flooder.c 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668
  1. /**
  2. * @file flooder.c
  3. * @author Ambroz Bizjak <ambrop7@gmail.com>
  4. *
  5. * @section LICENSE
  6. *
  7. * Redistribution and use in source and binary forms, with or without
  8. * modification, are permitted provided that the following conditions are met:
  9. * 1. Redistributions of source code must retain the above copyright
  10. * notice, this list of conditions and the following disclaimer.
  11. * 2. Redistributions in binary form must reproduce the above copyright
  12. * notice, this list of conditions and the following disclaimer in the
  13. * documentation and/or other materials provided with the distribution.
  14. * 3. Neither the name of the author nor the
  15. * names of its contributors may be used to endorse or promote products
  16. * derived from this software without specific prior written permission.
  17. *
  18. * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
  19. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
  20. * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
  21. * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
  22. * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
  23. * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  24. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
  25. * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
  26. * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
  27. * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  28. */
  29. #include <stdint.h>
  30. #include <stdlib.h>
  31. #include <string.h>
  32. #include <stdio.h>
  33. #include <protocol/addr.h>
  34. #include <protocol/scproto.h>
  35. #include <misc/loglevel.h>
  36. #include <misc/version.h>
  37. #include <misc/nsskey.h>
  38. #include <misc/byteorder.h>
  39. #include <misc/loggers_string.h>
  40. #include <misc/open_standard_streams.h>
  41. #include <base/BLog.h>
  42. #include <system/BReactor.h>
  43. #include <system/BSignal.h>
  44. #include <system/BNetwork.h>
  45. #include <flow/SinglePacketBuffer.h>
  46. #include <flow/PacketProtoEncoder.h>
  47. #include <nspr_support/BSSLConnection.h>
  48. #include <server_connection/ServerConnection.h>
  49. #ifndef BADVPN_USE_WINAPI
  50. #include <base/BLog_syslog.h>
  51. #endif
  52. #include <flooder/flooder.h>
  53. #include <generated/blog_channel_flooder.h>
  54. #define LOGGER_STDOUT 1
  55. #define LOGGER_SYSLOG 2
  56. // command-line options
  57. struct {
  58. int help;
  59. int version;
  60. int logger;
  61. #ifndef BADVPN_USE_WINAPI
  62. char *logger_syslog_facility;
  63. char *logger_syslog_ident;
  64. #endif
  65. int loglevel;
  66. int loglevels[BLOG_NUM_CHANNELS];
  67. int ssl;
  68. char *nssdb;
  69. char *client_cert_name;
  70. char *server_name;
  71. char *server_addr;
  72. peerid_t floods[MAX_FLOODS];
  73. int num_floods;
  74. } options;
  75. // server address we connect to
  76. BAddr server_addr;
  77. // server name to use for SSL
  78. char server_name[256];
  79. // reactor
  80. BReactor ss;
  81. // client certificate if using SSL
  82. CERTCertificate *client_cert;
  83. // client private key if using SSL
  84. SECKEYPrivateKey *client_key;
  85. // server connection
  86. ServerConnection server;
  87. // whether server is ready
  88. int server_ready;
  89. // my ID, defined only after server_ready
  90. peerid_t my_id;
  91. // flooding output
  92. PacketRecvInterface flood_source;
  93. PacketProtoEncoder flood_encoder;
  94. SinglePacketBuffer flood_buffer;
  95. // whether we were asked for a packet and blocked
  96. int flood_blocking;
  97. // index of next peer to send packet too
  98. int flood_next;
  99. /**
  100. * Cleans up everything that can be cleaned up from inside the event loop.
  101. */
  102. static void terminate (void);
  103. /**
  104. * Prints command line help.
  105. */
  106. static void print_help (const char *name);
  107. /**
  108. * Prints program name, version and copyright notice.
  109. */
  110. static void print_version (void);
  111. /**
  112. * Parses command line options into the options strucute.
  113. *
  114. * @return 1 on success, 0 on failure
  115. */
  116. static int parse_arguments (int argc, char *argv[]);
  117. /**
  118. * Processes command line options.
  119. *
  120. * @return 1 on success, 0 on failure
  121. */
  122. static int resolve_arguments (void);
  123. /**
  124. * Handler invoked when program termination is requested.
