell hydra that this is the only -login and/or password to try. -With -L for logins and -P for passwords you supply text files with entries. -e.g.: - -``` -hydra -l admin -p password ftp://localhost/ -hydra -L default_logins.txt -p test ftp://localhost/ -hydra -l admin -P common_passwords.txt ftp://localhost/ -hydra -L logins.txt -P passwords.txt ftp://localhost/ -``` - -Additionally, you can try passwords based on the login via the "-e" option. -The "-e" option has three parameters: - -``` -s - try the login as password -n - try an empty password -r - reverse the login and try it as password -``` - -If you want to, e.g. try "try login as password and "empty password", you -specify "-e sn" on the command line. - -But there are two more modes for trying passwords than -p/-P: -You can use text file which where a login and password pair is separated by a colon, -e.g.: - -``` -admin:password -test:test -foo:bar -``` - -This is a common default account style listing, that is also generated by the -dpl4hydra.sh default account file generator supplied with hydra. -You use such a text file with the -C option - note that in this mode you -can not use -l/-L/-p/-P options (-e nsr however you can). -Example: - -``` -hydra -C default_accounts.txt ftp://localhost/ -``` - -And finally, there is a bruteforce mode with the -x option (which you can not -use with -p/-P/-C): - -``` --x minimum_length:maximum_length:charset -``` - -the charset definition is `a` for lowercase letters, `A` for uppercase letters, -`1` for numbers and for anything else you supply it is their real representation. -Examples: - -``` --x 1:3:a generate passwords from length 1 to 3 with all lowercase letters --x 2:5:/ generate passwords from length 2 to 5 containing only slashes --x 5:8:A1 generate passwords from length 5 to 8 with uppercase and numbers -``` - -Example: - -``` -hydra -l ftp -x 3:3:a ftp://localhost/ -``` - -SPECIAL OPTIONS FOR MODULES ---------------------------- -Via the third command line parameter (TARGET SERVICE OPTIONAL) or the -m -command line option, you can pass one option to a module. -Many modules use this, a few require it! - -To see the special option of a module, type: - - hydra -U - -e.g. - - ./hydra -U http-post-form - -The special options can be passed via the -m parameter, as 3rd command line -option or in the service://target/option format. - -Examples (they are all equal): - -``` -./hydra -l test -p test -m PLAIN 127.0.0.1 imap -./hydra -l test -p test 127.0.0.1 imap PLAIN -./hydra -l test -p test imap://127.0.0.1/PLAIN -``` - -RESTORING AN ABORTED/CRASHED SESSION ------------------------------------- -When hydra is aborted with Control-C, killed or crashes, it leaves a -"hydra.restore" file behind which contains all necessary information to -restore the session. This session file is written every 5 minutes. -NOTE: the hydra.restore file can NOT be copied to a different platform (e.g. -from little endian to big endian, or from Solaris to AIX) - -HOW TO SCAN/CRACK OVER A PROXY ------------------------------- -The environment variable HYDRA_PROXY_HTTP defines the web proxy (this works -just for the http services!). -The following syntax is valid: - -``` -HYDRA_PROXY_HTTP="http://123.45.67.89:8080/" -HYDRA_PROXY_HTTP="http://login:password@123.45.67.89:8080/" -HYDRA_PROXY_HTTP="proxylist.txt" -``` - -The last example is a text file containing up to 64 proxies (in the same -format definition as the other examples). - -For all other services, use the HYDRA_PROXY variable to scan/crack. -It uses the same syntax. eg: - -``` -HYDRA_PROXY=[connect|socks4|socks5]://[login:password@]proxy_addr:proxy_port -``` - -for example: - -``` -HYDRA_PROXY=connect://proxy.anonymizer.com:8000 -HYDRA_PROXY=socks4://auth:pw@127.0.0.1:1080 -HYDRA_PROXY=socksproxylist.txt -``` - -ADDITIONAL HINTS ----------------- -* sort your password files by likelihood and use the -u option to find - passwords much faster! -* uniq your dictionary files! this can save you a lot of time :-) - cat words.txt | sort | uniq > dictionary.txt -* if you know that the target is using a password policy (allowing users - only to choose a password with a minimum length of 6, containing a least one - letter and one number, etc. use the tool pw-inspector which comes along - with the hydra package to reduce the password list: - cat dictionary.txt | pw-inspector -m 6 -c 2 -n > passlist.txt - - -RESULTS OUTPUT --------------- - -The results are output to stdio along with the other information. Via the -o -command line option, the results can also be written to a file. Using -b, -the format of the output can be specified. Currently, these are supported: - -* `text` - plain text format -* `jsonv1` - JSON data using version 1.x of the schema (defined below). -* `json` - JSON data using the latest version of the schema, currently there - is only version 1. - -If using JSON output, the results file may not be valid JSON if there are -serious errors in booting Hydra. - - -JSON Schema ------------ -Here is an example of the JSON output. Notes on some of the fields: - -* `errormessages` - an array of zero or more strings that are normally printed - to stderr at the end of the Hydra's run. The text is very free form. -* `success` - indication if Hydra ran correctly without error (**NOT** if - passwords were detected). This parameter is either the JSON value `true` - or `false` depending on completion. -* `quantityfound` - How many username+password combinations discovered. -* `jsonoutputversion` - Version of the schema, 1.00, 1.01, 1.11, 2.00, - 2.03, etc. Hydra will make second tuple of the version to always be two - digits to make it easier for downstream processors (as opposed to v1.1 vs - v1.10). The minor-level versions are additive, so 1.02 will contain more - fields than version 1.00 and will be backward compatible. Version 2.x will - break something from version 1.x output. - -Version 1.00 example: -``` -{ - "errormessages": [ - "[ERROR] Error Message of Something", - "[ERROR] Another Message", - "These are very free form" - ], - "generator": { - "built": "2019-03-01 14:44:22", - "commandline": "hydra -b jsonv1 -o results.json ... ...", - "jsonoutputversion": "1.00", - "server": "127.0.0.1", - "service": "http-post-form", - "software": "Hydra", - "version": "v8.5" - }, - "quantityfound": 2, - "results": [ - { - "host": "127.0.0.1", - "login": "bill@example.com", - "password": "bill", - "port": 9999, - "service": "http-post-form" - }, - { - "host": "127.0.0.1", - "login": "joe@example.com", - "password": "joe", - "port": 9999, - "service": "http-post-form" - } - ], - "success": false -} -``` - - -SPEED ------ -through the parallelizing feature, this password cracker tool can be very -fast, however it depends on the protocol. The fastest are generally POP3 -and FTP. -Experiment with the task option (-t) to speed things up! The higher - the -faster ;-) (but too high - and it disables the service) - - - -STATISTICS ----------- -Run against a SuSE Linux 7.2 on localhost with a "-C FILE" containing -295 entries (294 tries invalid logins, 1 valid). Every test was run three -times (only for "1 task" just once), and the average noted down. - -``` - P A R A L L E L T A S K S -SERVICE 1 4 8 16 32 50 64 100 128 -------- -------------------------------------------------------------------- -telnet 23:20 5:58 2:58 1:34 1:05 0:33 0:45* 0:25* 0:55* -ftp 45:54 11:51 5:54 3:06 1:25 0:58 0:46 0:29 0:32 -pop3 92:10 27:16 13:56 6:42 2:55 1:57 1:24 1:14 0:50 -imap 31:05 7:41 3:51 1:58 1:01 0:39 0:32 0:25 0:21 -``` - -(*) -Note: telnet timings can be VERY different for 64 to 128 tasks! e.g. with -128 tasks, running four times resulted in timings between 28 and 97 seconds! -The reason for this is unknown... - -guesses per task (rounded up): - - 295 74 38 19 10 6 5 3 3 - -guesses possible per connect (depends on the server software and config): - - telnet 4 - ftp 6 - pop3 1 - imap 3 - - - -BUGS & FEATURES ---------------- -Hydra: -Email me or David if you find bugs or if you have written a new module. -vh@thc.org (and put "antispam" in the subject line) - - -You should use PGP to encrypt emails to vh@thc.org : - -``` ------BEGIN PGP PUBLIC KEY BLOCK----- -Version: GnuPG v3.3.3 (vh@thc.org) - -mQINBFIp+7QBEADQcJctjohuYjBxq7MELAlFDvXRTeIqqh8kqHPOR018xKL09pZT -KiBWFBkU48xlR3EtV5fC1yEt8gDEULe5o0qtK1aFlYBtAWkflVNjDrs+Y2BpjITQ -FnAPHw0SOOT/jfcvmhNOZMzMU8lIubAVC4cVWoSWJbLTv6e0DRIPiYgXNT5Quh6c -vqhnI1C39pEo/W/nh3hSa16oTc5dtTLbi5kEbdzml78TnT0OASmWLI+xtYKnP+5k -Xv4xrXRMVk4L1Bv9WpCY/Jb6J8K8SJYdXPtbaIi4VjgVr5gvg9QC/d/QP2etmw3p -lJ1Ldv63x6nXsxnPq6MSOOw8+QqKc1dAgIA43k6SU4wLq9TB3x0uTKnnB8pA3ACI -zPeRN9LFkr7v1KUMeKKEdu8jUut5iKUJVu63lVYxuM5ODb6Owt3+UXgsSaQLu9nI -DZqnp/M6YTCJTJ+cJANN+uQzESI4Z2m9ITg/U/cuccN/LIDg8/eDXW3VsCqJz8Bf -lBSwMItMhs/Qwzqc1QCKfY3xcNGc4aFlJz4Bq3zSdw3mUjHYJYv1UkKntCtvvTCN -DiomxyBEKB9J7KNsOLI/CSst3MQWSG794r9ZjcfA0EWZ9u6929F2pGDZ3LiS7Jx5 -n+gdBDMe0PuuonLIGXzyIuMrkfoBeW/WdnOxh+27eemcdpCb68XtQCw6UQARAQAB -tB52YW4gSGF1c2VyICgyMDEzKSA8dmhAdGhjLm9yZz6JAjkEEwECACMCGwMCHgEC -F4AFAlIp/QcGCwkIAwcCBhUKCQgLAgUWAwIBAAAKCRDI8AEqhCFiv2R9D/9qTCJJ -xCH4BUbWIUhw1zRkn9iCVSwZMmfaAhz5PdVTjeTelimMh5qwK2MNAjpR7vCCd3BH -Z2VLB2Eoz9MOgSCxcMOnCDJjtCdCOeaxiASJt8qLeRMwdMOtznM8MnKCIO8X4oo4 -qH8eNj83KgpI50ERBCj/EMsgg07vSyZ9i1UXjFofFnbHRWSW9yZO16qD4F6r4SGz -dsfXARcO3QRI5lbjdGqm+g+HOPj1EFLAOxJAQOygz7ZN5fj+vPp+G/drONxNyVKp -QFtENpvqPdU9CqYh8ssazXTWeBi/TIs0q0EXkzqo7CQjfNb6tlRsg18FxnJDK/ga -V/1umTg41bQuVP9gGmycsiNI8Atr5DWqaF+O4uDmQxcxS0kX2YXQ4CSQJFi0pml5 -slAGL8HaAUbV7UnQEqpayPyyTEx1i0wK5ZCHYjLBfJRZCbmHX7SbviSAzKdo5JIl -Atuk+atgW3vC3hDTrBu5qlsFCZvbxS21PJ+9zmK7ySjAEFH/NKFmx4B8kb7rPAOM -0qCTv0pD/e4ogJCxVrqQ2XcCSJWxJL31FNAMnBZpVzidudNURG2v61h3ckkSB/fP -JnkRy/yxYWrdFBYkURImxD8iFD1atj1n3EI5HBL7p/9mHxf1DVJWz7rYQk+3czvs -IhBz7xGBz4nhpCi87VDEYttghYlJanbiRfNh3okCOAQTAQIAIgUCUin7tAIbAwYL -CQgHAwIGFQgCCQoLBBYCAwECHgECF4AACgkQyPABKoQhYr8OIA//cvkhoKay88yS -AjMQypach8C5CvP7eFCT11pkCt1DMAO/8Dt6Y/Ts10dPjohGdIX4PkoLTkQDwBDJ -HoLO75oqj0CYLlqDI4oHgf2uzd0Zv8f/11CQQCtut5oEK72mGNzv3GgVqg60z2KR -2vpxvGQmDwpDOPP620tf/LuRQgBpks7uazcbkAE2Br09YrUQSCBNHy8kirHW5m5C -nupMrcvuFx7mHKW1z3FuhM8ijG7oRmcBWfVoneQgIT3l2WBniXg1mKFhuUSV8Erc -XIcc11qsKshyqh0GWb2JfeXbAcTW8/4IwrCP+VfAyLO9F9khP6SnCmcNF9EVJyR6 -Aw+JMNRin7PgvsqbFhpkq9N+gVBAufz3DZoMTEbsMTtW4lYG6HMWhza2+8G9XyaL -ARAWhkNVsmQQ5T6qGkI19thB6E/T6ZorTxqeopNVA7VNK3RVlKpkmUu07w5bTD6V -l3Ti6XfcSQqzt6YX2/WUE8ekEG3rSesuJ5fqjuTnIIOjBxr+pPxkzdoazlu2zJ9F -n24fHvlU20TccEWXteXj9VFzV/zbPEQbEqmE16lV+bO8U7UHqCOdE83OMrbNKszl -7LSCbFhCDtflUsyClBt/OPnlLEHgEE1j9QkqdFFy90l4HqGwKvx7lUFDnuF8LYsb -/hcP4XhqjiGcjTPYBDK254iYrpOSMZSIRgQQEQIABgUCUioGfQAKCRBDlBVOdiii -tuddAJ4zMrge4qzajScIQcXYgIWMXVenCQCfYTNQPGkHVyp3dMhJ0NR21TYoYMC5 -Ag0EUin7tAEQAK5/AEIBLlA/TTgjUF3im6nu/rkWTM7/gs5H4W0a04kF4UPhaJUR -gCNlDfUnBFA0QD7Jja5LHYgLdoHXiFelPhGrbZel/Sw6sH2gkGCBtFMrVkm3u7tt -x3AZlprqqRH68Y5xTCEjGRncCAmaDgd2apgisJqXpu0dRDroFYpJFNH3vw9N2a62 -0ShNakYP4ykVG3jTDC4MSl2q3BO5dzn8GYFHU0CNz6nf3gZR+48BG+zmAT77peTS -+C4Mbd6LmMmB0cuS2kYiFRwE2B69UWguLHjpXFcu9/85JJVCl2CIab7l5hpqGmgw -G/yW8HFK04Yhew7ZJOXJfUYlv1EZzR5bOsZ8Z9inC6hvFmxuCYCFnvkiEI+pOxPA -oeNOkMaT/W4W+au0ZVt3Hx+oD0pkJb5if0jrCaoAD4gpWOte6LZA8mAbKTxkHPBr -rA9/JFis5CVNI688O6eDiJqCCJjPOQA+COJI+0V+tFa6XyHPB4LxA46RxtumUZMC -v/06sDJlXMNpZbSd5Fq95YfZd4l9Vr9VrvKXfbomn+akwUymP8RDyc6Z8BzjF4Y5 -02m6Ts0J0MnSYfEDqJPPZbMGB+GAgAqLs7FrZJQzOZTiOXOSIJsKMYsPIDWE8lXv -s77rs0rGvgvQfWzPsJlMIx6ryrMnAsfOkzM2GChGNX9+pABpgOdYII4bABEBAAGJ -Ah8EGAECAAkFAlIp+7QCGwwACgkQyPABKoQhYr+hrg/9Er0+HN78y6UWGFHu/KVK -d8M6ekaqjQndQXmzQaPQwsOHOvWdC+EtBoTdR3VIjAtX96uvzCRV3sb0XPB9S9eP -gRrO/t5+qTVTtjua1zzjZsMOr1SxhBgZ5+0U2aoY1vMhyIjUuwpKKNqj2uf+uj5Y -ZQbCNklghf7EVDHsYQ4goB9gsNT7rnmrzSc6UUuJOYI2jjtHp5BPMBHh2WtUVfYP -8JqDfQ+eJQr5NCFB24xMW8OxMJit3MGckUbcZlUa1wKiTb0b76fOjt0y/+9u1ykd -X+i27DAM6PniFG8BfqPq/E3iU20IZGYtaAFBuhhDWR3vGY4+r3OxdlFAJfBG9XDD -aEDTzv1XF+tEBo69GFaxXZGdk9//7qxcgiya4LL9Kltuvs82+ZzQhC09p8d3YSQN -cfaYObm4EwbINdKP7cr4anGFXvsLC9urhow/RNBLiMbRX/5qBzx2DayXtxEnDlSC -Mh7wCkNDYkSIZOrPVUFOCGxu7lloRgPxEetM5x608HRa3hDHoe5KvUBmmtavB/aR -zlGuZP1S6Y7S13ytiULSzTfUxJmyGYgNo+4ygh0i6Dudf9NLmV+i9aEIbLbd6bni -1B/y8hBSx3SVb4sQVRe3clBkfS1/mYjlldtYjzOwcd02x599KJlcChf8HnWFB7qT -zB3yrr+vYBT0uDWmxwPjiJs= -=ytEf ------END PGP PUBLIC KEY BLOCK----- -``` From 7009b6db0390b600084b37f4b87fbdbf9a07dd31 Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Fri, 14 Jun 2019 13:33:11 +0800 Subject: [PATCH 223/531] Fix json output in case of connection error to the server --- hydra-redis.c | 10 +++++----- hydra.c | 13 +++++++++++-- 2 files changed, 16 insertions(+), 7 deletions(-) diff --git a/hydra-redis.c b/hydra-redis.c index a2b9757..c230453 100644 --- a/hydra-redis.c +++ b/hydra-redis.c @@ -129,7 +129,7 @@ int32_t service_redis_init(char *ip, int32_t sp, unsigned char options, char *mi // performed once only. // return codes: // 0 - when the server is redis and it requires password - // 1 - when the server is not redis or when the server does not require password + // n - when the server is not redis or when the server does not require password int32_t sock = -1; int32_t myport = PORT_REDIS, mysslport = PORT_REDIS_SSL; @@ -151,7 +151,7 @@ int32_t service_redis_init(char *ip, int32_t sp, unsigned char options, char *mi printf("[VERBOSE] Initial redis password authentication test and response test ...\n"); if (sock < 0) { hydra_report(stderr, "[ERROR] Can not connect to port %d on the target\n", myport); - hydra_child_exit(1); + return 3; } // generating ping request as redis-cli if (debug) @@ -161,7 +161,7 @@ int32_t service_redis_init(char *ip, int32_t sp, unsigned char options, char *mi // $4 // ping if (hydra_send(sock, buffer, strlen(buffer), 0) < 0) { - return 1; + return 2; } buf = hydra_receive_line(sock); if (debug) @@ -170,13 +170,13 @@ int32_t service_redis_init(char *ip, int32_t sp, unsigned char options, char *mi if (strstr(buf, "+PONG") != NULL) { // the server does not require password hydra_report(stderr, "[!] The server %s does not require password.\n", hostname); free(buf); - return 1; + return 2; } // server response test if (strstr(buf, "-NOAUTH Authentication required") == NULL && strstr(buf, "-ERR operation not permitted") == NULL) { hydra_report(stderr, "[ERROR] The server is not redis, exit.\n"); free(buf); - return 1; + return 2; } if (verbose) printf("[VERBOSE] The redis server requires password.\n"); diff --git a/hydra.c b/hydra.c index a0735f0..288712b 100644 --- a/hydra.c +++ b/hydra.c @@ -1127,8 +1127,17 @@ void hydra_service_init(int32_t target_no) { else hydra_targets[target_no]->done = TARGET_ERROR; hydra_brains.finished++; - if (hydra_brains.targets == 1) + if (hydra_brains.targets == 1) { + if (hydra_brains.ofp != NULL && hydra_brains.ofp != stdout) { + if (hydra_options.outfile_format == FORMAT_JSONV1) { + char json_error[120]; + snprintf(json_error, sizeof(json_error), "[ERROR] unexpected result connecting to target %s port %d", hydra_address2string_beautiful(t->ip), t->port); + fprintf(hydra_brains.ofp, "\n\t],\n\"success\": false,\n\"errormessages\": [ \"%s\" ],\n\"quantityfound\": %lu }\n", json_error, hydra_brains.found); + } + fclose(hydra_brains.ofp); + } exit(-1); + } } } @@ -3741,7 +3750,7 @@ int main(int argc, char *argv[]) { for (head_no = 0; head_no < hydra_options.max_use; head_no++) { if (debug > 1 && hydra_heads[head_no]->active != HEAD_DISABLED) printf("[DEBUG] head_no[%d] to target_no %d active %d\n", head_no, hydra_heads[head_no]->target_no, hydra_heads[head_no]->active); - + switch (hydra_heads[head_no]->active) { case HEAD_DISABLED: break; From 6a758105bb815dd5a860bbd7486b6ad8da09eeca Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Sat, 15 Jun 2019 16:03:16 +0800 Subject: [PATCH 224/531] Fix typo in error msg creation Prevent typo while generating such kind of logs: "[ERROR] 0 targets did not complete" "1 of 1 target completed, 0 valid passwords found" --- hydra.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/hydra.c b/hydra.c index 288712b..51dc65c 100644 --- a/hydra.c +++ b/hydra.c @@ -4033,7 +4033,7 @@ int main(int argc, char *argv[]) { printf("%d of %d target%s%scompleted, %lu valid password", hydra_brains.targets - j - k - error, hydra_brains.targets, hydra_brains.targets == 1 ? " " : "s ", hydra_brains.found > 0 ? "successfully " : "", hydra_brains.found); - printf("%s", hydra_brains.found == 1 ? "" : "s"); + printf("%s", hydra_brains.found < 1 ? "" : "s"); printf(" found\n"); error += j; @@ -4090,7 +4090,7 @@ int main(int argc, char *argv[]) { error = 1; } if (error) { - snprintf(tmp_str, STRMAX, "[ERROR] %d target%s did not complete", j, j == 1 ? "" : "s"); + snprintf(tmp_str, STRMAX, "[ERROR] %d target%s did not complete", j, j < 1 ? "" : "s"); fprintf(stderr, "%s\n", tmp_str); if (*json_error) { strncat(json_error,", ", STRMAX); From c2286ffb00bfb4b7e0fc09b0a327d7e42f487d59 Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Sat, 15 Jun 2019 16:26:31 +0800 Subject: [PATCH 225/531] Remove extra comma from the json output related to #412 --- hydra.c | 4 ---- 1 file changed, 4 deletions(-) diff --git a/hydra.c b/hydra.c index 51dc65c..756ddb4 100644 --- a/hydra.c +++ b/hydra.c @@ -4084,10 +4084,6 @@ int main(int argc, char *argv[]) { strncat(json_error,tmp_str,STRMAX); strncat(json_error,"\"",STRMAX); error = 1; - if (*json_error) { - strncat(json_error,", ", STRMAX); - } - error = 1; } if (error) { snprintf(tmp_str, STRMAX, "[ERROR] %d target%s did not complete", j, j < 1 ? "" : "s"); From 4cda4ca18962c9f118adae1d5a1ad5bcd2b4eda4 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Tue, 25 Jun 2019 12:52:07 +0200 Subject: [PATCH 226/531] added -K no redo switch --- CHANGES | 1 + hydra.c | 8 +++++++- hydra.h | 1 + 3 files changed, 9 insertions(+), 1 deletion(-) diff --git a/CHANGES b/CHANGES index 627882f..33247a5 100644 --- a/CHANGES +++ b/CHANGES @@ -3,6 +3,7 @@ Changelog for hydra Release 9.1-dev * your patch? :) +* added -K command line switch to disable redo attempts (good for mass scanning) * forgot to have the -m option in the hydra help output diff --git a/hydra.c b/hydra.c index 756ddb4..23f0061 100644 --- a/hydra.c +++ b/hydra.c @@ -508,6 +508,7 @@ void help(int32_t ext) { " -4 / -6 use IPv4 (default) / IPv6 addresses (put always in [] also in -M)\n" " -v / -V / -d verbose mode / show login+pass for each attempt / debug mode \n" " -O use old SSL v2 and v3\n" + " -K do not redo failed attempts (good for -M mass scanning)\n" " -q do not print messages about connection errors\n", MAXTASKS, WAITTIME, conwait ); @@ -1397,6 +1398,7 @@ void hydra_increase_fail_count(int32_t target_no, int32_t head_no) { if (k <= 1) { // we need to put this in a list, otherwise we fail one login+pw test if (hydra_targets[target_no]->done == TARGET_ACTIVE + && hydra_options.skip_redo == 0 && hydra_targets[target_no]->redo <= hydra_options.max_use * 2 && ((hydra_heads[head_no]->current_login_ptr != empty_login && hydra_heads[head_no]->current_pass_ptr != empty_login) || (hydra_heads[head_no]->current_login_ptr != NULL && hydra_heads[head_no]->current_pass_ptr != NULL))) { @@ -1429,6 +1431,7 @@ void hydra_increase_fail_count(int32_t target_no, int32_t head_no) { } else { // we need to put this in a list, otherwise we fail one login+pw test if (hydra_targets[target_no]->done == TARGET_ACTIVE + && hydra_options.skip_redo == 0 && hydra_targets[target_no]->redo <= hydra_options.max_use * 2 && ((hydra_heads[head_no]->current_login_ptr != empty_login && hydra_heads[head_no]->current_pass_ptr != empty_login) || (hydra_heads[head_no]->current_login_ptr != NULL && hydra_heads[head_no]->current_pass_ptr != NULL))) { @@ -2220,7 +2223,7 @@ int main(int argc, char *argv[]) { help(1); if (argc < 2) help(0); - while ((i = getopt(argc, argv, "hIq64Rde:vVl:fFg:L:p:OP:o:b:M:C:t:T:m:w:W:s:SUux:yc:")) >= 0) { + while ((i = getopt(argc, argv, "hIq64Rde:vVl:fFg:L:p:OP:o:b:M:C:t:T:m:w:W:s:SUux:yc:K")) >= 0) { switch (i) { case 'h': help(1); @@ -2228,6 +2231,9 @@ int main(int argc, char *argv[]) { case 'q': quiet = 1; break; + case 'K': + hydra_options.skip_redo = 1; + break; case 'O': old_ssl = 1; break; diff --git a/hydra.h b/hydra.h index e12fdfe..2d6a35b 100644 --- a/hydra.h +++ b/hydra.h @@ -213,6 +213,7 @@ typedef struct { char *server; char *service; char bfg; + int32_t skip_redo; } hydra_option; #define _HYDRA_H From 74b78c5322e5ca7ff67869a7f401d202ccd186aa Mon Sep 17 00:00:00 2001 From: van Hauser Date: Wed, 26 Jun 2019 10:24:22 +0200 Subject: [PATCH 227/531] fix for -K --- hydra.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra.c b/hydra.c index 23f0061..159fde9 100644 --- a/hydra.c +++ b/hydra.c @@ -1376,7 +1376,7 @@ void hydra_kill_head(int32_t head_no, int32_t killit, int32_t fail) { void hydra_increase_fail_count(int32_t target_no, int32_t head_no) { int32_t i, k, maxfail = 0; - if (target_no < 0) + if (target_no < 0 || hydra_options.skip_redo) return; if (hydra_targets[target_no]->ok) { From 296e5e32043063e5bb4c36116081005ceb45c958 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Tue, 2 Jul 2019 22:04:58 +0200 Subject: [PATCH 228/531] print the necessary info on found passwords with issues --- hydra-smb.c | 20 +++++++------------- 1 file changed, 7 insertions(+), 13 deletions(-) diff --git a/hydra-smb.c b/hydra-smb.c index ffea905..c46fd0f 100644 --- a/hydra-smb.c +++ b/hydra-smb.c @@ -1240,38 +1240,32 @@ int32_t start_smb(int32_t s, char *ip, int32_t port, unsigned char options, char hydra_report(stderr, "[ERROR] Invalid parameter status received, either the account or the method used are not valid\n"); hydra_completed_pair_skip(); } else if (SMBerr == 0x00006E) { /* Valid password, GPO Disabling Remote Connections Using NULL Passwords */ - if (verbose) - hydra_report(stderr, "[VERBOSE] Valid password, GPO Disabling Remote Connections Using NULL Passwords\n"); + hydra_report(stdout, "[%d][smb] Host: %s Account: %s Valid password, GPO Disabling Remote Connections Using NULL Passwords\n", port, ipaddr_str, login); hydra_report_found_host(port, ip, "smb", fp); hydra_completed_pair_found(); } else if (SMBerr == 0x00015B) { /* Valid password, GPO "Deny access to this computer from the network" */ - if (verbose) - hydra_report(stderr, "[VERBOSE] Valid password, GPO Deny access to this computer from the network\n"); + hydra_report(stdout, "[%d][smb] Host: %s Account: %s Valid password, GPO Deny access to this computer from the network\n", port, ipaddr_str, login); hydra_report_found_host(port, ip, "smb", fp); hydra_completed_pair_found(); } else if (SMBerr == 0x000193) { /* Valid password, account expired */ - if (verbose) - hydra_report(stderr, "[VERBOSE] Valid password, account expired\n"); + hydra_report(stdout, "[%d][smb] Host: %s Account: %s Valid password, account expired\n", port, ipaddr_str, login); hydra_report_found_host(port, ip, "smb", fp); hydra_completed_pair_found(); } else if ((SMBerr == 0x000224) || (SMBerr == 0xC20002)) { /* Valid password, account expired */ - if (verbose) - hydra_report(stderr, "[VERBOSE] Valid password, password expired and must be changed on next logon\n"); + hydra_report(stdout, "[%d][smb] Host: %s Account: %s Valid password, password expired and must be changed on next logon\n", port, ipaddr_str, login); hydra_report_found_host(port, ip, "smb", fp); hydra_completed_pair_found(); } else if ((SMBerr == 0x00006F) || (SMBerr == 0xC10002)) { /* Invalid logon hours */ - if (verbose) - hydra_report(stderr, "[VERBOSE] Valid password, but logon hours invalid\n"); + hydra_report(stdout, "[%d][smb] Host: %s Account: %s Valid password, but logon hours invalid\n", port, ipaddr_str, login); hydra_report_found_host(port, ip, "smb", fp); hydra_completed_pair_found(); } else if (SMBerr == 0x050001) { /* AS/400 -- Incorrect password */ - if (verbose) - fprintf(stderr, "[%d][smb] Host: %s Account: %s Error: Incorrect password or account disabled\n", port, ipaddr_str, login); + hydra_report(stdout, "[%d][smb] Host: %s Account: %s Error: Incorrect password or account disabled\n", port, ipaddr_str, login); if ((miscptr) && (strstr(miscptr, "LM"))) hydra_report(stderr, "[INFO] LM dialect may be disabled, try LMV2 instead\n"); hydra_completed_pair_skip(); } else if (SMBerr == 0x000024) { /* change password on next login [success] */ - fprintf(stderr, "[%d][smb] Host: %s Account: %s Error: ACCOUNT_CHANGE_PASSWORD\n", port, ipaddr_str, login); + hydra_report(stdout, "[%d][smb] Host: %s Account: %s Error: ACCOUNT_CHANGE_PASSWORD\n", port, ipaddr_str, login); hydra_completed_pair_found(); } else if (SMBerr == 0x00006D) { /* STATUS_LOGON_FAILURE */ hydra_completed_pair(); From 71df2b35181f3b2d1490a78535a596435a648b98 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Tue, 2 Jul 2019 22:09:30 +0200 Subject: [PATCH 229/531] fcknscriptkiddies --- hydra.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/hydra.c b/hydra.c index 159fde9..e17bf27 100644 --- a/hydra.c +++ b/hydra.c @@ -3184,9 +3184,11 @@ int main(int argc, char *argv[]) { hydra_options.max_use = MAXTASKS; } // script kiddie patch - if (hydra_options.server != NULL && (hydra_strcasestr(hydra_options.server, "gmail.") != NULL || hydra_strcasestr(hydra_options.server, "googlemail.") != NULL)) + if (hydra_options.server != NULL && (hydra_strcasestr(hydra_options.server, "gmail.") != NULL || hydra_strcasestr(hydra_options.server, "googlemail.") != NULL)) { fprintf(stderr, "[WARNING] Google Mail has bruteforce detection and sends false positives. You are not doing anything illegal right?!\n"); - + fprintf(stderr, "[WARNING] read the above!\n"); + sleep(5); + } if (hydra_options.colonfile == NULL) { if (hydra_options.loginfile != NULL) { if ((lfp = fopen(hydra_options.loginfile, "r")) == NULL) { From 39bc8e64db60a5cb39e278c7bbe7eb3b1e51866a Mon Sep 17 00:00:00 2001 From: van Hauser Date: Wed, 3 Jul 2019 11:43:47 +0200 Subject: [PATCH 230/531] more scriptkiddie annoying --- hydra.c | 14 +++++++++++--- 1 file changed, 11 insertions(+), 3 deletions(-) diff --git a/hydra.c b/hydra.c index e17bf27..bdc75c5 100644 --- a/hydra.c +++ b/hydra.c @@ -3184,9 +3184,17 @@ int main(int argc, char *argv[]) { hydra_options.max_use = MAXTASKS; } // script kiddie patch - if (hydra_options.server != NULL && (hydra_strcasestr(hydra_options.server, "gmail.") != NULL || hydra_strcasestr(hydra_options.server, "googlemail.") != NULL)) { - fprintf(stderr, "[WARNING] Google Mail has bruteforce detection and sends false positives. You are not doing anything illegal right?!\n"); - fprintf(stderr, "[WARNING] read the above!\n"); + if (hydra_options.server != NULL && ( + hydra_strcasestr(hydra_options.server, ".outlook.com") != NULL || + hydra_strcasestr(hydra_options.server, ".hotmail.com") != NULL || + hydra_strcasestr(hydra_options.server, ".yahoo.") != NULL || + hydra_strcasestr(hydra_options.server, ".gmx.") != NULL || + hydra_strcasestr(hydra_options.server, ".web.de") != NULL || + hydra_strcasestr(hydra_options.server, ".gmail.") != NULL || + hydra_strcasestr(hydra_options.server, "googlemail.") != NULL + )) { + fprintf(stderr, "[WARNING] Google Mail and others have bruteforce and hydra detection and sends false positives. You are not doing anything illegal right?!\n"); + fprintf(stderr, "[WARNING] !read the above!\n"); sleep(5); } if (hydra_options.colonfile == NULL) { From a93539e872932728b5d11a95238bb90e44f17d03 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 11 Jul 2019 11:27:07 +0200 Subject: [PATCH 231/531] mysql module not using a default db now --- CHANGES | 1 + hydra-mysql.c | 10 ++-------- 2 files changed, 3 insertions(+), 8 deletions(-) diff --git a/CHANGES b/CHANGES index 33247a5..4435e92 100644 --- a/CHANGES +++ b/CHANGES @@ -3,6 +3,7 @@ Changelog for hydra Release 9.1-dev * your patch? :) +* changed mysql module not to use mysql db as a default. if the user has not access to this db auth fails ... * added -K command line switch to disable redo attempts (good for mass scanning) * forgot to have the -m option in the hydra help output diff --git a/hydra-mysql.c b/hydra-mysql.c index 0fda989..c33dc88 100644 --- a/hydra-mysql.c +++ b/hydra-mysql.c @@ -180,19 +180,13 @@ int32_t start_mysql(int32_t sock, char *ip, int32_t port, unsigned char options, char *response = NULL, *login = NULL, *pass = NULL; unsigned long response_len; char res = 0; - char database[256]; + char *database = NULL; login = hydra_get_next_login(); pass = hydra_get_next_password(); if (miscptr) - strncpy(database, miscptr, sizeof(database) - 1); - else { - strncpy(database, DEFAULT_DB, sizeof(database) - 1); - if (verbose) - hydra_report(stderr, "[VERBOSE] using default db 'mysql'\n"); - } - database[sizeof(database) - 1] = 0; + database = miscptr; /* read server greeting */ res = hydra_mysql_init(sock); From c639f21a72bc9b1d8ac1e143690776f306f73cf5 Mon Sep 17 00:00:00 2001 From: jopravil Date: Wed, 24 Jul 2019 09:27:40 +0200 Subject: [PATCH 232/531] HTTP-GET add end condition. Simulary like in http-form --- hydra-http.c | 72 ++++++++++++++++++++++++++++++++++++++++++++++++++-- 1 file changed, 70 insertions(+), 2 deletions(-) diff --git a/hydra-http.c b/hydra-http.c index 61f7c65..bae18a7 100644 --- a/hydra-http.c +++ b/hydra-http.c @@ -1,10 +1,17 @@ #include "hydra-http.h" #include "sasl.h" + + extern char *HYDRA_EXIT; char *webtarget = NULL; char *slash = "/"; char *http_buf = NULL; + +#define END_CONDITION_MAX_LEN 100 +static char end_condition[END_CONDITION_MAX_LEN]; +int end_condition_type=-1; + int32_t webport, freemischttp = 0; int32_t http_auth_mechanism = AUTH_UNASSIGNED; @@ -23,6 +30,8 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha if (strcmp(type, "POST") == 0) add_header(&ptr_head, "Content-Length", "0", HEADER_TYPE_DEFAULT); + + header = stringify_headers(&ptr_head); @@ -215,15 +224,28 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha return 3; } + + if (debug) hydra_report(stderr, "S:%s\n", http_buf); + + ptr = ((char *) index(http_buf, ' ')); if (ptr != NULL) ptr++; if (ptr != NULL && (*ptr == '2' || *ptr == '3' || strncmp(ptr, "403", 3) == 0 || strncmp(ptr, "404", 3) == 0)) { - hydra_report_found_host(port, ip, "www", fp); - hydra_completed_pair_found(); + + if(end_condition_type>=0 && hydra_string_match(http_buf,end_condition)!=end_condition_type){ + if (debug) + hydra_report(stderr, "End condition not match continue.\n"); + hydra_completed_pair(); + }else{ + hydra_report(stderr, "END condition %s match.\n",end_condition); + hydra_report_found_host(port, ip, "www", fp); + hydra_completed_pair_found(); + } + if (http_buf != NULL) { free(http_buf); http_buf = NULL; @@ -260,10 +282,14 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha } // free(http_buf); // http_buf = NULL; + + + free(buffer); free(header); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) return 3; + return 1; } @@ -319,6 +345,10 @@ void service_http(char *ip, int32_t sp, unsigned char options, char *miscptr, FI if (http_auth_mechanism == AUTH_UNASSIGNED) http_auth_mechanism = AUTH_BASIC; + + + + while (1) { next_run = 0; @@ -390,6 +420,42 @@ int32_t service_http_init(char *ip, int32_t sp, unsigned char options, char *mis // 0 all OK // -1 error, hydra will exit, so print a good error message here + + + /*POU CODE */ + char * start=strstr(miscptr, "F="); + if(start==NULL) + start=strstr(miscptr, "S="); + + if (start !=NULL){ + if(start[0]=='F') + end_condition_type=0; + else + end_condition_type=1; + + int condition_len=strlen(start); + memset(end_condition,0,END_CONDITION_MAX_LEN); + if(condition_len>=END_CONDITION_MAX_LEN){ + hydra_report(stderr,"Condition string cannot be bigger than %u.",END_CONDITION_MAX_LEN); + return -1; + } + //copy condition witout starting string (F= or S= 2char) + strncpy(end_condition, start+2,condition_len-2); + hydra_report(stderr, "End condition is %s, mod is %d\n",end_condition,end_condition_type); + + if(*(start-1)==' ') + start--; + memset(start,'\0',condition_len); + if (debug) + hydra_report(stderr, "Modificated options:%s\n",miscptr); + }else{ + if (debug) + hydra_report(stderr, "Condition not found\n"); + } + + + + return 0; } @@ -398,5 +464,7 @@ void usage_http(const char* service) { "The following parameters are optional:\n" " (a|A)=auth-type specify authentication mechanism to use: BASIC, NTLM or MD5\n" " (h|H)=My-Hdr\\: foo to send a user defined HTTP header with each request\n" + " (F|S)=Invalid condition login check can be preceded by \"F=\", successful condition\n" + " login check must be preceded by \"S=\". IMPORTANT this option must by last option.\n" "For example: \"/secret\" or \"http://bla.com/foo/bar:H=Cookie\\: sessid=aaaa\" or \"https://test.com:8080/members:A=NTLM\"\n\n", service); } From eb8fc1686cb41515c4182ea7301620734899efef Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 25 Jul 2019 19:00:41 +0200 Subject: [PATCH 233/531] fix --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 129a9f1..c6a9b94 100644 --- a/README.md +++ b/README.md @@ -150,7 +150,7 @@ THIRD - check if the module has optional parameters e.g. hydra -U smtp FOURTH - the destination port - this is optional! if no port is supplied the default common port for the + this is optional, if no port is supplied the default common port for the PROTOCOL is used. If you specify SSL to use ("-S" option), the SSL common port is used by default. @@ -167,7 +167,7 @@ All attacks are then IPv6 only! If you want to supply your targets via a text file, you can not use the :// notation but use the old style and just supply the protocol (and module options): hydra [some command line options] -M targets.txt ftp -You can supply also the port for each target entry by adding ":" after a +You can also supply the port for each target entry by adding ":" after a target entry in the file, e.g.: ``` From 98afb8e32db0cb88da06bd468ed63fec65b9e9a6 Mon Sep 17 00:00:00 2001 From: jopravil Date: Mon, 29 Jul 2019 09:38:37 +0200 Subject: [PATCH 234/531] http-get better log --- hydra-http.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/hydra-http.c b/hydra-http.c index bae18a7..3489b38 100644 --- a/hydra-http.c +++ b/hydra-http.c @@ -441,7 +441,8 @@ int32_t service_http_init(char *ip, int32_t sp, unsigned char options, char *mis } //copy condition witout starting string (F= or S= 2char) strncpy(end_condition, start+2,condition_len-2); - hydra_report(stderr, "End condition is %s, mod is %d\n",end_condition,end_condition_type); + if(debug) + hydra_report(stderr, "End condition is %s, mod is %d\n",end_condition,end_condition_type); if(*(start-1)==' ') start--; From 150d3250277d5eaeefd5adf4dcb3bffcbba41a55 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Mon, 29 Jul 2019 12:04:57 +0200 Subject: [PATCH 235/531] cleanup of submitted code --- CHANGES | 2 +- hydra-http.c | 36 +++++++++++------------------------- 2 files changed, 12 insertions(+), 26 deletions(-) diff --git a/CHANGES b/CHANGES index 4435e92..262c365 100644 --- a/CHANGES +++ b/CHANGES @@ -2,7 +2,7 @@ Changelog for hydra ------------------- Release 9.1-dev -* your patch? :) +* http module now supports F=/S= string matching conditions (thanks to poucz@github) * changed mysql module not to use mysql db as a default. if the user has not access to this db auth fails ... * added -K command line switch to disable redo attempts (good for mass scanning) * forgot to have the -m option in the hydra help output diff --git a/hydra-http.c b/hydra-http.c index 3489b38..1c12ff8 100644 --- a/hydra-http.c +++ b/hydra-http.c @@ -30,8 +30,6 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha if (strcmp(type, "POST") == 0) add_header(&ptr_head, "Content-Length", "0", HEADER_TYPE_DEFAULT); - - header = stringify_headers(&ptr_head); @@ -224,28 +222,21 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha return 3; } - - if (debug) hydra_report(stderr, "S:%s\n", http_buf); - - ptr = ((char *) index(http_buf, ' ')); if (ptr != NULL) ptr++; if (ptr != NULL && (*ptr == '2' || *ptr == '3' || strncmp(ptr, "403", 3) == 0 || strncmp(ptr, "404", 3) == 0)) { - - if(end_condition_type>=0 && hydra_string_match(http_buf,end_condition)!=end_condition_type){ - if (debug) - hydra_report(stderr, "End condition not match continue.\n"); - hydra_completed_pair(); - }else{ - hydra_report(stderr, "END condition %s match.\n",end_condition); - hydra_report_found_host(port, ip, "www", fp); - hydra_completed_pair_found(); - } - + if (end_condition_type>=0 && hydra_string_match(http_buf,end_condition)!=end_condition_type) { + if (debug) hydra_report(stderr, "End condition not match continue.\n"); + hydra_completed_pair(); + } else { + if (debug) hydra_report(stderr, "END condition %s match.\n",end_condition); + hydra_report_found_host(port, ip, "www", fp); + hydra_completed_pair_found(); + } if (http_buf != NULL) { free(http_buf); http_buf = NULL; @@ -283,8 +274,6 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha // free(http_buf); // http_buf = NULL; - - free(buffer); free(header); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -346,10 +335,6 @@ void service_http(char *ip, int32_t sp, unsigned char options, char *miscptr, FI if (http_auth_mechanism == AUTH_UNASSIGNED) http_auth_mechanism = AUTH_BASIC; - - - - while (1) { next_run = 0; switch (run) { @@ -465,7 +450,8 @@ void usage_http(const char* service) { "The following parameters are optional:\n" " (a|A)=auth-type specify authentication mechanism to use: BASIC, NTLM or MD5\n" " (h|H)=My-Hdr\\: foo to send a user defined HTTP header with each request\n" - " (F|S)=Invalid condition login check can be preceded by \"F=\", successful condition\n" - " login check must be preceded by \"S=\". IMPORTANT this option must by last option.\n" + " (F|S)=check for text in the HTTP reply. S= means if this text is found, a\n" + " valid account has been found, F= means if this string is present the\n" + " combination is invalid. Note: this must be the last option supplied.\n" "For example: \"/secret\" or \"http://bla.com/foo/bar:H=Cookie\\: sessid=aaaa\" or \"https://test.com:8080/members:A=NTLM\"\n\n", service); } From 5d25fa1d1c3fd64d17532316b1a2ea7c20983361 Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Fri, 30 Aug 2019 10:44:09 +0800 Subject: [PATCH 236/531] Fix string matching call for system without libpcre hydra_string_match() function is only available if libpcre is present. Compilation crashes without that patch. --- hydra-http.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/hydra-http.c b/hydra-http.c index 1c12ff8..3a6b378 100644 --- a/hydra-http.c +++ b/hydra-http.c @@ -229,7 +229,11 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha if (ptr != NULL) ptr++; if (ptr != NULL && (*ptr == '2' || *ptr == '3' || strncmp(ptr, "403", 3) == 0 || strncmp(ptr, "404", 3) == 0)) { - if (end_condition_type>=0 && hydra_string_match(http_buf,end_condition)!=end_condition_type) { +#ifdef HAVE_PCRE + if (end_condition_type >= 0 && hydra_string_match(http_buf, end_condition)!=end_condition_type) { +#else + if (end_condition_type >= 0 && (strstr(http_buf, end_condition) == NULL ? 0 : 1) != end_condition_type) { +#endif if (debug) hydra_report(stderr, "End condition not match continue.\n"); hydra_completed_pair(); } else { From 32a7a406538bdfd695f20c7e40dce3e30b360140 Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Fri, 30 Aug 2019 16:41:32 +0800 Subject: [PATCH 237/531] Add myself back to the project --- hydra.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/hydra.c b/hydra.c index bdc75c5..6b28ad5 100644 --- a/hydra.c +++ b/hydra.c @@ -217,6 +217,8 @@ char *SERVICES = #define VERSION "v9.1-dev" #define AUTHOR "van Hauser/THC" #define EMAIL "" +#define AUTHOR2 "David Maciejak" +#define EMAIL2 "" #define RESOURCE "https://github.com/vanhauser-thc/thc-hydra" extern char *hydra_strcasestr(const char *haystack, const char *needle); @@ -2094,7 +2096,7 @@ int main(int argc, char *argv[]) { struct sockaddr_in6 *ipv6 = NULL; struct sockaddr_in *ipv4 = NULL; - printf("%s %s (c) 2019 by %s - Please do not use in military or secret service organizations, or for illegal purposes.\n\n", PROGRAM, VERSION, AUTHOR); + printf("%s %s (c) 2019 by %s & %s - Please do not use in military or secret service organizations, or for illegal purposes.\n\n", PROGRAM, VERSION, AUTHOR, AUTHOR2); #ifndef LIBAFP SERVICES = hydra_string_replace(SERVICES, "afp ", ""); strcat(unsupported, "afp "); From 2a62cb30bb71b79fee33222ca66cdb13b7094f9c Mon Sep 17 00:00:00 2001 From: Andrii Artiushok Date: Fri, 30 Aug 2019 15:10:32 +0300 Subject: [PATCH 238/531] Fix dump with folder --- hydra.c | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/hydra.c b/hydra.c index 6b28ad5..ac495c5 100644 --- a/hydra.c +++ b/hydra.c @@ -1046,15 +1046,17 @@ void fill_mem(char *ptr, FILE * fd, int32_t colonmode) { char tmp[MAXBUF + 4] = "", *ptr2; uint32_t len; int32_t only_one_empty_line = 0; + +int read_flag = 0; #ifdef HAVE_ZLIB gzFile fp = gzdopen(fileno(fd), "r"); - while (!gzeof(fp)) { + while (!gzeof(fp) && !read_flag) { if (gzgets(fp, tmp, MAXLINESIZE) != NULL) { #else FILE *fp = fd; - while (!feof(fp)) { + while (!feof(fp) && !read_flag) { if (fgets(tmp, MAXLINESIZE, fp) != NULL) { #endif if (tmp[0] != 0) { @@ -1082,6 +1084,8 @@ void fill_mem(char *ptr, FILE * fd, int32_t colonmode) { ptr++; } } + } else { + read_flag = 1; } } #ifdef HAVE_ZLIB From 9ae7ed075ac781c0014ceabdb6e057a95e3c2232 Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Sun, 1 Sep 2019 10:15:06 +0800 Subject: [PATCH 239/531] Improve support for macOS That's fixing the compilation issues as /lib does not exist on these systems, remove pie warnings, and add support for libraries installed with macPorts --- configure | 15 ++++++++++++--- 1 file changed, 12 insertions(+), 3 deletions(-) diff --git a/configure b/configure index 9c2e248..5afd0da 100755 --- a/configure +++ b/configure @@ -1,6 +1,6 @@ #!/bin/sh # -# uname -s = Linux | OpenBSD | FreeBSD +# uname -s = Linux | OpenBSD | FreeBSD | Darwin # uname -m = i636 or x86_64 if [ "$1" = "-h" -o "$1" = "--help" ]; then @@ -1272,7 +1272,16 @@ XLIBPATHS="" XIPATHS="" if [ -n "$FIREBIRD_PATH" -o -n "$PCRE_PATH" -o -n "$IDN_PATH" -o -n "$SSL_PATH" -o -n "$CRYPTO_PATH" -o -n "$NSL_PATH" -o -n "$SOCKET_PATH" -o -n "$RESOLV_PATH" -o -n "$SAPR3_PATH" -o -n "$SSH_PATH" -o -n "$POSTGRES_PATH" -o -n "$SVN_PATH" -o -n "$NCP_PATH" -o -n "$CURSES_PATH" -o -n "$ORACLE_PATH" -o -n "$AFP_PATH" -o -n "$MYSQL_PATH" -o -n "$MCACHED_PATH" -o -n "$MONGOD_PATH" -o -n "$FREERDP2_PATH" -o -n "$WINPR2_PATH" ]; then - XLIBPATHS="-L/usr/lib -L/usr/local/lib -L/lib" + if [ "$SYSS" = "Darwin" ] && [ ! -d "/lib" ]; then + #for libraries installed with MacPorts + if [ -d "/opt/local/lib" ]; then + XLIBPATHS="-L/usr/lib -L/usr/local/lib -L/opt/local/lib" + else + XLIBPATHS="-L/usr/lib -L/usr/local/lib" + fi + else + XLIBPATHS="-L/usr/lib -L/usr/local/lib -L/lib" + fi fi if [ -n "$MYSQL_IPATH" ]; then XIPATHS="$XIPATHS -I$MYSQL_IPATH" @@ -1574,7 +1583,7 @@ if [ "x$WINDRES" = "x" ]; then echo HYDRA_LOGO= >> Makefile echo PWI_LOGO= >> Makefile fi -if [ "$GCCSEC" = "yes" ] && [ "$SYSS" != "SunOS" ]; then +if [ "$GCCSEC" = "yes" ] && [ "$SYSS" != "SunOS" ] && [ "$SYSS" != "Darwin" ]; then echo "SEC=$GCCSECOPT" >> Makefile else echo "SEC=" >> Makefile From b3ddd4a2d25231a890007d361de656eaf58237db Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Mon, 2 Sep 2019 10:41:45 +0800 Subject: [PATCH 240/531] Fix svn_client_list3 function call deprecation Update the module to support subversion lib from v1.5 to 1.10 and fix following warning: hydra-svn.c:124:3: warning: \u2018svn_client_list3\u2019 is deprecated [-Wdeprecated-declarations] err = svn_client_list3(canonical, &revision, &revision, svn_depth_unknown, dirents, FALSE, FALSE, (svn_client_list_func2_t) print_dirdummy, NULL, ctx, pool); --- hydra-svn.c | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) diff --git a/hydra-svn.c b/hydra-svn.c index f180fbd..4f4b79f 100644 --- a/hydra-svn.c +++ b/hydra-svn.c @@ -10,12 +10,15 @@ #include #endif +#include #include #include #include #include #include +#if SVN_VER_MINOR > 7 #include +#endif #endif @@ -58,7 +61,9 @@ int32_t start_svn(int32_t s, char *ip, int32_t port, unsigned char options, char //int32_t ipv6 = 0; char URL[1024]; char URLBRANCH[256]; + #if SVN_VER_MINOR > 7 const char *canonical; + #endif apr_pool_t *pool; svn_error_t *err; svn_opt_revision_t revision; @@ -87,7 +92,11 @@ int32_t start_svn(int32_t s, char *ip, int32_t port, unsigned char options, char return 4; } +#if SVN_VER_MINOR > 7 if ((err = svn_client_create_context2(&ctx, NULL, pool))) { +#else + if ((err = svn_client_create_context(&ctx, pool))) { +#endif svn_pool_destroy(pool); svn_handle_error2(err, stderr, FALSE, "hydra: "); return 4; @@ -111,8 +120,15 @@ int32_t start_svn(int32_t s, char *ip, int32_t port, unsigned char options, char revision.kind = svn_opt_revision_head; snprintf(URL, sizeof(URL), "svn://%s:%d/%s", hydra_address2string_beautiful(ip), port, URLBRANCH); dirents = SVN_DIRENT_KIND; + #if SVN_VER_MINOR > 9 + canonical = svn_uri_canonicalize(URL, pool); + err = svn_client_list4(canonical, &revision, &revision, NULL, svn_depth_unknown, dirents, FALSE, FALSE, (svn_client_list_func2_t) print_dirdummy, NULL, ctx, pool); + #elif SVN_VER_MINOR > 7 canonical = svn_uri_canonicalize(URL, pool); err = svn_client_list3(canonical, &revision, &revision, svn_depth_unknown, dirents, FALSE, FALSE, (svn_client_list_func2_t) print_dirdummy, NULL, ctx, pool); + #else + err = svn_client_list2(URL, &revision, &revision, svn_depth_unknown, dirents, FALSE, print_dirdummy, NULL, ctx, pool); + #endif svn_pool_destroy(pool); @@ -211,6 +227,12 @@ int32_t service_svn_init(char *ip, int32_t sp, unsigned char options, char *misc // 0 all OK // -1 error, hydra will exit, so print a good error message here + if (verbose) + hydra_report(stderr, "[VERBOSE] detected subversion library v%d.%d\n", SVN_VER_MAJOR, SVN_VER_MINOR); + if (SVN_VER_MAJOR != 1 && SVN_VER_MINOR >= 5) { + hydra_report(stderr, "[ERROR] unsupported subversion library v%d.%d, exiting!\n", SVN_VER_MAJOR, SVN_VER_MINOR); + return -1; + } return 0; } From e1e708d1a1b1b96849e21fb4e9a45fef0e85dfab Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Mon, 2 Sep 2019 21:05:50 +0800 Subject: [PATCH 241/531] Fix compilation warning for long unsigned value printing --- hydra.c | 44 ++++++++++++++++++++++---------------------- hydra.h | 9 ++++++++- 2 files changed, 30 insertions(+), 23 deletions(-) diff --git a/hydra.c b/hydra.c index ac495c5..5f27ef4 100644 --- a/hydra.c +++ b/hydra.c @@ -594,7 +594,7 @@ void hydra_debug(int32_t force, char *string) { if (!debug && !force) return; - printf("[DEBUG] Code: %s Time: %lu\n", string, (uint64_t) time(NULL)); + printf("[DEBUG] Code: %s Time: %" hPRIu64 "\n", string, (uint64_t) time(NULL)); printf("[DEBUG] Options: mode %d ssl %d restore %d showAttempt %d tasks %d max_use %d tnp %d tpsal %d tprl %d exit_found %d miscptr %s service %s\n", hydra_options.mode, hydra_options.ssl, hydra_options.restore, hydra_options.showAttempt, hydra_options.tasks, hydra_options.max_use, @@ -602,7 +602,7 @@ void hydra_debug(int32_t force, char *string) { hydra_options.try_password_reverse_login, hydra_options.exit_found, STR_NULL(hydra_options.miscptr), hydra_options.service); - printf("[DEBUG] Brains: active %d targets %d finished %d todo_all %lu todo %lu sent %lu found %lu countlogin %lu sizelogin %lu countpass %lu sizepass %lu\n", + printf("[DEBUG] Brains: active %d targets %d finished %d todo_all %" hPRIu64 " todo %" hPRIu64 " sent %" hPRIu64 " found %" hPRIu64 " countlogin %" hPRIu64 " sizelogin %" hPRIu64 " countpass %" hPRIu64 " sizepass %" hPRIu64 "\n", hydra_brains.active, hydra_brains.targets, hydra_brains.finished, hydra_brains.todo_all + total_redo_count, hydra_brains.todo, hydra_brains.sent, hydra_brains.found, @@ -614,7 +614,7 @@ void hydra_debug(int32_t force, char *string) { for (i = 0; i < hydra_brains.targets; i++) { hydra_target* target = hydra_targets[i]; printf - ("[DEBUG] Target %d - target %s ip %s login_no %lu pass_no %lu sent %lu pass_state %d redo_state %d (%d redos) use_count %d failed %d done %d fail_count %d login_ptr %s pass_ptr %s\n", + ("[DEBUG] Target %d - target %s ip %s login_no %" hPRIu64 " pass_no %" hPRIu64 " sent %" hPRIu64 " pass_state %d redo_state %d (%d redos) use_count %d failed %d done %d fail_count %d login_ptr %s pass_ptr %s\n", i, STR_NULL(target->target), hydra_address2string_beautiful(target->ip), target->login_no, target->pass_no, target->sent, target->pass_state, target->redo_state, target->redo, @@ -1139,7 +1139,7 @@ void hydra_service_init(int32_t target_no) { if (hydra_options.outfile_format == FORMAT_JSONV1) { char json_error[120]; snprintf(json_error, sizeof(json_error), "[ERROR] unexpected result connecting to target %s port %d", hydra_address2string_beautiful(t->ip), t->port); - fprintf(hydra_brains.ofp, "\n\t],\n\"success\": false,\n\"errormessages\": [ \"%s\" ],\n\"quantityfound\": %lu }\n", json_error, hydra_brains.found); + fprintf(hydra_brains.ofp, "\n\t],\n\"success\": false,\n\"errormessages\": [ \"%s\" ],\n\"quantityfound\": %" hPRIu64 " }\n", json_error, hydra_brains.found); } fclose(hydra_brains.ofp); } @@ -1544,14 +1544,14 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { if (debug) printf - ("[DEBUG] send_next_pair_init target %d, head %d, redo %d, redo_state %d, pass_state %d. loop_mode %d, curlogin %s, curpass %s, tlogin %s, tpass %s, logincnt %lu/%lu, passcnt %lu/%lu, loop_cnt %d\n", + ("[DEBUG] send_next_pair_init target %d, head %d, redo %d, redo_state %d, pass_state %d. loop_mode %d, curlogin %s, curpass %s, tlogin %s, tpass %s, logincnt %" hPRIu64 "/%" hPRIu64 ", passcnt %" hPRIu64 "/%" hPRIu64 ", loop_cnt %d\n", target_no, head_no, hydra_targets[target_no]->redo, hydra_targets[target_no]->redo_state, hydra_targets[target_no]->pass_state, hydra_options.loop_mode, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, hydra_targets[target_no]->login_ptr, hydra_targets[target_no]->pass_ptr, hydra_targets[target_no]->login_no, hydra_brains.countlogin, hydra_targets[target_no]->pass_no, hydra_brains.countpass, loop_cnt); if (loop_cnt > (hydra_brains.countlogin * 2) + 1 && loop_cnt > (hydra_brains.countpass * 2) + 1) { if (debug) - printf("[DEBUG] too many loops in send_next_pair, returning -1 (loop_cnt %d, sent %lu, todo %lu)\n", loop_cnt, hydra_targets[target_no]->sent, hydra_brains.todo); + printf("[DEBUG] too many loops in send_next_pair, returning -1 (loop_cnt %d, sent %" hPRIu64 ", todo %" hPRIu64 ")\n", loop_cnt, hydra_targets[target_no]->sent, hydra_brains.todo); return -1; } @@ -1561,7 +1561,7 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { snpdone = 1; } else { if (debug && (hydra_heads[head_no]->current_login_ptr != NULL || hydra_heads[head_no]->current_pass_ptr != NULL)) - printf("[COMPLETED] target %s - login \"%s\" - pass \"%s\" - child %d - %lu of %lu\n", + printf("[COMPLETED] target %s - login \"%s\" - pass \"%s\" - child %d - %" hPRIu64 " of %" hPRIu64 "\n", hydra_targets[target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, head_no, hydra_targets[target_no]->sent, hydra_brains.todo + hydra_targets[target_no]->redo); hydra_heads[head_no]->redo = 0; @@ -1871,7 +1871,7 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { return 0; // not prevent disabling it, if its needed its already done in the above line } if (debug || hydra_options.showAttempt) { - printf("[%sATTEMPT] target %s - login \"%s\" - pass \"%s\" - %lu of %lu [child %d] (%d/%d)\n", + printf("[%sATTEMPT] target %s - login \"%s\" - pass \"%s\" - %" hPRIu64 " of %" hPRIu64 " [child %d] (%d/%d)\n", hydra_targets[target_no]->redo_state ? "REDO-" : snp_is_redo ? "RE-" : "", hydra_targets[target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, hydra_targets[target_no]->sent, hydra_brains.todo + hydra_targets[target_no]->redo, head_no, hydra_targets[target_no]->redo_state ? hydra_targets[target_no]->redo_state - 1 : 0, hydra_targets[target_no]->redo); } @@ -3216,11 +3216,11 @@ int main(int argc, char *argv[]) { exit(-1); } if (hydra_brains.countlogin > MAX_LINES) { - fprintf(stderr, "[ERROR] Maximum number of logins is %d, this file has %lu entries.\n", MAX_LINES, hydra_brains.countlogin); + fprintf(stderr, "[ERROR] Maximum number of logins is %d, this file has %" hPRIu64 " entries.\n", MAX_LINES, hydra_brains.countlogin); exit(-1); } if (hydra_brains.sizelogin > MAX_BYTES) { - fprintf(stderr, "[ERROR] Maximum size of the login file is %d, this file has %lu bytes.\n", MAX_BYTES, (uint64_t) hydra_brains.sizelogin); + fprintf(stderr, "[ERROR] Maximum size of the login file is %d, this file has %" hPRIu64 " bytes.\n", MAX_BYTES, (uint64_t) hydra_brains.sizelogin); exit(-1); } login_ptr = malloc(hydra_brains.sizelogin + hydra_brains.countlogin + 8); @@ -3245,11 +3245,11 @@ int main(int argc, char *argv[]) { exit(-1); } if (hydra_brains.countpass > MAX_LINES) { - fprintf(stderr, "[ERROR] Maximum number of passwords is %d, this file has %lu entries.\n", MAX_LINES, hydra_brains.countpass); + fprintf(stderr, "[ERROR] Maximum number of passwords is %d, this file has %" hPRIu64 " entries.\n", MAX_LINES, hydra_brains.countpass); exit(-1); } if (hydra_brains.sizepass > MAX_BYTES) { - fprintf(stderr, "[ERROR] Maximum size of the password file is %d, this file has %lu bytes.\n", MAX_BYTES, (uint64_t) hydra_brains.sizepass); + fprintf(stderr, "[ERROR] Maximum size of the password file is %d, this file has %" hPRIu64 " bytes.\n", MAX_BYTES, (uint64_t) hydra_brains.sizepass); exit(-1); } pass_ptr = malloc(hydra_brains.sizepass + hydra_brains.countpass + 8); @@ -3292,11 +3292,11 @@ int main(int argc, char *argv[]) { exit(-1); } if (hydra_brains.countlogin > MAX_LINES / 2) { - fprintf(stderr, "[ERROR] Maximum number of colon file entries is %d, this file has %lu entries.\n", MAX_LINES / 2, hydra_brains.countlogin); + fprintf(stderr, "[ERROR] Maximum number of colon file entries is %d, this file has %" hPRIu64 " entries.\n", MAX_LINES / 2, hydra_brains.countlogin); exit(-1); } if (hydra_brains.sizelogin > MAX_BYTES / 2) { - fprintf(stderr, "[ERROR] Maximum size of the colon file is %d, this file has %lu bytes.\n", MAX_BYTES / 2, (uint64_t) hydra_brains.sizelogin); + fprintf(stderr, "[ERROR] Maximum size of the colon file is %d, this file has %" hPRIu64 " bytes.\n", MAX_BYTES / 2, (uint64_t) hydra_brains.sizelogin); exit(-1); } csv_ptr = malloc(hydra_brains.sizelogin + 2 * hydra_brains.countlogin + 8); @@ -3519,7 +3519,7 @@ int main(int argc, char *argv[]) { bail("No login/password combination given!"); if (hydra_brains.todo < hydra_options.tasks) { if (verbose && hydra_options.tasks != TASKS) - printf("[VERBOSE] More tasks defined than login/pass pairs exist. Tasks reduced to %lu\n", hydra_brains.todo); + printf("[VERBOSE] More tasks defined than login/pass pairs exist. Tasks reduced to %" hPRIu64 "\n", hydra_brains.todo); hydra_options.tasks = hydra_brains.todo; } } @@ -3554,18 +3554,18 @@ int main(int argc, char *argv[]) { if (hydra_options.ssl) options = options | OPTION_SSL; - printf("[DATA] max %d task%s per %d server%s, overall %d task%s, %lu login tr", + printf("[DATA] max %d task%s per %d server%s, overall %d task%s, %" hPRIu64 " login tr", hydra_options.tasks, hydra_options.tasks == 1 ? "" : "s", hydra_brains.targets, hydra_brains.targets == 1 ? "" : "s", hydra_options.max_use, hydra_options.max_use == 1 ? "" : "s", hydra_brains.todo); printf("%s", hydra_brains.todo == 1 ? "y" : "ies"); if (hydra_options.colonfile == NULL) { - printf(" (l:%lu/p:%lu), ~%lu tr", + printf(" (l:%" hPRIu64 "/p:%" hPRIu64 "), ~%" hPRIu64 " tr", (uint64_t) hydra_brains.countlogin, (uint64_t) hydra_brains.countpass, math2); } else { - printf(", ~%lu tr", math2); + printf(", ~%" hPRIu64 " tr", math2); } printf("%s", math2 == 1 ? "y" : "ies"); printf(" per task\n"); @@ -3928,7 +3928,7 @@ int main(int argc, char *argv[]) { case 'C': // head reports connect error fck = write(hydra_heads[head_no]->sp[0], "Q", 1); if (debug) { - printf("[ATTEMPT-ERROR] target %s - login \"%s\" - pass \"%s\" - child %d - %lu of %lu\n", + printf("[ATTEMPT-ERROR] target %s - login \"%s\" - pass \"%s\" - child %d - %" hPRIu64 " of %" hPRIu64 "\n", hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, head_no, hydra_targets[hydra_heads[head_no]->target_no]->sent, hydra_brains.todo); } @@ -4007,7 +4007,7 @@ int main(int argc, char *argv[]) { for (j = 0; j < hydra_options.max_use; j++) if (hydra_heads[j]->active >= HEAD_UNUSED) k++; - printf("[STATUS] %.2f tries/min, %lu tries in %02lu:%02luh, %lu to do in %02lu:%02luh, %d active\n", (1.0 * hydra_brains.sent) / (((elapsed_status - starttime) * 1.0) / 60), // tries/min + printf("[STATUS] %.2f tries/min, %" hPRIu64 " tries in %02" hPRIu64 ":%02" hPRIu64 "h, %" hPRIu64 " to do in %02" hPRIu64 ":%02" hPRIu64 "h, %d active\n", (1.0 * hydra_brains.sent) / (((elapsed_status - starttime) * 1.0) / 60), // tries/min hydra_brains.sent, // tries (uint64_t) ((elapsed_status - starttime) / 3600), // hours (uint64_t) (((elapsed_status - starttime) % 3600) / 60), // minutes @@ -4052,7 +4052,7 @@ int main(int argc, char *argv[]) { fprintf(stderr, "[ERROR] illegal target result value (%d=>%d)\n", i, hydra_targets[i]->done); } - printf("%d of %d target%s%scompleted, %lu valid password", + printf("%d of %d target%s%scompleted, %" hPRIu64 " valid password", hydra_brains.targets - j - k - error, hydra_brains.targets, hydra_brains.targets == 1 ? " " : "s ", hydra_brains.found > 0 ? "successfully " : "", hydra_brains.found); printf("%s", hydra_brains.found < 1 ? "" : "s"); @@ -4122,7 +4122,7 @@ int main(int argc, char *argv[]) { printf("%s (%s) finished at %s\n", PROGRAM, RESOURCE, hydra_build_time()); if (hydra_brains.ofp != NULL && hydra_brains.ofp != stdout) { if (hydra_options.outfile_format == FORMAT_JSONV1) { - fprintf(hydra_brains.ofp, "\n\t],\n\"success\": %s,\n\"errormessages\": [ %s ],\n\"quantityfound\": %lu }\n", + fprintf(hydra_brains.ofp, "\n\t],\n\"success\": %s,\n\"errormessages\": [ %s ],\n\"quantityfound\": %" hPRIu64 " }\n", (error ? "false" : "true"), json_error, hydra_brains.found); } fclose(hydra_brains.ofp); diff --git a/hydra.h b/hydra.h index 2d6a35b..0d47f0f 100644 --- a/hydra.h +++ b/hydra.h @@ -3,11 +3,18 @@ #include #ifdef __sun #include -#elif defined(__FreeBSD__) || defined(__IBMCPP__) || defined(_AIX) +#elif defined(__FreeBSD__) || defined(__IBMCPP__) || defined(_AIX) || defined(__APPLE__) #include #else #include #endif + +#if defined(_INTTYPES_H) || defined(__CLANG_INTTYPES_H) + #define hPRIu64 PRIu64 +#else + #define hPRIu64 "lu" +#endif + #include #include #include From 866120e4e6e58c59e18dce044304d6504838b8df Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Mon, 2 Sep 2019 21:18:52 +0800 Subject: [PATCH 242/531] Fix compilation error if missing libsvn oops forgot the case if the lib is not installed --- hydra-svn.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/hydra-svn.c b/hydra-svn.c index 4f4b79f..91d8503 100644 --- a/hydra-svn.c +++ b/hydra-svn.c @@ -227,12 +227,14 @@ int32_t service_svn_init(char *ip, int32_t sp, unsigned char options, char *misc // 0 all OK // -1 error, hydra will exit, so print a good error message here +#ifdef LIBSVN if (verbose) hydra_report(stderr, "[VERBOSE] detected subversion library v%d.%d\n", SVN_VER_MAJOR, SVN_VER_MINOR); if (SVN_VER_MAJOR != 1 && SVN_VER_MINOR >= 5) { hydra_report(stderr, "[ERROR] unsupported subversion library v%d.%d, exiting!\n", SVN_VER_MAJOR, SVN_VER_MINOR); return -1; } +#endif return 0; } From a06ee4882619a5a43eda0f82375ae9ea16875ab7 Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Tue, 3 Sep 2019 13:34:57 +0800 Subject: [PATCH 243/531] Add entry for svn module update --- CHANGES | 1 + 1 file changed, 1 insertion(+) diff --git a/CHANGES b/CHANGES index 262c365..d650eec 100644 --- a/CHANGES +++ b/CHANGES @@ -2,6 +2,7 @@ Changelog for hydra ------------------- Release 9.1-dev +* svn: updated to support past and new API * http module now supports F=/S= string matching conditions (thanks to poucz@github) * changed mysql module not to use mysql db as a default. if the user has not access to this db auth fails ... * added -K command line switch to disable redo attempts (good for mass scanning) From 273334df88f989a7e5eb4009370f8cb9c9c25c0e Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Thu, 5 Sep 2019 12:28:45 +0800 Subject: [PATCH 244/531] Force VNC protocol version downgrade --- hydra-vnc.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/hydra-vnc.c b/hydra-vnc.c index 227f053..4d9d706 100644 --- a/hydra-vnc.c +++ b/hydra-vnc.c @@ -110,7 +110,7 @@ int32_t start_vnc(int32_t s, char *ip, int32_t port, unsigned char options, char } break; default: - hydra_report(stderr, "[ERROR] unknown VNC security type\n"); + hydra_report(stderr, "[ERROR] unknown VNC security type 0x%x\n", buf2[3]); hydra_child_exit(2); } @@ -196,8 +196,8 @@ void service_vnc(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL } if (verbose) hydra_report(stderr, "[VERBOSE] Server banner is %s\n", buf); - if (((strstr(buf, "RFB 004.001") != NULL) || (strstr(buf, "RFB 003.007") != NULL) || (strstr(buf, "RFB 003.008") != NULL))) { - //using proto version 003.008 to talk to server 004.001 same for 3.7 and 3.8 + if (((strstr(buf, "RFB 005.000") != NULL) || (strstr(buf, "RFB 004") != NULL) || (strstr(buf, "RFB 003.007") != NULL) || (strstr(buf, "RFB 003.008") != NULL))) { + //using proto version 003.007 to talk to server 005.xxx and 004.xxx same for 3.7 and 3.8 vnc_client_version = RFB37; free(buf); buf = strdup("RFB 003.007\n"); From b77d49d40722a84043a0438fef4fb74c6d1de787 Mon Sep 17 00:00:00 2001 From: Stefan Pietsch Date: Tue, 10 Sep 2019 21:48:23 +0200 Subject: [PATCH 245/531] Fix typo in PW-Inspector --- pw-inspector.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pw-inspector.c b/pw-inspector.c index 86eb352..11afdc5 100644 --- a/pw-inspector.c +++ b/pw-inspector.c @@ -28,7 +28,7 @@ void help() { printf(" -u upcase characters (A,B,C,D, etc.)\n"); printf(" -n numbers (1,2,3,4, etc.)\n"); printf(" -p printable characters (which are not -l/-n/-p, e.g. $,!,/,(,*, etc.)\n"); - printf(" -s special characters - all others not withint the sets above\n"); + printf(" -s special characters - all others not within the sets above\n"); printf("\n%s reads passwords in and prints those which meet the requirements.\n", PROGRAM); printf("The return code is the number of valid passwords found, 0 if none was found.\n"); printf("Use for security: check passwords, if 0 is returned, reject password choice.\n"); From ebbea58cf6d8159337d74acbb739a4478c6cf014 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Fri, 13 Sep 2019 17:35:05 +0200 Subject: [PATCH 246/531] http-form parameter fix --- hydra-http-form.c | 12 +++++++++++- 1 file changed, 11 insertions(+), 1 deletion(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 77559df..1ac8721 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -1104,6 +1104,7 @@ void service_http_form(char *ip, int32_t sp, unsigned char options, char *miscpt * - 3 -> Disconnect and end with success. * - 4 -> Disconnect and end with error. */ + while (1) { if (run == 2) { if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) { @@ -1260,11 +1261,18 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { ptr++; if (*ptr != 0) *ptr++ = 0; - cond = ptr; + + if ((ptr2 = rindex(ptr, ':')) != NULL) { + cond = ptr2 + 1; + *ptr2 = 0; + } else + cond = ptr; +/* while (*ptr != 0 && (*ptr != ':' || *(ptr - 1) == '\\')) ptr++; if (*ptr != 0) *ptr++ = 0; +*/ optional1 = ptr; if (strstr(url, "\\:") != NULL) { if ((ptr = malloc(strlen(url))) != NULL) { @@ -1306,6 +1314,8 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { success_cond = 0; } + //printf("miscptr: %s, url=%s, variables=%s, ptr=%s, optional1: %s, cond: %s (%d)\n", miscptr, url, variables, ptr, optional1, cond, success_cond); + /* * Parse the user-supplied options. * Beware of the backslashes (\)! From b911269c1ab292c97ccfcb7e2859ef204684d322 Mon Sep 17 00:00:00 2001 From: David Maciejak Date: Sun, 15 Sep 2019 23:18:54 +0800 Subject: [PATCH 247/531] Fix typo when only 1 password is found --- hydra.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra.c b/hydra.c index 5f27ef4..d3f7430 100644 --- a/hydra.c +++ b/hydra.c @@ -4055,7 +4055,7 @@ int main(int argc, char *argv[]) { printf("%d of %d target%s%scompleted, %" hPRIu64 " valid password", hydra_brains.targets - j - k - error, hydra_brains.targets, hydra_brains.targets == 1 ? " " : "s ", hydra_brains.found > 0 ? "successfully " : "", hydra_brains.found); - printf("%s", hydra_brains.found < 1 ? "" : "s"); + printf("%s", hydra_brains.found < 2 ? "" : "s"); printf(" found\n"); error += j; From 1658f4926fbb2a732d08f250a14204423a37dae1 Mon Sep 17 00:00:00 2001 From: owein Date: Mon, 7 Oct 2019 14:20:02 +0200 Subject: [PATCH 248/531] it look like github wants to drive me mad --- bfg.c | 32 +++++++++++++++++++++++++++++--- bfg.h | 3 ++- hydra.c | 11 ++++++++--- hydra.h | 1 + 4 files changed, 40 insertions(+), 7 deletions(-) diff --git a/bfg.c b/bfg.c index a3a1dad..a19fcfa 100644 --- a/bfg.c +++ b/bfg.c @@ -52,6 +52,7 @@ static int32_t add_single_char(char ch, char flags, int32_t* crs_len) { // note that we check for -x .:.:ab but not for -x .:.:ba // int32_t bf_init(char *arg) { + bf_options.rain = 0; int32_t i = 0; int32_t crs_len = 0; char flags = 0; @@ -189,8 +190,17 @@ uint64_t bf_get_pcount() { return foo; } +int accu(int value) +{ + int sum = 0; + for(int i=1; i<=value; ++i) + { + sum+=i; + } + return sum; +} -char *bf_next() { +char *bf_next(_Bool rainy) { int32_t i, pos = bf_options.current - 1; if (bf_options.current > bf_options.to) @@ -200,9 +210,25 @@ char *bf_next() { fprintf(stderr, "Error: Can not allocate memory for -x data!\n"); return NULL; } + + if(rainy) + { + for (i = 0; i < bf_options.current; i++){ + bf_options.ptr[i] = bf_options.crs[(bf_options.state[i]+bf_options.rain)%bf_options.crs_len]; + bf_options.rain += i+1; + } + if(bf_options.crs_len%10 == 0) + bf_options.rain-=accu(bf_options.current)-2; + else if(bf_options.crs_len%2 == 0) + bf_options.rain-=accu(bf_options.current)-4; + else if(bf_options.crs_len%2) + bf_options.rain-=accu(bf_options.current)-1; - for (i = 0; i < bf_options.current; i++) - bf_options.ptr[i] = bf_options.crs[bf_options.state[i]]; + } + else + for (i = 0; i < bf_options.current; i++) + bf_options.ptr[i] = bf_options.crs[bf_options.state[i]]; + bf_options.ptr[bf_options.current] = 0; if (debug) { diff --git a/bfg.h b/bfg.h index 2ac5f49..132571b 100644 --- a/bfg.h +++ b/bfg.h @@ -41,6 +41,7 @@ typedef struct { char *crs; /* internal representation of charset */ char *ptr; /* ptr to the last generated password */ uint32_t disable_symbols; + unsigned long rain; } bf_option; extern bf_option bf_options; @@ -48,7 +49,7 @@ extern bf_option bf_options; #ifdef HAVE_MATH_H extern uint64_t bf_get_pcount(); extern int32_t bf_init(char *arg); -extern char *bf_next(); +extern char *bf_next(_Bool rainy); #endif #endif diff --git a/hydra.c b/hydra.c index d3f7430..6f2b497 100644 --- a/hydra.c +++ b/hydra.c @@ -337,6 +337,7 @@ char *sck = NULL; int32_t prefer_ipv6 = 0, conwait = 0, loop_cnt = 0, fck = 0, options = 0, killed = 0; int32_t child_head_no = -1, child_socket; int32_t total_redo_count = 0; +bool rainy = false; // moved for restore feature int32_t process_restore = 0, dont_unlink; @@ -482,6 +483,7 @@ void help(int32_t ext) { "[service://server[:PORT][/OPT]]\n"); PRINT_NORMAL(ext, "\nOptions:\n"); PRINT_EXTEND(ext, " -R restore a previous aborted/crashed session\n" + " -r in conjonction with -x, use rain algorythm\n" " -I ignore an existing restore file (don't wait 10 seconds)\n" #ifdef LIBOPENSSL " -S perform an SSL connect\n" @@ -1745,7 +1747,7 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { #ifndef HAVE_MATH_H sleep(1); #else - hydra_targets[target_no]->pass_ptr = bf_next(); + hydra_targets[target_no]->pass_ptr = bf_next(hydra_options.rainy); if (debug) printf("[DEBUG] bfg new password for next child: %s\n", hydra_targets[target_no]->pass_ptr); #endif @@ -2229,7 +2231,7 @@ int main(int argc, char *argv[]) { help(1); if (argc < 2) help(0); - while ((i = getopt(argc, argv, "hIq64Rde:vVl:fFg:L:p:OP:o:b:M:C:t:T:m:w:W:s:SUux:yc:K")) >= 0) { + while ((i = getopt(argc, argv, "hIq64Rrde:vVl:fFg:L:p:OP:o:b:M:C:t:T:m:w:W:s:SUux:yc:K")) >= 0) { switch (i) { case 'h': help(1); @@ -2256,6 +2258,9 @@ int main(int argc, char *argv[]) { hydra_options.restore = 1; hydra_restore_read(); break; + case 'r': + hydra_options.rainy = true; + break; case 'I': ignore_restore = 1; // this is not to be saved in hydra_options! break; @@ -3267,7 +3272,7 @@ int main(int argc, char *argv[]) { #ifdef HAVE_MATH_H if (bf_init(bf_options.arg)) exit(-1); // error description is handled by bf_init - pass_ptr = bf_next(); + pass_ptr = bf_next(hydra_options.rainy); hydra_brains.countpass += bf_get_pcount(); hydra_brains.sizepass += BF_BUFLEN; #else diff --git a/hydra.h b/hydra.h index 0d47f0f..1aa04a2 100644 --- a/hydra.h +++ b/hydra.h @@ -221,6 +221,7 @@ typedef struct { char *service; char bfg; int32_t skip_redo; + _Bool rainy; } hydra_option; #define _HYDRA_H From ed9d8f15165fe2945c4bfadc2b3f022c1a7483a5 Mon Sep 17 00:00:00 2001 From: owein Date: Mon, 7 Oct 2019 16:56:59 +0200 Subject: [PATCH 249/531] using hydra 8.8 files --- hydra.c | 8 ++++++-- hydra.h | 1 + 2 files changed, 7 insertions(+), 2 deletions(-) diff --git a/hydra.c b/hydra.c index 64d7da3..ff1b9e6 100644 --- a/hydra.c +++ b/hydra.c @@ -1708,7 +1708,7 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { #ifndef HAVE_MATH_H sleep(1); #else - hydra_targets[target_no]->pass_ptr = bf_next(); + hydra_targets[target_no]->pass_ptr = bf_next(hydra_options.rainy); if (debug) printf("[DEBUG] bfg new password for next child: %s\n", hydra_targets[target_no]->pass_ptr); #endif @@ -2172,6 +2172,7 @@ int main(int argc, char *argv[]) { hydra_brains.ofp = stdout; hydra_brains.targets = 1; hydra_options.waittime = waittime = WAITTIME; + hydra_options.rainy = false; bf_options.disable_symbols = 0; // command line processing @@ -2203,6 +2204,9 @@ int main(int argc, char *argv[]) { hydra_options.restore = 1; hydra_restore_read(); break; + case 'r': + hydra_options.rainy = true; + break; case 'I': ignore_restore = 1; // this is not to be saved in hydra_options! break; @@ -3179,7 +3183,7 @@ int main(int argc, char *argv[]) { #ifdef HAVE_MATH_H if (bf_init(bf_options.arg)) exit(-1); // error description is handled by bf_init - pass_ptr = bf_next(); + pass_ptr = bf_next(hydra_options.rainy); hydra_brains.countpass += bf_get_pcount(); hydra_brains.sizepass += BF_BUFLEN; #else diff --git a/hydra.h b/hydra.h index d1fcc60..2859de8 100644 --- a/hydra.h +++ b/hydra.h @@ -210,6 +210,7 @@ typedef struct { char *server; char *service; char bfg; + _Bool rainy; } hydra_option; #define _HYDRA_H From b09e39f98de5f4331d9a5d32ca5e72d1b2a2ada5 Mon Sep 17 00:00:00 2001 From: owein Date: Mon, 7 Oct 2019 17:02:43 +0200 Subject: [PATCH 250/531] modified bfg --- bfg.c | 30 +++++++++++++++++++++++++++--- bfg.h | 3 ++- 2 files changed, 29 insertions(+), 4 deletions(-) diff --git a/bfg.c b/bfg.c index a3a1dad..068804a 100644 --- a/bfg.c +++ b/bfg.c @@ -52,6 +52,7 @@ static int32_t add_single_char(char ch, char flags, int32_t* crs_len) { // note that we check for -x .:.:ab but not for -x .:.:ba // int32_t bf_init(char *arg) { + bf_options.rain = 0; int32_t i = 0; int32_t crs_len = 0; char flags = 0; @@ -189,8 +190,17 @@ uint64_t bf_get_pcount() { return foo; } +int accu(int value) +{ + int i = 0; + for(int a=1; a<=value; ++a) + { + i+=a+1; + } + return i; +} -char *bf_next() { +char *bf_next(_Bool rainy) { int32_t i, pos = bf_options.current - 1; if (bf_options.current > bf_options.to) @@ -201,8 +211,22 @@ char *bf_next() { return NULL; } - for (i = 0; i < bf_options.current; i++) - bf_options.ptr[i] = bf_options.crs[bf_options.state[i]]; + if(rainy) + { + for (i = 0; i < bf_options.current; i++){ + bf_options.ptr[i] = bf_options.crs[(bf_options.state[i]+bf_options.rain)%bf_options.crs_len]; + bf_options.rain += i+1; + } + if(bf_options.crs_len%10 == 0) + bf_options.rain-=accu(bf_options.current)-2; + else if(bf_options.crs_len%2 == 0) + bf_options.rain-=accu(bf_options.current)-4; + else if(bf_options.crs_len%2) + bf_options.rain-=accu(bf_options.current)-1; + } + else + for (i = 0; i < bf_options.current; i++) + bf_options.ptr[i] = bf_options.crs[bf_options.state[i]]; bf_options.ptr[bf_options.current] = 0; if (debug) { diff --git a/bfg.h b/bfg.h index 2ac5f49..c3a33e9 100644 --- a/bfg.h +++ b/bfg.h @@ -41,6 +41,7 @@ typedef struct { char *crs; /* internal representation of charset */ char *ptr; /* ptr to the last generated password */ uint32_t disable_symbols; + unsigned long rain; //accumulator for the rain// } bf_option; extern bf_option bf_options; @@ -48,7 +49,7 @@ extern bf_option bf_options; #ifdef HAVE_MATH_H extern uint64_t bf_get_pcount(); extern int32_t bf_init(char *arg); -extern char *bf_next(); +extern char *bf_next(_Bool rainy); #endif #endif From a4b4e54bd137783cf20764989127c431bea072d3 Mon Sep 17 00:00:00 2001 From: owein Date: Mon, 7 Oct 2019 17:04:44 +0200 Subject: [PATCH 251/531] option -r --- hydra.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra.c b/hydra.c index ff1b9e6..59b7c8c 100644 --- a/hydra.c +++ b/hydra.c @@ -2180,7 +2180,7 @@ int main(int argc, char *argv[]) { help(1); if (argc < 2) help(0); - while ((i = getopt(argc, argv, "hIq64Rde:vVl:fFg:L:p:OP:o:b:M:C:t:T:m:w:W:s:SUux:yc:")) >= 0) { + while ((i = getopt(argc, argv, "hIq64Rrde:vVl:fFg:L:p:OP:o:b:M:C:t:T:m:w:W:s:SUux:yc:")) >= 0) { switch (i) { case 'h': help(1); From 4b4148054925efcc1206c494138531972289b7c4 Mon Sep 17 00:00:00 2001 From: owein Date: Mon, 7 Oct 2019 17:06:32 +0200 Subject: [PATCH 252/531] option -r and help() --- hydra.c | 1 + 1 file changed, 1 insertion(+) diff --git a/hydra.c b/hydra.c index 59b7c8c..cd42144 100644 --- a/hydra.c +++ b/hydra.c @@ -475,6 +475,7 @@ void help(int32_t ext) { #ifdef HAVE_MATH_H " -x MIN:MAX:CHARSET password bruteforce generation, type \"-x -h\" to get help\n" " -y disable use of symbols in bruteforce, see above\n" + " -r rainy mode for password generation (-x)\n" #endif " -e nsr try \"n\" null password, \"s\" login as pass and/or \"r\" reversed login\n" " -u loop around users, not passwords (effective! implied with -x)\n"); From c414d9a3ab242b39dccedc49186c1aa1b8f3af7d Mon Sep 17 00:00:00 2001 From: e2002e Date: Mon, 7 Oct 2019 23:00:27 +0200 Subject: [PATCH 253/531] Update bfg.c --- bfg.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/bfg.c b/bfg.c index 068804a..2ff9f9f 100644 --- a/bfg.c +++ b/bfg.c @@ -195,7 +195,7 @@ int accu(int value) int i = 0; for(int a=1; a<=value; ++a) { - i+=a+1; + i+=a; } return i; } From 9d7ebfd3c9337d195b2e0499e379ea2cdcdacd8b Mon Sep 17 00:00:00 2001 From: e2002e Date: Tue, 15 Oct 2019 20:22:46 +0200 Subject: [PATCH 254/531] false is 0 and true 1 --- hydra.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/hydra.c b/hydra.c index cd42144..01fd321 100644 --- a/hydra.c +++ b/hydra.c @@ -2173,7 +2173,7 @@ int main(int argc, char *argv[]) { hydra_brains.ofp = stdout; hydra_brains.targets = 1; hydra_options.waittime = waittime = WAITTIME; - hydra_options.rainy = false; + hydra_options.rainy = 0; bf_options.disable_symbols = 0; // command line processing @@ -2206,7 +2206,7 @@ int main(int argc, char *argv[]) { hydra_restore_read(); break; case 'r': - hydra_options.rainy = true; + hydra_options.rainy = 1; break; case 'I': ignore_restore = 1; // this is not to be saved in hydra_options! From 217e025475582db7ee3071c01df1d1423282bd9a Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 17 Oct 2019 12:21:47 +0200 Subject: [PATCH 255/531] Update bfg.h --- bfg.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/bfg.h b/bfg.h index c3a33e9..ab2f5e4 100644 --- a/bfg.h +++ b/bfg.h @@ -41,7 +41,7 @@ typedef struct { char *crs; /* internal representation of charset */ char *ptr; /* ptr to the last generated password */ uint32_t disable_symbols; - unsigned long rain; //accumulator for the rain// + uint64_t rain; /* accumulator for the rain */ } bf_option; extern bf_option bf_options; From ab4aa36fd0014930751fe178e2efbbbf100bac24 Mon Sep 17 00:00:00 2001 From: owein Date: Sun, 20 Oct 2019 23:26:44 +0200 Subject: [PATCH 256/531] rolled back head_init for http-post-form, still an issue with the display --- hydra-http-form.c | 12 ++++-------- hydra.c | 8 ++++---- 2 files changed, 8 insertions(+), 12 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 1ac8721..65e54c3 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -1261,18 +1261,14 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { ptr++; if (*ptr != 0) *ptr++ = 0; + + cond = ptr; - if ((ptr2 = rindex(ptr, ':')) != NULL) { - cond = ptr2 + 1; - *ptr2 = 0; - } else - cond = ptr; -/* while (*ptr != 0 && (*ptr != ':' || *(ptr - 1) == '\\')) ptr++; if (*ptr != 0) *ptr++ = 0; -*/ + optional1 = ptr; if (strstr(url, "\\:") != NULL) { if ((ptr = malloc(strlen(url))) != NULL) { @@ -1314,7 +1310,7 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { success_cond = 0; } - //printf("miscptr: %s, url=%s, variables=%s, ptr=%s, optional1: %s, cond: %s (%d)\n", miscptr, url, variables, ptr, optional1, cond, success_cond); + printf("miscptr: %s, url=%s, variables=%s, ptr=%s, optional1: %s, cond: %s (%d)\n", miscptr, url, variables, ptr, optional1, cond, success_cond); /* * Parse the user-supplied options. diff --git a/hydra.c b/hydra.c index 6f2b497..7d2decc 100644 --- a/hydra.c +++ b/hydra.c @@ -337,7 +337,6 @@ char *sck = NULL; int32_t prefer_ipv6 = 0, conwait = 0, loop_cnt = 0, fck = 0, options = 0, killed = 0; int32_t child_head_no = -1, child_socket; int32_t total_redo_count = 0; -bool rainy = false; // moved for restore feature int32_t process_restore = 0, dont_unlink; @@ -483,7 +482,6 @@ void help(int32_t ext) { "[service://server[:PORT][/OPT]]\n"); PRINT_NORMAL(ext, "\nOptions:\n"); PRINT_EXTEND(ext, " -R restore a previous aborted/crashed session\n" - " -r in conjonction with -x, use rain algorythm\n" " -I ignore an existing restore file (don't wait 10 seconds)\n" #ifdef LIBOPENSSL " -S perform an SSL connect\n" @@ -495,6 +493,7 @@ void help(int32_t ext) { #ifdef HAVE_MATH_H " -x MIN:MAX:CHARSET password bruteforce generation, type \"-x -h\" to get help\n" " -y disable use of symbols in bruteforce, see above\n" + " -r rainy mode for password generation (-x)\n" #endif " -e nsr try \"n\" null password, \"s\" login as pass and/or \"r\" reversed login\n" " -u loop around users, not passwords (effective! implied with -x)\n"); @@ -2224,6 +2223,7 @@ int main(int argc, char *argv[]) { hydra_brains.ofp = stdout; hydra_brains.targets = 1; hydra_options.waittime = waittime = WAITTIME; + hydra_options.rainy = 0; bf_options.disable_symbols = 0; // command line processing @@ -2259,7 +2259,7 @@ int main(int argc, char *argv[]) { hydra_restore_read(); break; case 'r': - hydra_options.rainy = true; + hydra_options.rainy = 1; break; case 'I': ignore_restore = 1; // this is not to be saved in hydra_options! @@ -3204,7 +3204,7 @@ int main(int argc, char *argv[]) { hydra_strcasestr(hydra_options.server, ".gmail.") != NULL || hydra_strcasestr(hydra_options.server, "googlemail.") != NULL )) { - fprintf(stderr, "[WARNING] Google Mail and others have bruteforce and hydra detection and sends false positives. You are not doing anything illegal right?!\n"); + fprintf(stderr, "[WARNING] Google Mail and others have bruteforce and hydra detection and sends false positives. You are not doing anything illegal right?! If you really need to bruteforce gmail, connect to pop3s://smtp.gmail.com\n"); fprintf(stderr, "[WARNING] !read the above!\n"); sleep(5); } From 6dfd77a37d04e167a1dafbb2b2f5e21aa7dd31f8 Mon Sep 17 00:00:00 2001 From: owein Date: Mon, 21 Oct 2019 20:11:38 +0200 Subject: [PATCH 257/531] fixed http-post --- bfg.c | 16 +++++++--------- bfg.h | 2 +- hydra-http-form.c | 31 +++++++++---------------------- hydra.c | 7 +++---- 4 files changed, 20 insertions(+), 36 deletions(-) diff --git a/bfg.c b/bfg.c index a19fcfa..2ff9f9f 100644 --- a/bfg.c +++ b/bfg.c @@ -192,12 +192,12 @@ uint64_t bf_get_pcount() { int accu(int value) { - int sum = 0; - for(int i=1; i<=value; ++i) - { - sum+=i; - } - return sum; + int i = 0; + for(int a=1; a<=value; ++a) + { + i+=a; + } + return i; } char *bf_next(_Bool rainy) { @@ -210,7 +210,7 @@ char *bf_next(_Bool rainy) { fprintf(stderr, "Error: Can not allocate memory for -x data!\n"); return NULL; } - + if(rainy) { for (i = 0; i < bf_options.current; i++){ @@ -223,12 +223,10 @@ char *bf_next(_Bool rainy) { bf_options.rain-=accu(bf_options.current)-4; else if(bf_options.crs_len%2) bf_options.rain-=accu(bf_options.current)-1; - } else for (i = 0; i < bf_options.current; i++) bf_options.ptr[i] = bf_options.crs[bf_options.state[i]]; - bf_options.ptr[bf_options.current] = 0; if (debug) { diff --git a/bfg.h b/bfg.h index 132571b..ab2f5e4 100644 --- a/bfg.h +++ b/bfg.h @@ -41,7 +41,7 @@ typedef struct { char *crs; /* internal representation of charset */ char *ptr; /* ptr to the last generated password */ uint32_t disable_symbols; - unsigned long rain; + uint64_t rain; /* accumulator for the rain */ } bf_option; extern bf_option bf_options; diff --git a/hydra-http-form.c b/hydra-http-form.c index 65e54c3..04260a4 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -1250,26 +1250,13 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { webport = PORT_HTTP_SSL; sprintf(bufferurl, "%.6096s", miscptr); - url = bufferurl; - ptr = url; - while (*ptr != 0 && (*ptr != ':' || *(ptr - 1) == '\\')) - ptr++; - if (*ptr != 0) - *ptr++ = 0; - variables = ptr; - while (*ptr != 0 && (*ptr != ':' || *(ptr - 1) == '\\')) - ptr++; - if (*ptr != 0) - *ptr++ = 0; + ptr = bufferurl; + url = strtok(ptr, ":"); + variables = strtok(NULL, ":"); + cond = strtok(NULL, ":"); + optional1 = strtok(NULL, "\n"); + if(optional1 == NULL) optional1 = "";//will crash if NULL or 0, so set "" (don't know the difference...) - cond = ptr; - - while (*ptr != 0 && (*ptr != ':' || *(ptr - 1) == '\\')) - ptr++; - if (*ptr != 0) - *ptr++ = 0; - - optional1 = ptr; if (strstr(url, "\\:") != NULL) { if ((ptr = malloc(strlen(url))) != NULL) { strcpy(ptr, hydra_strrep(url, "\\:", ":")); @@ -1309,9 +1296,9 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { //by default condition is a fail success_cond = 0; } - - printf("miscptr: %s, url=%s, variables=%s, ptr=%s, optional1: %s, cond: %s (%d)\n", miscptr, url, variables, ptr, optional1, cond, success_cond); - + + fprintf(stderr, "miscptr: %s, url=%s, variables=%s, ptr=%s, optional1: %s, cond: %s (%d)\n", miscptr, url, variables, ptr, optional1, cond, success_cond); + /* * Parse the user-supplied options. * Beware of the backslashes (\)! diff --git a/hydra.c b/hydra.c index 7d2decc..a7fc7bb 100644 --- a/hydra.c +++ b/hydra.c @@ -493,7 +493,6 @@ void help(int32_t ext) { #ifdef HAVE_MATH_H " -x MIN:MAX:CHARSET password bruteforce generation, type \"-x -h\" to get help\n" " -y disable use of symbols in bruteforce, see above\n" - " -r rainy mode for password generation (-x)\n" #endif " -e nsr try \"n\" null password, \"s\" login as pass and/or \"r\" reversed login\n" " -u loop around users, not passwords (effective! implied with -x)\n"); @@ -556,6 +555,7 @@ void help_bfg() { " 'A' for uppercase letters, '1' for numbers, and for all others,\n" " just add their real representation.\n" " -y disable the use of the above letters as placeholders\n\n" + " -r use 'rain' to explode the linearity of the generation. "Examples:\n" " -x 3:5:a generate passwords from length 3 to 5 with all lowercase letters\n" " -x 5:8:A1 generate passwords from length 5 to 8 with uppercase and numbers\n" @@ -3053,7 +3053,6 @@ int main(int argc, char *argv[]) { printf("[INFO] Using HTTP Proxy: %s\n", getenv("HYDRA_PROXY_HTTP")); use_proxy = 1; } - if (strstr(hydra_options.miscptr, "\\:") != NULL) { fprintf(stderr, "[INFORMATION] escape sequence \\: detected in module option, no parameter verification is performed.\n"); } else { @@ -3075,7 +3074,7 @@ int main(int argc, char *argv[]) { fprintf(stderr, "[ERROR] Wrong syntax of optional argument: %s\n", optional1); exit(-1); } - switch (optional1[0]) { + switch (optional1[0]){ case 'C': // fall through case 'c': if (optional1[1] != '=' || optional1[2] != '/') { @@ -3204,7 +3203,7 @@ int main(int argc, char *argv[]) { hydra_strcasestr(hydra_options.server, ".gmail.") != NULL || hydra_strcasestr(hydra_options.server, "googlemail.") != NULL )) { - fprintf(stderr, "[WARNING] Google Mail and others have bruteforce and hydra detection and sends false positives. You are not doing anything illegal right?! If you really need to bruteforce gmail, connect to pop3s://smtp.gmail.com\n"); + fprintf(stderr, "[WARNING] Google Mail and others have bruteforce and hydra detection and sends false positives. You are not doing anything illegal right?!\n"); fprintf(stderr, "[WARNING] !read the above!\n"); sleep(5); } From b34655617fee2b4e043211882bac26a8a4529a16 Mon Sep 17 00:00:00 2001 From: owein Date: Mon, 21 Oct 2019 20:37:25 +0200 Subject: [PATCH 258/531] !!! I did not test the escapes in the miscptr !!! --- hydra-http-form.c | 6 +++--- hydra.c | 1 + 2 files changed, 4 insertions(+), 3 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 04260a4..e91db03 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -1255,8 +1255,8 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { variables = strtok(NULL, ":"); cond = strtok(NULL, ":"); optional1 = strtok(NULL, "\n"); - if(optional1 == NULL) optional1 = "";//will crash if NULL or 0, so set "" (don't know the difference...) - + if(optional1 == NULL) optional1 = "";//will crash if NULL or 0, so set to blank + if (strstr(url, "\\:") != NULL) { if ((ptr = malloc(strlen(url))) != NULL) { strcpy(ptr, hydra_strrep(url, "\\:", ":")); @@ -1297,7 +1297,7 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { success_cond = 0; } - fprintf(stderr, "miscptr: %s, url=%s, variables=%s, ptr=%s, optional1: %s, cond: %s (%d)\n", miscptr, url, variables, ptr, optional1, cond, success_cond); + //fprintf(stderr, "miscptr: %s, url=%s, variables=%s, ptr=%s, optional1: %s, cond: %s (%d)\n", miscptr, url, variables, ptr, optional1, cond, success_cond); /* * Parse the user-supplied options. diff --git a/hydra.c b/hydra.c index a7fc7bb..e4fa4e7 100644 --- a/hydra.c +++ b/hydra.c @@ -493,6 +493,7 @@ void help(int32_t ext) { #ifdef HAVE_MATH_H " -x MIN:MAX:CHARSET password bruteforce generation, type \"-x -h\" to get help\n" " -y disable use of symbols in bruteforce, see above\n" + " -r rainy mode for password generation (-x)\n" #endif " -e nsr try \"n\" null password, \"s\" login as pass and/or \"r\" reversed login\n" " -u loop around users, not passwords (effective! implied with -x)\n"); From efbc35eb50cb5f8231bc2669bc183a121a64cc83 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Tue, 5 Nov 2019 09:59:36 +0100 Subject: [PATCH 259/531] verbose output for rdp to identify an issue --- hydra-rdp.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/hydra-rdp.c b/hydra-rdp.c index c75e722..88599a7 100644 --- a/hydra-rdp.c +++ b/hydra-rdp.c @@ -73,6 +73,8 @@ int32_t start_rdp(char *ip, int32_t port, unsigned char options, char *miscptr, case 0x0002000c: case 0x0002000d: // cannot establish rdp connection, either the port is not opened or it's not rdp + if (verbose) + hydra_report(stderr, "[ERROR] freerdp: %s (0x%.8x)\n", freerdp_get_last_error_string(login_result), login_result); return 3; default: if (verbose) { From b8c30ef0b027be96f1dd7cd593576a80a6f03588 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 7 Nov 2019 10:05:15 +0100 Subject: [PATCH 260/531] rdp account missing permissions detection --- hydra-rdp.c | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/hydra-rdp.c b/hydra-rdp.c index 88599a7..9b15fed 100644 --- a/hydra-rdp.c +++ b/hydra-rdp.c @@ -68,13 +68,14 @@ int32_t start_rdp(char *ip, int32_t port, unsigned char options, char *miscptr, // login failure hydra_completed_pair(); break; + case 0x0002000d: + hydra_report(stderr, "[%d][rdp] account on %s might be valid but account not active for remote desktop: login: %s password: %s, continuing attacking the account.\n", port, hydra_address2string_beautiful(ip), login, pass); + hydra_completed_pair(); + break; case 0x00020006: case 0x00020008: case 0x0002000c: - case 0x0002000d: // cannot establish rdp connection, either the port is not opened or it's not rdp - if (verbose) - hydra_report(stderr, "[ERROR] freerdp: %s (0x%.8x)\n", freerdp_get_last_error_string(login_result), login_result); return 3; default: if (verbose) { From ccd3a99765a92b96ec0d1e3b0117cfdeb40d25b6 Mon Sep 17 00:00:00 2001 From: owein Date: Tue, 19 Nov 2019 16:49:54 +0100 Subject: [PATCH 261/531] rolled back the http-form parameters parsing. help for bfg's rain is in bfg's help now --- hydra-http-form.c | 23 +++++++++++++++++------ hydra.c | 5 ++--- 2 files changed, 19 insertions(+), 9 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index e91db03..c6f3a24 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -1250,12 +1250,23 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { webport = PORT_HTTP_SSL; sprintf(bufferurl, "%.6096s", miscptr); - ptr = bufferurl; - url = strtok(ptr, ":"); - variables = strtok(NULL, ":"); - cond = strtok(NULL, ":"); - optional1 = strtok(NULL, "\n"); - if(optional1 == NULL) optional1 = "";//will crash if NULL or 0, so set to blank + url = bufferurl; + ptr = url; + while (*ptr != 0 && (*ptr != ':' || *(ptr - 1) == '\\')) + ptr++; + if (*ptr != 0) + *ptr++ = 0; + variables = ptr; + while (*ptr != 0 && (*ptr != ':' || *(ptr - 1) == '\\')) + ptr++; + if (*ptr != 0) + *ptr++ = 0; + cond = ptr; + while (*ptr != 0 && (*ptr != ':' || *(ptr - 1) == '\\')) + ptr++; + if (*ptr != 0) + *ptr++ = 0; + optional1 = ptr; if (strstr(url, "\\:") != NULL) { if ((ptr = malloc(strlen(url))) != NULL) { diff --git a/hydra.c b/hydra.c index e4fa4e7..6c58f58 100644 --- a/hydra.c +++ b/hydra.c @@ -493,7 +493,6 @@ void help(int32_t ext) { #ifdef HAVE_MATH_H " -x MIN:MAX:CHARSET password bruteforce generation, type \"-x -h\" to get help\n" " -y disable use of symbols in bruteforce, see above\n" - " -r rainy mode for password generation (-x)\n" #endif " -e nsr try \"n\" null password, \"s\" login as pass and/or \"r\" reversed login\n" " -u loop around users, not passwords (effective! implied with -x)\n"); @@ -555,8 +554,8 @@ void help_bfg() { " valid CHARSET values are: 'a' for lowercase letters,\n" " 'A' for uppercase letters, '1' for numbers, and for all others,\n" " just add their real representation.\n" - " -y disable the use of the above letters as placeholders\n\n" - " -r use 'rain' to explode the linearity of the generation. + " -y disable the use of the above letters as placeholders\n" + " -r use a formula to explode the linearity of the generation, without loss.\n\n" "Examples:\n" " -x 3:5:a generate passwords from length 3 to 5 with all lowercase letters\n" " -x 5:8:A1 generate passwords from length 5 to 8 with uppercase and numbers\n" From d0c9d7ca3f84c7eaeda64bba6309fe713ee3202b Mon Sep 17 00:00:00 2001 From: van Hauser Date: Wed, 20 Nov 2019 12:13:14 +0100 Subject: [PATCH 262/531] http-form parse option fix --- hydra-http-form.c | 16 +++++++++++++++- 1 file changed, 15 insertions(+), 1 deletion(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 1ac8721..0035c2b 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -393,6 +393,9 @@ char *stringify_headers(ptr_header_node *ptr_head) { int32_t parse_options(char *miscptr, ptr_header_node *ptr_head) { char *ptr, *ptr2; + if (miscptr == NULL) + return 1; + /* * Parse the user-supplied options. * Beware of the backslashes (\)! @@ -1238,6 +1241,7 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { } else webtarget = NULL; } + if (cmdlinetarget != NULL && webtarget == NULL) webtarget = cmdlinetarget; else if (webtarget == NULL && cmdlinetarget == NULL) @@ -1252,16 +1256,19 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { sprintf(bufferurl, "%.6096s", miscptr); url = bufferurl; ptr = url; + while (*ptr != 0 && (*ptr != ':' || *(ptr - 1) == '\\')) ptr++; if (*ptr != 0) *ptr++ = 0; variables = ptr; + while (*ptr != 0 && (*ptr != ':' || *(ptr - 1) == '\\')) ptr++; if (*ptr != 0) *ptr++ = 0; + if ((ptr2 = rindex(ptr, ':')) != NULL) { cond = ptr2 + 1; *ptr2 = 0; @@ -1273,7 +1280,11 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { if (*ptr != 0) *ptr++ = 0; */ - optional1 = ptr; + if (ptr == cond) + optional1 = NULL; + else + optional1 = ptr; + if (strstr(url, "\\:") != NULL) { if ((ptr = malloc(strlen(url))) != NULL) { strcpy(ptr, hydra_strrep(url, "\\:", ":")); @@ -1292,6 +1303,9 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { cond = ptr; } } + + //printf("ptr: %s ptr2: %s cond: %s url: %s variables: %s optional1: %s\n", ptr, ptr2, cond, url, variables, optional1 == NULL ? "null" : optional1); + if (url == NULL || variables == NULL || cond == NULL /*|| optional1 == NULL */ ) hydra_child_exit(2); From db2a1feeb81c68d830f9b175e4de2607006bf1c4 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Tue, 7 Jan 2020 15:09:28 +0100 Subject: [PATCH 263/531] bump year --- Makefile.am | 2 +- README.md | 4 ++-- hydra.1 | 2 +- hydra.c | 4 ++-- 4 files changed, 6 insertions(+), 6 deletions(-) diff --git a/Makefile.am b/Makefile.am index ca82167..f238f47 100644 --- a/Makefile.am +++ b/Makefile.am @@ -1,5 +1,5 @@ # -# Makefile for Hydra - (c) 2001-2019 by van Hauser / THC +# Makefile for Hydra - (c) 2001-2020 by van Hauser / THC # OPTS=-I. -O3 -march=native -flto # -Wall -g -pedantic diff --git a/README.md b/README.md index c6a9b94..f2edcfb 100644 --- a/README.md +++ b/README.md @@ -1,7 +1,7 @@ H Y D R A - (c) 2001-2019 by van Hauser / THC + (c) 2001-2020 by van Hauser / THC https://github.com/vanhauser-thc/thc-hydra many modules were written by David (dot) Maciejak @ gmail (dot) com BFG code by Jan Dlabal @@ -379,7 +379,7 @@ Version 1.00 example: "These are very free form" ], "generator": { - "built": "2019-03-01 14:44:22", + "built": "2020-03-01 14:44:22", "commandline": "hydra -b jsonv1 -o results.json ... ...", "jsonoutputversion": "1.00", "server": "127.0.0.1", diff --git a/hydra.1 b/hydra.1 index b8033b7..912533f 100644 --- a/hydra.1 +++ b/hydra.1 @@ -1,4 +1,4 @@ -.TH "HYDRA" "1" "01/01/2019" +.TH "HYDRA" "1" "01/01/2020" .SH NAME hydra \- a very fast network logon cracker which supports many different services .SH SYNOPSIS diff --git a/hydra.c b/hydra.c index a6b052b..37e1323 100644 --- a/hydra.c +++ b/hydra.c @@ -1,5 +1,5 @@ /* - * hydra (c) 2001-2019 by van Hauser / THC + * hydra (c) 2001-2020 by van Hauser / THC * https://github.com/vanhauser-thc/thc-hydra * * Parallized network login hacker. @@ -2101,7 +2101,7 @@ int main(int argc, char *argv[]) { struct sockaddr_in6 *ipv6 = NULL; struct sockaddr_in *ipv4 = NULL; - printf("%s %s (c) 2019 by %s & %s - Please do not use in military or secret service organizations, or for illegal purposes.\n\n", PROGRAM, VERSION, AUTHOR, AUTHOR2); + printf("%s %s (c) 2020 by %s & %s - Please do not use in military or secret service organizations, or for illegal purposes.\n\n", PROGRAM, VERSION, AUTHOR, AUTHOR2); #ifndef LIBAFP SERVICES = hydra_string_replace(SERVICES, "afp ", ""); strcat(unsupported, "afp "); From 2423cbd5d5e7182bf9df53b71b087ac138268a1a Mon Sep 17 00:00:00 2001 From: Karim Kanso Date: Fri, 17 Jan 2020 14:03:29 +0000 Subject: [PATCH 264/531] smb2 module, provides linkage with libsmbclient to interface with smbv2/v3 servers. Developed against version: 2:4.7.6+dfsg~ubuntu-0ubuntu2.1 --- .gitignore | 1 + Makefile.am | 6 +- configure | 108 +++++++++++++++++- hydra-smb2.c | 304 +++++++++++++++++++++++++++++++++++++++++++++++++++ hydra.c | 34 +++++- 5 files changed, 448 insertions(+), 5 deletions(-) create mode 100644 hydra-smb2.c diff --git a/.gitignore b/.gitignore index 0a9a618..4cf0c32 100644 --- a/.gitignore +++ b/.gitignore @@ -13,3 +13,4 @@ hydra-gtk/stamp-h pw-inspector pw-inspector.exe hydra.restore +*~ diff --git a/Makefile.am b/Makefile.am index f238f47..2f15a1d 100644 --- a/Makefile.am +++ b/Makefile.am @@ -21,7 +21,8 @@ SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ hydra-oracle-sid.c hydra-http-proxy.c hydra-http-form.c hydra-irc.c \ hydra-s7-300.c hydra-redis.c hydra-adam6500.c hydra-rtsp.c \ hydra-rpcap.c hydra-radmin2.c \ - hydra-time.c crc32.c d3des.c bfg.c ntlm.c sasl.c hmacmd5.c hydra-mod.c + hydra-time.c crc32.c d3des.c bfg.c ntlm.c sasl.c hmacmd5.c hydra-mod.c \ + hydra-smb2.c OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ hydra-telnet.o hydra-cisco.o hydra-http.o hydra-ftp.o hydra-imap.o \ hydra-pop3.o hydra-smb.o hydra-icq.o hydra-cisco-enable.o hydra-ldap.o \ @@ -34,7 +35,8 @@ OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ hydra-ncp.o hydra-http-proxy.o hydra-http-form.o hydra-irc.o \ hydra-redis.o hydra-rdp.o hydra-s7-300.c hydra-adam6500.o hydra-rtsp.o \ hydra-rpcap.o hydra-radmin2.o \ - crc32.o d3des.o bfg.o ntlm.o sasl.o hmacmd5.o hydra-mod.o hydra-time.o + crc32.o d3des.o bfg.o ntlm.o sasl.o hmacmd5.o hydra-mod.o hydra-time.o \ + hydra-smb2.o BINS = hydra pw-inspector EXTRA_DIST = README README.arm README.palm CHANGES TODO INSTALL LICENSE \ diff --git a/configure b/configure index 5afd0da..9cec404 100755 --- a/configure +++ b/configure @@ -72,6 +72,8 @@ MANDIR="" XHYDRA_SUPPORT="" FREERDP2_PATH="" WINPR2_PATH="" +SMBC_PATH="" +SMBC_IPATH="" if [ '!' "X" = "X$*" ]; then while [ $# -gt 0 ] ; do @@ -1178,6 +1180,54 @@ fi BSON_IPATH="" fi +echo "Checking for smbclient (libsmbclient.so, libsmbclient.h) ..." + + for i in $LIBDIRS ; do + if [ "X" = "X$SMBC_PATH" ]; then + if [ -f "$i/libsmbclient.so" -o -f "$i/libsmbclient.dylib" -o -f "$i/libsmbclient.a" ]; then + SMBC_PATH="$i" + fi + fi + if [ "X" = "X$SMBC_PATH" ]; then + TMP_LIB=`/bin/ls $i/libsmbclient.so* 2> /dev/null | grep smbclient` + if [ -n "$TMP_LIB" ]; then + SMBC_PATH="$i" + fi + fi + if [ "X" = "X$SMBC_PATH" ]; then + TMP_LIB=`/bin/ls $i/libsmbclient.dll* 2> /dev/null | grep smbclient` + if [ -n "$TMP_LIB" ]; then + SMBC_PATH="$i" + fi + fi + done + + SMBC_IPATH= + for i in $INCDIRS ; do + if [ "X" = "X$SMBC_IPATH" ]; then + if [ -f "$i/libsmbclient.h" ]; then + SMBC_IPATH="$i" + fi + if [ -f "$i/samba-4.0/libsmbclient.h" ]; then + SMBC_IPATH="$i/samba-4.0" + fi + fi + done + + if [ "X" != "X$DEBUG" ]; then + echo DEBUG: SMBC_PATH=$SMBC_PATH/libsmbclient + echo DEBUG: SMBC_IPATH=$SMBC_IPATH/libsmbclient.h + fi + if [ -n "$SMBC_PATH" -a -n "$SMBC_IPATH" ]; then + echo " ... found" + fi + if [ "X" = "X$SMBC_PATH" -o "X" = "X$SMBC_IPATH" ]; then + echo " ... NOT found, module smb2 disabled" + SMBC_PATH="" + SMBC_IPATH="" + fi + + if [ "X" = "X$XHYDRA_SUPPORT" ]; then echo "Checking for GUI req's (pkg-config, gtk+-2.0) ..." XHYDRA_SUPPORT=`pkg-config --help > /dev/null 2>&1 || echo disabled` @@ -1271,7 +1321,29 @@ XLIBS="" XLIBPATHS="" XIPATHS="" -if [ -n "$FIREBIRD_PATH" -o -n "$PCRE_PATH" -o -n "$IDN_PATH" -o -n "$SSL_PATH" -o -n "$CRYPTO_PATH" -o -n "$NSL_PATH" -o -n "$SOCKET_PATH" -o -n "$RESOLV_PATH" -o -n "$SAPR3_PATH" -o -n "$SSH_PATH" -o -n "$POSTGRES_PATH" -o -n "$SVN_PATH" -o -n "$NCP_PATH" -o -n "$CURSES_PATH" -o -n "$ORACLE_PATH" -o -n "$AFP_PATH" -o -n "$MYSQL_PATH" -o -n "$MCACHED_PATH" -o -n "$MONGOD_PATH" -o -n "$FREERDP2_PATH" -o -n "$WINPR2_PATH" ]; then +if [ -n "$FIREBIRD_PATH" -o \ + -n "$PCRE_PATH" -o \ + -n "$IDN_PATH" -o \ + -n "$SSL_PATH" -o \ + -n "$CRYPTO_PATH" -o \ + -n "$NSL_PATH" -o \ + -n "$SOCKET_PATH" -o \ + -n "$RESOLV_PATH" -o \ + -n "$SAPR3_PATH" -o \ + -n "$SSH_PATH" -o \ + -n "$POSTGRES_PATH" -o \ + -n "$SVN_PATH" -o \ + -n "$NCP_PATH" -o \ + -n "$CURSES_PATH" -o \ + -n "$ORACLE_PATH" -o \ + -n "$AFP_PATH" -o \ + -n "$MYSQL_PATH" -o \ + -n "$MCACHED_PATH" -o \ + -n "$MONGOD_PATH" -o \ + -n "$FREERDP2_PATH" -o \ + -n "$WINPR2_PATH" -o \ + -n "$SMBC_PATH" \ + ]; then if [ "$SYSS" = "Darwin" ] && [ ! -d "/lib" ]; then #for libraries installed with MacPorts if [ -d "/opt/local/lib" ]; then @@ -1359,9 +1431,35 @@ fi if [ -n "$WINPR2_PATH" ]; then XDEFINES="$XDEFINES -DLIBWINPR2" fi +if [ -n "$SMBC_PATH" ]; then + XDEFINES="$XDEFINES -DLIBSMBCLIENT" +fi OLDPATH="" -for i in $SSL_PATH $FIREBIRD_PATH $WORACLE_LIB_PATH $PCRE_PATH $IDN_PATH $CRYPTO_PATH $SSH_PATH $NSL_PATH $SOCKET_PATH $RESOLV_PATH $SAPR3_PATH $POSTGRES_PATH $SVN_PATH $NCP_PATH $CURSES_PATH $ORACLE_PATH $AFP_PATH $MYSQL_PATH $MCACHED_PATH $MONGODB_PATH $BSON_PATH $FREERDP2_PATH $WINPR2_PATH; do +for i in $SSL_PATH \ + $FIREBIRD_PATH \ + $WORACLE_LIB_PATH \ + $PCRE_PATH \ + $IDN_PATH \ + $CRYPTO_PATH \ + $SSH_PATH \ + $NSL_PATH \ + $SOCKET_PATH \ + $RESOLV_PATH \ + $SAPR3_PATH \ + $POSTGRES_PATH \ + $SVN_PATH \ + $NCP_PATH \ + $CURSES_PATH \ + $ORACLE_PATH \ + $AFP_PATH \ + $MYSQL_PATH \ + $MCACHED_PATH \ + $MONGODB_PATH \ + $BSON_PATH \ + $FREERDP2_PATH \ + $WINPR2_PATH \ + $SMBC_PATH; do if [ "$OLDPATH" = "$i" ]; then OLDPATH="$i" else @@ -1423,6 +1521,9 @@ fi if [ -n "$FREERDP2_IPATH" ]; then XIPATHS="$XIPATHS -I$FREERDP2_IPATH -I$WINPR2_IPATH" fi +if [ -n "$SMBC_IPATH" ]; then + XIPATHS="$XIPATHS -I$SMBC_IPATH" +fi if [ -n "$HAVE_GCRYPT" ]; then XLIBS="$XLIBS -lgcrypt" fi @@ -1501,6 +1602,9 @@ fi if [ -n "$WINPR2_PATH" ]; then XLIBS="$XLIBS -lwinpr2" fi +if [ -n "$SMBC_PATH" ]; then + XLIBS="$XLIBS -lsmbclient" +fi if [ -d /usr/kerberos/include ]; then XIPATHS="$XIPATHS -I/usr/kerberos/include" fi diff --git a/hydra-smb2.c b/hydra-smb2.c new file mode 100644 index 0000000..f42f074 --- /dev/null +++ b/hydra-smb2.c @@ -0,0 +1,304 @@ +/** + * This program is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program. If not, see . + * + * + * Copyright (C) 2020 Karim Kanso, all rights reserved. + * kaz 'dot' kanso 'at' g mail 'dot' com + */ + +#if defined(LIBSMBCLIENT) + +#include "hydra-mod.h" + +#include +#include +#include +#include +#include + +extern char *HYDRA_EXIT; + +typedef struct creds { + const char* workgroup; + const char* user; + const char* pass; +} creds_t; + + +const char default_workgroup[] = "WORKGROUP"; +bool use_nt_hash = false; +const char* workgroup = default_workgroup; +const char* netbios_name = NULL; + +#define EXIT_PROTOCOL_ERROR hydra_child_exit(2) +#define EXIT_CONNECTION_ERROR hydra_child_exit(1) +#define EXIT_NORMAL hydra_child_exit(0) + +void smb2_auth_provider(SMBCCTX *c, + const char *srv, + const char *shr, + char *wg, int wglen, + char *un, int unlen, + char *pw, int pwlen) { + creds_t* cr = (creds_t*)smbc_getOptionUserData(c); + strncpy(wg, cr->workgroup, wglen); + strncpy(un, cr->user, unlen); + strncpy(pw, cr->pass, pwlen); + wg[wglen-1] = 0; + un[unlen-1] = 0; + pw[pwlen-1] = 0; +} + +bool smb2_run_test(creds_t* cr, const char* server, uint16_t port) { + SMBCCTX* ctx = smbc_new_context(); + if (ctx == NULL) { + hydra_report(stderr, "[ERROR] failed to create context\n"); + EXIT_PROTOCOL_ERROR; + } + // samba internal debugging will be dumped to stderr + smbc_setDebug(ctx, debug ? 7 : 0); + smbc_setOptionDebugToStderr(ctx, true); + smbc_setFunctionAuthDataWithContext(ctx, smb2_auth_provider); + smbc_setOptionUserData(ctx, cr); + // 0 will use default port + smbc_setPort(ctx, port); + smbc_setOptionNoAutoAnonymousLogin(ctx, false); + smbc_setOptionUseNTHash(ctx, use_nt_hash); + if (netbios_name) { + smbc_setNetbiosName(ctx, (char*)netbios_name); + } + + ctx = smbc_init_context(ctx); + if (!ctx) { + hydra_report(stderr, "[ERROR] smbc_init_context fail\n"); + smbc_free_context(ctx, 1); + EXIT_PROTOCOL_ERROR; + } + + char uri[2048]; + snprintf(uri, sizeof(uri) - 1, "smb://%s/IPC$", server); + uri[sizeof(uri)-1] = 0; + if (verbose) { + printf("[INFO] Connecting to: %s with %s\\%s%%%s\n", + uri, cr->workgroup, + cr->user, + cr->pass); + } + SMBCFILE *fd = smbc_getFunctionOpendir(ctx)(ctx, uri); + if (fd) { + hydra_report(stderr, "[WARNING] Unexpected open on IPC$\n"); + smbc_getFunctionClosedir(ctx)(ctx, fd); + smbc_free_context(ctx, 1); + fd = NULL; + return true; + } + + /* + errno is set to 22 (EINVAL) when IPC$ as been opened but can not + be opened like a normal share. This corresponds to samba error + NT_STATUS_INVALID_INFO_CLASS, however this precise error code is + not available outside of the library. Thus, instead the library + sets a generic error (EINVAL) which can also correspond to other + cases (see below test). + + This is not ideal, but appears to be the best that the + libsmbclient library offers as detailed state information is + internalised and not available. Further, it is also not possible + from the api to separate the connection, authentication and + authorisation. + + The following text is taken from the libsmbclient header file for + the return value of the smbc_getFunctionOpendir function: + + Valid directory handle. < 0 on error with errno set: + - EACCES Permission denied. + - EINVAL A NULL file/URL was passed, or the URL would + not parse, or was of incorrect form or smbc_init not + called. + - ENOENT durl does not exist, or name is an + - ENOMEM Insufficient memory to complete the + operation. + - ENOTDIR name is not a directory. + - EPERM the workgroup could not be found. + - ENODEV the workgroup or server could not be found. + + */ + switch (errno) { + case EINVAL: // 22 + // probably password ok + smbc_free_context(ctx, 1); + return true; + break; + case EACCES: + // 100% access denied + break; + case EHOSTUNREACH: + case ETIMEDOUT: + case ECONNREFUSED: + // there are probably more codes that could be added here to + // indicate connection errors. + smbc_free_context(ctx, 1); + EXIT_CONNECTION_ERROR; + break; + default: + // unexpected error + hydra_report(stderr, "[ERROR] %s (%d)\n", strerror(errno), errno); + smbc_free_context(ctx, 1); + EXIT_PROTOCOL_ERROR; + } + + smbc_free_context(ctx, 1); + return false; +} + +void service_smb2(char *ip, + int32_t sp, + unsigned char options, + char *miscptr, + FILE * fp, + int32_t port, + char *hostname) { + hydra_register_socket(sp); + while (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT))) { + char *login, *pass; + + login = hydra_get_next_login(); + pass = hydra_get_next_password(); + + creds_t cr = { + .user = login, + .pass = pass, + .workgroup = workgroup, + }; + + if (smb2_run_test(&cr, hydra_address2string(ip), port & 0xffff)) { + hydra_completed_pair_found(); + } else { + hydra_completed_pair(); + } + } + EXIT_NORMAL; +} + +// constants used by option parser +const char tkn_workgroup[] = "workgroup:{"; +const char tkn_nthash_true[] = "nthash:true"; +const char tkn_nthash_false[] = "nthash:false"; +const char tkn_netbios[] = "netbios:{"; + +#define CMP(s1, s2) (strncmp(s1, s2, sizeof(s1) - 1) == 0) + +int32_t service_smb2_init(char *ip, + int32_t sp, + unsigned char options, + char *miscptr, + FILE * fp, + int32_t port, + char *hostname) { + if (!miscptr) + return 0; + + while(*miscptr) { + if (isspace(*miscptr)) { + miscptr++; + continue; + } + if (CMP(tkn_workgroup, miscptr)) { + miscptr += sizeof(tkn_workgroup) - 1; + char* p = strchr(miscptr, '}'); + if (p == NULL) { + hydra_report(stderr, "[ERROR] missing closing brace in workgroup\n"); + return -1; + } + *p = '\0'; + workgroup = miscptr; + miscptr = p + 1; + if (verbose || debug) { + printf("[VERBOSE] Set workgroup to: %s\n", workgroup); + } + continue; + } + if (CMP(tkn_netbios, miscptr)) { + miscptr += sizeof(tkn_netbios) - 1; + char* p = strchr(miscptr, '}'); + if (p == NULL) { + hydra_report(stderr, "[ERROR] missing closing brace in netbios name\n"); + return -1; + } + *p = '\0'; + netbios_name = miscptr; + miscptr = p + 1; + if (verbose || debug) { + printf("[VERBOSE] Set netbios name to: %s\n", netbios_name); + } + continue; + } + if (CMP(tkn_nthash_true, miscptr)) { + miscptr += sizeof(tkn_nthash_true) - 1; + use_nt_hash = true; + if (verbose || debug) { + printf("[VERBOSE] Enabled nthash.\n"); + } + continue; + } + if (CMP(tkn_nthash_false, miscptr)) { + miscptr += sizeof(tkn_nthash_false) - 1; + use_nt_hash = false; + if (verbose || debug) { + printf("[VERBOSE] Disabled nthash.\n"); + } + continue; + } + + hydra_report(stderr, "[ERROR] unable to parse: %s\n", miscptr); + return -1; + } + + return 0; +} + +void usage_smb2(const char* service) { + puts("Module is a thin wrapper over the Samba client library (libsmbclient).\n" + "Thus, is capable of negotiating v1, v2 and v3 of the protocol.\n" + "\n" + "As this relies on Samba libraries, the system smb.conf will be parsed\n" + "when library starts up. It is possible to add configuration options\n" + "into that file that affect this module (such as min/max supported\n" + "protocol version).\n" + "\n" + "Caution: due to the high-level libsmbclient api (compared the smb\n" + "Hydra module), the accuracy is reduced. That is, this module works by\n" + "attempting to open the IPC$ share, which is reported as an error,\n" + "e.g. try this with the smbclient tool and it will raise the\n" + "NT_STATUS_INVALID_INFO_CLASS error). Sadly, the level of feedback\n" + "from the api does not distinguish this error from general/unknown\n" + "errors, so it might be possible to have false positives due to this\n" + "fact. One example of this is when the library can not parse the uri\n" + "correctly. On the other hand, false negatives could occur when a\n" + "valid credential is unable to open the share due to access control,\n" + "e.g. a locked/suspended account.\n" + "\n" + "There are three module options available:\n" + " workgroup:{XXX} - set the users workgroup\n" + " netbios:{XXX} - set the recipients netbios name\n" + " nthash:true or nthash:false - threat password as an nthash\n" + "\n" + "Examples: \n" + " hydra smb2://abc.com -l admin -p xxx -m workgroup:{OFFICE}\n" + " hydra smb2://1.2.3.4 -l admin -p F54F3A1D3C38140684FF4DAD029F25B5 -m 'workgroup:{OFFICE} nthash:true'\n" + " hydra -l admin -p F54F3A1D3C38140684FF4DAD029F25B5 'smb2://1.2.3.4/workgroup:{OFFICE} nthash:true'\n" + ); +} + +#endif // LIBSMBCLIENT diff --git a/hydra.c b/hydra.c index 37e1323..28365f8 100644 --- a/hydra.c +++ b/hydra.c @@ -45,6 +45,7 @@ void usage_http_proxy(const char* service); void usage_http_proxy_urlenum(const char* service); void usage_snmp(const char* service); void usage_http(const char* service); +void usage_smb2(const char* service); extern void service_asterisk(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); @@ -92,6 +93,10 @@ extern void service_rpcap(char *ip, int32_t sp, unsigned char options, char *mis // ADD NEW SERVICES HERE +#if defined(LIBSMBCLIENT) +extern int32_t service_smb2_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); +extern void service_smb2(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); +#endif #ifdef HAVE_MATH_H extern void service_mysql(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); @@ -196,7 +201,7 @@ extern int32_t service_rpcap_init(char *ip, int32_t sp, unsigned char options, c // ADD NEW SERVICES HERE char *SERVICES = - "adam6500 asterisk afp cisco cisco-enable cvs firebird ftp[s] http[s]-{head|get|post} http[s]-{get|post}-form http-proxy http-proxy-urlenum icq imap[s] irc ldap2[s] ldap3[-{cram|digest}md5][s] memcached mongodb mssql mysql ncp nntp oracle oracle-listener oracle-sid pcanywhere pcnfs pop3[s] postgres radmin2 rdp redis rexec rlogin rpcap rsh rtsp s7-300 sapr3 sip smb smtp[s] smtp-enum snmp socks5 ssh sshkey svn teamspeak telnet[s] vmauthd vnc xmpp"; + "adam6500 asterisk afp cisco cisco-enable cvs firebird ftp[s] http[s]-{head|get|post} http[s]-{get|post}-form http-proxy http-proxy-urlenum icq imap[s] irc ldap2[s] ldap3[-{cram|digest}md5][s] memcached mongodb mssql mysql ncp nntp oracle oracle-listener oracle-sid pcanywhere pcnfs pop3[s] postgres radmin2 rdp redis rexec rlogin rpcap rsh rtsp s7-300 sapr3 sip smb smb2 smtp[s] smtp-enum snmp socks5 ssh sshkey svn teamspeak telnet[s] vmauthd vnc xmpp"; #define MAXBUF 520 #define MAXLINESIZE ( ( MAXBUF / 2 ) - 4 ) @@ -437,6 +442,9 @@ SERVICE3("mongodb", mongodb), SERVICE(sip), SERVICE3("smbnt", smb), SERVICE3("smb", smb), +#endif +#if defined(LIBSMBCLIENT) + SERVICE3("smb2", smb2), #endif SERVICE3("smtp", smtp), SERVICE3("smtp-enum", smtp_enum), @@ -1288,6 +1296,7 @@ int32_t hydra_lookup_port(char *service) { {"rsh", PORT_RSH, PORT_RSH_SSL}, {"sapr3", PORT_SAPR3, PORT_SAPR3_SSL}, {"smb", PORT_SMBNT, PORT_SMBNT_SSL}, + {"smb2", PORT_SMBNT, PORT_SMBNT_SSL}, {"smbnt", PORT_SMBNT, PORT_SMBNT_SSL}, {"socks5", PORT_SOCKS5, PORT_SOCKS5_SSL}, {"ssh", PORT_SSH, PORT_SSH_SSL}, @@ -2152,6 +2161,10 @@ int main(int argc, char *argv[]) { SERVICES = hydra_string_replace(SERVICES, "svn ", ""); strcat(unsupported, "svn "); #endif +#if !defined(LIBSMBCLIENT) + SERVICES = hydra_string_replace(SERVICES, "smb2 ", ""); + strcat(unsupported, "smb2 "); +#endif #ifndef LIBOPENSSL // for ftps @@ -2801,6 +2814,25 @@ int main(int argc, char *argv[]) { bail("Compiled without OPENSSL support, module not available!"); #endif } + if (strcmp(hydra_options.service, "smb2") == 0) { +#if !defined(LIBSMBCLIENT) + bail("Compiled without LIBSMBCLIENT support, module not available!"); +#else + if (hydra_options.login != NULL && + (index(hydra_options.login, '\\') != NULL || + index(hydra_options.login, '/') != NULL)) + fprintf(stderr, + "[WARNING] potential windows domain specification found in " + "login. You must use the -m option to pass a domain.\n"); + if (hydra_options.miscptr == NULL || \ + (strlen(hydra_options.miscptr) == 0)) { + fprintf(stderr, + "[WARNING] Workgroup was not specified, using \"WORKGROUP\"\n"); + } + i = 1; +#endif + } + if (strcmp(hydra_options.service, "rdp") == 0){ #ifndef LIBFREERDP2 bail("Compiled without FREERDP2 support, module not available!"); From a6eda417514dbd86cc19ff8543fa335653061a85 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Sat, 18 Jan 2020 11:14:39 +0100 Subject: [PATCH 265/531] fixed off-by-one bug --- Makefile | 94 ++++++++++++++++++++++++++++++++++++++++++++++- hydra-http-form.c | 4 +- 2 files changed, 94 insertions(+), 4 deletions(-) diff --git a/Makefile b/Makefile index 372e67e..5ae4846 100644 --- a/Makefile +++ b/Makefile @@ -1,5 +1,95 @@ -all: - @echo Error: you must run "./configure" first +STRIP=strip +XDEFINES= -DHAVE_MYSQL_MYSQL_H -DLIBOPENSSL -DLIBNCURSES -DLIBFIREBIRD -DLIBIDN -DHAVE_PR29_H -DHAVE_PCRE -DLIBMYSQLCLIENT -DLIBPOSTGRES -DLIBSVN -DLIBSSH -DHAVE_ZLIB -DLIBMCACHED -DLIBMONGODB -DLIBBSON -DLIBFREERDP2 -DLIBWINPR2 -DHAVE_MATH_H -DHAVE_SYS_PARAM_H +XLIBS= -lz -lcurses -lssl -lfbclient -lidn -lpcre -lmysqlclient -lpq -lsvn_client-1 -lapr-1 -laprutil-1 -lsvn_subr-1 -lssh -lcrypto -lmemcached -lmongoc-1.0 -lbson-1.0 -lfreerdp2 -lwinpr2 +XLIBPATHS=-L/usr/lib -L/usr/local/lib -L/lib -L/lib/x86_64-linux-gnu +XIPATHS= -I/usr/include/mysql -I/usr/include -I/usr/include -I/usr/include -I/usr/include -I/usr/include/postgresql -I/usr/include -I/usr/include/subversion-1 -I/usr/include/apr-1.0 -I/usr/include/subversion-1 -I/usr/include/libmemcached-1.0 -I/usr/include/libmongoc-1.0 -I/usr/include/libbson-1.0 -I/usr/include/freerdp2 -I/usr/include/winpr2 +PREFIX=/usr/local +XHYDRA_SUPPORT=xhydra +STRIP=strip + +HYDRA_LOGO= +PWI_LOGO= +SEC=-pie -fPIE -fstack-protector-all --param ssp-buffer-size=4 -D_FORTIFY_SOURCE=2 -Wl,-z,now -Wl,-z,relro + +# +# Makefile for Hydra - (c) 2001-2020 by van Hauser / THC +# +OPTS=-I. -O3 -march=native -flto +# -Wall -g -pedantic +LIBS=-lm +BINDIR = /bin +MANDIR ?= /man/man1/ +DATADIR ?= /etc +DESTDIR ?= + +SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ + hydra-telnet.c hydra-cisco.c hydra-http.c hydra-ftp.c hydra-imap.c \ + hydra-pop3.c hydra-smb.c hydra-icq.c hydra-cisco-enable.c hydra-ldap.c \ + hydra-memcached.c hydra-mongodb.c hydra-mysql.c hydra-mssql.c hydra-xmpp.c \ + hydra-http-proxy-urlenum.c hydra-snmp.c hydra-cvs.c hydra-smtp.c \ + hydra-smtp-enum.c hydra-sapr3.c hydra-ssh.c hydra-sshkey.c hydra-teamspeak.c \ + hydra-postgres.c hydra-rsh.c hydra-rlogin.c hydra-oracle-listener.c \ + hydra-svn.c hydra-pcanywhere.c hydra-sip.c hydra-oracle.c hydra-vmauthd.c \ + hydra-asterisk.c hydra-firebird.c hydra-afp.c hydra-ncp.c hydra-rdp.c \ + hydra-oracle-sid.c hydra-http-proxy.c hydra-http-form.c hydra-irc.c \ + hydra-s7-300.c hydra-redis.c hydra-adam6500.c hydra-rtsp.c \ + hydra-rpcap.c hydra-radmin2.c \ + hydra-time.c crc32.c d3des.c bfg.c ntlm.c sasl.c hmacmd5.c hydra-mod.c \ + hydra-smb2.c +OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ + hydra-telnet.o hydra-cisco.o hydra-http.o hydra-ftp.o hydra-imap.o \ + hydra-pop3.o hydra-smb.o hydra-icq.o hydra-cisco-enable.o hydra-ldap.o \ + hydra-memcached.o hydra-mongodb.o hydra-mysql.o hydra-mssql.o hydra-xmpp.o \ + hydra-http-proxy-urlenum.o hydra-snmp.o hydra-cvs.o hydra-smtp.o \ + hydra-smtp-enum.o hydra-sapr3.o hydra-ssh.o hydra-sshkey.o hydra-teamspeak.o \ + hydra-postgres.o hydra-rsh.o hydra-rlogin.o hydra-oracle-listener.o \ + hydra-svn.o hydra-pcanywhere.o hydra-sip.o hydra-oracle-sid.o hydra-oracle.o \ + hydra-vmauthd.o hydra-asterisk.o hydra-firebird.o hydra-afp.o \ + hydra-ncp.o hydra-http-proxy.o hydra-http-form.o hydra-irc.o \ + hydra-redis.o hydra-rdp.o hydra-s7-300.c hydra-adam6500.o hydra-rtsp.o \ + hydra-rpcap.o hydra-radmin2.o \ + crc32.o d3des.o bfg.o ntlm.o sasl.o hmacmd5.o hydra-mod.o hydra-time.o \ + hydra-smb2.o +BINS = hydra pw-inspector + +EXTRA_DIST = README README.arm README.palm CHANGES TODO INSTALL LICENSE \ + hydra-mod.h hydra.h crc32.h d3des.h + +all: pw-inspector hydra $(XHYDRA_SUPPORT) + @echo + @echo Now type "make install" + +hydra: hydra.c $(OBJ) + $(CC) $(OPTS) $(SEC) $(LIBS) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o hydra $(HYDRA_LOGO) hydra.c $(OBJ) $(LIBS) $(XLIBS) $(XLIBPATHS) $(XIPATHS) $(XDEFINES) + @echo + @echo If men could get pregnant, abortion would be a sacrament + @echo + +xhydra: + -cd hydra-gtk && sh ./make_xhydra.sh + +pw-inspector: pw-inspector.c + -$(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o pw-inspector $(PWI_LOGO) pw-inspector.c + +.c.o: + $(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) -c $< $(XDEFINES) $(XIPATHS) + +strip: all + strip $(BINS) + -echo OK > /dev/null && test -x xhydra && strip xhydra || echo OK > /dev/null + +install: strip + -mkdir -p $(DESTDIR)$(PREFIX)$(BINDIR) + cp -f hydra-wizard.sh $(BINS) $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 hydra-wizard.sh $(BINS) + -echo OK > /dev/null && test -x xhydra && cp xhydra $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 xhydra || echo OK > /dev/null + -sed -e "s|^INSTALLDIR=.*|INSTALLDIR="$(PREFIX)"|" dpl4hydra.sh | sed -e "s|^LOCATION=.*|LOCATION="$(DATADIR)"|" > $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh + -chmod 755 $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh + -mkdir -p $(DESTDIR)$(PREFIX)$(DATADIR) + -cp -f *.csv $(DESTDIR)$(PREFIX)$(DATADIR) + -mkdir -p $(DESTDIR)$(PREFIX)$(MANDIR) + -cp -f hydra.1 xhydra.1 pw-inspector.1 $(DESTDIR)$(PREFIX)$(MANDIR) clean: + rm -rf xhydra pw-inspector hydra *.o core *.core *.stackdump *~ Makefile.in Makefile dev_rfc hydra.restore arm/*.ipk arm/ipkg/usr/bin/* hydra-gtk/src/*.o hydra-gtk/src/xhydra hydra-gtk/stamp-h hydra-gtk/config.status hydra-gtk/errors hydra-gtk/config.log hydra-gtk/src/.deps hydra-gtk/src/Makefile hydra-gtk/Makefile cp -f Makefile.orig Makefile + diff --git a/hydra-http-form.c b/hydra-http-form.c index 0035c2b..80b141a 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -1342,10 +1342,10 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { // proxy with authentication add_header(&ptr_head, "Host", webtarget, HEADER_TYPE_DEFAULT); add_header(&ptr_head, "User-Agent", "Mozilla 5.0 (Hydra Proxy Auth)", HEADER_TYPE_DEFAULT); - proxy_string = (char *) malloc(strlen(proxy_authentication[selected_proxy]) + 6); + proxy_string = (char *) malloc(strlen(proxy_authentication[selected_proxy]) + 10); if (proxy_string) { strcpy(proxy_string, "Basic "); - strncat(proxy_string, proxy_authentication[selected_proxy], strlen(proxy_authentication[selected_proxy]) - 6); + strcat(proxy_string, proxy_authentication[selected_proxy]); add_header(&ptr_head, "Proxy-Authorization", proxy_string, HEADER_TYPE_DEFAULT); } else { hydra_report(stderr, "Out of memory for \"Proxy-Authorization\" header.\n"); From da568a871aece9f1736e8af7f7adb07242bbe002 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Sat, 18 Jan 2020 11:15:11 +0100 Subject: [PATCH 266/531] in the future I will learn not to push Makefile ... --- Makefile | 94 ++------------------------------------------------------ 1 file changed, 2 insertions(+), 92 deletions(-) diff --git a/Makefile b/Makefile index 5ae4846..372e67e 100644 --- a/Makefile +++ b/Makefile @@ -1,95 +1,5 @@ -STRIP=strip -XDEFINES= -DHAVE_MYSQL_MYSQL_H -DLIBOPENSSL -DLIBNCURSES -DLIBFIREBIRD -DLIBIDN -DHAVE_PR29_H -DHAVE_PCRE -DLIBMYSQLCLIENT -DLIBPOSTGRES -DLIBSVN -DLIBSSH -DHAVE_ZLIB -DLIBMCACHED -DLIBMONGODB -DLIBBSON -DLIBFREERDP2 -DLIBWINPR2 -DHAVE_MATH_H -DHAVE_SYS_PARAM_H -XLIBS= -lz -lcurses -lssl -lfbclient -lidn -lpcre -lmysqlclient -lpq -lsvn_client-1 -lapr-1 -laprutil-1 -lsvn_subr-1 -lssh -lcrypto -lmemcached -lmongoc-1.0 -lbson-1.0 -lfreerdp2 -lwinpr2 -XLIBPATHS=-L/usr/lib -L/usr/local/lib -L/lib -L/lib/x86_64-linux-gnu -XIPATHS= -I/usr/include/mysql -I/usr/include -I/usr/include -I/usr/include -I/usr/include -I/usr/include/postgresql -I/usr/include -I/usr/include/subversion-1 -I/usr/include/apr-1.0 -I/usr/include/subversion-1 -I/usr/include/libmemcached-1.0 -I/usr/include/libmongoc-1.0 -I/usr/include/libbson-1.0 -I/usr/include/freerdp2 -I/usr/include/winpr2 -PREFIX=/usr/local -XHYDRA_SUPPORT=xhydra -STRIP=strip - -HYDRA_LOGO= -PWI_LOGO= -SEC=-pie -fPIE -fstack-protector-all --param ssp-buffer-size=4 -D_FORTIFY_SOURCE=2 -Wl,-z,now -Wl,-z,relro - -# -# Makefile for Hydra - (c) 2001-2020 by van Hauser / THC -# -OPTS=-I. -O3 -march=native -flto -# -Wall -g -pedantic -LIBS=-lm -BINDIR = /bin -MANDIR ?= /man/man1/ -DATADIR ?= /etc -DESTDIR ?= - -SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ - hydra-telnet.c hydra-cisco.c hydra-http.c hydra-ftp.c hydra-imap.c \ - hydra-pop3.c hydra-smb.c hydra-icq.c hydra-cisco-enable.c hydra-ldap.c \ - hydra-memcached.c hydra-mongodb.c hydra-mysql.c hydra-mssql.c hydra-xmpp.c \ - hydra-http-proxy-urlenum.c hydra-snmp.c hydra-cvs.c hydra-smtp.c \ - hydra-smtp-enum.c hydra-sapr3.c hydra-ssh.c hydra-sshkey.c hydra-teamspeak.c \ - hydra-postgres.c hydra-rsh.c hydra-rlogin.c hydra-oracle-listener.c \ - hydra-svn.c hydra-pcanywhere.c hydra-sip.c hydra-oracle.c hydra-vmauthd.c \ - hydra-asterisk.c hydra-firebird.c hydra-afp.c hydra-ncp.c hydra-rdp.c \ - hydra-oracle-sid.c hydra-http-proxy.c hydra-http-form.c hydra-irc.c \ - hydra-s7-300.c hydra-redis.c hydra-adam6500.c hydra-rtsp.c \ - hydra-rpcap.c hydra-radmin2.c \ - hydra-time.c crc32.c d3des.c bfg.c ntlm.c sasl.c hmacmd5.c hydra-mod.c \ - hydra-smb2.c -OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ - hydra-telnet.o hydra-cisco.o hydra-http.o hydra-ftp.o hydra-imap.o \ - hydra-pop3.o hydra-smb.o hydra-icq.o hydra-cisco-enable.o hydra-ldap.o \ - hydra-memcached.o hydra-mongodb.o hydra-mysql.o hydra-mssql.o hydra-xmpp.o \ - hydra-http-proxy-urlenum.o hydra-snmp.o hydra-cvs.o hydra-smtp.o \ - hydra-smtp-enum.o hydra-sapr3.o hydra-ssh.o hydra-sshkey.o hydra-teamspeak.o \ - hydra-postgres.o hydra-rsh.o hydra-rlogin.o hydra-oracle-listener.o \ - hydra-svn.o hydra-pcanywhere.o hydra-sip.o hydra-oracle-sid.o hydra-oracle.o \ - hydra-vmauthd.o hydra-asterisk.o hydra-firebird.o hydra-afp.o \ - hydra-ncp.o hydra-http-proxy.o hydra-http-form.o hydra-irc.o \ - hydra-redis.o hydra-rdp.o hydra-s7-300.c hydra-adam6500.o hydra-rtsp.o \ - hydra-rpcap.o hydra-radmin2.o \ - crc32.o d3des.o bfg.o ntlm.o sasl.o hmacmd5.o hydra-mod.o hydra-time.o \ - hydra-smb2.o -BINS = hydra pw-inspector - -EXTRA_DIST = README README.arm README.palm CHANGES TODO INSTALL LICENSE \ - hydra-mod.h hydra.h crc32.h d3des.h - -all: pw-inspector hydra $(XHYDRA_SUPPORT) - @echo - @echo Now type "make install" - -hydra: hydra.c $(OBJ) - $(CC) $(OPTS) $(SEC) $(LIBS) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o hydra $(HYDRA_LOGO) hydra.c $(OBJ) $(LIBS) $(XLIBS) $(XLIBPATHS) $(XIPATHS) $(XDEFINES) - @echo - @echo If men could get pregnant, abortion would be a sacrament - @echo - -xhydra: - -cd hydra-gtk && sh ./make_xhydra.sh - -pw-inspector: pw-inspector.c - -$(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o pw-inspector $(PWI_LOGO) pw-inspector.c - -.c.o: - $(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) -c $< $(XDEFINES) $(XIPATHS) - -strip: all - strip $(BINS) - -echo OK > /dev/null && test -x xhydra && strip xhydra || echo OK > /dev/null - -install: strip - -mkdir -p $(DESTDIR)$(PREFIX)$(BINDIR) - cp -f hydra-wizard.sh $(BINS) $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 hydra-wizard.sh $(BINS) - -echo OK > /dev/null && test -x xhydra && cp xhydra $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 xhydra || echo OK > /dev/null - -sed -e "s|^INSTALLDIR=.*|INSTALLDIR="$(PREFIX)"|" dpl4hydra.sh | sed -e "s|^LOCATION=.*|LOCATION="$(DATADIR)"|" > $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh - -chmod 755 $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh - -mkdir -p $(DESTDIR)$(PREFIX)$(DATADIR) - -cp -f *.csv $(DESTDIR)$(PREFIX)$(DATADIR) - -mkdir -p $(DESTDIR)$(PREFIX)$(MANDIR) - -cp -f hydra.1 xhydra.1 pw-inspector.1 $(DESTDIR)$(PREFIX)$(MANDIR) +all: + @echo Error: you must run "./configure" first clean: - rm -rf xhydra pw-inspector hydra *.o core *.core *.stackdump *~ Makefile.in Makefile dev_rfc hydra.restore arm/*.ipk arm/ipkg/usr/bin/* hydra-gtk/src/*.o hydra-gtk/src/xhydra hydra-gtk/stamp-h hydra-gtk/config.status hydra-gtk/errors hydra-gtk/config.log hydra-gtk/src/.deps hydra-gtk/src/Makefile hydra-gtk/Makefile cp -f Makefile.orig Makefile - From 69a6b4f7d76de53573da0e1909a59b7bd0878c06 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Sat, 18 Jan 2020 11:33:23 +0100 Subject: [PATCH 267/531] added changelog entry --- CHANGES | 1 + 1 file changed, 1 insertion(+) diff --git a/CHANGES b/CHANGES index d650eec..3de75a9 100644 --- a/CHANGES +++ b/CHANGES @@ -2,6 +2,7 @@ Changelog for hydra ------------------- Release 9.1-dev +* new module: smb2 which also supports smb3 (uses libsmbclient-dev) (thanks to Karim Kanso for the module!) * svn: updated to support past and new API * http module now supports F=/S= string matching conditions (thanks to poucz@github) * changed mysql module not to use mysql db as a default. if the user has not access to this db auth fails ... From f05718824d467f8b5536eb26a92b48387ee591b4 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Sat, 18 Jan 2020 11:47:36 +0100 Subject: [PATCH 268/531] make CFLAGS overridable --- Makefile.am | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-) diff --git a/Makefile.am b/Makefile.am index 2f15a1d..51a2342 100644 --- a/Makefile.am +++ b/Makefile.am @@ -1,13 +1,16 @@ # # Makefile for Hydra - (c) 2001-2020 by van Hauser / THC # -OPTS=-I. -O3 -march=native -flto +WARN_CLANG=-Wformat-nonliteral -Wstrncat-size -Wformat-security -Wsign-conversion -Wconversion -Wfloat-conversion -Wshorten-64-to-32 -Wuninitialized -Wmissing-variable-declarations -Wmissing-declarations +WARN_GCC=-Wformat=2 -Wformat-overflow=2 -Wformat-nonliteral -Wformat-truncation=2 -Wnull-dereference -Wstrict-overflow=2 -Wstringop-overflow=4 -Walloca-larger-than=4096 -Wtype-limits -Wconversion -Wtrampolines -Wstrict-prototypes -Wmissing-prototypes -Wmissing-declarations -fno-common -Wcast-align +CFLAGS ?= -march=native -flto +OPTS=-I. -O3 $(CFLAGS) # -Wall -g -pedantic LIBS=-lm -BINDIR = /bin -MANDIR ?= /man/man1/ -DATADIR ?= /etc DESTDIR ?= +BINDIR = /bin +MANDIR = /man/man1/ +DATADIR = /etc SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ hydra-telnet.c hydra-cisco.c hydra-http.c hydra-ftp.c hydra-imap.c \ From c8de75bf13d6ee57010478de8e283e2f918a0def Mon Sep 17 00:00:00 2001 From: Karim Kanso Date: Sat, 18 Jan 2020 19:27:56 +0000 Subject: [PATCH 269/531] Updated xhydra to support smb2 --- hydra-gtk/src/callbacks.c | 19 +++++++++++++++++-- hydra-gtk/src/interface.c | 28 +++++++++++++++++++++++++--- 2 files changed, 42 insertions(+), 5 deletions(-) diff --git a/hydra-gtk/src/callbacks.c b/hydra-gtk/src/callbacks.c index 5600f15..f586208 100644 --- a/hydra-gtk/src/callbacks.c +++ b/hydra-gtk/src/callbacks.c @@ -33,7 +33,7 @@ int hydra_pid = 0; char port[10]; char tasks[10]; char timeout[10]; -char smbparm[12]; +char smbparm[128]; char sapr3id[4]; char passLoginNull[4]; @@ -274,7 +274,7 @@ int hydra_get_options(char *options[]) { options[i++] = (char *) gtk_entry_get_text((GtkEntry *) widget); } else if (!strcmp(tmp, "smb")) { - memset(smbparm, 0, 12); + memset(smbparm, 0, sizeof(smbparm)); widget = lookup_widget(GTK_WIDGET(wndMain), "chkDomain"); widget2 = lookup_widget(GTK_WIDGET(wndMain), "chkLocal"); @@ -300,7 +300,22 @@ int hydra_get_options(char *options[]) { strcat(smbparm, "Hash"); } options[i++] = smbparm; + } else if (!strcmp(tmp, "smb2")) { + memset(smbparm, 0, sizeof(smbparm)); + options[i++] = "-m"; + options[i++] = smbparm; + + widget = lookup_widget(GTK_WIDGET(wndMain), "chkNTLM"); + int pth = gtk_toggle_button_get_active((GtkToggleButton *) widget); + + widget = lookup_widget(GTK_WIDGET(wndMain), "entSMB2Workgroup"); + + snprintf(smbparm, + sizeof(smbparm)-1, + "nthash:%s workgroup:{%s}", + pth ? "true" : "false", + (char *) gtk_entry_get_text((GtkEntry *) widget)); } else if (!strcmp(tmp, "sapr3")) { widget = lookup_widget(GTK_WIDGET(wndMain), "spnSAPR3"); j = gtk_spin_button_get_value_as_int((GtkSpinButton *) widget); diff --git a/hydra-gtk/src/interface.c b/hydra-gtk/src/interface.c index 6b665eb..7c002dc 100644 --- a/hydra-gtk/src/interface.c +++ b/hydra-gtk/src/interface.c @@ -171,6 +171,9 @@ GtkWidget *create_wndMain(void) { GtkWidget *btnClear; GtkWidget *label4; GtkWidget *statusbar; + GtkWidget *lblSMB2; + GtkWidget *entSMB2Workgroup; + GtkWidget *fraSMB2; GtkAccelGroup *accel_group; GtkTooltips *tooltips; @@ -273,6 +276,7 @@ GtkWidget *create_wndMain(void) { cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "sapr3"); cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "sip"); cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "smb"); + cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "smb2"); cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "smtp"); cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "snmp"); cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "socks5"); @@ -849,25 +853,42 @@ GtkWidget *create_wndMain(void) { gtk_widget_set_name(chkLocal, "chkLocal"); gtk_widget_show(chkLocal); gtk_box_pack_start(GTK_BOX(hbox2), chkLocal, TRUE, TRUE, 0); - gtk_tooltips_set_tip(tooltips, chkLocal, "Just attack local accounts", NULL); + gtk_tooltips_set_tip(tooltips, chkLocal, "Just attack local accounts (only valid for smb module)", NULL); chkDomain = gtk_check_button_new_with_mnemonic("domain accounts"); gtk_widget_set_name(chkDomain, "chkDomain"); gtk_widget_show(chkDomain); gtk_box_pack_start(GTK_BOX(hbox2), chkDomain, TRUE, TRUE, 0); - gtk_tooltips_set_tip(tooltips, chkDomain, "Attack domain and local accounts", NULL); + gtk_tooltips_set_tip(tooltips, chkDomain, "Attack domain and local accounts (only valid for smb module)", NULL); chkNTLM = gtk_check_button_new_with_mnemonic("Interpret passes as NTLM hashes"); gtk_widget_set_name(chkNTLM, "chkNTLM"); gtk_widget_show(chkNTLM); gtk_box_pack_start(GTK_BOX(hbox2), chkNTLM, FALSE, FALSE, 0); - gtk_tooltips_set_tip(tooltips, chkNTLM, "Interpret passes as NTML hashes", NULL); + gtk_tooltips_set_tip(tooltips, chkNTLM, "Interpret passes as NTML hashes (valid for both smb and smb2 modules)", NULL); label18 = gtk_label_new("SMB"); gtk_widget_set_name(label18, "label18"); gtk_widget_show(label18); gtk_frame_set_label_widget(GTK_FRAME(frame6), label18); + fraSMB2 = gtk_frame_new(NULL); + gtk_widget_set_name(fraSMB2, "fraSMB2"); + gtk_widget_show(fraSMB2); + gtk_box_pack_start(GTK_BOX(vbox4), fraSMB2, TRUE, TRUE, 0); + + entSMB2Workgroup = gtk_entry_new(); + gtk_widget_set_name(entSMB2Workgroup, "entSMB2Workgroup"); + gtk_widget_show(entSMB2Workgroup); + gtk_container_add(GTK_CONTAINER(fraSMB2), entSMB2Workgroup); + gtk_tooltips_set_tip(tooltips, entSMB2Workgroup, "Workgroup to use for SMB authentication (only valid for smb2 module)", NULL); + gtk_entry_set_text(GTK_ENTRY(entSMB2Workgroup), "WORKGROUP"); + + lblSMB2 = gtk_label_new("SMB2 Workgroup"); + gtk_widget_set_name(lblSMB2, "lblSMB2"); + gtk_widget_show(lblSMB2); + gtk_frame_set_label_widget(GTK_FRAME(fraSMB2), lblSMB2); + frame7 = gtk_frame_new(NULL); gtk_widget_set_name(frame7, "frame7"); gtk_widget_show(frame7); @@ -1164,6 +1185,7 @@ GtkWidget *create_wndMain(void) { GLADE_HOOKUP_OBJECT(wndMain, label4, "label4"); GLADE_HOOKUP_OBJECT(wndMain, statusbar, "statusbar"); GLADE_HOOKUP_OBJECT_NO_REF(wndMain, tooltips, "tooltips"); + GLADE_HOOKUP_OBJECT(wndMain, entSMB2Workgroup, "entSMB2Workgroup"); gtk_window_add_accel_group(GTK_WINDOW(wndMain), accel_group); From 35cab1e1279bc351c5f61c25b3a640887eb59f16 Mon Sep 17 00:00:00 2001 From: Jeroen Roovers Date: Sun, 26 Jan 2020 17:06:47 +0100 Subject: [PATCH 270/531] hydra-vnc: Use buf2 instead of buf in hydra_report A compiler warning told me that buf was used uninitialised here and it turned out that instead of buf2, buf was being used. It makes a lot more sense to report buf2 and that happens to fix the warning as well. --- hydra-vnc.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-vnc.c b/hydra-vnc.c index 4d9d706..95a12d8 100644 --- a/hydra-vnc.c +++ b/hydra-vnc.c @@ -75,7 +75,7 @@ int32_t start_vnc(int32_t s, char *ip, int32_t port, unsigned char options, char //supported security type switch (buf2[3]) { case 0x0: - hydra_report(stderr, "[ERROR] VNC server told us to quit %c\n", buf[3]); + hydra_report(stderr, "[ERROR] VNC server told us to quit %c\n", buf2[3]); hydra_child_exit(0); break; case 0x1: From 020137ac35af0cd130de0d06512234fac2b1af1d Mon Sep 17 00:00:00 2001 From: Jeroen Roovers Date: Sun, 26 Jan 2020 17:03:54 +0100 Subject: [PATCH 271/531] modules: Remove various unused char *buf --- hydra-irc.c | 1 - hydra-rexec.c | 1 - hydra-rlogin.c | 1 - hydra-rsh.c | 1 - hydra-rtsp.c | 1 - hydra-teamspeak.c | 1 - 6 files changed, 6 deletions(-) diff --git a/hydra-irc.c b/hydra-irc.c index f41f655..4111b86 100644 --- a/hydra-irc.c +++ b/hydra-irc.c @@ -7,7 +7,6 @@ RFC 1459: Internet Relay Chat Protocol */ extern char *HYDRA_EXIT; -char *buf; char buffer[300] = ""; int32_t myport = PORT_IRC, mysslport = PORT_IRC_SSL; diff --git a/hydra-rexec.c b/hydra-rexec.c index 5b7073a..4783bcc 100644 --- a/hydra-rexec.c +++ b/hydra-rexec.c @@ -5,7 +5,6 @@ #define COMMAND "/bin/ls /" extern char *HYDRA_EXIT; -char *buf; int32_t start_rexec(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; diff --git a/hydra-rlogin.c b/hydra-rlogin.c index 5819250..36556b5 100644 --- a/hydra-rlogin.c +++ b/hydra-rlogin.c @@ -12,7 +12,6 @@ no memleaks found on 110425 #define TERM "vt100/9600" extern char *HYDRA_EXIT; -char *buf; int32_t start_rlogin(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; diff --git a/hydra-rsh.c b/hydra-rsh.c index 67c5e5b..0ec7b2a 100644 --- a/hydra-rsh.c +++ b/hydra-rsh.c @@ -11,7 +11,6 @@ no memleaks found on 110425 */ extern char *HYDRA_EXIT; -char *buf; int32_t start_rsh(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; diff --git a/hydra-rtsp.c b/hydra-rtsp.c index 444ba0c..018f432 100644 --- a/hydra-rtsp.c +++ b/hydra-rtsp.c @@ -12,7 +12,6 @@ #include "sasl.h" extern char *HYDRA_EXIT; -char *buf; char packet[500]; char packet2[500]; diff --git a/hydra-teamspeak.c b/hydra-teamspeak.c index 3d9df94..78510e6 100644 --- a/hydra-teamspeak.c +++ b/hydra-teamspeak.c @@ -36,7 +36,6 @@ struct team_speak { extern int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec); extern char *HYDRA_EXIT; -char *buf; int32_t start_teamspeak(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { char *empty = ""; From 13934c5b19fd2e42e807b043f2e3e50253bae130 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Tue, 28 Jan 2020 11:06:44 +0100 Subject: [PATCH 272/531] gcc-10 fix --- CHANGES | 1 + Makefile.am | 2 +- 2 files changed, 2 insertions(+), 1 deletion(-) diff --git a/CHANGES b/CHANGES index 3de75a9..c3eac12 100644 --- a/CHANGES +++ b/CHANGES @@ -8,6 +8,7 @@ Release 9.1-dev * changed mysql module not to use mysql db as a default. if the user has not access to this db auth fails ... * added -K command line switch to disable redo attempts (good for mass scanning) * forgot to have the -m option in the hydra help output +* gcc-10 support and various cleanups by Jeroen Roovers, thanks! Release 9.0 diff --git a/Makefile.am b/Makefile.am index 51a2342..49e8476 100644 --- a/Makefile.am +++ b/Makefile.am @@ -4,7 +4,7 @@ WARN_CLANG=-Wformat-nonliteral -Wstrncat-size -Wformat-security -Wsign-conversion -Wconversion -Wfloat-conversion -Wshorten-64-to-32 -Wuninitialized -Wmissing-variable-declarations -Wmissing-declarations WARN_GCC=-Wformat=2 -Wformat-overflow=2 -Wformat-nonliteral -Wformat-truncation=2 -Wnull-dereference -Wstrict-overflow=2 -Wstringop-overflow=4 -Walloca-larger-than=4096 -Wtype-limits -Wconversion -Wtrampolines -Wstrict-prototypes -Wmissing-prototypes -Wmissing-declarations -fno-common -Wcast-align CFLAGS ?= -march=native -flto -OPTS=-I. -O3 $(CFLAGS) +OPTS=-I. -O3 $(CFLAGS) -fcommon # -Wall -g -pedantic LIBS=-lm DESTDIR ?= From 60c76d0c647c5de5e8d0c4a52314e0b91d35816b Mon Sep 17 00:00:00 2001 From: van Hauser Date: Wed, 29 Jan 2020 12:24:46 +0100 Subject: [PATCH 273/531] BN_zero fix --- hydra-mod.c | 13 +++++++------ 1 file changed, 7 insertions(+), 6 deletions(-) diff --git a/hydra-mod.c b/hydra-mod.c index 9e7d862..f9b1358 100644 --- a/hydra-mod.c +++ b/hydra-mod.c @@ -466,24 +466,25 @@ int32_t internal__hydra_connect(char *host, int32_t port, int32_t type, int32_t #if defined(LIBOPENSSL) && !defined(LIBRESSL_VERSION_NUMBER) RSA *ssl_temp_rsa_cb(SSL * ssl, int32_t export, int32_t keylength) { - int32_t ok = 0; + int32_t nok = 0; #if !defined(LIBRESSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L BIGNUM *n; - n = BN_new(); + if ((n = BN_new()) == NULL) + nok = 1; RSA_get0_key(rsa, (const struct bignum_st **)&n, NULL, NULL); - ok = BN_zero(n); + BN_zero(n); #else if (rsa->n == 0) - ok = 1; + nok = 1; #endif - if(ok == 0 && RSA_size(rsa)!=(keylength/8)){ // n is not zero + if (nok == 0 && RSA_size(rsa)!=(keylength/8)){ // n is not zero #if !defined(LIBRESSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L BN_free(n); #endif RSA_free(rsa); rsa = NULL; } - if (ok != 0) { // n is zero + if (nok != 0) { // n is zero #if defined(NO_RSA_LEGACY) || OPENSSL_VERSION_NUMBER >= 0x10100000L RSA *rsa = RSA_new(); BIGNUM *f4 = BN_new(); From 531ee7734b49af4c265fc358a5fb224701c3de52 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Sat, 1 Feb 2020 11:36:33 +0100 Subject: [PATCH 274/531] fix for very very old compilers --- bfg.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/bfg.c b/bfg.c index 2ff9f9f..fa741bc 100644 --- a/bfg.c +++ b/bfg.c @@ -192,8 +192,8 @@ uint64_t bf_get_pcount() { int accu(int value) { - int i = 0; - for(int a=1; a<=value; ++a) + int i = 0, a; + for (a=1; a<=value; ++a) { i+=a; } From 720bdb3f968931822874011b112e68664c1b237a Mon Sep 17 00:00:00 2001 From: van Hauser Date: Sat, 1 Feb 2020 11:47:13 +0100 Subject: [PATCH 275/531] code indent --- .clang-format | 117 ++ CHANGES | 1 + bfg.c | 85 +- bfg.h | 16 +- crc32.c | 138 +-- d3des.c | 227 +--- d3des.h | 10 +- hmacmd5.c | 25 +- hmacmd5.h | 27 +- hydra-adam6500.c | 120 +- hydra-afp.c | 60 +- hydra-asterisk.c | 41 +- hydra-cisco-enable.c | 230 ++-- hydra-cisco.c | 128 ++- hydra-cvs.c | 65 +- hydra-firebird.c | 40 +- hydra-ftp.c | 35 +- hydra-gtk/src/callbacks.c | 222 ++-- hydra-gtk/src/callbacks.h | 26 +- hydra-gtk/src/interface.c | 226 ++-- hydra-gtk/src/main.c | 11 +- hydra-gtk/src/support.c | 29 +- hydra-gtk/src/support.h | 13 +- hydra-http-form.c | 329 +++--- hydra-http-proxy-urlenum.c | 130 ++- hydra-http-proxy.c | 135 +-- hydra-http.c | 435 ++++---- hydra-http.h | 12 +- hydra-icq.c | 54 +- hydra-imap.c | 428 ++++--- hydra-irc.c | 50 +- hydra-ldap.c | 118 +- hydra-memcached.c | 43 +- hydra-mod.c | 456 ++++---- hydra-mod.h | 14 +- hydra-mongodb.c | 61 +- hydra-mssql.c | 104 +- hydra-mysql.c | 109 +- hydra-ncp.c | 68 +- hydra-nntp.c | 259 +++-- hydra-oracle-listener.c | 64 +- hydra-oracle-sid.c | 44 +- hydra-oracle.c | 79 +- hydra-pcanywhere.c | 26 +- hydra-pcnfs.c | 77 +- hydra-pop3.c | 469 ++++---- hydra-postgres.c | 34 +- hydra-radmin2.c | 323 +++--- hydra-rdp.c | 89 +- hydra-redis.c | 65 +- hydra-rexec.c | 57 +- hydra-rlogin.c | 64 +- hydra-rpcap.c | 32 +- hydra-rsh.c | 62 +- hydra-rtsp.c | 43 +- hydra-s7-300.c | 59 +- hydra-sapr3.c | 64 +- hydra-sip.c | 72 +- hydra-smb.c | 941 ++++++++-------- hydra-smb2.c | 88 +- hydra-smtp-enum.c | 66 +- hydra-smtp.c | 231 ++-- hydra-snmp.c | 223 ++-- hydra-socks5.c | 38 +- hydra-ssh.c | 47 +- hydra-sshkey.c | 26 +- hydra-svn.c | 76 +- hydra-teamspeak.c | 38 +- hydra-telnet.c | 43 +- hydra-time.c | 29 +- hydra-vmauthd.c | 47 +- hydra-vnc.c | 71 +- hydra-xmpp.c | 308 +++--- hydra.c | 2143 +++++++++++++++++++----------------- hydra.h | 266 +++-- libpq-fe.h | 436 ++++---- ntlm.c | 707 ++++++------ ntlm.h | 99 +- performance.h | 20 +- postgres_ext.h | 31 +- pw-inspector.c | 47 +- sasl.c | 165 +-- sasl.h | 11 +- 83 files changed, 6377 insertions(+), 6240 deletions(-) create mode 100644 .clang-format diff --git a/.clang-format b/.clang-format new file mode 100644 index 0000000..87040ec --- /dev/null +++ b/.clang-format @@ -0,0 +1,117 @@ +--- +Language: Cpp +AccessModifierOffset: -2 +AlignAfterOpenBracket: Align +AlignConsecutiveAssignments: false +AlignConsecutiveDeclarations: false +AlignEscapedNewlines: Right +AlignOperands: true +AlignTrailingComments: true +AllowAllParametersOfDeclarationOnNextLine: true +AllowShortBlocksOnASingleLine: false +AllowShortCaseLabelsOnASingleLine: false +AllowShortFunctionsOnASingleLine: All +AllowShortIfStatementsOnASingleLine: false +AllowShortLoopsOnASingleLine: false +AlwaysBreakAfterDefinitionReturnType: None +AlwaysBreakAfterReturnType: None +AlwaysBreakBeforeMultilineStrings: false +AlwaysBreakTemplateDeclarations: false +BinPackArguments: true +BinPackParameters: true +BraceWrapping: + AfterClass: false + AfterControlStatement: false + AfterEnum: false + AfterFunction: false + AfterNamespace: false + AfterObjCDeclaration: false + AfterStruct: false + AfterUnion: false + AfterExternBlock: false + BeforeCatch: false + BeforeElse: false + IndentBraces: false + SplitEmptyFunction: true + SplitEmptyRecord: true + SplitEmptyNamespace: true +BreakBeforeBinaryOperators: None +BreakBeforeBraces: Attach +BreakBeforeInheritanceComma: false +BreakInheritanceList: BeforeColon +BreakBeforeTernaryOperators: true +BreakConstructorInitializersBeforeComma: false +BreakConstructorInitializers: BeforeColon +BreakAfterJavaFieldAnnotations: false +BreakStringLiterals: true +ColumnLimit: 512 +CommentPragmas: '^ IWYU pragma:' +CompactNamespaces: true +ConstructorInitializerAllOnOneLineOrOnePerLine: false +ConstructorInitializerIndentWidth: 4 +ContinuationIndentWidth: 4 +Cpp11BracedListStyle: true +DerivePointerAlignment: false +DisableFormat: false +ExperimentalAutoDetectBinPacking: false +FixNamespaceComments: true +ForEachMacros: + - foreach + - Q_FOREACH + - BOOST_FOREACH +IncludeBlocks: Preserve +IncludeCategories: + - Regex: '^"(llvm|llvm-c|clang|clang-c)/' + Priority: 2 + - Regex: '^(<|"(gtest|gmock|isl|json)/)' + Priority: 3 + - Regex: '.*' + Priority: 1 +IncludeIsMainRegex: '(Test)?$' +IndentCaseLabels: false +IndentPPDirectives: None +IndentWidth: 2 +IndentWrappedFunctionNames: false +JavaScriptQuotes: Leave +JavaScriptWrapImports: true +KeepEmptyLinesAtTheStartOfBlocks: false +MacroBlockBegin: '' +MacroBlockEnd: '' +MaxEmptyLinesToKeep: 1 +NamespaceIndentation: None +ObjCBinPackProtocolList: Auto +ObjCBlockIndentWidth: 2 +ObjCSpaceAfterProperty: false +ObjCSpaceBeforeProtocolList: true +PenaltyBreakAssignment: 2 +PenaltyBreakBeforeFirstCallParameter: 19 +PenaltyBreakComment: 300 +PenaltyBreakFirstLessLess: 120 +PenaltyBreakString: 1000 +PenaltyBreakTemplateDeclaration: 10 +PenaltyExcessCharacter: 1000000 +PenaltyReturnTypeOnItsOwnLine: 60 +PointerAlignment: Right +ReflowComments: true +SortIncludes: true +SortUsingDeclarations: true +SpaceAfterCStyleCast: false +SpaceAfterTemplateKeyword: true +SpaceBeforeAssignmentOperators: true +SpaceBeforeCpp11BracedList: false +SpaceBeforeCtorInitializerColon: true +SpaceBeforeInheritanceColon: true +SpaceBeforeParens: ControlStatements +SpaceBeforeRangeBasedForLoopColon: true +SpaceInEmptyParentheses: false +SpacesBeforeTrailingComments: 1 +SpacesInAngles: false +SpacesInContainerLiterals: true +SpacesInCStyleCastParentheses: false +SpacesInParentheses: false +SpacesInSquareBrackets: false +Standard: Cpp11 +TabWidth: 2 +UseTab: Never +... + diff --git a/CHANGES b/CHANGES index c3eac12..3979a1d 100644 --- a/CHANGES +++ b/CHANGES @@ -9,6 +9,7 @@ Release 9.1-dev * added -K command line switch to disable redo attempts (good for mass scanning) * forgot to have the -m option in the hydra help output * gcc-10 support and various cleanups by Jeroen Roovers, thanks! +* added .clang-format and formatted all code Release 9.0 diff --git a/bfg.c b/bfg.c index fa741bc..3479268 100644 --- a/bfg.c +++ b/bfg.c @@ -1,17 +1,18 @@ -/* code original by Jan Dlabal , partially rewritten by vh */ +/* code original by Jan Dlabal , partially rewritten by vh + */ +#include +#include #include #include #include -#include -#include #ifdef __sun - #include +#include #elif defined(__FreeBSD__) || defined(__IBMCPP__) || defined(_AIX) - #include +#include #else - #include +#include #endif #include "bfg.h" @@ -21,20 +22,26 @@ bf_option bf_options; extern int32_t debug; -static int32_t add_single_char(char ch, char flags, int32_t* crs_len) { +static int32_t add_single_char(char ch, char flags, int32_t *crs_len) { if ((ch >= '2' && ch <= '9') || ch == '0') { if ((flags & BF_NUMS) > 0) { - printf("[ERROR] character %c defined in -x although the whole number range was already defined by '1', ignored\n", ch); + printf("[ERROR] character %c defined in -x although the whole number " + "range was already defined by '1', ignored\n", + ch); return 0; } - //printf("[WARNING] adding character %c for -x, note that '1' will add all numbers from 0-9\n", ch); + // printf("[WARNING] adding character %c for -x, note that '1' will add all + // numbers from 0-9\n", ch); } - if (tolower((int32_t) ch) >= 'b' && tolower((int32_t) ch) <= 'z') { + if (tolower((int32_t)ch) >= 'b' && tolower((int32_t)ch) <= 'z') { if ((ch <= 'Z' && (flags & BF_UPPER) > 0) || (ch > 'Z' && (flags & BF_UPPER) > 0)) { - printf("[ERROR] character %c defined in -x although the whole letter range was already defined by '%c', ignored\n", ch, ch <= 'Z' ? 'A' : 'a'); + printf("[ERROR] character %c defined in -x although the whole letter " + "range was already defined by '%c', ignored\n", + ch, ch <= 'Z' ? 'A' : 'a'); return 0; } - //printf("[WARNING] adding character %c for -x, note that '%c' will add all %scase letters\n", ch, ch <= 'Z' ? 'A' : 'a', ch <= 'Z' ? "up" : "low"); + // printf("[WARNING] adding character %c for -x, note that '%c' will add all + // %scase letters\n", ch, ch <= 'Z' ? 'A' : 'a', ch <= 'Z' ? "up" : "low"); } (*crs_len)++; if (BF_CHARSMAX - *crs_len < 1) { @@ -66,7 +73,8 @@ int32_t bf_init(char *arg) { } bf_options.from = atoi(arg); if (bf_options.from < 1 || bf_options.from > 127) { - fprintf(stderr, "Error: minimum length must be between 1 and 127, format: -x min:max:types\n"); + fprintf(stderr, "Error: minimum length must be between 1 and 127, format: " + "-x min:max:types\n"); return 1; } arg = tmp + 1; @@ -86,7 +94,8 @@ int32_t bf_init(char *arg) { tmp++; if (bf_options.from > bf_options.to) { - fprintf(stderr, "Error: you specified a minimum length higher than the maximum length!\n"); + fprintf(stderr, "Error: you specified a minimum length higher than the " + "maximum length!\n"); return 1; } @@ -166,23 +175,23 @@ int32_t bf_init(char *arg) { bf_options.crs_len = crs_len; bf_options.current = bf_options.from; - memset((char *) bf_options.state, 0, sizeof(bf_options.state)); + memset((char *)bf_options.state, 0, sizeof(bf_options.state)); if (debug) printf("[DEBUG] bfg INIT: from %u, to %u, len: %u, set: %s\n", bf_options.from, bf_options.to, bf_options.crs_len, bf_options.crs); return 0; } - uint64_t bf_get_pcount() { int32_t i; double count = 0; uint64_t foo; for (i = bf_options.from; i <= bf_options.to; i++) - count += (pow((double) bf_options.crs_len, (double) i)); + count += (pow((double)bf_options.crs_len, (double)i)); if (count >= 0xffffffff) { - fprintf(stderr, "\n[ERROR] definition for password bruteforce (-x) generates more than 4 billion passwords\n"); + fprintf(stderr, "\n[ERROR] definition for password bruteforce (-x) " + "generates more than 4 billion passwords\n"); exit(-1); } @@ -190,12 +199,10 @@ uint64_t bf_get_pcount() { return foo; } -int accu(int value) -{ +int accu(int value) { int i = 0, a; - for (a=1; a<=value; ++a) - { - i+=a; + for (a = 1; a <= value; ++a) { + i += a; } return i; } @@ -204,29 +211,27 @@ char *bf_next(_Bool rainy) { int32_t i, pos = bf_options.current - 1; if (bf_options.current > bf_options.to) - return NULL; // we are done + return NULL; // we are done if ((bf_options.ptr = malloc(BF_CHARSMAX)) == NULL) { fprintf(stderr, "Error: Can not allocate memory for -x data!\n"); return NULL; } - if(rainy) - { - for (i = 0; i < bf_options.current; i++){ - bf_options.ptr[i] = bf_options.crs[(bf_options.state[i]+bf_options.rain)%bf_options.crs_len]; - bf_options.rain += i+1; - } - if(bf_options.crs_len%10 == 0) - bf_options.rain-=accu(bf_options.current)-2; - else if(bf_options.crs_len%2 == 0) - bf_options.rain-=accu(bf_options.current)-4; - else if(bf_options.crs_len%2) - bf_options.rain-=accu(bf_options.current)-1; - } - else + if (rainy) { + for (i = 0; i < bf_options.current; i++) { + bf_options.ptr[i] = bf_options.crs[(bf_options.state[i] + bf_options.rain) % bf_options.crs_len]; + bf_options.rain += i + 1; + } + if (bf_options.crs_len % 10 == 0) + bf_options.rain -= accu(bf_options.current) - 2; + else if (bf_options.crs_len % 2 == 0) + bf_options.rain -= accu(bf_options.current) - 4; + else if (bf_options.crs_len % 2) + bf_options.rain -= accu(bf_options.current) - 1; + } else for (i = 0; i < bf_options.current; i++) - bf_options.ptr[i] = bf_options.crs[bf_options.state[i]]; + bf_options.ptr[i] = bf_options.crs[bf_options.state[i]]; bf_options.ptr[bf_options.current] = 0; if (debug) { @@ -243,7 +248,7 @@ char *bf_next(_Bool rainy) { if (pos < 0) { bf_options.current++; - memset((char *) bf_options.state, 0, sizeof(bf_options.state)); + memset((char *)bf_options.state, 0, sizeof(bf_options.state)); } return bf_options.ptr; diff --git a/bfg.h b/bfg.h index ab2f5e4..a3c36bb 100644 --- a/bfg.h +++ b/bfg.h @@ -24,7 +24,9 @@ #define BF_WEBSITE "http://houbysoft.com/bfg/" #define BF_BUFLEN 1024 -#define BF_CHARSMAX 256 /* how many max possibilities there are for characters, normally it's 2^8 = 256 */ +#define BF_CHARSMAX \ + 256 /* how many max possibilities there are for characters, normally it's \ + 2^8 = 256 */ #define BF_LOWER 1 #define BF_UPPER 2 @@ -35,13 +37,13 @@ typedef struct { unsigned char to; unsigned char current; unsigned char state[BF_CHARSMAX]; /* which position has which character */ - unsigned char pos; /* where in current string length is the position */ - unsigned char crs_len; /* length of selected charset */ - char *arg; /* argument received for bfg commandline option */ - char *crs; /* internal representation of charset */ - char *ptr; /* ptr to the last generated password */ + unsigned char pos; /* where in current string length is the position */ + unsigned char crs_len; /* length of selected charset */ + char *arg; /* argument received for bfg commandline option */ + char *crs; /* internal representation of charset */ + char *ptr; /* ptr to the last generated password */ uint32_t disable_symbols; - uint64_t rain; /* accumulator for the rain */ + uint64_t rain; /* accumulator for the rain */ } bf_option; extern bf_option bf_options; diff --git a/crc32.c b/crc32.c index 364cfa4..ee9839b 100644 --- a/crc32.c +++ b/crc32.c @@ -1,99 +1,61 @@ /*- -* COPYRIGHT (C) 1986 Gary S. Brown. You may use this program, or -* code or tables extracted from it, as desired without restriction. -* -* First, the polynomial itself and its table of feedback terms. The -* polynomial is -* X^32+X^26+X^23+X^22+X^16+X^12+X^11+X^10+X^8+X^7+X^5+X^4+X^2+X^1+X^0 -* -* Note that we take it "backwards" and put the highest-order term in -* the lowest-order bit. The X^32 term is "implied"; the LSB is the -* X^31 term, etc. The X^0 term (usually shown as "+1") results in -* the MSB being 1 -* -* Note that the usual hardware shift register implementation, which -* is what we're using (we're merely optimizing it by doing eight-bit -* chunks at a time) shifts bits into the lowest-order term. In our -* implementation, that means shifting towards the right. Why do we -* do it this way? Because the calculated CRC must be transmitted in -* order from highest-order term to lowest-order term. UARTs transmit -* characters in order from LSB to MSB. By storing the CRC this way -* we hand it to the UART in the order low-byte to high-byte; the UART -* sends each low-bit to hight-bit; and the result is transmission bit -* by bit from highest- to lowest-order term without requiring any bit -* shuffling on our part. Reception works similarly -* -* The feedback terms table consists of 256, 32-bit entries. Notes -* -* The table can be generated at runtime if desired; code to do so -* is shown later. It might not be obvious, but the feedback -* terms simply represent the results of eight shift/xor opera -* tions for all combinations of data and CRC register values -* -* The values must be right-shifted by eight bits by the "updcrc -* logic; the shift must be unsigned (bring in zeroes). On some -* hardware you could probably optimize the shift in assembler by -* using byte-swap instructions -* polynomial $edb88320 -* -* -* CRC32 code derived from work by Gary S. Brown. -*/ + * COPYRIGHT (C) 1986 Gary S. Brown. You may use this program, or + * code or tables extracted from it, as desired without restriction. + * + * First, the polynomial itself and its table of feedback terms. The + * polynomial is + * X^32+X^26+X^23+X^22+X^16+X^12+X^11+X^10+X^8+X^7+X^5+X^4+X^2+X^1+X^0 + * + * Note that we take it "backwards" and put the highest-order term in + * the lowest-order bit. The X^32 term is "implied"; the LSB is the + * X^31 term, etc. The X^0 term (usually shown as "+1") results in + * the MSB being 1 + * + * Note that the usual hardware shift register implementation, which + * is what we're using (we're merely optimizing it by doing eight-bit + * chunks at a time) shifts bits into the lowest-order term. In our + * implementation, that means shifting towards the right. Why do we + * do it this way? Because the calculated CRC must be transmitted in + * order from highest-order term to lowest-order term. UARTs transmit + * characters in order from LSB to MSB. By storing the CRC this way + * we hand it to the UART in the order low-byte to high-byte; the UART + * sends each low-bit to hight-bit; and the result is transmission bit + * by bit from highest- to lowest-order term without requiring any bit + * shuffling on our part. Reception works similarly + * + * The feedback terms table consists of 256, 32-bit entries. Notes + * + * The table can be generated at runtime if desired; code to do so + * is shown later. It might not be obvious, but the feedback + * terms simply represent the results of eight shift/xor opera + * tions for all combinations of data and CRC register values + * + * The values must be right-shifted by eight bits by the "updcrc + * logic; the shift must be unsigned (bring in zeroes). On some + * hardware you could probably optimize the shift in assembler by + * using byte-swap instructions + * polynomial $edb88320 + * + * + * CRC32 code derived from work by Gary S. Brown. + */ #include #ifdef __sun - #include +#include #elif defined(__FreeBSD__) || defined(__IBMCPP__) || defined(_AIX) - #include +#include #else - #include +#include #endif -uint32_t crc32_tab[] = { - 0x00000000, 0x77073096, 0xee0e612c, 0x990951ba, 0x076dc419, 0x706af48f, - 0xe963a535, 0x9e6495a3, 0x0edb8832, 0x79dcb8a4, 0xe0d5e91e, 0x97d2d988, - 0x09b64c2b, 0x7eb17cbd, 0xe7b82d07, 0x90bf1d91, 0x1db71064, 0x6ab020f2, - 0xf3b97148, 0x84be41de, 0x1adad47d, 0x6ddde4eb, 0xf4d4b551, 0x83d385c7, - 0x136c9856, 0x646ba8c0, 0xfd62f97a, 0x8a65c9ec, 0x14015c4f, 0x63066cd9, - 0xfa0f3d63, 0x8d080df5, 0x3b6e20c8, 0x4c69105e, 0xd56041e4, 0xa2677172, - 0x3c03e4d1, 0x4b04d447, 0xd20d85fd, 0xa50ab56b, 0x35b5a8fa, 0x42b2986c, - 0xdbbbc9d6, 0xacbcf940, 0x32d86ce3, 0x45df5c75, 0xdcd60dcf, 0xabd13d59, - 0x26d930ac, 0x51de003a, 0xc8d75180, 0xbfd06116, 0x21b4f4b5, 0x56b3c423, - 0xcfba9599, 0xb8bda50f, 0x2802b89e, 0x5f058808, 0xc60cd9b2, 0xb10be924, - 0x2f6f7c87, 0x58684c11, 0xc1611dab, 0xb6662d3d, 0x76dc4190, 0x01db7106, - 0x98d220bc, 0xefd5102a, 0x71b18589, 0x06b6b51f, 0x9fbfe4a5, 0xe8b8d433, - 0x7807c9a2, 0x0f00f934, 0x9609a88e, 0xe10e9818, 0x7f6a0dbb, 0x086d3d2d, - 0x91646c97, 0xe6635c01, 0x6b6b51f4, 0x1c6c6162, 0x856530d8, 0xf262004e, - 0x6c0695ed, 0x1b01a57b, 0x8208f4c1, 0xf50fc457, 0x65b0d9c6, 0x12b7e950, - 0x8bbeb8ea, 0xfcb9887c, 0x62dd1ddf, 0x15da2d49, 0x8cd37cf3, 0xfbd44c65, - 0x4db26158, 0x3ab551ce, 0xa3bc0074, 0xd4bb30e2, 0x4adfa541, 0x3dd895d7, - 0xa4d1c46d, 0xd3d6f4fb, 0x4369e96a, 0x346ed9fc, 0xad678846, 0xda60b8d0, - 0x44042d73, 0x33031de5, 0xaa0a4c5f, 0xdd0d7cc9, 0x5005713c, 0x270241aa, - 0xbe0b1010, 0xc90c2086, 0x5768b525, 0x206f85b3, 0xb966d409, 0xce61e49f, - 0x5edef90e, 0x29d9c998, 0xb0d09822, 0xc7d7a8b4, 0x59b33d17, 0x2eb40d81, - 0xb7bd5c3b, 0xc0ba6cad, 0xedb88320, 0x9abfb3b6, 0x03b6e20c, 0x74b1d29a, - 0xead54739, 0x9dd277af, 0x04db2615, 0x73dc1683, 0xe3630b12, 0x94643b84, - 0x0d6d6a3e, 0x7a6a5aa8, 0xe40ecf0b, 0x9309ff9d, 0x0a00ae27, 0x7d079eb1, - 0xf00f9344, 0x8708a3d2, 0x1e01f268, 0x6906c2fe, 0xf762575d, 0x806567cb, - 0x196c3671, 0x6e6b06e7, 0xfed41b76, 0x89d32be0, 0x10da7a5a, 0x67dd4acc, - 0xf9b9df6f, 0x8ebeeff9, 0x17b7be43, 0x60b08ed5, 0xd6d6a3e8, 0xa1d1937e, - 0x38d8c2c4, 0x4fdff252, 0xd1bb67f1, 0xa6bc5767, 0x3fb506dd, 0x48b2364b, - 0xd80d2bda, 0xaf0a1b4c, 0x36034af6, 0x41047a60, 0xdf60efc3, 0xa867df55, - 0x316e8eef, 0x4669be79, 0xcb61b38c, 0xbc66831a, 0x256fd2a0, 0x5268e236, - 0xcc0c7795, 0xbb0b4703, 0x220216b9, 0x5505262f, 0xc5ba3bbe, 0xb2bd0b28, - 0x2bb45a92, 0x5cb36a04, 0xc2d7ffa7, 0xb5d0cf31, 0x2cd99e8b, 0x5bdeae1d, - 0x9b64c2b0, 0xec63f226, 0x756aa39c, 0x026d930a, 0x9c0906a9, 0xeb0e363f, - 0x72076785, 0x05005713, 0x95bf4a82, 0xe2b87a14, 0x7bb12bae, 0x0cb61b38, - 0x92d28e9b, 0xe5d5be0d, 0x7cdcefb7, 0x0bdbdf21, 0x86d3d2d4, 0xf1d4e242, - 0x68ddb3f8, 0x1fda836e, 0x81be16cd, 0xf6b9265b, 0x6fb077e1, 0x18b74777, - 0x88085ae6, 0xff0f6a70, 0x66063bca, 0x11010b5c, 0x8f659eff, 0xf862ae69, - 0x616bffd3, 0x166ccf45, 0xa00ae278, 0xd70dd2ee, 0x4e048354, 0x3903b3c2, - 0xa7672661, 0xd06016f7, 0x4969474d, 0x3e6e77db, 0xaed16a4a, 0xd9d65adc, - 0x40df0b66, 0x37d83bf0, 0xa9bcae53, 0xdebb9ec5, 0x47b2cf7f, 0x30b5ffe9, - 0xbdbdf21c, 0xcabac28a, 0x53b39330, 0x24b4a3a6, 0xbad03605, 0xcdd70693, - 0x54de5729, 0x23d967bf, 0xb3667a2e, 0xc4614ab8, 0x5d681b02, 0x2a6f2b94, - 0xb40bbe37, 0xc30c8ea1, 0x5a05df1b, 0x2d02ef8d -}; +uint32_t crc32_tab[] = {0x00000000, 0x77073096, 0xee0e612c, 0x990951ba, 0x076dc419, 0x706af48f, 0xe963a535, 0x9e6495a3, 0x0edb8832, 0x79dcb8a4, 0xe0d5e91e, 0x97d2d988, 0x09b64c2b, 0x7eb17cbd, 0xe7b82d07, 0x90bf1d91, 0x1db71064, 0x6ab020f2, 0xf3b97148, 0x84be41de, 0x1adad47d, 0x6ddde4eb, 0xf4d4b551, 0x83d385c7, 0x136c9856, 0x646ba8c0, 0xfd62f97a, 0x8a65c9ec, 0x14015c4f, 0x63066cd9, 0xfa0f3d63, 0x8d080df5, 0x3b6e20c8, 0x4c69105e, 0xd56041e4, 0xa2677172, 0x3c03e4d1, + 0x4b04d447, 0xd20d85fd, 0xa50ab56b, 0x35b5a8fa, 0x42b2986c, 0xdbbbc9d6, 0xacbcf940, 0x32d86ce3, 0x45df5c75, 0xdcd60dcf, 0xabd13d59, 0x26d930ac, 0x51de003a, 0xc8d75180, 0xbfd06116, 0x21b4f4b5, 0x56b3c423, 0xcfba9599, 0xb8bda50f, 0x2802b89e, 0x5f058808, 0xc60cd9b2, 0xb10be924, 0x2f6f7c87, 0x58684c11, 0xc1611dab, 0xb6662d3d, 0x76dc4190, 0x01db7106, 0x98d220bc, 0xefd5102a, 0x71b18589, 0x06b6b51f, 0x9fbfe4a5, 0xe8b8d433, 0x7807c9a2, 0x0f00f934, + 0x9609a88e, 0xe10e9818, 0x7f6a0dbb, 0x086d3d2d, 0x91646c97, 0xe6635c01, 0x6b6b51f4, 0x1c6c6162, 0x856530d8, 0xf262004e, 0x6c0695ed, 0x1b01a57b, 0x8208f4c1, 0xf50fc457, 0x65b0d9c6, 0x12b7e950, 0x8bbeb8ea, 0xfcb9887c, 0x62dd1ddf, 0x15da2d49, 0x8cd37cf3, 0xfbd44c65, 0x4db26158, 0x3ab551ce, 0xa3bc0074, 0xd4bb30e2, 0x4adfa541, 0x3dd895d7, 0xa4d1c46d, 0xd3d6f4fb, 0x4369e96a, 0x346ed9fc, 0xad678846, 0xda60b8d0, 0x44042d73, 0x33031de5, 0xaa0a4c5f, + 0xdd0d7cc9, 0x5005713c, 0x270241aa, 0xbe0b1010, 0xc90c2086, 0x5768b525, 0x206f85b3, 0xb966d409, 0xce61e49f, 0x5edef90e, 0x29d9c998, 0xb0d09822, 0xc7d7a8b4, 0x59b33d17, 0x2eb40d81, 0xb7bd5c3b, 0xc0ba6cad, 0xedb88320, 0x9abfb3b6, 0x03b6e20c, 0x74b1d29a, 0xead54739, 0x9dd277af, 0x04db2615, 0x73dc1683, 0xe3630b12, 0x94643b84, 0x0d6d6a3e, 0x7a6a5aa8, 0xe40ecf0b, 0x9309ff9d, 0x0a00ae27, 0x7d079eb1, 0xf00f9344, 0x8708a3d2, 0x1e01f268, 0x6906c2fe, + 0xf762575d, 0x806567cb, 0x196c3671, 0x6e6b06e7, 0xfed41b76, 0x89d32be0, 0x10da7a5a, 0x67dd4acc, 0xf9b9df6f, 0x8ebeeff9, 0x17b7be43, 0x60b08ed5, 0xd6d6a3e8, 0xa1d1937e, 0x38d8c2c4, 0x4fdff252, 0xd1bb67f1, 0xa6bc5767, 0x3fb506dd, 0x48b2364b, 0xd80d2bda, 0xaf0a1b4c, 0x36034af6, 0x41047a60, 0xdf60efc3, 0xa867df55, 0x316e8eef, 0x4669be79, 0xcb61b38c, 0xbc66831a, 0x256fd2a0, 0x5268e236, 0xcc0c7795, 0xbb0b4703, 0x220216b9, 0x5505262f, 0xc5ba3bbe, + 0xb2bd0b28, 0x2bb45a92, 0x5cb36a04, 0xc2d7ffa7, 0xb5d0cf31, 0x2cd99e8b, 0x5bdeae1d, 0x9b64c2b0, 0xec63f226, 0x756aa39c, 0x026d930a, 0x9c0906a9, 0xeb0e363f, 0x72076785, 0x05005713, 0x95bf4a82, 0xe2b87a14, 0x7bb12bae, 0x0cb61b38, 0x92d28e9b, 0xe5d5be0d, 0x7cdcefb7, 0x0bdbdf21, 0x86d3d2d4, 0xf1d4e242, 0x68ddb3f8, 0x1fda836e, 0x81be16cd, 0xf6b9265b, 0x6fb077e1, 0x18b74777, 0x88085ae6, 0xff0f6a70, 0x66063bca, 0x11010b5c, 0x8f659eff, 0xf862ae69, + 0x616bffd3, 0x166ccf45, 0xa00ae278, 0xd70dd2ee, 0x4e048354, 0x3903b3c2, 0xa7672661, 0xd06016f7, 0x4969474d, 0x3e6e77db, 0xaed16a4a, 0xd9d65adc, 0x40df0b66, 0x37d83bf0, 0xa9bcae53, 0xdebb9ec5, 0x47b2cf7f, 0x30b5ffe9, 0xbdbdf21c, 0xcabac28a, 0x53b39330, 0x24b4a3a6, 0xbad03605, 0xcdd70693, 0x54de5729, 0x23d967bf, 0xb3667a2e, 0xc4614ab8, 0x5d681b02, 0x2a6f2b94, 0xb40bbe37, 0xc30c8ea1, 0x5a05df1b, 0x2d02ef8d}; #ifndef HAVE_ZLIB diff --git a/d3des.c b/d3des.c index 7f964ea..c6cc054 100644 --- a/d3des.c +++ b/d3des.c @@ -37,53 +37,32 @@ static void unscrun(unsigned long *, unsigned char *); static void desfunc(unsigned long *, unsigned long *); static void cookey(unsigned long *); -static unsigned long KnL[32] = { 0L }; +static unsigned long KnL[32] = {0L}; /* not needed ... static unsigned long KnR[32] = { 0L }; static unsigned long Kn3[32] = { 0L }; static unsigned char Df_Key[24] = { - 0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef, - 0xfe,0xdc,0xba,0x98,0x76,0x54,0x32,0x10, - 0x89,0xab,0xcd,0xef,0x01,0x23,0x45,0x67 }; + 0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef, + 0xfe,0xdc,0xba,0x98,0x76,0x54,0x32,0x10, + 0x89,0xab,0xcd,0xef,0x01,0x23,0x45,0x67 }; */ -static unsigned short bytebit[8] = { - 01, 02, 04, 010, 020, 040, 0100, 0200 -}; +static unsigned short bytebit[8] = {01, 02, 04, 010, 020, 040, 0100, 0200}; -static unsigned long bigbyte[24] = { - 0x800000L, 0x400000L, 0x200000L, 0x100000L, - 0x80000L, 0x40000L, 0x20000L, 0x10000L, - 0x8000L, 0x4000L, 0x2000L, 0x1000L, - 0x800L, 0x400L, 0x200L, 0x100L, - 0x80L, 0x40L, 0x20L, 0x10L, - 0x8L, 0x4L, 0x2L, 0x1L -}; +static unsigned long bigbyte[24] = {0x800000L, 0x400000L, 0x200000L, 0x100000L, 0x80000L, 0x40000L, 0x20000L, 0x10000L, 0x8000L, 0x4000L, 0x2000L, 0x1000L, 0x800L, 0x400L, 0x200L, 0x100L, 0x80L, 0x40L, 0x20L, 0x10L, 0x8L, 0x4L, 0x2L, 0x1L}; /* Use the key schedule specified in the Standard (ANSI X3.92-1981). */ -static unsigned char pc1[56] = { - 56, 48, 40, 32, 24, 16, 8, 0, 57, 49, 41, 33, 25, 17, - 9, 1, 58, 50, 42, 34, 26, 18, 10, 2, 59, 51, 43, 35, - 62, 54, 46, 38, 30, 22, 14, 6, 61, 53, 45, 37, 29, 21, - 13, 5, 60, 52, 44, 36, 28, 20, 12, 4, 27, 19, 11, 3 -}; +static unsigned char pc1[56] = {56, 48, 40, 32, 24, 16, 8, 0, 57, 49, 41, 33, 25, 17, 9, 1, 58, 50, 42, 34, 26, 18, 10, 2, 59, 51, 43, 35, 62, 54, 46, 38, 30, 22, 14, 6, 61, 53, 45, 37, 29, 21, 13, 5, 60, 52, 44, 36, 28, 20, 12, 4, 27, 19, 11, 3}; -static unsigned char totrot[16] = { - 1, 2, 4, 6, 8, 10, 12, 14, 15, 17, 19, 21, 23, 25, 27, 28 -}; +static unsigned char totrot[16] = {1, 2, 4, 6, 8, 10, 12, 14, 15, 17, 19, 21, 23, 25, 27, 28}; -static unsigned char pc2[48] = { - 13, 16, 10, 23, 0, 4, 2, 27, 14, 5, 20, 9, - 22, 18, 11, 3, 25, 7, 15, 6, 26, 19, 12, 1, - 40, 51, 30, 36, 46, 54, 29, 39, 50, 44, 32, 47, - 43, 48, 38, 55, 33, 52, 45, 41, 49, 35, 28, 31 -}; +static unsigned char pc2[48] = {13, 16, 10, 23, 0, 4, 2, 27, 14, 5, 20, 9, 22, 18, 11, 3, 25, 7, 15, 6, 26, 19, 12, 1, 40, 51, 30, 36, 46, 54, 29, 39, 50, 44, 32, 47, 43, 48, 38, 55, 33, 52, 45, 41, 49, 35, 28, 31}; -void deskey(key, edf) /* Thanks to James Gillogly & Phil Karn! */ - unsigned char *key; - int32_t edf; +void deskey(key, edf) /* Thanks to James Gillogly & Phil Karn! */ + unsigned char *key; +int32_t edf; { register int32_t i, j, l, m, n; unsigned char pc1m[56], pcr[56]; @@ -126,8 +105,7 @@ void deskey(key, edf) /* Thanks to James Gillogly & Phil Karn! */ return; } -static void cookey(raw1) - register unsigned long *raw1; +static void cookey(raw1) register unsigned long *raw1; { register unsigned long *cook, *raw0; unsigned long dough[32]; @@ -149,8 +127,7 @@ static void cookey(raw1) return; } -void cpkey(into) - register unsigned long *into; +void cpkey(into) register unsigned long *into; { register unsigned long *from, *endp; @@ -160,8 +137,7 @@ void cpkey(into) return; } -void usekey(from) - register unsigned long *from; +void usekey(from) register unsigned long *from; { register unsigned long *to, *endp; @@ -180,9 +156,8 @@ void des(unsigned char *inblock, unsigned char *outblock) { return; } -static void scrunch(outof, into) - register unsigned char *outof; - register unsigned long *into; +static void scrunch(outof, into) register unsigned char *outof; +register unsigned long *into; { *into = (*outof++ & 0xffL) << 24; *into |= (*outof++ & 0xffL) << 16; @@ -195,9 +170,8 @@ static void scrunch(outof, into) return; } -static void unscrun(outof, into) - register unsigned long *outof; - register unsigned char *into; +static void unscrun(outof, into) register unsigned long *outof; +register unsigned char *into; { *into++ = (*outof >> 24) & 0xffL; *into++ = (*outof >> 16) & 0xffL; @@ -210,160 +184,31 @@ static void unscrun(outof, into) return; } -static unsigned long SP1[64] = { - 0x01010400L, 0x00000000L, 0x00010000L, 0x01010404L, - 0x01010004L, 0x00010404L, 0x00000004L, 0x00010000L, - 0x00000400L, 0x01010400L, 0x01010404L, 0x00000400L, - 0x01000404L, 0x01010004L, 0x01000000L, 0x00000004L, - 0x00000404L, 0x01000400L, 0x01000400L, 0x00010400L, - 0x00010400L, 0x01010000L, 0x01010000L, 0x01000404L, - 0x00010004L, 0x01000004L, 0x01000004L, 0x00010004L, - 0x00000000L, 0x00000404L, 0x00010404L, 0x01000000L, - 0x00010000L, 0x01010404L, 0x00000004L, 0x01010000L, - 0x01010400L, 0x01000000L, 0x01000000L, 0x00000400L, - 0x01010004L, 0x00010000L, 0x00010400L, 0x01000004L, - 0x00000400L, 0x00000004L, 0x01000404L, 0x00010404L, - 0x01010404L, 0x00010004L, 0x01010000L, 0x01000404L, - 0x01000004L, 0x00000404L, 0x00010404L, 0x01010400L, - 0x00000404L, 0x01000400L, 0x01000400L, 0x00000000L, - 0x00010004L, 0x00010400L, 0x00000000L, 0x01010004L -}; +static unsigned long SP1[64] = {0x01010400L, 0x00000000L, 0x00010000L, 0x01010404L, 0x01010004L, 0x00010404L, 0x00000004L, 0x00010000L, 0x00000400L, 0x01010400L, 0x01010404L, 0x00000400L, 0x01000404L, 0x01010004L, 0x01000000L, 0x00000004L, 0x00000404L, 0x01000400L, 0x01000400L, 0x00010400L, 0x00010400L, 0x01010000L, 0x01010000L, 0x01000404L, 0x00010004L, 0x01000004L, 0x01000004L, 0x00010004L, 0x00000000L, 0x00000404L, 0x00010404L, 0x01000000L, + 0x00010000L, 0x01010404L, 0x00000004L, 0x01010000L, 0x01010400L, 0x01000000L, 0x01000000L, 0x00000400L, 0x01010004L, 0x00010000L, 0x00010400L, 0x01000004L, 0x00000400L, 0x00000004L, 0x01000404L, 0x00010404L, 0x01010404L, 0x00010004L, 0x01010000L, 0x01000404L, 0x01000004L, 0x00000404L, 0x00010404L, 0x01010400L, 0x00000404L, 0x01000400L, 0x01000400L, 0x00000000L, 0x00010004L, 0x00010400L, 0x00000000L, 0x01010004L}; -static unsigned long SP2[64] = { - 0x80108020L, 0x80008000L, 0x00008000L, 0x00108020L, - 0x00100000L, 0x00000020L, 0x80100020L, 0x80008020L, - 0x80000020L, 0x80108020L, 0x80108000L, 0x80000000L, - 0x80008000L, 0x00100000L, 0x00000020L, 0x80100020L, - 0x00108000L, 0x00100020L, 0x80008020L, 0x00000000L, - 0x80000000L, 0x00008000L, 0x00108020L, 0x80100000L, - 0x00100020L, 0x80000020L, 0x00000000L, 0x00108000L, - 0x00008020L, 0x80108000L, 0x80100000L, 0x00008020L, - 0x00000000L, 0x00108020L, 0x80100020L, 0x00100000L, - 0x80008020L, 0x80100000L, 0x80108000L, 0x00008000L, - 0x80100000L, 0x80008000L, 0x00000020L, 0x80108020L, - 0x00108020L, 0x00000020L, 0x00008000L, 0x80000000L, - 0x00008020L, 0x80108000L, 0x00100000L, 0x80000020L, - 0x00100020L, 0x80008020L, 0x80000020L, 0x00100020L, - 0x00108000L, 0x00000000L, 0x80008000L, 0x00008020L, - 0x80000000L, 0x80100020L, 0x80108020L, 0x00108000L -}; +static unsigned long SP2[64] = {0x80108020L, 0x80008000L, 0x00008000L, 0x00108020L, 0x00100000L, 0x00000020L, 0x80100020L, 0x80008020L, 0x80000020L, 0x80108020L, 0x80108000L, 0x80000000L, 0x80008000L, 0x00100000L, 0x00000020L, 0x80100020L, 0x00108000L, 0x00100020L, 0x80008020L, 0x00000000L, 0x80000000L, 0x00008000L, 0x00108020L, 0x80100000L, 0x00100020L, 0x80000020L, 0x00000000L, 0x00108000L, 0x00008020L, 0x80108000L, 0x80100000L, 0x00008020L, + 0x00000000L, 0x00108020L, 0x80100020L, 0x00100000L, 0x80008020L, 0x80100000L, 0x80108000L, 0x00008000L, 0x80100000L, 0x80008000L, 0x00000020L, 0x80108020L, 0x00108020L, 0x00000020L, 0x00008000L, 0x80000000L, 0x00008020L, 0x80108000L, 0x00100000L, 0x80000020L, 0x00100020L, 0x80008020L, 0x80000020L, 0x00100020L, 0x00108000L, 0x00000000L, 0x80008000L, 0x00008020L, 0x80000000L, 0x80100020L, 0x80108020L, 0x00108000L}; -static unsigned long SP3[64] = { - 0x00000208L, 0x08020200L, 0x00000000L, 0x08020008L, - 0x08000200L, 0x00000000L, 0x00020208L, 0x08000200L, - 0x00020008L, 0x08000008L, 0x08000008L, 0x00020000L, - 0x08020208L, 0x00020008L, 0x08020000L, 0x00000208L, - 0x08000000L, 0x00000008L, 0x08020200L, 0x00000200L, - 0x00020200L, 0x08020000L, 0x08020008L, 0x00020208L, - 0x08000208L, 0x00020200L, 0x00020000L, 0x08000208L, - 0x00000008L, 0x08020208L, 0x00000200L, 0x08000000L, - 0x08020200L, 0x08000000L, 0x00020008L, 0x00000208L, - 0x00020000L, 0x08020200L, 0x08000200L, 0x00000000L, - 0x00000200L, 0x00020008L, 0x08020208L, 0x08000200L, - 0x08000008L, 0x00000200L, 0x00000000L, 0x08020008L, - 0x08000208L, 0x00020000L, 0x08000000L, 0x08020208L, - 0x00000008L, 0x00020208L, 0x00020200L, 0x08000008L, - 0x08020000L, 0x08000208L, 0x00000208L, 0x08020000L, - 0x00020208L, 0x00000008L, 0x08020008L, 0x00020200L -}; +static unsigned long SP3[64] = {0x00000208L, 0x08020200L, 0x00000000L, 0x08020008L, 0x08000200L, 0x00000000L, 0x00020208L, 0x08000200L, 0x00020008L, 0x08000008L, 0x08000008L, 0x00020000L, 0x08020208L, 0x00020008L, 0x08020000L, 0x00000208L, 0x08000000L, 0x00000008L, 0x08020200L, 0x00000200L, 0x00020200L, 0x08020000L, 0x08020008L, 0x00020208L, 0x08000208L, 0x00020200L, 0x00020000L, 0x08000208L, 0x00000008L, 0x08020208L, 0x00000200L, 0x08000000L, + 0x08020200L, 0x08000000L, 0x00020008L, 0x00000208L, 0x00020000L, 0x08020200L, 0x08000200L, 0x00000000L, 0x00000200L, 0x00020008L, 0x08020208L, 0x08000200L, 0x08000008L, 0x00000200L, 0x00000000L, 0x08020008L, 0x08000208L, 0x00020000L, 0x08000000L, 0x08020208L, 0x00000008L, 0x00020208L, 0x00020200L, 0x08000008L, 0x08020000L, 0x08000208L, 0x00000208L, 0x08020000L, 0x00020208L, 0x00000008L, 0x08020008L, 0x00020200L}; -static unsigned long SP4[64] = { - 0x00802001L, 0x00002081L, 0x00002081L, 0x00000080L, - 0x00802080L, 0x00800081L, 0x00800001L, 0x00002001L, - 0x00000000L, 0x00802000L, 0x00802000L, 0x00802081L, - 0x00000081L, 0x00000000L, 0x00800080L, 0x00800001L, - 0x00000001L, 0x00002000L, 0x00800000L, 0x00802001L, - 0x00000080L, 0x00800000L, 0x00002001L, 0x00002080L, - 0x00800081L, 0x00000001L, 0x00002080L, 0x00800080L, - 0x00002000L, 0x00802080L, 0x00802081L, 0x00000081L, - 0x00800080L, 0x00800001L, 0x00802000L, 0x00802081L, - 0x00000081L, 0x00000000L, 0x00000000L, 0x00802000L, - 0x00002080L, 0x00800080L, 0x00800081L, 0x00000001L, - 0x00802001L, 0x00002081L, 0x00002081L, 0x00000080L, - 0x00802081L, 0x00000081L, 0x00000001L, 0x00002000L, - 0x00800001L, 0x00002001L, 0x00802080L, 0x00800081L, - 0x00002001L, 0x00002080L, 0x00800000L, 0x00802001L, - 0x00000080L, 0x00800000L, 0x00002000L, 0x00802080L -}; +static unsigned long SP4[64] = {0x00802001L, 0x00002081L, 0x00002081L, 0x00000080L, 0x00802080L, 0x00800081L, 0x00800001L, 0x00002001L, 0x00000000L, 0x00802000L, 0x00802000L, 0x00802081L, 0x00000081L, 0x00000000L, 0x00800080L, 0x00800001L, 0x00000001L, 0x00002000L, 0x00800000L, 0x00802001L, 0x00000080L, 0x00800000L, 0x00002001L, 0x00002080L, 0x00800081L, 0x00000001L, 0x00002080L, 0x00800080L, 0x00002000L, 0x00802080L, 0x00802081L, 0x00000081L, + 0x00800080L, 0x00800001L, 0x00802000L, 0x00802081L, 0x00000081L, 0x00000000L, 0x00000000L, 0x00802000L, 0x00002080L, 0x00800080L, 0x00800081L, 0x00000001L, 0x00802001L, 0x00002081L, 0x00002081L, 0x00000080L, 0x00802081L, 0x00000081L, 0x00000001L, 0x00002000L, 0x00800001L, 0x00002001L, 0x00802080L, 0x00800081L, 0x00002001L, 0x00002080L, 0x00800000L, 0x00802001L, 0x00000080L, 0x00800000L, 0x00002000L, 0x00802080L}; -static unsigned long SP5[64] = { - 0x00000100L, 0x02080100L, 0x02080000L, 0x42000100L, - 0x00080000L, 0x00000100L, 0x40000000L, 0x02080000L, - 0x40080100L, 0x00080000L, 0x02000100L, 0x40080100L, - 0x42000100L, 0x42080000L, 0x00080100L, 0x40000000L, - 0x02000000L, 0x40080000L, 0x40080000L, 0x00000000L, - 0x40000100L, 0x42080100L, 0x42080100L, 0x02000100L, - 0x42080000L, 0x40000100L, 0x00000000L, 0x42000000L, - 0x02080100L, 0x02000000L, 0x42000000L, 0x00080100L, - 0x00080000L, 0x42000100L, 0x00000100L, 0x02000000L, - 0x40000000L, 0x02080000L, 0x42000100L, 0x40080100L, - 0x02000100L, 0x40000000L, 0x42080000L, 0x02080100L, - 0x40080100L, 0x00000100L, 0x02000000L, 0x42080000L, - 0x42080100L, 0x00080100L, 0x42000000L, 0x42080100L, - 0x02080000L, 0x00000000L, 0x40080000L, 0x42000000L, - 0x00080100L, 0x02000100L, 0x40000100L, 0x00080000L, - 0x00000000L, 0x40080000L, 0x02080100L, 0x40000100L -}; +static unsigned long SP5[64] = {0x00000100L, 0x02080100L, 0x02080000L, 0x42000100L, 0x00080000L, 0x00000100L, 0x40000000L, 0x02080000L, 0x40080100L, 0x00080000L, 0x02000100L, 0x40080100L, 0x42000100L, 0x42080000L, 0x00080100L, 0x40000000L, 0x02000000L, 0x40080000L, 0x40080000L, 0x00000000L, 0x40000100L, 0x42080100L, 0x42080100L, 0x02000100L, 0x42080000L, 0x40000100L, 0x00000000L, 0x42000000L, 0x02080100L, 0x02000000L, 0x42000000L, 0x00080100L, + 0x00080000L, 0x42000100L, 0x00000100L, 0x02000000L, 0x40000000L, 0x02080000L, 0x42000100L, 0x40080100L, 0x02000100L, 0x40000000L, 0x42080000L, 0x02080100L, 0x40080100L, 0x00000100L, 0x02000000L, 0x42080000L, 0x42080100L, 0x00080100L, 0x42000000L, 0x42080100L, 0x02080000L, 0x00000000L, 0x40080000L, 0x42000000L, 0x00080100L, 0x02000100L, 0x40000100L, 0x00080000L, 0x00000000L, 0x40080000L, 0x02080100L, 0x40000100L}; -static unsigned long SP6[64] = { - 0x20000010L, 0x20400000L, 0x00004000L, 0x20404010L, - 0x20400000L, 0x00000010L, 0x20404010L, 0x00400000L, - 0x20004000L, 0x00404010L, 0x00400000L, 0x20000010L, - 0x00400010L, 0x20004000L, 0x20000000L, 0x00004010L, - 0x00000000L, 0x00400010L, 0x20004010L, 0x00004000L, - 0x00404000L, 0x20004010L, 0x00000010L, 0x20400010L, - 0x20400010L, 0x00000000L, 0x00404010L, 0x20404000L, - 0x00004010L, 0x00404000L, 0x20404000L, 0x20000000L, - 0x20004000L, 0x00000010L, 0x20400010L, 0x00404000L, - 0x20404010L, 0x00400000L, 0x00004010L, 0x20000010L, - 0x00400000L, 0x20004000L, 0x20000000L, 0x00004010L, - 0x20000010L, 0x20404010L, 0x00404000L, 0x20400000L, - 0x00404010L, 0x20404000L, 0x00000000L, 0x20400010L, - 0x00000010L, 0x00004000L, 0x20400000L, 0x00404010L, - 0x00004000L, 0x00400010L, 0x20004010L, 0x00000000L, - 0x20404000L, 0x20000000L, 0x00400010L, 0x20004010L -}; +static unsigned long SP6[64] = {0x20000010L, 0x20400000L, 0x00004000L, 0x20404010L, 0x20400000L, 0x00000010L, 0x20404010L, 0x00400000L, 0x20004000L, 0x00404010L, 0x00400000L, 0x20000010L, 0x00400010L, 0x20004000L, 0x20000000L, 0x00004010L, 0x00000000L, 0x00400010L, 0x20004010L, 0x00004000L, 0x00404000L, 0x20004010L, 0x00000010L, 0x20400010L, 0x20400010L, 0x00000000L, 0x00404010L, 0x20404000L, 0x00004010L, 0x00404000L, 0x20404000L, 0x20000000L, + 0x20004000L, 0x00000010L, 0x20400010L, 0x00404000L, 0x20404010L, 0x00400000L, 0x00004010L, 0x20000010L, 0x00400000L, 0x20004000L, 0x20000000L, 0x00004010L, 0x20000010L, 0x20404010L, 0x00404000L, 0x20400000L, 0x00404010L, 0x20404000L, 0x00000000L, 0x20400010L, 0x00000010L, 0x00004000L, 0x20400000L, 0x00404010L, 0x00004000L, 0x00400010L, 0x20004010L, 0x00000000L, 0x20404000L, 0x20000000L, 0x00400010L, 0x20004010L}; -static unsigned long SP7[64] = { - 0x00200000L, 0x04200002L, 0x04000802L, 0x00000000L, - 0x00000800L, 0x04000802L, 0x00200802L, 0x04200800L, - 0x04200802L, 0x00200000L, 0x00000000L, 0x04000002L, - 0x00000002L, 0x04000000L, 0x04200002L, 0x00000802L, - 0x04000800L, 0x00200802L, 0x00200002L, 0x04000800L, - 0x04000002L, 0x04200000L, 0x04200800L, 0x00200002L, - 0x04200000L, 0x00000800L, 0x00000802L, 0x04200802L, - 0x00200800L, 0x00000002L, 0x04000000L, 0x00200800L, - 0x04000000L, 0x00200800L, 0x00200000L, 0x04000802L, - 0x04000802L, 0x04200002L, 0x04200002L, 0x00000002L, - 0x00200002L, 0x04000000L, 0x04000800L, 0x00200000L, - 0x04200800L, 0x00000802L, 0x00200802L, 0x04200800L, - 0x00000802L, 0x04000002L, 0x04200802L, 0x04200000L, - 0x00200800L, 0x00000000L, 0x00000002L, 0x04200802L, - 0x00000000L, 0x00200802L, 0x04200000L, 0x00000800L, - 0x04000002L, 0x04000800L, 0x00000800L, 0x00200002L -}; +static unsigned long SP7[64] = {0x00200000L, 0x04200002L, 0x04000802L, 0x00000000L, 0x00000800L, 0x04000802L, 0x00200802L, 0x04200800L, 0x04200802L, 0x00200000L, 0x00000000L, 0x04000002L, 0x00000002L, 0x04000000L, 0x04200002L, 0x00000802L, 0x04000800L, 0x00200802L, 0x00200002L, 0x04000800L, 0x04000002L, 0x04200000L, 0x04200800L, 0x00200002L, 0x04200000L, 0x00000800L, 0x00000802L, 0x04200802L, 0x00200800L, 0x00000002L, 0x04000000L, 0x00200800L, + 0x04000000L, 0x00200800L, 0x00200000L, 0x04000802L, 0x04000802L, 0x04200002L, 0x04200002L, 0x00000002L, 0x00200002L, 0x04000000L, 0x04000800L, 0x00200000L, 0x04200800L, 0x00000802L, 0x00200802L, 0x04200800L, 0x00000802L, 0x04000002L, 0x04200802L, 0x04200000L, 0x00200800L, 0x00000000L, 0x00000002L, 0x04200802L, 0x00000000L, 0x00200802L, 0x04200000L, 0x00000800L, 0x04000002L, 0x04000800L, 0x00000800L, 0x00200002L}; -static unsigned long SP8[64] = { - 0x10001040L, 0x00001000L, 0x00040000L, 0x10041040L, - 0x10000000L, 0x10001040L, 0x00000040L, 0x10000000L, - 0x00040040L, 0x10040000L, 0x10041040L, 0x00041000L, - 0x10041000L, 0x00041040L, 0x00001000L, 0x00000040L, - 0x10040000L, 0x10000040L, 0x10001000L, 0x00001040L, - 0x00041000L, 0x00040040L, 0x10040040L, 0x10041000L, - 0x00001040L, 0x00000000L, 0x00000000L, 0x10040040L, - 0x10000040L, 0x10001000L, 0x00041040L, 0x00040000L, - 0x00041040L, 0x00040000L, 0x10041000L, 0x00001000L, - 0x00000040L, 0x10040040L, 0x00001000L, 0x00041040L, - 0x10001000L, 0x00000040L, 0x10000040L, 0x10040000L, - 0x10040040L, 0x10000000L, 0x00040000L, 0x10001040L, - 0x00000000L, 0x10041040L, 0x00040040L, 0x10000040L, - 0x10040000L, 0x10001000L, 0x10001040L, 0x00000000L, - 0x10041040L, 0x00041000L, 0x00041000L, 0x00001040L, - 0x00001040L, 0x00040040L, 0x10000000L, 0x10041000L -}; +static unsigned long SP8[64] = {0x10001040L, 0x00001000L, 0x00040000L, 0x10041040L, 0x10000000L, 0x10001040L, 0x00000040L, 0x10000000L, 0x00040040L, 0x10040000L, 0x10041040L, 0x00041000L, 0x10041000L, 0x00041040L, 0x00001000L, 0x00000040L, 0x10040000L, 0x10000040L, 0x10001000L, 0x00001040L, 0x00041000L, 0x00040040L, 0x10040040L, 0x10041000L, 0x00001040L, 0x00000000L, 0x00000000L, 0x10040040L, 0x10000040L, 0x10001000L, 0x00041040L, 0x00040000L, + 0x00041040L, 0x00040000L, 0x10041000L, 0x00001000L, 0x00000040L, 0x10040040L, 0x00001000L, 0x00041040L, 0x10001000L, 0x00000040L, 0x10000040L, 0x10040000L, 0x10040040L, 0x10000000L, 0x00040000L, 0x10001040L, 0x00000000L, 0x10041040L, 0x00040040L, 0x10000040L, 0x10040000L, 0x10001000L, 0x10001040L, 0x00000000L, 0x10041040L, 0x00041000L, 0x00041000L, 0x00001040L, 0x00001040L, 0x00040040L, 0x10000000L, 0x10041000L}; -static void desfunc(block, keys) - register unsigned long *block, *keys; +static void desfunc(block, keys) register unsigned long *block, *keys; { register unsigned long fval, work, right, leftt; register int32_t round; diff --git a/d3des.h b/d3des.h index 18be88b..3b03d8a 100644 --- a/d3des.h +++ b/d3des.h @@ -1,9 +1,9 @@ #ifdef __sun - #include +#include #elif defined(__FreeBSD__) || defined(__IBMCPP__) || defined(_AIX) - #include +#include #else - #include +#include #endif /* @@ -27,8 +27,8 @@ * (GEnie : OUTER; CIS : [71755,204]) */ -#define EN0 0 /* MODE == encrypt */ -#define DE1 1 /* MODE == decrypt */ +#define EN0 0 /* MODE == encrypt */ +#define DE1 1 /* MODE == decrypt */ extern void deskey(unsigned char *, int32_t); diff --git a/hmacmd5.c b/hmacmd5.c index 9400aba..d7b7691 100644 --- a/hmacmd5.c +++ b/hmacmd5.c @@ -1,24 +1,24 @@ -/* +/* Unix SMB/CIFS implementation. HMAC MD5 code for use in NTLMv2 Copyright (C) Luke Kenneth Casson Leighton 1996-2000 Copyright (C) Andrew Tridgell 1992-2000 - + This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. - + This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. - + You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc. - + Free Software Foundation 51 Franklin Street, Fifth Floor Boston, MA 02110-1335 @@ -34,8 +34,8 @@ */ #ifdef LIBOPENSSL -#include #include "hmacmd5.h" +#include #define ZERO_STRUCT(x) memset((char *)&(x), 0, sizeof(x)) @@ -43,7 +43,7 @@ the rfc 2104 version of hmac_md5 initialisation. ***********************************************************************/ -void hmac_md5_init_rfc2104(const unsigned char *key, int32_t key_len, HMACMD5Context * ctx) { +void hmac_md5_init_rfc2104(const unsigned char *key, int32_t key_len, HMACMD5Context *ctx) { int32_t i; unsigned char tk[16]; @@ -52,7 +52,7 @@ void hmac_md5_init_rfc2104(const unsigned char *key, int32_t key_len, HMACMD5Con MD5_CTX tctx; MD5_Init(&tctx); - MD5_Update(&tctx, (void *) key, key_len); + MD5_Update(&tctx, (void *)key, key_len); MD5_Final(tk, &tctx); key = tk; @@ -79,7 +79,7 @@ void hmac_md5_init_rfc2104(const unsigned char *key, int32_t key_len, HMACMD5Con the microsoft version of hmac_md5 initialisation. ***********************************************************************/ -void hmac_md5_init_limK_to_64(const unsigned char *key, int32_t key_len, HMACMD5Context * ctx) { +void hmac_md5_init_limK_to_64(const unsigned char *key, int32_t key_len, HMACMD5Context *ctx) { int32_t i; /* if key is longer than 64 bytes truncate it */ @@ -107,15 +107,12 @@ void hmac_md5_init_limK_to_64(const unsigned char *key, int32_t key_len, HMACMD5 update hmac_md5 "inner" buffer ***********************************************************************/ -void hmac_md5_update(const unsigned char *text, int32_t text_len, HMACMD5Context * ctx) { - MD5_Update(&ctx->ctx, (void *) text, text_len); /* then text of datagram */ -} +void hmac_md5_update(const unsigned char *text, int32_t text_len, HMACMD5Context *ctx) { MD5_Update(&ctx->ctx, (void *)text, text_len); /* then text of datagram */ } /*********************************************************************** finish off hmac_md5 "inner" buffer and generate outer one. ***********************************************************************/ -void hmac_md5_final(unsigned char *digest, HMACMD5Context * ctx) -{ +void hmac_md5_final(unsigned char *digest, HMACMD5Context *ctx) { MD5_CTX ctx_o; MD5_Final(digest, &ctx->ctx); diff --git a/hmacmd5.h b/hmacmd5.h index 54e1393..7677bc6 100644 --- a/hmacmd5.h +++ b/hmacmd5.h @@ -1,19 +1,19 @@ -/* +/* Unix SMB/CIFS implementation. Interface header: Scheduler service Copyright (C) Luke Kenneth Casson Leighton 1996-1999 Copyright (C) Andrew Tridgell 1992-1999 - + This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. - + This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. - + You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc. @@ -30,28 +30,25 @@ */ #ifdef __sun - #include +#include #elif defined(__FreeBSD__) || defined(__IBMCPP__) || defined(_AIX) - #include +#include #else - #include +#include #endif #include #ifndef _HMAC_MD5_H typedef struct { - MD5_CTX ctx; - unsigned char k_ipad[65]; - unsigned char k_opad[65]; + MD5_CTX ctx; + unsigned char k_ipad[65]; + unsigned char k_opad[65]; } HMACMD5Context; #endif /* _HMAC_MD5_H */ - void hmac_md5_init_rfc2104(const unsigned char *key, int32_t key_len, HMACMD5Context *ctx); -void hmac_md5_init_limK_to_64(const unsigned char* key, int32_t key_len,HMACMD5Context *ctx); +void hmac_md5_init_limK_to_64(const unsigned char *key, int32_t key_len, HMACMD5Context *ctx); void hmac_md5_update(const unsigned char *text, int32_t text_len, HMACMD5Context *ctx); void hmac_md5_final(unsigned char *digest, HMACMD5Context *ctx); -void hmac_md5( unsigned char key[16], unsigned char *data, int32_t data_len, unsigned char *digest); - - +void hmac_md5(unsigned char key[16], unsigned char *data, int32_t data_len, unsigned char *digest); diff --git a/hydra-adam6500.c b/hydra-adam6500.c index 9382fd1..ae664d4 100644 --- a/hydra-adam6500.c +++ b/hydra-adam6500.c @@ -6,57 +6,15 @@ extern char *HYDRA_EXIT; -unsigned char adam6500_req1[] = { - 0x00, 0x00, 0x00, 0x00, 0x00, 0x17, 0x01, 0x10, - 0x27, 0x0f, 0x00, 0x08, 0x10, 0x24, 0x30, 0x31, - 0x50, 0x57, 0x30, 0x1f, 0x1f, 0x1f, 0x1f, 0x1f, - 0x1f, 0x1f, 0x1f, 0x0d, 0x00 -}; -unsigned char adam6500_resp1[] = { - 0x00, 0x00, 0x00, 0x00, 0x00, 0x06, 0x01, 0x10, - 0x27, 0x0f, 0x00, 0x08 -}; -unsigned char adam6500_req2[] = { - 0x01, 0x00, 0x00, 0x00, 0x00, 0x06, 0x01, 0x03, - 0x27, 0x0f, 0x00, 0x7d -}; -unsigned char adam6500_resp2[] = { - 0x01, 0x00, 0x00, 0x00, 0x00, 0xfd, 0x01, 0x03, - 0xfa, 0x3f, 0x30, 0x31, 0x0d, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00 -}; +unsigned char adam6500_req1[] = {0x00, 0x00, 0x00, 0x00, 0x00, 0x17, 0x01, 0x10, 0x27, 0x0f, 0x00, 0x08, 0x10, 0x24, 0x30, 0x31, 0x50, 0x57, 0x30, 0x1f, 0x1f, 0x1f, 0x1f, 0x1f, 0x1f, 0x1f, 0x1f, 0x0d, 0x00}; +unsigned char adam6500_resp1[] = {0x00, 0x00, 0x00, 0x00, 0x00, 0x06, 0x01, 0x10, 0x27, 0x0f, 0x00, 0x08}; +unsigned char adam6500_req2[] = {0x01, 0x00, 0x00, 0x00, 0x00, 0x06, 0x01, 0x03, 0x27, 0x0f, 0x00, 0x7d}; +unsigned char adam6500_resp2[] = {0x01, 0x00, 0x00, 0x00, 0x00, 0xfd, 0x01, 0x03, 0xfa, 0x3f, 0x30, 0x31, 0x0d, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}; -int32_t start_adam6500(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_adam6500(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *pass; unsigned char buffer[300]; @@ -66,13 +24,13 @@ int32_t start_adam6500(int32_t s, char *ip, int32_t port, unsigned char options, pass = empty; memcpy(buffer, adam6500_req1, sizeof(adam6500_req1)); - - for (i = 0; i < 8 && i < strlen(pass); i++) + + for (i = 0; i < 8 && i < strlen(pass); i++) buffer[19 + i] = pass[i] ^ 0x3f; if (hydra_send(s, buffer, sizeof(adam6500_req1), 0) < 0) return 1; - + if (recv(s, buffer, sizeof(buffer), 0) == 12 && memcmp(buffer, adam6500_resp1, sizeof(adam6500_resp1)) == 0) { if (hydra_send(s, adam6500_req2, sizeof(adam6500_req2), 0) < 0) return 1; @@ -90,7 +48,7 @@ int32_t start_adam6500(int32_t s, char *ip, int32_t port, unsigned char options, return 1; } -void service_adam6500(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_adam6500(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_ADAM6500, mysslport = PORT_ADAM6500_SSL; @@ -100,34 +58,34 @@ void service_adam6500(char *ip, int32_t sp, unsigned char options, char *miscptr while (1) { next_run = 0; switch (run) { - case 1: /* connect and service init function */ - { - if (sock >= 0) - sock = hydra_disconnect(sock); -// usleepn(275); - if ((options & OPTION_SSL) == 0) { - if (port != 0) - myport = port; - sock = hydra_connect_tcp(ip, myport); - port = myport; - } else { - if (port != 0) - mysslport = port; - sock = hydra_connect_ssl(ip, mysslport, hostname); - port = mysslport; - } - if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); - hydra_child_exit(1); - } - - next_run = 2; - break; + case 1: /* connect and service init function */ + { + if (sock >= 0) + sock = hydra_disconnect(sock); + // usleepn(275); + if ((options & OPTION_SSL) == 0) { + if (port != 0) + myport = port; + sock = hydra_connect_tcp(ip, myport); + port = myport; + } else { + if (port != 0) + mysslport = port; + sock = hydra_connect_ssl(ip, mysslport, hostname); + port = mysslport; } - case 2: /* run the cracking function */ + if (sock < 0) { + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); + hydra_child_exit(1); + } + + next_run = 2; + break; + } + case 2: /* run the cracking function */ next_run = start_adam6500(sock, ip, port, options, miscptr, fp); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); @@ -145,13 +103,13 @@ void service_adam6500(char *ip, int32_t sp, unsigned char options, char *miscptr } } -int32_t service_adam6500_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_adam6500_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here diff --git a/hydra-afp.c b/hydra-afp.c index 0e55f6f..1d2801d 100644 --- a/hydra-afp.c +++ b/hydra-afp.c @@ -1,6 +1,6 @@ /* * Apple Filing Protocol Support - by David Maciejak @ GMAIL dot com - * + * * tested with afpfs-ng 0.8.1 * AFPFS-NG: http://alexthepuffin.googlepages.com/home * @@ -9,33 +9,31 @@ #include "hydra-mod.h" #ifndef LIBAFP -void dummy_afp() { - printf("\n"); -} +void dummy_afp() { printf("\n"); } #else -#define FREE(x) \ - if (x != NULL) { \ - free(x); \ - x = NULL; \ - } +#define FREE(x) \ + if (x != NULL) { \ + free(x); \ + x = NULL; \ + } -#include #include #include +#include extern char *HYDRA_EXIT; void stdout_fct(void *priv, enum loglevels loglevel, int32_t logtype, const char *message) { - //fprintf(stderr, "[ERROR] Caught unknown error %s\n", message); + // fprintf(stderr, "[ERROR] Caught unknown error %s\n", message); } static struct libafpclient afpclient = { - .unmount_volume = NULL, - .log_for_client = stdout_fct, - .forced_ending_hook = NULL, - .scan_extra_fds = NULL, - .loop_started = NULL, + .unmount_volume = NULL, + .log_for_client = stdout_fct, + .forced_ending_hook = NULL, + .scan_extra_fds = NULL, + .loop_started = NULL, }; static int32_t server_subconnect(struct afp_url url) { @@ -43,14 +41,15 @@ static int32_t server_subconnect(struct afp_url url) { struct afp_server *server = NULL; conn_req = malloc(sizeof(struct afp_connection_request)); -// server = malloc(sizeof(struct afp_server)); + // server = malloc(sizeof(struct afp_server)); memset(conn_req, 0, sizeof(struct afp_connection_request)); conn_req->url = url; conn_req->url.requested_version = 31; - //fprintf(stderr, "AFP connection - username: %s password: %s server: %s\n", url.username, url.password, url.servername); + // fprintf(stderr, "AFP connection - username: %s password: %s server: %s\n", + // url.username, url.password, url.servername); if (strlen(url.uamname) > 0) { if ((conn_req->uam_mask = find_uam_by_name(url.uamname)) == 0) { @@ -63,13 +62,14 @@ static int32_t server_subconnect(struct afp_url url) { conn_req->uam_mask = default_uams_mask(); } - //fprintf(stderr, "Initiating connection attempt.\n"); + // fprintf(stderr, "Initiating connection attempt.\n"); if ((server = afp_server_full_connect(NULL, conn_req)) == NULL) { FREE(conn_req); -// FREE(server); + // FREE(server); return -1; } - //fprintf(stderr, "Connected to server: %s via UAM: %s\n", server->server_name_printable, uam_bitmap_to_string(server->using_uam)); + // fprintf(stderr, "Connected to server: %s via UAM: %s\n", + // server->server_name_printable, uam_bitmap_to_string(server->using_uam)); FREE(conn_req); FREE(server); @@ -77,7 +77,7 @@ static int32_t server_subconnect(struct afp_url url) { return 0; } -int32_t start_afp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_afp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, *pass, mlogin[AFP_MAX_USERNAME_LEN], mpass[AFP_MAX_PASSWORD_LEN]; struct afp_url tmpurl; @@ -88,7 +88,6 @@ int32_t start_afp(int32_t s, char *ip, int32_t port, unsigned char options, char init_uams(); afp_default_url(&tmpurl); - if (strlen(login = hydra_get_next_login()) == 0) login = empty; if (strlen(pass = hydra_get_next_password()) == 0) @@ -110,7 +109,6 @@ int32_t start_afp(int32_t s, char *ip, int32_t port, unsigned char options, char return 3; return 2; } else { - hydra_completed_pair(); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) return 2; @@ -118,7 +116,7 @@ int32_t start_afp(int32_t s, char *ip, int32_t port, unsigned char options, char return 1; } -void service_afp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_afp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_AFP; @@ -127,9 +125,8 @@ void service_afp(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL return; while (1) { - switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ if (sock >= 0) sock = hydra_disconnect(sock); if ((options & OPTION_SSL) == 0) { @@ -139,7 +136,8 @@ void service_afp(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL port = myport; } if (sock < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + if (quiet != 1) + fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } @@ -149,7 +147,7 @@ void service_afp(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL case 2: /* - * Here we start the password cracking process + * Here we start the password cracking process */ next_run = start_afp(sock, ip, port, options, miscptr, fp); @@ -172,13 +170,13 @@ void service_afp(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL #endif -int32_t service_afp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_afp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here diff --git a/hydra-asterisk.c b/hydra-asterisk.c index 1ec351d..bbcfce7 100644 --- a/hydra-asterisk.c +++ b/hydra-asterisk.c @@ -1,17 +1,16 @@ -//This plugin was written by david@ +// This plugin was written by david@ // -//This plugin is written for Asterisk Call Manager -//which is running by default on TCP/5038 +// This plugin is written for Asterisk Call Manager +// which is running by default on TCP/5038 // #include "hydra-mod.h" - extern char *HYDRA_EXIT; char *buf; -int32_t start_asterisk(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_asterisk(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = "\"\""; char *login, *pass, buffer[1024]; @@ -41,7 +40,10 @@ int32_t start_asterisk(int32_t s, char *ip, int32_t port, unsigned char options, hydra_report(stderr, "[DEBUG] S: %s\n", buf); if (buf == NULL || (strstr(buf, "Response: ") == NULL)) { - hydra_report(stderr, "[ERROR] Asterisk Call Manager protocol error or service shutdown: %s\n", buf); + hydra_report(stderr, + "[ERROR] Asterisk Call Manager protocol error or service " + "shutdown: %s\n", + buf); free(buf); return 4; } @@ -62,7 +64,7 @@ int32_t start_asterisk(int32_t s, char *ip, int32_t port, unsigned char options, return 2; } -void service_asterisk(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_asterisk(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_ASTERISK, mysslport = PORT_ASTERISK_SSL; @@ -71,10 +73,10 @@ void service_asterisk(char *ip, int32_t sp, unsigned char options, char *miscptr return; while (1) { switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ if (sock >= 0) sock = hydra_disconnect(sock); -// usleepn(300); + // usleepn(300); if ((options & OPTION_SSL) == 0) { if (port != 0) myport = port; @@ -89,28 +91,31 @@ void service_asterisk(char *ip, int32_t sp, unsigned char options, char *miscptr if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } buf = hydra_receive_line(sock); - //fprintf(stderr, "%s\n",buf); - //banner should look like: - //Asterisk Call Manager/1.1 + // fprintf(stderr, "%s\n",buf); + // banner should look like: + // Asterisk Call Manager/1.1 if (buf == NULL || strstr(buf, "Asterisk Call Manager/") == NULL) { /* check the first line */ if (verbose || debug) - hydra_report(stderr, "[ERROR] Not an Asterisk Call Manager protocol or service shutdown: %s\n", buf); + hydra_report(stderr, + "[ERROR] Not an Asterisk Call Manager protocol or " + "service shutdown: %s\n", + buf); hydra_child_exit(2); } free(buf); next_run = 2; break; - case 2: /* run the cracking function */ + case 2: /* run the cracking function */ next_run = start_asterisk(sock, ip, port, options, miscptr, fp); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); @@ -123,13 +128,13 @@ void service_asterisk(char *ip, int32_t sp, unsigned char options, char *miscptr } } -int32_t service_asterisk_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_asterisk_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here diff --git a/hydra-cisco-enable.c b/hydra-cisco-enable.c index 4cc9bdf..5a835e1 100644 --- a/hydra-cisco-enable.c +++ b/hydra-cisco-enable.c @@ -3,7 +3,7 @@ extern char *HYDRA_EXIT; char *buf; -int32_t start_cisco_enable(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_cisco_enable(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *pass, buffer[300]; @@ -42,8 +42,7 @@ int32_t start_cisco_enable(int32_t s, char *ip, int32_t port, unsigned char opti } } - if (buf != NULL - && (strstr(buf, "assw") != NULL || strstr(buf, "ad ") != NULL || strstr(buf, "attempt") != NULL || strstr(buf, "fail") != NULL || strstr(buf, "denied") != NULL)) { + if (buf != NULL && (strstr(buf, "assw") != NULL || strstr(buf, "ad ") != NULL || strstr(buf, "attempt") != NULL || strstr(buf, "fail") != NULL || strstr(buf, "denied") != NULL)) { free(buf); hydra_completed_pair(); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -58,7 +57,7 @@ int32_t start_cisco_enable(int32_t s, char *ip, int32_t port, unsigned char opti return 3; } -void service_cisco_enable(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_cisco_enable(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, failc = 0, retry = 1, next_run = 1, sock = -1; int32_t myport = PORT_TELNET, mysslport = PORT_TELNET_SSL; char buffer[300]; @@ -70,117 +69,130 @@ void service_cisco_enable(char *ip, int32_t sp, unsigned char options, char *mis while (1) { next_run = 0; switch (run) { - case 1: /* connect and service init function */ - { - if (sock >= 0) - sock = hydra_disconnect(sock); -// usleepn(275); - if ((options & OPTION_SSL) == 0) { - if (port != 0) - myport = port; - sock = hydra_connect_tcp(ip, myport); - port = myport; - } else { - if (port != 0) - mysslport = port; - sock = hydra_connect_ssl(ip, mysslport, hostname); - port = mysslport; - } - if (sock < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); - hydra_child_exit(1); + case 1: /* connect and service init function */ + { + if (sock >= 0) + sock = hydra_disconnect(sock); + // usleepn(275); + if ((options & OPTION_SSL) == 0) { + if (port != 0) + myport = port; + sock = hydra_connect_tcp(ip, myport); + port = myport; + } else { + if (port != 0) + mysslport = port; + sock = hydra_connect_ssl(ip, mysslport, hostname); + port = mysslport; + } + if (sock < 0) { + if (quiet != 1) + fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); + hydra_child_exit(1); + } + + /* Cisco AAA Support */ + if (strlen(login = hydra_get_next_login()) != 0) { + while ((buf = hydra_receive_line(sock)) != NULL && strstr(buf, "name:") == NULL && strstr(buf, "ogin:") == NULL) { + if (hydra_strcasestr(buf, "ress ENTER") != NULL) + hydra_send(sock, "\r\n", 2, 0); + free(buf); } - /* Cisco AAA Support */ - if (strlen(login = hydra_get_next_login()) != 0) { - while ((buf = hydra_receive_line(sock)) != NULL && strstr(buf, "name:") == NULL && strstr(buf, "ogin:") == NULL) { - if (hydra_strcasestr(buf, "ress ENTER") != NULL) - hydra_send(sock, "\r\n", 2, 0); - free(buf); - } - - sprintf(buffer, "%.250s\r\n", login); - if (hydra_send(sock, buffer, strlen(buffer), 0) < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not send login\n", (int32_t) getpid()); - hydra_child_exit(2); - } - } - - if (miscptr != NULL) { - if (buf != NULL) - free(buf); - while ((buf = hydra_receive_line(sock)) != NULL && strstr(buf, "assw") == NULL) { - if (hydra_strcasestr(buf, "ress ENTER") != NULL) - hydra_send(sock, "\r\n", 2, 0); - free(buf); - } - - sprintf(buffer, "%.250s\r\n", miscptr); - if (hydra_send(sock, buffer, strlen(buffer), 0) < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not send login\n", (int32_t) getpid()); - hydra_child_exit(2); - } + sprintf(buffer, "%.250s\r\n", login); + if (hydra_send(sock, buffer, strlen(buffer), 0) < 0) { + if (quiet != 1) + fprintf(stderr, "[ERROR] Child with pid %d terminating, can not send login\n", (int32_t)getpid()); + hydra_child_exit(2); } + } + if (miscptr != NULL) { if (buf != NULL) free(buf); - buf = hydra_receive_line(sock); - if (hydra_strcasestr(buf, "ress ENTER") != NULL) { - hydra_send(sock, "\r\n", 2, 0); + while ((buf = hydra_receive_line(sock)) != NULL && strstr(buf, "assw") == NULL) { + if (hydra_strcasestr(buf, "ress ENTER") != NULL) + hydra_send(sock, "\r\n", 2, 0); free(buf); - buf = hydra_receive_line(sock); } - if (strstr(buf, "assw") != NULL) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating - can not login, can not login\n", (int32_t) getpid()); - hydra_child_exit(2); - } - free(buf); - - next_run = 2; - break; - } - case 2: /* run the cracking function */ - { - unsigned char *buf2; - int32_t f = 0; - - sprintf(buffer, "%.250s\r\n", "ena"); + sprintf(buffer, "%.250s\r\n", miscptr); if (hydra_send(sock, buffer, strlen(buffer), 0) < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not send 'ena'\n", (int32_t) getpid()); + if (quiet != 1) + fprintf(stderr, "[ERROR] Child with pid %d terminating, can not send login\n", (int32_t)getpid()); hydra_child_exit(2); } - - do { - if (f != 0) - free(buf2); - else - f = 1; - if ((buf2 = (unsigned char *) hydra_receive_line(sock)) == NULL) { - if (failc < retry) { - next_run = 1; - failc++; - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d was disconnected - retrying (%d of %d retries)\n", (int32_t) getpid(), failc, retry); - sleep(3); - break; - } else { - fprintf(stderr, "[ERROR] Child with pid %d was disconnected - exiting\n", (int32_t) getpid()); - hydra_child_exit(0); - } - } - } while (strstr((char *) buf2, "assw") == NULL); - free(buf2); - if (next_run != 0) - break; - failc = 0; - - next_run = start_cisco_enable(sock, ip, port, options, miscptr, fp); - break; } - case 3: /* clean exit */ + + if (buf != NULL) + free(buf); + buf = hydra_receive_line(sock); + if (hydra_strcasestr(buf, "ress ENTER") != NULL) { + hydra_send(sock, "\r\n", 2, 0); + free(buf); + buf = hydra_receive_line(sock); + } + + if (strstr(buf, "assw") != NULL) { + if (quiet != 1) + fprintf(stderr, + "[ERROR] Child with pid %d terminating - can not login, can " + "not login\n", + (int32_t)getpid()); + hydra_child_exit(2); + } + free(buf); + + next_run = 2; + break; + } + case 2: /* run the cracking function */ + { + unsigned char *buf2; + int32_t f = 0; + + sprintf(buffer, "%.250s\r\n", "ena"); + if (hydra_send(sock, buffer, strlen(buffer), 0) < 0) { + if (quiet != 1) + fprintf(stderr, "[ERROR] Child with pid %d terminating, can not send 'ena'\n", (int32_t)getpid()); + hydra_child_exit(2); + } + + do { + if (f != 0) + free(buf2); + else + f = 1; + if ((buf2 = (unsigned char *)hydra_receive_line(sock)) == NULL) { + if (failc < retry) { + next_run = 1; + failc++; + if (quiet != 1) + fprintf(stderr, + "[ERROR] Child with pid %d was disconnected - retrying " + "(%d of %d retries)\n", + (int32_t)getpid(), failc, retry); + sleep(3); + break; + } else { + fprintf(stderr, "[ERROR] Child with pid %d was disconnected - exiting\n", (int32_t)getpid()); + hydra_child_exit(0); + } + } + } while (strstr((char *)buf2, "assw") == NULL); + free(buf2); + if (next_run != 0) + break; + failc = 0; + + next_run = start_cisco_enable(sock, ip, port, options, miscptr, fp); + break; + } + case 3: /* clean exit */ sprintf(buffer, "%.250s\r\n", "exit"); if (hydra_send(sock, buffer, strlen(buffer), 0) < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not send 'exit'\n", (int32_t) getpid()); + if (quiet != 1) + fprintf(stderr, "[ERROR] Child with pid %d terminating, can not send 'exit'\n", (int32_t)getpid()); hydra_child_exit(0); } if (sock >= 0) @@ -196,13 +208,13 @@ void service_cisco_enable(char *ip, int32_t sp, unsigned char options, char *mis } } -int32_t service_cisco_enable_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_cisco_enable_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here @@ -210,12 +222,16 @@ int32_t service_cisco_enable_init(char *ip, int32_t sp, unsigned char options, c return 0; } -void usage_cisco_enable(const char* service) { - printf("Module cisco-enable is optionally taking the logon password for the cisco device\n" - "Note: if AAA authentication is used, use the -l option for the username\n" +void usage_cisco_enable(const char *service) { + printf("Module cisco-enable is optionally taking the logon password for the " + "cisco device\n" + "Note: if AAA authentication is used, use the -l option for the " + "username\n" "and the optional parameter for the password of the user.\n" "Examples:\n" " hydra -P pass.txt target cisco-enable (direct console access)\n" - " hydra -P pass.txt -m cisco target cisco-enable (Logon password cisco)\n" - " hydra -l foo -m bar -P pass.txt target cisco-enable (AAA Login foo, password bar)\n"); + " hydra -P pass.txt -m cisco target cisco-enable (Logon password " + "cisco)\n" + " hydra -l foo -m bar -P pass.txt target cisco-enable (AAA Login " + "foo, password bar)\n"); } diff --git a/hydra-cisco.c b/hydra-cisco.c index 32d0e20..72709ac 100644 --- a/hydra-cisco.c +++ b/hydra-cisco.c @@ -7,7 +7,7 @@ extern char *HYDRA_EXIT; char *buf = NULL; -int32_t start_cisco(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_cisco(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *pass, buffer[300]; @@ -52,7 +52,7 @@ int32_t start_cisco(int32_t s, char *ip, int32_t port, unsigned char options, ch if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { return 1; } - + buf = NULL; do { if (buf != NULL) @@ -95,7 +95,6 @@ int32_t start_cisco(int32_t s, char *ip, int32_t port, unsigned char options, ch } } while (buf != NULL && strlen(buf) <= 1); } - } if (buf != NULL && (strstr(buf, "assw") != NULL || strstr(buf, "ad ") != NULL || strstr(buf, "attempt") != NULL || strstr(buf, "ailur") != NULL)) { @@ -115,7 +114,7 @@ int32_t start_cisco(int32_t s, char *ip, int32_t port, unsigned char options, ch return 1; } -void service_cisco(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_cisco(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, failc = 0, retry = 1, next_run = 1, sock = -1; int32_t myport = PORT_TELNET, mysslport = PORT_TELNET_SSL; @@ -125,63 +124,68 @@ void service_cisco(char *ip, int32_t sp, unsigned char options, char *miscptr, F while (1) { next_run = 0; switch (run) { - case 1: /* connect and service init function */ - { - unsigned char *buf2 = NULL; - int32_t f = 0; + case 1: /* connect and service init function */ + { + unsigned char *buf2 = NULL; + int32_t f = 0; - if (sock >= 0) - sock = hydra_disconnect(sock); -// usleepn(275); - if ((options & OPTION_SSL) == 0) { - if (port != 0) - myport = port; - sock = hydra_connect_tcp(ip, myport); - port = myport; - if (miscptr != NULL && hydra_strcasestr(miscptr, "enter") != NULL) - hydra_send(sock, "\r\n", 2, 0); - } else { - if (port != 0) - mysslport = port; - sock = hydra_connect_ssl(ip, mysslport, hostname); - port = mysslport; - } - if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); - hydra_child_exit(1); - } - do { - if (f != 0) { - free(buf2); - buf2 = NULL; - } else - f = 1; - if ((buf2 = (unsigned char *) hydra_receive_line(sock)) == NULL) { - if (failc < retry) { - next_run = 1; - failc++; - if (quiet != 1) hydra_report(stderr, "[ERROR] Child with pid %d was disconnected - retrying (%d of %d retries)\n", (int32_t) getpid(), failc, retry); - sleep(3); - break; - } else { - if (quiet != 1) hydra_report(stderr, "[ERROR] Child with pid %d was disconnected - exiting\n", (int32_t) getpid()); - hydra_child_exit(0); - } - } - if (buf2 != NULL && hydra_strcasestr((char*)buf2, "ress ENTER") != NULL) - hydra_send(sock, "\r\n", 2, 0); - } while (buf2 != NULL && strstr((char *) buf2, "assw") == NULL); - free(buf2); - if (next_run != 0) - break; - failc = 0; - next_run = 2; - break; + if (sock >= 0) + sock = hydra_disconnect(sock); + // usleepn(275); + if ((options & OPTION_SSL) == 0) { + if (port != 0) + myport = port; + sock = hydra_connect_tcp(ip, myport); + port = myport; + if (miscptr != NULL && hydra_strcasestr(miscptr, "enter") != NULL) + hydra_send(sock, "\r\n", 2, 0); + } else { + if (port != 0) + mysslport = port; + sock = hydra_connect_ssl(ip, mysslport, hostname); + port = mysslport; } - case 2: /* run the cracking function */ + if (sock < 0) { + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); + hydra_child_exit(1); + } + do { + if (f != 0) { + free(buf2); + buf2 = NULL; + } else + f = 1; + if ((buf2 = (unsigned char *)hydra_receive_line(sock)) == NULL) { + if (failc < retry) { + next_run = 1; + failc++; + if (quiet != 1) + hydra_report(stderr, + "[ERROR] Child with pid %d was disconnected - " + "retrying (%d of %d retries)\n", + (int32_t)getpid(), failc, retry); + sleep(3); + break; + } else { + if (quiet != 1) + hydra_report(stderr, "[ERROR] Child with pid %d was disconnected - exiting\n", (int32_t)getpid()); + hydra_child_exit(0); + } + } + if (buf2 != NULL && hydra_strcasestr((char *)buf2, "ress ENTER") != NULL) + hydra_send(sock, "\r\n", 2, 0); + } while (buf2 != NULL && strstr((char *)buf2, "assw") == NULL); + free(buf2); + if (next_run != 0) + break; + failc = 0; + next_run = 2; + break; + } + case 2: /* run the cracking function */ next_run = start_cisco(sock, ip, port, options, miscptr, fp); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); @@ -199,13 +203,13 @@ void service_cisco(char *ip, int32_t sp, unsigned char options, char *miscptr, F } } -int32_t service_cisco_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_cisco_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here @@ -213,6 +217,8 @@ int32_t service_cisco_init(char *ip, int32_t sp, unsigned char options, char *mi return 0; } -void usage_cisco(const char* service) { - printf("Module cisco is optionally taking the keyword ENTER, it then sends an initial\n" "ENTER when connecting to the service.\n"); +void usage_cisco(const char *service) { + printf("Module cisco is optionally taking the keyword ENTER, it then sends " + "an initial\n" + "ENTER when connecting to the service.\n"); } diff --git a/hydra-cvs.c b/hydra-cvs.c index b745504..5dfb40b 100644 --- a/hydra-cvs.c +++ b/hydra-cvs.c @@ -5,38 +5,32 @@ extern int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec); extern char *HYDRA_EXIT; char *buf; -int32_t start_cvs(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_cvs(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, *pass, buffer[1024], pass2[513]; int32_t i; char *directory = miscptr; -/* evil cvs encryption sheme... - 0 111 P 125 p 58 -! 120 1 52 A 57 Q 55 a 121 q 113 -" 53 2 75 B 83 R 54 b 117 r 32 - 3 119 C 43 S 66 c 104 s 90 - 4 49 D 46 T 124 d 101 t 44 -% 109 5 34 E 102 U 126 e 100 u 98 -& 72 6 82 F 40 V 59 f 69 v 60 -' 108 7 81 G 89 W 47 g 73 w 51 -( 70 8 95 H 38 X 92 h 99 x 33 -) 64 9 65 I 103 Y 71 i 63 y 97 -* 76 : 112 J 45 Z 115 j 94 z 62 -+ 67 ; 86 K 50 k 93 -, 116 < 118 L 42 l 39 -- 74 = 110 M 123 m 37 -. 68 > 122 N 91 n 61 -/ 87 ? 105 O 35 _ 56 o 48 -*/ + /* evil cvs encryption sheme... + 0 111 P 125 p 58 + ! 120 1 52 A 57 Q 55 a 121 q 113 + " 53 2 75 B 83 R 54 b 117 r 32 + 3 119 C 43 S 66 c 104 s 90 + 4 49 D 46 T 124 d 101 t 44 + % 109 5 34 E 102 U 126 e 100 u 98 + & 72 6 82 F 40 V 59 f 69 v 60 + ' 108 7 81 G 89 W 47 g 73 w 51 + ( 70 8 95 H 38 X 92 h 99 x 33 + ) 64 9 65 I 103 Y 71 i 63 y 97 + * 76 : 112 J 45 Z 115 j 94 z 62 + + 67 ; 86 K 50 k 93 + , 116 < 118 L 42 l 39 + - 74 = 110 M 123 m 37 + . 68 > 122 N 91 n 61 + / 87 ? 105 O 35 _ 56 o 48 + */ - char key[] = { 0, 120, 53, 0, 0, 109, 72, 108, 70, 64, 76, 67, 116, 74, 68, 87, - 111, 52, 75, 119, 49, 34, 82, 81, 95, 65, 112, 86, 118, 110, 122, 105, - 0, 57, 83, 43, 46, 102, 40, 89, 38, 103, 45, 50, 42, 123, 91, 35, - 125, 55, 54, 66, 124, 126, 59, 47, 92, 71, 115, 0, 0, 0, 0, 56, - 0, 121, 117, 104, 101, 100, 69, 73, 99, 63, 94, 93, 39, 37, 61, 48, - 58, 113, 32, 90, 44, 98, 60, 51, 33, 97, 62 - }; + char key[] = {0, 120, 53, 0, 0, 109, 72, 108, 70, 64, 76, 67, 116, 74, 68, 87, 111, 52, 75, 119, 49, 34, 82, 81, 95, 65, 112, 86, 118, 110, 122, 105, 0, 57, 83, 43, 46, 102, 40, 89, 38, 103, 45, 50, 42, 123, 91, 35, 125, 55, 54, 66, 124, 126, 59, 47, 92, 71, 115, 0, 0, 0, 0, 56, 0, 121, 117, 104, 101, 100, 69, 73, 99, 63, 94, 93, 39, 37, 61, 48, 58, 113, 32, 90, 44, 98, 60, 51, 33, 97, 62}; if (strlen(login = hydra_get_next_login()) == 0) login = empty; @@ -85,7 +79,7 @@ int32_t start_cvs(int32_t s, char *ip, int32_t port, unsigned char options, char return 3; } -void service_cvs(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_cvs(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_CVS, mysslport = PORT_CVS_SSL; @@ -100,11 +94,11 @@ void service_cvs(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL return; switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ if (sock >= 0) sock = hydra_disconnect(sock); -// usleepn(300); + // usleepn(300); if ((options & OPTION_SSL) == 0) { if (port != 0) myport = port; @@ -118,12 +112,12 @@ void service_cvs(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL } if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } next_run = start_cvs(sock, ip, port, options, miscptr, fp); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(2); @@ -136,13 +130,13 @@ void service_cvs(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL } } -int32_t service_cvs_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_cvs_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here @@ -150,6 +144,7 @@ int32_t service_cvs_init(char *ip, int32_t sp, unsigned char options, char *misc return 0; } -void usage_cvs(const char* service) { - printf("Module cvs is optionally taking the repository name to attack, default is \"/root\"\n\n"); +void usage_cvs(const char *service) { + printf("Module cvs is optionally taking the repository name to attack, " + "default is \"/root\"\n\n"); } diff --git a/hydra-firebird.c b/hydra-firebird.c index 1b5228b..4898c46 100644 --- a/hydra-firebird.c +++ b/hydra-firebird.c @@ -1,7 +1,7 @@ /* Firebird Support - by David Maciejak @ GMAIL dot com - + you need to pass full path to the fdb file as argument default account is SYSDBA/masterkey @@ -14,28 +14,26 @@ the msg: "no permission for direct access to security database" #include "hydra-mod.h" #ifndef LIBFIREBIRD -void dummy_firebird() { - printf("\n"); -} +void dummy_firebird() { printf("\n"); } #else -#include #include +#include #define DEFAULT_DB "C:\\Program Files\\Firebird\\Firebird_1_5\\security.fdb" extern char *HYDRA_EXIT; -int32_t start_firebird(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_firebird(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, *pass; char database[256]; char connection_string[1024]; - isc_db_handle db; /* database handle */ - ISC_STATUS_ARRAY status; /* status vector */ + isc_db_handle db; /* database handle */ + ISC_STATUS_ARRAY status; /* status vector */ - char *dpb = NULL; /* DB parameter buffer */ + char *dpb = NULL; /* DB parameter buffer */ short dpb_length = 0; if (miscptr) @@ -49,8 +47,8 @@ int32_t start_firebird(int32_t s, char *ip, int32_t port, unsigned char options, if (strlen(pass = hydra_get_next_password()) == 0) pass = empty; - dpb_length = (short) (1 + strlen(login) + 2 + strlen(pass) + 2); - if ((dpb = (char *) malloc(dpb_length)) == NULL) { + dpb_length = (short)(1 + strlen(login) + 2 + strlen(pass) + 2); + if ((dpb = (char *)malloc(dpb_length)) == NULL) { hydra_report(stderr, "[ERROR] Can't allocate memory\n"); return 1; } @@ -86,7 +84,7 @@ int32_t start_firebird(int32_t s, char *ip, int32_t port, unsigned char options, return 1; } -void service_firebird(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_firebird(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_FIREBIRD, mysslport = PORT_FIREBIRD_SSL; @@ -95,9 +93,8 @@ void service_firebird(char *ip, int32_t sp, unsigned char options, char *miscptr return; while (1) { - switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ if (sock >= 0) sock = hydra_disconnect(sock); if ((options & OPTION_SSL) == 0) { @@ -112,7 +109,8 @@ void service_firebird(char *ip, int32_t sp, unsigned char options, char *miscptr port = mysslport; } if (sock < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + if (quiet != 1) + fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } @@ -122,7 +120,7 @@ void service_firebird(char *ip, int32_t sp, unsigned char options, char *miscptr case 2: /* - * Here we start the password cracking process + * Here we start the password cracking process */ next_run = start_firebird(sock, ip, port, options, miscptr, fp); @@ -145,13 +143,13 @@ void service_firebird(char *ip, int32_t sp, unsigned char options, char *miscptr #endif -int32_t service_firebird_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_firebird_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here @@ -159,6 +157,8 @@ int32_t service_firebird_init(char *ip, int32_t sp, unsigned char options, char return 0; } -void usage_firebird(const char* service) { - printf("Module firebird is optionally taking the database path to attack,\n" "default is \"C:\\Program Files\\Firebird\\Firebird_1_5\\security.fdb\"\n\n"); +void usage_firebird(const char *service) { + printf("Module firebird is optionally taking the database path to attack,\n" + "default is \"C:\\Program " + "Files\\Firebird\\Firebird_1_5\\security.fdb\"\n\n"); } diff --git a/hydra-ftp.c b/hydra-ftp.c index 504c0bd..590d671 100644 --- a/hydra-ftp.c +++ b/hydra-ftp.c @@ -3,7 +3,7 @@ extern char *HYDRA_EXIT; char *buf; -int32_t start_ftp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_ftp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = "\"\""; char *login, *pass, buffer[510]; @@ -20,7 +20,8 @@ int32_t start_ftp(int32_t s, char *ip, int32_t port, unsigned char options, char buf = hydra_receive_line(s); if (buf == NULL) return 1; - /* special hack to identify 530 user unknown msg. suggested by Jean-Baptiste.BEAUFRETON@turbomeca.fr */ + /* special hack to identify 530 user unknown msg. suggested by + * Jean-Baptiste.BEAUFRETON@turbomeca.fr */ if (buf[0] == '5' && buf[1] == '3' && buf[2] == '0') { if (verbose) printf("[INFO] user %s does not exist, skipping\n", login); @@ -74,7 +75,7 @@ int32_t start_ftp(int32_t s, char *ip, int32_t port, unsigned char options, char return 2; } -void service_ftp_core(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname, int32_t tls) { +void service_ftp_core(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname, int32_t tls) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_FTP, mysslport = PORT_FTP_SSL; @@ -83,10 +84,10 @@ void service_ftp_core(char *ip, int32_t sp, unsigned char options, char *miscptr hydra_child_exit(0); while (1) { switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ if (sock >= 0) sock = hydra_disconnect(sock); -// usleepn(300); + // usleepn(300); if ((options & OPTION_SSL) == 0) { if (port != 0) myport = port; @@ -100,12 +101,12 @@ void service_ftp_core(char *ip, int32_t sp, unsigned char options, char *miscptr } if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } usleepn(250); buf = hydra_receive_line(sock); - if (buf == NULL || buf[0] != '2') { /* check the first line */ + if (buf == NULL || buf[0] != '2') { /* check the first line */ if (verbose || debug) hydra_report(stderr, "[ERROR] Not an FTP protocol or service shutdown: %s\n", buf); hydra_child_exit(2); @@ -120,7 +121,7 @@ void service_ftp_core(char *ip, int32_t sp, unsigned char options, char *miscptr } free(buf); - //this mode is manually chosen, so if it fails we giving up + // this mode is manually chosen, so if it fails we giving up if (tls) { if (hydra_send(sock, "AUTH TLS\r\n", strlen("AUTH TLS\r\n"), 0) < 0) { hydra_child_exit(2); @@ -148,15 +149,15 @@ void service_ftp_core(char *ip, int32_t sp, unsigned char options, char *miscptr next_run = 2; break; - case 2: /* run the cracking function */ + case 2: /* run the cracking function */ next_run = start_ftp(sock, ip, port, options, miscptr, fp); break; - case 3: /* error exit */ + case 3: /* error exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(2); break; - case 4: /* clean exit */ + case 4: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); @@ -169,21 +170,17 @@ void service_ftp_core(char *ip, int32_t sp, unsigned char options, char *miscptr } } -void service_ftp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { - service_ftp_core(ip, sp, options, miscptr, fp, port, hostname, 0); -} +void service_ftp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { service_ftp_core(ip, sp, options, miscptr, fp, port, hostname, 0); } -void service_ftps(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { - service_ftp_core(ip, sp, options, miscptr, fp, port, hostname, 1); -} +void service_ftps(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { service_ftp_core(ip, sp, options, miscptr, fp, port, hostname, 1); } -int32_t service_ftp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_ftp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here diff --git a/hydra-gtk/src/callbacks.c b/hydra-gtk/src/callbacks.c index f586208..74c3d5e 100644 --- a/hydra-gtk/src/callbacks.c +++ b/hydra-gtk/src/callbacks.c @@ -1,7 +1,7 @@ /* * This file handles all that needs to be done... - * Some stuff is stolen from gcombust since I never used pipes... ok, i + * Some stuff is stolen from gcombust since I never used pipes... ok, i * only used them in reallife :) */ @@ -15,18 +15,17 @@ #include "interface.h" #include "support.h" -#include -#include +#include #include #include -#include +#include +#include #include #include #include -#include -#include #include +#include int hydra_pid = 0; @@ -37,16 +36,14 @@ char smbparm[128]; char sapr3id[4]; char passLoginNull[4]; - #define BUF_S 1024 -void hydra_select_file(GtkEntry * widget, char *text) { +void hydra_select_file(GtkEntry *widget, char *text) { #ifdef GTK_TYPE_FILE_CHOOSER GtkWidget *dialog; char *filename; - dialog = gtk_file_chooser_dialog_new(text, (GtkWindow *) wndMain, GTK_FILE_CHOOSER_ACTION_OPEN, - GTK_STOCK_OPEN, GTK_RESPONSE_ACCEPT, GTK_STOCK_CANCEL, GTK_RESPONSE_CANCEL, NULL); + dialog = gtk_file_chooser_dialog_new(text, (GtkWindow *)wndMain, GTK_FILE_CHOOSER_ACTION_OPEN, GTK_STOCK_OPEN, GTK_RESPONSE_ACCEPT, GTK_STOCK_CANCEL, GTK_RESPONSE_CANCEL, NULL); if (gtk_dialog_run(GTK_DIALOG(dialog)) == GTK_RESPONSE_ACCEPT) { filename = gtk_file_chooser_get_filename(GTK_FILE_CHOOSER(dialog)); @@ -70,7 +67,7 @@ int hydra_get_options(char *options[]) { /* get the port */ widget = lookup_widget(GTK_WIDGET(wndMain), "spnPort"); - j = gtk_spin_button_get_value_as_int((GtkSpinButton *) widget); + j = gtk_spin_button_get_value_as_int((GtkSpinButton *)widget); if (j != 0) { snprintf(port, 10, "%d", j); options[i++] = "-s"; @@ -79,107 +76,107 @@ int hydra_get_options(char *options[]) { /* prefer ipv6 */ widget = lookup_widget(GTK_WIDGET(wndMain), "chkIPV6"); - if (gtk_toggle_button_get_active((GtkToggleButton *) widget)) { + if (gtk_toggle_button_get_active((GtkToggleButton *)widget)) { options[i++] = "-6"; } /* use SSL? */ widget = lookup_widget(GTK_WIDGET(wndMain), "chkSSL"); - if (gtk_toggle_button_get_active((GtkToggleButton *) widget)) { + if (gtk_toggle_button_get_active((GtkToggleButton *)widget)) { options[i++] = "-S"; } /* use old SSL? */ widget = lookup_widget(GTK_WIDGET(wndMain), "chkOldSSL"); - if (gtk_toggle_button_get_active((GtkToggleButton *) widget)) { + if (gtk_toggle_button_get_active((GtkToggleButton *)widget)) { options[i++] = "-O"; } /* be verbose? */ widget = lookup_widget(GTK_WIDGET(wndMain), "chkVerbose"); - if (gtk_toggle_button_get_active((GtkToggleButton *) widget)) { + if (gtk_toggle_button_get_active((GtkToggleButton *)widget)) { options[i++] = "-v"; } /* show attempts */ widget = lookup_widget(GTK_WIDGET(wndMain), "chkAttempts"); - if (gtk_toggle_button_get_active((GtkToggleButton *) widget)) { + if (gtk_toggle_button_get_active((GtkToggleButton *)widget)) { options[i++] = "-V"; } /* debug mode? */ widget = lookup_widget(GTK_WIDGET(wndMain), "chkDebug"); - if (gtk_toggle_button_get_active((GtkToggleButton *) widget)) { + if (gtk_toggle_button_get_active((GtkToggleButton *)widget)) { options[i++] = "-d"; } /* COMPLETE HELP */ widget = lookup_widget(GTK_WIDGET(wndMain), "chkCompleteHelp"); - if (gtk_toggle_button_get_active((GtkToggleButton *) widget)) { + if (gtk_toggle_button_get_active((GtkToggleButton *)widget)) { options[i++] = "-h"; } /* Service Module Usage Details */ widget = lookup_widget(GTK_WIDGET(wndMain), "chkServiceDetails"); - if (gtk_toggle_button_get_active((GtkToggleButton *) widget)) { + if (gtk_toggle_button_get_active((GtkToggleButton *)widget)) { options[i++] = "-U"; } /* use colon separated list? */ widget = lookup_widget(GTK_WIDGET(wndMain), "chkColon"); - if (gtk_toggle_button_get_active((GtkToggleButton *) widget)) { + if (gtk_toggle_button_get_active((GtkToggleButton *)widget)) { options[i++] = "-C"; widget = lookup_widget(GTK_WIDGET(wndMain), "entColonFile"); - options[i++] = (char *) gtk_entry_get_text((GtkEntry *) widget); + options[i++] = (char *)gtk_entry_get_text((GtkEntry *)widget); } else { /* disable usernames */ widget = lookup_widget(GTK_WIDGET(wndMain), "chkDisUser"); - if (gtk_toggle_button_get_active((GtkToggleButton *) widget)) { + if (gtk_toggle_button_get_active((GtkToggleButton *)widget)) { } else { /* get the username, or username list */ widget = lookup_widget(GTK_WIDGET(wndMain), "radioUsername1"); - if (gtk_toggle_button_get_active((GtkToggleButton *) widget)) { + if (gtk_toggle_button_get_active((GtkToggleButton *)widget)) { options[i++] = "-l"; widget = lookup_widget(GTK_WIDGET(wndMain), "entUsername"); - options[i++] = (char *) gtk_entry_get_text((GtkEntry *) widget); + options[i++] = (char *)gtk_entry_get_text((GtkEntry *)widget); } else { options[i++] = "-L"; widget = lookup_widget(GTK_WIDGET(wndMain), "entUsernameFile"); - options[i++] = (char *) gtk_entry_get_text((GtkEntry *) widget); + options[i++] = (char *)gtk_entry_get_text((GtkEntry *)widget); } } /* get the pass, pass list, or generate */ /* The "generate" button was implemented by Petar Kaleychev */ widget = lookup_widget(GTK_WIDGET(wndMain), "radioPass1"); - if (gtk_toggle_button_get_active((GtkToggleButton *) widget)) { + if (gtk_toggle_button_get_active((GtkToggleButton *)widget)) { options[i++] = "-p"; widget = lookup_widget(GTK_WIDGET(wndMain), "entPass"); - options[i++] = (char *) gtk_entry_get_text((GtkEntry *) widget); + options[i++] = (char *)gtk_entry_get_text((GtkEntry *)widget); } widget = lookup_widget(GTK_WIDGET(wndMain), "radioPass2"); - if (gtk_toggle_button_get_active((GtkToggleButton *) widget)) { + if (gtk_toggle_button_get_active((GtkToggleButton *)widget)) { options[i++] = "-P"; widget = lookup_widget(GTK_WIDGET(wndMain), "entPassFile"); - options[i++] = (char *) gtk_entry_get_text((GtkEntry *) widget); + options[i++] = (char *)gtk_entry_get_text((GtkEntry *)widget); } widget = lookup_widget(GTK_WIDGET(wndMain), "radioGenerate"); - if (gtk_toggle_button_get_active((GtkToggleButton *) widget)) { + if (gtk_toggle_button_get_active((GtkToggleButton *)widget)) { options[i++] = "-x"; widget = lookup_widget(GTK_WIDGET(wndMain), "entGeneration"); - options[i++] = (char *) gtk_entry_get_text((GtkEntry *) widget); + options[i++] = (char *)gtk_entry_get_text((GtkEntry *)widget); } } /* empty passes / login as pass / reversed login? */ memset(passLoginNull, 0, 4); widget = lookup_widget(GTK_WIDGET(wndMain), "chkPassNull"); - if (gtk_toggle_button_get_active((GtkToggleButton *) widget)) { + if (gtk_toggle_button_get_active((GtkToggleButton *)widget)) { passLoginNull[0] = 'n'; } widget = lookup_widget(GTK_WIDGET(wndMain), "chkPassLogin"); - if (gtk_toggle_button_get_active((GtkToggleButton *) widget)) { + if (gtk_toggle_button_get_active((GtkToggleButton *)widget)) { if (passLoginNull[0] == 0) { passLoginNull[0] = 's'; } else { @@ -188,7 +185,7 @@ int hydra_get_options(char *options[]) { } /* The "Try reversed login" button was implemented by Petar Kaleychev */ widget = lookup_widget(GTK_WIDGET(wndMain), "chkPassReverse"); - if (gtk_toggle_button_get_active((GtkToggleButton *) widget)) { + if (gtk_toggle_button_get_active((GtkToggleButton *)widget)) { if (passLoginNull[0] == 0) { passLoginNull[0] = 'r'; } else if (passLoginNull[1] == 0) { @@ -204,7 +201,7 @@ int hydra_get_options(char *options[]) { /* #of tasks */ widget = lookup_widget(GTK_WIDGET(wndMain), "spnTasks"); - j = gtk_spin_button_get_value_as_int((GtkSpinButton *) widget); + j = gtk_spin_button_get_value_as_int((GtkSpinButton *)widget); if (j != 40) { snprintf(tasks, 10, "%d", j); options[i++] = "-t"; @@ -213,7 +210,7 @@ int hydra_get_options(char *options[]) { /* timeout */ widget = lookup_widget(GTK_WIDGET(wndMain), "spnTimeout"); - j = gtk_spin_button_get_value_as_int((GtkSpinButton *) widget); + j = gtk_spin_button_get_value_as_int((GtkSpinButton *)widget); if (j != 30) { snprintf(timeout, 10, "%d", j); options[i++] = "-w"; @@ -222,56 +219,56 @@ int hydra_get_options(char *options[]) { /* loop around users? */ widget = lookup_widget(GTK_WIDGET(wndMain), "chkUsernameLoop"); - if (gtk_toggle_button_get_active((GtkToggleButton *) widget)) { + if (gtk_toggle_button_get_active((GtkToggleButton *)widget)) { options[i++] = "-u"; } /* exit after first found pair? */ /* per host */ widget = lookup_widget(GTK_WIDGET(wndMain), "chkExitf"); - if (gtk_toggle_button_get_active((GtkToggleButton *) widget)) { + if (gtk_toggle_button_get_active((GtkToggleButton *)widget)) { options[i++] = "-f"; } /* global */ widget = lookup_widget(GTK_WIDGET(wndMain), "chkExitF"); - if (gtk_toggle_button_get_active((GtkToggleButton *) widget)) { + if (gtk_toggle_button_get_active((GtkToggleButton *)widget)) { options[i++] = "-F"; } /* Do not print messages about connection errors */ widget = lookup_widget(GTK_WIDGET(wndMain), "chkNoErr"); - if (gtk_toggle_button_get_active((GtkToggleButton *) widget)) { + if (gtk_toggle_button_get_active((GtkToggleButton *)widget)) { options[i++] = "-q"; } /* get additional parameters */ widget = lookup_widget(GTK_WIDGET(wndMain), "entProtocol"); - tmp = (char *) gtk_entry_get_text((GtkEntry *) widget); + tmp = (char *)gtk_entry_get_text((GtkEntry *)widget); if (!strncmp(tmp, "http-proxy", 10)) { widget = lookup_widget(GTK_WIDGET(wndMain), "entHTTPProxyURL"); options[i++] = "-m"; - options[i++] = (char *) gtk_entry_get_text((GtkEntry *) widget); + options[i++] = (char *)gtk_entry_get_text((GtkEntry *)widget); } else if (!strncmp(tmp, "http-", 5) || !strncmp(tmp, "https-", 6)) { options[i++] = "-m"; widget = lookup_widget(GTK_WIDGET(wndMain), "entHTTPURL"); - options[i++] = (char *) gtk_entry_get_text((GtkEntry *) widget); + options[i++] = (char *)gtk_entry_get_text((GtkEntry *)widget); } else if (!strcmp(tmp, "cisco-enable")) { options[i++] = "-m"; widget = lookup_widget(GTK_WIDGET(wndMain), "entCiscoPass"); - options[i++] = (char *) gtk_entry_get_text((GtkEntry *) widget); + options[i++] = (char *)gtk_entry_get_text((GtkEntry *)widget); } else if (!strcmp(tmp, "ldap3-crammd5")) { options[i++] = "-m"; widget = lookup_widget(GTK_WIDGET(wndMain), "entLDAPDN"); - options[i++] = (char *) gtk_entry_get_text((GtkEntry *) widget); + options[i++] = (char *)gtk_entry_get_text((GtkEntry *)widget); } else if (!strcmp(tmp, "ldap3-digestmd5")) { options[i++] = "-m"; widget = lookup_widget(GTK_WIDGET(wndMain), "entLDAPDN"); - options[i++] = (char *) gtk_entry_get_text((GtkEntry *) widget); + options[i++] = (char *)gtk_entry_get_text((GtkEntry *)widget); } else if (!strcmp(tmp, "smb")) { memset(smbparm, 0, sizeof(smbparm)); @@ -282,12 +279,12 @@ int hydra_get_options(char *options[]) { strncpy(smbparm, "Both", sizeof(smbparm)); smbparm[strlen("Both")] = '\0'; - if (gtk_toggle_button_get_active((GtkToggleButton *) widget)) { + if (gtk_toggle_button_get_active((GtkToggleButton *)widget)) { strncpy(smbparm, "Domain", sizeof(smbparm)); smbparm[strlen("Domain")] = '\0'; } - if (gtk_toggle_button_get_active((GtkToggleButton *) widget2)) { - if (gtk_toggle_button_get_active((GtkToggleButton *) widget)) { + if (gtk_toggle_button_get_active((GtkToggleButton *)widget2)) { + if (gtk_toggle_button_get_active((GtkToggleButton *)widget)) { strncpy(smbparm, "Both", sizeof(smbparm)); smbparm[strlen("Both")] = '\0'; } else { @@ -296,7 +293,7 @@ int hydra_get_options(char *options[]) { } } widget = lookup_widget(GTK_WIDGET(wndMain), "chkNTLM"); - if (gtk_toggle_button_get_active((GtkToggleButton *) widget)) { + if (gtk_toggle_button_get_active((GtkToggleButton *)widget)) { strcat(smbparm, "Hash"); } options[i++] = smbparm; @@ -307,18 +304,14 @@ int hydra_get_options(char *options[]) { options[i++] = smbparm; widget = lookup_widget(GTK_WIDGET(wndMain), "chkNTLM"); - int pth = gtk_toggle_button_get_active((GtkToggleButton *) widget); + int pth = gtk_toggle_button_get_active((GtkToggleButton *)widget); widget = lookup_widget(GTK_WIDGET(wndMain), "entSMB2Workgroup"); - snprintf(smbparm, - sizeof(smbparm)-1, - "nthash:%s workgroup:{%s}", - pth ? "true" : "false", - (char *) gtk_entry_get_text((GtkEntry *) widget)); + snprintf(smbparm, sizeof(smbparm) - 1, "nthash:%s workgroup:{%s}", pth ? "true" : "false", (char *)gtk_entry_get_text((GtkEntry *)widget)); } else if (!strcmp(tmp, "sapr3")) { widget = lookup_widget(GTK_WIDGET(wndMain), "spnSAPR3"); - j = gtk_spin_button_get_value_as_int((GtkSpinButton *) widget); + j = gtk_spin_button_get_value_as_int((GtkSpinButton *)widget); snprintf(sapr3id, sizeof(sapr3id), "%d", j); options[i++] = "-m"; options[i++] = sapr3id; @@ -326,18 +319,18 @@ int hydra_get_options(char *options[]) { } else if (!strcmp(tmp, "cvs") || !strcmp(tmp, "svn")) { widget = lookup_widget(GTK_WIDGET(wndMain), "entCVS"); options[i++] = "-m"; - options[i++] = (char *) gtk_entry_get_text((GtkEntry *) widget); + options[i++] = (char *)gtk_entry_get_text((GtkEntry *)widget); } else if (!strcmp(tmp, "snmp")) { widget = lookup_widget(GTK_WIDGET(wndMain), "entSNMP"); options[i++] = "-m"; - options[i++] = (char *) gtk_entry_get_text((GtkEntry *) widget); + options[i++] = (char *)gtk_entry_get_text((GtkEntry *)widget); } else if (!strcmp(tmp, "telnet")) { widget = lookup_widget(GTK_WIDGET(wndMain), "entTelnet"); - if ((char *) gtk_entry_get_text((GtkEntry *) widget) != NULL) { + if ((char *)gtk_entry_get_text((GtkEntry *)widget) != NULL) { options[i++] = "-m"; - options[i++] = (char *) gtk_entry_get_text((GtkEntry *) widget); + options[i++] = (char *)gtk_entry_get_text((GtkEntry *)widget); } } @@ -349,45 +342,44 @@ int hydra_get_options(char *options[]) { /* proxy support */ widget = lookup_widget(GTK_WIDGET(wndMain), "radioProxy"); - if (!gtk_toggle_button_get_active((GtkToggleButton *) widget)) { - + if (!gtk_toggle_button_get_active((GtkToggleButton *)widget)) { widget2 = lookup_widget(GTK_WIDGET(wndMain), "entHTTPProxy"); widget = lookup_widget(GTK_WIDGET(wndMain), "radioProxy2"); /* which variable do we set? */ - if ((!strncmp(tmp, "http-", 5)) && (gtk_toggle_button_get_active((GtkToggleButton *) widget))) { - setenv("HYDRA_PROXY_HTTP", gtk_entry_get_text((GtkEntry *) widget2), 1); + if ((!strncmp(tmp, "http-", 5)) && (gtk_toggle_button_get_active((GtkToggleButton *)widget))) { + setenv("HYDRA_PROXY_HTTP", gtk_entry_get_text((GtkEntry *)widget2), 1); } else { - setenv("HYDRA_PROXY_CONNECT", (char *) gtk_entry_get_text((GtkEntry *) widget2), 1); + setenv("HYDRA_PROXY_CONNECT", (char *)gtk_entry_get_text((GtkEntry *)widget2), 1); } /* do we need to provide user and pass? */ widget = lookup_widget(GTK_WIDGET(wndMain), "chkProxyAuth"); - if (gtk_toggle_button_get_active((GtkToggleButton *) widget)) { + if (gtk_toggle_button_get_active((GtkToggleButton *)widget)) { widget = lookup_widget(GTK_WIDGET(wndMain), "entProxyUser"); widget2 = lookup_widget(GTK_WIDGET(wndMain), "entProxyPass"); - a = g_string_new((gchar *) gtk_entry_get_text((GtkEntry *) widget)); + a = g_string_new((gchar *)gtk_entry_get_text((GtkEntry *)widget)); a = g_string_append_c(a, ':'); - a = g_string_append(a, gtk_entry_get_text((GtkEntry *) widget2)); + a = g_string_append(a, gtk_entry_get_text((GtkEntry *)widget2)); setenv("HYDRA_PROXY_AUTH", a->str, 1); - (void) g_string_free(a, TRUE); + (void)g_string_free(a, TRUE); } } /* get the target, or target list */ widget = lookup_widget(GTK_WIDGET(wndMain), "radioTarget1"); - if (gtk_toggle_button_get_active((GtkToggleButton *) widget)) { + if (gtk_toggle_button_get_active((GtkToggleButton *)widget)) { widget = lookup_widget(GTK_WIDGET(wndMain), "entTarget"); - options[i++] = (char *) gtk_entry_get_text((GtkEntry *) widget); + options[i++] = (char *)gtk_entry_get_text((GtkEntry *)widget); } else { options[i++] = "-M"; widget = lookup_widget(GTK_WIDGET(wndMain), "entTargetFile"); - options[i++] = (char *) gtk_entry_get_text((GtkEntry *) widget); + options[i++] = (char *)gtk_entry_get_text((GtkEntry *)widget); } /* get the service */ widget = lookup_widget(GTK_WIDGET(wndMain), "entProtocol"); - options[i++] = (char *) gtk_entry_get_text((GtkEntry *) widget); + options[i++] = (char *)gtk_entry_get_text((GtkEntry *)widget); options[i] = NULL; return i; @@ -404,12 +396,11 @@ int update_statusbar() { i = hydra_get_options(options); for (j = 1; j < i; j++) { - statustext = g_string_append(statustext, options[j]); statustext = g_string_append_c(statustext, ' '); } - statusbar = (GtkStatusbar *) lookup_widget(GTK_WIDGET(wndMain), "statusbar"); + statusbar = (GtkStatusbar *)lookup_widget(GTK_WIDGET(wndMain), "statusbar"); context_id = gtk_statusbar_get_context_id(statusbar, "status"); /* an old message in stack? */ @@ -417,9 +408,9 @@ int update_statusbar() { gtk_statusbar_remove(statusbar, context_id, message_id); } - message_id = gtk_statusbar_push(statusbar, context_id, (gchar *) statustext->str); + message_id = gtk_statusbar_push(statusbar, context_id, (gchar *)statustext->str); - (void) g_string_free(statustext, TRUE); + (void)g_string_free(statustext, TRUE); return TRUE; } @@ -443,11 +434,10 @@ int read_into(int fd) { } output = lookup_widget(GTK_WIDGET(wndMain), "txtOutput"); - outputbuf = gtk_text_view_get_buffer((GtkTextView *) output); + outputbuf = gtk_text_view_get_buffer((GtkTextView *)output); gtk_text_buffer_get_iter_at_offset(outputbuf, &outputiter, -1); - if ((passline = strstr(in_buf, "password: ")) == NULL) { gtk_text_buffer_insert(outputbuf, &outputiter, in_buf, result); } else { @@ -465,15 +455,13 @@ int read_into(int fd) { if (end - in_buf - result > 0) { gtk_text_buffer_insert(outputbuf, &outputiter, end + 1, -1); } - } - if (strstr(in_buf, " finished at ") != NULL) { gtk_text_buffer_insert_with_tags_by_name(outputbuf, &outputiter, "\n\n", -1, "bold", NULL); } - if (result == BUF_S - 1) /* there might be more available, recurse baby! */ + if (result == BUF_S - 1) /* there might be more available, recurse baby! */ return read_into(fd); else return TRUE; @@ -530,7 +518,6 @@ static int wait_hydra_output(gpointer data) { return TRUE; } - /* assumes a successfull pipe() won't set the fd's to -1 */ static void close_pipe(int *pipe) { if (-1 != pipe[0]) { @@ -550,8 +537,7 @@ static void close_pipe(int *pipe) { */ int *popen_re_unbuffered(char *command) { - static int p_r[2] = { -1, -1 }, p_e[2] = { - -1, -1}; + static int p_r[2] = {-1, -1}, p_e[2] = {-1, -1}; static int *pfd = NULL; char *options[128]; @@ -576,7 +562,7 @@ int *popen_re_unbuffered(char *command) { if ((hydra_pid = fork()) < 0) { g_warning("popen_rw_unbuffered: Error forking!"); return NULL; - } else if (hydra_pid == 0) { /* child */ + } else if (hydra_pid == 0) { /* child */ int k; if (setpgid(getpid(), getpid()) < 0) @@ -597,7 +583,7 @@ int *popen_re_unbuffered(char *command) { if (close(p_e[1]) < 0) g_warning("popen_rw_unbuffered: close(p_e[1]) failed"); - (void) hydra_get_options(options); + (void)hydra_get_options(options); execv(HYDRA_BIN, options); @@ -607,7 +593,7 @@ int *popen_re_unbuffered(char *command) { g_warning("%s", options[k]); } gtk_main_quit(); - } else { /* parent */ + } else { /* parent */ if (close(p_r[1]) < 0) g_warning("popen_rw_unbuffered: close(p_r[1]) (parent) failed"); if (close(p_e[1]) < 0) @@ -620,32 +606,25 @@ int *popen_re_unbuffered(char *command) { return pfd; } -void on_quit1_activate(GtkMenuItem * menuitem, gpointer user_data) { - gtk_main_quit(); -} +void on_quit1_activate(GtkMenuItem *menuitem, gpointer user_data) { gtk_main_quit(); } +void on_about1_activate(GtkMenuItem *menuitem, gpointer user_data) {} -void on_about1_activate(GtkMenuItem * menuitem, gpointer user_data) { - -} - -void on_btnStart_clicked(GtkButton * button, gpointer user_data) { +void on_btnStart_clicked(GtkButton *button, gpointer user_data) { int *fd = NULL; fd = popen_re_unbuffered(NULL); g_timeout_add(200, wait_hydra_output, fd); - } -void on_btnStop_clicked(GtkButton * button, gpointer user_data) { +void on_btnStop_clicked(GtkButton *button, gpointer user_data) { if (hydra_pid != 0) { kill(hydra_pid, SIGTERM); hydra_pid = 0; } } - -void on_wndMain_destroy(GtkObject * object, gpointer user_data) { +void on_wndMain_destroy(GtkObject *object, gpointer user_data) { if (hydra_pid != 0) { kill(hydra_pid, SIGTERM); hydra_pid = 0; @@ -653,35 +632,31 @@ void on_wndMain_destroy(GtkObject * object, gpointer user_data) { gtk_main_quit(); } - - -gboolean on_entTargetFile_button_press_event(GtkWidget * widget, GdkEventButton * event, gpointer user_data) { - hydra_select_file((GtkEntry *) widget, "Select target list"); +gboolean on_entTargetFile_button_press_event(GtkWidget *widget, GdkEventButton *event, gpointer user_data) { + hydra_select_file((GtkEntry *)widget, "Select target list"); gtk_widget_grab_focus(widget); return TRUE; } - -gboolean on_entUsernameFile_button_press_event(GtkWidget * widget, GdkEventButton * event, gpointer user_data) { - hydra_select_file((GtkEntry *) widget, "Select username list"); +gboolean on_entUsernameFile_button_press_event(GtkWidget *widget, GdkEventButton *event, gpointer user_data) { + hydra_select_file((GtkEntry *)widget, "Select username list"); gtk_widget_grab_focus(widget); return TRUE; } - -gboolean on_entPassFile_button_press_event(GtkWidget * widget, GdkEventButton * event, gpointer user_data) { - hydra_select_file((GtkEntry *) widget, "Select password list"); +gboolean on_entPassFile_button_press_event(GtkWidget *widget, GdkEventButton *event, gpointer user_data) { + hydra_select_file((GtkEntry *)widget, "Select password list"); gtk_widget_grab_focus(widget); return TRUE; } -gboolean on_entColonFile_button_press_event(GtkWidget * widget, GdkEventButton * event, gpointer user_data) { - hydra_select_file((GtkEntry *) widget, "Select colon separated user,password list"); +gboolean on_entColonFile_button_press_event(GtkWidget *widget, GdkEventButton *event, gpointer user_data) { + hydra_select_file((GtkEntry *)widget, "Select colon separated user,password list"); gtk_widget_grab_focus(widget); return TRUE; } -void on_btnSave_clicked(GtkButton * button, gpointer user_data) { +void on_btnSave_clicked(GtkButton *button, gpointer user_data) { #ifdef GTK_TYPE_FILE_CHOOSER GtkWidget *dialog; char *filename; @@ -692,13 +667,12 @@ void on_btnSave_clicked(GtkButton * button, gpointer user_data) { GtkTextIter start; GtkTextIter end; - dialog = gtk_file_chooser_dialog_new("Save output", (GtkWindow *) wndMain, GTK_FILE_CHOOSER_ACTION_SAVE, - GTK_STOCK_SAVE, GTK_RESPONSE_ACCEPT, GTK_STOCK_CANCEL, GTK_RESPONSE_CANCEL, NULL); + dialog = gtk_file_chooser_dialog_new("Save output", (GtkWindow *)wndMain, GTK_FILE_CHOOSER_ACTION_SAVE, GTK_STOCK_SAVE, GTK_RESPONSE_ACCEPT, GTK_STOCK_CANCEL, GTK_RESPONSE_CANCEL, NULL); if (gtk_dialog_run(GTK_DIALOG(dialog)) == GTK_RESPONSE_ACCEPT) { filename = gtk_file_chooser_get_filename(GTK_FILE_CHOOSER(dialog)); output = lookup_widget(GTK_WIDGET(wndMain), "txtOutput"); - outputbuf = gtk_text_view_get_buffer((GtkTextView *) output); + outputbuf = gtk_text_view_get_buffer((GtkTextView *)output); gtk_text_buffer_get_start_iter(outputbuf, &start); gtk_text_buffer_get_end_iter(outputbuf, &end); @@ -716,10 +690,11 @@ void on_btnSave_clicked(GtkButton * button, gpointer user_data) { #endif } -void on_chkColon_toggled(GtkToggleButton * togglebutton, gpointer user_data) { +void on_chkColon_toggled(GtkToggleButton *togglebutton, gpointer user_data) { GtkWidget *user, *pass; - user = lookup_widget(GTK_WIDGET(wndMain), "frmUsername");; + user = lookup_widget(GTK_WIDGET(wndMain), "frmUsername"); + ; pass = lookup_widget(GTK_WIDGET(wndMain), "frmPass"); if (gtk_toggle_button_get_active(togglebutton)) { @@ -731,10 +706,11 @@ void on_chkColon_toggled(GtkToggleButton * togglebutton, gpointer user_data) { } } -void on_chkDisUser_toggled(GtkToggleButton * togglebutton, gpointer user_data) { +void on_chkDisUser_toggled(GtkToggleButton *togglebutton, gpointer user_data) { GtkWidget *radioUsername1, *radioUsername2, *entUsername, *entUsernameFile; - radioUsername1 = lookup_widget(GTK_WIDGET(wndMain), "radioUsername1");; + radioUsername1 = lookup_widget(GTK_WIDGET(wndMain), "radioUsername1"); + ; radioUsername2 = lookup_widget(GTK_WIDGET(wndMain), "radioUsername2"); entUsername = lookup_widget(GTK_WIDGET(wndMain), "entUsername"); entUsernameFile = lookup_widget(GTK_WIDGET(wndMain), "entUsernameFile"); @@ -752,11 +728,11 @@ void on_chkDisUser_toggled(GtkToggleButton * togglebutton, gpointer user_data) { } } -void on_btnClear_clicked(GtkButton * button, gpointer user_data) { +void on_btnClear_clicked(GtkButton *button, gpointer user_data) { GtkWidget *output; GtkTextBuffer *outputbuf; output = lookup_widget(GTK_WIDGET(wndMain), "txtOutput"); - outputbuf = gtk_text_view_get_buffer((GtkTextView *) output); + outputbuf = gtk_text_view_get_buffer((GtkTextView *)output); gtk_text_buffer_set_text(outputbuf, "", -1); } diff --git a/hydra-gtk/src/callbacks.h b/hydra-gtk/src/callbacks.h index dd213fa..3b92c42 100644 --- a/hydra-gtk/src/callbacks.h +++ b/hydra-gtk/src/callbacks.h @@ -2,28 +2,28 @@ int update_statusbar(); -void on_quit1_activate(GtkMenuItem * menuitem, gpointer user_data); +void on_quit1_activate(GtkMenuItem *menuitem, gpointer user_data); -void on_about1_activate(GtkMenuItem * menuitem, gpointer user_data); +void on_about1_activate(GtkMenuItem *menuitem, gpointer user_data); -void on_btnStart_clicked(GtkButton * button, gpointer user_data); +void on_btnStart_clicked(GtkButton *button, gpointer user_data); -void on_wndMain_destroy(GtkObject * object, gpointer user_data); +void on_wndMain_destroy(GtkObject *object, gpointer user_data); -void on_btnStop_clicked(GtkButton * button, gpointer user_data); +void on_btnStop_clicked(GtkButton *button, gpointer user_data); -gboolean on_entTargetFile_button_press_event(GtkWidget * widget, GdkEventButton * event, gpointer user_data); +gboolean on_entTargetFile_button_press_event(GtkWidget *widget, GdkEventButton *event, gpointer user_data); -gboolean on_entUsernameFile_button_press_event(GtkWidget * widget, GdkEventButton * event, gpointer user_data); +gboolean on_entUsernameFile_button_press_event(GtkWidget *widget, GdkEventButton *event, gpointer user_data); -gboolean on_entPassFile_button_press_event(GtkWidget * widget, GdkEventButton * event, gpointer user_data); +gboolean on_entPassFile_button_press_event(GtkWidget *widget, GdkEventButton *event, gpointer user_data); -void on_btnSave_clicked(GtkButton * button, gpointer user_data); +void on_btnSave_clicked(GtkButton *button, gpointer user_data); -gboolean on_entColonFile_button_press_event(GtkWidget * widget, GdkEventButton * event, gpointer user_data); +gboolean on_entColonFile_button_press_event(GtkWidget *widget, GdkEventButton *event, gpointer user_data); -void on_chkColon_toggled(GtkToggleButton * togglebutton, gpointer user_data); +void on_chkColon_toggled(GtkToggleButton *togglebutton, gpointer user_data); -void on_btnClear_clicked(GtkButton * button, gpointer user_data); +void on_btnClear_clicked(GtkButton *button, gpointer user_data); -void on_chkDisUser_toggled(GtkToggleButton * togglebutton, gpointer user_data); +void on_chkDisUser_toggled(GtkToggleButton *togglebutton, gpointer user_data); diff --git a/hydra-gtk/src/interface.c b/hydra-gtk/src/interface.c index 7c002dc..e6262e1 100644 --- a/hydra-gtk/src/interface.c +++ b/hydra-gtk/src/interface.c @@ -7,13 +7,13 @@ #include #endif -#include #include +#include #ifdef HAVE_UNISTD_H #include #endif -#include #include +#include #include #include @@ -22,12 +22,9 @@ #include "interface.h" #include "support.h" -#define GLADE_HOOKUP_OBJECT(component,widget,name) \ - g_object_set_data_full (G_OBJECT (component), name, \ - gtk_widget_ref (widget), (GDestroyNotify) gtk_widget_unref) +#define GLADE_HOOKUP_OBJECT(component, widget, name) g_object_set_data_full(G_OBJECT(component), name, gtk_widget_ref(widget), (GDestroyNotify)gtk_widget_unref) -#define GLADE_HOOKUP_OBJECT_NO_REF(component,widget,name) \ - g_object_set_data (G_OBJECT (component), name, widget) +#define GLADE_HOOKUP_OBJECT_NO_REF(component, widget, name) g_object_set_data(G_OBJECT(component), name, widget) GtkWidget *create_wndMain(void) { GtkWidget *wndMain; @@ -224,7 +221,7 @@ GtkWidget *create_wndMain(void) { g_object_set_data(G_OBJECT(GTK_COMBO(cmbProtocol)->popwin), "GladeParentKey", cmbProtocol); gtk_widget_set_name(cmbProtocol, "cmbProtocol"); gtk_widget_show(cmbProtocol); - gtk_table_attach(GTK_TABLE(table8), cmbProtocol, 1, 2, 4, 5, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table8), cmbProtocol, 1, 2, 4, 5, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "adam6500"); cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "afp"); cmbProtocol_items = g_list_append(cmbProtocol_items, (gpointer) "asterisk"); @@ -299,53 +296,52 @@ GtkWidget *create_wndMain(void) { label7 = gtk_label_new("Protocol"); gtk_widget_set_name(label7, "label7"); gtk_widget_show(label7); - gtk_table_attach(GTK_TABLE(table8), label7, 0, 1, 4, 5, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table8), label7, 0, 1, 4, 5, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_misc_set_alignment(GTK_MISC(label7), 0, 0.5); spnPort_adj = gtk_adjustment_new(0, 0, 65535, 1, 10, 0); spnPort = gtk_spin_button_new(GTK_ADJUSTMENT(spnPort_adj), 1, 0); gtk_widget_set_name(spnPort, "spnPort"); gtk_widget_show(spnPort); - gtk_table_attach(GTK_TABLE(table8), spnPort, 1, 2, 3, 4, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table8), spnPort, 1, 2, 3, 4, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_tooltips_set_tip(tooltips, spnPort, "select the port on which the daemon you want to brute force runs, 0 means default", NULL); label6 = gtk_label_new("Port"); gtk_widget_set_name(label6, "label6"); gtk_widget_show(label6); - gtk_table_attach(GTK_TABLE(table8), label6, 0, 1, 3, 4, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table8), label6, 0, 1, 3, 4, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_misc_set_alignment(GTK_MISC(label6), 0, 0.5); - chkIPV6 = gtk_check_button_new_with_mnemonic("Prefer IPV6"); gtk_widget_set_name(chkIPV6, "chkIPV6"); gtk_widget_show(chkIPV6); - gtk_table_attach(GTK_TABLE(table8), chkIPV6, 0, 2, 2, 3, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table8), chkIPV6, 0, 2, 2, 3, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_tooltips_set_tip(tooltips, chkIPV6, "Enable to use IPV6", NULL); radioTarget2 = gtk_radio_button_new_with_mnemonic(NULL, "Target List"); gtk_widget_set_name(radioTarget2, "radioTarget2"); gtk_widget_show(radioTarget2); - gtk_table_attach(GTK_TABLE(table8), radioTarget2, 0, 1, 1, 2, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table8), radioTarget2, 0, 1, 1, 2, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_radio_button_set_group(GTK_RADIO_BUTTON(radioTarget2), radioTarget2_group); radioTarget2_group = gtk_radio_button_get_group(GTK_RADIO_BUTTON(radioTarget2)); entTargetFile = gtk_entry_new(); gtk_widget_set_name(entTargetFile, "entTargetFile"); gtk_widget_show(entTargetFile); - gtk_table_attach(GTK_TABLE(table8), entTargetFile, 1, 2, 1, 2, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table8), entTargetFile, 1, 2, 1, 2, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_tooltips_set_tip(tooltips, entTargetFile, "A file which contains the targets to attack. One entry per line. IP\naddresses and/or DNS names.", NULL); entTarget = gtk_entry_new(); gtk_widget_set_name(entTarget, "entTarget"); gtk_widget_show(entTarget); - gtk_table_attach(GTK_TABLE(table8), entTarget, 1, 2, 0, 1, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table8), entTarget, 1, 2, 0, 1, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_tooltips_set_tip(tooltips, entTarget, "The target to attack - DNS name or IP address", NULL); gtk_entry_set_text(GTK_ENTRY(entTarget), "127.0.0.1"); radioTarget1 = gtk_radio_button_new_with_mnemonic(NULL, "Single Target"); gtk_widget_set_name(radioTarget1, "radioTarget1"); gtk_widget_show(radioTarget1); - gtk_table_attach(GTK_TABLE(table8), radioTarget1, 0, 1, 