2 This file is part of GNUnet.
3 Copyright (C) 2010-2015 GNUnet e.V.
5 GNUnet is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published
7 by the Free Software Foundation; either version 3, or (at your
8 option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with GNUnet; see the file COPYING. If not, write to the
17 Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
18 Boston, MA 02110-1301, USA.
21 * @file transport/gnunet-service-transport.c
22 * @brief main for gnunet-service-transport
23 * @author Christian Grothoff
26 #include "gnunet_util_lib.h"
27 #include "gnunet_hello_lib.h"
28 #include "gnunet_statistics_service.h"
29 #include "gnunet_transport_service.h"
30 #include "gnunet_peerinfo_service.h"
31 #include "gnunet_ats_service.h"
32 #include "gnunet-service-transport.h"
33 #include "gnunet-service-transport_ats.h"
34 #include "gnunet-service-transport_blacklist.h"
35 #include "gnunet-service-transport_clients.h"
36 #include "gnunet-service-transport_hello.h"
37 #include "gnunet-service-transport_neighbours.h"
38 #include "gnunet-service-transport_plugins.h"
39 #include "gnunet-service-transport_validation.h"
40 #include "gnunet-service-transport_manipulation.h"
41 #include "transport.h"
45 * Information we need for an asynchronous session kill.
47 struct GNUNET_ATS_SessionKiller
52 struct GNUNET_ATS_SessionKiller *next;
57 struct GNUNET_ATS_SessionKiller *prev;
62 struct GNUNET_ATS_Session *session;
65 * Plugin for the session.
67 struct GNUNET_TRANSPORT_PluginFunctions *plugin;
72 struct GNUNET_SCHEDULER_Task *task;
81 struct GNUNET_STATISTICS_Handle *GST_stats;
84 * Configuration handle.
86 const struct GNUNET_CONFIGURATION_Handle *GST_cfg;
89 * Configuration handle.
91 struct GNUNET_PeerIdentity GST_my_identity;
94 * Handle to peerinfo service.
96 struct GNUNET_PEERINFO_Handle *GST_peerinfo;
99 * Handle to our service's server.
101 static struct GNUNET_SERVER_Handle *GST_server;
106 struct GNUNET_CRYPTO_EddsaPrivateKey *GST_my_private_key;
109 * ATS scheduling handle.
111 struct GNUNET_ATS_SchedulingHandle *GST_ats;
114 * ATS connectivity handle.
116 struct GNUNET_ATS_ConnectivityHandle *GST_ats_connect;
119 * Hello address expiration
121 struct GNUNET_TIME_Relative hello_expiration;
124 * Head of DLL of asynchronous tasks to kill sessions.
126 static struct GNUNET_ATS_SessionKiller *sk_head;
129 * Tail of DLL of asynchronous tasks to kill sessions.
131 static struct GNUNET_ATS_SessionKiller *sk_tail;
134 * Interface scanner determines our LAN address range(s).
136 struct GNUNET_ATS_InterfaceScanner *GST_is;
140 * Transmit our HELLO message to the given (connected) neighbour.
142 * @param cls the 'HELLO' message
143 * @param peer identity of the peer
144 * @param address the address
145 * @param state current state this peer is in
146 * @param state_timeout timeout for the current state of the peer
147 * @param bandwidth_in inbound quota in NBO
148 * @param bandwidth_out outbound quota in NBO
151 transmit_our_hello (void *cls,
152 const struct GNUNET_PeerIdentity *peer,
153 const struct GNUNET_HELLO_Address *address,
154 enum GNUNET_TRANSPORT_PeerState state,
155 struct GNUNET_TIME_Absolute state_timeout,
156 struct GNUNET_BANDWIDTH_Value32NBO bandwidth_in,
157 struct GNUNET_BANDWIDTH_Value32NBO bandwidth_out)
159 const struct GNUNET_MessageHeader *hello = cls;
164 sizeof (struct GNUNET_PeerIdentity)))
165 return; /* not to ourselves */
166 if (GNUNET_NO == GST_neighbours_test_connected (peer))
169 GST_neighbours_send (peer,
178 * My HELLO has changed. Tell everyone who should know.
