summaryrefslogtreecommitdiff
path: root/source4/rpcclient/cmd_lsarpc.c
diff options
context:
space:
mode:
Diffstat (limited to 'source4/rpcclient/cmd_lsarpc.c')
-rw-r--r--source4/rpcclient/cmd_lsarpc.c760
1 files changed, 0 insertions, 760 deletions
diff --git a/source4/rpcclient/cmd_lsarpc.c b/source4/rpcclient/cmd_lsarpc.c
deleted file mode 100644
index fab6a89ed5..0000000000
--- a/source4/rpcclient/cmd_lsarpc.c
+++ /dev/null
@@ -1,760 +0,0 @@
-/*
- Unix SMB/CIFS implementation.
- RPC pipe client
-
- Copyright (C) Tim Potter 2000
- Copyright (C) Rafal Szczesniak 2002
-
- This program is free software; you can redistribute it and/or modify
- it under the terms of the GNU General Public License as published by
- the Free Software Foundation; either version 2 of the License, or
- (at your option) any later version.
-
- This program is distributed in the hope that it will be useful,
- but WITHOUT ANY WARRANTY; without even the implied warranty of
- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- GNU General Public License for more details.
-
- You should have received a copy of the GNU General Public License
- along with this program; if not, write to the Free Software
- Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
-*/
-
-#include "includes.h"
-#include "rpcclient.h"
-
-
-/* useful function to allow entering a name instead of a SID and
- * looking it up automatically */
-static NTSTATUS name_to_sid(struct cli_state *cli,
- TALLOC_CTX *mem_ctx,
- DOM_SID *sid, const char *name)
-{
- POLICY_HND pol;
- uint32 *sid_types;
- NTSTATUS result;
- DOM_SID *sids;
-
- /* maybe its a raw SID */
- if (strncmp(name, "S-", 2) == 0 &&
- string_to_sid(sid, name)) {
- return NT_STATUS_OK;
- }
-
- result = cli_lsa_open_policy(cli, mem_ctx, True,
- SEC_RIGHTS_MAXIMUM_ALLOWED,
- &pol);
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- result = cli_lsa_lookup_names(cli, mem_ctx, &pol, 1, &name, &sids, &sid_types);
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- cli_lsa_close(cli, mem_ctx, &pol);
-
- *sid = sids[0];
-
-done:
- return result;
-}
-
-
-/* Look up domain related information on a remote host */
-
-static NTSTATUS cmd_lsa_query_info_policy(struct cli_state *cli,
- TALLOC_CTX *mem_ctx, int argc,
- const char **argv)
-{
- POLICY_HND pol;
- NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
- DOM_SID dom_sid;
- GUID dom_guid;
- fstring sid_str, domain_name="", dns_name="", forest_name="";
- uint32 info_class = 3;
-
- if (argc > 2) {
- printf("Usage: %s [info_class]\n", argv[0]);
- return NT_STATUS_OK;
- }
-
- if (argc == 2)
- info_class = atoi(argv[1]);
-
- /* Lookup info policy */
- switch (info_class) {
- case 12:
- result = cli_lsa_open_policy2(cli, mem_ctx, True,
- SEC_RIGHTS_MAXIMUM_ALLOWED,
- &pol);
-
- if (!NT_STATUS_IS_OK(result))
- goto done;
- result = cli_lsa_query_info_policy2(cli, mem_ctx, &pol,
- info_class, domain_name,
- dns_name, forest_name,
- &dom_guid, &dom_sid);
- break;
- default:
- result = cli_lsa_open_policy(cli, mem_ctx, True,
- SEC_RIGHTS_MAXIMUM_ALLOWED,
- &pol);
-
- if (!NT_STATUS_IS_OK(result))
- goto done;
- result = cli_lsa_query_info_policy(cli, mem_ctx, &pol,
- info_class, domain_name,
- &dom_sid);
- }
-
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- sid_to_string(sid_str, &dom_sid);
-
- if (domain_name[0])
- printf("domain %s has sid %s\n", domain_name, sid_str);
- else
- printf("could not query info for level %d\n", info_class);
-
- if (dns_name[0])
- printf("domain dns name is %s\n", dns_name);
- if (forest_name[0])
- printf("forest name is %s\n", forest_name);
-
- if (info_class == 12) {
- printf("domain GUID is ");
- print_guid(&dom_guid);