  125. */
  126. static void signal_handler (void *unused);
  127. static void server_handler_error (void *user);
  128. static void server_handler_ready (void *user, peerid_t param_my_id, uint32_t ext_ip);
  129. static void server_handler_newclient (void *user, peerid_t peer_id, int flags, const uint8_t *cert, int cert_len);
  130. static void server_handler_endclient (void *user, peerid_t peer_id);
  131. static void server_handler_message (void *user, peerid_t peer_id, uint8_t *data, int data_len);
  132. static void flood_source_handler_recv (void *user, uint8_t *data);
  133. int main (int argc, char *argv[])
  134. {
  135. if (argc <= 0) {
  136. return 1;
  137. }
  138. // open standard streams
  139. open_standard_streams();
  140. // parse command-line arguments
  141. if (!parse_arguments(argc, argv)) {
  142. fprintf(stderr, "Failed to parse arguments\n");
  143. print_help(argv[0]);
  144. goto fail0;
  145. }
  146. // handle --help and --version
  147. if (options.help) {
  148. print_version();
  149. print_help(argv[0]);
  150. return 0;
  151. }
  152. if (options.version) {
  153. print_version();
  154. return 0;
  155. }
  156. // initialize logger
  157. switch (options.logger) {
  158. case LOGGER_STDOUT:
  159. BLog_InitStdout();
  160. break;
  161. #ifndef BADVPN_USE_WINAPI
  162. case LOGGER_SYSLOG:
  163. if (!BLog_InitSyslog(options.logger_syslog_ident, options.logger_syslog_facility)) {
  164. fprintf(stderr, "Failed to initialize syslog logger\n");
  165. goto fail0;
  166. }
  167. break;
  168. #endif
  169. default:
  170. ASSERT(0);
  171. }
  172. // configure logger channels
  173. for (int i = 0; i < BLOG_NUM_CHANNELS; i++) {
  174. if (options.loglevels[i] >= 0) {
  175. BLog_SetChannelLoglevel(i, options.loglevels[i]);
  176. }
  177. else if (options.loglevel >= 0) {
  178. BLog_SetChannelLoglevel(i, options.loglevel);
  179. }
  180. }
  181. BLog(BLOG_NOTICE, "initializing "GLOBAL_PRODUCT_NAME" "PROGRAM_NAME" "GLOBAL_VERSION);
  182. // initialize network
  183. if (!BNetwork_GlobalInit()) {
  184. BLog(BLOG_ERROR, "BNetwork_GlobalInit failed");
  185. goto fail1;
  186. }
  187. // init time
  188. BTime_Init();
  189. // resolve addresses
  190. if (!resolve_arguments()) {
  191. BLog(BLOG_ERROR, "Failed to resolve arguments");
  192. goto fail1;
  193. }
  194. // init reactor
  195. if (!BReactor_Init(&ss)) {
  196. BLog(BLOG_ERROR, "BReactor_Init failed");
  197. goto fail1;
  198. }
  199. // setup signal handler
  200. if (!BSignal_Init(&ss, signal_handler, NULL)) {
  201. BLog(BLOG_ERROR, "BSignal_Init failed");
  202. goto fail1a;
  203. }
  204. if (options.ssl) {
  205. // init NSPR
  206. PR_Init(PR_USER_THREAD, PR_PRIORITY_NORMAL, 0);
  207. // register local NSPR file types
  208. if (!BSSLConnection_GlobalInit()) {
  209. BLog(BLOG_ERROR, "BSSLConnection_GlobalInit failed");
  210. goto fail3;
  211. }
  212. // init NSS
  213. if (NSS_Init(options.nssdb) != SECSuccess) {
  214. BLog(BLOG_ERROR, "NSS_Init failed (%d)", (int)PR_GetError());
  215. goto fail2;
  216. }
  217. // set cipher policy
  218. if (NSS_SetDomesticPolicy() != SECSuccess) {
  219. BLog(BLOG_ERROR, "NSS_SetDomesticPolicy failed (%d)", (int)PR_GetError());
  220. goto fail3;
  221. }
  222. // init server cache
  223. if (SSL_ConfigServerSessionIDCache(0, 0, 0, NULL) != SECSuccess) {
  224. BLog(BLOG_ERROR, "SSL_ConfigServerSessionIDCache failed (%d)", (int)PR_GetError());
  225. goto fail3;
  226. }
  227. // open server certificate and private key
  228. if (!open_nss_cert_and_key(options.client_cert_name, &client_cert, &client_key)) {
  229. BLog(BLOG_ERROR, "Cannot open certificate and key");
