1
.net下模拟不同身份登陆以获取不同权限
2
3
作者:佚名 时间:2004-04-16 09:14 出处:互连网 责编:chinaitpower
4
5
摘要:.net下模拟不同身份登陆以获取不同权限
6
7
8
不管是asp.net、web service还是window service,程序运行的时候只有本地计算机的部分权限,有时候需要更大的权限,比如读写某台服务器或域中的一台计算机上的文件等,这就需要更大的权限,比如域帐户权限。
9![](/Images/OutliningIndicators/None.gif)
10
通过获取不同身份的WindowsImpersonationContext对象,可以模拟不同用户登陆,请看我生成的NetworkSecurity类的
11
public static WindowsImpersonationContext ImpersonateUser(string strDomain,
12
string strLogin,
13![](/Images/OutliningIndicators/None.gif)
14
string strPwd,
15![](/Images/OutliningIndicators/None.gif)
16
LogonType logonType,
17![](/Images/OutliningIndicators/None.gif)
18
LogonProvider logonProvider);
19![](/Images/OutliningIndicators/None.gif)
20
附NetworkSecurity.cs源代码如下:
21![](/Images/OutliningIndicators/None.gif)
22
/*
23
* Author : TongWei
24
* Date : 2005-1-25
25
* Rights : China Netwave Inc.@2005
26
*/
27![](/Images/OutliningIndicators/None.gif)
28
using System;
29
using System.Runtime.InteropServices;
30
using System.Security.Principal;
31
using System.Security.Permissions;
32![](/Images/OutliningIndicators/None.gif)
33
namespace CNW.OMP.Common.Utility
34
{
35
public enum LogonType : int
36
{
37
/// <summary>
38
/// This logon type is intended for users who will be interactively using the computer, such as a user
39
/// being logged on by a terminal server, remote shell, or similar process. This logon type has the
40
/// additional expense of caching logon information for disconnected operation, and is therefore
41
/// inappropriate for some client/server applications, such as a mail server.
42
/// </summary>
43
LOGON32_LOGON_INTERACTIVE = 2,
44![](/Images/OutliningIndicators/InBlock.gif)
45
/// <summary>
46
/// This logon type is intended for high performance servers to authenticate clear text passwords.
47
/// The LogonUser function does not cache credentials for this logon type.
48
/// </summary>
49
LOGON32_LOGON_NETWORK = 3,
50![](/Images/OutliningIndicators/InBlock.gif)
51
/// <summary>
52
/// This logon type is intended for batch servers, where processes may be executing on behalf of a user
53
/// without their direct intervention; or for higher performance servers that process many clear-text
54
/// authentication attempts at a time, such as mail or web servers. The LogonUser function does not cache
55
/// credentials for this logon type.
56
/// </summary>
57
LOGON32_LOGON_BATCH = 4,
58![](/Images/OutliningIndicators/InBlock.gif)
59
/// <summary>
60
/// Indicates a service-type logon. The account provided must have the service privilege enabled.
61
/// </summary>
62
LOGON32_LOGON_SERVICE = 5,
63![](/Images/OutliningIndicators/InBlock.gif)
64
/// <summary>
65
/// This logon type is intended for GINA DLLs logging on users who will be interactively using the computer.
66
/// This logon type allows a unique audit record to be generated that shows when the workstation was unlocked.
67
/// </summary>
68
LOGON32_LOGON_UNLOCK = 7,
69![](/Images/OutliningIndicators/InBlock.gif)
70
/// <summary>
71
/// Windows XP/2000: This logon type preserves the name and password in the authentication packages,
72
/// allowing the server to make connections to other network servers while impersonating the client.
73
/// This allows a server to accept clear text credentials from a client, call LogonUser, verify that
74
/// the user can access the system across the network, and still communicate with other servers.