0, 1, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table8), radioTarget1, 0, 1, 0, 1, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_radio_button_set_group(GTK_RADIO_BUTTON(radioTarget1), radioTarget2_group); radioTarget2_group = gtk_radio_button_get_group(GTK_RADIO_BUTTON(radioTarget1)); gtk_toggle_button_set_active(GTK_TOGGLE_BUTTON(radioTarget1), TRUE); @@ -368,50 +364,44 @@ GtkWidget *create_wndMain(void) { chkVerbose = gtk_check_button_new_with_mnemonic("Be Verbose"); gtk_widget_set_name(chkVerbose, "chkVerbose"); gtk_widget_show(chkVerbose); - gtk_table_attach(GTK_TABLE(table9), chkVerbose, 2, 3, 0, 1, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table9), chkVerbose, 2, 3, 0, 1, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_tooltips_set_tip(tooltips, chkVerbose, "be verbose", NULL); chkDebug = gtk_check_button_new_with_mnemonic("Debug"); gtk_widget_set_name(chkDebug, "chkDebug"); gtk_widget_show(chkDebug); - gtk_table_attach(GTK_TABLE(table9), chkDebug, 2, 3, 1, 2, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table9), chkDebug, 2, 3, 1, 2, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_tooltips_set_tip(tooltips, chkDebug, "Enable debug mode", NULL); chkAttempts = gtk_check_button_new_with_mnemonic("Show Attempts"); gtk_widget_set_name(chkAttempts, "chkAttempts"); gtk_widget_show(chkAttempts); - gtk_table_attach(GTK_TABLE(table9), chkAttempts, 0, 2, 1, 2, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table9), chkAttempts, 0, 2, 1, 2, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_tooltips_set_tip(tooltips, chkAttempts, "Show attempts", NULL); chkSSL = gtk_check_button_new_with_mnemonic("Use SSL"); gtk_widget_set_name(chkSSL, "chkSSL"); gtk_widget_show(chkSSL); - gtk_table_attach(GTK_TABLE(table9), chkSSL, 0, 1, 0, 1, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table9), chkSSL, 0, 1, 0, 1, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_tooltips_set_tip(tooltips, chkSSL, "Enable to use SSL (the target must have SSL enabled!)", NULL); - chkServiceDetails = gtk_check_button_new_with_mnemonic ("Service Module Usage Details"); - gtk_widget_set_name (chkServiceDetails, "chkServiceDetails"); - gtk_widget_show (chkServiceDetails); - gtk_table_attach (GTK_TABLE (table9), chkServiceDetails, 2, 3, 2, 3, - (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), - (GtkAttachOptions) (GTK_EXPAND), 0, 0); - gtk_tooltips_set_tip (tooltips, chkServiceDetails, "Service Module Usage Details", NULL); + chkServiceDetails = gtk_check_button_new_with_mnemonic("Service Module Usage Details"); + gtk_widget_set_name(chkServiceDetails, "chkServiceDetails"); + gtk_widget_show(chkServiceDetails); + gtk_table_attach(GTK_TABLE(table9), chkServiceDetails, 2, 3, 2, 3, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); + gtk_tooltips_set_tip(tooltips, chkServiceDetails, "Service Module Usage Details", NULL); - chkCompleteHelp = gtk_check_button_new_with_mnemonic ("COMPLETE HELP"); - gtk_widget_set_name (chkCompleteHelp, "chkCompleteHelp"); - gtk_widget_show (chkCompleteHelp); - gtk_table_attach (GTK_TABLE (table9), chkCompleteHelp, 0, 2, 2, 3, - (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), - (GtkAttachOptions) (GTK_EXPAND), 0, 0); - gtk_tooltips_set_tip (tooltips, chkCompleteHelp, "Complete Help", NULL); + chkCompleteHelp = gtk_check_button_new_with_mnemonic("COMPLETE HELP"); + gtk_widget_set_name(chkCompleteHelp, "chkCompleteHelp"); + gtk_widget_show(chkCompleteHelp); + gtk_table_attach(GTK_TABLE(table9), chkCompleteHelp, 0, 2, 2, 3, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); + gtk_tooltips_set_tip(tooltips, chkCompleteHelp, "Complete Help", NULL); - chkOldSSL = gtk_check_button_new_with_mnemonic ("Use old SSL"); - gtk_widget_set_name (chkOldSSL, "chkOldSSL"); - gtk_widget_show (chkOldSSL); - gtk_table_attach (GTK_TABLE (table9), chkOldSSL, 1, 2, 0, 1, - (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), - (GtkAttachOptions) (GTK_EXPAND), 0, 0); - gtk_tooltips_set_tip (tooltips, chkOldSSL, "Enable to use old SSL (the target must have SSL enabled!)", NULL); + chkOldSSL = gtk_check_button_new_with_mnemonic("Use old SSL"); + gtk_widget_set_name(chkOldSSL, "chkOldSSL"); + gtk_widget_show(chkOldSSL); + gtk_table_attach(GTK_TABLE(table9), chkOldSSL, 1, 2, 0, 1, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); + gtk_tooltips_set_tip(tooltips, chkOldSSL, "Enable to use old SSL (the target must have SSL enabled!)", NULL); label29 = gtk_label_new("Output Options"); gtk_widget_set_name(label29, "label29"); @@ -441,20 +431,20 @@ GtkWidget *create_wndMain(void) { entUsernameFile = gtk_entry_new(); gtk_widget_set_name(entUsernameFile, "entUsernameFile"); gtk_widget_show(entUsernameFile); - gtk_table_attach(GTK_TABLE(table2), entUsernameFile, 1, 2, 1, 2, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), 0, 0); + gtk_table_attach(GTK_TABLE(table2), entUsernameFile, 1, 2, 1, 2, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), 0, 0); gtk_tooltips_set_tip(tooltips, entUsernameFile, "File with user logins, one entry per line", NULL); entUsername = gtk_entry_new(); gtk_widget_set_name(entUsername, "entUsername"); gtk_widget_show(entUsername); - gtk_table_attach(GTK_TABLE(table2), entUsername, 1, 2, 0, 1, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), 0, 0); + gtk_table_attach(GTK_TABLE(table2), entUsername, 1, 2, 0, 1, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), 0, 0); gtk_tooltips_set_tip(tooltips, entUsername, "The login to use", NULL); gtk_entry_set_text(GTK_ENTRY(entUsername), "yourname"); radioUsername1 = gtk_radio_button_new_with_mnemonic(NULL, "Username"); gtk_widget_set_name(radioUsername1, "radioUsername1"); gtk_widget_show(radioUsername1); - gtk_table_attach(GTK_TABLE(table2), radioUsername1, 0, 1, 0, 1, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), 0, 0); + gtk_table_attach(GTK_TABLE(table2), radioUsername1, 0, 1, 0, 1, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), 0, 0); gtk_radio_button_set_group(GTK_RADIO_BUTTON(radioUsername1), radioUsername1_group); radioUsername1_group = gtk_radio_button_get_group(GTK_RADIO_BUTTON(radioUsername1)); gtk_toggle_button_set_active(GTK_TOGGLE_BUTTON(radioUsername1), TRUE); @@ -462,20 +452,20 @@ GtkWidget *create_wndMain(void) { radioUsername2 = gtk_radio_button_new_with_mnemonic(NULL, "Username List"); gtk_widget_set_name(radioUsername2, "radioUsername2"); gtk_widget_show(radioUsername2); - gtk_table_attach(GTK_TABLE(table2), radioUsername2, 0, 1, 1, 2, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), 0, 0); + gtk_table_attach(GTK_TABLE(table2), radioUsername2, 0, 1, 1, 2, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), 0, 0); gtk_radio_button_set_group(GTK_RADIO_BUTTON(radioUsername2), radioUsername1_group); radioUsername1_group = gtk_radio_button_get_group(GTK_RADIO_BUTTON(radioUsername2)); chkUsernameLoop = gtk_check_button_new_with_mnemonic("Loop around users"); gtk_widget_set_name(chkUsernameLoop, "chkUsernameLoop"); gtk_widget_show(chkUsernameLoop); - gtk_table_attach(GTK_TABLE(table2), chkUsernameLoop, 0, 1, 2, 3, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table2), chkUsernameLoop, 0, 1, 2, 3, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_tooltips_set_tip(tooltips, chkUsernameLoop, "Enable this option to loop around users not passwords", NULL); chkDisUser = gtk_check_button_new_with_mnemonic("Protocol does not require usernames"); gtk_widget_set_name(chkDisUser, "chkDisUser"); gtk_widget_show(chkDisUser); - gtk_table_attach(GTK_TABLE (table2), chkDisUser, 1, 2, 2, 3, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table2), chkDisUser, 1, 2, 2, 3, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_tooltips_set_tip(tooltips, chkDisUser, "Protocols like Cisco, Cisco enable, redis, Oracle listener, SNMP, S7-300, VNC etc. are not using usernames", NULL); label8 = gtk_label_new("Username"); @@ -488,7 +478,7 @@ GtkWidget *create_wndMain(void) { gtk_widget_show(frmPass); gtk_box_pack_start(GTK_BOX(vbox2), frmPass, TRUE, TRUE, 0); - table3 = gtk_table_new (3, 2, FALSE); + table3 = gtk_table_new(3, 2, FALSE); gtk_widget_set_name(table3, "table3"); gtk_widget_show(table3); gtk_container_add(GTK_CONTAINER(frmPass), table3); @@ -496,20 +486,20 @@ GtkWidget *create_wndMain(void) { entPassFile = gtk_entry_new(); gtk_widget_set_name(entPassFile, "entPassFile"); gtk_widget_show(entPassFile); - gtk_table_attach(GTK_TABLE(table3), entPassFile, 1, 2, 1, 2, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), 0, 0); + gtk_table_attach(GTK_TABLE(table3), entPassFile, 1, 2, 1, 2, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), 0, 0); gtk_tooltips_set_tip(tooltips, entPassFile, "File with passwords to try, one entry per line", NULL); entPass = gtk_entry_new(); gtk_widget_set_name(entPass, "entPass"); gtk_widget_show(entPass); - gtk_table_attach(GTK_TABLE(table3), entPass, 1, 2, 0, 1, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), 0, 0); + gtk_table_attach(GTK_TABLE(table3), entPass, 1, 2, 0, 1, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), 0, 0); gtk_tooltips_set_tip(tooltips, entPass, "The password to try", NULL); gtk_entry_set_text(GTK_ENTRY(entPass), "yourpass"); radioPass1 = gtk_radio_button_new_with_mnemonic(NULL, "Password"); gtk_widget_set_name(radioPass1, "radioPass1"); gtk_widget_show(radioPass1); - gtk_table_attach(GTK_TABLE(table3), radioPass1, 0, 1, 0, 1, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), 0, 0); + gtk_table_attach(GTK_TABLE(table3), radioPass1, 0, 1, 0, 1, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), 0, 0); gtk_radio_button_set_group(GTK_RADIO_BUTTON(radioPass1), radioPass1_group); radioPass1_group = gtk_radio_button_get_group(GTK_RADIO_BUTTON(radioPass1)); gtk_toggle_button_set_active(GTK_TOGGLE_BUTTON(radioPass1), TRUE); @@ -517,26 +507,22 @@ GtkWidget *create_wndMain(void) { radioPass2 = gtk_radio_button_new_with_mnemonic(NULL, "Password List"); gtk_widget_set_name(radioPass2, "radioPass2"); gtk_widget_show(radioPass2); - gtk_table_attach(GTK_TABLE(table3), radioPass2, 0, 1, 1, 2, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), 0, 0); + gtk_table_attach(GTK_TABLE(table3), radioPass2, 0, 1, 1, 2, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), 0, 0); gtk_radio_button_set_group(GTK_RADIO_BUTTON(radioPass2), radioPass1_group); radioPass1_group = gtk_radio_button_get_group(GTK_RADIO_BUTTON(radioPass2)); - radioGenerate = gtk_radio_button_new_with_mnemonic (NULL, "Generate"); - gtk_widget_set_name (radioGenerate, "radioGenerate"); - gtk_widget_show (radioGenerate); - gtk_table_attach (GTK_TABLE (table3), radioGenerate, 0, 1, 2, 3, - (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), - (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), 0, 0); - gtk_radio_button_set_group (GTK_RADIO_BUTTON (radioGenerate), radioPass1_group); - radioPass1_group = gtk_radio_button_get_group (GTK_RADIO_BUTTON (radioGenerate)); + radioGenerate = gtk_radio_button_new_with_mnemonic(NULL, "Generate"); + gtk_widget_set_name(radioGenerate, "radioGenerate"); + gtk_widget_show(radioGenerate); + gtk_table_attach(GTK_TABLE(table3), radioGenerate, 0, 1, 2, 3, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), 0, 0); + gtk_radio_button_set_group(GTK_RADIO_BUTTON(radioGenerate), radioPass1_group); + radioPass1_group = gtk_radio_button_get_group(GTK_RADIO_BUTTON(radioGenerate)); - entGeneration = gtk_entry_new (); - gtk_widget_set_name (entGeneration, "entGeneration"); - gtk_widget_show (entGeneration); - gtk_table_attach (GTK_TABLE (table3), entGeneration, 1, 2, 2, 3, - (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), - (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), 0, 0); - gtk_tooltips_set_tip (tooltips, entGeneration, "Generate passwords", NULL); - gtk_entry_set_text (GTK_ENTRY (entGeneration), "1:1:a"); + entGeneration = gtk_entry_new(); + gtk_widget_set_name(entGeneration, "entGeneration"); + gtk_widget_show(entGeneration); + gtk_table_attach(GTK_TABLE(table3), entGeneration, 1, 2, 2, 3, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), 0, 0); + gtk_tooltips_set_tip(tooltips, entGeneration, "Generate passwords", NULL); + gtk_entry_set_text(GTK_ENTRY(entGeneration), "1:1:a"); labelpass = gtk_label_new("Password"); gtk_widget_set_name(labelpass, "labelpass"); @@ -556,13 +542,13 @@ GtkWidget *create_wndMain(void) { chkColon = gtk_check_button_new_with_mnemonic("Use Colon separated file"); gtk_widget_set_name(chkColon, "chkColon"); gtk_widget_show(chkColon); - gtk_table_attach(GTK_TABLE(table5), chkColon, 0, 1, 0, 1, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table5), chkColon, 0, 1, 0, 1, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_tooltips_set_tip(tooltips, chkColon, "Enable this option to use a colon file for login/password attempts", NULL); entColonFile = gtk_entry_new(); gtk_widget_set_name(entColonFile, "entColonFile"); gtk_widget_show(entColonFile); - gtk_table_attach(GTK_TABLE(table5), entColonFile, 1, 2, 0, 1, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table5), entColonFile, 1, 2, 0, 1, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_tooltips_set_tip(tooltips, entColonFile, "The colon file to use, each line has to be structured like \"mylogin:mypass\"", NULL); label20 = gtk_label_new("Colon separated file"); @@ -578,21 +564,21 @@ GtkWidget *create_wndMain(void) { chkPassLogin = gtk_check_button_new_with_mnemonic("Try login as password"); gtk_widget_set_name(chkPassLogin, "chkPassLogin"); gtk_widget_show(chkPassLogin); - gtk_table_attach(GTK_TABLE(table6), chkPassLogin, 0, 1, 0, 1, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table6), chkPassLogin, 0, 1, 0, 1, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_tooltips_set_tip(tooltips, chkPassLogin, "Enable this option to try the login as password, in addition to the password/file", NULL); chkPassNull = gtk_check_button_new_with_mnemonic("Try empty password"); gtk_widget_set_name(chkPassNull, "chkPassNull"); gtk_widget_show(chkPassNull); - gtk_table_attach(GTK_TABLE(table6), chkPassNull, 1, 2, 0, 1, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table6), chkPassNull, 1, 2, 0, 1, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_tooltips_set_tip(tooltips, chkPassNull, "Enable this option to try an empty password, in addition to the password/file", NULL); - chkPassReverse = gtk_check_button_new_with_mnemonic ("Try reversed login"); - gtk_widget_set_name (chkPassReverse, "chkPassReverse"); - gtk_widget_show (chkPassReverse); - gtk_table_attach (GTK_TABLE (table6), chkPassReverse, 2, 3, 0, 1, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); - gtk_tooltips_set_tip (tooltips, chkPassReverse, "Enable this option to try an reverse password, in addition to the password/file", NULL); - + chkPassReverse = gtk_check_button_new_with_mnemonic("Try reversed login"); + gtk_widget_set_name(chkPassReverse, "chkPassReverse"); + gtk_widget_show(chkPassReverse); + gtk_table_attach(GTK_TABLE(table6), chkPassReverse, 2, 3, 0, 1, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); + gtk_tooltips_set_tip(tooltips, chkPassReverse, "Enable this option to try an reverse password, in addition to the password/file", NULL); + label2 = gtk_label_new("Passwords"); gtk_widget_set_name(label2, "label2"); gtk_widget_show(label2); @@ -606,7 +592,7 @@ GtkWidget *create_wndMain(void) { frame9 = gtk_frame_new(NULL); gtk_widget_set_name(frame9, "frame9"); gtk_widget_show(frame9); - gtk_table_attach(GTK_TABLE(table4), frame9, 0, 1, 1, 2, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK | GTK_FILL), (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK | GTK_FILL), 0, 0); + gtk_table_attach(GTK_TABLE(table4), frame9, 0, 1, 1, 2, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK | GTK_FILL), (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK | GTK_FILL), 0, 0); table7 = gtk_table_new(5, 2, FALSE); gtk_widget_set_name(table7, "table7"); @@ -616,58 +602,58 @@ GtkWidget *create_wndMain(void) { label22 = gtk_label_new("Proxy "); gtk_widget_set_name(label22, "label22"); gtk_widget_show(label22); - gtk_table_attach(GTK_TABLE(table7), label22, 0, 1, 1, 2, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table7), label22, 0, 1, 1, 2, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_misc_set_alignment(GTK_MISC(label22), 0, 0.5); entHTTPProxy = gtk_entry_new(); gtk_widget_set_name(entHTTPProxy, "entHTTPProxy"); gtk_widget_show(entHTTPProxy); - gtk_table_attach(GTK_TABLE(table7), entHTTPProxy, 1, 2, 1, 2, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table7), entHTTPProxy, 1, 2, 1, 2, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_tooltips_set_tip(tooltips, entHTTPProxy, "The address of the proxy. Syntax: \"http://123.45.67.89:8080\"", NULL); gtk_entry_set_text(GTK_ENTRY(entHTTPProxy), "http://127.0.0.1:8080"); chkProxyAuth = gtk_check_button_new_with_mnemonic("Proxy needs authentication"); gtk_widget_set_name(chkProxyAuth, "chkProxyAuth"); gtk_widget_show(chkProxyAuth); - gtk_table_attach(GTK_TABLE(table7), chkProxyAuth, 0, 1, 2, 3, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table7), chkProxyAuth, 0, 1, 2, 3, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_tooltips_set_tip(tooltips, chkProxyAuth, "Enable this if the proxy requires authenticatio", NULL); label23 = gtk_label_new("Username"); gtk_widget_set_name(label23, "label23"); gtk_widget_show(label23); - gtk_table_attach(GTK_TABLE(table7), label23, 0, 1, 3, 4, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table7), label23, 0, 1, 3, 4, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_misc_set_alignment(GTK_MISC(label23), 0, 0.5); entProxyUser = gtk_entry_new(); gtk_widget_set_name(entProxyUser, "entProxyUser"); gtk_widget_show(entProxyUser); - gtk_table_attach(GTK_TABLE(table7), entProxyUser, 1, 2, 3, 4, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table7), entProxyUser, 1, 2, 3, 4, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_tooltips_set_tip(tooltips, entProxyUser, "The user name for proxy authentication", NULL); gtk_entry_set_text(GTK_ENTRY(entProxyUser), "yourname"); label24 = gtk_label_new("Password"); gtk_widget_set_name(label24, "label24"); gtk_widget_show(label24); - gtk_table_attach(GTK_TABLE(table7), label24, 0, 1, 4, 5, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table7), label24, 0, 1, 4, 5, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_misc_set_alignment(GTK_MISC(label24), 0, 0.5); entProxyPass = gtk_entry_new(); gtk_widget_set_name(entProxyPass, "entProxyPass"); gtk_widget_show(entProxyPass); - gtk_table_attach(GTK_TABLE(table7), entProxyPass, 1, 2, 4, 5, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table7), entProxyPass, 1, 2, 4, 5, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_tooltips_set_tip(tooltips, entProxyPass, "The password for proxy authentication", NULL); gtk_entry_set_text(GTK_ENTRY(entProxyPass), "yourpass"); label26 = gtk_label_new(""); gtk_widget_set_name(label26, "label26"); gtk_widget_show(label26); - gtk_table_attach(GTK_TABLE(table7), label26, 1, 2, 2, 3, (GtkAttachOptions) (GTK_FILL), (GtkAttachOptions) (0), 0, 0); + gtk_table_attach(GTK_TABLE(table7), label26, 1, 2, 2, 3, (GtkAttachOptions)(GTK_FILL), (GtkAttachOptions)(0), 0, 0); gtk_misc_set_alignment(GTK_MISC(label26), 0, 0.5); hbox3 = gtk_hbox_new(FALSE, 0); gtk_widget_set_name(hbox3, "hbox3"); gtk_widget_show(hbox3); - gtk_table_attach(GTK_TABLE(table7), hbox3, 0, 2, 0, 1, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK | GTK_FILL), (GtkAttachOptions) (GTK_EXPAND | GTK_FILL), 0, 0); + gtk_table_attach(GTK_TABLE(table7), hbox3, 0, 2, 0, 1, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK | GTK_FILL), (GtkAttachOptions)(GTK_EXPAND | GTK_FILL), 0, 0); radioProxy = gtk_radio_button_new_with_mnemonic(NULL, "No Proxy"); gtk_widget_set_name(radioProxy, "radioProxy"); @@ -701,7 +687,7 @@ GtkWidget *create_wndMain(void) { frame13 = gtk_frame_new(NULL); gtk_widget_set_name(frame13, "frame13"); gtk_widget_show(frame13); - gtk_table_attach(GTK_TABLE(table4), frame13, 0, 1, 0, 1, (GtkAttachOptions) (GTK_FILL), (GtkAttachOptions) (GTK_EXPAND | GTK_FILL), 0, 0); + gtk_table_attach(GTK_TABLE(table4), frame13, 0, 1, 0, 1, (GtkAttachOptions)(GTK_FILL), (GtkAttachOptions)(GTK_EXPAND | GTK_FILL), 0, 0); table10 = gtk_table_new(5, 2, FALSE); gtk_widget_set_name(table10, "table10"); @@ -711,50 +697,46 @@ GtkWidget *create_wndMain(void) { chkExitf = gtk_check_button_new_with_mnemonic("Exit after first found pair (per host)"); gtk_widget_set_name(chkExitf, "chkExitf"); gtk_widget_show(chkExitf); - gtk_table_attach(GTK_TABLE(table10), chkExitf, 0, 2, 2, 3, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table10), chkExitf, 0, 2, 2, 3, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_tooltips_set_tip(tooltips, chkExitf, "Enable this to stop all attacking processes once a valid login/password pair is found (per host)", NULL); spnTimeout_adj = gtk_adjustment_new(30, 0, 295, 1, 10, 0); spnTimeout = gtk_spin_button_new(GTK_ADJUSTMENT(spnTimeout_adj), 1, 0); gtk_widget_set_name(spnTimeout, "spnTimeout"); gtk_widget_show(spnTimeout); - gtk_table_attach(GTK_TABLE(table10), spnTimeout, 1, 2, 1, 2, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table10), spnTimeout, 1, 2, 1, 2, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_tooltips_set_tip(tooltips, spnTimeout, "The maximum timeout an attack process is waiting for a response from the target", NULL); spnTasks_adj = gtk_adjustment_new(16, 0, 128, 1, 10, 0); spnTasks = gtk_spin_button_new(GTK_ADJUSTMENT(spnTasks_adj), 1, 0); gtk_widget_set_name(spnTasks, "spnTasks"); gtk_widget_show(spnTasks); - gtk_table_attach(GTK_TABLE(table10), spnTasks, 1, 2, 0, 1, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table10), spnTasks, 1, 2, 0, 1, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_tooltips_set_tip(tooltips, spnTasks, "The number of attack tasks to run in parallel. The more the faster, the most: computer lockup :-) 16-64 is a good choice", NULL); label32 = gtk_label_new("Timeout"); gtk_widget_set_name(label32, "label32"); gtk_widget_show(label32); - gtk_table_attach(GTK_TABLE(table10), label32, 0, 1, 1, 2, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table10), label32, 0, 1, 1, 2, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_misc_set_alignment(GTK_MISC(label32), 0, 0.5); label31 = gtk_label_new("Number of Tasks"); gtk_widget_set_name(label31, "label31"); gtk_widget_show(label31); - gtk_table_attach(GTK_TABLE(table10), label31, 0, 1, 0, 1, (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions) (GTK_EXPAND), 0, 0); + gtk_table_attach(GTK_TABLE(table10), label31, 0, 1, 0, 1, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); gtk_misc_set_alignment(GTK_MISC(label31), 0, 0.5); - chkExitF = gtk_check_button_new_with_mnemonic ("Exit after first found pair (global)"); - gtk_widget_set_name (chkExitF, "chkExitF"); - gtk_widget_show (chkExitF); - gtk_table_attach (GTK_TABLE (table10), chkExitF, 0, 2, 3, 4, - (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), - (GtkAttachOptions) (GTK_EXPAND), 0, 0); - gtk_tooltips_set_tip (tooltips, chkExitF, "Enable this to stop all attacking processes once a valid login/password pair is found (global)", NULL); + chkExitF = gtk_check_button_new_with_mnemonic("Exit after first found pair (global)"); + gtk_widget_set_name(chkExitF, "chkExitF"); + gtk_widget_show(chkExitF); + gtk_table_attach(GTK_TABLE(table10), chkExitF, 0, 2, 3, 4, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); + gtk_tooltips_set_tip(tooltips, chkExitF, "Enable this to stop all attacking processes once a valid login/password pair is found (global)", NULL); - chkNoErr = gtk_check_button_new_with_mnemonic ("Do not print messages about connection errors"); - gtk_widget_set_name (chkNoErr, "chkNoErr"); - gtk_widget_show (chkNoErr); - gtk_table_attach (GTK_TABLE (table10), chkNoErr, 0, 2, 4, 5, - (GtkAttachOptions) (GTK_EXPAND | GTK_SHRINK), - (GtkAttachOptions) (GTK_EXPAND), 0, 0); - gtk_tooltips_set_tip (tooltips, chkNoErr, "Do not print messages about connection errors", NULL); + chkNoErr = gtk_check_button_new_with_mnemonic("Do not print messages about connection errors"); + gtk_widget_set_name(chkNoErr, "chkNoErr"); + gtk_widget_show(chkNoErr); + gtk_table_attach(GTK_TABLE(table10), chkNoErr, 0, 2, 4, 5, (GtkAttachOptions)(GTK_EXPAND | GTK_SHRINK), (GtkAttachOptions)(GTK_EXPAND), 0, 0); + gtk_tooltips_set_tip(tooltips, chkNoErr, "Do not print messages about connection errors", NULL); label30 = gtk_label_new("Performance Options"); gtk_widget_set_name(label30, "label30"); @@ -1038,18 +1020,18 @@ GtkWidget *create_wndMain(void) { gtk_widget_show(statusbar); gtk_box_pack_start(GTK_BOX(vbox1), statusbar, FALSE, FALSE, 0); - g_signal_connect((gpointer) wndMain, "destroy", G_CALLBACK(on_wndMain_destroy), NULL); - g_signal_connect((gpointer) quit1, "button-press-event", G_CALLBACK(on_quit1_activate), NULL); - g_signal_connect((gpointer) entTargetFile, "button_press_event", G_CALLBACK(on_entTargetFile_button_press_event), NULL); - g_signal_connect((gpointer) entUsernameFile, "button_press_event", G_CALLBACK(on_entUsernameFile_button_press_event), NULL); - g_signal_connect((gpointer) chkDisUser, "toggled", G_CALLBACK (on_chkDisUser_toggled), NULL); - g_signal_connect((gpointer) entPassFile, "button_press_event", G_CALLBACK(on_entPassFile_button_press_event), NULL); - g_signal_connect((gpointer) chkColon, "toggled", G_CALLBACK(on_chkColon_toggled), NULL); - g_signal_connect((gpointer) entColonFile, "button_press_event", G_CALLBACK(on_entColonFile_button_press_event), NULL); - g_signal_connect((gpointer) btnStart, "clicked", G_CALLBACK(on_btnStart_clicked), NULL); - g_signal_connect((gpointer) btnStop, "clicked", G_CALLBACK(on_btnStop_clicked), NULL); - g_signal_connect((gpointer) btnSave, "clicked", G_CALLBACK(on_btnSave_clicked), NULL); - g_signal_connect((gpointer) btnClear, "clicked", G_CALLBACK(on_btnClear_clicked), NULL); + g_signal_connect((gpointer)wndMain, "destroy", G_CALLBACK(on_wndMain_destroy), NULL); + g_signal_connect((gpointer)quit1, "button-press-event", G_CALLBACK(on_quit1_activate), NULL); + g_signal_connect((gpointer)entTargetFile, "button_press_event", G_CALLBACK(on_entTargetFile_button_press_event), NULL); + g_signal_connect((gpointer)entUsernameFile, "button_press_event", G_CALLBACK(on_entUsernameFile_button_press_event), NULL); + g_signal_connect((gpointer)chkDisUser, "toggled", G_CALLBACK(on_chkDisUser_toggled), NULL); + g_signal_connect((gpointer)entPassFile, "button_press_event", G_CALLBACK(on_entPassFile_button_press_event), NULL); + g_signal_connect((gpointer)chkColon, "toggled", G_CALLBACK(on_chkColon_toggled), NULL); + g_signal_connect((gpointer)entColonFile, "button_press_event", G_CALLBACK(on_entColonFile_button_press_event), NULL); + g_signal_connect((gpointer)btnStart, "clicked", G_CALLBACK(on_btnStart_clicked), NULL); + g_signal_connect((gpointer)btnStop, "clicked", G_CALLBACK(on_btnStop_clicked), NULL); + g_signal_connect((gpointer)btnSave, "clicked", G_CALLBACK(on_btnSave_clicked), NULL); + g_signal_connect((gpointer)btnClear, "clicked", G_CALLBACK(on_btnClear_clicked), NULL); /* Store pointers to all widgets, for use by lookup_widget(). */ GLADE_HOOKUP_OBJECT_NO_REF(wndMain, wndMain, "wndMain"); @@ -1090,7 +1072,7 @@ GtkWidget *create_wndMain(void) { GLADE_HOOKUP_OBJECT(wndMain, radioUsername1, "radioUsername1"); GLADE_HOOKUP_OBJECT(wndMain, chkUsernameLoop, "chkUsernameLoop"); GLADE_HOOKUP_OBJECT(wndMain, radioUsername2, "radioUsername2"); - GLADE_HOOKUP_OBJECT (wndMain, chkDisUser, "chkDisUser"); + GLADE_HOOKUP_OBJECT(wndMain, chkDisUser, "chkDisUser"); GLADE_HOOKUP_OBJECT(wndMain, label8, "label8"); GLADE_HOOKUP_OBJECT(wndMain, frmPass, "frmPass"); GLADE_HOOKUP_OBJECT(wndMain, table3, "table3"); diff --git a/hydra-gtk/src/main.c b/hydra-gtk/src/main.c index 931493b..03c5f21 100644 --- a/hydra-gtk/src/main.c +++ b/hydra-gtk/src/main.c @@ -8,17 +8,16 @@ #include #endif -#include -#include +#include "callbacks.h" #include "interface.h" #include "support.h" -#include "callbacks.h" +#include +#include char *hydra_path1 = "./hydra"; char *hydra_path2 = "/usr/local/bin/hydra"; char *hydra_path3 = "/usr/bin/hydra"; - int main(int argc, char *argv[]) { extern GtkWidget *wndMain; int i; @@ -60,7 +59,6 @@ int main(int argc, char *argv[]) { wndMain = create_wndMain(); gtk_widget_show(wndMain); - /* if we can't use the new cool file chooser, the save button gets disabled */ #ifndef GTK_TYPE_FILE_CHOOSER GtkWidget *btnSave; @@ -69,13 +67,12 @@ int main(int argc, char *argv[]) { gtk_widget_set_sensitive(btnSave, FALSE); #endif - /* update the statusbar every now and then */ g_timeout_add(600, update_statusbar, NULL); /* we want bold text in the output window */ output = lookup_widget(GTK_WIDGET(wndMain), "txtOutput"); - outputbuf = gtk_text_view_get_buffer((GtkTextView *) output); + outputbuf = gtk_text_view_get_buffer((GtkTextView *)output); gtk_text_buffer_create_tag(outputbuf, "bold", "weight", PANGO_WEIGHT_BOLD, NULL); /* he ho, lets go! */ diff --git a/hydra-gtk/src/support.c b/hydra-gtk/src/support.c index 22a1a3a..96d5e17 100644 --- a/hydra-gtk/src/support.c +++ b/hydra-gtk/src/support.c @@ -7,17 +7,17 @@ #include #endif -#include -#include -#include -#include #include +#include +#include +#include +#include #include #include "support.h" -GtkWidget *lookup_widget(GtkWidget * widget, const gchar * widget_name) { +GtkWidget *lookup_widget(GtkWidget *widget, const gchar *widget_name) { GtkWidget *parent, *found_widget; for (;;) { @@ -26,13 +26,13 @@ GtkWidget *lookup_widget(GtkWidget * widget, const gchar * widget_name) { else parent = widget->parent; if (!parent) - parent = (GtkWidget *) g_object_get_data(G_OBJECT(widget), "GladeParentKey"); + parent = (GtkWidget *)g_object_get_data(G_OBJECT(widget), "GladeParentKey"); if (parent == NULL) break; widget = parent; } - found_widget = (GtkWidget *) g_object_get_data(G_OBJECT(widget), widget_name); + found_widget = (GtkWidget *)g_object_get_data(G_OBJECT(widget), widget_name); if (!found_widget) g_warning("Widget not found: %s", widget_name); return found_widget; @@ -41,19 +41,16 @@ GtkWidget *lookup_widget(GtkWidget * widget, const gchar * widget_name) { static GList *pixmaps_directories = NULL; /* Use this function to set the directory containing installed pixmaps. */ -void add_pixmap_directory(const gchar * directory) { - pixmaps_directories = g_list_prepend(pixmaps_directories, g_strdup(directory)); -} +void add_pixmap_directory(const gchar *directory) { pixmaps_directories = g_list_prepend(pixmaps_directories, g_strdup(directory)); } /* This is an internally used function to find pixmap files. */ -static gchar *find_pixmap_file(const gchar * filename) { +static gchar *find_pixmap_file(const gchar *filename) { GList *elem; /* We step through each of the pixmaps directory to find it. */ elem = pixmaps_directories; while (elem) { - gchar *pathname = g_strdup_printf("%s%s%s", (gchar *) elem->data, - G_DIR_SEPARATOR_S, filename); + gchar *pathname = g_strdup_printf("%s%s%s", (gchar *)elem->data, G_DIR_SEPARATOR_S, filename); if (g_file_test(pathname, G_FILE_TEST_EXISTS)) return pathname; @@ -64,7 +61,7 @@ static gchar *find_pixmap_file(const gchar * filename) { } /* This is an internally used function to create pixmaps. */ -GtkWidget *create_pixmap(GtkWidget * widget, const gchar * filename) { +GtkWidget *create_pixmap(GtkWidget *widget, const gchar *filename) { gchar *pathname = NULL; GtkWidget *pixmap; @@ -84,7 +81,7 @@ GtkWidget *create_pixmap(GtkWidget * widget, const gchar * filename) { } /* This is an internally used function to create pixmaps. */ -GdkPixbuf *create_pixbuf(const gchar * filename) { +GdkPixbuf *create_pixbuf(const gchar *filename) { gchar *pathname = NULL; GdkPixbuf *pixbuf; GError *error = NULL; @@ -109,7 +106,7 @@ GdkPixbuf *create_pixbuf(const gchar * filename) { } /* This is used to set ATK action descriptions. */ -void glade_set_atk_action_description(AtkAction * action, const gchar * action_name, const gchar * description) { +void glade_set_atk_action_description(AtkAction *action, const gchar *action_name, const gchar *description) { gint n_actions, i; n_actions = atk_action_get_n_actions(action); diff --git a/hydra-gtk/src/support.h b/hydra-gtk/src/support.h index 4fc185d..bd88545 100644 --- a/hydra-gtk/src/support.h +++ b/hydra-gtk/src/support.h @@ -19,26 +19,23 @@ * or alternatively any widget in the component, and the name of the widget * you want returned. */ -GtkWidget *lookup_widget(GtkWidget * widget, const gchar * widget_name); - +GtkWidget *lookup_widget(GtkWidget *widget, const gchar *widget_name); /* Use this function to set the directory containing installed pixmaps. */ -void add_pixmap_directory(const gchar * directory); - +void add_pixmap_directory(const gchar *directory); /* * Private Functions. */ /* This is used to create the pixmaps used in the interface. */ -GtkWidget *create_pixmap(GtkWidget * widget, const gchar * filename); +GtkWidget *create_pixmap(GtkWidget *widget, const gchar *filename); /* This is used to create the pixbufs used in the interface. */ -GdkPixbuf *create_pixbuf(const gchar * filename); +GdkPixbuf *create_pixbuf(const gchar *filename); /* This is used to set ATK action descriptions. */ -void glade_set_atk_action_description(AtkAction * action, const gchar * action_name, const gchar * description); - +void glade_set_atk_action_description(AtkAction *action, const gchar *action_name, const gchar *description); GtkWidget *wndMain; char *HYDRA_BIN; diff --git a/hydra-http-form.c b/hydra-http-form.c index 80b141a..324fe6a 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -45,7 +45,8 @@ rewritten by David Maciejak Fix and issue with strtok use and implement 1 step location follow if HTTP 3xx code is returned (david dot maciejak at gmail dot com) -Added fail or success condition, getting cookies, and allow 5 redirections by david +Added fail or success condition, getting cookies, and allow 5 redirections by +david */ @@ -80,15 +81,15 @@ char cookie[4096] = "", cmiscptr[1024]; int32_t webport, freemischttpform = 0; char bufferurl[6096 + 24], cookieurl[6096 + 24] = "", userheader[6096 + 24] = "", *url, *variables, *optional1; -#define MAX_REDIRECT 8 -#define MAX_CONTENT_LENGTH 20 -#define MAX_PROXY_LENGTH 2048 // sizeof(cookieurl) * 2 +#define MAX_REDIRECT 8 +#define MAX_CONTENT_LENGTH 20 +#define MAX_PROXY_LENGTH 2048 // sizeof(cookieurl) * 2 char redirected_url_buff[2048] = ""; int32_t redirected_flag = 0; int32_t redirected_cpt = MAX_REDIRECT; -char *cookie_request = NULL, *normal_request = NULL; // Buffers for HTTP headers +char *cookie_request = NULL, *normal_request = NULL; // Buffers for HTTP headers /* * Function to perform some initial setup. @@ -98,7 +99,7 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr); /* * Returns 1 if specified header exists, or 0 otherwise. */ -ptr_header_node header_exists(ptr_header_node * ptr_head, char *header_name, char type) { +ptr_header_node header_exists(ptr_header_node *ptr_head, char *header_name, char type) { ptr_header_node cur_ptr = *ptr_head, found_header = NULL; for (cur_ptr = *ptr_head; cur_ptr && !found_header; cur_ptr = cur_ptr->next) @@ -118,7 +119,7 @@ char *strndup(const char *s, size_t n) { if (n < len) len = n; - result = (char *) malloc(len + 1); + result = (char *)malloc(len + 1); if (!result) return 0; @@ -128,8 +129,8 @@ char *strndup(const char *s, size_t n) { } #endif -int32_t append_cookie(char *name, char *value, ptr_cookie_node * last_cookie) { - ptr_cookie_node new_ptr = (ptr_cookie_node) malloc(sizeof(t_cookie_node)); +int32_t append_cookie(char *name, char *value, ptr_cookie_node *last_cookie) { + ptr_cookie_node new_ptr = (ptr_cookie_node)malloc(sizeof(t_cookie_node)); if (!new_ptr) return 0; @@ -149,13 +150,13 @@ int32_t append_cookie(char *name, char *value, ptr_cookie_node * last_cookie) { char *stringify_cookies(ptr_cookie_node ptr_cookie) { ptr_cookie_node cur_ptr = NULL; uint32_t length = 1; - char *cookie_hdr = (char *) malloc(length); + char *cookie_hdr = (char *)malloc(length); if (cookie_hdr) { memset(cookie_hdr, 0, length); for (cur_ptr = ptr_cookie; cur_ptr; cur_ptr = cur_ptr->next) { length += 2 + strlen(cur_ptr->name) + strlen(cur_ptr->value); - cookie_hdr = (char *) realloc(cookie_hdr, length); + cookie_hdr = (char *)realloc(cookie_hdr, length); if (cookie_hdr) { strcat(cookie_hdr, cur_ptr->name); strcat(cookie_hdr, "="); @@ -187,7 +188,7 @@ success: * +--------+ * Returns 1 if success, or 0 otherwise. */ -int32_t add_or_update_cookie(ptr_cookie_node * ptr_cookie, char *cookie_expr) { +int32_t add_or_update_cookie(ptr_cookie_node *ptr_cookie, char *cookie_expr) { ptr_cookie_node cur_ptr = NULL; char *cookie_name = NULL, *cookie_value = strstr(cookie_expr, "="); @@ -195,7 +196,8 @@ int32_t add_or_update_cookie(ptr_cookie_node * ptr_cookie, char *cookie_expr) { cookie_name = strndup(cookie_expr, cookie_value - cookie_expr); cookie_value = strdup(cookie_value + 1); - // we've got the cookie's name and value, now it's time to insert or update the list + // we've got the cookie's name and value, now it's time to insert or update + // the list if (*ptr_cookie == NULL) { // no cookies append_cookie(cookie_name, cookie_value, ptr_cookie); @@ -203,7 +205,7 @@ int32_t add_or_update_cookie(ptr_cookie_node * ptr_cookie, char *cookie_expr) { for (cur_ptr = *ptr_cookie; cur_ptr; cur_ptr = cur_ptr->next) { if (strcmp(cur_ptr->name, cookie_name) == 0) { free(cur_ptr->value); // free old value - free(cookie_name); // we already have it + free(cookie_name); // we already have it cur_ptr->value = cookie_value; break; } @@ -218,7 +220,7 @@ int32_t add_or_update_cookie(ptr_cookie_node * ptr_cookie, char *cookie_expr) { return 1; } -int32_t process_cookies(ptr_cookie_node * ptr_cookie, char *cookie_expr) { +int32_t process_cookies(ptr_cookie_node *ptr_cookie, char *cookie_expr) { char *tok = NULL; char *expr = strdup(cookie_expr); int32_t res = 0; @@ -252,32 +254,29 @@ int32_t process_cookies(ptr_cookie_node * ptr_cookie, char *cookie_expr) { * * Returns 1 if success, or 0 otherwise (out of memory). */ -int32_t add_header(ptr_header_node * ptr_head, char *header, char *value, char type) { +int32_t add_header(ptr_header_node *ptr_head, char *header, char *value, char type) { ptr_header_node cur_ptr = NULL; ptr_header_node existing_hdr, new_ptr; // get to the last header - for (cur_ptr = *ptr_head; cur_ptr && cur_ptr->next; cur_ptr = cur_ptr->next); + for (cur_ptr = *ptr_head; cur_ptr && cur_ptr->next; cur_ptr = cur_ptr->next) + ; char *new_header = strdup(header); char *new_value = strdup(value); if (new_header && new_value) { - if ((type == HEADER_TYPE_USERHEADER) || - (type == HEADER_TYPE_DEFAULT && !header_exists(ptr_head, new_header, HEADER_TYPE_USERHEADER_REPL)) || - (type == HEADER_TYPE_USERHEADER_REPL && !header_exists(ptr_head, new_header, HEADER_TYPE_DEFAULT)) || - (type == HEADER_TYPE_DEFAULT_REPL && !header_exists(ptr_head, new_header, HEADER_TYPE_DEFAULT)) - ) { + if ((type == HEADER_TYPE_USERHEADER) || (type == HEADER_TYPE_DEFAULT && !header_exists(ptr_head, new_header, HEADER_TYPE_USERHEADER_REPL)) || (type == HEADER_TYPE_USERHEADER_REPL && !header_exists(ptr_head, new_header, HEADER_TYPE_DEFAULT)) || (type == HEADER_TYPE_DEFAULT_REPL && !header_exists(ptr_head, new_header, HEADER_TYPE_DEFAULT))) { /* * We are in one of the following scenarios: * 1. A default header with no user-supplied headers that replace it. * 2. A user-supplied header that must be appended (option 'h'). - * 3. A user-supplied header that must replace a default header (option 'h'), - * but no default headers exist with that name. + * 3. A user-supplied header that must replace a default header + * (option 'h'), but no default headers exist with that name. * * In either case we just add the header to the list. */ - new_ptr = (ptr_header_node) malloc(sizeof(t_header_node)); + new_ptr = (ptr_header_node)malloc(sizeof(t_header_node)); if (!new_ptr) { free(new_header); free(new_value); @@ -321,7 +320,7 @@ void hdrrep(ptr_header_node *ptr_head, char *oldvalue, char *newvalue) { for (cur_ptr = *ptr_head; cur_ptr; cur_ptr = cur_ptr->next) { if ((cur_ptr->type == HEADER_TYPE_USERHEADER || cur_ptr->type == HEADER_TYPE_USERHEADER_REPL) && strstr(cur_ptr->value, oldvalue)) { - cur_ptr->value = (char *) realloc(cur_ptr->value, strlen(newvalue) + 1); + cur_ptr->value = (char *)realloc(cur_ptr->value, strlen(newvalue) + 1); if (cur_ptr->value) strcpy(cur_ptr->value, newvalue); else { @@ -340,7 +339,7 @@ void hdrrepv(ptr_header_node *ptr_head, char *hdrname, char *new_value) { for (cur_ptr = *ptr_head; cur_ptr; cur_ptr = cur_ptr->next) { if ((cur_ptr->type == HEADER_TYPE_DEFAULT) && strcmp(cur_ptr->header, hdrname) == 0) { - cur_ptr->value = (char *) realloc(cur_ptr->value, strlen(new_value) + 1); + cur_ptr->value = (char *)realloc(cur_ptr->value, strlen(new_value) + 1); if (cur_ptr->value) strcpy(cur_ptr->value, new_value); else { @@ -351,7 +350,7 @@ void hdrrepv(ptr_header_node *ptr_head, char *hdrname, char *new_value) { } } -void cleanup(ptr_header_node * ptr_head) { +void cleanup(ptr_header_node *ptr_head) { ptr_header_node cur_ptr = *ptr_head, next_ptr = cur_ptr; while (next_ptr != NULL) { @@ -375,7 +374,7 @@ char *stringify_headers(ptr_header_node *ptr_head) { for (; cur_ptr; cur_ptr = cur_ptr->next) ttl_size += strlen(cur_ptr->header) + strlen(cur_ptr->value) + 4; - headers_str = (char *) malloc(ttl_size + 1); + headers_str = (char *)malloc(ttl_size + 1); if (headers_str) { memset(headers_str, 0, ttl_size + 1); @@ -402,8 +401,8 @@ int32_t parse_options(char *miscptr, ptr_header_node *ptr_head) { */ while (*miscptr != 0) { switch (miscptr[0]) { - case 'a': // fall through - case 'A': // only for http, not http-form! + case 'a': // fall through + case 'A': // only for http, not http-form! ptr = miscptr + 2; if (strncasecmp(ptr, "NTLM", 4) == 0) @@ -425,7 +424,7 @@ int32_t parse_options(char *miscptr, ptr_header_node *ptr_head) { miscptr = ptr; break; - case 'c': // fall through + case 'c': // fall through case 'C': ptr = miscptr + 2; while (*ptr != 0 && (*ptr != ':' || *(ptr - 1) == '\\')) @@ -510,7 +509,7 @@ char *prepare_http_request(char *type, char *path, char *params, char *headers) if (params) reqlen += strlen(params); - http_request = (char *) malloc(reqlen); + http_request = (char *)malloc(reqlen); if (http_request) { memset(http_request, 0, reqlen); @@ -571,7 +570,6 @@ char *html_encode(char *string) { return ret; } - /* int32_t analyze_server_response(int32_t socket) return 0 or 1 when the cond regex is matched @@ -584,7 +582,7 @@ int32_t analyze_server_response(int32_t s) { auth_flag = 0; while ((buf = hydra_receive_line(s)) != NULL) { runs++; - //check for http redirection + // check for http redirection if (strstr(buf, "HTTP/1.1 3") != NULL || strstr(buf, "HTTP/1.0 3") != NULL || strstr(buf, "Status: 3") != NULL) { redirected_flag = 1; } else if (strstr(buf, "HTTP/1.1 401") != NULL || strstr(buf, "HTTP/1.0 401") != NULL) { @@ -608,7 +606,7 @@ int32_t analyze_server_response(int32_t s) { *endloc = 0; strcpy(redirected_url_buff, str); } - //there can be multiple cookies + // there can be multiple cookies if (hydra_strcasestr(buf, "Set-Cookie: ") != NULL) { char *cookiebuf = buf; @@ -622,7 +620,7 @@ int32_t analyze_server_response(int32_t s) { str[sizeof(str) - 1] = 0; endcookie1 = strchr(str, '\n'); endcookie2 = strchr(str, ';'); - //terminate string after cookie data + // terminate string after cookie data if (endcookie1 != NULL && ((endcookie1 < endcookie2) || (endcookie2 == NULL))) { if (*(endcookie1 - 1) == '\r') endcookie1--; @@ -635,27 +633,33 @@ int32_t analyze_server_response(int32_t s) { tmpname[sizeof(tmpname) - 2] = 0; ptr = index(tmpname, '='); *(++ptr) = 0; - // is the cookie already in the cookiejar? (so, does it have to be replaced?) + // is the cookie already in the cookiejar? (so, does it have to be + // replaced?) if ((ptr = hydra_strcasestr(cookie, tmpname)) != NULL) { // yes it is. - // if the cookie is not in the beginning of the cookiejar, copy the ones before + // if the cookie is not in the beginning of the cookiejar, copy the + // ones before if (ptr != cookie && *(ptr - 1) == ' ') { strncpy(tmpcookie, cookie, ptr - cookie - 2); tmpcookie[ptr - cookie - 2] = 0; } ptr += strlen(tmpname); - // if there are any cookies after this one in the cookiejar, copy them over + // if there are any cookies after this one in the cookiejar, copy + // them over if ((ptr2 = strstr(ptr, "; ")) != NULL) { ptr2 += 2; strncat(tmpcookie, ptr2, sizeof(tmpcookie) - strlen(tmpcookie) - 1); } if (debug) - printf("[DEBUG] removing cookie %s in jar\n before: %s\n after: %s\n", tmpname, cookie, tmpcookie); + printf("[DEBUG] removing cookie %s in jar\n before: %s\n after: " + "%s\n", + tmpname, cookie, tmpcookie); strcpy(cookie, tmpcookie); } } ptr = index(str, '='); - // only copy the cookie if it has a value (otherwise the server wants to delete the cookie) + // only copy the cookie if it has a value (otherwise the server wants to + // delete the cookie) if (ptr != NULL && *(ptr + 1) != ';' && *(ptr + 1) != 0 && *(ptr + 1) != '\n' && *(ptr + 1) != '\r') { if (strlen(cookie) > 0) strncat(cookie, "; ", sizeof(cookie) - strlen(cookie) - 1); @@ -670,10 +674,10 @@ int32_t analyze_server_response(int32_t s) { if (strstr(buf, cond) != NULL) { #endif free(buf); -// printf("DEBUG: STRING %s FOUND!!:\n%s\n", cond, buf); + // printf("DEBUG: STRING %s FOUND!!:\n%s\n", cond, buf); return 1; } -// else printf("DEBUG: STRING %s NOT FOUND:\n%s\n", cond, buf); + // else printf("DEBUG: STRING %s NOT FOUND:\n%s\n", cond, buf); free(buf); } if (runs == 0) { @@ -694,8 +698,7 @@ void hydra_reconnect(int32_t s, char *ip, int32_t port, unsigned char options, c } } -int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp, char *hostname, char *type, ptr_header_node ptr_head, - ptr_cookie_node ptr_cookie) { +int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp, char *hostname, char *type, ptr_header_node ptr_head, ptr_cookie_node ptr_cookie) { char *empty = ""; char *login, *pass, clogin[256], cpass[256], b64login[345], b64pass[345]; char header[8096], *upd3variables; @@ -705,7 +708,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options char content_length[MAX_CONTENT_LENGTH], proxy_string[MAX_PROXY_LENGTH]; memset(header, 0, sizeof(header)); - cookie[0] = 0; // reset cookies from potential previous attempt + cookie[0] = 0; // reset cookies from potential previous attempt if (use_proxy > 0 && proxy_count > 0) selected_proxy = random() % proxy_count; @@ -716,9 +719,9 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options if (strlen(pass = hydra_get_next_password()) == 0) pass = empty; strcpy(b64login, login); - hydra_tobase64((unsigned char *) b64login, strlen(b64login), sizeof(b64login)); + hydra_tobase64((unsigned char *)b64login, strlen(b64login), sizeof(b64login)); strcpy(b64pass, pass); - hydra_tobase64((unsigned char *) b64pass, strlen(b64pass), sizeof(b64pass)); + hydra_tobase64((unsigned char *)b64pass, strlen(b64pass), sizeof(b64pass)); strncpy(clogin, html_encode(login), sizeof(clogin) - 1); clogin[sizeof(clogin) - 1] = 0; strncpy(cpass, html_encode(pass), sizeof(cpass) - 1); @@ -744,7 +747,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options http_request = prepare_http_request("GET", proxy_string, NULL, cookie_request); if (hydra_send(s, http_request, strlen(http_request), 0) < 0) return 1; - i = analyze_server_response(s); // ignore result + i = analyze_server_response(s); // ignore result if (strlen(cookie) > 0) process_cookies(&ptr_cookie, cookie); hydra_reconnect(s, ip, port, options, hostname); @@ -753,7 +756,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options if (strcmp(type, "POST") == 0) { memset(proxy_string, 0, sizeof(proxy_string)); snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s:%d%.600s", webtarget, webport, url); - snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t) strlen(upd3variables)); + snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t)strlen(upd3variables)); if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) hdrrepv(&ptr_head, "Content-Length", content_length); else @@ -798,7 +801,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options if (use_proxy == 1) { // proxy without authentication if (getcookie) { - //doing a GET to get cookies + // doing a GET to get cookies memset(proxy_string, 0, sizeof(proxy_string)); snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s:%d%.600s", webtarget, webport, cookieurl); if (http_request != NULL) @@ -815,7 +818,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options if (strcmp(type, "POST") == 0) { memset(proxy_string, 0, sizeof(proxy_string)); snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s:%d%.600s", webtarget, webport, url); - snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t) strlen(upd3variables)); + snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t)strlen(upd3variables)); if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) hdrrepv(&ptr_head, "Content-Length", content_length); else @@ -829,8 +832,8 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); else hdrrepv(&ptr_head, "Cookie", cookie_header); - if (normal_request != NULL) - free(normal_request); + if (normal_request != NULL) + free(normal_request); normal_request = stringify_headers(&ptr_head); if (http_request != NULL) free(http_request); @@ -847,8 +850,8 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); else hdrrepv(&ptr_head, "Cookie", cookie_header); - if (normal_request != NULL) - free(normal_request); + if (normal_request != NULL) + free(normal_request); normal_request = stringify_headers(&ptr_head); if (http_request != NULL) free(http_request); @@ -860,7 +863,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options // direct web server, no proxy normal_request = NULL; if (getcookie) { - //doing a GET to save cookies + // doing a GET to save cookies if (http_request != NULL) free(http_request); http_request = prepare_http_request("GET", cookieurl, NULL, cookie_request); @@ -868,7 +871,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options return 1; i = analyze_server_response(s); // ignore result if (strlen(cookie) > 0) { - //printf("[DEBUG] Got cookie: %s\n", cookie); + // printf("[DEBUG] Got cookie: %s\n", cookie); process_cookies(&ptr_cookie, cookie); if (normal_request != NULL) free(normal_request); @@ -878,7 +881,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options } // now prepare for the "real" request if (strcmp(type, "POST") == 0) { - snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t) strlen(upd3variables)); + snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t)strlen(upd3variables)); if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) hdrrepv(&ptr_head, "Content-Length", content_length); else @@ -927,8 +930,10 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options found = analyze_server_response(s); - if (auth_flag) { // we received a 401 error - user is using wrong module - hydra_report(stderr, "[ERROR] the target is using HTTP auth, not a web form, received HTTP error code 401. Use module \"http%s-get\" instead.\n", + if (auth_flag) { // we received a 401 error - user is using wrong module + hydra_report(stderr, + "[ERROR] the target is using HTTP auth, not a web form, received HTTP " + "error code 401. Use module \"http%s-get\" instead.\n", (options & OPTION_SSL) > 0 ? "s" : ""); return 4; } @@ -936,13 +941,13 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options if (strlen(cookie) > 0) process_cookies(&ptr_cookie, cookie); - //if page was redirected, follow the location header + // if page was redirected, follow the location header redirected_cpt = MAX_REDIRECT; if (debug) printf("[DEBUG] attempt result: found %d, redirect %d, location: %s\n", found, redirected_flag, redirected_url_buff); while (found == 0 && redirected_flag && (redirected_url_buff[0] != 0) && (redirected_cpt > 0)) { - //we have to split the location + // we have to split the location char *startloc, *endloc; char str[2048]; char str2[2048]; @@ -950,7 +955,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options redirected_cpt--; redirected_flag = 0; - //check if the redirect page contains the fail/success condition + // check if the redirect page contains the fail/success condition #ifdef HAVE_PCRE if (hydra_string_match(redirected_url_buff, cond) == 1) { #else @@ -958,8 +963,8 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options #endif found = success_cond; } else { - //location could be either absolute http(s):// or / something - //or relative + // location could be either absolute http(s):// or / something + // or relative startloc = strstr(redirected_url_buff, "://"); if (startloc != NULL) { startloc += strlen("://"); @@ -988,8 +993,8 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options } else { strncpy(str2, webtarget, sizeof(str2)); if (redirected_url_buff[0] != '/') { - //it's a relative path, so we have to concatenate it - //with the path from the first url given + // it's a relative path, so we have to concatenate it + // with the path from the first url given char *urlpath; char urlpath_extracted[2048]; @@ -1030,11 +1035,11 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options free(cookie_header); cookie_header = stringify_cookies(ptr_cookie); if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); + add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); else - hdrrepv(&ptr_head, "Cookie", cookie_header); + hdrrepv(&ptr_head, "Cookie", cookie_header); - //re-use the code above to check for proxy use + // re-use the code above to check for proxy use if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) { // proxy with authentication hdrrepv(&ptr_head, "Host", str2); @@ -1052,14 +1057,14 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options hdrrepv(&ptr_head, "Host", str2); memset(proxy_string, 0, sizeof(proxy_string)); snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s:%d%.600s", webtarget, webport, str3); - if (normal_request != NULL) - free(normal_request); + if (normal_request != NULL) + free(normal_request); normal_request = stringify_headers(&ptr_head); if (http_request != NULL) free(http_request); http_request = prepare_http_request("GET", proxy_string, NULL, normal_request); } else { - //direct web server, no proxy + // direct web server, no proxy hdrrepv(&ptr_head, "Host", str2); if (normal_request != NULL) free(normal_request); @@ -1081,7 +1086,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options } } - //if the last status is still 3xx, set it as a false + // if the last status is still 3xx, set it as a false if (found != -1 && found == success_cond && (redirected_flag == 0 || success_cond == 1) && redirected_cpt >= 0) { hydra_report_found_host(port, ip, "www-form", fp); hydra_completed_pair_found(); @@ -1092,8 +1097,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options return 1; } -void service_http_form(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname, char *type, ptr_header_node * ptr_head, - ptr_cookie_node * ptr_cookie) { +void service_http_form(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname, char *type, ptr_header_node *ptr_head, ptr_cookie_node *ptr_cookie) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_HTTP, mysslport = PORT_HTTP_SSL; @@ -1118,35 +1122,35 @@ void service_http_form(char *ip, int32_t sp, unsigned char options, char *miscpt } } switch (run) { - case 1: /* connect and service init function */ - { - if (sock >= 0) - sock = hydra_disconnect(sock); - if ((options & OPTION_SSL) == 0) { - if (port != 0) - myport = port; - sock = hydra_connect_tcp(ip, myport); - port = myport; - } else { - if (port != 0) - mysslport = port; - sock = hydra_connect_ssl(ip, mysslport, hostname); - port = mysslport; - } - if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, cannot connect\n", (int32_t) getpid()); - if (freemischttpform) - free(miscptr); - freemischttpform = 0; - hydra_child_exit(1); - } - next_run = 2; - break; + case 1: /* connect and service init function */ + { + if (sock >= 0) + sock = hydra_disconnect(sock); + if ((options & OPTION_SSL) == 0) { + if (port != 0) + myport = port; + sock = hydra_connect_tcp(ip, myport); + port = myport; + } else { + if (port != 0) + mysslport = port; + sock = hydra_connect_ssl(ip, mysslport, hostname); + port = mysslport; } - case 2: /* run the cracking function */ + if (sock < 0) { + hydra_report(stderr, "[ERROR] Child with pid %d terminating, cannot connect\n", (int32_t)getpid()); + if (freemischttpform) + free(miscptr); + freemischttpform = 0; + hydra_child_exit(1); + } + next_run = 2; + break; + } + case 2: /* run the cracking function */ next_run = start_http_form(sock, ip, port, options, miscptr, fp, hostname, type, *ptr_head, *ptr_cookie); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); if (freemischttpform) @@ -1154,7 +1158,7 @@ void service_http_form(char *ip, int32_t sp, unsigned char options, char *miscpt freemischttpform = 0; hydra_child_exit(0); break; - case 4: /* silent error exit */ + case 4: /* silent error exit */ if (sock >= 0) sock = hydra_disconnect(sock); if (freemischttpform) @@ -1175,7 +1179,7 @@ void service_http_form(char *ip, int32_t sp, unsigned char options, char *miscpt free(miscptr); } -void service_http_get_form(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_http_get_form(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { ptr_cookie_node ptr_cookie = NULL; ptr_header_node ptr_head = initialize(ip, options, miscptr); @@ -1187,7 +1191,7 @@ void service_http_get_form(char *ip, int32_t sp, unsigned char options, char *mi } } -void service_http_post_form(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_http_post_form(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { ptr_cookie_node ptr_cookie = NULL; ptr_header_node ptr_head = initialize(ip, options, miscptr); @@ -1199,7 +1203,7 @@ void service_http_post_form(char *ip, int32_t sp, unsigned char options, char *m } } -int32_t service_http_form_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_http_form_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. @@ -1222,14 +1226,14 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { if (webtarget != NULL && (webtarget = strstr(miscptr, "://")) != NULL) { webtarget += strlen("://"); - if ((ptr2 = index(webtarget, ':')) != NULL) { /* step over port if present */ + if ((ptr2 = index(webtarget, ':')) != NULL) { /* step over port if present */ *ptr2 = 0; ptr2++; ptr = ptr2; if (*ptr == '/' || (ptr = index(ptr2, '/')) != NULL) miscptr = ptr; else - miscptr = slash; /* to make things easier to user */ + miscptr = slash; /* to make things easier to user */ } else if ((ptr2 = index(webtarget, '/')) != NULL) { if (freemischttpform == 0) { if ((miscptr = malloc(strlen(ptr2) + 1)) != NULL) { @@ -1268,18 +1272,17 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { if (*ptr != 0) *ptr++ = 0; - if ((ptr2 = rindex(ptr, ':')) != NULL) { cond = ptr2 + 1; *ptr2 = 0; } else cond = ptr; -/* - while (*ptr != 0 && (*ptr != ':' || *(ptr - 1) == '\\')) - ptr++; - if (*ptr != 0) - *ptr++ = 0; -*/ + /* + while (*ptr != 0 && (*ptr != ':' || *(ptr - 1) == '\\')) + ptr++; + if (*ptr != 0) + *ptr++ = 0; + */ if (ptr == cond) optional1 = NULL; else @@ -1304,9 +1307,11 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { } } - //printf("ptr: %s ptr2: %s cond: %s url: %s variables: %s optional1: %s\n", ptr, ptr2, cond, url, variables, optional1 == NULL ? "null" : optional1); + // printf("ptr: %s ptr2: %s cond: %s url: %s variables: %s optional1: + // %s\n", ptr, ptr2, cond, url, variables, optional1 == NULL ? "null" : + // optional1); - if (url == NULL || variables == NULL || cond == NULL /*|| optional1 == NULL */ ) + if (url == NULL || variables == NULL || cond == NULL /*|| optional1 == NULL */) hydra_child_exit(2); if (*cond == 0) { @@ -1316,7 +1321,7 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { sprintf(cookieurl, "%.1000s", url); - //conditions now have to contain F or S to set the fail or success condition + // conditions now have to contain F or S to set the fail or success condition if (*cond != 0 && (strpos(cond, "F=") == 0)) { success_cond = 0; cond += 2; @@ -1324,11 +1329,12 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { success_cond = 1; cond += 2; } else { - //by default condition is a fail + // by default condition is a fail success_cond = 0; } - //printf("miscptr: %s, url=%s, variables=%s, ptr=%s, optional1: %s, cond: %s (%d)\n", miscptr, url, variables, ptr, optional1, cond, success_cond); + // printf("miscptr: %s, url=%s, variables=%s, ptr=%s, optional1: %s, cond: %s + // (%d)\n", miscptr, url, variables, ptr, optional1, cond, success_cond); /* * Parse the user-supplied options. @@ -1342,7 +1348,7 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { // proxy with authentication add_header(&ptr_head, "Host", webtarget, HEADER_TYPE_DEFAULT); add_header(&ptr_head, "User-Agent", "Mozilla 5.0 (Hydra Proxy Auth)", HEADER_TYPE_DEFAULT); - proxy_string = (char *) malloc(strlen(proxy_authentication[selected_proxy]) + 10); + proxy_string = (char *)malloc(strlen(proxy_authentication[selected_proxy]) + 10); if (proxy_string) { strcpy(proxy_string, "Basic "); strcat(proxy_string, proxy_authentication[selected_proxy]); @@ -1352,13 +1358,13 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { return NULL; } if (getcookie) { - //doing a GET to save cookies + // doing a GET to save cookies if (cookie_request != NULL) free(cookie_request); cookie_request = stringify_headers(&ptr_head); } if (normal_request != NULL) - free(normal_request); + free(normal_request); normal_request = stringify_headers(&ptr_head); } else { if (use_proxy == 1) { @@ -1366,7 +1372,7 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { add_header(&ptr_head, "Host", webtarget, HEADER_TYPE_DEFAULT); add_header(&ptr_head, "User-Agent", "Mozilla/5.0 (Hydra Proxy)", HEADER_TYPE_DEFAULT); if (getcookie) { - //doing a GET to get cookies + // doing a GET to get cookies if (cookie_request != NULL) free(cookie_request); cookie_request = stringify_headers(&ptr_head); @@ -1380,7 +1386,7 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { add_header(&ptr_head, "User-Agent", "Mozilla/5.0 (Hydra)", HEADER_TYPE_DEFAULT); if (getcookie) { - //doing a GET to save cookies + // doing a GET to save cookies if (cookie_request != NULL) free(cookie_request); cookie_request = stringify_headers(&ptr_head); @@ -1396,37 +1402,62 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { void usage_http_form(const char *service) { printf("Module %s requires the page and the parameters for the web form.\n\n" - "By default this module is configured to follow a maximum of 5 redirections in\n" - "a row. It always gathers a new cookie from the same URL without variables\n" - "The parameters take three \":\" separated values, plus optional values.\n" - "(Note: if you need a colon in the option string as value, escape it with \"\\:\", but do not escape a \"\\\" with \"\\\\\".)\n" - "\nSyntax: ::[:[:]\n" + "By default this module is configured to follow a maximum of 5 " + "redirections in\n" + "a row. It always gathers a new cookie from the same URL without " + "variables\n" + "The parameters take three \":\" separated values, plus optional " + "values.\n" + "(Note: if you need a colon in the option string as value, escape it " + "with \"\\:\", but do not escape a \"\\\" with \"\\\\\".)\n" + "\nSyntax: ::[:[:]\n" "First is the page on the server to GET or POST to (URL).\n" - "Second is the POST/GET variables (taken from either the browser, proxy, etc.\n" - " with url-encoded (resp. base64-encoded) usernames and passwords being replaced in the\n" - " \"^USER^\" (resp. \"^USER64^\") and \"^PASS^\" (resp. \"^PASS64^\") placeholders (FORM PARAMETERS)\n" + "Second is the POST/GET variables (taken from either the browser, proxy, " + "etc.\n" + " with url-encoded (resp. base64-encoded) usernames and passwords being " + "replaced in the\n" + " \"^USER^\" (resp. \"^USER64^\") and \"^PASS^\" (resp. \"^PASS64^\") " + "placeholders (FORM PARAMETERS)\n" "Third is the string that it checks for an *invalid* login (by default)\n" - " Invalid condition login check can be preceded by \"F=\", successful condition\n" + " Invalid condition login check can be preceded by \"F=\", successful " + "condition\n" " login check must be preceded by \"S=\".\n" - " This is where most people get it wrong. You have to check the webapp what a\n" + " This is where most people get it wrong. You have to check the webapp " + "what a\n" " failed string looks like and put it in this parameter!\n" "The following parameters are optional:\n" - " (c|C)=/page/uri to define a different page to gather initial cookies from\n" - " (h|H)=My-Hdr\\: foo to send a user defined HTTP header with each request\n" - " ^USER[64]^ and ^PASS[64]^ can also be put into these headers!\n" + " (c|C)=/page/uri to define a different page to gather initial " + "cookies from\n" + " (h|H)=My-Hdr\\: foo to send a user defined HTTP header with each " + "request\n" + " ^USER[64]^ and ^PASS[64]^ can also be put into these " + "headers!\n" " Note: 'h' will add the user-defined header at the end\n" " regardless it's already being sent by Hydra or not.\n" - " 'H' will replace the value of that header if it exists, by the\n" - " one supplied by the user, or add the header at the end\n" - "Note that if you are going to put colons (:) in your headers you should escape them with a backslash (\\).\n" - " All colons that are not option separators should be escaped (see the examples above and below).\n" - " You can specify a header without escaping the colons, but that way you will not be able to put colons\n" - " in the header value itself, as they will be interpreted by hydra as option separators.\n" + " 'H' will replace the value of that header if it " + "exists, by the\n" + " one supplied by the user, or add the header at the " + "end\n" + "Note that if you are going to put colons (:) in your headers you should " + "escape them with a backslash (\\).\n" + " All colons that are not option separators should be escaped (see the " + "examples above and below).\n" + " You can specify a header without escaping the colons, but that way you " + "will not be able to put colons\n" + " in the header value itself, as they will be interpreted by hydra as " + "option separators.\n" "\nExamples:\n" " \"/login.php:user=^USER^&pass=^PASS^:incorrect\"\n" - " \"/login.php:user=^USER64^&pass=^PASS64^&colon=colon\\:escape:S=authlog=.*success\"\n" + " \"/" + "login.php:user=^USER64^&pass=^PASS64^&colon=colon\\:escape:S=authlog=.*" + "success\"\n" " \"/login.php:user=^USER^&pass=^PASS^&mid=123:authlog=.*failed\"\n" - " \"/:user=^USER&pass=^PASS^:failed:H=Authorization\\: Basic dT1w:H=Cookie\\: sessid=aaaa:h=X-User\\: ^USER^:H=User-Agent\\: wget\"\n" - " \"/exchweb/bin/auth/owaauth.dll:destination=http%%3A%%2F%%2F%%2Fexchange&flags=0&username=%%5C^USER^&password=^PASS^&SubmitCreds=x&trusted=0:reason=:C=/exchweb\"\n", + " \"/:user=^USER&pass=^PASS^:failed:H=Authorization\\: Basic " + "dT1w:H=Cookie\\: sessid=aaaa:h=X-User\\: ^USER^:H=User-Agent\\: wget\"\n" + " \"/exchweb/bin/auth/" + "owaauth.dll:destination=http%%3A%%2F%%2F%%2Fexchange&flags=0&" + "username=%%5C^USER^&password=^PASS^&SubmitCreds=x&trusted=0:" + "reason=:C=/exchweb\"\n", service); } diff --git a/hydra-http-proxy-urlenum.c b/hydra-http-proxy-urlenum.c index 0ca7b47..2f00ae5 100644 --- a/hydra-http-proxy-urlenum.c +++ b/hydra-http-proxy-urlenum.c @@ -5,11 +5,11 @@ extern char *HYDRA_EXIT; char *buf; static int32_t http_proxy_auth_mechanism = AUTH_ERROR; -int32_t start_http_proxy_urlenum(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp, char *hostname) { +int32_t start_http_proxy_urlenum(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp, char *hostname) { char *empty = ""; char *login, *pass, buffer[500], buffer2[500], mlogin[260], mpass[260], mhost[260]; char url[260], host[30]; - char *header = ""; /* XXX TODO */ + char *header = ""; /* XXX TODO */ char *ptr; int32_t auth = 0; @@ -19,7 +19,7 @@ int32_t start_http_proxy_urlenum(int32_t s, char *ip, int32_t port, unsigned cha return 1; } pass = hydra_get_next_password(); - pass = empty; // ignored + pass = empty; // ignored strncpy(url, login, sizeof(url) - 1); url[sizeof(url) - 1] = 0; @@ -46,12 +46,12 @@ int32_t start_http_proxy_urlenum(int32_t s, char *ip, int32_t port, unsigned cha } if (http_proxy_auth_mechanism == AUTH_ERROR) { - //send dummy request + // send dummy request sprintf(buffer, "GET %s HTTP/1.0\r\n%sUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", url, mhost, header); if (hydra_send(s, buffer, strlen(buffer), 0) < 0) return 1; - //receive first 40x + // receive first 40x buf = hydra_receive_line(s); while (buf != NULL && strstr(buf, "HTTP/") == NULL) { free(buf); @@ -61,7 +61,7 @@ int32_t start_http_proxy_urlenum(int32_t s, char *ip, int32_t port, unsigned cha if (debug) hydra_report(stderr, "S:%s\n", buf); - //after the first query we should have been disconnected from web server + // after the first query we should have been disconnected from web server s = hydra_disconnect(s); if ((options & OPTION_SSL) == 0) { s = hydra_connect_tcp(ip, port); @@ -74,8 +74,11 @@ int32_t start_http_proxy_urlenum(int32_t s, char *ip, int32_t port, unsigned cha if (hydra_strcasestr(buf, "Proxy-Authenticate: Basic") != NULL) { http_proxy_auth_mechanism = AUTH_BASIC; sprintf(buffer2, "%.50s:%.50s", login, pass); - hydra_tobase64((unsigned char *) buffer2, strlen(buffer2), sizeof(buffer2)); - sprintf(buffer, "GET %s HTTP/1.0\r\n%sProxy-Authorization: Basic %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", url, host, buffer2, header); + hydra_tobase64((unsigned char *)buffer2, strlen(buffer2), sizeof(buffer2)); + sprintf(buffer, + "GET %s HTTP/1.0\r\n%sProxy-Authorization: Basic " + "%s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", + url, host, buffer2, header); if (debug) hydra_report(stderr, "C:%s\n", buffer); if (hydra_send(s, buffer, strlen(buffer), 0) < 0) @@ -87,8 +90,8 @@ int32_t start_http_proxy_urlenum(int32_t s, char *ip, int32_t port, unsigned cha buf = hydra_receive_line(s); } - //if server cut the connection, just exit cleanly or - //this will be an infinite loop + // if server cut the connection, just exit cleanly or + // this will be an infinite loop if (buf == NULL) { if (verbose) hydra_report(stderr, "[ERROR] Server did not answer\n"); @@ -104,19 +107,23 @@ int32_t start_http_proxy_urlenum(int32_t s, char *ip, int32_t port, unsigned cha char *pos = NULL; http_proxy_auth_mechanism = AUTH_NTLM; - //send auth and receive challenge - //send auth request: let the server send it's own hostname and domainname - buildAuthRequest((tSmbNtlmAuthRequest *) buf2, 0, NULL, NULL); - to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthRequest *) buf2)); + // send auth and receive challenge + // send auth request: let the server send it's own hostname and + // domainname + buildAuthRequest((tSmbNtlmAuthRequest *)buf2, 0, NULL, NULL); + to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthRequest *)buf2)); - /* to be portable, no snprintf, buffer is big enough so it can't overflow */ - //send the first.. - sprintf(buffer, "GET %s HTTP/1.0\r\n%sProxy-Authorization: NTLM %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\nProxy-Connection: keep-alive\r\n%s\r\n", url, host, buf1, - header); + /* to be portable, no snprintf, buffer is big enough so it can't + * overflow */ + // send the first.. + sprintf(buffer, + "GET %s HTTP/1.0\r\n%sProxy-Authorization: NTLM %s\r\nUser-Agent: " + "Mozilla/4.0 (Hydra)\r\nProxy-Connection: keep-alive\r\n%s\r\n", + url, host, buf1, header); if (hydra_send(s, buffer, strlen(buffer), 0) < 0) return 1; - //receive challenge + // receive challenge free(buf); buf = hydra_receive_line(s); while (buf != NULL && (pos = hydra_strcasestr(buf, "Proxy-Authenticate: NTLM ")) == NULL) { @@ -134,17 +141,19 @@ int32_t start_http_proxy_urlenum(int32_t s, char *ip, int32_t port, unsigned cha pos[str - pos] = 0; } } - //recover challenge + // recover challenge if (buf != NULL) { if (strlen(buf) >= 4) - from64tobits((char *) buf1, pos); + from64tobits((char *)buf1, pos); free(buf); } - //Send response - buildAuthResponse((tSmbNtlmAuthChallenge *) buf1, (tSmbNtlmAuthResponse *) buf2, 0, login, pass, NULL, NULL); - to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthResponse *) buf2)); - sprintf(buffer, "GET %s HTTP/1.0\r\n%sProxy-Authorization: NTLM %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\nProxy-Connection: keep-alive\r\n%s\r\n", url, host, buf1, - header); + // Send response + buildAuthResponse((tSmbNtlmAuthChallenge *)buf1, (tSmbNtlmAuthResponse *)buf2, 0, login, pass, NULL, NULL); + to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthResponse *)buf2)); + sprintf(buffer, + "GET %s HTTP/1.0\r\n%sProxy-Authorization: NTLM %s\r\nUser-Agent: " + "Mozilla/4.0 (Hydra)\r\nProxy-Connection: keep-alive\r\n%s\r\n", + url, host, buf1, header); if (debug) hydra_report(stderr, "C:%s\n", buffer); if (hydra_send(s, buffer, strlen(buffer), 0) < 0) @@ -206,7 +215,7 @@ int32_t start_http_proxy_urlenum(int32_t s, char *ip, int32_t port, unsigned cha } } // result analysis - ptr = ((char *) index(buf, ' ')) + 1; + ptr = ((char *)index(buf, ' ')) + 1; if (*ptr == '2' || (*ptr == '3' && (*(ptr + 2) == '1' || *(ptr + 2) == '2')) || strncmp(ptr, "404", 4) == 0 || strncmp(ptr, "403", 4) == 0) { hydra_report_found_host(port, ip, "http-proxy", fp); if (fp != stdout) @@ -214,7 +223,7 @@ int32_t start_http_proxy_urlenum(int32_t s, char *ip, int32_t port, unsigned cha printf("[%d][http-proxy-urlenum] host: %s url: %s\n", port, hydra_address2string_beautiful(ip), url); hydra_completed_pair_found(); } else { - if (strncmp(ptr, "407", 3) == 0 /*|| strncmp(ptr, "401", 3) == 0 */ ) { + if (strncmp(ptr, "407", 3) == 0 /*|| strncmp(ptr, "401", 3) == 0 */) { hydra_report(stderr, "[ERROR] Proxy reports bad credentials!\n"); return 3; } @@ -228,7 +237,7 @@ int32_t start_http_proxy_urlenum(int32_t s, char *ip, int32_t port, unsigned cha return 1; } -void service_http_proxy_urlenum(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_http_proxy_urlenum(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_HTTP_PROXY, mysslport = PORT_HTTP_PROXY_SSL; @@ -239,33 +248,34 @@ void service_http_proxy_urlenum(char *ip, int32_t sp, unsigned char options, cha while (1) { next_run = 0; switch (run) { - case 1: /* connect and service init function */ - { - if (sock >= 0) - sock = hydra_disconnect(sock); -// usleepn(275); - if ((options & OPTION_SSL) == 0) { - if (port != 0) - myport = port; - sock = hydra_connect_tcp(ip, myport); - port = myport; - } else { - if (port != 0) - mysslport = port; - sock = hydra_connect_ssl(ip, mysslport, hostname); - port = mysslport; - } - if (sock < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); - hydra_child_exit(1); - } - next_run = 2; - break; + case 1: /* connect and service init function */ + { + if (sock >= 0) + sock = hydra_disconnect(sock); + // usleepn(275); + if ((options & OPTION_SSL) == 0) { + if (port != 0) + myport = port; + sock = hydra_connect_tcp(ip, myport); + port = myport; + } else { + if (port != 0) + mysslport = port; + sock = hydra_connect_ssl(ip, mysslport, hostname); + port = mysslport; } - case 2: /* run the cracking function */ + if (sock < 0) { + if (quiet != 1) + fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); + hydra_child_exit(1); + } + next_run = 2; + break; + } + case 2: /* run the cracking function */ next_run = start_http_proxy_urlenum(sock, ip, port, options, miscptr, fp, hostname); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); @@ -278,13 +288,13 @@ void service_http_proxy_urlenum(char *ip, int32_t sp, unsigned char options, cha } } -int32_t service_http_proxy_urlenum_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_http_proxy_urlenum_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here @@ -292,9 +302,13 @@ int32_t service_http_proxy_urlenum_init(char *ip, int32_t sp, unsigned char opti return 0; } -void usage_http_proxy_urlenum(const char* service) { - printf("Module http-proxy-urlenum only uses the -L option, not -x or -p/-P option.\n" +void usage_http_proxy_urlenum(const char *service) { + printf("Module http-proxy-urlenum only uses the -L option, not -x or -p/-P " + "option.\n" "The -L loginfile must contain the URL list to try through the proxy.\n" "The proxy credentials cann be put as the optional parameter, e.g.\n" - " hydra -L urllist.txt -s 3128 target.com http-proxy-urlenum user:pass\n" " hydra -L urllist.txt http-proxy-urlenum://target.com:3128/user:pass\n\n"); + " hydra -L urllist.txt -s 3128 target.com http-proxy-urlenum " + "user:pass\n" + " hydra -L urllist.txt " + "http-proxy-urlenum://target.com:3128/user:pass\n\n"); } diff --git a/hydra-http-proxy.c b/hydra-http-proxy.c index cdeb714..0e07d9b 100644 --- a/hydra-http-proxy.c +++ b/hydra-http-proxy.c @@ -5,11 +5,11 @@ extern char *HYDRA_EXIT; static int32_t http_proxy_auth_mechanism = AUTH_ERROR; char *http_proxy_buf = NULL; -int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp, char *hostname) { +int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp, char *hostname) { char *empty = ""; char *login, *pass, buffer[500], buffer2[500]; char url[210], host[60]; - char *header = ""; /* XXX TODO */ + char *header = ""; /* XXX TODO */ char *ptr, *fooptr; if (strlen(login = hydra_get_next_login()) == 0) @@ -22,7 +22,7 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option strcpy(host, "Host: www.microsoft.com\r\n"); } else { sprintf(url, "%.200s", miscptr); - ptr = strstr(miscptr, "://"); // :// check is in hydra.c + ptr = strstr(miscptr, "://"); // :// check is in hydra.c sprintf(host, "Host: %.50s", ptr + 3); if ((ptr = index(host, '/')) != NULL) *ptr = 0; @@ -32,12 +32,12 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option } if (http_proxy_auth_mechanism != AUTH_BASIC && (http_proxy_auth_mechanism == AUTH_ERROR || http_proxy_buf == NULL)) { - //send dummy request + // send dummy request sprintf(buffer, "GET %s HTTP/1.0\r\n%sUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", url, host, header); if (hydra_send(s, buffer, strlen(buffer), 0) < 0) return 3; - //receive first 40x + // receive first 40x http_proxy_buf = hydra_receive_line(s); while (http_proxy_buf != NULL && strstr(http_proxy_buf, "HTTP/") == NULL) { free(http_proxy_buf); @@ -69,7 +69,7 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option if (debug) hydra_report(stderr, "S:%s\n", http_proxy_buf); - //after the first query we should have been disconnected from web server + // after the first query we should have been disconnected from web server s = hydra_disconnect(s); if ((options & OPTION_SSL) == 0) { s = hydra_connect_tcp(ip, port); @@ -81,8 +81,11 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option if (http_proxy_auth_mechanism == AUTH_BASIC || hydra_strcasestr(http_proxy_buf, "Proxy-Authenticate: Basic") != NULL) { http_proxy_auth_mechanism = AUTH_BASIC; sprintf(buffer2, "%.50s:%.50s", login, pass); - hydra_tobase64((unsigned char *) buffer2, strlen(buffer2), sizeof(buffer2)); - sprintf(buffer, "GET %s HTTP/1.0\r\n%sProxy-Authorization: Basic %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", url, host, buffer2, header); + hydra_tobase64((unsigned char *)buffer2, strlen(buffer2), sizeof(buffer2)); + sprintf(buffer, + "GET %s HTTP/1.0\r\n%sProxy-Authorization: Basic %s\r\nUser-Agent: " + "Mozilla/4.0 (Hydra)\r\n%s\r\n", + url, host, buffer2, header); if (debug) hydra_report(stderr, "C:%s\n", buffer); if (hydra_send(s, buffer, strlen(buffer), 0) < 0) @@ -94,8 +97,8 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option http_proxy_buf = hydra_receive_line(s); } - //if server cut the connection, just exit cleanly or - //this will be an infinite loop + // if server cut the connection, just exit cleanly or + // this will be an infinite loop if (http_proxy_buf == NULL) { if (verbose) hydra_report(stderr, "[ERROR] Server did not answer\n"); @@ -106,24 +109,27 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option hydra_report(stderr, "S:%s\n", http_proxy_buf); } else { if (http_proxy_auth_mechanism == AUTH_NTLM || hydra_strcasestr(http_proxy_buf, "Proxy-Authenticate: NTLM") != NULL) { - unsigned char buf1[4096]; unsigned char buf2[4096]; char *pos = NULL; http_proxy_auth_mechanism = AUTH_NTLM; - //send auth and receive challenge - //send auth request: let the server send it's own hostname and domainname - buildAuthRequest((tSmbNtlmAuthRequest *) buf2, 0, NULL, NULL); - to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthRequest *) buf2)); + // send auth and receive challenge + // send auth request: let the server send it's own hostname and domainname + buildAuthRequest((tSmbNtlmAuthRequest *)buf2, 0, NULL, NULL); + to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthRequest *)buf2)); - /* to be portable, no snprintf, buffer is big enough so it can't overflow */ - //send the first.. - sprintf(buffer, "GET %s HTTP/1.0\r\n%sProxy-Authorization: NTLM %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\nProxy-Connection: keep-alive\r\n%s\r\n", url, host, buf1, header); + /* to be portable, no snprintf, buffer is big enough so it can't overflow + */ + // send the first.. + sprintf(buffer, + "GET %s HTTP/1.0\r\n%sProxy-Authorization: NTLM %s\r\nUser-Agent: " + "Mozilla/4.0 (Hydra)\r\nProxy-Connection: keep-alive\r\n%s\r\n", + url, host, buf1, header); if (hydra_send(s, buffer, strlen(buffer), 0) < 0) return 3; - //receive challenge + // receive challenge free(http_proxy_buf); http_proxy_buf = hydra_receive_line(s); while (http_proxy_buf != NULL && (pos = hydra_strcasestr(http_proxy_buf, "Proxy-Authenticate: NTLM ")) == NULL) { @@ -141,24 +147,27 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option pos[str - pos] = 0; } } - //recover challenge + // recover challenge if (http_proxy_buf != NULL && strlen(http_proxy_buf) >= 4) { - from64tobits((char *) buf1, pos); + from64tobits((char *)buf1, pos); free(http_proxy_buf); http_proxy_buf = NULL; return 3; } - //Send response - buildAuthResponse((tSmbNtlmAuthChallenge *) buf1, (tSmbNtlmAuthResponse *) buf2, 0, login, pass, NULL, NULL); - to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthResponse *) buf2)); - sprintf(buffer, "GET %s HTTP/1.0\r\n%sProxy-Authorization: NTLM %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\nProxy-Connection: keep-alive\r\n%s\r\n", url, host, buf1, header); + // Send response + buildAuthResponse((tSmbNtlmAuthChallenge *)buf1, (tSmbNtlmAuthResponse *)buf2, 0, login, pass, NULL, NULL); + to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthResponse *)buf2)); + sprintf(buffer, + "GET %s HTTP/1.0\r\n%sProxy-Authorization: NTLM %s\r\nUser-Agent: " + "Mozilla/4.0 (Hydra)\r\nProxy-Connection: keep-alive\r\n%s\r\n", + url, host, buf1, header); if (debug) hydra_report(stderr, "C:%s\n", buffer); if (hydra_send(s, buffer, strlen(buffer), 0) < 0) return 3; if (http_proxy_buf != NULL) - free(http_proxy_buf); + free(http_proxy_buf); http_proxy_buf = hydra_receive_line(s); while (http_proxy_buf != NULL && strstr(http_proxy_buf, "HTTP/1.") == NULL) { free(http_proxy_buf); @@ -170,7 +179,6 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option } else { #ifdef LIBOPENSSL if (hydra_strcasestr(http_proxy_buf, "Proxy-Authenticate: Digest") != NULL) { - char *pbuffer; http_proxy_auth_mechanism = AUTH_DIGESTMD5; @@ -206,7 +214,7 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option #endif { if (http_proxy_buf != NULL) { -// buf[strlen(http_proxy_buf) - 1] = '\0'; + // buf[strlen(http_proxy_buf) - 1] = '\0'; hydra_report(stderr, "Unsupported Auth type:\n%s\n", http_proxy_buf); free(http_proxy_buf); http_proxy_buf = NULL; @@ -218,7 +226,7 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option } } - ptr = ((char *) index(http_proxy_buf, ' ')) + 1; + ptr = ((char *)index(http_proxy_buf, ' ')) + 1; if (*ptr == '2' || (*ptr == '3' && *(ptr + 2) == '1') || (*ptr == '3' && *(ptr + 2) == '2')) { hydra_report_found_host(port, ip, "http-proxy", fp); hydra_completed_pair_found(); @@ -226,7 +234,7 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option http_proxy_buf = NULL; } else { if (*ptr != '4') - hydra_report(stderr, "[INFO] Unusual return code: %c for %s:%s\n", (char) *(index(http_proxy_buf, ' ') + 1), login, pass); + hydra_report(stderr, "[INFO] Unusual return code: %c for %s:%s\n", (char)*(index(http_proxy_buf, ' ') + 1), login, pass); else if (verbose && *(ptr + 2) == '3') hydra_report(stderr, "[INFO] Potential success, could be false positive: %s:%s\n", login, pass); hydra_completed_pair(); @@ -246,7 +254,7 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option return 1; } -void service_http_proxy(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_http_proxy(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_HTTP_PROXY, mysslport = PORT_HTTP_PROXY_SSL; @@ -257,36 +265,37 @@ void service_http_proxy(char *ip, int32_t sp, unsigned char options, char *miscp while (1) { next_run = 0; switch (run) { - case 1: /* connect and service init function */ - { - if (http_proxy_buf != NULL) - free(http_proxy_buf); - if (sock >= 0) - sock = hydra_disconnect(sock); -// usleepn(275); - if ((options & OPTION_SSL) == 0) { - if (port != 0) - myport = port; - sock = hydra_connect_tcp(ip, myport); - port = myport; - } else { - if (port != 0) - mysslport = port; - sock = hydra_connect_ssl(ip, mysslport, hostname); - port = mysslport; - } - - if (sock < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); - hydra_child_exit(1); - } - next_run = 2; - break; + case 1: /* connect and service init function */ + { + if (http_proxy_buf != NULL) + free(http_proxy_buf); + if (sock >= 0) + sock = hydra_disconnect(sock); + // usleepn(275); + if ((options & OPTION_SSL) == 0) { + if (port != 0) + myport = port; + sock = hydra_connect_tcp(ip, myport); + port = myport; + } else { + if (port != 0) + mysslport = port; + sock = hydra_connect_ssl(ip, mysslport, hostname); + port = mysslport; } - case 2: /* run the cracking function */ + + if (sock < 0) { + if (quiet != 1) + fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); + hydra_child_exit(1); + } + next_run = 2; + break; + } + case 2: /* run the cracking function */ next_run = start_http_proxy(sock, ip, port, options, miscptr, fp, hostname); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); @@ -299,13 +308,13 @@ void service_http_proxy(char *ip, int32_t sp, unsigned char options, char *miscp } } -int32_t service_http_proxy_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_http_proxy_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here @@ -313,7 +322,9 @@ int32_t service_http_proxy_init(char *ip, int32_t sp, unsigned char options, cha return 0; } -void usage_http_proxy(const char* service) { +void usage_http_proxy(const char *service) { printf("Module http-proxy is optionally taking the page to authenticate at.\n" - "Default is http://www.microsoft.com/)\n" "Basic, DIGEST-MD5 and NTLM are supported and negotiated automatically.\n\n"); + "Default is http://www.microsoft.com/)\n" + "Basic, DIGEST-MD5 and NTLM are supported and negotiated " + "automatically.\n\n"); } diff --git a/hydra-http.c b/hydra-http.c index 3a6b378..a1868bf 100644 --- a/hydra-http.c +++ b/hydra-http.c @@ -1,8 +1,6 @@ #include "hydra-http.h" #include "sasl.h" - - extern char *HYDRA_EXIT; char *webtarget = NULL; char *slash = "/"; @@ -10,12 +8,12 @@ char *http_buf = NULL; #define END_CONDITION_MAX_LEN 100 static char end_condition[END_CONDITION_MAX_LEN]; -int end_condition_type=-1; +int end_condition_type = -1; int32_t webport, freemischttp = 0; int32_t http_auth_mechanism = AUTH_UNASSIGNED; -int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp, char *type, ptr_header_node ptr_head) { +int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp, char *type, ptr_header_node ptr_head) { char *empty = ""; char *login, *pass, *buffer, buffer2[500]; char *header; @@ -34,7 +32,7 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha header = stringify_headers(&ptr_head); buffer_size = strlen(header) + 500; - if(!(buffer = malloc(buffer_size))) { + if (!(buffer = malloc(buffer_size))) { free(header); return 3; } @@ -49,133 +47,153 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha switch (http_auth_mechanism) { case AUTH_BASIC: sprintf(buffer2, "%.50s:%.50s", login, pass); - hydra_tobase64((unsigned char *) buffer2, strlen(buffer2), sizeof(buffer2)); + hydra_tobase64((unsigned char *)buffer2, strlen(buffer2), sizeof(buffer2)); /* again: no snprintf to be portable. don't worry, buffer can't overflow */ if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) - sprintf(buffer, "%s http://%s:%d%.250s HTTP/1.1\r\nHost: %s\r\nConnection: close\r\nAuthorization: Basic %s\r\nProxy-Authorization: Basic %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", + sprintf(buffer, + "%s http://%s:%d%.250s HTTP/1.1\r\nHost: %s\r\nConnection: " + "close\r\nAuthorization: Basic %s\r\nProxy-Authorization: Basic " + "%s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", type, webtarget, webport, miscptr, webtarget, buffer2, proxy_authentication[selected_proxy], header); else { if (use_proxy == 1) - sprintf(buffer, "%s http://%s:%d%.250s HTTP/1.1\r\nHost: %s\r\nConnection: close\r\nAuthorization: Basic %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", + sprintf(buffer, + "%s http://%s:%d%.250s HTTP/1.1\r\nHost: %s\r\nConnection: " + "close\r\nAuthorization: Basic %s\r\nUser-Agent: Mozilla/4.0 " + "(Hydra)\r\n%s\r\n", type, webtarget, webport, miscptr, webtarget, buffer2, header); else - sprintf(buffer, "%s %.250s HTTP/1.1\r\nHost: %s\r\nConnection: close\r\nAuthorization: Basic %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", type, miscptr, webtarget, buffer2, header); + sprintf(buffer, + "%s %.250s HTTP/1.1\r\nHost: %s\r\nConnection: " + "close\r\nAuthorization: Basic %s\r\nUser-Agent: Mozilla/4.0 " + "(Hydra)\r\n%s\r\n", + type, miscptr, webtarget, buffer2, header); } if (debug) hydra_report(stderr, "C:%s\n", buffer); break; #ifdef LIBOPENSSL - case AUTH_DIGESTMD5:{ - char *pbuffer; + case AUTH_DIGESTMD5: { + char *pbuffer; - pbuffer = hydra_strcasestr(http_buf, "WWW-Authenticate: Digest "); - strncpy(buffer, pbuffer + strlen("WWW-Authenticate: Digest "), buffer_size - 1); - buffer[buffer_size - 1] = '\0'; + pbuffer = hydra_strcasestr(http_buf, "WWW-Authenticate: Digest "); + strncpy(buffer, pbuffer + strlen("WWW-Authenticate: Digest "), buffer_size - 1); + buffer[buffer_size - 1] = '\0'; - fooptr = buffer2; - sasl_digest_md5(fooptr, login, pass, buffer, miscptr, type, webtarget, webport, header); - if (fooptr == NULL) { - free(buffer); - free(header); - return 3; - } - - if (debug) - hydra_report(stderr, "C:%s\n", buffer2); - strcpy(buffer, buffer2); + fooptr = buffer2; + sasl_digest_md5(fooptr, login, pass, buffer, miscptr, type, webtarget, webport, header); + if (fooptr == NULL) { + free(buffer); + free(header); + return 3; } - break; + + if (debug) + hydra_report(stderr, "C:%s\n", buffer2); + strcpy(buffer, buffer2); + } break; #endif - case AUTH_NTLM:{ - unsigned char buf1[4096]; - unsigned char buf2[4096]; - char *pos = NULL; + case AUTH_NTLM: { + unsigned char buf1[4096]; + unsigned char buf2[4096]; + char *pos = NULL; - //send auth and receive challenge - //send auth request: let the server send it's own hostname and domainname - buildAuthRequest((tSmbNtlmAuthRequest *) buf2, 0, NULL, NULL); - to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthRequest *) buf2)); + // send auth and receive challenge + // send auth request: let the server send it's own hostname and domainname + buildAuthRequest((tSmbNtlmAuthRequest *)buf2, 0, NULL, NULL); + to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthRequest *)buf2)); - /* to be portable, no snprintf, buffer is big enough so it can't overflow */ - //send the first.. - if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) + /* to be portable, no snprintf, buffer is big enough so it can't overflow */ + // send the first.. + if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) + sprintf(buffer, + "%s http://%s:%d%s HTTP/1.1\r\nHost: %s\r\nAuthorization: NTLM " + "%s\r\nProxy-Authorization: Basic %s\r\nUser-Agent: Mozilla/4.0 " + "(Hydra)\r\n%s\r\n", + type, webtarget, webport, miscptr, webtarget, buf1, proxy_authentication[selected_proxy], header); + else { + if (use_proxy == 1) sprintf(buffer, - "%s http://%s:%d%s HTTP/1.1\r\nHost: %s\r\nAuthorization: NTLM %s\r\nProxy-Authorization: Basic %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", - type, webtarget, webport, miscptr, webtarget, buf1, proxy_authentication[selected_proxy], header); - else { - if (use_proxy == 1) - sprintf(buffer, "%s http://%s:%d%s HTTP/1.1\r\nHost: %s\r\nAuthorization: NTLM %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", - type, webtarget, webport, miscptr, webtarget, buf1, header); - else - sprintf(buffer, "%s %s HTTP/1.1\r\nHost: %s\r\nAuthorization: NTLM %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", type, miscptr, webtarget, - buf1, header); - } - - if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { - free(buffer); - free(header); - return 1; - } - - //receive challenge - if (http_buf != NULL) - free(http_buf); - - http_buf = hydra_receive_line(s); - if (http_buf == NULL) { - if (verbose) - hydra_report(stderr, "[ERROR] Server did not answer\n"); - free(buffer); - free(header); - return 3; - } - - pos = hydra_strcasestr(http_buf, "WWW-Authenticate: NTLM "); - if (pos != NULL) { - char *str; - - pos += 23; - if ((str = strchr(pos, '\r')) != NULL) { - pos[str - pos] = 0; - } - if ((str = strchr(pos, '\n')) != NULL) { - pos[str - pos] = 0; - } - } else { - hydra_report(stderr, "[ERROR] It is not NTLM authentication type\n"); - return 3; - } - - //recover challenge - from64tobits((char *) buf1, pos); - free(http_buf); - http_buf = NULL; - - //Send response - buildAuthResponse((tSmbNtlmAuthChallenge *) buf1, (tSmbNtlmAuthResponse *) buf2, 0, login, pass, NULL, NULL); - to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthResponse *) buf2)); - - //create the auth response - if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) + "%s http://%s:%d%s HTTP/1.1\r\nHost: %s\r\nAuthorization: NTLM " + "%s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", + type, webtarget, webport, miscptr, webtarget, buf1, header); + else sprintf(buffer, - "%s http://%s:%d%s HTTP/1.1\r\nHost: %s\r\nAuthorization: NTLM %s\r\nProxy-Authorization: Basic %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", - type, webtarget, webport, miscptr, webtarget, buf1, proxy_authentication[selected_proxy], header); - else { - if (use_proxy == 1) - sprintf(buffer, "%s http://%s:%d%s HTTP/1.1\r\nHost: %s\r\nAuthorization: NTLM %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", - type, webtarget, webport, miscptr, webtarget, buf1, header); - else - sprintf(buffer, "%s %s HTTP/1.1\r\nHost: %s\r\nAuthorization: NTLM %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", type, miscptr, webtarget, - buf1, header); - } - - if (debug) - hydra_report(stderr, "C:%s\n", buffer); + "%s %s HTTP/1.1\r\nHost: %s\r\nAuthorization: NTLM " + "%s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", + type, miscptr, webtarget, buf1, header); } - break; + + if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { + free(buffer); + free(header); + return 1; + } + + // receive challenge + if (http_buf != NULL) + free(http_buf); + + http_buf = hydra_receive_line(s); + if (http_buf == NULL) { + if (verbose) + hydra_report(stderr, "[ERROR] Server did not answer\n"); + free(buffer); + free(header); + return 3; + } + + pos = hydra_strcasestr(http_buf, "WWW-Authenticate: NTLM "); + if (pos != NULL) { + char *str; + + pos += 23; + if ((str = strchr(pos, '\r')) != NULL) { + pos[str - pos] = 0; + } + if ((str = strchr(pos, '\n')) != NULL) { + pos[str - pos] = 0; + } + } else { + hydra_report(stderr, "[ERROR] It is not NTLM authentication type\n"); + return 3; + } + + // recover challenge + from64tobits((char *)buf1, pos); + free(http_buf); + http_buf = NULL; + + // Send response + buildAuthResponse((tSmbNtlmAuthChallenge *)buf1, (tSmbNtlmAuthResponse *)buf2, 0, login, pass, NULL, NULL); + to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthResponse *)buf2)); + + // create the auth response + if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) + sprintf(buffer, + "%s http://%s:%d%s HTTP/1.1\r\nHost: %s\r\nAuthorization: NTLM " + "%s\r\nProxy-Authorization: Basic %s\r\nUser-Agent: Mozilla/4.0 " + "(Hydra)\r\n%s\r\n", + type, webtarget, webport, miscptr, webtarget, buf1, proxy_authentication[selected_proxy], header); + else { + if (use_proxy == 1) + sprintf(buffer, + "%s http://%s:%d%s HTTP/1.1\r\nHost: %s\r\nAuthorization: NTLM " + "%s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", + type, webtarget, webport, miscptr, webtarget, buf1, header); + else + sprintf(buffer, + "%s %s HTTP/1.1\r\nHost: %s\r\nAuthorization: NTLM " + "%s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", + type, miscptr, webtarget, buf1, header); + } + + if (debug) + hydra_report(stderr, "C:%s\n", buffer); + } break; } if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { @@ -191,7 +209,8 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha tmpreplybuf[0] = 0; while (http_buf != NULL && (strstr(http_buf, "HTTP/1.") == NULL || (index(http_buf, '\n') == NULL && complete_line == 0))) { - if (debug) printf("il: %d, tmpreplybuf: %s, http_buf: %s\n", complete_line, tmpreplybuf, http_buf); + if (debug) + printf("il: %d, tmpreplybuf: %s, http_buf: %s\n", complete_line, tmpreplybuf, http_buf); if (tmpreplybuf[0] == 0 && strstr(http_buf, "HTTP/1.") != NULL) { strncpy(tmpreplybuf, http_buf, sizeof(tmpreplybuf) - 1); tmpreplybuf[sizeof(tmpreplybuf) - 1] = 0; @@ -204,7 +223,8 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha strcat(tmpreplybufptr, http_buf); free(http_buf); http_buf = tmpreplybufptr; - if (debug) printf("http_buf now: %s\n", http_buf); + if (debug) + printf("http_buf now: %s\n", http_buf); } } else { free(http_buf); @@ -212,8 +232,8 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha } } - //if server cut the connection, just exit cleanly or - //this will be an infinite loop + // if server cut the connection, just exit cleanly or + // this will be an infinite loop if (http_buf == NULL) { if (verbose) hydra_report(stderr, "[ERROR] Server did not answer\n"); @@ -225,19 +245,21 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha if (debug) hydra_report(stderr, "S:%s\n", http_buf); - ptr = ((char *) index(http_buf, ' ')); + ptr = ((char *)index(http_buf, ' ')); if (ptr != NULL) ptr++; if (ptr != NULL && (*ptr == '2' || *ptr == '3' || strncmp(ptr, "403", 3) == 0 || strncmp(ptr, "404", 3) == 0)) { #ifdef HAVE_PCRE - if (end_condition_type >= 0 && hydra_string_match(http_buf, end_condition)!=end_condition_type) { + if (end_condition_type >= 0 && hydra_string_match(http_buf, end_condition) != end_condition_type) { #else if (end_condition_type >= 0 && (strstr(http_buf, end_condition) == NULL ? 0 : 1) != end_condition_type) { -#endif - if (debug) hydra_report(stderr, "End condition not match continue.\n"); +#endif + if (debug) + hydra_report(stderr, "End condition not match continue.\n"); hydra_completed_pair(); } else { - if (debug) hydra_report(stderr, "END condition %s match.\n",end_condition); + if (debug) + hydra_report(stderr, "END condition %s match.\n", end_condition); hydra_report_found_host(port, ip, "www", fp); hydra_completed_pair_found(); } @@ -247,11 +269,11 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha } } else { if (ptr != NULL && *ptr != '4') - fprintf(stderr, "[WARNING] Unusual return code: %.3s for %s:%s\n", (char *) ptr, login, pass); + fprintf(stderr, "[WARNING] Unusual return code: %.3s for %s:%s\n", (char *)ptr, login, pass); - //the first authentication type failed, check the type from server header + // the first authentication type failed, check the type from server header if ((hydra_strcasestr(http_buf, "WWW-Authenticate: Basic") == NULL) && (http_auth_mechanism == AUTH_BASIC)) { - //seems the auth supported is not Basic scheme so testing further + // seems the auth supported is not Basic scheme so testing further int32_t find_auth = 0; if (hydra_strcasestr(http_buf, "WWW-Authenticate: NTLM") != NULL) { @@ -266,8 +288,8 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha #endif if (find_auth) { -// free(http_buf); -// http_buf = NULL; + // free(http_buf); + // http_buf = NULL; free(buffer); free(header); return 1; @@ -275,18 +297,18 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha } hydra_completed_pair(); } -// free(http_buf); -// http_buf = NULL; + // free(http_buf); + // http_buf = NULL; free(buffer); free(header); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) return 3; - + return 1; } -void service_http(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname, char *type) { +void service_http(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname, char *type) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_HTTP, mysslport = PORT_HTTP_SSL; char *ptr, *ptr2; @@ -298,14 +320,14 @@ void service_http(char *ip, int32_t sp, unsigned char options, char *miscptr, FI if ((webtarget = strstr(miscptr, "://")) != NULL) { webtarget += strlen("://"); - if ((ptr2 = index(webtarget, ':')) != NULL) { /* step over port if present */ + if ((ptr2 = index(webtarget, ':')) != NULL) { /* step over port if present */ *ptr2 = 0; ptr2++; ptr = ptr2; if (*ptr == '/' || (ptr = index(ptr2, '/')) != NULL) miscptr = ptr; else - miscptr = slash; /* to make things easier to user */ + miscptr = slash; /* to make things easier to user */ } else if ((ptr2 = index(webtarget, '/')) != NULL) { miscptr = malloc(strlen(ptr2) + 1); freemischttp = 1; @@ -313,9 +335,8 @@ void service_http(char *ip, int32_t sp, unsigned char options, char *miscptr, FI *ptr2 = 0; } else webtarget = hostname; - } else - if (strlen(miscptr) == 0) - miscptr = strdup("/"); + } else if (strlen(miscptr) == 0) + miscptr = strdup("/"); if (webtarget == NULL) webtarget = hostname; if (port != 0) @@ -333,43 +354,45 @@ void service_http(char *ip, int32_t sp, unsigned char options, char *miscptr, FI *ptr++ = 0; optional1 = ptr; - if (!parse_options(optional1, &ptr_head)) // this function is in hydra-http-form.c !! + if (!parse_options(optional1, + &ptr_head)) // this function is in hydra-http-form.c !! run = 4; if (http_auth_mechanism == AUTH_UNASSIGNED) http_auth_mechanism = AUTH_BASIC; - + while (1) { next_run = 0; switch (run) { - case 1: /* connect and service init function */ - { - if (sock >= 0) - sock = hydra_disconnect(sock); - if ((options & OPTION_SSL) == 0) { - if (port != 0) - myport = port; - sock = hydra_connect_tcp(ip, myport); - port = myport; - } else { - if (port != 0) - mysslport = port; - sock = hydra_connect_ssl(ip, mysslport, hostname); - port = mysslport; - } - if (sock < 0) { - if (freemischttp) - free(miscptr); - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); - hydra_child_exit(1); - } - next_run = 2; - break; + case 1: /* connect and service init function */ + { + if (sock >= 0) + sock = hydra_disconnect(sock); + if ((options & OPTION_SSL) == 0) { + if (port != 0) + myport = port; + sock = hydra_connect_tcp(ip, myport); + port = myport; + } else { + if (port != 0) + mysslport = port; + sock = hydra_connect_ssl(ip, mysslport, hostname); + port = mysslport; } - case 2: /* run the cracking function */ + if (sock < 0) { + if (freemischttp) + free(miscptr); + if (quiet != 1) + fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); + hydra_child_exit(1); + } + next_run = 2; + break; + } + case 2: /* run the cracking function */ next_run = start_http(sock, ip, port, options, miscptr, fp, type, ptr_head); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); if (freemischttp) @@ -386,76 +409,72 @@ void service_http(char *ip, int32_t sp, unsigned char options, char *miscptr, FI } } -void service_http_get(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { - service_http(ip, sp, options, miscptr, fp, port, hostname, "GET"); -} +void service_http_get(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { service_http(ip, sp, options, miscptr, fp, port, hostname, "GET"); } -void service_http_post(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { - service_http(ip, sp, options, miscptr, fp, port, hostname, "POST"); -} +void service_http_post(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { service_http(ip, sp, options, miscptr, fp, port, hostname, "POST"); } -void service_http_head(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { - service_http(ip, sp, options, miscptr, fp, port, hostname, "HEAD"); -} +void service_http_head(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { service_http(ip, sp, options, miscptr, fp, port, hostname, "HEAD"); } -int32_t service_http_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_http_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here + /*POU CODE */ + char *start = strstr(miscptr, "F="); + if (start == NULL) + start = strstr(miscptr, "S="); - - /*POU CODE */ - char * start=strstr(miscptr, "F="); - if(start==NULL) - start=strstr(miscptr, "S="); + if (start != NULL) { + if (start[0] == 'F') + end_condition_type = 0; + else + end_condition_type = 1; - if (start !=NULL){ - if(start[0]=='F') - end_condition_type=0; - else - end_condition_type=1; - - int condition_len=strlen(start); - memset(end_condition,0,END_CONDITION_MAX_LEN); - if(condition_len>=END_CONDITION_MAX_LEN){ - hydra_report(stderr,"Condition string cannot be bigger than %u.",END_CONDITION_MAX_LEN); - return -1; - } - //copy condition witout starting string (F= or S= 2char) - strncpy(end_condition, start+2,condition_len-2); - if(debug) - hydra_report(stderr, "End condition is %s, mod is %d\n",end_condition,end_condition_type); - - if(*(start-1)==' ') - start--; - memset(start,'\0',condition_len); - if (debug) - hydra_report(stderr, "Modificated options:%s\n",miscptr); - }else{ - if (debug) - hydra_report(stderr, "Condition not found\n"); + int condition_len = strlen(start); + memset(end_condition, 0, END_CONDITION_MAX_LEN); + if (condition_len >= END_CONDITION_MAX_LEN) { + hydra_report(stderr, "Condition string cannot be bigger than %u.", END_CONDITION_MAX_LEN); + return -1; } - - + // copy condition witout starting string (F= or S= 2char) + strncpy(end_condition, start + 2, condition_len - 2); + if (debug) + hydra_report(stderr, "End condition is %s, mod is %d\n", end_condition, end_condition_type); + if (*(start - 1) == ' ') + start--; + memset(start, '\0', condition_len); + if (debug) + hydra_report(stderr, "Modificated options:%s\n", miscptr); + } else { + if (debug) + hydra_report(stderr, "Condition not found\n"); + } return 0; } -void usage_http(const char* service) { +void usage_http(const char *service) { printf("Module %s requires the page to authenticate.\n" "The following parameters are optional:\n" - " (a|A)=auth-type specify authentication mechanism to use: BASIC, NTLM or MD5\n" - " (h|H)=My-Hdr\\: foo to send a user defined HTTP header with each request\n" - " (F|S)=check for text in the HTTP reply. S= means if this text is found, a\n" - " valid account has been found, F= means if this string is present the\n" - " combination is invalid. Note: this must be the last option supplied.\n" - "For example: \"/secret\" or \"http://bla.com/foo/bar:H=Cookie\\: sessid=aaaa\" or \"https://test.com:8080/members:A=NTLM\"\n\n", service); + " (a|A)=auth-type specify authentication mechanism to use: BASIC, " + "NTLM or MD5\n" + " (h|H)=My-Hdr\\: foo to send a user defined HTTP header with each " + "request\n" + " (F|S)=check for text in the HTTP reply. S= means if this text is " + "found, a\n" + " valid account has been found, F= means if this string is " + "present the\n" + " combination is invalid. Note: this must be the last option " + "supplied.\n" + "For example: \"/secret\" or \"http://bla.com/foo/bar:H=Cookie\\: " + "sessid=aaaa\" or \"https://test.com:8080/members:A=NTLM\"\n\n", + service); } diff --git a/hydra-http.h b/hydra-http.h index b6b4c2b..18a12f0 100644 --- a/hydra-http.h +++ b/hydra-http.h @@ -4,10 +4,10 @@ #include "hydra-mod.h" /* HTTP Header Types */ -#define HEADER_TYPE_USERHEADER 'h' -#define HEADER_TYPE_USERHEADER_REPL 'H' -#define HEADER_TYPE_DEFAULT 'D' -#define HEADER_TYPE_DEFAULT_REPL 'd' +#define HEADER_TYPE_USERHEADER 'h' +#define HEADER_TYPE_USERHEADER_REPL 'H' +#define HEADER_TYPE_DEFAULT 'D' +#define HEADER_TYPE_DEFAULT_REPL 'd' typedef struct header_node t_header_node, *ptr_header_node; @@ -15,7 +15,7 @@ extern char *webtarget; extern char *slash; extern char *optional1; -extern int32_t parse_options(char *miscptr, ptr_header_node * ptr_head); -extern int32_t add_header(ptr_header_node * ptr_head, char *header, char *value, char type); +extern int32_t parse_options(char *miscptr, ptr_header_node *ptr_head); +extern int32_t add_header(ptr_header_node *ptr_head, char *header, char *value, char type); extern char *stringify_headers(ptr_header_node *ptr_head); #endif diff --git a/hydra-icq.c b/hydra-icq.c index 86c968c..c59e38a 100644 --- a/hydra-icq.c +++ b/hydra-icq.c @@ -4,32 +4,10 @@ extern char *HYDRA_EXIT; extern int32_t child_head_no; int32_t seq = 1; -const unsigned char icq5_table[] = { - 0x59, 0x60, 0x37, 0x6B, 0x65, 0x62, 0x46, 0x48, 0x53, 0x61, 0x4C, - 0x59, 0x60, 0x57, 0x5B, 0x3D, 0x5E, 0x34, 0x6D, 0x36, 0x50, 0x3F, - 0x6F, 0x67, 0x53, 0x61, 0x4C, 0x59, 0x40, 0x47, 0x63, 0x39, 0x50, - 0x5F, 0x5F, 0x3F, 0x6F, 0x47, 0x43, 0x69, 0x48, 0x33, 0x31, 0x64, - 0x35, 0x5A, 0x4A, 0x42, 0x56, 0x40, 0x67, 0x53, 0x41, 0x07, 0x6C, - 0x49, 0x58, 0x3B, 0x4D, 0x46, 0x68, 0x43, 0x69, 0x48, 0x33, 0x31, - 0x44, 0x65, 0x62, 0x46, 0x48, 0x53, 0x41, 0x07, 0x6C, 0x69, 0x48, - 0x33, 0x51, 0x54, 0x5D, 0x4E, 0x6C, 0x49, 0x38, 0x4B, 0x55, 0x4A, - 0x62, 0x46, 0x48, 0x33, 0x51, 0x34, 0x6D, 0x36, 0x50, 0x5F, 0x5F, - 0x5F, 0x3F, 0x6F, 0x47, 0x63, 0x59, 0x40, 0x67, 0x33, 0x31, 0x64, - 0x35, 0x5A, 0x6A, 0x52, 0x6E, 0x3C, 0x51, 0x34, 0x6D, 0x36, 0x50, - 0x5F, 0x5F, 0x3F, 0x4F, 0x37, 0x4B, 0x35, 0x5A, 0x4A, 0x62, 0x66, - 0x58, 0x3B, 0x4D, 0x66, 0x58, 0x5B, 0x5D, 0x4E, 0x6C, 0x49, 0x58, - 0x3B, 0x4D, 0x66, 0x58, 0x3B, 0x4D, 0x46, 0x48, 0x53, 0x61, 0x4C, - 0x59, 0x40, 0x67, 0x33, 0x31, 0x64, 0x55, 0x6A, 0x32, 0x3E, 0x44, - 0x45, 0x52, 0x6E, 0x3C, 0x31, 0x64, 0x55, 0x6A, 0x52, 0x4E, 0x6C, - 0x69, 0x48, 0x53, 0x61, 0x4C, 0x39, 0x30, 0x6F, 0x47, 0x63, 0x59, - 0x60, 0x57, 0x5B, 0x3D, 0x3E, 0x64, 0x35, 0x3A, 0x3A, 0x5A, 0x6A, - 0x52, 0x4E, 0x6C, 0x69, 0x48, 0x53, 0x61, 0x6C, 0x49, 0x58, 0x3B, - 0x4D, 0x46, 0x68, 0x63, 0x39, 0x50, 0x5F, 0x5F, 0x3F, 0x6F, 0x67, - 0x53, 0x41, 0x25, 0x41, 0x3C, 0x51, 0x54, 0x3D, 0x5E, 0x54, 0x5D, - 0x4E, 0x4C, 0x39, 0x50, 0x5F, 0x5F, 0x5F, 0x3F, 0x6F, 0x47, 0x43, - 0x69, 0x48, 0x33, 0x51, 0x54, 0x5D, 0x6E, 0x3C, 0x31, 0x64, 0x35, - 0x5A, 0x00, 0x00 -}; +const unsigned char icq5_table[] = {0x59, 0x60, 0x37, 0x6B, 0x65, 0x62, 0x46, 0x48, 0x53, 0x61, 0x4C, 0x59, 0x60, 0x57, 0x5B, 0x3D, 0x5E, 0x34, 0x6D, 0x36, 0x50, 0x3F, 0x6F, 0x67, 0x53, 0x61, 0x4C, 0x59, 0x40, 0x47, 0x63, 0x39, 0x50, 0x5F, 0x5F, 0x3F, 0x6F, 0x47, 0x43, 0x69, 0x48, 0x33, 0x31, 0x64, 0x35, 0x5A, 0x4A, 0x42, 0x56, 0x40, 0x67, 0x53, 0x41, 0x07, 0x6C, 0x49, 0x58, 0x3B, 0x4D, 0x46, 0x68, 0x43, 0x69, 0x48, + 0x33, 0x31, 0x44, 0x65, 0x62, 0x46, 0x48, 0x53, 0x41, 0x07, 0x6C, 0x69, 0x48, 0x33, 0x51, 0x54, 0x5D, 0x4E, 0x6C, 0x49, 0x38, 0x4B, 0x55, 0x4A, 0x62, 0x46, 0x48, 0x33, 0x51, 0x34, 0x6D, 0x36, 0x50, 0x5F, 0x5F, 0x5F, 0x3F, 0x6F, 0x47, 0x63, 0x59, 0x40, 0x67, 0x33, 0x31, 0x64, 0x35, 0x5A, 0x6A, 0x52, 0x6E, 0x3C, 0x51, 0x34, 0x6D, 0x36, 0x50, 0x5F, 0x5F, 0x3F, 0x4F, 0x37, 0x4B, 0x35, + 0x5A, 0x4A, 0x62, 0x66, 0x58, 0x3B, 0x4D, 0x66, 0x58, 0x5B, 0x5D, 0x4E, 0x6C, 0x49, 0x58, 0x3B, 0x4D, 0x66, 0x58, 0x3B, 0x4D, 0x46, 0x48, 0x53, 0x61, 0x4C, 0x59, 0x40, 0x67, 0x33, 0x31, 0x64, 0x55, 0x6A, 0x32, 0x3E, 0x44, 0x45, 0x52, 0x6E, 0x3C, 0x31, 0x64, 0x55, 0x6A, 0x52, 0x4E, 0x6C, 0x69, 0x48, 0x53, 0x61, 0x4C, 0x39, 0x30, 0x6F, 0x47, 0x63, 0x59, 0x60, 0x57, 0x5B, 0x3D, 0x3E, + 0x64, 0x35, 0x3A, 0x3A, 0x5A, 0x6A, 0x52, 0x4E, 0x6C, 0x69, 0x48, 0x53, 0x61, 0x6C, 0x49, 0x58, 0x3B, 0x4D, 0x46, 0x68, 0x63, 0x39, 0x50, 0x5F, 0x5F, 0x3F, 0x6F, 0x67, 0x53, 0x41, 0x25, 0x41, 0x3C, 0x51, 0x54, 0x3D, 0x5E, 0x54, 0x5D, 0x4E, 0x4C, 0x39, 0x50, 0x5F, 0x5F, 0x5F, 0x3F, 0x6F, 0x47, 0x43, 0x69, 0x48, 0x33, 0x51, 0x54, 0x5D, 0x6E, 0x3C, 0x31, 0x64, 0x35, 0x5A, 0x00, 0x00}; void fix_packet(char *buf, int32_t len) { unsigned long c1, c2; @@ -141,7 +119,7 @@ int32_t icq_ack(int32_t s, char *login) { return (hydra_send(s, buf, 10, 0)); } -int32_t start_icq(int32_t sock, char *ip, int32_t port, FILE * output, char *miscptr, FILE * fp) { +int32_t start_icq(int32_t sock, char *ip, int32_t port, FILE *output, char *miscptr, FILE *fp) { unsigned char buf[1024]; char *login, *pass; char *empty = ""; @@ -153,7 +131,7 @@ int32_t start_icq(int32_t sock, char *ip, int32_t port, FILE * output, char *mis pass = empty; for (i = 0; login[i]; i++) - if (!isdigit((int32_t) login[i])) { + if (!isdigit((int32_t)login[i])) { fprintf(stderr, "[ERROR] Invalid UIN %s\n, ignoring.", login); hydra_completed_pair(); return 2; @@ -162,13 +140,13 @@ int32_t start_icq(int32_t sock, char *ip, int32_t port, FILE * output, char *mis icq_login(sock, login, pass); while (1) { - if ((r = hydra_recv(sock, (char *) buf, sizeof(buf))) == 0) { + if ((r = hydra_recv(sock, (char *)buf, sizeof(buf))) == 0) { return 1; } if (r < 0) { if (verbose) - fprintf(stderr, "[ERROR] Process %d: Can not connect [unreachable]\n", (int32_t) getpid()); + fprintf(stderr, "[ERROR] Process %d: Can not connect [unreachable]\n", (int32_t)getpid()); return 3; } @@ -177,9 +155,9 @@ int32_t start_icq(int32_t sock, char *ip, int32_t port, FILE * output, char *mis hydra_completed_pair_found(); icq_ack(sock, login); icq_login_1(sock, login); - hydra_recv(sock, (char *) buf, sizeof(buf)); + hydra_recv(sock, (char *)buf, sizeof(buf)); icq_ack(sock, login); - hydra_recv(sock, (char *) buf, sizeof(buf)); + hydra_recv(sock, (char *)buf, sizeof(buf)); icq_ack(sock, login); icq_disconnect(sock, login); break; @@ -188,7 +166,8 @@ int32_t start_icq(int32_t sock, char *ip, int32_t port, FILE * output, char *mis break; } -/* if((buf[2] != 10 || buf[3] != 0) && (buf[2] != 250 || buf[3] != 0)) */ + /* if((buf[2] != 10 || buf[3] != 0) && (buf[2] != 250 || buf[3] != 0)) + */ } if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -196,7 +175,7 @@ int32_t start_icq(int32_t sock, char *ip, int32_t port, FILE * output, char *mis return 1; } -void service_icq(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_icq(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_ICQ; @@ -221,7 +200,8 @@ void service_icq(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL sock = hydra_disconnect(sock); sock = hydra_connect_udp(ip, myport); if (sock < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + if (quiet != 1) + fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } next_run = 2; @@ -243,13 +223,13 @@ void service_icq(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL } } -int32_t service_icq_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_icq_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here diff --git a/hydra-imap.c b/hydra-imap.c index f9a3822..b93fc6e 100644 --- a/hydra-imap.c +++ b/hydra-imap.c @@ -20,7 +20,8 @@ char *imap_read_server_capacity(int32_t sock) { if (strstr(buf, "CAPABILITY") != NULL && buf[0] == '*') { resp = 1; usleepn(300); - /* we got the capability info then get the completed warning info from server */ + /* we got the capability info then get the completed warning info from + * server */ while (hydra_data_ready(sock)) { free(buf); buf = hydra_receive_line(sock); @@ -30,7 +31,7 @@ char *imap_read_server_capacity(int32_t sock) { buf[strlen(buf) - 1] = 0; if (buf[strlen(buf) - 1] == '\r') buf[strlen(buf) - 1] = 0; - if (isdigit((int32_t) *ptr) && *(ptr + 1) == ' ') { + if (isdigit((int32_t)*ptr) && *(ptr + 1) == ' ') { resp = 1; } } @@ -39,7 +40,7 @@ char *imap_read_server_capacity(int32_t sock) { return buf; } -int32_t start_imap(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_imap(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, *pass, buffer[500], buffer2[500], *fooptr; @@ -69,7 +70,7 @@ int32_t start_imap(int32_t s, char *ip, int32_t port, unsigned char options, cha } free(buf); strcpy(buffer2, login); - hydra_tobase64((unsigned char *) buffer2, strlen(buffer2), sizeof(buffer2)); + hydra_tobase64((unsigned char *)buffer2, strlen(buffer2), sizeof(buffer2)); sprintf(buffer, "%.250s\r\n", buffer2); if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { @@ -84,7 +85,7 @@ int32_t start_imap(int32_t s, char *ip, int32_t port, unsigned char options, cha } free(buf); strcpy(buffer2, pass); - hydra_tobase64((unsigned char *) buffer2, strlen(buffer2), sizeof(buffer2)); + hydra_tobase64((unsigned char *)buffer2, strlen(buffer2), sizeof(buffer2)); sprintf(buffer, "%.250s\r\n", buffer2); break; @@ -110,220 +111,212 @@ int32_t start_imap(int32_t s, char *ip, int32_t port, unsigned char options, cha #ifdef LIBOPENSSL case AUTH_CRAMMD5: case AUTH_CRAMSHA1: - case AUTH_CRAMSHA256:{ - int32_t rc = 0; - char *preplogin; + case AUTH_CRAMSHA256: { + int32_t rc = 0; + char *preplogin; - rc = sasl_saslprep(login, SASL_ALLOW_UNASSIGNED, &preplogin); - if (rc) { - return 3; - } + rc = sasl_saslprep(login, SASL_ALLOW_UNASSIGNED, &preplogin); + if (rc) { + return 3; + } + switch (imap_auth_mechanism) { + case AUTH_CRAMMD5: + sprintf(buffer, "%d AUTHENTICATE CRAM-MD5\r\n", counter); + break; + case AUTH_CRAMSHA1: + sprintf(buffer, "%d AUTHENTICATE CRAM-SHA1\r\n", counter); + break; + case AUTH_CRAMSHA256: + sprintf(buffer, "%d AUTHENTICATE CRAM-SHA256\r\n", counter); + break; + } + if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { + return 1; + } + // get the one-time BASE64 encoded challenge + if ((buf = hydra_receive_line(s)) == NULL) + return 1; + if (strstr(buf, " NO ") != NULL || strstr(buf, "failed") != NULL || strstr(buf, " BAD ") != NULL || strstr(buf, "BYE") != NULL) { switch (imap_auth_mechanism) { - case AUTH_CRAMMD5: - sprintf(buffer, "%d AUTHENTICATE CRAM-MD5\r\n", counter); + hydra_report(stderr, "[ERROR] IMAP CRAM-MD5 AUTH : %s\n", buf); break; case AUTH_CRAMSHA1: - sprintf(buffer, "%d AUTHENTICATE CRAM-SHA1\r\n", counter); + hydra_report(stderr, "[ERROR] IMAP CRAM-SHA1 AUTH : %s\n", buf); break; case AUTH_CRAMSHA256: - sprintf(buffer, "%d AUTHENTICATE CRAM-SHA256\r\n", counter); + hydra_report(stderr, "[ERROR] IMAP CRAM-SHA256 AUTH : %s\n", buf); break; } - if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { - return 1; - } - //get the one-time BASE64 encoded challenge - if ((buf = hydra_receive_line(s)) == NULL) - return 1; - if (strstr(buf, " NO ") != NULL || strstr(buf, "failed") != NULL || strstr(buf, " BAD ") != NULL || strstr(buf, "BYE") != NULL) { - switch (imap_auth_mechanism) { - case AUTH_CRAMMD5: - hydra_report(stderr, "[ERROR] IMAP CRAM-MD5 AUTH : %s\n", buf); - break; - case AUTH_CRAMSHA1: - hydra_report(stderr, "[ERROR] IMAP CRAM-SHA1 AUTH : %s\n", buf); - break; - case AUTH_CRAMSHA256: - hydra_report(stderr, "[ERROR] IMAP CRAM-SHA256 AUTH : %s\n", buf); - break; - } - free(buf); - return 3; - } - - memset(buffer, 0, sizeof(buffer)); - from64tobits((char *) buffer, buf + 2); free(buf); + return 3; + } + + memset(buffer, 0, sizeof(buffer)); + from64tobits((char *)buffer, buf + 2); + free(buf); + + memset(buffer2, 0, sizeof(buffer2)); + + switch (imap_auth_mechanism) { + case AUTH_CRAMMD5: { + sasl_cram_md5(buffer2, pass, buffer); + sprintf(buffer, "%s %.250s", preplogin, buffer2); + } break; + case AUTH_CRAMSHA1: { + sasl_cram_sha1(buffer2, pass, buffer); + sprintf(buffer, "%s %.250s", preplogin, buffer2); + } break; + case AUTH_CRAMSHA256: { + sasl_cram_sha256(buffer2, pass, buffer); + sprintf(buffer, "%s %.250s", preplogin, buffer2); + } break; + } + hydra_tobase64((unsigned char *)buffer, strlen(buffer), sizeof(buffer)); + + char tmp_buffer[sizeof(buffer)]; + sprintf(tmp_buffer, "%.250s\r\n", buffer); + strcpy(buffer, tmp_buffer); + + free(preplogin); + } break; + case AUTH_DIGESTMD5: { + sprintf(buffer, "%d AUTHENTICATE DIGEST-MD5\r\n", counter); + + if (hydra_send(s, buffer, strlen(buffer), 0) < 0) + return 1; + // receive + if ((buf = hydra_receive_line(s)) == NULL) + return 1; + if (strstr(buf, " NO ") != NULL || strstr(buf, "failed") != NULL || strstr(buf, " BAD ") != NULL || strstr(buf, "BYE") != NULL) { + hydra_report(stderr, "[ERROR] IMAP DIGEST-MD5 AUTH : %s\n", buf); + free(buf); + return 3; + } + memset(buffer, 0, sizeof(buffer)); + from64tobits((char *)buffer, buf); + free(buf); + + if (debug) + hydra_report(stderr, "DEBUG S: %s\n", buffer); + + fooptr = buffer2; + sasl_digest_md5(fooptr, login, pass, buffer, miscptr, "imap", NULL, 0, NULL); + if (fooptr == NULL) + return 3; + if (debug) + hydra_report(stderr, "DEBUG C: %s\n", buffer2); + hydra_tobase64((unsigned char *)buffer2, strlen(buffer2), sizeof(buffer2)); + sprintf(buffer, "%s\r\n", buffer2); + + } break; + case AUTH_SCRAMSHA1: { + char clientfirstmessagebare[200]; + char serverfirstmessage[200]; + char *preplogin; + int32_t rc = sasl_saslprep(login, SASL_ALLOW_UNASSIGNED, &preplogin); + + if (rc) { + return 3; + } + sprintf(buffer, "%d AUTHENTICATE SCRAM-SHA-1\r\n", counter); + if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { + return 1; + } + if ((buf = hydra_receive_line(s)) == NULL) + return 1; + if (strstr(buf, " NO ") != NULL || strstr(buf, "failed") != NULL || strstr(buf, " BAD ") != NULL || strstr(buf, "BYE") != NULL) { + hydra_report(stderr, "[ERROR] IMAP SCRAM-SHA1 AUTH : %s\n", buf); + free(buf); + return 3; + } + free(buf); + + snprintf(clientfirstmessagebare, sizeof(clientfirstmessagebare), "n=%s,r=hydra", preplogin); + free(preplogin); + memset(buffer2, 0, sizeof(buffer2)); + sprintf(buffer2, "n,,%.200s", clientfirstmessagebare); + hydra_tobase64((unsigned char *)buffer2, strlen(buffer2), sizeof(buffer2)); + snprintf(buffer, sizeof(buffer), "%s\r\n", buffer2); + + if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { + return 1; + } + buf = hydra_receive_line(s); + if (buf == NULL) + return 1; + if (strstr(buf, " NO ") != NULL || strstr(buf, "failed") != NULL || strstr(buf, " BAD ") != NULL || strstr(buf, "BYE") != NULL) { + if (verbose || debug) + hydra_report(stderr, "[ERROR] Not a valid server challenge\n"); + free(buf); + return 1; + } else { + /* recover server challenge */ + memset(buffer, 0, sizeof(buffer)); + //+ cj1oeWRyYU9VNVZqcHQ5RjNqcmVXRVFWTCxzPWhGbTNnRGw0akdidzJVVHosaT00MDk2 + from64tobits((char *)buffer, buf + 2); + free(buf); + strncpy(serverfirstmessage, buffer, sizeof(serverfirstmessage) - 1); + serverfirstmessage[sizeof(serverfirstmessage) - 1] = '\0'; memset(buffer2, 0, sizeof(buffer2)); - - switch (imap_auth_mechanism) { - case AUTH_CRAMMD5:{ - sasl_cram_md5(buffer2, pass, buffer); - sprintf(buffer, "%s %.250s", preplogin, buffer2); - } - break; - case AUTH_CRAMSHA1:{ - sasl_cram_sha1(buffer2, pass, buffer); - sprintf(buffer, "%s %.250s", preplogin, buffer2); - } - break; - case AUTH_CRAMSHA256:{ - sasl_cram_sha256(buffer2, pass, buffer); - sprintf(buffer, "%s %.250s", preplogin, buffer2); - } - break; - } - hydra_tobase64((unsigned char *) buffer, strlen(buffer), sizeof(buffer)); - - char tmp_buffer[sizeof(buffer)]; - sprintf(tmp_buffer, "%.250s\r\n", buffer); - strcpy(buffer, tmp_buffer); - - free(preplogin); - } - break; - case AUTH_DIGESTMD5:{ - sprintf(buffer, "%d AUTHENTICATE DIGEST-MD5\r\n", counter); - - if (hydra_send(s, buffer, strlen(buffer), 0) < 0) - return 1; - //receive - if ((buf = hydra_receive_line(s)) == NULL) - return 1; - if (strstr(buf, " NO ") != NULL || strstr(buf, "failed") != NULL || strstr(buf, " BAD ") != NULL || strstr(buf, "BYE") != NULL) { - hydra_report(stderr, "[ERROR] IMAP DIGEST-MD5 AUTH : %s\n", buf); - free(buf); - return 3; - } - memset(buffer, 0, sizeof(buffer)); - from64tobits((char *) buffer, buf); - free(buf); - - if (debug) - hydra_report(stderr, "DEBUG S: %s\n", buffer); - fooptr = buffer2; - sasl_digest_md5(fooptr, login, pass, buffer, miscptr, "imap", NULL, 0, NULL); - if (fooptr == NULL) - return 3; - if (debug) - hydra_report(stderr, "DEBUG C: %s\n", buffer2); - hydra_tobase64((unsigned char *) buffer2, strlen(buffer2), sizeof(buffer2)); + sasl_scram_sha1(fooptr, pass, clientfirstmessagebare, serverfirstmessage); + if (fooptr == NULL) { + hydra_report(stderr, "[ERROR] Can't compute client response\n"); + return 1; + } + hydra_tobase64((unsigned char *)buffer2, strlen(buffer2), sizeof(buffer2)); sprintf(buffer, "%s\r\n", buffer2); - } - break; - case AUTH_SCRAMSHA1:{ - char clientfirstmessagebare[200]; - char serverfirstmessage[200]; - char *preplogin; - int32_t rc = sasl_saslprep(login, SASL_ALLOW_UNASSIGNED, &preplogin); - - if (rc) { - return 3; - } - sprintf(buffer, "%d AUTHENTICATE SCRAM-SHA-1\r\n", counter); - if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { - return 1; - } - if ((buf = hydra_receive_line(s)) == NULL) - return 1; - if (strstr(buf, " NO ") != NULL || strstr(buf, "failed") != NULL || strstr(buf, " BAD ") != NULL || strstr(buf, "BYE") != NULL) { - hydra_report(stderr, "[ERROR] IMAP SCRAM-SHA1 AUTH : %s\n", buf); - free(buf); - return 3; - } - free(buf); - - snprintf(clientfirstmessagebare, sizeof(clientfirstmessagebare), "n=%s,r=hydra", preplogin); - free(preplogin); - memset(buffer2, 0, sizeof(buffer2)); - sprintf(buffer2, "n,,%.200s", clientfirstmessagebare); - hydra_tobase64((unsigned char *) buffer2, strlen(buffer2), sizeof(buffer2)); - snprintf(buffer, sizeof(buffer), "%s\r\n", buffer2); - - if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { - return 1; - } - buf = hydra_receive_line(s); - if (buf == NULL) - return 1; - if (strstr(buf, " NO ") != NULL || strstr(buf, "failed") != NULL || strstr(buf, " BAD ") != NULL || strstr(buf, "BYE") != NULL) { - if (verbose || debug) - hydra_report(stderr, "[ERROR] Not a valid server challenge\n"); - free(buf); - return 1; - } else { - /* recover server challenge */ - memset(buffer, 0, sizeof(buffer)); - //+ cj1oeWRyYU9VNVZqcHQ5RjNqcmVXRVFWTCxzPWhGbTNnRGw0akdidzJVVHosaT00MDk2 - from64tobits((char *) buffer, buf + 2); - free(buf); - strncpy(serverfirstmessage, buffer, sizeof(serverfirstmessage) - 1); - serverfirstmessage[sizeof(serverfirstmessage) - 1] = '\0'; - - memset(buffer2, 0, sizeof(buffer2)); - fooptr = buffer2; - sasl_scram_sha1(fooptr, pass, clientfirstmessagebare, serverfirstmessage); - if (fooptr == NULL) { - hydra_report(stderr, "[ERROR] Can't compute client response\n"); - return 1; - } - hydra_tobase64((unsigned char *) buffer2, strlen(buffer2), sizeof(buffer2)); - sprintf(buffer, "%s\r\n", buffer2); - } - } - break; + } break; #endif - case AUTH_NTLM:{ - unsigned char buf1[4096]; - unsigned char buf2[4096]; + case AUTH_NTLM: { + unsigned char buf1[4096]; + unsigned char buf2[4096]; - //Send auth request - sprintf(buffer, "%d AUTHENTICATE NTLM\r\n", counter); + // Send auth request + sprintf(buffer, "%d AUTHENTICATE NTLM\r\n", counter); - if (hydra_send(s, buffer, strlen(buffer), 0) < 0) - return 1; - //receive - if ((buf = hydra_receive_line(s)) == NULL) - return 1; - if (strstr(buf, " NO ") != NULL || strstr(buf, "failed") != NULL || strstr(buf, " BAD ") != NULL || strstr(buf, "BYE") != NULL) { - hydra_report(stderr, "[ERROR] IMAP NTLM AUTH : %s\n", buf); - free(buf); - return 3; - } + if (hydra_send(s, buffer, strlen(buffer), 0) < 0) + return 1; + // receive + if ((buf = hydra_receive_line(s)) == NULL) + return 1; + if (strstr(buf, " NO ") != NULL || strstr(buf, "failed") != NULL || strstr(buf, " BAD ") != NULL || strstr(buf, "BYE") != NULL) { + hydra_report(stderr, "[ERROR] IMAP NTLM AUTH : %s\n", buf); free(buf); - //send auth and receive challenge - //send auth request: lst the server send it's own hostname and domainname - buildAuthRequest((tSmbNtlmAuthRequest *) buf2, 0, NULL, NULL); - to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthRequest *) buf2)); - - sprintf(buffer, "%s\r\n", buf1); - if (hydra_send(s, buffer, strlen(buffer), 0) < 0) - return 1; - if ((buf = hydra_receive_line(s)) == NULL) - return 1; - if (strlen(buf) < 6) { - free(buf); - return 1; - } - - //recover challenge - from64tobits((char *) buf1, buf + 2); - free(buf); - - //Send response - buildAuthResponse((tSmbNtlmAuthChallenge *) buf1, (tSmbNtlmAuthResponse *) buf2, 0, login, pass, NULL, NULL); - to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthResponse *) buf2)); - - sprintf(buffer, "%s\r\n", buf1); + return 3; } - break; + free(buf); + // send auth and receive challenge + // send auth request: lst the server send it's own hostname and domainname + buildAuthRequest((tSmbNtlmAuthRequest *)buf2, 0, NULL, NULL); + to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthRequest *)buf2)); + + sprintf(buffer, "%s\r\n", buf1); + if (hydra_send(s, buffer, strlen(buffer), 0) < 0) + return 1; + if ((buf = hydra_receive_line(s)) == NULL) + return 1; + if (strlen(buf) < 6) { + free(buf); + return 1; + } + + // recover challenge + from64tobits((char *)buf1, buf + 2); + free(buf); + + // Send response + buildAuthResponse((tSmbNtlmAuthChallenge *)buf1, (tSmbNtlmAuthResponse *)buf2, 0, login, pass, NULL, NULL); + to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthResponse *)buf2)); + + sprintf(buffer, "%s\r\n", buf1); + } break; default: - //clear authentication + // clear authentication sprintf(buffer, "%d LOGIN \"%.100s\" \"%.100s\"\r\n", counter, login, pass); } @@ -353,7 +346,7 @@ int32_t start_imap(int32_t s, char *ip, int32_t port, unsigned char options, cha return 1; } -void service_imap(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_imap(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_IMAP, mysslport = PORT_IMAP_SSL, disable_tls = 1; char *buffer1 = "1 CAPABILITY\r\n"; @@ -363,10 +356,10 @@ void service_imap(char *ip, int32_t sp, unsigned char options, char *miscptr, FI return; while (1) { switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ if (sock >= 0) sock = hydra_disconnect(sock); -// usleepn(275); + // usleepn(275); if ((options & OPTION_SSL) == 0) { if (port != 0) myport = port; @@ -380,12 +373,12 @@ void service_imap(char *ip, int32_t sp, unsigned char options, char *miscptr, FI } if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } buf = hydra_receive_line(sock); - if ((buf == NULL) || (strstr(buf, "OK") == NULL && buf[0] != '*')) { /* check the first line */ + if ((buf == NULL) || (strstr(buf, "OK") == NULL && buf[0] != '*')) { /* check the first line */ if (verbose || debug) hydra_report(stderr, "[ERROR] Not an IMAP protocol or service shutdown:\n"); if (buf != NULL) @@ -407,7 +400,7 @@ void service_imap(char *ip, int32_t sp, unsigned char options, char *miscptr, FI int32_t i; for (i = 0; i < strlen(miscptr); i++) - miscptr[i] = (char) toupper((int32_t) miscptr[i]); + miscptr[i] = (char)toupper((int32_t)miscptr[i]); if (strstr(miscptr, "TLS") || strstr(miscptr, "SSL") || strstr(miscptr, "STARTTLS")) { disable_tls = 0; @@ -415,14 +408,16 @@ void service_imap(char *ip, int32_t sp, unsigned char options, char *miscptr, FI } #ifdef LIBOPENSSL if (!disable_tls) { - /* check for STARTTLS, if available we may have access to more basic auth methods */ + /* check for STARTTLS, if available we may have access to more basic + * auth methods */ if (strstr(buf, "STARTTLS") != NULL) { hydra_send(sock, "2 STARTTLS\r\n", strlen("2 STARTTLS\r\n"), 0); counter++; free(buf); buf = hydra_receive_line(sock); if (buf == NULL || (strstr(buf, " NO ") != NULL || strstr(buf, "failed") != NULL || strstr(buf, " BAD ") != NULL)) { - hydra_report(stderr, "[ERROR] TLS negotiation failed, no answer received from STARTTLS request\n"); + hydra_report(stderr, "[ERROR] TLS negotiation failed, no answer " + "received from STARTTLS request\n"); } else { free(buf); if ((hydra_connect_to_ssl(sock, hostname) == -1)) { @@ -444,15 +439,16 @@ void service_imap(char *ip, int32_t sp, unsigned char options, char *miscptr, FI hydra_child_exit(2); } } else - hydra_report(stderr, "[ERROR] option to use TLS/SSL failed as it is not supported by the server\n"); + hydra_report(stderr, "[ERROR] option to use TLS/SSL failed as it is " + "not supported by the server\n"); } #endif if (verbose) hydra_report(stderr, "[VERBOSE] CAPABILITY: %s", buf); - //authentication should be listed AUTH= like in the extract below - //STARTTLS LOGINDISABLED AUTH=GSSAPI AUTH=DIGEST-MD5 AUTH=CRAM-MD5 + // authentication should be listed AUTH= like in the extract below + // STARTTLS LOGINDISABLED AUTH=GSSAPI AUTH=DIGEST-MD5 AUTH=CRAM-MD5 if ((strstr(buf, "=LOGIN") == NULL) && (strstr(buf, "=NTLM") != NULL)) { imap_auth_mechanism = AUTH_NTLM; } @@ -487,7 +483,6 @@ void service_imap(char *ip, int32_t sp, unsigned char options, char *miscptr, FI free(buf); if ((miscptr != NULL) && (strlen(miscptr) > 0)) { - if (strstr(miscptr, "CLEAR")) imap_auth_mechanism = AUTH_CLEAR; @@ -554,11 +549,11 @@ void service_imap(char *ip, int32_t sp, unsigned char options, char *miscptr, FI next_run = 2; break; - case 2: /* run the cracking function */ + case 2: /* run the cracking function */ next_run = start_imap(sock, ip, port, options, miscptr, fp); counter++; break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); @@ -571,13 +566,13 @@ void service_imap(char *ip, int32_t sp, unsigned char options, char *miscptr, FI } } -int32_t service_imap_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_imap_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here @@ -585,8 +580,11 @@ int32_t service_imap_init(char *ip, int32_t sp, unsigned char options, char *mis return 0; } -void usage_imap(const char* service) { +void usage_imap(const char *service) { printf("Module imap is optionally taking one authentication type of:\n" " CLEAR or APOP (default), LOGIN, PLAIN, CRAM-MD5, CRAM-SHA1,\n" - " CRAM-SHA256, DIGEST-MD5, NTLM\n" "Additionally TLS encryption via STARTTLS can be enforced with the TLS option.\n\n" "Example: imap://target/TLS:PLAIN\n"); + " CRAM-SHA256, DIGEST-MD5, NTLM\n" + "Additionally TLS encryption via STARTTLS can be enforced with the " + "TLS option.\n\n" + "Example: imap://target/TLS:PLAIN\n"); } diff --git a/hydra-irc.c b/hydra-irc.c index 4111b86..d56eec4 100644 --- a/hydra-irc.c +++ b/hydra-irc.c @@ -10,7 +10,7 @@ extern char *HYDRA_EXIT; char buffer[300] = ""; int32_t myport = PORT_IRC, mysslport = PORT_IRC_SSL; -int32_t start_oper_irc(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_oper_irc(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, *pass; int32_t ret; @@ -52,7 +52,7 @@ int32_t send_nick(int32_t s, char *ip, char *pass) { if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { return -1; } - sprintf(buffer, "NICK hydra%d\r\nUSER hydra%d hydra %s :hydra\r\n", (int32_t) getpid(), (int32_t) getpid(), hydra_address2string(ip)); + sprintf(buffer, "NICK hydra%d\r\nUSER hydra%d hydra %s :hydra\r\n", (int32_t)getpid(), (int32_t)getpid(), hydra_address2string(ip)); if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { return -1; } @@ -62,7 +62,7 @@ int32_t send_nick(int32_t s, char *ip, char *pass) { int32_t irc_server_connect(char *ip, int32_t sock, int32_t port, unsigned char options, char *hostname) { if (sock >= 0) sock = hydra_disconnect(sock); -// usleepn(275); + // usleepn(275); if ((options & OPTION_SSL) == 0) { if (port != 0) myport = port; @@ -77,7 +77,7 @@ int32_t irc_server_connect(char *ip, int32_t sock, int32_t port, unsigned char o return sock; } -int32_t start_pass_irc(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp, char *hostname) { +int32_t start_pass_irc(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp, char *hostname) { char *empty = ""; char *pass; int32_t ret; @@ -87,7 +87,7 @@ int32_t start_pass_irc(int32_t s, char *ip, int32_t port, unsigned char options, s = irc_server_connect(ip, s, port, options, hostname); if (s < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); return 3; } @@ -105,10 +105,16 @@ int32_t start_pass_irc(int32_t s, char *ip, int32_t port, unsigned char options, #endif hydra_report_pass_found(port, ip, "irc", fp); hydra_completed_pair_found(); - hydra_report(stderr, "[INFO] Server password '%s' is working, you can pass it as argument\nto irc module to then try login/password oper mode\n", pass); + hydra_report(stderr, + "[INFO] Server password '%s' is working, you can pass it as " + "argument\nto irc module to then try login/password oper mode\n", + pass); } else { if (verbose && (miscptr != NULL)) - hydra_report(stderr, "[VERBOSE] Server is requesting a general password, '%s' you entered is not working\n", miscptr); + hydra_report(stderr, + "[VERBOSE] Server is requesting a general password, '%s' " + "you entered is not working\n", + miscptr); hydra_completed_pair(); } @@ -117,7 +123,7 @@ int32_t start_pass_irc(int32_t s, char *ip, int32_t port, unsigned char options, return 4; } -void service_irc(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_irc(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1, ret; char *buf; @@ -128,11 +134,11 @@ void service_irc(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL while (1) { next_run = 0; switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ sock = irc_server_connect(ip, sock, port, options, hostname); if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } @@ -147,7 +153,7 @@ void service_irc(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL if ((ret = hydra_recv(sock, buffer, sizeof(buffer) - 1)) >= 0) buffer[ret] = 0; - /* ERROR :Bad password */ + /* ERROR :Bad password */ #ifdef HAVE_PCRE if ((ret > 0) && (hydra_string_match(buffer, "ERROR\\s.*password"))) { #else @@ -180,19 +186,23 @@ void service_irc(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL hydra_child_exit(0); } - /* ERROR :Bad password is returned from ngircd when it s waiting for a server password */ + /* ERROR :Bad password is returned from ngircd when it s waiting for a + * server password */ if ((ret > 0) && (strstr(buffer, " 001 ") == NULL)) { /* seems we not successfully connected */ - hydra_report(stderr, "[ERROR] should not be able to identify server msg, please report it\n%s\n", buffer); + hydra_report(stderr, + "[ERROR] should not be able to identify server msg, " + "please report it\n%s\n", + buffer); hydra_child_exit(0); } next_run = 2; break; - case 2: /* run the cracking function */ + case 2: /* run the cracking function */ next_run = start_oper_irc(sock, ip, port, options, miscptr, fp); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); @@ -208,13 +218,13 @@ void service_irc(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL } } -int32_t service_irc_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_irc_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here @@ -222,6 +232,8 @@ int32_t service_irc_init(char *ip, int32_t sp, unsigned char options, char *misc return 0; } -void usage_irc(const char* service) { - printf("Module irc is optionally taking the general server password, if the server is requiring one, and if none is passed the password from -p/-P will be used\n\n"); +void usage_irc(const char *service) { + printf("Module irc is optionally taking the general server password, if the " + "server is requiring one, and if none is passed the password from " + "-p/-P will be used\n\n"); } diff --git a/hydra-ldap.c b/hydra-ldap.c index d04d180..4f79365 100644 --- a/hydra-ldap.c +++ b/hydra-ldap.c @@ -7,7 +7,7 @@ unsigned char *buf; int32_t counter; int32_t tls_required = 0; -int32_t start_ldap(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp, char *hostname, char version, int32_t auth_method) { +int32_t start_ldap(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp, char *hostname, char version, int32_t auth_method) { char *empty = ""; char *login = "", *pass, *fooptr = ""; unsigned char buffer[512]; @@ -18,7 +18,7 @@ int32_t start_ldap(int32_t s, char *ip, int32_t port, unsigned char options, cha The LDAP "simple" method has three modes of operation: * anonymous= no user no pass * unauthenticated= user but no pass - * user/password authenticated= user and pass + * user/password authenticated= user and pass */ if ((miscptr != NULL) && (ldap_auth_mechanism == AUTH_CLEAR)) { @@ -65,9 +65,9 @@ int32_t start_ldap(int32_t s, char *ip, int32_t port, unsigned char options, cha if (ldap_auth_mechanism == AUTH_CLEAR) { buffer[11] = strlen(login); /* DN */ memcpy(&buffer[12], login, strlen(login)); - buffer[12 + strlen(login)] = (unsigned char) 128; + buffer[12 + strlen(login)] = (unsigned char)128; buffer[13 + strlen(login)] = strlen(pass); - memcpy(&buffer[14 + strlen(login)], pass, strlen(pass)); /* PASS */ + memcpy(&buffer[14 + strlen(login)], pass, strlen(pass)); /* PASS */ } else { char *authm = "DIGEST-MD5"; @@ -79,7 +79,7 @@ int32_t start_ldap(int32_t s, char *ip, int32_t port, unsigned char options, cha miscptr[sizeof(buffer) - 16 - strlen(authm)] = '\0'; } - buffer[11] = strlen(miscptr); /* DN */ + buffer[11] = strlen(miscptr); /* DN */ memcpy(&buffer[12], miscptr, strlen(miscptr)); buffer[12 + strlen(miscptr)] = 163; buffer[13 + strlen(miscptr)] = 2 + strlen(authm); @@ -87,9 +87,9 @@ int32_t start_ldap(int32_t s, char *ip, int32_t port, unsigned char options, cha buffer[15 + strlen(miscptr)] = strlen(authm); memcpy(&buffer[16 + strlen(miscptr)], authm, strlen(authm)); } - if (hydra_send(s, (char *) buffer, length, 0) < 0) + if (hydra_send(s, (char *)buffer, length, 0) < 0) return 1; - if ((buf = (unsigned char *) hydra_receive_line(s)) == NULL) + if ((buf = (unsigned char *)hydra_receive_line(s)) == NULL) return 1; if (buf[0] != 0 && buf[0] != 32 && buf[9] == 2) { @@ -115,13 +115,13 @@ int32_t start_ldap(int32_t s, char *ip, int32_t port, unsigned char options, cha } #ifdef LIBOPENSSL -/* one more step auth for CRAM and DIGEST */ + /* one more step auth for CRAM and DIGEST */ if (ldap_auth_mechanism == AUTH_CRAMMD5) { /* get the challenge, need to extract it */ char *ptr; char buf2[32]; - ptr = strstr((char *) buf, "<"); + ptr = strstr((char *)buf, "<"); fooptr = buf2; sasl_cram_md5(fooptr, pass, ptr); if (fooptr == NULL) @@ -148,7 +148,7 @@ int32_t start_ldap(int32_t s, char *ip, int32_t port, unsigned char options, cha buffer[9] = version; buffer[10] = 4; - buffer[11] = strlen(miscptr); /* DN */ + buffer[11] = strlen(miscptr); /* DN */ memcpy(&buffer[12], miscptr, strlen(miscptr)); buffer[12 + strlen(miscptr)] = 163; buffer[13 + strlen(miscptr)] = 2 + strlen("CRAM-MD5") + 2 + strlen(login) + 1 + strlen(buf2); @@ -161,10 +161,10 @@ int32_t start_ldap(int32_t s, char *ip, int32_t port, unsigned char options, cha buffer[18 + strlen(miscptr) + strlen("CRAM-MD5") + strlen(login)] = ' '; memcpy(&buffer[18 + strlen(miscptr) + strlen("CRAM-MD5") + strlen(login) + 1], buf2, strlen(buf2)); - if (hydra_send(s, (char *) buffer, length, 0) < 0) + if (hydra_send(s, (char *)buffer, length, 0) < 0) return 1; free(buf); - if ((buf = (unsigned char *) hydra_receive_line(s)) == NULL) + if ((buf = (unsigned char *)hydra_receive_line(s)) == NULL) return 1; } else { if (ldap_auth_mechanism == AUTH_DIGESTMD5) { @@ -172,7 +172,7 @@ int32_t start_ldap(int32_t s, char *ip, int32_t port, unsigned char options, cha char buffer2[500]; int32_t ind = 0; - ptr = strstr((char *) buf, "realm="); + ptr = strstr((char *)buf, "realm="); counter++; if (strstr(miscptr, "^USER^") != NULL) { @@ -213,7 +213,7 @@ int32_t start_ldap(int32_t s, char *ip, int32_t port, unsigned char options, cha ind++; buffer[ind] = counter % 256; ind++; - buffer[ind] = 96; /*0x60 */ + buffer[ind] = 96; /*0x60 */ ind++; buffer[ind] = 130; ind++; @@ -240,9 +240,9 @@ int32_t start_ldap(int32_t s, char *ip, int32_t port, unsigned char options, cha buffer[ind] = strlen(miscptr); ind++; memcpy(&buffer[ind], miscptr, strlen(miscptr)); - /*DN*/ buffer[ind + strlen(miscptr)] = 163; //0xa3 + /*DN*/ buffer[ind + strlen(miscptr)] = 163; // 0xa3 ind++; - buffer[ind + strlen(miscptr)] = 130; //0x82 + buffer[ind + strlen(miscptr)] = 130; // 0x82 ind++; if (strlen(buffer2) + 6 + strlen("DIGEST-MD5") > 255) { @@ -279,10 +279,10 @@ int32_t start_ldap(int32_t s, char *ip, int32_t port, unsigned char options, cha memcpy(&buffer[ind + strlen(miscptr) + strlen("DIGEST-MD5")], buffer2, strlen(buffer2)); ind++; - if (hydra_send(s, (char *) buffer, length, 0) < 0) + if (hydra_send(s, (char *)buffer, length, 0) < 0) return 1; free(buf); - if ((buf = (unsigned char *) hydra_receive_line(s)) == NULL) + if ((buf = (unsigned char *)hydra_receive_line(s)) == NULL) return 1; } } @@ -306,21 +306,27 @@ int32_t start_ldap(int32_t s, char *ip, int32_t port, unsigned char options, cha if ((buf[0] != 0 && buf[0] != 32) && buf[9] == 53) { if (verbose) - hydra_report(stderr, "[VERBOSE] Server unwilling to perform action, maybe deny by server config or too busy when tried login: %s password: %s\n", login, pass); + hydra_report(stderr, + "[VERBOSE] Server unwilling to perform action, maybe deny by server " + "config or too busy when tried login: %s password: %s\n", + login, pass); free(buf); return 1; } if ((buf[0] != 0 && buf[0] != 32) && buf[9] == 2) { - hydra_report(stderr, "[ERROR] Invalid protocol version, you tried ldap%c, better try ldap%c\n", version + '0', version == 2 ? '3' : '2'); + hydra_report(stderr, + "[ERROR] Invalid protocol version, you tried ldap%c, better " + "try ldap%c\n", + version + '0', version == 2 ? '3' : '2'); free(buf); hydra_child_exit(2); sleep(1); hydra_child_exit(2); } -//0 0x30, 0x84, 0x20, 0x20, 0x20, 0x10, 0x02, 0x01, -//8 0x01, 0x61, 0x84, 0x20, 0x20, 0x20, 0x07, 0x0a, -//16 0x01, 0x20, 0x04, 0x20, 0x04, 0x20, 0x00, 0x00, + // 0 0x30, 0x84, 0x20, 0x20, 0x20, 0x10, 0x02, 0x01, + // 8 0x01, 0x61, 0x84, 0x20, 0x20, 0x20, 0x07, 0x0a, + // 16 0x01, 0x20, 0x04, 0x20, 0x04, 0x20, 0x00, 0x00, // this is for w2k8 active directory ldap auth if (buf[0] == 48 && buf[1] == 132) { @@ -335,10 +341,9 @@ int32_t start_ldap(int32_t s, char *ip, int32_t port, unsigned char options, cha } } } else { - if (buf[9] != 49 && buf[9] != 2 && buf[9] != 53) { hydra_report(stderr, "[ERROR] Uh, unknown LDAP response! Please report this: \n"); - print_hex((unsigned char *) buf, 24); + print_hex((unsigned char *)buf, 24); free(buf); return 3; } @@ -351,7 +356,7 @@ int32_t start_ldap(int32_t s, char *ip, int32_t port, unsigned char options, cha return 2; } -void service_ldap(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname, char version, int32_t auth_method) { +void service_ldap(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname, char version, int32_t auth_method) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_LDAP, mysslport = PORT_LDAP_SSL; @@ -360,10 +365,10 @@ void service_ldap(char *ip, int32_t sp, unsigned char options, char *miscptr, FI return; while (1) { switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ if (sock >= 0) sock = hydra_disconnect(sock); -// usleepn(275); + // usleepn(275); if ((options & OPTION_SSL) == 0) { if (port != 0) myport = port; @@ -377,18 +382,20 @@ void service_ldap(char *ip, int32_t sp, unsigned char options, char *miscptr, FI } if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } counter = 1; if (tls_required) { - /* Start TLS operation OID = 1.3.6.1.4.1.1466.20037 according to RFC 2830 */ - char confidentiality_required[] = "\x30\x1d\x02\x01\x01\x77\x18\x80\x16\x31\x2e\x33\x2e\x36\x2e\x31\x2e\x34\x2e\x31\x2e\x31\x34\x36\x36\x2e\x32\x30\x30\x33\x37"; + /* Start TLS operation OID = 1.3.6.1.4.1.1466.20037 according to RFC + * 2830 */ + char confidentiality_required[] = "\x30\x1d\x02\x01\x01\x77\x18\x80\x16\x31\x2e\x33\x2e\x36\x2e\x31" + "\x2e\x34\x2e\x31\x2e\x31\x34\x36\x36\x2e\x32\x30\x30\x33\x37"; if (hydra_send(sock, confidentiality_required, strlen(confidentiality_required), 0) < 0) hydra_child_exit(1); - if ((buf = (unsigned char *) hydra_receive_line(sock)) == NULL) + if ((buf = (unsigned char *)hydra_receive_line(sock)) == NULL) hydra_child_exit(1); if ((buf[0] != 0 && buf[9] == 0) || (buf[0] != 32 && buf[9] == 32)) { @@ -410,11 +417,11 @@ void service_ldap(char *ip, int32_t sp, unsigned char options, char *miscptr, FI } next_run = 2; break; - case 2: /* run the cracking function */ + case 2: /* run the cracking function */ next_run = start_ldap(sock, ip, port, options, miscptr, fp, hostname, version, auth_method); counter++; break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); @@ -427,47 +434,46 @@ void service_ldap(char *ip, int32_t sp, unsigned char options, char *miscptr, FI } } -void service_ldap2(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { - service_ldap(ip, sp, options, miscptr, fp, port, hostname, 2, AUTH_CLEAR); -} +void service_ldap2(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { service_ldap(ip, sp, options, miscptr, fp, port, hostname, 2, AUTH_CLEAR); } -void service_ldap3(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { - service_ldap(ip, sp, options, miscptr, fp, port, hostname, 3, AUTH_CLEAR); -} +void service_ldap3(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { service_ldap(ip, sp, options, miscptr, fp, port, hostname, 3, AUTH_CLEAR); } -void service_ldap3_cram_md5(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { - service_ldap(ip, sp, options, miscptr, fp, port, hostname, 3, AUTH_CRAMMD5); -} +void service_ldap3_cram_md5(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { service_ldap(ip, sp, options, miscptr, fp, port, hostname, 3, AUTH_CRAMMD5); } -void service_ldap3_digest_md5(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { - service_ldap(ip, sp, options, miscptr, fp, port, hostname, 3, AUTH_DIGESTMD5); -} +void service_ldap3_digest_md5(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { service_ldap(ip, sp, options, miscptr, fp, port, hostname, 3, AUTH_DIGESTMD5); } -int32_t service_ldap_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_ldap_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here if (miscptr != NULL && strlen(miscptr) > 220) { - fprintf(stderr, "[ERROR] the option string to this module may not be larger than 220 bytes\n"); + fprintf(stderr, "[ERROR] the option string to this module may not be " + "larger than 220 bytes\n"); return -1; } return 0; } -void usage_ldap(const char* service) { - printf("Module %s is optionally taking the DN (depending of the auth method choosed\n" - "Note: you can also specify the DN as login when Simple auth method is used).\n" +void usage_ldap(const char *service) { + printf("Module %s is optionally taking the DN (depending of the auth method " + "choosed\n" + "Note: you can also specify the DN as login when Simple auth method " + "is used).\n" "The keyword \"^USER^\" is replaced with the login.\n" - "Special notes for Simple method has 3 operation modes: anonymous, (no user no pass),\n" - "unauthenticated (user but no pass), user/pass authenticated (user and pass).\n" + "Special notes for Simple method has 3 operation modes: anonymous, " + "(no user no pass),\n" + "unauthenticated (user but no pass), user/pass authenticated (user " + "and pass).\n" "So don't forget to set empty string as user/pass to test all modes.\n" - "Hint: to authenticate to a windows active directory ldap, this is usually\n" - " cn=^USER^,cn=users,dc=foo,dc=bar,dc=com for domain foo.bar.com\n\n", service); + "Hint: to authenticate to a windows active directory ldap, this is " + "usually\n" + " cn=^USER^,cn=users,dc=foo,dc=bar,dc=com for domain foo.bar.com\n\n", + service); } diff --git a/hydra-memcached.c b/hydra-memcached.c index 9065c1e..ca21d26 100644 --- a/hydra-memcached.c +++ b/hydra-memcached.c @@ -1,5 +1,5 @@ -//This plugin was written by -//Tested on memcached 1.5.6-0ubuntu1 +// This plugin was written by +// Tested on memcached 1.5.6-0ubuntu1 #ifdef LIBMCACHED #include @@ -8,9 +8,7 @@ #include "hydra-mod.h" #ifndef LIBMCACHED -void dummy_mcached() { - printf("\n"); -} +void dummy_mcached() { printf("\n"); } #else extern int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec); @@ -33,9 +31,7 @@ int mcached_send_com_version(int32_t sock) { return 0; } - - -int32_t start_mcached(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_mcached(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, *pass; @@ -93,7 +89,7 @@ int32_t start_mcached(int32_t s, char *ip, int32_t port, unsigned char options, memcached_free(cache); hydra_completed_pair_skip(); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) { - return 3; + return 3; } return 2; } @@ -109,7 +105,7 @@ int32_t start_mcached(int32_t s, char *ip, int32_t port, unsigned char options, return 2; } -void service_mcached(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_mcached(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; hydra_register_socket(sp); @@ -127,14 +123,15 @@ void service_mcached(char *ip, int32_t sp, unsigned char options, char *miscptr, return; default: if (!verbose) - hydra_report(stderr, "[ERROR] Caught unknown return code, try verbose option for more details\n"); + hydra_report(stderr, "[ERROR] Caught unknown return code, try verbose " + "option for more details\n"); hydra_child_exit(2); } run = next_run; } } -int32_t service_mcached_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_mcached_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. @@ -150,7 +147,7 @@ int32_t service_mcached_init(char *ip, int32_t sp, unsigned char options, char * if (sock < 0) { if (verbose || debug) hydra_report(stderr, "[ERROR] Can not connect\n"); - return -1; + return -1; } if (mcached_send_com_version(sock)) { @@ -160,16 +157,16 @@ int32_t service_mcached_init(char *ip, int32_t sp, unsigned char options, char * } if (hydra_data_ready_timed(sock, 0, 1000) > 0) { - buf = hydra_receive_line(sock); - if (strstr(buf, "VERSION ")) { - hydra_report_found_host(port, ip, "memcached", fp); - mcached_send_com_quit(sock); - if (sock >= 0) - sock = hydra_disconnect(sock); - hydra_report(stderr, "[ERROR] Memcached server does not require any authentication\n"); - } - free(buf); - return -1; + buf = hydra_receive_line(sock); + if (strstr(buf, "VERSION ")) { + hydra_report_found_host(port, ip, "memcached", fp); + mcached_send_com_quit(sock); + if (sock >= 0) + sock = hydra_disconnect(sock); + hydra_report(stderr, "[ERROR] Memcached server does not require any authentication\n"); + } + free(buf); + return -1; } if (sock >= 0) sock = hydra_disconnect(sock); diff --git a/hydra-mod.c b/hydra-mod.c index f9b1358..65f7725 100644 --- a/hydra-mod.c +++ b/hydra-mod.c @@ -1,10 +1,10 @@ #include "hydra-mod.h" #include #ifdef LIBOPENSSL -#include -#include #include +#include #include +#include #endif #ifdef HAVE_PCRE #include @@ -15,17 +15,17 @@ #define HYDRA_DUMP_ROWS 16 /* rfc 1928 SOCKS proxy */ -#define SOCKS_V5 5 -#define SOCKS_V4 4 -#define SOCKS_NOAUTH 0 +#define SOCKS_V5 5 +#define SOCKS_V4 4 +#define SOCKS_NOAUTH 0 /* http://tools.ietf.org/html/rfc1929 */ -#define SOCKS_PASSAUTH 2 -#define SOCKS_NOMETHOD 0xff -#define SOCKS_CONNECT 1 -#define SOCKS_IPV4 1 -#define SOCKS_DOMAIN 3 -#define SOCKS_IPV6 4 +#define SOCKS_PASSAUTH 2 +#define SOCKS_NOMETHOD 0xff +#define SOCKS_CONNECT 1 +#define SOCKS_IPV4 1 +#define SOCKS_DOMAIN 3 +#define SOCKS_IPV6 4 extern int32_t conwait; char quiet; @@ -56,26 +56,29 @@ RSA *rsa = NULL; #endif /* prototype */ -int32_t my_select(int32_t fd, fd_set * fdread, fd_set * fdwrite, fd_set * fdex, long sec, long usec); +int32_t my_select(int32_t fd, fd_set *fdread, fd_set *fdwrite, fd_set *fdex, long sec, long usec); /* ----------------- alarming functions ---------------- */ void alarming() { fail++; alarm_went_off++; -/* uh, I think it's not good for performance if we try to reconnect to a timeout system! - * if (fail > MAX_CONNECT_RETRY) { - */ - //fprintf(stderr, "Process %d: Can not connect [timeout], process exiting\n", (int32_t) getpid()); + /* uh, I think it's not good for performance if we try to reconnect to a + * timeout system! if (fail > MAX_CONNECT_RETRY) { + */ + // fprintf(stderr, "Process %d: Can not connect [timeout], process exiting\n", + // (int32_t) getpid()); if (debug) printf("DEBUG_CONNECT_TIMEOUT\n"); hydra_child_exit(1); -/* - * } else { - * if (verbose) fprintf(stderr, "Process %d: Can not connect [timeout], retrying (%d of %d retries)\n", (int32_t)getpid(), fail, MAX_CONNECT_RETRY); - * } - */ + /* + * } else { + * if (verbose) fprintf(stderr, "Process %d: Can not connect [timeout], + * retrying (%d of %d retries)\n", (int32_t)getpid(), fail, + * MAX_CONNECT_RETRY); + * } + */ } void interrupt() { @@ -96,11 +99,11 @@ int32_t internal__hydra_connect(char *host, int32_t port, int32_t type, int32_t struct sockaddr_in sin; char *buf, *tmpptr = NULL; int32_t err = 0; - + if (proxy_count > 0 && use_proxy > 0 && selected_proxy == -1) { reset_selected = 1; selected_proxy = random() % proxy_count; - } + } memset(&target, 0, sizeof(target)); memset(&sin, 0, sizeof(sin)); @@ -133,14 +136,14 @@ int32_t internal__hydra_connect(char *host, int32_t port, int32_t type, int32_t sin.sin_addr.s_addr = INADDR_ANY; } - //we will try to find a free port down to 512 + // we will try to find a free port down to 512 while (!bind_ok && src_port >= 512) { #ifdef AF_INET6 if (ipv6) - ret = bind(s, (struct sockaddr *) &sin6, sizeof(sin6)); + ret = bind(s, (struct sockaddr *)&sin6, sizeof(sin6)); else #endif - ret = bind(s, (struct sockaddr *) &sin, sizeof(sin)); + ret = bind(s, (struct sockaddr *)&sin, sizeof(sin)); if (ret == -1) { if (verbose) @@ -167,7 +170,6 @@ int32_t internal__hydra_connect(char *host, int32_t port, int32_t type, int32_t } } if (use_proxy > 0 && proxy_count > 0) { - if (proxy_string_ip[selected_proxy][0] == 4) { memcpy(&target.sin_addr.s_addr, &proxy_string_ip[selected_proxy][1], 4); target.sin_family = AF_INET; @@ -214,18 +216,21 @@ int32_t internal__hydra_connect(char *host, int32_t port, int32_t type, int32_t #endif if (ipv6) - ret = connect(s, (struct sockaddr *) &target6, sizeof(target6)); + ret = connect(s, (struct sockaddr *)&target6, sizeof(target6)); else #endif - ret = connect(s, (struct sockaddr *) &target, sizeof(target)); + ret = connect(s, (struct sockaddr *)&target, sizeof(target)); alarm(0); if (ret < 0 && alarm_went_off == 0) { fail++; - if (verbose ) { + if (verbose) { if (do_retry && fail <= MAX_CONNECT_RETRY) - fprintf(stderr, "Process %d: Can not connect [unreachable], retrying (%d of %d retries)\n", (int32_t) getpid(), fail, MAX_CONNECT_RETRY); + fprintf(stderr, + "Process %d: Can not connect [unreachable], retrying (%d " + "of %d retries)\n", + (int32_t)getpid(), fail, MAX_CONNECT_RETRY); else - fprintf(stderr, "Process %d: Can not connect [unreachable]\n", (int32_t) getpid()); + fprintf(stderr, "Process %d: Can not connect [unreachable]\n", (int32_t)getpid()); } } } while (ret < 0 && fail <= MAX_CONNECT_RETRY && do_retry); @@ -233,10 +238,11 @@ int32_t internal__hydra_connect(char *host, int32_t port, int32_t type, int32_t if (debug) printf("DEBUG_CONNECT_UNREACHABLE\n"); -/* we wont quit here, thats up to the module to decide what to do - * fprintf(stderr, "Process %d: Can not connect [unreachable], process exiting\n", (int32_t)getpid()); - * hydra_child_exit(1); - */ + /* we wont quit here, thats up to the module to decide what to do + * fprintf(stderr, "Process %d: Can not connect + * [unreachable], process exiting\n", (int32_t)getpid()); + * hydra_child_exit(1); + */ extern_socket = -1; close(s); ret = -1; @@ -280,7 +286,10 @@ int32_t internal__hydra_connect(char *host, int32_t port, int32_t type, int32_t else snprintf(buf, 4096, "CONNECT %s:%d HTTP/1.0\r\n\r\n", hydra_address2string(host), port); else if (host[0] == 16) - snprintf(buf, 4096, "CONNECT [%s]:%d HTTP/1.0\r\nProxy-Authorization: Basic %s\r\n\r\n", hydra_address2string(host), port, proxy_authentication[selected_proxy]); + snprintf(buf, 4096, + "CONNECT [%s]:%d HTTP/1.0\r\nProxy-Authorization: Basic " + "%s\r\n\r\n", + hydra_address2string(host), port, proxy_authentication[selected_proxy]); else snprintf(buf, 4096, "CONNECT %s:%d HTTP/1.0\r\nProxy-Authorization: Basic %s\r\n\r\n", hydra_address2string(host), port, proxy_authentication[selected_proxy]); @@ -302,10 +311,10 @@ int32_t internal__hydra_connect(char *host, int32_t port, int32_t type, int32_t fprintf(stderr, "[ERROR] CONNECT call to proxy failed with code %c%c%c\n", *tmpptr, *(tmpptr + 1), *(tmpptr + 2)); err = 1; } -// free(buf); + // free(buf); } else { if (hydra_strcasestr(proxy_string_type[selected_proxy], "socks5")) { -// char buf[1024]; + // char buf[1024]; size_t cnt, wlen; /* socks v5 support */ @@ -325,19 +334,20 @@ int32_t internal__hydra_connect(char *host, int32_t port, int32_t type, int32_t hydra_report(stderr, "[ERROR] SOCKS5 proxy read failed (%zu/2)\n", cnt); err = 1; } - if ((unsigned char) buf[1] == SOCKS_NOMETHOD) { - hydra_report(stderr, "[ERROR] SOCKS5 proxy authentication method negotiation failed\n"); + if ((unsigned char)buf[1] == SOCKS_NOMETHOD) { + hydra_report(stderr, "[ERROR] SOCKS5 proxy authentication method " + "negotiation failed\n"); err = 1; } /* SOCKS_DOMAIN not supported here, do we need it ? */ if (err != 1) { /* send user/pass */ if (proxy_authentication[selected_proxy] != NULL) { - //format was checked previously + // format was checked previously char *login = strtok(proxy_authentication[selected_proxy], ":"); char *pass = strtok(NULL, ":"); - snprintf(buf, 4096, "\x01%c%s%c%s", (char) strlen(login), login, (char) strlen(pass), pass); + snprintf(buf, 4096, "\x01%c%s%c%s", (char)strlen(login), login, (char)strlen(pass), pass); cnt = hydra_send(s, buf, strlen(buf), 0); if (cnt != strlen(buf)) { @@ -408,15 +418,15 @@ int32_t internal__hydra_connect(char *host, int32_t port, int32_t type, int32_t hydra_report(stderr, "[ERROR] SOCKS4 proxy does not support IPv6\n"); err = 1; } else { -// char buf[1024]; + // char buf[1024]; size_t cnt, wlen; /* socks v4 support */ buf[0] = SOCKS_V4; - buf[1] = SOCKS_CONNECT; /* connect */ + buf[1] = SOCKS_CONNECT; /* connect */ memcpy(buf + 2, &target.sin_port, sizeof target.sin_port); memcpy(buf + 4, &target.sin_addr, sizeof target.sin_addr); - buf[8] = 0; /* empty username */ + buf[8] = 0; /* empty username */ wlen = 9; cnt = hydra_send(s, buf, wlen, 0); if (cnt != wlen) { @@ -439,7 +449,10 @@ int32_t internal__hydra_connect(char *host, int32_t port, int32_t type, int32_t } } } else { - hydra_report(stderr, "[ERROR] Unknown proxy type: %s, valid type are \"connect\", \"socks4\" or \"socks5\"\n", proxy_string_type[selected_proxy]); + hydra_report(stderr, + "[ERROR] Unknown proxy type: %s, valid type are " + "\"connect\", \"socks4\" or \"socks5\"\n", + proxy_string_type[selected_proxy]); err = 1; } } @@ -465,24 +478,24 @@ int32_t internal__hydra_connect(char *host, int32_t port, int32_t type, int32_t } #if defined(LIBOPENSSL) && !defined(LIBRESSL_VERSION_NUMBER) -RSA *ssl_temp_rsa_cb(SSL * ssl, int32_t export, int32_t keylength) { +RSA *ssl_temp_rsa_cb(SSL *ssl, int32_t export, int32_t keylength) { int32_t nok = 0; #if !defined(LIBRESSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L BIGNUM *n; if ((n = BN_new()) == NULL) - nok = 1; + nok = 1; RSA_get0_key(rsa, (const struct bignum_st **)&n, NULL, NULL); BN_zero(n); #else if (rsa->n == 0) nok = 1; #endif - if (nok == 0 && RSA_size(rsa)!=(keylength/8)){ // n is not zero -#if !defined(LIBRESSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L - BN_free(n); + if (nok == 0 && RSA_size(rsa) != (keylength / 8)) { // n is not zero +#if !defined(LIBRESSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L + BN_free(n); #endif - RSA_free(rsa); - rsa = NULL; + RSA_free(rsa); + rsa = NULL; } if (nok != 0) { // n is zero #if defined(NO_RSA_LEGACY) || OPENSSL_VERSION_NUMBER >= 0x10100000L @@ -507,8 +520,8 @@ int32_t internal__hydra_connect_to_ssl(int32_t socket, char *hostname) { if (ssl_first) { SSL_load_error_strings(); -// SSL_add_ssl_algoritms(); - SSL_library_init(); // ? + // SSL_add_ssl_algoritms(); + SSL_library_init(); // ? ssl_first = 0; } @@ -524,11 +537,11 @@ int32_t internal__hydra_connect_to_ssl(int32_t socket, char *hostname) { } } else { #ifndef TLSv1_2_client_method - #if OPENSSL_VERSION_NUMBER < 0x10100000L - #define TLSv1_2_client_method TLSv1_2_client_method - #else - #define TLSv1_2_client_method TLS_client_method - #endif +#if OPENSSL_VERSION_NUMBER < 0x10100000L +#define TLSv1_2_client_method TLSv1_2_client_method +#else +#define TLSv1_2_client_method TLS_client_method +#endif #endif if ((sslContext = SSL_CTX_new(TLSv1_2_client_method())) == NULL) { if (verbose) { @@ -540,11 +553,11 @@ int32_t internal__hydra_connect_to_ssl(int32_t socket, char *hostname) { } /* set the compatbility mode */ SSL_CTX_set_options(sslContext, SSL_OP_ALL); -// SSL_CTX_set_options(sslContext, SSL_OP_NO_SSLv2); -// SSL_CTX_set_options(sslContext, SSL_OP_NO_TLSv1); + // SSL_CTX_set_options(sslContext, SSL_OP_NO_SSLv2); + // SSL_CTX_set_options(sslContext, SSL_OP_NO_TLSv1); /* we set the default verifiers and don't care for the results */ - (void) SSL_CTX_set_default_verify_paths(sslContext); + (void)SSL_CTX_set_default_verify_paths(sslContext); #if OPENSSL_VERSION_NUMBER < 0x10100000L SSL_CTX_set_tmp_rsa_callback(sslContext, ssl_temp_rsa_cb); #endif @@ -567,7 +580,7 @@ int32_t internal__hydra_connect_to_ssl(int32_t socket, char *hostname) { SSL_set_fd(ssl, socket); if (SSL_connect(ssl) <= 0) { -// fprintf(stderr, "[ERROR] SSL Connect %d\n", SSL_connect(ssl)); + // fprintf(stderr, "[ERROR] SSL Connect %d\n", SSL_connect(ssl)); if (verbose) { err = ERR_get_error(); fprintf(stderr, "[VERBOSE] Could not create an SSL session: %s\n", ERR_error_string(err, NULL)); @@ -618,34 +631,34 @@ void hydra_child_exit(int32_t code) { if (debug) printf("[DEBUG] pid %d called child_exit with code %d\n", getpid(), code); - if (code == 0) /* normal quitting */ + if (code == 0) /* normal quitting */ __fck = write(intern_socket, "Q", 1); - else if (code == 1) /* no connect possible */ + else if (code == 1) /* no connect possible */ __fck = write(intern_socket, "C", 1); - else if (code == 2) /* application protocol error or service shutdown */ + else if (code == 2) /* application protocol error or service shutdown */ __fck = write(intern_socket, "E", 1); - // code 3 means exit without telling mommy about it - a bad idea. mommy should know + // code 3 means exit without telling mommy about it - a bad idea. mommy should + // know else if (code == -1 || code > 3) { - fprintf(stderr, "[TOTAL FUCKUP] a module should not use hydra_child_exit(-1) ! Fix it in the source please ...\n"); + fprintf(stderr, "[TOTAL FUCKUP] a module should not use " + "hydra_child_exit(-1) ! Fix it in the source please ...\n"); __fck = write(intern_socket, "E", 1); } do { usleepn(10); } while (read(intern_socket, buf, 1) <= 0); close(intern_socket); -// sleep(2); // be sure that mommy receives our message - exit(0); // might be killed before reaching this + // sleep(2); // be sure that mommy receives our message + exit(0); // might be killed before reaching this } -void hydra_register_socket(int32_t s) { - intern_socket = s; -} +void hydra_register_socket(int32_t s) { intern_socket = s; } char *hydra_get_next_pair() { if (pair[0] == 0) { pair[sizeof(pair) - 1] = 0; __fck = read(intern_socket, pair, sizeof(pair) - 1); - //if (debug) hydra_dump_data(pair, __fck, "CHILD READ PAIR"); + // if (debug) hydra_dump_data(pair, __fck, "CHILD READ PAIR"); if (memcmp(&HYDRA_EXIT, &pair, sizeof(HYDRA_EXIT)) == 0) return HYDRA_EXIT; if (pair[0] == 0) @@ -697,7 +710,7 @@ void hydra_completed_pair_skip() { /* based on writeError from Medusa project */ -void hydra_report_debug(FILE * st, char *format, ...) { +void hydra_report_debug(FILE *st, char *format, ...) { va_list ap; char buf[8200]; char bufOut[33000]; @@ -716,7 +729,7 @@ void hydra_report_debug(FILE * st, char *format, ...) { // Convert any chars less than 32d or greater than 126d to hex for (i = 0; i < len; i++) { memset(temp, 0, 6); - cTemp = (unsigned char) buf[i]; + cTemp = (unsigned char)buf[i]; if (cTemp < 32 || cTemp > 126) { sprintf(temp, "[%02X]", cTemp); } else @@ -733,96 +746,99 @@ void hydra_report_debug(FILE * st, char *format, ...) { return; } -void hydra_report_found(int32_t port, char *svc, FILE * fp) { -/* - if (!strcmp(svc, "rsh")) - if (colored_output) - fprintf(fp, "[\e[31m%d\e[0m][\e[31m%s\e[0m] login: \e[32m%s\e[0m\n", port, svc, hydra_get_next_login()); - else - fprintf(fp, "[%d][%s] login: %s\n", port, svc, hydra_get_next_login()); - else if (colored_output) - fprintf(fp, "[\e[31m%d\e[0m][\e[31m%s\e[0m] login: \e[32m%s\e[0m password: \e[32m%s\e[0m\n", port, svc, hydra_get_next_login(), hydra_get_next_password()); - else - fprintf(fp, "[%d][%s] login: %s password: %s\n", port, svc, hydra_get_next_login(), hydra_get_next_password()); - - if (stdout != fp) { +void hydra_report_found(int32_t port, char *svc, FILE *fp) { + /* if (!strcmp(svc, "rsh")) - printf("[%d][%s] login: %s\n", port, svc, hydra_get_next_login()); - else - printf("[%d][%s] login: %s password: %s\n", port, svc, hydra_get_next_login(), hydra_get_next_password()); - } + if (colored_output) + fprintf(fp, "[\e[31m%d\e[0m][\e[31m%s\e[0m] login: \e[32m%s\e[0m\n", + port, svc, hydra_get_next_login()); else fprintf(fp, "[%d][%s] login: %s\n", + port, svc, hydra_get_next_login()); else if (colored_output) fprintf(fp, + "[\e[31m%d\e[0m][\e[31m%s\e[0m] login: \e[32m%s\e[0m password: + \e[32m%s\e[0m\n", port, svc, hydra_get_next_login(), + hydra_get_next_password()); else fprintf(fp, "[%d][%s] login: %s password: + %s\n", port, svc, hydra_get_next_login(), hydra_get_next_password()); - fflush(fp); -*/ + if (stdout != fp) { + if (!strcmp(svc, "rsh")) + printf("[%d][%s] login: %s\n", port, svc, hydra_get_next_login()); + else + printf("[%d][%s] login: %s password: %s\n", port, svc, + hydra_get_next_login(), hydra_get_next_password()); + } + + fflush(fp); + */ } /* needed for irc module to display the general server password */ -void hydra_report_pass_found(int32_t port, char *ip, char *svc, FILE * fp) { -/* - strcpy(ipaddr_str, hydra_address2string(ip)); - if (colored_output) - fprintf(fp, "[\e[31m%d\e[0m][\e[31m%s\e[0m] host: \e[32m%s\e[0m password: \e[32m%s\e[0m\n", port, svc, ipaddr_str, hydra_get_next_password()); - else - fprintf(fp, "[%d][%s] host: %s password: %s\n", port, svc, ipaddr_str, hydra_get_next_password()); - if (stdout != fp) - printf("[%d][%s] host: %s password: %s\n", port, svc, ipaddr_str, hydra_get_next_password()); - fflush(fp); -*/ +void hydra_report_pass_found(int32_t port, char *ip, char *svc, FILE *fp) { + /* + strcpy(ipaddr_str, hydra_address2string(ip)); + if (colored_output) + fprintf(fp, "[\e[31m%d\e[0m][\e[31m%s\e[0m] host: \e[32m%s\e[0m password: + \e[32m%s\e[0m\n", port, svc, ipaddr_str, hydra_get_next_password()); else + fprintf(fp, "[%d][%s] host: %s password: %s\n", port, svc, ipaddr_str, + hydra_get_next_password()); if (stdout != fp) printf("[%d][%s] host: %s + password: %s\n", port, svc, ipaddr_str, hydra_get_next_password()); + fflush(fp); + */ } -void hydra_report_found_host(int32_t port, char *ip, char *svc, FILE * fp) { -/* char *keyw = "password"; +void hydra_report_found_host(int32_t port, char *ip, char *svc, FILE *fp) { + /* char *keyw = "password"; - strcpy(ipaddr_str, hydra_address2string(ip)); - if (!strcmp(svc, "smtp-enum")) - keyw = "domain"; - if (!strcmp(svc, "rsh") || !strcmp(svc, "oracle-sid")) - if (colored_output) - fprintf(fp, "[\e[31m%d\e[0m][\e[31m%s\e[0m] host: \e[32m%s\e[0m login: \e[32m%s\e[0m\n", port, svc, ipaddr_str, hydra_get_next_login()); - else - fprintf(fp, "[%d][%s] host: %s login: %s\n", port, svc, ipaddr_str, hydra_get_next_login()); - else if (!strcmp(svc, "snmp3")) - if (colored_output) - fprintf(fp, "[\e[31m%d\e[0m][\e[31m%s\e[0m] host: \e[32m%s\e[0m login: \e[32m%s\e[0m\n", port, svc, ipaddr_str, hydra_get_next_password()); - else - fprintf(fp, "[%d][%s] host: %s login: %s\n", port, svc, ipaddr_str, hydra_get_next_password()); - else if (!strcmp(svc, "cisco-enable") || !strcmp(svc, "cisco")) - if (colored_output) - fprintf(fp, "[\e[31m%d\e[0m][\e[31m%s\e[0m] host: \e[32m%s\e[0m password: \e[32m%s\e[0m\n", port, svc, ipaddr_str, hydra_get_next_password()); - else - fprintf(fp, "[%d][%s] host: %s password: %s\n", port, svc, ipaddr_str, hydra_get_next_password()); - else if (colored_output) - fprintf(fp, "[\e[31m%d\e[0m][\e[31m%s\e[0m] host: \e[32m%s\e[0m login: \e[32m%s\e[0m %s: \e[32m%s\e[0m\n", port, svc, ipaddr_str, hydra_get_next_login(), keyw, - hydra_get_next_password()); - else - fprintf(fp, "[%d][%s] host: %s login: %s %s: %s\n", port, svc, ipaddr_str, hydra_get_next_login(), keyw, hydra_get_next_password()); - if (stdout != fp) { + strcpy(ipaddr_str, hydra_address2string(ip)); + if (!strcmp(svc, "smtp-enum")) + keyw = "domain"; if (!strcmp(svc, "rsh") || !strcmp(svc, "oracle-sid")) - printf("[%d][%s] host: %s login: %s\n", port, svc, ipaddr_str, hydra_get_next_login()); - else if (!strcmp(svc, "snmp3")) - printf("[%d][%s] host: %s login: %s\n", port, svc, ipaddr_str, hydra_get_next_password()); - else if (!strcmp(svc, "cisco-enable") || !strcmp(svc, "cisco")) - printf("[%d][%s] host: %s password: %s\n", port, svc, ipaddr_str, hydra_get_next_password()); + if (colored_output) + fprintf(fp, "[\e[31m%d\e[0m][\e[31m%s\e[0m] host: \e[32m%s\e[0m login: + \e[32m%s\e[0m\n", port, svc, ipaddr_str, hydra_get_next_login()); else + fprintf(fp, "[%d][%s] host: %s login: %s\n", port, svc, ipaddr_str, + hydra_get_next_login()); else if (!strcmp(svc, "snmp3")) if (colored_output) + fprintf(fp, "[\e[31m%d\e[0m][\e[31m%s\e[0m] host: \e[32m%s\e[0m login: + \e[32m%s\e[0m\n", port, svc, ipaddr_str, hydra_get_next_password()); else + fprintf(fp, "[%d][%s] host: %s login: %s\n", port, svc, ipaddr_str, + hydra_get_next_password()); else if (!strcmp(svc, "cisco-enable") || + !strcmp(svc, "cisco")) if (colored_output) fprintf(fp, + "[\e[31m%d\e[0m][\e[31m%s\e[0m] host: \e[32m%s\e[0m password: + \e[32m%s\e[0m\n", port, svc, ipaddr_str, hydra_get_next_password()); else + fprintf(fp, "[%d][%s] host: %s password: %s\n", port, svc, ipaddr_str, + hydra_get_next_password()); else if (colored_output) fprintf(fp, + "[\e[31m%d\e[0m][\e[31m%s\e[0m] host: \e[32m%s\e[0m login: \e[32m%s\e[0m + %s: \e[32m%s\e[0m\n", port, svc, ipaddr_str, hydra_get_next_login(), keyw, + hydra_get_next_password()); else - printf("[%d][%s] host: %s login: %s %s: %s\n", port, svc, ipaddr_str, hydra_get_next_login(), keyw, hydra_get_next_password()); - } - fflush(fp); - fflush(stdout); -*/ + fprintf(fp, "[%d][%s] host: %s login: %s %s: %s\n", port, svc, + ipaddr_str, hydra_get_next_login(), keyw, hydra_get_next_password()); if + (stdout != fp) { if (!strcmp(svc, "rsh") || !strcmp(svc, "oracle-sid")) + printf("[%d][%s] host: %s login: %s\n", port, svc, ipaddr_str, + hydra_get_next_login()); else if (!strcmp(svc, "snmp3")) printf("[%d][%s] + host: %s login: %s\n", port, svc, ipaddr_str, hydra_get_next_password()); + else if (!strcmp(svc, "cisco-enable") || !strcmp(svc, "cisco")) + printf("[%d][%s] host: %s password: %s\n", port, svc, ipaddr_str, + hydra_get_next_password()); else printf("[%d][%s] host: %s login: %s %s: + %s\n", port, svc, ipaddr_str, hydra_get_next_login(), keyw, + hydra_get_next_password()); + } + fflush(fp); + fflush(stdout); + */ } -void hydra_report_found_host_msg(int32_t port, char *ip, char *svc, FILE * fp, char *msg) { -/* - strcpy(ipaddr_str, hydra_address2string(ip)); - if (colored_output) - fprintf(fp, "[\e[31m%d\e[0m][\e[31m%s\e[0m] host: \e[32m%s\e[0m login: \e[32m%s\e[0m password: \e[32m%s\e[0m [%s]\n", port, svc, ipaddr_str, hydra_get_next_login(), - hydra_get_next_password(), msg); - else - fprintf(fp, "[%d][%s] host: %s login: %s password: %s [%s]\n", port, svc, ipaddr_str, hydra_get_next_login(), hydra_get_next_password(), msg); - if (stdout != fp) - printf("[%d][%s] host: %s login: %s password: %s\n", port, svc, ipaddr_str, hydra_get_next_login(), hydra_get_next_password()); - fflush(fp); -*/ +void hydra_report_found_host_msg(int32_t port, char *ip, char *svc, FILE *fp, char *msg) { + /* + strcpy(ipaddr_str, hydra_address2string(ip)); + if (colored_output) + fprintf(fp, "[\e[31m%d\e[0m][\e[31m%s\e[0m] host: \e[32m%s\e[0m login: + \e[32m%s\e[0m password: \e[32m%s\e[0m [%s]\n", port, svc, ipaddr_str, + hydra_get_next_login(), hydra_get_next_password(), msg); else fprintf(fp, + "[%d][%s] host: %s login: %s password: %s [%s]\n", port, svc, + ipaddr_str, hydra_get_next_login(), hydra_get_next_password(), msg); if + (stdout != fp) printf("[%d][%s] host: %s login: %s password: %s\n", + port, svc, ipaddr_str, hydra_get_next_login(), hydra_get_next_password()); + fflush(fp); + */ } int32_t hydra_connect_to_ssl(int32_t socket, char *hostname) { @@ -886,9 +902,7 @@ int32_t hydra_data_ready_writing_timed(int32_t socket, long sec, long usec) { return (my_select(socket + 1, &fds, NULL, NULL, sec, usec)); } -int32_t hydra_data_ready_writing(int32_t socket) { - return (hydra_data_ready_writing_timed(socket, 30, 0)); -} +int32_t hydra_data_ready_writing(int32_t socket) { return (hydra_data_ready_writing_timed(socket, 30, 0)); } int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec) { fd_set fds; @@ -898,9 +912,7 @@ int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec) { return (my_select(socket + 1, &fds, NULL, NULL, sec, usec)); } -int32_t hydra_data_ready(int32_t socket) { - return (hydra_data_ready_timed(socket, 0, 100)); -} +int32_t hydra_data_ready(int32_t socket) { return (hydra_data_ready_timed(socket, 0, 100)); } int32_t hydra_recv(int32_t socket, char *buf, uint32_t length) { int32_t ret; @@ -910,7 +922,8 @@ int32_t hydra_recv(int32_t socket, char *buf, uint32_t length) { if (debug) { sprintf(text, "[DEBUG] RECV [pid:%d]", getpid()); hydra_dump_data(buf, ret, text); - //hydra_report_debug(stderr, "DEBUG_RECV_BEGIN|%s|END [pid:%d ret:%d]", buf, getpid(), ret); + // hydra_report_debug(stderr, "DEBUG_RECV_BEGIN|%s|END [pid:%d ret:%d]", + // buf, getpid(), ret); } return ret; } @@ -919,7 +932,7 @@ int32_t hydra_recv_nb(int32_t socket, char *buf, uint32_t length) { int32_t ret = -1; char text[64]; - if (hydra_data_ready_timed(socket, (long) waittime, 0) > 0) { + if (hydra_data_ready_timed(socket, (long)waittime, 0) > 0) { if ((ret = internal__hydra_recv(socket, buf, length)) <= 0) { buf[0] = 0; if (debug) { @@ -931,7 +944,8 @@ int32_t hydra_recv_nb(int32_t socket, char *buf, uint32_t length) { if (debug) { sprintf(text, "[DEBUG] RECV [pid:%d]", getpid()); hydra_dump_data(buf, ret, text); - //hydra_report_debug(stderr, "DEBUG_RECV_BEGIN|%s|END [pid:%d ret:%d]", buf, getpid(), ret); + // hydra_report_debug(stderr, "DEBUG_RECV_BEGIN|%s|END [pid:%d ret:%d]", + // buf, getpid(), ret); } } return ret; @@ -949,9 +963,11 @@ char *hydra_receive_line(int32_t socket) { memset(buff, 0, sizeof(buf)); if (debug) - printf("[DEBUG] hydra_receive_line: waittime: %d, conwait: %d, socket: %d, pid: %d\n", waittime, conwait, socket, getpid()); + printf("[DEBUG] hydra_receive_line: waittime: %d, conwait: %d, socket: %d, " + "pid: %d\n", + waittime, conwait, socket, getpid()); - if ((i = hydra_data_ready_timed(socket, (long) waittime, 0)) > 0) { + if ((i = hydra_data_ready_timed(socket, (long)waittime, 0)) > 0) { do { j = internal__hydra_recv(socket, buf, sizeof(buf) - 1); if (j > 0) { @@ -976,22 +992,24 @@ char *hydra_receive_line(int32_t socket) { } } while (hydra_data_ready(socket) > 0 && j > 0 #ifdef LIBOPENSSL - || use_ssl && SSL_pending(ssl) + || use_ssl && SSL_pending(ssl) #endif - ); + ); if (got > 0) { if (debug) { sprintf(pid, "[DEBUG] RECV [pid:%d]", getpid()); hydra_dump_data(buff, got, pid); - //hydra_report_debug(stderr, "DEBUG_RECV_BEGIN [pid:%d len:%d]|%s|END", getpid(), got, buff); + // hydra_report_debug(stderr, "DEBUG_RECV_BEGIN [pid:%d len:%d]|%s|END", + // getpid(), got, buff); } } else { if (got < 0) { if (debug) { sprintf(pid, "[DEBUG] RECV [pid:%d]", getpid()); - hydra_dump_data((unsigned char*)"", -1, pid); - //hydra_report_debug(stderr, "DEBUG_RECV_BEGIN||END [pid:%d %d]", getpid(), i); + hydra_dump_data((unsigned char *)"", -1, pid); + // hydra_report_debug(stderr, "DEBUG_RECV_BEGIN||END [pid:%d %d]", + // getpid(), i); perror("recv"); } } @@ -1002,7 +1020,9 @@ char *hydra_receive_line(int32_t socket) { usleepn(100); } else { if (debug) - printf("[DEBUG] hydra_data_ready_timed: %d, waittime: %d, conwait: %d, socket: %d\n", i, waittime, conwait, socket); + printf("[DEBUG] hydra_data_ready_timed: %d, waittime: %d, conwait: %d, " + "socket: %d\n", + i, waittime, conwait, socket); } return buff; @@ -1015,22 +1035,23 @@ int32_t hydra_send(int32_t socket, char *buf, uint32_t size, int32_t options) { sprintf(text, "[DEBUG] SEND [pid:%d]", getpid()); hydra_dump_data(buf, size, text); -/* int32_t k; - char *debugbuf = malloc(size + 1); + /* int32_t k; + char *debugbuf = malloc(size + 1); - if (debugbuf != NULL) { - for (k = 0; k < size; k++) - if (buf[k] == 0) - debugbuf[k] = 32; - else - debugbuf[k] = buf[k]; - debugbuf[size] = 0; - hydra_report_debug(stderr, "DEBUG_SEND_BEGIN|%s|END [pid:%d]", debugbuf, getpid()); - free(debugbuf); - }*/ + if (debugbuf != NULL) { + for (k = 0; k < size; k++) + if (buf[k] == 0) + debugbuf[k] = 32; + else + debugbuf[k] = buf[k]; + debugbuf[size] = 0; + hydra_report_debug(stderr, "DEBUG_SEND_BEGIN|%s|END [pid:%d]", + debugbuf, getpid()); free(debugbuf); + }*/ } -/* if (hydra_data_ready_writing(socket)) < 1) return -1; XXX maybe needed in the future */ + /* if (hydra_data_ready_writing(socket)) < 1) return -1; XXX maybe needed + * in the future */ return (internal__hydra_send(socket, buf, size, options)); } @@ -1038,7 +1059,7 @@ int32_t make_to_lower(char *buf) { if (buf == NULL) return 1; while (buf[0] != 0) { - buf[0] = tolower((int32_t) buf[0]); + buf[0] = tolower((int32_t)buf[0]); buf++; } return 1; @@ -1046,15 +1067,16 @@ int32_t make_to_lower(char *buf) { char *hydra_strrep(char *string, char *oldpiece, char *newpiece) { int32_t str_index, newstr_index, oldpiece_index, end, new_len, old_len, cpy_len; - char *c, oldstring[6096], newstring[6096]; //updated due to issue 192 on github. + char *c, oldstring[6096], + newstring[6096]; // updated due to issue 192 on github. static char finalstring[6096]; - if (string == NULL || oldpiece == NULL || newpiece == NULL || strlen(string) >= sizeof(oldstring) - 1 - || (strlen(string) + strlen(newpiece) - strlen(oldpiece) >= sizeof(newstring) - 1 && strlen(string) > strlen(oldpiece))) + if (string == NULL || oldpiece == NULL || newpiece == NULL || strlen(string) >= sizeof(oldstring) - 1 || (strlen(string) + strlen(newpiece) - strlen(oldpiece) >= sizeof(newstring) - 1 && strlen(string) > strlen(oldpiece))) return NULL; if (strlen(string) > 6000) { - hydra_report(stderr, "[ERROR] Supplied URL or POST data too large. Max limit is 6000 characters.\n"); + hydra_report(stderr, "[ERROR] Supplied URL or POST data too large. Max " + "limit is 6000 characters.\n"); exit(-1); } @@ -1062,7 +1084,7 @@ char *hydra_strrep(char *string, char *oldpiece, char *newpiece) { strcpy(oldstring, string); // while ((c = (char *) strstr(oldstring, oldpiece)) != NULL) { - c = (char *) strstr(oldstring, oldpiece); + c = (char *)strstr(oldstring, oldpiece); new_len = strlen(newpiece); old_len = strlen(oldpiece); end = strlen(oldstring) - old_len; @@ -1081,13 +1103,13 @@ char *hydra_strrep(char *string, char *oldpiece, char *newpiece) { newstr_index += new_len; str_index += old_len; /* Check for another pattern match */ - if ((c = (char *) strstr(oldstring + str_index, oldpiece)) != NULL) + if ((c = (char *)strstr(oldstring + str_index, oldpiece)) != NULL) oldpiece_index = c - oldstring; } /* Copy remaining characters from the right of last matched pattern */ strcpy(newstring + newstr_index, oldstring + str_index); strcpy(oldstring, newstring); -// } + // } strcpy(finalstring, newstring); return finalstring; } @@ -1110,14 +1132,14 @@ unsigned char hydra_conv64(unsigned char in) { } void hydra_tobase64(unsigned char *buf, uint32_t buflen, uint32_t bufsize) { - unsigned char small[3] = { 0, 0, 0 }; + unsigned char small[3] = {0, 0, 0}; unsigned char big[5]; unsigned char *ptr = buf; uint32_t i = bufsize; uint32_t len = 0; unsigned char bof[i]; - if (buf == NULL || strlen((char *) buf) == 0 || buflen == 0) + if (buf == NULL || strlen((char *)buf) == 0 || buflen == 0) return; bof[0] = 0; memset(big, 0, sizeof(big)); @@ -1129,12 +1151,12 @@ void hydra_tobase64(unsigned char *buf, uint32_t buflen, uint32_t bufsize) { big[1] = hydra_conv64(((*ptr & 3) << 4) + (*(ptr + 1) >> 4)); big[2] = hydra_conv64(((*(ptr + 1) & 15) << 2) + (*(ptr + 2) >> 6)); big[3] = hydra_conv64(*(ptr + 2) & 63); - len += strlen((char *) big); + len += strlen((char *)big); if (len > bufsize) { buf[0] = 0; return; } - strcat((char *) bof, (char *) big); + strcat((char *)bof, (char *)big); ptr += 3; } @@ -1152,14 +1174,14 @@ void hydra_tobase64(unsigned char *buf, uint32_t buflen, uint32_t bufsize) { if (small[1] == 0) big[2] = '='; big[3] = '='; - strcat((char *) bof, (char *) big); + strcat((char *)bof, (char *)big); } - strcpy((char *) buf, (char *) bof); /* can not overflow */ + strcpy((char *)buf, (char *)bof); /* can not overflow */ } void hydra_dump_asciihex(unsigned char *string, int32_t length) { - unsigned char *p = (unsigned char *) string; + unsigned char *p = (unsigned char *)string; unsigned char lastrow_data[16]; int32_t rows = length / HYDRA_DUMP_ROWS; int32_t lastrow = length % HYDRA_DUMP_ROWS; @@ -1217,10 +1239,10 @@ char *hydra_address2string(char *address) { if (address[0] == 4) { memcpy(&target.sin_addr.s_addr, &address[1], 4); - return inet_ntoa((struct in_addr) target.sin_addr); + return inet_ntoa((struct in_addr)target.sin_addr); } else #ifdef AF_INET6 - if (address[0] == 16) { + if (address[0] == 16) { memcpy(&target6.sin6_addr, &address[1], 16); inet_ntop(AF_INET6, &target6.sin6_addr, ipstring, sizeof(ipstring)); return ipstring; @@ -1231,7 +1253,7 @@ char *hydra_address2string(char *address) { fprintf(stderr, "[ERROR] unknown address string size!\n"); return NULL; } - return NULL; // not reached + return NULL; // not reached } char *hydra_address2string_beautiful(char *address) { @@ -1240,10 +1262,10 @@ char *hydra_address2string_beautiful(char *address) { if (address[0] == 4) { memcpy(&target.sin_addr.s_addr, &address[1], 4); - return inet_ntoa((struct in_addr) target.sin_addr); + return inet_ntoa((struct in_addr)target.sin_addr); } else #ifdef AF_INET6 - if (address[0] == 16) { + if (address[0] == 16) { memcpy(&target6.sin6_addr, &address[1], 16); ipstring[0] = '['; inet_ntop(AF_INET6, &target6.sin6_addr, ipstring + 1, sizeof(ipstring) - 1); @@ -1260,12 +1282,10 @@ char *hydra_address2string_beautiful(char *address) { fprintf(stderr, "[ERROR] unknown address string size!\n"); return NULL; } - return NULL; // not reached + return NULL; // not reached } -void hydra_set_srcport(int32_t port) { - src_port = port; -} +void hydra_set_srcport(int32_t port) { src_port = port; } #ifdef HAVE_PCRE int32_t hydra_string_match(char *str, const char *regex) { @@ -1292,9 +1312,9 @@ int32_t hydra_string_match(char *str, const char *regex) { * str_replace.c implements a str_replace PHP like function * Copyright (C) 2009 chantra * - * Create a new string with [substr] being replaced ONCE by [replacement] in [string] - * Returns the new string, or NULL if out of memory. - * The caller is responsible for freeing this new string. + * Create a new string with [substr] being replaced ONCE by [replacement] in + * [string] Returns the new string, or NULL if out of memory. The caller is + * responsible for freeing this new string. * */ char *hydra_string_replace(const char *string, const char *substr, const char *replacement) { @@ -1323,16 +1343,16 @@ char *hydra_strcasestr(const char *haystack, const char *needle) { return NULL; for (; *haystack; ++haystack) { - if (toupper((int32_t) *haystack) == toupper((int32_t) *needle)) { + if (toupper((int32_t)*haystack) == toupper((int32_t)*needle)) { const char *h, *n; for (h = haystack, n = needle; *h && *n; ++h, ++n) { - if (toupper((int32_t) *h) != toupper((int32_t) *n)) { + if (toupper((int32_t)*h) != toupper((int32_t)*n)) { break; } } - if (!*n) { /* matched all of 'needle' to null termination */ - return (char *) haystack; /* return the start of the match */ + if (!*n) { /* matched all of 'needle' to null termination */ + return (char *)haystack; /* return the start of the match */ } } } @@ -1340,7 +1360,7 @@ char *hydra_strcasestr(const char *haystack, const char *needle) { } void hydra_dump_data(unsigned char *buf, int32_t len, char *text) { - unsigned char *p = (unsigned char *) buf; + unsigned char *p = (unsigned char *)buf; unsigned char lastrow_data[16]; int32_t rows = len / 16; int32_t lastrow = len % 16; diff --git a/hydra-mod.h b/hydra-mod.h index 5d613f7..cb9c342 100644 --- a/hydra-mod.h +++ b/hydra-mod.h @@ -4,11 +4,11 @@ #include "hydra.h" #ifdef __sun - #include +#include #elif defined(__FreeBSD__) || defined(__IBMCPP__) || defined(_AIX) - #include +#include #else - #include +#include #endif extern char quiet; @@ -21,10 +21,10 @@ extern char *hydra_get_next_password(); extern void hydra_completed_pair(); extern void hydra_completed_pair_found(); extern void hydra_completed_pair_skip(); -extern void hydra_report_found(int32_t port, char *svc, FILE * fp); -extern void hydra_report_pass_found(int32_t port, char *ip, char *svc, FILE * fp); -extern void hydra_report_found_host(int32_t port, char *ip, char *svc, FILE * fp); -extern void hydra_report_found_host_msg(int32_t port, char *ip, char *svc, FILE * fp, char *msg); +extern void hydra_report_found(int32_t port, char *svc, FILE *fp); +extern void hydra_report_pass_found(int32_t port, char *ip, char *svc, FILE *fp); +extern void hydra_report_found_host(int32_t port, char *ip, char *svc, FILE *fp); +extern void hydra_report_found_host_msg(int32_t port, char *ip, char *svc, FILE *fp, char *msg); extern void hydra_report_debug(FILE *st, char *format, ...); extern int32_t hydra_connect_to_ssl(int32_t socket, char *hostname); extern int32_t hydra_connect_ssl(char *host, int32_t port, char *hostname); diff --git a/hydra-mongodb.c b/hydra-mongodb.c index f017c4c..5b38a42 100644 --- a/hydra-mongodb.c +++ b/hydra-mongodb.c @@ -1,6 +1,6 @@ -//This plugin was written by -//Tested on mongodb-server 1:3.6.3-0ubuntu1 -//MONGODB-CR is been deprecated +// This plugin was written by +// Tested on mongodb-server 1:3.6.3-0ubuntu1 +// MONGODB-CR is been deprecated #ifdef LIBMONGODB #include @@ -9,9 +9,7 @@ #include "hydra-mod.h" #ifndef LIBMONGODB -void dummy_mongodb() { - printf("\n"); -} +void dummy_mongodb() { printf("\n"); } #else extern int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec); @@ -31,16 +29,17 @@ int is_error_msg(char *msg) { } int require_auth(int32_t sock) { - unsigned char m_hdr[] = - "\x3f\x00\x00\x00" //messageLength (63) - "\x00\x00\x00\x41" //requestID - "\xff\xff\xff\xff" //responseTo - "\xd4\x07\x00\x00" //opCode (2004 OP_QUERY) - "\x00\x00\x00\x00" //flags - "\x61\x64\x6d\x69\x6e\x2e\x24\x63\x6d\x64\x00" //fullCollectionName (admin.$cmd) - "\x00\x00\x00\x00" //numberToSkip (0) - "\x01\x00\x00\x00" //numberToReturn (1) - "\x18\x00\x00\x00\x10\x6c\x69\x73\x74\x44\x61\x74\x61\x62\x61\x73\x65\x73\x00\x01\x00\x00\x00\x00"; //query ({"listDatabases"=>1}) + unsigned char m_hdr[] = "\x3f\x00\x00\x00" // messageLength (63) + "\x00\x00\x00\x41" // requestID + "\xff\xff\xff\xff" // responseTo + "\xd4\x07\x00\x00" // opCode (2004 OP_QUERY) + "\x00\x00\x00\x00" // flags + "\x61\x64\x6d\x69\x6e\x2e\x24\x63\x6d\x64\x00" // fullCollectionName + // (admin.$cmd) + "\x00\x00\x00\x00" // numberToSkip (0) + "\x01\x00\x00\x00" // numberToReturn (1) + "\x18\x00\x00\x00\x10\x6c\x69\x73\x74\x44\x61\x74\x61\x62\x61\x73\x65\x73" + "\x00\x01\x00\x00\x00\x00"; // query ({"listDatabases"=>1}) if (hydra_send(sock, m_hdr, sizeof(m_hdr), 0) > 0) { if (hydra_data_ready_timed(sock, 0, 1000) > 0) { @@ -51,7 +50,7 @@ int require_auth(int32_t sock) { return 2; } -int32_t start_mongodb(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_mongodb(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, *pass; char uri[256]; @@ -70,13 +69,13 @@ int32_t start_mongodb(int32_t s, char *ip, int32_t port, unsigned char options, pass = empty; mongoc_init(); - mongoc_log_set_handler (NULL, NULL); + mongoc_log_set_handler(NULL, NULL); bson_init(&q); - snprintf(uri, sizeof(uri), "mongodb://%s:%s@%s/?authSource=%s",login, pass, hydra_address2string(ip), miscptr); + snprintf(uri, sizeof(uri), "mongodb://%s:%s@%s/?authSource=%s", login, pass, hydra_address2string(ip), miscptr); client = mongoc_client_new(uri); if (!client) - return 3; + return 3; mongoc_client_set_appname(client, "hydra"); collection = mongoc_client_get_collection(client, miscptr, "test"); @@ -86,7 +85,7 @@ int32_t start_mongodb(int32_t s, char *ip, int32_t port, unsigned char options, r = mongoc_cursor_error(cursor, &error); if (r) { if (verbose) - hydra_report(stderr, "[ERROR] Can not read document: %s\n", error.message); + hydra_report(stderr, "[ERROR] Can not read document: %s\n", error.message); mongoc_cursor_destroy(cursor); mongoc_collection_destroy(collection); mongoc_client_destroy(client); @@ -96,9 +95,9 @@ int32_t start_mongodb(int32_t s, char *ip, int32_t port, unsigned char options, return 3; } return 2; - } + } } - + mongoc_cursor_destroy(cursor); mongoc_collection_destroy(collection); mongoc_client_destroy(client); @@ -112,9 +111,9 @@ int32_t start_mongodb(int32_t s, char *ip, int32_t port, unsigned char options, return 2; } -void service_mongodb(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_mongodb(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; - + if (!miscptr) { if (verbose) hydra_report(stderr, "[INFO] Using default database \"admin\"\n"); @@ -130,20 +129,21 @@ void service_mongodb(char *ip, int32_t sp, unsigned char options, char *miscptr, switch (run) { case 1: next_run = start_mongodb(sock, ip, port, options, miscptr, fp); - break; + break; case 2: hydra_child_exit(0); return; default: if (!verbose) - hydra_report(stderr, "[ERROR] Caught unknown return code, try verbose option for more details\n"); + hydra_report(stderr, "[ERROR] Caught unknown return code, try verbose " + "option for more details\n"); hydra_child_exit(2); } run = next_run; } } -int32_t service_mongodb_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_mongodb_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. @@ -179,6 +179,7 @@ int32_t service_mongodb_init(char *ip, int32_t sp, unsigned char options, char * #endif -void usage_mongodb(const char* service) { - printf("Module mongodb is optionally taking a database name to attack, default is \"admin\"\n\n"); +void usage_mongodb(const char *service) { + printf("Module mongodb is optionally taking a database name to attack, " + "default is \"admin\"\n\n"); } diff --git a/hydra-mssql.c b/hydra-mssql.c index 2f9608b..ee273ca 100644 --- a/hydra-mssql.c +++ b/hydra-mssql.c @@ -5,47 +5,55 @@ extern char *HYDRA_EXIT; char *buf; -unsigned char p_hdr[] = - "\x02\x00\x02\x00\x00\x00\x02\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00"; -unsigned char p_pk2[] = - "\x30\x30\x30\x30\x30\x30\x61\x30\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x20\x18\x81\xb8\x2c\x08\x03" - "\x01\x06\x0a\x09\x01\x01\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x73\x71\x75\x65\x6c\x64\x61" - "\x20\x31\x2e\x30\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x0b\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00"; -unsigned char p_pk3[] = - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x04\x02\x00\x00\x4d\x53\x44" - "\x42\x4c\x49\x42\x00\x00\x00\x07\x06\x00\x00" "\x00\x00\x0d\x11\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00"; -unsigned char p_lng[] = - "\x02\x01\x00\x47\x00\x00\x02\x00\x00\x00\x00" - "\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x30\x30\x30\x00\x00" "\x00\x03\x00\x00\x00"; +unsigned char p_hdr[] = "\x02\x00\x02\x00\x00\x00\x02\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00"; +unsigned char p_pk2[] = "\x30\x30\x30\x30\x30\x30\x61\x30\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x20\x18\x81\xb8\x2c\x08\x03" + "\x01\x06\x0a\x09\x01\x01\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x73\x71\x75\x65\x6c\x64\x61" + "\x20\x31\x2e\x30\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x0b\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00"; +unsigned char p_pk3[] = "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x04\x02\x00\x00\x4d\x53\x44" + "\x42\x4c\x49\x42\x00\x00\x00\x07\x06\x00\x00" + "\x00\x00\x0d\x11\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00"; +unsigned char p_lng[] = "\x02\x01\x00\x47\x00\x00\x02\x00\x00\x00\x00" + "\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x30\x30\x30\x00\x00" + "\x00\x03\x00\x00\x00"; -int32_t start_mssql(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_mssql(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, *pass, buffer[1024]; char ms_login[MSLEN + 1]; @@ -81,7 +89,7 @@ int32_t start_mssql(int32_t s, char *ip, int32_t port, unsigned char options, ch if (hydra_send(s, buffer, MSLEN + 1 + 39 + MSLEN + 1 + 110 + 1 + MSLEN + 270, 0) < 0) return 1; - if (hydra_send(s, (char *) p_lng, 71, 0) < 0) + if (hydra_send(s, (char *)p_lng, 71, 0) < 0) return 1; memset(buffer, 0, sizeof(buffer)); @@ -107,7 +115,7 @@ int32_t start_mssql(int32_t s, char *ip, int32_t port, unsigned char options, ch return 1; } -void service_mssql(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_mssql(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_MSSQL, mysslport = PORT_MSSQL_SSL; @@ -116,7 +124,7 @@ void service_mssql(char *ip, int32_t sp, unsigned char options, char *miscptr, F return; while (1) { switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ if ((options & OPTION_SSL) == 0) { if (port != 0) myport = port; @@ -129,18 +137,18 @@ void service_mssql(char *ip, int32_t sp, unsigned char options, char *miscptr, F port = mysslport; } if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } next_run = start_mssql(sock, ip, port, options, miscptr, fp); hydra_disconnect(sock); break; - case 2: /* clean exit */ + case 2: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); return; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(2); @@ -153,13 +161,13 @@ void service_mssql(char *ip, int32_t sp, unsigned char options, char *miscptr, F } } -int32_t service_mssql_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_mssql_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here diff --git a/hydra-mysql.c b/hydra-mysql.c index c33dc88..eae5fd9 100644 --- a/hydra-mysql.c +++ b/hydra-mysql.c @@ -1,19 +1,16 @@ /* mysql 3.2x.x to 4.x support - by mcbethh (at) u-n-f (dot) com */ -/* david (dot) maciejak (at) gmail (dot) com for using libmysqlclient-dev, adding support for mysql version 5.x */ +/* david (dot) maciejak (at) gmail (dot) com for using libmysqlclient-dev, + * adding support for mysql version 5.x */ #include "hydra-mod.h" #ifndef HAVE_MATH_H #include -void dummy_mysql() { - printf("\n"); -} +void dummy_mysql() { printf("\n"); } -void service_mysql(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { - printf("\n"); -} +void service_mysql(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { printf("\n"); } #else #include @@ -41,7 +38,8 @@ extern int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec); extern char *HYDRA_EXIT; char mysqlsalt[9]; -/* modified hydra_receive_line, I've striped code which changed every 0x00 to 0x20 */ +/* modified hydra_receive_line, I've striped code which changed every 0x00 to + * 0x20 */ char *hydra_mysql_receive_line(int32_t socket) { char buf[300], *buff, *buff2; int32_t i = 0, j = 0, buff_size = 300; @@ -51,7 +49,7 @@ char *hydra_mysql_receive_line(int32_t socket) { return NULL; memset(buff, 0, sizeof(buf)); - i = hydra_data_ready_timed(socket, (long) waittime, 0); + i = hydra_data_ready_timed(socket, (long)waittime, 0); if (i > 0) { if ((i = internal__hydra_recv(socket, buff, sizeof(buf))) < 0) { free(buff); @@ -98,7 +96,7 @@ char hydra_mysql_init(int32_t sock) { protocol = buf[4]; if (protocol == 0xff) { pos = &buf[6]; -// *(strchr(pos, '.')) = '\0'; + // *(strchr(pos, '.')) = '\0'; hydra_report(stderr, "[ERROR] %s\n", pos); free(buf); return 2; @@ -108,7 +106,10 @@ char hydra_mysql_init(int32_t sock) { return 2; } if (protocol > 10) { - fprintf(stderr, "[INFO] This is protocol version %d, only v10 is supported, not sure if it will work\n", protocol); + fprintf(stderr, + "[INFO] This is protocol version %d, only v10 is supported, not " + "sure if it will work\n", + protocol); } server_version = &buf[5]; pos = buf + strlen(server_version) + 10; @@ -116,7 +117,8 @@ char hydra_mysql_init(int32_t sock) { if (!strstr(server_version, "3.") && !strstr(server_version, "4.") && strstr(server_version, "5.")) { #ifndef LIBMYSQLCLIENT - hydra_report(stderr, "[ERROR] Not an MySQL protocol or unsupported version,\ncheck configure to see if libmysql is found\n"); + hydra_report(stderr, "[ERROR] Not an MySQL protocol or unsupported version,\ncheck " + "configure to see if libmysql is found\n"); #endif free(buf); return 2; @@ -130,35 +132,32 @@ char hydra_mysql_init(int32_t sock) { char *hydra_mysql_prepare_auth(char *login, char *pass) { unsigned char *response; unsigned long login_len = strlen(login) > 32 ? 32 : strlen(login); - unsigned long response_len = 4 /* header */ + - 2 /* client flags */ + - 3 /* max packet len */ + - login_len + 1 + 8 /* scrambled password len */ ; + unsigned long response_len = 4 /* header */ + 2 /* client flags */ + 3 /* max packet len */ + login_len + 1 + 8 /* scrambled password len */; - response = (unsigned char *) malloc(response_len + 4); + response = (unsigned char *)malloc(response_len + 4); if (response == NULL) { fprintf(stderr, "[ERROR] could not allocate memory\n"); return NULL; } memset(response, 0, response_len + 4); - *((unsigned long *) response) = response_len - 4; - response[3] = 0x01; /* packet number */ + *((unsigned long *)response) = response_len - 4; + response[3] = 0x01; /* packet number */ response[4] = 0x85; - response[5] = 0x24; /* client flags */ - response[6] = response[7] = response[8] = 0x00; /* max packet */ - memcpy(&response[9], login, login_len); /* login */ - response[9 + login_len] = '\0'; /* null terminate login */ - hydra_scramble((char *) &response[9 + login_len + 1], mysqlsalt, pass); + response[5] = 0x24; /* client flags */ + response[6] = response[7] = response[8] = 0x00; /* max packet */ + memcpy(&response[9], login, login_len); /* login */ + response[9 + login_len] = '\0'; /* null terminate login */ + hydra_scramble((char *)&response[9 + login_len + 1], mysqlsalt, pass); - return (char *) response; + return (char *)response; } /* returns 0 if authentication succeed */ /* and 1 if failed */ char hydra_mysql_parse_response(unsigned char *response) { - unsigned long response_len = *((unsigned long *) response) & 0xffffff; + unsigned long response_len = *((unsigned long *)response) & 0xffffff; if (response_len < 4) return 0; @@ -170,13 +169,13 @@ char hydra_mysql_parse_response(unsigned char *response) { } char hydra_mysql_send_com_quit(int32_t sock) { - char com_quit_packet[5] = { 0x01, 0x00, 0x00, 0x00, 0x01 }; + char com_quit_packet[5] = {0x01, 0x00, 0x00, 0x00, 0x01}; hydra_send(sock, com_quit_packet, 5, 0); return 0; } -int32_t start_mysql(int32_t sock, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_mysql(int32_t sock, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *response = NULL, *login = NULL, *pass = NULL; unsigned long response_len; char res = 0; @@ -221,7 +220,8 @@ int32_t start_mysql(int32_t sock, char *ip, int32_t port, unsigned char options, } if (my_errno == 1251) { - hydra_report(stderr, "[ERROR] Client does not support authentication protocol requested by server\n"); + hydra_report(stderr, "[ERROR] Client does not support authentication " + "protocol requested by server\n"); } /* @@ -235,8 +235,8 @@ int32_t start_mysql(int32_t sock, char *ip, int32_t port, unsigned char options, */ - //if the error is more critical, we just try to reconnect - //to the db later with the mysql_init + // if the error is more critical, we just try to reconnect + // to the db later with the mysql_init if ((my_errno != 1044) && (my_errno != 1045)) { mysql_close(mysql); mysql = NULL; @@ -264,7 +264,7 @@ int32_t start_mysql(int32_t sock, char *ip, int32_t port, unsigned char options, response = hydra_mysql_prepare_auth(login, pass); if (response == NULL) return 3; - response_len = *((unsigned long *) response) & 0xffffff; + response_len = *((unsigned long *)response) & 0xffffff; /* send client auth packet */ /* dunny why, mysql IO code had problem reading my response. */ @@ -280,7 +280,7 @@ int32_t start_mysql(int32_t sock, char *ip, int32_t port, unsigned char options, /* read authentication response */ if ((response = hydra_mysql_receive_line(sock)) == NULL) return 1; - res = hydra_mysql_parse_response((unsigned char *) response); + res = hydra_mysql_parse_response((unsigned char *)response); if (!res) { hydra_mysql_send_com_quit(sock); @@ -302,7 +302,7 @@ int32_t start_mysql(int32_t sock, char *ip, int32_t port, unsigned char options, return 1; } -void service_mysql(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_mysql(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_MYSQL; @@ -311,12 +311,12 @@ void service_mysql(char *ip, int32_t sp, unsigned char options, char *miscptr, F return; while (1) { switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ if (sock >= 0) { hydra_mysql_send_com_quit(sock); sock = hydra_disconnect(sock); } -// usleepn(300); + // usleepn(300); if ((options & OPTION_SSL) == 0) { if (port != 0) myport = port; @@ -324,15 +324,16 @@ void service_mysql(char *ip, int32_t sp, unsigned char options, char *miscptr, F port = myport; } if (sock < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + if (quiet != 1) + fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } next_run = 2; break; - case 2: /* run the cracking function */ + case 2: /* run the cracking function */ next_run = start_mysql(sock, ip, port, options, miscptr, fp); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) { hydra_mysql_send_com_quit(sock); sock = hydra_disconnect(sock); @@ -349,8 +350,6 @@ void service_mysql(char *ip, int32_t sp, unsigned char options, char *miscptr, F #ifndef LIBMYSQLCLIENT - - #endif /************************************************************************/ @@ -367,9 +366,9 @@ struct hydra_rand_struct { double max_value_dbl; }; -void hydra_randominit(struct hydra_rand_struct *rand_st, unsigned long seed1, unsigned long seed2) { /* For mysql 3.21.# */ +void hydra_randominit(struct hydra_rand_struct *rand_st, unsigned long seed1, unsigned long seed2) { /* For mysql 3.21.# */ rand_st->max_value = 0x3FFFFFFFL; - rand_st->max_value_dbl = (double) rand_st->max_value; + rand_st->max_value_dbl = (double)rand_st->max_value; rand_st->seed1 = seed1 % rand_st->max_value; rand_st->seed2 = seed2 % rand_st->max_value; } @@ -377,7 +376,7 @@ void hydra_randominit(struct hydra_rand_struct *rand_st, unsigned long seed1, un double hydra_rnd(struct hydra_rand_struct *rand_st) { rand_st->seed1 = (rand_st->seed1 * 3 + rand_st->seed2) % rand_st->max_value; rand_st->seed2 = (rand_st->seed1 + rand_st->seed2 + 33) % rand_st->max_value; - return (((double) rand_st->seed1) / rand_st->max_value_dbl); + return (((double)rand_st->seed1) / rand_st->max_value_dbl); } void hydra_hash_password(unsigned long *result, const char *password) { register unsigned long nr = 1345345333L, add = 7, nr2 = 0x12345671L; @@ -385,14 +384,15 @@ void hydra_hash_password(unsigned long *result, const char *password) { for (; *password; password++) { if (*password == ' ' || *password == '\t') - continue; /* skipp space in password */ - tmp = (unsigned long) (unsigned char) *password; + continue; /* skipp space in password */ + tmp = (unsigned long)(unsigned char)*password; nr ^= (((nr & 63) + add) * tmp) + (nr << 8); nr2 += (nr2 << 8) ^ nr; add += tmp; } - result[0] = nr & (((unsigned long) 1L << 31) - 1L); /* Don't use sign bit (str2int) */ ; - result[1] = nr2 & (((unsigned long) 1L << 31) - 1L); + result[0] = nr & (((unsigned long)1L << 31) - 1L); /* Don't use sign bit (str2int) */ + ; + result[1] = nr2 & (((unsigned long)1L << 31) - 1L); return; } @@ -408,8 +408,8 @@ char *hydra_scramble(char *to, const char *message, const char *password) { hydra_hash_password(hash_message, message); hydra_randominit(&rand_st, hash_pass[0] ^ hash_message[0], hash_pass[1] ^ hash_message[1]); while (*message++) - *to++ = (char) (floor(hydra_rnd(&rand_st) * 31) + 64); - extra = (char) (floor(hydra_rnd(&rand_st) * 31)); + *to++ = (char)(floor(hydra_rnd(&rand_st) * 31) + 64); + extra = (char)(floor(hydra_rnd(&rand_st) * 31)); while (to_start != to) *(to_start++) ^= extra; } @@ -418,13 +418,13 @@ char *hydra_scramble(char *to, const char *message, const char *password) { } #endif -int32_t service_mysql_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_mysql_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here @@ -432,6 +432,7 @@ int32_t service_mysql_init(char *ip, int32_t sp, unsigned char options, char *mi return 0; } -void usage_mysql(const char* service) { - printf("Module mysql is optionally taking the database to attack, default is \"mysql\"\n\n"); +void usage_mysql(const char *service) { + printf("Module mysql is optionally taking the database to attack, default is " + "\"mysql\"\n\n"); } diff --git a/hydra-ncp.c b/hydra-ncp.c index 5c68d13..edbdfaa 100644 --- a/hydra-ncp.c +++ b/hydra-ncp.c @@ -1,28 +1,25 @@ /* * Novell Network Core Protocol Support - by David Maciejak @ GMAIL dot com * Tested on Netware 6.5 - * + * * you need to install libncp and libncp-dev (tested with version 2.2.6-3) - * + * * you can passed full context as OPT * * example: ./hydra -L login -P passw 172.16.246.129 ncp .O=cx * */ - #include "hydra-mod.h" #ifndef LIBNCP -void dummy_ncp() { - printf("\n"); -} +void dummy_ncp() { printf("\n"); } #else -#include -#include -#include #include +#include +#include +#include extern char *HYDRA_EXIT; extern int32_t child_head_no; @@ -33,11 +30,10 @@ typedef struct __NCP_DATA { char *context; } _NCP_DATA; -//uncomment line below to see more trace stack +// uncomment line below to see more trace stack //#define NCP_DEBUG -int32_t start_ncp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { - +int32_t start_ncp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *login; char *pass; char context[256]; @@ -47,13 +43,11 @@ int32_t start_ncp(int32_t s, char *ip, int32_t port, unsigned char options, char _NCP_DATA *session; - session = malloc(sizeof(_NCP_DATA)); memset(session, 0, sizeof(_NCP_DATA)); login = empty; pass = empty; - if (strlen(login = hydra_get_next_login()) == 0) { login = empty; } else { @@ -71,8 +65,8 @@ int32_t start_ncp(int32_t s, char *ip, int32_t port, unsigned char options, char } } - //login and password are case insensitive - //str_upper(login); + // login and password are case insensitive + // str_upper(login); if (strlen(pass = hydra_get_next_password()) == 0) pass = empty; @@ -91,27 +85,27 @@ int32_t start_ncp(int32_t s, char *ip, int32_t port, unsigned char options, char memset(session->spec.password, 0, sizeof(session->spec.password)); memcpy(session->spec.password, pass, strlen(pass) + 1); - //str_upper(session->spec.password); + // str_upper(session->spec.password); ncp_lib_error_code = ncp_login_conn(session->conn, session->spec.user, object_type, session->spec.password); switch (ncp_lib_error_code & 0x0000FFFF) { - case 0x0000: /* Success */ + case 0x0000: /* Success */ #ifdef NCP_DEBUG printf("Connection success (%s / %s). Error code: %X\n", login, pass, ncp_lib_error_code); #endif ncp_close(session->conn); - hydra_report_found_host(port, ip, "ncp", fp); //ok + hydra_report_found_host(port, ip, "ncp", fp); // ok hydra_completed_pair_found(); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) - return 3; //exit + return 3; // exit free(session); - return 2; //next + return 2; // next break; - case 0x89DE: /* PASSWORD INVALID */ - case 0x89F0: /* BIND WILDCARD INVALID */ - case 0x89FF: /* NO OBJ OR BAD PASSWORD */ - case 0xFD63: /* FAILED_AUTHENTICATION */ - case 0xFDA7: /* NO_SUCH_ENTRY */ + case 0x89DE: /* PASSWORD INVALID */ + case 0x89F0: /* BIND WILDCARD INVALID */ + case 0x89FF: /* NO OBJ OR BAD PASSWORD */ + case 0xFD63: /* FAILED_AUTHENTICATION */ + case 0xFDA7: /* NO_SUCH_ENTRY */ #ifdef NCP_DEBUG printf("Incorrect password (%s / %s). Error code: %X\n", login, pass, ncp_lib_error_code); #endif @@ -119,7 +113,7 @@ int32_t start_ncp(int32_t s, char *ip, int32_t port, unsigned char options, char hydra_completed_pair(); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) { free(session); - return 2; //next + return 2; // next } break; default: @@ -131,10 +125,10 @@ int32_t start_ncp(int32_t s, char *ip, int32_t port, unsigned char options, char break; } free(session); - return 1; //reconnect + return 1; // reconnect } -void service_ncp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_ncp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_NCP; @@ -144,7 +138,7 @@ void service_ncp(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL while (1) { switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ if (sock >= 0) sock = hydra_disconnect(sock); if (port != 0) @@ -152,14 +146,15 @@ void service_ncp(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL sock = hydra_connect_tcp(ip, myport); port = myport; if (sock < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + if (quiet != 1) + fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } next_run = 2; break; case 2: /* - * Here we start the password cracking process + * Here we start the password cracking process */ next_run = start_ncp(sock, ip, port, options, miscptr, fp); break; @@ -183,13 +178,13 @@ void service_ncp(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL #endif -int32_t service_ncp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_ncp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here @@ -197,6 +192,7 @@ int32_t service_ncp_init(char *ip, int32_t sp, unsigned char options, char *misc return 0; } -void usage_ncp(const char* service) { - printf("Module ncp is optionally taking the full context, for example \".O=cx\"\n\n"); +void usage_ncp(const char *service) { + printf("Module ncp is optionally taking the full context, for example " + "\".O=cx\"\n\n"); } diff --git a/hydra-nntp.c b/hydra-nntp.c index f6b7f35..c3622c2 100644 --- a/hydra-nntp.c +++ b/hydra-nntp.c @@ -25,7 +25,7 @@ char *nntp_read_server_capacity(int32_t sock) { free(buf); ptr = buf = hydra_receive_line(sock); if (buf != NULL) { - if (isdigit((int32_t) buf[0]) && buf[3] == ' ') + if (isdigit((int32_t)buf[0]) && buf[3] == ' ') resp = 1; else { if (buf[strlen(buf) - 1] == '\n') @@ -38,7 +38,7 @@ char *nntp_read_server_capacity(int32_t sock) { if ((ptr = strrchr(buf, '\n')) != NULL) { #endif ptr++; - if (isdigit((int32_t) *ptr) && *(ptr + 3) == ' ') + if (isdigit((int32_t)*ptr) && *(ptr + 3) == ' ') resp = 1; } } @@ -47,7 +47,7 @@ char *nntp_read_server_capacity(int32_t sock) { return buf; } -int32_t start_nntp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_nntp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = "\"\""; char *login, *pass, buffer[500], buffer2[500], *fooptr; int32_t i = 1; @@ -79,7 +79,7 @@ int32_t start_nntp(int32_t s, char *ip, int32_t port, unsigned char options, cha } free(buf); strcpy(buffer2, login); - hydra_tobase64((unsigned char *) buffer2, strlen(buffer2), sizeof(buffer2)); + hydra_tobase64((unsigned char *)buffer2, strlen(buffer2), sizeof(buffer2)); sprintf(buffer, "%.250s\r\n", buffer2); if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { @@ -94,7 +94,7 @@ int32_t start_nntp(int32_t s, char *ip, int32_t port, unsigned char options, cha } free(buf); strcpy(buffer2, pass); - hydra_tobase64((unsigned char *) buffer2, strlen(buffer2), sizeof(buffer2)); + hydra_tobase64((unsigned char *)buffer2, strlen(buffer2), sizeof(buffer2)); sprintf(buffer, "%.250s\r\n", buffer2); break; case AUTH_PLAIN: @@ -120,128 +120,123 @@ int32_t start_nntp(int32_t s, char *ip, int32_t port, unsigned char options, cha break; #ifdef LIBOPENSSL - case AUTH_CRAMMD5:{ - int32_t rc = 0; - char *preplogin; + case AUTH_CRAMMD5: { + int32_t rc = 0; + char *preplogin; - rc = sasl_saslprep(login, SASL_ALLOW_UNASSIGNED, &preplogin); - if (rc) { - return 3; - } - - sprintf(buffer, "AUTHINFO SASL CRAM-MD5\r\n"); - if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { - return 1; - } - //get the one-time BASE64 encoded challenge - if ((buf = hydra_receive_line(s)) == NULL) - return 1; - if (buf == NULL || strstr(buf, "383") == NULL) { - hydra_report(stderr, "[ERROR] NNTP CRAM-MD5 AUTH : %s\n", buf); - free(buf); - return 3; - } - - memset(buffer, 0, sizeof(buffer)); - from64tobits((char *) buffer, buf + 4); - free(buf); - - memset(buffer2, 0, sizeof(buffer2)); - sasl_cram_md5(buffer2, pass, buffer); - - sprintf(buffer, "%s %.250s", preplogin, buffer2); - hydra_tobase64((unsigned char *) buffer, strlen(buffer), sizeof(buffer)); - - char tmp_buffer[sizeof(buffer)]; - sprintf(tmp_buffer, "%.250s\r\n", buffer); - strcpy(buffer, tmp_buffer); - free(preplogin); + rc = sasl_saslprep(login, SASL_ALLOW_UNASSIGNED, &preplogin); + if (rc) { + return 3; } - break; - case AUTH_DIGESTMD5:{ - sprintf(buffer, "AUTHINFO SASL DIGEST-MD5\r\n"); - - if (hydra_send(s, buffer, strlen(buffer), 0) < 0) - return 1; - //receive - if ((buf = hydra_receive_line(s)) == NULL) - return 1; - if (buf == NULL || strstr(buf, "383") == NULL || strlen(buf) < 8) { - hydra_report(stderr, "[ERROR] NNTP DIGEST-MD5 AUTH : %s\n", buf); - free(buf); - return 3; - } - memset(buffer, 0, sizeof(buffer)); - from64tobits((char *) buffer, buf + 4); - free(buf); - - if (debug) - hydra_report(stderr, "DEBUG S: %s\n", buffer); - fooptr = buffer2; - sasl_digest_md5(fooptr, login, pass, buffer, miscptr, "nntp", NULL, 0, NULL); - if (fooptr == NULL) - return 3; - - if (debug) - hydra_report(stderr, "DEBUG C: %s\n", buffer2); - hydra_tobase64((unsigned char *) buffer2, strlen(buffer2), sizeof(buffer2)); - sprintf(buffer, "%s\r\n", buffer2); + sprintf(buffer, "AUTHINFO SASL CRAM-MD5\r\n"); + if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { + return 1; } - break; + // get the one-time BASE64 encoded challenge + if ((buf = hydra_receive_line(s)) == NULL) + return 1; + if (buf == NULL || strstr(buf, "383") == NULL) { + hydra_report(stderr, "[ERROR] NNTP CRAM-MD5 AUTH : %s\n", buf); + free(buf); + return 3; + } + + memset(buffer, 0, sizeof(buffer)); + from64tobits((char *)buffer, buf + 4); + free(buf); + + memset(buffer2, 0, sizeof(buffer2)); + sasl_cram_md5(buffer2, pass, buffer); + + sprintf(buffer, "%s %.250s", preplogin, buffer2); + hydra_tobase64((unsigned char *)buffer, strlen(buffer), sizeof(buffer)); + + char tmp_buffer[sizeof(buffer)]; + sprintf(tmp_buffer, "%.250s\r\n", buffer); + strcpy(buffer, tmp_buffer); + free(preplogin); + } break; + + case AUTH_DIGESTMD5: { + sprintf(buffer, "AUTHINFO SASL DIGEST-MD5\r\n"); + + if (hydra_send(s, buffer, strlen(buffer), 0) < 0) + return 1; + // receive + if ((buf = hydra_receive_line(s)) == NULL) + return 1; + if (buf == NULL || strstr(buf, "383") == NULL || strlen(buf) < 8) { + hydra_report(stderr, "[ERROR] NNTP DIGEST-MD5 AUTH : %s\n", buf); + free(buf); + return 3; + } + memset(buffer, 0, sizeof(buffer)); + from64tobits((char *)buffer, buf + 4); + free(buf); + + if (debug) + hydra_report(stderr, "DEBUG S: %s\n", buffer); + fooptr = buffer2; + sasl_digest_md5(fooptr, login, pass, buffer, miscptr, "nntp", NULL, 0, NULL); + if (fooptr == NULL) + return 3; + + if (debug) + hydra_report(stderr, "DEBUG C: %s\n", buffer2); + hydra_tobase64((unsigned char *)buffer2, strlen(buffer2), sizeof(buffer2)); + sprintf(buffer, "%s\r\n", buffer2); + } break; #endif - case AUTH_NTLM:{ - unsigned char buf1[4096]; - unsigned char buf2[4096]; + case AUTH_NTLM: { + unsigned char buf1[4096]; + unsigned char buf2[4096]; - //send auth and receive challenge - buildAuthRequest((tSmbNtlmAuthRequest *) buf2, 0, NULL, NULL); - to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthRequest *) buf2)); - sprintf(buffer, "AUTHINFO SASL NTLM %s\r\n", (char *) buf1); - if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { - return 1; - } - if ((buf = hydra_receive_line(s)) == NULL) - return 1; - if (buf == NULL || strstr(buf, "383") == NULL || strlen(buf) < 8) { - hydra_report(stderr, "[ERROR] NNTP NTLM AUTH : %s\n", buf); - free(buf); - return 3; - } - //recover challenge - from64tobits((char *) buf1, buf + 4); - free(buf); - - buildAuthResponse((tSmbNtlmAuthChallenge *) buf1, (tSmbNtlmAuthResponse *) buf2, 0, login, pass, NULL, NULL); - to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthResponse *) buf2)); - sprintf(buffer, "%s\r\n", (char *) buf1); + // send auth and receive challenge + buildAuthRequest((tSmbNtlmAuthRequest *)buf2, 0, NULL, NULL); + to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthRequest *)buf2)); + sprintf(buffer, "AUTHINFO SASL NTLM %s\r\n", (char *)buf1); + if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { + return 1; } - break; - - default:{ - sprintf(buffer, "AUTHINFO USER %.250s\r\n", login); - - if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { - return 1; - } - buf = hydra_receive_line(s); - if (buf == NULL) - return 1; - if (buf[0] != '3') { - if (verbose || debug) - hydra_report(stderr, "[ERROR] Not an NNTP protocol or service shutdown: %s\n", buf); - free(buf); - return (3); - } + if ((buf = hydra_receive_line(s)) == NULL) + return 1; + if (buf == NULL || strstr(buf, "383") == NULL || strlen(buf) < 8) { + hydra_report(stderr, "[ERROR] NNTP NTLM AUTH : %s\n", buf); free(buf); - sprintf(buffer, "AUTHINFO PASS %.250s\r\n", pass); + return 3; } - break; + // recover challenge + from64tobits((char *)buf1, buf + 4); + free(buf); + + buildAuthResponse((tSmbNtlmAuthChallenge *)buf1, (tSmbNtlmAuthResponse *)buf2, 0, login, pass, NULL, NULL); + to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthResponse *)buf2)); + sprintf(buffer, "%s\r\n", (char *)buf1); + } break; + + default: { + sprintf(buffer, "AUTHINFO USER %.250s\r\n", login); + + if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { + return 1; + } + buf = hydra_receive_line(s); + if (buf == NULL) + return 1; + if (buf[0] != '3') { + if (verbose || debug) + hydra_report(stderr, "[ERROR] Not an NNTP protocol or service shutdown: %s\n", buf); + free(buf); + return (3); + } + free(buf); + sprintf(buffer, "AUTHINFO PASS %.250s\r\n", pass); + } break; } - if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { return 1; } @@ -266,7 +261,7 @@ int32_t start_nntp(int32_t s, char *ip, int32_t port, unsigned char options, cha return 2; } -void service_nntp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_nntp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t i = 0, run = 1, next_run = 1, sock = -1; int32_t myport = PORT_NNTP, mysslport = PORT_NNTP_SSL, disable_tls = 0; char *buffer1 = "CAPABILITIES\r\n"; @@ -276,10 +271,10 @@ void service_nntp(char *ip, int32_t sp, unsigned char options, char *miscptr, FI return; while (1) { switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ if (sock >= 0) sock = hydra_disconnect(sock); -// usleepn(300); + // usleepn(300); if ((options & OPTION_SSL) == 0) { if (port != 0) myport = port; @@ -293,12 +288,12 @@ void service_nntp(char *ip, int32_t sp, unsigned char options, char *miscptr, FI } if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } -// usleepn(300); + // usleepn(300); buf = hydra_receive_line(sock); - if (buf == NULL || buf[0] != '2') { /* check the first line */ + if (buf == NULL || buf[0] != '2') { /* check the first line */ if (verbose || debug) hydra_report(stderr, "[ERROR] Not an NNTP protocol or service shutdown: %s\n", buf); hydra_child_exit(2); @@ -352,10 +347,10 @@ void service_nntp(char *ip, int32_t sp, unsigned char options, char *miscptr, FI } #endif -/* -AUTHINFO USER SASL -SASL PLAIN DIGEST-MD5 LOGIN NTLM CRAM-MD5 -*/ + /* + AUTHINFO USER SASL + SASL PLAIN DIGEST-MD5 LOGIN NTLM CRAM-MD5 + */ #ifdef HAVE_PCRE if (hydra_string_match(buf, "SASL\\s.*NTLM")) { @@ -405,7 +400,7 @@ SASL PLAIN DIGEST-MD5 LOGIN NTLM CRAM-MD5 if ((miscptr != NULL) && (strlen(miscptr) > 0)) { for (i = 0; i < strlen(miscptr); i++) - miscptr[i] = (char) toupper((int32_t) miscptr[i]); + miscptr[i] = (char)toupper((int32_t)miscptr[i]); if (strncmp(miscptr, "USER", 4) == 0) nntp_auth_mechanism = AUTH_CLEAR; @@ -426,7 +421,6 @@ SASL PLAIN DIGEST-MD5 LOGIN NTLM CRAM-MD5 if (strncmp(miscptr, "NTLM", 4) == 0) nntp_auth_mechanism = AUTH_NTLM; - } if (verbose) { switch (nntp_auth_mechanism) { @@ -456,10 +450,10 @@ SASL PLAIN DIGEST-MD5 LOGIN NTLM CRAM-MD5 free(buf); next_run = 2; break; - case 2: /* run the cracking function */ + case 2: /* run the cracking function */ next_run = start_nntp(sock, ip, port, options, miscptr, fp); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); @@ -472,13 +466,13 @@ SASL PLAIN DIGEST-MD5 LOGIN NTLM CRAM-MD5 } } -int32_t service_nntp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_nntp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here @@ -486,6 +480,7 @@ int32_t service_nntp_init(char *ip, int32_t sp, unsigned char options, char *mis return 0; } -void usage_nntp(const char* service) { - printf("Module nntp is optionally taking one authentication type of:\n" " USER (default), LOGIN, PLAIN, CRAM-MD5, DIGEST-MD5, NTLM\n\n"); +void usage_nntp(const char *service) { + printf("Module nntp is optionally taking one authentication type of:\n" + " USER (default), LOGIN, PLAIN, CRAM-MD5, DIGEST-MD5, NTLM\n\n"); } diff --git a/hydra-oracle-listener.c b/hydra-oracle-listener.c index 4f32997..e6b77ec 100644 --- a/hydra-oracle-listener.c +++ b/hydra-oracle-listener.c @@ -13,9 +13,7 @@ at http://marcellmajor.com/frame_listenerhash.html #include "hydra-mod.h" #ifndef LIBOPENSSL #include -void dummy_oracle_listener() { - printf("\n"); -} +void dummy_oracle_listener() { printf("\n"); } #else #include "sasl.h" #include @@ -31,7 +29,7 @@ int32_t initial_permutation(unsigned char **result, char *p_str, int32_t *sz) { int32_t i = strlen(p_str); char *buff; - //expand the string with zero so that length is a multiple of 4 + // expand the string with zero so that length is a multiple of 4 while ((i % 4) != 0) { i = i + 1; } @@ -44,14 +42,14 @@ int32_t initial_permutation(unsigned char **result, char *p_str, int32_t *sz) { memset(buff, 0, i + 4); strcpy(buff, p_str); - //swap the order of every byte pair + // swap the order of every byte pair for (k = 0; k < i; k += 2) { char bck = buff[k + 1]; buff[k + 1] = buff[k]; buff[k] = bck; } - //convert to unicode + // convert to unicode if ((*result = malloc(2 * i)) == NULL) { hydra_report(stderr, "[ERROR] Can't allocate memory\n"); free(buff); @@ -75,7 +73,7 @@ int32_t ora_hash(unsigned char **orahash, unsigned char *buf, int32_t len) { } for (i = 0; i < 8; i++) { - sprintf(((char *) *orahash) + i * 2, "%02X", buf[len - 8 + i]); + sprintf(((char *)*orahash) + i * 2, "%02X", buf[len - 8 + i]); } return 0; } @@ -106,8 +104,8 @@ int32_t ora_descrypt(unsigned char **rs, unsigned char *result, int32_t siz) { int32_t i = 0; char lastkey[8]; DES_key_schedule ks1; - unsigned char key1[8] = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF }; - unsigned char ivec1[] = { 0, 0, 0, 0, 0, 0, 0, 0 }; + unsigned char key1[8] = {0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF}; + unsigned char ivec1[] = {0, 0, 0, 0, 0, 0, 0, 0}; unsigned char *desresult; memset(ivec1, 0, sizeof(ivec1)); @@ -115,14 +113,14 @@ int32_t ora_descrypt(unsigned char **rs, unsigned char *result, int32_t siz) { hydra_report(stderr, "[ERROR] Can't allocate memory\n"); return 1; } - DES_key_sched((const_DES_cblock *) key1, &ks1); + DES_key_sched((const_DES_cblock *)key1, &ks1); DES_ncbc_encrypt(result, desresult, siz, &ks1, &ivec1, DES_ENCRYPT); for (i = 0; i < 8; i++) { lastkey[i] = desresult[siz - 8 + i]; } - DES_key_sched((const_DES_cblock *) lastkey, &ks1); + DES_key_sched((const_DES_cblock *)lastkey, &ks1); memset(desresult, 0, siz); memset(ivec1, 0, sizeof(ivec1)); DES_ncbc_encrypt(result, desresult, siz, &ks1, &ivec1, DES_ENCRYPT); @@ -146,7 +144,7 @@ int32_t ora_hash_password(char *pass) { memset(buff, 0, sizeof(buff)); - //concatenate Arb string and convert the resulting string to uppercase + // concatenate Arb string and convert the resulting string to uppercase snprintf(buff, sizeof(buff), "Arb%s", pass); strupper(buff); @@ -179,13 +177,11 @@ int32_t ora_hash_password(char *pass) { return 0; } -int32_t start_oracle_listener(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { - unsigned char tns_packet_begin[22] = { - "\x00\x00\x01\x00\x00\x00\x01\x36\x01\x2c\x00\x00\x08\x00\x7f\xff\x86\x0e\x00\x00\x01\x00" - }; - unsigned char tns_packet_end[32] = { - "\x00\x3a\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x09\x94\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00" - }; +int32_t start_oracle_listener(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { + unsigned char tns_packet_begin[22] = {"\x00\x00\x01\x00\x00\x00\x01\x36\x01\x2c\x00\x00\x08\x00\x7f\xff\x86\x0e" + "\x00\x00\x01\x00"}; + unsigned char tns_packet_end[32] = {"\x00\x3a\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x09\x94\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00"}; char *empty = ""; char *pass; @@ -210,9 +206,12 @@ int32_t start_oracle_listener(int32_t s, char *ip, int32_t port, unsigned char o free(hash); return 1; } - pass = (char *) hash; + pass = (char *)hash; } - snprintf(connect_string, sizeof(connect_string), "(DESCRIPTION=(CONNECT_DATA=(CID=(PROGRAM=))(COMMAND=reload)(PASSWORD=%s)(SERVICE=)(VERSION=169869568)))", pass); + snprintf(connect_string, sizeof(connect_string), + "(DESCRIPTION=(CONNECT_DATA=(CID=(PROGRAM=))(COMMAND=reload)(" + "PASSWORD=%s)(SERVICE=)(VERSION=169869568)))", + pass); if (hash != NULL) free(hash); @@ -226,7 +225,7 @@ int32_t start_oracle_listener(int32_t s, char *ip, int32_t port, unsigned char o } else { buffer2[1] = siz; } - memcpy(buffer2 + 2, (char *) tns_packet_begin, sizeof(tns_packet_begin)); + memcpy(buffer2 + 2, (char *)tns_packet_begin, sizeof(tns_packet_begin)); siz = strlen(connect_string); if (siz > 255) { buffer2[2 + sizeof(tns_packet_begin)] = 1; @@ -234,7 +233,7 @@ int32_t start_oracle_listener(int32_t s, char *ip, int32_t port, unsigned char o } else { buffer2[1 + 2 + sizeof(tns_packet_begin)] = siz; } - memcpy(buffer2 + 2 + sizeof(tns_packet_begin) + 2, (char *) tns_packet_end, sizeof(tns_packet_end)); + memcpy(buffer2 + 2 + sizeof(tns_packet_begin) + 2, (char *)tns_packet_end, sizeof(tns_packet_end)); memcpy(buffer2 + 2 + sizeof(tns_packet_begin) + 2 + sizeof(tns_packet_end), connect_string, strlen(connect_string)); if (hydra_send(s, buffer2, 2 + sizeof(tns_packet_begin) + 2 + sizeof(tns_packet_end) + strlen(connect_string), 0) < 0) { return 1; @@ -257,7 +256,7 @@ int32_t start_oracle_listener(int32_t s, char *ip, int32_t port, unsigned char o return 1; } -void service_oracle_listener(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_oracle_listener(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_ORACLE, mysslport = PORT_ORACLE_SSL; @@ -283,10 +282,10 @@ void service_oracle_listener(char *ip, int32_t sp, unsigned char options, char * while (1) { switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ if (sock >= 0) sock = hydra_disconnect(sock); -// usleepn(300); + // usleepn(300); if ((options & OPTION_SSL) == 0) { if (port != 0) myport = port; @@ -300,13 +299,13 @@ void service_oracle_listener(char *ip, int32_t sp, unsigned char options, char * } if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } /* run the cracking function */ next_run = start_oracle_listener(sock, ip, port, options, miscptr, fp); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); @@ -324,13 +323,13 @@ void service_oracle_listener(char *ip, int32_t sp, unsigned char options, char * } } -int32_t service_oracle_listener_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_oracle_listener_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here @@ -338,8 +337,9 @@ int32_t service_oracle_listener_init(char *ip, int32_t sp, unsigned char options return 0; } -void usage_oracle_listener(const char* service) { - printf("Module oracle-listener / tns is optionally taking the mode the password is stored as, could be PLAIN (default) or CLEAR\n\n"); +void usage_oracle_listener(const char *service) { + printf("Module oracle-listener / tns is optionally taking the mode the " + "password is stored as, could be PLAIN (default) or CLEAR\n\n"); } #endif diff --git a/hydra-oracle-sid.c b/hydra-oracle-sid.c index 7570379..c2db73a 100644 --- a/hydra-oracle-sid.c +++ b/hydra-oracle-sid.c @@ -11,9 +11,7 @@ find a big list on the Internet #include "hydra-mod.h" #ifndef LIBOPENSSL #include -void dummy_oracle_sid() { - printf("\n"); -} +void dummy_oracle_sid() { printf("\n"); } #else #include #define HASHSIZE 16 @@ -22,19 +20,16 @@ extern char *HYDRA_EXIT; char *buf; unsigned char *hash; - -int32_t start_oracle_sid(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_oracle_sid(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { /* PP is the packet length XX is the length of connect data PP + tns_packet_begin + XX + tns_packet_end */ - unsigned char tns_packet_begin[22] = { - "\x00\x00\x01\x00\x00\x00\x01\x36\x01\x2c\x00\x00\x08\x00\x7f\xff\x86\x0e\x00\x00\x01\x00" - }; - unsigned char tns_packet_end[32] = { - "\x00\x3a\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x09\x94\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00" - }; + unsigned char tns_packet_begin[22] = {"\x00\x00\x01\x00\x00\x00\x01\x36\x01\x2c\x00\x00\x08\x00\x7f\xff\x86\x0e" + "\x00\x00\x01\x00"}; + unsigned char tns_packet_end[32] = {"\x00\x3a\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x09\x94\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00"}; char *empty = ""; char *login; char connect_string[200]; @@ -47,8 +42,10 @@ int32_t start_oracle_sid(int32_t s, char *ip, int32_t port, unsigned char option if (strlen(login = hydra_get_next_login()) == 0) login = empty; - snprintf(connect_string, sizeof(connect_string), "(DESCRIPTION=(CONNECT_DATA=(SID=%s)(CID=(PROGRAM=)(HOST=__jdbc__)(USER=)))(ADDRESS=(PROTOCOL=tcp)(HOST=%s)(PORT=%d)))", login, - hydra_address2string(ip), port); + snprintf(connect_string, sizeof(connect_string), + "(DESCRIPTION=(CONNECT_DATA=(SID=%s)(CID=(PROGRAM=)(HOST=__jdbc__)(" + "USER=)))(ADDRESS=(PROTOCOL=tcp)(HOST=%s)(PORT=%d)))", + login, hydra_address2string(ip), port); siz = 2 + sizeof(tns_packet_begin) + 2 + sizeof(tns_packet_end) + strlen(connect_string); if (siz > 255) { buffer2[0] = 1; @@ -56,7 +53,7 @@ int32_t start_oracle_sid(int32_t s, char *ip, int32_t port, unsigned char option } else { buffer2[1] = siz; } - memcpy(buffer2 + 2, (char *) tns_packet_begin, sizeof(tns_packet_begin)); + memcpy(buffer2 + 2, (char *)tns_packet_begin, sizeof(tns_packet_begin)); siz = strlen(connect_string); if (siz > 255) { buffer2[2 + sizeof(tns_packet_begin)] = 1; @@ -64,7 +61,7 @@ int32_t start_oracle_sid(int32_t s, char *ip, int32_t port, unsigned char option } else { buffer2[1 + 2 + sizeof(tns_packet_begin)] = siz; } - memcpy(buffer2 + 2 + sizeof(tns_packet_begin) + 2, (char *) tns_packet_end, sizeof(tns_packet_end)); + memcpy(buffer2 + 2 + sizeof(tns_packet_begin) + 2, (char *)tns_packet_end, sizeof(tns_packet_end)); memcpy(buffer2 + 2 + sizeof(tns_packet_begin) + 2 + sizeof(tns_packet_end), connect_string, strlen(connect_string)); if (hydra_send(s, buffer2, 2 + sizeof(tns_packet_begin) + 2 + sizeof(tns_packet_end) + strlen(connect_string), 0) < 0) { return 1; @@ -72,7 +69,8 @@ int32_t start_oracle_sid(int32_t s, char *ip, int32_t port, unsigned char option if ((buf = hydra_receive_line(s)) == NULL) return 1; - //if no error reported. it should be a resend packet type 00 08 00 00 0b 00 00 00, 4 is refuse + // if no error reported. it should be a resend packet type 00 08 00 00 0b 00 + // 00 00, 4 is refuse if ((strstr(buf, "ERR=") == NULL) && (buf[4] != 4)) { hydra_report_found_host(port, ip, "oracle-sid", fp); hydra_completed_pair_found(); @@ -85,7 +83,7 @@ int32_t start_oracle_sid(int32_t s, char *ip, int32_t port, unsigned char option return 1; } -void service_oracle_sid(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_oracle_sid(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_ORACLE, mysslport = PORT_ORACLE_SSL; @@ -94,10 +92,10 @@ void service_oracle_sid(char *ip, int32_t sp, unsigned char options, char *miscp return; while (1) { switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ if (sock >= 0) sock = hydra_disconnect(sock); -// usleepn(300); + // usleepn(300); if ((options & OPTION_SSL) == 0) { if (port != 0) myport = port; @@ -110,13 +108,13 @@ void service_oracle_sid(char *ip, int32_t sp, unsigned char options, char *miscp port = mysslport; } if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } /* run the cracking function */ next_run = start_oracle_sid(sock, ip, port, options, miscptr, fp); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); @@ -134,13 +132,13 @@ void service_oracle_sid(char *ip, int32_t sp, unsigned char options, char *miscp } } -int32_t service_oracle_sid_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_oracle_sid_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here diff --git a/hydra-oracle.c b/hydra-oracle.c index e598401..e132b81 100644 --- a/hydra-oracle.c +++ b/hydra-oracle.c @@ -4,8 +4,8 @@ david: code is based on SNORT spo_database.c tested with : -instantclient_10_2 on Oracle 10.2.0 --instantclient-basic-linux.*-11.2.0.3.0.zip + instantclient-sdk-linux.*-11.2.0.3.0.zip -on Oracle 9i and on Oracle 11g +-instantclient-basic-linux.*-11.2.0.3.0.zip + +instantclient-sdk-linux.*-11.2.0.3.0.zip on Oracle 9i and on Oracle 11g */ @@ -13,9 +13,7 @@ on Oracle 9i and on Oracle 11g #ifndef LIBORACLE -void dummy_oracle() { - printf("\n"); -} +void dummy_oracle() { printf("\n"); } #else @@ -40,7 +38,7 @@ void print_oracle_error(char *err) { } } -int32_t start_oracle(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_oracle(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, *pass, buffer[200], sid[100]; @@ -55,14 +53,17 @@ int32_t start_oracle(int32_t s, char *ip, int32_t port, unsigned char options, c /* - To use the Easy Connect naming method, PHP must be linked with Oracle 10g or greater Client libraries. - The Easy Connect string for Oracle 10g is of the form: [//]host_name[:port][/service_name]. - With Oracle 11g, the syntax is: [//]host_name[:port][/service_name][:server_type][/instance_name]. - Service names can be found by running the Oracle utility lsnrctl status on the database server machine. + To use the Easy Connect naming method, PHP must be linked with Oracle 10g + or greater Client libraries. The Easy Connect string for Oracle 10g is of + the form: [//]host_name[:port][/service_name]. With Oracle 11g, the syntax + is: [//]host_name[:port][/service_name][:server_type][/instance_name]. + Service names can be found by running the Oracle utility lsnrctl status on + the database server machine. - The tnsnames.ora file can be in the Oracle Net search path, which includes $ORACLE_HOME/network/admin - and /etc. Alternatively set TNS_ADMIN so that $TNS_ADMIN/tnsnames.ora is read. Make sure the web - daemon has read access to the file. + The tnsnames.ora file can be in the Oracle Net search path, which includes + $ORACLE_HOME/network/admin and /etc. Alternatively set TNS_ADMIN so that + $TNS_ADMIN/tnsnames.ora is read. Make sure the web daemon has read access + to the file. */ @@ -78,26 +79,28 @@ int32_t start_oracle(int32_t s, char *ip, int32_t port, unsigned char options, c print_oracle_error("OCIEnvInit 2"); return 4; } - if (OCIHandleAlloc(o_environment, (dvoid **) & o_error, OCI_HTYPE_ERROR, (size_t) 0, NULL)) { + if (OCIHandleAlloc(o_environment, (dvoid **)&o_error, OCI_HTYPE_ERROR, (size_t)0, NULL)) { print_oracle_error("OCIHandleAlloc"); return 4; } - if (OCILogon(o_environment, o_error, &o_servicecontext, (const OraText *) login, strlen(login), (const OraText *) pass, strlen(pass), (const OraText *) buffer, strlen(buffer))) { + if (OCILogon(o_environment, o_error, &o_servicecontext, (const OraText *)login, strlen(login), (const OraText *)pass, strlen(pass), (const OraText *)buffer, strlen(buffer))) { OCIErrorGet(o_error, 1, NULL, &o_errorcode, o_errormsg, sizeof(o_errormsg), OCI_HTYPE_ERROR); - //database: oracle_error: ORA-01017: invalid username/password; logon denied - //database: oracle_error: ORA-12514: TNS:listener does not currently know of service requested in connect descriptor - //database: oracle_error: ORA-28000: the account is locked - //Failed login attempts is set to 10 by default + // database: oracle_error: ORA-01017: invalid username/password; logon + // denied database: oracle_error: ORA-12514: TNS:listener does not currently + // know of service requested in connect descriptor database: oracle_error: + // ORA-28000: the account is locked Failed login attempts is set to 10 by + // default if (verbose) { hydra_report(stderr, "[VERBOSE] database: oracle_error: %s\n", o_errormsg); } - if (strstr((const char *) o_errormsg, "ORA-12514") != NULL) { - hydra_report(stderr, "[ERROR] ORACLE SID is not valid, you should try to enumerate them.\n"); + if (strstr((const char *)o_errormsg, "ORA-12514") != NULL) { + hydra_report(stderr, "[ERROR] ORACLE SID is not valid, you should try to " + "enumerate them.\n"); hydra_completed_pair(); return 3; } - if (strstr((const char *) o_errormsg, "ORA-28000") != NULL) { + if (strstr((const char *)o_errormsg, "ORA-28000") != NULL) { hydra_report(stderr, "[INFO] ORACLE account %s is locked.\n", login); hydra_completed_pair_skip(); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -106,15 +109,14 @@ int32_t start_oracle(int32_t s, char *ip, int32_t port, unsigned char options, c } if (o_error) { - OCIHandleFree((dvoid *) o_error, OCI_HTYPE_ERROR); + OCIHandleFree((dvoid *)o_error, OCI_HTYPE_ERROR); } hydra_completed_pair(); - //by default, set in sqlnet.ora, the trace file is generated in pwd to log any errors happening, - //as we don't care, we are deleting the file - //set these parameters to not generate the file - //LOG_DIRECTORY_CLIENT = /dev/null - //LOG_FILE_CLIENT = /dev/null + // by default, set in sqlnet.ora, the trace file is generated in pwd to log + // any errors happening, as we don't care, we are deleting the file set + // these parameters to not generate the file LOG_DIRECTORY_CLIENT = + // /dev/null LOG_FILE_CLIENT = /dev/null if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) return 3; @@ -122,7 +124,7 @@ int32_t start_oracle(int32_t s, char *ip, int32_t port, unsigned char options, c } else { OCILogoff(o_servicecontext, o_error); if (o_error) { - OCIHandleFree((dvoid *) o_error, OCI_HTYPE_ERROR); + OCIHandleFree((dvoid *)o_error, OCI_HTYPE_ERROR); } hydra_report_found_host(port, ip, "oracle", fp); hydra_completed_pair_found(); @@ -132,7 +134,7 @@ int32_t start_oracle(int32_t s, char *ip, int32_t port, unsigned char options, c return 1; } -void service_oracle(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_oracle(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_ORACLE; @@ -141,14 +143,14 @@ void service_oracle(char *ip, int32_t sp, unsigned char options, char *miscptr, return; if ((miscptr == NULL) || (strlen(miscptr) == 0)) { - //SID is required as miscptr + // SID is required as miscptr hydra_report(stderr, "[ERROR] Oracle SID is required, using ORCL as default\n"); miscptr = "ORCL"; } while (1) { switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ if (sock >= 0) sock = hydra_disconnect(sock); if (port != 0) @@ -158,7 +160,7 @@ void service_oracle(char *ip, int32_t sp, unsigned char options, char *miscptr, if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } next_run = 2; @@ -167,7 +169,7 @@ void service_oracle(char *ip, int32_t sp, unsigned char options, char *miscptr, next_run = start_oracle(sock, ip, port, options, miscptr, fp); hydra_child_exit(0); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); unlink("sqlnet.log"); @@ -183,13 +185,13 @@ void service_oracle(char *ip, int32_t sp, unsigned char options, char *miscptr, #endif -int32_t service_oracle_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_oracle_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here @@ -197,6 +199,7 @@ int32_t service_oracle_init(char *ip, int32_t sp, unsigned char options, char *m return 0; } -void usage_oracle(const char* service) { - printf("Module oracle / ora is optionally taking the ORACLE SID, default is \"ORCL\"\n\n"); +void usage_oracle(const char *service) { + printf("Module oracle / ora is optionally taking the ORACLE SID, default is " + "\"ORCL\"\n\n"); } diff --git a/hydra-pcanywhere.c b/hydra-pcanywhere.c index 483e6fd..ea450e1 100644 --- a/hydra-pcanywhere.c +++ b/hydra-pcanywhere.c @@ -1,6 +1,6 @@ -//This plugin was written by +// This plugin was written by // -//PC-Anywhere authentication protocol test on Symantec PC-Anywhere 10.5 +// PC-Anywhere authentication protocol test on Symantec PC-Anywhere 10.5 // // no memleaks found on 110425 @@ -71,7 +71,6 @@ void pca_encrypt(char *cleartxt) { passwd[strlen(passwd)] = '\0'; strcpy(cleartxt, passwd); } - } void pca_decrypt(char *password) { @@ -92,7 +91,7 @@ void debugprintf(char *msg) { printf("debug: %s\n", msg); } -int32_t start_pcanywhere(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_pcanywhere(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, *pass; char buffer[2048] = ""; @@ -119,7 +118,6 @@ int32_t start_pcanywhere(int32_t s, char *ip, int32_t port, unsigned char option server[3] = "Enter login name"; server[4] = "denying connection"; - if (strlen(login = hydra_get_next_login()) == 0) login = empty; if (strlen(pass = hydra_get_next_password()) == 0) @@ -158,13 +156,15 @@ int32_t start_pcanywhere(int32_t s, char *ip, int32_t port, unsigned char option if (i == 0 || i == 3) clean_buffer(buffer, ret); - if (debug) show_buffer(buffer, ret); + if (debug) + show_buffer(buffer, ret); if (i == 2) { clean_buffer(buffer, ret); buffer[sizeof(buffer) - 1] = 0; if (strstr(buffer, server[i + 2]) != NULL) { - fprintf(stderr, "[ERROR] PC Anywhere host denying connection because you have requested a lower encrypt level\n"); + fprintf(stderr, "[ERROR] PC Anywhere host denying connection because " + "you have requested a lower encrypt level\n"); return 3; } } @@ -224,7 +224,7 @@ int32_t start_pcanywhere(int32_t s, char *ip, int32_t port, unsigned char option return 1; } -void service_pcanywhere(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_pcanywhere(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_PCANYWHERE, mysslport = PORT_PCANYWHERE_SSL; @@ -233,9 +233,8 @@ void service_pcanywhere(char *ip, int32_t sp, unsigned char options, char *miscp return; while (1) { - switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ if (sock >= 0) sock = hydra_disconnect(sock); usleepn(275); @@ -251,7 +250,8 @@ void service_pcanywhere(char *ip, int32_t sp, unsigned char options, char *miscp port = mysslport; } if (sock < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + if (quiet != 1) + fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } @@ -278,13 +278,13 @@ void service_pcanywhere(char *ip, int32_t sp, unsigned char options, char *miscp } } -int32_t service_pcanywhere_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_pcanywhere_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here diff --git a/hydra-pcnfs.c b/hydra-pcnfs.c index dc9e41a..3f9a963 100644 --- a/hydra-pcnfs.c +++ b/hydra-pcnfs.c @@ -5,11 +5,11 @@ extern char *HYDRA_EXIT; char *buf; -#define LEN_HDR_RPC 24 -#define LEN_AUTH_UNIX 72+12 +#define LEN_HDR_RPC 24 +#define LEN_AUTH_UNIX 72 + 12 /* RPC common hdr */ -struct rpc_hdr { /* 24 */ +struct rpc_hdr { /* 24 */ unsigned long xid; unsigned long type_msg; unsigned long version_rpc; @@ -29,11 +29,11 @@ struct pr_auth_args { char comments[255]; }; -#define LEN_HDR_PCN_AUTH sizeof(struct pr_auth_args) +#define LEN_HDR_PCN_AUTH sizeof(struct pr_auth_args) /* Lets start ... */ -int32_t start_pcnfs(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_pcnfs(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, *pass, buffer[LEN_HDR_RPC + LEN_AUTH_UNIX + LEN_HDR_PCN_AUTH]; char *ptr, *pkt = buffer; @@ -51,22 +51,24 @@ int32_t start_pcnfs(int32_t s, char *ip, int32_t port, unsigned char options, ch memset(pkt, 0, sizeof(buffer)); - rpch = (struct rpc_hdr *) (pkt); - authp = (unsigned long *) (pkt + LEN_HDR_RPC); - prh = (struct pr_auth_args *) (pkt + LEN_HDR_RPC + LEN_AUTH_UNIX); + rpch = (struct rpc_hdr *)(pkt); + authp = (unsigned long *)(pkt + LEN_HDR_RPC); + prh = (struct pr_auth_args *)(pkt + LEN_HDR_RPC + LEN_AUTH_UNIX); rpch->xid = htonl(0x32544843); rpch->type_msg = htonl(0); rpch->version_rpc = htonl(2); rpch->prog_id = htonl(150001); rpch->prog_ver = htonl(2); - rpch->prog_proc = htonl(13); /* PCNFSD_PROC_PRAUTH */ + rpch->prog_proc = htonl(13); /* PCNFSD_PROC_PRAUTH */ prh->len_clnt = htonl(63); prh->len_id = htonl(31); prh->len_passwd = htonl(63); prh->len_comments = htonl(254); - strcpy(prh->comments, " Hydra - THC password cracker - visit https://github.com/vanhauser-thc/thc-hydra - use only allowed for legal purposes "); + strcpy(prh->comments, " Hydra - THC password cracker - visit " + "https://github.com/vanhauser-thc/thc-hydra - use only " + "allowed for legal purposes "); strcpy(prh->name, "localhost"); ptr = prh->id; @@ -82,16 +84,16 @@ int32_t start_pcnfs(int32_t s, char *ip, int32_t port, unsigned char options, ch } *ptr = 0; - gettimeofday(&tv, (struct timezone *) NULL); - *(authp) = htonl(1); /* auth unix */ - *(++authp) = htonl(LEN_AUTH_UNIX - 16); /* length auth */ - *(++authp) = htonl(tv.tv_sec); /* local time */ - *(++authp) = htonl(9); /* length host */ - strcpy((char *) ++authp, "localhost"); /* hostname */ - authp += (3); /* len(host)%4 */ - *(authp) = htonl(0); /* uid root */ - *(++authp) = htonl(0); /* gid root */ - *(++authp) = htonl(9); /* 9 gid grps */ + gettimeofday(&tv, (struct timezone *)NULL); + *(authp) = htonl(1); /* auth unix */ + *(++authp) = htonl(LEN_AUTH_UNIX - 16); /* length auth */ + *(++authp) = htonl(tv.tv_sec); /* local time */ + *(++authp) = htonl(9); /* length host */ + strcpy((char *)++authp, "localhost"); /* hostname */ + authp += (3); /* len(host)%4 */ + *(authp) = htonl(0); /* uid root */ + *(++authp) = htonl(0); /* gid root */ + *(++authp) = htonl(9); /* 9 gid grps */ /* group root, bin, daemon, sys, adm, disk, wheel, floppy, "user gid" */ *(++authp) = htonl(0); *(++authp) = htonl(1); @@ -113,7 +115,7 @@ int32_t start_pcnfs(int32_t s, char *ip, int32_t port, unsigned char options, ch return 1; } -/* analyze the output */ + /* analyze the output */ if (buf[2] != 'g' || buf[5] != 32) { fprintf(stderr, "[ERROR] RPC answer status : bad proc/version/auth\n"); free(buf); @@ -136,7 +138,7 @@ int32_t start_pcnfs(int32_t s, char *ip, int32_t port, unsigned char options, ch return 1; } -void service_pcnfs(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_pcnfs(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; hydra_register_socket(sp); @@ -155,22 +157,23 @@ void service_pcnfs(char *ip, int32_t sp, unsigned char options, char *miscptr, F while (1) { next_run = 0; switch (run) { - case 1: /* connect and service init function */ - { - if (sock >= 0) - sock = hydra_disconnect(sock); -// usleepn(275); - if ((sock = hydra_connect_udp(ip, port)) < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); - hydra_child_exit(1); - } - next_run = 2; - break; + case 1: /* connect and service init function */ + { + if (sock >= 0) + sock = hydra_disconnect(sock); + // usleepn(275); + if ((sock = hydra_connect_udp(ip, port)) < 0) { + if (quiet != 1) + fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); + hydra_child_exit(1); } - case 2: /* run the cracking function */ + next_run = 2; + break; + } + case 2: /* run the cracking function */ next_run = start_pcnfs(sock, ip, port, options, miscptr, fp); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); @@ -183,13 +186,13 @@ void service_pcnfs(char *ip, int32_t sp, unsigned char options, char *miscptr, F } } -int32_t service_pcnfs_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_pcnfs_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here diff --git a/hydra-pop3.c b/hydra-pop3.c index 91d9c48..78f29bc 100644 --- a/hydra-pop3.c +++ b/hydra-pop3.c @@ -1,12 +1,12 @@ #include "hydra-mod.h" #include "sasl.h" -//openssl s_client -starttls pop3 -crlf -connect 192.168.0.10:110 +// openssl s_client -starttls pop3 -crlf -connect 192.168.0.10:110 typedef struct pool_str { char ip[36]; - /* int32_t port;*/// not needed + /* int32_t port;*/ // not needed int32_t pop3_auth_mechanism; int32_t disable_tls; struct pool_str *next; @@ -18,7 +18,7 @@ char apop_challenge[300] = ""; pool *plist = NULL, *p = NULL; /* functions */ -int32_t service_pop3_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); +int32_t service_pop3_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); pool *list_create(pool data) { pool *p; @@ -27,7 +27,7 @@ pool *list_create(pool data) { return NULL; memcpy(p->ip, data.ip, 36); - //p->port = data.port; + // p->port = data.port; p->pop3_auth_mechanism = data.pop3_auth_mechanism; p->disable_tls = data.disable_tls; p->next = NULL; @@ -40,7 +40,7 @@ pool *list_insert(pool data) { newnode = list_create(data); newnode->next = plist; - plist = newnode->next; // to be sure! + plist = newnode->next; // to be sure! return newnode; } @@ -59,7 +59,7 @@ pool *list_find(char *ip) { /* how to know when to release the mem ? -> well, after _start has determined which pool number it is */ -int32_t list_remove(pool * node) { +int32_t list_remove(pool *node) { pool *save, *list = plist; int32_t ok = -1; @@ -88,18 +88,18 @@ char *pop3_read_server_capacity(int32_t sock) { free(buf); ptr = buf = hydra_receive_line(sock); if (buf != NULL) { + /* + exchange capa: -/* -exchange capa: + +OK + UIDL + STLS -+OK -UIDL -STLS - -*/ + */ if (strstr(buf, "\r\n.