181 * @param hello new HELLO
184 process_hello_update (void *cls,
185 const struct GNUNET_MessageHeader *hello)
187 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
188 "Broadcasting HELLO to clients\n");
189 GST_clients_broadcast (hello, GNUNET_NO);
190 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
191 "Broadcasting HELLO to neighbours\n");
192 GST_neighbours_iterate (&transmit_our_hello,
198 * We received some payload. Prepare to pass it on to our clients.
200 * @param address address and (claimed) identity of the other peer
201 * @param session identifier used for this session (NULL for plugins
202 * that do not offer bi-directional communication to the sender
203 * using the same "connection")
204 * @param message the message to process
205 * @return how long the plugin should wait until receiving more data
207 static struct GNUNET_TIME_Relative
208 process_payload (const struct GNUNET_HELLO_Address *address,
209 struct GNUNET_ATS_Session *session,
210 const struct GNUNET_MessageHeader *message)
212 struct GNUNET_TIME_Relative ret;
214 struct InboundMessage *im;
215 size_t msg_size = ntohs (message->size);
216 size_t size = sizeof(struct InboundMessage) + msg_size;
217 char buf[size] GNUNET_ALIGN;
219 do_forward = GNUNET_SYSERR;
220 ret = GST_neighbours_calculate_receive_delay (&address->peer,
223 if (! GST_neighbours_test_connected (&address->peer))
225 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
226 "Discarded %u bytes type %u payload from peer `%s'\n",
227 (unsigned int) msg_size,
228 ntohs (message->type),
229 GNUNET_i2s (&address->peer));
230 GNUNET_STATISTICS_update (GST_stats, gettext_noop
231 ("# bytes payload discarded due to not connected peer"),
237 if (GNUNET_YES != do_forward)
239 im = (struct InboundMessage *) buf;
240 im->header.size = htons (size);
241 im->header.type = htons (GNUNET_MESSAGE_TYPE_TRANSPORT_RECV);
242 im->peer = address->peer;
243 memcpy (&im[1], message, ntohs (message->size));
244 GST_clients_broadcast (&im->header, GNUNET_YES);
250 * Task to asynchronously terminate a session.
252 * @param cls the `struct GNUNET_ATS_SessionKiller` with the information for the kill
255 kill_session_task (void *cls)
257 struct GNUNET_ATS_SessionKiller *sk = cls;
260 GNUNET_CONTAINER_DLL_remove (sk_head, sk_tail, sk);
261 sk->plugin->disconnect_session (sk->plugin->cls, sk->session);
267 * Force plugin to terminate session due to communication
270 * @param plugin_name name of the plugin
271 * @param session session to termiante
274 kill_session (const char *plugin_name,
275 struct GNUNET_ATS_Session *session)
277 struct GNUNET_TRANSPORT_PluginFunctions *plugin;
278 struct GNUNET_ATS_SessionKiller *sk;
280 for (sk = sk_head; NULL != sk; sk = sk->next)
281 if (sk->session == session)
283 plugin = GST_plugins_find (plugin_name);
289 /* need to issue disconnect asynchronously */
290 sk = GNUNET_new (struct GNUNET_ATS_SessionKiller);
291 sk->session = session;
293 sk->task = GNUNET_SCHEDULER_add_now (&kill_session_task, sk);
294 GNUNET_CONTAINER_DLL_insert (sk_head,
301 * Black list check result for try_connect call
302 * If connection to the peer is allowed request adddress and ???
