sonixlabs-net-ssh 2.3.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (123) hide show
  1. data/CHANGELOG.rdoc +262 -0
  2. data/Manifest +121 -0
  3. data/README.rdoc +184 -0
  4. data/Rakefile +86 -0
  5. data/Rudyfile +96 -0
  6. data/THANKS.rdoc +19 -0
  7. data/lib/net/ssh.rb +223 -0
  8. data/lib/net/ssh/authentication/agent.rb +179 -0
  9. data/lib/net/ssh/authentication/constants.rb +18 -0
  10. data/lib/net/ssh/authentication/key_manager.rb +253 -0
  11. data/lib/net/ssh/authentication/methods/abstract.rb +60 -0
  12. data/lib/net/ssh/authentication/methods/hostbased.rb +75 -0
  13. data/lib/net/ssh/authentication/methods/keyboard_interactive.rb +70 -0
  14. data/lib/net/ssh/authentication/methods/password.rb +43 -0
  15. data/lib/net/ssh/authentication/methods/publickey.rb +96 -0
  16. data/lib/net/ssh/authentication/pageant.rb +264 -0
  17. data/lib/net/ssh/authentication/session.rb +146 -0
  18. data/lib/net/ssh/buffer.rb +340 -0
  19. data/lib/net/ssh/buffered_io.rb +198 -0
  20. data/lib/net/ssh/config.rb +207 -0
  21. data/lib/net/ssh/connection/channel.rb +630 -0
  22. data/lib/net/ssh/connection/constants.rb +33 -0
  23. data/lib/net/ssh/connection/session.rb +597 -0
  24. data/lib/net/ssh/connection/term.rb +178 -0
  25. data/lib/net/ssh/errors.rb +88 -0
  26. data/lib/net/ssh/key_factory.rb +102 -0
  27. data/lib/net/ssh/known_hosts.rb +129 -0
  28. data/lib/net/ssh/loggable.rb +61 -0
  29. data/lib/net/ssh/packet.rb +102 -0
  30. data/lib/net/ssh/prompt.rb +93 -0
  31. data/lib/net/ssh/proxy/command.rb +75 -0
  32. data/lib/net/ssh/proxy/errors.rb +14 -0
  33. data/lib/net/ssh/proxy/http.rb +94 -0
  34. data/lib/net/ssh/proxy/socks4.rb +70 -0
  35. data/lib/net/ssh/proxy/socks5.rb +142 -0
  36. data/lib/net/ssh/ruby_compat.rb +43 -0
  37. data/lib/net/ssh/service/forward.rb +298 -0
  38. data/lib/net/ssh/test.rb +89 -0
  39. data/lib/net/ssh/test/channel.rb +129 -0
  40. data/lib/net/ssh/test/extensions.rb +152 -0
  41. data/lib/net/ssh/test/kex.rb +44 -0
  42. data/lib/net/ssh/test/local_packet.rb +51 -0
  43. data/lib/net/ssh/test/packet.rb +81 -0
  44. data/lib/net/ssh/test/remote_packet.rb +38 -0
  45. data/lib/net/ssh/test/script.rb +157 -0
  46. data/lib/net/ssh/test/socket.rb +64 -0
  47. data/lib/net/ssh/transport/algorithms.rb +386 -0
  48. data/lib/net/ssh/transport/cipher_factory.rb +79 -0
  49. data/lib/net/ssh/transport/constants.rb +30 -0
  50. data/lib/net/ssh/transport/hmac.rb +42 -0
  51. data/lib/net/ssh/transport/hmac/abstract.rb +79 -0
  52. data/lib/net/ssh/transport/hmac/md5.rb +12 -0
  53. data/lib/net/ssh/transport/hmac/md5_96.rb +11 -0
  54. data/lib/net/ssh/transport/hmac/none.rb +15 -0
  55. data/lib/net/ssh/transport/hmac/sha1.rb +13 -0
  56. data/lib/net/ssh/transport/hmac/sha1_96.rb +11 -0
  57. data/lib/net/ssh/transport/hmac/sha2_256.rb +15 -0
  58. data/lib/net/ssh/transport/hmac/sha2_256_96.rb +13 -0
  59. data/lib/net/ssh/transport/hmac/sha2_512.rb +14 -0
  60. data/lib/net/ssh/transport/hmac/sha2_512_96.rb +13 -0
  61. data/lib/net/ssh/transport/identity_cipher.rb +55 -0
  62. data/lib/net/ssh/transport/kex.rb +17 -0
  63. data/lib/net/ssh/transport/kex/diffie_hellman_group1_sha1.rb +208 -0
  64. data/lib/net/ssh/transport/kex/diffie_hellman_group_exchange_sha1.rb +80 -0
  65. data/lib/net/ssh/transport/kex/diffie_hellman_group_exchange_sha256.rb +15 -0
  66. data/lib/net/ssh/transport/key_expander.rb +26 -0
  67. data/lib/net/ssh/transport/openssl.rb +127 -0
  68. data/lib/net/ssh/transport/packet_stream.rb +235 -0
