Home | History | Annotate | Line # | Download | only in routed
input.c revision 1.15
      1  1.15  christos /*	$NetBSD: input.c,v 1.15 1995/06/20 22:27:50 christos Exp $	*/
      2   1.9       cgd 
      3   1.1       cgd /*
      4   1.5   mycroft  * Copyright (c) 1983, 1988, 1993
      5   1.5   mycroft  *	The Regents of the University of California.  All rights reserved.
      6   1.1       cgd  *
      7   1.1       cgd  * Redistribution and use in source and binary forms, with or without
      8   1.1       cgd  * modification, are permitted provided that the following conditions
      9   1.1       cgd  * are met:
     10   1.1       cgd  * 1. Redistributions of source code must retain the above copyright
     11   1.1       cgd  *    notice, this list of conditions and the following disclaimer.
     12   1.1       cgd  * 2. Redistributions in binary form must reproduce the above copyright
     13   1.1       cgd  *    notice, this list of conditions and the following disclaimer in the
     14   1.1       cgd  *    documentation and/or other materials provided with the distribution.
     15   1.1       cgd  * 3. All advertising materials mentioning features or use of this software
     16   1.1       cgd  *    must display the following acknowledgement:
     17   1.1       cgd  *	This product includes software developed by the University of
     18   1.1       cgd  *	California, Berkeley and its contributors.
     19   1.1       cgd  * 4. Neither the name of the University nor the names of its contributors
     20   1.1       cgd  *    may be used to endorse or promote products derived from this software
     21   1.1       cgd  *    without specific prior written permission.
     22   1.1       cgd  *
     23   1.1       cgd  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     24   1.1       cgd  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     25   1.1       cgd  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     26   1.1       cgd  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     27   1.1       cgd  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     28   1.1       cgd  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     29   1.1       cgd  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     30   1.1       cgd  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     31   1.1       cgd  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     32   1.1       cgd  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     33   1.1       cgd  * SUCH DAMAGE.
     34   1.1       cgd  */
     35   1.1       cgd 
     36   1.1       cgd #ifndef lint
     37   1.9       cgd #if 0
     38   1.9       cgd static char sccsid[] = "@(#)input.c	8.1 (Berkeley) 6/5/93";
     39   1.9       cgd #else
     40  1.15  christos static char rcsid[] = "$NetBSD: input.c,v 1.15 1995/06/20 22:27:50 christos Exp $";
     41   1.9       cgd #endif
     42   1.1       cgd #endif /* not lint */
     43   1.1       cgd 
     44   1.1       cgd /*
     45   1.1       cgd  * Routing Table Management Daemon
     46   1.1       cgd  */
     47   1.1       cgd #include "defs.h"
     48  1.14       jtc #include <syslog.h>
     49   1.1       cgd 
     50  1.15  christos 
     51  1.15  christos /*
     52  1.15  christos  * "Authenticate" router from which message originated.
     53  1.15  christos  * We accept routing packets from routers directly connected
     54  1.15  christos  * via broadcast or point-to-point networks,
     55  1.15  christos  * and from those listed in /etc/gateways.