304 * @param cls the message
305 * @param peer the peer
306 * @param address the address
307 * @param session the session
308 * @param result the result
311 connect_bl_check_cont (void *cls,
312 const struct GNUNET_PeerIdentity *peer,
313 const struct GNUNET_HELLO_Address *address,
314 struct GNUNET_ATS_Session *session,
317 struct GNUNET_MessageHeader *msg = cls;
319 if (GNUNET_OK == result)
321 /* Blacklist allows to speak to this peer, forward SYN to neighbours */
322 GNUNET_log (GNUNET_ERROR_TYPE_INFO,
323 "Received SYN message from peer `%s' at `%s'\n",
325 GST_plugins_a2s (address));
327 GST_neighbours_handle_session_syn (msg,
330 GST_blacklist_abort_matching (address,
332 kill_session (address->transport_name,
339 if (GNUNET_SYSERR == result)
340 return; /* check was aborted, session destroyed */
341 /* Blacklist denies to speak to this peer */
342 GNUNET_log (GNUNET_ERROR_TYPE_INFO,
343 "Discarding SYN message from `%s' due to denied blacklist check\n",
345 kill_session (address->transport_name,
351 * Function called by the transport for each received message.
353 * @param cls closure, const char* with the name of the plugin we received the message from
354 * @param address address and (claimed) identity of the other peer
355 * @param message the message, NULL if we only care about
356 * learning about the delay until we should receive again
357 * @param session identifier used for this session (NULL for plugins
358 * that do not offer bi-directional communication to the sender
359 * using the same "connection")
360 * @return how long the plugin should wait until receiving more data
361 * (plugins that do not support this, can ignore the return value)
363 struct GNUNET_TIME_Relative
364 GST_receive_callback (void *cls,
365 const struct GNUNET_HELLO_Address *address,
366 struct GNUNET_ATS_Session *session,
367 const struct GNUNET_MessageHeader *message)
369 const char *plugin_name = cls;
370 struct GNUNET_TIME_Relative ret;
373 ret = GNUNET_TIME_UNIT_ZERO;
376 type = ntohs (message->type);
377 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
378 "Received message with type %u from peer `%s'\n",
380 GNUNET_i2s (&address->peer));
382 GNUNET_STATISTICS_update (GST_stats,
383 gettext_noop ("# bytes total received"),
384 ntohs (message->size),
386 GST_neighbours_notify_data_recv (address,
390 case GNUNET_MESSAGE_TYPE_HELLO_LEGACY:
391 /* Legacy HELLO message, discard */
393 case GNUNET_MESSAGE_TYPE_HELLO:
394 if (GNUNET_OK != GST_validation_handle_hello (message))
397 GST_blacklist_abort_matching (address,
401 case GNUNET_MESSAGE_TYPE_TRANSPORT_PING:
402 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
403 "Processing PING from `%s'\n",
404 GST_plugins_a2s (address));
406 GST_validation_handle_ping (&address->peer,
411 GST_blacklist_abort_matching (address,
413 kill_session (plugin_name,
417 case GNUNET_MESSAGE_TYPE_TRANSPORT_PONG:
418 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG,
419 "Processing PONG from `%s'\n",
420 GST_plugins_a2s (address));
421 if (GNUNET_OK != GST_validation_handle_pong (&address->peer, message))
424 GST_blacklist_abort_matching (address,
426 kill_session (plugin_name, session);
429 case GNUNET_MESSAGE_TYPE_TRANSPORT_SESSION_SYN:
430 /* Do blacklist check if communication with this peer is allowed */
431 (void) GST_blacklist_test_allowed (&address->peer,
433 &connect_bl_check_cont,
434 GNUNET_copy_message (message),
438 case GNUNET_MESSAGE_TYPE_TRANSPORT_SESSION_SYN_ACK:
440 GST_neighbours_handle_session_syn_ack (message,
444 GST_blacklist_abort_matching (address, session);
445 kill_session (plugin_name, session);
448 case GNUNET_MESSAGE_TYPE_TRANSPORT_SESSION_ACK:
450 GST_neighbours_handle_session_ack (message,
455 GST_blacklist_abort_matching (address, session);
456 kill_session (plugin_name, session);
459 case GNUNET_MESSAGE_TYPE_TRANSPORT_SESSION_DISCONNECT:
460 GST_neighbours_handle_disconnect_message (&address->peer,
463 case GNUNET_MESSAGE_TYPE_TRANSPORT_SESSION_QUOTA:
464 GST_neighbours_handle_quota_message (&address->peer,
467 case GNUNET_MESSAGE_TYPE_TRANSPORT_SESSION_KEEPALIVE:
468 GST_neighbours_keepalive (&address->peer,
471 case GNUNET_MESSAGE_TYPE_TRANSPORT_SESSION_KEEPALIVE_RESPONSE:
472 GST_neighbours_keepalive_response (&address->peer,
476 /* should be payload */
477 GNUNET_STATISTICS_update (GST_stats,
478 gettext_noop ("# bytes payload received"),
479 ntohs (message->size),
481 ret = process_payload (address,
487 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
488 "Allowing receive from peer %s to continue in %s\n",
489 GNUNET_i2s (&address->peer),
490 GNUNET_STRINGS_relative_time_to_string (ret,
497 * Function that will be called for each address the transport
498 * is aware that it might be reachable under. Update our HELLO.
