2015-11-04 11:52:13 +01:00
|
|
|
<?php
|
2017-11-02 15:43:41 +01:00
|
|
|
/* Functions for Networking */
|
|
|
|
|
2019-04-10 10:37:35 +02:00
|
|
|
function mask2cidr($mask)
|
|
|
|
{
|
|
|
|
$long = ip2long($mask);
|
|
|
|
$base = ip2long('255.255.255.255');
|
|
|
|
return 32-log(($long ^ $base)+1, 2);
|
2017-11-02 15:43:41 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Functions to write ini files */
|
|
|
|
|
2019-04-10 10:37:35 +02:00
|
|
|
function write_php_ini($array, $file)
|
|
|
|
{
|
2017-11-02 15:43:41 +01:00
|
|
|
$res = array();
|
2019-04-10 10:37:35 +02:00
|
|
|
foreach ($array as $key => $val) {
|
|
|
|
if (is_array($val)) {
|
2017-11-02 15:43:41 +01:00
|
|
|
$res[] = "[$key]";
|
2019-04-10 10:37:35 +02:00
|
|
|
foreach ($val as $skey => $sval) {
|
2019-05-01 00:57:12 +02:00
|
|
|
$res[] = "$skey = $sval";
|
2019-04-10 10:37:35 +02:00
|
|
|
}
|
|
|
|
} else {
|
2019-05-01 00:36:35 +02:00
|
|
|
$res[] = "$key = $val";
|
2017-11-02 15:43:41 +01:00
|
|
|
}
|
|
|
|
}
|
2019-05-01 00:18:44 +02:00
|
|
|
if (safefilerewrite($file, implode(PHP_EOL, $res))) {
|
2017-11-02 15:43:41 +01:00
|
|
|
return true;
|
|
|
|
} else {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-10 10:37:35 +02:00
|
|
|
function safefilerewrite($fileName, $dataToSave)
|
|
|
|
{
|
2017-11-02 15:43:41 +01:00
|
|
|
if ($fp = fopen($fileName, 'w')) {
|
2019-04-10 10:37:35 +02:00
|
|
|
$startTime = microtime(true);
|
2017-11-02 15:43:41 +01:00
|
|
|
do {
|
|
|
|
$canWrite = flock($fp, LOCK_EX);
|
|
|
|
// If lock not obtained sleep for 0 - 100 milliseconds, to avoid collision and CPU load
|
2019-04-10 10:37:35 +02:00
|
|
|
if (!$canWrite) {
|
|
|
|
usleep(round(rand(0, 100)*1000));
|
|
|
|
}
|
|
|
|
} while ((!$canWrite)and((microtime(true)-$startTime) < 5));
|
2017-11-02 15:43:41 +01:00
|
|
|
|
|
|
|
//file was locked so now we can store information
|
|
|
|
if ($canWrite) {
|
2019-05-01 00:57:12 +02:00
|
|
|
fwrite($fp, $dataToSave.PHP_EOL);
|
2017-11-02 15:43:41 +01:00
|
|
|
flock($fp, LOCK_UN);
|
|
|
|
}
|
|
|
|
fclose($fp);
|
|
|
|
return true;
|
|
|
|
} else {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-30 17:38:33 +02:00
|
|
|
/**
|
2020-02-15 18:57:46 +01:00
|
|
|
* Saves a CSRF token in the session
|
|
|
|
*/
|
2019-07-30 17:38:33 +02:00
|
|
|
function ensureCSRFSessionToken()
|
|
|
|
{
|
2019-08-19 04:12:37 +02:00
|
|
|
if (empty($_SESSION['csrf_token'])) {
|
|
|
|
$_SESSION['csrf_token'] = bin2hex(random_bytes(32));
|
|
|
|
}
|
2019-07-30 17:38:33 +02:00
|
|
|
}
|
|
|
|
|
2016-06-24 23:39:39 +02:00
|
|
|
/**
|
2020-02-15 18:57:46 +01:00
|
|
|
* Add CSRF Token to form
|
|
|
|
*/
|
2019-08-01 13:07:27 +02:00
|
|
|
function CSRFTokenFieldTag()
|
2019-04-10 10:37:35 +02:00
|
|
|
{
|