75
/// </summary>
76
LOGON32_LOGON_NETWORK_CLEARTEXT = 8,
77![](/Images/OutliningIndicators/InBlock.gif)
78
/// <summary>
79
/// Windows XP/2000: This logon type allows the caller to clone its current token and specify new credentials
80
/// for outbound connections. The new logon session has the same local identity, but uses different credentials
81
/// for other network connections.
82
/// This logon type is supported only by the LOGON32_PROVIDER_WINNT50 logon provider.
83
/// </summary>
84
LOGON32_LOGON_NEW_CREDENTIALS = 9
85
};
86![](/Images/OutliningIndicators/InBlock.gif)
87
public enum LogonProvider : int
88
{
89
/// <summary>
90
/// Use the standard logon provider for the system. The default security provider is NTLM.
91
/// Windows XP: The default provider is negotiate, unless you pass NULL for the domain name and
92
/// the user name is not in UPN format. In this case the default provider is NTLM.
93
/// </summary>
94
LOGON32_PROVIDER_DEFAULT = 0,
95![](/Images/OutliningIndicators/InBlock.gif)
96
/// <summary>
97
/// Use the Windows NT 3.5 logon provider.
98
/// </summary>
99
LOGON32_PROVIDER_WINNT35 = 1,
100![](/Images/OutliningIndicators/InBlock.gif)
101
/// <summary>
102
/// Use the NTLM logon provider.
103
/// </summary>
104
LOGON32_PROVIDER_WINNT40 = 2,
105![](/Images/OutliningIndicators/InBlock.gif)
106
/// <summary>
107
/// Windows XP/2000: Use the negotiate logon provider.
108
/// </summary>
109
LOGON32_PROVIDER_WINNT50 = 3
110
};
111![](/Images/OutliningIndicators/InBlock.gif)
112
class SecuUtil32
113
{
114
[DllImport("advapi32.dll", SetLastError=true)]
115
public static extern bool LogonUser(String lpszUsername, String lpszDomain, String lpszPassword,
116
int dwLogonType, int dwLogonProvider, ref IntPtr TokenHandle);
117![](/Images/OutliningIndicators/InBlock.gif)
118
[DllImport("kernel32.dll", CharSet=CharSet.Auto)]
119
public extern static bool CloseHandle(IntPtr handle);
120![](/Images/OutliningIndicators/InBlock.gif)
121
[DllImport("advapi32.dll", CharSet=CharSet.Auto, SetLastError=true)]
122
public extern static bool DuplicateToken(IntPtr ExistingTokenHandle,
123
int SECURITY_IMPERSONATION_LEVEL, ref IntPtr DuplicateTokenHandle);
124
}
125![](/Images/OutliningIndicators/InBlock.gif)
126
public class NetworkSecurity
127
{
128
public NetworkSecurity()
129
{
130
//
131
// TODO: Add constructor logic here
132
//
133
}
134![](/Images/OutliningIndicators/InBlock.gif)
135
/// <summary>
136
/// The ImpersonateUser function attempts to log a user on to the local computer.
137
/// The local computer is the computer from which ImpersonateUser was called.
138
/// You cannot use ImpersonateUser to log on to a remote computer.
139
/// You specify the user with a user name and domain, and authenticate the user with a clear-text password.
140
/// If the function succeeds, you receive a handle to a token that represents the logged-on user.
141
/// You can then use this token handle to impersonate the specified user, or in most cases,
142
/// to create a process running in the context of the specified user.
143
/// </summary>
144
/// <param name="strDomain">
145
/// specifies the name of the domain or server whose account database contains the strLogin account.