- }
- done:
- return result;
-}
-
-/* Resolve a list of names to a list of sids */
-
-static NTSTATUS cmd_lsa_lookup_names(struct cli_state *cli,
- TALLOC_CTX *mem_ctx, int argc,
- const char **argv)
-{
- POLICY_HND pol;
- NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
- DOM_SID *sids;
- uint32 *types;
- int i;
-
- if (argc == 1) {
- printf("Usage: %s [name1 [name2 [...]]]\n", argv[0]);
- return NT_STATUS_OK;
- }
-
- result = cli_lsa_open_policy(cli, mem_ctx, True,
- SEC_RIGHTS_MAXIMUM_ALLOWED,
- &pol);
-
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- result = cli_lsa_lookup_names(cli, mem_ctx, &pol, argc - 1,
- (const char**)(argv + 1), &sids, &types);
-
- if (!NT_STATUS_IS_OK(result) && NT_STATUS_V(result) !=
- NT_STATUS_V(STATUS_SOME_UNMAPPED))
- goto done;
-
- result = NT_STATUS_OK;
-
- /* Print results */
-
- for (i = 0; i < (argc - 1); i++) {
- fstring sid_str;
- sid_to_string(sid_str, &sids[i]);
- printf("%s %s (%s: %d)\n", argv[i + 1], sid_str,
- sid_type_lookup(types[i]), types[i]);
- }
-
- done:
- return result;
-}
-
-/* Resolve a list of SIDs to a list of names */
-
-static NTSTATUS cmd_lsa_lookup_sids(struct cli_state *cli, TALLOC_CTX *mem_ctx,
- int argc, const char **argv)
-{
- POLICY_HND pol;
- NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
- DOM_SID *sids;
- char **domains;
- char **names;
- uint32 *types;
- int i;
-
- if (argc == 1) {
- printf("Usage: %s [sid1 [sid2 [...]]]\n", argv[0]);
- return NT_STATUS_OK;
- }
-
- result = cli_lsa_open_policy(cli, mem_ctx, True,
- SEC_RIGHTS_MAXIMUM_ALLOWED,
- &pol);
-
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- /* Convert arguments to sids */
-
- sids = (DOM_SID *)talloc(mem_ctx, sizeof(DOM_SID) * (argc - 1));
-
- if (!sids) {
- printf("could not allocate memory for %d sids\n", argc - 1);
- goto done;
- }
-
- for (i = 0; i < argc - 1; i++)
- if (!string_to_sid(&sids[i], argv[i + 1])) {
- result = NT_STATUS_INVALID_SID;
- goto done;
- }
-
- /* Lookup the SIDs */
-
- result = cli_lsa_lookup_sids(cli, mem_ctx, &pol, argc - 1, sids,
- &domains, &names, &types);
-
- if (!NT_STATUS_IS_OK(result) && NT_STATUS_V(result) !=
- NT_STATUS_V(STATUS_SOME_UNMAPPED))
- goto done;
-
- result = NT_STATUS_OK;
-
- /* Print results */
-
- for (i = 0; i < (argc - 1); i++) {
- fstring sid_str;
-
- sid_to_string(sid_str, &sids[i]);
- printf("%s %s\\%s (%d)\n", sid_str,
- domains[i] ? domains[i] : "*unknown*",
- names[i] ? names[i] : "*unknown*", types[i]);
- }
-
- done:
- return result;
-}
-
-/* Enumerate list of trusted domains */
-
-static NTSTATUS cmd_lsa_enum_trust_dom(struct cli_state *cli,
- TALLOC_CTX *mem_ctx, int argc,
- const char **argv)
-{
- POLICY_HND pol;
- NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
- DOM_SID *domain_sids;
- char **domain_names;
-
- /* defaults, but may be changed using params */
- uint32 enum_ctx = 0;
- uint32 num_domains = 0;
- int i;
-
- if (argc > 2) {
- printf("Usage: %s [enum context (0)]\n", argv[0]);
- return NT_STATUS_OK;
- }
-
- if (argc == 2 && argv[1]) {
- enum_ctx = atoi(argv[2]);
- }
-
- result = cli_lsa_open_policy(cli, mem_ctx, True,
- POLICY_VIEW_LOCAL_INFORMATION,
- &pol);
-
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- /* Lookup list of trusted domains */
-
- result = cli_lsa_enum_trust_dom(cli, mem_ctx, &pol, &enum_ctx,
- &num_domains,
- &domain_names, &domain_sids);
- if (!NT_STATUS_IS_OK(result) &&
- !NT_STATUS_EQUAL(result, NT_STATUS_NO_MORE_ENTRIES) &&
- !NT_STATUS_EQUAL(result, STATUS_MORE_ENTRIES))
- goto done;
-
- /* Print results: list of names and sids returned in this response. */
- for (i = 0; i < num_domains; i++) {
- fstring sid_str;
-