2019-08-01 13:01:03 +02:00
|
|
|
$token = htmlspecialchars($_SESSION['csrf_token']);
|
2019-08-01 13:11:07 +02:00
|
|
|
return '<input type="hidden" name="csrf_token" value="' . $token . '">';
|
2016-06-24 23:39:39 +02:00
|
|
|
}
|
|
|
|
|
2019-07-30 17:22:03 +02:00
|
|
|
/**
|
2020-02-15 18:57:46 +01:00
|
|
|
* Retuns a CSRF meta tag (for use with xhr, for example)
|
|
|
|
*/
|
2019-07-30 17:22:03 +02:00
|
|
|
function CSRFMetaTag()
|
|
|
|
{
|
|
|
|
$token = htmlspecialchars($_SESSION['csrf_token']);
|
|
|
|
return '<meta name="csrf_token" content="' . $token . '">';
|
|
|
|
}
|
|
|
|
|
2016-06-24 23:39:39 +02:00
|
|
|
/**
|
2020-02-15 18:57:46 +01:00
|
|
|
* Validate CSRF Token
|
|
|
|
*/
|
2019-04-10 10:37:35 +02:00
|
|
|
function CSRFValidate()
|
|
|
|
{
|
2019-07-30 17:28:03 +02:00
|
|
|
$post_token = $_POST['csrf_token'];
|
|
|
|
$header_token = $_SERVER['HTTP_X_CSRF_TOKEN'];
|
|
|
|
|
|
|
|
if (empty($post_token) && empty($header_token)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
$request_token = $post_token;
|
|
|
|
if (empty($post_token)) {
|
|
|
|
$request_token = $header_token;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (hash_equals($_SESSION['csrf_token'], $request_token)) {
|
2019-04-10 10:37:35 +02:00
|
|
|
return true;
|
|
|
|
} else {
|
|
|
|
error_log('CSRF violation');
|
|
|
|
return false;
|
|
|
|
}
|
2016-06-24 23:39:39 +02:00
|
|
|
}
|
|
|
|
|
2019-07-30 17:05:00 +02:00
|
|
|
/**
|
2020-02-15 18:57:46 +01:00
|
|
|
* Should the request be CSRF-validated?
|
|
|
|
*/
|
2019-07-30 17:05:00 +02:00
|
|
|
function csrfValidateRequest()
|
|
|
|
{
|
2019-09-07 17:42:31 +02:00
|
|
|
$request_method = strtolower($_SERVER['REQUEST_METHOD']);
|
|
|
|
return in_array($request_method, [ "post", "put", "patch", "delete" ]);
|
2019-07-30 17:05:00 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2020-02-15 18:57:46 +01:00
|
|
|
* Handle invalid CSRF
|
|
|
|
*/
|
2019-07-30 17:05:00 +02:00
|
|
|
function handleInvalidCSRFToken()
|
|
|
|
{
|
|
|
|
header('HTTP/1.1 500 Internal Server Error');
|
|
|
|
header('Content-Type: text/plain');
|
|
|
|
echo 'Invalid CSRF token';
|
|
|
|
exit;
|
|
|
|
}
|
|
|
|
|
2016-08-05 16:50:05 +02:00
|
|
|
/**
|
2020-02-15 18:57:46 +01:00
|
|
|
* Test whether array is associative
|
|
|
|
*/
|
2019-04-10 10:37:35 +02:00
|
|
|
function isAssoc($arr)
|
|
|
|
{
|
|
|
|
return array_keys($arr) !== range(0, count($arr) - 1);
|
2016-08-05 16:50:05 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2020-02-15 18:57:46 +01:00
|
|
|
* Display a selector field for a form. Arguments are:
|
|
|
|
*
|
|
|
|
* @param string $name: Field name
|
|
|
|
* @param array $options: Array of options
|
|
|
|
* @param string $selected: Selected option (optional)
|
|
|
|