\r\n") != NULL && buf[0] == '+') { resp = 1; - /* we got the capability info then get the completed warning info from server */ + /* we got the capability info then get the completed warning info from + * server */ while (hydra_data_ready(sock)) { free(buf); buf = hydra_receive_line(sock); @@ -117,7 +117,7 @@ STLS return buf; } -int32_t start_pop3(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_pop3(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = "\"\""; char *login, *pass, buffer[500], buffer2[500], *fooptr; @@ -134,235 +134,226 @@ int32_t start_pop3(int32_t s, char *ip, int32_t port, unsigned char options, cha switch (p->pop3_auth_mechanism) { #ifdef LIBOPENSSL - case AUTH_APOP:{ - MD5_CTX c; - unsigned char md5_raw[MD5_DIGEST_LENGTH]; - int32_t i; - char *pbuffer = buffer2; + case AUTH_APOP: { + MD5_CTX c; + unsigned char md5_raw[MD5_DIGEST_LENGTH]; + int32_t i; + char *pbuffer = buffer2; - MD5_Init(&c); - MD5_Update(&c, apop_challenge, strlen(apop_challenge)); - MD5_Update(&c, pass, strlen(pass)); - MD5_Final(md5_raw, &c); + MD5_Init(&c); + MD5_Update(&c, apop_challenge, strlen(apop_challenge)); + MD5_Update(&c, pass, strlen(pass)); + MD5_Final(md5_raw, &c); - for (i = 0; i < MD5_DIGEST_LENGTH; i++) { - sprintf(pbuffer, "%02x", md5_raw[i]); - pbuffer += 2; - } - sprintf(buffer, "APOP %s %s\r\n", login, buffer2); + for (i = 0; i < MD5_DIGEST_LENGTH; i++) { + sprintf(pbuffer, "%02x", md5_raw[i]); + pbuffer += 2; } - break; + sprintf(buffer, "APOP %s %s\r\n", login, buffer2); + } break; #endif - case AUTH_LOGIN:{ - sprintf(buffer, "AUTH LOGIN\r\n"); - if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { - return 1; - } - if ((buf = hydra_receive_line(s)) == NULL) - return 4; - if (buf[0] != '+') { - hydra_report(stderr, "[ERROR] POP3 LOGIN AUTH : %s\n", buf); - free(buf); - return 3; - } - free(buf); - strcpy(buffer2, login); - hydra_tobase64((unsigned char *) buffer2, strlen(buffer2), sizeof(buffer2)); - - sprintf(buffer, "%.250s\r\n", buffer2); - if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { - return 1; - } - if ((buf = hydra_receive_line(s)) == NULL) - return 4; - - if (buf[0] != '+') { - hydra_report(stderr, "[ERROR] POP3 LOGIN AUTH : %s\n", buf); - free(buf); - return 3; - } - free(buf); - strcpy(buffer2, pass); - hydra_tobase64((unsigned char *) buffer2, strlen(buffer2), sizeof(buffer2)); - sprintf(buffer, "%.250s\r\n", buffer2); + case AUTH_LOGIN: { + sprintf(buffer, "AUTH LOGIN\r\n"); + if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { + return 1; } - break; - - case AUTH_PLAIN:{ - sprintf(buffer, "AUTH PLAIN\r\n"); - if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { - return 1; - } - if ((buf = hydra_receive_line(s)) == NULL) - return 4; - if (buf[0] != '+') { - hydra_report(stderr, "[ERROR] POP3 PLAIN AUTH : %s\n", buf); - free(buf); - return 3; - } + if ((buf = hydra_receive_line(s)) == NULL) + return 4; + if (buf[0] != '+') { + hydra_report(stderr, "[ERROR] POP3 LOGIN AUTH : %s\n", buf); free(buf); - - memset(buffer, 0, sizeof(buffer)); - sasl_plain(buffer, login, pass); - - char tmp_buffer[sizeof(buffer)]; - sprintf(tmp_buffer, "%.250s\r\n", buffer); - strcpy(buffer, tmp_buffer); + return 3; } - break; + free(buf); + strcpy(buffer2, login); + hydra_tobase64((unsigned char *)buffer2, strlen(buffer2), sizeof(buffer2)); + + sprintf(buffer, "%.250s\r\n", buffer2); + if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { + return 1; + } + if ((buf = hydra_receive_line(s)) == NULL) + return 4; + + if (buf[0] != '+') { + hydra_report(stderr, "[ERROR] POP3 LOGIN AUTH : %s\n", buf); + free(buf); + return 3; + } + free(buf); + strcpy(buffer2, pass); + hydra_tobase64((unsigned char *)buffer2, strlen(buffer2), sizeof(buffer2)); + sprintf(buffer, "%.250s\r\n", buffer2); + } break; + + case AUTH_PLAIN: { + sprintf(buffer, "AUTH PLAIN\r\n"); + if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { + return 1; + } + if ((buf = hydra_receive_line(s)) == NULL) + return 4; + if (buf[0] != '+') { + hydra_report(stderr, "[ERROR] POP3 PLAIN AUTH : %s\n", buf); + free(buf); + return 3; + } + free(buf); + + memset(buffer, 0, sizeof(buffer)); + sasl_plain(buffer, login, pass); + + char tmp_buffer[sizeof(buffer)]; + sprintf(tmp_buffer, "%.250s\r\n", buffer); + strcpy(buffer, tmp_buffer); + } break; #ifdef LIBOPENSSL case AUTH_CRAMMD5: case AUTH_CRAMSHA1: - case AUTH_CRAMSHA256:{ - int32_t rc = 0; - char *preplogin; + case AUTH_CRAMSHA256: { + int32_t rc = 0; + char *preplogin; - rc = sasl_saslprep(login, SASL_ALLOW_UNASSIGNED, &preplogin); - if (rc) { - return 3; - } + rc = sasl_saslprep(login, SASL_ALLOW_UNASSIGNED, &preplogin); + if (rc) { + return 3; + } + switch (p->pop3_auth_mechanism) { + case AUTH_CRAMMD5: + sprintf(buffer, "AUTH CRAM-MD5\r\n"); + break; + case AUTH_CRAMSHA1: + sprintf(buffer, "AUTH CRAM-SHA1\r\n"); + break; + case AUTH_CRAMSHA256: + sprintf(buffer, "AUTH CRAM-SHA256\r\n"); + break; + } + if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { + return 1; + } + // get the one-time BASE64 encoded challenge + + if ((buf = hydra_receive_line(s)) == NULL) + return 4; + if (buf[0] != '+') { switch (p->pop3_auth_mechanism) { case AUTH_CRAMMD5: - sprintf(buffer, "AUTH CRAM-MD5\r\n"); + hydra_report(stderr, "[ERROR] POP3 CRAM-MD5 AUTH : %s\n", buf); break; case AUTH_CRAMSHA1: - sprintf(buffer, "AUTH CRAM-SHA1\r\n"); + hydra_report(stderr, "[ERROR] POP3 CRAM-SHA1 AUTH : %s\n", buf); break; case AUTH_CRAMSHA256: - sprintf(buffer, "AUTH CRAM-SHA256\r\n"); + hydra_report(stderr, "[ERROR] POP3 CRAM-SHA256 AUTH : %s\n", buf); break; } - if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { - return 1; - } - //get the one-time BASE64 encoded challenge - - if ((buf = hydra_receive_line(s)) == NULL) - return 4; - if (buf[0] != '+') { - switch (p->pop3_auth_mechanism) { - case AUTH_CRAMMD5: - hydra_report(stderr, "[ERROR] POP3 CRAM-MD5 AUTH : %s\n", buf); - break; - case AUTH_CRAMSHA1: - hydra_report(stderr, "[ERROR] POP3 CRAM-SHA1 AUTH : %s\n", buf); - break; - case AUTH_CRAMSHA256: - hydra_report(stderr, "[ERROR] POP3 CRAM-SHA256 AUTH : %s\n", buf); - break; - } - free(buf); - return 3; - } - - memset(buffer, 0, sizeof(buffer)); - from64tobits((char *) buffer, buf + 2); free(buf); - - memset(buffer2, 0, sizeof(buffer2)); - - switch (p->pop3_auth_mechanism) { - case AUTH_CRAMMD5:{ - sasl_cram_md5(buffer2, pass, buffer); - sprintf(buffer, "%s %.250s", preplogin, buffer2); - } - break; - case AUTH_CRAMSHA1:{ - sasl_cram_sha1(buffer2, pass, buffer); - sprintf(buffer, "%s %.250s", preplogin, buffer2); - } - break; - case AUTH_CRAMSHA256:{ - sasl_cram_sha256(buffer2, pass, buffer); - sprintf(buffer, "%s %.250s", preplogin, buffer2); - } - break; - } - hydra_tobase64((unsigned char *) buffer, strlen(buffer), sizeof(buffer)); - - char tmp_buffer[sizeof(buffer)]; - sprintf(tmp_buffer, "%.250s\r\n", buffer); - strcpy(buffer, tmp_buffer); - free(preplogin); + return 3; } - break; - case AUTH_DIGESTMD5:{ - sprintf(buffer, "AUTH DIGEST-MD5\r\n"); + memset(buffer, 0, sizeof(buffer)); + from64tobits((char *)buffer, buf + 2); + free(buf); - if (hydra_send(s, buffer, strlen(buffer), 0) < 0) - return 1; - //receive - if ((buf = hydra_receive_line(s)) == NULL) - return 4; - if (buf[0] != '+') { - hydra_report(stderr, "[ERROR] POP3 DIGEST-MD5 AUTH : %s\n", buf); - free(buf); - return 3; - } - memset(buffer, 0, sizeof(buffer)); - from64tobits((char *) buffer, buf); + memset(buffer2, 0, sizeof(buffer2)); + + switch (p->pop3_auth_mechanism) { + case AUTH_CRAMMD5: { + sasl_cram_md5(buffer2, pass, buffer); + sprintf(buffer, "%s %.250s", preplogin, buffer2); + } break; + case AUTH_CRAMSHA1: { + sasl_cram_sha1(buffer2, pass, buffer); + sprintf(buffer, "%s %.250s", preplogin, buffer2); + } break; + case AUTH_CRAMSHA256: { + sasl_cram_sha256(buffer2, pass, buffer); + sprintf(buffer, "%s %.250s", preplogin, buffer2); + } break; + } + hydra_tobase64((unsigned char *)buffer, strlen(buffer), sizeof(buffer)); + + char tmp_buffer[sizeof(buffer)]; + sprintf(tmp_buffer, "%.250s\r\n", buffer); + strcpy(buffer, tmp_buffer); + free(preplogin); + } break; + + case AUTH_DIGESTMD5: { + sprintf(buffer, "AUTH DIGEST-MD5\r\n"); + + if (hydra_send(s, buffer, strlen(buffer), 0) < 0) + return 1; + // receive + if ((buf = hydra_receive_line(s)) == NULL) + return 4; + if (buf[0] != '+') { + hydra_report(stderr, "[ERROR] POP3 DIGEST-MD5 AUTH : %s\n", buf); free(buf); - - if (debug) - hydra_report(stderr, "[DEBUG] S: %s\n", buffer); - - fooptr = buffer2; - sasl_digest_md5(fooptr, login, pass, buffer, miscptr, "pop", NULL, 0, NULL); - if (fooptr == NULL) - return 3; - - if (debug) - hydra_report(stderr, "[DEBUG] C: %s\n", buffer2); - hydra_tobase64((unsigned char *) buffer2, strlen(buffer2), sizeof(buffer2)); - sprintf(buffer, "%s\r\n", buffer2); + return 3; } - break; + memset(buffer, 0, sizeof(buffer)); + from64tobits((char *)buffer, buf); + free(buf); + + if (debug) + hydra_report(stderr, "[DEBUG] S: %s\n", buffer); + + fooptr = buffer2; + sasl_digest_md5(fooptr, login, pass, buffer, miscptr, "pop", NULL, 0, NULL); + if (fooptr == NULL) + return 3; + + if (debug) + hydra_report(stderr, "[DEBUG] C: %s\n", buffer2); + hydra_tobase64((unsigned char *)buffer2, strlen(buffer2), sizeof(buffer2)); + sprintf(buffer, "%s\r\n", buffer2); + } break; #endif - case AUTH_NTLM:{ - unsigned char buf1[4096]; - unsigned char buf2[4096]; + case AUTH_NTLM: { + unsigned char buf1[4096]; + unsigned char buf2[4096]; - //Send auth request - sprintf(buffer, "AUTH NTLM\r\n"); + // Send auth request + sprintf(buffer, "AUTH NTLM\r\n"); - if (hydra_send(s, buffer, strlen(buffer), 0) < 0) - return 1; - //receive - if ((buf = hydra_receive_line(s)) == NULL) - return 4; - if (buf[0] != '+') { - hydra_report(stderr, "[ERROR] POP3 NTLM AUTH : %s\n", buf); - free(buf); - return 3; - } + if (hydra_send(s, buffer, strlen(buffer), 0) < 0) + return 1; + // receive + if ((buf = hydra_receive_line(s)) == NULL) + return 4; + if (buf[0] != '+') { + hydra_report(stderr, "[ERROR] POP3 NTLM AUTH : %s\n", buf); free(buf); - //send auth and receive challenge - //send auth request: lst the server send it's own hostname and domainname - buildAuthRequest((tSmbNtlmAuthRequest *) buf2, 0, NULL, NULL); - to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthRequest *) buf2)); - - sprintf(buffer, "%s\r\n", buf1); - if (hydra_send(s, buffer, strlen(buffer), 0) < 0) - return 1; - if ((buf = hydra_receive_line(s)) == NULL || strlen(buf) < 6) - return 4; - - //recover challenge - from64tobits((char *) buf1, buf + 2); - free(buf); - - //Send response - buildAuthResponse((tSmbNtlmAuthChallenge *) buf1, (tSmbNtlmAuthResponse *) buf2, 0, login, pass, NULL, NULL); - to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthResponse *) buf2)); - - sprintf(buffer, "%s\r\n", buf1); + return 3; } - break; + free(buf); + // send auth and receive challenge + // send auth request: lst the server send it's own hostname and domainname + buildAuthRequest((tSmbNtlmAuthRequest *)buf2, 0, NULL, NULL); + to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthRequest *)buf2)); + + sprintf(buffer, "%s\r\n", buf1); + if (hydra_send(s, buffer, strlen(buffer), 0) < 0) + return 1; + if ((buf = hydra_receive_line(s)) == NULL || strlen(buf) < 6) + return 4; + + // recover challenge + from64tobits((char *)buf1, buf + 2); + free(buf); + + // Send response + buildAuthResponse((tSmbNtlmAuthChallenge *)buf1, (tSmbNtlmAuthResponse *)buf2, 0, login, pass, NULL, NULL); + to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthResponse *)buf2)); + + sprintf(buffer, "%s\r\n", buf1); + } break; default: sprintf(buffer, "USER %.250s\r\n", login); if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { @@ -413,11 +404,11 @@ int32_t start_pop3(int32_t s, char *ip, int32_t port, unsigned char options, cha return 2; } -void service_pop3(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_pop3(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; char *ptr = NULL; - //extract data from the pool, ip is the key + // extract data from the pool, ip is the key if (plist == NULL) if (service_pop3_init(ip, sp, options, miscptr, fp, port, hostname) != 0) hydra_child_exit(2); @@ -433,10 +424,9 @@ void service_pop3(char *ip, int32_t sp, unsigned char options, char *miscptr, FI if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) return; - while (1) { switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ if (sock >= 0) sock = hydra_disconnect(sock); @@ -448,11 +438,11 @@ void service_pop3(char *ip, int32_t sp, unsigned char options, char *miscptr, FI } if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } buf = hydra_receive_line(sock); - if (buf == NULL || buf[0] != '+') { /* check the first line */ + if (buf == NULL || buf[0] != '+') { /* check the first line */ if (verbose || debug) hydra_report(stderr, "[ERROR] Not an POP3 protocol or service shutdown: %s\n", buf); hydra_child_exit(2); @@ -470,11 +460,13 @@ void service_pop3(char *ip, int32_t sp, unsigned char options, char *miscptr, FI #ifdef LIBOPENSSL if (!p->disable_tls) { - /* check for STARTTLS, if available we may have access to more basic auth methods */ + /* check for STARTTLS, if available we may have access to more basic + * auth methods */ hydra_send(sock, "STLS\r\n", strlen("STLS\r\n"), 0); buf = hydra_receive_line(sock); if (buf[0] != '+') { - hydra_report(stderr, "[ERROR] TLS negotiation failed, no answer received from STARTTLS request\n"); + hydra_report(stderr, "[ERROR] TLS negotiation failed, no answer " + "received from STARTTLS request\n"); } else { free(buf); if ((hydra_connect_to_ssl(sock, hostname) == -1)) { @@ -491,15 +483,15 @@ void service_pop3(char *ip, int32_t sp, unsigned char options, char *miscptr, FI next_run = 2; break; - case 2: /* run the cracking function */ + case 2: /* run the cracking function */ next_run = start_pop3(sock, ip, port, options, miscptr, fp); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); return; - case 4: /* clean exit */ + case 4: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(2); @@ -512,8 +504,7 @@ void service_pop3(char *ip, int32_t sp, unsigned char options, char *miscptr, FI } } - -int32_t service_pop3_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_pop3_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t myport = PORT_POP3, mysslport = PORT_POP3_SSL; char *ptr = NULL; int32_t sock = -1; @@ -537,11 +528,11 @@ int32_t service_pop3_init(char *ip, int32_t sp, unsigned char options, char *mis } if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] pid %d terminating, can not connect\n", (int32_t)getpid()); return -1; } buf = hydra_receive_line(sock); - if (buf == NULL || buf[0] != '+') { /* check the first line */ + if (buf == NULL || buf[0] != '+') { /* check the first line */ if (verbose || debug) hydra_report(stderr, "[ERROR] Not an POP3 protocol or service shutdown: %s\n", buf); return -1; @@ -575,7 +566,7 @@ int32_t service_pop3_init(char *ip, int32_t sp, unsigned char options, char *mis int32_t i; for (i = 0; i < strlen(miscptr); i++) - miscptr[i] = (char) toupper((int32_t) miscptr[i]); + miscptr[i] = (char)toupper((int32_t)miscptr[i]); if (strstr(miscptr, "TLS") || strstr(miscptr, "SSL") || strstr(miscptr, "STARTTLS")) { p.disable_tls = 0; @@ -584,13 +575,15 @@ int32_t service_pop3_init(char *ip, int32_t sp, unsigned char options, char *mis #ifdef LIBOPENSSL if (!p.disable_tls) { - /* check for STARTTLS, if available we may have access to more basic auth methods */ + /* check for STARTTLS, if available we may have access to more basic auth + * methods */ if (strstr(buf, "STLS") != NULL) { hydra_send(sock, "STLS\r\n", strlen("STLS\r\n"), 0); free(buf); buf = hydra_receive_line(sock); if (buf[0] != '+') { - hydra_report(stderr, "[ERROR] TLS negotiation failed, no answer received from STARTTLS request\n"); + hydra_report(stderr, "[ERROR] TLS negotiation failed, no answer " + "received from STARTTLS request\n"); } else { free(buf); if ((hydra_connect_to_ssl(sock, hostname) == -1)) { @@ -616,16 +609,16 @@ int32_t service_pop3_init(char *ip, int32_t sp, unsigned char options, char *mis } } } else - hydra_report(stderr, "[ERROR] option to use TLS/SSL failed as it is not supported by the server\n"); + hydra_report(stderr, "[ERROR] option to use TLS/SSL failed as it is not " + "supported by the server\n"); } #endif if (hydra_send(sock, quit_str, strlen(quit_str), 0) < 0) { - //we don't care if the server is not receiving the quit msg + // we don't care if the server is not receiving the quit msg } hydra_disconnect(sock); - if (verbose) hydra_report(stderr, "[VERBOSE] CAPABILITY: %s", buf); @@ -648,7 +641,8 @@ int32_t service_pop3_init(char *ip, int32_t sp, unsigned char options, char *mis which are supported. */ - /* which mean threre will *always* have a space before the LOGIN auth keyword */ + /* which mean threre will *always* have a space before the LOGIN auth keyword + */ if ((strstr(buf, " LOGIN") == NULL) && (strstr(buf, "NTLM") != NULL)) { p.pop3_auth_mechanism = AUTH_NTLM; } @@ -688,12 +682,10 @@ int32_t service_pop3_init(char *ip, int32_t sp, unsigned char options, char *mis #else p.pop3_auth_mechanism = AUTH_CLEAR; #endif - } free(buf); if ((miscptr != NULL) && (strlen(miscptr) > 0)) { - if (strstr(miscptr, "CLEAR")) p.pop3_auth_mechanism = AUTH_CLEAR; @@ -722,7 +714,6 @@ int32_t service_pop3_init(char *ip, int32_t sp, unsigned char options, char *mis if (strstr(miscptr, "NTLM")) p.pop3_auth_mechanism = AUTH_NTLM; - } if (verbose) { @@ -765,7 +756,6 @@ int32_t service_pop3_init(char *ip, int32_t sp, unsigned char options, char *mis case AUTH_NTLM: hydra_report(stderr, "[VERBOSE] using POP3 NTLM AUTH mechanism\n"); break; - } } @@ -777,8 +767,11 @@ int32_t service_pop3_init(char *ip, int32_t sp, unsigned char options, char *mis return 0; } -void usage_pop3(const char* service) { +void usage_pop3(const char *service) { printf("Module pop3 is optionally taking one authentication type of:\n" " CLEAR (default), LOGIN, PLAIN, CRAM-MD5, CRAM-SHA1,\n" - " CRAM-SHA256, DIGEST-MD5, NTLM.\n" "Additionally TLS encryption via STLS can be enforced with the TLS option.\n\n" "Example: pop3://target/TLS:PLAIN\n"); + " CRAM-SHA256, DIGEST-MD5, NTLM.\n" + "Additionally TLS encryption via STLS can be enforced with the TLS " + "option.\n\n" + "Example: pop3://target/TLS:PLAIN\n"); } diff --git a/hydra-postgres.c b/hydra-postgres.c index 0be1363..7f958f7 100644 --- a/hydra-postgres.c +++ b/hydra-postgres.c @@ -1,26 +1,24 @@ /* - * PostgresSQL Support - by Diaul (at) devilopers.org + * PostgresSQL Support - by Diaul (at) devilopers.org + * * - * * 110425 no obvious memleaks found */ #include "hydra-mod.h" #ifndef LIBPOSTGRES -void dummy_postgres() { - printf("\n"); -} +void dummy_postgres() { printf("\n"); } #else -#include "libpq-fe.h" // Postgres connection functions +#include "libpq-fe.h" // Postgres connection functions #include #define DEFAULT_DB "template1" extern char *HYDRA_EXIT; -int32_t start_postgres(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_postgres(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, *pass; char database[256]; @@ -42,7 +40,6 @@ int32_t start_postgres(int32_t s, char *ip, int32_t port, unsigned char options, * Building the connection string */ - snprintf(connection_string, sizeof(connection_string), "host = '%s' dbname = '%s' user = '%s' password = '%s' ", hydra_address2string(ip), database, login, pass); if (verbose) @@ -65,7 +62,7 @@ int32_t start_postgres(int32_t s, char *ip, int32_t port, unsigned char options, return 1; } -void service_postgres(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_postgres(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_POSTGRES, mysslport = PORT_POSTGRES_SSL; @@ -74,12 +71,11 @@ void service_postgres(char *ip, int32_t sp, unsigned char options, char *miscptr return; while (1) { - switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ if (sock >= 0) sock = hydra_disconnect(sock); -// usleepn(275); + // usleepn(275); if ((options & OPTION_SSL) == 0) { if (port != 0) myport = port; @@ -92,14 +88,15 @@ void service_postgres(char *ip, int32_t sp, unsigned char options, char *miscptr port = mysslport; } if (sock < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + if (quiet != 1) + fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } next_run = 2; break; case 2: /* - * Here we start the password cracking process + * Here we start the password cracking process */ next_run = start_postgres(sock, ip, port, options, miscptr, fp); break; @@ -118,13 +115,13 @@ void service_postgres(char *ip, int32_t sp, unsigned char options, char *miscptr #endif -int32_t service_postgres_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_postgres_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here @@ -132,6 +129,7 @@ int32_t service_postgres_init(char *ip, int32_t sp, unsigned char options, char return 0; } -void usage_postgres(const char* service) { - printf("Module postgres is optionally taking the database to attack, default is \"template1\"\n\n"); +void usage_postgres(const char *service) { + printf("Module postgres is optionally taking the database to attack, default " + "is \"template1\"\n\n"); } diff --git a/hydra-radmin2.c b/hydra-radmin2.c index e72c838..8c417d3 100644 --- a/hydra-radmin2.c +++ b/hydra-radmin2.c @@ -7,42 +7,42 @@ extern char *HYDRA_EXIT; -//RAdmin 2.x +// RAdmin 2.x struct rmessage { - uint8_t magic; //Indicates version, probably? - uint32_t length; //Total message size of data. - uint32_t checksum; //Checksum from type to end of data. - uint8_t type; //Command type, table below. - unsigned char data[32]; //data to be sent. + uint8_t magic; // Indicates version, probably? + uint32_t length; // Total message size of data. + uint32_t checksum; // Checksum from type to end of data. + uint8_t type; // Command type, table below. + unsigned char data[32]; // data to be sent. }; /* * Usage: sum = checksum(message); - * Function: Returns a 4 byte little endian sum of the messages typecode+data. This data is zero padded for alignment. - * Example message (big endian): - * [01][00000021][0f43d461] sum([1b6e779a f37189bb c1b22982 c80d1f4d 66678ff9 4b10f0ce eabff6e8 f4fb8338 3b] + zeropad(3)]) - * Sum: is 0f43d461 (big endian) + * Function: Returns a 4 byte little endian sum of the messages typecode+data. + * This data is zero padded for alignment. Example message (big endian): + * [01][00000021][0f43d461] sum([1b6e779a f37189bb c1b22982 c80d1f4d 66678ff9 + * 4b10f0ce eabff6e8 f4fb8338 3b] + zeropad(3)]) Sum: is 0f43d461 (big endian) */ uint32_t checksum(struct rmessage *msg) { int32_t blen; uint8_t *stream; uint32_t sum; - blen = msg->length; //Get the real length. + blen = msg->length; // Get the real length. blen += (4 - (blen % 4)); - //Allocate a worksapce. + // Allocate a worksapce. stream = calloc(blen, sizeof(uint8_t)); memcpy(stream, &msg->type, sizeof(uint8_t)); - memcpy(stream+1, msg->data, blen-1); + memcpy(stream + 1, msg->data, blen - 1); sum = 0; - for(blen -= sizeof(uint32_t); blen > 0; blen -= sizeof(uint32_t)) { + for (blen -= sizeof(uint32_t); blen > 0; blen -= sizeof(uint32_t)) { sum += *(uint32_t *)(stream + blen); } sum += *(uint32_t *)stream; - //Free the workspace. + // Free the workspace. free(stream); return sum; @@ -50,7 +50,8 @@ uint32_t checksum(struct rmessage *msg) { /* * Usage: challenge_request(message); - * Function: Modifies message to reflect a request for a challenge. Updates the checksum as appropriate. + * Function: Modifies message to reflect a request for a challenge. Updates the + * checksum as appropriate. */ void challenge_request(struct rmessage *msg) { msg->magic = 0x01; @@ -61,7 +62,8 @@ void challenge_request(struct rmessage *msg) { /* * Usage: challenge_request(message); - * Function: Modifies message to reflect a response to a challenge. Updates the checksum as appropriate. + * Function: Modifies message to reflect a response to a challenge. Updates the + * checksum as appropriate. */ void challenge_response(struct rmessage *msg, unsigned char *solution) { msg->magic = 0x01; @@ -72,46 +74,47 @@ void challenge_response(struct rmessage *msg, unsigned char *solution) { } /* - * Usage: buffer = message2buffer(message); send(buffer, message->length + 10); free(buffer) - * Function: Allocates a buffer for transmission and fills the buffer with message data such that it is ready to transmit. + * Usage: buffer = message2buffer(message); send(buffer, message->length + 10); + * free(buffer) Function: Allocates a buffer for transmission and fills the + * buffer with message data such that it is ready to transmit. */ -//TODO: conver to a sendMessage() function? +// TODO: conver to a sendMessage() function? char *message2buffer(struct rmessage *msg) { char *data; - if(msg == NULL) { + if (msg == NULL) { hydra_report(stderr, "rmessage is null\n"); hydra_child_exit(0); return NULL; } - switch(msg->type) { - case 0x1b: //Challenge request - data = (char *)calloc (10, sizeof(char)); - if(data == NULL) { - hydra_report(stderr, "calloc failure\n"); - hydra_child_exit(0); - } - memcpy(data, &msg->magic, sizeof(char)); - *((int32_t *)(data+1)) = htonl(msg->length); - *((int32_t *)(data+5)) = htonl(msg->checksum); - memcpy((data+9), &msg->type, sizeof(char)); - break; - case 0x09: - data = (char *)calloc (42, sizeof(char)); - if(data == NULL) { - hydra_report(stderr, "calloc failure\n"); - hydra_child_exit(0); - } - memcpy(data, &msg->magic, sizeof(char)); - *((int32_t *)(data+1)) = htonl(msg->length); - *((int32_t *)(data+5)) = htonl(msg->checksum); - memcpy((data+9), &msg->type, sizeof(char)); - memcpy((data+10), msg->data, sizeof(char) * 32); - break; - default: - hydra_report(stderr, "unknown rmessage type\n"); + switch (msg->type) { + case 0x1b: // Challenge request + data = (char *)calloc(10, sizeof(char)); + if (data == NULL) { + hydra_report(stderr, "calloc failure\n"); hydra_child_exit(0); - return NULL; + } + memcpy(data, &msg->magic, sizeof(char)); + *((int32_t *)(data + 1)) = htonl(msg->length); + *((int32_t *)(data + 5)) = htonl(msg->checksum); + memcpy((data + 9), &msg->type, sizeof(char)); + break; + case 0x09: + data = (char *)calloc(42, sizeof(char)); + if (data == NULL) { + hydra_report(stderr, "calloc failure\n"); + hydra_child_exit(0); + } + memcpy(data, &msg->magic, sizeof(char)); + *((int32_t *)(data + 1)) = htonl(msg->length); + *((int32_t *)(data + 5)) = htonl(msg->checksum); + memcpy((data + 9), &msg->type, sizeof(char)); + memcpy((data + 10), msg->data, sizeof(char) * 32); + break; + default: + hydra_report(stderr, "unknown rmessage type\n"); + hydra_child_exit(0); + return NULL; } return data; } @@ -119,12 +122,12 @@ char *message2buffer(struct rmessage *msg) { struct rmessage *buffer2message(char *buffer) { struct rmessage *msg; msg = calloc(1, sizeof(struct rmessage)); - if(msg == NULL) { + if (msg == NULL) { hydra_report(stderr, "calloc failure\n"); hydra_child_exit(0); } - //Start parsing... + // Start parsing... msg->magic = buffer[0]; buffer += sizeof(char); msg->length = ntohl(*((uint32_t *)(buffer))); @@ -134,41 +137,38 @@ struct rmessage *buffer2message(char *buffer) { msg->type = buffer[0]; buffer += sizeof(char); - //Verify known fields... - if(msg->magic != 0x01) { + // Verify known fields... + if (msg->magic != 0x01) { hydra_report(stderr, "Bad magic\n"); hydra_child_exit(0); return NULL; } - switch(msg->type) { - case 0x1b: - if(msg->length != 0x21) { - hydra_report(stderr, "Bad length...%08x\n", msg->length); - hydra_child_exit(0); - return NULL; - } - memcpy(msg->data, buffer, 32); - break; - case 0x0a: - //Win! - case 0x0b: - //Lose! - break; - default: - hydra_report(stderr, "unknown rmessage type"); + switch (msg->type) { + case 0x1b: + if (msg->length != 0x21) { + hydra_report(stderr, "Bad length...%08x\n", msg->length); hydra_child_exit(0); return NULL; + } + memcpy(msg->data, buffer, 32); + break; + case 0x0a: + // Win! + case 0x0b: + // Lose! + break; + default: + hydra_report(stderr, "unknown rmessage type"); + hydra_child_exit(0); + return NULL; } return msg; } +int32_t start_radmin2(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { return 0; } -int32_t start_radmin2(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { - return 0; -} - -void service_radmin2(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_radmin2(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { #ifdef HAVE_GCRYPT int32_t sock = -1; int32_t index; @@ -185,7 +185,7 @@ void service_radmin2(char *ip, int32_t sp, unsigned char options, char *miscptr, gcry_cipher_hd_t cipher; gcry_md_hd_t md; - if(port != 0) { + if (port != 0) { myport = port; } @@ -193,14 +193,13 @@ void service_radmin2(char *ip, int32_t sp, unsigned char options, char *miscptr, memset(buffer, 0x00, sizeof(buffer)); - //Phone the mother ship + // Phone the mother ship hydra_register_socket(sp); - if( memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) { + if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) { return; } - while(1) { - + while (1) { /* Typical conversation goes as follows... 0) connect to server 1) request challenge @@ -210,7 +209,7 @@ void service_radmin2(char *ip, int32_t sp, unsigned char options, char *miscptr, */ // 0) Connect to the server sock = hydra_connect_tcp(ip, myport); - if(sock < 0) { + if (sock < 0) { hydra_report(stderr, "Error: Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } @@ -220,140 +219,164 @@ void service_radmin2(char *ip, int32_t sp, unsigned char options, char *miscptr, challenge_request(msg); request = message2buffer(msg); hydra_send(sock, request, 10, 0); - free(msg); + free(msg); free(request); - //2) receive response (working) + // 2) receive response (working) index = 0; - while(index < 42) { //We're always expecting back a 42 byte buffer from a challenge request. - switch(hydra_data_ready(sock)) { - case -1: - hydra_report(stderr, "Error: Child with pid %d terminating, receive error\nerror:\t%s\n", (int32_t)getpid(), strerror(errno)); + while (index < 42) { // We're always expecting back a 42 byte buffer from a + // challenge request. + switch (hydra_data_ready(sock)) { + case -1: + hydra_report(stderr, "Error: Child with pid %d terminating, receive error\nerror:\t%s\n", (int32_t)getpid(), strerror(errno)); + hydra_child_exit(1); + break; + case 0: + // keep waiting... + break; + default: + bytecount = hydra_recv(sock, buffer + index, 42 - index); + if (bytecount < 0) { + hydra_report(stderr, + "Error: Child with pid %d terminating, receive " + "error\nerror:\t%s\n", + (int32_t)getpid(), strerror(errno)); hydra_child_exit(1); - break; - case 0: - //keep waiting... - break; - default: - bytecount = hydra_recv(sock, buffer+index, 42 - index); - if(bytecount < 0) { - hydra_report(stderr, "Error: Child with pid %d terminating, receive error\nerror:\t%s\n", (int32_t)getpid(), strerror(errno)); - hydra_child_exit(1); - } - index += bytecount; + } + index += bytecount; } } - //3) Send challenge solution. + // 3) Send challenge solution. - // Get a password to work with. - memset(password, 0x00, sizeof(password)); - memset(encrypted, 0x00, sizeof(encrypted)); + // Get a password to work with. + memset(password, 0x00, sizeof(password)); + memset(encrypted, 0x00, sizeof(encrypted)); hydra_get_next_pair(); - strncpy(password, hydra_get_next_password(), sizeof(password)-1); + strncpy(password, hydra_get_next_password(), sizeof(password) - 1); - //MD5 the password to generate the password key, this is used with twofish below. + // MD5 the password to generate the password key, this is used with twofish + // below. err = gcry_md_open(&md, GCRY_MD_MD5, 0); - if(err) { - hydra_report(stderr, "Error: Child with pid %d terminating, gcry_md_open error (%08x)\n%s/%s", (int32_t)getpid(), index, gcry_strsource(err), gcry_strerror(err)); + if (err) { + hydra_report(stderr, + "Error: Child with pid %d terminating, gcry_md_open error " + "(%08x)\n%s/%s", + (int32_t)getpid(), index, gcry_strsource(err), gcry_strerror(err)); hydra_child_exit(1); } gcry_md_reset(md); gcry_md_write(md, password, 100); - if(gcry_md_read(md, 0) == NULL) { + if (gcry_md_read(md, 0) == NULL) { hydra_report(stderr, "Error: Child with pid %d terminating, gcry_md_read error (%08x)\n", (int32_t)getpid(), index); hydra_child_exit(1); } memcpy(rawkey, gcry_md_read(md, 0), 16); gcry_md_close(md); - //3.a) generate a new message from the buffer + // 3.a) generate a new message from the buffer msg = buffer2message(buffer); - //3.b) encrypt data received using pkey & known IV - err= gcry_cipher_open(&cipher, GCRY_CIPHER_TWOFISH128, GCRY_CIPHER_MODE_CBC, 0); - if(err) { - hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_open error (%08x)\n%s/%s", (int32_t)getpid(), index, gcry_strsource(err), gcry_strerror(err)); + // 3.b) encrypt data received using pkey & known IV + err = gcry_cipher_open(&cipher, GCRY_CIPHER_TWOFISH128, GCRY_CIPHER_MODE_CBC, 0); + if (err) { + hydra_report(stderr, + "Error: Child with pid %d terminating, gcry_cipher_open " + "error (%08x)\n%s/%s", + (int32_t)getpid(), index, gcry_strsource(err), gcry_strerror(err)); hydra_child_exit(1); } err = gcry_cipher_setiv(cipher, IV, 16); - if(err) { - hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_setiv error (%08x)\n%s/%s", (int32_t)getpid(), index, gcry_strsource(err), gcry_strerror(err)); + if (err) { + hydra_report(stderr, + "Error: Child with pid %d terminating, gcry_cipher_setiv " + "error (%08x)\n%s/%s", + (int32_t)getpid(), index, gcry_strsource(err), gcry_strerror(err)); hydra_child_exit(1); } err = gcry_cipher_setkey(cipher, rawkey, 16); - if(err) { - hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_setkey error (%08x)\n%s/%s", (int32_t)getpid(), index, gcry_strsource(err), gcry_strerror(err)); + if (err) { + hydra_report(stderr, + "Error: Child with pid %d terminating, gcry_cipher_setkey " + "error (%08x)\n%s/%s", + (int32_t)getpid(), index, gcry_strsource(err), gcry_strerror(err)); hydra_child_exit(1); } err = gcry_cipher_encrypt(cipher, encrypted, 32, msg->data, 32); - if(err) { - hydra_report(stderr, "Error: Child with pid %d terminating, gcry_cipher_encrypt error (%08x)\n%s/%s", (int32_t)getpid(), index, gcry_strsource(err), gcry_strerror(err)); + if (err) { + hydra_report(stderr, + "Error: Child with pid %d terminating, gcry_cipher_encrypt " + "error (%08x)\n%s/%s", + (int32_t)getpid(), index, gcry_strsource(err), gcry_strerror(err)); hydra_child_exit(1); } gcry_cipher_close(cipher); - //3.c) half sum - this is the solution to the challenge. - for(index=0; index < 16; index++) { - *(encrypted+index) += *(encrypted+index+16); + // 3.c) half sum - this is the solution to the challenge. + for (index = 0; index < 16; index++) { + *(encrypted + index) += *(encrypted + index + 16); } - memset((encrypted+16), 0x00, 16); + memset((encrypted + 16), 0x00, 16); - //3.d) send half sum + // 3.d) send half sum challenge_response(msg, encrypted); request = message2buffer(msg); hydra_send(sock, request, 42, 0); free(msg); free(request); - //4) receive auth success/failure + // 4) receive auth success/failure index = 0; - while(index < 10) { //We're always expecting back a 42 byte buffer from a challenge request. - switch(hydra_data_ready(sock)) { - case -1: - hydra_report(stderr, "Error: Child with pid %d terminating, receive error\nerror:\t%s\n", (int32_t)getpid(), strerror(errno)); + while (index < 10) { // We're always expecting back a 42 byte buffer from a + // challenge request. + switch (hydra_data_ready(sock)) { + case -1: + hydra_report(stderr, "Error: Child with pid %d terminating, receive error\nerror:\t%s\n", (int32_t)getpid(), strerror(errno)); + hydra_child_exit(1); + break; + case 0: + // keep waiting... + break; + default: + bytecount = hydra_recv(sock, buffer + index, 10 - index); + if (bytecount < 0) { + hydra_report(stderr, + "Error: Child with pid %d terminating, receive " + "error\nerror:\t%s\n", + (int32_t)getpid(), strerror(errno)); hydra_child_exit(1); - break; - case 0: - //keep waiting... - break; - default: - bytecount = hydra_recv(sock, buffer+index, 10 - index); - if(bytecount < 0) { - hydra_report(stderr, "Error: Child with pid %d terminating, receive error\nerror:\t%s\n", (int32_t)getpid(), strerror(errno)); - hydra_child_exit(1); - } - index += bytecount; + } + index += bytecount; } } msg = buffer2message(buffer); - switch(msg->type) { - case 0x0a: - hydra_completed_pair_found(); - break; - case 0x0b: - hydra_completed_pair(); - hydra_disconnect(sock); - break; - default: - hydra_report(stderr, "Error: Child with pid %d terminating, protocol error\n", (int32_t)getpid()); - hydra_child_exit(2); + switch (msg->type) { + case 0x0a: + hydra_completed_pair_found(); + break; + case 0x0b: + hydra_completed_pair(); + hydra_disconnect(sock); + break; + default: + hydra_report(stderr, "Error: Child with pid %d terminating, protocol error\n", (int32_t)getpid()); + hydra_child_exit(2); } } #endif } -int32_t service_radmin2_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_radmin2_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here diff --git a/hydra-rdp.c b/hydra-rdp.c index 9b15fed..bd333ce 100644 --- a/hydra-rdp.c +++ b/hydra-rdp.c @@ -1,6 +1,6 @@ /* This module is using freerdp2 lib - + Tested on: - Windows 7 pro SP1 - Windows 10 pro build 1809 @@ -11,13 +11,11 @@ extern char *HYDRA_EXIT; #ifndef LIBFREERDP2 -void dummy_rdp() { - printf("\n"); -} +void dummy_rdp() { printf("\n"); } #else #include -freerdp * instance = 0; +freerdp *instance = 0; BOOL rdp_connect(char *server, int32_t port, char *domain, char *login, char *password) { int32_t err = 0; @@ -34,7 +32,7 @@ BOOL rdp_connect(char *server, int32_t port, char *domain, char *login, char *pa } /* Client program */ -int32_t start_rdp(char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_rdp(char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, *pass; char server[64]; @@ -56,39 +54,44 @@ int32_t start_rdp(char *ip, int32_t port, unsigned char options, char *miscptr, } login_result = rdp_connect(server, port, domain, login, pass); - switch(login_result){ - case 0: - // login success - hydra_report_found_host(port, ip, "rdp", fp); - hydra_completed_pair_found(); - break; - case 0x00020009: - case 0x00020014: - case 0x00020015: - // login failure - hydra_completed_pair(); - break; - case 0x0002000d: - hydra_report(stderr, "[%d][rdp] account on %s might be valid but account not active for remote desktop: login: %s password: %s, continuing attacking the account.\n", port, hydra_address2string_beautiful(ip), login, pass); - hydra_completed_pair(); - break; - case 0x00020006: - case 0x00020008: - case 0x0002000c: - // cannot establish rdp connection, either the port is not opened or it's not rdp - return 3; - default: - if (verbose) { - hydra_report(stderr, "[ERROR] freerdp: %s (0x%.8x)\n", freerdp_get_last_error_string(login_result), login_result); - } - return login_result; + switch (login_result) { + case 0: + // login success + hydra_report_found_host(port, ip, "rdp", fp); + hydra_completed_pair_found(); + break; + case 0x00020009: + case 0x00020014: + case 0x00020015: + // login failure + hydra_completed_pair(); + break; + case 0x0002000d: + hydra_report(stderr, + "[%d][rdp] account on %s might be valid but account not " + "active for remote desktop: login: %s password: %s, " + "continuing attacking the account.\n", + port, hydra_address2string_beautiful(ip), login, pass); + hydra_completed_pair(); + break; + case 0x00020006: + case 0x00020008: + case 0x0002000c: + // cannot establish rdp connection, either the port is not opened or it's + // not rdp + return 3; + default: + if (verbose) { + hydra_report(stderr, "[ERROR] freerdp: %s (0x%.8x)\n", freerdp_get_last_error_string(login_result), login_result); + } + return login_result; } if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) return 2; return 1; } -void service_rdp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_rdp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1; int32_t myport = PORT_RDP; @@ -101,15 +104,15 @@ void service_rdp(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL while (1) { next_run = 0; switch (run) { - case 1: /* run the cracking function */ + case 1: /* run the cracking function */ next_run = start_rdp(ip, myport, options, miscptr, fp); break; - case 2: /* clean exit */ + case 2: /* clean exit */ freerdp_disconnect(instance); freerdp_free(instance); hydra_child_exit(0); return; - case 3: /* connection error case */ + case 3: /* connection error case */ hydra_report(stderr, "[ERROR] freerdp: %s\n", "The connection failed to establish."); freerdp_free(instance); hydra_child_exit(1); @@ -121,20 +124,20 @@ void service_rdp(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL } } -int32_t service_rdp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_rdp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here // Disable freerdp output - wLog* root = WLog_GetRoot(); - WLog_SetStringLogLevel(root, "OFF"); + wLog *root = WLog_GetRoot(); + WLog_SetStringLogLevel(root, "OFF"); // Init freerdp instance instance = freerdp_new(); @@ -145,7 +148,9 @@ int32_t service_rdp_init(char *ip, int32_t sp, unsigned char options, char *misc return 0; } -void usage_rdp(const char* service) { - printf("Module rdp is optionally taking the windows domain name.\n" "For example:\nhydra rdp://192.168.0.1/firstdomainname -l john -p doe\n\n"); +void usage_rdp(const char *service) { + printf("Module rdp is optionally taking the windows domain name.\n" + "For example:\nhydra rdp://192.168.0.1/firstdomainname -l john -p " + "doe\n\n"); } #endif diff --git a/hydra-redis.c b/hydra-redis.c index c230453..179007c 100644 --- a/hydra-redis.c +++ b/hydra-redis.c @@ -3,7 +3,7 @@ extern char *HYDRA_EXIT; char *buf; -int32_t start_redis(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_redis(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *pass, buffer[510]; char *empty = ""; @@ -51,7 +51,7 @@ int32_t start_redis(int32_t s, char *ip, int32_t port, unsigned char options, ch return 1; } -void service_redis_core(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname, int32_t tls) { +void service_redis_core(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname, int32_t tls) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_REDIS, mysslport = PORT_REDIS_SSL; @@ -61,7 +61,7 @@ void service_redis_core(char *ip, int32_t sp, unsigned char options, char *miscp while (1) { switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ if (sock >= 0) sock = hydra_disconnect(sock); if ((options & OPTION_SSL) == 0) { @@ -77,21 +77,21 @@ void service_redis_core(char *ip, int32_t sp, unsigned char options, char *miscp } if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } usleepn(250); next_run = 2; break; - case 2: /* run the cracking function */ + case 2: /* run the cracking function */ next_run = start_redis(sock, ip, port, options, miscptr, fp); break; - case 3: /* error exit */ + case 3: /* error exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(2); break; - case 4: /* clean exit */ + case 4: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); @@ -104,32 +104,32 @@ void service_redis_core(char *ip, int32_t sp, unsigned char options, char *miscp } } -void service_redis(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { - service_redis_core(ip, sp, options, miscptr, fp, port, hostname, 0); -} +void service_redis(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { service_redis_core(ip, sp, options, miscptr, fp, port, hostname, 0); } -/* -* Initial password authentication test and response test for the redis server, -* added by Petar Kaleychev -* The service_redis_init function is generating ping request as redis-cli (command line interface). -* You can use redis-cli to connect with Redis. After start of the redis-server in another terminal the following: -* % ./redis-cli -* redis> ping -* when the server does not require password, leads to: -* PONG -* when the server requires password, leads to: -* (error) NOAUTH Authentication required. -* or -* (error) ERR operation not permitted (for older redis versions) -* That is used for initial password authentication and redis server response tests in service_redis_init -*/ -int32_t service_redis_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +/* + * Initial password authentication test and response test for the redis server, + * added by Petar Kaleychev + * The service_redis_init function is generating ping request as redis-cli + * (command line interface). You can use redis-cli to connect with Redis. After + * start of the redis-server in another terminal the following: % ./redis-cli + * redis> ping + * when the server does not require password, leads to: + * PONG + * when the server requires password, leads to: + * (error) NOAUTH Authentication required. + * or + * (error) ERR operation not permitted (for older redis versions) + * That is used for initial password authentication and redis server response + * tests in service_redis_init + */ +int32_t service_redis_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // return codes: // 0 - when the server is redis and it requires password - // n - when the server is not redis or when the server does not require password + // n - when the server is not redis or when the server does not require + // password int32_t sock = -1; int32_t myport = PORT_REDIS, mysslport = PORT_REDIS_SSL; @@ -148,7 +148,8 @@ int32_t service_redis_init(char *ip, int32_t sp, unsigned char options, char *mi port = mysslport; } if (verbose) - printf("[VERBOSE] Initial redis password authentication test and response test ...\n"); + printf("[VERBOSE] Initial redis password authentication test and response " + "test ...\n"); if (sock < 0) { hydra_report(stderr, "[ERROR] Can not connect to port %d on the target\n", myport); return 3; @@ -156,10 +157,10 @@ int32_t service_redis_init(char *ip, int32_t sp, unsigned char options, char *mi // generating ping request as redis-cli if (debug) printf("[DEBUG] buffer = %s\n", buffer); - // [debug mode]: buffer is: - // *1 - // $4 - // ping + // [debug mode]: buffer is: + // *1 + // $4 + // ping if (hydra_send(sock, buffer, strlen(buffer), 0) < 0) { return 2; } diff --git a/hydra-rexec.c b/hydra-rexec.c index 4783bcc..3571527 100644 --- a/hydra-rexec.c +++ b/hydra-rexec.c @@ -6,7 +6,7 @@ extern char *HYDRA_EXIT; -int32_t start_rexec(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_rexec(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, *pass, buffer[300] = "", buffer2[100], *bptr = buffer2; int32_t ret; @@ -44,7 +44,7 @@ int32_t start_rexec(int32_t s, char *ip, int32_t port, unsigned char options, ch return 1; } -void service_rexec(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_rexec(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_REXEC, mysslport = PORT_REXEC_SSL; @@ -54,33 +54,33 @@ void service_rexec(char *ip, int32_t sp, unsigned char options, char *miscptr, F while (1) { next_run = 0; switch (run) { - case 1: /* connect and service init function */ - { - if (sock >= 0) - sock = hydra_disconnect(sock); -// usleepn(275); - if ((options & OPTION_SSL) == 0) { - if (port != 0) - myport = port; - sock = hydra_connect_tcp(ip, myport); - port = myport; - } else { - if (port != 0) - mysslport = port; - sock = hydra_connect_ssl(ip, mysslport, hostname); - port = mysslport; - } - if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); - hydra_child_exit(1); - } - next_run = 2; - break; + case 1: /* connect and service init function */ + { + if (sock >= 0) + sock = hydra_disconnect(sock); + // usleepn(275); + if ((options & OPTION_SSL) == 0) { + if (port != 0) + myport = port; + sock = hydra_connect_tcp(ip, myport); + port = myport; + } else { + if (port != 0) + mysslport = port; + sock = hydra_connect_ssl(ip, mysslport, hostname); + port = mysslport; } - case 2: /* run the cracking function */ + if (sock < 0) { + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); + hydra_child_exit(1); + } + next_run = 2; + break; + } + case 2: /* run the cracking function */ next_run = start_rexec(sock, ip, port, options, miscptr, fp); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); @@ -88,19 +88,18 @@ void service_rexec(char *ip, int32_t sp, unsigned char options, char *miscptr, F default: hydra_report(stderr, "[ERROR] Caught unknown return code, exiting!\n"); hydra_child_exit(0); - } run = next_run; } } -int32_t service_rexec_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_rexec_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here diff --git a/hydra-rlogin.c b/hydra-rlogin.c index 36556b5..f9dc694 100644 --- a/hydra-rlogin.c +++ b/hydra-rlogin.c @@ -8,12 +8,11 @@ client have to use port from 512 -> 1023 or server is denying the connection no memleaks found on 110425 */ - #define TERM "vt100/9600" extern char *HYDRA_EXIT; -int32_t start_rlogin(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_rlogin(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, *pass, buffer[300] = "", buffer2[100], *bptr = buffer2; int32_t ret; @@ -78,7 +77,8 @@ int32_t start_rlogin(int32_t s, char *ip, int32_t port, unsigned char options, c hydra_completed_pair(); } } else { - /* if password is asked a second time, it means the pass we provided is wrong */ + /* if password is asked a second time, it means the pass we provided is + * wrong */ hydra_completed_pair(); } @@ -87,7 +87,7 @@ int32_t start_rlogin(int32_t s, char *ip, int32_t port, unsigned char options, c return 1; } -void service_rlogin(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_rlogin(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_RLOGIN, mysslport = PORT_RLOGIN_SSL; @@ -98,35 +98,35 @@ void service_rlogin(char *ip, int32_t sp, unsigned char options, char *miscptr, while (1) { next_run = 0; switch (run) { - case 1: /* connect and service init function */ - { - /* 512 -> 1023 */ - hydra_set_srcport(1023); - if (sock >= 0) - sock = hydra_disconnect(sock); -// usleepn(275); - if ((options & OPTION_SSL) == 0) { - if (port != 0) - myport = port; - sock = hydra_connect_tcp(ip, myport); - port = myport; - } else { - if (port != 0) - mysslport = port; - sock = hydra_connect_ssl(ip, mysslport, hostname); - port = mysslport; - } - if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); - hydra_child_exit(1); - } - next_run = 2; - break; + case 1: /* connect and service init function */ + { + /* 512 -> 1023 */ + hydra_set_srcport(1023); + if (sock >= 0) + sock = hydra_disconnect(sock); + // usleepn(275); + if ((options & OPTION_SSL) == 0) { + if (port != 0) + myport = port; + sock = hydra_connect_tcp(ip, myport); + port = myport; + } else { + if (port != 0) + mysslport = port; + sock = hydra_connect_ssl(ip, mysslport, hostname); + port = mysslport; } - case 2: /* run the cracking function */ + if (sock < 0) { + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); + hydra_child_exit(1); + } + next_run = 2; + break; + } + case 2: /* run the cracking function */ next_run = start_rlogin(sock, ip, port, options, miscptr, fp); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); @@ -139,13 +139,13 @@ void service_rlogin(char *ip, int32_t sp, unsigned char options, char *miscptr, } } -int32_t service_rlogin_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_rlogin_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here diff --git a/hydra-rpcap.c b/hydra-rpcap.c index ff15956..700d0cc 100644 --- a/hydra-rpcap.c +++ b/hydra-rpcap.c @@ -6,7 +6,7 @@ extern char *HYDRA_EXIT; char *buf; -int32_t start_rpcap(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_rpcap(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, *pass, buffer[1024]; @@ -21,7 +21,8 @@ int32_t start_rpcap(int32_t s, char *ip, int32_t port, unsigned char options, ch char bfr4[] = " "; bfr4[0] = strlen(login) + strlen(pass) + 8; char bfr5[] = "\x00"; - char bfr6[] = "\x01"; // x01 - when a password is required, x00 - when no need of password + char bfr6[] = "\x01"; // x01 - when a password is required, x00 - when no need + // of password char bfr7[] = "\x00\x00\x00"; char bfr8[] = " "; bfr8[0] = strlen(login); @@ -57,13 +58,12 @@ int32_t start_rpcap(int32_t s, char *ip, int32_t port, unsigned char options, ch return 3; return 1; } -/* - if (strstr(buf, "Logon failure") == NULL) { - hydra_report(stderr, "[ERROR] rpcap error or service shutdown: %s\n", buf); - free(buf); - return 4; - } -*/ + /* + if (strstr(buf, "Logon failure") == NULL) { + hydra_report(stderr, "[ERROR] rpcap error or service shutdown: %s\n", + buf); free(buf); return 4; + } + */ free(buf); hydra_completed_pair(); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -72,7 +72,7 @@ int32_t start_rpcap(int32_t s, char *ip, int32_t port, unsigned char options, ch return 2; } -void service_rpcap(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_rpcap(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_RPCAP, mysslport = PORT_RPCAP_SSL; @@ -81,10 +81,10 @@ void service_rpcap(char *ip, int32_t sp, unsigned char options, char *miscptr, F return; while (1) { switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ if (sock >= 0) sock = hydra_disconnect(sock); - //usleep(300000); + // usleep(300000); if ((options & OPTION_SSL) == 0) { if (port != 0) myport = port; @@ -99,15 +99,15 @@ void service_rpcap(char *ip, int32_t sp, unsigned char options, char *miscptr, F if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } next_run = 2; break; - case 2: /* run the cracking function */ + case 2: /* run the cracking function */ next_run = start_rpcap(sock, ip, port, options, miscptr, fp); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); @@ -120,7 +120,7 @@ void service_rpcap(char *ip, int32_t sp, unsigned char options, char *miscptr, F } } -int32_t service_rpcap_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_rpcap_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, performed once only. // return codes: // 0 - rpcap with authentication diff --git a/hydra-rsh.c b/hydra-rsh.c index 0ec7b2a..6bb3cac 100644 --- a/hydra-rsh.c +++ b/hydra-rsh.c @@ -12,7 +12,7 @@ no memleaks found on 110425 extern char *HYDRA_EXIT; -int32_t start_rsh(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_rsh(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, buffer[300] = "", buffer2[100], *bptr = buffer2; int32_t ret; @@ -39,8 +39,8 @@ int32_t start_rsh(int32_t s, char *ip, int32_t port, unsigned char options, char if ((ret = hydra_recv(s, buffer, sizeof(buffer) - 1)) > 0) buffer[ret] = 0; else /* 0x00 is sent but hydra_recv transformed it */ - if ((ret = hydra_recv(s, buffer, sizeof(buffer) - 1)) > 0) - buffer[ret] = 0; + if ((ret = hydra_recv(s, buffer, sizeof(buffer) - 1)) > 0) + buffer[ret] = 0; #ifdef HAVE_PCRE if (ret > 0 && (!hydra_string_match(buffer, "\\s(failure|incorrect|denied)"))) { #else @@ -57,7 +57,7 @@ int32_t start_rsh(int32_t s, char *ip, int32_t port, unsigned char options, char return 1; } -void service_rsh(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_rsh(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_RSH, mysslport = PORT_RSH_SSL; @@ -68,34 +68,34 @@ void service_rsh(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL while (1) { next_run = 0; switch (run) { - case 1: /* connect and service init function */ - { - hydra_set_srcport(1023); - if (sock >= 0) - sock = hydra_disconnect(sock); -// usleepn(275); - if ((options & OPTION_SSL) == 0) { - if (port != 0) - myport = port; - sock = hydra_connect_tcp(ip, myport); - port = myport; - } else { - if (port != 0) - mysslport = port; - sock = hydra_connect_ssl(ip, mysslport, hostname); - port = mysslport; - } - if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); - hydra_child_exit(1); - } - next_run = 2; - break; + case 1: /* connect and service init function */ + { + hydra_set_srcport(1023); + if (sock >= 0) + sock = hydra_disconnect(sock); + // usleepn(275); + if ((options & OPTION_SSL) == 0) { + if (port != 0) + myport = port; + sock = hydra_connect_tcp(ip, myport); + port = myport; + } else { + if (port != 0) + mysslport = port; + sock = hydra_connect_ssl(ip, mysslport, hostname); + port = mysslport; } - case 2: /* run the cracking function */ + if (sock < 0) { + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); + hydra_child_exit(1); + } + next_run = 2; + break; + } + case 2: /* run the cracking function */ next_run = start_rsh(sock, ip, port, options, miscptr, fp); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); @@ -108,13 +108,13 @@ void service_rsh(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL } } -int32_t service_rsh_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_rsh_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here diff --git a/hydra-rtsp.c b/hydra-rtsp.c index 018f432..5eb4166 100644 --- a/hydra-rtsp.c +++ b/hydra-rtsp.c @@ -6,17 +6,16 @@ // // -#include #include "hydra-mod.h" -#include #include "sasl.h" +#include +#include extern char *HYDRA_EXIT; char packet[500]; char packet2[500]; int32_t is_Unauthorized(char *s) { - if (strstr(s, "401 Unauthorized") != NULL) { return 1; } else { @@ -25,7 +24,6 @@ int32_t is_Unauthorized(char *s) { } int32_t is_NotFound(char *s) { - if (strstr(s, "404 Stream Not Found") != NULL) { return 1; } else { @@ -34,7 +32,6 @@ int32_t is_NotFound(char *s) { } int32_t is_Authorized(char *s) { - if (strstr(s, "200 OK") != NULL) { return 1; } else { @@ -43,7 +40,6 @@ int32_t is_Authorized(char *s) { } int32_t use_Basic_Auth(char *s) { - if (strstr(s, "WWW-Authenticate: Basic") != NULL) { return 1; } else { @@ -52,7 +48,6 @@ int32_t use_Basic_Auth(char *s) { } int32_t use_Digest_Auth(char *s) { - if (strstr(s, "WWW-Authenticate: Digest") != NULL) { return 1; } else { @@ -60,8 +55,6 @@ int32_t use_Digest_Auth(char *s) { } } - - void create_core_packet(int32_t control, char *ip, int32_t port) { char *target = hydra_address2string(ip); @@ -75,7 +68,7 @@ void create_core_packet(int32_t control, char *ip, int32_t port) { } } } -int32_t start_rtsp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_rtsp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, *pass, buffer[1030], buffer2[500]; char *lresp; @@ -109,22 +102,19 @@ int32_t start_rtsp(int32_t s, char *ip, int32_t port, unsigned char options, cha } return 1; } else { - create_core_packet(1, ip, port); if (use_Basic_Auth(lresp) == 1) { - free(lresp); sprintf(buffer2, "%.249s:%.249s", login, pass); - hydra_tobase64((unsigned char *) buffer2, strlen(buffer2), sizeof(buffer2)); + hydra_tobase64((unsigned char *)buffer2, strlen(buffer2), sizeof(buffer2)); sprintf(buffer, "%.500sAuthorization: : Basic %.500s\r\n\r\n", packet2, buffer2); if (debug) { hydra_report(stderr, "C:%s\n", buffer); } - } - else { + } else { if (use_Digest_Auth(lresp) == 1) { char *dbuf = NULL; char aux[500] = ""; @@ -136,7 +126,8 @@ int32_t start_rtsp(int32_t s, char *ip, int32_t port, unsigned char options, cha #ifdef LIBOPENSSL sasl_digest_md5(dbuf, login, pass, aux, miscptr, "rtsp", hydra_address2string(ip), port, ""); #else - hydra_report(stderr, "[ERROR] Digest auth required but compiled without OpenSSL/MD5 support\n"); + hydra_report(stderr, "[ERROR] Digest auth required but compiled " + "without OpenSSL/MD5 support\n"); return 3; #endif @@ -163,7 +154,7 @@ int32_t start_rtsp(int32_t s, char *ip, int32_t port, unsigned char options, cha lresp = NULL; lresp = hydra_receive_line(s); - + if (lresp == NULL) { hydra_report(stderr, "[ERROR] no server reply\n"); return 1; @@ -177,7 +168,6 @@ int32_t start_rtsp(int32_t s, char *ip, int32_t port, unsigned char options, cha return 3; } return 1; - } free(lresp); hydra_completed_pair(); @@ -186,13 +176,13 @@ int32_t start_rtsp(int32_t s, char *ip, int32_t port, unsigned char options, cha if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) return 3; -//not rechead + // not rechead return 2; } -void service_rtsp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_rtsp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; - int32_t myport = PORT_RTSP/*, mysslport = PORT_RTSP_SSL*/; + int32_t myport = PORT_RTSP /*, mysslport = PORT_RTSP_SSL*/; hydra_register_socket(sp); @@ -200,9 +190,8 @@ void service_rtsp(char *ip, int32_t sp, unsigned char options, char *miscptr, FI return; while (1) { - switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ if (sock >= 0) { sock = hydra_disconnect(sock); } @@ -215,16 +204,16 @@ void service_rtsp(char *ip, int32_t sp, unsigned char options, char *miscptr, FI } if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } next_run = 2; break; - case 2: /* run the cracking function */ + case 2: /* run the cracking function */ next_run = start_rtsp(sock, ip, port, options, miscptr, fp); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) { sock = hydra_disconnect(sock); } @@ -238,7 +227,7 @@ void service_rtsp(char *ip, int32_t sp, unsigned char options, char *miscptr, FI } } -int32_t service_rtsp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_rtsp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. diff --git a/hydra-s7-300.c b/hydra-s7-300.c index 31b11aa..9f7f3a3 100644 --- a/hydra-s7-300.c +++ b/hydra-s7-300.c @@ -1,4 +1,5 @@ -// submitted by Alexander Timorin and Sergey Gordeychik +// submitted by Alexander Timorin and Sergey +// Gordeychik #include "hydra-mod.h" @@ -6,16 +7,24 @@ extern char *HYDRA_EXIT; -unsigned char p_cotp[] = "\x03\x00\x00\x16\x11\xe0\x00\x00\x00\x17" "\x00\xc1\x02\x01\x00\xc2\x02\x01\x02\xc0" "\x01\x0a"; +unsigned char p_cotp[] = "\x03\x00\x00\x16\x11\xe0\x00\x00\x00\x17" + "\x00\xc1\x02\x01\x00\xc2\x02\x01\x02\xc0" + "\x01\x0a"; -unsigned char p_s7_negotiate_pdu[] = "\x03\x00\x00\x19\x02\xf0\x80\x32\x01\x00" "\x00\x02\x00\x00\x08\x00\x00\xf0\x00\x00" "\x01\x00\x01\x01\xe0"; +unsigned char p_s7_negotiate_pdu[] = "\x03\x00\x00\x19\x02\xf0\x80\x32\x01\x00" + "\x00\x02\x00\x00\x08\x00\x00\xf0\x00\x00" + "\x01\x00\x01\x01\xe0"; -unsigned char p_s7_read_szl[] = "\x03\x00\x00\x21\x02\xf0\x80\x32\x07\x00" "\x00\x03\x00\x00\x08\x00\x08\x00\x01\x12" "\x04\x11\x44\x01\x00\xff\x09\x00\x04\x01" "\x32\x00\x04"; +unsigned char p_s7_read_szl[] = "\x03\x00\x00\x21\x02\xf0\x80\x32\x07\x00" + "\x00\x03\x00\x00\x08\x00\x08\x00\x01\x12" + "\x04\x11\x44\x01\x00\xff\x09\x00\x04\x01" + "\x32\x00\x04"; -unsigned char p_s7_password_request[] = "\x03\x00\x00\x25\x02\xf0\x80\x32\x07\x00" "\x00\x00\x00\x00\x08\x00\x0c\x00\x01\x12" "\x04\x11\x45\x01\x00\xff\x09\x00\x08"; +unsigned char p_s7_password_request[] = "\x03\x00\x00\x25\x02\xf0\x80\x32\x07\x00" + "\x00\x00\x00\x00\x08\x00\x0c\x00\x01\x12" + "\x04\x11\x45\x01\x00\xff\x09\x00\x08"; - -int32_t start_s7_300(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_s7_300(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *pass, buffer[1024]; char context[S7PASSLEN + 1]; @@ -45,7 +54,7 @@ int32_t start_s7_300(int32_t s, char *ip, int32_t port, unsigned char options, c } // send p_cotp and check first 2 bytes of answer - if (hydra_send(s, (char *) p_cotp, 22, 0) < 0) + if (hydra_send(s, (char *)p_cotp, 22, 0) < 0) return 1; memset(buffer, 0, sizeof(buffer)); ret = hydra_recv_nb(s, buffer, sizeof(buffer)); @@ -57,7 +66,7 @@ int32_t start_s7_300(int32_t s, char *ip, int32_t port, unsigned char options, c return 3; // send p_s7_negotiate_pdu and check first 2 bytes of answer - if (hydra_send(s, (char *) p_s7_negotiate_pdu, 25, 0) < 0) + if (hydra_send(s, (char *)p_s7_negotiate_pdu, 25, 0) < 0) return 1; memset(buffer, 0, sizeof(buffer)); ret = hydra_recv_nb(s, buffer, sizeof(buffer)); @@ -69,7 +78,7 @@ int32_t start_s7_300(int32_t s, char *ip, int32_t port, unsigned char options, c return 3; // send p_s7_read_szl and check first 2 bytes of answer - if (hydra_send(s, (char *) p_s7_read_szl, 33, 0) < 0) + if (hydra_send(s, (char *)p_s7_read_szl, 33, 0) < 0) return 1; memset(buffer, 0, sizeof(buffer)); ret = hydra_recv_nb(s, buffer, sizeof(buffer)); @@ -108,7 +117,7 @@ int32_t start_s7_300(int32_t s, char *ip, int32_t port, unsigned char options, c } if (buffer[27] == '\xd6' && buffer[28] == '\x05') { - //hydra_report_found_host(port, ip, "s7-300", fp); + // hydra_report_found_host(port, ip, "s7-300", fp); hydra_completed_pair_found(); hydra_report(stderr, "[INFO] No password protection enabled\n"); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -124,7 +133,7 @@ int32_t start_s7_300(int32_t s, char *ip, int32_t port, unsigned char options, c return 1; } -void service_s7_300(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_s7_300(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t s7port = PORT_S7_300; @@ -136,21 +145,21 @@ void service_s7_300(char *ip, int32_t sp, unsigned char options, char *miscptr, return; while (1) { switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ sock = hydra_connect_tcp(ip, s7port); if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } next_run = start_s7_300(sock, ip, s7port, options, miscptr, fp); sock = hydra_disconnect(sock); break; - case 2: /* clean exit */ + case 2: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); return; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(2); @@ -163,13 +172,13 @@ void service_s7_300(char *ip, int32_t sp, unsigned char options, char *miscptr, } } -int32_t service_s7_300_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_s7_300_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // 1 skip target without generating an error @@ -211,7 +220,7 @@ int32_t service_s7_300_init(char *ip, int32_t sp, unsigned char options, char *m } // send p_cotp and check first 2 bytes of answer - if (hydra_send(sock, (char *) p_cotp, 22, 0) < 0) { + if (hydra_send(sock, (char *)p_cotp, 22, 0) < 0) { fprintf(stderr, "[ERROR] can not send data to service\n"); return 3; } @@ -226,7 +235,7 @@ int32_t service_s7_300_init(char *ip, int32_t sp, unsigned char options, char *m return 3; } // send p_s7_negotiate_pdu and check first 2 bytes of answer - if (hydra_send(sock, (char *) p_s7_negotiate_pdu, 25, 0) < 0) { + if (hydra_send(sock, (char *)p_s7_negotiate_pdu, 25, 0) < 0) { fprintf(stderr, "[ERROR] can not send data to service (2)\n"); return 3; } @@ -241,7 +250,7 @@ int32_t service_s7_300_init(char *ip, int32_t sp, unsigned char options, char *m return 3; } // send p_s7_read_szl and check first 2 bytes of answer - if (hydra_send(sock, (char *) p_s7_read_szl, 33, 0) < 0) { + if (hydra_send(sock, (char *)p_s7_read_szl, 33, 0) < 0) { fprintf(stderr, "[ERROR] can not send data to service (3)\n"); return 3; } @@ -276,7 +285,8 @@ int32_t service_s7_300_init(char *ip, int32_t sp, unsigned char options, char *m // 0xd602 - wrong password if (ret > 30) { if ((buffer[27] == '\x00' && buffer[28] == '\x00') || (buffer[27] == '\xd6' && buffer[28] == '\x05')) { - hydra_report(stderr, "[INFO] No password protection enabled, no password tests are necessary!\n"); + hydra_report(stderr, "[INFO] No password protection enabled, no password " + "tests are necessary!\n"); return 1; } } @@ -286,6 +296,7 @@ int32_t service_s7_300_init(char *ip, int32_t sp, unsigned char options, char *m return 0; } -void usage_s7_300(const char* service) { - printf("Module S7-300 is for a special Siemens PLC. It either requires only a password or no authentication, so just use the -p or -P option.\n\n"); +void usage_s7_300(const char *service) { + printf("Module S7-300 is for a special Siemens PLC. It either requires only a " + "password or no authentication, so just use the -p or -P option.\n\n"); } diff --git a/hydra-sapr3.c b/hydra-sapr3.c index c3b729d..26024da 100644 --- a/hydra-sapr3.c +++ b/hydra-sapr3.c @@ -1,25 +1,23 @@ #include "hydra-mod.h" // checked for memleaks on 110425, none found #ifndef LIBSAPR3 -void dummy_sapr3() { - printf("\n"); -} +void dummy_sapr3() { printf("\n"); } #else -#include #include +#include /* temporary workaround fix */ const int32_t *__ctype_tolower; const int32_t *__ctype_toupper; const int32_t *__ctype_b; -extern void flood(); /* for -lm */ +extern void flood(); /* for -lm */ extern char *HYDRA_EXIT; RFC_ERROR_INFO_EX error_info; -int32_t start_sapr3(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_sapr3(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { RFC_HANDLE handle; char *empty = ""; char *login, *pass, buffer[1024]; @@ -28,7 +26,8 @@ int32_t start_sapr3(int32_t s, char *ip, int32_t port, unsigned char options, ch int32_t sysnr = port % 100; char opts[] = "RFCINI=N RFCTRACE=N BALANCE=N DEBUG=N TRACE=0 ABAP_DEBUG=0"; -// char opts[] = "RFCINI=N RFCTRACE=Y BALANCE=N DEBUG=Y TRACE=Y ABAP_DEBUG=Y"; + // char opts[] = "RFCINI=N RFCTRACE=Y BALANCE=N DEBUG=Y TRACE=Y + // ABAP_DEBUG=Y"; if (strlen(login = hydra_get_next_login()) == 0) login = empty; @@ -37,36 +36,37 @@ int32_t start_sapr3(int32_t s, char *ip, int32_t port, unsigned char options, ch if (strlen(login) > 0) for (i = 0; i < strlen(login); i++) - login[i] = (char) toupper(login[i]); + login[i] = (char)toupper(login[i]); if (strlen(pass) > 0) for (i = 0; i < strlen(pass); i++) - pass[i] = (char) toupper(pass[i]); + pass[i] = (char)toupper(pass[i]); memset(buffer, 0, sizeof(buffer)); memset(&error_info, 0, sizeof(error_info)); -//strcpy(buf, "mvse001"); + // strcpy(buf, "mvse001"); snprintf(buffer, sizeof(buffer), "ASHOST=%s SYSNR=%02d CLIENT=%03d USER=\"%s\" PASSWD=\"%s\" LANG=DE %s", hydra_address2string(ip), sysnr, atoi(miscptr), login, pass, opts); -/* - USER=SAPCPIC PASSWORD=admin - USER=SAP* PASSWORD=PASS + /* + USER=SAPCPIC PASSWORD=admin + USER=SAP* PASSWORD=PASS - ## do we need these options? - SAPSYS=3 SNC_MODE=N SAPGUI=N INVISIBLE=N GUIATOPEN=Y NRCALL=00001 CLOSE=N + ## do we need these options? + SAPSYS=3 SNC_MODE=N SAPGUI=N INVISIBLE=N GUIATOPEN=Y NRCALL=00001 CLOSE=N - ASHOST= // IP - SYSNR= // port - 3200, scale 2 - CLIENT= // miscptr, scale 2 - ABAP_DEBUG=0 - USER= - PASSWD= - LANG=DE -*/ -//printf ("DEBUG: %d Connectstring \"%s\"\n",sizeof(error_info),buffer); + ASHOST= // IP + SYSNR= // port - 3200, scale 2 + CLIENT= // miscptr, scale 2 + ABAP_DEBUG=0 + USER= + PASSWD= + LANG=DE + */ + // printf ("DEBUG: %d Connectstring \"%s\"\n",sizeof(error_info),buffer); handle = RfcOpenEx(buffer, &error_info); -//printf("DEBUG: handle %d, key %s, message %s\n", handle, error_info.key, error_info.message); + // printf("DEBUG: handle %d, key %s, message %s\n", handle, error_info.key, + // error_info.message); if (handle <= RFC_HANDLE_NULL) return 3; @@ -89,7 +89,7 @@ int32_t start_sapr3(int32_t s, char *ip, int32_t port, unsigned char options, ch return 1; } -void service_sapr3(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_sapr3(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; hydra_register_socket(sp); @@ -97,12 +97,12 @@ void service_sapr3(char *ip, int32_t sp, unsigned char options, char *miscptr, F return; while (1) { switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ next_run = start_sapr3(sock, ip, port, options, miscptr, fp); break; case 2: hydra_child_exit(0); - case 3: /* clean exit */ + case 3: /* clean exit */ fprintf(stderr, "[ERROR] could not connect to target port %d\n", port); hydra_child_exit(1); case 4: @@ -117,13 +117,13 @@ void service_sapr3(char *ip, int32_t sp, unsigned char options, char *miscptr, F #endif -int32_t service_sapr3_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_sapr3_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here @@ -131,6 +131,4 @@ int32_t service_sapr3_init(char *ip, int32_t sp, unsigned char options, char *mi return 0; } -void usage_sapr3(const char* service) { - printf("Module sapr3 requires the client id, a number between 0 and 99\n\n"); -} +void usage_sapr3(const char *service) { printf("Module sapr3 requires the client id, a number between 0 and 99\n\n"); } diff --git a/hydra-sip.c b/hydra-sip.c index 22de26c..eab654e 100644 --- a/hydra-sip.c +++ b/hydra-sip.c @@ -1,4 +1,4 @@ -/* simple sip digest auth (md5) module 2009/02/19 +/* simple sip digest auth (md5) module 2009/02/19 * written by gh0st 2005 * modified by Jean-Baptiste Aviat - should * work now, but only with -T 1 @@ -10,13 +10,11 @@ #ifndef LIBOPENSSL #include -void dummy_sip() { - printf("\n"); -} +void dummy_sip() { printf("\n"); } #else -#include #include "sasl.h" +#include extern int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec); @@ -25,8 +23,7 @@ char *get_iface_ip(uint64_t ip); int32_t cseq; extern char *HYDRA_EXIT; - -#define SIP_MAX_BUF 1024 +#define SIP_MAX_BUF 1024 void empty_register(char *buf, char *host, char *lhost, int32_t port, int32_t lport, char *user) { memset(buf, 0, SIP_MAX_BUF); @@ -50,7 +47,7 @@ int32_t get_sip_code(char *buf) { return code; } -int32_t start_sip(int32_t s, char *ip, char *lip, int32_t port, int32_t lport, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_sip(int32_t s, char *ip, char *lip, int32_t port, int32_t lport, unsigned char options, char *miscptr, FILE *fp) { char *login, *pass, *host, buffer[SIP_MAX_BUF]; int32_t i; char buf[SIP_MAX_BUF]; @@ -74,14 +71,16 @@ int32_t start_sip(int32_t s, char *ip, char *lip, int32_t port, int32_t lport, u } int32_t has_sip_cred = 0; - int32_t try = 0; + int32_t try + = 0; /* We have to check many times because server may begin to send "100 Trying" * before "401 Unauthorized" */ while (try < 2 && !has_sip_cred) { - try++; + try + ++; if (hydra_data_ready_timed(s, 3, 0) > 0) { - i = hydra_recv(s, (char *) buf, sizeof(buf) - 1); + i = hydra_recv(s, (char *)buf, sizeof(buf) - 1); if (i > 0) buf[i] = '\0'; if (strncmp(buf, "SIP/2.0 404", 11) == 0) { @@ -94,17 +93,21 @@ int32_t start_sip(int32_t s, char *ip, char *lip, int32_t port, int32_t lport, u // if we already tried to connect, exit if (external_ip_addr[0]) { - hydra_report(stdout, "[ERROR] Get error code 606 : session is not acceptable by the server\n"); + hydra_report(stdout, "[ERROR] Get error code 606 : session is not " + "acceptable by the server\n"); return 2; } if (verbose) - hydra_report(stdout, "[VERBOSE] Get error code 606 : session is not acceptable by the server,\n" - "maybe it's an addressing issue as you are using NAT, trying to reconnect\n" "using addr from the server reply\n"); - /* - SIP/2.0 606 Not Acceptable - Via: SIP/2.0/UDP 192.168.0.21:46759;received=82.227.229.137 - */ + hydra_report(stdout, "[VERBOSE] Get error code 606 : session is not " + "acceptable by the server,\n" + "maybe it's an addressing issue as you are " + "using NAT, trying to reconnect\n" + "using addr from the server reply\n"); + /* + SIP/2.0 606 Not Acceptable + Via: SIP/2.0/UDP 192.168.0.21:46759;received=82.227.229.137 + */ #ifdef HAVE_PCRE if (hydra_string_match(buf, "Via: SIP.*received=")) { ptr = strstr(buf, "received="); @@ -143,7 +146,11 @@ int32_t start_sip(int32_t s, char *ip, char *lip, int32_t port, int32_t lport, u "Via: SIP/2.0/UDP %s:%i\n" "From: \n" "To: \n" - "Call-ID: 1337@%s\n" "CSeq: %i REGISTER\n" "Authorization: Digest %s\n" "Content-Length: 0\n\n", host, lip, lport, login, host, login, host, host, cseq, buffer2); + "Call-ID: 1337@%s\n" + "CSeq: %i REGISTER\n" + "Authorization: Digest %s\n" + "Content-Length: 0\n\n", + host, lip, lport, login, host, login, host, host, cseq, buffer2); cseq++; if (debug) @@ -151,15 +158,17 @@ int32_t start_sip(int32_t s, char *ip, char *lip, int32_t port, int32_t lport, u if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { return 3; } - try = 0; + try + = 0; int32_t has_resp = 0; int32_t sip_code = 0; while (try < 2 && !has_resp) { - try++; + try + ++; if (hydra_data_ready_timed(s, 5, 0) > 0) { memset(buf, 0, sizeof(buf)); - if ((i = hydra_recv(s, (char *) buf, sizeof(buf) - 1)) >= 0) + if ((i = hydra_recv(s, (char *)buf, sizeof(buf) - 1)) >= 0) buf[i] = 0; if (debug) hydra_report(stderr, "[INFO] S: %s\n", buf); @@ -182,17 +191,18 @@ int32_t start_sip(int32_t s, char *ip, char *lip, int32_t port, int32_t lport, u return 1; } -void service_sip(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_sip(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_SIP, mysslport = PORT_SIP_SSL; - char *lip = get_iface_ip((int32_t) *(&ip[1])); + char *lip = get_iface_ip((int32_t) * (&ip[1])); hydra_register_socket(sp); // FIXME IPV6 if (ip[0] != 4) { - fprintf(stderr, "[ERROR] sip module is not ipv6 enabled yet, patches are appreciated.\n"); + fprintf(stderr, "[ERROR] sip module is not ipv6 enabled yet, patches are " + "appreciated.\n"); hydra_child_exit(2); } @@ -224,7 +234,7 @@ void service_sip(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); free(lip); hydra_child_exit(1); } @@ -263,7 +273,7 @@ char *get_iface_ip(uint64_t ip) { tparamet.sin_port = htons(2000); tparamet.sin_addr.s_addr = ip; - if (connect(sfd, (const struct sockaddr *) &tparamet, sizeof(struct sockaddr_in))) { + if (connect(sfd, (const struct sockaddr *)&tparamet, sizeof(struct sockaddr_in))) { perror("connect"); close(sfd); return NULL; @@ -271,7 +281,7 @@ char *get_iface_ip(uint64_t ip) { struct sockaddr_in *local = malloc(sizeof(struct sockaddr_in)); int32_t size = sizeof(struct sockaddr_in); - if (getsockname(sfd, (void *) local, (socklen_t *) & size)) { + if (getsockname(sfd, (void *)local, (socklen_t *)&size)) { perror("getsockname"); close(sfd); free(local); @@ -281,7 +291,7 @@ char *get_iface_ip(uint64_t ip) { char buff[32]; - if (!inet_ntop(AF_INET, (void *) &local->sin_addr, buff, 32)) { + if (!inet_ntop(AF_INET, (void *)&local->sin_addr, buff, 32)) { perror("inet_ntop"); free(local); return NULL; @@ -295,13 +305,13 @@ char *get_iface_ip(uint64_t ip) { #endif -int32_t service_sip_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_sip_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here diff --git a/hydra-smb.c b/hydra-smb.c index c46fd0f..20fd1cf 100644 --- a/hydra-smb.c +++ b/hydra-smb.c @@ -1,17 +1,14 @@ #include "hydra-mod.h" #ifndef LIBOPENSSL -void dummy_smb() { - printf("\n"); -} +void dummy_smb() { printf("\n"); } #else -#include -#include #include "hmacmd5.h" #include "sasl.h" +#include +#include // FIXME XXX BUG: several malloc()s without return code checking - /* http://technet.microsoft.com/en-us/library/cc960646.aspx @@ -41,10 +38,10 @@ http://technet.microsoft.com/en-us/library/cc960646.aspx Based on code from: SMB Auditing Tool [Copyright (C) Patrik Karlsson 2001] This code allows Hydra to directly test NTLM hashes against - a Windows. This may be useful for an auditor who has aquired - a sam._ or pwdump file and would like to quickly determine - which are valid entries. This module can also be used to test - SMB passwords against devices that do not allow clear text + a Windows. This may be useful for an auditor who has aquired + a sam._ or pwdump file and would like to quickly determine + which are valid entries. This module can also be used to test + SMB passwords against devices that do not allow clear text LanMan passwords. The "-m 'METHOD'" option is required for this module. The @@ -54,23 +51,23 @@ http://technet.microsoft.com/en-us/library/cc960646.aspx Local == Check local account. Domain == Check credentials against this hosts primary domain controller via this host. - Hash == Use a NTLM hash rather than a password. - Machine == Use the Machine's NetBIOS name as the password. + Hash == Use a NTLM hash rather than a password. + Machine == Use the Machine's NetBIOS name as the password. NTLMV2, NTLM, LMV2, LM == set the dialect Be careful of mass domain account lockout with this. For - example, assume you are checking several accounts against + example, assume you are checking several accounts against many domain workstations. If you are not using the 'L' - options and these accounts do not exist locally on the + options and these accounts do not exist locally on the workstations, each workstation will in turn check their - respective domain controller. This could cause a bunch of - lockouts. Of course, it'd look like the workstations, not + respective domain controller. This could cause a bunch of + lockouts. Of course, it'd look like the workstations, not you, were doing it. ;) **FYI, this code is unable to test accounts on default XP hosts which are not part of a domain and do not have normal file sharing enabled. Default XP does not allow shares and - returns STATUS_LOGON_FAILED for both valid and invalid + returns STATUS_LOGON_FAILED for both valid and invalid credentials. XP with simple sharing enabled returns SUCCESS for both valid and invalid credentials. If anyone knows a way to test in these configurations... @@ -80,29 +77,25 @@ http://technet.microsoft.com/en-us/library/cc960646.aspx #define WIN2000_NATIVEMODE 1 #define WIN_NETBIOSMODE 2 - #define PLAINTEXT 10 #define ENCRYPTED 11 - #ifndef CHAR_BIT #define CHAR_BIT 8 #endif #ifndef TIME_T_MIN -#define TIME_T_MIN ((time_t)0 < (time_t) -1 ? (time_t) 0 \ - : ~ (time_t) 0 << (sizeof (time_t) * CHAR_BIT - 1)) +#define TIME_T_MIN ((time_t)0 < (time_t)-1 ? (time_t)0 : ~(time_t)0 << (sizeof(time_t) * CHAR_BIT - 1)) #endif #ifndef TIME_T_MAX -#define TIME_T_MAX (~ (time_t) 0 - TIME_T_MIN) +#define TIME_T_MAX (~(time_t)0 - TIME_T_MIN) #endif -#define IVAL_NC(buf,pos) (*(uint32_t *)((char *)(buf) + (pos))) /* Non const version of above. */ -#define SIVAL(buf,pos,val) IVAL_NC(buf,pos)=((uint32_t)(val)) +#define IVAL_NC(buf, pos) (*(uint32_t *)((char *)(buf) + (pos))) /* Non const version of above. */ +#define SIVAL(buf, pos, val) IVAL_NC(buf, pos) = ((uint32_t)(val)) #define TIME_FIXUP_CONSTANT_INT 11644473600LL - extern char *HYDRA_EXIT; static unsigned char challenge[8]; static unsigned char workgroup[16]; @@ -113,43 +106,43 @@ int32_t hashFlag, accntFlag, protoFlag; int32_t smb_auth_mechanism = AUTH_NTLM; int32_t security_mode = ENCRYPTED; -static size_t UTF8_UTF16LE(unsigned char *in, int32_t insize, unsigned char *out, int32_t outsize) -{ - int32_t i=0,j=0; +static size_t UTF8_UTF16LE(unsigned char *in, int32_t insize, unsigned char *out, int32_t outsize) { + int32_t i = 0, j = 0; uint64_t ch; if (debug) { - hydra_report(stderr, "[DEBUG] UTF8_UTF16LE in:\n"); - hydra_dump_asciihex(in, insize); + hydra_report(stderr, "[DEBUG] UTF8_UTF16LE in:\n"); + hydra_dump_asciihex(in, insize); } - for (i = 0; i < insize; i++) { - if (in[i] < 128) { // one byte - out[j] = in[i]; - out[j+1] = 0; - j=j+2; - } else if ((in[i] >= 0xc0) && (in[i] <= 0xdf)) { // Two bytes - out[j+1] = 0x07 & (in[i] >> 2); - out[j] = (0xc0 & (in[i] << 6)) | (0x3f & in[i+1]); - j=j+2; - i=i+1; - } else if ((in[i] >= 0xe0) && (in[i] <= 0xef)) { // Three bytes - out[j] = (0xc0 & (in[i+1] << 6)) | (0x3f & in[i+2]); - out[j+1] = (0xf0 & (in[i] << 4)) | (0x0f & (in[i+1] >> 2)); - j=j+2; - i=i+2; - } else if ((in[i] >= 0xf0) && (in[i] <= 0xf7)) { // Four bytes - ch = ((in[i] & 0x07) << 18) + ((0x3f & in[i+1]) << 12) + ((0x3f & in[i+2]) << 6) + (0x3f & in[i+3])- 0x10000; - out[j] = (ch >> 10) & 0xff; - out[j+1] = 0xd8 | ((ch >> 18) & 0xff); - out[j+2] = ch & 0xff; - out[j+3] = 0xdc | ((ch >> 8) & 0x3 ); - j=j+4; - i=i+3; - } - if ( j-2 > outsize) break; + for (i = 0; i < insize; i++) { + if (in[i] < 128) { // one byte + out[j] = in[i]; + out[j + 1] = 0; + j = j + 2; + } else if ((in[i] >= 0xc0) && (in[i] <= 0xdf)) { // Two bytes + out[j + 1] = 0x07 & (in[i] >> 2); + out[j] = (0xc0 & (in[i] << 6)) | (0x3f & in[i + 1]); + j = j + 2; + i = i + 1; + } else if ((in[i] >= 0xe0) && (in[i] <= 0xef)) { // Three bytes + out[j] = (0xc0 & (in[i + 1] << 6)) | (0x3f & in[i + 2]); + out[j + 1] = (0xf0 & (in[i] << 4)) | (0x0f & (in[i + 1] >> 2)); + j = j + 2; + i = i + 2; + } else if ((in[i] >= 0xf0) && (in[i] <= 0xf7)) { // Four bytes + ch = ((in[i] & 0x07) << 18) + ((0x3f & in[i + 1]) << 12) + ((0x3f & in[i + 2]) << 6) + (0x3f & in[i + 3]) - 0x10000; + out[j] = (ch >> 10) & 0xff; + out[j + 1] = 0xd8 | ((ch >> 18) & 0xff); + out[j + 2] = ch & 0xff; + out[j + 3] = 0xdc | ((ch >> 8) & 0x3); + j = j + 4; + i = i + 3; + } + if (j - 2 > outsize) + break; } if (debug) { - hydra_report(stderr, "[DEBUG] UTF8_UTF16LE out:\n"); - hydra_dump_asciihex(out,j); + hydra_report(stderr, "[DEBUG] UTF8_UTF16LE out:\n"); + hydra_dump_asciihex(out, j); } return j; } @@ -157,8 +150,8 @@ static size_t UTF8_UTF16LE(unsigned char *in, int32_t insize, unsigned char *out static unsigned char Get7Bits(unsigned char *input, int32_t startBit) { register uint32_t word; - word = (unsigned) input[startBit / 8] << 8; - word |= (unsigned) input[startBit / 8 + 1]; + word = (unsigned)input[startBit / 8] << 8; + word |= (unsigned)input[startBit / 8 + 1]; word >>= 15 - (startBit % 8 + 7); @@ -176,7 +169,7 @@ static void MakeKey(unsigned char *key, unsigned char *DES_key) { DES_key[6] = Get7Bits(key, 42); DES_key[7] = Get7Bits(key, 49); - DES_set_odd_parity((DES_cblock *) DES_key); + DES_set_odd_parity((DES_cblock *)DES_key); } /* Do the DesEncryption */ @@ -186,7 +179,7 @@ void DesEncrypt(unsigned char *clear, unsigned char *key, unsigned char *cipher) MakeKey(key, DES_key); DES_set_key(&DES_key, &key_schedule); - DES_ecb_encrypt((DES_cblock *) clear, (DES_cblock *) cipher, &key_schedule, 1); + DES_ecb_encrypt((DES_cblock *)clear, (DES_cblock *)cipher, &key_schedule, 1); } /* @@ -198,7 +191,7 @@ void DesEncrypt(unsigned char *clear, unsigned char *key, unsigned char *cipher) challenge = the challenge recieved from the server */ int32_t HashLM(unsigned char **lmhash, unsigned char *pass, unsigned char *challenge) { - static unsigned char magic[] = { 0x4b, 0x47, 0x53, 0x21, 0x40, 0x23, 0x24, 0x25 }; + static unsigned char magic[] = {0x4b, 0x47, 0x53, 0x21, 0x40, 0x23, 0x24, 0x25}; unsigned char password[14 + 1]; unsigned char lm_hash[21]; unsigned char lm_response[24]; @@ -237,25 +230,25 @@ int32_t HashLM(unsigned char **lmhash, unsigned char *pass, unsigned char *chall for (i = 0; i < 16; i++) { HexValue = 0x0; for (j = 0; j < 2; j++) { - HexChar = (char) p[2 * i + j]; + HexChar = (char)p[2 * i + j]; if (HexChar > 0x39) - HexChar = HexChar | 0x20; /* convert upper case to lower */ + HexChar = HexChar | 0x20; /* convert upper case to lower */ - if (!(((HexChar >= 0x30) && (HexChar <= 0x39)) || /* 0 - 9 */ - ((HexChar >= 0x61) && (HexChar <= 0x66)))) { /* a - f */ + if (!(((HexChar >= 0x30) && (HexChar <= 0x39)) || /* 0 - 9 */ + ((HexChar >= 0x61) && (HexChar <= 0x66)))) { /* a - f */ hydra_report(stderr, "[ERROR] Invalid char (%c) for hash.\n", HexChar); HexChar = 0x30; } HexChar -= 0x30; - if (HexChar > 0x09) /* HexChar is "a" - "f" */ + if (HexChar > 0x09) /* HexChar is "a" - "f" */ HexChar -= 0x27; - HexValue = (HexValue << 4) | (char) HexChar; + HexValue = (HexValue << 4) | (char)HexChar; } - lm_hash[i] = (unsigned char) HexValue; + lm_hash[i] = (unsigned char)HexValue; } } } else { @@ -263,15 +256,15 @@ int32_t HashLM(unsigned char **lmhash, unsigned char *pass, unsigned char *chall if (hashFlag == 2) { for (i = 0; i < 16; i++) { if (machine_name[i] > 0x39) - machine_name[i] = machine_name[i] | 0x20; /* convert upper case to lower */ + machine_name[i] = machine_name[i] | 0x20; /* convert upper case to lower */ pass = machine_name; } } /* convert lower case characters to upper case */ - strncpy((char *) password, (char *) pass, 14); + strncpy((char *)password, (char *)pass, 14); for (i = 0; i < 14; i++) { - if ((password[i] >= 0x61) && (password[i] <= 0x7a)) /* a - z */ + if ((password[i] >= 0x61) && (password[i] <= 0x7a)) /* a - z */ password[i] -= 0x20; } @@ -280,7 +273,7 @@ int32_t HashLM(unsigned char **lmhash, unsigned char *pass, unsigned char *chall DesEncrypt(magic, &password[7], &lm_hash[8]); } - /* + /* NULL-pad 16-byte LM hash to 21-bytes Split resultant value into three 7-byte thirds DES-encrypt challenge using each third as a key @@ -295,15 +288,14 @@ int32_t HashLM(unsigned char **lmhash, unsigned char *pass, unsigned char *chall return 0; } - /* MakeNTLM - Function: Create a NTLM hash from the password + Function: Create a NTLM hash from the password */ int32_t MakeNTLM(unsigned char *ntlmhash, unsigned char *pass) { MD4_CTX md4Context; - unsigned char hash[16]; /* MD4_SIGNATURE_SIZE = 16 */ - unsigned char unicodePassword[256 * 2]; /* MAX_NT_PASSWORD = 256 */ + unsigned char hash[16]; /* MD4_SIGNATURE_SIZE = 16 */ + unsigned char unicodePassword[256 * 2]; /* MAX_NT_PASSWORD = 256 */ int32_t i = 0, j = 0; int32_t mdlen; unsigned char *p = NULL; @@ -312,7 +304,8 @@ int32_t MakeNTLM(unsigned char *ntlmhash, unsigned char *pass) { /* Use NTLM Hash instead of password */ if (hashFlag == 1) { - /* 1000:D42E35E1A1E4C22BD32E2170E4857C20:5E20780DD45857A68402938C7629D3B2::: */ + /* 1000:D42E35E1A1E4C22BD32E2170E4857C20:5E20780DD45857A68402938C7629D3B2::: + */ p = pass; while ((*p != '\0') && (i < 1)) { if (*p == ':') @@ -328,13 +321,13 @@ int32_t MakeNTLM(unsigned char *ntlmhash, unsigned char *pass) { for (i = 0; i < 16; i++) { HexValue = 0x0; for (j = 0; j < 2; j++) { - HexChar = (char) p[2 * i + j]; + HexChar = (char)p[2 * i + j]; if (HexChar > 0x39) - HexChar = HexChar | 0x20; /* convert upper case to lower */ + HexChar = HexChar | 0x20; /* convert upper case to lower */ - if (!(((HexChar >= 0x30) && (HexChar <= 0x39)) || /* 0 - 9 */ - ((HexChar >= 0x61) && (HexChar <= 0x66)))) { /* a - f */ + if (!(((HexChar >= 0x30) && (HexChar <= 0x39)) || /* 0 - 9 */ + ((HexChar >= 0x61) && (HexChar <= 0x66)))) { /* a - f */ /* * fprintf(stderr, "Error invalid char (%c) for hash.\n", HexChar); * hydra_child_exit(0); @@ -343,19 +336,19 @@ int32_t MakeNTLM(unsigned char *ntlmhash, unsigned char *pass) { } HexChar -= 0x30; - if (HexChar > 0x09) /* HexChar is "a" - "f" */ + if (HexChar > 0x09) /* HexChar is "a" - "f" */ HexChar -= 0x27; - HexValue = (HexValue << 4) | (char) HexChar; + HexValue = (HexValue << 4) | (char)HexChar; } - hash[i] = (unsigned char) HexValue; + hash[i] = (unsigned char)HexValue; } } else { /* Password == Machine Name */ if (hashFlag == 2) { for (i = 0; i < 16; i++) { if (machine_name[i] > 0x39) - machine_name[i] = machine_name[i] | 0x20; /* convert upper case to lower */ + machine_name[i] = machine_name[i] | 0x20; /* convert upper case to lower */ pass = machine_name; } } @@ -363,13 +356,13 @@ int32_t MakeNTLM(unsigned char *ntlmhash, unsigned char *pass) { /* Initialize the Unicode version of the secret (== password). */ /* This implicitly supports most UTF8 characters. */ - j = UTF8_UTF16LE(pass, strlen((char *) pass), unicodePassword, sizeof(unicodePassword)); + j = UTF8_UTF16LE(pass, strlen((char *)pass), unicodePassword, sizeof(unicodePassword)); - mdlen = j; /* length in bytes */ + mdlen = j; /* length in bytes */ MD4_Init(&md4Context); MD4_Update(&md4Context, unicodePassword, mdlen); - MD4_Final(hash, &md4Context); /* Tell MD4 we're done */ + MD4_Final(hash, &md4Context); /* Tell MD4 we're done */ } memcpy(ntlmhash, hash, 16); @@ -379,9 +372,9 @@ int32_t MakeNTLM(unsigned char *ntlmhash, unsigned char *pass) { /* HashLMv2 - This function implements the LMv2 response algorithm. The LMv2 response is used to - provide pass-through authentication compatibility with older servers. The response - is based on the NTLM password hash and is exactly 24 bytes. + This function implements the LMv2 response algorithm. The LMv2 response is + used to provide pass-through authentication compatibility with older servers. + The response is based on the NTLM password hash and is exactly 24 bytes. The below code is based heavily on the following resources: @@ -397,7 +390,7 @@ int32_t HashLMv2(unsigned char **LMv2hash, unsigned char *szLogin, unsigned char HMACMD5Context ctx; unsigned char kr_buf[16]; int32_t ret, i; - unsigned char client_challenge[8] = { 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88 }; + unsigned char client_challenge[8] = {0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88}; memset(ntlm_hash, 0, 16); memset(lmv2_response, 0, 24); @@ -406,52 +399,54 @@ int32_t HashLMv2(unsigned char **LMv2hash, unsigned char *szLogin, unsigned char /* --- HMAC #1 Caculations --- */ /* Calculate and set NTLM password hash */ - ret = MakeNTLM((unsigned char *) &ntlm_hash, (unsigned char *) szPassword); + ret = MakeNTLM((unsigned char *)&ntlm_hash, (unsigned char *)szPassword); if (ret == -1) return -1; /* - The Unicode uppercase username is concatenated with the Unicode authentication target - (the domain or server name specified in the Target Name field of the Type 3 message). - Note that this calculation always uses the Unicode representation, even if OEM encoding - has been negotiated; also note that the username is converted to uppercase, while the - authentication target is case-sensitive and must match the case presented in the Target + The Unicode uppercase username is concatenated with the Unicode + authentication target (the domain or server name specified in the Target + Name field of the Type 3 message). Note that this calculation always uses + the Unicode representation, even if OEM encoding has been negotiated; also + note that the username is converted to uppercase, while the authentication + target is case-sensitive and must match the case presented in the Target Name field. - The HMAC-MD5 message authentication code algorithm (described in RFC 2104) is applied to - this value using the 16-byte NTLM hash as the key. This results in a 16-byte value - the - NTLMv2 hash. + The HMAC-MD5 message authentication code algorithm (described in RFC 2104) + is applied to this value using the 16-byte NTLM hash as the key. This + results in a 16-byte value - the NTLMv2 hash. */ /* Initialize the Unicode version of the username and target. */ /* This implicitly supports 8-bit ISO8859/1 characters. */ /* convert lower case characters to upper case */ bzero(unicodeUsername, sizeof(unicodeUsername)); - for (i = 0; i < strlen((char *) szLogin); i++) { - if ((szLogin[i] >= 0x61) && (szLogin[i] <= 0x7a)) /* a - z */ - unicodeUsername[i * 2] = (unsigned char) szLogin[i] - 0x20; + for (i = 0; i < strlen((char *)szLogin); i++) { + if ((szLogin[i] >= 0x61) && (szLogin[i] <= 0x7a)) /* a - z */ + unicodeUsername[i * 2] = (unsigned char)szLogin[i] - 0x20; else - unicodeUsername[i * 2] = (unsigned char) szLogin[i]; + unicodeUsername[i * 2] = (unsigned char)szLogin[i]; } bzero(unicodeTarget, sizeof(unicodeTarget)); - for (i = 0; i < strlen((char *) workgroup); i++) - unicodeTarget[i * 2] = (unsigned char) workgroup[i]; + for (i = 0; i < strlen((char *)workgroup); i++) + unicodeTarget[i * 2] = (unsigned char)workgroup[i]; hmac_md5_init_limK_to_64(ntlm_hash, 16, &ctx); - hmac_md5_update((const unsigned char *) unicodeUsername, 2 * strlen((char *) szLogin), &ctx); - hmac_md5_update((const unsigned char *) unicodeTarget, 2 * strlen((char *) workgroup), &ctx); + hmac_md5_update((const unsigned char *)unicodeUsername, 2 * strlen((char *)szLogin), &ctx); + hmac_md5_update((const unsigned char *)unicodeTarget, 2 * strlen((char *)workgroup), &ctx); hmac_md5_final(kr_buf, &ctx); /* --- HMAC #2 Calculations --- */ /* - The challenge from the Type 2 message is concatenated with our fixed client nonce. The HMAC-MD5 - message authentication code algorithm is applied to this value using the 16-byte NTLMv2 hash - (calculated above) as the key. This results in a 16-byte output value. + The challenge from the Type 2 message is concatenated with our fixed client + nonce. The HMAC-MD5 message authentication code algorithm is applied to + this value using the 16-byte NTLMv2 hash (calculated above) as the key. + This results in a 16-byte output value. */ hmac_md5_init_limK_to_64(kr_buf, 16, &ctx); - hmac_md5_update((const unsigned char *) challenge, 8, &ctx); + hmac_md5_update((const unsigned char *)challenge, 8, &ctx); hmac_md5_update(client_challenge, 8, &ctx); hmac_md5_final(lmv2_response, &ctx); @@ -468,12 +463,13 @@ int32_t HashLMv2(unsigned char **LMv2hash, unsigned char *szLogin, unsigned char /* HashNTLMv2 - This function implements the NTLMv2 response algorithm. Support for this algorithm - was added with Microsoft Windows with NT 4.0 SP4. It should be noted that code doesn't - currently work with Microsoft Vista. While NTLMv2 authentication with Samba and Windows - 2003 functions as expected, Vista systems respond with the oh-so-helpful - "INVALID_PARAMETER" error code. LMv2-only authentication appears to work against Vista - in cases where LM and NTLM are refused. + This function implements the NTLMv2 response algorithm. Support for this + algorithm was added with Microsoft Windows with NT 4.0 SP4. It should be noted + that code doesn't currently work with Microsoft Vista. While NTLMv2 + authentication with Samba and Windows 2003 functions as expected, Vista + systems respond with the oh-so-helpful "INVALID_PARAMETER" error code. + LMv2-only authentication appears to work against Vista in cases where LM and + NTLM are refused. The below code is based heavily on the following two resources: @@ -482,7 +478,7 @@ int32_t HashLMv2(unsigned char **LMv2hash, unsigned char *szLogin, unsigned char NTLMv2 network authentication is required when attempting to authenticated to a system which has the following policy enforced: - + GPO: "Network Security: LAN Manager authentication level" Setting: "Send NTLMv2 response only\refuse LM & NTLM" */ @@ -494,30 +490,25 @@ int32_t HashNTLMv2(unsigned char **NTLMv2hash, int32_t *iByteCount, unsigned cha HMACMD5Context ctx; unsigned char kr_buf[16]; int32_t ret, i, iTargetLen; - unsigned char client_challenge[8] = { 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88 }; + unsigned char client_challenge[8] = {0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88}; /* -- Example NTLMv2 Response Data -- - [0] HMAC: (16 bytes) + [0] HMAC: (16 bytes) [16] Header: Blob Signature [01 01 00 00] (4 bytes) [20] Reserved: [00 00 00 00] (4 bytes) - [24] Time: Little-endian, 64-bit signed value representing the number of - tenths of a microsecond since January 1, 1601. (8 bytes) - [32] Client Nonce: (8 bytes) - [40] Unknown: 00 00 00 00 (4 bytes) - [44] Target Information (from the Type 2 message) - NetBIOS domain/workgroup: - Type: domain 02 00 (2 bytes) - Length: 12 00 (2 bytes) - Name: WORKGROUP [NULL spacing -> 57 00 4f 00 ...] (18 bytes) - End-of-list: 00 00 00 00 (4 bytes) + [24] Time: Little-endian, 64-bit signed value representing the number + of tenths of a microsecond since January 1, 1601. (8 bytes) [32] Client + Nonce: (8 bytes) [40] Unknown: 00 00 00 00 (4 bytes) [44] Target + Information (from the Type 2 message) NetBIOS domain/workgroup: Type: + domain 02 00 (2 bytes) Length: 12 00 (2 bytes) Name: WORKGROUP [NULL + spacing -> 57 00 4f 00 ...] (18 bytes) End-of-list: 00 00 00 00 (4 bytes) Termination: 00 00 00 00 (4 bytes) */ - - iTargetLen = 2 * strlen((char *) workgroup); + iTargetLen = 2 * strlen((char *)workgroup); memset(ntlm_hash, 0, 16); memset(ntlmv2_response, 0, 56 + 20 * 2 + 256 * 2); @@ -526,69 +517,70 @@ int32_t HashNTLMv2(unsigned char **NTLMv2hash, int32_t *iByteCount, unsigned cha /* --- HMAC #1 Caculations --- */ /* Calculate and set NTLM password hash */ - ret = MakeNTLM((unsigned char *) &ntlm_hash, (unsigned char *) szPassword); + ret = MakeNTLM((unsigned char *)&ntlm_hash, (unsigned char *)szPassword); if (ret == -1) return -1; /* - The Unicode uppercase username is concatenated with the Unicode authentication target - (the domain or server name specified in the Target Name field of the Type 3 message). - Note that this calculation always uses the Unicode representation, even if OEM encoding - has been negotiated; also note that the username is converted to uppercase, while the - authentication target is case-sensitive and must match the case presented in the Target + The Unicode uppercase username is concatenated with the Unicode + authentication target (the domain or server name specified in the Target + Name field of the Type 3 message). Note that this calculation always uses + the Unicode representation, even if OEM encoding has been negotiated; also + note that the username is converted to uppercase, while the authentication + target is case-sensitive and must match the case presented in the Target Name field. - The HMAC-MD5 message authentication code algorithm (described in RFC 2104) is applied to - this value using the 16-byte NTLM hash as the key. This results in a 16-byte value - the - NTLMv2 hash. + The HMAC-MD5 message authentication code algorithm (described in RFC 2104) + is applied to this value using the 16-byte NTLM hash as the key. This + results in a 16-byte value - the NTLMv2 hash. */ /* Initialize the Unicode version of the username and target. */ /* This implicitly supports 8-bit ISO8859/1 characters. */ /* convert lower case characters to upper case */ bzero(unicodeUsername, sizeof(unicodeUsername)); - for (i = 0; i < strlen((char *) szLogin); i++) { - if ((szLogin[i] >= 0x61) && (szLogin[i] <= 0x7a)) /* a - z */ - unicodeUsername[i * 2] = (unsigned char) szLogin[i] - 0x20; + for (i = 0; i < strlen((char *)szLogin); i++) { + if ((szLogin[i] >= 0x61) && (szLogin[i] <= 0x7a)) /* a - z */ + unicodeUsername[i * 2] = (unsigned char)szLogin[i] - 0x20; else - unicodeUsername[i * 2] = (unsigned char) szLogin[i]; + unicodeUsername[i * 2] = (unsigned char)szLogin[i]; } bzero(unicodeTarget, sizeof(unicodeTarget)); - for (i = 0; i < strlen((char *) workgroup); i++) - unicodeTarget[i * 2] = (unsigned char) workgroup[i]; + for (i = 0; i < strlen((char *)workgroup); i++) + unicodeTarget[i * 2] = (unsigned char)workgroup[i]; hmac_md5_init_limK_to_64(ntlm_hash, 16, &ctx); - hmac_md5_update((const unsigned char *) unicodeUsername, 2 * strlen((char *) szLogin), &ctx); - hmac_md5_update((const unsigned char *) unicodeTarget, 2 * strlen((char *) workgroup), &ctx); + hmac_md5_update((const unsigned char *)unicodeUsername, 2 * strlen((char *)szLogin), &ctx); + hmac_md5_update((const unsigned char *)unicodeTarget, 2 * strlen((char *)workgroup), &ctx); hmac_md5_final(kr_buf, &ctx); /* --- Blob Construction --- */ - memset(ntlmv2_response + 16, 1, 2); /* Blob Signature 0x01010000 */ + memset(ntlmv2_response + 16, 1, 2); /* Blob Signature 0x01010000 */ memset(ntlmv2_response + 18, 0, 2); - memset(ntlmv2_response + 20, 0, 4); /* Reserved */ + memset(ntlmv2_response + 20, 0, 4); /* Reserved */ /* Time -- Take a Unix time and convert to an NT TIME structure: - Little-endian, 64-bit signed value representing the number of tenths of a + Little-endian, 64-bit signed value representing the number of tenths of a microsecond since January 1, 1601. */ struct timespec ts; unsigned long long nt; - ts.tv_sec = (time_t) time(NULL); + ts.tv_sec = (time_t)time(NULL); ts.tv_nsec = 0; if (ts.tv_sec == 0) nt = 0; else if (ts.tv_sec == TIME_T_MAX) nt = 0x7fffffffffffffffLL; - else if (ts.tv_sec == (time_t) - 1) - nt = (unsigned long) -1; + else if (ts.tv_sec == (time_t)-1) + nt = (unsigned long)-1; else { nt = ts.tv_sec; nt += TIME_FIXUP_CONSTANT_INT; - nt *= 1000 * 1000 * 10; /* nt is now in the 100ns units */ + nt *= 1000 * 1000 * 10; /* nt is now in the 100ns units */ } SIVAL(ntlmv2_response + 24, 0, nt & 0xFFFFFFFF); @@ -596,8 +588,8 @@ int32_t HashNTLMv2(unsigned char **NTLMv2hash, int32_t *iByteCount, unsigned cha /* End time calculation */ /* Set client challenge - using a non-random value in this case. */ - memcpy(ntlmv2_response + 32, client_challenge, 8); /* Client Nonce */ - memset(ntlmv2_response + 40, 0, 4); /* Unknown */ + memcpy(ntlmv2_response + 32, client_challenge, 8); /* Client Nonce */ + memset(ntlmv2_response + 40, 0, 4); /* Unknown */ /* Target Information Block */ /* @@ -606,26 +598,28 @@ int32_t HashNTLMv2(unsigned char **NTLMv2hash, int32_t *iByteCount, unsigned cha 0x0300 Fully-qualified DNS host name 0x0400 DNS domain name - TODO: Need to rework negotiation code to correctly extract target information + TODO: Need to rework negotiation code to correctly extract target + information */ - memset(ntlmv2_response + 44, 0x02, 1); /* Type: Domain */ + memset(ntlmv2_response + 44, 0x02, 1); /* Type: Domain */ memset(ntlmv2_response + 45, 0x00, 1); - memset(ntlmv2_response + 46, iTargetLen, 1); /* Length */ + memset(ntlmv2_response + 46, iTargetLen, 1); /* Length */ memset(ntlmv2_response + 47, 0x00, 1); /* Name of domain or workgroup */ - for (i = 0; i < strlen((char *) workgroup); i++) - ntlmv2_response[48 + i * 2] = (unsigned char) workgroup[i]; + for (i = 0; i < strlen((char *)workgroup); i++) + ntlmv2_response[48 + i * 2] = (unsigned char)workgroup[i]; - memset(ntlmv2_response + 48 + iTargetLen, 0, 4); /* End-of-list */ + memset(ntlmv2_response + 48 + iTargetLen, 0, 4); /* End-of-list */ /* --- HMAC #2 Caculations --- */ /* - The challenge from the Type 2 message is concatenated with the blob. The HMAC-MD5 message - authentication code algorithm is applied to this value using the 16-byte NTLMv2 hash - (calculated above) as the key. This results in a 16-byte output value. + The challenge from the Type 2 message is concatenated with the blob. The + HMAC-MD5 message authentication code algorithm is applied to this value + using the 16-byte NTLMv2 hash (calculated above) as the key. This results + in a 16-byte output value. */ hmac_md5_init_limK_to_64(kr_buf, 16, &ctx); @@ -652,11 +646,11 @@ int32_t HashNTLMv2(unsigned char **NTLMv2hash, int32_t *iByteCount, unsigned cha */ int32_t HashNTLM(unsigned char **ntlmhash, unsigned char *pass, unsigned char *challenge, char *miscptr) { int32_t ret; - unsigned char hash[16]; /* MD4_SIGNATURE_SIZE = 16 */ + unsigned char hash[16]; /* MD4_SIGNATURE_SIZE = 16 */ unsigned char p21[21]; unsigned char ntlm_response[24]; - ret = MakeNTLM((unsigned char *) &hash, (unsigned char *) pass); + ret = MakeNTLM((unsigned char *)&hash, (unsigned char *)pass); if (ret == -1) hydra_child_exit(0); @@ -678,9 +672,9 @@ int32_t HashNTLM(unsigned char **ntlmhash, unsigned char *pass, unsigned char *c Returns: TRUE on success else FALSE. */ int32_t NBSSessionRequest(int32_t s) { - char nb_name[32]; /* netbiosname */ - char nb_local[32]; /* netbios localredirector */ - unsigned char rqbuf[7] = { 0x81, 0x00, 0x00, 0x44, 0x20, 0x00, 0x20 }; + char nb_name[32]; /* netbiosname */ + char nb_local[32]; /* netbios localredirector */ + unsigned char rqbuf[7] = {0x81, 0x00, 0x00, 0x44, 0x20, 0x00, 0x20}; char *buf; unsigned char rbuf[400]; int32_t k; @@ -692,31 +686,30 @@ int32_t NBSSessionRequest(int32_t s) { /* convert computer name to netbios name */ memset(nb_name, 0, 32); memset(nb_local, 0, 32); - memcpy(nb_name, "CKFDENECFDEFFCFGEFFCCACACACACACA", 32); /* *SMBSERVER */ - memcpy(nb_local, "EIFJEEFCEBCACACACACACACACACACACA", 32); /* HYDRA */ + memcpy(nb_name, "CKFDENECFDEFFCFGEFFCCACACACACACA", 32); /* *SMBSERVER */ + memcpy(nb_local, "EIFJEEFCEBCACACACACACACACACACACA", 32); /* HYDRA */ - if ((buf = (char *) malloc(100)) == NULL) + if ((buf = (char *)malloc(100)) == NULL) return -1; memset(buf, 0, 100); - memcpy(buf, (char *) rqbuf, 5); + memcpy(buf, (char *)rqbuf, 5); memcpy(buf + 5, nb_name, 32); - memcpy(buf + 37, (char *) rqbuf + 5, 2); + memcpy(buf + 37, (char *)rqbuf + 5, 2); memcpy(buf + 39, nb_local, 32); - memcpy(buf + 71, (char *) rqbuf + 5, 1); + memcpy(buf + 71, (char *)rqbuf + 5, 1); hydra_send(s, buf, 72, 0); free(buf); memset(rbuf, 0, 400); - k = hydra_recv(s, (char *) rbuf, sizeof(rbuf)); + k = hydra_recv(s, (char *)rbuf, sizeof(rbuf)); if (k > 0 && (rbuf[0] == 0x82)) - return 0; /* success */ + return 0; /* success */ else - return -1; /* failed */ + return -1; /* failed */ } - /* SMBNegProt Function: Negotiate protocol with server ... @@ -728,61 +721,39 @@ int32_t NBSSessionRequest(int32_t s) { */ int32_t SMBNegProt(int32_t s) { unsigned char buf[] = { - 0x00, 0x00, 0x00, 0xbe, 0xff, 0x53, 0x4d, 0x42, - 0x72, 0x00, 0x00, 0x00, 0x00, 0x08, 0x01, 0xc0, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x3c, 0x7d, - 0x00, 0x00, 0x01, 0x00, 0x00, 0x9b, 0x00, 0x02, - 0x50, 0x43, 0x20, 0x4e, 0x45, 0x54, 0x57, 0x4f, - 0x52, 0x4b, 0x20, 0x50, 0x52, 0x4f, 0x47, 0x52, - 0x41, 0x4d, 0x20, 0x31, 0x2e, 0x30, 0x00, 0x02, - 0x4d, 0x49, 0x43, 0x52, 0x4f, 0x53, 0x4f, 0x46, - 0x54, 0x20, 0x4e, 0x45, 0x54, 0x57, 0x4f, 0x52, - 0x4b, 0x53, 0x20, 0x31, 0x2e, 0x30, 0x33, 0x00, - 0x02, 0x4d, 0x49, 0x43, 0x52, 0x4f, 0x53, 0x4f, - 0x46, 0x54, 0x20, 0x4e, 0x45, 0x54, 0x57, 0x4f, - 0x52, 0x4b, 0x53, 0x20, 0x33, 0x2e, 0x30, 0x00, - 0x02, 0x4c, 0x41, 0x4e, 0x4d, 0x41, 0x4e, 0x31, - 0x2e, 0x30, 0x00, 0x02, 0x4c, 0x4d, 0x31, 0x2e, - 0x32, 0x58, 0x30, 0x30, 0x32, 0x00, 0x02, 0x44, - 0x4f, 0x53, 0x20, 0x4c, 0x41, 0x4e, 0x4d, 0x41, - 0x4e, 0x32, 0x2e, 0x31, 0x00, 0x02, 0x4c, 0x41, - 0x4e, 0x4d, 0x41, 0x4e, 0x32, 0x2e, 0x31, 0x00, - 0x02, 0x53, 0x61, 0x6d, 0x62, 0x61, 0x00, 0x02, - 0x4e, 0x54, 0x20, 0x4c, 0x41, 0x4e, 0x4d, 0x41, - 0x4e, 0x20, 0x31, 0x2e, 0x30, 0x00, 0x02, 0x4e, - 0x54, 0x20, 0x4c, 0x4d, 0x20, 0x30, 0x2e, 0x31, - 0x32, 0x00 + 0x00, 0x00, 0x00, 0xbe, 0xff, 0x53, 0x4d, 0x42, 0x72, 0x00, 0x00, 0x00, 0x00, 0x08, 0x01, 0xc0, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x3c, 0x7d, 0x00, 0x00, 0x01, 0x00, 0x00, 0x9b, 0x00, 0x02, 0x50, 0x43, 0x20, 0x4e, 0x45, 0x54, 0x57, 0x4f, 0x52, 0x4b, 0x20, 0x50, 0x52, 0x4f, 0x47, 0x52, 0x41, 0x4d, 0x20, 0x31, 0x2e, 0x30, 0x00, 0x02, 0x4d, + 0x49, 0x43, 0x52, 0x4f, 0x53, 0x4f, 0x46, 0x54, 0x20, 0x4e, 0x45, 0x54, 0x57, 0x4f, 0x52, 0x4b, 0x53, 0x20, 0x31, 0x2e, 0x30, 0x33, 0x00, 0x02, 0x4d, 0x49, 0x43, 0x52, 0x4f, 0x53, 0x4f, 0x46, 0x54, 0x20, 0x4e, 0x45, 0x54, 0x57, 0x4f, 0x52, 0x4b, 0x53, 0x20, 0x33, 0x2e, 0x30, 0x00, 0x02, 0x4c, 0x41, 0x4e, 0x4d, 0x41, 0x4e, 0x31, 0x2e, 0x30, 0x00, 0x02, 0x4c, 0x4d, 0x31, 0x2e, 0x32, 0x58, + 0x30, 0x30, 0x32, 0x00, 0x02, 0x44, 0x4f, 0x53, 0x20, 0x4c, 0x41, 0x4e, 0x4d, 0x41, 0x4e, 0x32, 0x2e, 0x31, 0x00, 0x02, 0x4c, 0x41, 0x4e, 0x4d, 0x41, 0x4e, 0x32, 0x2e, 0x31, 0x00, 0x02, 0x53, 0x61, 0x6d, 0x62, 0x61, 0x00, 0x02, 0x4e, 0x54, 0x20, 0x4c, 0x41, 0x4e, 0x4d, 0x41, 0x4e, 0x20, 0x31, 0x2e, 0x30, 0x00, 0x02, 0x4e, 0x54, 0x20, 0x4c, 0x4d, 0x20, 0x30, 0x2e, 0x31, 0x32, 0x00 -/* -0x02, - 0x50, 0x43, 0x20, 0x4e, 0x45, 0x54, 0x57, 0x4f, - 0x52, 0x4b, 0x20, 0x50, 0x52, 0x4f, 0x47, 0x52, - 0x41, 0x4d, 0x20, 0x31, 0x2e, 0x30, 0x00, 0x02, - 0x4d, 0x49, 0x43, 0x52, 0x4f, 0x53, 0x4f, 0x46, - 0x54, 0x20, 0x4e, 0x45, 0x54, 0x57, 0x4f, 0x52, - 0x4b, 0x53, 0x20, 0x31, 0x2e, 0x30, 0x33, 0x00, - 0x02, 0x4d, 0x49, 0x43, 0x52, 0x4f, 0x53, 0x4f, - 0x46, 0x54, 0x20, 0x4e, 0x45, 0x54, 0x57, 0x4f, - 0x52, 0x4b, 0x53, 0x20, 0x33, 0x2e, 0x30, 0x00, - 0x02, 0x4c, 0x41, 0x4e, 0x4d, 0x41, 0x4e, 0x31, - 0x2e, 0x30, 0x00, 0x02, 0x4c, 0x4d, 0x31, 0x2e, - 0x32, 0x58, 0x30, 0x30, 0x32, 0x00, 0x02, 0x53, - 0x61, 0x6d, 0x62, 0x61, 0x00, 0x02, 0x4e, 0x54, - 0x20, 0x4c, 0x41, 0x4e, 0x4d, 0x41, 0x4e, 0x20, - 0x31, 0x2e, 0x30, 0x00, 0x02, 0x4e, 0x54, 0x20, - 0x4c, 0x4d, 0x20, 0x30, 0x2e, 0x31, 0x32, 0x00 -*/ + /* + 0x02, + 0x50, 0x43, 0x20, 0x4e, 0x45, 0x54, 0x57, 0x4f, + 0x52, 0x4b, 0x20, 0x50, 0x52, 0x4f, 0x47, 0x52, + 0x41, 0x4d, 0x20, 0x31, 0x2e, 0x30, 0x00, 0x02, + 0x4d, 0x49, 0x43, 0x52, 0x4f, 0x53, 0x4f, 0x46, + 0x54, 0x20, 0x4e, 0x45, 0x54, 0x57, 0x4f, 0x52, + 0x4b, 0x53, 0x20, 0x31, 0x2e, 0x30, 0x33, 0x00, + 0x02, 0x4d, 0x49, 0x43, 0x52, 0x4f, 0x53, 0x4f, + 0x46, 0x54, 0x20, 0x4e, 0x45, 0x54, 0x57, 0x4f, + 0x52, 0x4b, 0x53, 0x20, 0x33, 0x2e, 0x30, 0x00, + 0x02, 0x4c, 0x41, 0x4e, 0x4d, 0x41, 0x4e, 0x31, + 0x2e, 0x30, 0x00, 0x02, 0x4c, 0x4d, 0x31, 0x2e, + 0x32, 0x58, 0x30, 0x30, 0x32, 0x00, 0x02, 0x53, + 0x61, 0x6d, 0x62, 0x61, 0x00, 0x02, 0x4e, 0x54, + 0x20, 0x4c, 0x41, 0x4e, 0x4d, 0x41, 0x4e, 0x20, + 0x31, 0x2e, 0x30, 0x00, 0x02, 0x4e, 0x54, 0x20, + 0x4c, 0x4d, 0x20, 0x30, 0x2e, 0x31, 0x32, 0x00 + */ }; unsigned char rbuf[400]; unsigned char sess_key[2]; - unsigned char userid[2] = { 0xCD, 0xEF }; + unsigned char userid[2] = {0xCD, 0xEF}; int32_t i = 0, j = 0, k; int32_t iLength = 194; int32_t iResponseOffset = 73; - memset((char *) rbuf, 0, 400); + memset((char *)rbuf, 0, 400); /* set session key */ sess_key[1] = getpid() / 100; @@ -793,24 +764,24 @@ int32_t SMBNegProt(int32_t s) { if (smb_auth_mechanism == AUTH_LM) { if (verbose) hydra_report(stderr, "[VERBOSE] Setting Negotiate Protocol Response for LM.\n"); - buf[3] = 0xA3; // Set message length - buf[37] = 0x80; // Set byte count for dialects + buf[3] = 0xA3; // Set message length + buf[37] = 0x80; // Set byte count for dialects iLength = 167; iResponseOffset = 65; } - - hydra_send(s, (char *) buf, iLength, 0); - k = hydra_recv(s, (char *) rbuf, sizeof(rbuf)); + hydra_send(s, (char *)buf, iLength, 0); + k = hydra_recv(s, (char *)rbuf, sizeof(rbuf)); if (k == 0) return 3; /* retrieve the security mode */ /* - [0] Mode: (0) ? (1) USER security mode - [1] Password: (0) PLAINTEXT password (1) ENCRYPTED password. Use challenge/response - [2] Signatures: (0) Security signatures NOT enabled (1) ENABLED - [3] Sig Req: (0) Security signatures NOT required (1) REQUIRED + [0] Mode: (0) ? (1) USER security + mode [1] Password: (0) PLAINTEXT password (1) ENCRYPTED + password. Use challenge/response [2] Signatures: (0) Security signatures + NOT enabled (1) ENABLED [3] Sig Req: (0) Security signatures NOT + required (1) REQUIRED SAMBA: 0x01 (default) WinXP: 0x0F (default) @@ -818,25 +789,28 @@ int32_t SMBNegProt(int32_t s) { */ switch (rbuf[39]) { case 0x01: - //real plaintext should be used with LM auth + // real plaintext should be used with LM auth if (verbose) hydra_report(stderr, "[VERBOSE] Server requested PLAINTEXT password.\n"); security_mode = PLAINTEXT; if (hashFlag == 1) { if (verbose) - hydra_report(stderr, "[VERBOSE] Server requested PLAINTEXT password. HASH password mode not supported for this configuration.\n"); + hydra_report(stderr, "[VERBOSE] Server requested PLAINTEXT password. HASH " + "password mode not supported for this configuration.\n"); return 3; } if (hashFlag == 2) { if (verbose) - hydra_report(stderr, "[VERBOSE] Server requested PLAINTEXT password. MACHINE password mode not supported for this configuration.\n"); + hydra_report(stderr, "[VERBOSE] Server requested PLAINTEXT password. MACHINE " + "password mode not supported for this configuration.\n"); return 3; } break; case 0x03: if (verbose) - hydra_report(stderr, "[VERBOSE] Server requested ENCRYPTED password without security signatures.\n"); + hydra_report(stderr, "[VERBOSE] Server requested ENCRYPTED password " + "without security signatures.\n"); security_mode = ENCRYPTED; break; case 0x07: @@ -847,20 +821,23 @@ int32_t SMBNegProt(int32_t s) { break; default: if (verbose) - hydra_report(stderr, "[VERBOSE] Unknown security mode request: %2.2X. Proceeding using ENCRYPTED password mode.\n", rbuf[39]); + hydra_report(stderr, + "[VERBOSE] Unknown security mode request: %2.2X. Proceeding " + "using ENCRYPTED password mode.\n", + rbuf[39]); security_mode = ENCRYPTED; break; } /* Retrieve the challenge */ - memcpy(challenge, (char *) rbuf + iResponseOffset, sizeof(challenge)); + memcpy(challenge, (char *)rbuf + iResponseOffset, sizeof(challenge)); /* Find the primary domain/workgroup name */ memset(workgroup, 0, 16); memset(machine_name, 0, 16); - //seems using LM only the domain is returned not the server - //and the domain is not padded with null chars + // seems using LM only the domain is returned not the server + // and the domain is not padded with null chars if (smb_auth_mechanism == AUTH_LM) { while ((rbuf[iResponseOffset + 8 + i] != 0) && (i < 16)) { workgroup[i] = rbuf[iResponseOffset + 8 + i]; @@ -882,12 +859,10 @@ int32_t SMBNegProt(int32_t s) { hydra_report(stderr, "[VERBOSE] Server machine name: %s\n", machine_name); hydra_report(stderr, "[VERBOSE] Server primary domain: %s\n", workgroup); } - //success + // success return 2; } - - /* SMBSessionSetup Function: Send username + response to the challenge from @@ -900,7 +875,7 @@ unsigned long SMBSessionSetup(int32_t s, char *szLogin, char *szPassword, char * unsigned char *NTLMv2hash = NULL; unsigned char *NTLMhash = NULL; unsigned char *LMhash = NULL; -// unsigned char unicodeLogin[32 * 2]; + // unsigned char unicodeLogin[32 * 2]; int32_t j; char bufReceive[512]; int32_t nReceiveBufferSize = 0; @@ -908,37 +883,58 @@ unsigned long SMBSessionSetup(int32_t s, char *szLogin, char *szPassword, char * int32_t iByteCount = 0, iOffset = 0; if (accntFlag == 0) { - strcpy((char *) workgroup, "localhost"); + strcpy((char *)workgroup, "localhost"); } else if (accntFlag == 2) { memset(workgroup, 0, 16); } - //domain flag is not needed here, it will be auto set, - //below it's domain specified on cmd line + // domain flag is not needed here, it will be auto set, + // below it's domain specified on cmd line else if (accntFlag == 4) { - strncpy((char *) workgroup, (char *) domain, 16); + strncpy((char *)workgroup, (char *)domain, 16); } /* NetBIOS Session Service */ unsigned char szNBSS[4] = { - 0x00, /* Message Type: Session Message */ - 0x00, 0x00, 0x85 /* Length -- MUST SET */ + 0x00, /* Message Type: Session Message */ + 0x00, 0x00, 0x85 /* Length -- MUST SET */ }; /* SMB Header */ unsigned char szSMB[32] = { - 0xff, 0x53, 0x4d, 0x42, /* Server Component */ - 0x73, /* SMB Command: Session Setup AndX */ - 0x00, 0x00, 0x00, 0x00, /* NT Status: STATUS_SUCCESS */ - 0x08, /* Flags */ - 0x01, 0xc0, /* Flags2 */ /* add Unicode */ - 0x00, 0x00, /* Process ID High */ - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* Signature */ - 0x00, 0x00, /* Reserved */ - 0x00, 0x00, /* Tree ID */ - 0x13, 0x37, /* Process ID */ - 0x00, 0x00, /* User ID */ - 0x01, 0x00 /* Multiplx ID */ + 0xff, + 0x53, + 0x4d, + 0x42, /* Server Component */ + 0x73, /* SMB Command: Session Setup AndX */ + 0x00, + 0x00, + 0x00, + 0x00, /* NT Status: STATUS_SUCCESS */ + 0x08, /* Flags */ + 0x01, + 0xc0, + /* Flags2 */ /* add Unicode */ + 0x00, + 0x00, /* Process ID High */ + 0x00, + 0x00, + 0x00, + 0x00, + 0x00, + 0x00, + 0x00, + 0x00, /* Signature */ + 0x00, + 0x00, /* Reserved */ + 0x00, + 0x00, /* Tree ID */ + 0x13, + 0x37, /* Process ID */ + 0x00, + 0x00, /* User ID */ + 0x01, + 0x00 /* Multiplx ID */ }; memset(buf, 0, 512); @@ -952,31 +948,31 @@ unsigned long SMBSessionSetup(int32_t s, char *szLogin, char *szPassword, char * hydra_report(stderr, "[VERBOSE] Attempting LM password authentication.\n"); unsigned char szSessionRequest[23] = { - 0x0a, /* Word Count */ - 0xff, /* AndXCommand: No further commands */ - 0x00, /* Reserved */ - 0x00, 0x00, /* AndXOffset */ - 0xff, 0xff, /* Max Buffer */ - 0x02, 0x00, /* Max Mpx Count */ - 0x3c, 0x7d, /* VC Number */ - 0x00, 0x00, 0x00, 0x00, /* Session Key */ - 0x18, 0x00, /* LAN Manager Password Hash Length */ - 0x00, 0x00, 0x00, 0x00, /* Reserved */ - 0x49, 0x00 /* Byte Count -- MUST SET */ + 0x0a, /* Word Count */ + 0xff, /* AndXCommand: No further commands */ + 0x00, /* Reserved */ + 0x00, 0x00, /* AndXOffset */ + 0xff, 0xff, /* Max Buffer */ + 0x02, 0x00, /* Max Mpx Count */ + 0x3c, 0x7d, /* VC Number */ + 0x00, 0x00, 0x00, 0x00, /* Session Key */ + 0x18, 0x00, /* LAN Manager Password Hash Length */ + 0x00, 0x00, 0x00, 0x00, /* Reserved */ + 0x49, 0x00 /* Byte Count -- MUST SET */ }; - iOffset = 59; /* szNBSS + szSMB + szSessionRequest */ - iByteCount = 24; /* Start with length of LM hash */ + iOffset = 59; /* szNBSS + szSMB + szSessionRequest */ + iByteCount = 24; /* Start with length of LM hash */ /* Set Session Setup AndX Request header information */ memcpy(buf + 36, szSessionRequest, 23); /* Calculate and set LAN Manager password hash */ - if ((LMhash = (unsigned char *) malloc(24)) == NULL) + if ((LMhash = (unsigned char *)malloc(24)) == NULL) return -1; memset(LMhash, 0, 24); - ret = HashLM(&LMhash, (unsigned char *) szPassword, (unsigned char *) challenge); + ret = HashLM(&LMhash, (unsigned char *)szPassword, (unsigned char *)challenge); if (ret == -1) { free(LMhash); return -1; @@ -990,34 +986,52 @@ unsigned long SMBSessionSetup(int32_t s, char *szLogin, char *szPassword, char * hydra_report(stderr, "[VERBOSE] Attempting NTLM password authentication.\n"); unsigned char szSessionRequest[29] = { - 0x0d, /* Word Count */ - 0xff, /* AndXCommand: No further commands */ - 0x00, /* Reserved */ - 0x00, 0x00, /* AndXOffset */ - 0xff, 0xff, /* Max Buffer */ - 0x02, 0x00, /* Max Mpx Count */ - 0x3c, 0x7d, /* VC Number */ - 0x00, 0x00, 0x00, 0x00, /* Session Key */ - 0x18, 0x00, /* LAN Manager Password Hash Length */ - 0x18, 0x00, /* NT LAN Manager Password Hash Length */ - 0x00, 0x00, 0x00, 0x00, /* Reserved */ - 0x5c, 0x00, 0x00, 0x00, /* Capabilities */ /* Add Unicode */ - 0x49, 0x00 /* Byte Count -- MUST SET */ + 0x0d, /* Word Count */ + 0xff, /* AndXCommand: No further commands */ + 0x00, /* Reserved */ + 0x00, + 0x00, /* AndXOffset */ + 0xff, + 0xff, /* Max Buffer */ + 0x02, + 0x00, /* Max Mpx Count */ + 0x3c, + 0x7d, /* VC Number */ + 0x00, + 0x00, + 0x00, + 0x00, /* Session Key */ + 0x18, + 0x00, /* LAN Manager Password Hash Length */ + 0x18, + 0x00, /* NT LAN Manager Password Hash Length */ + 0x00, + 0x00, + 0x00, + 0x00, /* Reserved */ + 0x5c, + 0x00, + 0x00, + 0x00, + /* Capabilities */ /* Add Unicode */ + 0x49, + 0x00 /* Byte Count -- MUST SET */ }; - iOffset = 65; /* szNBSS + szSMB + szSessionRequest */ - iByteCount = 48; /* Start with length of NTLM and LM hashes */ + iOffset = 65; /* szNBSS + szSMB + szSessionRequest */ + iByteCount = 48; /* Start with length of NTLM and LM hashes */ /* Set Session Setup AndX Request header information */ memcpy(buf + 36, szSessionRequest, 29); /* Calculate and set NTLM password hash */ - if ((NTLMhash = (unsigned char *) malloc(24)) == NULL) + if ((NTLMhash = (unsigned char *)malloc(24)) == NULL) return -1; memset(NTLMhash, 0, 24); - /* We don't need to actually calculated a LM hash for this mode, only NTLM */ - ret = HashNTLM(&NTLMhash, (unsigned char *) szPassword, (unsigned char *) challenge, miscptr); + /* We don't need to actually calculated a LM hash for this mode, only NTLM + */ + ret = HashNTLM(&NTLMhash, (unsigned char *)szPassword, (unsigned char *)challenge, miscptr); if (ret == -1) return -1; @@ -1028,33 +1042,33 @@ unsigned long SMBSessionSetup(int32_t s, char *szLogin, char *szPassword, char * hydra_report(stderr, "[VERBOSE] Attempting LMv2 password authentication.\n"); unsigned char szSessionRequest[29] = { - 0x0d, /* Word Count */ - 0xff, /* AndXCommand: No further commands */ - 0x00, /* Reserved */ - 0x00, 0x00, /* AndXOffset */ - 0xff, 0xff, /* Max Buffer */ - 0x02, 0x00, /* Max Mpx Count */ - 0x3c, 0x7d, /* VC Number */ - 0x00, 0x00, 0x00, 0x00, /* Session Key */ - 0x18, 0x00, /* LAN Manager Password Hash Length */ - 0x00, 0x00, /* NT LAN Manager Password Hash Length */ - 0x00, 0x00, 0x00, 0x00, /* Reserved */ - 0x50, 0x00, 0x00, 0x00, /* Capabilities */ - 0x49, 0x00 /* Byte Count -- MUST SET */ + 0x0d, /* Word Count */ + 0xff, /* AndXCommand: No further commands */ + 0x00, /* Reserved */ + 0x00, 0x00, /* AndXOffset */ + 0xff, 0xff, /* Max Buffer */ + 0x02, 0x00, /* Max Mpx Count */ + 0x3c, 0x7d, /* VC Number */ + 0x00, 0x00, 0x00, 0x00, /* Session Key */ + 0x18, 0x00, /* LAN Manager Password Hash Length */ + 0x00, 0x00, /* NT LAN Manager Password Hash Length */ + 0x00, 0x00, 0x00, 0x00, /* Reserved */ + 0x50, 0x00, 0x00, 0x00, /* Capabilities */ + 0x49, 0x00 /* Byte Count -- MUST SET */ }; - iOffset = 65; /* szNBSS + szSMB + szSessionRequest */ - iByteCount = 24; /* Start with length of LMv2 response */ + iOffset = 65; /* szNBSS + szSMB + szSessionRequest */ + iByteCount = 24; /* Start with length of LMv2 response */ /* Set Session Setup AndX Request header information */ memcpy(buf + 36, szSessionRequest, 29); /* Calculate and set LMv2 response hash */ - if ((LMv2hash = (unsigned char *) malloc(24)) == NULL) + if ((LMv2hash = (unsigned char *)malloc(24)) == NULL) return -1; memset(LMv2hash, 0, 24); - ret = HashLMv2(&LMv2hash, (unsigned char *) szLogin, (unsigned char *) szPassword); + ret = HashLMv2(&LMv2hash, (unsigned char *)szLogin, (unsigned char *)szPassword); if (ret == -1) { free(LMv2hash); return -1; @@ -1067,28 +1081,28 @@ unsigned long SMBSessionSetup(int32_t s, char *szLogin, char *szPassword, char * hydra_report(stderr, "[VERBOSE] Attempting LMv2/NTLMv2 password authentication.\n"); unsigned char szSessionRequest[29] = { - 0x0d, /* Word Count */ - 0xff, /* AndXCommand: No further commands */ - 0x00, /* Reserved */ - 0x00, 0x00, /* AndXOffset */ - 0xff, 0xff, /* Max Buffer */ - 0x02, 0x00, /* Max Mpx Count */ - 0x3c, 0x7d, /* VC Number */ - 0x00, 0x00, 0x00, 0x00, /* Session Key */ - 0x18, 0x00, /* LMv2 Response Hash Length */ - 0x4b, 0x00, /* NTLMv2 Response Hash Length -- MUST SET */ - 0x00, 0x00, 0x00, 0x00, /* Reserved */ - 0x50, 0x00, 0x00, 0x00, /* Capabilities */ - 0x49, 0x00 /* Byte Count -- MUST SET */ + 0x0d, /* Word Count */ + 0xff, /* AndXCommand: No further commands */ + 0x00, /* Reserved */ + 0x00, 0x00, /* AndXOffset */ + 0xff, 0xff, /* Max Buffer */ + 0x02, 0x00, /* Max Mpx Count */ + 0x3c, 0x7d, /* VC Number */ + 0x00, 0x00, 0x00, 0x00, /* Session Key */ + 0x18, 0x00, /* LMv2 Response Hash Length */ + 0x4b, 0x00, /* NTLMv2 Response Hash Length -- MUST SET */ + 0x00, 0x00, 0x00, 0x00, /* Reserved */ + 0x50, 0x00, 0x00, 0x00, /* Capabilities */ + 0x49, 0x00 /* Byte Count -- MUST SET */ }; - iOffset = 65; /* szNBSS + szSMB + szSessionRequest */ + iOffset = 65; /* szNBSS + szSMB + szSessionRequest */ /* Set Session Setup AndX Request header information */ memcpy(buf + 36, szSessionRequest, 29); /* Calculate and set LMv2 response hash */ - ret = HashLMv2(&LMv2hash, (unsigned char *) szLogin, (unsigned char *) szPassword); + ret = HashLMv2(&LMv2hash, (unsigned char *)szLogin, (unsigned char *)szPassword); if (ret == -1) return -1; @@ -1096,7 +1110,7 @@ unsigned long SMBSessionSetup(int32_t s, char *szLogin, char *szPassword, char * free(LMv2hash); /* Calculate and set NTLMv2 response hash */ - ret = HashNTLMv2(&NTLMv2hash, &iByteCount, (unsigned char *) szLogin, (unsigned char *) szPassword); + ret = HashNTLMv2(&NTLMv2hash, &iByteCount, (unsigned char *)szLogin, (unsigned char *)szPassword); if (ret == -1) return -1; @@ -1108,71 +1122,75 @@ unsigned long SMBSessionSetup(int32_t s, char *szLogin, char *szPassword, char * memcpy(buf + iOffset + 24, NTLMv2hash, iByteCount); free(NTLMv2hash); - iByteCount += 24; /* Reflects length of both LMv2 and NTLMv2 responses */ + iByteCount += 24; /* Reflects length of both LMv2 and NTLMv2 responses */ } } else if (security_mode == PLAINTEXT) { if (verbose) hydra_report(stderr, "[VERBOSE] Attempting PLAINTEXT password authentication.\n"); unsigned char szSessionRequest[23] = { - 0x0a, /* Word Count */ - 0xff, /* AndXCommand: No further commands */ - 0x00, /* Reserved */ - 0x00, 0x00, /* AndXOffset */ - 0xff, 0xff, /* Max Buffer */ - 0x02, 0x00, /* Max Mpx Count */ - 0x3c, 0x7d, /* VC Number */ - 0x00, 0x00, 0x00, 0x00, /* Session Key */ - 0x00, 0x00, /* Password Length -- MUST SET */ - 0x00, 0x00, 0x00, 0x00, /* Reserved */ - 0x49, 0x00 /* Byte Count -- MUST SET */ + 0x0a, /* Word Count */ + 0xff, /* AndXCommand: No further commands */ + 0x00, /* Reserved */ + 0x00, 0x00, /* AndXOffset */ + 0xff, 0xff, /* Max Buffer */ + 0x02, 0x00, /* Max Mpx Count */ + 0x3c, 0x7d, /* VC Number */ + 0x00, 0x00, 0x00, 0x00, /* Session Key */ + 0x00, 0x00, /* Password Length -- MUST SET */ + 0x00, 0x00, 0x00, 0x00, /* Reserved */ + 0x49, 0x00 /* Byte Count -- MUST SET */ }; - iOffset = 59; /* szNBSS + szSMB + szSessionRequest */ + iOffset = 59; /* szNBSS + szSMB + szSessionRequest */ /* Set Session Setup AndX Request header information */ memcpy(buf + 36, szSessionRequest, 23); /* Calculate and set password length */ - /* Samba appears to append NULL characters equal to the password length plus 2 */ - //iByteCount = 2 * strlen(szPassword) + 2; + /* Samba appears to append NULL characters equal to the password length plus + * 2 */ + // iByteCount = 2 * strlen(szPassword) + 2; iByteCount = strlen(szPassword) + 1; buf[iOffset - 8] = (iByteCount) % 256; buf[iOffset - 7] = (iByteCount) / 256; /* set ANSI password */ /* - Depending on the SAMBA server configuration, multiple passwords may be successful - when dealing with mixed-case values. The SAMBA parameter "password level" appears - to determine how many characters within a password are tested by the server both - upper and lower case. For example, assume a SAMBA account has a password of "Fred" - and the server is configured with "password level = 2". Medusa sends the password - "FRED". The SAMBA server will brute-force test this value for us with values - like: "FRed", "FrEd", "FreD", "fREd", "fReD", "frED", ... The default setting - is "password level = 0". This results in only two attempts to being made by the - remote server; the password as is and the password in all-lower case. + Depending on the SAMBA server configuration, multiple passwords may be + successful when dealing with mixed-case values. The SAMBA parameter + "password level" appears to determine how many characters within a + password are tested by the server both upper and lower case. For example, + assume a SAMBA account has a password of "Fred" and the server is + configured with "password level = 2". Medusa sends the password "FRED". + The SAMBA server will brute-force test this value for us with values + like: "FRed", "FrEd", "FreD", "fREd", "fReD", "frED", ... The default + setting is "password level = 0". This results in only two attempts to + being made by the remote server; the password as is and the password in + all-lower case. */ - strncpy((char *) (buf + iOffset), szPassword, 256); + strncpy((char *)(buf + iOffset), szPassword, 256); } else { - hydra_report(stderr, "[ERROR] Security_mode was not properly set. This should not happen.\n"); + hydra_report(stderr, "[ERROR] Security_mode was not properly set. This " + "should not happen.\n"); return -1; } /* Set account and workgroup values */ - j = UTF8_UTF16LE((unsigned char *) szLogin, strlen(szLogin), buf + iOffset + iByteCount+1, 2*strlen(szLogin)); - iByteCount += j +3; /* NULL pad account name */ - j = UTF8_UTF16LE(workgroup, strlen((char *) workgroup), buf+iOffset+iByteCount, 2*strlen((char *) workgroup)); - iByteCount += j+2; // NULL pad workgroup name + j = UTF8_UTF16LE((unsigned char *)szLogin, strlen(szLogin), buf + iOffset + iByteCount + 1, 2 * strlen(szLogin)); + iByteCount += j + 3; /* NULL pad account name */ + j = UTF8_UTF16LE(workgroup, strlen((char *)workgroup), buf + iOffset + iByteCount, 2 * strlen((char *)workgroup)); + iByteCount += j + 2; // NULL pad workgroup name /* Set native OS and LAN Manager values */ char *szOSName = "Unix"; - j = UTF8_UTF16LE((unsigned char *) szOSName, strlen(szOSName), buf+iOffset+iByteCount, 2*sizeof(szOSName)); - iByteCount += j+2; // NULL terminated + j = UTF8_UTF16LE((unsigned char *)szOSName, strlen(szOSName), buf + iOffset + iByteCount, 2 * sizeof(szOSName)); + iByteCount += j + 2; // NULL terminated char *szLANMANName = "Samba"; - j = UTF8_UTF16LE((unsigned char *) szLANMANName, strlen(szLANMANName), buf+iOffset+iByteCount, 2*sizeof(szLANMANName)); - iByteCount += j+2; // NULL terminated + j = UTF8_UTF16LE((unsigned char *)szLANMANName, strlen(szLANMANName), buf + iOffset + iByteCount, 2 * sizeof(szLANMANName)); + iByteCount += j + 2; // NULL terminated /* Set the header length */ buf[2] = (iOffset - 4 + iByteCount) / 256; @@ -1186,7 +1204,7 @@ unsigned long SMBSessionSetup(int32_t s, char *szLogin, char *szPassword, char * if (verbose) hydra_report(stderr, "[VERBOSE] Set byte count: %2.2X\n", buf[57]); - hydra_send(s, (char *) buf, iOffset + iByteCount, 0); + hydra_send(s, (char *)buf, iOffset + iByteCount, 0); nReceiveBufferSize = hydra_recv(s, bufReceive, sizeof(bufReceive)); if (/*(bufReceive == NULL) ||*/ (nReceiveBufferSize == 0)) @@ -1197,7 +1215,7 @@ unsigned long SMBSessionSetup(int32_t s, char *szLogin, char *szPassword, char * return (((bufReceive[41] & 0x01) << 24) | ((bufReceive[11] & 0xFF) << 16) | ((bufReceive[10] & 0xFF) << 8) | (bufReceive[9] & 0xFF)); } -int32_t start_smb(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_smb(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, *pass; int32_t SMBerr, SMBaction; @@ -1217,75 +1235,99 @@ int32_t start_smb(int32_t s, char *ip, int32_t port, unsigned char options, char SMBSessionRet = SMBSessionSetup(s, login, pass, miscptr); if (SMBSessionRet == -1) return 3; - SMBerr = (unsigned long) SMBSessionRet & 0x00FFFFFF; - SMBaction = ((unsigned long) SMBSessionRet & 0xFF000000) >> 24; + SMBerr = (unsigned long)SMBSessionRet & 0x00FFFFFF; + SMBaction = ((unsigned long)SMBSessionRet & 0xFF000000) >> 24; if (verbose) - hydra_report(stderr, "[VERBOSE] SMBSessionRet: %8.8X SMBerr: %4.4X SMBaction: %2.2X\n", (uint32_t) SMBSessionRet, SMBerr, SMBaction); + hydra_report(stderr, "[VERBOSE] SMBSessionRet: %8.8X SMBerr: %4.4X SMBaction: %2.2X\n", (uint32_t)SMBSessionRet, SMBerr, SMBaction); /* some error code are available here: http://msdn.microsoft.com/en-us/library/ee441884(v=prot.13).aspx */ - if (SMBerr == 0x000000) { /* success */ - if (SMBaction == 0x01) { /* invalid account - anonymous connection */ - fprintf(stderr, "[%d][smb] Host: %s Account: %s Error: Invalid account (Anonymous success)\n", port, ipaddr_str, login); + if (SMBerr == 0x000000) { /* success */ + if (SMBaction == 0x01) { /* invalid account - anonymous connection */ + fprintf(stderr, + "[%d][smb] Host: %s Account: %s Error: Invalid account " + "(Anonymous success)\n", + port, ipaddr_str, login); hydra_completed_pair_skip(); - } else { /* valid account */ + } else { /* valid account */ hydra_report_found_host(port, ip, "smb", fp); hydra_completed_pair_found(); } } else if ((SMBerr == 0x00000D) && (SMBaction == 0x00)) { - hydra_report(stderr, "[ERROR] Invalid parameter status received, either the account or the method used are not valid\n"); + hydra_report(stderr, "[ERROR] Invalid parameter status received, either " + "the account or the method used are not valid\n"); hydra_completed_pair_skip(); - } else if (SMBerr == 0x00006E) { /* Valid password, GPO Disabling Remote Connections Using NULL Passwords */ - hydra_report(stdout, "[%d][smb] Host: %s Account: %s Valid password, GPO Disabling Remote Connections Using NULL Passwords\n", port, ipaddr_str, login); + } else if (SMBerr == 0x00006E) { /* Valid password, GPO Disabling Remote + Connections Using NULL Passwords */ + hydra_report(stdout, + "[%d][smb] Host: %s Account: %s Valid password, GPO Disabling " + "Remote Connections Using NULL Passwords\n", + port, ipaddr_str, login); hydra_report_found_host(port, ip, "smb", fp); hydra_completed_pair_found(); - } else if (SMBerr == 0x00015B) { /* Valid password, GPO "Deny access to this computer from the network" */ - hydra_report(stdout, "[%d][smb] Host: %s Account: %s Valid password, GPO Deny access to this computer from the network\n", port, ipaddr_str, login); + } else if (SMBerr == 0x00015B) { /* Valid password, GPO "Deny access to this + computer from the network" */ + hydra_report(stdout, + "[%d][smb] Host: %s Account: %s Valid password, GPO Deny " + "access to this computer from the network\n", + port, ipaddr_str, login); hydra_report_found_host(port, ip, "smb", fp); hydra_completed_pair_found(); - } else if (SMBerr == 0x000193) { /* Valid password, account expired */ + } else if (SMBerr == 0x000193) { /* Valid password, account expired */ hydra_report(stdout, "[%d][smb] Host: %s Account: %s Valid password, account expired\n", port, ipaddr_str, login); hydra_report_found_host(port, ip, "smb", fp); hydra_completed_pair_found(); - } else if ((SMBerr == 0x000224) || (SMBerr == 0xC20002)) { /* Valid password, account expired */ - hydra_report(stdout, "[%d][smb] Host: %s Account: %s Valid password, password expired and must be changed on next logon\n", port, ipaddr_str, login); + } else if ((SMBerr == 0x000224) || (SMBerr == 0xC20002)) { /* Valid password, account expired */ + hydra_report(stdout, + "[%d][smb] Host: %s Account: %s Valid password, password " + "expired and must be changed on next logon\n", + port, ipaddr_str, login); hydra_report_found_host(port, ip, "smb", fp); hydra_completed_pair_found(); - } else if ((SMBerr == 0x00006F) || (SMBerr == 0xC10002)) { /* Invalid logon hours */ - hydra_report(stdout, "[%d][smb] Host: %s Account: %s Valid password, but logon hours invalid\n", port, ipaddr_str, login); + } else if ((SMBerr == 0x00006F) || (SMBerr == 0xC10002)) { /* Invalid logon hours */ + hydra_report(stdout, + "[%d][smb] Host: %s Account: %s Valid password, but logon " + "hours invalid\n", + port, ipaddr_str, login); hydra_report_found_host(port, ip, "smb", fp); hydra_completed_pair_found(); - } else if (SMBerr == 0x050001) { /* AS/400 -- Incorrect password */ - hydra_report(stdout, "[%d][smb] Host: %s Account: %s Error: Incorrect password or account disabled\n", port, ipaddr_str, login); + } else if (SMBerr == 0x050001) { /* AS/400 -- Incorrect password */ + hydra_report(stdout, + "[%d][smb] Host: %s Account: %s Error: Incorrect password or " + "account disabled\n", + port, ipaddr_str, login); if ((miscptr) && (strstr(miscptr, "LM"))) hydra_report(stderr, "[INFO] LM dialect may be disabled, try LMV2 instead\n"); hydra_completed_pair_skip(); - } else if (SMBerr == 0x000024) { /* change password on next login [success] */ + } else if (SMBerr == 0x000024) { /* change password on next login [success] */ hydra_report(stdout, "[%d][smb] Host: %s Account: %s Error: ACCOUNT_CHANGE_PASSWORD\n", port, ipaddr_str, login); hydra_completed_pair_found(); - } else if (SMBerr == 0x00006D) { /* STATUS_LOGON_FAILURE */ + } else if (SMBerr == 0x00006D) { /* STATUS_LOGON_FAILURE */ hydra_completed_pair(); - } else if (SMBerr == 0x000071) { /* password expired */ + } else if (SMBerr == 0x000071) { /* password expired */ if (verbose) fprintf(stderr, "[%d][smb] Host: %s Account: %s Error: PASSWORD EXPIRED\n", port, ipaddr_str, login); hydra_completed_pair_skip(); - } else if ((SMBerr == 0x000072) || (SMBerr == 0xBF0002)) { /* account disabled *//* BF0002 on w2k */ + } else if ((SMBerr == 0x000072) || (SMBerr == 0xBF0002)) { /* account disabled */ /* BF0002 on w2k */ if (verbose) fprintf(stderr, "[%d][smb] Host: %s Account: %s Error: ACCOUNT_DISABLED\n", port, ipaddr_str, login); hydra_completed_pair_skip(); - } else if (SMBerr == 0x000034 || SMBerr == 0x000234) { /* account locked out */ + } else if (SMBerr == 0x000034 || SMBerr == 0x000234) { /* account locked out */ if (verbose) fprintf(stderr, "[%d][smb] Host: %s Account: %s Error: ACCOUNT_LOCKED\n", port, ipaddr_str, login); hydra_completed_pair_skip(); - } else if (SMBerr == 0x00008D) { /* ummm... broken client-domain membership */ + } else if (SMBerr == 0x00008D) { /* ummm... broken client-domain membership */ if (verbose) - fprintf(stderr, "[%d][smb] Host: %s Account: %s Error: NT_STATUS_TRUSTED_RELATIONSHIP_FAILURE\n", port, ipaddr_str, login); + fprintf(stderr, + "[%d][smb] Host: %s Account: %s Error: " + "NT_STATUS_TRUSTED_RELATIONSHIP_FAILURE\n", + port, ipaddr_str, login); hydra_completed_pair(); - } else { /* failed */ + } else { /* failed */ if (verbose) fprintf(stderr, "[%d][smb] Host: %s Account: %s Unknown Error: %6.6X\n", port, ipaddr_str, login, SMBerr); hydra_completed_pair(); @@ -1297,30 +1339,30 @@ int32_t start_smb(int32_t s, char *ip, int32_t port, unsigned char options, char return 1; } -void service_smb(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_smb(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; - //default is both (local and domain) checks and normal passwd - accntFlag = 2; //BOTH - hashFlag = 0; //PASS + // default is both (local and domain) checks and normal passwd + accntFlag = 2; // BOTH + hashFlag = 0; // PASS smb_auth_mechanism = AUTH_NTLM; if (miscptr) { - //check group + // check group strupper(miscptr); if (strstr(miscptr, "OTHER_DOMAIN:") != NULL) { char *tmpdom; int32_t err = 0; - accntFlag = 4; //OTHER DOMAIN + accntFlag = 4; // OTHER DOMAIN tmpdom = strstr(miscptr, "OTHER_DOMAIN:"); tmpdom = tmpdom + strlen("OTHER_DOMAIN:"); if (tmpdom) { - //split the string after the domain if there are other values + // split the string after the domain if there are other values strtok(tmpdom, " "); if (tmpdom) { - strncpy((char *) domain, (char *) tmpdom, sizeof(domain) - 1); + strncpy((char *)domain, (char *)tmpdom, sizeof(domain) - 1); domain[sizeof(domain) - 1] = 0; } else { err = 1; @@ -1335,17 +1377,17 @@ void service_smb(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL accntFlag = 2; } } else if (strstr(miscptr, "LOCAL") != NULL) { - accntFlag = 0; //LOCAL + accntFlag = 0; // LOCAL } else if (strstr(miscptr, "DOMAIN") != NULL) { - accntFlag = 1; //DOMAIN + accntFlag = 1; // DOMAIN } - //check pass + // check pass if (strstr(miscptr, "HASH") != NULL) { hashFlag = 1; } else if (strstr(miscptr, "MACHINE") != NULL) { hashFlag = 2; } - //check auth + // check auth if (strstr(miscptr, "NTLMV2") != NULL) { smb_auth_mechanism = AUTH_NTLMv2; } else if (strstr(miscptr, "NTLM") != NULL) { @@ -1366,10 +1408,10 @@ void service_smb(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL return; for (;;) { switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ if (sock >= 0) sock = hydra_disconnect(sock); -// usleepn(300); + // usleepn(300); if (port != 0) { sock = hydra_connect_tcp(ip, port); @@ -1388,14 +1430,16 @@ void service_smb(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL port = PORT_SMBNT; protoFlag = WIN2000_NATIVEMODE; } else { - hydra_report(stderr, "Failed to establish WIN2000_NATIVE mode. Attempting WIN_NETBIOS mode.\n"); + hydra_report(stderr, "Failed to establish WIN2000_NATIVE mode. " + "Attempting WIN_NETBIOS mode.\n"); port = PORT_SMB; protoFlag = WIN_NETBIOSMODE; sock = hydra_connect_tcp(ip, PORT_SMB); } } if (sock < 0) { - if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + if (quiet != 1) + fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } if (NBSSessionRequest(sock) < 0) { @@ -1404,10 +1448,10 @@ void service_smb(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL } next_run = SMBNegProt(sock); break; - case 2: /* run the cracking function */ + case 2: /* run the cracking function */ next_run = start_smb(sock, ip, port, options, miscptr, fp); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); @@ -1421,51 +1465,27 @@ void service_smb(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL } #endif -int32_t service_smb_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_smb_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here time_t ctime; int ready = 0, sock = hydra_connect_tcp(ip, port); - unsigned char buf[] = { - 0x00, 0x00, 0x00, 0xbe, 0xff, 0x53, 0x4d, 0x42, - 0x72, 0x00, 0x00, 0x00, 0x00, 0x18, 0x43, 0xc8, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xfe, 0xff, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x9b, 0x00, 0x02, - 0x50, 0x43, 0x20, 0x4e, 0x45, 0x54, 0x57, 0x4f, - 0x52, 0x4b, 0x20, 0x50, 0x52, 0x4f, 0x47, 0x52, - 0x41, 0x4d, 0x20, 0x31, 0x2e, 0x30, 0x00, 0x02, - 0x4d, 0x49, 0x43, 0x52, 0x4f, 0x53, 0x4f, 0x46, - 0x54, 0x20, 0x4e, 0x45, 0x54, 0x57, 0x4f, 0x52, - 0x4b, 0x53, 0x20, 0x31, 0x2e, 0x30, 0x33, 0x00, - 0x02, 0x4d, 0x49, 0x43, 0x52, 0x4f, 0x53, 0x4f, - 0x46, 0x54, 0x20, 0x4e, 0x45, 0x54, 0x57, 0x4f, - 0x52, 0x4b, 0x53, 0x20, 0x33, 0x2e, 0x30, 0x00, - 0x02, 0x4c, 0x41, 0x4e, 0x4d, 0x41, 0x4e, 0x31, - 0x2e, 0x30, 0x00, 0x02, 0x4c, 0x4d, 0x31, 0x2e, - 0x32, 0x58, 0x30, 0x30, 0x32, 0x00, 0x02, 0x44, - 0x4f, 0x53, 0x20, 0x4c, 0x41, 0x4e, 0x4d, 0x41, - 0x4e, 0x32, 0x2e, 0x31, 0x00, 0x02, 0x4c, 0x41, - 0x4e, 0x4d, 0x41, 0x4e, 0x32, 0x2e, 0x31, 0x00, - 0x02, 0x53, 0x61, 0x6d, 0x62, 0x61, 0x00, 0x02, - 0x4e, 0x54, 0x20, 0x4c, 0x41, 0x4e, 0x4d, 0x41, - 0x4e, 0x20, 0x31, 0x2e, 0x30, 0x00, 0x02, 0x4e, - 0x54, 0x20, 0x4c, 0x4d, 0x20, 0x30, 0x2e, 0x31, - 0x32, 0x00 }; + unsigned char buf[] = {0x00, 0x00, 0x00, 0xbe, 0xff, 0x53, 0x4d, 0x42, 0x72, 0x00, 0x00, 0x00, 0x00, 0x18, 0x43, 0xc8, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xfe, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x9b, 0x00, 0x02, 0x50, 0x43, 0x20, 0x4e, 0x45, 0x54, 0x57, 0x4f, 0x52, 0x4b, 0x20, 0x50, 0x52, 0x4f, 0x47, 0x52, 0x41, 0x4d, 0x20, 0x31, 0x2e, 0x30, 0x00, 0x02, 0x4d, + 0x49, 0x43, 0x52, 0x4f, 0x53, 0x4f, 0x46, 0x54, 0x20, 0x4e, 0x45, 0x54, 0x57, 0x4f, 0x52, 0x4b, 0x53, 0x20, 0x31, 0x2e, 0x30, 0x33, 0x00, 0x02, 0x4d, 0x49, 0x43, 0x52, 0x4f, 0x53, 0x4f, 0x46, 0x54, 0x20, 0x4e, 0x45, 0x54, 0x57, 0x4f, 0x52, 0x4b, 0x53, 0x20, 0x33, 0x2e, 0x30, 0x00, 0x02, 0x4c, 0x41, 0x4e, 0x4d, 0x41, 0x4e, 0x31, 0x2e, 0x30, 0x00, 0x02, 0x4c, 0x4d, 0x31, 0x2e, 0x32, 0x58, + 0x30, 0x30, 0x32, 0x00, 0x02, 0x44, 0x4f, 0x53, 0x20, 0x4c, 0x41, 0x4e, 0x4d, 0x41, 0x4e, 0x32, 0x2e, 0x31, 0x00, 0x02, 0x4c, 0x41, 0x4e, 0x4d, 0x41, 0x4e, 0x32, 0x2e, 0x31, 0x00, 0x02, 0x53, 0x61, 0x6d, 0x62, 0x61, 0x00, 0x02, 0x4e, 0x54, 0x20, 0x4c, 0x41, 0x4e, 0x4d, 0x41, 0x4e, 0x20, 0x31, 0x2e, 0x30, 0x00, 0x02, 0x4e, 0x54, 0x20, 0x4c, 0x4d, 0x20, 0x30, 0x2e, 0x31, 0x32, 0x00}; - if (sock < 0) { fprintf(stderr, "[ERROR] could not connect to target smb://%s:%d/\n", hostname, port); return -1; } - + if (send(sock, buf, sizeof(buf), 0) < 0) { fprintf(stderr, "[ERROR] unable to send to target smb://%s:%d/\n", hostname, port); return -1; @@ -1475,34 +1495,38 @@ int32_t service_smb_init(char *ip, int32_t sp, unsigned char options, char *misc do { usleepn(300); } while ((ready = hydra_data_ready(sock)) <= 0 && ctime + 5 <= time(NULL)); - + if (ready <= 0) { fprintf(stderr, "[ERROR] no reply from target smb://%s:%d/\n", hostname, port); return -1; } - + if ((ready = recv(sock, buf, sizeof(buf), 0)) < 40) { fprintf(stderr, "[ERROR] invalid reply from target smb://%s:%d/\n", hostname, port); return -1; } close(sock); - + if (buf[37] == buf[38] && buf[38] == 0xff) { fprintf(stderr, "[ERROR] target smb://%s:%d/ does not support SMBv1\n", hostname, port); return -1; } - + if ((buf[15] & 16) == 16) { - fprintf(stderr, "[ERROR] target smb://%s:%d/ requires signing which we do not support\n", hostname, port); + fprintf(stderr, + "[ERROR] target smb://%s:%d/ requires signing which we do not " + "support\n", + hostname, port); return -1; } - + return 0; } -void usage_smb(const char* service) { - printf("Module smb default value is set to test both local and domain account, using a simple password with NTLM dialect.\n" +void usage_smb(const char *service) { + printf("Module smb default value is set to test both local and domain account, " + "using a simple password with NTLM dialect.\n" "Note: you can set the group type using LOCAL or DOMAIN keyword\n" " or other_domain:{value} to specify a trusted domain.\n" " you can set the password type using HASH or MACHINE keyword\n" @@ -1510,6 +1534,9 @@ void usage_smb(const char* service) { " you can set the dialect using NTLMV2, NTLM, LMV2, LM keyword.\n" "Example: \n" " hydra smb://microsoft.com -l admin -p tooeasy -m \"local lmv2\"\n" - " hydra smb://microsoft.com -l admin -p D5731CFC6C2A069C21FD0D49CAEBC9EA:2126EE7712D37E265FD63F2C84D2B13D::: -m \"local hash\"\n" - " hydra smb://microsoft.com -l admin -p tooeasy -m \"other_domain:SECONDDOMAIN\"\n\n"); + " hydra smb://microsoft.com -l admin -p " + "D5731CFC6C2A069C21FD0D49CAEBC9EA:2126EE7712D37E265FD63F2C84D2B13D::: -m " + "\"local hash\"\n" + " hydra smb://microsoft.com -l admin -p tooeasy -m " + "\"other_domain:SECONDDOMAIN\"\n\n"); } diff --git a/hydra-smb2.c b/hydra-smb2.c index f42f074..c603d63 100644 --- a/hydra-smb2.c +++ b/hydra-smb2.c @@ -21,47 +21,41 @@ #include "hydra-mod.h" -#include -#include -#include #include #include +#include +#include +#include extern char *HYDRA_EXIT; typedef struct creds { - const char* workgroup; - const char* user; - const char* pass; + const char *workgroup; + const char *user; + const char *pass; } creds_t; - const char default_workgroup[] = "WORKGROUP"; bool use_nt_hash = false; -const char* workgroup = default_workgroup; -const char* netbios_name = NULL; +const char *workgroup = default_workgroup; +const char *netbios_name = NULL; -#define EXIT_PROTOCOL_ERROR hydra_child_exit(2) -#define EXIT_CONNECTION_ERROR hydra_child_exit(1) -#define EXIT_NORMAL hydra_child_exit(0) +#define EXIT_PROTOCOL_ERROR hydra_child_exit(2) +#define EXIT_CONNECTION_ERROR hydra_child_exit(1) +#define EXIT_NORMAL hydra_child_exit(0) -void smb2_auth_provider(SMBCCTX *c, - const char *srv, - const char *shr, - char *wg, int wglen, - char *un, int unlen, - char *pw, int pwlen) { - creds_t* cr = (creds_t*)smbc_getOptionUserData(c); +void smb2_auth_provider(SMBCCTX *c, const char *srv, const char *shr, char *wg, int wglen, char *un, int unlen, char *pw, int pwlen) { + creds_t *cr = (creds_t *)smbc_getOptionUserData(c); strncpy(wg, cr->workgroup, wglen); strncpy(un, cr->user, unlen); strncpy(pw, cr->pass, pwlen); - wg[wglen-1] = 0; - un[unlen-1] = 0; - pw[pwlen-1] = 0; + wg[wglen - 1] = 0; + un[unlen - 1] = 0; + pw[pwlen - 1] = 0; } -bool smb2_run_test(creds_t* cr, const char* server, uint16_t port) { - SMBCCTX* ctx = smbc_new_context(); +bool smb2_run_test(creds_t *cr, const char *server, uint16_t port) { + SMBCCTX *ctx = smbc_new_context(); if (ctx == NULL) { hydra_report(stderr, "[ERROR] failed to create context\n"); EXIT_PROTOCOL_ERROR; @@ -76,7 +70,7 @@ bool smb2_run_test(creds_t* cr, const char* server, uint16_t port) { smbc_setOptionNoAutoAnonymousLogin(ctx, false); smbc_setOptionUseNTHash(ctx, use_nt_hash); if (netbios_name) { - smbc_setNetbiosName(ctx, (char*)netbios_name); + smbc_setNetbiosName(ctx, (char *)netbios_name); } ctx = smbc_init_context(ctx); @@ -88,12 +82,9 @@ bool smb2_run_test(creds_t* cr, const char* server, uint16_t port) { char uri[2048]; snprintf(uri, sizeof(uri) - 1, "smb://%s/IPC$", server); - uri[sizeof(uri)-1] = 0; + uri[sizeof(uri) - 1] = 0; if (verbose) { - printf("[INFO] Connecting to: %s with %s\\%s%%%s\n", - uri, cr->workgroup, - cr->user, - cr->pass); + printf("[INFO] Connecting to: %s with %s\\%s%%%s\n", uri, cr->workgroup, cr->user, cr->pass); } SMBCFILE *fd = smbc_getFunctionOpendir(ctx)(ctx, uri); if (fd) { @@ -162,13 +153,7 @@ bool smb2_run_test(creds_t* cr, const char* server, uint16_t port) { return false; } -void service_smb2(char *ip, - int32_t sp, - unsigned char options, - char *miscptr, - FILE * fp, - int32_t port, - char *hostname) { +void service_smb2(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { hydra_register_socket(sp); while (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT))) { char *login, *pass; @@ -177,9 +162,9 @@ void service_smb2(char *ip, pass = hydra_get_next_password(); creds_t cr = { - .user = login, - .pass = pass, - .workgroup = workgroup, + .user = login, + .pass = pass, + .workgroup = workgroup, }; if (smb2_run_test(&cr, hydra_address2string(ip), port & 0xffff)) { @@ -199,24 +184,18 @@ const char tkn_netbios[] = "netbios:{"; #define CMP(s1, s2) (strncmp(s1, s2, sizeof(s1) - 1) == 0) -int32_t service_smb2_init(char *ip, - int32_t sp, - unsigned char options, - char *miscptr, - FILE * fp, - int32_t port, - char *hostname) { +int32_t service_smb2_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { if (!miscptr) return 0; - while(*miscptr) { + while (*miscptr) { if (isspace(*miscptr)) { miscptr++; continue; } if (CMP(tkn_workgroup, miscptr)) { miscptr += sizeof(tkn_workgroup) - 1; - char* p = strchr(miscptr, '}'); + char *p = strchr(miscptr, '}'); if (p == NULL) { hydra_report(stderr, "[ERROR] missing closing brace in workgroup\n"); return -1; @@ -231,7 +210,7 @@ int32_t service_smb2_init(char *ip, } if (CMP(tkn_netbios, miscptr)) { miscptr += sizeof(tkn_netbios) - 1; - char* p = strchr(miscptr, '}'); + char *p = strchr(miscptr, '}'); if (p == NULL) { hydra_report(stderr, "[ERROR] missing closing brace in netbios name\n"); return -1; @@ -268,7 +247,7 @@ int32_t service_smb2_init(char *ip, return 0; } -void usage_smb2(const char* service) { +void usage_smb2(const char *service) { puts("Module is a thin wrapper over the Samba client library (libsmbclient).\n" "Thus, is capable of negotiating v1, v2 and v3 of the protocol.\n" "\n" @@ -296,9 +275,10 @@ void usage_smb2(const char* service) { "\n" "Examples: \n" " hydra smb2://abc.com -l admin -p xxx -m workgroup:{OFFICE}\n" - " hydra smb2://1.2.3.4 -l admin -p F54F3A1D3C38140684FF4DAD029F25B5 -m 'workgroup:{OFFICE} nthash:true'\n" - " hydra -l admin -p F54F3A1D3C38140684FF4DAD029F25B5 'smb2://1.2.3.4/workgroup:{OFFICE} nthash:true'\n" - ); + " hydra smb2://1.2.3.4 -l admin -p F54F3A1D3C38140684FF4DAD029F25B5 -m " + "'workgroup:{OFFICE} nthash:true'\n" + " hydra -l admin -p F54F3A1D3C38140684FF4DAD029F25B5 " + "'smb2://1.2.3.4/workgroup:{OFFICE} nthash:true'\n"); } #endif // LIBSMBCLIENT diff --git a/hydra-smtp-enum.c b/hydra-smtp-enum.c index c26ac63..ddc0355 100644 --- a/hydra-smtp-enum.c +++ b/hydra-smtp-enum.c @@ -24,7 +24,7 @@ int32_t tosent = 0; int32_t smtp_enum_cmd = VRFY; -int32_t start_smtp_enum(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_smtp_enum(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, *pass, buffer[500]; @@ -55,7 +55,7 @@ int32_t start_smtp_enum(int32_t s, char *ip, int32_t port, unsigned char options return (1); if (debug) hydra_report(stderr, "DEBUG S: %s", buf); - /* good return values are something like 25x */ + /* good return values are something like 25x */ #ifdef HAVE_PCRE if (hydra_string_match(buf, "^25\\d\\s")) { #else @@ -103,7 +103,7 @@ int32_t start_smtp_enum(int32_t s, char *ip, int32_t port, unsigned char options return (1); if (debug) hydra_report(stderr, "DEBUG S: %s", buf); - /* good return values are something like 25x */ + /* good return values are something like 25x */ #ifdef HAVE_PCRE if (hydra_string_match(buf, "^25\\d\\s")) { #else @@ -119,21 +119,25 @@ int32_t start_smtp_enum(int32_t s, char *ip, int32_t port, unsigned char options err = strstr(buf, "Error"); if (err || tosent || strncmp(buf, "50", 2) == 0) { // we should report command not identified by the server - //502 5.5.2 Error: command not recognized -//#ifdef HAVE_PCRE -// if ((debug || hydra_string_match(buf, "\\scommand\\snot\\srecognized")) && err) { -//#else -// if ((debug || strstr(buf, "command") != NULL) && err) { -//#endif -// hydra_report(stderr, "Server %s", err); -// } + // 502 5.5.2 Error: command not recognized + //#ifdef HAVE_PCRE + // if ((debug || hydra_string_match(buf, + // "\\scommand\\snot\\srecognized")) && err) { + //#else + // if ((debug || strstr(buf, "command") != NULL) && err) { + //#endif + // hydra_report(stderr, "Server %s", err); + // } if (strncmp(buf, "500 ", 4) == 0) { - hydra_report(stderr, "[ERROR] command is disabled on the server (choose different method): %s", buf); + hydra_report(stderr, + "[ERROR] command is disabled on the server (choose " + "different method): %s", + buf); free(buf); return 3; } memset(buffer, 0, sizeof(buffer)); - //503 5.5.1 Error: nested MAIL command + // 503 5.5.1 Error: nested MAIL command strncpy(buffer, "RSET\r\n", sizeof(buffer)); free(buf); if (hydra_send(s, buffer, strlen(buffer), 0) < 0) @@ -150,7 +154,7 @@ int32_t start_smtp_enum(int32_t s, char *ip, int32_t port, unsigned char options return 2; } -void service_smtp_enum(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_smtp_enum(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1, i = 0; int32_t myport = PORT_SMTP, mysslport = PORT_SMTP_SSL; char *buffer = "HELO hydra\r\n"; @@ -160,7 +164,7 @@ void service_smtp_enum(char *ip, int32_t sp, unsigned char options, char *miscpt return; while (1) { switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ if (sock >= 0) sock = hydra_disconnect(sock); if ((options & OPTION_SSL) == 0) { @@ -175,7 +179,7 @@ void service_smtp_enum(char *ip, int32_t sp, unsigned char options, char *miscpt port = mysslport; } if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } /* receive initial header */ @@ -185,17 +189,17 @@ void service_smtp_enum(char *ip, int32_t sp, unsigned char options, char *miscpt hydra_report(stderr, "Warning: SMTP does not allow connecting: %s\n", buf); hydra_child_exit(2); } -// while (strstr(buf, "220 ") == NULL) { -// free(buf); -// buf = hydra_receive_line(sock); -// } + // while (strstr(buf, "220 ") == NULL) { + // free(buf); + // buf = hydra_receive_line(sock); + // } -// if (buf[0] != '2') { + // if (buf[0] != '2') { if (hydra_send(sock, buffer, strlen(buffer), 0) < 0) { free(buf); hydra_child_exit(2); } -// } + // } free(buf); if ((buf = hydra_receive_line(sock)) == NULL) @@ -207,7 +211,7 @@ void service_smtp_enum(char *ip, int32_t sp, unsigned char options, char *miscpt if ((miscptr != NULL) && (strlen(miscptr) > 0)) { for (i = 0; i < strlen(miscptr); i++) - miscptr[i] = (char) toupper((int32_t) miscptr[i]); + miscptr[i] = (char)toupper((int32_t)miscptr[i]); if (strncmp(miscptr, "EXPN", 4) == 0) smtp_enum_cmd = EXPN; @@ -232,10 +236,10 @@ void service_smtp_enum(char *ip, int32_t sp, unsigned char options, char *miscpt free(buf); next_run = 2; break; - case 2: /* run the cracking function */ + case 2: /* run the cracking function */ next_run = start_smtp_enum(sock, ip, port, options, miscptr, fp); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) { sock = hydra_disconnect(sock); } @@ -249,13 +253,13 @@ void service_smtp_enum(char *ip, int32_t sp, unsigned char options, char *miscpt } } -int32_t service_smtp_enum_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_smtp_enum_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here @@ -263,9 +267,11 @@ int32_t service_smtp_enum_init(char *ip, int32_t sp, unsigned char options, char return 0; } -void usage_smtp_enum(const char* service) { +void usage_smtp_enum(const char *service) { printf("Module smtp-enum is optionally taking one SMTP command of:\n\n" "VRFY (default), EXPN, RCPT (which will connect using \"root\" account)\n" - "login parameter is used as username and password parameter as the domain name\n" - "For example to test if john@localhost exists on 192.168.0.1:\n" "hydra smtp-enum://192.168.0.1/vrfy -l john -p localhost\n\n"); + "login parameter is used as username and password parameter as the " + "domain name\n" + "For example to test if john@localhost exists on 192.168.0.1:\n" + "hydra smtp-enum://192.168.0.1/vrfy -l john -p localhost\n\n"); } diff --git a/hydra-smtp.c b/hydra-smtp.c index b27ec0f..97b2bab 100644 --- a/hydra-smtp.c +++ b/hydra-smtp.c @@ -14,7 +14,7 @@ char *smtp_read_server_capacity(int32_t sock) { free(buf); ptr = buf = hydra_receive_line(sock); if (buf != NULL) { - if (isdigit((int32_t) buf[0]) && buf[3] == ' ') + if (isdigit((int32_t)buf[0]) && buf[3] == ' ') resp = 1; else { if (buf[strlen(buf) - 1] == '\n') @@ -27,7 +27,7 @@ char *smtp_read_server_capacity(int32_t sock) { if ((ptr = strrchr(buf, '\n')) != NULL) { #endif ptr++; - if (isdigit((int32_t) *ptr) && *(ptr + 3) == ' ') + if (isdigit((int32_t)*ptr) && *(ptr + 3) == ' ') resp = 1; } } @@ -36,7 +36,7 @@ char *smtp_read_server_capacity(int32_t sock) { return buf; } -int32_t start_smtp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_smtp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, *pass, buffer[500], buffer2[500], *fooptr, *buf; @@ -52,7 +52,6 @@ int32_t start_smtp(int32_t s, char *ip, int32_t port, unsigned char options, cha } switch (smtp_auth_mechanism) { - case AUTH_PLAIN: sprintf(buffer, "AUTH PLAIN\r\n"); if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { @@ -77,105 +76,102 @@ int32_t start_smtp(int32_t s, char *ip, int32_t port, unsigned char options, cha break; #ifdef LIBOPENSSL - case AUTH_CRAMMD5:{ - int32_t rc = 0; - char *preplogin; + case AUTH_CRAMMD5: { + int32_t rc = 0; + char *preplogin; - rc = sasl_saslprep(login, SASL_ALLOW_UNASSIGNED, &preplogin); - if (rc) { - return 3; - } - - sprintf(buffer, "AUTH CRAM-MD5\r\n"); - if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { - return 1; - } - //get the one-time BASE64 encoded challenge - if ((buf = hydra_receive_line(s)) == NULL) - return 1; - if (strstr(buf, "334") == NULL || strlen(buf) < 8) { - hydra_report(stderr, "[ERROR] SMTP CRAM-MD5 AUTH : %s\n", buf); - free(buf); - return 3; - } - memset(buffer, 0, sizeof(buffer)); - from64tobits((char *) buffer, buf + 4); - free(buf); - - memset(buffer2, 0, sizeof(buffer2)); - sasl_cram_md5(buffer2, pass, buffer); - - sprintf(buffer, "%s %.250s", preplogin, buffer2); - hydra_tobase64((unsigned char *) buffer, strlen(buffer), sizeof(buffer)); - - char tmp_buffer[sizeof(buffer)]; - sprintf(tmp_buffer, "%.250s\r\n", buffer); - strcpy(buffer, tmp_buffer); - - free(preplogin); + rc = sasl_saslprep(login, SASL_ALLOW_UNASSIGNED, &preplogin); + if (rc) { + return 3; } - break; - case AUTH_DIGESTMD5:{ - sprintf(buffer, "AUTH DIGEST-MD5\r\n"); - - if (hydra_send(s, buffer, strlen(buffer), 0) < 0) - return 1; - //receive - if ((buf = hydra_receive_line(s)) == NULL) - return 1; - if (strstr(buf, "334") == NULL) { - hydra_report(stderr, "[ERROR] SMTP DIGEST-MD5 AUTH : %s\n", buf); - free(buf); - return 3; - } - memset(buffer, 0, sizeof(buffer)); - from64tobits((char *) buffer, buf + 4); - free(buf); - - if (debug) - hydra_report(stderr, "DEBUG S: %s\n", buffer); - - fooptr = buffer2; - sasl_digest_md5(fooptr, login, pass, buffer, miscptr, "smtp", NULL, 0, NULL); - if (fooptr == NULL) - return 3; - - if (debug) - hydra_report(stderr, "DEBUG C: %s\n", buffer2); - hydra_tobase64((unsigned char *) buffer2, strlen(buffer2), sizeof(buffer2)); - sprintf(buffer, "%s\r\n", buffer2); + sprintf(buffer, "AUTH CRAM-MD5\r\n"); + if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { + return 1; } - break; + // get the one-time BASE64 encoded challenge + if ((buf = hydra_receive_line(s)) == NULL) + return 1; + if (strstr(buf, "334") == NULL || strlen(buf) < 8) { + hydra_report(stderr, "[ERROR] SMTP CRAM-MD5 AUTH : %s\n", buf); + free(buf); + return 3; + } + memset(buffer, 0, sizeof(buffer)); + from64tobits((char *)buffer, buf + 4); + free(buf); + + memset(buffer2, 0, sizeof(buffer2)); + sasl_cram_md5(buffer2, pass, buffer); + + sprintf(buffer, "%s %.250s", preplogin, buffer2); + hydra_tobase64((unsigned char *)buffer, strlen(buffer), sizeof(buffer)); + + char tmp_buffer[sizeof(buffer)]; + sprintf(tmp_buffer, "%.250s\r\n", buffer); + strcpy(buffer, tmp_buffer); + + free(preplogin); + } break; + + case AUTH_DIGESTMD5: { + sprintf(buffer, "AUTH DIGEST-MD5\r\n"); + + if (hydra_send(s, buffer, strlen(buffer), 0) < 0) + return 1; + // receive + if ((buf = hydra_receive_line(s)) == NULL) + return 1; + if (strstr(buf, "334") == NULL) { + hydra_report(stderr, "[ERROR] SMTP DIGEST-MD5 AUTH : %s\n", buf); + free(buf); + return 3; + } + memset(buffer, 0, sizeof(buffer)); + from64tobits((char *)buffer, buf + 4); + free(buf); + + if (debug) + hydra_report(stderr, "DEBUG S: %s\n", buffer); + + fooptr = buffer2; + sasl_digest_md5(fooptr, login, pass, buffer, miscptr, "smtp", NULL, 0, NULL); + if (fooptr == NULL) + return 3; + + if (debug) + hydra_report(stderr, "DEBUG C: %s\n", buffer2); + hydra_tobase64((unsigned char *)buffer2, strlen(buffer2), sizeof(buffer2)); + sprintf(buffer, "%s\r\n", buffer2); + } break; #endif - case AUTH_NTLM:{ - unsigned char buf1[4096]; - unsigned char buf2[4096]; + case AUTH_NTLM: { + unsigned char buf1[4096]; + unsigned char buf2[4096]; - //send auth and receive challenge - buildAuthRequest((tSmbNtlmAuthRequest *) buf2, 0, NULL, NULL); - to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthRequest *) buf2)); - sprintf(buffer, "AUTH NTLM %s\r\n", buf1); - if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { - return 1; - } - if ((buf = hydra_receive_line(s)) == NULL) - return 1; - if (strstr(buf, "334") == NULL || strlen(buf) < 8) { - hydra_report(stderr, "[ERROR] SMTP NTLM AUTH : %s\n", buf); - free(buf); - return 3; - } - //recover challenge - from64tobits((char *) buf1, buf + 4); - free(buf); - - buildAuthResponse((tSmbNtlmAuthChallenge *) buf1, (tSmbNtlmAuthResponse *) buf2, 0, login, pass, NULL, NULL); - to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthResponse *) buf2)); - sprintf(buffer, "%s\r\n", buf1); + // send auth and receive challenge + buildAuthRequest((tSmbNtlmAuthRequest *)buf2, 0, NULL, NULL); + to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthRequest *)buf2)); + sprintf(buffer, "AUTH NTLM %s\r\n", buf1); + if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { + return 1; } - break; + if ((buf = hydra_receive_line(s)) == NULL) + return 1; + if (strstr(buf, "334") == NULL || strlen(buf) < 8) { + hydra_report(stderr, "[ERROR] SMTP NTLM AUTH : %s\n", buf); + free(buf); + return 3; + } + // recover challenge + from64tobits((char *)buf1, buf + 4); + free(buf); + + buildAuthResponse((tSmbNtlmAuthChallenge *)buf1, (tSmbNtlmAuthResponse *)buf2, 0, login, pass, NULL, NULL); + to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthResponse *)buf2)); + sprintf(buffer, "%s\r\n", buf1); + } break; default: /* by default trying AUTH LOGIN */ @@ -188,13 +184,16 @@ int32_t start_smtp(int32_t s, char *ip, int32_t port, unsigned char options, cha /* 504 5.7.4 Unrecognized authentication type */ if (strstr(buf, "334") == NULL) { - hydra_report(stderr, "[ERROR] SMTP LOGIN AUTH, either this auth is disabled or server is not using auth: %s\n", buf); + hydra_report(stderr, + "[ERROR] SMTP LOGIN AUTH, either this auth is disabled or " + "server is not using auth: %s\n", + buf); free(buf); return 3; } free(buf); sprintf(buffer2, "%.250s", login); - hydra_tobase64((unsigned char *) buffer2, strlen(buffer2), sizeof(buffer2)); + hydra_tobase64((unsigned char *)buffer2, strlen(buffer2), sizeof(buffer2)); sprintf(buffer, "%.250s\r\n", buffer2); if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { @@ -210,7 +209,7 @@ int32_t start_smtp(int32_t s, char *ip, int32_t port, unsigned char options, cha free(buf); sprintf(buffer2, "%.250s", pass); - hydra_tobase64((unsigned char *) buffer2, strlen(buffer2), sizeof(buffer2)); + hydra_tobase64((unsigned char *)buffer2, strlen(buffer2), sizeof(buffer2)); sprintf(buffer, "%.250s\r\n", buffer2); } @@ -224,7 +223,7 @@ int32_t start_smtp(int32_t s, char *ip, int32_t port, unsigned char options, cha if (smtp_auth_mechanism == AUTH_DIGESTMD5) { if (strstr(buf, "334") != NULL && strlen(buf) >= 8) { memset(buffer2, 0, sizeof(buffer2)); - from64tobits((char *) buffer2, buf + 4); + from64tobits((char *)buffer2, buf + 4); if (strstr(buffer2, "rspauth=") != NULL) { hydra_report_found_host(port, ip, "smtp", fp); hydra_completed_pair_found(); @@ -254,7 +253,7 @@ int32_t start_smtp(int32_t s, char *ip, int32_t port, unsigned char options, cha return 2; } -void service_smtp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_smtp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1, i = 0; int32_t myport = PORT_SMTP, mysslport = PORT_SMTP_SSL, disable_tls = 1; char *buf; @@ -266,7 +265,7 @@ void service_smtp(char *ip, int32_t sp, unsigned char options, char *miscptr, FI return; while (1) { switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ if (sock >= 0) sock = hydra_disconnect(sock); if ((options & OPTION_SSL) == 0) { @@ -282,7 +281,7 @@ void service_smtp(char *ip, int32_t sp, unsigned char options, char *miscptr, FI } if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } @@ -310,7 +309,7 @@ void service_smtp(char *ip, int32_t sp, unsigned char options, char *miscptr, FI if ((miscptr != NULL) && (strlen(miscptr) > 0)) { for (i = 0; i < strlen(miscptr); i++) - miscptr[i] = (char) toupper((int32_t) miscptr[i]); + miscptr[i] = (char)toupper((int32_t)miscptr[i]); if (strstr(miscptr, "TLS") || strstr(miscptr, "SSL") || strstr(miscptr, "STARTTLS")) { disable_tls = 0; @@ -325,7 +324,8 @@ void service_smtp(char *ip, int32_t sp, unsigned char options, char *miscptr, FI free(buf); buf = hydra_receive_line(sock); if (buf[0] != '2') { - hydra_report(stderr, "[ERROR] TLS negotiation failed, no answer received from STARTTLS request\n"); + hydra_report(stderr, "[ERROR] TLS negotiation failed, no answer " + "received from STARTTLS request\n"); } else { free(buf); if ((hydra_connect_to_ssl(sock, hostname) == -1)) { @@ -346,9 +346,11 @@ void service_smtp(char *ip, int32_t sp, unsigned char options, char *miscptr, FI hydra_child_exit(2); } } else - hydra_report(stderr, "[ERROR] option to use TLS/SSL failed as it is not supported by the server\n"); + hydra_report(stderr, "[ERROR] option to use TLS/SSL failed as it " + "is not supported by the server\n"); } else - hydra_report(stderr, "[ERROR] option to use TLS/SSL failed as it is not supported by the server\n"); + hydra_report(stderr, "[ERROR] option to use TLS/SSL failed as it is " + "not supported by the server\n"); } #endif @@ -380,9 +382,7 @@ void service_smtp(char *ip, int32_t sp, unsigned char options, char *miscptr, FI smtp_auth_mechanism = AUTH_PLAIN; } - if ((miscptr != NULL) && (strlen(miscptr) > 0)) { - if (strstr(miscptr, "LOGIN")) smtp_auth_mechanism = AUTH_LOGIN; @@ -399,7 +399,6 @@ void service_smtp(char *ip, int32_t sp, unsigned char options, char *miscptr, FI if (strstr(miscptr, "NTLM")) smtp_auth_mechanism = AUTH_NTLM; - } if (verbose) { @@ -426,10 +425,10 @@ void service_smtp(char *ip, int32_t sp, unsigned char options, char *miscptr, FI free(buf); next_run = 2; break; - case 2: /* run the cracking function */ + case 2: /* run the cracking function */ next_run = start_smtp(sock, ip, port, options, miscptr, fp); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) { sock = hydra_disconnect(sock); } @@ -443,13 +442,13 @@ void service_smtp(char *ip, int32_t sp, unsigned char options, char *miscptr, FI } } -int32_t service_smtp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_smtp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here @@ -457,8 +456,10 @@ int32_t service_smtp_init(char *ip, int32_t sp, unsigned char options, char *mis return 0; } -void usage_smtp(const char* service) { +void usage_smtp(const char *service) { printf("Module smtp is optionally taking one authentication type of:\n" " LOGIN (default), PLAIN, CRAM-MD5, DIGEST-MD5, NTLM\n\n" - "Additionally TLS encryption via STARTTLS can be enforced with the TLS option.\n\n" "Example: smtp://target/TLS:PLAIN\n"); + "Additionally TLS encryption via STARTTLS can be enforced with the " + "TLS option.\n\n" + "Example: smtp://target/TLS:PLAIN\n"); } diff --git a/hydra-snmp.c b/hydra-snmp.c index a9adb17..415ceb8 100644 --- a/hydra-snmp.c +++ b/hydra-snmp.c @@ -1,10 +1,10 @@ #include "hydra-mod.h" #ifdef LIBOPENSSL +#include +#include #include #include #include -#include -#include #endif extern int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec); @@ -15,31 +15,13 @@ extern int32_t child_head_no; char snmpv3buf[1024], *snmpv3info = NULL; int32_t snmpv3infolen = 0, snmpversion = 1, snmpread = 1, hashtype = 1, enctype = 0; -unsigned char snmpv3_init[] = { 0x30, 0x3e, 0x02, 0x01, 0x03, 0x30, 0x11, 0x02, - 0x04, 0x08, 0x86, 0xdd, 0xf0, 0x02, 0x03, 0x00, - 0xff, 0xe3, 0x04, 0x01, 0x04, 0x02, 0x01, 0x03, - 0x04, 0x10, 0x30, 0x0e, 0x04, 0x00, 0x02, 0x01, - 0x00, 0x02, 0x01, 0x00, 0x04, 0x00, 0x04, 0x00, - 0x04, 0x00, 0x30, 0x14, 0x04, 0x00, 0x04, 0x00, - 0xa0, 0x0e, 0x02, 0x04, 0x3f, 0x44, 0x5c, 0xbc, - 0x02, 0x01, 0x00, 0x02, 0x01, 0x00, 0x30, 0x00 -}; +unsigned char snmpv3_init[] = {0x30, 0x3e, 0x02, 0x01, 0x03, 0x30, 0x11, 0x02, 0x04, 0x08, 0x86, 0xdd, 0xf0, 0x02, 0x03, 0x00, 0xff, 0xe3, 0x04, 0x01, 0x04, 0x02, 0x01, 0x03, 0x04, 0x10, 0x30, 0x0e, 0x04, 0x00, 0x02, 0x01, 0x00, 0x02, 0x01, 0x00, 0x04, 0x00, 0x04, 0x00, 0x04, 0x00, 0x30, 0x14, 0x04, 0x00, 0x04, 0x00, 0xa0, 0x0e, 0x02, 0x04, 0x3f, 0x44, 0x5c, 0xbc, 0x02, 0x01, 0x00, 0x02, 0x01, 0x00, 0x30, 0x00}; -unsigned char snmpv3_get1[] = { 0x30, 0x77, 0x02, 0x01, 0x03, 0x30, 0x11, 0x02, - 0x04, 0x08, 0x86, 0xdd, 0xef, 0x02, 0x03, 0x00, - 0xff, 0xe3, 0x04, 0x01, 0x05, 0x02, 0x01, 0x03 -}; +unsigned char snmpv3_get1[] = {0x30, 0x77, 0x02, 0x01, 0x03, 0x30, 0x11, 0x02, 0x04, 0x08, 0x86, 0xdd, 0xef, 0x02, 0x03, 0x00, 0xff, 0xe3, 0x04, 0x01, 0x05, 0x02, 0x01, 0x03}; -unsigned char snmpv3_get2[] = { 0x30, 0x2e, 0x04, 0x0c, 0x80, 0x00, 0x00, - 0x09, 0x03, 0x00, 0x00, 0x1f, 0xca, 0x8d, 0x82, - 0x1b, 0x04, 0x00, 0xa0, 0x1c, 0x02, 0x04, 0x3f, - 0x44, 0x5c, 0xbb, 0x02, 0x01, 0x00, 0x02, 0x01, - 0x00, 0x30, 0x0e, 0x30, 0x0c, 0x06, 0x08, 0x2b, - 0x06, 0x01, 0x02, 0x01, 0x01, 0x01, 0x00, 0x05, - 0x00 -}; +unsigned char snmpv3_get2[] = {0x30, 0x2e, 0x04, 0x0c, 0x80, 0x00, 0x00, 0x09, 0x03, 0x00, 0x00, 0x1f, 0xca, 0x8d, 0x82, 0x1b, 0x04, 0x00, 0xa0, 0x1c, 0x02, 0x04, 0x3f, 0x44, 0x5c, 0xbb, 0x02, 0x01, 0x00, 0x02, 0x01, 0x00, 0x30, 0x0e, 0x30, 0x0c, 0x06, 0x08, 0x2b, 0x06, 0x01, 0x02, 0x01, 0x01, 0x01, 0x00, 0x05, 0x00}; -unsigned char snmpv3_nouser[] = { 0x04, 0x00, 0x04, 0x00, 0x04, 0x00 }; +unsigned char snmpv3_nouser[] = {0x04, 0x00, 0x04, 0x00, 0x04, 0x00}; struct SNMPV1_A { char ID; @@ -49,13 +31,11 @@ struct SNMPV1_A { char comlen; }; -struct SNMPV1_A snmpv1_a = { - .ID = '\x30', - .len = '\x00', - .ver = "\x02\x01\x00", /* \x02\x01\x01 for snmpv2c, \x02\x01\x03 for snmpv3 */ - .comid = '\x04', - .comlen = '\x00' -}; +struct SNMPV1_A snmpv1_a = {.ID = '\x30', + .len = '\x00', + .ver = "\x02\x01\x00", /* \x02\x01\x01 for snmpv2c, \x02\x01\x03 for snmpv3 */ + .comid = '\x04', + .comlen = '\x00'}; struct SNMPV1_R { unsigned char type[2]; @@ -67,12 +47,14 @@ struct SNMPV1_R { unsigned char object[11]; unsigned char value[3]; } snmpv1_r = { - .type = "\xa0\x1b", /* GET */ - .identid = "\x02\x04",.ident = "\x1a\x5e\x97\x00", /* random crap :) */ - .errstat = "\x02\x01\x00", /* no error */ - .errind = "\x02\x01\x00", /* error index 0 */ - .objectid = "\x30\x0d",.object = "\x30\x0b\x06\x07\x2b\x06\x01\x02\x01\x01\x01", /* sysDescr */ - .value = "\x05\x00" /* we just read, so value = 0 */ + .type = "\xa0\x1b", /* GET */ + .identid = "\x02\x04", + .ident = "\x1a\x5e\x97\x00", /* random crap :) */ + .errstat = "\x02\x01\x00", /* no error */ + .errind = "\x02\x01\x00", /* error index 0 */ + .objectid = "\x30\x0d", + .object = "\x30\x0b\x06\x07\x2b\x06\x01\x02\x01\x01\x01", /* sysDescr */ + .value = "\x05\x00" /* we just read, so value = 0 */ }; struct SNMPV1_W { @@ -85,20 +67,22 @@ struct SNMPV1_W { unsigned char object[12]; unsigned char value[8]; } snmpv1_w = { - .type = "\xa3\x21", /* SET */ - .identid = "\x02\x04",.ident = "\x1a\x5e\x97\x22", /* random crap :) */ - .errstat = "\x02\x01\x00", /* no error */ - .errind = "\x02\x01\x00", /* error index 0 */ - .objectid = "\x30\x13", /* string */ - .object = "\x30\x11\x06\x08\x2b\x06\x01\x02\x01\x01\x05\x00",.value = "\x04\x05Hydra" /* writing hydra :-) */ + .type = "\xa3\x21", /* SET */ + .identid = "\x02\x04", + .ident = "\x1a\x5e\x97\x22", /* random crap :) */ + .errstat = "\x02\x01\x00", /* no error */ + .errind = "\x02\x01\x00", /* error index 0 */ + .objectid = "\x30\x13", /* string */ + .object = "\x30\x11\x06\x08\x2b\x06\x01\x02\x01\x01\x05\x00", + .value = "\x04\x05Hydra" /* writing hydra :-) */ }; #ifdef LIBOPENSSL -void password_to_key_md5(u_char * password, /* IN */ - u_int passwordlen, /* IN */ - u_char * engineID, /* IN - pointer to snmpEngineID */ - u_int engineLength, /* IN - length of snmpEngineID */ - u_char * key) { /* OUT - pointer to caller 16-octet buffer */ +void password_to_key_md5(u_char *password, /* IN */ + u_int passwordlen, /* IN */ + u_char *engineID, /* IN - pointer to snmpEngineID */ + u_int engineLength, /* IN - length of snmpEngineID */ + u_char *key) { /* OUT - pointer to caller 16-octet buffer */ MD5_CTX MD; u_char *cp, password_buf[80], *mypass = password, bpass[17]; u_long password_index = 0, count = 0, i, mylen, myelen = engineLength; @@ -121,7 +105,7 @@ void password_to_key_md5(u_char * password, /* IN */ if (myelen > 32) myelen = 32; - MD5_Init(&MD); /* initialize MD5 */ + MD5_Init(&MD); /* initialize MD5 */ /* Use while loop until we've done 1 Megabyte */ while (count < 1048576) { cp = password_buf; @@ -133,7 +117,7 @@ void password_to_key_md5(u_char * password, /* IN */ MD5_Update(&MD, password_buf, 64); count += 64; } - MD5_Final(key, &MD); /* tell MD5 we're done */ + MD5_Final(key, &MD); /* tell MD5 we're done */ /* Now localize the key with the engineID and pass */ /* through MD5 to produce final key */ /* May want to ensure that engineLength <= 32, */ @@ -147,11 +131,11 @@ void password_to_key_md5(u_char * password, /* IN */ return; } -void password_to_key_sha(u_char * password, /* IN */ - u_int passwordlen, /* IN */ - u_char * engineID, /* IN - pointer to snmpEngineID */ - u_int engineLength, /* IN - length of snmpEngineID */ - u_char * key) { /* OUT - pointer to caller 20-octet buffer */ +void password_to_key_sha(u_char *password, /* IN */ + u_int passwordlen, /* IN */ + u_char *engineID, /* IN - pointer to snmpEngineID */ + u_int engineLength, /* IN - length of snmpEngineID */ + u_char *key) { /* OUT - pointer to caller 20-octet buffer */ SHA_CTX SH; u_char *cp, password_buf[80], *mypass = password, bpass[17]; u_long password_index = 0, count = 0, i, mylen = passwordlen, myelen = engineLength; @@ -169,7 +153,7 @@ void password_to_key_sha(u_char * password, /* IN */ if (myelen > 32) myelen = 32; - SHA1_Init(&SH); /* initialize SHA */ + SHA1_Init(&SH); /* initialize SHA */ /* Use while loop until we've done 1 Megabyte */ while (count < 1048576) { cp = password_buf; @@ -181,7 +165,7 @@ void password_to_key_sha(u_char * password, /* IN */ SHA1_Update(&SH, password_buf, 64); count += 64; } - SHA1_Final(key, &SH); /* tell SHA we're done */ + SHA1_Final(key, &SH); /* tell SHA we're done */ /* Now localize the key with the engineID and pass */ /* through SHA to produce final key */ /* May want to ensure that engineLength <= 32, */ @@ -196,7 +180,7 @@ void password_to_key_sha(u_char * password, /* IN */ } #endif -int32_t start_snmp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_snmp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = "\"\"", *ptr, *login, *pass, buffer[1024], buf[1024], hash[64], key[256] = "", salt[8] = ""; int32_t i, j, k, size, off = 0, off2 = 0; unsigned char initVect[8], privacy_params[8]; @@ -223,7 +207,7 @@ int32_t start_snmp(int32_t s, char *ip, int32_t port, unsigned char options, cha size = sizeof(snmpv1_w); } - snmpv1_a.comlen = (char) strlen(pass); + snmpv1_a.comlen = (char)strlen(pass); snmpv1_a.len = snmpv1_a.comlen + size + sizeof(snmpv1_a) - 3; i = sizeof(snmpv1_a); @@ -238,7 +222,7 @@ int32_t start_snmp(int32_t s, char *ip, int32_t port, unsigned char options, cha memcpy(buffer + i, &snmpv1_w, size); i += sizeof(snmpv1_w); } - } else { // snmpv3 + } else { // snmpv3 if (enctype == 0) { memcpy(buffer, snmpv3_get1, sizeof(snmpv3_get1)); i = sizeof(snmpv3_get1); @@ -277,7 +261,8 @@ int32_t start_snmp(int32_t s, char *ip, int32_t port, unsigned char options, cha if (enctype == 0) buffer[1] = 48 + sizeof(snmpv3_get1) + buffer[i + 1]; i += snmpv3infolen; -//printf("2 + %d + %d + %d = 0x%02x\n", off, snmpv3infolen, strlen(login), buffer[1]); + // printf("2 + %d + %d + %d = 0x%02x\n", off, snmpv3infolen, strlen(login), + // buffer[1]); buffer[i] = 0x04; buffer[i + 1] = strlen(login); @@ -301,7 +286,7 @@ int32_t start_snmp(int32_t s, char *ip, int32_t port, unsigned char options, cha i += 2; } else { buffer[i + 1] = 8; - memcpy(buffer + i + 2, salt, 8); // uninitialized and we don't care + memcpy(buffer + i + 2, salt, 8); // uninitialized and we don't care i += 10; } @@ -314,49 +299,49 @@ int32_t start_snmp(int32_t s, char *ip, int32_t port, unsigned char options, cha #ifdef LIBOPENSSL -/* -//PrivDES::encrypt(const unsigned char *key, -// const uint32_t key_len, -// const unsigned char *buffer, -// const uint32_t buffer_len, -// unsigned char *out_buffer, -// uint32_t *out_buffer_len, -// unsigned char *privacy_params, -// uint32_t *privacy_params_len, -// const unsigned long engine_boots, -// const unsigned long engine_time) -// last 8 bytes of key are used as base for initialization vector */ + /* + //PrivDES::encrypt(const unsigned char *key, + // const uint32_t key_len, + // const unsigned char *buffer, + // const uint32_t buffer_len, + // unsigned char *out_buffer, + // uint32_t *out_buffer_len, + // unsigned char *privacy_params, + // uint32_t *privacy_params_len, + // const unsigned long engine_boots, + // const unsigned long engine_time) + // last 8 bytes of key are used as base for initialization vector */ k = 0; - memcpy((char *) initVect, key + 8, 8); + memcpy((char *)initVect, key + 8, 8); // put salt in privacy_params j = htonl(engine_boots); - memcpy(privacy_params, (char *) &j, 4); - memcpy(privacy_params + 4, salt, 4); // ??? correct? - // xor initVect with salt + memcpy(privacy_params, (char *)&j, 4); + memcpy(privacy_params + 4, salt, 4); // ??? correct? + // xor initVect with salt for (i = 0; i < 8; i++) initVect[i] ^= privacy_params[i]; - DES_key_sched((const_DES_cblock *) key, &symcbc); - DES_ncbc_encrypt(snmpv3_get2 + 2, buf, sizeof(snmpv3_get2) - 2, &symcbc, (const_DES_cblock *) (initVect), DES_ENCRYPT); + DES_key_sched((const_DES_cblock *)key, &symcbc); + DES_ncbc_encrypt(snmpv3_get2 + 2, buf, sizeof(snmpv3_get2) - 2, &symcbc, (const_DES_cblock *)(initVect), DES_ENCRYPT); #endif -/* for (i = 0; i <= sizeof(snmpv3_get2) - 8; i += 8) { - DES_ncbc_encrypt(snmpv3_get2 + i, buf + i, 8, (const_DES_cblock*)(initVect), DES_ENCRYPT); - } - // last part of buffer - if (buffer_len % 8) { - unsigned char tmp_buf[8]; - unsigned char *tmp_buf_ptr = tmp_buf; - int32_t start = buffer_len - (buffer_len % 8); - memset(tmp_buf, 0, 8); - for (uint32_t l = start; l < buffer_len; l++) - *tmp_buf_ptr++ = buffer[l]; - DES_ncbc_encrypt(tmp_buf, buf + start, 1, &symcbc, (const_DES_cblock*)(initVect), DES_ENCRYPT); - *out_buffer_len = buffer_len + 8 - (buffer_len % 8); - } else - *out_buffer_len = buffer_len; -*/ - //dummy + /* for (i = 0; i <= sizeof(snmpv3_get2) - 8; i += 8) { + DES_ncbc_encrypt(snmpv3_get2 + i, buf + i, 8, + (const_DES_cblock*)(initVect), DES_ENCRYPT); + } + // last part of buffer + if (buffer_len % 8) { + unsigned char tmp_buf[8]; + unsigned char *tmp_buf_ptr = tmp_buf; + int32_t start = buffer_len - (buffer_len % 8); + memset(tmp_buf, 0, 8); + for (uint32_t l = start; l < buffer_len; l++) + *tmp_buf_ptr++ = buffer[l]; + DES_ncbc_encrypt(tmp_buf, buf + start, 1, &symcbc, + (const_DES_cblock*)(initVect), DES_ENCRYPT); *out_buffer_len = + buffer_len + 8 - (buffer_len % 8); } else *out_buffer_len = buffer_len; + */ + // dummy k = ((sizeof(snmpv3_get2) - 2) / 8); if ((sizeof(snmpv3_get2) - 2) % 8 != 0) k++; @@ -364,13 +349,13 @@ int32_t start_snmp(int32_t s, char *ip, int32_t port, unsigned char options, cha i += k * 8 + 2; } - i++; // just to conform with the snmpv1/2 code + i++; // just to conform with the snmpv1/2 code #ifdef LIBOPENSSL if (hashtype == 1) { - HMAC((EVP_MD *) EVP_md5(), key, 16, buffer, i - 1, hash, NULL); + HMAC((EVP_MD *)EVP_md5(), key, 16, buffer, i - 1, hash, NULL); memcpy(buffer + off, hash, 12); } else if (hashtype == 2) { - HMAC((EVP_MD *) EVP_sha1(), key, 20, buffer, i - 1, hash, NULL); + HMAC((EVP_MD *)EVP_sha1(), key, 20, buffer, i - 1, hash, NULL); memcpy(buffer + off, hash, 12); } #endif @@ -384,19 +369,19 @@ int32_t start_snmp(int32_t s, char *ip, int32_t port, unsigned char options, cha } while (hydra_data_ready_timed(s, 1, 0) <= 0 && j < 3); if (hydra_data_ready_timed(s, 5, 0) > 0) { - i = hydra_recv(s, (char *) buf, sizeof(buf)); + i = hydra_recv(s, (char *)buf, sizeof(buf)); if (snmpversion < 3) { /* stolen from ADMsnmp... :P */ for (j = 0; j < i; j++) { if (buf[j] == '\x04') { /* community name */ for (j = j + buf[j + 1]; j + 2 < i; j++) { - if (buf[j] == '\xa2') { /* PDU Response */ + if (buf[j] == '\xa2') { /* PDU Response */ for (; j + 2 < i; j++) { if (buf[j] == '\x02') { /* ID */ for (j = j + (buf[j + 1]); j + 2 < i; j++) { if (buf[j] == '\x02') { - if (buf[j + 1] == '\x01') { /* good ! */ + if (buf[j + 1] == '\x01') { /* good ! */ hydra_report_found_host(port, ip, "snmp", fp); hydra_completed_pair_found(); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -411,7 +396,7 @@ int32_t start_snmp(int32_t s, char *ip, int32_t port, unsigned char options, cha } } } - } else { // snmpv3 reply + } else { // snmpv3 reply off = 0; if (buf[0] == 0x30) { if (buf[4] == 0x03 && buf[5] == 0x30) @@ -453,7 +438,8 @@ int32_t start_snmp(int32_t s, char *ip, int32_t port, unsigned char options, cha if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) return 3; return 1; - } else if ((buf[off + 15] & 5) == 4 && hydra_memsearch(buf, i, snmpv3_nouser, sizeof(snmpv3_nouser)) >= 0) { // user does not exist + } else if ((buf[off + 15] & 5) == 4 && hydra_memsearch(buf, i, snmpv3_nouser, + sizeof(snmpv3_nouser)) >= 0) { // user does not exist if (verbose) printf("[INFO] user %s does not exist, skipping\n", login); hydra_completed_pair_skip(); @@ -470,7 +456,7 @@ int32_t start_snmp(int32_t s, char *ip, int32_t port, unsigned char options, cha return 1; } -void service_snmp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_snmp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1, i = 0; int32_t myport = PORT_SNMP; char *lptr; @@ -519,7 +505,7 @@ void service_snmp(char *ip, int32_t sp, unsigned char options, char *miscptr, FI hydra_register_socket(sp); if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, no socket available\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, no socket available\n", (int32_t)getpid()); hydra_child_exit(1); } @@ -528,7 +514,7 @@ void service_snmp(char *ip, int32_t sp, unsigned char options, char *miscptr, FI while (snmpv3info == NULL && next_run < 3) { hydra_send(sock, snmpv3_init, sizeof(snmpv3_init), 0); if (hydra_data_ready_timed(sock, 5, 0) > 0) { - if ((i = hydra_recv(sock, (char *) snmpv3buf, sizeof(snmpv3buf))) > 30) { + if ((i = hydra_recv(sock, (char *)snmpv3buf, sizeof(snmpv3buf))) > 30) { if (snmpv3buf[4] == 3 && snmpv3buf[5] == 0x30) { snmpv3info = snmpv3buf + 7 + snmpv3buf[6]; snmpv3infolen = snmpv3info[3] + 4; @@ -538,8 +524,9 @@ void service_snmp(char *ip, int32_t sp, unsigned char options, char *miscptr, FI if (debug) hydra_dump_asciihex(snmpv3info, snmpv3infolen); if (snmpv3info[10] == 3 && child_head_no == 0) - printf("[INFO] Remote device MAC address is %02x:%02x:%02x:%02x:%02x:%02x\n", (unsigned char) snmpv3info[12], (unsigned char) snmpv3info[13], - (unsigned char) snmpv3info[14], (unsigned char) snmpv3info[15], (unsigned char) snmpv3info[16], (unsigned char) snmpv3info[12]); + printf("[INFO] Remote device MAC address is " + "%02x:%02x:%02x:%02x:%02x:%02x\n", + (unsigned char)snmpv3info[12], (unsigned char)snmpv3info[13], (unsigned char)snmpv3info[14], (unsigned char)snmpv3info[15], (unsigned char)snmpv3info[16], (unsigned char)snmpv3info[12]); } } } @@ -557,10 +544,10 @@ void service_snmp(char *ip, int32_t sp, unsigned char options, char *miscptr, FI while (1) { switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ next_run = start_snmp(sock, ip, port, options, miscptr, fp); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(2); @@ -573,13 +560,13 @@ void service_snmp(char *ip, int32_t sp, unsigned char options, char *miscptr, FI } } -int32_t service_snmp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_snmp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here @@ -587,20 +574,22 @@ int32_t service_snmp_init(char *ip, int32_t sp, unsigned char options, char *mis return 0; } -void usage_snmp(const char* service) { +void usage_snmp(const char *service) { printf("Module snmp is optionally taking the following parameters:\n" " READ perform read requests (default)\n" " WRITE perform write requests\n" " 1 use SNMP version 1 (default)\n" " 2 use SNMP version 2\n" " 3 use SNMP version 3\n" - " Note that SNMP version 3 usually uses both login and passwords!\n" + " Note that SNMP version 3 usually uses both login and " + "passwords!\n" " SNMP version 3 has the following optional sub parameters:\n" " MD5 use MD5 authentication (default)\n" " SHA use SHA authentication\n" " DES use DES encryption\n" " AES use AES encryption\n" - " if no -p/-P parameter is given, SNMPv3 noauth is performed, which\n" + " if no -p/-P parameter is given, SNMPv3 noauth is performed, " + "which\n" " only requires a password (or username) not both.\n" "To combine the options, use colons (\":\"), e.g.:\n" " hydra -L user.txt -P pass.txt -m 3:SHA:AES:READ target.com snmp\n" diff --git a/hydra-socks5.c b/hydra-socks5.c index 6781916..aef0a68 100644 --- a/hydra-socks5.c +++ b/hydra-socks5.c @@ -14,7 +14,7 @@ unsigned char *buf; int32_t fail_cnt; -int32_t start_socks5(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_socks5(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, *pass, buffer[300]; int32_t pport, fud = 0; @@ -28,7 +28,7 @@ int32_t start_socks5(int32_t s, char *ip, int32_t port, unsigned char options, c if (hydra_send(s, buffer, 4, 0) < 0) { return 1; } - if ((buf = (unsigned char *) hydra_receive_line(s)) == NULL) { + if ((buf = (unsigned char *)hydra_receive_line(s)) == NULL) { fail_cnt++; if (fail_cnt >= 10) return 5; @@ -57,16 +57,16 @@ int32_t start_socks5(int32_t s, char *ip, int32_t port, unsigned char options, c } free(buf); -/* RFC 1929 - For username/password authentication the client's authentication request is - field 1: version number, 1 byte (must be 0x01) -*/ - snprintf(buffer, sizeof(buffer), "\x01%c%s%c%s", (char) strlen(login), login, (char) strlen(pass), pass); + /* RFC 1929 + For username/password authentication the client's authentication request is + field 1: version number, 1 byte (must be 0x01) + */ + snprintf(buffer, sizeof(buffer), "\x01%c%s%c%s", (char)strlen(login), login, (char)strlen(pass), pass); if (hydra_send(s, buffer, strlen(buffer), 0) < 0) return 1; - if ((buf = (unsigned char *) hydra_receive_line(s)) == NULL) + if ((buf = (unsigned char *)hydra_receive_line(s)) == NULL) return (1); if (buf[1] != 255) { @@ -84,7 +84,7 @@ int32_t start_socks5(int32_t s, char *ip, int32_t port, unsigned char options, c memcpy(buffer + 8, &pport, 2); hydra_send(s, buffer, 10, 0); } - if ((buf = (unsigned char *) hydra_receive_line(s)) != NULL) { + if ((buf = (unsigned char *)hydra_receive_line(s)) != NULL) { if (buf[1] == 0 || buf[1] == 32) { hydra_report_found_host(port, ip, "socks5", fp); hydra_completed_pair_found(); @@ -104,7 +104,7 @@ int32_t start_socks5(int32_t s, char *ip, int32_t port, unsigned char options, c return 2; } -void service_socks5(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_socks5(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_SOCKS5, mysslport = PORT_SOCKS5_SSL; @@ -116,10 +116,10 @@ void service_socks5(char *ip, int32_t sp, unsigned char options, char *miscptr, while (1) { switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ if (sock >= 0) sock = hydra_disconnect(sock); -// usleepn(300); + // usleepn(300); if ((options & OPTION_SSL) == 0) { if (port != 0) myport = port; @@ -133,25 +133,25 @@ void service_socks5(char *ip, int32_t sp, unsigned char options, char *miscptr, } if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } next_run = 2; break; - case 2: /* run the cracking function */ + case 2: /* run the cracking function */ next_run = start_socks5(sock, ip, port, options, miscptr, fp); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); return; - case 4: /* clean exit */ + case 4: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(2); return; - case 5: /* clean exit, server may blocking connections */ + case 5: /* clean exit, server may blocking connections */ hydra_report(stderr, "[ERROR] Server may blocking connections\n"); if (sock >= 0) sock = hydra_disconnect(sock); @@ -165,13 +165,13 @@ void service_socks5(char *ip, int32_t sp, unsigned char options, char *miscptr, } } -int32_t service_socks5_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_socks5_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here diff --git a/hydra-ssh.c b/hydra-ssh.c index 1ca2815..ef4a691 100644 --- a/hydra-ssh.c +++ b/hydra-ssh.c @@ -8,9 +8,7 @@ have to add option -DWITH_SSH1=On in the cmake #include "hydra-mod.h" #ifndef LIBSSH -void dummy_ssh() { - printf("\n"); -} +void dummy_ssh() { printf("\n"); } #else #include @@ -23,7 +21,7 @@ extern hydra_option hydra_options; extern char *HYDRA_EXIT; int32_t new_session = 1; -int32_t start_ssh(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_ssh(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, *pass, keep_login[300]; int32_t auth_state = 0, rc = 0, i = 0; @@ -49,7 +47,7 @@ int32_t start_ssh(int32_t s, char *ip, int32_t port, unsigned char options, char ssh_options_set(session, SSH_OPTIONS_COMPRESSION_C_S, "none"); ssh_options_set(session, SSH_OPTIONS_COMPRESSION_S_C, "none"); if (ssh_connect(session) != 0) { - //if the connection was drop, exit and let hydra main handle it + // if the connection was drop, exit and let hydra main handle it if (verbose) hydra_report(stderr, "[ERROR] could not connect to target port %d: %s\n", port, ssh_get_error(session)); return 3; @@ -110,7 +108,7 @@ int32_t start_ssh(int32_t s, char *ip, int32_t port, unsigned char options, char return 1; } -void service_ssh(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_ssh(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; hydra_register_socket(sp); @@ -118,7 +116,7 @@ void service_ssh(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL return; while (1) { switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ next_run = start_ssh(sock, ip, port, options, miscptr, fp); break; case 2: @@ -158,16 +156,16 @@ void service_ssh(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL #endif // -// dirty workaround here: miscptr is the ptr to the logins, and the first one is used -// to test if password authentication is enabled!! +// dirty workaround here: miscptr is the ptr to the logins, and the first one is +// used to test if password authentication is enabled!! // -int32_t service_ssh_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_ssh_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // 1 skip target without generating an error @@ -176,9 +174,11 @@ int32_t service_ssh_init(char *ip, int32_t sp, unsigned char options, char *misc #ifdef LIBSSH int32_t rc, method; ssh_session session = ssh_new(); - + if (verbose || debug) - printf("[INFO] Testing if password authentication is supported by ssh://%s@%s:%d\n", miscptr == NULL ? "hydra" : miscptr, hydra_address2string_beautiful(ip), port); + printf("[INFO] Testing if password authentication is supported by " + "ssh://%s@%s:%d\n", + miscptr == NULL ? "hydra" : miscptr, hydra_address2string_beautiful(ip), port); ssh_options_set(session, SSH_OPTIONS_PORT, &port); ssh_options_set(session, SSH_OPTIONS_HOST, hydra_address2string(ip)); if (miscptr == NULL) @@ -191,26 +191,35 @@ int32_t service_ssh_init(char *ip, int32_t sp, unsigned char options, char *misc if (ssh_connect(session) != 0) { fprintf(stderr, "[ERROR] could not connect to ssh://%s:%d - %s\n", hydra_address2string_beautiful(ip), port, ssh_get_error(session)); return 2; - } + } rc = ssh_userauth_none(session, NULL); - method = ssh_userauth_list(session, NULL); + method = ssh_userauth_list(session, NULL); ssh_disconnect(session); ssh_finalize(); ssh_free(session); - if (debug) printf("[DEBUG] SSH method check: %08x\n", method); + if (debug) + printf("[DEBUG] SSH method check: %08x\n", method); if ((method & SSH_AUTH_METHOD_INTERACTIVE) || (method & SSH_AUTH_METHOD_PASSWORD)) { if (verbose || debug) - printf("[INFO] Successful, password authentication is supported by ssh://%s:%d\n", hydra_address2string_beautiful(ip), port); + printf("[INFO] Successful, password authentication is supported by " + "ssh://%s:%d\n", + hydra_address2string_beautiful(ip), port); return 0; } else if (method == 0) { if (verbose || debug) - fprintf(stderr, "[WARNING] invalid SSH method reply from ssh://%s:%d, continuing anyway ... (check for empty password!)\n", hydra_address2string_beautiful(ip), port); + fprintf(stderr, + "[WARNING] invalid SSH method reply from ssh://%s:%d, continuing " + "anyway ... (check for empty password!)\n", + hydra_address2string_beautiful(ip), port); return 0; } - fprintf(stderr, "[ERROR] target ssh://%s:%d/ does not support password authentication (method reply %d).\n", hydra_address2string_beautiful(ip), port, method); + fprintf(stderr, + "[ERROR] target ssh://%s:%d/ does not support password " + "authentication (method reply %d).\n", + hydra_address2string_beautiful(ip), port, method); return 1; #else return 0; diff --git a/hydra-sshkey.c b/hydra-sshkey.c index 7a51389..113d6de 100644 --- a/hydra-sshkey.c +++ b/hydra-sshkey.c @@ -1,16 +1,14 @@ /* libssh is available at http://www.libssh.org - current version is 0.4.8 + current version is 0.4.8 If you want support for ssh v1 protocol, you have to add option -DWITH_SSH1=On in the cmake */ #include "hydra-mod.h" #ifndef LIBSSH -void dummy_sshkey() { - printf("\n"); -} +void dummy_sshkey() { printf("\n"); } #else #include @@ -21,7 +19,7 @@ extern ssh_session session; extern char *HYDRA_EXIT; extern int32_t new_session; -int32_t start_sshkey(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_sshkey(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, *key, keep_login[300]; int32_t auth_state = 0, rc = 0; @@ -46,7 +44,7 @@ int32_t start_sshkey(int32_t s, char *ip, int32_t port, unsigned char options, c ssh_options_set(session, SSH_OPTIONS_COMPRESSION_C_S, "none"); ssh_options_set(session, SSH_OPTIONS_COMPRESSION_S_C, "none"); if (ssh_connect(session) != 0) { - //if the connection was drop, exit and let hydra main handle it + // if the connection was drop, exit and let hydra main handle it if (verbose) hydra_report(stderr, "[ERROR] could not connect to target port %d\n", port); return 3; @@ -108,7 +106,7 @@ int32_t start_sshkey(int32_t s, char *ip, int32_t port, unsigned char options, c return 1; } -void service_sshkey(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_sshkey(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; hydra_register_socket(sp); @@ -116,7 +114,7 @@ void service_sshkey(char *ip, int32_t sp, unsigned char options, char *miscptr, return; while (1) { switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ next_run = start_sshkey(sock, ip, port, options, miscptr, fp); break; case 2: @@ -154,13 +152,13 @@ void service_sshkey(char *ip, int32_t sp, unsigned char options, char *miscptr, #endif #endif -int32_t service_sshkey_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_sshkey_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here @@ -168,9 +166,11 @@ int32_t service_sshkey_init(char *ip, int32_t sp, unsigned char options, char *m return 0; } -void usage_sshkey(const char* service) { - printf("Module sshkey does not provide additional options, although the semantic for\n" +void usage_sshkey(const char *service) { + printf("Module sshkey does not provide additional options, although the " + "semantic for\n" "options -p and -P is changed:\n" " -p expects a path to an unencrypted private key in PEM format.\n" - " -P expects a filename containing a list of path to some unencrypted\n" " private keys in PEM format.\n\n"); + " -P expects a filename containing a list of path to some unencrypted\n" + " private keys in PEM format.\n\n"); } diff --git a/hydra-svn.c b/hydra-svn.c index 91d8503..063f12c 100644 --- a/hydra-svn.c +++ b/hydra-svn.c @@ -1,5 +1,5 @@ -//This plugin was written by -//checked for memleaks on 110425, none found +// This plugin was written by +// checked for memleaks on 110425, none found #ifdef LIBSVN @@ -10,12 +10,12 @@ #include #endif -#include #include #include -#include #include #include +#include +#include #if SVN_VER_MINOR > 7 #include #endif @@ -25,9 +25,7 @@ #include "hydra-mod.h" #ifndef LIBSVN -void dummy_svn() { - printf("\n"); -} +void dummy_svn() { printf("\n"); } #else extern int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec); @@ -36,11 +34,9 @@ extern char *HYDRA_EXIT; #define DEFAULT_BRANCH "trunk" -static svn_error_t *print_dirdummy(void *baton, const char *path, const svn_dirent_t * dirent, const svn_lock_t * lock, const char *abs_path, apr_pool_t * pool) { - return SVN_NO_ERROR; -} +static svn_error_t *print_dirdummy(void *baton, const char *path, const svn_dirent_t *dirent, const svn_lock_t *lock, const char *abs_path, apr_pool_t *pool) { return SVN_NO_ERROR; } -static svn_error_t *my_simple_prompt_callback(svn_auth_cred_simple_t ** cred, void *baton, const char *realm, const char *username, svn_boolean_t may_save, apr_pool_t * pool) { +static svn_error_t *my_simple_prompt_callback(svn_auth_cred_simple_t **cred, void *baton, const char *realm, const char *username, svn_boolean_t may_save, apr_pool_t *pool) { char *empty = ""; char *login, *pass; svn_auth_cred_simple_t *ret = apr_pcalloc(pool, sizeof(*ret)); @@ -57,13 +53,13 @@ static svn_error_t *my_simple_prompt_callback(svn_auth_cred_simple_t ** cred, vo return SVN_NO_ERROR; } -int32_t start_svn(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { - //int32_t ipv6 = 0; +int32_t start_svn(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { + // int32_t ipv6 = 0; char URL[1024]; char URLBRANCH[256]; - #if SVN_VER_MINOR > 7 +#if SVN_VER_MINOR > 7 const char *canonical; - #endif +#endif apr_pool_t *pool; svn_error_t *err; svn_opt_revision_t revision; @@ -80,7 +76,7 @@ int32_t start_svn(int32_t s, char *ip, int32_t port, unsigned char options, char if (svn_cmdline_init("hydra", stderr) != EXIT_SUCCESS) return 4; - //if (ip[0] == 16) + // if (ip[0] == 16) // ipv6 = 1; pool = svn_pool_create(NULL); @@ -96,7 +92,7 @@ int32_t start_svn(int32_t s, char *ip, int32_t port, unsigned char options, char if ((err = svn_client_create_context2(&ctx, NULL, pool))) { #else if ((err = svn_client_create_context(&ctx, pool))) { -#endif +#endif svn_pool_destroy(pool); svn_handle_error2(err, stderr, FALSE, "hydra: "); return 4; @@ -110,7 +106,7 @@ int32_t start_svn(int32_t s, char *ip, int32_t port, unsigned char options, char providers = apr_array_make(pool, 1, sizeof(svn_auth_provider_object_t *)); - svn_auth_get_simple_prompt_provider(&provider, my_simple_prompt_callback, NULL, /* baton */ + svn_auth_get_simple_prompt_provider(&provider, my_simple_prompt_callback, NULL, /* baton */ 0, pool); APR_ARRAY_PUSH(providers, svn_auth_provider_object_t *) = provider; @@ -120,29 +116,29 @@ int32_t start_svn(int32_t s, char *ip, int32_t port, unsigned char options, char revision.kind = svn_opt_revision_head; snprintf(URL, sizeof(URL), "svn://%s:%d/%s", hydra_address2string_beautiful(ip), port, URLBRANCH); dirents = SVN_DIRENT_KIND; - #if SVN_VER_MINOR > 9 +#if SVN_VER_MINOR > 9 canonical = svn_uri_canonicalize(URL, pool); - err = svn_client_list4(canonical, &revision, &revision, NULL, svn_depth_unknown, dirents, FALSE, FALSE, (svn_client_list_func2_t) print_dirdummy, NULL, ctx, pool); - #elif SVN_VER_MINOR > 7 + err = svn_client_list4(canonical, &revision, &revision, NULL, svn_depth_unknown, dirents, FALSE, FALSE, (svn_client_list_func2_t)print_dirdummy, NULL, ctx, pool); +#elif SVN_VER_MINOR > 7 canonical = svn_uri_canonicalize(URL, pool); - err = svn_client_list3(canonical, &revision, &revision, svn_depth_unknown, dirents, FALSE, FALSE, (svn_client_list_func2_t) print_dirdummy, NULL, ctx, pool); - #else - err = svn_client_list2(URL, &revision, &revision, svn_depth_unknown, dirents, FALSE, print_dirdummy, NULL, ctx, pool); - #endif + err = svn_client_list3(canonical, &revision, &revision, svn_depth_unknown, dirents, FALSE, FALSE, (svn_client_list_func2_t)print_dirdummy, NULL, ctx, pool); +#else +err = svn_client_list2(URL, &revision, &revision, svn_depth_unknown, dirents, FALSE, print_dirdummy, NULL, ctx, pool); +#endif svn_pool_destroy(pool); if (err) { if (debug || (verbose && (err->apr_err != 170001 && err->apr_err != 170013))) hydra_report(stderr, "[ERROR] Access refused (error code %d) , message: %s\n", err->apr_err, err->message); - //Username not found 170001 ": Username not found" - //Password incorrect 170001 ": Password incorrect" + // Username not found 170001 ": Username not found" + // Password incorrect 170001 ": Password incorrect" if (err->apr_err != 170001 && err->apr_err != 170013) { - return 4; //error + return 4; // error } else { if (strstr(err->message, "Username not found")) { - //if (verbose) - //printf("[INFO] user %s does not exist, skipping\n", login); + // if (verbose) + // printf("[INFO] user %s does not exist, skipping\n", login); hydra_completed_pair_skip(); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) return 3; @@ -162,7 +158,7 @@ int32_t start_svn(int32_t s, char *ip, int32_t port, unsigned char options, char return 3; } -void service_svn(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_svn(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_SVN, mysslport = PORT_SVN_SSL; @@ -173,11 +169,11 @@ void service_svn(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL return; switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ if (sock >= 0) sock = hydra_disconnect(sock); -// usleepn(300); + // usleepn(300); if ((options & OPTION_SSL) == 0) { if (port != 0) myport = port; @@ -191,7 +187,7 @@ void service_svn(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL } if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } @@ -207,7 +203,8 @@ void service_svn(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL return; default: if (!verbose) - hydra_report(stderr, "[ERROR] Caught unknown return code, try verbose option for more details\n"); + hydra_report(stderr, "[ERROR] Caught unknown return code, try verbose " + "option for more details\n"); hydra_child_exit(0); } run = next_run; @@ -216,13 +213,13 @@ void service_svn(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL #endif -int32_t service_svn_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_svn_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here @@ -238,6 +235,7 @@ int32_t service_svn_init(char *ip, int32_t sp, unsigned char options, char *misc return 0; } -void usage_svn(const char* service) { - printf("Module svn is optionally taking the repository name to attack, default is \"trunk\"\n\n"); +void usage_svn(const char *service) { + printf("Module svn is optionally taking the repository name to attack, " + "default is \"trunk\"\n\n"); } diff --git a/hydra-teamspeak.c b/hydra-teamspeak.c index 78510e6..d0d17c2 100644 --- a/hydra-teamspeak.c +++ b/hydra-teamspeak.c @@ -37,7 +37,7 @@ extern int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec); extern char *HYDRA_EXIT; -int32_t start_teamspeak(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_teamspeak(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, *pass; char buf[100]; @@ -53,21 +53,21 @@ int32_t start_teamspeak(int32_t s, char *ip, int32_t port, unsigned char options memcpy(&teamspeak.header, "\xf4\xbe\x03\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00", 16); teamspeak.clientlen = 9; - strcpy((char *) &teamspeak.client, "TeamSpeak"); + strcpy((char *)&teamspeak.client, "TeamSpeak"); teamspeak.oslen = 11; - strcpy((char *) &teamspeak.os, "Linux 2.6.9"); + strcpy((char *)&teamspeak.os, "Linux 2.6.9"); memcpy(&teamspeak.misc, "\x02\x00\x00\x00\x20\x00\x3c\x00\x01\x02", 10); teamspeak.userlen = strlen(login); - strncpy((char *) &teamspeak.user, login, 29); + strncpy((char *)&teamspeak.user, login, 29); teamspeak.passlen = strlen(pass); - strncpy((char *) &teamspeak.pass, pass, 29); + strncpy((char *)&teamspeak.pass, pass, 29); teamspeak.loginlen = 0; - strcpy((char *) &teamspeak.login, ""); + strcpy((char *)&teamspeak.login, ""); #ifdef HAVE_ZLIB teamspeak.crc = crc32(0L, (const Bytef *)&teamspeak, sizeof(struct team_speak)); @@ -75,22 +75,22 @@ int32_t start_teamspeak(int32_t s, char *ip, int32_t port, unsigned char options teamspeak.crc = crc32(&teamspeak, sizeof(struct team_speak)); #endif - if (hydra_send(s, (char *) &teamspeak, sizeof(struct team_speak), 0) < 0) { + if (hydra_send(s, (char *)&teamspeak, sizeof(struct team_speak), 0) < 0) { return 3; } if (hydra_data_ready_timed(s, 5, 0) > 0) { - hydra_recv(s, (char *) buf, sizeof(buf)); + hydra_recv(s, (char *)buf, sizeof(buf)); if (buf[0x58] == 1) { hydra_report_found_host(port, ip, "teamspeak", fp); hydra_completed_pair_found(); } if (buf[0x4B] != 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } } else { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } @@ -101,7 +101,7 @@ int32_t start_teamspeak(int32_t s, char *ip, int32_t port, unsigned char options return 1; } -void service_teamspeak(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_teamspeak(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_TEAMSPEAK; @@ -112,23 +112,23 @@ void service_teamspeak(char *ip, int32_t sp, unsigned char options, char *miscpt while (1) { switch (run) { - case 1: /* connect and service init function */ -// if (sock >= 0) -// sock = hydra_disconnect(sock); -// usleepn(300); + case 1: /* connect and service init function */ + // if (sock >= 0) + // sock = hydra_disconnect(sock); + // usleepn(300); if (sock < 0) { if (port != 0) myport = port; sock = hydra_connect_udp(ip, myport); port = myport; if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } } next_run = start_teamspeak(sock, ip, port, options, miscptr, fp); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(2); @@ -141,13 +141,13 @@ void service_teamspeak(char *ip, int32_t sp, unsigned char options, char *miscpt } } -int32_t service_teamspeak_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_teamspeak_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here diff --git a/hydra-telnet.c b/hydra-telnet.c index b938271..762ade1 100644 --- a/hydra-telnet.c +++ b/hydra-telnet.c @@ -5,7 +5,7 @@ extern char *HYDRA_EXIT; char *buf; int32_t no_line_mode; -int32_t start_telnet(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_telnet(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, *pass, buffer[300]; int32_t i = 0; @@ -44,7 +44,7 @@ int32_t start_telnet(int32_t s, char *ip, int32_t port, unsigned char options, c return 3; return 1; } - (void) make_to_lower(buf); + (void)make_to_lower(buf); if (hydra_strcasestr(buf, "asswor") != NULL || hydra_strcasestr(buf, "asscode") != NULL || hydra_strcasestr(buf, "ennwort") != NULL) i = 1; @@ -76,10 +76,7 @@ int32_t start_telnet(int32_t s, char *ip, int32_t port, unsigned char options, c /*win7 answering with do terminal type = 0xfd 0x18 */ while ((buf = hydra_receive_line(s)) != NULL && make_to_lower(buf) && (strstr(buf, "login:") == NULL || strstr(buf, "last login:") != NULL) && strstr(buf, "sername:") == NULL) { - if ((miscptr != NULL && strstr(buf, miscptr) != NULL) || (miscptr == NULL && - strstr(buf, "invalid") == NULL && strstr(buf, "failed") == NULL && strstr(buf, "bad ") == NULL && - (index(buf, '/') != NULL || index(buf, '>') != NULL || index(buf, '$') != NULL || index(buf, '#') != NULL || - index(buf, '%') != NULL || ((buf[1] == '\xfd') && (buf[2] == '\x18'))))) { + if ((miscptr != NULL && strstr(buf, miscptr) != NULL) || (miscptr == NULL && strstr(buf, "invalid") == NULL && strstr(buf, "failed") == NULL && strstr(buf, "bad ") == NULL && (index(buf, '/') != NULL || index(buf, '>') != NULL || index(buf, '$') != NULL || index(buf, '#') != NULL || index(buf, '%') != NULL || ((buf[1] == '\xfd') && (buf[2] == '\x18'))))) { hydra_report_found_host(port, ip, "telnet", fp); hydra_completed_pair_found(); free(buf); @@ -96,7 +93,7 @@ int32_t start_telnet(int32_t s, char *ip, int32_t port, unsigned char options, c return 2; } -void service_telnet(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_telnet(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1, fck; int32_t myport = PORT_TELNET, mysslport = PORT_TELNET_SSL; @@ -110,10 +107,10 @@ void service_telnet(char *ip, int32_t sp, unsigned char options, char *miscptr, int32_t old_waittime = waittime; switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ if (sock >= 0) sock = hydra_disconnect(sock); -// usleepn(300); + // usleepn(300); no_line_mode = 0; first = 0; if ((options & OPTION_SSL) == 0) { @@ -128,13 +125,13 @@ void service_telnet(char *ip, int32_t sp, unsigned char options, char *miscptr, port = mysslport; } if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } - if ((buf = hydra_receive_line(sock)) == NULL) { /* check the first line */ + if ((buf = hydra_receive_line(sock)) == NULL) { /* check the first line */ hydra_report(stderr, "[ERROR] Not a TELNET protocol or service shutdown\n"); hydra_child_exit(2); -// hydra_child_exit(2); + // hydra_child_exit(2); } if (hydra_strcasestr(buf, "ress ENTER") != NULL) { hydra_send(sock, "\r\n", 2, 0); @@ -150,7 +147,7 @@ void service_telnet(char *ip, int32_t sp, unsigned char options, char *miscptr, hydra_report(stdout, "DEBUG: waittime set to %d\n", waittime); } do { - unsigned char *buf2 = (unsigned char *) buf; + unsigned char *buf2 = (unsigned char *)buf; while (*buf2 == IAC) { if (first == 0) { @@ -175,23 +172,23 @@ void service_telnet(char *ip, int32_t sp, unsigned char options, char *miscptr, buf2 = buf2 + 3; } - if (buf2 != (unsigned char *) buf) { + if (buf2 != (unsigned char *)buf) { free(buf); buf = hydra_receive_line(sock); } else { buf[0] = 0; } - if (buf != NULL && buf[0] != 0 && (unsigned char) buf[0] != IAC) + if (buf != NULL && buf[0] != 0 && (unsigned char)buf[0] != IAC) make_to_lower(buf); - } while (buf != NULL && (unsigned char) buf[0] == IAC && hydra_strcasestr(buf, "ogin:") == NULL && hydra_strcasestr(buf, "sername:") == NULL); + } while (buf != NULL && (unsigned char)buf[0] == IAC && hydra_strcasestr(buf, "ogin:") == NULL && hydra_strcasestr(buf, "sername:") == NULL); free(buf); waittime = old_waittime; next_run = 2; break; - case 2: /* run the cracking function */ + case 2: /* run the cracking function */ next_run = start_telnet(sock, ip, port, options, miscptr, fp); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); @@ -204,13 +201,13 @@ void service_telnet(char *ip, int32_t sp, unsigned char options, char *miscptr, } } -int32_t service_telnet_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_telnet_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here @@ -218,7 +215,9 @@ int32_t service_telnet_init(char *ip, int32_t sp, unsigned char options, char *m return 0; } -void usage_telnet(const char* service) { +void usage_telnet(const char *service) { printf("Module telnet is optionally taking the string which is displayed after\n" - "a successful login (case insensitive), use if the default in the telnet\n" "module produces too many false positives\n\n"); + "a successful login (case insensitive), use if the default in the " + "telnet\n" + "module produces too many false positives\n\n"); } diff --git a/hydra-time.c b/hydra-time.c index bbd068d..393377a 100644 --- a/hydra-time.c +++ b/hydra-time.c @@ -2,30 +2,23 @@ #ifndef _WIN32 #include -int32_t sleepn(time_t seconds) -{ - struct timespec ts; - ts.tv_sec = seconds; - ts.tv_nsec = 0; - return nanosleep(&ts, NULL); +int32_t sleepn(time_t seconds) { + struct timespec ts; + ts.tv_sec = seconds; + ts.tv_nsec = 0; + return nanosleep(&ts, NULL); } int32_t usleepn(uint64_t milisec) { - struct timespec ts; - ts.tv_sec = milisec / 1000; - ts.tv_nsec = (milisec % 1000) * 1000000L; - return nanosleep(&ts, NULL); + struct timespec ts; + ts.tv_sec = milisec / 1000; + ts.tv_nsec = (milisec % 1000) * 1000000L; + return nanosleep(&ts, NULL); } #else #include -int32_t sleepn(uint32_t seconds) -{ - return SleepEx(milisec*1000,TRUE); -} +int32_t sleepn(uint32_t seconds) { return SleepEx(milisec * 1000, TRUE); } -int32_t usleepn(uint32_t milisec) -{ - return SleepEx(milisec,TRUE); -} +int32_t usleepn(uint32_t milisec) { return SleepEx(milisec, TRUE); } #endif diff --git a/hydra-vmauthd.c b/hydra-vmauthd.c index 06f656f..7f66f5a 100644 --- a/hydra-vmauthd.c +++ b/hydra-vmauthd.c @@ -1,16 +1,15 @@ -//This plugin was written by david@ +// This plugin was written by david@ // -//This plugin is written for VMware Authentication Daemon +// This plugin is written for VMware Authentication Daemon // #include "hydra-mod.h" - extern char *HYDRA_EXIT; char *buf; -int32_t start_vmauthd(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_vmauthd(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = "\"\""; char *login, *pass, buffer[300]; @@ -45,9 +44,9 @@ int32_t start_vmauthd(int32_t s, char *ip, int32_t port, unsigned char options, if ((buf = hydra_receive_line(s)) == NULL) return (1); -//fprintf(stderr, "%s\n", buf); -//230 User test logged in. -//530 Login incorrect. + // fprintf(stderr, "%s\n", buf); + // 230 User test logged in. + // 530 Login incorrect. if (strncmp(buf, "230 ", 4) == 0) { hydra_report_found_host(port, ip, "vmauthd", fp); @@ -65,7 +64,7 @@ int32_t start_vmauthd(int32_t s, char *ip, int32_t port, unsigned char options, return 2; } -void service_vmauthd(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_vmauthd(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_VMAUTHD, mysslport = PORT_VMAUTHD_SSL; @@ -74,10 +73,10 @@ void service_vmauthd(char *ip, int32_t sp, unsigned char options, char *miscptr, return; while (1) { switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ if (sock >= 0) sock = hydra_disconnect(sock); -// usleepn(300); + // usleepn(300); if ((options & OPTION_SSL) == 0) { if (port != 0) myport = port; @@ -92,14 +91,15 @@ void service_vmauthd(char *ip, int32_t sp, unsigned char options, char *miscptr, if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } buf = hydra_receive_line(sock); -//fprintf(stderr, "%s\n",buf); -//220 VMware Authentication Daemon Version 1.00 -//220 VMware Authentication Daemon Version 1.10: SSL Required -//220 VMware Authentication Daemon Version 1.10: SSL Required, ServerDaemonProtocol:SOAP, MKSDisplayProtocol:VNC , + // fprintf(stderr, "%s\n",buf); + // 220 VMware Authentication Daemon Version 1.00 + // 220 VMware Authentication Daemon Version 1.10: SSL Required + // 220 VMware Authentication Daemon Version 1.10: SSL Required, + // ServerDaemonProtocol:SOAP, MKSDisplayProtocol:VNC , if (buf == NULL || strstr(buf, "220 VMware Authentication Daemon Version ") == NULL) { /* check the first line */ @@ -108,14 +108,17 @@ void service_vmauthd(char *ip, int32_t sp, unsigned char options, char *miscptr, hydra_child_exit(2); } if ((strstr(buf, "Version 1.00") == NULL) && (strstr(buf, "Version 1.10") == NULL)) { - hydra_report(stderr, "[ERROR] this vmware authd protocol is not supported, please report: %s\n", buf); + hydra_report(stderr, + "[ERROR] this vmware authd protocol is not supported, " + "please report: %s\n", + buf); free(buf); hydra_child_exit(2); } - //by default this service is waiting for ssl connections + // by default this service is waiting for ssl connections if (strstr(buf, "SSL Required") != NULL) { if ((options & OPTION_SSL) == 0) { - //reconnecting using SSL + // reconnecting using SSL if (hydra_connect_to_ssl(sock, hostname) == -1) { free(buf); hydra_report(stderr, "[ERROR] Can't use SSL\n"); @@ -127,10 +130,10 @@ void service_vmauthd(char *ip, int32_t sp, unsigned char options, char *miscptr, next_run = 2; break; - case 2: /* run the cracking function */ + case 2: /* run the cracking function */ next_run = start_vmauthd(sock, ip, port, options, miscptr, fp); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); @@ -143,13 +146,13 @@ void service_vmauthd(char *ip, int32_t sp, unsigned char options, char *miscptr, } } -int32_t service_vmauthd_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_vmauthd_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here diff --git a/hydra-vnc.c b/hydra-vnc.c index 95a12d8..aeecd59 100644 --- a/hydra-vnc.c +++ b/hydra-vnc.c @@ -5,14 +5,14 @@ * */ -#include "hydra-mod.h" #include "d3des.h" +#include "hydra-mod.h" #define CHALLENGESIZE 16 -//for RFB 003.003 & 003.005 +// for RFB 003.003 & 003.005 #define RFB33 1 -//for RFB 3.7 and onwards +// for RFB 3.7 and onwards #define RFB37 2 int32_t vnc_client_version = RFB33; @@ -44,7 +44,7 @@ void vncEncryptBytes(unsigned char *bytes, char *passwd) { } } -int32_t start_vnc(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_vnc(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *pass; unsigned char buf2[CHALLENGESIZE + 4]; @@ -57,22 +57,22 @@ int32_t start_vnc(int32_t s, char *ip, int32_t port, unsigned char options, char if (vnc_client_version == RFB37) { int32_t i; - //fprintf(stderr,"number of security types supported: %d\n", buf2[0]); + // fprintf(stderr,"number of security types supported: %d\n", buf2[0]); if (buf2[0] == 0 || buf2[0] > CHALLENGESIZE + 4) { hydra_report(stderr, "[ERROR] VNC server connection failed\n"); hydra_child_exit(0); } for (i = 1; i <= buf2[0]; i++) { - //fprintf(stderr,"sec type %u\n",buf2[i]); - //check if weak security types are available + // fprintf(stderr,"sec type %u\n",buf2[i]); + // check if weak security types are available if (buf2[i] <= 0x2) { buf2[3] = buf2[i]; break; } } } - //supported security type + // supported security type switch (buf2[3]) { case 0x0: hydra_report(stderr, "[ERROR] VNC server told us to quit %c\n", buf2[3]); @@ -87,24 +87,24 @@ int32_t start_vnc(int32_t s, char *ip, int32_t port, unsigned char options, char hydra_child_exit(2); break; case 0x2: - //VNC security type supported is the only type supported for now + // VNC security type supported is the only type supported for now if (vnc_client_version == RFB37) { sprintf(buf, "%c", 0x2); if (hydra_send(s, buf, strlen(buf), 0) < 0) { return 1; } - //get authentication challenge from server + // get authentication challenge from server if (recv(s, buf2, CHALLENGESIZE, 0) == -1) return 1; - //send response + // send response vncEncryptBytes(buf2, pass); - if (hydra_send(s, (char *) buf2, CHALLENGESIZE, 0) < 0) { + if (hydra_send(s, (char *)buf2, CHALLENGESIZE, 0) < 0) { return 1; } } else { - //in old proto, challenge is following the security type - vncEncryptBytes((unsigned char *) buf2 + 4, pass); - if (hydra_send(s, (char *) buf2 + 4, CHALLENGESIZE, 0) < 0) { + // in old proto, challenge is following the security type + vncEncryptBytes((unsigned char *)buf2 + 4, pass); + if (hydra_send(s, (char *)buf2 + 4, CHALLENGESIZE, 0) < 0) { return 1; } } @@ -114,7 +114,7 @@ int32_t start_vnc(int32_t s, char *ip, int32_t port, unsigned char options, char hydra_child_exit(2); } - //check security result value + // check security result value recv(s, buf, 4, 0); if (buf == NULL) return 1; @@ -142,10 +142,10 @@ int32_t start_vnc(int32_t s, char *ip, int32_t port, unsigned char options, char return 1; } - return 1; /* never reached */ + return 1; /* never reached */ } -void service_vnc(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +void service_vnc(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_VNC, mysslport = PORT_VNC_SSL; @@ -154,7 +154,7 @@ void service_vnc(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL return; while (1) { switch (run) { - case 1: /* connect and service init function */ + case 1: /* connect and service init function */ if (sock >= 0) sock = hydra_disconnect(sock); if ((options & OPTION_SSL) == 0) { @@ -169,26 +169,28 @@ void service_vnc(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL port = mysslport; } if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } usleepn(300); buf = hydra_receive_line(sock); - if (buf == NULL || (strncmp(buf, "RFB", 3) != 0)) { /* check the first line */ + if (buf == NULL || (strncmp(buf, "RFB", 3) != 0)) { /* check the first line */ hydra_report(stderr, "[ERROR] Not a VNC protocol or service shutdown: %s\n", buf); hydra_child_exit(2); } - if (strstr(buf, " security failures") != NULL) { /* check the first line */ + if (strstr(buf, " security failures") != NULL) { /* check the first line */ /* - VNC has a 'blacklisting' scheme that blocks an IP address after five unsuccessful connection attempts. - The IP address is initially blocked for ten seconds, - but this doubles for each unsuccessful attempt thereafter. - A successful connection from an IP address resets the blacklist timeout. - This is built in to VNC Server and does not rely on operating system support. + VNC has a 'blacklisting' scheme that blocks an IP address after five + unsuccessful connection attempts. The IP address is initially blocked + for ten seconds, but this doubles for each unsuccessful attempt + thereafter. A successful connection from an IP address resets the + blacklist timeout. This is built in to VNC Server and does not rely + on operating system support. */ failed_auth++; - hydra_report(stderr, "VNC server reported too many authentication failures, have to wait some seconds ...\n"); + hydra_report(stderr, "VNC server reported too many authentication " + "failures, have to wait some seconds ...\n"); sleep(12 * failed_auth); free(buf); next_run = 1; @@ -197,12 +199,13 @@ void service_vnc(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL if (verbose) hydra_report(stderr, "[VERBOSE] Server banner is %s\n", buf); if (((strstr(buf, "RFB 005.000") != NULL) || (strstr(buf, "RFB 004") != NULL) || (strstr(buf, "RFB 003.007") != NULL) || (strstr(buf, "RFB 003.008") != NULL))) { - //using proto version 003.007 to talk to server 005.xxx and 004.xxx same for 3.7 and 3.8 + // using proto version 003.007 to talk to server 005.xxx and 004.xxx + // same for 3.7 and 3.8 vnc_client_version = RFB37; free(buf); buf = strdup("RFB 003.007\n"); } else { - //for RFB 3.3 and fake 3.5 + // for RFB 3.3 and fake 3.5 vnc_client_version = RFB33; free(buf); buf = strdup("RFB 003.003\n"); @@ -210,10 +213,10 @@ void service_vnc(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL hydra_send(sock, buf, strlen(buf), 0); next_run = 2; break; - case 2: /* run the cracking function */ + case 2: /* run the cracking function */ next_run = start_vnc(sock, ip, port, options, miscptr, fp); break; - case 3: /* clean exit */ + case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); @@ -231,13 +234,13 @@ void service_vnc(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL } } -int32_t service_vnc_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_vnc_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here diff --git a/hydra-xmpp.c b/hydra-xmpp.c index 6f6b3cb..aa4ea2f 100644 --- a/hydra-xmpp.c +++ b/hydra-xmpp.c @@ -9,9 +9,10 @@ static char *domain = NULL; int32_t xmpp_auth_mechanism = AUTH_ERROR; char *JABBER_CLIENT_INIT_STR = ""; +char *JABBER_CLIENT_INIT_END_STR = "' xmlns='jabber:client' xmlns:stream='http://etherx.jabber.org/streams' " + "version='1.0'>"; -int32_t start_xmpp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) { +int32_t start_xmpp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = "\"\""; char *login, *pass, buffer[500], buffer2[500]; char *AUTH_STR = " 0) && (chglen < sizeof(buffer2))) { - strncpy(buffer2, ptr + strlen(CHALLENGE_STR), chglen); - buffer2[chglen] = '\0'; - memset(buffer, 0, sizeof(buffer)); - from64tobits((char *) buffer, buffer2); - if (strstr(buffer, "assword") != NULL) { - strncpy(buffer2, pass, sizeof(buffer2) - 1); - buffer2[sizeof(buffer2) - 1] = '\0'; - hydra_tobase64((unsigned char *) buffer2, strlen(buffer2), sizeof(buffer2)); - sprintf(buffer, "%s%.250s%s", RESPONSE_STR, buffer2, RESPONSE_END_STR); - } - } else { - hydra_report(stderr, "[ERROR] xmpp could not extract challenge from server\n"); - free(buf); - return 1; - } - } - } - } - break; -#ifdef LIBOPENSSL - case AUTH_PLAIN:{ - memset(buffer2, 0, sizeof(buffer)); - sasl_plain(buffer2, login, pass); + hydra_tobase64((unsigned char *)buffer2, strlen(buffer2), sizeof(buffer2)); sprintf(buffer, "%s%.250s%s", RESPONSE_STR, buffer2, RESPONSE_END_STR); if (debug) hydra_report(stderr, "DEBUG C: %s\n", buffer); - - } - break; - case AUTH_CRAMMD5:{ - int32_t rc = 0; - char *preplogin; - - memset(buffer2, 0, sizeof(buffer2)); - sasl_cram_md5(buffer2, pass, buffer); - - rc = sasl_saslprep(login, SASL_ALLOW_UNASSIGNED, &preplogin); - if (rc) { - free(buf); - return 3; - } - - sprintf(buffer, "%.200s %.250s", preplogin, buffer2); - if (debug) - hydra_report(stderr, "DEBUG C: %s\n", buffer); - hydra_tobase64((unsigned char *) buffer, strlen(buffer), sizeof(buffer)); - sprintf(buffer2, "%s%.250s%s", RESPONSE_STR, buffer, RESPONSE_END_STR); - strncpy(buffer, buffer2, sizeof(buffer) - 1); - buffer[sizeof(buffer) - 1] = '\0'; - free(preplogin); - } - break; - case AUTH_DIGESTMD5:{ - memset(buffer2, 0, sizeof(buffer2)); - fooptr = buffer2; - sasl_digest_md5(fooptr, login, pass, buffer, domain, "xmpp", NULL, 0, NULL); - if (fooptr == NULL) { - free(buf); - return 3; - } - if (debug) - hydra_report(stderr, "DEBUG C: %s\n", buffer2); - hydra_tobase64((unsigned char *) buffer2, strlen(buffer2), sizeof(buffer2)); - snprintf(buffer, sizeof(buffer), "%s%s%s", RESPONSE_STR, buffer2, RESPONSE_END_STR); - } - break; - case AUTH_SCRAMSHA1:{ - /*client-first-message */ - char clientfirstmessagebare[200]; - char *preplogin; - int32_t rc = sasl_saslprep(login, SASL_ALLOW_UNASSIGNED, &preplogin); - - if (rc) { - free(buf); - return 3; - } - - snprintf(clientfirstmessagebare, sizeof(clientfirstmessagebare), "n=%s,r=hydra", preplogin); - free(preplogin); - sprintf(buffer2, "n,,%.200s", clientfirstmessagebare); - hydra_tobase64((unsigned char *) buffer2, strlen(buffer2), sizeof(buffer2)); - snprintf(buffer, sizeof(buffer), "%s%s%s", RESPONSE_STR, buffer2, RESPONSE_END_STR); - - free(buf); if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { + free(buf); return 1; } buf = hydra_receive_line(s); if (buf == NULL) return 1; - + /* server now would ask for the password */ if ((strstr(buf, CHALLENGE_STR) != NULL) || (strstr(buf, CHALLENGE_STR2) != NULL)) { - char serverfirstmessage[200]; char *ptr = strstr(buf, CHALLENGE_STR); if (!ptr) @@ -206,36 +106,132 @@ int32_t start_xmpp(int32_t s, char *ip, int32_t port, unsigned char options, cha if ((chglen > 0) && (chglen < sizeof(buffer2))) { strncpy(buffer2, ptr + strlen(CHALLENGE_STR), chglen); buffer2[chglen] = '\0'; + memset(buffer, 0, sizeof(buffer)); + from64tobits((char *)buffer, buffer2); + if (strstr(buffer, "assword") != NULL) { + strncpy(buffer2, pass, sizeof(buffer2) - 1); + buffer2[sizeof(buffer2) - 1] = '\0'; + hydra_tobase64((unsigned char *)buffer2, strlen(buffer2), sizeof(buffer2)); + sprintf(buffer, "%s%.250s%s", RESPONSE_STR, buffer2, RESPONSE_END_STR); + } } else { hydra_report(stderr, "[ERROR] xmpp could not extract challenge from server\n"); free(buf); return 1; } + } + } + } break; +#ifdef LIBOPENSSL + case AUTH_PLAIN: { + memset(buffer2, 0, sizeof(buffer)); + sasl_plain(buffer2, login, pass); + sprintf(buffer, "%s%.250s%s", RESPONSE_STR, buffer2, RESPONSE_END_STR); + if (debug) + hydra_report(stderr, "DEBUG C: %s\n", buffer); - /*server-first-message */ - memset(buffer, 0, sizeof(buffer)); - from64tobits((char *) buffer, buffer2); - strncpy(serverfirstmessage, buffer, sizeof(serverfirstmessage) - 1); - serverfirstmessage[sizeof(serverfirstmessage) - 1] = '\0'; + } break; + case AUTH_CRAMMD5: { + int32_t rc = 0; + char *preplogin; - memset(buffer2, 0, sizeof(buffer2)); - fooptr = buffer2; - sasl_scram_sha1(fooptr, pass, clientfirstmessagebare, serverfirstmessage); - if (fooptr == NULL) { - hydra_report(stderr, "[ERROR] Can't compute client response\n"); - free(buf); - return 1; - } - hydra_tobase64((unsigned char *) buffer2, strlen(buffer2), sizeof(buffer2)); - snprintf(buffer, sizeof(buffer), "%s%s%s", RESPONSE_STR, buffer2, RESPONSE_END_STR); + memset(buffer2, 0, sizeof(buffer2)); + sasl_cram_md5(buffer2, pass, buffer); + + rc = sasl_saslprep(login, SASL_ALLOW_UNASSIGNED, &preplogin); + if (rc) { + free(buf); + return 3; + } + + sprintf(buffer, "%.200s %.250s", preplogin, buffer2); + if (debug) + hydra_report(stderr, "DEBUG C: %s\n", buffer); + hydra_tobase64((unsigned char *)buffer, strlen(buffer), sizeof(buffer)); + sprintf(buffer2, "%s%.250s%s", RESPONSE_STR, buffer, RESPONSE_END_STR); + strncpy(buffer, buffer2, sizeof(buffer) - 1); + buffer[sizeof(buffer) - 1] = '\0'; + free(preplogin); + } break; + case AUTH_DIGESTMD5: { + memset(buffer2, 0, sizeof(buffer2)); + fooptr = buffer2; + sasl_digest_md5(fooptr, login, pass, buffer, domain, "xmpp", NULL, 0, NULL); + if (fooptr == NULL) { + free(buf); + return 3; + } + if (debug) + hydra_report(stderr, "DEBUG C: %s\n", buffer2); + hydra_tobase64((unsigned char *)buffer2, strlen(buffer2), sizeof(buffer2)); + snprintf(buffer, sizeof(buffer), "%s%s%s", RESPONSE_STR, buffer2, RESPONSE_END_STR); + } break; + case AUTH_SCRAMSHA1: { + /*client-first-message */ + char clientfirstmessagebare[200]; + char *preplogin; + int32_t rc = sasl_saslprep(login, SASL_ALLOW_UNASSIGNED, &preplogin); + + if (rc) { + free(buf); + return 3; + } + + snprintf(clientfirstmessagebare, sizeof(clientfirstmessagebare), "n=%s,r=hydra", preplogin); + free(preplogin); + sprintf(buffer2, "n,,%.200s", clientfirstmessagebare); + hydra_tobase64((unsigned char *)buffer2, strlen(buffer2), sizeof(buffer2)); + snprintf(buffer, sizeof(buffer), "%s%s%s", RESPONSE_STR, buffer2, RESPONSE_END_STR); + + free(buf); + if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { + return 1; + } + buf = hydra_receive_line(s); + if (buf == NULL) + return 1; + + if ((strstr(buf, CHALLENGE_STR) != NULL) || (strstr(buf, CHALLENGE_STR2) != NULL)) { + char serverfirstmessage[200]; + char *ptr = strstr(buf, CHALLENGE_STR); + + if (!ptr) + ptr = strstr(buf, CHALLENGE_STR2); + char *ptr_end = strstr(ptr, CHALLENGE_END_STR); + int32_t chglen = ptr_end - ptr - strlen(CHALLENGE_STR); + + if ((chglen > 0) && (chglen < sizeof(buffer2))) { + strncpy(buffer2, ptr + strlen(CHALLENGE_STR), chglen); + buffer2[chglen] = '\0'; } else { - if (verbose || debug) - hydra_report(stderr, "[ERROR] Not a valid server challenge\n"); + hydra_report(stderr, "[ERROR] xmpp could not extract challenge from server\n"); free(buf); return 1; } + + /*server-first-message */ + memset(buffer, 0, sizeof(buffer)); + from64tobits((char *)buffer, buffer2); + strncpy(serverfirstmessage, buffer, sizeof(serverfirstmessage) - 1); + serverfirstmessage[sizeof(serverfirstmessage) - 1] = '\0'; + + memset(buffer2, 0, sizeof(buffer2)); + fooptr = buffer2; + sasl_scram_sha1(fooptr, pass, clientfirstmessagebare, serverfirstmessage); + if (fooptr == NULL) { + hydra_report(stderr, "[ERROR] Can't compute client response\n"); + free(buf); + return 1; + } + hydra_tobase64((unsigned char *)buffer2, strlen(buffer2), sizeof(buffer2)); + snprintf(buffer, sizeof(buffer), "%s%s%s", RESPONSE_STR, buffer2, RESPONSE_END_STR); + } else { + if (verbose || debug) + hydra_report(stderr, "[ERROR] Not a valid server challenge\n"); + free(buf); + return 1; } - break; + } break; #endif ptr = 0; } @@ -249,8 +245,9 @@ int32_t start_xmpp(int32_t s, char *ip, int32_t port, unsigned char options, cha if (buf == NULL) return 1; - //we test the challenge tag as digest-md5 when connected is sending "rspauth" value - //so if we are receiving a second challenge we assume the auth is good + // we test the challenge tag as digest-md5 when connected is sending + // "rspauth" value so if we are receiving a second challenge we assume the + // auth is good if ((strstr(buf, "= 0) sock = hydra_disconnect(sock); if ((options & OPTION_SSL) == 0) { @@ -325,7 +324,7 @@ void service_xmpp(char *target, char *ip, int32_t sp, unsigned char options, cha } if (sock < 0) { if (verbose || debug) - hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid()); + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); } memset(buffer, 0, sizeof(buffer)); @@ -333,7 +332,7 @@ void service_xmpp(char *target, char *ip, int32_t sp, unsigned char options, cha if (hydra_send(sock, buffer, strlen(buffer), 0) < 0) { hydra_child_exit(1); } - //some server is longer to answer + // some server is longer to answer usleepn(300); do { if ((buf = hydra_receive_line(sock)) == NULL) { @@ -351,7 +350,11 @@ void service_xmpp(char *target, char *ip, int32_t sp, unsigned char options, cha if (strstr(buf, "= 0) sock = hydra_disconnect(sock); hydra_child_exit(0); @@ -485,13 +488,13 @@ void service_xmpp(char *target, char *ip, int32_t sp, unsigned char options, cha } } -int32_t service_xmpp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) { +int32_t service_xmpp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be // performed once only. // // fill if needed. - // + // // return codes: // 0 all OK // -1 error, hydra will exit, so print a good error message here @@ -499,8 +502,9 @@ int32_t service_xmpp_init(char *ip, int32_t sp, unsigned char options, char *mis return 0; } -void usage_xmpp(const char* service) { +void usage_xmpp(const char *service) { printf("Module xmpp is optionally taking one authentication type of:\n" " LOGIN (default), PLAIN, CRAM-MD5, DIGEST-MD5, SCRAM-SHA1\n\n" - "Note, the target passed should be a fdqn as the value is used in the Jabber init request, example: hermes.jabber.org\n\n"); + "Note, the target passed should be a fdqn as the value is used in the " + "Jabber init request, example: hermes.jabber.org\n\n"); } diff --git a/hydra.c b/hydra.c index 28365f8..0ea27cc 100644 --- a/hydra.c +++ b/hydra.c @@ -3,7 +3,8 @@ * https://github.com/vanhauser-thc/thc-hydra * * Parallized network login hacker. - * Don't use in military or secret service organizations, or for illegal purposes. + * Don't use in military or secret service organizations, or for illegal + * purposes. * * License: GNU AFFERO GENERAL PUBLIC LICENSE v3.0, see LICENSE file */ @@ -15,216 +16,220 @@ #include #endif -void usage_oracle(const char* service); -void usage_oracle_listener(const char* service); -void usage_cvs(const char* service); -void usage_xmpp(const char* service); -void usage_pop3(const char* service); -void usage_rdp(const char* service); -void usage_s7_300(const char* service); -void usage_nntp(const char* service); -void usage_imap(const char* service); -void usage_smtp_enum(const char* service); -void usage_smtp(const char* service); -void usage_svn(const char* service); -void usage_ncp(const char* service); -void usage_firebird(const char* service); -void usage_mysql(const char* service); -void usage_mongodb(const char* service); -void usage_irc(const char* service); -void usage_postgres(const char* service); -void usage_telnet(const char* service); -void usage_sapr3(const char* service); -void usage_sshkey(const char* service); -void usage_cisco_enable(const char* service); -void usage_cisco(const char* service); -void usage_ldap(const char* service); -void usage_smb(const char* service); -void usage_http_form(const char* service); -void usage_http_proxy(const char* service); -void usage_http_proxy_urlenum(const char* service); -void usage_snmp(const char* service); -void usage_http(const char* service); -void usage_smb2(const char* service); +void usage_oracle(const char *service); +void usage_oracle_listener(const char *service); +void usage_cvs(const char *service); +void usage_xmpp(const char *service); +void usage_pop3(const char *service); +void usage_rdp(const char *service); +void usage_s7_300(const char *service); +void usage_nntp(const char *service); +void usage_imap(const char *service); +void usage_smtp_enum(const char *service); +void usage_smtp(const char *service); +void usage_svn(const char *service); +void usage_ncp(const char *service); +void usage_firebird(const char *service); +void usage_mysql(const char *service); +void usage_mongodb(const char *service); +void usage_irc(const char *service); +void usage_postgres(const char *service); +void usage_telnet(const char *service); +void usage_sapr3(const char *service); +void usage_sshkey(const char *service); +void usage_cisco_enable(const char *service); +void usage_cisco(const char *service); +void usage_ldap(const char *service); +void usage_smb(const char *service); +void usage_http_form(const char *service); +void usage_http_proxy(const char *service); +void usage_http_proxy_urlenum(const char *service); +void usage_snmp(const char *service); +void usage_http(const char *service); +void usage_smb2(const char *service); - -extern void service_asterisk(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_telnet(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_ftp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_ftps(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_pop3(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_vmauthd(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_imap(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_ldap2(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_ldap3(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_ldap3_cram_md5(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_ldap3_digest_md5(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_adam6500(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_cisco(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_cisco_enable(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_vnc(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_socks5(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_rexec(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_rlogin(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_rsh(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_nntp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_http_head(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_http_get(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_http_post(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_http_get_form(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_http_post_form(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_icq(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_pcnfs(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_mssql(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_cvs(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_snmp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_smtp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_smtp_enum(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_teamspeak(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_pcanywhere(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_http_proxy(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_xmpp(char *target, char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_irc(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_redis(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_http_proxy_urlenum(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_s7_300(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_rtsp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_rpcap(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); +extern void service_asterisk(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_telnet(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_ftp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_ftps(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_pop3(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_vmauthd(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_imap(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_ldap2(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_ldap3(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_ldap3_cram_md5(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_ldap3_digest_md5(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_adam6500(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_cisco(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_cisco_enable(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_vnc(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_socks5(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_rexec(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_rlogin(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_rsh(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_nntp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_http_head(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_http_get(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_http_post(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_http_get_form(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_http_post_form(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_icq(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_pcnfs(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_mssql(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_cvs(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_snmp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_smtp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_smtp_enum(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_teamspeak(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_pcanywhere(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_http_proxy(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_xmpp(char *target, char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_irc(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_redis(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_http_proxy_urlenum(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_s7_300(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_rtsp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_rpcap(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); // ADD NEW SERVICES HERE #if defined(LIBSMBCLIENT) -extern int32_t service_smb2_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_smb2(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); +extern int32_t service_smb2_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_smb2(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); #endif #ifdef HAVE_MATH_H -extern void service_mysql(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_mysql_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); +extern void service_mysql(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_mysql_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); #endif #ifdef LIBPOSTGRES -extern void service_postgres(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_postgres_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); +extern void service_postgres(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_postgres_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); #endif #ifdef LIBOPENSSL -extern void service_smb(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_smb_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_oracle_listener(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_oracle_listener_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_oracle_sid(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_oracle_sid_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_sip(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_sip_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); +extern void service_smb(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_smb_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_oracle_listener(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_oracle_listener_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_oracle_sid(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_oracle_sid_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_sip(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_sip_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); #endif #ifdef LIBFREERDP2 -extern void service_rdp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_rdp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); +extern void service_rdp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_rdp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); #endif #ifdef LIBSAPR3 -extern void service_sapr3(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_sapr3_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); +extern void service_sapr3(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_sapr3_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); #endif #ifdef LIBFIREBIRD -extern void service_firebird(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_firebird_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); +extern void service_firebird(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_firebird_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); #endif #ifdef LIBAFP -extern void service_afp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_afp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); +extern void service_afp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_afp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); #endif #ifdef LIBNCP -extern void service_ncp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_ncp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); +extern void service_ncp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_ncp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); #endif #ifdef LIBSSH -extern void service_ssh(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_ssh_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern void service_sshkey(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_sshkey_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); +extern void service_ssh(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_ssh_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_sshkey(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_sshkey_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); #endif #ifdef LIBSVN -extern void service_svn(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_svn_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); +extern void service_svn(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_svn_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); #endif #ifdef LIBORACLE -extern void service_oracle(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_oracle_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); +extern void service_oracle(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_oracle_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); #endif #ifdef HAVE_GCRYPT -extern void service_radmin2(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_radmin2_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); +extern void service_radmin2(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_radmin2_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); #endif #ifdef LIBMCACHED -extern void service_mcached(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_mcached_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); +extern void service_mcached(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_mcached_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); #endif #ifdef LIBMONGODB -extern void service_mongodb(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_mongodb_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); +extern void service_mongodb(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_mongodb_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); #endif -extern int32_t service_adam6500_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_cisco_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_cisco_enable_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_cvs_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_smtp_enum_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_http_form_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_ftp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_http_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_icq_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_imap_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_irc_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_ldap_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_mssql_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_nntp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_pcanywhere_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_pcnfs_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_pop3_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_http_proxy_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_asterisk_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_redis_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_rexec_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_rlogin_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_rsh_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_smtp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_snmp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_socks5_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_teamspeak_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_telnet_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_http_proxy_urlenum_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_vmauthd_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_vnc_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_xmpp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_s7_300_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_rtsp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -extern int32_t service_rpcap_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); +extern int32_t service_adam6500_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_cisco_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_cisco_enable_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_cvs_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_smtp_enum_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_http_form_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_ftp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_http_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_icq_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_imap_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_irc_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_ldap_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_mssql_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_nntp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_pcanywhere_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_pcnfs_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_pop3_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_http_proxy_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_asterisk_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_redis_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_rexec_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_rlogin_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_rsh_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_smtp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_snmp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_socks5_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_teamspeak_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_telnet_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_http_proxy_urlenum_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_vmauthd_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_vnc_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_xmpp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_s7_300_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_rtsp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_rpcap_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); // ADD NEW SERVICES HERE -char *SERVICES = - "adam6500 asterisk afp cisco cisco-enable cvs firebird ftp[s] http[s]-{head|get|post} http[s]-{get|post}-form http-proxy http-proxy-urlenum icq imap[s] irc ldap2[s] ldap3[-{cram|digest}md5][s] memcached mongodb mssql mysql ncp nntp oracle oracle-listener oracle-sid pcanywhere pcnfs pop3[s] postgres radmin2 rdp redis rexec rlogin rpcap rsh rtsp s7-300 sapr3 sip smb smb2 smtp[s] smtp-enum snmp socks5 ssh sshkey svn teamspeak telnet[s] vmauthd vnc xmpp"; +char *SERVICES = "adam6500 asterisk afp cisco cisco-enable cvs firebird ftp[s] " + "http[s]-{head|get|post} http[s]-{get|post}-form http-proxy " + "http-proxy-urlenum icq imap[s] irc ldap2[s] ldap3[-{cram|digest}md5][s] " + "memcached mongodb mssql mysql ncp nntp oracle oracle-listener oracle-sid " + "pcanywhere pcnfs pop3[s] postgres radmin2 rdp redis rexec rlogin rpcap " + "rsh rtsp s7-300 sapr3 sip smb smb2 smtp[s] smtp-enum snmp socks5 ssh " + "sshkey svn teamspeak telnet[s] vmauthd vnc xmpp"; -#define MAXBUF 520 -#define MAXLINESIZE ( ( MAXBUF / 2 ) - 4 ) -#define MAXTASKS 64 -#define MAXSERVERS 16 -#define MAXFAIL 3 -#define MAXENDWAIT 20 -#define WAITTIME 32 -#define TASKS 16 -#define SKIPLOGIN 256 -#define USLEEP_LOOP 10 -#define MAX_LINES 50000000 // 50 millions, do not put more than 65millions -#define MAX_BYTES 500000000 // 500 millions, do not put more than 650millions +#define MAXBUF 520 +#define MAXLINESIZE ((MAXBUF / 2) - 4) +#define MAXTASKS 64 +#define MAXSERVERS 16 +#define MAXFAIL 3 +#define MAXENDWAIT 20 +#define WAITTIME 32 +#define TASKS 16 +#define SKIPLOGIN 256 +#define USLEEP_LOOP 10 +#define MAX_LINES 50000000 // 50 millions, do not put more than 65millions +#define MAX_BYTES 500000000 // 500 millions, do not put more than 650millions #define RESTOREFILE "./hydra.restore" -#define PROGRAM "Hydra" -#define VERSION "v9.1-dev" -#define AUTHOR "van Hauser/THC" -#define EMAIL "" -#define AUTHOR2 "David Maciejak" -#define EMAIL2 "" -#define RESOURCE "https://github.com/vanhauser-thc/thc-hydra" +#define PROGRAM "Hydra" +#define VERSION "v9.1-dev" +#define AUTHOR "van Hauser/THC" +#define EMAIL "" +#define AUTHOR2 "David Maciejak" +#define EMAIL2 "" +#define RESOURCE "https://github.com/vanhauser-thc/thc-hydra" extern char *hydra_strcasestr(const char *haystack, const char *needle); extern void hydra_tobase64(unsigned char *buf, int32_t buflen, int32_t bufsize); @@ -239,18 +244,9 @@ extern int32_t old_ssl; void hydra_kill_head(int32_t head_no, int32_t killit, int32_t fail); // some enum definitions -typedef enum { - HEAD_DISABLED = -1, - HEAD_UNUSED = 0, - HEAD_ACTIVE = 1 -} head_state_t; +typedef enum { HEAD_DISABLED = -1, HEAD_UNUSED = 0, HEAD_ACTIVE = 1 } head_state_t; -typedef enum { - TARGET_ACTIVE = 0, - TARGET_FINISHED = 1, - TARGET_ERROR = 2, - TARGET_UNRESOLVED = 3 -} target_state_t; +typedef enum { TARGET_ACTIVE = 0, TARGET_FINISHED = 1, TARGET_ERROR = 2, TARGET_UNRESOLVED = 3 } target_state_t; // some structure definitions typedef struct { @@ -290,7 +286,7 @@ typedef struct { } hydra_target; typedef struct { - int32_t active; // active tasks of hydra_options.max_use + int32_t active; // active tasks of hydra_options.max_use int32_t targets; int32_t finished; int32_t exit; @@ -355,133 +351,136 @@ int32_t snpdone, snp_is_redo, snpbuflen, snpi, snpj, snpdont; #include "performance.h" -typedef void (*service_t)(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -typedef int32_t (*service_init_t)(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname); -typedef void (*service_usage_t)(const char* service); +typedef void (*service_t)(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +typedef int32_t (*service_init_t)(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +typedef void (*service_usage_t)(const char *service); -#define SERVICE2(name, func) { name, service_##func##_init, service_##func, NULL } -#define SERVICE(name) { #name, service_##name##_init, service_##name, NULL } -#define SERVICE3(name, func) { name, service_##func##_init, service_##func, usage_##func } +#define SERVICE2(name, func) \ + { name, service_##func##_init, service_##func, NULL } +#define SERVICE(name) \ + { #name, service_##name##_init, service_##name, NULL } +#define SERVICE3(name, func) \ + { name, service_##func##_init, service_##func, usage_##func } static const struct { - const char* name; + const char *name; service_init_t init; service_t exec; service_usage_t usage; -} services[] = { - SERVICE(adam6500), +} services[] = {SERVICE(adam6500), #ifdef LIBAFP - SERVICE(afp), + SERVICE(afp), #endif - SERVICE(asterisk), - SERVICE3("cisco", cisco), - SERVICE3("cisco-enable", cisco_enable), - SERVICE3("cvs", cvs), + SERVICE(asterisk), + SERVICE3("cisco", cisco), + SERVICE3("cisco-enable", cisco_enable), + SERVICE3("cvs", cvs), #ifdef LIBFIREBIRD - SERVICE3("firebird", firebird), + SERVICE3("firebird", firebird), #endif - SERVICE(ftp), - { "ftps", service_ftp_init, service_ftps, NULL }, - { "http-get", service_http_init, service_http_get, usage_http }, - { "http-get-form", service_http_form_init, service_http_get_form, usage_http_form }, - { "http-head", service_http_init, service_http_head, NULL }, - { "http-form", service_http_form_init, NULL, usage_http_form }, - { "http-post", NULL, service_http_post, usage_http }, - { "http-post-form", service_http_form_init, service_http_post_form, usage_http_form }, - SERVICE3("http-proxy", http_proxy), - SERVICE3("http-proxy-urlenum", http_proxy_urlenum), - SERVICE(icq), - SERVICE3("imap", imap), - SERVICE3("irc", irc), - { "ldap", service_ldap_init, service_ldap2, usage_ldap }, - { "ldap2", service_ldap_init, service_ldap2, usage_ldap }, - { "ldap3", service_ldap_init, service_ldap3, usage_ldap }, - { "ldap3-crammd5", service_ldap_init, service_ldap3_cram_md5, usage_ldap }, - { "ldap3-digestmd5", service_ldap_init, service_ldap3_digest_md5, usage_ldap }, + SERVICE(ftp), + {"ftps", service_ftp_init, service_ftps, NULL}, + {"http-get", service_http_init, service_http_get, usage_http}, + {"http-get-form", service_http_form_init, service_http_get_form, usage_http_form}, + {"http-head", service_http_init, service_http_head, NULL}, + {"http-form", service_http_form_init, NULL, usage_http_form}, + {"http-post", NULL, service_http_post, usage_http}, + {"http-post-form", service_http_form_init, service_http_post_form, usage_http_form}, + SERVICE3("http-proxy", http_proxy), + SERVICE3("http-proxy-urlenum", http_proxy_urlenum), + SERVICE(icq), + SERVICE3("imap", imap), + SERVICE3("irc", irc), + {"ldap", service_ldap_init, service_ldap2, usage_ldap}, + {"ldap2", service_ldap_init, service_ldap2, usage_ldap}, + {"ldap3", service_ldap_init, service_ldap3, usage_ldap}, + {"ldap3-crammd5", service_ldap_init, service_ldap3_cram_md5, usage_ldap}, + {"ldap3-digestmd5", service_ldap_init, service_ldap3_digest_md5, usage_ldap}, #ifdef LIBMCACHED - {"memcached", service_mcached_init, service_mcached, NULL}, + {"memcached", service_mcached_init, service_mcached, NULL}, #endif - SERVICE(mssql), + SERVICE(mssql), #ifdef LIBMONGODB -SERVICE3("mongodb", mongodb), + SERVICE3("mongodb", mongodb), #endif #ifdef HAVE_MATH_H - SERVICE3("mysql", mysql), + SERVICE3("mysql", mysql), #endif #ifdef LIBNCP - SERVICE3("ncp", ncp), + SERVICE3("ncp", ncp), #endif - SERVICE3("nntp", nntp), + SERVICE3("nntp", nntp), #ifdef LIBORACLE - SERVICE3("oracle", oracle), + SERVICE3("oracle", oracle), #endif #ifdef LIBOPENSSL - SERVICE3("oracle-listener", oracle_listener), - SERVICE2("oracle-sid", oracle_sid), + SERVICE3("oracle-listener", oracle_listener), + SERVICE2("oracle-sid", oracle_sid), #endif - SERVICE(pcanywhere), - SERVICE(pcnfs), - SERVICE3("pop3", pop3), + SERVICE(pcanywhere), + SERVICE(pcnfs), + SERVICE3("pop3", pop3), #ifdef LIBPOSTGRES - SERVICE3("postgres", postgres), + SERVICE3("postgres", postgres), #endif - SERVICE(redis), - SERVICE(rexec), + SERVICE(redis), + SERVICE(rexec), #ifdef LIBFREERDP2 - SERVICE3("rdp", rdp), + SERVICE3("rdp", rdp), #endif - SERVICE(rlogin), - SERVICE(rsh), - SERVICE(rtsp), - SERVICE(rpcap), - SERVICE3("s7-300", s7_300), + SERVICE(rlogin), + SERVICE(rsh), + SERVICE(rtsp), + SERVICE(rpcap), + SERVICE3("s7-300", s7_300), #ifdef LIBSAPR3 - SERVICE3("sarp3", sapr3), + SERVICE3("sarp3", sapr3), #endif #ifdef LIBOPENSSL - SERVICE(sip), - SERVICE3("smbnt", smb), - SERVICE3("smb", smb), + SERVICE(sip), + SERVICE3("smbnt", smb), + SERVICE3("smb", smb), #endif #if defined(LIBSMBCLIENT) - SERVICE3("smb2", smb2), + SERVICE3("smb2", smb2), #endif - SERVICE3("smtp", smtp), - SERVICE3("smtp-enum", smtp_enum), - SERVICE3("snmp", snmp), - SERVICE(socks5), + SERVICE3("smtp", smtp), + SERVICE3("smtp-enum", smtp_enum), + SERVICE3("snmp", snmp), + SERVICE(socks5), #ifdef LIBSSH - { "ssh", NULL, service_ssh, NULL }, - SERVICE3("sshkey", sshkey), + {"ssh", NULL, service_ssh, NULL}, + SERVICE3("sshkey", sshkey), #endif #ifdef LIBSVN - SERVICE3("svn", svn), + SERVICE3("svn", svn), #endif - SERVICE(teamspeak), - SERVICE3("telnet", telnet), - SERVICE(vmauthd), - SERVICE(vnc), + SERVICE(teamspeak), + SERVICE3("telnet", telnet), + SERVICE(vmauthd), + SERVICE(vnc), #ifdef HAVE_GCRYPT - SERVICE(radmin2), + SERVICE(radmin2), #endif - { "xmpp", service_xmpp_init, NULL, usage_xmpp } -}; - + {"xmpp", service_xmpp_init, NULL, usage_xmpp}}; #define PRINT_NORMAL(ext, text, ...) printf(text, ##__VA_ARGS__) -#define PRINT_EXTEND(ext, text, ...) do { \ - if (ext) \ - printf(text, ##__VA_ARGS__); \ - } while(0) +#define PRINT_EXTEND(ext, text, ...) \ + do { \ + if (ext) \ + printf(text, ##__VA_ARGS__); \ + } while (0) - -int32_t /*inline*/ check_flag(int32_t value, int32_t flag) { // inline does not compile with debug +int32_t /*inline*/ +check_flag(int32_t value, int32_t flag) { // inline does not compile with debug return (value & flag) == flag; } void help(int32_t ext) { - PRINT_NORMAL(ext, "Syntax: hydra [[[-l LOGIN|-L FILE] [-p PASS|-P FILE]] | [-C FILE]] [-e nsr]" - " [-o FILE] [-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-W TIME] [-f] [-s PORT]" + PRINT_NORMAL(ext, "Syntax: hydra [[[-l LOGIN|-L FILE] [-p PASS|-P FILE]] | " + "[-C FILE]] [-e nsr]" + " [-o FILE] [-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-W " + "TIME] [-f] [-s PORT]" #ifdef HAVE_MATH_H " [-x MIN:MAX:CHARSET]" #endif @@ -494,56 +493,82 @@ void help(int32_t ext) { #ifdef LIBOPENSSL " -S perform an SSL connect\n" #endif - " -s PORT if the service is on a different default port, define it here\n"); - PRINT_NORMAL(ext, " -l LOGIN or -L FILE login with LOGIN name, or load several logins from FILE\n" - " -p PASS or -P FILE try password PASS, or load several passwords from FILE\n"); + " -s PORT if the service is on a different default port, define it " + "here\n"); + PRINT_NORMAL(ext, " -l LOGIN or -L FILE login with LOGIN name, or load " + "several logins from FILE\n" + " -p PASS or -P FILE try password PASS, or load several " + "passwords from FILE\n"); PRINT_EXTEND(ext, #ifdef HAVE_MATH_H - " -x MIN:MAX:CHARSET password bruteforce generation, type \"-x -h\" to get help\n" - " -y disable use of symbols in bruteforce, see above\n" - " -r rainy mode for password generation (-x)\n" + " -x MIN:MAX:CHARSET password bruteforce generation, type " + "\"-x -h\" to get help\n" + " -y disable use of symbols in bruteforce, see above\n" + " -r rainy mode for password generation (-x)\n" #endif - " -e nsr try \"n\" null password, \"s\" login as pass and/or \"r\" reversed login\n" - " -u loop around users, not passwords (effective! implied with -x)\n"); - PRINT_NORMAL(ext, " -C FILE colon separated \"login:pass\" format, instead of -L/-P options\n" - " -M FILE list of servers to attack, one entry per line, ':' to specify port\n"); + " -e nsr try \"n\" null password, \"s\" login as pass " + "and/or \"r\" reversed login\n" + " -u loop around users, not passwords (effective! " + "implied with -x)\n"); + PRINT_NORMAL(ext, " -C FILE colon separated \"login:pass\" format, " + "instead of -L/-P options\n" + " -M FILE list of servers to attack, one entry per " + "line, ':' to specify port\n"); PRINT_EXTEND(ext, " -o FILE write found login/password pairs to FILE instead of stdout\n" - " -b FORMAT specify the format for the -o FILE: text(default), json, jsonv1\n" - " -f / -F exit when a login/pass pair is found (-M: -f per host, -F global)\n"); - PRINT_NORMAL(ext, " -t TASKS run TASKS number of connects in parallel per target (default: %d)\n", TASKS); - PRINT_EXTEND(ext, " -T TASKS run TASKS connects in parallel overall (for -M, default: %d)\n" - " -w / -W TIME wait time for a response (%d) / between connects per thread (%d)\n" + " -b FORMAT specify the format for the -o FILE: text(default), json, " + "jsonv1\n" + " -f / -F exit when a login/pass pair is found (-M: -f per host, -F " + "global)\n"); + PRINT_NORMAL(ext, + " -t TASKS run TASKS number of connects in parallel per " + "target (default: %d)\n", + TASKS); + PRINT_EXTEND(ext, + " -T TASKS run TASKS connects in parallel overall (for -M, default: " + "%d)\n" + " -w / -W TIME wait time for a response (%d) / between connects per " + "thread (%d)\n" #ifdef MSG_PEEK - " -c TIME wait time per login attempt over all threads (enforces -t 1)\n" + " -c TIME wait time per login attempt over all threads (enforces -t " + "1)\n" #endif - " -4 / -6 use IPv4 (default) / IPv6 addresses (put always in [] also in -M)\n" - " -v / -V / -d verbose mode / show login+pass for each attempt / debug mode \n" - " -O use old SSL v2 and v3\n" - " -K do not redo failed attempts (good for -M mass scanning)\n" - " -q do not print messages about connection errors\n", - MAXTASKS, WAITTIME, conwait - ); + " -4 / -6 use IPv4 (default) / IPv6 addresses (put always in [] also " + "in -M)\n" + " -v / -V / -d verbose mode / show login+pass for each attempt / debug " + "mode \n" + " -O use old SSL v2 and v3\n" + " -K do not redo failed attempts (good for -M mass scanning)\n" + " -q do not print messages about connection errors\n", + MAXTASKS, WAITTIME, conwait); PRINT_NORMAL(ext, " -U service module usage details\n" - " -m OPT options specific for a module, see -U output for information\n" + " -m OPT options specific for a module, see -U output for " + "information\n" " -h more command line options (COMPLETE HELP)\n" - " server the target: DNS, IP or 192.168.0.0/24 (this OR the -M option)\n" + " server the target: DNS, IP or 192.168.0.0/24 (this OR the -M " + "option)\n" " service the service to crack (see below for supported protocols)\n" - " OPT some service modules support additional input (-U for module help)\n"); - PRINT_NORMAL(ext, "\nSupported services: %s\n" - "\n%s is a tool to guess/crack valid login/password pairs. Licensed under AGPL\n" - "v3.0. The newest version is always available at %s\n" - "Don't use in military or secret service organizations, or for illegal purposes.