146
/// </param>
147
/// <param name="strLogin">specifies the name of the user.</param>
148
/// <param name="strPwd">specifies the clear-text password for the user account specified by strLogin.</param>
149
/// <param name="logonType">Specifies the type of logon operation to perform.</param>
150
/// <param name="logonProvider">Specifies the logon provider.</param>
151
/// <example>
152
/// //Add System.Security.dll
153
/// //using System.Security.Principal;
154
///
155
/// string strDomain=ConfigurationSettings.AppSettings["mSALoginDomainName"];
156
/// string strUser=ConfigurationSettings.AppSettings["mSALoginDomainUser"];
157
/// string strPassword=ConfigurationSettings.AppSettings["mSALoginDomainPassword"];
158
///
159
/// WindowsImpersonationContext impContext = null;
160
/// try
161
/// {
162
/// impContext = NetworkSecurity.ImpersonateUser(strDomain,strUser,strPassword,
163
/// LogonType.LOGON32_LOGON_SERVICE,
164
/// LogonProvider.LOGON32_PROVIDER_DEFAULT);
165
/// }
166
/// catch
167
/// {
168
///
169
/// }
170
///
171
/// //work under this logined user
172
///
173
/// impContext.Undo();
174
/// </example>
175
/// <returns>
176
/// </returns>
177
public static WindowsImpersonationContext ImpersonateUser(string strDomain,
178
string strLogin,
179
string strPwd,
180
LogonType logonType,
181
LogonProvider logonProvider)
182
{
183
// Initialize tokens
184
IntPtr tokenHandle = new IntPtr(0);
185
IntPtr dupeTokenHandle = new IntPtr(0);
186
tokenHandle = IntPtr.Zero;
187
dupeTokenHandle = IntPtr.Zero;
188![](/Images/OutliningIndicators/InBlock.gif)
189
// If domain name was blank, assume local machine
190
if (strDomain == "")
191
strDomain = System.Environment.MachineName;
192![](/Images/OutliningIndicators/InBlock.gif)
193
try
194
{
195
const int SecurityImpersonation = 2;
196![](/Images/OutliningIndicators/InBlock.gif)
197
// Call LogonUser to obtain a handle to an access token.
198
bool returnValue = SecuUtil32.LogonUser(
199
strLogin,
200
strDomain,
201
strPwd,
202
(int)logonType,
203
(int)logonProvider,
204
ref tokenHandle);
205![](/Images/OutliningIndicators/InBlock.gif)
206
// Did impersonation fail?
207
if (false == returnValue)
208
{
209
int ret = Marshal.GetLastWin32Error();
210
// Throw the exception show the reason why LogonUser failed
211
string strErr = String.Format("LogonUser failed with error code : {0}", ret);
212
throw new ApplicationException(strErr, null);
213
}
214![](/Images/OutliningIndicators/InBlock.gif)
215
// Get identity before impersonation
216
bool retVal = SecuUtil32.DuplicateToken(tokenHandle, SecurityImpersonation, ref dupeTokenHandle);
217![](/Images/OutliningIndicators/InBlock.gif)
218
// Did DuplicateToken fail?
219
if (false == retVal)
220
{
221
// Close existing handle
222
SecuUtil32.CloseHandle(tokenHandle);
223
// Throw the exception show the reason why DuplicateToken failed
224
throw new ApplicationException("Failed to duplicate token", null);
225
}
226![](/Images/OutliningIndicators/InBlock.gif)
227
// Create new identity using new primary token
228
// The token that is passed to the following constructor must
229
// be a primary token in order to use it for impersonation.