  230. goto fail4;
  231. }
  232. }
  233. // start connecting to server
  234. if (!ServerConnection_Init(
  235. &server, &ss, server_addr, SC_KEEPALIVE_INTERVAL, SERVER_BUFFER_MIN_PACKETS, options.ssl, client_cert, client_key, server_name, NULL,
  236. server_handler_error, server_handler_ready, server_handler_newclient, server_handler_endclient, server_handler_message
  237. )) {
  238. BLog(BLOG_ERROR, "ServerConnection_Init failed");
  239. goto fail5;
  240. }
  241. // set server not ready
  242. server_ready = 0;
  243. // enter event loop
  244. BLog(BLOG_NOTICE, "entering event loop");
  245. BReactor_Exec(&ss);
  246. if (server_ready) {
  247. SinglePacketBuffer_Free(&flood_buffer);
  248. PacketProtoEncoder_Free(&flood_encoder);
  249. PacketRecvInterface_Free(&flood_source);
  250. }
  251. ServerConnection_Free(&server);
  252. fail5:
  253. if (options.ssl) {
  254. CERT_DestroyCertificate(client_cert);
  255. SECKEY_DestroyPrivateKey(client_key);
  256. fail4:
  257. ASSERT_FORCE(SSL_ShutdownServerSessionIDCache() == SECSuccess)
  258. fail3:
  259. SSL_ClearSessionCache();
  260. ASSERT_FORCE(NSS_Shutdown() == SECSuccess)
  261. fail2:
  262. ASSERT_FORCE(PR_Cleanup() == PR_SUCCESS)
  263. PL_ArenaFinish();
  264. }
  265. BSignal_Finish();
  266. fail1a:
  267. BReactor_Free(&ss);
  268. fail1:
  269. BLog(BLOG_NOTICE, "exiting");
  270. BLog_Free();
  271. fail0:
  272. DebugObjectGlobal_Finish();
  273. return 1;
  274. }
  275. void terminate (void)
  276. {
  277. BLog(BLOG_NOTICE, "tearing down");
  278. // exit event loop
  279. BReactor_Quit(&ss, 0);
  280. }
  281. void print_help (const char *name)
  282. {
  283. printf(
  284. "Usage:\n"
  285. " %s\n"
  286. " [--help]\n"
  287. " [--version]\n"
  288. " [--logger <"LOGGERS_STRING">]\n"
  289. #ifndef BADVPN_USE_WINAPI
  290. " (logger=syslog?\n"
  291. " [--syslog-facility <string>]\n"
  292. " [--syslog-ident <string>]\n"
  293. " )\n"
  294. #endif
  295. " [--loglevel <0-5/none/error/warning/notice/info/debug>]\n"
  296. " [--channel-loglevel <channel-name> <0-5/none/error/warning/notice/info/debug>] ...\n"
  297. " [--ssl --nssdb <string> --client-cert-name <string>]\n"
  298. " [--server-name <string>]\n"
  299. " --server-addr <addr>\n"
  300. " [--flood-id <id>] ...\n"
  301. "Address format is a.b.c.d:port (IPv4) or [addr]:port (IPv6).\n",
  302. name
  303. );
  304. }
  305. void print_version (void)
  306. {
  307. printf(GLOBAL_PRODUCT_NAME" "PROGRAM_NAME" "GLOBAL_VERSION"\n"GLOBAL_COPYRIGHT_NOTICE"\n");
  308. }
  309. int parse_arguments (int argc, char *argv[])
  310. {
  311. if (argc <= 0) {
  312. return 0;
  313. }
  314. options.help = 0;
  315. options.version = 0;
  316. options.logger = LOGGER_STDOUT;
  317. #ifndef BADVPN_USE_WINAPI
  318. options.logger_syslog_facility = "daemon";
  319. options.logger_syslog_ident = argv[0];
  320. #endif
  321. options.loglevel = -1;
  322. for (int i = 0; i < BLOG_NUM_CHANNELS; i++) {
  323. options.loglevels[i] = -1;
  324. }
  325. options.ssl = 0;
  326. options.nssdb = NULL;
  327. options.client_cert_name = NULL;
  328. options.server_name = NULL;
  329. options.server_addr = NULL;
  330. options.num_floods = 0;
  331. int i;
  332. for (i = 1; i < argc; i++) {
  333. char *arg = argv[i];
  334. if (!strcmp(arg, "--help")) {
  335. options.help = 1;
  336. }
  337. else if (!strcmp(arg, "--version")) {
  338. options.version = 1;
  339. }
  340. else if (!strcmp(arg, "--logger")) {
  341. if (1 >= argc - i) {
  342. fprintf(stderr, "%s: requires an argument\n", arg);
  343. return 0;
  344. }
  345. char *arg2 = argv[i + 1];
  346. if (!strcmp(arg2, "stdout")) {