500 * @param cls name of the plugin (const char*)
501 * @param add_remove should the address added (YES) or removed (NO) from the
502 * set of valid addresses?
503 * @param address the address to add or remove
506 plugin_env_address_change_notification (void *cls,
508 const struct GNUNET_HELLO_Address *address)
510 static int addresses = 0;
511 struct GNUNET_STATISTICS_Handle *cfg = GST_stats;
513 if (GNUNET_YES == add_remove)
516 GNUNET_STATISTICS_update (cfg,
517 "# transport addresses",
521 else if (GNUNET_NO == add_remove)
530 GNUNET_STATISTICS_update (cfg,
531 "# transport addresses",
536 GNUNET_log (GNUNET_ERROR_TYPE_INFO,
537 "Transport now has %u addresses to communicate\n",
539 GST_hello_modify_addresses (add_remove,
545 * Function that will be called whenever the plugin internally
546 * cleans up a session pointer and hence the service needs to
547 * discard all of those sessions as well. Plugins that do not
548 * use sessions can simply omit calling this function and always
549 * use NULL wherever a session pointer is needed. This function
550 * should be called BEFORE a potential "TransmitContinuation"
551 * from the "TransmitFunction".
554 * @param address which address was the session for
555 * @param session which session is being destoyed
558 plugin_env_session_end (void *cls,
559 const struct GNUNET_HELLO_Address *address,
560 struct GNUNET_ATS_Session *session)
562 struct GNUNET_ATS_SessionKiller *sk;
574 GNUNET_assert (strlen (address->transport_name) > 0);
576 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
577 "Notification from plugin about terminated session %p from peer `%s' address `%s'\n",
579 GNUNET_i2s (&address->peer),
580 GST_plugins_a2s (address));
582 GST_neighbours_session_terminated (&address->peer, session);
583 GST_ats_del_session (address,
585 GST_blacklist_abort_matching (address, session);
587 for (sk = sk_head; NULL != sk; sk = sk->next)
589 if (sk->session == session)
591 GNUNET_CONTAINER_DLL_remove (sk_head, sk_tail, sk);
592 GNUNET_SCHEDULER_cancel (sk->task);
601 * Black list check result from blacklist check triggered when a
602 * plugin gave us a new session in #plugin_env_session_start(). If
603 * connection to the peer is disallowed, kill the session.