230
WindowsIdentity newId = new WindowsIdentity(dupeTokenHandle);
231
WindowsImpersonationContext impersonatedUser = newId.Impersonate();
232![](/Images/OutliningIndicators/InBlock.gif)
233
return impersonatedUser;
234
}
235
catch (Exception ex)
236
{
237
throw new ApplicationException(ex.Message, ex);
238
}
239
finally
240
{
241
// Close handle
242
if (tokenHandle != IntPtr.Zero)
243
SecuUtil32.CloseHandle(tokenHandle);
244
if (dupeTokenHandle != IntPtr.Zero)
245
SecuUtil32.CloseHandle(dupeTokenHandle);
246
}
247
}
248
}
249
}
250
251
252![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
2
![](/Images/OutliningIndicators/None.gif)
3
![](/Images/OutliningIndicators/None.gif)
4
![](/Images/OutliningIndicators/None.gif)
5
![](/Images/OutliningIndicators/None.gif)
6
![](/Images/OutliningIndicators/None.gif)
7
![](/Images/OutliningIndicators/None.gif)
8
![](/Images/OutliningIndicators/None.gif)
9
![](/Images/OutliningIndicators/None.gif)
10
![](/Images/OutliningIndicators/None.gif)
11
![](/Images/OutliningIndicators/None.gif)
12
![](/Images/OutliningIndicators/None.gif)
13
![](/Images/OutliningIndicators/None.gif)
14
![](/Images/OutliningIndicators/None.gif)
15
![](/Images/OutliningIndicators/None.gif)
16
![](/Images/OutliningIndicators/None.gif)
17
![](/Images/OutliningIndicators/None.gif)
18
![](/Images/OutliningIndicators/None.gif)
19
![](/Images/OutliningIndicators/None.gif)
20
![](/Images/OutliningIndicators/None.gif)
21
![](/Images/OutliningIndicators/None.gif)
22
![](/Images/OutliningIndicators/ExpandedBlockStart.gif)
23
![](/Images/OutliningIndicators/InBlock.gif)
24
![](/Images/OutliningIndicators/InBlock.gif)
25
![](/Images/OutliningIndicators/InBlock.gif)
26
![](/Images/OutliningIndicators/ExpandedBlockEnd.gif)
27
![](/Images/OutliningIndicators/None.gif)
28
![](/Images/OutliningIndicators/None.gif)
29
![](/Images/OutliningIndicators/None.gif)
30
![](/Images/OutliningIndicators/None.gif)
31
![](/Images/OutliningIndicators/None.gif)
32
![](/Images/OutliningIndicators/None.gif)
33
![](/Images/OutliningIndicators/None.gif)
34
![](/Images/OutliningIndicators/ExpandedBlockStart.gif)
35
![](/Images/OutliningIndicators/InBlock.gif)
36
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
37
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
38
![](/Images/OutliningIndicators/InBlock.gif)
39
![](/Images/OutliningIndicators/InBlock.gif)
40
![](/Images/OutliningIndicators/InBlock.gif)
41
![](/Images/OutliningIndicators/InBlock.gif)
42
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
43
![](/Images/OutliningIndicators/InBlock.gif)
44
![](/Images/OutliningIndicators/InBlock.gif)
45
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
46
![](/Images/OutliningIndicators/InBlock.gif)
47
![](/Images/OutliningIndicators/InBlock.gif)
48
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
49
![](/Images/OutliningIndicators/InBlock.gif)
50
![](/Images/OutliningIndicators/InBlock.gif)
51
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
52
![](/Images/OutliningIndicators/InBlock.gif)
53
![](/Images/OutliningIndicators/InBlock.gif)
54
![](/Images/OutliningIndicators/InBlock.gif)
55
![](/Images/OutliningIndicators/InBlock.gif)
56
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
57
![](/Images/OutliningIndicators/InBlock.gif)
58
![](/Images/OutliningIndicators/InBlock.gif)
59
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
60
![](/Images/OutliningIndicators/InBlock.gif)
61
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
62
![](/Images/OutliningIndicators/InBlock.gif)
63
![](/Images/OutliningIndicators/InBlock.gif)
64
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
65
![](/Images/OutliningIndicators/InBlock.gif)
66
![](/Images/OutliningIndicators/InBlock.gif)
67
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
68