- sid_to_string(sid_str, &domain_sids[i]);
- printf("%s %s\n", domain_names[i] ? domain_names[i] :
- "*unknown*", sid_str);
- }
-
- done:
- return result;
-}
-
-/* Enumerates privileges */
-
-static NTSTATUS cmd_lsa_enum_privilege(struct cli_state *cli,
- TALLOC_CTX *mem_ctx, int argc,
- const char **argv)
-{
- POLICY_HND pol;
- NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
-
- uint32 enum_context=0;
- uint32 pref_max_length=0x1000;
- uint32 count=0;
- char **privs_name;
- uint32 *privs_high;
- uint32 *privs_low;
- int i;
-
- if (argc > 3) {
- printf("Usage: %s [enum context] [max length]\n", argv[0]);
- return NT_STATUS_OK;
- }
-
- if (argc>=2)
- enum_context=atoi(argv[1]);
-
- if (argc==3)
- pref_max_length=atoi(argv[2]);
-
- result = cli_lsa_open_policy(cli, mem_ctx, True,
- SEC_RIGHTS_MAXIMUM_ALLOWED,
- &pol);
-
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- result = cli_lsa_enum_privilege(cli, mem_ctx, &pol, &enum_context, pref_max_length,
- &count, &privs_name, &privs_high, &privs_low);
-
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- /* Print results */
- printf("found %d privileges\n\n", count);
-
- for (i = 0; i < count; i++) {
- printf("%s \t\t%d:%d (0x%x:0x%x)\n", privs_name[i] ? privs_name[i] : "*unknown*",
- privs_high[i], privs_low[i], privs_high[i], privs_low[i]);
- }
-
- done:
- return result;
-}
-
-/* Get privilege name */
-
-static NTSTATUS cmd_lsa_get_dispname(struct cli_state *cli,
- TALLOC_CTX *mem_ctx, int argc,
- const char **argv)
-{
- POLICY_HND pol;
- NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
-
- uint16 lang_id=0;
- uint16 lang_id_sys=0;
- uint16 lang_id_desc;
- fstring description;
-
- if (argc != 2) {
- printf("Usage: %s privilege name\n", argv[0]);
- return NT_STATUS_OK;
- }
-
- result = cli_lsa_open_policy(cli, mem_ctx, True,
- SEC_RIGHTS_MAXIMUM_ALLOWED,
- &pol);
-
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- result = cli_lsa_get_dispname(cli, mem_ctx, &pol, argv[1], lang_id, lang_id_sys, description, &lang_id_desc);
-
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- /* Print results */
- printf("%s -> %s (language: 0x%x)\n", argv[1], description, lang_id_desc);
-
- done:
- return result;
-}
-
-/* Enumerate the LSA SIDS */
-
-static NTSTATUS cmd_lsa_enum_sids(struct cli_state *cli,
- TALLOC_CTX *mem_ctx, int argc,
- const char **argv)
-{
- POLICY_HND pol;
- NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
-
- uint32 enum_context=0;
- uint32 pref_max_length=0x1000;
- DOM_SID *sids;
- uint32 count=0;
- int i;
-
- if (argc > 3) {
- printf("Usage: %s [enum context] [max length]\n", argv[0]);
- return NT_STATUS_OK;
- }
-
- if (argc>=2)
- enum_context=atoi(argv[1]);
-
- if (argc==3)
- pref_max_length=atoi(argv[2]);
-
- result = cli_lsa_open_policy(cli, mem_ctx, True,
- SEC_RIGHTS_MAXIMUM_ALLOWED,
- &pol);
-
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- result = cli_lsa_enum_sids(cli, mem_ctx, &pol, &enum_context, pref_max_length,
- &count, &sids);
-
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- /* Print results */
- printf("found %d SIDs\n\n", count);
-
- for (i = 0; i < count; i++) {
- fstring sid_str;
-
- sid_to_string(sid_str, &sids[i]);
- printf("%s\n", sid_str);
- }
-
- done:
- return result;
-}
-
-/* Enumerate the privileges of an SID */
-
-static NTSTATUS cmd_lsa_enum_privsaccounts(struct cli_state *cli,
- TALLOC_CTX *mem_ctx, int argc,
- const char **argv)
-{
- POLICY_HND dom_pol;
- POLICY_HND user_pol;
- NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
- uint32 access_desired = 0x000f000f;
-
- DOM_SID sid;
- uint32 count=0;
- LUID_ATTR *set;
- int i;
-
- if (argc != 2 ) {
- printf("Usage: %s SID\n", argv[0]);