606 * @param peer the peer
607 * @param address address associated with the request
608 * @param session session associated with the request
609 * @param result the result
612 plugin_env_session_start_bl_check_cont (void *cls,
613 const struct GNUNET_PeerIdentity *peer,
614 const struct GNUNET_HELLO_Address *address,
615 struct GNUNET_ATS_Session *session,
618 if (GNUNET_OK != result)
620 kill_session (address->transport_name,
625 GNUNET_HELLO_address_check_option (address,
626 GNUNET_HELLO_ADDRESS_INFO_INBOUND))
628 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
629 "Informing verifier about inbound session's address `%s'\n",
630 GST_plugins_a2s (address));
631 GST_validation_handle_address (address);
637 * Plugin tells transport service about a new inbound session
640 * @param address the address
641 * @param session the new session
642 * @param scope network scope information
645 plugin_env_session_start (void *cls,
646 const struct GNUNET_HELLO_Address *address,
647 struct GNUNET_ATS_Session *session,
648 enum GNUNET_ATS_Network_Type scope)
650 struct GNUNET_ATS_Properties prop;
662 GNUNET_log (GNUNET_ERROR_TYPE_INFO,
663 "Notification from plugin `%s' about new session from peer `%s' address `%s'\n",
664 address->transport_name,
665 GNUNET_i2s (&address->peer),
666 GST_plugins_a2s (address));
668 GNUNET_HELLO_address_check_option (address,
669 GNUNET_HELLO_ADDRESS_INFO_INBOUND))
671 /* inbound is always new, but outbound MAY already be known, but
672 for example for UNIX, we have symmetric connections and thus we
673 may not know the address yet; add if necessary! */
674 /* FIXME: maybe change API here so we just pass scope? */
675 memset (&prop, 0, sizeof (prop));
676 GNUNET_break (GNUNET_ATS_NET_UNSPECIFIED != scope);
678 GST_ats_add_inbound_address (address,
682 /* Do blacklist check if communication with this peer is allowed */
683 (void) GST_blacklist_test_allowed (&address->peer,
684 address->transport_name,
685 &plugin_env_session_start_bl_check_cont,
693 * Function called by ATS to notify the callee that the
694 * assigned bandwidth or address for a given peer was changed. If the
695 * callback is called with address/bandwidth assignments of zero, the
696 * ATS disconnect function will still be called once the disconnect
700 * @param peer the peer this address is intended for
701 * @param address address to use (for peer given in address)
702 * @param session session to use (if available)
703 * @param bandwidth_out assigned outbound bandwidth for the connection in NBO,
704 * 0 to disconnect from peer
705 * @param bandwidth_in assigned inbound bandwidth for the connection in NBO,
706 * 0 to disconnect from peer
707 * @param ats ATS information
708 * @param ats_count number of @a ats elements
711 ats_request_address_change (void *cls,
712 const struct GNUNET_PeerIdentity *peer,
713 const struct GNUNET_HELLO_Address *address,
714 struct GNUNET_ATS_Session *session,
715 struct GNUNET_BANDWIDTH_Value32NBO bandwidth_out,
716 struct GNUNET_BANDWIDTH_Value32NBO bandwidth_in)
718 uint32_t bw_in = ntohl (bandwidth_in.value__);
719 uint32_t bw_out = ntohl (bandwidth_out.value__);
723 /* ATS service died, all suggestions become invalid!
724 (but we'll keep using the allocations for a little
725 while, to keep going while ATS restarts) */
726 /* FIXME: We should drop all
727 connections now, as ATS won't explicitly tell
728 us and be unaware of ongoing resource allocations! */
731 /* ATS tells me to disconnect from peer */
732 if ((0 == bw_in) && (0 == bw_out))
734 GNUNET_log (GNUNET_ERROR_TYPE_INFO,
735 "ATS tells me to disconnect from peer `%s'\n",
737 GST_neighbours_force_disconnect (peer);
740 GNUNET_assert (NULL != address);
741 GNUNET_STATISTICS_update (GST_stats,
742 "# ATS suggestions received",
745 GST_neighbours_switch_to_address (address,
753 * Function called when the service shuts down. Unloads our plugins
754 * and cancels pending validations.
756 * @param cls closure, unused
759 shutdown_task (void *cls)
761 GST_neighbours_stop ();
762 GST_plugins_unload ();
763 GST_validation_stop ();
765 GNUNET_ATS_scheduling_done (GST_ats);
767 GNUNET_ATS_connectivity_done (GST_ats_connect);
768 GST_ats_connect = NULL;
769 GNUNET_ATS_scanner_done (GST_is);
772 GST_blacklist_stop ();
774 GST_manipulation_stop ();
776 if (NULL != GST_peerinfo)
778 GNUNET_PEERINFO_disconnect (GST_peerinfo);
781 if (NULL != GST_stats)
783 GNUNET_STATISTICS_destroy (GST_stats, GNUNET_NO);
786 if (NULL != GST_my_private_key)
788 GNUNET_free(GST_my_private_key);
789 GST_my_private_key = NULL;
796 * Initiate transport service.