![](/Images/OutliningIndicators/InBlock.gif)
69
![](/Images/OutliningIndicators/InBlock.gif)
70
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
71
![](/Images/OutliningIndicators/InBlock.gif)
72
![](/Images/OutliningIndicators/InBlock.gif)
73
![](/Images/OutliningIndicators/InBlock.gif)
74
![](/Images/OutliningIndicators/InBlock.gif)
75
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
76
![](/Images/OutliningIndicators/InBlock.gif)
77
![](/Images/OutliningIndicators/InBlock.gif)
78
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
79
![](/Images/OutliningIndicators/InBlock.gif)
80
![](/Images/OutliningIndicators/InBlock.gif)
81
![](/Images/OutliningIndicators/InBlock.gif)
82
![](/Images/OutliningIndicators/InBlock.gif)
83
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
84
![](/Images/OutliningIndicators/InBlock.gif)
85
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
86
![](/Images/OutliningIndicators/InBlock.gif)
87
![](/Images/OutliningIndicators/InBlock.gif)
88
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
89
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
90
![](/Images/OutliningIndicators/InBlock.gif)
91
![](/Images/OutliningIndicators/InBlock.gif)
92
![](/Images/OutliningIndicators/InBlock.gif)
93
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
94
![](/Images/OutliningIndicators/InBlock.gif)
95
![](/Images/OutliningIndicators/InBlock.gif)
96
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
97
![](/Images/OutliningIndicators/InBlock.gif)
98
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
99
![](/Images/OutliningIndicators/InBlock.gif)
100
![](/Images/OutliningIndicators/InBlock.gif)
101
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
102
![](/Images/OutliningIndicators/InBlock.gif)
103
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
104
![](/Images/OutliningIndicators/InBlock.gif)
105
![](/Images/OutliningIndicators/InBlock.gif)
106
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
107
![](/Images/OutliningIndicators/InBlock.gif)
108
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
109
![](/Images/OutliningIndicators/InBlock.gif)
110
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
111
![](/Images/OutliningIndicators/InBlock.gif)
112
![](/Images/OutliningIndicators/InBlock.gif)
113
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
114
![](/Images/OutliningIndicators/InBlock.gif)
115
![](/Images/OutliningIndicators/InBlock.gif)
116
![](/Images/OutliningIndicators/InBlock.gif)
117
![](/Images/OutliningIndicators/InBlock.gif)
118
![](/Images/OutliningIndicators/InBlock.gif)
119
![](/Images/OutliningIndicators/InBlock.gif)
120
![](/Images/OutliningIndicators/InBlock.gif)
121
![](/Images/OutliningIndicators/InBlock.gif)
122
![](/Images/OutliningIndicators/InBlock.gif)
123
![](/Images/OutliningIndicators/InBlock.gif)
124
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
125
![](/Images/OutliningIndicators/InBlock.gif)
126
![](/Images/OutliningIndicators/InBlock.gif)
127
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
128
![](/Images/OutliningIndicators/InBlock.gif)
129
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
130
![](/Images/OutliningIndicators/InBlock.gif)
131
![](/Images/OutliningIndicators/InBlock.gif)
132
![](/Images/OutliningIndicators/InBlock.gif)
133
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
134
![](/Images/OutliningIndicators/InBlock.gif)
135
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
136
![](/Images/OutliningIndicators/InBlock.gif)
137
![](/Images/OutliningIndicators/InBlock.gif)
138
![](/Images/OutliningIndicators/InBlock.gif)
139
![](/Images/OutliningIndicators/InBlock.gif)
140
![](/Images/OutliningIndicators/InBlock.gif)
141
![](/Images/OutliningIndicators/InBlock.gif)
142
![](/Images/OutliningIndicators/InBlock.gif)