\n", - SERVICES, PROGRAM, RESOURCE - ); + " OPT some service modules support additional input (-U for " + "module help)\n"); + PRINT_NORMAL(ext, + "\nSupported services: %s\n" + "\n%s is a tool to guess/crack valid login/password pairs. " + "Licensed under AGPL\n" + "v3.0. The newest version is always available at %s\n" + "Don't use in military or secret service organizations, or for " + "illegal purposes.\n", + SERVICES, PROGRAM, RESOURCE); if (ext && strlen(unsupported) > 0) { if (unsupported[strlen(unsupported) - 1] == ' ') unsupported[strlen(unsupported) - 1] = 0; printf("These services were not compiled in: %s.\n", unsupported); } - PRINT_EXTEND(ext, "\nUse HYDRA_PROXY_HTTP or HYDRA_PROXY environment variables for a proxy setup.\n" - "E.g. %% export HYDRA_PROXY=socks5://l:p@127.0.0.1:9150 (or: socks4:// connect://)\n" - " %% export HYDRA_PROXY=connect_and_socks_proxylist.txt (up to 64 entries)\n" + PRINT_EXTEND(ext, "\nUse HYDRA_PROXY_HTTP or HYDRA_PROXY environment variables for a proxy " + "setup.\n" + "E.g. %% export HYDRA_PROXY=socks5://l:p@127.0.0.1:9150 (or: socks4:// " + "connect://)\n" + " %% export HYDRA_PROXY=connect_and_socks_proxylist.txt (up to 64 " + "entries)\n" " %% export HYDRA_PROXY_HTTP=http://login:pass@proxy:8080\n" " %% export HYDRA_PROXY_HTTP=proxylist.txt (up to 64 entries)\n"); PRINT_NORMAL(ext, "\nExample%s:%s hydra -l user -P passlist.txt ftp://192.168.0.1\n", ext == 0 ? "" : "s", ext == 0 ? "" : "\n"); @@ -559,18 +584,26 @@ void help_bfg() { " -x MIN:MAX:CHARSET\n\n" " MIN is the minimum number of characters in the password\n" " MAX is the maximum number of characters in the password\n" - " CHARSET is a specification of the characters to use in the generation\n" + " CHARSET is a specification of the characters to use in the " + "generation\n" " valid CHARSET values are: 'a' for lowercase letters,\n" - " 'A' for uppercase letters, '1' for numbers, and for all others,\n" + " 'A' for uppercase letters, '1' for numbers, and for all " + "others,\n" " just add their real representation.\n" " -y disable the use of the above letters as placeholders\n\n" "Examples:\n" - " -x 3:5:a generate passwords from length 3 to 5 with all lowercase letters\n" - " -x 5:8:A1 generate passwords from length 5 to 8 with uppercase and numbers\n" - " -x 1:3:/ generate passwords from length 1 to 3 containing only slashes\n" - " -x 5:5:/%%,.- generate passwords with length 5 which consists only of /%%,.-\n" - " -x 3:5:aA1 -y generate passwords from length 3 to 5 with a, A and 1 only\n" - "\nThe bruteforce mode was made by Jan Dlabal, http://houbysoft.com/bfg/\n"); + " -x 3:5:a generate passwords from length 3 to 5 with all " + "lowercase letters\n" + " -x 5:8:A1 generate passwords from length 5 to 8 with uppercase " + "and numbers\n" + " -x 1:3:/ generate passwords from length 1 to 3 containing only " + "slashes\n" + " -x 5:5:/%%,.- generate passwords with length 5 which consists " + "only of /%%,.-\n" + " -x 3:5:aA1 -y generate passwords from length 3 to 5 with a, A and " + "1 only\n" + "\nThe bruteforce mode was made by Jan Dlabal, " + "http://houbysoft.com/bfg/\n"); exit(-1); } @@ -581,14 +614,17 @@ void module_usage() { exit(0); } - printf("\nHelp for module %s:\n============================================================================\n", hydra_options.service); + printf("\nHelp for module " + "%s:\n================================================================" + "============\n", + hydra_options.service); for (i = 0; i < sizeof(services) / sizeof(services[0]); i++) { - if (strcmp(hydra_options.service, services[i].name) == 0) { - if (services[i].usage) { - services[i].usage(hydra_options.service); - exit(0); - } + if (strcmp(hydra_options.service, services[i].name) == 0) { + if (services[i].usage) { + services[i].usage(hydra_options.service); + exit(0); } + } } printf("The Module %s does not need or support optional parameters\n", hydra_options.service); @@ -603,34 +639,20 @@ void hydra_debug(int32_t force, char *string) { if (!debug && !force) return; - printf("[DEBUG] Code: %s Time: %" hPRIu64 "\n", string, (uint64_t) time(NULL)); - printf("[DEBUG] Options: mode %d ssl %d restore %d showAttempt %d tasks %d max_use %d tnp %d tpsal %d tprl %d exit_found %d miscptr %s service %s\n", - hydra_options.mode, hydra_options.ssl, hydra_options.restore, - hydra_options.showAttempt, hydra_options.tasks, hydra_options.max_use, - hydra_options.try_null_password, hydra_options.try_password_same_as_login, - hydra_options.try_password_reverse_login, hydra_options.exit_found, - STR_NULL(hydra_options.miscptr), hydra_options.service); + printf("[DEBUG] Code: %s Time: %" hPRIu64 "\n", string, (uint64_t)time(NULL)); + printf("[DEBUG] Options: mode %d ssl %d restore %d showAttempt %d tasks " + "%d max_use %d tnp %d tpsal %d tprl %d exit_found %d miscptr %s " + "service %s\n", + hydra_options.mode, hydra_options.ssl, hydra_options.restore, hydra_options.showAttempt, hydra_options.tasks, hydra_options.max_use, hydra_options.try_null_password, hydra_options.try_password_same_as_login, hydra_options.try_password_reverse_login, hydra_options.exit_found, STR_NULL(hydra_options.miscptr), hydra_options.service); - printf("[DEBUG] Brains: active %d targets %d finished %d todo_all %" hPRIu64 " todo %" hPRIu64 " sent %" hPRIu64 " found %" hPRIu64 " countlogin %" hPRIu64 " sizelogin %" hPRIu64 " countpass %" hPRIu64 " sizepass %" hPRIu64 "\n", - hydra_brains.active, hydra_brains.targets, hydra_brains.finished, - hydra_brains.todo_all + total_redo_count, hydra_brains.todo, - hydra_brains.sent, hydra_brains.found, - (uint64_t) hydra_brains.countlogin, - (uint64_t) hydra_brains.sizelogin, - (uint64_t) hydra_brains.countpass, - (uint64_t) hydra_brains.sizepass); + printf("[DEBUG] Brains: active %d targets %d finished %d todo_all %" hPRIu64 " todo %" hPRIu64 " sent %" hPRIu64 " found %" hPRIu64 " countlogin %" hPRIu64 " sizelogin %" hPRIu64 " countpass %" hPRIu64 " sizepass %" hPRIu64 "\n", hydra_brains.active, hydra_brains.targets, hydra_brains.finished, hydra_brains.todo_all + total_redo_count, hydra_brains.todo, hydra_brains.sent, hydra_brains.found, (uint64_t)hydra_brains.countlogin, (uint64_t)hydra_brains.sizelogin, (uint64_t)hydra_brains.countpass, + (uint64_t)hydra_brains.sizepass); for (i = 0; i < hydra_brains.targets; i++) { - hydra_target* target = hydra_targets[i]; - printf - ("[DEBUG] Target %d - target %s ip %s login_no %" hPRIu64 " pass_no %" hPRIu64 " sent %" hPRIu64 " pass_state %d redo_state %d (%d redos) use_count %d failed %d done %d fail_count %d login_ptr %s pass_ptr %s\n", - i, STR_NULL(target->target), hydra_address2string_beautiful(target->ip), - target->login_no, target->pass_no, target->sent, - target->pass_state, target->redo_state, target->redo, - target->use_count, target->failed, target->done, - target->fail_count, - STR_NULL(target->login_ptr), - STR_NULL(target->pass_ptr)); + hydra_target *target = hydra_targets[i]; + printf("[DEBUG] Target %d - target %s ip %s login_no %" hPRIu64 " pass_no %" hPRIu64 " sent %" hPRIu64 " pass_state %d redo_state %d (%d redos) use_count %d failed %d " + " done %d fail_count %d login_ptr %s pass_ptr %s\n", + i, STR_NULL(target->target), hydra_address2string_beautiful(target->ip), target->login_no, target->pass_no, target->sent, target->pass_state, target->redo_state, target->redo, target->use_count, target->failed, target->done, target->fail_count, STR_NULL(target->login_ptr), STR_NULL(target->pass_ptr)); } if (hydra_heads == NULL) @@ -638,12 +660,9 @@ void hydra_debug(int32_t force, char *string) { for (i = 0; i < hydra_options.max_use; i++) { if (hydra_heads[i]->active >= HEAD_UNUSED) { - printf("[DEBUG] Task %d - pid %d active %d redo %d current_login_ptr %s current_pass_ptr %s\n", - i, (int32_t) hydra_heads[i]->pid, - hydra_heads[i]->active, - hydra_heads[i]->redo, - STR_NULL(hydra_heads[i]->current_login_ptr), - STR_NULL(hydra_heads[i]->current_pass_ptr)); + printf("[DEBUG] Task %d - pid %d active %d redo %d current_login_ptr " + "%s current_pass_ptr %s\n", + i, (int32_t)hydra_heads[i]->pid, hydra_heads[i]->active, hydra_heads[i]->redo, STR_NULL(hydra_heads[i]->current_login_ptr), STR_NULL(hydra_heads[i]->current_pass_ptr)); if (hydra_heads[i]->active == HEAD_UNUSED) inactive++; else @@ -661,7 +680,7 @@ void bail(char *text) { void hydra_restore_write(int32_t print_msg) { FILE *f; hydra_brain brain; - char mynull[4] = { 0, 0, 0, 0 }, buf[4]; + char mynull[4] = {0, 0, 0, 0}, buf[4]; int32_t i = 0, j = 0; hydra_head hh; @@ -688,7 +707,7 @@ void hydra_restore_write(int32_t print_msg) { buf[0] = VERSION[1]; buf[1] = VERSION[3]; buf[2] = sizeof(int32_t) % 256; - buf[3] = sizeof(hydra_target*) % 256; + buf[3] = sizeof(hydra_target *) % 256; fwrite(buf, 1, 4, f); memcpy(&brain, &hydra_brains, sizeof(hydra_brain)); brain.targets = i; @@ -713,8 +732,7 @@ void hydra_restore_write(int32_t print_msg) { for (j = 0; j < hydra_brains.targets; j++) if (hydra_targets[j]->done != TARGET_FINISHED) { fck = fwrite(hydra_targets[j], sizeof(hydra_target), 1, f); - fprintf(f, "%s\n%d\n%d\n", hydra_targets[j]->target == NULL ? "" : hydra_targets[j]->target, (int32_t) (hydra_targets[j]->login_ptr - login_ptr), - (int32_t) (hydra_targets[j]->pass_ptr - pass_ptr)); + fprintf(f, "%s\n%d\n%d\n", hydra_targets[j]->target == NULL ? "" : hydra_targets[j]->target, (int32_t)(hydra_targets[j]->login_ptr - login_ptr), (int32_t)(hydra_targets[j]->pass_ptr - pass_ptr)); fprintf(f, "%s\n%s\n", hydra_targets[j]->login_ptr, hydra_targets[j]->pass_ptr); if (hydra_targets[j]->redo) for (i = 0; i < hydra_targets[j]->redo; i++) @@ -724,21 +742,21 @@ void hydra_restore_write(int32_t print_msg) { fprintf(f, "%s\n", hydra_targets[j]->skiplogin[i]); } for (j = 0; j < hydra_options.max_use; j++) { - memcpy((char *) &hh, hydra_heads[j], sizeof(hydra_head)); + memcpy((char *)&hh, hydra_heads[j], sizeof(hydra_head)); if (j == 0 && debug) { printf("[DEBUG] sizeof hydra_head: %lu\n", sizeof(hydra_head)); printf("[DEBUG] memcmp: %d\n", memcmp(hydra_heads[j], &hh, sizeof(hydra_head))); } - hh.active = 0; // re-enable disabled heads - if ((hh.current_login_ptr != NULL && hh.current_login_ptr != empty_login) - || (hh.current_pass_ptr != NULL && hh.current_pass_ptr != empty_login)) { + hh.active = 0; // re-enable disabled heads + if ((hh.current_login_ptr != NULL && hh.current_login_ptr != empty_login) || (hh.current_pass_ptr != NULL && hh.current_pass_ptr != empty_login)) { hh.redo = 1; if (print_msg && debug) - printf("[DEBUG] we will redo the following combination: target %s child %d login \"%s\" pass \"%s\"\n", hydra_targets[hh.target_no]->target, - j, hh.current_login_ptr, hh.current_pass_ptr); + printf("[DEBUG] we will redo the following combination: target %s " + "child %d login \"%s\" pass \"%s\"\n", + hydra_targets[hh.target_no]->target, j, hh.current_login_ptr, hh.current_pass_ptr); } - fck = fwrite((char *) &hh, sizeof(hydra_head), 1, f); - if (hh.redo /* && (hydra_options.bfg == 0 || (hh.current_pass_ptr == hydra_targets[hh.target_no]->bfg_ptr[j] && isprint((char) hh.current_pass_ptr[0]))) */ ) + fck = fwrite((char *)&hh, sizeof(hydra_head), 1, f); + if (hh.redo /* && (hydra_options.bfg == 0 || (hh.current_pass_ptr == hydra_targets[hh.target_no]->bfg_ptr[j] && isprint((char) hh.current_pass_ptr[0]))) */) fprintf(f, "%s\n%s\n", hh.current_login_ptr == NULL ? "" : hh.current_login_ptr, hh.current_pass_ptr == NULL ? "" : hh.current_pass_ptr); else fprintf(f, "\n\n"); @@ -749,7 +767,8 @@ void hydra_restore_write(int32_t print_msg) { if (debug) printf("[DEBUG] done writing session file\n"); if (print_msg) - printf("The session file ./hydra.restore was written. Type \"hydra -R\" to resume session.\n"); + printf("The session file ./hydra.restore was written. Type \"hydra -R\" to " + "resume session.\n"); hydra_debug(0, "hydra_restore_write()"); } @@ -774,7 +793,7 @@ void hydra_restore_read() { exit(-1); } - if ((fck = (int32_t) fread(buf, 1, 4, f)) != 4) { + if ((fck = (int32_t)fread(buf, 1, 4, f)) != 4) { fprintf(stderr, "[ERROR] invalid restore file (platform)\n"); exit(-1); } @@ -783,14 +802,18 @@ void hydra_restore_read() { exit(-1); } if (buf[0] != VERSION[1] || buf[1] != VERSION[3]) - fprintf(stderr, "[WARNING] restore file was created by version %c.%c, this is version %s\n", buf[0], buf[2], VERSION); - if (buf[2] != sizeof(int32_t) % 256 || buf[3] != sizeof(hydra_head*) % 256) { - fprintf(stderr, "[ERROR] restore file was created on a different, incompatible processor platform!\n"); + fprintf(stderr, + "[WARNING] restore file was created by version %c.%c, this is " + "version %s\n", + buf[0], buf[2], VERSION); + if (buf[2] != sizeof(int32_t) % 256 || buf[3] != sizeof(hydra_head *) % 256) { + fprintf(stderr, "[ERROR] restore file was created on a different, " + "incompatible processor platform!\n"); exit(-1); } - fck = (int32_t) fread(&bf_options, sizeof(bf_options), 1, f); - fck = (int32_t) fread(mynull, sizeof(mynull), 1, f); + fck = (int32_t)fread(&bf_options, sizeof(bf_options), 1, f); + fck = (int32_t)fread(mynull, sizeof(mynull), 1, f); if (debug) printf("[DEBUG] reading restore file: Step 1 complete\n"); if (mynull[0] + mynull[1] + mynull[2] + mynull[3] == 0) { @@ -803,9 +826,9 @@ void hydra_restore_read() { if (debug) printf("[DEBUG] reading restore file: Step 2 complete\n"); - fck = (int32_t) fread(&hydra_brains, sizeof(hydra_brain), 1, f); + fck = (int32_t)fread(&hydra_brains, sizeof(hydra_brain), 1, f); hydra_brains.ofp = stdout; - fck = (int32_t) fread(&hydra_options, sizeof(hydra_option), 1, f); + fck = (int32_t)fread(&hydra_options, sizeof(hydra_option), 1, f); hydra_options.restore = 1; verbose = hydra_options.verbose; debug = hydra_options.debug; @@ -858,23 +881,23 @@ void hydra_restore_read() { printf("[DEBUG] reading restore file: Step 8 complete\n"); login_ptr = malloc(hydra_brains.sizelogin + hydra_brains.countlogin + 8); - fck = (int32_t) fread(login_ptr, hydra_brains.sizelogin + hydra_brains.countlogin + 8, 1, f); + fck = (int32_t)fread(login_ptr, hydra_brains.sizelogin + hydra_brains.countlogin + 8, 1, f); if (debug) printf("[DEBUG] reading restore file: Step 9 complete\n"); - if (!check_flag(hydra_options.mode, MODE_COLON_FILE)) { // NOT colonfile mode + if (!check_flag(hydra_options.mode, MODE_COLON_FILE)) { // NOT colonfile mode pass_ptr = malloc(hydra_brains.sizepass + hydra_brains.countpass + 8); - fck = (int32_t) fread(pass_ptr, hydra_brains.sizepass + hydra_brains.countpass + 8, 1, f); - } else { // colonfile mode - hydra_options.colonfile = empty_login; // dummy + fck = (int32_t)fread(pass_ptr, hydra_brains.sizepass + hydra_brains.countpass + 8, 1, f); + } else { // colonfile mode + hydra_options.colonfile = empty_login; // dummy pass_ptr = csv_ptr = login_ptr; } if (debug) printf("[DEBUG] reading restore file: Step 10 complete\n"); - hydra_targets = (hydra_target **) malloc((hydra_brains.targets + 3) * sizeof(hydra_target*)); + hydra_targets = (hydra_target **)malloc((hydra_brains.targets + 3) * sizeof(hydra_target *)); for (j = 0; j < hydra_brains.targets; j++) { hydra_targets[j] = malloc(sizeof(hydra_target)); - fck = (int32_t) fread(hydra_targets[j], sizeof(hydra_target), 1, f); + fck = (int32_t)fread(hydra_targets[j], sizeof(hydra_target), 1, f); sck = fgets(out, sizeof(out), f); if (out[0] != 0 && out[strlen(out) - 1] == '\n') out[strlen(out) - 1] = 0; @@ -884,7 +907,7 @@ void hydra_restore_read() { hydra_targets[j]->login_ptr = login_ptr + atoi(out); sck = fgets(out, sizeof(out), f); hydra_targets[j]->pass_ptr = pass_ptr + atoi(out); - sck = fgets(out, sizeof(out), f); // target login_ptr, ignord + sck = fgets(out, sizeof(out), f); // target login_ptr, ignord sck = fgets(out, sizeof(out), f); if (hydra_options.bfg) { if (out[0] != 0 && out[strlen(out) - 1] == '\n') @@ -893,7 +916,8 @@ void hydra_restore_read() { strcpy(hydra_targets[j]->pass_ptr, out); } if (hydra_targets[j]->redo > 0) { - if (debug) printf("[DEBUG] target %d redo %d\n", j, hydra_targets[j]->redo); + if (debug) + printf("[DEBUG] target %d redo %d\n", j, hydra_targets[j]->redo); for (i = 0; i < hydra_targets[j]->redo; i++) { sck = fgets(out, sizeof(out), f); if (out[0] != 0 && out[strlen(out) - 1] == '\n') @@ -923,15 +947,16 @@ void hydra_restore_read() { } if (debug) printf("[DEBUG] reading restore file: Step 11 complete\n"); - hydra_heads = malloc(sizeof(hydra_head*) * hydra_options.max_use); + hydra_heads = malloc(sizeof(hydra_head *) * hydra_options.max_use); for (j = 0; j < hydra_options.max_use; j++) { hydra_heads[j] = malloc(sizeof(hydra_head)); - fck = (int32_t) fread(hydra_heads[j], sizeof(hydra_head), 1, f); + fck = (int32_t)fread(hydra_heads[j], sizeof(hydra_head), 1, f); hydra_heads[j]->sp[0] = -1; hydra_heads[j]->sp[1] = -1; sck = fgets(out, sizeof(out), f); if (hydra_heads[j]->redo) { - if (debug) printf("[DEBUG] head %d redo\n", j); + if (debug) + printf("[DEBUG] head %d redo\n", j); if (out[0] != 0 && out[strlen(out) - 1] == '\n') out[strlen(out) - 1] = 0; hydra_heads[j]->current_login_ptr = malloc(strlen(out) + 1); @@ -985,8 +1010,8 @@ void killed_childs(int32_t signo) { } void killed_childs_report(int32_t signo) { - //if (debug) - printf("[ERROR] children crashed! (%d)\n", child_head_no); + // if (debug) + printf("[ERROR] children crashed! (%d)\n", child_head_no); fck = write(child_socket, "E", 1); _exit(-1); } @@ -1009,7 +1034,7 @@ void kill_children(int32_t signo) { exit(0); } -uint64_t countlines(FILE * fd, int32_t colonmode) { +uint64_t countlines(FILE *fd, int32_t colonmode) { size_t clines = 0; char *buf = malloc(MAXLINESIZE); int32_t only_one_empty_line = 0; @@ -1051,12 +1076,12 @@ uint64_t countlines(FILE * fd, int32_t colonmode) { return clines; } -void fill_mem(char *ptr, FILE * fd, int32_t colonmode) { +void fill_mem(char *ptr, FILE *fd, int32_t colonmode) { char tmp[MAXBUF + 4] = "", *ptr2; uint32_t len; int32_t only_one_empty_line = 0; -int read_flag = 0; + int read_flag = 0; #ifdef HAVE_ZLIB gzFile fp = gzdopen(fileno(fd), "r"); @@ -1081,7 +1106,10 @@ int read_flag = 0; } if (colonmode) { if ((ptr2 = index(tmp, ':')) == NULL) { - fprintf(stderr, "[ERROR] invalid line in colon file (-C), missing colon in line: %s\n", tmp); + fprintf(stderr, + "[ERROR] invalid line in colon file (-C), missing colon " + "in line: %s\n", + tmp); exit(-1); } else { *ptr2 = 0; @@ -1112,23 +1140,23 @@ char *hydra_build_time() { time(&epoch); the_time = localtime(&epoch); strftime(datetime, sizeof(datetime), "%Y-%m-%d %H:%M:%S", the_time); - return (char *) &datetime; + return (char *)&datetime; } void hydra_service_init(int32_t target_no) { int32_t x = 99; int32_t i; - hydra_target* t = hydra_targets[target_no]; - char* miscptr = hydra_options.miscptr; - FILE* ofp = hydra_brains.ofp; + hydra_target *t = hydra_targets[target_no]; + char *miscptr = hydra_options.miscptr; + FILE *ofp = hydra_brains.ofp; for (i = 0; x == 99 && i < sizeof(services) / sizeof(services[0]); i++) { - if (strcmp(hydra_options.service, services[i].name) == 0) { - if (services[i].init) { - x = services[i].init(t->ip, -1, options, miscptr, ofp, t->port, t->target); - break; - } + if (strcmp(hydra_options.service, services[i].name) == 0) { + if (services[i].init) { + x = services[i].init(t->ip, -1, options, miscptr, ofp, t->port, t->target); + break; } + } } // dirty workaround here: @@ -1148,7 +1176,10 @@ void hydra_service_init(int32_t target_no) { if (hydra_options.outfile_format == FORMAT_JSONV1) { char json_error[120]; snprintf(json_error, sizeof(json_error), "[ERROR] unexpected result connecting to target %s port %d", hydra_address2string_beautiful(t->ip), t->port); - fprintf(hydra_brains.ofp, "\n\t],\n\"success\": false,\n\"errormessages\": [ \"%s\" ],\n\"quantityfound\": %" hPRIu64 " }\n", json_error, hydra_brains.found); + fprintf(hydra_brains.ofp, + "\n\t],\n\"success\": false,\n\"errormessages\": [ \"%s\" " + "],\n\"quantityfound\": %" hPRIu64 " }\n", + json_error, hydra_brains.found); } fclose(hydra_brains.ofp); } @@ -1173,7 +1204,7 @@ int32_t hydra_spawn_head(int32_t head_no, int32_t target_no) { if (socketpair(PF_UNIX, SOCK_STREAM, 0, hydra_heads[head_no]->sp) == 0) { child_head_no = head_no; - if ((hydra_heads[head_no]->pid = fork()) == 0) { // THIS IS THE CHILD + if ((hydra_heads[head_no]->pid = fork()) == 0) { // THIS IS THE CHILD // set new signals for child process_restore = 0; child_socket = hydra_heads[head_no]->sp[1]; @@ -1204,24 +1235,25 @@ int32_t hydra_spawn_head(int32_t head_no, int32_t target_no) { if (debug) printf("[DEBUG] head_no %d has pid %d\n", head_no, getpid()); - hydra_target* t = hydra_targets[target_no]; + hydra_target *t = hydra_targets[target_no]; int32_t sp = hydra_heads[head_no]->sp[1]; - char* miscptr = hydra_options.miscptr; - FILE* ofp = hydra_brains.ofp; - hydra_target* head_target = hydra_targets[hydra_heads[head_no]->target_no]; + char *miscptr = hydra_options.miscptr; + FILE *ofp = hydra_brains.ofp; + hydra_target *head_target = hydra_targets[hydra_heads[head_no]->target_no]; for (i = 0; i < sizeof(services) / sizeof(services[0]); i++) { - if (strcmp(hydra_options.service, services[i].name) == 0) { - if (services[i].exec) { - services[i].exec(t->ip, sp, options, miscptr, ofp, t->port, head_target->target); - // just in case a module returns (which it shouldnt) we let it exit here - exit(-1); - } + if (strcmp(hydra_options.service, services[i].name) == 0) { + if (services[i].exec) { + services[i].exec(t->ip, sp, options, miscptr, ofp, t->port, head_target->target); + // just in case a module returns (which it shouldnt) we let it exit + // here + exit(-1); } + } } // FIXME: dirty workaround here if (strcmp(hydra_options.service, "xmpp") == 0) { - service_xmpp(hydra_targets[target_no]->target, hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); + service_xmpp(hydra_targets[target_no]->target, hydra_targets[target_no]->ip, hydra_heads[head_no]->sp[1], options, hydra_options.miscptr, hydra_brains.ofp, hydra_targets[target_no]->port, hydra_targets[hydra_heads[head_no]->target_no]->target); } // just in case a module returns (which it shouldnt) we let it exit here @@ -1229,8 +1261,11 @@ int32_t hydra_spawn_head(int32_t head_no, int32_t target_no) { } else { child_head_no = -1; if (hydra_heads[head_no]->pid > 0) { - fck = write(hydra_heads[head_no]->sp[1], "n", 1); // yes, a small "n" - this way we can distinguish later if the client successfully tested a pair and is requesting a new one or the mother did that - (void) fcntl(hydra_heads[head_no]->sp[0], F_SETFL, O_NONBLOCK); + fck = write(hydra_heads[head_no]->sp[1], "n", + 1); // yes, a small "n" - this way we can distinguish later + // if the client successfully tested a pair and is + // requesting a new one or the mother did that + (void)fcntl(hydra_heads[head_no]->sp[0], F_SETFL, O_NONBLOCK); if (hydra_heads[head_no]->redo != 1) hydra_heads[head_no]->target_no = target_no; hydra_heads[head_no]->active = HEAD_ACTIVE; @@ -1258,76 +1293,74 @@ int32_t hydra_spawn_head(int32_t head_no, int32_t target_no) { int32_t hydra_lookup_port(char *service) { int32_t i = 0, port = -2; - hydra_portlist hydra_portlists[] = { - {"ftp", PORT_FTP, PORT_FTP_SSL}, - {"ftps", PORT_FTP, PORT_FTP_SSL}, - {"http-head", PORT_HTTP, PORT_HTTP_SSL}, - {"http-post", PORT_HTTP, PORT_HTTP_SSL}, - {"http-get", PORT_HTTP, PORT_HTTP_SSL}, - {"http-get-form", PORT_HTTP, PORT_HTTP_SSL}, - {"http-post-form", PORT_HTTP, PORT_HTTP_SSL}, - {"https-get-form", PORT_HTTP, PORT_HTTP_SSL}, - {"https-post-form", PORT_HTTP, PORT_HTTP_SSL}, - {"https-head", PORT_HTTP, PORT_HTTP_SSL}, - {"https-get", PORT_HTTP, PORT_HTTP_SSL}, - {"http-proxy", PORT_HTTP_PROXY, PORT_HTTP_PROXY_SSL}, - {"http-proxy-urlenum", PORT_HTTP_PROXY, PORT_HTTP_PROXY_SSL}, - {"icq", PORT_ICQ, PORT_ICQ_SSL}, - {"imap", PORT_IMAP, PORT_IMAP_SSL}, - {"ldap2", PORT_LDAP, PORT_LDAP_SSL}, - {"ldap3", PORT_LDAP, PORT_LDAP_SSL}, - {"ldap3-crammd5", PORT_LDAP, PORT_LDAP_SSL}, - {"ldap3-digestmd5", PORT_LDAP, PORT_LDAP_SSL}, - {"oracle-listener", PORT_ORACLE, PORT_ORACLE_SSL}, - {"oracle-sid", PORT_ORACLE, PORT_ORACLE_SSL}, - {"oracle", PORT_ORACLE, PORT_ORACLE_SSL}, - {"memcached", PORT_MCACHED, PORT_MCACHED_SSL}, - {"mongodb", PORT_MONGODB, PORT_MONGODB}, - {"mssql", PORT_MSSQL, PORT_MSSQL_SSL}, - {"mysql", PORT_MYSQL, PORT_MYSQL_SSL}, - {"postgres", PORT_POSTGRES, PORT_POSTGRES_SSL}, - {"pcanywhere", PORT_PCANYWHERE, PORT_PCANYWHERE_SSL}, - {"nntp", PORT_NNTP, PORT_NNTP_SSL}, - {"pcnfs", PORT_PCNFS, PORT_PCNFS_SSL}, - {"pop3", PORT_POP3, PORT_POP3_SSL}, - {"redis", PORT_REDIS, PORT_REDIS_SSL}, - {"rexec", PORT_REXEC, PORT_REXEC_SSL}, - {"rlogin", PORT_RLOGIN, PORT_RLOGIN_SSL}, - {"rsh", PORT_RSH, PORT_RSH_SSL}, - {"sapr3", PORT_SAPR3, PORT_SAPR3_SSL}, - {"smb", PORT_SMBNT, PORT_SMBNT_SSL}, - {"smb2", PORT_SMBNT, PORT_SMBNT_SSL}, - {"smbnt", PORT_SMBNT, PORT_SMBNT_SSL}, - {"socks5", PORT_SOCKS5, PORT_SOCKS5_SSL}, - {"ssh", PORT_SSH, PORT_SSH_SSL}, - {"sshkey", PORT_SSH, PORT_SSH_SSL}, - {"telnet", PORT_TELNET, PORT_TELNET_SSL}, - {"adam6500", PORT_ADAM6500, PORT_ADAM6500_SSL}, - {"cisco", PORT_TELNET, PORT_TELNET_SSL}, - {"cisco-enable", PORT_TELNET, PORT_TELNET_SSL}, - {"vnc", PORT_VNC, PORT_VNC_SSL}, - {"snmp", PORT_SNMP, PORT_SNMP_SSL}, - {"cvs", PORT_CVS, PORT_CVS_SSL}, - {"svn", PORT_SVN, PORT_SVN_SSL}, - {"firebird", PORT_FIREBIRD, PORT_FIREBIRD_SSL}, - {"afp", PORT_AFP, PORT_AFP_SSL}, - {"ncp", PORT_NCP, PORT_NCP_SSL}, - {"smtp", PORT_SMTP, PORT_SMTP_SSL}, - {"smtp-enum", PORT_SMTP, PORT_SMTP_SSL}, - {"teamspeak", PORT_TEAMSPEAK, PORT_TEAMSPEAK_SSL}, - {"sip", PORT_SIP, PORT_SIP_SSL}, - {"vmauthd", PORT_VMAUTHD, PORT_VMAUTHD_SSL}, - {"xmpp", PORT_XMPP, PORT_XMPP_SSL}, - {"irc", PORT_IRC, PORT_IRC_SSL}, - {"rdp", PORT_RDP, PORT_RDP_SSL}, - {"asterisk", PORT_ASTERISK, PORT_ASTERISK_SSL}, - {"s7-300", PORT_S7_300, PORT_S7_300_SSL}, - {"rtsp", PORT_RTSP, PORT_RTSP_SSL}, - {"rpcap", PORT_RPCAP, PORT_RPCAP_SSL}, - {"radmin2", PORT_RADMIN2, PORT_RADMIN2}, - // ADD NEW SERVICES HERE - add new port numbers to hydra.h - {"", PORT_NOPORT, PORT_NOPORT} - }; + hydra_portlist hydra_portlists[] = {{"ftp", PORT_FTP, PORT_FTP_SSL}, + {"ftps", PORT_FTP, PORT_FTP_SSL}, + {"http-head", PORT_HTTP, PORT_HTTP_SSL}, + {"http-post", PORT_HTTP, PORT_HTTP_SSL}, + {"http-get", PORT_HTTP, PORT_HTTP_SSL}, + {"http-get-form", PORT_HTTP, PORT_HTTP_SSL}, + {"http-post-form", PORT_HTTP, PORT_HTTP_SSL}, + {"https-get-form", PORT_HTTP, PORT_HTTP_SSL}, + {"https-post-form", PORT_HTTP, PORT_HTTP_SSL}, + {"https-head", PORT_HTTP, PORT_HTTP_SSL}, + {"https-get", PORT_HTTP, PORT_HTTP_SSL}, + {"http-proxy", PORT_HTTP_PROXY, PORT_HTTP_PROXY_SSL}, + {"http-proxy-urlenum", PORT_HTTP_PROXY, PORT_HTTP_PROXY_SSL}, + {"icq", PORT_ICQ, PORT_ICQ_SSL}, + {"imap", PORT_IMAP, PORT_IMAP_SSL}, + {"ldap2", PORT_LDAP, PORT_LDAP_SSL}, + {"ldap3", PORT_LDAP, PORT_LDAP_SSL}, + {"ldap3-crammd5", PORT_LDAP, PORT_LDAP_SSL}, + {"ldap3-digestmd5", PORT_LDAP, PORT_LDAP_SSL}, + {"oracle-listener", PORT_ORACLE, PORT_ORACLE_SSL}, + {"oracle-sid", PORT_ORACLE, PORT_ORACLE_SSL}, + {"oracle", PORT_ORACLE, PORT_ORACLE_SSL}, + {"memcached", PORT_MCACHED, PORT_MCACHED_SSL}, + {"mongodb", PORT_MONGODB, PORT_MONGODB}, + {"mssql", PORT_MSSQL, PORT_MSSQL_SSL}, + {"mysql", PORT_MYSQL, PORT_MYSQL_SSL}, + {"postgres", PORT_POSTGRES, PORT_POSTGRES_SSL}, + {"pcanywhere", PORT_PCANYWHERE, PORT_PCANYWHERE_SSL}, + {"nntp", PORT_NNTP, PORT_NNTP_SSL}, + {"pcnfs", PORT_PCNFS, PORT_PCNFS_SSL}, + {"pop3", PORT_POP3, PORT_POP3_SSL}, + {"redis", PORT_REDIS, PORT_REDIS_SSL}, + {"rexec", PORT_REXEC, PORT_REXEC_SSL}, + {"rlogin", PORT_RLOGIN, PORT_RLOGIN_SSL}, + {"rsh", PORT_RSH, PORT_RSH_SSL}, + {"sapr3", PORT_SAPR3, PORT_SAPR3_SSL}, + {"smb", PORT_SMBNT, PORT_SMBNT_SSL}, + {"smb2", PORT_SMBNT, PORT_SMBNT_SSL}, + {"smbnt", PORT_SMBNT, PORT_SMBNT_SSL}, + {"socks5", PORT_SOCKS5, PORT_SOCKS5_SSL}, + {"ssh", PORT_SSH, PORT_SSH_SSL}, + {"sshkey", PORT_SSH, PORT_SSH_SSL}, + {"telnet", PORT_TELNET, PORT_TELNET_SSL}, + {"adam6500", PORT_ADAM6500, PORT_ADAM6500_SSL}, + {"cisco", PORT_TELNET, PORT_TELNET_SSL}, + {"cisco-enable", PORT_TELNET, PORT_TELNET_SSL}, + {"vnc", PORT_VNC, PORT_VNC_SSL}, + {"snmp", PORT_SNMP, PORT_SNMP_SSL}, + {"cvs", PORT_CVS, PORT_CVS_SSL}, + {"svn", PORT_SVN, PORT_SVN_SSL}, + {"firebird", PORT_FIREBIRD, PORT_FIREBIRD_SSL}, + {"afp", PORT_AFP, PORT_AFP_SSL}, + {"ncp", PORT_NCP, PORT_NCP_SSL}, + {"smtp", PORT_SMTP, PORT_SMTP_SSL}, + {"smtp-enum", PORT_SMTP, PORT_SMTP_SSL}, + {"teamspeak", PORT_TEAMSPEAK, PORT_TEAMSPEAK_SSL}, + {"sip", PORT_SIP, PORT_SIP_SSL}, + {"vmauthd", PORT_VMAUTHD, PORT_VMAUTHD_SSL}, + {"xmpp", PORT_XMPP, PORT_XMPP_SSL}, + {"irc", PORT_IRC, PORT_IRC_SSL}, + {"rdp", PORT_RDP, PORT_RDP_SSL}, + {"asterisk", PORT_ASTERISK, PORT_ASTERISK_SSL}, + {"s7-300", PORT_S7_300, PORT_S7_300_SSL}, + {"rtsp", PORT_RTSP, PORT_RTSP_SSL}, + {"rpcap", PORT_RPCAP, PORT_RPCAP_SSL}, + {"radmin2", PORT_RADMIN2, PORT_RADMIN2}, + // ADD NEW SERVICES HERE - add new port numbers to hydra.h + {"", PORT_NOPORT, PORT_NOPORT}}; while (strlen(hydra_portlists[i].name) > 0 && port == -2) { if (strcmp(service, hydra_portlists[i].name) == 0) { @@ -1379,14 +1412,14 @@ void hydra_kill_head(int32_t head_no, int32_t killit, int32_t fail) { if (hydra_heads[head_no]->pid > 0 && killit) kill(hydra_heads[head_no]->pid, SIGKILL); hydra_heads[head_no]->pid = -1; - if (fail < 1 && hydra_heads[head_no]->target_no >= 0 && hydra_options.bfg && hydra_targets[hydra_heads[head_no]->target_no]->pass_state == 3 - && strlen(hydra_heads[head_no]->current_pass_ptr) > 0 && hydra_heads[head_no]->current_pass_ptr != hydra_heads[head_no]->current_login_ptr) { + if (fail < 1 && hydra_heads[head_no]->target_no >= 0 && hydra_options.bfg && hydra_targets[hydra_heads[head_no]->target_no]->pass_state == 3 && strlen(hydra_heads[head_no]->current_pass_ptr) > 0 && hydra_heads[head_no]->current_pass_ptr != hydra_heads[head_no]->current_login_ptr) { free(hydra_heads[head_no]->current_pass_ptr); hydra_heads[head_no]->current_pass_ptr = empty_login; // hydra_bfg_remove(head_no); - // hydra_targets[hydra_heads[head_no]->target_no]->bfg_ptr[head_no] = NULL; + // hydra_targets[hydra_heads[head_no]->target_no]->bfg_ptr[head_no] = + // NULL; } - (void) wait3(NULL, WNOHANG, NULL); + (void)wait3(NULL, WNOHANG, NULL); } void hydra_increase_fail_count(int32_t target_no, int32_t head_no) { @@ -1396,11 +1429,11 @@ void hydra_increase_fail_count(int32_t target_no, int32_t head_no) { return; if (hydra_targets[target_no]->ok) { - const int32_t tasks = hydra_options.tasks; - const int32_t success = tasks - hydra_targets[target_no]->failed; - const int32_t t = tasks < 5 ? 6 - tasks : 1; - const int32_t s = success < 5 ? 6 - success : 1; - maxfail = MAXFAIL + t + s + 2; + const int32_t tasks = hydra_options.tasks; + const int32_t success = tasks - hydra_targets[target_no]->failed; + const int32_t t = tasks < 5 ? 6 - tasks : 1; + const int32_t s = success < 5 ? 6 - success : 1; + maxfail = MAXFAIL + t + s + 2; } hydra_targets[target_no]->fail_count++; @@ -1413,18 +1446,15 @@ void hydra_increase_fail_count(int32_t target_no, int32_t head_no) { k++; if (k <= 1) { // we need to put this in a list, otherwise we fail one login+pw test - if (hydra_targets[target_no]->done == TARGET_ACTIVE - && hydra_options.skip_redo == 0 - && hydra_targets[target_no]->redo <= hydra_options.max_use * 2 - && ((hydra_heads[head_no]->current_login_ptr != empty_login && hydra_heads[head_no]->current_pass_ptr != empty_login) - || (hydra_heads[head_no]->current_login_ptr != NULL && hydra_heads[head_no]->current_pass_ptr != NULL))) { + if (hydra_targets[target_no]->done == TARGET_ACTIVE && hydra_options.skip_redo == 0 && hydra_targets[target_no]->redo <= hydra_options.max_use * 2 && ((hydra_heads[head_no]->current_login_ptr != empty_login && hydra_heads[head_no]->current_pass_ptr != empty_login) || (hydra_heads[head_no]->current_login_ptr != NULL && hydra_heads[head_no]->current_pass_ptr != NULL))) { hydra_targets[target_no]->redo_login[hydra_targets[target_no]->redo] = hydra_heads[head_no]->current_login_ptr; hydra_targets[target_no]->redo_pass[hydra_targets[target_no]->redo] = hydra_heads[head_no]->current_pass_ptr; hydra_targets[target_no]->redo++; total_redo_count++; if (debug) - printf("[DEBUG] - will be retried at the end: ip %s - login %s - pass %s - child %d\n", hydra_targets[target_no]->target, - hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, head_no); + printf("[DEBUG] - will be retried at the end: ip %s - login %s - " + "pass %s - child %d\n", + hydra_targets[target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, head_no); hydra_heads[head_no]->current_login_ptr = empty_login; hydra_heads[head_no]->current_pass_ptr = empty_login; } @@ -1435,29 +1465,27 @@ void hydra_increase_fail_count(int32_t target_no, int32_t head_no) { else hydra_targets[target_no]->done = TARGET_UNRESOLVED; // mark target as done by unable to connect hydra_brains.finished++; - fprintf(stderr, "[ERROR] Too many connect errors to target, disabling %s://%s%s%s:%d\n", hydra_options.service, hydra_targets[target_no]->ip[0] == 16 - && index(hydra_targets[target_no]->target, ':') != NULL ? "[" : "", hydra_targets[target_no]->target, hydra_targets[target_no]->ip[0] == 16 - && index(hydra_targets[target_no]->target, ':') != NULL ? "]" : "", hydra_targets[target_no]->port); + fprintf(stderr, + "[ERROR] Too many connect errors to target, disabling " + "%s://%s%s%s:%d\n", + hydra_options.service, hydra_targets[target_no]->ip[0] == 16 && index(hydra_targets[target_no]->target, ':') != NULL ? "[" : "", hydra_targets[target_no]->target, hydra_targets[target_no]->ip[0] == 16 && index(hydra_targets[target_no]->target, ':') != NULL ? "]" : "", hydra_targets[target_no]->port); } if (hydra_brains.targets > hydra_brains.finished) hydra_kill_head(head_no, 1, 0); else hydra_kill_head(head_no, 1, 2); - } // we keep the last one alive as long as it make sense + } // we keep the last one alive as long as it make sense } else { // we need to put this in a list, otherwise we fail one login+pw test - if (hydra_targets[target_no]->done == TARGET_ACTIVE - && hydra_options.skip_redo == 0 - && hydra_targets[target_no]->redo <= hydra_options.max_use * 2 - && ((hydra_heads[head_no]->current_login_ptr != empty_login && hydra_heads[head_no]->current_pass_ptr != empty_login) - || (hydra_heads[head_no]->current_login_ptr != NULL && hydra_heads[head_no]->current_pass_ptr != NULL))) { + if (hydra_targets[target_no]->done == TARGET_ACTIVE && hydra_options.skip_redo == 0 && hydra_targets[target_no]->redo <= hydra_options.max_use * 2 && ((hydra_heads[head_no]->current_login_ptr != empty_login && hydra_heads[head_no]->current_pass_ptr != empty_login) || (hydra_heads[head_no]->current_login_ptr != NULL && hydra_heads[head_no]->current_pass_ptr != NULL))) { hydra_targets[target_no]->redo_login[hydra_targets[target_no]->redo] = hydra_heads[head_no]->current_login_ptr; hydra_targets[target_no]->redo_pass[hydra_targets[target_no]->redo] = hydra_heads[head_no]->current_pass_ptr; hydra_targets[target_no]->redo++; total_redo_count++; if (debug) - printf("[DEBUG] - will be retried at the end: ip %s - login %s - pass %s - child %d\n", hydra_targets[target_no]->target, - hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, head_no); + printf("[DEBUG] - will be retried at the end: ip %s - login %s - " + "pass %s - child %d\n", + hydra_targets[target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, head_no); hydra_heads[head_no]->current_login_ptr = empty_login; hydra_heads[head_no]->current_pass_ptr = empty_login; } @@ -1500,28 +1528,28 @@ char *hydra_reverse_login(int32_t head_no, char *login) { start = hydra_heads[head_no]->reverse; pos = start + j; - while(start < --pos) { - switch( (*pos & 0xF0) >> 4 ) { + while (start < --pos) { + switch ((*pos & 0xF0) >> 4) { case 0xF: /* U+010000-U+10FFFF: four bytes. */ keep = *pos; - *pos = *(pos-3); - *(pos-3) = keep; - keep = *(pos-1); - *(pos-1) = *(pos-2); - *(pos-2) = keep; + *pos = *(pos - 3); + *(pos - 3) = keep; + keep = *(pos - 1); + *(pos - 1) = *(pos - 2); + *(pos - 2) = keep; pos -= 3; break; case 0xE: /* U+000800-U+00FFFF: three bytes. */ keep = *pos; - *pos = *(pos-2); - *(pos-2) = keep; + *pos = *(pos - 2); + *(pos - 2) = keep; pos -= 2; break; case 0xC: /* fall-through */ case 0xD: /* U+000080-U+0007FF: two bytes. */ keep = *pos; - *pos = *(pos-1); - *(pos-1) = keep; + *pos = *(pos - 1); + *(pos - 1) = keep; pos--; break; } @@ -1546,22 +1574,25 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { hydra_targets[target_no]->done = TARGET_FINISHED; hydra_brains.finished++; if (verbose) - printf("[STATUS] attack finished for %s (waiting for children to complete tests)\n", hydra_targets[target_no]->target); + printf("[STATUS] attack finished for %s (waiting for children to " + "complete tests)\n", + hydra_targets[target_no]->target); } return -1; } } if (debug) - printf - ("[DEBUG] send_next_pair_init target %d, head %d, redo %d, redo_state %d, pass_state %d. loop_mode %d, curlogin %s, curpass %s, tlogin %s, tpass %s, logincnt %" hPRIu64 "/%" hPRIu64 ", passcnt %" hPRIu64 "/%" hPRIu64 ", loop_cnt %d\n", - target_no, head_no, hydra_targets[target_no]->redo, hydra_targets[target_no]->redo_state, hydra_targets[target_no]->pass_state, hydra_options.loop_mode, - hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, hydra_targets[target_no]->login_ptr, hydra_targets[target_no]->pass_ptr, - hydra_targets[target_no]->login_no, hydra_brains.countlogin, hydra_targets[target_no]->pass_no, hydra_brains.countpass, loop_cnt); + printf("[DEBUG] send_next_pair_init target %d, head %d, redo %d, " + "redo_state %d, pass_state %d. loop_mode %d, curlogin %s, curpass " + "%s, tlogin %s, tpass %s, logincnt %" hPRIu64 "/%" hPRIu64 ", passcnt %" hPRIu64 "/%" hPRIu64 ", loop_cnt %d\n", + target_no, head_no, hydra_targets[target_no]->redo, hydra_targets[target_no]->redo_state, hydra_targets[target_no]->pass_state, hydra_options.loop_mode, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, hydra_targets[target_no]->login_ptr, hydra_targets[target_no]->pass_ptr, hydra_targets[target_no]->login_no, hydra_brains.countlogin, hydra_targets[target_no]->pass_no, hydra_brains.countpass, loop_cnt); if (loop_cnt > (hydra_brains.countlogin * 2) + 1 && loop_cnt > (hydra_brains.countpass * 2) + 1) { if (debug) - printf("[DEBUG] too many loops in send_next_pair, returning -1 (loop_cnt %d, sent %" hPRIu64 ", todo %" hPRIu64 ")\n", loop_cnt, hydra_targets[target_no]->sent, hydra_brains.todo); + printf("[DEBUG] too many loops in send_next_pair, returning -1 (loop_cnt " + "%d, sent %" hPRIu64 ", todo %" hPRIu64 ")\n", + loop_cnt, hydra_targets[target_no]->sent, hydra_brains.todo); return -1; } @@ -1571,9 +1602,9 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { snpdone = 1; } else { if (debug && (hydra_heads[head_no]->current_login_ptr != NULL || hydra_heads[head_no]->current_pass_ptr != NULL)) - printf("[COMPLETED] target %s - login \"%s\" - pass \"%s\" - child %d - %" hPRIu64 " of %" hPRIu64 "\n", - hydra_targets[target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, head_no, - hydra_targets[target_no]->sent, hydra_brains.todo + hydra_targets[target_no]->redo); + printf("[COMPLETED] target %s - login \"%s\" - pass \"%s\" - child %d - " + "%" hPRIu64 " of %" hPRIu64 "\n", + hydra_targets[target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, head_no, hydra_targets[target_no]->sent, hydra_brains.todo + hydra_targets[target_no]->redo); hydra_heads[head_no]->redo = 0; if (hydra_targets[target_no]->redo_state > 0) { if (hydra_targets[target_no]->redo_state <= hydra_targets[target_no]->redo) { @@ -1587,17 +1618,19 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { hydra_targets[target_no]->done = TARGET_FINISHED; hydra_brains.finished++; if (verbose) - printf("[STATUS] attack finished for %s (waiting for children to complete tests)\n", hydra_targets[target_no]->target); + printf("[STATUS] attack finished for %s (waiting for children to " + "complete tests)\n", + hydra_targets[target_no]->target); } loop_cnt = 0; return -1; } - } else { // normale state, no redo + } else { // normale state, no redo if (hydra_targets[target_no]->done != TARGET_ACTIVE) { loop_cnt = 0; - return -1; // head will be disabled by main while() + return -1; // head will be disabled by main while() } - if (hydra_options.loop_mode == 0) { // one user after another + if (hydra_options.loop_mode == 0) { // one user after another if (hydra_targets[target_no]->login_no < hydra_brains.countlogin) { // as we loop password in mode == 0 we set the current login first hydra_heads[head_no]->current_login_ptr = hydra_targets[target_no]->login_ptr; @@ -1611,7 +1644,8 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { hydra_targets[target_no]->pass_state++; } if (hydra_targets[target_no]->pass_state == 1 && snpdone == 0) { - // small check that there is a login name (could also be emtpy) and if we already tried empty password it would be a double + // small check that there is a login name (could also be emtpy) and + // if we already tried empty password it would be a double if (hydra_options.try_null_password) { if (hydra_options.try_password_same_as_login == 0 || (hydra_targets[target_no]->login_ptr != NULL && strlen(hydra_targets[target_no]->login_ptr) > 0)) { hydra_heads[head_no]->current_pass_ptr = empty_login; @@ -1625,11 +1659,10 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { hydra_targets[target_no]->pass_state++; } if (hydra_targets[target_no]->pass_state == 2 && snpdone == 0) { - // small check that there is a login name (could also be emtpy) and if we already tried empty password it would be a double + // small check that there is a login name (could also be emtpy) and + // if we already tried empty password it would be a double if (hydra_options.try_password_reverse_login) { - if ((hydra_options.try_password_same_as_login == 0 - || strcmp(hydra_targets[target_no]->login_ptr, hydra_reverse_login(head_no, hydra_heads[head_no]->current_login_ptr)) != 0) - && (hydra_options.try_null_password == 0 || (hydra_targets[target_no]->login_ptr != NULL && strlen(hydra_targets[target_no]->login_ptr) > 0))) { + if ((hydra_options.try_password_same_as_login == 0 || strcmp(hydra_targets[target_no]->login_ptr, hydra_reverse_login(head_no, hydra_heads[head_no]->current_login_ptr)) != 0) && (hydra_options.try_null_password == 0 || (hydra_targets[target_no]->login_ptr != NULL && strlen(hydra_targets[target_no]->login_ptr) > 0))) { hydra_heads[head_no]->current_pass_ptr = hydra_reverse_login(head_no, hydra_heads[head_no]->current_login_ptr); snpdone = 1; } else { @@ -1642,35 +1675,31 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { } // now we handle the -C -l/-L -p/-P data if (hydra_targets[target_no]->pass_state == 3 && snpdone == 0) { - if (check_flag(hydra_options.mode, MODE_COLON_FILE)) { // colon mode + if (check_flag(hydra_options.mode, MODE_COLON_FILE)) { // colon mode hydra_heads[head_no]->current_login_ptr = hydra_targets[target_no]->login_ptr; hydra_heads[head_no]->current_pass_ptr = hydra_targets[target_no]->pass_ptr; hydra_targets[target_no]->login_no++; snpdone = 1; hydra_targets[target_no]->login_ptr = hydra_targets[target_no]->pass_ptr; - //hydra_targets[target_no]->login_ptr++; + // hydra_targets[target_no]->login_ptr++; while (*hydra_targets[target_no]->login_ptr != 0) hydra_targets[target_no]->login_ptr++; hydra_targets[target_no]->login_ptr++; hydra_targets[target_no]->pass_ptr = hydra_targets[target_no]->login_ptr; - //hydra_targets[target_no]->pass_ptr++; + // hydra_targets[target_no]->pass_ptr++; while (*hydra_targets[target_no]->pass_ptr != 0) hydra_targets[target_no]->pass_ptr++; hydra_targets[target_no]->pass_ptr++; if (strcmp(hydra_targets[target_no]->login_ptr, hydra_heads[head_no]->current_login_ptr) != 0) hydra_targets[target_no]->pass_state = 0; - if ((hydra_options.try_password_same_as_login && strcmp(hydra_heads[head_no]->current_pass_ptr, hydra_heads[head_no]->current_login_ptr) == 0) - || (hydra_options.try_null_password && strlen(hydra_heads[head_no]->current_pass_ptr) == 0) - || - (hydra_options.try_password_reverse_login - && strcmp(hydra_heads[head_no]->current_pass_ptr, hydra_reverse_login(head_no, hydra_heads[head_no]->current_login_ptr)) == 0)) { + if ((hydra_options.try_password_same_as_login && strcmp(hydra_heads[head_no]->current_pass_ptr, hydra_heads[head_no]->current_login_ptr) == 0) || (hydra_options.try_null_password && strlen(hydra_heads[head_no]->current_pass_ptr) == 0) || (hydra_options.try_password_reverse_login && strcmp(hydra_heads[head_no]->current_pass_ptr, hydra_reverse_login(head_no, hydra_heads[head_no]->current_login_ptr)) == 0)) { hydra_brains.sent++; hydra_targets[target_no]->sent++; if (debug) printf("[DEBUG] double detected (-C)\n"); - return hydra_send_next_pair(target_no, head_no); // little trick to keep the code small + return hydra_send_next_pair(target_no, head_no); // little trick to keep the code small } - } else { // standard -l -L -p -P mode + } else { // standard -l -L -p -P mode hydra_heads[head_no]->current_pass_ptr = hydra_targets[target_no]->pass_ptr; hydra_targets[target_no]->pass_no++; // double check @@ -1692,22 +1721,18 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { hydra_targets[target_no]->pass_ptr++; hydra_targets[target_no]->pass_ptr++; } - if ((hydra_options.try_password_same_as_login && strcmp(hydra_heads[head_no]->current_pass_ptr, hydra_heads[head_no]->current_login_ptr) == 0) - || (hydra_options.try_null_password && strlen(hydra_heads[head_no]->current_pass_ptr) == 0) - || - (hydra_options.try_password_reverse_login - && strcmp(hydra_heads[head_no]->current_pass_ptr, hydra_reverse_login(head_no, hydra_heads[head_no]->current_login_ptr)) == 0)) { + if ((hydra_options.try_password_same_as_login && strcmp(hydra_heads[head_no]->current_pass_ptr, hydra_heads[head_no]->current_login_ptr) == 0) || (hydra_options.try_null_password && strlen(hydra_heads[head_no]->current_pass_ptr) == 0) || (hydra_options.try_password_reverse_login && strcmp(hydra_heads[head_no]->current_pass_ptr, hydra_reverse_login(head_no, hydra_heads[head_no]->current_login_ptr)) == 0)) { hydra_brains.sent++; hydra_targets[target_no]->sent++; if (debug) printf("[DEBUG] double detected (-Pp)\n"); - return hydra_send_next_pair(target_no, head_no); // little trick to keep the code small + return hydra_send_next_pair(target_no, head_no); // little trick to keep the code small } snpdone = 1; } } } - } else { // loop_mode == 1 + } else { // loop_mode == 1 if (hydra_targets[target_no]->pass_no < hydra_brains.countpass) { hydra_heads[head_no]->current_login_ptr = hydra_targets[target_no]->login_ptr; if (hydra_targets[target_no]->pass_state == 0) { @@ -1726,9 +1751,7 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { else hydra_heads[head_no]->current_pass_ptr = hydra_reverse_login(head_no, hydra_heads[head_no]->current_login_ptr); } else { - if (hydra_options.bfg && hydra_targets[target_no]->pass_state == 3 - && hydra_heads[head_no]->current_pass_ptr != NULL && - strlen(hydra_heads[head_no]->current_pass_ptr) > 0 && hydra_heads[head_no]->current_pass_ptr != hydra_heads[head_no]->current_login_ptr) + if (hydra_options.bfg && hydra_targets[target_no]->pass_state == 3 && hydra_heads[head_no]->current_pass_ptr != NULL && strlen(hydra_heads[head_no]->current_pass_ptr) > 0 && hydra_heads[head_no]->current_pass_ptr != hydra_heads[head_no]->current_login_ptr) free(hydra_heads[head_no]->current_pass_ptr); hydra_heads[head_no]->current_pass_ptr = strdup(hydra_targets[target_no]->pass_ptr); } @@ -1759,7 +1782,7 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { if (debug) printf("[DEBUG] bfg new password for next child: %s\n", hydra_targets[target_no]->pass_ptr); #endif - } else { // -p -P mode + } else { // -p -P mode hydra_targets[target_no]->pass_ptr++; while (*hydra_targets[target_no]->pass_ptr != 0) hydra_targets[target_no]->pass_ptr++; @@ -1778,14 +1801,12 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { hydra_targets[target_no]->login_ptr++; } if (hydra_targets[target_no]->pass_state == 3 && snpdont == 0) { - if ((hydra_options.try_null_password && strlen(hydra_heads[head_no]->current_pass_ptr) < 1) - || (hydra_options.try_password_same_as_login && strcmp(hydra_heads[head_no]->current_pass_ptr, hydra_heads[head_no]->current_login_ptr) == 0) - || (hydra_options.try_password_reverse_login && strcmp(hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr) == 0)) { + if ((hydra_options.try_null_password && strlen(hydra_heads[head_no]->current_pass_ptr) < 1) || (hydra_options.try_password_same_as_login && strcmp(hydra_heads[head_no]->current_pass_ptr, hydra_heads[head_no]->current_login_ptr) == 0) || (hydra_options.try_password_reverse_login && strcmp(hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr) == 0)) { hydra_brains.sent++; hydra_targets[target_no]->sent++; if (debug) printf("[DEBUG] double detected (1)\n"); - return hydra_send_next_pair(target_no, head_no); // little trick to keep the code small + return hydra_send_next_pair(target_no, head_no); // little trick to keep the code small } } } @@ -1793,16 +1814,16 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { } if (debug) - printf("[DEBUG] send_next_pair_mid done %d, pass_state %d, clogin %s, cpass %s, tlogin %s, tpass %s, redo %d\n", - snpdone, hydra_targets[target_no]->pass_state, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, hydra_targets[target_no]->login_ptr, - hydra_targets[target_no]->pass_ptr, hydra_targets[target_no]->redo); + printf("[DEBUG] send_next_pair_mid done %d, pass_state %d, clogin %s, " + "cpass %s, tlogin %s, tpass %s, redo %d\n", + snpdone, hydra_targets[target_no]->pass_state, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, hydra_targets[target_no]->login_ptr, hydra_targets[target_no]->pass_ptr, hydra_targets[target_no]->redo); // no pair? then we go for redo state if (!snpdone && hydra_targets[target_no]->redo_state == 0 && hydra_targets[target_no]->redo > 0) { if (debug) printf("[DEBUG] Entering redo_state\n"); hydra_targets[target_no]->redo_state++; - return hydra_send_next_pair(target_no, head_no); // little trick to keep the code small + return hydra_send_next_pair(target_no, head_no); // little trick to keep the code small } } @@ -1813,11 +1834,13 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { hydra_targets[target_no]->done = TARGET_FINISHED; hydra_brains.finished++; if (verbose) - printf("[STATUS] attack finished for %s (waiting for children to complete tests)\n", hydra_targets[target_no]->target); + printf("[STATUS] attack finished for %s (waiting for children to " + "complete tests)\n", + hydra_targets[target_no]->target); } } if (hydra_brains.targets > hydra_brains.finished) - hydra_kill_head(head_no, 1, 0); // otherwise done in main while loop + hydra_kill_head(head_no, 1, 0); // otherwise done in main while loop } else { if (hydra_targets[target_no]->skipcnt > 0) { snpj = 0; @@ -1849,7 +1872,7 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { hydra_targets[target_no]->pass_no = 0; hydra_targets[target_no]->pass_state = 0; } - return hydra_send_next_pair(target_no, head_no); // little trick to keep the code small + return hydra_send_next_pair(target_no, head_no); // little trick to keep the code small } } @@ -1868,22 +1891,22 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { hydra_brains.sent++; hydra_targets[target_no]->sent++; } else if (debug) - printf("[DEBUG] send_next_pair_redo done %d, pass_state %d, clogin %s, cpass %s, tlogin %s, tpass %s, is_redo %d\n", - snpdone, hydra_targets[target_no]->pass_state, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, hydra_targets[target_no]->login_ptr, - hydra_targets[target_no]->pass_ptr, snp_is_redo); - //hydra_dump_data(snpbuf, snpbuflen, "SENT"); + printf("[DEBUG] send_next_pair_redo done %d, pass_state %d, clogin %s, " + "cpass %s, tlogin %s, tpass %s, is_redo %d\n", + snpdone, hydra_targets[target_no]->pass_state, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, hydra_targets[target_no]->login_ptr, hydra_targets[target_no]->pass_ptr, snp_is_redo); + // hydra_dump_data(snpbuf, snpbuflen, "SENT"); fck = write(hydra_heads[head_no]->sp[0], snpbuf, snpbuflen); if (fck < snpbuflen) { if (verbose) fprintf(stderr, "[ERROR] can not write to child %d, restarting it ...\n", head_no); hydra_increase_fail_count(target_no, head_no); loop_cnt = 0; - return 0; // not prevent disabling it, if its needed its already done in the above line + return 0; // not prevent disabling it, if its needed its already done in + // the above line } if (debug || hydra_options.showAttempt) { - printf("[%sATTEMPT] target %s - login \"%s\" - pass \"%s\" - %" hPRIu64 " of %" hPRIu64 " [child %d] (%d/%d)\n", - hydra_targets[target_no]->redo_state ? "REDO-" : snp_is_redo ? "RE-" : "", hydra_targets[target_no]->target, hydra_heads[head_no]->current_login_ptr, - hydra_heads[head_no]->current_pass_ptr, hydra_targets[target_no]->sent, hydra_brains.todo + hydra_targets[target_no]->redo, head_no, hydra_targets[target_no]->redo_state ? hydra_targets[target_no]->redo_state - 1 : 0, hydra_targets[target_no]->redo); + printf("[%sATTEMPT] target %s - login \"%s\" - pass \"%s\" - %" hPRIu64 " of %" hPRIu64 " [child %d] (%d/%d)\n", hydra_targets[target_no]->redo_state ? "REDO-" : snp_is_redo ? "RE-" : "", hydra_targets[target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, hydra_targets[target_no]->sent, hydra_brains.todo + hydra_targets[target_no]->redo, head_no, hydra_targets[target_no]->redo_state ? hydra_targets[target_no]->redo_state - 1 : 0, + hydra_targets[target_no]->redo); } loop_cnt = 0; return 0; @@ -1949,7 +1972,8 @@ int32_t hydra_check_for_exit_condition() { if (hydra_heads[i]->active >= HEAD_UNUSED) k = 1; if (k == 0) { - fprintf(stderr, "[ERROR] all children were disabled due too many connection errors\n"); + fprintf(stderr, "[ERROR] all children were disabled due too many " + "connection errors\n"); return -1; } } @@ -1974,7 +1998,7 @@ void process_proxy_line(int32_t type, char *string) { struct addrinfo hints, *res, *p; struct sockaddr_in6 *ipv6 = NULL; struct sockaddr_in *ipv4 = NULL; - + if (string == NULL || string[0] == 0 || string[0] == '#') return; while (*string == ' ' || *string == '\t') @@ -2002,7 +2026,10 @@ void process_proxy_line(int32_t type, char *string) { *sep = 0; target_string = sep + 1; if (index(auth_string, ':') == NULL) { - fprintf(stderr, "[WARNING] %s has an invalid authentication definition %s, must be in the format login:pass, entry ignored\n", target_string, auth_string); + fprintf(stderr, + "[WARNING] %s has an invalid authentication definition %s, must " + "be in the format login:pass, entry ignored\n", + target_string, auth_string); return; } } @@ -2021,19 +2048,28 @@ void process_proxy_line(int32_t type, char *string) { return; } } else { - fprintf(stderr, "[WARNING] %s has not port definition which is required, entry ignored\n", target_string); + fprintf(stderr, + "[WARNING] %s has not port definition which is required, entry " + "ignored\n", + target_string); return; } if (use_proxy == 1 && strcmp(type_string, "http") != 0) { - fprintf(stderr, "[WARNING] %s:// is an invalid type, must be http:// if you use HYDRA_PROXY_HTTP, entry ignored\n", type_string); + fprintf(stderr, + "[WARNING] %s:// is an invalid type, must be http:// if you use " + "HYDRA_PROXY_HTTP, entry ignored\n", + type_string); return; } if (use_proxy == 2 && strcmp(type_string, "connect") != 0 && strcmp(type_string, "socks4") != 0 && strcmp(type_string, "socks5") != 0) { - fprintf(stderr, "[WARNING] %s:// is an invalid type, must be connect://, socks4:// or socks5:// if you use HYDRA_PROXY, entry ignored\n", type_string); + fprintf(stderr, + "[WARNING] %s:// is an invalid type, must be connect://, socks4:// " + "or socks5:// if you use HYDRA_PROXY, entry ignored\n", + type_string); return; } - + memset(&hints, 0, sizeof hints); if (getaddrinfo(target_string, NULL, &hints, &res) != 0) { fprintf(stderr, "[ERROR] could not resolve proxy target %s, entry ignored\n", target_string); @@ -2043,13 +2079,13 @@ void process_proxy_line(int32_t type, char *string) { for (p = res; p != NULL; p = p->ai_next) { #ifdef AF_INET6 if (p->ai_family == AF_INET6) { - if (ipv6 == NULL || memcmp((char *) &ipv6->sin6_addr, fe80, 2) == 0) - ipv6 = (struct sockaddr_in6 *) p->ai_addr; + if (ipv6 == NULL || memcmp((char *)&ipv6->sin6_addr, fe80, 2) == 0) + ipv6 = (struct sockaddr_in6 *)p->ai_addr; } else #endif - if (p->ai_family == AF_INET) { + if (p->ai_family == AF_INET) { if (ipv4 == NULL) - ipv4 = (struct sockaddr_in *) p->ai_addr; + ipv4 = (struct sockaddr_in *)p->ai_addr; } } freeaddrinfo(res); @@ -2058,18 +2094,22 @@ void process_proxy_line(int32_t type, char *string) { #ifdef AF_INET6 if (ipv6 != NULL && (ipv4 == NULL || prefer_ipv6)) { if (memcmp(proxy_string_ip[proxy_count] + 1, fe80, 2) == 0 && device_string == NULL) { - fprintf(stderr, "[WARNING] The proxy address %s is a link local address, link local addresses require the interface being defined like this: fe80::1%%eth0, entry ignored\n", target_string); + fprintf(stderr, + "[WARNING] The proxy address %s is a link local address, link " + "local addresses require the interface being defined like this: " + "fe80::1%%eth0, entry ignored\n", + target_string); return; } proxy_string_ip[proxy_count][0] = 16; - memcpy(proxy_string_ip[proxy_count] + 1, (char *) &ipv6->sin6_addr, 16); + memcpy(proxy_string_ip[proxy_count] + 1, (char *)&ipv6->sin6_addr, 16); if (device_string != NULL && strlen(device_string) <= 16) strcpy(proxy_string_ip[proxy_count] + 17, device_string); } else #endif - if (ipv4 != NULL) { + if (ipv4 != NULL) { proxy_string_ip[proxy_count][0] = 4; - memcpy(proxy_string_ip[proxy_count] + 1, (char *) &ipv4->sin_addr, 4); + memcpy(proxy_string_ip[proxy_count] + 1, (char *)&ipv4->sin_addr, 4); } else { fprintf(stderr, "[WARNING] Could not resolve proxy address: %s, entry ignored\n", target_string); return; @@ -2081,12 +2121,12 @@ void process_proxy_line(int32_t type, char *string) { } strcpy(proxy_authentication[proxy_count], auth_string); if (strncmp(type_string, "socks", 5) != 0) // so it is web - hydra_tobase64((unsigned char *) proxy_authentication[proxy_count], strlen(proxy_authentication[proxy_count]), strlen(auth_string) * 2 + 8); + hydra_tobase64((unsigned char *)proxy_authentication[proxy_count], strlen(proxy_authentication[proxy_count]), strlen(auth_string) * 2 + 8); } else proxy_authentication[proxy_count] = NULL; strcpy(proxy_string_type[proxy_count], type_string); proxy_string_port[proxy_count] = port; - + if (debug) printf("[DEBUG] count %d type %s target %s port %d auth %s\n", proxy_count, proxy_string_type[proxy_count], target_string, proxy_string_port[proxy_count], proxy_authentication[proxy_count]); proxy_count++; @@ -2110,7 +2150,9 @@ int main(int argc, char *argv[]) { struct sockaddr_in6 *ipv6 = NULL; struct sockaddr_in *ipv4 = NULL; - printf("%s %s (c) 2020 by %s & %s - Please do not use in military or secret service organizations, or for illegal purposes.\n\n", PROGRAM, VERSION, AUTHOR, AUTHOR2); + printf("%s %s (c) 2020 by %s & %s - Please do not use in military or secret " + "service organizations, or for illegal purposes.\n\n", + PROGRAM, VERSION, AUTHOR, AUTHOR2); #ifndef LIBAFP SERVICES = hydra_string_replace(SERVICES, "afp ", ""); strcat(unsupported, "afp "); @@ -2210,8 +2252,8 @@ int main(int argc, char *argv[]) { strcat(unsupported, "regex support "); #endif - (void) setvbuf(stdout, NULL, _IONBF, 0); - (void) setvbuf(stderr, NULL, _IONBF, 0); + (void)setvbuf(stdout, NULL, _IONBF, 0); + (void)setvbuf(stderr, NULL, _IONBF, 0); // set defaults memset(&hydra_options, 0, sizeof(hydra_options)); memset(&hydra_brains, 0, sizeof(hydra_brains)); @@ -2298,7 +2340,10 @@ int main(int argc, char *argv[]) { hydra_options.mode = hydra_options.mode | MODE_PASSWORD_SAME; break; default: - fprintf(stderr, "[ERROR] unknown mode %c for option -e, only supporting \"n\", \"s\" and \"r\"\n", optarg[i]); + fprintf(stderr, + "[ERROR] unknown mode %c for option -e, only supporting " + "\"n\", \"s\" and \"r\"\n", + optarg[i]); exit(-1); } i++; @@ -2336,12 +2381,12 @@ int main(int argc, char *argv[]) { break; case 'b': outfile_format_tmp = optarg; - if (strcasecmp(outfile_format_tmp,"text") == 0) - hydra_options.outfile_format = FORMAT_PLAIN_TEXT; - else if (strcasecmp(outfile_format_tmp,"json") == 0) // latest json formatting. - hydra_options.outfile_format = FORMAT_JSONV1; - else if (strcasecmp(outfile_format_tmp,"jsonv1") == 0) - hydra_options.outfile_format = FORMAT_JSONV1; + if (strcasecmp(outfile_format_tmp, "text") == 0) + hydra_options.outfile_format = FORMAT_PLAIN_TEXT; + else if (strcasecmp(outfile_format_tmp, "json") == 0) // latest json formatting. + hydra_options.outfile_format = FORMAT_JSONV1; + else if (strcasecmp(outfile_format_tmp, "jsonv1") == 0) + hydra_options.outfile_format = FORMAT_JSONV1; else { fprintf(stderr, "[ERROR] Output file format must be (text, json, jsonv1)\n"); exit(-1); @@ -2364,7 +2409,8 @@ int main(int argc, char *argv[]) { fprintf(stderr, "[ERROR] waittime must be larger than 0\n"); exit(-1); } else if (waittime < 5) - fprintf(stderr, "[WARNING] the waittime you set is low, this can result in errornous results\n"); + fprintf(stderr, "[WARNING] the waittime you set is low, this can " + "result in errornous results\n"); break; case 'W': hydra_options.conwait = conwait = atoi(optarg); @@ -2378,14 +2424,16 @@ int main(int argc, char *argv[]) { if (hydra_options.time_next_attempt < 0) { fprintf(stderr, "[ERROR] -c option value can not be negative\n"); exit(-1); - } + } #else - fprintf(stderr, "[WARNING] -c option can not be used as your operating system is missing the MSG_PEEK feature\n"); + fprintf(stderr, "[WARNING] -c option can not be used as your operating " + "system is missing the MSG_PEEK feature\n"); #endif break; case 'S': #ifndef LIBOPENSSL - fprintf(stderr, "[WARNING] hydra was compiled without SSL support. Install openssl and recompile! Option ignored...\n"); + fprintf(stderr, "[WARNING] hydra was compiled without SSL support. " + "Install openssl and recompile! Option ignored...\n"); hydra_options.ssl = 0; break; #else @@ -2403,7 +2451,8 @@ int main(int argc, char *argv[]) { break; case 'x': #ifndef HAVE_MATH_H - fprintf(stderr, "[ERROR] -x option is not available as math.h was not found at compile time\n"); + fprintf(stderr, "[ERROR] -x option is not available as math.h was not " + "found at compile time\n"); exit(-1); #else if (strcmp(optarg, "-h") == 0) @@ -2427,12 +2476,12 @@ int main(int argc, char *argv[]) { hydra_options.tasks = 1; } - //check if output is redirected from the shell or in a file + // check if output is redirected from the shell or in a file if (colored_output && !isatty(fileno(stdout))) colored_output = 0; #ifdef LIBNCURSES - //then check if the term is color enabled using ncurses lib + // then check if the term is color enabled using ncurses lib if (colored_output) { if (!setupterm(NULL, 1, NULL) && (tigetnum("colors") <= 0)) { colored_output = 0; @@ -2442,8 +2491,8 @@ int main(int argc, char *argv[]) { } } #else - //don't want border line effect so disabling color output - //if we are not sure about the term + // don't want border line effect so disabling color output + // if we are not sure about the term colored_output = 0; #endif @@ -2452,7 +2501,7 @@ int main(int argc, char *argv[]) { if (hydra_options.restore && argc > 2 + debug + verbose) fprintf(stderr, "[WARNING] options after -R are now honored (since v8.6)\n"); -// bail("no option may be supplied together with -R"); + // bail("no option may be supplied together with -R"); printf("%s (%s) starting at %s\n", PROGRAM, RESOURCE, hydra_build_time()); if (debug) { @@ -2462,41 +2511,49 @@ int main(int argc, char *argv[]) { printf("\n"); } if (hydra_options.tasks > 1 && hydra_options.time_next_attempt) - fprintf(stderr, "[WARNING] when using the -c option, you should also set the task per target to one (-t 1)\n"); + fprintf(stderr, "[WARNING] when using the -c option, you should also set " + "the task per target to one (-t 1)\n"); if (hydra_options.login != NULL && hydra_options.loginfile != NULL) bail("You can only use -L OR -l, not both\n"); if (hydra_options.pass != NULL && hydra_options.passfile != NULL) bail("You can only use -P OR -p, not both\n"); if (hydra_options.outfile_format != FORMAT_PLAIN_TEXT && hydra_options.outfile_ptr == NULL) - fprintf(stderr, "[WARNING] output file format specified (-b) - but no output file (-o)\n"); - + fprintf(stderr, "[WARNING] output file format specified (-b) - but no " + "output file (-o)\n"); + if (hydra_options.restore) { -// hydra_restore_read(); + // hydra_restore_read(); // stuff we have to copy from the non-restore part if (strncmp(hydra_options.service, "http-", 5) == 0) { if (getenv("HYDRA_PROXY_HTTP") && getenv("HYDRA_PROXY")) - bail("Found HYDRA_PROXY_HTTP *and* HYDRA_PROXY environment variables - you can use only ONE for the service http-head/http-get/http-post!"); + bail("Found HYDRA_PROXY_HTTP *and* HYDRA_PROXY environment variables - " + "you can use only ONE for the service " + "http-head/http-get/http-post!"); if (getenv("HYDRA_PROXY_HTTP")) { printf("[INFO] Using HTTP Proxy: %s\n", getenv("HYDRA_PROXY_HTTP")); use_proxy = 1; } } - } else { // normal mode, aka non-restore mode + } else { // normal mode, aka non-restore mode if (hydra_options.colonfile) - hydra_options.loop_mode = 0; // just to be sure + hydra_options.loop_mode = 0; // just to be sure if (hydra_options.infile_ptr != NULL) { if (optind + 2 < argc) - bail("The -M FILE option can not be used together with a host on the commandline"); + bail("The -M FILE option can not be used together with a host on the " + "commandline"); if (optind + 1 > argc) bail("You need to define a service to attack"); if (optind + 2 == argc) - fprintf(stderr, "[WARNING] With the -M FILE option you can not specify a server on the commandline. Lets hope you did everything right!\n"); + fprintf(stderr, "[WARNING] With the -M FILE option you can not specify a server on " + "the commandline. Lets hope you did everything right!\n"); hydra_options.server = NULL; hydra_options.service = argv[optind]; if (optind + 2 == argc) hydra_options.miscptr = argv[optind + 1]; } else if (optind + 2 != argc && optind + 3 != argc && optind < argc) { - // check if targetdef follow syntax ://[:][/] or it's a syntax error + // check if targetdef follow syntax + // ://[:][/] or it's a + // syntax error char *targetdef = strdup(argv[optind]); char *service_pos, *target_pos, *port_pos = NULL, *param_pos = NULL; cmdlinetarget = argv[optind]; @@ -2531,7 +2588,8 @@ int main(int argc, char *argv[]) { *param_pos++ = 0; if (port_pos != NULL && index(port_pos, ':') != NULL) { if (prefer_ipv6) - bail("Illegal IPv6 target definition must be written within '[' ']'"); + bail("Illegal IPv6 target definition must be written within '[' " + "']'"); else bail("Illegal port definition"); } @@ -2547,12 +2605,13 @@ int main(int argc, char *argv[]) { *--param_pos = '/'; hydra_options.miscptr = strdup(param_pos); } - //printf("target: %s service: %s port: %s opt: %s\n", target_pos, hydra_options.service, port_pos, param_pos); + // printf("target: %s service: %s port: %s opt: %s\n", target_pos, + // hydra_options.service, port_pos, param_pos); if (debug) printf("[DEBUG] opt:%d argc:%d mod:%s tgt:%s port:%u misc:%s\n", optind, argc, hydra_options.service, hydra_options.server, hydra_options.port, hydra_options.miscptr); } else { - hydra_options.server = NULL; - hydra_options.service = NULL; + hydra_options.server = NULL; + hydra_options.service = NULL; if (modusage) { hydra_options.service = targetdef; @@ -2561,12 +2620,16 @@ int main(int argc, char *argv[]) { } } else { if (modusage && argv[optind] == NULL) { - printf("[ERROR] you must supply a service name after the -U help switch\n"); + printf("[ERROR] you must supply a service name after the -U help " + "switch\n"); exit(-1); } if (argv[optind] == NULL || strstr(argv[optind], "://") != NULL) { printf("[ERROR] Invalid target definition!\n"); - printf("[ERROR] Either you use \"www.example.com module [optional-module-parameters]\" *or* you use the \"module://www.example.com/optional-module-parameters\" syntax!\n"); + printf("[ERROR] Either you use \"www.example.com module " + "[optional-module-parameters]\" *or* you use the " + "\"module://www.example.com/optional-module-parameters\" " + "syntax!\n"); exit(-1); } hydra_options.server = argv[optind]; @@ -2577,31 +2640,30 @@ int main(int argc, char *argv[]) { } if (getenv("HYDRA_PROXY_CONNECT")) - fprintf(stderr, "[WARNING] The environment variable HYDRA_PROXY_CONNECT is not used! Use HYDRA_PROXY instead!\n"); + fprintf(stderr, "[WARNING] The environment variable HYDRA_PROXY_CONNECT " + "is not used! Use HYDRA_PROXY instead!\n"); // wrong option use patch - if (hydra_options.ssl && ( ((strcmp(hydra_options.service, "smtp") == 0 || strcmp(hydra_options.service, "smtp-enum") == 0) && hydra_options.port != 465) || \ - (strcmp(hydra_options.service, "pop3") == 0 && hydra_options.port != 995) || \ - (strcmp(hydra_options.service, "imap") == 0 && hydra_options.port != 993) - )) - fprintf(stderr, "[WARNING] you want to access SMTP/POP3/IMAP with SSL. Are you sure you want to use direct SSL (-S) instead of STARTTLS (-m TLS)?\n"); + if (hydra_options.ssl && (((strcmp(hydra_options.service, "smtp") == 0 || strcmp(hydra_options.service, "smtp-enum") == 0) && hydra_options.port != 465) || (strcmp(hydra_options.service, "pop3") == 0 && hydra_options.port != 995) || (strcmp(hydra_options.service, "imap") == 0 && hydra_options.port != 993))) + fprintf(stderr, "[WARNING] you want to access SMTP/POP3/IMAP with SSL. Are you sure " + "you want to use direct SSL (-S) instead of STARTTLS (-m TLS)?\n"); if (strcmp(hydra_options.service, "http") == 0 || strcmp(hydra_options.service, "https") == 0) { - fprintf(stderr, "[ERROR] There is no service \"%s\", most likely you mean one of the many web modules, e.g. http-get or http-form-post. Read it up!\n", hydra_options.service); + fprintf(stderr, + "[ERROR] There is no service \"%s\", most likely you mean one of the " + "many web modules, e.g. http-get or http-form-post. Read it up!\n", + hydra_options.service); exit(-1); } - if (strcmp(hydra_options.service, "pop3s") == 0 || strcmp(hydra_options.service, "smtps") == 0 || strcmp(hydra_options.service, "imaps") == 0 - || strcmp(hydra_options.service, "telnets") == 0 || (strncmp(hydra_options.service, "ldap", 4) == 0 && hydra_options.service[strlen(hydra_options.service) - 1] == 's')) { + if (strcmp(hydra_options.service, "pop3s") == 0 || strcmp(hydra_options.service, "smtps") == 0 || strcmp(hydra_options.service, "imaps") == 0 || strcmp(hydra_options.service, "telnets") == 0 || (strncmp(hydra_options.service, "ldap", 4) == 0 && hydra_options.service[strlen(hydra_options.service) - 1] == 's')) { hydra_options.ssl = 1; hydra_options.service[strlen(hydra_options.service) - 1] = 0; } if (getenv("HYDRA_PROXY_HTTP") || getenv("HYDRA_PROXY")) { - if (strcmp(hydra_options.service, "afp") == 0 || strcmp(hydra_options.service, "firebird") == 0 || strncmp(hydra_options.service, "mysql", 5) == 0 || - strcmp(hydra_options.service, "ncp") == 0 || strcmp(hydra_options.service, "oracle") == 0 || strcmp(hydra_options.service, "postgres") == 0 || - strncmp(hydra_options.service, "ssh", 3) == 0 || strcmp(hydra_options.service, "sshkey") == 0 || strcmp(hydra_options.service, "svn") == 0 || - strcmp(hydra_options.service, "sapr3") == 0 || strcmp(hydra_options.service, "memcached") == 0 || strcmp(hydra_options.service, "mongodb") == 0) { + if (strcmp(hydra_options.service, "afp") == 0 || strcmp(hydra_options.service, "firebird") == 0 || strncmp(hydra_options.service, "mysql", 5) == 0 || strcmp(hydra_options.service, "ncp") == 0 || strcmp(hydra_options.service, "oracle") == 0 || strcmp(hydra_options.service, "postgres") == 0 || strncmp(hydra_options.service, "ssh", 3) == 0 || strcmp(hydra_options.service, "sshkey") == 0 || strcmp(hydra_options.service, "svn") == 0 || strcmp(hydra_options.service, "sapr3") == 0 || + strcmp(hydra_options.service, "memcached") == 0 || strcmp(hydra_options.service, "mongodb") == 0) { fprintf(stderr, "[WARNING] module %s does not support HYDRA_PROXY* !\n", hydra_options.service); proxy_string = NULL; } @@ -2609,9 +2671,9 @@ int main(int argc, char *argv[]) { /* here start the services */ - if (strcmp(hydra_options.service, "ssl") == 0 || strcmp(hydra_options.service, "www") == 0 || strcmp(hydra_options.service, "http") == 0 - || strcmp(hydra_options.service, "https") == 0) { - fprintf(stderr, "[WARNING] The service http has been replaced with http-head and http-get, using by default GET method. Same for https.\n"); + if (strcmp(hydra_options.service, "ssl") == 0 || strcmp(hydra_options.service, "www") == 0 || strcmp(hydra_options.service, "http") == 0 || strcmp(hydra_options.service, "https") == 0) { + fprintf(stderr, "[WARNING] The service http has been replaced with http-head and " + "http-get, using by default GET method. Same for https.\n"); if (strcmp(hydra_options.service, "http") == 0) { hydra_options.service = malloc(strlen("http-get") + 1); strcpy(hydra_options.service, "http-get"); @@ -2633,7 +2695,8 @@ int main(int argc, char *argv[]) { if (modusage == 1) { if (hydra_options.service == NULL) { - printf("[ERROR] you must supply a service name after the -U help switch\n"); + printf("[ERROR] you must supply a service name after the -U help " + "switch\n"); exit(-1); } module_usage(); @@ -2641,21 +2704,25 @@ int main(int argc, char *argv[]) { i = 0; if (strcmp(hydra_options.service, "telnet") == 0) { - fprintf(stderr, "[WARNING] telnet is by its nature unreliable to analyze, if possible better choose FTP, SSH, etc. if available\n"); + fprintf(stderr, "[WARNING] telnet is by its nature unreliable to analyze, if " + "possible better choose FTP, SSH, etc. if available\n"); i = 1; } if (strcmp(hydra_options.service, "ftp") == 0) i = 1; if (strcmp(hydra_options.service, "ftps") == 0) { - fprintf(stderr, "[WARNING] you enabled ftp-SSL (auth tls) mode. If you want to use direct SSL ftp, use -S and the ftp module instead.\n"); + fprintf(stderr, "[WARNING] you enabled ftp-SSL (auth tls) mode. If you want to " + "use direct SSL ftp, use -S and the ftp module instead.\n"); i = 1; } if (strcmp(hydra_options.service, "pop3") == 0) { - fprintf(stderr, "[INFO] several providers have implemented cracking protection, check with a small wordlist first - and stay legal!\n"); + fprintf(stderr, "[INFO] several providers have implemented cracking protection, " + "check with a small wordlist first - and stay legal!\n"); i = 1; } if (strcmp(hydra_options.service, "imap") == 0) { - fprintf(stderr, "[INFO] several providers have implemented cracking protection, check with a small wordlist first - and stay legal!\n"); + fprintf(stderr, "[INFO] several providers have implemented cracking protection, " + "check with a small wordlist first - and stay legal!\n"); i = 1; } if (strcmp(hydra_options.service, "redis") == 0) @@ -2675,7 +2742,9 @@ int main(int argc, char *argv[]) { if (strcmp(hydra_options.service, "socks5") == 0) i = 1; if (strcmp(hydra_options.service, "icq") == 0) { - fprintf(stderr, "[WARNING] The icq module is not working with the modern protocol version! (somebody else will need to fix this as I don't care for icq)\n"); + fprintf(stderr, "[WARNING] The icq module is not working with the modern " + "protocol version! (somebody else will need to fix this " + "as I don't care for icq)\n"); i = 1; } if (strcmp(hydra_options.service, "memcached") == 0) @@ -2687,7 +2756,7 @@ int main(int argc, char *argv[]) { if (strcmp(hydra_options.service, "mongodb") == 0) #ifdef LIBMONGODB - { + { i = 1; if (hydra_options.miscptr == NULL || (strlen(hydra_options.miscptr) == 0)) fprintf(stderr, "[INFO] The mongodb db wasn't passed so using admin by default\n"); @@ -2699,7 +2768,8 @@ int main(int argc, char *argv[]) { if (strcmp(hydra_options.service, "mysql") == 0) { i = 1; if (hydra_options.tasks > 4) { - fprintf(stderr, "[INFO] Reduced number of tasks to 4 (mysql does not like many parallel connections)\n"); + fprintf(stderr, "[INFO] Reduced number of tasks to 4 (mysql does not " + "like many parallel connections)\n"); hydra_options.tasks = 4; } } @@ -2763,18 +2833,21 @@ int main(int argc, char *argv[]) { if (strcmp(hydra_options.service, "cvs") == 0) { i = 1; if (hydra_options.miscptr == NULL || (strlen(hydra_options.miscptr) == 0)) { - fprintf(stderr, "[INFO] The CVS repository path wasn't passed so using /root by default\n"); + fprintf(stderr, "[INFO] The CVS repository path wasn't passed so using " + "/root by default\n"); } } if (strcmp(hydra_options.service, "svn") == 0) { i = 1; if (hydra_options.miscptr == NULL || (strlen(hydra_options.miscptr) == 0)) { - fprintf(stderr, "[INFO] The SVN repository path wasn't passed so using /trunk by default\n"); + fprintf(stderr, "[INFO] The SVN repository path wasn't passed so using " + "/trunk by default\n"); } } if (strcmp(hydra_options.service, "ssh") == 0 || strcmp(hydra_options.service, "sshkey") == 0) { if (hydra_options.tasks > 8) - fprintf(stderr, "[WARNING] Many SSH configurations limit the number of parallel tasks, it is recommended to reduce the tasks: use -t 4\n"); + fprintf(stderr, "[WARNING] Many SSH configurations limit the number of parallel " + "tasks, it is recommended to reduce the tasks: use -t 4\n"); #ifdef LIBSSH i = 1; #else @@ -2782,7 +2855,8 @@ int main(int argc, char *argv[]) { #endif } if (strcmp(hydra_options.service, "smtp") == 0) { - fprintf(stderr, "[INFO] several providers have implemented cracking protection, check with a small wordlist first - and stay legal!\n"); + fprintf(stderr, "[INFO] several providers have implemented cracking protection, " + "check with a small wordlist first - and stay legal!\n"); i = 1; } if (strcmp(hydra_options.service, "smtp-enum") == 0) @@ -2791,25 +2865,26 @@ int main(int argc, char *argv[]) { i = 1; if ((strcmp(hydra_options.service, "smb") == 0) || (strcmp(hydra_options.service, "smbnt") == 0)) { if (hydra_options.tasks > 1) { - fprintf(stderr, "[INFO] Reduced number of tasks to 1 (smb does not like parallel connections)\n"); + fprintf(stderr, "[INFO] Reduced number of tasks to 1 (smb does not " + "like parallel connections)\n"); hydra_options.tasks = 1; } if (hydra_options.login != NULL && (index(hydra_options.login, '\\') != NULL || index(hydra_options.login, '/') != NULL)) - fprintf(stderr, "[WARNING] potential windows domain specification found in login. You must use the -m option to pass a domain.\n"); + fprintf(stderr, "[WARNING] potential windows domain specification found in " + "login. You must use the -m option to pass a domain.\n"); i = 1; } if ((strcmp(hydra_options.service, "smb") == 0) || (strcmp(hydra_options.service, "smbnt") == 0)) { #ifdef LIBOPENSSL if (hydra_options.tasks > 1) { - fprintf(stderr, "[INFO] Reduced number of tasks to 1 (smb does not like parallel connections)\n"); + fprintf(stderr, "[INFO] Reduced number of tasks to 1 (smb does not " + "like parallel connections)\n"); hydra_options.tasks = 1; } i = 1; #endif } - if ((strcmp(hydra_options.service, "smb") == 0) || (strcmp(hydra_options.service, "smbnt") == 0) || - (strcmp(hydra_options.service, "sip") == 0) || - (strcmp(hydra_options.service, "oracle-listener") == 0) || (strcmp(hydra_options.service, "oracle-sid") == 0)) { + if ((strcmp(hydra_options.service, "smb") == 0) || (strcmp(hydra_options.service, "smbnt") == 0) || (strcmp(hydra_options.service, "sip") == 0) || (strcmp(hydra_options.service, "oracle-listener") == 0) || (strcmp(hydra_options.service, "oracle-sid") == 0)) { #ifndef LIBOPENSSL bail("Compiled without OPENSSL support, module not available!"); #endif @@ -2818,22 +2893,17 @@ int main(int argc, char *argv[]) { #if !defined(LIBSMBCLIENT) bail("Compiled without LIBSMBCLIENT support, module not available!"); #else - if (hydra_options.login != NULL && - (index(hydra_options.login, '\\') != NULL || - index(hydra_options.login, '/') != NULL)) - fprintf(stderr, - "[WARNING] potential windows domain specification found in " - "login. You must use the -m option to pass a domain.\n"); - if (hydra_options.miscptr == NULL || \ - (strlen(hydra_options.miscptr) == 0)) { - fprintf(stderr, - "[WARNING] Workgroup was not specified, using \"WORKGROUP\"\n"); + if (hydra_options.login != NULL && (index(hydra_options.login, '\\') != NULL || index(hydra_options.login, '/') != NULL)) + fprintf(stderr, "[WARNING] potential windows domain specification found in " + "login. You must use the -m option to pass a domain.\n"); + if (hydra_options.miscptr == NULL || (strlen(hydra_options.miscptr) == 0)) { + fprintf(stderr, "[WARNING] Workgroup was not specified, using \"WORKGROUP\"\n"); } i = 1; #endif } - if (strcmp(hydra_options.service, "rdp") == 0){ + if (strcmp(hydra_options.service, "rdp") == 0) { #ifndef LIBFREERDP2 bail("Compiled without FREERDP2 support, module not available!"); #endif @@ -2841,17 +2911,21 @@ int main(int argc, char *argv[]) { if (strcmp(hydra_options.service, "pcnfs") == 0) { i = 1; if (port == 0) - bail("You must set the port for pcnfs with -s (run \"rpcinfo -p %s\" and look for the pcnfs v2 UDP port)"); + bail("You must set the port for pcnfs with -s (run \"rpcinfo -p %s\" " + "and look for the pcnfs v2 UDP port)"); } if (strcmp(hydra_options.service, "sapr3") == 0) { #ifdef LIBSAPR3 i = 1; if (port == PORT_SAPR3) - bail("You must set the port for sapr3 with -s , it should lie between 3200 and 3699."); + bail("You must set the port for sapr3 with -s , it should lie " + "between 3200 and 3699."); if (port < 3200 || port > 3699) - fprintf(stderr, "[WARNING] The port is not in the range 3200 to 3399 - please ensure it is ok!\n"); + fprintf(stderr, "[WARNING] The port is not in the range 3200 to 3399 - " + "please ensure it is ok!\n"); if (hydra_options.miscptr == NULL || atoi(hydra_options.miscptr) < 0 || atoi(hydra_options.miscptr) > 999 || !isdigit(hydra_options.miscptr[0])) - bail("You must set the client ID (0-999) as an additional option or via -m"); + bail("You must set the client ID (0-999) as an additional option or " + "via -m"); #else bail("Compiled without LIBSAPR3 support, module not available!"); #endif @@ -2859,13 +2933,17 @@ int main(int argc, char *argv[]) { if (strcmp(hydra_options.service, "cisco") == 0) { i = 2; if (hydra_options.tasks > 4) - fprintf(stderr, "[WARNING] you should set the number of parallel task to 4 for cisco services.\n"); + fprintf(stderr, "[WARNING] you should set the number of parallel task " + "to 4 for cisco services.\n"); } if (strcmp(hydra_options.service, "adam6500") == 0) { i = 2; - fprintf(stderr, "[WARNING] the module adam6500 is work in progress! please submit a pcap of a successful login as well as false positives to vh@thc.org\n"); + fprintf(stderr, "[WARNING] the module adam6500 is work in progress! " + "please submit a pcap of a successful login as well as " + "false positives to vh@thc.org\n"); if (hydra_options.tasks > 1) - fprintf(stderr, "[WARNING] reset the number of parallel task to 1 for adam6500 modbus authentication\n"); + fprintf(stderr, "[WARNING] reset the number of parallel task to 1 for " + "adam6500 modbus authentication\n"); hydra_options.tasks = 1; } if (strncmp(hydra_options.service, "snmpv", 5) == 0) { @@ -2923,30 +3001,37 @@ int main(int argc, char *argv[]) { } i = 2; if ((j & 3) < 3 && j > 2) - fprintf(stderr, "[WARNING] SNMPv1 and SNMPv2 do not support hash and encryption, ignored\n"); + fprintf(stderr, "[WARNING] SNMPv1 and SNMPv2 do not support hash and " + "encryption, ignored\n"); if ((j & 3) == 3) { - fprintf(stderr, "[WARNING] SNMPv3 is still in beta state, use at own risk and report problems\n"); + fprintf(stderr, "[WARNING] SNMPv3 is still in beta state, use at own " + "risk and report problems\n"); if (j >= 16) - bail("The SNMPv3 module so far only support authentication (md5/sha), not yet encryption\n"); - if (hydra_options.colonfile == NULL - && ((hydra_options.login == NULL && hydra_options.loginfile == NULL) || (hydra_options.pass == NULL && hydra_options.passfile == NULL && hydra_options.bfg == 0))) { + bail("The SNMPv3 module so far only support authentication " + "(md5/sha), not yet encryption\n"); + if (hydra_options.colonfile == NULL && ((hydra_options.login == NULL && hydra_options.loginfile == NULL) || (hydra_options.pass == NULL && hydra_options.passfile == NULL && hydra_options.bfg == 0))) { if (j > 3) { - fprintf(stderr, "[ERROR] you specified SNMPv3, defined hashing/encryption but only gave one of login or password list. Either supply both logins and passwords (this is what is usually used in SNMPv3), or remove the hashing/encryption option (unusual)\n"); + fprintf(stderr, "[ERROR] you specified SNMPv3, defined hashing/encryption but " + "only gave one of login or password list. Either supply both " + "logins and passwords (this is what is usually used in " + "SNMPv3), or remove the hashing/encryption option (unusual)\n"); exit(-1); } - fprintf(stderr, "[WARNING] you specified SNMPv3 but gave no logins, NoAuthNoPriv is assumed. This is an unusual case, you should know what you are doing\n"); + fprintf(stderr, "[WARNING] you specified SNMPv3 but gave no logins, " + "NoAuthNoPriv is assumed. This is an unusual case, " + "you should know what you are doing\n"); tmpptr = malloc(strlen(hydra_options.miscptr) + 8); strcpy(tmpptr, hydra_options.miscptr); strcat(tmpptr, ":"); strcat(tmpptr, "PLAIN"); hydra_options.miscptr = tmpptr; } else { - i = 1; // snmpv3 with login+pass mode + i = 1; // snmpv3 with login+pass mode #ifndef LIBOPENSSL - bail("hydra was not compiled with OPENSSL support, snmpv3 can only be used on NoAuthNoPriv mode (only logins, no passwords)!"); + bail("hydra was not compiled with OPENSSL support, snmpv3 can only " + "be used on NoAuthNoPriv mode (only logins, no passwords)!"); #endif - printf("[INFO] Using %s SNMPv3 with %s authentication and %s privacy\n", j > 16 ? "AuthPriv" : "AuthNoPriv", (j & 8) == 8 ? "SHA" : "MD5", - (j & 16) == 16 ? "DES" : (j > 16) ? "AES" : "no"); + printf("[INFO] Using %s SNMPv3 with %s authentication and %s privacy\n", j > 16 ? "AuthPriv" : "AuthNoPriv", (j & 8) == 8 ? "SHA" : "MD5", (j & 16) == 16 ? "DES" : (j > 16) ? "AES" : "no"); } } } @@ -2963,15 +3048,16 @@ int main(int argc, char *argv[]) { } } if (strcmp(hydra_options.service, "ldap") == 0) { - bail("Please select ldap2 or ldap3 for simple authentication or ldap3-crammd5 or ldap3-digestmd5\n"); + bail("Please select ldap2 or ldap3 for simple authentication or " + "ldap3-crammd5 or ldap3-digestmd5\n"); } if (strcmp(hydra_options.service, "ldap2") == 0 || strcmp(hydra_options.service, "ldap3") == 0) { i = 1; - if ((hydra_options.miscptr != NULL && hydra_options.login != NULL) - || (hydra_options.miscptr != NULL && hydra_options.loginfile != NULL) || (hydra_options.login != NULL && hydra_options.loginfile != NULL)) + if ((hydra_options.miscptr != NULL && hydra_options.login != NULL) || (hydra_options.miscptr != NULL && hydra_options.loginfile != NULL) || (hydra_options.login != NULL && hydra_options.loginfile != NULL)) bail("you may only use one of -l, -L or -m\n"); if (hydra_options.login == NULL && hydra_options.loginfile == NULL && hydra_options.miscptr == NULL) - fprintf(stderr, "[WARNING] no DN to authenticate is defined, using DN of null (use -m, -l or -L to define DNs)\n"); + fprintf(stderr, "[WARNING] no DN to authenticate is defined, using DN " + "of null (use -m, -l or -L to define DNs)\n"); if (hydra_options.login == NULL && hydra_options.loginfile == NULL) { i = 2; } @@ -2989,26 +3075,30 @@ int main(int argc, char *argv[]) { i = 1; if (strcmp(hydra_options.service, "s7-300") == 0) { if (hydra_options.tasks > 8) { - fprintf(stderr, "[INFO] Reduced number of tasks to 8 (the PLC does not like more connections)\n"); + fprintf(stderr, "[INFO] Reduced number of tasks to 8 (the PLC does not " + "like more connections)\n"); hydra_options.tasks = 8; } i = 2; } if (strcmp(hydra_options.service, "cisco-enable") == 0) { if (hydra_options.login != NULL || hydra_options.loginfile != NULL) - i = 1; // login will be the initial Username: login, or line Password: + i = 1; // login will be the initial Username: login, or line Password: else i = 2; if (hydra_options.miscptr == NULL) - fprintf(stderr, "[WARNING] You did not supply the initial support to the Cisco via -l, assuming direct console access\n"); + fprintf(stderr, "[WARNING] You did not supply the initial support to " + "the Cisco via -l, assuming direct console access\n"); if (hydra_options.tasks > 4) - fprintf(stderr, "[WARNING] you should set the number of parallel task to 4 for cisco enable services.\n"); + fprintf(stderr, "[WARNING] you should set the number of parallel task " + "to 4 for cisco enable services.\n"); } if (strcmp(hydra_options.service, "http-proxy-urlenum") == 0) { i = 4; hydra_options.pass = empty_login; if (hydra_options.miscptr == NULL) { - fprintf(stderr, "[WARNING] You did not supply proxy credentials via the optional parameter\n"); + fprintf(stderr, "[WARNING] You did not supply proxy credentials via " + "the optional parameter\n"); } if (hydra_options.bfg || hydra_options.passfile != NULL) bail("the http-proxy-urlenum does not need the -p/-P or -x option"); @@ -3016,7 +3106,8 @@ int main(int argc, char *argv[]) { if (strcmp(hydra_options.service, "vnc") == 0) { i = 2; if (hydra_options.tasks > 4) - fprintf(stderr, "[WARNING] you should set the number of parallel task to 4 for vnc services.\n"); + fprintf(stderr, "[WARNING] you should set the number of parallel task " + "to 4 for vnc services.\n"); } if (strcmp(hydra_options.service, "https-head") == 0 || strcmp(hydra_options.service, "https-get") == 0 || strcmp(hydra_options.service, "https-post") == 0) { #ifdef LIBOPENSSL @@ -3024,11 +3115,10 @@ int main(int argc, char *argv[]) { hydra_options.ssl = 1; if (strcmp(hydra_options.service, "https-head") == 0) strcpy(hydra_options.service, "http-head"); + else if (strcmp(hydra_options.service, "https-post") == 0) + strcpy(hydra_options.service, "http-post"); else - if (strcmp(hydra_options.service, "https-post") == 0) - strcpy(hydra_options.service, "http-post"); - else - strcpy(hydra_options.service, "http-get"); + strcpy(hydra_options.service, "http-get"); #else bail("Compiled without SSL support, module not available"); #endif @@ -3036,29 +3126,34 @@ int main(int argc, char *argv[]) { if (strcmp(hydra_options.service, "http-get") == 0 || strcmp(hydra_options.service, "http-head") == 0 || strcmp(hydra_options.service, "http-post") == 0) { i = 1; if (hydra_options.miscptr == NULL) { - fprintf(stderr, "[WARNING] You must supply the web page as an additional option or via -m, default path set to /\n"); + fprintf(stderr, "[WARNING] You must supply the web page as an " + "additional option or via -m, default path set to /\n"); hydra_options.miscptr = malloc(2); hydra_options.miscptr = "/"; } if (*hydra_options.miscptr != '/' && strstr(hydra_options.miscptr, "://") == NULL) - bail("The web page you supplied must start with a \"/\", \"http://\" or \"https://\", e.g. \"/protected/login\""); + bail("The web page you supplied must start with a \"/\", \"http://\" " + "or \"https://\", e.g. \"/protected/login\""); if (getenv("HYDRA_PROXY_HTTP") && getenv("HYDRA_PROXY")) - bail("Found HYDRA_PROXY_HTTP *and* HYDRA_PROXY environment variables - you can use only ONE for the service http-head/http-get!"); + bail("Found HYDRA_PROXY_HTTP *and* HYDRA_PROXY environment variables - " + "you can use only ONE for the service http-head/http-get!"); if (getenv("HYDRA_PROXY_HTTP")) { printf("[INFO] Using HTTP Proxy: %s\n", getenv("HYDRA_PROXY_HTTP")); use_proxy = 1; } if (strcmp(hydra_options.service, "http-head") == 0) - fprintf(stderr, "[WARNING] http-head auth does not work with every server, better use http-get\n"); + fprintf(stderr, "[WARNING] http-head auth does not work with every " + "server, better use http-get\n"); } - if (strcmp(hydra_options.service, "http-get-form") == 0 || strcmp(hydra_options.service, "http-post-form") == 0 || strcmp(hydra_options.service, "https-get-form") == 0 - || strcmp(hydra_options.service, "https-post-form") == 0) { - char bufferurl[6096+24], *url, *variables, *cond, *optional1; //6096 comes from issue 192 on github. Extra 24 bytes for null padding. + if (strcmp(hydra_options.service, "http-get-form") == 0 || strcmp(hydra_options.service, "http-post-form") == 0 || strcmp(hydra_options.service, "https-get-form") == 0 || strcmp(hydra_options.service, "https-post-form") == 0) { + char bufferurl[6096 + 24], *url, *variables, *cond, + *optional1; // 6096 comes from issue 192 on github. Extra 24 bytes for + // null padding. if (strncmp(hydra_options.service, "http-", 5) == 0) { i = 1; - } else { // https + } else { // https #ifdef LIBOPENSSL i = 1; hydra_options.ssl = 1; @@ -3071,23 +3166,28 @@ int main(int argc, char *argv[]) { #endif } if (hydra_options.miscptr == NULL) { - fprintf(stderr, "[WARNING] You must supply the web page as an additional option or via -m, default path set to /\n"); + fprintf(stderr, "[WARNING] You must supply the web page as an " + "additional option or via -m, default path set to /\n"); hydra_options.miscptr = malloc(2); hydra_options.miscptr = "/"; } - //if (*hydra_options.miscptr != '/' && strstr(hydra_options.miscptr, "://") == NULL) - // bail("The web page you supplied must start with a \"/\", \"http://\" or \"https://\", e.g. \"/protected/login\""); + // if (*hydra_options.miscptr != '/' && strstr(hydra_options.miscptr, + // "://") == NULL) + // bail("The web page you supplied must start with a \"/\", \"http://\" + // or \"https://\", e.g. \"/protected/login\""); if (hydra_options.miscptr[0] != '/') bail("optional parameter must start with a '/' slash!\n"); if (getenv("HYDRA_PROXY_HTTP") && getenv("HYDRA_PROXY")) - bail("Found HYDRA_PROXY_HTTP *and* HYDRA_PROXY environment variables - you can use only ONE for the service http-head/http-get!"); + bail("Found HYDRA_PROXY_HTTP *and* HYDRA_PROXY environment variables - " + "you can use only ONE for the service http-head/http-get!"); if (getenv("HYDRA_PROXY_HTTP")) { printf("[INFO] Using HTTP Proxy: %s\n", getenv("HYDRA_PROXY_HTTP")); use_proxy = 1; } if (strstr(hydra_options.miscptr, "\\:") != NULL) { - fprintf(stderr, "[INFORMATION] escape sequence \\: detected in module option, no parameter verification is performed.\n"); + fprintf(stderr, "[INFORMATION] escape sequence \\: detected in module " + "option, no parameter verification is performed.\n"); } else { sprintf(bufferurl, "%.6000s", hydra_options.miscptr); url = strtok(bufferurl, ":"); @@ -3095,11 +3195,17 @@ int main(int argc, char *argv[]) { cond = strtok(NULL, ":"); optional1 = strtok(NULL, "\n"); if ((variables == NULL) || (strstr(variables, "^USER^") == NULL && strstr(variables, "^PASS^") == NULL && strstr(variables, "^USER64^") == NULL && strstr(variables, "^PASS64^") == NULL)) { - fprintf(stderr, "[ERROR] the variables argument needs at least the strings ^USER^, ^PASS^, ^USER64^ or ^PASS64^: %s\n", STR_NULL(variables)); + fprintf(stderr, + "[ERROR] the variables argument needs at least the strings " + "^USER^, ^PASS^, ^USER64^ or ^PASS64^: %s\n", + STR_NULL(variables)); exit(-1); } if ((url == NULL) || (cond == NULL)) { - fprintf(stderr, "[ERROR] Wrong syntax, requires three arguments separated by a colon which may not be null: %s\n", bufferurl); + fprintf(stderr, + "[ERROR] Wrong syntax, requires three arguments separated by " + "a colon which may not be null: %s\n", + bufferurl); exit(-1); } while ((optional1 = strtok(NULL, ":")) != NULL) { @@ -3108,17 +3214,23 @@ int main(int argc, char *argv[]) { exit(-1); } switch (optional1[0]) { - case 'C': // fall through + case 'C': // fall through case 'c': if (optional1[1] != '=' || optional1[2] != '/') { - fprintf(stderr, "[ERROR] Wrong syntax of parameter C, must look like 'C=/url/of/page', not http:// etc.: %s\n", optional1); + fprintf(stderr, + "[ERROR] Wrong syntax of parameter C, must look like " + "'C=/url/of/page', not http:// etc.: %s\n", + optional1); exit(-1); } break; - case 'H': // fall through + case 'H': // fall through case 'h': if (optional1[1] != '=' || strtok(NULL, ":") == NULL) { - fprintf(stderr, "[ERROR] Wrong syntax of parameter H, must look like 'H=X-My-Header: MyValue', no http:// : %s\n", optional1); + fprintf(stderr, + "[ERROR] Wrong syntax of parameter H, must look like " + "'H=X-My-Header: MyValue', no http:// : %s\n", + optional1); exit(-1); } break; @@ -3135,21 +3247,26 @@ int main(int argc, char *argv[]) { i = 1; if (strcmp(hydra_options.service, "rdp") == 0) { if (hydra_options.tasks > 4) - fprintf(stderr, "[WARNING] rdp servers often don't like many connections, use -t 1 or -t 4 to reduce the number of parallel connections and -W 1 or -W 3 to wait between connection to allow the server to recover\n"); + fprintf(stderr, "[WARNING] rdp servers often don't like many connections, use -t 1 " + "or -t 4 to reduce the number of parallel connections and -W 1 or " + "-W 3 to wait between connection to allow the server to recover\n"); if (hydra_options.tasks > 4) { - fprintf(stderr, "[INFO] Reduced number of tasks to 4 (rdp does not like many parallel connections)\n"); - hydra_options.tasks = 4; + fprintf(stderr, "[INFO] Reduced number of tasks to 4 (rdp does not " + "like many parallel connections)\n"); + hydra_options.tasks = 4; } if (conwait == 0) - hydra_options.conwait = conwait = 1; - printf("[WARNING] the rdp module is experimental. Please test, report - and if possible, fix.\n"); + hydra_options.conwait = conwait = 1; + printf("[WARNING] the rdp module is experimental. Please test, report - " + "and if possible, fix.\n"); i = 1; } if (strcmp(hydra_options.service, "radmin2") == 0) { #ifdef HAVE_GCRYPT i = 1; #else - bail("hydra was not compiled with gcrypt support, radmin2 module not available"); + bail("hydra was not compiled with gcrypt support, radmin2 module not " + "available"); #endif } @@ -3161,24 +3278,30 @@ int main(int argc, char *argv[]) { } if (port < 1 || port > 65535) { if ((port = hydra_lookup_port(hydra_options.service)) < 1) { - fprintf(stderr, "[ERROR] No valid port set or no default port available. Use the -s Option.\n"); + fprintf(stderr, "[ERROR] No valid port set or no default port " + "available. Use the -s Option.\n"); exit(-1); } hydra_options.port = port; } if (hydra_options.ssl == 0 && hydra_options.port == 443) - fprintf(stderr, "[WARNING] you specified port 443 for attacking a http service, however did not specify the -S ssl switch nor used https-..., therefore using plain HTTP\n"); + fprintf(stderr, "[WARNING] you specified port 443 for attacking a http " + "service, however did not specify the -S ssl switch nor " + "used https-..., therefore using plain HTTP\n"); if (hydra_options.loop_mode && hydra_options.colonfile != NULL) - bail("The loop mode option (-u) works with all modes - except colon files (-C)\n"); + bail("The loop mode option (-u) works with all modes - except colon " + "files (-C)\n"); if (strncmp(hydra_options.service, "http-", strlen("http-")) != 0 && strcmp(hydra_options.service, "http-head") != 0 && getenv("HYDRA_PROXY_HTTP") != NULL) - fprintf(stderr, "[WARNING] the HYDRA_PROXY_HTTP environment variable works only with the http-head/http-get module, ignored...\n"); + fprintf(stderr, "[WARNING] the HYDRA_PROXY_HTTP environment variable works only " + "with the http-head/http-get module, ignored...\n"); if (i == 2) { - if (hydra_options.colonfile != NULL - || ((hydra_options.login != NULL || hydra_options.loginfile != NULL) && (hydra_options.pass != NULL || hydra_options.passfile != NULL || hydra_options.bfg > 0))) - bail - ("The redis, adam6500, cisco, oracle-listener, s7-300, snmp and vnc modules are only using the -p or -P option, not login (-l, -L) or colon file (-C).\nUse the telnet module for cisco using \"Username:\" authentication.\n"); + if (hydra_options.colonfile != NULL || ((hydra_options.login != NULL || hydra_options.loginfile != NULL) && (hydra_options.pass != NULL || hydra_options.passfile != NULL || hydra_options.bfg > 0))) + bail("The redis, adam6500, cisco, oracle-listener, s7-300, snmp and " + "vnc modules are only using the -p or -P option, not login (-l, " + "-L) or colon file (-C).\nUse the telnet module for cisco using " + "\"Username:\" authentication.\n"); if ((hydra_options.login != NULL || hydra_options.loginfile != NULL) && (hydra_options.pass == NULL || hydra_options.passfile == NULL)) { hydra_options.pass = hydra_options.login; hydra_options.passfile = hydra_options.loginfile; @@ -3187,9 +3310,9 @@ int main(int argc, char *argv[]) { hydra_options.loginfile = NULL; } if (i == 3) { - if (hydra_options.colonfile != NULL || hydra_options.bfg > 0 - || ((hydra_options.login != NULL || hydra_options.loginfile != NULL) && (hydra_options.pass != NULL || hydra_options.passfile != NULL))) - bail("The rsh, oracle-sid login is neither using the -p, -P or -x options nor colon file (-C)\n"); + if (hydra_options.colonfile != NULL || hydra_options.bfg > 0 || ((hydra_options.login != NULL || hydra_options.loginfile != NULL) && (hydra_options.pass != NULL || hydra_options.passfile != NULL))) + bail("The rsh, oracle-sid login is neither using the -p, -P or -x " + "options nor colon file (-C)\n"); if ((hydra_options.login == NULL || hydra_options.loginfile == NULL) && (hydra_options.pass != NULL || hydra_options.passfile != NULL)) { hydra_options.login = hydra_options.pass; hydra_options.loginfile = hydra_options.passfile; @@ -3200,23 +3323,23 @@ int main(int argc, char *argv[]) { if (i == 3 && hydra_options.login == NULL && hydra_options.loginfile == NULL) bail("I need at least either the -l or -L option to know the login"); if (i == 2 && hydra_options.pass == NULL && hydra_options.passfile == NULL && hydra_options.bfg == 0) - bail("I need at least either the -p, -P or -x option to have a password to try"); + bail("I need at least either the -p, -P or -x option to have a password " + "to try"); if (i == 1 && hydra_options.login == NULL && hydra_options.loginfile == NULL && hydra_options.colonfile == NULL) bail("I need at least either the -l, -L or -C option to know the login"); - if (hydra_options.colonfile != NULL && ((hydra_options.bfg != 0 || hydra_options.login != NULL || hydra_options.loginfile != NULL) - || (hydra_options.pass != NULL && hydra_options.passfile != NULL))) + if (hydra_options.colonfile != NULL && ((hydra_options.bfg != 0 || hydra_options.login != NULL || hydra_options.loginfile != NULL) || (hydra_options.pass != NULL && hydra_options.passfile != NULL))) bail("The -C option is standalone, don't use it with -l/L, -p/P or -x!"); - if ((hydra_options.bfg) - && ((hydra_options.pass != NULL) || (hydra_options.passfile != NULL) - || (hydra_options.colonfile != NULL))) - bail("The -x (password bruteforce generation option) doesn't work with -p/P, -C or -e!\n"); - if (hydra_options.try_password_reverse_login == 0 && hydra_options.try_password_same_as_login == 0 && hydra_options.try_null_password == 0 - && (i != 3 && (hydra_options.pass == NULL && hydra_options.passfile == NULL && hydra_options.colonfile == NULL)) && hydra_options.bfg == 0) { - // test if the service is smtp-enum as it could be used either with a login+pass or only a login + if ((hydra_options.bfg) && ((hydra_options.pass != NULL) || (hydra_options.passfile != NULL) || (hydra_options.colonfile != NULL))) + bail("The -x (password bruteforce generation option) doesn't work with " + "-p/P, -C or -e!\n"); + if (hydra_options.try_password_reverse_login == 0 && hydra_options.try_password_same_as_login == 0 && hydra_options.try_null_password == 0 && (i != 3 && (hydra_options.pass == NULL && hydra_options.passfile == NULL && hydra_options.colonfile == NULL)) && hydra_options.bfg == 0) { + // test if the service is smtp-enum as it could be used either with a + // login+pass or only a login if (strstr(hydra_options.service, "smtp-enum") != NULL) hydra_options.pass = empty_login; else - bail("I need at least the -e, -p, -P or -x option to have some passwords!"); + bail("I need at least the -e, -p, -P or -x option to have some " + "passwords!"); } if (hydra_options.tasks < 1 || hydra_options.tasks > MAXTASKS) { fprintf(stderr, "[ERROR] Option -t needs to be a number between 1 and %d\n", MAXTASKS); @@ -3227,16 +3350,10 @@ int main(int argc, char *argv[]) { hydra_options.max_use = MAXTASKS; } // script kiddie patch - if (hydra_options.server != NULL && ( - hydra_strcasestr(hydra_options.server, ".outlook.com") != NULL || - hydra_strcasestr(hydra_options.server, ".hotmail.com") != NULL || - hydra_strcasestr(hydra_options.server, ".yahoo.") != NULL || - hydra_strcasestr(hydra_options.server, ".gmx.") != NULL || - hydra_strcasestr(hydra_options.server, ".web.de") != NULL || - hydra_strcasestr(hydra_options.server, ".gmail.") != NULL || - hydra_strcasestr(hydra_options.server, "googlemail.") != NULL - )) { - fprintf(stderr, "[WARNING] Google Mail and others have bruteforce and hydra detection and sends false positives. You are not doing anything illegal right?!\n"); + if (hydra_options.server != NULL && (hydra_strcasestr(hydra_options.server, ".outlook.com") != NULL || hydra_strcasestr(hydra_options.server, ".hotmail.com") != NULL || hydra_strcasestr(hydra_options.server, ".yahoo.") != NULL || hydra_strcasestr(hydra_options.server, ".gmx.") != NULL || hydra_strcasestr(hydra_options.server, ".web.de") != NULL || hydra_strcasestr(hydra_options.server, ".gmail.") != NULL || hydra_strcasestr(hydra_options.server, "googlemail.") != NULL)) { + fprintf(stderr, "[WARNING] Google Mail and others have bruteforce and " + "hydra detection and sends false positives. You are not " + "doing anything illegal right?!\n"); fprintf(stderr, "[WARNING] !read the above!\n"); sleep(5); } @@ -3257,7 +3374,10 @@ int main(int argc, char *argv[]) { exit(-1); } if (hydra_brains.sizelogin > MAX_BYTES) { - fprintf(stderr, "[ERROR] Maximum size of the login file is %d, this file has %" hPRIu64 " bytes.\n", MAX_BYTES, (uint64_t) hydra_brains.sizelogin); + fprintf(stderr, + "[ERROR] Maximum size of the login file is %d, this file has " + "%" hPRIu64 " bytes.\n", + MAX_BYTES, (uint64_t)hydra_brains.sizelogin); exit(-1); } login_ptr = malloc(hydra_brains.sizelogin + hydra_brains.countlogin + 8); @@ -3282,11 +3402,17 @@ int main(int argc, char *argv[]) { exit(-1); } if (hydra_brains.countpass > MAX_LINES) { - fprintf(stderr, "[ERROR] Maximum number of passwords is %d, this file has %" hPRIu64 " entries.\n", MAX_LINES, hydra_brains.countpass); + fprintf(stderr, + "[ERROR] Maximum number of passwords is %d, this file has " + "%" hPRIu64 " entries.\n", + MAX_LINES, hydra_brains.countpass); exit(-1); } if (hydra_brains.sizepass > MAX_BYTES) { - fprintf(stderr, "[ERROR] Maximum size of the password file is %d, this file has %" hPRIu64 " bytes.\n", MAX_BYTES, (uint64_t) hydra_brains.sizepass); + fprintf(stderr, + "[ERROR] Maximum size of the password file is %d, this file " + "has %" hPRIu64 " bytes.\n", + MAX_BYTES, (uint64_t)hydra_brains.sizepass); exit(-1); } pass_ptr = malloc(hydra_brains.sizepass + hydra_brains.countpass + 8); @@ -3303,7 +3429,7 @@ int main(int argc, char *argv[]) { if (hydra_options.bfg) { #ifdef HAVE_MATH_H if (bf_init(bf_options.arg)) - exit(-1); // error description is handled by bf_init + exit(-1); // error description is handled by bf_init pass_ptr = bf_next(hydra_options.rainy); hydra_brains.countpass += bf_get_pcount(); hydra_brains.sizepass += BF_BUFLEN; @@ -3329,11 +3455,17 @@ int main(int argc, char *argv[]) { exit(-1); } if (hydra_brains.countlogin > MAX_LINES / 2) { - fprintf(stderr, "[ERROR] Maximum number of colon file entries is %d, this file has %" hPRIu64 " entries.\n", MAX_LINES / 2, hydra_brains.countlogin); + fprintf(stderr, + "[ERROR] Maximum number of colon file entries is %d, this file " + "has %" hPRIu64 " entries.\n", + MAX_LINES / 2, hydra_brains.countlogin); exit(-1); } if (hydra_brains.sizelogin > MAX_BYTES / 2) { - fprintf(stderr, "[ERROR] Maximum size of the colon file is %d, this file has %" hPRIu64 " bytes.\n", MAX_BYTES / 2, (uint64_t) hydra_brains.sizelogin); + fprintf(stderr, + "[ERROR] Maximum size of the colon file is %d, this file has " + "%" hPRIu64 " bytes.\n", + MAX_BYTES / 2, (uint64_t)hydra_brains.sizelogin); exit(-1); } csv_ptr = malloc(hydra_brains.sizelogin + 2 * hydra_brains.countlogin + 8); @@ -3341,8 +3473,10 @@ int main(int argc, char *argv[]) { bail("Could not allocate enough memory for colon file data"); memset(csv_ptr, 0, hydra_brains.sizelogin + 2 * hydra_brains.countlogin + 8); fill_mem(csv_ptr, cfp, 1); - //printf("count: %d, size: %d\n", hydra_brains.countlogin, hydra_brains.sizelogin); - //hydra_dump_data(csv_ptr, hydra_brains.sizelogin + hydra_brains.countlogin + 8, "colon data"); + // printf("count: %d, size: %d\n", hydra_brains.countlogin, + // hydra_brains.sizelogin); hydra_dump_data(csv_ptr, + // hydra_brains.sizelogin + // + hydra_brains.countlogin + 8, "colon data"); hydra_brains.countpass = 1; pass_ptr = login_ptr = csv_ptr; while (*pass_ptr != 0) @@ -3357,7 +3491,13 @@ int main(int argc, char *argv[]) { } free(memcheck); if ((rfp = fopen(RESTOREFILE, "r")) != NULL) { - fprintf(stderr, "[WARNING] Restorefile (%s) from a previous session found, to prevent overwriting, %s\n", ignore_restore == 1 ? "ignored ..." : "you have 10 seconds to abort... (use option -I to skip waiting)", RESTOREFILE); + fprintf(stderr, + "[WARNING] Restorefile (%s) from a previous session found, to " + "prevent overwriting, %s\n", + ignore_restore == 1 ? "ignored ..." + : "you have 10 seconds to abort... (use " + "option -I to skip waiting)", + RESTOREFILE); if (ignore_restore != 1) sleep(10); fclose(rfp); @@ -3373,17 +3513,24 @@ int main(int argc, char *argv[]) { fprintf(stderr, "[ERROR] File for targets is empty: %s\n", hydra_options.infile_ptr); exit(-1); } - // if (countinfile > 60) fprintf(stderr, "[WARNING] the -M option is not working correctly at the moment for target lists > 60!\n"); - hydra_targets = malloc(sizeof(hydra_target*) * (countservers + 2) + 8); + // if (countinfile > 60) fprintf(stderr, "[WARNING] the -M option is not + // working correctly at the moment for target lists > 60!\n"); + hydra_targets = malloc(sizeof(hydra_target *) * (countservers + 2) + 8); if (hydra_targets == NULL) bail("Could not allocate enough memory for target data"); sizeinfile = size_of_data; if (countinfile > MAX_LINES / 1000) { - fprintf(stderr, "[ERROR] Maximum number of target file entries is %d, this file has %d entries.\n", MAX_LINES / 1000, (int32_t) countinfile); + fprintf(stderr, + "[ERROR] Maximum number of target file entries is %d, this " + "file has %d entries.\n", + MAX_LINES / 1000, (int32_t)countinfile); exit(-1); } if (sizeinfile > MAX_BYTES / 1000) { - fprintf(stderr, "[ERROR] Maximum size of the server file is %d, this file has %d bytes.\n", MAX_BYTES / 1000, (int32_t) sizeinfile); + fprintf(stderr, + "[ERROR] Maximum size of the server file is %d, this file has " + "%d bytes.\n", + MAX_BYTES / 1000, (int32_t)sizeinfile); exit(-1); } if ((servers_ptr = malloc(sizeinfile + countservers + 8)) == NULL) @@ -3421,72 +3568,75 @@ int main(int argc, char *argv[]) { fprintf(stderr, "Error: no target server given, nor -M option used\n"); exit(-1); } else if (index(hydra_options.server, '/') != NULL) { - if (cmdlinetarget == NULL) - bail("You seem to mix up \"service://target:port/options\" syntax with \"target service options\" syntax. Read the README on how to use hydra correctly!"); - if (strstr(cmdlinetarget, "://") != NULL) { - tmpptr = index(hydra_options.server, '/'); - if (tmpptr != NULL) - *tmpptr = 0; - countservers = hydra_brains.targets = 1; - hydra_targets = malloc(sizeof(hydra_target*) * 4); - hydra_targets[0] = malloc(sizeof(hydra_target)); - memset(hydra_targets[0], 0, sizeof(hydra_target)); - hydra_targets[0]->target = servers_ptr = hydra_options.server; - hydra_targets[0]->port = hydra_options.port; - sizeservers = strlen(hydra_options.server) + 1; - } else { - /* CIDR notation on command line, e.g. 192.168.0.0/24 */ - uint32_t four_from, four_to, addr_cur, addr_cur2, k, l; - in_addr_t addr4; - struct sockaddr_in target; + if (cmdlinetarget == NULL) + bail("You seem to mix up \"service://target:port/options\" syntax with " + "\"target service options\" syntax. Read the README on how to use " + "hydra correctly!"); + if (strstr(cmdlinetarget, "://") != NULL) { + tmpptr = index(hydra_options.server, '/'); + if (tmpptr != NULL) + *tmpptr = 0; + countservers = hydra_brains.targets = 1; + hydra_targets = malloc(sizeof(hydra_target *) * 4); + hydra_targets[0] = malloc(sizeof(hydra_target)); + memset(hydra_targets[0], 0, sizeof(hydra_target)); + hydra_targets[0]->target = servers_ptr = hydra_options.server; + hydra_targets[0]->port = hydra_options.port; + sizeservers = strlen(hydra_options.server) + 1; + } else { + /* CIDR notation on command line, e.g. 192.168.0.0/24 */ + uint32_t four_from, four_to, addr_cur, addr_cur2, k, l; + in_addr_t addr4; + struct sockaddr_in target; - hydra_options.cidr = 1; - do_retry = 0; - if ((tmpptr = malloc(strlen(hydra_options.server) + 1)) == NULL) { - fprintf(stderr, "Error: can not allocate memory\n"); - exit(-1); + hydra_options.cidr = 1; + do_retry = 0; + if ((tmpptr = malloc(strlen(hydra_options.server) + 1)) == NULL) { + fprintf(stderr, "Error: can not allocate memory\n"); + exit(-1); + } + strcpy(tmpptr, hydra_options.server); + tmpptr2 = index(tmpptr, '/'); + *tmpptr2++ = 0; + if ((k = atoi(tmpptr2)) < 16 || k > 31) { + fprintf(stderr, "Error: network size may only be between /16 and /31: %s\n", hydra_options.server); + exit(-1); + } + if ((addr4 = htonl(inet_addr(tmpptr))) == 0xffffffff) { + fprintf(stderr, "Error: option is not a valid IPv4 address: %s\n", tmpptr); + exit(-1); + } + free(tmpptr); + l = 1 << (32 - k); + l--; + four_to = (addr4 | l); + l = 0xffffffff - l; + four_from = (addr4 & l); + l = 1 << (32 - k); + hydra_brains.targets = countservers = l; + hydra_targets = (hydra_target **)malloc(sizeof(hydra_target *) * (l + 2) + 8); + if (hydra_targets == NULL) + bail("Could not allocate enough memory for target data"); + i = 0; + addr_cur = four_from; + while (addr_cur <= four_to && i < l) { + hydra_targets[i] = malloc(sizeof(hydra_target)); + memset(hydra_targets[i], 0, sizeof(hydra_target)); + addr_cur2 = htonl(addr_cur); + memcpy(&target.sin_addr.s_addr, (char *)&addr_cur2, 4); + hydra_targets[i]->target = strdup(inet_ntoa((struct in_addr)target.sin_addr)); + hydra_targets[i]->port = hydra_options.port; + addr_cur++; + i++; + } + if (verbose) + printf("[VERBOSE] CIDR attack from %s to %s\n", hydra_targets[0]->target, hydra_targets[l - 1]->target); + printf("[WARNING] The CIDR attack mode is still beta. Please report " + "issues.\n"); } - strcpy(tmpptr, hydra_options.server); - tmpptr2 = index(tmpptr, '/'); - *tmpptr2++ = 0; - if ((k = atoi(tmpptr2)) < 16 || k > 31) { - fprintf(stderr, "Error: network size may only be between /16 and /31: %s\n", hydra_options.server); - exit(-1); - } - if ((addr4 = htonl(inet_addr(tmpptr))) == 0xffffffff) { - fprintf(stderr, "Error: option is not a valid IPv4 address: %s\n", tmpptr); - exit(-1); - } - free(tmpptr); - l = 1 << (32 - k); - l--; - four_to = (addr4 | l); - l = 0xffffffff - l; - four_from = (addr4 & l); - l = 1 << (32 - k); - hydra_brains.targets = countservers = l; - hydra_targets = (hydra_target**)malloc(sizeof(hydra_target*) * (l + 2) + 8); - if (hydra_targets == NULL) - bail("Could not allocate enough memory for target data"); - i = 0; - addr_cur = four_from; - while (addr_cur <= four_to && i < l) { - hydra_targets[i] = malloc(sizeof(hydra_target)); - memset(hydra_targets[i], 0, sizeof(hydra_target)); - addr_cur2 = htonl(addr_cur); - memcpy(&target.sin_addr.s_addr, (char *) &addr_cur2, 4); - hydra_targets[i]->target = strdup(inet_ntoa((struct in_addr) target.sin_addr)); - hydra_targets[i]->port = hydra_options.port; - addr_cur++; - i++; - } - if (verbose) - printf("[VERBOSE] CIDR attack from %s to %s\n", hydra_targets[0]->target, hydra_targets[l - 1]->target); - printf("[WARNING] The CIDR attack mode is still beta. Please report issues.\n"); - } - } else { // standard: single target on command line + } else { // standard: single target on command line countservers = hydra_brains.targets = 1; - hydra_targets = malloc(sizeof(hydra_target*) * 4); + hydra_targets = malloc(sizeof(hydra_target *) * 4); hydra_targets[0] = malloc(sizeof(hydra_target)); memset(hydra_targets[0], 0, sizeof(hydra_target)); hydra_targets[0]->target = servers_ptr = hydra_options.server; @@ -3508,7 +3658,7 @@ int main(int argc, char *argv[]) { hydra_targets[i]->pass_state = 3; } } - } // END OF restore == 0 + } // END OF restore == 0 // PROXY PROCESSING if (getenv("HYDRA_PROXY") && use_proxy == 0) { @@ -3520,13 +3670,18 @@ int main(int argc, char *argv[]) { if (use_proxy == 2) proxy_string = getenv("HYDRA_PROXY"); if (use_proxy && getenv("HYDRA_PROXY_AUTH") != NULL) - fprintf(stderr, "[WARNING] environment variable HYDRA_PROXY_AUTH is deprecated, use authentication in the HYDRA_PROXY definitions, e.g. type://auth@target:port\n"); + fprintf(stderr, "[WARNING] environment variable HYDRA_PROXY_AUTH is " + "deprecated, use authentication in the HYDRA_PROXY " + "definitions, e.g. type://auth@target:port\n"); if (use_proxy && proxy_string != NULL) { if (strstr(proxy_string, "://") != NULL) { process_proxy_line(use_proxy, proxy_string); } else { if ((proxyfp = fopen(proxy_string, "r")) == NULL) { - fprintf(stderr, "[ERROR] proxy definition %s is neither of the kind type://auth@target:port nor a file containing proxy entries!\n", proxy_string); + fprintf(stderr, + "[ERROR] proxy definition %s is neither of the kind " + "type://auth@target:port nor a file containing proxy entries!\n", + proxy_string); exit(-1); } while (fgets(buf, sizeof(buf), proxyfp) != NULL) @@ -3556,12 +3711,14 @@ int main(int argc, char *argv[]) { bail("No login/password combination given!"); if (hydra_brains.todo < hydra_options.tasks) { if (verbose && hydra_options.tasks != TASKS) - printf("[VERBOSE] More tasks defined than login/pass pairs exist. Tasks reduced to %" hPRIu64 "\n", hydra_brains.todo); + printf("[VERBOSE] More tasks defined than login/pass pairs exist. " + "Tasks reduced to %" hPRIu64 "\n", + hydra_brains.todo); hydra_options.tasks = hydra_brains.todo; } } - if (hydra_options.max_use == MAXTASKS) { // only if it was not set via -T + if (hydra_options.max_use == MAXTASKS) { // only if it was not set via -T if (hydra_options.max_use < hydra_brains.targets * hydra_options.tasks) hydra_options.max_use = hydra_brains.targets * hydra_options.tasks; if (hydra_options.max_use > MAXTASKS) @@ -3570,10 +3727,13 @@ int main(int argc, char *argv[]) { if ((hydra_options.tasks == TASKS || hydra_options.tasks <= 8) && hydra_options.max_use < hydra_brains.targets * hydra_options.tasks) { if ((hydra_options.tasks = hydra_options.max_use / hydra_brains.targets) == 0) hydra_options.tasks = 1; - //fprintf(stderr, "[WARNING] More tasks defined per server than allowed for maximal connections. Tasks per server reduced to %d.\n", hydra_options.tasks); + // fprintf(stderr, "[WARNING] More tasks defined per server than allowed for + // maximal connections. Tasks per server reduced to %d.\n", + // hydra_options.tasks); } else { if (hydra_options.tasks > MAXTASKS) { - //fprintf(stderr, "[WARNING] reducing tasks to MAXTASKS (%d)\n", MAXTASKS); + // fprintf(stderr, "[WARNING] reducing tasks to MAXTASKS (%d)\n", + // MAXTASKS); hydra_options.tasks = MAXTASKS; } } @@ -3591,16 +3751,10 @@ int main(int argc, char *argv[]) { if (hydra_options.ssl) options = options | OPTION_SSL; - printf("[DATA] max %d task%s per %d server%s, overall %d task%s, %" hPRIu64 " login tr", - hydra_options.tasks, hydra_options.tasks == 1 ? "" : "s", - hydra_brains.targets, hydra_brains.targets == 1 ? "" : "s", - hydra_options.max_use, hydra_options.max_use == 1 ? "" : "s", - hydra_brains.todo); + printf("[DATA] max %d task%s per %d server%s, overall %d task%s, %" hPRIu64 " login tr", hydra_options.tasks, hydra_options.tasks == 1 ? "" : "s", hydra_brains.targets, hydra_brains.targets == 1 ? "" : "s", hydra_options.max_use, hydra_options.max_use == 1 ? "" : "s", hydra_brains.todo); printf("%s", hydra_brains.todo == 1 ? "y" : "ies"); if (hydra_options.colonfile == NULL) { - printf(" (l:%" hPRIu64 "/p:%" hPRIu64 "), ~%" hPRIu64 " tr", - (uint64_t) hydra_brains.countlogin, (uint64_t) hydra_brains.countpass, - math2); + printf(" (l:%" hPRIu64 "/p:%" hPRIu64 "), ~%" hPRIu64 " tr", (uint64_t)hydra_brains.countlogin, (uint64_t)hydra_brains.countpass, math2); } else { printf(", ~%" hPRIu64 " tr", math2); } @@ -3610,7 +3764,7 @@ int main(int argc, char *argv[]) { if (hydra_brains.targets == 1) { if (index(hydra_targets[0]->target, ':') == NULL) { printf("[DATA] attacking %s%s://%s:", hydra_options.service, hydra_options.ssl == 1 ? "s" : "", hydra_targets[0]->target); - printf("%d%s%s\n", port, hydra_options.miscptr == NULL || hydra_options.miscptr[0] != '/' ? "/" : "", hydra_options.miscptr != NULL ? hydra_options.miscptr : ""); + printf("%d%s%s\n", port, hydra_options.miscptr == NULL || hydra_options.miscptr[0] != '/' ? "/" : "", hydra_options.miscptr != NULL ? hydra_options.miscptr : ""); } else { printf("[DATA] attacking %s%s://[%s]:", hydra_options.service, hydra_options.ssl == 1 ? "s" : "", hydra_targets[0]->target); printf("%d%s%s\n", port, hydra_options.miscptr == NULL || hydra_options.miscptr[0] != '/' ? "/" : "", hydra_options.miscptr != NULL ? hydra_options.miscptr : ""); @@ -3619,14 +3773,16 @@ int main(int argc, char *argv[]) { printf("[DATA] attacking %s%s://(%d targets):", hydra_options.service, hydra_options.ssl == 1 ? "s" : "", hydra_brains.targets); printf("%d%s%s\n", port, hydra_options.miscptr == NULL || hydra_options.miscptr[0] != '/' ? "/" : "", hydra_options.miscptr != NULL ? hydra_options.miscptr : ""); } - //service %s on port %d%s\n", hydra_options.service, port, hydra_options.ssl == 1 ? " with SSL" : ""); -// if (hydra_options.miscptr != NULL && hydra_options.miscptr[0] != 0) -// printf("[DATA] with additional data %s\n", hydra_options.miscptr); + // service %s on port %d%s\n", hydra_options.service, port, hydra_options.ssl + // == 1 ? " with SSL" : ""); + // if (hydra_options.miscptr != NULL && hydra_options.miscptr[0] != 0) + // printf("[DATA] with additional data %s\n", hydra_options.miscptr); if (hydra_options.outfile_ptr != NULL) { - char outfile_open_type[] = "a+"; //Default open in a+ mode + char outfile_open_type[] = "a+"; // Default open in a+ mode if (hydra_options.outfile_format == FORMAT_JSONV1 && hydra_options.restore != 1) { - outfile_open_type[0] = 'w'; //Creat new outfile, if using JSON output and not using -R. The open mode should be "w+". + outfile_open_type[0] = 'w'; // Creat new outfile, if using JSON output and + // not using -R. The open mode should be "w+". } if ((hydra_brains.ofp = fopen(hydra_options.outfile_ptr, outfile_open_type)) == NULL) { perror("[ERROR] Error creating outputfile"); @@ -3634,22 +3790,22 @@ int main(int argc, char *argv[]) { } if (hydra_options.outfile_format == FORMAT_JSONV1) { if (hydra_options.restore != 1) { // No JSON head while using -R - fprintf(hydra_brains.ofp, "{ \"generator\": {\n" - "\t\"software\": \"%s\", \"version\": \"%s\", \"built\": \"%s\",\n" - "\t\"server\": \"%s\", \"service\": \"%s\", \"jsonoutputversion\": \"1.00\",\n" - "\t\"commandline\": \"%s", - PROGRAM, VERSION, hydra_build_time(), - hydra_options.server == NULL ? hydra_options.infile_ptr : hydra_options.server, hydra_options.service, prg); + fprintf(hydra_brains.ofp, + "{ \"generator\": {\n" + "\t\"software\": \"%s\", \"version\": \"%s\", \"built\": \"%s\",\n" + "\t\"server\": \"%s\", \"service\": \"%s\", \"jsonoutputversion\": " + "\"1.00\",\n" + "\t\"commandline\": \"%s", + PROGRAM, VERSION, hydra_build_time(), hydra_options.server == NULL ? hydra_options.infile_ptr : hydra_options.server, hydra_options.service, prg); for (i = 1; i < argc; i++) { - char *t = hydra_string_replace(argv[i],"\"","\\\""); + char *t = hydra_string_replace(argv[i], "\"", "\\\""); fprintf(hydra_brains.ofp, " %s", t); free(t); } fprintf(hydra_brains.ofp, "\"\n\t},\n\"results\": ["); } } else { // else default is plain text aka == 0 - fprintf(hydra_brains.ofp, "# %s %s run at %s on %s %s (%s", PROGRAM, VERSION, hydra_build_time(), - hydra_options.server == NULL ? hydra_options.infile_ptr : hydra_options.server, hydra_options.service, prg); + fprintf(hydra_brains.ofp, "# %s %s run at %s on %s %s (%s", PROGRAM, VERSION, hydra_build_time(), hydra_options.server == NULL ? hydra_options.infile_ptr : hydra_options.server, hydra_options.service, prg); for (i = 1; i < argc; i++) fprintf(hydra_brains.ofp, " %s", argv[i]); fprintf(hydra_brains.ofp, ")\n"); @@ -3698,30 +3854,36 @@ int main(int argc, char *argv[]) { #ifdef AF_INET6 if (p->ai_family == AF_INET6) { if (ipv6 == NULL) - ipv6 = (struct sockaddr_in6 *) p->ai_addr; + ipv6 = (struct sockaddr_in6 *)p->ai_addr; } else #endif - if (p->ai_family == AF_INET) { + if (p->ai_family == AF_INET) { if (ipv4 == NULL) - ipv4 = (struct sockaddr_in *) p->ai_addr; + ipv4 = (struct sockaddr_in *)p->ai_addr; } } #ifdef AF_INET6 if (ipv6 != NULL && (ipv4 == NULL || prefer_ipv6)) { // IPV6 FIXME if ((strcmp(hydra_options.service, "socks5") == 0) || (strcmp(hydra_options.service, "sip") == 0)) { - fprintf(stderr, "[ERROR] Target %s resolves to an IPv6 address, however module %s does not support this. Maybe try \"-4\" option. Sending in patches helps.\n", + fprintf(stderr, + "[ERROR] Target %s resolves to an IPv6 address, however " + "module %s does not support this. Maybe try \"-4\" option. " + "Sending in patches helps.\n", hydra_targets[i]->target, hydra_options.service); hydra_targets[i]->done = TARGET_UNRESOLVED; hydra_brains.finished++; } else { hydra_targets[i]->ip[0] = 16; - memcpy(&hydra_targets[i]->ip[1], (char *) &ipv6->sin6_addr, 16); + memcpy(&hydra_targets[i]->ip[1], (char *)&ipv6->sin6_addr, 16); if (device != NULL && strlen(device) <= 16) strcpy(&hydra_targets[i]->ip[17], device); if (memcmp(&hydra_targets[i]->ip[17], fe80, 2) == 0) { if (device == NULL) { - fprintf(stderr, "[ERROR] The target %s address is a link local address, link local addresses require the interface being defined like this: fe80::1%%eth0\n", + fprintf(stderr, + "[ERROR] The target %s address is a link local address, " + "link local addresses require the interface being " + "defined like this: fe80::1%%eth0\n", hydra_targets[i]->target); exit(-1); } @@ -3729,9 +3891,9 @@ int main(int argc, char *argv[]) { } } else #endif - if (ipv4 != NULL) { + if (ipv4 != NULL) { hydra_targets[i]->ip[0] = 4; - memcpy(&hydra_targets[i]->ip[1], (char *) &ipv4->sin_addr, 4); + memcpy(&hydra_targets[i]->ip[1], (char *)&ipv4->sin_addr, 4); } else { if (verbose) printf("[failed for %s] ", hydra_targets[i]->target); @@ -3745,7 +3907,8 @@ int main(int argc, char *argv[]) { // restore device information if present if (device != NULL) { *(device - 1) = '%'; - fprintf(stderr, "[WARNING] not all modules support BINDTODEVICE for IPv6 link local addresses, e.g. SSH does not\n"); + fprintf(stderr, "[WARNING] not all modules support BINDTODEVICE for IPv6 " + "link local addresses, e.g. SSH does not\n"); } } if (verbose) @@ -3755,12 +3918,16 @@ int main(int argc, char *argv[]) { #ifndef SO_BINDTODEVICE if (device != NULL) { - fprintf(stderr, "[ERROR] your operating system does not support SO_BINDTODEVICE or IP_FORCE_OUT_IFP, dunno how to bind the IPv6 address to the interface %s!\n", device); + fprintf(stderr, + "[ERROR] your operating system does not support SO_BINDTODEVICE or " + "IP_FORCE_OUT_IFP, dunno how to bind the IPv6 address to the " + "interface %s!\n", + device); } #endif if (hydra_options.restore == 0) { - hydra_heads = malloc(sizeof(hydra_head*) * hydra_options.max_use); + hydra_heads = malloc(sizeof(hydra_head *) * hydra_options.max_use); target_no = 0; for (i = 0; i < hydra_options.max_use; i++) { hydra_heads[i] = malloc(sizeof(hydra_head)); @@ -3770,7 +3937,8 @@ int main(int argc, char *argv[]) { // here we call the init function of the relevant service module // should we do the init centrally or should each child do that? // that depends largely on the number of targets and maximum tasks - // if (hydra_brains.targets == 1 || (hydra_brains.targets < 4 && hydra_options.tasks / hydra_brains.targets > 4 && hydra_brains.todo > 15)) + // if (hydra_brains.targets == 1 || (hydra_brains.targets < 4 && + // hydra_options.tasks / hydra_brains.targets > 4 && hydra_brains.todo > 15)) for (i = 0; i < hydra_brains.targets; i++) hydra_service_init(i); @@ -3779,11 +3947,12 @@ int main(int argc, char *argv[]) { fflush(stderr); fflush(hydra_brains.ofp); - #if OPENSSL_VERSION_NUMBER >= 0x10100000L if (hydra_options.ssl) { fprintf(stderr, "[WARNING] *****************************************************\n"); - fprintf(stderr, "[WARNING] OPENSSL v1.1 development changes are active - modules SMB, SNMP, RDP, ORACLE LISTENER and SSL in general might not work properly! Please test and report to vh@thc.org.\n"); + fprintf(stderr, "[WARNING] OPENSSL v1.1 development changes are active - modules " + "SMB, SNMP, RDP, ORACLE LISTENER and SSL in general might not work " + "properly! Please test and report to vh@thc.org.\n"); fprintf(stderr, "[WARNING] *****************************************************\n"); } #endif @@ -3791,7 +3960,8 @@ int main(int argc, char *argv[]) { hydra_debug(0, "attack"); process_restore = 1; - // this is the big function which starts the attacking children, feeds login/password pairs, etc.! + // this is the big function which starts the attacking children, feeds + // login/password pairs, etc.! while (exit_condition == 0) { memset(&fdreadheads, 0, sizeof(fdreadheads)); max_fd = 0; @@ -3825,10 +3995,12 @@ int main(int argc, char *argv[]) { printf("[DEBUG] child %d got target %d selected\n", head_no, hydra_heads[head_no]->target_no); if (hydra_heads[head_no]->target_no < 0) { if (debug) - printf("[DEBUG] hydra_select_target() reports no more targets left\n"); + printf("[DEBUG] hydra_select_target() reports no more targets " + "left\n"); hydra_kill_head(head_no, 0, 3); } else - hydra_spawn_head(head_no, hydra_heads[head_no]->target_no); // target_no is ignored if head->redo == 1 + hydra_spawn_head(head_no, + hydra_heads[head_no]->target_no); // target_no is ignored if head->redo == 1 } break; case HEAD_ACTIVE: @@ -3836,7 +4008,7 @@ int main(int argc, char *argv[]) { do_switch = 1; if (hydra_options.time_next_attempt > 0) { if (last_attempt + hydra_options.time_next_attempt >= time(NULL)) { - if (recv(hydra_heads[head_no]->sp[0], &rc, 1, MSG_PEEK) == 1 && (rc == 'N' || rc == 'n')) + if (recv(hydra_heads[head_no]->sp[0], &rc, 1, MSG_PEEK) == 1 && (rc == 'N' || rc == 'n')) do_switch = 0; } else last_attempt = time(NULL); @@ -3850,86 +4022,81 @@ int main(int argc, char *argv[]) { printf("[DEBUG] head_no[%d] read %c\n", head_no, rc); switch (rc) { // Valid Results: - // n - mother says to itself that child requests next login/password pair - // N - child requests next login/password pair - // Q - child reports that it is quitting - // C - child reports connect error (and is quitting) - // E - child reports protocol error (and is quitting) - // f - child reports that the username does not exist - // F - child reports that it found a valid login/password pair - // and requests next pair. Sends login/pw pair with next msg! - case 'N': // head wants next pair + // n - mother says to itself that child requests next + // login/password pair N - child requests next login/password + // pair Q - child reports that it is quitting C - child reports + // connect error (and is quitting) E - child reports protocol + // error (and is quitting) f - child reports that the username + // does not exist F - child reports that it found a valid + // login/password pair + // and requests next pair. Sends login/pw pair with next + // msg! + case 'N': // head wants next pair hydra_targets[hydra_heads[head_no]->target_no]->ok = 1; if (hydra_targets[hydra_heads[head_no]->target_no]->fail_count > 0) hydra_targets[hydra_heads[head_no]->target_no]->fail_count--; // no break here - case 'n': // mother sends this to itself initially + case 'n': // mother sends this to itself initially loop_cnt = 0; if (hydra_send_next_pair(hydra_heads[head_no]->target_no, head_no) == -1) hydra_kill_head(head_no, 1, 0); break; - - case 'F': // valid password found + + case 'F': // valid password found hydra_brains.found++; if (colored_output) { if (hydra_heads[head_no]->current_login_ptr == NULL || strlen(hydra_heads[head_no]->current_login_ptr) == 0) { if (hydra_heads[head_no]->current_pass_ptr == NULL || strlen(hydra_heads[head_no]->current_pass_ptr) == 0) - printf("[\e[1;32m%d\e[0m][\e[1;32m%s\e[0m] host: \e[1;32m%s\e[0m\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, - hydra_targets[hydra_heads[head_no]->target_no]->target); + printf("[\e[1;32m%d\e[0m][\e[1;32m%s\e[0m] host: " + "\e[1;32m%s\e[0m\n", + hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, hydra_targets[hydra_heads[head_no]->target_no]->target); else - printf("[\e[1;32m%d\e[0m][\e[1;32m%s\e[0m] host: \e[1;32m%s\e[0m password: \e[1;32m%s\e[0m\n", hydra_targets[hydra_heads[head_no]->target_no]->port, - hydra_options.service, hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_pass_ptr); + printf("[\e[1;32m%d\e[0m][\e[1;32m%s\e[0m] host: " + "\e[1;32m%s\e[0m password: \e[1;32m%s\e[0m\n", + hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_pass_ptr); } else if (hydra_heads[head_no]->current_pass_ptr == NULL || strlen(hydra_heads[head_no]->current_pass_ptr) == 0) { - printf("[\e[1;32m%d\e[0m][\e[1;32m%s\e[0m] host: \e[1;32m%s\e[0m login: \e[1;32m%s\e[0m\n", hydra_targets[hydra_heads[head_no]->target_no]->port, - hydra_options.service, hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr); + printf("[\e[1;32m%d\e[0m][\e[1;32m%s\e[0m] host: " + "\e[1;32m%s\e[0m login: \e[1;32m%s\e[0m\n", + hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr); } else - printf("[\e[1;32m%d\e[0m][\e[1;32m%s\e[0m] host: \e[1;32m%s\e[0m login: \e[1;32m%s\e[0m password: \e[1;32m%s\e[0m\n", - hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, hydra_targets[hydra_heads[head_no]->target_no]->target, - hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr); + printf("[\e[1;32m%d\e[0m][\e[1;32m%s\e[0m] host: " + "\e[1;32m%s\e[0m login: \e[1;32m%s\e[0m password: " + "\e[1;32m%s\e[0m\n", + hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr); } else { if (hydra_heads[head_no]->current_login_ptr == NULL || strlen(hydra_heads[head_no]->current_login_ptr) == 0) { if (hydra_heads[head_no]->current_pass_ptr == NULL || strlen(hydra_heads[head_no]->current_pass_ptr) == 0) - printf("[%d][%s] host: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, - hydra_targets[hydra_heads[head_no]->target_no]->target); + printf("[%d][%s] host: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, hydra_targets[hydra_heads[head_no]->target_no]->target); else - printf("[%d][%s] host: %s password: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, - hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_pass_ptr); + printf("[%d][%s] host: %s password: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_pass_ptr); } else if (hydra_heads[head_no]->current_pass_ptr == NULL || strlen(hydra_heads[head_no]->current_pass_ptr) == 0) { - printf("[%d][%s] host: %s login: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, - hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr); + printf("[%d][%s] host: %s login: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr); } else - printf("[%d][%s] host: %s login: %s password: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, - hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr); + printf("[%d][%s] host: %s login: %s password: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr); } if (hydra_options.outfile_format == FORMAT_JSONV1 && hydra_options.outfile_ptr != NULL && hydra_brains.ofp != NULL) { - fprintf(hydra_brains.ofp, "%s\n\t{\"port\": %d, \"service\": \"%s\", \"host\": \"%s\", \"login\": \"%s\", \"password\": \"%s\"}", - hydra_brains.found == 1 ? "" : ",", // prefix a comma if not first finding - hydra_targets[hydra_heads[head_no]->target_no]->port, - hydra_options.service, - hydra_targets[hydra_heads[head_no]->target_no]->target !=NULL ? hydra_targets[hydra_heads[head_no]->target_no]->target : "", - hydra_heads[head_no]->current_login_ptr !=NULL ? hydra_string_replace(hydra_heads[head_no]->current_login_ptr,"\"","\\\"") : "", - hydra_heads[head_no]->current_pass_ptr != NULL ? hydra_string_replace(hydra_heads[head_no]->current_pass_ptr,"\"","\\\"") : "" - ); + fprintf(hydra_brains.ofp, + "%s\n\t{\"port\": %d, \"service\": \"%s\", \"host\": " + "\"%s\", \"login\": \"%s\", \"password\": \"%s\"}", + hydra_brains.found == 1 ? "" : ",", // prefix a comma if not first finding + hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, hydra_targets[hydra_heads[head_no]->target_no]->target != NULL ? hydra_targets[hydra_heads[head_no]->target_no]->target : "", hydra_heads[head_no]->current_login_ptr != NULL ? hydra_string_replace(hydra_heads[head_no]->current_login_ptr, "\"", "\\\"") : "", hydra_heads[head_no]->current_pass_ptr != NULL ? hydra_string_replace(hydra_heads[head_no]->current_pass_ptr, "\"", "\\\"") : ""); fflush(hydra_brains.ofp); - } else if (hydra_options.outfile_ptr != NULL && hydra_brains.ofp != NULL) { // else output format == 0 aka text + } else if (hydra_options.outfile_ptr != NULL && hydra_brains.ofp != NULL) { // else output format == 0 aka text if (hydra_heads[head_no]->current_login_ptr == NULL || strlen(hydra_heads[head_no]->current_login_ptr) == 0) { if (hydra_heads[head_no]->current_pass_ptr == NULL || strlen(hydra_heads[head_no]->current_pass_ptr) == 0) - fprintf(hydra_brains.ofp, "[%d][%s] host: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, - hydra_targets[hydra_heads[head_no]->target_no]->target); + fprintf(hydra_brains.ofp, "[%d][%s] host: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, hydra_targets[hydra_heads[head_no]->target_no]->target); else - fprintf(hydra_brains.ofp, "[%d][%s] host: %s password: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, - hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_pass_ptr); + fprintf(hydra_brains.ofp, "[%d][%s] host: %s password: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_pass_ptr); } else if (hydra_heads[head_no]->current_pass_ptr == NULL || strlen(hydra_heads[head_no]->current_pass_ptr) == 0) { - fprintf(hydra_brains.ofp, "[%d][%s] host: %s login: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, - hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr); + fprintf(hydra_brains.ofp, "[%d][%s] host: %s login: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr); } else - fprintf(hydra_brains.ofp, "[%d][%s] host: %s login: %s password: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, - hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr); + fprintf(hydra_brains.ofp, "[%d][%s] host: %s login: %s password: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr); fflush(hydra_brains.ofp); } - if (hydra_options.exit_found) { // option set says quit target after on valid login/pass pair is found + if (hydra_options.exit_found) { // option set says quit target after on + // valid login/pass pair is found if (hydra_targets[hydra_heads[head_no]->target_no]->done == TARGET_ACTIVE) { - hydra_targets[hydra_heads[head_no]->target_no]->done = TARGET_FINISHED; // mark target as done + hydra_targets[hydra_heads[head_no]->target_no]->done = TARGET_FINISHED; // mark target as done hydra_brains.finished++; printf("[STATUS] attack finished for %s (valid pair found)\n", hydra_targets[hydra_heads[head_no]->target_no]->target); } @@ -3938,7 +4105,7 @@ int main(int argc, char *argv[]) { if (hydra_targets[j]->done == TARGET_ACTIVE) { hydra_targets[j]->done = TARGET_FINISHED; hydra_brains.finished++; - } + } } for (j = 0; j < hydra_options.max_use; j++) if (hydra_heads[j]->active >= 0 && (hydra_heads[j]->target_no == target_no || hydra_options.exit_found == 2)) { @@ -3950,7 +4117,7 @@ int main(int argc, char *argv[]) { continue; } // fall through - case 'f': // username identified as invalid + case 'f': // username identified as invalid hydra_targets[hydra_heads[head_no]->target_no]->ok = 1; if (hydra_targets[hydra_heads[head_no]->target_no]->fail_count > 0) hydra_targets[hydra_heads[head_no]->target_no]->fail_count--; @@ -3959,34 +4126,40 @@ int main(int argc, char *argv[]) { hydra_skip_user(hydra_heads[head_no]->target_no, buf); fck = write(hydra_heads[head_no]->sp[1], "n", 1); // small hack break; - + // we do not make a difference between 'C' and 'E' results - yet - case 'E': // head reports protocol error - case 'C': // head reports connect error + case 'E': // head reports protocol error + case 'C': // head reports connect error fck = write(hydra_heads[head_no]->sp[0], "Q", 1); if (debug) { - printf("[ATTEMPT-ERROR] target %s - login \"%s\" - pass \"%s\" - child %d - %" hPRIu64 " of %" hPRIu64 "\n", - hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, head_no, - hydra_targets[hydra_heads[head_no]->target_no]->sent, hydra_brains.todo); + printf("[ATTEMPT-ERROR] target %s - login \"%s\" - pass " + "\"%s\" - child %d - %" hPRIu64 " of %" hPRIu64 "\n", + hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, head_no, hydra_targets[hydra_heads[head_no]->target_no]->sent, hydra_brains.todo); } hydra_increase_fail_count(hydra_heads[head_no]->target_no, head_no); break; - case 'Q': // head reports its quitting + case 'Q': // head reports its quitting fck = write(hydra_heads[head_no]->sp[0], "Q", 1); if (debug) printf("[DEBUG] child %d reported it quit\n", head_no); hydra_kill_head(head_no, 1, 0); break; - + default: - fprintf(stderr, "[ERROR] child %d sent nonsense data, killing and restarting it!\n", head_no); + fprintf(stderr, + "[ERROR] child %d sent nonsense data, killing and " + "restarting it!\n", + head_no); hydra_increase_fail_count(hydra_heads[head_no]->target_no, head_no); } // end switch - } // readres + } // readres if (readres == -1) { if (verbose) - fprintf(stderr, "[WARNING] child %d seems to have died, restarting (this only happens if a module is bad) ... \n", head_no); + fprintf(stderr, + "[WARNING] child %d seems to have died, restarting " + "(this only happens if a module is bad) ... \n", + head_no); hydra_increase_fail_count(hydra_heads[head_no]->target_no, head_no); } } // end do_switch @@ -3996,11 +4169,15 @@ int main(int argc, char *argv[]) { if (tmp_time > waittime + hydra_heads[head_no]->last_seen) { if (kill(hydra_heads[head_no]->pid, 0) < 0) { if (verbose) - fprintf(stderr, "[WARNING] child %d seems to be dead, restarting it ...\n", head_no); + fprintf(stderr, + "[WARNING] child %d seems to be dead, restarting it " + "...\n", + head_no); hydra_increase_fail_count(hydra_heads[head_no]->target_no, head_no); } } - // if we do not get to hear anything for a longer time assume its dead + // if we do not get to hear anything for a longer time assume its + // dead if (tmp_time > waittime * 2 + hydra_heads[head_no]->last_seen) { if (verbose) fprintf(stderr, "[WARNING] timeout from child %d, restarting\n", head_no); @@ -4014,10 +4191,11 @@ int main(int argc, char *argv[]) { hydra_increase_fail_count(hydra_heads[head_no]->target_no, head_no); } } - //if (debug) printf("DEBUG: bug hunt: %lu %lu\n", hydra_brains.todo_all, hydra_brains.sent); + // if (debug) printf("DEBUG: bug hunt: %lu %lu\n", hydra_brains.todo_all, + // hydra_brains.sent); usleepn(USLEEP_LOOP); - (void) wait3(NULL, WNOHANG, NULL); + (void)wait3(NULL, WNOHANG, NULL); // write restore file and report status if (process_restore == 1 && time(NULL) - elapsed_restore > 299) { hydra_restore_write(0); @@ -4044,15 +4222,14 @@ int main(int argc, char *argv[]) { for (j = 0; j < hydra_options.max_use; j++) if (hydra_heads[j]->active >= HEAD_UNUSED) k++; - printf("[STATUS] %.2f tries/min, %" hPRIu64 " tries in %02" hPRIu64 ":%02" hPRIu64 "h, %" hPRIu64 " to do in %02" hPRIu64 ":%02" hPRIu64 "h, %d active\n", (1.0 * hydra_brains.sent) / (((elapsed_status - starttime) * 1.0) / 60), // tries/min - hydra_brains.sent, // tries - (uint64_t) ((elapsed_status - starttime) / 3600), // hours - (uint64_t) (((elapsed_status - starttime) % 3600) / 60), // minutes - (hydra_brains.todo_all + total_redo_count) - hydra_brains.sent != 0 ? (hydra_brains.todo_all + total_redo_count) - hydra_brains.sent : 1, // left todo - (uint64_t) (((double) (hydra_brains.todo_all + total_redo_count) - hydra_brains.sent) / ((double) hydra_brains.sent / (elapsed_status - starttime)) - ) / 3600, // hours - (((uint64_t) (((double) (hydra_brains.todo_all + total_redo_count) - hydra_brains.sent) / ((double) hydra_brains.sent / (elapsed_status - starttime)) - ) % 3600) / 60) + 1, // min + printf("[STATUS] %.2f tries/min, %" hPRIu64 " tries in %02" hPRIu64 ":%02" hPRIu64 "h, %" hPRIu64 " to do in %02" hPRIu64 ":%02" hPRIu64 "h, %d active\n", + (1.0 * hydra_brains.sent) / (((elapsed_status - starttime) * 1.0) / 60), // tries/min + hydra_brains.sent, // tries + (uint64_t)((elapsed_status - starttime) / 3600), // hours + (uint64_t)(((elapsed_status - starttime) % 3600) / 60), // minutes + (hydra_brains.todo_all + total_redo_count) - hydra_brains.sent != 0 ? (hydra_brains.todo_all + total_redo_count) - hydra_brains.sent : 1, // left todo + (uint64_t)(((double)(hydra_brains.todo_all + total_redo_count) - hydra_brains.sent) / ((double)hydra_brains.sent / (elapsed_status - starttime))) / 3600, // hours + (((uint64_t)(((double)(hydra_brains.todo_all + total_redo_count) - hydra_brains.sent) / ((double)hydra_brains.sent / (elapsed_status - starttime))) % 3600) / 60) + 1, // min k); hydra_debug(0, "STATUS"); } @@ -4089,9 +4266,7 @@ int main(int argc, char *argv[]) { fprintf(stderr, "[ERROR] illegal target result value (%d=>%d)\n", i, hydra_targets[i]->done); } - printf("%d of %d target%s%scompleted, %" hPRIu64 " valid password", - hydra_brains.targets - j - k - error, hydra_brains.targets, hydra_brains.targets == 1 ? " " : "s ", - hydra_brains.found > 0 ? "successfully " : "", hydra_brains.found); + printf("%d of %d target%s%scompleted, %" hPRIu64 " valid password", hydra_brains.targets - j - k - error, hydra_brains.targets, hydra_brains.targets == 1 ? " " : "s ", hydra_brains.found > 0 ? "successfully " : "", hydra_brains.found); printf("%s", hydra_brains.found < 2 ? "" : "s"); printf(" found\n"); @@ -4106,10 +4281,14 @@ int main(int argc, char *argv[]) { unlink(RESTOREFILE); } else { if (hydra_options.cidr == 0 && k == 0) { - printf("[INFO] Writing restore file because %d server scan%s could not be completed\n", j + error, j + error == 1 ? "" : "s"); + printf("[INFO] Writing restore file because %d server scan%s could not " + "be completed\n", + j + error, j + error == 1 ? "" : "s"); hydra_restore_write(1); } else if (k > 0) { - printf("[WARNING] Writing restore file because %d final worker threads did not complete until end.\n", k); + printf("[WARNING] Writing restore file because %d final worker threads " + "did not complete until end.\n", + k); hydra_restore_write(1); } } @@ -4119,49 +4298,51 @@ int main(int argc, char *argv[]) { for (i = 0; i < hydra_options.max_use; i++) if (hydra_heads[i]->active == HEAD_ACTIVE && hydra_heads[i]->pid > 0) hydra_kill_head(i, 1, 3); - (void) wait3(NULL, WNOHANG, NULL); + (void)wait3(NULL, WNOHANG, NULL); -#define STRMAX (10*1024) - char json_error[STRMAX+2], tmp_str[STRMAX+2]; - memset(json_error, 0, STRMAX+2); - memset(tmp_str, 0, STRMAX+2); +#define STRMAX (10 * 1024) + char json_error[STRMAX + 2], tmp_str[STRMAX + 2]; + memset(json_error, 0, STRMAX + 2); + memset(tmp_str, 0, STRMAX + 2); if (error) { snprintf(tmp_str, STRMAX, "[ERROR] %d target%s disabled because of too many errors", error, error == 1 ? " was" : "s were"); fprintf(stderr, "%s\n", tmp_str); - strncat(json_error,"\"",STRMAX); - strncat(json_error,tmp_str,STRMAX); - strncat(json_error,"\"",STRMAX); + strncat(json_error, "\"", STRMAX); + strncat(json_error, tmp_str, STRMAX); + strncat(json_error, "\"", STRMAX); error = 1; } if (k) { snprintf(tmp_str, STRMAX, "[ERROR] %d target%s did not resolve or could not be connected", k, k == 1 ? "" : "s"); fprintf(stderr, "%s\n", tmp_str); if (*json_error) { - strncat(json_error,", ", STRMAX); + strncat(json_error, ", ", STRMAX); } - strncat(json_error,"\"",STRMAX); - strncat(json_error,tmp_str,STRMAX); - strncat(json_error,"\"",STRMAX); + strncat(json_error, "\"", STRMAX); + strncat(json_error, tmp_str, STRMAX); + strncat(json_error, "\"", STRMAX); error = 1; } if (error) { snprintf(tmp_str, STRMAX, "[ERROR] %d target%s did not complete", j, j < 1 ? "" : "s"); fprintf(stderr, "%s\n", tmp_str); if (*json_error) { - strncat(json_error,", ", STRMAX); + strncat(json_error, ", ", STRMAX); } - strncat(json_error,"\"",STRMAX); - strncat(json_error,tmp_str,STRMAX); - strncat(json_error,"\"",STRMAX); + strncat(json_error, "\"", STRMAX); + strncat(json_error, tmp_str, STRMAX); + strncat(json_error, "\"", STRMAX); error = 1; } // yeah we did it printf("%s (%s) finished at %s\n", PROGRAM, RESOURCE, hydra_build_time()); if (hydra_brains.ofp != NULL && hydra_brains.ofp != stdout) { if (hydra_options.outfile_format == FORMAT_JSONV1) { - fprintf(hydra_brains.ofp, "\n\t],\n\"success\": %s,\n\"errormessages\": [ %s ],\n\"quantityfound\": %" hPRIu64 " }\n", + fprintf(hydra_brains.ofp, + "\n\t],\n\"success\": %s,\n\"errormessages\": [ %s " + "],\n\"quantityfound\": %" hPRIu64 " }\n", (error ? "false" : "true"), json_error, hydra_brains.found); - } + } fclose(hydra_brains.ofp); } diff --git a/hydra.h b/hydra.h index dc158ec..53b52d5 100644 --- a/hydra.h +++ b/hydra.h @@ -2,200 +2,186 @@ #include #ifdef __sun - #include +#include #elif defined(__FreeBSD__) || defined(__IBMCPP__) || defined(_AIX) || defined(__APPLE__) - #include +#include #else - #include +#include #endif #if defined(_INTTYPES_H) || defined(__CLANG_INTTYPES_H) - #define hPRIu64 PRIu64 +#define hPRIu64 PRIu64 #else - #define hPRIu64 "lu" +#define hPRIu64 "lu" #endif -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include +#include +#include +#include +#include #include #include -#include -#include -#include +#include +#include +#include +#include +#include #include +#include +#include +#include +#include #include -#include +#include +#include #ifdef HAVE_OPENSSL - #define HYDRA_SSL +#define HYDRA_SSL #endif #ifdef HAVE_SSL - #ifndef HYDRA_SSL - #define HYDRA_SSL - #endif +#ifndef HYDRA_SSL +#define HYDRA_SSL +#endif #endif #ifdef LIBSSH - #include +#include #endif #ifdef HAVE_ZLIB - #include +#include #endif #define OPTION_SSL 1 #ifdef LIBOPENSSL - #ifndef NO_RSA_LEGACY - #if OPENSSL_VERSION_NUMBER >= 0x10100000L - #define NO_RSA_LEGACY - #endif - #endif +#ifndef NO_RSA_LEGACY +#if OPENSSL_VERSION_NUMBER >= 0x10100000L +#define NO_RSA_LEGACY +#endif +#endif #endif -#define PORT_NOPORT -1 -#define PORT_FTP 21 -#define PORT_FTP_SSL 990 -#define PORT_TELNET 23 -#define PORT_TELNET_SSL 992 -#define PORT_HTTP 80 -#define PORT_HTTP_SSL 443 +#define PORT_NOPORT -1 +#define PORT_FTP 21 +#define PORT_FTP_SSL 990 +#define PORT_TELNET 23 +#define PORT_TELNET_SSL 992 +#define PORT_HTTP 80 +#define PORT_HTTP_SSL 443 #define PORT_HTTP_PROXY 3128 #define PORT_HTTP_PROXY_SSL 3128 -#define PORT_POP3 110 -#define PORT_POP3_SSL 995 -#define PORT_NNTP 119 -#define PORT_NNTP_SSL 563 -#define PORT_SMB 139 -#define PORT_SMB_SSL 139 -#define PORT_SMBNT 445 -#define PORT_SMBNT_SSL 445 -#define PORT_IMAP 143 -#define PORT_IMAP_SSL 993 -#define PORT_LDAP 389 -#define PORT_LDAP_SSL 636 -#define PORT_REXEC 512 -#define PORT_REXEC_SSL 512 -#define PORT_RLOGIN 513 -#define PORT_RLOGIN_SSL 513 -#define PORT_RSH 514 -#define PORT_RSH_SSL 514 -#define PORT_SOCKS5 1080 +#define PORT_POP3 110 +#define PORT_POP3_SSL 995 +#define PORT_NNTP 119 +#define PORT_NNTP_SSL 563 +#define PORT_SMB 139 +#define PORT_SMB_SSL 139 +#define PORT_SMBNT 445 +#define PORT_SMBNT_SSL 445 +#define PORT_IMAP 143 +#define PORT_IMAP_SSL 993 +#define PORT_LDAP 389 +#define PORT_LDAP_SSL 636 +#define PORT_REXEC 512 +#define PORT_REXEC_SSL 512 +#define PORT_RLOGIN 513 +#define PORT_RLOGIN_SSL 513 +#define PORT_RSH 514 +#define PORT_RSH_SSL 514 +#define PORT_SOCKS5 1080 #define PORT_SOCKS5_SSL 1080 -#define PORT_ICQ 4000 -#define PORT_ICQ_SSL -1 -#define PORT_VNC 5900 -#define PORT_VNC_SSL 5901 -#define PORT_PCNFS 0 -#define PORT_PCNFS_SSL -1 -#define PORT_MYSQL 3306 -#define PORT_MYSQL_SSL 3306 -#define PORT_MSSQL 1433 -#define PORT_MSSQL_SSL 1433 -#define PORT_POSTGRES 5432 +#define PORT_ICQ 4000 +#define PORT_ICQ_SSL -1 +#define PORT_VNC 5900 +#define PORT_VNC_SSL 5901 +#define PORT_PCNFS 0 +#define PORT_PCNFS_SSL -1 +#define PORT_MYSQL 3306 +#define PORT_MYSQL_SSL 3306 +#define PORT_MSSQL 1433 +#define PORT_MSSQL_SSL 1433 +#define PORT_POSTGRES 5432 #define PORT_POSTGRES_SSL 5432 -#define PORT_ORACLE 1521 +#define PORT_ORACLE 1521 #define PORT_ORACLE_SSL 1521 #define PORT_PCANYWHERE 5631 #define PORT_PCANYWHERE_SSL 5631 -#define PORT_ADAM6500 502 -#define PORT_ADAM6500_SSL 502 -#define PORT_SAPR3 -1 -#define PORT_SAPR3_SSL -1 -#define PORT_SSH 22 -#define PORT_SSH_SSL 22 -#define PORT_SNMP 161 -#define PORT_SNMP_SSL 1993 -#define PORT_CVS 2401 -#define PORT_CVS_SSL 2401 -#define PORT_FIREBIRD 3050 +#define PORT_ADAM6500 502 +#define PORT_ADAM6500_SSL 502 +#define PORT_SAPR3 -1 +#define PORT_SAPR3_SSL -1 +#define PORT_SSH 22 +#define PORT_SSH_SSL 22 +#define PORT_SNMP 161 +#define PORT_SNMP_SSL 1993 +#define PORT_CVS 2401 +#define PORT_CVS_SSL 2401 +#define PORT_FIREBIRD 3050 #define PORT_FIREBIRD_SSL 3050 -#define PORT_AFP 548 -#define PORT_AFP_SSL 548 -#define PORT_NCP 524 -#define PORT_NCP_SSL 524 -#define PORT_SVN 3690 -#define PORT_SVN_SSL 3690 -#define PORT_SMTP 25 +#define PORT_AFP 548 +#define PORT_AFP_SSL 548 +#define PORT_NCP 524 +#define PORT_NCP_SSL 524 +#define PORT_SVN 3690 +#define PORT_SVN_SSL 3690 +#define PORT_SMTP 25 #define PORT_SMTP_SSL 465 -#define PORT_TEAMSPEAK 8767 +#define PORT_TEAMSPEAK 8767 #define PORT_TEAMSPEAK_SSL 8767 -#define PORT_SIP 5060 -#define PORT_SIP_SSL 5061 -#define PORT_VMAUTHD 902 -#define PORT_VMAUTHD_SSL 902 -#define PORT_XMPP 5222 -#define PORT_XMPP_SSL 5223 -#define PORT_IRC 6667 -#define PORT_IRC_SSL 6697 -#define PORT_RDP 3389 -#define PORT_RDP_SSL 3389 -#define PORT_ASTERISK 5038 -#define PORT_ASTERISK_SSL 5038 -#define PORT_S7_300 102 -#define PORT_S7_300_SSL 102 -#define PORT_REDIS 6379 -#define PORT_REDIS_SSL 6379 -#define PORT_RTSP 554 -#define PORT_RTSP_SSL 554 -#define PORT_RPCAP 2002 -#define PORT_RPCAP_SSL 2002 -#define PORT_RADMIN2 4899 -#define PORT_MCACHED 11211 -#define PORT_MCACHED_SSL 11211 -#define PORT_MONGODB 27017 +#define PORT_SIP 5060 +#define PORT_SIP_SSL 5061 +#define PORT_VMAUTHD 902 +#define PORT_VMAUTHD_SSL 902 +#define PORT_XMPP 5222 +#define PORT_XMPP_SSL 5223 +#define PORT_IRC 6667 +#define PORT_IRC_SSL 6697 +#define PORT_RDP 3389 +#define PORT_RDP_SSL 3389 +#define PORT_ASTERISK 5038 +#define PORT_ASTERISK_SSL 5038 +#define PORT_S7_300 102 +#define PORT_S7_300_SSL 102 +#define PORT_REDIS 6379 +#define PORT_REDIS_SSL 6379 +#define PORT_RTSP 554 +#define PORT_RTSP_SSL 554 +#define PORT_RPCAP 2002 +#define PORT_RPCAP_SSL 2002 +#define PORT_RADMIN2 4899 +#define PORT_MCACHED 11211 +#define PORT_MCACHED_SSL 11211 +#define PORT_MONGODB 27017 #define False 0 -#define True 1 +#define True 1 #ifndef INET_ADDRSTRLEN - #define INET_ADDRSTRLEN 16 +#define INET_ADDRSTRLEN 16 #endif #define MAX_PROXY_COUNT 64 #ifndef _WIN32 - int32_t sleepn(time_t seconds); - int32_t usleepn(uint64_t useconds); +int32_t sleepn(time_t seconds); +int32_t usleepn(uint64_t useconds); #else - int32_t sleepn(uint32_t seconds); - int32_t usleepn(uint32_t useconds); +int32_t sleepn(uint32_t seconds); +int32_t usleepn(uint32_t useconds); #endif -typedef enum { - MODE_PASSWORD_LIST = 1, - MODE_LOGIN_LIST = 2, - MODE_PASSWORD_BRUTE = 4, - MODE_PASSWORD_REVERSE = 8, - MODE_PASSWORD_NULL = 16, - MODE_PASSWORD_SAME = 32, - MODE_COLON_FILE = 64 -} hydra_mode_t; +typedef enum { MODE_PASSWORD_LIST = 1, MODE_LOGIN_LIST = 2, MODE_PASSWORD_BRUTE = 4, MODE_PASSWORD_REVERSE = 8, MODE_PASSWORD_NULL = 16, MODE_PASSWORD_SAME = 32, MODE_COLON_FILE = 64 } hydra_mode_t; -typedef enum { - FORMAT_PLAIN_TEXT, - FORMAT_JSONV1, - FORMAT_JSONV2, - FORMAT_XMLV1 -} output_format_t; +typedef enum { FORMAT_PLAIN_TEXT, FORMAT_JSONV1, FORMAT_JSONV2, FORMAT_XMLV1 } output_format_t; typedef struct { hydra_mode_t mode; - int32_t loop_mode; // valid modes: 0 = password, 1 = user + int32_t loop_mode; // valid modes: 0 = password, 1 = user int32_t ssl; int32_t restore; - int32_t debug; // is external - for restore - int32_t verbose; // is external - for restore + int32_t debug; // is external - for restore + int32_t verbose; // is external - for restore int32_t showAttempt; int32_t tasks; int32_t try_null_password; @@ -213,9 +199,9 @@ typedef struct { char *outfile_ptr; char *infile_ptr; char *colonfile; - int32_t waittime; // is external - for restore - int32_t conwait; // is external - for restore - uint32_t port; // is external - for restore + int32_t waittime; // is external - for restore + int32_t conwait; // is external - for restore + uint32_t port; // is external - for restore char *miscptr; char *server; char *service; diff --git a/libpq-fe.h b/libpq-fe.h index d7cce84..28bf70d 100644 --- a/libpq-fe.h +++ b/libpq-fe.h @@ -35,81 +35,81 @@ extern "C" { /* Application-visible enum types */ - typedef enum { - /* - * Although it is okay to add to this list, values which become unused - * should never be removed, nor should constants be redefined - that - * would break compatibility with existing code. - */ - CONNECTION_OK, - CONNECTION_BAD, - /* Non-blocking mode only below here */ +typedef enum { + /* + * Although it is okay to add to this list, values which become unused + * should never be removed, nor should constants be redefined - that + * would break compatibility with existing code. + */ + CONNECTION_OK, + CONNECTION_BAD, + /* Non-blocking mode only below here */ - /* - * The existence of these should never be relied upon - they should - * only be used for user feedback or similar purposes. - */ - CONNECTION_STARTED, /* Waiting for connection to be made. */ - CONNECTION_MADE, /* Connection OK; waiting to send. */ - CONNECTION_AWAITING_RESPONSE, /* Waiting for a response from the - * postmaster. */ - CONNECTION_AUTH_OK, /* Received authentication; waiting for + /* + * The existence of these should never be relied upon - they should + * only be used for user feedback or similar purposes. + */ + CONNECTION_STARTED, /* Waiting for connection to be made. */ + CONNECTION_MADE, /* Connection OK; waiting to send. */ + CONNECTION_AWAITING_RESPONSE, /* Waiting for a response from the + * postmaster. */ + CONNECTION_AUTH_OK, /* Received authentication; waiting for * backend startup. */ - CONNECTION_SETENV, /* Negotiating environment. */ - CONNECTION_SSL_STARTUP, /* Negotiating SSL. */ - CONNECTION_NEEDED /* Internal state: connect() needed */ - } ConnStatusType; + CONNECTION_SETENV, /* Negotiating environment. */ + CONNECTION_SSL_STARTUP, /* Negotiating SSL. */ + CONNECTION_NEEDED /* Internal state: connect() needed */ +} ConnStatusType; - typedef enum { - PGRES_POLLING_FAILED = 0, - PGRES_POLLING_READING, /* These two indicate that one may */ - PGRES_POLLING_WRITING, /* use select before polling again. */ - PGRES_POLLING_OK, - PGRES_POLLING_ACTIVE /* unused; keep for awhile for backwards - * compatibility */ - } PostgresPollingStatusType; +typedef enum { + PGRES_POLLING_FAILED = 0, + PGRES_POLLING_READING, /* These two indicate that one may */ + PGRES_POLLING_WRITING, /* use select before polling again. */ + PGRES_POLLING_OK, + PGRES_POLLING_ACTIVE /* unused; keep for awhile for backwards + * compatibility */ +} PostgresPollingStatusType; - typedef enum { - PGRES_EMPTY_QUERY = 0, /* empty query string was executed */ - PGRES_COMMAND_OK, /* a query command that doesn't return - * anything was executed properly by the - * backend */ - PGRES_TUPLES_OK, /* a query command that returns tuples was - * executed properly by the backend, - * PGresult contains the result tuples */ - PGRES_COPY_OUT, /* Copy Out data transfer in progress */ - PGRES_COPY_IN, /* Copy In data transfer in progress */ - PGRES_BAD_RESPONSE, /* an unexpected response was recv'd from - * the backend */ - PGRES_NONFATAL_ERROR, /* notice or warning message */ - PGRES_FATAL_ERROR /* query failed */ - } ExecStatusType; +typedef enum { + PGRES_EMPTY_QUERY = 0, /* empty query string was executed */ + PGRES_COMMAND_OK, /* a query command that doesn't return + * anything was executed properly by the + * backend */ + PGRES_TUPLES_OK, /* a query command that returns tuples was + * executed properly by the backend, + * PGresult contains the result tuples */ + PGRES_COPY_OUT, /* Copy Out data transfer in progress */ + PGRES_COPY_IN, /* Copy In data transfer in progress */ + PGRES_BAD_RESPONSE, /* an unexpected response was recv'd from + * the backend */ + PGRES_NONFATAL_ERROR, /* notice or warning message */ + PGRES_FATAL_ERROR /* query failed */ +} ExecStatusType; - typedef enum { - PQTRANS_IDLE, /* connection idle */ - PQTRANS_ACTIVE, /* command in progress */ - PQTRANS_INTRANS, /* idle, within transaction block */ - PQTRANS_INERROR, /* idle, within failed transaction */ - PQTRANS_UNKNOWN /* cannot determine status */ - } PGTransactionStatusType; +typedef enum { + PQTRANS_IDLE, /* connection idle */ + PQTRANS_ACTIVE, /* command in progress */ + PQTRANS_INTRANS, /* idle, within transaction block */ + PQTRANS_INERROR, /* idle, within failed transaction */ + PQTRANS_UNKNOWN /* cannot determine status */ +} PGTransactionStatusType; - typedef enum { - PQERRORS_TERSE, /* single-line error messages */ - PQERRORS_DEFAULT, /* recommended style */ - PQERRORS_VERBOSE /* all the facts, ma'am */ - } PGVerbosity; +typedef enum { + PQERRORS_TERSE, /* single-line error messages */ + PQERRORS_DEFAULT, /* recommended style */ + PQERRORS_VERBOSE /* all the facts, ma'am */ +} PGVerbosity; /* PGconn encapsulates a connection to the backend. * The contents of this struct are not supposed to be known to applications. */ - typedef struct pg_conn PGconn; +typedef struct pg_conn PGconn; /* PGresult encapsulates the result of a query (or more precisely, of a single * SQL command --- a query string given to PQsendQuery can contain multiple * commands and thus return multiple PGresult objects). * The contents of this struct are not supposed to be known to applications. */ - typedef struct pg_result PGresult; +typedef struct pg_result PGresult; /* PGnotify represents the occurrence of a NOTIFY message. * Ideally this would be an opaque typedef, but it's so simple that it's @@ -117,33 +117,33 @@ extern "C" { * NOTE: in Postgres 6.4 and later, the be_pid is the notifying backend's, * whereas in earlier versions it was always your own backend's PID. */ - typedef struct pgNotify { - char *relname; /* notification condition name */ - int32_t be_pid; /* process ID of server process */ - char *extra; /* notification parameter */ - } PGnotify; +typedef struct pgNotify { + char *relname; /* notification condition name */ + int32_t be_pid; /* process ID of server process */ + char *extra; /* notification parameter */ +} PGnotify; /* Function types for notice-handling callbacks */ - typedef void (*PQnoticeReceiver) (void *arg, const PGresult * res); - typedef void (*PQnoticeProcessor) (void *arg, const char *message); +typedef void (*PQnoticeReceiver)(void *arg, const PGresult *res); +typedef void (*PQnoticeProcessor)(void *arg, const char *message); /* Print options for PQprint() */ - typedef char pqbool; +typedef char pqbool; - typedef struct _PQprintOpt { - pqbool header; /* print output field headings and row - * count */ - pqbool align; /* fill align the fields */ - pqbool standard; /* old brain dead format */ - pqbool html3; /* output html tables */ - pqbool expanded; /* expand tables */ - pqbool pager; /* use pager for output if needed */ - char *fieldSep; /* field separator */ - char *tableOpt; /* insert to HTML */ - char *caption; /* HTML
*/ - char **fieldName; /* null terminated array of repalcement - * field names */ - } PQprintOpt; +typedef struct _PQprintOpt { + pqbool header; /* print output field headings and row + * count */ + pqbool align; /* fill align the fields */ + pqbool standard; /* old brain dead format */ + pqbool html3; /* output html tables */ + pqbool expanded; /* expand tables */ + pqbool pager; /* use pager for output if needed */ + char *fieldSep; /* field separator */ + char *tableOpt; /* insert to HTML */ + char *caption; /* HTML
*/ + char **fieldName; /* null terminated array of repalcement + * field names */ +} PQprintOpt; /* ---------------- * Structure for the conninfo parameter definitions returned by PQconndefaults @@ -153,32 +153,32 @@ extern "C" { * will release both the val strings and the PQconninfoOption array itself. * ---------------- */ - typedef struct _PQconninfoOption { - char *keyword; /* The keyword of the option */ - char *envvar; /* Fallback environment variable name */ - char *compiled; /* Fallback compiled in default value */ - char *val; /* Option's current value, or NULL */ - char *label; /* Label for field in connect dialog */ - char *dispchar; /* Character to display for this field in - * a connect dialog. Values are: "" - * Display entered value as is "*" - * Password field - hide value "D" Debug - * option - don't show by default */ - int32_t dispsize; /* Field size in characters for dialog */ - } PQconninfoOption; +typedef struct _PQconninfoOption { + char *keyword; /* The keyword of the option */ + char *envvar; /* Fallback environment variable name */ + char *compiled; /* Fallback compiled in default value */ + char *val; /* Option's current value, or NULL */ + char *label; /* Label for field in connect dialog */ + char *dispchar; /* Character to display for this field in + * a connect dialog. Values are: "" + * Display entered value as is "*" + * Password field - hide value "D" Debug + * option - don't show by default */ + int32_t dispsize; /* Field size in characters for dialog */ +} PQconninfoOption; /* ---------------- * PQArgBlock -- structure for PQfn() arguments * ---------------- */ - typedef struct { - int32_t len; - int32_t isint; - union { - int32_t *ptr; /* can't use void (dec compiler barfs) */ - int32_t integer; - } u; - } PQArgBlock; +typedef struct { + int32_t len; + int32_t isint; + union { + int32_t *ptr; /* can't use void (dec compiler barfs) */ + int32_t integer; + } u; +} PQArgBlock; /* ---------------- * Exported functions of libpq @@ -190,24 +190,23 @@ extern "C" { /* make a new client connection to the backend */ /* Asynchronous (non-blocking) */ - extern PGconn *PQconnectStart(const char *conninfo); - extern PostgresPollingStatusType PQconnectPoll(PGconn * conn); +extern PGconn *PQconnectStart(const char *conninfo); +extern PostgresPollingStatusType PQconnectPoll(PGconn *conn); /* Synchronous (blocking) */ - extern PGconn *PQconnectdb(const char *conninfo); - extern PGconn *PQsetdbLogin(const char *pghost, const char *pgport, const char *pgoptions, const char *pgtty, const char *dbName, const char *login, const char *pwd); +extern PGconn *PQconnectdb(const char *conninfo); +extern PGconn *PQsetdbLogin(const char *pghost, const char *pgport, const char *pgoptions, const char *pgtty, const char *dbName, const char *login, const char *pwd); -#define PQsetdb(M_PGHOST,M_PGPORT,M_PGOPT,M_PGTTY,M_DBNAME) \ - PQsetdbLogin(M_PGHOST, M_PGPORT, M_PGOPT, M_PGTTY, M_DBNAME, NULL, NULL) +#define PQsetdb(M_PGHOST, M_PGPORT, M_PGOPT, M_PGTTY, M_DBNAME) PQsetdbLogin(M_PGHOST, M_PGPORT, M_PGOPT, M_PGTTY, M_DBNAME, NULL, NULL) /* close the current connection and free the PGconn data structure */ - extern void PQfinish(PGconn * conn); +extern void PQfinish(PGconn *conn); /* get info about connection options known to PQconnectdb */ - extern PQconninfoOption *PQconndefaults(void); +extern PQconninfoOption *PQconndefaults(void); /* free the data structure returned by PQconndefaults() */ - extern void PQconninfoFree(PQconninfoOption * connOptions); +extern void PQconninfoFree(PQconninfoOption *connOptions); /* * close the current connection and restablish a new one with the same @@ -215,130 +214,124 @@ extern "C" { */ /* Asynchronous (non-blocking) */ - extern int32_t PQresetStart(PGconn * conn); - extern PostgresPollingStatusType PQresetPoll(PGconn * conn); +extern int32_t PQresetStart(PGconn *conn); +extern PostgresPollingStatusType PQresetPoll(PGconn *conn); /* Synchronous (blocking) */ - extern void PQreset(PGconn * conn); +extern void PQreset(PGconn *conn); /* issue a cancel request */ - extern int32_t PQrequestCancel(PGconn * conn); +extern int32_t PQrequestCancel(PGconn *conn); /* Accessor functions for PGconn objects */ - extern char *PQdb(const PGconn * conn); - extern char *PQuser(const PGconn * conn); - extern char *PQpass(const PGconn * conn); - extern char *PQhost(const PGconn * conn); - extern char *PQport(const PGconn * conn); - extern char *PQtty(const PGconn * conn); - extern char *PQoptions(const PGconn * conn); - extern ConnStatusType PQstatus(const PGconn * conn); - extern PGTransactionStatusType PQtransactionStatus(const PGconn * conn); - extern const char *PQparameterStatus(const PGconn * conn, const char *paramName); - extern int32_t PQprotocolVersion(const PGconn * conn); - extern char *PQerrorMessage(const PGconn * conn); - extern int32_t PQsocket(const PGconn * conn); - extern int32_t PQbackendPID(const PGconn * conn); - extern int32_t PQclientEncoding(const PGconn * conn); - extern int32_t PQsetClientEncoding(PGconn * conn, const char *encoding); +extern char *PQdb(const PGconn *conn); +extern char *PQuser(const PGconn *conn); +extern char *PQpass(const PGconn *conn); +extern char *PQhost(const PGconn *conn); +extern char *PQport(const PGconn *conn); +extern char *PQtty(const PGconn *conn); +extern char *PQoptions(const PGconn *conn); +extern ConnStatusType PQstatus(const PGconn *conn); +extern PGTransactionStatusType PQtransactionStatus(const PGconn *conn); +extern const char *PQparameterStatus(const PGconn *conn, const char *paramName); +extern int32_t PQprotocolVersion(const PGconn *conn); +extern char *PQerrorMessage(const PGconn *conn); +extern int32_t PQsocket(const PGconn *conn); +extern int32_t PQbackendPID(const PGconn *conn); +extern int32_t PQclientEncoding(const PGconn *conn); +extern int32_t PQsetClientEncoding(PGconn *conn, const char *encoding); #ifdef USE_SSL /* Get the SSL structure associated with a connection */ - extern SSL *PQgetssl(PGconn * conn); +extern SSL *PQgetssl(PGconn *conn); #endif /* Set verbosity for PQerrorMessage and PQresultErrorMessage */ - extern PGVerbosity PQsetErrorVerbosity(PGconn * conn, PGVerbosity verbosity); +extern PGVerbosity PQsetErrorVerbosity(PGconn *conn, PGVerbosity verbosity); /* Enable/disable tracing */ - extern void PQtrace(PGconn * conn, FILE * debug_port); - extern void PQuntrace(PGconn * conn); +extern void PQtrace(PGconn *conn, FILE *debug_port); +extern void PQuntrace(PGconn *conn); /* Override default notice handling routines */ - extern PQnoticeReceiver PQsetNoticeReceiver(PGconn * conn, PQnoticeReceiver proc, void *arg); - extern PQnoticeProcessor PQsetNoticeProcessor(PGconn * conn, PQnoticeProcessor proc, void *arg); +extern PQnoticeReceiver PQsetNoticeReceiver(PGconn *conn, PQnoticeReceiver proc, void *arg); +extern PQnoticeProcessor PQsetNoticeProcessor(PGconn *conn, PQnoticeProcessor proc, void *arg); /* === in fe-exec.c === */ /* Simple synchronous query */ - extern PGresult *PQexec(PGconn * conn, const char *query); - extern PGresult *PQexecParams(PGconn * conn, - const char *command, - int32_t nParams, const Oid * paramTypes, const char *const *paramValues, const int32_t *paramLengths, const int32_t *paramFormats, int32_t resultFormat); - extern PGresult *PQexecPrepared(PGconn * conn, - const char *stmtName, int32_t nParams, const char *const *paramValues, const int32_t *paramLengths, const int32_t *paramFormats, int32_t resultFormat); +extern PGresult *PQexec(PGconn *conn, const char *query); +extern PGresult *PQexecParams(PGconn *conn, const char *command, int32_t nParams, const Oid *paramTypes, const char *const *paramValues, const int32_t *paramLengths, const int32_t *paramFormats, int32_t resultFormat); +extern PGresult *PQexecPrepared(PGconn *conn, const char *stmtName, int32_t nParams, const char *const *paramValues, const int32_t *paramLengths, const int32_t *paramFormats, int32_t resultFormat); /* Interface for multiple-result or asynchronous queries */ - extern int32_t PQsendQuery(PGconn * conn, const char *query); - extern int32_t PQsendQueryParams(PGconn * conn, - const char *command, - int32_t nParams, const Oid * paramTypes, const char *const *paramValues, const int32_t *paramLengths, const int32_t *paramFormats, int32_t resultFormat); - extern int32_t PQsendQueryPrepared(PGconn * conn, - const char *stmtName, int32_t nParams, const char *const *paramValues, const int32_t *paramLengths, const int32_t *paramFormats, int32_t resultFormat); - extern PGresult *PQgetResult(PGconn * conn); +extern int32_t PQsendQuery(PGconn *conn, const char *query); +extern int32_t PQsendQueryParams(PGconn *conn, const char *command, int32_t nParams, const Oid *paramTypes, const char *const *paramValues, const int32_t *paramLengths, const int32_t *paramFormats, int32_t resultFormat); +extern int32_t PQsendQueryPrepared(PGconn *conn, const char *stmtName, int32_t nParams, const char *const *paramValues, const int32_t *paramLengths, const int32_t *paramFormats, int32_t resultFormat); +extern PGresult *PQgetResult(PGconn *conn); /* Routines for managing an asynchronous query */ - extern int32_t PQisBusy(PGconn * conn); - extern int32_t PQconsumeInput(PGconn * conn); +extern int32_t PQisBusy(PGconn *conn); +extern int32_t PQconsumeInput(PGconn *conn); /* LISTEN/NOTIFY support */ - extern PGnotify *PQnotifies(PGconn * conn); +extern PGnotify *PQnotifies(PGconn *conn); /* Routines for copy in/out */ - extern int32_t PQputCopyData(PGconn * conn, const char *buffer, int32_t nbytes); - extern int32_t PQputCopyEnd(PGconn * conn, const char *errormsg); - extern int32_t PQgetCopyData(PGconn * conn, char **buffer, int32_t async); +extern int32_t PQputCopyData(PGconn *conn, const char *buffer, int32_t nbytes); +extern int32_t PQputCopyEnd(PGconn *conn, const char *errormsg); +extern int32_t PQgetCopyData(PGconn *conn, char **buffer, int32_t async); /* Deprecated routines for copy in/out */ - extern int32_t PQgetline(PGconn * conn, char *string, int32_t length); - extern int32_t PQputline(PGconn * conn, const char *string); - extern int32_t PQgetlineAsync(PGconn * conn, char *buffer, int32_t bufsize); - extern int32_t PQputnbytes(PGconn * conn, const char *buffer, int32_t nbytes); - extern int32_t PQendcopy(PGconn * conn); +extern int32_t PQgetline(PGconn *conn, char *string, int32_t length); +extern int32_t PQputline(PGconn *conn, const char *string); +extern int32_t PQgetlineAsync(PGconn *conn, char *buffer, int32_t bufsize); +extern int32_t PQputnbytes(PGconn *conn, const char *buffer, int32_t nbytes); +extern int32_t PQendcopy(PGconn *conn); /* Set blocking/nonblocking connection to the backend */ - extern int32_t PQsetnonblocking(PGconn * conn, int32_t arg); - extern int32_t PQisnonblocking(const PGconn * conn); +extern int32_t PQsetnonblocking(PGconn *conn, int32_t arg); +extern int32_t PQisnonblocking(const PGconn *conn); /* Force the write buffer to be written (or at least try) */ - extern int32_t PQflush(PGconn * conn); +extern int32_t PQflush(PGconn *conn); /* * "Fast path" interface --- not really recommended for application * use */ - extern PGresult *PQfn(PGconn * conn, int32_t fnid, int32_t *result_buf, int32_t *result_len, int32_t result_is_int, const PQArgBlock * args, int32_t nargs); +extern PGresult *PQfn(PGconn *conn, int32_t fnid, int32_t *result_buf, int32_t *result_len, int32_t result_is_int, const PQArgBlock *args, int32_t nargs); /* Accessor functions for PGresult objects */ - extern ExecStatusType PQresultStatus(const PGresult * res); - extern char *PQresStatus(ExecStatusType status); - extern char *PQresultErrorMessage(const PGresult * res); - extern char *PQresultErrorField(const PGresult * res, int32_t fieldcode); - extern int32_t PQntuples(const PGresult * res); - extern int32_t PQnfields(const PGresult * res); - extern int32_t PQbinaryTuples(const PGresult * res); - extern char *PQfname(const PGresult * res, int32_t field_num); - extern int32_t PQfnumber(const PGresult * res, const char *field_name); - extern Oid PQftable(const PGresult * res, int32_t field_num); - extern int32_t PQftablecol(const PGresult * res, int32_t field_num); - extern int32_t PQfformat(const PGresult * res, int32_t field_num); - extern Oid PQftype(const PGresult * res, int32_t field_num); - extern int32_t PQfsize(const PGresult * res, int32_t field_num); - extern int32_t PQfmod(const PGresult * res, int32_t field_num); - extern char *PQcmdStatus(PGresult * res); - extern char *PQoidStatus(const PGresult * res); /* old and ugly */ - extern Oid PQoidValue(const PGresult * res); /* new and improved */ - extern char *PQcmdTuples(PGresult * res); - extern char *PQgetvalue(const PGresult * res, int32_t tup_num, int32_t field_num); - extern int32_t PQgetlength(const PGresult * res, int32_t tup_num, int32_t field_num); - extern int32_t PQgetisnull(const PGresult * res, int32_t tup_num, int32_t field_num); +extern ExecStatusType PQresultStatus(const PGresult *res); +extern char *PQresStatus(ExecStatusType status); +extern char *PQresultErrorMessage(const PGresult *res); +extern char *PQresultErrorField(const PGresult *res, int32_t fieldcode); +extern int32_t PQntuples(const PGresult *res); +extern int32_t PQnfields(const PGresult *res); +extern int32_t PQbinaryTuples(const PGresult *res); +extern char *PQfname(const PGresult *res, int32_t field_num); +extern int32_t PQfnumber(const PGresult *res, const char *field_name); +extern Oid PQftable(const PGresult *res, int32_t field_num); +extern int32_t PQftablecol(const PGresult *res, int32_t field_num); +extern int32_t PQfformat(const PGresult *res, int32_t field_num); +extern Oid PQftype(const PGresult *res, int32_t field_num); +extern int32_t PQfsize(const PGresult *res, int32_t field_num); +extern int32_t PQfmod(const PGresult *res, int32_t field_num); +extern char *PQcmdStatus(PGresult *res); +extern char *PQoidStatus(const PGresult *res); /* old and ugly */ +extern Oid PQoidValue(const PGresult *res); /* new and improved */ +extern char *PQcmdTuples(PGresult *res); +extern char *PQgetvalue(const PGresult *res, int32_t tup_num, int32_t field_num); +extern int32_t PQgetlength(const PGresult *res, int32_t tup_num, int32_t field_num); +extern int32_t PQgetisnull(const PGresult *res, int32_t tup_num, int32_t field_num); /* Delete a PGresult */ - extern void PQclear(PGresult * res); +extern void PQclear(PGresult *res); /* For freeing other alloc'd results, such as PGnotify structs */ - extern void PQfreemem(void *ptr); +extern void PQfreemem(void *ptr); /* Exists for backward compatibility. bjm 2003-03-24 */ #define PQfreeNotify(ptr) PQfreemem(ptr) @@ -348,63 +341,56 @@ extern "C" { * useful). If conn is not NULL and status indicates an error, the * conn's errorMessage is copied. */ - extern PGresult *PQmakeEmptyPGresult(PGconn * conn, ExecStatusType status); - +extern PGresult *PQmakeEmptyPGresult(PGconn *conn, ExecStatusType status); /* Quoting strings before inclusion in queries. */ - extern size_t PQescapeString(char *to, const char *from, size_t length); - extern unsigned char *PQescapeBytea(const unsigned char *bintext, size_t binlen, size_t * bytealen); - extern unsigned char *PQunescapeBytea(const unsigned char *strtext, size_t * retbuflen); - - +extern size_t PQescapeString(char *to, const char *from, size_t length); +extern unsigned char *PQescapeBytea(const unsigned char *bintext, size_t binlen, size_t *bytealen); +extern unsigned char *PQunescapeBytea(const unsigned char *strtext, size_t *retbuflen); /* === in fe-print.c === */ - extern void - PQprint(FILE * fout, /* output stream */ - const PGresult * res, const PQprintOpt * ps); /* option structure */ +extern void PQprint(FILE *fout, /* output stream */ + const PGresult *res, const PQprintOpt *ps); /* option structure */ /* * really old printing routines */ - extern void - PQdisplayTuples(const PGresult * res, FILE * fp, /* where to send the output */ - int32_t fillAlign, /* pad the fields with spaces */ - const char *fieldSep, /* field separator */ - int32_t printHeader, /* display headers? */ - int32_t quiet); - - extern void - PQprintTuples(const PGresult * res, FILE * fout, /* output stream */ - int32_t printAttName, /* print attribute names */ - int32_t terseOutput, /* delimiter bars */ - int32_t width); /* width of column, if 0, use variable - * width */ +extern void PQdisplayTuples(const PGresult *res, FILE *fp, /* where to send the output */ + int32_t fillAlign, /* pad the fields with spaces */ + const char *fieldSep, /* field separator */ + int32_t printHeader, /* display headers? */ + int32_t quiet); +extern void PQprintTuples(const PGresult *res, FILE *fout, /* output stream */ + int32_t printAttName, /* print attribute names */ + int32_t terseOutput, /* delimiter bars */ + int32_t width); /* width of column, if 0, use variable + * width */ /* === in fe-lobj.c === */ /* Large-object access routines */ - extern int32_t lo_open(PGconn * conn, Oid lobjId, int32_t mode); - extern int32_t lo_close(PGconn * conn, int32_t fd); - extern int32_t lo_read(PGconn * conn, int32_t fd, char *buf, size_t len); - extern int32_t lo_write(PGconn * conn, int32_t fd, char *buf, size_t len); - extern int32_t lo_lseek(PGconn * conn, int32_t fd, int32_t offset, int32_t whence); - extern Oid lo_creat(PGconn * conn, int32_t mode); - extern int32_t lo_tell(PGconn * conn, int32_t fd); - extern int32_t lo_unlink(PGconn * conn, Oid lobjId); - extern Oid lo_import(PGconn * conn, const char *filename); - extern int32_t lo_export(PGconn * conn, Oid lobjId, const char *filename); +extern int32_t lo_open(PGconn *conn, Oid lobjId, int32_t mode); +extern int32_t lo_close(PGconn *conn, int32_t fd); +extern int32_t lo_read(PGconn *conn, int32_t fd, char *buf, size_t len); +extern int32_t lo_write(PGconn *conn, int32_t fd, char *buf, size_t len); +extern int32_t lo_lseek(PGconn *conn, int32_t fd, int32_t offset, int32_t whence); +extern Oid lo_creat(PGconn *conn, int32_t mode); +extern int32_t lo_tell(PGconn *conn, int32_t fd); +extern int32_t lo_unlink(PGconn *conn, Oid lobjId); +extern Oid lo_import(PGconn *conn, const char *filename); +extern int32_t lo_export(PGconn *conn, Oid lobjId, const char *filename); /* === in fe-misc.c === */ /* Determine length of multibyte encoded char at *s */ - extern int32_t PQmblen(const unsigned char *s, int32_t encoding); +extern int32_t PQmblen(const unsigned char *s, int32_t encoding); /* Get encoding id from environment variable PGCLIENTENCODING */ - extern int32_t PQenv2encoding(void); +extern int32_t PQenv2encoding(void); #ifdef __cplusplus } #endif -#endif /* LIBPQ_FE_H */ +#endif /* LIBPQ_FE_H */ diff --git a/ntlm.c b/ntlm.c index 00df4c8..c8c01ab 100644 --- a/ntlm.c +++ b/ntlm.c @@ -2,10 +2,10 @@ Single file NTLM system to create and parse authentication messages. http://www.reversing.org - ilo-- ilo@reversing.org + ilo-- ilo@reversing.org - I did copy&paste&modify several files to leave independent NTLM code - that compile in cygwin/linux environment. Most of the code was ripped + I did copy&paste&modify several files to leave independent NTLM code + that compile in cygwin/linux environment. Most of the code was ripped from Samba implementation so I left the Copying statement. Samba core code was left unmodified from 1.9 version. @@ -19,41 +19,40 @@ SMB parameters and setup Copyright (C) Andrew Tridgell 1992-1998 Modified by Jeremy Allison 1995. - + This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. - + This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. - + You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */ +#include #ifdef WIN32 #else #include #endif -#include -#include -#include -#include -#include #include "ntlm.h" - +#include +#include +#include +#include /* Byte order macros */ #ifndef _BYTEORDER_H #define _BYTEORDER_H /* - This file implements macros for machine independent short and + This file implements macros for machine independent short and int32_t manipulation Here is a description of this file that I emailed to the samba list once: @@ -62,7 +61,7 @@ Here is a description of this file that I emailed to the samba list once: > looked at it, and I would have thought that you might make a distinction > between LE and BE machines, but you only seem to distinguish between 386 > and all other architectures. -> +> > Can you give me a clue? sure. @@ -126,33 +125,87 @@ it also defines lots of intermediate macros, just ignore those :-) /* some switch macros that do both store and read to and from SMB buffers */ -#define RW_PCVAL(read,inbuf,outbuf,len) \ - { if (read) { PCVAL (inbuf,0,outbuf,len); } \ - else { PSCVAL(inbuf,0,outbuf,len); } } +#define RW_PCVAL(read, inbuf, outbuf, len) \ + { \ + if (read) { \ + PCVAL(inbuf, 0, outbuf, len); \ + } else { \ + PSCVAL(inbuf, 0, outbuf, len); \ + } \ + } -#define RW_PIVAL(read,big_endian,inbuf,outbuf,len) \ - { if (read) { if (big_endian) { RPIVAL(inbuf,0,outbuf,len); } else { PIVAL(inbuf,0,outbuf,len); } } \ - else { if (big_endian) { RPSIVAL(inbuf,0,outbuf,len); } else { PSIVAL(inbuf,0,outbuf,len); } } } +#define RW_PIVAL(read, big_endian, inbuf, outbuf, len) \ + { \ + if (read) { \ + if (big_endian) { \ + RPIVAL(inbuf, 0, outbuf, len); \ + } else { \ + PIVAL(inbuf, 0, outbuf, len); \ + } \ + } else { \ + if (big_endian) { \ + RPSIVAL(inbuf, 0, outbuf, len); \ + } else { \ + PSIVAL(inbuf, 0, outbuf, len); \ + } \ + } \ + } -#define RW_PSVAL(read,big_endian,inbuf,outbuf,len) \ - { if (read) { if (big_endian) { RPSVAL(inbuf,0,outbuf,len); } else { PSVAL(inbuf,0,outbuf,len); } } \ - else { if (big_endian) { RPSSVAL(inbuf,0,outbuf,len); } else { PSSVAL(inbuf,0,outbuf,len); } } } +#define RW_PSVAL(read, big_endian, inbuf, outbuf, len) \ + { \ + if (read) { \ + if (big_endian) { \ + RPSVAL(inbuf, 0, outbuf, len); \ + } else { \ + PSVAL(inbuf, 0, outbuf, len); \ + } \ + } else { \ + if (big_endian) { \ + RPSSVAL(inbuf, 0, outbuf, len); \ + } else { \ + PSSVAL(inbuf, 0, outbuf, len); \ + } \ + } \ + } -#define RW_CVAL(read, inbuf, outbuf, offset) \ - { if (read) { (outbuf) = CVAL (inbuf,offset); } \ - else { SCVAL(inbuf,offset,outbuf); } } +#define RW_CVAL(read, inbuf, outbuf, offset) \ + { \ + if (read) { \ + (outbuf) = CVAL(inbuf, offset); \ + } else { \ + SCVAL(inbuf, offset, outbuf); \ + } \ + } -#define RW_IVAL(read, big_endian, inbuf, outbuf, offset) \ - { if (read) { (outbuf) = ((big_endian) ? RIVAL(inbuf,offset) : IVAL (inbuf,offset)); } \ - else { if (big_endian) { RSIVAL(inbuf,offset,outbuf); } else { SIVAL(inbuf,offset,outbuf); } } } +#define RW_IVAL(read, big_endian, inbuf, outbuf, offset) \ + { \ + if (read) { \ + (outbuf) = ((big_endian) ? RIVAL(inbuf, offset) : IVAL(inbuf, offset)); \ + } else { \ + if (big_endian) { \ + RSIVAL(inbuf, offset, outbuf); \ + } else { \ + SIVAL(inbuf, offset, outbuf); \ + } \ + } \ + } -#define RW_SVAL(read, big_endian, inbuf, outbuf, offset) \ - { if (read) { (outbuf) = ((big_endian) ? RSVAL(inbuf,offset) : SVAL (inbuf,offset)); } \ - else { if (big_endian) { RSSVAL(inbuf,offset,outbuf); } else { SSVAL(inbuf,offset,outbuf); } } } +#define RW_SVAL(read, big_endian, inbuf, outbuf, offset) \ + { \ + if (read) { \ + (outbuf) = ((big_endian) ? RSVAL(inbuf, offset) : SVAL(inbuf, offset)); \ + } else { \ + if (big_endian) { \ + RSSVAL(inbuf, offset, outbuf); \ + } else { \ + SSVAL(inbuf, offset, outbuf); \ + } \ + } \ + } #undef CAREFUL_ALIGNMENT -/* we know that the 386 can handle misalignment and has the "right" +/* we know that the 386 can handle misalignment and has the "right" byteorder */ #ifdef __i386__ #define CAREFUL_ALIGNMENT 0 @@ -162,23 +215,22 @@ it also defines lots of intermediate macros, just ignore those :-) #define CAREFUL_ALIGNMENT 1 #endif -#define CVAL(buf,pos) (((unsigned char *)(buf))[pos]) -#define PVAL(buf,pos) ((unsigned)CVAL(buf,pos)) -#define SCVAL(buf,pos,val) (CVAL(buf,pos) = (val)) - +#define CVAL(buf, pos) (((unsigned char *)(buf))[pos]) +#define PVAL(buf, pos) ((unsigned)CVAL(buf, pos)) +#define SCVAL(buf, pos, val) (CVAL(buf, pos) = (val)) #if CAREFUL_ALIGNMENT -#define SVAL(buf,pos) (PVAL(buf,pos)|PVAL(buf,(pos)+1)<<8) -#define IVAL(buf,pos) (SVAL(buf,pos)|SVAL(buf,(pos)+2)<<16) -#define SSVALX(buf,pos,val) (CVAL(buf,pos)=(val)&0xFF,CVAL(buf,pos+1)=(val)>>8) -#define SIVALX(buf,pos,val) (SSVALX(buf,pos,val&0xFFFF),SSVALX(buf,pos+2,val>>16)) -#define SVALS(buf,pos) ((int16)SVAL(buf,pos)) -#define IVALS(buf,pos) ((int32)IVAL(buf,pos)) -#define SSVAL(buf,pos,val) SSVALX((buf),(pos),((uint16)(val))) -#define SIVAL(buf,pos,val) SIVALX((buf),(pos),((uint32)(val))) -#define SSVALS(buf,pos,val) SSVALX((buf),(pos),((int16)(val))) -#define SIVALS(buf,pos,val) SIVALX((buf),(pos),((int32)(val))) +#define SVAL(buf, pos) (PVAL(buf, pos) | PVAL(buf, (pos) + 1) << 8) +#define IVAL(buf, pos) (SVAL(buf, pos) | SVAL(buf, (pos) + 2) << 16) +#define SSVALX(buf, pos, val) (CVAL(buf, pos) = (val)&0xFF, CVAL(buf, pos + 1) = (val) >> 8) +#define SIVALX(buf, pos, val) (SSVALX(buf, pos, val & 0xFFFF), SSVALX(buf, pos + 2, val >> 16)) +#define SVALS(buf, pos) ((int16)SVAL(buf, pos)) +#define IVALS(buf, pos) ((int32)IVAL(buf, pos)) +#define SSVAL(buf, pos, val) SSVALX((buf), (pos), ((uint16)(val))) +#define SIVAL(buf, pos, val) SIVALX((buf), (pos), ((uint32)(val))) +#define SSVALS(buf, pos, val) SSVALX((buf), (pos), ((int16)(val))) +#define SIVALS(buf, pos, val) SIVALX((buf), (pos), ((int32)(val))) #else /* CAREFUL_ALIGNMENT */ @@ -187,147 +239,171 @@ it also defines lots of intermediate macros, just ignore those :-) /* WARNING: This section is dependent on the length of int16 and int32 - being correct + being correct */ /* get single value from an SMB buffer */ -#define SVAL(buf,pos) (*(uint16 *)((char *)(buf) + (pos))) -#define IVAL(buf,pos) (*(uint32 *)((char *)(buf) + (pos))) -#define SVALS(buf,pos) (*(int16 *)((char *)(buf) + (pos))) -#define IVALS(buf,pos) (*(int32 *)((char *)(buf) + (pos))) +#define SVAL(buf, pos) (*(uint16 *)((char *)(buf) + (pos))) +#define IVAL(buf, pos) (*(uint32 *)((char *)(buf) + (pos))) +#define SVALS(buf, pos) (*(int16 *)((char *)(buf) + (pos))) +#define IVALS(buf, pos) (*(int32 *)((char *)(buf) + (pos))) /* store single value in an SMB buffer */ -#define SSVAL(buf,pos,val) SVAL(buf,pos)=((uint16)(val)) -#define SIVAL(buf,pos,val) IVAL(buf,pos)=((uint32)(val)) -#define SSVALS(buf,pos,val) SVALS(buf,pos)=((int16)(val)) -#define SIVALS(buf,pos,val) IVALS(buf,pos)=((int32)(val)) +#define SSVAL(buf, pos, val) SVAL(buf, pos) = ((uint16)(val)) +#define SIVAL(buf, pos, val) IVAL(buf, pos) = ((uint32)(val)) +#define SSVALS(buf, pos, val) SVALS(buf, pos) = ((int16)(val)) +#define SIVALS(buf, pos, val) IVALS(buf, pos) = ((int32)(val)) #endif /* CAREFUL_ALIGNMENT */ /* macros for reading / writing arrays */ -#define SMBMACRO(macro,buf,pos,val,len,size) \ -{ int32_t l; for (l = 0; l < (len); l++) (val)[l] = macro((buf), (pos) + (size)*l); } +#define SMBMACRO(macro, buf, pos, val, len, size) \ + { \ + int32_t l; \ + for (l = 0; l < (len); l++) \ + (val)[l] = macro((buf), (pos) + (size)*l); \ + } -#define SSMBMACRO(macro,buf,pos,val,len,size) \ -{ int32_t l; for (l = 0; l < (len); l++) macro((buf), (pos) + (size)*l, (val)[l]); } +#define SSMBMACRO(macro, buf, pos, val, len, size) \ + { \ + int32_t l; \ + for (l = 0; l < (len); l++) \ + macro((buf), (pos) + (size)*l, (val)[l]); \ + } /* reads multiple data from an SMB buffer */ -#define PCVAL(buf,pos,val,len) SMBMACRO(CVAL,buf,pos,val,len,1) -#define PSVAL(buf,pos,val,len) SMBMACRO(SVAL,buf,pos,val,len,2) -#define PIVAL(buf,pos,val,len) SMBMACRO(IVAL,buf,pos,val,len,4) -#define PCVALS(buf,pos,val,len) SMBMACRO(CVALS,buf,pos,val,len,1) -#define PSVALS(buf,pos,val,len) SMBMACRO(SVALS,buf,pos,val,len,2) -#define PIVALS(buf,pos,val,len) SMBMACRO(IVALS,buf,pos,val,len,4) +#define PCVAL(buf, pos, val, len) SMBMACRO(CVAL, buf, pos, val, len, 1) +#define PSVAL(buf, pos, val, len) SMBMACRO(SVAL, buf, pos, val, len, 2) +#define PIVAL(buf, pos, val, len) SMBMACRO(IVAL, buf, pos, val, len, 4) +#define PCVALS(buf, pos, val, len) SMBMACRO(CVALS, buf, pos, val, len, 1) +#define PSVALS(buf, pos, val, len) SMBMACRO(SVALS, buf, pos, val, len, 2) +#define PIVALS(buf, pos, val, len) SMBMACRO(IVALS, buf, pos, val, len, 4) /* stores multiple data in an SMB buffer */ -#define PSCVAL(buf,pos,val,len) SSMBMACRO(SCVAL,buf,pos,val,len,1) -#define PSSVAL(buf,pos,val,len) SSMBMACRO(SSVAL,buf,pos,val,len,2) -#define PSIVAL(buf,pos,val,len) SSMBMACRO(SIVAL,buf,pos,val,len,4) -#define PSCVALS(buf,pos,val,len) SSMBMACRO(SCVALS,buf,pos,val,len,1) -#define PSSVALS(buf,pos,val,len) SSMBMACRO(SSVALS,buf,pos,val,len,2) -#define PSIVALS(buf,pos,val,len) SSMBMACRO(SIVALS,buf,pos,val,len,4) - +#define PSCVAL(buf, pos, val, len) SSMBMACRO(SCVAL, buf, pos, val, len, 1) +#define PSSVAL(buf, pos, val, len) SSMBMACRO(SSVAL, buf, pos, val, len, 2) +#define PSIVAL(buf, pos, val, len) SSMBMACRO(SIVAL, buf, pos, val, len, 4) +#define PSCVALS(buf, pos, val, len) SSMBMACRO(SCVALS, buf, pos, val, len, 1) +#define PSSVALS(buf, pos, val, len) SSMBMACRO(SSVALS, buf, pos, val, len, 2) +#define PSIVALS(buf, pos, val, len) SSMBMACRO(SIVALS, buf, pos, val, len, 4) /* now the reverse routines - these are used in nmb packets (mostly) */ -#define SREV(x) ((((x)&0xFF)<<8) | (((x)>>8)&0xFF)) -#define IREV(x) ((SREV(x)<<16) | (SREV((x)>>16))) +#define SREV(x) ((((x)&0xFF) << 8) | (((x) >> 8) & 0xFF)) +#define IREV(x) ((SREV(x) << 16) | (SREV((x) >> 16))) -#define RSVAL(buf,pos) SREV(SVAL(buf,pos)) -#define RSVALS(buf,pos) SREV(SVALS(buf,pos)) -#define RIVAL(buf,pos) IREV(IVAL(buf,pos)) -#define RIVALS(buf,pos) IREV(IVALS(buf,pos)) -#define RSSVAL(buf,pos,val) SSVAL(buf,pos,SREV(val)) -#define RSSVALS(buf,pos,val) SSVALS(buf,pos,SREV(val)) -#define RSIVAL(buf,pos,val) SIVAL(buf,pos,IREV(val)) -#define RSIVALS(buf,pos,val) SIVALS(buf,pos,IREV(val)) +#define RSVAL(buf, pos) SREV(SVAL(buf, pos)) +#define RSVALS(buf, pos) SREV(SVALS(buf, pos)) +#define RIVAL(buf, pos) IREV(IVAL(buf, pos)) +#define RIVALS(buf, pos) IREV(IVALS(buf, pos)) +#define RSSVAL(buf, pos, val) SSVAL(buf, pos, SREV(val)) +#define RSSVALS(buf, pos, val) SSVALS(buf, pos, SREV(val)) +#define RSIVAL(buf, pos, val) SIVAL(buf, pos, IREV(val)) +#define RSIVALS(buf, pos, val) SIVALS(buf, pos, IREV(val)) /* reads multiple data from an SMB buffer (big-endian) */ -#define RPSVAL(buf,pos,val,len) SMBMACRO(RSVAL,buf,pos,val,len,2) -#define RPIVAL(buf,pos,val,len) SMBMACRO(RIVAL,buf,pos,val,len,4) -#define RPSVALS(buf,pos,val,len) SMBMACRO(RSVALS,buf,pos,val,len,2) -#define RPIVALS(buf,pos,val,len) SMBMACRO(RIVALS,buf,pos,val,len,4) +#define RPSVAL(buf, pos, val, len) SMBMACRO(RSVAL, buf, pos, val, len, 2) +#define RPIVAL(buf, pos, val, len) SMBMACRO(RIVAL, buf, pos, val, len, 4) +#define RPSVALS(buf, pos, val, len) SMBMACRO(RSVALS, buf, pos, val, len, 2) +#define RPIVALS(buf, pos, val, len) SMBMACRO(RIVALS, buf, pos, val, len, 4) /* stores multiple data in an SMB buffer (big-endian) */ -#define RPSSVAL(buf,pos,val,len) SSMBMACRO(RSSVAL,buf,pos,val,len,2) -#define RPSIVAL(buf,pos,val,len) SSMBMACRO(RSIVAL,buf,pos,val,len,4) -#define RPSSVALS(buf,pos,val,len) SSMBMACRO(RSSVALS,buf,pos,val,len,2) -#define RPSIVALS(buf,pos,val,len) SSMBMACRO(RSIVALS,buf,pos,val,len,4) +#define RPSSVAL(buf, pos, val, len) SSMBMACRO(RSSVAL, buf, pos, val, len, 2) +#define RPSIVAL(buf, pos, val, len) SSMBMACRO(RSIVAL, buf, pos, val, len, 4) +#define RPSSVALS(buf, pos, val, len) SSMBMACRO(RSSVALS, buf, pos, val, len, 2) +#define RPSIVALS(buf, pos, val, len) SSMBMACRO(RSIVALS, buf, pos, val, len, 4) -#define DBG_RW_PCVAL(charmode,string,depth,base,read,inbuf,outbuf,len) \ - { RW_PCVAL(read,inbuf,outbuf,len) \ - DEBUG(5,("%s%04x %s: ", \ - tab_depth(depth), base,string)); \ - if (charmode) print_asc(5, (unsigned char*)(outbuf), (len)); else \ - { int32_t idx; for (idx = 0; idx < len; idx++) { DEBUG(5,("%02x ", (outbuf)[idx])); } } \ - DEBUG(5,("\n")); } +#define DBG_RW_PCVAL(charmode, string, depth, base, read, inbuf, outbuf, len) \ + { \ + RW_PCVAL(read, inbuf, outbuf, len) \ + DEBUG(5, ("%s%04x %s: ", tab_depth(depth), base, string)); \ + if (charmode) \ + print_asc(5, (unsigned char *)(outbuf), (len)); \ + else { \ + int32_t idx; \ + for (idx = 0; idx < len; idx++) { \ + DEBUG(5, ("%02x ", (outbuf)[idx])); \ + } \ + } \ + DEBUG(5, ("\n")); \ + } -#define DBG_RW_PSVAL(charmode,string,depth,base,read,big_endian,inbuf,outbuf,len) \ - { RW_PSVAL(read,big_endian,inbuf,outbuf,len) \ - DEBUG(5,("%s%04x %s: ", \ - tab_depth(depth), base,string)); \ - if (charmode) print_asc(5, (unsigned char*)(outbuf), 2*(len)); else \ - { int32_t idx; for (idx = 0; idx < len; idx++) { DEBUG(5,("%04x ", (outbuf)[idx])); } } \ - DEBUG(5,("\n")); } +#define DBG_RW_PSVAL(charmode, string, depth, base, read, big_endian, inbuf, outbuf, len) \ + { \ + RW_PSVAL(read, big_endian, inbuf, outbuf, len) \ + DEBUG(5, ("%s%04x %s: ", tab_depth(depth), base, string)); \ + if (charmode) \ + print_asc(5, (unsigned char *)(outbuf), 2 * (len)); \ + else { \ + int32_t idx; \ + for (idx = 0; idx < len; idx++) { \ + DEBUG(5, ("%04x ", (outbuf)[idx])); \ + } \ + } \ + DEBUG(5, ("\n")); \ + } -#define DBG_RW_PIVAL(charmode,string,depth,base,read,big_endian,inbuf,outbuf,len) \ - { RW_PIVAL(read,big_endian,inbuf,outbuf,len) \ - DEBUG(5,("%s%04x %s: ", \ - tab_depth(depth), base,string)); \ - if (charmode) print_asc(5, (unsigned char*)(outbuf), 4*(len)); else \ - { int32_t idx; for (idx = 0; idx < len; idx++) { DEBUG(5,("%08x ", (outbuf)[idx])); } } \ - DEBUG(5,("\n")); } +#define DBG_RW_PIVAL(charmode, string, depth, base, read, big_endian, inbuf, outbuf, len) \ + { \ + RW_PIVAL(read, big_endian, inbuf, outbuf, len) \ + DEBUG(5, ("%s%04x %s: ", tab_depth(depth), base, string)); \ + if (charmode) \ + print_asc(5, (unsigned char *)(outbuf), 4 * (len)); \ + else { \ + int32_t idx; \ + for (idx = 0; idx < len; idx++) { \ + DEBUG(5, ("%08x ", (outbuf)[idx])); \ + } \ + } \ + DEBUG(5, ("\n")); \ + } -#define DBG_RW_CVAL(string,depth,base,read,inbuf,outbuf) \ - { RW_CVAL(read,inbuf,outbuf,0) \ - DEBUG(5,("%s%04x %s: %02x\n", \ - tab_depth(depth), base, string, outbuf)); } +#define DBG_RW_CVAL(string, depth, base, read, inbuf, outbuf) \ + { \ + RW_CVAL(read, inbuf, outbuf, 0) \ + DEBUG(5, ("%s%04x %s: %02x\n", tab_depth(depth), base, string, outbuf)); \ + } -#define DBG_RW_SVAL(string,depth,base,read,big_endian,inbuf,outbuf) \ - { RW_SVAL(read,big_endian,inbuf,outbuf,0) \ - DEBUG(5,("%s%04x %s: %04x\n", \ - tab_depth(depth), base, string, outbuf)); } +#define DBG_RW_SVAL(string, depth, base, read, big_endian, inbuf, outbuf) \ + { \ + RW_SVAL(read, big_endian, inbuf, outbuf, 0) \ + DEBUG(5, ("%s%04x %s: %04x\n", tab_depth(depth), base, string, outbuf)); \ + } -#define DBG_RW_IVAL(string,depth,base,read,big_endian,inbuf,outbuf) \ - { RW_IVAL(read,big_endian,inbuf,outbuf,0) \ - DEBUG(5,("%s%04x %s: %08x\n", \ - tab_depth(depth), base, string, outbuf)); } +#define DBG_RW_IVAL(string, depth, base, read, big_endian, inbuf, outbuf) \ + { \ + RW_IVAL(read, big_endian, inbuf, outbuf, 0) \ + DEBUG(5, ("%s%04x %s: %08x\n", tab_depth(depth), base, string, outbuf)); \ + } #endif /* _BYTEORDER_H */ - /* Samba MD4 implementation */ -/* NOTE: This code makes no attempt to be fast! +/* NOTE: This code makes no attempt to be fast! It assumes that a int32_t is at least 32 bits long */ static uint32 A, B, C, D; -static uint32 F(uint32 X, uint32 Y, uint32 Z) { - return (X & Y) | ((~X) & Z); -} +static uint32 F(uint32 X, uint32 Y, uint32 Z) { return (X & Y) | ((~X) & Z); } -static uint32 G(uint32 X, uint32 Y, uint32 Z) { - return (X & Y) | (X & Z) | (Y & Z); -} +static uint32 G(uint32 X, uint32 Y, uint32 Z) { return (X & Y) | (X & Z) | (Y & Z); } -static uint32 H(uint32 X, uint32 Y, uint32 Z) { - return X ^ Y ^ Z; -} +static uint32 H(uint32 X, uint32 Y, uint32 Z) { return X ^ Y ^ Z; } static uint32 lshift(uint32 x, int32_t s) { x &= 0xFFFFFFFF; return ((x << s) & 0xFFFFFFFF) | (x >> (32 - s)); } -#define ROUND1(a,b,c,d,k,s) a = lshift(a + F(b,c,d) + X[k], s) -#define ROUND2(a,b,c,d,k,s) a = lshift(a + G(b,c,d) + X[k] + (uint32)0x5A827999,s) -#define ROUND3(a,b,c,d,k,s) a = lshift(a + H(b,c,d) + X[k] + (uint32)0x6ED9EBA1,s) +#define ROUND1(a, b, c, d, k, s) a = lshift(a + F(b, c, d) + X[k], s) +#define ROUND2(a, b, c, d, k, s) a = lshift(a + G(b, c, d) + X[k] + (uint32)0x5A827999, s) +#define ROUND3(a, b, c, d, k, s) a = lshift(a + H(b, c, d) + X[k] + (uint32)0x6ED9EBA1, s) /* this applies md4 to 64 byte chunks */ -static void mdfour64(uint32 * M) { +static void mdfour64(uint32 *M) { int32_t j; uint32 AA, BB, CC, DD; uint32 X[16]; @@ -405,7 +481,7 @@ static void mdfour64(uint32 * M) { X[j] = 0; } -static void copy64(uint32 * M, unsigned char *in) { +static void copy64(uint32 *M, unsigned char *in) { int32_t i; for (i = 0; i < 16; i++) @@ -471,113 +547,37 @@ void mdfour(unsigned char *out, unsigned char *in, int32_t n) { #define uchar unsigned char #define int16 signed short -static uchar perm1[56] = { 57, 49, 41, 33, 25, 17, 9, - 1, 58, 50, 42, 34, 26, 18, - 10, 2, 59, 51, 43, 35, 27, - 19, 11, 3, 60, 52, 44, 36, - 63, 55, 47, 39, 31, 23, 15, - 7, 62, 54, 46, 38, 30, 22, - 14, 6, 61, 53, 45, 37, 29, - 21, 13, 5, 28, 20, 12, 4 -}; +static uchar perm1[56] = {57, 49, 41, 33, 25, 17, 9, 1, 58, 50, 42, 34, 26, 18, 10, 2, 59, 51, 43, 35, 27, 19, 11, 3, 60, 52, 44, 36, 63, 55, 47, 39, 31, 23, 15, 7, 62, 54, 46, 38, 30, 22, 14, 6, 61, 53, 45, 37, 29, 21, 13, 5, 28, 20, 12, 4}; -static uchar perm2[48] = { 14, 17, 11, 24, 1, 5, - 3, 28, 15, 6, 21, 10, - 23, 19, 12, 4, 26, 8, - 16, 7, 27, 20, 13, 2, - 41, 52, 31, 37, 47, 55, - 30, 40, 51, 45, 33, 48, - 44, 49, 39, 56, 34, 53, - 46, 42, 50, 36, 29, 32 -}; +static uchar perm2[48] = {14, 17, 11, 24, 1, 5, 3, 28, 15, 6, 21, 10, 23, 19, 12, 4, 26, 8, 16, 7, 27, 20, 13, 2, 41, 52, 31, 37, 47, 55, 30, 40, 51, 45, 33, 48, 44, 49, 39, 56, 34, 53, 46, 42, 50, 36, 29, 32}; -static uchar perm3[64] = { 58, 50, 42, 34, 26, 18, 10, 2, - 60, 52, 44, 36, 28, 20, 12, 4, - 62, 54, 46, 38, 30, 22, 14, 6, - 64, 56, 48, 40, 32, 24, 16, 8, - 57, 49, 41, 33, 25, 17, 9, 1, - 59, 51, 43, 35, 27, 19, 11, 3, - 61, 53, 45, 37, 29, 21, 13, 5, - 63, 55, 47, 39, 31, 23, 15, 7 -}; +static uchar perm3[64] = {58, 50, 42, 34, 26, 18, 10, 2, 60, 52, 44, 36, 28, 20, 12, 4, 62, 54, 46, 38, 30, 22, 14, 6, 64, 56, 48, 40, 32, 24, 16, 8, 57, 49, 41, 33, 25, 17, 9, 1, 59, 51, 43, 35, 27, 19, 11, 3, 61, 53, 45, 37, 29, 21, 13, 5, 63, 55, 47, 39, 31, 23, 15, 7}; -static uchar perm4[48] = { 32, 1, 2, 3, 4, 5, - 4, 5, 6, 7, 8, 9, - 8, 9, 10, 11, 12, 13, - 12, 13, 14, 15, 16, 17, - 16, 17, 18, 19, 20, 21, - 20, 21, 22, 23, 24, 25, - 24, 25, 26, 27, 28, 29, - 28, 29, 30, 31, 32, 1 -}; +static uchar perm4[48] = {32, 1, 2, 3, 4, 5, 4, 5, 6, 7, 8, 9, 8, 9, 10, 11, 12, 13, 12, 13, 14, 15, 16, 17, 16, 17, 18, 19, 20, 21, 20, 21, 22, 23, 24, 25, 24, 25, 26, 27, 28, 29, 28, 29, 30, 31, 32, 1}; -static uchar perm5[32] = { 16, 7, 20, 21, - 29, 12, 28, 17, - 1, 15, 23, 26, - 5, 18, 31, 10, - 2, 8, 24, 14, - 32, 27, 3, 9, - 19, 13, 30, 6, - 22, 11, 4, 25 -}; +static uchar perm5[32] = {16, 7, 20, 21, 29, 12, 28, 17, 1, 15, 23, 26, 5, 18, 31, 10, 2, 8, 24, 14, 32, 27, 3, 9, 19, 13, 30, 6, 22, 11, 4, 25}; +static uchar perm6[64] = {40, 8, 48, 16, 56, 24, 64, 32, 39, 7, 47, 15, 55, 23, 63, 31, 38, 6, 46, 14, 54, 22, 62, 30, 37, 5, 45, 13, 53, 21, 61, 29, 36, 4, 44, 12, 52, 20, 60, 28, 35, 3, 43, 11, 51, 19, 59, 27, 34, 2, 42, 10, 50, 18, 58, 26, 33, 1, 41, 9, 49, 17, 57, 25}; -static uchar perm6[64] = { 40, 8, 48, 16, 56, 24, 64, 32, - 39, 7, 47, 15, 55, 23, 63, 31, - 38, 6, 46, 14, 54, 22, 62, 30, - 37, 5, 45, 13, 53, 21, 61, 29, - 36, 4, 44, 12, 52, 20, 60, 28, - 35, 3, 43, 11, 51, 19, 59, 27, - 34, 2, 42, 10, 50, 18, 58, 26, - 33, 1, 41, 9, 49, 17, 57, 25 -}; +static uchar sc[16] = {1, 1, 2, 2, 2, 2, 2, 2, 1, 2, 2, 2, 2, 2, 2, 1}; +static uchar sbox[8][4][16] = {{{14, 4, 13, 1, 2, 15, 11, 8, 3, 10, 6, 12, 5, 9, 0, 7}, {0, 15, 7, 4, 14, 2, 13, 1, 10, 6, 12, 11, 9, 5, 3, 8}, {4, 1, 14, 8, 13, 6, 2, 11, 15, 12, 9, 7, 3, 10, 5, 0}, {15, 12, 8, 2, 4, 9, 1, 7, 5, 11, 3, 14, 10, 0, 6, 13}}, -static uchar sc[16] = { 1, 1, 2, 2, 2, 2, 2, 2, 1, 2, 2, 2, 2, 2, 2, 1 }; + {{15, 1, 8, 14, 6, 11, 3, 4, 9, 7, 2, 13, 12, 0, 5, 10}, {3, 13, 4, 7, 15, 2, 8, 14, 12, 0, 1, 10, 6, 9, 11, 5}, {0, 14, 7, 11, 10, 4, 13, 1, 5, 8, 12, 6, 9, 3, 2, 15}, {13, 8, 10, 1, 3, 15, 4, 2, 11, 6, 7, 12, 0, 5, 14, 9}}, -static uchar sbox[8][4][16] = { - {{14, 4, 13, 1, 2, 15, 11, 8, 3, 10, 6, 12, 5, 9, 0, 7}, - {0, 15, 7, 4, 14, 2, 13, 1, 10, 6, 12, 11, 9, 5, 3, 8}, - {4, 1, 14, 8, 13, 6, 2, 11, 15, 12, 9, 7, 3, 10, 5, 0}, - {15, 12, 8, 2, 4, 9, 1, 7, 5, 11, 3, 14, 10, 0, 6, 13}}, + {{10, 0, 9, 14, 6, 3, 15, 5, 1, 13, 12, 7, 11, 4, 2, 8}, {13, 7, 0, 9, 3, 4, 6, 10, 2, 8, 5, 14, 12, 11, 15, 1}, {13, 6, 4, 9, 8, 15, 3, 0, 11, 1, 2, 12, 5, 10, 14, 7}, {1, 10, 13, 0, 6, 9, 8, 7, 4, 15, 14, 3, 11, 5, 2, 12}}, - {{15, 1, 8, 14, 6, 11, 3, 4, 9, 7, 2, 13, 12, 0, 5, 10}, - {3, 13, 4, 7, 15, 2, 8, 14, 12, 0, 1, 10, 6, 9, 11, 5}, - {0, 14, 7, 11, 10, 4, 13, 1, 5, 8, 12, 6, 9, 3, 2, 15}, - {13, 8, 10, 1, 3, 15, 4, 2, 11, 6, 7, 12, 0, 5, 14, 9}}, + {{7, 13, 14, 3, 0, 6, 9, 10, 1, 2, 8, 5, 11, 12, 4, 15}, {13, 8, 11, 5, 6, 15, 0, 3, 4, 7, 2, 12, 1, 10, 14, 9}, {10, 6, 9, 0, 12, 11, 7, 13, 15, 1, 3, 14, 5, 2, 8, 4}, {3, 15, 0, 6, 10, 1, 13, 8, 9, 4, 5, 11, 12, 7, 2, 14}}, - {{10, 0, 9, 14, 6, 3, 15, 5, 1, 13, 12, 7, 11, 4, 2, 8}, - {13, 7, 0, 9, 3, 4, 6, 10, 2, 8, 5, 14, 12, 11, 15, 1}, - {13, 6, 4, 9, 8, 15, 3, 0, 11, 1, 2, 12, 5, 10, 14, 7}, - {1, 10, 13, 0, 6, 9, 8, 7, 4, 15, 14, 3, 11, 5, 2, 12}}, + {{2, 12, 4, 1, 7, 10, 11, 6, 8, 5, 3, 15, 13, 0, 14, 9}, {14, 11, 2, 12, 4, 7, 13, 1, 5, 0, 15, 10, 3, 9, 8, 6}, {4, 2, 1, 11, 10, 13, 7, 8, 15, 9, 12, 5, 6, 3, 0, 14}, {11, 8, 12, 7, 1, 14, 2, 13, 6, 15, 0, 9, 10, 4, 5, 3}}, - {{7, 13, 14, 3, 0, 6, 9, 10, 1, 2, 8, 5, 11, 12, 4, 15}, - {13, 8, 11, 5, 6, 15, 0, 3, 4, 7, 2, 12, 1, 10, 14, 9}, - {10, 6, 9, 0, 12, 11, 7, 13, 15, 1, 3, 14, 5, 2, 8, 4}, - {3, 15, 0, 6, 10, 1, 13, 8, 9, 4, 5, 11, 12, 7, 2, 14}}, + {{12, 1, 10, 15, 9, 2, 6, 8, 0, 13, 3, 4, 14, 7, 5, 11}, {10, 15, 4, 2, 7, 12, 9, 5, 6, 1, 13, 14, 0, 11, 3, 8}, {9, 14, 15, 5, 2, 8, 12, 3, 7, 0, 4, 10, 1, 13, 11, 6}, {4, 3, 2, 12, 9, 5, 15, 10, 11, 14, 1, 7, 6, 0, 8, 13}}, - {{2, 12, 4, 1, 7, 10, 11, 6, 8, 5, 3, 15, 13, 0, 14, 9}, - {14, 11, 2, 12, 4, 7, 13, 1, 5, 0, 15, 10, 3, 9, 8, 6}, - {4, 2, 1, 11, 10, 13, 7, 8, 15, 9, 12, 5, 6, 3, 0, 14}, - {11, 8, 12, 7, 1, 14, 2, 13, 6, 15, 0, 9, 10, 4, 5, 3}}, + {{4, 11, 2, 14, 15, 0, 8, 13, 3, 12, 9, 7, 5, 10, 6, 1}, {13, 0, 11, 7, 4, 9, 1, 10, 14, 3, 5, 12, 2, 15, 8, 6}, {1, 4, 11, 13, 12, 3, 7, 14, 10, 15, 6, 8, 0, 5, 9, 2}, {6, 11, 13, 8, 1, 4, 10, 7, 9, 5, 0, 15, 14, 2, 3, 12}}, - {{12, 1, 10, 15, 9, 2, 6, 8, 0, 13, 3, 4, 14, 7, 5, 11}, - {10, 15, 4, 2, 7, 12, 9, 5, 6, 1, 13, 14, 0, 11, 3, 8}, - {9, 14, 15, 5, 2, 8, 12, 3, 7, 0, 4, 10, 1, 13, 11, 6}, - {4, 3, 2, 12, 9, 5, 15, 10, 11, 14, 1, 7, 6, 0, 8, 13}}, + {{13, 2, 8, 4, 6, 15, 11, 1, 10, 9, 3, 14, 5, 0, 12, 7}, {1, 15, 13, 8, 10, 3, 7, 4, 12, 5, 6, 11, 0, 14, 9, 2}, {7, 11, 4, 1, 9, 12, 14, 2, 0, 6, 10, 13, 15, 3, 5, 8}, {2, 1, 14, 7, 4, 10, 8, 13, 15, 12, 9, 0, 3, 5, 6, 11}}}; - {{4, 11, 2, 14, 15, 0, 8, 13, 3, 12, 9, 7, 5, 10, 6, 1}, - {13, 0, 11, 7, 4, 9, 1, 10, 14, 3, 5, 12, 2, 15, 8, 6}, - {1, 4, 11, 13, 12, 3, 7, 14, 10, 15, 6, 8, 0, 5, 9, 2}, - {6, 11, 13, 8, 1, 4, 10, 7, 9, 5, 0, 15, 14, 2, 3, 12}}, - - {{13, 2, 8, 4, 6, 15, 11, 1, 10, 9, 3, 14, 5, 0, 12, 7}, - {1, 15, 13, 8, 10, 3, 7, 4, 12, 5, 6, 11, 0, 14, 9, 2}, - {7, 11, 4, 1, 9, 12, 14, 2, 0, 6, 10, 13, 15, 3, 5, 8}, - {2, 1, 14, 7, 4, 10, 8, 13, 15, 12, 9, 0, 3, 5, 6, 11}} -}; - -static void permute(char *out, char *in, uchar * p, int32_t n) { +static void permute(char *out, char *in, uchar *p, int32_t n) { int32_t i; for (i = 0; i < n; i++) @@ -601,14 +601,15 @@ static void concat(char *out, char *in1, char *in2, int32_t l1, int32_t l2) { *out++ = *in2++; } -void xor(char *out, char *in1, char *in2, int32_t n) { - int32_t i; +void xor + (char *out, char *in1, char *in2, int32_t n) { + int32_t i; - for (i = 0; i < n; i++) - out[i] = in1[i] ^ in2[i]; -} + for (i = 0; i < n; i++) + out[i] = in1[i] ^ in2[i]; + } -static void dohash(char *out, char *in, char *key, int32_t forw) { + static void dohash(char *out, char *in, char *key, int32_t forw) { int32_t i, j, k; char pk1[56]; char c[28]; @@ -703,7 +704,6 @@ static void str_to_key(unsigned char *str, unsigned char *key) { } } - static void smbhash(unsigned char *out, unsigned char *in, unsigned char *key, int32_t forw) { int32_t i; char outb[64]; @@ -732,7 +732,7 @@ static void smbhash(unsigned char *out, unsigned char *in, unsigned char *key, i } void E_P16(unsigned char *p14, unsigned char *p16) { - unsigned char sp8[8] = { 0x4b, 0x47, 0x53, 0x21, 0x40, 0x23, 0x24, 0x25 }; + unsigned char sp8[8] = {0x4b, 0x47, 0x53, 0x21, 0x40, 0x23, 0x24, 0x25}; smbhash(p16, sp8, p14, 1); smbhash(p16 + 8, sp8, p14 + 7, 1); } @@ -785,7 +785,7 @@ void SamOEMhash(unsigned char *data, unsigned char *key, int32_t val) { int32_t ind; for (ind = 0; ind < 256; ind++) { - s_box[ind] = (unsigned char) ind; + s_box[ind] = (unsigned char)ind; } for (ind = 0; ind < 256; ind++) { @@ -815,7 +815,6 @@ void SamOEMhash(unsigned char *data, unsigned char *key, int32_t val) { /* Samba encryption implementation*/ - /**************************************************************************** Like strncpy but always null terminates. Make sure there is room! The variable n should always be one less than the available size. @@ -830,21 +829,19 @@ char *StrnCpy(char *dest, const char *src, size_t n) { *dest = 0; return (dest); } - while (n-- && (*d++ = *src++)); + while (n-- && (*d++ = *src++)) + ; *d = 0; return (dest); } -size_t skip_multibyte_char(char c) { - return 0; -} - +size_t skip_multibyte_char(char c) { return 0; } /******************************************************************* safe string copy into a known length string. maxlength does not include the terminating zero. ********************************************************************/ -#define DEBUG(a,b) ; +#define DEBUG(a, b) ; char *safe_strcpy(char *dest, const char *src, size_t maxlength) { size_t len; @@ -861,7 +858,7 @@ char *safe_strcpy(char *dest, const char *src, size_t maxlength) { len = strlen(src); if (len > maxlength) { - DEBUG(0, ("Error: string overflow by %d in safe_strcpy [%.50s]\n", (int32_t) (len - maxlength), src)); + DEBUG(0, ("Error: string overflow by %d in safe_strcpy [%.50s]\n", (int32_t)(len - maxlength), src)); len = maxlength; } @@ -870,7 +867,6 @@ char *safe_strcpy(char *dest, const char *src, size_t maxlength) { return dest; } - void strupper(char *s) { while (*s) { { @@ -879,44 +875,44 @@ void strupper(char *s) { if (skip != 0) s += skip; else { - if (islower((int32_t) *s)) - *s = toupper((int32_t) *s); + if (islower((int32_t)*s)) + *s = toupper((int32_t)*s); s++; } } } } -extern void SMBOWFencrypt(uchar passwd[16], uchar * c8, uchar p24[24]); +extern void SMBOWFencrypt(uchar passwd[16], uchar *c8, uchar p24[24]); /* This implements the X/Open SMB password encryption - It takes a password, a 8 byte "crypt key" and puts 24 bytes of - encrypted password into p24 + It takes a password, a 8 byte "crypt key" and puts 24 bytes of + encrypted password into p24 */ -void SMBencrypt(uchar * passwd, uchar * c8, uchar * p24) { +void SMBencrypt(uchar *passwd, uchar *c8, uchar *p24) { uchar p14[15], p21[21]; memset(p21, '\0', 21); memset(p14, '\0', 14); - StrnCpy((char *) p14, (char *) passwd, 14); + StrnCpy((char *)p14, (char *)passwd, 14); - strupper((char *) p14); + strupper((char *)p14); E_P16(p14, p21); SMBOWFencrypt(p21, c8, p24); #ifdef DEBUG_PASSWORD DEBUG(100, ("SMBencrypt: lm#, challenge, response\n")); - dump_data(100, (char *) p21, 16); - dump_data(100, (char *) c8, 8); - dump_data(100, (char *) p24, 24); + dump_data(100, (char *)p21, 16); + dump_data(100, (char *)c8, 8); + dump_data(100, (char *)p24, 24); #endif } /* Routines for Windows NT MD4 Hash functions. */ -static int32_t _my_wcslen(int16 * str) { +static int32_t _my_wcslen(int16 *str) { int32_t len = 0; while (*str++ != 0) @@ -926,12 +922,12 @@ static int32_t _my_wcslen(int16 * str) { /* * Convert a string into an NT UNICODE string. - * Note that regardless of processor type + * Note that regardless of processor type * this must be in intel (little-endian) * format. */ -static int32_t _my_mbstowcs(int16 * dst, uchar * src, int32_t len) { +static int32_t _my_mbstowcs(int16 *dst, uchar *src, int32_t len) { int32_t i; int16 val; @@ -946,25 +942,25 @@ static int32_t _my_mbstowcs(int16 * dst, uchar * src, int32_t len) { return i; } -/* +/* * Creates the MD4 Hash of the users password in NT UNICODE. */ -void E_md4hash(uchar * passwd, uchar * p16) { +void E_md4hash(uchar *passwd, uchar *p16) { int32_t len; int16 wpwd[129]; /* Password cannot be longer than 128 characters */ - len = strlen((char *) passwd); + len = strlen((char *)passwd); if (len > 128) len = 128; /* Password must be converted to NT unicode */ _my_mbstowcs(wpwd, passwd, len); - wpwd[len] = 0; /* Ensure string is null terminated */ + wpwd[len] = 0; /* Ensure string is null terminated */ /* Calculate length in bytes */ len = _my_wcslen(wpwd) * sizeof(int16); - mdfour(p16, (unsigned char *) wpwd, len); + mdfour(p16, (unsigned char *)wpwd, len); } /* Does both the NT and LM owfs of a user's password */ @@ -976,12 +972,12 @@ void nt_lm_owf_gen(char *pwd, uchar nt_p16[16], uchar p16[16]) { /* Calculate the MD4 hash (NT compatible) of the password */ memset(nt_p16, '\0', 16); - E_md4hash((uchar *) passwd, nt_p16); + E_md4hash((uchar *)passwd, nt_p16); #ifdef DEBUG_PASSWORD DEBUG(100, ("nt_lm_owf_gen: pwd, nt#\n")); dump_data(120, passwd, strlen(passwd)); - dump_data(100, (char *) nt_p16, 16); + dump_data(100, (char *)nt_p16, 16); #endif /* Mangle the passwords into Lanman format */ @@ -991,19 +987,19 @@ void nt_lm_owf_gen(char *pwd, uchar nt_p16[16], uchar p16[16]) { /* Calculate the SMB (lanman) hash functions of the password */ memset(p16, '\0', 16); - E_P16((uchar *) passwd, (uchar *) p16); + E_P16((uchar *)passwd, (uchar *)p16); #ifdef DEBUG_PASSWORD DEBUG(100, ("nt_lm_owf_gen: pwd, lm#\n")); dump_data(120, passwd, strlen(passwd)); - dump_data(100, (char *) p16, 16); + dump_data(100, (char *)p16, 16); #endif /* clear out local copy of user's password (just being paranoid). */ memset(passwd, '\0', sizeof(passwd)); } /* Does the des encryption from the NT or LM MD4 hash. */ -void SMBOWFencrypt(uchar passwd[16], uchar * c8, uchar p24[24]) { +void SMBOWFencrypt(uchar passwd[16], uchar *c8, uchar p24[24]) { uchar p21[21]; memset(p21, '\0', 21); @@ -1013,7 +1009,7 @@ void SMBOWFencrypt(uchar passwd[16], uchar * c8, uchar p24[24]) { } /* Does the des encryption from the FIRST 8 BYTES of the NT or LM MD4 hash. */ -void NTLMSSPOWFencrypt(uchar passwd[8], uchar * ntlmchalresp, uchar p24[24]) { +void NTLMSSPOWFencrypt(uchar passwd[8], uchar *ntlmchalresp, uchar p24[24]) { uchar p21[21]; memset(p21, '\0', 21); @@ -1023,16 +1019,15 @@ void NTLMSSPOWFencrypt(uchar passwd[8], uchar * ntlmchalresp, uchar p24[24]) { E_P24(p21, ntlmchalresp, p24); #ifdef DEBUG_PASSWORD DEBUG(100, ("NTLMSSPOWFencrypt: p21, c8, p24\n")); - dump_data(100, (char *) p21, 21); - dump_data(100, (char *) ntlmchalresp, 8); - dump_data(100, (char *) p24, 24); + dump_data(100, (char *)p21, 21); + dump_data(100, (char *)ntlmchalresp, 8); + dump_data(100, (char *)p24, 24); #endif } - /* Does the NT MD4 hash then des encryption. */ -void SMBNTencrypt(uchar * passwd, uchar * c8, uchar * p24) { +void SMBNTencrypt(uchar *passwd, uchar *c8, uchar *p24) { uchar p21[21]; memset(p21, '\0', 21); @@ -1042,9 +1037,9 @@ void SMBNTencrypt(uchar * passwd, uchar * c8, uchar * p24) { #ifdef DEBUG_PASSWORD DEBUG(100, ("SMBNTencrypt: nt#, challenge, response\n")); - dump_data(100, (char *) p21, 16); - dump_data(100, (char *) c8, 8); - dump_data(100, (char *) p24, 24); + dump_data(100, (char *)p21, 16); + dump_data(100, (char *)c8, 8); + dump_data(100, (char *)p24, 24); #endif } @@ -1083,7 +1078,8 @@ BOOL make_oem_passwd_hash(char data[516], const char *passwd, uchar old_pw_hash[ #endif -/* libtnlm copyrigth was left here, anyway the interface was slightly modified */ +/* libtnlm copyrigth was left here, anyway the interface was slightly modified + */ /* included libntlm-3.2.9 (c) even if this code is based in 2.1 version*/ @@ -1113,58 +1109,49 @@ Contributed LGPL versions of some of the GPL'd Samba files. * in the structures probably needs to be designed */ -#define AddBytes(ptr, header, buf, count) \ -{ \ -if (buf != NULL && count != 0) \ - { \ - SSVAL(&ptr->header.len,0,count); \ - SSVAL(&ptr->header.maxlen,0,count); \ - SIVAL(&ptr->header.offset,0,((ptr->buffer - ((uint8*)ptr)) + ptr->bufIndex)); \ - memcpy(ptr->buffer+ptr->bufIndex, buf, count); \ - ptr->bufIndex += count; \ - } \ -else \ - { \ - ptr->header.len = \ - ptr->header.maxlen = 0; \ - SIVAL(&ptr->header.offset,0,ptr->bufIndex); \ - } \ -} +#define AddBytes(ptr, header, buf, count) \ + { \ + if (buf != NULL && count != 0) { \ + SSVAL(&ptr->header.len, 0, count); \ + SSVAL(&ptr->header.maxlen, 0, count); \ + SIVAL(&ptr->header.offset, 0, ((ptr->buffer - ((uint8 *)ptr)) + ptr->bufIndex)); \ + memcpy(ptr->buffer + ptr->bufIndex, buf, count); \ + ptr->bufIndex += count; \ + } else { \ + ptr->header.len = ptr->header.maxlen = 0; \ + SIVAL(&ptr->header.offset, 0, ptr->bufIndex); \ + } \ + } -#define AddString(ptr, header, string) \ -{ \ -char *p = string; \ -int32_t len = 0; \ -if (p) len = strlen(p); \ -AddBytes(ptr, header, ((unsigned char*)p), len); \ -} +#define AddString(ptr, header, string) \ + { \ + char *p = string; \ + int32_t len = 0; \ + if (p) \ + len = strlen(p); \ + AddBytes(ptr, header, ((unsigned char *)p), len); \ + } -#define AddUnicodeString(ptr, header, string) \ -{ \ -char *p = string; \ -unsigned char *b = NULL; \ -int32_t len = 0; \ -if (p) \ - { \ - len = strlen(p); \ - b = strToUnicode(p); \ - } \ -AddBytes(ptr, header, b, len*2); \ -} +#define AddUnicodeString(ptr, header, string) \ + { \ + char *p = string; \ + unsigned char *b = NULL; \ + int32_t len = 0; \ + if (p) { \ + len = strlen(p); \ + b = strToUnicode(p); \ + } \ + AddBytes(ptr, header, b, len * 2); \ + } +#define GetUnicodeString(structPtr, header) unicodeToString(((char *)structPtr) + IVAL(&structPtr->header.offset, 0), SVAL(&structPtr->header.len, 0) / 2) +#define GetString(structPtr, header) toString((((char *)structPtr) + IVAL(&structPtr->header.offset, 0)), SVAL(&structPtr->header.len, 0)) +#define DumpBuffer(fp, structPtr, header) dumpRaw(fp, ((unsigned char *)structPtr) + IVAL(&structPtr->header.offset, 0), SVAL(&structPtr->header.len, 0)) -#define GetUnicodeString(structPtr, header) \ -unicodeToString(((char*)structPtr) + IVAL(&structPtr->header.offset,0) , SVAL(&structPtr->header.len,0)/2) -#define GetString(structPtr, header) \ -toString((((char *)structPtr) + IVAL(&structPtr->header.offset,0)), SVAL(&structPtr->header.len,0)) -#define DumpBuffer(fp, structPtr, header) \ -dumpRaw(fp,((unsigned char*)structPtr)+IVAL(&structPtr->header.offset,0),SVAL(&structPtr->header.len,0)) - - -static void dumpRaw(FILE * fp, unsigned char *buf, size_t len) { +static void dumpRaw(FILE *fp, unsigned char *buf, size_t len) { int32_t i; - for (i = 0; i < (int32_t) len; ++i) + for (i = 0; i < (int32_t)len; ++i) fprintf(fp, "%02x ", buf[i]); fprintf(fp, "\n"); @@ -1176,7 +1163,7 @@ static char *unicodeToString(char *p, size_t len) { assert(len + 1 < sizeof buf); - for (i = 0; i < (int32_t) len; ++i) { + for (i = 0; i < (int32_t)len; ++i) { buf[i] = *p & 0x7f; p += 2; } @@ -1210,12 +1197,11 @@ static unsigned char *toString(char *p, size_t len) { return buf; } +void buildAuthRequest(tSmbNtlmAuthRequest *request, long flags, char *host, char *domain) { + char *h = NULL; // strdup(host); + char *p = NULL; // strchr(h,'@'); -void buildAuthRequest(tSmbNtlmAuthRequest * request, long flags, char *host, char *domain) { - char *h = NULL; //strdup(host); - char *p = NULL; //strchr(h,'@'); - -//TODO: review default flags + // TODO: review default flags if (host == NULL) host = ""; @@ -1230,7 +1216,7 @@ void buildAuthRequest(tSmbNtlmAuthRequest * request, long flags, char *host, cha *p = '\0'; } if (flags == 0) - flags = 0x0000b207; /* Lowest security options to avoid negotiation */ + flags = 0x0000b207; /* Lowest security options to avoid negotiation */ request->bufIndex = 0; memcpy(request->ident, "NTLMSSP\0\0\0", 8); SIVAL(&request->msgType, 0, 1); @@ -1243,7 +1229,7 @@ void buildAuthRequest(tSmbNtlmAuthRequest * request, long flags, char *host, cha free(h); } -void buildAuthResponse(tSmbNtlmAuthChallenge *challenge, tSmbNtlmAuthResponse * response, long flags, char *user, char *password, char *domainname, char *host) { +void buildAuthResponse(tSmbNtlmAuthChallenge *challenge, tSmbNtlmAuthResponse *response, long flags, char *user, char *password, char *domainname, char *host) { uint8 lmRespData[24]; uint8 ntRespData[24]; char *u = strdup(user); @@ -1264,8 +1250,8 @@ void buildAuthResponse(tSmbNtlmAuthChallenge *challenge, tSmbNtlmAuthResponse * *p = '\0'; } - SMBencrypt((unsigned char *) password, challenge->challengeData, lmRespData); - SMBNTencrypt((unsigned char *) password, challenge->challengeData, ntRespData); + SMBencrypt((unsigned char *)password, challenge->challengeData, lmRespData); + SMBNTencrypt((unsigned char *)password, challenge->challengeData, ntRespData); response->bufIndex = 0; memcpy(response->ident, "NTLMSSP\0\0\0", 8); @@ -1284,7 +1270,7 @@ void buildAuthResponse(tSmbNtlmAuthChallenge *challenge, tSmbNtlmAuthResponse * AddString(response, sessionKey, NULL); if (flags != 0) - challenge->flags = flags; /* Overide flags! */ + challenge->flags = flags; /* Overide flags! */ response->flags = challenge->flags; if (w) @@ -1295,16 +1281,12 @@ void buildAuthResponse(tSmbNtlmAuthChallenge *challenge, tSmbNtlmAuthResponse * free(u); } - - - - // info functions -void dumpAuthRequest(FILE * fp, tSmbNtlmAuthRequest * request); -void dumpAuthChallenge(FILE * fp, tSmbNtlmAuthChallenge * challenge); -void dumpAuthResponse(FILE * fp, tSmbNtlmAuthResponse * response); +void dumpAuthRequest(FILE *fp, tSmbNtlmAuthRequest *request); +void dumpAuthChallenge(FILE *fp, tSmbNtlmAuthChallenge *challenge); +void dumpAuthResponse(FILE *fp, tSmbNtlmAuthResponse *response); -void dumpAuthRequest(FILE * fp, tSmbNtlmAuthRequest * request) { +void dumpAuthRequest(FILE *fp, tSmbNtlmAuthRequest *request) { fprintf(fp, "NTLM Request:\n"); fprintf(fp, " Ident = %s\n", request->ident); fprintf(fp, " mType = %u\n", IVAL(&request->msgType, 0)); @@ -1313,7 +1295,7 @@ void dumpAuthRequest(FILE * fp, tSmbNtlmAuthRequest * request) { fprintf(fp, " Domain = %s\n", GetString(request, domain)); } -void dumpAuthChallenge(FILE * fp, tSmbNtlmAuthChallenge * challenge) { +void dumpAuthChallenge(FILE *fp, tSmbNtlmAuthChallenge *challenge) { fprintf(fp, "NTLM Challenge:\n"); fprintf(fp, " Ident = %s\n", challenge->ident); fprintf(fp, " mType = %u\n", IVAL(&challenge->msgType, 0)); @@ -1324,7 +1306,7 @@ void dumpAuthChallenge(FILE * fp, tSmbNtlmAuthChallenge * challenge) { fprintf(fp, " Incomplete!! parse optional parameters\n"); } -void dumpAuthResponse(FILE * fp, tSmbNtlmAuthResponse * response) { +void dumpAuthResponse(FILE *fp, tSmbNtlmAuthResponse *response) { fprintf(fp, "NTLM Response:\n"); fprintf(fp, " Ident = %s\n", response->ident); fprintf(fp, " mType = %u\n", IVAL(&response->msgType, 0)); @@ -1340,12 +1322,6 @@ void dumpAuthResponse(FILE * fp, tSmbNtlmAuthResponse * response) { fprintf(fp, " Flags = %08x\n", IVAL(&response->flags, 0)); } - - - - - - /* * base64.c -- base-64 conversion routines. * @@ -1360,22 +1336,13 @@ void dumpAuthResponse(FILE * fp, tSmbNtlmAuthResponse * response) { * This code borrowed from fetchmail sources */ - static const char base64digits[] = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/"; -#define BAD -1 -static const char base64val[] = { - BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, - BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, - BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, 62, BAD, BAD, BAD, 63, - 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, BAD, BAD, BAD, BAD, BAD, BAD, - BAD, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, - 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, BAD, BAD, BAD, BAD, BAD, - BAD, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, - 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, BAD, BAD, BAD, BAD, BAD -}; +#define BAD -1 +static const char base64val[] = {BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, BAD, 62, BAD, BAD, BAD, 63, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, BAD, BAD, BAD, BAD, BAD, BAD, + BAD, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, BAD, BAD, BAD, BAD, BAD, BAD, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, BAD, BAD, BAD, BAD, BAD}; -#define DECODE64(c) (isascii(c) ? base64val[c] : BAD) +#define DECODE64(c) (isascii(c) ? base64val[c] : BAD) void to64frombits(unsigned char *out, const unsigned char *in, int32_t inlen) diff --git a/ntlm.h b/ntlm.h index 85f8f7f..3150536 100644 --- a/ntlm.h +++ b/ntlm.h @@ -2,75 +2,78 @@ Single file NTLM system to create and parse authentication messages. http://www.reversing.org - ilo-- ilo@reversing.org + ilo-- ilo@reversing.org - I did copy&paste&modify several files to leave independent NTLM code - that compile in cygwin/linux environment. Most of the code was ripped + I did copy&paste&modify several files to leave independent NTLM code + that compile in cygwin/linux environment. Most of the code was ripped from Samba implementation so I left the Copying statement. Samba core code was left unmodified from 1.9 version. Also libntlm was ripped but rewrote, due to fixed and useless interface. Copyright and licensing information is in ntlm.c file. - NTLM Interface, just two functions: + NTLM Interface, just two functions: - void BuildAuthRequest(tSmbNtlmAuthRequest *request, long flags, char *host, char *domain); - if flags is 0 minimun security level is selected, otherwise new value superseeds. - host and domain are optional, they may be NULLed. + void BuildAuthRequest(tSmbNtlmAuthRequest *request, long flags, char *host, + char *domain); if flags is 0 minimun security level is selected, otherwise + new value superseeds. host and domain are optional, they may be NULLed. - void buildAuthResponse(tSmbNtlmAuthChallenge *challenge, tSmbNtlmAuthResponse *response, long flags, char *user, char *password, char *domain, char *host); + void buildAuthResponse(tSmbNtlmAuthChallenge *challenge, tSmbNtlmAuthResponse + *response, long flags, char *user, char *password, char *domain, char *host); Given a challenge, generates a response for that user/passwd/host/domain. - flags, host, and domain superseeds given by server. Leave 0 and NULL for server authentication + flags, host, and domain superseeds given by server. Leave 0 and NULL for + server authentication - This is an usage sample: + This is an usage sample: - ... - //beware of fixed sized buffer, asserts may fail, don't use long strings :) - //Yes, I Know, year 2k6 and still with this shit.. - unsigned char buf[4096]; - unsigned char buf2[4096]; + ... + //beware of fixed sized buffer, asserts may fail, don't use long + strings :) + //Yes, I Know, year 2k6 and still with this shit.. + unsigned char buf[4096]; + unsigned char buf2[4096]; - //send auth request: let the server send it's own hostname and domainname - buildAuthRequest((tSmbNtlmAuthRequest*)buf2,0,NULL,NULL); - to64frombits(buf, buf2, SmbLength((tSmbNtlmAuthRequest*)buf2)); - send_to_server(buf); + //send auth request: let the server send it's own hostname and + domainname buildAuthRequest((tSmbNtlmAuthRequest*)buf2,0,NULL,NULL); + to64frombits(buf, buf2, SmbLength((tSmbNtlmAuthRequest*)buf2)); + send_to_server(buf); - //receive challenge - receive_from_server(buf); + //receive challenge + receive_from_server(buf); - //build response with hostname and domainname from server - buildAuthResponse((tSmbNtlmAuthChallenge*)buf,(tSmbNtlmAuthResponse*)buf2,0,"username","password",NULL,NULL); - to64frombits(buf, buf2, SmbLength((tSmbNtlmAuthResponse*)buf2)); - send_to_server(buf); + //build response with hostname and domainname from server + buildAuthResponse((tSmbNtlmAuthChallenge*)buf,(tSmbNtlmAuthResponse*)buf2,0,"username","password",NULL,NULL); + to64frombits(buf, buf2, SmbLength((tSmbNtlmAuthResponse*)buf2)); + send_to_server(buf); - //get reply and Check if ok - ... + //get reply and Check if ok + ... included bonus!!: Base64 code int32_t from64tobits(char *out, const char *in); - void to64frombits(unsigned char *out, const unsigned char *in, int32_t inlen); + void to64frombits(unsigned char *out, const unsigned char *in, int32_t + inlen); - You don't need to read the rest of the file. + You don't need to read the rest of the file. */ - -/* +/* * These structures are byte-order dependant, and should not * be manipulated except by the use of the routines provided */ #ifdef __sun - #include +#include #elif defined(__FreeBSD__) || defined(__IBMCPP__) || defined(_AIX) - #include +#include #else - #include +#include #endif typedef unsigned short uint16; @@ -105,7 +108,6 @@ typedef struct { uint32 bufIndex; } tSmbNtlmAuthChallenge; - typedef struct { char ident[8]; uint32 msgType; @@ -120,34 +122,33 @@ typedef struct { uint32 bufIndex; } tSmbNtlmAuthResponse; - -extern void buildAuthRequest(tSmbNtlmAuthRequest * request, long flags, char *host, char *domain); +extern void buildAuthRequest(tSmbNtlmAuthRequest *request, long flags, char *host, char *domain); /* reversing interface */ /* ntlm functions */ -void BuildAuthRequest(tSmbNtlmAuthRequest * request, long flags, char *host, char *domain); +void BuildAuthRequest(tSmbNtlmAuthRequest *request, long flags, char *host, char *domain); -// if flags is 0 minimun security level is selected, otherwise new value superseeds. -// host and domain are optional, they may be NULLed. +// if flags is 0 minimun security level is selected, otherwise new value +// superseeds. host and domain are optional, they may be NULLed. +void buildAuthResponse(tSmbNtlmAuthChallenge *challenge, tSmbNtlmAuthResponse *response, long flags, char *user, char *password, char *domain, char *host); -void buildAuthResponse(tSmbNtlmAuthChallenge * challenge, tSmbNtlmAuthResponse * response, long flags, char *user, char *password, char *domain, char *host); - -//Given a challenge, generates a response for that user/passwd/host/domain. -//flags, host, and domain superseeds given by server. Leave 0 and NULL for server authentication +// Given a challenge, generates a response for that user/passwd/host/domain. +// flags, host, and domain superseeds given by server. Leave 0 and NULL for +// server authentication /* Base64 code*/ int32_t from64tobits(char *out, const char *in); void to64frombits(unsigned char *out, const unsigned char *in, int32_t inlen); -void xor(char *out, char *in1, char *in2, int32_t n); +void xor (char *out, char *in1, char *in2, int32_t n); // info functions -void dumpAuthRequest(FILE * fp, tSmbNtlmAuthRequest * request); -void dumpAuthChallenge(FILE * fp, tSmbNtlmAuthChallenge * challenge); -void dumpAuthResponse(FILE * fp, tSmbNtlmAuthResponse * response); +void dumpAuthRequest(FILE *fp, tSmbNtlmAuthRequest *request); +void dumpAuthChallenge(FILE *fp, tSmbNtlmAuthChallenge *challenge); +void dumpAuthResponse(FILE *fp, tSmbNtlmAuthResponse *response); void strupper(char *s); -#define SmbLength(ptr) (((ptr)->buffer - (uint8*)(ptr)) + (ptr)->bufIndex) +#define SmbLength(ptr) (((ptr)->buffer - (uint8 *)(ptr)) + (ptr)->bufIndex) diff --git a/performance.h b/performance.h index 10759f8..8fcced9 100644 --- a/performance.h +++ b/performance.h @@ -1,13 +1,13 @@ -#include -#include #include +#include +#include #include #include #include -#include +#include /* handles select errors */ -int32_t my_select(int32_t fd, fd_set * fdread, fd_set * fdwrite, fd_set * fdex, long sec, long usec) { +int32_t my_select(int32_t fd, fd_set *fdread, fd_set *fdwrite, fd_set *fdex, long sec, long usec) { int32_t ret_val; struct timeval stv; fd_set *fdr2, *fdw2, *fde2; @@ -18,10 +18,12 @@ int32_t my_select(int32_t fd, fd_set * fdread, fd_set * fdwrite, fd_set * fdex, fde2 = fdex; stv.tv_sec = sec; stv.tv_usec = usec; - if (debug > 1) printf("before select\n"); + if (debug > 1) + printf("before select\n"); ret_val = select(fd, fdr2, fdw2, fde2, &stv); - if (debug > 1) printf("after select\n"); - /* XXX select() sometimes returns errno=EINTR (signal found) */ + if (debug > 1) + printf("after select\n"); + /* XXX select() sometimes returns errno=EINTR (signal found) */ } while (ret_val == -1 && errno == EINTR); return ret_val; @@ -43,7 +45,7 @@ ssize_t read_safe(int32_t fd, void *buffer, size_t len) { tv.tv_sec = 0; tv.tv_usec = 250000; ret = select(fd + 1, &fr, 0, 0, &tv); - /* XXX select() sometimes return errno=EINTR (signal found) */ + /* XXX select() sometimes return errno=EINTR (signal found) */ } while (ret == -1 && errno == EINTR); if (ret < 0) { @@ -55,7 +57,7 @@ ssize_t read_safe(int32_t fd, void *buffer, size_t len) { } if (ret > 0) { - while ((r = read(fd, (char*) ((char*)buffer + total), toread))) { + while ((r = read(fd, (char *)((char *)buffer + total), toread))) { if (r == -1) { if (errno == EAGAIN) break; diff --git a/postgres_ext.h b/postgres_ext.h index 16ceadd..e5791d1 100644 --- a/postgres_ext.h +++ b/postgres_ext.h @@ -4,8 +4,9 @@ * postgres_ext.h * * This file contains declarations of things that are visible everywhere - * in PostgreSQL *and* are visible to clients of frontend interface libraries. - * For example, the Oid type is part of the API of libpq and other libraries. + * in PostgreSQL *and* are visible to clients of frontend interface + *libraries. For example, the Oid type is part of the API of libpq and other + *libraries. * * Declarations which are specific to a particular interface should * go in the header file for that interface (such as libpq-fe.h). This @@ -30,16 +31,15 @@ typedef uint32_t Oid; #ifdef __cplusplus -#define InvalidOid (Oid(0)) +#define InvalidOid (Oid(0)) #else -#define InvalidOid ((Oid) 0) +#define InvalidOid ((Oid)0) #endif -#define OID_MAX UINT_MAX +#define OID_MAX UINT_MAX /* you will need to include to use the above #define */ - /* * NAMEDATALEN is the max length for system identifiers (e.g. table names, * attribute names, function names, etc). It must be a multiple of @@ -49,21 +49,20 @@ typedef uint32_t Oid; */ #define NAMEDATALEN 64 - /* * Identifiers of error message fields. Kept here to keep common * between frontend and backend, and also to export them to libpq * applications. */ -#define PG_DIAG_SEVERITY 'S' -#define PG_DIAG_SQLSTATE 'C' -#define PG_DIAG_MESSAGE_PRIMARY 'M' -#define PG_DIAG_MESSAGE_DETAIL 'D' -#define PG_DIAG_MESSAGE_HINT 'H' +#define PG_DIAG_SEVERITY 'S' +#define PG_DIAG_SQLSTATE 'C' +#define PG_DIAG_MESSAGE_PRIMARY 'M' +#define PG_DIAG_MESSAGE_DETAIL 'D' +#define PG_DIAG_MESSAGE_HINT 'H' #define PG_DIAG_STATEMENT_POSITION 'P' -#define PG_DIAG_CONTEXT 'W' -#define PG_DIAG_SOURCE_FILE 'F' -#define PG_DIAG_SOURCE_LINE 'L' -#define PG_DIAG_SOURCE_FUNCTION 'R' +#define PG_DIAG_CONTEXT 'W' +#define PG_DIAG_SOURCE_FILE 'F' +#define PG_DIAG_SOURCE_LINE 'L' +#define PG_DIAG_SOURCE_FUNCTION 'R' #endif diff --git a/pw-inspector.c b/pw-inspector.c index 11afdc5..ffe93ac 100644 --- a/pw-inspector.c +++ b/pw-inspector.c @@ -1,38 +1,46 @@ -#include -#include -#include -#include #include #include +#include +#include +#include +#include -#define PROGRAM "PW-Inspector" -#define VERSION "v0.2" -#define EMAIL "vh@thc.org" -#define WEB "https://github.com/vanhauser-thc/thc-hydra" +#define PROGRAM "PW-Inspector" +#define VERSION "v0.2" +#define EMAIL "vh@thc.org" +#define WEB "https://github.com/vanhauser-thc/thc-hydra" -#define MAXLENGTH 256 +#define MAXLENGTH 256 char *prg; void help() { printf("%s %s (c) 2005 by van Hauser / THC %s [%s]\n\n", PROGRAM, VERSION, EMAIL, WEB); - printf("Syntax: %s [-i FILE] [-o FILE] [-m MINLEN] [-M MAXLEN] [-c MINSETS] -l -u -n -p -s\n\n", prg); + printf("Syntax: %s [-i FILE] [-o FILE] [-m MINLEN] [-M MAXLEN] [-c MINSETS] " + "-l -u -n -p -s\n\n", + prg); printf("Options:\n"); printf(" -i FILE file to read passwords from (default: stdin)\n"); printf(" -o FILE file to write valid passwords to (default: stdout)\n"); printf(" -m MINLEN minimum length of a valid password\n"); printf(" -M MAXLEN maximum length of a valid password\n"); - printf(" -c MINSETS the minimum number of sets required (default: all given)\n"); + printf(" -c MINSETS the minimum number of sets required (default: all " + "given)\n"); printf("Sets:\n"); printf(" -l lowcase characters (a,b,c,d, etc.)\n"); printf(" -u upcase characters (A,B,C,D, etc.)\n"); printf(" -n numbers (1,2,3,4, etc.)\n"); - printf(" -p printable characters (which are not -l/-n/-p, e.g. $,!,/,(,*, etc.)\n"); - printf(" -s special characters - all others not within the sets above\n"); + printf(" -p printable characters (which are not -l/-n/-p, e.g. " + "$,!,/,(,*, etc.)\n"); + printf(" -s special characters - all others not within the sets " + "above\n"); printf("\n%s reads passwords in and prints those which meet the requirements.\n", PROGRAM); - printf("The return code is the number of valid passwords found, 0 if none was found.\n"); - printf("Use for security: check passwords, if 0 is returned, reject password choice.\n"); - printf("Use for hacking: trim your dictionary file to the pw requirements of the target.\n"); + printf("The return code is the number of valid passwords found, 0 if none " + "was found.\n"); + printf("Use for security: check passwords, if 0 is returned, reject password " + "choice.