  347. options.logger = LOGGER_STDOUT;
  348. }
  349. #ifndef BADVPN_USE_WINAPI
  350. else if (!strcmp(arg2, "syslog")) {
  351. options.logger = LOGGER_SYSLOG;
  352. }
  353. #endif
  354. else {
  355. fprintf(stderr, "%s: wrong argument\n", arg);
  356. return 0;
  357. }
  358. i++;
  359. }
  360. #ifndef BADVPN_USE_WINAPI
  361. else if (!strcmp(arg, "--syslog-facility")) {
  362. if (1 >= argc - i) {
  363. fprintf(stderr, "%s: requires an argument\n", arg);
  364. return 0;
  365. }
  366. options.logger_syslog_facility = argv[i + 1];
  367. i++;
  368. }
  369. else if (!strcmp(arg, "--syslog-ident")) {
  370. if (1 >= argc - i) {
  371. fprintf(stderr, "%s: requires an argument\n", arg);
  372. return 0;
  373. }
  374. options.logger_syslog_ident = argv[i + 1];
  375. i++;
  376. }
  377. #endif
  378. else if (!strcmp(arg, "--loglevel")) {
  379. if (1 >= argc - i) {
  380. fprintf(stderr, "%s: requires an argument\n", arg);
  381. return 0;
  382. }
  383. if ((options.loglevel = parse_loglevel(argv[i + 1])) < 0) {
  384. fprintf(stderr, "%s: wrong argument\n", arg);
  385. return 0;
  386. }
  387. i++;
  388. }
  389. else if (!strcmp(arg, "--channel-loglevel")) {
  390. if (2 >= argc - i) {
  391. fprintf(stderr, "%s: requires two arguments\n", arg);
  392. return 0;
  393. }
  394. int channel = BLogGlobal_GetChannelByName(argv[i + 1]);
  395. if (channel < 0) {
  396. fprintf(stderr, "%s: wrong channel argument\n", arg);
  397. return 0;
  398. }
  399. int loglevel = parse_loglevel(argv[i + 2]);
  400. if (loglevel < 0) {
  401. fprintf(stderr, "%s: wrong loglevel argument\n", arg);
  402. return 0;
  403. }
  404. options.loglevels[channel] = loglevel;
  405. i += 2;
  406. }
  407. else if (!strcmp(arg, "--ssl")) {
  408. options.ssl = 1;
  409. }
  410. else if (!strcmp(arg, "--nssdb")) {
  411. if (1 >= argc - i) {
  412. fprintf(stderr, "%s: requires an argument\n", arg);
  413. return 0;
  414. }
  415. options.nssdb = argv[i + 1];
  416. i++;
  417. }
  418. else if (!strcmp(arg, "--client-cert-name")) {
  419. if (1 >= argc - i) {
  420. fprintf(stderr, "%s: requires an argument\n", arg);
  421. return 0;
  422. }
  423. options.client_cert_name = argv[i + 1];
  424. i++;
  425. }
  426. else if (!strcmp(arg, "--server-name")) {
  427. if (1 >= argc - i) {
  428. fprintf(stderr, "%s: requires an argument\n", arg);
  429. return 0;
  430. }
  431. options.server_name = argv[i + 1];
  432. i++;
  433. }
  434. else if (!strcmp(arg, "--server-addr")) {
  435. if (1 >= argc - i) {
  436. fprintf(stderr, "%s: requires an argument\n", arg);
  437. return 0;
  438. }
  439. options.server_addr = argv[i + 1];
  440. i++;
  441. }
  442. else if (!strcmp(arg, "--flood-id")) {
  443. if (1 >= argc - i) {
  444. fprintf(stderr, "%s: requires an argument\n", arg);
  445. return 0;
  446. }
  447. if (options.num_floods == MAX_FLOODS) {
  448. fprintf(stderr, "%s: too many\n", arg);
  449. return 0;
  450. }
  451. options.floods[options.num_floods] = atoi(argv[i + 1]);
  452. options.num_floods++;
  453. i++;
  454. }
  455. else {
  456. fprintf(stderr, "unknown option: %s\n", arg);
  457. return 0;
  458. }
  459. }
  460. if (options.help || options.version) {
  461. return 1;
  462. }
  463. if (options.ssl != !!options.nssdb) {
  464. fprintf(stderr, "False: --ssl <=> --nssdb\n");
  465. return 0;
  466. }
  467. if (options.ssl != !!options.client_cert_name) {
  468. fprintf(stderr, "False: --ssl <=> --client-cert-name\n");
  469. return 0;
  470. }
  471. if (!options.server_addr) {
  472. fprintf(stderr, "False: --server-addr\n");
  473. return 0;
  474. }
  475. return 1;
  476. }