* @param string $id: $options is an associative array this should be the key
|
|
|
|
* @param string $event: onChange event (optional)
|
|
|
|
* @param string $disabled (optional)
|
|
|
|
*/
|
2019-12-27 04:08:51 +01:00
|
|
|
function SelectorOptions($name, $options, $selected = null, $id = null, $event = null, $disabled = null)
|
2019-04-10 10:37:35 +02:00
|
|
|
{
|
|
|
|
echo '<select class="form-control" name="'.htmlspecialchars($name, ENT_QUOTES).'"';
|
|
|
|
if (isset($id)) {
|
|
|
|
echo ' id="' . htmlspecialchars($id, ENT_QUOTES) .'"';
|
2016-08-05 16:50:05 +02:00
|
|
|
}
|
2019-12-26 07:16:13 +01:00
|
|
|
if (isset($event)) {
|
|
|
|
echo ' onChange="' . htmlspecialchars($event, ENT_QUOTES).'()"';
|
|
|
|
}
|
2019-04-10 10:37:35 +02:00
|
|
|
echo '>' , PHP_EOL;
|
|
|
|
foreach ($options as $opt => $label) {
|
|
|
|
$select = '';
|
|
|
|
$key = isAssoc($options) ? $opt : $label;
|
|
|
|
if ($key == $selected) {
|
|
|
|
$select = ' selected="selected"';
|
|
|
|
}
|
2019-12-27 04:08:51 +01:00
|
|
|
if ($key == $disabled) {
|
|
|
|
$disabled = ' disabled';
|
|
|
|
}
|
|
|
|
echo '<option value="'.htmlspecialchars($key, ENT_QUOTES).'"'.$select.$disabled.'>'.
|
2018-08-16 14:48:47 +02:00
|
|
|
htmlspecialchars($label, ENT_QUOTES).'</option>' , PHP_EOL;
|
2019-04-10 10:37:35 +02:00
|
|
|
}
|
2018-08-04 01:58:34 +02:00
|
|
|
|
2019-04-10 10:37:35 +02:00
|
|
|
echo '</select>' , PHP_EOL;
|
2016-08-05 16:50:05 +02:00
|
|
|
}
|
|
|
|
|
2015-02-25 14:08:14 +01:00
|
|
|
/**
|
2020-02-15 18:57:46 +01:00
|
|
|
*
|
|
|
|
* @param string $input
|
|
|
|
* @param string $string
|
|
|
|
* @param int $offset
|
|
|
|
* @param string $separator
|
|
|
|
* @return $string
|
|
|
|
*/
|
2019-04-10 10:37:35 +02:00
|
|
|
function GetDistString($input, $string, $offset, $separator)
|
|
|
|
{
|
|
|
|
$string = substr($input, strpos($input, $string)+$offset, strpos(substr($input, strpos($input, $string)+$offset), $separator));
|
|
|
|
return $string;
|
2015-02-25 14:08:14 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2020-02-15 18:57:46 +01:00
|
|
|
*
|
|
|
|
* @param array $arrConfig
|
|
|
|
* @return $config
|
|
|
|
*/
|
2019-04-10 10:37:35 +02:00
|
|
|
function ParseConfig($arrConfig)
|
|
|
|
{
|
|
|
|
$config = array();
|
|
|
|
foreach ($arrConfig as $line) {
|
|
|
|
$line = trim($line);
|
2019-09-07 17:42:31 +02:00
|
|
|
if ($line == "" || $line[0] == "#") {
|
|
|
|
continue;
|
|
|
|
}
|
2019-08-01 16:31:11 +02:00
|
|
|
|
|
|
|
list($option, $value) = array_map("trim", explode("=", $line, 2));
|
|
|
|
|
|
|
|
if (empty($config[$option])) {
|
|
|
|
$config[$option] = $value ?: true;
|
|
|
|
} else {
|
|
|
|
if (!is_array($config[$option])) {
|
|
|
|
$config[$option] = [ $config[$option] ];
|
|
|
|
}
|
|
|
|