- return NT_STATUS_OK;
- }
-
- result = name_to_sid(cli, mem_ctx, &sid, argv[1]);
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- result = cli_lsa_open_policy2(cli, mem_ctx, True,
- SEC_RIGHTS_MAXIMUM_ALLOWED,
- &dom_pol);
-
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- result = cli_lsa_open_account(cli, mem_ctx, &dom_pol, &sid, access_desired, &user_pol);
-
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- result = cli_lsa_enum_privsaccount(cli, mem_ctx, &user_pol, &count, &set);
-
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- /* Print results */
- printf("found %d privileges for SID %s\n\n", count, argv[1]);
- printf("high\tlow\tattribute\n");
-
- for (i = 0; i < count; i++) {
- printf("%u\t%u\t%u\n", set[i].luid.high, set[i].luid.low, set[i].attr);
- }
-
- done:
- return result;
-}
-
-
-/* Enumerate the privileges of an SID via LsaEnumerateAccountRights */
-
-static NTSTATUS cmd_lsa_enum_acct_rights(struct cli_state *cli,
- TALLOC_CTX *mem_ctx, int argc,
- const char **argv)
-{
- POLICY_HND dom_pol;
- NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
-
- DOM_SID sid;
- uint32 count;
- char **rights;
-
- int i;
-
- if (argc != 2 ) {
- printf("Usage: %s SID\n", argv[0]);
- return NT_STATUS_OK;
- }
-
- result = name_to_sid(cli, mem_ctx, &sid, argv[1]);
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- result = cli_lsa_open_policy2(cli, mem_ctx, True,
- SEC_RIGHTS_MAXIMUM_ALLOWED,
- &dom_pol);
-
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- result = cli_lsa_enum_account_rights(cli, mem_ctx, &dom_pol, sid, &count, &rights);
-
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- printf("found %d privileges for SID %s\n", count, sid_string_static(&sid));
-
- for (i = 0; i < count; i++) {
- printf("\t%s\n", rights[i]);
- }
-
- done:
- return result;
-}
-
-
-/* Enumerate the accounts with a specific right */
-
-static NTSTATUS cmd_lsa_enum_acct_with_right(struct cli_state *cli,
- TALLOC_CTX *mem_ctx, int argc,
- const char **argv)
-{
- POLICY_HND dom_pol;
- NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
- DOM_SID *sids;
- uint32 count;
- const char *right;
-
- int i;
-
- if (argc != 2 ) {
- printf("Usage: %s <RIGHT>\n", argv[0]);
- return NT_STATUS_OK;
- }
-
- right = argv[1];
-
- result = cli_lsa_open_policy2(cli, mem_ctx, True,
- SEC_RIGHTS_MAXIMUM_ALLOWED,
- &dom_pol);
-
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- result = cli_lsa_enum_account_with_right(cli, mem_ctx, &dom_pol, right, &count, &sids);
-
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- printf("found %d SIDs for '%s'\n", count, right);
-
- for (i = 0; i < count; i++) {
- printf("\t%s\n", sid_string_static(&sids[i]));
- }
-
- done:
- return result;
-}
-
-
-/* add some privileges to a SID via LsaAddAccountRights */
-
-static NTSTATUS cmd_lsa_add_acct_rights(struct cli_state *cli,
- TALLOC_CTX *mem_ctx, int argc,
- const char **argv)
-{
- POLICY_HND dom_pol;
- NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
-
- DOM_SID sid;
-
- if (argc < 3 ) {
- printf("Usage: %s SID [rights...]\n", argv[0]);
- return NT_STATUS_OK;
- }
-
- result = name_to_sid(cli, mem_ctx, &sid, argv[1]);
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- result = cli_lsa_open_policy2(cli, mem_ctx, True,
- SEC_RIGHTS_MAXIMUM_ALLOWED,
- &dom_pol);
-
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- result = cli_lsa_add_account_rights(cli, mem_ctx, &dom_pol, sid,
- argc-2, argv+2);
-
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- done:
- return result;
-}
-
-
-/* remove some privileges to a SID via LsaRemoveAccountRights */
-
-static NTSTATUS cmd_lsa_remove_acct_rights(struct cli_state *cli,