\n"); + printf("Use for hacking: trim your dictionary file to the pw requirements of " + "the target.\n"); printf("Usage only allowed for legal purposes.\n"); exit(-1); } @@ -137,7 +145,7 @@ int main(int argc, char *argv[]) { if (set_print) { j = 0; for (k = 0; k < strlen(buf); k++) - if (isprint((int32_t) buf[k]) != 0 && isalnum((int32_t) buf[k]) == 0) + if (isprint((int32_t)buf[k]) != 0 && isalnum((int32_t)buf[k]) == 0) j = 1; if (j) i++; @@ -145,7 +153,7 @@ int main(int argc, char *argv[]) { if (set_other) { j = 0; for (k = 0; k < strlen(buf); k++) - if (isprint((int32_t) buf[k]) == 0 && isalnum((int32_t) buf[k]) == 0) + if (isprint((int32_t)buf[k]) == 0 && isalnum((int32_t)buf[k]) == 0) j = 1; if (j) i++; @@ -156,7 +164,8 @@ int main(int argc, char *argv[]) { count++; } } - /* fprintf(stderr, "[DEBUG] i: %d minlen: %d maxlen: %d len: %d\n", i, minlen, maxlen, strlen(buf)); */ + /* fprintf(stderr, "[DEBUG] i: %d minlen: %d maxlen: %d len: %d\n", i, + * minlen, maxlen, strlen(buf)); */ } fclose(in); fclose(out); diff --git a/sasl.c b/sasl.c index ba08978..7470743 100644 --- a/sasl.c +++ b/sasl.c @@ -87,7 +87,7 @@ void sasl_plain(char *result, char *login, char *pass) { strcpy(result, preplogin); strcpy(result + strlen(preplogin) + 1, preplogin); strcpy(result + 2 * strlen(preplogin) + 2, preppasswd); - hydra_tobase64((unsigned char *) result, strlen(preplogin) * 2 + strlen(preppasswd) + 2, 250); + hydra_tobase64((unsigned char *)result, strlen(preplogin) * 2 + strlen(preppasswd) + 2, 250); } free(preplogin); free(preppasswd); @@ -128,8 +128,8 @@ void sasl_cram_md5(char *result, char *pass, char *challenge) { memcpy(ipad, md5_raw, MD5_DIGEST_LENGTH); memcpy(opad, md5_raw, MD5_DIGEST_LENGTH); } else { - strcpy(ipad, preppasswd); // safe - strcpy(opad, preppasswd); // safe + strcpy(ipad, preppasswd); // safe + strcpy(opad, preppasswd); // safe } for (i = 0; i < 64; i++) { ipad[i] ^= 0x36; @@ -182,8 +182,8 @@ void sasl_cram_sha1(char *result, char *pass, char *challenge) { memcpy(ipad, sha1_raw, SHA_DIGEST_LENGTH); memcpy(opad, sha1_raw, SHA_DIGEST_LENGTH); } else { - strcpy(ipad, preppasswd); // safe - strcpy(opad, preppasswd); // safe + strcpy(ipad, preppasswd); // safe + strcpy(opad, preppasswd); // safe } for (i = 0; i < 64; i++) { ipad[i] ^= 0x36; @@ -236,8 +236,8 @@ void sasl_cram_sha256(char *result, char *pass, char *challenge) { memcpy(ipad, sha256_raw, SHA256_DIGEST_LENGTH); memcpy(opad, sha256_raw, SHA256_DIGEST_LENGTH); } else { - strcpy(ipad, preppasswd); // safe - strcpy(opad, preppasswd); // safe + strcpy(ipad, preppasswd); // safe + strcpy(opad, preppasswd); // safe } for (i = 0; i < 64; i++) { ipad[i] ^= 0x36; @@ -285,10 +285,12 @@ void sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char * result = NULL; return; } -//DEBUG S: nonce="HB3HGAk+hxKpijy/ichq7Wob3Zo17LPM9rr4kMX7xRM=",realm="tida",qop="auth",maxbuf=4096,charset=utf-8,algorithm=md5-sess -//DEBUG S: nonce="1Mr6c8WjOd/x5r8GUnGeQIRNUtOVtItu3kQOGAmsZfM=",realm="test.com",qop="auth,auth-int32_t,auth-conf",cipher="rc4-40,rc4-56,rc4,des,3des",maxbuf=4096,charset=utf-8,algorithm=md5-sess -//warning some not well configured xmpp server is sending no realm -//DEBUG S: nonce="3448160828",qop="auth",charset=utf-8,algorithm=md5-sess + // DEBUG S: + // nonce="HB3HGAk+hxKpijy/ichq7Wob3Zo17LPM9rr4kMX7xRM=",realm="tida",qop="auth",maxbuf=4096,charset=utf-8,algorithm=md5-sess + // DEBUG S: + // nonce="1Mr6c8WjOd/x5r8GUnGeQIRNUtOVtItu3kQOGAmsZfM=",realm="test.com",qop="auth,auth-int32_t,auth-conf",cipher="rc4-40,rc4-56,rc4,des,3des",maxbuf=4096,charset=utf-8,algorithm=md5-sess + // warning some not well configured xmpp server is sending no realm + // DEBUG S: nonce="3448160828",qop="auth",charset=utf-8,algorithm=md5-sess pbuffer = buffer; do { currentpos++; @@ -309,7 +311,7 @@ void sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char * } pbuffer++; } while ((pbuffer[0] > 31) && (ind < array_size)); -//save the latest one + // save the latest one if (ind < array_size) { array[ind] = malloc(currentpos + 1); strncpy(array[ind], buffer + lastpos, currentpos); @@ -317,18 +319,18 @@ void sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char * ind++; } for (i = 0; i < ind; i++) { -//removing space chars between comma separated value if any + // removing space chars between comma separated value if any while ((array[i] != NULL) && (array[i][0] == ' ')) { char *tmp = strdup(array[i]); - //memset(array[i], 0, sizeof(array[i])); + // memset(array[i], 0, sizeof(array[i])); strcpy(array[i], tmp + 1); free(tmp); } if (strstr(array[i], "nonce=") != NULL) { -//check if it contains double-quote + // check if it contains double-quote if (strstr(array[i], "\"") != NULL) { -//assume last char is also a double-quote + // assume last char is also a double-quote int32_t nonce_string_len = strlen(array[i]) - strlen("nonce=\"") - 1; if ((nonce_string_len > 0) && (nonce_string_len <= sizeof(nonce) - 1)) { @@ -351,7 +353,7 @@ void sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char * } if (strstr(array[i], "realm=") != NULL) { if (strstr(array[i], "\"") != NULL) { -//assume last char is also a double-quote + // assume last char is also a double-quote int32_t realm_string_len = strlen(array[i]) - strlen("realm=\"") - 1; if ((realm_string_len > 0) && (realm_string_len <= sizeof(realm) - 1)) { @@ -373,12 +375,11 @@ void sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char * } } if (strstr(array[i], "qop=") != NULL) { - -/* -The value "auth" indicates authentication; the value "auth-int32_t" indicates -authentication with integrity protection; the value "auth-conf" -indicates authentication with integrity protection and encryption. -*/ + /* + The value "auth" indicates authentication; the value "auth-int32_t" + indicates authentication with integrity protection; the value "auth-conf" + indicates authentication with integrity protection and encryption. + */ auth_find = 1; if ((strstr(array[i], "\"auth\"") == NULL) && (strstr(array[i], "\"auth,") == NULL) && (strstr(array[i], ",auth\"") == NULL)) { int32_t j; @@ -386,14 +387,15 @@ indicates authentication with integrity protection and encryption. for (j = 0; j < ind; j++) if (array[j] != NULL) free(array[j]); - hydra_report(stderr, "Error: DIGEST-MD5 quality of protection only authentication is not supported by server\n"); + hydra_report(stderr, "Error: DIGEST-MD5 quality of protection only " + "authentication is not supported by server\n"); result = NULL; return; } } if (strstr(array[i], "algorithm=") != NULL) { if (strstr(array[i], "\"") != NULL) { -//assume last char is also a double-quote + // assume last char is also a double-quote int32_t algo_string_len = strlen(array[i]) - strlen("algorithm=\"") - 1; if ((algo_string_len > 0) && (algo_string_len <= sizeof(algo) - 1)) { @@ -405,7 +407,8 @@ indicates authentication with integrity protection and encryption. for (j = 0; j < ind; j++) if (array[j] != NULL) free(array[j]); - hydra_report(stderr, "Error: DIGEST-MD5 algorithm from server could not be extracted\n"); + hydra_report(stderr, "Error: DIGEST-MD5 algorithm from server could " + "not be extracted\n"); result = NULL; return; } @@ -428,24 +431,25 @@ indicates authentication with integrity protection and encryption. array[i] = NULL; } if (!strlen(algo)) { -//assuming by default algo is MD5 + // assuming by default algo is MD5 memset(algo, 0, sizeof(algo)); strcpy(algo, "MD5"); } -//xmpp case, some xmpp server is not sending the realm so we have to set it up + // xmpp case, some xmpp server is not sending the realm so we have to set it + // up if ((strlen(realm) == 0) && (strstr(type, "xmpp") != NULL)) snprintf(realm, sizeof(realm), "%s", miscptr); -//compute ha1 -//support for algo = MD5 + // compute ha1 + // support for algo = MD5 snprintf(buffer, 500, "%s:%s:%s", preplogin, realm, preppasswd); MD5_Init(&md5c); MD5_Update(&md5c, buffer, strlen(buffer)); MD5_Final(response, &md5c); -//for MD5-sess + // for MD5-sess if (strstr(algo, "5-sess") != NULL) { - buffer[0] = 0; //memset(buffer, 0, sizeof(buffer)); => buffer is char*! + buffer[0] = 0; // memset(buffer, 0, sizeof(buffer)); => buffer is char*! -/* per RFC 2617 Errata ID 1649 */ + /* per RFC 2617 Errata ID 1649 */ if ((strstr(type, "proxy") != NULL) || (strstr(type, "GET") != NULL) || (strstr(type, "HEAD") != NULL)) { memset(buffer3, 0, sizeof(buffer3)); pbuffer = buffer3; @@ -468,24 +472,24 @@ indicates authentication with integrity protection and encryption. sprintf(pbuffer, "%02x", response[i]); pbuffer += 2; } -//compute ha2 -//proxy case + // compute ha2 + // proxy case if (strstr(type, "proxy") != NULL) sprintf(buffer, "%s:%s", "HEAD", miscptr); else -//http case - if ((strstr(type, "GET") != NULL) || (strstr(type, "HEAD") != NULL)) + // http case + if ((strstr(type, "GET") != NULL) || (strstr(type, "HEAD") != NULL)) sprintf(buffer, "%s:%s", type, miscptr); else -//sip case - if (strstr(type, "sip") != NULL) + // sip case + if (strstr(type, "sip") != NULL) sprintf(buffer, "REGISTER:%s:%s", type, miscptr); else -//others - if (strstr(type, "rtsp") != NULL) + // others + if (strstr(type, "rtsp") != NULL) sprintf(buffer, "DESCRIBE:%s://%s:%i", type, webtarget, port); else -//others + // others sprintf(buffer, "AUTHENTICATE:%s/%s", type, realm); MD5_Init(&md5c); @@ -496,7 +500,7 @@ indicates authentication with integrity protection and encryption. sprintf(pbuffer, "%02x", response[i]); pbuffer += 2; } -//compute response + // compute response if (!auth_find) snprintf(buffer, 500, "%s:%s", nonce, buffer2); else @@ -511,35 +515,58 @@ indicates authentication with integrity protection and encryption. sprintf(pbuffer, "%02x", response[i]); pbuffer += 2; } -//create the auth response + // create the auth response if (strstr(type, "proxy") != NULL) { snprintf(result, 500, - "HEAD %s HTTP/1.0\r\n%sProxy-Authorization: Digest username=\"%s\", realm=\"%s\", response=\"%s\", nonce=\"%s\", cnonce=\"hydra\", nc=00000001, algorithm=%s, qop=auth, uri=\"%s\"\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\nConnection: keep-alive\r\n%s\r\n", + "HEAD %s HTTP/1.0\r\n%sProxy-Authorization: Digest username=\"%s\", " + "realm=\"%s\", response=\"%s\", nonce=\"%s\", cnonce=\"hydra\", " + "nc=00000001, algorithm=%s, qop=auth, uri=\"%s\"\r\nUser-Agent: " + "Mozilla/4.0 (Hydra)\r\nConnection: keep-alive\r\n%s\r\n", miscptr, webtarget, preplogin, realm, buffer, nonce, algo, miscptr, header); } else { - if ((strstr(type, "imap") != NULL) || (strstr(type, "pop") != NULL) || (strstr(type, "smtp") != NULL) || - (strstr(type, "ldap") != NULL) || (strstr(type, "xmpp") != NULL) || (strstr(type, "nntp") != NULL)) { - snprintf(result, 500, "username=\"%s\",realm=\"%s\",nonce=\"%s\",cnonce=\"hydra\",nc=00000001,algorithm=%s,qop=\"auth\",digest-uri=\"%s/%s\",response=%s", preplogin, realm, - nonce, algo, type, realm, buffer); + if ((strstr(type, "imap") != NULL) || (strstr(type, "pop") != NULL) || (strstr(type, "smtp") != NULL) || (strstr(type, "ldap") != NULL) || (strstr(type, "xmpp") != NULL) || (strstr(type, "nntp") != NULL)) { + snprintf(result, 500, + "username=\"%s\",realm=\"%s\",nonce=\"%s\",cnonce=\"hydra\",nc=" + "00000001,algorithm=%s,qop=\"auth\",digest-uri=\"%s/%s\",response=%s", + preplogin, realm, nonce, algo, type, realm, buffer); } else { if (strstr(type, "sip") != NULL) { - snprintf(result, 500, "username=\"%s\",realm=\"%s\",nonce=\"%s\",uri=\"%s:%s\",response=%s", preplogin, realm, nonce, type, realm, buffer); + snprintf(result, 500, + "username=\"%s\",realm=\"%s\",nonce=\"%s\",uri=\"%s:%s\"," + "response=%s", + preplogin, realm, nonce, type, realm, buffer); } else { if (strstr(type, "rtsp") != NULL) { - snprintf(result, 500, "username=\"%s\", realm=\"%s\", nonce=\"%s\", uri=\"%s://%s:%i\", response=\"%s\"\r\n", preplogin, realm, nonce, type, webtarget, port, buffer); + snprintf(result, 500, + "username=\"%s\", realm=\"%s\", nonce=\"%s\", " + "uri=\"%s://%s:%i\", response=\"%s\"\r\n", + preplogin, realm, nonce, type, webtarget, port, buffer); } else { if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) snprintf(result, 500, - "%s http://%s:%d%s HTTP/1.0\r\nHost: %s\r\nAuthorization: Digest username=\"%s\", realm=\"%s\", response=\"%s\", nonce=\"%s\", cnonce=\"hydra\", nc=00000001, algorithm=%s, qop=auth, uri=\"%s\"\r\nProxy-Authorization: Basic %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\nConnection: keep-alive\r\n%s\r\n", + "%s http://%s:%d%s HTTP/1.0\r\nHost: %s\r\nAuthorization: " + "Digest username=\"%s\", realm=\"%s\", response=\"%s\", " + "nonce=\"%s\", cnonce=\"hydra\", nc=00000001, algorithm=%s, " + "qop=auth, uri=\"%s\"\r\nProxy-Authorization: Basic " + "%s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\nConnection: " + "keep-alive\r\n%s\r\n", type, webtarget, webport, miscptr, webtarget, preplogin, realm, buffer, nonce, algo, miscptr, proxy_authentication[selected_proxy], header); else { if (use_proxy == 1) snprintf(result, 500, - "%s http://%s:%d%s HTTP/1.0\r\nHost: %s\r\nAuthorization: Digest username=\"%s\", realm=\"%s\", response=\"%s\", nonce=\"%s\", cnonce=\"hydra\", nc=00000001, algorithm=%s, qop=auth, uri=\"%s\"\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\nConnection: keep-alive\r\n%s\r\n", + "%s http://%s:%d%s HTTP/1.0\r\nHost: %s\r\nAuthorization: " + "Digest username=\"%s\", realm=\"%s\", response=\"%s\", " + "nonce=\"%s\", cnonce=\"hydra\", nc=00000001, algorithm=%s, " + "qop=auth, uri=\"%s\"\r\nUser-Agent: Mozilla/4.0 " + "(Hydra)\r\nConnection: keep-alive\r\n%s\r\n", type, webtarget, webport, miscptr, webtarget, preplogin, realm, buffer, nonce, algo, miscptr, header); else snprintf(result, 500, - "%s %s HTTP/1.0\r\nHost: %s\r\nAuthorization: Digest username=\"%s\", realm=\"%s\", response=\"%s\", nonce=\"%s\", cnonce=\"hydra\", nc=00000001, algorithm=%s, qop=auth, uri=\"%s\"\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\nConnection: keep-alive\r\n%s\r\n", + "%s %s HTTP/1.0\r\nHost: %s\r\nAuthorization: Digest " + "username=\"%s\", realm=\"%s\", response=\"%s\", " + "nonce=\"%s\", cnonce=\"hydra\", nc=00000001, algorithm=%s, " + "qop=auth, uri=\"%s\"\r\nUser-Agent: Mozilla/4.0 " + "(Hydra)\r\nConnection: keep-alive\r\n%s\r\n", type, miscptr, webtarget, preplogin, realm, buffer, nonce, algo, miscptr, header); } } @@ -579,10 +606,10 @@ void sasl_scram_sha1(char *result, char *pass, char *clientfirstmessagebare, cha return; } -/*client-final-message */ + /*client-final-message */ if (debug) hydra_report(stderr, "DEBUG S: %s\n", serverfirstmessage); -//r=hydra28Bo7kduPpAZLzhRQiLxc8Y9tiwgw+yP,s=ldDgevctH+Kg7b8RnnA3qA==,i=4096 + // r=hydra28Bo7kduPpAZLzhRQiLxc8Y9tiwgw+yP,s=ldDgevctH+Kg7b8RnnA3qA==,i=4096 if (strstr(serverfirstmessage, "r=") == NULL) { hydra_report(stderr, "Error: Can't understand server message\n"); free(preppasswd); @@ -592,7 +619,7 @@ void sasl_scram_sha1(char *result, char *pass, char *clientfirstmessagebare, cha strncpy(buffer, serverfirstmessage, sizeof(buffer) - 1); buffer[sizeof(buffer) - 1] = '\0'; nonce = strtok(buffer, ","); -//continue to search from the previous successful call + // continue to search from the previous successful call salt = strtok(NULL, ","); ic = strtok(NULL, ","); iter = atoi(ic + 2); @@ -611,7 +638,7 @@ void sasl_scram_sha1(char *result, char *pass, char *clientfirstmessagebare, cha return; } if ((salt != NULL) && (strlen(salt) > 2) && (strlen(salt) <= sizeof(buffer))) -//s=ghgIAfLl1+yUy/Xl1WD5Tw== remove the header s= + // s=ghgIAfLl1+yUy/Xl1WD5Tw== remove the header s= strcpy(buffer, salt + 2); else { hydra_report(stderr, "Error: Could not identify server salt value\n"); @@ -620,9 +647,9 @@ void sasl_scram_sha1(char *result, char *pass, char *clientfirstmessagebare, cha return; } -/* SaltedPassword := Hi(Normalize(password), salt, i) */ - saltlen = from64tobits((char *) salt, buffer); - if (PKCS5_PBKDF2_HMAC_SHA1(preppasswd, strlen(preppasswd), (unsigned char *) salt, saltlen, iter, SHA_DIGEST_LENGTH, SaltedPassword) != 1) { + /* SaltedPassword := Hi(Normalize(password), salt, i) */ + saltlen = from64tobits((char *)salt, buffer); + if (PKCS5_PBKDF2_HMAC_SHA1(preppasswd, strlen(preppasswd), (unsigned char *)salt, saltlen, iter, SHA_DIGEST_LENGTH, SaltedPassword) != 1) { hydra_report(stderr, "Error: Failed to generate PBKDF2\n"); free(preppasswd); result = NULL; @@ -631,18 +658,18 @@ void sasl_scram_sha1(char *result, char *pass, char *clientfirstmessagebare, cha /* ClientKey := HMAC(SaltedPassword, "Client Key") */ #define CLIENT_KEY "Client Key" - HMAC(EVP_sha1(), SaltedPassword, SHA_DIGEST_LENGTH, (const unsigned char *) CLIENT_KEY, strlen(CLIENT_KEY), ClientKey, &resultlen); + HMAC(EVP_sha1(), SaltedPassword, SHA_DIGEST_LENGTH, (const unsigned char *)CLIENT_KEY, strlen(CLIENT_KEY), ClientKey, &resultlen); -/* StoredKey := H(ClientKey) */ - SHA1((const unsigned char *) ClientKey, SHA_DIGEST_LENGTH, StoredKey); + /* StoredKey := H(ClientKey) */ + SHA1((const unsigned char *)ClientKey, SHA_DIGEST_LENGTH, StoredKey); -/* ClientSignature := HMAC(StoredKey, AuthMessage) */ + /* ClientSignature := HMAC(StoredKey, AuthMessage) */ snprintf(AuthMessage, 500, "%s,%s,%s", clientfirstmessagebare, serverfirstmessage, clientfinalmessagewithoutproof); - HMAC(EVP_sha1(), StoredKey, SHA_DIGEST_LENGTH, (const unsigned char *) AuthMessage, strlen(AuthMessage), ClientSignature, &resultlen); + HMAC(EVP_sha1(), StoredKey, SHA_DIGEST_LENGTH, (const unsigned char *)AuthMessage, strlen(AuthMessage), ClientSignature, &resultlen); -/* ClientProof := ClientKey XOR ClientSignature */ - xor(ClientProof, (char *) ClientKey, (char *) ClientSignature, 20); - to64frombits(clientproof_b64, (const unsigned char *) ClientProof, 20); + /* ClientProof := ClientKey XOR ClientSignature */ + xor(ClientProof, (char *)ClientKey, (char *)ClientSignature, 20); + to64frombits(clientproof_b64, (const unsigned char *)ClientProof, 20); snprintf(result, 500, "%s,p=%s", clientfinalmessagewithoutproof, clientproof_b64); if (debug) hydra_report(stderr, "DEBUG C: %s\n", result); diff --git a/sasl.h b/sasl.h index 459a5ab..01da091 100644 --- a/sasl.h +++ b/sasl.h @@ -1,8 +1,8 @@ +#include "hydra-mod.h" +#include "ntlm.h" #include #include -#include "ntlm.h" -#include "hydra-mod.h" #define AUTH_ERROR -1 #define AUTH_CLEAR 0 @@ -28,10 +28,7 @@ #endif #endif -typedef enum { - SASL_ALLOW_UNASSIGNED = 1 -} sasl_saslprep_flags; - +typedef enum { SASL_ALLOW_UNASSIGNED = 1 } sasl_saslprep_flags; int32_t print_hex(unsigned char *buf, int32_t len); @@ -39,9 +36,9 @@ void sasl_plain(char *result, char *login, char *pass); int32_t sasl_saslprep(const char *in, sasl_saslprep_flags flags, char **out); #ifdef LIBOPENSSL +#include #include #include -#include void sasl_cram_md5(char *result, char *pass, char *challenge); void sasl_cram_sha1(char *result, char *pass, char *challenge); From 0b093e67c4094616e96625dafb7423866dddc6c6 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Mon, 17 Feb 2020 09:44:26 +0100 Subject: [PATCH 276/531] remove carriage returns in lines (pw-inspector) --- pw-inspector.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/pw-inspector.c b/pw-inspector.c index ffe93ac..2f53e05 100644 --- a/pw-inspector.c +++ b/pw-inspector.c @@ -130,6 +130,8 @@ int main(int argc, char *argv[]) { continue; if (buf[strlen(buf) - 1] == '\n') buf[strlen(buf) - 1] = 0; + if (buf[strlen(buf) - 1] == '\r') + buf[strlen(buf) - 1] = 0; if (strlen(buf) >= minlen && strlen(buf) <= maxlen) { i = 0; if (countsets > 0) { From 5b6fc88428102ca5aa68f15660c747d07cc944f9 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Mon, 17 Feb 2020 10:39:17 +0100 Subject: [PATCH 277/531] fixed crash in rtsp module --- CHANGES | 1 + hydra-http-proxy-urlenum.c | 6 ++-- hydra-http-proxy.c | 6 ++-- hydra-http.c | 6 ++-- hydra-imap.c | 22 ++++++++------ hydra-ldap.c | 10 +++---- hydra-nntp.c | 12 ++++---- hydra-pop3.c | 18 +++++++----- hydra-rtsp.c | 7 ++--- hydra-sip.c | 5 ++-- hydra-smtp.c | 12 ++++---- hydra-xmpp.c | 16 +++++----- sasl.c | 60 +++++++++++++++++++++----------------- sasl.h | 12 ++++---- 14 files changed, 107 insertions(+), 86 deletions(-) diff --git a/CHANGES b/CHANGES index 3979a1d..9b7c11f 100644 --- a/CHANGES +++ b/CHANGES @@ -3,6 +3,7 @@ Changelog for hydra Release 9.1-dev * new module: smb2 which also supports smb3 (uses libsmbclient-dev) (thanks to Karim Kanso for the module!) +* rtsp: fixed crash in MD5 auth * svn: updated to support past and new API * http module now supports F=/S= string matching conditions (thanks to poucz@github) * changed mysql module not to use mysql db as a default. if the user has not access to this db auth fails ... diff --git a/hydra-http-proxy-urlenum.c b/hydra-http-proxy-urlenum.c index 2f00ae5..434b4e4 100644 --- a/hydra-http-proxy-urlenum.c +++ b/hydra-http-proxy-urlenum.c @@ -170,7 +170,7 @@ int32_t start_http_proxy_urlenum(int32_t s, char *ip, int32_t port, unsigned cha } else { #ifdef LIBOPENSSL if (hydra_strcasestr(buf, "Proxy-Authenticate: Digest") != NULL) { - char *pbuffer; + char *pbuffer, *result; http_proxy_auth_mechanism = AUTH_DIGESTMD5; pbuffer = hydra_strcasestr(buf, "Proxy-Authenticate: Digest "); @@ -178,8 +178,8 @@ int32_t start_http_proxy_urlenum(int32_t s, char *ip, int32_t port, unsigned cha buffer[sizeof(buffer) - 1] = '\0'; pbuffer = buffer2; - sasl_digest_md5(pbuffer, login, pass, buffer, miscptr, "proxy", host, 0, header); - if (pbuffer == NULL) + result = sasl_digest_md5(pbuffer, login, pass, buffer, miscptr, "proxy", host, 0, header); + if (result == NULL) return 3; if (debug) diff --git a/hydra-http-proxy.c b/hydra-http-proxy.c index 0e07d9b..fa5638c 100644 --- a/hydra-http-proxy.c +++ b/hydra-http-proxy.c @@ -179,7 +179,7 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option } else { #ifdef LIBOPENSSL if (hydra_strcasestr(http_proxy_buf, "Proxy-Authenticate: Digest") != NULL) { - char *pbuffer; + char *pbuffer, *result; http_proxy_auth_mechanism = AUTH_DIGESTMD5; pbuffer = hydra_strcasestr(http_proxy_buf, "Proxy-Authenticate: Digest "); @@ -188,8 +188,8 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option pbuffer = NULL; fooptr = buffer2; - sasl_digest_md5(fooptr, login, pass, buffer, miscptr, "proxy", host, 0, header); - if (fooptr == NULL) + result = sasl_digest_md5(fooptr, login, pass, buffer, miscptr, "proxy", host, 0, header); + if (result == NULL) return 3; if (debug) diff --git a/hydra-http.c b/hydra-http.c index a1868bf..a269e71 100644 --- a/hydra-http.c +++ b/hydra-http.c @@ -76,15 +76,15 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha #ifdef LIBOPENSSL case AUTH_DIGESTMD5: { - char *pbuffer; + char *pbuffer, *result; pbuffer = hydra_strcasestr(http_buf, "WWW-Authenticate: Digest "); strncpy(buffer, pbuffer + strlen("WWW-Authenticate: Digest "), buffer_size - 1); buffer[buffer_size - 1] = '\0'; fooptr = buffer2; - sasl_digest_md5(fooptr, login, pass, buffer, miscptr, type, webtarget, webport, header); - if (fooptr == NULL) { + result = sasl_digest_md5(fooptr, login, pass, buffer, miscptr, type, webtarget, webport, header); + if (result == NULL) { free(buffer); free(header); return 3; diff --git a/hydra-imap.c b/hydra-imap.c index b93fc6e..20d1ea1 100644 --- a/hydra-imap.c +++ b/hydra-imap.c @@ -41,7 +41,7 @@ char *imap_read_server_capacity(int32_t sock) { } int32_t start_imap(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { - char *empty = ""; + char *empty = "", *result = NULL; char *login, *pass, buffer[500], buffer2[500], *fooptr; if (strlen(login = hydra_get_next_login()) == 0) @@ -104,7 +104,8 @@ int32_t start_imap(int32_t s, char *ip, int32_t port, unsigned char options, cha free(buf); memset(buffer2, 0, sizeof(buffer2)); - sasl_plain(buffer2, login, pass); + result = sasl_plain(buffer2, login, pass); + if (result == NULL) return 3; sprintf(buffer, "%.250s\r\n", buffer2); break; @@ -161,15 +162,18 @@ int32_t start_imap(int32_t s, char *ip, int32_t port, unsigned char options, cha switch (imap_auth_mechanism) { case AUTH_CRAMMD5: { - sasl_cram_md5(buffer2, pass, buffer); + result = sasl_cram_md5(buffer2, pass, buffer); + if (result == NULL) return 3; sprintf(buffer, "%s %.250s", preplogin, buffer2); } break; case AUTH_CRAMSHA1: { - sasl_cram_sha1(buffer2, pass, buffer); + result = sasl_cram_sha1(buffer2, pass, buffer); + if (result == NULL) return 3; sprintf(buffer, "%s %.250s", preplogin, buffer2); } break; case AUTH_CRAMSHA256: { - sasl_cram_sha256(buffer2, pass, buffer); + result = sasl_cram_sha256(buffer2, pass, buffer); + if (result == NULL) return 3; sprintf(buffer, "%s %.250s", preplogin, buffer2); } break; } @@ -202,8 +206,8 @@ int32_t start_imap(int32_t s, char *ip, int32_t port, unsigned char options, cha hydra_report(stderr, "DEBUG S: %s\n", buffer); fooptr = buffer2; - sasl_digest_md5(fooptr, login, pass, buffer, miscptr, "imap", NULL, 0, NULL); - if (fooptr == NULL) + result = sasl_digest_md5(fooptr, login, pass, buffer, miscptr, "imap", NULL, 0, NULL); + if (result == NULL) return 3; if (debug) hydra_report(stderr, "DEBUG C: %s\n", buffer2); @@ -262,8 +266,8 @@ int32_t start_imap(int32_t s, char *ip, int32_t port, unsigned char options, cha memset(buffer2, 0, sizeof(buffer2)); fooptr = buffer2; - sasl_scram_sha1(fooptr, pass, clientfirstmessagebare, serverfirstmessage); - if (fooptr == NULL) { + result = sasl_scram_sha1(fooptr, pass, clientfirstmessagebare, serverfirstmessage); + if (result == NULL) { hydra_report(stderr, "[ERROR] Can't compute client response\n"); return 1; } diff --git a/hydra-ldap.c b/hydra-ldap.c index 4f79365..9e6f9cd 100644 --- a/hydra-ldap.c +++ b/hydra-ldap.c @@ -8,7 +8,7 @@ int32_t counter; int32_t tls_required = 0; int32_t start_ldap(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp, char *hostname, char version, int32_t auth_method) { - char *empty = ""; + char *empty = "", *result = NULL; char *login = "", *pass, *fooptr = ""; unsigned char buffer[512]; int32_t length = 0; @@ -123,8 +123,8 @@ int32_t start_ldap(int32_t s, char *ip, int32_t port, unsigned char options, cha ptr = strstr((char *)buf, "<"); fooptr = buf2; - sasl_cram_md5(fooptr, pass, ptr); - if (fooptr == NULL) + result = sasl_cram_md5(fooptr, pass, ptr); + if (result == NULL) return 1; counter++; if (strstr(miscptr, "^USER^") != NULL) { @@ -180,8 +180,8 @@ int32_t start_ldap(int32_t s, char *ip, int32_t port, unsigned char options, cha } fooptr = buffer2; - sasl_digest_md5(fooptr, login, pass, ptr, miscptr, "ldap", NULL, 0, NULL); - if (fooptr == NULL) { + result = sasl_digest_md5(fooptr, login, pass, ptr, miscptr, "ldap", NULL, 0, NULL); + if (result == NULL) { free(buf); return 3; } diff --git a/hydra-nntp.c b/hydra-nntp.c index c3622c2..c06a7ac 100644 --- a/hydra-nntp.c +++ b/hydra-nntp.c @@ -48,7 +48,7 @@ char *nntp_read_server_capacity(int32_t sock) { } int32_t start_nntp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { - char *empty = "\"\""; + char *empty = "\"\"", *result = NULL; char *login, *pass, buffer[500], buffer2[500], *fooptr; int32_t i = 1; @@ -112,7 +112,8 @@ int32_t start_nntp(int32_t s, char *ip, int32_t port, unsigned char options, cha free(buf); memset(buffer, 0, sizeof(buffer)); - sasl_plain(buffer, login, pass); + result = sasl_plain(buffer, login, pass); + if (result == NULL) return 3; char tmp_buffer[sizeof(buffer)]; sprintf(tmp_buffer, "%.250s\r\n", buffer); @@ -147,7 +148,8 @@ int32_t start_nntp(int32_t s, char *ip, int32_t port, unsigned char options, cha free(buf); memset(buffer2, 0, sizeof(buffer2)); - sasl_cram_md5(buffer2, pass, buffer); + result = sasl_cram_md5(buffer2, pass, buffer); + if (result == NULL) return 3; sprintf(buffer, "%s %.250s", preplogin, buffer2); hydra_tobase64((unsigned char *)buffer, strlen(buffer), sizeof(buffer)); @@ -178,8 +180,8 @@ int32_t start_nntp(int32_t s, char *ip, int32_t port, unsigned char options, cha if (debug) hydra_report(stderr, "DEBUG S: %s\n", buffer); fooptr = buffer2; - sasl_digest_md5(fooptr, login, pass, buffer, miscptr, "nntp", NULL, 0, NULL); - if (fooptr == NULL) + result = sasl_digest_md5(fooptr, login, pass, buffer, miscptr, "nntp", NULL, 0, NULL); + if (result == NULL) return 3; if (debug) diff --git a/hydra-pop3.c b/hydra-pop3.c index 78f29bc..2b453c1 100644 --- a/hydra-pop3.c +++ b/hydra-pop3.c @@ -118,7 +118,7 @@ char *pop3_read_server_capacity(int32_t sock) { } int32_t start_pop3(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { - char *empty = "\"\""; + char *empty = "\"\"", *result = NULL; char *login, *pass, buffer[500], buffer2[500], *fooptr; if (strlen(login = hydra_get_next_login()) == 0) @@ -202,7 +202,8 @@ int32_t start_pop3(int32_t s, char *ip, int32_t port, unsigned char options, cha free(buf); memset(buffer, 0, sizeof(buffer)); - sasl_plain(buffer, login, pass); + result = sasl_plain(buffer, login, pass); + if (result == NULL) return 3; char tmp_buffer[sizeof(buffer)]; sprintf(tmp_buffer, "%.250s\r\n", buffer); @@ -263,15 +264,18 @@ int32_t start_pop3(int32_t s, char *ip, int32_t port, unsigned char options, cha switch (p->pop3_auth_mechanism) { case AUTH_CRAMMD5: { - sasl_cram_md5(buffer2, pass, buffer); + result = sasl_cram_md5(buffer2, pass, buffer); + if (result == NULL) return 3; sprintf(buffer, "%s %.250s", preplogin, buffer2); } break; case AUTH_CRAMSHA1: { - sasl_cram_sha1(buffer2, pass, buffer); + result = sasl_cram_sha1(buffer2, pass, buffer); + if (result == NULL) return 3; sprintf(buffer, "%s %.250s", preplogin, buffer2); } break; case AUTH_CRAMSHA256: { - sasl_cram_sha256(buffer2, pass, buffer); + result = sasl_cram_sha256(buffer2, pass, buffer); + if (result == NULL) return 3; sprintf(buffer, "%s %.250s", preplogin, buffer2); } break; } @@ -304,8 +308,8 @@ int32_t start_pop3(int32_t s, char *ip, int32_t port, unsigned char options, cha hydra_report(stderr, "[DEBUG] S: %s\n", buffer); fooptr = buffer2; - sasl_digest_md5(fooptr, login, pass, buffer, miscptr, "pop", NULL, 0, NULL); - if (fooptr == NULL) + result = sasl_digest_md5(fooptr, login, pass, buffer, miscptr, "pop", NULL, 0, NULL); + if (result == NULL) return 3; if (debug) diff --git a/hydra-rtsp.c b/hydra-rtsp.c index 5eb4166..1bc6f4d 100644 --- a/hydra-rtsp.c +++ b/hydra-rtsp.c @@ -116,22 +116,21 @@ int32_t start_rtsp(int32_t s, char *ip, int32_t port, unsigned char options, cha } } else { if (use_Digest_Auth(lresp) == 1) { - char *dbuf = NULL; - char aux[500] = ""; + char aux[500] = "", dbuf[500] = "", *result = NULL; char *pbuffer = hydra_strcasestr(lresp, "WWW-Authenticate: Digest "); strncpy(aux, pbuffer + strlen("WWW-Authenticate: Digest "), sizeof(aux)); aux[sizeof(aux) - 1] = '\0'; free(lresp); #ifdef LIBOPENSSL - sasl_digest_md5(dbuf, login, pass, aux, miscptr, "rtsp", hydra_address2string(ip), port, ""); + result = sasl_digest_md5(dbuf, login, pass, aux, miscptr, "rtsp", hydra_address2string(ip), port, ""); #else hydra_report(stderr, "[ERROR] Digest auth required but compiled " "without OpenSSL/MD5 support\n"); return 3; #endif - if (dbuf == NULL) { + if (result == NULL) { hydra_report(stderr, "[ERROR] digest generation failed\n"); return 3; } diff --git a/hydra-sip.c b/hydra-sip.c index eab654e..954d03c 100644 --- a/hydra-sip.c +++ b/hydra-sip.c @@ -48,7 +48,7 @@ int32_t get_sip_code(char *buf) { } int32_t start_sip(int32_t s, char *ip, char *lip, int32_t port, int32_t lport, unsigned char options, char *miscptr, FILE *fp) { - char *login, *pass, *host, buffer[SIP_MAX_BUF]; + char *login, *pass, *host, buffer[SIP_MAX_BUF], *result = NULL; int32_t i; char buf[SIP_MAX_BUF]; @@ -138,7 +138,8 @@ int32_t start_sip(int32_t s, char *ip, char *lip, int32_t port, int32_t lport, u hydra_report(stderr, "[INFO] S: %s\n", buf); char buffer2[512]; - sasl_digest_md5(buffer2, login, pass, strstr(buf, "WWW-Authenticate: Digest") + strlen("WWW-Authenticate: Digest") + 1, host, "sip", NULL, 0, NULL); + result = sasl_digest_md5(buffer2, login, pass, strstr(buf, "WWW-Authenticate: Digest") + strlen("WWW-Authenticate: Digest") + 1, host, "sip", NULL, 0, NULL); + if (result == NULL) return 3; memset(buffer, 0, SIP_MAX_BUF); snprintf(buffer, SIP_MAX_BUF, diff --git a/hydra-smtp.c b/hydra-smtp.c index 97b2bab..f6f1ac2 100644 --- a/hydra-smtp.c +++ b/hydra-smtp.c @@ -37,7 +37,7 @@ char *smtp_read_server_capacity(int32_t sock) { } int32_t start_smtp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { - char *empty = ""; + char *empty = "", *result = NULL; char *login, *pass, buffer[500], buffer2[500], *fooptr, *buf; if (strlen(login = hydra_get_next_login()) == 0) @@ -67,7 +67,8 @@ int32_t start_smtp(int32_t s, char *ip, int32_t port, unsigned char options, cha free(buf); memset(buffer, 0, sizeof(buffer)); - sasl_plain(buffer, login, pass); + result = sasl_plain(buffer, login, pass); + if (result == NULL) return 3; char tmp_buffer[sizeof(buffer)]; sprintf(tmp_buffer, "%.250s\r\n", buffer); @@ -102,7 +103,8 @@ int32_t start_smtp(int32_t s, char *ip, int32_t port, unsigned char options, cha free(buf); memset(buffer2, 0, sizeof(buffer2)); - sasl_cram_md5(buffer2, pass, buffer); + result = sasl_cram_md5(buffer2, pass, buffer); + if (result == NULL) return 3; sprintf(buffer, "%s %.250s", preplogin, buffer2); hydra_tobase64((unsigned char *)buffer, strlen(buffer), sizeof(buffer)); @@ -135,8 +137,8 @@ int32_t start_smtp(int32_t s, char *ip, int32_t port, unsigned char options, cha hydra_report(stderr, "DEBUG S: %s\n", buffer); fooptr = buffer2; - sasl_digest_md5(fooptr, login, pass, buffer, miscptr, "smtp", NULL, 0, NULL); - if (fooptr == NULL) + result = sasl_digest_md5(fooptr, login, pass, buffer, miscptr, "smtp", NULL, 0, NULL); + if (result == NULL) return 3; if (debug) diff --git a/hydra-xmpp.c b/hydra-xmpp.c index aa4ea2f..dd7c2f9 100644 --- a/hydra-xmpp.c +++ b/hydra-xmpp.c @@ -13,7 +13,7 @@ char *JABBER_CLIENT_INIT_END_STR = "' xmlns='jabber:client' xmlns:stream='http:/ "version='1.0'>"; int32_t start_xmpp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { - char *empty = "\"\""; + char *empty = "\"\"", *result = NULL; char *login, *pass, buffer[500], buffer2[500]; char *AUTH_STR = ""; @@ -125,7 +125,8 @@ int32_t start_xmpp(int32_t s, char *ip, int32_t port, unsigned char options, cha #ifdef LIBOPENSSL case AUTH_PLAIN: { memset(buffer2, 0, sizeof(buffer)); - sasl_plain(buffer2, login, pass); + result = sasl_plain(buffer2, login, pass); + if (result == NULL) return 3; sprintf(buffer, "%s%.250s%s", RESPONSE_STR, buffer2, RESPONSE_END_STR); if (debug) hydra_report(stderr, "DEBUG C: %s\n", buffer); @@ -136,7 +137,8 @@ int32_t start_xmpp(int32_t s, char *ip, int32_t port, unsigned char options, cha char *preplogin; memset(buffer2, 0, sizeof(buffer2)); - sasl_cram_md5(buffer2, pass, buffer); + result = sasl_cram_md5(buffer2, pass, buffer); + if (result == NULL) return 3; rc = sasl_saslprep(login, SASL_ALLOW_UNASSIGNED, &preplogin); if (rc) { @@ -156,8 +158,8 @@ int32_t start_xmpp(int32_t s, char *ip, int32_t port, unsigned char options, cha case AUTH_DIGESTMD5: { memset(buffer2, 0, sizeof(buffer2)); fooptr = buffer2; - sasl_digest_md5(fooptr, login, pass, buffer, domain, "xmpp", NULL, 0, NULL); - if (fooptr == NULL) { + result = sasl_digest_md5(fooptr, login, pass, buffer, domain, "xmpp", NULL, 0, NULL); + if (result == NULL) { free(buf); return 3; } @@ -217,8 +219,8 @@ int32_t start_xmpp(int32_t s, char *ip, int32_t port, unsigned char options, cha memset(buffer2, 0, sizeof(buffer2)); fooptr = buffer2; - sasl_scram_sha1(fooptr, pass, clientfirstmessagebare, serverfirstmessage); - if (fooptr == NULL) { + result = sasl_scram_sha1(fooptr, pass, clientfirstmessagebare, serverfirstmessage); + if (result == NULL) { hydra_report(stderr, "[ERROR] Can't compute client response\n"); free(buf); return 1; diff --git a/sasl.c b/sasl.c index 7470743..1a421b1 100644 --- a/sasl.c +++ b/sasl.c @@ -68,20 +68,20 @@ sasl_plain computes the plain authentication from strings login and password and stored the value in variable result the first parameter result must be able to hold at least 255 bytes! */ -void sasl_plain(char *result, char *login, char *pass) { +char *sasl_plain(char *result, char *login, char *pass) { char *preplogin; char *preppasswd; int32_t rc = sasl_saslprep(login, SASL_ALLOW_UNASSIGNED, &preplogin); if (rc) { result = NULL; - return; + return result; } rc = sasl_saslprep(pass, 0, &preppasswd); if (rc) { free(preplogin); result = NULL; - return; + return result; } if (2 * strlen(preplogin) + 3 + strlen(preppasswd) < 180) { strcpy(result, preplogin); @@ -91,6 +91,7 @@ void sasl_plain(char *result, char *login, char *pass) { } free(preplogin); free(preppasswd); + return result; } #ifdef LIBOPENSSL @@ -102,7 +103,7 @@ and the challenge sent by the server, and stored the value in variable result the parameter result must be able to hold at least 100 bytes! */ -void sasl_cram_md5(char *result, char *pass, char *challenge) { +char *sasl_cram_md5(char *result, char *pass, char *challenge) { char ipad[64]; char opad[64]; unsigned char md5_raw[MD5_DIGEST_LENGTH]; @@ -112,12 +113,12 @@ void sasl_cram_md5(char *result, char *pass, char *challenge) { if (challenge == NULL) { result = NULL; - return; + return result; } rc = sasl_saslprep(pass, 0, &preppasswd); if (rc) { result = NULL; - return; + return result; } memset(ipad, 0, sizeof(ipad)); memset(opad, 0, sizeof(opad)); @@ -148,6 +149,7 @@ void sasl_cram_md5(char *result, char *pass, char *challenge) { result += 2; } free(preppasswd); + return result; } /* @@ -156,7 +158,7 @@ and the challenge sent by the server, and stored the value in variable result the parameter result must be able to hold at least 100 bytes! */ -void sasl_cram_sha1(char *result, char *pass, char *challenge) { +char *sasl_cram_sha1(char *result, char *pass, char *challenge) { char ipad[64]; char opad[64]; unsigned char sha1_raw[SHA_DIGEST_LENGTH]; @@ -166,12 +168,12 @@ void sasl_cram_sha1(char *result, char *pass, char *challenge) { if (challenge == NULL) { result = NULL; - return; + return result; } rc = sasl_saslprep(pass, 0, &preppasswd); if (rc) { result = NULL; - return; + return result; } memset(ipad, 0, sizeof(ipad)); memset(opad, 0, sizeof(opad)); @@ -202,6 +204,7 @@ void sasl_cram_sha1(char *result, char *pass, char *challenge) { result += 2; } free(preppasswd); + return result; } /* @@ -210,7 +213,7 @@ and the challenge sent by the server, and stored the value in variable result the parameter result must be able to hold at least 100 bytes! */ -void sasl_cram_sha256(char *result, char *pass, char *challenge) { +char *sasl_cram_sha256(char *result, char *pass, char *challenge) { char ipad[64]; char opad[64]; unsigned char sha256_raw[SHA256_DIGEST_LENGTH]; @@ -220,14 +223,14 @@ void sasl_cram_sha256(char *result, char *pass, char *challenge) { if (challenge == NULL) { result = NULL; - return; + return result; } memset(ipad, 0, sizeof(ipad)); memset(opad, 0, sizeof(opad)); rc = sasl_saslprep(pass, 0, &preppasswd); if (rc) { result = NULL; - return; + return result; } if (strlen(preppasswd) >= 64) { SHA256_Init(&sha256c); @@ -256,13 +259,14 @@ void sasl_cram_sha256(char *result, char *pass, char *challenge) { result += 2; } free(preppasswd); + return result; } /* RFC 2831: Using Digest Authentication as a SASL Mechanism the parameter result must be able to hold at least 500 bytes!! */ -void sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char *miscptr, char *type, char *webtarget, int32_t webport, char *header) { +char *sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char *miscptr, char *type, char *webtarget, int32_t webport, char *header) { char *pbuffer = NULL; int32_t array_size = 10; unsigned char response[MD5_DIGEST_LENGTH]; @@ -277,13 +281,13 @@ void sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char * memset(realm, 0, sizeof(realm)); if (rc) { result = NULL; - return; + return result; } rc = sasl_saslprep(pass, 0, &preppasswd); if (rc) { free(preplogin); result = NULL; - return; + return result; } // DEBUG S: // nonce="HB3HGAk+hxKpijy/ichq7Wob3Zo17LPM9rr4kMX7xRM=",realm="tida",qop="auth",maxbuf=4096,charset=utf-8,algorithm=md5-sess @@ -344,7 +348,7 @@ void sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char * free(array[j]); hydra_report(stderr, "Error: DIGEST-MD5 nonce from server could not be extracted\n"); result = NULL; - return; + return result; } } else { strncpy(nonce, strstr(array[i], "nonce=") + strlen("nonce="), sizeof(nonce) - 1); @@ -367,7 +371,7 @@ void sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char * free(array[i]); hydra_report(stderr, "Error: DIGEST-MD5 realm from server could not be extracted\n"); result = NULL; - return; + return result; } } else { strncpy(realm, strstr(array[i], "realm=") + strlen("realm="), sizeof(realm) - 1); @@ -390,7 +394,7 @@ void sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char * hydra_report(stderr, "Error: DIGEST-MD5 quality of protection only " "authentication is not supported by server\n"); result = NULL; - return; + return result; } } if (strstr(array[i], "algorithm=") != NULL) { @@ -410,7 +414,7 @@ void sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char * hydra_report(stderr, "Error: DIGEST-MD5 algorithm from server could " "not be extracted\n"); result = NULL; - return; + return result; } } else { strncpy(algo, strstr(array[i], "algorithm=") + strlen("algorithm="), sizeof(algo) - 1); @@ -424,7 +428,7 @@ void sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char * free(array[j]); hydra_report(stderr, "Error: DIGEST-MD5 algorithm not based on md5, based on %s\n", algo); result = NULL; - return; + return result; } } free(array[i]); @@ -575,6 +579,7 @@ void sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char * } free(preplogin); free(preppasswd); + return result; } /* @@ -584,7 +589,7 @@ I want to thx Simon Josefsson for his public server test, and my girlfriend that let me work on that 2 whole nights ;) clientfirstmessagebare must be at least 500 bytes in size! */ -void sasl_scram_sha1(char *result, char *pass, char *clientfirstmessagebare, char *serverfirstmessage) { +char *sasl_scram_sha1(char *result, char *pass, char *clientfirstmessagebare, char *serverfirstmessage) { int32_t saltlen = 0; int32_t iter = 4096; char *salt, *nonce, *ic; @@ -603,7 +608,7 @@ void sasl_scram_sha1(char *result, char *pass, char *clientfirstmessagebare, cha if (rc) { result = NULL; - return; + return result; } /*client-final-message */ @@ -614,7 +619,7 @@ void sasl_scram_sha1(char *result, char *pass, char *clientfirstmessagebare, cha hydra_report(stderr, "Error: Can't understand server message\n"); free(preppasswd); result = NULL; - return; + return result; } strncpy(buffer, serverfirstmessage, sizeof(buffer) - 1); buffer[sizeof(buffer) - 1] = '\0'; @@ -627,7 +632,7 @@ void sasl_scram_sha1(char *result, char *pass, char *clientfirstmessagebare, cha hydra_report(stderr, "Error: Can't understand server response\n"); free(preppasswd); result = NULL; - return; + return result; } if ((nonce != NULL) && (strlen(nonce) > 2)) snprintf(clientfinalmessagewithoutproof, sizeof(clientfinalmessagewithoutproof), "c=biws,%s", nonce); @@ -635,7 +640,7 @@ void sasl_scram_sha1(char *result, char *pass, char *clientfirstmessagebare, cha hydra_report(stderr, "Error: Could not identify server nonce value\n"); free(preppasswd); result = NULL; - return; + return result; } if ((salt != NULL) && (strlen(salt) > 2) && (strlen(salt) <= sizeof(buffer))) // s=ghgIAfLl1+yUy/Xl1WD5Tw== remove the header s= @@ -644,7 +649,7 @@ void sasl_scram_sha1(char *result, char *pass, char *clientfirstmessagebare, cha hydra_report(stderr, "Error: Could not identify server salt value\n"); free(preppasswd); result = NULL; - return; + return result; } /* SaltedPassword := Hi(Normalize(password), salt, i) */ @@ -653,7 +658,7 @@ void sasl_scram_sha1(char *result, char *pass, char *clientfirstmessagebare, cha hydra_report(stderr, "Error: Failed to generate PBKDF2\n"); free(preppasswd); result = NULL; - return; + return result; } /* ClientKey := HMAC(SaltedPassword, "Client Key") */ @@ -674,5 +679,6 @@ void sasl_scram_sha1(char *result, char *pass, char *clientfirstmessagebare, cha if (debug) hydra_report(stderr, "DEBUG C: %s\n", result); free(preppasswd); + return result; } #endif diff --git a/sasl.h b/sasl.h index 01da091..e42299f 100644 --- a/sasl.h +++ b/sasl.h @@ -32,7 +32,7 @@ typedef enum { SASL_ALLOW_UNASSIGNED = 1 } sasl_saslprep_flags; int32_t print_hex(unsigned char *buf, int32_t len); -void sasl_plain(char *result, char *login, char *pass); +char* sasl_plain(char *result, char *login, char *pass); int32_t sasl_saslprep(const char *in, sasl_saslprep_flags flags, char **out); #ifdef LIBOPENSSL @@ -40,9 +40,9 @@ int32_t sasl_saslprep(const char *in, sasl_saslprep_flags flags, char **out); #include #include -void sasl_cram_md5(char *result, char *pass, char *challenge); -void sasl_cram_sha1(char *result, char *pass, char *challenge); -void sasl_cram_sha256(char *result, char *pass, char *challenge); -void sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char *miscptr, char *type, char *webtarget, int32_t webport, char *header); -void sasl_scram_sha1(char *result, char *pass, char *clientfirstmessagebare, char *serverfirstmessage); +char* sasl_cram_md5(char *result, char *pass, char *challenge); +char* sasl_cram_sha1(char *result, char *pass, char *challenge); +char* sasl_cram_sha256(char *result, char *pass, char *challenge); +char* sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char *miscptr, char *type, char *webtarget, int32_t webport, char *header); +char* sasl_scram_sha1(char *result, char *pass, char *clientfirstmessagebare, char *serverfirstmessage); #endif From 90bbde1be8f951e42c049765049ea8f490b0c1b7 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Mon, 17 Feb 2020 11:16:51 +0100 Subject: [PATCH 278/531] clarify license --- README.md | 3 +++ hydra-imap.c | 12 ++++++++---- hydra-nntp.c | 6 ++++-- hydra-pop3.c | 12 ++++++++---- hydra-sip.c | 3 ++- hydra-smtp.c | 6 ++++-- hydra-xmpp.c | 6 ++++-- hydra.c | 17 +++++++++-------- sasl.h | 12 ++++++------ 9 files changed, 48 insertions(+), 29 deletions(-) diff --git a/README.md b/README.md index f2edcfb..fa214d9 100644 --- a/README.md +++ b/README.md @@ -10,6 +10,9 @@ Please do not use in military or secret service organizations, or for illegal purposes. + (This is the wish of the author and non-binding. Many people working + in these organizations do not care for laws and ethics anyways. + You are not one of the "good" ones if you ignore this.) diff --git a/hydra-imap.c b/hydra-imap.c index 20d1ea1..f84e9fb 100644 --- a/hydra-imap.c +++ b/hydra-imap.c @@ -105,7 +105,8 @@ int32_t start_imap(int32_t s, char *ip, int32_t port, unsigned char options, cha memset(buffer2, 0, sizeof(buffer2)); result = sasl_plain(buffer2, login, pass); - if (result == NULL) return 3; + if (result == NULL) + return 3; sprintf(buffer, "%.250s\r\n", buffer2); break; @@ -163,17 +164,20 @@ int32_t start_imap(int32_t s, char *ip, int32_t port, unsigned char options, cha switch (imap_auth_mechanism) { case AUTH_CRAMMD5: { result = sasl_cram_md5(buffer2, pass, buffer); - if (result == NULL) return 3; + if (result == NULL) + return 3; sprintf(buffer, "%s %.250s", preplogin, buffer2); } break; case AUTH_CRAMSHA1: { result = sasl_cram_sha1(buffer2, pass, buffer); - if (result == NULL) return 3; + if (result == NULL) + return 3; sprintf(buffer, "%s %.250s", preplogin, buffer2); } break; case AUTH_CRAMSHA256: { result = sasl_cram_sha256(buffer2, pass, buffer); - if (result == NULL) return 3; + if (result == NULL) + return 3; sprintf(buffer, "%s %.250s", preplogin, buffer2); } break; } diff --git a/hydra-nntp.c b/hydra-nntp.c index c06a7ac..8531356 100644 --- a/hydra-nntp.c +++ b/hydra-nntp.c @@ -113,7 +113,8 @@ int32_t start_nntp(int32_t s, char *ip, int32_t port, unsigned char options, cha memset(buffer, 0, sizeof(buffer)); result = sasl_plain(buffer, login, pass); - if (result == NULL) return 3; + if (result == NULL) + return 3; char tmp_buffer[sizeof(buffer)]; sprintf(tmp_buffer, "%.250s\r\n", buffer); @@ -149,7 +150,8 @@ int32_t start_nntp(int32_t s, char *ip, int32_t port, unsigned char options, cha memset(buffer2, 0, sizeof(buffer2)); result = sasl_cram_md5(buffer2, pass, buffer); - if (result == NULL) return 3; + if (result == NULL) + return 3; sprintf(buffer, "%s %.250s", preplogin, buffer2); hydra_tobase64((unsigned char *)buffer, strlen(buffer), sizeof(buffer)); diff --git a/hydra-pop3.c b/hydra-pop3.c index 2b453c1..acd6c2e 100644 --- a/hydra-pop3.c +++ b/hydra-pop3.c @@ -203,7 +203,8 @@ int32_t start_pop3(int32_t s, char *ip, int32_t port, unsigned char options, cha memset(buffer, 0, sizeof(buffer)); result = sasl_plain(buffer, login, pass); - if (result == NULL) return 3; + if (result == NULL) + return 3; char tmp_buffer[sizeof(buffer)]; sprintf(tmp_buffer, "%.250s\r\n", buffer); @@ -265,17 +266,20 @@ int32_t start_pop3(int32_t s, char *ip, int32_t port, unsigned char options, cha switch (p->pop3_auth_mechanism) { case AUTH_CRAMMD5: { result = sasl_cram_md5(buffer2, pass, buffer); - if (result == NULL) return 3; + if (result == NULL) + return 3; sprintf(buffer, "%s %.250s", preplogin, buffer2); } break; case AUTH_CRAMSHA1: { result = sasl_cram_sha1(buffer2, pass, buffer); - if (result == NULL) return 3; + if (result == NULL) + return 3; sprintf(buffer, "%s %.250s", preplogin, buffer2); } break; case AUTH_CRAMSHA256: { result = sasl_cram_sha256(buffer2, pass, buffer); - if (result == NULL) return 3; + if (result == NULL) + return 3; sprintf(buffer, "%s %.250s", preplogin, buffer2); } break; } diff --git a/hydra-sip.c b/hydra-sip.c index 954d03c..6be4d93 100644 --- a/hydra-sip.c +++ b/hydra-sip.c @@ -139,7 +139,8 @@ int32_t start_sip(int32_t s, char *ip, char *lip, int32_t port, int32_t lport, u char buffer2[512]; result = sasl_digest_md5(buffer2, login, pass, strstr(buf, "WWW-Authenticate: Digest") + strlen("WWW-Authenticate: Digest") + 1, host, "sip", NULL, 0, NULL); - if (result == NULL) return 3; + if (result == NULL) + return 3; memset(buffer, 0, SIP_MAX_BUF); snprintf(buffer, SIP_MAX_BUF, diff --git a/hydra-smtp.c b/hydra-smtp.c index f6f1ac2..dc6e54a 100644 --- a/hydra-smtp.c +++ b/hydra-smtp.c @@ -68,7 +68,8 @@ int32_t start_smtp(int32_t s, char *ip, int32_t port, unsigned char options, cha memset(buffer, 0, sizeof(buffer)); result = sasl_plain(buffer, login, pass); - if (result == NULL) return 3; + if (result == NULL) + return 3; char tmp_buffer[sizeof(buffer)]; sprintf(tmp_buffer, "%.250s\r\n", buffer); @@ -104,7 +105,8 @@ int32_t start_smtp(int32_t s, char *ip, int32_t port, unsigned char options, cha memset(buffer2, 0, sizeof(buffer2)); result = sasl_cram_md5(buffer2, pass, buffer); - if (result == NULL) return 3; + if (result == NULL) + return 3; sprintf(buffer, "%s %.250s", preplogin, buffer2); hydra_tobase64((unsigned char *)buffer, strlen(buffer), sizeof(buffer)); diff --git a/hydra-xmpp.c b/hydra-xmpp.c index dd7c2f9..fe0a2f0 100644 --- a/hydra-xmpp.c +++ b/hydra-xmpp.c @@ -126,7 +126,8 @@ int32_t start_xmpp(int32_t s, char *ip, int32_t port, unsigned char options, cha case AUTH_PLAIN: { memset(buffer2, 0, sizeof(buffer)); result = sasl_plain(buffer2, login, pass); - if (result == NULL) return 3; + if (result == NULL) + return 3; sprintf(buffer, "%s%.250s%s", RESPONSE_STR, buffer2, RESPONSE_END_STR); if (debug) hydra_report(stderr, "DEBUG C: %s\n", buffer); @@ -138,7 +139,8 @@ int32_t start_xmpp(int32_t s, char *ip, int32_t port, unsigned char options, cha memset(buffer2, 0, sizeof(buffer2)); result = sasl_cram_md5(buffer2, pass, buffer); - if (result == NULL) return 3; + if (result == NULL) + return 3; rc = sasl_saslprep(login, SASL_ALLOW_UNASSIGNED, &preplogin); if (rc) { diff --git a/hydra.c b/hydra.c index 0ea27cc..6952542 100644 --- a/hydra.c +++ b/hydra.c @@ -3,8 +3,9 @@ * https://github.com/vanhauser-thc/thc-hydra * * Parallized network login hacker. - * Don't use in military or secret service organizations, or for illegal - * purposes. + * Please don't use in military or secret service organizations, or for illegal + * purposes. This is a wish and is non-binding. + * If you ignore this be sure you are not a good person though. * * License: GNU AFFERO GENERAL PUBLIC LICENSE v3.0, see LICENSE file */ @@ -551,11 +552,11 @@ void help(int32_t ext) { "module help)\n"); PRINT_NORMAL(ext, "\nSupported services: %s\n" - "\n%s is a tool to guess/crack valid login/password pairs. " - "Licensed under AGPL\n" - "v3.0. The newest version is always available at %s\n" - "Don't use in military or secret service organizations, or for " - "illegal purposes.\n", + "\n%s is a tool to guess/crack valid login/password pairs.\n" + "Licensed under AGPL v3.0. The newest version is always available at;\n%s\n" + "Please don't use in military or secret service organizations, or for illegal\n" + "purposes. (This is a wish and non-binding - most such people do not care about\n" + "laws and ethics anyway - and tell themselves they are one of the good ones.)\n", SERVICES, PROGRAM, RESOURCE); if (ext && strlen(unsupported) > 0) { @@ -2151,7 +2152,7 @@ int main(int argc, char *argv[]) { struct sockaddr_in *ipv4 = NULL; printf("%s %s (c) 2020 by %s & %s - Please do not use in military or secret " - "service organizations, or for illegal purposes.\n\n", + "service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).\n\n", PROGRAM, VERSION, AUTHOR, AUTHOR2); #ifndef LIBAFP SERVICES = hydra_string_replace(SERVICES, "afp ", ""); diff --git a/sasl.h b/sasl.h index e42299f..4e12e31 100644 --- a/sasl.h +++ b/sasl.h @@ -32,7 +32,7 @@ typedef enum { SASL_ALLOW_UNASSIGNED = 1 } sasl_saslprep_flags; int32_t print_hex(unsigned char *buf, int32_t len); -char* sasl_plain(char *result, char *login, char *pass); +char *sasl_plain(char *result, char *login, char *pass); int32_t sasl_saslprep(const char *in, sasl_saslprep_flags flags, char **out); #ifdef LIBOPENSSL @@ -40,9 +40,9 @@ int32_t sasl_saslprep(const char *in, sasl_saslprep_flags flags, char **out); #include #include -char* sasl_cram_md5(char *result, char *pass, char *challenge); -char* sasl_cram_sha1(char *result, char *pass, char *challenge); -char* sasl_cram_sha256(char *result, char *pass, char *challenge); -char* sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char *miscptr, char *type, char *webtarget, int32_t webport, char *header); -char* sasl_scram_sha1(char *result, char *pass, char *clientfirstmessagebare, char *serverfirstmessage); +char *sasl_cram_md5(char *result, char *pass, char *challenge); +char *sasl_cram_sha1(char *result, char *pass, char *challenge); +char *sasl_cram_sha256(char *result, char *pass, char *challenge); +char *sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char *miscptr, char *type, char *webtarget, int32_t webport, char *header); +char *sasl_scram_sha1(char *result, char *pass, char *clientfirstmessagebare, char *serverfirstmessage); #endif From 4fd33e8ca277e02ff2c3c1cc8ecd6075a98fafa1 Mon Sep 17 00:00:00 2001 From: xambroz Date: Tue, 3 Mar 2020 17:37:12 +0100 Subject: [PATCH 279/531] Consider the /usr/include/firebird/ path for fb For example on the Fedora 31 the path for the firebird include ibase.h is /usr/include/firebird/ibase. This patch should also consider the firebird subdirectory inside the regular include directory. --- configure | 3 +++ 1 file changed, 3 insertions(+) diff --git a/configure b/configure index 9cec404..4c4079d 100755 --- a/configure +++ b/configure @@ -627,6 +627,9 @@ for i in $INCDIRS ; do if [ -f "$i/ibase.h" ]; then FIREBIRD_IPATH="$i" fi + if [ -f "$i/firebird/ibase.h" ]; then + FIREBIRD_IPATH="$i/firebird" + fi fi done if [ "X" != "X$DEBUG" ]; then From b0fc44daa2639cfe8ea26f20a72e2aa547826aba Mon Sep 17 00:00:00 2001 From: van Hauser Date: Tue, 10 Mar 2020 09:53:27 +0100 Subject: [PATCH 280/531] update todo and bfg too many entries message --- TODO | 5 +++++ bfg.c | 2 +- 2 files changed, 6 insertions(+), 1 deletion(-) diff --git a/TODO b/TODO index 8d798f6..06bf3f9 100644 --- a/TODO +++ b/TODO @@ -1,4 +1,9 @@ +./configure: + - add test for -march=native + +--- this is old --- + Prio 1: * add cookie support to hydra-http.c * hydra-smb more than 1 connection? diff --git a/bfg.c b/bfg.c index 3479268..88580fe 100644 --- a/bfg.c +++ b/bfg.c @@ -191,7 +191,7 @@ uint64_t bf_get_pcount() { count += (pow((double)bf_options.crs_len, (double)i)); if (count >= 0xffffffff) { fprintf(stderr, "\n[ERROR] definition for password bruteforce (-x) " - "generates more than 4 billion passwords\n"); + "generates more than 4 billion passwords - this is not a bug in the program, it is just not feasible to try so many attempts. Try a calculator how long that would take. duh.\n"); exit(-1); } From 88637abe26e1b5cced945038c831a7cad654ea4a Mon Sep 17 00:00:00 2001 From: van Hauser Date: Wed, 1 Apr 2020 12:26:28 +0200 Subject: [PATCH 281/531] fix typo --- hydra.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra.c b/hydra.c index 6952542..05e7450 100644 --- a/hydra.c +++ b/hydra.c @@ -3353,7 +3353,7 @@ int main(int argc, char *argv[]) { // script kiddie patch if (hydra_options.server != NULL && (hydra_strcasestr(hydra_options.server, ".outlook.com") != NULL || hydra_strcasestr(hydra_options.server, ".hotmail.com") != NULL || hydra_strcasestr(hydra_options.server, ".yahoo.") != NULL || hydra_strcasestr(hydra_options.server, ".gmx.") != NULL || hydra_strcasestr(hydra_options.server, ".web.de") != NULL || hydra_strcasestr(hydra_options.server, ".gmail.") != NULL || hydra_strcasestr(hydra_options.server, "googlemail.") != NULL)) { fprintf(stderr, "[WARNING] Google Mail and others have bruteforce and " - "hydra detection and sends false positives. You are not " + "hydra detection and send false positives. You are not " "doing anything illegal right?!\n"); fprintf(stderr, "[WARNING] !read the above!\n"); sleep(5); From 7b053d71649b0abd358eb599b3b4b27f6d7ab7d6 Mon Sep 17 00:00:00 2001 From: GitAntoinee Date: Wed, 1 Apr 2020 15:52:47 +0200 Subject: [PATCH 282/531] Add optional option to skip pre-request --- hydra-http-form.c | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/hydra-http-form.c b/hydra-http-form.c index 324fe6a..efe81ff 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -434,6 +434,16 @@ int32_t parse_options(char *miscptr, ptr_header_node *ptr_head) { sprintf(cookieurl, "%.1000s", hydra_strrep(miscptr + 2, "\\:", ":")); miscptr = ptr; break; + case 'g': // fall through + case 'G': + ptr = miscptr + 2; + while (*ptr != 0 && (*ptr != ':' || *(ptr - 1) == '\\')) + ptr++; + if (*ptr != 0) + *ptr++ = 0; + getcookie = 0; + miscptr = ptr; + break; case 'h': // add a new header at the end ptr = miscptr + 2; From bea3cf2bd13dd2fcf9116b4cb411c332f2e2f1cc Mon Sep 17 00:00:00 2001 From: GitAntoinee Date: Wed, 1 Apr 2020 15:58:00 +0200 Subject: [PATCH 283/531] Update help --- hydra-http-form.c | 1 + 1 file changed, 1 insertion(+) diff --git a/hydra-http-form.c b/hydra-http-form.c index efe81ff..722a24a 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -1439,6 +1439,7 @@ void usage_http_form(const char *service) { "The following parameters are optional:\n" " (c|C)=/page/uri to define a different page to gather initial " "cookies from\n" + " (g|G)=optional to skip pre-request\n" " (h|H)=My-Hdr\\: foo to send a user defined HTTP header with each " "request\n" " ^USER[64]^ and ^PASS[64]^ can also be put into these " From 47f24cb2560631d2eceabaf4394ecf26743ceee1 Mon Sep 17 00:00:00 2001 From: Antoine <52006497+GitAntoinee@users.noreply.github.com> Date: Wed, 1 Apr 2020 17:37:44 +0200 Subject: [PATCH 284/531] Update help --- hydra-http-form.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 722a24a..e851d97 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -1439,7 +1439,7 @@ void usage_http_form(const char *service) { "The following parameters are optional:\n" " (c|C)=/page/uri to define a different page to gather initial " "cookies from\n" - " (g|G)=optional to skip pre-request\n" + " (g|G)= skip pre-requests - only use this when no pre-cookies are required\n" " (h|H)=My-Hdr\\: foo to send a user defined HTTP header with each " "request\n" " ^USER[64]^ and ^PASS[64]^ can also be put into these " From f0424742e36bb6ef6ab96371c5082b7185d1c591 Mon Sep 17 00:00:00 2001 From: GitAntoinee Date: Wed, 1 Apr 2020 21:10:48 +0200 Subject: [PATCH 285/531] Fix indentation in help --- hydra-http-form.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 722a24a..eb5a4ce 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -1439,7 +1439,7 @@ void usage_http_form(const char *service) { "The following parameters are optional:\n" " (c|C)=/page/uri to define a different page to gather initial " "cookies from\n" - " (g|G)=optional to skip pre-request\n" + " (g|G)= skip pre-requests - only use this when no pre-cookies are required\n" " (h|H)=My-Hdr\\: foo to send a user defined HTTP header with each " "request\n" " ^USER[64]^ and ^PASS[64]^ can also be put into these " From 4e45f85fbbfd2dda8da663beae603308751a0b03 Mon Sep 17 00:00:00 2001 From: Karim Kanso Date: Wed, 8 Apr 2020 21:32:48 +0100 Subject: [PATCH 286/531] improved compatibility when null sessions fail --- hydra-smb2.c | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/hydra-smb2.c b/hydra-smb2.c index c603d63..a09490d 100644 --- a/hydra-smb2.c +++ b/hydra-smb2.c @@ -131,6 +131,14 @@ bool smb2_run_test(creds_t *cr, const char *server, uint16_t port) { smbc_free_context(ctx, 1); return true; break; + case EPERM: + // Probably this means access denied inspite of mention above + // about being related to wrong workgroup. I have observed + // libsmbclient emitting this when connecting to a vanilla install + // of Windows 2019 server (non-domain) with wrong credentials. It + // appears related to a fallback null session being rejected after + // the library tries with provided credentials. If the null + // session is accepted, EACCES is returned. case EACCES: // 100% access denied break; From dea22d3e7e0af96cceda8c530b790d7e19a8b432 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Sat, 25 Apr 2020 18:03:24 +0200 Subject: [PATCH 287/531] tiny fix --- hydra.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra.c b/hydra.c index 05e7450..5e1dd87 100644 --- a/hydra.c +++ b/hydra.c @@ -237,7 +237,7 @@ extern void hydra_tobase64(unsigned char *buf, int32_t buflen, int32_t bufsize); extern char *hydra_string_replace(const char *string, const char *substr, const char *replacement); extern char *hydra_address2string(char *address); extern char *hydra_address2string_beautiful(char *address); -extern int32_t colored_output; +extern uint32_t colored_output; extern char quiet; extern int32_t do_retry; extern int32_t old_ssl; From e2dc1d51095d407580e6a0dfca7e7aa9fd7cb423 Mon Sep 17 00:00:00 2001 From: maaaaz Date: Sun, 26 Apr 2020 06:44:12 -0400 Subject: [PATCH 288/531] libfreerdp2 and libwinpr2 fix in configure --- configure | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/configure b/configure index 4c4079d..70bb5f2 100755 --- a/configure +++ b/configure @@ -1025,7 +1025,7 @@ echo "Checking for Freerdp2 (libfreerdp2.so, freerdp/*.h, libwinpr2.so, winpr/*. for i in $LIBDIRS ; do if [ "X" = "X$FREERDP2_PATH" ]; then - if [ -f "$i/libfreerdp2.so" -o -f "$i/libfreerdp2.dylib" -o -f "$i/libfreerdp2.a" ]; then + if [ -f "$i/libfreerdp2.so" -o -f "$i/libfreerdp2.dylib" -o -f "$i/libfreerdp2.a" -o -f "$i/libfreerdp2.dll.a" ]; then FREERDP2_PATH="$i" fi fi @@ -1056,7 +1056,7 @@ echo "Checking for Freerdp2 (libfreerdp2.so, freerdp/*.h, libwinpr2.so, winpr/*. fi fi if [ "X" = "X$WINPR2_PATH" ]; then - TMP_LIB=`/bin/ls $i/winpr.dll* 2> /dev/null | grep winpr` + TMP_LIB=`/bin/ls $i/libwinpr2.dll.a 2> /dev/null | grep winpr` if [ -n "$TMP_LIB" ]; then WINPR2_PATH="$i" fi From 8f459806252395669c667a8ea62404abab65bbd6 Mon Sep 17 00:00:00 2001 From: maaaaz Date: Sun, 26 Apr 2020 09:52:11 -0400 Subject: [PATCH 289/531] oracle on cygwin support --- configure | 30 +++++++++++++++--------------- 1 file changed, 15 insertions(+), 15 deletions(-) diff --git a/configure b/configure index 70bb5f2..37a8f07 100755 --- a/configure +++ b/configure @@ -864,7 +864,7 @@ if [ "$SSH_IPATH" = "/usr/include" ]; then SSH_IPATH="" fi -echo "Checking for Oracle (libocci.so libclntsh.so / oci.h and libaio.so) ..." +echo "Checking for Oracle (libocci.so libclntsh.so / oci.h and libaio.so / liboci.a and oci.dll) ..." #assume if we find oci.h other headers should also be in that dir #for libs we will test the 2 if [ "X" != "X$WORACLE_PATH" ]; then @@ -894,6 +894,11 @@ for i in $LIBDIRS ; do ORACLE_PATH="$i" fi fi + if [ "X" = "X$ORACLE_PATH" ]; then + if [ -f "$i/liboci.a" -a -f "$i/oci.dll" ]; then + ORACLE_PATH="$i" + fi + fi if [ "X" = "X$ORACLE_PATH" ]; then TMP_LIB=`/bin/ls $i/libocci.so.* 2> /dev/null | grep occi.` if [ -n "$TMP_LIB" ]; then @@ -907,23 +912,17 @@ for i in $LIBDIRS ; do fi fi if [ "X" = "X$ORACLE_PATH" ]; then - TMP_LIB=`/bin/ls $i/libocci.dll* 2> /dev/null | grep occi.` + TMP_LIB=`/bin/ls $i/oci.dll* 2> /dev/null | grep occi.` if [ -n "$TMP_LIB" ]; then ORACLE_PATH="$i" fi - if [ "X" != "X$ORACLE_PATH" ]; then - TMP_LIB=`/bin/ls $i/libclntsh.dll* 2> /dev/null | grep clntsh.` - if [ -z "$TMP_LIB" ]; then - ORACLE_PATH="" - fi - fi fi done if [ "X" != "X$DEBUG" ]; then echo DEBUG: ORACLE_PATH=$ORACLE_PATH/libocci fi -#check for Kernel Asynchronous I/O (AIO) lib support -if [ "X" != "X$ORACLE_PATH" ]; then +#check for Kernel Asynchronous I/O (AIO) lib support, no need on Cygwin +if [ "X" != "X$ORACLE_PATH" -a "$SYSO" != "Cygwin" ]; then LIBAIO="" for i in $LIBDIRS ; do if [ "X" = "X$LIBAIO" ]; then @@ -951,10 +950,8 @@ if [ "X" != "X$DEBUG" ]; then fi for i in $INCDIRS ; do - if [ "X" != "X$ORACLE_PATH" ]; then - if [ -f "$i/oci.h" ]; then - ORACLE_IPATH="$i" - fi + if [ -f "$i/oci.h" ]; then + ORACLE_IPATH="$i" fi done if [ "X" != "X$DEBUG" ]; then @@ -1542,9 +1539,12 @@ fi if [ -n "$NCP_PATH" ]; then XLIBS="$XLIBS -lncp" fi -if [ -n "$ORACLE_PATH" ]; then +if [ -n "$ORACLE_PATH" -a "$SYSO" != "Cygwin" ]; then XLIBS="$XLIBS -locci -lclntsh" fi +if [ -n "$ORACLE_PATH" -a "$SYSO" = "Cygwin" ]; then + XLIBS="$XLIBS -loci" +fi if [ -n "$FIREBIRD_PATH" ]; then XLIBS="$XLIBS -lfbclient" fi From dac0c18f75f5789c294e0b57456668ac28c3c5dd Mon Sep 17 00:00:00 2001 From: Karim Kanso Date: Thu, 14 May 2020 09:56:18 +0100 Subject: [PATCH 290/531] fix http-proxy to handle multiline buffer data --- hydra-http-proxy.c | 59 ++++++++++++++++++++++++++++++++-------------- 1 file changed, 41 insertions(+), 18 deletions(-) diff --git a/hydra-http-proxy.c b/hydra-http-proxy.c index fa5638c..1d3caaa 100644 --- a/hydra-http-proxy.c +++ b/hydra-http-proxy.c @@ -10,7 +10,7 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option char *login, *pass, buffer[500], buffer2[500]; char url[210], host[60]; char *header = ""; /* XXX TODO */ - char *ptr, *fooptr; + char *ptr, *fooptr, *auth_hdr; if (strlen(login = hydra_get_next_login()) == 0) login = empty; @@ -50,24 +50,32 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option return 3; } - if (debug) - hydra_report(stderr, "S:%s\n", http_proxy_buf); + if (debug) { + hydra_report(stderr, + "S:%-.*s\n", + (int)(strchr(http_proxy_buf, '\r') - http_proxy_buf), + http_proxy_buf); + } - free(http_proxy_buf); - http_proxy_buf = hydra_receive_line(s); - while (http_proxy_buf != NULL && hydra_strcasestr(http_proxy_buf, "Proxy-Authenticate:") == NULL) { + while (http_proxy_buf != NULL && + (auth_hdr = hydra_strcasestr(http_proxy_buf, + "Proxy-Authenticate:")) == NULL) { free(http_proxy_buf); http_proxy_buf = hydra_receive_line(s); } - if (http_proxy_buf == NULL) { + if (auth_hdr == NULL) { if (verbose) hydra_report(stderr, "[ERROR] Proxy seems not to require authentication\n"); return 3; } - if (debug) - hydra_report(stderr, "S:%s\n", http_proxy_buf); + if (debug) { + hydra_report(stderr, + "S:%-.*s\n", + (int)(strchr(auth_hdr, '\r') - auth_hdr), + auth_hdr); + } // after the first query we should have been disconnected from web server s = hydra_disconnect(s); @@ -78,8 +86,9 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option } } - if (http_proxy_auth_mechanism == AUTH_BASIC || hydra_strcasestr(http_proxy_buf, "Proxy-Authenticate: Basic") != NULL) { + if (http_proxy_auth_mechanism == AUTH_BASIC || hydra_strcasestr(auth_hdr, "Proxy-Authenticate: Basic") != NULL) { http_proxy_auth_mechanism = AUTH_BASIC; + auth_hdr = NULL; sprintf(buffer2, "%.50s:%.50s", login, pass); hydra_tobase64((unsigned char *)buffer2, strlen(buffer2), sizeof(buffer2)); sprintf(buffer, @@ -105,15 +114,20 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option return 3; } - if (debug) - hydra_report(stderr, "S:%s\n", http_proxy_buf); + if (debug) { + hydra_report(stderr, + "S:%-.*s\n", + (int)(strchr(http_proxy_buf, '\r') - http_proxy_buf), + http_proxy_buf); + } } else { - if (http_proxy_auth_mechanism == AUTH_NTLM || hydra_strcasestr(http_proxy_buf, "Proxy-Authenticate: NTLM") != NULL) { + if (http_proxy_auth_mechanism == AUTH_NTLM || hydra_strcasestr(auth_hdr, "Proxy-Authenticate: NTLM") != NULL) { unsigned char buf1[4096]; unsigned char buf2[4096]; char *pos = NULL; http_proxy_auth_mechanism = AUTH_NTLM; + auth_hdr = NULL; // send auth and receive challenge // send auth request: let the server send it's own hostname and domainname buildAuthRequest((tSmbNtlmAuthRequest *)buf2, 0, NULL, NULL); @@ -178,10 +192,11 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option return 3; } else { #ifdef LIBOPENSSL - if (hydra_strcasestr(http_proxy_buf, "Proxy-Authenticate: Digest") != NULL) { + if (hydra_strcasestr(auth_hdr, "Proxy-Authenticate: Digest") != NULL) { char *pbuffer, *result; http_proxy_auth_mechanism = AUTH_DIGESTMD5; + auth_hdr == NULL; pbuffer = hydra_strcasestr(http_proxy_buf, "Proxy-Authenticate: Digest "); strncpy(buffer, pbuffer + strlen("Proxy-Authenticate: Digest "), sizeof(buffer)); buffer[sizeof(buffer) - 1] = '\0'; @@ -204,8 +219,12 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option http_proxy_buf = hydra_receive_line(s); } - if (debug && http_proxy_buf != NULL) - hydra_report(stderr, "S:%s\n", http_proxy_buf); + if (debug && http_proxy_buf != NULL) { + hydra_report(stderr, + "S:%-.*s\n", + (int)(strchr(http_proxy_buf, '\r') - http_proxy_buf), + http_proxy_buf); + } if (http_proxy_buf == NULL) return 3; @@ -213,9 +232,13 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option } else #endif { - if (http_proxy_buf != NULL) { + if (auth_hdr != NULL) { // buf[strlen(http_proxy_buf) - 1] = '\0'; - hydra_report(stderr, "Unsupported Auth type:\n%s\n", http_proxy_buf); + hydra_report(stderr, + "Unsupported Auth type:\n%-.*s\n", + (int)(strchr(http_proxy_buf, '\r') - auth_hdr), + auth_hdr); + auth_hdr = NULL; free(http_proxy_buf); http_proxy_buf = NULL; } else { From 99d8ef8f3c907499497c9477866b6e3cd1d47307 Mon Sep 17 00:00:00 2001 From: Karim Kanso Date: Thu, 14 May 2020 10:18:20 +0100 Subject: [PATCH 291/531] fix -Wformat-overflow= warnings in sprintf --- hydra-http-proxy.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-http-proxy.c b/hydra-http-proxy.c index 1d3caaa..17bf02a 100644 --- a/hydra-http-proxy.c +++ b/hydra-http-proxy.c @@ -7,7 +7,7 @@ char *http_proxy_buf = NULL; int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp, char *hostname) { char *empty = ""; - char *login, *pass, buffer[500], buffer2[500]; + char *login, *pass, buffer[5000], buffer2[4500]; char url[210], host[60]; char *header = ""; /* XXX TODO */ char *ptr, *fooptr, *auth_hdr; From a40bfb1e54fce6d1a9f5b0fb4ae4e1366d0d6fc2 Mon Sep 17 00:00:00 2001 From: Karim Kanso Date: Thu, 14 May 2020 10:58:14 +0100 Subject: [PATCH 292/531] add 404 to http-proxy as a success condition --- hydra-http-proxy.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/hydra-http-proxy.c b/hydra-http-proxy.c index 17bf02a..14bfaf5 100644 --- a/hydra-http-proxy.c +++ b/hydra-http-proxy.c @@ -250,7 +250,11 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option } ptr = ((char *)index(http_proxy_buf, ' ')) + 1; - if (*ptr == '2' || (*ptr == '3' && *(ptr + 2) == '1') || (*ptr == '3' && *(ptr + 2) == '2')) { + if (*ptr == '2' || + (*ptr == '3' && *(ptr + 2) == '1') || + (*ptr == '3' && *(ptr + 2) == '2') || + (*ptr == '4' && *(ptr + 2) == '4') + ) { hydra_report_found_host(port, ip, "http-proxy", fp); hydra_completed_pair_found(); free(http_proxy_buf); From 167a1c53e8af94c8ea39927736ed1f4d3d32145d Mon Sep 17 00:00:00 2001 From: TenGbps <30792994+TenGbps@users.noreply.github.com> Date: Thu, 21 May 2020 17:46:26 +0200 Subject: [PATCH 293/531] Update sasl.c Some this the realm are long, if is too long is getting a #392 --- sasl.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/sasl.c b/sasl.c index 1a421b1..8e4cf50 100644 --- a/sasl.c +++ b/sasl.c @@ -271,7 +271,7 @@ char *sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char int32_t array_size = 10; unsigned char response[MD5_DIGEST_LENGTH]; char *array[array_size]; - char buffer2[500], buffer3[500], nonce[200], realm[50], algo[20]; + char buffer2[500], buffer3[500], nonce[200], realm[200], algo[20]; int32_t i = 0, ind = 0, lastpos = 0, currentpos = 0, intq = 0, auth_find = 0; MD5_CTX md5c; char *preplogin; From c426452772b06ce57e5b58080a01b1bb717b84f5 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 21 May 2020 22:43:13 +0200 Subject: [PATCH 294/531] fuck backward compatability - snprintf for the win --- sasl.c | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/sasl.c b/sasl.c index 8e4cf50..4fbad43 100644 --- a/sasl.c +++ b/sasl.c @@ -461,10 +461,10 @@ char *sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char sprintf(pbuffer, "%02x", response[i]); pbuffer += 2; } - sprintf(buffer, "%s:%s:%s", buffer3, nonce, "hydra"); + snprintf(buffer, 500, "%s:%s:%s", buffer3, nonce, "hydra"); } else { memcpy(buffer, response, sizeof(response)); - sprintf(buffer + sizeof(response), ":%s:%s", nonce, "hydra"); + snprintf(buffer + sizeof(response), 50 - sizeof(response), ":%s:%s", nonce, "hydra"); } MD5_Init(&md5c); MD5_Update(&md5c, buffer, strlen(buffer)); @@ -479,22 +479,22 @@ char *sasl_digest_md5(char *result, char *login, char *pass, char *buffer, char // compute ha2 // proxy case if (strstr(type, "proxy") != NULL) - sprintf(buffer, "%s:%s", "HEAD", miscptr); + snprintf(buffer, 500, "%s:%s", "HEAD", miscptr); else // http case if ((strstr(type, "GET") != NULL) || (strstr(type, "HEAD") != NULL)) - sprintf(buffer, "%s:%s", type, miscptr); + snprintf(buffer, 500, "%s:%s", type, miscptr); else // sip case if (strstr(type, "sip") != NULL) - sprintf(buffer, "REGISTER:%s:%s", type, miscptr); + snprintf(buffer, 500, "REGISTER:%s:%s", type, miscptr); else // others if (strstr(type, "rtsp") != NULL) - sprintf(buffer, "DESCRIBE:%s://%s:%i", type, webtarget, port); + snprintf(buffer, 500, "DESCRIBE:%s://%s:%i", type, webtarget, port); else // others - sprintf(buffer, "AUTHENTICATE:%s/%s", type, realm); + snprintf(buffer, 500, "AUTHENTICATE:%s/%s", type, realm); MD5_Init(&md5c); MD5_Update(&md5c, buffer, strlen(buffer)); From 1ed690983678626dc85f11d70181eeda16a01ba3 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 28 May 2020 22:38:52 +0200 Subject: [PATCH 295/531] more buffer --- Makefile | 97 +++++++++++++++++++++++++++++++++++++++++++++- hydra-http-proxy.c | 4 +- 2 files changed, 97 insertions(+), 4 deletions(-) diff --git a/Makefile b/Makefile index 372e67e..ee6dd85c 100644 --- a/Makefile +++ b/Makefile @@ -1,5 +1,98 @@ -all: - @echo Error: you must run "./configure" first +STRIP=strip +XDEFINES= -DHAVE_MYSQL_MYSQL_H -DLIBOPENSSL -DLIBNCURSES -DLIBFIREBIRD -DLIBIDN -DHAVE_PR29_H -DHAVE_PCRE -DLIBMYSQLCLIENT -DLIBPOSTGRES -DLIBSVN -DLIBSSH -DHAVE_ZLIB -DLIBMCACHED -DLIBMONGODB -DLIBBSON -DLIBFREERDP2 -DLIBWINPR2 -DLIBSMBCLIENT -DHAVE_MATH_H -DHAVE_SYS_PARAM_H +XLIBS= -lz -lcurses -lssl -lfbclient -lidn -lpcre -lmysqlclient -lpq -lsvn_client-1 -lapr-1 -laprutil-1 -lsvn_subr-1 -lssh -lcrypto -lmemcached -lmongoc-1.0 -lbson-1.0 -lfreerdp2 -lwinpr2 -lsmbclient +XLIBPATHS=-L/usr/lib -L/usr/local/lib -L/lib -L/lib/x86_64-linux-gnu +XIPATHS= -I/usr/include/mysql -I/usr/include -I/usr/include -I/usr/include -I/usr/include -I/usr/include/postgresql -I/usr/include -I/usr/include/subversion-1 -I/usr/include/apr-1.0 -I/usr/include/subversion-1 -I/usr/include/libmemcached-1.0 -I/usr/include/libmongoc-1.0 -I/usr/include/libbson-1.0 -I/usr/include/freerdp2 -I/usr/include/winpr2 -I/usr/include/samba-4.0 +PREFIX=/usr/local +XHYDRA_SUPPORT=xhydra +STRIP=strip + +HYDRA_LOGO= +PWI_LOGO= +SEC=-pie -fPIE -fstack-protector-all --param ssp-buffer-size=4 -D_FORTIFY_SOURCE=2 -Wl,-z,now -Wl,-z,relro + +# +# Makefile for Hydra - (c) 2001-2020 by van Hauser / THC +# +WARN_CLANG=-Wformat-nonliteral -Wstrncat-size -Wformat-security -Wsign-conversion -Wconversion -Wfloat-conversion -Wshorten-64-to-32 -Wuninitialized -Wmissing-variable-declarations -Wmissing-declarations +WARN_GCC=-Wformat=2 -Wformat-overflow=2 -Wformat-nonliteral -Wformat-truncation=2 -Wnull-dereference -Wstrict-overflow=2 -Wstringop-overflow=4 -Walloca-larger-than=4096 -Wtype-limits -Wconversion -Wtrampolines -Wstrict-prototypes -Wmissing-prototypes -Wmissing-declarations -fno-common -Wcast-align +CFLAGS ?= -march=native -flto +OPTS=-I. -O3 $(CFLAGS) -fcommon +# -Wall -g -pedantic +LIBS=-lm +DESTDIR ?= +BINDIR = /bin +MANDIR = /man/man1/ +DATADIR = /etc + +SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ + hydra-telnet.c hydra-cisco.c hydra-http.c hydra-ftp.c hydra-imap.c \ + hydra-pop3.c hydra-smb.c hydra-icq.c hydra-cisco-enable.c hydra-ldap.c \ + hydra-memcached.c hydra-mongodb.c hydra-mysql.c hydra-mssql.c hydra-xmpp.c \ + hydra-http-proxy-urlenum.c hydra-snmp.c hydra-cvs.c hydra-smtp.c \ + hydra-smtp-enum.c hydra-sapr3.c hydra-ssh.c hydra-sshkey.c hydra-teamspeak.c \ + hydra-postgres.c hydra-rsh.c hydra-rlogin.c hydra-oracle-listener.c \ + hydra-svn.c hydra-pcanywhere.c hydra-sip.c hydra-oracle.c hydra-vmauthd.c \ + hydra-asterisk.c hydra-firebird.c hydra-afp.c hydra-ncp.c hydra-rdp.c \ + hydra-oracle-sid.c hydra-http-proxy.c hydra-http-form.c hydra-irc.c \ + hydra-s7-300.c hydra-redis.c hydra-adam6500.c hydra-rtsp.c \ + hydra-rpcap.c hydra-radmin2.c \ + hydra-time.c crc32.c d3des.c bfg.c ntlm.c sasl.c hmacmd5.c hydra-mod.c \ + hydra-smb2.c +OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ + hydra-telnet.o hydra-cisco.o hydra-http.o hydra-ftp.o hydra-imap.o \ + hydra-pop3.o hydra-smb.o hydra-icq.o hydra-cisco-enable.o hydra-ldap.o \ + hydra-memcached.o hydra-mongodb.o hydra-mysql.o hydra-mssql.o hydra-xmpp.o \ + hydra-http-proxy-urlenum.o hydra-snmp.o hydra-cvs.o hydra-smtp.o \ + hydra-smtp-enum.o hydra-sapr3.o hydra-ssh.o hydra-sshkey.o hydra-teamspeak.o \ + hydra-postgres.o hydra-rsh.o hydra-rlogin.o hydra-oracle-listener.o \ + hydra-svn.o hydra-pcanywhere.o hydra-sip.o hydra-oracle-sid.o hydra-oracle.o \ + hydra-vmauthd.o hydra-asterisk.o hydra-firebird.o hydra-afp.o \ + hydra-ncp.o hydra-http-proxy.o hydra-http-form.o hydra-irc.o \ + hydra-redis.o hydra-rdp.o hydra-s7-300.c hydra-adam6500.o hydra-rtsp.o \ + hydra-rpcap.o hydra-radmin2.o \ + crc32.o d3des.o bfg.o ntlm.o sasl.o hmacmd5.o hydra-mod.o hydra-time.o \ + hydra-smb2.o +BINS = hydra pw-inspector + +EXTRA_DIST = README README.arm README.palm CHANGES TODO INSTALL LICENSE \ + hydra-mod.h hydra.h crc32.h d3des.h + +all: pw-inspector hydra $(XHYDRA_SUPPORT) + @echo + @echo Now type "make install" + +hydra: hydra.c $(OBJ) + $(CC) $(OPTS) $(SEC) $(LIBS) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o hydra $(HYDRA_LOGO) hydra.c $(OBJ) $(LIBS) $(XLIBS) $(XLIBPATHS) $(XIPATHS) $(XDEFINES) + @echo + @echo If men could get pregnant, abortion would be a sacrament + @echo + +xhydra: + -cd hydra-gtk && sh ./make_xhydra.sh + +pw-inspector: pw-inspector.c + -$(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o pw-inspector $(PWI_LOGO) pw-inspector.c + +.c.o: + $(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) -c $< $(XDEFINES) $(XIPATHS) + +strip: all + strip $(BINS) + -echo OK > /dev/null && test -x xhydra && strip xhydra || echo OK > /dev/null + +install: strip + -mkdir -p $(DESTDIR)$(PREFIX)$(BINDIR) + cp -f hydra-wizard.sh $(BINS) $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 hydra-wizard.sh $(BINS) + -echo OK > /dev/null && test -x xhydra && cp xhydra $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 xhydra || echo OK > /dev/null + -sed -e "s|^INSTALLDIR=.*|INSTALLDIR="$(PREFIX)"|" dpl4hydra.sh | sed -e "s|^LOCATION=.*|LOCATION="$(DATADIR)"|" > $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh + -chmod 755 $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh + -mkdir -p $(DESTDIR)$(PREFIX)$(DATADIR) + -cp -f *.csv $(DESTDIR)$(PREFIX)$(DATADIR) + -mkdir -p $(DESTDIR)$(PREFIX)$(MANDIR) + -cp -f hydra.1 xhydra.1 pw-inspector.1 $(DESTDIR)$(PREFIX)$(MANDIR) clean: + rm -rf xhydra pw-inspector hydra *.o core *.core *.stackdump *~ Makefile.in Makefile dev_rfc hydra.restore arm/*.ipk arm/ipkg/usr/bin/* hydra-gtk/src/*.o hydra-gtk/src/xhydra hydra-gtk/stamp-h hydra-gtk/config.status hydra-gtk/errors hydra-gtk/config.log hydra-gtk/src/.deps hydra-gtk/src/Makefile hydra-gtk/Makefile cp -f Makefile.orig Makefile + diff --git a/hydra-http-proxy.c b/hydra-http-proxy.c index 14bfaf5..757a3fe 100644 --- a/hydra-http-proxy.c +++ b/hydra-http-proxy.c @@ -8,7 +8,7 @@ char *http_proxy_buf = NULL; int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp, char *hostname) { char *empty = ""; char *login, *pass, buffer[5000], buffer2[4500]; - char url[210], host[60]; + char url[510], host[60]; char *header = ""; /* XXX TODO */ char *ptr, *fooptr, *auth_hdr; @@ -21,7 +21,7 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option strcpy(url, "http://www.microsoft.com/"); strcpy(host, "Host: www.microsoft.com\r\n"); } else { - sprintf(url, "%.200s", miscptr); + sprintf(url, "%.500s", miscptr); ptr = strstr(miscptr, "://"); // :// check is in hydra.c sprintf(host, "Host: %.50s", ptr + 3); if ((ptr = index(host, '/')) != NULL) From 8b603b82a2ab94fefe5a6247a9ccb4945d6bd859 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Thu, 28 May 2020 22:39:13 +0200 Subject: [PATCH 296/531] fix makefile --- Makefile | 97 ++------------------------------------------------------ 1 file changed, 2 insertions(+), 95 deletions(-) diff --git a/Makefile b/Makefile index ee6dd85c..372e67e 100644 --- a/Makefile +++ b/Makefile @@ -1,98 +1,5 @@ -STRIP=strip -XDEFINES= -DHAVE_MYSQL_MYSQL_H -DLIBOPENSSL -DLIBNCURSES -DLIBFIREBIRD -DLIBIDN -DHAVE_PR29_H -DHAVE_PCRE -DLIBMYSQLCLIENT -DLIBPOSTGRES -DLIBSVN -DLIBSSH -DHAVE_ZLIB -DLIBMCACHED -DLIBMONGODB -DLIBBSON -DLIBFREERDP2 -DLIBWINPR2 -DLIBSMBCLIENT -DHAVE_MATH_H -DHAVE_SYS_PARAM_H -XLIBS= -lz -lcurses -lssl -lfbclient -lidn -lpcre -lmysqlclient -lpq -lsvn_client-1 -lapr-1 -laprutil-1 -lsvn_subr-1 -lssh -lcrypto -lmemcached -lmongoc-1.0 -lbson-1.0 -lfreerdp2 -lwinpr2 -lsmbclient -XLIBPATHS=-L/usr/lib -L/usr/local/lib -L/lib -L/lib/x86_64-linux-gnu -XIPATHS= -I/usr/include/mysql -I/usr/include -I/usr/include -I/usr/include -I/usr/include -I/usr/include/postgresql -I/usr/include -I/usr/include/subversion-1 -I/usr/include/apr-1.0 -I/usr/include/subversion-1 -I/usr/include/libmemcached-1.0 -I/usr/include/libmongoc-1.0 -I/usr/include/libbson-1.0 -I/usr/include/freerdp2 -I/usr/include/winpr2 -I/usr/include/samba-4.0 -PREFIX=/usr/local -XHYDRA_SUPPORT=xhydra -STRIP=strip - -HYDRA_LOGO= -PWI_LOGO= -SEC=-pie -fPIE -fstack-protector-all --param ssp-buffer-size=4 -D_FORTIFY_SOURCE=2 -Wl,-z,now -Wl,-z,relro - -# -# Makefile for Hydra - (c) 2001-2020 by van Hauser / THC -# -WARN_CLANG=-Wformat-nonliteral -Wstrncat-size -Wformat-security -Wsign-conversion -Wconversion -Wfloat-conversion -Wshorten-64-to-32 -Wuninitialized -Wmissing-variable-declarations -Wmissing-declarations -WARN_GCC=-Wformat=2 -Wformat-overflow=2 -Wformat-nonliteral -Wformat-truncation=2 -Wnull-dereference -Wstrict-overflow=2 -Wstringop-overflow=4 -Walloca-larger-than=4096 -Wtype-limits -Wconversion -Wtrampolines -Wstrict-prototypes -Wmissing-prototypes -Wmissing-declarations -fno-common -Wcast-align -CFLAGS ?= -march=native -flto -OPTS=-I. -O3 $(CFLAGS) -fcommon -# -Wall -g -pedantic -LIBS=-lm -DESTDIR ?= -BINDIR = /bin -MANDIR = /man/man1/ -DATADIR = /etc - -SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ - hydra-telnet.c hydra-cisco.c hydra-http.c hydra-ftp.c hydra-imap.c \ - hydra-pop3.c hydra-smb.c hydra-icq.c hydra-cisco-enable.c hydra-ldap.c \ - hydra-memcached.c hydra-mongodb.c hydra-mysql.c hydra-mssql.c hydra-xmpp.c \ - hydra-http-proxy-urlenum.c hydra-snmp.c hydra-cvs.c hydra-smtp.c \ - hydra-smtp-enum.c hydra-sapr3.c hydra-ssh.c hydra-sshkey.c hydra-teamspeak.c \ - hydra-postgres.c hydra-rsh.c hydra-rlogin.c hydra-oracle-listener.c \ - hydra-svn.c hydra-pcanywhere.c hydra-sip.c hydra-oracle.c hydra-vmauthd.c \ - hydra-asterisk.c hydra-firebird.c hydra-afp.c hydra-ncp.c hydra-rdp.c \ - hydra-oracle-sid.c hydra-http-proxy.c hydra-http-form.c hydra-irc.c \ - hydra-s7-300.c hydra-redis.c hydra-adam6500.c hydra-rtsp.c \ - hydra-rpcap.c hydra-radmin2.c \ - hydra-time.c crc32.c d3des.c bfg.c ntlm.c sasl.c hmacmd5.c hydra-mod.c \ - hydra-smb2.c -OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ - hydra-telnet.o hydra-cisco.o hydra-http.o hydra-ftp.o hydra-imap.o \ - hydra-pop3.o hydra-smb.o hydra-icq.o hydra-cisco-enable.o hydra-ldap.o \ - hydra-memcached.o hydra-mongodb.o hydra-mysql.o hydra-mssql.o hydra-xmpp.o \ - hydra-http-proxy-urlenum.o hydra-snmp.o hydra-cvs.o hydra-smtp.o \ - hydra-smtp-enum.o hydra-sapr3.o hydra-ssh.o hydra-sshkey.o hydra-teamspeak.o \ - hydra-postgres.o hydra-rsh.o hydra-rlogin.o hydra-oracle-listener.o \ - hydra-svn.o hydra-pcanywhere.o hydra-sip.o hydra-oracle-sid.o hydra-oracle.o \ - hydra-vmauthd.o hydra-asterisk.o hydra-firebird.o hydra-afp.o \ - hydra-ncp.o hydra-http-proxy.o hydra-http-form.o hydra-irc.o \ - hydra-redis.o hydra-rdp.o hydra-s7-300.c hydra-adam6500.o hydra-rtsp.o \ - hydra-rpcap.o hydra-radmin2.o \ - crc32.o d3des.o bfg.o ntlm.o sasl.o hmacmd5.o hydra-mod.o hydra-time.o \ - hydra-smb2.o -BINS = hydra pw-inspector - -EXTRA_DIST = README README.arm README.palm CHANGES TODO INSTALL LICENSE \ - hydra-mod.h hydra.h crc32.h d3des.h - -all: pw-inspector hydra $(XHYDRA_SUPPORT) - @echo - @echo Now type "make install" - -hydra: hydra.c $(OBJ) - $(CC) $(OPTS) $(SEC) $(LIBS) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o hydra $(HYDRA_LOGO) hydra.c $(OBJ) $(LIBS) $(XLIBS) $(XLIBPATHS) $(XIPATHS) $(XDEFINES) - @echo - @echo If men could get pregnant, abortion would be a sacrament - @echo - -xhydra: - -cd hydra-gtk && sh ./make_xhydra.sh - -pw-inspector: pw-inspector.c - -$(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o pw-inspector $(PWI_LOGO) pw-inspector.c - -.c.o: - $(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) -c $< $(XDEFINES) $(XIPATHS) - -strip: all - strip $(BINS) - -echo OK > /dev/null && test -x xhydra && strip xhydra || echo OK > /dev/null - -install: strip - -mkdir -p $(DESTDIR)$(PREFIX)$(BINDIR) - cp -f hydra-wizard.sh $(BINS) $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 hydra-wizard.sh $(BINS) - -echo OK > /dev/null && test -x xhydra && cp xhydra $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 xhydra || echo OK > /dev/null - -sed -e "s|^INSTALLDIR=.*|INSTALLDIR="$(PREFIX)"|" dpl4hydra.sh | sed -e "s|^LOCATION=.*|LOCATION="$(DATADIR)"|" > $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh - -chmod 755 $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh - -mkdir -p $(DESTDIR)$(PREFIX)$(DATADIR) - -cp -f *.csv $(DESTDIR)$(PREFIX)$(DATADIR) - -mkdir -p $(DESTDIR)$(PREFIX)$(MANDIR) - -cp -f hydra.1 xhydra.1 pw-inspector.1 $(DESTDIR)$(PREFIX)$(MANDIR) +all: + @echo Error: you must run "./configure" first clean: - rm -rf xhydra pw-inspector hydra *.o core *.core *.stackdump *~ Makefile.in Makefile dev_rfc hydra.restore arm/*.ipk arm/ipkg/usr/bin/* hydra-gtk/src/*.o hydra-gtk/src/xhydra hydra-gtk/stamp-h hydra-gtk/config.status hydra-gtk/errors hydra-gtk/config.log hydra-gtk/src/.deps hydra-gtk/src/Makefile hydra-gtk/Makefile cp -f Makefile.orig Makefile - From a88198051bbc710bac0ad1a04ce3ee3a72c72772 Mon Sep 17 00:00:00 2001 From: Henry Robalino Date: Fri, 5 Jun 2020 17:28:49 -0400 Subject: [PATCH 297/531] add support for freerdp3" Added support for freerdp module 3, this is the newest module from freerdp --- configure | 98 ++++++++++++++++++++++++++--------------------------- hydra-rdp.c | 2 +- hydra.c | 10 +++--- 3 files changed, 55 insertions(+), 55 deletions(-) diff --git a/configure b/configure index 37a8f07..7849a7d 100755 --- a/configure +++ b/configure @@ -70,8 +70,8 @@ NSL_PATH="" SOCKET_PATH="" MANDIR="" XHYDRA_SUPPORT="" -FREERDP2_PATH="" -WINPR2_PATH="" +FREERDP3_PATH="" +WINPR3_PATH="" SMBC_PATH="" SMBC_IPATH="" @@ -1018,76 +1018,76 @@ fi fi -echo "Checking for Freerdp2 (libfreerdp2.so, freerdp/*.h, libwinpr2.so, winpr/*.h) ..." +echo "Checking for Freerdp3 (libfreerdp3.so, freerdp/*.h, libwinpr3.so, winpr/*.h) ..." for i in $LIBDIRS ; do - if [ "X" = "X$FREERDP2_PATH" ]; then - if [ -f "$i/libfreerdp2.so" -o -f "$i/libfreerdp2.dylib" -o -f "$i/libfreerdp2.a" -o -f "$i/libfreerdp2.dll.a" ]; then - FREERDP2_PATH="$i" + if [ "X" = "X$FREERDP3_PATH" ]; then + if [ -f "$i/libfreerdp3.so" -o -f "$i/libfreerdp3.dylib" -o -f "$i/libfreerdp3.a" -o -f "$i/libfreerdp3.dll.a" ]; then + FREERDP3_PATH="$i" fi fi - if [ "X" = "X$FREERDP2_PATH" ]; then - TMP_LIB=`/bin/ls $i/libfreerdp2*.so* 2> /dev/null | grep libfreerdp2` + if [ "X" = "X$FREERDP3_PATH" ]; then + TMP_LIB=`/bin/ls $i/libfreerdp3*.so* 2> /dev/null | grep libfreerdp3` if [ -n "$TMP_LIB" ]; then - FREERDP2_PATH="$i" + FREERDP3_PATH="$i" fi fi done - FREERDP2_IPATH= + FREERDP3_IPATH= for i in $INCDIRS ; do - if [ "X" = "X$FREERDP2_IPATH" ]; then + if [ "X" = "X$FREERDP3_IPATH" ]; then if [ -f "$i/freerdp/freerdp.h" ]; then - FREERDP2_IPATH="$i/freerdp2" + FREERDP3_IPATH="$i/freerdp3" fi - if [ -f "$i/freerdp2/freerdp/freerdp.h" ]; then - FREERDP2_IPATH="$i/freerdp2" + if [ -f "$i/freerdp3/freerdp/freerdp.h" ]; then + FREERDP3_IPATH="$i/freerdp3" fi fi done for i in $LIBDIRS ; do - if [ "X" = "X$WINPR2_PATH" ]; then - if [ -f "$i/libwinpr2.so" -o -f "$i/libwinpr2.dylib" -o -f "$i/libwinpr2.a" ]; then - WINPR2_PATH="$i" + if [ "X" = "X$WINPR3_PATH" ]; then + if [ -f "$i/libwinpr3.so" -o -f "$i/libwinpr3.dylib" -o -f "$i/libwinpr3.a" ]; then + WINPR3_PATH="$i" fi fi - if [ "X" = "X$WINPR2_PATH" ]; then - TMP_LIB=`/bin/ls $i/libwinpr2.dll.a 2> /dev/null | grep winpr` + if [ "X" = "X$WINPR3_PATH" ]; then + TMP_LIB=`/bin/ls $i/libwinpr3.dll.a 2> /dev/null | grep winpr` if [ -n "$TMP_LIB" ]; then - WINPR2_PATH="$i" + WINPR3_PATH="$i" fi fi done - WINPR2_IPATH= + WINPR3_IPATH= for i in $INCDIRS ; do - if [ "X" = "X$WINPR2_IPATH" ]; then + if [ "X" = "X$WINPR3_IPATH" ]; then if [ -f "$i/winpr.h" ]; then - WINPR2_IPATH="$i" + WINPR3_IPATH="$i" fi - if [ -f "$i/winpr2/winpr/winpr.h" ]; then - WINPR2_IPATH="$i/winpr2" + if [ -f "$i/winpr3/winpr/winpr.h" ]; then + WINPR3_IPATH="$i/winpr3" fi fi done if [ "X" != "X$DEBUG" ]; then - echo DEBUG: FREERDP2_PATH=$FREERDP2_PATH/ - echo DEBUG: FREERDP2_IPATH=$FREERDP2_IPATH/ - echo DEBUG: WINPR2_PATH=$WINPR2_PATH/ - echo DEBUG: WINPR2_IPATH=$WINPR2_IPATH/ + echo DEBUG: FREERDP3_PATH=$FREERDP3_PATH/ + echo DEBUG: FREERDP3_IPATH=$FREERDP3_IPATH/ + echo DEBUG: WINPR3_PATH=$WINPR3_PATH/ + echo DEBUG: WINPR3_IPATH=$WINPR3_IPATH/ fi - if [ -n "$FREERDP2_PATH" -a -n "$FREERDP2_IPATH" -a -n "$WINPR2_PATH" -a -n "$WINPR2_IPATH" ]; then + if [ -n "$FREERDP3_PATH" -a -n "$FREERDP3_IPATH" -a -n "$WINPR3_PATH" -a -n "$WINPR3_IPATH" ]; then echo " ... found" fi - if [ "X" = "X$FREERDP2_PATH" -o "X" = "X$FREERDP2_IPATH" -o "X" = "X$WINPR2_PATH" -o "X" = "X$WINPR2_IPATH" ]; then + if [ "X" = "X$FREERDP3_PATH" -o "X" = "X$FREERDP3_IPATH" -o "X" = "X$WINPR3_PATH" -o "X" = "X$WINPR3_IPATH" ]; then echo " ... NOT found, module rdp disabled" - FREERDP2_PATH="" - FREERDP2_IPATH="" - WINPR2_PATH="" - WINPR2_IPATH="" + FREERDP3_PATH="" + FREERDP3_IPATH="" + WINPR3_PATH="" + WINPR3_IPATH="" fi echo "Checking for Mongodb (libmongoc-1.0.so, mongoc.h, libbson-1.0.so, bson.h) ..." @@ -1340,8 +1340,8 @@ if [ -n "$FIREBIRD_PATH" -o \ -n "$MYSQL_PATH" -o \ -n "$MCACHED_PATH" -o \ -n "$MONGOD_PATH" -o \ - -n "$FREERDP2_PATH" -o \ - -n "$WINPR2_PATH" -o \ + -n "$FREERDP3_PATH" -o \ + -n "$WINPR3_PATH" -o \ -n "$SMBC_PATH" \ ]; then if [ "$SYSS" = "Darwin" ] && [ ! -d "/lib" ]; then @@ -1425,11 +1425,11 @@ fi if [ -n "$BSON_PATH" ]; then XDEFINES="$XDEFINES -DLIBBSON" fi -if [ -n "$FREERDP2_PATH" ]; then - XDEFINES="$XDEFINES -DLIBFREERDP2" +if [ -n "$FREERDP3_PATH" ]; then + XDEFINES="$XDEFINES -DLIBFREERDP3" fi -if [ -n "$WINPR2_PATH" ]; then - XDEFINES="$XDEFINES -DLIBWINPR2" +if [ -n "$WINPR3_PATH" ]; then + XDEFINES="$XDEFINES -DLIBWINPR3" fi if [ -n "$SMBC_PATH" ]; then XDEFINES="$XDEFINES -DLIBSMBCLIENT" @@ -1457,8 +1457,8 @@ for i in $SSL_PATH \ $MCACHED_PATH \ $MONGODB_PATH \ $BSON_PATH \ - $FREERDP2_PATH \ - $WINPR2_PATH \ + $FREERDP3_PATH \ + $WINPR3_PATH \ $SMBC_PATH; do if [ "$OLDPATH" = "$i" ]; then OLDPATH="$i" @@ -1518,8 +1518,8 @@ fi if [ -n "$MONGODB_IPATH" ]; then XIPATHS="$XIPATHS -I$MONGODB_IPATH -I$BSON_IPATH" fi -if [ -n "$FREERDP2_IPATH" ]; then - XIPATHS="$XIPATHS -I$FREERDP2_IPATH -I$WINPR2_IPATH" +if [ -n "$FREERDP3_IPATH" ]; then + XIPATHS="$XIPATHS -I$FREERDP3_IPATH -I$WINPR3_IPATH" fi if [ -n "$SMBC_IPATH" ]; then XIPATHS="$XIPATHS -I$SMBC_IPATH" @@ -1599,11 +1599,11 @@ fi if [ -n "$BSON_PATH" ]; then XLIBS="$XLIBS -lbson-1.0" fi -if [ -n "$FREERDP2_PATH" ]; then - XLIBS="$XLIBS -lfreerdp2" +if [ -n "$FREERDP3_PATH" ]; then + XLIBS="$XLIBS -lfreerdp3" fi -if [ -n "$WINPR2_PATH" ]; then - XLIBS="$XLIBS -lwinpr2" +if [ -n "$WINPR3_PATH" ]; then + XLIBS="$XLIBS -lwinpr3" fi if [ -n "$SMBC_PATH" ]; then XLIBS="$XLIBS -lsmbclient" diff --git a/hydra-rdp.c b/hydra-rdp.c index bd333ce..25528e0 100644 --- a/hydra-rdp.c +++ b/hydra-rdp.c @@ -10,7 +10,7 @@ #include "hydra-mod.h" extern char *HYDRA_EXIT; -#ifndef LIBFREERDP2 +#ifndef LIBFREERDP3 void dummy_rdp() { printf("\n"); } #else diff --git a/hydra.c b/hydra.c index 5e1dd87..29f2097 100644 --- a/hydra.c +++ b/hydra.c @@ -117,7 +117,7 @@ extern int32_t service_oracle_sid_init(char *ip, int32_t sp, unsigned char optio extern void service_sip(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); extern int32_t service_sip_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); #endif -#ifdef LIBFREERDP2 +#ifdef LIBFREERDP3 extern void service_rdp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); extern int32_t service_rdp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); #endif @@ -426,7 +426,7 @@ static const struct { #endif SERVICE(redis), SERVICE(rexec), -#ifdef LIBFREERDP2 +#ifdef LIBFREERDP3 SERVICE3("rdp", rdp), #endif SERVICE(rlogin), @@ -2237,7 +2237,7 @@ int main(int argc, char *argv[]) { strcat(unsupported, "SSL-services (ftps, sip, rdp, oracle-services, ...) "); #endif -#ifndef LIBFREERDP2 +#ifndef LIBFREERDP3 // for rdp SERVICES = hydra_string_replace(SERVICES, " rdp", ""); #endif @@ -2905,8 +2905,8 @@ int main(int argc, char *argv[]) { } if (strcmp(hydra_options.service, "rdp") == 0) { -#ifndef LIBFREERDP2 - bail("Compiled without FREERDP2 support, module not available!"); +#ifndef LIBFREERDP3 + bail("Compiled without FREERDP3 support, module not available!"); #endif } if (strcmp(hydra_options.service, "pcnfs") == 0) { From b0c1a9d1deaf522063564b3e3540a20035ce6510 Mon Sep 17 00:00:00 2001 From: Henry Robalino Date: Mon, 8 Jun 2020 09:24:16 -0400 Subject: [PATCH 298/531] Updated version of freerdp lib supported to 3.0 --- hydra-rdp.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-rdp.c b/hydra-rdp.c index 25528e0..89245f3 100644 --- a/hydra-rdp.c +++ b/hydra-rdp.c @@ -1,5 +1,5 @@ /* - This module is using freerdp2 lib + This module is using freerdp3 lib Tested on: - Windows 7 pro SP1 From 09a247412bb1ad6853038462285b6b3e090dcb96 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Wed, 10 Jun 2020 10:17:40 +0200 Subject: [PATCH 299/531] compiler option change --- Makefile.am | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Makefile.am b/Makefile.am index 49e8476..9d349c2 100644 --- a/Makefile.am +++ b/Makefile.am @@ -3,7 +3,7 @@ # WARN_CLANG=-Wformat-nonliteral -Wstrncat-size -Wformat-security -Wsign-conversion -Wconversion -Wfloat-conversion -Wshorten-64-to-32 -Wuninitialized -Wmissing-variable-declarations -Wmissing-declarations WARN_GCC=-Wformat=2 -Wformat-overflow=2 -Wformat-nonliteral -Wformat-truncation=2 -Wnull-dereference -Wstrict-overflow=2 -Wstringop-overflow=4 -Walloca-larger-than=4096 -Wtype-limits -Wconversion -Wtrampolines -Wstrict-prototypes -Wmissing-prototypes -Wmissing-declarations -fno-common -Wcast-align -CFLAGS ?= -march=native -flto +CFLAGS ?= -g OPTS=-I. -O3 $(CFLAGS) -fcommon # -Wall -g -pedantic LIBS=-lm From bc6e8aec416ac29bd9ff23fd7486576f4cec44c0 Mon Sep 17 00:00:00 2001 From: Henry Robalino Date: Fri, 12 Jun 2020 11:19:01 -0400 Subject: [PATCH 300/531] Adding support to check for freerdp2 and freerdp3 Adding logic to check for freerdp2 first and if not the rdp module will check for freerdp3 to support the rdp module --- configure | 90 +++++++++++++++++++++++++++++++++++++++++++++++++---- hydra-rdp.c | 2 +- hydra.c | 11 ++++--- 3 files changed, 92 insertions(+), 11 deletions(-) diff --git a/configure b/configure index 7849a7d..add5ca6 100755 --- a/configure +++ b/configure @@ -70,6 +70,8 @@ NSL_PATH="" SOCKET_PATH="" MANDIR="" XHYDRA_SUPPORT="" +FREERDP2_PATH="" +WINPR2_PATH="" FREERDP3_PATH="" WINPR3_PATH="" SMBC_PATH="" @@ -1017,16 +1019,92 @@ fi MCACHED_IPATH="" fi +echo "Checking for Freerdp..." +echo "Checking for Freerdp2 (libfreerdp2.so, freerdp/*.h, libwinpr2.so, winpr/*.h) ..." + +#Checking Freerdp2 + + for i in $LIBDIRS ; do + if [ "X" = "X$FREERDP2_PATH" ]; then + if [ -f "$i/libfreerdp2.so" -o -f "$i/libfreerdp2.dylib" -o -f "$i/libfreerdp2.a" -o -f "$i/libfreerdp2.dll.a" ]; then + FREERDP2_PATH="$i" + fi + fi + if [ "X" = "X$FREERDP2_PATH" ]; then + TMP_LIB=`/bin/ls $i/libfreerdp2*.so* 2> /dev/null | grep libfreerdp2` + if [ -n "$TMP_LIB" ]; then + FREERDP2_PATH="$i" + fi + fi + done + + FREERDP2_IPATH= + for i in $INCDIRS ; do + if [ "X" = "X$FREERDP2_IPATH" ]; then + if [ -f "$i/freerdp/freerdp.h" ]; then + FREERDP2_IPATH="$i/freerdp2" + fi + if [ -f "$i/freerdp2/freerdp/freerdp.h" ]; then + FREERDP2_IPATH="$i/freerdp2" + fi + fi + done + + for i in $LIBDIRS ; do + if [ "X" = "X$WINPR2_PATH" ]; then + if [ -f "$i/libwinpr2.so" -o -f "$i/libwinpr2.dylib" -o -f "$i/libwinpr2.a" ]; then + WINPR2_PATH="$i" + fi + fi + if [ "X" = "X$WINPR2_PATH" ]; then + TMP_LIB=`/bin/ls $i/libwinpr2.dll.a 2> /dev/null | grep winpr` + if [ -n "$TMP_LIB" ]; then + WINPR2_PATH="$i" + fi + fi + done + + WINPR2_IPATH= + for i in $INCDIRS ; do + if [ "X" = "X$WINPR2_IPATH" ]; then + if [ -f "$i/winpr.h" ]; then + WINPR2_IPATH="$i" + fi + if [ -f "$i/winpr2/winpr/winpr.h" ]; then + WINPR2_IPATH="$i/winpr2" + fi + fi + done + +if [ "X" != "X$DEBUG" ]; then + echo DEBUG: FREERDP2_PATH=$FREERDP2_PATH/ + echo DEBUG: FREERDP2_IPATH=$FREERDP2_IPATH/ + echo DEBUG: WINPR2_PATH=$WINPR2_PATH/ + echo DEBUG: WINPR2_IPATH=$WINPR2_IPATH/ +fi + + if [ -n "$FREERDP2_PATH" -a -n "$FREERDP2_IPATH" -a -n "$WINPR2_PATH" -a -n "$WINPR2_IPATH" ]; then + echo " ... found" + fi + if [ "X" = "X$FREERDP2_PATH" -o "X" = "X$FREERDP2_IPATH" -o "X" = "X$WINPR2_PATH" -o "X" = "X$WINPR2_IPATH" ]; then + echo " ... NOT found, checking freerdp3 module next..." + FREERDP2_PATH="" + FREERDP2_IPATH="" + WINPR2_PATH="" + WINPR2_IPATH="" + fi + +#Checking Freerdp3 echo "Checking for Freerdp3 (libfreerdp3.so, freerdp/*.h, libwinpr3.so, winpr/*.h) ..." for i in $LIBDIRS ; do - if [ "X" = "X$FREERDP3_PATH" ]; then + if [ "X" = "X$FREERDP2_PATH" && "X" = "X$FREERDP3_PATH" ]; then if [ -f "$i/libfreerdp3.so" -o -f "$i/libfreerdp3.dylib" -o -f "$i/libfreerdp3.a" -o -f "$i/libfreerdp3.dll.a" ]; then FREERDP3_PATH="$i" fi fi - if [ "X" = "X$FREERDP3_PATH" ]; then + if [ "X" = "X$FREERDP2_PATH" && "X" = "X$FREERDP3_PATH" ]; then TMP_LIB=`/bin/ls $i/libfreerdp3*.so* 2> /dev/null | grep libfreerdp3` if [ -n "$TMP_LIB" ]; then FREERDP3_PATH="$i" @@ -1036,7 +1114,7 @@ echo "Checking for Freerdp3 (libfreerdp3.so, freerdp/*.h, libwinpr3.so, winpr/*. FREERDP3_IPATH= for i in $INCDIRS ; do - if [ "X" = "X$FREERDP3_IPATH" ]; then + if [ "X" = "X$FREERDP2_IPATH" && "X" = "X$FREERDP3_IPATH" ]; then if [ -f "$i/freerdp/freerdp.h" ]; then FREERDP3_IPATH="$i/freerdp3" fi @@ -1047,12 +1125,12 @@ echo "Checking for Freerdp3 (libfreerdp3.so, freerdp/*.h, libwinpr3.so, winpr/*. done for i in $LIBDIRS ; do - if [ "X" = "X$WINPR3_PATH" ]; then + if [ "X" = "X$WINPR2_PATH" && "X" = "X$WINPR3_PATH" ]; then if [ -f "$i/libwinpr3.so" -o -f "$i/libwinpr3.dylib" -o -f "$i/libwinpr3.a" ]; then WINPR3_PATH="$i" fi fi - if [ "X" = "X$WINPR3_PATH" ]; then + if [ "X" = "X$WINPR2_PATH" && "X" = "X$WINPR3_PATH" ]; then TMP_LIB=`/bin/ls $i/libwinpr3.dll.a 2> /dev/null | grep winpr` if [ -n "$TMP_LIB" ]; then WINPR3_PATH="$i" @@ -1062,7 +1140,7 @@ echo "Checking for Freerdp3 (libfreerdp3.so, freerdp/*.h, libwinpr3.so, winpr/*. WINPR3_IPATH= for i in $INCDIRS ; do - if [ "X" = "X$WINPR3_IPATH" ]; then + if [ "X" = "X$WINPR2_IPATH" && "X" = "X$WINPR3_IPATH" ]; then if [ -f "$i/winpr.h" ]; then WINPR3_IPATH="$i" fi diff --git a/hydra-rdp.c b/hydra-rdp.c index 89245f3..282846d 100644 --- a/hydra-rdp.c +++ b/hydra-rdp.c @@ -10,7 +10,7 @@ #include "hydra-mod.h" extern char *HYDRA_EXIT; -#ifndef LIBFREERDP3 +#if !defined(LIBFREERDP2) || (LIBFREERDP3) void dummy_rdp() { printf("\n"); } #else diff --git a/hydra.c b/hydra.c index 29f2097..9d1ba88 100644 --- a/hydra.c +++ b/hydra.c @@ -117,7 +117,7 @@ extern int32_t service_oracle_sid_init(char *ip, int32_t sp, unsigned char optio extern void service_sip(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); extern int32_t service_sip_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); #endif -#ifdef LIBFREERDP3 +#if defined(LIBFREERDP2) || (LIBFREERDP3) extern void service_rdp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); extern int32_t service_rdp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); #endif @@ -426,7 +426,7 @@ static const struct { #endif SERVICE(redis), SERVICE(rexec), -#ifdef LIBFREERDP3 +#if defined(LIBFREERDP2) || (LIBFREERDP3) SERVICE3("rdp", rdp), #endif SERVICE(rlogin), @@ -2237,7 +2237,7 @@ int main(int argc, char *argv[]) { strcat(unsupported, "SSL-services (ftps, sip, rdp, oracle-services, ...) "); #endif -#ifndef LIBFREERDP3 +#if !defined(LIBFREERDP2) || (LIBFREERDP3) // for rdp SERVICES = hydra_string_replace(SERVICES, " rdp", ""); #endif @@ -2905,7 +2905,10 @@ int main(int argc, char *argv[]) { } if (strcmp(hydra_options.service, "rdp") == 0) { -#ifndef LIBFREERDP3 +#if !defined(LIBFREERDP2)|| (LIBFREERDP3) + if(!LIBFREERDP2) + bail("Compiled without FREERDP2 support, module not available!"); + else bail("Compiled without FREERDP3 support, module not available!"); #endif } From fdc460c7fb6e03f0aeb33fd123c5658312552e85 Mon Sep 17 00:00:00 2001 From: Henry Robalino Date: Fri, 12 Jun 2020 11:32:25 -0400 Subject: [PATCH 301/531] Fixing logic issue with hydra.c file Did not do proper check for freerdp2 or freerdp3 modules --- hydra.c | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/hydra.c b/hydra.c index 9d1ba88..db7837d 100644 --- a/hydra.c +++ b/hydra.c @@ -2906,10 +2906,7 @@ int main(int argc, char *argv[]) { if (strcmp(hydra_options.service, "rdp") == 0) { #if !defined(LIBFREERDP2)|| (LIBFREERDP3) - if(!LIBFREERDP2) - bail("Compiled without FREERDP2 support, module not available!"); - else - bail("Compiled without FREERDP3 support, module not available!"); + bail("Compiled without FREERDP2 or FREERDP3 support, modules not available!"); #endif } if (strcmp(hydra_options.service, "pcnfs") == 0) { From 70fb9e4fa57fd054efd7728b58800f7786f805da Mon Sep 17 00:00:00 2001 From: Henry Robalino Date: Fri, 12 Jun 2020 12:11:03 -0400 Subject: [PATCH 302/531] Fixing logic that checks for rdp libraries Fixed logic inside of configure to properly check for freedrdp2 if not found check for freerdp3, if found to skip freerdp3 --- configure | 17 ++++++----------- 1 file changed, 6 insertions(+), 11 deletions(-) diff --git a/configure b/configure index add5ca6..7950afe 100755 --- a/configure +++ b/configure @@ -1019,11 +1019,8 @@ fi MCACHED_IPATH="" fi -echo "Checking for Freerdp..." echo "Checking for Freerdp2 (libfreerdp2.so, freerdp/*.h, libwinpr2.so, winpr/*.h) ..." -#Checking Freerdp2 - for i in $LIBDIRS ; do if [ "X" = "X$FREERDP2_PATH" ]; then if [ -f "$i/libfreerdp2.so" -o -f "$i/libfreerdp2.dylib" -o -f "$i/libfreerdp2.a" -o -f "$i/libfreerdp2.dll.a" ]; then @@ -1094,17 +1091,15 @@ fi WINPR2_IPATH="" fi -#Checking Freerdp3 - echo "Checking for Freerdp3 (libfreerdp3.so, freerdp/*.h, libwinpr3.so, winpr/*.h) ..." for i in $LIBDIRS ; do - if [ "X" = "X$FREERDP2_PATH" && "X" = "X$FREERDP3_PATH" ]; then + if [ "X" = "X$FREERDP2_PATH" ] && [ "X" = "X$FREERDP3_PATH" ]; then if [ -f "$i/libfreerdp3.so" -o -f "$i/libfreerdp3.dylib" -o -f "$i/libfreerdp3.a" -o -f "$i/libfreerdp3.dll.a" ]; then FREERDP3_PATH="$i" fi fi - if [ "X" = "X$FREERDP2_PATH" && "X" = "X$FREERDP3_PATH" ]; then + if [ "X" = "X$FREERDP2_PATH" ] && [ "X" = "X$FREERDP3_PATH" ]; then TMP_LIB=`/bin/ls $i/libfreerdp3*.so* 2> /dev/null | grep libfreerdp3` if [ -n "$TMP_LIB" ]; then FREERDP3_PATH="$i" @@ -1114,7 +1109,7 @@ echo "Checking for Freerdp3 (libfreerdp3.so, freerdp/*.h, libwinpr3.so, winpr/*. FREERDP3_IPATH= for i in $INCDIRS ; do - if [ "X" = "X$FREERDP2_IPATH" && "X" = "X$FREERDP3_IPATH" ]; then + if [ "X" = "X$FREERDP2_IPATH" ] && [ "X" = "X$FREERDP3_IPATH" ]; then if [ -f "$i/freerdp/freerdp.h" ]; then FREERDP3_IPATH="$i/freerdp3" fi @@ -1125,12 +1120,12 @@ echo "Checking for Freerdp3 (libfreerdp3.so, freerdp/*.h, libwinpr3.so, winpr/*. done for i in $LIBDIRS ; do - if [ "X" = "X$WINPR2_PATH" && "X" = "X$WINPR3_PATH" ]; then + if [ "X" = "X$WINPR2_PATH" ] && [ "X" = "X$WINPR3_PATH" ]; then if [ -f "$i/libwinpr3.so" -o -f "$i/libwinpr3.dylib" -o -f "$i/libwinpr3.a" ]; then WINPR3_PATH="$i" fi fi - if [ "X" = "X$WINPR2_PATH" && "X" = "X$WINPR3_PATH" ]; then + if [ "X" = "X$WINPR2_PATH" ] && [ "X" = "X$WINPR3_PATH" ]; then TMP_LIB=`/bin/ls $i/libwinpr3.dll.a 2> /dev/null | grep winpr` if [ -n "$TMP_LIB" ]; then WINPR3_PATH="$i" @@ -1140,7 +1135,7 @@ echo "Checking for Freerdp3 (libfreerdp3.so, freerdp/*.h, libwinpr3.so, winpr/*. WINPR3_IPATH= for i in $INCDIRS ; do - if [ "X" = "X$WINPR2_IPATH" && "X" = "X$WINPR3_IPATH" ]; then + if [ "X" = "X$WINPR2_IPATH" ] && [ "X" = "X$WINPR3_IPATH" ]; then if [ -f "$i/winpr.h" ]; then WINPR3_IPATH="$i" fi From 9c300ea820946e706a70f6994245a8485dedea72 Mon Sep 17 00:00:00 2001 From: Henry Robalino Date: Mon, 15 Jun 2020 15:51:22 -0400 Subject: [PATCH 303/531] Refactoring libfreerdp Removing double entry of libfreerdp in hydra.c and hydra-rdp.c --- hydra-rdp.c | 2 +- hydra.c | 10 +++++----- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/hydra-rdp.c b/hydra-rdp.c index 282846d..6a000a4 100644 --- a/hydra-rdp.c +++ b/hydra-rdp.c @@ -10,7 +10,7 @@ #include "hydra-mod.h" extern char *HYDRA_EXIT; -#if !defined(LIBFREERDP2) || (LIBFREERDP3) +#ifndef LIBFREERDP void dummy_rdp() { printf("\n"); } #else diff --git a/hydra.c b/hydra.c index db7837d..aa7f9ee 100644 --- a/hydra.c +++ b/hydra.c @@ -117,7 +117,7 @@ extern int32_t service_oracle_sid_init(char *ip, int32_t sp, unsigned char optio extern void service_sip(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); extern int32_t service_sip_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); #endif -#if defined(LIBFREERDP2) || (LIBFREERDP3) +#ifdef LIBFREERDP extern void service_rdp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); extern int32_t service_rdp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); #endif @@ -426,7 +426,7 @@ static const struct { #endif SERVICE(redis), SERVICE(rexec), -#if defined(LIBFREERDP2) || (LIBFREERDP3) +#ifdef LIBFREERDP SERVICE3("rdp", rdp), #endif SERVICE(rlogin), @@ -2237,7 +2237,7 @@ int main(int argc, char *argv[]) { strcat(unsupported, "SSL-services (ftps, sip, rdp, oracle-services, ...) "); #endif -#if !defined(LIBFREERDP2) || (LIBFREERDP3) +#ifndef LIBFREERDP // for rdp SERVICES = hydra_string_replace(SERVICES, " rdp", ""); #endif @@ -2905,8 +2905,8 @@ int main(int argc, char *argv[]) { } if (strcmp(hydra_options.service, "rdp") == 0) { -#if !defined(LIBFREERDP2)|| (LIBFREERDP3) - bail("Compiled without FREERDP2 or FREERDP3 support, modules not available!"); +#ifndef LIBFREERDP + bail("Compiled without FREERDP support, modules not available!"); #endif } if (strcmp(hydra_options.service, "pcnfs") == 0) { From 54dd5667ff72d76d770dbc65472850fb090efb14 Mon Sep 17 00:00:00 2001 From: Henry Robalino Date: Tue, 16 Jun 2020 09:53:24 -0400 Subject: [PATCH 304/531] Fixing XDEFINES Trying to fix defines for freerdp --- configure | 21 ++++++++++++++++++++- 1 file changed, 20 insertions(+), 1 deletion(-) diff --git a/configure b/configure index 7950afe..5e58161 100755 --- a/configure +++ b/configure @@ -1413,6 +1413,8 @@ if [ -n "$FIREBIRD_PATH" -o \ -n "$MYSQL_PATH" -o \ -n "$MCACHED_PATH" -o \ -n "$MONGOD_PATH" -o \ + -n "$FREERDP2_PATH" -o \ + -n "$WINPR2_PATH" -o \ -n "$FREERDP3_PATH" -o \ -n "$WINPR3_PATH" -o \ -n "$SMBC_PATH" \ @@ -1498,8 +1500,14 @@ fi if [ -n "$BSON_PATH" ]; then XDEFINES="$XDEFINES -DLIBBSON" fi +if [ -n "$FREERDP2_PATH" ]; then + XDEFINES="$XDEFINES -DLIBFREERDP" +fi +if [ -n "$WINPR2_PATH" ]; then + XDEFINES="$XDEFINES -DLIBWINPR2" +fi if [ -n "$FREERDP3_PATH" ]; then - XDEFINES="$XDEFINES -DLIBFREERDP3" + XDEFINES="$XDEFINES -DLIBFREERDP" fi if [ -n "$WINPR3_PATH" ]; then XDEFINES="$XDEFINES -DLIBWINPR3" @@ -1530,6 +1538,8 @@ for i in $SSL_PATH \ $MCACHED_PATH \ $MONGODB_PATH \ $BSON_PATH \ + $FREERDP2_PATH \ + $WINPR2_PATH \ $FREERDP3_PATH \ $WINPR3_PATH \ $SMBC_PATH; do @@ -1591,6 +1601,9 @@ fi if [ -n "$MONGODB_IPATH" ]; then XIPATHS="$XIPATHS -I$MONGODB_IPATH -I$BSON_IPATH" fi +if [ -n "$FREERDP3_IPATH" ]; then + XIPATHS="$XIPATHS -I$FREERDP2_IPATH -I$WINPR2_IPATH" +fi if [ -n "$FREERDP3_IPATH" ]; then XIPATHS="$XIPATHS -I$FREERDP3_IPATH -I$WINPR3_IPATH" fi @@ -1672,6 +1685,12 @@ fi if [ -n "$BSON_PATH" ]; then XLIBS="$XLIBS -lbson-1.0" fi +if [ -n "$FREERDP3_PATH" ]; then + XLIBS="$XLIBS -lfreerdp2" +fi +if [ -n "$WINPR3_PATH" ]; then + XLIBS="$XLIBS -lwinpr2" +fi if [ -n "$FREERDP3_PATH" ]; then XLIBS="$XLIBS -lfreerdp3" fi From f5b3fe77d386c5f323e2ec6bbf77cf5960730fda Mon Sep 17 00:00:00 2001 From: Henry Robalino Date: Tue, 16 Jun 2020 09:56:11 -0400 Subject: [PATCH 305/531] Fixing typo on xlibs path --- configure | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/configure b/configure index 5e58161..67b968c 100755 --- a/configure +++ b/configure @@ -1685,10 +1685,10 @@ fi if [ -n "$BSON_PATH" ]; then XLIBS="$XLIBS -lbson-1.0" fi -if [ -n "$FREERDP3_PATH" ]; then +if [ -n "$FREERDP2_PATH" ]; then XLIBS="$XLIBS -lfreerdp2" fi -if [ -n "$WINPR3_PATH" ]; then +if [ -n "$WINPR2_PATH" ]; then XLIBS="$XLIBS -lwinpr2" fi if [ -n "$FREERDP3_PATH" ]; then From 435ed442897879ffcaa32baad44e3049ff418a18 Mon Sep 17 00:00:00 2001 From: Henry Robalino Date: Tue, 16 Jun 2020 10:19:16 -0400 Subject: [PATCH 306/531] Adding step to makefile to fix Lib Symlinks --- Makefile.am | 1 + 1 file changed, 1 insertion(+) diff --git a/Makefile.am b/Makefile.am index 49e8476..111cd88 100644 --- a/Makefile.am +++ b/Makefile.am @@ -78,6 +78,7 @@ install: strip -cp -f *.csv $(DESTDIR)$(PREFIX)$(DATADIR) -mkdir -p $(DESTDIR)$(PREFIX)$(MANDIR) -cp -f hydra.1 xhydra.1 pw-inspector.1 $(DESTDIR)$(PREFIX)$(MANDIR) + -ldconfig clean: rm -rf xhydra pw-inspector hydra *.o core *.core *.stackdump *~ Makefile.in Makefile dev_rfc hydra.restore arm/*.ipk arm/ipkg/usr/bin/* hydra-gtk/src/*.o hydra-gtk/src/xhydra hydra-gtk/stamp-h hydra-gtk/config.status hydra-gtk/errors hydra-gtk/config.log hydra-gtk/src/.deps hydra-gtk/src/Makefile hydra-gtk/Makefile From 11a96e5d32eaa974b164aa80f15e775e47a851b0 Mon Sep 17 00:00:00 2001 From: Karim Kanso Date: Thu, 25 Jun 2020 20:21:16 +0100 Subject: [PATCH 307/531] oracle: add success condition and fix skipped tries --- hydra-oracle.c | 38 ++++++++++++++++++++------------------ 1 file changed, 20 insertions(+), 18 deletions(-) diff --git a/hydra-oracle.c b/hydra-oracle.c index e132b81..5f1788e 100644 --- a/hydra-oracle.c +++ b/hydra-oracle.c @@ -19,6 +19,7 @@ void dummy_oracle() { printf("\n"); } #include #include +#include extern char *HYDRA_EXIT; @@ -84,7 +85,9 @@ int32_t start_oracle(int32_t s, char *ip, int32_t port, unsigned char options, c return 4; } + bool success = true; if (OCILogon(o_environment, o_error, &o_servicecontext, (const OraText *)login, strlen(login), (const OraText *)pass, strlen(pass), (const OraText *)buffer, strlen(buffer))) { + success = false; OCIErrorGet(o_error, 1, NULL, &o_errorcode, o_errormsg, sizeof(o_errormsg), OCI_HTYPE_ERROR); // database: oracle_error: ORA-01017: invalid username/password; logon // denied database: oracle_error: ORA-12514: TNS:listener does not currently @@ -107,31 +110,26 @@ int32_t start_oracle(int32_t s, char *ip, int32_t port, unsigned char options, c return 3; return 2; } - - if (o_error) { - OCIHandleFree((dvoid *)o_error, OCI_HTYPE_ERROR); + // ORA-28002: the password will expire within 7 days + if (strstr((const char *)o_errormsg, "ORA-28002") != NULL) { + hydra_report(stderr, "[INFO] ORACLE account %s password will expire soon.\n", login); + success = true; } + } - hydra_completed_pair(); - // by default, set in sqlnet.ora, the trace file is generated in pwd to log - // any errors happening, as we don't care, we are deleting the file set - // these parameters to not generate the file LOG_DIRECTORY_CLIENT = - // /dev/null LOG_FILE_CLIENT = /dev/null - - if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) - return 3; - return 2; - } else { + if (success) { OCILogoff(o_servicecontext, o_error); - if (o_error) { - OCIHandleFree((dvoid *)o_error, OCI_HTYPE_ERROR); - } hydra_report_found_host(port, ip, "oracle", fp); hydra_completed_pair_found(); + } else { + hydra_completed_pair(); + } + if (o_error) { + OCIHandleFree((dvoid *)o_error, OCI_HTYPE_ERROR); } if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) return 3; - return 1; + return success ? 1 : 2; } void service_oracle(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { @@ -167,11 +165,15 @@ void service_oracle(char *ip, int32_t sp, unsigned char options, char *miscptr, break; case 2: next_run = start_oracle(sock, ip, port, options, miscptr, fp); - hydra_child_exit(0); break; case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); + + // by default, set in sqlnet.ora, the trace file is generated in pwd to log + // any errors happening, as we don't care, we are deleting the file set + // these parameters to not generate the file LOG_DIRECTORY_CLIENT = + // /dev/null LOG_FILE_CLIENT = /dev/null unlink("sqlnet.log"); hydra_child_exit(0); return; From 62f06dce245d8df65e9a41c398f91224d0b073d1 Mon Sep 17 00:00:00 2001 From: Jonathan Hodgson Date: Fri, 26 Jun 2020 11:49:18 +0100 Subject: [PATCH 308/531] Usage: Fix help for https-post-form and https-get-form Fixes issue #530 --- hydra.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/hydra.c b/hydra.c index 5e1dd87..2883b2f 100644 --- a/hydra.c +++ b/hydra.c @@ -619,6 +619,10 @@ void module_usage() { "%s:\n================================================================" "============\n", hydra_options.service); + if (strcmp(hydra_options.service, "https-post-form") == 0) + strcpy(hydra_options.service, "http-post-form"); + else if (strcmp(hydra_options.service, "https-get-form") == 0) + strcpy(hydra_options.service, "http-get-form"); for (i = 0; i < sizeof(services) / sizeof(services[0]); i++) { if (strcmp(hydra_options.service, services[i].name) == 0) { if (services[i].usage) { From 5ec8a3e5e9fcdd6b2389f00665d2d9a2115ac7c8 Mon Sep 17 00:00:00 2001 From: Jonathan Hodgson Date: Fri, 26 Jun 2020 15:31:20 +0100 Subject: [PATCH 309/531] Makes change work on any sting starting with https As per suggestion, the code now remvoes the 's' on any module starting with https- --- hydra.c | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/hydra.c b/hydra.c index 2883b2f..3eaefcc 100644 --- a/hydra.c +++ b/hydra.c @@ -619,10 +619,8 @@ void module_usage() { "%s:\n================================================================" "============\n", hydra_options.service); - if (strcmp(hydra_options.service, "https-post-form") == 0) - strcpy(hydra_options.service, "http-post-form"); - else if (strcmp(hydra_options.service, "https-get-form") == 0) - strcpy(hydra_options.service, "http-get-form"); + if (strncmp(hydra_options.service, "https-", 6) == 0 ) + memmove(hydra_options.service + 4, hydra_options.service + 5, strlen(hydra_options.service) - 4); for (i = 0; i < sizeof(services) / sizeof(services[0]); i++) { if (strcmp(hydra_options.service, services[i].name) == 0) { if (services[i].usage) { From fc196d7fc26469fd3b297abca23399727b0f4962 Mon Sep 17 00:00:00 2001 From: Henry Robalino Date: Tue, 7 Jul 2020 11:25:09 -0400 Subject: [PATCH 310/531] Updating freerdp logic to check v3 first Updating the logic here to check for freerdpv3 first and if found do not check for freerdpv2. Also fixed paths for freerdpv2 paths. Updated bash "or" to use "||" and "and" to use "&&" conditionals with proper POSIX specifications. --- configure | 298 +++++++++++++++++++++++++++--------------------------- 1 file changed, 150 insertions(+), 148 deletions(-) diff --git a/configure b/configure index 67b968c..709fb30 100755 --- a/configure +++ b/configure @@ -3,7 +3,7 @@ # uname -s = Linux | OpenBSD | FreeBSD | Darwin # uname -m = i636 or x86_64 -if [ "$1" = "-h" -o "$1" = "--help" ]; then +if [ "$1" = "-h" || "$1" = "--help" ]; then echo Options: echo " --prefix=path path to install hydra and its datafiles to" echo " --fhs install according to the File System Hierarchy Standard" @@ -198,7 +198,7 @@ else /*ssl/lib /usr/*ssl/lib /opt/*ssl/lib /usr/local/*ssl/lib /opt/local/*ssl/lib do if [ "X" = "X$SSL_PATH" ]; then - if [ -f "$i/libssl.so" -o -f "$i/libssl.dylib" -o -f "$i/libssl.a" ]; then + if [ -f "$i/libssl.so" || -f "$i/libssl.dylib" || -f "$i/libssl.a" ]; then SSL_PATH="$i" fi fi @@ -209,7 +209,7 @@ else fi fi if [ "X" = "X$CRYPTO_PATH" ]; then - if [ -f "$i/libcrypto.so" -o -f "$i/libcrypto.dylib" -o -f "$i/libcrypto.a" ]; then + if [ -f "$i/libcrypto.so" || -f "$i/libcrypto.dylib" || -f "$i/libcrypto.a" ]; then CRYPTO_PATH="$i" fi fi @@ -251,11 +251,11 @@ if [ "X" = "X$SSL_IPATH" ]; then SSL_PATH="" CRYPTO_PATH="" fi -if [ -n "$SSL_PATH" -a "X" = "X$SSLNEW" ]; then +if [ -n "$SSL_PATH" && "X" = "X$SSLNEW" ]; then echo " ... found but OLD" echo "NOTE: your OpenSSL package is outdated, update it!" fi -if [ -n "$SSL_PATH" -a '!' "X" = "X$SSLNEW" ]; then +if [ -n "$SSL_PATH" && '!' "X" = "X$SSLNEW" ]; then echo " ... found" fi if [ "X" = "X$SSL_PATH" ]; then @@ -268,7 +268,7 @@ fi echo "Checking for gcrypt (libgcrypt.so, gpg-error.h) ..." for i in $LIBDIRS ; do - if [ -f "$i/libgcrypt.so" -o -f "$i/libgcrypt.dylib" -o -f "$i/libgcrypt.a" -o -f "$i/libgcrypt.dll.a" -o -f "$i/libgcrypt.la" ]; then + if [ -f "$i/libgcrypt.so" || -f "$i/libgcrypt.dylib" || -f "$i/libgcrypt.a" || -f "$i/libgcrypt.dll.a" || -f "$i/libgcrypt.la" ]; then HAVE_GCRYPT="y" fi done @@ -286,7 +286,7 @@ for i in $INCDIRS ; do fi done -if [ -n "$HAVE_GCRYPT" -a "X" != "X$GPGERROR_IPATH" ]; then +if [ -n "$HAVE_GCRYPT" && "X" != "X$GPGERROR_IPATH" ]; then echo " ... found" else echo " ... gcrypt not found, radmin2 module disabled" @@ -296,7 +296,7 @@ fi echo "Checking for idn (libidn.so) ..." for i in $LIBDIRS ; do if [ "X" = "X$IDN_PATH" ]; then - if [ -f "$i/libidn.so" -o -f "$i/libidn.dylib" -o -f "$i/libidn.a" -o -f "$i/libidn.dll.a" -o -f "$i/libidn.la" ]; then + if [ -f "$i/libidn.so" || -f "$i/libidn.dylib" || -f "$i/libidn.a" || -f "$i/libidn.dll.a" || -f "$i/libidn.la" ]; then IDN_PATH="$i" fi fi @@ -324,11 +324,11 @@ if [ "X" != "X$DEBUG" ]; then echo DEBUG: IDN_IPATH=$IDN_IPATH/stringprep.h echo DEBUG: PR29_IPATH=$PR29_IPATH/pr29.h fi -if [ -n "$IDN_PATH" -a -n "$IDN_IPATH" ]; then +if [ -n "$IDN_PATH" && -n "$IDN_IPATH" ]; then echo " ... found" fi #pr29 is optional -if [ "X" = "X$IDN_PATH" -o "X" = "X$IDN_IPATH" ]; then +if [ "X" = "X$IDN_PATH" || "X" = "X$IDN_IPATH" ]; then echo " ... NOT found, unicode logins and passwords will not be supported" IDN_PATH="" IDN_IPATH="" @@ -338,7 +338,7 @@ fi echo "Checking for curses (libcurses.so / term.h) ..." for i in $LIBDIRS; do if [ "X" = "X$CURSES_PATH" ]; then - if [ -f "$i/libcurses.so" -o -f "$i/libcurses.dylib" -o -f "$i/libcurses.a" ]; then + if [ -f "$i/libcurses.so" || -f "$i/libcurses.dylib" || -f "$i/libcurses.a" ]; then CURSES_PATH="$i" fi fi @@ -369,10 +369,10 @@ if [ "X" != "X$DEBUG" ]; then echo DEBUG: CURSES_PATH=$CURSES_PATH/libcurses echo DEBUG: CURSES_IPATH=$CURSES_IPATH/term.h fi -if [ -n "$CURSES_PATH" -a -n "$CURSES_IPATH" ]; then +if [ -n "$CURSES_PATH" && -n "$CURSES_IPATH" ]; then echo " ... found, color output enabled" fi -if [ "X" = "X$CURSES_PATH" -o "X" = "X$CURSES_IPATH" ]; then +if [ "X" = "X$CURSES_PATH" || "X" = "X$CURSES_IPATH" ]; then echo " ... NOT found, color output disabled" CURSES_PATH="" CURSES_IPATH="" @@ -381,7 +381,7 @@ fi echo "Checking for pcre (libpcre.so, pcre.h) ..." for i in $LIBDIRS ; do if [ "X" = "X$PCRE_PATH" ]; then - if [ -f "$i/libpcre.so" -o -f "$i/libpcre.dylib" -o -f "$i/libpcre.a" ]; then + if [ -f "$i/libpcre.so" || -f "$i/libpcre.dylib" || -f "$i/libpcre.a" ]; then PCRE_PATH="$i" fi fi @@ -409,10 +409,10 @@ if [ "X" != "X$DEBUG" ]; then echo DEBUG: PCRE_PATH=$PCRE_PATH/libpcre echo DEBUG: PCRE_IPATH=$PCRE_IPATH/pcre.h fi -if [ -n "$PCRE_PATH" -a -n "$PCRE_IPATH" ]; then +if [ -n "$PCRE_PATH" && -n "$PCRE_IPATH" ]; then echo " ... found" fi -if [ "X" = "X$PCRE_PATH" -o "X" = "X$PCRE_IPATH" ]; then +if [ "X" = "X$PCRE_PATH" || "X" = "X$PCRE_IPATH" ]; then echo " ... NOT found, server response checks will be less reliable" PCRE_PATH="" PCRE_IPATH="" @@ -426,7 +426,7 @@ echo "Checking for Postgres (libpq.so, libpq-fe.h) ..." #else for i in $LIBDIRS ; do if [ "X" = "X$POSTGRES_PATH" ]; then - if [ -f "$i/libpq.so" -o -f "$i/libpq.dylib" -o -f "$i/libpq.a" ]; then + if [ -f "$i/libpq.so" || -f "$i/libpq.dylib" || -f "$i/libpq.a" ]; then POSTGRES_PATH="$i" fi fi @@ -464,10 +464,10 @@ if [ "X" != "X$DEBUG" ]; then echo DEBUG: POSTGRES_PATH=$POSTGRES_PATH/libpq echo DEBUG: POSTGRES_IPATH=$POSTGRES_IPATH/libpq-fe.h fi - if [ -n "$POSTGRES_PATH" -a -n "$POSTGRES_IPATH" ]; then + if [ -n "$POSTGRES_PATH" && -n "$POSTGRES_IPATH" ]; then echo " ... found" fi - if [ "X" = "X$POSTGRES_PATH" -o "X" = "X$POSTGRES_IPATH" ]; then + if [ "X" = "X$POSTGRES_PATH" || "X" = "X$POSTGRES_IPATH" ]; then echo " ... NOT found, module postgres disabled" POSTGRES_PATH="" POSTGRES_IPATH="" @@ -482,7 +482,7 @@ for i in $LIBDIRS ; do fi fi if [ "X" = "X$APR_PATH" ]; then - if [ -f "$i/libapr-1.so" -a -f "$i/libaprutil-1.so" ]; then + if [ -f "$i/libapr-1.so" && -f "$i/libaprutil-1.so" ]; then APR_PATH="$i" fi fi @@ -492,7 +492,7 @@ for i in $LIBDIRS ; do fi fi if [ "X" = "X$APR_PATH" ]; then - if [ -f "$i/libapr-1.dll.a" -a -f "$i/libaprutil-1.dll.a" ]; then + if [ -f "$i/libapr-1.dll.a" && -f "$i/libaprutil-1.dll.a" ]; then APR_PATH="$i" fi fi @@ -502,7 +502,7 @@ for i in $LIBDIRS ; do fi fi if [ "X" = "X$APR_PATH" ]; then - if [ -f "$i/libapr-1.dylib" -a -f "$i/libaprutil-1.dylib" ]; then + if [ -f "$i/libapr-1.dylib" && -f "$i/libaprutil-1.dylib" ]; then APR_PATH="$i" fi fi @@ -512,7 +512,7 @@ for i in $LIBDIRS ; do fi fi if [ "X" = "X$APR_PATH" ]; then - if [ -f "$i/libapr-1.a" -a -f "$i/libaprutil-1.a" ]; then + if [ -f "$i/libapr-1.a" && -f "$i/libaprutil-1.a" ]; then APR_PATH="$i" fi fi @@ -522,7 +522,7 @@ for i in $LIBDIRS ; do fi fi if [ "X" = "X$APR_PATH" ]; then - if [ -f "$i/libapr-1.0.dylib" -a -f "$i/libaprutil-1.0.dylib" ]; then + if [ -f "$i/libapr-1.0.dylib" && -f "$i/libaprutil-1.0.dylib" ]; then APR_PATH="$i" fi fi @@ -535,7 +535,7 @@ for i in $LIBDIRS ; do if [ "X" = "X$APR_PATH" ]; then TMP_LIB2=`/bin/ls $i/libapr-1*.so* 2> /dev/null | grep libsvn_client.` TMP_LIB3=`/bin/ls $i/libaprutil-1*.so* 2> /dev/null | grep libsvn_client.` - if [ -n "$TMP_LIB2" -a -n "$TMP_LIB3" ]; then + if [ -n "$TMP_LIB2" && -n "$TMP_LIB3" ]; then APR_PATH="$i" fi fi @@ -548,7 +548,7 @@ for i in $LIBDIRS ; do if [ "X" = "X$APR_PATH" ]; then TMP_LIB2=`/bin/ls $i/libapr-1*.dll* 2> /dev/null | grep libsvn_client.` TMP_LIB3=`/bin/ls $i/libaprutil-1*.dll* 2> /dev/null | grep libsvn_client.` - if [ -n "$TMP_LIB2" -a -n "$TMP_LIB3" ]; then + if [ -n "$TMP_LIB2" && -n "$TMP_LIB3" ]; then APR_PATH="$i" fi fi @@ -585,7 +585,7 @@ if [ "X" != "X$DEBUG" ]; then echo DEBUG: APR_IPATH=$APR_IPATH/ fi -if [ "X" = "X$SVN_PATH" -o "X" = "X$SVN_IPATH" -o "X" = "X$APR_IPATH" ]; then +if [ "X" = "X$SVN_PATH" || "X" = "X$SVN_IPATH" || "X" = "X$APR_IPATH" ]; then SVN_PATH="" SVN_IPATH="" APR_IPATH="" @@ -597,17 +597,17 @@ if [ "$APR_IPATH" = "/usr/include" ]; then APR_IPATH="" fi -if [ -n "$SVN_PATH" -a -n "$APR_PATH" ]; then +if [ -n "$SVN_PATH" && -n "$APR_PATH" ]; then echo " ... found" fi -if [ "X" = "X$SVN_PATH" -o "X" = "X$APR_PATH" ]; then +if [ "X" = "X$SVN_PATH" || "X" = "X$APR_PATH" ]; then echo " ... NOT found, module svn disabled" fi echo "Checking for firebird (libfbclient.so) ..." for i in $LIBDIRS ; do if [ "X" = "X$FIREBIRD_PATH" ]; then - if [ -f "$i/libfbclient.so" -o -f "$i/libfbclient.dylib" -o -f "$i/libfbclient.a" ]; then + if [ -f "$i/libfbclient.so" || -f "$i/libfbclient.dylib" || -f "$i/libfbclient.a" ]; then FIREBIRD_PATH="$i" fi fi @@ -638,10 +638,10 @@ if [ "X" != "X$DEBUG" ]; then echo DEBUG: FIREBIRD_PATH=$FIREBIRD_PATH/libfbclient echo DEBUG: FIREBIRD_IPATH=$FIREBIRD_IPATH/ibase.h fi -if [ -n "$FIREBIRD_PATH" -a -n "$FIREBIRD_IPATH" ]; then +if [ -n "$FIREBIRD_PATH" && -n "$FIREBIRD_IPATH" ]; then echo " ... found" fi -if [ "X" = "X$FIREBIRD_PATH" -o "X" = "X$FIREBIRD_IPATH" ]; then +if [ "X" = "X$FIREBIRD_PATH" || "X" = "X$FIREBIRD_IPATH" ]; then echo " ... NOT found, module firebird disabled" FIREBIRD_PATH="" FIREBIRD_IPATH="" @@ -650,7 +650,7 @@ fi echo "Checking for MYSQL client (libmysqlclient.so, math.h) ..." for i in $LIBDIRS ; do if [ "X" = "X$MYSQL_PATH" ]; then - if [ -f "$i/libmysqlclient.so" -o -f "$i/libmysqlclient.dylib" -o -f "$i/libmysqlclient.a" ]; then + if [ -f "$i/libmysqlclient.so" || -f "$i/libmysqlclient.dylib" || -f "$i/libmysqlclient.a" ]; then MYSQL_PATH="$i" fi fi @@ -686,7 +686,7 @@ fi MATH="" if [ -f "$SDK_PATH/usr/include/math.h" ]; then MATH="-DHAVE_MATH_H" - if [ -n "$MYSQL_PATH" -a -n "$MYSQL_IPATH" -a -n "$MATH" ]; then + if [ -n "$MYSQL_PATH" && -n "$MYSQL_IPATH" && -n "$MATH" ]; then echo " ... found" else echo " ... NOT found, module Mysql will not support version > 4.x" @@ -699,7 +699,7 @@ fi echo "Checking for AFP (libafpclient.so) ..." for i in $LIBDIRS ; do if [ "X" = "X$AFP_PATH" ]; then - if [ -f "$i/libafpclient.so" -o -f "$i/libafpclient.so" -o -f "$i/libafpclient.a" ]; then + if [ -f "$i/libafpclient.so" || -f "$i/libafpclient.so" || -f "$i/libafpclient.a" ]; then AFP_PATH="$i" fi fi @@ -727,10 +727,10 @@ if [ "X" != "X$DEBUG" ]; then echo DEBUG: AFP_PATH=$AFP_PATH/libafpclient echo DEBUG: AFP_IPATH=$AFP_IPATH/afp.h fi -if [ -n "$AFP_PATH" -a -n "$AFP_IPATH" ]; then +if [ -n "$AFP_PATH" && -n "$AFP_IPATH" ]; then echo " ... found" fi -if [ "X" = "X$AFP_PATH" -o "X" = "X$AFP_IPATH" ]; then +if [ "X" = "X$AFP_PATH" || "X" = "X$AFP_IPATH" ]; then echo " ... NOT found, module Apple Filing Protocol disabled - Apple sucks anyway" AFP_PATH="" AFP_IPATH="" @@ -739,7 +739,7 @@ fi echo "Checking for NCP (libncp.so / nwcalls.h) ..." for i in $LIBDIRS ; do if [ "X" = "X$NCP_PATH" ]; then - if [ -f "$i/libncp.so" -o -f "$i/libncp.dylib" -o -f "$i/libncp.a" ]; then + if [ -f "$i/libncp.so" || -f "$i/libncp.dylib" || -f "$i/libncp.a" ]; then NCP_PATH="$i" fi fi @@ -767,10 +767,10 @@ if [ "X" != "X$DEBUG" ]; then echo DEBUG: NCP_PATH=$NCP_PATH/libncp echo DEBUG: NCP_IPATH=$NCP_IPATH/ncp/nwcalls.h fi -if [ -n "$NCP_PATH" -a -n "$NCP_IPATH" ]; then +if [ -n "$NCP_PATH" && -n "$NCP_IPATH" ]; then echo " ... found" fi -if [ "X" = "X$NCP_PATH" -o "X" = "X$NCP_IPATH" ]; then +if [ "X" = "X$NCP_PATH" || "X" = "X$NCP_IPATH" ]; then echo " ... NOT found, module NCP disabled" NCP_PATH="" NCP_IPATH="" @@ -779,7 +779,7 @@ fi echo "Checking for SAP/R3 (librfc/saprfc.h) ..." for i in $LIBDIRS ; do if [ "X" = "X$SAPR3_PATH" ]; then - if [ -f "$i/librfc.a" -o -f "$i/librfc.dylib" -o "$i/librfc32.dll" ]; then + if [ -f "$i/librfc.a" || -f "$i/librfc.dylib" || "$i/librfc32.dll" ]; then SAPR3_PATH="$i" fi fi @@ -821,7 +821,7 @@ fi echo "Checking for libssh (libssh/libssh.h) ..." for i in $LIBDIRS ; do if [ "X" = "X$SSH_PATH" ]; then - if [ -f "$i/libssh.so" -o -f "$i/libssh.dylib" -o -f "$i/libssh.a" ]; then + if [ -f "$i/libssh.so" || -f "$i/libssh.dylib" || -f "$i/libssh.a" ]; then SSH_PATH="$i" fi fi @@ -882,22 +882,22 @@ fi for i in $LIBDIRS ; do if [ "X" = "X$ORACLE_PATH" ]; then - if [ -f "$i/libocci.so" -a -f "$i/libclntsh.so" ]; then + if [ -f "$i/libocci.so" && -f "$i/libclntsh.so" ]; then ORACLE_PATH="$i" fi fi if [ "X" = "X$ORACLE_PATH" ]; then - if [ -f "$i/libocci.dylib" -a -f "$i/libclntsh.dylib" ]; then + if [ -f "$i/libocci.dylib" && -f "$i/libclntsh.dylib" ]; then ORACLE_PATH="$i" fi fi if [ "X" = "X$ORACLE_PATH" ]; then - if [ -f "$i/libocci.a" -a -f "$i/libclntsh.a" ]; then + if [ -f "$i/libocci.a" && -f "$i/libclntsh.a" ]; then ORACLE_PATH="$i" fi fi if [ "X" = "X$ORACLE_PATH" ]; then - if [ -f "$i/liboci.a" -a -f "$i/oci.dll" ]; then + if [ -f "$i/liboci.a" && -f "$i/oci.dll" ]; then ORACLE_PATH="$i" fi fi @@ -924,11 +924,11 @@ if [ "X" != "X$DEBUG" ]; then echo DEBUG: ORACLE_PATH=$ORACLE_PATH/libocci fi #check for Kernel Asynchronous I/O (AIO) lib support, no need on Cygwin -if [ "X" != "X$ORACLE_PATH" -a "$SYSO" != "Cygwin" ]; then +if [ "X" != "X$ORACLE_PATH" && "$SYSO" != "Cygwin" ]; then LIBAIO="" for i in $LIBDIRS ; do if [ "X" = "X$LIBAIO" ]; then - if [ -f "$i/libaio.so" -o -f "$i/libaio.dylib" -o -f "$i/libaio.a" ]; then + if [ -f "$i/libaio.so" || -f "$i/libaio.dylib" || -f "$i/libaio.a" ]; then LIBAIO="$i" fi fi @@ -959,10 +959,10 @@ done if [ "X" != "X$DEBUG" ]; then echo DEBUG: ORACLE_IPATH=$ORACLE_IPATH/oci.h fi -if [ -n "$ORACLE_PATH" -a -n "$ORACLE_IPATH" ]; then +if [ -n "$ORACLE_PATH" && -n "$ORACLE_IPATH" ]; then echo " ... found" fi -if [ "X" = "X$ORACLE_PATH" -o "X" = "X$ORACLE_IPATH" ]; then +if [ "X" = "X$ORACLE_PATH" || "X" = "X$ORACLE_IPATH" ]; then echo " ... NOT found, module Oracle disabled" echo "Get basic and sdk package from http://www.oracle.com/technetwork/database/features/instant-client/index.html" ORACLE_PATH="" @@ -973,7 +973,7 @@ echo "Checking for Memcached (libmemcached.so, memcached.h) ..." for i in $LIBDIRS ; do if [ "X" = "X$MCACHED_PATH" ]; then - if [ -f "$i/libmemcached.so" -o -f "$i/libmemcached.dylib" -o -f "$i/libmemcached.a" ]; then + if [ -f "$i/libmemcached.so" || -f "$i/libmemcached.dylib" || -f "$i/libmemcached.a" ]; then MCACHED_PATH="$i" fi fi @@ -1010,96 +1010,24 @@ if [ "X" != "X$DEBUG" ]; then echo DEBUG: MCACHED_PATH=$MCACHED_PATH/libmemcached echo DEBUG: MCACHED_IPATH=$MCACHED_IPATH/memcached.h fi - if [ -n "$MCACHED_PATH" -a -n "$MCACHED_IPATH" ]; then + if [ -n "$MCACHED_PATH" && -n "$MCACHED_IPATH" ]; then echo " ... found" fi - if [ "X" = "X$MCACHED_PATH" -o "X" = "X$MCACHED_IPATH" ]; then + if [ "X" = "X$MCACHED_PATH" || "X" = "X$MCACHED_IPATH" ]; then echo " ... NOT found, module memcached disabled" MCACHED_PATH="" MCACHED_IPATH="" fi -echo "Checking for Freerdp2 (libfreerdp2.so, freerdp/*.h, libwinpr2.so, winpr/*.h) ..." - - for i in $LIBDIRS ; do - if [ "X" = "X$FREERDP2_PATH" ]; then - if [ -f "$i/libfreerdp2.so" -o -f "$i/libfreerdp2.dylib" -o -f "$i/libfreerdp2.a" -o -f "$i/libfreerdp2.dll.a" ]; then - FREERDP2_PATH="$i" - fi - fi - if [ "X" = "X$FREERDP2_PATH" ]; then - TMP_LIB=`/bin/ls $i/libfreerdp2*.so* 2> /dev/null | grep libfreerdp2` - if [ -n "$TMP_LIB" ]; then - FREERDP2_PATH="$i" - fi - fi - done - - FREERDP2_IPATH= - for i in $INCDIRS ; do - if [ "X" = "X$FREERDP2_IPATH" ]; then - if [ -f "$i/freerdp/freerdp.h" ]; then - FREERDP2_IPATH="$i/freerdp2" - fi - if [ -f "$i/freerdp2/freerdp/freerdp.h" ]; then - FREERDP2_IPATH="$i/freerdp2" - fi - fi - done - - for i in $LIBDIRS ; do - if [ "X" = "X$WINPR2_PATH" ]; then - if [ -f "$i/libwinpr2.so" -o -f "$i/libwinpr2.dylib" -o -f "$i/libwinpr2.a" ]; then - WINPR2_PATH="$i" - fi - fi - if [ "X" = "X$WINPR2_PATH" ]; then - TMP_LIB=`/bin/ls $i/libwinpr2.dll.a 2> /dev/null | grep winpr` - if [ -n "$TMP_LIB" ]; then - WINPR2_PATH="$i" - fi - fi - done - - WINPR2_IPATH= - for i in $INCDIRS ; do - if [ "X" = "X$WINPR2_IPATH" ]; then - if [ -f "$i/winpr.h" ]; then - WINPR2_IPATH="$i" - fi - if [ -f "$i/winpr2/winpr/winpr.h" ]; then - WINPR2_IPATH="$i/winpr2" - fi - fi - done - -if [ "X" != "X$DEBUG" ]; then - echo DEBUG: FREERDP2_PATH=$FREERDP2_PATH/ - echo DEBUG: FREERDP2_IPATH=$FREERDP2_IPATH/ - echo DEBUG: WINPR2_PATH=$WINPR2_PATH/ - echo DEBUG: WINPR2_IPATH=$WINPR2_IPATH/ -fi - - if [ -n "$FREERDP2_PATH" -a -n "$FREERDP2_IPATH" -a -n "$WINPR2_PATH" -a -n "$WINPR2_IPATH" ]; then - echo " ... found" - fi - if [ "X" = "X$FREERDP2_PATH" -o "X" = "X$FREERDP2_IPATH" -o "X" = "X$WINPR2_PATH" -o "X" = "X$WINPR2_IPATH" ]; then - echo " ... NOT found, checking freerdp3 module next..." - FREERDP2_PATH="" - FREERDP2_IPATH="" - WINPR2_PATH="" - WINPR2_IPATH="" - fi - echo "Checking for Freerdp3 (libfreerdp3.so, freerdp/*.h, libwinpr3.so, winpr/*.h) ..." for i in $LIBDIRS ; do - if [ "X" = "X$FREERDP2_PATH" ] && [ "X" = "X$FREERDP3_PATH" ]; then - if [ -f "$i/libfreerdp3.so" -o -f "$i/libfreerdp3.dylib" -o -f "$i/libfreerdp3.a" -o -f "$i/libfreerdp3.dll.a" ]; then + if [ "X" = "X$FREERDP3_PATH" ]; then + if [ -f "$i/libfreerdp3.so" || -f "$i/libfreerdp3.dylib" || -f "$i/libfreerdp3.a" || -f "$i/libfreerdp3.dll.a" ]; then FREERDP3_PATH="$i" fi fi - if [ "X" = "X$FREERDP2_PATH" ] && [ "X" = "X$FREERDP3_PATH" ]; then + if [ "X" = "X$FREERDP3_PATH" ]; then TMP_LIB=`/bin/ls $i/libfreerdp3*.so* 2> /dev/null | grep libfreerdp3` if [ -n "$TMP_LIB" ]; then FREERDP3_PATH="$i" @@ -1109,7 +1037,7 @@ echo "Checking for Freerdp3 (libfreerdp3.so, freerdp/*.h, libwinpr3.so, winpr/*. FREERDP3_IPATH= for i in $INCDIRS ; do - if [ "X" = "X$FREERDP2_IPATH" ] && [ "X" = "X$FREERDP3_IPATH" ]; then + if [ "X" = "X$FREERDP3_IPATH" ]; then if [ -f "$i/freerdp/freerdp.h" ]; then FREERDP3_IPATH="$i/freerdp3" fi @@ -1120,12 +1048,12 @@ echo "Checking for Freerdp3 (libfreerdp3.so, freerdp/*.h, libwinpr3.so, winpr/*. done for i in $LIBDIRS ; do - if [ "X" = "X$WINPR2_PATH" ] && [ "X" = "X$WINPR3_PATH" ]; then - if [ -f "$i/libwinpr3.so" -o -f "$i/libwinpr3.dylib" -o -f "$i/libwinpr3.a" ]; then + if [ "X" = "X$WINPR3_PATH" ]; then + if [ -f "$i/libwinpr3.so" || -f "$i/libwinpr3.dylib" || -f "$i/libwinpr3.a" ]; then WINPR3_PATH="$i" fi fi - if [ "X" = "X$WINPR2_PATH" ] && [ "X" = "X$WINPR3_PATH" ]; then + if [ "X" = "X$WINPR3_PATH" ]; then TMP_LIB=`/bin/ls $i/libwinpr3.dll.a 2> /dev/null | grep winpr` if [ -n "$TMP_LIB" ]; then WINPR3_PATH="$i" @@ -1135,7 +1063,7 @@ echo "Checking for Freerdp3 (libfreerdp3.so, freerdp/*.h, libwinpr3.so, winpr/*. WINPR3_IPATH= for i in $INCDIRS ; do - if [ "X" = "X$WINPR2_IPATH" ] && [ "X" = "X$WINPR3_IPATH" ]; then + if [ "X" = "X$WINPR3_IPATH" ]; then if [ -f "$i/winpr.h" ]; then WINPR3_IPATH="$i" fi @@ -1152,22 +1080,96 @@ if [ "X" != "X$DEBUG" ]; then echo DEBUG: WINPR3_IPATH=$WINPR3_IPATH/ fi - if [ -n "$FREERDP3_PATH" -a -n "$FREERDP3_IPATH" -a -n "$WINPR3_PATH" -a -n "$WINPR3_IPATH" ]; then + if [ -n "$FREERDP3_PATH" && -n "$FREERDP3_IPATH" && -n "$WINPR3_PATH" && -n "$WINPR3_IPATH" ]; then echo " ... found" fi - if [ "X" = "X$FREERDP3_PATH" -o "X" = "X$FREERDP3_IPATH" -o "X" = "X$WINPR3_PATH" -o "X" = "X$WINPR3_IPATH" ]; then - echo " ... NOT found, module rdp disabled" + if [ "X" = "X$FREERDP3_PATH" || "X" = "X$FREERDP3_IPATH" || "X" = "X$WINPR3_PATH" || "X" = "X$WINPR3_IPATH" ]; then + echo " ... NOT found, checking for freerdp2 module next..." FREERDP3_PATH="" FREERDP3_IPATH="" WINPR3_PATH="" WINPR3_IPATH="" fi +if ["X" != "X$FREERDP3_PATH" || "X" != "X$FREERDP3_IPATH" || "X" != "X$WINPR3_PATH" || "X" != "X$WINPR3_IPATH"]; then + echo "Checking for Freerdp2 (libfreerdp2.so, freerdp/*.h, libwinpr2.so, winpr/*.h) ..." + + for i in $LIBDIRS ; do + if [ "X" = "X$FREERDP2_PATH" ]; then + if [ -f "$i/libfreerdp2.so" || -f "$i/libfreerdp2.dylib" || -f "$i/libfreerdp2.a" || -f "$i/libfreerdp2.dll.a" ]; then + FREERDP2_PATH="$i" + fi + fi + if [ "X" = "X$FREERDP2_PATH" ]; then + TMP_LIB=`/bin/ls $i/libfreerdp2*.so* 2> /dev/null | grep libfreerdp2` + if [ -n "$TMP_LIB" ]; then + FREERDP2_PATH="$i" + fi + fi + done + + FREERDP2_IPATH= + for i in $INCDIRS ; do + if [ "X" = "X$FREERDP2_IPATH" ]; then + if [ -f "$i/freerdp/freerdp.h" ]; then + FREERDP2_IPATH="$i/freerdp2" + fi + if [ -f "$i/freerdp2/freerdp/freerdp.h" ]; then + FREERDP2_IPATH="$i/freerdp2" + fi + fi + done + + for i in $LIBDIRS ; do + if [ "X" = "X$WINPR2_PATH" ]; then + if [ -f "$i/libwinpr2.so" || -f "$i/libwinpr2.dylib" || -f "$i/libwinpr2.a" ]; then + WINPR2_PATH="$i" + fi + fi + if [ "X" = "X$WINPR2_PATH" ]; then + TMP_LIB=`/bin/ls $i/libwinpr2.dll.a 2> /dev/null | grep winpr` + if [ -n "$TMP_LIB" ]; then + WINPR2_PATH="$i" + fi + fi + done + + WINPR2_IPATH= + for i in $INCDIRS ; do + if [ "X" = "X$WINPR2_IPATH" ]; then + if [ -f "$i/winpr.h" ]; then + WINPR2_IPATH="$i" + fi + if [ -f "$i/winpr2/winpr/winpr.h" ]; then + WINPR2_IPATH="$i/winpr2" + fi + fi + done + + if [ "X" != "X$DEBUG" ]; then + echo DEBUG: FREERDP2_PATH=$FREERDP2_PATH/ + echo DEBUG: FREERDP2_IPATH=$FREERDP2_IPATH/ + echo DEBUG: WINPR2_PATH=$WINPR2_PATH/ + echo DEBUG: WINPR2_IPATH=$WINPR2_IPATH/ + fi + + if [ -n "$FREERDP2_PATH" && -n "$FREERDP2_IPATH" && -n "$WINPR2_PATH" && -n "$WINPR2_IPATH" ]; then + echo " ... found" + fi + if [ "X" = "X$FREERDP2_PATH" || "X" = "X$FREERDP2_IPATH" || "X" = "X$WINPR2_PATH" || "X" = "X$WINPR2_IPATH" ]; then + echo " ... NOT found, module rdp disabled" + FREERDP2_PATH="" + FREERDP2_IPATH="" + WINPR2_PATH="" + WINPR2_IPATH="" + fi +fi + echo "Checking for Mongodb (libmongoc-1.0.so, mongoc.h, libbson-1.0.so, bson.h) ..." for i in $LIBDIRS ; do if [ "X" = "X$MONGODB_PATH" ]; then - if [ -f "$i/libmongoc-1.0.so" -o -f "$i/libmongoc-1.0.dylib" -o -f "$i/libmongoc-1.0.a" ]; then + if [ -f "$i/libmongoc-1.0.so" || -f "$i/libmongoc-1.0.dylib" || -f "$i/libmongoc-1.0.a" ]; then MONGODB_PATH="$i" fi fi @@ -1202,7 +1204,7 @@ echo "Checking for Mongodb (libmongoc-1.0.so, mongoc.h, libbson-1.0.so, bson.h) for i in $LIBDIRS ; do if [ "X" = "X$BSON_PATH" ]; then - if [ -f "$i/libbson-1.0.so" -o -f "$i/libbson-1.0.dylib" -o -f "$i/libbson-1.0.a" ]; then + if [ -f "$i/libbson-1.0.so" || -f "$i/libbson-1.0.dylib" || -f "$i/libbson-1.0.a" ]; then BSON_PATH="$i" fi fi @@ -1242,10 +1244,10 @@ if [ "X" != "X$DEBUG" ]; then echo DEBUG: BSON_IPATH=$BSON_IPATH/libbson.h fi - if [ -n "$MONGODB_PATH" -a -n "$MONGODB_IPATH" -a -n "$BSON_PATH" -a -n "$BSON_IPATH" ]; then + if [ -n "$MONGODB_PATH" && -n "$MONGODB_IPATH" && -n "$BSON_PATH" && -n "$BSON_IPATH" ]; then echo " ... found" fi - if [ "X" = "X$MONGODB_PATH" -o "X" = "X$MONGODB_IPATH" -o "X" = "X$BSON_PATH" -o "X" = "X$BSON_IPATH" ]; then + if [ "X" = "X$MONGODB_PATH" || "X" = "X$MONGODB_IPATH" || "X" = "X$BSON_PATH" || "X" = "X$BSON_IPATH" ]; then echo " ... NOT found, module mongodb disabled" MONGODB_PATH="" MONGODB_IPATH="" @@ -1257,7 +1259,7 @@ echo "Checking for smbclient (libsmbclient.so, libsmbclient.h) ..." for i in $LIBDIRS ; do if [ "X" = "X$SMBC_PATH" ]; then - if [ -f "$i/libsmbclient.so" -o -f "$i/libsmbclient.dylib" -o -f "$i/libsmbclient.a" ]; then + if [ -f "$i/libsmbclient.so" || -f "$i/libsmbclient.dylib" || -f "$i/libsmbclient.a" ]; then SMBC_PATH="$i" fi fi @@ -1291,10 +1293,10 @@ echo "Checking for smbclient (libsmbclient.so, libsmbclient.h) ..." echo DEBUG: SMBC_PATH=$SMBC_PATH/libsmbclient echo DEBUG: SMBC_IPATH=$SMBC_IPATH/libsmbclient.h fi - if [ -n "$SMBC_PATH" -a -n "$SMBC_IPATH" ]; then + if [ -n "$SMBC_PATH" && -n "$SMBC_IPATH" ]; then echo " ... found" fi - if [ "X" = "X$SMBC_PATH" -o "X" = "X$SMBC_IPATH" ]; then + if [ "X" = "X$SMBC_PATH" || "X" = "X$SMBC_IPATH" ]; then echo " ... NOT found, module smb2 disabled" SMBC_PATH="" SMBC_IPATH="" @@ -1344,7 +1346,7 @@ if [ "$SYSS" = "SunOS" ]; then if [ "X" = "X$RESOLV_PATH" ]; then echo "Resolv library not found, which is needed on Solaris." fi - if [ -n "$RESOLV_PATH" -a -n "$SOCKET_PATH" -a -n "$RESOLV_PATH" ]; then + if [ -n "$RESOLV_PATH" && -n "$SOCKET_PATH" && -n "$RESOLV_PATH" ]; then echo " ... all found" fi echo @@ -1601,7 +1603,7 @@ fi if [ -n "$MONGODB_IPATH" ]; then XIPATHS="$XIPATHS -I$MONGODB_IPATH -I$BSON_IPATH" fi -if [ -n "$FREERDP3_IPATH" ]; then +if [ -n "$FREERDP2_IPATH" ]; then XIPATHS="$XIPATHS -I$FREERDP2_IPATH -I$WINPR2_IPATH" fi if [ -n "$FREERDP3_IPATH" ]; then @@ -1625,10 +1627,10 @@ fi if [ -n "$NCP_PATH" ]; then XLIBS="$XLIBS -lncp" fi -if [ -n "$ORACLE_PATH" -a "$SYSO" != "Cygwin" ]; then +if [ -n "$ORACLE_PATH" && "$SYSO" != "Cygwin" ]; then XLIBS="$XLIBS -locci -lclntsh" fi -if [ -n "$ORACLE_PATH" -a "$SYSO" = "Cygwin" ]; then +if [ -n "$ORACLE_PATH" && "$SYSO" = "Cygwin" ]; then XLIBS="$XLIBS -loci" fi if [ -n "$FIREBIRD_PATH" ]; then @@ -1708,7 +1710,7 @@ if [ "X" = "X$PREFIX" ]; then PREFIX="/usr/local" fi -if [ "X" = "X$XHYDRA_SUPPORT" -o "Xdisable" = "X$XHYDRA_SUPPORT" ]; then +if [ "X" = "X$XHYDRA_SUPPORT" || "Xdisable" = "X$XHYDRA_SUPPORT" ]; then XHYDRA_SUPPORT="" else XHYDRA_SUPPORT="xhydra" From a73cd388f8891f682e9081f132ea0876e1a0a6ee Mon Sep 17 00:00:00 2001 From: van Hauser Date: Tue, 7 Jul 2020 18:43:53 +0200 Subject: [PATCH 311/531] fix PR --- CHANGES | 9 +- Makefile.am | 1 - configure | 282 ++++++++++++++++++++++++++-------------------------- 3 files changed, 148 insertions(+), 144 deletions(-) diff --git a/CHANGES b/CHANGES index 9b7c11f..74542aa 100644 --- a/CHANGES +++ b/CHANGES @@ -2,11 +2,16 @@ Changelog for hydra ------------------- Release 9.1-dev +* rdb: support for libfreerdp3 (thanks to animetauren) * new module: smb2 which also supports smb3 (uses libsmbclient-dev) (thanks to Karim Kanso for the module!) +* oracle: added success condition (thanks to kazkansouh), compile on Cygwin (thanks to maaaaz) * rtsp: fixed crash in MD5 auth * svn: updated to support past and new API -* http module now supports F=/S= string matching conditions (thanks to poucz@github) -* changed mysql module not to use mysql db as a default. if the user has not access to this db auth fails ... +* http: now supports F=/S= string matching conditions (thanks to poucz@github) +* http-proxy: buffer fix, 404 success condition (thanks to kazkansouh) +* mysql: changed not to use mysql db as a default. if the user has not access to this db auth fails ... +* sasl: buffer fix (thanks to TenGbps) +* fixed help for https modules (thanks to Jab2870) * added -K command line switch to disable redo attempts (good for mass scanning) * forgot to have the -m option in the hydra help output * gcc-10 support and various cleanups by Jeroen Roovers, thanks! diff --git a/Makefile.am b/Makefile.am index 4f61b28..9d349c2 100644 --- a/Makefile.am +++ b/Makefile.am @@ -78,7 +78,6 @@ install: strip -cp -f *.csv $(DESTDIR)$(PREFIX)$(DATADIR) -mkdir -p $(DESTDIR)$(PREFIX)$(MANDIR) -cp -f hydra.1 xhydra.1 pw-inspector.1 $(DESTDIR)$(PREFIX)$(MANDIR) - -ldconfig clean: rm -rf xhydra pw-inspector hydra *.o core *.core *.stackdump *~ Makefile.in Makefile dev_rfc hydra.restore arm/*.ipk arm/ipkg/usr/bin/* hydra-gtk/src/*.o hydra-gtk/src/xhydra hydra-gtk/stamp-h hydra-gtk/config.status hydra-gtk/errors hydra-gtk/config.log hydra-gtk/src/.deps hydra-gtk/src/Makefile hydra-gtk/Makefile diff --git a/configure b/configure index 709fb30..19d8516 100755 --- a/configure +++ b/configure @@ -3,7 +3,7 @@ # uname -s = Linux | OpenBSD | FreeBSD | Darwin # uname -m = i636 or x86_64 -if [ "$1" = "-h" || "$1" = "--help" ]; then +if [ "$1" = "-h" -o "$1" = "--help" ]; then echo Options: echo " --prefix=path path to install hydra and its datafiles to" echo " --fhs install according to the File System Hierarchy Standard" @@ -147,7 +147,7 @@ fi # On macOS /usr/include only exists if one has installed the Command Line Tools package. # If this is an Xcode-only system we need to look inside the SDK for headers. SDK_PATH="" -if [ "$SYSS" = "Darwin" ] && [ ! -d "/usr/include" ]; then +if [ "$SYSS" = "Darwin" -a ! -d "/usr/include" ]; then SDK_PATH=`xcrun --show-sdk-path` fi LIBDIRS=`cat /etc/ld.so.conf /etc/ld.so.conf.d/* 2> /dev/null | grep -v '^#' | sort | uniq` @@ -170,7 +170,7 @@ fi STRIP="strip" echo -echo "Checking for zlib (libz.so, zlib.h) ..." +echo "Checking for zlib (libz/zlib.h) ..." for i in $INCDIRS; do if [ -f "$i/zlib.h" ]; then HAVE_ZLIB="y" @@ -178,12 +178,12 @@ for i in $INCDIRS; do done if [ -n "$HAVE_ZLIB" ]; then - echo " ... found" + echo " ... found" else - echo " ... zlib not found, gzip support disabled" + echo " ... zlib not found, gzip support disabled" fi -echo "Checking for openssl (libssl, libcrypto, ssl.h, sha.h) ..." +echo "Checking for openssl (libssl/libcrypto/ssl.h/sha.h) ..." if [ "X" != "X$DEBUG" ]; then echo DEBUG: SSL_LIB=$LIBDIRS `ls -d /*ssl /usr/*ssl /opt/*ssl /usr/local/*ssl /opt/local/*ssl /*ssl/lib /usr/*ssl/lib /opt/*ssl/lib /usr/local/*ssl/lib /opt/local/*ssl/lib 2> /dev/null` echo DEBUG: SSL_INC=$INCDIRS `ls -d /*ssl/include /opt/*ssl/include /usr/*ssl/include /usr/local/*ssl/include 2> /dev/null` @@ -198,7 +198,7 @@ else /*ssl/lib /usr/*ssl/lib /opt/*ssl/lib /usr/local/*ssl/lib /opt/local/*ssl/lib do if [ "X" = "X$SSL_PATH" ]; then - if [ -f "$i/libssl.so" || -f "$i/libssl.dylib" || -f "$i/libssl.a" ]; then + if [ -f "$i/libssl.so" -o -f "$i/libssl.dylib" -o -f "$i/libssl.a" ]; then SSL_PATH="$i" fi fi @@ -209,7 +209,7 @@ else fi fi if [ "X" = "X$CRYPTO_PATH" ]; then - if [ -f "$i/libcrypto.so" || -f "$i/libcrypto.dylib" || -f "$i/libcrypto.a" ]; then + if [ -f "$i/libcrypto.so" -o -f "$i/libcrypto.dylib" -o -f "$i/libcrypto.a" ]; then CRYPTO_PATH="$i" fi fi @@ -251,24 +251,24 @@ if [ "X" = "X$SSL_IPATH" ]; then SSL_PATH="" CRYPTO_PATH="" fi -if [ -n "$SSL_PATH" && "X" = "X$SSLNEW" ]; then - echo " ... found but OLD" +if [ -n "$SSL_PATH" -a "X" = "X$SSLNEW" ]; then + echo " ... found but OLD" echo "NOTE: your OpenSSL package is outdated, update it!" fi -if [ -n "$SSL_PATH" && '!' "X" = "X$SSLNEW" ]; then - echo " ... found" +if [ -n "$SSL_PATH" -a '!' "X" = "X$SSLNEW" ]; then + echo " ... found" fi if [ "X" = "X$SSL_PATH" ]; then - echo " ... NOT found, SSL support disabled" + echo " ... NOT found, SSL support disabled" echo "Get it from http://www.openssl.org" fi if [ "$SSL_IPATH" = "/usr/include" ]; then SSL_IPATH="" fi -echo "Checking for gcrypt (libgcrypt.so, gpg-error.h) ..." +echo "Checking for gcrypt (libgcrypt/gpg-error.h) ..." for i in $LIBDIRS ; do - if [ -f "$i/libgcrypt.so" || -f "$i/libgcrypt.dylib" || -f "$i/libgcrypt.a" || -f "$i/libgcrypt.dll.a" || -f "$i/libgcrypt.la" ]; then + if [ -f "$i/libgcrypt.so" -o -f "$i/libgcrypt.dylib" -o -f "$i/libgcrypt.a" -o -f "$i/libgcrypt.dll.a" -o -f "$i/libgcrypt.la" ]; then HAVE_GCRYPT="y" fi done @@ -286,17 +286,17 @@ for i in $INCDIRS ; do fi done -if [ -n "$HAVE_GCRYPT" && "X" != "X$GPGERROR_IPATH" ]; then - echo " ... found" +if [ -n "$HAVE_GCRYPT" -a "X" != "X$GPGERROR_IPATH" ]; then + echo " ... found" else - echo " ... gcrypt not found, radmin2 module disabled" + echo " ... gcrypt not found, radmin2 module disabled" HAVE_GCRYPT="" fi -echo "Checking for idn (libidn.so) ..." +echo "Checking for idn (libidn) ..." for i in $LIBDIRS ; do if [ "X" = "X$IDN_PATH" ]; then - if [ -f "$i/libidn.so" || -f "$i/libidn.dylib" || -f "$i/libidn.a" || -f "$i/libidn.dll.a" || -f "$i/libidn.la" ]; then + if [ -f "$i/libidn.so" -o -f "$i/libidn.dylib" -o -f "$i/libidn.a" -o -f "$i/libidn.dll.a" -o -f "$i/libidn.la" ]; then IDN_PATH="$i" fi fi @@ -324,21 +324,21 @@ if [ "X" != "X$DEBUG" ]; then echo DEBUG: IDN_IPATH=$IDN_IPATH/stringprep.h echo DEBUG: PR29_IPATH=$PR29_IPATH/pr29.h fi -if [ -n "$IDN_PATH" && -n "$IDN_IPATH" ]; then - echo " ... found" +if [ -n "$IDN_PATH" -a -n "$IDN_IPATH" ]; then + echo " ... found" fi #pr29 is optional -if [ "X" = "X$IDN_PATH" || "X" = "X$IDN_IPATH" ]; then - echo " ... NOT found, unicode logins and passwords will not be supported" +if [ "X" = "X$IDN_PATH" -o "X" = "X$IDN_IPATH" ]; then + echo " ... NOT found, unicode logins and passwords will not be supported" IDN_PATH="" IDN_IPATH="" PR29_IPATH="" fi -echo "Checking for curses (libcurses.so / term.h) ..." +echo "Checking for curses (libcurses/term.h) ..." for i in $LIBDIRS; do if [ "X" = "X$CURSES_PATH" ]; then - if [ -f "$i/libcurses.so" || -f "$i/libcurses.dylib" || -f "$i/libcurses.a" ]; then + if [ -f "$i/libcurses.so" -o -f "$i/libcurses.dylib" -o -f "$i/libcurses.a" ]; then CURSES_PATH="$i" fi fi @@ -369,19 +369,19 @@ if [ "X" != "X$DEBUG" ]; then echo DEBUG: CURSES_PATH=$CURSES_PATH/libcurses echo DEBUG: CURSES_IPATH=$CURSES_IPATH/term.h fi -if [ -n "$CURSES_PATH" && -n "$CURSES_IPATH" ]; then - echo " ... found, color output enabled" +if [ -n "$CURSES_PATH" -a -n "$CURSES_IPATH" ]; then + echo " ... found, color output enabled" fi -if [ "X" = "X$CURSES_PATH" || "X" = "X$CURSES_IPATH" ]; then - echo " ... NOT found, color output disabled" +if [ "X" = "X$CURSES_PATH" -o "X" = "X$CURSES_IPATH" ]; then + echo " ... NOT found, color output disabled" CURSES_PATH="" CURSES_IPATH="" fi -echo "Checking for pcre (libpcre.so, pcre.h) ..." +echo "Checking for pcre (libpcre/pcre.h) ..." for i in $LIBDIRS ; do if [ "X" = "X$PCRE_PATH" ]; then - if [ -f "$i/libpcre.so" || -f "$i/libpcre.dylib" || -f "$i/libpcre.a" ]; then + if [ -f "$i/libpcre.so" -o -f "$i/libpcre.dylib" -o -f "$i/libpcre.a" ]; then PCRE_PATH="$i" fi fi @@ -409,16 +409,16 @@ if [ "X" != "X$DEBUG" ]; then echo DEBUG: PCRE_PATH=$PCRE_PATH/libpcre echo DEBUG: PCRE_IPATH=$PCRE_IPATH/pcre.h fi -if [ -n "$PCRE_PATH" && -n "$PCRE_IPATH" ]; then - echo " ... found" +if [ -n "$PCRE_PATH" -a -n "$PCRE_IPATH" ]; then + echo " ... found" fi -if [ "X" = "X$PCRE_PATH" || "X" = "X$PCRE_IPATH" ]; then - echo " ... NOT found, server response checks will be less reliable" +if [ "X" = "X$PCRE_PATH" -o "X" = "X$PCRE_IPATH" ]; then + echo " ... NOT found, server response checks will be less reliable" PCRE_PATH="" PCRE_IPATH="" fi -echo "Checking for Postgres (libpq.so, libpq-fe.h) ..." +echo "Checking for Postgres (libpq/libpq-fe.h) ..." #if [ "$SYSO" = "Cygwin" ]; then # echo " ... DISABLED - postgres is buggy in Cygwin at the moment" # POSTGRES_PATH="" @@ -426,7 +426,7 @@ echo "Checking for Postgres (libpq.so, libpq-fe.h) ..." #else for i in $LIBDIRS ; do if [ "X" = "X$POSTGRES_PATH" ]; then - if [ -f "$i/libpq.so" || -f "$i/libpq.dylib" || -f "$i/libpq.a" ]; then + if [ -f "$i/libpq.so" -o -f "$i/libpq.dylib" -o -f "$i/libpq.a" ]; then POSTGRES_PATH="$i" fi fi @@ -464,17 +464,17 @@ if [ "X" != "X$DEBUG" ]; then echo DEBUG: POSTGRES_PATH=$POSTGRES_PATH/libpq echo DEBUG: POSTGRES_IPATH=$POSTGRES_IPATH/libpq-fe.h fi - if [ -n "$POSTGRES_PATH" && -n "$POSTGRES_IPATH" ]; then - echo " ... found" + if [ -n "$POSTGRES_PATH" -a -n "$POSTGRES_IPATH" ]; then + echo " ... found" fi - if [ "X" = "X$POSTGRES_PATH" || "X" = "X$POSTGRES_IPATH" ]; then - echo " ... NOT found, module postgres disabled" + if [ "X" = "X$POSTGRES_PATH" -o "X" = "X$POSTGRES_IPATH" ]; then + echo " ... NOT found, module postgres disabled" POSTGRES_PATH="" POSTGRES_IPATH="" fi #fi -echo "Checking for SVN (libsvn_client-1 libapr-1.so libaprutil-1.so) ..." +echo "Checking for SVN (libsvn_client-1/libapr-1/libaprutil-1) ..." for i in $LIBDIRS ; do if [ "X" = "X$SVN_PATH" ]; then if [ -f "$i/libsvn_client-1.so" ]; then @@ -482,7 +482,7 @@ for i in $LIBDIRS ; do fi fi if [ "X" = "X$APR_PATH" ]; then - if [ -f "$i/libapr-1.so" && -f "$i/libaprutil-1.so" ]; then + if [ -f "$i/libapr-1.so" -a -f "$i/libaprutil-1.so" ]; then APR_PATH="$i" fi fi @@ -492,7 +492,7 @@ for i in $LIBDIRS ; do fi fi if [ "X" = "X$APR_PATH" ]; then - if [ -f "$i/libapr-1.dll.a" && -f "$i/libaprutil-1.dll.a" ]; then + if [ -f "$i/libapr-1.dll.a" -a -f "$i/libaprutil-1.dll.a" ]; then APR_PATH="$i" fi fi @@ -502,7 +502,7 @@ for i in $LIBDIRS ; do fi fi if [ "X" = "X$APR_PATH" ]; then - if [ -f "$i/libapr-1.dylib" && -f "$i/libaprutil-1.dylib" ]; then + if [ -f "$i/libapr-1.dylib" -a -f "$i/libaprutil-1.dylib" ]; then APR_PATH="$i" fi fi @@ -512,7 +512,7 @@ for i in $LIBDIRS ; do fi fi if [ "X" = "X$APR_PATH" ]; then - if [ -f "$i/libapr-1.a" && -f "$i/libaprutil-1.a" ]; then + if [ -f "$i/libapr-1.a" -a -f "$i/libaprutil-1.a" ]; then APR_PATH="$i" fi fi @@ -522,7 +522,7 @@ for i in $LIBDIRS ; do fi fi if [ "X" = "X$APR_PATH" ]; then - if [ -f "$i/libapr-1.0.dylib" && -f "$i/libaprutil-1.0.dylib" ]; then + if [ -f "$i/libapr-1.0.dylib" -a -f "$i/libaprutil-1.0.dylib" ]; then APR_PATH="$i" fi fi @@ -535,7 +535,7 @@ for i in $LIBDIRS ; do if [ "X" = "X$APR_PATH" ]; then TMP_LIB2=`/bin/ls $i/libapr-1*.so* 2> /dev/null | grep libsvn_client.` TMP_LIB3=`/bin/ls $i/libaprutil-1*.so* 2> /dev/null | grep libsvn_client.` - if [ -n "$TMP_LIB2" && -n "$TMP_LIB3" ]; then + if [ -n "$TMP_LIB2" -a -n "$TMP_LIB3" ]; then APR_PATH="$i" fi fi @@ -548,7 +548,7 @@ for i in $LIBDIRS ; do if [ "X" = "X$APR_PATH" ]; then TMP_LIB2=`/bin/ls $i/libapr-1*.dll* 2> /dev/null | grep libsvn_client.` TMP_LIB3=`/bin/ls $i/libaprutil-1*.dll* 2> /dev/null | grep libsvn_client.` - if [ -n "$TMP_LIB2" && -n "$TMP_LIB3" ]; then + if [ -n "$TMP_LIB2" -a -n "$TMP_LIB3" ]; then APR_PATH="$i" fi fi @@ -585,7 +585,7 @@ if [ "X" != "X$DEBUG" ]; then echo DEBUG: APR_IPATH=$APR_IPATH/ fi -if [ "X" = "X$SVN_PATH" || "X" = "X$SVN_IPATH" || "X" = "X$APR_IPATH" ]; then +if [ "X" = "X$SVN_PATH" -o "X" = "X$SVN_IPATH" -o "X" = "X$APR_IPATH" ]; then SVN_PATH="" SVN_IPATH="" APR_IPATH="" @@ -597,17 +597,17 @@ if [ "$APR_IPATH" = "/usr/include" ]; then APR_IPATH="" fi -if [ -n "$SVN_PATH" && -n "$APR_PATH" ]; then - echo " ... found" +if [ -n "$SVN_PATH" -a -n "$APR_PATH" ]; then + echo " ... found" fi -if [ "X" = "X$SVN_PATH" || "X" = "X$APR_PATH" ]; then - echo " ... NOT found, module svn disabled" +if [ "X" = "X$SVN_PATH" -o "X" = "X$APR_PATH" ]; then + echo " ... NOT found, module svn disabled" fi -echo "Checking for firebird (libfbclient.so) ..." +echo "Checking for firebird (libfbclient) ..." for i in $LIBDIRS ; do if [ "X" = "X$FIREBIRD_PATH" ]; then - if [ -f "$i/libfbclient.so" || -f "$i/libfbclient.dylib" || -f "$i/libfbclient.a" ]; then + if [ -f "$i/libfbclient.so" -o -f "$i/libfbclient.dylib" -o -f "$i/libfbclient.a" ]; then FIREBIRD_PATH="$i" fi fi @@ -638,19 +638,19 @@ if [ "X" != "X$DEBUG" ]; then echo DEBUG: FIREBIRD_PATH=$FIREBIRD_PATH/libfbclient echo DEBUG: FIREBIRD_IPATH=$FIREBIRD_IPATH/ibase.h fi -if [ -n "$FIREBIRD_PATH" && -n "$FIREBIRD_IPATH" ]; then - echo " ... found" +if [ -n "$FIREBIRD_PATH" -a -n "$FIREBIRD_IPATH" ]; then + echo " ... found" fi -if [ "X" = "X$FIREBIRD_PATH" || "X" = "X$FIREBIRD_IPATH" ]; then - echo " ... NOT found, module firebird disabled" +if [ "X" = "X$FIREBIRD_PATH" -o "X" = "X$FIREBIRD_IPATH" ]; then + echo " ... NOT found, module firebird disabled" FIREBIRD_PATH="" FIREBIRD_IPATH="" fi -echo "Checking for MYSQL client (libmysqlclient.so, math.h) ..." +echo "Checking for MYSQL client (libmysqlclient/math.h) ..." for i in $LIBDIRS ; do if [ "X" = "X$MYSQL_PATH" ]; then - if [ -f "$i/libmysqlclient.so" || -f "$i/libmysqlclient.dylib" || -f "$i/libmysqlclient.a" ]; then + if [ -f "$i/libmysqlclient.so" -o -f "$i/libmysqlclient.dylib" -o -f "$i/libmysqlclient.a" ]; then MYSQL_PATH="$i" fi fi @@ -686,20 +686,20 @@ fi MATH="" if [ -f "$SDK_PATH/usr/include/math.h" ]; then MATH="-DHAVE_MATH_H" - if [ -n "$MYSQL_PATH" && -n "$MYSQL_IPATH" && -n "$MATH" ]; then - echo " ... found" + if [ -n "$MYSQL_PATH" -a -n "$MYSQL_IPATH" -a -n "$MATH" ]; then + echo " ... found" else - echo " ... NOT found, module Mysql will not support version > 4.x" + echo " ... NOT found, module Mysql will not support version > 4.x" MYSQL_PATH="" MYSQL_IPATH="" fi else echo " ... math.h not found, module Mysql disabled" fi -echo "Checking for AFP (libafpclient.so) ..." +echo "Checking for AFP (libafpclient) ..." for i in $LIBDIRS ; do if [ "X" = "X$AFP_PATH" ]; then - if [ -f "$i/libafpclient.so" || -f "$i/libafpclient.so" || -f "$i/libafpclient.a" ]; then + if [ -f "$i/libafpclient.so" -o -f "$i/libafpclient.so" -o -f "$i/libafpclient.a" ]; then AFP_PATH="$i" fi fi @@ -727,19 +727,19 @@ if [ "X" != "X$DEBUG" ]; then echo DEBUG: AFP_PATH=$AFP_PATH/libafpclient echo DEBUG: AFP_IPATH=$AFP_IPATH/afp.h fi -if [ -n "$AFP_PATH" && -n "$AFP_IPATH" ]; then - echo " ... found" +if [ -n "$AFP_PATH" -a -n "$AFP_IPATH" ]; then + echo " ... found" fi -if [ "X" = "X$AFP_PATH" || "X" = "X$AFP_IPATH" ]; then - echo " ... NOT found, module Apple Filing Protocol disabled - Apple sucks anyway" +if [ "X" = "X$AFP_PATH" -o "X" = "X$AFP_IPATH" ]; then + echo " ... NOT found, module Apple Filing Protocol disabled - Apple sucks anyway" AFP_PATH="" AFP_IPATH="" fi -echo "Checking for NCP (libncp.so / nwcalls.h) ..." +echo "Checking for NCP (libncp/nwcalls.h) ..." for i in $LIBDIRS ; do if [ "X" = "X$NCP_PATH" ]; then - if [ -f "$i/libncp.so" || -f "$i/libncp.dylib" || -f "$i/libncp.a" ]; then + if [ -f "$i/libncp.so" -o -f "$i/libncp.dylib" -o -f "$i/libncp.a" ]; then NCP_PATH="$i" fi fi @@ -767,11 +767,11 @@ if [ "X" != "X$DEBUG" ]; then echo DEBUG: NCP_PATH=$NCP_PATH/libncp echo DEBUG: NCP_IPATH=$NCP_IPATH/ncp/nwcalls.h fi -if [ -n "$NCP_PATH" && -n "$NCP_IPATH" ]; then - echo " ... found" +if [ -n "$NCP_PATH" -a -n "$NCP_IPATH" ]; then + echo " ... found" fi -if [ "X" = "X$NCP_PATH" || "X" = "X$NCP_IPATH" ]; then - echo " ... NOT found, module NCP disabled" +if [ "X" = "X$NCP_PATH" -o "X" = "X$NCP_IPATH" ]; then + echo " ... NOT found, module NCP disabled" NCP_PATH="" NCP_IPATH="" fi @@ -779,7 +779,7 @@ fi echo "Checking for SAP/R3 (librfc/saprfc.h) ..." for i in $LIBDIRS ; do if [ "X" = "X$SAPR3_PATH" ]; then - if [ -f "$i/librfc.a" || -f "$i/librfc.dylib" || "$i/librfc32.dll" ]; then + if [ -f "$i/librfc.a" -o -f "$i/librfc.dylib" -o "$i/librfc32.dll" ]; then SAPR3_PATH="$i" fi fi @@ -821,7 +821,7 @@ fi echo "Checking for libssh (libssh/libssh.h) ..." for i in $LIBDIRS ; do if [ "X" = "X$SSH_PATH" ]; then - if [ -f "$i/libssh.so" || -f "$i/libssh.dylib" || -f "$i/libssh.a" ]; then + if [ -f "$i/libssh.so" -o -f "$i/libssh.dylib" -o -f "$i/libssh.a" ]; then SSH_PATH="$i" fi fi @@ -866,7 +866,7 @@ if [ "$SSH_IPATH" = "/usr/include" ]; then SSH_IPATH="" fi -echo "Checking for Oracle (libocci.so libclntsh.so / oci.h and libaio.so / liboci.a and oci.dll) ..." +echo "Checking for Oracle (libocci/libclntsh/oci.h/libaio/liboci) ..." #assume if we find oci.h other headers should also be in that dir #for libs we will test the 2 if [ "X" != "X$WORACLE_PATH" ]; then @@ -882,22 +882,22 @@ fi for i in $LIBDIRS ; do if [ "X" = "X$ORACLE_PATH" ]; then - if [ -f "$i/libocci.so" && -f "$i/libclntsh.so" ]; then + if [ -f "$i/libocci.so" -a -f "$i/libclntsh.so" ]; then ORACLE_PATH="$i" fi fi if [ "X" = "X$ORACLE_PATH" ]; then - if [ -f "$i/libocci.dylib" && -f "$i/libclntsh.dylib" ]; then + if [ -f "$i/libocci.dylib" -a -f "$i/libclntsh.dylib" ]; then ORACLE_PATH="$i" fi fi if [ "X" = "X$ORACLE_PATH" ]; then - if [ -f "$i/libocci.a" && -f "$i/libclntsh.a" ]; then + if [ -f "$i/libocci.a" -a -f "$i/libclntsh.a" ]; then ORACLE_PATH="$i" fi fi if [ "X" = "X$ORACLE_PATH" ]; then - if [ -f "$i/liboci.a" && -f "$i/oci.dll" ]; then + if [ -f "$i/liboci.a" -a -f "$i/oci.dll" ]; then ORACLE_PATH="$i" fi fi @@ -924,11 +924,11 @@ if [ "X" != "X$DEBUG" ]; then echo DEBUG: ORACLE_PATH=$ORACLE_PATH/libocci fi #check for Kernel Asynchronous I/O (AIO) lib support, no need on Cygwin -if [ "X" != "X$ORACLE_PATH" && "$SYSO" != "Cygwin" ]; then +if [ "X" != "X$ORACLE_PATH" -a "$SYSO" != "Cygwin" ]; then LIBAIO="" for i in $LIBDIRS ; do if [ "X" = "X$LIBAIO" ]; then - if [ -f "$i/libaio.so" || -f "$i/libaio.dylib" || -f "$i/libaio.a" ]; then + if [ -f "$i/libaio.so" -o -f "$i/libaio.dylib" -o -f "$i/libaio.a" ]; then LIBAIO="$i" fi fi @@ -959,21 +959,21 @@ done if [ "X" != "X$DEBUG" ]; then echo DEBUG: ORACLE_IPATH=$ORACLE_IPATH/oci.h fi -if [ -n "$ORACLE_PATH" && -n "$ORACLE_IPATH" ]; then - echo " ... found" +if [ -n "$ORACLE_PATH" -a -n "$ORACLE_IPATH" ]; then + echo " ... found" fi -if [ "X" = "X$ORACLE_PATH" || "X" = "X$ORACLE_IPATH" ]; then - echo " ... NOT found, module Oracle disabled" +if [ "X" = "X$ORACLE_PATH" -o "X" = "X$ORACLE_IPATH" ]; then + echo " ... NOT found, module Oracle disabled" echo "Get basic and sdk package from http://www.oracle.com/technetwork/database/features/instant-client/index.html" ORACLE_PATH="" ORACLE_IPATH="" fi -echo "Checking for Memcached (libmemcached.so, memcached.h) ..." +echo "Checking for Memcached (libmemcached/memcached.h) ..." for i in $LIBDIRS ; do if [ "X" = "X$MCACHED_PATH" ]; then - if [ -f "$i/libmemcached.so" || -f "$i/libmemcached.dylib" || -f "$i/libmemcached.a" ]; then + if [ -f "$i/libmemcached.so" -o -f "$i/libmemcached.dylib" -o -f "$i/libmemcached.a" ]; then MCACHED_PATH="$i" fi fi @@ -1010,20 +1010,20 @@ if [ "X" != "X$DEBUG" ]; then echo DEBUG: MCACHED_PATH=$MCACHED_PATH/libmemcached echo DEBUG: MCACHED_IPATH=$MCACHED_IPATH/memcached.h fi - if [ -n "$MCACHED_PATH" && -n "$MCACHED_IPATH" ]; then - echo " ... found" + if [ -n "$MCACHED_PATH" -a -n "$MCACHED_IPATH" ]; then + echo " ... found" fi - if [ "X" = "X$MCACHED_PATH" || "X" = "X$MCACHED_IPATH" ]; then - echo " ... NOT found, module memcached disabled" + if [ "X" = "X$MCACHED_PATH" -o "X" = "X$MCACHED_IPATH" ]; then + echo " ... NOT found, module memcached disabled" MCACHED_PATH="" MCACHED_IPATH="" fi -echo "Checking for Freerdp3 (libfreerdp3.so, freerdp/*.h, libwinpr3.so, winpr/*.h) ..." +echo "Checking for Freerdp3 (libfreerdp3/freerdp.h/libwinpr3/winpr.h) ..." for i in $LIBDIRS ; do if [ "X" = "X$FREERDP3_PATH" ]; then - if [ -f "$i/libfreerdp3.so" || -f "$i/libfreerdp3.dylib" || -f "$i/libfreerdp3.a" || -f "$i/libfreerdp3.dll.a" ]; then + if [ -f "$i/libfreerdp3.so" -o -f "$i/libfreerdp3.dylib" -o -f "$i/libfreerdp3.a" -o -f "$i/libfreerdp3.dll.a" ]; then FREERDP3_PATH="$i" fi fi @@ -1049,7 +1049,7 @@ echo "Checking for Freerdp3 (libfreerdp3.so, freerdp/*.h, libwinpr3.so, winpr/*. for i in $LIBDIRS ; do if [ "X" = "X$WINPR3_PATH" ]; then - if [ -f "$i/libwinpr3.so" || -f "$i/libwinpr3.dylib" || -f "$i/libwinpr3.a" ]; then + if [ -f "$i/libwinpr3.so" -o -f "$i/libwinpr3.dylib" -o -f "$i/libwinpr3.a" ]; then WINPR3_PATH="$i" fi fi @@ -1073,30 +1073,30 @@ echo "Checking for Freerdp3 (libfreerdp3.so, freerdp/*.h, libwinpr3.so, winpr/*. fi done -if [ "X" != "X$DEBUG" ]; then - echo DEBUG: FREERDP3_PATH=$FREERDP3_PATH/ - echo DEBUG: FREERDP3_IPATH=$FREERDP3_IPATH/ - echo DEBUG: WINPR3_PATH=$WINPR3_PATH/ - echo DEBUG: WINPR3_IPATH=$WINPR3_IPATH/ -fi - - if [ -n "$FREERDP3_PATH" && -n "$FREERDP3_IPATH" && -n "$WINPR3_PATH" && -n "$WINPR3_IPATH" ]; then - echo " ... found" + if [ "X" != "X$DEBUG" ]; then + echo DEBUG: FREERDP3_PATH=$FREERDP3_PATH/ + echo DEBUG: FREERDP3_IPATH=$FREERDP3_IPATH/ + echo DEBUG: WINPR3_PATH=$WINPR3_PATH/ + echo DEBUG: WINPR3_IPATH=$WINPR3_IPATH/ fi - if [ "X" = "X$FREERDP3_PATH" || "X" = "X$FREERDP3_IPATH" || "X" = "X$WINPR3_PATH" || "X" = "X$WINPR3_IPATH" ]; then - echo " ... NOT found, checking for freerdp2 module next..." + + if [ -n "$FREERDP3_PATH" -a -n "$FREERDP3_IPATH" -a -n "$WINPR3_PATH" -a -n "$WINPR3_IPATH" ]; then + echo " ... found" + fi + if [ "X" = "X$FREERDP3_PATH" -o "X" = "X$FREERDP3_IPATH" -o "X" = "X$WINPR3_PATH" -o "X" = "X$WINPR3_IPATH" ]; then + echo " ... NOT found, checking for freerdp2 module next..." FREERDP3_PATH="" FREERDP3_IPATH="" WINPR3_PATH="" WINPR3_IPATH="" fi -if ["X" != "X$FREERDP3_PATH" || "X" != "X$FREERDP3_IPATH" || "X" != "X$WINPR3_PATH" || "X" != "X$WINPR3_IPATH"]; then - echo "Checking for Freerdp2 (libfreerdp2.so, freerdp/*.h, libwinpr2.so, winpr/*.h) ..." + if [ "X" = "X$FREERDP3_PATH" -o "X" = "X$FREERDP3_IPATH" -o "X" = "X$WINPR3_PATH" -o "X" = "X$WINPR3_IPATH" ]; then + echo "Checking for Freerdp2 (libfreerdp2/freerdp.h/libwinpr2/winpr.h) ..." for i in $LIBDIRS ; do if [ "X" = "X$FREERDP2_PATH" ]; then - if [ -f "$i/libfreerdp2.so" || -f "$i/libfreerdp2.dylib" || -f "$i/libfreerdp2.a" || -f "$i/libfreerdp2.dll.a" ]; then + if [ -f "$i/libfreerdp2.so" -o -f "$i/libfreerdp2.dylib" -o -f "$i/libfreerdp2.a" -o -f "$i/libfreerdp2.dll.a" ]; then FREERDP2_PATH="$i" fi fi @@ -1122,7 +1122,7 @@ if ["X" != "X$FREERDP3_PATH" || "X" != "X$FREERDP3_IPATH" || "X" != "X$WINPR3_PA for i in $LIBDIRS ; do if [ "X" = "X$WINPR2_PATH" ]; then - if [ -f "$i/libwinpr2.so" || -f "$i/libwinpr2.dylib" || -f "$i/libwinpr2.a" ]; then + if [ -f "$i/libwinpr2.so" -o -f "$i/libwinpr2.dylib" -o -f "$i/libwinpr2.a" ]; then WINPR2_PATH="$i" fi fi @@ -1153,11 +1153,11 @@ if ["X" != "X$FREERDP3_PATH" || "X" != "X$FREERDP3_IPATH" || "X" != "X$WINPR3_PA echo DEBUG: WINPR2_IPATH=$WINPR2_IPATH/ fi - if [ -n "$FREERDP2_PATH" && -n "$FREERDP2_IPATH" && -n "$WINPR2_PATH" && -n "$WINPR2_IPATH" ]; then - echo " ... found" + if [ -n "$FREERDP2_PATH" -a -n "$FREERDP2_IPATH" -a -n "$WINPR2_PATH" -a -n "$WINPR2_IPATH" ]; then + echo " ... found" fi - if [ "X" = "X$FREERDP2_PATH" || "X" = "X$FREERDP2_IPATH" || "X" = "X$WINPR2_PATH" || "X" = "X$WINPR2_IPATH" ]; then - echo " ... NOT found, module rdp disabled" + if [ "X" = "X$FREERDP2_PATH" -o "X" = "X$FREERDP2_IPATH" -o "X" = "X$WINPR2_PATH" -o "X" = "X$WINPR2_IPATH" ]; then + echo " ... NOT found, module rdp disabled" FREERDP2_PATH="" FREERDP2_IPATH="" WINPR2_PATH="" @@ -1165,11 +1165,11 @@ if ["X" != "X$FREERDP3_PATH" || "X" != "X$FREERDP3_IPATH" || "X" != "X$WINPR3_PA fi fi -echo "Checking for Mongodb (libmongoc-1.0.so, mongoc.h, libbson-1.0.so, bson.h) ..." +echo "Checking for Mongodb (libmongoc-1.0/mongoc.h/libbson-1.0/bson.h) ..." for i in $LIBDIRS ; do if [ "X" = "X$MONGODB_PATH" ]; then - if [ -f "$i/libmongoc-1.0.so" || -f "$i/libmongoc-1.0.dylib" || -f "$i/libmongoc-1.0.a" ]; then + if [ -f "$i/libmongoc-1.0.so" -o -f "$i/libmongoc-1.0.dylib" -o -f "$i/libmongoc-1.0.a" ]; then MONGODB_PATH="$i" fi fi @@ -1204,7 +1204,7 @@ echo "Checking for Mongodb (libmongoc-1.0.so, mongoc.h, libbson-1.0.so, bson.h) for i in $LIBDIRS ; do if [ "X" = "X$BSON_PATH" ]; then - if [ -f "$i/libbson-1.0.so" || -f "$i/libbson-1.0.dylib" || -f "$i/libbson-1.0.a" ]; then + if [ -f "$i/libbson-1.0.so" -o -f "$i/libbson-1.0.dylib" -o -f "$i/libbson-1.0.a" ]; then BSON_PATH="$i" fi fi @@ -1244,22 +1244,22 @@ if [ "X" != "X$DEBUG" ]; then echo DEBUG: BSON_IPATH=$BSON_IPATH/libbson.h fi - if [ -n "$MONGODB_PATH" && -n "$MONGODB_IPATH" && -n "$BSON_PATH" && -n "$BSON_IPATH" ]; then - echo " ... found" + if [ -n "$MONGODB_PATH" -a -n "$MONGODB_IPATH" -a -n "$BSON_PATH" -a -n "$BSON_IPATH" ]; then + echo " ... found" fi - if [ "X" = "X$MONGODB_PATH" || "X" = "X$MONGODB_IPATH" || "X" = "X$BSON_PATH" || "X" = "X$BSON_IPATH" ]; then - echo " ... NOT found, module mongodb disabled" + if [ "X" = "X$MONGODB_PATH" -o "X" = "X$MONGODB_IPATH" -o "X" = "X$BSON_PATH" -o "X" = "X$BSON_IPATH" ]; then + echo " ... NOT found, module mongodb disabled" MONGODB_PATH="" MONGODB_IPATH="" BSON_PATH="" BSON_IPATH="" fi -echo "Checking for smbclient (libsmbclient.so, libsmbclient.h) ..." +echo "Checking for smbclient (libsmbclient/libsmbclient.h) ..." for i in $LIBDIRS ; do if [ "X" = "X$SMBC_PATH" ]; then - if [ -f "$i/libsmbclient.so" || -f "$i/libsmbclient.dylib" || -f "$i/libsmbclient.a" ]; then + if [ -f "$i/libsmbclient.so" -o -f "$i/libsmbclient.dylib" -o -f "$i/libsmbclient.a" ]; then SMBC_PATH="$i" fi fi @@ -1293,18 +1293,18 @@ echo "Checking for smbclient (libsmbclient.so, libsmbclient.h) ..." echo DEBUG: SMBC_PATH=$SMBC_PATH/libsmbclient echo DEBUG: SMBC_IPATH=$SMBC_IPATH/libsmbclient.h fi - if [ -n "$SMBC_PATH" && -n "$SMBC_IPATH" ]; then - echo " ... found" + if [ -n "$SMBC_PATH" -a -n "$SMBC_IPATH" ]; then + echo " ... found" fi - if [ "X" = "X$SMBC_PATH" || "X" = "X$SMBC_IPATH" ]; then - echo " ... NOT found, module smb2 disabled" + if [ "X" = "X$SMBC_PATH" -o "X" = "X$SMBC_IPATH" ]; then + echo " ... NOT found, module smb2 disabled" SMBC_PATH="" SMBC_IPATH="" fi if [ "X" = "X$XHYDRA_SUPPORT" ]; then - echo "Checking for GUI req's (pkg-config, gtk+-2.0) ..." + echo "Checking for GUI req's (pkg-config/gtk+-2.0) ..." XHYDRA_SUPPORT=`pkg-config --help > /dev/null 2>&1 || echo disabled` if [ "X" = "X$XHYDRA_SUPPORT" ]; then XHYDRA_SUPPORT=`pkg-config --modversion gtk+-2.0 2> /dev/null` @@ -1312,9 +1312,9 @@ if [ "X" = "X$XHYDRA_SUPPORT" ]; then XHYDRA_SUPPORT="" fi if [ "X" = "X$XHYDRA_SUPPORT" ]; then - echo " ... NOT found, optional anyway" + echo " ... NOT found, optional anyway" else - echo " ... found" + echo " ... found" fi fi @@ -1346,7 +1346,7 @@ if [ "$SYSS" = "SunOS" ]; then if [ "X" = "X$RESOLV_PATH" ]; then echo "Resolv library not found, which is needed on Solaris." fi - if [ -n "$RESOLV_PATH" && -n "$SOCKET_PATH" && -n "$RESOLV_PATH" ]; then + if [ -n "$RESOLV_PATH" -a -n "$SOCKET_PATH" -a -n "$RESOLV_PATH" ]; then echo " ... all found" fi echo @@ -1421,7 +1421,7 @@ if [ -n "$FIREBIRD_PATH" -o \ -n "$WINPR3_PATH" -o \ -n "$SMBC_PATH" \ ]; then - if [ "$SYSS" = "Darwin" ] && [ ! -d "/lib" ]; then + if [ "$SYSS" = "Darwin" -a ! -d "/lib" ]; then #for libraries installed with MacPorts if [ -d "/opt/local/lib" ]; then XLIBPATHS="-L/usr/lib -L/usr/local/lib -L/opt/local/lib" @@ -1627,10 +1627,10 @@ fi if [ -n "$NCP_PATH" ]; then XLIBS="$XLIBS -lncp" fi -if [ -n "$ORACLE_PATH" && "$SYSO" != "Cygwin" ]; then +if [ -n "$ORACLE_PATH" -a "$SYSO" != "Cygwin" ]; then XLIBS="$XLIBS -locci -lclntsh" fi -if [ -n "$ORACLE_PATH" && "$SYSO" = "Cygwin" ]; then +if [ -n "$ORACLE_PATH" -a "$SYSO" = "Cygwin" ]; then XLIBS="$XLIBS -loci" fi if [ -n "$FIREBIRD_PATH" ]; then @@ -1710,7 +1710,7 @@ if [ "X" = "X$PREFIX" ]; then PREFIX="/usr/local" fi -if [ "X" = "X$XHYDRA_SUPPORT" || "Xdisable" = "X$XHYDRA_SUPPORT" ]; then +if [ "X" = "X$XHYDRA_SUPPORT" -o "Xdisable" = "X$XHYDRA_SUPPORT" ]; then XHYDRA_SUPPORT="" else XHYDRA_SUPPORT="xhydra" @@ -1784,7 +1784,7 @@ if [ "x$WINDRES" = "x" ]; then echo HYDRA_LOGO= >> Makefile echo PWI_LOGO= >> Makefile fi -if [ "$GCCSEC" = "yes" ] && [ "$SYSS" != "SunOS" ] && [ "$SYSS" != "Darwin" ]; then +if [ "$GCCSEC" = "yes" -a "$SYSS" != "SunOS" -a "$SYSS" != "Darwin" ]; then echo "SEC=$GCCSECOPT" >> Makefile else echo "SEC=" >> Makefile From 0a17bf5f53aebb37e9418d933975130656a44c01 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Wed, 29 Jul 2020 09:36:37 +0200 Subject: [PATCH 312/531] v9.1 release --- CHANGES | 1 + hydra-gtk/Makefile.in | 2 +- hydra-gtk/configure | 8 ++++---- hydra-gtk/src/Makefile.in | 2 +- hydra.c | 2 +- 5 files changed, 8 insertions(+), 7 deletions(-) diff --git a/CHANGES b/CHANGES index 74542aa..8ca1b75 100644 --- a/CHANGES +++ b/CHANGES @@ -2,6 +2,7 @@ Changelog for hydra ------------------- Release 9.1-dev +* enable gcc 10 support for xhydra too :) * rdb: support for libfreerdp3 (thanks to animetauren) * new module: smb2 which also supports smb3 (uses libsmbclient-dev) (thanks to Karim Kanso for the module!) * oracle: added success condition (thanks to kazkansouh), compile on Cygwin (thanks to maaaaz) diff --git a/hydra-gtk/Makefile.in b/hydra-gtk/Makefile.in index bf5322e..4085f85 100644 --- a/hydra-gtk/Makefile.in +++ b/hydra-gtk/Makefile.in @@ -61,7 +61,7 @@ CC = @CC@ MAINT = @MAINT@ MAKEINFO = @MAKEINFO@ PACKAGE = @PACKAGE@ -PACKAGE_CFLAGS = @PACKAGE_CFLAGS@ +PACKAGE_CFLAGS = @PACKAGE_CFLAGS@ -fcommon -Wl,--allow-multiple-definition PACKAGE_LIBS = @PACKAGE_LIBS@ PKG_CONFIG = @PKG_CONFIG@ VERSION = @VERSION@ diff --git a/hydra-gtk/configure b/hydra-gtk/configure index 287741e..653ba7d 100755 --- a/hydra-gtk/configure +++ b/hydra-gtk/configure @@ -2233,15 +2233,15 @@ if test "$ac_test_CFLAGS" = set; then CFLAGS=$ac_save_CFLAGS elif test $ac_cv_prog_cc_g = yes; then if test "$GCC" = yes; then - CFLAGS="-g -O2" + CFLAGS="-g -O2 -fcommon -Wl,--allow-multiple-definition" else - CFLAGS="-g" + CFLAGS="-g -fcommon -Wl,--allow-multiple-definition" fi else if test "$GCC" = yes; then - CFLAGS="-O2" + CFLAGS="-O2 -fcommon -Wl,--allow-multiple-definition" else - CFLAGS= + CFLAGS="-fcommon -Wl,--allow-multiple-definition" fi fi echo "$as_me:$LINENO: checking for $CC option to accept ANSI C" >&5 diff --git a/hydra-gtk/src/Makefile.in b/hydra-gtk/src/Makefile.in index a37ab9e..d2ff022 100644 --- a/hydra-gtk/src/Makefile.in +++ b/hydra-gtk/src/Makefile.in @@ -61,7 +61,7 @@ CC = @CC@ MAINT = @MAINT@ MAKEINFO = @MAKEINFO@ PACKAGE = @PACKAGE@ -PACKAGE_CFLAGS = @PACKAGE_CFLAGS@ +PACKAGE_CFLAGS = @PACKAGE_CFLAGS@ -fcommon -Wl,--allow-multiple-definition PACKAGE_LIBS = @PACKAGE_LIBS@ PKG_CONFIG = @PKG_CONFIG@ VERSION = @VERSION@ diff --git a/hydra.c b/hydra.c index 72e8919..4971317 100644 --- a/hydra.c +++ b/hydra.c @@ -225,7 +225,7 @@ char *SERVICES = "adam6500 asterisk afp cisco cisco-enable cvs firebird ftp[s] " #define RESTOREFILE "./hydra.restore" #define PROGRAM "Hydra" -#define VERSION "v9.1-dev" +#define VERSION "v9.1" #define AUTHOR "van Hauser/THC" #define EMAIL "" #define AUTHOR2 "David Maciejak" From 79fa70cfdbb179caa35eba5b07619407a68c0bd7 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Sun, 2 Aug 2020 07:12:19 +0200 Subject: [PATCH 313/531] fix with gcc10 and overriden CFLAGS --- Makefile.am | 2 +- hydra-gtk/Makefile.in | 3 ++- hydra-gtk/src/Makefile.in | 2 +- hydra-gtk/src/main.c | 5 ++++- hydra-gtk/src/support.h | 6 +++--- 5 files changed, 11 insertions(+), 7 deletions(-) diff --git a/Makefile.am b/Makefile.am index 9d349c2..1c915f1 100644 --- a/Makefile.am +++ b/Makefile.am @@ -4,7 +4,7 @@ WARN_CLANG=-Wformat-nonliteral -Wstrncat-size -Wformat-security -Wsign-conversion -Wconversion -Wfloat-conversion -Wshorten-64-to-32 -Wuninitialized -Wmissing-variable-declarations -Wmissing-declarations WARN_GCC=-Wformat=2 -Wformat-overflow=2 -Wformat-nonliteral -Wformat-truncation=2 -Wnull-dereference -Wstrict-overflow=2 -Wstringop-overflow=4 -Walloca-larger-than=4096 -Wtype-limits -Wconversion -Wtrampolines -Wstrict-prototypes -Wmissing-prototypes -Wmissing-declarations -fno-common -Wcast-align CFLAGS ?= -g -OPTS=-I. -O3 $(CFLAGS) -fcommon +OPTS=-I. -O3 $(CFLAGS) -fcommon -Wl,--allow-multiple-definition # -Wall -g -pedantic LIBS=-lm DESTDIR ?= diff --git a/hydra-gtk/Makefile.in b/hydra-gtk/Makefile.in index 4085f85..c29f5fa 100644 --- a/hydra-gtk/Makefile.in +++ b/hydra-gtk/Makefile.in @@ -62,7 +62,8 @@ MAINT = @MAINT@ MAKEINFO = @MAKEINFO@ PACKAGE = @PACKAGE@ PACKAGE_CFLAGS = @PACKAGE_CFLAGS@ -fcommon -Wl,--allow-multiple-definition -PACKAGE_LIBS = @PACKAGE_LIBS@ +PACKAGE_LDFLAGS = -fcommon -Wl,--allow-multiple-definition +PACKAGE_LIBS = -fcommon -Wl,--allow-multiple-definition @PACKAGE_LIBS@ PKG_CONFIG = @PKG_CONFIG@ VERSION = @VERSION@ diff --git a/hydra-gtk/src/Makefile.in b/hydra-gtk/src/Makefile.in index d2ff022..1ed2b96 100644 --- a/hydra-gtk/src/Makefile.in +++ b/hydra-gtk/src/Makefile.in @@ -62,7 +62,7 @@ MAINT = @MAINT@ MAKEINFO = @MAKEINFO@ PACKAGE = @PACKAGE@ PACKAGE_CFLAGS = @PACKAGE_CFLAGS@ -fcommon -Wl,--allow-multiple-definition -PACKAGE_LIBS = @PACKAGE_LIBS@ +PACKAGE_LIBS = -fcommon -Wl,--allow-multiple-definition @PACKAGE_LIBS@ PKG_CONFIG = @PKG_CONFIG@ VERSION = @VERSION@ diff --git a/hydra-gtk/src/main.c b/hydra-gtk/src/main.c index 03c5f21..72d6dd7 100644 --- a/hydra-gtk/src/main.c +++ b/hydra-gtk/src/main.c @@ -18,8 +18,11 @@ char *hydra_path1 = "./hydra"; char *hydra_path2 = "/usr/local/bin/hydra"; char *hydra_path3 = "/usr/bin/hydra"; +GtkWidget *wndMain; +char *HYDRA_BIN; +guint message_id; + int main(int argc, char *argv[]) { - extern GtkWidget *wndMain; int i; extern guint message_id; GtkWidget *output; diff --git a/hydra-gtk/src/support.h b/hydra-gtk/src/support.h index bd88545..f1f7bbb 100644 --- a/hydra-gtk/src/support.h +++ b/hydra-gtk/src/support.h @@ -37,6 +37,6 @@ GdkPixbuf *create_pixbuf(const gchar *filename); /* This is used to set ATK action descriptions. */ void glade_set_atk_action_description(AtkAction *action, const gchar *action_name, const gchar *description); -GtkWidget *wndMain; -char *HYDRA_BIN; -guint message_id; +extern GtkWidget *wndMain; +extern char *HYDRA_BIN; +extern guint message_id; From 84e765d3a99d0e9046050822f5e6c7f93245641d Mon Sep 17 00:00:00 2001 From: maaaaz Date: Sun, 16 Aug 2020 04:10:38 -0400 Subject: [PATCH 314/531] msys support --- configure | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/configure b/configure index 19d8516..ae81322 100755 --- a/configure +++ b/configure @@ -157,8 +157,8 @@ fi if [ -d "/Library/Developer/CommandLineTools/usr/lib" ]; then LIBDIRS="$LIBDIRS /Library/Developer/CommandLineTools/usr/lib /Library/Developer/CommandLineTools/lib" fi -LIBDIRS="$LIBDIRS /lib /usr/lib /usr/local/lib /opt/local/lib" -INCDIRS="$SDK_PATH/usr/include /usr/local/include /opt/include /opt/local/include" +LIBDIRS="$LIBDIRS /lib /usr/lib /usr/local/lib /opt/local/lib /mingw64/lib /mingw64/bin" +INCDIRS="$SDK_PATH/usr/include /usr/local/include /opt/include /opt/local/include /mingw64/include" if [ -n "$PREFIX" ]; then if [ -d "$PREFIX/lib" ]; then LIBDIRS="$LIBDIRS $PREFIX/lib" @@ -445,7 +445,7 @@ echo "Checking for Postgres (libpq/libpq-fe.h) ..." done POSTGRES_IPATH= for i in $INCDIRS \ - /opt/p*sql*/include /usr/*p*sql*/include /usr/local/*psql*/include + /opt/p*sql*/include /usr/*p*sql*/include /usr/local/*psql*/include /mingw64/include do if [ "X" = "X$POSTGRES_IPATH" ]; then if [ -f "$i/libpq-fe.h" ]; then @@ -1761,9 +1761,9 @@ cat Makefile.in >> Makefile # ignore errors if this uname call fails ### Current Cygwin is up to speed :-) WINDRES="" -if [ "$SYSO" = "Cygwin" ]; then +if [ "$SYSO" = "Cygwin" -o "$SYSO" = "Msys" ]; then echo - echo "Cygwin detected, if compilation fails just update your installation." + echo "Cygwin/MSYS2 detected, if compilation fails just update your installation." echo WINDRES=`which windres` test -x "$WINDRES" && { From 3742af00bb76fc14c5e53ba6e5c4e832986d4857 Mon Sep 17 00:00:00 2001 From: owein Date: Wed, 9 Sep 2020 18:34:40 +0200 Subject: [PATCH 315/531] rebranded the bruteforce variation method --- Makefile | 92 ++++++++++++++++++++++++++++++++++++++++++++++++++++++-- bfg.c | 34 ++++++++++++--------- bfg.h | 4 ++- 3 files changed, 112 insertions(+), 18 deletions(-) diff --git a/Makefile b/Makefile index 372e67e..472a20f 100644 --- a/Makefile +++ b/Makefile @@ -1,5 +1,93 @@ -all: - @echo Error: you must run "./configure" first +STRIP=strip +XDEFINES= -DLIBOPENSSL -DLIBSSH -DHAVE_ZLIB -DHAVE_MATH_H +XLIBS= -lz -lssl -lssh -lcrypto +XLIBPATHS=-L/usr/lib -L/usr/local/lib -L/lib -L/lib/x86_64-linux-gnu +XIPATHS= +PREFIX=/usr/local +XHYDRA_SUPPORT= +STRIP=strip + +HYDRA_LOGO= +PWI_LOGO= +SEC=-pie -fPIE -fstack-protector-all --param ssp-buffer-size=4 -D_FORTIFY_SOURCE=2 -Wl,-z,now -Wl,-z,relro + +# +# Makefile for Hydra - (c) 2001-2019 by van Hauser / THC +# +OPTS=-I. -O3 -march=native -flto +# -Wall -g -pedantic +LIBS=-lm +BINDIR = /bin +MANDIR ?= /man/man1/ +DATADIR ?= /etc +DESTDIR ?= + +SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ + hydra-telnet.c hydra-cisco.c hydra-http.c hydra-ftp.c hydra-imap.c \ + hydra-pop3.c hydra-smb.c hydra-icq.c hydra-cisco-enable.c hydra-ldap.c \ + hydra-memcached.c hydra-mongodb.c hydra-mysql.c hydra-mssql.c hydra-xmpp.c \ + hydra-http-proxy-urlenum.c hydra-snmp.c hydra-cvs.c hydra-smtp.c \ + hydra-smtp-enum.c hydra-sapr3.c hydra-ssh.c hydra-sshkey.c hydra-teamspeak.c \ + hydra-postgres.c hydra-rsh.c hydra-rlogin.c hydra-oracle-listener.c \ + hydra-svn.c hydra-pcanywhere.c hydra-sip.c hydra-oracle.c hydra-vmauthd.c \ + hydra-asterisk.c hydra-firebird.c hydra-afp.c hydra-ncp.c hydra-rdp.c \ + hydra-oracle-sid.c hydra-http-proxy.c hydra-http-form.c hydra-irc.c \ + hydra-s7-300.c hydra-redis.c hydra-adam6500.c hydra-rtsp.c \ + hydra-rpcap.c hydra-radmin2.c \ + hydra-time.c crc32.c d3des.c bfg.c ntlm.c sasl.c hmacmd5.c hydra-mod.c +OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ + hydra-telnet.o hydra-cisco.o hydra-http.o hydra-ftp.o hydra-imap.o \ + hydra-pop3.o hydra-smb.o hydra-icq.o hydra-cisco-enable.o hydra-ldap.o \ + hydra-memcached.o hydra-mongodb.o hydra-mysql.o hydra-mssql.o hydra-xmpp.o \ + hydra-http-proxy-urlenum.o hydra-snmp.o hydra-cvs.o hydra-smtp.o \ + hydra-smtp-enum.o hydra-sapr3.o hydra-ssh.o hydra-sshkey.o hydra-teamspeak.o \ + hydra-postgres.o hydra-rsh.o hydra-rlogin.o hydra-oracle-listener.o \ + hydra-svn.o hydra-pcanywhere.o hydra-sip.o hydra-oracle-sid.o hydra-oracle.o \ + hydra-vmauthd.o hydra-asterisk.o hydra-firebird.o hydra-afp.o \ + hydra-ncp.o hydra-http-proxy.o hydra-http-form.o hydra-irc.o \ + hydra-redis.o hydra-rdp.o hydra-s7-300.c hydra-adam6500.o hydra-rtsp.o \ + hydra-rpcap.o hydra-radmin2.o \ + crc32.o d3des.o bfg.o ntlm.o sasl.o hmacmd5.o hydra-mod.o hydra-time.o +BINS = hydra pw-inspector + +EXTRA_DIST = README README.arm README.palm CHANGES TODO INSTALL LICENSE \ + hydra-mod.h hydra.h crc32.h d3des.h + +all: pw-inspector hydra $(XHYDRA_SUPPORT) + @echo + @echo Now type "make install" + +hydra: hydra.c $(OBJ) + $(CC) $(OPTS) $(SEC) $(LIBS) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o hydra $(HYDRA_LOGO) hydra.c $(OBJ) $(LIBS) $(XLIBS) $(XLIBPATHS) $(XIPATHS) $(XDEFINES) + @echo + @echo If men could get pregnant, abortion would be a sacrament + @echo + +xhydra: + -cd hydra-gtk && sh ./make_xhydra.sh + +pw-inspector: pw-inspector.c + -$(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o pw-inspector $(PWI_LOGO) pw-inspector.c + +.c.o: + $(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) -c $< $(XDEFINES) $(XIPATHS) + +strip: all + strip $(BINS) + -echo OK > /dev/null && test -x xhydra && strip xhydra || echo OK > /dev/null + +install: strip + -mkdir -p $(DESTDIR)$(PREFIX)$(BINDIR) + cp -f hydra-wizard.sh $(BINS) $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 hydra-wizard.sh $(BINS) + -echo OK > /dev/null && test -x xhydra && cp xhydra $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 xhydra || echo OK > /dev/null + -sed -e "s|^INSTALLDIR=.*|INSTALLDIR="$(PREFIX)"|" dpl4hydra.sh | sed -e "s|^LOCATION=.*|LOCATION="$(DATADIR)"|" > $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh + -chmod 755 $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh + -mkdir -p $(DESTDIR)$(PREFIX)$(DATADIR) + -cp -f *.csv $(DESTDIR)$(PREFIX)$(DATADIR) + -mkdir -p $(DESTDIR)$(PREFIX)$(MANDIR) + -cp -f hydra.1 xhydra.1 pw-inspector.1 $(DESTDIR)$(PREFIX)$(MANDIR) clean: + rm -rf xhydra pw-inspector hydra *.o core *.core *.stackdump *~ Makefile.in Makefile dev_rfc hydra.restore arm/*.ipk arm/ipkg/usr/bin/* hydra-gtk/src/*.o hydra-gtk/src/xhydra hydra-gtk/stamp-h hydra-gtk/config.status hydra-gtk/errors hydra-gtk/config.log hydra-gtk/src/.deps hydra-gtk/src/Makefile hydra-gtk/Makefile cp -f Makefile.orig Makefile + diff --git a/bfg.c b/bfg.c index 2ff9f9f..aaa1f73 100644 --- a/bfg.c +++ b/bfg.c @@ -52,12 +52,13 @@ static int32_t add_single_char(char ch, char flags, int32_t* crs_len) { // note that we check for -x .:.:ab but not for -x .:.:ba // int32_t bf_init(char *arg) { - bf_options.rain = 0; + bf_options.rotate = 0; + bf_options.strafe = 0; int32_t i = 0; int32_t crs_len = 0; char flags = 0; char *tmp = strchr(arg, ':'); - + if (!tmp) { fprintf(stderr, "Error: Invalid option format for -x\n"); return 1; @@ -163,10 +164,11 @@ int32_t bf_init(char *arg) { } } } - + bf_options.crs_len = crs_len; bf_options.current = bf_options.from; memset((char *) bf_options.state, 0, sizeof(bf_options.state)); + if (debug) printf("[DEBUG] bfg INIT: from %u, to %u, len: %u, set: %s\n", bf_options.from, bf_options.to, bf_options.crs_len, bf_options.crs); @@ -192,10 +194,10 @@ uint64_t bf_get_pcount() { int accu(int value) { - int i = 0; - for(int a=1; a<=value; ++a) + int i = 0, a; + for(a = 1; a <= value; ++a) { - i+=a; + i += a; } return i; } @@ -213,16 +215,18 @@ char *bf_next(_Bool rainy) { if(rainy) { - for (i = 0; i < bf_options.current; i++){ - bf_options.ptr[i] = bf_options.crs[(bf_options.state[i]+bf_options.rain)%bf_options.crs_len]; - bf_options.rain += i+1; + #if(mpl < 5) + #define strafeValue i + #else + #define strafeValue (strafe[loop]+i-(i%2)*(1-mpl%2)-1+charcount%2)%mpl + #endif + + for(i=0; i Date: Wed, 9 Sep 2020 18:38:07 +0200 Subject: [PATCH 316/531] help menu ok --- hydra.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra.c b/hydra.c index 6c58f58..f60a22d 100644 --- a/hydra.c +++ b/hydra.c @@ -555,7 +555,7 @@ void help_bfg() { " 'A' for uppercase letters, '1' for numbers, and for all others,\n" " just add their real representation.\n" " -y disable the use of the above letters as placeholders\n" - " -r use a formula to explode the linearity of the generation, without loss.\n\n" + " -r use a method to delinearize the bruteforce.\n\n" "Examples:\n" " -x 3:5:a generate passwords from length 3 to 5 with all lowercase letters\n" " -x 5:8:A1 generate passwords from length 5 to 8 with uppercase and numbers\n" From fd8e83d0b1c04da4189a6d2a9f1c00e5206fc64d Mon Sep 17 00:00:00 2001 From: owein Date: Wed, 9 Sep 2020 21:36:30 +0200 Subject: [PATCH 317/531] done --- bfg.c | 34 ++++++++++++++++------------------ 1 file changed, 16 insertions(+), 18 deletions(-) diff --git a/bfg.c b/bfg.c index aaa1f73..d27669e 100644 --- a/bfg.c +++ b/bfg.c @@ -1,5 +1,6 @@ -/* code original by Jan Dlabal , partially rewritten by vh */ +/* code original by Jan Dlabal , partially rewritten by vh, + rainy tweaks by yvain douard*/ #include #include @@ -192,15 +193,6 @@ uint64_t bf_get_pcount() { return foo; } -int accu(int value) -{ - int i = 0, a; - for(a = 1; a <= value; ++a) - { - i += a; - } - return i; -} char *bf_next(_Bool rainy) { int32_t i, pos = bf_options.current - 1; @@ -215,18 +207,22 @@ char *bf_next(_Bool rainy) { if(rainy) { - #if(mpl < 5) - #define strafeValue i - #else - #define strafeValue (strafe[loop]+i-(i%2)*(1-mpl%2)-1+charcount%2)%mpl - #endif - + int strafeValue; for(i=0; i 4) { + if(bf_options.current % 2) + strafeValue = (bf_options.strafe+i)%bf_options.current; + else + strafeValue = strafeValue = (i+bf_options.current/2+3)%bf_options.current; + } + else + strafeValue = i; + bf_options.ptr[i] = bf_options.crs[(bf_options.state[strafeValue] + bf_options.rotate) % bf_options.crs_len]; - bf_options.rotate += i%2+1; + bf_options.rotate += 1; bf_options.strafe += 3; } - bf_options.rotate -= accu(bf_options.current); + bf_options.rotate -= bf_options.current - 2 + bf_options.crs_len % 2; } else for (i = 0; i < bf_options.current; i++) @@ -243,6 +239,8 @@ char *bf_next(_Bool rainy) { while (pos >= 0 && (++bf_options.state[pos]) >= bf_options.crs_len) { bf_options.state[pos] = 0; pos--; + bf_options.strafe = 0; + bf_options.rotate = 0; } if (pos < 0) { From a6a87f11f43c7a5207b451363fe81a5310672d15 Mon Sep 17 00:00:00 2001 From: owein Date: Thu, 10 Sep 2020 10:57:06 +0200 Subject: [PATCH 318/531] fixed rotation broken due to a typo. --- bfg.c | 30 +++++++++++++++++------------- 1 file changed, 17 insertions(+), 13 deletions(-) diff --git a/bfg.c b/bfg.c index d27669e..896b307 100644 --- a/bfg.c +++ b/bfg.c @@ -207,22 +207,26 @@ char *bf_next(_Bool rainy) { if(rainy) { - int strafeValue; + int mpldisp = bf_options.current/2+3; + int mplmod2 = bf_options.current % 2; + int strafeIndex; for(i=0; i 4) { - if(bf_options.current % 2) - strafeValue = (bf_options.strafe+i)%bf_options.current; - else - strafeValue = strafeValue = (i+bf_options.current/2+3)%bf_options.current; - } - else - strafeValue = i; - - bf_options.ptr[i] = bf_options.crs[(bf_options.state[strafeValue] + bf_options.rotate) % bf_options.crs_len]; - bf_options.rotate += 1; + if(mplmod2) strafeIndex = (strafe[loop]+i)%bf_options.current; + else strafeIndex = (i+mpldisp)%bf_options.current; + + bf_options.ptr[i] = bf_options.crs[(bf_options.state[strafeIndex] + bf_options.rotate) % bf_options.crs_len]; + bf_options.rotate += i+1; bf_options.strafe += 3; } - bf_options.rotate -= bf_options.current - 2 + bf_options.crs_len % 2; + #define accu(i) \ + do { \ + int j; \ + for(j=1; j<=i; ++j) k += j; \ + } while(0) + + int k = 0; + accu(mpl); + bf_options.rotate[loop] -= k-4; } else for (i = 0; i < bf_options.current; i++) From 2514335bf98510dfc7bef889c84b467958c1c243 Mon Sep 17 00:00:00 2001 From: owein Date: Thu, 10 Sep 2020 12:45:35 +0200 Subject: [PATCH 319/531] clean --- Makefile | 92 ++------------------------------------------------------ 1 file changed, 2 insertions(+), 90 deletions(-) diff --git a/Makefile b/Makefile index 472a20f..372e67e 100644 --- a/Makefile +++ b/Makefile @@ -1,93 +1,5 @@ -STRIP=strip -XDEFINES= -DLIBOPENSSL -DLIBSSH -DHAVE_ZLIB -DHAVE_MATH_H -XLIBS= -lz -lssl -lssh -lcrypto -XLIBPATHS=-L/usr/lib -L/usr/local/lib -L/lib -L/lib/x86_64-linux-gnu -XIPATHS= -PREFIX=/usr/local -XHYDRA_SUPPORT= -STRIP=strip - -HYDRA_LOGO= -PWI_LOGO= -SEC=-pie -fPIE -fstack-protector-all --param ssp-buffer-size=4 -D_FORTIFY_SOURCE=2 -Wl,-z,now -Wl,-z,relro - -# -# Makefile for Hydra - (c) 2001-2019 by van Hauser / THC -# -OPTS=-I. -O3 -march=native -flto -# -Wall -g -pedantic -LIBS=-lm -BINDIR = /bin -MANDIR ?= /man/man1/ -DATADIR ?= /etc -DESTDIR ?= - -SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ - hydra-telnet.c hydra-cisco.c hydra-http.c hydra-ftp.c hydra-imap.c \ - hydra-pop3.c hydra-smb.c hydra-icq.c hydra-cisco-enable.c hydra-ldap.c \ - hydra-memcached.c hydra-mongodb.c hydra-mysql.c hydra-mssql.c hydra-xmpp.c \ - hydra-http-proxy-urlenum.c hydra-snmp.c hydra-cvs.c hydra-smtp.c \ - hydra-smtp-enum.c hydra-sapr3.c hydra-ssh.c hydra-sshkey.c hydra-teamspeak.c \ - hydra-postgres.c hydra-rsh.c hydra-rlogin.c hydra-oracle-listener.c \ - hydra-svn.c hydra-pcanywhere.c hydra-sip.c hydra-oracle.c hydra-vmauthd.c \ - hydra-asterisk.c hydra-firebird.c hydra-afp.c hydra-ncp.c hydra-rdp.c \ - hydra-oracle-sid.c hydra-http-proxy.c hydra-http-form.c hydra-irc.c \ - hydra-s7-300.c hydra-redis.c hydra-adam6500.c hydra-rtsp.c \ - hydra-rpcap.c hydra-radmin2.c \ - hydra-time.c crc32.c d3des.c bfg.c ntlm.c sasl.c hmacmd5.c hydra-mod.c -OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ - hydra-telnet.o hydra-cisco.o hydra-http.o hydra-ftp.o hydra-imap.o \ - hydra-pop3.o hydra-smb.o hydra-icq.o hydra-cisco-enable.o hydra-ldap.o \ - hydra-memcached.o hydra-mongodb.o hydra-mysql.o hydra-mssql.o hydra-xmpp.o \ - hydra-http-proxy-urlenum.o hydra-snmp.o hydra-cvs.o hydra-smtp.o \ - hydra-smtp-enum.o hydra-sapr3.o hydra-ssh.o hydra-sshkey.o hydra-teamspeak.o \ - hydra-postgres.o hydra-rsh.o hydra-rlogin.o hydra-oracle-listener.o \ - hydra-svn.o hydra-pcanywhere.o hydra-sip.o hydra-oracle-sid.o hydra-oracle.o \ - hydra-vmauthd.o hydra-asterisk.o hydra-firebird.o hydra-afp.o \ - hydra-ncp.o hydra-http-proxy.o hydra-http-form.o hydra-irc.o \ - hydra-redis.o hydra-rdp.o hydra-s7-300.c hydra-adam6500.o hydra-rtsp.o \ - hydra-rpcap.o hydra-radmin2.o \ - crc32.o d3des.o bfg.o ntlm.o sasl.o hmacmd5.o hydra-mod.o hydra-time.o -BINS = hydra pw-inspector - -EXTRA_DIST = README README.arm README.palm CHANGES TODO INSTALL LICENSE \ - hydra-mod.h hydra.h crc32.h d3des.h - -all: pw-inspector hydra $(XHYDRA_SUPPORT) - @echo - @echo Now type "make install" - -hydra: hydra.c $(OBJ) - $(CC) $(OPTS) $(SEC) $(LIBS) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o hydra $(HYDRA_LOGO) hydra.c $(OBJ) $(LIBS) $(XLIBS) $(XLIBPATHS) $(XIPATHS) $(XDEFINES) - @echo - @echo If men could get pregnant, abortion would be a sacrament - @echo - -xhydra: - -cd hydra-gtk && sh ./make_xhydra.sh - -pw-inspector: pw-inspector.c - -$(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o pw-inspector $(PWI_LOGO) pw-inspector.c - -.c.o: - $(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) -c $< $(XDEFINES) $(XIPATHS) - -strip: all - strip $(BINS) - -echo OK > /dev/null && test -x xhydra && strip xhydra || echo OK > /dev/null - -install: strip - -mkdir -p $(DESTDIR)$(PREFIX)$(BINDIR) - cp -f hydra-wizard.sh $(BINS) $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 hydra-wizard.sh $(BINS) - -echo OK > /dev/null && test -x xhydra && cp xhydra $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 xhydra || echo OK > /dev/null - -sed -e "s|^INSTALLDIR=.*|INSTALLDIR="$(PREFIX)"|" dpl4hydra.sh | sed -e "s|^LOCATION=.*|LOCATION="$(DATADIR)"|" > $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh - -chmod 755 $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh - -mkdir -p $(DESTDIR)$(PREFIX)$(DATADIR) - -cp -f *.csv $(DESTDIR)$(PREFIX)$(DATADIR) - -mkdir -p $(DESTDIR)$(PREFIX)$(MANDIR) - -cp -f hydra.1 xhydra.1 pw-inspector.1 $(DESTDIR)$(PREFIX)$(MANDIR) +all: + @echo Error: you must run "./configure" first clean: - rm -rf xhydra pw-inspector hydra *.o core *.core *.stackdump *~ Makefile.in Makefile dev_rfc hydra.restore arm/*.ipk arm/ipkg/usr/bin/* hydra-gtk/src/*.o hydra-gtk/src/xhydra hydra-gtk/stamp-h hydra-gtk/config.status hydra-gtk/errors hydra-gtk/config.log hydra-gtk/src/.deps hydra-gtk/src/Makefile hydra-gtk/Makefile cp -f Makefile.orig Makefile - From 14ee7f2c830061b4d8307a2b39fcd018e2a031a4 Mon Sep 17 00:00:00 2001 From: owein Date: Thu, 10 Sep 2020 13:02:46 +0200 Subject: [PATCH 320/531] typos again, too much copies and pastes... --- bfg.c | 6 +++--- hydra.h | 3 +-- 2 files changed, 4 insertions(+), 5 deletions(-) diff --git a/bfg.c b/bfg.c index cb0bc05..5e638c3 100644 --- a/bfg.c +++ b/bfg.c @@ -228,7 +228,7 @@ char *bf_next(_Bool rainy) { int mplmod2 = bf_options.current % 2; int strafeIndex; for(i=0; i Date: Fri, 11 Sep 2020 11:59:20 +0200 Subject: [PATCH 321/531] fixed min length --- bfg.c | 25 ++++++++++++++----------- 1 file changed, 14 insertions(+), 11 deletions(-) diff --git a/bfg.c b/bfg.c index 5e638c3..a3a6d68 100644 --- a/bfg.c +++ b/bfg.c @@ -224,16 +224,19 @@ char *bf_next(_Bool rainy) { if(rainy) { - int mpldisp = bf_options.current/2+3; - int mplmod2 = bf_options.current % 2; - int strafeIndex; - for(i=0; i 3) { + for(i=0; i Date: Tue, 29 Sep 2020 21:01:13 +0200 Subject: [PATCH 322/531] update efficient rain option --- bfg.c | 44 +++++++++++++++----------------------------- bfg.h | 3 --- 2 files changed, 15 insertions(+), 32 deletions(-) diff --git a/bfg.c b/bfg.c index a3a6d68..a06a93a 100644 --- a/bfg.c +++ b/bfg.c @@ -60,7 +60,6 @@ static int32_t add_single_char(char ch, char flags, int32_t *crs_len) { // int32_t bf_init(char *arg) { bf_options.rotate = 0; - bf_options.strafe = 0; int32_t i = 0; int32_t crs_len = 0; @@ -224,34 +223,16 @@ char *bf_next(_Bool rainy) { if(rainy) { - //only strafe the index above length 3 - if(bf_options.current > 3) { - for(i=0; i= 0 && (++bf_options.state[bf_options.current-1-pos]) >= bf_options.crs_len) { + bf_options.state[bf_options.current-1-pos] = 0; + pos--; + } + else while (pos >= 0 && (++bf_options.state[pos]) >= bf_options.crs_len) { bf_options.state[pos] = 0; pos--; - bf_options.strafe = 0; - bf_options.rotate = 0; } if (pos < 0) { diff --git a/bfg.h b/bfg.h index 38bbbc2..3ff0710 100644 --- a/bfg.h +++ b/bfg.h @@ -43,10 +43,7 @@ typedef struct { char *crs; /* internal representation of charset */ char *ptr; /* ptr to the last generated password */ uint32_t disable_symbols; - uint64_t rotate; - uint64_t strafe; - } bf_option; extern bf_option bf_options; From 490bd3e7cd38c637972331f2c6f512d7a6f86162 Mon Sep 17 00:00:00 2001 From: owein D Date: Wed, 30 Sep 2020 10:19:10 +0200 Subject: [PATCH 323/531] avoid negative values for the rotation variable --- bfg.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/bfg.c b/bfg.c index a06a93a..2677b47 100644 --- a/bfg.c +++ b/bfg.c @@ -230,7 +230,7 @@ char *bf_next(_Bool rainy) { bf_options.rotate += i+3; } //we don't subtract the same depending on wether the length is odd or even - for(i=1+bf_options.current%2; i<=bf_options.current; ++i) + for(i=1+bf_options.current%2; i Date: Fri, 2 Oct 2020 16:31:10 +0200 Subject: [PATCH 324/531] html_encode the + character --- hydra-http-form.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/hydra-http-form.c b/hydra-http-form.c index eb5a4ce..db1e84e 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -576,6 +576,8 @@ char *html_encode(char *string) { ret = hydra_strrep(ret, "#", "%23"); if (index(ret, '=') != NULL) ret = hydra_strrep(ret, "=", "%3D"); + if (index(ret, '+') != NULL) + ret = hydra_strrep(ret, "+", "%2B"); return ret; } From fc82b52505c66bf5f0bf7490e07710d3042c7a8c Mon Sep 17 00:00:00 2001 From: owein D Date: Mon, 5 Oct 2020 14:37:04 +0200 Subject: [PATCH 325/531] working algo after a change --- bfg.c | 48 ++++++++++++++++++++++++++++-------------------- bfg.h | 1 + 2 files changed, 29 insertions(+), 20 deletions(-) diff --git a/bfg.c b/bfg.c index 2677b47..6f9fdc4 100644 --- a/bfg.c +++ b/bfg.c @@ -59,8 +59,6 @@ static int32_t add_single_char(char ch, char flags, int32_t *crs_len) { // note that we check for -x .:.:ab but not for -x .:.:ba // int32_t bf_init(char *arg) { - bf_options.rotate = 0; - int32_t i = 0; int32_t crs_len = 0; char flags = 0; @@ -176,7 +174,9 @@ int32_t bf_init(char *arg) { bf_options.crs_len = crs_len; bf_options.current = bf_options.from; - + bf_options.strafe = 0; + bf_options.rotate = 0; + memset((char *) bf_options.state, 0, sizeof(bf_options.state)); if (debug) @@ -202,14 +202,6 @@ uint64_t bf_get_pcount() { return foo; } -int accu(int value) { - int i = 0, a; - for (a = 1; a <= value; ++a) { - i += a; - } - return i; -} - char *bf_next(_Bool rainy) { int32_t i, pos = bf_options.current - 1; @@ -223,16 +215,30 @@ char *bf_next(_Bool rainy) { if(rainy) { - //the first character cannot be taken into account - bf_options.ptr[0] = bf_options.crs[bf_options.state[0]]; - for(i=1; i 2) { + if(bf_options.current % 2) { + bf_options.ptr[0] = bf_options.crs[bf_options.state[0]]; + bf_options.ptr[1] = bf_options.crs[bf_options.state[1]]; + bf_options.ptr[2] = bf_options.crs[bf_options.state[2]]; + + for(i=3; i Date: Mon, 5 Oct 2020 14:45:07 +0200 Subject: [PATCH 326/531] if current < 4 --- bfg.c | 23 +++++++++++++---------- 1 file changed, 13 insertions(+), 10 deletions(-) diff --git a/bfg.c b/bfg.c index 6f9fdc4..c4838c4 100644 --- a/bfg.c +++ b/bfg.c @@ -215,7 +215,7 @@ char *bf_next(_Bool rainy) { if(rainy) { - if(bf_options.current > 2) { + if(bf_options.current > 3) { if(bf_options.current % 2) { bf_options.ptr[0] = bf_options.crs[bf_options.state[0]]; bf_options.ptr[1] = bf_options.crs[bf_options.state[1]]; @@ -226,17 +226,20 @@ char *bf_next(_Bool rainy) { bf_options.rotate ++; } } - } - else { - if(bf_options.current % 2) { - bf_options.ptr[0] = bf_options.crs[bf_options.state[0]]; - bf_options.ptr[1] = bf_options.crs[bf_options.state[1]]; - for(i=2; i Date: Thu, 8 Oct 2020 04:10:54 +0200 Subject: [PATCH 327/531] implement rain --- bfg.c | 44 ++++++++++++++------------------------------ bfg.h | 4 ++-- hydra.c | 5 +++-- 3 files changed, 19 insertions(+), 34 deletions(-) diff --git a/bfg.c b/bfg.c index c4838c4..a2bb1f5 100644 --- a/bfg.c +++ b/bfg.c @@ -174,8 +174,8 @@ int32_t bf_init(char *arg) { bf_options.crs_len = crs_len; bf_options.current = bf_options.from; - bf_options.strafe = 0; - bf_options.rotate = 0; + bf_options.rain = 0; + bf_options.gcounter = 0; memset((char *) bf_options.state, 0, sizeof(bf_options.state)); @@ -215,33 +215,18 @@ char *bf_next(_Bool rainy) { if(rainy) { - if(bf_options.current > 3) { - if(bf_options.current % 2) { - bf_options.ptr[0] = bf_options.crs[bf_options.state[0]]; - bf_options.ptr[1] = bf_options.crs[bf_options.state[1]]; - bf_options.ptr[2] = bf_options.crs[bf_options.state[2]]; - - for(i=3; i Date: Sat, 10 Oct 2020 18:52:04 +0200 Subject: [PATCH 328/531] slight modif that fixes all --- bfg.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/bfg.c b/bfg.c index a2bb1f5..ee70dfa 100644 --- a/bfg.c +++ b/bfg.c @@ -218,7 +218,7 @@ char *bf_next(_Bool rainy) { bf_options.ptr[0] = bf_options.crs[bf_options.state[0]]; for(i=2; i Date: Sat, 10 Oct 2020 19:49:02 +0200 Subject: [PATCH 329/531] this should be the last commit --- bfg.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/bfg.c b/bfg.c index ee70dfa..dcab78a 100644 --- a/bfg.c +++ b/bfg.c @@ -218,7 +218,7 @@ char *bf_next(_Bool rainy) { bf_options.ptr[0] = bf_options.crs[bf_options.state[0]]; for(i=2; i Date: Fri, 16 Oct 2020 13:49:07 +0200 Subject: [PATCH 330/531] fix http-post-form optional parameter parsing --- CHANGES | 8 +++++++- hydra-http-form.c | 36 +++++++++++++++++++----------------- hydra.c | 2 +- 3 files changed, 27 insertions(+), 19 deletions(-) diff --git a/CHANGES b/CHANGES index 8ca1b75..f537d9b 100644 --- a/CHANGES +++ b/CHANGES @@ -1,8 +1,14 @@ Changelog for hydra ------------------- -Release 9.1-dev + +Release 9.2-dev +* fix for http-post-form optional parameters * enable gcc 10 support for xhydra too :) +* msys support + + +Release 9.1-dev * rdb: support for libfreerdp3 (thanks to animetauren) * new module: smb2 which also supports smb3 (uses libsmbclient-dev) (thanks to Karim Kanso for the module!) * oracle: added success condition (thanks to kazkansouh), compile on Cygwin (thanks to maaaaz) diff --git a/hydra-http-form.c b/hydra-http-form.c index eb5a4ce..92d5a9f 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -400,6 +400,10 @@ int32_t parse_options(char *miscptr, ptr_header_node *ptr_head) { * Beware of the backslashes (\)! */ while (*miscptr != 0) { + if (strlen(miscptr) < 3 || miscptr[1] != '=') { + hydra_report(stderr, "[ERROR] optional parameters must have the format X=value: %s\n", miscptr); + return 0; + } switch (miscptr[0]) { case 'a': // fall through case 'A': // only for http, not http-form! @@ -504,7 +508,9 @@ int32_t parse_options(char *miscptr, ptr_header_node *ptr_head) { // Error: abort execution hydra_report(stderr, "[ERROR] Out of memory for HTTP headers (H).\n"); return 0; - // no default + default: + hydra_report(stderr, "[ERROR] no valid optional parameter type given: %c\n", miscptr[0]); + return 0; } } return 1; @@ -1197,7 +1203,7 @@ void service_http_get_form(char *ip, int32_t sp, unsigned char options, char *mi service_http_form(ip, sp, options, miscptr, fp, port, hostname, "GET", &ptr_head, &ptr_cookie); else { hydra_report(stderr, "[ERROR] Could not launch head. Error while initializing.\n"); - hydra_child_exit(1); + hydra_child_exit(2); } } @@ -1209,7 +1215,7 @@ void service_http_post_form(char *ip, int32_t sp, unsigned char options, char *m service_http_form(ip, sp, options, miscptr, fp, port, hostname, "POST", &ptr_head, &ptr_cookie); else { hydra_report(stderr, "[ERROR] Could not launch head. Error while initializing.\n"); - hydra_child_exit(1); + hydra_child_exit(2); } } @@ -1224,6 +1230,8 @@ int32_t service_http_form_init(char *ip, int32_t sp, unsigned char options, char // 0 all OK // -1 error, hydra will exit, so print a good error message here + if (initialize(ip, options, miscptr) == NULL) return 1; + return 0; } @@ -1281,22 +1289,16 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { ptr++; if (*ptr != 0) *ptr++ = 0; + cond = ptr; - if ((ptr2 = rindex(ptr, ':')) != NULL) { - cond = ptr2 + 1; - *ptr2 = 0; + if ((ptr2 = index(ptr, ':')) != NULL) { + *ptr2++ = 0; + if (*ptr2) + optional1 = ptr2; + else + optional1 = NULL; } else - cond = ptr; - /* - while (*ptr != 0 && (*ptr != ':' || *(ptr - 1) == '\\')) - ptr++; - if (*ptr != 0) - *ptr++ = 0; - */ - if (ptr == cond) optional1 = NULL; - else - optional1 = ptr; if (strstr(url, "\\:") != NULL) { if ((ptr = malloc(strlen(url))) != NULL) { @@ -1332,7 +1334,7 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { sprintf(cookieurl, "%.1000s", url); // conditions now have to contain F or S to set the fail or success condition - if (*cond != 0 && (strpos(cond, "F=") == 0)) { + if (strpos(cond, "F=") == 0) { success_cond = 0; cond += 2; } else if (*cond != 0 && (strpos(cond, "S=") == 0)) { diff --git a/hydra.c b/hydra.c index 4971317..ac3511e 100644 --- a/hydra.c +++ b/hydra.c @@ -225,7 +225,7 @@ char *SERVICES = "adam6500 asterisk afp cisco cisco-enable cvs firebird ftp[s] " #define RESTOREFILE "./hydra.restore" #define PROGRAM "Hydra" -#define VERSION "v9.1" +#define VERSION "v9.2-dev" #define AUTHOR "van Hauser/THC" #define EMAIL "" #define AUTHOR2 "David Maciejak" From be654c6bac504dc4912f087b2025d3596c27f093 Mon Sep 17 00:00:00 2001 From: ddeka2910 <60925700+ddeka2910@users.noreply.github.com> Date: Tue, 20 Oct 2020 21:02:17 +0530 Subject: [PATCH 331/531] As is --- .travis.yml | 1 + 1 file changed, 1 insertion(+) diff --git a/.travis.yml b/.travis.yml index 19f1e15..7985412 100644 --- a/.travis.yml +++ b/.travis.yml @@ -1,3 +1,4 @@ + language: c sudo: required dist: trusty From 2d0723b281da199bb539064bc8e48e21f13d7c31 Mon Sep 17 00:00:00 2001 From: ddeka2910 <60925700+ddeka2910@users.noreply.github.com> Date: Tue, 20 Oct 2020 21:04:31 +0530 Subject: [PATCH 332/531] Add architecture ppc64le to travis build --- .travis.yml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/.travis.yml b/.travis.yml index 7985412..ad0b541 100644 --- a/.travis.yml +++ b/.travis.yml @@ -1,10 +1,12 @@ - language: c sudo: required dist: trusty os: - linux - osx +arch: + - amd64 + - ppc64le compiler: - clang - gcc From 5e98fe23e79803b6a50898e35e532f0273e4f271 Mon Sep 17 00:00:00 2001 From: owein Date: Thu, 22 Oct 2020 02:35:46 +0200 Subject: [PATCH 333/531] see https://github.com/e2002e/zhou --- bfg.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/bfg.c b/bfg.c index dcab78a..b146bd4 100644 --- a/bfg.c +++ b/bfg.c @@ -218,10 +218,10 @@ char *bf_next(_Bool rainy) { bf_options.ptr[0] = bf_options.crs[bf_options.state[0]]; for(i=2; i Date: Mon, 9 Nov 2020 19:25:26 +0100 Subject: [PATCH 334/531] up to last fix --- bfg.c | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/bfg.c b/bfg.c index b146bd4..8a6428a 100644 --- a/bfg.c +++ b/bfg.c @@ -215,13 +215,13 @@ char *bf_next(_Bool rainy) { if(rainy) { - bf_options.ptr[0] = bf_options.crs[bf_options.state[0]]; - for(i=2; i Date: Mon, 9 Nov 2020 19:41:00 +0100 Subject: [PATCH 335/531] lqst commit --- bfg.c | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-) diff --git a/bfg.c b/bfg.c index 8a6428a..bdb221c 100644 --- a/bfg.c +++ b/bfg.c @@ -237,10 +237,12 @@ char *bf_next(_Bool rainy) { } //we revert the ordering of the bruteforce to fix the first static character - if(rainy) - while (pos >= 0 && (++bf_options.state[bf_options.current-1-pos]) >= bf_options.crs_len) { - bf_options.state[bf_options.current-1-pos] = 0; - pos--; + if(rainy) { + pos = 0; + while (pos < bf_options.current && (++bf_options.state[pos]) >= bf_options.crs_len) { + bf_options.state[pos] = 0; + pos++; + } } else while (pos >= 0 && (++bf_options.state[pos]) >= bf_options.crs_len) { @@ -248,7 +250,7 @@ char *bf_next(_Bool rainy) { pos--; } - if (pos < 0) { + if (pos < 0 || pos >= bf_options.current) { bf_options.current++; bf_options.rain = 0; memset((char *)bf_options.state, 0, sizeof(bf_options.state)); From 1df1d63c4fcc44d0cb1c0384a71120dfb0de3ff1 Mon Sep 17 00:00:00 2001 From: Karim Kanso Date: Wed, 11 Nov 2020 11:18:04 +0000 Subject: [PATCH 336/531] smb2: fix parsing of miscptr --- hydra-smb2.c | 20 +++++++++++++++++++- 1 file changed, 19 insertions(+), 1 deletion(-) diff --git a/hydra-smb2.c b/hydra-smb2.c index a09490d..7c22bf1 100644 --- a/hydra-smb2.c +++ b/hydra-smb2.c @@ -126,8 +126,13 @@ bool smb2_run_test(creds_t *cr, const char *server, uint16_t port) { */ switch (errno) { + case ENOENT: + // Noticed this when connecting to older samba servers on linux + // where any credentials are accepted. + hydra_report(stderr, "[WARNING] %s might accept any credential\n", server); case EINVAL: // 22 - // probably password ok + // probably password ok, nominal case when connecting to a windows + // smb server with good credentials. smbc_free_context(ctx, 1); return true; break; @@ -147,6 +152,9 @@ bool smb2_run_test(creds_t *cr, const char *server, uint16_t port) { case ECONNREFUSED: // there are probably more codes that could be added here to // indicate connection errors. + hydra_report(stderr, + "[ERROR] Error %s (%d) while connecting to %s\n", + strerror(errno), errno, server); smbc_free_context(ctx, 1); EXIT_CONNECTION_ERROR; break; @@ -202,6 +210,11 @@ int32_t service_smb2_init(char *ip, int32_t sp, unsigned char options, char *mis continue; } if (CMP(tkn_workgroup, miscptr)) { + if (workgroup != default_workgroup) { + // miscptr has already been processed, goto end + miscptr += strlen(miscptr) + 1; + continue; + } miscptr += sizeof(tkn_workgroup) - 1; char *p = strchr(miscptr, '}'); if (p == NULL) { @@ -217,6 +230,11 @@ int32_t service_smb2_init(char *ip, int32_t sp, unsigned char options, char *mis continue; } if (CMP(tkn_netbios, miscptr)) { + if (netbios_name != NULL) { + // miscptr has already been processed, goto end + miscptr += strlen(miscptr) + 1; + continue; + } miscptr += sizeof(tkn_netbios) - 1; char *p = strchr(miscptr, '}'); if (p == NULL) { From 981e19852b5aa6af7de88ddd82c360299c5f8109 Mon Sep 17 00:00:00 2001 From: Karim Kanso Date: Wed, 11 Nov 2020 15:55:23 +0000 Subject: [PATCH 337/531] www-form: normalise webtarget --- hydra-http-form.c | 73 +++++++++++++++++++++-------------------------- 1 file changed, 33 insertions(+), 40 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 88f2e6b..5e9d863 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -78,7 +78,7 @@ int32_t auth_flag = 0; char cookie[4096] = "", cmiscptr[1024]; -int32_t webport, freemischttpform = 0; +int32_t webport; char bufferurl[6096 + 24], cookieurl[6096 + 24] = "", userheader[6096 + 24] = "", *url, *variables, *optional1; #define MAX_REDIRECT 8 @@ -1133,9 +1133,6 @@ void service_http_form(char *ip, int32_t sp, unsigned char options, char *miscpt while (1) { if (run == 2) { if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) { - if (freemischttpform) - free(miscptr); - freemischttpform = 0; hydra_child_exit(1); } } @@ -1157,9 +1154,6 @@ void service_http_form(char *ip, int32_t sp, unsigned char options, char *miscpt } if (sock < 0) { hydra_report(stderr, "[ERROR] Child with pid %d terminating, cannot connect\n", (int32_t)getpid()); - if (freemischttpform) - free(miscptr); - freemischttpform = 0; hydra_child_exit(1); } next_run = 2; @@ -1171,30 +1165,19 @@ void service_http_form(char *ip, int32_t sp, unsigned char options, char *miscpt case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); - if (freemischttpform) - free(miscptr); - freemischttpform = 0; hydra_child_exit(0); break; case 4: /* silent error exit */ if (sock >= 0) sock = hydra_disconnect(sock); - if (freemischttpform) - free(miscptr); - freemischttpform = 0; hydra_child_exit(1); break; default: - if (freemischttpform) - free(miscptr); - freemischttpform = 0; hydra_report(stderr, "[ERROR] Caught unknown return code, exiting!\n"); hydra_child_exit(0); } run = next_run; } - if (freemischttpform) - free(miscptr); } void service_http_get_form(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { @@ -1240,35 +1223,21 @@ int32_t service_http_form_init(char *ip, int32_t sp, unsigned char options, char ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { ptr_header_node ptr_head = NULL; char *ptr, *ptr2, *proxy_string; +#ifdef AF_INET6 + unsigned char addr6 [sizeof(struct in6_addr)]; +#endif if (use_proxy > 0 && proxy_count > 0) selected_proxy = random() % proxy_count; - if (webtarget != NULL && (webtarget = strstr(miscptr, "://")) != NULL) { - webtarget += strlen("://"); - if ((ptr2 = index(webtarget, ':')) != NULL) { /* step over port if present */ - *ptr2 = 0; - ptr2++; - ptr = ptr2; - if (*ptr == '/' || (ptr = index(ptr2, '/')) != NULL) - miscptr = ptr; - else - miscptr = slash; /* to make things easier to user */ - } else if ((ptr2 = index(webtarget, '/')) != NULL) { - if (freemischttpform == 0) { - if ((miscptr = malloc(strlen(ptr2) + 1)) != NULL) { - freemischttpform = 1; - strcpy(miscptr, ptr2); - *ptr2 = 0; - } - } - } else - webtarget = NULL; + if (webtarget) { + free(webtarget); + webtarget = NULL; } - if (cmdlinetarget != NULL && webtarget == NULL) + if (cmdlinetarget != NULL) webtarget = cmdlinetarget; - else if (webtarget == NULL && cmdlinetarget == NULL) + else webtarget = hydra_address2string(ip); if (port != 0) webport = port; @@ -1277,6 +1246,29 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { else webport = PORT_HTTP_SSL; + /* normalise the webtarget for ipv6/port number */ + ptr = malloc(strlen(webtarget) + 1 /* null */ + 6 /* :65535 */ +#ifdef AF_INET6 + + 2 /* [] */ +#endif + ); +#ifdef AF_INET6 + /* let libc decide if target is an ipv6 address */ + if (inet_pton(AF_INET6, webtarget, addr6)) { + ptr2 = ptr + sprintf(ptr, "[%s]", webtarget); + } else { +#endif + ptr2 = ptr + sprintf(ptr, "%s", webtarget); +#ifdef AF_INET6 + } +#endif + if (options & OPTION_SSL && webport != PORT_HTTP_SSL || + !(options & OPTION_SSL) && webport != PORT_HTTP) { + sprintf(ptr2, ":%d", webport); + } + webtarget = ptr; + ptr = ptr2 = NULL; + sprintf(bufferurl, "%.6096s", miscptr); url = bufferurl; ptr = url; @@ -1411,6 +1403,7 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { normal_request = stringify_headers(&ptr_head); } } + return ptr_head; } From 7f19248e3495a60edc2ecd33c1e797f65689ee0e Mon Sep 17 00:00:00 2001 From: Karim Kanso Date: Thu, 12 Nov 2020 15:27:08 +0000 Subject: [PATCH 338/531] resolve compiler warnings identified by gcc 9.3.0 --- hydra-http-form.c | 2 +- hydra.c | 4 ---- 2 files changed, 1 insertion(+), 5 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 5e9d863..e6074cf 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -1039,7 +1039,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options } if (strrchr(url, ':') == NULL && port != 80) { - sprintf(str2, "%s:%d", str2, port); + sprintf(str2, "%.2040s:%d", str2, port); } if (verbose) diff --git a/hydra.c b/hydra.c index ac3511e..9efbc05 100644 --- a/hydra.c +++ b/hydra.c @@ -610,10 +610,6 @@ void help_bfg() { void module_usage() { int32_t i; - if (!hydra_options.service) { - printf("The Module %s does not need or support optional parameters\n", hydra_options.service); - exit(0); - } printf("\nHelp for module " "%s:\n================================================================" From 78b3358862da15587bc8c2d75caa4a3030d8bb26 Mon Sep 17 00:00:00 2001 From: owein Date: Thu, 12 Nov 2020 17:06:53 +0100 Subject: [PATCH 339/531] profound mangling --- bfg.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/bfg.c b/bfg.c index bdb221c..80e7392 100644 --- a/bfg.c +++ b/bfg.c @@ -219,9 +219,9 @@ char *bf_next(_Bool rainy) { bf_options.ptr[0] = bf_options.crs[bf_options.state[0]]; for(i=1; i Date: Sat, 14 Nov 2020 14:20:00 +0100 Subject: [PATCH 340/531] uptodate with rainycrack --- bfg.c | 13 +++++++++++-- 1 file changed, 11 insertions(+), 2 deletions(-) diff --git a/bfg.c b/bfg.c index 80e7392..912b61c 100644 --- a/bfg.c +++ b/bfg.c @@ -202,6 +202,14 @@ uint64_t bf_get_pcount() { return foo; } + +int accu(int x) { + int a = 0, b; + for(b=1; b Date: Fri, 4 Dec 2020 12:50:46 +0100 Subject: [PATCH 341/531] cleanup --- bfg.c | 11 +---------- 1 file changed, 1 insertion(+), 10 deletions(-) diff --git a/bfg.c b/bfg.c index 912b61c..0d670dd 100644 --- a/bfg.c +++ b/bfg.c @@ -202,14 +202,6 @@ uint64_t bf_get_pcount() { return foo; } - -int accu(int x) { - int a = 0, b; - for(b=1; b Date: Sat, 26 Dec 2020 16:42:57 +0000 Subject: [PATCH 342/531] www: normalise webtarget --- hydra-http.c | 54 ++++++++++++++++++++++++++-------------------------- 1 file changed, 27 insertions(+), 27 deletions(-) diff --git a/hydra-http.c b/hydra-http.c index a269e71..c487144 100644 --- a/hydra-http.c +++ b/hydra-http.c @@ -10,7 +10,7 @@ char *http_buf = NULL; static char end_condition[END_CONDITION_MAX_LEN]; int end_condition_type = -1; -int32_t webport, freemischttp = 0; +int32_t webport; int32_t http_auth_mechanism = AUTH_UNASSIGNED; int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp, char *type, ptr_header_node ptr_head) { @@ -313,32 +313,16 @@ void service_http(char *ip, int32_t sp, unsigned char options, char *miscptr, FI int32_t myport = PORT_HTTP, mysslport = PORT_HTTP_SSL; char *ptr, *ptr2; ptr_header_node ptr_head = NULL; +#ifdef AF_INET6 + unsigned char addr6 [sizeof(struct in6_addr)]; +#endif hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) return; - if ((webtarget = strstr(miscptr, "://")) != NULL) { - webtarget += strlen("://"); - if ((ptr2 = index(webtarget, ':')) != NULL) { /* step over port if present */ - *ptr2 = 0; - ptr2++; - ptr = ptr2; - if (*ptr == '/' || (ptr = index(ptr2, '/')) != NULL) - miscptr = ptr; - else - miscptr = slash; /* to make things easier to user */ - } else if ((ptr2 = index(webtarget, '/')) != NULL) { - miscptr = malloc(strlen(ptr2) + 1); - freemischttp = 1; - strcpy(miscptr, ptr2); - *ptr2 = 0; - } else - webtarget = hostname; - } else if (strlen(miscptr) == 0) + if (strlen(miscptr) == 0) miscptr = strdup("/"); - if (webtarget == NULL) - webtarget = hostname; if (port != 0) webport = port; else if ((options & OPTION_SSL) == 0) @@ -346,6 +330,28 @@ void service_http(char *ip, int32_t sp, unsigned char options, char *miscptr, FI else webport = mysslport; + /* normalise the webtarget for ipv6/port number */ + webtarget = malloc(strlen(hostname) + 1 /* null */ + 6 /* :65535 */ +#ifdef AF_INET6 + + 2 /* [] */ +#endif + ); +#ifdef AF_INET6 + /* let libc decide if target is an ipv6 address */ + if (inet_pton(AF_INET6, hostname, addr6)) { + ptr = webtarget + sprintf(webtarget, "[%s]", hostname); + } else { +#endif + ptr = webtarget + sprintf(webtarget, "%s", hostname); +#ifdef AF_INET6 + } +#endif + if (options & OPTION_SSL && webport != PORT_HTTP_SSL || + !(options & OPTION_SSL) && webport != PORT_HTTP) { + sprintf(ptr, ":%d", webport); + } + ptr = NULL; + /* Advance to options string */ ptr = miscptr; while (*ptr != 0 && (*ptr != ':' || *(ptr - 1) == '\\')) @@ -380,8 +386,6 @@ void service_http(char *ip, int32_t sp, unsigned char options, char *miscptr, FI port = mysslport; } if (sock < 0) { - if (freemischttp) - free(miscptr); if (quiet != 1) fprintf(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); hydra_child_exit(1); @@ -395,13 +399,9 @@ void service_http(char *ip, int32_t sp, unsigned char options, char *miscptr, FI case 3: /* clean exit */ if (sock >= 0) sock = hydra_disconnect(sock); - if (freemischttp) - free(miscptr); hydra_child_exit(0); return; default: - if (freemischttp) - free(miscptr); fprintf(stderr, "[ERROR] Caught unknown return code, exiting!\n"); hydra_child_exit(0); } From 09f6a71e844871c660de6060dd2d2ae0938874ea Mon Sep 17 00:00:00 2001 From: van Hauser Date: Fri, 1 Jan 2021 12:20:49 +0100 Subject: [PATCH 343/531] 2021 --- CHANGES | 2 ++ README.md | 4 ++-- hydra-smb2.c | 2 +- hydra.1 | 2 +- hydra.c | 5 +++-- 5 files changed, 9 insertions(+), 6 deletions(-) diff --git a/CHANGES b/CHANGES index f537d9b..8a36029 100644 --- a/CHANGES +++ b/CHANGES @@ -6,6 +6,8 @@ Release 9.2-dev * fix for http-post-form optional parameters * enable gcc 10 support for xhydra too :) * msys support +* fix for rain mode (-r) +* IPv6 support for Host: header for http based modules Release 9.1-dev diff --git a/README.md b/README.md index fa214d9..322da43 100644 --- a/README.md +++ b/README.md @@ -1,7 +1,7 @@ H Y D R A - (c) 2001-2020 by van Hauser / THC + (c) 2001-2021 by van Hauser / THC https://github.com/vanhauser-thc/thc-hydra many modules were written by David (dot) Maciejak @ gmail (dot) com BFG code by Jan Dlabal @@ -382,7 +382,7 @@ Version 1.00 example: "These are very free form" ], "generator": { - "built": "2020-03-01 14:44:22", + "built": "2021-03-01 14:44:22", "commandline": "hydra -b jsonv1 -o results.json ... ...", "jsonoutputversion": "1.00", "server": "127.0.0.1", diff --git a/hydra-smb2.c b/hydra-smb2.c index 7c22bf1..31e211d 100644 --- a/hydra-smb2.c +++ b/hydra-smb2.c @@ -13,7 +13,7 @@ * along with this program. If not, see . * * - * Copyright (C) 2020 Karim Kanso, all rights reserved. + * Copyright (C) 2021 Karim Kanso, all rights reserved. * kaz 'dot' kanso 'at' g mail 'dot' com */ diff --git a/hydra.1 b/hydra.1 index 912533f..039d55f 100644 --- a/hydra.1 +++ b/hydra.1 @@ -1,4 +1,4 @@ -.TH "HYDRA" "1" "01/01/2020" +.TH "HYDRA" "1" "01/01/2021" .SH NAME hydra \- a very fast network logon cracker which supports many different services .SH SYNOPSIS diff --git a/hydra.c b/hydra.c index 852d0de..3695110 100644 --- a/hydra.c +++ b/hydra.c @@ -1,5 +1,5 @@ /* - * hydra (c) 2001-2020 by van Hauser / THC + * hydra (c) 2001-2021 by van Hauser / THC * https://github.com/vanhauser-thc/thc-hydra * * Parallized network login hacker. @@ -11,6 +11,7 @@ */ #include "hydra.h" #include "bfg.h" +#include #ifdef LIBNCURSES #include @@ -2151,7 +2152,7 @@ int main(int argc, char *argv[]) { struct sockaddr_in6 *ipv6 = NULL; struct sockaddr_in *ipv4 = NULL; - printf("%s %s (c) 2020 by %s & %s - Please do not use in military or secret " + printf("%s %s (c) 2021 by %s & %s - Please do not use in military or secret " "service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).\n\n", PROGRAM, VERSION, AUTHOR, AUTHOR2); #ifndef LIBAFP From 04076995835e57df234d6a994ec20673878f96a9 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Fri, 29 Jan 2021 10:23:27 +0100 Subject: [PATCH 344/531] Update issue templates --- .github/ISSUE_TEMPLATE/bug_report.md | 37 +++++++++++++++++++++++ .github/ISSUE_TEMPLATE/feature_request.md | 20 ++++++++++++ 2 files changed, 57 insertions(+) create mode 100644 .github/ISSUE_TEMPLATE/bug_report.md create mode 100644 .github/ISSUE_TEMPLATE/feature_request.md diff --git a/.github/ISSUE_TEMPLATE/bug_report.md b/.github/ISSUE_TEMPLATE/bug_report.md new file mode 100644 index 0000000..78bd469 --- /dev/null +++ b/.github/ISSUE_TEMPLATE/bug_report.md @@ -0,0 +1,37 @@ +--- +name: Bug report +about: Create a report to help us improve +title: '' +labels: '' +assignees: '' + +--- + +**IMPORTANT** +This is just for reporting *BUGS* not help on how to hack, how to use hydra, command line options or how to get it compiled. Please search for help via search engines. Issues asking for this here will be closed. + +**Describe the bug** +A clear and concise description of what the bug is. + +**To Reproduce** + * Ensure that you have tested the bug to be present in the current github code. You might be using an outdated version that comes with your Linux distribution! + * You must provide full command line options. + +Steps to reproduce the behavior: +1. ... +2. ... +3. ... + +**Expected behavior** +A clear and concise description of what you expected to happen. + +**Screenshots** +If applicable, add screenshots to help explain your problem. +Note that all messages must be in *English*, not in Chinese, Russian, etc. + +**Desktop (please complete the following information):** + - OS: [e.g. Ubuntu 20.04] + - hydra version [e.g. current github state] + +**Additional context** +Add any other context about the problem here. diff --git a/.github/ISSUE_TEMPLATE/feature_request.md b/.github/ISSUE_TEMPLATE/feature_request.md new file mode 100644 index 0000000..bbcbbe7 --- /dev/null +++ b/.github/ISSUE_TEMPLATE/feature_request.md @@ -0,0 +1,20 @@ +--- +name: Feature request +about: Suggest an idea for this project +title: '' +labels: '' +assignees: '' + +--- + +**Is your feature request related to a problem? Please describe.** +A clear and concise description of what the problem is. Ex. I'm always frustrated when [...] + +**Describe the solution you'd like** +A clear and concise description of what you want to happen. + +**Describe alternatives you've considered** +A clear and concise description of any alternative solutions or features you've considered. + +**Additional context** +Add any other context or screenshots about the feature request here. From 51da37bfd87c17e2b246f7a1a003b4b1044954d6 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Fri, 29 Jan 2021 10:29:28 +0100 Subject: [PATCH 345/531] Update issue templates --- .github/ISSUE_TEMPLATE/feature_request.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/.github/ISSUE_TEMPLATE/feature_request.md b/.github/ISSUE_TEMPLATE/feature_request.md index bbcbbe7..d0c19f8 100644 --- a/.github/ISSUE_TEMPLATE/feature_request.md +++ b/.github/ISSUE_TEMPLATE/feature_request.md @@ -7,6 +7,9 @@ assignees: '' --- +**IMPORTANT** +Please note that hydra is still maintained however not actively developed. If you would like to see specific feature here it it recommended implement it yourself and send a pull request - or look for someone to do that for you :-) + **Is your feature request related to a problem? Please describe.** A clear and concise description of what the problem is. Ex. I'm always frustrated when [...] From ac2fd35b4f3a8965db344b27033a601fca7a7d7d Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Fri, 19 Feb 2021 09:19:05 +0100 Subject: [PATCH 346/531] allow configure to pick up PKG_CONFIG --- configure | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/configure b/configure index ae81322..139c9bf 100755 --- a/configure +++ b/configure @@ -17,10 +17,12 @@ if [ "$1" = "-h" -o "$1" = "--help" ]; then echo " --help this here" echo echo If the CC environment variable is set, this is used as the compiler for the configure tests. The default is \"gcc\" otherwise. + echo You can also set PKG_CONFIG if necessary. exit 0 fi test -z "$CC" && CC=gcc +test -z "$PKG_CONFIG" && PKG_CONFIG=pkg-config FHS="" SIXFOUR="" @@ -1305,9 +1307,9 @@ echo "Checking for smbclient (libsmbclient/libsmbclient.h) ..." if [ "X" = "X$XHYDRA_SUPPORT" ]; then echo "Checking for GUI req's (pkg-config/gtk+-2.0) ..." - XHYDRA_SUPPORT=`pkg-config --help > /dev/null 2>&1 || echo disabled` + XHYDRA_SUPPORT=`$PKG_CONFIG --help > /dev/null 2>&1 || echo disabled` if [ "X" = "X$XHYDRA_SUPPORT" ]; then - XHYDRA_SUPPORT=`pkg-config --modversion gtk+-2.0 2> /dev/null` + XHYDRA_SUPPORT=`$PKG_CONFIG --modversion gtk+-2.0 2> /dev/null` else XHYDRA_SUPPORT="" fi From f423875d900b84673708bbab496593507483760a Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Thu, 11 Mar 2021 14:00:00 +0100 Subject: [PATCH 347/531] remove rain mode --- bfg.c | 29 +++-------------------------- bfg.h | 4 +--- hydra.c | 7 +++---- hydra.h | 1 - 4 files changed, 7 insertions(+), 34 deletions(-) diff --git a/bfg.c b/bfg.c index 0d670dd..d9667e6 100644 --- a/bfg.c +++ b/bfg.c @@ -1,6 +1,5 @@ -/* code original by Jan Dlabal , partially rewritten by vh, - rainy tweaks by owein */ +/* code original by Jan Dlabal , partially rewritten by vh. */ #include #include @@ -174,8 +173,6 @@ int32_t bf_init(char *arg) { bf_options.crs_len = crs_len; bf_options.current = bf_options.from; - bf_options.rain = 0; - bf_options.gcounter = 0; memset((char *) bf_options.state, 0, sizeof(bf_options.state)); @@ -202,7 +199,7 @@ uint64_t bf_get_pcount() { return foo; } -char *bf_next(_Bool rainy) { +char *bf_next() { int32_t i, pos = bf_options.current - 1; if (bf_options.current > bf_options.to) @@ -213,18 +210,7 @@ char *bf_next(_Bool rainy) { return NULL; } - if(rainy) - { - bf_options.rain = bf_options.gcounter; - bf_options.ptr[0] = bf_options.crs[bf_options.state[0]]; - for(i=1; i= bf_options.crs_len) { - bf_options.state[pos] = 0; - pos++; - } - } - else while (pos >= 0 && (++bf_options.state[pos]) >= bf_options.crs_len) { bf_options.state[pos] = 0; pos--; @@ -252,7 +230,6 @@ char *bf_next(_Bool rainy) { if (pos < 0 || pos >= bf_options.current) { bf_options.current++; - bf_options.rain = 0; memset((char *)bf_options.state, 0, sizeof(bf_options.state)); } diff --git a/bfg.h b/bfg.h index 602cee6..6d11aee 100644 --- a/bfg.h +++ b/bfg.h @@ -43,8 +43,6 @@ typedef struct { char *crs; /* internal representation of charset */ char *ptr; /* ptr to the last generated password */ uint32_t disable_symbols; - uint64_t rain; - uint64_t gcounter; } bf_option; extern bf_option bf_options; @@ -52,7 +50,7 @@ extern bf_option bf_options; #ifdef HAVE_MATH_H extern uint64_t bf_get_pcount(); extern int32_t bf_init(char *arg); -extern char *bf_next(_Bool rainy); +extern char *bf_next(); #endif #endif diff --git a/hydra.c b/hydra.c index 3695110..9e1268a 100644 --- a/hydra.c +++ b/hydra.c @@ -1780,7 +1780,7 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { #ifndef HAVE_MATH_H sleep(1); #else - hydra_targets[target_no]->pass_ptr = bf_next(hydra_options.rainy); + hydra_targets[target_no]->pass_ptr = bf_next(); if (debug) printf("[DEBUG] bfg new password for next child: %s\n", hydra_targets[target_no]->pass_ptr); #endif @@ -2280,7 +2280,6 @@ int main(int argc, char *argv[]) { hydra_brains.ofp = stdout; hydra_brains.targets = 1; hydra_options.waittime = waittime = WAITTIME; - hydra_options.rainy = 0; bf_options.disable_symbols = 0; // command line processing @@ -2316,7 +2315,7 @@ int main(int argc, char *argv[]) { hydra_restore_read(); break; case 'r': - hydra_options.rainy = 1; + fprintf(stderr, "Warning: the option -r has been removed.\n"); break; case 'I': ignore_restore = 1; // this is not to be saved in hydra_options! @@ -3433,7 +3432,7 @@ int main(int argc, char *argv[]) { if (bf_init(bf_options.arg)) exit(-1); // error description is handled by bf_init - pass_ptr = bf_next(hydra_options.rainy); + pass_ptr = bf_next(); hydra_brains.countpass += bf_get_pcount(); hydra_brains.sizepass += BF_BUFLEN; #else diff --git a/hydra.h b/hydra.h index f0a0253..6698eaf 100644 --- a/hydra.h +++ b/hydra.h @@ -206,7 +206,6 @@ typedef struct { char *server; char *service; char bfg; - int8_t rainy; int32_t skip_redo; } hydra_option; From cedbd0ddb2f035a73bf4bbba8fcf94b68c1039a0 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Thu, 11 Mar 2021 14:00:40 +0100 Subject: [PATCH 348/531] indent --- bfg.c | 16 ++++++++-------- hydra-http-form.c | 12 ++++++------ hydra-http-proxy.c | 35 +++++++---------------------------- hydra-http.c | 9 ++++----- hydra-oracle.c | 2 +- hydra-smb2.c | 4 +--- hydra.c | 2 +- 7 files changed, 28 insertions(+), 52 deletions(-) diff --git a/bfg.c b/bfg.c index d9667e6..faad45d 100644 --- a/bfg.c +++ b/bfg.c @@ -62,7 +62,7 @@ int32_t bf_init(char *arg) { int32_t crs_len = 0; char flags = 0; char *tmp = strchr(arg, ':'); - + if (!tmp) { fprintf(stderr, "Error: Invalid option format for -x\n"); return 1; @@ -170,12 +170,12 @@ int32_t bf_init(char *arg) { } } } - + bf_options.crs_len = crs_len; bf_options.current = bf_options.from; - memset((char *) bf_options.state, 0, sizeof(bf_options.state)); - + memset((char *)bf_options.state, 0, sizeof(bf_options.state)); + if (debug) printf("[DEBUG] bfg INIT: from %u, to %u, len: %u, set: %s\n", bf_options.from, bf_options.to, bf_options.crs_len, bf_options.crs); @@ -210,9 +210,9 @@ char *bf_next() { return NULL; } - for(i=0; i= 0 && (++bf_options.state[pos]) >= bf_options.crs_len) { bf_options.state[pos] = 0; pos--; diff --git a/hydra-http-form.c b/hydra-http-form.c index 4cd2655..3979e74 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -1215,7 +1215,8 @@ int32_t service_http_form_init(char *ip, int32_t sp, unsigned char options, char // 0 all OK // -1 error, hydra will exit, so print a good error message here - if (initialize(ip, options, miscptr) == NULL) return 1; + if (initialize(ip, options, miscptr) == NULL) + return 1; return 0; } @@ -1224,7 +1225,7 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { ptr_header_node ptr_head = NULL; char *ptr, *ptr2, *proxy_string; #ifdef AF_INET6 - unsigned char addr6 [sizeof(struct in6_addr)]; + unsigned char addr6[sizeof(struct in6_addr)]; #endif if (use_proxy > 0 && proxy_count > 0) @@ -1251,7 +1252,7 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { #ifdef AF_INET6 + 2 /* [] */ #endif - ); + ); #ifdef AF_INET6 /* let libc decide if target is an ipv6 address */ if (inet_pton(AF_INET6, webtarget, addr6)) { @@ -1262,8 +1263,7 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { #ifdef AF_INET6 } #endif - if (options & OPTION_SSL && webport != PORT_HTTP_SSL || - !(options & OPTION_SSL) && webport != PORT_HTTP) { + if (options & OPTION_SSL && webport != PORT_HTTP_SSL || !(options & OPTION_SSL) && webport != PORT_HTTP) { sprintf(ptr2, ":%d", webport); } webtarget = ptr; @@ -1342,7 +1342,7 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { // printf("miscptr: %s, url=%s, variables=%s, ptr=%s, optional1: %s, cond: %s // (%d)\n", miscptr, url, variables, ptr, optional1, cond, success_cond); - + /* * Parse the user-supplied options. * Beware of the backslashes (\)! diff --git a/hydra-http-proxy.c b/hydra-http-proxy.c index 757a3fe..3a97da9 100644 --- a/hydra-http-proxy.c +++ b/hydra-http-proxy.c @@ -51,15 +51,10 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option } if (debug) { - hydra_report(stderr, - "S:%-.*s\n", - (int)(strchr(http_proxy_buf, '\r') - http_proxy_buf), - http_proxy_buf); + hydra_report(stderr, "S:%-.*s\n", (int)(strchr(http_proxy_buf, '\r') - http_proxy_buf), http_proxy_buf); } - while (http_proxy_buf != NULL && - (auth_hdr = hydra_strcasestr(http_proxy_buf, - "Proxy-Authenticate:")) == NULL) { + while (http_proxy_buf != NULL && (auth_hdr = hydra_strcasestr(http_proxy_buf, "Proxy-Authenticate:")) == NULL) { free(http_proxy_buf); http_proxy_buf = hydra_receive_line(s); } @@ -71,10 +66,7 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option } if (debug) { - hydra_report(stderr, - "S:%-.*s\n", - (int)(strchr(auth_hdr, '\r') - auth_hdr), - auth_hdr); + hydra_report(stderr, "S:%-.*s\n", (int)(strchr(auth_hdr, '\r') - auth_hdr), auth_hdr); } // after the first query we should have been disconnected from web server @@ -115,10 +107,7 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option } if (debug) { - hydra_report(stderr, - "S:%-.*s\n", - (int)(strchr(http_proxy_buf, '\r') - http_proxy_buf), - http_proxy_buf); + hydra_report(stderr, "S:%-.*s\n", (int)(strchr(http_proxy_buf, '\r') - http_proxy_buf), http_proxy_buf); } } else { if (http_proxy_auth_mechanism == AUTH_NTLM || hydra_strcasestr(auth_hdr, "Proxy-Authenticate: NTLM") != NULL) { @@ -220,10 +209,7 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option } if (debug && http_proxy_buf != NULL) { - hydra_report(stderr, - "S:%-.*s\n", - (int)(strchr(http_proxy_buf, '\r') - http_proxy_buf), - http_proxy_buf); + hydra_report(stderr, "S:%-.*s\n", (int)(strchr(http_proxy_buf, '\r') - http_proxy_buf), http_proxy_buf); } if (http_proxy_buf == NULL) @@ -234,10 +220,7 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option { if (auth_hdr != NULL) { // buf[strlen(http_proxy_buf) - 1] = '\0'; - hydra_report(stderr, - "Unsupported Auth type:\n%-.*s\n", - (int)(strchr(http_proxy_buf, '\r') - auth_hdr), - auth_hdr); + hydra_report(stderr, "Unsupported Auth type:\n%-.*s\n", (int)(strchr(http_proxy_buf, '\r') - auth_hdr), auth_hdr); auth_hdr = NULL; free(http_proxy_buf); http_proxy_buf = NULL; @@ -250,11 +233,7 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option } ptr = ((char *)index(http_proxy_buf, ' ')) + 1; - if (*ptr == '2' || - (*ptr == '3' && *(ptr + 2) == '1') || - (*ptr == '3' && *(ptr + 2) == '2') || - (*ptr == '4' && *(ptr + 2) == '4') - ) { + if (*ptr == '2' || (*ptr == '3' && *(ptr + 2) == '1') || (*ptr == '3' && *(ptr + 2) == '2') || (*ptr == '4' && *(ptr + 2) == '4')) { hydra_report_found_host(port, ip, "http-proxy", fp); hydra_completed_pair_found(); free(http_proxy_buf); diff --git a/hydra-http.c b/hydra-http.c index c487144..7f1d56d 100644 --- a/hydra-http.c +++ b/hydra-http.c @@ -314,7 +314,7 @@ void service_http(char *ip, int32_t sp, unsigned char options, char *miscptr, FI char *ptr, *ptr2; ptr_header_node ptr_head = NULL; #ifdef AF_INET6 - unsigned char addr6 [sizeof(struct in6_addr)]; + unsigned char addr6[sizeof(struct in6_addr)]; #endif hydra_register_socket(sp); @@ -333,9 +333,9 @@ void service_http(char *ip, int32_t sp, unsigned char options, char *miscptr, FI /* normalise the webtarget for ipv6/port number */ webtarget = malloc(strlen(hostname) + 1 /* null */ + 6 /* :65535 */ #ifdef AF_INET6 - + 2 /* [] */ + + 2 /* [] */ #endif - ); + ); #ifdef AF_INET6 /* let libc decide if target is an ipv6 address */ if (inet_pton(AF_INET6, hostname, addr6)) { @@ -346,8 +346,7 @@ void service_http(char *ip, int32_t sp, unsigned char options, char *miscptr, FI #ifdef AF_INET6 } #endif - if (options & OPTION_SSL && webport != PORT_HTTP_SSL || - !(options & OPTION_SSL) && webport != PORT_HTTP) { + if (options & OPTION_SSL && webport != PORT_HTTP_SSL || !(options & OPTION_SSL) && webport != PORT_HTTP) { sprintf(ptr, ":%d", webport); } ptr = NULL; diff --git a/hydra-oracle.c b/hydra-oracle.c index 5f1788e..46deb44 100644 --- a/hydra-oracle.c +++ b/hydra-oracle.c @@ -18,8 +18,8 @@ void dummy_oracle() { printf("\n"); } #else #include -#include #include +#include extern char *HYDRA_EXIT; diff --git a/hydra-smb2.c b/hydra-smb2.c index 31e211d..275bbae 100644 --- a/hydra-smb2.c +++ b/hydra-smb2.c @@ -152,9 +152,7 @@ bool smb2_run_test(creds_t *cr, const char *server, uint16_t port) { case ECONNREFUSED: // there are probably more codes that could be added here to // indicate connection errors. - hydra_report(stderr, - "[ERROR] Error %s (%d) while connecting to %s\n", - strerror(errno), errno, server); + hydra_report(stderr, "[ERROR] Error %s (%d) while connecting to %s\n", strerror(errno), errno, server); smbc_free_context(ctx, 1); EXIT_CONNECTION_ERROR; break; diff --git a/hydra.c b/hydra.c index 9e1268a..145d6d2 100644 --- a/hydra.c +++ b/hydra.c @@ -618,7 +618,7 @@ void module_usage() { "%s:\n================================================================" "============\n", hydra_options.service); - if (strncmp(hydra_options.service, "https-", 6) == 0 ) + if (strncmp(hydra_options.service, "https-", 6) == 0) memmove(hydra_options.service + 4, hydra_options.service + 5, strlen(hydra_options.service) - 4); for (i = 0; i < sizeof(services) / sizeof(services[0]); i++) { if (strcmp(hydra_options.service, services[i].name) == 0) { From fe930f4dd17d2949995499ce702e3b48946f7cbb Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Mon, 15 Mar 2021 18:52:54 +0100 Subject: [PATCH 349/531] hydra 9.2 release --- CHANGES | 6 +++--- hydra.c | 2 +- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/CHANGES b/CHANGES index 8a36029..e895e03 100644 --- a/CHANGES +++ b/CHANGES @@ -2,15 +2,15 @@ Changelog for hydra ------------------- -Release 9.2-dev +Release 9.2 * fix for http-post-form optional parameters * enable gcc 10 support for xhydra too :) * msys support -* fix for rain mode (-r) +* removed rain mode (-r) because of inefficiency * IPv6 support for Host: header for http based modules -Release 9.1-dev +Release 9.1 * rdb: support for libfreerdp3 (thanks to animetauren) * new module: smb2 which also supports smb3 (uses libsmbclient-dev) (thanks to Karim Kanso for the module!) * oracle: added success condition (thanks to kazkansouh), compile on Cygwin (thanks to maaaaz) diff --git a/hydra.c b/hydra.c index 145d6d2..1a00976 100644 --- a/hydra.c +++ b/hydra.c @@ -226,7 +226,7 @@ char *SERVICES = "adam6500 asterisk afp cisco cisco-enable cvs firebird ftp[s] " #define RESTOREFILE "./hydra.restore" #define PROGRAM "Hydra" -#define VERSION "v9.2-dev" +#define VERSION "v9.2" #define AUTHOR "van Hauser/THC" #define EMAIL "" #define AUTHOR2 "David Maciejak" From 2ec0b164ca4126fb523b95004bfd4cafcae1c1e5 Mon Sep 17 00:00:00 2001 From: Ruslan Makhmatkhanov Date: Wed, 17 Mar 2021 13:04:24 +0300 Subject: [PATCH 350/531] fix typo: comparison -> assignment --- hydra-http-proxy.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-http-proxy.c b/hydra-http-proxy.c index 3a97da9..9eace98 100644 --- a/hydra-http-proxy.c +++ b/hydra-http-proxy.c @@ -185,7 +185,7 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option char *pbuffer, *result; http_proxy_auth_mechanism = AUTH_DIGESTMD5; - auth_hdr == NULL; + auth_hdr = NULL; pbuffer = hydra_strcasestr(http_proxy_buf, "Proxy-Authenticate: Digest "); strncpy(buffer, pbuffer + strlen("Proxy-Authenticate: Digest "), sizeof(buffer)); buffer[sizeof(buffer) - 1] = '\0'; From b6dda7da81636f97f475eecfb670995a54048030 Mon Sep 17 00:00:00 2001 From: xambroz <723625+xambroz@users.noreply.github.com> Date: Wed, 24 Mar 2021 03:50:55 +0100 Subject: [PATCH 351/531] Add transparent PNG file to be used as icon Add transparent PNG file to be used as launcher icon. The original JPG is not transparent so it doesn't go well with window theme. --- xhydra.png | Bin 0 -> 218327 bytes 1 file changed, 0 insertions(+), 0 deletions(-) create mode 100644 xhydra.png diff --git a/xhydra.png b/xhydra.png new file mode 100644 index 0000000000000000000000000000000000000000..39f27047961e08c21a6de7984aafae1f5991c703 GIT binary patch literal 218327 zcmYIv1yEeu()HjH+}(o)cXtMN0>Rzg-66OH3-0a&cY?dS4DRmE&%N)x@2{zuGjpoW zw&}gPd-dAkit<22cszIj0DveZDW(hnfPa1k2f#vqUT)pzoOPRc+LK-C1n(dQ3n zLm8kL;NzcHPDgRV=N&kE$sbMtz!&s?-e7>V44luKFwRnP;xH@V@MyTW5&epEpSN(G z#WkEo?QCpJY@Gq3jwS}qCdMRg7S84*Kq)yz^#CMn0DuG_B_^!uzH*xB_S@Jb=|k|K zqsh@lem23$pA><+mo^Zdx}-ZW48CHUj8aTV6;iyrAF$sCUqx*tw64|zD=GiW0L|gr z`Mj#i`NGTBuf3_P{3lpnb`|T+n}7oUy3W=Dq8%uq^T3NlA_|9DmokR$S`rY$wH-Ew zAM4fo8p-(V{G5ICIQcOIq44>yLfL}6Loc3j*@QAT$B%;9EkCT9s z?T&_hVW{K-u93zpaNX@5e*`&9Mli&ul8cINK7Pb})U(RNY|d8;wz^1PBnlQO57R1h zKEjvitLA|o*3CeU?Uw(2K3YYd8_Hjm)+PA>7m6)m{Lr@T^j%>KaN2R83wV8Ln`|YZ z22Q{A^(vHFSbdLsc3NNOZyTVa`p=kC4v&t&^grH^kNJ1wM6(*_clU~O zFWuO?LWnZu?PhaoldiG>p0>WBn<&ztI@2J<<8Y1xhae=LS%^J-G=5^2BU}=vIuB=+ z*3i`QpV1P%6)Ts-A2s6fVMBt!M&QK<|AbakJUl+?FuNJJdpV685KJ+vXOeL0EcG+C zuIC@|gzdfV*{M#78YPaYQB^j#V2>?vvj4zlug`hcQB=ya-Tg75qZ#k%kY~Mij3ADwFa3V5m^9bsq z*@kW@g++B;ya2pkcZflxF&}>;1$tc;b&88K97pUfIzF=Cc0lV$G6y7Q^i0M0e@o#0 zqMu%Jv9N*ThaL;h*A5an38LVC;5b14v&B~huqO4o(aXQrEpB-EU2l9EP!19Cw=^WL z3xr5BvK{f}cdXm1Vz5JVt71QU{h!T0Wz(568zw8a?gl#z_9y-BXOm#zFmfw#m#yH^ zMtiGRN#pIO{dNI0mi&D87;A6T{?BlFftDmxna+8yn=p$O?REb%h(BB>6@T0f=cSYB z*Z01ez4qf){ot>e_5M8#HSPh+?`++E&#Y7Leud?zFYVpTZzH2K~Zv*O=7;2q` z1`oCzg}yN3FX@0#SggKocT9M3jkZ!Osp0MZ$P1XTXuqf>uzz5LBevRmkM8w)v1`R+ zUPZwVRZ%!(;`?twLQ`iE86r(b^V(nx+J@NSZSlye71WrIz%LA&&76d*3+vPGiY=gh2ladPeYE-wk1E{7|7VRiOI{cJU|jcyi#lAI z1UF#Qs_OJ(sto# z$&u|x{v8v{)RkPvhRF>6k!Y92oIQBjq2M%h74C8_LBV!$@Vy7w8{n@_;JK71__|fJ z>M-w>28|UA{JbhmNi$O*A&0^n-WXI zrwGhgwQ>_EgjBXu7Hm}F{o9;Qhd~h2Eix(&ZO&V-;!?{t!i*+}hB-P$6T-qOlYUX2H&SPa&vvJi3z;?l-{4kY&Z zz3v9up%6^v8pL(gmxifl@2!_Vv=I%Qx)aq1iU>dL`fH8~4U7+nf4*;RYXc%Lxpf(~ z=Na}P3H<}LKfDjyks&Uhjr2Y?wzg2UZ%>T&<%7h~T34B(k9<%|f|`xjj8iNXUp_v;`_mc0BdF`mV^q5qTxWk~1(ag~)e&8nej#Xgn;_ zXipPv?K`7aBN4S7J+TVHQ8*vkkEewxxn;YKEs>>i&FS+&yli_l!xS1|wK?$p zET-*I(T(w=dsV6YUiYpZuWoA&bY=Hi3W7It@#l}xHO5#oX+X0FeLm#!W3qQ|B>F_{ z&~DhM6a#kz=+GQxu&IfAq?XORFMf}WDxeX!>J}bdedcY1e#Q(5%lNs^_+tzJxox4ySK;*qSS-hB;oytG88sgd@ zqQ&~1UgL|Lhbmu5>!BWo@eM2_rpBuJWGKPYv3eKw|KIhEvBlZmMZAi1fh0Ecaih&E zZj?J=eoN4~_92E)wCMEyrDn7uJT7`bjcADk7mj>`gp%& z|3(p|9IJ;o!(V$0UUQ;8O@#$_-)5oU7P9;*tDy;m4>eu0GDGsRFbx;+ahc`z%Kzfq^JZeV>L*|eb z|77|jum1}XRP*cg=uQZxQJd)4C*JL3!H{SX@2-@FYCX{Eo*o_DSBaONaoTh8= z@f+GuT>vEsU{yz3VI*WF4Iec-To>&(&9^f$RQwNxj6QH`HcyKQ3eSi6$bvKN-cOEY z^JO*`Hb;l%7krHxw1pftYhew!H&!dFIc@91giQyvd$a|tQyYOw{V}n?m5=Eb9ER>8 zE^DHwiJ+}`Ad$~(p7>jW9!_uA24>@Dhs?{#de+FuiAaQMqtvt z1_Xe?hXg*u2`0%>cmFRKO>zG*8x4HANk{UVH^_L&jUD*%ZNT-XJAwV@h7ohWv(jt(KlBn_VxjdL-+UMJQV*T&=M1LbBP}ABU3oD?sw*!@ev>E zc=a{gW8+5eWo2-%Y$sMw-obk;%l`GsW-rI{hE;)|-|VgR&iZ^cN^?~s zVhX!81&-^@w}+e67aWbqxuIvmNq^XS$ZXxgwO;ry%w+c_QxsNrARape8*}pJ0z6}E1*mipErFh&<1MOlfQfmKrb;~p#66a{R8h4|Zy;>DD zC_7AdIZOoL1RZ$z{eb)^{nC86gDr6J6v_C6(ABopRH^r}&xzE0u+f%~&S5j9T$-1n z=lk?)Vq!uD8U}^}0Rr&;0u=P55xwa1X0+MH?>2?6dns zY89OBMt0E|x4*z7z`#JJiaw?kj`I$HhYvb`$N!gn@sDBB@EOk6@O+GGe+ z4)D56WrH``7}>I|$^EkMGg80}nXhrqXmU?6!`V_TGZM7n6#R1!amL_sR0N>U2xnVx zIM~UPZ^!fX%Z@xuH!Pk;v)$JUZ=__wXh7CQb?Z^1);+H|2;zAs>3@Dj&gd#nJXWyQ z`^m679^|S6a4PPupow{l0Vi^9^v{NbK+|yUrQF@vyG(DJmJSKN$p8KTZ|x3B23^fp z`x=d0_49FTc}xbkfg+yy99&bdL6SvPsOf;`N(=0<{n zE`<;~y=ihamWX^c;Lo7|=l8!*3Kg2Qj>S#wcdDIkckEZ&5vaWXhN+f)*y2J&AC8M|)?o~r#&h&<4IJzx??VQW642wgtA_t(924%=4K`Gj(h z`y(@0n@4Q%%PIz96Vl6WY6>(-4ybW%wrq)+A8hFk+hTA#Ggqb5(b>|?QX$i#zXb5^ zj@z={G-*fz9tCiMD19DUHM^U$;q#6WeB>_83jjvbV-Tp_z;i$FGyK3+;?P5!kDKH2 z2agvmkf%a>iJ|pm829JEU(q*rKk@A$`}MI{XHObRjw+WMxza;cAgGe3ziXwNcSH>b zH(=tsar-HPIqgy2l_M@x$4yn+MAzqs?%0yddf0;HO*kZlcZ%<1QRco7Ly&QTIm5xs zJ)GGbdy;>_LEejT;`swVXJT<9KNMe(C#u6_ESb;FJn)frJJ0K+4-ryWjJ#AYJW4Pu zdIe8L{$9NzCrfw$-u!FumGt@}#B)Qn_Ze?@)v|2Fl_B@1_xx`pgf$`fv7_yMRs5K( z_j*xhiBbe9&Pqd(BGIO$)5oZZ-GpgogiDbwtO6%X89m;{#-Ey4-d3#4pkp`Zv+;Y#!v47~@#5UCk)f_4SB%H6qVp!BgQL^1+8NWf zBRN66IFp0>Dskh&lwd7vGl`LPkOIcak{m(Czm^hXO;zHg^5C*P%Q`p$)yc_iw1X99 zoCMK{aFF|(>wU-jv?y6HT~0bMZA6x(?}SfaaNxjfrzJIL7binXgvCiQG?<_yB&I!P zbNyfkA_IS29A!G}yoN-&zVu%B-YB-u{NIS%w`=@7rcZ#X%8FQ=>(T3x0*ms1wSnLTRiKD@ft|Fa7u+pe3&Pp=nlC+99H z!@80djZpk&Bw_)v-aHYlN$H|1B0Z{Um5-uqGV&rnZ(;}-+L`5otql)yS5oLKpDrgB ze;{+A@wLPZ^R(TNw+^BgeM`fhBDqv?0&kQBANtM$-XJT?KLX?3gkI;3n08Ns>jEAI zI4@Q^VS`u+?V)CIqiyx1_rK%+NFnBV$ba$OXU%Tq)wN)5J*chz)^wW%gU)E)+^Ox4j9JWCG9JftY%#L!qQfZwdG93ngkZKgKB z>E-0Zs1h9a0yO(<=PeL5#OEbK`BviT^PdM!g?m*PQH~WHF|;XjITn6P6@uN7ZG&uL z^YLGFUW}+2?)0izn?X<^M}!kUG}&e|MVShfQ!jiURs|urj!TTTtIGbD24m3PfjoJp zW#<&^tnNM}jBo?R3fg$KCYm*RBt?-sBKNb+!c0z3UkYlpogEW(o0fT=e4_n0?vH0L z-!*R;qd}+*&r-c7E>vVICCvJwyD`A2d8WC?;5-S znf>ndSn$JEmlLm8!S_DU+aYj~kchG2zr*>k&+vPHqDb)NNSFG^N^7?BLZ3-=9eXYr zpvSpXiL;BL+!c?VKq~kH!Lyp7ZEr=C=E$(3K#8aPgcy4uOj-O|I6W{LJX_OXWBv3_ z-=z2Q;vw);=ECbcN;l!_A{!V=(IE2c^pMx`w-D>?k4iHk_g1|u%iHXZBt^4=qI zrJSS!kYC{{pIB$Hs!X^2_`f^jeXIF#JCgfp+-^7qTV_Ib|4*EJ?szISi#kQ7#A>>Z z@oJiA9d2{Ff`--T`D(@k5ot`2zcw|f}%+6!cb`vmT*g^n$U ze*`(TCBzkq)&Z~tlS+WCeAWcYRL)`MZ&(rQk;#{R`bYi$>%S51)@I{%a7D0{bm@Qk9{yX zyC{HdCTrRLkRB&!+>e(Xu-N4+B+V{IeoHkLvZD8Bz-SL20LM?Yht*};>x$+EZ%CGy z6vFAwjO|&GDj9C$m5|+cti)s|-p>jeKs#dOk zt9_#f8f`zDYZ~~%BykG(hw%Hr`bpqT0=N)(8#4Y(y{3kSh9K`MX<}V>g}o{8as7-a zhn(5}W<(P;$hzb3e?xC@Ux$_fG|c&k!Ly;JB7;aY+;?%^Jqghu*@|bJ+1Qn+5UQ4U z8{;KO24J*yfMPa*cga%Xq5%s8X)^hlHs-)D{=vD9Lp?uVkJ}ct$EgIa!rhq%{zJIE zg0_+c*9T5weC1vq{Jc-HVPKxMN|bhsT*(RPr_!Q5Z>@qkZ4`Hn$d2v2e}@V+GymO4 zW&tFK1!M#nif07v;NRAoZPpf(mP{p&UUtNKN35HU|CEN}6XrnTsr(4OkPk7JBbc6l z!BpocMMS#xKC~3B=w3Uz>kQGdeVf(xk7Q^){5YKgJx%y|O)r8Ti_o|IqW(?424Z5q zFt#g#(_!;J?XvRzK+MEUUxAY`&99tZ^V(66?Jh6A!wQnmMdwb?|fgBEQ=Bm>x**jVW95s4X75$jKP&*TF=#&^&BPaZomME z6-RCpKV&dl!X`|1d(`5&8;OGLTK9|}Z@gjcVJKF3_m&qK;hDLfU=(H^Lf8X16{WJ2 z_7g#!0m}Lm402VJZVq@sEbn==w%?n=d(}_x4UYqdgG@Ky!=iNC*0DX>DC$N5$7TQh zYq>i8o