$config[$option][] = $value;
|
2019-04-10 10:37:35 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return $config;
|
2015-02-25 14:08:14 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2020-02-15 18:57:46 +01:00
|
|
|
*
|
|
|
|
* @param string $freq
|
|
|
|
* @return $channel
|
|
|
|
*/
|
2019-04-10 10:37:35 +02:00
|
|
|
function ConvertToChannel($freq)
|
|
|
|
{
|
|
|
|
if ($freq >= 2412 && $freq <= 2484) {
|
|
|
|
$channel = ($freq - 2407)/5;
|
|
|
|
} elseif ($freq >= 4915 && $freq <= 4980) {
|
|
|
|
$channel = ($freq - 4910)/5 + 182;
|
|
|
|
} elseif ($freq >= 5035 && $freq <= 5865) {
|
|
|
|
$channel = ($freq - 5030)/5 + 6;
|
|
|
|
} else {
|
|
|
|
$channel = -1;
|
|
|
|
}
|
|
|
|
if ($channel >= 1 && $channel <= 196) {
|
|
|
|
return $channel;
|
|
|
|
} else {
|
|
|
|
return 'Invalid Channel';
|
|
|
|
}
|
2015-02-25 14:08:14 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2020-02-15 18:57:46 +01:00
|
|
|
* Converts WPA security string to readable format
|
|
|
|
*
|
|
|
|
* @param string $security
|
|
|
|
* @return string
|
|
|
|
*/
|
2019-04-10 10:37:35 +02:00
|
|
|
function ConvertToSecurity($security)
|
|
|
|
{
|
|
|
|
$options = array();
|
|
|
|
preg_match_all('/\[([^\]]+)\]/s', $security, $matches);
|
|
|
|
foreach ($matches[1] as $match) {
|
|
|
|
if (preg_match('/^(WPA\d?)/', $match, $protocol_match)) {
|
|
|
|
$protocol = $protocol_match[1];
|
|
|
|
$matchArr = explode('-', $match);
|
|
|
|
if (count($matchArr) > 2) {
|
|
|
|
$options[] = htmlspecialchars($protocol . ' ('. $matchArr[2] .')', ENT_QUOTES);
|
|
|
|
} else {
|
|
|
|
$options[] = htmlspecialchars($protocol, ENT_QUOTES);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (count($options) === 0) {
|
|
|
|
// This could also be WEP but wpa_supplicant doesn't have a way to determine
|
|
|
|
// this.
|
|
|
|
// And you shouldn't be using WEP these days anyway.
|
|
|
|
return 'Open';
|
|
|
|
} else {
|
2019-10-15 22:07:21 +02:00
|
|
|
return implode(' / ', $options);
|
2016-08-12 19:29:56 +02:00
|
|
|
}
|
2015-02-25 14:08:14 +01:00
|
|
|
}
|
|
|
|
|
2019-08-08 02:10:40 +02:00
|
|
|
/**
|
|
|
|
* Renders a simple PHP template
|
|
|
|
*/
|
2020-03-06 16:54:48 +01:00
|
|
|
function renderTemplate($name, $__template_data = [])
|
2019-08-08 02:10:40 +02:00
|
|
|
{
|
2019-08-19 00:22:43 +02:00
|
|
|
$file = realpath(dirname(__FILE__) . "/../templates/$name.php");
|
2019-08-08 02:10:40 +02:00
|
|
|
if (!file_exists($file)) {
|
|
|
|
return "template $name ($file) not found";
|
|
|
|
}
|
|
|
|
|
2020-03-06 16:54:48 +01:00
|
|
|
if (is_array($__template_data)) {
|
|
|
|
extract($__template_data);
|
2019-08-08 02:10:40 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
ob_start();
|
|
|
|
include $file;
|
|
|
|