799 * @param server the initialized server
800 * @param c configuration to use
804 struct GNUNET_SERVER_Handle *server,
805 const struct GNUNET_CONFIGURATION_Handle *c)
808 struct GNUNET_CRYPTO_EddsaPrivateKey *pk;
809 long long unsigned int max_fd_cfg;
817 GNUNET_CONFIGURATION_get_value_filename (c,
822 GNUNET_log(GNUNET_ERROR_TYPE_ERROR,
823 _("Transport service is lacking key configuration settings. Exiting.\n"));
824 GNUNET_SCHEDULER_shutdown ();
828 GNUNET_CONFIGURATION_get_value_time (c,
833 hello_expiration = GNUNET_CONSTANTS_HELLO_ADDRESS_EXPIRATION;
836 pk = GNUNET_CRYPTO_eddsa_key_create_from_file (keyfile);
837 GNUNET_free (keyfile);
838 GNUNET_assert (NULL != pk);
839 GST_my_private_key = pk;
841 GST_stats = GNUNET_STATISTICS_create ("transport", GST_cfg);
842 GST_peerinfo = GNUNET_PEERINFO_connect (GST_cfg);
843 GNUNET_CRYPTO_eddsa_key_get_public (GST_my_private_key,
844 &GST_my_identity.public_key);
845 GNUNET_assert(NULL != GST_my_private_key);
847 GNUNET_log(GNUNET_ERROR_TYPE_INFO,
848 "My identity is `%4s'\n",
849 GNUNET_i2s_full (&GST_my_identity));
851 GNUNET_SCHEDULER_add_shutdown (&shutdown_task,
853 if (NULL == GST_peerinfo)
855 GNUNET_log(GNUNET_ERROR_TYPE_ERROR,
856 _("Could not access PEERINFO service. Exiting.\n"));
857 GNUNET_SCHEDULER_shutdown ();
864 struct rlimit r_file;
865 if (0 == getrlimit (RLIMIT_NOFILE, &r_file))
867 max_fd_rlimit = r_file.rlim_cur;
868 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
869 "Maximum number of open files was: %u/%u\n",
870 (unsigned int) r_file.rlim_cur,
871 (unsigned int) r_file.rlim_max);
873 max_fd_rlimit = (9 * max_fd_rlimit) / 10; /* Keep 10% for rest of transport */
875 GNUNET_CONFIGURATION_get_value_number (GST_cfg,
880 if (max_fd_cfg > max_fd_rlimit)
883 max_fd = max_fd_rlimit;
884 if (max_fd < DEFAULT_MAX_FDS)
885 max_fd = DEFAULT_MAX_FDS;
887 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
888 "Limiting number of sockets to %u: validation %u, neighbors: %u\n",
889 max_fd, (max_fd / 3), (max_fd / 3) * 2);
891 friend_only = GNUNET_CONFIGURATION_get_value_yesno (GST_cfg,
894 if (GNUNET_SYSERR == friend_only)
895 friend_only = GNUNET_NO; /* According to topology defaults */
896 /* start subsystems */
897 GST_blacklist_start (GST_server,
900 GST_is = GNUNET_ATS_scanner_init ();
901 GST_ats_connect = GNUNET_ATS_connectivity_init (GST_cfg);
902 GST_ats = GNUNET_ATS_scheduling_init (GST_cfg,
903 &ats_request_address_change,
906 GST_manipulation_init ();
907 GST_plugins_load (&GST_manipulation_recv,
908 &plugin_env_address_change_notification,
909 &plugin_env_session_start,
910 &plugin_env_session_end);
911 GST_hello_start (friend_only,
912 &process_hello_update,
914 GST_neighbours_start ((max_fd / 3) * 2);
915 GST_clients_start (GST_server);
916 GST_validation_start ((max_fd / 3));
921 * The main function for the transport service.
923 * @param argc number of arguments from the command line
924 * @param argv command line arguments
925 * @return 0 ok, 1 on error
933 == GNUNET_SERVICE_run (argc, argv, "transport",
934 GNUNET_SERVICE_OPTION_NONE, &run, NULL )) ? 0 : 1;
937 /* end of file gnunet-service-transport.c */