     56  1.15  christos  */
     57  1.15  christos static struct interface *
     58  1.15  christos rip_verify(from)
     59  1.15  christos 	struct sockaddr *from;
     60  1.15  christos {
     61  1.15  christos 	struct interface *ifp;
     62  1.15  christos 	char buf[256];
     63  1.15  christos 
     64  1.15  christos 	if ((ifp = if_iflookup(from)) == 0) {
     65  1.15  christos 		syslog(LOG_ERR, "trace command from unknown router, %s",
     66  1.15  christos 		       (*afswitch[from->sa_family].af_format)(from, buf,
     67  1.15  christos 							      sizeof(buf)));
     68  1.15  christos 		return NULL;
     69  1.15  christos 	}
     70  1.15  christos 
     71  1.15  christos 	if ((ifp->int_flags &
     72  1.15  christos 		(IFF_BROADCAST|IFF_POINTOPOINT|IFF_REMOTE)) == 0) {
     73  1.15  christos 		syslog(LOG_ERR,
     74  1.15  christos 		       "trace command from router %s, with bad flags %x",
     75  1.15  christos 		       (*afswitch[from->sa_family].af_format)(from, buf,
     76  1.15  christos 							      sizeof(buf)),
     77  1.15  christos 		       ifp->int_flags);
     78  1.15  christos 		return NULL;
     79  1.15  christos 	}
     80  1.15  christos 
     81  1.15  christos 	if ((ifp->int_flags & IFF_PASSIVE) != 0) {
     82  1.15  christos 		syslog(LOG_ERR,
     83  1.15  christos 		       "trace command from %s on an active interface",
     84  1.15  christos 		       (*afswitch[from->sa_family].af_format)(from, buf,
     85  1.15  christos 							      sizeof(buf)));
     86  1.15  christos 		return NULL;
     87  1.15  christos 	}
     88  1.15  christos 
     89  1.15  christos 	return ifp;
     90  1.15  christos }
     91  1.15  christos 
     92  1.15  christos 
     93   1.1       cgd /*
     94   1.1       cgd  * Process a newly received packet.
     95   1.1       cgd  */
     96   1.8       cgd void
     97   1.1       cgd rip_input(from, rip, size)
     98   1.1       cgd 	struct sockaddr *from;
     99   1.1       cgd 	register struct rip *rip;
    100   1.1       cgd 	int size;
    101   1.1       cgd {
    102   1.1       cgd 	register struct rt_entry *rt;
    103   1.1       cgd 	register struct netinfo *n;
    104   1.1       cgd 	register struct interface *ifp;
    105  1.15  christos 	struct sockaddr dst, gateway, netmask;
    106   1.1       cgd 	int count, changes = 0;
    107   1.1       cgd 	register struct afswitch *afp;
    108  1.15  christos 	static struct sockaddr badfrom;
    109  1.12  christos 	char buf1[256], buf2[256];
    110   1.1       cgd 
    111   1.1       cgd 	ifp = 0;
    112  1.11       cgd 	TRACE_INPUT(ifp, from, (char *)rip, size);
    113   1.1       cgd 	if (from->sa_family >= af_max ||
    114  1.15  christos 	    (afp = &afswitch[from->sa_family])->af_hash == NULL) {
    115   1.1       cgd 		syslog(LOG_INFO,
    116   1.1       cgd 	 "\"from\" address in unsupported address family (%d), cmd %d\n",
    117   1.1       cgd 		    from->sa_family, rip->rip_cmd);
    118   1.1       cgd 		return;
    119   1.1       cgd 	}
    120   1.1       cgd 	if (rip->rip_vers == 0) {
    121   1.1       cgd 		syslog(LOG_ERR,
    122   1.1       cgd 		    "RIP version 0 packet received from %s! (cmd %d)",
    123  1.12  christos 		    (*afswitch[from->sa_family].af_format)(from, buf1,
    124  1.12  christos 							   sizeof(buf1)),
    125  1.12  christos 		    rip->rip_cmd);
    126   1.1       cgd 		return;
    127   1.1       cgd 	}
    128  1.15  christos 
    129   1.1       cgd 	switch (rip->rip_cmd) {
    130   1.1       cgd 
    131   1.1       cgd 	case RIPCMD_REQUEST:
    132   1.1       cgd 		n = rip->rip_nets;
    133   1.1       cgd 		count = size - ((char *)n - (char *)rip);
    134   1.1       cgd 		if (count < sizeof (struct netinfo))
    135   1.1       cgd 			return;
    136   1.1       cgd 		for (; count > 0; n++) {
    137   1.1       cgd 			if (count < sizeof (struct netinfo))
    138   1.1       cgd 				break;
    139   1.1       cgd 			count -= sizeof (struct netinfo);
    140   1.1       cgd 
    141   1.1       cgd 			n->rip_metric = ntohl(n->rip_metric);
    142  1.15  christos 			n->rip_family = ntohs(n->rip_family);
    143   1.1       cgd 			/*
    144   1.1       cgd 			 * A single entry with sa_family == AF_UNSPEC and
    145   1.1       cgd 			 * metric ``infinity'' means ``all routes''.