return ob_get_clean();
|
|
|
|
}
|
|
|
|
|
|
|
|
function expandCacheKey($key)
|
|
|
|
{
|
|
|
|
return RASPI_CACHE_PATH . "/" . $key;
|
|
|
|
}
|
|
|
|
|
|
|
|
function hasCache($key)
|
|
|
|
{
|
|
|
|
$cacheKey = expandCacheKey($key);
|
|
|
|
return file_exists($cacheKey);
|
|
|
|
}
|
|
|
|
|
|
|
|
function readCache($key)
|
|
|
|
{
|
|
|
|
$cacheKey = expandCacheKey($key);
|
|
|
|
if (!file_exists($cacheKey)) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
return file_get_contents($cacheKey);
|
|
|
|
}
|
|
|
|
|
|
|
|
function writeCache($key, $data)
|
|
|
|
{
|
|
|
|
mkdir(RASPI_CACHE_PATH, 0777, true);
|
|
|
|
$cacheKey = expandCacheKey($key);
|
|
|
|
file_put_contents($cacheKey, $data);
|
|
|
|
}
|
|
|
|
|
|
|
|
function deleteCache($key)
|
|
|
|
{
|
|
|
|
if (hasCache($key)) {
|
|
|
|
$cacheKey = expandCacheKey($key);
|
|
|
|
unlink($cacheKey);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
function cache($key, $callback)
|
|
|
|
{
|
|
|
|
if (hasCache($key)) {
|
|
|
|
return readCache($key);
|
|
|
|
} else {
|
|
|
|
$data = $callback();
|
|
|
|
writeCache($key, $data);
|
|
|
|
return $data;
|
|
|
|
}
|
|
|
|
}
|
2020-02-28 00:52:35 +01:00
|
|
|
|
|
|
|
// insspired by
|
|
|
|
// http://markushedlund.com/dev/php-escapeshellarg-with-unicodeutf-8-support
|
|
|
|
function mb_escapeshellarg($arg)
|
|
|
|
{
|
|
|
|
$isWindows = strtolower(substr(PHP_OS, 0, 3)) === 'win';
|
|
|
|
if ($isWindows) {
|
|
|
|
$escaped_arg = str_replace(array('"', '%'), '', $arg);
|
|
|
|
} else {
|
|
|
|
$escaped_arg = str_replace("'", "'\\''", $arg);
|
|
|
|
}
|
|
|
|
return "\"$escaped_arg\"";
|
|
|
|
}
|
|
|
|
|
2020-03-04 19:43:22 +01:00
|
|
|
function dnsServers()
|
|
|
|
{
|
|
|
|
$data = json_decode(file_get_contents("./config/dns-servers.json"));
|
|
|
|
return (array) $data;
|
|
|
|
}
|
|
|
|
|
2020-03-26 20:45:39 +01:00
|
|
|
function blocklistProviders()
|
|
|
|
{
|
|
|
|
$data = json_decode(file_get_contents("./config/blocklists.json"));
|
|
|
|
return (array) $data;
|
|
|
|
}
|
|
|
|
|
2020-03-04 19:43:22 +01:00
|
|
|
function optionsForSelect($options)
|
|
|
|
{
|
|
|
|
$html = "";
|
|
|
|
foreach ($options as $key => $value) {
|
|
|
|
// optgroup
|
|
|
|
if (is_array($value)) {
|
|
|
|
$html .= "<optgroup label=\"$key\">";
|
|
|
|
$html .= optionsForSelect($value);
|
|
|
|
$html .= "</optgroup>";
|
|
|
|
}
|
|
|
|
// option
|
|
|
|
else {
|
|
|
|
$key = is_int($key) ? $value : $key;
|
|
|
|
$html .= "<option value=\"$value\">$key</option>";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return $html;
|
|
|
|
}
|
2020-04-01 11:09:52 +02:00
|
|
|
|
|
|
|
function blocklistUpdated($file)
|
|
|
|
{
|
|
|
|
$blocklist = RASPI_CONFIG.'/adblock/'.$file;
|
|
|
|
if (file_exists($blocklist)) {