143
![](/Images/OutliningIndicators/InBlock.gif)
144
![](/Images/OutliningIndicators/InBlock.gif)
145
![](/Images/OutliningIndicators/InBlock.gif)
146
![](/Images/OutliningIndicators/InBlock.gif)
147
![](/Images/OutliningIndicators/InBlock.gif)
148
![](/Images/OutliningIndicators/InBlock.gif)
149
![](/Images/OutliningIndicators/InBlock.gif)
150
![](/Images/OutliningIndicators/InBlock.gif)
151
![](/Images/OutliningIndicators/InBlock.gif)
152
![](/Images/OutliningIndicators/InBlock.gif)
153
![](/Images/OutliningIndicators/InBlock.gif)
154
![](/Images/OutliningIndicators/InBlock.gif)
155
![](/Images/OutliningIndicators/InBlock.gif)
156
![](/Images/OutliningIndicators/InBlock.gif)
157
![](/Images/OutliningIndicators/InBlock.gif)
158
![](/Images/OutliningIndicators/InBlock.gif)
159
![](/Images/OutliningIndicators/InBlock.gif)
160
![](/Images/OutliningIndicators/InBlock.gif)
161
![](/Images/OutliningIndicators/InBlock.gif)
162
![](/Images/OutliningIndicators/InBlock.gif)
163
![](/Images/OutliningIndicators/InBlock.gif)
164
![](/Images/OutliningIndicators/InBlock.gif)
165
![](/Images/OutliningIndicators/InBlock.gif)
166
![](/Images/OutliningIndicators/InBlock.gif)
167
![](/Images/OutliningIndicators/InBlock.gif)
168
![](/Images/OutliningIndicators/InBlock.gif)
169
![](/Images/OutliningIndicators/InBlock.gif)
170
![](/Images/OutliningIndicators/InBlock.gif)
171
![](/Images/OutliningIndicators/InBlock.gif)
172
![](/Images/OutliningIndicators/InBlock.gif)
173
![](/Images/OutliningIndicators/InBlock.gif)
174
![](/Images/OutliningIndicators/InBlock.gif)
175
![](/Images/OutliningIndicators/InBlock.gif)
176
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
177
![](/Images/OutliningIndicators/InBlock.gif)
178
![](/Images/OutliningIndicators/InBlock.gif)
179
![](/Images/OutliningIndicators/InBlock.gif)
180
![](/Images/OutliningIndicators/InBlock.gif)
181
![](/Images/OutliningIndicators/InBlock.gif)
182
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
183
![](/Images/OutliningIndicators/InBlock.gif)
184
![](/Images/OutliningIndicators/InBlock.gif)
185
![](/Images/OutliningIndicators/InBlock.gif)
186
![](/Images/OutliningIndicators/InBlock.gif)
187
![](/Images/OutliningIndicators/InBlock.gif)
188
![](/Images/OutliningIndicators/InBlock.gif)
189
![](/Images/OutliningIndicators/InBlock.gif)
190
![](/Images/OutliningIndicators/InBlock.gif)
191
![](/Images/OutliningIndicators/InBlock.gif)
192
![](/Images/OutliningIndicators/InBlock.gif)
193
![](/Images/OutliningIndicators/InBlock.gif)
194
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
195
![](/Images/OutliningIndicators/InBlock.gif)
196
![](/Images/OutliningIndicators/InBlock.gif)
197
![](/Images/OutliningIndicators/InBlock.gif)
198
![](/Images/OutliningIndicators/InBlock.gif)
199
![](/Images/OutliningIndicators/InBlock.gif)
200
![](/Images/OutliningIndicators/InBlock.gif)
201
![](/Images/OutliningIndicators/InBlock.gif)
202
![](/Images/OutliningIndicators/InBlock.gif)
203
![](/Images/OutliningIndicators/InBlock.gif)
204
![](/Images/OutliningIndicators/InBlock.gif)
205
![](/Images/OutliningIndicators/InBlock.gif)
206
![](/Images/OutliningIndicators/InBlock.gif)
207
![](/Images/OutliningIndicators/InBlock.gif)
208
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
209
![](/Images/OutliningIndicators/InBlock.gif)
210
![](/Images/OutliningIndicators/InBlock.gif)
211
![](/Images/OutliningIndicators/InBlock.gif)
212
![](/Images/OutliningIndicators/InBlock.gif)
213
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
214
![](/Images/OutliningIndicators/InBlock.gif)
215
![](/Images/OutliningIndicators/InBlock.gif)
216
![](/Images/OutliningIndicators/InBlock.gif)
217
![](/Images/OutliningIndicators/InBlock.gif)
218
![](/Images/OutliningIndicators/InBlock.gif)
219
![](/Images/OutliningIndicators/InBlock.gif)