    146   1.1       cgd 			 * We respond to routers only if we are acting
    147   1.1       cgd 			 * as a supplier, or to anyone other than a router
    148   1.1       cgd 			 * (eg, query).
    149   1.1       cgd 			 */
    150  1.15  christos 			if (n->rip_family == AF_UNSPEC &&
    151   1.1       cgd 			    n->rip_metric == HOPCNT_INFINITY && count == 0) {
    152   1.1       cgd 			    	if (supplier || (*afp->af_portmatch)(from) == 0)
    153   1.1       cgd 					supply(from, 0, 0, 0);
    154   1.1       cgd 				return;
    155   1.1       cgd 			}
    156  1.15  christos 			if (dst.sa_family < af_max &&
    157  1.15  christos 			    afswitch[dst.sa_family].af_hash) {
    158  1.15  christos 				(*afswitch[n->rip_family].af_get)(DESTINATION,
    159  1.15  christos 								  n, &dst);
    160  1.15  christos 				rt = rtlookup(&dst);
    161  1.15  christos 			}
    162   1.1       cgd 			else
    163   1.1       cgd 				rt = 0;
    164   1.1       cgd #define min(a, b) (a < b ? a : b)
    165   1.1       cgd 			n->rip_metric = rt == 0 ? HOPCNT_INFINITY :
    166   1.1       cgd 				min(rt->rt_metric + 1, HOPCNT_INFINITY);
    167   1.1       cgd 			n->rip_metric = htonl(n->rip_metric);
    168   1.1       cgd 		}
    169   1.1       cgd 		rip->rip_cmd = RIPCMD_RESPONSE;
    170   1.6   mycroft 		memcpy(packet, rip, size);
    171   1.1       cgd 		(*afp->af_output)(s, 0, from, size);
    172   1.1       cgd 		return;
    173   1.1       cgd 
    174   1.1       cgd 	case RIPCMD_TRACEON:
    175   1.1       cgd 	case RIPCMD_TRACEOFF:
    176   1.1       cgd 		/* verify message came from a privileged port */
    177   1.1       cgd 		if ((*afp->af_portcheck)(from) == 0)
    178   1.1       cgd 			return;
    179  1.12  christos 
    180  1.15  christos 		if ((ifp = rip_verify(from)) == NULL)
    181  1.12  christos 			return;
    182  1.12  christos 
    183   1.1       cgd 		((char *)rip)[size] = '\0';
    184   1.1       cgd 		if (rip->rip_cmd == RIPCMD_TRACEON)
    185   1.1       cgd 			traceon(rip->rip_tracefile);
    186   1.1       cgd 		else
    187   1.1       cgd 			traceoff();
    188   1.1       cgd 		return;
    189   1.1       cgd 
    190   1.1       cgd 	case RIPCMD_RESPONSE:
    191   1.1       cgd 		/* verify message came from a router */
    192   1.1       cgd 		if ((*afp->af_portmatch)(from) == 0)
    193   1.1       cgd 			return;
    194   1.1       cgd 		(*afp->af_canon)(from);
    195   1.1       cgd 		/* are we talking to ourselves? */
    196   1.1       cgd 		ifp = if_ifwithaddr(from);
    197   1.1       cgd 		if (ifp) {
    198   1.1       cgd 			if (ifp->int_flags & IFF_PASSIVE) {
    199   1.1       cgd 				syslog(LOG_ERR,
    200   1.1       cgd 				  "bogus input (from passive interface, %s)",
    201  1.12  christos 				  (*afswitch[from->sa_family].af_format)(from,
    202  1.12  christos 							 buf1, sizeof(buf1)));
    203   1.1       cgd 				return;
    204   1.1       cgd 			}
    205   1.1       cgd 			rt = rtfind(from);
    206  1.15  christos 			if (rt == 0 || (((rt->rt_state & RTS_INTERFACE) == 0) &&
    207  1.15  christos 			    rt->rt_metric >= ifp->int_metric))
    208   1.1       cgd 				addrouteforif(ifp);
    209   1.1       cgd 			else
    210   1.1       cgd 				rt->rt_timer = 0;
    211   1.1       cgd 			return;
    212   1.1       cgd 		}
    213   1.1       cgd 		/*
    214   1.1       cgd 		 * Update timer for interface on which the packet arrived.