|
|
|
|
$lastModified = date ("F d Y H:i:s.", filemtime($blocklist));
|
|
|
|
$lastModified = formatDateAgo($lastModified);
|
|
|
|
return $lastModified;
|
|
|
|
} else {
|
|
|
|
return 'Never';
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
function formatDateAgo($datetime, $full = false)
|
|
|
|
{
|
|
|
|
$now = new DateTime;
|
|
|
|
$ago = new DateTime($datetime);
|
|
|
|
$diff = $now->diff($ago);
|
|
|
|
|
|
|
|
$diff->w = floor($diff->d / 7);
|
|
|
|
$diff->d -= $diff->w * 7;
|
|
|
|
|
|
|
|
$string = array(
|
|
|
|
'y' => 'year',
|
|
|
|
'm' => 'month',
|
|
|
|
'w' => 'week',
|
|
|
|
'd' => 'day',
|
|
|
|
'h' => 'hour',
|
|
|
|
'i' => 'minute',
|
|
|
|
's' => 'second',
|
|
|
|
);
|
|
|
|
foreach ($string as $k => &$v) {
|
|
|
|
if ($diff->$k) {
|
|
|
|
$v = $diff->$k . ' ' . $v . ($diff->$k > 1 ? 's' : '');
|
|
|
|
} else {
|
|
|
|
unset($string[$k]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!$full) $string = array_slice($string, 0, 1);
|
|
|
|
return $string ? implode(', ', $string) . ' ago' : 'just now';
|
|
|
|
}
|
2020-06-30 17:53:52 +02:00
|
|
|
|
|
|
|
function getThemeOpt()
|
|
|
|
{
|
|
|
|
if (!isset($_COOKIE['theme'])) {
|
|
|
|
$theme = "custom.php";
|
|
|
|
} else {
|
|
|
|
$theme = $_COOKIE['theme'];
|
|
|
|
}
|
|
|
|
return 'app/css/'.htmlspecialchars($theme, ENT_QUOTES);
|
|
|
|
}
|
|
|
|
|
2020-07-01 00:35:46 +02:00
|
|
|
function getColorOpt()
|
|
|
|
{
|
|
|
|
if (!isset($_COOKIE['color'])) {
|
|
|
|
$color = "#d8224c";
|
|
|
|
} else {
|
|
|
|
$color = $_COOKIE['color'];
|
|
|
|
}
|
|
|
|
return $color;
|
|
|
|
}
|
|
|
|
function getSidebarState()
|
|
|
|
{
|
|
|
|
if ($_COOKIE['sidebarToggled'] == 'true' ) {
|
|
|
|
return"toggled";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Returns bridged AP mode status
|
|
|
|
function getBridgedState()
|
|
|
|
{
|
|
|
|
$arrHostapdConf = parse_ini_file(RASPI_CONFIG.'/hostapd.ini');
|
|
|
|
// defaults to false
|
|
|
|
return $arrHostapdConf['BridgedEnable'];
|
|
|
|
}
|
|
|
|
|
2020-08-29 00:40:46 +02:00
|
|
|
/**
|
|
|
|
* Validates the format of a CIDR notation string
|
|
|
|
*
|
|
|
|
* @param string $cidr
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
function validateCidr($cidr)
|
|
|
|
{
|
|
|
|
$parts = explode('/', $cidr);
|
|
|
|
if(count($parts) != 2) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
$ip = $parts[0];
|
|
|
|
$netmask = intval($parts[1]);
|
|
|
|
|
|
|
|
if($netmask < 0) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if(filter_var($ip, FILTER_VALIDATE_IP, FILTER_FLAG_IPV4)) {
|
|
|
|
return $netmask <= 32;
|
|
|
|
}
|
|
|
|
if(filter_var($ip, FILTER_VALIDATE_IP, FILTER_FLAG_IPV6)) {
|
|
|
|
return $netmask <= 128;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|