  477. int resolve_arguments (void)
  478. {
  479. // resolve server address
  480. ASSERT(options.server_addr)
  481. if (!BAddr_Parse(&server_addr, options.server_addr, server_name, sizeof(server_name))) {
  482. BLog(BLOG_ERROR, "server addr: BAddr_Parse failed");
  483. return 0;
  484. }
  485. if (!addr_supported(server_addr)) {
  486. BLog(BLOG_ERROR, "server addr: not supported");
  487. return 0;
  488. }
  489. // override server name if requested
  490. if (options.server_name) {
  491. if (strlen(options.server_name) >= sizeof(server_name)) {
  492. BLog(BLOG_ERROR, "server name: too long");
  493. return 0;
  494. }
  495. strcpy(server_name, options.server_name);
  496. }
  497. return 1;
  498. }
  499. void signal_handler (void *unused)
  500. {
  501. BLog(BLOG_NOTICE, "termination requested");
  502. terminate();
  503. }
  504. void server_handler_error (void *user)
  505. {
  506. BLog(BLOG_ERROR, "server connection failed, exiting");
  507. terminate();
  508. }
  509. void server_handler_ready (void *user, peerid_t param_my_id, uint32_t ext_ip)
  510. {
  511. ASSERT(!server_ready)
  512. // remember our ID
  513. my_id = param_my_id;
  514. // init flooding
  515. // init source
  516. PacketRecvInterface_Init(&flood_source, SC_MAX_ENC, flood_source_handler_recv, NULL, BReactor_PendingGroup(&ss));
  517. // init encoder
  518. PacketProtoEncoder_Init(&flood_encoder, &flood_source, BReactor_PendingGroup(&ss));
  519. // init buffer
  520. if (!SinglePacketBuffer_Init(&flood_buffer, PacketProtoEncoder_GetOutput(&flood_encoder), ServerConnection_GetSendInterface(&server), BReactor_PendingGroup(&ss))) {
  521. BLog(BLOG_ERROR, "SinglePacketBuffer_Init failed, exiting");
  522. goto fail1;
  523. }
  524. // set not blocking
  525. flood_blocking = 0;
  526. // set server ready
  527. server_ready = 1;
  528. BLog(BLOG_INFO, "server: ready, my ID is %d", (int)my_id);
  529. return;
  530. fail1:
  531. PacketProtoEncoder_Free(&flood_encoder);
  532. PacketRecvInterface_Free(&flood_source);
  533. terminate();
  534. }
  535. void server_handler_newclient (void *user, peerid_t peer_id, int flags, const uint8_t *cert, int cert_len)
  536. {
  537. ASSERT(server_ready)
  538. BLog(BLOG_INFO, "newclient %d", (int)peer_id);
  539. }
  540. void server_handler_endclient (void *user, peerid_t peer_id)
  541. {
  542. ASSERT(server_ready)
  543. BLog(BLOG_INFO, "endclient %d", (int)peer_id);
  544. }
  545. void server_handler_message (void *user, peerid_t peer_id, uint8_t *data, int data_len)
  546. {
  547. ASSERT(server_ready)
  548. ASSERT(data_len >= 0)
  549. ASSERT(data_len <= SC_MAX_MSGLEN)
  550. BLog(BLOG_INFO, "message from %d", (int)peer_id);
  551. }
  552. void flood_source_handler_recv (void *user, uint8_t *data)
  553. {
  554. ASSERT(server_ready)
  555. ASSERT(!flood_blocking)
  556. if (options.num_floods > 0) {
  557. ASSERT(flood_next >= 0)
  558. ASSERT(flood_next < options.num_floods)
  559. }
  560. if (options.num_floods == 0) {
  561. flood_blocking = 1;
  562. return;
  563. }
  564. peerid_t peer_id = options.floods[flood_next];
  565. flood_next = (flood_next + 1) % options.num_floods;
  566. BLog(BLOG_INFO, "message to %d", (int)peer_id);
  567. struct sc_header *header = (struct sc_header *)data;
  568. header->type = SCID_OUTMSG;
  569. struct sc_client_outmsg *msg = (struct sc_client_outmsg *)(data + sizeof(struct sc_header));
  570. msg->clientid = htol16(peer_id);
  571. memset(data + sizeof(struct sc_header) + sizeof(struct sc_client_outmsg), 0, SC_MAX_MSGLEN);
  572. PacketRecvInterface_Done(&flood_source, sizeof(struct sc_header) + sizeof(struct sc_client_outmsg) + SC_MAX_MSGLEN);
  573. }