    215   1.1       cgd 		 * If from other end of a point-to-point link that isn't
    216   1.1       cgd 		 * in the routing tables, (re-)add the route.
    217   1.1       cgd 		 */
    218   1.1       cgd 		if ((rt = rtfind(from)) &&
    219   1.1       cgd 		    (rt->rt_state & (RTS_INTERFACE | RTS_REMOTE)))
    220   1.1       cgd 			rt->rt_timer = 0;
    221   1.1       cgd 		else if ((ifp = if_ifwithdstaddr(from)) &&
    222   1.1       cgd 		    (rt == 0 || rt->rt_metric >= ifp->int_metric))
    223   1.1       cgd 			addrouteforif(ifp);
    224  1.15  christos 
    225  1.15  christos 		if ((ifp = rip_verify(from)) == NULL)
    226   1.1       cgd 			return;
    227  1.15  christos 
    228   1.1       cgd 		size -= 4 * sizeof (char);
    229   1.1       cgd 		n = rip->rip_nets;
    230   1.1       cgd 		for (; size > 0; size -= sizeof (struct netinfo), n++) {
    231   1.1       cgd 			if (size < sizeof (struct netinfo))
    232   1.1       cgd 				break;
    233   1.1       cgd 			n->rip_metric = ntohl(n->rip_metric);
    234  1.15  christos 			n->rip_family = ntohs(n->rip_family);
    235  1.15  christos 			if (!(*afswitch[n->rip_family].af_get)(DESTINATION, n,
    236  1.15  christos 							       &dst))
    237  1.15  christos 				continue;
    238  1.15  christos 			if (!(*afswitch[n->rip_family].af_get)(NETMASK,
    239  1.15  christos 							       n, &netmask))
    240  1.15  christos 				memset(&netmask, 0, sizeof(netmask));
    241  1.15  christos 			if (!(*afswitch[n->rip_family].af_get)(GATEWAY,
    242  1.15  christos 							       n, &gateway))
    243  1.15  christos 				memcpy(&gateway, from, sizeof(gateway));
    244  1.15  christos 			if (dst.sa_family >= af_max ||
    245  1.15  christos 			    (afp = &afswitch[dst.sa_family])->af_hash == NULL) {
    246   1.1       cgd 				syslog(LOG_INFO,
    247   1.1       cgd 		"route in unsupported address family (%d), from %s (af %d)\n",
    248  1.15  christos 				   dst.sa_family,
    249  1.12  christos 				   (*afswitch[from->sa_family].af_format)(from,
    250  1.12  christos 							  buf1, sizeof(buf1)),
    251   1.1       cgd 				   from->sa_family);
    252   1.1       cgd 				continue;
    253   1.1       cgd 			}
    254  1.15  christos 			if (((*afp->af_checkhost)(&dst)) == 0) {
    255   1.1       cgd 				syslog(LOG_DEBUG,
    256  1.12  christos 				   "bad host %s in route from %s (af %d)\n",
    257  1.15  christos 				   (*afswitch[dst.sa_family].af_format)(
    258  1.15  christos 					&dst, buf1, sizeof(buf1)),
    259  1.12  christos 				   (*afswitch[from->sa_family].af_format)(from,
    260  1.12  christos 					buf2, sizeof(buf2)),
    261   1.1       cgd 				   from->sa_family);
    262   1.1       cgd 				continue;
    263   1.1       cgd 			}
    264   1.1       cgd 			if (n->rip_metric == 0 ||
    265   1.1       cgd 			    (unsigned) n->rip_metric > HOPCNT_INFINITY) {
    266  1.15  christos 				if (memcmp(from, &badfrom,
    267  1.15  christos 					   sizeof(badfrom)) != 0) {
    268   1.1       cgd 					syslog(LOG_ERR,
    269   1.1       cgd 					    "bad metric (%d) from %s\n",
    270   1.1       cgd 					    n->rip_metric,
    271  1.12  christos 				  (*afswitch[from->sa_family].af_format)(from,
    272  1.12  christos 						buf1, sizeof(buf1)));
    273  1.15  christos 					badfrom = *from;
    274   1.1       cgd 				}
    275   1.1       cgd 				continue;
    276   1.1       cgd 			}
    277   1.1       cgd 			/*
    278   1.1       cgd 			 * Adjust metric according to incoming interface.