~u8;SN_V?z+tD6(Q9xB^c0&GGLB*17DU#MW$f#0@Y4%feV?iuER-y?a) z`1p7LdL4`-?vj;R@j&BfDn=P3ZrpNF%D%u?SN!AGAPO+)!R*F&NTxA(Fx z;G5q*O~e~S)kbxMD!r;mvGi}rX03c{Qpx&|H<*wtq!b|wJBOWUVKEAqIVB+I@qyzV zfc*N@$#2(sR5S{Sj*59&u>OaZg@>o?0p$15^uVhx=(GJ!g$1tdyvyzV(V6Xf?%O|& zJUAfuA4VtB@E|hYyQe!}TUkriVoQ!Qw(0xj!Cc41U))Uybkb;+Dv#PY<#A zVy+m_mgV2$pb9a;|8&;=aEOkBhYPlu^00O;faby{nNO8?OZ5fQW`4Qb0Xoe|Qf4Cw zZzVl{UD39AYY{-;Jml-QD5~3Fx!2(jMMr_|{>RJXEj@Pov5Ba+oj-X_8%$X2qWw*t zkQ#x(&US(j>~fzUH1*K!_2HIcqCS8&@E;=K3@ujRnd{~B&q3SwDsArK_uatMIREAK zj@Lz?VE!+XYQIJ(x6S;Vwg+i192$fIGVHb^0t+Avw$M+_o@6C?(Ih{yOx`a6F`M89!jx8 z^Nn`rd!AfyU}UHt0r>(Y@f4 z&D`Q}vH)GhxV0ai5Wg%9Zm0K*it&BR!4=-h1jyp;pomP)bChF8bRDQ)yIi{A_y_<1TI$sI3zPF+8FJyTi{{Gmve z+?VXjINL+WW9wBXtZp5b+5OLf;CSq4O1CeLj-fC1SL+8eK>5e z`3T`0r@FmvdFG1ZtB$q^j$Rw_-y+o{fIt<_x2?vkuC88IhjWn62tL=_Wj?j)0BNe3 zrWP-DdwI$e@A&?j6NA}l?tF>H=L6BHMNL`uf5Riq#LFEUk5WoyxnIX|~G9s8X-noK{-I>~nf<@WM+;U}o~_!s*< zPxN)JSYWteQP-^V)3vVrncz9u#H9QF>O7ui#{2RNZT?vkJYQ=$?R+_J^Ld`l_C1{H zMdE-VXs+(q-5!0~7013FR?tQP5&WAe5MoDS)2}pD`)#&&c8*sa_-SJQnzUaBG8!x- z((pA~ekI=nf7D@sKv{wdS~fq_`};1PF9#!rSt+$!$|ife>KN48&*xwArkGFk`k{xf zLA*g#lM7;g=O2CllHxdAYG$Y=83rSPOPBI=J?Xnm;Ugu>#VR#9&Q(K7CXgmARES`S zmyreyljBfd^EfpPoWEqELLV5Ir%M5okJ}RGcuLMrD&zm1{zxkHqbvlOo5q?uf1^5Ezzr4LA9JT zo%2D7Hp$&{oHafDdVDbm*Vf7^9^zh5f45xS_i5zE&A}Y!bwc(lr&-1)22drGnw*{4 z6!TwS_A)lIoOq;?lpI4K^HFpo$MD`aLsWe%-(7@XpfH{-^oOAu@%B&1BrASPz8x;k zc2xM5D*nL0dvl|pGclo3q)d(Vc!N&Ib!C;p(mJSJ@CO~S7jEYs8()iZ;AkPr?yqRF zV9CYJk z>gYZ)n=$$OaHX*cz$l6kh>*eTfLe#g9ezb5tAnzWrA5NUhd+ASA8sx0c3kgrg6~JM zzOMr-P%97hoL6mjKH&u-U!8Fg==8;gzM^H^9*s7iZ&$}zj3gYH=h3H7sygr}e6JPW zgyshmF8r%sDyE1?9UUcFdd<1+W`uC$oaWf_T7S|1fT{LBEr3UVs*`Doz;o`+hTHj| zfTy-c#pC((w1MB~nyRNIl@s;^+2Y2;ey&p1MhzGTlA$!IYrCS8qRVhz|JKfEwq&1M z*grmf04Y2{!Gm@2eevPs0T|SCUti~Z&gXib*>iXZn{|LXr@8zFx$?X9-KrOoJPhZy zYH*5bkqmf_p0tArm&x5kR#NgMaTZSFi2y?;?82y33)V~_#1gRGQYG$_O5h*r8SF`P z8{6Gm-i^~~Kk%|_)`JE;Ai;zaMSWx(dI9n#=M;R+DWBC6mfMXoR%ZGGQ+AAZ0P|%6 z7Ek=Ekg6gA+MF~Z91|wVHbOAGF8Hv?v@+(=kw~@=8h|7vM!H9xarlNd6oUa^H+3f0njKV|&k+6nG8AEg?mbYe4k z^<>c}`|Ad-lq4N8?I@&JsZ5PQ6P1GdEz#X{ooB&@V1F6$jjzL(yq8>DB2)tR1iw2b zI)5I8UM+LP@T*WcrusEpuT%z_75&c64#^mj=;+8Eo%_pC@p`-Xgw!Qpa>qSj<7r}t z+dNz6$a*+I<}oTN`o{VLAlQC1sqND{j=+xxCy;x+`$qxhijeG|z-7t6;mpq``;&N^ zGXb?dby1hC#UUx0HTlWM}sg8 zin!LFDbA>SXOhV(pzuZWi7VJ+H_XQ1f#64f*U{Z1rH((ZiROhxP_L-^ykxv!+c8h4 zXLnWm#nMhmFm%3cSkOG}55ZwDCoI%5r}n>=hXm{*6)Vpsv)#Y0XX~GjSzyof`Fe7~ zmJ!9S_=Cz=n7-@Z9CAVAi!UG}T;GO{SLk-79&jK}3v!KY4uHW2iAF`I&>%*4OM(q# zUXuxLN=q6vhoA?>NiunX3cWYUi*NSHk^Z8Oy4Q*oDi-x|N$A_E!({uc))I8Cio|fg zq2DQ_tizuEH=&4p?|cU>${A`AT_N7^cpZ;<8X+ub1~LWb@cj7biZ5k!8SRAPR%|M1 z0K(EMBf_%cGD!gs%e$Hkw4kZ64BW@!_cZ@Zt+HReONhSzB^v6BZRJvcIQf_^o{D~B zDuloq-^?06;W9Wjtk=$^Nif+_6fD+rzzyo{jguA!nd|Ik$&&DnJMsZA;KfmZ=AsCA zs+Uod;y+JEm%T0~`rXzBgRD672JD#Bl(0n@b{f~y+>A#p)!;+G7j<7cps2E6lau^T zto-^h^|mAEI%_8TvGp9)-V7;KG9KSm+}FW)nN^o01?Hn8$dnT8D#eE-QlzfX^)0{R zqgwCIg;AGP4Q(04x0>ZFg}p0QH4iI|hkqN-tSQlo_Yf%|wG=HgND8QB4jqWRMMS(( z1%0L~Hv6TB=^mzUB$EP7F>>k9rPg@CJxbJx(_5%+NLqCSj@L@s*F8;t%r&WYjPg}0 zx5ESR@~-3)N7Ojfe*WO=Fq^?cW0s$z`8V~g%{S~_aj{{aEjgl~Of4wy$Rt644Imh4 zTI3sWZvYQrsSgQjmh7-??k;Sxf^MrlrPT^=&DWcEkGovACv7XV%#u)IlmE_1Z6s22 zV=BaRl-J2K98+mVnO6m_uBuPwX{X5eE8gK#;2>E%TTfJvjNgv-RtTO2C3wWj_I-Ce zyDM%mOB?P8VQFgm0rDXDTWSc$9%+S0KUqH-%KTe7DI93W%Z}@p`dF4UH^NeR+n*kX zhyjR2SBAa(CpHB2=_(H6bxMrK=f$okE&Y4Ybt_{=lRsv;y5q*r$+p~2VzPRUZc-qg z(f85@G6@AVN$M_yjqR@5lQ&yMoYMdh=@?=2^)QXHBlWCXJNB zk&TU+B|Z}(QX?itA>MZy7)*%~ldSccEVYw`y6YCiwU$?l?-d%Npkp(S{^_6BnaJ7l zE3BV(l##4-riB<0y%4B1xHFG}m-oIwqw`5FGIt99TbJf#h}fG6PQ?m>1}k((d7r?` z_JZcP`Xfh28ZSco)wvlk&b@d;q-lxgPFrc83JJJk3D&={_`Q5~d~Pm!$*8rs79Q+TFHqH-%=Y{6Z87OYUq3E3>&n)Z=aFQ? zxwk1bZ8DcEDruyBXJoYbq83P+6vaZUloHq=-|6;l&4~^Mv13#c%uq-yBye;yZ=~Bp zcOYA=2ro$)jC(d-P$wn5*L_68rpZS>^(!P-set=ul@lZXWp@xEfcX9LXUl2b=sV@2 zPycb!H_e*M+&wz=`UUyjz(wK-cI+%EMMTMG`hqtCX`7Px)Lp${W3;y~ss@ekY1Vr- zBE9T(?ztT7n*RP6WO1^_lAfgF7Qd$jqD9@7zaYw}QnM=KY;Cby{a9j!0twN;GU2FV zRPUSrrX9empw7b7bb{;j*{QsoTWJ++aZXv6Sgibz^A2){>y!5Xltv9+^4XD{V|@wO zOYI!T*@?eLf3`@Z z)rDmkE6@mJ(~*i7#2&K$hSy@&bf^0dtqhPi=LU{qQj_w?A91&R4Zpx*T>L z%zNBxE*Pd(!3+*HF$X1T*@5}W`|DneJDFbJ3RMx;X?oE#&7~-hWD83VI@bFLn__cC zIKm55CZ@v+Livqm28sP%L9$8vLBs-0UQgG1+2x5cHt_DL6lR?l7|9b^(zWnUs)NBd zA=oO2)lMIIu#sWIx(6>IwmiBm$7E;8MUvD% z;UG4q1Nqu$TBCu1Je1GNBq(7GQyWod=B^EXYK#5YNd&hcJm`%m=xqL&E*U}6P+9Jw zj(4$6zCYz;uEg}nA$I^AB8BIlBQGzj^c4;F6_?`t|8~&OCTrGm)L?;%S*uM zgEQ(c7&82(vM|b%6)_!*T;QU=G9_Ec{UEAOmVzA63?$nk9sl8MJtk-LEy_r(gZHA{ zDZ8uxPT;(G=M!T;%%v&NyymjB>@RgQ98bGYpuyx)8KR_eED2#|B@?0CI~DGlLdCxN z!}<2?T3HZ20aO%Dn;-D46if3uV-X1rYSE$;>vr6?+iatz45MQ&=+xi#DScf|$k$#D zfVf`PU$;Wz4<9S;Z*L_P6duIO)vLGLV|^(;(f1#nq^s;F^$%>`j$nM#)~45VvB$v0 zKPU~5d)?kx#cfJ<8(&RuspgGkO(6=#Wo*6YWIwm9fL1G>p>jEyy5#w+gu#j6Fo+fI z9u5#`)E5(0erFcOS(iI4SO$F7sgu6`UV+}8M=VM+cRc%EcbI?%U=Pe8ok75m#M>>E zGp19M_ujKIpD=DY3V7iMWt7%}Spdx*B2Ol|5YbBOLCv}z$N*j%SEU(@A9 zMaeaNeY_ZXJ=PINxlmIboDD||it#ozc~pL5Sn3rv$VR#?Jn~7lgQ3%O9Pf+$ibe6; z{Nl?P>*Vh9N%g^I5VEdXrNr^yR5r5=AC`4`Tm%bjb|7s?jEDhhe!~wTMx2&K!Yb&X z4wHVNlOM740!`x3-8eU|2>z&1fjw`wYH<0{KPHD6RiKDP3wb0A+KJVI*ppGdrdsyj zuoOfAwXEz^-}tkh!Ev`XfzMHC2I4@W0*96k!hobs0CQ*SGJ&Y zQ$korG!JxfS8F8Nfj(JdC=)N=W zlPWKLDH3@4c0rKqUV>Q{Zt_^j`Tetl8ia|v^=({7TFUhNJSvFfKM0Lq&3(*n?6}Oi z2yU9S3K>E+X|poa*7XJ@JtAY(f5)xw*~g>K;OM9byOYeBr~cQE;w2}@k0<#S%FCHEKIyWXget_B|(c|mI00WtTSjL6`C;fHG8Ew2srv-fIARUSC{!W0|F1Jkd*6iDS_4fFLHyGo?42I>uNW32Kmu?HxWmEk{86`@)# zl$IdQ=@w>Tz6vRUU_50+nMXsiLgNGXFuW0i0FgqFjf|)mpJOS~j4vzRTPE9&XNdui zK`W%qLv><=FQ(n9W~Vk9(_6W@JK55FZ^h&3FGq)mVN(A8Fv$Zk;p)T=6e&LY%0&;i zo#jLzC^d~1EM?sD<_q18_lC*9;%}L(v8m&kiqyGT&E|sf!QOZ)X}RU={5-2`ARGFr zX?PtQNg(gc+#FNmBI@Iu=I@1bjazmXp~{YlV9c{4Ax%du*{SljZ|(X9tsL6aWMSdh zwabghfEtgS*n@>i2sBCkHDAUwxStnb!1FJoSk2$NG>sXA3=nwP5OO6tKV`0Ui(?EM z4F}4!x#`MWxv?0y@2$cOyJ$4WmRwrvb|fi|8E}&@Q(Ha4ww-(XuXv0Qbj$ zp9hN!F20lE1YX^?QJ69XK2+!V12h;MrT|@pXcwID80XM0@tXYYp}4B{Eo3C-0lTOQ?x?i_kOa5|VU_4%=_Q z0a*&0zPSDflRXm=7QsL6?w%6P%*?cUetB`Z+U~!K{!hN{V1JqW6JXz6u4jP6d&~58 z7tKkeoRA;y42>ll6rvK}k#f1JWxIc-_ll5(s@q}Bc<3g&SkSUO|94fBG&>{_+1ELx zk;I_SR$XzDtGI_F=FSB~T}rY0N3y@QO{%h^dLM!M_kP7F$K@S z-%XsEl_=S>&`i_bp0=E7-YML-w`38wpQG}@YJ(6ZxV<89p%N#e(W-sXA9o>iv3!XI z2i#c!zrzShC7lt_#4BLK8W?>Dmh02Grh~CS894)?I!elsJr&oV3k#pT- z|4A(7#UO`*&Rb?nT5GWmoDl{UJge3-EP!($Oa1x5RS7m^sxR z4KrYk9q!Rr^Ycu0m*B|OAi3a~8pLKaX+ShtqRFTi}eS7fb zvY#F2oKKq$j={R!%ruA%nVJoCWhZ_4wm0bZ7T)CZPIj-=%z6|SQr&s6vPCA!D6ER4 zNCm5U@|LX#vWR=AjD(^ogC3`#%JW(k;*6cyZmhaB)6D^Wh#RS*Frlgofi3&dv|A$I z>fH<7FXQgZM#8!Y)ov3Y_DLbrDbkXQ_8wlsvMXf_849D=Z;`&#TAA@0?bXRh0eujQ zsxqj8ms$_AF@279B&jl&lvO&jK!-=?sbyt;E}G9NobQ%d<`gYU%Oe3^^rQeZUvPzA zkCv9>1b!{CYNOUDXiM+|6vsum%JlkqlIu!@-{x~LTyXh7lO<;8VJsXC6(|Bp`cWbd ztf{JP<&R<;s?0bh?JWLg2$o5~1s2jS32_vGXrY)AqxiV=cU$2K0`qb!RtEKak_{{q zG{Dor_S6nZjgZU(QFX1`v%>@hftJAunUr_%P4;STmQII%^TJimWCooP17LgJQ5Nrc z=R*$+v9&`$TJzjnR%E;mwuo6d>uEqP6+B z7pifvk~XZl#0Sd=ZS3QF8-tvLL1O5ESTBRx7;X^VYC;Wo}w#YG`4(xqMyT@0NvO zni8+#F``yT{>XBvVdt@SWMt z^7yjmxa}DU2&#c(odtLVZT^mmWbs2{W4^g)QAQM~7GK(jP>RF&axGC&!7G_GkI9q9 zeqGMQEYJ{z%#ie7lUO1o`v<4w(#(s`D4?P->EasJ*T+k12we_QY7JAS(ZJ+mjEV*? zFm>dIG!eSMri~f$>8E&9d51_gD9_KAeRqij$U+jg}IYsrgB{l<1&T*;?zw~4D|DsAxWDkRc1QyZk>1@@ z#IOl#eKF*`ulCYL?k9VMuN8$msz_L$tGRw3E2;^nEb6WaC7`}X-Xhu=6jWEqnx8cUP*Vh94Kv2Zkk ztFf(_ENB$7;o3tC=F1G55yjVM?|#r3(P2sqRPq+Yl@kpvqgSf>F7=2@#rO(dFg{=l z(F0`9QCx{ai<4<=^NxTe-xH8F$hHz~ke;#1qgf3)_)4udh=Z#KB*mdrOi8trc8!y2 zMAI16@IdK9izrk@;@Yd>*I=`v{52-R6L8vsa%}-wph|mW=X=xU1A54M@ZDck*XgGc zbP)C?5C7+QQ6sUlOG{2|Vd2;1+1Y%$?^R)V9jLR@U@)ghZQ~(DW5HVwWQF`naZ`o; z3EMccQi5e?RNA;X%>8=ghwM1^l_s!al)fvP54y&QmGZWcvjYeK_V~sWMln_kl-yLd z?x6-6iOKY#HXPg#IS54txwzFRC)jf{-}0fJEU;PhL^`@u7}Z&j)?4Gk9&huF|Fu1G~En(g9jDA^&eBu=ScD_hf)dTe#fo6Re>L~vKP(d@>V3|A@r zCFdL`yQ`!`yTvuHAG|`HZ~hCicV~y7^|^G6 z)OMb1X>+EStj)AUjn;*-vvC!_h#HxH#6`Z^xR9-2YI-gK8?k`r^ISM`IODW&oEt0hUwQlQa)|JRK(B5%jaY{q`{-V=yAQ>&g$K# zeoC{^D_&FsKh>!R0T;!nwK2cLHsNseB;ASJ1MLt(QJ5oQ!4ONOh0N&#RB2QPFZ;!C z1LK57RfE7w#gL*Y;zs8k(0m6>AdY`vxao>ahq-NzP_e@lpe5qc*@=luQE4&38YRi8 z(uO>bg~`_8DtHf!q|+q-Br608{$gk}Rwgt~7{@^^<1lVtBTn*JOOz@X8%f5Rg#EZb zeq$CQ1Ie<)JIY_lJCP60mZ)V;ryaQiHgiOgqU;#@{`^z0aqVz2qQ-zXW=XyJROg&F zk&R_SdtC&7%ZQ=mPw}lRyo%-&cJ#`!u_WnfkeEF_MtHNiLXf2f;6YmDa|7^rpt^FE zI7>S6Ll$ra_(*bS(zjpy+G8(X50MM%i0BsY z{v5m>CECm%5p8LbEn)%n_#hPNfE4-XVctm45@7DL=^M^_Zk;!oDthOsp9d-ufDA@8 z?(%dX`M$ol{yU6OlfEED`YcBG-0jF7_~3beXWBhOAEQft<`2J zMa~T-r}bwSLx;OV8Wk^-;(nRXs!t~6E;@VNEW4xS<=m@g!Bku}SL54{QkVM4%$V~( z=-=!IvZ*!EWDBb8$e)%g#cs)d3)Qw%sJxW_dEFD2TK~9&1Vp$b*yL!2{N=)kIA4+z zJuw{Tk}hD;Q*(Al7?7c$#f*YAL5&fxciU%cV!}%lhEyoW*|`}T0PDPb(^J03lqMa` z))~zDVn(unIFH(`k*iqN+2?!G*KE8)n(BOJd6?#61p;rkh7sy>5#b8LF9dzgAKnVxR` z?)P~xyj{m6>AmZs?LpuyYgNYcB7{xEKQ3-6NK#2jQL)xPjE9w$HYUc!d7qQq6(|mL zz%clRfl31|{Ut6qSV)8iZdk74Yg2~T2*btm+ts<#xtxeg1nbU^>`6J>bAFfX%#H=m zg+EzTC(|p63Nkjyjr*Etwt)j_5{bt>H_BX^J2Z@qH(zzfqf#jQbCO68h$-0wq`3>6 zLk*9Z`g4c}rIyZ#E_>g}cY{shQYA;MNOsr^RN>?T13_};(wJvpg|f10Y$Pk4e#~rh zrav5B**F@ANlN+Ajy(Ua8T{tLa)es)QKZ=%9#nU@N(bHM6MKLByqGX%*}Zw{S~^i} z0F+3uzb6=d3MW5BZ-V4x6B*o2Ri2;ct*oj(R_<;RhUZp46E|jN(n`f|j{2bYg8)08 zm=n27KDq2x@2m6Aa~3d7QMjzWD_Q()MB$84n)QJeJ8>bb2HTRCb2)gKt`!h^Uk%bo zaT9yS7y_jV6!m zhTqDM=$9KNj2n}c{g6!Mf|Y{_P9fv;-mVufh89fy5>F=id3^4_ao8COeZp!OIr$`szf@u5cMCj_y=zrV33J0^vN#os3Vpdyr>Af_!Pmb zHrm`KDRLU}PW~TF*PvJlv?OCYnb^FsHL>kXY)ow1wkNjDiEZ1?#JI7sd2e^Wq0ebl zS5^P?;ib!hO$ytn;fzGj>u*?0#+~;;s=1@aD2Q3=Qy|YPXGo1QjmK7(r~6t0_~R## z#7$aDY%I|bFj4@DFoYEtA&P~iz83fFzkLfZ-R#6d6I?2~j zn;ft4he~vzUyd$&N;%R=^=bB6kvfoFZw|cF*Xt#-3|%j|1y3YWZUWU@rLOAqJ=YFY z%Z+tbaL>r0xxx9ukiVqD7*b@F04W!(Bfm%>G8lFS0ZcQ95MmL3$1@g zSj0edPuv;7%W%UJ!)nnGw4ng}mu+8JYV3c(001Pa7th=3h6}dqaNKcg5pSCHPazRq z#09G8{Xq+K4bM%J-!TMH$GFaAM(Cs>=8=yiF?@2_&oCii@^s{f#1J&3m+bL!Y{SEX zu9^8LuIh?GP;Hn(==jS&sJ zcSJPicROrgW&eCBet77fBVr)lqKj6A*qfm2{QWJGjPr2=5ClV+sX0zZ;kck&P}!~E zq&x7z$`Z2D&F~(J1rtUWBFBbAWVg7|XbWYH%?&v)X9_*Crq}=cAo$nun#Z9TaLv>H zdP@DzqN-ddy3YasRR;35uhJxer^crimeUnKc)-sHG+wfp8nXLPC|TIk^OgFAM4Flx z1MdmAm!J(~yn`T5x?P+vo@je|dRhyz5v{jkRK6XX$wrV?T3MH6$tF&>DCsVb2*}a9 z_4#;y+23t9>&KyEGj8#N&DXd-eMH6qb;I2@4^NmJ)I0Ej%A zvPw#vYT&M;pd{SjmdS9SM+%|lJDk9KMHK9gelak&7sQsesEYY0CLdi+$nT~~EN^^K zl9D4FB!sR-^~1P>Qj9m%6F9`U*Yg z|DZma$>urzrq#XL9aJU=Q+K{1Oc_fgW;10C8%_a63Ki+*{K}&C^YtRPy6%atD8{ic zD0V!@jeDIi8cXwHb3u)@6*V%|28G1nxYt!B5L<4>!{t7;f*h6P9#RoFRcSvdq!YfR zVFbs0K@*5|wDdHX%w9CP-YbxkI0BJ5 z0lY85f@PPuxh#S6a0>8mJjji{$G-gc!;RR0RC~U-#~eam->;tM%UrGL^eW_ZQRWIBoD|nC;E8`eNGbp-QcOOJBjb>j>b944 zqfCklMlM+T_pG5m&RlQ?7u?!oAehM^dfbfPYx)Bf7&3!yL-My6w@B;1-_hOXW=8+z zC+U9iLV8LH-9=k8j|~a1uwNX#5WoIU+@Ri5Y*09|_C|VU^}zsF9qY|lqkN4*MbbAE5z5=>zofF zb+QD1WNT%8{@y@6%|$MY)owWX@iBI(!wr~|2g1Dy8B2K#NS4)t zkW;@DM|KAlR28DwshHO{Ap9JDg2dH6d+9f|>z!jTv?kH{-f#9rlFp;zhG0UIkRL85 zNU>=J52H13lVYV-t+Vt2rziIvGhu`3Fe#D;$2 z3Y0iI$);=f^}(f#C5kllEkU-ibfri=Yu*T#tK<7T(P0K#bJ+V2$?(2@dwp#Lg0>v@!W0$qEeG+U&7IJB%Gek z%#5f+>&FC+ekJ$Ei)8bij2WY%>QtZ5LM4NJrNkL~sPh}by3p*ALQWXEzn-$o-5t?i z_%?@KUfTIlsq6cgb||0u(}M&X=u_djT^?O{l-@qGR(jm_{bF{^H@C6ktMiz6ECr#A zCYl&eQE;i|dduRDk&Dqi&(#BhM*6tQF}iuft+M;m6ThLJQ0FNp6I z#ps6-KpPBpuNer8Fn;-`J+s$mwKFl5rq|mrhOVUCaPB)NgL9Uw=@ay&hWN1Se%Q%W zrh+W7d4>JFTkK2cc=2&qtO$eSnA>;!!`NsphshU@LkLhP#3t>$`CtYA5>>;SJkM}{ zXtC)MpR4Z$`DH&hedMS%qcSBk0jLI1ZgN^*mi^_#5H?d?IqcMG;NUj*A-qolLZUR$> ztpUfP&xvDH8v1KkXQjUUOVP>`UhL7$g%k;!dQP8LGxu#3YQ&Ri8XbJ!nVc+6}nJRZ@{Ntx(5MB znRaQ0xY0)(uLhZUo8E|b+|Q`hfa?l=*n^EeE=63EiXudi%GdeB)z?t8*cKEKmE$=d z316Ycu+ff-C4Cd-(12J+G<;#@$z%G0fK{X3x%%LGdh37T%pnmHqwDQ=1XsrxGly3C z?;t9}(IxSW#73)awNWk`8=5_Z+3V3Gfz-x00#zwWWLlB{lFQzJ9De?rApP5%75Whs zLW;{Idp2kYxvfYt>LesO-b zr)b8h{piZl-W<`>wI5?{?1MBewT&Io7Jep{0MeHz6D8Dp>#>0C0HkSugN_FfUl0kJ zvc}7b&@?Rfk!c&wfF_3*sYJL<=QN)z|Eg5`DEYrCD(7&(==;bhSN=*1Nof!q=6fg6 z()lDenah^Z-3{8*5=b4Z#@lL(9>@1L$nZgPJ>wjEXTATVg;MLxvaDJL6)H54XjX-0 z7cjM7KfvYtyvDn^J^eRlv-g1U0+f^4{8=S6H|DqmW;R#k1vGI=1JK@o^t+BWjYJ## za6bTx1hyOMPYMr3t~>G5JF_f?iZ2@2G|(BOydLp@CKYS z{LHQ&$T+3PXtkSi+I$&YFfiyFoa?;17>XvE6a9ILCWay=EEh9!Hr4TRqV6kfrHhEg zs4Ga$uf>L>2!Q%0LvfC&(L#$U6cO~tKOiu!unIWyPFB#9p+DfXkB5puurN^OXzw#Ze`RiH#s_NWH-_IXUYsgpV+MQ zp5aHaH~O5Kx`dN4fe>}oDp3?nY+#0LsIJ%3T}tlGFj3C-XuuW2m5(<&-wW@MaKdMx zLisNGP=Wl5Q9_$aNnZ1>R&hi=_Cv|M^YDy`ZiYUTh=J!4PfU4&AwH{?H9S#J$5!YJ ze3@r9sFLW=D?*dJviA0Nz`r{nw6D`AB$mUmoo(%ZW>ax?J?@(BqYt(sOD_eU17{#I zGB3dYY^yu$sr$h0WlZj?_eO8|#ooMpqQO>z2hX=BZhD~WgxKWY=x@xa zoXK?f-wtP4)J?z7Pw9`a0k6A&)Hs5H2r`N5!cxxL2dZUeVqEfQPN@8boHIK86r~L0Nm349>oMLBJ4AUk3}ZYqT9chp#!_Zz05Z{G zMZga!O4dbpq@A~^0q@g}9)qK%xy|b_w44JOm^yyjb!SZ6dD-$dp&;+nf3( zpoPBQ_H=)9=TAtAk=P%DmDg)a@LsMxzd18%eJ;;IWdCsazD^VHaD;(108uJ!zl>k( zt%SN@cZU-FxN&haPOh#_TAyR=x(^@qPS^HZ<%R(GWI@$8a@=y1B4R|bptnG2ub z`FqcO%BHP+EGCeJL@IRQ3Ojy_OJGH6dUl-|cr1{>hr)sHx3+{Hzj=t-?%7gj(#7T& zm2O4I>j>IibvlD58hM^>(}7=+Dd!yahZMEPcffCzu|;GtT6vR1g-&a@FfG>gr4`dK z+K-g_5he!bW&}RB!%~Z)IG)9FG*tN2__G z(``!&W+ieoPA2)z^)h^yYV-9aRiDcES)n#?n0x4xFS~S zV5=$y7Dj>aaq(bkle-(W+P+BX`0n%me0ALX7!()h;BdSv-3}`a-VOle9id2(RYVX* zdOFr@G{x$9K2YIpF~ox}iT>A8t2=UgKslF&EQkk&?)cFo@ZD7pQIE(`B;86b6`c@` zBGXW&>6^&@TexW@Ckl4{A+AUY+Hv&2||jBL9n@?R$#=;&zn^}#}6|}yaf$)%|$&Hti&ix7(F!F zw&oxUlJ#Y}##PeOgjMRB7NJo0k4!xQ2n=oiSxL)mL5_bBC@claVmiKfWwX)35rfSf z`0@6n4*%UR7UI_8UtV@V=CxR?UMw5h(EhdE_(_EzETo9M<&7No@d=Ab$DLDroI8FR z^_$g86>s1yV@^J__X&kM(NQFI+R|ujQWM|(j+^)9!qv9(SSd$fbx4AN8$Q}}_^n%r z8d`~xu5=u2uoyB6IqQV#bl@ZBH6T@a1lC3RdK#GP~OzwyVc;flhd;;L%wg`YeN z$>GRFelXL?4AZzwCh61h7@+Kf0|v;c)NHZ*1iyx_alIg2F{xN_-m z?Yi!;s_jbsk3r=USRU>-$W1%)hxx$WcVjq!v-`APrBor4`JrZKtF1!yHb(fgt}*P_ zUxD8BH+9E>XoqM`rl=oOQ)Z`C5p?OyL9!JQqvXBV(eg|MHL37vvHQX4NzVfdGnx}# zoWjX6y7P??+?!-_4&fxuE{j>OFok(6o%-TX_bAu`@`3vzqZ3peg+x7@TiW0|Lj74M zBr|^Z*};*MwOo?SGo~XmdorbrlxQLtVnt}Mx4sdjEmyw};Jw!Bj2U^5o%dQJ>j!YT zZTb-SIZV;25iOK!f*1ptQA3RUQ49x3lu=$NQm3=}XKK7S?LOWSt+$YI@^zR^@rBnulJpivY4N!?zsL}_%z`#@BRQtL+oM9 ziCsVl*)BjRiU6`zIzPE@E^@Xv&F`MI1;{O^U<)!cXOgIP0ez_DED5_W3NTi{P*Hk7 zS2f+)slmcU{hsde1-W5=@_4m9^raLf5qdol4LW2Q1F&gAL5hqxim0DaS%;e%jOKK{ zU6A6Ok33ItMsKDU^hPe@_y^asH}dmgv!#v2TY7UuT;+Z#Y14$LM~xCCD~Ehlu2fip zDt@D_R3kZjj37*A%YoZ7K6{OoL&4LqQJ7*@%TndH z;LeW^3v)?@g?1q7eRZKf88ldO%gI8Oa^-eCr~{dbPOzAuqTR{2aL-*B;f%ow>I9`C ziD&h%HTlh;R=N(nKle&Hsi&9A;DFTeg4NAC zi;xP;enlR~7wVA0O0~7RZTh~cq!d;r8;QbO`kCnz0yKMU2QFUVj~i^K)>pi1YW!S3 zd{-P`$iR#7OEA#HL5&asB2a7;G}K{{a3yfER`Z!j`^Ahg$W;d`zMG1+cv+3uVAK#U zTvO6$s}yj0i6K>cqS^Y+W_qn((MDoIl4d|dN**$)Hdxz^b6+Hvr$lK=F8kK70$?El zbaXxGoN0&2ucJ~xG)t?v5}>a`K6i-ViFYt37957b0*gV@70T+bop1=~u#~VIVl)xx z%#omId;8C6J1Z+~q)neoKK*@KT7JmhSzzV=qIXy^|B17M(i#Zo1a0Au!~ z&TQIwBehdr-f9c4z63`1^WIZon*Q?|(??ywA2SEZa(R`y|Mn4o@z>r-$Txqypr?j|a zGWvU-yh(-}B}8}(Mw(7@b^-SW3h>NllK9}RM=vd`+Sy~57*kY;R-BhB%qCc_`Y+>$ z%vzljksE(IF7FH}si_F5smB9-Ou9zl_MYGuNQhz;s1lvun=*8PaMt2$*<3`wUkIw8 zj0$b`7J+%^m@kHPlzzgnQr!ucYQF!)IY|5%I%U1h2-0%3<`6jenl2n_{bgj7meLb8Z?S~2sCX1 zj>T@?J^ z+jkU)nxDMOF#$fNL#6Luv@2y5Xa?VC-VREm8PUjiO57$2#9m0!u$;HPlhb+6^6zt1 z3PwzC7-3Ob(E_1E-b=+KOUgY{YY76km2PI)s!CH~;~$GnNEyDDM6)H37ry!0_93B?%>^-3J(WtC&qEw{ z!QNWexvAgDolsHL@Y0%N6u>IC$GaRB3kiY#HMMBR~Ze7jtkxMU{CY9^5%^1sOy!lu%C)b$)zIctm@*J*4q` zgLhvS;_eqDQLtl(J4cEIrF&&e`NwF=Z4H@^%>u`u*&QF&VneP^mmg4XGewudhy3ea z$q=L_iX4r}M&~eSv&G}iBKPB>RKB6K)?GPZ=>L#&bsRhnUijY4bSI6!H>Y^t)YkU^ z2lU}($}CZJ)55CC%r0op>rLm2lHXf%Y)H*xYKgXTVn$2YVn6rljczrxxsvl;D1vS~ zz7|M*BS_`NRH4uV_4hBSCJ(8wstuGUG@4Xo`p1afB~6%=FzgQ2z`$SwnA9j4HVA`; z2Nu{N3}MxWSo)<63qTS`Nj#dgi4R}dmX_n?N^rJSXC!tU30r^4%O46$D`iSESLGua zSEXF%e}c*uuX+|6QTb*88aBaJB5)q+%co@qi_`SPwY9AZlXS1ve*8ZdKyl_dKR4zQ zh}~htEbw+V!u2({#-xZNRmog9@^P*3!G$@QsXz^Q2vMSwiI*(sV#`tC5LGVHoq|qF zaX%i5)HFtqw!Ql^n{o7yTC;|mY~VsEo)Io&bQfCKKQFoOq>SZ-Nm^0VVIB*CQvM+j z)z}4#9M{O&0zUBSlXnaJgZF;XQ#mKdz`mJMpJq-U)m-_6#21v~B~#i#^N0z8(&&5W z#klLLTJMZ7VTp0ondaFuLBoA}7uQtmYzAeof`z1E3&rzuz5@qY$$dM$I#>5@xBt$e zuL4fG75|;7zJ@ivHd#Tw%LD;M9-HZ_YNO4aTISF#1>sIp5GO;rj3D+vIx3~BN~K(j zp(sotZ{REuln#dz&5o~Q*V0dQc^$Uape+9{B^Zz&5J8fK1@Xhqkuy16(NEL*;d2(r z?x}Q?sPY~iLh!@bO$@c@KkLzTgXdbbQ?NB9Jv3iGGfB{*G|ybz>p~&; z-!|;&hZL_hp`kx*+YTweIkQ<0Pg`zwvT;tT2RBKrpHW0cx7UW9hsi3>zq!gtc`cnM z=>5hen2nF{m-)M5(^-FG=4{+&rFdGFL#s=YqlMq1u&L+HkCdw@{|jQ1QWC9+B5S$( zdP<>CyM#$++bm`#K*beN@JkT!z(N%hrWO7r97Q_cVjrW*HW=Ek!4aU$RdB&YQWKg~ zGtqZtyKKEZ4*&KPq=w0-oRN3p)GA;$mMo#I-Mi~SYHF0%uO13Zrp@K>XwvNgw8?Ut zCv|*5n=qR$F0M}L(%n+b6l_BhM#B*RL(-B9!Fs%yMBsD%Qa}3oZ^Qe{I#O_;&}y}D zRILsYPkVdas9o*nu?8cSB6e)8u9|64tjH_Ne^Q77C2M2(@6xH{)=t63KbU=%8vQ(W z3k0A~vy`yYji#kYV!>?U<~OP*AkqmsK0_hFjhwm!G2~AaFHgzsb4&jDxHv>d$e!X| z2D0-y9MNwMZDT!BHW)#&-=G^qeK2W`E;6N|N^)7eI=?-&yoGl%{!o7`h{f|r^e<$Z z|ECiq(*3<5TxyUaN3)PuDu{-MKISVScU8!%HB@0RQ}`-peBpcvjmMz~lq-~8Di=fL z@~QD(XtgXKq^C_cMtXWV+N%!WHgldB(>TsnzuD(rVbvebY~m`@SM#Z+G4$02UwDuN zhuhkRthaCXgqd%)o-Sr~)BWTx1zu%ekxLoyIHc&-1V!|mz4h08uo4bq z=`yYRPCL8ZrMdgj+#?4xQ|WhDH%UA1aOKs_GkaXKt1#7wvvc6#(KtM=z?`iP3DC~B zF5sSo!28M>%zq~vKRVlQ124BAVY6ObEhQUgr`$pQI4zqpkZuLz~`6Hl`y30tOeg(yqPNKB*;QaHV z1{Z>j1dSSr*)y~AM*pkxt|pJq7xOuaf?6o(Y~*HG^{YAt~&Wc=d4A#9_apNeb#qY^ifNY`aM>J zYd>VHR{8Qvi4fY69Ih~Sv&UqxY!Bppf2D`NOA%0D)M`4EVz-|W zrLIULNU9WuCdVAjb2Sw3qiNM`r(51E;vDX%i0ZJ*>8@mgtK?WA73d$_fUG{504_{vqSqfg zJ^j{K>o+x%{*u?+-XG^vwpBtV6xQqva1s_e^=}6$+))kl z1>H_)a1j)i){)ES@ zj_mq1#Z?$Ow>hsYRktSUzg*FI5~hY*?1QgMnt4Kcd4zI!z_olYv8N#bl4AHciJYfG zHk%SmXw-y~2jeW7N9s+me;!YY3c7kFAb-usp~w8QBF{jJ_PnMXV#NV9V)fdaNB`sD zL+2Km(|+yijb!KflE@r*HQ=IqZh#Gs{eTIl)9Fm;k~Dl>$m2J~3jMh20Xv=1)2sE% z_=DJ9SCta{KqBybxIrO--@Z-+r0xAO&F_2|&#vlwbM?GKklT7?R|&m0gZ*vb$M3e| z1C$)08H%|7=Wci>zYN@ra;4CdQAt@UaU?N#nk3WV6tihSEJ|gh*Pa|n%Mq=%N~#qN zGWRE#3k!k^2$$QGHZs@O!-w$igKsG7Lk*0)@R^911;7lA!=kga)dx%*PaUVq>T}D>iQ!;(HAeL?=7)>FTi?&3(wQ4lidM{j0hvq}FrHM(I`H-G^ldUa-dum1sege1+ZsI;Nu(P<_;N6TE|(qh(!_|t zKhmud=Up4(aCLjlAu%tB4v#ZctWcufjCka;8(%5kV9FyIPvq8C)}1woHV8p;g6AlT zL=8kFcyFTT8XU0JZzL;1Z}*2eJ1(aoIgU|pc;lGCKwJh-JP#wd-aqG%olE5L#Q15o zkl8W^f-81F4zJ~Q@>4{OuH?3W)+wqG&j0z^9GYD*aNuJ$EeJdtq_svRyx=4k zWVyyClC$fSp2+k2io&*vZ|~_b;{h#^7qmrbXw!<~+KK)CG2Aafl$TAvCu0m5ijtW> z(~mYAL|TsXV;8n|0!JDyL|2B>7wN#(uKz%g7F3^pk^KMWQzVJ=yEOZJa5!w7*J#qe`-zn<^gv-Bg; zm0(APqEH?^avnk>I+*~&GSiq?eo8-e(3|wg0iiC5J`INW_dy=_Jp-(r_e0>SLmv2u zi+vYH%{d8d+^7@vQ50|MZ*VRKT1;6g;9Ig>>~Qmv!@_#@#d=eM8S>T9169_zTpYh( z5yAN`An=wq*>x^fd>vP@+2Vx2pIFsM^!4?11h}=~+s(Z91j_%irf_p268B!){;B#G zq(aEb=}~87PC%U;EL@cAS?SMzjH73|4^y?}s|oYJ)?1Hrym-*RHFvvE{^mO*gx>D- zK%OTy%BIDFWGo;DvQ+;dMB8esc$9EC1QOxI$jrYc*hcqHd(OBEj~uVRcE{ZWGpxH< zBmj*8!WGCBysQP}kZOGdK=LRlT)wKTEm{P5qr~5O?|#YD7=j5Y<5I=kGEn?}CUTZQ zyGRadE7J%cI8n9)Bq5#T`i$#Wc3V2QHzHdOQh>37ELQKV*6JU6rtzAr6ljUnbM}6Aqn96Btuyrv0^f+7BSGlU_yjJSLPO zB1X7G3@-uQJ3rLBqwxH$jeS4P^?j=m7A2kdR(zkUn@rE*0X(Y-sm(~qF3>v8*E&drx#;nQQ_)y+#LJ5WkW&#RR0Tb%8QjY9z@{uWTXgD$E@eNT%I0^=F ze2n25q772xDrgWI zuoZ#Cdss zylQ*BzCuK9&ss^mb$7{BN}Tji#R}X!Paktwr*7vEh7dJ)JTz|hJX+N7da(g&3v#G_ zfd639s)Fu7jc&_;?1be89q zCy0#>Nt@NPYP2+mD?zIxvDYrOZh4-*sXTHq{Ile5vwif7>pLF zs1-gLSF2ha6~_t*<~@lc^SboNSw2S}V^9TA7h;}nT2A*jlWGg-FqOH}J2a6NkIXX~ zR>Q}zZvWnNQeHeKmL*wc5)Zv;pEsHO3F0usX9Xii-QhXsD4S za5A#F9-!-TsE}fVqFmC2&8E9N08(Kcd>J7E#|s@}!;?QLEUm&?;>C(B+p6oH@RGcl z%7i&sM&U5B?;gh7@S!NtX7IX){^!@Hxtqg@n&^_H=+7iY!mS2#4)4F0D8Xh*duov# z@RKu}3R@bsT>MZmRwpX0ykx-RUT zo7Y|cS*CooB}kc$V%<4E-SclRteAb3w$_!>f@0Jy0F%=tqn$cig_ARv=cdW4NlZX^U zjdL$ylae;MKA*|;m^=(u>$vQBOkxW_3D6M_8&1}#g|aU;z8RGI&_Tw6I$#XLpw@%c zu>2u5y6LpY;`d|u=58i0o9B^}gn2n(vL~z_{kcAb2Qlu@F_opmH-VzS%Idorx$J3u z$db3Aj5e{UXzMGO(@_aW^w0J02_t^B+=x;xy4dR+$R9;dE@+iX z4myrgHvB}-aEDw>mMj`!F&Z2bHAJ0rtx9y{(>iMu6_+ev8WzKs#D%U-=Gz9VakLk+ zPabB5GaD_dEC{GFx{(;kOCg{Fpbx##wXj5fe}0;1htTL+h(n6izdcEKK>Z)H z6oYUshk5K+yruDVzA)ln;6nL<&*8dI0pMYV`%ES`vhGH#|6VW5xV_Md&_-Lf3`C(E zebV(mU(^0}o^Ju$E<*9T-9~mkwsvlY7=7!%8Gi?UdTf82=9kulusHn~eTgeLY!tf9?)@S=45rI35{;uP^gMfTLZk*FB!q!AOE0m~|D=ebHmdA!v^q zU3M6&vLN58YPL@K<6QQOZr2DK@Q`?KiE1pRJya&i4@kH0<=B8UCAEOp4LJ#LLazJ zh0`%(uUm>90yhcYi9a z-QQU8iE{sS@Fz}R2U0GEsQ^+7Z;Xv|k9|2ox_H0Kvm;fbMpNfI)b7z)-FrtaDH zn|0xBg>ca}2<8vPvl%|_d7q5SjnGvMjvr7p9}nQDvemKNV`ElH01em(v7 zi8;l$C*a=~dwneZ&llZJ! z8>c|8t>hLR9@MR;jKrWQ4G#+g*yG2IVjS4AF^KMua1Iad^l)V>{F;r3G)nM6pcorNTiLm{TDDoAq}q8wTGu+0bVo|4|LrM_ARX*Z6T@XB z0T6fE?oZERF(!qad&JH};Y|3a=tfjrR%Ml^H-rfiWG`l7G}JG2nzx>T`?KSx=F@#U zH|aj;Nvh|z_jWlTg*c%iZe?#=Ea$s4p;R7w*hX%D>V3ZQ+5KC~(Iag4qQE~J?uTY* zMXD$#v=}Y0Vs&R{C(ppOSAor3mlZ97kiZw!Z0U}YIY~RYIxSHJ80e&3`A!YA#gDiN z8iQFX!(j!Xpoubc*FN_r!kR0fi@Q#eVxz&vm9%>njP6#jNDS5Zc>+3?{OiRuqWfFN zW1^s_806UszIV$o3|ei$TKiz*)M;FQR^c=TZ>4AeNeI(%(P|gg0)xZZZ(J5f8t)q0 zF9k`zZ?nW54;r3lRkV+UB@HB8|55nm>&;f`a_e`pcPs+3Hz`v(50yJ41z^I`_%@?wir7619QzL zu5_PCnS`WZ@XO04OxzuZe)4;M{B_?C`Q_~T7%yEKJy9T*RahM!9jTaKVEQcvT*)MLS`qMrFr&)8>PfNvo-oAYceyy*gIwjX8(BVGprCN_!D+iii&dl`LK(XY~WU zmGZ!Zd>94-saX?n@r!9gC2-H?+11Wg>R@!psSo!pBTC6}Qigw_L62l`rWc49*U>9u zZ|r@4!1){*QIp`(U^Wmw+0wCp`B0^KbTY(-<%7bq(oBkgo6Ytq$pm3i*g%#$%IL$Q z0j%D-ID6iXp369C$b862+ige@(?8sxn6jX!*x==(VN!2>p9@KtY7h^x$KBo^X8g3D z+cTLy1pZ$NYEBDWb941FoSc947QW9Cru06c6Ec+&hU6>;!nlO+AVq|nmhwMPe_Ip) z?T=@G`yabSo=W|Jw;6$4{cWG8 zohkO$;g#BhTiV(@m;J$x7TdL3A(U|X4h_dIm3Pk@k}R)52MEIup|9UfZG5z5)$Fkc z%CXW%JISasu+8be;Hed*DdsDLxmxG@Rw(cjqD(EIPY9V*U{P;FdYwSrrp#-bl3{ETN&<(A_aJVEPeX*~ zpov7h+ZuU}%QKS|1A(m|NX2y!cGTf=uE^`KFzQ2iQ6ZCS*jOo+rrDFx zrezU{`1w!|)VK&?0_EIFGiMPpC6gwQ=xbB}0dspk=!yfKZy&Q495~bx?s$NLiVxpF zaRZLIW+PD}CwVu~EUzm9R_B3<@AVsWxHNyP@kI?nhzeE3GAh(v>Er!hNx>k>y4v+c z@jS3|31Yw-YFdsn)6=I1u z&tBW;+~pmX3R5cD`2V>8H_yg#?{c*Zhw6HLlWUFGJG@s>!sp1{uVAttG+&>wGlIfsglwvS0UL_${&?J|Z8i9OAF@JFR4~D_;y$~6S@dub)gq0M zB~B`+I50pLFbu5BhlI$B?iQNElKipT#x6^wGIC#!?mogR*M`regLHzAYox6&aPHc4 zr|iXZ$p?<`c)V8Mh3H4Dph}Z*oQO7$Bbk{HH;)-LXdgG?VY zPzb63Qvk@bxYyu4)gpkmXlLlB3MUPf;V1fe3UMTtJ>0YH!zpCo{6+zmEP@hjqKs4X zc@kzHe}62~s$9^-+&V2P*=EoG))Gd%La{#kS$6g zS2IYyIAL4}^$+P_AQ=R1R~Ptj9O#PB)E@&jCJrFmpLjs9#hXw$#KzCy`Gl*>OYX%Q>A56}I~XFkJCH{G-^0ob?R+Lg&<7|st;Ti0;w&W_IaYi$+48tc&S zI|&-cApEke`drjNPx7-1=FZ|zPj|Cm-h!_ke9$3R`hh=U$|>t|G#+;tqIE3&Yu3Yx zSK<_07mKA%9i3Cxx_zET*GCm45*uL<@<)MMWisO1sfo5UCI$QU+A0 zL^A7+k^cfvGPDP?8K#$YACIkANy+y~Wm2Y?CL;4bW(UP;vSD z-_1F1KZwCX(Qwl(zQT&m;)fxt+PaJ;yo%+Jqcn0a~J=SkYxRSD6E-|fT}L$=dkFdoEIPT|s!^=Qb}FsG%J(-$lt zjE0dSL(vZyEDrO`+O@3PzJolhdqv{*QgKpGLEGJup2qjfIN2;(8D>OC+}+niS{NTm6(@-*=|ofn1kBj1ST3S*35m=I zL~Eij;NlYw=h3C>>@~Jtg)uGGzJ3Psux&TY+Rr@i{3+-{8FqFV8EqB8g4xJ?fa>WL zT5J8p6Hm;!_S$RDxccg=@88z}*tg!Y_0f-B#E*V-J6-)f&ZydkPZfrTKBl#8kWCne ze)n;RhI(}9TMcxHQX!&!Ac@B7Hg3`5n#buiudJ!SaRJ#_Cu$bXq3&(-(2k~S#mlH= z8xnN0mHQa6zjR`SDx|RUGa)6?aSL*!Zq_gTn8teLOBu@ zhJ>Xughn_tEc@snLYI8PvX2TvD3uI&DD+La7e)s4QyEZ8K=$?a@Z=MZX+SqNHnMQx z!iS!J{`t$NO`GOlbImnd&OP_s0>Ejfzl#T!{NXLTe))X<)={I!oZH{qbF|hP+WWcn zj^A?FoH=~xn3KtuhtVRoNR4dZ7bp=KaUDCu)s8v%ln{xGzekE7DubIb0o66tut;?N zLsR)0#xYl+m4hZi;t?>+j?NAqTd|b1=T)4F_naf_#p>8ml7I-U;F2>>(Thi;8 zf9U>9ZEi(t$1*GIEIe^Ud@Va-#CzOx>>x(|Z2b2y3<;u;Ao6h?hm`9wu5mPH9`-iQ zIr2~>S>Ao{k#r4q@RhrNO?%G(n>st$*}jvK3eBiUXta=|96=BSoOI}7TqH$DSoL0k zBR%{uPgCO<#??2_GdPG;f{>6|lP2@I_nprHvt}|}$kUijlTNt=zDtC0>}zct&DTHv zk1UuvgQ4LfgZW{kbggu-rRXKqzu`Y9Wx;@vOlYSjO{m6fXi~0$DN5;BjEf-eha56< zG6&9@$P1fxqC7@eI4cp)og{4B1>;8}YjXypamXxq%7>o*B+*a@&w^)G!B9aU&{to5 z^?ipOc38vGrAr5oKmJ4>fBeyX3BbPfzqd{};RJs4quaUZrtcg$sdc}L!!W!gsjz2H zg;S4!x*BxZCy|zs65T(5?&?iWmX6NdqPl}C$25|fGmV=0Ge|eq;rJn)Yqt=sSO&FJ!5gh@OV!@= zUhEnMgm!MN(73jO)d2)ynaKB{93X}Z=-~q73uc~|FF>Ib3$+Lk^!NAcKmYm9rvRsP zc6Rdl&wu_mzze6o!1haGhDpB{Va=(1nblna7Q?R@In zKW5s52^=|N0mJ2jIozdV&2a$j*oxhJEtEjx+90fq{y!cOc_aR#6jHlHluhM?G%kBu z;D}fo-ZcT0k4-q4Ft5Wg<~PIuMnLys+g}#xyoC zYrLh`=?Z>8By)B{{W3DRj$tr3A$LCV06oJ)jLkNh13lR?as9sMK*;<(R3WvwESJ9P zB+fqmD8eW-z6M%W=IdZm4M*_G_HGK1GN7+Gm5Tw`8q-f4!h?MlSwga@+2N! zx{_>-=AB0!#)W5|&V;cos4$D5NKH)*X_=-UAMJ-s7(1G;UGiZLn{^0X`3_u1(?2w1 zmP z>0<7MSfX0T*F6m3rLCwV=h~@^1B>UvGi#uG5L95Sg%{3(WiNvt2!UYh)@>UvxZod; z`Pt9zT(_?Suy6gZt(h}t^4MdKan3pCTzta~*MGgQudgX-*&q2f)X@t~+t3ft(zLCF zP-sWMrmf)n6#vuDpfS8IL3TX_wyz3QtR ze8?d@{KtoXTVLO}uk~MQtW$Gy!bV5hon_wf%Uo=x|3keB)yu=CC5Ch^hek^aBJq3YbV@Ty#?f?J! zMC>)%39mWy4Ju!2MI-^oMM@6`NhB0uxrlbs43|qZWHKDTZ~=$TX+{bM6=W!tL)PtD zPri_6bgqU{6dGWsv>uX8;Dot%| z4cohVXlZQZYnOhM17|P7S1u`$K~X?OmZc&DD$)tkKhknU@Hgj%040-AM54zajT7X% zjyllnCg~z{n2e?Z<#NK?=5qUkPqSmFU_gMnYA?p@Pgg+K0BmSS%$WjygmzuTA#>pA zwdkR|VT{z*!OThU$`&+Q_w@9P`{M)m9|Y`60QRl_`E|`TS98rZ*RpZrM&{0)d+ei+ zKKg^czCIHkT}N=jp{Trh8(-^X2N1#}9bKE8ha`nUXgE?>3`fWg83)u+DW^lcCRami#rv!h$Q{P1&pdcsfm$v=OL zl+0O5mqG|90gP#BxaW@J@#5weQ3~cwnn-Q779DvwB1JhIBAu=ULLBLu>RO}`LJ)-k zX*UfLTs%r)*{ZWj99)EwM5>JIq-<9}B%f~(6&VhP!SNA93>J$lUA~SdmaSm&tR#WfBW})2$do$JrfkPu8bYnlcry3 z{|ccg`aXm{p#oniTLo4+2SNyxRVIuSY}(y}bX`hJj@ zVq60UO`VFbr7u5g7QAV4S=2M0$Bf+*s+gAZWw{CPAs)Z)rovQC2$l?uxU zBxwiIuE(g_9N+%JWgIYN0YR9;5upL%Ti=FI8BB%JW*#4bks;Pq62aQGoAk&JPHKrL zmH5CJ$8yGD3sK4>r`nNb?-~X(GsZS>=)CFt`_n7Yj#II|#$Y-UY@z4C=AG!KQ83E* zHR#$J#DUXc=~_flqg4n~TcM{PvAaivVW9g42JXsab5E9v!#gg&^2>bV>(}o~0QRl_ z{yO{Yv$^J)Yt03f@~F19wkPuWyaJ@INyBl6!y)saSTHSO3vJaRFkcIS*xZKhFm7cc zl}1l%#aX-vr?nY;AL&PgKuSAk72;*nw7&Cb+)UaAe1$59NIx{sZB@LglJErBWG43t zw6s#6CP4^=sZ5nJlAkiBK&dKu&crN48*vqZIhiVIq;$ao&Ftl!1QZ}~u(LRM|r$x(|I5c-i30kRc)?6aVR z##7)25nFb36S{u}m7>L>O8#T&sp>_VeBakc1E; zKcl@g3tmrKK_JZ>-*#6t7|njAfs_H2N)L&|m)h{|6}WE36a;7j;S)wa3Xilf_ov|^ zxaKU84njC6B0MQb*JY5T$hi$@p+HCi9h#QC5X_jkAD=nzTn?VLkb*CP&?r-i*x6B| zkw#a^=2d~x1VCVv|LuLQ?MN@a$wLEaDGc$R6OZA>i_ZqFDV53wx1!B{7TVBAJKZyNjoeslLP z0R~1j)E?+KVtEwl1`#Rr#_imA%g@MVGhBV{xfBCIsFm>su;*1Mz*B++txYs++QG7y zx3cWPXOQEYn7CgHGbW8^!lY5m7(brL&0}dEGm7ShQH-vsA>}B_ei_F}k&+tWgp`8; z0%h>@rE-D(zCrSZVY>SI*xB2|j?Nz1cXzV8tCw9py%b7CqDYbU9BQ*!V;@h5QsCea zq1n~fOIKeXxpafo5~w)s3cDAAs6<4b7dCC+wg>Ju|W zDJM-B*x{CCbi@=utw;6^gq?v)8$7`#z&bX|71b$Fk_^ORO<-`0F%RA>C!v07B(6<` zq!oNp(k9W$j(L<(@e@MCk^vwEk8G(_mDV_9$fZWv5tXUPwF=MzTu1V;v(9AP zsEHK)%C#`p!AT?+6q-mwqy)ZD_y{}yk8`Dp1h9y^NVe-pI>TejUgWZW_4)YOCoylz zc!r8)oCFJO*e8V`nLlk3FK*a^PNymdmu11kMouuXwO{u3x4)gIo_cCu0_q&^QWF@C^tIklHoKZyA{k*Z1MMHPF}yryK<>qd+)_ zP+?enA`yIX;{(LXxk?0q1ED>55TH{SI+9hDi^l;@!l074kpZL0$exu-B_=XTs02`^ zVhdbMg%V+nRYq{5tzw!@%vH>n)*4AyOIvQKi$tvCNouW>_tEqw#|P3ep?C5oaxjnI^R!Ky7>_uaejL(Mhs zdmmvSQErG6nmMvjVH1pPX<=OJ7zWmCf#Cvb`!2R+*R!pm78>htM%9t7%TZIC#m#0& z=d#o{)Z)21ht?_5AijUxqV&qJmKiKbng zBnk{oP{ZKRAlr6#FuAprAPR7$L!`A~HE5020YVhmxMK^S`O)_nE|kc+E<)QtB8+OB zHG#F}FeHj@@eYZT3MnK#y#oY6XlRPcLdp>d-cD!`(xI<^fc|_DGL?$F(nfl-3_uv> zi3Wne0$5**O_(uZJSmx_EXpV(j*io3m9QI77No0{i9<Aj;R0C3Yh81CX z`$~t{BZ<122DGYbwO5UQ92`c~H&9ZFjFR|hLMzZ0CB7K(?B8O1UXu(MiRgQue4eLQ zujjVUeT1VI&1PVD*t||5kV2!BCR3B)($kLM(w8?vy3$$^$=-?#m{tOg18cWIT^2pD z3CbZlh#=Mocx5X(j9^S1Oy3VSwE^gzJ9dBU^wUqvFIn=y7x#4l_O1W)I{w(>c>KvH zxc$x_ic3Fosr&46%eM~>_EkFVQ^zCDJ`pl$2$X60+4-fCkv;Sz+L5re6J||D&X|Y_ zLv!PV_MoPc*xpc@4fjOP#Q;p6KT9KA{A(3#u9{hzCuRk z_c|8HqlG>A;`&BY5$LE={*v*GQ$Z*NXb)rr+uC5oS||)xPP=4eU=C~F_w{{C?q77@ ze)so!p2v(Cv-0nH=b7*P=8f0?>Gac2cb6<#k`TF1JMB~+c;Lae?0OFj8dIinDeAxM zvQK>d)?0765t@y>qoz&WlRnKbkZ3VLXS{HiIlGpP}f+;*w)c(T(iX-{-H+a z3oulG_D&RnLdu~~lR;!_(3!NEb9z>7CFbWTh0{C=-8_aYf*Q*S_oT*g92}u>gppHXgGeAuyi(`{e z5sUr^VI2Nq@Tzt!p&)S?GWb0NLJEe;W&AL(bib%d!q`^07*U$8p#p=&64cfu07nuB z!#5nho5x3{-L3bk2d}}EG}VtX39B;kMClSzq!Bj2Il_SJbev{eilPw0KnyGuQ`&?_ zXb_HJam2FDS_?~yHwuV4mU0$?P=*L?J9W|k=qjB9Y!YtMD`7;HlImqw4TOg-i(otq3#(R(aAi zW-9wM!9Cdhs+F#^?lT#7^$l^(wcqDIuKOeh&YVo4RJIwF!O-Lj0jD24iwP5(*|EC^ z(w_Z!X%7uMVu*1nGJ+R2AZoKvpF^t<5dyO(!9W4Mqtjfo$*s^i0E2@f3>8b3{Bio< zLoC_n1@M32di=>JIPbmZH2wR%|9-jB${!r;GbM}^hy^p?L#Ls$HMRw*QAA0UGyzi~ zw1Wsk#N-y3J=tWcaaNm=sH`MxNKVJ z6YI?jN#scUl*4dsn!ZtKdd6kg*;32)iFNFpP)qOV3j)RH=TBM8)nTjl% zzjAmhOWx7K@Vx~QboIi{ZfF^em^|L_xtkiHp%!W~kaDTw3jq)W0c+R3T>H%%uYV$& ztx-KaJw9;YK?fdq!fm&GHxmc{OE10nExqm+UwkRI-g?VbXPkEWGwD>yNZsTMl$UPc z3pf6VA3pK`DH-BP1EzB@HnI)1^|Vf&6lY%*vy>zhS(;jZ9=)p*UTuR7TjAwbO@*^= z8?4<5>$elF-h`_R88gtvPe8}a4rK$kaBOlYsyef=7NKJ)cebT0Bx|<5iXSS%sAPnC zv;>4Tr7H=K=VUCFLsj`xD3qxD9!I)15g3VI z5W*qUArqU&kj>^OL;=1Q_?7`gtTmzZNWrOi)2VnIW%bj%f58}D5 zRax+ zpL>~4T>E`G2M74_d(Q!tLPg5bpHj@2KOHyi5taiy&*9i(P9TaRHf-2H`(G=wEP#9& z)te`5s>iX1tU;|;ss7o~ja3z}dm?6Y*y*q`V;9d$vAJz0-Tgh(w={qjXjMizd7gY> zDgXAH-_YLKMPu3|v__yvCYtgU#!96!*S1Aus&-*<0F@F`Ntx*D$3teVRbnz@C7hg<>v6^bJt5PwdY6m==9s;z|y{78gWL;?gpUMj*5d_on_ zUntU7D46kut>~3)(`Peja_KbLOokfIC6W?HxVQ=&>7leq41&lqfP|BbO$>e}R#U3# zh9uxhIie#F>Cn#l6+u`c@**5uG%k_yDTjsRTu8Y&i(9Y-h)nyjtw?$3kkvZuNPQDkQnF1Q{H48e0N^oOfvt4x5X3 za+RS6jvoWNyHUG(gbIB6d;6|=`w>T8d&oftvuwrkeF?z6_4?}_r<}q!Z@ivg{o?NS zt2hm=NyAyk!?cN@LL;ZDut;1xdyQ!<(lM=nM& zV;vi5+=7oc9FWTU$g*iUMviII3T1$ZS{tAlfnNdgfXUiD4^kewHV5OdEyTzG0|)c4 zyBj)sAzw7-qtj&PR$m6b_z%=`*L`dL{t~ z{D618>s@@{10Nt?7-seA)qMQ2kJH|^gR{>*i!cn?wrv|qDLQv|5TWSm>>?BSpcZ^o_|4fe=V4>cOsdbyiUsdcs!m^O9QL8@$vJ3n0H`L!FEz27tuuWVwj7TU){76lf31h~ZKrRH15D2AFjwB5F*ge?AL(i|} z`SqJwyR(C#f={vR<3~XSvS>#ut}97-E}5DP_4W0%jvYhGn0h8Rk7B~8dL}e9GA@^9 zOk+KD=@c?lAY7Xi$VBxJD06k-ny>?uy5^k{nJGk^Zna@ z$R8hih%-(*ed+r?@V-MqXr*jv-ZTo%I}uvP7;zgVjqRxvwwf_>PwmBteB91dM$|&t zU@KySktmTnHDBuyg?osRPx+a4xULhqMhWiW`=Ak zrJz1TP?x5lG;Sfl?Jpn(ONouD!e;c5Riuk`!nLSK$HrRW$_VHvFh(fNIcOb+2qN^r z5PJJg*xd`oqCi6!D8isTcEiT?dc(%`+a^z(#HE-0)AXCZ{cmlnURe_?oVS4Yyyrdq z{`bHCU)vXFoNk(!}s5Re~keN1iJj}%i_EFVM@g^*Z#xV)HzKcJZ8+8 zLbf(bDPIIM%ab=PzC zRacoqZE)Bix|K#qOSOzq=sGfhOtk3`#Kyt);wG_E3y_YPJ!^Po^~?OjY42d|)|dI0 zU;K*aURg)h^KfJur7W0E#?_w0wE;_OV+uD46%*rIsS+K19U-J^ zg1@ZjaL8D{A-03odyzawqJ?1C54iB8qqzOSr|?SwcozDvb>b|UbR?BVM-dIRwd6}h zB4yh2LMwYLX%HUh03zQ2O%nsCC}BCcu3*8m35b+8;-gID(c+{fC?UP9>0WvgHt!%x zr(wZVV-OT-Xl#IkX2SF9AXkH!I~BcplK@z;@`aZ8{a*g1EBMAYuiKXZ>|5}Wk9>q5 z|ML&)!l*W=7OlYMx!is4Z~n*k z$C4#WIPJ94#Qpc*pF8oSQ&#-xPfyGbd_PU(!>Uc(@tt3>yQiP8f8;!7kDtK!(et87Gx_r6S8%|>{Sh8CHq=?i zH_(MLQK)bnBf_GTAQX`a9G1Q&laEuQWvu>SX;gToPFEnLBA3pxv8|o&{q7Ik`{?8B z?(Zj8lQzL!X;bwlxGP~`cYJ!{rnhGoZYkC4&3M7)< z{X@L8eWw9|VG~wiB$l<{&4v0@WIijUV7Qc2|8==qhK3EOGwn&58tMpiWT|D6QaFqs z4)D;68+qxO7oe>J(L0O|%6n@vRBm0z1mZm-6#R{={8>d{@6Xc3GsW0IlrDn*Q8MmS#(X>w&?;; z%Fc`{S%iq&f+H+wM+_k=|Bu03bvbArW4bN1HRj)j%SkV!x2MM|6bkPd7#RA8T+VC! z##g?+{a?O)Q}=t{`(Dn3_DU15^Y}nAo)4MvDGI0zCO`pWwk3U1l>dgT3_4abX2S3EvrY3|CyztUWp8m_z z35t6C`t|(&-rur(4la&#>^R=VkMbxTkn(Er zoXiODU-eBMsuH0JQDMaX)Al2iO|xp#cFKK2=KU&Vz|Q3|6wB1*vV7yx^EmCW1uEtJmvCPge&rN18zIxsY-Yj)Qip8bCtqWk^{aY;E%^QZPIWg|d~`t;|Q0 zJfoT}^}o7w)hI#i0VuGq%a08GrYCP6>WF0ih*ir&2m_pq+X^v?IHnJ&YW#z;{ASn4 zyABP()?J2apc1mUa2*$g>OcLo)3@Gt-+gZbIQ!glxc4{r{FmSDJ@@`*^pgKra>q}8 z_S3WC?_G4!CER}d571i6aji}1p3dHaGV>uRgh1D47<1GieDm`c@XU)Fx$~cINS^Q4 zcmJAm&pQ`@pZ@%3Ty)_@guaj7qg^ek{2LGg4wwbgC*tW4M+j0vkP_eujb}O4(tOnR zP*+G(BO0`O93wO+OT!b1n16(}(#9bg*SZ^wgqX+?BcZsJA78u3)~3p`PL!}lkZAgc z%Pd|rhhJWCDZ|CU(A-2UumklqSypatRXWuT#@rGFIBpcnS3JUu)@FiG5fRWkybDmA_1@3%;*-mg z-&0$cqiOUw(%CGI1BKxdQb>k|2N@n7W_WmbFE_{Q-GBn&n9obMjAGoe2XWr1$FZ}k zkF~pc=;|LLEc;|qX zJSH%SnbI21&5(6+q`g`MDF*%B6vF}Pyk@dqZ9;9VP7DDG{vgGu&${zDc#dG(?k=8M zy@@ARZD8Y$PKw1Mxon!F_n*o6Cmz9^{hEoC!gD2UyL))w^*>YW7e43Rc;mP9;>Ab)@%iVUJMl+%-cfbR#Jw6Jm_7+{?1AWs<4oYv!gyBLAf|Oi zu2S3CA88LVrrjr`n@C$~QC;O$1OE1Mj3ga@VG@Z^^^gmozW{zA5nxTUvejFdUMBd2 zs_G*F8wp5D^yINHt^vKfANq%ljIaeXX(16&XoncDC!eaVb6zYq3#ibC zdGxD0VOOUhjEu`1qT#;#?mNJBUHzW-o^{tfzy8gK;^+L@bzkSIE3W)cz12JK{P~hc zAAaa?fZ4NWvwr=0ZomBpagbJy;}n%rqOoz5?(gqMYpoe9i=Ic9a&b>Dt@EbC*ak%R z02)~G-~&klu>ZXIxQ;`R#8`WXX*GgdEn3E)Cyq7pua*jCY*`JMDl#X&nep0l(p2PT zZtYmz^;i!;3fH3c6-qd!dk}%vE>cD)?Ywq&9)n0@8DJ{j@XF4mwbh3=bA8JULEMmR1i4EX#n@5l9h-hKE%JXz?cx4W-uB37*k_XgWCG(bIFEG93$ zp`n3A3l~)$u8=;_XK*Ui#Euo;^H2^y-`LkP~8>u6HGGRmDgvICU>8gey!kBIyTT4V_uB#LpKM0xB+{8yGj_0B?k49*t zC6TR35k(Q@Qb;*6PJe!&nA+ORBR744Ykzbf|MC0_NCaQF3J2hhU9wSEE$ zg(D{E{xtgR^UgY=Wn9bYTeohzG@s9p z%-p3g8ECE+rnSH!b4?363T(A46BRQs^L~+Xjf7>|LpUBuKQXN^Ne=o&OQ0gNa~CBtXrXO(mS zV!;tzg&tHDbvP|dDlLUcFxt8di=bE<@oJ||o4P#;{I6_p+wl{CS#xHyVcnY>4Sn&8 zU*v`xZlJy{_vGNv@G*-QAAb0=&px;G^&WrbJI`ocyMEKkEn7A=M`2`ecaDTP(?Eo< zW-9;_#!sMqhoJ!W5A-v2>U0MCdd=IKGs%30-F*-laGD-J7N#|Wo3b62$aVmXW{~Ls zNL*oE;e<+rcBQaf^rVR&bF^b^`v{>OOgdqup=E_0S4s3lm7t8JdtvkdqSzwZb_imM zcohEudJAPf{hpKf(g)tj;80;i2frqr;_hc&;uGKb1#@RlWbsi4^7GZ}2x4|h3}~$0 z3$N1waCh{f2FvKR8_=sZ*e>5O7xfdVffVnd$`ymCt4=C~6ORw;r z<1a!5Q36sqkI!#t|pC(B;`3cR*#`;aEJ{%x>?=U!Ao1(*wHgY-$0Ra5Llf72m&K@ z>iUPt&*#uCM_3EifjjH$>?9l-j4tpt= zhAo{lKspAX8Fy?X6)_~s{{ty;l))ch4TrMX47+>!K}wn$Y8fn)>~z$4BSdz@f)@;Nl zUx4m@cyWU{D?rblJzMk?`@KWw9UMOJ;F5hEfdALlrI%jJZMXdpfKyLB_0#8`f6lo> zgZaa|J72C2wSr9Ah}ATYhL$nr?_(Pg^);418=rorYS9_b$lazqwCg0THyzKZlG*nj zRleS1&R(4eRLg`WjRKMUUTrHO(U5~sp+i6Mg4g0L%q!zcQ0fs72Lo=bn%k<#gq*rG z4UQiXYHjB6b~QCMF=N{F>A1`d)!Ky9oY~IyJ zQAN~v4z45VFO+z0?Piv)-C|t+>at938pHJQqd8#81ZGcdVZSkTMtk4)@xx&3{Gb(uY?ApP2!DFSjiQ*f07^v+IHu?%mU4K*1<1x*RW?q2lMt6|P$nA!qU z$3t&FV$NiAM-OPt`t|EM{nXQcv*f`gXT4R&=RPICw_tt!+OGj{+igGOny+4cQ6`n{ zedLixZ|LmkKD=BilVF|d>tOy=IQBrqiHF1Shrpq8P4!=&FgdSs2rZ9yb~q z>J9SObt;FXuE?N{jQFq9aEop9;(n^Es%(T9krY&90R-B$x&m=KHqj3dZ&C1%84Yse z->qQG$bYLCt?0%K%xs2_R>DL~`W1Zbimf2LaS& zp*ELvkz_0tttzfN3Zqh22n0$*%x@j$q`3o}yr7Hy8h!c#fgcKrp`;i%D9b(9S|#I# z2x;2>#y-l7Z(^=~g7LJBo}O76NefKU~A2g$tY8+uQH_$1nZUzZbk>ozg)hltY8sB<9FNV9C*l zg-611huYv&8>OU%hY|=U0_h~Q)0_X`6Z^)R~&Q(sfo1TfWBw1$aEPze=a zsz-vRLP;x&j%d&UM52f}(-9}lgT@R(mih=Xw&JxgMnr}u^n-c-&9?z-z98-$gj zI93HDlOe5cdYh$~DPu*Igf5%NSi>Dnpf$%%^7+O&Lwx>>9G4wmWOj$5sA1uhEFV7k zWiC5@3v;_hZO9I!RjSjH0ErX|EeTurVLP{6Tvz0TwHBd4kSXVKC97wpZOhuW{QdAb zHaXE+Ahcv$D_SyXT9b8F0H_pjq+&2%s~Mo9s{;@mdg!5*nf<1hs0PsrA?VvXP`*DAOT4~0voWMnwha{O2+~-WChA&M z(4gd`Sz0zSlx+@2f7)o2()h~5NX=nA?R@t9lljdR@8)|Szku_OnL%wVhNlc#*%q_o zI7FpHN<-1}xOc@m{^ke2p?_qISX59@*)Vr9WyHMIF;NH|SP9=ysm}?4&L#K4zzOxe zthFCXfN>m*wm;I8)IvqL{fSEA7j}t^w#h~`5@G$$e%8Lc16;SdojCC`7v&GDVk(wN zP7JE!Iasj?vSYUErK_aYNAifiL4;$#GsvD63(f|S&*se8XP@1B#~pX@u6Moj%>>|o z;_C6N|vHa<}~ z@UQKtRspgVyNE?$Mmuyj+Ac~d2{7!}+BFAKzRGRs{qK_%{enP2rWTHy1BXwyw?qGd zzz@v-{mH*y-`d)`Y{?m?UjVT1~nP2|$S6=mOFS_Vr zzW@F2uH3S9b4No%!?zlmTPF-!S3L7HfeIKIAEkeIsPe>!i}00ggHCM=ooe(1%UxqM zQo{v@X}+-7r?s(`K-BS@=j!?8@)j;W8s2|$of2J^sYgB$wx=Csz`2V)#K0Uxhd#LY;pNn!qA-j4UUe%2;R668uIg5z0r~A2?Mu#wxTi zmm#IpgqMA3bXQ6AMd%hTx%xv*m2PtPW`Y6tndI-q=4u60|f)EZGjX)xoTv6t80d03ZNKL_t(` z$Rt4N31FmB)m(mijG3r?P@Pm@tVC!mVmAm0Mg=yZ>uiMuhuTq(^&1y}+0)l|#ENI0 zz4fFMPG0uNV-HXGv*(_7Zg*2l^W{~q+U(x7t6}~6^_eey>6%wPU^ja+J=Y6Soy*#wrt#t3POV=*MV3J9pXu7&Omn~LW_wPMPN8)vgX~# zNR(4c!bx)f#u&?9mVD-Pmw8eh9LEYnVMxUyJh!cve_Q$p zqAtZ(FFqYFP&~1HkEM3KY792}UGDaG#tVV9-p%DhuLMCllcuwy1AxVg7ngs-iWRFE z&JN;6BIV0xC|4!=Bj1QEx}v@72uXc1VJGer8i^ugfK*{!N}V53mH-NQ^MXKW#)}2A zg(6LvTHblme7^p^v-$4FFXYnGj-jvB-qLkW$LI+U1}B;rvr$pqcA>ye_KO_VS$}&w_3!4mx3Fbzno{c@H zT(Q7oD>tKE^Xj3oBm-S42#kPa%y!E5-}?$hcy1%?=mRNmf}jM8wI)?Ee2twgwh$2r zN6MBfzxc&Z1HAwJ?|(A^_@8oI`1Xs-w>vvK&8Cf;uIcOF7ed4lB%&~XCi1A+=mm$u z5mTWtWd&@Mwq;K|0Zk3i+-Siij$7Gt-fu);=uSgMiT(3XpExPJh$OxZd>*ucR#(F$5wA)LhK}168 zo}OTnH}Qh2Zb!dTTl&?aV0CMI0yD7UsD%?Mqxl{pSHNU*HW0{?cYwW()(4=YE3&|5 zB1KA6FRX*DsXwN#`Z{#~4I!wg(z3N?NhJVds4OvYSS8{17+X*cpTzUOeS6yKrsrK+zQ12_Ksk*;ez>brq(AI^99L>WaWV2>^YL7 zCPA*~5Oozwy9gD-jVLzs)p6spcJ_?Kh)P38Q<_=b9X#^GK zL6%`Sa=R?FHbrTbFX) z+2@qC@`uN>RTz%3H!K^rwg!fXtQ55NE?t&Yp6Cj=UlpvBwek%e{w8z=w6!7j4LC(j zO)Sa>&pev*PMFK@9(jSA9$!iS@F-8Ld5QNdJO)RAALNNfW2I(2LEr%nwUHQiKfjiL zy#8+bN5{z*eY6lngdiG=kc`J@t4lF&atHIKbuzQ7h3V}rBwUGbLahoFSOBT6rgWOJ zf@DM*p5MHSzL8uA9(c9AsCw_UpjG1th(|5;*BCu>#*D8hr3O~7Ui~klqoW3;V9iz` zjK)mrD0?52O{;{k>#J`c1j_8(wQI`He)_W+z=k&yfWP9SzOkO6fgu*1vhWkjpMCmW zcl`dgc_BMr;z($&hpAmKsSVodG0ho-QkbH(<0TQZRcAC-QCrjcpb6)J@$t`Sx10Ui z)m4(XqErco35dz%VLXos{Ib+QiE?8fs;H<*>w|PD#6%FC+0Uirfa?4WZf%$Ax1#}E0bBO~=-s>fb^zl1 z^Uvk>+wb_3-iCE+*7BbBy_f5L_@m2#%h#@1`}Fo5JC6wsrXU?AqO}Q20VGtGR0gKB zgRc-nInJEpP*eiPkpvD*YgHWH6UReiVh*ln(e3e=WZBD6zHw)SNCc9uVKi6Z>_ZRd z(j_PJ)Y{GXzHf2j6VF8fD3n#VlRA6o5PLyqDg+JBifBFcfj4(ej@d%Z|S8%b+Har05k; z%10GF1_wuQh4pGIvwIGbfR(G}(tR>?+r)wem9|NMV+_Wz20RWDEe!_6@R%VUaryYU zCveWuhj7#5FL2Kbo7md7k69hfctMUtBooStX|xH5xPpBnqkQ4#x6?mVq$wStv%Zen znh4264K=X{t}F3$z^1-^JiTQHLI~1{7+uZv%<61mPEQ+C+gs>rtR*5Nc!9!Ge#q_! zlXw>%eQ^`ox3|l@|AQt0RmGDCH8QkgnLjoumG|6p=czk)^({R6?DNvASFgNw`}Xbj zuC?0)**qLNwY(=<*0RDhWT3tl`iF(@`=o2rpP7BgVRt|D=)=LA3BX_3aq-0$bJI;X zF*GnlLsR2jD_5<2OWyi^TXE6a6k=+-6;GMej%cmJxDq@c6Ny-}j+!_)ZdHa|U7ec) zt9>E%3*7p(2hFk+K$UlTsBC6r$N|a~U@U8;E`>Sxps2(dst)|sM1+!MXo*?yDyd3Y zY0o%s?092>R`GuMlL(RfqKXoswFSW)+67zsESN`@X8u(k1SRK1DsPDh6vlDjkZx$N zhqc=*J*fIn8ksGivjr24MaAaLo4)z{iWP;+mS2+rPWi=xulxZ(1;LNX&xyxvQu)$e zgwb--rcLGpAGq{uKmYl!zW7?+ieLZ7_2t{U_w;^yUw{99mXnf(jO|v`#KNfSTEQe^ z?ERD4sF6G9Ohr*fARX)Umag$Z252LQsThG9L2B@|!|XPfLpv3#dlgYf;Az7llX{px zeG-RHpUhLMH{rUn${A84a0ra91pd;c7k-91qzS4}^)CpmfVFn;gu)n&)|$E*9sKy* z#msN1C+GVJAnHh#u2|2q7dLY1v9q~w!C~}`<+*3e4pgbrBV~A zd&<5J6+k{8E>*+SNmEE?GT~TXuxQZ|T3TD#+t`PQ?#WE)X=UT?er9*J5~u)We5ACt-^M^9662;ds~PkQeCvbf z(A}D$Ig_S7nLxUhzA4MyIfc@Oyyw$DoTYbYlx+he+`Q~X_KxOB#vB&Up2n&3W-_C# z!H%H9F6^Gc0*|eI2^<~nLtz>BszAW1txyU?*>uRTZ*bTLSi1BNU%mJp?^qR!#lN*_ z)5b#p!^?ewqK}z3%VLC#viqMBFrypUKa2*mef!I&ZQimum_P3b@%+jc-jKoSn;3vU z^SJ4zoA}sAKXzGNL;c9$z`$FEhKI|cL{9EP96JYd$W%CDI`lMIGZP~rU2Et2siZ|# zWA@9m#X+L!ezzy^^IvNfY!i(#yRVc~xYBC-4-UcLC?c%LDzj}a*HmiI=L!A=4Vi3m*V#IvP3 zQb;1A0B)X0WR$2JM~DF71V~4qwIuGshmP}!M+Er*a9pOeHj|1ra=}SQQPc)MoZei~ljvw2{Ub$de#U}2RG|0qVLyru*-g#afAsggy{8q@$% zIy5vl^M^Z^a?wQ>F?;rGF1h4lMnkl}@B94bcfV(BJcnaouUAo!^nLZZuY&HLE|IKB z+N@U@9(!sP%h$bx=g9J8%QYI;NQ4v?dY)2q$kOV5=u#N^c z_V$I9aDXy_#U6y~&(n%$x9ntUM=S3;{b-Jw(L+abEy-Afm}3(FM@k$ikkTRQy40nT z%;;)i;o;Ny;NqkB-iI#WUq5&*7au>5+g7aOw5xy2Xf9x5;WJ%jM< zT2RHxcv1V%m_awy0SM3cIpXkn{u>qi-%J2r9z3$MkKNgVy;hB~2)94FmK;lnGlpbQAyC#EzUV>TR`N-@sz@eM?+d|<@or=KmNL1((iod#ZL<m1?Uf=O=;=TlbqHcc zH_Yfn^fZHTFsUS>sUFhFig`o{+$Sdr>`Z9!zmbD*s%G&;ANCDnM#su7d7?ae5KMIV zsiJ_Djdw~)d!gxyvf!XHt3la{S(N2tO_*Kls@L%sQV#qtZxGc((vs|ge6N+qvN ziPk@%%Tn%ugr+8Vfo=P*#!BYlbLqQ0O;#c4)fv2(GYmKjMCm<^gfq@_>aK!X3{&3}IdGxDa;=wO{ zmVdtNoh+U`o1%h1NrZ@?jV2P4?A$lRw{E_lw(d6Gv*>6F$|o=Z4{qIMt#^$DbxyGS zJ;*W=p>n2{hNxB~iaPWkFa-I$wW1E+LA4*QXMZSD{lvbBlHgrBc+{*OKqigWmx5xMwBHsKt+E` zR3!was!K5O3`@^bA@!}KEg*sVcm#yQx*fZTM%=QEvoHc91A0eB85|j>yQv;O2+$IA zC`@F^R6mIn4$@f6NEwi;wFM_ii3$wkd5^uLISy@a;Rhc)hh<;;J1#kK9zVS00iNHu z0}+c_{|WskV5`i;Zv-Nw{o3=cP1Vl($VWf=R)DX6{p)t#E*%kQwKx`w{UQ=^Y=dni zi+*}743B{0qLqS79i&rb$$&3h`MKx8T7tis0Q@%`Z-3jx6!KXT$=bI(`|OI_R;^rh zY#7NTDU0N0&ScEYF3hw}NT)D~gyrz3Q<#Wr(elO$Z-^=&nlNG_r~EHa(h4Chm2Y?q z21l%+g)C8dszhx{igu#f4mVT)EQG$}xjgvA@rOep)=y}VRE&FzTedbpHU%dJ%0195EQXCr168J?v^PYE-o-w67sT~;^dCPbH z`P;QiPCxCBp3&PbyqMK%HkhN1ocr7LYu6ox5XK_UKPnJU=U0JA1xj+hZjL|4G5x^Evp_`{<%(TZ1uA#c3##$UZ&SM!g4bREW+ zM15U-SNQ^sxbzkBXl-=?gjV5rN=y_JoxlbV;a(E5M2rqO_%^v0LLZPtI|SwSfe{8} z46$g0#<9eas}lz1s5eo(*|#jb%d_Kl7+qqUhp2VtktCe%V0wAA4k%~Ux(gILBDng&nt$ZGUuYK)nulw%y zCJ6A49J6Q7=65&W#F=ND*?-Ty_cZ3qp-~7r8ZDYLRRh!8p)O?=)Y7$>SS&>IPi*aL z#fZ8D%xlZ~yPBA?OomflQ?G?N1S`qT!ir4o0&U>F!i6;?hE%V0Wsub+bYs zVo{_~%xrIAc0-1#4Rv&<;v}PS8j^8pgrvrGNQ95e8O2DUh|w;id5^t?JiErn*gQ1G z+I>Up7#$;<4(QnP&z$Mcr% z8*JSz00xJK4DjCeu1W8kJ$Lrv z`|n!%P&5)Hhoy!E3UXeNv*sPi`R{)l*I)59P*xuJxD$@w@xXoezv@Z<-Df|;_rLoC z-v8dqzH{TvzkRy|V~i1|vk}>lLATXgfNEeS(84e-$Or}pv?3k%m|o*E?nBJA&S-%f z#Ss<+Xf$Z0F&YBp;Zr1Te0B{<2%sh=hzf~g48Czm*EH~nb5G{)|MdofXp9QDRPQIW z6DEt*_*0|EBqO#O#~`$|jztSZXbzM2vc#h}-i zliEboR&+Xo5kb|px8Hh0lnt?BMMGUyqoqJ7fv<{?%};pQCRJnI;OaA0g4k%pBrvfE zY}k$jv^L!J%nI zU>t1>t9S0k^E_sCHB;~{FjN?W2yLY8gwB*D%Qe=Dx@=KiRwf0sLgJuAs0`=@_}bt^ zB8Z%CN1w*AUy=J=a~!z&l&Q{+1p!7P7U*3>6bc1)Y}tN*h(n=Z@f~~i^!@!YM;|}w zx#ypLyHW~SD4-hv$kD5J}m0HZ@kFB8~}Kq(ZOfn1Sw`-WKAH^`$q zwzF|yl<}O$nDVTrb|jpgNJx#D~ zC#0gVWiPDSU?o8tY7v=K=o02)B2|h>x-#xC+Ttg~Vbd`Ub+G;=7|#oU-kmR-p@F>* zPM$pZl)-_4^5x=bB zq&8AR*2M9HDB3Xy-%f6g5g0tQal$riK-3f%DEK_PJq>7LP83`x1cz#To#33K=kndw z2k9LewtnhH+ls16lf7(7T}>(VVN!EFfwDUBGGurgX{BLvY7}EUhH?Sly6qvdxja|B z`wZIaGi37xc8z7Zb>j|jWLP=680lAJmy8Mn4wW%hs3IghLu$MjKGcr&bf95;yb?fS z5jb|XO|13~pf|jPkS=EK4CItf^tL_dq6hgR(v#>2h`3v>GxrYky>9#2s#UARk|m4V z$H&6g7f({#)ymmN&Z4`qp6l0a;}`!7xdHsx76`(cP|e|F9Kf|@w`!_6JgW#y%3AjR+~a8n>aZ_ zqP0fKa8yCXtDq#wpp8PB@Ownq&2TDUW+MoMCKHQr%+xOKUA_w9QEMk2vZTx_77hZ<7T+U{ID>exH0J=LN zlSUNw;dwrrU*6V!-$VDir=NOS@MZ$=1|Rc}I+EvCJjY2VpLFSyPdxSQ&6_t@Qos5% zV&)`FTO+h(psNLHQ?_O2I95cXzRhw=_#V5mI9OAOxv7G$m^|yrqG;Z7m$x+Q`iMG+mht z4e=;ne*76k5OD1&M`L6JAsf-cwXvegC`Vv0jv<2B4=ZC?+S(Y90aAH1)_5$MRLiN8 zy7X0-Cdvng zKg*;bok9$a!mP=NbQ(6ijM=<1YzaD$h(julsHwr!ro!7%jO&KU9@gTyt;rfaZQhC4 zwHKq5DCF~c+qP|wQpHLpUtq`B2#1>j-RTy-{gp59q4VBn!JDABZri#J5Dg7=3=UQ( zWbc0WCH(WZzRS12^X*w*`NwPj-{{!rbiimK1v9#A#WAb1s{2zdhGO5(X|Z9>YuHS4 zR5Pkt88M+xkT5m`gu+mSI4Wg|XyxO&Me@ZwKYlb$agT&O001BWNkl3IU;FCQ0%vz3^H-+~uoXc ztQ(;taFq=&1+M@jRmMu)t&mB=OS|C3mk`RgzrMH6GKCs5u)81fMYQ%oyO?OD8#ekn zQUO2qv5(efGMVf8`}f%&bYz$@V+!3(bu_1j8L5huI84w7!x%c!_3RrPW8Zj=j!ZLoFH3+xctuvf zw3DeV^`ujARFzYp6ccp{su>6}G%?d66#dfLY7>+w$y%bMO~xHp(weC$8=skKiS-Gx z;Ro9+Dq=w8{XP1ph1BO?c!rZtJXzfLz`aW@zWCy=KJ?(jA0HUp*8mt+Z4vkiI-4+i z_kn?~uI~5#>kqH{6>#613BVh8G&VPh=T|&ujyQ7u#uZPmn5MNV4X1^e+KK6D!!*>w zj8155wCa71GhsGns)LYtZBfWb5P=5+L(FWbC!KJ4abT2U;FqxiCK9z(MZ~pjN;jn3 zg-B9DNBLMaU!ug%$xi@QIir%{30E zPL8v1N;_jkkDa4=zWwA19@??nGATr8@r45-n5Z34YCrx(fRy3ia~;IwX3XfA#RGIS zLR|u}@+Hi`kR6@)Ss2Y?#DJ}4BM!!OEDf}-7Sc5q2at#$QYp;5S(wfy#EY9T<9S&z zeFzV)$fiAeV6I}!ALG(R3%U72?_%i>e+eLW?AU3Vn(Dv1Z{N^o-}~P8asBoG!GhzD z<2S##kxzg6lV862s;e(67K%NkZO+V|4Bc(WDedTZ1fg}6RD!8c0Ug7`BU9N@XyoFC zRV=6*Kx!x`gDVu$L=b_4kParKdiusE>E_upTI5F$#8}-Mv#OYWsHP~bT&odwjvkRU zoU>pq|M}1}3@I<1l!^WER+U2=2z**v>gZ{0zzYzf1Gq&aMRkY{OI;a zAra*tE;7`_xRnK&31lU>dxpO6nLtn9CkSygex&aSwuXF@k@$d0vR$uG*HZr zTP=-JHs0QX7|X+!ofzeZkTC;U4`~D{75dHxL0O~2L}Ov1p~)8tugfKS;oC0Y)|-Dn zDrKpJ7s6?8;nexFXsL~p_W~MfqP%U^G#=m4%Qv5Sj-%RIIe&ULX(!HzR|pN9j8$&b zww10+P}cCww6NF!9Ri4@z@qD=_17q)eL`=Cns@})aoE;Bz@)|=26N-M61ESHvg+kt zPCa}U^|f)bXmwl}>=#s^y$@<8m&p(`a3>VCt$6&s|=7CtD1t0MG zU;`o0m~;)IDGhrDZSs~#VUC>*FRX{&eHDC#vFr$x)ekV^dDyeBvVqmrVj5}@^=V9f z22MN@)^C9wd&--WFklKE8~X;V^1YGxLBN+U|2R+G`xrwTw%TEmkstolr#|z*4}bWB zJ2UllEPrYlCoeqZ$3OYWPd`?))H56W=S_jm4rEUox*;8c8bi@0Z6wZw@D0Kd zNL89VNsgR0otZstEZ^`_NU1Va60;MpFk`Hp>ij8PwACdU%|lHjq^D|#8iSEVR_+_( zZ*IC9M#i{!;R24F(vI&JiMVl=?doIO-T`nUVeY7GS51rZ=)-R1vLgDkaW|&1)&};# zG8{@Md0!axz*uEefgS6akx>}SQ&NerNtLxgwt65Hu$&>(o{+*OzOU19>&?ICob%2e zzw-}E?G@ZyPpZ9@bB>;cQo`!x>i}sSPMg}viJh(d`^xov_>RXoeOd?SOzokeCV|$5 zLSQujm9$BsV?vJxX$^vu(zp%;%63eo)L|Pw6j>@ya14$#_`XN~NFJ?yg1{qLZ(=?6_q5S-SD>cjxe?Z0JumZuI-!d9L@6M=hyMjj-3#R zgxw5X5m+;ZSFYl!gxd(|(8eI5<Cbu` zM~o>}}JPteLP_Di9THbldCCC5% z)?2S1=--zXr3)*Q6k_%aOj8EY)_|GbWkG(fW7W~r{#xNx!T&V@(LzBSU%}WIGn(p| z-#!W9)XM?*Z$?4AxTojZ%uCU;O5cNzB$o)WljigYxEj3mlK1*3~R_0m>u-@2Xa&p#C@ zBP3&ub_S>gM%o$g!P;XJsY4YmajBatWN11Pn(9~tvLGHw(l@?`&))wmx2#x4B2~jj zjys$y7R+I9F3&fYy~rb5wlm@dA;V5q^w<%987+m085?Fw2MlDbkcaT?ym;O$`#qCZTYx*4ELwQ%9e3S*%9Bq#^)VIr7UJZ%!p!V~u1;ug zLU%XX>n`jN8Bw8umM6W!V1iKjPH0vPPhrJaH#6gd996rQj<`q0Rk#Mm#>d&USM$V6 zF}CcC*bY^s2r3FvS!F?`FcD$tamL!eXklosZQ|_X4(Hi5TTszZ=s@cOakAw~RB*vb zN0BcER(i@fD4}q1@yWAme26bS@FaR?KlSM}?^$#>fe97rjOLaNTPX+`23}p|Wl`GT zO{EJV9Zar(EELgW4zy`XVnIgOPJkC^%-H_={Q=T96^dI&E5>z^oy};WE8_yksp!H7 zL0J;~pj!N|@wnuYOStjI8@cbE`;uiz%%%*-A31}=I$IdY7Q$LyAVh%YNnGjhh2!S2 zZFrR5ZFq@K-TNeyG8yKyW|&={raqY@6>*5W4vqxZSXEPrK}GDiBpR^+-_tHq`(bxL zlqYN27;57&V$mr5BV!n>1E6bM9$&K^q-NgKPJC5D`|pp-o#<5{jaB8;vP90YfKVe1 zIX~c~@o|=K-@`qdw)5!j-K3<%_53PvwXmn5UuA52P$aTVJWZ_90cdY)JL8LAxbl0z z&>#DJx?0+C93hl4nVOoKtw84q$DeTN{SVy#+Y?SWK|J~7lLmNQga4Ze0MOLZEY_}H zXAYk;_g^1=_~B2KDkKAfu2z`djj2z;^e#+K8zL6B!A7faJ}AmrK2BKa1^F*e z&BjSpFZz|%ztYw@ue~0&@4+|@!YHfPfB1~5Bp}3GB@$vSMy_Y?sLv*E+mUpfde|PC6+IXx zM0nc?$MXH(-px=h7h0@RRc%!9a!qD7lc)<35{_L z#bObL$0uGV!{eCR+7K`iUCmoLwk2<8Jixx6e!-Ux_^|U8zP$e-bQRxgyX>D-} zL4X(JafM-|P~iU68)o^2Dpcp8243DvT-!LnC_wa1r z0DajawF0Kp*YbrEj^>N+v(w*p(Ob{HHVHc0pdk%&ry`mgtg5Zn6_Y+kSk$Kj427Kf-GeqUm_Oa>Jik)#H&rw@ z8ER^eje{3Z6OC}$5l0de4n=IRb*dVmDx6ORHXX1Pxs#wJnWipg+h{Lr-$ObU<~@Ua|Gg)YjMou$lc52S zMi>Vnby+Q~S}wFC{4r4+#8{z`((2a$%2I-aAQjQvxOzF4-}MB0_6>06;WPODnWrx_|lWlGB8?%gh417N((zxJ_(kNFN2^sx_-7_4W0a_mCxv7G3}Q+i&|pB9XWY#SV)Gu?qP z0?#OV>KnQ0n$PjU=PrY>oG2Cx2Dp6V#*JkppJ{1;LnmAC;$mua0?GSZqkkUm8t7V__M$kfl(j+1d4{qDR*B@ODu44gjndE_96{YLl ztHE@)Vzh@5QG}6YIp{*5nbpzF;`xVh^ZidDQf`=RyI}>WO5*D{I^Z2=9!Eneg*Fax zH%W~!i8dU;0 zoJSWt#8?h9t;e?aMcDR6Q7jfp^u0=j*gJsfY_lwY(Q(A!2L6}pA zmd*%#6%cqnj<8sQ+E|QxUfjS?{}9I>GKJQe4xU7E{afLa0He`~B);c(1CMI2DXM#GsGNfZccAk&ewhOa$H_mV#mCZv# zE#}Ol?HpdI11rvI8QxM=YFtDwT^BL6ww7@fArVOuag#)a6H@dl++7>ILu_w2>s`BN2j6(~89sjO ze2(kr#K@Y8BAyVT>YqgJCt13GBCvn!(uk6Rmn9DgDM&en?=OFV%a=X^20pRySiW`I zTX39OipmT9!66<^5sAbZ%k9JUhB$9-4@Y&i@QJ%0=Y`$97CEg2;D?CxP>oNzD5LB~ zZscq00=!Ziu$)7L0W=oDG^b(rfW;>u?1)Gkm_OZq)VubgjbdAA4WoO9ShZ~@ z$MwucN(ZS0c|XqwmYl|KKlK6b`Nnl6#~l0O-3UzWgvo7CQv-)}LbApN|I$fnLmW71 z(p>UhAsp9ea>W4<4yjmu_*rWFAi!4{YT}Ldc@dZ0*}#J5N_YoR4f$rGPKB_ob0w@_ zcGyJ6K_iueB*uGAJ&v32eFS4-fMdmm+yGSACie==I$|d8UvfOk_#`7~94Cp;0m+EV z>ODL7-G+^{j{EfW4fCmYoW`uK7KXBUgkxC(w{LjKg1uaMpc`d1t3=vP6?qR`D8T4A zCRem(Sx(fhg;3lk7#V|tKd}QgG>-6!Fu4O(Z??&Ht}yW;OGKfg5$y;V9D~8pu)i(E zz4zSHcGg*Eao1gU{aO3n;?qv$!TTR#<@2i|<-eCnao+LsiN*xkaZ{174y$%YI$&Je zl?gi{<;x`ucnLQ`cb&sz0fIWBG8%ef1V|z%qp)d(AyAN2eyGx??ayU^5Ha#zK%wB_ zl=dJg`NQ)YATS&TBXwbVz}(m8B>P@U+HtBqHz`&gQG=rsWd_%=`ay zjyF2^!~a4hz?m~=^62;K0C z-U!z|zMQt&B%eF(aC}{ZBNLeYXgpHB`fPHde5fcZbcv8c2Fwe8d=JJEiWo=l3{-+2ZfJ9-{9x=Qz;T=xc6 zkxfUjN#5%O5STFj3)u(F^&u6sES7FfP?W&TnF37>rT4`Q4Gmp*%rVD&=Y1DmBCPLu z<#^A#-p&90*-!6!U}@wU|-jY4w+9Df+ho&=rEaP(AUGJyyx9u8KPTC#R%FX#fk2=H|g6;?x@D&hqJ zzET7V0v!+-jZz9fupOh`Y|f(lr3kCZlA~I+K1ImjQ1-(Klq%m{QeRaPyg+dB+}U*W z^gu2M^<=`Y#$a+eI$G-Zw@+R|Q#6Vs!MHb$z{7PV1NkhM-*XS=c6ac^GwW%e)WqMM zbt1W(hcuF?bl5aB%HuoxO3H1op5z&ei!kGPo7DFWLpE<^w2igG6++-Eg&sVJeXsAs z&VJ0KHcU(XfonM;VQMF$w$@(1>&pCbF=g_U9l)O*`~e=k{~@mV@>Q)y5HE{vb~dx* zh?(RIUe(JnR-i~YmH9fMzsG)G1qQ7ZN*PObQHJrrXT&QqQq&9;^NbZdhWvoMwgykG zbco6bE)ruLTopy2QN|#P0mcPKIt+}A^6(2=h$UkznAVN!Ml8loD{u@6*C8H_(NGg* zPIDb+OzPk*(F@9VtB!~Ns}g{Qx<)o`+{m0cbFO%C&5L)eU%w$$ZcKJIBj!#+ zwA91AsmLQ{+6`3MV5K9DRepPRE#|H#5NoztvyW&L>Bj6H=QxPQ4EV|h(^o`~%E~O$ zE5OhYc#2dk%1_QdljdX#zUSE%ne*xnRfghxR+_@8#h$pA;tZl)d&{uKT*LD>A$I z!%RK&FbbknE}DQRH?HANYc_H9aR*YL%;0(T_TDJJr{P`x>q61X-z!X5@q`EXT>j8~ zeEq?vncULMPtQ1x&mV9&u}%_*fU+<#)}qunCmQ?Cq*q5%ZVbpQkrG^S_&$7h!6CF| z(ss>ERF1e78evu4^xI`Rq<1RHghIHT?Rnp^Lf2-!-mg}nlkpF z?|tuk!+!M5zqw`DpU*t~jN-a=>z@(Qeja^!UR<`8-r@j4N49&D6oV2|+DCHv#UF*a z(_o(&#(Ze%c$hX0CXY7z(e_MNZ5;%-l9gS33`Kc7>*OdD2$?prs9IawRb3UAL>cH5 zK~f|P0#GbKsQ`WnN+py0Ooo7{?7c48Rq%=9lC3|=EN#R3kK>3DxmJ#uHx>MX;S%J1 z7%ITv5c6kE8-+3#KOcErAW@44?guIsj;0ncUjj0ucu zZ6J;XN*E3Ogqy;X2?MDU6AP=cVbg@UhwVL8c>~oVPpcRgg<%i~w3IZY61=o|8~=Id zLww@KyZGG`i&0vmL~J)a9J&UF2t%LxR1(*9cw*HCy1V;nXv%QF)GbB2bzjiV4DqAc~0W>yTQagftslcH~(mBNj?NeT9M@16ik3 zYHfh^>+1%}@yT)QS~e)9h@$8pIw$@=GXn6uBt3oIw6(NCXCFbk`*(L>Uy3@&V^zR*FF0Z$4(i;5u?YVMZF1t!g_64agTCAAaGt+@~=f2 zQceQlmN@_JyZF^p&vW3^vHa{k3z*tIg&@`l9a^n#0}MNrRUb1BDUT5xA!$grQH&bs zFK%VQMMZ z8|i55K#&A9u9gf$Mb16yNPhG3au#jaXpw-V8Gn>L1!5!CL#(R%)Ujsu)*bW|hG@@a zOo=KKjudOK}ZmX z;D>A*93WH*C6yVk4cj_YgxckV1NP&;ANU)G&6$ShC1`JGV&=G!oOk?@wB)jAksys( zGs`$RTwUbZtp#Q@yUfqkbIG5c;=uXSIePX)3Soejf{Y{CJlM}2D>mABt*(;)UPbgp z1Nbo_UqTP$jrT?Dpz}q9QkC`Hpja}R5P)=~o<4nsSi5E&K~RFhBCJ@Cm^Tf*&vfW+ zHRrOS&Jf3<0A5;K=8BlRD^?eO``cG9`}C(j&9&EF`<71X@|TtuqQEAjRFYZKr;tjx z1VKc?O;Vp}C+Vb6N)g6I@H4P7u?8uG>%goD=#F-1 z%E5uN5ZM$u)>SvKo+0#KUqo#0V#?&{{MUsa=ji$SGV+`gDFhKDtUReu(AI?T5@yDy zYZ6U)=3j2R90@~t=x0unLx92*A9NU zcsc3%6sJv_h)@#8^N`wF`<6vH?wJL!001BWNkl(zNXNZ5gEWlHB2&)B<_JjtM|6C>if#Tn zD8e|#v1Tu>aP9on>`FTblvaj&5gXR9z!XSnFG127Pj7xFbK70+JnI-fc-KPKcA6r< zE?AlYziTDaa<02sBAY(vho25!0T{koH_$A!*O05kMg-8T(d?YBfzBggHJ<4VF%AfzVaxcqea28u&PNZSGchgbMb)E0@3Kn|2pVTkCTkd0q#Y> zh~kJ+&_gLK5JY*jj%?z0ENQqbifBo`!ZCaJ8XB_o{QRM(x#=&@^7}7-nDMO*c*0?H zV;w(zXc4C#ybn!D2N#Ezw{#;sj|pv!tlr+s^Dl1!5%YmV=i_MC5mL5MM zDYTLORk2N^Rb{Lyj9t~G&j&qx>&X{5dD=MUwzZRUTTogVh)|iNt1W@BoCNo@i(45f zVC;{}-{UzhJ*5FIx#xBsSh1Q9AGjY^z58ey(`^KCY%F7uxHjnvA&vW78MPM@8EcfI zh&4D$0Np?$zoLXTPJ6;(M0N}VrB22-xZHjA0?xnZQJ&en!zw27N?TV^1JUnJ0(-q9 zfHFFwl@Sur8pgE1vLW!KAs-6Yu5>8~1++9GW{yR#*nj|$FBO{R&YQb%$@5E&-IHj@ z!iSCe=j6!~owaK>n7`~B;`T?L2l3kV)C1N@|HD%c%M~ zMl}G0NF5MFc{&RN_$nspcqmK|*A{XPRKTpJ7Op$xB$5fAp&+tFta;f|K_tO7dyqIz zf+x20Fuhsv$dXPT``b$#w9j-7n=!$N+(?CkpsQHq*UQ&Hs^U(|IfF z2*2+V7F|-IhBep2zSE(j4Q7ltkep`(b3_@!S-b-A)KcDm=uzD9jqmcwlio`< zlR;_CfByP_FF&;V_XR!ORM$KM22Atd;bf&7PtAdIMY6I^xNyZFXo2OvZP zLME*qwUuD4$dap95cbN>R|v_@fnNT&YArZ|56_uKG1L|3T2XVAjUKkFo>^_Q^flm# zL4LYq8Ebla`RxAl$t9Z&VP2a=PKCrLYd8R^@;<9>VCBj{pro}!MUe6wx(l6Lc=zo* zuxbNWEjXNOPB@PGbSq(87Cdn*${}&IFivAiRy38QWm*d*aV)&<2#M4h6%`2Mewxxr zk}^SKGQo8V4&$gvV=A_+Em_)OxLAmS zP{a5R#Hd#D6Jo{7t5zQ|d*-ZtU+dY;zn5c-clIh zNsnA2LB{j&c<|9tO|l-;O_+x@594K1#YS4{zGR&c4B_u76n-S68p6D4R`{ zCAISbx)6dNAPQErM`ILxm&wloEC*Sz<>u)~w^wZvQ@&|b6;e{i6dV8A72eENv8_jhY zv~WFnbjI3+E95j;H>K!LUg8EboExFM&=f=>G89^plk1IU`!7E+ilO_|A`<`FP zn3g)mwl{Lc?;hY^e|jfUNb*IWhD?&ih73AZ^bX}&yM719&zXde=J!v(2tmjv7aW4? zc<9(%d4)g?9A6-iHqZ&Xwrb}42IW-3Bzd7FN{EWRv9?A|VH~k$N0&j9gg}=^ zg~QOn|LOJ@d+;AIzloygEo}k3g8;mR$4f80#KDIgy!XOKAG&w@_U#swL@=@yW=@1$ z3g%9N@z#@DDR87g03Kh0+`5bJT=+@OJ^Dm6A;nUOhNeb-cK;t)zitg=Glm<03Ho}k z@kSFMimQYYjgdc%1iCP2VPRt;GP=2epPYCkhmD_(B!iHSowHM!t?hBXZujZS+1(}N z;q_}-zO9?79qk-6x|M<0uHR@?RX5XiVq1ahG)fvau7l62uI*g?=rde?)VrA8)`1c^ z5CKw{?o8SwU%SgM%DMr%>2bT%W#j~##S&aUkj06RYW*-!D&k6y&}*Z=HoiG@42 z?NXuPD+!WG8k!qv%BDygm%yIdwY9x%?dmlzY~QxMOp+FiZb$4r8Jcp){imDcUvZK%201*w z1b6!`e(~k6bKyy+6DhMklBvrwSj_X|yKf^(C9JW8Fyx)ltuU?~VLMsM%3)F<^8s}2 zLi80tDP*8HX4*I&KJQG9ojey;)*~EU4S=d_TPbbluPZlTEKCAcTAAN#2;)4zUA_jQ znA4|E1Sbh`NE}DRQB)1y6}{?;R5}`gtDq1LaLqGInB3OP1@mVUi!82n^TNi$DrZ2~ z!2Y@h;jqn(RzzA+5+&jwAQnCw`c`q$Z|-F6u3m0C=M+xcYd>7Cj!=gnm6_+&YWeSp zGFh41OCt&+L-NJ#^yW8l`|{Yx#u358k&ba&F_Ezd!|jB#=3RugebGIx(DfAzMdNvK7lJkBYBE(=PSRC^4IGL zM73OvO7IeUE)aGPz{8U+xz4LD$zeN4+mf!q$XLpwX#1DRO&3@m# z_In2aqL?p;l`B`gXUwRvWm&?vE%^iZVIa!uzvNQXHRY(!B=BU)c!s_RX4F|M;~V%JP)lT zN$GL_b1RrLdK7z4YUk^BJ_d2X1;-wQ>pFx&TU`MgUn+%PmB5T08ncPy(C-&c$3-@^!j$20mu8FcW~d@wOs$g zayE1hGOfLdOOM)z<0npLQezW!i4=|$l%gW84w=}LLS$@*S&J4ZD;)DGK~-C_q0pp7g8QFe!t={F za><$RX3EGB^cD-oJ6=l?4m`4PE1iYBG0iITbgb=h<=&u%6CecMP=JiBHFxjO@FLOo zp->{!F{ObaGZHYbFh1gtLx1<;3(r@+^|~MZc-VXR z7hkkSa&;LR8?z)Ff#;^HMml>u2ZlSL^{_*3k8%|<({{`wDh*4-_@*ZQkS_uyK6L1z z{Aow4v00ru8r|GzOdn!p-1A%qo?S*;caiJ9@D<)Ydmi0`dE1dl z8k?Hg(%H#(Z~YZPMQFylc~usa=;jwMtm2@ttsF9T3`(YP>>j&vB%Ughx)e$UL~%$Mmx!Vg zaU7%Yjq6sGYme5NwCj=geJ=Xb6SSq1T=$;CXilf;DHhRU2v78q^6JQVb+}H-$fDK~ z3~OSJv@1M9`Q-gBez$BXKY4a38;0_nF>NAO9epJGcZ{Ja)o8ujC9yU{LMgNC7~I6Z zBS-M9BM;>B4?a!_t9!nCa(XjPLVFkim}=BDM6bc(Fj!KT=gwtRAc$bfXhiQ2x~o?J zI$tb4dCA8wIqkV$0Qd z<5~^72ePuQs;+fDwZ-aiCCPH&Qz&he;A%f4t+j=StLtM4Cxes;f~ZI`nXT#kYd=c8 z$6`Z>GG)~2$cH{x-T7zQJ6bsRsJ$upzLm)~|0W0(x2;%Xi~ceurfiYB2lq}Xkg*~? z=o4rSftCNQ{eVg#gb`uEC+x2l09vc)hu8h^`m@h`AGhBAyT5Bpd~VUAM16hzXDgpu zGC^}g9WE}OoBSUWlzz2yGCYu&(TODlhAQBMd9(TCFK%Jkwk=E>*}-WC?8hN9XCg$A zA%6!AsT9}z;R&X+w=ivNE9YMQD-yXBmz;7K4e1QUFv3AmGZeM!ycPwhaR96>SjxAg z80H;G#ned&L8LWF$6>|hU6g{zkTL%sef46Fc{qP{*y%JaDNrvJnG^=r+X zA0QGiYaEOo1u8-XC3II0boCgsk5Y+*bUFWBb6EHGF}2-MVxxuLrkpC@Pp$Iqdt+O6vs$3E-sNaTL)eFjr10_ z;>UUO{>zw0rE)jg{zCP!vU3$@-}whV`R6A&XzWN9o_9JwJn=M+nLLmBWGjL2h_n$l zDZ|O0o1`H#f z5T%*`SqX-E&lQZQ*$Svas}@GJnhe-&4#RbdQ7Rf{`cy3hG;thOYMK~Iy(ljO{_ifnD z`pyBv^U>uE@p8efYU~~=7&5LOlL}(uID$e6T`bjBeGrCd72$XH8h(#`j2K~re*WIc zA7IOtEwaC_e?;Zoc`hxv46c`;%pDaBFSu%pTdm5qQH@@L9n6)_mJqVmIh`ODjBOsl z-jhdj0?}s=yH8gkf6;VIG_!*Zy@02aIgvfH6}Ljz=LXFc@^xo8L_L(0Y1@wvaD&&E38+A*?ZMmAeDpbIP@0-PQP^_hmULLx&?TdFW$b%m|l^>sUGIQHz;ksF3Wf;FwnNbN^R=UhM zR%DV5Bop<-al{u7p3Urz4hWR7rqwlQ<{P;BDXsm;=BP;3DOC&zI*Nj=Gu3f)o*wcRVo8L6W?!gCb&t@~`+e-ocin?trukZ#y8eWM~ z#+*o%YDofCbVZ_cK&VOxsS(;kONA?wG$cpamCtGcBCWh``B!S@z7>mU!1FwI4fXJy z-`~Z!v7Dm#?`&dNf*@4GX1X1W~1^ zLmRTBmR9Y#Mgh^(zGZT zRaf^=$&2Y?p`Pr5ojhiHgVy8bGYjR zr}C@Qj$_}^dl88yLLE`^yU7PT@aZC!MU)<3u(XYQIAFoZkU@V3*ZtuEPWaq4+<5zg zY}ww$Lr*@>x!?FP>vwEIxJJrSD8P|Cv|$TGA5M_x~4q;egps<5L z6)Gebtp|C2+cxf9zlkp#GM^|4=p0;6e|{^2#V$(WAd$A6k(9QY7S;c>w8Aj4kpNX@ zUbrLg^W{hX%9(pj;Oe6fpg#&wDhB0NHV@P=cC6{tr4R&Rk*=XFbmzB_4+ap9&r3U2 z^3i+l<=Vf##HEMt%f08G#SvroCeZaLVc6Z3F1MzVFH12Cs|47XX+vp2LOT59JqIzT zy%|cj`j=P_fj5l(SGN{wzibDBD-q50RMcwh0UfsKP=Qc2V%lhgN$O%?aDbwp{{p~q z#~nB9nfKXe9#1~`^tCN5BW@|DYq|zmc=yA6{kOM}Nq7~aVJstrGT^&ZwOb42F2^w> zJgQ@ZS{Aj|%J4dL8Opb}fr^QBP$}xlr=v^+RXR3ElB#7!OQJX&J_bR*=Fat=x+yby zFz-C+xLkSHAL-lK%^64S%fyjwD6NSt&!yf=@X*FhytKI+67DN5U(JxBrbyEWrO6fz zN)bhYar@j2M$usiaf}KA=&vFGU%c!qGyf6d<8jBH$V<<^Q0VXNsUB4=Xs$~k9oKfw zp1F@ChQsgLbSNAY-f$ZSyPh1^thEj!f$B;VO+F}c^1l0%%cQvKj(g}C8YGT~*tn~Q zi+*w&9V6;kx_%2k_|1bHeaJk1c)`gOeWMB~wIG&NM8P!UqWWbwK(O7uvZz4Cc7pQW zzZFum;$K=zlu&q{!^+KFZ0qa-=atad>+b{fEB}ENRr_Z_1O90_07o5mIQt!PaKl4? ze&FdPFDw~V8N@bZVfGXl)drK>jq6!92br?MpCuxDF1)ysd2M6($wxoI&M4siZEI+9 zGf2myZA1%;US7e!{@0a6ku=h-3Ya_=J*EZnLl6YWM2f>Ej_1_rlR0YKXhznV{pfzb zL`LOtv`@ewo+sF`tDj9>z35nxOQo1Pu8oB26Vp#2Eb-MF?%<~T9ydv%A!BAOiU#!jdJX<}j2uFARtN}Cy)l!7Ss85rC}I$e(^ zJ+vxv>0{4v(cGC#Yp$oe*k{kL?dZxamaeT5#cs21VeLx=jwdPl5#M{}1x}qhfdx~> z(c?$BY$|5HQjySy5=>$U5B$~C0I9SVM~o$*d7^I z0#uB4U6?%){I`pAy z4<zN zK63RBd1&cU_L|hjvh~|py?GbHby)lIR!%x%f4*_hQ$IDOB5Y_{t4c zUFr8k%}A}>2pHXvDo;U|&%4spB|IK{VU5w_NCIzXjxL+30gmI~IL<$`9PmG70Wg35 zzC7~yUnmrdeTx@AUu9u6DEka4AIhM*~ZNbMFI6PjZ%tTg*;n(`ar>qwiX(bE<=GKDC)AlyOj!5S|Fu^BBoI4 zBH<-@bi-D56^nfOfH@45d|Zq{hO$FHsmp49<=L4Wj+58SY7>qmh$6oE*Cl*l=4AHo z7(pS5tR8|9YSG%LbSY(^^F4)PC1Rv>X!MeN`7h7##D*Pw@0dfGIU@+_e9(iWdk82h~zjxtjH#tD1`%*qL_|Mj&B~ZKNtP!Q3gYcbkq(+-*OS45h_O4 zWgwX}*3t4+l2AE!}yV~afbk*7e2V~6oBb7r?G0q>dHU4_~MHZLJUrwJf*o) z%AQy$O(_t;^Gmt>|J=g-@l%;Ns?9Li?KM-vnn#t3k#cSpk|^{^I(2qcuR7;-5csiA z)j6mte;mdIlxVJS9?HR3pzVIY-Ys|wqByXc?WQvmQV{(+V?gfFEONXdWyCXVckUppuSt}u-KvJZ+7yN}%UFx`;~ zz9!1j>{T5Dp>0utz;z{Er4skPuo@B$Z}75(%{MKnJW|x0B0O{FZC~@EAS41CUHvXjGX* zDV3R(5}<+*RD^alj+AWbA7H>Y^EFqn;;?nxIA_r9%{l-1O2) zK7Zieq#cL8*g%~|?58Y_Bg?*6HJyIVAuq3NNy$(UbHfWuxoG|jrnNLMP>Sp%!gK`E zvh3qn*!eH75Q{OLg=8oQ`QpN-Nx3e6{=o4_;gI)3lrGTSzm2BsXk3{<#0po~8~!!U zjFAjAufdZpnN$n?g&k-FhmL9E%$bw;mT|H-}u$9`T1u)g(I~Me#SdtSR%FSp;9`;Iz$oRh=g6=!j{y&BLt3=tnb{x4fj9D?Aen!=it5R zDHKfdCkAP(ZSPpUiGk3^kqKg{UN!j(Ychop&VnW0QRGhCk6a(8c_D)A+)vM|04$G4u?T3?~Q=v};v(Vh6sJs{%DcvN(3or_(jH-~ zNIG>S9W%$&Lg3<(5Bm|S#C^{!<>G68MX6YVmPQK?#U}6y30W614fOQ%nN<|wShqgM z1|%x`OpMAY_AEYe%E|QmC8Tjzpn3tQtX-Br!%|QpmrM?u=bC;-5vvlelc*Fh z0#GU5h|jqW=Fr6jwGMV?&04WvsfBWkGrd#KqeLh#h*Bh!s4O%MdguKo(W zE0f8bH*@-oTQ+UllmlRApQgLt$apzYEMLBS;EHd2ohvT8{O=MYhlUCO=_@Y3;x=GJ zx%o-#KaG!^aTNQFZXu~4<+(WaIu_!H0Y9R6SwsF*~3EcJ7e_?yi0JF!9!j;f9ShUjB z5-lTyHrgc0PVQADR_3Z|F-Qkd@X?Ew^40S{!`vCu$QSag*|weQe|IB)cxWM;c5R0djWo}kz)Abe z;G~(;nAh4tM|~rXlSOGLDP_E-g=J1FZD-E0h0#l_+t$NnH~pSc7$Gug3rT6T^lFsh zY!XbR>`Iw2j*(g!9c!r|mekj$Iqk6hkxmK~M`&Q{V4fh3@e&^6>T^VquFPg7(x{zj ziBq=6)Eb2%={P*TWgEv$8f*3NrPU)aa;nne2S!9V#t}wxH|S@nl<~@L@IH)Uo1f?3E4CctzOF96_Yq* z=1huyp<>}$p5F>#3L{4er0@vhK@@c+848fftc0Q=h)ZOWP3Aq>WGS>DibFil7Ir$O zY+|9cB8ZA4Tq~$=bpw=uK>4KYrbk)PQdH)r+7Q8n{eSGXqc1d`>#)A7i)-%tGY8F| z!GTl9Qwmf?-d8D2+D)=><2Kgy_8U!x3hPk6%EU&Xr6%KR(xE06M&~Oo`l!A^^LgN~ zWXY24b7svx=FmeA`D3Z%d&M|v$R~0HK_FUMnrUrqb^cz-|BN%v6nEZvyBEH?%Wku19MSv!V1}O$5nzLC()MbgH z7(Y_hO51+^w$+a-#jq(O)E<*A9)-f+HV#Mrc7dFt_dkK7M_AAjuF~HISvVpCAHa^wlGZ7Sj8kA!PURLmrYwc zO%YPwpLQIo8s=gc6s(bUC>x<%$0QCs$PeY*@F|R$DfC(dE=~}eb?CR=#Z$op_zQA8=|JmL5`~iTTo^CG=?Yg1s zknU(>V{b3lKk^WV&)f$sd;~GEHXv^KDWyFeuH)cGC1OkLQ(B{>Ld7QGhp|szX=g?L zIgUew)Rdw={J|k3K4jJV4B#Z`54w?|eGWS=a)BuFQK`s`w`>t8aEOVK$^kbvme0z} zmbFF2gkv^al1`fcyyGVHU_T!^<`mLN2R~2-$1po;gmJ`gmaVnul_+n9*7$AgUb2~Q zNEah3b?Xr70M*lvFso>K^w(!Jfhv8;5MS#-EsFiBt zM-ta)`@4?hiIwZ=?Cr0t>gr)8K5qsED6bvqs)V%NU-l9nX|vVyP66;{AN_;<>GRGx zcib(v-nz20tJ6|X5wy3W_n8V4JJ9Wors}d6)2tswPzcZsjuFREpyCj=?qVp4_}q=x z8rZ$1nZ|==an$Uoe0c73jvhae23b!@B&rpj-C0*!5fh?=kdlrnMmWMXD{-DklS`%e zz*qN)7>ODfnyVeRwgk;mZTI}@f!*SPCROVF8|>B@FS-(k=H`f z?S~LYjLX)Mag!9n(9F7o5yCMHYqPZLXpNSFgbPc1dYLhznYM;3K@j1(<_P7XUV zQ3)Ypl$BAIP6B1hOr(-#?;c@|pfoN5t#pM%DkCVICADB;z;4(7-vfjbqSYy*KTFm_HINXxd+T; zPoKZW2^5(?gClWbjUR=m-hpyJ7rtM*dEvrGo)JQD!wtW91+Kel)vCV}H)>y=d+s?V zPo7eD#~rs#srcX2XSm|qpXMXS?1vwusLwW=21b?T#f_!|0$evi(#sldBS!qlxHuLl z1qH&$N9%~B2ggikXTju=4EgZnjvYL_ZVR`qTF->~97m2H$=vo9nlp8zoeZHW+0NKC z%8RzBHx0CPA=I)4ohh&V>0y%8|HF+|vl(E`oDjy}O@Pv|Q7DYyp%>Q?Dp@r+LBGi{ z-|hrN`}?R`U}mxznwy&6DFEK+;~W3+buRnb$tGJ7vVYR*%KipncUjKg6UIu|I8W8YaL12&EZFq zqBa6LLQAxch$xXDB8Yu@@|)cd9@g*dWou^-g+h_A7*N-kWzNKL{O<9^W}fVt z3egpcgyZ08WBTKvZ4NbJH_9==I7S$c5dnVabHc&<@XJqMgb+EDj;)=q2BjzlJ}5D;oD zZQHupvS}-&?g0p+*Ifq>yDj1(+UB{^&TbaJu$sldZ&Ds!doz3OHH}&Gr*P;&`x3Y1 znBURHq=p=W`I2FVOJxmvtevNwqZ{>QZQq;WHUx2rzWfeD478kp3J-Tr`t_BXT_GHY zT&kJ=QYZbf;@#s$F|MVFO?`t#L`p{yVrd0@!fwyV^dwKyQjy9)hJET4;bp|Aq;&W#Ibg}!ou+7=am9F zhX(n#AKk#td><*9pegN<&1CV?E_LZNsbqr2l*fpMda|hm>4Zl^Dv9e^yWxaOI_=^J z2Uj|VaOr^KNE~T|SK>HE3yq2)Mu93&@`n(@K{^Q>$HmiGgyU4!6Qs3gHU2@;$N|TS zZ{6_+DCW8F_yefRxC|5mgfQbK*Q&w&aM7~LIWUE~FQe zN)*=9kZd&XOT|_dR999#RawcgY?qD16A3&C87ECH*@9LPQRL&tMM`mzd{9D*h{H#> zbIkY-x(Y=WZS7*ou5KP!yM^XdiaBjf%pcXvg!+0SVoIS^*(0*!HDR1aE7Q;#Y3|(w ztARWJyOQZyaSfNCWqa;!(l+1$@GC0`Jqf1x+U-r&B%&w~H z|DV0jIk!&Blw^`g?<9mkfKU>uG(|cnC@OZbU=$G)5fSkPc?A^93#izTCLIh_qy|VJ zmGn$9nM|g)Tjt(-%HF>}_PKX%LO{Xyr|9c>o;=TF%Dv~Fv(H{@eb;w=zdW^KBP-T# zrKhcvzSd6Mfebo5WGXu?z_yY5O-I#KA*(78mca1?V#18IL&MMz35Ie;kN#~kUW)8nEkYN)Fk^qyXDaXEwREzwrIVG9Jto?}iql24rbKK2?vifk%t1Y9tB-Ig@Hcr&`LLTKOc7D7HduAgNf+d*wr6GDZM zV(29I#!sS4W+7-u#Hz`;`LG=d$>A$2jhXe7^n!702BoR#9RH% zFzSRGphwri$Pv)hFEpAz-gEc8K*OR%i@4#28%lq=&)$1qvvK|A(?Lzd_X&pb;8^7H zd5TiEN}C5>hjUTJ07vuM<}EzgyoEwM4k~SuKdm7jP+y(I)&YYLS1z=meL4Z zlyGq=V3WjAmBuhg=rZ)i$C6Q=-?W*hUVfSV=FH-xdDF?}Jw!-;b%mxP;;^{6jny69 z;Mhge1w*Kn-kz&}A<%(BxXQH4v>?zvZpP^QYakYjGH3Se#L{KU-ZjA=;EKz?1HkGP zD?gFT=3+(8(_tTZA74J_I7CoIB35mrmUUS*U4+|35Vpt4r+jp%T_p$zu#`Xx3)_hi ziNvW0uTR0xl5&rna5eTa+IV(r&iiqEy&7k(2;2QxTEr&;;%@j*OB;xS=+7`C;^&3R4h&Jsa=lu?W z0L`#3f>)yGh*%^_O?9>UPXh2a9!*V6EMB~r(@#JBo(CR$;Qg-aM~W0aos1i%|Jac* zZ8SO_3E>v8%Raj+8BC)G(&kIIK-7WHEtt>O7al=Le#1~hWL!ufjhbX8lYqz#= z+f%P_&yv;j?$`l4d(eGZ=u3x$z4FClR)Six1`;+TtFanKkQm=UEM{S8jkU{&Ubyju zi`x8kD$?KJUdjH%P6iKeklLye7%H&s?vK6>MgH$DM4=6poR zFBtwDXP$LdMMG`f$G2_Yer5CK&GF`KTkyPqU06E`yuJZC`Ud#@s?FTm;$Mn?z2Cn3aL1kZbOA=L&JAEF2h|A*en4?TU+MsbWs=Y0 z?T|LlH*cjdvKm=kfeMUv1VKQ;j`Gk)j%9=sBky`>ELwVdS=-sey3RhbDk}Et>giq-DD#}vO&`Yv=buJptcFCa z7W@DuWhkXf31%O*^A6jlT9tWll&0uI>VzVY;j@Fl!Y1KV5sy@(0+;@w4)SgaAti~3 z&Ad@{96Y9hl<)Jz=AB&g!Wy)_hEMG?gX1QRMQTkZkVd{+8csmbJ#^DhPC7@UeDI9ZM*ilu+ZR3f;6tYezS1QUcS9}gI~AHnA;ynHI}QZ?@P;Wv z=BE;6!7RM7u8XZTv&W3&yGI<#Nz><%RTi%Ag^R^PO0#sNRP^O~d3Mzb?s#%34?X`X z?C662K}2`DG#XdV1{FeLO98e(xjsR@0Qmx{FN@o{lfG9WF|koM%$g{ingkFS`*F(j zR)j`}n_b=uaNQi~!T`3YF>|-lKxImU6b`oXsEI@j8B3P&W+gZ@HcmXJ=aaDKmkJM+Iz(J zzH|-u{qA8dzWkFMe9&B^tq}zgraNYqzesG9p~*~fL)SPIyfpopc50HNO@}%({}^5l zqGYvfNr{Jt)RIUffs>D*q-I8KHI0cR&8dv(5o#N>|IQGAu(~dp1KEy2qP(EYMGbbH zFevLQmRIT3mB@w>sO|v)=!?Jg^_zj|#aCFq!dSf~6G@pJ%4$>~=uSaX13l?MvO&Ql zPN8&iNvTjl;0CN}YXiqY`2kWpDD8vmbLo-$Gr6*o-a?*4%m}#5oiK{|lSdP=Y*K+o z-sQrG$N&H!07*naR8{QE!(96yR1>ufdW0_Z+jS_nYl{dCRg=i(`bZD;;8Va88aMEX0%y-2&sno3 z@!s}v^HI6mTRMx< zd=o?>4l6fqWy!i0Y{xdmle7TO7-zkse!v?G42?jzehC!l=TVE@k;^%Q*Oug`a=;Pmg`Rx3_n8@#^Ym493|rT08hU&E3yE$4&P?#$zv1-ETzQh{Ld+fp zE0olrY#elDx>wGPe9S;*USvtB0vWPhWre!SHSc02qaNQBXO8mm1I(V zHO+%*P!b{DAxl`7)CWRdf<)VL9u{Cp&7=y4nbl1=(;aduAnW?{ z7hJXvrrD9rvuz;D*8V{{b3^obif!7XDjs1{V=c2QlI-13k8oW+cjIkrZ|$J1zn>|i zMj9#KaHFk=#JTy2d+8hO<5S0y(x!$GnE)s4_s-uBVMXZL1jL|c+-MBG^_ou($ zV59{M`M*d;}zO>S-Nox%kF;; zx_c2`P+|{4_9{H})Z;6K5W$Yl4(K$eF>%VI`-E1>Ll!Q~ zeB|s8HE-L|8oBGPyJl>A_>npJmp0yPA*i3-NZ^K!WwKz%PRc?Guq`MAJ}<9X&;B#_ z3YodP_Q(W+k%^dLQ@a5XDQQn<`RWrd^1_aG)W8s8M-O`K))IMs{P^)QlgXT6SyubP z!w&6kxo!LAZQEMewyl-Q%1SQ2_+q~Gt#1MFX2JiR9L3iJxbn&?xa_jaS-kj>yMene zyy$Bquem!lB&u$8h9 zC{!plY;KU**wVQk5>^E`apIPZEd!Lw(3KfvMaNDy^!2czdytO2M_)FB5`yYTl<6ZX zId1A$7L0A+*^MoDPH{f?omBt3*Aym*V;S(Y=w4>ZO=+xTxAeoT2?)zZD?fBgENT)c z7&QXDHHt_L5%_-X%dae10PKMR~ zT4)+#4h_)}9AHV5GWW;xe0uU8ow+=1sWcn=Q>^dqw=@3{T1I_mI5KnF0IV|S1%jT;~6VlqVhiZY^L1cM;vwZ(Ti5DT=}lqxM$3mAvSE-px3W^{pwN&x~7uPoPQdVM^vFi zBGl|tAyTQ|avAS2P?f1{?*8-g{}!*O)*8o&Qk@t@UuH)c(a^{QXI*nYr`J_8t+twe zH_!6+K5kpJf!~QuoIQIgM~od!PI(Nu${3Al)2|OiIOS!T{*ewnPqY@hl4u!rpVT@a z5sUE3mK{9y+Gea+v~1!=?AF44n~!%$eYqiZ*9 zTHpKXvRCx*Rg*%Gsm0oNFTV4s)A;OhhvND!)9PwCZsKVEXZhQrPUq*3CYjCV8PCxn}?)&Avbhmew z`#gyQ4?IXLUHY;}#1rCx1Lo-szxfS+{__(EA^7T|3%TwFgLY4yK8uQ^tWDs$+T@@@<5<2~%z+>x1>L;^xLyHm zhs8U?qb@?jxavw0ktp3mIaYLcbMF05u(59dgbmF*(HplRvqLD*@mO5gGV-~;zP@__ zZoBOcjz9ib9((Kw0MhC7E`j?0*Kyfp!vZObzH%W~Tyc39(3MVaKM0_XIp2_KRDn+&OS=qURzqGXS z(54nvbao?cn+n@vOjVR=RW(c-JI2T-BWO!yx%}Bzv9Jj&s|?}``2cUb1E9*e6(-Qz zR!M5vjH)VwRMl0$s%A)K(Fe?cNF42ZAhp>91Br;lV9ZE#Y8z-xLqq+QUja(U)-b2*>dw6eU+$B@2tB`DG zRtIS`*kavRsqzpMz%?qnoX<4Xuxh(KMGy&LW@42j6vyxkG{#o_s&j0erCm#RP#@^nZ;W2L~f;DqI z2cNKz?|sE`P7D^kHDdS5oLcM&8`IBcc=kSC0^U7v~_OUHT*p@tC>C%^9 zJ?Nl=#mg_hq+fr1^)8>O82kY?Z`@S+`qWcT<^KEcXH4U`acf^+y?smbHU-G!*lO&g z#FjbY2~B_A#u6G=n+Zp$1%9BYuB^bZBB4*Z>30_aQKV#CMI}`gNmg|BaO$0pv$HR4 z=I=MQA-1)lcl4CxOD)^Fsd?MxnD2hC=3bsght8mNv}frykIV6TuSG?VR>g4IWGu- z7y0)0hg}L!T_Q_jTOsUhnUE=s5R;M?G}R)S+t7bmj+i|e#x#@^^$;eBWo!d9?*KQT zqrHPzG`2Ue4B*EFyV5XCEutTG(gY1Om%K2C76p6;jfb zN#jX@=LVplsk(|U95@T5mGOHJ3Xgn<1_WVuLLjA)Sq(z8!nC76SQ1DQcPh=;WqZ1Vc@L0+QOO9$?LC9rA6~*=R;^{oGr~eKJ3?z;JGVaZ6w{|n z56fnG!C&d$1eEs|kr9Fpx3iOl_6!m6U>XAqRbfr5iY5 z{CLr_efzs=;d3g@{{k3U$EVLej+%-H`GSK}9AOm(jX=k5!ShYVd``(g6hxBa=0Zs|*#*q*0Ixv?8y4d^cBu26ZSKpb%Kf z4mqNsJ*q**2((Yck;G*JNbs2tp2%~*y%(?F#|u36-T&ZE&YyqK@}K_XM{jGK7Um{3*C=$Zt}cXpe_pNK$P7wqUlZ`u(m38Kc08!xwSZ&@USCvSi7bqZ-G)*Ru4VcDA*dDBs;j`lZ$UU~q^(KC_h5jyr@8AGt3hV^Put$%erc zYrA{cnaL6$X-Xtmbih80t4=VsY6MZc3fqnW4oVBM9_Vnwz!)S|GU!SIKg(&;$8yb* zB-{G?dB-9^yCeZ+WHU>a5ejuU{%OW2MO`(zr4u|4ykEziI3yq+;*hV1X}zoVudq|TUvQ==?c!AHy=r))FL&) zK_(!mVjov2zPVsuCRA3DD&#?i!qD152#M6XM8_&=El6ql%c>|c95S)BLTXA*f0nSZ zEgP_i*cD_7X?$G(X(3fWf5Br~V?84pMzDJ8R@U#_$pMolAcf?Xr=KO$Gr-3`a2(YY z5mH${d?yPXD5??>e!Ajy`Ug@F|118kMdq#V!G;~^#u12-^=Ln=FqNi|%OUzQr4H}> z0}sCQ-If4+@2V>=jz(j%a=9E>lF{>K@ZN)Gk;xaRu;K{enD(ajL0AY?w95V83;cVU z(JzvkEg1_HIE(y>qCpSC6}!+zWl>79o<`zx?4%|RZE9r6jt(B#+zJAYoG_aGMvcH% z5;riDEV|q{qHMB5Xe*RKw+Q@zJ6>2t)^m-RRe54qrV#kf5`yA`B!}g~J-teEuBnzu{ue zKYoE3ky8=I)J&u<*+?vwpgI~Q9*dHU#c*VVyjG+=pFz)M$Ssib+)ykh{9xgNEB5|| zdDbdqmIm0iO~*hxr(OPi&iej$x#r$K5UGhV^5FeS=ibt?<@|>qy6v5O%_0^g$EIA~{#41X3Wfa2hJZJ3hwNKP1|X1>*e}i+{b6{d79>Qjt4h2(=s^7J`Htze9m5cVcu-c zoHdbI4K*YqHbcGyQGp5^e5D9bh6Sxn;8G#0DCtzP@WqK27*Yv)n8NEPSGHivE z?eVH?a#WR(#6l}+sdqK;(ORRl#@9X)Njy>$YPB0KhYkewRZ*rjje=~BM_yft6cO47 z2f6>*=V_WShLh({C7W|mA_z4nG>#?d$PV%A@?qha;tp%`q;2&1(6T4k{5t{LU4i!X=aheV}HrDVnrj4b!6pF(pjOH`*rgOsN zu{^S6J6AlvlAW0$Dq|K_NTAlDXjNYJn!+R;QYxA|`*~``CgX~#cIPqZzxg>9yI-54 z--whY<1Dl`)qe;_NK2+>&YHF1-M-)cLlA&hUU^v`a>#=1S6p%BxLvM%!lL591Nq7q z&*Y0I9!5}56kLz`$|h1-j~CZ(p|h`#u2h!1n`gqPQB*n+8tZBqRaZ@QA{l0op$ux6 zh*_mcaKi+*ghFX6gc`z1McPCNcyi4;{(Q${c$>HLN82)+ZEZ#A6uUaRsjIJhTZvLC zm0`q)s$;U*^hH`3b&9&ZM?-a->9rY-nVDiJ5Ja#zdfE_6+9TxMBymfT%jP-vgku=n zFcv=uQ4Vc_QIR}mg^pP#Pae-LudYG39=f#~Uf&d2ml{n>&-13d_`Tv z(9><$l(i#AZJ07?Y@-U?RV!XwF%p3GE~tp2CQV}L;^+9w-c$I@etVJk13cy8Yg0|D z0DKW3(PZ=8__{zthfJD^P?A83l2?MSBtf8#V1doI-X=OlMS;AGtm%tBtKieje%4FVn$S^I2BOb ztOX(2FO)qdUx2pIoiWJ6rk#kr#-VM8Le@q1rAkn4ZEY<}UU@11Zh1ZqU3ds05OcS; zZoj&9#||y9L~?Q?#~-ve5`im1M^IsA_rXRekK%;%F0=L+k(|FSxBFMPE?Smex7eR| zl^YT*i+0pHw3nu2|E-FSqs2r^8b?XLsHi6dlWHpX_M!W+w4#N{P&U8mM>qcXxgY=J#{VDyYd5T`+p=+E1tsxGkag9JKl?=P`T5tm z@RXy-=ksVGiCH6f;DzP<@!2J0b9wfkI*pIMX91sk|M46}oiL5`{%k{X`36c4HCH?`HVZQ!n7Pw3)x~17tP_t=+p^n7RAR9sFBA>*v1sC6XYf zOq%k5>$-pzi4jRg%pObJ(VRTjM~Yf3stI(0`nb(OV*}EGB9%*V;(|l?z%hrT{b=Zi zZESu6{)yDpMBN`3i*7Vf5qdmM;_*9 zKlz`|1Lw~F(8P(84YNjR*s>G)dyxgfpB`JnfbUUI8l^3yGR84Vgz`aJAcRA{Fhq8! z4@+9RW%FSb6#Cwa5U?CwQL(Gjm;PUB8tS)(rbTVFNfLI4tk<`|YwM9Y7oh}d{K%3C zdTVQo{>G)3Pkj8b#az~W6Wdyh=EJO6vo>3nbkPBH^mEsv&+`1H4J0CQEM4@|()h|} zFq`7i!}iCvMHq}RWYW-A!uhhwkY)Qeb!+@ zBEv#c3RC?TT*P1+v0^KzJi4V59Rw7758X9T+Dc~3n7Q$YBaZr~tGRvnBj*C};`2-B z>gze6t-T}c3M!iBPGSFPV~yuYAVNVO5u%EISRm;VQ(cFsVo{e%h_}DQwGJhPwG1g2 zMKUh<+N0p6u`DN)xiHDFC^|waRg&v9WWM4)E=tKk>3LLwY(8M#=mxGlay}!X5pG_w zj#XW~cuM04VSqJl8G@nKL@k?^-hS?QZW*=}iXQETfV?SZXSYngxW>)ZlEaC75g8MN zo*7|c8IlZhxuJd`MD|l;wn9CqIz74aB> z=Ob`PMn`e`Gq2E8ThEtHK9Tnwa3B*#k0Kt6lXT+LB&(S^rioeOCsA8f6)MBMb)QD) zBI*=s1Q7bf3yU57ooskSfX)GK9Es5KL&(4?*n|8p)?WV73o}Zn)eO>$Cara$q{0kqaoOCL;+t1kb&vi<>@_8!#Iwdl4EsI7+Ds*-5xefQq=5Wtm_ zKg(rXZW;}+cJ11qO`0&d571WB1C^RA44B2_>kA)`j0UJePog8KY~dPbN?~k6WL8foIpPLB0q%M z*@u_PLf>HNQ!ZKZ;>Yf|;}70H^Eqg2Y~;4z{hse!dBxEJ=j!xe>K7{T!&|61{Ghos zR3yxVQ*ka{TG-en$?)N2DG*q@sCT}z%Dw&a6%T2>F&OC%G(g- z$kFh58EN;xQsfIRg&^SA$xVD@)?`w-fJe8svc7i!3yCAmxS=HkPSoc5`=4VVohM@3 z;cKgR==oD*wv_#~3JJV2e9(*J(wrA&Qj&NqDgeIsz3>0uP5`dC<{C~s@kD<2+u#0v z#E9C16UhoQzmfN7e)w5FcEL5gwzZvD)FN9LB$XLrXMZ=Zw{2%fPdht%yV$&ACl9{# zGCzLcet!DkpIFghZ@K?>@^7)R?$A=t819MaNkgv#axP}rY7;;cv9X(q|j;#Mzj{iLH(ES{K)REkM=UtDFY#cSkwryDqXuQ6SjB;80 z+)Dhw51GcHJTq3fK^bu(i2aYprA9F5g#t&67?# zV-7{O-nMquuHMAuciv6Zj)xnU$E1cjj+@*VwwnC#TrI#tY0ucY;*?cGVHo)vAY-wI zWJ`w@tV%25b_I?dH5ID_lwwRxCH3`{5RY)nlh4wX8sy~tXOMFh5H>qobpg?i~Ap<2e76h2-48RH8zXaeL{{ZpZa=NMV)a z!uQnwHUanTO$Zj(NJ&ITgs)*aWD5gia($)1Se#-i_GinVyWKemyZ=mS;{_lHQCtmq z4-%0GM~rXexCu?9b3PAm+0LMw#}ZH(bNKU$4cxbM1BqC~AX;HUq~B&TKP(w}zZ(Dm zAOJ~3K~yOoKEYatC88oCEu@sg_TE~RxqT|CDwF>bd+a}?1@Ootj~L?0hV?JUqLKGT zA`w%X`-;tvJjdBz{yt0AZ6g^|eC@3F(^y;2JXDg42U2I#69=@@u-tdJo#_>yxUt_DvMv&&lrR62JAH|N_}Mn$BtrKNu(7+ zS_z_7lBgYHMneV3Xa!LnB?zH3trVGDJF!R=;Fun)CCLo+5@@6FR##I+Ob$QRl${9C3jj`SpI=~KNePy)P1Z_P$_bf!H8uwQ&OgR^z z2>l8$Er<}}jXTwbN2q)df~sVU>5UDbA)U@Jsj-@Ija4YEP{InyZJL;E@t4+4mUs3b zq#Z)hMd!b8b1Ui=sBi)!=fObE+=xuh2rw1H;nohL{+UXbVBCgLBRO!vq5l;4KUryf z?@=u+Eq4zL4#q1`DJT!@OuQlM8lw9}H3x7!0Kjq+(ZTx?03oR=asv@;xa4c!~H*u%K}8>a_$PY8rC zlHZ1?t58xAXdjJFfW%b+jx9NOd>x049m9(DJ~F-{n=f$VLrcuWiWH_*fkX%1I~aj1 zI=5J5Xn^Se#GS}68h~%OLV34@vFv-mJpG>pV7H^DriQ-0zDMn-bG~Cm!h%54`_xiS z|HP&I;<0BLaJxBr&R$%8&WHK#M?b_h=Y52qeCdl^eAd}4oHYw6A@3E8^SIcxx3fE> zrHa-N(ju=0=}EWJKh%k^3fPW71~%{6dkzafbVBKN5A^lZ)HvqX0B3*jL%Y1*LytW8 z*L!v6oPAeufk$eqh}6WfwB*1kNgO+Z6b@2KB9@IUZIrZ;PMi@@K`x)gS3VLOtu^UF zCvm$1X~m4iv9QSIyYW=s3}Xqj7p>*vi5~PTmWjjME>?wp#(_|OPQJ=Wm#5nmueE)5RuY-{_%tXX@-pMLu3XXeb^=h&vEvAu+(dpyrnu>>NQ&C%Z8Iq~j0 ze;@hz?60ez@BQ_gPQUR>0${_Yjknq|+`!hhGPJdYA3ypuB80>hkaK;6uuN4K8sd1; z!?7!fT8VJ&3FEaAl>OLbfh;kROq7+6hH_pQRIII;WS1$L_f@Z z(R#Q8uJvxoU9r#-5--RyklH~Y{1AN&LIkcn^6NeP|BXo_WgGyh1yTuw0x6wvUsokT zC)b6lh~${bO;p(q_bpk&>Xr`Tj%C(KsHiEW{k9Q+(ppw!Z9S!l*bWgpe7)jF3RIW? zXoSE&_>e=c|4#z2+c7XOKs=dXD4qSEL^A%ts_IHnEWLwOTlm`NzQ>oZ{ROLct|MTG zyz7xG6v(NYp@($w+Or$$xU}cWa6<@*Ky7`!oOkt&eCH3h@#KnE=+AZH z;Bdvq&w`ngO3VJa=bt<6;;&uu;XCg9!`uFhPyOYYeTt_QtE)r{o3XVvlNueP{cl6W z0?P`&mJ%s!qK=^8<_L5Fv?N>T0wmE$l^LxPf=rgV>SU%~YiCT=SfRv3Up2xl8+N1%gngV81EbGQ;Q z?V&(xDxy)Mk;vaq{wv!#1ffiIagFW)a}^q>tSHT&x3_n&Wy@AQdFm8aEnoTMr$70z z_agaREE*FSYn##$jYU88gKMv!4shrd7jo~HZqz4!^xUttG&euxtDq>EiEi!Uj^|%w z$>vRHpuWl`Jybv|5i;?M61j>Bs~REA^HXFx54)dggjS)Kyc)iqx~LHVmK0P(6GR*v zX@hM^l931z+X@-r3fqcd+i_I*Kr1voskE`+6_SIdjU~_;p)EWe5Qu=vsKb35T3FN8 ziEu(bgVd$-DjLWXH)t&_B3YNnVBYw{yRLEe+@%~vlPf^)pyAnAl7@!*1i+JzKK2h= z=T~0wT>wUn9JRlVy=v?B7E0m;$vE>rax6Fh{tC`~&jNHl!pO>z?AJJk{Tu6;Q&)v! zNjCPUc)WQh_ibunS!W-fuZT;ZT)vIobPIi%HnLs{B|u__Ntxk(nEM#^;}M|Bc^pgJBMMm}_4nE!dVqyngv4zBq2cmMS9 zPoDRm1Yq|gmmQ+2s*1tE!Mhsj8|IH0GiJDH*WSb3Klm;0`@$96@#51YBNnzL2|@x% z(O9iG@>kTlE-^LBNF-W=3}iU^XFRVxt$20GDt`F=U-6*}ujZ(WujYbZ|B|R9Iro#N zLDVUgd^g_w^UDBEIN^l1_4zv6+x_Be#6~2@doX8G9LEM}3v4GqIstaX!?HBewy}i5 z5{7~7sw_i=E#r4%dlzP z-rm8|Wv`|WK6C*uUj9Rlx#rS~mdO0IJL?l#fD}@|)Ny?BYiIMh_a4B1-TNScZzB}s zJQp9&h){)!ZH|nSOxB{16ze#I2yLj#j9`QqhLxq^5CjCoqYkl1j9dQvB!^yh1v4)A z8v9>zIhWpfH<^3^$8kWLKB_Gwmi7=5QW=-$Uf+iD1+%A&Vd2b)1c5>e)6%hpBwcX% z?`3O@u7VW1x>$#VLbCyw9<2-lD!YaZEG#stZxGCMjIJF~Cr&x#l=IQM2+9+UCOG`? zqx^s5+Wzj9S8>_p-{y?d&zRiV)w$I7{HhX}VazDr_tg*ai~ssO`;VVV!WvC&atzh+ zF;peSQC~Tkrs^@wtgGeFraDfXJemWV>ew-uHkv5T?S~>hf};7ZCY9|7`89T^SrR%0mSFwz%74$W(QsZY zb|VCe($CGB3k|x$_fSG0@JL1@-0|#k*0*+rf>VSot>ISH+in5uB6MWFPC8K%RwPVd z!&zdXO#%?g{zhz*1l{_}U;ifo*wc|pnIN@g%a*0bAAkG__+R}@ixw@~C0+>IMkZqjDVQ_P zBG3ZMQV83{iTX&}$BHO~9bj1wZm5BfbF<`vEb&Mcwv3>ZMr)sJzR!56YuhMlNo5K( zN0WC|S=dqhyC3I&;q!MC=Q>4y2Kt7$>zU;^LK|)Ra5kAxiA;z6z#!b--YnY}rEZ@b zUI&7A<_1{okCx_*6~b4gnfW)}a2y+5l`P%OPk;JTU%l?S8~FWg!=B>n*R6l>h38*t ztgNYCWtlN5p|#d?=IpcWr59h|{9pcb*5)5gtw|F^es{8iV`pBluHf<%d4{v7eUT?V+Je^F8<6{pC|nJ^dfDrX!IE-@fcpzH;H$M%{DoJzL6# zMueC>h4+8)bgui-8H}tRPi3qTOV}a#Tww{Dn4P35KAKV0GpVhdKq6K_Q!K$5drjmU zhwROqx*C49auc6_^f~^xVLN$00Fft^ZKb<^BZEV21VMl!jnIw=t(1e%lijQhF{}Wk zL0cB7p-ysM3QAr8MYMq3`uydIz%D!G9@}ig2{Oa{k>dBXE?Gqj0;174ueWw^^JB}1 zL?gQ;)eNISZ@Y6R!vf4y|3V0=V{zj&T8y4LBpv5+rFWb#VS@Nq*-Pa=^UY5=eik7^5P$G=!eedmya$cxINOGO%%VrN*mbM~ zqxvV5G7|$zk=G2@e^MX|KB8-o;MFy>-}x9c?=*9%67snmPd@eZ#Ls`>f~psufA+6_ zmK$!k!Ss@)A-`EV~cK&LAuoOBRrpAXD%e%6lQJR1l3M zjc$Jf(00RrZLy1G~`O(Ez1N-tuo*a3}>K z0SwTaH*dLi_uu>Kg%>ep%J|Ooz~J1;Q>Q#sTUQ4lRKGCS?8QZA9z`lwAYw_bKKFQj{OE(cuxTs4HWSWLD75yGLgJ|$-Kni~rqG0yljU4i|%joFo;iVs4&#G&$V$*e3bJN$p zz>I0rSoX>?&imOdSkfjR7|zz-FE-I-i~c+E}XmHzAZx7 z0?@Izq1N7i|God;*YxDclW|>_Xe>JA`XByx2S|lR=x7A?o52S@aSA{B>?zbHMpGH7 zC(s@mKiny02+8}ULC%a4zp&leBan{9&`zWMBH-0;de zUTyCu>*pzWJ#=L@(35TzsVSh1~r3 z3lxikOitJdQ#kd2hxV9r34DJCB<=f z-+kBYzxDI{*AM<{VJsG@17j|f7m}K!MLbsYj0&)Xhp@6pnM0yN@>M|pkfL`W8_Ha2 zJm2&yGx;8Toj2-UT4P}$Erl->i*EQmw_SO&VKfVr33;6R@0G8bYych_orzd%+OF<&C&Z#;;TQuopfH)Uogq1C5*pD#BxYD4lx-a(0MZX9=fxw zbf=r?Ol_lUXb0(B7dbae5O@f{v2B`rx;gJhKf(1}?)%n7>_2`yLtdU(G|I;o9>znL zT*ToE7x2V0FYv3UpCu;qXsxk36(%K*Z{A7s;9!}R z>+XSn7#*~fqHZ7`QU^f?KJ*NL>!Lx_)z$g$d++-^fM=h5wGb$O|H|r$?SMG)up_ho zs5RZ(+|1M|Q)k5Yg`cf8Xb*Uf%@U#a? zVOtR@6ZOUbPoHDtmDzG+xg0$mvZB48|h3B5t9Wng*JKy zw=!7hB=8EulD9?iAS9W5AL*fvaLliK5$m@I@a5IMev^dYjnC)qZ2^HmivSxzEb8!! zM_*x8^G+(_kzFABznj7na)X4@2pdKul4cJMO^=L-m@=oIDtSlnp7$Jc@_!P5zwx;0 zs;dB)z1QBnw&KAtY9R!wvzJ$X`v@0&_yQK3_j!KyjU|EbB zyTV7xC>Q_iF7CPRcZhTrfo)_1(8mL}{kyjSjy?8R9(?e@-;AiOGZ)Ksp}(J}S8c(| z`34#kBD8%iN%FrX6lms-4arFf`M+kJS|YCu8R>z{G6sT;n1DS zvwUX{FYWB(#T{KN@91Z3{~&96`bfEoq#Y+_*;uy15+1Ibp>L>-&QuHSgB$6}Y$9Li z;o{%l&bF3zZe6s9{U%N&UC0px5codXg3H8_4gB)+pP;^JG(WumLE1BYSe76evswJ= zdOBLVIroTtnK8PCg71dY=B7J66a?JAej9-jys50a7{26nsRFSg>tBQCy3o~My3T!l z0}uUa@t+@2w@pCnGBkLc^X0z2{gn_B!IOT)K z^38LOLHU|QqycRi;+w6FypK_1EapK0S_D9VqYQFrB*e`&AF<-pRE(rLF^*((JoS|| z95$|jZ!XxM%MRU_o@|Z}-~Sw6cx(yV(ixIbO+MF6cWNX5kG=Db)1#{Q|NESodD`}# zWRq-q=mZja3pFuFlcIpq6cNR8uU#pEf}&Wi0)iCjRRtowm_}%+gcQ>IZnD|->^^;F z&iVau=9y!l~N6&*<8YApv+ zX0_hwrtIAQ7dw5ee=;C;u?Y_x3xt>*%VGYyt=vCjA!Sh~DCqQnPTxP00~GfWtu^Ik z3F3|&GH1XFJcu+RQ-EAHJo9gT_uFf)`0`hFCjcMjShiv*0Lxb_%&c9z_K5rMec-^d zvWkL`0R&Si+>RcWKm06TIsH<`o_-G3J^V+ubabGFAmTU!WhAvm1{txh1;UOnxMCQ$ zedEjg<Fy?<(s2^rt@!TkiFZ4ehS>@)kyf z##7qZ5c?KNS$MugcnOqS3%VXD8?j|MT2>>RM&j`}I#^hqpQqrag4SCgeTtww9^t1C zJk29NzXy^jG!|NT0=OJ_@&EVD|LW&|Ee`w7X#gC0$iaUJBgVEK)~(;l)}Exni4;*I z0lHX9iBdkk@&a_S!IM~0Vo8G|5n3aqB$dlS-V4Ng^oQ>P=z&?KQJ^aX2>FtWG+KgT1d-B2@l80^WdDBJoVBnK0W0i4%?%g&c2N(@&+s>L0O7?p}?5N7Owit z*=%gxLThIyamyl8C~)hG3uqi%!+FO}Ag4T}vhjsR;1jn6GuLfrUR#IZccV?k+n>4? zba;fYNMs9Cr#;*t!gNPNo=%ztFD zIbg;p3Z#fo=2X#CHio*YF+`jMEtM7Ac>F;;eD*QeQt-(~UgVoE&u2?I2eu^VrD*Tj zKxf|u`Z8@K)2(I`6dsl`ju1W=uwXyOWfdr`(W=ON3G9`mfOHN#qaxDW+zi0Y zx8Cxxh^O}dwG&#sdNtqs&iDD;g`Zsn#11~>kefDb+<3|M?b~X?5l}iS+Mb=uH80NP z7kiK6_~Q;|>T$<#&^~)Htf7|Lvhu*$%V?IP4E@W~K3?A8v;z-k!abw-#eIL~!CM}t zcjd-@Gb)HiqZ~7Na^Jc&Yad>{W_4s}^RTU}SFPG*N%+Vkk6d%iF~__;Yu2pCuekiH zOMo4~AbbUR57*Zyr30-9o4f+cjxub_XNWp=Ccr75Ur&gdGw=+mR8ll;F?1{2vWVCY zKY92WZod9@=uQScU%qY`K61v!jq7jY-{YtNau;8CQQ?pG-t$AtvOeYeO4HRXIy-t; zwYh`FstWoFMwdI|d8AyAzJiCV6xq$K0eb{uPJ);np}D+_!43;L;AW#NWBb*5M`S9g_{NwAn>Z+1$ax4-hSI85IL_WP{ z-P%Vo>9oR;QpckZjZ(J9D8`H*&Q)g}&)DV$PQCUnHtt9oK}>DDFjlm6A<)!SRpO&? zeLp;%Ar*0k$ufk{xLyTXXwn6rExkFCxg6`e`$+jdRZfJem_tJ%!VOQ%q@l5nFP=Dw zj#MYJmabuIcb1d(AIIp%!Ps_;s1>IihrNdmMOik!mXyb%{MU<%*tTgKmz;hSBO0m$ zK($GZBGM-9`P?*bsbPND{ku6bkhS&03vU%%>U+T#8Y@u$bn~7O`AKC0;YZQ?hg)yI zZt@Ao47hDK{N#Fs5Zv&S>-oWzKm3<2R5!F z3l;GiW2mD`^Y5bMEV@L`4EvYL8sLi}0^=#Eb%5On8ckM$SlLKiKTmJIgP{qFU!Qm| zmrNMTZHwOJ!Y5~O;Gi1L+jlGnHr1oa(3$B)3M()i(rBp=+C~ax7+N|=&P0D&pV~!3 zZC5Rv{;9C+XPYfbBZlDp#-b4(d}#@KWfWcQgcO2CF*SbO#jUq}(i~#Lx zuq?{!tIRd`gX@R@>7$jAwAMY{;VX?CH7d7t>&Hid-TJ?HQm@W^HT-<*)~zpIblzuY zzqN4wa|cY=|D0{x+KbBS8YM(wdnYU3Sj;oezRWW(yuu6f7O-IRCc3gY?1V!s5}_(u zLBx&|wIf7r3x%X6R>_ou4q)QZ`?58cWy8|-#&aEk=Xtbm+vY{=$nDAAOdYUgsf8Ng-0AZ!bo>KWY<=im_*1;4neER^qK$r#o3dms=v zP83T>q%dnt3K6i9R3Kd}iAHU1n*K7sy!Lk3xQ)O-LmfErAbIAePW!~1IdeMy4XS^x zoBAL5Sr5M8pL*kk$hN{L-}f&~_VfSI>a5D zxErp^vh`ef)^Xf7V-eG5ETE~OmQNkDCwbQ+8nO7*)34Ls(aUE~IDlcbmH0}9rYu?; zFr=$|VooKFU5*er8sZU#R+cfUrjn7>71YEc2uE`NoTa=me{sPqQ>zrOqz7SNho^4`oRo8mA z-hS)1zjFB%%$xsKcx_+#+usKK`>#B*nH+oVyXWuMuiG#Q5W;a_?@@g3@=tQ|q`gUH zGgQPIDUa2d&8TQ=E=nzKLYkY{_1?Ox{~s_8(@4uE;Z!uQH~0VmAOJ~3K~!KlWq7`% zI%aWVOB06+5euH1Ow2i9qpZRWJyxO2nDBYBN{f`#hF3YKAHhJnnCMT+;Chq40dAa+U0A&pvPK4Y(4ZmbZ{50O+3p13pLBfc)YG{4 zp$E4BD<(}m@V^c_`k2QueSN2Qc6XJR?xPUoUHZ0luzBe!7QFO2&p!1$_dN0x_r3fw z&n;faYb%$ruCtBp**<*bQBXb}g5iyWIc4e*l<(2Z+_zVvx=mNGP$)!_y~&eDj~jd4 zoY}L_1GxI?tC=-x)`0Un@4WNI&7C{g%X&h;!U{P2RVR zrMvc#z9f_BprUF7b~IsHOU1<~g^{2SmrhH&Zbv-ciy9F{Fx_WyMPFzbOA27JC@{f4cXOr~7<>Ij2ElVoC1E|`2EBWtT^DvQ%p zo}fM+qb3%i%yDR}s9>)_doixInLTS8*{i;sLx)y#@Zd(CTep>8zOj@|eOb0<(t*^j zdjBZ8>)~M-z@%lNlWD}ZE)&2@(XJF62QZ=n(Vf;EkS_pm&t3OUe{%Yhp+sFKlcTYr z`pcPI?pMC=YXL&r5hh(SjlM{PubpxjCmk@3_1n9-`r#LO^7Umj*46O+vyY~(GLB^l z*0l9<^OJLkmdE+pClANAER;3^TVePW23k^GHi(*dGiA{_1cIEO!B-x(rKxaY3@(rI z(2T`w-P*}92aaR>s3u-rx1B8;+Bkfl(M%dWjHm^PSd=w8I{C^iPx98XHT?F9Gud-+ z1Hb(18_axjIp6rqWTxythLoER7(Nom7PO^ueDk@t$QHXNLWJEE5o|gX?ZC4xwt_OH zu$3w9@@}5)WYQRBYGVFZAF1|0j>*r%Yx2+BI}_^!!n4l>h{T>NxJK z$y|5gG}7rjS_*0t%~--2FhB3_ocEy{Q~eYgi*0s+5dpHWiQDBwohpZ4M0o`AN@FRBmO60c^O3?1oUTQ`O?_9=zx}KK{vbn9>Rf0Y z-tMsTWjl1IbA0KyesmqB$oF;^4U0Y=wXD6J_d zMK+&D=d#93DoBF1ZryUtC7-{vW6`38yGH>3jN>oUp9()8xA%TMzxw%&i-17@C!KU+ z$BQq%oQp=Brh;3rjo^w#D_0k~lEUpul3u-u&CkBZOJF4U;&Dh=P+mc0O%>X*amr#e zR#jj(*W+cgh}N#aj0b1!s?|CYiRcS2yl|ftE0(SYG8Gk7^z|jV;DQUd`|i8HE`<1+ z)>u*B*W@%l6hc7(MPZl=4tQp)HB_RhY?2Ul57g zyt-l?*Ia))nH6gToPwgEzELPoj@hw&a~Hs4k3Gh}<6%kCUXgy(muKC^?abS}olovl zLEiI26-X@wS}LTH_`Zv_BvDyQBw9;4*M*dA+;-Aod~f!A?q9ePoT7EG;3Fvl2b^go z6?FFnvZ$6ZY_UWL2-G4FtWhcqJbI_7_r`)ZE(R6>G&c`p)QFb-H*DN^i|h6n7*aIC zNtd6^%~yVoldispzpYruq2q?}jgt>!&N~~}cVr{Kx%gy8G}V#G`;<9w|Emk>=}mFi zr13OWL`fF{N6dis01QF%zElL&Myv#7kxD~5lNObUX3FD($P~Kh&3EJZDZ0}xYqqrG z+LD@hgintf$*0B+=i9aAeCxI+cxl;24jwgxB^z6LW&UbXnH)D>eg>1rk6_-qR{k<$ zKI8Um<_nW2lFSqk%0_4(goR^C?pU~*u6*7|X9lx>EqoLB1KoLi4Fw+qhbd7%r4(ce zE_C-oZyG>bmL=}I^AG=V>7|!(#~ru-udLfwUU;4pKQZlzSuelb;48qku*MGMhv%I{ zCg|d}GzuuGaK8U&-i$Yb z^R+Cr(%kUKi)`sm5_h6uGVS4-dRBcz=1!PcDlAXoSH_{K8hmYZ5rWQu6yWuvn$wpy zBW9qfsfnh>CUN&&cYJK(r~PpX_P_f1jp65~pMEM&J~_P};H)#xxbn&A(?|K5+S;m` z(>l94MLu6BBECy9VFe!wDM$h&>19j!dR<}MHb_ze)j+JBew5Y^2FsUm#^jD{1`oYjJxl@O$)2wOVXnPhk3s*PY3<%k2ZE8Xv&_?`*=!IVuFMcM=?t;iPgu%k4m-G9IRx)&~5^uMzCUwqL8 z{P7+WH|ETk(d)Va$g?cYIn$1$rKz5L!Qe$~D;92&I!s3Yf!&{hw7SwpYlMC*jIFQM z1~417c^-!hZs6;O?#ls#YRP#X8o#8g9B%d{ zc7Sp0RHghl>=LM5;{pUBwNVR*V)5kb@9^@XwUkGlVAd}T0Fi(OSrjVzu)BYVGF15G zF&I)4bd?ldQ6f2*GzlS$0oxLQR&YU&jfQeHoDk@GD7N<>|IO)%$M~xEYWo4l&;4Y9SJ3Sz3;CF)+ zT`1&PzI?@@*=+Z##~gk5bAOvLC;Xi~_uTW`T|Sk4efWJoi#NFlI#6yOuIk10lcY1f zy!>vIL^O&Qs9XhxnJA&Dh(y@1qnnGbzl)BS=7H-6J}?Lol?SzM-!`+MuAYDQj#?R(Vm2ZRw%*S5X5Ho+ixEMkWQz6SUiEs zgZAQvADmBJEJ8Y0VCsQ;uxe8WkH5Bpm}3V_2aBxlQd1FQXufXoM!%{7pwCX2+?B)fu08Ekp4cA$;&Xl!UlbNn_=3qre!Etl!+lwqz27BJX>A z=ZwR-^Xq5vxl<44i)T;f6DLk$W>1o|QathIDxRFVmQu6qU z^|YmPr7Nz2>nOCrY!zHs+io2HD9taFHioqY*QJoj!IqLUW^F^mS^tx3^z)Z~A^iN0 z_uR+jU%Kq7=Apx<=W^NOik7-%ErU4qnEmlQ6^u4CmW)vJRVYqtO&rs^96NmwzRIo~ z_yU1nqb_RHNsRiV^0Ba}j5lE6(3^89cO>6CasrQ>c^p{qsmEXB#@834(8Mh(u<+F- zleR#uP!_jIVdR;Megk1#*8Sf@KwSvbJQa$BW3ys&D>wi3H4`I)?`fe7-$5JOVf}%o z+Ikn|zcRvcxdPNBAm*5^5~Ws!)S!e2ErylrqPtSztE^eG=E<9Gx~c2q6hG~c`v&mr zb7n4l{%0>h2;tF>3U}}!2S4}b8*jwAySjBsr#bx4!xDS!wdZNw-QC~ZzN3A7Z+8!U zsg!BCi_k#WgnglC8Z-<$0?P9!FRv^#)Hgig`Cd$GJ)-|P%%4C1Q2`J4Yd4r>lk9_R zj+yHsoHTYjzRDt$O~lsBSQq2u<1S&J;e*M$D)fvmN~|WcE?>L(J~lizGjN$Q!?N=} zd;ZZ6J@DXSJMOTfv*X`B0l4cAcRmjMK)?j;`{4QPXzQdslVfzE+_VG(WU?zD7kY7l{LdKgE-7Ht4j+ulPzE>;QDoXk z7Oml&`(9w}{M8I=Zs5Wb4#W+-7zpT?!jh~@_VW1hO@SC=AOTw}9|Jak?#@742RiN` zni|obNu~pkIyvp5c65Mio}t>>8u9MC%T|2;(l2n=9e4gq*XA|XUdgrB{DiyixRc-A zdUMOY_uT*2h4bf)_`@A{CX`ZExEo2ts4*>!9#oI7TqDa2fjN`J3pQybl%c>0t0Z(4 z$RCG(7dy@P{~iY5J^P>Ow+EtWMUbKCIatyTWOoI=0#7T(*H&}aCy(L2WvjXVl?BY* z)Xwjw9l^+efujLSOMGFZxD`e5?x2ekVi1D3D*{eOkt!<%S{Y4`n2eCiYOZ|XC6cKW zjuSx@>4O7Qe@jfRT_s4xC@X{+8Hs?IXmkuTxGp-EGi%E)0ZWVa$EtWeG$`LS7@dq6 zD@B~BXl$r=wzO_#cLMOga6I_Heee0&?{B@;1za$0a@YR&y3}iLynYApfrd2e)^GT` z-#ho*b9wk-qtD*Z)JR!*IcwLfF&X=iT13`IclRJV+F94$!pbg(mYNJo!KVii~4?H;M%B!#BC)fRi-ADh&+sx06 zE0;%WPl|CB6=>hgwPg|HgG3_mRF=-(O+=kIzVDH7QzRlb?YVB;e6S&g@njcm*WzSB z^pgecuS_QbesFKfRR8@0tq^98y?Hw{RHLO8n49dZXcHbGA8_%Kr4_}`s}J3mPal0C zz3CjFa23R&Q7%6AAbxnyGyKQzr!!;8T24QBPoAB>nm@hzHaHe2pHCjPH`DeTO(tDH z*b0=PMoM7}fy(3cM4bdm`TaJNfg0=D^3lFcStQP}`|ZQxcbB8A2+zE>oC^;>o`Rnu z=k}6!(_~Zz<>x7jI-E16k^BDiH?o-==bdsmqZ?~T<#GsNoc)x58q4O+MXO1s(t$}= zu@Vcevy|Yv(AH(f16w-KmE~YX(7tcLT0)S?<)AH0ltoL+h(|8^{3ShKzv8R^l7%>J z+BBYh_F0~O?iuS_U;pOdQ&0Qk@WqSXp8M4=U$N85DK?mdz;S3C)kGp<8zP8h#x0p# z58Yajh}Gd(5hJ@CxS@vab*W1rxL|Xa@3Z;ustYjS){32TTpb!jp%q2x1y5@{A3neD zcqTM9@Qvr@aKimhbJGcjGj;4xli~=ND$iT?WMMx*m z>+reyzUNuBp`EIVIKD1vd<<|De816%5W(8k0bU_U7y{XF?fapfFRo|0cOgBu=zd9< zoOqsV=Km&97iHxM_qY>|-&Pz8?;ZjCA3Lu7@pT{eS1QXAiSM3!{<)|0|KgXv^d*3B z^9MNR%(L{Mrlzlld8p@c+?UQ_>`@1xH?`qqG=E!JMbuKXcKAHKb|T;U%sE6YftCR? zSAmb9A|B((R~K;0Ef2%SR&$Gl5Y0oHHzl(@M+3Vz|DBFlJYGrzTp#jzw)bWbQW%kx zpc*W4r8OEUBzZqWGP{FRJ{fHGiZwlbrm~O*RsMmr#QLH7OB)r?nL^~ff$FEi%oT}5 z5Sgr@bUIFuXoSt!p#5l$n{U4PdVtHm^yM>!GROpkC8o>J$C?YZi!YJ%~&WEQ#*xg{?afIv|8e zC@7zNPcL-#0chK{S+R8avtPgBtJ#0{8a(Zk(@jV6*=IT9j5Dsd`1}ih*4x*+dHPdN z&)u|X^T5o`5>S?amS&odoy0L;JdM+jpG0fAk45br%-h<{#$*a#xn#Xgw)d{0y>BxG zFC7XU>EeGyfdCO0T?z4z+gR^}7x0yfuY%1n=uH^oMW4Qc%K=T*Jaz6=P8&ap|9t*c zel}+jt`AYmC~jyCzVK1nn6sJlRDm=%0qEHdu?~h#=z!KlEWz)ddV}W|t)`};3{|Yw z|IwqUF%SU%C=|l?7AEsyQr~|{VT_6Lo(IVc1O{K--QBO>ci(;Yo_gx3AFJ3YcW)oN zK2ADuN?G&JVb{Fy%yW+cFOMHT_D^%?zBb~v+l=1Mr_VkoOgFE(`fA>ozwmWCP-dee z$%w{E9)0BJocXo$(8)d)t%);tLzKJbjpDkCFJ(kS0@wA;1Ta{0HSq{@S8U*0H{Fk3 zu|B}TC>?d|RCPtwfp5MxzhmOW19sn>osL0629^HD_rX^b3SJ=PU(x{%Bqa%(fkGmr zjkL@Ls5GqV>@f~#B50@nw_ZTIf;DS{M`-UcK*Ayrp;)X)Q~hYmhILyIxeQo#>9u^{ ze3Ys*_pj5ZkD4)K#w{9cI;mw*4%)kge8DsGVl7b0!xoB|V{^@Cj%Tltg98&H4+=hI zu_#|V?J#b<=p?Eu;;2A8M+<=#fps>DM6{Nuoj_^t?^Df+04<@&d3nYT8p2iQoB`=9 z2*Ee*eTc_jpF_fqQXZ>BYr(BAyv`SId4g5z+GuF3=f5tV#@L#2T-P(_iH(KC^EE%7 zyLce}vd9tF1|K2PdGwYpBMD&Ju%;DSccA;yfzQ3B;JLWlyG=z0qPn`e=gf1?+VZbh zgHQeSNv`S6}_zj;@YxwYIemtoX}fu*V2SoH3cRzV}&vbIUil{Wo9X zci;aUQz!1txVj-s9Ma5?iYO~PliayvHP5cy3d$!+ifyU&w58XQbCcM@F}@AK^jd4f zgBMEu(`2lRxkS!Q;VUng-CF@gQ-__dbipHT+1zm4!TkKBLwS73S}uM1Rl40AiAcm~ zn*?g6fx5owbOvVA!c4P_<6n_2fKM!HG5yVVd2H4@RKy)n%2+yU#YaK<4`{vg$9Vak zdESa^?C%f>1V&}h*9zCoBlQp@FI&p$HEXn1QoQxboBZ(N)4217uW|g$ zd0c(_P#Zixv**t=le*bS|+O*J{! z#r6HbD%nB?=cu&877;4r4MuiW$oGx2D(GNqtx4sxd~4cN=C4`HpZ_+Sj=pZryXn{5 zb?_`&8X9d2w$Ns!yFKuz37dt&{T_#N0Hhho$7-fT|sgI9UUEW9(?e@8UM_+*D`bj8@Fs= z+O%muyY;qPzpJ!{zEpoiqG0%74mS!Qe|oHTT9%jrMkS4h!w~8RY2z}b_Y~RoBto2 zt7&{Pg<^-S)PX5F16sH!Y2hj#0h}^^IK!$dx#X!COu6qR9zSOaqpK673hsNVP1TR1 zFSQ?xFwFXnMQxUE+RktOJQL6Jacm2PGBVKrj0Q*e{3=7)mcsliFl;gFy-7gv-RJXp z$Q97Nsp1{hM;>`(*Q1X<`mu|hyAy!-IZi+GjP_SvdfDsh?6QOHBa%!e^&^ixy1yl* z9yM|#Eh9$!=H*vjx&5VCGq)srdVU9d6*SvdY-aVQcJ>@Ti1Q{N#Qvk2nZ0-|rya2m zJ*fghDx|hh0&K1DJdYpV`y_3zyamZru`m;7o_Wq26Zbx_=SSCH%a49|&F-7BtBpvj zfln#W7_$s!T^Ac&MN+6h<745JXiHKcw4^haqrER<1b|e3x|x1&RaFE_$)Ke#Wze3L z#`bq}dtfChcPcpiP_#}5FfhG&I}B}riVB4G(XL;tS`onV<;w?}Rz#vOcn~RDvN@SX zNT`lD_(Bu0BW5nFG$JDT?x&8#wrvWYB9qIKalNofp|OlsLD1?KN>EkNjBUq^bD6;T3{W#>o8?uB#Y0L1*wIZh#w_o~s`qCL*T>K7R#Nmb47Z}Zhh+|azeE82#9mU~$ z4W~Dk#gYLNLknz6)0)n6@7wEe9feSq;rVML(HhJ-5beF_?lju501MJ7bIm%sVS5)k z9!J;Ilj})Aj}i8gQnLTP`=uAXz4)KD?tb};pO*dbnje)98PvS(*=L_El1&95B4sg} z4;;^F=TGId6AxreeGQ;-J&9vg61S^}Maq!M0FZs7@DEy3T{euEU43k0bFB8negSCs%BEgcls%Xn@+%EH4a`@l|o;r65m;UutKK=L$+{(w+!Sh0v ziwIOOwGMa(f^aRx9gEhEZoYHJ^CUAaWf42@Kd{l-MQAGk-hNn*4n3f~A(T1i0g9Y? zFYLYr>O0 z)z;LVkm~DgdC&AnYr49-^}6-z4+E~Sr2G%tb`J48R|6vJyXCs%Ibv6UNnX zKhWJ5!l;&Zr`qs!0U@mLK4>is&@j-BC?f9#hQX0jK7+~MeA zRXGLi1pwQDe0?8@jZf6EXiuj3_TA62VOuAONW=(2YZ0s!i=tq)?uWfGJbkfKvMov- zqab0|MY&+5KzRsda3^6WAeTebS3`BB`G2K|YE9fPN&zc6`+8BE+o3ZFphpZJE_;&6 zYj%oa8jYRLoOSLi3l=Z<3P?+!VQ{Uf`T|MOQs>#lbKTOCE4b8-7{=72 z4?-&+G+9UG4&|Ea>$;XHEuYkj2+G~!yDPJp^~~poXve1W^HcgPb)U^=eO7M^u}#0@9e=s zP!WwXI1wXaTY;;Y!1s07>aQtpCML=ZCL$D2E(9?E03ZNKL_t(63eq6ik9H;vB~27{ z+6_-Hpam+*Vo|0Yus;*Wj-ot~K-M;vfF3ri*}C`cd%t?| z7e3G8g&%E2Kku!1#S6p`qSAO$64&Qeaj#l_8 zN^RLNs^Wu)I&nj*)GFA#jHZDovO1g4k&{~=EJTM0M-AwL>sAJN(z@k8S8I!(N)DTh(tDn9$W`i zRp7Y@1u<l6Pi*9AoG15y1N#2TwYLJN|h4=Fy`^ zvUcry(>-$)L(ZDQ5KB^Ckj#GZ6;xX{GT^#~HIaq|Z!MuGo1r}7&|jj$!_1~FA&E-K zS8jQjuDMGgTR;Kvcp0aha`M{89(&BQV^O?Ze)r9IpJQ|TwtkhUWN2*#W$`GkS3pP+ zXxy7trI|G=g!D^xsX`*8Vp&Hwu5T(Dd;!BJ62@y9#w`bcZ+2jBZXKe_fNXsv54DYoUaIVXJFBQ_1kPU06=U%=6O zj3%AWP$;-ml{Hfx8)WblG7wYJJ8Ag$qu&ik5`*N?1El3p8y`Z2Q%!qj3xmp&{NT`i zSvhVb-OE`VuM z<-9b#x%NQg|GnJ$orTpzal9r1t8FE5?E+=d2)9i;f(xIX!Re2_zzd(7#-Q?YvThbz zL{L(LcF;l*vEZi1W;1u?X5zL(iRxGS8y}|WFIB*>5;Ev&h(K*y4HyR)Orb`&F1jyQ zEbb^tN)zCF5zo zR}T;0^)trQj_2*IYk2APMLak6HP)?LPd=5w_dSM>7|OY)A4gOOG%gaSSWsbW)0(YH z#JK+P7kKNLSD~vrZ2dRXH$3&&V~>5~)KgFW*r7`QCy#G`_dERJ#-HP6bA&)U$ELQX zg7RpbZa>|x-EAs)jRt82bRrRo%6S@A?MQ~6@>=MD0qE~Js)=9|!$ZxYL{b6J8-I$NDV##BAb$no7M^;g-H-_NP9hO>)n8-vgSG~ z2~uNg@F@T`TDp|mQC@4^&O?jW8k~R%IxtFva%O-SD%Ya`|PK?-hwgW-5&n4wCCDIOzPT{PL@3 z(^6MWGTno1C#WxLArY&_S3VX3tz_6{|G-kd+VK2^4_bOeoH#?P#?hVIK{DOS=&Be` zo_PZIy}gF7z3>K~7(0~D?K6(3ou?zUmb6n#b-W4Njt5n`LaAWfP)v+vKsybF*+N_R z_#`u}sG@#`*v058&?G2!(vT{|*a&Utq$o*VdBh_Y51e{5pPT+FUw-a2?mqPh%B%#Q zUqA{ATMBGja@$|u;)%J-NJJwTWJ*xsf8breG!n3MQMgAKu%RL}y9xtwSgk2D_s`}H z_D1QF$y7gKCEr(Md=Ig$D?Fu9qeiiA-MWu$3>CY#k@r7-cEgQ)?+4#yk3IKZ`R?`WAu3>p%>UhU{;9s+AA(mqTaoz^bLX3e}T@sxri3`=clA$+sr&&E@-#C-3_~%f2X1 zGSFR3i2(ek1u7V`3d^jwgdH)brxaUz(=6}k<<-sGSiPf<&Dji%@i>zP*KzpJIwlOR zr!gME^?V9SA*={dr<^jYl9*kFv?GBUoga2KO08FojYVGP+1|T~f|tP(kzh0F@4_Zf zQV>DmY0YPzoW-)%o`Cls%$AGV?v@R0J zz=;!QEnKi*@<*QeI~GTucw+punRAwAGU-vGXbUrP2xoukRIa*U8VScDol6sUs;IAM zAz~X5B^k{64AruzwD-aPwpM=N4?!>{5LgIuewt)v2bp{q>2)5xXpGgA0tRV5m?TY>Zk+Quz+L)2-ns;=TA69pGMe(!SVf z?k<`Y}&=YJqrWKweUnmG75g6IT)Txt5N}IVG+L*a% zJ2N)zVCMQ(o?o|xdD}X0wWcl>p+4>yMOn*Y@%AJSELk0Dl_PdCoDuJX0SI^RV5i^F z+fPlb$d}(a?rYfE4+Bt~!RB({*f4Pq*mn%yKH&haIA9!E*HmxCKU3^37}Z-D=o%2T zm>8?uW)^Zuc0#PFsinaV}}o7>K;RwHmaGyi3F>X=DpCzl7MdCGN3W$x}LC3}f?y!yClY*_=L#ki#T&#Q{+?FaTDn8lS*}3DR ztgqoCT0~b@H=Eb5Tc6JtT8gQk*lQ%0{pV-+&N(Mw2~FN}i8~cERgK1xk-!x%K;Z{U zkg`Yx{SZ8TlSr0~j%;lFNGAMtGny8haP_D z-Q8FFgCC0*FR05E+#teA28|fT0b@rpv?9h{H7)pB(Vfk(E$gzTE5*|7T|B(xO?o}W zr^XHCO9$=A-gVWyzI7WEJVY#JBumxb+2nWGb_`~W8beL9q^U6aa!?%)#|$BLNyvax zy>mM*Kx^+a8b%Cf>Oo`p;sN97%jeOSC^`%W06Kw^M%EW;s$rolq)=fX6v9Vn%Tz`} z8&DXam4#Lw+JcC-X-?R*>`}()dk!JvDi*hO@$}kOzW&_nl*QtlGQOEJ#tvaOE$0BN~b?KRQzt91KT%&_?-PoJsv85aF z9S=)c_`)DHML_#P`Pgkq`nmiDE{Z{SCX*?uChC%KD>`6wGidN2B9Tb?qpq(_8#e0U zBUxRf%81wONl$tkJ=s(s|rReMNJIwv_&%2itFWrBtfIaE>^!NuGUiZFM?;KlpsjZ7DBitEz<%| zYlc@O`0?Zk{Kw00a%@Wza~7}T{+AbE*&?KSY9a{b8@-GVGXl`MlpO~j0msk8y|73cFp z^&?G-_XfdYbs_))l(j9Pz02@~SFATGb(Q6W5~IT41%xjR3t(q}=g>yjdlb$4jpU{& zhZBp4(!8~3fPySZm{PJR4TEu5C>1NuehO@|UlI~n7Av6OyTqJ&$|BXYRLA(l$iaMi z{}Jp_Rl$<&Jv_dABMaM;6g-bI$Dzz|aHJsXrATLcNV(l8<$=s&%Q>WZ=pTOf``! zIx&dKcpa*!Y^MhT{d6dt_aUl(A&^D;-k?1%11a31rLPtS=^u|)k%*L2@bY-R%jx5X z5syUq){J@hzGA|ldK_uv>OAQ}CwVuEWk+$OjT9C_N|Kp2`tt1vDT7Xm2yJ{z#u#EC z7%x->)S**hXlWftIf~*M5E57U?AuraQu4Ex<}rKDa$Hv%5v1ZsLTh6N6xw+2x&sgz zatZp`^@?C+7^lFflvLO@LTL(suQi?yQbeu5EtvP$(*>K`p)!sbJ{a9tZMp+m5>Y;J zPt()UjsNZ%!xj*N9XmR&S-5cFlON~!xmybOLma1`F>SVGJDW8KJf9g)&t%EE4Me14 z3P$DQsY1vw*Md;+rIwW~+Wl><55Y1jdfQ8eGR` z58H>9s(61(fMA}g!(<}#br1e6Qm{;Wmf&9%Y{P*BvNlz?5kWEmRBMH$Eo#e}s7o|c zoftzjI-ELZ2$M&S;)Y`;am&<$Iep9!dU6GxTCVe;{X54xr%AAM|i@+Y2n{E^Q;|NIfA(JZ05oTEN- zJiof^lemQfuB$+M#GE+Q@uq-U8OZbYV=oZi5794q`R@PjG~wEaDjX-V*sYxTZ4X|7%OY_N4iqr-Em?NP$&Y!Xoc_ z6gs*P={yK1OC*?l?9q{rdko#30DQpXh@%eYkp~}NGHm$Ju4079tlGrg&pt!M7J(dw zk0|P^YZ*4jgfI?NRf#w=maXQ&Kfi3M#2}O(cG%(8nsv)xZ64CX-FM%!`(l5<+_;O=E{~&>q7}Am1Qpmdxxd<2a@~dR-SA$@h=ipHs&V#V-`XnSB_CK1i_^ zf&u$s0izL67FeJ?9~Q2HY}N<^iJ;Z#`=Q}am_H03jHoMT)ZQ(eJ8l?xfuM>O!6s!PG*p!h!4fgF_OXQ|>Xeg645BhIg7U;j z8Y+i#;E-m{-eWkI>^G9rMh~GT?(jzI4xU@Rjg=i4q%>#*bI}9C7pcP!q;ZCi2!ZSS z{AkYGc)mtR8M?KZQHD|ci?ye4@}>=}!ob~6lu7xJ3KIZz!U-o{`|i8%UY{@I)`1XZ z73J-p`RwPGe3&&gbM_29<;1CPfLu0n)~xABh6Il@qmP@!bze9QjW$Z%TA-975~;?r zqM$TJf3hS25sD>+z_@<`?pjl-wu|j{0pKCVP~hb$kqSw*Tp2W`aQpDyazNj(KrzZ#jE^K;@bclrRST!TgXFO zchJZ)NkI|cTO7lrQ)zTZ7rNjAl3XUUV#eQQ+^{5V>wwSROtDwWGF%L+q|IsF(G^mk!&%HVH;l#~hF{9G$6ia=X53TvQJNe&o> zr9wE*tW29ytyqi6hb{typ?k!tRb=%R(8k>p;DTJDGgC4;3NW`1J8yvZoVt>pwmeDF zedK)3UNV!0iP8`(i=imR%OL)c^XGJf4>7}#II`i!9VG!C|e)02D1#?u~Ncuc|Pr4Qi@~*#mC36P~ zj?ZsgRjUG_SlQ3siLDqVhz(lkrv4gP)neKEhjFsAEmpY37*D?oP&ROibqW%x(6B;Y z0{-EwmHhRoNAZdqZs+!`d+CTmM^8jyYy%^S?@l=Sp1bdK)?spqs&*%zwoPYC(otBd ziV4;Th9I+UwpK7Uq@zu7^SvAR=1=a!sKk%#RZ9wSh?|h!*Qu>E#ue_r?cH+&f2jyrxey}{3L zefUFH0I+=d3s$9raG5v2E6!d)E(o(ZY*zJJJQdTTBykqcJD=0Zb}={ z$}>N#pHkGdMP6kv$XW?@cocbJ2<^zt*m@nbX?6`}_QT8>oOJBrT(V>?rFz5RnZzK0 z3no@fCQqDp!JD5^Fxuko1HGPpWm-lSO$$|HH0>hX_2e-B@#qF5=e7K^ zmah{BQuTzM{S|)=IEclq2YZ#O*%+n2uLpp`4?kQsY}jyI7)G3R);T)?zV_9xOu0Ps z=g$Y=r7wMHf0WCgJU%|&_}R~H+;i7&f3q;riEZuX&=J9`K3@E`%Q*k|rPLEcDAuz? zESL~W%w%;hdnYzhPilU2?t;GYwL;TY`47Rowpq(P8#9plTpDyB6f1j(wHrrjv5Zw4 zylur|zH`}`eB!r{@coV3K;e7?tnxYqDjPEyYp@b|BQ2Wqb){RNmg!lS&cafdWCGsv z!V(ZEOIxV8;f}R@{<^#T@Jal=<&%eJyD!qL@Ua%9g#NYy1@GDyco3lx&&W!zZIU<~ zfN{PZ+4Azg*=?qTxLQZ=ABC|}w*T*b-}|n3KAfe~3Ba>hH{5W;`Psc>G~d1UXKdQH zm0XZ{m-?w|Dg-A?lq-DaraOr@J(=CQGiJ=V<^TT2zyIS~-u8~^O+AG5xzAtC%{Tpc z-s;tBvU_;RX)8JR=w+1a4Y&KoA4*pI+}(W{ufm8GazV&lL;Hvu+H;~?B4idZpUD~2 z5@oGIa*?|S0-peQK&aic9T^&hNF4Rk13(Ev?1Dj<)6d@>{{oDOUF$TZRJFG6eKm>y z@3ak?9^6yA0_op5nb}rj9cOeD(BHj~Le$x;uElua9fJ^hvlizs#vH(XMdE~!-=z|}ea!9{m`QZTU+_{ql3l@Cijyvx7z7pUC}Cf45-f%L?+ z);csW9|;AUgx-rmykeuJty-tE z*q{+QS4C-UHK)k;^a4*5)8?@n92{KIdTIX8|M~KJUwF=W@jKu7F24HJF9Y!ShD{uM z!ZDv*w`T315A7aWrW4(AbuILEa^_`caLFZSbM)c!>FH{tfuNM7FRz$Yn8jpVW7UqG z-1+1l&Ym}mqh|I{i4$ULPy}e(V5Gc%@Ux%R0$G|juf)9sUhL!wq*Q&l)@$z?ARExXEfXN z6)RSpvTJA;-~9SFrxSobwsrN@S9AGmUd{F2yYBcvskPb|OSvXLyy0fv@RHN%$%VuM z$|i^?jIrc_Z~gFA*t$Ixa}hD-M>}`yxMq4spWRx&e*NsUIP5-gIj=l-CF9ka*YJ1R z>!~PCR?~ZFRlFkLXr<1&-TRS1O*tr^(y4vA;4fLGk(DG41f?7U0K8prIugPiHutaf zR<>zRdKL@}@TV&e$Ix(B`XP+~03ZNKL_t)p5!zYU8pKs-siwP9h!L!^9O#JZ-bNZw z{Co3y`sqQMN}u+1%%Z0-h|$J@@KS)Fa`8LPWdjcJZojDKH}LF+-Z#g0v6f=D-f z{|DOu{_g(I1PJTfF)c0c;iY9O!~MNO;(v--L4 zbr`}4X|l=8#g|&o7=YR;<6(bvY@?# zns&MiR%z-tbW`DGSUU)7Z$kuK+#f- zK3xme1I>KpYOI@a8!W>U+o&hCOs!6NWH07L-s}Fq4=3?JK$dXJ6pou6i>o<_<79S)o{NkR;9`IUn^ftLG^C+vmHM zvM72A3s^CG1@Ag>B`41xQDDfc2xSE$meKMKc8;&7o|HWxusJWc zKC!X((1ZV!7%31)j&gmR(ee;MIyymloQQM2vy%Rvn1(Ubwc$ILp3Nh}`}wccTWF7b zhsh^wmqT_FRr2^#}L^JY`tdTr(;6 zzdcXB(00IF;9x(jusVS_cKDo;2`En0h>}=?PiAeRk%=N~+nxROF~=P9$g5uUD*Jp0 z{?i?R=diB5_WEs$7BBvGE}#2&qtT$Tcbpq<`VE(zcATHDDkM~Blklbgy~80*W7l$Q z@9MUjHa-4%fRBIt_vgt!22lg<4}0r2>zuXbxKp-gyo~M?T={dpB_3j(w0%@z_c8A}OIz zP3RwQpab{5ZA;bJZ2J3>GY}Y^$hLFAy!rpVWy@y%?t#znuP1%a)*7b`A0jlX%*OF8@4WwZst=wTY8-m2%wa=1hO{f%~f6+<2_ZJUR$O&&+ zc^JdBx@Qz)a^|ZF#ot9^;>`yOYPZ57X1$=0{`JCp^zS z$$6@Iu@JXMZ+@_8&Ez7V zhocUIBbUHYO9+o$M(?t@gabW1K0L{Pt$Bi`+9o3aLtD_vto~(0k_Ryuv4|*CN=-b-=a-b*B~4EYD==EzPB|V%N$5qd zYzBB0T$kM%Cz_%jTH)xUkKViLo_k&v$8mqA=iFX^Tn-CnrAaoaG$d&N(^<wD@j_=5^1_9KeCUoxnN?_G}c(HIpujg*#q%=&+qr%8frMzL-Fe(RrcYZR6C5Yyg9 zWFb<5@}!crKgh@ zMO|X2d!Gq-+e}Fxu$8viJxJIBw+((gr4>RW_B&bD1|j?x5GGN8qp5B5E^U(D2qmD zk2=YBABC!H=b~i+XD%M#pYC4A%YOK4t~ljL&Y3reQ3himF)_oXO;j2q^mfgsO|@f5 zaM}zu>v*IWqzUXi;P&%^QZ_J*6^E$R$Gsqs%I*gdakjtynrKN79JNn*)`vA3qXTAj z6u9P+GkD`qe#4xec8=`pp{k7&c1ke|EzeT`Xd8OsfTAPHv1|l0?)4UPoJxd*khs65mD-DqdoRuQ>~HTBPY;k)Un1A1R;9!&g@qNVJJzGxJ_>) zF3GOckln-Bu?d$v1&YL)HSc-Pdx{_V$Vd3>XFvPAI9I1J0MBu4dVIrqD)0j9+VF$_ zy_Jna`{?Uv=g}=YSiOFWbA9vA?TIIzcpJdg|M`vPKXGjY=zIsOHlaK_Pm<+8K++PNpNu)Cd!dO`xsXlv)VIla8@=%sw_+!Oepm!HkQy!aGO znmfSG@e0>(+{$$uc5%=4eQYmHG9JemYl&2VQj*Ez7lgvgPF;ZvEFpZNoD1g@PAit;o%+oK|(iE z_Plea5(sT|=&sbgK7y;YvwGWt4SWI@_$);UdUOnlV>eA19C-Y~mtHgsaPEuFZ5QFr z@v;5$alZjNa|9fdd^0-l`x&ncdG7?T8zCtj)OE#_YIbunz@6{p z2oYLYij4+K`U-sJg(vXYyB=k@S|d=N9xJ}XqimL>BtFTGa9sNvezTU3TyrbcMuS2w zKwH&h-CzhZKFHHg(GJLPm~tzp9Vj3%hGKVH*0s|f-7lFz(bQ3i2pFTO)vFMO=;2Y= zKMG*OFqHGpKmP~aUER{!!DIIbcK0yUot8qFi$>n}u6O?wc-{p6=@GzlTp#}Mhk5af zU(DHOo%7=DPi|iXVD?W?T{w$BJL^Qg{_|gR*DvqIZr=@HyE?mM!^RCKU3~GywauG1 zPjBEeTqm7$k_-(EfpAx;RCMRoteJfLlW*my`7^0E8m=|n;!KuVg-Qy76O>qTp<++D z&PVQi0Hd01e@DBs&wLEfIy`^M;fk~Q-8%t=HaO)d3P&&D11~w551zJ?<$YaD>IR9? z1fsmNogp?*OBys1O=2whK(V-|onvP8a`Zqi^E=xKLSdpFGgPcGTxl>?tr03kqypN* z2<@=|BEHcp(2?t>yD&f?3Vaoxngdz!3V~Vp_047R?R@Vs5U7w!JjuR^&0g|avJpdb zPuyHs8$)j)$1k?+?0j<9{l=J6v#T?!pYGFFa^*Y!guj3J*>rd0sa6|apTi|9#%OY3 zfr0MDbQT8P$Vh3=p?CL?%5)T(;!5I0bDU96Dj{LXMFrZUe(F}3-vJjcn?pIaeEGf& zY#N>5#JMx+&j-}BOR#G3B$dWEiAl%>1ym5CtU`M!W#^tqQ*PQy<}WZ(-o-?D4-$B@ zDDSrDfS`W-W90y@eY2y`91kfJ(19RRv8a0^mKtSMAnkG zmdHAFO|eZZN}AWBgt77@Nh5am;$xdr4+-h&>iPGzYuCI!muvfnMx*XJhl}SrHo*FA zPA>rL$`wbA|IfAGd(UfM`&!nlS@XO(TcyM_C< z?BJmdThV*QvYd9w(j|Ai_dV}PZoc{E>CHQY^}quU*waosZRhUYL!jJFLoWQ?nXDaRKXoHZ=~09cbmrjL z!&rFAa{lMfU&Nb_Swe>qYFZOmoD{2=Or|tFoQ<^@ZAi4H9&7521QA1bAz(>&7sn6u zbJqMB968v-oUSf*7i&B|T4K%qF-nQX29|v2(|e;R)<@Vix|Th~tu&HRLJ2^H80CRo z;M(t^FeKm=0aF=xD~g&avuEsatVuk=UuEVi$_ioxtsL6CGZ*sYM49*f;!#HZXc)BXZx0x*#DlszR0D$?nHjX&*1swoks7AC-j?IGq;@QkT|0KTk zu{ZK(XRRPnLZhB|=7H0qGuF@+^)jdD1r(xwtky2*nikImnjG}j|Ivz>Xz^&U7y=d0 zSC~Uj`%(&Ffj?V5k8fUlDtjiXTz2g(+_iIz!F(G53L}cdXvXTh*g3YI;nEHo)CeW= zltPo~E?|W)2rv?}e{wsMl|2yJZ2zp0Oa#js$?{p33)_~C)l`utunuz}A$8s0b;m4W zs8r*I4Lj(|w`FEPiX2wC0Nc?PQLfhc;5EPE=KD6H0zsuCh~GIkJ9sWVwfI*pl9dW& zAVg8C*BGB1!{qW$+v?9Sxqb|yM5xCxwQ|LoPVE~-jZOmCd_GSu7yb&|XvSr}9zQfX z29qT}4O8;a!;dZixc1s>pI2w=GzQ=~uD8GK?R@iF-zcp-W(AL}UV{OuYqxRLcYn&J zEkiKkWq(D<>eZ{SS-pC7aeCJdaSrGzt(gwlZei(M{^4zxVPhxglWH$1QN9H#erD(o z@Dwno6eEp<8=u(a4k{&HYzHR}WYnR&DQs#Uq)kRGcXM)Y3p}Tvi_SffFJ5{wZIY)P z$4KZANg}So@!WQ8%>k)-vpZqD3ZM9(l^*s5rD$uj%x>?aW)doK%y6y2&e1wy7%|wD zqdg31lMrJQN|ilSYWoRQfv)y`I--6;l_w?j8QVZf=mUe7PF4}x)Y&(&8Bs~56K_)c zWB;8>34w)36cufF&o3XPRGWk_?+^1Jv#v!6QEV72CK%;;;7^x_D=2Kr|X4iS7yTA+~cWnR$3Nbw1zeS~kn;!M8&z!SXjr@!G%$1UZZ zCoZQTikcWg9br|2vC2+L_5E~4y>zzCA|Do9f{AOxmm8yuPVOWz9=vKK3+_s}u}-Gp z4;X8_-arZuI8gP^z3b3A)jUOxNLfC0_DWv;%4P;BQz{;hfVMy$#j4#SY~MQpxuDr9Y^^vBr3K)7<*8zxYq>h@ z_k4Sfzx>k|@!qqJ!T^;xaY4lcvaH}mOT^D&r71^D3pXE!-zKZ%OlG{2zT>KKE&0wU zPfxCmq^pBsJ!XHo%5Gan&~%0lsMV2Epel@%N{ll^KI*1D*GpT}Nf_ikiBB@+L~S)A zrR~&{idVBs+srPIsMLtX8kB?}hOgeYkq3tMB2k+M5e7KgpUO1!XHGaR_7vIwv?12C z=*|n6z57x?Exmm`^>fcY=juwSx-{*>t3`9T{I6clM_>P9I--D5&CPJF62vy8d%N<3 z%;;X|QXgfUxRQ~UaAaDVq=yC$QKW>77!?Y$dJku;+Q~$1hceU5`zkmoJ;VtF_g5vhR?~pv`3}UpxUTA zbcvC~Apo((7kxzLS- z+{`;bjHPa>6zgM@YNOP3g-knFjQeC(dw7M)^!G)Y41!c?&$fOU$*7?z7}JWzC_m~@ z!bq*kE00{n(w=U<@$hE)+uNx$V*cd^_wavie27|-&>l)kutedSV9zf6PfY~Ue<~%E z%4J3-CoxG4)@*^;U~|z^)i+x@FzE;Ygi@vKIQ*H5`6o9Q;w#+9DDTggi2T4#WXAfjRFd-t1x4q@9 z(;Iha>un$xS)jeQlMj91^~~<=h5*`vfVMECGs@AK&(V>~kyDC54A{s8DdQa30$@+6 z%!51jW>PiyL(rPk-R)^Ke_PGYTNVAXz}?bCND{ts!D+nu=tU$t$)s^(bQaL8I2%@M zit`HFb3lt(oOHfxcZOu@#7XY0BmaU9bgbuiE|n}t1tESu58v4dUA z?u;0(mU(FRem3qav%lQHs)V|pWTdo}p^-HVPi$eVyo>SjkQ;Sa>+F=VPDa(Y{zVzI zh0aK^tvJDlZhz46>J=>snwM@PAWWdW7JHty92B{I;Qng`5-1oh!ek{&7am)`E;l|l z)&*FU;&WenH*dZ46s(P%F_HiI01qz2GSI!4p28d;aU%(olUhcTI_x!(_s=4Lxu+ki zbjH88xXw>|u7|$1SyVOTBgMzgTFKQHoy0dE+{BxHyoz#c$SG+8E0r_VQOZYHk<4n? zT8mEiucdROd=+e4lF5uC<0&uJreZ$M6iSRm5uniC!P3p)i*dr=p7a7%4UKZ+V^8qj zZ~TIrAKr{8ji|sYZfciDIQ`S#Z|?KE`)O`&?G{jY-~Ztd;L4AF41l(%y`}5q6ej!n`k6Iz@YfID zcfWbQ9bh_rCY>#V>x5Bac|Ve*MOc7OdF5Zs_kojCH`BN;UJ&Sg>f3+PHBY z-}?5yPjB8cssw^mgk@fe8h`xGa4`3)F+hCTD`8{N&dvKL3*Ac*W847%SJB z4sgCwH>t+G2PZj6_2&FiEY0_kv9)|v=jnFFrk(<>^Pr4!ZFp-Ps@fP2O4Rgp%w?c^ zDayJeAu*bUuF%&QWqxOsnk_RlSz%AD&XeUb1MLO+^8tmNVzM^m+WIQzk5r9#mA-Ul zubdk$Q2^r=!<&A3H|1&qxs;2pJ+Iwi9gMQ%D+yuZ-mCI^k~$tXKX}vK(26BA0Sy7R zY;VcDpjvT4KwVw!^3`iT#`!Njk+I>T3r5N~kfpUGVhL@;K<6Sl^E0#el{)pgF;42* zcL2bTr|057?M;Dz4PD?(brB@RN+`r6XbC9CF_#`bkE34K&0BA}o7aB-PQG-}DJ<)6 zCy5ot8r-Ka**)Yo-ThMuB-R@ywV>@&4Gimzq+Ej_ZI3tE7?RQreFwmSG)%YUHP;uv_(cFVZhE|t9@jG1>jY)M z`ARn&y(v&ipMJ_It2b_3H@$JsxRt5_^%*c90qo0P{bIS|@BfU_c##z|yAb*)C3WhF zW}=?3r(9>-#3c9Zs4_HBrY#CNW>z2PESSlX{%({Ne!6)lHi;n$pQirc>5~9C_(5;6 zu9a+J{$j-o_>&_RGf`?}%mVR;TJ~G4J-}$NHMlfg^bWK;ZC3f|L78F#6viekVrdSE z-r3eqfA<1N)%65IC4{P*j$9{+Nl0{s?tGDIGET8xVzg4FoCs}^akzsZ#8~6H5GZFu zV4HL}BTike8f)Hr`-AKlsUf+bX}Xlk#(H^Vsm6p2jSe769A!(;xPFKOrWuR}a*{C( zOa$!M14B*U_9#;H4fHT)?jRrf^jkUY%#}=zlu!z^ae>L8-RH1|e4&f3j@eifdtoTm z(!w#nQwdTIMZrb{G2S3b9H(FTjzWk~tc_umCG@{?vf5yNPl0Ry^c=3d?Gave!ySC` zykmLA5esM-XC~%s98`9Hq(RnVGyR7t*2}&tkk0zkgi&N_GLvazT2R)h{`u%fdoE&l zvdndNuIJu|H(|RASX(DZ1oJy<_}`x%S?duNso_p~HMC)*I6re@yC@PH#<#HLxwP81JgK`zX_H_5ko+pRqFI#pvPdu@yS@fH! zS&LGtbioA|m6|&z001BWNklldj@}V z^5G;#J7oI-2VzFKno>QCQZJnx~_OiNe45G6cy+TM()NO-uEyk9L1e>?AXz3h|Kjlb{ zICdF}7R+M);@J$&>ZhIyxc%{+v`50>{hjpZ+o>f94Q)ZW;8w4Xvv+a>{T+)5RSs(# zKKut{zRG{7Hb+MpIEbmt=e`QnrK*ZVf|{+~ajag!hn3Ny>>(kaOKcidzqYY^L-0r#UjO0iA1|(HU-KuR&4q{bhRU4t|<&; zyuxRC=4J`8X5aX@>w1(bux*GYQdhom;iWH&fAr()ro64doeSBAI{x_M;~Q_h@kghf zb{hBGbI)`FFuk6-?!R}{oLa3G0@z%H^mJxQSy&4?Ne_Pu@Sb!F_sjyF z-<;Y9hQV0_@`*3JiztdPae@gHfpH~`CGf3nP$q>nY5LmooH{SZSqlc)GG64fcRk8? zAN!5#_{!7T-aNZ^n`k5q`Sc4{GFXTx$JXiCDRt0q7bPuVzx2GeEw-*{HRr)x*7N91 z3N&VB!jk7K}hW_G9+uxWj!pXG4uc>gxomwV0|l z^mi9H>!<~sb;MkboBdjrykG%g6k>IPv4V~hj6mKRPMy=oqkG5r?qfUYiXvXJY$kJi za!&8X3W+2XDq|x8l z1SNT5tTTykw>&_l(clwjtz4A(QZUoSBeiVx(8r7Oh_P6bTS^`)*XU-fs z?d&sG|M2?j;sf8??Afzd1IM_xDe}Mr5A*}i>)=0~06fQ4snmk31=ZJ$Rmwf6;OKvr zDYTgB;Q#yA`LBNwxBd689<*X+Mq$W1-gP-guUJgAUib4;gBCY;4@@e)<8;=QRZeeS zG?eS00~>h6*`kF&N%T1Rt1zR zyO}8O!v+CiDnOIPYwJ1YP83Mc^yNaXUB8ph-SLQ<(_$U>Dpkfy4TMn8NRY(2_$63u zVh|OAHfYfp6oGc1Yi4%`D~?~p87mfW{9$vM)6<1EP_vqPwNBhf#orAC;^7&BR&dh1 zK8~9^gH^kR`PxHI(3i_`!Lr#b=#cg^RNJNAc22?exQ z@3RPXU1PGig;IUgq2+B_ZKv8k3PbEbcvi75uJf9s79kSw!CM|=vfkj+=bhjTl5FfD zjR}GBdJ{|?0azzF(o77@R8~MX22f2c04vb06vM?jpZoa(-1^8Sx^j5}5v+=^HbD>) z5fq7Y&dx?A&-_`MI(~qOVv(`QN!P}29kW>Lp3{lROh(-*pe+wkkWJ(y?E<83mH zh9@Q+aJ5*5q5aw8TCZ2X@x$xC|Lsd&{xWX*@lOsM^Q5s*F2DTpTduqAx<88Zb~*ug zmg}P*`S8r|U3dLUo_J!5JB)kVy?BL5hf0Y3gM^wtn)N5IxV-(5yB_?3C^^9zYtO&v zRQZc{TtXZ>vlNX3Z#i(Ev!)gAO>dR;b3F09c_&+H#qzDy8;NTT$mN&{;Xg2wZv9TPiTi*KmQ_sYM+(}kpRg7pS zC)`;Wpu24@R>v8ZptUh=t+|~L&Qp%K_!lz9IS3emLKO19 zj}P$=w?Ex9;|qP0yhiN+>|*}d(oSU7{zmM`GA!v-1X z?Qs0>*f3J6xWH*Ve_g~m)G61EFrqv#4yv($XkIvf2B*y#;J#hM{9xlwYFcyNqM4jI ze~^w`o^qqX-pNh$w9lrmeIAkI-M!Qr(9#jlQ!;}Vvm`m-kNxEfC7_`zj92zhs_#de z1o4P|t5T;*Ltw=5=S5>B0UHvCP;6*kb;Mi>k>UeCe}H<@;8QO;k-UnCeMct?_P*P4 zAWq@wa0|B8{#Gne7@!T@x@J57aocLP?jNV8Esr8}$%F3{fs@-!te{1qG8WAN`|>-2 zf8f#mrCN=NVu@~BTnDZw8=DOCfQH+SyHb=O^Y(dCz4&h^({Kb-(fuY<2g*Q}l^ ziqo@)ptB=A;T_;63OyiDKf77kAKB{e?&hw$?xb8UU1*H8^B2#NPk;Gc2m!H9Tq_fo zU>PrY>d@|K#qHapVx1$P2$6!JQkkD_*a5karZ@W2uwRt{Z9T=w(iD03EqLF8b^a!n zIb9vR^TZ>auDcOuf$P!D0D+Yzb5J}VTc(1wvU%-+0lP)$$JzC^h@_+mgSAe;Mj0a2 z&Ww(Qh)ui#ViQT2P7>Vy>5LlYUM^v{w4H`d2qeU0T?J1s%Q6?Y?`^q&Tet4zlea%Y z%>se%Fr?-~n5L$JH4r?4=q{GOJ@Tg?vBS#AJ#AX^DQ2MA7)b>t@;RdyH5DC7=UFYFjCmM$tC*{zaj` z&UT9Cz400k7^k%_SO>a9QHeDdFP%sKpGLgn$M>Oln14L~gbahB{E-sal+Y@m62ydF z?aw8@jsoc!Bkr!mcnV=}A!2B<#+QF~A9rooMXU|og;cpwd)z_bl{BrxBX}+DOuQ;Z zJouzGbCnR8GM)&-kXoEDIx$YEQgIb~;2k)p1b+)*h~2pt_769=z0eLF9Y`2rO)@2! zPBjA)ZJ3-aIwP*3y|8yAyPC6R&pJs&^ann81^@JqS3l*^4@CY=so>u`I=eo4XsnO_ zx7V}|z_VOCw(pe5$)dk)72;jXoCKA40~9r-s(aI$-ZZ^&2U#yX?>r_aC#lvdS?9I7^Bh+57rr9=kEne%i0E|Vnb_qsyU^*ndRZT13G&q}< zx~f&Xy|qde-)6Q((bqATAPijqv&|N%YmZ8XIlybgJENZ*`-@wtHYT0zEhcMr7-B>@ zJJ?i@zK|0h-aW!cfAugEN#doHTdUro~(!>}PmAav~Bjf`wJDG3&?ZsSv z=8+8cb|OHn-XO{N`>ob7$|Zd&z4pH9M3 z21a3(a&I#O`vp#r$NOId1WqeJluPPth(Qx7=*>s`YV8i*__d$#^VLsc5b{CL)NM$^ zxis(n6x-1Ii%F4j4?_Tm3Q)BMtlc)H=O$h4 zzWwh!5dtS(jSaj8K%gj&PY@?DH0sD>+p@mb8E2fqrj3t3IDg@Sg9d+q*d%-MZMi!) zZrt!6e=Na&IsteNt5UC$Bsv??W-^v3MJG^@cZl;Kpz!85z4=quTyxFz#vQP_+B&)8 z_S-r2^wUhKRCHj;kGz2uCmv3vTtwmh*nO30TjW2pO4`qzo1Iv}D9uDwbMxk%Gy-wW zuGUt*9Qb8j>pHco&D40(;2a<(ZHw2L-`l~T9krN1LfS-;lK>Ssdsv%-^o;8UDHNiV z^O#ruXbr^E-~8Vji@|uU|7MU74{a2Wj5dCz>!?%~LqbQskIwuItW_;yEcT$I1gEg( zx&forolMmBp*$=?*#I3{uL-ZvMxng`P-hf!_pbfC?WPAAtJIyb$`nULX$3G~O@K52 zNw5-OHS|S_zc_6f|NV{&`SWvLfC``zyC7{b?tOV1ViEV{-i>y@&NdS=KUBby;KY6+ z@CvG!MTg(aLa4XW=0|4W!L|fe|>N>_1KWh31h|W3{5-^ zTDycrLYJ(G>t5i^lG0MuTIK6qH_jL-?_g-`F(;WEh${#LP(tFtnwf|XO%SMiEi=XD z*R%xDYOFbZ&I~?t-m!fBzKvYJeu$o2gc0p5i!mf5p30XdkC7kmYgF?$5{M>J0ppbh zpZwYVyz|=I87pf#^HGZwFIi~+-2;7m@NYhY<^ZOPh!AVd(Ek1Gn;4t&xu%S@l)GcK ze>TkKolfbz8A<&7Hj}DBpee-5uwje?B{( z-0`#@r?Z1`8;9hs3Wes+j7bpL4p9=mV;siV{CBy zuYPs%^sY@^r=Na0t5&U|r>*<^dsp340}7{}y^`0z_2txRbx>hTyL&1+xV6358tD9F zm{0=l*|(oZ_KbLiJmXu$>S+%&(m6IN^R~yP`uBd8tu$5(qd|jD-2MOy`+GR7zni5! z9n9-)qdUrx3mkvFW)d2SA3JC>#X7ht4&?CwO0v4Ywdl%}Uk~z`t+hnb#?0;oo=)ey z*{!uttH_pi5lW3w#!5TfeQFd|G$DpSYmgikP2k5K?V<3)jYE9=_D88E2@*xVOQH^Z z@n#1gNv#9}h!f5^d_M0y;|Pvl*h@nT6O}kKUU51D@)VRs>gix1)9JT1AqsMYDo+#^ z$b|)RK?hM#AP6Fq1c0J5Ka)~*AEWg>Xk8_+0hQR2Q^FU{JC;>PjPsTI)^Y2W-Mr(( zWn8dika{x0&haWUyB5)w@AZkG?*?H!?ybc>8qH*VjPc428gUgRfkU^;R7E=_O$Riiv%rE_og)!tVV5HW%fjySwZC!y_Y= z+ittzWsvbn?#yfY>6wQA(smMSCrQmOViRGRRd$Jy*qL8x}4f3L;b2(}L4CZyWFv!_K^-pr^)?KV0 zDYCy(C6tgk?QL}Cgj^ILR?t>qQZpalkw`n}(%N9nBwwcPoK)K zK3JBcsGBPLicdJ;8&1j1f&ZMXZ&OqV3W4zB&HMQDovSHn15sS?Yv(Z-g%$=)we5Asu3kK-O38U5h zKujU(^U0b<5oPh&UZ3 z#A(|4PRzLrX0fAG=l?#ifpeG6Wv~zu8#e+GtiOiMc75v7*qv8w-CyPtKe?Ch-m{*G zQiJv|@cIHNF2?%b>8_*lGj{PAX|t=OG611?hDv%11j>zMilq|!Mn>GMKQ-I(uPbuE z{gQP~y)NKmTaZ#^>Wz?(V97jKI2$DJiKRuXB2q$9EK%M!;$COnmQ?gdw9)rpcG1P} zTf1R>{JYMf_rL!NuD<&7BLG)@;*;EQ=k0$qXRu6%@@KdH^E=<|`ozaS_Fvn!ZGAa_ zI&2YU`2vU&kkGZN_Km{B8$la8qko1RckJGzuc-0mkZt#>M1xZ3zTf`fV zJ)GAbxsci29Yi8n?YQ2F6)HNW8XIbj2K%aYHjR{6H!{f+#WJO89kG^W{oR~6dj`kM z>St+J8$sl%)I@8qWR{MOnxDy}6`2UiG!+BWz+sG`w_`RldX{427*Wbw5_ntVDRKwR z3QMbm{o_wis*j-p!Dw;qcICiyqCyNYSVdK~pl~`ieaWTp}^jR;(96Y7UPpf}9fS!@zJA`J(p!MEH zVFTw@C?bRbyy}O)Wo9noD;J;SFdcvr4@6Ze6OU>O6a^nNjrba^UdmI)tpjN9fJTgMLTJuSbr$x7l6df4+ z(~e3c*o`~j@h7LYfB<^C;OrCN=%o&boA~=#8`={?W%~}KkzjTV!J4gr*dP$O>}7xQ ziy!^)e=nGhR?`W<|6jZJF@aB63)0hrJ?*F_CshTYHQeE4mM%W* z*AG4NVEQ0ftd(VlE&J`{ z-~1@1e;pu%Pz=}@JKzd#vL)M+Wp%Bj-PQJX_tu#?=ljPwGk5MvPT-g12_`$wvyUIi z+TA;I=g#Nzd4JxeT=s4LJE3LV&(S(ZzUH;}AQn`+-j(DK@3gcCT2HDzpqnv{~PkVp>{ipg@B zk+RRh$yxSI%rICekwUPbG0T$13`<)ZS&+++^*lT&Y;%D%@6oOykO_#?HUYLscq+}J zwv8YZQVM5;BITTZg83!|jhSQ>r3U z%E|*x$`Rj0tZJwYozDND8qnU9;pVH(=DbCnjF&2P1s}J+7eZh{w_=ed!68h#XJ~R> zE1j)t$f^dyFpPcsnd5{Ptv&)_?BFb-XkLTzBsvTkFAgwU8X_>E{fug8^gJrs=dbR0 ziaYiVa_xnidBwU#1cWGZbTqG^G24#s7nv;dGgBNzdd}m(h&USAmrpv33O}3=knm9a;k9#58(% z3<_n;ub+azDmgmZTke~foWA&lFS?RDesu-GM+QcD%@6NGDCt#pd~5zgvKroAmE(2#A%XdOSO zBjSK?!9ZFV8_b8Tkd$6@nQu$kGY|% za|juB+6%4ZZ%Ipz&t7pVr*=0}sJIC~df$wx?@nT*qTZk1m;fOZZP~?iG%iAlEZX?B z6;1r_IR;WU=6Jph(QA;DgFI8kqvR{2?)Q15q`(t~Z$EvA8z0)mrAxZF?xK_EZb(xO zp*hn*u{ukjZ5pASj74nGn-Fu(C6&b2$cSfqy#9K=0r;;wytLXKR>Knv2wEE9tP_zkg_fb6kUR+o2H=^#x`(I)^x|$P`!GHU zVA83SsQUiz^?R~;^Qk=f)m^};Nx*OlZ|9az}h)o$4O>Fla(3Xc-KSRv-gPgV!+A&OgLvEt}(i;y(*Y;$Z1O#aMNX{v9zVhLiA=% zQegaY64Tn81UVB0=FFXdoQs|iAW?+c5F!Y5NHGW)E|wUYtuk5i>Byy7($c`%wnkD) zqP3lVGL5(eQ`4CMkv8-X@Zgb9xL23k;QOLUTHn+C23Ev zYkZn_-LZ{Bg{qtOO?}(y!hw*X)v!m`SZJCAeCCQXc;4bpd>vSFqO=Z#R;&MPQ8Knc zGDe}P;E6QdE$eAax4ImA?OtOfnF|ocJMI&#)&OW52`$7isu688rD~pu(qXFMEZPW^ zft=^DeRz`h{9+rPF?{~2vsu~JNWrh7@a)tnt%b61O`7%oaC9m$r_Z08GAVu=8)|#L zh7f6#W&R6^XB1j!Uh#tmS=HIhS1v!DvOBkLJ=VvU9(;{4JRGBFhDVHk*K@g)$_LkR)l@s;QzmWER67KV8>^;L1 z`(ol=cXyY#;QR~z_@}qs{?%%=(g+|$8Px8*xmQs^KyYSRH}k}5woPj-Q=$0UC@eH&<>@l zh1=R%F{iFZtXu?(7r^&PF{xkaO9u((REo!jC;0MXyQl~fMNY^2^mx)YZha7WH3Wk5 zR(JEIKRk;C=?45TaQgXZ;z>N@h~#wg7-FJv5w^nA_tz%k7H9!Nxquzpkw_`Yr966b zIZkM6Vnb&$#uyGy&vHlKAVY-;LKzk`WJn2#C$nT!mXt`jMkZ=vY}4f7QjCQqS5?Cb zqxrpP?ZjOoz_`d@BP3EN0;5q1^5rUTzjG`5CkyUj9T_MQgH|>(K6(RGO)BYE`Lokk z^JkluTUc6HZN9K5Hb#k>xliH?XZE83L`Yg>Skk_kT)G8AV9kppHjF6o=o0@t^3<9d!(A%2h$~6nQt8avxAK%BhOL|z*+DthNES*Gy^pwkM zpjP~A#0B?zguBOdt?--QJb1_;@LY4Mg}_5%LTftIkV>(xyNOTT`y}VA=wWoG=g*4D z001BWNkl?ylcU<$X5~I3vGI~ngn?$N zP-1v`hMCzC)gZL*SH$j*z8nz{k&yf))=*YT>6%I<5r>B0z<|9nQV36ZU)=V@6Mv(% z{veP>DOlbEs}@^>A8ic-M6rxHGJ?n#Fgy1{Xl+2-+FEZoIyCf!`N}lk0Q{F9Z+Y9B zx#?4XyW_+YPrPJwY;*<27>Z>fCT9_y?N+uT3_^#P#;j$rF7HJw>xFa{0{hTbU2T}5 zF@$eNvo&i^c=yEk#HX(M!zJ}LL*z;_rX$ebn55l+aD%drr$^;pn=y9x?_&szrne!>3GJ<% z*3(Xi=IPN{9_k-sAYY&y&QcA=FeVQ&z(|EBJd`7!X@_t~6rl+jp4m$^m?bK++BHnp zMb}Ql>9n9!uJXn^w(|7AIAkQkq(J!8$pVrD1A)DVji9$N%~?x&c<TD|Ye!v&{D}DVME9C;jcP3IFmp^N ze!~Vp7+kWXa%&yC#!x7P(5!B4;qjpf>kshg0s6-Z$eia2yT+3$<|Ih>dyj1Zl4}TO zN+c2{TfSkkRA6|vNU2h>?~|wOhf=C~4+tp}0ufnvP3+%kckLv|G)zvyll!ALUvzdX z*fu#i`Qq!Y`^X>u>emmv+8CqAWe_VC!HR{oW*37w&<~XWcJ;yZEP!ZfZt>4K_ngn~ z-@pHv`RX*^0Q{F9TONIk4I4JFbLY-)wzsz~4XXZW+89HrEEt`Hl!B%lq*6%jU`#xl z2qv*CvQS_=1!)Dt6Mzu;nSAiZ*S~(pcfR{izcam!3g`C#Zy>%_nzcdJ{YAiCD&TjA=>~vXV$w)5+|1S(}jThC?JIR@4;* z<%o5G2H)A-_BLhM*xAbJ_C~bOJTsc-fg__lIXntFPiLx#)@3R>M9DOsw2i06FgmlB zf4Q1cDIfBi8wX8o$mrSebOI~T02 z6iX)?fxWRuCSY_L{LmJ8Ygq+Tv#@^vQSza!#XdK(X&9XZKR`lyXk;WmJw5$L-5_ z3-nE_ovv#P;cw^Q^r-`;VM zAMPEbG3B$ksYGsDyS$XACE!b2pGlbFdZ6+)E>L&defc#8Xvj5?jav)VPP z)&wMFTYdm|ylm4lK6&XTUbJQ@9jP?Alw@gRj*fJShmMZ%qdon!Wm2qZZA55AVEh`< zPt;KhP{z>Hej*vK8EvY_h}tM>Z?s5ElXWOetdOX~6l~vxhf<1)&NDH4n6biP%KnsH zI0#ikW@JdjoUo3=g3t(*fXi1c#7M!X?t6-CF3ow1yQv0M%jqx)%iM%g!@jr9f;aK9 zqS9-pc~g@?x_=jQ0VCq7&=_gq|JGcZ!I=QmKr6oze|`5;eD0ndJTWj%F_3n6kbu_i z{*ef!QQAuOgbCxxUdGFXr~$BVf|3#`CFMeq(oEhuD~H;e8%g_pO1L&$T5_#OqHH2r z_~TB^B3-r46Ql=~GCcM)6v}`wjg5_R;lhPyfBl=^*alDus;`=wnqCV)b0c!iQcO=L z5F*L}42-~R1-9&n?je2ZDW}QpJGNg9%oqRP;+Q7^{wE!s-Cc~0jB?(&XFvMTLyvDZ z1nIhwq*j9B$aItT;DXJNZnV1hr*^^Mm?KP?FKWzN-u13`@ppgs+>H@_%NzfaFMRoC z`;ZaRgf_@reC>NTu=;r?v7>L4(Mp*k`683EK84W7QS$q2M+?n4MO!NC zqI8;-Xc{*Ny&3EiO2kT!rR%F_K0{p7A)nz9Fk5 zO2BRVNBHc+yXbDo^1d@q;NmM7Hamjkqe@O+J%+lla_{0J+hboyLG<}Pl)#H z?sW()9idSmj7DnB$%{L=?!0xJ(z}3i)h9@*C;$&hLmHl$EbxuT4`Muc{mCm?)z(NQ z2yIxA7OoG{vD_=`wX(QJt*Rb9WTR5&|J%5ap;H+GnaTz;yX2 z+C(@~#0#jQNLq?H;yh-9=n;+dpwcuNH(J||VGyFx{ z`&S}R!k~=R^GjnVd?B0xlOqLU44%8DeyPOF*cjzPnU1!0T5^pxvC&_t$ z+DcWc+Qd=T!~s;H{mg|h8ee5&Ybmr8V{LEaZ%;b=QShWPRag`;v92&4rRz{G`X1-M}m;dzl z;kp=OyyYvF%^W^-BnyZa|Iww~^o0+AUqMRCtPXWR#TX`vCH7Ag*gKhL@8k^6jLk4o zEYqD$b5d6u=PmDIb5AGB8q*+C_@PfOtw`-G-j@(i@8kg2q=MfR}II+AYB61o> zN)$TLXnB-^S;nXLQS>KKDjWZn`bS@aP0H~%3c}e#r=;YD2X^pJPaWZJuh`5>Pgq1T z2%SHUK!w73FgYV0NOA>8@B!=}qGZWPN*JRC(%>11@?ff1<>&hbx#f`q>>rtMk=Dma z7j*F_wTC3BBkjWO8Hp`tq;J$?ru^_*(>Gl!O$2&Y|^GN zn!s4jP1Q+ijWPII*FHnq@@tHVK63^_A9nADJ^iuE_3~vazi{aA!M7z(MM`;x*5(Q& zAl$G5alxsWg*SpcLm1CuC8|e>ZZ5S(ba|@goJ1(TQhh{ z(w@n%dO;IsEm^>2%NFvIbxXNy#X@>o8rVHP#sA%LfZMnCaimyaNlT7(ZH@f$&?q-O zxZOtniiE|2NVwFg$UQ8iy&=aJUvv&9cC=8a`gKWsbufR-9aQ z%`!D2STy0+5yXgB0@7*9qg6#m({j3+m(!SPqcPJ)bEcEVOa~3AR??{~3Md6tgb2BK z*+MQ|(aqMO3BLIF0SvIIyUE(r8s#FC?S$BrN%58K2l(6jc4AV}tt_HlwX`J4Ab>F7 z#O?*W{hYPD=d2SrWpO)xU?{sVmKgp`5d4JG$@^|nT-)Bt#mg5^(E;DvHNY@;T~d*aX@i!wmk^DtUd zDHNC;9-}ZmiC-=`8LdF2QY>g`Mkp1(k210bc0W@Qtpo&~lqiRyC@F2qq_hN7Ej6f= z+h+N&|1j)29KZ4nC!Q$2d&`%v{PNenS-jz|Kfyis+|9e+{qA%2?c4wEVzJOvSLiVGS+QaTSG?c_TzttT7-Km7^wSB$5GobSYzaEDNnije zWx7}_rk=~!W6z#FtY5$WoS~tin~c^-sd(vYE@RWlt0|WQgcPw{%_ip=D#j(~xl}$+ z8CJIESl!ydHS3l!oG z$@^6s9jsG?GIWgmMA%Lw=_6SrOdZT@j>l@B`*(G5xpUnJ6K;0Mcs|uSq_cSi?YUk; zp{?PMBUPnjj#RpVM$rygLtp}m;WSgz2Uy&c<;F`+X6N`c2PR8Q76W=4B~_wGTS?Xv z+`9WH|L1{S=!|C{rVjF!2($^H3=7(_yz`88TzNt-nUo|945eydORY@izt?1Tkx#rq zB6Ub;3`L_cQgZ3icFteY!JP-jc=x|<G0Ay0@P% z+_#eh00Q~xaUu~>bD?M=+)09K!(uko6^w=cq>j#^{YK$>Y_YVwQ z`2FvHpYMPF`||~8z5)2}JwE%noA}g?pLx*-Klt8--g)PZKUc5CNhfXQnrmJn@3`aV@7}d*7oh0qZsGNB zeHo!P7!@EwiE_nX3+p5&qz$7DMTii--9e-90Rlr$V}=i&wU(>bFX7|&KgA9AY_*f9 z%7F1>f)&mf$UX}_2SHYN=Q$g=U~v~yp^xW0@r(?S&NL>T1l=A!@?|%P!Y?E50CDVg zr}oe%mIcOE#!M4o>cg&;F zDMPUmPz?=AdI+u2(od)|!n!123us7;_DQ9iX-{|2kZu9vQKdkBc8Hg+PjT6rEq-57JWPEBLGu2^)NZI0Q z!uT3Xne^y42_8mrSD)l;2tsL-AX7pRI&-R`uJVy{H!?6$q)hnW%YZDBZAT}#>Asz8?HhH(KHC^X1=k3xPC(B|)pLNCb5nNN z0G8-kHJXeBUGXW6jZ&SSwnjQCzVj?he|QMG7m#ktV$urfW05&yjSr+SF~1=+mb-y5 z1lpQUDPxOCV4ckg0Z&S1XY+7)5Oy8H7`r%YX>O6@qr=VHezj#5;45GKdVDHJjt+@R zxnfUBDnxT5Ch#!>BhWV(N&buwLj37#{$%$p-}=Y-!ZW`D_}w`cF6#O8lTSUh4uA!% z(B5KM|G>!TC{t5Y{Nin+}-^{?%zs^#lp{Tx#gB0z3+YR|c!=MMVPUkDcH}{m$1Gd1rAXJq2Z)` zljUJ1XAe8mBRd&~T2nQkwTPRlloCvoE4=exw{d8yP?INW4WXtZo92qui}~0kn|Src zB_IW*swUPCL>vL(IQk;F+7OP*V9%|iaT(oBYiY`KkWy(KIa_ zL0DFQWLjjTdwntC(oWE^vqTaRpw_%a&60k0oaJ( zb<5!XCzwmxiPQj`u@SmEpjv@Pc0#^@QXV}$J>M7{9C+Px^*R`1GVSdh<*BJj1BeT* zIGb;N=dUSN$~7~OIO&fVB8?pPB2ZeoUAblGOPBZuDJj@GJjGw!{xGG$PZ$R!)&Pz` zW&%x5W14SYa}i6Ma#TZ|fRM3dB{2s;H3=PmT(FO))lP&7ibxaSbk!z_49FO&##kTz z7^QGOH#8xhNU^l-6w+Q6?HtpR`2sfkz>)NnN4|8F;hBA|_pve5p(B0aYP%=2-RWw0 z?avRYc0;#p}Cy)ut0TbwM+sg1|RK@j}`a9Fwq87VdpALb+*BpruA> zNq6%anzP-mXy}A3zT0yPMZPk{XmLN%6exy*+xHG~%aey$+??gT=dI(Uu2!bYRkB_a zosG+BNOxLSKqtGCj?X8QV5&UCWd0C7)x=%o?xk1`ntb5R@#&Ao?8G}wBFHByw)TE; zu96xW(~8GOW_k7Z@8>lqui*OUZK4nc&H>a~Alu??CunW#J(@`=GD5IraEh-!et<_0 z4l`A*)*E2C#zW{xO=5qyL|~&v=450G%(YGBh<<7pplvmsSdS@(IxCGRKF;AYT9^ zQi-WIyx|RBdoG^;MVDL%Kx=F3y;Dc=J%Pd0H;i-KDc zFs^X~GWSyBFJbDtf#mB>Y6@$mCUi|et)Va`j3?8smer)Zw2kDA3zCSR^-(&YRDwcv zl(DHpF}Y1k2(@*g6JWz#u+wDLgKO`9nn(L5A?ty!p%ifD@-F`IC1>)!TShi(qdwxQMgV_lKI+|C|oa=Je(V725Ft}@o0v*zjZeeNLNu<36 zcxbL!znFh~>6vsirFrQ;Kf=wA@1rH_5t<_XGut^jvlHJ`5i(^x91Lh>7@O^5bb2qo zyIwI?5?}j-8({Rh9e1Pty^Q`}BnZ{cLfU;_L`W3U-k$>UzUIvCRzCNF)4AozK7M|1 zn6y-`e+?0#QzsZhpcPUm+Or-b`6BQC#SUKky$88#Uq4epXcO_G)sm@IbR%m!et~qk zQ%=fijJqG4Nsp9JE~5_*5F8pr=L@*-0@po?SPe>Az%vJJ1TP>Ovxt;OIhUd+3}qqk zrN9@0P)LmQ&?H~kFDd*HE@qo0HNF-y0S&D;0@aWU7_*-q`8E2f?Ia4fb&t-sxL%q1FTvEg$fi)7J}>Qgj3dFdKTCZ=h#HT64TJy)V}NIci!>gcfIRf zJpAy(&zbY@?Cs&19Xq-B(u@A#@ZlrZ1iqbM|L6@b<`sW*34Tzio6h3`Cu)#uJUvUD z;74fCDU=M+QqU+pc8ulugEO(jjZH~xfx`EB``H`#^UW)mECvxu?jGnhc7L6- zAJi;S6U_D+mC(4tHiyX{&5w}*O!Osnq98?qHc`(|3&&~A_R!Y2+#(Xubr7)?k$sM9 zgOG|+Fw5}N9<;1tQ1*8U_qtsf)IuU*=H;*GRrHL7_YbCLo*Y01+^pKfu&%zb$+u z9QYEwSKU|q%9HP9J$t{-cyO-marAQ&UIG;pu&KM1a-g~8$%DLb?Lso1=K`9XIzcEh z9+WB-zVui>Z@c|*b{rlhP?jxk=D_&z$vBilMz1R(E1Kl)Us!5>rGgk7h5k{flwt@- z$Veh->OqgaN9zkb7$yLLTuGJwdXF(<8q&Ne8O?dPGf(Mqgl zi-^G?#Qq@%_hP!cd&KbYkQ72ZH)AYQqCtl8$6ANa2UxITAz%I84Xj_@O{iI>E&3VJiL%ZE3|osmhHH z?qO^H7_ZyBf>)lr3}po6ARwD=L25-Y7)Qxe+@wU;mxOe)?ri?8?0}?~gE;=#in*53 zxOI*+n85IwA3w^;J*|A=;**)J2BZ|Eq~vJ6#GU&__|~=q93G#7RHhbyAf?L$F*S>V zxy;1KILQ6K$d($dG35%3Pa`I0tYSh*XLBuTTm+IH{1T2Fg&hZKpO>@;r>%!ID_}_% zq8cI{*&%~K8AA$4X_qlzY>1FB8fi3A3WBQ7$k-UgXy<9PGE=)lclQR+w9!#_StFo6rEJy`xQR*s$@nLg%}|bpQY$07*na zR0#9o4}au2ci!)O=X=B-T=e{#jnU6{)sahH^#`1|b}6A&7_I9HS!^5=4_`GBUA$v7 z#zK&;BWOrV9vd0s*L_DJld6gF&0IqlNk=ZryUy8&B8AWbAp$!=C$!(m;vYf5zgg?7 z6H}G0eMN>eqV``wB2XydyB?Po?bFty8gmS>U3@2d%Q1!hruT$ zv-GsAaoZg2h?nNL4$ghQk3E-q9;q;94uT-u+8|mJ7>o5^cXkZzk|b5B}Aqnh8Ki$?|asW;HdZ~rhcJp z`l2ZmF#W@@?+8px*wvEfx%9>ewbJhAD?lOADN8iodB`@_anqi%-`kY6uSy9*B?+aZ zBn(9%CC@3f@C@W2%B%$X~_5+TNPf|QO0^8!^Z$R_>%bx$Ky$288^P7C6Uj3?9 zk8j$z@v_rSJ@u0dy1L-$y%2^Pj9$5NCAZ!7^FIgXi~l?V@Vi_D-_76u{pVP=Xz|r! z6XQQDmdnXSq?`JJxciD8UrUxO;q=o_f7OqF{NsPV@WP9^|NeWQQ|Eo!>8G>x@yAJd zp7EW+p>fS(ZoBhyENW?_;#Zw4OFPq%i0kL}nNGIkW>?FmPMDl{TA`JpQF*-QmydJn z?n5q(OxNGW#zN#&eg5K%4SevN4b1vJMu3XacoRh^Ir+zO%sN(hVqK9WlqEx5WLWoa zjG1ErOTzM3Xt&F^jB!IqgKVX@W0Q+Pb_GV*`$QVg2IDxw+u+1*O2IfnIMXB7C}=m~ zNx~Q{X-=oOW8YC8=%3(SXPiK5P7)Y_2@EJ>f2MTOL=9SMr&KUCGNw=%6CN`?*ANmx zPwNJn(+kihh#BEEkAQmM#1_ubCfs2#B1Dt6p7k-=Eo7!N%5Y&H88lN>&2{(g;?cuL z`OFokamn%?3Zd_0X)@7JnPaZ|Z*m+D?Rhp|0OJCkjB8#68X;0>6fJ4Z7alvnm$n_` z`g1q(<;V7OaC+M2SV&ompw_ZB)w|S5Eslo(*!xL@4k?fZiWSVr1Y)Y-?i1nOe2d>$ zj;X033_?Jt5t+1g&wIMB_SA{`wAN-gYa^Vz)~?iaJ;BiSR|cs~oClD0&81hWGBq?p zaCp#8{yK~?vNyfyO|SaWm%jAR0PlL|+xfe{|A*h`{kZkkTh%+>{*ESuSye7qwoXk> zvTD`po?W|ljlAIvf5}(Aa`SwlnQs7ocaOzAy$lQwarMiu`OwdQcE_86C6!V&g87MJ zP1ETNl}fdL{rU|tpd_UacHK*pZ(-PMoQ&4xF>lx3%~>+ zoeeo|d)39XWztlGa4vpdoBBk8e3+>75fUJxO!pWPr>5hdiwIC}oN_#eK(N|sn|23; zk|mudlT{4_MkBBREZSwwTbDR{K}YlZm?{k-WX8_-&aM{|I`_axeP9t2X`md0v^RKE zLxHc|L?{htg~aN%l|v1LP-tUigAtLED7eP$UreGfVW6XF84H?Lf({*8gR`C$$E&nB zy8|babcN8kARZASTtcB#9@U`0(b;|Y!3>RFikr6`;IohJ;XP-cz-u?Ipz5T4M(enF zi1hL`8o#?Q{*BHcc^A!n-|E*kb}BcKEYhu>tolOZA$eqQlGok-I20?8k_h41Yo<-2 zpgMA<4xIsyYh;rRK!gB9ISW-E#%5r0+9ETass&O-pB-ehVA=~ zIbA@A?hed(n_>OR8lUEPO@MJtkG6b(RIx<$$RG?1!BhJo)HMYqqRU{$-uvG7@|n+k zX1*xQHvs>$j!U2a2i*OOUjp#5m%Z%fyMBHr`NC|>8EeSq#3h&fLE-kF-S%#PHEY(2 zef#!2=l1@ud;J^u`q#d~ilr+r?>lnv&SdMUy%aC=(oH7B*3^P{Jz zsQ21G_7=4dI8RExxqUx>`_R)EJm;BTlTF2jHsvZGyZm%scj8JWDpjNju{I^9#`_nd z=EjRjz|&C_aBYki@l;lm8OB00VUF{hGzmC5=`Lt$jx8EYs9Dgmg7&6m=)e*tE#$9b zCYo_ZD-)%D#tVH`*X|0i?M-UIHcD7~Rv|4(F~qqG>cC=75i}q)B98gh4*8I^pJ}3B zAqgESAhDSU5kEo`(3xGqg4UG?ZP0EPY@DR-c>eu$e`6rYX4Aqs5jrxXy@no`knz$0 z)1?8jUdTNMC-}qzJ2|nZnQPDANOwb)lJDDqA&k8qbp}oLgruG$5uMuv2R+Zk zpIS3uV!lK+t?+}8M+c|*?vBIUwg0G_)+II4OQZ(S$No~l>H3l|i6a0SM7aVpMa=Z9 z)zT|jyV*>Aa}^I4k%~pz*l{s9hIwkQOL2sjmKKc0=`34>Isar>z0AIrsL)3t zKSmP^Vcq{@DsO|!4iDP=5@&3tq$q{joDXcBuLAQ8!2kH;s;jQzr$7Da@AWx;VipG>jODaVu3>8155-BB32vWEvLdH9MX$+yT zGD@M1CAndccxY`f__X8}(c8Ml?u>P z@5LYB?Qeb4HPuR`BVvuOzw`{QJZA$lKd7-V4En7P9X?sYg%e!T8xcZ6w3XFK6R^CYktUU4@5B^4hNt=N*c1n6%A}RYqFkCy-R+#c zu!A)Vax|qpluS_!GyxhRtB6oKjkn_gm;kLjq%%dZ{ZT+pwbIkP%EtEU8b81!A?x32 zws5=;5jtc-V~j$|5QJi;c$Bg7VHAo|;L{;9{KJb*;_n~b&!7Hu3txKCW=`)}K;Bf5 z)F$LOr^uxyI(_FcYl*nflO&?nPDMI|!V>2~n$lVJO-=FnEeE-4&j=M$wYQE^E_V9a zn;#>h={l)&(Q&k|2}9&q9x+=cj0$}O_a`o^iHMfQMF$&&Mq5H(;M;3(WC*tIiN4oJ zPe~nwBBi_+d&)c8?ph=?ORioU;ked`|#)R_~EWW@I%OXsL&R2K@Gw-TGNru@XNzTdFaRpP1zKI z(RfnOl=f&$r|Hb5Y0jj{C_`Eaaw22AFlwOQlh&n4}Gsj#1H-I6HKnv|u1;%CE*r?!gb(-P) zZY89jYEoxJbipM>PF=6bjkZd|dt+Gbc zhj_K5jU&H#iiu*CFFvu0uRV5vs$aD+%En6&R&{MHbzG0 z^T+>$DLuwv!PKkGYm$UaI_lEr6l=JGSv+UKBW0r|>mC16IsiIH+Oo^e= z6cfb?6XlY%p)nFAC2cuLPcF;imK@8P8|iJ%(%q1uHJv7-B!UoM8>+hYoHuS?FXl{> z(V9PoPMw)iJRv(iLtEn#rvwP<^96)P3Xh5|GBUk~P*m}ZEq}rlmbkEn+L`J|cP(u* zQL2WN95gJ2;q*nVJa6d&N;+h$=(Bxff`|I2xVLYZuRqmCQ(ACZcLx`)=;p-UCYCoh z&>$7%076l=)3{3s)G|ZCA4kegJe6_Cw&h}om;m|PtpMU!UpEa40aB!>ge8V&b`$E* zMeJfpbvi%+GlAwWPgzZGW0q@wxr=w6S>cr%ms9fnIFF&u8X$5fF!fbgI^-gX3Kp1{ zu&AU**31hd1{Xhda~VVzNMx0ys4?F z62OroN2pe-_OfJBnC2{`yx3~nB%`a9LQKzM4h~@khGF*+n3yK|2&`JYs@%R{!3B>$ zx@Bnoi8$W?%pd^81)69;K~eA>^81XuJa$nsOMW zVkJpztmP>foW%5xz@ek?%poY3<9GJr3ojmS>S#Xywp)L?Z{3FV?0#lGl;^p2%##4; zkN-#$P}#r#VA?)NQe>Wg9(R8FO)P9{q3ruLH#o=e7D%k;k+zn#IwG6ZpnROP%?L1B z<4KQ@fXlygA4g~M;7Kg0%1u#d2o2p08GiDLi)hPwRJ37E#^7=AX!kl0NM+sV41$?z zg?uGs@Ax#24^8v<&^Y@hOXMqMdRrQ}a7i~8FYDm6g&i!&WeAKW@HL?;{ziy|mAkfk za-r>%>68R3+D}J%Y5PZQ;csc2eX)R}Q@hAlMo=;nYt4c^4302qVsjz1!IL&`zHg?$k9H35<7WmLpDxnd-N>6yUBipl_K@`yg%FepZ9xqc zfvnP?TIp(9Mq|3eH8?d!yCqQ8RyvNzt1^=%UAVMs8-$i+V>$8pp1#tBfy z*+LjtyeD+cpD>n&8S?_%{Uwo9L!YskJbHQ>_3J0mp^ktk@rfHhx$eUs{LmhNkKOQb zI@(*kZ+!jhH*MXv?cD%k#bV4AXCoGMI`m4rcx?#>hM<28`iJ0|J_y5z5+E)-|NIXu zU%vcv|M=~12Nz#@3HRQ8&-?@NIe5%x0n8u2)p6Z*AL9P|AK-!upSR$NC!V@CZX#DM z;WaP6lviB1nb}eq&oR_JDUk*|;~-BZ+-kt008x-n?9ncT-JhEfDIn*0+;?P*?``kH zC`HXa$*mB=5Kjrd`r>n0+ulSmG)QAL&?1=)5ZA**lrP4S6RmA|K!_(5ttrKt_C_vU z+083AEa8tfEaIv)i|J{|@bvgJx9uO|yH6hCp}{HgrI3^-Xi7`cN|F*1+|(|yHnCD# z30P=++8UPAnC-NKVBCs0Hos5|P48v4JcOrGuK0%zQm>`d#iTW3>bV2dWNNWreZqlI zN*Nbn6L}UG%O^0#uppb}vQ=GNvvDbl+MC!nk>|%x9_D-dM({AKY-yx9<+-pVgJ%>~ zU1GXCh96dtDosjymgQ+@;uw92wDel&dXpur{7|`KtbwCbPg4#iK%|@vw5gpx37DRU z00-I_dKyxk+}*+l?%mFY1ud*j4UZcJ{hSX@RJpp_1;vk-vc({i98Y5Qa>k>B?8>&R3Bbq*Mq`GFzNwdf+G=9Y-u^ zqrIWgMo&v@v~CndEd^2v6cQ;RrBYPGfQhMT!s%&vY$v7~8W6(sGUAW__%-MJ-RD00 z)JLwrp8M~+k9+UA8{hX^W@huZjtr03SGK$t)-H#pw3Q7i&vFR%_QR1e#J)qY=Wu)< z84#;iufF?3AHMGWAG!V`C4jzzee(~-c?4ko_@8uib$0C@9UEN>KwA^J^G@MMH@%5j z2}dUL9LX1%DF+mMAJ8VaL!UPmj%Tv{)e{B`aDRIkmTyOleh0Oj0=jI%!0&Y95@f?P^6>xcY$V2tl?AK<~l}d5xrI&ulZ)mdll?>6vMJRu}z0_Rc&^uBy)apL6c5s_yE2PrB3DLlz(*5D1$nn;^=f zA__PzpfWn+I-|~vI)je5z542i<15N2DkyG<$UsmLWDS9YERcQg?sR(JYQOiM^Zs$p zy;ao-s3XpRQzuV9>7}afty@*+w|$qDh5}ffFx`@|apZv^RNtU63mO_bB4B9v6!0(C zU3VQf-BeNKdnvC92B5P3_}2e13*X+mzh}PbA-T}e!e!^2!0fgL4ozlgXlr6teJ$hJ z9EZ|5c8yN*%-{&W7@s7a@ku%k3p?t$YT10wo8LiGRh98WM`3C0C`aRJP5)$`E&bz` zo>mN2QfrjbymrYPE?L}3%J+>i4hmi3313qBM>4$V64bsZ8pmjDD1i~j-Z~L_8hlSg zt@pT;9Me$EqQ+V-L6a-^98TxiHZsY52L`xpOE0sVt9b3=nVdAE8Q)i=e2pT&^YbJU zNrUNE9@+dPQ-vWixd}X#MamcupoJ{60TyK{g-6+vL&2m-inyrm7Zt6cu0hGYmGwr@ zC>(ozJtY|TJYrIFW@j6xbu_d4#0_*4N ztS1L($3@iF+2AkG2M$G>^KOS+>tF~*QKMS)$JQNTnYY_1fa71w=J!;Xl-se zE?>wSC7xuJs9rdWE6zFriDX8y8Yu)b>jGSAEfU?d$49eydM46r8Xo7qef@m&f%Vir z66bvWee^&-#`sVp}=oH&HzT>`6=>Y#;2YDGLInBACUeoKcT4&gyDH>wvzA%_QQrXf5!9JVD?g@QsO!5LTJb(EdUfH&Lzv zW7!17;A5(M6?qVtWans9v~r2tNUTUeEO7CKLWcFG)+ii2WmpQwG$y&>+~fJH6Xx@| z$F}j=`#1CRodbOOWs6xp!+<`Olr}aha{f4d6Qd+!O*Gfcp(fslZ~~MS!*N6mg&^fk zFq+;^t}toZ@zP4`V%qx8MI{uv^g1YmpU@Ja6;oco3GEGBvwSvRT(^rao_8!V5YaeZ z3P?JVy`w3>fl3-x%UZKm=&z*j9c~2Koqz-s#sjWU&MRF;7#U4RDkuYdc3m zJ62aBKnh7Foh36o2G8s^_w#&oDow%j5Kauw_mGZ*(gBVzVo@P5_R!b}g;W}z+-h7# z1zKw@uDRwN-~0BrZ~ki`1lPRd?R@*@??k8fp7*?muYdjP#q+JHMz_?O=dtx5a%2Lv zw-0vp;%HS=*N{aBNjx5B-r_~{4OBq?l@UN?{jXY!7cXWqn_HHioOpI}eB6Y@z7hJt1|wArUP>78nuH^$b{t{|`Z5_F?;GN0+j~gH9j;t5m*YB`a7BRD zF4B=)|M1iNYe}356@Y{+ju)bjbGe?vw7$8OI4<>Cu<;CVw9!`* zR=!qA5XwhL86_487vfHg|J-$mFFn4U{>cpQI%yGaSw5GVgdhln4cun566icyYwF@{ zG$*^LvdK@{8)Y)vN5)GL=m3{ENM(a~h+EJoZK#Y#Y*jkcXApKs5}<_>UO7|YyMm8D zw4Hg4)x2x@d~!Mf4gFJDez>idTQ?uTFZjj)M~0kIInDH`qzf>e)>mo|99~ObAu|Ee zf+Zb0Xpv~k^iafX0yfpxkA7$)YH+0Zm`mppKmHinXUqVtaFlsZM+%XF;&6W-`LPMu zunQ(r0NRbY;=&6qdid_U?>g&kZ@Y$DZu$06Kf_nN@r^(E@sECVIRKq)aOqhvGH&F8 zclN^INZ4aDY=_nsXsUu8z2NyIlgY!Mzu~j5dhZ9{zp=6-zVufG1Xx*r@EREzp{23m zi-Q9LD*!=V4e{lRc*n)3bL^b9h!Is3g~3w&th$<|E#-Wlv{F<#k|izmT(+p2*-drq zA4@Zy&(mC0O>Hd3WTC)U*KK1w>)XoAXv32)@TTSSdEctVOn3z%!x~X+-H$t~Pq{&-SoqJV$3;4NVCLpO3+`oU2*-iB< zX|BPK1e^p?fW)Doa!eG4$>k@R$PF-_>8B9nkVqV1y#uskF&fxTjrqOM;>c1(0NOzd zKN8$o-HEv+_&ym?1540*(`GQC z+M%S3%IGO51m=H75=c-|5Fqdcc*6W&5Q4npke{4HZQg<2*I)j;VlJwy1zA^zZ*6(= zLJ>HUf*&w4FhqWI3^wnEaTEMwF;|>&@+nU(KW^#S-LvNfKls6|&-vOX5>-F$@9&QQ zfFc%$ojtI1pV9XRNG4#;3|Kr5=5<200DU8X#`C;A_ujYW`ggwLoov`pk^8T704nQ$ z#X9rMGsPp1Jfh?ADqSe#%oe%)80M^6%n$$RuV|{R#`isrW|UV9NV=?eil|g*;!@%x z$ao&>4vjFsv4+XK&l`XKuxYJYuo#|VUULmUdBe*|IucI>b{t$j^+(zUrj{i(e__?H zj`BgUHnt_EFlEgHp{L=%M9GMOh}94Z^%y*%9XsIQ$N)!6dQ%y`@$?>+v^MajrQP^U z*GizoYB>CehNefw5kRTi>-4t%^zX~BdD%}T4v0mo+tTAlymWiafE<<(Xuys4MLhKmOc`IQHVN9 zhk)XXBqExq1HKQNx53(HAe}8ctf)z%&pH7)Zw{i`MQU)gKq{ZY!9n~?8lKo_+bHQsbS@6;Ke$YGGXZOADeJ?lOXsmb>RY{%C8L%L$mcYO`^d2^sx+(_qWe)F5T`|i6r^UO1Yef##Bs8m-A zi@Uh=Lq0JKIJs2Q2JMt$oiI|*0lwAnay0;-^Crt!lqgt>l@)m+xD|}cnVwr z+68=sbolHmRsmYzfL{EA(qqg5%!MYs4DC4C&*Infdl0(=DD z-`LA%*Y0FI=P{{#5HX9n5Rvyo>9LMHz777m2+9og69}wqv2?6dv^11KX+^K3#bQ`7 zC?rP7vhOfFwGBol5LTHWddWRs(A|M(;H~`s=ShW7n=-TPMawV`c&*pnnu5Qcx9xMRO1* zEXJMDVxYJ}z`zJ>*lCP^>^gbXs=?mg-v3wG75_4ptXzW1`hDxxTW@7xV4&fVM;-~H z5^eSjT-W7|FJD1kS-@IZjoMMN^setE}k41v$KDJ&^{=^ zD`vN`dUh*$rH@(}PLC3yEldP@qdZ885+0qlq5!40(G)QP#nFK-vyT%L&2n@khpP5H&gXT@l|K#?kVTzOnKKY7Dx92`q= z&7JGnKR!WC+(9aVz(L_h9TOq`wCAG*_Hj)Jb#x3ZB?(vJ`5RmxE&n&vZ9%rO7qpjwz=c8|aNUbBRfiK*VE^${=1P`KM2Od|q8`?b$1qFMslr*I)lgUteEss9UI|K-45)@f_qU zPNw#RrOcc^m+C|uM#m6OZh@z^!c;1{SU^<>iVFGrM~e}8?)+V3cDvu0_Y|GuU#ERl>rA1+gZVagbVc<}@ z*ai;efbHF-HZrS1TX|O%wuGgf!K;#%xGXuEEOSVFF)g8m@ng{14|<_jF#Uc+}^ zcREX3Yq;v?Yq@LpVQNA?eFV&WVUBM=k{WPH#$8Z8ckMpRd+yo52Y>I&x5a}#zKZxGZi|!dj$Ak&`F^sT~3%J?Gvf`tp$uQ+!8 z(iJDH;y1s(PXnBN)+@ws*4)b%zH(#xy!i{i{G%V-z9yH+{&v&m&8wmTmH^rs;kbp! zGgs2Eaw#nf=aM*a8L1PNkjv)a;9>O8MA=nnX>Ju4z53#J{owZ7-uL@no7cShRh5nN zC9*0sz{+~w^{<~aA|hM2Ztv6v>4t7^f|%yo3szI`ed8G~WC<8tDlfC!rD#oD zzV{b{KaqWJ=-*y`I}vsYREdT_N&aEx^bTkrB?1Gd6PiFs939FKQ}hua90%CPf1X+X ziz5RFJKNUdUigOESb$nr^67Jr=ag-S`1k``n8+1)>+-ow6};b5ZU1q{R|u+O4hbo^ zfBz6)dtw*chbJkZ5i$k_VPS7?Dt4{Hv@vw;lSiIYX~Jazin@0QeP{@F_QKF4IE$dM z7TW6V#HpA>YDt;XpH|w82KtBL$(`sz0YKN(CPjOD>&eeP3p;o2TpwN6i8MN$g@Z%r zu~FE05HUDPs9m^h>9WJu{lf=NdEcAgsQ^wr^;FibUCRRxJ*dw+=iJ>N`M`SYT zX8^KA&8YSk^xRHlTO-xY_0%*p;?0`L*xZ@;4Ryqa1_{y`kVl4v$*D+ z;V?CcI8ALGw6%4ROvaee(ec#J?zr>Km7TMa094jr$Xb5Xs)As z!5mgE=^~xan_wq3S{Z20!eI-Fta5{>+FtKrC+AWR0dC==ERgMY*V6WW;VgwakH#e0<$ z#cDs4=Pj{;HTSbYM}raf5ja{Qt-rbw5TJ0Bv=qjp%i3Tzb{s(W51GX6 z83z&xL_-oCcR@M!?1G3%s6_}=1Uw(s?*!^%hXhgf>+Qg zn-`>Wh^&X$ybskkfW1_rySv+a_L*lp|KtCBEqX21u3gK^UiPvttzW>Hgl(xgH`UUTvB-JCSDk&#Ru zgo9Mz;~=bDiJ*wW$6DbQ=kYocBr<>25!-8e!$O2eMIG|-4c{LN_#+x$li?Sq4Z$lX1tY_9lf_YESd66jn2hr8lmAdfN7ah9!rf&kUY}s*o>(*x(9UT#PJ|dk( z_w*YJUeHoFqP@LkS5HsRG2PwWV$-Hg(Yx=w^UhhdZQG6yWipv!FC!jwl^~G5rOidr)HX#xP=WwgTb+I55NXCZjw`8l95xS5aN9FIJh*p= zk#q)P65`T$*$Xd{`7J~CmtXYfXlYpe0V&a`Ec6YV;J>Q}2FA*;CMs-B?CpiB1iHQ& z=Cq@=7rkeqH-h6BP~Y0EkjjP+kqH9Mx%sAVK6&w_m+;G9+{FdwU+~b@XEr|z94i73 zy?KuX;0dHew6?Wu=$f_U%)(>WRPqqyzJKgOjkU z7Y_8p?jA(Ji$cHSI=ubuZ|6HV-$J16xl0MBFNf8~BARN@DzKxXz_=p167Jsszj-n` z+PP<+6Wss6Z(}VjZH$Zzm7dAZfy<_~-*sJ0?Z{L*)dtYrJ%^s21JNHp`2G)k;>-W` zl}{1&JeDtnh21#K4aDl|jD&DoBYu4i@l+lsl|kh5#B&Akd}7M7bE@K~syM2;3ctFV zpgKVz7BeHNpn!T}EBWzp^!NmfP8o5ad>*oSCgqUg`5cmoI9{NpxyzM0(G@lJLk@j;OTNURuEer7A1HPX zjz<)2>AGCHq>F-YC}&~sUf|ltv9!YH2>y|Ts!~OB9Z}>Wlm_m|Y(AZ?PSslQDu4dp#`!CO!A;)nOy&WsTLBBdF;_K*t)mu zWu7x<4&S`#CSG~L1zd9RC0ugJC1F-+1bvbT^r^>!>)K(C3$6ou`r+X%(NSvaYsCEz z{5EEj>#{RwsIO&mDji~Hv;!iMOy;N3skZvsS|(E|dU_7sK>9b!LLrB<1WfIo)jYR(T+wa z7w4&G@kd5s$9~w;cf|X68W%@bcFvd1st5s9)=}3*7rlmEyLNK0r|0^pyL;?B8tRk$ z&1GjXv$c*ufsoot(3;PF=v9vu!!ZFlw4@Ca0**R55K_>eO7r7qdYSM%Pys92nz?4h z0%DFVwv4q2uF^{WmOf7D2%s$CC{vg#nYl+wf2FP4P!PD>cGo}~iXDQYaE&ez%h4qr z=MWh9d&%a1Sv^Ioc`t-4CUOXT9Wc8tNq21(fB(Q1mbTTgtf`)Spdw=?q$D15A<(Ql zG{(mtdWIiuK7faVh)X+;DV0GEQT{=R4)q_|0Wd>uGg3-8h)mW<-`WwE5Q4kz`~~Nn zdoD^VmMmUEYg;S#-m@l30>r>LG}R&6n+&u-NJK6NcRv~m>FC z0_dKJY-&Jw0a}9VIH;N=L0c1kR~xzcU1a8WlbzE|zOx;#p_ZUJVb}^tq^A&phfu;` zGM?FvzHcpT*$F)ZM{QdPA*fDPQ(sq4TWjm#iOI>ED?8{*V^wqjD(k50o_p@*^4DKc zRQ#&1fx0R>S{hk8yB%NIO?z7EU*xP8CDlX;Fs$fPucuMmOfWu_&M}h9Mw|FaT`e>w zT+>oU*tx$(Sp%C=9)CFwp`^QDt8y`2m`H1*GWgxzc@ zX;m5(qO9O_j%u9r2af=xFbMv54Bg%e$IOW^8(M4r`TBohVBj!PNEGnb@4SxpzyH0( z8aS1P-)%(qkDAuM0KH)+>^)@79E50WYWm5Er>s<|iPTX~ipH*Ygm*!tn$9zSUMgL!heS$OAp_+qLMu2aGD9eX`x%-Clcp`$vGc0&jI(=dB&> z9dAAExZ~b>&e`XD6yW;nudi&PFOht`vMTGSt8-RY=1^~66(Cs94RgErtBX$JhHGBK zST>JTfkjW-hIa`tP8`t;)J1%lFc^Tab6^148pn0H?U{Xi=8?_dy3`2G*DgAR(>hzp z`^u`e6-9og(+o>160M5kh;n}dRm6xz$o`O#A0`H+-HB6VMkcQ9h2weiY3&$2B3XuOZ zA8#A}bx|cT?9v#!X2Tq)O(gi*lRLR%dq1~cb_z{ZaguSt?OXf!>f^f@%;e30QkT#x z!`Hv`MT!nPUDV-^#Q=nIR5sICzYDhPhJAg}&0c@m>-f%X-=#L0L?FrM^SthLuj8J3 z?kPUj{F!j&D1j-5&`je6*M*Ax7DMY8d33T5I(YC6%BP@{#O!5 z2$UVKX(bS@LoA!azx^K6-UCJs*c?fB&7R$R?Uh%~zy5Qd3xqhjg3{|Qdo6d|`SZ#K zTIm2()=POE>g@~r;n30m1YEfKIJ`iaib00zb(A*COLX(gDS%<;R$Dy)N^I^G8Z812 zj89p5lBOw9#j=)q0;Qu(UW+2`pfv7>j((w$PpPV3WN=fI^Roe}7$hTY0!0ZSAe`e* zue6QN0ghoY$bxNmV{D8~cf!!(91$S3B<2X>F_&BbBdLJ?be6tMivFnrhbD52=JVtO zpSX;X5E2)VLf~SkX^s{ssVNA73>1zC&>EDGD5Mc$(uOsmMeskE+lz<+A|k(mu&<&G zm{Lln@;TnUav^gXlYC{}4l>H)qrZNZkN;{jgSos>*9+(JrS6BNI{l?zNBr);x|C7< zo7({kx)3e(hOUUT0O3icuvc z1qFc)toUH4RH%zx3@szeV&_FDAf!vi$69M*QgSGj=i0lULMu(*cnT6RGiHf0OYz^c zOWF2!(H2<4?n8)!1LzGq5R<7$8v0ciy^5Q@@lCqBX92Kt$4<^W?_7F%dyA3-QbwPT z&hE~85A__n=#-OBXWf&JJx}nj6RFIU4*x&eZLWIr)vx>6Pk#2Zd_JcnNY&jAr>}sn z&Zq<8D8q_~X$K9sTH_WxgcdliOHf~hUtfo6sH0GuL?^3Ij$_P~gv1RL&fO1^-?I-M z-V|XWO5?@3XP?9U5B#>WQNF}ig#}PqM_mv9?x7ihQl?(6t2IVEE03Y3ri!W5lvV!= zrEqm=54t4yPv196gJ*V3R&Y%n`WK;a7VH7|-QN6_f$s>5>XR)CBmmH!5`zrfGEt z1QOldicVz^CoMs5+6|-Q2m$xrb1#=%atUAi+KrrX#u*&5_!w@z?KZA>!y6bF9JKFA z1)w^+x@F(NgRd1rJa6y^2!sC7f`3O#s~8v=)(<`S;Lq~;oCc(-OTw}Rh_*Jgln51= z^A^g8Y6*dm5`RVuesv8ZHAy_3!^vc*?mdjV|F98BtV*Dgaa1xv5KrJLMK+Toj|_#2 zOt6S0?&|KE>79DYso($Mk8i&d;G&Bz6!+Y-rh@#hbO0*rFJWDF*=5{$=bZp|0T&D5 zpci++%o*JLv8y>}<$N+ZuLycmph5&UMhZ9-+ljf0a0 z(>??)zr6Acj%ltV=LKbn!gQJ+kueY@sQx0=59{3?YV?Q46^J8@g37cCDDkMb2}7t` zfQCRACW5lbPD3I_?^KS@J-Utiw)Np8V!UEr2d8y5aNLY0X4h7ckgiE^5XPeh2$Uia zn#r8c!O0AJCo*gunBs{;L-bAMAn)Ty2e;bgtnLn8zqpGtW;YRcBx%ntj=rP7Z*d4O zMgu_&RgT10nh!m=nP2bd1II14`T>E17G6uD?Y8gm_<9h%_hTMvSk)W&1H_wH2w|M#LN-ApS_EhZfx?lJxNupsZ-DFWeu_hx z0`EC>F`qemDOWA)=A;?TG$j%^LL!7^GnDEe2!WIiwQh`gbv3M-*~EGC+j!Hlb9vSL zcDh^Z$!SPu1GXI+;+MM)@!JCf2m#&o4b;Y@v7QZl5E><9R5KeMz8zD9374JAmt4|l zEb^zu+47_*l#3Nn0_QrCp^VRU|GA#W_6ZFMZa7w$4~G0852{JoOd@<#WR`l{kFslOs<4|dmQDtNje2>EZehR}AXsxLlPZ68QLUTPj=AsjE zg8FK_wnlR8&7`|$GPR(a+{`9|yiX$SlS!wH7}t2lpaUbOigqZumoNXj zOE10j_Vw%6kN>fk{pzc)X3Lf>NB!H0C#%Vgi4Gx?qA@^q%;k3nhxy%seo&gl z?M+;{wA)aULLR>egD^-WF$dy~L)?*6IWBQW;yMyXnvR0Dn)1bDAc~67?~8nY8I7Dn zlXxwJbrmcc(G&#%%x@F%IJtbl7uId(+fVJ~&Bu51rSn&E_UtAS(j^<-_KrT=e0#h!x)+RWktAUFbb#m^!Hs-c9ARUL@!ztEm?d9G*hZ!$;G*!8D z)FyF-V~vnhQSZQ>tH8Q8MkYKZdDRip$p6JS8cu>D#zrv_sCFH;kEHp)Z#MGm;c-aB zis=1NyWb{ONL}*tpBV=rO1~)r7bAUuWEIp`K`I9=^*BiMWGd3hU;Fr4?)cdqWU?8q zzUpcwCMLx8Z94{(G#ix+*@)n<^5mHhUb8w`<^8@-* z1^QBHCJO=M**r1Vp)MYyp(@7A+5~Mi3E~zknDz?zw)#i8NTE^qNbR6RC;@EGx1<#; zLdjxFuQRd80eos)huz~D{_fXX7|rJR;`t}AYDOcz3h-6w2TYW;mrI3-$_(&ySxH{R zQXp_72q}mOP2LMQFje5e1Bbb1#~?cnkI-0C&H0NuxqA65RFZivkt(T6CjuDvod-2IvS3y@RbhRVq8FxREBgv=}Cp73>7QMe8 zv33hOn}OD5L{}TSr5@Lf;U?lZ$IQcDzJz>TH9{+@`-f5YuO&Y;j2;|E3{RnT!E|V< zs?f1Nlp6~zQ2l%%yf2H{I``>@<4{p2daz9WD zbGhuoY&P;rprN6G)Kuyht4>(8@reyjTo3S;x4fC}eec%F?p#R#D(la+KL6Rz)%@^> zKm5VQ&6^D8Xu&MprStjDhcD;EMcpW6j6tN%P}*;F(aAMxI}`HrqslXs z1Qs+_xxD+{r?_XE83A0raxVY(+?9-F^58(N>yRg4)1fKu-rdiA2M#lu&Z0a+$y1K0 z-dqWR?;~AFTe5~Tx|(^}tQO9k(?V;~B~yTc@1u2q6t1BkN^Lm&b`uS4VIyq=2_mo+ zsZ5|%fohpx*Tf|6`o$9zT$i7}_B7g)3Gzx?j`a& zcZi$U?`Qj=3F6f*Z&^N{cbzzwx`ZHC0404>P$Th$zzNxp2EY-GKC~T8{OPgObcci^ z@s*+}5#!O`ajv=NaeUv1Mb$?%93DgNK8((1(c2Hg;ps76BBa)6 zazcn8UY(#iSz})VvwYtto5_&(JtQI~AQ324Hc5#duD%9lwZn`SL{kI0r4j0D&5@MR z$3#dRr3hSs*x!$SW)EV=KAV`^&PH23%pHRnEP6~lg0ZN*i7{0f4(^JA$&4Iz=NB-~D z7amE%fvbP9mZy3~!1uX&)k3~_&I(2gdD2;rHTwp+dE-9%#wTg3tL3!L7FKpPu(Y{> zwz?Xs2+$}rl9V4Xn9A|&@HlJxN7*@&q7X<{cQ$hAqIQn&Xr?yiqO>+be}Kj_vuI`g z1tKhfKq?m{J=2;NJ~83aH_mLW@UYNGEp)SgZ;#Ji7 z(+KS#gr+9uP|%8db`SFHO?%kZGfHby4Ie#yDd*2^MLID86`0P8btN>+3TwZsjc$N= zAu8>NuIZw+N3|1U{oojXeb>{ZRA4!x4hYX2QybK}83DXVQHx;%$BIbdO2~L{a0n(+ zFgSwP-H#rh1mFKt3<=CNa3sXz&|D9*+7K;`P+x6jB&En?MjK$a+4xz>8YvNyo7o{YI%S?l=f7$f}^Iy&tt!&0EkBfD&AK$0O_+ zoPTY zrNEI6t0tTTPzIAK`7Ivu5lf9 zjHh_tJsWVP;OiHi$n1tB8Luc!t0EfK3lo2g+acB>*Njn66zBM893*w|7!&yd_a7MI zdr$9UbN?78ceQcN>Uq4pvy}i%UMZwDU_^~XXrtyRlnfgmFF*od#yW8+*)cZG`|jI9 z??eh@C^Mt1WuRjdg3yQI#kU;^t;+NsqTucr04P%h^h6rQr(j?d4v!+nCXA)9=bJC3 zo;%pP5?mMJF-TTHT`e@#K}#bv)Id!VYHA>vFtpnsKm;1Cl&S8uGNU%nL-;;=cmg(U zhkb`a$SjK%E@0R0-A5MLwMl4iH2ww64e;;=n94zk55@^6oIo;}WOQVNvGH*xCnqUw z)mJC0cV^O=RYHgwwFP5rmscKc5&yLKf3sH_)Y zee54U&JCaa^i05{=`~5j%TD00&R@wtUUfckDaZ!_8wW>Oe|Un4LIJG>&9N9W>ykK* zqBa(zsVdHt=aVZ0NY|mQD#pU*I;y3lpcS64P{MH7wQbwyJ)iS$f5dpatAJy>I%rQg zJhpFuD^|?m>f;tLyRI530=z&FXv^)FAhjSsMW8LynFy<8i6bz&e9|TB2lS0+c%W~X z$9hLt+EmB8R?eZTuA1?JXH^O%N)yQxht*KhaXFOE^47c7lgs;j@3kj0yRn)=!J@{I z#;zEw9PbNKf}*09iipI25N4Jyv_xwehE*J?afC~%;PIOShq?Kwee54i@!Dg%_|WQO zm|0)NMBc|y4hjz`V<@eWLKP{Fe_{flgrZ8unaJmO%Uw^gYa|6R$2iPMX-Dd%Sc_8R z;ESpHH_2DToUj>^z0w%VU)Qh&0u6Z&QW?Z}3O$j6sVt<^=J#FzUco$1*M*pM3rxh2 z)d^Hh5>Z=aG&ic^P*nvn2N@`|uS~`770lxl^5AQeTx2o^n~=>xI*XjjqYfU5l8)D1 z{(8Rp<$vRzHTUq1uYZFLPj5I%)*m+@KgWU5Nl0e^sI5t|f8PNDG?`3>d@e_!P#~2~ z^X#TgJp9;WJo)7MiA9U%J+^t{=ET9?UXnG{okBQEriu!NjupJ(65B>N{l_Dzg2zp0i}XSUHk?-#D*^v+iDUO*sBt!tdylo3Bcp`<{n62_U*RtU(nx=q`` zwUj`RD5T>M1Oc~iKg2J0^>W3rbGUNxOfmrkf$^d*w%QG?PNBH=?hS10ALaHpoW}Cj zIx-$0d^C=Q1}a=!(^h{$Dp~`o69iUq(Q+3wXyJm+Tl|`7p-ZKsmU_%}$oW41vFQN+ zv33`-D#qtuemt*UGLtFKL-^o30j_pRsExMJod$}Wj%X;Q`xRyQP1Wc~!^C*wosaQM z?<6FgGMXmB0p;7*D%55WFG}GeLs!ML*)>HxK&U&VbO|d~7p;mF#t)znm{xY)1aP6k zI#xm~1_>8KXK@X_!w+e$0UQ`cq$be?53+faK;`l}) zg98WllSm}2^0nsS#~q284bhbcK1JqWNtg5E5x`wKR zYe$9xKL|_;tu<0WK`SQHDKeQHst~~bJ~+?|o-SGtTdd8s*IxVWn{U4PT7VCJ@PmB$ z%U`Z+=9L7Xvi{h0;e{6tty#0C6@X)AQ@3;>H~sx(ESlHNw*Fy`o!Lx#!o|}Lo^M*` z5hq_1t6l*JDM>gEF%ghcuyuHx-J>b$<1v=DHPDhsARI+pNCvZ6&iu}A4XsHPnAK3j zcVBZd3!Cd0&-vwhve1!!fGYhtbo>+390x6h&=hnIf#V|raD+>JQZO*(@$HSfNd@qx zWwTjOUq!*TvV}GktK%qcdinrge{?%vy?7NDFY070Q$R=^Q3As-X;Agz1&u_yM6obJ zNQFK7vfqoyEl>ecNE+fXHVjN~!y{YSba0f5m(St@s}|B)o4`{xXjlp3kgqSbB5BHE#|@ez0{^U;?*mgSd_X!qD>2YcoZ^O#I9cS;E3q}Jm+RE%J?J8mM!DTE3c%n zxrv6ldOEwhXliUkYt65I^((&em9H=uDi=-1uWnoW0 z93C_YmN{RIMzl7!OrCP;>Z=?_-t)^}-mOnL^rnsVt#D*Oq-^b3TIcyY7`iY$tqJoL~*{}LoV64$ zFw{XadDnmX-24Si>20M+sZo-^*BYrc$F?=`$^{(^q|$u#vF+?h{+uEKBvJf% zdN)Crj6EWwN*#4Y1cpv4-8j0g%CykyYoVbQ8tP1C-P&MK^YNHTI#lq7LHGZFs!$xI zyFe@kbv1~#2AJ6avuD7(nJ~Kp(b-OQX9qPi+h}TSrnRnthUyw>suILp2iLLYNV;ge zt%ZoxIggeVMl@oZXGuqrh{cG<;^=q`zpe&mG@1KOW&~(_-_u&_(?-WeFKBLTdf7kx z(j#EuZg+bzP*P}-M5iKTtdO;waeym!@0-e=M~zK z(^~4L^3ugDqy!jOln8#V;4if{SOTT3YoWkF;|pz&`zT!3A>{?^9!_!EtX4k1ZacTF z-Nm=BIFsXAYso2PO^SjSSMV>1NzoP3fRyL}t9KCK3Wut=%bLB1`G;RWLwhpLjjvkC z!loKBz6ZiZ;3IKM+#JOb$5FzX&)D%qJT7_LFP`GbgF}c|0(1c_fQb}pDviwLQGv0H7I_bmDWEbL zQx#_mkjWZqVxa(@DrpRqjwyu2Bsdn65I3%j)p2x{t?sMrmy{-{my(3zlB}*K;kr~+ zB}l{#h!1VlI}PnrfU>gNRt8%^xs>Nwz#=0jSuWa%qtKtS&S!GMvmZET7v@4m@)_@y#$oQU>#tlu{ z3~ zqn^pULJIKla9)hAd-h2>IB4agT?b+L_fkoa4uRH8<@3CH!AzF7HSo{BeTFOVSj#8Q zTEayOx&Td}46i_iS`XsL;|T4dMS#?Ty12{NHtgZaeFIP(N8^KxBSHbA==wT;`DI7= z{*&@ZO@O1mS1fi!o4^(cGlg$l+ubsOUZWBT=tw|YGpgW2HVf%2I`5$ygCd?Fu{w_+#}gogWB<1T)s7@)J9w^?#9fzIEKV#Iqbe37=DKD-P?|t1eBato zTbE2}6LLjhK6lo9D@xr%CWwBX>NLay=rG;4=3g2TP6D?nP9~QoCnTJ*6xBBjyL%y> zL1;uKlTrH*?B9L-@)bP$%$6>#^?(o}sObMq4DmUl~QGx_iXFE!F81e3Xd^Jcf37NhSmt0{@Eil8P@VhpvyK~Wj9!}vB)T4F=Ga)%>9Iw6!LwzaotYlx7P6f6Bm#wXzP3^Fw@LGR4(Pe zvoH+-kG`29D~#|Db_Oq`)d3Jp0xQgrLfGSU)t*|7Y*a=Q6|LQrh$_}vj8md03R4_@lEc~vW33-

4d8KB^>|KoW$#oTsWzRNF#S>aPP4 z>p#N+A+J<=`Qa{Q&ruNodzLW>3Zy}cp;qmnTq-j&J4@@7mFQqE>>WY(9Dvz5BfwpE z-a%()*WR-?o%3Sf|Op*vp?oF=qX=`JaeSk`rS5IZk2WK#bA(D3IQ&)TJi z{AMB|*?UV!qlzjL#s)?6vOsO&0u$Z`<2&Jv^U=_)hsOBE-Z9?()U&W9ON<8xCUk3O z6vxM1YB~rsWu+Lhs(w1ICxIHc8KT2qy5Lkk{-Vp-H8I00KX((`j!e@LiI37G6%jHx z@!-gF6Zk?yqZRXx@9v-(Ctj5>JGUlmF`>dOCrQOoe;8aS3-k`!!ddg3;DR-j@AOw~ z*Zvd#J&UnurG)9MV0t>S13i=mdZ`W#(6M5Ou9eH_T0Thk@*#Sb579F?NZ-&9z03OP z9q6aKua}PQPHLSUR4O&1QVCs{}9Qr3xFvS2NJ9i6@`phu_bGR3rc8(-QV5FET(()y<6>3`E~ zKyV5rW9Y5a=!%5iO38Nsiz6{END!wYHZF7Q+3RHyN4}d{vc@V&oBbqngCWfsh;P!! z*7?{!F^W~km$wh|6Ki@od(A2ub4|Zk(yW6a*T8fuiA%D+$@G}h^DkKm1nNn` z6S_M2#EUND!j*me+`r$%cOD!Kl*uVMdz@)IAcDk(vNe2d&mp$#A48%Aq&|}0;ZL*% z!2iv0JqEx*B$VA`UayH}jFlLbA3{@TqQn6v?jiOO_z_fqcYgjx+QJOeJ-2-S|z zBp4&G;g8?)hySv1I-@YAH<)TY3DF8rWC%5g|wd-kZlx?7F>FMfd_XXrc>=zv& zN~8W%-c>^bU*7p=7hV_-6UC`gGZFn&%RseEZ`Fp$ci*%Jf-_*8w1Ww!S!(d8v|$DU z()6><($EjJ^=P(L`L?#vX2Q4kkMZgY*5i^m0~jjvd#H}P62OmGHHZ|N#5h&nb=CR& z%B83AnlIkQKis~XvXM~FHDof$IMl#wGvVLv+0U$tv&_Rh5t+h{BXBr>;}>mnOQ>pF zsA~xypMPcKF)uyQ#(`CM4L9IRKvaL(!0ty^Dm#u-oe))h~E%9Xd@d<%Vj zJp}+L?BunPk&#!=zcQ4_&acyDBRsm$`DzyZF9h$Y^Pd;VsD_3fpT(?1hSi-Nbd@5y zO63KVCb?Hkfk%GKD(g(lOYFKuob$uy8&jshS}Ee2dk!;LEpguR-uBFLZV(}p?>zyc zT2UntLB--!n2B4we)E}pp|Uc*@5mWE*GFV2_jFP&RiILXb2h*QXL@0!ur=L(|Bff$f8X}6_V@Sv z-|=xzU;OG~x4St!< zf37N&jL=bz=&Y5gl%g;}5R~ik3p`~C(>6fJni1hguE~ptA8%498_VanJ;?Jntf6AP zB(NCCAcPg;8<0+v%~R4|2`}@k4yId8Hm@AuL(jdOsixys{`33HCD36@UP4(Csv>;& zjt7D$O~|%L5&bU(M=3JDfmM(b;(AUcmtEFiXfU-JQCFv@7#~^&mu*5$TSbcA4-F6N zrY?*jgNffL#KS~WB*(LfWl6~Z9&@!^fa=q1o4)9w2+VJ7mfTwfxO)eB-!)R zw7(dC>50=UQxF?RPe&PxClE3!K`Bl%bl(Oc>1S@U1nN=IzTt-rMHSy!-4R9Hb$Eg! z^(N0aeF*2I4Oj*hCx-w4AOJ~3K~$8Wf|xueENaJ7I4B5eyncZT{Tt0Brmqt5cUPa! zx}IKs`rp3A-sw7>QAC$5^WFX9+`RXQC;SQB>tNb*?u8xu5P#A8a&p%$H$5Xi+{+x# zma1^83;RX@r^XmcU7b)VL#c|My8*fIOi!W&k~q~}J9jX$RsIjGdDqrSz`v=83O^H$#zQ;Vi^R&lTNJNR7%F3<^28Sk+ zkp%^C5}dywYwgP#0sY@SHE)~F_K}gz`v$p+HT=i@2e@MGa#nSgXe9{}#<8TGDruJ> zP7n~F;xMiRnuJ~m=SR?-mmdC`tIy-*8`tuhFW$cLvlHp)@T5qmEJrRq2l{(ScbgqM zcDTL!_KgT!2ypGS*Ye^QzqkMZg`H%Ugl>J4bA0+x@xg-TKaa&1=@XbAapTmp2nx(4 z%4j2Ibyp2zQ_c9Clg(1@ZHB+}gBg)9=BL?Mk^ql13^f9cIN`>6yQ`6%& z_30^9k=rl4aP#{={E>g?|IBATQviU%P6D5wB;C1RaIrEyJLmhm(v2e@@Mo!i$-4eM zBS>H%%S9Ip8vrv0o<)vI*}!0}>S=6EIsq`>kt=?#UnLX9^X#QwEFOzeK;x{5a(T(kcmH6>E{s4u~pXEj(c@T)fc}D+NS*=bd-F?yuhY zp8Wu)oVLCI0EL~{wrbU?f6cF=IF6a9&-#d5z!}L!-f8VHZSa#Unrth3&hP%$yaL(+ z(vt*7r5w>$EeDBEKOU$-p)M1-Q5Qr+a_VWB>YRC0dzKa9_K|6xvZfE!1ZOlWhn&2= zK>|RqphAqYrn^cQ5uwn=< zJI~(-IG1qGy?0kutzD=4cJJ~IGdi*K^9le^SZ15f+W3X+m)O&M#yKUpc5P8}k$V~$ z2l5c7IOi6h7)Wn>rzLmuN(Rgm%xzi6Zz@*olK=13{MaL;-4j z8P7KiRB)YLh;x|kZn)w?Sl*lMcn9|G(cbQ!I4ZakGch&UfibsGwgWij_uujd1pp}Q#IZNM=}la5#T66T z8i^Bdj`7K9tT8!9t&6Ovqa*LUBySez2R(t5$j85ycNi%fU^R*`37Ek3ol%^UCL401 zG?{eh{Bpy??g0zfPszsnV64$(MMo#1agYY~a$&S$(A4NHfV#!81L_ngpLQ7$V9Z$|qd{NIy z(w;5~0fFxg@Yk($RM1KVV*GT#d1sJQKPbKSmtM2wjcb>oHv!pVk zCVSuculqv;1nu^POg5;QIF@zP0?+|RkitEgGXN?1kvNP9!&5ExPR#_$HC;T~mm&pF z*m0f?c$i-ii^pz5fI6e*W{H|9VxGH@)di1pp}Q#IS*Z zW&R(rg2wDVJV}zoo@B>p=CtRH{c&^(-lzX{Ue93ONiWPCBrai~TJbcy3fb)LJP?uQ z?@fpzW1o zWzV4_v|<-Byy;k6p!$6X;{Evzd6K2wQ?KvG`{onIIHxS@st^T7Z}6|L3roz8NZ{w8 z0)V4S1!35Ys!h8O9HJ(aA5P*}DIKv?p&SW!4UZK~{)L^`xq%%2h?E0YK+=Te1Gvl2 z_Phb0GmY8OzkcEqUttL^hXMc;HqX|sJ;i0$^YjcejTR&0bxcO$6UG8VAAoc1$ln-~ zMfd7FW1cg)p@GzaFX$soH3OW}EOU_352xTkG|xBiC~M4mG>}lBRw`!`4}$o@;7RW3 zd@jU*D2WR9k5BnXN$roWyi{0W$J<4|Fn~#O{owQD*!-YOV_H^>MOH_Fg?rM>>LjsnZz11ujAe{ePeW_ZPRVXww;M>XJR{<*tVTa zJh5%t*2Kodwr!iIpZ8nmU;paWecyG}RaLw8-lb#S(H~{)UPqm=IoOJw-Mt?#n~|>g z={e+XQkj;qy)@^MWK$?0@$5My=n#bhsKpLyppBz3-%GXARa^{%vn`;Bwbg`2fAKgVQmgYpr&)XU=S^nDQS~2-A#i@LSBI)s zYt@^%xOD#a&g8uI@wR)hx^IX$P3%04BHF|g`38)Cz&;Oh;Yx!fxP=`b_+m_&S+in* zJW6VTnbyIKi-Td*Q3VV!nr6*&RJ*6du(pjq);oPsbApg%5NCJ*@}ww4K1f}$CHbA> zbGbYoT7zrv|E4LEpop7mM=jtP(4~Kg7zWe3daVo_3hWkuCXFK}&zQlbJQp5k5w?(& zPMZBh9=W9t^hurq@*b#x5pQ$4>b3pOU)4;Wi26OjZaFzo?`1MU8w^ovKiKRA^2_eh zg`Pa;c)R?Ct(!(|PI8SimK+w>3XCRaxhI*d>f)3nM%%ZKJ2b5&@k#ePR{jqstyqz9 zgixYjzo?Le1cDHgQ3HP9M;OyieijGaL#Ay-zU&fL2ZXrjqFB!J3xotLwsl&XwNT;g z(KlmNT_UvgZ^Ea%r|>-$OK~Z>0XmkUq_SFMpb$`^5;z zq0bcag2sYDjF3dS6{7IQo5Me|b*| zwn@5Vy~Y*ThBx159z2lGm`A$k3$Elb^sjjtumP2e!rzxEfWa1#`)>oG#7^Z z*;$=VFi=d4A4ryr{Qevu`jPRmpKi%gTc2OoFAoV%Y^d*S2-b*6o&2F? zLGEyMIy&~1R3$3#zB=9MU|?`USz1ED^?uR#zh78?UejUceZF)_bVpLxy8`}>D97}Z zIXsz6(d@OP^B4N8Y74x|I9=sp8E(D}!r`bQwb+9S?SmRUAGt`i36|#cMRFYnQp+>>>Eb)qs~B%SrR5RcKQ^CaSTlwEKY(SXCwt@48q=;i@PNv?a{l zov}&e12z@UJJ^qHn1Ri($8^_bBKlb4Rwzq<2J)wtKeJ`(_DlohFdqpqm>A)Iu}ben zWpEAbM~Y5xpY1K6@E$)Rj*bD&hWu65V|X5zgLK4en3WnXgx1&%=KQop{(#XH2v^0Z z?O9O740=ulwvoY%g>aWzlTGkbnOc{NV$$Y(GP!<KV+R+nFbtm zG?^KP8sf4!PENY9NqgT`IX9v_XW8@wb2?d6vk`7J_z-fUKMgsvONvZBL#fI*iYh5~ zK#ep+WduD;^XLqY7+q!ZX{FjJz4q^Ml)!9^HyUy)a+x9Mdf_ap`ik$tih#*k6CA`z z>~tNGtJJIhYsa=~07^UJ+2;P_m0 z{?2D#=igu3+rO{$zYg{N>PLa~=El0U-ut+Y&!PfBjC3*BDuw{xWd5h|M#npo!nQYV zBP+cMJ}do5RSQdv2SR*hyWm6RpZOqe!36NY8I0sM7uWDeHK3)MgSYkekFV33&5up@ z7RTGS!z{j)q0d6sE54uqY)DILU=Bwcs?TLFJbBgH+LtGZ)2qlV_3CY$cMhGj<6 zD6ddIS(;I;fv~HkZ_I;X^9EAT##RfyMUkbxmt<1IgZZKfNACLzb2O~4A>Xu zs_N-l)CDHqCf3n2(x|zX&@-eUM_SCR_4`xt)HU0l{=A5?4oi20zV8i`btSEVt8L(e zh6{0F?g!MXiWdgYFYx9J=fsZXqj5WfKdex~l`x{hskE7BE`T0xmq3hjEXL4|n+eug zE)2dDiD7@E&yEAp)oJUFQ2zX~WI&51UXdeYC6~_VF;`oMiW&Rg7+j7qNR}gZYToe9 z+^{T`I7v0~kEFp=P~32qM6#&q3CC}XY+E!}w^+FXBTY?O=chY62A!?xh$~nU+`BhF+v#JL}8DftSOk+@;Tgs!j0K45uvym zKbgX|gw~JV<5epASOwE=4ktg!SwcYkUpK1~IV?HBd2fZ0uq*X1kjMQFijU3bjW9MH8O3InnJX1oU97@Gxk)q0Q3*x(NWOI$vwMo0PnqPQM?k^M?I zmORUNTBTIe%`8}ksN>g$`~e79eXNp%1lgd8UC`h*WrS8_K+!Q_|E;Aq4Hw_}tC_kS zG=fZ%7ubS8YqDU%%frEq;l$;0{uw&0)9|VJ$H>#=dM(IH^t8_VS&!$fHoseE5;rXE z1(nzJcK5Mm&uwOpYnOA4Y#TV1z0pY%#>aGrFAg4e0(jQjD6{f8t0Bt1pj?`*`t|r6 zytke60KhG8Xi4TzChl<@FkN_;B*%J|%qH(_{9H|FvOz;-ltHd<+zM=K#X^^` zVoWjow4B53YoG<9JN}+0p4wePv~|FsJ+h~(a1fW{MW$6iw%Pla;$f_&9L5ZyC#@m>x-24NA-b{7D3vtATZodzgriB2;0{Ljn;HIs zGVm@HYVX+Ze{ITt7G(Z)7cBu8Hhqu%o#HF}hX{`Y=v6jmbW%r%9>s=hLsaejoDbus zz!t`S^svRi!EnC!@MZUVEJT|7j!a(M!fG#8+a_i6v@*rxnEv_x3-3BuntK6876bqb zaBuq)gxW(v`njaduQ(VGC;%!xEay^uzsCC{#atZF8XhL zDY1I4_pDXZaTTaSn|wOFp#w$ibOq^B7mD<;HGNklGi~J50y6c7Y}NM&s}PRu%QAa{ zvFWKDc9u3ols%J18I{JU9x_ATqK)it>kaN)j@0v@2;$&QD@$nK@;u+o&0||a^a+(_ z$a$l;-8qO#a%xsrO2p$mk@^|A;tF)EyVT(OIcvirsC(3iEGfuCIb zLyFb?+?8)_-iv_D6!*r0Uj-e%?oK^ZXPkTk<6R`c(*JQB`)(W(ll} zw~cq;oK@vRvsSB(u5taQG39qSN8EDVS1S|kTSo`v0RWWLfKhrSof_(4?y$^mSq|0E z%&QQ!sywHsl170?AVYAYa!Rx0Vy*9@y)tcTpJ%D_ zq%y<7ro9K^e52gVAR~|PWo`=tz^d~kHVEQERzro~>ESo1<4MEwqy^%+v2>~L6bF|` zs5#QZpnt-hZ4+nL1ONP%2}U5o=B2N4n$KaoO*5yz^1UZ=6Wy^L*rih9Lt0r@fGK zpLKjQ#OSNk(CcM_sx+Psqi8^1!T3cZiIBo#4Pu#qGK8eu+x>?CeCdxQ99HH{PXt8tl8F#R6Cwv zfF0WyXJDKz&;M^e~;;|0ITyRjrW@bOmXGgDv(zFWH)eND>%ywa`DmHxTXfZWQ zYMg$jZW-L1Y`;_CpY^X1XSP^BUQ#B;kxz@%Lz3&}m-p#!I_I+$CyNaG3+}=6&n_LG zH)J0I(-LiDO1az`^?kJSzRC=8$;jN;;kl@Q5XlNF`sM`FBK~o6VAkx}>^HQOAvm<4*$S;A94v>#=-yjwq0i=YmYlBagh`4f@*Yz98TF;I-#D zzr6lE;xjU!Y6FL*zA~^HjHSm`=RTc7`G$dwR*PMrR(hgq zGhTVm69#--G7C0yi{^Yy*b7JcV5+8N-IGR7^VmXQ)m-(J8&bq5rS1&6f4%R^E`k)+=>um~~tqgce0vmO%t%k{O*tz$|~N}Z1r z>s^{Xemt=k#2Tb-FxdVFb`GHV&9ifZ&V~!%;b(pt6CowN_PDgxAE|ELa+0mx5r)gF z3vK%Etau*}<82d&k^3pd%J)yuaoVnreBGW34wJ6(WH7EJ%7Y(p01kir8ja;^&N?bZ z!{q87It>o~vI<7{+*}!Dnzz~2$)b;U8T;X!QIsB2oQ$mh7pHWjaL*~qKZYydO$Su% z^`GnK$0O_XexraFPNfxr?}8L8M_xaySD4rlD+a{_Kexf=-Np2?-MX3&a4d7P09+An zH~v!kuO}B-d(?kpS=Mom=DVLjxSTlr62ZqOJj{G1DAG#dU^f%I%iuV!C%&w)jed7= zL9S8<_l_F!RlzWx5E1{3Oop0c)1!;vksu+*heQ*98Vr61D-BRkIuj9fmzl;_GJpoB zl%|6TcT5|ck%pIJw!u9y5mPU(j!@Gu3_j#csIrH-btzt@!8r@ekq0=!Gz)y}bAI#m znx^vA12Z#0&r>j?x8X<%y|%CBoX*Y-)da`uhkNVXLJ|`tfivr+iLS-c_%i=`_gpjg zqaQr?L#Xo;(z^#rm2woesIkCa+PEC{?c;aTf}xXUOtGCffjIhpZ#ybx;N(~?OgxVn z>dN1$%)+yRU<|bt5ox6XIL@1! zd^svTv;OHgS8ZNUKz?gjO+)GUqpAiK}byiZ5CT~>;pfgZ!cYxf^G zNJ4g^e&ta8ua+RGu%zK|Bd3%cbH?^VFqx2E14l;@n0x)OnM6`AD7yb1gIAcSi+d}C z!szm>3g;5Pw~zV1H;fTKBJHc|z9+kZ_tfY8!NH&$0G0M=27BT7<-K+@CJh>oryx=A zJ<=H`+3v`q=+XpC&m-;kN4?{pf^Ho7dB5YNXYbUVviS9pqj>qW z8RQ}As`JYt75Z2C6C=X9x_-=6MJF^u61_uZjMLMgEe1e(dingKGOukX|8H3z2Ve#B zo_{eH$%w-#6tol_L)uHgd3~@B6{8qQlFN_faOOZka1OJ_ytR0M3oe)9mbyaR(!1ru43=ClSd5$n51=K+#fa^BX6;mVw zrMG97mzVFKT6-G*7kO?Yy6!Z+XnuQ?b`v!>P>A`%4&(GdAs~+^Dv5)5$cfd4xTI?N zH54}#eg+h9K`KLiTsQ*1eZ90kV9&t>>>H#x?<#m;Y8&Gm&k%eu&# zGJpdR;9-I@_l4{&Dw04{GX)6Rw>>V613|l$gt}b6p-MA`j*q)1*DfC{vaw~m&EbG_ zo?)sA4(p6@$^JPtZXfI-ofSvi1&CuzO`h1QrIp^lXrfaj-r2dkzvV%p?C$GfIh3@-lS(5*t zdsoS%Uq-@k_QYJh%tjVu`Z08A%wo3b663kpfrt3V|K9~bMJS@o0CS7+JgEitswKSw zT;8sRUjoInQ)Jyjw2;3$8qGgGrhDEL{`*so_WC`$ejdY(HMouOpEhTcrq4{W(>ILU ztNmZ6n1_-MP4mMfLd3=>N^$)u@~8mjFlQ*gLd0$iS=IJuBxB-qK_Uf-**kol{ntcSWJ74+RZU4Ey zH41*xYGVaEYy5iGSnE7RZ}uh3OQ%xLY03IUy=Wxg8jl?T6Wb5V`qa23^ z9A)h%UC~T$)Ipl<=S7`2cpd}m1r0;EB@`1uP4ts8lBLMosfh`y-rCQ#+W*T(Umw%o z`2MUMS&lwx9|VNKtC$VeY0sPOff^W@iNiV?-;84b8Cs`XK74NC(ixYr>Fj36F;E5& zG>CtT{jXSRD@JfqQMb|lu)nGc;-LWIWWN^2wm&zw`L2k@F}Gz6V+Za2?m_|(i3r>B zd;E43aHBOTr#v%y`alpTr<|@rnyb!h^3K+A)ExWOdlUvANr>A0A!w7P9%38`8ZIrlByQf8+b;#ePA$fNW2b^c%k}F9a`(S;V;Y z_Mun|CDA6IUFmituG{x~;)y{5Q~cJ~g~B(sKW%O2ol1Wkwin_L<-~>OsJmP3D~ZKf z&_S}k*UUOWda-B^YB2^OEJ0fb><9w~aVgZpRED1z;bW`7)4Z$fcm_*rLnzC{9j6W| ztpuxg(G5k&^{L@q^WRYlyNvyMQFy%<@T1LrohW^VM?{<|xlwDq3Nf4DwA&nWM~a%q z!CBB$>?^+}evSwTcGut$vJ1l=g5xjOK$ke6b8cGcEC?M}d-A8a991-i1qVh6(y=GK z#!p! zm&UgL-$c3T0w_bK;|rwyBn}E{;bHl5C$^JcYzU~{D?dWAGTKn}aa3JaS(HQ!G zg{BO)V0U}(TX!Yau?M5}=vdT;LYxix(<8!+au|*~pGy_J_LR85MU~`f$=vgP`Fhu9 zyBq5mUxC*L;=1e2NbOODd&9!%cFfoJJED<^%$G_~X9gDf4Il<~B87f2)|rd+nC242 zgeL+o;s@Dh0_G1Vc!9b>VM2(CSQtAsjdsSImGR#QB6bbvaD=<{{dLaobjVusL2Q|D z-VK$vW$@HD;C(XeWk~@eFUJvhu9$_O)MGIUfj+f6(hgG|mqz9-M8V}DP)$$5|Bvw{ zT1qgx5MPsL3?;YYSxE2x+wSPii%7I;7eT<0!te3HS#wp@uw}6ydV<4Pujv$B&tpnU zGNW(xojUH%j~g;6X3yyuP2{2XacL~$hV9P*1v`^+7xP--+-N0AU?Z+A}UL<2g9sQyAvgfD>oLI#-z~B1sGVcFSCUqK)=FZ!usEq6m-$=k%Ddo9#9o zt|X=cW^gOecnpcWuPV0gZ$PalTmdV86NaOZOHkm8lHb^Ip7wt!Fl`M^?`AK)`)iB- z%L>ZvB2XM{vprPcE!WF}Skwq4)wR2VEcn|mi$tw*IIub{LeAa4f_`4LqONvpXTbgH z2#f!jZ|k+WB3>^-T(+OC?@S30;8r zhtmP2V;KLtYRPRCyw+G>UPiu8`^dbG;I4q!F1$-O7{-JipHLL{*)82OC ze0{aaWlp`m)xUKEN4Lz4+g}1bL;79swcO_y(ZJ@g!Id;G4CTHE&OsMLEw>}*T<=|0 z{<6Z;h&Vx!<(_@8IAbfbhdEfQY@(JRA|%7y7YuGzmIoyN^m@iFN=NZN`NkWg!Fj2s zGh`X{+sJYu8>YhI4|9l>O2L-J?Io1NYiY-`!#Y@~B#Ghu+2P0Dt2MB34HShuLKRp& z#Q-E>-&$%pYCwg1*h2jPVaI{Xi@0X5TS6Wg!|Qh9-Ck#hPnP!LoLF?g+MIEIJluEY zbmyNHD+FDrjM`xM;QLM+BTxij&BZTCQB z(1Rn=RQfBmJVQn@Ax?Ohm`qZm zNM`n-Y?w}9D{YIC8?eL4fZ(Izd5n_Po@PU#-%q9I+oOe#?$Knql!DNn@ zlzNGo;#l=HiTL(3NVDg62>Q1QS^DVixEQkd(|J>Ris-C>9OkhE?xCB1?>Q0Ivp@g_ zAiAzC73Z~p?v2d^lO)}3crM4eF_3z-9*Tx14kpJykBnb*FbB@?p$G6MA_YM2=TpVY zWWrzsLIFr3DvbIMVxT4W0*YZgbhF)yCb@pdqvA$GPO3$=sYR+)9tzmIMIS6n%5$@H zna%U~!6qm(W%B44Gjov8XwnqJQqUMy!A#%lQk;EQa~=O=WB)T4GiafR0vx7)m9gl5 zYk>MYcu!6G*;REv`g)+-ZD;r%Lj|b%-L|;jy!Skp0P7Xtj$5VvW5u%XopSD5@5V-! zyQ=~h1mC&JN!d*cr`~`JXSHDgj`6}PyNStZ%xh4zba7XHc+36^8-aAqKT9EB;`N6+ zDbT_l*|4#>bi>|og+AT|3422kP7;->9}OX^WM)PjX6y0Pc6d2EQ@hMh@@$e(4f(B! zGRyD|t7E=PkM1+d5n-y9O`xRdFqxUs$e?eAJvd0-qBap;OIqW^lGGKYb@N4w?wWB0X-iq`?h<6q$R0^Rl*io)eH7as}e`>071tGeX)^0V2p7(o(H-*04JxX z++5t;nkE2PUdM|=fp-@ETl-ux8nGVS*1cyCX_Mf|%)HjXGt0`C{_CEwM*@tJOc?nj zi*Qo_8(!%>;>!Ct@@lBXwk0p9yRgGvIUbVbVqN)LTw51NMC_+?pf=><;IfKpJ$95T z4@o3;{;G@YPzAE;?!Hx}=h}8NmQR?zg zI1GUJwjGIvUkXicLn{&p%pc)SEZ{AepOHC6lF9rGhF3)QjK@nQp2W`13aO_~%LqQD z)_;~4rupd_6PvU;0<965L~?Q>sQxq%0a8>67Wsolo#~L}Puu|)Jt}t!03c~33pz!! z(TKL{j11AW^XFdt`tN>C-+w{bze=nBRZ;49?6v*1Hnqw7X>@w+FEbU&JrXS7L-_r0 zW*%_=*iOz)k&=A8ju!&@--4=r4}S)RelB{li#JbXl_JFX;uDz(;)4Icv*-!{tg0D1 zm?}aNRbrkxy6E3mIAkkPmchG4cJ;oi8$M29&(hGaDS=L1MPz9W;od^Gyj8r=f13$K zY_#Hn3+~tNJ`?Wxt=4bIk*MW9WHA1KKSkB=d3$XTpmirSFde1luhER({$9@tf{R9V zWi3AqpamtfU~SI;;J9-2VRD{&oY_(!BW>uhU*2x!Pgmh6kXwinNvZleq^47YqL*05| zDeGjre9=Q|D|A!Jx6 zWU4+pH}{l|b3lY1df!`eog0KorD!p1ix!Bn6q|&XPZhu);7tGWHfhTv8mIpftiMx8 z^l9qKgZ7{{>b_$xzWc=#0ZQcAGpsYWN=3Ot_gR2IPJ~XZ^)8lz8tN(+=4P**OP7r;>AB# z+*^u40So#v!{3C|+yKDRs}gVEPKNV@{IcbOd73qwR z`wTKmgz(X8BqXHLuvwAp90o3D0=jF71tV*WBCSU>&@+drpq#-G7(kiuhOji|rT}cK zEyzqjfG^N+hS$vZe~>4G+j#Y}%g4i_LM0Io+unLlC5FcvIn&HQvGx1Q4PLH-jCM{6 z2bcP`;Z^_NydcQEmV5W|0mSQgSL#yR0Ym&S6&F#V>hD%1fq*rALk$CCh{``0#jRS0TLWmFhj`C*m!oWa7&37Atwv>{D5j(js+BId`K4AkCsgyg z4OJ&)v-K_i>ZVM|DcYo6S=a|f5F0s=i9!!!Q)J5Vd%QF7yRFyE{7lJ3wjfIT3(iiy zvuhGcgw+0b9~+P-3jJq*C-4y)8KW5gFCM%>RP4w8@4(YrsiTt8u6YHoUjrgxhC zo{l>YW4~@tvLAaq)_Gs98GX|6x;;hO)eb-47&P3cH{I2jYXxl2V+eTHiHp$tO6CnV zrDa)#tW}HDM25g83byh~UAP1g0eL^P3lMdpR-n7ieOH_T{*|>~<^LFcPRG0c+bR!g zQI^-7?DlydA5P;=E!e{lxoNu3|F!!l;LO}}KLJoUs0TUw&82m34F|0MM2ABfe9DvZpiflWR#X**R8v8VBLT}hzU=q1G5#0Pr3o!dHVI_9Vs%wiaOd@)^Y5c%W+x9Z9cN@Psn`iI&U! z$C_j3hU}-u=<N92Qf>wJYxpsa-C2iMbyO%-s6H z*oua+k#h3#w>7Oj^G#Zlu0WZ;E=5(mdQIScOM z#a|iWOslfk_Dw6Ciw5T>WZUbU!&uh>qY~F!10&a~fh1LDH8a{Y#?ks&Qb0S-cDL`Y zzfqx`n?WXX(jFB21sOcqb%uERnQ_c2B#{+PW&Go%*PGMY_8a|@d`Fwpongya?vP9V z80T2&_uypFqG^%It6U}NLB=xp%ozyaMOKC+mIs(5%t}$xyuVWS9c@^u6R{cD5`S|u zuO0**Gf4`Iq`!K|Maywwx2+ff&qeQ!$f{Yf)Q`w z88Z`>!fvpE*H;QjOD@^zfuyoXvB<3%k}7xG3Y8H1XeU!Xb*8QEU#tj31r^XhVLVyWjEp zb~ZH&kQIdPc1nKC*m2#>x1E!QFCYV`PTAR$Q>>hw-=4JZI?`++8P5slVV%SdMeT5@ z!O93P#Gq8ED#q0OO^Y(lTTyjIZ@h5#YWvQmXz#dsrkCS9Y{h_oR-zSQ!84+B5jH@Q z!?{+2vl-+5*{0)>c?d6Clq4rQq(PBE-`!;&#AqYX3s%^ewYA;HZeDXFWeruf7PhLk zcYd)~sMKTr9@ac*T66!FHjiF&ENQ+KW*~mmNKDL4Sh}ymMy3^YObb17p!27q5c6?X z>2x5EZ4*EGuRLu!%)W0-Lv-D+<4B(r|L+n0?#_E5eRJydn=~>gwg~v%4|xBO(WyW& zuq5O`ayH6Rix|21iHX-~z3@(|$#_d_es~FrpCZ|r%d(_PxKlsxWm{~wZ{L*Fsx3dy z&h`8TGQW4^cpFu|n*D~gx9%iHh7R3d4^y4yo|XdXPt)H60=`8`|FQTy zc)jK|ZQ9(mwFU&h;c<~U7b4qUe(KEamDX}a_Wa&-PO}^?yR|WSY=d+R>+g_8Aulv^ zTQ!Ob5+@X@?jw((52binX!+cz^Ge&YN2#Q-x0F9pnpM=)}hs7G1;?H+Of(p~M^~p!?YCT)O)A!y=#lTP-7B zTKD$2-kTHuYqia~a-x0UYcdq`yA2^Qh{;N%1eimlt-RXxlRfntcG%ci>U$;Ay z+lp^#p#Jz64yYN_nQ|{r1Tz*!QTh1EdRrD#K6lv1=fLUDZEI@h0lC1-L#cp|5aw`p zH!MeX02}VdKWo1XEWS_tj7doGYIA7#^M&F^eMeyDh~fZa)%jb)B-l>dYejNo5@YJ>daq$IFpGCVPGNFJvqq6sm_4B`Cs>@-i~*$tbtE7h2Dp;LX#`9YfgY1se>HP_$S>tUtmlb*fHCL$-5>I*PsmhWXS*t;@HIRrz~E3jqalE~`S zY;cMx#F0uAIj(7c{@hn{eU_xCu_ddFr5|UVpJ&zeInQy<1#VI)!3G=zNuljKBW1gv z1wQlL!1u0CdqMSdU2{S$e6d(B*>KosNL11IYV#-dEam;c6vLbhE)kb4;E~*Ui>3#7 z%Y2D|udYUGHp4XKS64?HV-Y#u*7|u(ZzhB0p+c!<`F*`QU3WcaNF`G6bsLYwC`a<% z=PMg-a8;0oT>Cxg;`95!msgp;@05_mTVM0R*I}jvMaUfA>cAKXi z@`>175tUFTj#$W$sEj>5FuNhHvF)M#OEwC!J9|g+z5DX+N%!uiHHv3=PJ-bA#b-ppz(6hST zzI&$oeEh`fYJ! zBW=^AjjI%bY0MyIa={sE%eml^#1J*EH~iR9*QDL%0zKX$C|~LYz6H_UcMtRO$Mqvb zmFR$EuD?ci2mfqy3Nx7r4ui+jlZw!fD^q)P{fuGNA*IshV^PhV)2<+eEy7JYgQJA#% zYsmJc^}kt^mZ$Vd3CBc{izScWPGwxrtKuY7QC0K}YzOSmp(uJjhl1JXzxZ?*af~$Ink_ZzwPT zTFUZ|O^}Mk#|`5O7#QTmJHQqwzPso%Jw}Mb&8WpSc*+}6T0jL zORNG;kBfuxvjdaW^B`C?O$Tw=brPpE*J&gWiSKRN@7h|08bEXF9(~S#`)}atWftlB z{PH|A3{VeFmjN*g?p)e*Q;1hfjOu&~$6ruIP@V@?sja8XHzTMdN##-nNA6V|)usJF z1~*&~RsTde?17DOvKxx~x~3@FQOvf);1std93r^IiGK;m4lWRq^B=@%}s_!5JSUu-ZV#jZidT`bWxrs zg9ghm@gJEYDRzVK@G_aU!YND4r0MJs5!>!#=*ee?WRof{1-T;d=B8G^HqCDx3uDx&X6Dzy-w`Dba z_x}24^`Xj3L$1t#!%U%|$MufakJy}E^!{|;b>(Lz4^)P2pV-m-OS``T8F!)t4JR%; zKkTYd;_d0Iw^?!Zvjl0_u)*jsk$(NT8PAeMT0*wo!*Ak3hmAI_z~1J{eH+w}0ii?l z!kf4SrP!m5kCJsM!IKB znib?WcK0LAZ*C4{JihB$v6az=ZrQ|tMqNW(D}#RsrpI-mo`X0Qi?EBM@yOFa5%3&Y z8f$)Jx*6T!go)<266NT|;9!Fef}i{C00khui)vfd^*l{i{bbXaYA9vDdbPPBc zuLVrLK8|+#`U?4`Sr6_C-a=;fwKbP#CFsta9y+CV@Vx8ynqe!$DE+|a*egV1`oXRI zOrJZD&mJmwNWJD-9cYGnIWl{)8l*3xUOI`LlV8uZcXX7w`6SP*mL=BsTh71Wuq`g3u_yh zdUznh+ps{$xegvSNmXYtS7(=GaQ$=1$QJh(j7Pfy4hDC_&Z`n>SDj8C&o2GosX zlHQpr>mSb<6CSZE@1Rl03^ea!ULJ`mHqBlkazojeTq)Q&J*Q zt~|qa{s2Ft-$o_>hO_Fdg5a2)hH6%;g!ILx;+t9o>>r_c;(U+EliB;gHb5O-4$KB3 z#HID{!emjs8LXBUx=YNi3ngDUJ-nIwemcH1KCd1Qy1LLaV8qcPtm9{Aap?5V?hser z_Vk&xv1f+Puu4q2Vb`;8N%(5MpV=c80v`IRO7^|PCY_+J%&B6w(OJx0(F4N^1t={D zr8C^q5t~%ho+KZ&3E!D2fHaoA!h(_naAWVTx(+Bx>0;9Ou!(e^ zQH;_Y-?Pc%Tt8n_1K@*%TIA_EtEl|DAH%EGR`ae2)Q@Fi>i*Y)NATE=2@vj`oyiBy zLz3b2zXp@EwmuJ)5Es|mB1-r^kM&b2K=m_@vL})_u3^}_eW7%I?N^WHQ1k4mC**cQ zEMU*|-7eR8Y#D+#p9^!8f#f^{@7?)ZluW&PZ8T%pnn#ALge^CjD*+#!{3>QB znu>ibmbtz|aZG#!FaX8qL8iDZi)mHFv;L8eN1TngR~d~D4|F{3HT#n3(L zeON5_VQ`8m%RkN?O3-(CoHPC+N}rw=S|NJVEU^UirhJz?e53NPJpWmSf8Jn)-+_)E zcI!y?C$i4bBdA0D66oIT&YUo%dAD2!YOu}c`|x70N*SpP@vV(0xT^J`j1SP)cGBO; z_czWn$98)Z%-b{n5YF3JMoXJs;WQnN!m(Lvq6RSmnc~`q2YO)620Aq}=s1W17o2uR zQ>wLX3H%mp(zyDZ$iLLh1dE>)|8$KQ5T`a9hn~9|EZIXaxi&ZdN-oPlu9bGNTW_)L z`OAO-o`?D_7DXlzHe__*)OK89qs87_7RU&e5HIil%kbggEi% z0--FKC=0rpDGpq%<%bKd^hwB5=Z_-BKB;YFehS$;w>mA^7d{~&q3~C~8;WlS>!gI( zKS~E5h9Qlc=$$SOOes5qj7ylKK`kzSXc19RmYxu9<3rW&Mk{Qa7MC5*(~s{KS*J>d z!{e5PyohgX06&h%%ECF7bFmdvJ3-WkKyyMEJmEAhpp4;jZY`w-xqXhf7_yi{+RwPW z<{+F_*>VsYI$?F8L>j|;$tco@p)bQPu}cXjKdGilQm{boMo|2391p8$jm3ABi_1}^ zp_8yj%?#Gj6sezjrg47_gHmLU>J&+J73MRc!F44Gr#DWi}L+!|dluuCf@V+-X#PJ_?7 zPwvYgqnY7@n9ioyGroKc2$yNhg^0f%NouFM@XBY_T%4qrE)_vP##%nU5>J!RVrv z3LyR?0=*O@;6I|AR=KCP}zs;wrxA<*yxx$X2-Vej&0j^$L!cn z$98h|{k+%tu>QcDwQ7#48a2iv5(Uu-xD>&NFi}GSuR_fWnMdF&a?uM8Ms$D)Xnu;I zC#?ow3G^mX4ZLYL2CsjFX>FdK5atV=j>Mn_o~E9_P8svT?f#W0(MET4nfp_++)+Pg z1Uf7RF1Taa+@vT44OkGCh$m?NbI{9>LhCA6fXak~cRZvu;XWOXl=eXG73e8(^ZlU; zcJlPVan9UY^x-|}K0{3nfTj1j!T)u|zvpD#rf!SX{Yr1ST3b!K%uGd1&DoJHqZ>V- z;=pJdA!5W1HQ@DJ2joX6v)c0LKVGN0%n24H5IaTH6EJl~BFW~NIA9Eih$wJ3A&I7e8kfNz+3mn>H6S`H6&=j>UZ8QM z%V1meqk1nM{a8xwj@@LgFfvL`pF>u&vOmqQFHT9YHAz2MT(9Sl=BoWB=VOR8Tm?TG z!tGDNTyhQ_3Pz{A$=_pHHNFlANKx3Nc^pI}qz38ic3ma??wm?3aw8fK^1y(U=qCoH zV(yHiKevzB`~ZTJY1^Wf)~Kxv0q_dc8w!%hR8o*9X~U=QI}0gMIYtonPA#0jT=laR z+2y{STfX%@@SGgB-ruN@8}6iXE4qtBJ5u#bzKo0tRbF0R>p*Zmj@{?`ekrbL=*x*L z^kQTdc!jBRuB~%E$q1&52*68}zHkr+nb=WM}!U-l(?Mn#lPl zxeOGwR6_0G{4jd&D3#1tOqlv<@*iBBCv zcquBx7dVM`7%_(Zq+bR3gv*a5?H0b!ZOj`JfUGW{MDS5^H1b|1pww}{xT1MwhU%KW zd7cMin6{x4iK}28s!HL@Kg5=HqEJ9|XEUN9LL#vXb(Mvl#pDu4pITC(I<$L5&X8{U zfd7rh&j~(GYbJmd33qlMMeScD58xlpOxFBNc0 z(&}Z13uhG#7PK=@uJP;D;0s)Y=0i~^Nuy6BtrgG=dDbm;4NbH4(YVj27UI6+eFvZW zEO$MxSIS1Ozj(PGACVJbw^D_joqUP2C)b+|04YQeKvqEs(dMba+D9D&i0lm*#50)O z3TXxb)PHYMwO&J^?|k8pg};AWcJ$LGNGs6ZeJM;F**X|%0HZ!E8M0sQRHb#X~EZxO4ATQij#RIWg?7l{!02AF`hWu81-PJSW^KiD!tc@};{ zz6h+va#E6kj2_7Yh5lby&C8-uZV^0T9vngQVX>bwL|Y3(MY`^ZPaNpzCuIt24EdBAE9_PsMrd;5RyA^5Ly4#RJ_-B09- z{_)tY>`(a9K;6HaV*kTiT?Ox_3r$+}fU8}fhm!DuaEQzaDr>ql#v61(EMfW==?%vK zJvQZFBz5jXQEJuC?d6q~w#r8Kk0ZyATk55U$EVn8ee4@DEFv)UF>!`b!)vJWXaPzw z4w^jBvA|e<;~c{GXo(`Hhy4+3VW9Mg`*q#_qI^FfqO_Fi?fsqCe%vunyTRw^BzZh> zp;y?E!Re2>xuWf!u+Xa;RZIJXSmvRG%X7 zsBA&kXdX)diwOgSR>&--r2_`AICcmWW2FI)Q2RJORA3_HO6!AxEf3*){BzHpK`R8)`;ni4sI;IYdoLp8Fcln71Ds*yHfA1eNM#*1r+DDR@|5CKSu^a4QWmJ>DoyU9&UM{1ZTR!)CK5_i!;G9@%L+MM zXPH9X@6)Nzkh9Q#L)^qpGIhlme(YnvAGuaEgU~sO0Ck^@fdSur^8r8Gecw2#%Wc2L z*OD-+0UoxO!onk;ry|g64ZS$l#%5;=XlS#LmrhICAHQu$n$`t_ggG){B|(yeSIl3v zppd5}s+3>)qqu=v<(i)jGT&O3T^sdgZYz8pQ>{`Cu_5W>mLS4ltjRmL2Vgtra z$Q?e3oYns@s?*GR_$j7R%grD?x-38HS~)k$Om*edbs+5eX?XuhC)}5kB@h|UOy@B> z6jCdV-Pv)8thC6Peb6*UJosyw{-2m7DvOY83L{k1)70;L>K`hw;Xx;R-~ba?toW)E zpg9Py&9Rnw>r(zE%vw-91_z`e%Q`X##IV@s)@OYQyw}^MLluE3O{DEATve+Gn?8dD z+AUA6rk3y7QQGHTMp>?q&q$P6SE+oK+0Poi-krqpr)Qp{!{lR!?e16bfP{!4QuG>& zAbeW68-HVXk?@1Ud>>*sNL_*IEvR4_1TlU6oIca>Bx3umPS-~uoO|B6ENtYUb0iso zbnu6M{&?c{xt%oRdory3UXn^J2PRmoO{L*^wXuYBwn+LJ-lXRoXNqZ84O6yIk$GmL z3TTa9PsFg-Ktl+vECZO$H;Gi#Wm)M6E-kBVk(bc{6lcsh9#da&Hp6^pn(4Ozjw;x}%S21l zW<7Jk==cnWT%!C~LiMRx%b96ta1YUZMrf#T578g8;;LPjEVV&_3j`FLi0-hsxQWl^ zfAR#d=y8)xPsiG9Y)}i_{Hv0ygXDSNbUqw-CuT_{+^vfS+NLA|zf?$gtaKn4`Mb}r zHcEPLVPe8Mx%#b}0wRt&B@efWb8!)*$sKlGkjw7CcK>I@ROnA!!38SHzQuCF`GGCAPq3enaB;bLW3YA6u?DugcAQZ&~f}2dhUg$ z@aN~OB?6vV^=Tp#xwwvBB%yBeX=E^YW~CNJ4Z)R<59Ch!xy%#72_v@AyZ!3lXk3}~ zbB(8HV!z=%2E*2mIsf(>;xPZmb3<44tEUy}6dC|B92o&SvW`wZUxTL8_arY!AqG`m z(@ydX3D65ZX)51hHlt>_M&Dh;mg;{a3LibE`I6Z!&u8X%QQ0RD^%0|Oj!o8BpBut4 zr$_!c$pD{TkU!8n>zhNme6zlt>52mBp_r=G7b@mQ|8N;XGaU(2FKv=)VGP`rHM=)mXRhg z;jBWe+@f}csq3p+CW-`ZWx{sU_H&3z?j8f!T+{AH`%t--%ThYUdP|avx#E(W*hbAS(nN; zE`nT{KWw>aO5J!_%S7r-!YjI$K;V!dV!PVeIMs#?GF?5*4)*4@1LADD|*?pCvv|DA34(W`*a2Zn%oP$uz zI7~iETU!d$Xy1dIp<@RR;9t{+c+=`U^E;f#qkiGQpYR}tea2F^)8$O<)7Q5NLByBQ z>5w!%Q>VNVX_W1eI0prA8z0C zxGW2*94Xta&H6m&S*_iYnU?qI`%!+7)-0dJR|A+_W-N(0q_F{U`a@BEhz(d$TJAy^Py= zGKqJ%5Z3y@j$?Q|qFu#y%~*dUrr}63vMt}%F>sd$)hj9M6n8sNwUXycgD@I3w%vAz z{ZHLjeXe(&f#}K`l9R5R*mnfsk-Qu0sqo$?C$Cw+^qkM2UA?LRIT{ z8~j1QZbvZ6z8qT1gJ_f-OuG_@tn}rOX&)eZpmm4ybb5~eYZ&xEw_B{ARVeNN1$Cry z+t1#|oKSoAX6@j(!BQ1*lpCYFe^}DCAYhbk3u6RK{7WRC5+!@vunmmFXl-m00$n$* z|B)~T=YwP|%x(H;GseWd-$-ds2dpsX^X*q_TJI7P93QN#$~m7vy(coU|1M@+*7{7_ zj6injKSz#Hsy)el9DNaRzj8cVTiX0o40u|`U7ab=zJ!vx`mC=9MZJ*nDwLyoCmU>G zUmr+hp_Z`CQpMA&;5}3AUSzzfC`E0QKI-IazAKn{OO?fGrko)-wQ}13FzMpHpe%*gT z-R7eAYXFki>!m=7iTgCUan1IO05`I~xM6M+!qpLrDRcUWdivlr6$Qr%lmb zbvu|@u?AY^KDIB?CBid0hh9_kPK`_=B^VWF3RA1WJ4C9@Z9Z$paiAJDTiAxc1R*0R zoO*y3J9r@gCRh1`AOuEShL{9HUbRja)W|<+nJChd+zv4uC0Qb%6(t7o%9{pB7ex}n zPT}uy&h*xpr;9SBb%5Z8EEx>-#3+5;n~kLzecR^|_kt zc;$2VvtZuW`bzH;KX4K%oaTMq)90ktE2^TeD{f68Y};7>(a_R}FCUeIX*=oM{j-}m|S zzZ`Ob>^KNZeKW;A3&LVEI;CWBx90ACvC3colTpHDh;B!pj z3G`5l3@B+S&3E!A0TwC6s>ATlG-#N}i}PX#6lH@74YGn`cj#DAt8Z)h zi;S(*^}_wx<@&21*j->y68<~{U0J9ALLraIv1VGewMIMovYyL}(RGgp;9cFlD2%%# zpjx8Y5yOQo?8J=-wh1D;v05bfS^7c~bC}lpSx? z5=lo9T%D|sn8PVsg61}f*hPz{AwylA&pS@6>G?2M!)D5KHjh17ik#-qqz;0(+QY31 zDNChfw`!oqh5weL-AnV%N>ShsDYt}4?lT|&fxqthSxxPsNQtCE9amJ?jwU|bN(aXm zeSLEKK_Fy+ng~-TH{}??8Jj7?w;)rI;NBnbq$Y44EsUiGhZH{RsKsP zBq-0AXG4yUJHTyWSTFPhd$rv=qU@*J-SB5p0A zk2&%*z2{q{xXq{7Iz-TH-={T9-ED5tT91>XkBc&4i2}y&D~kiZsIpT!Rs(^Ek2*5^f;>vC#y! za~KFLG*miC}($^pX=fmdg~r&Y`DQA=}djVOG{8It$FwBZ@aIjig=&q zB8Q8RJnK*%N(p0LK-IPfkPqE**m#4Ie)?9-#&B6e#v!eJfEXlX6S6>+Fi>3bAjRFT z@+KXGZhdZc8FSNnt4-O*+~y9IIj%1?3~K}y1pUp_Bpc}V+I_Yt_DEuOJb$`nXT-vL z=YhDBY~~Hh(>@lk+eZFohFGF!TO{1*Kd|n)kfg06ck3hl9iuuKIte({9Z+M&+g# zYKo%GKUB@%VsIlfn#_sbc0ZA;pK=zLZr-&A#o8)geTlbHhp8PcXSxHE4PF<_YKq zZC?FG>KPk`9=?NI)e9*7trgj0VSyC!cIQXW8(rF~Tw$}>K6p~`c{1Dd36H*2f;5#9 zRK)=fNyT@-Blg0XKv)z^F_#-dnOwfwO-;?x>hTG`JV!zfvUsZaNpPgBsmagAk?nJK zT7>;NEBL&bk;;E|jlH)tJC(6W?M)=tX1}$G0T(F45yoo^*W9wtqq6xALPvMm;oOVmmIp{+4F7S*FfPL`QQy`_>OOO|q$F_S&N*_5tnBN0OXbom8BNKwb zE>C5v8B%!qFbKRZBZ3Xu1x zCm`cv7)MSOPhO_q^e^N~c{_Uoi>MS$#)m^CvLUQy2k&cnc;bRpg(MdcEZ$cI>%-%E zL4P}38~rU6wB4-FiksHISno#n3L{Nzko66j2rU82FDc1*YIS_B)o%N0JIVWg%6a~H zs|_El+j5#@+;mw~NXFvJhwy+8i6-T2K&ZN>(K+u(Tr5<8L$8selG z0@33)0#$Z)D@1q!%n%@qzu^P4gaXpSeP)=Z_KZ!}pyb)W^KH(pmtrcKgc@yM7dDiH zUe$Ab?gF4d=paQXk*?ZroAUOSXMI5fko6vCBc*bEtS?#_vli};r+1p{FY)NnAVwP$ zZz(bKVdu4CfSM*_hHiLi-RJ693RaY*WHE<#mIr|BelRT9UH@QmmXycW+sc~mPMdTE z@*z_x1Z|&~pr=l{I0uKrKeq}5Ys(^Pt}*2R<=mECPPa+2!-owQtBDp^6^AIXz4Od( zsTM-ni7K-i41mMmq~F{YvHXl@5gX781T-~+|&DJZE z*L6iGx96nGf8>2OAnZK0=)Fu=X2&0qdMqWW z>=rQ=@){77LB!<|xOFHA(3tBqKcA5sOSxrgciDUSM4ibdmcr=PZA=0uauVoYEYV@m zP~(PPi+rws;7e5GuUsDhe#JT)ZLOK9L6dTeNZP5uG2)HEXzu{@m7)%)I1li}nN9%G z^*!F{n%oz=M+#Y<#=g{oIa@60q1&W5L}7cTG$!3ENS43IYj5wi=TgR#t+AQ;j=K%F zA1C)|zr*nDcY!tzK1Zc5{KKynInzDJx@bpILT`J+rLI|}*Xup!9hmf*%OsRw^z$%N zxk2*Q)L5~o3KTREq8}n>nn2(8o3Yh4NR;ZXLzov&WtBf>yP=#vyv7FS8Wt_c0er`kuQk;mvyCwM{d}h%6 zi^*8B-9i};G4q7ZJDwv-5%^Z0NU&iFp$!s+lZIBI@~8uY-wcKnXtYH4{uzJB&a;=^ zE$G0Bf%sF~1$2y`{J2_LlEBSr#<%jBa(&&F%Fk{U2sp_-t9Vm`#jUi%62dJBCtfaB z#Clf?;`7#P^ZceU`{iI<_?7@h5flaCc+HVUGdI@s4seyjjyz>Q2g^sIXf9E@qdL)rQ18{dvPH z3Pu&PC0hvqfMuu_BcQisf@M4D z->0{__zex(jT*jhf{}ML7nM1|e%%V|4eR%HdiUwtv~7FQa|6w5cP`&|rrHk+qdV@e zx}u0@^Mt>#`Q2>u&OF~D)GHW}kR|*Pid)$4x$WU)wBgG3_M4=&T zxTtV;)pxN;GC*@6x$R@Ke%jXOfs@Nd9!Lo7Vmj@_j-VYnWwb3B`~<=`mB>Dp8G%m* zBF_tB;9Dq}G`@!iGTK5?#yC2a5rE+na{y5UFcxdY0Ial?t!t$Y4gNM)Oy3-AIKa=) z(fq+sNb@4(xihvnA^QPE9w>=B48heMC4#0kf$$*vjcDgmZSrdzIL$`1hbRgT5>fy4 z)$mkGhH+9bRLnRrfdp^XI%@y zM1qYl)eD00Mpv4V(E73HQ^vt3^zt@0D{Ne`Q%Ha{UhlNaI*7nK_arK^?ZrPgI+n1k7X4AUw6c8A z&eYq0ht8)}Hj2|F00ARF-K+&5juo}hl}^S(*d!%qVF}W1Ws-=CK|>vj)zhXq^xu~> z@d(}2wO9I&gI+#th@zpvS-dC%yt!&kBL9oMP$4b;`5#SttKtPM+nFID7O!)7D>(ga zWw9dQ{a%sY2@$LvtOKwInObwpQy0IzM*m8n-bO|RW3dpu1lm-vLSe4&KmnYoq-Q#( z(nP@G0$QpOj~t3Ug4(X!J6#HqiHu`JQ?xKhHXUOfI-o$$lv8C$s@Q74(FY-6a1=+$wgS8OW-ODr@^LP`MpCs4ywXSc?hrEOEC$%%AmJajXB~lSRF0F3 zZ6DJ>mmy96kngXjwh4HAMZU9PR$%!#wF^{JeYrSL66m$`ux!7047qPYQq_#kScbZs zHo~Z_vaGfdkx)Tl>5Y%r#ScbW&Lt)TsLHZxRSs?=|e~jSnC-9=F0v!pY z@bGo*FE6*8)j04dzwsvG|LY{D@_-a|md2?s*mGbTxRCbszB8jcSXo-y;}cwXLm5Ls z0jXwjIq|$ElKnl%RM0J=641VOq4T3yAfjTD#uhQYLBd2dq*&3cy-cH1rPk(4D=Y;K zQIU@t99>8)4K$pbj(TIFG9W9^!fNm9_Fkj;zOgi+%R#JuGD}mXvIIZo?KLG(SZPX> zGxLuEK7E6WYa4XVa!-zjE<$Hq7;FcKao`nnbYu(^6zm+| zcO;G{m+?^NcNh_}ys|2Ax9 zM!&PB$4<;f?%WP2H}>%S{M|A96&3(jaB0TUe{NmU9o^$=RM(pwlbmcp$^C=NH;|Goe&N802-#5afhime9 z90%Kg8^i>bRw?g-aHV`m3N0+Pn3?}jF$XXs#!S>TH4dO7u)uV5gYt+mut>oIR#o(B zC}~VN4Vc1ZN@_~#+Ux0+U+yojf!n8)ky;M)}u_UD!Y20%QqN=2w^Q zvfK?kM{;)F;=e!oZpzGbEoQRg((Iy;V{F%WcviVVhf!1p_dV-9keazj3`ppsw3q^l zNKS@+L5&{=-IDECCu&mW7mUiLz8TbC(|V(EK^#*+QJ0o4E4MWyzwM!Bk|9l_>sS(R z^shci>WpzL%xOv4DPZ1~iwpcyR>K^#jIY#+DL;p}46aYB!<9Y}!52_U9>@A~=o{wD z+c;sS$rWtK@=(%r$boQpZwj9|5F<7Ee3|DH*j*-b0*B!vZh-H^$8&3=@5NYPSBJua zj#xWOU?G@ZjLDNbTD{_*kAg;Cq7(0RxA zc}x3h)MK17?HACN?`vy$X@l7-{Nw3r2g4?neOBOo^d$H5^Fy7hX0)}X*Ehd!XWHD^ zU%L<+5_ODilhEv&#%v{qE;*LyQBbsMY>|ug4G*sObK@Rmb^}`Zg?w}pM1l+z4-Zed z-dM?DHcCRkI!@^7<&bm5=Wh9ame*m!aBjY^RqL@7OsmS zF;@bdMHm2nK>?A;)1wqY+CK@*hV;~^0F;dSWaZY z2W5ee^|h1Sq2Om>kp5=e#kEE&cC}J@E+8YB*>2OhY%sCOcr;|Us~V8kjzpC@a&|gI zjME@PNRMe7L{y9+Kyg)A78|?_)g_vR<|Sgp??48(d=+BXwL9`RVfG**+7Uq(Hjd^O zrlLl+r5dBXD`w;<9|anzP8LaKgbrg+1STt699h;(LCXO9@<#u&58M#0Jb>|Q>K3I+ zvTfOj?>RtIM2gI8{j@S>p7|#gEz1ThJ{Z*nvUGVyesCsHK@5iv&8;88_LBFP2Cg0~HiB<~O}ZVmx(Bbly2r#QPtvkGD6u4w5T$f*EgH&%!5$c!5emw+x;mPoz0Gz6G&0y9 ziPg2Smku_;w=IlwaJfL!1YU}qkz%KWS+S@17W@f0h|mK#$t=`gaOhOAMJ2t71?oxJ znk0EM`LU$Q@@gmwLRl?<%0hypO1{}=$|VCF4G>ye2me7WOM8jJT7Au0Wx~1wK0I=u z3=$)w4Y6JGpe7V-?ks#XC_0*o9Ap5DNAG|fHR~F~Xv1lmb_*__8@3_9Mh?EoeCDle zNBB9MSRtDy5lG@|`x4TUflTF*9!i-;!>1%;H=oJxXnFjcG}M0TA4$_!1+FpqFMm~Oq{JC1m4iTDEBHuJh!upa68Nv3 zQbWN?^mr;HgB^8jkr)>Xys})#QX;&2OhqgTO(mVN%NRgS zkvzAC=>0Y+g^5T~d$4P@rD>>{#{1c<*1G*!<*m56gEiA}k~{tREF8fqN$7c)2>8ux zc*UgMSbPwQolA}VkRWwk6T|~|Kvzr`R#DY(p3i5zMN?EOxCKw*MkW>x6HujG8|@ZE z2BM2m9ssV&00s8xRfI^FCIxnjKNc{KeWBCD(nYC(xAT>RCtqN+h3L$SGd{Q*L0B<$ zWS2Dx5hC}6*VHu+C@67U0wHuJEH1@b+(wv2EYF09I7%NTQ?W+V7$%$V2jjPNTyt8$ z0zr|VrTHjiMhArs$fv1ykIyx_jBkPIWAb45?OuUD9Wa`E39t&NkbC3o%NqOTC`+__i6W+nOs^=TW9N=Zbjl! z$o?gpCxi92%fr+yR^@|lmndCeAV&3Nz*0mD;ufc}7|2AM7-jmc9ZLYMoa$qMKG|_3%=GeMg~i|Aex^+l=~(=DN+-ZGz@*2ug>CdiE|Txy+X!Z z9o8#4(G3Hc-`o3JtNYj;RmwHnXFY@a`*6(N7Lw=WqUkUYns}Sp_UC^&3aC>G*^g_H z?e^G-h(BgM+t<+4M9LjEaeLuJ^=cJyCrV?Wi+$9> zn_0)J{+3q=NC`QVV>MsGXBypwN{<1Qsi+KCX>&we2Xdtc#gBVi?ufrb3d~A*6Roe{ zC>>ZdCQRxmj!Li7?VB|w&~}#+-jyq>ibWHc83J6vtSjvd`)cvpN;4x4cIm<+4$$Hy zBl+wTr!2hR{Su4+W#q$*X#MmTf#VF6E5?>D@)*q@9#|m?^}%A!XaKGep5lk3W|8Ey z?9h>orW<|$iSuuFUE7cGa?IT~WPYFLUC5cA^}ynEpOF|Ii-@$2N&lxj+0N(Jvw7cl zrN05bSpCvyfrDut1fN%~o&;43;8;FzEjjVGj)<;#FDid>UoE`X`(6iUg6!9;VKp5n zytxPfoPZ6~s+xXn3rj$21=gl*urd~;)YmpE+x0l3>?LBm-OqRHcdV}bvj{f{l?rA& zgMi6^S#DXKG^JW`lNHq48!isPW*dkyTm~yFy8|8p8xgKB5mhX*&eKn1{VowrY?rIX zEYA)i(cL9LtXhhoFRe&;Yo(}YJ{T;Qrl=IMz$abxnrinbS)6l&!?{}WRj=v@A1)Ny(GWA`c z`F%z6PbWsl-IXe2f86u?yFRD#x7zcUyac@AE$xf5i1W&y5G`GS%2SbhgXRuCIHs?u z8O^Ax`*N;(P-^Oiw!kY;CDwGYn2q-p)aKrA`w0Q#W}p-i|8)e&0L-6d>!ZwRU;@Id8%`B|xsA{Dsj-)&%GoPMSL*h^>_oigR{gViU-ka* za(lpyfPgeZkV?1D%HzXler%dPZ!eV(N0eV}Ao7bL!H%EB`-vnmLPNHQW5-bbZVy&W zd#|A1AG^?z#x!~aY8>HWHP-fw4oltncqX~U=BFG00Qifksh837w61iD9xoIYZ|IG< z^D?3NoOLMd`{u&suszic8LqVbcdg^H1l#Zdw5+VFY*;IvC!IBxr2+BZxd?WDte8G0 z$BMWsCKVAQDf2p(k_nJCK_#Ri`%g0dsy>Cwu|r!LG`mBk8im;zcXC7FZaF9NS6ibTLQFAhP`r;inn? znYhZ2?`wAF^QUcHt{$)ou(J>>7=0_UkU0r;ksl@KsF)>{G={HaFHM1DS|VpXRHUQ{ z2Hb1YSLW~AJ)biIeZn)FU0o>WY1YU0UX70qaN_;F43a;7-^4aqkL&VgDhspkd7gHs;t}dd&fx1|Q=YQ@$KVSIR zBXHkz-1Ptc#K6EXouMU)zJHxH9G<=Ia)|hw9-PUJ%WKrE2qsRF9l)u(yM~Fzx;^7++}OsxpaHJ^NB4W|kCTOt#8djXE+i5klKArV6p;fTDv zIDa)F&P0Jcz&1nOt5()_IW3to;?4!EycL&nNIR5JG z;r1n{i1B(5ZSb%%5$+Tb>knhTsnjs>FH^o-7xEl~YZ#3oVlXXT(WI6vHCZWaNs8sjsH$XGJvaKcG`%35f@}*ia=;~v79BOQ zNHaDGUM%oc$*#|a?diE$R!$R^4f$Q?a}?EO-*I%DWj>WY5QRzqv>~|g2-5yiHv%kQ zqat?ip{#L|L@d^x^6zZ$yozY(fBaqUe@U#bg6wjwQ$&lBP~kk1_6$@kZen1;m7J{- zNox(w9;SsXHD+_%muR(LlQq+z92psb00aF16@LEuI7#{a`z~15{;&O1AgJjl(o%b( z^zWv#tkSq1Di?caKfl1r@=BKFo*utE0Ai>Z1{NmK%Hr1jSgJ#<3(rfo9Va~uVrsb~ zdBP}LF-cl;pSpY~8_-8!V7ptve^U0$Q}nDM>|kyg@e?&-q$ObjPQ)0gvJ&DpgM_M; zqQ&Rom2jUN|GMpH{{M3UI^SJN{ne_PCO0a3dv9-lz$3HUfA0|zSDhbCrWwo-w(U#+ zYqud_dxgp0`ERD@SHL%q)C)L{2ZFjIs;UOUkJnXgzZ|WMJjBorK8Soz%SYi2qd9qQ zoS1VtsuVWMq)DMr|FBTj&zI|r_ij1nRjIl#j-g;YMetn-I}TTSDo#VhhUQBbIh!15 zoEy*ayCXIA1mR)&#Gkgq6&$!u{;O=&f-NNv4jCr=8Sh>OrqZ?fA4Os^oIZMy9x;{_ zL8&q4?;N!CzTCE3mn_afR$dwg_D_|$+uLVtn@;Q}+0IPQTkh9>JyM-;0ny*q^1Q$9 zQb{l~202P9+@P;P)ST}r(06aiAVbq%JBpox6IKeE?o&_MIOok2aAi01iEllcqXmA? zVH9#%0>)Ii{lDKgfdmy*J-zCvsHk)nM>fD%jLAgtxX$rJ)ZGCz zi<_Z(_+}a?W8e@?uWW1w7u)76S@H)>oY9o8ce$P!(1Bj|=%7lkDW@YMrb;_VXo{!& zwl?sKm(s+-fs#P4??H5HDZyPG)pLe0f=0Q&;mb z{*SXN{_OnHtbAYE7g9ZqbO7W7=qlf5PvHH-E;5aLHd1P=7%QkOT3kj0nr1#rJQ|=rA{y z+rsX>J0)gkLdX`17oJc?e(bo16&a*!k?}1vcWQ72vlkDkShu%{Z$E0%hNjB0p%9Uv z#-7c-fAY;c3?ZG4A3m;z8RJA_F?i&gIh=b6dg(uV?_JY@Fn!rLUbd_>`n)=AYj@Sk zO1SW;TA>o~pz%TFw?VJJH`{CijQDHBQ*#EN-kM9gtgvmjYalE3L|?ljW~1+Dh9Afl zM^D?`CuAbzw2>g0EA#7rO#_EgS%%)Pe*qgC8=xLQRVKnG!5<_jBsefgnTE9ZRyJeh zLVDDmcB`fAHSAQ0%}Yxw&(}89eV>oPdN;54v)(speRda!h&0_qrh_mv6C*UV!}jGN zn*=1Od!N{K6>`0;ZDd=%eBxb&FbweI>A}VO(%%8K*2;z4OTTLeUR=D(N-uNxklZeQ z$VTT^;;A~OjFrLqb8!`kv8vmowUPw>`tHxm^VpBv@z1VJjb`dh2ew0*kOXe>*+*ln zUo-?zsfmlhBv8c;tx zq8>lZsjG>fweumlhg=ePm!s{5BDprVmS4(SR}BvTf@rm~%xfn_ zN~Vm{-8w6$jv|!}b&4o4tuHG22t|Pa&Xic69S8Fkf%txrn zEzbTG>Vzksfm0k{X&Mk12r4LLfIbAawiaQaH(ZO1J0G9UlJ`5pva_GK+>t`P=hZB zZg5r$P%bV53GM3L%CNE#uuLNhj7A~U`{P$-U`)vk@{+rY+wQloa%Zq}{f);rJDk5C zjzZgyd_g0#RA)3G=}^O}mzW2>#kW~h5zKM@uD9lGsmyrtH5 zS8lD)i`r4%|0o&b6Geo(n&1UAx*UIP`z;;o|H=Is(_?%w9-AO7)*q~nL9VY~-=^zO zo8>Nk@6EOyI%7|{;TBv*wBE^rKSoj-B#q;(iy!iqNLVA?XJ7U2*5l&5@3W?>@4wxk z!MgYeS6U~%YeHdu6cOepKeXVEQSz2^Ur}Mcr#yI*aDIK zaNOfKcIgH|m6ee6Y(AWO(QsaDwLW_WfmY7jq`FwKUQU}tveXzo?pX%0<>PO@jbXNv zh`0y>xGrrHl1<1Nt7}xC@jpF~MHe(MSD|Q}iCeAHb*~%@OCGT;Dt+s`f<&x&KKU>% zFJ)4d>&At(u>KW@dG>11@8gKs;^^>@VC(PSlCAZT*Mz)S zQ;Wcf`NqGkq!}S!EUJ2i=y6_M1ts8_8|;Jrt5{|>CKxJI(qK_eDr=(pZ>Bg#+BD)B zCh)+@Z_v>q*YkLV*zaX8nLP0iLbhKI*)`qFB%GxpNZl2cB?S0tX@(=n($ezG+n|{t zQ{Vo=9!KM5w{H&t4eYb;R@5fm$vKlsOsId7MKm z5kF8#ib@USNy*0tGux%k&Q41ysj(zw4b1R8A3FG@8&WD2{6DE1R8 zNYL@&zl*i61sb4d6NpEqf9W~aa&v@)jiq~|1hp0_nnkz}z!zCqWYShbUVOFo`Fj#Jb>!ehI=shfcU$ILl&+;NqAhNmIi95R*7i zsfqRY>~vhJ#UeCsTMzdH!e{EJ&$6ZBU@pYh_c!b9mndsqbp zbp)H>`oiGCl*ezxF22NUJ%qB~>9zLi7BFX%Dfcp>#syJQMG^p3ySs;w=Kcro0uo}{ z3GhBmZ)k?#!Jr`6G@q~i;57gDQBD8HDnsAv=0&CVGx0wEQ>AfJCnh!tJ&a=!M^Fsx zfj@Y|MOmM#pu|bZC6ni%c{{?c_nonS`-LzALgBH5K5mGKU&+Kcf7gV{3B+AK7Qn$3 z)DerR_%>g98*RCnYGx5-r!K*X_(NFBsu1mv+{UxHEM(kY940Gf?%sNB{AX9z2Wt&B zPT}Gr>WCB~R^IJ%VXDggwYHq}(`jh{nwY@%@vmkbh>+8su+1`qf&ZuL@l3}33p{hL z$BhU_64ya$C4=PX5_vDk;Y&fSI=o-}S#w&`;#Z)t zI$(0%?GGiX=g8N z=bMpfYTQw&DvmGeMXr!t&Dp2U6!pSFpyN`3^iL*Lo$6Fj>SrO` z=u}{jIlK(C4h*<&*LMkitf8*a+I(qMGj-@Ig;pL}BJC(-y-AakZb3zk0D+PIa zeR*H!dtYd%;V2Khp0|JDQV(pN)nZk6>e9eOsh*R(E2<$gJn5Sa0+EaZKr?9 zf+B_1$(!gQ5ck8Zh=Cli0aRwZQ~+^paV^lF?rKK4zzeKHqU9 z|M#^xYtETD9YFs+MvI~{P83z0AKbHrG6~o^p3^zAO1T(PQ5JobRf6io`^_zr0gHK1 zowFxt(k_GDUp#^+I}{qD9D}p-bW{Arb~L7MQ&(7xR#Bpbsl!pj^&W%nZbeB&3_h)A zDBU>nE<9uo^e>M?#KeTUP?!+E0AYCO5NaV}(WjC~gajbpsH>=yoI|X5qys2N6xD*E zB=Ho(1N*`Pdu5lpx(@HrzCaESkC38V@C9Dh{w-t}Y{JFhGyLTwL&^50)yZ7J(?XrO%uaS8+ldA0L-a7%6)+&>f{4()q|`$2lP)WK(Q^qi>rtGJP`Vjf18OK*1ITgG5t zu0kl4sE$Tisv7cmg}iFCaVm~Cgj6^yg>L(MyJ(ZuTgZoU%%BKu(hQ!t59~a;usN;c zO#>Rigz351`N`A>QrZziprM4QW=^~ml15EqChCre-HjyG`$II(MXDK@)O|>tXuPr< z(TH-av_U?Gb0tx3dPG<49kRD_&*t50^$uM6Pi~YLMI_65;})yDgaYO7PTiICnwWt-20pr{=I{ zUPD6Aw@)}d;B54)x`@ZlMIV(0v2awdSn#6*vT7~mj?`adrs@0uw2XL3=zS9pW`)9? za)*4>yX}Q-yYCWxyW~4|FE8%Q(gEe=#9ZC@Z{CcAvkAD#UnFHcHd6dw}RtdHA zq}#CX+hCTX_EJumfjvXXzt<_b-`T;8ab$J}V{CLma?Enj{CXtgJJ9=h-!byO@3CG` z9)WQ8gX&TvI}W20OAeV88Y$cd{B9~X|dyd z^z6?WBRIN*dUYODgFPR8Nnkv9em!91rlFO9nvSv4^(@uyQQ*37a|LWgb9K*mSV^t! zp`u2do_psbMc3=O+?KPv%m1DycF1r=Bg2V!M@e4e%QBcUwG=NFm4LwH;wSO|kNMb9 z*T6lVBYrCtq*bQv7LEiicOGxN?}Sc%+2pcANMFV5xNa`Zb{I?jO~kQ>CieJzf0!FDpO)Y6Pa7U~=c2$?!g0;C3fr%l_v1N(9W9ye#-z zEV{qH4_1x~i(GDDX1xqZ4c0dbESfy*J-m&Jq^dU=#SupQg7yWvj+T~|5;~yUtVFq% z79Xi>V}lU2X=e?&}72`Aw5<3df}>*>aPT*76<*_I2zLMpGQrHQ%UMbs<;L zpoJm6+=X1b^FjIx+1J$#KfwI4o^lprR}cx}fDTq9Peh5aKo()cqDX3dLKIOgIWreO zKmSo4$wKQVD5#>M!pH3L@CV`Iwf|jacOXg$kHb1qK;Q-2<<>{TtqNI?P+jGM_5&?u%)P0aLbiLydGDIvjKWH)+XS*Dw|E?M(!kkBv~?@u3Uv zw3;fi4~GM-wGDD4!s(D-NF!bIB*XbadLoS@0~@#q>21^Aj^#TDd^>Gcq9nSCLd^Jn zE=iH#AF9Zc9tY%wJtrvczl~dwq8<|$UJ17@w(&F_xRXobeK`VFctt%{2O)U>wR;cd zX^@X5k@5I5VM{2Z`bX+`#ngnAP^=-HlKE@siOj;BjG1E|aJ%!iZ1WA;H@wz<<)QI3 zFVGMr>~!qj??|t9Z4fNFa91+_JC))up#g6qZ3x5$4Yc``T-pf7puqjPj-TA0-Os0X z8>{O<=I6p_G<{QH-p(e-Y?t$2!o!pcz41 z!w4DBk|w7BM$41Eic|D@rQ!ZN!8v?SFx1aB(RWhZPKRGzNPzl$0Y+P2577ASP7DSI z2Nqqfus(jDqv0^G0eg8G{2d}z3b9?|9GCSs4&ASE)4y-wRnEHh)BQPRRUPSgHf;)P z+LI~(t-pZm;=idzr2%TZl=1b6;hNmd-w4H>?nnt_ojq*S1dxMJV_*u{irfaSPyT)r zcx;}$jsOK0?C3GM>acyiH$bShR#YnMGu1 zGi)`RWDz7vj?{bd>srvJDZ4dup}_~;f3!AfExqSkElSoxi!Cz zRkYmAFxtJIyL_PhMNdSLp>4bnTj7aa(P$4F1XYWT&bt2m!M6+?5>%rq4$4D%)f4vN zH%3-mx_}@PkIA*NX~nV*OHAm)8azU_=*E=s%s&ODq=@_Y_-IH;(Ha-bGGgwE2^uya zrO1_w!`CWYN2;H=Mpzb22mBUg<9?~h&|nglw5$@J9MAfmsf-)`Wu-wX_~v|xU1eT6 zo$WZSlkfTowMI12Wuam>)9DoO_vXaLel}`TzkejDT&)?+*T&~{_47J)lHbJ)7WVwK zJ%X_#we_Oqlx?d%r^@H}r*3+q_inI&)k=L%Tb>nTjVpLTqMuT2_&1a$5<*Pq-0*1Y zY)KFJn_7i^3JE*E2aMDal7w1R%iL?~aRSu04?vLH^WIB9C`mpVobWc&`!)&zl)ZgzL1W{DT8%-FMztPTik2fY0HkuvYu$c_VOpcHz1|F0 z$Qw|L)>J9NMdpN)o`$5w2uejqZ}^t)#8}D^sLv%O%oJM_uA!j;_)lXeNRCDW3mvc$ ziZr-Y&=hN;+gn`bo6Bn?YFsF6zK>VN`OI1*O+foLD?yHiv9~|7NThg=NXCuWo5!)1 z8sxrX?0RFYY!)ZG0&dCE-xr2Hxw)uj)2WU3kw7VZHku!Oe%`mSmTy?>J*cRJyMl|9 zbx%Vnlge3~co#xKDAK<}-PEc%8R7-SlU$qd>fnJyd6AeUuU`NsO(Sy(?hVVA?hvdQKQlfm9koz6>& zn8~`9V(QHY_x4_hr!Wl12NKYO6rpS@X};PT!O=0t04btCq=6uY%GAQf@Nnao#-sDp z+=i@+PiW#1gMT0C(8KS&p!sTdRu+^A&Jz2Enb(n8w zB^V-3uYtJ~0-FE{dN3QSUTcehVD3Q+^J=fx=o25#gJ%T(1ZTe44JMC~-MMcG) zVud{ZxdFpg=kxrQ!W>Tghzii{0)`S~mQBentb%LwtS?Lup9$eC1xh7|5}6fGN6^*q z&>MF)vH>zwSe(ve?r$uY_7X;KO^%MMG&D5Gss2*-et+G3?w;P3-_BZaGo}T#JDlpv=n_`ce+FJV~ zcXMn7ADr|Ry?N-pD5t9fv89zS?GVRLFp{gJmK2UTdMrreR>e) z{YjMJMJnSEaY-@4#4OF-$-ULo)U2#5DOo*qoz!;b7id2fms3&xMM6xQB-(f;)_5UU z8?g1L|MZ?Vd1<*K36flIfxVCxyW$H&xEnGh{z}D1_C3`8J!ZN)ISJ8wwRhR6A%ex@_su8=~CH(U0v_` z(Zaen`1wNU7D=kgLBXW*ttE7O0)t+85t zIEIntt6pOpN2E^HD8aDU^!At)SC={gA#W{DVfkMQ3~A#fjFD&O)BC>BiQ`7(n%^zW z{0e`qj}=m{FC&VIBJn?MeFGq1F&Gq}m$e`ITsD6bXwq{@H_U8m>H;xGGK4V3{Vk8a z8w-)_77O^qq#dVKx*u5%p2z)%_v5Bd9*dx9ZTwsOmj&m`iN`Ej?d#4->@m#x-14-W zoQ(Fj@$uFNt_6?JM-zav>fnYO=U63MQ_sn_;zU7N0MFp%oo5gz_Q~Gf{>l~KMx4{X zFF}I3G+~uIK|d=iM89)!VZnK#)dhWdwxky<(bxbETe zc*1VM0l-_dS-M(vI$fk0t(`;UShKxKlvKhfPSwY8F1%J?fyybaZdczVYt>+GaVH_f zrni$oN95VMr8=C*a!_UasuIKhu-NOD397@kye)oSs;a6dv&(Y5!%ELO?kAT4{@Pwo z+KpUObza;*Ieqn_M{0dExD!JGQ8MfVGd^u)Fb&>KmD-GqKQQ-=&Q=$7J?4Etp=G76 z4{1e!rycChA-BPvdGrRr{M&E!pt;72|4d*~IJO)ncK8{jqOW_PqIFndmy9)w^DI z(`57QfTI}%d~`HlCp4hYv|1dOA3@}4*3GM@%^voiVZNc}#G%!fT7R%4UHPe`49%;# z+Pahtw4Z(NjBR&2*neK9uROdCt(F__U*k;4*VojfeoBE@s`%ELX4~x@qTN1pS?I3Q z+jH{u#rhm6H5R#40hzh#;IoO&T+i*k=bpt0j00IrPeQQ1)BEAjVAM?rkcGDG7lZ7~ zpl+?vHARDylRpyi>29PIN^}O@oN7Ug6*d;e&|Co0*Zawd)=JsdCy;-^$3GMYP?Y67 z(8+6!daaVE%IhzT0juu4y%*FIAb=vPOtV_J+gp-#Hy5>U(< zjfI4h`D|%uxXXmyb$6^}#dh8{rS^@UN0xI}LSL(0@2GivWMZZM?2m)EH_qw0ylT~9 zRfo0s@Af)~p0<))*;Fd6R_UjQpdQ3SxJ_=|Pi^n4>Nih?O@7@uOdw|R7-n=j8T}uc zM655Z-=)HT?x0geeqKy%wmqZ~CAYY&*#6mD!(RD0m%whb@#f%nip`rbY1{VPlP>ML#9R5@6h0LlIYy|FO%rT`3+R4dvYSiIX;HppW7zEX`dXMK?l8r6Z}+Hck+?s06O*pSYvGdZU_6gm1Aq!q5@KM zUJ9D|fmNCa&J=UW@T!@NYqow&#^qbn;ZZD!kagg>Gw^~!mBmU}VK2+8C$kVnFeJF&AQ;wI#;0H9wXtq9zVCEYUdPV0 zEB+5@ICSwa?h};lo7q4-Mht6C-KPb&o*UyH#EH%f2DFY3_3c!y9_HKnofLH20V`O& zL(IKKMt%c3=avk^0gKzSm^HGYab?J`FWxS77L0hl`$|2p?l~ZUR8(aYCdDXQdFQb+o+p3*k0!*|IPaOID3~ zER!--?BLz)_JIGbp~^E#&gYGVvysxaq80hji(!pYLd6Ho%l4DI}wTKEYVs==Pm)Qbq7FLoKV-5;ikV$uq^ zifx~G6Y_fkQG|EqpfQ)Q(Pn6h#*a+Y`(9X^+)=E*J|1-R|Yagq1dZu{P??p`(oQp=kBih($d z{s825pj*%U;TMhf(G<8*#wi~gUb(;4CAKrd+o9?`Z^y#cOb#F3ow^5OS*>7tYfoV# z?GYQgW8AKkfX%j-(t(wh6{W-u!f#OigJh*O8oElxLH@#tiXc|0^K@eE6@~+Ds^5q2 z0G~SrTgUw)v}FbQTWdK++d5?ba|s12;(Bb26jn+~(mOd7m3Svmg2FS?%Yo><7ZjB0INgJ6JO;wp z7``I>PFFuB++b_S+ghO0S95agsh1U?4OWXkm`Ys)Q@|)$<~?#Fg>YSW;HcinXG``h`r?5Gh_q9Uuwm{$8yac?0Q$Sgfk!Q%tGekrrDoiUNcxg8?< zxKbXyIM@thU}c7V(pMzgpfSA8i8Td>wypet*W%*Ud5*Tivze3%OQ-3n4?tC%%xonfwZn+#p7$Y97Zf}Vvs33VA z!hNtCvzQZhcD7a!9H-xcdgBmChKyAhJzsfK|Eha<9Z^by&hJxe`!d}#)cwrmJ#6<4 z7g^*zbTRYkuk$n^k0$jP`S`M|0ZE<76-)OZ1v*7;R^h{kVE_=k|OiS>zfK@iW+c zTh!PDuC7R8K{6u$Vs*B*`G_I(Bjjw-g$vhAh zn*sg&PR_= zPy^QxKA)!?0Z;N>S#rlth`2e9ME$kjUxSfg0-?8_8*m7fk`j|H(|Bw)>IzF7%Np~e z)~6!~qI##S?cj;JOeT2^C4c=|;6%A{b4vMJG0wTKVSbky$1}n6SibkOs^iTs`den? zU)zm00Sdz}kqU-N)VQg%C33?UMEr;OS zhq|9JH&vXyhGFZt`hiMgjF)i&AKO%XVWz_IH0!`_rW*0&-83iSAa?e>{X;(%2@1$C zO4jjWw6H!wGc&VCkm__>w(vicTea)+ap+@eYHD=Uf=I78B2Q63VY8T+3=CJJ z;(yA3>9DwT-9hnYXjc z|6t>FstH(X^lDx_Y-OTDnUnHO!jLmT{%HH-HpzcGCcKKZPE1nj(RW)}>|&Lq;EXQN4>0VHri1fR;1A1r_Wu6ip?dZ<~z`r509{cnXb#`t9e>ydc z>AabtV`ThEp`@XIo6b}cSI$gEU0NX)WkIeJE5ag>VMLl6R`BOx{TW!M1?!bs!@ke~RKe?~n%yrCj^^Q7BFy%Cp~=`;9^T_2 z?2RqKFN~`OG2jJP9&saR%FbBIm_kylxaK!H6_BygBs{BKmwtTb5~@V7u3kC^lfb6? zil)WK7MGFNkO+nkUeh4;+S*!B0%$AMz^)xwH!QUN0QrqY*)WlSUuExaRMS&(4Q+o^ zIRkw`@^}SNx>33{IH&)Z3J1?yze~H>P47sn)y&gHo3BqEKo3x_7M2(RhlAsHIlk+? zJE#aG&2%7eGof%$hCF^Oi_hc!()*D|mg~7M=6wl04015jmew0Gclfim);154 z#;)Ps9!@&h#6RAquhyj@FtlvZcTQ5pN%Yb1p#D%GVL1fAo6}xTq)ME|u@0@bp(jb9 zl~8x%$;3&J6UU9;vpIC3O|J zuAhwUdz$VO>P2rKIUxe50iUyEKKKuw#Xygfxe_{-TlDB-7uI$F21sChSgMr#C+Yd^ zl(A#zDGXiheqe-07$PTFnRXtw+H5u%*%M#)c|;Y5&wQ`G=gt4;Y;SBS3#@w%xf}Hca5jQfI@1JuI>WwMU%_Xr&Blt7&Fj2+F0$V1pgGi!g*3*B~ z#+&%xV;g~kk-QFKRl@rqpV!v1U*%(WQkNI!Ts|vvCE}RaDZJp&prDbn003w=JfUmn zwY?Qyeu@A4_;|`-{mZ<#H2e1ik-!-b-a^IUNm)mjq8Lz-)_Was(VP0v9b^fXSJCFF z%&SvENX|x9Q2=iif_=(d>STZy#K^_C3noby{9#bt&XtFfjFIvOvARk&is6G#>w^6E z19IT-9dV<)_=}D36zL-JKvZ$EyEgVcdyDk3;i`% zQ|j6E&%UqZZ>R;mfKz7@Fa5cJ%+Oze{L(_PeM~Hj)oanmgYk^@h}TbFP{3C5KXn!F z;~XnlG`I6LdX1Vvq7I}2WUV|*6lrT)Xxoce%Yig0A*?~ZVq)hT7T35{J%Kw)PR;#Z z)w=XUxYOBk1K#}!4`≫N)Lm2guLuK(+d>2=oNJ|7K;qxZLk>F*_0gds)|w< zsqQOkts;$#3nn(xrFdhEns(cwp0^Hr-E2ybG6*MiB zKktJWHGBgKzZQF5r9mZ7be+!vh6WNB%IM{fv~WS2K>vG9L0m@}+@N!IW<@O8WMXSg zl!)JzZ36>w7e*ji90E3xZrjt_PvFzaHHcsSmOz}t?H=n2AEPg?rYve^_B<%o?PhVG zerc>6UrTy!#xV3FO=>ZUZtz9C8q-|~1?|6OcB5y-F{S}uGhf85+h`$0DBDSxOCObJ@du4G?D zv93!5(Cb<7CXauR(Q`Xug{!8i7a9XP)_PVmbvK_jJ;2UTME{2YiliW~-(84;@8YT9 zhCTxCR%7zJ9JASo5kuS64)gAy9PFS$&8-rRCc>v4AdM?}tJpmp5AR5aGr_OcAkoUu zFyJ`Hbsrj>PhZhHU}y*)BfY9yf|7X$E`FF?6dE0{snvYq=rXYB^OqSDn?dUgeR1>Z zTV>}(dd#|;*YnJ1hwb5c)4RN2Tn3`j;PFH>OyrCe-i)zNZkI*Z!}q0ic&qlS%(K z0iTzThC1wr(g_Yajik^&Lcz4#%~FceoAkQ5E~Gy^Qu&>}qH4a)7Rh|pB}KmTmxm>O zk%pjT+XC{Yhqq{uhR7CJSZ3eH8$Cf+W>K6)_!vkdcz3pz>=;(#}Qeg?Crxv=0HMN>aI}112k_On8M>!wpV>2Q9n~GCpT=*AXrl#rPga1E~&#NMPkPBDGSED4RtcxD9!5k`&3dgqS)A|LF>N z_du>{LxE&&+dci>;dnML-(x^0dXoCGIt6@}q3>qMjXP=#SYuRZ<6BZiJvuR(h&0r? z7j8tYzGyp7+9&18Lp>H|O43lv{i$V;BDjQ(AhQM9bKY0#G^S)e1pXiO)Yz}lyp{^=W`DmevINw8an8=vRUBOAOBS{}8TJCi_K}Df; ze!%}`4Hx<2!$lm%vpX&q&WV*^-~dp`v1TtmKl~zpaCyH4F0QA&9X`z! z{RS|-PH~w)Xtq2!=XL@7N?9V+6KJf8DQu@8AI8$9XG{zzEg`Fu5OpBno~}j75<8mV zl;{D9{6y=!c-@VFAd=kYbj$A0z8W-1*kcr5#qj8M512&z+j#+4S5WB~G+0znJkA&N zG6nIJ{(7nKRWP19;#)jA1{4zMK@9oWt3#Z@X*?Tx}9r%uN% zNM=`TXB70SW?*64s=T1IE&fAJCcmjgIDt+btMT|p8@$cTz~XvDQAtwUg7sSsq=73_ zIXT2WRA0m`b2)~8SntnH;*5Y67;0WR(?p2 zr%b-8HijB|WkNr?up~5MrH{+)yVztFDs(TU5`6qKWm*ezI=o8n1XRh>@-#p>IUcN~H+fXlIP;LPMH^<3 z&$iS|iT|;CTp1jnk?~VqJ&h;swd*Yi0l@jN)KAu?bJ+s=c>yax@I9j(q_jXEOGKz$ z@!3W_%D5TfwrS4p4JN45My0#H(I@Xu@^`sT>BAGmFLw{SqvQRTw-#11Lhwv4!cQKr z%!$krt9sOti9x7QhT<$3T^Lwcl!Y=G-?u8GPybu@AC-VW5l%v1=>j0m#4d^G7DcRPudaG8yzd(pC!{G8mh*?bXr-8_zALIJ zMWu75Zw%1B<$&ER*z~Tf`pqx@tS?G2GC_8p1UTLc=_7F|i7DwQ2kQGS(Im3q!VVG> zQcP`#=eK+*Cx>qFsKbpQyXJJ}EN$ly^zeACy6pV?;8?@7|M$kwIy;mP7Fu~_L|Try zajoz2amh*z{S90!%o$T4U9FZfQtw=ch{yl)rFR6B8#@@jOHpL0bY|@a_$H)D6(eXn_28946{lHwcu)j#l*>nI$fDrG*uT_9?PNFp>tJV!&rgU~Q za(mHCEea=fk>V;xbl0EViooqo+!0gzmW%HhBAee*4&Do`Nz=!~ zB!3qu97skoxA5z%4RAff0-pI!?od~g#Gi~CjTS@23ZF4}n$wY^(|-HFb726gdi}c; zT=p?zU@)LY7Rr4a5wBgv9x{T%jGO{C@ws; z9K+Tm>_h_*#>r)sdB>rg(SL^g5L*y+5h?Mz9E}X7-fHX&Az=23c*J)7Q)H^X>{v+y#T5fxJi9PDILmvl z!DVZ|p<17(-nolE(1&uLQ~>+4TvB;X8I=kDG9uKuafzly1VU{a%+(^}!;@N?KC5eW zJ_I+ye^8V{2`3JA*cDBY#uDS&we5KW_(U6^(6aE3^=$QH{$?-XL0w*O6sVuATn890fAmg!a z<}#}7`RZMSNon%w<@HjvB!$ck*-9xEHL#HFJwS;_?)amt@dP(r1@(6AFfBQG) z?{Q&9aHpPn%di|h(y-A0C1wH5@9U@PQTXf{w1O{?bB*V#=NlIr>3pYj^B-G%R{3?N%P?iBmc$@5S%0Y`}d z_x6o3RgIQatY(-0jjcd`lBy1zprl<`nj15IfGJw8o$`wcdml)p5&l&bX4iZc-v4@G z)#kcL;N$wZlmFVWcU_=80)dg&r!#AjHHK#!vG*6=EUT)bR{4n3PoJ~L*A#;0rz52b zW%FS&A6M%8vpPBKfCLNNyIr0qL0U2PEmq9$#3RrJj)uBFO)oDf=VxIwor_Y8r#z;X zW%{JHkI$e`-@Hh6lA+?Hi%d>Von{MJy&Z5n`F0;hC!WTQFJ!j;6~}R~bV?w8|pvk&-T8%C%0bjW-dDoR{0cjrZM`R!|s|H%|(P zr0F6M_%ORIlH;-50=W4pp<;D^Tw-+7;Yyl=P7lrx z9zrO3zXa_m<%byjZ7JAq5c*5NLY6FA4QKf#SlC|dh_pE3(edC#jN#+`wxmX?mwr4A z0^0Q*mC;zL9lx(G&>K(Wv*mxwB!qK6QOWhH8zyDz3Q#%)pw05%upMxsmxTgQD~|-P z(VsE1PszhI?BmFecSUFNAho>~J@QsN9?!so9?D$qooRz+0^EeYpboFe2m(H+kDD%= zUZ8M&1&}%#@qDSK?zvjr8<6giSW*i6~p80hWwGHRQ#0-JcgzE+qWev`b4GM z&DBjgYE+SmO*p>y{B~%Ns=2MTI3GnYw5XcQORZhMEr%(~57wC;I?kv?LP;i##jM$* z-=~^s{eST2bg>GCSU})0*p-)IDR&4#kO?o`A+xbdPa+)~fPzOx^)te&3OkH~7~_|3 zeM7@MPVjYq5W+#n%@h&gGPBiyqsHUevklf;M``~qRz=HR%<4>4g+?>Wt+$B@HW!z= zM!I`(77XII5;Mg5IW#e0aERm|UGX)6 zec^DF12wo-Mx$5*Bzl2N$*BfB-YC83-O`iHNYL^9d%l5|{*iEEc~DO6|J!nU?TI<$Z z^dsmQ@*T&oGwWl*CQ&2)KUGwGsi`*Ly; zw82)&;}m(uh{gsljO_%5!v{O^Gj3XDilsi4@vq?_!$P^%v*~E@f!z7}`?VED{qK$0 zW%fCZ-W@1nUB*!i>XKUutRcgchBM+CfRWvnWQw_ZDNf9~fc3g_9$ zpI!2ber}Unt_0n9q9~h54rgrYwjFUZ&2&slm=dFfr815g4HYU)E&u4?fJ(DuR;Vs4 z9FVm?1%SqOlqZdAx9*v_g6aTa)YbV+9NIqi3-@5DaG4;KYyTSngUK1Ev>rq3JIOZ@ zK{|}|iwnZ#rcSRP)cCk*BVRZHhvR?VYw$bgZ?kAO_|3HN0Ov3*w1qy-FPRYUX@j8N z-1pwwD8?qz`49QbPaQF6LNq~S{G?w|gM^Qcjwv(Gg6}o6eE?u#qNJYI6K6>X9Ui?C zms%F)Pm|oIXCEyu+_(K%A>>MX4qP`K$b2Qa5)PW08JT;Z5KH)gh<^JuX0sXcg(}@o zIS?13nRSV99GP4ARSVmESLpLuFbc^@6azNM9#au7B+ENA#jlKHIbb(pWZ%By^7$6% zbD?{Gmgd0ieLX6^qA3rr{4nT_43bz*8)Ax}7UgveD@Deuw9owSxR_32Ap%>Wo8S zd-5x3YBmwdKfybn1sEaY%aY3Gq|&P?y?AdyraFT4keCv{8>8M`kucRn|2Ag>0MK3} zMTL|x8L<#2!bndSD%$OiZweS?GM!~-HCG#L&z&}(m!h^obssSo7Y-p4WR&n!gf@InBxivaWQ#z4F$lf&l?In(b!!6992vN&X1VSFA5H4g ze4Gdt)gC4wOX;9mkwh3`W@M*uVErHbC%i)(tXc9}y5^={OZ-MD;jK&f1< z&c7<2n)X|(I=5TY1>ROW4M%8-JS_*Tdjh{-bbbnT+!aI+Sqsc{d{2{3Ry567QWIYv ztE0x#3K)3_g*DB)yrgrObz*xiAIuR68Lrxd&x8XA(NKhEAmgumy7UGknY_P{MR|f4 zN=a9%+5k1f*R~04K`1Pxi zKT|eFIXk}wdZ0;A2D2WKRo&N{-xRx?ns&xC+7Ve)9?w~bG%D02eWBjPUfD;V{TiK$ zNCOn4Ex)xpBgMq#Y-wS>J0PPE&LN2(#A-m@;NwhdT%$-7B zgQIp!dB%f-bE(_iid<5h~&%nRfiKea=W*5jXv5}f&85YAO1DQEv=6rvEEetHcm z_8mr#tr;JR{hA=cWXBe16)b^s+Z@h*y6|0DyGto)`Z$^gAF{{#WGE9Yh9g@e);q72>HWO`bVQfW>N6Zxo0xQ zS5`p@MUo;-Oi;uG;348<4*2z(8wbmx0UU;A)-+?50cK$?%Y522~@hK6EAX zb$g&rjW{(#+Te9QoT`pz+U=|8o~H_2YOXmwZu;~^e#+2)bSTX7>5Gn%wLV_7Py-(w ztDE$(J}buiD5LXA3*l8g6Kx0=gcg8i=VYN+eYeX^E{qVLAKZ@4*y!{Y78XSAJ1H^a zna&SD#5KoVVXXDqr+32KV{SDx5d;1FIy}Il)8XFjbJ2NuBa&~wK}{QD?)1!pmbYFW zw#0DhiuqnX7Im1A1-f#gUkb*)9X85VDjFC^;K;uIs!l!`SWYM^?n*U;q~q=r zzaL}=e29qW#afzxTFcopkoRLLFT?~CMA;RI%c=(ILG}6K`URK8Xz6OZS8l!DuGcUu ze|U=H_om+o%iL3(@*gJu+HlT2J`8^}WSAhdsL&X(fM8Gl(GTs`;r13(wDo?F(N^s& zOeFfqQ_LEZ1BLDvvZ7j7hI6td)ygZF0 zmHmF{!13VtONi?NE{bnj8Y0A=orDUF7Wu17p&1Y=oP#pRAx9uZ+R9Cw!8+07hcvs% zzwB{G`wO(l6;-sK^?v>wUC?Fxye9~vI`lrLO@8ZbCpx+8*l*NqHtUXh>JER~>3rKU z$?|+DsR7+%A;U&27_MAj1^Y*13!&HIdP9**L7C~Kq^6rs&{Cd%h(Vrd_zKLDGeBlW zQ=E1ku43922VFrd5rQYo)&8N-T3Mg4!VSQR=)W0E zdyOhnv!86&au{b<`RBH;1oez*FL(7WtMqNeDy9w^;f%Bll!r~aMWGnLwN;iss*LQb z2%Y|``gI*RxVZ@T$|Elo>xqR#p|FZfeC#+42Pm#ACy6`rG@D5r4k3D9Cfme!+c^pV zDf!%KK&f?8FfSR{-!%GUIM$WhK&e)DFe%?Ozt@ry+MG%jl=cbGwxC7{-pVT*vR`a* z)0URm;UjizL3>B;qTk8i*-dA&4PTIF;x!Ui*@ReP$?yD)Rz%vIK;FBAR0BmDMPM^F zCQSX`r*-z;9nY#aTH*qFLy-Sn9+KHGrVkIA;@Kf{+u~$Qzp0fI0}j)mYKya#r;ur( zplk)72ijVZ?(+3l`6ccHoTX*EE&{5p7-=&Q$BMD8R8W+zGQ=Zo`B}YQ_&{Rh&9)vp z9gr`4&FwIgXvjvV)=2Um0-1NJ*?hjVO>qP@u7_*=&G|fABbc}sZ<<{taZwpHJaF0o zdH@v}H7E~b1iK#8b4=jWuDUG1&k5Aiu5!oQXUNG6hxZ7^!{xGhVuJJkP?>l*C}z3A za1aTX!}%;{T(fb`O-Bdw#{tY@t{9Stl);oTf{3~QuST5ijGbg(25x95RQ&Unrw*8q zgyQu~30;8^yI4=8hlbt`By`eA5AjSLnV!sy*W~uA9_@kxyQZ3&xa8#D zPB+8oNSk(p$SX;TgGL<@p&f@*0%4yINvhCR8*N;kwwL^7muGro#mv1wrG5f8s;`}( zp=(nizLB%Tnj+Rvvnl6^e;2Z%sBwkLiDx1yh|>aT)p;Q|2Niw;1@@j@-C`UIfqUHn zLqv_;-O)SHlDvc_eZ_H|YMt)m{Q)6J`kxzK&b8|Q0cd{rP>H9$g@w__i**M%?j(kK zXvIDd>?1R`g;3P=`>Jg04guIJD8|l40p;1J=YmILCH|6F;7GeVmpmFz&F5k?ky=?n z7sG1eFf2ug=Faco;=n*s`lTV}q=Fe|>gq7K9qnTw;OWXCE>-sqiop_^S7Fb~jLnKW zl8QY!r$`uXJHLhBffl5XETseNC^A*$;p{JWx@ok-}mh7*aLS{TrgB@=*8?1 z_AQtjj^A{Gek?&grB4&YOghDcQ}EEWQ_Bb;t;Br36R%GsO3qa;yhj&eEiE}bP-%YI zwOgIO&cs;3H;Tp7BJ(OF>`C%Ua0L`7%m?ekpq>n)F%iPA2VDdO(^7ti2|pj=FOK>q z4HiD8GbP1GHwB>Tk)@3RGZwp=b&Udy%@tAA?y3U){ z+%LwP7(Vb+xn^h5*!(0_MSGZP;Z90r8oH)5l%2Q&g@ux`ADt~MXQ1+9nQ*qaDPgh& z5W*6f%hUL0qvXw$R4@0hVeG{$vTXpkLqg7g^8nyDZV~C3f8IF7SLW?^Q^>IXNCM}4g0&iP4-zzOX-k#T- zQqIRL{)7Hp-g$s|mx;EV)1$%CGQ8X(AoKM`!6f6S6hjK#MGaj=4mrF`K&-ygfpZ(= z*V4%J?1k9da52p=7I$zceG-A#uMbfl(TZQM#~h^mTy<*7qb>Q5ns#wbvL$SJ@?{GA zSTs?kX!;Nu3B$R3(dM|ndg)H5%Qq4UEC-}WlN2ff@CQXPkQ{Rx&xPFG$7`S!Vo_y8 zmYYp3uQaj0U8vj6_82)hu<|&cRVNJocZ1l!ISdQvctjB+bNrg8{BT~l{}I9CbfTB3=h_oFSBO2d9 zjG|#CW8{gGX%kHdIp+P@oT)&uq;)^c=aORn3%w4&1)sV`H$_0no4;}mF zPzY5~YIFmtt05kP(inupP#T5Oh}kl5T?lEjG|vYsct0@k!jUb2f{Rh;O;Csms3T`+ z6@(2Wu->ZQL$dwQ*9V#YBNYWoAml(^K~E2~cfjEuQ*|Imyp32aMko||taZ$ZD}TT8 zwI2bTKYI>OKK+!P9M%D_SS*(RKlsF5vsgF(+2Z|4lP0lx^=hO)uZ9dCGI-oclOFx| zS5};vN~MmC2q=wmHBwdrjWtkjA_K||BX|%FnW#ZDVy-M; z(n4Rr_tC!KXS2{Z0Db-DIy(^LAYk_OwFW$NrXT-60(GzxNo7o;;Sqd5k3Mk>TQqo|$sWDZI97m7NII0kBvs7E6IS=U>26Pd)*_g%@5p`?=?ye=3#Ec;fp` z5UM|F=UxsWhr1fgDOevZuJaP&_sTD3u-GIxc+blqvQ1KlI??apT+A@cJ9}54Knbz+$mj z{um1uEa28#Zw27XmtT6zV~_mPM9=do!{O*B)9K!~IRe3nH4;YRF(@sAvY5HJuIW1H zn0$d^GJty9X*jrF>`0g^I0JbT1?cUAbRTs0qWT7Sw*vk0@^aFd{uT9gH9g<`?stDQ zfByWJ>_2I-SS%LHpTMm1=M-=Mer|qlL7-cU%+*S_$E>P#O~| z%Z0j1p`ltBTq_J~6q*{%_3%bvXoJvDBh*$4)p4PsR49oGj()e#_Y1cp(Xfmh*&@J2 zW%duWSS%Kc<-fyicieu={TVZ6G=)N;!Lw)2o-uLa#J*Upq>!io zPDkK-IT;5Y1_X0cc-7R!gh z{Q2{bxi2E2OE10jfk~4lb-Ava01`mbb={ony5cyFXstylB}yw%${2m6RPmy<7RPbK zbzNU6)eCe1iBY3Qb$|XZE?Bz$4}U0ow_~~F!E2nUKmI}`z~>+M`XB7SV|g!Z4uHjC zv3vkby5l@nU;oS>ea%&0{o0K?ckZ0n(befE5()bI`#~!@+Ygh^<|(g?Q(9hz7DYv6 z1=ZEn)YaAX&YL&y#%a^0?R&4!ef6z%&Mhz8J?pK#J4>gxo$=Dz{hNQ@)z|&yHx@j< z=Yj{np`N(x9;@YVu~;k?%ZJ6ux6fSinZN(i(?5La{-zK5v**s8`;N!Xf8c9BKlzT& z{U3l?_g-;P>y77JY5xVw`^B|GV6j*%9~cV(=h{zSaj5O~&)!-Rihi{^6wfxr8-8^5 z#53-`=%n*=f9eM>S+eBa9{x5#P2#gx-Tx@S*oB{A Date: Wed, 24 Mar 2021 03:52:36 +0100 Subject: [PATCH 352/531] Add the desktop launcher file --- xhydra.desktop | 10 ++++++++++ 1 file changed, 10 insertions(+) create mode 100644 xhydra.desktop diff --git a/xhydra.desktop b/xhydra.desktop new file mode 100644 index 0000000..69debb5 --- /dev/null +++ b/xhydra.desktop @@ -0,0 +1,10 @@ +[Desktop Entry] +Name=XHydra +GenericName=Hydra very fast network log-on cracker +Comment=GUI frontend for Hydra network log-on cracker +Version=1.0 +Exec=xhydra +Icon=xhydra +Terminal=false +Type=Application +Categories=System;Security;GTK; From 5c9184061f0c4baca1b3b4123b1ace6ba5d3a3a7 Mon Sep 17 00:00:00 2001 From: xambroz <723625+xambroz@users.noreply.github.com> Date: Wed, 24 Mar 2021 04:20:43 +0100 Subject: [PATCH 353/531] Install the desktop launcher for xhydra --- Makefile.am | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/Makefile.am b/Makefile.am index 49e8476..ea7ade7 100644 --- a/Makefile.am +++ b/Makefile.am @@ -11,6 +11,8 @@ DESTDIR ?= BINDIR = /bin MANDIR = /man/man1/ DATADIR = /etc +PIXDIR = /share/pixmaps +APPDIR = /share/applications SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ hydra-telnet.c hydra-cisco.c hydra-http.c hydra-ftp.c hydra-imap.c \ @@ -78,6 +80,10 @@ install: strip -cp -f *.csv $(DESTDIR)$(PREFIX)$(DATADIR) -mkdir -p $(DESTDIR)$(PREFIX)$(MANDIR) -cp -f hydra.1 xhydra.1 pw-inspector.1 $(DESTDIR)$(PREFIX)$(MANDIR) + -mkdir -p $(DESTDIR)$(PREFIX)$(PIXDIR) + -cp -f xhydra.png $(DESTDIR)$(PREFIX)$(PIXDIR)/ + -mkdir -p $(DESTDIR)$(PREFIX)$(APPDIR) + -desktop-file-install --dir $(DESTDIR)$(PREFIX)$(APPDIR) xhydra.desktop clean: rm -rf xhydra pw-inspector hydra *.o core *.core *.stackdump *~ Makefile.in Makefile dev_rfc hydra.restore arm/*.ipk arm/ipkg/usr/bin/* hydra-gtk/src/*.o hydra-gtk/src/xhydra hydra-gtk/stamp-h hydra-gtk/config.status hydra-gtk/errors hydra-gtk/config.log hydra-gtk/src/.deps hydra-gtk/src/Makefile hydra-gtk/Makefile From 0749b9be9f121b092a0ec803f8cd1ff191bd34ea Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Thu, 15 Apr 2021 11:35:18 +0200 Subject: [PATCH 354/531] malloc checks for restore --- hydra.c | 28 ++++++++++++++++++++++++++-- 1 file changed, 26 insertions(+), 2 deletions(-) diff --git a/hydra.c b/hydra.c index 1a00976..c996b44 100644 --- a/hydra.c +++ b/hydra.c @@ -226,7 +226,7 @@ char *SERVICES = "adam6500 asterisk afp cisco cisco-enable cvs firebird ftp[s] " #define RESTOREFILE "./hydra.restore" #define PROGRAM "Hydra" -#define VERSION "v9.2" +#define VERSION "v9.3-dev" #define AUTHOR "van Hauser/THC" #define EMAIL "" #define AUTHOR2 "David Maciejak" @@ -807,7 +807,7 @@ void hydra_restore_read() { fprintf(stderr, "[WARNING] restore file was created by version %c.%c, this is " "version %s\n", - buf[0], buf[2], VERSION); + buf[0], buf[1], VERSION); if (buf[2] != sizeof(int32_t) % 256 || buf[3] != sizeof(hydra_head *) % 256) { fprintf(stderr, "[ERROR] restore file was created on a different, " "incompatible processor platform!\n"); @@ -883,11 +883,19 @@ void hydra_restore_read() { printf("[DEBUG] reading restore file: Step 8 complete\n"); login_ptr = malloc(hydra_brains.sizelogin + hydra_brains.countlogin + 8); + if (!login_ptr) { + fprintf(stderr, "Error: malloc(%u) failed\n", hydra_brains.sizelogin + hydra_brains.countlogin + 8); + exit(-1); + } fck = (int32_t)fread(login_ptr, hydra_brains.sizelogin + hydra_brains.countlogin + 8, 1, f); if (debug) printf("[DEBUG] reading restore file: Step 9 complete\n"); if (!check_flag(hydra_options.mode, MODE_COLON_FILE)) { // NOT colonfile mode pass_ptr = malloc(hydra_brains.sizepass + hydra_brains.countpass + 8); + if (!pass_ptr) { + fprintf(stderr, "Error: malloc(%u) failed\n", hydra_brains.sizepass + hydra_brains.countpass + 8); + exit(-1); + } fck = (int32_t)fread(pass_ptr, hydra_brains.sizepass + hydra_brains.countpass + 8, 1, f); } else { // colonfile mode hydra_options.colonfile = empty_login; // dummy @@ -897,8 +905,16 @@ void hydra_restore_read() { printf("[DEBUG] reading restore file: Step 10 complete\n"); hydra_targets = (hydra_target **)malloc((hydra_brains.targets + 3) * sizeof(hydra_target *)); + if (!hydra_targets) { + fprintf(stderr, "Error: malloc(%u) failed\n", (hydra_brains.targets + 3) * sizeof(hydra_target *)); + exit(-1); + } for (j = 0; j < hydra_brains.targets; j++) { hydra_targets[j] = malloc(sizeof(hydra_target)); + if (!hydra_targets[j]) { + fprintf(stderr, "Error: malloc(%u) failed\n", sizeof(hydra_target)); + exit(-1); + } fck = (int32_t)fread(hydra_targets[j], sizeof(hydra_target), 1, f); sck = fgets(out, sizeof(out), f); if (out[0] != 0 && out[strlen(out) - 1] == '\n') @@ -950,8 +966,16 @@ void hydra_restore_read() { if (debug) printf("[DEBUG] reading restore file: Step 11 complete\n"); hydra_heads = malloc(sizeof(hydra_head *) * hydra_options.max_use); + if (!hydra_heads) { + fprintf(stderr, "Error: malloc(%u) failed\n", sizeof(hydra_head *) * hydra_options.max_use); + exit(-1); + } for (j = 0; j < hydra_options.max_use; j++) { hydra_heads[j] = malloc(sizeof(hydra_head)); + if (!hydra_heads[j]) { + fprintf(stderr, "Error: malloc(%u) failed\n", sizeof(hydra_head)); + exit(-1); + } fck = (int32_t)fread(hydra_heads[j], sizeof(hydra_head), 1, f); hydra_heads[j]->sp[0] = -1; hydra_heads[j]->sp[1] = -1; From 593c5b151a58d089058ea7f21a6478753841f4cc Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Fri, 16 Apr 2021 09:50:14 +0200 Subject: [PATCH 355/531] fix macos + freerdp --- hydra-mod.h | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/hydra-mod.h b/hydra-mod.h index cb9c342..636efb5 100644 --- a/hydra-mod.h +++ b/hydra-mod.h @@ -67,7 +67,16 @@ char proxy_string_type[MAX_PROXY_COUNT][10]; char *proxy_authentication[MAX_PROXY_COUNT]; char *cmdlinetarget; +#ifndef __APPLE__ typedef int32_t BOOL; +#else /* __APPLE__ */ +/* ensure compatibility with objc libraries */ +#if (TARGET_OS_IPHONE && __LP64__) || TARGET_OS_WATCH +typedef bool BOOL; +#else +typedef signed char BOOL; +#endif +#endif /* __APPLE__ */ #define hydra_report fprintf From e7b3d09d00e42811b91b210ac8da50945d8f6219 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Fri, 23 Apr 2021 16:07:50 +0200 Subject: [PATCH 356/531] removed bad entries in dpl --- dpl4hydra_full.csv | 5 ----- dpl4hydra_local.csv | 5 ----- 2 files changed, 10 deletions(-) diff --git a/dpl4hydra_full.csv b/dpl4hydra_full.csv index 032c4c6..281d7b4 100644 --- a/dpl4hydra_full.csv +++ b/dpl4hydra_full.csv @@ -2417,8 +2417,6 @@ draytek,Vigor,all,HTTP,admin,admin,Admin,, dreambox,All models,all versions,http, telnet,root,dreambox,, dreambox,All models,all versions,http,telnet,root,dreambox,gives access to a busybox allowing to control the box using basic unix commands embedded into busybox, drupal.org,Drupal,,administrator,admin,admin,,, -ducati,Diavel motorcycles,,console,,last 4 digits of the motorcycle's VIN,Start and drive the motorcycle without a key,This is the ignition password - if you have one of these bikes change the password ASAP as you may be liable for any accident damage caused by the thief!, -ducati,Diavel,,,,Last 4 digits of VIN,,, dupont,Digital Water Proofer,,,root,par0t,,, dynalink,RTA020,,,admin,private,,, dynalink,RTA020,,Admin,admin,private,,, @@ -3611,7 +3609,6 @@ iso sistemi,winwork,,Admin,,,,, iwill,PC BIOS,,,,iwill,,, iwill,PC BIOS,,Admin,,iwill,,, iwill,PC BIOS,,Console,,iwill,Admin,, -jacksoncommunitycollege,My Network Services,,web,(first 7 letters of student's last name + first seven letters of first name + middle initial -- no spaces or punctuation),(First letter of first name Capitalized + First letter of last name in lowercase + day of birth {01-31} + birth year {2 digits} + last 4 digits of student ID),My Network Services access,, jaht,adsl router,AR41/2A,HTTP,admin,epicrouter,Admin,, jamfsoftware,Casper Suite,,,jamfsoftware,jamfsw03,,, janitza,UMG 508,,,Homepage Password,0th,,, @@ -5207,8 +5204,6 @@ oki,B720,all,http://192.168.1.33,root,aaaaaa,Administrator,, oki,B720N,All versions,Web interface,root,aaaaaa,Root access,, oki,B730,all,http://192.168.1.33,root,aaaaaa,Administrator,, oki,B8300n,,,admin,OkiLAN,admin,with 83e(NIC), -oki,B930n,,,root,(last 4 digits of MAC address),root,, -oki,C3200n,,Web Interface - Device IP,root,last 6 of MAC Address - case sensitive,,, oki,C330,all versions etc.,http://192.168.0.1,root,aaaaaa,Admin,Administrator, oki,C3450,,http://192.168.1.50,admin,heslo,admin,, oki,C3450,,web,admin,last 6 digits of MAC code, Use uppercase letters,, diff --git a/dpl4hydra_local.csv b/dpl4hydra_local.csv index 032c4c6..281d7b4 100644 --- a/dpl4hydra_local.csv +++ b/dpl4hydra_local.csv @@ -2417,8 +2417,6 @@ draytek,Vigor,all,HTTP,admin,admin,Admin,, dreambox,All models,all versions,http, telnet,root,dreambox,, dreambox,All models,all versions,http,telnet,root,dreambox,gives access to a busybox allowing to control the box using basic unix commands embedded into busybox, drupal.org,Drupal,,administrator,admin,admin,,, -ducati,Diavel motorcycles,,console,,last 4 digits of the motorcycle's VIN,Start and drive the motorcycle without a key,This is the ignition password - if you have one of these bikes change the password ASAP as you may be liable for any accident damage caused by the thief!, -ducati,Diavel,,,,Last 4 digits of VIN,,, dupont,Digital Water Proofer,,,root,par0t,,, dynalink,RTA020,,,admin,private,,, dynalink,RTA020,,Admin,admin,private,,, @@ -3611,7 +3609,6 @@ iso sistemi,winwork,,Admin,,,,, iwill,PC BIOS,,,,iwill,,, iwill,PC BIOS,,Admin,,iwill,,, iwill,PC BIOS,,Console,,iwill,Admin,, -jacksoncommunitycollege,My Network Services,,web,(first 7 letters of student's last name + first seven letters of first name + middle initial -- no spaces or punctuation),(First letter of first name Capitalized + First letter of last name in lowercase + day of birth {01-31} + birth year {2 digits} + last 4 digits of student ID),My Network Services access,, jaht,adsl router,AR41/2A,HTTP,admin,epicrouter,Admin,, jamfsoftware,Casper Suite,,,jamfsoftware,jamfsw03,,, janitza,UMG 508,,,Homepage Password,0th,,, @@ -5207,8 +5204,6 @@ oki,B720,all,http://192.168.1.33,root,aaaaaa,Administrator,, oki,B720N,All versions,Web interface,root,aaaaaa,Root access,, oki,B730,all,http://192.168.1.33,root,aaaaaa,Administrator,, oki,B8300n,,,admin,OkiLAN,admin,with 83e(NIC), -oki,B930n,,,root,(last 4 digits of MAC address),root,, -oki,C3200n,,Web Interface - Device IP,root,last 6 of MAC Address - case sensitive,,, oki,C330,all versions etc.,http://192.168.0.1,root,aaaaaa,Admin,Administrator, oki,C3450,,http://192.168.1.50,admin,heslo,admin,, oki,C3450,,web,admin,last 6 digits of MAC code, Use uppercase letters,, From bd2f949b34c14165f281aa3eee784398fd667b31 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Fri, 23 Apr 2021 17:05:58 +0200 Subject: [PATCH 357/531] removed bad entries in dpl --- dpl4hydra_local.csv | 53 --------------------------------------------- 1 file changed, 53 deletions(-) diff --git a/dpl4hydra_local.csv b/dpl4hydra_local.csv index 281d7b4..2f3df58 100644 --- a/dpl4hydra_local.csv +++ b/dpl4hydra_local.csv @@ -3059,7 +3059,6 @@ hewlettpackard,Motive Chorus,,HTTP (port 5060),admin,isee,,, hewlettpackard,Officejet,all versions,http,admin,,admin,http interface, hewlettpackard,Power Manager,3,HTTP,admin,admin,Admin,, hewlettpackard,ProcCurve MSC-5100,,,admin,admin,,, -hewlettpackard,Remote Insight Board,,,Administrator,The last eight digits of the serial number,,, hewlettpackard,StoreOnce,,,HPSupport,badg3r5,,, hewlettpackard,Vectra,,Console,,hewlpack,Admin,, hewlettpackard,iLo,,http,Admin,Admin,Admin,, @@ -3783,7 +3782,6 @@ kyocera,FS3140MFP,,Web Interface,,admin00,Administrator,, kyocera,FS6025MFP,,system menus,Admin,Admin,Admin,, kyocera,Intermate LAN FS Pro 10/100,K82_0371,HTTP,admin,admin,Admin,, kyocera,KM-4850W,,,admin,,,, -kyocera,KR2,,http,,read notes,,it is the last 6 characters of the mac address, kyocera,TASKalfa 250 Ci,,,Admin,admin00,,if enable local authentification, kyocera,TASKalfa 250ci,,IP,,admin00,,, kyocera,TASKalfa 266ci,,Console Panel,Admin,Admin,Admin,, @@ -5185,20 +5183,12 @@ oce,tcs500, Windows XP, all models,12.3.0(1668),console, http://192.168.0.81,, oce,tcs500,Windows XP,all models,12.3.0(1668),console,http://192.168.0.81,, ods,1094 IS Chassis,,,ods,ods,,4.x, ods,1094,,,ods,ods,,, -oki,9600,,,admin,last six characters of the MAC address (letters uppercase).,,, -oki,B410,,http (dhcp),admin,last six charachter of mac address (upper case),,, -oki,B410dn,,http://169.254.39.211/,admin,Last 6 characters (chars uppercased) from MAC Address,admin,, oki,B411,all ver,Http or AdminManager,root,aaaaaa,Administrator,, -oki,B420,,http (dhcp),admin,last six charachter of mac address (upper case),,, -oki,B430,,http (dhcp),admin,last six charachter of mac address (upper case),,, oki,B431,all ver,Http or AdminManager,root,aaaaaa,Administrator,, oki,B431dn,,http://192.168.1.xxx,root,123456,Admin,, -oki,B43xx,,,root,(last 6 digits of MAC address),admin,with 8100e(NIC), oki,B6100n,,,admin,OkiLAN,admin,with 61e(NIC), oki,B6200n,,,admin,OkiLAN,admin,with 62e(NIC), -oki,B6300,,,root,last six charachter of mac address,root,, oki,B6300n,,,admin,OkiLAN,admin,with 62e(NIC), -oki,B6500,,,root,(last 6 digits of MAC address),root,, oki,B710,all,http://192.168.1.33,root,aaaaaa,Administrator,, oki,B720,all,http://192.168.1.33,root,aaaaaa,Administrator,, oki,B720N,All versions,Web interface,root,aaaaaa,Root access,, @@ -5206,59 +5196,29 @@ oki,B730,all,http://192.168.1.33,root,aaaaaa,Administrator,, oki,B8300n,,,admin,OkiLAN,admin,with 83e(NIC), oki,C330,all versions etc.,http://192.168.0.1,root,aaaaaa,Admin,Administrator, oki,C3450,,http://192.168.1.50,admin,heslo,admin,, -oki,C3450,,web,admin,last 6 digits of MAC code, Use uppercase letters,, -oki,C3450,,web,admin,last 6 digits of MAC code,Use uppercase letters,Administrator, -oki,C3530,,console,admin,last 6 digits of MAC address,Admin,, -oki,C380,,,admin,last 6 characters of the MAC ADRESS,,, -oki,C51xx,,,root,(last 6 digits of MAC address),admin,with 8100e(NIC), oki,C530dn,A1.02,http://192.168.1.51,root,aaaaaa,Admin,, -oki,C53xx,,,root,(last 6 digits of MAC address),admin,with 8100e(NIC), -oki,C54xx,,,root,(last 6 digits of MAC address),admin,with 8100e(NIC), oki,C5550 MFP,,http,,*blank*,Admin,, -oki,C5650,,Multi,root,Last 6 characters of MAC address (uppercase),Admin,Last 6 digits are also at the end of the default printer name, oki,C5650dn,,,,000000,menu,, oki,C5650n,,,,000000,menu,, -oki,C5700,,HTTP,root,the 6 last digit of the MAC adress,Admin,running with other models, -oki,C5850,,http,admin,last 6 characters of the MAC ADRESS,,, -oki,C5900,,HTTP,root,Last 6 characters (chars uppercased) from MAC Address,admin,, oki,C6050dn,,,,000000,menu,, oki,C6050n,,,,000000,menu,, oki,C610,,,admin,aaaaaa,admin,, -oki,C6100,,HTTP,root,Last 6 characters of MAC address (uppercase),Administrative,seems to work with a variety of oki printers., -oki,C6150,N1.01 Network Firmware 08.51,ZeroConFig Bonjour,root,last six characters of MAC address,Basic Setup,Printer ID,Protocol oki,C6150dn,,,,000000,menu,, oki,C6150dtn,,,,000000,menu,, oki,C6150hdn,,,,000000,menu,, oki,C6150n,,,,000000,menu,, oki,C7000,,,admin,OkiLAN,admin,with 6200e(NIC), -oki,C7000,,,root,(last 6 digits of MAC address),admin,with 7200e(NIC) or 7300e(NIC), -oki,C710,All versions,http,root,Last 6 characters (chars uppercased) from MAC Address,Full acces to printer configuration,, oki,C711,,Web,admin,aaaaaa,Admin access,, -oki,C7300,A3.14, may apply to other versions,Multi,root,Last six digits of default device name,, -oki,C7300,A3.14,may apply to other versions,Multi,root,Last six digits of default device name,Give this a try if the last six digits of the MAC don't work. I believe alpha characters would be uppercased if there were any present., -oki,C7350,,Administrator,root,Last 6 characters (chars uppercased) from MAC Address,,, -oki,C7350,,Multi,root,Last 6 characters (chars uppercased) from MAC Address,Administrator,, -oki,C810,,http://192.168.0.1,root,Last 6 characters (chars uppercased) from MAC Address,,, -oki,C821,all version?,HTTP,root,last six charachter of mac address,Admin,, -oki,C830,all,web,root,last 6 digits of the MAC address,,, -oki,C8800,,Web or Console,root,Last six characters of MAC address,,, oki,C9000,,,admin,OkiLAN,admin,with 6200e(NIC), -oki,C9000,,,root,(last 6 digits of MAC address),admin,with 7200e(NIC) or 7300e(NIC), -oki,C9500,,HTTP / telnet,root,Last 6 characters (chars uppercased) from MAC Address,Administration,, oki,C9650,,,,0000,Print statistics,, oki,C9650,,,,aaaaaa,Administration,, -oki,C9655,,HTTP,root,last 6 digits of MAC address,Administrator,, oki,C9655,,printer menu,,aaaaaa,printer menubutton,, -oki,C9800,,,root,(last 6 digits of MAC address),,, -oki,C9850,,,root,(last 6 digits of MAC address),,, oki,CX1145,,,,123456,,, oki,CX2032 MFP,,http,,*blank*,Admin,, oki,CX2033,,Printer Menu,,,,When asked for password just press OK, oki,CX2633,,Web interface,admin,aaaaaa,admin,, oki,CX2731,,Web interface,admin,aaaaaa,admin,, -oki,CX3641,,,root,(last 6 digits of MAC address),,, oki,Color 8 +14ex,,,admin,OkiLAN,admin,with 6100e(NIC), -oki,ES3640,,,root,(last 6 digits of MAC address),,, oki,ES5460 MFP,,Local configuration menu,,aaaaaa,Admin/Root i guess,, oki,ES7120,,Web,root,aaaaaa,Admin,, oki,ES7411,,web HTTP,admin,aaaaaa,Administrator,, @@ -5270,7 +5230,6 @@ oki,MC160,,Op Panel,,000000,Admin,, oki,MC160,,Web,,sysAdmin,Admin,, oki,MC342w,,,admin,aaaaaa,admin,, oki,MC360,,Console,admin,aaaaaa,Full acces to printer configuration,, -oki,MC360,,HTTP,admin,Last 6 characters (chars uppercased) from MAC Address,Administration,, oki,MC361,,Web interface,admin,aaaaaa,admin,, oki,MC560,,Printer Menu,,,,When asked for password just press OK, oki,MC560,,Printer Menu,,,,When asked for password, @@ -5280,19 +5239,10 @@ oki,MC860,,Web interface,admin,aaaaaa,admin,, oki,ML3xx,,,admin,OkiLAN,admin,with 6010e(NIC),6020e(NIC) oki,ML491n,,http://,Admin,OkiLAN,Admin,, oki,ML4xx,,,admin,OkiLAN,admin,with 6010e(NIC),6020e(NIC) -oki,ML8810,,,root,(last 6 digits of MAC address),,, oki,N22113B,A2.00,http://192.168.1.9,,noe,Admin,, oki,WebTools,,,Administrator,,,, oki,b710,all,http://192.168.1.33,root,aaaaaa,Administrator,, -oki,c3450,All,Multi,admin,last 6 characters of the MAC ADRESS,Admin,, -oki,c3450,All,Multi,admin,last 6 characters of the MAC ADRESS,Admin,no, oki,c511dn,B7.00,,admin,aaaaaa,Full administrator Access,the machine picks up dhcp address,manually configure static on machine directly if required or print a config page to get the dhcp address that was assigned. -oki,c5300,,,root,last 6 characters of the MAC ADRESS "if it contains any alpha characters type them as upper case",,, -oki,c5300,,Console,root,last 6 characters of the MAC ADRESS ""if it contains any alpha characters,type them as upper case"",, -oki,c5300,,Console,root,last 6 characters of the MAC ADRESS "if it contains any alpha characters,type them as upper case",No, -oki,c5300,,Multi,root,last 6 characters of the MAC ADRESS ""if it contains any alpha characters,type them as upper case"",admin, -oki,c5300,,Multi,root,last 6 characters of the MAC ADRESS "if it contains any alpha characters,type them as upper case",No, -oki,c5300,,admin,root,last 6 characters of the MAC ADRESS "if it contains any alpha characters type them as upper case",,, oki,c5750,n1.02,http://192.168.0.200,,,,, oki,c810,1.0,192.100.185.78,admin,admin,admin,, olegkhabarov,Comfy CMS,,,username,password,,, @@ -10095,7 +10045,6 @@ telus,Telephony and internet services,,,(username),telus12,User,Initial password telus,Telephony and internet services,,,(username),telus13,User,Initial password if issued in 2013, telus,Telephony and internet services,,,(username),telus99,User,Initial password if issued in 1999, tenda,W150M,,192.168.1.1,admin,admin,Admin,, -teradyne,4TEL,VRS400,DTMF,(last 5 digits of lineman's SSN),(same as user ID),,, terayon,,,,admin,nms,,6.29, terayon,,Comcast-supplied,HTTP,,,diagnostics page,192.168.100.1/diagnostics_page.html, terayon,TeraLink 1000 Controller,,,admin,password,,, @@ -10398,8 +10347,6 @@ unisys,ClearPath MCP,,Multi,ADMINISTRATOR,ADMINISTRATOR,Admin,, unisys,ClearPath MCP,,Multi,HTTP,HTTP,Web Server Administration,, unisys,ClearPath MCP,,Multi,NAU,NAU,Privileged,Network Administration Utility, unitedtechnologiescorporation,Interlogix truVision IP Camera,,,admin,1234,,, -universityoftennessee,All Employee and Student Services,,, - See Notes,See Notes,Varies with account,Username based on email - eg. if email is smith123@tennessee.edu then NetID (username) is smith123. Def. Password composed of first two letters of birth month in lower case; last two digits of birth; last four digits of UT ID Number; eg. Born Feb 1979 and UT ID Number is 123-45-6789 - default password is fe796789, -universityoftennessee,All Employee and Student Services,,,lt;NetIDgt; - See Notes,See Notes,Varies with account,Username based on email - eg. if email is smith123@tennessee.edu then NetID (username) is smith123. Def. Password composed of first two letters of birth month in lower case; last two digits of birth; last four digits of UT ID Number; eg. Born Feb 1979 and UT ID Number is 123-45-6789 - default password is fe796789, unix,Generic,,,adm,,,, unix,Generic,,,adm,adm,,, unix,Generic,,,admin,admin,,, From dd8348bcf065c17a7e7339172f28ae2ee673b7ee Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Fri, 23 Apr 2021 17:06:18 +0200 Subject: [PATCH 358/531] removed bad entries in dpl --- dpl4hydra_full.csv | 53 ---------------------------------------------- 1 file changed, 53 deletions(-) diff --git a/dpl4hydra_full.csv b/dpl4hydra_full.csv index 281d7b4..2f3df58 100644 --- a/dpl4hydra_full.csv +++ b/dpl4hydra_full.csv @@ -3059,7 +3059,6 @@ hewlettpackard,Motive Chorus,,HTTP (port 5060),admin,isee,,, hewlettpackard,Officejet,all versions,http,admin,,admin,http interface, hewlettpackard,Power Manager,3,HTTP,admin,admin,Admin,, hewlettpackard,ProcCurve MSC-5100,,,admin,admin,,, -hewlettpackard,Remote Insight Board,,,Administrator,The last eight digits of the serial number,,, hewlettpackard,StoreOnce,,,HPSupport,badg3r5,,, hewlettpackard,Vectra,,Console,,hewlpack,Admin,, hewlettpackard,iLo,,http,Admin,Admin,Admin,, @@ -3783,7 +3782,6 @@ kyocera,FS3140MFP,,Web Interface,,admin00,Administrator,, kyocera,FS6025MFP,,system menus,Admin,Admin,Admin,, kyocera,Intermate LAN FS Pro 10/100,K82_0371,HTTP,admin,admin,Admin,, kyocera,KM-4850W,,,admin,,,, -kyocera,KR2,,http,,read notes,,it is the last 6 characters of the mac address, kyocera,TASKalfa 250 Ci,,,Admin,admin00,,if enable local authentification, kyocera,TASKalfa 250ci,,IP,,admin00,,, kyocera,TASKalfa 266ci,,Console Panel,Admin,Admin,Admin,, @@ -5185,20 +5183,12 @@ oce,tcs500, Windows XP, all models,12.3.0(1668),console, http://192.168.0.81,, oce,tcs500,Windows XP,all models,12.3.0(1668),console,http://192.168.0.81,, ods,1094 IS Chassis,,,ods,ods,,4.x, ods,1094,,,ods,ods,,, -oki,9600,,,admin,last six characters of the MAC address (letters uppercase).,,, -oki,B410,,http (dhcp),admin,last six charachter of mac address (upper case),,, -oki,B410dn,,http://169.254.39.211/,admin,Last 6 characters (chars uppercased) from MAC Address,admin,, oki,B411,all ver,Http or AdminManager,root,aaaaaa,Administrator,, -oki,B420,,http (dhcp),admin,last six charachter of mac address (upper case),,, -oki,B430,,http (dhcp),admin,last six charachter of mac address (upper case),,, oki,B431,all ver,Http or AdminManager,root,aaaaaa,Administrator,, oki,B431dn,,http://192.168.1.xxx,root,123456,Admin,, -oki,B43xx,,,root,(last 6 digits of MAC address),admin,with 8100e(NIC), oki,B6100n,,,admin,OkiLAN,admin,with 61e(NIC), oki,B6200n,,,admin,OkiLAN,admin,with 62e(NIC), -oki,B6300,,,root,last six charachter of mac address,root,, oki,B6300n,,,admin,OkiLAN,admin,with 62e(NIC), -oki,B6500,,,root,(last 6 digits of MAC address),root,, oki,B710,all,http://192.168.1.33,root,aaaaaa,Administrator,, oki,B720,all,http://192.168.1.33,root,aaaaaa,Administrator,, oki,B720N,All versions,Web interface,root,aaaaaa,Root access,, @@ -5206,59 +5196,29 @@ oki,B730,all,http://192.168.1.33,root,aaaaaa,Administrator,, oki,B8300n,,,admin,OkiLAN,admin,with 83e(NIC), oki,C330,all versions etc.,http://192.168.0.1,root,aaaaaa,Admin,Administrator, oki,C3450,,http://192.168.1.50,admin,heslo,admin,, -oki,C3450,,web,admin,last 6 digits of MAC code, Use uppercase letters,, -oki,C3450,,web,admin,last 6 digits of MAC code,Use uppercase letters,Administrator, -oki,C3530,,console,admin,last 6 digits of MAC address,Admin,, -oki,C380,,,admin,last 6 characters of the MAC ADRESS,,, -oki,C51xx,,,root,(last 6 digits of MAC address),admin,with 8100e(NIC), oki,C530dn,A1.02,http://192.168.1.51,root,aaaaaa,Admin,, -oki,C53xx,,,root,(last 6 digits of MAC address),admin,with 8100e(NIC), -oki,C54xx,,,root,(last 6 digits of MAC address),admin,with 8100e(NIC), oki,C5550 MFP,,http,,*blank*,Admin,, -oki,C5650,,Multi,root,Last 6 characters of MAC address (uppercase),Admin,Last 6 digits are also at the end of the default printer name, oki,C5650dn,,,,000000,menu,, oki,C5650n,,,,000000,menu,, -oki,C5700,,HTTP,root,the 6 last digit of the MAC adress,Admin,running with other models, -oki,C5850,,http,admin,last 6 characters of the MAC ADRESS,,, -oki,C5900,,HTTP,root,Last 6 characters (chars uppercased) from MAC Address,admin,, oki,C6050dn,,,,000000,menu,, oki,C6050n,,,,000000,menu,, oki,C610,,,admin,aaaaaa,admin,, -oki,C6100,,HTTP,root,Last 6 characters of MAC address (uppercase),Administrative,seems to work with a variety of oki printers., -oki,C6150,N1.01 Network Firmware 08.51,ZeroConFig Bonjour,root,last six characters of MAC address,Basic Setup,Printer ID,Protocol oki,C6150dn,,,,000000,menu,, oki,C6150dtn,,,,000000,menu,, oki,C6150hdn,,,,000000,menu,, oki,C6150n,,,,000000,menu,, oki,C7000,,,admin,OkiLAN,admin,with 6200e(NIC), -oki,C7000,,,root,(last 6 digits of MAC address),admin,with 7200e(NIC) or 7300e(NIC), -oki,C710,All versions,http,root,Last 6 characters (chars uppercased) from MAC Address,Full acces to printer configuration,, oki,C711,,Web,admin,aaaaaa,Admin access,, -oki,C7300,A3.14, may apply to other versions,Multi,root,Last six digits of default device name,, -oki,C7300,A3.14,may apply to other versions,Multi,root,Last six digits of default device name,Give this a try if the last six digits of the MAC don't work. I believe alpha characters would be uppercased if there were any present., -oki,C7350,,Administrator,root,Last 6 characters (chars uppercased) from MAC Address,,, -oki,C7350,,Multi,root,Last 6 characters (chars uppercased) from MAC Address,Administrator,, -oki,C810,,http://192.168.0.1,root,Last 6 characters (chars uppercased) from MAC Address,,, -oki,C821,all version?,HTTP,root,last six charachter of mac address,Admin,, -oki,C830,all,web,root,last 6 digits of the MAC address,,, -oki,C8800,,Web or Console,root,Last six characters of MAC address,,, oki,C9000,,,admin,OkiLAN,admin,with 6200e(NIC), -oki,C9000,,,root,(last 6 digits of MAC address),admin,with 7200e(NIC) or 7300e(NIC), -oki,C9500,,HTTP / telnet,root,Last 6 characters (chars uppercased) from MAC Address,Administration,, oki,C9650,,,,0000,Print statistics,, oki,C9650,,,,aaaaaa,Administration,, -oki,C9655,,HTTP,root,last 6 digits of MAC address,Administrator,, oki,C9655,,printer menu,,aaaaaa,printer menubutton,, -oki,C9800,,,root,(last 6 digits of MAC address),,, -oki,C9850,,,root,(last 6 digits of MAC address),,, oki,CX1145,,,,123456,,, oki,CX2032 MFP,,http,,*blank*,Admin,, oki,CX2033,,Printer Menu,,,,When asked for password just press OK, oki,CX2633,,Web interface,admin,aaaaaa,admin,, oki,CX2731,,Web interface,admin,aaaaaa,admin,, -oki,CX3641,,,root,(last 6 digits of MAC address),,, oki,Color 8 +14ex,,,admin,OkiLAN,admin,with 6100e(NIC), -oki,ES3640,,,root,(last 6 digits of MAC address),,, oki,ES5460 MFP,,Local configuration menu,,aaaaaa,Admin/Root i guess,, oki,ES7120,,Web,root,aaaaaa,Admin,, oki,ES7411,,web HTTP,admin,aaaaaa,Administrator,, @@ -5270,7 +5230,6 @@ oki,MC160,,Op Panel,,000000,Admin,, oki,MC160,,Web,,sysAdmin,Admin,, oki,MC342w,,,admin,aaaaaa,admin,, oki,MC360,,Console,admin,aaaaaa,Full acces to printer configuration,, -oki,MC360,,HTTP,admin,Last 6 characters (chars uppercased) from MAC Address,Administration,, oki,MC361,,Web interface,admin,aaaaaa,admin,, oki,MC560,,Printer Menu,,,,When asked for password just press OK, oki,MC560,,Printer Menu,,,,When asked for password, @@ -5280,19 +5239,10 @@ oki,MC860,,Web interface,admin,aaaaaa,admin,, oki,ML3xx,,,admin,OkiLAN,admin,with 6010e(NIC),6020e(NIC) oki,ML491n,,http://,Admin,OkiLAN,Admin,, oki,ML4xx,,,admin,OkiLAN,admin,with 6010e(NIC),6020e(NIC) -oki,ML8810,,,root,(last 6 digits of MAC address),,, oki,N22113B,A2.00,http://192.168.1.9,,noe,Admin,, oki,WebTools,,,Administrator,,,, oki,b710,all,http://192.168.1.33,root,aaaaaa,Administrator,, -oki,c3450,All,Multi,admin,last 6 characters of the MAC ADRESS,Admin,, -oki,c3450,All,Multi,admin,last 6 characters of the MAC ADRESS,Admin,no, oki,c511dn,B7.00,,admin,aaaaaa,Full administrator Access,the machine picks up dhcp address,manually configure static on machine directly if required or print a config page to get the dhcp address that was assigned. -oki,c5300,,,root,last 6 characters of the MAC ADRESS "if it contains any alpha characters type them as upper case",,, -oki,c5300,,Console,root,last 6 characters of the MAC ADRESS ""if it contains any alpha characters,type them as upper case"",, -oki,c5300,,Console,root,last 6 characters of the MAC ADRESS "if it contains any alpha characters,type them as upper case",No, -oki,c5300,,Multi,root,last 6 characters of the MAC ADRESS ""if it contains any alpha characters,type them as upper case"",admin, -oki,c5300,,Multi,root,last 6 characters of the MAC ADRESS "if it contains any alpha characters,type them as upper case",No, -oki,c5300,,admin,root,last 6 characters of the MAC ADRESS "if it contains any alpha characters type them as upper case",,, oki,c5750,n1.02,http://192.168.0.200,,,,, oki,c810,1.0,192.100.185.78,admin,admin,admin,, olegkhabarov,Comfy CMS,,,username,password,,, @@ -10095,7 +10045,6 @@ telus,Telephony and internet services,,,(username),telus12,User,Initial password telus,Telephony and internet services,,,(username),telus13,User,Initial password if issued in 2013, telus,Telephony and internet services,,,(username),telus99,User,Initial password if issued in 1999, tenda,W150M,,192.168.1.1,admin,admin,Admin,, -teradyne,4TEL,VRS400,DTMF,(last 5 digits of lineman's SSN),(same as user ID),,, terayon,,,,admin,nms,,6.29, terayon,,Comcast-supplied,HTTP,,,diagnostics page,192.168.100.1/diagnostics_page.html, terayon,TeraLink 1000 Controller,,,admin,password,,, @@ -10398,8 +10347,6 @@ unisys,ClearPath MCP,,Multi,ADMINISTRATOR,ADMINISTRATOR,Admin,, unisys,ClearPath MCP,,Multi,HTTP,HTTP,Web Server Administration,, unisys,ClearPath MCP,,Multi,NAU,NAU,Privileged,Network Administration Utility, unitedtechnologiescorporation,Interlogix truVision IP Camera,,,admin,1234,,, -universityoftennessee,All Employee and Student Services,,, - See Notes,See Notes,Varies with account,Username based on email - eg. if email is smith123@tennessee.edu then NetID (username) is smith123. Def. Password composed of first two letters of birth month in lower case; last two digits of birth; last four digits of UT ID Number; eg. Born Feb 1979 and UT ID Number is 123-45-6789 - default password is fe796789, -universityoftennessee,All Employee and Student Services,,,lt;NetIDgt; - See Notes,See Notes,Varies with account,Username based on email - eg. if email is smith123@tennessee.edu then NetID (username) is smith123. Def. Password composed of first two letters of birth month in lower case; last two digits of birth; last four digits of UT ID Number; eg. Born Feb 1979 and UT ID Number is 123-45-6789 - default password is fe796789, unix,Generic,,,adm,,,, unix,Generic,,,adm,adm,,, unix,Generic,,,admin,admin,,, From a2d715b870c358ff035af44612eff318b7ea82de Mon Sep 17 00:00:00 2001 From: Christian Inci Date: Mon, 26 Apr 2021 20:56:22 +0200 Subject: [PATCH 359/531] Fix logic bug I can provide another patch version, which swaps the operands instead. Signed-off-by: Christian Inci --- hydra-smb.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-smb.c b/hydra-smb.c index 20fd1cf..6fc5bbd 100644 --- a/hydra-smb.c +++ b/hydra-smb.c @@ -1494,7 +1494,7 @@ int32_t service_smb_init(char *ip, int32_t sp, unsigned char options, char *misc ctime = time(NULL); do { usleepn(300); - } while ((ready = hydra_data_ready(sock)) <= 0 && ctime + 5 <= time(NULL)); + } while ((ready = hydra_data_ready(sock)) <= 0 && ctime + 5 >= time(NULL)); if (ready <= 0) { fprintf(stderr, "[ERROR] no reply from target smb://%s:%d/\n", hostname, port); From c81f0b97e7083552ae2be43dde2ac0efc615773f Mon Sep 17 00:00:00 2001 From: sanmacorz Date: Wed, 12 May 2021 12:22:48 -0500 Subject: [PATCH 360/531] Changed index() to strchr() --- hydra-http-form.c | 20 +++++++++--------- hydra-http-proxy-urlenum.c | 12 +++++------ hydra-http-proxy.c | 8 ++++---- hydra-http.c | 4 ++-- hydra-mod.c | 4 ++-- hydra-telnet.c | 4 ++-- hydra.c | 42 +++++++++++++++++++------------------- 7 files changed, 47 insertions(+), 47 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 3979e74..f675beb 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -572,17 +572,17 @@ char *html_encode(char *string) { if (ret == NULL) return NULL; - if (index(ret, '%') != NULL) + if (strchr(ret, '%') != NULL) ret = hydra_strrep(ret, "%", "%25"); - if (index(ret, ' ') != NULL) + if (strchr(ret, ' ') != NULL) ret = hydra_strrep(ret, " ", "%20"); - if (index(ret, '&') != NULL) + if (strchr(ret, '&') != NULL) ret = hydra_strrep(ret, "&", "%26"); - if (index(ret, '#') != NULL) + if (strchr(ret, '#') != NULL) ret = hydra_strrep(ret, "#", "%23"); - if (index(ret, '=') != NULL) + if (strchr(ret, '=') != NULL) ret = hydra_strrep(ret, "=", "%3D"); - if (index(ret, '+') != NULL) + if (strchr(ret, '+') != NULL) ret = hydra_strrep(ret, "+", "%2B"); return ret; @@ -646,10 +646,10 @@ int32_t analyze_server_response(int32_t s) { } else if (endcookie2 != NULL) *endcookie2 = 0; // is the cookie already there? if yes, remove it! - if (index(startcookie, '=') != NULL && (ptr = index(startcookie, '=')) - startcookie + 1 <= sizeof(tmpname)) { + if (strchr(startcookie, '=') != NULL && (ptr = strchr(startcookie, '=')) - startcookie + 1 <= sizeof(tmpname)) { strncpy(tmpname, startcookie, sizeof(tmpname) - 2); tmpname[sizeof(tmpname) - 2] = 0; - ptr = index(tmpname, '='); + ptr = strchr(tmpname, '='); *(++ptr) = 0; // is the cookie already in the cookiejar? (so, does it have to be // replaced?) @@ -675,7 +675,7 @@ int32_t analyze_server_response(int32_t s) { strcpy(cookie, tmpcookie); } } - ptr = index(str, '='); + ptr = strchr(str, '='); // only copy the cookie if it has a value (otherwise the server wants to // delete the cookie) if (ptr != NULL && *(ptr + 1) != ';' && *(ptr + 1) != 0 && *(ptr + 1) != '\n' && *(ptr + 1) != '\r') { @@ -1286,7 +1286,7 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { cond = ptr; - if ((ptr2 = index(ptr, ':')) != NULL) { + if ((ptr2 = strchr(ptr, ':')) != NULL) { *ptr2++ = 0; if (*ptr2) optional1 = ptr2; diff --git a/hydra-http-proxy-urlenum.c b/hydra-http-proxy-urlenum.c index 434b4e4..306d755 100644 --- a/hydra-http-proxy-urlenum.c +++ b/hydra-http-proxy-urlenum.c @@ -28,17 +28,17 @@ int32_t start_http_proxy_urlenum(int32_t s, char *ip, int32_t port, unsigned cha ptr++; strncpy(mhost, ptr, sizeof(mhost) - 1); mhost[sizeof(mhost) - 1] = 0; - if ((ptr = index(mhost, '/')) != NULL) + if ((ptr = strchr(mhost, '/')) != NULL) *ptr = 0; - if ((ptr = index(mhost, ']')) != NULL) + if ((ptr = strchr(mhost, ']')) != NULL) *ptr = 0; - else if ((ptr = index(mhost, ':')) != NULL) + else if ((ptr = strchr(mhost, ':')) != NULL) *ptr = 0; - if (miscptr != NULL && index(miscptr, ':') != NULL) { + if (miscptr != NULL && strchr(miscptr, ':') != NULL) { strncpy(mlogin, miscptr, sizeof(mlogin) - 1); mlogin[sizeof(mlogin) - 1] = 0; - ptr = index(mlogin, ':'); + ptr = strchr(mlogin, ':'); *ptr++ = 0; strncpy(mpass, ptr, sizeof(mpass) - 1); mpass[sizeof(mpass) - 1] = 0; @@ -215,7 +215,7 @@ int32_t start_http_proxy_urlenum(int32_t s, char *ip, int32_t port, unsigned cha } } // result analysis - ptr = ((char *)index(buf, ' ')) + 1; + ptr = ((char *)strchr(buf, ' ')) + 1; if (*ptr == '2' || (*ptr == '3' && (*(ptr + 2) == '1' || *(ptr + 2) == '2')) || strncmp(ptr, "404", 4) == 0 || strncmp(ptr, "403", 4) == 0) { hydra_report_found_host(port, ip, "http-proxy", fp); if (fp != stdout) diff --git a/hydra-http-proxy.c b/hydra-http-proxy.c index 9eace98..3aeeb41 100644 --- a/hydra-http-proxy.c +++ b/hydra-http-proxy.c @@ -24,9 +24,9 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option sprintf(url, "%.500s", miscptr); ptr = strstr(miscptr, "://"); // :// check is in hydra.c sprintf(host, "Host: %.50s", ptr + 3); - if ((ptr = index(host, '/')) != NULL) + if ((ptr = strchr(host, '/')) != NULL) *ptr = 0; - if ((ptr = index(host + 6, ':')) != NULL && host[0] != '[') + if ((ptr = strchr(host + 6, ':')) != NULL && host[0] != '[') *ptr = 0; strcat(host, "\r\n"); } @@ -232,7 +232,7 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option } } - ptr = ((char *)index(http_proxy_buf, ' ')) + 1; + ptr = ((char *)strchr(http_proxy_buf, ' ')) + 1; if (*ptr == '2' || (*ptr == '3' && *(ptr + 2) == '1') || (*ptr == '3' && *(ptr + 2) == '2') || (*ptr == '4' && *(ptr + 2) == '4')) { hydra_report_found_host(port, ip, "http-proxy", fp); hydra_completed_pair_found(); @@ -240,7 +240,7 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option http_proxy_buf = NULL; } else { if (*ptr != '4') - hydra_report(stderr, "[INFO] Unusual return code: %c for %s:%s\n", (char)*(index(http_proxy_buf, ' ') + 1), login, pass); + hydra_report(stderr, "[INFO] Unusual return code: %c for %s:%s\n", (char)*(strchr(http_proxy_buf, ' ') + 1), login, pass); else if (verbose && *(ptr + 2) == '3') hydra_report(stderr, "[INFO] Potential success, could be false positive: %s:%s\n", login, pass); hydra_completed_pair(); diff --git a/hydra-http.c b/hydra-http.c index 7f1d56d..a0769b9 100644 --- a/hydra-http.c +++ b/hydra-http.c @@ -208,7 +208,7 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha complete_line = 0; tmpreplybuf[0] = 0; - while (http_buf != NULL && (strstr(http_buf, "HTTP/1.") == NULL || (index(http_buf, '\n') == NULL && complete_line == 0))) { + while (http_buf != NULL && (strstr(http_buf, "HTTP/1.") == NULL || (strchr(http_buf, '\n') == NULL && complete_line == 0))) { if (debug) printf("il: %d, tmpreplybuf: %s, http_buf: %s\n", complete_line, tmpreplybuf, http_buf); if (tmpreplybuf[0] == 0 && strstr(http_buf, "HTTP/1.") != NULL) { @@ -245,7 +245,7 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha if (debug) hydra_report(stderr, "S:%s\n", http_buf); - ptr = ((char *)index(http_buf, ' ')); + ptr = ((char *)strchr(http_buf, ' ')); if (ptr != NULL) ptr++; if (ptr != NULL && (*ptr == '2' || *ptr == '3' || strncmp(ptr, "403", 3) == 0 || strncmp(ptr, "404", 3) == 0)) { diff --git a/hydra-mod.c b/hydra-mod.c index 65f7725..befa365 100644 --- a/hydra-mod.c +++ b/hydra-mod.c @@ -295,13 +295,13 @@ int32_t internal__hydra_connect(char *host, int32_t port, int32_t type, int32_t send(s, buf, strlen(buf), 0); if (debug) { - char *ptr = index(buf, '\r'); + char *ptr = strchr(buf, '\r'); if (ptr != NULL) *ptr = 0; printf("DEBUG_CONNECT_PROXY_SENT: %s\n", buf); } recv(s, buf, 4096, 0); - if (strncmp("HTTP/", buf, 5) == 0 && (tmpptr = index(buf, ' ')) != NULL && *++tmpptr == '2') { + if (strncmp("HTTP/", buf, 5) == 0 && (tmpptr = strchr(buf, ' ')) != NULL && *++tmpptr == '2') { if (debug) printf("DEBUG_CONNECT_PROXY_OK\n"); } else { diff --git a/hydra-telnet.c b/hydra-telnet.c index 762ade1..39908f9 100644 --- a/hydra-telnet.c +++ b/hydra-telnet.c @@ -36,7 +36,7 @@ int32_t start_telnet(int32_t s, char *ip, int32_t port, unsigned char options, c if ((buf = hydra_receive_line(s)) == NULL) return 1; - if (index(buf, '/') != NULL || index(buf, '>') != NULL || index(buf, '%') != NULL || index(buf, '$') != NULL || index(buf, '#') != NULL) { + if (strchr(buf, '/') != NULL || strchr(buf, '>') != NULL || strchr(buf, '%') != NULL || strchr(buf, '$') != NULL || strchr(buf, '#') != NULL) { hydra_report_found_host(port, ip, "telnet", fp); hydra_completed_pair_found(); free(buf); @@ -76,7 +76,7 @@ int32_t start_telnet(int32_t s, char *ip, int32_t port, unsigned char options, c /*win7 answering with do terminal type = 0xfd 0x18 */ while ((buf = hydra_receive_line(s)) != NULL && make_to_lower(buf) && (strstr(buf, "login:") == NULL || strstr(buf, "last login:") != NULL) && strstr(buf, "sername:") == NULL) { - if ((miscptr != NULL && strstr(buf, miscptr) != NULL) || (miscptr == NULL && strstr(buf, "invalid") == NULL && strstr(buf, "failed") == NULL && strstr(buf, "bad ") == NULL && (index(buf, '/') != NULL || index(buf, '>') != NULL || index(buf, '$') != NULL || index(buf, '#') != NULL || index(buf, '%') != NULL || ((buf[1] == '\xfd') && (buf[2] == '\x18'))))) { + if ((miscptr != NULL && strstr(buf, miscptr) != NULL) || (miscptr == NULL && strstr(buf, "invalid") == NULL && strstr(buf, "failed") == NULL && strstr(buf, "bad ") == NULL && (strchr(buf, '/') != NULL || strchr(buf, '>') != NULL || strchr(buf, '$') != NULL || strchr(buf, '#') != NULL || strchr(buf, '%') != NULL || ((buf[1] == '\xfd') && (buf[2] == '\x18'))))) { hydra_report_found_host(port, ip, "telnet", fp); hydra_completed_pair_found(); free(buf); diff --git a/hydra.c b/hydra.c index c996b44..06edf87 100644 --- a/hydra.c +++ b/hydra.c @@ -1131,7 +1131,7 @@ void fill_mem(char *ptr, FILE *fd, int32_t colonmode) { tmp[len] = 0; } if (colonmode) { - if ((ptr2 = index(tmp, ':')) == NULL) { + if ((ptr2 = strchr(tmp, ':')) == NULL) { fprintf(stderr, "[ERROR] invalid line in colon file (-C), missing colon " "in line: %s\n", @@ -1494,7 +1494,7 @@ void hydra_increase_fail_count(int32_t target_no, int32_t head_no) { fprintf(stderr, "[ERROR] Too many connect errors to target, disabling " "%s://%s%s%s:%d\n", - hydra_options.service, hydra_targets[target_no]->ip[0] == 16 && index(hydra_targets[target_no]->target, ':') != NULL ? "[" : "", hydra_targets[target_no]->target, hydra_targets[target_no]->ip[0] == 16 && index(hydra_targets[target_no]->target, ':') != NULL ? "]" : "", hydra_targets[target_no]->port); + hydra_options.service, hydra_targets[target_no]->ip[0] == 16 && strchr(hydra_targets[target_no]->target, ':') != NULL ? "[" : "", hydra_targets[target_no]->target, hydra_targets[target_no]->ip[0] == 16 && strchr(hydra_targets[target_no]->target, ':') != NULL ? "]" : "", hydra_targets[target_no]->port); } if (hydra_brains.targets > hydra_brains.finished) hydra_kill_head(head_no, 1, 0); @@ -2047,11 +2047,11 @@ void process_proxy_line(int32_t type, char *string) { } *sep = 0; target_string = sep + 3; - if ((sep = index(target_string, '@')) != NULL) { + if ((sep = strchr(target_string, '@')) != NULL) { auth_string = target_string; *sep = 0; target_string = sep + 1; - if (index(auth_string, ':') == NULL) { + if (strchr(auth_string, ':') == NULL) { fprintf(stderr, "[WARNING] %s has an invalid authentication definition %s, must " "be in the format login:pass, entry ignored\n", @@ -2059,14 +2059,14 @@ void process_proxy_line(int32_t type, char *string) { return; } } - if ((sep = index(target_string, ':')) != NULL) { + if ((sep = strchr(target_string, ':')) != NULL) { *sep = 0; port_string = sep + 1; - if ((sep = index(port_string, '%')) != NULL) { + if ((sep = strchr(port_string, '%')) != NULL) { *sep = 0; device_string = sep + 1; } - if ((sep = index(port_string, '/')) != NULL) + if ((sep = strchr(port_string, '/')) != NULL) *sep = 0; port = atoi(port_string); if (port < 1 || port > 65535) { @@ -2595,23 +2595,23 @@ int main(int argc, char *argv[]) { if (*target_pos == '[') { target_pos++; - if ((param_pos = index(target_pos, ']')) == NULL) + if ((param_pos = strchr(target_pos, ']')) == NULL) bail("no closing ']' found in target definition"); *param_pos++ = 0; if (*param_pos == ':') port_pos = ++param_pos; - if ((param_pos = index(param_pos, '/')) != NULL) + if ((param_pos = strchr(param_pos, '/')) != NULL) *param_pos++ = 0; } else { - port_pos = index(target_pos, ':'); - param_pos = index(target_pos, '/'); + port_pos = strchr(target_pos, ':'); + param_pos = strchr(target_pos, '/'); if (port_pos != NULL && param_pos != NULL && port_pos > param_pos) port_pos = NULL; if (port_pos != NULL) *port_pos++ = 0; if (param_pos != NULL) *param_pos++ = 0; - if (port_pos != NULL && index(port_pos, ':') != NULL) { + if (port_pos != NULL && strchr(port_pos, ':') != NULL) { if (prefer_ipv6) bail("Illegal IPv6 target definition must be written within '[' " "']'"); @@ -2894,7 +2894,7 @@ int main(int argc, char *argv[]) { "like parallel connections)\n"); hydra_options.tasks = 1; } - if (hydra_options.login != NULL && (index(hydra_options.login, '\\') != NULL || index(hydra_options.login, '/') != NULL)) + if (hydra_options.login != NULL && (strchr(hydra_options.login, '\\') != NULL || strchr(hydra_options.login, '/') != NULL)) fprintf(stderr, "[WARNING] potential windows domain specification found in " "login. You must use the -m option to pass a domain.\n"); i = 1; @@ -2918,7 +2918,7 @@ int main(int argc, char *argv[]) { #if !defined(LIBSMBCLIENT) bail("Compiled without LIBSMBCLIENT support, module not available!"); #else - if (hydra_options.login != NULL && (index(hydra_options.login, '\\') != NULL || index(hydra_options.login, '/') != NULL)) + if (hydra_options.login != NULL && (strchr(hydra_options.login, '\\') != NULL || strchr(hydra_options.login, '/') != NULL)) fprintf(stderr, "[WARNING] potential windows domain specification found in " "login. You must use the -m option to pass a domain.\n"); if (hydra_options.miscptr == NULL || (strlen(hydra_options.miscptr) == 0)) { @@ -3571,13 +3571,13 @@ int main(int argc, char *argv[]) { if (*tmpptr == '[') { tmpptr++; hydra_targets[i]->target = tmpptr; - if ((tmpptr2 = index(tmpptr, ']')) != NULL) { + if ((tmpptr2 = strchr(tmpptr, ']')) != NULL) { *tmpptr2++ = 0; tmpptr = tmpptr2; } } else hydra_targets[i]->target = tmpptr; - if ((tmpptr2 = index(hydra_targets[i]->target, ':')) != NULL) { + if ((tmpptr2 = strchr(hydra_targets[i]->target, ':')) != NULL) { *tmpptr2++ = 0; tmpptr = tmpptr2; hydra_targets[i]->port = atoi(tmpptr2); @@ -3593,13 +3593,13 @@ int main(int argc, char *argv[]) { } else if (hydra_options.server == NULL) { fprintf(stderr, "Error: no target server given, nor -M option used\n"); exit(-1); - } else if (index(hydra_options.server, '/') != NULL) { + } else if (strchr(hydra_options.server, '/') != NULL) { if (cmdlinetarget == NULL) bail("You seem to mix up \"service://target:port/options\" syntax with " "\"target service options\" syntax. Read the README on how to use " "hydra correctly!"); if (strstr(cmdlinetarget, "://") != NULL) { - tmpptr = index(hydra_options.server, '/'); + tmpptr = strchr(hydra_options.server, '/'); if (tmpptr != NULL) *tmpptr = 0; countservers = hydra_brains.targets = 1; @@ -3622,7 +3622,7 @@ int main(int argc, char *argv[]) { exit(-1); } strcpy(tmpptr, hydra_options.server); - tmpptr2 = index(tmpptr, '/'); + tmpptr2 = strchr(tmpptr, '/'); *tmpptr2++ = 0; if ((k = atoi(tmpptr2)) < 16 || k > 31) { fprintf(stderr, "Error: network size may only be between /16 and /31: %s\n", hydra_options.server); @@ -3788,7 +3788,7 @@ int main(int argc, char *argv[]) { printf(" per task\n"); if (hydra_brains.targets == 1) { - if (index(hydra_targets[0]->target, ':') == NULL) { + if (strchr(hydra_targets[0]->target, ':') == NULL) { printf("[DATA] attacking %s%s://%s:", hydra_options.service, hydra_options.ssl == 1 ? "s" : "", hydra_targets[0]->target); printf("%d%s%s\n", port, hydra_options.miscptr == NULL || hydra_options.miscptr[0] != '/' ? "/" : "", hydra_options.miscptr != NULL ? hydra_options.miscptr : ""); } else { @@ -3864,7 +3864,7 @@ int main(int argc, char *argv[]) { #ifdef AF_INET6 ipv6 = NULL; #endif - if ((device = index(hydra_targets[i]->target, '%')) != NULL) + if ((device = strchr(hydra_targets[i]->target, '%')) != NULL) *device++ = 0; if (getaddrinfo(hydra_targets[i]->target, NULL, &hints, &res) != 0) { if (use_proxy == 0) { From 221876598b2f05da8a7fc17076d231b00d1993b0 Mon Sep 17 00:00:00 2001 From: wj0seph Date: Wed, 19 May 2021 17:59:18 +0800 Subject: [PATCH 361/531] fix: skip user bug username can potentially be identical to the beginning of login_ptr --- hydra.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra.c b/hydra.c index 06edf87..9ddcebb 100644 --- a/hydra.c +++ b/hydra.c @@ -1957,7 +1957,7 @@ void hydra_skip_user(int32_t target_no, char *username) { hydra_targets[target_no]->skipcnt++; } if (hydra_options.loop_mode == 0 && !check_flag(hydra_options.mode, MODE_COLON_FILE)) { - if (memcmp(username, hydra_targets[target_no]->login_ptr, strlen(username)) == 0) { + if (strcmp(username, hydra_targets[target_no]->login_ptr) == 0) { if (debug) printf("[DEBUG] skipping username %s\n", username); // increase count From 19432a217360dc6430e8186208d0b228da5f7070 Mon Sep 17 00:00:00 2001 From: ABHacker Official <63346676+abhackerofficial@users.noreply.github.com> Date: Sat, 12 Jun 2021 11:34:57 +0530 Subject: [PATCH 362/531] Fixed data types. --- hydra.c | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/hydra.c b/hydra.c index 9ddcebb..0c889f8 100644 --- a/hydra.c +++ b/hydra.c @@ -884,7 +884,7 @@ void hydra_restore_read() { login_ptr = malloc(hydra_brains.sizelogin + hydra_brains.countlogin + 8); if (!login_ptr) { - fprintf(stderr, "Error: malloc(%u) failed\n", hydra_brains.sizelogin + hydra_brains.countlogin + 8); + fprintf(stderr, "Error: malloc(%lu) failed\n", hydra_brains.sizelogin + hydra_brains.countlogin + 8); exit(-1); } fck = (int32_t)fread(login_ptr, hydra_brains.sizelogin + hydra_brains.countlogin + 8, 1, f); @@ -893,7 +893,7 @@ void hydra_restore_read() { if (!check_flag(hydra_options.mode, MODE_COLON_FILE)) { // NOT colonfile mode pass_ptr = malloc(hydra_brains.sizepass + hydra_brains.countpass + 8); if (!pass_ptr) { - fprintf(stderr, "Error: malloc(%u) failed\n", hydra_brains.sizepass + hydra_brains.countpass + 8); + fprintf(stderr, "Error: malloc(%lu) failed\n", hydra_brains.sizepass + hydra_brains.countpass + 8); exit(-1); } fck = (int32_t)fread(pass_ptr, hydra_brains.sizepass + hydra_brains.countpass + 8, 1, f); @@ -906,13 +906,13 @@ void hydra_restore_read() { hydra_targets = (hydra_target **)malloc((hydra_brains.targets + 3) * sizeof(hydra_target *)); if (!hydra_targets) { - fprintf(stderr, "Error: malloc(%u) failed\n", (hydra_brains.targets + 3) * sizeof(hydra_target *)); + fprintf(stderr, "Error: malloc(%lu) failed\n", (hydra_brains.targets + 3) * sizeof(hydra_target *)); exit(-1); } for (j = 0; j < hydra_brains.targets; j++) { hydra_targets[j] = malloc(sizeof(hydra_target)); if (!hydra_targets[j]) { - fprintf(stderr, "Error: malloc(%u) failed\n", sizeof(hydra_target)); + fprintf(stderr, "Error: malloc(%lu) failed\n", sizeof(hydra_target)); exit(-1); } fck = (int32_t)fread(hydra_targets[j], sizeof(hydra_target), 1, f); @@ -967,13 +967,13 @@ void hydra_restore_read() { printf("[DEBUG] reading restore file: Step 11 complete\n"); hydra_heads = malloc(sizeof(hydra_head *) * hydra_options.max_use); if (!hydra_heads) { - fprintf(stderr, "Error: malloc(%u) failed\n", sizeof(hydra_head *) * hydra_options.max_use); + fprintf(stderr, "Error: malloc(%lu) failed\n", sizeof(hydra_head *) * hydra_options.max_use); exit(-1); } for (j = 0; j < hydra_options.max_use; j++) { hydra_heads[j] = malloc(sizeof(hydra_head)); if (!hydra_heads[j]) { - fprintf(stderr, "Error: malloc(%u) failed\n", sizeof(hydra_head)); + fprintf(stderr, "Error: malloc(%lu) failed\n", sizeof(hydra_head)); exit(-1); } fck = (int32_t)fread(hydra_heads[j], sizeof(hydra_head), 1, f); From ef3c334671d94b60bc58d8220d723579f6229e7e Mon Sep 17 00:00:00 2001 From: Yisus7u7 <64093255+Yisus7u7@users.noreply.github.com> Date: Wed, 16 Jun 2021 02:30:45 -0500 Subject: [PATCH 363/531] Add termux setup file (android) --- setup-termux.sh | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) create mode 100644 setup-termux.sh diff --git a/setup-termux.sh b/setup-termux.sh new file mode 100644 index 0000000..38d4db2 --- /dev/null +++ b/setup-termux.sh @@ -0,0 +1,17 @@ +#!/bin/bash +#this script will configure hydra in termux + +TERMUX_PREFIX="/data/data/com.termux/files/usr" + +#required dependencies + +pkg update && pkg upgrade +pkg install -y x11-repo +pkg install -y clang make openssl openssl-tool wget openssh coreutils gtk2 gtk3 + +#compile hydra + +./configure --prefix=$TERMUX_PREFIX +make +make install + From f12dc459c1e89aef0538b24f11724bb74752104b Mon Sep 17 00:00:00 2001 From: Yisus7u7 Date: Wed, 16 Jun 2021 03:01:07 -0500 Subject: [PATCH 364/531] Specify in the INSTALL file the steps for Android (termux) --- INSTALL | 18 ++++++++++++++++++ setup-termux.sh | 17 ----------------- 2 files changed, 18 insertions(+), 17 deletions(-) delete mode 100644 setup-termux.sh diff --git a/INSTALL b/INSTALL index 2258405..6bf3de7 100644 --- a/INSTALL +++ b/INSTALL @@ -6,6 +6,24 @@ you run "./configure": Redhat/Fedora: yum install openssl-devel pcre-devel ncpfs-devel postgresql-devel libssh-devel subversion-devel libncurses-devel OpenSuSE: zypper install libopenssl-devel pcre-devel libidn-devel ncpfs-devel libssh-devel postgresql-devel subversion-devel libncurses-devel + +### Note: + +Due to the Android file system, the installation on it is different, please follow these steps: + +``` +# Necessary dependencies +pkg install -y x11-repo +pkg install -y clang make openssl openssl-tool wget openssh coreutils gtk2 gtk3 +# Compiling hydra +./configure --prefix=$PREFIX +make +make install +``` + +To use xhydra, you will need to install a graphical output in termux, you can be guided from [this article](https://wiki.termux.com/wiki/Graphical_Environment) + + For the Oracle login module, install the basic and SDK packages: http://www.oracle.com/technetwork/database/features/instant-client/index.html diff --git a/setup-termux.sh b/setup-termux.sh deleted file mode 100644 index 38d4db2..0000000 --- a/setup-termux.sh +++ /dev/null @@ -1,17 +0,0 @@ -#!/bin/bash -#this script will configure hydra in termux - -TERMUX_PREFIX="/data/data/com.termux/files/usr" - -#required dependencies - -pkg update && pkg upgrade -pkg install -y x11-repo -pkg install -y clang make openssl openssl-tool wget openssh coreutils gtk2 gtk3 - -#compile hydra - -./configure --prefix=$TERMUX_PREFIX -make -make install - From b7e77d767277453370d39235275d428cfad02c3c Mon Sep 17 00:00:00 2001 From: Yisus7u7 Date: Wed, 16 Jun 2021 03:03:31 -0500 Subject: [PATCH 365/531] Specify in the INSTALL file the steps for Android (termux) --- INSTALL | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/INSTALL b/INSTALL index 6bf3de7..c679c4f 100644 --- a/INSTALL +++ b/INSTALL @@ -7,11 +7,10 @@ you run "./configure": OpenSuSE: zypper install libopenssl-devel pcre-devel libidn-devel ncpfs-devel libssh-devel postgresql-devel subversion-devel libncurses-devel -### Note: +Note: Due to the Android file system, the installation on it is different, please follow these steps: -``` # Necessary dependencies pkg install -y x11-repo pkg install -y clang make openssl openssl-tool wget openssh coreutils gtk2 gtk3 From f1cc9e6cfb290cdb4b7cf50e3bb4951aa05c8c2f Mon Sep 17 00:00:00 2001 From: Yisus7u7 Date: Wed, 16 Jun 2021 03:06:40 -0500 Subject: [PATCH 366/531] Specify in the INSTALL file the steps for Android (termux) --- INSTALL | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/INSTALL b/INSTALL index c679c4f..b501691 100644 --- a/INSTALL +++ b/INSTALL @@ -18,9 +18,10 @@ pkg install -y clang make openssl openssl-tool wget openssh coreutils gtk2 gtk3 ./configure --prefix=$PREFIX make make install -``` -To use xhydra, you will need to install a graphical output in termux, you can be guided from [this article](https://wiki.termux.com/wiki/Graphical_Environment) +To use xhydra, you will need to install a graphical output in termux, you can be guided from this article: + +https://wiki.termux.com/wiki/Graphical_Environment For the Oracle login module, install the basic and SDK packages: From bc9190d3ddbf03a93042839ecc4b844a297eeb6c Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Wed, 16 Jun 2021 11:18:12 +0200 Subject: [PATCH 367/531] fix --- INSTALL | 17 ++++++++--------- 1 file changed, 8 insertions(+), 9 deletions(-) diff --git a/INSTALL b/INSTALL index b501691..752aa63 100644 --- a/INSTALL +++ b/INSTALL @@ -7,17 +7,16 @@ you run "./configure": OpenSuSE: zypper install libopenssl-devel pcre-devel libidn-devel ncpfs-devel libssh-devel postgresql-devel subversion-devel libncurses-devel -Note: +For Termux/Android you need the following setup: -Due to the Android file system, the installation on it is different, please follow these steps: +Install the necessary dependencies + # pkg install -y x11-repo + # pkg install -y clang make openssl openssl-tool wget openssh coreutils gtk2 gtk3 +And then compiling hydra + # ./configure --prefix=$PREFIX + # make + # make install -# Necessary dependencies -pkg install -y x11-repo -pkg install -y clang make openssl openssl-tool wget openssh coreutils gtk2 gtk3 -# Compiling hydra -./configure --prefix=$PREFIX -make -make install To use xhydra, you will need to install a graphical output in termux, you can be guided from this article: From acd4bcf1a79bf90042a062b91fe78d2f9fab5a54 Mon Sep 17 00:00:00 2001 From: Yisus7u7 <64093255+Yisus7u7@users.noreply.github.com> Date: Wed, 16 Jun 2021 12:43:58 -0500 Subject: [PATCH 368/531] Set theme jekyll-theme-hacker --- _config.yml | 1 + 1 file changed, 1 insertion(+) create mode 100644 _config.yml diff --git a/_config.yml b/_config.yml new file mode 100644 index 0000000..fc24e7a --- /dev/null +++ b/_config.yml @@ -0,0 +1 @@ +theme: jekyll-theme-hacker \ No newline at end of file From 3450d874200fa4ca6e187fe36b67f38003afe0de Mon Sep 17 00:00:00 2001 From: Yisus7u7 <64093255+Yisus7u7@users.noreply.github.com> Date: Wed, 16 Jun 2021 12:46:23 -0500 Subject: [PATCH 369/531] Update _config.yml --- _config.yml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/_config.yml b/_config.yml index fc24e7a..8dd6c5f 100644 --- a/_config.yml +++ b/_config.yml @@ -1 +1,2 @@ -theme: jekyll-theme-hacker \ No newline at end of file +title: "thc-hydra" +theme: jekyll-theme-hacker From 760149340058e91fea0579caea434de3030a80ad Mon Sep 17 00:00:00 2001 From: Yisus7u7 <64093255+Yisus7u7@users.noreply.github.com> Date: Wed, 16 Jun 2021 12:50:01 -0500 Subject: [PATCH 370/531] Create index.md --- docs/hydra/index.md | 534 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 534 insertions(+) create mode 100644 docs/hydra/index.md diff --git a/docs/hydra/index.md b/docs/hydra/index.md new file mode 100644 index 0000000..322da43 --- /dev/null +++ b/docs/hydra/index.md @@ -0,0 +1,534 @@ + + H Y D R A + + (c) 2001-2021 by van Hauser / THC + https://github.com/vanhauser-thc/thc-hydra + many modules were written by David (dot) Maciejak @ gmail (dot) com + BFG code by Jan Dlabal + + Licensed under AGPLv3 (see LICENSE file) + + Please do not use in military or secret service organizations, + or for illegal purposes. + (This is the wish of the author and non-binding. Many people working + in these organizations do not care for laws and ethics anyways. + You are not one of the "good" ones if you ignore this.) + + + +INTRODUCTION +------------ +Number one of the biggest security holes are passwords, as every password +security study shows. +This tool is a proof of concept code, to give researchers and security +consultants the possibility to show how easy it would be to gain unauthorized +access from remote to a system. + +THIS TOOL IS FOR LEGAL PURPOSES ONLY! + +There are already several login hacker tools available, however, none does +either support more than one protocol to attack or support parallelized +connects. + +It was tested to compile cleanly on Linux, Windows/Cygwin, Solaris, +FreeBSD/OpenBSD, QNX (Blackberry 10) and MacOS. + +Currently this tool supports the following protocols: + Asterisk, AFP, Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird, FTP, + HTTP-FORM-GET, HTTP-FORM-POST, HTTP-GET, HTTP-HEAD, HTTP-POST, HTTP-PROXY, + HTTPS-FORM-GET, HTTPS-FORM-POST, HTTPS-GET, HTTPS-HEAD, HTTPS-POST, + HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MEMCACHED, MONGODB, MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, + Oracle SID, Oracle, PC-Anywhere, PCNFS, POP3, POSTGRES, Radmin, RDP, Rexec, Rlogin, + Rsh, RTSP, SAP/R3, SIP, SMB, SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, + SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, + VNC and XMPP. + +However the module engine for new services is very easy so it won't take a +long time until even more services are supported. +Your help in writing, enhancing or fixing modules is highly appreciated!! :-) + + + +WHERE TO GET +------------ +You can always find the newest release/production version of hydra at its +project page at https://github.com/vanhauser-thc/thc-hydra/releases +If you are interested in the current development state, the public development +repository is at Github: + svn co https://github.com/vanhauser-thc/thc-hydra + or + git clone https://github.com/vanhauser-thc/thc-hydra +Use the development version at your own risk. It contains new features and +new bugs. Things might not work! + + + +HOW TO COMPILE +-------------- +To configure, compile and install hydra, just type: + +``` +./configure +make +make install +``` + +If you want the ssh module, you have to setup libssh (not libssh2!) on your +system, get it from http://www.libssh.org, for ssh v1 support you also need +to add "-DWITH_SSH1=On" option in the cmake command line. +IMPORTANT: If you compile on MacOS then you must do this - do not install libssh via brew! + +If you use Ubuntu/Debian, this will install supplementary libraries needed +for a few optional modules (note that some might not be available on your distribution): + +``` +apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev \ + libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev \ + firebird-dev libmemcached-dev libgpg-error-dev \ + libgcrypt11-dev libgcrypt20-dev +``` + +This enables all optional modules and features with the exception of Oracle, +SAP R/3, NCP and the apple filing protocol - which you will need to download and +install from the vendor's web sites. + +For all other Linux derivates and BSD based systems, use the system +software installer and look for similarly named libraries like in the +command above. In all other cases, you have to download all source libraries +and compile them manually. + + + +SUPPORTED PLATFORMS +------------------- +- All UNIX platforms (Linux, *BSD, Solaris, etc.) +- MacOS (basically a BSD clone) +- Windows with Cygwin (both IPv4 and IPv6) +- Mobile systems based on Linux, MacOS or QNX (e.g. Android, iPhone, Blackberry 10, Zaurus, iPaq) + + + +HOW TO USE +---------- +If you just enter `hydra`, you will see a short summary of the important +options available. +Type `./hydra -h` to see all available command line options. + +Note that NO login/password file is included. Generate them yourself. +A default password list is however present, use "dpl4hydra.sh" to generate +a list. + +For Linux users, a GTK GUI is available, try `./xhydra` + +For the command line usage, the syntax is as follows: + For attacking one target or a network, you can use the new "://" style: + hydra [some command line options] PROTOCOL://TARGET:PORT/MODULE-OPTIONS + The old mode can be used for these too, and additionally if you want to + specify your targets from a text file, you *must* use this one: + +``` +hydra [some command line options] [-s PORT] TARGET PROTOCOL [MODULE-OPTIONS] +``` + +Via the command line options you specify which logins to try, which passwords, +if SSL should be used, how many parallel tasks to use for attacking, etc. + +PROTOCOL is the protocol you want to use for attacking, e.g. ftp, smtp, +http-get or many others are available +TARGET is the target you want to attack +MODULE-OPTIONS are optional values which are special per PROTOCOL module + +FIRST - select your target + you have three options on how to specify the target you want to attack: + 1. a single target on the command line: just put the IP or DNS address in + 2. a network range on the command line: CIDR specification like "192.168.0.0/24" + 3. a list of hosts in a text file: one line per entry (see below) + +SECOND - select your protocol + Try to avoid telnet, as it is unreliable to detect a correct or false login attempt. + Use a port scanner to see which protocols are enabled on the target. + +THIRD - check if the module has optional parameters + hydra -U PROTOCOL + e.g. hydra -U smtp + +FOURTH - the destination port + this is optional, if no port is supplied the default common port for the + PROTOCOL is used. + If you specify SSL to use ("-S" option), the SSL common port is used by default. + + +If you use "://" notation, you must use "[" "]" brackets if you want to supply +IPv6 addresses or CIDR ("192.168.0.0/24") notations to attack: + hydra [some command line options] ftp://[192.168.0.0/24]/ + hydra [some command line options] -6 smtps://[2001:db8::1]/NTLM + +Note that everything hydra does is IPv4 only! +If you want to attack IPv6 addresses, you must add the "-6" command line option. +All attacks are then IPv6 only! + +If you want to supply your targets via a text file, you can not use the :// +notation but use the old style and just supply the protocol (and module options): + hydra [some command line options] -M targets.txt ftp +You can also supply the port for each target entry by adding ":" after a +target entry in the file, e.g.: + +``` +foo.bar.com +target.com:21 +unusual.port.com:2121 +default.used.here.com +127.0.0.1 +127.0.0.1:2121 +``` + +Note that if you want to attach IPv6 targets, you must supply the -6 option +and *must* put IPv6 addresses in brackets in the file(!) like this: + +``` +foo.bar.com +target.com:21 +[fe80::1%eth0] +[2001::1] +[2002::2]:8080 +[2a01:24a:133:0:00:123:ff:1a] +``` + +LOGINS AND PASSWORDS +-------------------- +You have many options on how to attack with logins and passwords +With -l for login and -p for password you tell hydra that this is the only +login and/or password to try. +With -L for logins and -P for passwords you supply text files with entries. +e.g.: + +``` +hydra -l admin -p password ftp://localhost/ +hydra -L default_logins.txt -p test ftp://localhost/ +hydra -l admin -P common_passwords.txt ftp://localhost/ +hydra -L logins.txt -P passwords.txt ftp://localhost/ +``` + +Additionally, you can try passwords based on the login via the "-e" option. +The "-e" option has three parameters: + +``` +s - try the login as password +n - try an empty password +r - reverse the login and try it as password +``` + +If you want to, e.g. try "try login as password and "empty password", you +specify "-e sn" on the command line. + +But there are two more modes for trying passwords than -p/-P: +You can use text file which where a login and password pair is separated by a colon, +e.g.: + +``` +admin:password +test:test +foo:bar +``` + +This is a common default account style listing, that is also generated by the +dpl4hydra.sh default account file generator supplied with hydra. +You use such a text file with the -C option - note that in this mode you +can not use -l/-L/-p/-P options (-e nsr however you can). +Example: + +``` +hydra -C default_accounts.txt ftp://localhost/ +``` + +And finally, there is a bruteforce mode with the -x option (which you can not +use with -p/-P/-C): + +``` +-x minimum_length:maximum_length:charset +``` + +the charset definition is `a` for lowercase letters, `A` for uppercase letters, +`1` for numbers and for anything else you supply it is their real representation. +Examples: + +``` +-x 1:3:a generate passwords from length 1 to 3 with all lowercase letters +-x 2:5:/ generate passwords from length 2 to 5 containing only slashes +-x 5:8:A1 generate passwords from length 5 to 8 with uppercase and numbers +``` + +Example: + +``` +hydra -l ftp -x 3:3:a ftp://localhost/ +``` + +SPECIAL OPTIONS FOR MODULES +--------------------------- +Via the third command line parameter (TARGET SERVICE OPTIONAL) or the -m +command line option, you can pass one option to a module. +Many modules use this, a few require it! + +To see the special option of a module, type: + + hydra -U + +e.g. + + ./hydra -U http-post-form + +The special options can be passed via the -m parameter, as 3rd command line +option or in the service://target/option format. + +Examples (they are all equal): + +``` +./hydra -l test -p test -m PLAIN 127.0.0.1 imap +./hydra -l test -p test 127.0.0.1 imap PLAIN +./hydra -l test -p test imap://127.0.0.1/PLAIN +``` + +RESTORING AN ABORTED/CRASHED SESSION +------------------------------------ +When hydra is aborted with Control-C, killed or crashes, it leaves a +"hydra.restore" file behind which contains all necessary information to +restore the session. This session file is written every 5 minutes. +NOTE: the hydra.restore file can NOT be copied to a different platform (e.g. +from little endian to big endian, or from Solaris to AIX) + +HOW TO SCAN/CRACK OVER A PROXY +------------------------------ +The environment variable HYDRA_PROXY_HTTP defines the web proxy (this works +just for the http services!). +The following syntax is valid: + +``` +HYDRA_PROXY_HTTP="http://123.45.67.89:8080/" +HYDRA_PROXY_HTTP="http://login:password@123.45.67.89:8080/" +HYDRA_PROXY_HTTP="proxylist.txt" +``` + +The last example is a text file containing up to 64 proxies (in the same +format definition as the other examples). + +For all other services, use the HYDRA_PROXY variable to scan/crack. +It uses the same syntax. eg: + +``` +HYDRA_PROXY=[connect|socks4|socks5]://[login:password@]proxy_addr:proxy_port +``` + +for example: + +``` +HYDRA_PROXY=connect://proxy.anonymizer.com:8000 +HYDRA_PROXY=socks4://auth:pw@127.0.0.1:1080 +HYDRA_PROXY=socksproxylist.txt +``` + +ADDITIONAL HINTS +---------------- +* sort your password files by likelihood and use the -u option to find + passwords much faster! +* uniq your dictionary files! this can save you a lot of time :-) + cat words.txt | sort | uniq > dictionary.txt +* if you know that the target is using a password policy (allowing users + only to choose a password with a minimum length of 6, containing a least one + letter and one number, etc. use the tool pw-inspector which comes along + with the hydra package to reduce the password list: + cat dictionary.txt | pw-inspector -m 6 -c 2 -n > passlist.txt + + +RESULTS OUTPUT +-------------- + +The results are output to stdio along with the other information. Via the -o +command line option, the results can also be written to a file. Using -b, +the format of the output can be specified. Currently, these are supported: + +* `text` - plain text format +* `jsonv1` - JSON data using version 1.x of the schema (defined below). +* `json` - JSON data using the latest version of the schema, currently there + is only version 1. + +If using JSON output, the results file may not be valid JSON if there are +serious errors in booting Hydra. + + +JSON Schema +----------- +Here is an example of the JSON output. Notes on some of the fields: + +* `errormessages` - an array of zero or more strings that are normally printed + to stderr at the end of the Hydra's run. The text is very free form. +* `success` - indication if Hydra ran correctly without error (**NOT** if + passwords were detected). This parameter is either the JSON value `true` + or `false` depending on completion. +* `quantityfound` - How many username+password combinations discovered. +* `jsonoutputversion` - Version of the schema, 1.00, 1.01, 1.11, 2.00, + 2.03, etc. Hydra will make second tuple of the version to always be two + digits to make it easier for downstream processors (as opposed to v1.1 vs + v1.10). The minor-level versions are additive, so 1.02 will contain more + fields than version 1.00 and will be backward compatible. Version 2.x will + break something from version 1.x output. + +Version 1.00 example: +``` +{ + "errormessages": [ + "[ERROR] Error Message of Something", + "[ERROR] Another Message", + "These are very free form" + ], + "generator": { + "built": "2021-03-01 14:44:22", + "commandline": "hydra -b jsonv1 -o results.json ... ...", + "jsonoutputversion": "1.00", + "server": "127.0.0.1", + "service": "http-post-form", + "software": "Hydra", + "version": "v8.5" + }, + "quantityfound": 2, + "results": [ + { + "host": "127.0.0.1", + "login": "bill@example.com", + "password": "bill", + "port": 9999, + "service": "http-post-form" + }, + { + "host": "127.0.0.1", + "login": "joe@example.com", + "password": "joe", + "port": 9999, + "service": "http-post-form" + } + ], + "success": false +} +``` + + +SPEED +----- +through the parallelizing feature, this password cracker tool can be very +fast, however it depends on the protocol. The fastest are generally POP3 +and FTP. +Experiment with the task option (-t) to speed things up! The higher - the +faster ;-) (but too high - and it disables the service) + + + +STATISTICS +---------- +Run against a SuSE Linux 7.2 on localhost with a "-C FILE" containing +295 entries (294 tries invalid logins, 1 valid). Every test was run three +times (only for "1 task" just once), and the average noted down. + +``` + P A R A L L E L T A S K S +SERVICE 1 4 8 16 32 50 64 100 128 +------- -------------------------------------------------------------------- +telnet 23:20 5:58 2:58 1:34 1:05 0:33 0:45* 0:25* 0:55* +ftp 45:54 11:51 5:54 3:06 1:25 0:58 0:46 0:29 0:32 +pop3 92:10 27:16 13:56 6:42 2:55 1:57 1:24 1:14 0:50 +imap 31:05 7:41 3:51 1:58 1:01 0:39 0:32 0:25 0:21 +``` + +(*) +Note: telnet timings can be VERY different for 64 to 128 tasks! e.g. with +128 tasks, running four times resulted in timings between 28 and 97 seconds! +The reason for this is unknown... + +guesses per task (rounded up): + + 295 74 38 19 10 6 5 3 3 + +guesses possible per connect (depends on the server software and config): + + telnet 4 + ftp 6 + pop3 1 + imap 3 + + + +BUGS & FEATURES +--------------- +Hydra: +Email me or David if you find bugs or if you have written a new module. +vh@thc.org (and put "antispam" in the subject line) + + +You should use PGP to encrypt emails to vh@thc.org : + +``` +-----BEGIN PGP PUBLIC KEY BLOCK----- +Version: GnuPG v3.3.3 (vh@thc.org) + +mQINBFIp+7QBEADQcJctjohuYjBxq7MELAlFDvXRTeIqqh8kqHPOR018xKL09pZT +KiBWFBkU48xlR3EtV5fC1yEt8gDEULe5o0qtK1aFlYBtAWkflVNjDrs+Y2BpjITQ +FnAPHw0SOOT/jfcvmhNOZMzMU8lIubAVC4cVWoSWJbLTv6e0DRIPiYgXNT5Quh6c +vqhnI1C39pEo/W/nh3hSa16oTc5dtTLbi5kEbdzml78TnT0OASmWLI+xtYKnP+5k +Xv4xrXRMVk4L1Bv9WpCY/Jb6J8K8SJYdXPtbaIi4VjgVr5gvg9QC/d/QP2etmw3p +lJ1Ldv63x6nXsxnPq6MSOOw8+QqKc1dAgIA43k6SU4wLq9TB3x0uTKnnB8pA3ACI +zPeRN9LFkr7v1KUMeKKEdu8jUut5iKUJVu63lVYxuM5ODb6Owt3+UXgsSaQLu9nI +DZqnp/M6YTCJTJ+cJANN+uQzESI4Z2m9ITg/U/cuccN/LIDg8/eDXW3VsCqJz8Bf +lBSwMItMhs/Qwzqc1QCKfY3xcNGc4aFlJz4Bq3zSdw3mUjHYJYv1UkKntCtvvTCN +DiomxyBEKB9J7KNsOLI/CSst3MQWSG794r9ZjcfA0EWZ9u6929F2pGDZ3LiS7Jx5 +n+gdBDMe0PuuonLIGXzyIuMrkfoBeW/WdnOxh+27eemcdpCb68XtQCw6UQARAQAB +tB52YW4gSGF1c2VyICgyMDEzKSA8dmhAdGhjLm9yZz6JAjkEEwECACMCGwMCHgEC +F4AFAlIp/QcGCwkIAwcCBhUKCQgLAgUWAwIBAAAKCRDI8AEqhCFiv2R9D/9qTCJJ +xCH4BUbWIUhw1zRkn9iCVSwZMmfaAhz5PdVTjeTelimMh5qwK2MNAjpR7vCCd3BH +Z2VLB2Eoz9MOgSCxcMOnCDJjtCdCOeaxiASJt8qLeRMwdMOtznM8MnKCIO8X4oo4 +qH8eNj83KgpI50ERBCj/EMsgg07vSyZ9i1UXjFofFnbHRWSW9yZO16qD4F6r4SGz +dsfXARcO3QRI5lbjdGqm+g+HOPj1EFLAOxJAQOygz7ZN5fj+vPp+G/drONxNyVKp +QFtENpvqPdU9CqYh8ssazXTWeBi/TIs0q0EXkzqo7CQjfNb6tlRsg18FxnJDK/ga +V/1umTg41bQuVP9gGmycsiNI8Atr5DWqaF+O4uDmQxcxS0kX2YXQ4CSQJFi0pml5 +slAGL8HaAUbV7UnQEqpayPyyTEx1i0wK5ZCHYjLBfJRZCbmHX7SbviSAzKdo5JIl +Atuk+atgW3vC3hDTrBu5qlsFCZvbxS21PJ+9zmK7ySjAEFH/NKFmx4B8kb7rPAOM +0qCTv0pD/e4ogJCxVrqQ2XcCSJWxJL31FNAMnBZpVzidudNURG2v61h3ckkSB/fP +JnkRy/yxYWrdFBYkURImxD8iFD1atj1n3EI5HBL7p/9mHxf1DVJWz7rYQk+3czvs +IhBz7xGBz4nhpCi87VDEYttghYlJanbiRfNh3okCOAQTAQIAIgUCUin7tAIbAwYL +CQgHAwIGFQgCCQoLBBYCAwECHgECF4AACgkQyPABKoQhYr8OIA//cvkhoKay88yS +AjMQypach8C5CvP7eFCT11pkCt1DMAO/8Dt6Y/Ts10dPjohGdIX4PkoLTkQDwBDJ +HoLO75oqj0CYLlqDI4oHgf2uzd0Zv8f/11CQQCtut5oEK72mGNzv3GgVqg60z2KR +2vpxvGQmDwpDOPP620tf/LuRQgBpks7uazcbkAE2Br09YrUQSCBNHy8kirHW5m5C +nupMrcvuFx7mHKW1z3FuhM8ijG7oRmcBWfVoneQgIT3l2WBniXg1mKFhuUSV8Erc +XIcc11qsKshyqh0GWb2JfeXbAcTW8/4IwrCP+VfAyLO9F9khP6SnCmcNF9EVJyR6 +Aw+JMNRin7PgvsqbFhpkq9N+gVBAufz3DZoMTEbsMTtW4lYG6HMWhza2+8G9XyaL +ARAWhkNVsmQQ5T6qGkI19thB6E/T6ZorTxqeopNVA7VNK3RVlKpkmUu07w5bTD6V +l3Ti6XfcSQqzt6YX2/WUE8ekEG3rSesuJ5fqjuTnIIOjBxr+pPxkzdoazlu2zJ9F +n24fHvlU20TccEWXteXj9VFzV/zbPEQbEqmE16lV+bO8U7UHqCOdE83OMrbNKszl +7LSCbFhCDtflUsyClBt/OPnlLEHgEE1j9QkqdFFy90l4HqGwKvx7lUFDnuF8LYsb +/hcP4XhqjiGcjTPYBDK254iYrpOSMZSIRgQQEQIABgUCUioGfQAKCRBDlBVOdiii +tuddAJ4zMrge4qzajScIQcXYgIWMXVenCQCfYTNQPGkHVyp3dMhJ0NR21TYoYMC5 +Ag0EUin7tAEQAK5/AEIBLlA/TTgjUF3im6nu/rkWTM7/gs5H4W0a04kF4UPhaJUR +gCNlDfUnBFA0QD7Jja5LHYgLdoHXiFelPhGrbZel/Sw6sH2gkGCBtFMrVkm3u7tt +x3AZlprqqRH68Y5xTCEjGRncCAmaDgd2apgisJqXpu0dRDroFYpJFNH3vw9N2a62 +0ShNakYP4ykVG3jTDC4MSl2q3BO5dzn8GYFHU0CNz6nf3gZR+48BG+zmAT77peTS ++C4Mbd6LmMmB0cuS2kYiFRwE2B69UWguLHjpXFcu9/85JJVCl2CIab7l5hpqGmgw +G/yW8HFK04Yhew7ZJOXJfUYlv1EZzR5bOsZ8Z9inC6hvFmxuCYCFnvkiEI+pOxPA +oeNOkMaT/W4W+au0ZVt3Hx+oD0pkJb5if0jrCaoAD4gpWOte6LZA8mAbKTxkHPBr +rA9/JFis5CVNI688O6eDiJqCCJjPOQA+COJI+0V+tFa6XyHPB4LxA46RxtumUZMC +v/06sDJlXMNpZbSd5Fq95YfZd4l9Vr9VrvKXfbomn+akwUymP8RDyc6Z8BzjF4Y5 +02m6Ts0J0MnSYfEDqJPPZbMGB+GAgAqLs7FrZJQzOZTiOXOSIJsKMYsPIDWE8lXv +s77rs0rGvgvQfWzPsJlMIx6ryrMnAsfOkzM2GChGNX9+pABpgOdYII4bABEBAAGJ +Ah8EGAECAAkFAlIp+7QCGwwACgkQyPABKoQhYr+hrg/9Er0+HN78y6UWGFHu/KVK +d8M6ekaqjQndQXmzQaPQwsOHOvWdC+EtBoTdR3VIjAtX96uvzCRV3sb0XPB9S9eP +gRrO/t5+qTVTtjua1zzjZsMOr1SxhBgZ5+0U2aoY1vMhyIjUuwpKKNqj2uf+uj5Y +ZQbCNklghf7EVDHsYQ4goB9gsNT7rnmrzSc6UUuJOYI2jjtHp5BPMBHh2WtUVfYP +8JqDfQ+eJQr5NCFB24xMW8OxMJit3MGckUbcZlUa1wKiTb0b76fOjt0y/+9u1ykd +X+i27DAM6PniFG8BfqPq/E3iU20IZGYtaAFBuhhDWR3vGY4+r3OxdlFAJfBG9XDD +aEDTzv1XF+tEBo69GFaxXZGdk9//7qxcgiya4LL9Kltuvs82+ZzQhC09p8d3YSQN +cfaYObm4EwbINdKP7cr4anGFXvsLC9urhow/RNBLiMbRX/5qBzx2DayXtxEnDlSC +Mh7wCkNDYkSIZOrPVUFOCGxu7lloRgPxEetM5x608HRa3hDHoe5KvUBmmtavB/aR +zlGuZP1S6Y7S13ytiULSzTfUxJmyGYgNo+4ygh0i6Dudf9NLmV+i9aEIbLbd6bni +1B/y8hBSx3SVb4sQVRe3clBkfS1/mYjlldtYjzOwcd02x599KJlcChf8HnWFB7qT +zB3yrr+vYBT0uDWmxwPjiJs= +=ytEf +-----END PGP PUBLIC KEY BLOCK----- +``` From 55682bf69aee76a6684cf9d08c1dc957540929eb Mon Sep 17 00:00:00 2001 From: Yisus7u7 <64093255+Yisus7u7@users.noreply.github.com> Date: Wed, 16 Jun 2021 12:51:29 -0500 Subject: [PATCH 371/531] Set theme jekyll-theme-modernist --- _config.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_config.yml b/_config.yml index 8dd6c5f..0400ff8 100644 --- a/_config.yml +++ b/_config.yml @@ -1,2 +1,2 @@ title: "thc-hydra" -theme: jekyll-theme-hacker +theme: jekyll-theme-modernist From 24395ab478c863ca0660aefd3f5004186ade11e0 Mon Sep 17 00:00:00 2001 From: Yisus7u7 <64093255+Yisus7u7@users.noreply.github.com> Date: Wed, 16 Jun 2021 12:53:17 -0500 Subject: [PATCH 372/531] Set theme jekyll-theme-midnight --- _config.