- TALLOC_CTX *mem_ctx, int argc,
- const char **argv)
-{
- POLICY_HND dom_pol;
- NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
-
- DOM_SID sid;
-
- if (argc < 3 ) {
- printf("Usage: %s SID [rights...]\n", argv[0]);
- return NT_STATUS_OK;
- }
-
- result = name_to_sid(cli, mem_ctx, &sid, argv[1]);
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- result = cli_lsa_open_policy2(cli, mem_ctx, True,
- SEC_RIGHTS_MAXIMUM_ALLOWED,
- &dom_pol);
-
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- result = cli_lsa_remove_account_rights(cli, mem_ctx, &dom_pol, sid,
- False, argc-2, argv+2);
-
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- done:
- return result;
-}
-
-
-/* Get a privilege value given its name */
-
-static NTSTATUS cmd_lsa_lookupprivvalue(struct cli_state *cli,
- TALLOC_CTX *mem_ctx, int argc,
- const char **argv)
-{
- POLICY_HND pol;
- NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
- LUID luid;
-
- if (argc != 2 ) {
- printf("Usage: %s name\n", argv[0]);
- return NT_STATUS_OK;
- }
-
- result = cli_lsa_open_policy2(cli, mem_ctx, True,
- SEC_RIGHTS_MAXIMUM_ALLOWED,
- &pol);
-
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- result = cli_lsa_lookupprivvalue(cli, mem_ctx, &pol, argv[1], &luid);
-
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- /* Print results */
-
- printf("%u:%u (0x%x:0x%x)\n", luid.high, luid.low, luid.high, luid.low);
-
- done:
- return result;
-}
-
-/* Query LSA security object */
-
-static NTSTATUS cmd_lsa_query_secobj(struct cli_state *cli,
- TALLOC_CTX *mem_ctx, int argc,
- const char **argv)
-{
- POLICY_HND pol;
- NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
- SEC_DESC_BUF *sdb;
- uint32 sec_info = 0x00000004; /* ??? */
-
- if (argc != 1 ) {
- printf("Usage: %s\n", argv[0]);
- return NT_STATUS_OK;
- }
-
- result = cli_lsa_open_policy2(cli, mem_ctx, True,
- SEC_RIGHTS_MAXIMUM_ALLOWED,
- &pol);
-
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- result = cli_lsa_query_secobj(cli, mem_ctx, &pol, sec_info, &sdb);
-
- if (!NT_STATUS_IS_OK(result))
- goto done;
-
- /* Print results */
-
- display_sec_desc(sdb->sec);
-
- done:
- return result;
-}
-
-
-/* List of commands exported by this module */
-
-struct cmd_set lsarpc_commands[] = {
-
- { "LSARPC" },
-
- { "lsaquery", cmd_lsa_query_info_policy, PI_LSARPC, "Query info policy", "" },
- { "lookupsids", cmd_lsa_lookup_sids, PI_LSARPC, "Convert SIDs to names", "" },
- { "lookupnames", cmd_lsa_lookup_names, PI_LSARPC, "Convert names to SIDs", "" },
- { "enumtrust", cmd_lsa_enum_trust_dom, PI_LSARPC, "Enumerate trusted domains", "Usage: [preferred max number] [enum context (0)]" },
- { "enumprivs", cmd_lsa_enum_privilege, PI_LSARPC, "Enumerate privileges", "" },
- { "getdispname", cmd_lsa_get_dispname, PI_LSARPC, "Get the privilege name", "" },
- { "lsaenumsid", cmd_lsa_enum_sids, PI_LSARPC, "Enumerate the LSA SIDS", "" },
- { "lsaenumprivsaccount", cmd_lsa_enum_privsaccounts, PI_LSARPC, "Enumerate the privileges of an SID", "" },
- { "lsaenumacctrights", cmd_lsa_enum_acct_rights, PI_LSARPC, "Enumerate the rights of an SID", "" },
- { "lsaenumacctwithright",cmd_lsa_enum_acct_with_right,PI_LSARPC,"Enumerate accounts with a right", "" },
- { "lsaaddacctrights", cmd_lsa_add_acct_rights, PI_LSARPC, "Add rights to an account", "" },
- { "lsaremoveacctrights", cmd_lsa_remove_acct_rights, PI_LSARPC, "Remove rights from an account", "" },
- { "lsalookupprivvalue", cmd_lsa_lookupprivvalue, PI_LSARPC, "Get a privilege value given its name", "" },
- { "lsaquerysecobj", cmd_lsa_query_secobj, PI_LSARPC, "Query LSA security object", "" },
-
- { NULL }
-};