    279   1.1       cgd 			 */
    280   1.1       cgd 			if ((unsigned) n->rip_metric < HOPCNT_INFINITY)
    281   1.1       cgd 				n->rip_metric += ifp->int_metric;
    282   1.1       cgd 			if ((unsigned) n->rip_metric > HOPCNT_INFINITY)
    283   1.1       cgd 				n->rip_metric = HOPCNT_INFINITY;
    284  1.15  christos 			rt = rtlookup(&dst);
    285   1.1       cgd 			if (rt == 0 ||
    286   1.1       cgd 			    (rt->rt_state & (RTS_INTERNAL|RTS_INTERFACE)) ==
    287   1.1       cgd 			    (RTS_INTERNAL|RTS_INTERFACE)) {
    288   1.1       cgd 				/*
    289   1.1       cgd 				 * If we're hearing a logical network route
    290   1.1       cgd 				 * back from a peer to which we sent it,
    291   1.1       cgd 				 * ignore it.
    292   1.1       cgd 				 */
    293   1.1       cgd 				if (rt && rt->rt_state & RTS_SUBNET &&
    294   1.1       cgd 				    (*afp->af_sendroute)(rt, from))
    295   1.1       cgd 					continue;
    296   1.1       cgd 				if ((unsigned)n->rip_metric < HOPCNT_INFINITY) {
    297   1.1       cgd 				    /*
    298   1.1       cgd 				     * Look for an equivalent route that
    299   1.1       cgd 				     * includes this one before adding
    300   1.1       cgd 				     * this route.
    301   1.1       cgd 				     */
    302  1.15  christos 				    rt = rtfind(&dst);
    303  1.15  christos 				    if (rt && equal(&gateway, &rt->rt_router))
    304   1.1       cgd 					    continue;
    305  1.15  christos 				    rtadd(&dst, &gateway, &netmask,
    306  1.15  christos 					  n->rip_metric, 0);
    307   1.1       cgd 				    changes++;
    308   1.1       cgd 				}
    309   1.1       cgd 				continue;
    310   1.1       cgd 			}
    311   1.1       cgd 
    312   1.1       cgd 			/*
    313   1.1       cgd 			 * Update if from gateway and different,
    314   1.1       cgd 			 * shorter, or equivalent but old route
    315   1.1       cgd 			 * is getting stale.
    316   1.1       cgd 			 */
    317  1.15  christos 			if (equal(&gateway, &rt->rt_router)) {
    318   1.1       cgd 				if (n->rip_metric != rt->rt_metric) {
    319  1.15  christos 					rtchange(rt, &gateway,
    320  1.15  christos 						 &netmask, n->rip_metric);
    321   1.1       cgd 					changes++;
    322   1.1       cgd 					rt->rt_timer = 0;
    323   1.1       cgd 					if (rt->rt_metric >= HOPCNT_INFINITY)
    324   1.1       cgd 						rt->rt_timer =
    325   1.1       cgd 						    GARBAGE_TIME - EXPIRE_TIME;
    326   1.1       cgd 				} else if (rt->rt_metric < HOPCNT_INFINITY)
    327   1.1       cgd 					rt->rt_timer = 0;
    328   1.1       cgd 			} else if ((unsigned) n->rip_metric < rt->rt_metric ||
    329   1.1       cgd 			    (rt->rt_metric == n->rip_metric &&
    330   1.1       cgd 			    rt->rt_timer > (EXPIRE_TIME/2) &&
    331   1.1       cgd 			    (unsigned) n->rip_metric < HOPCNT_INFINITY)) {
    332  1.15  christos 				rtchange(rt, &gateway, &netmask, n->rip_metric);
    333   1.1       cgd 				changes++;
    334   1.1       cgd 				rt->rt_timer = 0;
    335   1.1       cgd 			}
    336   1.1       cgd 		}
    337   1.1       cgd 		break;
    338   1.1       cgd 	}
    339   1.1       cgd 
    340   1.1       cgd 	/*
    341   1.1       cgd 	 * If changes have occurred, and if we have not sent a broadcast
    342   1.1       cgd 	 * recently, send a dynamic update.  This update is sent only
    343   1.1       cgd 	 * on interfaces other than the one on which we received notice
    344   1.1       cgd 	 * of the change.  If we are within MIN_WAITTIME of a full update,
    345   1.1       cgd 	 * don't bother sending; if we just sent a dynamic update
    346   1.1       cgd 	 * and set a timer (nextbcast), delay until that time.