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_config.yml b/_config.yml index 0400ff8..225f091 100644 --- a/_config.yml +++ b/_config.yml @@ -1,2 +1,2 @@ title: "thc-hydra" -theme: jekyll-theme-modernist +theme: jekyll-theme-midnight From 27cab133fa1119ad1c15c7dd575cf7474c9bbbae Mon Sep 17 00:00:00 2001 From: Yisus7u7 <64093255+Yisus7u7@users.noreply.github.com> Date: Wed, 16 Jun 2021 12:56:27 -0500 Subject: [PATCH 373/531] Delete index.md --- docs/hydra/index.md | 534 -------------------------------------------- 1 file changed, 534 deletions(-) delete mode 100644 docs/hydra/index.md diff --git a/docs/hydra/index.md b/docs/hydra/index.md deleted file mode 100644 index 322da43..0000000 --- a/docs/hydra/index.md +++ /dev/null @@ -1,534 +0,0 @@ - - H Y D R A - - (c) 2001-2021 by van Hauser / THC - https://github.com/vanhauser-thc/thc-hydra - many modules were written by David (dot) Maciejak @ gmail (dot) com - BFG code by Jan Dlabal - - Licensed under AGPLv3 (see LICENSE file) - - Please do not use in military or secret service organizations, - or for illegal purposes. - (This is the wish of the author and non-binding. Many people working - in these organizations do not care for laws and ethics anyways. - You are not one of the "good" ones if you ignore this.) - - - -INTRODUCTION ------------- -Number one of the biggest security holes are passwords, as every password -security study shows. -This tool is a proof of concept code, to give researchers and security -consultants the possibility to show how easy it would be to gain unauthorized -access from remote to a system. - -THIS TOOL IS FOR LEGAL PURPOSES ONLY! - -There are already several login hacker tools available, however, none does -either support more than one protocol to attack or support parallelized -connects. - -It was tested to compile cleanly on Linux, Windows/Cygwin, Solaris, -FreeBSD/OpenBSD, QNX (Blackberry 10) and MacOS. - -Currently this tool supports the following protocols: - Asterisk, AFP, Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird, FTP, - HTTP-FORM-GET, HTTP-FORM-POST, HTTP-GET, HTTP-HEAD, HTTP-POST, HTTP-PROXY, - HTTPS-FORM-GET, HTTPS-FORM-POST, HTTPS-GET, HTTPS-HEAD, HTTPS-POST, - HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MEMCACHED, MONGODB, MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, - Oracle SID, Oracle, PC-Anywhere, PCNFS, POP3, POSTGRES, Radmin, RDP, Rexec, Rlogin, - Rsh, RTSP, SAP/R3, SIP, SMB, SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, - SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, - VNC and XMPP. - -However the module engine for new services is very easy so it won't take a -long time until even more services are supported. -Your help in writing, enhancing or fixing modules is highly appreciated!! :-) - - - -WHERE TO GET ------------- -You can always find the newest release/production version of hydra at its -project page at https://github.com/vanhauser-thc/thc-hydra/releases -If you are interested in the current development state, the public development -repository is at Github: - svn co https://github.com/vanhauser-thc/thc-hydra - or - git clone https://github.com/vanhauser-thc/thc-hydra -Use the development version at your own risk. It contains new features and -new bugs. Things might not work! - - - -HOW TO COMPILE --------------- -To configure, compile and install hydra, just type: - -``` -./configure -make -make install -``` - -If you want the ssh module, you have to setup libssh (not libssh2!) on your -system, get it from http://www.libssh.org, for ssh v1 support you also need -to add "-DWITH_SSH1=On" option in the cmake command line. -IMPORTANT: If you compile on MacOS then you must do this - do not install libssh via brew! - -If you use Ubuntu/Debian, this will install supplementary libraries needed -for a few optional modules (note that some might not be available on your distribution): - -``` -apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev \ - libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev \ - firebird-dev libmemcached-dev libgpg-error-dev \ - libgcrypt11-dev libgcrypt20-dev -``` - -This enables all optional modules and features with the exception of Oracle, -SAP R/3, NCP and the apple filing protocol - which you will need to download and -install from the vendor's web sites. - -For all other Linux derivates and BSD based systems, use the system -software installer and look for similarly named libraries like in the -command above. In all other cases, you have to download all source libraries -and compile them manually. - - - -SUPPORTED PLATFORMS -------------------- -- All UNIX platforms (Linux, *BSD, Solaris, etc.) -- MacOS (basically a BSD clone) -- Windows with Cygwin (both IPv4 and IPv6) -- Mobile systems based on Linux, MacOS or QNX (e.g. Android, iPhone, Blackberry 10, Zaurus, iPaq) - - - -HOW TO USE ----------- -If you just enter `hydra`, you will see a short summary of the important -options available. -Type `./hydra -h` to see all available command line options. - -Note that NO login/password file is included. Generate them yourself. -A default password list is however present, use "dpl4hydra.sh" to generate -a list. - -For Linux users, a GTK GUI is available, try `./xhydra` - -For the command line usage, the syntax is as follows: - For attacking one target or a network, you can use the new "://" style: - hydra [some command line options] PROTOCOL://TARGET:PORT/MODULE-OPTIONS - The old mode can be used for these too, and additionally if you want to - specify your targets from a text file, you *must* use this one: - -``` -hydra [some command line options] [-s PORT] TARGET PROTOCOL [MODULE-OPTIONS] -``` - -Via the command line options you specify which logins to try, which passwords, -if SSL should be used, how many parallel tasks to use for attacking, etc. - -PROTOCOL is the protocol you want to use for attacking, e.g. ftp, smtp, -http-get or many others are available -TARGET is the target you want to attack -MODULE-OPTIONS are optional values which are special per PROTOCOL module - -FIRST - select your target - you have three options on how to specify the target you want to attack: - 1. a single target on the command line: just put the IP or DNS address in - 2. a network range on the command line: CIDR specification like "192.168.0.0/24" - 3. a list of hosts in a text file: one line per entry (see below) - -SECOND - select your protocol - Try to avoid telnet, as it is unreliable to detect a correct or false login attempt. - Use a port scanner to see which protocols are enabled on the target. - -THIRD - check if the module has optional parameters - hydra -U PROTOCOL - e.g. hydra -U smtp - -FOURTH - the destination port - this is optional, if no port is supplied the default common port for the - PROTOCOL is used. - If you specify SSL to use ("-S" option), the SSL common port is used by default. - - -If you use "://" notation, you must use "[" "]" brackets if you want to supply -IPv6 addresses or CIDR ("192.168.0.0/24") notations to attack: - hydra [some command line options] ftp://[192.168.0.0/24]/ - hydra [some command line options] -6 smtps://[2001:db8::1]/NTLM - -Note that everything hydra does is IPv4 only! -If you want to attack IPv6 addresses, you must add the "-6" command line option. -All attacks are then IPv6 only! - -If you want to supply your targets via a text file, you can not use the :// -notation but use the old style and just supply the protocol (and module options): - hydra [some command line options] -M targets.txt ftp -You can also supply the port for each target entry by adding ":" after a -target entry in the file, e.g.: - -``` -foo.bar.com -target.com:21 -unusual.port.com:2121 -default.used.here.com -127.0.0.1 -127.0.0.1:2121 -``` - -Note that if you want to attach IPv6 targets, you must supply the -6 option -and *must* put IPv6 addresses in brackets in the file(!) like this: - -``` -foo.bar.com -target.com:21 -[fe80::1%eth0] -[2001::1] -[2002::2]:8080 -[2a01:24a:133:0:00:123:ff:1a] -``` - -LOGINS AND PASSWORDS --------------------- -You have many options on how to attack with logins and passwords -With -l for login and -p for password you tell hydra that this is the only -login and/or password to try. -With -L for logins and -P for passwords you supply text files with entries. -e.g.: - -``` -hydra -l admin -p password ftp://localhost/ -hydra -L default_logins.txt -p test ftp://localhost/ -hydra -l admin -P common_passwords.txt ftp://localhost/ -hydra -L logins.txt -P passwords.txt ftp://localhost/ -``` - -Additionally, you can try passwords based on the login via the "-e" option. -The "-e" option has three parameters: - -``` -s - try the login as password -n - try an empty password -r - reverse the login and try it as password -``` - -If you want to, e.g. try "try login as password and "empty password", you -specify "-e sn" on the command line. - -But there are two more modes for trying passwords than -p/-P: -You can use text file which where a login and password pair is separated by a colon, -e.g.: - -``` -admin:password -test:test -foo:bar -``` - -This is a common default account style listing, that is also generated by the -dpl4hydra.sh default account file generator supplied with hydra. -You use such a text file with the -C option - note that in this mode you -can not use -l/-L/-p/-P options (-e nsr however you can). -Example: - -``` -hydra -C default_accounts.txt ftp://localhost/ -``` - -And finally, there is a bruteforce mode with the -x option (which you can not -use with -p/-P/-C): - -``` --x minimum_length:maximum_length:charset -``` - -the charset definition is `a` for lowercase letters, `A` for uppercase letters, -`1` for numbers and for anything else you supply it is their real representation. -Examples: - -``` --x 1:3:a generate passwords from length 1 to 3 with all lowercase letters --x 2:5:/ generate passwords from length 2 to 5 containing only slashes --x 5:8:A1 generate passwords from length 5 to 8 with uppercase and numbers -``` - -Example: - -``` -hydra -l ftp -x 3:3:a ftp://localhost/ -``` - -SPECIAL OPTIONS FOR MODULES ---------------------------- -Via the third command line parameter (TARGET SERVICE OPTIONAL) or the -m -command line option, you can pass one option to a module. -Many modules use this, a few require it! - -To see the special option of a module, type: - - hydra -U - -e.g. - - ./hydra -U http-post-form - -The special options can be passed via the -m parameter, as 3rd command line -option or in the service://target/option format. - -Examples (they are all equal): - -``` -./hydra -l test -p test -m PLAIN 127.0.0.1 imap -./hydra -l test -p test 127.0.0.1 imap PLAIN -./hydra -l test -p test imap://127.0.0.1/PLAIN -``` - -RESTORING AN ABORTED/CRASHED SESSION ------------------------------------- -When hydra is aborted with Control-C, killed or crashes, it leaves a -"hydra.restore" file behind which contains all necessary information to -restore the session. This session file is written every 5 minutes. -NOTE: the hydra.restore file can NOT be copied to a different platform (e.g. -from little endian to big endian, or from Solaris to AIX) - -HOW TO SCAN/CRACK OVER A PROXY ------------------------------- -The environment variable HYDRA_PROXY_HTTP defines the web proxy (this works -just for the http services!). -The following syntax is valid: - -``` -HYDRA_PROXY_HTTP="http://123.45.67.89:8080/" -HYDRA_PROXY_HTTP="http://login:password@123.45.67.89:8080/" -HYDRA_PROXY_HTTP="proxylist.txt" -``` - -The last example is a text file containing up to 64 proxies (in the same -format definition as the other examples). - -For all other services, use the HYDRA_PROXY variable to scan/crack. -It uses the same syntax. eg: - -``` -HYDRA_PROXY=[connect|socks4|socks5]://[login:password@]proxy_addr:proxy_port -``` - -for example: - -``` -HYDRA_PROXY=connect://proxy.anonymizer.com:8000 -HYDRA_PROXY=socks4://auth:pw@127.0.0.1:1080 -HYDRA_PROXY=socksproxylist.txt -``` - -ADDITIONAL HINTS ----------------- -* sort your password files by likelihood and use the -u option to find - passwords much faster! -* uniq your dictionary files! this can save you a lot of time :-) - cat words.txt | sort | uniq > dictionary.txt -* if you know that the target is using a password policy (allowing users - only to choose a password with a minimum length of 6, containing a least one - letter and one number, etc. use the tool pw-inspector which comes along - with the hydra package to reduce the password list: - cat dictionary.txt | pw-inspector -m 6 -c 2 -n > passlist.txt - - -RESULTS OUTPUT --------------- - -The results are output to stdio along with the other information. Via the -o -command line option, the results can also be written to a file. Using -b, -the format of the output can be specified. Currently, these are supported: - -* `text` - plain text format -* `jsonv1` - JSON data using version 1.x of the schema (defined below). -* `json` - JSON data using the latest version of the schema, currently there - is only version 1. - -If using JSON output, the results file may not be valid JSON if there are -serious errors in booting Hydra. - - -JSON Schema ------------ -Here is an example of the JSON output. Notes on some of the fields: - -* `errormessages` - an array of zero or more strings that are normally printed - to stderr at the end of the Hydra's run. The text is very free form. -* `success` - indication if Hydra ran correctly without error (**NOT** if - passwords were detected). This parameter is either the JSON value `true` - or `false` depending on completion. -* `quantityfound` - How many username+password combinations discovered. -* `jsonoutputversion` - Version of the schema, 1.00, 1.01, 1.11, 2.00, - 2.03, etc. Hydra will make second tuple of the version to always be two - digits to make it easier for downstream processors (as opposed to v1.1 vs - v1.10). The minor-level versions are additive, so 1.02 will contain more - fields than version 1.00 and will be backward compatible. Version 2.x will - break something from version 1.x output. - -Version 1.00 example: -``` -{ - "errormessages": [ - "[ERROR] Error Message of Something", - "[ERROR] Another Message", - "These are very free form" - ], - "generator": { - "built": "2021-03-01 14:44:22", - "commandline": "hydra -b jsonv1 -o results.json ... ...", - "jsonoutputversion": "1.00", - "server": "127.0.0.1", - "service": "http-post-form", - "software": "Hydra", - "version": "v8.5" - }, - "quantityfound": 2, - "results": [ - { - "host": "127.0.0.1", - "login": "bill@example.com", - "password": "bill", - "port": 9999, - "service": "http-post-form" - }, - { - "host": "127.0.0.1", - "login": "joe@example.com", - "password": "joe", - "port": 9999, - "service": "http-post-form" - } - ], - "success": false -} -``` - - -SPEED ------ -through the parallelizing feature, this password cracker tool can be very -fast, however it depends on the protocol. The fastest are generally POP3 -and FTP. -Experiment with the task option (-t) to speed things up! The higher - the -faster ;-) (but too high - and it disables the service) - - - -STATISTICS ----------- -Run against a SuSE Linux 7.2 on localhost with a "-C FILE" containing -295 entries (294 tries invalid logins, 1 valid). Every test was run three -times (only for "1 task" just once), and the average noted down. - -``` - P A R A L L E L T A S K S -SERVICE 1 4 8 16 32 50 64 100 128 -------- -------------------------------------------------------------------- -telnet 23:20 5:58 2:58 1:34 1:05 0:33 0:45* 0:25* 0:55* -ftp 45:54 11:51 5:54 3:06 1:25 0:58 0:46 0:29 0:32 -pop3 92:10 27:16 13:56 6:42 2:55 1:57 1:24 1:14 0:50 -imap 31:05 7:41 3:51 1:58 1:01 0:39 0:32 0:25 0:21 -``` - -(*) -Note: telnet timings can be VERY different for 64 to 128 tasks! e.g. with -128 tasks, running four times resulted in timings between 28 and 97 seconds! -The reason for this is unknown... - -guesses per task (rounded up): - - 295 74 38 19 10 6 5 3 3 - -guesses possible per connect (depends on the server software and config): - - telnet 4 - ftp 6 - pop3 1 - imap 3 - - - -BUGS & FEATURES ---------------- -Hydra: -Email me or David if you find bugs or if you have written a new module. -vh@thc.org (and put "antispam" in the subject line) - - -You should use PGP to encrypt emails to vh@thc.org : - -``` ------BEGIN PGP PUBLIC KEY BLOCK----- -Version: GnuPG v3.3.3 (vh@thc.org) - -mQINBFIp+7QBEADQcJctjohuYjBxq7MELAlFDvXRTeIqqh8kqHPOR018xKL09pZT -KiBWFBkU48xlR3EtV5fC1yEt8gDEULe5o0qtK1aFlYBtAWkflVNjDrs+Y2BpjITQ -FnAPHw0SOOT/jfcvmhNOZMzMU8lIubAVC4cVWoSWJbLTv6e0DRIPiYgXNT5Quh6c -vqhnI1C39pEo/W/nh3hSa16oTc5dtTLbi5kEbdzml78TnT0OASmWLI+xtYKnP+5k -Xv4xrXRMVk4L1Bv9WpCY/Jb6J8K8SJYdXPtbaIi4VjgVr5gvg9QC/d/QP2etmw3p -lJ1Ldv63x6nXsxnPq6MSOOw8+QqKc1dAgIA43k6SU4wLq9TB3x0uTKnnB8pA3ACI -zPeRN9LFkr7v1KUMeKKEdu8jUut5iKUJVu63lVYxuM5ODb6Owt3+UXgsSaQLu9nI -DZqnp/M6YTCJTJ+cJANN+uQzESI4Z2m9ITg/U/cuccN/LIDg8/eDXW3VsCqJz8Bf -lBSwMItMhs/Qwzqc1QCKfY3xcNGc4aFlJz4Bq3zSdw3mUjHYJYv1UkKntCtvvTCN -DiomxyBEKB9J7KNsOLI/CSst3MQWSG794r9ZjcfA0EWZ9u6929F2pGDZ3LiS7Jx5 -n+gdBDMe0PuuonLIGXzyIuMrkfoBeW/WdnOxh+27eemcdpCb68XtQCw6UQARAQAB -tB52YW4gSGF1c2VyICgyMDEzKSA8dmhAdGhjLm9yZz6JAjkEEwECACMCGwMCHgEC -F4AFAlIp/QcGCwkIAwcCBhUKCQgLAgUWAwIBAAAKCRDI8AEqhCFiv2R9D/9qTCJJ -xCH4BUbWIUhw1zRkn9iCVSwZMmfaAhz5PdVTjeTelimMh5qwK2MNAjpR7vCCd3BH -Z2VLB2Eoz9MOgSCxcMOnCDJjtCdCOeaxiASJt8qLeRMwdMOtznM8MnKCIO8X4oo4 -qH8eNj83KgpI50ERBCj/EMsgg07vSyZ9i1UXjFofFnbHRWSW9yZO16qD4F6r4SGz -dsfXARcO3QRI5lbjdGqm+g+HOPj1EFLAOxJAQOygz7ZN5fj+vPp+G/drONxNyVKp -QFtENpvqPdU9CqYh8ssazXTWeBi/TIs0q0EXkzqo7CQjfNb6tlRsg18FxnJDK/ga -V/1umTg41bQuVP9gGmycsiNI8Atr5DWqaF+O4uDmQxcxS0kX2YXQ4CSQJFi0pml5 -slAGL8HaAUbV7UnQEqpayPyyTEx1i0wK5ZCHYjLBfJRZCbmHX7SbviSAzKdo5JIl -Atuk+atgW3vC3hDTrBu5qlsFCZvbxS21PJ+9zmK7ySjAEFH/NKFmx4B8kb7rPAOM -0qCTv0pD/e4ogJCxVrqQ2XcCSJWxJL31FNAMnBZpVzidudNURG2v61h3ckkSB/fP -JnkRy/yxYWrdFBYkURImxD8iFD1atj1n3EI5HBL7p/9mHxf1DVJWz7rYQk+3czvs -IhBz7xGBz4nhpCi87VDEYttghYlJanbiRfNh3okCOAQTAQIAIgUCUin7tAIbAwYL -CQgHAwIGFQgCCQoLBBYCAwECHgECF4AACgkQyPABKoQhYr8OIA//cvkhoKay88yS -AjMQypach8C5CvP7eFCT11pkCt1DMAO/8Dt6Y/Ts10dPjohGdIX4PkoLTkQDwBDJ -HoLO75oqj0CYLlqDI4oHgf2uzd0Zv8f/11CQQCtut5oEK72mGNzv3GgVqg60z2KR -2vpxvGQmDwpDOPP620tf/LuRQgBpks7uazcbkAE2Br09YrUQSCBNHy8kirHW5m5C -nupMrcvuFx7mHKW1z3FuhM8ijG7oRmcBWfVoneQgIT3l2WBniXg1mKFhuUSV8Erc -XIcc11qsKshyqh0GWb2JfeXbAcTW8/4IwrCP+VfAyLO9F9khP6SnCmcNF9EVJyR6 -Aw+JMNRin7PgvsqbFhpkq9N+gVBAufz3DZoMTEbsMTtW4lYG6HMWhza2+8G9XyaL -ARAWhkNVsmQQ5T6qGkI19thB6E/T6ZorTxqeopNVA7VNK3RVlKpkmUu07w5bTD6V -l3Ti6XfcSQqzt6YX2/WUE8ekEG3rSesuJ5fqjuTnIIOjBxr+pPxkzdoazlu2zJ9F -n24fHvlU20TccEWXteXj9VFzV/zbPEQbEqmE16lV+bO8U7UHqCOdE83OMrbNKszl -7LSCbFhCDtflUsyClBt/OPnlLEHgEE1j9QkqdFFy90l4HqGwKvx7lUFDnuF8LYsb -/hcP4XhqjiGcjTPYBDK254iYrpOSMZSIRgQQEQIABgUCUioGfQAKCRBDlBVOdiii -tuddAJ4zMrge4qzajScIQcXYgIWMXVenCQCfYTNQPGkHVyp3dMhJ0NR21TYoYMC5 -Ag0EUin7tAEQAK5/AEIBLlA/TTgjUF3im6nu/rkWTM7/gs5H4W0a04kF4UPhaJUR -gCNlDfUnBFA0QD7Jja5LHYgLdoHXiFelPhGrbZel/Sw6sH2gkGCBtFMrVkm3u7tt -x3AZlprqqRH68Y5xTCEjGRncCAmaDgd2apgisJqXpu0dRDroFYpJFNH3vw9N2a62 -0ShNakYP4ykVG3jTDC4MSl2q3BO5dzn8GYFHU0CNz6nf3gZR+48BG+zmAT77peTS -+C4Mbd6LmMmB0cuS2kYiFRwE2B69UWguLHjpXFcu9/85JJVCl2CIab7l5hpqGmgw -G/yW8HFK04Yhew7ZJOXJfUYlv1EZzR5bOsZ8Z9inC6hvFmxuCYCFnvkiEI+pOxPA -oeNOkMaT/W4W+au0ZVt3Hx+oD0pkJb5if0jrCaoAD4gpWOte6LZA8mAbKTxkHPBr -rA9/JFis5CVNI688O6eDiJqCCJjPOQA+COJI+0V+tFa6XyHPB4LxA46RxtumUZMC -v/06sDJlXMNpZbSd5Fq95YfZd4l9Vr9VrvKXfbomn+akwUymP8RDyc6Z8BzjF4Y5 -02m6Ts0J0MnSYfEDqJPPZbMGB+GAgAqLs7FrZJQzOZTiOXOSIJsKMYsPIDWE8lXv -s77rs0rGvgvQfWzPsJlMIx6ryrMnAsfOkzM2GChGNX9+pABpgOdYII4bABEBAAGJ -Ah8EGAECAAkFAlIp+7QCGwwACgkQyPABKoQhYr+hrg/9Er0+HN78y6UWGFHu/KVK -d8M6ekaqjQndQXmzQaPQwsOHOvWdC+EtBoTdR3VIjAtX96uvzCRV3sb0XPB9S9eP -gRrO/t5+qTVTtjua1zzjZsMOr1SxhBgZ5+0U2aoY1vMhyIjUuwpKKNqj2uf+uj5Y -ZQbCNklghf7EVDHsYQ4goB9gsNT7rnmrzSc6UUuJOYI2jjtHp5BPMBHh2WtUVfYP -8JqDfQ+eJQr5NCFB24xMW8OxMJit3MGckUbcZlUa1wKiTb0b76fOjt0y/+9u1ykd -X+i27DAM6PniFG8BfqPq/E3iU20IZGYtaAFBuhhDWR3vGY4+r3OxdlFAJfBG9XDD -aEDTzv1XF+tEBo69GFaxXZGdk9//7qxcgiya4LL9Kltuvs82+ZzQhC09p8d3YSQN -cfaYObm4EwbINdKP7cr4anGFXvsLC9urhow/RNBLiMbRX/5qBzx2DayXtxEnDlSC -Mh7wCkNDYkSIZOrPVUFOCGxu7lloRgPxEetM5x608HRa3hDHoe5KvUBmmtavB/aR -zlGuZP1S6Y7S13ytiULSzTfUxJmyGYgNo+4ygh0i6Dudf9NLmV+i9aEIbLbd6bni -1B/y8hBSx3SVb4sQVRe3clBkfS1/mYjlldtYjzOwcd02x599KJlcChf8HnWFB7qT -zB3yrr+vYBT0uDWmxwPjiJs= -=ytEf ------END PGP PUBLIC KEY BLOCK----- -``` From 0483351e6a8af1d2520e160bab87705d5c96a541 Mon Sep 17 00:00:00 2001 From: Yisus7u7 <64093255+Yisus7u7@users.noreply.github.com> Date: Wed, 16 Jun 2021 15:44:42 -0500 Subject: [PATCH 374/531] Create index.md --- docs/index.md | 534 ++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 534 insertions(+) create mode 100644 docs/index.md diff --git a/docs/index.md b/docs/index.md new file mode 100644 index 0000000..322da43 --- /dev/null +++ b/docs/index.md @@ -0,0 +1,534 @@ + + H Y D R A + + (c) 2001-2021 by van Hauser / THC + https://github.com/vanhauser-thc/thc-hydra + many modules were written by David (dot) Maciejak @ gmail (dot) com + BFG code by Jan Dlabal + + Licensed under AGPLv3 (see LICENSE file) + + Please do not use in military or secret service organizations, + or for illegal purposes. + (This is the wish of the author and non-binding. Many people working + in these organizations do not care for laws and ethics anyways. + You are not one of the "good" ones if you ignore this.) + + + +INTRODUCTION +------------ +Number one of the biggest security holes are passwords, as every password +security study shows. +This tool is a proof of concept code, to give researchers and security +consultants the possibility to show how easy it would be to gain unauthorized +access from remote to a system. + +THIS TOOL IS FOR LEGAL PURPOSES ONLY! + +There are already several login hacker tools available, however, none does +either support more than one protocol to attack or support parallelized +connects. + +It was tested to compile cleanly on Linux, Windows/Cygwin, Solaris, +FreeBSD/OpenBSD, QNX (Blackberry 10) and MacOS. + +Currently this tool supports the following protocols: + Asterisk, AFP, Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird, FTP, + HTTP-FORM-GET, HTTP-FORM-POST, HTTP-GET, HTTP-HEAD, HTTP-POST, HTTP-PROXY, + HTTPS-FORM-GET, HTTPS-FORM-POST, HTTPS-GET, HTTPS-HEAD, HTTPS-POST, + HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MEMCACHED, MONGODB, MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, + Oracle SID, Oracle, PC-Anywhere, PCNFS, POP3, POSTGRES, Radmin, RDP, Rexec, Rlogin, + Rsh, RTSP, SAP/R3, SIP, SMB, SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, + SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, + VNC and XMPP. + +However the module engine for new services is very easy so it won't take a +long time until even more services are supported. +Your help in writing, enhancing or fixing modules is highly appreciated!! :-) + + + +WHERE TO GET +------------ +You can always find the newest release/production version of hydra at its +project page at https://github.com/vanhauser-thc/thc-hydra/releases +If you are interested in the current development state, the public development +repository is at Github: + svn co https://github.com/vanhauser-thc/thc-hydra + or + git clone https://github.com/vanhauser-thc/thc-hydra +Use the development version at your own risk. It contains new features and +new bugs. Things might not work! + + + +HOW TO COMPILE +-------------- +To configure, compile and install hydra, just type: + +``` +./configure +make +make install +``` + +If you want the ssh module, you have to setup libssh (not libssh2!) on your +system, get it from http://www.libssh.org, for ssh v1 support you also need +to add "-DWITH_SSH1=On" option in the cmake command line. +IMPORTANT: If you compile on MacOS then you must do this - do not install libssh via brew! + +If you use Ubuntu/Debian, this will install supplementary libraries needed +for a few optional modules (note that some might not be available on your distribution): + +``` +apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev \ + libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev \ + firebird-dev libmemcached-dev libgpg-error-dev \ + libgcrypt11-dev libgcrypt20-dev +``` + +This enables all optional modules and features with the exception of Oracle, +SAP R/3, NCP and the apple filing protocol - which you will need to download and +install from the vendor's web sites. + +For all other Linux derivates and BSD based systems, use the system +software installer and look for similarly named libraries like in the +command above. In all other cases, you have to download all source libraries +and compile them manually. + + + +SUPPORTED PLATFORMS +------------------- +- All UNIX platforms (Linux, *BSD, Solaris, etc.) +- MacOS (basically a BSD clone) +- Windows with Cygwin (both IPv4 and IPv6) +- Mobile systems based on Linux, MacOS or QNX (e.g. Android, iPhone, Blackberry 10, Zaurus, iPaq) + + + +HOW TO USE +---------- +If you just enter `hydra`, you will see a short summary of the important +options available. +Type `./hydra -h` to see all available command line options. + +Note that NO login/password file is included. Generate them yourself. +A default password list is however present, use "dpl4hydra.sh" to generate +a list. + +For Linux users, a GTK GUI is available, try `./xhydra` + +For the command line usage, the syntax is as follows: + For attacking one target or a network, you can use the new "://" style: + hydra [some command line options] PROTOCOL://TARGET:PORT/MODULE-OPTIONS + The old mode can be used for these too, and additionally if you want to + specify your targets from a text file, you *must* use this one: + +``` +hydra [some command line options] [-s PORT] TARGET PROTOCOL [MODULE-OPTIONS] +``` + +Via the command line options you specify which logins to try, which passwords, +if SSL should be used, how many parallel tasks to use for attacking, etc. + +PROTOCOL is the protocol you want to use for attacking, e.g. ftp, smtp, +http-get or many others are available +TARGET is the target you want to attack +MODULE-OPTIONS are optional values which are special per PROTOCOL module + +FIRST - select your target + you have three options on how to specify the target you want to attack: + 1. a single target on the command line: just put the IP or DNS address in + 2. a network range on the command line: CIDR specification like "192.168.0.0/24" + 3. a list of hosts in a text file: one line per entry (see below) + +SECOND - select your protocol + Try to avoid telnet, as it is unreliable to detect a correct or false login attempt. + Use a port scanner to see which protocols are enabled on the target. + +THIRD - check if the module has optional parameters + hydra -U PROTOCOL + e.g. hydra -U smtp + +FOURTH - the destination port + this is optional, if no port is supplied the default common port for the + PROTOCOL is used. + If you specify SSL to use ("-S" option), the SSL common port is used by default. + + +If you use "://" notation, you must use "[" "]" brackets if you want to supply +IPv6 addresses or CIDR ("192.168.0.0/24") notations to attack: + hydra [some command line options] ftp://[192.168.0.0/24]/ + hydra [some command line options] -6 smtps://[2001:db8::1]/NTLM + +Note that everything hydra does is IPv4 only! +If you want to attack IPv6 addresses, you must add the "-6" command line option. +All attacks are then IPv6 only! + +If you want to supply your targets via a text file, you can not use the :// +notation but use the old style and just supply the protocol (and module options): + hydra [some command line options] -M targets.txt ftp +You can also supply the port for each target entry by adding ":" after a +target entry in the file, e.g.: + +``` +foo.bar.com +target.com:21 +unusual.port.com:2121 +default.used.here.com +127.0.0.1 +127.0.0.1:2121 +``` + +Note that if you want to attach IPv6 targets, you must supply the -6 option +and *must* put IPv6 addresses in brackets in the file(!) like this: + +``` +foo.bar.com +target.com:21 +[fe80::1%eth0] +[2001::1] +[2002::2]:8080 +[2a01:24a:133:0:00:123:ff:1a] +``` + +LOGINS AND PASSWORDS +-------------------- +You have many options on how to attack with logins and passwords +With -l for login and -p for password you tell hydra that this is the only +login and/or password to try. +With -L for logins and -P for passwords you supply text files with entries. +e.g.: + +``` +hydra -l admin -p password ftp://localhost/ +hydra -L default_logins.txt -p test ftp://localhost/ +hydra -l admin -P common_passwords.txt ftp://localhost/ +hydra -L logins.txt -P passwords.txt ftp://localhost/ +``` + +Additionally, you can try passwords based on the login via the "-e" option. +The "-e" option has three parameters: + +``` +s - try the login as password +n - try an empty password +r - reverse the login and try it as password +``` + +If you want to, e.g. try "try login as password and "empty password", you +specify "-e sn" on the command line. + +But there are two more modes for trying passwords than -p/-P: +You can use text file which where a login and password pair is separated by a colon, +e.g.: + +``` +admin:password +test:test +foo:bar +``` + +This is a common default account style listing, that is also generated by the +dpl4hydra.sh default account file generator supplied with hydra. +You use such a text file with the -C option - note that in this mode you +can not use -l/-L/-p/-P options (-e nsr however you can). +Example: + +``` +hydra -C default_accounts.txt ftp://localhost/ +``` + +And finally, there is a bruteforce mode with the -x option (which you can not +use with -p/-P/-C): + +``` +-x minimum_length:maximum_length:charset +``` + +the charset definition is `a` for lowercase letters, `A` for uppercase letters, +`1` for numbers and for anything else you supply it is their real representation. +Examples: + +``` +-x 1:3:a generate passwords from length 1 to 3 with all lowercase letters +-x 2:5:/ generate passwords from length 2 to 5 containing only slashes +-x 5:8:A1 generate passwords from length 5 to 8 with uppercase and numbers +``` + +Example: + +``` +hydra -l ftp -x 3:3:a ftp://localhost/ +``` + +SPECIAL OPTIONS FOR MODULES +--------------------------- +Via the third command line parameter (TARGET SERVICE OPTIONAL) or the -m +command line option, you can pass one option to a module. +Many modules use this, a few require it! + +To see the special option of a module, type: + + hydra -U + +e.g. + + ./hydra -U http-post-form + +The special options can be passed via the -m parameter, as 3rd command line +option or in the service://target/option format. + +Examples (they are all equal): + +``` +./hydra -l test -p test -m PLAIN 127.0.0.1 imap +./hydra -l test -p test 127.0.0.1 imap PLAIN +./hydra -l test -p test imap://127.0.0.1/PLAIN +``` + +RESTORING AN ABORTED/CRASHED SESSION +------------------------------------ +When hydra is aborted with Control-C, killed or crashes, it leaves a +"hydra.restore" file behind which contains all necessary information to +restore the session. This session file is written every 5 minutes. +NOTE: the hydra.restore file can NOT be copied to a different platform (e.g. +from little endian to big endian, or from Solaris to AIX) + +HOW TO SCAN/CRACK OVER A PROXY +------------------------------ +The environment variable HYDRA_PROXY_HTTP defines the web proxy (this works +just for the http services!). +The following syntax is valid: + +``` +HYDRA_PROXY_HTTP="http://123.45.67.89:8080/" +HYDRA_PROXY_HTTP="http://login:password@123.45.67.89:8080/" +HYDRA_PROXY_HTTP="proxylist.txt" +``` + +The last example is a text file containing up to 64 proxies (in the same +format definition as the other examples). + +For all other services, use the HYDRA_PROXY variable to scan/crack. +It uses the same syntax. eg: + +``` +HYDRA_PROXY=[connect|socks4|socks5]://[login:password@]proxy_addr:proxy_port +``` + +for example: + +``` +HYDRA_PROXY=connect://proxy.anonymizer.com:8000 +HYDRA_PROXY=socks4://auth:pw@127.0.0.1:1080 +HYDRA_PROXY=socksproxylist.txt +``` + +ADDITIONAL HINTS +---------------- +* sort your password files by likelihood and use the -u option to find + passwords much faster! +* uniq your dictionary files! this can save you a lot of time :-) + cat words.txt | sort | uniq > dictionary.txt +* if you know that the target is using a password policy (allowing users + only to choose a password with a minimum length of 6, containing a least one + letter and one number, etc. use the tool pw-inspector which comes along + with the hydra package to reduce the password list: + cat dictionary.txt | pw-inspector -m 6 -c 2 -n > passlist.txt + + +RESULTS OUTPUT +-------------- + +The results are output to stdio along with the other information. Via the -o +command line option, the results can also be written to a file. Using -b, +the format of the output can be specified. Currently, these are supported: + +* `text` - plain text format +* `jsonv1` - JSON data using version 1.x of the schema (defined below). +* `json` - JSON data using the latest version of the schema, currently there + is only version 1. + +If using JSON output, the results file may not be valid JSON if there are +serious errors in booting Hydra. + + +JSON Schema +----------- +Here is an example of the JSON output. Notes on some of the fields: + +* `errormessages` - an array of zero or more strings that are normally printed + to stderr at the end of the Hydra's run. The text is very free form. +* `success` - indication if Hydra ran correctly without error (**NOT** if + passwords were detected). This parameter is either the JSON value `true` + or `false` depending on completion. +* `quantityfound` - How many username+password combinations discovered. +* `jsonoutputversion` - Version of the schema, 1.00, 1.01, 1.11, 2.00, + 2.03, etc. Hydra will make second tuple of the version to always be two + digits to make it easier for downstream processors (as opposed to v1.1 vs + v1.10). The minor-level versions are additive, so 1.02 will contain more + fields than version 1.00 and will be backward compatible. Version 2.x will + break something from version 1.x output. + +Version 1.00 example: +``` +{ + "errormessages": [ + "[ERROR] Error Message of Something", + "[ERROR] Another Message", + "These are very free form" + ], + "generator": { + "built": "2021-03-01 14:44:22", + "commandline": "hydra -b jsonv1 -o results.json ... ...", + "jsonoutputversion": "1.00", + "server": "127.0.0.1", + "service": "http-post-form", + "software": "Hydra", + "version": "v8.5" + }, + "quantityfound": 2, + "results": [ + { + "host": "127.0.0.1", + "login": "bill@example.com", + "password": "bill", + "port": 9999, + "service": "http-post-form" + }, + { + "host": "127.0.0.1", + "login": "joe@example.com", + "password": "joe", + "port": 9999, + "service": "http-post-form" + } + ], + "success": false +} +``` + + +SPEED +----- +through the parallelizing feature, this password cracker tool can be very +fast, however it depends on the protocol. The fastest are generally POP3 +and FTP. +Experiment with the task option (-t) to speed things up! The higher - the +faster ;-) (but too high - and it disables the service) + + + +STATISTICS +---------- +Run against a SuSE Linux 7.2 on localhost with a "-C FILE" containing +295 entries (294 tries invalid logins, 1 valid). Every test was run three +times (only for "1 task" just once), and the average noted down. + +``` + P A R A L L E L T A S K S +SERVICE 1 4 8 16 32 50 64 100 128 +------- -------------------------------------------------------------------- +telnet 23:20 5:58 2:58 1:34 1:05 0:33 0:45* 0:25* 0:55* +ftp 45:54 11:51 5:54 3:06 1:25 0:58 0:46 0:29 0:32 +pop3 92:10 27:16 13:56 6:42 2:55 1:57 1:24 1:14 0:50 +imap 31:05 7:41 3:51 1:58 1:01 0:39 0:32 0:25 0:21 +``` + +(*) +Note: telnet timings can be VERY different for 64 to 128 tasks! e.g. with +128 tasks, running four times resulted in timings between 28 and 97 seconds! +The reason for this is unknown... + +guesses per task (rounded up): + + 295 74 38 19 10 6 5 3 3 + +guesses possible per connect (depends on the server software and config): + + telnet 4 + ftp 6 + pop3 1 + imap 3 + + + +BUGS & FEATURES +--------------- +Hydra: +Email me or David if you find bugs or if you have written a new module. +vh@thc.org (and put "antispam" in the subject line) + + +You should use PGP to encrypt emails to vh@thc.org : + +``` +-----BEGIN PGP PUBLIC KEY BLOCK----- +Version: GnuPG v3.3.3 (vh@thc.org) + +mQINBFIp+7QBEADQcJctjohuYjBxq7MELAlFDvXRTeIqqh8kqHPOR018xKL09pZT +KiBWFBkU48xlR3EtV5fC1yEt8gDEULe5o0qtK1aFlYBtAWkflVNjDrs+Y2BpjITQ +FnAPHw0SOOT/jfcvmhNOZMzMU8lIubAVC4cVWoSWJbLTv6e0DRIPiYgXNT5Quh6c +vqhnI1C39pEo/W/nh3hSa16oTc5dtTLbi5kEbdzml78TnT0OASmWLI+xtYKnP+5k +Xv4xrXRMVk4L1Bv9WpCY/Jb6J8K8SJYdXPtbaIi4VjgVr5gvg9QC/d/QP2etmw3p +lJ1Ldv63x6nXsxnPq6MSOOw8+QqKc1dAgIA43k6SU4wLq9TB3x0uTKnnB8pA3ACI +zPeRN9LFkr7v1KUMeKKEdu8jUut5iKUJVu63lVYxuM5ODb6Owt3+UXgsSaQLu9nI +DZqnp/M6YTCJTJ+cJANN+uQzESI4Z2m9ITg/U/cuccN/LIDg8/eDXW3VsCqJz8Bf +lBSwMItMhs/Qwzqc1QCKfY3xcNGc4aFlJz4Bq3zSdw3mUjHYJYv1UkKntCtvvTCN +DiomxyBEKB9J7KNsOLI/CSst3MQWSG794r9ZjcfA0EWZ9u6929F2pGDZ3LiS7Jx5 +n+gdBDMe0PuuonLIGXzyIuMrkfoBeW/WdnOxh+27eemcdpCb68XtQCw6UQARAQAB +tB52YW4gSGF1c2VyICgyMDEzKSA8dmhAdGhjLm9yZz6JAjkEEwECACMCGwMCHgEC +F4AFAlIp/QcGCwkIAwcCBhUKCQgLAgUWAwIBAAAKCRDI8AEqhCFiv2R9D/9qTCJJ +xCH4BUbWIUhw1zRkn9iCVSwZMmfaAhz5PdVTjeTelimMh5qwK2MNAjpR7vCCd3BH +Z2VLB2Eoz9MOgSCxcMOnCDJjtCdCOeaxiASJt8qLeRMwdMOtznM8MnKCIO8X4oo4 +qH8eNj83KgpI50ERBCj/EMsgg07vSyZ9i1UXjFofFnbHRWSW9yZO16qD4F6r4SGz +dsfXARcO3QRI5lbjdGqm+g+HOPj1EFLAOxJAQOygz7ZN5fj+vPp+G/drONxNyVKp +QFtENpvqPdU9CqYh8ssazXTWeBi/TIs0q0EXkzqo7CQjfNb6tlRsg18FxnJDK/ga +V/1umTg41bQuVP9gGmycsiNI8Atr5DWqaF+O4uDmQxcxS0kX2YXQ4CSQJFi0pml5 +slAGL8HaAUbV7UnQEqpayPyyTEx1i0wK5ZCHYjLBfJRZCbmHX7SbviSAzKdo5JIl +Atuk+atgW3vC3hDTrBu5qlsFCZvbxS21PJ+9zmK7ySjAEFH/NKFmx4B8kb7rPAOM +0qCTv0pD/e4ogJCxVrqQ2XcCSJWxJL31FNAMnBZpVzidudNURG2v61h3ckkSB/fP +JnkRy/yxYWrdFBYkURImxD8iFD1atj1n3EI5HBL7p/9mHxf1DVJWz7rYQk+3czvs +IhBz7xGBz4nhpCi87VDEYttghYlJanbiRfNh3okCOAQTAQIAIgUCUin7tAIbAwYL +CQgHAwIGFQgCCQoLBBYCAwECHgECF4AACgkQyPABKoQhYr8OIA//cvkhoKay88yS +AjMQypach8C5CvP7eFCT11pkCt1DMAO/8Dt6Y/Ts10dPjohGdIX4PkoLTkQDwBDJ +HoLO75oqj0CYLlqDI4oHgf2uzd0Zv8f/11CQQCtut5oEK72mGNzv3GgVqg60z2KR +2vpxvGQmDwpDOPP620tf/LuRQgBpks7uazcbkAE2Br09YrUQSCBNHy8kirHW5m5C +nupMrcvuFx7mHKW1z3FuhM8ijG7oRmcBWfVoneQgIT3l2WBniXg1mKFhuUSV8Erc +XIcc11qsKshyqh0GWb2JfeXbAcTW8/4IwrCP+VfAyLO9F9khP6SnCmcNF9EVJyR6 +Aw+JMNRin7PgvsqbFhpkq9N+gVBAufz3DZoMTEbsMTtW4lYG6HMWhza2+8G9XyaL +ARAWhkNVsmQQ5T6qGkI19thB6E/T6ZorTxqeopNVA7VNK3RVlKpkmUu07w5bTD6V +l3Ti6XfcSQqzt6YX2/WUE8ekEG3rSesuJ5fqjuTnIIOjBxr+pPxkzdoazlu2zJ9F +n24fHvlU20TccEWXteXj9VFzV/zbPEQbEqmE16lV+bO8U7UHqCOdE83OMrbNKszl +7LSCbFhCDtflUsyClBt/OPnlLEHgEE1j9QkqdFFy90l4HqGwKvx7lUFDnuF8LYsb +/hcP4XhqjiGcjTPYBDK254iYrpOSMZSIRgQQEQIABgUCUioGfQAKCRBDlBVOdiii +tuddAJ4zMrge4qzajScIQcXYgIWMXVenCQCfYTNQPGkHVyp3dMhJ0NR21TYoYMC5 +Ag0EUin7tAEQAK5/AEIBLlA/TTgjUF3im6nu/rkWTM7/gs5H4W0a04kF4UPhaJUR +gCNlDfUnBFA0QD7Jja5LHYgLdoHXiFelPhGrbZel/Sw6sH2gkGCBtFMrVkm3u7tt +x3AZlprqqRH68Y5xTCEjGRncCAmaDgd2apgisJqXpu0dRDroFYpJFNH3vw9N2a62 +0ShNakYP4ykVG3jTDC4MSl2q3BO5dzn8GYFHU0CNz6nf3gZR+48BG+zmAT77peTS ++C4Mbd6LmMmB0cuS2kYiFRwE2B69UWguLHjpXFcu9/85JJVCl2CIab7l5hpqGmgw +G/yW8HFK04Yhew7ZJOXJfUYlv1EZzR5bOsZ8Z9inC6hvFmxuCYCFnvkiEI+pOxPA +oeNOkMaT/W4W+au0ZVt3Hx+oD0pkJb5if0jrCaoAD4gpWOte6LZA8mAbKTxkHPBr +rA9/JFis5CVNI688O6eDiJqCCJjPOQA+COJI+0V+tFa6XyHPB4LxA46RxtumUZMC +v/06sDJlXMNpZbSd5Fq95YfZd4l9Vr9VrvKXfbomn+akwUymP8RDyc6Z8BzjF4Y5 +02m6Ts0J0MnSYfEDqJPPZbMGB+GAgAqLs7FrZJQzOZTiOXOSIJsKMYsPIDWE8lXv +s77rs0rGvgvQfWzPsJlMIx6ryrMnAsfOkzM2GChGNX9+pABpgOdYII4bABEBAAGJ +Ah8EGAECAAkFAlIp+7QCGwwACgkQyPABKoQhYr+hrg/9Er0+HN78y6UWGFHu/KVK +d8M6ekaqjQndQXmzQaPQwsOHOvWdC+EtBoTdR3VIjAtX96uvzCRV3sb0XPB9S9eP +gRrO/t5+qTVTtjua1zzjZsMOr1SxhBgZ5+0U2aoY1vMhyIjUuwpKKNqj2uf+uj5Y +ZQbCNklghf7EVDHsYQ4goB9gsNT7rnmrzSc6UUuJOYI2jjtHp5BPMBHh2WtUVfYP +8JqDfQ+eJQr5NCFB24xMW8OxMJit3MGckUbcZlUa1wKiTb0b76fOjt0y/+9u1ykd +X+i27DAM6PniFG8BfqPq/E3iU20IZGYtaAFBuhhDWR3vGY4+r3OxdlFAJfBG9XDD +aEDTzv1XF+tEBo69GFaxXZGdk9//7qxcgiya4LL9Kltuvs82+ZzQhC09p8d3YSQN +cfaYObm4EwbINdKP7cr4anGFXvsLC9urhow/RNBLiMbRX/5qBzx2DayXtxEnDlSC +Mh7wCkNDYkSIZOrPVUFOCGxu7lloRgPxEetM5x608HRa3hDHoe5KvUBmmtavB/aR +zlGuZP1S6Y7S13ytiULSzTfUxJmyGYgNo+4ygh0i6Dudf9NLmV+i9aEIbLbd6bni +1B/y8hBSx3SVb4sQVRe3clBkfS1/mYjlldtYjzOwcd02x599KJlcChf8HnWFB7qT +zB3yrr+vYBT0uDWmxwPjiJs= +=ytEf +-----END PGP PUBLIC KEY BLOCK----- +``` From be95247c690608535a37f416223add86e0ec1690 Mon Sep 17 00:00:00 2001 From: Yisus7u7 <64093255+Yisus7u7@users.noreply.github.com> Date: Wed, 16 Jun 2021 15:48:43 -0500 Subject: [PATCH 375/531] Update README.md --- README.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 322da43..14c64cd 100644 --- a/README.md +++ b/README.md @@ -52,12 +52,12 @@ Your help in writing, enhancing or fixing modules is highly appreciated!! :-) WHERE TO GET ------------ You can always find the newest release/production version of hydra at its -project page at https://github.com/vanhauser-thc/thc-hydra/releases +project page at [https://github.com/vanhauser-thc/thc-hydra/releases](https://github.com/vanhauser-thc/thc-hydra/releases) If you are interested in the current development state, the public development repository is at Github: - svn co https://github.com/vanhauser-thc/thc-hydra + svn co [https://github.com/vanhauser-thc/thc-hydra](https://github.com/vanhauser-thc/thc-hydra) or - git clone https://github.com/vanhauser-thc/thc-hydra + git clone [https://github.com/vanhauser-thc/thc-hydra](https://github.com/vanhauser-thc/thc-hydra) Use the development version at your own risk. It contains new features and new bugs. Things might not work! From caf39e154265ae78b092c9210db6354b775e1a73 Mon Sep 17 00:00:00 2001 From: Yisus7u7 <64093255+Yisus7u7@users.noreply.github.com> Date: Wed, 16 Jun 2021 15:51:52 -0500 Subject: [PATCH 376/531] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 14c64cd..0657f26 100644 --- a/README.md +++ b/README.md @@ -74,7 +74,7 @@ make install ``` If you want the ssh module, you have to setup libssh (not libssh2!) on your -system, get it from http://www.libssh.org, for ssh v1 support you also need +system, get it from [http://www.libssh.org](http://www.libssh.org), for ssh v1 support you also need to add "-DWITH_SSH1=On" option in the cmake command line. IMPORTANT: If you compile on MacOS then you must do this - do not install libssh via brew! From bfdbeee1b281f319e171a2ea3976d8869d3f3400 Mon Sep 17 00:00:00 2001 From: Yisus7u7 <64093255+Yisus7u7@users.noreply.github.com> Date: Wed, 16 Jun 2021 15:54:06 -0500 Subject: [PATCH 377/531] Delete index.md --- docs/index.md | 534 -------------------------------------------------- 1 file changed, 534 deletions(-) delete mode 100644 docs/index.md diff --git a/docs/index.md b/docs/index.md deleted file mode 100644 index 322da43..0000000 --- a/docs/index.md +++ /dev/null @@ -1,534 +0,0 @@ - - H Y D R A - - (c) 2001-2021 by van Hauser / THC - https://github.com/vanhauser-thc/thc-hydra - many modules were written by David (dot) Maciejak @ gmail (dot) com - BFG code by Jan Dlabal - - Licensed under AGPLv3 (see LICENSE file) - - Please do not use in military or secret service organizations, - or for illegal purposes. - (This is the wish of the author and non-binding. Many people working - in these organizations do not care for laws and ethics anyways. - You are not one of the "good" ones if you ignore this.) - - - -INTRODUCTION ------------- -Number one of the biggest security holes are passwords, as every password -security study shows. -This tool is a proof of concept code, to give researchers and security -consultants the possibility to show how easy it would be to gain unauthorized -access from remote to a system. - -THIS TOOL IS FOR LEGAL PURPOSES ONLY! - -There are already several login hacker tools available, however, none does -either support more than one protocol to attack or support parallelized -connects. - -It was tested to compile cleanly on Linux, Windows/Cygwin, Solaris, -FreeBSD/OpenBSD, QNX (Blackberry 10) and MacOS. - -Currently this tool supports the following protocols: - Asterisk, AFP, Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird, FTP, - HTTP-FORM-GET, HTTP-FORM-POST, HTTP-GET, HTTP-HEAD, HTTP-POST, HTTP-PROXY, - HTTPS-FORM-GET, HTTPS-FORM-POST, HTTPS-GET, HTTPS-HEAD, HTTPS-POST, - HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MEMCACHED, MONGODB, MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, - Oracle SID, Oracle, PC-Anywhere, PCNFS, POP3, POSTGRES, Radmin, RDP, Rexec, Rlogin, - Rsh, RTSP, SAP/R3, SIP, SMB, SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, - SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, - VNC and XMPP. - -However the module engine for new services is very easy so it won't take a -long time until even more services are supported. -Your help in writing, enhancing or fixing modules is highly appreciated!! :-) - - - -WHERE TO GET ------------- -You can always find the newest release/production version of hydra at its -project page at https://github.com/vanhauser-thc/thc-hydra/releases -If you are interested in the current development state, the public development -repository is at Github: - svn co https://github.com/vanhauser-thc/thc-hydra - or - git clone https://github.com/vanhauser-thc/thc-hydra -Use the development version at your own risk. It contains new features and -new bugs. Things might not work! - - - -HOW TO COMPILE --------------- -To configure, compile and install hydra, just type: - -``` -./configure -make -make install -``` - -If you want the ssh module, you have to setup libssh (not libssh2!) on your -system, get it from http://www.libssh.org, for ssh v1 support you also need -to add "-DWITH_SSH1=On" option in the cmake command line. -IMPORTANT: If you compile on MacOS then you must do this - do not install libssh via brew! - -If you use Ubuntu/Debian, this will install supplementary libraries needed -for a few optional modules (note that some might not be available on your distribution): - -``` -apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev \ - libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev \ - firebird-dev libmemcached-dev libgpg-error-dev \ - libgcrypt11-dev libgcrypt20-dev -``` - -This enables all optional modules and features with the exception of Oracle, -SAP R/3, NCP and the apple filing protocol - which you will need to download and -install from the vendor's web sites. - -For all other Linux derivates and BSD based systems, use the system -software installer and look for similarly named libraries like in the -command above. In all other cases, you have to download all source libraries -and compile them manually. - - - -SUPPORTED PLATFORMS -------------------- -- All UNIX platforms (Linux, *BSD, Solaris, etc.) -- MacOS (basically a BSD clone) -- Windows with Cygwin (both IPv4 and IPv6) -- Mobile systems based on Linux, MacOS or QNX (e.g. Android, iPhone, Blackberry 10, Zaurus, iPaq) - - - -HOW TO USE ----------- -If you just enter `hydra`, you will see a short summary of the important -options available. -Type `./hydra -h` to see all available command line options. - -Note that NO login/password file is included. Generate them yourself. -A default password list is however present, use "dpl4hydra.sh" to generate -a list. - -For Linux users, a GTK GUI is available, try `./xhydra` - -For the command line usage, the syntax is as follows: - For attacking one target or a network, you can use the new "://" style: - hydra [some command line options] PROTOCOL://TARGET:PORT/MODULE-OPTIONS - The old mode can be used for these too, and additionally if you want to - specify your targets from a text file, you *must* use this one: - -``` -hydra [some command line options] [-s PORT] TARGET PROTOCOL [MODULE-OPTIONS] -``` - -Via the command line options you specify which logins to try, which passwords, -if SSL should be used, how many parallel tasks to use for attacking, etc. - -PROTOCOL is the protocol you want to use for attacking, e.g. ftp, smtp, -http-get or many others are available -TARGET is the target you want to attack -MODULE-OPTIONS are optional values which are special per PROTOCOL module - -FIRST - select your target - you have three options on how to specify the target you want to attack: - 1. a single target on the command line: just put the IP or DNS address in - 2. a network range on the command line: CIDR specification like "192.168.0.0/24" - 3. a list of hosts in a text file: one line per entry (see below) - -SECOND - select your protocol - Try to avoid telnet, as it is unreliable to detect a correct or false login attempt. - Use a port scanner to see which protocols are enabled on the target. - -THIRD - check if the module has optional parameters - hydra -U PROTOCOL - e.g. hydra -U smtp - -FOURTH - the destination port - this is optional, if no port is supplied the default common port for the - PROTOCOL is used. - If you specify SSL to use ("-S" option), the SSL common port is used by default. - - -If you use "://" notation, you must use "[" "]" brackets if you want to supply -IPv6 addresses or CIDR ("192.168.0.0/24") notations to attack: - hydra [some command line options] ftp://[192.168.0.0/24]/ - hydra [some command line options] -6 smtps://[2001:db8::1]/NTLM - -Note that everything hydra does is IPv4 only! -If you want to attack IPv6 addresses, you must add the "-6" command line option. -All attacks are then IPv6 only! - -If you want to supply your targets via a text file, you can not use the :// -notation but use the old style and just supply the protocol (and module options): - hydra [some command line options] -M targets.txt ftp -You can also supply the port for each target entry by adding ":" after a -target entry in the file, e.g.: - -``` -foo.bar.com -target.com:21 -unusual.port.com:2121 -default.used.here.com -127.0.0.1 -127.0.0.1:2121 -``` - -Note that if you want to attach IPv6 targets, you must supply the -6 option -and *must* put IPv6 addresses in brackets in the file(!) like this: - -``` -foo.bar.com -target.com:21 -[fe80::1%eth0] -[2001::1] -[2002::2]:8080 -[2a01:24a:133:0:00:123:ff:1a] -``` - -LOGINS AND PASSWORDS --------------------- -You have many options on how to attack with logins and passwords -With -l for login and -p for password you tell hydra that this is the only -login and/or password to try. -With -L for logins and -P for passwords you supply text files with entries. -e.g.: - -``` -hydra -l admin -p password ftp://localhost/ -hydra -L default_logins.txt -p test ftp://localhost/ -hydra -l admin -P common_passwords.txt ftp://localhost/ -hydra -L logins.txt -P passwords.txt ftp://localhost/ -``` - -Additionally, you can try passwords based on the login via the "-e" option. -The "-e" option has three parameters: - -``` -s - try the login as password -n - try an empty password -r - reverse the login and try it as password -``` - -If you want to, e.g. try "try login as password and "empty password", you -specify "-e sn" on the command line. - -But there are two more modes for trying passwords than -p/-P: -You can use text file which where a login and password pair is separated by a colon, -e.g.: - -``` -admin:password -test:test -foo:bar -``` - -This is a common default account style listing, that is also generated by the -dpl4hydra.sh default account file generator supplied with hydra. -You use such a text file with the -C option - note that in this mode you -can not use -l/-L/-p/-P options (-e nsr however you can). -Example: - -``` -hydra -C default_accounts.txt ftp://localhost/ -``` - -And finally, there is a bruteforce mode with the -x option (which you can not -use with -p/-P/-C): - -``` --x minimum_length:maximum_length:charset -``` - -the charset definition is `a` for lowercase letters, `A` for uppercase letters, -`1` for numbers and for anything else you supply it is their real representation. -Examples: - -``` --x 1:3:a generate passwords from length 1 to 3 with all lowercase letters --x 2:5:/ generate passwords from length 2 to 5 containing only slashes --x 5:8:A1 generate passwords from length 5 to 8 with uppercase and numbers -``` - -Example: - -``` -hydra -l ftp -x 3:3:a ftp://localhost/ -``` - -SPECIAL OPTIONS FOR MODULES ---------------------------- -Via the third command line parameter (TARGET SERVICE OPTIONAL) or the -m -command line option, you can pass one option to a module. -Many modules use this, a few require it! - -To see the special option of a module, type: - - hydra -U - -e.g. - - ./hydra -U http-post-form - -The special options can be passed via the -m parameter, as 3rd command line -option or in the service://target/option format. - -Examples (they are all equal): - -``` -./hydra -l test -p test -m PLAIN 127.0.0.1 imap -./hydra -l test -p test 127.0.0.1 imap PLAIN -./hydra -l test -p test imap://127.0.0.1/PLAIN -``` - -RESTORING AN ABORTED/CRASHED SESSION ------------------------------------- -When hydra is aborted with Control-C, killed or crashes, it leaves a -"hydra.restore" file behind which contains all necessary information to -restore the session. This session file is written every 5 minutes. -NOTE: the hydra.restore file can NOT be copied to a different platform (e.g. -from little endian to big endian, or from Solaris to AIX) - -HOW TO SCAN/CRACK OVER A PROXY ------------------------------- -The environment variable HYDRA_PROXY_HTTP defines the web proxy (this works -just for the http services!). -The following syntax is valid: - -``` -HYDRA_PROXY_HTTP="http://123.45.67.89:8080/" -HYDRA_PROXY_HTTP="http://login:password@123.45.67.89:8080/" -HYDRA_PROXY_HTTP="proxylist.txt" -``` - -The last example is a text file containing up to 64 proxies (in the same -format definition as the other examples). - -For all other services, use the HYDRA_PROXY variable to scan/crack. -It uses the same syntax. eg: - -``` -HYDRA_PROXY=[connect|socks4|socks5]://[login:password@]proxy_addr:proxy_port -``` - -for example: - -``` -HYDRA_PROXY=connect://proxy.anonymizer.com:8000 -HYDRA_PROXY=socks4://auth:pw@127.0.0.1:1080 -HYDRA_PROXY=socksproxylist.txt -``` - -ADDITIONAL HINTS ----------------- -* sort your password files by likelihood and use the -u option to find - passwords much faster! -* uniq your dictionary files! this can save you a lot of time :-) - cat words.txt | sort | uniq > dictionary.txt -* if you know that the target is using a password policy (allowing users - only to choose a password with a minimum length of 6, containing a least one - letter and one number, etc. use the tool pw-inspector which comes along - with the hydra package to reduce the password list: - cat dictionary.txt | pw-inspector -m 6 -c 2 -n > passlist.txt - - -RESULTS OUTPUT --------------- - -The results are output to stdio along with the other information. Via the -o -command line option, the results can also be written to a file. Using -b, -the format of the output can be specified. Currently, these are supported: - -* `text` - plain text format -* `jsonv1` - JSON data using version 1.x of the schema (defined below). -* `json` - JSON data using the latest version of the schema, currently there - is only version 1. - -If using JSON output, the results file may not be valid JSON if there are -serious errors in booting Hydra. - - -JSON Schema ------------ -Here is an example of the JSON output. Notes on some of the fields: - -* `errormessages` - an array of zero or more strings that are normally printed - to stderr at the end of the Hydra's run. The text is very free form. -* `success` - indication if Hydra ran correctly without error (**NOT** if - passwords were detected). This parameter is either the JSON value `true` - or `false` depending on completion. -* `quantityfound` - How many username+password combinations discovered. -* `jsonoutputversion` - Version of the schema, 1.00, 1.01, 1.11, 2.00, - 2.03, etc. Hydra will make second tuple of the version to always be two - digits to make it easier for downstream processors (as opposed to v1.1 vs - v1.10). The minor-level versions are additive, so 1.02 will contain more - fields than version 1.00 and will be backward compatible. Version 2.x will - break something from version 1.x output. - -Version 1.00 example: -``` -{ - "errormessages": [ - "[ERROR] Error Message of Something", - "[ERROR] Another Message", - "These are very free form" - ], - "generator": { - "built": "2021-03-01 14:44:22", - "commandline": "hydra -b jsonv1 -o results.json ... ...", - "jsonoutputversion": "1.00", - "server": "127.0.0.1", - "service": "http-post-form", - "software": "Hydra", - "version": "v8.5" - }, - "quantityfound": 2, - "results": [ - { - "host": "127.0.0.1", - "login": "bill@example.com", - "password": "bill", - "port": 9999, - "service": "http-post-form" - }, - { - "host": "127.0.0.1", - "login": "joe@example.com", - "password": "joe", - "port": 9999, - "service": "http-post-form" - } - ], - "success": false -} -``` - - -SPEED ------ -through the parallelizing feature, this password cracker tool can be very -fast, however it depends on the protocol. The fastest are generally POP3 -and FTP. -Experiment with the task option (-t) to speed things up! The higher - the -faster ;-) (but too high - and it disables the service) - - - -STATISTICS ----------- -Run against a SuSE Linux 7.2 on localhost with a "-C FILE" containing -295 entries (294 tries invalid logins, 1 valid). Every test was run three -times (only for "1 task" just once), and the average noted down. - -``` - P A R A L L E L T A S K S -SERVICE 1 4 8 16 32 50 64 100 128 -------- -------------------------------------------------------------------- -telnet 23:20 5:58 2:58 1:34 1:05 0:33 0:45* 0:25* 0:55* -ftp 45:54 11:51 5:54 3:06 1:25 0:58 0:46 0:29 0:32 -pop3 92:10 27:16 13:56 6:42 2:55 1:57 1:24 1:14 0:50 -imap 31:05 7:41 3:51 1:58 1:01 0:39 0:32 0:25 0:21 -``` - -(*) -Note: telnet timings can be VERY different for 64 to 128 tasks! e.g. with -128 tasks, running four times resulted in timings between 28 and 97 seconds! -The reason for this is unknown... - -guesses per task (rounded up): - - 295 74 38 19 10 6 5 3 3 - -guesses possible per connect (depends on the server software and config): - - telnet 4 - ftp 6 - pop3 1 - imap 3 - - - -BUGS & FEATURES ---------------- -Hydra: -Email me or David if you find bugs or if you have written a new module. -vh@thc.org (and put "antispam" in the subject line) - - -You should use PGP to encrypt emails to vh@thc.org : - -``` ------BEGIN PGP PUBLIC KEY BLOCK----- -Version: GnuPG v3.3.3 (vh@thc.org) - -mQINBFIp+7QBEADQcJctjohuYjBxq7MELAlFDvXRTeIqqh8kqHPOR018xKL09pZT -KiBWFBkU48xlR3EtV5fC1yEt8gDEULe5o0qtK1aFlYBtAWkflVNjDrs+Y2BpjITQ -FnAPHw0SOOT/jfcvmhNOZMzMU8lIubAVC4cVWoSWJbLTv6e0DRIPiYgXNT5Quh6c -vqhnI1C39pEo/W/nh3hSa16oTc5dtTLbi5kEbdzml78TnT0OASmWLI+xtYKnP+5k -Xv4xrXRMVk4L1Bv9WpCY/Jb6J8K8SJYdXPtbaIi4VjgVr5gvg9QC/d/QP2etmw3p -lJ1Ldv63x6nXsxnPq6MSOOw8+QqKc1dAgIA43k6SU4wLq9TB3x0uTKnnB8pA3ACI -zPeRN9LFkr7v1KUMeKKEdu8jUut5iKUJVu63lVYxuM5ODb6Owt3+UXgsSaQLu9nI -DZqnp/M6YTCJTJ+cJANN+uQzESI4Z2m9ITg/U/cuccN/LIDg8/eDXW3VsCqJz8Bf -lBSwMItMhs/Qwzqc1QCKfY3xcNGc4aFlJz4Bq3zSdw3mUjHYJYv1UkKntCtvvTCN -DiomxyBEKB9J7KNsOLI/CSst3MQWSG794r9ZjcfA0EWZ9u6929F2pGDZ3LiS7Jx5 -n+gdBDMe0PuuonLIGXzyIuMrkfoBeW/WdnOxh+27eemcdpCb68XtQCw6UQARAQAB -tB52YW4gSGF1c2VyICgyMDEzKSA8dmhAdGhjLm9yZz6JAjkEEwECACMCGwMCHgEC -F4AFAlIp/QcGCwkIAwcCBhUKCQgLAgUWAwIBAAAKCRDI8AEqhCFiv2R9D/9qTCJJ -xCH4BUbWIUhw1zRkn9iCVSwZMmfaAhz5PdVTjeTelimMh5qwK2MNAjpR7vCCd3BH -Z2VLB2Eoz9MOgSCxcMOnCDJjtCdCOeaxiASJt8qLeRMwdMOtznM8MnKCIO8X4oo4 -qH8eNj83KgpI50ERBCj/EMsgg07vSyZ9i1UXjFofFnbHRWSW9yZO16qD4F6r4SGz -dsfXARcO3QRI5lbjdGqm+g+HOPj1EFLAOxJAQOygz7ZN5fj+vPp+G/drONxNyVKp -QFtENpvqPdU9CqYh8ssazXTWeBi/TIs0q0EXkzqo7CQjfNb6tlRsg18FxnJDK/ga -V/1umTg41bQuVP9gGmycsiNI8Atr5DWqaF+O4uDmQxcxS0kX2YXQ4CSQJFi0pml5 -slAGL8HaAUbV7UnQEqpayPyyTEx1i0wK5ZCHYjLBfJRZCbmHX7SbviSAzKdo5JIl -Atuk+atgW3vC3hDTrBu5qlsFCZvbxS21PJ+9zmK7ySjAEFH/NKFmx4B8kb7rPAOM -0qCTv0pD/e4ogJCxVrqQ2XcCSJWxJL31FNAMnBZpVzidudNURG2v61h3ckkSB/fP -JnkRy/yxYWrdFBYkURImxD8iFD1atj1n3EI5HBL7p/9mHxf1DVJWz7rYQk+3czvs -IhBz7xGBz4nhpCi87VDEYttghYlJanbiRfNh3okCOAQTAQIAIgUCUin7tAIbAwYL -CQgHAwIGFQgCCQoLBBYCAwECHgECF4AACgkQyPABKoQhYr8OIA//cvkhoKay88yS -AjMQypach8C5CvP7eFCT11pkCt1DMAO/8Dt6Y/Ts10dPjohGdIX4PkoLTkQDwBDJ -HoLO75oqj0CYLlqDI4oHgf2uzd0Zv8f/11CQQCtut5oEK72mGNzv3GgVqg60z2KR -2vpxvGQmDwpDOPP620tf/LuRQgBpks7uazcbkAE2Br09YrUQSCBNHy8kirHW5m5C -nupMrcvuFx7mHKW1z3FuhM8ijG7oRmcBWfVoneQgIT3l2WBniXg1mKFhuUSV8Erc -XIcc11qsKshyqh0GWb2JfeXbAcTW8/4IwrCP+VfAyLO9F9khP6SnCmcNF9EVJyR6 -Aw+JMNRin7PgvsqbFhpkq9N+gVBAufz3DZoMTEbsMTtW4lYG6HMWhza2+8G9XyaL -ARAWhkNVsmQQ5T6qGkI19thB6E/T6ZorTxqeopNVA7VNK3RVlKpkmUu07w5bTD6V -l3Ti6XfcSQqzt6YX2/WUE8ekEG3rSesuJ5fqjuTnIIOjBxr+pPxkzdoazlu2zJ9F -n24fHvlU20TccEWXteXj9VFzV/zbPEQbEqmE16lV+bO8U7UHqCOdE83OMrbNKszl -7LSCbFhCDtflUsyClBt/OPnlLEHgEE1j9QkqdFFy90l4HqGwKvx7lUFDnuF8LYsb -/hcP4XhqjiGcjTPYBDK254iYrpOSMZSIRgQQEQIABgUCUioGfQAKCRBDlBVOdiii -tuddAJ4zMrge4qzajScIQcXYgIWMXVenCQCfYTNQPGkHVyp3dMhJ0NR21TYoYMC5 -Ag0EUin7tAEQAK5/AEIBLlA/TTgjUF3im6nu/rkWTM7/gs5H4W0a04kF4UPhaJUR -gCNlDfUnBFA0QD7Jja5LHYgLdoHXiFelPhGrbZel/Sw6sH2gkGCBtFMrVkm3u7tt -x3AZlprqqRH68Y5xTCEjGRncCAmaDgd2apgisJqXpu0dRDroFYpJFNH3vw9N2a62 -0ShNakYP4ykVG3jTDC4MSl2q3BO5dzn8GYFHU0CNz6nf3gZR+48BG+zmAT77peTS -+C4Mbd6LmMmB0cuS2kYiFRwE2B69UWguLHjpXFcu9/85JJVCl2CIab7l5hpqGmgw -G/yW8HFK04Yhew7ZJOXJfUYlv1EZzR5bOsZ8Z9inC6hvFmxuCYCFnvkiEI+pOxPA -oeNOkMaT/W4W+au0ZVt3Hx+oD0pkJb5if0jrCaoAD4gpWOte6LZA8mAbKTxkHPBr -rA9/JFis5CVNI688O6eDiJqCCJjPOQA+COJI+0V+tFa6XyHPB4LxA46RxtumUZMC -v/06sDJlXMNpZbSd5Fq95YfZd4l9Vr9VrvKXfbomn+akwUymP8RDyc6Z8BzjF4Y5 -02m6Ts0J0MnSYfEDqJPPZbMGB+GAgAqLs7FrZJQzOZTiOXOSIJsKMYsPIDWE8lXv -s77rs0rGvgvQfWzPsJlMIx6ryrMnAsfOkzM2GChGNX9+pABpgOdYII4bABEBAAGJ -Ah8EGAECAAkFAlIp+7QCGwwACgkQyPABKoQhYr+hrg/9Er0+HN78y6UWGFHu/KVK -d8M6ekaqjQndQXmzQaPQwsOHOvWdC+EtBoTdR3VIjAtX96uvzCRV3sb0XPB9S9eP -gRrO/t5+qTVTtjua1zzjZsMOr1SxhBgZ5+0U2aoY1vMhyIjUuwpKKNqj2uf+uj5Y -ZQbCNklghf7EVDHsYQ4goB9gsNT7rnmrzSc6UUuJOYI2jjtHp5BPMBHh2WtUVfYP -8JqDfQ+eJQr5NCFB24xMW8OxMJit3MGckUbcZlUa1wKiTb0b76fOjt0y/+9u1ykd -X+i27DAM6PniFG8BfqPq/E3iU20IZGYtaAFBuhhDWR3vGY4+r3OxdlFAJfBG9XDD -aEDTzv1XF+tEBo69GFaxXZGdk9//7qxcgiya4LL9Kltuvs82+ZzQhC09p8d3YSQN -cfaYObm4EwbINdKP7cr4anGFXvsLC9urhow/RNBLiMbRX/5qBzx2DayXtxEnDlSC -Mh7wCkNDYkSIZOrPVUFOCGxu7lloRgPxEetM5x608HRa3hDHoe5KvUBmmtavB/aR -zlGuZP1S6Y7S13ytiULSzTfUxJmyGYgNo+4ygh0i6Dudf9NLmV+i9aEIbLbd6bni -1B/y8hBSx3SVb4sQVRe3clBkfS1/mYjlldtYjzOwcd02x599KJlcChf8HnWFB7qT -zB3yrr+vYBT0uDWmxwPjiJs= -=ytEf ------END PGP PUBLIC KEY BLOCK----- -``` From 2d12a0df6a2a441673d71316abd8c3ee30ee4ab0 Mon Sep 17 00:00:00 2001 From: Yisus7u7 <64093255+Yisus7u7@users.noreply.github.com> Date: Wed, 16 Jun 2021 16:06:21 -0500 Subject: [PATCH 378/531] Create index.md --- docs/android/index.md | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 docs/android/index.md diff --git a/docs/android/index.md b/docs/android/index.md new file mode 100644 index 0000000..4480b3c --- /dev/null +++ b/docs/android/index.md @@ -0,0 +1,27 @@ +## thc-hydra +### How to compile hydra on Android + +Hydra is layers running on Android without rodent permission, +this is thanks to [Termux](https://termux.com/), A powerful emulator +of terminal with an ecosystem of packages. + +To compile hydra on Android, you will need to download +[Termux](https://termux.com/). + +I note that termux no longer provides support +for Android devices less than or equal to Android 6, +therefore your cell phone must be Android 7 or higher. + +After installing termux, enter the following commands +at your terminal: + +``` +# Update package list +pkg update && pkg upgrade +# Installing dependencies +pkg install -y x11-repo +pkg install -y clang make openssl openssl-tool wget openssh coreutils gtk2 gtk3 +# Compiling hydra +./configure --prefix=$PREFIX +make && make install +``` From d260804d19fcb2d547fc88ac01f083cbdab6f6b5 Mon Sep 17 00:00:00 2001 From: Yisus7u7 <64093255+Yisus7u7@users.noreply.github.com> Date: Wed, 16 Jun 2021 16:12:12 -0500 Subject: [PATCH 379/531] Update index.md --- docs/android/index.md | 13 +++++++++++++ 1 file changed, 13 insertions(+) diff --git a/docs/android/index.md b/docs/android/index.md index 4480b3c..43eaaa0 100644 --- a/docs/android/index.md +++ b/docs/android/index.md @@ -25,3 +25,16 @@ pkg install -y clang make openssl openssl-tool wget openssh coreutils gtk2 gtk3 ./configure --prefix=$PREFIX make && make install ``` + +To use xhydra, you will need to install a graphical output in termux, you can be guided from this article: + +[https://wiki.termux.com/wiki/Graphical_Environment](https://wiki.termux.com/wiki/Graphical_Environment) + +If you have never used a GUI on Android or are not able to configure it, +you can use these projects from the termux community: + +- [openbox by adi1090x](https://github.com/adi1090x/termux-desktop) + +- [lxqt by yisus](https://github.com/Yisus7u7/termux-desktop-lxqt) + +- [xfce4 by yisus](https://github.com/Yisus7u7/termux-desktop-xfce) From 54c2e85d797f5b1b29f759a418c863ce9ebcbf08 Mon Sep 17 00:00:00 2001 From: Yisus7u7 <64093255+Yisus7u7@users.noreply.github.com> Date: Wed, 16 Jun 2021 16:13:24 -0500 Subject: [PATCH 380/531] Update index.md --- docs/android/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/android/index.md b/docs/android/index.md index 43eaaa0..9a87fa5 100644 --- a/docs/android/index.md +++ b/docs/android/index.md @@ -1,7 +1,7 @@ ## thc-hydra ### How to compile hydra on Android -Hydra is layers running on Android without rodent permission, +Hydra can run on Android without root permissions, this is thanks to [Termux](https://termux.com/), A powerful emulator of terminal with an ecosystem of packages. From 9fc4aabd6b71e5b2e6549b2be3398ff22c5b6676 Mon Sep 17 00:00:00 2001 From: Yisus7u7 <64093255+Yisus7u7@users.noreply.github.com> Date: Wed, 16 Jun 2021 16:15:08 -0500 Subject: [PATCH 381/531] Update index.md --- docs/android/index.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/docs/android/index.md b/docs/android/index.md index 9a87fa5..4b70ab9 100644 --- a/docs/android/index.md +++ b/docs/android/index.md @@ -26,7 +26,9 @@ pkg install -y clang make openssl openssl-tool wget openssh coreutils gtk2 gtk3 make && make install ``` -To use xhydra, you will need to install a graphical output in termux, you can be guided from this article: +then you can use hydra in the termux terminal + +To use xhydra (GUI), you will need to install a graphical output in termux, you can be guided from this article: [https://wiki.termux.com/wiki/Graphical_Environment](https://wiki.termux.com/wiki/Graphical_Environment) From cf325b000898fe4699e07d82267d753ba05f5ba8 Mon Sep 17 00:00:00 2001 From: Yisus7u7 <64093255+Yisus7u7@users.noreply.github.com> Date: Wed, 16 Jun 2021 16:18:57 -0500 Subject: [PATCH 382/531] Update README.md --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 0657f26..0c4e3b6 100644 --- a/README.md +++ b/README.md @@ -73,6 +73,7 @@ make make install ``` +`Note`: To compile hydra on Android (termux) [follow this articule](https://vanhauser-thc.github.io/thc-hydra/docs/android) If you want the ssh module, you have to setup libssh (not libssh2!) on your system, get it from [http://www.libssh.org](http://www.libssh.org), for ssh v1 support you also need to add "-DWITH_SSH1=On" option in the cmake command line. From 3b9280da3ace333c268bb530a493d9a8a16e764f Mon Sep 17 00:00:00 2001 From: Yisus7u7 <64093255+Yisus7u7@users.noreply.github.com> Date: Wed, 16 Jun 2021 16:19:51 -0500 Subject: [PATCH 383/531] Update README.md --- README.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 0c4e3b6..1e059ad 100644 --- a/README.md +++ b/README.md @@ -73,7 +73,9 @@ make make install ``` -`Note`: To compile hydra on Android (termux) [follow this articule](https://vanhauser-thc.github.io/thc-hydra/docs/android) +`Note`: To compile hydra on Android (termux) [follow this articule](https://vanhauser-thc.github.io/thc-hydra/docs/android) + + If you want the ssh module, you have to setup libssh (not libssh2!) on your system, get it from [http://www.libssh.org](http://www.libssh.org), for ssh v1 support you also need to add "-DWITH_SSH1=On" option in the cmake command line. From e02b0d41e5013fc4b516cd57285f54e05a58cfa6 Mon Sep 17 00:00:00 2001 From: Yisus7u7 <64093255+Yisus7u7@users.noreply.github.com> Date: Wed, 16 Jun 2021 16:30:45 -0500 Subject: [PATCH 384/531] Show repo info in image --- README.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/README.md b/README.md index 1e059ad..dd0f8e0 100644 --- a/README.md +++ b/README.md @@ -1,3 +1,6 @@ +![image](https://opengraph.githubassets.com/91871daab983cd69e18846c4f5c40a547e91638b3fe6064d81d9bb4574d95e73/vanhauser-thc/thc-hydra) + + H Y D R A From 12dc488f3f3d4c8ff98dfb2994633ea2bfc70ff5 Mon Sep 17 00:00:00 2001 From: Yisus7u7 <64093255+Yisus7u7@users.noreply.github.com> Date: Wed, 16 Jun 2021 22:55:27 -0500 Subject: [PATCH 385/531] Set theme jekyll-theme-slate --- _config.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_config.yml b/_config.yml index 225f091..427c783 100644 --- a/_config.yml +++ b/_config.yml @@ -1,2 +1,2 @@ title: "thc-hydra" -theme: jekyll-theme-midnight +theme: jekyll-theme-slate From 92ef7d7455d8aca7ed6f3295d0dc21bcd28741ed Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Thu, 17 Jun 2021 16:16:43 +0200 Subject: [PATCH 386/531] Revert "Merge pull request #666 from Yisus7u7/master" This reverts commit 5b98a23140d50b40389b284d64d0f2396f386efc, reversing changes made to a6784e40213b3709990f307f0e892832680625cc. --- README.md | 14 ++++---------- _config.yml | 2 +- docs/android/index.md | 42 ------------------------------------------ 3 files changed, 5 insertions(+), 53 deletions(-) delete mode 100644 docs/android/index.md diff --git a/README.md b/README.md index dd0f8e0..322da43 100644 --- a/README.md +++ b/README.md @@ -1,6 +1,3 @@ -![image](https://opengraph.githubassets.com/91871daab983cd69e18846c4f5c40a547e91638b3fe6064d81d9bb4574d95e73/vanhauser-thc/thc-hydra) - - H Y D R A @@ -55,12 +52,12 @@ Your help in writing, enhancing or fixing modules is highly appreciated!! :-) WHERE TO GET ------------ You can always find the newest release/production version of hydra at its -project page at [https://github.com/vanhauser-thc/thc-hydra/releases](https://github.com/vanhauser-thc/thc-hydra/releases) +project page at https://github.com/vanhauser-thc/thc-hydra/releases If you are interested in the current development state, the public development repository is at Github: - svn co [https://github.com/vanhauser-thc/thc-hydra](https://github.com/vanhauser-thc/thc-hydra) + svn co https://github.com/vanhauser-thc/thc-hydra or - git clone [https://github.com/vanhauser-thc/thc-hydra](https://github.com/vanhauser-thc/thc-hydra) + git clone https://github.com/vanhauser-thc/thc-hydra Use the development version at your own risk. It contains new features and new bugs. Things might not work! @@ -76,11 +73,8 @@ make make install ``` -`Note`: To compile hydra on Android (termux) [follow this articule](https://vanhauser-thc.github.io/thc-hydra/docs/android) - - If you want the ssh module, you have to setup libssh (not libssh2!) on your -system, get it from [http://www.libssh.org](http://www.libssh.org), for ssh v1 support you also need +system, get it from http://www.libssh.org, for ssh v1 support you also need to add "-DWITH_SSH1=On" option in the cmake command line. IMPORTANT: If you compile on MacOS then you must do this - do not install libssh via brew! diff --git a/_config.yml b/_config.yml index 427c783..225f091 100644 --- a/_config.yml +++ b/_config.yml @@ -1,2 +1,2 @@ title: "thc-hydra" -theme: jekyll-theme-slate +theme: jekyll-theme-midnight diff --git a/docs/android/index.md b/docs/android/index.md deleted file mode 100644 index 4b70ab9..0000000 --- a/docs/android/index.md +++ /dev/null @@ -1,42 +0,0 @@ -## thc-hydra -### How to compile hydra on Android - -Hydra can run on Android without root permissions, -this is thanks to [Termux](https://termux.com/), A powerful emulator -of terminal with an ecosystem of packages. - -To compile hydra on Android, you will need to download -[Termux](https://termux.com/). - -I note that termux no longer provides support -for Android devices less than or equal to Android 6, -therefore your cell phone must be Android 7 or higher. - -After installing termux, enter the following commands -at your terminal: - -``` -# Update package list -pkg update && pkg upgrade -# Installing dependencies -pkg install -y x11-repo -pkg install -y clang make openssl openssl-tool wget openssh coreutils gtk2 gtk3 -# Compiling hydra -./configure --prefix=$PREFIX -make && make install -``` - -then you can use hydra in the termux terminal - -To use xhydra (GUI), you will need to install a graphical output in termux, you can be guided from this article: - -[https://wiki.termux.com/wiki/Graphical_Environment](https://wiki.termux.com/wiki/Graphical_Environment) - -If you have never used a GUI on Android or are not able to configure it, -you can use these projects from the termux community: - -- [openbox by adi1090x](https://github.com/adi1090x/termux-desktop) - -- [lxqt by yisus](https://github.com/Yisus7u7/termux-desktop-lxqt) - -- [xfce4 by yisus](https://github.com/Yisus7u7/termux-desktop-xfce) From d3f784ab64b9f44ab31c38d980c63b1a3140300b Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Thu, 17 Jun 2021 16:17:44 +0200 Subject: [PATCH 387/531] fix --- README.md => README | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename README.md => README (100%) diff --git a/README.md b/README similarity index 100% rename from README.md rename to README From 93283091d03ee509fd6968bf07959df2119f5503 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Thu, 24 Jun 2021 09:22:53 +0200 Subject: [PATCH 388/531] sscanf change --- hydra-sip.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-sip.c b/hydra-sip.c index 6be4d93..9c5ad78 100644 --- a/hydra-sip.c +++ b/hydra-sip.c @@ -42,7 +42,7 @@ int32_t get_sip_code(char *buf) { int32_t code; char tmpbuf[SIP_MAX_BUF], word[SIP_MAX_BUF]; - if (sscanf(buf, "%s %i %s", tmpbuf, &code, word) != 3) + if (sscanf(buf, "%256s %i %256s", tmpbuf, &code, word) != 3) return -1; return code; } From 0b1f3c5037b042f19bc5a74b4d6c72df3c96b2de Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Tue, 29 Jun 2021 12:04:36 +0200 Subject: [PATCH 389/531] fix ssh for -M and ip/range --- CHANGES | 3 +++ hydra-ssh.c | 6 ++++-- hydra-sshkey.c | 3 ++- 3 files changed, 9 insertions(+), 3 deletions(-) diff --git a/CHANGES b/CHANGES index e895e03..b481211 100644 --- a/CHANGES +++ b/CHANGES @@ -1,6 +1,9 @@ Changelog for hydra ------------------- +Release 9.3-dev +* fix for ssh to support -M or ip/range + Release 9.2 * fix for http-post-form optional parameters diff --git a/hydra-ssh.c b/hydra-ssh.c index ef4a691..eb021ce 100644 --- a/hydra-ssh.c +++ b/hydra-ssh.c @@ -34,11 +34,12 @@ int32_t start_ssh(int32_t s, char *ip, int32_t port, unsigned char options, char if (new_session) { if (session) { ssh_disconnect(session); - ssh_finalize(); + //ssh_finalize(); ssh_free(session); + } else { + ssh_init(); } - ssh_init(); session = ssh_new(); ssh_options_set(session, SSH_OPTIONS_PORT, &port); ssh_options_set(session, SSH_OPTIONS_HOST, hydra_address2string(ip)); @@ -173,6 +174,7 @@ int32_t service_ssh_init(char *ip, int32_t sp, unsigned char options, char *misc // 3 skip target because its unreachable #ifdef LIBSSH int32_t rc, method; + ssh_init(); ssh_session session = ssh_new(); if (verbose || debug) diff --git a/hydra-sshkey.c b/hydra-sshkey.c index 113d6de..092d655 100644 --- a/hydra-sshkey.c +++ b/hydra-sshkey.c @@ -33,8 +33,9 @@ int32_t start_sshkey(int32_t s, char *ip, int32_t port, unsigned char options, c if (new_session) { if (session) { ssh_disconnect(session); - ssh_finalize(); ssh_free(session); + } else { + ssh_init(); } session = ssh_new(); From b375bbc33264f3cedd0b75096a663c36c88b3770 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Tue, 29 Jun 2021 12:15:03 +0200 Subject: [PATCH 390/531] skip host when password is found on password-only checks --- CHANGES | 2 ++ hydra.c | 3 +++ 2 files changed, 5 insertions(+) diff --git a/CHANGES b/CHANGES index b481211..1afb314 100644 --- a/CHANGES +++ b/CHANGES @@ -3,6 +3,8 @@ Changelog for hydra Release 9.3-dev * fix for ssh to support -M or ip/range +* for vnc/cisco/... protocols that only check for a password, skip host + after the password is found Release 9.2 diff --git a/hydra.c b/hydra.c index 0c889f8..6c5b82f 100644 --- a/hydra.c +++ b/hydra.c @@ -3310,6 +3310,9 @@ int main(int argc, char *argv[]) { hydra_options.port = port; } + if (hydra_options.login == NULL && hydra_options.loginfile == NULL) + hydra_options.exit_found = 1; + if (hydra_options.ssl == 0 && hydra_options.port == 443) fprintf(stderr, "[WARNING] you specified port 443 for attacking a http " "service, however did not specify the -S ssl switch nor " From cf2015365553a933e8d6d19e4aacae3697559fcf Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Sun, 1 Aug 2021 11:06:15 +0200 Subject: [PATCH 391/531] smtp-enum: skip host on unsupported command --- hydra-mod.c | 6 ++++-- hydra-smtp-enum.c | 10 ++++++++-- hydra.c | 15 +++++++++++++++ 3 files changed, 27 insertions(+), 4 deletions(-) diff --git a/hydra-mod.c b/hydra-mod.c index befa365..4d34b2a 100644 --- a/hydra-mod.c +++ b/hydra-mod.c @@ -637,9 +637,11 @@ void hydra_child_exit(int32_t code) { __fck = write(intern_socket, "C", 1); else if (code == 2) /* application protocol error or service shutdown */ __fck = write(intern_socket, "E", 1); - // code 3 means exit without telling mommy about it - a bad idea. mommy should + else if (code == 3) /* application protocol error or service shutdown */ + __fck = write(intern_socket, "D", 1); + // code 4 means exit without telling mommy about it - a bad idea. mommy should // know - else if (code == -1 || code > 3) { + else if (code == -1 || code > 4) { fprintf(stderr, "[TOTAL FUCKUP] a module should not use " "hydra_child_exit(-1) ! Fix it in the source please ...\n"); __fck = write(intern_socket, "E", 1); diff --git a/hydra-smtp-enum.c b/hydra-smtp-enum.c index ddc0355..d887307 100644 --- a/hydra-smtp-enum.c +++ b/hydra-smtp-enum.c @@ -128,13 +128,13 @@ int32_t start_smtp_enum(int32_t s, char *ip, int32_t port, unsigned char options //#endif // hydra_report(stderr, "Server %s", err); // } - if (strncmp(buf, "500 ", 4) == 0) { + if (strncmp(buf, "500 ", 4) == 0 || strncmp(buf, "502 ", 4) == 0) { hydra_report(stderr, "[ERROR] command is disabled on the server (choose " "different method): %s", buf); free(buf); - return 3; + return 4; } memset(buffer, 0, sizeof(buffer)); // 503 5.5.1 Error: nested MAIL command @@ -245,6 +245,12 @@ void service_smtp_enum(char *ip, int32_t sp, unsigned char options, char *miscpt } hydra_child_exit(0); return; + case 4: /* unsupported exit */ + if (sock >= 0) { + sock = hydra_disconnect(sock); + } + hydra_child_exit(3); + return; default: hydra_report(stderr, "[ERROR] Caught unknown return code, exiting!\n"); hydra_child_exit(0); diff --git a/hydra.c b/hydra.c index 6c5b82f..24dde22 100644 --- a/hydra.c +++ b/hydra.c @@ -4156,6 +4156,21 @@ int main(int argc, char *argv[]) { fck = write(hydra_heads[head_no]->sp[1], "n", 1); // small hack break; + case 'D': // disable target, unknown protocol or feature + for (j = 0; j < hydra_brains.targets; j++) + if (hydra_targets[j]->done == TARGET_ACTIVE) { + hydra_targets[j]->done = TARGET_FINISHED; + hydra_brains.finished++; + } + for (j = 0; j < hydra_options.max_use; j++) + if (hydra_heads[j]->active >= 0 && hydra_heads[j]->target_no == target_no) { + if (hydra_brains.targets > hydra_brains.finished) + hydra_kill_head(j, 1, 0); // kill all heads working on the target + else + hydra_kill_head(j, 1, 2); // kill all heads working on the target + } + break; + // we do not make a difference between 'C' and 'E' results - yet case 'E': // head reports protocol error case 'C': // head reports connect error From edc910628f9e883cf3bc4755f984f9a8b9b18318 Mon Sep 17 00:00:00 2001 From: horner Date: Thu, 5 Aug 2021 13:52:18 -0400 Subject: [PATCH 392/531] telnet detects password retries with same user --- hydra-telnet.c | 45 +++++++++++++++++++++++++++++++++++++++++---- 1 file changed, 41 insertions(+), 4 deletions(-) diff --git a/hydra-telnet.c b/hydra-telnet.c index 39908f9..63fcb23 100644 --- a/hydra-telnet.c +++ b/hydra-telnet.c @@ -75,16 +75,53 @@ int32_t start_telnet(int32_t s, char *ip, int32_t port, unsigned char options, c } /*win7 answering with do terminal type = 0xfd 0x18 */ - while ((buf = hydra_receive_line(s)) != NULL && make_to_lower(buf) && (strstr(buf, "login:") == NULL || strstr(buf, "last login:") != NULL) && strstr(buf, "sername:") == NULL) { - if ((miscptr != NULL && strstr(buf, miscptr) != NULL) || (miscptr == NULL && strstr(buf, "invalid") == NULL && strstr(buf, "failed") == NULL && strstr(buf, "bad ") == NULL && (strchr(buf, '/') != NULL || strchr(buf, '>') != NULL || strchr(buf, '$') != NULL || strchr(buf, '#') != NULL || strchr(buf, '%') != NULL || ((buf[1] == '\xfd') && (buf[2] == '\x18'))))) { + while ((buf = hydra_receive_line(s)) != NULL && make_to_lower(buf) && (strstr(buf, "password:") == NULL || strstr(buf, "login:") == NULL || strstr(buf, "last login:") != NULL) && strstr(buf, "sername:") == NULL) { + if ((miscptr != NULL && strstr(buf, miscptr) != NULL) + || (miscptr == NULL + && strstr(buf, "invalid") == NULL + && strstr(buf, "incorrect") == NULL + && strstr(buf, "bad ") == NULL + && (strchr(buf, '/') != NULL + || strchr(buf, '>') != NULL + || strchr(buf, '$') != NULL + || strchr(buf, '#') != NULL + || strchr(buf, '%') != NULL + || ((buf[1] == '\xfd') + && (buf[2] == '\x18'))) + )) { hydra_report_found_host(port, ip, "telnet", fp); hydra_completed_pair_found(); free(buf); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) return 3; return 1; - } - free(buf); + } else if (buf && strstr(buf, "assword:") ) { + hydra_completed_pair(); + //printf("password prompt\n"); + free(buf); + if (strlen(pass = hydra_get_next_password()) == 0) + pass = empty; + sprintf(buffer, "%s\r", pass); + if (no_line_mode) { + for (i = 0; i < strlen(buffer); i++) { + if (strcmp(&buffer[i], "\r") == 0) { + send(s, "\r\0", 2, 0); + } else { + send(s, &buffer[i], 1, 0); + } + usleepn(20); + } + } else { + if (hydra_send(s, buffer, strlen(buffer) + 1, 0) < 0) { + return 1; + } + } + } else if (buf && strstr(buf, "login:") ) { + free(buf); + hydra_completed_pair(); + return 2; + } else + free(buf); } hydra_completed_pair(); From 93cee75419eb67b6ae34bf75bc2a57c50e0ea03e Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Tue, 17 Aug 2021 18:21:35 +0200 Subject: [PATCH 393/531] added make uninstall --- CHANGES | 1 + Makefile | 3 +++ Makefile.am | 6 ++++++ Makefile.orig | 3 +++ 4 files changed, 13 insertions(+) diff --git a/CHANGES b/CHANGES index 1afb314..50d56fd 100644 --- a/CHANGES +++ b/CHANGES @@ -5,6 +5,7 @@ Release 9.3-dev * fix for ssh to support -M or ip/range * for vnc/cisco/... protocols that only check for a password, skip host after the password is found +* added "make uninstall" Release 9.2 diff --git a/Makefile b/Makefile index 372e67e..0fc0d2e 100644 --- a/Makefile +++ b/Makefile @@ -3,3 +3,6 @@ all: clean: cp -f Makefile.orig Makefile + +uninstall: + @echo Error: you must run "./configure" first diff --git a/Makefile.am b/Makefile.am index 1cd9156..a85c99d 100644 --- a/Makefile.am +++ b/Makefile.am @@ -89,3 +89,9 @@ clean: rm -rf xhydra pw-inspector hydra *.o core *.core *.stackdump *~ Makefile.in Makefile dev_rfc hydra.restore arm/*.ipk arm/ipkg/usr/bin/* hydra-gtk/src/*.o hydra-gtk/src/xhydra hydra-gtk/stamp-h hydra-gtk/config.status hydra-gtk/errors hydra-gtk/config.log hydra-gtk/src/.deps hydra-gtk/src/Makefile hydra-gtk/Makefile cp -f Makefile.orig Makefile +uninstall: + -rm -f $(DESTDIR)$(PREFIX)$(BINDIR)/xhydra $(DESTDIR)$(PREFIX)$(BINDIR)/hydra $(DESTDIR)$(PREFIX)$(BINDIR)/pw-inspector $(DESTDIR)$(PREFIX)$(BINDIR)/hydra-wizard.sh $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh + -rm -f $(DESTDIR)$(PREFIX)$(DATADIR)/dpl4hydra_full.csv $(DESTDIR)$(PREFIX)$(DATADIR)/dpl4hydra_local.csv + -rm -f $(DESTDIR)$(PREFIX)$(MANDIR)/hydra.1 $(DESTDIR)$(PREFIX)$(MANDIR)/xhydra.1 $(DESTDIR)$(PREFIX)$(MANDIR)/pw-inspector.1 + -rm -f $(DESTDIR)$(PREFIX)$(PIXDIR)/xhydra.png + -rm -f $(DESTDIR)$(PREFIX)$(APPDIR)/xhydra.desktop diff --git a/Makefile.orig b/Makefile.orig index 372e67e..0fc0d2e 100644 --- a/Makefile.orig +++ b/Makefile.orig @@ -3,3 +3,6 @@ all: clean: cp -f Makefile.orig Makefile + +uninstall: + @echo Error: you must run "./configure" first From 84c7b116db1b054cb3effa840c87fb098d1ae03a Mon Sep 17 00:00:00 2001 From: ultimaiiii <89281437+ultimaiiii@users.noreply.github.com> Date: Fri, 20 Aug 2021 23:09:51 +0000 Subject: [PATCH 394/531] New CobaltStrike module --- Makefile | 108 +++++++++++++++++++++++++++++++++++-- hydra-cobaltstrike.c | 126 +++++++++++++++++++++++++++++++++++++++++++ hydra.c | 8 ++- hydra.h | 2 + 4 files changed, 240 insertions(+), 4 deletions(-) create mode 100644 hydra-cobaltstrike.c diff --git a/Makefile b/Makefile index 0fc0d2e..fe872d7 100644 --- a/Makefile +++ b/Makefile @@ -1,8 +1,110 @@ -all: - @echo Error: you must run "./configure" first +STRIP=strip +XDEFINES= -DHAVE_MYSQL_MYSQL_H -DLIBOPENSSL -DLIBFIREBIRD -DLIBIDN -DHAVE_PR29_H -DHAVE_PCRE -DLIBMYSQLCLIENT -DLIBPOSTGRES -DLIBSVN -DLIBSSH -DHAVE_ZLIB -DHAVE_GCRYPT -DLIBMCACHED -DHAVE_MATH_H +XLIBS= -lgcrypt -lz -lssl -lfbclient -lidn -lpcre -lmysqlclient -lpq -lsvn_client-1 -lapr-1 -laprutil-1 -lsvn_subr-1 -lssh -lcrypto -lmemcached +XLIBPATHS=-L/usr/lib -L/usr/local/lib -L/lib -L/usr/lib/x86_64-linux-gnu -L/lib/x86_64-linux-gnu -L/usr/lib/x86_64-linux-gnu +XIPATHS= -I/usr/include/mysql -I/usr/include -I/usr/include -I/usr/include -I/usr/include/postgresql -I/usr/include -I/usr/include/subversion-1 -I/usr/include/apr-1.0 -I/usr/include/subversion-1 -I/usr/include/libmemcached-1.0 +PREFIX=/usr/local +XHYDRA_SUPPORT=xhydra +STRIP=strip + +HYDRA_LOGO= +PWI_LOGO= +SEC=-pie -fPIE -fstack-protector-all --param ssp-buffer-size=4 -D_FORTIFY_SOURCE=2 -Wl,-z,now -Wl,-z,relro + +# +# Makefile for Hydra - (c) 2001-2020 by van Hauser / THC +# +WARN_CLANG=-Wformat-nonliteral -Wstrncat-size -Wformat-security -Wsign-conversion -Wconversion -Wfloat-conversion -Wshorten-64-to-32 -Wuninitialized -Wmissing-variable-declarations -Wmissing-declarations +WARN_GCC=-Wformat=2 -Wformat-overflow=2 -Wformat-nonliteral -Wformat-truncation=2 -Wnull-dereference -Wstrict-overflow=2 -Wstringop-overflow=4 -Walloca-larger-than=4096 -Wtype-limits -Wconversion -Wtrampolines -Wstrict-prototypes -Wmissing-prototypes -Wmissing-declarations -fno-common -Wcast-align +CFLAGS ?= -g +OPTS=-I. -O3 $(CFLAGS) -fcommon -Wl,--allow-multiple-definition +# -Wall -g -pedantic +LIBS=-lm +DESTDIR ?= +BINDIR = /bin +MANDIR = /man/man1/ +DATADIR = /etc +PIXDIR = /share/pixmaps +APPDIR = /share/applications + +SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ + hydra-telnet.c hydra-cisco.c hydra-http.c hydra-ftp.c hydra-imap.c \ + hydra-pop3.c hydra-smb.c hydra-icq.c hydra-cisco-enable.c hydra-ldap.c \ + hydra-memcached.c hydra-mongodb.c hydra-mysql.c hydra-mssql.c hydra-cobaltstrike.c hydra-xmpp.c \ + hydra-http-proxy-urlenum.c hydra-snmp.c hydra-cvs.c hydra-smtp.c \ + hydra-smtp-enum.c hydra-sapr3.c hydra-ssh.c hydra-sshkey.c hydra-teamspeak.c \ + hydra-postgres.c hydra-rsh.c hydra-rlogin.c hydra-oracle-listener.c \ + hydra-svn.c hydra-pcanywhere.c hydra-sip.c hydra-oracle.c hydra-vmauthd.c \ + hydra-asterisk.c hydra-firebird.c hydra-afp.c hydra-ncp.c hydra-rdp.c \ + hydra-oracle-sid.c hydra-http-proxy.c hydra-http-form.c hydra-irc.c \ + hydra-s7-300.c hydra-redis.c hydra-adam6500.c hydra-rtsp.c \ + hydra-rpcap.c hydra-radmin2.c \ + hydra-time.c crc32.c d3des.c bfg.c ntlm.c sasl.c hmacmd5.c hydra-mod.c \ + hydra-smb2.c +OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ + hydra-telnet.o hydra-cisco.o hydra-http.o hydra-ftp.o hydra-imap.o \ + hydra-pop3.o hydra-smb.o hydra-icq.o hydra-cisco-enable.o hydra-ldap.o \ + hydra-memcached.o hydra-mongodb.o hydra-mysql.o hydra-mssql.o hydra-cobaltstrike.o hydra-xmpp.o \ + hydra-http-proxy-urlenum.o hydra-snmp.o hydra-cvs.o hydra-smtp.o \ + hydra-smtp-enum.o hydra-sapr3.o hydra-ssh.o hydra-sshkey.o hydra-teamspeak.o \ + hydra-postgres.o hydra-rsh.o hydra-rlogin.o hydra-oracle-listener.o \ + hydra-svn.o hydra-pcanywhere.o hydra-sip.o hydra-oracle-sid.o hydra-oracle.o \ + hydra-vmauthd.o hydra-asterisk.o hydra-firebird.o hydra-afp.o \ + hydra-ncp.o hydra-http-proxy.o hydra-http-form.o hydra-irc.o \ + hydra-redis.o hydra-rdp.o hydra-s7-300.c hydra-adam6500.o hydra-rtsp.o \ + hydra-rpcap.o hydra-radmin2.o \ + crc32.o d3des.o bfg.o ntlm.o sasl.o hmacmd5.o hydra-mod.o hydra-time.o \ + hydra-smb2.o +BINS = hydra pw-inspector + +EXTRA_DIST = README README.arm README.palm CHANGES TODO INSTALL LICENSE \ + hydra-mod.h hydra.h crc32.h d3des.h + +all: pw-inspector hydra $(XHYDRA_SUPPORT) + @echo + @echo Now type "make install" + +hydra: hydra.c $(OBJ) + $(CC) $(OPTS) $(SEC) $(LIBS) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o hydra $(HYDRA_LOGO) hydra.c $(OBJ) $(LIBS) $(XLIBS) $(XLIBPATHS) $(XIPATHS) $(XDEFINES) + @echo + @echo If men could get pregnant, abortion would be a sacrament + @echo + +xhydra: + -cd hydra-gtk && sh ./make_xhydra.sh + +pw-inspector: pw-inspector.c + -$(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o pw-inspector $(PWI_LOGO) pw-inspector.c + +.c.o: + $(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) -c $< $(XDEFINES) $(XIPATHS) + +strip: all + strip $(BINS) + -echo OK > /dev/null && test -x xhydra && strip xhydra || echo OK > /dev/null + +install: strip + -mkdir -p $(DESTDIR)$(PREFIX)$(BINDIR) + cp -f hydra-wizard.sh $(BINS) $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 hydra-wizard.sh $(BINS) + -echo OK > /dev/null && test -x xhydra && cp xhydra $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 xhydra || echo OK > /dev/null + -sed -e "s|^INSTALLDIR=.*|INSTALLDIR="$(PREFIX)"|" dpl4hydra.sh | sed -e "s|^LOCATION=.*|LOCATION="$(DATADIR)"|" > $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh + -chmod 755 $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh + -mkdir -p $(DESTDIR)$(PREFIX)$(DATADIR) + -cp -f *.csv $(DESTDIR)$(PREFIX)$(DATADIR) + -mkdir -p $(DESTDIR)$(PREFIX)$(MANDIR) + -cp -f hydra.1 xhydra.1 pw-inspector.1 $(DESTDIR)$(PREFIX)$(MANDIR) + -mkdir -p $(DESTDIR)$(PREFIX)$(PIXDIR) + -cp -f xhydra.png $(DESTDIR)$(PREFIX)$(PIXDIR)/ + -mkdir -p $(DESTDIR)$(PREFIX)$(APPDIR) + -desktop-file-install --dir $(DESTDIR)$(PREFIX)$(APPDIR) xhydra.desktop clean: + rm -rf xhydra pw-inspector hydra *.o core *.core *.stackdump *~ Makefile.in Makefile dev_rfc hydra.restore arm/*.ipk arm/ipkg/usr/bin/* hydra-gtk/src/*.o hydra-gtk/src/xhydra hydra-gtk/stamp-h hydra-gtk/config.status hydra-gtk/errors hydra-gtk/config.log hydra-gtk/src/.deps hydra-gtk/src/Makefile hydra-gtk/Makefile cp -f Makefile.orig Makefile uninstall: - @echo Error: you must run "./configure" first + -rm -f $(DESTDIR)$(PREFIX)$(BINDIR)/xhydra $(DESTDIR)$(PREFIX)$(BINDIR)/hydra $(DESTDIR)$(PREFIX)$(BINDIR)/pw-inspector $(DESTDIR)$(PREFIX)$(BINDIR)/hydra-wizard.sh $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh + -rm -f $(DESTDIR)$(PREFIX)$(DATADIR)/dpl4hydra_full.csv $(DESTDIR)$(PREFIX)$(DATADIR)/dpl4hydra_local.csv + -rm -f $(DESTDIR)$(PREFIX)$(MANDIR)/hydra.1 $(DESTDIR)$(PREFIX)$(MANDIR)/xhydra.1 $(DESTDIR)$(PREFIX)$(MANDIR)/pw-inspector.1 + -rm -f $(DESTDIR)$(PREFIX)$(PIXDIR)/xhydra.png + -rm -f $(DESTDIR)$(PREFIX)$(APPDIR)/xhydra.desktop diff --git a/hydra-cobaltstrike.c b/hydra-cobaltstrike.c new file mode 100644 index 0000000..64092cf --- /dev/null +++ b/hydra-cobaltstrike.c @@ -0,0 +1,126 @@ +#include "hydra-mod.h" + +#define MSLEN 256 + +extern char *HYDRA_EXIT; +char *buf; + +int32_t start_cobaltstrike(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { + char *empty = ""; + char *pass, buffer[4 + 1 + 256]; + char ms_pass[MSLEN + 1]; + unsigned char len_pass; + unsigned char reply_byte_0; + unsigned char reply_byte_1; + unsigned char reply_byte_2; + unsigned char reply_byte_3; + int32_t ret = -1; + + if (strlen(pass = hydra_get_next_password()) == 0) + pass = empty; + if (strlen(pass) > MSLEN) + pass[MSLEN - 1] = 0; + len_pass = strlen(pass); + memset(ms_pass, 0, MSLEN + 1); + strcpy(ms_pass, pass); + + memset(buffer, 0x41, sizeof(buffer)); + buffer[0] = 0x00; + buffer[1] = 0x00; + buffer[2] = 0xBE; + buffer[3] = 0xEF; + memcpy(buffer + 4, &len_pass, 1); + memcpy(buffer + 5, ms_pass, len_pass); + + if (hydra_send(s, buffer, sizeof(buffer), 0) < 0) + return 1; + + reply_byte_0 = 0x00; + ret = hydra_recv_nb(s, &reply_byte_0, 1); + if (ret <= 0) + return 3; + + reply_byte_1 = 0x00; + ret = hydra_recv_nb(s, &reply_byte_1, 1); + if (ret <= 0) + return 3; + + reply_byte_2 = 0x00; + ret = hydra_recv_nb(s, &reply_byte_2, 1); + if (ret <= 0) + return 3; + + reply_byte_3 = 0x00; + ret = hydra_recv_nb(s, &reply_byte_3, 1); + if (ret <= 0) + return 3; + + if (reply_byte_0 == 0x00 && reply_byte_1 == 0x00 && reply_byte_2 == 0xCA && reply_byte_3 == 0xFE) { + hydra_report_found_host(port, ip, "cobaltstrike", fp); + hydra_completed_pair_found(); + free(buf); + if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) + return 2; + return 1; + } + + free(buf); + hydra_completed_pair(); + if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) + return 2; + + return 1; +} + +void service_cobaltstrike(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_MSSQL, mysslport = PORT_MSSQL_SSL; + + hydra_register_socket(sp); + if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) + return; + while (1) { + switch (run) { + case 1: /* connect and service init function */ + if (port != 0) + mysslport = port; + sock = hydra_connect_ssl(ip, mysslport, hostname); + port = mysslport; + if (sock < 0) { + hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t)getpid()); + hydra_child_exit(1); + } + next_run = start_cobaltstrike(sock, ip, port, options, miscptr, fp); + hydra_disconnect(sock); + break; + case 2: /* clean exit */ + if (sock >= 0) + sock = hydra_disconnect(sock); + hydra_child_exit(0); + return; + case 3: /* clean exit */ + if (sock >= 0) + sock = hydra_disconnect(sock); + hydra_child_exit(2); + return; + default: + hydra_report(stderr, "[ERROR] Caught unknown return code, exiting!\n"); + hydra_child_exit(2); + } + run = next_run; + } +} + +int32_t service_cobaltstrike_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { + // called before the childrens are forked off, so this is the function + // which should be filled if initial connections and service setup has to be + // performed once only. + // + // fill if needed. + // + // return codes: + // 0 all OK + // -1 error, hydra will exit, so print a good error message here + + return 0; +} diff --git a/hydra.c b/hydra.c index 24dde22..9047336 100644 --- a/hydra.c +++ b/hydra.c @@ -78,6 +78,7 @@ extern void service_http_post_form(char *ip, int32_t sp, unsigned char options, extern void service_icq(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); extern void service_pcnfs(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); extern void service_mssql(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern void service_cobaltstrike(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); extern void service_cvs(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); extern void service_snmp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); extern void service_smtp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); @@ -178,6 +179,7 @@ extern int32_t service_imap_init(char *ip, int32_t sp, unsigned char options, ch extern int32_t service_irc_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); extern int32_t service_ldap_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); extern int32_t service_mssql_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); +extern int32_t service_cobaltstrike_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); extern int32_t service_nntp_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); extern int32_t service_pcanywhere_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); extern int32_t service_pcnfs_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); @@ -208,7 +210,7 @@ char *SERVICES = "adam6500 asterisk afp cisco cisco-enable cvs firebird ftp[s] " "memcached mongodb mssql mysql ncp nntp oracle oracle-listener oracle-sid " "pcanywhere pcnfs pop3[s] postgres radmin2 rdp redis rexec rlogin rpcap " "rsh rtsp s7-300 sapr3 sip smb smb2 smtp[s] smtp-enum snmp socks5 ssh " - "sshkey svn teamspeak telnet[s] vmauthd vnc xmpp"; + "sshkey svn teamspeak telnet[s] vmauthd vnc xmpp cobaltstrike"; #define MAXBUF 520 #define MAXLINESIZE ((MAXBUF / 2) - 4) @@ -402,6 +404,7 @@ static const struct { {"memcached", service_mcached_init, service_mcached, NULL}, #endif SERVICE(mssql), + SERVICE(cobaltstrike), #ifdef LIBMONGODB SERVICE3("mongodb", mongodb), #endif @@ -1344,6 +1347,7 @@ int32_t hydra_lookup_port(char *service) { {"memcached", PORT_MCACHED, PORT_MCACHED_SSL}, {"mongodb", PORT_MONGODB, PORT_MONGODB}, {"mssql", PORT_MSSQL, PORT_MSSQL_SSL}, + {"cobaltstrike", PORT_COBALTSTRIKE, PORT_COBALTSTRIKE_SSL}, {"mysql", PORT_MYSQL, PORT_MYSQL_SSL}, {"postgres", PORT_POSTGRES, PORT_POSTGRES_SSL}, {"pcanywhere", PORT_PCANYWHERE, PORT_PCANYWHERE_SSL}, @@ -2800,6 +2804,8 @@ int main(int argc, char *argv[]) { } if (strcmp(hydra_options.service, "mssql") == 0) i = 1; + if (strcmp(hydra_options.service, "cobaltstrike") == 0) + i = 2; if ((strcmp(hydra_options.service, "oracle-listener") == 0) || (strcmp(hydra_options.service, "tns") == 0)) { i = 2; hydra_options.service = malloc(strlen("oracle-listener") + 1); diff --git a/hydra.h b/hydra.h index 6698eaf..353b318 100644 --- a/hydra.h +++ b/hydra.h @@ -101,6 +101,8 @@ #define PORT_MYSQL_SSL 3306 #define PORT_MSSQL 1433 #define PORT_MSSQL_SSL 1433 +#define PORT_COBALTSTRIKE 50050 +#define PORT_COBALTSTRIKE_SSL 50050 #define PORT_POSTGRES 5432 #define PORT_POSTGRES_SSL 5432 #define PORT_ORACLE 1521 From 63badb59afbf6d0f6937bc34f524b7e1d6ad1ba5 Mon Sep 17 00:00:00 2001 From: ultimaiiii <89281437+ultimaiiii@users.noreply.github.com> Date: Fri, 20 Aug 2021 23:18:46 +0000 Subject: [PATCH 395/531] Makefile fix --- Makefile | 108 ++-------------------------------------------------- Makefile.am | 4 +- 2 files changed, 5 insertions(+), 107 deletions(-) diff --git a/Makefile b/Makefile index fe872d7..0fc0d2e 100644 --- a/Makefile +++ b/Makefile @@ -1,110 +1,8 @@ -STRIP=strip -XDEFINES= -DHAVE_MYSQL_MYSQL_H -DLIBOPENSSL -DLIBFIREBIRD -DLIBIDN -DHAVE_PR29_H -DHAVE_PCRE -DLIBMYSQLCLIENT -DLIBPOSTGRES -DLIBSVN -DLIBSSH -DHAVE_ZLIB -DHAVE_GCRYPT -DLIBMCACHED -DHAVE_MATH_H -XLIBS= -lgcrypt -lz -lssl -lfbclient -lidn -lpcre -lmysqlclient -lpq -lsvn_client-1 -lapr-1 -laprutil-1 -lsvn_subr-1 -lssh -lcrypto -lmemcached -XLIBPATHS=-L/usr/lib -L/usr/local/lib -L/lib -L/usr/lib/x86_64-linux-gnu -L/lib/x86_64-linux-gnu -L/usr/lib/x86_64-linux-gnu -XIPATHS= -I/usr/include/mysql -I/usr/include -I/usr/include -I/usr/include -I/usr/include/postgresql -I/usr/include -I/usr/include/subversion-1 -I/usr/include/apr-1.0 -I/usr/include/subversion-1 -I/usr/include/libmemcached-1.0 -PREFIX=/usr/local -XHYDRA_SUPPORT=xhydra -STRIP=strip - -HYDRA_LOGO= -PWI_LOGO= -SEC=-pie -fPIE -fstack-protector-all --param ssp-buffer-size=4 -D_FORTIFY_SOURCE=2 -Wl,-z,now -Wl,-z,relro - -# -# Makefile for Hydra - (c) 2001-2020 by van Hauser / THC -# -WARN_CLANG=-Wformat-nonliteral -Wstrncat-size -Wformat-security -Wsign-conversion -Wconversion -Wfloat-conversion -Wshorten-64-to-32 -Wuninitialized -Wmissing-variable-declarations -Wmissing-declarations -WARN_GCC=-Wformat=2 -Wformat-overflow=2 -Wformat-nonliteral -Wformat-truncation=2 -Wnull-dereference -Wstrict-overflow=2 -Wstringop-overflow=4 -Walloca-larger-than=4096 -Wtype-limits -Wconversion -Wtrampolines -Wstrict-prototypes -Wmissing-prototypes -Wmissing-declarations -fno-common -Wcast-align -CFLAGS ?= -g -OPTS=-I. -O3 $(CFLAGS) -fcommon -Wl,--allow-multiple-definition -# -Wall -g -pedantic -LIBS=-lm -DESTDIR ?= -BINDIR = /bin -MANDIR = /man/man1/ -DATADIR = /etc -PIXDIR = /share/pixmaps -APPDIR = /share/applications - -SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ - hydra-telnet.c hydra-cisco.c hydra-http.c hydra-ftp.c hydra-imap.c \ - hydra-pop3.c hydra-smb.c hydra-icq.c hydra-cisco-enable.c hydra-ldap.c \ - hydra-memcached.c hydra-mongodb.c hydra-mysql.c hydra-mssql.c hydra-cobaltstrike.c hydra-xmpp.c \ - hydra-http-proxy-urlenum.c hydra-snmp.c hydra-cvs.c hydra-smtp.c \ - hydra-smtp-enum.c hydra-sapr3.c hydra-ssh.c hydra-sshkey.c hydra-teamspeak.c \ - hydra-postgres.c hydra-rsh.c hydra-rlogin.c hydra-oracle-listener.c \ - hydra-svn.c hydra-pcanywhere.c hydra-sip.c hydra-oracle.c hydra-vmauthd.c \ - hydra-asterisk.c hydra-firebird.c hydra-afp.c hydra-ncp.c hydra-rdp.c \ - hydra-oracle-sid.c hydra-http-proxy.c hydra-http-form.c hydra-irc.c \ - hydra-s7-300.c hydra-redis.c hydra-adam6500.c hydra-rtsp.c \ - hydra-rpcap.c hydra-radmin2.c \ - hydra-time.c crc32.c d3des.c bfg.c ntlm.c sasl.c hmacmd5.c hydra-mod.c \ - hydra-smb2.c -OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ - hydra-telnet.o hydra-cisco.o hydra-http.o hydra-ftp.o hydra-imap.o \ - hydra-pop3.o hydra-smb.o hydra-icq.o hydra-cisco-enable.o hydra-ldap.o \ - hydra-memcached.o hydra-mongodb.o hydra-mysql.o hydra-mssql.o hydra-cobaltstrike.o hydra-xmpp.o \ - hydra-http-proxy-urlenum.o hydra-snmp.o hydra-cvs.o hydra-smtp.o \ - hydra-smtp-enum.o hydra-sapr3.o hydra-ssh.o hydra-sshkey.o hydra-teamspeak.o \ - hydra-postgres.o hydra-rsh.o hydra-rlogin.o hydra-oracle-listener.o \ - hydra-svn.o hydra-pcanywhere.o hydra-sip.o hydra-oracle-sid.o hydra-oracle.o \ - hydra-vmauthd.o hydra-asterisk.o hydra-firebird.o hydra-afp.o \ - hydra-ncp.o hydra-http-proxy.o hydra-http-form.o hydra-irc.o \ - hydra-redis.o hydra-rdp.o hydra-s7-300.c hydra-adam6500.o hydra-rtsp.o \ - hydra-rpcap.o hydra-radmin2.o \ - crc32.o d3des.o bfg.o ntlm.o sasl.o hmacmd5.o hydra-mod.o hydra-time.o \ - hydra-smb2.o -BINS = hydra pw-inspector - -EXTRA_DIST = README README.arm README.palm CHANGES TODO INSTALL LICENSE \ - hydra-mod.h hydra.h crc32.h d3des.h - -all: pw-inspector hydra $(XHYDRA_SUPPORT) - @echo - @echo Now type "make install" - -hydra: hydra.c $(OBJ) - $(CC) $(OPTS) $(SEC) $(LIBS) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o hydra $(HYDRA_LOGO) hydra.c $(OBJ) $(LIBS) $(XLIBS) $(XLIBPATHS) $(XIPATHS) $(XDEFINES) - @echo - @echo If men could get pregnant, abortion would be a sacrament - @echo - -xhydra: - -cd hydra-gtk && sh ./make_xhydra.sh - -pw-inspector: pw-inspector.c - -$(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o pw-inspector $(PWI_LOGO) pw-inspector.c - -.c.o: - $(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) -c $< $(XDEFINES) $(XIPATHS) - -strip: all - strip $(BINS) - -echo OK > /dev/null && test -x xhydra && strip xhydra || echo OK > /dev/null - -install: strip - -mkdir -p $(DESTDIR)$(PREFIX)$(BINDIR) - cp -f hydra-wizard.sh $(BINS) $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 hydra-wizard.sh $(BINS) - -echo OK > /dev/null && test -x xhydra && cp xhydra $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 xhydra || echo OK > /dev/null - -sed -e "s|^INSTALLDIR=.*|INSTALLDIR="$(PREFIX)"|" dpl4hydra.sh | sed -e "s|^LOCATION=.*|LOCATION="$(DATADIR)"|" > $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh - -chmod 755 $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh - -mkdir -p $(DESTDIR)$(PREFIX)$(DATADIR) - -cp -f *.csv $(DESTDIR)$(PREFIX)$(DATADIR) - -mkdir -p $(DESTDIR)$(PREFIX)$(MANDIR) - -cp -f hydra.1 xhydra.1 pw-inspector.1 $(DESTDIR)$(PREFIX)$(MANDIR) - -mkdir -p $(DESTDIR)$(PREFIX)$(PIXDIR) - -cp -f xhydra.png $(DESTDIR)$(PREFIX)$(PIXDIR)/ - -mkdir -p $(DESTDIR)$(PREFIX)$(APPDIR) - -desktop-file-install --dir $(DESTDIR)$(PREFIX)$(APPDIR) xhydra.desktop +all: + @echo Error: you must run "./configure" first clean: - rm -rf xhydra pw-inspector hydra *.o core *.core *.stackdump *~ Makefile.in Makefile dev_rfc hydra.restore arm/*.ipk arm/ipkg/usr/bin/* hydra-gtk/src/*.o hydra-gtk/src/xhydra hydra-gtk/stamp-h hydra-gtk/config.status hydra-gtk/errors hydra-gtk/config.log hydra-gtk/src/.deps hydra-gtk/src/Makefile hydra-gtk/Makefile cp -f Makefile.orig Makefile uninstall: - -rm -f $(DESTDIR)$(PREFIX)$(BINDIR)/xhydra $(DESTDIR)$(PREFIX)$(BINDIR)/hydra $(DESTDIR)$(PREFIX)$(BINDIR)/pw-inspector $(DESTDIR)$(PREFIX)$(BINDIR)/hydra-wizard.sh $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh - -rm -f $(DESTDIR)$(PREFIX)$(DATADIR)/dpl4hydra_full.csv $(DESTDIR)$(PREFIX)$(DATADIR)/dpl4hydra_local.csv - -rm -f $(DESTDIR)$(PREFIX)$(MANDIR)/hydra.1 $(DESTDIR)$(PREFIX)$(MANDIR)/xhydra.1 $(DESTDIR)$(PREFIX)$(MANDIR)/pw-inspector.1 - -rm -f $(DESTDIR)$(PREFIX)$(PIXDIR)/xhydra.png - -rm -f $(DESTDIR)$(PREFIX)$(APPDIR)/xhydra.desktop + @echo Error: you must run "./configure" first diff --git a/Makefile.am b/Makefile.am index a85c99d..3768fe3 100644 --- a/Makefile.am +++ b/Makefile.am @@ -17,7 +17,7 @@ APPDIR = /share/applications SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ hydra-telnet.c hydra-cisco.c hydra-http.c hydra-ftp.c hydra-imap.c \ hydra-pop3.c hydra-smb.c hydra-icq.c hydra-cisco-enable.c hydra-ldap.c \ - hydra-memcached.c hydra-mongodb.c hydra-mysql.c hydra-mssql.c hydra-xmpp.c \ + hydra-memcached.c hydra-mongodb.c hydra-mysql.c hydra-mssql.c hydra-cobaltstrike.c hydra-xmpp.c \ hydra-http-proxy-urlenum.c hydra-snmp.c hydra-cvs.c hydra-smtp.c \ hydra-smtp-enum.c hydra-sapr3.c hydra-ssh.c hydra-sshkey.c hydra-teamspeak.c \ hydra-postgres.c hydra-rsh.c hydra-rlogin.c hydra-oracle-listener.c \ @@ -31,7 +31,7 @@ SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ hydra-telnet.o hydra-cisco.o hydra-http.o hydra-ftp.o hydra-imap.o \ hydra-pop3.o hydra-smb.o hydra-icq.o hydra-cisco-enable.o hydra-ldap.o \ - hydra-memcached.o hydra-mongodb.o hydra-mysql.o hydra-mssql.o hydra-xmpp.o \ + hydra-memcached.o hydra-mongodb.o hydra-mysql.o hydra-mssql.o hydra-cobaltstrike.o hydra-xmpp.o \ hydra-http-proxy-urlenum.o hydra-snmp.o hydra-cvs.o hydra-smtp.o \ hydra-smtp-enum.o hydra-sapr3.o hydra-ssh.o hydra-sshkey.o hydra-teamspeak.o \ hydra-postgres.o hydra-rsh.o hydra-rlogin.o hydra-oracle-listener.o \ From cb8fccda71b3b91d04cfa6a26a96e87bae529e39 Mon Sep 17 00:00:00 2001 From: ultimaiiii <89281437+ultimaiiii@users.noreply.github.com> Date: Sat, 21 Aug 2021 17:07:40 +0000 Subject: [PATCH 396/531] Rename MS to CS --- hydra-cobaltstrike.c | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/hydra-cobaltstrike.c b/hydra-cobaltstrike.c index 64092cf..5997bf7 100644 --- a/hydra-cobaltstrike.c +++ b/hydra-cobaltstrike.c @@ -1,6 +1,6 @@ #include "hydra-mod.h" -#define MSLEN 256 +#define CSLEN 256 extern char *HYDRA_EXIT; char *buf; @@ -8,7 +8,7 @@ char *buf; int32_t start_cobaltstrike(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *pass, buffer[4 + 1 + 256]; - char ms_pass[MSLEN + 1]; + char cs_pass[CSLEN + 1]; unsigned char len_pass; unsigned char reply_byte_0; unsigned char reply_byte_1; @@ -18,11 +18,11 @@ int32_t start_cobaltstrike(int32_t s, char *ip, int32_t port, unsigned char opti if (strlen(pass = hydra_get_next_password()) == 0) pass = empty; - if (strlen(pass) > MSLEN) - pass[MSLEN - 1] = 0; + if (strlen(pass) > CSLEN) + pass[CSLEN - 1] = 0; len_pass = strlen(pass); - memset(ms_pass, 0, MSLEN + 1); - strcpy(ms_pass, pass); + memset(cs_pass, 0, CSLEN + 1); + strcpy(cs_pass, pass); memset(buffer, 0x41, sizeof(buffer)); buffer[0] = 0x00; @@ -30,7 +30,7 @@ int32_t start_cobaltstrike(int32_t s, char *ip, int32_t port, unsigned char opti buffer[2] = 0xBE; buffer[3] = 0xEF; memcpy(buffer + 4, &len_pass, 1); - memcpy(buffer + 5, ms_pass, len_pass); + memcpy(buffer + 5, cs_pass, len_pass); if (hydra_send(s, buffer, sizeof(buffer), 0) < 0) return 1; @@ -74,7 +74,7 @@ int32_t start_cobaltstrike(int32_t s, char *ip, int32_t port, unsigned char opti void service_cobaltstrike(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; - int32_t myport = PORT_MSSQL, mysslport = PORT_MSSQL_SSL; + int32_t mysslport = PORT_COBALTSTRIKE_SSL; hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) From c9da8671419a9da9eaa0363999663d1bfbd973b8 Mon Sep 17 00:00:00 2001 From: ultimaiiii <89281437+ultimaiiii@users.noreply.github.com> Date: Sat, 21 Aug 2021 17:12:40 +0000 Subject: [PATCH 397/531] Move CS service to keep service list sorted --- hydra.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/hydra.c b/hydra.c index 9047336..5db647b 100644 --- a/hydra.c +++ b/hydra.c @@ -204,13 +204,13 @@ extern int32_t service_rtsp_init(char *ip, int32_t sp, unsigned char options, ch extern int32_t service_rpcap_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname); // ADD NEW SERVICES HERE -char *SERVICES = "adam6500 asterisk afp cisco cisco-enable cvs firebird ftp[s] " +char *SERVICES = "adam6500 asterisk afp cisco cisco-enable cobaltstrike cvs firebird ftp[s] " "http[s]-{head|get|post} http[s]-{get|post}-form http-proxy " "http-proxy-urlenum icq imap[s] irc ldap2[s] ldap3[-{cram|digest}md5][s] " "memcached mongodb mssql mysql ncp nntp oracle oracle-listener oracle-sid " "pcanywhere pcnfs pop3[s] postgres radmin2 rdp redis rexec rlogin rpcap " "rsh rtsp s7-300 sapr3 sip smb smb2 smtp[s] smtp-enum snmp socks5 ssh " - "sshkey svn teamspeak telnet[s] vmauthd vnc xmpp cobaltstrike"; + "sshkey svn teamspeak telnet[s] vmauthd vnc xmpp"; #define MAXBUF 520 #define MAXLINESIZE ((MAXBUF / 2) - 4) From 67ef4c733ff047a1d1b1bc622bb587db9db4c983 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Mon, 23 Aug 2021 11:31:58 +0200 Subject: [PATCH 398/531] code format --- CHANGES | 1 + Makefile.am | 4 ++-- hydra-cobaltstrike.c | 8 ++++---- hydra-mod.h | 2 +- hydra-sip.c | 12 ++++-------- hydra-ssh.c | 2 +- hydra-telnet.c | 20 ++++---------------- hydra.c | 7 +++++-- 8 files changed, 22 insertions(+), 34 deletions(-) diff --git a/CHANGES b/CHANGES index 50d56fd..398cd19 100644 --- a/CHANGES +++ b/CHANGES @@ -2,6 +2,7 @@ Changelog for hydra ------------------- Release 9.3-dev +* New module: cobaltstrike by ultimaiiii, thank you! * fix for ssh to support -M or ip/range * for vnc/cisco/... protocols that only check for a password, skip host after the password is found diff --git a/Makefile.am b/Makefile.am index 3768fe3..10cad3a 100644 --- a/Makefile.am +++ b/Makefile.am @@ -17,7 +17,7 @@ APPDIR = /share/applications SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ hydra-telnet.c hydra-cisco.c hydra-http.c hydra-ftp.c hydra-imap.c \ hydra-pop3.c hydra-smb.c hydra-icq.c hydra-cisco-enable.c hydra-ldap.c \ - hydra-memcached.c hydra-mongodb.c hydra-mysql.c hydra-mssql.c hydra-cobaltstrike.c hydra-xmpp.c \ + hydra-memcached.c hydra-mongodb.c hydra-mysql.c hydra-mssql.c hydra-xmpp.c \ hydra-http-proxy-urlenum.c hydra-snmp.c hydra-cvs.c hydra-smtp.c \ hydra-smtp-enum.c hydra-sapr3.c hydra-ssh.c hydra-sshkey.c hydra-teamspeak.c \ hydra-postgres.c hydra-rsh.c hydra-rlogin.c hydra-oracle-listener.c \ @@ -25,7 +25,7 @@ SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ hydra-asterisk.c hydra-firebird.c hydra-afp.c hydra-ncp.c hydra-rdp.c \ hydra-oracle-sid.c hydra-http-proxy.c hydra-http-form.c hydra-irc.c \ hydra-s7-300.c hydra-redis.c hydra-adam6500.c hydra-rtsp.c \ - hydra-rpcap.c hydra-radmin2.c \ + hydra-rpcap.c hydra-radmin2.c hydra-cobaltstrike.c \ hydra-time.c crc32.c d3des.c bfg.c ntlm.c sasl.c hmacmd5.c hydra-mod.c \ hydra-smb2.c OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ diff --git a/hydra-cobaltstrike.c b/hydra-cobaltstrike.c index 5997bf7..6c40e64 100644 --- a/hydra-cobaltstrike.c +++ b/hydra-cobaltstrike.c @@ -35,22 +35,22 @@ int32_t start_cobaltstrike(int32_t s, char *ip, int32_t port, unsigned char opti if (hydra_send(s, buffer, sizeof(buffer), 0) < 0) return 1; - reply_byte_0 = 0x00; + reply_byte_0 = 0x00; ret = hydra_recv_nb(s, &reply_byte_0, 1); if (ret <= 0) return 3; - reply_byte_1 = 0x00; + reply_byte_1 = 0x00; ret = hydra_recv_nb(s, &reply_byte_1, 1); if (ret <= 0) return 3; - reply_byte_2 = 0x00; + reply_byte_2 = 0x00; ret = hydra_recv_nb(s, &reply_byte_2, 1); if (ret <= 0) return 3; - reply_byte_3 = 0x00; + reply_byte_3 = 0x00; ret = hydra_recv_nb(s, &reply_byte_3, 1); if (ret <= 0) return 3; diff --git a/hydra-mod.h b/hydra-mod.h index 636efb5..f0c22c4 100644 --- a/hydra-mod.h +++ b/hydra-mod.h @@ -71,7 +71,7 @@ char *cmdlinetarget; typedef int32_t BOOL; #else /* __APPLE__ */ /* ensure compatibility with objc libraries */ -#if (TARGET_OS_IPHONE && __LP64__) || TARGET_OS_WATCH +#if (TARGET_OS_IPHONE && __LP64__) || TARGET_OS_WATCH typedef bool BOOL; #else typedef signed char BOOL; diff --git a/hydra-sip.c b/hydra-sip.c index 9c5ad78..c9d71d2 100644 --- a/hydra-sip.c +++ b/hydra-sip.c @@ -71,14 +71,12 @@ int32_t start_sip(int32_t s, char *ip, char *lip, int32_t port, int32_t lport, u } int32_t has_sip_cred = 0; - int32_t try - = 0; + int32_t try = 0; /* We have to check many times because server may begin to send "100 Trying" * before "401 Unauthorized" */ while (try < 2 && !has_sip_cred) { - try - ++; + try++; if (hydra_data_ready_timed(s, 3, 0) > 0) { i = hydra_recv(s, (char *)buf, sizeof(buf) - 1); if (i > 0) @@ -160,14 +158,12 @@ int32_t start_sip(int32_t s, char *ip, char *lip, int32_t port, int32_t lport, u if (hydra_send(s, buffer, strlen(buffer), 0) < 0) { return 3; } - try - = 0; + try = 0; int32_t has_resp = 0; int32_t sip_code = 0; while (try < 2 && !has_resp) { - try - ++; + try++; if (hydra_data_ready_timed(s, 5, 0) > 0) { memset(buf, 0, sizeof(buf)); if ((i = hydra_recv(s, (char *)buf, sizeof(buf) - 1)) >= 0) diff --git a/hydra-ssh.c b/hydra-ssh.c index eb021ce..785ae1e 100644 --- a/hydra-ssh.c +++ b/hydra-ssh.c @@ -34,7 +34,7 @@ int32_t start_ssh(int32_t s, char *ip, int32_t port, unsigned char options, char if (new_session) { if (session) { ssh_disconnect(session); - //ssh_finalize(); + // ssh_finalize(); ssh_free(session); } else { ssh_init(); diff --git a/hydra-telnet.c b/hydra-telnet.c index 63fcb23..183621a 100644 --- a/hydra-telnet.c +++ b/hydra-telnet.c @@ -76,28 +76,16 @@ int32_t start_telnet(int32_t s, char *ip, int32_t port, unsigned char options, c /*win7 answering with do terminal type = 0xfd 0x18 */ while ((buf = hydra_receive_line(s)) != NULL && make_to_lower(buf) && (strstr(buf, "password:") == NULL || strstr(buf, "login:") == NULL || strstr(buf, "last login:") != NULL) && strstr(buf, "sername:") == NULL) { - if ((miscptr != NULL && strstr(buf, miscptr) != NULL) - || (miscptr == NULL - && strstr(buf, "invalid") == NULL - && strstr(buf, "incorrect") == NULL - && strstr(buf, "bad ") == NULL - && (strchr(buf, '/') != NULL - || strchr(buf, '>') != NULL - || strchr(buf, '$') != NULL - || strchr(buf, '#') != NULL - || strchr(buf, '%') != NULL - || ((buf[1] == '\xfd') - && (buf[2] == '\x18'))) - )) { + if ((miscptr != NULL && strstr(buf, miscptr) != NULL) || (miscptr == NULL && strstr(buf, "invalid") == NULL && strstr(buf, "incorrect") == NULL && strstr(buf, "bad ") == NULL && (strchr(buf, '/') != NULL || strchr(buf, '>') != NULL || strchr(buf, '$') != NULL || strchr(buf, '#') != NULL || strchr(buf, '%') != NULL || ((buf[1] == '\xfd') && (buf[2] == '\x18'))))) { hydra_report_found_host(port, ip, "telnet", fp); hydra_completed_pair_found(); free(buf); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) return 3; return 1; - } else if (buf && strstr(buf, "assword:") ) { + } else if (buf && strstr(buf, "assword:")) { hydra_completed_pair(); - //printf("password prompt\n"); + // printf("password prompt\n"); free(buf); if (strlen(pass = hydra_get_next_password()) == 0) pass = empty; @@ -116,7 +104,7 @@ int32_t start_telnet(int32_t s, char *ip, int32_t port, unsigned char options, c return 1; } } - } else if (buf && strstr(buf, "login:") ) { + } else if (buf && strstr(buf, "login:")) { free(buf); hydra_completed_pair(); return 2; diff --git a/hydra.c b/hydra.c index 5db647b..54038da 100644 --- a/hydra.c +++ b/hydra.c @@ -1935,8 +1935,11 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { // the above line } if (debug || hydra_options.showAttempt) { - printf("[%sATTEMPT] target %s - login \"%s\" - pass \"%s\" - %" hPRIu64 " of %" hPRIu64 " [child %d] (%d/%d)\n", hydra_targets[target_no]->redo_state ? "REDO-" : snp_is_redo ? "RE-" : "", hydra_targets[target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, hydra_targets[target_no]->sent, hydra_brains.todo + hydra_targets[target_no]->redo, head_no, hydra_targets[target_no]->redo_state ? hydra_targets[target_no]->redo_state - 1 : 0, - hydra_targets[target_no]->redo); + printf("[%sATTEMPT] target %s - login \"%s\" - pass \"%s\" - %" hPRIu64 " of %" hPRIu64 " [child %d] (%d/%d)\n", + hydra_targets[target_no]->redo_state ? "REDO-" + : snp_is_redo ? "RE-" + : "", + hydra_targets[target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, hydra_targets[target_no]->sent, hydra_brains.todo + hydra_targets[target_no]->redo, head_no, hydra_targets[target_no]->redo_state ? hydra_targets[target_no]->redo_state - 1 : 0, hydra_targets[target_no]->redo); } loop_cnt = 0; return 0; From 5cb14100f87daa6190a6e811e47852180ef2748a Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Tue, 31 Aug 2021 09:37:06 +0200 Subject: [PATCH 399/531] remove old option from help output --- hydra.c | 2 -- 1 file changed, 2 deletions(-) diff --git a/hydra.c b/hydra.c index 54038da..5ffecbe 100644 --- a/hydra.c +++ b/hydra.c @@ -596,8 +596,6 @@ void help_bfg() { "others,\n" " just add their real representation.\n" " -y disable the use of the above letters as placeholders\n" - " -r use a shuffling method called 'rain' to try to break\n" - " the linearity of the bruteforce\n" "Examples:\n" " -x 3:5:a generate passwords from length 3 to 5 with all " "lowercase letters\n" From b3bd06833480e3ae99102b6ff8e0fce867f4c308 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Wed, 6 Oct 2021 15:21:26 +0200 Subject: [PATCH 400/531] fix nits --- hydra-cisco.c | 2 +- hydra-vnc.c | 2 +- hydra.c | 14 +++++++------- 3 files changed, 9 insertions(+), 9 deletions(-) diff --git a/hydra-cisco.c b/hydra-cisco.c index 72709ac..e31c749 100644 --- a/hydra-cisco.c +++ b/hydra-cisco.c @@ -5,7 +5,7 @@ #endif extern char *HYDRA_EXIT; -char *buf = NULL; +static char *buf = NULL; int32_t start_cisco(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; diff --git a/hydra-vnc.c b/hydra-vnc.c index aeecd59..c836371 100644 --- a/hydra-vnc.c +++ b/hydra-vnc.c @@ -19,7 +19,7 @@ int32_t vnc_client_version = RFB33; int32_t failed_auth = 0; extern char *HYDRA_EXIT; -char *buf; +static char *buf; /* * Encrypt CHALLENGESIZE bytes in memory using a password. diff --git a/hydra.c b/hydra.c index 5ffecbe..7f37f11 100644 --- a/hydra.c +++ b/hydra.c @@ -2220,6 +2220,10 @@ int main(int argc, char *argv[]) { SERVICES = hydra_string_replace(SERVICES, "radmin2 ", ""); strcat(unsupported, "radmin2 "); #endif +#ifndef LIBFREERDP + SERVICES = hydra_string_replace(SERVICES, "rdp ", ""); + strcat(unsupported, "rdp "); +#endif #ifndef LIBSAPR3 SERVICES = hydra_string_replace(SERVICES, "sapr3 ", ""); strcat(unsupported, "sapr3 "); @@ -2267,11 +2271,6 @@ int main(int argc, char *argv[]) { strcat(unsupported, "SSL-services (ftps, sip, rdp, oracle-services, ...) "); #endif -#ifndef LIBFREERDP - // for rdp - SERVICES = hydra_string_replace(SERVICES, " rdp", ""); -#endif - #ifndef HAVE_MATH_H if (strlen(unsupported) > 0) strcat(unsupported, "and "); @@ -3940,9 +3939,10 @@ int main(int argc, char *argv[]) { } freeaddrinfo(res); } - // restore device information if present + // restore device information if present (overwrite null bytes) if (device != NULL) { - *(device - 1) = '%'; + char *tmpptr = device - 1; + *tmpptr = '%'; // you can ignore the compiler warning fprintf(stderr, "[WARNING] not all modules support BINDTODEVICE for IPv6 " "link local addresses, e.g. SSH does not\n"); } From 89fbd9a44d552f9f65c79e312d0157834cdd5492 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Thu, 14 Oct 2021 10:14:42 +0200 Subject: [PATCH 401/531] debug --- hydra-rdp.c | 1 + 1 file changed, 1 insertion(+) diff --git a/hydra-rdp.c b/hydra-rdp.c index 6a000a4..d8eec87 100644 --- a/hydra-rdp.c +++ b/hydra-rdp.c @@ -54,6 +54,7 @@ int32_t start_rdp(char *ip, int32_t port, unsigned char options, char *miscptr, } login_result = rdp_connect(server, port, domain, login, pass); + if (debug) hydra_report(stderr, "[DEBUG] rdp reported %08x\n", login_result); switch (login_result) { case 0: // login success From 3e364483d2dfd498b4fce4e2f2e5e2a23bcb6b75 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Wed, 20 Oct 2021 16:29:52 +0200 Subject: [PATCH 402/531] support xcode --- CHANGES | 3 ++- Makefile.am | 2 +- configure | 9 +++++++++ 3 files changed, 12 insertions(+), 2 deletions(-) diff --git a/CHANGES b/CHANGES index 398cd19..5f0f8ba 100644 --- a/CHANGES +++ b/CHANGES @@ -2,7 +2,8 @@ Changelog for hydra ------------------- Release 9.3-dev -* New module: cobaltstrike by ultimaiiii, thank you! +* support Xcode compilation +* new module: cobaltstrike by ultimaiiii, thank you! * fix for ssh to support -M or ip/range * for vnc/cisco/... protocols that only check for a password, skip host after the password is found diff --git a/Makefile.am b/Makefile.am index 10cad3a..74288cf 100644 --- a/Makefile.am +++ b/Makefile.am @@ -4,7 +4,7 @@ WARN_CLANG=-Wformat-nonliteral -Wstrncat-size -Wformat-security -Wsign-conversion -Wconversion -Wfloat-conversion -Wshorten-64-to-32 -Wuninitialized -Wmissing-variable-declarations -Wmissing-declarations WARN_GCC=-Wformat=2 -Wformat-overflow=2 -Wformat-nonliteral -Wformat-truncation=2 -Wnull-dereference -Wstrict-overflow=2 -Wstringop-overflow=4 -Walloca-larger-than=4096 -Wtype-limits -Wconversion -Wtrampolines -Wstrict-prototypes -Wmissing-prototypes -Wmissing-declarations -fno-common -Wcast-align CFLAGS ?= -g -OPTS=-I. -O3 $(CFLAGS) -fcommon -Wl,--allow-multiple-definition +OPTS=-I. -O3 $(CFLAGS) -fcommon # -Wall -g -pedantic LIBS=-lm DESTDIR ?= diff --git a/configure b/configure index 139c9bf..8ad8af2 100755 --- a/configure +++ b/configure @@ -1362,6 +1362,10 @@ echo '#include ' >> $TMPC.c echo "int main() { char *x = strrchr(\"test\", 'e'); if (x == NULL) return 0; else return 1; }" >> $TMPC.c $CC -o $TMPC $TMPC.c > /dev/null 2>&1 test -x $TMPC && STRRCHR="" +rm -f $TMPC +$CC -o $TMPC -Wl,--allow-multiple-definition $TMPC.c > /dev/null 2>&1 +WALLOW="no" +test -x $TMPC && WALLOW="yes" rm -f $TMPC $TMPC.c echo " ... strrchr()$STRRCHR found" if [ -n "$CRYPTO_PATH" ]; then @@ -1392,6 +1396,11 @@ rm -f $TMPC $TMPC.c $TMPC.c.err echo " Compiling... $GCCSEC" echo " Linking... $LDSEC" +echo "Checking for --allow-multiple-definition linker option ... $WALLOW" +if [ "$WALLOW" = "yes" ]; then + GCCSECOPT="$GCCSECOPT -Wl,--allow-multiple-definition" +fi + echo XDEFINES="" XLIBS="" From 13db28f9d26af1027cf42beeb41b61ae3df6ed58 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Wed, 27 Oct 2021 17:19:13 +0200 Subject: [PATCH 403/531] rdp empty pw fix --- CHANGES | 1 + hydra-rdp.c | 5 ++++- 2 files changed, 5 insertions(+), 1 deletion(-) diff --git a/CHANGES b/CHANGES index 5f0f8ba..f3aadbe 100644 --- a/CHANGES +++ b/CHANGES @@ -5,6 +5,7 @@ Release 9.3-dev * support Xcode compilation * new module: cobaltstrike by ultimaiiii, thank you! * fix for ssh to support -M or ip/range +* fix for rdp to detect empty passwords * for vnc/cisco/... protocols that only check for a password, skip host after the password is found * added "make uninstall" diff --git a/hydra-rdp.c b/hydra-rdp.c index d8eec87..6e9c8db 100644 --- a/hydra-rdp.c +++ b/hydra-rdp.c @@ -22,7 +22,10 @@ BOOL rdp_connect(char *server, int32_t port, char *domain, char *login, char *pa instance->settings->Username = login; instance->settings->Password = password; instance->settings->IgnoreCertificate = TRUE; - instance->settings->AuthenticationOnly = TRUE; + if (password[0] == 0) + instance->settings->AuthenticationOnly = FALSE; + else + instance->settings->AuthenticationOnly = TRUE; instance->settings->ServerHostname = server; instance->settings->ServerPort = port; instance->settings->Domain = domain; From 9b055287c07719861c8053ca3e1218ab2303f529 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Mon, 1 Nov 2021 14:13:51 +0100 Subject: [PATCH 404/531] fix -M ipv6 --- CHANGES | 1 + hydra.c | 2 +- 2 files changed, 2 insertions(+), 1 deletion(-) diff --git a/CHANGES b/CHANGES index f3aadbe..1f5d497 100644 --- a/CHANGES +++ b/CHANGES @@ -8,6 +8,7 @@ Release 9.3-dev * fix for rdp to detect empty passwords * for vnc/cisco/... protocols that only check for a password, skip host after the password is found +* fixe to support IPv6 addresses in -M * added "make uninstall" diff --git a/hydra.c b/hydra.c index 7f37f11..abc6286 100644 --- a/hydra.c +++ b/hydra.c @@ -3586,7 +3586,7 @@ int main(int argc, char *argv[]) { } } else hydra_targets[i]->target = tmpptr; - if ((tmpptr2 = strchr(hydra_targets[i]->target, ':')) != NULL) { + if ((tmpptr2 = strchr(tmpptr, ':')) != NULL) { *tmpptr2++ = 0; tmpptr = tmpptr2; hydra_targets[i]->port = atoi(tmpptr2); From f20ca77309fa57c47d80e4a28cd8f015c6212fad Mon Sep 17 00:00:00 2001 From: Kai Date: Fri, 5 Nov 2021 17:47:21 +0100 Subject: [PATCH 405/531] README: HTTP => HTTPS --- README | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README b/README index 322da43..2ce34ad 100644 --- a/README +++ b/README @@ -74,7 +74,7 @@ make install ``` If you want the ssh module, you have to setup libssh (not libssh2!) on your -system, get it from http://www.libssh.org, for ssh v1 support you also need +system, get it from https://www.libssh.org, for ssh v1 support you also need to add "-DWITH_SSH1=On" option in the cmake command line. IMPORTANT: If you compile on MacOS then you must do this - do not install libssh via brew! From 52ce0772e85f2f305a0a2307038f5f148090d685 Mon Sep 17 00:00:00 2001 From: Yisus7u7 <64093255+Yisus7u7@users.noreply.github.com> Date: Mon, 22 Nov 2021 13:55:36 -0500 Subject: [PATCH 406/531] hydra-gtk: update to gtk3 gtk3 is more modern and successor to the old gtk2 --- hydra-gtk/configure.in | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-gtk/configure.in b/hydra-gtk/configure.in index e4fb923..5bf4e78 100755 --- a/hydra-gtk/configure.in +++ b/hydra-gtk/configure.in @@ -10,7 +10,7 @@ AC_PROG_CC AM_PROG_CC_STDC AC_HEADER_STDC -pkg_modules="gtk+-2.0 >= 2.0.0" +pkg_modules="gtk+-3.0 >= 3.24.24" PKG_CHECK_MODULES(PACKAGE, [$pkg_modules]) AC_SUBST(PACKAGE_CFLAGS) AC_SUBST(PACKAGE_LIBS) From 4a1bb5117f9bd1f1310f995f6a2c870e971f6878 Mon Sep 17 00:00:00 2001 From: Toranova Date: Fri, 31 Dec 2021 11:43:19 +0800 Subject: [PATCH 407/531] fix mongodb module not using user specified port --- hydra-mongodb.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-mongodb.c b/hydra-mongodb.c index 5b38a42..201c3ff 100644 --- a/hydra-mongodb.c +++ b/hydra-mongodb.c @@ -72,7 +72,7 @@ int32_t start_mongodb(int32_t s, char *ip, int32_t port, unsigned char options, mongoc_log_set_handler(NULL, NULL); bson_init(&q); - snprintf(uri, sizeof(uri), "mongodb://%s:%s@%s/?authSource=%s", login, pass, hydra_address2string(ip), miscptr); + snprintf(uri, sizeof(uri), "mongodb://%s:%s@%s:%d/?authSource=%s", login, pass, hydra_address2string(ip), port, miscptr); client = mongoc_client_new(uri); if (!client) return 3; From c637d1d7a04d9f6068b332bf5e9c9ffbc9b967e4 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Sat, 1 Jan 2022 00:50:58 +0100 Subject: [PATCH 408/531] welcome 2022 --- Makefile.am | 2 +- README | 2 +- hydra.1 | 2 +- hydra.c | 4 ++-- 4 files changed, 5 insertions(+), 5 deletions(-) diff --git a/Makefile.am b/Makefile.am index 74288cf..adfbf64 100644 --- a/Makefile.am +++ b/Makefile.am @@ -1,5 +1,5 @@ # -# Makefile for Hydra - (c) 2001-2020 by van Hauser / THC +# Makefile for Hydra - (c) 2001-2022 by van Hauser / THC # WARN_CLANG=-Wformat-nonliteral -Wstrncat-size -Wformat-security -Wsign-conversion -Wconversion -Wfloat-conversion -Wshorten-64-to-32 -Wuninitialized -Wmissing-variable-declarations -Wmissing-declarations WARN_GCC=-Wformat=2 -Wformat-overflow=2 -Wformat-nonliteral -Wformat-truncation=2 -Wnull-dereference -Wstrict-overflow=2 -Wstringop-overflow=4 -Walloca-larger-than=4096 -Wtype-limits -Wconversion -Wtrampolines -Wstrict-prototypes -Wmissing-prototypes -Wmissing-declarations -fno-common -Wcast-align diff --git a/README b/README index 2ce34ad..2b59866 100644 --- a/README +++ b/README @@ -1,7 +1,7 @@ H Y D R A - (c) 2001-2021 by van Hauser / THC + (c) 2001-2022 by van Hauser / THC https://github.com/vanhauser-thc/thc-hydra many modules were written by David (dot) Maciejak @ gmail (dot) com BFG code by Jan Dlabal diff --git a/hydra.1 b/hydra.1 index 039d55f..81b2feb 100644 --- a/hydra.1 +++ b/hydra.1 @@ -1,4 +1,4 @@ -.TH "HYDRA" "1" "01/01/2021" +.TH "HYDRA" "1" "01/01/2022" .SH NAME hydra \- a very fast network logon cracker which supports many different services .SH SYNOPSIS diff --git a/hydra.c b/hydra.c index abc6286..9450847 100644 --- a/hydra.c +++ b/hydra.c @@ -1,5 +1,5 @@ /* - * hydra (c) 2001-2021 by van Hauser / THC + * hydra (c) 2001-2022 by van Hauser / THC * https://github.com/vanhauser-thc/thc-hydra * * Parallized network login hacker. @@ -2181,7 +2181,7 @@ int main(int argc, char *argv[]) { struct sockaddr_in6 *ipv6 = NULL; struct sockaddr_in *ipv4 = NULL; - printf("%s %s (c) 2021 by %s & %s - Please do not use in military or secret " + printf("%s %s (c) 2022 by %s & %s - Please do not use in military or secret " "service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).\n\n", PROGRAM, VERSION, AUTHOR, AUTHOR2); #ifndef LIBAFP From c61fe26d167f6c0d8fd1c20380a5eb0ec53c7ef5 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Tue, 11 Jan 2022 10:19:04 +0100 Subject: [PATCH 409/531] fix http with proxy + port usage --- hydra-http.c | 24 ++++++++++++------------ hydra-rdp.c | 1 + 2 files changed, 13 insertions(+), 12 deletions(-) diff --git a/hydra-http.c b/hydra-http.c index a0769b9..c76b937 100644 --- a/hydra-http.c +++ b/hydra-http.c @@ -52,17 +52,17 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha /* again: no snprintf to be portable. don't worry, buffer can't overflow */ if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) sprintf(buffer, - "%s http://%s:%d%.250s HTTP/1.1\r\nHost: %s\r\nConnection: " + "%s http://%s%.250s HTTP/1.1\r\nHost: %s\r\nConnection: " "close\r\nAuthorization: Basic %s\r\nProxy-Authorization: Basic " "%s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", - type, webtarget, webport, miscptr, webtarget, buffer2, proxy_authentication[selected_proxy], header); + type, webtarget, miscptr, webtarget, buffer2, proxy_authentication[selected_proxy], header); else { if (use_proxy == 1) sprintf(buffer, - "%s http://%s:%d%.250s HTTP/1.1\r\nHost: %s\r\nConnection: " + "%s http://%s%.250s HTTP/1.1\r\nHost: %s\r\nConnection: " "close\r\nAuthorization: Basic %s\r\nUser-Agent: Mozilla/4.0 " "(Hydra)\r\n%s\r\n", - type, webtarget, webport, miscptr, webtarget, buffer2, header); + type, webtarget, miscptr, webtarget, buffer2, header); else sprintf(buffer, "%s %.250s HTTP/1.1\r\nHost: %s\r\nConnection: " @@ -110,16 +110,16 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha // send the first.. if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) sprintf(buffer, - "%s http://%s:%d%s HTTP/1.1\r\nHost: %s\r\nAuthorization: NTLM " + "%s http://%s%s HTTP/1.1\r\nHost: %s\r\nAuthorization: NTLM " "%s\r\nProxy-Authorization: Basic %s\r\nUser-Agent: Mozilla/4.0 " "(Hydra)\r\n%s\r\n", - type, webtarget, webport, miscptr, webtarget, buf1, proxy_authentication[selected_proxy], header); + type, webtarget, miscptr, webtarget, buf1, proxy_authentication[selected_proxy], header); else { if (use_proxy == 1) sprintf(buffer, - "%s http://%s:%d%s HTTP/1.1\r\nHost: %s\r\nAuthorization: NTLM " + "%s http://%s%s HTTP/1.1\r\nHost: %s\r\nAuthorization: NTLM " "%s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", - type, webtarget, webport, miscptr, webtarget, buf1, header); + type, webtarget, miscptr, webtarget, buf1, header); else sprintf(buffer, "%s %s HTTP/1.1\r\nHost: %s\r\nAuthorization: NTLM " @@ -174,16 +174,16 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha // create the auth response if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) sprintf(buffer, - "%s http://%s:%d%s HTTP/1.1\r\nHost: %s\r\nAuthorization: NTLM " + "%s http://%s%s HTTP/1.1\r\nHost: %s\r\nAuthorization: NTLM " "%s\r\nProxy-Authorization: Basic %s\r\nUser-Agent: Mozilla/4.0 " "(Hydra)\r\n%s\r\n", - type, webtarget, webport, miscptr, webtarget, buf1, proxy_authentication[selected_proxy], header); + type, webtarget, miscptr, webtarget, buf1, proxy_authentication[selected_proxy], header); else { if (use_proxy == 1) sprintf(buffer, - "%s http://%s:%d%s HTTP/1.1\r\nHost: %s\r\nAuthorization: NTLM " + "%s http://%s%s HTTP/1.1\r\nHost: %s\r\nAuthorization: NTLM " "%s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n", - type, webtarget, webport, miscptr, webtarget, buf1, header); + type, webtarget, miscptr, webtarget, buf1, header); else sprintf(buffer, "%s %s HTTP/1.1\r\nHost: %s\r\nAuthorization: NTLM " diff --git a/hydra-rdp.c b/hydra-rdp.c index 6e9c8db..20f665c 100644 --- a/hydra-rdp.c +++ b/hydra-rdp.c @@ -29,6 +29,7 @@ BOOL rdp_connect(char *server, int32_t port, char *domain, char *login, char *pa instance->settings->ServerHostname = server; instance->settings->ServerPort = port; instance->settings->Domain = domain; + instance->settings->MaxTimeInCheckLoop = 100; freerdp_connect(instance); err = freerdp_get_last_error(instance->context); return err; From e11e00740020fb0728d6314b8ad036af0b92f8ec Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Tue, 11 Jan 2022 13:50:47 +0100 Subject: [PATCH 410/531] make strip optional --- Makefile.am | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Makefile.am b/Makefile.am index adfbf64..8cd56d1 100644 --- a/Makefile.am +++ b/Makefile.am @@ -67,7 +67,7 @@ pw-inspector: pw-inspector.c $(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) -c $< $(XDEFINES) $(XIPATHS) strip: all - strip $(BINS) + -strip $(BINS) -echo OK > /dev/null && test -x xhydra && strip xhydra || echo OK > /dev/null install: strip From 02ae72c7e72505144f640db51bb0c4911008ca68 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Wed, 12 Jan 2022 10:14:57 +0100 Subject: [PATCH 411/531] dont exit after find with -C --- CHANGES | 4 +++- hydra.c | 3 ++- 2 files changed, 5 insertions(+), 2 deletions(-) diff --git a/CHANGES b/CHANGES index 1f5d497..208b12f 100644 --- a/CHANGES +++ b/CHANGES @@ -6,9 +6,11 @@ Release 9.3-dev * new module: cobaltstrike by ultimaiiii, thank you! * fix for ssh to support -M or ip/range * fix for rdp to detect empty passwords +* fix for http on non-default ports when using with a proxy * for vnc/cisco/... protocols that only check for a password, skip host after the password is found -* fixe to support IPv6 addresses in -M +* fix to support IPv6 addresses in -M +* fix to test all entries in -C files, not exiting after the first found * added "make uninstall" diff --git a/hydra.c b/hydra.c index 9450847..c154424 100644 --- a/hydra.c +++ b/hydra.c @@ -3316,7 +3316,8 @@ int main(int argc, char *argv[]) { hydra_options.port = port; } - if (hydra_options.login == NULL && hydra_options.loginfile == NULL) + if (hydra_options.login == NULL && hydra_options.loginfile == NULL && + hydra_options.colonfile == NULL) hydra_options.exit_found = 1; if (hydra_options.ssl == 0 && hydra_options.port == 443) From 5a451ba54192cb029600a83afaf0fc3a1730dd50 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Wed, 12 Jan 2022 10:27:58 +0100 Subject: [PATCH 412/531] http-form: no empty headers --- CHANGES | 1 + hydra-http-form.c | 3 +++ 2 files changed, 4 insertions(+) diff --git a/CHANGES b/CHANGES index 208b12f..48374f9 100644 --- a/CHANGES +++ b/CHANGES @@ -6,6 +6,7 @@ Release 9.3-dev * new module: cobaltstrike by ultimaiiii, thank you! * fix for ssh to support -M or ip/range * fix for rdp to detect empty passwords +* fix for http-form to no send empty headers * fix for http on non-default ports when using with a proxy * for vnc/cisco/... protocols that only check for a password, skip host after the password is found diff --git a/hydra-http-form.c b/hydra-http-form.c index f675beb..224bf8d 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -258,6 +258,9 @@ int32_t add_header(ptr_header_node *ptr_head, char *header, char *value, char ty ptr_header_node cur_ptr = NULL; ptr_header_node existing_hdr, new_ptr; + if (!header || !value || !strlen(header) || !strlen(value)) + return; + // get to the last header for (cur_ptr = *ptr_head; cur_ptr && cur_ptr->next; cur_ptr = cur_ptr->next) ; From 1edef892f63f4c2ea3e4c42a68f7b407133ca0ba Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Wed, 19 Jan 2022 13:00:57 +0100 Subject: [PATCH 413/531] fix disappearing targets --- CHANGES | 1 + hydra.c | 13 +++++++++---- 2 files changed, 10 insertions(+), 4 deletions(-) diff --git a/CHANGES b/CHANGES index 48374f9..39940ae 100644 --- a/CHANGES +++ b/CHANGES @@ -12,6 +12,7 @@ Release 9.3-dev after the password is found * fix to support IPv6 addresses in -M * fix to test all entries in -C files, not exiting after the first found +* attempt to make disappearing targets faster to terminate on * added "make uninstall" diff --git a/hydra.c b/hydra.c index c154424..f7d31c3 100644 --- a/hydra.c +++ b/hydra.c @@ -1487,7 +1487,7 @@ void hydra_increase_fail_count(int32_t target_no, int32_t head_no) { hydra_heads[head_no]->current_pass_ptr = empty_login; } if (hydra_targets[target_no]->fail_count >= MAXFAIL + hydra_options.tasks * hydra_targets[target_no]->ok) { - if (hydra_targets[target_no]->done == TARGET_ACTIVE && hydra_options.max_use == hydra_targets[target_no]->failed) { + if (hydra_targets[target_no]->done == TARGET_ACTIVE && hydra_options.max_use <= hydra_targets[target_no]->failed) { if (hydra_targets[target_no]->ok == 1) hydra_targets[target_no]->done = TARGET_ERROR; // mark target as done by errors else @@ -1497,12 +1497,15 @@ void hydra_increase_fail_count(int32_t target_no, int32_t head_no) { "[ERROR] Too many connect errors to target, disabling " "%s://%s%s%s:%d\n", hydra_options.service, hydra_targets[target_no]->ip[0] == 16 && strchr(hydra_targets[target_no]->target, ':') != NULL ? "[" : "", hydra_targets[target_no]->target, hydra_targets[target_no]->ip[0] == 16 && strchr(hydra_targets[target_no]->target, ':') != NULL ? "]" : "", hydra_targets[target_no]->port); + } else { + hydra_targets[target_no]->failed++; } - if (hydra_brains.targets > hydra_brains.finished) + if (hydra_brains.targets <= hydra_brains.finished) hydra_kill_head(head_no, 1, 0); else hydra_kill_head(head_no, 1, 2); - } // we keep the last one alive as long as it make sense + } + // we keep the last one alive as long as it make sense } else { // we need to put this in a list, otherwise we fail one login+pw test if (hydra_targets[target_no]->done == TARGET_ACTIVE && hydra_options.skip_redo == 0 && hydra_targets[target_no]->redo <= hydra_options.max_use * 2 && ((hydra_heads[head_no]->current_login_ptr != empty_login && hydra_heads[head_no]->current_pass_ptr != empty_login) || (hydra_heads[head_no]->current_login_ptr != NULL && hydra_heads[head_no]->current_pass_ptr != NULL))) { @@ -1517,12 +1520,14 @@ void hydra_increase_fail_count(int32_t target_no, int32_t head_no) { hydra_heads[head_no]->current_login_ptr = empty_login; hydra_heads[head_no]->current_pass_ptr = empty_login; } +/* hydra_targets[target_no]->fail_count--; if (k < 5 && hydra_targets[target_no]->ok) hydra_targets[target_no]->fail_count--; if (k == 2 && hydra_targets[target_no]->ok) hydra_targets[target_no]->fail_count--; - if (hydra_brains.targets > hydra_brains.finished) +*/ + if (hydra_brains.targets <= hydra_brains.finished) hydra_kill_head(head_no, 1, 0); else { hydra_kill_head(head_no, 1, 2); From 6d5fa802a246be1afcd5a34f43cb5f9b42211705 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Sun, 23 Jan 2022 16:33:22 +0100 Subject: [PATCH 414/531] citation --- CITATION.cff | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) create mode 100644 CITATION.cff diff --git a/CITATION.cff b/CITATION.cff new file mode 100644 index 0000000..3ed8ae2 --- /dev/null +++ b/CITATION.cff @@ -0,0 +1,20 @@ +cff-version: 1.2.0 +message: "If you use this software, please cite it as below." +authors: + - given-names: Heuse + family-names: Marc + name-particle: van Hauser + email: vh@thc.org + affiliation: The Hacker's Choice +title: "hydra" +version: 9.2 +type: software +date-released: 2021-03-15 +url: "https://github.com/vanhauser-thc/thc-hydra" +keywords: + - scanning + - passwords + - hacking + - pentesting + - securiy +license: AGPL-3.0-or-later From e9140e5434f29bb08a710ba1ff02ac94b982844c Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Sun, 23 Jan 2022 19:33:28 +0100 Subject: [PATCH 415/531] fix --- CITATION.cff | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/CITATION.cff b/CITATION.cff index 3ed8ae2..3b450d3 100644 --- a/CITATION.cff +++ b/CITATION.cff @@ -1,9 +1,9 @@ cff-version: 1.2.0 message: "If you use this software, please cite it as below." authors: - - given-names: Heuse - family-names: Marc - name-particle: van Hauser + - given-names: Marc + family-names: Heuse + name-particle: "van Hauser" email: vh@thc.org affiliation: The Hacker's Choice title: "hydra" From e40b0dc252b36a1cdd240b169672fcfb6a2686b8 Mon Sep 17 00:00:00 2001 From: Dan Bungert Date: Mon, 31 Jan 2022 14:41:32 -0700 Subject: [PATCH 416/531] configure: openssl / memcached build fix On Debian/Ubuntu, compilation against openssl 3.0 causes a failure to find INT_MAX, despite the openssl headers including limits.h. However, the fact that the libmemcached-dev package provides both /usr/include/libmemcached{,-1.0} directories, both of which contain memcached.h, mean that MCACHED_IPATH ends up set to the libmemcached-1.0 one, which contains a limits.h, which shadows /usr/include/limits.h. Don't do that. --- configure | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/configure b/configure index 8ad8af2..1cde2f1 100755 --- a/configure +++ b/configure @@ -998,11 +998,9 @@ echo "Checking for Memcached (libmemcached/memcached.h) ..." if [ "X" = "X$MCACHED_IPATH" ]; then if [ -f "$i/memcached.h" ]; then MCACHED_IPATH="$i" - fi - if [ -f "$i/libmemcached/memcached.h" ]; then + elif [ -f "$i/libmemcached/memcached.h" ]; then MCACHED_IPATH="$i/libmemcached" - fi - if [ -f "$i/libmemcached-1.0/memcached.h" ]; then + elif [ -f "$i/libmemcached-1.0/memcached.h" ]; then MCACHED_IPATH="$i/libmemcached-1.0" fi fi From 9cf065f06e6eccf9429c0224c3fe3ce34a87aae4 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Thu, 3 Feb 2022 10:32:20 +0100 Subject: [PATCH 417/531] error exit, restore write fix --- hydra.c | 1 + 1 file changed, 1 insertion(+) diff --git a/hydra.c b/hydra.c index f7d31c3..c31cc60 100644 --- a/hydra.c +++ b/hydra.c @@ -4390,6 +4390,7 @@ int main(int argc, char *argv[]) { strncat(json_error, tmp_str, STRMAX); strncat(json_error, "\"", STRMAX); error = 1; + hydra_restore_write(1); } // yeah we did it printf("%s (%s) finished at %s\n", PROGRAM, RESOURCE, hydra_build_time()); From 58b8ede906f1923e872f4fecd4723078bf0ef38a Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Thu, 3 Feb 2022 10:34:26 +0100 Subject: [PATCH 418/531] 9.3 release --- CHANGES | 4 ++-- hydra.c | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/CHANGES b/CHANGES index 39940ae..32b0db1 100644 --- a/CHANGES +++ b/CHANGES @@ -1,7 +1,7 @@ Changelog for hydra ------------------- -Release 9.3-dev +Release 9.3 * support Xcode compilation * new module: cobaltstrike by ultimaiiii, thank you! * fix for ssh to support -M or ip/range @@ -12,7 +12,7 @@ Release 9.3-dev after the password is found * fix to support IPv6 addresses in -M * fix to test all entries in -C files, not exiting after the first found -* attempt to make disappearing targets faster to terminate on +* make disappearing targets faster to terminate on * added "make uninstall" diff --git a/hydra.c b/hydra.c index c31cc60..b0e5cab 100644 --- a/hydra.c +++ b/hydra.c @@ -228,7 +228,7 @@ char *SERVICES = "adam6500 asterisk afp cisco cisco-enable cobaltstrike cvs fire #define RESTOREFILE "./hydra.restore" #define PROGRAM "Hydra" -#define VERSION "v9.3-dev" +#define VERSION "v9.3" #define AUTHOR "van Hauser/THC" #define EMAIL "" #define AUTHOR2 "David Maciejak" From 9ac9f7010ec430c3c853d2a42915d07bea7b2104 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Thu, 3 Feb 2022 10:36:43 +0100 Subject: [PATCH 419/531] v9.4-dev init --- CHANGES | 4 ++++ hydra.c | 2 +- 2 files changed, 5 insertions(+), 1 deletion(-) diff --git a/CHANGES b/CHANGES index 32b0db1..796f664 100644 --- a/CHANGES +++ b/CHANGES @@ -1,6 +1,10 @@ Changelog for hydra ------------------- +Release 9.4-dev + * your patch? + + Release 9.3 * support Xcode compilation * new module: cobaltstrike by ultimaiiii, thank you! diff --git a/hydra.c b/hydra.c index b0e5cab..ed528f4 100644 --- a/hydra.c +++ b/hydra.c @@ -228,7 +228,7 @@ char *SERVICES = "adam6500 asterisk afp cisco cisco-enable cobaltstrike cvs fire #define RESTOREFILE "./hydra.restore" #define PROGRAM "Hydra" -#define VERSION "v9.3" +#define VERSION "v9.4-dev" #define AUTHOR "van Hauser/THC" #define EMAIL "" #define AUTHOR2 "David Maciejak" From e5996654ed48b385bc7f842d84d8b2ba72d29be1 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Sun, 6 Feb 2022 11:59:08 +0100 Subject: [PATCH 420/531] fix return --- hydra-http-form.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 224bf8d..2fc6d60 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -259,7 +259,7 @@ int32_t add_header(ptr_header_node *ptr_head, char *header, char *value, char ty ptr_header_node existing_hdr, new_ptr; if (!header || !value || !strlen(header) || !strlen(value)) - return; + return 0; // get to the last header for (cur_ptr = *ptr_head; cur_ptr && cur_ptr->next; cur_ptr = cur_ptr->next) From 280988bfe6bfb8fb3de5a4c3b3794654da960c46 Mon Sep 17 00:00:00 2001 From: Yisus7u7 Date: Fri, 11 Feb 2022 11:23:24 -0500 Subject: [PATCH 421/531] hydra-gtk: add support for termux path --- hydra-gtk/src/main.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/hydra-gtk/src/main.c b/hydra-gtk/src/main.c index 72d6dd7..b713e6f 100644 --- a/hydra-gtk/src/main.c +++ b/hydra-gtk/src/main.c @@ -17,6 +17,8 @@ char *hydra_path1 = "./hydra"; char *hydra_path2 = "/usr/local/bin/hydra"; char *hydra_path3 = "/usr/bin/hydra"; +char *hydra_path4 = "/data/data/com.termux/files/usr/bin/hydra"; +char *hydra_path5 = "/data/data/com.termux/files/usr/local/bin/hydra"; GtkWidget *wndMain; char *HYDRA_BIN; @@ -53,6 +55,10 @@ int main(int argc, char *argv[]) { HYDRA_BIN = hydra_path2; } else if (g_file_test(hydra_path3, G_FILE_TEST_IS_EXECUTABLE)) { HYDRA_BIN = hydra_path3; + } else if (g_file_test(hydra_path4, G_FILE_TEST_IS_EXECUTABLE)) { + HYDRA_BIN = hydra_path4; + } else if (g_file_test(hydra_path5, G_FILE_TEST_IS_EXECUTABLE)) { + HYDRA_BIN = hydra_path5; } else { g_error("Please tell me where hydra is, use --hydra-path\n"); return -1; From 330e910a02dbd9aa165c077796ae1cff10f0ff99 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Mon, 21 Feb 2022 14:18:29 +0100 Subject: [PATCH 422/531] try redo fix --- hydra.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/hydra.c b/hydra.c index ed528f4..6afdf48 100644 --- a/hydra.c +++ b/hydra.c @@ -1597,7 +1597,7 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { snp_is_redo = 0; snpdont = 0; loop_cnt++; - if (hydra_heads[head_no]->redo && hydra_heads[head_no]->current_login_ptr != NULL && hydra_heads[head_no]->current_pass_ptr != NULL) { + if (hydra_heads[head_no]->redo == 1 && hydra_heads[head_no]->current_login_ptr != NULL && hydra_heads[head_no]->current_pass_ptr != NULL) { hydra_heads[head_no]->redo = 0; snp_is_redo = 1; snpdone = 1; @@ -1629,7 +1629,7 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { return -1; } - if (hydra_heads[head_no]->redo && hydra_heads[head_no]->current_login_ptr != NULL && hydra_heads[head_no]->current_pass_ptr != NULL) { + if (hydra_heads[head_no]->redo == 1 && hydra_heads[head_no]->current_login_ptr != NULL && hydra_heads[head_no]->current_pass_ptr != NULL) { hydra_heads[head_no]->redo = 0; snp_is_redo = 1; snpdone = 1; @@ -1638,7 +1638,7 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { printf("[COMPLETED] target %s - login \"%s\" - pass \"%s\" - child %d - " "%" hPRIu64 " of %" hPRIu64 "\n", hydra_targets[target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, head_no, hydra_targets[target_no]->sent, hydra_brains.todo + hydra_targets[target_no]->redo); - hydra_heads[head_no]->redo = 0; + //hydra_heads[head_no]->redo = 0; if (hydra_targets[target_no]->redo_state > 0) { if (hydra_targets[target_no]->redo_state <= hydra_targets[target_no]->redo) { hydra_heads[head_no]->current_pass_ptr = hydra_targets[target_no]->redo_pass[hydra_targets[target_no]->redo_state - 1]; From c82e5d51c5595374e6b7801bfc84c26a497d8989 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Tue, 1 Mar 2022 14:56:05 +0100 Subject: [PATCH 423/531] switch to pcre2 --- CHANGES | 2 +- configure | 18 +++++++++--------- hydra-mod.c | 21 +++++++++++++-------- 3 files changed, 23 insertions(+), 18 deletions(-) diff --git a/CHANGES b/CHANGES index 796f664..869fb68 100644 --- a/CHANGES +++ b/CHANGES @@ -2,7 +2,7 @@ Changelog for hydra ------------------- Release 9.4-dev - * your patch? +* Switched from pcre/pcre3 to pcre2 as pcre/pcre3 will be dropped from Debian Release 9.3 diff --git a/configure b/configure index 1cde2f1..d9c8b02 100755 --- a/configure +++ b/configure @@ -380,21 +380,21 @@ if [ "X" = "X$CURSES_PATH" -o "X" = "X$CURSES_IPATH" ]; then CURSES_IPATH="" fi -echo "Checking for pcre (libpcre/pcre.h) ..." +echo "Checking for pcre2 (libpcre/pcre.h) ..." for i in $LIBDIRS ; do if [ "X" = "X$PCRE_PATH" ]; then - if [ -f "$i/libpcre.so" -o -f "$i/libpcre.dylib" -o -f "$i/libpcre.a" ]; then + if [ -f "$i/libpcre2-8.so" -o -f "$i/libpcre2-8.dylib" -o -f "$i/libpcre2-8.a" ]; then PCRE_PATH="$i" fi fi if [ "X" = "X$PCRE_PATH" ]; then - TMP_LIB=`/bin/ls $i/libpcre.so* 2> /dev/null | grep libpcre.` + TMP_LIB=`/bin/ls $i/libpcre2*.so* 2> /dev/null | grep libpcre.` if [ -n "$TMP_LIB" ]; then PCRE_PATH="$i" fi fi if [ "X" = "X$PCRE_PATH" ]; then - TMP_LIB=`/bin/ls $i/libpcre.dll* 2> /dev/null | grep libpcre.` + TMP_LIB=`/bin/ls $i/libpcre2*.dll* 2> /dev/null | grep libpcre.` if [ -n "$TMP_LIB" ]; then PCRE_PATH="$i" fi @@ -402,20 +402,20 @@ for i in $LIBDIRS ; do done for i in $INCDIRS ; do if [ "X" != "X$PCRE_PATH" ]; then - if [ -f "$i/pcre.h" ]; then + if [ -f "$i/pcre2.h" ]; then PCRE_IPATH="$i" fi fi done if [ "X" != "X$DEBUG" ]; then echo DEBUG: PCRE_PATH=$PCRE_PATH/libpcre - echo DEBUG: PCRE_IPATH=$PCRE_IPATH/pcre.h + echo DEBUG: PCRE_IPATH=$PCRE_IPATH/pcre2.h fi if [ -n "$PCRE_PATH" -a -n "$PCRE_IPATH" ]; then - echo " ... found" + echo " ... found" fi if [ "X" = "X$PCRE_PATH" -o "X" = "X$PCRE_IPATH" ]; then - echo " ... NOT found, server response checks will be less reliable" + echo " ... NOT found, server response checks will be less reliable" PCRE_PATH="" PCRE_IPATH="" fi @@ -1649,7 +1649,7 @@ if [ -n "$IDN_PATH" ]; then XLIBS="$XLIBS -lidn" fi if [ -n "$PCRE_PATH" ]; then - XLIBS="$XLIBS -lpcre" + XLIBS="$XLIBS -lpcre2-8" fi if [ -n "$MYSQL_PATH" ]; then XLIBS="$XLIBS -lmysqlclient" diff --git a/hydra-mod.c b/hydra-mod.c index 4d34b2a..a24889b 100644 --- a/hydra-mod.c +++ b/hydra-mod.c @@ -7,7 +7,8 @@ #include #endif #ifdef HAVE_PCRE -#include +#define PCRE2_CODE_UNIT_WIDTH 8 +#include #endif #define MAX_CONNECT_RETRY 1 @@ -1291,19 +1292,23 @@ void hydra_set_srcport(int32_t port) { src_port = port; } #ifdef HAVE_PCRE int32_t hydra_string_match(char *str, const char *regex) { - pcre *re = NULL; - int32_t offset_error = 0; - const char *error = NULL; + pcre2_code *re = NULL; + int32_t error_code = 0; + PCRE2_SIZE error_offset; int32_t rc = 0; - re = pcre_compile(regex, PCRE_CASELESS | PCRE_DOTALL, &error, &offset_error, NULL); + re = pcre2_compile(regex, PCRE2_ZERO_TERMINATED, PCRE2_CASELESS | PCRE2_DOTALL, &error_code, &error_offset, NULL); if (re == NULL) { - fprintf(stderr, "[ERROR] PCRE compilation failed at offset %d: %s\n", offset_error, error); + fprintf(stderr, "[ERROR] PCRE compilation failed at offset %d: %d\n", error_offset, error_code); return 0; } - rc = pcre_exec(re, NULL, str, strlen(str), 0, 0, NULL, 0); - if (rc >= 0) { + pcre2_match_data *match_data = pcre2_match_data_create_from_pattern(re, NULL); + rc = pcre2_match(re, str, PCRE2_ZERO_TERMINATED, 0, 0, match_data, NULL); + pcre2_match_data_free(match_data); + pcre2_code_free(re); + + if (rc >= 1) { return 1; } return 0; From 59b96af73454d659621b5344a64944bcb90a7ff1 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Thu, 17 Mar 2022 11:25:14 +0100 Subject: [PATCH 424/531] rtsp fix --- CHANGES | 1 + Makefile | 108 +++++++++++++++++++++++++++++++++++++++++++++++++-- hydra-rtsp.c | 55 ++++++++++++-------------- 3 files changed, 131 insertions(+), 33 deletions(-) diff --git a/CHANGES b/CHANGES index 869fb68..1e229ab 100644 --- a/CHANGES +++ b/CHANGES @@ -3,6 +3,7 @@ Changelog for hydra Release 9.4-dev * Switched from pcre/pcre3 to pcre2 as pcre/pcre3 will be dropped from Debian +* Small fix for weird RTSP servers Release 9.3 diff --git a/Makefile b/Makefile index 0fc0d2e..a8c13f5 100644 --- a/Makefile +++ b/Makefile @@ -1,8 +1,110 @@ -all: - @echo Error: you must run "./configure" first +STRIP=strip +XDEFINES= -DLIBOPENSSL -DLIBNCURSES -DLIBFIREBIRD -DLIBIDN -DHAVE_PR29_H -DHAVE_PCRE -DLIBPOSTGRES -DLIBSVN -DLIBSSH -DHAVE_ZLIB -DLIBMCACHED -DLIBFREERDP -DLIBWINPR2 -DHAVE_MATH_H -DHAVE_SYS_PARAM_H +XLIBS= -lz -lcurses -lssl -lfbclient -lidn -lpcre2-8 -lpq -lsvn_client-1 -lapr-1 -laprutil-1 -lsvn_subr-1 -lssh -lcrypto -lmemcached -lfreerdp2 -lwinpr2 +XLIBPATHS=-L/usr/lib -L/usr/local/lib -L/lib -L/lib/x86_64-linux-gnu +XIPATHS= -I/usr/include -I/usr/include -I/usr/include -I/usr/include -I/usr/include/postgresql -I/usr/include -I/usr/include/subversion-1 -I/usr/include/apr-1.0 -I/usr/include/subversion-1 -I/usr/include/libmemcached -I/usr/include/freerdp2 -I/usr/include/winpr2 +PREFIX=/usr/local +XHYDRA_SUPPORT=xhydra +STRIP=strip + +HYDRA_LOGO= +PWI_LOGO= +SEC=-pie -fPIE -fstack-protector-all --param ssp-buffer-size=4 -D_FORTIFY_SOURCE=2 -Wl,-z,now -Wl,-z,relro -Wl,--allow-multiple-definition + +# +# Makefile for Hydra - (c) 2001-2022 by van Hauser / THC +# +WARN_CLANG=-Wformat-nonliteral -Wstrncat-size -Wformat-security -Wsign-conversion -Wconversion -Wfloat-conversion -Wshorten-64-to-32 -Wuninitialized -Wmissing-variable-declarations -Wmissing-declarations +WARN_GCC=-Wformat=2 -Wformat-overflow=2 -Wformat-nonliteral -Wformat-truncation=2 -Wnull-dereference -Wstrict-overflow=2 -Wstringop-overflow=4 -Walloca-larger-than=4096 -Wtype-limits -Wconversion -Wtrampolines -Wstrict-prototypes -Wmissing-prototypes -Wmissing-declarations -fno-common -Wcast-align +CFLAGS ?= -g +OPTS=-I. -O3 $(CFLAGS) -fcommon +# -Wall -g -pedantic +LIBS=-lm +DESTDIR ?= +BINDIR = /bin +MANDIR = /man/man1/ +DATADIR = /etc +PIXDIR = /share/pixmaps +APPDIR = /share/applications + +SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ + hydra-telnet.c hydra-cisco.c hydra-http.c hydra-ftp.c hydra-imap.c \ + hydra-pop3.c hydra-smb.c hydra-icq.c hydra-cisco-enable.c hydra-ldap.c \ + hydra-memcached.c hydra-mongodb.c hydra-mysql.c hydra-mssql.c hydra-xmpp.c \ + hydra-http-proxy-urlenum.c hydra-snmp.c hydra-cvs.c hydra-smtp.c \ + hydra-smtp-enum.c hydra-sapr3.c hydra-ssh.c hydra-sshkey.c hydra-teamspeak.c \ + hydra-postgres.c hydra-rsh.c hydra-rlogin.c hydra-oracle-listener.c \ + hydra-svn.c hydra-pcanywhere.c hydra-sip.c hydra-oracle.c hydra-vmauthd.c \ + hydra-asterisk.c hydra-firebird.c hydra-afp.c hydra-ncp.c hydra-rdp.c \ + hydra-oracle-sid.c hydra-http-proxy.c hydra-http-form.c hydra-irc.c \ + hydra-s7-300.c hydra-redis.c hydra-adam6500.c hydra-rtsp.c \ + hydra-rpcap.c hydra-radmin2.c hydra-cobaltstrike.c \ + hydra-time.c crc32.c d3des.c bfg.c ntlm.c sasl.c hmacmd5.c hydra-mod.c \ + hydra-smb2.c +OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ + hydra-telnet.o hydra-cisco.o hydra-http.o hydra-ftp.o hydra-imap.o \ + hydra-pop3.o hydra-smb.o hydra-icq.o hydra-cisco-enable.o hydra-ldap.o \ + hydra-memcached.o hydra-mongodb.o hydra-mysql.o hydra-mssql.o hydra-cobaltstrike.o hydra-xmpp.o \ + hydra-http-proxy-urlenum.o hydra-snmp.o hydra-cvs.o hydra-smtp.o \ + hydra-smtp-enum.o hydra-sapr3.o hydra-ssh.o hydra-sshkey.o hydra-teamspeak.o \ + hydra-postgres.o hydra-rsh.o hydra-rlogin.o hydra-oracle-listener.o \ + hydra-svn.o hydra-pcanywhere.o hydra-sip.o hydra-oracle-sid.o hydra-oracle.o \ + hydra-vmauthd.o hydra-asterisk.o hydra-firebird.o hydra-afp.o \ + hydra-ncp.o hydra-http-proxy.o hydra-http-form.o hydra-irc.o \ + hydra-redis.o hydra-rdp.o hydra-s7-300.c hydra-adam6500.o hydra-rtsp.o \ + hydra-rpcap.o hydra-radmin2.o \ + crc32.o d3des.o bfg.o ntlm.o sasl.o hmacmd5.o hydra-mod.o hydra-time.o \ + hydra-smb2.o +BINS = hydra pw-inspector + +EXTRA_DIST = README README.arm README.palm CHANGES TODO INSTALL LICENSE \ + hydra-mod.h hydra.h crc32.h d3des.h + +all: pw-inspector hydra $(XHYDRA_SUPPORT) + @echo + @echo Now type "make install" + +hydra: hydra.c $(OBJ) + $(CC) $(OPTS) $(SEC) $(LIBS) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o hydra $(HYDRA_LOGO) hydra.c $(OBJ) $(LIBS) $(XLIBS) $(XLIBPATHS) $(XIPATHS) $(XDEFINES) + @echo + @echo If men could get pregnant, abortion would be a sacrament + @echo + +xhydra: + -cd hydra-gtk && sh ./make_xhydra.sh + +pw-inspector: pw-inspector.c + -$(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o pw-inspector $(PWI_LOGO) pw-inspector.c + +.c.o: + $(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) -c $< $(XDEFINES) $(XIPATHS) + +strip: all + -strip $(BINS) + -echo OK > /dev/null && test -x xhydra && strip xhydra || echo OK > /dev/null + +install: strip + -mkdir -p $(DESTDIR)$(PREFIX)$(BINDIR) + cp -f hydra-wizard.sh $(BINS) $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 hydra-wizard.sh $(BINS) + -echo OK > /dev/null && test -x xhydra && cp xhydra $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 xhydra || echo OK > /dev/null + -sed -e "s|^INSTALLDIR=.*|INSTALLDIR="$(PREFIX)"|" dpl4hydra.sh | sed -e "s|^LOCATION=.*|LOCATION="$(DATADIR)"|" > $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh + -chmod 755 $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh + -mkdir -p $(DESTDIR)$(PREFIX)$(DATADIR) + -cp -f *.csv $(DESTDIR)$(PREFIX)$(DATADIR) + -mkdir -p $(DESTDIR)$(PREFIX)$(MANDIR) + -cp -f hydra.1 xhydra.1 pw-inspector.1 $(DESTDIR)$(PREFIX)$(MANDIR) + -mkdir -p $(DESTDIR)$(PREFIX)$(PIXDIR) + -cp -f xhydra.png $(DESTDIR)$(PREFIX)$(PIXDIR)/ + -mkdir -p $(DESTDIR)$(PREFIX)$(APPDIR) + -desktop-file-install --dir $(DESTDIR)$(PREFIX)$(APPDIR) xhydra.desktop clean: + rm -rf xhydra pw-inspector hydra *.o core *.core *.stackdump *~ Makefile.in Makefile dev_rfc hydra.restore arm/*.ipk arm/ipkg/usr/bin/* hydra-gtk/src/*.o hydra-gtk/src/xhydra hydra-gtk/stamp-h hydra-gtk/config.status hydra-gtk/errors hydra-gtk/config.log hydra-gtk/src/.deps hydra-gtk/src/Makefile hydra-gtk/Makefile cp -f Makefile.orig Makefile uninstall: - @echo Error: you must run "./configure" first + -rm -f $(DESTDIR)$(PREFIX)$(BINDIR)/xhydra $(DESTDIR)$(PREFIX)$(BINDIR)/hydra $(DESTDIR)$(PREFIX)$(BINDIR)/pw-inspector $(DESTDIR)$(PREFIX)$(BINDIR)/hydra-wizard.sh $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh + -rm -f $(DESTDIR)$(PREFIX)$(DATADIR)/dpl4hydra_full.csv $(DESTDIR)$(PREFIX)$(DATADIR)/dpl4hydra_local.csv + -rm -f $(DESTDIR)$(PREFIX)$(MANDIR)/hydra.1 $(DESTDIR)$(PREFIX)$(MANDIR)/xhydra.1 $(DESTDIR)$(PREFIX)$(MANDIR)/pw-inspector.1 + -rm -f $(DESTDIR)$(PREFIX)$(PIXDIR)/xhydra.png + -rm -f $(DESTDIR)$(PREFIX)$(APPDIR)/xhydra.desktop diff --git a/hydra-rtsp.c b/hydra-rtsp.c index 1bc6f4d..436a0be 100644 --- a/hydra-rtsp.c +++ b/hydra-rtsp.c @@ -104,42 +104,37 @@ int32_t start_rtsp(int32_t s, char *ip, int32_t port, unsigned char options, cha } else { create_core_packet(1, ip, port); - if (use_Basic_Auth(lresp) == 1) { + if (use_Digest_Auth(lresp) == 1) { + char aux[500] = "", dbuf[500] = "", *result = NULL; + char *pbuffer = hydra_strcasestr(lresp, "WWW-Authenticate: Digest "); + + strncpy(aux, pbuffer + strlen("WWW-Authenticate: Digest "), sizeof(aux)); + aux[sizeof(aux) - 1] = '\0'; + free(lresp); +#ifdef LIBOPENSSL + result = sasl_digest_md5(dbuf, login, pass, aux, miscptr, "rtsp", hydra_address2string(ip), port, ""); +#else + hydra_report(stderr, "[ERROR] Digest auth required but compiled " + "without OpenSSL/MD5 support\n"); + return 3; +#endif + if (result == NULL) { + hydra_report(stderr, "[ERROR] digest generation failed\n"); + return 3; + } + sprintf(buffer, "%.500sAuthorization: Digest %.500s\r\n\r\n", packet2, dbuf); + if (debug) + hydra_report(stderr, "C:%s\n", buffer); + } else if (use_Basic_Auth(lresp) == 1) { free(lresp); sprintf(buffer2, "%.249s:%.249s", login, pass); hydra_tobase64((unsigned char *)buffer2, strlen(buffer2), sizeof(buffer2)); - sprintf(buffer, "%.500sAuthorization: : Basic %.500s\r\n\r\n", packet2, buffer2); - - if (debug) { + if (debug) hydra_report(stderr, "C:%s\n", buffer); - } } else { - if (use_Digest_Auth(lresp) == 1) { - char aux[500] = "", dbuf[500] = "", *result = NULL; - char *pbuffer = hydra_strcasestr(lresp, "WWW-Authenticate: Digest "); - - strncpy(aux, pbuffer + strlen("WWW-Authenticate: Digest "), sizeof(aux)); - aux[sizeof(aux) - 1] = '\0'; - free(lresp); -#ifdef LIBOPENSSL - result = sasl_digest_md5(dbuf, login, pass, aux, miscptr, "rtsp", hydra_address2string(ip), port, ""); -#else - hydra_report(stderr, "[ERROR] Digest auth required but compiled " - "without OpenSSL/MD5 support\n"); - return 3; -#endif - - if (result == NULL) { - hydra_report(stderr, "[ERROR] digest generation failed\n"); - return 3; - } - sprintf(buffer, "%.500sAuthorization: Digest %.500s\r\n\r\n", packet2, dbuf); - - if (debug) { - hydra_report(stderr, "C:%s\n", buffer); - } - } + hydra_report(stderr, "[ERROR] unknown authentication protocol\n"); + return 1; } if (strlen(buffer) == 0) { From 7dfedbb43aac31343f0eaad8d37d081ddcfac9eb Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Thu, 17 Mar 2022 11:25:22 +0100 Subject: [PATCH 425/531] rtsp fix --- Makefile | 108 ++----------------------------------------------------- 1 file changed, 3 insertions(+), 105 deletions(-) diff --git a/Makefile b/Makefile index a8c13f5..0fc0d2e 100644 --- a/Makefile +++ b/Makefile @@ -1,110 +1,8 @@ -STRIP=strip -XDEFINES= -DLIBOPENSSL -DLIBNCURSES -DLIBFIREBIRD -DLIBIDN -DHAVE_PR29_H -DHAVE_PCRE -DLIBPOSTGRES -DLIBSVN -DLIBSSH -DHAVE_ZLIB -DLIBMCACHED -DLIBFREERDP -DLIBWINPR2 -DHAVE_MATH_H -DHAVE_SYS_PARAM_H -XLIBS= -lz -lcurses -lssl -lfbclient -lidn -lpcre2-8 -lpq -lsvn_client-1 -lapr-1 -laprutil-1 -lsvn_subr-1 -lssh -lcrypto -lmemcached -lfreerdp2 -lwinpr2 -XLIBPATHS=-L/usr/lib -L/usr/local/lib -L/lib -L/lib/x86_64-linux-gnu -XIPATHS= -I/usr/include -I/usr/include -I/usr/include -I/usr/include -I/usr/include/postgresql -I/usr/include -I/usr/include/subversion-1 -I/usr/include/apr-1.0 -I/usr/include/subversion-1 -I/usr/include/libmemcached -I/usr/include/freerdp2 -I/usr/include/winpr2 -PREFIX=/usr/local -XHYDRA_SUPPORT=xhydra -STRIP=strip - -HYDRA_LOGO= -PWI_LOGO= -SEC=-pie -fPIE -fstack-protector-all --param ssp-buffer-size=4 -D_FORTIFY_SOURCE=2 -Wl,-z,now -Wl,-z,relro -Wl,--allow-multiple-definition - -# -# Makefile for Hydra - (c) 2001-2022 by van Hauser / THC -# -WARN_CLANG=-Wformat-nonliteral -Wstrncat-size -Wformat-security -Wsign-conversion -Wconversion -Wfloat-conversion -Wshorten-64-to-32 -Wuninitialized -Wmissing-variable-declarations -Wmissing-declarations -WARN_GCC=-Wformat=2 -Wformat-overflow=2 -Wformat-nonliteral -Wformat-truncation=2 -Wnull-dereference -Wstrict-overflow=2 -Wstringop-overflow=4 -Walloca-larger-than=4096 -Wtype-limits -Wconversion -Wtrampolines -Wstrict-prototypes -Wmissing-prototypes -Wmissing-declarations -fno-common -Wcast-align -CFLAGS ?= -g -OPTS=-I. -O3 $(CFLAGS) -fcommon -# -Wall -g -pedantic -LIBS=-lm -DESTDIR ?= -BINDIR = /bin -MANDIR = /man/man1/ -DATADIR = /etc -PIXDIR = /share/pixmaps -APPDIR = /share/applications - -SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ - hydra-telnet.c hydra-cisco.c hydra-http.c hydra-ftp.c hydra-imap.c \ - hydra-pop3.c hydra-smb.c hydra-icq.c hydra-cisco-enable.c hydra-ldap.c \ - hydra-memcached.c hydra-mongodb.c hydra-mysql.c hydra-mssql.c hydra-xmpp.c \ - hydra-http-proxy-urlenum.c hydra-snmp.c hydra-cvs.c hydra-smtp.c \ - hydra-smtp-enum.c hydra-sapr3.c hydra-ssh.c hydra-sshkey.c hydra-teamspeak.c \ - hydra-postgres.c hydra-rsh.c hydra-rlogin.c hydra-oracle-listener.c \ - hydra-svn.c hydra-pcanywhere.c hydra-sip.c hydra-oracle.c hydra-vmauthd.c \ - hydra-asterisk.c hydra-firebird.c hydra-afp.c hydra-ncp.c hydra-rdp.c \ - hydra-oracle-sid.c hydra-http-proxy.c hydra-http-form.c hydra-irc.c \ - hydra-s7-300.c hydra-redis.c hydra-adam6500.c hydra-rtsp.c \ - hydra-rpcap.c hydra-radmin2.c hydra-cobaltstrike.c \ - hydra-time.c crc32.c d3des.c bfg.c ntlm.c sasl.c hmacmd5.c hydra-mod.c \ - hydra-smb2.c -OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ - hydra-telnet.o hydra-cisco.o hydra-http.o hydra-ftp.o hydra-imap.o \ - hydra-pop3.o hydra-smb.o hydra-icq.o hydra-cisco-enable.o hydra-ldap.o \ - hydra-memcached.o hydra-mongodb.o hydra-mysql.o hydra-mssql.o hydra-cobaltstrike.o hydra-xmpp.o \ - hydra-http-proxy-urlenum.o hydra-snmp.o hydra-cvs.o hydra-smtp.o \ - hydra-smtp-enum.o hydra-sapr3.o hydra-ssh.o hydra-sshkey.o hydra-teamspeak.o \ - hydra-postgres.o hydra-rsh.o hydra-rlogin.o hydra-oracle-listener.o \ - hydra-svn.o hydra-pcanywhere.o hydra-sip.o hydra-oracle-sid.o hydra-oracle.o \ - hydra-vmauthd.o hydra-asterisk.o hydra-firebird.o hydra-afp.o \ - hydra-ncp.o hydra-http-proxy.o hydra-http-form.o hydra-irc.o \ - hydra-redis.o hydra-rdp.o hydra-s7-300.c hydra-adam6500.o hydra-rtsp.o \ - hydra-rpcap.o hydra-radmin2.o \ - crc32.o d3des.o bfg.o ntlm.o sasl.o hmacmd5.o hydra-mod.o hydra-time.o \ - hydra-smb2.o -BINS = hydra pw-inspector - -EXTRA_DIST = README README.arm README.palm CHANGES TODO INSTALL LICENSE \ - hydra-mod.h hydra.h crc32.h d3des.h - -all: pw-inspector hydra $(XHYDRA_SUPPORT) - @echo - @echo Now type "make install" - -hydra: hydra.c $(OBJ) - $(CC) $(OPTS) $(SEC) $(LIBS) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o hydra $(HYDRA_LOGO) hydra.c $(OBJ) $(LIBS) $(XLIBS) $(XLIBPATHS) $(XIPATHS) $(XDEFINES) - @echo - @echo If men could get pregnant, abortion would be a sacrament - @echo - -xhydra: - -cd hydra-gtk && sh ./make_xhydra.sh - -pw-inspector: pw-inspector.c - -$(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o pw-inspector $(PWI_LOGO) pw-inspector.c - -.c.o: - $(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) -c $< $(XDEFINES) $(XIPATHS) - -strip: all - -strip $(BINS) - -echo OK > /dev/null && test -x xhydra && strip xhydra || echo OK > /dev/null - -install: strip - -mkdir -p $(DESTDIR)$(PREFIX)$(BINDIR) - cp -f hydra-wizard.sh $(BINS) $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 hydra-wizard.sh $(BINS) - -echo OK > /dev/null && test -x xhydra && cp xhydra $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 xhydra || echo OK > /dev/null - -sed -e "s|^INSTALLDIR=.*|INSTALLDIR="$(PREFIX)"|" dpl4hydra.sh | sed -e "s|^LOCATION=.*|LOCATION="$(DATADIR)"|" > $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh - -chmod 755 $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh - -mkdir -p $(DESTDIR)$(PREFIX)$(DATADIR) - -cp -f *.csv $(DESTDIR)$(PREFIX)$(DATADIR) - -mkdir -p $(DESTDIR)$(PREFIX)$(MANDIR) - -cp -f hydra.1 xhydra.1 pw-inspector.1 $(DESTDIR)$(PREFIX)$(MANDIR) - -mkdir -p $(DESTDIR)$(PREFIX)$(PIXDIR) - -cp -f xhydra.png $(DESTDIR)$(PREFIX)$(PIXDIR)/ - -mkdir -p $(DESTDIR)$(PREFIX)$(APPDIR) - -desktop-file-install --dir $(DESTDIR)$(PREFIX)$(APPDIR) xhydra.desktop +all: + @echo Error: you must run "./configure" first clean: - rm -rf xhydra pw-inspector hydra *.o core *.core *.stackdump *~ Makefile.in Makefile dev_rfc hydra.restore arm/*.ipk arm/ipkg/usr/bin/* hydra-gtk/src/*.o hydra-gtk/src/xhydra hydra-gtk/stamp-h hydra-gtk/config.status hydra-gtk/errors hydra-gtk/config.log hydra-gtk/src/.deps hydra-gtk/src/Makefile hydra-gtk/Makefile cp -f Makefile.orig Makefile uninstall: - -rm -f $(DESTDIR)$(PREFIX)$(BINDIR)/xhydra $(DESTDIR)$(PREFIX)$(BINDIR)/hydra $(DESTDIR)$(PREFIX)$(BINDIR)/pw-inspector $(DESTDIR)$(PREFIX)$(BINDIR)/hydra-wizard.sh $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh - -rm -f $(DESTDIR)$(PREFIX)$(DATADIR)/dpl4hydra_full.csv $(DESTDIR)$(PREFIX)$(DATADIR)/dpl4hydra_local.csv - -rm -f $(DESTDIR)$(PREFIX)$(MANDIR)/hydra.1 $(DESTDIR)$(PREFIX)$(MANDIR)/xhydra.1 $(DESTDIR)$(PREFIX)$(MANDIR)/pw-inspector.1 - -rm -f $(DESTDIR)$(PREFIX)$(PIXDIR)/xhydra.png - -rm -f $(DESTDIR)$(PREFIX)$(APPDIR)/xhydra.desktop + @echo Error: you must run "./configure" first From 584be39d138befdbfa7cb8ecc3d9907fed1d1852 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Fri, 18 Mar 2022 10:48:52 +0100 Subject: [PATCH 426/531] debug --- hydra-rtsp.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/hydra-rtsp.c b/hydra-rtsp.c index 436a0be..2652871 100644 --- a/hydra-rtsp.c +++ b/hydra-rtsp.c @@ -104,6 +104,8 @@ int32_t start_rtsp(int32_t s, char *ip, int32_t port, unsigned char options, cha } else { create_core_packet(1, ip, port); + printf("[DEBUG] checking for auth type\n"); + if (use_Digest_Auth(lresp) == 1) { char aux[500] = "", dbuf[500] = "", *result = NULL; char *pbuffer = hydra_strcasestr(lresp, "WWW-Authenticate: Digest "); From 354d9734afd9ca6b28df2c91664c376104c4e763 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Sat, 19 Mar 2022 13:47:42 +0100 Subject: [PATCH 427/531] rtsp support 200 ok for auth check --- hydra-rtsp.c | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/hydra-rtsp.c b/hydra-rtsp.c index 2652871..1d970e3 100644 --- a/hydra-rtsp.c +++ b/hydra-rtsp.c @@ -104,8 +104,6 @@ int32_t start_rtsp(int32_t s, char *ip, int32_t port, unsigned char options, cha } else { create_core_packet(1, ip, port); - printf("[DEBUG] checking for auth type\n"); - if (use_Digest_Auth(lresp) == 1) { char aux[500] = "", dbuf[500] = "", *result = NULL; char *pbuffer = hydra_strcasestr(lresp, "WWW-Authenticate: Digest "); @@ -156,7 +154,7 @@ int32_t start_rtsp(int32_t s, char *ip, int32_t port, unsigned char options, cha return 1; } - if ((is_NotFound(lresp))) { + if (is_NotFound(lresp) || is_Authorized(lresp)) { free(lresp); hydra_completed_pair_found(); From 64ca3aead24297952fe330e405c33d12ccaf12ff Mon Sep 17 00:00:00 2001 From: Raphael Isemann Date: Mon, 11 Apr 2022 16:57:49 +0200 Subject: [PATCH 428/531] Fix memory leak in radmin2 `msg` is calloc'd a few lines above via `msg = buffer2message(buffer);`. The check afterwards either exits the process on success or restarts the loop without free'ing `msg`. --- hydra-radmin2.c | 1 + 1 file changed, 1 insertion(+) diff --git a/hydra-radmin2.c b/hydra-radmin2.c index 8c417d3..bc6b461 100644 --- a/hydra-radmin2.c +++ b/hydra-radmin2.c @@ -366,6 +366,7 @@ void service_radmin2(char *ip, int32_t sp, unsigned char options, char *miscptr, hydra_report(stderr, "Error: Child with pid %d terminating, protocol error\n", (int32_t)getpid()); hydra_child_exit(2); } + free(msg); } #endif } From d95a89c384ec73b015967ce1803e6afb57f0e43d Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Mon, 18 Apr 2022 13:21:45 +0200 Subject: [PATCH 429/531] no .md --- README | 2 ++ 1 file changed, 2 insertions(+) diff --git a/README b/README index 2b59866..99c968b 100644 --- a/README +++ b/README @@ -14,6 +14,8 @@ in these organizations do not care for laws and ethics anyways. You are not one of the "good" ones if you ignore this.) + NOTE: no this is not meant to be a markdown doc! old school! + INTRODUCTION From a1cbbe14327da406237dc05ed8d775dc04ada15f Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Tue, 26 Apr 2022 12:09:03 +0200 Subject: [PATCH 430/531] more variance for rtsp, code format --- hydra-rdp.c | 3 ++- hydra-rtsp.c | 11 ++++++----- hydra.c | 21 ++++++++++----------- 3 files changed, 18 insertions(+), 17 deletions(-) diff --git a/hydra-rdp.c b/hydra-rdp.c index 20f665c..b33c87d 100644 --- a/hydra-rdp.c +++ b/hydra-rdp.c @@ -58,7 +58,8 @@ int32_t start_rdp(char *ip, int32_t port, unsigned char options, char *miscptr, } login_result = rdp_connect(server, port, domain, login, pass); - if (debug) hydra_report(stderr, "[DEBUG] rdp reported %08x\n", login_result); + if (debug) + hydra_report(stderr, "[DEBUG] rdp reported %08x\n", login_result); switch (login_result) { case 0: // login success diff --git a/hydra-rtsp.c b/hydra-rtsp.c index 1d970e3..3b6e84b 100644 --- a/hydra-rtsp.c +++ b/hydra-rtsp.c @@ -9,6 +9,7 @@ #include "hydra-mod.h" #include "sasl.h" #include +#define _GNU_SOURCE #include extern char *HYDRA_EXIT; @@ -16,7 +17,7 @@ char packet[500]; char packet2[500]; int32_t is_Unauthorized(char *s) { - if (strstr(s, "401 Unauthorized") != NULL) { + if (strcasestr(s, "401 Unauthorized") != NULL) { return 1; } else { return 0; @@ -24,7 +25,7 @@ int32_t is_Unauthorized(char *s) { } int32_t is_NotFound(char *s) { - if (strstr(s, "404 Stream Not Found") != NULL) { + if (strcasestr(s, "404 Stream") != NULL || strcasestr(s, "404 Not") != NULL) { return 1; } else { return 0; @@ -32,7 +33,7 @@ int32_t is_NotFound(char *s) { } int32_t is_Authorized(char *s) { - if (strstr(s, "200 OK") != NULL) { + if (strcasestr(s, "200 OK") != NULL) { return 1; } else { return 0; @@ -40,7 +41,7 @@ int32_t is_Authorized(char *s) { } int32_t use_Basic_Auth(char *s) { - if (strstr(s, "WWW-Authenticate: Basic") != NULL) { + if (strcasestr(s, "WWW-Authenticate: Basic") != NULL) { return 1; } else { return 0; @@ -48,7 +49,7 @@ int32_t use_Basic_Auth(char *s) { } int32_t use_Digest_Auth(char *s) { - if (strstr(s, "WWW-Authenticate: Digest") != NULL) { + if (strcasestr(s, "WWW-Authenticate: Digest") != NULL) { return 1; } else { return 0; diff --git a/hydra.c b/hydra.c index 6afdf48..a4267d4 100644 --- a/hydra.c +++ b/hydra.c @@ -1520,13 +1520,13 @@ void hydra_increase_fail_count(int32_t target_no, int32_t head_no) { hydra_heads[head_no]->current_login_ptr = empty_login; hydra_heads[head_no]->current_pass_ptr = empty_login; } -/* - hydra_targets[target_no]->fail_count--; - if (k < 5 && hydra_targets[target_no]->ok) - hydra_targets[target_no]->fail_count--; - if (k == 2 && hydra_targets[target_no]->ok) - hydra_targets[target_no]->fail_count--; -*/ + /* + hydra_targets[target_no]->fail_count--; + if (k < 5 && hydra_targets[target_no]->ok) + hydra_targets[target_no]->fail_count--; + if (k == 2 && hydra_targets[target_no]->ok) + hydra_targets[target_no]->fail_count--; + */ if (hydra_brains.targets <= hydra_brains.finished) hydra_kill_head(head_no, 1, 0); else { @@ -1638,7 +1638,7 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { printf("[COMPLETED] target %s - login \"%s\" - pass \"%s\" - child %d - " "%" hPRIu64 " of %" hPRIu64 "\n", hydra_targets[target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr, head_no, hydra_targets[target_no]->sent, hydra_brains.todo + hydra_targets[target_no]->redo); - //hydra_heads[head_no]->redo = 0; + // hydra_heads[head_no]->redo = 0; if (hydra_targets[target_no]->redo_state > 0) { if (hydra_targets[target_no]->redo_state <= hydra_targets[target_no]->redo) { hydra_heads[head_no]->current_pass_ptr = hydra_targets[target_no]->redo_pass[hydra_targets[target_no]->redo_state - 1]; @@ -3321,8 +3321,7 @@ int main(int argc, char *argv[]) { hydra_options.port = port; } - if (hydra_options.login == NULL && hydra_options.loginfile == NULL && - hydra_options.colonfile == NULL) + if (hydra_options.login == NULL && hydra_options.loginfile == NULL && hydra_options.colonfile == NULL) hydra_options.exit_found = 1; if (hydra_options.ssl == 0 && hydra_options.port == 443) @@ -3948,7 +3947,7 @@ int main(int argc, char *argv[]) { // restore device information if present (overwrite null bytes) if (device != NULL) { char *tmpptr = device - 1; - *tmpptr = '%'; // you can ignore the compiler warning + *tmpptr = '%'; // you can ignore the compiler warning fprintf(stderr, "[WARNING] not all modules support BINDTODEVICE for IPv6 " "link local addresses, e.g. SSH does not\n"); } From 7591dcc60bfddc9c7de855147d6f15dbeebb4d32 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Thu, 5 May 2022 09:33:49 +0200 Subject: [PATCH 431/531] add 2= optional parameter to http-post-form --- CHANGES | 2 ++ hydra-http-form.c | 22 +++++++++++++++------- 2 files changed, 17 insertions(+), 7 deletions(-) diff --git a/CHANGES b/CHANGES index 1e229ab..ab378a9 100644 --- a/CHANGES +++ b/CHANGES @@ -4,6 +4,8 @@ Changelog for hydra Release 9.4-dev * Switched from pcre/pcre3 to pcre2 as pcre/pcre3 will be dropped from Debian * Small fix for weird RTSP servers +* Added "2=" optional parameter to http-post-form module to tell hydra that + a "302" HTTP return code means success Release 9.3 diff --git a/hydra-http-form.c b/hydra-http-form.c index 2fc6d60..3a32909 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -75,6 +75,7 @@ typedef struct cookie_node { int32_t success_cond = 0; int32_t getcookie = 1; int32_t auth_flag = 0; +int32_t code_302_is_success = 0; char cookie[4096] = "", cmiscptr[1024]; @@ -441,6 +442,9 @@ int32_t parse_options(char *miscptr, ptr_header_node *ptr_head) { sprintf(cookieurl, "%.1000s", hydra_strrep(miscptr + 2, "\\:", ":")); miscptr = ptr; break; + case '2': + code_302_is_success = 1; + break; case 'g': // fall through case 'G': ptr = miscptr + 2; @@ -951,12 +955,16 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options found = analyze_server_response(s); + if (redirected_flag && code_302_is_success) { + found = success_cond; + } + if (auth_flag) { // we received a 401 error - user is using wrong module hydra_report(stderr, "[ERROR] the target is using HTTP auth, not a web form, received HTTP " "error code 401. Use module \"http%s-get\" instead.\n", (options & OPTION_SSL) > 0 ? "s" : ""); - return 4; + return 2; } if (strlen(cookie) > 0) @@ -967,7 +975,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options if (debug) printf("[DEBUG] attempt result: found %d, redirect %d, location: %s\n", found, redirected_flag, redirected_url_buff); - while (found == 0 && redirected_flag && (redirected_url_buff[0] != 0) && (redirected_cpt > 0)) { + while (found == 0 && redirected_flag && !code_302_is_success && (redirected_url_buff[0] != 0) && (redirected_cpt > 0)) { // we have to split the location char *startloc, *endloc; char str[2048]; @@ -1108,7 +1116,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options } // if the last status is still 3xx, set it as a false - if (found != -1 && found == success_cond && (redirected_flag == 0 || success_cond == 1) && redirected_cpt >= 0) { + if (found != -1 && found == success_cond && ((redirected_flag && code_302_is_success) || redirected_flag == 0 || success_cond == 1) && redirected_cpt >= 0) { hydra_report_found_host(port, ip, "www-form", fp); hydra_completed_pair_found(); } else { @@ -1436,8 +1444,9 @@ void usage_http_form(const char *service) { " login check must be preceded by \"S=\".\n" " This is where most people get it wrong. You have to check the webapp " "what a\n" - " failed string looks like and put it in this parameter!\n" - "The following parameters are optional:\n" + " failed string looks like and put it in this parameter! Add the -d switch to see\nthe sent/received data!\n" + "\nThe following parameters are optional:\n" + " 2= 302 page forward return codes identify a successful attempt\n" " (c|C)=/page/uri to define a different page to gather initial " "cookies from\n" " (g|G)= skip pre-requests - only use this when no pre-cookies are required\n" @@ -1451,8 +1460,7 @@ void usage_http_form(const char *service) { "exists, by the\n" " one supplied by the user, or add the header at the " "end\n" - "Note that if you are going to put colons (:) in your headers you should " - "escape them with a backslash (\\).\n" + "\nNote that if you are going to put colons (:) in your headers you should escape them with a backslash (\\).\n" " All colons that are not option separators should be escaped (see the " "examples above and below).\n" " You can specify a header without escaping the colons, but that way you " From 63e2836e91175d7c8bc0a775729975541d1d6fe2 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Thu, 5 May 2022 12:45:47 +0200 Subject: [PATCH 432/531] fix option parsing --- hydra-http-form.c | 35 ++++++++++++++++++++--------------- 1 file changed, 20 insertions(+), 15 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 3a32909..983b525 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -404,7 +404,7 @@ int32_t parse_options(char *miscptr, ptr_header_node *ptr_head) { * Beware of the backslashes (\)! */ while (*miscptr != 0) { - if (strlen(miscptr) < 3 || miscptr[1] != '=') { + if (strlen(miscptr) < 2 || miscptr[1] != '=') { hydra_report(stderr, "[ERROR] optional parameters must have the format X=value: %s\n", miscptr); return 0; } @@ -444,6 +444,11 @@ int32_t parse_options(char *miscptr, ptr_header_node *ptr_head) { break; case '2': code_302_is_success = 1; + char *tmp = strchr(miscptr, ':'); + if (tmp) + miscptr = tmp + 1; + else + miscptr += strlen(miscptr); break; case 'g': // fall through case 'G': @@ -1281,8 +1286,7 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { ptr = ptr2 = NULL; sprintf(bufferurl, "%.6096s", miscptr); - url = bufferurl; - ptr = url; + ptr = url = bufferurl; while (*ptr != 0 && (*ptr != ':' || *(ptr - 1) == '\\')) ptr++; @@ -1295,15 +1299,19 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { if (*ptr != 0) *ptr++ = 0; - cond = ptr; + optional1 = cond = ptr; - if ((ptr2 = strchr(ptr, ':')) != NULL) { + ptr2 = ptr + strlen(ptr); + + while (ptr2 > ptr && (*ptr2 != ':' || *(ptr2 - 1) == '\\')) + ptr2--; + + if (*ptr2 == ':') { *ptr2++ = 0; - if (*ptr2) - optional1 = ptr2; - else - optional1 = NULL; - } else + cond = ptr2; + } + + if (optional1 == cond) optional1 = NULL; if (strstr(url, "\\:") != NULL) { @@ -1325,9 +1333,7 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { } } - // printf("ptr: %s ptr2: %s cond: %s url: %s variables: %s optional1: - // %s\n", ptr, ptr2, cond, url, variables, optional1 == NULL ? "null" : - // optional1); + // printf("ptr: %s ptr2: %s cond: %s url: %s variables: %s optional1: %s\n", ptr, ptr2, cond, url, variables, optional1 == NULL ? "null" : optional1); if (url == NULL || variables == NULL || cond == NULL /*|| optional1 == NULL */) hydra_child_exit(2); @@ -1351,8 +1357,7 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { success_cond = 0; } - // printf("miscptr: %s, url=%s, variables=%s, ptr=%s, optional1: %s, cond: %s - // (%d)\n", miscptr, url, variables, ptr, optional1, cond, success_cond); + // printf("miscptr: %s, url=%s, variables=%s, ptr=%s, optional1: %s, cond: %s (%d)\n", miscptr, url, variables, ptr, optional1, cond, success_cond); /* * Parse the user-supplied options. From b9a985fb566277b5cd39e56a559554be411dac73 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Wed, 11 May 2022 11:27:39 +0200 Subject: [PATCH 433/531] fix wizard script --- hydra-wizard.sh | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/hydra-wizard.sh b/hydra-wizard.sh index 1370661..d4e3c3f 100755 --- a/hydra-wizard.sh +++ b/hydra-wizard.sh @@ -33,10 +33,10 @@ test -e "$pass" && passs="-P $pass" test -e "$pass" || passs="-p $pass" test -n "$port" && ports="-s $port" test -n "$pw" && pws="-e $pw" -test -n "$opt" && opts="-m '$opt'" +test -n "$opt" && { opts="-m $opt" ; dopts="-m '$opt'" ; } echo The following command will be executed now: -echo " hydra $users $passs -u $pws $ports $opts $targets $service" +echo " hydra $users $passs -u $pws $ports $dopts $targets $service" echo read -p "Do you want to run the command now? [Y/n] " yn test "$yn" = "n" -o "$yn" = "N" && { echo Exiting. ; exit 0 ; } From 2dc4656d720a4dcbe819688584088b30a9afac0e Mon Sep 17 00:00:00 2001 From: Paramtamtam <7326800+tarampampam@users.noreply.github.com> Date: Mon, 13 Jun 2022 18:07:55 +0400 Subject: [PATCH 434/531] Docker env implemented --- .github/workflows/release.yml | 45 ++++++++++++++++++++++ .github/workflows/tests.yml | 33 ++++++++++++++++ Dockerfile | 72 +++++++++++++++++++++++++++++++++++ 3 files changed, 150 insertions(+) create mode 100644 .github/workflows/release.yml create mode 100644 .github/workflows/tests.yml create mode 100644 Dockerfile diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml new file mode 100644 index 0000000..b595cea --- /dev/null +++ b/.github/workflows/release.yml @@ -0,0 +1,45 @@ +name: release + +on: + release: # Docs: + types: [published] + +jobs: + docker-image: + name: Build the docker image + runs-on: ubuntu-20.04 + steps: + - uses: actions/checkout@v3 + + - uses: docker/setup-qemu-action@v2 + + - uses: docker/setup-buildx-action@v2 + + # uncomment for publishing on hub.docker.com (don't forget to fillup the repository secrets) + #- uses: docker/login-action@v2 + # with: + # username: ${{ secrets.DOCKER_LOGIN }} + # password: ${{ secrets.DOCKER_PASSWORD }} + + - uses: docker/login-action@v2 + with: + registry: ghcr.io + username: ${{ github.actor }} + password: ${{ secrets.GITHUB_TOKEN }} + + - uses: gacts/github-slug@v1 # Action page: + id: slug + + - uses: docker/build-push-action@v3 # Action page: + with: + context: . + file: Dockerfile + push: true + platforms: linux/amd64,linux/arm64,linux/arm/v6,linux/arm/v7 + build-args: HYDRA_VERSION="${{ steps.slug.outputs.version-semantic }}" + tags: | + ghcr.io/${{ github.actor }}/hydra:${{ steps.slug.outputs.version-semantic }} + # append the following line to the list above for publishing on hub.docker.com + # (and don't forget to change on a real repo/user name) + # vanhauser-thc/thc-hydra:${{ steps.slug.outputs.version-semantic }} + diff --git a/.github/workflows/tests.yml b/.github/workflows/tests.yml new file mode 100644 index 0000000..84e173a --- /dev/null +++ b/.github/workflows/tests.yml @@ -0,0 +1,33 @@ +name: tests + +on: + push: + branches: [master, main] + tags-ignore: ['**'] + paths-ignore: [README, TODO, PROBLEMS] + pull_request: + paths-ignore: [README, TODO, PROBLEMS] + +concurrency: + group: ${{ github.ref }} + cancel-in-progress: true + +jobs: # Docs: + docker-build: + name: Build the docker image + runs-on: ubuntu-20.04 + timeout-minutes: 25 + steps: + - uses: actions/checkout@v3 + + - uses: docker/setup-qemu-action@v2 + + - uses: docker/setup-buildx-action@v2 + + - uses: docker/build-push-action@v3 # Action page: + with: + context: . + file: Dockerfile + platforms: linux/amd64,linux/arm/v7 + push: false + tags: hydra:ci diff --git a/Dockerfile b/Dockerfile new file mode 100644 index 0000000..4312a10 --- /dev/null +++ b/Dockerfile @@ -0,0 +1,72 @@ +FROM debian:buster-slim + +ARG HYDRA_VERSION="unknown" + +LABEL \ + org.opencontainers.image.url="https://github.com/vanhauser-thc/thc-hydra" \ + org.opencontainers.image.source="https://github.com/vanhauser-thc/thc-hydra" \ + org.opencontainers.image.version="$HYDRA_VERSION" \ + org.opencontainers.image.vendor="vanhauser-thc" \ + org.opencontainers.image.title="hydra" \ + org.opencontainers.image.licenses="GNU AFFERO GENERAL PUBLIC LICENSE" + +COPY . /src + +RUN set -x \ + && apt-get update \ + && apt-get -y install \ + #libmysqlclient-dev \ + default-libmysqlclient-dev \ + libgpg-error-dev \ + #libmemcached-dev \ + #libgcrypt11-dev \ + libgcrypt-dev \ + #libgcrypt20-dev \ + #libgtk2.0-dev \ + libpcre3-dev \ + #firebird-dev \ + libidn11-dev \ + libssh-dev \ + #libsvn-dev \ + libssl-dev \ + #libpq-dev \ + make \ + curl \ + gcc \ + 1>/dev/null \ + # The next line fixes the curl "SSL certificate problem: unable to get local issuer certificate" for linux/arm + && c_rehash \ + # Get hydra sources and compile + && cd /src \ + && ./configure 1>/dev/null \ + && make 1>/dev/null \ + && make install \ + # Make clean + && apt-get purge -y make gcc libgpg-error-dev libgcrypt-dev \ + && apt-get autoremove -y \ + && rm -rf /var/lib/apt/lists/* \ + # Verify hydra installation + && hydra -h || error_code=$? \ + && if [ ! "${error_code}" -eq 255 ]; then echo "Wrong exit code for 'hydra help' command"; exit 1; fi \ + # Unprivileged user creation + && echo 'hydra:x:10001:10001::/tmp:/sbin/nologin' > /etc/passwd \ + && echo 'hydra:x:10001:' > /etc/group + +ARG INCLUDE_SECLISTS="true" + +RUN set -x \ + && if [ "${INCLUDE_SECLISTS}" = "true" ]; then \ + mkdir /tmp/seclists \ + && curl -SL "https://api.github.com/repos/danielmiessler/SecLists/tarball" -o /tmp/seclists/src.tar.gz \ + && tar xzf /tmp/seclists/src.tar.gz -C /tmp/seclists \ + && mv /tmp/seclists/*SecLists*/Passwords /opt/passwords \ + && mv /tmp/seclists/*SecLists*/Usernames /opt/usernames \ + && chmod -R u+r /opt/passwords /opt/usernames \ + && rm -Rf /tmp/seclists \ + && ls -la /opt/passwords /opt/usernames \ + ;fi + +# Use an unprivileged user +USER 10001:10001 + +ENTRYPOINT ["hydra"] From f90c4d24c6fa2baeacb11f4bc5838dc7c6e74dfd Mon Sep 17 00:00:00 2001 From: Paramtamtam <7326800+tarampampam@users.noreply.github.com> Date: Mon, 13 Jun 2022 19:40:11 +0500 Subject: [PATCH 435/531] Update release.yml --- .github/workflows/release.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index b595cea..bfaee9d 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -38,7 +38,7 @@ jobs: platforms: linux/amd64,linux/arm64,linux/arm/v6,linux/arm/v7 build-args: HYDRA_VERSION="${{ steps.slug.outputs.version-semantic }}" tags: | - ghcr.io/${{ github.actor }}/hydra:${{ steps.slug.outputs.version-semantic }} + ghcr.io/${{ github.repository }}:${{ steps.slug.outputs.version-semantic }} # append the following line to the list above for publishing on hub.docker.com # (and don't forget to change on a real repo/user name) # vanhauser-thc/thc-hydra:${{ steps.slug.outputs.version-semantic }} From 26f97b54d56f84c6a2c5da3e226e2f5e5bec2cbf Mon Sep 17 00:00:00 2001 From: van Hauser Date: Mon, 13 Jun 2022 17:09:43 +0200 Subject: [PATCH 436/531] Update Dockerfile --- Dockerfile | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Dockerfile b/Dockerfile index 4312a10..4496f50 100644 --- a/Dockerfile +++ b/Dockerfile @@ -1,6 +1,6 @@ FROM debian:buster-slim -ARG HYDRA_VERSION="unknown" +ARG HYDRA_VERSION="github" LABEL \ org.opencontainers.image.url="https://github.com/vanhauser-thc/thc-hydra" \ From 705a6c180dac7198aaf149aa7466a9d5123510eb Mon Sep 17 00:00:00 2001 From: van Hauser Date: Mon, 13 Jun 2022 17:13:37 +0200 Subject: [PATCH 437/531] Update release.yml --- .github/workflows/release.yml | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index bfaee9d..5bd629b 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -24,8 +24,8 @@ jobs: - uses: docker/login-action@v2 with: registry: ghcr.io - username: ${{ github.actor }} - password: ${{ secrets.GITHUB_TOKEN }} + username: ${{ secrets.DOCKER_USERNAME }} + password: ${{ secrets.DOCKER_TOKEN }} - uses: gacts/github-slug@v1 # Action page: id: slug @@ -37,8 +37,7 @@ jobs: push: true platforms: linux/amd64,linux/arm64,linux/arm/v6,linux/arm/v7 build-args: HYDRA_VERSION="${{ steps.slug.outputs.version-semantic }}" - tags: | - ghcr.io/${{ github.repository }}:${{ steps.slug.outputs.version-semantic }} + tags: vanhauser/hydra:latest # append the following line to the list above for publishing on hub.docker.com # (and don't forget to change on a real repo/user name) # vanhauser-thc/thc-hydra:${{ steps.slug.outputs.version-semantic }} From d5e525bcb0cd9f44a78c45c7ffd588637197d8a0 Mon Sep 17 00:00:00 2001 From: Paramtamtam <7326800+tarampampam@users.noreply.github.com> Date: Mon, 13 Jun 2022 20:20:58 +0500 Subject: [PATCH 438/531] cleanup --- .github/workflows/release.yml | 9 --------- 1 file changed, 9 deletions(-) diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index 5bd629b..7c9308d 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -15,12 +15,6 @@ jobs: - uses: docker/setup-buildx-action@v2 - # uncomment for publishing on hub.docker.com (don't forget to fillup the repository secrets) - #- uses: docker/login-action@v2 - # with: - # username: ${{ secrets.DOCKER_LOGIN }} - # password: ${{ secrets.DOCKER_PASSWORD }} - - uses: docker/login-action@v2 with: registry: ghcr.io @@ -38,7 +32,4 @@ jobs: platforms: linux/amd64,linux/arm64,linux/arm/v6,linux/arm/v7 build-args: HYDRA_VERSION="${{ steps.slug.outputs.version-semantic }}" tags: vanhauser/hydra:latest - # append the following line to the list above for publishing on hub.docker.com - # (and don't forget to change on a real repo/user name) - # vanhauser-thc/thc-hydra:${{ steps.slug.outputs.version-semantic }} From 63e3dce877e96432a738f93fbedf8586277a0703 Mon Sep 17 00:00:00 2001 From: van Hauser Date: Mon, 13 Jun 2022 17:30:57 +0200 Subject: [PATCH 439/531] Update .github/workflows/release.yml Co-authored-by: Paramtamtam <7326800+tarampampam@users.noreply.github.com> --- .github/workflows/release.yml | 1 - 1 file changed, 1 deletion(-) diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index 7c9308d..6b13896 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -17,7 +17,6 @@ jobs: - uses: docker/login-action@v2 with: - registry: ghcr.io username: ${{ secrets.DOCKER_USERNAME }} password: ${{ secrets.DOCKER_TOKEN }} From 77037ecbb6acd64732edb00a2fbcdb8b272cec88 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Mon, 13 Jun 2022 19:32:55 +0200 Subject: [PATCH 440/531] docker image --- .github/workflows/tests.yml | 4 ++-- README | 9 +++++++++ 2 files changed, 11 insertions(+), 2 deletions(-) diff --git a/.github/workflows/tests.yml b/.github/workflows/tests.yml index 84e173a..0baa450 100644 --- a/.github/workflows/tests.yml +++ b/.github/workflows/tests.yml @@ -16,7 +16,7 @@ jobs: # Docs: docker-build: name: Build the docker image runs-on: ubuntu-20.04 - timeout-minutes: 25 + timeout-minutes: 45 steps: - uses: actions/checkout@v3 @@ -29,5 +29,5 @@ jobs: # Docs: context: . file: Dockerfile platforms: linux/amd64,linux/arm/v7 - push: false + push: true tags: hydra:ci diff --git a/README b/README index 99c968b..e8c7b6a 100644 --- a/README +++ b/README @@ -17,6 +17,11 @@ NOTE: no this is not meant to be a markdown doc! old school! +Hydra in the most current github state can be directly downloaded via docker: +``` +docker pull vanhauser/hydra +``` + INTRODUCTION ------------ @@ -63,6 +68,10 @@ repository is at Github: Use the development version at your own risk. It contains new features and new bugs. Things might not work! +Alternatively (and easier) to can pull it as a docker container: +``` +docker pull vanhauser/hydra +``` HOW TO COMPILE From 72f5cfe67cec27d195ad414ddfeebd2158c4ea7a Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Mon, 13 Jun 2022 19:52:13 +0200 Subject: [PATCH 441/531] fix --- .github/workflows/release.yml | 14 +++++++++++--- .github/workflows/tests.yml | 33 --------------------------------- 2 files changed, 11 insertions(+), 36 deletions(-) delete mode 100644 .github/workflows/tests.yml diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index 6b13896..bfe82ee 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -1,8 +1,16 @@ name: release on: - release: # Docs: - types: [published] + push: + branches: [master, main] + tags-ignore: ['**'] + paths-ignore: [README, TODO, PROBLEMS] + pull_request: + paths-ignore: [README, TODO, PROBLEMS] + +concurrency: + group: ${{ github.ref }} + cancel-in-progress: true jobs: docker-image: @@ -28,7 +36,7 @@ jobs: context: . file: Dockerfile push: true - platforms: linux/amd64,linux/arm64,linux/arm/v6,linux/arm/v7 + platforms: linux/amd64,linux/arm64,linux/arm/v6,linux/arm/v7,linux/arm64 build-args: HYDRA_VERSION="${{ steps.slug.outputs.version-semantic }}" tags: vanhauser/hydra:latest diff --git a/.github/workflows/tests.yml b/.github/workflows/tests.yml deleted file mode 100644 index 0baa450..0000000 --- a/.github/workflows/tests.yml +++ /dev/null @@ -1,33 +0,0 @@ -name: tests - -on: - push: - branches: [master, main] - tags-ignore: ['**'] - paths-ignore: [README, TODO, PROBLEMS] - pull_request: - paths-ignore: [README, TODO, PROBLEMS] - -concurrency: - group: ${{ github.ref }} - cancel-in-progress: true - -jobs: # Docs: - docker-build: - name: Build the docker image - runs-on: ubuntu-20.04 - timeout-minutes: 45 - steps: - - uses: actions/checkout@v3 - - - uses: docker/setup-qemu-action@v2 - - - uses: docker/setup-buildx-action@v2 - - - uses: docker/build-push-action@v3 # Action page: - with: - context: . - file: Dockerfile - platforms: linux/amd64,linux/arm/v7 - push: true - tags: hydra:ci From b2fe51dc7f9fd1e727fb4eb6ee2cd8b5ec395fc4 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Mon, 13 Jun 2022 19:56:31 +0200 Subject: [PATCH 442/531] fix --- .github/workflows/release.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index bfe82ee..569c68a 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -26,7 +26,7 @@ jobs: - uses: docker/login-action@v2 with: username: ${{ secrets.DOCKER_USERNAME }} - password: ${{ secrets.DOCKER_TOKEN }} + password: ${{ secrets.DOCKER_PASSWORD }} - uses: gacts/github-slug@v1 # Action page: id: slug From ea1e64fa5d993bda7c7ab6a7edfc793c94a6c150 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Mon, 13 Jun 2022 20:06:32 +0200 Subject: [PATCH 443/531] fix --- .github/workflows/release.yml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index 569c68a..19c1bb7 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -1,3 +1,5 @@ +# build docker image + name: release on: From 03a490133e19fb29b79d84ac02ff1823b590fd6a Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Mon, 13 Jun 2022 20:15:35 +0200 Subject: [PATCH 444/531] fix --- .github/workflows/release.yml | 2 -- 1 file changed, 2 deletions(-) diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index 19c1bb7..569c68a 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -1,5 +1,3 @@ -# build docker image - name: release on: From 1835eac20a301dc39b11e969b625a35ad4765c3e Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Mon, 13 Jun 2022 20:35:28 +0200 Subject: [PATCH 445/531] fix --- .github/workflows/release.yml | 8 ++------ 1 file changed, 2 insertions(+), 6 deletions(-) diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index 569c68a..e88bc6f 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -8,10 +8,6 @@ on: pull_request: paths-ignore: [README, TODO, PROBLEMS] -concurrency: - group: ${{ github.ref }} - cancel-in-progress: true - jobs: docker-image: name: Build the docker image @@ -36,7 +32,7 @@ jobs: context: . file: Dockerfile push: true - platforms: linux/amd64,linux/arm64,linux/arm/v6,linux/arm/v7,linux/arm64 - build-args: HYDRA_VERSION="${{ steps.slug.outputs.version-semantic }}" + platforms: linux/amd64 +# ,linux/arm64,linux/arm/v6,linux/arm/v7,linux/arm64 tags: vanhauser/hydra:latest From 770c5c436e367b22dc50cc5a1b7eaa1800d9be99 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Mon, 13 Jun 2022 20:40:50 +0200 Subject: [PATCH 446/531] fix --- .github/workflows/release.yml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index e88bc6f..e7e79e7 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -32,7 +32,7 @@ jobs: context: . file: Dockerfile push: true - platforms: linux/amd64 -# ,linux/arm64,linux/arm/v6,linux/arm/v7,linux/arm64 + platforms: linux/amd64, linux/arm64 +# ,linux/arm/v6, linux/arm/v7 tags: vanhauser/hydra:latest From 615e566e79571001ff36800300ff9a33dba91c52 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Mon, 18 Jul 2022 10:04:01 +0200 Subject: [PATCH 447/531] wait3 -> waitpid --- CHANGES | 1 + hydra.c | 8 ++++---- 2 files changed, 5 insertions(+), 4 deletions(-) diff --git a/CHANGES b/CHANGES index ab378a9..9727b33 100644 --- a/CHANGES +++ b/CHANGES @@ -6,6 +6,7 @@ Release 9.4-dev * Small fix for weird RTSP servers * Added "2=" optional parameter to http-post-form module to tell hydra that a "302" HTTP return code means success +* replaced wait3 with waitpid for better compatability Release 9.3 diff --git a/hydra.c b/hydra.c index a4267d4..b464010 100644 --- a/hydra.c +++ b/hydra.c @@ -1026,7 +1026,7 @@ void killed_childs(int32_t signo) { int32_t pid, i; killed++; - pid = wait3(NULL, WNOHANG, NULL); + pid = waitpid(-1, NULL, WNOHANG); for (i = 0; i < hydra_options.max_use; i++) { if (pid == hydra_heads[i]->pid) { hydra_heads[i]->pid = -1; @@ -1447,7 +1447,7 @@ void hydra_kill_head(int32_t head_no, int32_t killit, int32_t fail) { // hydra_targets[hydra_heads[head_no]->target_no]->bfg_ptr[head_no] = // NULL; } - (void)wait3(NULL, WNOHANG, NULL); + (void)waitpid(-1, NULL, WNOHANG); } void hydra_increase_fail_count(int32_t target_no, int32_t head_no) { @@ -4251,7 +4251,7 @@ int main(int argc, char *argv[]) { // hydra_brains.sent); usleepn(USLEEP_LOOP); - (void)wait3(NULL, WNOHANG, NULL); + (void)waitpid(-1, NULL, WNOHANG); // write restore file and report status if (process_restore == 1 && time(NULL) - elapsed_restore > 299) { hydra_restore_write(0); @@ -4354,7 +4354,7 @@ int main(int argc, char *argv[]) { for (i = 0; i < hydra_options.max_use; i++) if (hydra_heads[i]->active == HEAD_ACTIVE && hydra_heads[i]->pid > 0) hydra_kill_head(i, 1, 3); - (void)wait3(NULL, WNOHANG, NULL); + (void)waitpid(-1, NULL, WNOHANG); #define STRMAX (10 * 1024) char json_error[STRMAX + 2], tmp_str[STRMAX + 2]; From 0eb19744dfdc7e90db9a4615f740309afd26ae7d Mon Sep 17 00:00:00 2001 From: van Hauser Date: Mon, 18 Jul 2022 17:57:11 +0200 Subject: [PATCH 448/531] Create LICENSE.md --- LICENSE.md | 661 +++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 661 insertions(+) create mode 100644 LICENSE.md diff --git a/LICENSE.md b/LICENSE.md new file mode 100644 index 0000000..0ad25db --- /dev/null +++ b/LICENSE.md @@ -0,0 +1,661 @@ + GNU AFFERO GENERAL PUBLIC LICENSE + Version 3, 19 November 2007 + + Copyright (C) 2007 Free Software Foundation, Inc. + Everyone is permitted to copy and distribute verbatim copies + of this license document, but changing it is not allowed. + + Preamble + + The GNU Affero General Public License is a free, copyleft license for +software and other kinds of works, specifically designed to ensure +cooperation with the community in the case of network server software. + + The licenses for most software and other practical works are designed +to take away your freedom to share and change the works. By contrast, +our General Public Licenses are intended to guarantee your freedom to +share and change all versions of a program--to make sure it remains free +software for all its users. + + When we speak of free software, we are referring to freedom, not +price. Our General Public Licenses are designed to make sure that you +have the freedom to distribute copies of free software (and charge for +them if you wish), that you receive source code or can get it if you +want it, that you can change the software or use pieces of it in new +free programs, and that you know you can do these things. + + Developers that use our General Public Licenses protect your rights +with two steps: (1) assert copyright on the software, and (2) offer +you this License which gives you legal permission to copy, distribute +and/or modify the software. + + A secondary benefit of defending all users' freedom is that +improvements made in alternate versions of the program, if they +receive widespread use, become available for other developers to +incorporate. Many developers of free software are heartened and +encouraged by the resulting cooperation. However, in the case of +software used on network servers, this result may fail to come about. +The GNU General Public License permits making a modified version and +letting the public access it on a server without ever releasing its +source code to the public. + + The GNU Affero General Public License is designed specifically to +ensure that, in such cases, the modified source code becomes available +to the community. It requires the operator of a network server to +provide the source code of the modified version running there to the +users of that server. Therefore, public use of a modified version, on +a publicly accessible server, gives the public access to the source +code of the modified version. + + An older license, called the Affero General Public License and +published by Affero, was designed to accomplish similar goals. This is +a different license, not a version of the Affero GPL, but Affero has +released a new version of the Affero GPL which permits relicensing under +this license. + + The precise terms and conditions for copying, distribution and +modification follow. + + TERMS AND CONDITIONS + + 0. Definitions. + + "This License" refers to version 3 of the GNU Affero General Public License. + + "Copyright" also means copyright-like laws that apply to other kinds of +works, such as semiconductor masks. + + "The Program" refers to any copyrightable work licensed under this +License. Each licensee is addressed as "you". "Licensees" and +"recipients" may be individuals or organizations. + + To "modify" a work means to copy from or adapt all or part of the work +in a fashion requiring copyright permission, other than the making of an +exact copy. The resulting work is called a "modified version" of the +earlier work or a work "based on" the earlier work. + + A "covered work" means either the unmodified Program or a work based +on the Program. + + To "propagate" a work means to do anything with it that, without +permission, would make you directly or secondarily liable for +infringement under applicable copyright law, except executing it on a +computer or modifying a private copy. Propagation includes copying, +distribution (with or without modification), making available to the +public, and in some countries other activities as well. + + To "convey" a work means any kind of propagation that enables other +parties to make or receive copies. Mere interaction with a user through +a computer network, with no transfer of a copy, is not conveying. + + An interactive user interface displays "Appropriate Legal Notices" +to the extent that it includes a convenient and prominently visible +feature that (1) displays an appropriate copyright notice, and (2) +tells the user that there is no warranty for the work (except to the +extent that warranties are provided), that licensees may convey the +work under this License, and how to view a copy of this License. If +the interface presents a list of user commands or options, such as a +menu, a prominent item in the list meets this criterion. + + 1. Source Code. + + The "source code" for a work means the preferred form of the work +for making modifications to it. "Object code" means any non-source +form of a work. + + A "Standard Interface" means an interface that either is an official +standard defined by a recognized standards body, or, in the case of +interfaces specified for a particular programming language, one that +is widely used among developers working in that language. + + The "System Libraries" of an executable work include anything, other +than the work as a whole, that (a) is included in the normal form of +packaging a Major Component, but which is not part of that Major +Component, and (b) serves only to enable use of the work with that +Major Component, or to implement a Standard Interface for which an +implementation is available to the public in source code form. A +"Major Component", in this context, means a major essential component +(kernel, window system, and so on) of the specific operating system +(if any) on which the executable work runs, or a compiler used to +produce the work, or an object code interpreter used to run it. + + The "Corresponding Source" for a work in object code form means all +the source code needed to generate, install, and (for an executable +work) run the object code and to modify the work, including scripts to +control those activities. However, it does not include the work's +System Libraries, or general-purpose tools or generally available free +programs which are used unmodified in performing those activities but +which are not part of the work. For example, Corresponding Source +includes interface definition files associated with source files for +the work, and the source code for shared libraries and dynamically +linked subprograms that the work is specifically designed to require, +such as by intimate data communication or control flow between those +subprograms and other parts of the work. + + The Corresponding Source need not include anything that users +can regenerate automatically from other parts of the Corresponding +Source. + + The Corresponding Source for a work in source code form is that +same work. + + 2. Basic Permissions. + + All rights granted under this License are granted for the term of +copyright on the Program, and are irrevocable provided the stated +conditions are met. This License explicitly affirms your unlimited +permission to run the unmodified Program. The output from running a +covered work is covered by this License only if the output, given its +content, constitutes a covered work. This License acknowledges your +rights of fair use or other equivalent, as provided by copyright law. + + You may make, run and propagate covered works that you do not +convey, without conditions so long as your license otherwise remains +in force. You may convey covered works to others for the sole purpose +of having them make modifications exclusively for you, or provide you +with facilities for running those works, provided that you comply with +the terms of this License in conveying all material for which you do +not control copyright. Those thus making or running the covered works +for you must do so exclusively on your behalf, under your direction +and control, on terms that prohibit them from making any copies of +your copyrighted material outside their relationship with you. + + Conveying under any other circumstances is permitted solely under +the conditions stated below. Sublicensing is not allowed; section 10 +makes it unnecessary. + + 3. Protecting Users' Legal Rights From Anti-Circumvention Law. + + No covered work shall be deemed part of an effective technological +measure under any applicable law fulfilling obligations under article +11 of the WIPO copyright treaty adopted on 20 December 1996, or +similar laws prohibiting or restricting circumvention of such +measures. + + When you convey a covered work, you waive any legal power to forbid +circumvention of technological measures to the extent such circumvention +is effected by exercising rights under this License with respect to +the covered work, and you disclaim any intention to limit operation or +modification of the work as a means of enforcing, against the work's +users, your or third parties' legal rights to forbid circumvention of +technological measures. + + 4. Conveying Verbatim Copies. + + You may convey verbatim copies of the Program's source code as you +receive it, in any medium, provided that you conspicuously and +appropriately publish on each copy an appropriate copyright notice; +keep intact all notices stating that this License and any +non-permissive terms added in accord with section 7 apply to the code; +keep intact all notices of the absence of any warranty; and give all +recipients a copy of this License along with the Program. + + You may charge any price or no price for each copy that you convey, +and you may offer support or warranty protection for a fee. + + 5. Conveying Modified Source Versions. + + You may convey a work based on the Program, or the modifications to +produce it from the Program, in the form of source code under the +terms of section 4, provided that you also meet all of these conditions: + + a) The work must carry prominent notices stating that you modified + it, and giving a relevant date. + + b) The work must carry prominent notices stating that it is + released under this License and any conditions added under section + 7. This requirement modifies the requirement in section 4 to + "keep intact all notices". + + c) You must license the entire work, as a whole, under this + License to anyone who comes into possession of a copy. This + License will therefore apply, along with any applicable section 7 + additional terms, to the whole of the work, and all its parts, + regardless of how they are packaged. This License gives no + permission to license the work in any other way, but it does not + invalidate such permission if you have separately received it. + + d) If the work has interactive user interfaces, each must display + Appropriate Legal Notices; however, if the Program has interactive + interfaces that do not display Appropriate Legal Notices, your + work need not make them do so. + + A compilation of a covered work with other separate and independent +works, which are not by their nature extensions of the covered work, +and which are not combined with it such as to form a larger program, +in or on a volume of a storage or distribution medium, is called an +"aggregate" if the compilation and its resulting copyright are not +used to limit the access or legal rights of the compilation's users +beyond what the individual works permit. Inclusion of a covered work +in an aggregate does not cause this License to apply to the other +parts of the aggregate. + + 6. Conveying Non-Source Forms. + + You may convey a covered work in object code form under the terms +of sections 4 and 5, provided that you also convey the +machine-readable Corresponding Source under the terms of this License, +in one of these ways: + + a) Convey the object code in, or embodied in, a physical product + (including a physical distribution medium), accompanied by the + Corresponding Source fixed on a durable physical medium + customarily used for software interchange. + + b) Convey the object code in, or embodied in, a physical product + (including a physical distribution medium), accompanied by a + written offer, valid for at least three years and valid for as + long as you offer spare parts or customer support for that product + model, to give anyone who possesses the object code either (1) a + copy of the Corresponding Source for all the software in the + product that is covered by this License, on a durable physical + medium customarily used for software interchange, for a price no + more than your reasonable cost of physically performing this + conveying of source, or (2) access to copy the + Corresponding Source from a network server at no charge. + + c) Convey individual copies of the object code with a copy of the + written offer to provide the Corresponding Source. This + alternative is allowed only occasionally and noncommercially, and + only if you received the object code with such an offer, in accord + with subsection 6b. + + d) Convey the object code by offering access from a designated + place (gratis or for a charge), and offer equivalent access to the + Corresponding Source in the same way through the same place at no + further charge. You need not require recipients to copy the + Corresponding Source along with the object code. If the place to + copy the object code is a network server, the Corresponding Source + may be on a different server (operated by you or a third party) + that supports equivalent copying facilities, provided you maintain + clear directions next to the object code saying where to find the + Corresponding Source. Regardless of what server hosts the + Corresponding Source, you remain obligated to ensure that it is + available for as long as needed to satisfy these requirements. + + e) Convey the object code using peer-to-peer transmission, provided + you inform other peers where the object code and Corresponding + Source of the work are being offered to the general public at no + charge under subsection 6d. + + A separable portion of the object code, whose source code is excluded +from the Corresponding Source as a System Library, need not be +included in conveying the object code work. + + A "User Product" is either (1) a "consumer product", which means any +tangible personal property which is normally used for personal, family, +or household purposes, or (2) anything designed or sold for incorporation +into a dwelling. In determining whether a product is a consumer product, +doubtful cases shall be resolved in favor of coverage. For a particular +product received by a particular user, "normally used" refers to a +typical or common use of that class of product, regardless of the status +of the particular user or of the way in which the particular user +actually uses, or expects or is expected to use, the product. A product +is a consumer product regardless of whether the product has substantial +commercial, industrial or non-consumer uses, unless such uses represent +the only significant mode of use of the product. + + "Installation Information" for a User Product means any methods, +procedures, authorization keys, or other information required to install +and execute modified versions of a covered work in that User Product from +a modified version of its Corresponding Source. The information must +suffice to ensure that the continued functioning of the modified object +code is in no case prevented or interfered with solely because +modification has been made. + + If you convey an object code work under this section in, or with, or +specifically for use in, a User Product, and the conveying occurs as +part of a transaction in which the right of possession and use of the +User Product is transferred to the recipient in perpetuity or for a +fixed term (regardless of how the transaction is characterized), the +Corresponding Source conveyed under this section must be accompanied +by the Installation Information. But this requirement does not apply +if neither you nor any third party retains the ability to install +modified object code on the User Product (for example, the work has +been installed in ROM). + + The requirement to provide Installation Information does not include a +requirement to continue to provide support service, warranty, or updates +for a work that has been modified or installed by the recipient, or for +the User Product in which it has been modified or installed. Access to a +network may be denied when the modification itself materially and +adversely affects the operation of the network or violates the rules and +protocols for communication across the network. + + Corresponding Source conveyed, and Installation Information provided, +in accord with this section must be in a format that is publicly +documented (and with an implementation available to the public in +source code form), and must require no special password or key for +unpacking, reading or copying. + + 7. Additional Terms. + + "Additional permissions" are terms that supplement the terms of this +License by making exceptions from one or more of its conditions. +Additional permissions that are applicable to the entire Program shall +be treated as though they were included in this License, to the extent +that they are valid under applicable law. If additional permissions +apply only to part of the Program, that part may be used separately +under those permissions, but the entire Program remains governed by +this License without regard to the additional permissions. + + When you convey a copy of a covered work, you may at your option +remove any additional permissions from that copy, or from any part of +it. (Additional permissions may be written to require their own +removal in certain cases when you modify the work.) You may place +additional permissions on material, added by you to a covered work, +for which you have or can give appropriate copyright permission. + + Notwithstanding any other provision of this License, for material you +add to a covered work, you may (if authorized by the copyright holders of +that material) supplement the terms of this License with terms: + + a) Disclaiming warranty or limiting liability differently from the + terms of sections 15 and 16 of this License; or + + b) Requiring preservation of specified reasonable legal notices or + author attributions in that material or in the Appropriate Legal + Notices displayed by works containing it; or + + c) Prohibiting misrepresentation of the origin of that material, or + requiring that modified versions of such material be marked in + reasonable ways as different from the original version; or + + d) Limiting the use for publicity purposes of names of licensors or + authors of the material; or + + e) Declining to grant rights under trademark law for use of some + trade names, trademarks, or service marks; or + + f) Requiring indemnification of licensors and authors of that + material by anyone who conveys the material (or modified versions of + it) with contractual assumptions of liability to the recipient, for + any liability that these contractual assumptions directly impose on + those licensors and authors. + + All other non-permissive additional terms are considered "further +restrictions" within the meaning of section 10. If the Program as you +received it, or any part of it, contains a notice stating that it is +governed by this License along with a term that is a further +restriction, you may remove that term. If a license document contains +a further restriction but permits relicensing or conveying under this +License, you may add to a covered work material governed by the terms +of that license document, provided that the further restriction does +not survive such relicensing or conveying. + + If you add terms to a covered work in accord with this section, you +must place, in the relevant source files, a statement of the +additional terms that apply to those files, or a notice indicating +where to find the applicable terms. + + Additional terms, permissive or non-permissive, may be stated in the +form of a separately written license, or stated as exceptions; +the above requirements apply either way. + + 8. Termination. + + You may not propagate or modify a covered work except as expressly +provided under this License. Any attempt otherwise to propagate or +modify it is void, and will automatically terminate your rights under +this License (including any patent licenses granted under the third +paragraph of section 11). + + However, if you cease all violation of this License, then your +license from a particular copyright holder is reinstated (a) +provisionally, unless and until the copyright holder explicitly and +finally terminates your license, and (b) permanently, if the copyright +holder fails to notify you of the violation by some reasonable means +prior to 60 days after the cessation. + + Moreover, your license from a particular copyright holder is +reinstated permanently if the copyright holder notifies you of the +violation by some reasonable means, this is the first time you have +received notice of violation of this License (for any work) from that +copyright holder, and you cure the violation prior to 30 days after +your receipt of the notice. + + Termination of your rights under this section does not terminate the +licenses of parties who have received copies or rights from you under +this License. If your rights have been terminated and not permanently +reinstated, you do not qualify to receive new licenses for the same +material under section 10. + + 9. Acceptance Not Required for Having Copies. + + You are not required to accept this License in order to receive or +run a copy of the Program. Ancillary propagation of a covered work +occurring solely as a consequence of using peer-to-peer transmission +to receive a copy likewise does not require acceptance. However, +nothing other than this License grants you permission to propagate or +modify any covered work. These actions infringe copyright if you do +not accept this License. Therefore, by modifying or propagating a +covered work, you indicate your acceptance of this License to do so. + + 10. Automatic Licensing of Downstream Recipients. + + Each time you convey a covered work, the recipient automatically +receives a license from the original licensors, to run, modify and +propagate that work, subject to this License. You are not responsible +for enforcing compliance by third parties with this License. + + An "entity transaction" is a transaction transferring control of an +organization, or substantially all assets of one, or subdividing an +organization, or merging organizations. If propagation of a covered +work results from an entity transaction, each party to that +transaction who receives a copy of the work also receives whatever +licenses to the work the party's predecessor in interest had or could +give under the previous paragraph, plus a right to possession of the +Corresponding Source of the work from the predecessor in interest, if +the predecessor has it or can get it with reasonable efforts. + + You may not impose any further restrictions on the exercise of the +rights granted or affirmed under this License. For example, you may +not impose a license fee, royalty, or other charge for exercise of +rights granted under this License, and you may not initiate litigation +(including a cross-claim or counterclaim in a lawsuit) alleging that +any patent claim is infringed by making, using, selling, offering for +sale, or importing the Program or any portion of it. + + 11. Patents. + + A "contributor" is a copyright holder who authorizes use under this +License of the Program or a work on which the Program is based. The +work thus licensed is called the contributor's "contributor version". + + A contributor's "essential patent claims" are all patent claims +owned or controlled by the contributor, whether already acquired or +hereafter acquired, that would be infringed by some manner, permitted +by this License, of making, using, or selling its contributor version, +but do not include claims that would be infringed only as a +consequence of further modification of the contributor version. For +purposes of this definition, "control" includes the right to grant +patent sublicenses in a manner consistent with the requirements of +this License. + + Each contributor grants you a non-exclusive, worldwide, royalty-free +patent license under the contributor's essential patent claims, to +make, use, sell, offer for sale, import and otherwise run, modify and +propagate the contents of its contributor version. + + In the following three paragraphs, a "patent license" is any express +agreement or commitment, however denominated, not to enforce a patent +(such as an express permission to practice a patent or covenant not to +sue for patent infringement). To "grant" such a patent license to a +party means to make such an agreement or commitment not to enforce a +patent against the party. + + If you convey a covered work, knowingly relying on a patent license, +and the Corresponding Source of the work is not available for anyone +to copy, free of charge and under the terms of this License, through a +publicly available network server or other readily accessible means, +then you must either (1) cause the Corresponding Source to be so +available, or (2) arrange to deprive yourself of the benefit of the +patent license for this particular work, or (3) arrange, in a manner +consistent with the requirements of this License, to extend the patent +license to downstream recipients. "Knowingly relying" means you have +actual knowledge that, but for the patent license, your conveying the +covered work in a country, or your recipient's use of the covered work +in a country, would infringe one or more identifiable patents in that +country that you have reason to believe are valid. + + If, pursuant to or in connection with a single transaction or +arrangement, you convey, or propagate by procuring conveyance of, a +covered work, and grant a patent license to some of the parties +receiving the covered work authorizing them to use, propagate, modify +or convey a specific copy of the covered work, then the patent license +you grant is automatically extended to all recipients of the covered +work and works based on it. + + A patent license is "discriminatory" if it does not include within +the scope of its coverage, prohibits the exercise of, or is +conditioned on the non-exercise of one or more of the rights that are +specifically granted under this License. You may not convey a covered +work if you are a party to an arrangement with a third party that is +in the business of distributing software, under which you make payment +to the third party based on the extent of your activity of conveying +the work, and under which the third party grants, to any of the +parties who would receive the covered work from you, a discriminatory +patent license (a) in connection with copies of the covered work +conveyed by you (or copies made from those copies), or (b) primarily +for and in connection with specific products or compilations that +contain the covered work, unless you entered into that arrangement, +or that patent license was granted, prior to 28 March 2007. + + Nothing in this License shall be construed as excluding or limiting +any implied license or other defenses to infringement that may +otherwise be available to you under applicable patent law. + + 12. No Surrender of Others' Freedom. + + If conditions are imposed on you (whether by court order, agreement or +otherwise) that contradict the conditions of this License, they do not +excuse you from the conditions of this License. If you cannot convey a +covered work so as to satisfy simultaneously your obligations under this +License and any other pertinent obligations, then as a consequence you may +not convey it at all. For example, if you agree to terms that obligate you +to collect a royalty for further conveying from those to whom you convey +the Program, the only way you could satisfy both those terms and this +License would be to refrain entirely from conveying the Program. + + 13. Remote Network Interaction; Use with the GNU General Public License. + + Notwithstanding any other provision of this License, if you modify the +Program, your modified version must prominently offer all users +interacting with it remotely through a computer network (if your version +supports such interaction) an opportunity to receive the Corresponding +Source of your version by providing access to the Corresponding Source +from a network server at no charge, through some standard or customary +means of facilitating copying of software. This Corresponding Source +shall include the Corresponding Source for any work covered by version 3 +of the GNU General Public License that is incorporated pursuant to the +following paragraph. + + Notwithstanding any other provision of this License, you have +permission to link or combine any covered work with a work licensed +under version 3 of the GNU General Public License into a single +combined work, and to convey the resulting work. The terms of this +License will continue to apply to the part which is the covered work, +but the work with which it is combined will remain governed by version +3 of the GNU General Public License. + + 14. Revised Versions of this License. + + The Free Software Foundation may publish revised and/or new versions of +the GNU Affero General Public License from time to time. Such new versions +will be similar in spirit to the present version, but may differ in detail to +address new problems or concerns. + + Each version is given a distinguishing version number. If the +Program specifies that a certain numbered version of the GNU Affero General +Public License "or any later version" applies to it, you have the +option of following the terms and conditions either of that numbered +version or of any later version published by the Free Software +Foundation. If the Program does not specify a version number of the +GNU Affero General Public License, you may choose any version ever published +by the Free Software Foundation. + + If the Program specifies that a proxy can decide which future +versions of the GNU Affero General Public License can be used, that proxy's +public statement of acceptance of a version permanently authorizes you +to choose that version for the Program. + + Later license versions may give you additional or different +permissions. However, no additional obligations are imposed on any +author or copyright holder as a result of your choosing to follow a +later version. + + 15. Disclaimer of Warranty. + + THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY +APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT +HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY +OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, +THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR +PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM +IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF +ALL NECESSARY SERVICING, REPAIR OR CORRECTION. + + 16. Limitation of Liability. + + IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING +WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS +THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY +GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE +USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF +DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD +PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), +EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF +SUCH DAMAGES. + + 17. Interpretation of Sections 15 and 16. + + If the disclaimer of warranty and limitation of liability provided +above cannot be given local legal effect according to their terms, +reviewing courts shall apply local law that most closely approximates +an absolute waiver of all civil liability in connection with the +Program, unless a warranty or assumption of liability accompanies a +copy of the Program in return for a fee. + + END OF TERMS AND CONDITIONS + + How to Apply These Terms to Your New Programs + + If you develop a new program, and you want it to be of the greatest +possible use to the public, the best way to achieve this is to make it +free software which everyone can redistribute and change under these terms. + + To do so, attach the following notices to the program. It is safest +to attach them to the start of each source file to most effectively +state the exclusion of warranty; and each file should have at least +the "copyright" line and a pointer to where the full notice is found. + + + Copyright (C) + + This program is free software: you can redistribute it and/or modify + it under the terms of the GNU Affero General Public License as published + by the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU Affero General Public License for more details. + + You should have received a copy of the GNU Affero General Public License + along with this program. If not, see . + +Also add information on how to contact you by electronic and paper mail. + + If your software can interact with users remotely through a computer +network, you should also make sure that it provides a way for users to +get its source. For example, if your program is a web application, its +interface could display a "Source" link that leads users to an archive +of the code. There are many ways you could offer source, and different +solutions will be better for different programs; see section 13 for the +specific requirements. + + You should also get your employer (if you work as a programmer) or school, +if any, to sign a "copyright disclaimer" for the program, if necessary. +For more information on this, and how to apply and follow the GNU AGPL, see +. From 697f408d417e5ba0f3c698900b183f1c6b321b61 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Mon, 18 Jul 2022 17:59:18 +0200 Subject: [PATCH 449/531] license stuff --- LICENSE | 32 +- LICENSE.md | 661 ----------------------------- LICENSE.OPENSSL => LICENSE_OPENSSL | 0 3 files changed, 5 insertions(+), 688 deletions(-) delete mode 100644 LICENSE.md rename LICENSE.OPENSSL => LICENSE_OPENSSL (100%) diff --git a/LICENSE b/LICENSE index 052a76b..0ad25db 100644 --- a/LICENSE +++ b/LICENSE @@ -1,12 +1,7 @@ -[see the end of the file for the special exception for linking with OpenSSL - - debian people need this] - - - GNU AFFERO GENERAL PUBLIC LICENSE Version 3, 19 November 2007 - Copyright (C) 2007 Free Software Foundation, Inc. + Copyright (C) 2007 Free Software Foundation, Inc. Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. @@ -638,8 +633,8 @@ the "copyright" line and a pointer to where the full notice is found. Copyright (C) This program is free software: you can redistribute it and/or modify - it under the terms of the GNU Affero General Public License as published by - the Free Software Foundation, either version 3 of the License, or + it under the terms of the GNU Affero General Public License as published + by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, @@ -648,7 +643,7 @@ the "copyright" line and a pointer to where the full notice is found. GNU Affero General Public License for more details. You should have received a copy of the GNU Affero General Public License - along with this program. If not, see . + along with this program. If not, see . Also add information on how to contact you by electronic and paper mail. @@ -663,21 +658,4 @@ specific requirements. You should also get your employer (if you work as a programmer) or school, if any, to sign a "copyright disclaimer" for the program, if necessary. For more information on this, and how to apply and follow the GNU AGPL, see -. - - -Special Exception - - * In addition, as a special exception, the copyright holders give - * permission to link the code of portions of this program with the - * OpenSSL library under certain conditions as described in each - * individual source file, and distribute linked combinations - * including the two. - * You must obey the GNU Affero General Public License in all respects - * for all of the code used other than OpenSSL. If you modify - * file(s) with this exception, you may extend this exception to your - * version of the file(s), but you are not obligated to do so. If you - * do not wish to do so, delete this exception statement from your - * version. If you delete this exception statement from all source - * files in the program, then also delete it here. - +. diff --git a/LICENSE.md b/LICENSE.md deleted file mode 100644 index 0ad25db..0000000 --- a/LICENSE.md +++ /dev/null @@ -1,661 +0,0 @@ - GNU AFFERO GENERAL PUBLIC LICENSE - Version 3, 19 November 2007 - - Copyright (C) 2007 Free Software Foundation, Inc. - Everyone is permitted to copy and distribute verbatim copies - of this license document, but changing it is not allowed. - - Preamble - - The GNU Affero General Public License is a free, copyleft license for -software and other kinds of works, specifically designed to ensure -cooperation with the community in the case of network server software. - - The licenses for most software and other practical works are designed -to take away your freedom to share and change the works. By contrast, -our General Public Licenses are intended to guarantee your freedom to -share and change all versions of a program--to make sure it remains free -software for all its users. - - When we speak of free software, we are referring to freedom, not -price. Our General Public Licenses are designed to make sure that you -have the freedom to distribute copies of free software (and charge for -them if you wish), that you receive source code or can get it if you -want it, that you can change the software or use pieces of it in new -free programs, and that you know you can do these things. - - Developers that use our General Public Licenses protect your rights -with two steps: (1) assert copyright on the software, and (2) offer -you this License which gives you legal permission to copy, distribute -and/or modify the software. - - A secondary benefit of defending all users' freedom is that -improvements made in alternate versions of the program, if they -receive widespread use, become available for other developers to -incorporate. Many developers of free software are heartened and -encouraged by the resulting cooperation. However, in the case of -software used on network servers, this result may fail to come about. -The GNU General Public License permits making a modified version and -letting the public access it on a server without ever releasing its -source code to the public. - - The GNU Affero General Public License is designed specifically to -ensure that, in such cases, the modified source code becomes available -to the community. It requires the operator of a network server to -provide the source code of the modified version running there to the -users of that server. Therefore, public use of a modified version, on -a publicly accessible server, gives the public access to the source -code of the modified version. - - An older license, called the Affero General Public License and -published by Affero, was designed to accomplish similar goals. This is -a different license, not a version of the Affero GPL, but Affero has -released a new version of the Affero GPL which permits relicensing under -this license. - - The precise terms and conditions for copying, distribution and -modification follow. - - TERMS AND CONDITIONS - - 0. Definitions. - - "This License" refers to version 3 of the GNU Affero General Public License. - - "Copyright" also means copyright-like laws that apply to other kinds of -works, such as semiconductor masks. - - "The Program" refers to any copyrightable work licensed under this -License. Each licensee is addressed as "you". "Licensees" and -"recipients" may be individuals or organizations. - - To "modify" a work means to copy from or adapt all or part of the work -in a fashion requiring copyright permission, other than the making of an -exact copy. The resulting work is called a "modified version" of the -earlier work or a work "based on" the earlier work. - - A "covered work" means either the unmodified Program or a work based -on the Program. - - To "propagate" a work means to do anything with it that, without -permission, would make you directly or secondarily liable for -infringement under applicable copyright law, except executing it on a -computer or modifying a private copy. Propagation includes copying, -distribution (with or without modification), making available to the -public, and in some countries other activities as well. - - To "convey" a work means any kind of propagation that enables other -parties to make or receive copies. Mere interaction with a user through -a computer network, with no transfer of a copy, is not conveying. - - An interactive user interface displays "Appropriate Legal Notices" -to the extent that it includes a convenient and prominently visible -feature that (1) displays an appropriate copyright notice, and (2) -tells the user that there is no warranty for the work (except to the -extent that warranties are provided), that licensees may convey the -work under this License, and how to view a copy of this License. If -the interface presents a list of user commands or options, such as a -menu, a prominent item in the list meets this criterion. - - 1. Source Code. - - The "source code" for a work means the preferred form of the work -for making modifications to it. "Object code" means any non-source -form of a work. - - A "Standard Interface" means an interface that either is an official -standard defined by a recognized standards body, or, in the case of -interfaces specified for a particular programming language, one that -is widely used among developers working in that language. - - The "System Libraries" of an executable work include anything, other -than the work as a whole, that (a) is included in the normal form of -packaging a Major Component, but which is not part of that Major -Component, and (b) serves only to enable use of the work with that -Major Component, or to implement a Standard Interface for which an -implementation is available to the public in source code form. A -"Major Component", in this context, means a major essential component -(kernel, window system, and so on) of the specific operating system -(if any) on which the executable work runs, or a compiler used to -produce the work, or an object code interpreter used to run it. - - The "Corresponding Source" for a work in object code form means all -the source code needed to generate, install, and (for an executable -work) run the object code and to modify the work, including scripts to -control those activities. However, it does not include the work's -System Libraries, or general-purpose tools or generally available free -programs which are used unmodified in performing those activities but -which are not part of the work. For example, Corresponding Source -includes interface definition files associated with source files for -the work, and the source code for shared libraries and dynamically -linked subprograms that the work is specifically designed to require, -such as by intimate data communication or control flow between those -subprograms and other parts of the work. - - The Corresponding Source need not include anything that users -can regenerate automatically from other parts of the Corresponding -Source. - - The Corresponding Source for a work in source code form is that -same work. - - 2. Basic Permissions. - - All rights granted under this License are granted for the term of -copyright on the Program, and are irrevocable provided the stated -conditions are met. This License explicitly affirms your unlimited -permission to run the unmodified Program. The output from running a -covered work is covered by this License only if the output, given its -content, constitutes a covered work. This License acknowledges your -rights of fair use or other equivalent, as provided by copyright law. - - You may make, run and propagate covered works that you do not -convey, without conditions so long as your license otherwise remains -in force. You may convey covered works to others for the sole purpose -of having them make modifications exclusively for you, or provide you -with facilities for running those works, provided that you comply with -the terms of this License in conveying all material for which you do -not control copyright. Those thus making or running the covered works -for you must do so exclusively on your behalf, under your direction -and control, on terms that prohibit them from making any copies of -your copyrighted material outside their relationship with you. - - Conveying under any other circumstances is permitted solely under -the conditions stated below. Sublicensing is not allowed; section 10 -makes it unnecessary. - - 3. Protecting Users' Legal Rights From Anti-Circumvention Law. - - No covered work shall be deemed part of an effective technological -measure under any applicable law fulfilling obligations under article -11 of the WIPO copyright treaty adopted on 20 December 1996, or -similar laws prohibiting or restricting circumvention of such -measures. - - When you convey a covered work, you waive any legal power to forbid -circumvention of technological measures to the extent such circumvention -is effected by exercising rights under this License with respect to -the covered work, and you disclaim any intention to limit operation or -modification of the work as a means of enforcing, against the work's -users, your or third parties' legal rights to forbid circumvention of -technological measures. - - 4. Conveying Verbatim Copies. - - You may convey verbatim copies of the Program's source code as you -receive it, in any medium, provided that you conspicuously and -appropriately publish on each copy an appropriate copyright notice; -keep intact all notices stating that this License and any -non-permissive terms added in accord with section 7 apply to the code; -keep intact all notices of the absence of any warranty; and give all -recipients a copy of this License along with the Program. - - You may charge any price or no price for each copy that you convey, -and you may offer support or warranty protection for a fee. - - 5. Conveying Modified Source Versions. - - You may convey a work based on the Program, or the modifications to -produce it from the Program, in the form of source code under the -terms of section 4, provided that you also meet all of these conditions: - - a) The work must carry prominent notices stating that you modified - it, and giving a relevant date. - - b) The work must carry prominent notices stating that it is - released under this License and any conditions added under section - 7. This requirement modifies the requirement in section 4 to - "keep intact all notices". - - c) You must license the entire work, as a whole, under this - License to anyone who comes into possession of a copy. This - License will therefore apply, along with any applicable section 7 - additional terms, to the whole of the work, and all its parts, - regardless of how they are packaged. This License gives no - permission to license the work in any other way, but it does not - invalidate such permission if you have separately received it. - - d) If the work has interactive user interfaces, each must display - Appropriate Legal Notices; however, if the Program has interactive - interfaces that do not display Appropriate Legal Notices, your - work need not make them do so. - - A compilation of a covered work with other separate and independent -works, which are not by their nature extensions of the covered work, -and which are not combined with it such as to form a larger program, -in or on a volume of a storage or distribution medium, is called an -"aggregate" if the compilation and its resulting copyright are not -used to limit the access or legal rights of the compilation's users -beyond what the individual works permit. Inclusion of a covered work -in an aggregate does not cause this License to apply to the other -parts of the aggregate. - - 6. Conveying Non-Source Forms. - - You may convey a covered work in object code form under the terms -of sections 4 and 5, provided that you also convey the -machine-readable Corresponding Source under the terms of this License, -in one of these ways: - - a) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by the - Corresponding Source fixed on a durable physical medium - customarily used for software interchange. - - b) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by a - written offer, valid for at least three years and valid for as - long as you offer spare parts or customer support for that product - model, to give anyone who possesses the object code either (1) a - copy of the Corresponding Source for all the software in the - product that is covered by this License, on a durable physical - medium customarily used for software interchange, for a price no - more than your reasonable cost of physically performing this - conveying of source, or (2) access to copy the - Corresponding Source from a network server at no charge. - - c) Convey individual copies of the object code with a copy of the - written offer to provide the Corresponding Source. This - alternative is allowed only occasionally and noncommercially, and - only if you received the object code with such an offer, in accord - with subsection 6b. - - d) Convey the object code by offering access from a designated - place (gratis or for a charge), and offer equivalent access to the - Corresponding Source in the same way through the same place at no - further charge. You need not require recipients to copy the - Corresponding Source along with the object code. If the place to - copy the object code is a network server, the Corresponding Source - may be on a different server (operated by you or a third party) - that supports equivalent copying facilities, provided you maintain - clear directions next to the object code saying where to find the - Corresponding Source. Regardless of what server hosts the - Corresponding Source, you remain obligated to ensure that it is - available for as long as needed to satisfy these requirements. - - e) Convey the object code using peer-to-peer transmission, provided - you inform other peers where the object code and Corresponding - Source of the work are being offered to the general public at no - charge under subsection 6d. - - A separable portion of the object code, whose source code is excluded -from the Corresponding Source as a System Library, need not be -included in conveying the object code work. - - A "User Product" is either (1) a "consumer product", which means any -tangible personal property which is normally used for personal, family, -or household purposes, or (2) anything designed or sold for incorporation -into a dwelling. In determining whether a product is a consumer product, -doubtful cases shall be resolved in favor of coverage. For a particular -product received by a particular user, "normally used" refers to a -typical or common use of that class of product, regardless of the status -of the particular user or of the way in which the particular user -actually uses, or expects or is expected to use, the product. A product -is a consumer product regardless of whether the product has substantial -commercial, industrial or non-consumer uses, unless such uses represent -the only significant mode of use of the product. - - "Installation Information" for a User Product means any methods, -procedures, authorization keys, or other information required to install -and execute modified versions of a covered work in that User Product from -a modified version of its Corresponding Source. The information must -suffice to ensure that the continued functioning of the modified object -code is in no case prevented or interfered with solely because -modification has been made. - - If you convey an object code work under this section in, or with, or -specifically for use in, a User Product, and the conveying occurs as -part of a transaction in which the right of possession and use of the -User Product is transferred to the recipient in perpetuity or for a -fixed term (regardless of how the transaction is characterized), the -Corresponding Source conveyed under this section must be accompanied -by the Installation Information. But this requirement does not apply -if neither you nor any third party retains the ability to install -modified object code on the User Product (for example, the work has -been installed in ROM). - - The requirement to provide Installation Information does not include a -requirement to continue to provide support service, warranty, or updates -for a work that has been modified or installed by the recipient, or for -the User Product in which it has been modified or installed. Access to a -network may be denied when the modification itself materially and -adversely affects the operation of the network or violates the rules and -protocols for communication across the network. - - Corresponding Source conveyed, and Installation Information provided, -in accord with this section must be in a format that is publicly -documented (and with an implementation available to the public in -source code form), and must require no special password or key for -unpacking, reading or copying. - - 7. Additional Terms. - - "Additional permissions" are terms that supplement the terms of this -License by making exceptions from one or more of its conditions. -Additional permissions that are applicable to the entire Program shall -be treated as though they were included in this License, to the extent -that they are valid under applicable law. If additional permissions -apply only to part of the Program, that part may be used separately -under those permissions, but the entire Program remains governed by -this License without regard to the additional permissions. - - When you convey a copy of a covered work, you may at your option -remove any additional permissions from that copy, or from any part of -it. (Additional permissions may be written to require their own -removal in certain cases when you modify the work.) You may place -additional permissions on material, added by you to a covered work, -for which you have or can give appropriate copyright permission. - - Notwithstanding any other provision of this License, for material you -add to a covered work, you may (if authorized by the copyright holders of -that material) supplement the terms of this License with terms: - - a) Disclaiming warranty or limiting liability differently from the - terms of sections 15 and 16 of this License; or - - b) Requiring preservation of specified reasonable legal notices or - author attributions in that material or in the Appropriate Legal - Notices displayed by works containing it; or - - c) Prohibiting misrepresentation of the origin of that material, or - requiring that modified versions of such material be marked in - reasonable ways as different from the original version; or - - d) Limiting the use for publicity purposes of names of licensors or - authors of the material; or - - e) Declining to grant rights under trademark law for use of some - trade names, trademarks, or service marks; or - - f) Requiring indemnification of licensors and authors of that - material by anyone who conveys the material (or modified versions of - it) with contractual assumptions of liability to the recipient, for - any liability that these contractual assumptions directly impose on - those licensors and authors. - - All other non-permissive additional terms are considered "further -restrictions" within the meaning of section 10. If the Program as you -received it, or any part of it, contains a notice stating that it is -governed by this License along with a term that is a further -restriction, you may remove that term. If a license document contains -a further restriction but permits relicensing or conveying under this -License, you may add to a covered work material governed by the terms -of that license document, provided that the further restriction does -not survive such relicensing or conveying. - - If you add terms to a covered work in accord with this section, you -must place, in the relevant source files, a statement of the -additional terms that apply to those files, or a notice indicating -where to find the applicable terms. - - Additional terms, permissive or non-permissive, may be stated in the -form of a separately written license, or stated as exceptions; -the above requirements apply either way. - - 8. Termination. - - You may not propagate or modify a covered work except as expressly -provided under this License. Any attempt otherwise to propagate or -modify it is void, and will automatically terminate your rights under -this License (including any patent licenses granted under the third -paragraph of section 11). - - However, if you cease all violation of this License, then your -license from a particular copyright holder is reinstated (a) -provisionally, unless and until the copyright holder explicitly and -finally terminates your license, and (b) permanently, if the copyright -holder fails to notify you of the violation by some reasonable means -prior to 60 days after the cessation. - - Moreover, your license from a particular copyright holder is -reinstated permanently if the copyright holder notifies you of the -violation by some reasonable means, this is the first time you have -received notice of violation of this License (for any work) from that -copyright holder, and you cure the violation prior to 30 days after -your receipt of the notice. - - Termination of your rights under this section does not terminate the -licenses of parties who have received copies or rights from you under -this License. If your rights have been terminated and not permanently -reinstated, you do not qualify to receive new licenses for the same -material under section 10. - - 9. Acceptance Not Required for Having Copies. - - You are not required to accept this License in order to receive or -run a copy of the Program. Ancillary propagation of a covered work -occurring solely as a consequence of using peer-to-peer transmission -to receive a copy likewise does not require acceptance. However, -nothing other than this License grants you permission to propagate or -modify any covered work. These actions infringe copyright if you do -not accept this License. Therefore, by modifying or propagating a -covered work, you indicate your acceptance of this License to do so. - - 10. Automatic Licensing of Downstream Recipients. - - Each time you convey a covered work, the recipient automatically -receives a license from the original licensors, to run, modify and -propagate that work, subject to this License. You are not responsible -for enforcing compliance by third parties with this License. - - An "entity transaction" is a transaction transferring control of an -organization, or substantially all assets of one, or subdividing an -organization, or merging organizations. If propagation of a covered -work results from an entity transaction, each party to that -transaction who receives a copy of the work also receives whatever -licenses to the work the party's predecessor in interest had or could -give under the previous paragraph, plus a right to possession of the -Corresponding Source of the work from the predecessor in interest, if -the predecessor has it or can get it with reasonable efforts. - - You may not impose any further restrictions on the exercise of the -rights granted or affirmed under this License. For example, you may -not impose a license fee, royalty, or other charge for exercise of -rights granted under this License, and you may not initiate litigation -(including a cross-claim or counterclaim in a lawsuit) alleging that -any patent claim is infringed by making, using, selling, offering for -sale, or importing the Program or any portion of it. - - 11. Patents. - - A "contributor" is a copyright holder who authorizes use under this -License of the Program or a work on which the Program is based. The -work thus licensed is called the contributor's "contributor version". - - A contributor's "essential patent claims" are all patent claims -owned or controlled by the contributor, whether already acquired or -hereafter acquired, that would be infringed by some manner, permitted -by this License, of making, using, or selling its contributor version, -but do not include claims that would be infringed only as a -consequence of further modification of the contributor version. For -purposes of this definition, "control" includes the right to grant -patent sublicenses in a manner consistent with the requirements of -this License. - - Each contributor grants you a non-exclusive, worldwide, royalty-free -patent license under the contributor's essential patent claims, to -make, use, sell, offer for sale, import and otherwise run, modify and -propagate the contents of its contributor version. - - In the following three paragraphs, a "patent license" is any express -agreement or commitment, however denominated, not to enforce a patent -(such as an express permission to practice a patent or covenant not to -sue for patent infringement). To "grant" such a patent license to a -party means to make such an agreement or commitment not to enforce a -patent against the party. - - If you convey a covered work, knowingly relying on a patent license, -and the Corresponding Source of the work is not available for anyone -to copy, free of charge and under the terms of this License, through a -publicly available network server or other readily accessible means, -then you must either (1) cause the Corresponding Source to be so -available, or (2) arrange to deprive yourself of the benefit of the -patent license for this particular work, or (3) arrange, in a manner -consistent with the requirements of this License, to extend the patent -license to downstream recipients. "Knowingly relying" means you have -actual knowledge that, but for the patent license, your conveying the -covered work in a country, or your recipient's use of the covered work -in a country, would infringe one or more identifiable patents in that -country that you have reason to believe are valid. - - If, pursuant to or in connection with a single transaction or -arrangement, you convey, or propagate by procuring conveyance of, a -covered work, and grant a patent license to some of the parties -receiving the covered work authorizing them to use, propagate, modify -or convey a specific copy of the covered work, then the patent license -you grant is automatically extended to all recipients of the covered -work and works based on it. - - A patent license is "discriminatory" if it does not include within -the scope of its coverage, prohibits the exercise of, or is -conditioned on the non-exercise of one or more of the rights that are -specifically granted under this License. You may not convey a covered -work if you are a party to an arrangement with a third party that is -in the business of distributing software, under which you make payment -to the third party based on the extent of your activity of conveying -the work, and under which the third party grants, to any of the -parties who would receive the covered work from you, a discriminatory -patent license (a) in connection with copies of the covered work -conveyed by you (or copies made from those copies), or (b) primarily -for and in connection with specific products or compilations that -contain the covered work, unless you entered into that arrangement, -or that patent license was granted, prior to 28 March 2007. - - Nothing in this License shall be construed as excluding or limiting -any implied license or other defenses to infringement that may -otherwise be available to you under applicable patent law. - - 12. No Surrender of Others' Freedom. - - If conditions are imposed on you (whether by court order, agreement or -otherwise) that contradict the conditions of this License, they do not -excuse you from the conditions of this License. If you cannot convey a -covered work so as to satisfy simultaneously your obligations under this -License and any other pertinent obligations, then as a consequence you may -not convey it at all. For example, if you agree to terms that obligate you -to collect a royalty for further conveying from those to whom you convey -the Program, the only way you could satisfy both those terms and this -License would be to refrain entirely from conveying the Program. - - 13. Remote Network Interaction; Use with the GNU General Public License. - - Notwithstanding any other provision of this License, if you modify the -Program, your modified version must prominently offer all users -interacting with it remotely through a computer network (if your version -supports such interaction) an opportunity to receive the Corresponding -Source of your version by providing access to the Corresponding Source -from a network server at no charge, through some standard or customary -means of facilitating copying of software. This Corresponding Source -shall include the Corresponding Source for any work covered by version 3 -of the GNU General Public License that is incorporated pursuant to the -following paragraph. - - Notwithstanding any other provision of this License, you have -permission to link or combine any covered work with a work licensed -under version 3 of the GNU General Public License into a single -combined work, and to convey the resulting work. The terms of this -License will continue to apply to the part which is the covered work, -but the work with which it is combined will remain governed by version -3 of the GNU General Public License. - - 14. Revised Versions of this License. - - The Free Software Foundation may publish revised and/or new versions of -the GNU Affero General Public License from time to time. Such new versions -will be similar in spirit to the present version, but may differ in detail to -address new problems or concerns. - - Each version is given a distinguishing version number. If the -Program specifies that a certain numbered version of the GNU Affero General -Public License "or any later version" applies to it, you have the -option of following the terms and conditions either of that numbered -version or of any later version published by the Free Software -Foundation. If the Program does not specify a version number of the -GNU Affero General Public License, you may choose any version ever published -by the Free Software Foundation. - - If the Program specifies that a proxy can decide which future -versions of the GNU Affero General Public License can be used, that proxy's -public statement of acceptance of a version permanently authorizes you -to choose that version for the Program. - - Later license versions may give you additional or different -permissions. However, no additional obligations are imposed on any -author or copyright holder as a result of your choosing to follow a -later version. - - 15. Disclaimer of Warranty. - - THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY -APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT -HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY -OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, -THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR -PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM -IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF -ALL NECESSARY SERVICING, REPAIR OR CORRECTION. - - 16. Limitation of Liability. - - IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING -WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS -THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY -GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE -USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF -DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD -PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), -EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF -SUCH DAMAGES. - - 17. Interpretation of Sections 15 and 16. - - If the disclaimer of warranty and limitation of liability provided -above cannot be given local legal effect according to their terms, -reviewing courts shall apply local law that most closely approximates -an absolute waiver of all civil liability in connection with the -Program, unless a warranty or assumption of liability accompanies a -copy of the Program in return for a fee. - - END OF TERMS AND CONDITIONS - - How to Apply These Terms to Your New Programs - - If you develop a new program, and you want it to be of the greatest -possible use to the public, the best way to achieve this is to make it -free software which everyone can redistribute and change under these terms. - - To do so, attach the following notices to the program. It is safest -to attach them to the start of each source file to most effectively -state the exclusion of warranty; and each file should have at least -the "copyright" line and a pointer to where the full notice is found. - - - Copyright (C) - - This program is free software: you can redistribute it and/or modify - it under the terms of the GNU Affero General Public License as published - by the Free Software Foundation, either version 3 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU Affero General Public License for more details. - - You should have received a copy of the GNU Affero General Public License - along with this program. If not, see . - -Also add information on how to contact you by electronic and paper mail. - - If your software can interact with users remotely through a computer -network, you should also make sure that it provides a way for users to -get its source. For example, if your program is a web application, its -interface could display a "Source" link that leads users to an archive -of the code. There are many ways you could offer source, and different -solutions will be better for different programs; see section 13 for the -specific requirements. - - You should also get your employer (if you work as a programmer) or school, -if any, to sign a "copyright disclaimer" for the program, if necessary. -For more information on this, and how to apply and follow the GNU AGPL, see -. diff --git a/LICENSE.OPENSSL b/LICENSE_OPENSSL similarity index 100% rename from LICENSE.OPENSSL rename to LICENSE_OPENSSL From 5cb9e50cc58a568a14542d682619834b5549f7ac Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Thu, 4 Aug 2022 09:20:06 +0200 Subject: [PATCH 450/531] fix for http-form redirect --- hydra-http-form.c | 38 +++++++++++++++++++++----------------- 1 file changed, 21 insertions(+), 17 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 983b525..a864088 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -983,9 +983,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options while (found == 0 && redirected_flag && !code_302_is_success && (redirected_url_buff[0] != 0) && (redirected_cpt > 0)) { // we have to split the location char *startloc, *endloc; - char str[2048]; - char str2[2048]; - char str3[2048]; + char str[2048], str2[2048], str3[2048], str4[2048]; redirected_cpt--; redirected_flag = 0; @@ -1004,19 +1002,21 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options startloc += strlen("://"); if ((endloc = strchr(startloc, '\r')) != NULL) { - startloc[endloc - startloc] = 0; + *endloc = 0; } if ((endloc = strchr(startloc, '\n')) != NULL) { - startloc[endloc - startloc] = 0; + *endloc = 0; } - strcpy(str, startloc); + strncpy(str, startloc, sizeof(str) - 1); + str[sizeof(str) - 1] = 0; endloc = strchr(str, '/'); if (endloc != NULL) { strncpy(str2, str, endloc - str); str2[endloc - str] = 0; - } else - strncpy(str2, str, sizeof(str)); + } else { + strcpy(str2, str); + } if (strlen(str) - strlen(str2) == 0) { strcpy(str3, "/"); @@ -1025,7 +1025,8 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options str3[strlen(str) - strlen(str2)] = 0; } } else { - strncpy(str2, webtarget, sizeof(str2)); + strncpy(str2, webtarget, sizeof(str2) - 1); + str2[sizeof(str2) - 1] = 0; if (redirected_url_buff[0] != '/') { // it's a relative path, so we have to concatenate it // with the path from the first url given @@ -1041,8 +1042,10 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options } else { sprintf(str3, "%.1000s/%.1000s", url, redirected_url_buff); } - } else - strncpy(str3, redirected_url_buff, sizeof(str3)); + } else { + strncpy(str3, redirected_url_buff, sizeof(str3) - 1); + str3[sizeof(str3) - 1] = 0; + } if (debug) hydra_report(stderr, "[DEBUG] host=%s redirect=%s origin=%s\n", str2, str3, url); } @@ -1054,12 +1057,13 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options str3[0] = '/'; } - if (strrchr(url, ':') == NULL && port != 80) { - sprintf(str2, "%.2040s:%d", str2, port); + if (strrchr(str2, ':') == NULL && (port != 80 || port != 443)) { + sprintf(str4, "%.2000s:%d", str2, port); + strcpy(str2, str4); } if (verbose) - hydra_report(stderr, "[VERBOSE] Page redirected to http://%s%s\n", str2, str3); + hydra_report(stderr, "[VERBOSE] Page redirected to http[s]://%s%s\n", str2, str3); if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) hdrrepv(&ptr_head, "Content-Length", "0"); @@ -1315,19 +1319,19 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) { optional1 = NULL; if (strstr(url, "\\:") != NULL) { - if ((ptr = malloc(strlen(url))) != NULL) { + if ((ptr = malloc(strlen(url) + 1)) != NULL) { strcpy(ptr, hydra_strrep(url, "\\:", ":")); url = ptr; } } if (strstr(variables, "\\:") != NULL) { - if ((ptr = malloc(strlen(variables))) != NULL) { + if ((ptr = malloc(strlen(variables) + 1)) != NULL) { strcpy(ptr, hydra_strrep(variables, "\\:", ":")); variables = ptr; } } if (strstr(cond, "\\:") != NULL) { - if ((ptr = malloc(strlen(cond))) != NULL) { + if ((ptr = malloc(strlen(cond) + 1)) != NULL) { strcpy(ptr, hydra_strrep(cond, "\\:", ":")); cond = ptr; } From 45d2f2dd67d2a18a993536187079d6a1eaa8a9b0 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Thu, 8 Sep 2022 10:32:44 +0200 Subject: [PATCH 451/531] v9.4 release --- CHANGES | 2 +- hydra.c | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/CHANGES b/CHANGES index 9727b33..8fd6cf4 100644 --- a/CHANGES +++ b/CHANGES @@ -1,7 +1,7 @@ Changelog for hydra ------------------- -Release 9.4-dev +Release 9.4 * Switched from pcre/pcre3 to pcre2 as pcre/pcre3 will be dropped from Debian * Small fix for weird RTSP servers * Added "2=" optional parameter to http-post-form module to tell hydra that diff --git a/hydra.c b/hydra.c index b464010..12772bb 100644 --- a/hydra.c +++ b/hydra.c @@ -228,7 +228,7 @@ char *SERVICES = "adam6500 asterisk afp cisco cisco-enable cobaltstrike cvs fire #define RESTOREFILE "./hydra.restore" #define PROGRAM "Hydra" -#define VERSION "v9.4-dev" +#define VERSION "v9.4" #define AUTHOR "van Hauser/THC" #define EMAIL "" #define AUTHOR2 "David Maciejak" From 28aaa7bab9f25bfff9f4dfb03a02cd3fb5a526f6 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Thu, 8 Sep 2022 10:33:59 +0200 Subject: [PATCH 452/531] v9.5-dev init --- CHANGES | 4 ++++ hydra.c | 2 +- 2 files changed, 5 insertions(+), 1 deletion(-) diff --git a/CHANGES b/CHANGES index 8fd6cf4..2111ce2 100644 --- a/CHANGES +++ b/CHANGES @@ -1,6 +1,10 @@ Changelog for hydra ------------------- +Release 9.5-dev +* ... your patch? :) + + Release 9.4 * Switched from pcre/pcre3 to pcre2 as pcre/pcre3 will be dropped from Debian * Small fix for weird RTSP servers diff --git a/hydra.c b/hydra.c index 12772bb..2e4f2ab 100644 --- a/hydra.c +++ b/hydra.c @@ -228,7 +228,7 @@ char *SERVICES = "adam6500 asterisk afp cisco cisco-enable cobaltstrike cvs fire #define RESTOREFILE "./hydra.restore" #define PROGRAM "Hydra" -#define VERSION "v9.4" +#define VERSION "v9.5-dev" #define AUTHOR "van Hauser/THC" #define EMAIL "" #define AUTHOR2 "David Maciejak" From 613bd02264dcc989eeeb77b83603d4c2f48f0bbc Mon Sep 17 00:00:00 2001 From: Sam James Date: Fri, 9 Sep 2022 04:32:05 +0100 Subject: [PATCH 453/531] Makefile.am: add -D_GNU_SOURCE for strcasestr MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit strcasestr is not a standard function and per the man page, needs -D_GNU_SOURCE to be visible. Fixes a build error: ``` hydra-rtsp.c:20:7: error: implicit declaration of function ‘strcasestr’; did you mean ‘strcasecmp’? [-Werror=implicit-function-declaration] 20 | if (strcasestr(s, "401 Unauthorized") != NULL) { | ^~~~~~~~~~ | strcasecmp ``` Signed-off-by: Sam James --- Makefile.am | 1 + 1 file changed, 1 insertion(+) diff --git a/Makefile.am b/Makefile.am index 8cd56d1..a8da8d6 100644 --- a/Makefile.am +++ b/Makefile.am @@ -5,6 +5,7 @@ WARN_CLANG=-Wformat-nonliteral -Wstrncat-size -Wformat-security -Wsign-conversio WARN_GCC=-Wformat=2 -Wformat-overflow=2 -Wformat-nonliteral -Wformat-truncation=2 -Wnull-dereference -Wstrict-overflow=2 -Wstringop-overflow=4 -Walloca-larger-than=4096 -Wtype-limits -Wconversion -Wtrampolines -Wstrict-prototypes -Wmissing-prototypes -Wmissing-declarations -fno-common -Wcast-align CFLAGS ?