220
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
221
![](/Images/OutliningIndicators/InBlock.gif)
222
![](/Images/OutliningIndicators/InBlock.gif)
223
![](/Images/OutliningIndicators/InBlock.gif)
224
![](/Images/OutliningIndicators/InBlock.gif)
225
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
226
![](/Images/OutliningIndicators/InBlock.gif)
227
![](/Images/OutliningIndicators/InBlock.gif)
228
![](/Images/OutliningIndicators/InBlock.gif)
229
![](/Images/OutliningIndicators/InBlock.gif)
230
![](/Images/OutliningIndicators/InBlock.gif)
231
![](/Images/OutliningIndicators/InBlock.gif)
232
![](/Images/OutliningIndicators/InBlock.gif)
233
![](/Images/OutliningIndicators/InBlock.gif)
234
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
235
![](/Images/OutliningIndicators/InBlock.gif)
236
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
237
![](/Images/OutliningIndicators/InBlock.gif)
238
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
239
![](/Images/OutliningIndicators/InBlock.gif)
240
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
241
![](/Images/OutliningIndicators/InBlock.gif)
242
![](/Images/OutliningIndicators/InBlock.gif)
243
![](/Images/OutliningIndicators/InBlock.gif)
244
![](/Images/OutliningIndicators/InBlock.gif)
245
![](/Images/OutliningIndicators/InBlock.gif)
246
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
247
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
248
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
249
![](/Images/OutliningIndicators/ExpandedBlockEnd.gif)
250
![](/Images/OutliningIndicators/None.gif)
251
![](/Images/OutliningIndicators/None.gif)
252
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/ExpandedBlockStart.gif)
![](/Images/OutliningIndicators/InBlock.gif)
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
![](/Images/OutliningIndicators/InBlock.gif)
![](/Images/OutliningIndicators/InBlock.gif)
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
![](/Images/OutliningIndicators/InBlock.gif)
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
![](/Images/OutliningIndicators/InBlock.gif)
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
![](/Images/OutliningIndicators/ExpandedBlockEnd.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/ExpandedBlockStart.gif)
![](/Images/OutliningIndicators/InBlock.gif)
![](/Images/OutliningIndicators/InBlock.gif)
![](/Images/OutliningIndicators/InBlock.gif)
![](/Images/OutliningIndicators/InBlock.gif)
![](/Images/OutliningIndicators/InBlock.gif)
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
![](/Images/OutliningIndicators/InBlock.gif)
![](/Images/OutliningIndicators/InBlock.gif)
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
![](/Images/OutliningIndicators/InBlock.gif)
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
![](/Images/OutliningIndicators/InBlock.gif)
![](/Images/OutliningIndicators/InBlock.gif)
![](/Images/OutliningIndicators/InBlock.gif)
![](/Images/OutliningIndicators/ExpandedSubBlockStart.gif)
![](/Images/OutliningIndicators/InBlock.gif)
![](/Images/OutliningIndicators/InBlock.gif)
![](/Images/OutliningIndicators/InBlock.gif)
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
![](/Images/OutliningIndicators/ExpandedSubBlockEnd.gif)
![](/Images/OutliningIndicators/InBlock.gif)
![](/Images/OutliningIndicators/InBlock.gif)
![](/Images/OutliningIndicators/InBlock.gif)
![](/Images/OutliningIndicators/InBlock.gif)
![](/Images/OutliningIndicators/InBlock.gif)
![](/Images/OutliningIndicators/ExpandedBlockEnd.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/None.gif)
![](/Images/OutliningIndicators/ExpandedBlockStart.gif)
![](/Images/OutliningIndicators/InBlock.gif)
![](/Images/OutliningIndicators/ExpandedBlockEnd.gif)
![](/Images/OutliningIndicators/None.gif)