    347   1.1       cgd 	 * If we just sent a full update, delay the dynamic update.
    348   1.1       cgd 	 * Set a timer for a randomized value to suppress additional
    349   1.1       cgd 	 * dynamic updates until it expires; if we delayed sending
    350   1.1       cgd 	 * the current changes, set needupdate.
    351   1.1       cgd 	 */
    352   1.1       cgd 	if (changes && supplier &&
    353   1.1       cgd 	   now.tv_sec - lastfullupdate.tv_sec < SUPPLY_INTERVAL-MAX_WAITTIME) {
    354   1.1       cgd 		u_long delay;
    355   1.1       cgd 
    356   1.1       cgd 		if (now.tv_sec - lastbcast.tv_sec >= MIN_WAITTIME &&
    357   1.1       cgd 		    timercmp(&nextbcast, &now, <)) {
    358   1.1       cgd 			if (traceactions)
    359   1.1       cgd 				fprintf(ftrace, "send dynamic update\n");
    360   1.1       cgd 			toall(supply, RTS_CHANGED, ifp);
    361   1.1       cgd 			lastbcast = now;
    362   1.1       cgd 			needupdate = 0;
    363   1.1       cgd 			nextbcast.tv_sec = 0;
    364   1.1       cgd 		} else {
    365   1.1       cgd 			needupdate++;
    366   1.1       cgd 			if (traceactions)
    367   1.1       cgd 				fprintf(ftrace, "delay dynamic update\n");
    368   1.1       cgd 		}
    369   1.1       cgd #define RANDOMDELAY()	(MIN_WAITTIME * 1000000 + \
    370   1.1       cgd 		(u_long)random() % ((MAX_WAITTIME - MIN_WAITTIME) * 1000000))
    371   1.1       cgd 
    372   1.1       cgd 		if (nextbcast.tv_sec == 0) {
    373   1.1       cgd 			delay = RANDOMDELAY();
    374   1.1       cgd 			if (traceactions)
    375   1.1       cgd 				fprintf(ftrace,
    376   1.1       cgd 				    "inhibit dynamic update for %d usec\n",
    377   1.1       cgd 				    delay);
    378   1.1       cgd 			nextbcast.tv_sec = delay / 1000000;
    379   1.1       cgd 			nextbcast.tv_usec = delay % 1000000;
    380  1.10   mycroft 			timeradd(&nextbcast, &now, &nextbcast);
    381   1.1       cgd 			/*
    382   1.1       cgd 			 * If the next possibly dynamic update
    383   1.1       cgd 			 * is within MIN_WAITTIME of the next full update,
    384   1.1       cgd 			 * force the delay past the full update,
    385   1.1       cgd 			 * or we might send a dynamic update just before
    386   1.1       cgd 			 * the full update.
    387   1.1       cgd 			 */
    388   1.1       cgd 			if (nextbcast.tv_sec > lastfullupdate.tv_sec +
    389   1.1       cgd 			    SUPPLY_INTERVAL - MIN_WAITTIME)
    390   1.1       cgd 				nextbcast.tv_sec = lastfullupdate.tv_sec +
    391   1.1       cgd 				    SUPPLY_INTERVAL + 1;
    392   1.1       cgd 		}
    393   1.1       cgd 	}
    394   1.1       cgd }
    395