= -g OPTS=-I. -O3 $(CFLAGS) -fcommon +CPPFLAGS += -D_GNU_SOURCE # -Wall -g -pedantic LIBS=-lm DESTDIR ?= From 882a1a3aaca6257069fa8619352cb986973ff98b Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Thu, 29 Sep 2022 10:01:56 +0200 Subject: [PATCH 454/531] fix http-...-form help --- CHANGES | 3 ++- hydra-http-form.c | 48 +++++++++++++++++++++++------------------------ 2 files changed, 25 insertions(+), 26 deletions(-) diff --git a/CHANGES b/CHANGES index 2111ce2..3d61f77 100644 --- a/CHANGES +++ b/CHANGES @@ -2,7 +2,8 @@ Changelog for hydra ------------------- Release 9.5-dev -* ... your patch? :) +* The help for http forms was wrong. the condition variable must always be + the *last* parameter, not the third Release 9.4 diff --git a/hydra-http-form.c b/hydra-http-form.c index a864088..93953dc 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -1434,27 +1434,26 @@ void usage_http_form(const char *service) { "redirections in\n" "a row. It always gathers a new cookie from the same URL without " "variables\n" - "The parameters take three \":\" separated values, plus optional " + "The parameters requires three \":\" separated values, plus optional " "values.\n" "(Note: if you need a colon in the option string as value, escape it " "with \"\\:\", but do not escape a \"\\\" with \"\\\\\".)\n" - "\nSyntax: ::[:[:]\n" - "First is the page on the server to GET or POST to (URL).\n" - "Second is the POST/GET variables (taken from either the browser, proxy, " - "etc.\n" - " with url-encoded (resp. base64-encoded) usernames and passwords being " - "replaced in the\n" - " \"^USER^\" (resp. \"^USER64^\") and \"^PASS^\" (resp. \"^PASS64^\") " - "placeholders (FORM PARAMETERS)\n" - "Third is the string that it checks for an *invalid* login (by default)\n" - " Invalid condition login check can be preceded by \"F=\", successful " - "condition\n" + "\nSyntax: :[:[:]:\n" + "\nFirst is the page on the server to GET or POST to (URL), e.g. \"/login\".\n" + "Second is the POST/GET variables (taken from either the browser, proxy, etc.)\n" + " without the initial '?' character and the usernames and passwords being\n" + " replaced with \"^USER^\" (\"^USER64^\" for base64 encodings) and \"^PASS^\"\n" + " (\"^PASS64^\" for base64 encodings).\n" + "Third are optional parameters (see below)\n" + "Last is the string that it checks for an *invalid* login (by default).\n" + " Invalid condition login check can be preceded by \"F=\", successful condition\n" " login check must be preceded by \"S=\".\n" - " This is where most people get it wrong. You have to check the webapp " - "what a\n" - " failed string looks like and put it in this parameter! Add the -d switch to see\nthe sent/received data!\n" - "\nThe following parameters are optional:\n" + " This is where most people get it wrong! You have to check the webapp what a\n" + " failed string looks like and put it in this parameter! Add the -d switch to see\n" + " the sent/received data!\n" + " Note that using invalid login condition checks can result in false positives!\n" + "\nThe following parameters are optional and are put between the form parameters\n" + " and the condition string; seperate them too with colons:\n" " 2= 302 page forward return codes identify a successful attempt\n" " (c|C)=/page/uri to define a different page to gather initial " "cookies from\n" @@ -1469,17 +1468,16 @@ void usage_http_form(const char *service) { "exists, by the\n" " one supplied by the user, or add the header at the " "end\n" - "\nNote that if you are going to put colons (:) in your headers you should escape them with a backslash (\\).\n" - " All colons that are not option separators should be escaped (see the " - "examples above and below).\n" - " You can specify a header without escaping the colons, but that way you " - "will not be able to put colons\n" - " in the header value itself, as they will be interpreted by hydra as " - "option separators.\n" + "\nNote that if you are going to put colons (:) in your headers you should escape\n" + "them with a backslash (\\). All colons that are not option separators should be\n" + "escaped (see the examples above and below).\n" + "You can specify a header without escaping the colons, but that way you will not\n" + "be able to put colons in the header value itself, as they will be interpreted by\n" + "hydra as option separators.\n" "\nExamples:\n" " \"/login.php:user=^USER^&pass=^PASS^:incorrect\"\n" " \"/" - "login.php:user=^USER64^&pass=^PASS64^&colon=colon\\:escape:S=authlog=.*" + "login.php:user=^USER64^&pass=^PASS64^&colon=colon\\:escape:S=result=" "success\"\n" " \"/login.php:user=^USER^&pass=^PASS^&mid=123:authlog=.*failed\"\n" " \"/:user=^USER&pass=^PASS^:failed:H=Authorization\\: Basic " From 8ddec0107b57b356820a8f19ca50d2cb5ea687ed Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Thu, 13 Oct 2022 17:28:39 +0200 Subject: [PATCH 455/531] dockerfile fix --- Dockerfile | 25 +++++++++++++++---------- 1 file changed, 15 insertions(+), 10 deletions(-) diff --git a/Dockerfile b/Dockerfile index 4496f50..599e7e1 100644 --- a/Dockerfile +++ b/Dockerfile @@ -35,18 +35,23 @@ RUN set -x \ gcc \ 1>/dev/null \ # The next line fixes the curl "SSL certificate problem: unable to get local issuer certificate" for linux/arm - && c_rehash \ - # Get hydra sources and compile - && cd /src \ - && ./configure 1>/dev/null \ - && make 1>/dev/null \ - && make install \ - # Make clean - && apt-get purge -y make gcc libgpg-error-dev libgcrypt-dev \ + && c_rehash + +# Get hydra sources and compile +RUN cd /src \ + && make clean \ + && ./configure \ + && make \ + && make install + +# Make clean +RUN apt-get purge -y make gcc \ && apt-get autoremove -y \ && rm -rf /var/lib/apt/lists/* \ - # Verify hydra installation - && hydra -h || error_code=$? \ + && rm -rf /src + +# Verify hydra installation +RUN hydra -h || error_code=$? \ && if [ ! "${error_code}" -eq 255 ]; then echo "Wrong exit code for 'hydra help' command"; exit 1; fi \ # Unprivileged user creation && echo 'hydra:x:10001:10001::/tmp:/sbin/nologin' > /etc/passwd \ From 5ab0b95f8f1e6b24846fb9012570c7022eaf32b3 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Fri, 14 Oct 2022 10:23:19 +0200 Subject: [PATCH 456/531] fix attempt for smb2 --- hydra-smb2.c | 1 + 1 file changed, 1 insertion(+) diff --git a/hydra-smb2.c b/hydra-smb2.c index 275bbae..c213596 100644 --- a/hydra-smb2.c +++ b/hydra-smb2.c @@ -126,6 +126,7 @@ bool smb2_run_test(creds_t *cr, const char *server, uint16_t port) { */ switch (errno) { + case 0: break; case ENOENT: // Noticed this when connecting to older samba servers on linux // where any credentials are accepted. From 04204f7d9b9ced8f564aa18d6636779bea5c59eb Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Fri, 14 Oct 2022 10:29:22 +0200 Subject: [PATCH 457/531] fix attempt for smb2 --- hydra-smb2.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/hydra-smb2.c b/hydra-smb2.c index c213596..5e99451 100644 --- a/hydra-smb2.c +++ b/hydra-smb2.c @@ -126,7 +126,11 @@ bool smb2_run_test(creds_t *cr, const char *server, uint16_t port) { */ switch (errno) { - case 0: break; + case 0: + // maybe false positive? unclear ... :( ... needs more testing + smbc_free_context(ctx, 1); + return true; + break; case ENOENT: // Noticed this when connecting to older samba servers on linux // where any credentials are accepted. From 8fb5f5e2b473eb351109d11bfe13a04aa3020bc3 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Fri, 14 Oct 2022 10:31:21 +0200 Subject: [PATCH 458/531] update changelog --- CHANGES | 2 ++ 1 file changed, 2 insertions(+) diff --git a/CHANGES b/CHANGES index 3d61f77..55d74e9 100644 --- a/CHANGES +++ b/CHANGES @@ -2,6 +2,8 @@ Changelog for hydra ------------------- Release 9.5-dev +* smb2: fix for updated libsmb2 which resulted in correct guessing attempts + not being detected * The help for http forms was wrong. the condition variable must always be the *last* parameter, not the third From feaab90b1fe29c9f059e4b548540f00b6df79ff1 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Thu, 3 Nov 2022 17:05:41 +0100 Subject: [PATCH 459/531] fix smtp --- CHANGES | 5 +++-- hydra-smtp.c | 10 ++++++++++ 2 files changed, 13 insertions(+), 2 deletions(-) diff --git a/CHANGES b/CHANGES index 55d74e9..2c27d84 100644 --- a/CHANGES +++ b/CHANGES @@ -2,10 +2,11 @@ Changelog for hydra ------------------- Release 9.5-dev +* The help for http-form was wrong. the condition variable must always be + the *last* parameter, not the third * smb2: fix for updated libsmb2 which resulted in correct guessing attempts not being detected -* The help for http forms was wrong. the condition variable must always be - the *last* parameter, not the third +* smtp: break early if the server does not allow authentication Release 9.4 diff --git a/hydra-smtp.c b/hydra-smtp.c index dc6e54a..97d5b72 100644 --- a/hydra-smtp.c +++ b/hydra-smtp.c @@ -61,6 +61,10 @@ int32_t start_smtp(int32_t s, char *ip, int32_t port, unsigned char options, cha return 1; if (strstr(buf, "334") == NULL) { hydra_report(stderr, "[ERROR] SMTP PLAIN AUTH : %s\n", buf); + if (strstr(buf, "503") != NULL) { + free(buf); + return 4; + } free(buf); return 3; } @@ -438,6 +442,12 @@ void service_smtp(char *ip, int32_t sp, unsigned char options, char *miscptr, FI } hydra_child_exit(0); return; + case 4: /* error exit */ + if (sock >= 0) { + sock = hydra_disconnect(sock); + } + hydra_child_exit(3); + return; default: hydra_report(stderr, "[ERROR] Caught unknown return code, exiting!\n"); hydra_child_exit(0); From 972039b3ae2122a2aa8e9322a6f1b36fd5ef3966 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Fri, 4 Nov 2022 10:56:56 +0100 Subject: [PATCH 460/531] fix help --- pw-inspector.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pw-inspector.c b/pw-inspector.c index 2f53e05..cc91c02 100644 --- a/pw-inspector.c +++ b/pw-inspector.c @@ -30,7 +30,7 @@ void help() { printf(" -l lowcase characters (a,b,c,d, etc.)\n"); printf(" -u upcase characters (A,B,C,D, etc.)\n"); printf(" -n numbers (1,2,3,4, etc.)\n"); - printf(" -p printable characters (which are not -l/-n/-p, e.g. " + printf(" -p printable characters (which are not -l/-u/-n, e.g. " "$,!,/,(,*, etc.)\n"); printf(" -s special characters - all others not within the sets " "above\n"); From 4778a398d963847bf70862d687d752606847f3f2 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Wed, 9 Nov 2022 12:08:34 +0100 Subject: [PATCH 461/531] fix man page --- hydra-mod.c | 6 +++--- pw-inspector.1 | 2 +- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/hydra-mod.c b/hydra-mod.c index a24889b..de86f66 100644 --- a/hydra-mod.c +++ b/hydra-mod.c @@ -662,10 +662,10 @@ char *hydra_get_next_pair() { pair[sizeof(pair) - 1] = 0; __fck = read(intern_socket, pair, sizeof(pair) - 1); // if (debug) hydra_dump_data(pair, __fck, "CHILD READ PAIR"); - if (memcmp(&HYDRA_EXIT, &pair, sizeof(HYDRA_EXIT)) == 0) - return HYDRA_EXIT; - if (pair[0] == 0) + if (pair[0] == 0 || __fck <= 0) return HYDRA_EMPTY; + if (__fck >= sizeof(HYDRA_EXIT) && memcmp(&HYDRA_EXIT, &pair, sizeof(HYDRA_EXIT)) == 0) + return HYDRA_EXIT; } return pair; } diff --git a/pw-inspector.1 b/pw-inspector.1 index 90bff65..c9f228c 100644 --- a/pw-inspector.1 +++ b/pw-inspector.1 @@ -42,7 +42,7 @@ upcase characters (A,B,C,D, etc.) numbers (1,2,3,4, etc.) .TP .B \-p -printable characters (which are not \-l/\-n/\-p, e.g. $,!,/,(,*, etc.) +printable characters (which are not \-l/\-n/\-n, e.g. $,!,/,(,*, etc.) .TP .B \ -s special characters \- all others not withint the sets above From 128467103181c2982a7be6acef33759c8401726b Mon Sep 17 00:00:00 2001 From: mashaz Date: Tue, 15 Nov 2022 15:01:58 +0800 Subject: [PATCH 462/531] fix: error when mongodb user is empty --- hydra-mongodb.c | 11 +++++++++-- 1 file changed, 9 insertions(+), 2 deletions(-) diff --git a/hydra-mongodb.c b/hydra-mongodb.c index 201c3ff..994f477 100644 --- a/hydra-mongodb.c +++ b/hydra-mongodb.c @@ -72,10 +72,17 @@ int32_t start_mongodb(int32_t s, char *ip, int32_t port, unsigned char options, mongoc_log_set_handler(NULL, NULL); bson_init(&q); - snprintf(uri, sizeof(uri), "mongodb://%s:%s@%s:%d/?authSource=%s", login, pass, hydra_address2string(ip), port, miscptr); + if (login[0] == '\0' && pass[0] == '\0') { + snprintf(uri, sizeof(uri), "mongodb://%s:%d/?authSource=%s", hydra_address2string(ip), port, miscptr); + } else { + snprintf(uri, sizeof(uri), "mongodb://%s:%s@%s:%d/?authSource=%s", login, pass, hydra_address2string(ip), port, miscptr); + } + client = mongoc_client_new(uri); - if (!client) + if (!client) { + hydra_completed_pair_skip(); return 3; + } mongoc_client_set_appname(client, "hydra"); collection = mongoc_client_get_collection(client, miscptr, "test"); From e9698cd53053442f23effc8fee68a8d566fbc94f Mon Sep 17 00:00:00 2001 From: ringzero Date: Sun, 4 Dec 2022 16:13:47 +0800 Subject: [PATCH 463/531] freerdp tls-seclevel to 0 --- hydra-rdp.c | 1 + 1 file changed, 1 insertion(+) diff --git a/hydra-rdp.c b/hydra-rdp.c index b33c87d..a772086 100644 --- a/hydra-rdp.c +++ b/hydra-rdp.c @@ -30,6 +30,7 @@ BOOL rdp_connect(char *server, int32_t port, char *domain, char *login, char *pa instance->settings->ServerPort = port; instance->settings->Domain = domain; instance->settings->MaxTimeInCheckLoop = 100; + instance->settings->TlsSecLevel = 0; freerdp_connect(instance); err = freerdp_get_last_error(instance->context); return err; From eb939baaa51c6f48c4fdfe5a993bdc7aa495ba89 Mon Sep 17 00:00:00 2001 From: ringzero Date: Mon, 5 Dec 2022 20:12:56 +0800 Subject: [PATCH 464/531] rdp: support hydra waittime --- hydra-rdp.c | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/hydra-rdp.c b/hydra-rdp.c index a772086..405ecf3 100644 --- a/hydra-rdp.c +++ b/hydra-rdp.c @@ -9,6 +9,7 @@ #include "hydra-mod.h" +extern hydra_option hydra_options; extern char *HYDRA_EXIT; #ifndef LIBFREERDP void dummy_rdp() { printf("\n"); } @@ -18,6 +19,7 @@ void dummy_rdp() { printf("\n"); } freerdp *instance = 0; BOOL rdp_connect(char *server, int32_t port, char *domain, char *login, char *password) { int32_t err = 0; + int32_t waittime = hydra_options.waittime; instance->settings->Username = login; instance->settings->Password = password; @@ -30,6 +32,11 @@ BOOL rdp_connect(char *server, int32_t port, char *domain, char *login, char *pa instance->settings->ServerPort = port; instance->settings->Domain = domain; instance->settings->MaxTimeInCheckLoop = 100; + // hydra_options.waittime default value -> 32 + if (waittime != 32) { + // freerdp timeout format is microseconds -> default:15000 + instance->settings->TcpConnectTimeout = waittime * 1000; + } instance->settings->TlsSecLevel = 0; freerdp_connect(instance); err = freerdp_get_last_error(instance->context); From d830ac795e65a7b47492d50859eb36bb8d2dd116 Mon Sep 17 00:00:00 2001 From: ringzero Date: Tue, 6 Dec 2022 09:41:04 +0800 Subject: [PATCH 465/531] rdp implementing-w and -W support --- hydra-rdp.c | 13 +++++++------ 1 file changed, 7 insertions(+), 6 deletions(-) diff --git a/hydra-rdp.c b/hydra-rdp.c index 405ecf3..4036591 100644 --- a/hydra-rdp.c +++ b/hydra-rdp.c @@ -19,7 +19,6 @@ void dummy_rdp() { printf("\n"); } freerdp *instance = 0; BOOL rdp_connect(char *server, int32_t port, char *domain, char *login, char *password) { int32_t err = 0; - int32_t waittime = hydra_options.waittime; instance->settings->Username = login; instance->settings->Password = password; @@ -32,11 +31,8 @@ BOOL rdp_connect(char *server, int32_t port, char *domain, char *login, char *pa instance->settings->ServerPort = port; instance->settings->Domain = domain; instance->settings->MaxTimeInCheckLoop = 100; - // hydra_options.waittime default value -> 32 - if (waittime != 32) { - // freerdp timeout format is microseconds -> default:15000 - instance->settings->TcpConnectTimeout = waittime * 1000; - } + // freerdp timeout format is microseconds -> default:15000 + instance->settings->TcpConnectTimeout = hydra_options.waittime * 1000; instance->settings->TlsSecLevel = 0; freerdp_connect(instance); err = freerdp_get_last_error(instance->context); @@ -108,6 +104,7 @@ int32_t start_rdp(char *ip, int32_t port, unsigned char options, char *miscptr, void service_rdp(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1; int32_t myport = PORT_RDP; + int32_t __first_rdp_connect = 1; if (port != 0) myport = port; @@ -119,6 +116,10 @@ void service_rdp(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL next_run = 0; switch (run) { case 1: /* run the cracking function */ + if (__first_rdp_connect != 0) + __first_rdp_connect = 0; + else + sleep(hydra_options.conwait); next_run = start_rdp(ip, myport, options, miscptr, fp); break; case 2: /* clean exit */ From c6a3f77476bbdf7d409a7cdf46725694fbf18f10 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Tue, 3 Jan 2023 11:47:39 +0100 Subject: [PATCH 466/531] welcome 2023 --- Makefile.am | 2 +- hydra.1 | 2 +- hydra.c | 4 ++-- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/Makefile.am b/Makefile.am index a8da8d6..0dd498e 100644 --- a/Makefile.am +++ b/Makefile.am @@ -1,5 +1,5 @@ # -# Makefile for Hydra - (c) 2001-2022 by van Hauser / THC +# Makefile for Hydra - (c) 2001-2023 by van Hauser / THC # WARN_CLANG=-Wformat-nonliteral -Wstrncat-size -Wformat-security -Wsign-conversion -Wconversion -Wfloat-conversion -Wshorten-64-to-32 -Wuninitialized -Wmissing-variable-declarations -Wmissing-declarations WARN_GCC=-Wformat=2 -Wformat-overflow=2 -Wformat-nonliteral -Wformat-truncation=2 -Wnull-dereference -Wstrict-overflow=2 -Wstringop-overflow=4 -Walloca-larger-than=4096 -Wtype-limits -Wconversion -Wtrampolines -Wstrict-prototypes -Wmissing-prototypes -Wmissing-declarations -fno-common -Wcast-align diff --git a/hydra.1 b/hydra.1 index 81b2feb..b9cb7a5 100644 --- a/hydra.1 +++ b/hydra.1 @@ -1,4 +1,4 @@ -.TH "HYDRA" "1" "01/01/2022" +.TH "HYDRA" "1" "01/01/2023" .SH NAME hydra \- a very fast network logon cracker which supports many different services .SH SYNOPSIS diff --git a/hydra.c b/hydra.c index 2e4f2ab..dbea4c0 100644 --- a/hydra.c +++ b/hydra.c @@ -1,5 +1,5 @@ /* - * hydra (c) 2001-2022 by van Hauser / THC + * hydra (c) 2001-2023 by van Hauser / THC * https://github.com/vanhauser-thc/thc-hydra * * Parallized network login hacker. @@ -2186,7 +2186,7 @@ int main(int argc, char *argv[]) { struct sockaddr_in6 *ipv6 = NULL; struct sockaddr_in *ipv4 = NULL; - printf("%s %s (c) 2022 by %s & %s - Please do not use in military or secret " + printf("%s %s (c) 2023 by %s & %s - Please do not use in military or secret " "service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).\n\n", PROGRAM, VERSION, AUTHOR, AUTHOR2); #ifndef LIBAFP From a41d10dc8ce718c9bd4397534636d6b4de1450cd Mon Sep 17 00:00:00 2001 From: Florian Weimer Date: Wed, 18 Jan 2023 16:30:24 +0100 Subject: [PATCH 467/531] Various C99 compatibility fixes strrchr is declared in , not . _GNU_SOURCE needs to be defined before any glibc headers are included, otherwise it is not effective. Also patch some old autoconf-internal issues in the hydra-gtk configure script. --- configure | 2 +- hydra-gtk/configure | 8 ++++---- hydra-rtsp.c | 3 ++- 3 files changed, 7 insertions(+), 6 deletions(-) diff --git a/configure b/configure index d9c8b02..425f80a 100755 --- a/configure +++ b/configure @@ -1356,7 +1356,7 @@ echo "Checking for Android specialities ..." TMPC=comptest$$ STRRCHR=" not" echo '#include ' > $TMPC.c -echo '#include ' >> $TMPC.c +echo '#include ' >> $TMPC.c echo "int main() { char *x = strrchr(\"test\", 'e'); if (x == NULL) return 0; else return 1; }" >> $TMPC.c $CC -o $TMPC $TMPC.c > /dev/null 2>&1 test -x $TMPC && STRRCHR="" diff --git a/hydra-gtk/configure b/hydra-gtk/configure index 653ba7d..6cd3de7 100755 --- a/hydra-gtk/configure +++ b/hydra-gtk/configure @@ -2391,7 +2391,7 @@ if { (eval echo "$as_me:$LINENO: \"$ac_compile\"") >&5 echo "$as_me:$LINENO: \$? = $ac_status" >&5 (exit $ac_status); }; }; then for ac_declaration in \ - '' \ + '#include ' \ 'extern "C" void std::exit (int) throw (); using std::exit;' \ 'extern "C" void std::exit (int); using std::exit;' \ 'extern "C" void exit (int) throw ();' \ @@ -3192,7 +3192,7 @@ if { (eval echo "$as_me:$LINENO: \"$ac_compile\"") >&5 echo "$as_me:$LINENO: \$? = $ac_status" >&5 (exit $ac_status); }; }; then for ac_declaration in \ - '' \ + '#include ' \ 'extern "C" void std::exit (int) throw (); using std::exit;' \ 'extern "C" void std::exit (int); using std::exit;' \ 'extern "C" void exit (int) throw ();' \ @@ -3797,8 +3797,8 @@ main () for (i = 0; i < 256; i++) if (XOR (islower (i), ISLOWER (i)) || toupper (i) != TOUPPER (i)) - exit(2); - exit (0); + return 2; + return 0; } _ACEOF rm -f conftest$ac_exeext diff --git a/hydra-rtsp.c b/hydra-rtsp.c index 3b6e84b..3b4bdca 100644 --- a/hydra-rtsp.c +++ b/hydra-rtsp.c @@ -6,10 +6,11 @@ // // +#define _GNU_SOURCE + #include "hydra-mod.h" #include "sasl.h" #include -#define _GNU_SOURCE #include extern char *HYDRA_EXIT; From 97cae4633c45be76d2f5df5a739a3870adbd293e Mon Sep 17 00:00:00 2001 From: xd0419 <1249457656@qq.com> Date: Wed, 1 Mar 2023 22:08:53 +0800 Subject: [PATCH 468/531] edit mongodb moudle error --- hydra-mongodb.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/hydra-mongodb.c b/hydra-mongodb.c index 994f477..d413192 100644 --- a/hydra-mongodb.c +++ b/hydra-mongodb.c @@ -97,11 +97,11 @@ int32_t start_mongodb(int32_t s, char *ip, int32_t port, unsigned char options, mongoc_collection_destroy(collection); mongoc_client_destroy(client); mongoc_cleanup(); - hydra_completed_pair_skip(); + hydra_completed_pair(); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) { return 3; } - return 2; + return 1; } } From 4ae7a365e92f3b30cc3eb58aa47bf7e42f21a8ef Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Mon, 6 Mar 2023 10:35:03 +0100 Subject: [PATCH 469/531] fix http form help output --- hydra-http-form.c | 44 +++++++++++++++++--------------------------- 1 file changed, 17 insertions(+), 27 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 93953dc..53b7ce5 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -20,33 +20,23 @@ Here's a couple of examples: - ./hydra -S -s 443 -l "" -P pass.txt 10.221.64.2 https-get-form "/irmlab1/vulnapp.php:username=^USER^&pass=^PASS^:incorrect" -The option field (following the service field) takes three ":" separated -values and an optional fourth value, the first is the page on the server -to GET or POST to, the second is the POST/GET variables (taken from either -the browser, or a proxy such as PAROS) with the varying usernames and passwords -in the "^USER^" and "^PASS^" placeholders, the third is the string that it -checks for an *invalid* or *valid* login - any exception to this is counted -as a success. +The option field (following the service field) takes ":" separated values: +The first is the page on the server to GET or POST to. +The second is the POST/GET variables (taken from either the browser, or a proxy +such as ZAP) with the varying usernames and passwords in the "^USER^" and +"^PASS^" placeholders. +The third + are optional parameters like C=, H= etc. (see below) +The final(!) parameter is the string that it checks for an *invalid* or *valid* +login So please: * invalid condition login should be preceded by "F=" * valid condition login should be preceded by "S=". -By default, if no header is found the condition is assume to be a fail, -so checking for *invalid* login. -The fourth optional value, can be a 'C' to define a different page to GET -initial cookies from. +By default, if no header is found the condition is assume to be a fail (F=), +so checking for an *invalid* login string. -If you specify the verbose flag (-v) it will show you the response from the +If you specify the debug flag (-d) it will show you the response from the HTTP server which is useful for checking the result of a failed login to -find something to pattern match against. - -Module initially written by Phil Robinson, IRM Plc (releases@irmplc.com), -rewritten by David Maciejak - -Fix and issue with strtok use and implement 1 step location follow if HTTP -3xx code is returned (david dot maciejak at gmail dot com) - -Added fail or success condition, getting cookies, and allow 5 redirections by -david +find something to pattern match against. This should be done together with -t 1. */ @@ -1434,8 +1424,8 @@ void usage_http_form(const char *service) { "redirections in\n" "a row. It always gathers a new cookie from the same URL without " "variables\n" - "The parameters requires three \":\" separated values, plus optional " - "values.\n" + "The parameters requires at a minimum three \":\" separated values,\n" + "plus optional values.\n" "(Note: if you need a colon in the option string as value, escape it " "with \"\\:\", but do not escape a \"\\\" with \"\\\\\".)\n" "\nSyntax: :[:[:]:\n" @@ -1480,11 +1470,11 @@ void usage_http_form(const char *service) { "login.php:user=^USER64^&pass=^PASS64^&colon=colon\\:escape:S=result=" "success\"\n" " \"/login.php:user=^USER^&pass=^PASS^&mid=123:authlog=.*failed\"\n" - " \"/:user=^USER&pass=^PASS^:failed:H=Authorization\\: Basic " + " \"/:user=^USER&pass=^PASS^:H=Authorization\\: Basic " "dT1w:H=Cookie\\: sessid=aaaa:h=X-User\\: ^USER^:H=User-Agent\\: wget\"\n" - " \"/exchweb/bin/auth/" + " \"/exchweb/bin/auth/:F=failed" "owaauth.dll:destination=http%%3A%%2F%%2F%%2Fexchange&flags=0&" "username=%%5C^USER^&password=^PASS^&SubmitCreds=x&trusted=0:" - "reason=:C=/exchweb\"\n", + "C=/exchweb\":reason=\n", service); } From 75b7b52da9a2590b772ec75d4b8fb71ed2910335 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Mon, 13 Mar 2023 09:23:55 +0100 Subject: [PATCH 470/531] fix proxy support for http-form --- CHANGES | 6 ++++-- hydra-http-form.c | 12 ++++++------ 2 files changed, 10 insertions(+), 8 deletions(-) diff --git a/CHANGES b/CHANGES index 2c27d84..9f21de3 100644 --- a/CHANGES +++ b/CHANGES @@ -2,8 +2,10 @@ Changelog for hydra ------------------- Release 9.5-dev -* The help for http-form was wrong. the condition variable must always be - the *last* parameter, not the third +* http-form: + - The help for http-form was wrong. the condition variable must always be + the *last* parameter, not the third + - Proxy support was not working correctly * smb2: fix for updated libsmb2 which resulted in correct guessing attempts not being detected * smtp: break early if the server does not allow authentication diff --git a/hydra-http-form.c b/hydra-http-form.c index 53b7ce5..d41cbd9 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -761,7 +761,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) { if (getcookie) { memset(proxy_string, 0, sizeof(proxy_string)); - snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s:%d%.600s", webtarget, webport, cookieurl); + snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s%.600s", webtarget, cookieurl); if (http_request != NULL) free(http_request); http_request = prepare_http_request("GET", proxy_string, NULL, cookie_request); @@ -775,7 +775,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options // now prepare for the "real" request if (strcmp(type, "POST") == 0) { memset(proxy_string, 0, sizeof(proxy_string)); - snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s:%d%.600s", webtarget, webport, url); + snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s%.600s", webtarget, url); snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t)strlen(upd3variables)); if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) hdrrepv(&ptr_head, "Content-Length", content_length); @@ -823,7 +823,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options if (getcookie) { // doing a GET to get cookies memset(proxy_string, 0, sizeof(proxy_string)); - snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s:%d%.600s", webtarget, webport, cookieurl); + snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s%.600s", webtarget, cookieurl); if (http_request != NULL) free(http_request); http_request = prepare_http_request("GET", proxy_string, NULL, cookie_request); @@ -837,7 +837,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options // now prepare for the "real" request if (strcmp(type, "POST") == 0) { memset(proxy_string, 0, sizeof(proxy_string)); - snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s:%d%.600s", webtarget, webport, url); + snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s%.600s", webtarget, url); snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t)strlen(upd3variables)); if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) hdrrepv(&ptr_head, "Content-Length", content_length); @@ -1072,7 +1072,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options // proxy with authentication hdrrepv(&ptr_head, "Host", str2); memset(proxy_string, 0, sizeof(proxy_string)); - snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s:%d%.600s", webtarget, webport, str3); + snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s%.600s", webtarget, str3); if (normal_request != NULL) free(normal_request); normal_request = stringify_headers(&ptr_head); @@ -1084,7 +1084,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options // proxy without authentication hdrrepv(&ptr_head, "Host", str2); memset(proxy_string, 0, sizeof(proxy_string)); - snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s:%d%.600s", webtarget, webport, str3); + snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s%.600s", webtarget, str3); if (normal_request != NULL) free(normal_request); normal_request = stringify_headers(&ptr_head); From 01efa98ded7e7053dc8d7b898dee5bd2c365b671 Mon Sep 17 00:00:00 2001 From: bugith Date: Sun, 14 May 2023 12:03:43 +0200 Subject: [PATCH 471/531] Update README -x syntax with special characters --- README | 1 + 1 file changed, 1 insertion(+) diff --git a/README b/README index e8c7b6a..846164a 100644 --- a/README +++ b/README @@ -267,6 +267,7 @@ Examples: -x 1:3:a generate passwords from length 1 to 3 with all lowercase letters -x 2:5:/ generate passwords from length 2 to 5 containing only slashes -x 5:8:A1 generate passwords from length 5 to 8 with uppercase and numbers +-x '3:3:aA1&~#\\ "\'<{([-|_^@)]=}>$%*?./§,;:!`' -v generates lenght 3 passwords with all 95 characters, and verbose. ``` Example: From a0565e1abe731c455c688c2e82da28bbe7db4a16 Mon Sep 17 00:00:00 2001 From: leo Date: Fri, 9 Jun 2023 20:43:21 +1200 Subject: [PATCH 472/531] fix rdp response 0002000f not recognised as a failed attempt --- hydra-rdp.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/hydra-rdp.c b/hydra-rdp.c index 4036591..456a1c3 100644 --- a/hydra-rdp.c +++ b/hydra-rdp.c @@ -76,6 +76,10 @@ int32_t start_rdp(char *ip, int32_t port, unsigned char options, char *miscptr, // login failure hydra_completed_pair(); break; + case 0x0002000f: + // login failure + hydra_completed_pair_skip(); + break; case 0x0002000d: hydra_report(stderr, "[%d][rdp] account on %s might be valid but account not " From 377ac86652f86bd3317a771a173c4235aaa2055c Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Mon, 12 Jun 2023 10:03:28 +0200 Subject: [PATCH 473/531] v9.6 release --- CHANGES | 1 + hydra.c | 2 +- 2 files changed, 2 insertions(+), 1 deletion(-) diff --git a/CHANGES b/CHANGES index 9f21de3..d30e1ac 100644 --- a/CHANGES +++ b/CHANGES @@ -9,6 +9,7 @@ Release 9.5-dev * smb2: fix for updated libsmb2 which resulted in correct guessing attempts not being detected * smtp: break early if the server does not allow authentication +* rdp: detect more return codes that say a user is disabled etc. Release 9.4 diff --git a/hydra.c b/hydra.c index dbea4c0..cae3dde 100644 --- a/hydra.c +++ b/hydra.c @@ -228,7 +228,7 @@ char *SERVICES = "adam6500 asterisk afp cisco cisco-enable cobaltstrike cvs fire #define RESTOREFILE "./hydra.restore" #define PROGRAM "Hydra" -#define VERSION "v9.5-dev" +#define VERSION "v9.6" #define AUTHOR "van Hauser/THC" #define EMAIL "" #define AUTHOR2 "David Maciejak" From 714b051867365c724faf7f505c59dd0b0389ca58 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Mon, 12 Jun 2023 10:05:41 +0200 Subject: [PATCH 474/531] v9.5 release --- CHANGES | 2 +- README | 2 +- hydra.c | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/CHANGES b/CHANGES index d30e1ac..a78dfea 100644 --- a/CHANGES +++ b/CHANGES @@ -1,7 +1,7 @@ Changelog for hydra ------------------- -Release 9.5-dev +Release 9.5 * http-form: - The help for http-form was wrong. the condition variable must always be the *last* parameter, not the third diff --git a/README b/README index 846164a..44cb585 100644 --- a/README +++ b/README @@ -1,7 +1,7 @@ H Y D R A - (c) 2001-2022 by van Hauser / THC + (c) 2001-2023 by van Hauser / THC https://github.com/vanhauser-thc/thc-hydra many modules were written by David (dot) Maciejak @ gmail (dot) com BFG code by Jan Dlabal diff --git a/hydra.c b/hydra.c index cae3dde..c250f4c 100644 --- a/hydra.c +++ b/hydra.c @@ -228,7 +228,7 @@ char *SERVICES = "adam6500 asterisk afp cisco cisco-enable cobaltstrike cvs fire #define RESTOREFILE "./hydra.restore" #define PROGRAM "Hydra" -#define VERSION "v9.6" +#define VERSION "v9.5" #define AUTHOR "van Hauser/THC" #define EMAIL "" #define AUTHOR2 "David Maciejak" From 28f073fd79d337c957fc41ada2be5ec2e8122b0e Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Sat, 24 Jun 2023 12:03:03 +0200 Subject: [PATCH 475/531] fix pw-inspector --- pw-inspector.c | 55 +++++++++++++++++++++----------------------------- 1 file changed, 23 insertions(+), 32 deletions(-) diff --git a/pw-inspector.c b/pw-inspector.c index cc91c02..8b87a5a 100644 --- a/pw-inspector.c +++ b/pw-inspector.c @@ -50,7 +50,7 @@ int main(int argc, char *argv[]) { int32_t sets = 0, countsets = 0, minlen = 0, maxlen = MAXLENGTH, count = 0; int32_t set_low = 0, set_up = 0, set_no = 0, set_print = 0, set_other = 0; FILE *in = stdin, *out = stdout; - char buf[MAXLENGTH + 1]; + unsigned char buf[MAXLENGTH + 1]; prg = argv[0]; if (argc < 2) @@ -124,9 +124,9 @@ int main(int argc, char *argv[]) { if (countsets == 0) countsets = sets; - while (fgets(buf, sizeof(buf), in) != NULL) { - i = -1; - if (buf[0] == 0) + while (fgets((void *)buf, sizeof(buf), in) != NULL) { + int is_low = 0, is_up = 0, is_no = 0, is_print = 0, is_other = 0; + if (!buf[0]) continue; if (buf[strlen(buf) - 1] == '\n') buf[strlen(buf) - 1] = 0; @@ -134,40 +134,31 @@ int main(int argc, char *argv[]) { buf[strlen(buf) - 1] = 0; if (strlen(buf) >= minlen && strlen(buf) <= maxlen) { i = 0; - if (countsets > 0) { - if (set_low) - if (strpbrk(buf, "abcdefghijklmnopqrstuvwxyz") != NULL) - i++; - if (set_up) - if (strpbrk(buf, "ABCDEFGHIJKLMNOPQRSTUVWXYZ") != NULL) - i++; - if (set_no) - if (strpbrk(buf, "0123456789") != NULL) - i++; - if (set_print) { - j = 0; - for (k = 0; k < strlen(buf); k++) - if (isprint((int32_t)buf[k]) != 0 && isalnum((int32_t)buf[k]) == 0) - j = 1; - if (j) - i++; - } - if (set_other) { - j = 0; - for (k = 0; k < strlen(buf); k++) - if (isprint((int32_t)buf[k]) == 0 && isalnum((int32_t)buf[k]) == 0) - j = 1; - if (j) - i++; + j = 1; + for (i = 0; i < strlen(buf) && j; i++) { + j = 0; + if (set_low && islower(buf[i])) { + j = 1; + is_low = 1; + } else if (set_up && isupper(buf[i])) { + j = 1; + is_up = 1; + } else if (set_no && isdigit(buf[i])) { + j = 1; + is_no = 1; + } else if (set_print && isprint(buf[i]) && !isalnum(buf[i])) { + j = 1; + is_print = 1; + } else if (set_other && !isprint(buf[i])) { + j = 1; + is_other = 1; } } - if (i >= countsets) { + if (j && countsets <= is_low + is_up + is_no + is_print + is_other) { fprintf(out, "%s\n", buf); count++; } } - /* fprintf(stderr, "[DEBUG] i: %d minlen: %d maxlen: %d len: %d\n", i, - * minlen, maxlen, strlen(buf)); */ } fclose(in); fclose(out); From 58256c8b4f1517d15ba416347451bbf1397d7bef Mon Sep 17 00:00:00 2001 From: neo-one0873 <50387785+neo-one0873@users.noreply.github.com> Date: Tue, 27 Jun 2023 10:41:16 +0800 Subject: [PATCH 476/531] fix: array proxy_string_port may out of bound when proxy_count=64, array proxy_string_port , proxy_string_ip, etc. may out of bound. --- hydra.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra.c b/hydra.c index c250f4c..5a21928 100644 --- a/hydra.c +++ b/hydra.c @@ -2045,7 +2045,7 @@ void process_proxy_line(int32_t type, char *string) { string[strlen(string) - 1] = 0; if (string[strlen(string) - 1] == '\r') string[strlen(string) - 1] = 0; - if (proxy_count > MAX_PROXY_COUNT) { + if (proxy_count >= MAX_PROXY_COUNT) { fprintf(stderr, "[WARNING] maximum amount of proxies loaded, ignoring this entry: %s\n", string); return; } From bb0fc9353913e0f114ec8f1144417a117b951359 Mon Sep 17 00:00:00 2001 From: xiongyi Date: Tue, 27 Jun 2023 17:45:38 +0800 Subject: [PATCH 477/531] fix memory leaks for hydra-http-form.c Signed-off-by: xiongyi --- hydra-http-form.c | 28 +++++++++++++++++++++------- 1 file changed, 21 insertions(+), 7 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index d41cbd9..3707b2f 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -796,8 +796,10 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options if (http_request != NULL) free(http_request); http_request = prepare_http_request("POST", proxy_string, upd3variables, normal_request); - if (hydra_send(s, http_request, strlen(http_request), 0) < 0) + if (hydra_send(s, http_request, strlen(http_request), 0) < 0) { + free(cookie_header); return 1; + } } else { if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) hdrrepv(&ptr_head, "Content-Length", "0"); @@ -814,8 +816,10 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options if (http_request != NULL) free(http_request); http_request = prepare_http_request("GET", proxy_string, upd3variables, normal_request); - if (hydra_send(s, http_request, strlen(http_request), 0) < 0) + if (hydra_send(s, http_request, strlen(http_request), 0) < 0) { + free(cookie_header); return 1; + } } } else { if (use_proxy == 1) { @@ -858,8 +862,10 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options if (http_request != NULL) free(http_request); http_request = prepare_http_request("POST", proxy_string, upd3variables, normal_request); - if (hydra_send(s, http_request, strlen(http_request), 0) < 0) + if (hydra_send(s, http_request, strlen(http_request), 0) < 0) { + free(cookie_header); return 1; + } } else { if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) hdrrepv(&ptr_head, "Content-Length", "0"); @@ -876,8 +882,10 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options if (http_request != NULL) free(http_request); http_request = prepare_http_request("GET", proxy_string, upd3variables, normal_request); - if (hydra_send(s, http_request, strlen(http_request), 0) < 0) + if (hydra_send(s, http_request, strlen(http_request), 0) < 0) { + free(cookie_header); return 1; + } } } else { // direct web server, no proxy @@ -921,8 +929,10 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options if (http_request != NULL) free(http_request); http_request = prepare_http_request("POST", url, upd3variables, normal_request); - if (hydra_send(s, http_request, strlen(http_request), 0) < 0) + if (hydra_send(s, http_request, strlen(http_request), 0) < 0) { + free(cookie_header); return 1; + } } else { if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) hdrrepv(&ptr_head, "Content-Length", "0"); @@ -939,8 +949,10 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options if (http_request != NULL) free(http_request); http_request = prepare_http_request("GET", url, upd3variables, normal_request); - if (hydra_send(s, http_request, strlen(http_request), 0) < 0) + if (hydra_send(s, http_request, strlen(http_request), 0) < 0) { + free(cookie_header); return 1; + } } } } @@ -1105,8 +1117,10 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options hydra_reconnect(s, ip, port, options, hostname); - if (hydra_send(s, http_request, strlen(http_request), 0) < 0) + if (hydra_send(s, http_request, strlen(http_request), 0) < 0) { + free(cookie_header); return 1; + } found = analyze_server_response(s); if (strlen(cookie) > 0) From 8a2df9b8f28ecb8c25b532be1b1deeed2a51d598 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Fri, 30 Jun 2023 17:21:44 +0200 Subject: [PATCH 478/531] 9.6dev --- hydra.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra.c b/hydra.c index 5a21928..4e33711 100644 --- a/hydra.c +++ b/hydra.c @@ -228,7 +228,7 @@ char *SERVICES = "adam6500 asterisk afp cisco cisco-enable cobaltstrike cvs fire #define RESTOREFILE "./hydra.restore" #define PROGRAM "Hydra" -#define VERSION "v9.5" +#define VERSION "v9.6dev" #define AUTHOR "van Hauser/THC" #define EMAIL "" #define AUTHOR2 "David Maciejak" From 310068c9ca54b86b937dc07c59c5b7a129ed06d7 Mon Sep 17 00:00:00 2001 From: Coen Tempelaars Date: Fri, 7 Jul 2023 20:55:04 +0200 Subject: [PATCH 479/531] fix replacement of user/pass placeholders in http header --- hydra-http-form.c | 12 +++++++++--- 1 file changed, 9 insertions(+), 3 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 3707b2f..9e3c92b 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -314,9 +314,15 @@ void hdrrep(ptr_header_node *ptr_head, char *oldvalue, char *newvalue) { for (cur_ptr = *ptr_head; cur_ptr; cur_ptr = cur_ptr->next) { if ((cur_ptr->type == HEADER_TYPE_USERHEADER || cur_ptr->type == HEADER_TYPE_USERHEADER_REPL) && strstr(cur_ptr->value, oldvalue)) { - cur_ptr->value = (char *)realloc(cur_ptr->value, strlen(newvalue) + 1); - if (cur_ptr->value) - strcpy(cur_ptr->value, newvalue); + size_t oldlen = strlen(oldvalue); + size_t newlen = strlen(newvalue); + if (oldlen != newlen) + cur_ptr->value = (char *)realloc(cur_ptr->value, strlen(cur_ptr->value) - oldlen + newlen + 1); + if (cur_ptr->value) { + char *p = strstr(cur_ptr->value, oldvalue); + memmove(p + newlen, p + oldlen, strlen(p + oldlen) + 1); + memcpy(p, newvalue, newlen); + } else { hydra_report(stderr, "[ERROR] Out of memory (hddrep).\n"); hydra_child_exit(0); From fb964fc1132d7e7ee993b5cfe1ed280978530589 Mon Sep 17 00:00:00 2001 From: Roan Rothrock Date: Tue, 11 Jul 2023 10:15:24 -0500 Subject: [PATCH 480/531] Fixed #868 on vanhauser-thc/thc-hydra --- hydra-rtsp.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/hydra-rtsp.c b/hydra-rtsp.c index 3b4bdca..5526f9b 100644 --- a/hydra-rtsp.c +++ b/hydra-rtsp.c @@ -6,7 +6,9 @@ // // +#ifndef _GNU_SOURCE #define _GNU_SOURCE +#endif #include "hydra-mod.h" #include "sasl.h" From 568ef74e0d513c8a3a0d388acdd444f92e700cab Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Fri, 21 Jul 2023 10:44:31 +0200 Subject: [PATCH 481/531] nits --- Makefile.am | 2 +- hydra-http-form.c | 5 ++--- hydra-mod.c | 2 +- hydra-smb2.c | 2 +- hydra-svn.c | 2 ++ 5 files changed, 7 insertions(+), 6 deletions(-) diff --git a/Makefile.am b/Makefile.am index 0dd498e..f6d4bb0 100644 --- a/Makefile.am +++ b/Makefile.am @@ -4,7 +4,7 @@ WARN_CLANG=-Wformat-nonliteral -Wstrncat-size -Wformat-security -Wsign-conversion -Wconversion -Wfloat-conversion -Wshorten-64-to-32 -Wuninitialized -Wmissing-variable-declarations -Wmissing-declarations WARN_GCC=-Wformat=2 -Wformat-overflow=2 -Wformat-nonliteral -Wformat-truncation=2 -Wnull-dereference -Wstrict-overflow=2 -Wstringop-overflow=4 -Walloca-larger-than=4096 -Wtype-limits -Wconversion -Wtrampolines -Wstrict-prototypes -Wmissing-prototypes -Wmissing-declarations -fno-common -Wcast-align CFLAGS ?= -g -OPTS=-I. -O3 $(CFLAGS) -fcommon +OPTS=-I. -O3 $(CFLAGS) -fcommon -Wno-deprecated-declarations CPPFLAGS += -D_GNU_SOURCE # -Wall -g -pedantic LIBS=-lm diff --git a/hydra-http-form.c b/hydra-http-form.c index 9e3c92b..a8e5922 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -322,8 +322,7 @@ void hdrrep(ptr_header_node *ptr_head, char *oldvalue, char *newvalue) { char *p = strstr(cur_ptr->value, oldvalue); memmove(p + newlen, p + oldlen, strlen(p + oldlen) + 1); memcpy(p, newvalue, newlen); - } - else { + } else { hydra_report(stderr, "[ERROR] Out of memory (hddrep).\n"); hydra_child_exit(0); } @@ -805,7 +804,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options if (hydra_send(s, http_request, strlen(http_request), 0) < 0) { free(cookie_header); return 1; - } + } } else { if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) hdrrepv(&ptr_head, "Content-Length", "0"); diff --git a/hydra-mod.c b/hydra-mod.c index de86f66..c988c1d 100644 --- a/hydra-mod.c +++ b/hydra-mod.c @@ -664,7 +664,7 @@ char *hydra_get_next_pair() { // if (debug) hydra_dump_data(pair, __fck, "CHILD READ PAIR"); if (pair[0] == 0 || __fck <= 0) return HYDRA_EMPTY; - if (__fck >= sizeof(HYDRA_EXIT) && memcmp(&HYDRA_EXIT, &pair, sizeof(HYDRA_EXIT)) == 0) + if (__fck >= sizeof(HYDRA_EXIT) && memcmp(&HYDRA_EXIT, &pair, sizeof(HYDRA_EXIT)) == 0) return HYDRA_EXIT; } return pair; diff --git a/hydra-smb2.c b/hydra-smb2.c index 5e99451..9f396be 100644 --- a/hydra-smb2.c +++ b/hydra-smb2.c @@ -126,7 +126,7 @@ bool smb2_run_test(creds_t *cr, const char *server, uint16_t port) { */ switch (errno) { - case 0: + case 0: // maybe false positive? unclear ... :( ... needs more testing smbc_free_context(ctx, 1); return true; diff --git a/hydra-svn.c b/hydra-svn.c index 063f12c..0258f9a 100644 --- a/hydra-svn.c +++ b/hydra-svn.c @@ -4,7 +4,9 @@ #ifdef LIBSVN /* needed on openSUSE */ +#ifndef _GNU_SOURCE #define _GNU_SOURCE +#endif #if !defined PATH_MAX && defined HAVE_SYS_PARAM_H #include From d2363dc99eb109adb031508e3fbde6fbba5103ae Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Dani=C3=ABl=20van=20den=20Berg?= Date: Thu, 10 Aug 2023 16:25:37 +0200 Subject: [PATCH 482/531] Allow HTTP-POST with F=403 I had a site which returns 200OK, but a json containing 403. Get results in "invalid api call". Allow using F= with post. --- hydra.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra.c b/hydra.c index 4e33711..30a8ece 100644 --- a/hydra.c +++ b/hydra.c @@ -388,7 +388,7 @@ static const struct { {"http-get-form", service_http_form_init, service_http_get_form, usage_http_form}, {"http-head", service_http_init, service_http_head, NULL}, {"http-form", service_http_form_init, NULL, usage_http_form}, - {"http-post", NULL, service_http_post, usage_http}, + {"http-post", service_http_init, service_http_post, usage_http}, {"http-post-form", service_http_form_init, service_http_post_form, usage_http_form}, SERVICE3("http-proxy", http_proxy), SERVICE3("http-proxy-urlenum", http_proxy_urlenum), From 16b424af4db7f49d09b4a9157e805040ebff23ee Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Sun, 13 Aug 2023 13:07:10 +0200 Subject: [PATCH 483/531] support -W for modules that use libarries --- CHANGES | 2 ++ hydra-firebird.c | 3 +++ hydra-http.c | 2 +- hydra-memcached.c | 3 +++ hydra-mongodb.c | 3 +++ hydra-mysql.c | 3 +++ hydra-oracle-listener.c | 3 +++ hydra-oracle-sid.c | 3 +++ hydra-oracle.c | 3 +++ hydra-postgres.c | 3 +++ hydra-rdp.c | 2 ++ hydra-sapr3.c | 3 +++ hydra-smb2.c | 8 ++++++++ hydra-ssh.c | 2 ++ hydra-sshkey.c | 3 +++ hydra-svn.c | 3 +++ 16 files changed, 48 insertions(+), 1 deletion(-) diff --git a/CHANGES b/CHANGES index a78dfea..685f48d 100644 --- a/CHANGES +++ b/CHANGES @@ -2,6 +2,8 @@ Changelog for hydra ------------------- Release 9.5 +* many modules did not support -W (all those that used a library for the + connection). All (or most?) should be fixed now. * http-form: - The help for http-form was wrong. the condition variable must always be the *last* parameter, not the third diff --git a/hydra-firebird.c b/hydra-firebird.c index 4898c46..dea104f 100644 --- a/hydra-firebird.c +++ b/hydra-firebird.c @@ -22,6 +22,7 @@ void dummy_firebird() { printf("\n"); } #define DEFAULT_DB "C:\\Program Files\\Firebird\\Firebird_1_5\\security.fdb" +extern hydra_option hydra_options; extern char *HYDRA_EXIT; int32_t start_firebird(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { @@ -124,6 +125,8 @@ void service_firebird(char *ip, int32_t sp, unsigned char options, char *miscptr */ next_run = start_firebird(sock, ip, port, options, miscptr, fp); + if ((next_run == 1 || next_run == 2) && hydra_options.conwait) + sleep(hydra_options.conwait); break; case 3: diff --git a/hydra-http.c b/hydra-http.c index c76b937..ba9a676 100644 --- a/hydra-http.c +++ b/hydra-http.c @@ -451,7 +451,7 @@ int32_t service_http_init(char *ip, int32_t sp, unsigned char options, char *mis start--; memset(start, '\0', condition_len); if (debug) - hydra_report(stderr, "Modificated options:%s\n", miscptr); + hydra_report(stderr, "Modified options:%s\n", miscptr); } else { if (debug) hydra_report(stderr, "Condition not found\n"); diff --git a/hydra-memcached.c b/hydra-memcached.c index ca21d26..5a7c112 100644 --- a/hydra-memcached.c +++ b/hydra-memcached.c @@ -13,6 +13,7 @@ void dummy_mcached() { printf("\n"); } extern int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec); +extern hydra_option hydra_options; extern char *HYDRA_EXIT; int mcached_send_com_quit(int32_t sock) { @@ -117,6 +118,8 @@ void service_mcached(char *ip, int32_t sp, unsigned char options, char *miscptr, switch (run) { case 1: next_run = start_mcached(sock, ip, port, options, miscptr, fp); + if (next_run == 1 && hydra_options.conwait) + sleep(hydra_options.conwait); break; case 2: hydra_child_exit(0); diff --git a/hydra-mongodb.c b/hydra-mongodb.c index d413192..66269be 100644 --- a/hydra-mongodb.c +++ b/hydra-mongodb.c @@ -14,6 +14,7 @@ void dummy_mongodb() { printf("\n"); } extern int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec); +extern hydra_option hydra_options; extern char *HYDRA_EXIT; char *buf; @@ -136,6 +137,8 @@ void service_mongodb(char *ip, int32_t sp, unsigned char options, char *miscptr, switch (run) { case 1: next_run = start_mongodb(sock, ip, port, options, miscptr, fp); + if (next_run == 1 && hydra_options.conwait) + sleep(hydra_options.conwait); break; case 2: hydra_child_exit(0); diff --git a/hydra-mysql.c b/hydra-mysql.c index eae5fd9..01a258e 100644 --- a/hydra-mysql.c +++ b/hydra-mysql.c @@ -35,6 +35,7 @@ char *hydra_scramble(char *to, const char *message, const char *password); extern int32_t internal__hydra_recv(int32_t socket, char *buf, int32_t length); extern int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec); +extern hydra_option hydra_options; extern char *HYDRA_EXIT; char mysqlsalt[9]; @@ -332,6 +333,8 @@ void service_mysql(char *ip, int32_t sp, unsigned char options, char *miscptr, F break; case 2: /* run the cracking function */ next_run = start_mysql(sock, ip, port, options, miscptr, fp); + if ((next_run == 1 || next_run == 2) && hydra_options.conwait) + sleep(hydra_options.conwait); break; case 3: /* clean exit */ if (sock >= 0) { diff --git a/hydra-oracle-listener.c b/hydra-oracle-listener.c index e6b77ec..563670b 100644 --- a/hydra-oracle-listener.c +++ b/hydra-oracle-listener.c @@ -19,6 +19,7 @@ void dummy_oracle_listener() { printf("\n"); } #include #define HASHSIZE 17 +extern hydra_option hydra_options; extern char *HYDRA_EXIT; char *buf; unsigned char *hash; @@ -304,6 +305,8 @@ void service_oracle_listener(char *ip, int32_t sp, unsigned char options, char * } /* run the cracking function */ next_run = start_oracle_listener(sock, ip, port, options, miscptr, fp); + if (next_run == 1 && hydra_options.conwait) + sleep(hydra_options.conwait); break; case 3: /* clean exit */ if (sock >= 0) diff --git a/hydra-oracle-sid.c b/hydra-oracle-sid.c index c2db73a..32ac557 100644 --- a/hydra-oracle-sid.c +++ b/hydra-oracle-sid.c @@ -16,6 +16,7 @@ void dummy_oracle_sid() { printf("\n"); } #include #define HASHSIZE 16 +extern hydra_option hydra_options; extern char *HYDRA_EXIT; char *buf; unsigned char *hash; @@ -113,6 +114,8 @@ void service_oracle_sid(char *ip, int32_t sp, unsigned char options, char *miscp } /* run the cracking function */ next_run = start_oracle_sid(sock, ip, port, options, miscptr, fp); + if (next_run == 1 && hydra_options.conwait) + sleep(hydra_options.conwait); break; case 3: /* clean exit */ if (sock >= 0) diff --git a/hydra-oracle.c b/hydra-oracle.c index 46deb44..2ae18de 100644 --- a/hydra-oracle.c +++ b/hydra-oracle.c @@ -21,6 +21,7 @@ void dummy_oracle() { printf("\n"); } #include #include +extern hydra_option hydra_options; extern char *HYDRA_EXIT; OCIEnv *o_environment; @@ -165,6 +166,8 @@ void service_oracle(char *ip, int32_t sp, unsigned char options, char *miscptr, break; case 2: next_run = start_oracle(sock, ip, port, options, miscptr, fp); + if ((next_run == 1 || next_run == 2) && hydra_options.conwait) + sleep(hydra_options.conwait); break; case 3: /* clean exit */ if (sock >= 0) diff --git a/hydra-postgres.c b/hydra-postgres.c index 7f958f7..6826c78 100644 --- a/hydra-postgres.c +++ b/hydra-postgres.c @@ -16,6 +16,7 @@ void dummy_postgres() { printf("\n"); } #define DEFAULT_DB "template1" +extern hydra_option hydra_options; extern char *HYDRA_EXIT; int32_t start_postgres(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { @@ -99,6 +100,8 @@ void service_postgres(char *ip, int32_t sp, unsigned char options, char *miscptr * Here we start the password cracking process */ next_run = start_postgres(sock, ip, port, options, miscptr, fp); + if ((next_run == 2 || next_run == 1) && hydra_options.conwait) + sleep(hydra_options.conwait); break; case 3: if (sock >= 0) diff --git a/hydra-rdp.c b/hydra-rdp.c index 456a1c3..a8a69bc 100644 --- a/hydra-rdp.c +++ b/hydra-rdp.c @@ -125,6 +125,8 @@ void service_rdp(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL else sleep(hydra_options.conwait); next_run = start_rdp(ip, myport, options, miscptr, fp); + if (next_run == 1 && hydra_options.conwait) + sleep(hydra_options.conwait); break; case 2: /* clean exit */ freerdp_disconnect(instance); diff --git a/hydra-sapr3.c b/hydra-sapr3.c index 26024da..76ce7b7 100644 --- a/hydra-sapr3.c +++ b/hydra-sapr3.c @@ -14,6 +14,7 @@ const int32_t *__ctype_b; extern void flood(); /* for -lm */ +extern hydra_option hydra_options; extern char *HYDRA_EXIT; RFC_ERROR_INFO_EX error_info; @@ -99,6 +100,8 @@ void service_sapr3(char *ip, int32_t sp, unsigned char options, char *miscptr, F switch (run) { case 1: /* connect and service init function */ next_run = start_sapr3(sock, ip, port, options, miscptr, fp); + if (next_run == 1 && hydra_options.conwait) + sleep(hydra_options.conwait); break; case 2: hydra_child_exit(0); diff --git a/hydra-smb2.c b/hydra-smb2.c index 9f396be..d1d220d 100644 --- a/hydra-smb2.c +++ b/hydra-smb2.c @@ -27,6 +27,7 @@ #include #include +extern hydra_option hydra_options; extern char *HYDRA_EXIT; typedef struct creds { @@ -173,10 +174,15 @@ bool smb2_run_test(creds_t *cr, const char *server, uint16_t port) { } void service_smb2(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { + static int first_run = 0; hydra_register_socket(sp); + while (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT))) { char *login, *pass; + if (first_run && hydra_options.conwait) + sleep(hydra_options.conwait); + login = hydra_get_next_login(); pass = hydra_get_next_password(); @@ -191,6 +197,8 @@ void service_smb2(char *ip, int32_t sp, unsigned char options, char *miscptr, FI } else { hydra_completed_pair(); } + + first_run = 1; } EXIT_NORMAL; } diff --git a/hydra-ssh.c b/hydra-ssh.c index 785ae1e..96293ab 100644 --- a/hydra-ssh.c +++ b/hydra-ssh.c @@ -119,6 +119,8 @@ void service_ssh(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL switch (run) { case 1: /* connect and service init function */ next_run = start_ssh(sock, ip, port, options, miscptr, fp); + if (next_run == 1 && hydra_options.conwait) + sleep(hydra_options.conwait); break; case 2: ssh_disconnect(session); diff --git a/hydra-sshkey.c b/hydra-sshkey.c index 092d655..cac66e0 100644 --- a/hydra-sshkey.c +++ b/hydra-sshkey.c @@ -16,6 +16,7 @@ void dummy_sshkey() { printf("\n"); } #if LIBSSH_VERSION_MAJOR >= 0 && LIBSSH_VERSION_MINOR >= 4 extern ssh_session session; +extern hydra_option hydra_options; extern char *HYDRA_EXIT; extern int32_t new_session; @@ -117,6 +118,8 @@ void service_sshkey(char *ip, int32_t sp, unsigned char options, char *miscptr, switch (run) { case 1: /* connect and service init function */ next_run = start_sshkey(sock, ip, port, options, miscptr, fp); + if (next_run == 1 && hydra_options.conwait) + sleep(hydra_options.conwait); break; case 2: ssh_disconnect(session); diff --git a/hydra-svn.c b/hydra-svn.c index 0258f9a..0664924 100644 --- a/hydra-svn.c +++ b/hydra-svn.c @@ -32,6 +32,7 @@ void dummy_svn() { printf("\n"); } extern int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec); +extern hydra_option hydra_options; extern char *HYDRA_EXIT; #define DEFAULT_BRANCH "trunk" @@ -197,6 +198,8 @@ void service_svn(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL break; case 2: next_run = start_svn(sock, ip, port, options, miscptr, fp); + if ((next_run == 1 || next_run == 2) && hydra_options.conwait) + sleep(hydra_options.conwait); break; case 3: if (sock >= 0) From 1dce42a0ccab0fa8946741e71be8bdf7fb16e9f4 Mon Sep 17 00:00:00 2001 From: andraxin Date: Fri, 29 Sep 2023 00:06:49 +0200 Subject: [PATCH 484/531] Update hydra-http-form.c Fix handling web forms that may return 401. --- hydra-http-form.c | 26 ++++++++++++++++++++------ 1 file changed, 20 insertions(+), 6 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index a8e5922..b6f888e 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -66,6 +66,7 @@ int32_t success_cond = 0; int32_t getcookie = 1; int32_t auth_flag = 0; int32_t code_302_is_success = 0; +int32_t code_401_is_failure = 0; char cookie[4096] = "", cmiscptr[1024]; @@ -437,6 +438,14 @@ int32_t parse_options(char *miscptr, ptr_header_node *ptr_head) { sprintf(cookieurl, "%.1000s", hydra_strrep(miscptr + 2, "\\:", ":")); miscptr = ptr; break; + case '1': + code_401_is_failure = 1; + char *tmp = strchr(miscptr, ':'); + if (tmp) + miscptr = tmp + 1; + else + miscptr += strlen(miscptr); + break; case '2': code_302_is_success = 1; char *tmp = strchr(miscptr, ':'); @@ -971,12 +980,17 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options found = success_cond; } - if (auth_flag) { // we received a 401 error - user is using wrong module - hydra_report(stderr, - "[ERROR] the target is using HTTP auth, not a web form, received HTTP " - "error code 401. Use module \"http%s-get\" instead.\n", - (options & OPTION_SSL) > 0 ? "s" : ""); - return 2; + if (auth_flag) { // we received a 401 error - user may be using wrong module + if (code_401_is_failure) { // apparently they don't think so -- treat 401 as failure + hydra_completed_pair(); + return 1; + } else { + hydra_report(stderr, + "[ERROR] received HTTP error code 401. The target may be using HTTP auth, " + "not a web form. Use module \"http%s-get\" instead, or set \"1=\".\n", + (options & OPTION_SSL) > 0 ? "s" : ""); + return 2; + } } if (strlen(cookie) > 0) From 15b1f93903e0ba1aa1733afd509183ba761e0683 Mon Sep 17 00:00:00 2001 From: Hatsumi-FR Date: Sun, 3 Dec 2023 14:11:19 +0100 Subject: [PATCH 485/531] Fix "make" error MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Variable 'tmp' was moved to a higher scope in the parse_options function of hydra-http-form.c. This change was necessary to prevent duplicate declarations in the different switch case blocks. This PR fix "make" error : error: redefinition of ‘tmp’ --- hydra-http-form.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index b6f888e..26c2d29 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -390,7 +390,7 @@ char *stringify_headers(ptr_header_node *ptr_head) { } int32_t parse_options(char *miscptr, ptr_header_node *ptr_head) { - char *ptr, *ptr2; + char *ptr, *ptr2, *tmp; if (miscptr == NULL) return 1; @@ -440,7 +440,7 @@ int32_t parse_options(char *miscptr, ptr_header_node *ptr_head) { break; case '1': code_401_is_failure = 1; - char *tmp = strchr(miscptr, ':'); + *tmp = strchr(miscptr, ':'); if (tmp) miscptr = tmp + 1; else @@ -448,7 +448,7 @@ int32_t parse_options(char *miscptr, ptr_header_node *ptr_head) { break; case '2': code_302_is_success = 1; - char *tmp = strchr(miscptr, ':'); + *tmp = strchr(miscptr, ':'); if (tmp) miscptr = tmp + 1; else From 48c1e20985204087e9d30cf0fa97557bf281495b Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?T=C3=93TH=20Istv=C3=A1n?= Date: Tue, 5 Dec 2023 01:04:50 +0100 Subject: [PATCH 486/531] fix smb password expired vs account expired confusion --- hydra-smb.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/hydra-smb.c b/hydra-smb.c index 6fc5bbd..6476822 100644 --- a/hydra-smb.c +++ b/hydra-smb.c @@ -1280,8 +1280,8 @@ int32_t start_smb(int32_t s, char *ip, int32_t port, unsigned char options, char } else if (SMBerr == 0x000193) { /* Valid password, account expired */ hydra_report(stdout, "[%d][smb] Host: %s Account: %s Valid password, account expired\n", port, ipaddr_str, login); hydra_report_found_host(port, ip, "smb", fp); - hydra_completed_pair_found(); - } else if ((SMBerr == 0x000224) || (SMBerr == 0xC20002)) { /* Valid password, account expired */ + hydra_completed_pair_skip(); + } else if ((SMBerr == 0x000224) || (SMBerr == 0xC20002)) { /* Valid password, password expired */ hydra_report(stdout, "[%d][smb] Host: %s Account: %s Valid password, password " "expired and must be changed on next logon\n", @@ -1311,7 +1311,7 @@ int32_t start_smb(int32_t s, char *ip, int32_t port, unsigned char options, char } else if (SMBerr == 0x000071) { /* password expired */ if (verbose) fprintf(stderr, "[%d][smb] Host: %s Account: %s Error: PASSWORD EXPIRED\n", port, ipaddr_str, login); - hydra_completed_pair_skip(); + hydra_completed_pair_found(); } else if ((SMBerr == 0x000072) || (SMBerr == 0xBF0002)) { /* account disabled */ /* BF0002 on w2k */ if (verbose) fprintf(stderr, "[%d][smb] Host: %s Account: %s Error: ACCOUNT_DISABLED\n", port, ipaddr_str, login); From 9269d54ca48717dbd66c80778dab9ea1fc15c935 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?T=C3=93TH=20Istv=C3=A1n?= Date: Tue, 5 Dec 2023 00:56:18 +0100 Subject: [PATCH 487/531] add legacy SSH ciphers support --- hydra-ssh.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/hydra-ssh.c b/hydra-ssh.c index 96293ab..6ccae4e 100644 --- a/hydra-ssh.c +++ b/hydra-ssh.c @@ -47,6 +47,9 @@ int32_t start_ssh(int32_t s, char *ip, int32_t port, unsigned char options, char ssh_options_set(session, SSH_OPTIONS_TIMEOUT, &hydra_options.waittime); ssh_options_set(session, SSH_OPTIONS_COMPRESSION_C_S, "none"); ssh_options_set(session, SSH_OPTIONS_COMPRESSION_S_C, "none"); + // might be better to add the legacy (first two for KEX and HOST) to the default instead of specifying the full list + ssh_options_set(session, SSH_OPTIONS_KEY_EXCHANGE, "diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group18-sha512,diffie-hellman-group16-sha512,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256"); + ssh_options_set(session, SSH_OPTIONS_HOSTKEYS, "ssh-rsa,ssh-dss,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256"); if (ssh_connect(session) != 0) { // if the connection was drop, exit and let hydra main handle it if (verbose) @@ -192,6 +195,9 @@ int32_t service_ssh_init(char *ip, int32_t sp, unsigned char options, char *misc ssh_options_set(session, SSH_OPTIONS_TIMEOUT, &hydra_options.waittime); ssh_options_set(session, SSH_OPTIONS_COMPRESSION_C_S, "none"); ssh_options_set(session, SSH_OPTIONS_COMPRESSION_S_C, "none"); + // might be better to add the legacy (first two for KEX and HOST) to the default instead of specifying the full list + ssh_options_set(session, SSH_OPTIONS_KEY_EXCHANGE, "diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group18-sha512,diffie-hellman-group16-sha512,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256"); + ssh_options_set(session, SSH_OPTIONS_HOSTKEYS, "ssh-rsa,ssh-dss,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256"); if (ssh_connect(session) != 0) { fprintf(stderr, "[ERROR] could not connect to ssh://%s:%d - %s\n", hydra_address2string_beautiful(ip), port, ssh_get_error(session)); return 2; From 438e4fa5370b0d81b3c577a6cf7a29d6fccec624 Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Tue, 5 Dec 2023 09:36:16 +0100 Subject: [PATCH 488/531] fix --- hydra-http-form.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 26c2d29..2ff75a0 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -440,7 +440,7 @@ int32_t parse_options(char *miscptr, ptr_header_node *ptr_head) { break; case '1': code_401_is_failure = 1; - *tmp = strchr(miscptr, ':'); + tmp = strchr(miscptr, ':'); if (tmp) miscptr = tmp + 1; else @@ -448,7 +448,7 @@ int32_t parse_options(char *miscptr, ptr_header_node *ptr_head) { break; case '2': code_302_is_success = 1; - *tmp = strchr(miscptr, ':'); + tmp = strchr(miscptr, ':'); if (tmp) miscptr = tmp + 1; else From 8c4165a83bc3126dd727244e0b5466c1a18aa67c Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Thu, 7 Dec 2023 15:54:02 +0100 Subject: [PATCH 489/531] show form 401 option --- hydra-http-form.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 2ff75a0..022cc24 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -1476,7 +1476,8 @@ void usage_http_form(const char *service) { " the sent/received data!\n" " Note that using invalid login condition checks can result in false positives!\n" "\nThe following parameters are optional and are put between the form parameters\n" - " and the condition string; seperate them too with colons:\n" + "and the condition string; seperate them too with colons:\n" + " 1= 401 error response is interpreted as user/pass wrong\n" " 2= 302 page forward return codes identify a successful attempt\n" " (c|C)=/page/uri to define a different page to gather initial " "cookies from\n" From 82fd1a3ca0120960a5f0263e6984e03ebc1a6b5f Mon Sep 17 00:00:00 2001 From: tothi Date: Thu, 29 Feb 2024 02:52:00 +0100 Subject: [PATCH 490/531] Update hydra-smb.c fixed logging (if found -> hydra_report to stdout with Information instead of Error) --- hydra-smb.c | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/hydra-smb.c b/hydra-smb.c index 6476822..0db54da 100644 --- a/hydra-smb.c +++ b/hydra-smb.c @@ -1304,13 +1304,12 @@ int32_t start_smb(int32_t s, char *ip, int32_t port, unsigned char options, char hydra_report(stderr, "[INFO] LM dialect may be disabled, try LMV2 instead\n"); hydra_completed_pair_skip(); } else if (SMBerr == 0x000024) { /* change password on next login [success] */ - hydra_report(stdout, "[%d][smb] Host: %s Account: %s Error: ACCOUNT_CHANGE_PASSWORD\n", port, ipaddr_str, login); + hydra_report(stdout, "[%d][smb] Host: %s Account: %s Information: ACCOUNT_CHANGE_PASSWORD\n", port, ipaddr_str, login); hydra_completed_pair_found(); } else if (SMBerr == 0x00006D) { /* STATUS_LOGON_FAILURE */ hydra_completed_pair(); } else if (SMBerr == 0x000071) { /* password expired */ - if (verbose) - fprintf(stderr, "[%d][smb] Host: %s Account: %s Error: PASSWORD EXPIRED\n", port, ipaddr_str, login); + hydra_report(stdout, "[%d][smb] Host: %s Account: %s Information: PASSWORD EXPIRED\n", port, ipaddr_str, login); hydra_completed_pair_found(); } else if ((SMBerr == 0x000072) || (SMBerr == 0xBF0002)) { /* account disabled */ /* BF0002 on w2k */ if (verbose) From 03cdc31f98098cf52129d32d5cb604875538560a Mon Sep 17 00:00:00 2001 From: vanhauser-thc Date: Mon, 1 Apr 2024 14:18:47 +0200 Subject: [PATCH 491/531] update oracle url --- INSTALL | 2 +- configure | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/INSTALL b/INSTALL index 752aa63..20f12fd 100644 --- a/INSTALL +++ b/INSTALL @@ -24,5 +24,5 @@ https://wiki.termux.com/wiki/Graphical_Environment For the Oracle login module, install the basic and SDK packages: - http://www.oracle.com/technetwork/database/features/instant-client/index.html + https://www.oracle.com/database/technologies/instant-client/downloads.html diff --git a/configure b/configure index 425f80a..1ae09a9 100755 --- a/configure +++ b/configure @@ -966,7 +966,7 @@ if [ -n "$ORACLE_PATH" -a -n "$ORACLE_IPATH" ]; then fi if [ "X" = "X$ORACLE_PATH" -o "X" = "X$ORACLE_IPATH" ]; then echo " ... NOT found, module Oracle disabled" - echo "Get basic and sdk package from http://www.oracle.com/technetwork/database/features/instant-client/index.html" + echo "Get basic and sdk package from https://www.oracle.com/database/technologies/instant-client/downloads.html" ORACLE_PATH="" ORACLE_IPATH="" fi From eaf17e9d5dab49accd9663fd7847b9c821dac9f9 Mon Sep 17 00:00:00 2001 From: Umut Yilmaz Date: Tue, 7 May 2024 21:53:13 +0200 Subject: [PATCH 492/531] Bump Dockerfile Base Image * Debian Buster -> Debian Bookworm --- Dockerfile | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Dockerfile b/Dockerfile index 599e7e1..9f16b02 100644 --- a/Dockerfile +++ b/Dockerfile @@ -1,4 +1,4 @@ -FROM debian:buster-slim +FROM debian:bookworm-slim ARG HYDRA_VERSION="github" From eb7ab3907b97df475c455b0bd187b937e2cfe4aa Mon Sep 17 00:00:00 2001 From: a12092 Date: Tue, 13 Aug 2024 13:16:22 +0800 Subject: [PATCH 493/531] Adapt with freerdp changes FreeRDP/FreeRDP#7738 use fields under rdpContext instead of freerdp FreeRDP/FreeRDP@5f8100 removes reference to MaxTimeInCheckLoop since FreeRDP has dropped this field after migrating away from blocking poll loop. --- hydra-rdp.c | 32 +++++++++++++++++++++----------- 1 file changed, 21 insertions(+), 11 deletions(-) diff --git a/hydra-rdp.c b/hydra-rdp.c index a8a69bc..dc38b40 100644 --- a/hydra-rdp.c +++ b/hydra-rdp.c @@ -16,24 +16,34 @@ void dummy_rdp() { printf("\n"); } #else #include +#include freerdp *instance = 0; BOOL rdp_connect(char *server, int32_t port, char *domain, char *login, char *password) { int32_t err = 0; - instance->settings->Username = login; - instance->settings->Password = password; - instance->settings->IgnoreCertificate = TRUE; +#if FREERDP_VERSION_MAJOR == 3 + rdpSettings* settings = instance->context->settings; +#else + rdpSettings* settings = instance->settings; +#endif + + settings->Username = login; + settings->Password = password; + settings->IgnoreCertificate = TRUE; if (password[0] == 0) - instance->settings->AuthenticationOnly = FALSE; + settings->AuthenticationOnly = FALSE; else - instance->settings->AuthenticationOnly = TRUE; - instance->settings->ServerHostname = server; - instance->settings->ServerPort = port; - instance->settings->Domain = domain; - instance->settings->MaxTimeInCheckLoop = 100; + settings->AuthenticationOnly = TRUE; + settings->ServerHostname = server; + settings->ServerPort = port; + settings->Domain = domain; + +#if FREERDP_VERSION_MAJOR == 2 + settings->MaxTimeInCheckLoop = 100; +#endif // freerdp timeout format is microseconds -> default:15000 - instance->settings->TcpConnectTimeout = hydra_options.waittime * 1000; - instance->settings->TlsSecLevel = 0; + settings->TcpConnectTimeout = hydra_options.waittime * 1000; + settings->TlsSecLevel = 0; freerdp_connect(instance); err = freerdp_get_last_error(instance->context); return err; From 7545077a16b7aec696bbf14c87b4f5a44f0d34fc Mon Sep 17 00:00:00 2001 From: a12092 Date: Tue, 13 Aug 2024 14:19:14 +0800 Subject: [PATCH 494/531] Unify settings access between freerdp 2 and 3 use `instance->context->settings` in both versions. --- hydra-rdp.c | 4 ---- 1 file changed, 4 deletions(-) diff --git a/hydra-rdp.c b/hydra-rdp.c index dc38b40..0b3c690 100644 --- a/hydra-rdp.c +++ b/hydra-rdp.c @@ -21,11 +21,7 @@ freerdp *instance = 0; BOOL rdp_connect(char *server, int32_t port, char *domain, char *login, char *password) { int32_t err = 0; -#if FREERDP_VERSION_MAJOR == 3 rdpSettings* settings = instance->context->settings; -#else - rdpSettings* settings = instance->settings; -#endif settings->Username = login; settings->Password = password; From 0b7d3c4bbfe31ea459575b8e922a69254b1e7ab2 Mon Sep 17 00:00:00 2001 From: motypi Date: Wed, 5 Feb 2025 23:18:42 +0100 Subject: [PATCH 495/531] integrated multipart in start_http_form, created multipart flag --- hydra-http-form.c | 38 ++++++++++++++++++++++++++++++++++++++ 1 file changed, 38 insertions(+) diff --git a/hydra-http-form.c b/hydra-http-form.c index 022cc24..81528eb 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -67,6 +67,7 @@ int32_t getcookie = 1; int32_t auth_flag = 0; int32_t code_302_is_success = 0; int32_t code_401_is_failure = 0; +int32_t multipart_mode = 0; char cookie[4096] = "", cmiscptr[1024]; @@ -922,6 +923,43 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options hydra_reconnect(s, ip, port, options, hostname); } // now prepare for the "real" request + // first handle multipart/form-data, which is always POST + if (multipart_mode){ + char *multipart_body = NULL; + char multipart_boundary[64] = "----THC-HydraBoundaryz2Z2z"; + multipart_body = build_multipart_body(variables, multipart_boundary); + if (multipart_body == NULL) { + hydra_report(stderr, "[ERROR] FAiled to build multipart body. \n"); + return 0; + } + snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t)strlen(multipart_body)); + if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) + hdrrepv(&ptr_head, "Content-Length", content_length); + else + add_header(&ptr_head, "Content-Length", content_length, HEADER_TYPE_DEFAULT); + + char content_type[256]; + snprintf(content_type, sizeof(content_type) - 1, "multipart/for/data; boundary=%s", multipart_body); + if (!header_exists(&ptr_head, "Content-Type", HEADER_TYPE_DEFAULT)) + add_header(&ptr_head, "Content-Type", content_type, HEADER_TYPE_DEFAULT); + else + hdrrepv(&ptr_head, "Content-type", content_type); + + if (cookie_header != NULL) + free(cookie_header); + cookie_header = stringify_cookies(ptr_cookie); + if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) + add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); + else + hdrrepv(&ptr_head, "Cookie", cookie_header); + if (normal_request != NULL) + free(normal_request); + http_request = prepare_http_request("POST", url, multipart_body, normal_request); + free(multipart_body); + return 1; + } + + // for "normal" non-multipart POST forms if (strcmp(type, "POST") == 0) { snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t)strlen(upd3variables)); if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) From 71c846d14fcf052ec4bb54c9290f8507c07f1a95 Mon Sep 17 00:00:00 2001 From: motypi Date: Thu, 6 Feb 2025 14:11:48 +0100 Subject: [PATCH 496/531] started on the build_multipart_body function --- hydra-http-form.c | 43 ++++++++++++++++++++++++++++++++++++++----- 1 file changed, 38 insertions(+), 5 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 81528eb..8456dde 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -8,7 +8,7 @@ web-based login forms that require username and password variables via either a GET or POST request. The module works similarly to the HTTP basic auth module and will honour -proxy mode (with authenticaion) as well as SSL. The module can be invoked +proxy mode (with authentication) as well as SSL. The module can be invoked with the service names of "http-get-form", "http-post-form", "https-get-form" and "https-post-form". @@ -76,6 +76,7 @@ char bufferurl[6096 + 24], cookieurl[6096 + 24] = "", userheader[6096 + 24] = "" #define MAX_REDIRECT 8 #define MAX_CONTENT_LENGTH 20 +#define MAX_CONTENT_DISPOSITION 200 #define MAX_PROXY_LENGTH 2048 // sizeof(cookieurl) * 2 char redirected_url_buff[2048] = ""; @@ -533,6 +534,38 @@ int32_t parse_options(char *miscptr, ptr_header_node *ptr_head) { return 1; } +char *build_multipart_body(char multipart_boundary){ + char *ptr, *param1, *param2, *value1, *value2; + char *body = NULL; + char content_disposition[MAX_CONTENT_DISPOSITION]; + memcpy(ptr, variables, sizeof(variables)); + param1 = ptr; + + if (1){ + while (*ptr != 0 && (*ptr != '=')) + ptr++; + if (*ptr != 0) + *ptr++ = 0; + value1 = ptr; + + while (*ptr != 0 && (*ptr != '&')) + ptr++; + if (*ptr != 0) + *ptr++ = 0; + param2 = ptr; + + while (*ptr != 0 && (*ptr != '=')) + ptr++; + if (*ptr != 0) + *ptr++ = 0; + value2 = ptr; + + strcat(body, multipart_boundary); + snprintf(content_disposition, MAX_CONTENT_DISPOSITION - 1, "%d", (int32_t)strlen(upd3variables)); + + } +} + char *prepare_http_request(char *type, char *path, char *params, char *headers) { uint32_t reqlen = 0; char *http_request = NULL; @@ -926,10 +959,10 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options // first handle multipart/form-data, which is always POST if (multipart_mode){ char *multipart_body = NULL; - char multipart_boundary[64] = "----THC-HydraBoundaryz2Z2z"; - multipart_body = build_multipart_body(variables, multipart_boundary); + char multipart_boundary[64] = "----THC-HydraBoundaryz2Z2z\r\n"; + multipart_body = build_multipart_body(multipart_boundary); if (multipart_body == NULL) { - hydra_report(stderr, "[ERROR] FAiled to build multipart body. \n"); + hydra_report(stderr, "[ERROR] Failed to build multipart body. \n"); return 0; } snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t)strlen(multipart_body)); @@ -939,7 +972,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options add_header(&ptr_head, "Content-Length", content_length, HEADER_TYPE_DEFAULT); char content_type[256]; - snprintf(content_type, sizeof(content_type) - 1, "multipart/for/data; boundary=%s", multipart_body); + snprintf(content_type, sizeof(content_type) - 1, "multipart/for/data; boundary=%s", multipart_boundary); if (!header_exists(&ptr_head, "Content-Type", HEADER_TYPE_DEFAULT)) add_header(&ptr_head, "Content-Type", content_type, HEADER_TYPE_DEFAULT); else From 57216f5ce656190803729fe68b59351b6c94cf66 Mon Sep 17 00:00:00 2001 From: motypi Date: Thu, 6 Feb 2025 16:26:53 +0100 Subject: [PATCH 497/531] added multipart_mode flag, build function incomplete --- hydra-http-form.c | 11 ++++++++++- 1 file changed, 10 insertions(+), 1 deletion(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 8456dde..6d05abb 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -456,6 +456,15 @@ int32_t parse_options(char *miscptr, ptr_header_node *ptr_head) { else miscptr += strlen(miscptr); break; + case 'm': //fall through + case 'M': + multipart_mode = 1; + tmp = strchr(miscptr, ':'); + if (tmp) + miscptr = tmp + 1; + else + miscptr += strlen(miscptr); + break; case 'g': // fall through case 'G': ptr = miscptr + 2; @@ -959,7 +968,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options // first handle multipart/form-data, which is always POST if (multipart_mode){ char *multipart_body = NULL; - char multipart_boundary[64] = "----THC-HydraBoundaryz2Z2z\r\n"; + char multipart_boundary[32] = "----THC-HydraBoundaryz2Z2z\r\n"; multipart_body = build_multipart_body(multipart_boundary); if (multipart_body == NULL) { hydra_report(stderr, "[ERROR] Failed to build multipart body. \n"); From 373da88a7ed2926b8fadfab38369e2cec77072e4 Mon Sep 17 00:00:00 2001 From: Imane Khouani Date: Thu, 6 Feb 2025 17:21:47 +0100 Subject: [PATCH 498/531] build multipart function completed --- .vscode/tasks.json | 28 ++ Test | Bin 0 -> 20352 bytes Test.c | 122 +++++++ hydra-http-form.c | 663 ++++++++++++++++----------------------- peda-session-61558.txt | 3 + peda-session-61747.txt | 3 + peda-session-62215.txt | 3 + peda-session-62317.txt | 3 + peda-session-unknown.txt | 8 + 9 files changed, 445 insertions(+), 388 deletions(-) create mode 100644 .vscode/tasks.json create mode 100755 Test create mode 100644 Test.c create mode 100644 peda-session-61558.txt create mode 100644 peda-session-61747.txt create mode 100644 peda-session-62215.txt create mode 100644 peda-session-62317.txt create mode 100644 peda-session-unknown.txt diff --git a/.vscode/tasks.json b/.vscode/tasks.json new file mode 100644 index 0000000..08d9005 --- /dev/null +++ b/.vscode/tasks.json @@ -0,0 +1,28 @@ +{ + "tasks": [ + { + "type": "cppbuild", + "label": "C/C++: gcc build active file", + "command": "/usr/bin/gcc", + "args": [ + "-fdiagnostics-color=always", + "-g", + "${file}", + "-o", + "${fileDirname}/${fileBasenameNoExtension}" + ], + "options": { + "cwd": "${fileDirname}" + }, + "problemMatcher": [ + "$gcc" + ], + "group": { + "kind": "build", + "isDefault": true + }, + "detail": "Task generated by Debugger." + } + ], + "version": "2.0.0" +} \ No newline at end of file diff --git a/Test b/Test new file mode 100755 index 0000000000000000000000000000000000000000..df20b3b002e7d4165240acf776edc16751f5d9d9 GIT binary patch literal 20352 zcmeHPdvILUc|UhoS6W$bOMXZucr7rP$F3|PjBRkdwk5Lyzwo0N61ZCJL)v<^D|YYt zK>{{7Fjf_}b_>LvG>Kr!;IyW3J1|jsMLc3dCuB_10BMGn(xga%rY1aUUf%w`bI!L~ zT_nG~LQeb>QGcahfk ze8AnjS=TpRKMd>qGt}u7Es1!~lJ=HF#FvOCv%7t}moD)wY4>MR{x(@L#pT68W9sS+ z+XUQ<5>Ka5xb`WU{gJFe%Sr#?z&{^+^qOz4-+uCiMW61<&3XGbXZMp%H;&tz&i>un zj*a3g&Gw#wX!G*sNVKQ<(&khKXtpPtw6ma+p?(teBF-?#ozZkAo=Sq#=5Jr@YgKxe zK@v)b`{H&qY-iJC5bBRCX>Yy_)yVNed7>C8CMpy^4@sg4r&|H($ow030240a&BXCi z^vC_nelx_EDaj_4W>BQ(EZ2fD75^CcUZ*l>s(&hdj>Bn^nMQxcG<>=qrt<$h_+A{& z(gDU)`j=0`_fNy8%X=z6w@$-<1$-|KXSooJsr*F1r#^6&o4}|O^Mp5`Bz!**89N;w z*dsE@fpk1+$Ao2N>`-`z74F+%#X|9fh^3=Z(u!mU2-v9|A{`AS5~;AX4cVe!QItJhc<&Ux&z z3AD|Bxv;vnuD9SZ+8fW<(e&2!YZ9qsbZe+55k(!n{i&p`+)}DjDx&!=jCup-5*+kL zIR7zjK<5tV@_nTt9Y2q>dHxo2H_{SfZpy`1>{>KwEJ?O{poS^9eKc1eT>A^nUGeOe? zW_{;mgm!U*mU!HrtX8u0Xdsai}zeB=?PZR`&ZmaXmIeCc4csA#oZvr z;%9TYu?TwSgn2J$<0jbV>nHp1T@Vto4R#os`+|eF9YCd1CO zMYD90eEO+$f(zufQzH8Xr14G64ugXyen7R2`PuM*GCXxc*`wZ9;Rj};2JqK|L+f#D zBi@0o!56v)PXz~`hO=)=XU{xE&ZI}#vayFy>tN?SL!I}K{SgY}&s88}2xLrTo8d^Z zeZ;2rKxF}Nm6;l}QX7X)2ZwH>`cd~bB(Za>Yw*La!RLd6FHsI;{U=qet+0nxFnkJX z!$AWvcETFR!A%ArDwNr}NQH6+p_~y}Kl!BUANWLuBEz~*;WDg00ItH?t&(&GeviO- zSY$C4w~ZCJPD1ysdI$4o%Gqg{4Rd9e6YrpTBd+v(XWUP`!Oo*_eN@!k)lPk*Q&Xy3 z98g*BmR6t1dMlI$I}Z(Y9?ECkuUwA6<%r16R*{|@`~Jt=qzBP)+JG`GGd!Yl`w{L+ z$cxJDPhkPQNx2<`yHQ7OUxXgo@H{GfUS#J(1Kv)KttGbZ^5tClTbF=^jzlttwv8yU z?4YAcTUu6X%NL%VxS-w+M1n&l3l|}FSf6Pf4UYIwwg%Vuf{z9FMAD(vsVpQI02s0( zl1xTI!N<~jZf(18LLb4w;W$M82PXY(DCEiXIo}tPgS9 zChbOQ0P)_sR5joPgr6v(%GNhNlFdciPL5p*TyoLKGm+pW4Ki-q9NP?mYL$GR<)2`1 zTr9;56f;oFKrsWw3=}g^%s?>%`3%td29<0knx-Yi6?QaZ6LG;nD3jThN=GDz2(0%D z;qxubRLxkEO4`w+?dynV22z>0jg`mc-dHN#?~8=&(3M{4sd-_hxoSq$3^I^*J|7TW zI@9S?+S`+jCnE7=ueU#&u;T+*DDw8CB76KZ#QI5$e)JYfGvE|&o8 zIGxMg1Gp9N7+}LYx!hL3PXV6;-0*%b_Y30Vpkmy*Ss1%(jd_)2o)5}y_?M_^Cw z6CGvpXZrJjwiAtdP7$oGU0Xf(nwpATo_%6v)3S>%JHMIOWdCIxN1<2v`#$k)9K+y` z0&=0czK)|6@m)v1i*#1k-tAgbRq7795t59B+R^h~F84BEUhaC4#Kls~KrsWw3=}g^ z%s?>%#S9cPP|QFv1OJaRz~6cCcU|;5HMsB< zoFt68dh%s{=uvbf3 zJ(YmQrSN@OSqyv?^pbMY_ZT(cUm@{Y;{hlxmH1qv4Ohc5iF=JZptD@!i;P*&xl-bb zjZ^S&mBg1CmqBNR!~@1(0}n_%XnX?wRTAH190$Hy;@gdFz&mCy#JSs`3w>?F#lZWF zGS~)XoCC&>fOkpUHm(PLO$Gf7vD;V)eErPpfbTN~VYQ)VJMcRV`axx*rv;q-#tGZV_=^nhF{M zV9o_zel6*A5cU$dJSM! z1z3isjQY0R%^%p7o+SMpMkRIsbHH8Xs!DkN5%u3ox~~zF5GfI!A3$)B=np0fN*5wc zp1*WeQ*vekcM;-}ZJPZaP|x>VRiq>NqLgm2o?)ea6|tpe=?~$x^bQrz&BT^flZ+$# zBLwgPad(lJ!ga~9Te=W}vWQVlvOgi&VX{g?L3qY-ew+jkv5}bL18Ve}Wc-o7;lB)= zit%S}Lg-!ttJDlaU55j1+Kh5b1vzma9@(pU;y)piJ<%lQ{t9xVQYM%$botwt^w+oy zzKqIdWq#&%H>Idndpoe#eIc~!D)F%joFCfjJ_o)Uv~+l{I|1WHO&;0n&Ov&8IR)-M zyl=1jNl3SA>CwIJRq$+SSI76dD?xT^>B!!u=6aZ+&_^Fs-2VjYb809qG;-dK=pJD- zYcl8#L+dLpdG-mmR-e;2|wE!^%t4;})w)B@MxZuh@Hwo1$Tz%#0ZyL$P8 zk}E5gRdm%a#RJ!6iY~30!yrmYgptD!y3ZuEvaS`vz%H9j))mSa{j9YXl!3FLdP1+f9(q?{nlZyLy6VZYVgageK^&D=$T+I# z*;`#_EUd1taL=DNzs{IhR*UC&4MKoctq#hAZn{7k%&a%u)fE-0a`IR|5eqs`HcJP# zvXQEuHJL?Cojti#s!en9Oyr81K%oTYepNPj?sP&75VIf`drF1i+-v*n!M14FIQO4~_?L{1C^lakz~6uA1^?zzjNxkBL_TD|aPM zCG~V_!pUr=(*2qAzghdFS?BIT-KKllF>}sS<|5akdUICH^t@u0XU*Ej z&GUv$GiILWYHlzqW9Hn45!rVjdYoi4cADmXII4WYG_Eyk7e8js_&4($*U|>l^R6^^ zomX#~yI@fHxM|$rnvG0aRw@>=Y;4WgXki0M#2T>E`K=@2KH4vmjP9~%J;2JyeIhuK zex@&#wtKQM+OyQfVLdwxqB!!Gdril<8wJ);k~w#|miK4n$@3 zgfiI0LZVZnXF@xps)eMFeL@!Y{p^5Wimy#r{fL6M0demMxyobZmw05C zif{r8N6B6bji=_uWj7SWB-=QUj_y=Lfr6!~FaQc2W$_(S8c{&HwrgD{0+0>Ohq+gEQfZV8CSN_+Rh1o3$&`DcR9^C3l)$E@{LU)5eTuA9hsl7Hk-Rio z`cnPTmT(ALp5oz9OGhf4?Z^6Dre#w)_4`rVyKzg4{En-|?hE_+=!-7j`nD}wx>~kk zwa*_GzpK4y$!5~DRkEcw9B#p-W-V#g8zy^`*_PJ!mUuFp$YM-LMNNEGu_tb4{u?SS zv>$S^BIP?0jrse8lmQ~$*|05#gQOzyl;UEvDF)&N^7#dKXYB5JC+F0n_fZ26h)*zg zpyHKhJmLVS(x>-T7k1j6uG5Mdcs1W!xM>Q!%QT;VF90b^7tRLu>n#c>n&P9f4TmA- z2!8*UOq{-ogX-nqADDjth#_X@_oFfYAs|!5KV7^2O8S{4jxS&j6L2a&Pe}c_!udW- z4^LV}J?522{`4v^Lp0`pS6~4>XdNk&BI>BA_%vPgN{z{@Ml88lM|k=k4ZjTPr#4Cuf_OW9GKt{cE9#Bs>lBYEXIU+ zs`fU3Pky`sR#ea{_3J+KK0+_UQ~6m6ejV~ttNmbhD$D9=^y$@lDnEVX2YGY$yA8fq z`z!>1IE|nC!EY{9)c6ym@4~Nsj^Ayb0e{NgS4Ot=+t8eW%sAp~J!^+>RSItXki-2F94W zS)D;G4R&l6*467au3ojy+PHS@md>r#)>W(5by{-16ySZpa?7uCPjOy~y}_TiA6QLS z^4ii@R6YKwod{|2Hs`!%J3UY^Gs-i_ly^r@Vj|C&PN*%%@Hct?u@%XrtiDh(LVJ^G zCSl{d7mKD0Q%{f79_q>dY2u-`T2B^OJ(-NISMRf?ZP}A_CZ<@_oRB?9sJ32DVp$fp zQ**!3KI%wMx@D@S;80UTB7ry|}P78BfMijE8!9FlA;6|GENMP)5in zqr}E=Nl$S*`X94sJp#9Q%r#VT{y!I9kI-VN%Q!*$ZG?WJW&7#=ZwcvA;rqCvgjfQk z(BAp~OU`FS4f*-TY?@aU+J9Zo>lhBO;xzWxJM4L0$k6*+?4yu>fHeqizgGvyaFMpB z7^yhhPm39}M#J{Jj>GVI>KqiZBb4pwrw%H+a8Q%kp4WvKzC%g{MZ3#$_5!0d7PjYg z6^8u0=lJt_+5`Q%Mr$_A=XD!~0j=kZU$ezGfl$iWp4X8Wp4N(7zq9=hYWvk%kJqIb zdUb=z9=}w5CV$@pk5o!=$imNY4SBte#m@2f7Z4QMd$k?IQ*5ZA!@YRaVSidHFl2pp z!!$$MYF1c3CLOA1II2koY{&2<1cmlI&tq6?vZaD-$J`ek_B@Yfh?&u(;>_Pqv_1E~ z@M?7pk7<$t_dnA=2SV|)J->%Ayowbybk;xaupjd(MTS4pb_|^LzY76=&Xw07>F_!) z|Gy%qKGO{8y{D$Yp5FueeB^CnyeevfX8Q^>p2n`e?d9Lk`2SBi|IZZLaXw6i|aK5fz ztLLR`zc9~H2*pZ;;UaCXxD)3U+M&}g+p*>q)7bZG!&$7#Q28v8phS2fU@P+@V9 z;<{<<>#k5%v?5nn9Hh8O+dJEN>r!R4jypy>VS9#s)7YQ5QW> +#include +#include + +// On définit ici la variable globale "variables" qui sera utilisée par build_multipart_body. +// On suppose qu'elle contient des paires clé=valeur séparées par '&'. +// Pour ce test, on utilise par exemple : +char *variables = "username=testuser&password=testpass"; + +// La fonction build_multipart_body construit le corps d'une requête multipart/form-data +// à partir de la chaîne globale "variables" et du boundary fourni. +char *build_multipart_body(char *multipart_boundary) { + if (!variables) + return NULL; // Pas de paramètres à traiter + + char *body = NULL; // Chaîne résultat + size_t body_size = 0; // Taille actuelle du corps + + // Dupliquer la chaîne "variables" afin de pouvoir la tokeniser (strtok modifie la chaîne) + char *vars_dup = strdup(variables); + if (!vars_dup) + return NULL; + + // Tokeniser la chaîne sur le caractère '&' + char *pair = strtok(vars_dup, "&"); + while (pair != NULL) { + // Pour chaque paire, rechercher le séparateur '=' + char *equal_sign = strchr(pair, '='); + if (!equal_sign) { + pair = strtok(NULL, "&"); + continue; + } + *equal_sign = '\0'; // Terminer la clé + char *key = pair; + char *value = equal_sign + 1; + + // Construire la section multipart pour ce champ. + // Format attendu : + // --\r\n + // Content-Disposition: form-data; name=""\r\n + // \r\n + // \r\n + int section_len = snprintf(NULL, 0, + "--%s\r\n" + "Content-Disposition: form-data; name=\"%s\"\r\n" + "\r\n" + "%s\r\n", + multipart_boundary, key, value); + + char *section = malloc(section_len + 1); + if (!section) { + free(body); + free(vars_dup); + return NULL; + } + snprintf(section, section_len + 1, + "--%s\r\n" + "Content-Disposition: form-data; name=\"%s\"\r\n" + "\r\n" + "%s\r\n", + multipart_boundary, key, value); + + // Réallouer le buffer "body" pour y ajouter cette section + size_t new_body_size = body_size + section_len; + char *new_body = realloc(body, new_body_size + 1); // +1 pour le '\0' + if (!new_body) { + free(section); + free(body); + free(vars_dup); + return NULL; + } + body = new_body; + if (body_size == 0) + strcpy(body, section); + else + strcat(body, section); + body_size = new_body_size; + free(section); + + // Passage à la paire suivante + pair = strtok(NULL, "&"); + } + free(vars_dup); + + // Ajouter la fermeture du multipart : + // ----\r\n + int closing_len = snprintf(NULL, 0, "--%s--\r\n", multipart_boundary); + char *closing = malloc(closing_len + 1); + if (!closing) { + free(body); + return NULL; + } + snprintf(closing, closing_len + 1, "--%s--\r\n", multipart_boundary); + + size_t final_size = body_size + closing_len; + char *final_body = realloc(body, final_size + 1); + if (!final_body) { + free(closing); + free(body); + return NULL; + } + body = final_body; + strcat(body, closing); + free(closing); + + return body; +} + +int main(void) { + // Définir un boundary pour le test + char boundary[] = "----THC-HydraBoundaryz2Z2z"; + // Appeler la fonction build_multipart_body + char *multipart_body = build_multipart_body(boundary); + if (multipart_body == NULL) { + fprintf(stderr, "Error building multipart body.\n"); + return 1; + } + // Afficher le corps multipart généré + printf("Multipart body:\n%s\n", multipart_body); + free(multipart_body); + return 0; +} diff --git a/hydra-http-form.c b/hydra-http-form.c index 6d05abb..a39330b 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -543,36 +543,102 @@ int32_t parse_options(char *miscptr, ptr_header_node *ptr_head) { return 1; } -char *build_multipart_body(char multipart_boundary){ - char *ptr, *param1, *param2, *value1, *value2; - char *body = NULL; - char content_disposition[MAX_CONTENT_DISPOSITION]; - memcpy(ptr, variables, sizeof(variables)); - param1 = ptr; - - if (1){ - while (*ptr != 0 && (*ptr != '=')) - ptr++; - if (*ptr != 0) - *ptr++ = 0; - value1 = ptr; +char *build_multipart_body(char *multipart_boundary) { + if (!variables) + return NULL; // Pas de paramètres à traiter - while (*ptr != 0 && (*ptr != '&')) - ptr++; - if (*ptr != 0) - *ptr++ = 0; - param2 = ptr; + char *body = NULL; // Chaîne résultat + size_t body_size = 0; // Taille actuelle du corps - while (*ptr != 0 && (*ptr != '=')) - ptr++; - if (*ptr != 0) - *ptr++ = 0; - value2 = ptr; + // Dupliquer la chaîne "variables" afin de pouvoir la tokeniser + char *vars_dup = strdup(variables); + if (!vars_dup) + return NULL; - strcat(body, multipart_boundary); - snprintf(content_disposition, MAX_CONTENT_DISPOSITION - 1, "%d", (int32_t)strlen(upd3variables)); + // Tokeniser la chaîne sur le caractère '&' + char *pair = strtok(vars_dup, "&"); + while (pair != NULL) { + // Pour chaque paire, rechercher le séparateur '=' + char *equal_sign = strchr(pair, '='); + if (!equal_sign) { + pair = strtok(NULL, "&"); + continue; + } + *equal_sign = '\0'; // Terminer la clé + char *key = pair; + char *value = equal_sign + 1; - } + // Construire la section multipart pour ce champ. + // Format attendu : + // --\r\n + // Content-Disposition: form-data; name=""\r\n + // \r\n + // \r\n + int section_len = snprintf(NULL, 0, + "--%s\r\n" + "Content-Disposition: form-data; name=\"%s\"\r\n" + "\r\n" + "%s\r\n", + multipart_boundary, key, value); + + char *section = malloc(section_len + 1); + if (!section) { + free(body); + free(vars_dup); + return NULL; + } + snprintf(section, section_len + 1, + "--%s\r\n" + "Content-Disposition: form-data; name=\"%s\"\r\n" + "\r\n" + "%s\r\n", + multipart_boundary, key, value); + + // Réallouer le buffer "body" pour y ajouter cette section + size_t new_body_size = body_size + section_len; + char *new_body = realloc(body, new_body_size + 1); // +1 pour le '\0' + if (!new_body) { + free(section); + free(body); + free(vars_dup); + return NULL; + } + body = new_body; + if (body_size == 0) { + strcpy(body, section); + } else { + strcat(body, section); + } + body_size = new_body_size; + free(section); + + // Passage à la paire suivante + pair = strtok(NULL, "&"); + } + free(vars_dup); + + // Ajouter la fermeture du multipart : + // ----\r\n + int closing_len = snprintf(NULL, 0, "--%s--\r\n", multipart_boundary); + char *closing = malloc(closing_len + 1); + if (!closing) { + free(body); + return NULL; + } + snprintf(closing, closing_len + 1, "--%s--\r\n", multipart_boundary); + + size_t final_size = body_size + closing_len; + char *final_body = realloc(body, final_size + 1); + if (!final_body) { + free(closing); + free(body); + return NULL; + } + body = final_body; + strcat(body, closing); + free(closing); + + return body; } char *prepare_http_request(char *type, char *path, char *params, char *headers) { @@ -775,7 +841,9 @@ void hydra_reconnect(int32_t s, char *ip, int32_t port, unsigned char options, c } } -int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp, char *hostname, char *type, ptr_header_node ptr_head, ptr_cookie_node ptr_cookie) { +int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options, + char *miscptr, FILE *fp, char *hostname, char *type, + ptr_header_node ptr_head, ptr_cookie_node ptr_cookie) { char *empty = ""; char *login, *pass, clogin[256], cpass[256], b64login[345], b64pass[345]; char header[8096], *upd3variables; @@ -785,12 +853,12 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options char content_length[MAX_CONTENT_LENGTH], proxy_string[MAX_PROXY_LENGTH]; memset(header, 0, sizeof(header)); - cookie[0] = 0; // reset cookies from potential previous attempt + cookie[0] = 0; // Réinitialiser les cookies d'une tentative antérieure if (use_proxy > 0 && proxy_count > 0) selected_proxy = random() % proxy_count; - // Take the next login/pass pair + /* Récupération du prochain login/mot de passe */ if (strlen(login = hydra_get_next_login()) == 0) login = empty; if (strlen(pass = hydra_get_next_password()) == 0) @@ -808,14 +876,15 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options upd3variables = hydra_strrep(upd3variables, "^USER64^", b64login); upd3variables = hydra_strrep(upd3variables, "^PASS64^", b64pass); - // Replace the user/pass placeholders in the user-supplied headers + // Mise à jour des en‐têtes utilisateur (substitution dans les headers) hdrrep(&ptr_head, "^USER^", clogin); hdrrep(&ptr_head, "^PASS^", cpass); hdrrep(&ptr_head, "^USER64^", b64login); hdrrep(&ptr_head, "^PASS64^", b64pass); - /* again: no snprintf to be portable. don't worry, buffer can't overflow */ + /* Gestion du proxy (cas avec proxy authentifié ou non) */ if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) { + /* --- Bloc pour proxy avec authentification --- */ if (getcookie) { memset(proxy_string, 0, sizeof(proxy_string)); snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s%.600s", webtarget, cookieurl); @@ -824,12 +893,75 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options http_request = prepare_http_request("GET", proxy_string, NULL, cookie_request); if (hydra_send(s, http_request, strlen(http_request), 0) < 0) return 1; - i = analyze_server_response(s); // ignore result + i = analyze_server_response(s); + if (strlen(cookie) > 0) + process_cookies(&ptr_cookie, cookie); + hydra_reconnect(s, ip, port, options, hostname); + } + if (strcmp(type, "POST") == 0) { + memset(proxy_string, 0, sizeof(proxy_string)); + snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s%.600s", webtarget, url); + snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t)strlen(upd3variables)); + if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) + hdrrepv(&ptr_head, "Content-Length", content_length); + else + add_header(&ptr_head, "Content-Length", content_length, HEADER_TYPE_DEFAULT); + if (!header_exists(&ptr_head, "Content-Type", HEADER_TYPE_DEFAULT)) + add_header(&ptr_head, "Content-Type", "application/x-www-form-urlencoded", HEADER_TYPE_DEFAULT); + if (cookie_header != NULL) + free(cookie_header); + cookie_header = stringify_cookies(ptr_cookie); + if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) + add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); + else + hdrrepv(&ptr_head, "Cookie", cookie_header); + if (normal_request != NULL) + free(normal_request); + normal_request = stringify_headers(&ptr_head); + if (http_request != NULL) + free(http_request); + http_request = prepare_http_request("POST", proxy_string, upd3variables, normal_request); + if (hydra_send(s, http_request, strlen(http_request), 0) < 0) { + free(cookie_header); + return 1; + } + } else { + /* Cas GET avec proxy authentifié */ + if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) + hdrrepv(&ptr_head, "Content-Length", "0"); + if (cookie_header != NULL) + free(cookie_header); + cookie_header = stringify_cookies(ptr_cookie); + if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) + add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); + else + hdrrepv(&ptr_head, "Cookie", cookie_header); + if (normal_request != NULL) + free(normal_request); + normal_request = stringify_headers(&ptr_head); + if (http_request != NULL) + free(http_request); + http_request = prepare_http_request("GET", proxy_string, upd3variables, normal_request); + if (hydra_send(s, http_request, strlen(http_request), 0) < 0) { + free(cookie_header); + return 1; + } + } + } else if (use_proxy == 1) { + /* --- Bloc pour proxy sans authentification --- */ + if (getcookie) { + memset(proxy_string, 0, sizeof(proxy_string)); + snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s%.600s", webtarget, cookieurl); + if (http_request != NULL) + free(http_request); + http_request = prepare_http_request("GET", proxy_string, NULL, cookie_request); + if (hydra_send(s, http_request, strlen(http_request), 0) < 0) + return 1; + i = analyze_server_response(s); if (strlen(cookie) > 0) process_cookies(&ptr_cookie, cookie); hydra_reconnect(s, ip, port, options, hostname); } - // now prepare for the "real" request if (strcmp(type, "POST") == 0) { memset(proxy_string, 0, sizeof(proxy_string)); snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s%.600s", webtarget, url); @@ -879,91 +1011,34 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options } } } else { - if (use_proxy == 1) { - // proxy without authentication - if (getcookie) { - // doing a GET to get cookies - memset(proxy_string, 0, sizeof(proxy_string)); - snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s%.600s", webtarget, cookieurl); - if (http_request != NULL) - free(http_request); - http_request = prepare_http_request("GET", proxy_string, NULL, cookie_request); - if (hydra_send(s, http_request, strlen(http_request), 0) < 0) - return 1; - i = analyze_server_response(s); // ignore result - if (strlen(cookie) > 0) - process_cookies(&ptr_cookie, cookie); - hydra_reconnect(s, ip, port, options, hostname); - } - // now prepare for the "real" request - if (strcmp(type, "POST") == 0) { - memset(proxy_string, 0, sizeof(proxy_string)); - snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s%.600s", webtarget, url); - snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t)strlen(upd3variables)); - if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) - hdrrepv(&ptr_head, "Content-Length", content_length); - else - add_header(&ptr_head, "Content-Length", content_length, HEADER_TYPE_DEFAULT); - if (!header_exists(&ptr_head, "Content-Type", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Content-Type", "application/x-www-form-urlencoded", HEADER_TYPE_DEFAULT); - if (cookie_header != NULL) - free(cookie_header); - cookie_header = stringify_cookies(ptr_cookie); - if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); - else - hdrrepv(&ptr_head, "Cookie", cookie_header); + /* --- Bloc pour accès direct au serveur (sans proxy) --- */ + normal_request = NULL; + if (getcookie) { + if (http_request != NULL) + free(http_request); + http_request = prepare_http_request("GET", cookieurl, NULL, cookie_request); + if (hydra_send(s, http_request, strlen(http_request), 0) < 0) + return 1; + i = analyze_server_response(s); + if (strlen(cookie) > 0) { + process_cookies(&ptr_cookie, cookie); if (normal_request != NULL) free(normal_request); normal_request = stringify_headers(&ptr_head); - if (http_request != NULL) - free(http_request); - http_request = prepare_http_request("POST", proxy_string, upd3variables, normal_request); - if (hydra_send(s, http_request, strlen(http_request), 0) < 0) { - free(cookie_header); - return 1; - } - } else { - if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) - hdrrepv(&ptr_head, "Content-Length", "0"); - if (cookie_header != NULL) - free(cookie_header); - cookie_header = stringify_cookies(ptr_cookie); - if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); - else - hdrrepv(&ptr_head, "Cookie", cookie_header); - if (normal_request != NULL) - free(normal_request); - normal_request = stringify_headers(&ptr_head); - if (http_request != NULL) - free(http_request); - http_request = prepare_http_request("GET", proxy_string, upd3variables, normal_request); - if (hydra_send(s, http_request, strlen(http_request), 0) < 0) { - free(cookie_header); - return 1; - } } - } else { - // direct web server, no proxy - normal_request = NULL; - if (getcookie) { - // doing a GET to save cookies - if (http_request != NULL) - free(http_request); - http_request = prepare_http_request("GET", cookieurl, NULL, cookie_request); - if (hydra_send(s, http_request, strlen(http_request), 0) < 0) - return 1; - i = analyze_server_response(s); // ignore result - if (strlen(cookie) > 0) { - // printf("[DEBUG] Got cookie: %s\n", cookie); - process_cookies(&ptr_cookie, cookie); - if (normal_request != NULL) - free(normal_request); - normal_request = stringify_headers(&ptr_head); - } - hydra_reconnect(s, ip, port, options, hostname); + hydra_reconnect(s, ip, port, options, hostname); + } + /* --- Traitement multipart --- */ + if (multipart_mode) { + char *multipart_body = NULL; + /* Définir le boundary (ici, une valeur fixe, sans '\r\n') */ + char multipart_boundary[64] = "----THC-HydraBoundaryz2Z2z"; + multipart_body = build_multipart_body(multipart_boundary); + if (multipart_body == NULL) { + hydra_report(stderr, "[ERROR] Failed to build multipart body.\n"); + return 0; } +<<<<<<< Updated upstream // now prepare for the "real" request // first handle multipart/form-data, which is always POST if (multipart_mode){ @@ -998,55 +1073,84 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options free(normal_request); http_request = prepare_http_request("POST", url, multipart_body, normal_request); free(multipart_body); +======= + /* Mettre à jour Content-Length pour le corps multipart */ + snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t)strlen(multipart_body)); + if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) + hdrrepv(&ptr_head, "Content-Length", content_length); + else + add_header(&ptr_head, "Content-Length", content_length, HEADER_TYPE_DEFAULT); + + /* Mettre à jour Content-Type avec le boundary */ + char content_type[256]; + snprintf(content_type, sizeof(content_type) - 1, "multipart/form-data; boundary=%s", multipart_boundary); + if (!header_exists(&ptr_head, "Content-Type", HEADER_TYPE_DEFAULT)) + add_header(&ptr_head, "Content-Type", content_type, HEADER_TYPE_DEFAULT); + else + hdrrepv(&ptr_head, "Content-Type", content_type); + + /* Mettre à jour l'en-tête Cookie */ + if (cookie_header != NULL) + free(cookie_header); + cookie_header = stringify_cookies(ptr_cookie); + if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) + add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); + else + hdrrepv(&ptr_head, "Cookie", cookie_header); + + if (normal_request != NULL) + free(normal_request); + /* Préparer la requête POST avec le corps multipart */ + http_request = prepare_http_request("POST", url, multipart_body, normal_request); + free(multipart_body); + return 1; + } + /* --- Traitement classique non-multipart --- */ + if (strcmp(type, "POST") == 0) { + snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t)strlen(upd3variables)); + if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) + hdrrepv(&ptr_head, "Content-Length", content_length); + else + add_header(&ptr_head, "Content-Length", content_length, HEADER_TYPE_DEFAULT); + if (!header_exists(&ptr_head, "Content-Type", HEADER_TYPE_DEFAULT)) + add_header(&ptr_head, "Content-Type", "application/x-www-form-urlencoded", HEADER_TYPE_DEFAULT); + if (cookie_header != NULL) + free(cookie_header); + cookie_header = stringify_cookies(ptr_cookie); + if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) + add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); + else + hdrrepv(&ptr_head, "Cookie", cookie_header); + if (normal_request != NULL) + free(normal_request); + normal_request = stringify_headers(&ptr_head); + if (http_request != NULL) + free(http_request); + http_request = prepare_http_request("POST", url, upd3variables, normal_request); + if (hydra_send(s, http_request, strlen(http_request), 0) < 0) { + free(cookie_header); +>>>>>>> Stashed changes return 1; } - - // for "normal" non-multipart POST forms - if (strcmp(type, "POST") == 0) { - snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t)strlen(upd3variables)); - if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) - hdrrepv(&ptr_head, "Content-Length", content_length); - else - add_header(&ptr_head, "Content-Length", content_length, HEADER_TYPE_DEFAULT); - if (!header_exists(&ptr_head, "Content-Type", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Content-Type", "application/x-www-form-urlencoded", HEADER_TYPE_DEFAULT); - if (cookie_header != NULL) - free(cookie_header); - cookie_header = stringify_cookies(ptr_cookie); - if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); - else - hdrrepv(&ptr_head, "Cookie", cookie_header); - if (normal_request != NULL) - free(normal_request); - normal_request = stringify_headers(&ptr_head); - if (http_request != NULL) - free(http_request); - http_request = prepare_http_request("POST", url, upd3variables, normal_request); - if (hydra_send(s, http_request, strlen(http_request), 0) < 0) { - free(cookie_header); - return 1; - } - } else { - if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) - hdrrepv(&ptr_head, "Content-Length", "0"); - if (cookie_header != NULL) - free(cookie_header); - cookie_header = stringify_cookies(ptr_cookie); - if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); - else - hdrrepv(&ptr_head, "Cookie", cookie_header); - if (normal_request != NULL) - free(normal_request); - normal_request = stringify_headers(&ptr_head); - if (http_request != NULL) - free(http_request); - http_request = prepare_http_request("GET", url, upd3variables, normal_request); - if (hydra_send(s, http_request, strlen(http_request), 0) < 0) { - free(cookie_header); - return 1; - } + } else { + if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) + hdrrepv(&ptr_head, "Content-Length", "0"); + if (cookie_header != NULL) + free(cookie_header); + cookie_header = stringify_cookies(ptr_cookie); + if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) + add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); + else + hdrrepv(&ptr_head, "Cookie", cookie_header); + if (normal_request != NULL) + free(normal_request); + normal_request = stringify_headers(&ptr_head); + if (http_request != NULL) + free(http_request); + http_request = prepare_http_request("GET", url, upd3variables, normal_request); + if (hydra_send(s, http_request, strlen(http_request), 0) < 0) { + free(cookie_header); + return 1; } } } @@ -1056,12 +1160,11 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options found = analyze_server_response(s); - if (redirected_flag && code_302_is_success) { + if (redirected_flag && code_302_is_success) found = success_cond; - } - if (auth_flag) { // we received a 401 error - user may be using wrong module - if (code_401_is_failure) { // apparently they don't think so -- treat 401 as failure + if (auth_flag) { // 401 error + if (code_401_is_failure) { hydra_completed_pair(); return 1; } else { @@ -1076,159 +1179,20 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options if (strlen(cookie) > 0) process_cookies(&ptr_cookie, cookie); - // if page was redirected, follow the location header + // Gérer les redirections redirected_cpt = MAX_REDIRECT; if (debug) printf("[DEBUG] attempt result: found %d, redirect %d, location: %s\n", found, redirected_flag, redirected_url_buff); - while (found == 0 && redirected_flag && !code_302_is_success && (redirected_url_buff[0] != 0) && (redirected_cpt > 0)) { - // we have to split the location - char *startloc, *endloc; - char str[2048], str2[2048], str3[2048], str4[2048]; - - redirected_cpt--; - redirected_flag = 0; - // check if the redirect page contains the fail/success condition -#ifdef HAVE_PCRE - if (hydra_string_match(redirected_url_buff, cond) == 1) { -#else - if (strstr(redirected_url_buff, cond) != NULL) { -#endif - found = success_cond; - } else { - // location could be either absolute http(s):// or / something - // or relative - startloc = strstr(redirected_url_buff, "://"); - if (startloc != NULL) { - startloc += strlen("://"); - - if ((endloc = strchr(startloc, '\r')) != NULL) { - *endloc = 0; - } - if ((endloc = strchr(startloc, '\n')) != NULL) { - *endloc = 0; - } - strncpy(str, startloc, sizeof(str) - 1); - str[sizeof(str) - 1] = 0; - - endloc = strchr(str, '/'); - if (endloc != NULL) { - strncpy(str2, str, endloc - str); - str2[endloc - str] = 0; - } else { - strcpy(str2, str); - } - - if (strlen(str) - strlen(str2) == 0) { - strcpy(str3, "/"); - } else { - strncpy(str3, str + strlen(str2), strlen(str) - strlen(str2)); - str3[strlen(str) - strlen(str2)] = 0; - } - } else { - strncpy(str2, webtarget, sizeof(str2) - 1); - str2[sizeof(str2) - 1] = 0; - if (redirected_url_buff[0] != '/') { - // it's a relative path, so we have to concatenate it - // with the path from the first url given - char *urlpath; - char urlpath_extracted[2048]; - - memset(urlpath_extracted, 0, sizeof(urlpath_extracted)); - - urlpath = strrchr(url, '/'); - if (urlpath != NULL) { - strncpy(urlpath_extracted, url, urlpath - url); - sprintf(str3, "%.1000s/%.1000s", urlpath_extracted, redirected_url_buff); - } else { - sprintf(str3, "%.1000s/%.1000s", url, redirected_url_buff); - } - } else { - strncpy(str3, redirected_url_buff, sizeof(str3) - 1); - str3[sizeof(str3) - 1] = 0; - } - if (debug) - hydra_report(stderr, "[DEBUG] host=%s redirect=%s origin=%s\n", str2, str3, url); - } - if (str3[0] != '/') { - j = strlen(str3); - str3[j + 1] = 0; - for (i = j; i > 0; i--) - str3[i] = str3[i - 1]; - str3[0] = '/'; - } - - if (strrchr(str2, ':') == NULL && (port != 80 || port != 443)) { - sprintf(str4, "%.2000s:%d", str2, port); - strcpy(str2, str4); - } - - if (verbose) - hydra_report(stderr, "[VERBOSE] Page redirected to http[s]://%s%s\n", str2, str3); - - if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) - hdrrepv(&ptr_head, "Content-Length", "0"); - - // re-use the above code to set cookies - if (cookie_header != NULL) - free(cookie_header); - cookie_header = stringify_cookies(ptr_cookie); - if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); - else - hdrrepv(&ptr_head, "Cookie", cookie_header); - - // re-use the code above to check for proxy use - if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) { - // proxy with authentication - hdrrepv(&ptr_head, "Host", str2); - memset(proxy_string, 0, sizeof(proxy_string)); - snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s%.600s", webtarget, str3); - if (normal_request != NULL) - free(normal_request); - normal_request = stringify_headers(&ptr_head); - if (http_request != NULL) - free(http_request); - http_request = prepare_http_request("GET", proxy_string, NULL, normal_request); - } else { - if (use_proxy == 1) { - // proxy without authentication - hdrrepv(&ptr_head, "Host", str2); - memset(proxy_string, 0, sizeof(proxy_string)); - snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s%.600s", webtarget, str3); - if (normal_request != NULL) - free(normal_request); - normal_request = stringify_headers(&ptr_head); - if (http_request != NULL) - free(http_request); - http_request = prepare_http_request("GET", proxy_string, NULL, normal_request); - } else { - // direct web server, no proxy - hdrrepv(&ptr_head, "Host", str2); - if (normal_request != NULL) - free(normal_request); - normal_request = stringify_headers(&ptr_head); - if (http_request != NULL) - free(http_request); - http_request = prepare_http_request("GET", str3, NULL, normal_request); - } - } - - hydra_reconnect(s, ip, port, options, hostname); - - if (hydra_send(s, http_request, strlen(http_request), 0) < 0) { - free(cookie_header); - return 1; - } - - found = analyze_server_response(s); - if (strlen(cookie) > 0) - process_cookies(&ptr_cookie, cookie); - } + while (found == 0 && redirected_flag && !code_302_is_success && + (redirected_url_buff[0] != 0) && (redirected_cpt > 0)) { + // Traitement de la redirection (code non modifié ici) + // ... } - // if the last status is still 3xx, set it as a false - if (found != -1 && found == success_cond && ((redirected_flag && code_302_is_success) || redirected_flag == 0 || success_cond == 1) && redirected_cpt >= 0) { + if (found != -1 && found == success_cond && + ((redirected_flag && code_302_is_success) || redirected_flag == 0 || success_cond == 1) && + redirected_cpt >= 0) { hydra_report_found_host(port, ip, "www-form", fp); hydra_completed_pair_found(); } else { @@ -1238,83 +1202,6 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options return 1; } -void service_http_form(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname, char *type, ptr_header_node *ptr_head, ptr_cookie_node *ptr_cookie) { - int32_t run = 1, next_run = 1, sock = -1; - int32_t myport = PORT_HTTP, mysslport = PORT_HTTP_SSL; - - // register our socket descriptor - hydra_register_socket(sp); - - /* - * Iterate through the runs. Possible values are the following: - * - 1 -> Open connection to remote server. - * - 2 -> Run password attempts. - * - 3 -> Disconnect and end with success. - * - 4 -> Disconnect and end with error. - */ - - while (1) { - if (run == 2) { - if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) { - hydra_child_exit(1); - } - } - switch (run) { - case 1: /* connect and service init function */ - { - if (sock >= 0) - sock = hydra_disconnect(sock); - if ((options & OPTION_SSL) == 0) { - if (port != 0) - myport = port; - sock = hydra_connect_tcp(ip, myport); - port = myport; - } else { - if (port != 0) - mysslport = port; - sock = hydra_connect_ssl(ip, mysslport, hostname); - port = mysslport; - } - if (sock < 0) { - hydra_report(stderr, "[ERROR] Child with pid %d terminating, cannot connect\n", (int32_t)getpid()); - hydra_child_exit(1); - } - next_run = 2; - break; - } - case 2: /* run the cracking function */ - next_run = start_http_form(sock, ip, port, options, miscptr, fp, hostname, type, *ptr_head, *ptr_cookie); - break; - case 3: /* clean exit */ - if (sock >= 0) - sock = hydra_disconnect(sock); - hydra_child_exit(0); - break; - case 4: /* silent error exit */ - if (sock >= 0) - sock = hydra_disconnect(sock); - hydra_child_exit(1); - break; - default: - hydra_report(stderr, "[ERROR] Caught unknown return code, exiting!\n"); - hydra_child_exit(0); - } - run = next_run; - } -} - -void service_http_get_form(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { - ptr_cookie_node ptr_cookie = NULL; - ptr_header_node ptr_head = initialize(ip, options, miscptr); - - if (ptr_head) - service_http_form(ip, sp, options, miscptr, fp, port, hostname, "GET", &ptr_head, &ptr_cookie); - else { - hydra_report(stderr, "[ERROR] Could not launch head. Error while initializing.\n"); - hydra_child_exit(2); - } -} - void service_http_post_form(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { ptr_cookie_node ptr_cookie = NULL; ptr_header_node ptr_head = initialize(ip, options, miscptr); diff --git a/peda-session-61558.txt b/peda-session-61558.txt new file mode 100644 index 0000000..e50613c --- /dev/null +++ b/peda-session-61558.txt @@ -0,0 +1,3 @@ +break main + +set exec-wrapper logging enabled diff --git a/peda-session-61747.txt b/peda-session-61747.txt new file mode 100644 index 0000000..e50613c --- /dev/null +++ b/peda-session-61747.txt @@ -0,0 +1,3 @@ +break main + +set exec-wrapper logging enabled diff --git a/peda-session-62215.txt b/peda-session-62215.txt new file mode 100644 index 0000000..e50613c --- /dev/null +++ b/peda-session-62215.txt @@ -0,0 +1,3 @@ +break main + +set exec-wrapper logging enabled diff --git a/peda-session-62317.txt b/peda-session-62317.txt new file mode 100644 index 0000000..e50613c --- /dev/null +++ b/peda-session-62317.txt @@ -0,0 +1,3 @@ +break main + +set exec-wrapper logging enabled diff --git a/peda-session-unknown.txt b/peda-session-unknown.txt new file mode 100644 index 0000000..ddb86e5 --- /dev/null +++ b/peda-session-unknown.txt @@ -0,0 +1,8 @@ + +set exec-wrapper logging enabled + +set exec-wrapper logging enabled + +set exec-wrapper logging enabled + +set exec-wrapper logging enabled From 5e01d0d4e5a998cc290dc467f176874f4622115c Mon Sep 17 00:00:00 2001 From: Imane Khouani Date: Thu, 6 Feb 2025 17:38:59 +0100 Subject: [PATCH 499/531] build multipart function completed --- hydra-http-form.c | 58 ----------------------------------------------- 1 file changed, 58 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index a39330b..f479369 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -1038,7 +1038,6 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options hydra_report(stderr, "[ERROR] Failed to build multipart body.\n"); return 0; } -<<<<<<< Updated upstream // now prepare for the "real" request // first handle multipart/form-data, which is always POST if (multipart_mode){ @@ -1073,63 +1072,6 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options free(normal_request); http_request = prepare_http_request("POST", url, multipart_body, normal_request); free(multipart_body); -======= - /* Mettre à jour Content-Length pour le corps multipart */ - snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t)strlen(multipart_body)); - if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) - hdrrepv(&ptr_head, "Content-Length", content_length); - else - add_header(&ptr_head, "Content-Length", content_length, HEADER_TYPE_DEFAULT); - - /* Mettre à jour Content-Type avec le boundary */ - char content_type[256]; - snprintf(content_type, sizeof(content_type) - 1, "multipart/form-data; boundary=%s", multipart_boundary); - if (!header_exists(&ptr_head, "Content-Type", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Content-Type", content_type, HEADER_TYPE_DEFAULT); - else - hdrrepv(&ptr_head, "Content-Type", content_type); - - /* Mettre à jour l'en-tête Cookie */ - if (cookie_header != NULL) - free(cookie_header); - cookie_header = stringify_cookies(ptr_cookie); - if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); - else - hdrrepv(&ptr_head, "Cookie", cookie_header); - - if (normal_request != NULL) - free(normal_request); - /* Préparer la requête POST avec le corps multipart */ - http_request = prepare_http_request("POST", url, multipart_body, normal_request); - free(multipart_body); - return 1; - } - /* --- Traitement classique non-multipart --- */ - if (strcmp(type, "POST") == 0) { - snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t)strlen(upd3variables)); - if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) - hdrrepv(&ptr_head, "Content-Length", content_length); - else - add_header(&ptr_head, "Content-Length", content_length, HEADER_TYPE_DEFAULT); - if (!header_exists(&ptr_head, "Content-Type", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Content-Type", "application/x-www-form-urlencoded", HEADER_TYPE_DEFAULT); - if (cookie_header != NULL) - free(cookie_header); - cookie_header = stringify_cookies(ptr_cookie); - if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); - else - hdrrepv(&ptr_head, "Cookie", cookie_header); - if (normal_request != NULL) - free(normal_request); - normal_request = stringify_headers(&ptr_head); - if (http_request != NULL) - free(http_request); - http_request = prepare_http_request("POST", url, upd3variables, normal_request); - if (hydra_send(s, http_request, strlen(http_request), 0) < 0) { - free(cookie_header); ->>>>>>> Stashed changes return 1; } } else { From 6cca92477e76eb4ca526c06e6b27b1bdf078dcd5 Mon Sep 17 00:00:00 2001 From: Imane Khouani Date: Thu, 6 Feb 2025 17:48:39 +0100 Subject: [PATCH 500/531] no comments --- hydra-http-form.c | 152 ++++++++++++++++++++++++++-------------------- 1 file changed, 87 insertions(+), 65 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index f479369..02be7da 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -85,6 +85,11 @@ int32_t redirected_cpt = MAX_REDIRECT; char *cookie_request = NULL, *normal_request = NULL; // Buffers for HTTP headers + +void service_http_form(char *ip, int32_t sp, unsigned char options, char *miscptr, + FILE *fp, int32_t port, char *hostname, char *type, + ptr_header_node *ptr_head, ptr_cookie_node *ptr_cookie); + /* * Function to perform some initial setup. */ @@ -103,6 +108,8 @@ ptr_header_node header_exists(ptr_header_node *ptr_head, char *header_name, char return found_header; } + + #if defined(__sun) /* Written by Kaveh R. Ghazi */ @@ -545,31 +552,31 @@ int32_t parse_options(char *miscptr, ptr_header_node *ptr_head) { char *build_multipart_body(char *multipart_boundary) { if (!variables) - return NULL; // Pas de paramètres à traiter + return NULL; - char *body = NULL; // Chaîne résultat - size_t body_size = 0; // Taille actuelle du corps + char *body = NULL; + size_t body_size = 0; - // Dupliquer la chaîne "variables" afin de pouvoir la tokeniser + // Duplicate "variables" for tokenizing char *vars_dup = strdup(variables); if (!vars_dup) return NULL; - // Tokeniser la chaîne sur le caractère '&' + // Tokenize the string using '&' as a delimiter char *pair = strtok(vars_dup, "&"); while (pair != NULL) { - // Pour chaque paire, rechercher le séparateur '=' + // Find the '=' separator in each pair char *equal_sign = strchr(pair, '='); if (!equal_sign) { pair = strtok(NULL, "&"); continue; } - *equal_sign = '\0'; // Terminer la clé + *equal_sign = '\0'; char *key = pair; char *value = equal_sign + 1; - // Construire la section multipart pour ce champ. - // Format attendu : + // Build the multipart section for the field + // Expected format: // --\r\n // Content-Disposition: form-data; name=""\r\n // \r\n @@ -594,9 +601,9 @@ char *build_multipart_body(char *multipart_boundary) { "%s\r\n", multipart_boundary, key, value); - // Réallouer le buffer "body" pour y ajouter cette section + // Reallocate the body buffer to add this section size_t new_body_size = body_size + section_len; - char *new_body = realloc(body, new_body_size + 1); // +1 pour le '\0' + char *new_body = realloc(body, new_body_size + 1); // +1 for null terminator if (!new_body) { free(section); free(body); @@ -604,21 +611,18 @@ char *build_multipart_body(char *multipart_boundary) { return NULL; } body = new_body; - if (body_size == 0) { + if (body_size == 0) strcpy(body, section); - } else { + else strcat(body, section); - } body_size = new_body_size; free(section); - // Passage à la paire suivante pair = strtok(NULL, "&"); } free(vars_dup); - // Ajouter la fermeture du multipart : - // ----\r\n + // Append the closing boundary: ----\r\n int closing_len = snprintf(NULL, 0, "--%s--\r\n", multipart_boundary); char *closing = malloc(closing_len + 1); if (!closing) { @@ -853,12 +857,11 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options char content_length[MAX_CONTENT_LENGTH], proxy_string[MAX_PROXY_LENGTH]; memset(header, 0, sizeof(header)); - cookie[0] = 0; // Réinitialiser les cookies d'une tentative antérieure + cookie[0] = 0; if (use_proxy > 0 && proxy_count > 0) selected_proxy = random() % proxy_count; - /* Récupération du prochain login/mot de passe */ if (strlen(login = hydra_get_next_login()) == 0) login = empty; if (strlen(pass = hydra_get_next_password()) == 0) @@ -876,15 +879,12 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options upd3variables = hydra_strrep(upd3variables, "^USER64^", b64login); upd3variables = hydra_strrep(upd3variables, "^PASS64^", b64pass); - // Mise à jour des en‐têtes utilisateur (substitution dans les headers) hdrrep(&ptr_head, "^USER^", clogin); hdrrep(&ptr_head, "^PASS^", cpass); hdrrep(&ptr_head, "^USER64^", b64login); hdrrep(&ptr_head, "^PASS64^", b64pass); - /* Gestion du proxy (cas avec proxy authentifié ou non) */ if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) { - /* --- Bloc pour proxy avec authentification --- */ if (getcookie) { memset(proxy_string, 0, sizeof(proxy_string)); snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s%.600s", webtarget, cookieurl); @@ -926,7 +926,6 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options return 1; } } else { - /* Cas GET avec proxy authentifié */ if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) hdrrepv(&ptr_head, "Content-Length", "0"); if (cookie_header != NULL) @@ -948,7 +947,6 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options } } } else if (use_proxy == 1) { - /* --- Bloc pour proxy sans authentification --- */ if (getcookie) { memset(proxy_string, 0, sizeof(proxy_string)); snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s%.600s", webtarget, cookieurl); @@ -1011,7 +1009,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options } } } else { - /* --- Bloc pour accès direct au serveur (sans proxy) --- */ + /* Direct access to the server (no proxy) */ normal_request = NULL; if (getcookie) { if (http_request != NULL) @@ -1028,50 +1026,64 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options } hydra_reconnect(s, ip, port, options, hostname); } - /* --- Traitement multipart --- */ if (multipart_mode) { char *multipart_body = NULL; - /* Définir le boundary (ici, une valeur fixe, sans '\r\n') */ char multipart_boundary[64] = "----THC-HydraBoundaryz2Z2z"; multipart_body = build_multipart_body(multipart_boundary); if (multipart_body == NULL) { hydra_report(stderr, "[ERROR] Failed to build multipart body.\n"); return 0; } - // now prepare for the "real" request - // first handle multipart/form-data, which is always POST - if (multipart_mode){ - char *multipart_body = NULL; - char multipart_boundary[32] = "----THC-HydraBoundaryz2Z2z\r\n"; - multipart_body = build_multipart_body(multipart_boundary); - if (multipart_body == NULL) { - hydra_report(stderr, "[ERROR] Failed to build multipart body. \n"); - return 0; - } - snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t)strlen(multipart_body)); - if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) - hdrrepv(&ptr_head, "Content-Length", content_length); - else - add_header(&ptr_head, "Content-Length", content_length, HEADER_TYPE_DEFAULT); - - char content_type[256]; - snprintf(content_type, sizeof(content_type) - 1, "multipart/for/data; boundary=%s", multipart_boundary); - if (!header_exists(&ptr_head, "Content-Type", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Content-Type", content_type, HEADER_TYPE_DEFAULT); - else - hdrrepv(&ptr_head, "Content-type", content_type); - - if (cookie_header != NULL) - free(cookie_header); - cookie_header = stringify_cookies(ptr_cookie); - if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); - else - hdrrepv(&ptr_head, "Cookie", cookie_header); - if (normal_request != NULL) - free(normal_request); - http_request = prepare_http_request("POST", url, multipart_body, normal_request); - free(multipart_body); + snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t)strlen(multipart_body)); + if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) + hdrrepv(&ptr_head, "Content-Length", content_length); + else + add_header(&ptr_head, "Content-Length", content_length, HEADER_TYPE_DEFAULT); + + char content_type[256]; + snprintf(content_type, sizeof(content_type) - 1, "multipart/form-data; boundary=%s", multipart_boundary); + if (!header_exists(&ptr_head, "Content-Type", HEADER_TYPE_DEFAULT)) + add_header(&ptr_head, "Content-Type", content_type, HEADER_TYPE_DEFAULT); + else + hdrrepv(&ptr_head, "Content-Type", content_type); + + if (cookie_header != NULL) + free(cookie_header); + cookie_header = stringify_cookies(ptr_cookie); + if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) + add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); + else + hdrrepv(&ptr_head, "Cookie", cookie_header); + + if (normal_request != NULL) + free(normal_request); + http_request = prepare_http_request("POST", url, multipart_body, normal_request); + free(multipart_body); + return 1; + } + if (strcmp(type, "POST") == 0) { + snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t)strlen(upd3variables)); + if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) + hdrrepv(&ptr_head, "Content-Length", content_length); + else + add_header(&ptr_head, "Content-Length", content_length, HEADER_TYPE_DEFAULT); + if (!header_exists(&ptr_head, "Content-Type", HEADER_TYPE_DEFAULT)) + add_header(&ptr_head, "Content-Type", "application/x-www-form-urlencoded", HEADER_TYPE_DEFAULT); + if (cookie_header != NULL) + free(cookie_header); + cookie_header = stringify_cookies(ptr_cookie); + if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) + add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); + else + hdrrepv(&ptr_head, "Cookie", cookie_header); + if (normal_request != NULL) + free(normal_request); + normal_request = stringify_headers(&ptr_head); + if (http_request != NULL) + free(http_request); + http_request = prepare_http_request("POST", url, upd3variables, normal_request); + if (hydra_send(s, http_request, strlen(http_request), 0) < 0) { + free(cookie_header); return 1; } } else { @@ -1105,7 +1117,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options if (redirected_flag && code_302_is_success) found = success_cond; - if (auth_flag) { // 401 error + if (auth_flag) { if (code_401_is_failure) { hydra_completed_pair(); return 1; @@ -1121,15 +1133,13 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options if (strlen(cookie) > 0) process_cookies(&ptr_cookie, cookie); - // Gérer les redirections redirected_cpt = MAX_REDIRECT; if (debug) printf("[DEBUG] attempt result: found %d, redirect %d, location: %s\n", found, redirected_flag, redirected_url_buff); while (found == 0 && redirected_flag && !code_302_is_success && (redirected_url_buff[0] != 0) && (redirected_cpt > 0)) { - // Traitement de la redirection (code non modifié ici) - // ... + // Processing redirection (code omitted) } if (found != -1 && found == success_cond && @@ -1156,6 +1166,18 @@ void service_http_post_form(char *ip, int32_t sp, unsigned char options, char *m } } +void service_http_post_form(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { + ptr_cookie_node ptr_cookie = NULL; + ptr_header_node ptr_head = initialize(ip, options, miscptr); + + if (ptr_head) + service_http_form(ip, sp, options, miscptr, fp, port, hostname, "POST", &ptr_head, &ptr_cookie); + else { + hydra_report(stderr, "[ERROR] Could not launch head. Error while initializing.\n"); + hydra_child_exit(2); + } +} + int32_t service_http_form_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be From 80a11bb1e06cba6f174b3aba691e9a46b8b1aaa3 Mon Sep 17 00:00:00 2001 From: Imane Khouani Date: Thu, 6 Feb 2025 17:54:26 +0100 Subject: [PATCH 501/531] no comments --- hydra-http-form.c | 12 ------------ 1 file changed, 12 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 02be7da..8b105ba 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -1166,18 +1166,6 @@ void service_http_post_form(char *ip, int32_t sp, unsigned char options, char *m } } -void service_http_post_form(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { - ptr_cookie_node ptr_cookie = NULL; - ptr_header_node ptr_head = initialize(ip, options, miscptr); - - if (ptr_head) - service_http_form(ip, sp, options, miscptr, fp, port, hostname, "POST", &ptr_head, &ptr_cookie); - else { - hydra_report(stderr, "[ERROR] Could not launch head. Error while initializing.\n"); - hydra_child_exit(2); - } -} - int32_t service_http_form_init(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { // called before the childrens are forked off, so this is the function // which should be filled if initial connections and service setup has to be From 65c897da68b0646a713a0d6c3757808c1b2c8e83 Mon Sep 17 00:00:00 2001 From: motypi Date: Fri, 7 Feb 2025 14:27:04 +0100 Subject: [PATCH 502/531] multipart feature finished --- hydra-http-form.c | 742 +++++++++++++++++++++++++++++----------------- 1 file changed, 473 insertions(+), 269 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 8b105ba..1dd9521 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -8,7 +8,7 @@ web-based login forms that require username and password variables via either a GET or POST request. The module works similarly to the HTTP basic auth module and will honour -proxy mode (with authentication) as well as SSL. The module can be invoked +proxy mode (with authenticaion) as well as SSL. The module can be invoked with the service names of "http-get-form", "http-post-form", "https-get-form" and "https-post-form". @@ -76,7 +76,6 @@ char bufferurl[6096 + 24], cookieurl[6096 + 24] = "", userheader[6096 + 24] = "" #define MAX_REDIRECT 8 #define MAX_CONTENT_LENGTH 20 -#define MAX_CONTENT_DISPOSITION 200 #define MAX_PROXY_LENGTH 2048 // sizeof(cookieurl) * 2 char redirected_url_buff[2048] = ""; @@ -85,11 +84,6 @@ int32_t redirected_cpt = MAX_REDIRECT; char *cookie_request = NULL, *normal_request = NULL; // Buffers for HTTP headers - -void service_http_form(char *ip, int32_t sp, unsigned char options, char *miscptr, - FILE *fp, int32_t port, char *hostname, char *type, - ptr_header_node *ptr_head, ptr_cookie_node *ptr_cookie); - /* * Function to perform some initial setup. */ @@ -108,8 +102,6 @@ ptr_header_node header_exists(ptr_header_node *ptr_head, char *header_name, char return found_header; } - - #if defined(__sun) /* Written by Kaveh R. Ghazi */ @@ -463,8 +455,8 @@ int32_t parse_options(char *miscptr, ptr_header_node *ptr_head) { else miscptr += strlen(miscptr); break; - case 'm': //fall through - case 'M': + case 'm': // fall through + case 'M': multipart_mode = 1; tmp = strchr(miscptr, ':'); if (tmp) @@ -551,100 +543,96 @@ int32_t parse_options(char *miscptr, ptr_header_node *ptr_head) { } char *build_multipart_body(char *multipart_boundary) { - if (!variables) - return NULL; + if (!variables) + return NULL; - char *body = NULL; - size_t body_size = 0; + char *body = NULL; + size_t body_size = 0; - // Duplicate "variables" for tokenizing - char *vars_dup = strdup(variables); - if (!vars_dup) - return NULL; + // Duplicate "variables" for tokenizing + char *vars_dup = strdup(variables); + if (!vars_dup) + return NULL; - // Tokenize the string using '&' as a delimiter - char *pair = strtok(vars_dup, "&"); - while (pair != NULL) { - // Find the '=' separator in each pair - char *equal_sign = strchr(pair, '='); - if (!equal_sign) { - pair = strtok(NULL, "&"); - continue; - } - *equal_sign = '\0'; - char *key = pair; - char *value = equal_sign + 1; + // Tokenize the string using '&' as a delimiter + char *pair = strtok(vars_dup, "&"); + while (pair != NULL) { + // Find the '=' separator in each pair + char *equal_sign = strchr(pair, '='); + if (!equal_sign) { + pair = strtok(NULL, "&"); + continue; + } + *equal_sign = '\0'; + char *key = pair; + char *value = equal_sign + 1; - // Build the multipart section for the field - // Expected format: - // --\r\n - // Content-Disposition: form-data; name=""\r\n - // \r\n - // \r\n - int section_len = snprintf(NULL, 0, - "--%s\r\n" - "Content-Disposition: form-data; name=\"%s\"\r\n" - "\r\n" - "%s\r\n", - multipart_boundary, key, value); - - char *section = malloc(section_len + 1); - if (!section) { - free(body); - free(vars_dup); - return NULL; - } - snprintf(section, section_len + 1, - "--%s\r\n" - "Content-Disposition: form-data; name=\"%s\"\r\n" - "\r\n" - "%s\r\n", - multipart_boundary, key, value); + // Build the multipart section for the field + int section_len = snprintf(NULL, 0, + "--%s\r\n" + "Content-Disposition: form-data; name=\"%s\"\r\n" + "\r\n" + "%s\r\n", + multipart_boundary, key, value); + + char *section = malloc(section_len + 1); + if (!section) { + free(body); + free(vars_dup); + return NULL; + } + snprintf(section, section_len + 1, + "--%s\r\n" + "Content-Disposition: form-data; name=\"%s\"\r\n" + "\r\n" + "%s\r\n", + multipart_boundary, key, value); - // Reallocate the body buffer to add this section - size_t new_body_size = body_size + section_len; - char *new_body = realloc(body, new_body_size + 1); // +1 for null terminator - if (!new_body) { - free(section); - free(body); - free(vars_dup); - return NULL; - } - body = new_body; - if (body_size == 0) - strcpy(body, section); - else - strcat(body, section); - body_size = new_body_size; - free(section); + // Reallocate the body buffer to add this section + size_t new_body_size = body_size + section_len; + char *new_body = realloc(body, new_body_size + 1); // +1 for null terminator + if (!new_body) { + free(section); + free(body); + free(vars_dup); + return NULL; + } + body = new_body; + if (body_size == 0) + strcpy(body, section); + else + strcat(body, section); + body_size = new_body_size; + free(section); - pair = strtok(NULL, "&"); - } - free(vars_dup); + pair = strtok(NULL, "&"); + } + free(vars_dup); - // Append the closing boundary: ----\r\n - int closing_len = snprintf(NULL, 0, "--%s--\r\n", multipart_boundary); - char *closing = malloc(closing_len + 1); - if (!closing) { - free(body); - return NULL; - } - snprintf(closing, closing_len + 1, "--%s--\r\n", multipart_boundary); - - size_t final_size = body_size + closing_len; - char *final_body = realloc(body, final_size + 1); - if (!final_body) { - free(closing); - free(body); - return NULL; - } - body = final_body; - strcat(body, closing); - free(closing); + // Append the closing boundary: ----\r\n + int closing_len = snprintf(NULL, 0, "--%s--\r\n", multipart_boundary); + char *closing = malloc(closing_len + 1); + if (!closing) { + free(body); + return NULL; + } + snprintf(closing, closing_len + 1, "--%s--\r\n", multipart_boundary); + + size_t final_size = body_size + closing_len; + char *final_body = realloc(body, final_size + 1); + if (!final_body) { + free(closing); + free(body); + return NULL; + } + body = final_body; + strcat(body, closing); + free(closing); - return body; + return body; } + char *prepare_http_request(char *type, char *path, char *params, char *headers) { uint32_t reqlen = 0; char *http_request = NULL; @@ -785,7 +773,7 @@ int32_t analyze_server_response(int32_t s) { if ((ptr = hydra_strcasestr(cookie, tmpname)) != NULL) { // yes it is. // if the cookie is not in the beginning of the cookiejar, copy the - // ones before + // ones before if (ptr != cookie && *(ptr - 1) == ' ') { strncpy(tmpcookie, cookie, ptr - cookie - 2); tmpcookie[ptr - cookie - 2] = 0; @@ -845,9 +833,7 @@ void hydra_reconnect(int32_t s, char *ip, int32_t port, unsigned char options, c } } -int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options, - char *miscptr, FILE *fp, char *hostname, char *type, - ptr_header_node ptr_head, ptr_cookie_node ptr_cookie) { +int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp, char *hostname, char *type, ptr_header_node ptr_head, ptr_cookie_node ptr_cookie) { char *empty = ""; char *login, *pass, clogin[256], cpass[256], b64login[345], b64pass[345]; char header[8096], *upd3variables; @@ -855,13 +841,14 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options char *http_request = NULL; int32_t found = !success_cond, i, j; char content_length[MAX_CONTENT_LENGTH], proxy_string[MAX_PROXY_LENGTH]; - + char content_type[256]; memset(header, 0, sizeof(header)); - cookie[0] = 0; + cookie[0] = 0; // reset cookies from potential previous attempt if (use_proxy > 0 && proxy_count > 0) selected_proxy = random() % proxy_count; + // Take the next login/pass pair if (strlen(login = hydra_get_next_login()) == 0) login = empty; if (strlen(pass = hydra_get_next_password()) == 0) @@ -874,16 +861,37 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options clogin[sizeof(clogin) - 1] = 0; strncpy(cpass, html_encode(pass), sizeof(cpass) - 1); cpass[sizeof(cpass) - 1] = 0; - upd3variables = hydra_strrep(variables, "^USER^", clogin); - upd3variables = hydra_strrep(upd3variables, "^PASS^", cpass); - upd3variables = hydra_strrep(upd3variables, "^USER64^", b64login); - upd3variables = hydra_strrep(upd3variables, "^PASS64^", b64pass); + if (multipart_mode) { + char multipart_boundary[32] = "----THC-HydraBoundaryz2Z2z"; + + snprintf(content_type, sizeof(content_type), "multipart/form-data; boundary=%s", multipart_boundary); + char *multipart_body = build_multipart_body(multipart_boundary); + upd3variables = multipart_body; + + upd3variables = hydra_strrep(upd3variables, "^USER^", clogin); + upd3variables = hydra_strrep(upd3variables, "^PASS^", cpass); + upd3variables = hydra_strrep(upd3variables, "^USER64^", b64login); + upd3variables = hydra_strrep(upd3variables, "^PASS64^", b64pass); + +}else{ + snprintf(content_type, sizeof(content_type), "application/x-www-form-urlencoded"); + + upd3variables = hydra_strrep(variables, "^USER^", clogin); + upd3variables = hydra_strrep(upd3variables, "^PASS^", cpass); + upd3variables = hydra_strrep(upd3variables, "^USER64^", b64login); + upd3variables = hydra_strrep(upd3variables, "^PASS64^", b64pass); +} + + + + // Replace the user/pass placeholders in the user-supplied headers hdrrep(&ptr_head, "^USER^", clogin); hdrrep(&ptr_head, "^PASS^", cpass); hdrrep(&ptr_head, "^USER64^", b64login); hdrrep(&ptr_head, "^PASS64^", b64pass); + /* again: no snprintf to be portable. don't worry, buffer can't overflow */ if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) { if (getcookie) { memset(proxy_string, 0, sizeof(proxy_string)); @@ -893,11 +901,12 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options http_request = prepare_http_request("GET", proxy_string, NULL, cookie_request); if (hydra_send(s, http_request, strlen(http_request), 0) < 0) return 1; - i = analyze_server_response(s); + i = analyze_server_response(s); // ignore result if (strlen(cookie) > 0) process_cookies(&ptr_cookie, cookie); hydra_reconnect(s, ip, port, options, hostname); } + // now prepare for the "real" request if (strcmp(type, "POST") == 0) { memset(proxy_string, 0, sizeof(proxy_string)); snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s%.600s", webtarget, url); @@ -907,69 +916,10 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options else add_header(&ptr_head, "Content-Length", content_length, HEADER_TYPE_DEFAULT); if (!header_exists(&ptr_head, "Content-Type", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Content-Type", "application/x-www-form-urlencoded", HEADER_TYPE_DEFAULT); - if (cookie_header != NULL) - free(cookie_header); - cookie_header = stringify_cookies(ptr_cookie); - if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); - else - hdrrepv(&ptr_head, "Cookie", cookie_header); - if (normal_request != NULL) - free(normal_request); - normal_request = stringify_headers(&ptr_head); - if (http_request != NULL) - free(http_request); - http_request = prepare_http_request("POST", proxy_string, upd3variables, normal_request); - if (hydra_send(s, http_request, strlen(http_request), 0) < 0) { - free(cookie_header); - return 1; - } - } else { - if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) - hdrrepv(&ptr_head, "Content-Length", "0"); - if (cookie_header != NULL) - free(cookie_header); - cookie_header = stringify_cookies(ptr_cookie); - if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); - else - hdrrepv(&ptr_head, "Cookie", cookie_header); - if (normal_request != NULL) - free(normal_request); - normal_request = stringify_headers(&ptr_head); - if (http_request != NULL) - free(http_request); - http_request = prepare_http_request("GET", proxy_string, upd3variables, normal_request); - if (hydra_send(s, http_request, strlen(http_request), 0) < 0) { - free(cookie_header); - return 1; - } - } - } else if (use_proxy == 1) { - if (getcookie) { - memset(proxy_string, 0, sizeof(proxy_string)); - snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s%.600s", webtarget, cookieurl); - if (http_request != NULL) - free(http_request); - http_request = prepare_http_request("GET", proxy_string, NULL, cookie_request); - if (hydra_send(s, http_request, strlen(http_request), 0) < 0) - return 1; - i = analyze_server_response(s); - if (strlen(cookie) > 0) - process_cookies(&ptr_cookie, cookie); - hydra_reconnect(s, ip, port, options, hostname); - } - if (strcmp(type, "POST") == 0) { - memset(proxy_string, 0, sizeof(proxy_string)); - snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s%.600s", webtarget, url); - snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t)strlen(upd3variables)); - if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) - hdrrepv(&ptr_head, "Content-Length", content_length); - else - add_header(&ptr_head, "Content-Length", content_length, HEADER_TYPE_DEFAULT); - if (!header_exists(&ptr_head, "Content-Type", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Content-Type", "application/x-www-form-urlencoded", HEADER_TYPE_DEFAULT); + if (multipart_mode) + add_header(&ptr_head, "Content-Type", content_type, HEADER_TYPE_DEFAULT); + else + add_header(&ptr_head, "Content-Type", content_type, HEADER_TYPE_DEFAULT); if (cookie_header != NULL) free(cookie_header); cookie_header = stringify_cookies(ptr_cookie); @@ -1009,102 +959,137 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options } } } else { - /* Direct access to the server (no proxy) */ - normal_request = NULL; - if (getcookie) { - if (http_request != NULL) - free(http_request); - http_request = prepare_http_request("GET", cookieurl, NULL, cookie_request); - if (hydra_send(s, http_request, strlen(http_request), 0) < 0) - return 1; - i = analyze_server_response(s); - if (strlen(cookie) > 0) { - process_cookies(&ptr_cookie, cookie); + if (use_proxy == 1) { + // proxy without authentication + if (getcookie) { + // doing a GET to get cookies + memset(proxy_string, 0, sizeof(proxy_string)); + snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s%.600s", webtarget, cookieurl); + if (http_request != NULL) + free(http_request); + http_request = prepare_http_request("GET", proxy_string, NULL, cookie_request); + if (hydra_send(s, http_request, strlen(http_request), 0) < 0) + return 1; + i = analyze_server_response(s); // ignore result + if (strlen(cookie) > 0) + process_cookies(&ptr_cookie, cookie); + hydra_reconnect(s, ip, port, options, hostname); + } + // now prepare for the "real" request + if (strcmp(type, "POST") == 0) { + memset(proxy_string, 0, sizeof(proxy_string)); + snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s%.600s", webtarget, url); + snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t)strlen(upd3variables)); + if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) + hdrrepv(&ptr_head, "Content-Length", content_length); + else + add_header(&ptr_head, "Content-Length", content_length, HEADER_TYPE_DEFAULT); + if (!header_exists(&ptr_head, "Content-Type", HEADER_TYPE_DEFAULT)) + add_header(&ptr_head, "Content-Type", content_type, HEADER_TYPE_DEFAULT); + if (cookie_header != NULL) + free(cookie_header); + cookie_header = stringify_cookies(ptr_cookie); + if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) + add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); + else + hdrrepv(&ptr_head, "Cookie", cookie_header); if (normal_request != NULL) free(normal_request); normal_request = stringify_headers(&ptr_head); - } - hydra_reconnect(s, ip, port, options, hostname); - } - if (multipart_mode) { - char *multipart_body = NULL; - char multipart_boundary[64] = "----THC-HydraBoundaryz2Z2z"; - multipart_body = build_multipart_body(multipart_boundary); - if (multipart_body == NULL) { - hydra_report(stderr, "[ERROR] Failed to build multipart body.\n"); - return 0; - } - snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t)strlen(multipart_body)); - if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) - hdrrepv(&ptr_head, "Content-Length", content_length); - else - add_header(&ptr_head, "Content-Length", content_length, HEADER_TYPE_DEFAULT); - - char content_type[256]; - snprintf(content_type, sizeof(content_type) - 1, "multipart/form-data; boundary=%s", multipart_boundary); - if (!header_exists(&ptr_head, "Content-Type", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Content-Type", content_type, HEADER_TYPE_DEFAULT); - else - hdrrepv(&ptr_head, "Content-Type", content_type); - - if (cookie_header != NULL) - free(cookie_header); - cookie_header = stringify_cookies(ptr_cookie); - if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); - else - hdrrepv(&ptr_head, "Cookie", cookie_header); - - if (normal_request != NULL) - free(normal_request); - http_request = prepare_http_request("POST", url, multipart_body, normal_request); - free(multipart_body); - return 1; - } - if (strcmp(type, "POST") == 0) { - snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t)strlen(upd3variables)); - if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) - hdrrepv(&ptr_head, "Content-Length", content_length); - else - add_header(&ptr_head, "Content-Length", content_length, HEADER_TYPE_DEFAULT); - if (!header_exists(&ptr_head, "Content-Type", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Content-Type", "application/x-www-form-urlencoded", HEADER_TYPE_DEFAULT); - if (cookie_header != NULL) - free(cookie_header); - cookie_header = stringify_cookies(ptr_cookie); - if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); - else - hdrrepv(&ptr_head, "Cookie", cookie_header); - if (normal_request != NULL) - free(normal_request); - normal_request = stringify_headers(&ptr_head); - if (http_request != NULL) - free(http_request); - http_request = prepare_http_request("POST", url, upd3variables, normal_request); - if (hydra_send(s, http_request, strlen(http_request), 0) < 0) { - free(cookie_header); - return 1; + if (http_request != NULL) + free(http_request); + http_request = prepare_http_request("POST", proxy_string, upd3variables, normal_request); + if (hydra_send(s, http_request, strlen(http_request), 0) < 0) { + free(cookie_header); + return 1; + } + } else { + if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) + hdrrepv(&ptr_head, "Content-Length", "0"); + if (cookie_header != NULL) + free(cookie_header); + cookie_header = stringify_cookies(ptr_cookie); + if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) + add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); + else + hdrrepv(&ptr_head, "Cookie", cookie_header); + if (normal_request != NULL) + free(normal_request); + normal_request = stringify_headers(&ptr_head); + if (http_request != NULL) + free(http_request); + http_request = prepare_http_request("GET", proxy_string, upd3variables, normal_request); + if (hydra_send(s, http_request, strlen(http_request), 0) < 0) { + free(cookie_header); + return 1; + } } } else { - if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) - hdrrepv(&ptr_head, "Content-Length", "0"); - if (cookie_header != NULL) - free(cookie_header); - cookie_header = stringify_cookies(ptr_cookie); - if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) - add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); - else - hdrrepv(&ptr_head, "Cookie", cookie_header); - if (normal_request != NULL) - free(normal_request); - normal_request = stringify_headers(&ptr_head); - if (http_request != NULL) - free(http_request); - http_request = prepare_http_request("GET", url, upd3variables, normal_request); - if (hydra_send(s, http_request, strlen(http_request), 0) < 0) { - free(cookie_header); - return 1; + // direct web server, no proxy + normal_request = NULL; + if (getcookie) { + // doing a GET to save cookies + if (http_request != NULL) + free(http_request); + http_request = prepare_http_request("GET", cookieurl, NULL, cookie_request); + if (hydra_send(s, http_request, strlen(http_request), 0) < 0) + return 1; + i = analyze_server_response(s); // ignore result + if (strlen(cookie) > 0) { + // printf("[DEBUG] Got cookie: %s\n", cookie); + process_cookies(&ptr_cookie, cookie); + if (normal_request != NULL) + free(normal_request); + normal_request = stringify_headers(&ptr_head); + } + hydra_reconnect(s, ip, port, options, hostname); + } + // now prepare for the "real" request + if (strcmp(type, "POST") == 0) { + snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t)strlen(upd3variables)); + if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) + hdrrepv(&ptr_head, "Content-Length", content_length); + else + add_header(&ptr_head, "Content-Length", content_length, HEADER_TYPE_DEFAULT); + if (!header_exists(&ptr_head, "Content-Type", HEADER_TYPE_DEFAULT)) + add_header(&ptr_head, "Content-Type", content_type, HEADER_TYPE_DEFAULT); + if (cookie_header != NULL) + free(cookie_header); + cookie_header = stringify_cookies(ptr_cookie); + if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) + add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); + else + hdrrepv(&ptr_head, "Cookie", cookie_header); + if (normal_request != NULL) + free(normal_request); + normal_request = stringify_headers(&ptr_head); + if (http_request != NULL) + free(http_request); + http_request = prepare_http_request("POST", url, upd3variables, normal_request); + if (hydra_send(s, http_request, strlen(http_request), 0) < 0) { + free(cookie_header); + return 1; + } + } else { + if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) + hdrrepv(&ptr_head, "Content-Length", "0"); + if (cookie_header != NULL) + free(cookie_header); + cookie_header = stringify_cookies(ptr_cookie); + if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) + add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); + else + hdrrepv(&ptr_head, "Cookie", cookie_header); + if (normal_request != NULL) + free(normal_request); + normal_request = stringify_headers(&ptr_head); + if (http_request != NULL) + free(http_request); + http_request = prepare_http_request("GET", url, upd3variables, normal_request); + if (hydra_send(s, http_request, strlen(http_request), 0) < 0) { + free(cookie_header); + return 1; + } } } } @@ -1114,11 +1099,12 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options found = analyze_server_response(s); - if (redirected_flag && code_302_is_success) + if (redirected_flag && code_302_is_success) { found = success_cond; + } - if (auth_flag) { - if (code_401_is_failure) { + if (auth_flag) { // we received a 401 error - user may be using wrong module + if (code_401_is_failure) { // apparently they don't think so -- treat 401 as failure hydra_completed_pair(); return 1; } else { @@ -1133,18 +1119,159 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options if (strlen(cookie) > 0) process_cookies(&ptr_cookie, cookie); + // if page was redirected, follow the location header redirected_cpt = MAX_REDIRECT; if (debug) printf("[DEBUG] attempt result: found %d, redirect %d, location: %s\n", found, redirected_flag, redirected_url_buff); - while (found == 0 && redirected_flag && !code_302_is_success && - (redirected_url_buff[0] != 0) && (redirected_cpt > 0)) { - // Processing redirection (code omitted) + while (found == 0 && redirected_flag && !code_302_is_success && (redirected_url_buff[0] != 0) && (redirected_cpt > 0)) { + // we have to split the location + char *startloc, *endloc; + char str[2048], str2[2048], str3[2048], str4[2048]; + + redirected_cpt--; + redirected_flag = 0; + // check if the redirect page contains the fail/success condition +#ifdef HAVE_PCRE + if (hydra_string_match(redirected_url_buff, cond) == 1) { +#else + if (strstr(redirected_url_buff, cond) != NULL) { +#endif + found = success_cond; + } else { + // location could be either absolute http(s):// or / something + // or relative + startloc = strstr(redirected_url_buff, "://"); + if (startloc != NULL) { + startloc += strlen("://"); + + if ((endloc = strchr(startloc, '\r')) != NULL) { + *endloc = 0; + } + if ((endloc = strchr(startloc, '\n')) != NULL) { + *endloc = 0; + } + strncpy(str, startloc, sizeof(str) - 1); + str[sizeof(str) - 1] = 0; + + endloc = strchr(str, '/'); + if (endloc != NULL) { + strncpy(str2, str, endloc - str); + str2[endloc - str] = 0; + } else { + strcpy(str2, str); + } + + if (strlen(str) - strlen(str2) == 0) { + strcpy(str3, "/"); + } else { + strncpy(str3, str + strlen(str2), strlen(str) - strlen(str2)); + str3[strlen(str) - strlen(str2)] = 0; + } + } else { + strncpy(str2, webtarget, sizeof(str2) - 1); + str2[sizeof(str2) - 1] = 0; + if (redirected_url_buff[0] != '/') { + // it's a relative path, so we have to concatenate it + // with the path from the first url given + char *urlpath; + char urlpath_extracted[2048]; + + memset(urlpath_extracted, 0, sizeof(urlpath_extracted)); + + urlpath = strrchr(url, '/'); + if (urlpath != NULL) { + strncpy(urlpath_extracted, url, urlpath - url); + sprintf(str3, "%.1000s/%.1000s", urlpath_extracted, redirected_url_buff); + } else { + sprintf(str3, "%.1000s/%.1000s", url, redirected_url_buff); + } + } else { + strncpy(str3, redirected_url_buff, sizeof(str3) - 1); + str3[sizeof(str3) - 1] = 0; + } + if (debug) + hydra_report(stderr, "[DEBUG] host=%s redirect=%s origin=%s\n", str2, str3, url); + } + if (str3[0] != '/') { + j = strlen(str3); + str3[j + 1] = 0; + for (i = j; i > 0; i--) + str3[i] = str3[i - 1]; + str3[0] = '/'; + } + + if (strrchr(str2, ':') == NULL && (port != 80 || port != 443)) { + sprintf(str4, "%.2000s:%d", str2, port); + strcpy(str2, str4); + } + + if (verbose) + hydra_report(stderr, "[VERBOSE] Page redirected to http[s]://%s%s\n", str2, str3); + + if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT)) + hdrrepv(&ptr_head, "Content-Length", "0"); + + // re-use the above code to set cookies + if (cookie_header != NULL) + free(cookie_header); + cookie_header = stringify_cookies(ptr_cookie); + if (!header_exists(&ptr_head, "Cookie", HEADER_TYPE_DEFAULT)) + add_header(&ptr_head, "Cookie", cookie_header, HEADER_TYPE_DEFAULT); + else + hdrrepv(&ptr_head, "Cookie", cookie_header); + + // re-use the code above to check for proxy use + if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) { + // proxy with authentication + hdrrepv(&ptr_head, "Host", str2); + memset(proxy_string, 0, sizeof(proxy_string)); + snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s%.600s", webtarget, str3); + if (normal_request != NULL) + free(normal_request); + normal_request = stringify_headers(&ptr_head); + if (http_request != NULL) + free(http_request); + http_request = prepare_http_request("GET", proxy_string, NULL, normal_request); + } else { + if (use_proxy == 1) { + // proxy without authentication + hdrrepv(&ptr_head, "Host", str2); + memset(proxy_string, 0, sizeof(proxy_string)); + snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s%.600s", webtarget, str3); + if (normal_request != NULL) + free(normal_request); + normal_request = stringify_headers(&ptr_head); + if (http_request != NULL) + free(http_request); + http_request = prepare_http_request("GET", proxy_string, NULL, normal_request); + } else { + // direct web server, no proxy + hdrrepv(&ptr_head, "Host", str2); + if (normal_request != NULL) + free(normal_request); + normal_request = stringify_headers(&ptr_head); + if (http_request != NULL) + free(http_request); + http_request = prepare_http_request("GET", str3, NULL, normal_request); + } + } + + hydra_reconnect(s, ip, port, options, hostname); + + if (hydra_send(s, http_request, strlen(http_request), 0) < 0) { + free(cookie_header); + return 1; + } + + found = analyze_server_response(s); + if (strlen(cookie) > 0) + process_cookies(&ptr_cookie, cookie); + } } - if (found != -1 && found == success_cond && - ((redirected_flag && code_302_is_success) || redirected_flag == 0 || success_cond == 1) && - redirected_cpt >= 0) { + // if the last status is still 3xx, set it as a false + if (found != -1 && found == success_cond && ((redirected_flag && code_302_is_success) || redirected_flag == 0 || success_cond == 1) && redirected_cpt >= 0) { hydra_report_found_host(port, ip, "www-form", fp); hydra_completed_pair_found(); } else { @@ -1154,6 +1281,83 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options return 1; } +void service_http_form(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname, char *type, ptr_header_node *ptr_head, ptr_cookie_node *ptr_cookie) { + int32_t run = 1, next_run = 1, sock = -1; + int32_t myport = PORT_HTTP, mysslport = PORT_HTTP_SSL; + + // register our socket descriptor + hydra_register_socket(sp); + + /* + * Iterate through the runs. Possible values are the following: + * - 1 -> Open connection to remote server. + * - 2 -> Run password attempts. + * - 3 -> Disconnect and end with success. + * - 4 -> Disconnect and end with error. + */ + + while (1) { + if (run == 2) { + if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) { + hydra_child_exit(1); + } + } + switch (run) { + case 1: /* connect and service init function */ + { + if (sock >= 0) + sock = hydra_disconnect(sock); + if ((options & OPTION_SSL) == 0) { + if (port != 0) + myport = port; + sock = hydra_connect_tcp(ip, myport); + port = myport; + } else { + if (port != 0) + mysslport = port; + sock = hydra_connect_ssl(ip, mysslport, hostname); + port = mysslport; + } + if (sock < 0) { + hydra_report(stderr, "[ERROR] Child with pid %d terminating, cannot connect\n", (int32_t)getpid()); + hydra_child_exit(1); + } + next_run = 2; + break; + } + case 2: /* run the cracking function */ + next_run = start_http_form(sock, ip, port, options, miscptr, fp, hostname, type, *ptr_head, *ptr_cookie); + break; + case 3: /* clean exit */ + if (sock >= 0) + sock = hydra_disconnect(sock); + hydra_child_exit(0); + break; + case 4: /* silent error exit */ + if (sock >= 0) + sock = hydra_disconnect(sock); + hydra_child_exit(1); + break; + default: + hydra_report(stderr, "[ERROR] Caught unknown return code, exiting!\n"); + hydra_child_exit(0); + } + run = next_run; + } +} + +void service_http_get_form(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { + ptr_cookie_node ptr_cookie = NULL; + ptr_header_node ptr_head = initialize(ip, options, miscptr); + + if (ptr_head) + service_http_form(ip, sp, options, miscptr, fp, port, hostname, "GET", &ptr_head, &ptr_cookie); + else { + hydra_report(stderr, "[ERROR] Could not launch head. Error while initializing.\n"); + hydra_child_exit(2); + } +} + void service_http_post_form(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { ptr_cookie_node ptr_cookie = NULL; ptr_header_node ptr_head = initialize(ip, options, miscptr); From ba9a3ba8de63e5ab95e8bc57c88704ed19a5d7e2 Mon Sep 17 00:00:00 2001 From: motypi Date: Mon, 10 Feb 2025 10:37:17 +0100 Subject: [PATCH 503/531] add help for multipart mode, remove junk files --- .vscode/tasks.json | 28 --------- Test | Bin 20352 -> 0 bytes Test.c | 122 --------------------------------------- hydra-http-form.c | 1 + peda-session-61558.txt | 3 - peda-session-61747.txt | 3 - peda-session-62215.txt | 3 - peda-session-62317.txt | 3 - peda-session-unknown.txt | 8 --- 9 files changed, 1 insertion(+), 170 deletions(-) delete mode 100644 .vscode/tasks.json delete mode 100755 Test delete mode 100644 Test.c delete mode 100644 peda-session-61558.txt delete mode 100644 peda-session-61747.txt delete mode 100644 peda-session-62215.txt delete mode 100644 peda-session-62317.txt delete mode 100644 peda-session-unknown.txt diff --git a/.vscode/tasks.json b/.vscode/tasks.json deleted file mode 100644 index 08d9005..0000000 --- a/.vscode/tasks.json +++ /dev/null @@ -1,28 +0,0 @@ -{ - "tasks": [ - { - "type": "cppbuild", - "label": "C/C++: gcc build active file", - "command": "/usr/bin/gcc", - "args": [ - "-fdiagnostics-color=always", - "-g", - "${file}", - "-o", - "${fileDirname}/${fileBasenameNoExtension}" - ], - "options": { - "cwd": "${fileDirname}" - }, - "problemMatcher": [ - "$gcc" - ], - "group": { - "kind": "build", - "isDefault": true - }, - "detail": "Task generated by Debugger." - } - ], - "version": "2.0.0" -} \ No newline at end of file diff --git a/Test b/Test deleted file mode 100755 index df20b3b002e7d4165240acf776edc16751f5d9d9..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 20352 zcmeHPdvILUc|UhoS6W$bOMXZucr7rP$F3|PjBRkdwk5Lyzwo0N61ZCJL)v<^D|YYt zK>{{7Fjf_}b_>LvG>Kr!;IyW3J1|jsMLc3dCuB_10BMGn(xga%rY1aUUf%w`bI!L~ zT_nG~LQeb>QGcahfk ze8AnjS=TpRKMd>qGt}u7Es1!~lJ=HF#FvOCv%7t}moD)wY4>MR{x(@L#pT68W9sS+ z+XUQ<5>Ka5xb`WU{gJFe%Sr#?z&{^+^qOz4-+uCiMW61<&3XGbXZMp%H;&tz&i>un zj*a3g&Gw#wX!G*sNVKQ<(&khKXtpPtw6ma+p?(teBF-?#ozZkAo=Sq#=5Jr@YgKxe zK@v)b`{H&qY-iJC5bBRCX>Yy_)yVNed7>C8CMpy^4@sg4r&|H($ow030240a&BXCi z^vC_nelx_EDaj_4W>BQ(EZ2fD75^CcUZ*l>s(&hdj>Bn^nMQxcG<>=qrt<$h_+A{& z(gDU)`j=0`_fNy8%X=z6w@$-<1$-|KXSooJsr*F1r#^6&o4}|O^Mp5`Bz!**89N;w z*dsE@fpk1+$Ao2N>`-`z74F+%#X|9fh^3=Z(u!mU2-v9|A{`AS5~;AX4cVe!QItJhc<&Ux&z z3AD|Bxv;vnuD9SZ+8fW<(e&2!YZ9qsbZe+55k(!n{i&p`+)}DjDx&!=jCup-5*+kL zIR7zjK<5tV@_nTt9Y2q>dHxo2H_{SfZpy`1>{>KwEJ?O{poS^9eKc1eT>A^nUGeOe? zW_{;mgm!U*mU!HrtX8u0Xdsai}zeB=?PZR`&ZmaXmIeCc4csA#oZvr z;%9TYu?TwSgn2J$<0jbV>nHp1T@Vto4R#os`+|eF9YCd1CO zMYD90eEO+$f(zufQzH8Xr14G64ugXyen7R2`PuM*GCXxc*`wZ9;Rj};2JqK|L+f#D zBi@0o!56v)PXz~`hO=)=XU{xE&ZI}#vayFy>tN?SL!I}K{SgY}&s88}2xLrTo8d^Z zeZ;2rKxF}Nm6;l}QX7X)2ZwH>`cd~bB(Za>Yw*La!RLd6FHsI;{U=qet+0nxFnkJX z!$AWvcETFR!A%ArDwNr}NQH6+p_~y}Kl!BUANWLuBEz~*;WDg00ItH?t&(&GeviO- zSY$C4w~ZCJPD1ysdI$4o%Gqg{4Rd9e6YrpTBd+v(XWUP`!Oo*_eN@!k)lPk*Q&Xy3 z98g*BmR6t1dMlI$I}Z(Y9?ECkuUwA6<%r16R*{|@`~Jt=qzBP)+JG`GGd!Yl`w{L+ z$cxJDPhkPQNx2<`yHQ7OUxXgo@H{GfUS#J(1Kv)KttGbZ^5tClTbF=^jzlttwv8yU z?4YAcTUu6X%NL%VxS-w+M1n&l3l|}FSf6Pf4UYIwwg%Vuf{z9FMAD(vsVpQI02s0( zl1xTI!N<~jZf(18LLb4w;W$M82PXY(DCEiXIo}tPgS9 zChbOQ0P)_sR5joPgr6v(%GNhNlFdciPL5p*TyoLKGm+pW4Ki-q9NP?mYL$GR<)2`1 zTr9;56f;oFKrsWw3=}g^%s?>%`3%td29<0knx-Yi6?QaZ6LG;nD3jThN=GDz2(0%D z;qxubRLxkEO4`w+?dynV22z>0jg`mc-dHN#?~8=&(3M{4sd-_hxoSq$3^I^*J|7TW zI@9S?+S`+jCnE7=ueU#&u;T+*DDw8CB76KZ#QI5$e)JYfGvE|&o8 zIGxMg1Gp9N7+}LYx!hL3PXV6;-0*%b_Y30Vpkmy*Ss1%(jd_)2o)5}y_?M_^Cw z6CGvpXZrJjwiAtdP7$oGU0Xf(nwpATo_%6v)3S>%JHMIOWdCIxN1<2v`#$k)9K+y` z0&=0czK)|6@m)v1i*#1k-tAgbRq7795t59B+R^h~F84BEUhaC4#Kls~KrsWw3=}g^ z%s?>%#S9cPP|QFv1OJaRz~6cCcU|;5HMsB< zoFt68dh%s{=uvbf3 zJ(YmQrSN@OSqyv?^pbMY_ZT(cUm@{Y;{hlxmH1qv4Ohc5iF=JZptD@!i;P*&xl-bb zjZ^S&mBg1CmqBNR!~@1(0}n_%XnX?wRTAH190$Hy;@gdFz&mCy#JSs`3w>?F#lZWF zGS~)XoCC&>fOkpUHm(PLO$Gf7vD;V)eErPpfbTN~VYQ)VJMcRV`axx*rv;q-#tGZV_=^nhF{M zV9o_zel6*A5cU$dJSM! z1z3isjQY0R%^%p7o+SMpMkRIsbHH8Xs!DkN5%u3ox~~zF5GfI!A3$)B=np0fN*5wc zp1*WeQ*vekcM;-}ZJPZaP|x>VRiq>NqLgm2o?)ea6|tpe=?~$x^bQrz&BT^flZ+$# zBLwgPad(lJ!ga~9Te=W}vWQVlvOgi&VX{g?L3qY-ew+jkv5}bL18Ve}Wc-o7;lB)= zit%S}Lg-!ttJDlaU55j1+Kh5b1vzma9@(pU;y)piJ<%lQ{t9xVQYM%$botwt^w+oy zzKqIdWq#&%H>Idndpoe#eIc~!D)F%joFCfjJ_o)Uv~+l{I|1WHO&;0n&Ov&8IR)-M zyl=1jNl3SA>CwIJRq$+SSI76dD?xT^>B!!u=6aZ+&_^Fs-2VjYb809qG;-dK=pJD- zYcl8#L+dLpdG-mmR-e;2|wE!^%t4;})w)B@MxZuh@Hwo1$Tz%#0ZyL$P8 zk}E5gRdm%a#RJ!6iY~30!yrmYgptD!y3ZuEvaS`vz%H9j))mSa{j9YXl!3FLdP1+f9(q?{nlZyLy6VZYVgageK^&D=$T+I# z*;`#_EUd1taL=DNzs{IhR*UC&4MKoctq#hAZn{7k%&a%u)fE-0a`IR|5eqs`HcJP# zvXQEuHJL?Cojti#s!en9Oyr81K%oTYepNPj?sP&75VIf`drF1i+-v*n!M14FIQO4~_?L{1C^lakz~6uA1^?zzjNxkBL_TD|aPM zCG~V_!pUr=(*2qAzghdFS?BIT-KKllF>}sS<|5akdUICH^t@u0XU*Ej z&GUv$GiILWYHlzqW9Hn45!rVjdYoi4cADmXII4WYG_Eyk7e8js_&4($*U|>l^R6^^ zomX#~yI@fHxM|$rnvG0aRw@>=Y;4WgXki0M#2T>E`K=@2KH4vmjP9~%J;2JyeIhuK zex@&#wtKQM+OyQfVLdwxqB!!Gdril<8wJ);k~w#|miK4n$@3 zgfiI0LZVZnXF@xps)eMFeL@!Y{p^5Wimy#r{fL6M0demMxyobZmw05C zif{r8N6B6bji=_uWj7SWB-=QUj_y=Lfr6!~FaQc2W$_(S8c{&HwrgD{0+0>Ohq+gEQfZV8CSN_+Rh1o3$&`DcR9^C3l)$E@{LU)5eTuA9hsl7Hk-Rio z`cnPTmT(ALp5oz9OGhf4?Z^6Dre#w)_4`rVyKzg4{En-|?hE_+=!-7j`nD}wx>~kk zwa*_GzpK4y$!5~DRkEcw9B#p-W-V#g8zy^`*_PJ!mUuFp$YM-LMNNEGu_tb4{u?SS zv>$S^BIP?0jrse8lmQ~$*|05#gQOzyl;UEvDF)&N^7#dKXYB5JC+F0n_fZ26h)*zg zpyHKhJmLVS(x>-T7k1j6uG5Mdcs1W!xM>Q!%QT;VF90b^7tRLu>n#c>n&P9f4TmA- z2!8*UOq{-ogX-nqADDjth#_X@_oFfYAs|!5KV7^2O8S{4jxS&j6L2a&Pe}c_!udW- z4^LV}J?522{`4v^Lp0`pS6~4>XdNk&BI>BA_%vPgN{z{@Ml88lM|k=k4ZjTPr#4Cuf_OW9GKt{cE9#Bs>lBYEXIU+ zs`fU3Pky`sR#ea{_3J+KK0+_UQ~6m6ejV~ttNmbhD$D9=^y$@lDnEVX2YGY$yA8fq z`z!>1IE|nC!EY{9)c6ym@4~Nsj^Ayb0e{NgS4Ot=+t8eW%sAp~J!^+>RSItXki-2F94W zS)D;G4R&l6*467au3ojy+PHS@md>r#)>W(5by{-16ySZpa?7uCPjOy~y}_TiA6QLS z^4ii@R6YKwod{|2Hs`!%J3UY^Gs-i_ly^r@Vj|C&PN*%%@Hct?u@%XrtiDh(LVJ^G zCSl{d7mKD0Q%{f79_q>dY2u-`T2B^OJ(-NISMRf?ZP}A_CZ<@_oRB?9sJ32DVp$fp zQ**!3KI%wMx@D@S;80UTB7ry|}P78BfMijE8!9FlA;6|GENMP)5in zqr}E=Nl$S*`X94sJp#9Q%r#VT{y!I9kI-VN%Q!*$ZG?WJW&7#=ZwcvA;rqCvgjfQk z(BAp~OU`FS4f*-TY?@aU+J9Zo>lhBO;xzWxJM4L0$k6*+?4yu>fHeqizgGvyaFMpB z7^yhhPm39}M#J{Jj>GVI>KqiZBb4pwrw%H+a8Q%kp4WvKzC%g{MZ3#$_5!0d7PjYg z6^8u0=lJt_+5`Q%Mr$_A=XD!~0j=kZU$ezGfl$iWp4X8Wp4N(7zq9=hYWvk%kJqIb zdUb=z9=}w5CV$@pk5o!=$imNY4SBte#m@2f7Z4QMd$k?IQ*5ZA!@YRaVSidHFl2pp z!!$$MYF1c3CLOA1II2koY{&2<1cmlI&tq6?vZaD-$J`ek_B@Yfh?&u(;>_Pqv_1E~ z@M?7pk7<$t_dnA=2SV|)J->%Ayowbybk;xaupjd(MTS4pb_|^LzY76=&Xw07>F_!) z|Gy%qKGO{8y{D$Yp5FueeB^CnyeevfX8Q^>p2n`e?d9Lk`2SBi|IZZLaXw6i|aK5fz ztLLR`zc9~H2*pZ;;UaCXxD)3U+M&}g+p*>q)7bZG!&$7#Q28v8phS2fU@P+@V9 z;<{<<>#k5%v?5nn9Hh8O+dJEN>r!R4jypy>VS9#s)7YQ5QW> -#include -#include - -// On définit ici la variable globale "variables" qui sera utilisée par build_multipart_body. -// On suppose qu'elle contient des paires clé=valeur séparées par '&'. -// Pour ce test, on utilise par exemple : -char *variables = "username=testuser&password=testpass"; - -// La fonction build_multipart_body construit le corps d'une requête multipart/form-data -// à partir de la chaîne globale "variables" et du boundary fourni. -char *build_multipart_body(char *multipart_boundary) { - if (!variables) - return NULL; // Pas de paramètres à traiter - - char *body = NULL; // Chaîne résultat - size_t body_size = 0; // Taille actuelle du corps - - // Dupliquer la chaîne "variables" afin de pouvoir la tokeniser (strtok modifie la chaîne) - char *vars_dup = strdup(variables); - if (!vars_dup) - return NULL; - - // Tokeniser la chaîne sur le caractère '&' - char *pair = strtok(vars_dup, "&"); - while (pair != NULL) { - // Pour chaque paire, rechercher le séparateur '=' - char *equal_sign = strchr(pair, '='); - if (!equal_sign) { - pair = strtok(NULL, "&"); - continue; - } - *equal_sign = '\0'; // Terminer la clé - char *key = pair; - char *value = equal_sign + 1; - - // Construire la section multipart pour ce champ. - // Format attendu : - // --\r\n - // Content-Disposition: form-data; name=""\r\n - // \r\n - // \r\n - int section_len = snprintf(NULL, 0, - "--%s\r\n" - "Content-Disposition: form-data; name=\"%s\"\r\n" - "\r\n" - "%s\r\n", - multipart_boundary, key, value); - - char *section = malloc(section_len + 1); - if (!section) { - free(body); - free(vars_dup); - return NULL; - } - snprintf(section, section_len + 1, - "--%s\r\n" - "Content-Disposition: form-data; name=\"%s\"\r\n" - "\r\n" - "%s\r\n", - multipart_boundary, key, value); - - // Réallouer le buffer "body" pour y ajouter cette section - size_t new_body_size = body_size + section_len; - char *new_body = realloc(body, new_body_size + 1); // +1 pour le '\0' - if (!new_body) { - free(section); - free(body); - free(vars_dup); - return NULL; - } - body = new_body; - if (body_size == 0) - strcpy(body, section); - else - strcat(body, section); - body_size = new_body_size; - free(section); - - // Passage à la paire suivante - pair = strtok(NULL, "&"); - } - free(vars_dup); - - // Ajouter la fermeture du multipart : - // ----\r\n - int closing_len = snprintf(NULL, 0, "--%s--\r\n", multipart_boundary); - char *closing = malloc(closing_len + 1); - if (!closing) { - free(body); - return NULL; - } - snprintf(closing, closing_len + 1, "--%s--\r\n", multipart_boundary); - - size_t final_size = body_size + closing_len; - char *final_body = realloc(body, final_size + 1); - if (!final_body) { - free(closing); - free(body); - return NULL; - } - body = final_body; - strcat(body, closing); - free(closing); - - return body; -} - -int main(void) { - // Définir un boundary pour le test - char boundary[] = "----THC-HydraBoundaryz2Z2z"; - // Appeler la fonction build_multipart_body - char *multipart_body = build_multipart_body(boundary); - if (multipart_body == NULL) { - fprintf(stderr, "Error building multipart body.\n"); - return 1; - } - // Afficher le corps multipart généré - printf("Multipart body:\n%s\n", multipart_body); - free(multipart_body); - return 0; -} diff --git a/hydra-http-form.c b/hydra-http-form.c index 1dd9521..0b42268 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -1602,6 +1602,7 @@ void usage_http_form(const char *service) { "and the condition string; seperate them too with colons:\n" " 1= 401 error response is interpreted as user/pass wrong\n" " 2= 302 page forward return codes identify a successful attempt\n" + " M= attack forms that use multipart format\n" " (c|C)=/page/uri to define a different page to gather initial " "cookies from\n" " (g|G)= skip pre-requests - only use this when no pre-cookies are required\n" diff --git a/peda-session-61558.txt b/peda-session-61558.txt deleted file mode 100644 index e50613c..0000000 --- a/peda-session-61558.txt +++ /dev/null @@ -1,3 +0,0 @@ -break main - -set exec-wrapper logging enabled diff --git a/peda-session-61747.txt b/peda-session-61747.txt deleted file mode 100644 index e50613c..0000000 --- a/peda-session-61747.txt +++ /dev/null @@ -1,3 +0,0 @@ -break main - -set exec-wrapper logging enabled diff --git a/peda-session-62215.txt b/peda-session-62215.txt deleted file mode 100644 index e50613c..0000000 --- a/peda-session-62215.txt +++ /dev/null @@ -1,3 +0,0 @@ -break main - -set exec-wrapper logging enabled diff --git a/peda-session-62317.txt b/peda-session-62317.txt deleted file mode 100644 index e50613c..0000000 --- a/peda-session-62317.txt +++ /dev/null @@ -1,3 +0,0 @@ -break main - -set exec-wrapper logging enabled diff --git a/peda-session-unknown.txt b/peda-session-unknown.txt deleted file mode 100644 index ddb86e5..0000000 --- a/peda-session-unknown.txt +++ /dev/null @@ -1,8 +0,0 @@ - -set exec-wrapper logging enabled - -set exec-wrapper logging enabled - -set exec-wrapper logging enabled - -set exec-wrapper logging enabled From db099fcdacce542bca290c38a03c886a0db0ab78 Mon Sep 17 00:00:00 2001 From: motypi Date: Mon, 10 Feb 2025 14:57:07 +0100 Subject: [PATCH 504/531] cleaning code --- hydra-http-form.c | 23 +++++++---------------- 1 file changed, 7 insertions(+), 16 deletions(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index 0b42268..4c6919b 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -863,26 +863,20 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options cpass[sizeof(cpass) - 1] = 0; if (multipart_mode) { - char multipart_boundary[32] = "----THC-HydraBoundaryz2Z2z"; - - snprintf(content_type, sizeof(content_type), "multipart/form-data; boundary=%s", multipart_boundary); - char *multipart_body = build_multipart_body(multipart_boundary); + snprintf(content_type, sizeof(content_type), "multipart/form-data; boundary=----THC-HydraBoundaryz2Z2z"); + char *multipart_body = build_multipart_body("----THC-HydraBoundaryz2Z2z"); upd3variables = multipart_body; +}else{ + snprintf(content_type, sizeof(content_type), "application/x-www-form-urlencoded"); + upd3variables = variables; +} + upd3variables = hydra_strrep(upd3variables, "^USER^", clogin); upd3variables = hydra_strrep(upd3variables, "^PASS^", cpass); upd3variables = hydra_strrep(upd3variables, "^USER64^", b64login); upd3variables = hydra_strrep(upd3variables, "^PASS64^", b64pass); -}else{ - snprintf(content_type, sizeof(content_type), "application/x-www-form-urlencoded"); - - upd3variables = hydra_strrep(variables, "^USER^", clogin); - upd3variables = hydra_strrep(upd3variables, "^PASS^", cpass); - upd3variables = hydra_strrep(upd3variables, "^USER64^", b64login); - upd3variables = hydra_strrep(upd3variables, "^PASS64^", b64pass); -} - // Replace the user/pass placeholders in the user-supplied headers @@ -916,9 +910,6 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options else add_header(&ptr_head, "Content-Length", content_length, HEADER_TYPE_DEFAULT); if (!header_exists(&ptr_head, "Content-Type", HEADER_TYPE_DEFAULT)) - if (multipart_mode) - add_header(&ptr_head, "Content-Type", content_type, HEADER_TYPE_DEFAULT); - else add_header(&ptr_head, "Content-Type", content_type, HEADER_TYPE_DEFAULT); if (cookie_header != NULL) free(cookie_header); From 3cc53fe778a58425593a4b3fba5dc55224497ded Mon Sep 17 00:00:00 2001 From: motypi Date: Mon, 3 Mar 2025 13:00:37 +0100 Subject: [PATCH 505/531] created skip_password function --- hydra.c | 13 ++++++++++--- 1 file changed, 10 insertions(+), 3 deletions(-) diff --git a/hydra.c b/hydra.c index 30a8ece..a80f84f 100644 --- a/hydra.c +++ b/hydra.c @@ -1591,6 +1591,15 @@ char *hydra_reverse_login(int32_t head_no, char *login) { return hydra_heads[head_no]->reverse; } +void skip_passwords(int skips){ + for(int i=0; ipass_no >= hydra_brains.countpass) + while(*hydra_target[target_no]->pass_ptr != 0) + hydra_target[target_no]->pass_ptr++; + hydra_target[target_no]->pass_ptr++; + } +} + int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { // variables moved to save stack snpdone = 0; @@ -1750,9 +1759,7 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { return hydra_send_next_pair(target_no, head_no); } else { hydra_targets[target_no]->pass_ptr++; - while (*hydra_targets[target_no]->pass_ptr != 0) - hydra_targets[target_no]->pass_ptr++; - hydra_targets[target_no]->pass_ptr++; + skip_passwords(1); } if ((hydra_options.try_password_same_as_login && strcmp(hydra_heads[head_no]->current_pass_ptr, hydra_heads[head_no]->current_login_ptr) == 0) || (hydra_options.try_null_password && strlen(hydra_heads[head_no]->current_pass_ptr) == 0) || (hydra_options.try_password_reverse_login && strcmp(hydra_heads[head_no]->current_pass_ptr, hydra_reverse_login(head_no, hydra_heads[head_no]->current_login_ptr)) == 0)) { hydra_brains.sent++; From a8f80debedf418c07efbc7b70a90ad0eb50d0252 Mon Sep 17 00:00:00 2001 From: motypi Date: Tue, 4 Mar 2025 10:34:23 +0100 Subject: [PATCH 506/531] added variables and applied skipping function --- hydra.c | 18 ++++++++++++------ 1 file changed, 12 insertions(+), 6 deletions(-) diff --git a/hydra.c b/hydra.c index a80f84f..3d95cde 100644 --- a/hydra.c +++ b/hydra.c @@ -342,6 +342,8 @@ char *sck = NULL; int32_t prefer_ipv6 = 0, conwait = 0, loop_cnt = 0, fck = 0, options = 0, killed = 0; int32_t child_head_no = -1, child_socket; int32_t total_redo_count = 0; +int32_t total_distributed_machines = 2; +int32_t distributed_machine_rank = 2; // moved for restore feature int32_t process_restore = 0, dont_unlink; @@ -1591,12 +1593,12 @@ char *hydra_reverse_login(int32_t head_no, char *login) { return hydra_heads[head_no]->reverse; } -void skip_passwords(int skips){ +void skip_passwords(int32_t skips, int32_t target_no){ for(int i=0; ipass_no >= hydra_brains.countpass) - while(*hydra_target[target_no]->pass_ptr != 0) - hydra_target[target_no]->pass_ptr++; - hydra_target[target_no]->pass_ptr++; + //if(*hydra_targets[target_no]->pass_no >= hydra_brains.countpass) + while(*hydra_targets[target_no]->pass_ptr != 0) + hydra_targets[target_no]->pass_ptr++; + hydra_targets[target_no]->pass_ptr++; } } @@ -1752,6 +1754,9 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { hydra_targets[target_no]->login_ptr++; hydra_targets[target_no]->login_ptr++; hydra_targets[target_no]->pass_ptr = pass_ptr; + hydra_targets[target_no]->pass_ptr++; + //initialise the password to start with depending on the machine's rank if using distributed computing + skip_passwords(distributed_machine_rank-1, target_no); hydra_targets[target_no]->login_no++; hydra_targets[target_no]->pass_no = 0; hydra_targets[target_no]->pass_state = 0; @@ -1759,7 +1764,8 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { return hydra_send_next_pair(target_no, head_no); } else { hydra_targets[target_no]->pass_ptr++; - skip_passwords(1); + //number of passwords in the wordlist to skip depending on the number of parallel machines + skip_passwords(total_distributed_machines, target_no); } if ((hydra_options.try_password_same_as_login && strcmp(hydra_heads[head_no]->current_pass_ptr, hydra_heads[head_no]->current_login_ptr) == 0) || (hydra_options.try_null_password && strlen(hydra_heads[head_no]->current_pass_ptr) == 0) || (hydra_options.try_password_reverse_login && strcmp(hydra_heads[head_no]->current_pass_ptr, hydra_reverse_login(head_no, hydra_heads[head_no]->current_login_ptr)) == 0)) { hydra_brains.sent++; From 2c50bb8e6db34be37dfdbcc66c088c4b3fbd48fa Mon Sep 17 00:00:00 2001 From: motypi Date: Mon, 10 Mar 2025 13:58:09 +0100 Subject: [PATCH 507/531] added wordlist (password,login,colonfile) segmentation on the fly using cmd option -D --- hydra.c | 112 +++++++++++++++++++++++++++++++++++++++++++++++--------- hydra.h | 1 + 2 files changed, 96 insertions(+), 17 deletions(-) diff --git a/hydra.c b/hydra.c index 3d95cde..033ede0 100644 --- a/hydra.c +++ b/hydra.c @@ -342,8 +342,8 @@ char *sck = NULL; int32_t prefer_ipv6 = 0, conwait = 0, loop_cnt = 0, fck = 0, options = 0, killed = 0; int32_t child_head_no = -1, child_socket; int32_t total_redo_count = 0; -int32_t total_distributed_machines = 2; -int32_t distributed_machine_rank = 2; +int32_t num_segments = 0; +int32_t my_segment = 0; // moved for restore feature int32_t process_restore = 0, dont_unlink; @@ -1593,14 +1593,66 @@ char *hydra_reverse_login(int32_t head_no, char *login) { return hydra_heads[head_no]->reverse; } -void skip_passwords(int32_t skips, int32_t target_no){ - for(int i=0; ipass_no >= hydra_brains.countpass) - while(*hydra_targets[target_no]->pass_ptr != 0) - hydra_targets[target_no]->pass_ptr++; - hydra_targets[target_no]->pass_ptr++; + +FILE *hydra_divide_file(FILE *file, uint32_t my_segment, uint32_t num_segments){ + fprintf(stdout, "Dividing file...\n"); + + if(my_segment > num_segments){ + fprintf(stderr, "[ERROR] in option -D XofY, X must not be greater than Y: %s\n", hydra_options.passfile); + return NULL; + } + + FILE *output_file; + char line[500]; + char output_file_name[20]; + + uint32_t line_number = 0; + + double total_lines; + if (total_lines = countlines(file,0)) + fprintf(stdout, "There are %f lines int the wordlist", total_lines); + else + fprintf(stderr, "Something went wrong in the counting of lines"); + + if(num_segments > total_lines){ + fprintf(stderr, "[ERROR] in option -D XofY, Y must not be greater than the total number of lines in the file to be divided: %s\n", hydra_options.passfile); + return NULL; } -} + + double segment_size_double = total_lines / num_segments; + + // round up segment_size_float to integer + uint64_t segment_size = (uint64_t)segment_size_double; + if(segment_size < segment_size_double) + segment_size++; + + uint64_t segment_start = segment_size * (my_segment - 1) + 1; + uint64_t segment_end = segment_size * my_segment; + + + sprintf(output_file_name, "segment_%d.txt", my_segment); + output_file = fopen(output_file_name, "w"); + + if(!output_file){ + fprintf(stderr, "[ERROR] Segment file empty: %s\n", hydra_options.passfile); + return NULL; + } + + while(fgets(line, sizeof line, file) != NULL && line_number < segment_end){ + line_number++; + + if(line_number >= segment_start && line_number <= segment_end) + fprintf(output_file, "%s", line); + + } + + rewind(file); + fclose(output_file); + output_file = fopen(output_file_name, "r"); + + return output_file; + + } int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { // variables moved to save stack @@ -1754,9 +1806,6 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { hydra_targets[target_no]->login_ptr++; hydra_targets[target_no]->login_ptr++; hydra_targets[target_no]->pass_ptr = pass_ptr; - hydra_targets[target_no]->pass_ptr++; - //initialise the password to start with depending on the machine's rank if using distributed computing - skip_passwords(distributed_machine_rank-1, target_no); hydra_targets[target_no]->login_no++; hydra_targets[target_no]->pass_no = 0; hydra_targets[target_no]->pass_state = 0; @@ -1764,8 +1813,9 @@ int32_t hydra_send_next_pair(int32_t target_no, int32_t head_no) { return hydra_send_next_pair(target_no, head_no); } else { hydra_targets[target_no]->pass_ptr++; - //number of passwords in the wordlist to skip depending on the number of parallel machines - skip_passwords(total_distributed_machines, target_no); + while (*hydra_targets[target_no]->pass_ptr != 0) + hydra_targets[target_no]->pass_ptr++; + hydra_targets[target_no]->pass_ptr++; } if ((hydra_options.try_password_same_as_login && strcmp(hydra_heads[head_no]->current_pass_ptr, hydra_heads[head_no]->current_login_ptr) == 0) || (hydra_options.try_null_password && strlen(hydra_heads[head_no]->current_pass_ptr) == 0) || (hydra_options.try_password_reverse_login && strcmp(hydra_heads[head_no]->current_pass_ptr, hydra_reverse_login(head_no, hydra_heads[head_no]->current_login_ptr)) == 0)) { hydra_brains.sent++; @@ -2184,7 +2234,7 @@ void process_proxy_line(int32_t type, char *string) { int main(int argc, char *argv[]) { char *proxy_string = NULL, *device = NULL, *memcheck; char *outfile_format_tmp; - FILE *lfp = NULL, *pfp = NULL, *cfp = NULL, *ifp = NULL, *rfp = NULL, *proxyfp; + FILE *lfp = NULL, *pfp = NULL, *cfp = NULL, *ifp = NULL, *rfp = NULL, *proxyfp, *filecloser=NULL; size_t countinfile = 1, sizeinfile = 0; uint64_t math2; int32_t i = 0, j = 0, k, error = 0, modusage = 0, ignore_restore = 0, do_switch; @@ -2320,6 +2370,7 @@ int main(int argc, char *argv[]) { hydra_options.loginfile = NULL; hydra_options.pass = NULL; hydra_options.passfile = NULL; + hydra_options.distributed = NULL; hydra_options.tasks = TASKS; hydra_options.max_use = MAXTASKS; hydra_options.outfile_format = FORMAT_PLAIN_TEXT; @@ -2333,8 +2384,18 @@ int main(int argc, char *argv[]) { help(1); if (argc < 2) help(0); - while ((i = getopt(argc, argv, "hIq64Rrde:vVl:fFg:L:p:OP:o:b:M:C:t:T:m:w:W:s:SUux:yc:K")) >= 0) { + while ((i = getopt(argc, argv, "hIq64Rrde:vVl:fFg:D:L:p:OP:o:b:M:C:t:T:m:w:W:s:SUux:yc:K")) >= 0) { switch (i) { + case 'D': + hydra_options.distributed = optarg; + if (sscanf(hydra_options.distributed, "%dof%d", &my_segment, &num_segments) != 2) { + fprintf(stderr, "Invalid format. Expected format -D XofY where X and Y are integers.\n"); + exit(EXIT_FAILURE); + } + else{ + fprintf(stdout, "successfully set X to %d and Y to %d\n", my_segment, num_segments); + } + break; case 'h': help(1); break; @@ -3415,6 +3476,13 @@ int main(int argc, char *argv[]) { fprintf(stderr, "[ERROR] File for logins not found: %s\n", hydra_options.loginfile); exit(-1); } + else if (hydra_options.passfile == NULL){ + if(my_segment && num_segments){ + filecloser = lfp; + lfp = hydra_divide_file(lfp, my_segment, num_segments); + fclose(filecloser); + } + } hydra_brains.countlogin = countlines(lfp, 0); hydra_brains.sizelogin = size_of_data; if (hydra_brains.countlogin == 0) { @@ -3447,6 +3515,11 @@ int main(int argc, char *argv[]) { fprintf(stderr, "[ERROR] File for passwords not found: %s\n", hydra_options.passfile); exit(-1); } + else if(my_segment && num_segments){ + filecloser = pfp; + pfp = hydra_divide_file(pfp, my_segment, num_segments); + fclose(filecloser); + } hydra_brains.countpass = countlines(pfp, 0); hydra_brains.sizepass = size_of_data; if (hydra_brains.countpass == 0) { @@ -3501,6 +3574,11 @@ int main(int argc, char *argv[]) { fprintf(stderr, "[ERROR] File for colon files (login:pass) not found: %s\n", hydra_options.colonfile); exit(-1); } + else if(my_segment && num_segments){ + filecloser = cfp; + cfp = hydra_divide_file(cfp, my_segment, num_segments); + fclose(filecloser); + } hydra_brains.countlogin = countlines(cfp, 1); hydra_brains.sizelogin = size_of_data; if (hydra_brains.countlogin == 0) { @@ -4421,4 +4499,4 @@ int main(int argc, char *argv[]) { return -1; else return 0; -} +} \ No newline at end of file diff --git a/hydra.h b/hydra.h index 353b318..24b63e8 100644 --- a/hydra.h +++ b/hydra.h @@ -194,6 +194,7 @@ typedef struct { int32_t cidr; int32_t time_next_attempt; output_format_t outfile_format; + char *distributed; // Use distributed computing by splitting user files on the fly char *login; char *loginfile; char *pass; From f632c7231eafa000afc1b5ec1fd1e0c17cbf0036 Mon Sep 17 00:00:00 2001 From: motypi Date: Mon, 10 Mar 2025 22:41:50 +0100 Subject: [PATCH 508/531] added help for -D option --- hydra.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/hydra.c b/hydra.c index 033ede0..2803fd8 100644 --- a/hydra.c +++ b/hydra.c @@ -521,6 +521,8 @@ void help(int32_t ext) { "instead of -L/-P options\n" " -M FILE list of servers to attack, one entry per " "line, ':' to specify port\n"); + PRINT_NORMAL(ext, " -D XofY Divide wordlist into Y segments and use the " + "Xth segment.\n"); PRINT_EXTEND(ext, " -o FILE write found login/password pairs to FILE instead of stdout\n" " -b FORMAT specify the format for the -o FILE: text(default), json, " "jsonv1\n" From 8faf1984d88016a96ac1dbe0c2591c40e21ab511 Mon Sep 17 00:00:00 2001 From: motypi Date: Mon, 10 Mar 2025 23:02:55 +0100 Subject: [PATCH 509/531] removed debug messages --- hydra.c | 9 ++------- 1 file changed, 2 insertions(+), 7 deletions(-) diff --git a/hydra.c b/hydra.c index 2803fd8..e5f71a8 100644 --- a/hydra.c +++ b/hydra.c @@ -1597,7 +1597,6 @@ char *hydra_reverse_login(int32_t head_no, char *login) { FILE *hydra_divide_file(FILE *file, uint32_t my_segment, uint32_t num_segments){ - fprintf(stdout, "Dividing file...\n"); if(my_segment > num_segments){ fprintf(stderr, "[ERROR] in option -D XofY, X must not be greater than Y: %s\n", hydra_options.passfile); @@ -1610,11 +1609,7 @@ FILE *hydra_divide_file(FILE *file, uint32_t my_segment, uint32_t num_segments){ uint32_t line_number = 0; - double total_lines; - if (total_lines = countlines(file,0)) - fprintf(stdout, "There are %f lines int the wordlist", total_lines); - else - fprintf(stderr, "Something went wrong in the counting of lines"); + double total_lines = countlines(file,0); if(num_segments > total_lines){ fprintf(stderr, "[ERROR] in option -D XofY, Y must not be greater than the total number of lines in the file to be divided: %s\n", hydra_options.passfile); @@ -2395,7 +2390,7 @@ int main(int argc, char *argv[]) { exit(EXIT_FAILURE); } else{ - fprintf(stdout, "successfully set X to %d and Y to %d\n", my_segment, num_segments); + fprintf(stdout, "-D: successfully set X to %d and Y to %d\n", my_segment, num_segments); } break; case 'h': From 5eea263707a82ccf071b0e11d210c86f22b74bf8 Mon Sep 17 00:00:00 2001 From: motypi Date: Tue, 11 Mar 2025 14:10:52 +0100 Subject: [PATCH 510/531] remove segment files at exit --- hydra.c | 31 +++++++++++++++++++++++-------- 1 file changed, 23 insertions(+), 8 deletions(-) diff --git a/hydra.c b/hydra.c index e5f71a8..bb75d96 100644 --- a/hydra.c +++ b/hydra.c @@ -342,8 +342,12 @@ char *sck = NULL; int32_t prefer_ipv6 = 0, conwait = 0, loop_cnt = 0, fck = 0, options = 0, killed = 0; int32_t child_head_no = -1, child_socket; int32_t total_redo_count = 0; -int32_t num_segments = 0; -int32_t my_segment = 0; + +// requred for distributed attack capability +uint32_t num_segments = 0; +uint32_t my_segment = 0; +uint32_t junk_file_count = 0; +char junk_files[20][16]; // moved for restore feature int32_t process_restore = 0, dont_unlink; @@ -1595,8 +1599,12 @@ char *hydra_reverse_login(int32_t head_no, char *login) { return hydra_heads[head_no]->reverse; } +void delete_junk_files(){ + for(int i=0; i num_segments){ fprintf(stderr, "[ERROR] in option -D XofY, X must not be greater than Y: %s\n", hydra_options.passfile); @@ -1627,7 +1635,9 @@ FILE *hydra_divide_file(FILE *file, uint32_t my_segment, uint32_t num_segments){ uint64_t segment_end = segment_size * my_segment; - sprintf(output_file_name, "segment_%d.txt", my_segment); + fprintf(stdout, "writing filename\n"); + sprintf(output_file_name, "segment_%d_%d.txt",target_no, my_segment); + fprintf(stdout, "writing successful\n"); output_file = fopen(output_file_name, "w"); if(!output_file){ @@ -1635,6 +1645,11 @@ FILE *hydra_divide_file(FILE *file, uint32_t my_segment, uint32_t num_segments){ return NULL; } + if(strcpy(junk_files[junk_file_count], output_file_name)) + junk_file_count++; + + atexit(delete_junk_files); + while(fgets(line, sizeof line, file) != NULL && line_number < segment_end){ line_number++; @@ -2390,7 +2405,7 @@ int main(int argc, char *argv[]) { exit(EXIT_FAILURE); } else{ - fprintf(stdout, "-D: successfully set X to %d and Y to %d\n", my_segment, num_segments); + fprintf(stdout, "Option \'D\': successfully set X to %d and Y to %d\n", my_segment, num_segments); } break; case 'h': @@ -3476,7 +3491,7 @@ int main(int argc, char *argv[]) { else if (hydra_options.passfile == NULL){ if(my_segment && num_segments){ filecloser = lfp; - lfp = hydra_divide_file(lfp, my_segment, num_segments); + lfp = hydra_divide_file(lfp, target_no, my_segment, num_segments); fclose(filecloser); } } @@ -3514,7 +3529,7 @@ int main(int argc, char *argv[]) { } else if(my_segment && num_segments){ filecloser = pfp; - pfp = hydra_divide_file(pfp, my_segment, num_segments); + pfp = hydra_divide_file(pfp, target_no, my_segment, num_segments); fclose(filecloser); } hydra_brains.countpass = countlines(pfp, 0); @@ -3573,7 +3588,7 @@ int main(int argc, char *argv[]) { } else if(my_segment && num_segments){ filecloser = cfp; - cfp = hydra_divide_file(cfp, my_segment, num_segments); + cfp = hydra_divide_file(cfp, target_no, my_segment, num_segments); fclose(filecloser); } hydra_brains.countlogin = countlines(cfp, 1); From 4fad67d30791ddfd3f95fe5d70f67a56e53b2ca0 Mon Sep 17 00:00:00 2001 From: xh4vm Date: Tue, 11 Mar 2025 18:42:09 +0500 Subject: [PATCH 511/531] feat: added the ability to brute force a custom port --- hydra-postgres.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-postgres.c b/hydra-postgres.c index 6826c78..3b2cac9 100644 --- a/hydra-postgres.c +++ b/hydra-postgres.c @@ -41,7 +41,7 @@ int32_t start_postgres(int32_t s, char *ip, int32_t port, unsigned char options, * Building the connection string */ - snprintf(connection_string, sizeof(connection_string), "host = '%s' dbname = '%s' user = '%s' password = '%s' ", hydra_address2string(ip), database, login, pass); + snprintf(connection_string, sizeof(connection_string), "host = '%s' port = '%d' dbname = '%s' user = '%s' password = '%s' ", hydra_address2string(ip), port, database, login, pass); if (verbose) hydra_report(stderr, "connection string: %s\n", connection_string); From 79f7d52ba2f2beadfbf504087500ca8c64fa8def Mon Sep 17 00:00:00 2001 From: xh4vm Date: Wed, 12 Mar 2025 13:07:12 +0500 Subject: [PATCH 512/531] feat: added paths for brute force and additional settings for all targets from the file --- hydra.c | 25 ++++++++++++++++++------- 1 file changed, 18 insertions(+), 7 deletions(-) diff --git a/hydra.c b/hydra.c index 30a8ece..d8ede22 100644 --- a/hydra.c +++ b/hydra.c @@ -267,6 +267,7 @@ typedef struct { typedef struct { char *target; + char *miscptr; char ip[36]; char *login_ptr; char *pass_ptr; @@ -1174,13 +1175,12 @@ void hydra_service_init(int32_t target_no) { int32_t x = 99; int32_t i; hydra_target *t = hydra_targets[target_no]; - char *miscptr = hydra_options.miscptr; FILE *ofp = hydra_brains.ofp; for (i = 0; x == 99 && i < sizeof(services) / sizeof(services[0]); i++) { if (strcmp(hydra_options.service, services[i].name) == 0) { if (services[i].init) { - x = services[i].init(t->ip, -1, options, miscptr, ofp, t->port, t->target); + x = services[i].init(t->ip, -1, options, t->miscptr, ofp, t->port, t->target); break; } } @@ -1264,13 +1264,13 @@ int32_t hydra_spawn_head(int32_t head_no, int32_t target_no) { hydra_target *t = hydra_targets[target_no]; int32_t sp = hydra_heads[head_no]->sp[1]; - char *miscptr = hydra_options.miscptr; + // char *miscptr = hydra_options.miscptr; FILE *ofp = hydra_brains.ofp; hydra_target *head_target = hydra_targets[hydra_heads[head_no]->target_no]; for (i = 0; i < sizeof(services) / sizeof(services[0]); i++) { if (strcmp(hydra_options.service, services[i].name) == 0) { if (services[i].exec) { - services[i].exec(t->ip, sp, options, miscptr, ofp, t->port, head_target->target); + services[i].exec(t->ip, sp, options, t->miscptr, ofp, t->port, head_target->target); // just in case a module returns (which it shouldnt) we let it exit // here exit(-1); @@ -2177,7 +2177,7 @@ int main(int argc, char *argv[]) { int32_t i = 0, j = 0, k, error = 0, modusage = 0, ignore_restore = 0, do_switch; int32_t head_no = 0, target_no = 0, exit_condition = 0, readres; time_t starttime, elapsed_status, elapsed_restore, status_print = 59, tmp_time; - char *tmpptr, *tmpptr2; + char *tmpptr, *tmpptr2, *tmpptr3; char rc, buf[MAXBUF]; time_t last_attempt = 0; fd_set fdreadheads; @@ -3543,7 +3543,7 @@ int main(int argc, char *argv[]) { fclose(rfp); } - if (hydra_options.infile_ptr != NULL) { + if (hydra_options.infile_ptr != NULL) { if ((ifp = fopen(hydra_options.infile_ptr, "r")) == NULL) { fprintf(stderr, "[ERROR] File for targets not found: %s\n", hydra_options.infile_ptr); exit(-1); @@ -3591,6 +3591,7 @@ int main(int argc, char *argv[]) { } } else hydra_targets[i]->target = tmpptr; + if ((tmpptr2 = strchr(tmpptr, ':')) != NULL) { *tmpptr2++ = 0; tmpptr = tmpptr2; @@ -3600,6 +3601,13 @@ int main(int argc, char *argv[]) { } if (hydra_targets[i]->port == 0) hydra_targets[i]->port = hydra_options.port; + + if ((tmpptr3 = strchr(tmpptr, '/')) != NULL) { + hydra_targets[i]->miscptr = tmpptr3; + } + else + hydra_targets[i]->miscptr = "/"; + while (*tmpptr != 0) tmpptr++; tmpptr++; @@ -3622,6 +3630,7 @@ int main(int argc, char *argv[]) { memset(hydra_targets[0], 0, sizeof(hydra_target)); hydra_targets[0]->target = servers_ptr = hydra_options.server; hydra_targets[0]->port = hydra_options.port; + hydra_targets[0]->miscptr = hydra_options.miscptr; sizeservers = strlen(hydra_options.server) + 1; } else { /* CIDR notation on command line, e.g. 192.168.0.0/24 */ @@ -3666,6 +3675,7 @@ int main(int argc, char *argv[]) { memcpy(&target.sin_addr.s_addr, (char *)&addr_cur2, 4); hydra_targets[i]->target = strdup(inet_ntoa((struct in_addr)target.sin_addr)); hydra_targets[i]->port = hydra_options.port; + hydra_targets[i]->miscptr = hydra_options.miscptr; addr_cur++; i++; } @@ -3681,6 +3691,7 @@ int main(int argc, char *argv[]) { memset(hydra_targets[0], 0, sizeof(hydra_target)); hydra_targets[0]->target = servers_ptr = hydra_options.server; hydra_targets[0]->port = hydra_options.port; + hydra_targets[0]->miscptr = hydra_options.miscptr; sizeservers = strlen(hydra_options.server) + 1; } for (i = 0; i < hydra_brains.targets; i++) { @@ -4113,7 +4124,7 @@ int main(int argc, char *argv[]) { } else if (hydra_heads[head_no]->current_pass_ptr == NULL || strlen(hydra_heads[head_no]->current_pass_ptr) == 0) { printf("[%d][%s] host: %s login: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr); } else - printf("[%d][%s] host: %s login: %s password: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr); + printf("[%d][%s] host: %s misc: %s login: %s password: %s\n", hydra_targets[hydra_heads[head_no]->target_no]->port, hydra_options.service, hydra_targets[hydra_heads[head_no]->target_no]->target, hydra_targets[hydra_heads[head_no]->target_no]->miscptr, hydra_heads[head_no]->current_login_ptr, hydra_heads[head_no]->current_pass_ptr); } if (hydra_options.outfile_format == FORMAT_JSONV1 && hydra_options.outfile_ptr != NULL && hydra_brains.ofp != NULL) { fprintf(hydra_brains.ofp, From 74b37e24c811c46576687d5f15fae484bdf10828 Mon Sep 17 00:00:00 2001 From: motypi Date: Wed, 12 Mar 2025 10:37:01 +0100 Subject: [PATCH 513/531] unique segment filename --- hydra.c | 26 +++++++++++++------------- 1 file changed, 13 insertions(+), 13 deletions(-) diff --git a/hydra.c b/hydra.c index bb75d96..013c4d9 100644 --- a/hydra.c +++ b/hydra.c @@ -346,8 +346,7 @@ int32_t total_redo_count = 0; // requred for distributed attack capability uint32_t num_segments = 0; uint32_t my_segment = 0; -uint32_t junk_file_count = 0; -char junk_files[20][16]; +char junk_file[50]; // moved for restore feature int32_t process_restore = 0, dont_unlink; @@ -1600,11 +1599,10 @@ char *hydra_reverse_login(int32_t head_no, char *login) { } void delete_junk_files(){ - for(int i=0; i num_segments){ fprintf(stderr, "[ERROR] in option -D XofY, X must not be greater than Y: %s\n", hydra_options.passfile); @@ -1613,7 +1611,7 @@ FILE *hydra_divide_file(FILE *file, uint32_t target_no, uint32_t my_segment, uin FILE *output_file; char line[500]; - char output_file_name[20]; + char output_file_name[50]; uint32_t line_number = 0; @@ -1635,8 +1633,11 @@ FILE *hydra_divide_file(FILE *file, uint32_t target_no, uint32_t my_segment, uin uint64_t segment_end = segment_size * my_segment; - fprintf(stdout, "writing filename\n"); - sprintf(output_file_name, "segment_%d_%d.txt",target_no, my_segment); + + srand(time(NULL)); + int filetag = rand(); + + sprintf(output_file_name, "segment_%d_%d.txt",filetag, my_segment); fprintf(stdout, "writing successful\n"); output_file = fopen(output_file_name, "w"); @@ -1645,8 +1646,7 @@ FILE *hydra_divide_file(FILE *file, uint32_t target_no, uint32_t my_segment, uin return NULL; } - if(strcpy(junk_files[junk_file_count], output_file_name)) - junk_file_count++; + strcpy(junk_file, output_file_name); atexit(delete_junk_files); @@ -3491,7 +3491,7 @@ int main(int argc, char *argv[]) { else if (hydra_options.passfile == NULL){ if(my_segment && num_segments){ filecloser = lfp; - lfp = hydra_divide_file(lfp, target_no, my_segment, num_segments); + lfp = hydra_divide_file(lfp, my_segment, num_segments); fclose(filecloser); } } @@ -3529,7 +3529,7 @@ int main(int argc, char *argv[]) { } else if(my_segment && num_segments){ filecloser = pfp; - pfp = hydra_divide_file(pfp, target_no, my_segment, num_segments); + pfp = hydra_divide_file(pfp, my_segment, num_segments); fclose(filecloser); } hydra_brains.countpass = countlines(pfp, 0); @@ -3588,7 +3588,7 @@ int main(int argc, char *argv[]) { } else if(my_segment && num_segments){ filecloser = cfp; - cfp = hydra_divide_file(cfp, target_no, my_segment, num_segments); + cfp = hydra_divide_file(cfp, my_segment, num_segments); fclose(filecloser); } hydra_brains.countlogin = countlines(cfp, 1); From b8ea180d85fc391d5f349660081c3c8540b7b495 Mon Sep 17 00:00:00 2001 From: motypi Date: Wed, 12 Mar 2025 10:38:25 +0100 Subject: [PATCH 514/531] unique segment filename --- hydra.c | 1 - 1 file changed, 1 deletion(-) diff --git a/hydra.c b/hydra.c index 013c4d9..7def50a 100644 --- a/hydra.c +++ b/hydra.c @@ -1638,7 +1638,6 @@ FILE *hydra_divide_file(FILE *file, uint32_t my_segment, uint32_t num_segments){ int filetag = rand(); sprintf(output_file_name, "segment_%d_%d.txt",filetag, my_segment); - fprintf(stdout, "writing successful\n"); output_file = fopen(output_file_name, "w"); if(!output_file){ From ad286790ca3ca7e61a3341ee784b95864d9349d7 Mon Sep 17 00:00:00 2001 From: xh4vm Date: Thu, 13 Mar 2025 12:26:57 +0500 Subject: [PATCH 515/531] feat: integration with http[s]-* --- hydra.c | 132 ++++++++++++++++++++++++++++---------------------------- 1 file changed, 67 insertions(+), 65 deletions(-) diff --git a/hydra.c b/hydra.c index d8ede22..492089c 100644 --- a/hydra.c +++ b/hydra.c @@ -3201,77 +3201,79 @@ int main(int argc, char *argv[]) { bail("Compiled without SSL support, module not available"); #endif } - if (hydra_options.miscptr == NULL) { - fprintf(stderr, "[WARNING] You must supply the web page as an " - "additional option or via -m, default path set to /\n"); - hydra_options.miscptr = malloc(2); - hydra_options.miscptr = "/"; - } - // if (*hydra_options.miscptr != '/' && strstr(hydra_options.miscptr, - // "://") == NULL) - // bail("The web page you supplied must start with a \"/\", \"http://\" - // or \"https://\", e.g. \"/protected/login\""); - if (hydra_options.miscptr[0] != '/') - bail("optional parameter must start with a '/' slash!\n"); - if (getenv("HYDRA_PROXY_HTTP") && getenv("HYDRA_PROXY")) - bail("Found HYDRA_PROXY_HTTP *and* HYDRA_PROXY environment variables - " - "you can use only ONE for the service http-head/http-get!"); - if (getenv("HYDRA_PROXY_HTTP")) { - printf("[INFO] Using HTTP Proxy: %s\n", getenv("HYDRA_PROXY_HTTP")); - use_proxy = 1; - } - if (strstr(hydra_options.miscptr, "\\:") != NULL) { - fprintf(stderr, "[INFORMATION] escape sequence \\: detected in module " - "option, no parameter verification is performed.\n"); - } else { - sprintf(bufferurl, "%.6000s", hydra_options.miscptr); - url = strtok(bufferurl, ":"); - variables = strtok(NULL, ":"); - cond = strtok(NULL, ":"); - optional1 = strtok(NULL, "\n"); - if ((variables == NULL) || (strstr(variables, "^USER^") == NULL && strstr(variables, "^PASS^") == NULL && strstr(variables, "^USER64^") == NULL && strstr(variables, "^PASS64^") == NULL)) { - fprintf(stderr, - "[ERROR] the variables argument needs at least the strings " - "^USER^, ^PASS^, ^USER64^ or ^PASS64^: %s\n", - STR_NULL(variables)); - exit(-1); + if (hydra_options.infile_ptr == NULL) { + if (hydra_options.miscptr == NULL) { + fprintf(stderr, "[WARNING] You must supply the web page as an " + "additional option or via -m, default path set to /\n"); + hydra_options.miscptr = malloc(2); + hydra_options.miscptr = "/"; } - if ((url == NULL) || (cond == NULL)) { - fprintf(stderr, - "[ERROR] Wrong syntax, requires three arguments separated by " - "a colon which may not be null: %s\n", - bufferurl); - exit(-1); + // if (*hydra_options.miscptr != '/' && strstr(hydra_options.miscptr, + // "://") == NULL) + // bail("The web page you supplied must start with a \"/\", \"http://\" + // or \"https://\", e.g. \"/protected/login\""); + if (hydra_options.miscptr[0] != '/') + bail("optional parameter must start with a '/' slash!\n"); + if (getenv("HYDRA_PROXY_HTTP") && getenv("HYDRA_PROXY")) + bail("Found HYDRA_PROXY_HTTP *and* HYDRA_PROXY environment variables - " + "you can use only ONE for the service http-head/http-get!"); + if (getenv("HYDRA_PROXY_HTTP")) { + printf("[INFO] Using HTTP Proxy: %s\n", getenv("HYDRA_PROXY_HTTP")); + use_proxy = 1; } - while ((optional1 = strtok(NULL, ":")) != NULL) { - if (optional1[1] != '=' && optional1[1] != ':' && optional1[1] != 0) { - fprintf(stderr, "[ERROR] Wrong syntax of optional argument: %s\n", optional1); + if (strstr(hydra_options.miscptr, "\\:") != NULL) { + fprintf(stderr, "[INFORMATION] escape sequence \\: detected in module " + "option, no parameter verification is performed.\n"); + } else { + sprintf(bufferurl, "%.6000s", hydra_options.miscptr); + url = strtok(bufferurl, ":"); + variables = strtok(NULL, ":"); + cond = strtok(NULL, ":"); + optional1 = strtok(NULL, "\n"); + if ((variables == NULL) || (strstr(variables, "^USER^") == NULL && strstr(variables, "^PASS^") == NULL && strstr(variables, "^USER64^") == NULL && strstr(variables, "^PASS64^") == NULL)) { + fprintf(stderr, + "[ERROR] the variables argument needs at least the strings " + "^USER^, ^PASS^, ^USER64^ or ^PASS64^: %s\n", + STR_NULL(variables)); exit(-1); } + if ((url == NULL) || (cond == NULL)) { + fprintf(stderr, + "[ERROR] Wrong syntax, requires three arguments separated by " + "a colon which may not be null: %s\n", + bufferurl); + exit(-1); + } + while ((optional1 = strtok(NULL, ":")) != NULL) { + if (optional1[1] != '=' && optional1[1] != ':' && optional1[1] != 0) { + fprintf(stderr, "[ERROR] Wrong syntax of optional argument: %s\n", optional1); + exit(-1); + } - switch (optional1[0]) { - case 'C': // fall through - case 'c': - if (optional1[1] != '=' || optional1[2] != '/') { - fprintf(stderr, - "[ERROR] Wrong syntax of parameter C, must look like " - "'C=/url/of/page', not http:// etc.: %s\n", - optional1); - exit(-1); + switch (optional1[0]) { + case 'C': // fall through + case 'c': + if (optional1[1] != '=' || optional1[2] != '/') { + fprintf(stderr, + "[ERROR] Wrong syntax of parameter C, must look like " + "'C=/url/of/page', not http:// etc.: %s\n", + optional1); + exit(-1); + } + break; + case 'H': // fall through + case 'h': + if (optional1[1] != '=' || strtok(NULL, ":") == NULL) { + fprintf(stderr, + "[ERROR] Wrong syntax of parameter H, must look like " + "'H=X-My-Header: MyValue', no http:// : %s\n", + optional1); + exit(-1); + } + break; + default: + fprintf(stderr, "[ERROR] Unknown optional argument: %s\n", optional1); } - break; - case 'H': // fall through - case 'h': - if (optional1[1] != '=' || strtok(NULL, ":") == NULL) { - fprintf(stderr, - "[ERROR] Wrong syntax of parameter H, must look like " - "'H=X-My-Header: MyValue', no http:// : %s\n", - optional1); - exit(-1); - } - break; - default: - fprintf(stderr, "[ERROR] Unknown optional argument: %s\n", optional1); } } } From ba45db1496584f3a2cd439cb794d54c7fc82b202 Mon Sep 17 00:00:00 2001 From: xh4vm Date: Fri, 14 Mar 2025 19:28:04 +0500 Subject: [PATCH 516/531] feat: added documentation --- hydra-http-form.c | 5 +++++ hydra-http.c | 5 +++++ 2 files changed, 10 insertions(+) diff --git a/hydra-http-form.c b/hydra-http-form.c index 4c6919b..7f56091 100644 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -1613,6 +1613,11 @@ void usage_http_form(const char *service) { "You can specify a header without escaping the colons, but that way you will not\n" "be able to put colons in the header value itself, as they will be interpreted by\n" "hydra as option separators.\n" + "Note: to attack multiple targets, you only need to pass the path to the file containing the targets with parameters,\n" + "for example, a file with targets:\n\n" + " localhost:8443/login:type=login&login=^USER^&password=^PASS^:h=test\\: header:F=401\n" + " localhost:9443/login2:type=login&login=^USER^&password=^PASS^:h=test\\: header:F=302\n" + " ...\n\n" "\nExamples:\n" " \"/login.php:user=^USER^&pass=^PASS^:incorrect\"\n" " \"/" diff --git a/hydra-http.c b/hydra-http.c index ba9a676..c083e8c 100644 --- a/hydra-http.c +++ b/hydra-http.c @@ -473,6 +473,11 @@ void usage_http(const char *service) { "present the\n" " combination is invalid. Note: this must be the last option " "supplied.\n" + "Note: to attack multiple targets, you only need to pass the path to the file containing the targets with parameters,\n" + "for example, a file with targets:\n\n" + " localhost:5000/protected:A=BASIC\n" + " localhost:5002/protected:A=NTLM\n" + " ...\n\n" "For example: \"/secret\" or \"http://bla.com/foo/bar:H=Cookie\\: " "sessid=aaaa\" or \"https://test.com:8080/members:A=NTLM\"\n\n", service); From aae8baae838ef02eb529f8e63b30747cae3ab4a4 Mon Sep 17 00:00:00 2001 From: xh4vm Date: Tue, 18 Mar 2025 17:32:56 +0500 Subject: [PATCH 517/531] fix: hydra-http documentation --- hydra-http.c | 13 +++++++------ 1 file changed, 7 insertions(+), 6 deletions(-) mode change 100644 => 100755 hydra-http.c diff --git a/hydra-http.c b/hydra-http.c old mode 100644 new mode 100755 index c083e8c..e78f865 --- a/hydra-http.c +++ b/hydra-http.c @@ -473,12 +473,13 @@ void usage_http(const char *service) { "present the\n" " combination is invalid. Note: this must be the last option " "supplied.\n" - "Note: to attack multiple targets, you only need to pass the path to the file containing the targets with parameters,\n" - "for example, a file with targets:\n\n" - " localhost:5000/protected:A=BASIC\n" - " localhost:5002/protected:A=NTLM\n" - " ...\n\n" "For example: \"/secret\" or \"http://bla.com/foo/bar:H=Cookie\\: " - "sessid=aaaa\" or \"https://test.com:8080/members:A=NTLM\"\n\n", + "sessid=aaaa\" or \"https://test.com:8080/members:A=NTLM\"\n" + "To attack multiple targets, you can use the -M option with a file " + "containing the targets and their parameters.\n" + "Example file content:\n" + " localhost:5000/protected:A=BASIC\n" + " localhost:5002/protected_path:A=NTLM\n" + " ...\n\n", service); } From b81105f6af5b7e1ba43be3863a764bbd2b11c078 Mon Sep 17 00:00:00 2001 From: xh4vm Date: Tue, 18 Mar 2025 17:35:41 +0500 Subject: [PATCH 518/531] fix: hydra-http-form documentation --- hydra-http-form.c | 13 +++++++------ 1 file changed, 7 insertions(+), 6 deletions(-) mode change 100644 => 100755 hydra-http-form.c diff --git a/hydra-http-form.c b/hydra-http-form.c old mode 100644 new mode 100755 index 7f56091..af2f457 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -1613,11 +1613,6 @@ void usage_http_form(const char *service) { "You can specify a header without escaping the colons, but that way you will not\n" "be able to put colons in the header value itself, as they will be interpreted by\n" "hydra as option separators.\n" - "Note: to attack multiple targets, you only need to pass the path to the file containing the targets with parameters,\n" - "for example, a file with targets:\n\n" - " localhost:8443/login:type=login&login=^USER^&password=^PASS^:h=test\\: header:F=401\n" - " localhost:9443/login2:type=login&login=^USER^&password=^PASS^:h=test\\: header:F=302\n" - " ...\n\n" "\nExamples:\n" " \"/login.php:user=^USER^&pass=^PASS^:incorrect\"\n" " \"/" @@ -1629,6 +1624,12 @@ void usage_http_form(const char *service) { " \"/exchweb/bin/auth/:F=failed" "owaauth.dll:destination=http%%3A%%2F%%2F%%2Fexchange&flags=0&" "username=%%5C^USER^&password=^PASS^&SubmitCreds=x&trusted=0:" - "C=/exchweb\":reason=\n", + "C=/exchweb\":reason=\n" + "To attack multiple targets, you can use the -M option with a file " + "containing the targets and their parameters.\n" + "Example file content:\n" + " localhost:8443/login:type=login&login=^USER^&password=^PASS^:h=test\\: header:F=401\n" + " localhost:9443/login2:type=login&login=^USER^&password=^PASS^:h=test\\: header:F=302\n" + " ...\n\n", service); } From 3c233fdbc095842daa935753ec4dca5092c47baf Mon Sep 17 00:00:00 2001 From: motypi Date: Tue, 18 Mar 2025 16:05:08 +0100 Subject: [PATCH 519/531] Used freetds to use TDSv7. First working version. --- Makefile | 109 ++++++++++++++++++++++++++++++++++++++++++++++++-- hydra-mssql.c | 103 ++++++++--------------------------------------- 2 files changed, 122 insertions(+), 90 deletions(-) diff --git a/Makefile b/Makefile index 0fc0d2e..b228a4e 100644 --- a/Makefile +++ b/Makefile @@ -1,8 +1,111 @@ -all: - @echo Error: you must run "./configure" first +STRIP=strip +XDEFINES= -DLIBOPENSSL -DLIBNCURSES -DHAVE_PCRE -DHAVE_ZLIB -DHAVE_MATH_H -DHAVE_SYS_PARAM_H +XLIBS= -lz -lcurses -lssl -lpcre2-8 -lcrypto -lsybdb +XLIBPATHS=-L/usr/lib -L/usr/local/lib -L/lib -L/lib/x86_64-linux-gnu +XIPATHS= -I/usr/include -I/usr/include +PREFIX=/usr/local +XHYDRA_SUPPORT= +STRIP=strip + +HYDRA_LOGO= +PWI_LOGO= +SEC=-pie -fPIE -fstack-protector-all --param ssp-buffer-size=4 -D_FORTIFY_SOURCE=2 -Wl,-z,now -Wl,-z,relro -Wl,--allow-multiple-definition + +# +# Makefile for Hydra - (c) 2001-2023 by van Hauser / THC +# +WARN_CLANG=-Wformat-nonliteral -Wstrncat-size -Wformat-security -Wsign-conversion -Wconversion -Wfloat-conversion -Wshorten-64-to-32 -Wuninitialized -Wmissing-variable-declarations -Wmissing-declarations +WARN_GCC=-Wformat=2 -Wformat-overflow=2 -Wformat-nonliteral -Wformat-truncation=2 -Wnull-dereference -Wstrict-overflow=2 -Wstringop-overflow=4 -Walloca-larger-than=4096 -Wtype-limits -Wconversion -Wtrampolines -Wstrict-prototypes -Wmissing-prototypes -Wmissing-declarations -fno-common -Wcast-align +CFLAGS ?= -g +OPTS=-I. -O3 $(CFLAGS) -fcommon -Wno-deprecated-declarations +CPPFLAGS += -D_GNU_SOURCE +# -Wall -g -pedantic +LIBS=-lm +DESTDIR ?= +BINDIR = /bin +MANDIR = /man/man1/ +DATADIR = /etc +PIXDIR = /share/pixmaps +APPDIR = /share/applications + +SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ + hydra-telnet.c hydra-cisco.c hydra-http.c hydra-ftp.c hydra-imap.c \ + hydra-pop3.c hydra-smb.c hydra-icq.c hydra-cisco-enable.c hydra-ldap.c \ + hydra-memcached.c hydra-mongodb.c hydra-mysql.c hydra-mssql.c hydra-xmpp.c \ + hydra-http-proxy-urlenum.c hydra-snmp.c hydra-cvs.c hydra-smtp.c \ + hydra-smtp-enum.c hydra-sapr3.c hydra-ssh.c hydra-sshkey.c hydra-teamspeak.c \ + hydra-postgres.c hydra-rsh.c hydra-rlogin.c hydra-oracle-listener.c \ + hydra-svn.c hydra-pcanywhere.c hydra-sip.c hydra-oracle.c hydra-vmauthd.c \ + hydra-asterisk.c hydra-firebird.c hydra-afp.c hydra-ncp.c hydra-rdp.c \ + hydra-oracle-sid.c hydra-http-proxy.c hydra-http-form.c hydra-irc.c \ + hydra-s7-300.c hydra-redis.c hydra-adam6500.c hydra-rtsp.c \ + hydra-rpcap.c hydra-radmin2.c hydra-cobaltstrike.c \ + hydra-time.c crc32.c d3des.c bfg.c ntlm.c sasl.c hmacmd5.c hydra-mod.c \ + hydra-smb2.c +OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ + hydra-telnet.o hydra-cisco.o hydra-http.o hydra-ftp.o hydra-imap.o \ + hydra-pop3.o hydra-smb.o hydra-icq.o hydra-cisco-enable.o hydra-ldap.o \ + hydra-memcached.o hydra-mongodb.o hydra-mysql.o hydra-mssql.o hydra-cobaltstrike.o hydra-xmpp.o \ + hydra-http-proxy-urlenum.o hydra-snmp.o hydra-cvs.o hydra-smtp.o \ + hydra-smtp-enum.o hydra-sapr3.o hydra-ssh.o hydra-sshkey.o hydra-teamspeak.o \ + hydra-postgres.o hydra-rsh.o hydra-rlogin.o hydra-oracle-listener.o \ + hydra-svn.o hydra-pcanywhere.o hydra-sip.o hydra-oracle-sid.o hydra-oracle.o \ + hydra-vmauthd.o hydra-asterisk.o hydra-firebird.o hydra-afp.o \ + hydra-ncp.o hydra-http-proxy.o hydra-http-form.o hydra-irc.o \ + hydra-redis.o hydra-rdp.o hydra-s7-300.c hydra-adam6500.o hydra-rtsp.o \ + hydra-rpcap.o hydra-radmin2.o \ + crc32.o d3des.o bfg.o ntlm.o sasl.o hmacmd5.o hydra-mod.o hydra-time.o \ + hydra-smb2.o +BINS = hydra pw-inspector + +EXTRA_DIST = README README.arm README.palm CHANGES TODO INSTALL LICENSE \ + hydra-mod.h hydra.h crc32.h d3des.h + +all: pw-inspector hydra $(XHYDRA_SUPPORT) + @echo + @echo Now type "make install" + +hydra: hydra.c $(OBJ) + $(CC) $(OPTS) $(SEC) $(LIBS) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o hydra $(HYDRA_LOGO) hydra.c $(OBJ) $(LIBS) $(XLIBS) $(XLIBPATHS) $(XIPATHS) $(XDEFINES) + @echo + @echo If men could get pregnant, abortion would be a sacrament + @echo + +xhydra: + -cd hydra-gtk && sh ./make_xhydra.sh + +pw-inspector: pw-inspector.c + -$(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o pw-inspector $(PWI_LOGO) pw-inspector.c + +.c.o: + $(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) -c $< $(XDEFINES) $(XIPATHS) + +strip: all + -strip $(BINS) + -echo OK > /dev/null && test -x xhydra && strip xhydra || echo OK > /dev/null + +install: strip + -mkdir -p $(DESTDIR)$(PREFIX)$(BINDIR) + cp -f hydra-wizard.sh $(BINS) $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 hydra-wizard.sh $(BINS) + -echo OK > /dev/null && test -x xhydra && cp xhydra $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 xhydra || echo OK > /dev/null + -sed -e "s|^INSTALLDIR=.*|INSTALLDIR="$(PREFIX)"|" dpl4hydra.sh | sed -e "s|^LOCATION=.*|LOCATION="$(DATADIR)"|" > $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh + -chmod 755 $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh + -mkdir -p $(DESTDIR)$(PREFIX)$(DATADIR) + -cp -f *.csv $(DESTDIR)$(PREFIX)$(DATADIR) + -mkdir -p $(DESTDIR)$(PREFIX)$(MANDIR) + -cp -f hydra.1 xhydra.1 pw-inspector.1 $(DESTDIR)$(PREFIX)$(MANDIR) + -mkdir -p $(DESTDIR)$(PREFIX)$(PIXDIR) + -cp -f xhydra.png $(DESTDIR)$(PREFIX)$(PIXDIR)/ + -mkdir -p $(DESTDIR)$(PREFIX)$(APPDIR) + -desktop-file-install --dir $(DESTDIR)$(PREFIX)$(APPDIR) xhydra.desktop clean: + rm -rf xhydra pw-inspector hydra *.o core *.core *.stackdump *~ Makefile.in Makefile dev_rfc hydra.restore arm/*.ipk arm/ipkg/usr/bin/* hydra-gtk/src/*.o hydra-gtk/src/xhydra hydra-gtk/stamp-h hydra-gtk/config.status hydra-gtk/errors hydra-gtk/config.log hydra-gtk/src/.deps hydra-gtk/src/Makefile hydra-gtk/Makefile cp -f Makefile.orig Makefile uninstall: - @echo Error: you must run "./configure" first + -rm -f $(DESTDIR)$(PREFIX)$(BINDIR)/xhydra $(DESTDIR)$(PREFIX)$(BINDIR)/hydra $(DESTDIR)$(PREFIX)$(BINDIR)/pw-inspector $(DESTDIR)$(PREFIX)$(BINDIR)/hydra-wizard.sh $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh + -rm -f $(DESTDIR)$(PREFIX)$(DATADIR)/dpl4hydra_full.csv $(DESTDIR)$(PREFIX)$(DATADIR)/dpl4hydra_local.csv + -rm -f $(DESTDIR)$(PREFIX)$(MANDIR)/hydra.1 $(DESTDIR)$(PREFIX)$(MANDIR)/xhydra.1 $(DESTDIR)$(PREFIX)$(MANDIR)/pw-inspector.1 + -rm -f $(DESTDIR)$(PREFIX)$(PIXDIR)/xhydra.png + -rm -f $(DESTDIR)$(PREFIX)$(APPDIR)/xhydra.desktop diff --git a/hydra-mssql.c b/hydra-mssql.c index ee273ca..17f5bee 100644 --- a/hydra-mssql.c +++ b/hydra-mssql.c @@ -1,113 +1,42 @@ #include "hydra-mod.h" - -#define MSLEN 30 +#include +#include extern char *HYDRA_EXIT; char *buf; -unsigned char p_hdr[] = "\x02\x00\x02\x00\x00\x00\x02\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00"; -unsigned char p_pk2[] = "\x30\x30\x30\x30\x30\x30\x61\x30\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x20\x18\x81\xb8\x2c\x08\x03" - "\x01\x06\x0a\x09\x01\x01\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x73\x71\x75\x65\x6c\x64\x61" - "\x20\x31\x2e\x30\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x0b\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00"; -unsigned char p_pk3[] = "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x04\x02\x00\x00\x4d\x53\x44" - "\x42\x4c\x49\x42\x00\x00\x00\x07\x06\x00\x00" - "\x00\x00\x0d\x11\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00"; -unsigned char p_lng[] = "\x02\x01\x00\x47\x00\x00\x02\x00\x00\x00\x00" - "\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" - "\x00\x00\x00\x00\x00\x00\x30\x30\x30\x00\x00" - "\x00\x03\x00\x00\x00"; - int32_t start_mssql(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; - char *login, *pass, buffer[1024]; - char ms_login[MSLEN + 1]; - char ms_pass[MSLEN + 1]; - unsigned char len_login, len_pass; - int32_t ret = -1; + char *login, *pass; + char *ipaddr_str = hydra_address2string(ip); + + fprintf(stdout, "The target ip is: %s\n", ipaddr_str); + if (strlen(login = hydra_get_next_login()) == 0) login = empty; if (strlen(pass = hydra_get_next_password()) == 0) pass = empty; - if (strlen(login) > MSLEN) - login[MSLEN - 1] = 0; - if (strlen(pass) > MSLEN) - pass[MSLEN - 1] = 0; - len_login = strlen(login); - len_pass = strlen(pass); - memset(ms_login, 0, MSLEN + 1); - memset(ms_pass, 0, MSLEN + 1); - strcpy(ms_login, login); - strcpy(ms_pass, pass); - memset(buffer, 0, sizeof(buffer)); - memcpy(buffer, p_hdr, 39); - memcpy(buffer + 39, ms_login, MSLEN); - memcpy(buffer + MSLEN + 39, &len_login, 1); - memcpy(buffer + MSLEN + 1 + 39, ms_pass, MSLEN); - memcpy(buffer + MSLEN + 1 + 39 + MSLEN, &len_pass, 1); - memcpy(buffer + MSLEN + 1 + 39 + MSLEN + 1, p_pk2, 110); - memcpy(buffer + MSLEN + 1 + 39 + MSLEN + 1 + 110, &len_pass, 1); - memcpy(buffer + MSLEN + 1 + 39 + MSLEN + 1 + 110 + 1, ms_pass, MSLEN); - memcpy(buffer + MSLEN + 1 + 39 + MSLEN + 1 + 110 + 1 + MSLEN, p_pk3, 270); + DBPROCESS *dbproc; + LOGINREC *attempt; - if (hydra_send(s, buffer, MSLEN + 1 + 39 + MSLEN + 1 + 110 + 1 + MSLEN + 270, 0) < 0) - return 1; - if (hydra_send(s, (char *)p_lng, 71, 0) < 0) - return 1; + dbinit(); + attempt = dblogin(); + DBSETLUSER(attempt, login); + DBSETLPWD(attempt, pass); - memset(buffer, 0, sizeof(buffer)); - ret = hydra_recv_nb(s, buffer, sizeof(buffer)); + // Connect without specifying a database + dbproc = dbopen(attempt, ipaddr_str); - if (ret <= 0) - return 3; - - if (ret > 10 && buffer[8] == '\xe3') { + if (dbproc != NULL) { hydra_report_found_host(port, ip, "mssql", fp); hydra_completed_pair_found(); - free(buf); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) return 2; return 1; } - free(buf); hydra_completed_pair(); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) return 2; From 3635dff5ff317a375948cd2b6893a481e183ccbd Mon Sep 17 00:00:00 2001 From: motypi Date: Wed, 19 Mar 2025 07:41:46 +0100 Subject: [PATCH 520/531] handle libraries accommodate old version of TDS --- configure | 37 ++++++++++++++- hydra-mssql.c | 123 +++++++++++++++++++++++++++++++++++++++++++++++--- 2 files changed, 153 insertions(+), 7 deletions(-) diff --git a/configure b/configure index 1ae09a9..dc86adb 100755 --- a/configure +++ b/configure @@ -185,6 +185,32 @@ else echo " ... zlib not found, gzip support disabled" fi +echo "Checking for sybdb (sybdb.h) ..." +for i in $INCDIRS; do + if [ -f "$i/sybdb.h" ]; then + HAVE_SYBDB="y" + fi +done + +if [ -n "$HAVE_SYBDB" ]; then + echo " ... found" +else + echo " ... sybdb not found, MSSQL module will lack TDSv7 support" +fi + +echo "Checking for sybfront (sybfront.h) ..." +for i in $INCDIRS; do + if [ -f "$i/sybfront.h" ]; then + HAVE_SYBFRONT="y" + fi +done + +if [ -n "$HAVE_SYBFRONT" ]; then + echo " ... found" +else + echo " ... sybfront not found, MSSQL module will lack TDSv7 support" +fi + echo "Checking for openssl (libssl/libcrypto/ssl.h/sha.h) ..." if [ "X" != "X$DEBUG" ]; then echo DEBUG: SSL_LIB=$LIBDIRS `ls -d /*ssl /usr/*ssl /opt/*ssl /usr/local/*ssl /opt/local/*ssl /*ssl/lib /usr/*ssl/lib /opt/*ssl/lib /usr/local/*ssl/lib /opt/local/*ssl/lib 2> /dev/null` @@ -1496,6 +1522,12 @@ fi if [ -n "$RSA" ]; then XDEFINES="$XDEFINES -DNO_RSA_LEGACY" fi +if [ -n "$HAVE_SYBDB" ]; then + XDEFINES="$XDEFINES -DHAVE_SYBDB" +fi +if [ -n "$HAVE_SYBFRONT" ]; then + XDEFINES="$XDEFINES -DHAVE_SYBFRONT" +fi if [ -n "$HAVE_ZLIB" ]; then XDEFINES="$XDEFINES -DHAVE_ZLIB" fi @@ -1627,6 +1659,9 @@ fi if [ -n "$HAVE_ZLIB" ]; then XLIBS="$XLIBS -lz" fi +if [ -n "$HAVE_SYBDB" ]; then + XLIBS="$XLIBS -lsybdb" +fi if [ -n "$CURSES_PATH" ]; then XLIBS="$XLIBS -lcurses" fi @@ -1804,4 +1839,4 @@ if [ "x$NOSTRIP" = "x" ]; then else cat Makefile.am | sed 's/^install:.*/install: all/' >> Makefile fi -echo "now type \"make\"" +echo "now type \"make\"" \ No newline at end of file diff --git a/hydra-mssql.c b/hydra-mssql.c index 17f5bee..4131b54 100644 --- a/hydra-mssql.c +++ b/hydra-mssql.c @@ -1,18 +1,15 @@ #include "hydra-mod.h" -#include -#include - extern char *HYDRA_EXIT; char *buf; +#if defined(HAVE_SYBFRONT) && defined(HAVE_SYBDB) +#include +#include int32_t start_mssql(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, *pass; char *ipaddr_str = hydra_address2string(ip); - fprintf(stdout, "The target ip is: %s\n", ipaddr_str); - - if (strlen(login = hydra_get_next_login()) == 0) login = empty; if (strlen(pass = hydra_get_next_password()) == 0) @@ -43,6 +40,120 @@ int32_t start_mssql(int32_t s, char *ip, int32_t port, unsigned char options, ch return 1; } +#else +#define MSLEN 30 + +unsigned char p_hdr[] = "\x02\x00\x02\x00\x00\x00\x02\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00"; +unsigned char p_pk2[] = "\x30\x30\x30\x30\x30\x30\x61\x30\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x20\x18\x81\xb8\x2c\x08\x03" + "\x01\x06\x0a\x09\x01\x01\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x73\x71\x75\x65\x6c\x64\x61" + "\x20\x31\x2e\x30\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x0b\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00"; +unsigned char p_pk3[] = "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x04\x02\x00\x00\x4d\x53\x44" + "\x42\x4c\x49\x42\x00\x00\x00\x07\x06\x00\x00" + "\x00\x00\x0d\x11\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00"; +unsigned char p_lng[] = "\x02\x01\x00\x47\x00\x00\x02\x00\x00\x00\x00" + "\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" + "\x00\x00\x00\x00\x00\x00\x30\x30\x30\x00\x00" + "\x00\x03\x00\x00\x00"; + +int32_t start_mssql(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { + char *empty = ""; + char *login, *pass, buffer[1024]; + char ms_login[MSLEN + 1]; + char ms_pass[MSLEN + 1]; + unsigned char len_login, len_pass; + int32_t ret = -1; + + if (strlen(login = hydra_get_next_login()) == 0) + login = empty; + if (strlen(pass = hydra_get_next_password()) == 0) + pass = empty; + if (strlen(login) > MSLEN) + login[MSLEN - 1] = 0; + if (strlen(pass) > MSLEN) + pass[MSLEN - 1] = 0; + len_login = strlen(login); + len_pass = strlen(pass); + memset(ms_login, 0, MSLEN + 1); + memset(ms_pass, 0, MSLEN + 1); + strcpy(ms_login, login); + strcpy(ms_pass, pass); + + memset(buffer, 0, sizeof(buffer)); + memcpy(buffer, p_hdr, 39); + memcpy(buffer + 39, ms_login, MSLEN); + memcpy(buffer + MSLEN + 39, &len_login, 1); + memcpy(buffer + MSLEN + 1 + 39, ms_pass, MSLEN); + memcpy(buffer + MSLEN + 1 + 39 + MSLEN, &len_pass, 1); + memcpy(buffer + MSLEN + 1 + 39 + MSLEN + 1, p_pk2, 110); + memcpy(buffer + MSLEN + 1 + 39 + MSLEN + 1 + 110, &len_pass, 1); + memcpy(buffer + MSLEN + 1 + 39 + MSLEN + 1 + 110 + 1, ms_pass, MSLEN); + memcpy(buffer + MSLEN + 1 + 39 + MSLEN + 1 + 110 + 1 + MSLEN, p_pk3, 270); + + if (hydra_send(s, buffer, MSLEN + 1 + 39 + MSLEN + 1 + 110 + 1 + MSLEN + 270, 0) < 0) + return 1; + if (hydra_send(s, (char *)p_lng, 71, 0) < 0) + return 1; + + memset(buffer, 0, sizeof(buffer)); + ret = hydra_recv_nb(s, buffer, sizeof(buffer)); + + if (ret <= 0) + return 3; + + if (ret > 10 && buffer[8] == '\xe3') { + hydra_report_found_host(port, ip, "mssql", fp); + hydra_completed_pair_found(); + free(buf); + if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) + return 2; + return 1; + } + + free(buf); + hydra_completed_pair(); + if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) + return 2; + + return 1; +} + +#endif void service_mssql(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; From 17c6228f7bf6d680bc7d41447dd807e2193d221c Mon Sep 17 00:00:00 2001 From: motypi Date: Wed, 19 Mar 2025 08:01:10 +0100 Subject: [PATCH 521/531] generated Makefile --- Makefile | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/Makefile b/Makefile index b228a4e..47b1751 100644 --- a/Makefile +++ b/Makefile @@ -1,6 +1,6 @@ STRIP=strip -XDEFINES= -DLIBOPENSSL -DLIBNCURSES -DHAVE_PCRE -DHAVE_ZLIB -DHAVE_MATH_H -DHAVE_SYS_PARAM_H -XLIBS= -lz -lcurses -lssl -lpcre2-8 -lcrypto -lsybdb +XDEFINES= -DLIBOPENSSL -DLIBNCURSES -DHAVE_PCRE -DHAVE_SYBDB -DHAVE_SYBFRONT -DHAVE_ZLIB -DHAVE_MATH_H -DHAVE_SYS_PARAM_H +XLIBS= -lz -lsybdb -lcurses -lssl -lpcre2-8 -lcrypto XLIBPATHS=-L/usr/lib -L/usr/local/lib -L/lib -L/lib/x86_64-linux-gnu XIPATHS= -I/usr/include -I/usr/include PREFIX=/usr/local From 369374b1661712e80e0c6d9ec48962cd936aa7a2 Mon Sep 17 00:00:00 2001 From: motypi Date: Wed, 19 Mar 2025 12:14:50 +0100 Subject: [PATCH 522/531] revert Makefile --- Makefile | 109 ++----------------------------------------------------- 1 file changed, 3 insertions(+), 106 deletions(-) diff --git a/Makefile b/Makefile index 47b1751..0fc0d2e 100644 --- a/Makefile +++ b/Makefile @@ -1,111 +1,8 @@ -STRIP=strip -XDEFINES= -DLIBOPENSSL -DLIBNCURSES -DHAVE_PCRE -DHAVE_SYBDB -DHAVE_SYBFRONT -DHAVE_ZLIB -DHAVE_MATH_H -DHAVE_SYS_PARAM_H -XLIBS= -lz -lsybdb -lcurses -lssl -lpcre2-8 -lcrypto -XLIBPATHS=-L/usr/lib -L/usr/local/lib -L/lib -L/lib/x86_64-linux-gnu -XIPATHS= -I/usr/include -I/usr/include -PREFIX=/usr/local -XHYDRA_SUPPORT= -STRIP=strip - -HYDRA_LOGO= -PWI_LOGO= -SEC=-pie -fPIE -fstack-protector-all --param ssp-buffer-size=4 -D_FORTIFY_SOURCE=2 -Wl,-z,now -Wl,-z,relro -Wl,--allow-multiple-definition - -# -# Makefile for Hydra - (c) 2001-2023 by van Hauser / THC -# -WARN_CLANG=-Wformat-nonliteral -Wstrncat-size -Wformat-security -Wsign-conversion -Wconversion -Wfloat-conversion -Wshorten-64-to-32 -Wuninitialized -Wmissing-variable-declarations -Wmissing-declarations -WARN_GCC=-Wformat=2 -Wformat-overflow=2 -Wformat-nonliteral -Wformat-truncation=2 -Wnull-dereference -Wstrict-overflow=2 -Wstringop-overflow=4 -Walloca-larger-than=4096 -Wtype-limits -Wconversion -Wtrampolines -Wstrict-prototypes -Wmissing-prototypes -Wmissing-declarations -fno-common -Wcast-align -CFLAGS ?= -g -OPTS=-I. -O3 $(CFLAGS) -fcommon -Wno-deprecated-declarations -CPPFLAGS += -D_GNU_SOURCE -# -Wall -g -pedantic -LIBS=-lm -DESTDIR ?= -BINDIR = /bin -MANDIR = /man/man1/ -DATADIR = /etc -PIXDIR = /share/pixmaps -APPDIR = /share/applications - -SRC = hydra-vnc.c hydra-pcnfs.c hydra-rexec.c hydra-nntp.c hydra-socks5.c \ - hydra-telnet.c hydra-cisco.c hydra-http.c hydra-ftp.c hydra-imap.c \ - hydra-pop3.c hydra-smb.c hydra-icq.c hydra-cisco-enable.c hydra-ldap.c \ - hydra-memcached.c hydra-mongodb.c hydra-mysql.c hydra-mssql.c hydra-xmpp.c \ - hydra-http-proxy-urlenum.c hydra-snmp.c hydra-cvs.c hydra-smtp.c \ - hydra-smtp-enum.c hydra-sapr3.c hydra-ssh.c hydra-sshkey.c hydra-teamspeak.c \ - hydra-postgres.c hydra-rsh.c hydra-rlogin.c hydra-oracle-listener.c \ - hydra-svn.c hydra-pcanywhere.c hydra-sip.c hydra-oracle.c hydra-vmauthd.c \ - hydra-asterisk.c hydra-firebird.c hydra-afp.c hydra-ncp.c hydra-rdp.c \ - hydra-oracle-sid.c hydra-http-proxy.c hydra-http-form.c hydra-irc.c \ - hydra-s7-300.c hydra-redis.c hydra-adam6500.c hydra-rtsp.c \ - hydra-rpcap.c hydra-radmin2.c hydra-cobaltstrike.c \ - hydra-time.c crc32.c d3des.c bfg.c ntlm.c sasl.c hmacmd5.c hydra-mod.c \ - hydra-smb2.c -OBJ = hydra-vnc.o hydra-pcnfs.o hydra-rexec.o hydra-nntp.o hydra-socks5.o \ - hydra-telnet.o hydra-cisco.o hydra-http.o hydra-ftp.o hydra-imap.o \ - hydra-pop3.o hydra-smb.o hydra-icq.o hydra-cisco-enable.o hydra-ldap.o \ - hydra-memcached.o hydra-mongodb.o hydra-mysql.o hydra-mssql.o hydra-cobaltstrike.o hydra-xmpp.o \ - hydra-http-proxy-urlenum.o hydra-snmp.o hydra-cvs.o hydra-smtp.o \ - hydra-smtp-enum.o hydra-sapr3.o hydra-ssh.o hydra-sshkey.o hydra-teamspeak.o \ - hydra-postgres.o hydra-rsh.o hydra-rlogin.o hydra-oracle-listener.o \ - hydra-svn.o hydra-pcanywhere.o hydra-sip.o hydra-oracle-sid.o hydra-oracle.o \ - hydra-vmauthd.o hydra-asterisk.o hydra-firebird.o hydra-afp.o \ - hydra-ncp.o hydra-http-proxy.o hydra-http-form.o hydra-irc.o \ - hydra-redis.o hydra-rdp.o hydra-s7-300.c hydra-adam6500.o hydra-rtsp.o \ - hydra-rpcap.o hydra-radmin2.o \ - crc32.o d3des.o bfg.o ntlm.o sasl.o hmacmd5.o hydra-mod.o hydra-time.o \ - hydra-smb2.o -BINS = hydra pw-inspector - -EXTRA_DIST = README README.arm README.palm CHANGES TODO INSTALL LICENSE \ - hydra-mod.h hydra.h crc32.h d3des.h - -all: pw-inspector hydra $(XHYDRA_SUPPORT) - @echo - @echo Now type "make install" - -hydra: hydra.c $(OBJ) - $(CC) $(OPTS) $(SEC) $(LIBS) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o hydra $(HYDRA_LOGO) hydra.c $(OBJ) $(LIBS) $(XLIBS) $(XLIBPATHS) $(XIPATHS) $(XDEFINES) - @echo - @echo If men could get pregnant, abortion would be a sacrament - @echo - -xhydra: - -cd hydra-gtk && sh ./make_xhydra.sh - -pw-inspector: pw-inspector.c - -$(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) $(LDFLAGS) -o pw-inspector $(PWI_LOGO) pw-inspector.c - -.c.o: - $(CC) $(OPTS) $(SEC) $(CFLAGS) $(CPPFLAGS) -c $< $(XDEFINES) $(XIPATHS) - -strip: all - -strip $(BINS) - -echo OK > /dev/null && test -x xhydra && strip xhydra || echo OK > /dev/null - -install: strip - -mkdir -p $(DESTDIR)$(PREFIX)$(BINDIR) - cp -f hydra-wizard.sh $(BINS) $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 hydra-wizard.sh $(BINS) - -echo OK > /dev/null && test -x xhydra && cp xhydra $(DESTDIR)$(PREFIX)$(BINDIR) && cd $(DESTDIR)$(PREFIX)$(BINDIR) && chmod 755 xhydra || echo OK > /dev/null - -sed -e "s|^INSTALLDIR=.*|INSTALLDIR="$(PREFIX)"|" dpl4hydra.sh | sed -e "s|^LOCATION=.*|LOCATION="$(DATADIR)"|" > $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh - -chmod 755 $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh - -mkdir -p $(DESTDIR)$(PREFIX)$(DATADIR) - -cp -f *.csv $(DESTDIR)$(PREFIX)$(DATADIR) - -mkdir -p $(DESTDIR)$(PREFIX)$(MANDIR) - -cp -f hydra.1 xhydra.1 pw-inspector.1 $(DESTDIR)$(PREFIX)$(MANDIR) - -mkdir -p $(DESTDIR)$(PREFIX)$(PIXDIR) - -cp -f xhydra.png $(DESTDIR)$(PREFIX)$(PIXDIR)/ - -mkdir -p $(DESTDIR)$(PREFIX)$(APPDIR) - -desktop-file-install --dir $(DESTDIR)$(PREFIX)$(APPDIR) xhydra.desktop +all: + @echo Error: you must run "./configure" first clean: - rm -rf xhydra pw-inspector hydra *.o core *.core *.stackdump *~ Makefile.in Makefile dev_rfc hydra.restore arm/*.ipk arm/ipkg/usr/bin/* hydra-gtk/src/*.o hydra-gtk/src/xhydra hydra-gtk/stamp-h hydra-gtk/config.status hydra-gtk/errors hydra-gtk/config.log hydra-gtk/src/.deps hydra-gtk/src/Makefile hydra-gtk/Makefile cp -f Makefile.orig Makefile uninstall: - -rm -f $(DESTDIR)$(PREFIX)$(BINDIR)/xhydra $(DESTDIR)$(PREFIX)$(BINDIR)/hydra $(DESTDIR)$(PREFIX)$(BINDIR)/pw-inspector $(DESTDIR)$(PREFIX)$(BINDIR)/hydra-wizard.sh $(DESTDIR)$(PREFIX)$(BINDIR)/dpl4hydra.sh - -rm -f $(DESTDIR)$(PREFIX)$(DATADIR)/dpl4hydra_full.csv $(DESTDIR)$(PREFIX)$(DATADIR)/dpl4hydra_local.csv - -rm -f $(DESTDIR)$(PREFIX)$(MANDIR)/hydra.1 $(DESTDIR)$(PREFIX)$(MANDIR)/xhydra.1 $(DESTDIR)$(PREFIX)$(MANDIR)/pw-inspector.1 - -rm -f $(DESTDIR)$(PREFIX)$(PIXDIR)/xhydra.png - -rm -f $(DESTDIR)$(PREFIX)$(APPDIR)/xhydra.desktop + @echo Error: you must run "./configure" first From bc48f7625b66b969c35a127b5aa34a8dc6f2456d Mon Sep 17 00:00:00 2001 From: motypi Date: Wed, 19 Mar 2025 20:14:23 +0100 Subject: [PATCH 523/531] added dbclose() and dbexit() in mssql module --- hydra-mssql.c | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/hydra-mssql.c b/hydra-mssql.c index 4131b54..f13c20a 100644 --- a/hydra-mssql.c +++ b/hydra-mssql.c @@ -19,7 +19,9 @@ int32_t start_mssql(int32_t s, char *ip, int32_t port, unsigned char options, ch LOGINREC *attempt; dbinit(); + attempt = dblogin(); + DBSETLUSER(attempt, login); DBSETLPWD(attempt, pass); @@ -27,6 +29,8 @@ int32_t start_mssql(int32_t s, char *ip, int32_t port, unsigned char options, ch dbproc = dbopen(attempt, ipaddr_str); if (dbproc != NULL) { + dbclose(dbproc); + dbexit(); hydra_report_found_host(port, ip, "mssql", fp); hydra_completed_pair_found(); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) @@ -35,12 +39,15 @@ int32_t start_mssql(int32_t s, char *ip, int32_t port, unsigned char options, ch } hydra_completed_pair(); + dbclose(dbproc); + dbexit(); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) return 2; return 1; } #else + #define MSLEN 30 unsigned char p_hdr[] = "\x02\x00\x02\x00\x00\x00\x02\x00\x00\x00" From 5f706c707131970dfe59bcdcc0560f39bec336a3 Mon Sep 17 00:00:00 2001 From: motypi Date: Wed, 19 Mar 2025 20:35:29 +0100 Subject: [PATCH 524/531] freetds install in README --- README | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README b/README index 44cb585..66c819a 100644 --- a/README +++ b/README @@ -96,7 +96,7 @@ for a few optional modules (note that some might not be available on your distri apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev \ libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev \ firebird-dev libmemcached-dev libgpg-error-dev \ - libgcrypt11-dev libgcrypt20-dev + libgcrypt11-dev libgcrypt20-dev freetds-dev ``` This enables all optional modules and features with the exception of Oracle, From b5eb38e48fdaf5c9facd3f0af7c2b0a3642df00f Mon Sep 17 00:00:00 2001 From: motypi Date: Mon, 24 Mar 2025 09:05:03 +0100 Subject: [PATCH 525/531] mixed TDS7 into old function --- hydra-mssql.c | 48 ++++++++++++++++++++++++++++++++++++++++-------- 1 file changed, 40 insertions(+), 8 deletions(-) diff --git a/hydra-mssql.c b/hydra-mssql.c index f13c20a..064486b 100644 --- a/hydra-mssql.c +++ b/hydra-mssql.c @@ -5,7 +5,7 @@ char *buf; #if defined(HAVE_SYBFRONT) && defined(HAVE_SYBDB) #include #include -int32_t start_mssql(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { +int32_t start_mssql7(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, *pass; char *ipaddr_str = hydra_address2string(ip); @@ -18,8 +18,6 @@ int32_t start_mssql(int32_t s, char *ip, int32_t port, unsigned char options, ch DBPROCESS *dbproc; LOGINREC *attempt; - dbinit(); - attempt = dblogin(); DBSETLUSER(attempt, login); @@ -39,14 +37,12 @@ int32_t start_mssql(int32_t s, char *ip, int32_t port, unsigned char options, ch } hydra_completed_pair(); - dbclose(dbproc); - dbexit(); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) return 2; return 1; } -#else +#endif #define MSLEN 30 @@ -101,6 +97,7 @@ unsigned char p_lng[] = "\x02\x01\x00\x47\x00\x00\x02\x00\x00\x00\x00" int32_t start_mssql(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { char *empty = ""; char *login, *pass, buffer[1024]; + char *ipaddr_str = hydra_address2string(ip); char ms_login[MSLEN + 1]; char ms_pass[MSLEN + 1]; unsigned char len_login, len_pass; @@ -110,6 +107,39 @@ int32_t start_mssql(int32_t s, char *ip, int32_t port, unsigned char options, ch login = empty; if (strlen(pass = hydra_get_next_password()) == 0) pass = empty; +#if defined(HAVE_SYBFRONT) && defined(HAVE_SYBDB) + if ((strlen(login) > MSLEN) || (strlen(pass) > MSLEN)){ + + DBPROCESS *dbproc; + LOGINREC *attempt; + + attempt = dblogin(); + + DBSETLUSER(attempt, login); + DBSETLPWD(attempt, pass); + + // Connect without specifying a database + dbproc = dbopen(attempt, ipaddr_str); + + if (dbproc != NULL) { + dbclose(dbproc); + dbexit(); + hydra_report_found_host(port, ip, "mssql", fp); + hydra_completed_pair_found(); + if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) + return 2; + return 1; + } + + hydra_completed_pair(); + if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) + return 2; + + return 1; + + } + +#endif if (strlen(login) > MSLEN) login[MSLEN - 1] = 0; if (strlen(pass) > MSLEN) @@ -160,12 +190,14 @@ int32_t start_mssql(int32_t s, char *ip, int32_t port, unsigned char options, ch return 1; } -#endif - void service_mssql(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE *fp, int32_t port, char *hostname) { int32_t run = 1, next_run = 1, sock = -1; int32_t myport = PORT_MSSQL, mysslport = PORT_MSSQL_SSL; + #if defined(HAVE_SYBFRONT) && defined(HAVE_SYBDB) + dbinit(); + #endif + hydra_register_socket(sp); if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) return; From 1af16824144c17cc97517435d3ea99364b7a0d3b Mon Sep 17 00:00:00 2001 From: motypi Date: Mon, 24 Mar 2025 10:23:51 +0100 Subject: [PATCH 526/531] delete tds7 function and print warning --- hydra-mssql.c | 42 ++++-------------------------------------- 1 file changed, 4 insertions(+), 38 deletions(-) diff --git a/hydra-mssql.c b/hydra-mssql.c index 064486b..1133641 100644 --- a/hydra-mssql.c +++ b/hydra-mssql.c @@ -5,43 +5,6 @@ char *buf; #if defined(HAVE_SYBFRONT) && defined(HAVE_SYBDB) #include #include -int32_t start_mssql7(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE *fp) { - char *empty = ""; - char *login, *pass; - char *ipaddr_str = hydra_address2string(ip); - - if (strlen(login = hydra_get_next_login()) == 0) - login = empty; - if (strlen(pass = hydra_get_next_password()) == 0) - pass = empty; - - DBPROCESS *dbproc; - LOGINREC *attempt; - - attempt = dblogin(); - - DBSETLUSER(attempt, login); - DBSETLPWD(attempt, pass); - - // Connect without specifying a database - dbproc = dbopen(attempt, ipaddr_str); - - if (dbproc != NULL) { - dbclose(dbproc); - dbexit(); - hydra_report_found_host(port, ip, "mssql", fp); - hydra_completed_pair_found(); - if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) - return 2; - return 1; - } - - hydra_completed_pair(); - if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) - return 2; - - return 1; -} #endif #define MSLEN 30 @@ -138,7 +101,10 @@ int32_t start_mssql(int32_t s, char *ip, int32_t port, unsigned char options, ch return 1; } - +#else + if ((strlen(login) > MSLEN) || (strlen(pass) > MSLEN)){ + fprintf(stderr,"[WARNING] To crack credentials longer than 30 characters, install freetds and recompile\n"); + } #endif if (strlen(login) > MSLEN) login[MSLEN - 1] = 0; From 21262626e0d79e60421c3305366cd6e26927d310 Mon Sep 17 00:00:00 2001 From: iskanred Date: Tue, 1 Apr 2025 04:59:28 +0300 Subject: [PATCH 527/531] Fix typo in README: lenght --- README | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README b/README index 44cb585..1c7cf74 100644 --- a/README +++ b/README @@ -267,7 +267,7 @@ Examples: -x 1:3:a generate passwords from length 1 to 3 with all lowercase letters -x 2:5:/ generate passwords from length 2 to 5 containing only slashes -x 5:8:A1 generate passwords from length 5 to 8 with uppercase and numbers --x '3:3:aA1&~#\\ "\'<{([-|_^@)]=}>$%*?./§,;:!`' -v generates lenght 3 passwords with all 95 characters, and verbose. +-x '3:3:aA1&~#\\ "\'<{([-|_^@)]=}>$%*?./§,;:!`' -v generates length 3 passwords with all 95 characters, and verbose. ``` Example: From f80dc5aa023c911a2b8f7a5998ffe251118a0535 Mon Sep 17 00:00:00 2001 From: oss-belobog Date: Wed, 4 Jun 2025 00:54:30 +0800 Subject: [PATCH 528/531] fix several memory leaks --- hydra-ftp.c | 12 +++++++++--- 1 file changed, 9 insertions(+), 3 deletions(-) diff --git a/hydra-ftp.c b/hydra-ftp.c index 590d671..c6e256c 100644 --- a/hydra-ftp.c +++ b/hydra-ftp.c @@ -26,8 +26,10 @@ int32_t start_ftp(int32_t s, char *ip, int32_t port, unsigned char options, char if (verbose) printf("[INFO] user %s does not exist, skipping\n", login); hydra_completed_pair_skip(); - if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) + if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) { + free(buf); return 4; + } free(buf); return 1; } @@ -35,8 +37,10 @@ int32_t start_ftp(int32_t s, char *ip, int32_t port, unsigned char options, char if (buf[0] == '2') { hydra_report_found_host(port, ip, "ftp", fp); hydra_completed_pair_found(); - if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) + if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) { + free(buf); return 4; + } free(buf); return 1; } @@ -61,8 +65,10 @@ int32_t start_ftp(int32_t s, char *ip, int32_t port, unsigned char options, char if (buf[0] == '2') { hydra_report_found_host(port, ip, "ftp", fp); hydra_completed_pair_found(); - if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) + if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0) { + free(buf); return 4; + } free(buf); return 1; } From 5ddee91edc377ec9dc11105b5ef05f8e30fc48bd Mon Sep 17 00:00:00 2001 From: xh4vm Date: Sun, 29 Jun 2025 19:22:31 +0500 Subject: [PATCH 529/531] feat: pop3 capa fix --- hydra-pop3.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-pop3.c b/hydra-pop3.c index acd6c2e..3671a95 100644 --- a/hydra-pop3.c +++ b/hydra-pop3.c @@ -109,7 +109,7 @@ char *pop3_read_server_capacity(int32_t sock) { buf[strlen(buf) - 1] = 0; if (buf[strlen(buf) - 1] == '\r') buf[strlen(buf) - 1] = 0; - if (*(ptr) == '.' || *(ptr) == '-') + if (buf[strlen(buf) - 1] == '.' || *(ptr) == '.' || *(ptr) == '-') resp = 1; } } From cbd08d570275489b4b205c82878f835add924992 Mon Sep 17 00:00:00 2001 From: lhywk Date: Thu, 3 Jul 2025 05:07:27 +0000 Subject: [PATCH 530/531] Add NULL check after hydra_receive_line() in start_redis() --- hydra-redis.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/hydra-redis.c b/hydra-redis.c index 179007c..5a81cec 100644 --- a/hydra-redis.c +++ b/hydra-redis.c @@ -24,6 +24,11 @@ int32_t start_redis(int32_t s, char *ip, int32_t port, unsigned char options, ch return 1; } buf = hydra_receive_line(s); + if (buf == NULL) { + hydra_report(stderr, "[ERROR] Failed to receive response from Redis server.\n"); + return 3; + } + if (buf[0] == '+') { hydra_report_found_host(port, ip, "redis", fp); hydra_completed_pair_found(); From 7a7dd0375856a8fae6439142e4119082ddea6d36 Mon Sep 17 00:00:00 2001 From: Daniel Pimentel Date: Thu, 24 Jul 2025 19:33:19 -0300 Subject: [PATCH 531/531] fix spelling --- hydra-http-form.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hydra-http-form.c b/hydra-http-form.c index af2f457..7de90e3 100755 --- a/hydra-http-form.c +++ b/hydra-http-form.c @@ -1590,7 +1590,7 @@ void usage_http_form(const char *service) { " the sent/received data!\n" " Note that using invalid login condition checks can result in false positives!\n" "\nThe following parameters are optional and are put between the form parameters\n" - "and the condition string; seperate them too with colons:\n" + "and the condition string; separate them too with colons:\n" " 1= 401 error response is interpreted as user/pass wrong\n" " 2= 302 page forward return codes identify a successful attempt\n" " M= attack forms that use multipart format\n"