  69. data/lib/net/ssh/transport/server_version.rb +71 -0
  70. data/lib/net/ssh/transport/session.rb +278 -0
  71. data/lib/net/ssh/transport/state.rb +206 -0
  72. data/lib/net/ssh/verifiers/lenient.rb +30 -0
  73. data/lib/net/ssh/verifiers/null.rb +12 -0
  74. data/lib/net/ssh/verifiers/strict.rb +53 -0
  75. data/lib/net/ssh/version.rb +62 -0
  76. data/lib/sonixlabs-net-ssh.rb +1 -0
  77. data/net-ssh.gemspec +145 -0
  78. data/setup.rb +1585 -0
  79. data/support/arcfour_check.rb +20 -0
  80. data/support/ssh_tunnel_bug.rb +65 -0
  81. data/test/authentication/methods/common.rb +28 -0
  82. data/test/authentication/methods/test_abstract.rb +51 -0
  83. data/test/authentication/methods/test_hostbased.rb +114 -0
  84. data/test/authentication/methods/test_keyboard_interactive.rb +100 -0
  85. data/test/authentication/methods/test_password.rb +52 -0
  86. data/test/authentication/methods/test_publickey.rb +148 -0
  87. data/test/authentication/test_agent.rb +205 -0
  88. data/test/authentication/test_key_manager.rb +171 -0
  89. data/test/authentication/test_session.rb +106 -0
  90. data/test/common.rb +107 -0
  91. data/test/configs/eqsign +3 -0
  92. data/test/configs/exact_match +8 -0
  93. data/test/configs/host_plus +10 -0
  94. data/test/configs/multihost +4 -0
  95. data/test/configs/wild_cards +14 -0
  96. data/test/connection/test_channel.rb +467 -0
  97. data/test/connection/test_session.rb +488 -0
  98. data/test/test_all.rb +9 -0
  99. data/test/test_buffer.rb +336 -0
  100. data/test/test_buffered_io.rb +63 -0
  101. data/test/test_config.rb +120 -0
  102. data/test/test_key_factory.rb +79 -0
  103. data/test/transport/hmac/test_md5.rb +39 -0
  104. data/test/transport/hmac/test_md5_96.rb +25 -0
  105. data/test/transport/hmac/test_none.rb +34 -0
  106. data/test/transport/hmac/test_sha1.rb +34 -0
  107. data/test/transport/hmac/test_sha1_96.rb +25 -0
  108. data/test/transport/hmac/test_sha2_256.rb +35 -0
  109. data/test/transport/hmac/test_sha2_256_96.rb +25 -0
  110. data/test/transport/hmac/test_sha2_512.rb +35 -0
  111. data/test/transport/hmac/test_sha2_512_96.rb +25 -0
  112. data/test/transport/kex/test_diffie_hellman_group1_sha1.rb +146 -0
  113. data/test/transport/kex/test_diffie_hellman_group_exchange_sha1.rb +92 -0
  114. data/test/transport/kex/test_diffie_hellman_group_exchange_sha256.rb +33 -0
  115. data/test/transport/test_algorithms.rb +308 -0
  116. data/test/transport/test_cipher_factory.rb +213 -0
  117. data/test/transport/test_hmac.rb +34 -0
  118. data/test/transport/test_identity_cipher.rb +40 -0
  119. data/test/transport/test_packet_stream.rb +736 -0
  120. data/test/transport/test_server_version.rb +78 -0
  121. data/test/transport/test_session.rb +315 -0
  122. data/test/transport/test_state.rb +179 -0
  123. metadata +178 -0
@@ -0,0 +1,79 @@
1
+ require 'openssl'
2
+ require 'net/ssh/transport/key_expander'
3
+ require 'net/ssh/transport/identity_cipher'
4
+
5
+ module Net; module SSH; module Transport
6
+
7
+ # Implements a factory of OpenSSL cipher algorithms.
8
+ class CipherFactory
9
+ # Maps the SSH name of a cipher to it's corresponding OpenSSL name
10
+ SSH_TO_OSSL = {
11
+ "3des-cbc" => "des-ede3-cbc",
12
+ "blowfish-cbc" => "bf-cbc",
13
+ "aes256-cbc" => "aes-256-cbc",
14
+ "aes192-cbc" => "aes-192-cbc",
15
+ "aes128-cbc" => "aes-128-cbc",
16
+ "idea-cbc" => "idea-cbc",
17
+ "cast128-cbc" => "cast-cbc",
18
+ "rijndael-cbc@lysator.liu.se" => "aes-256-cbc",
19
+ "arcfour128" => "rc4",
20
+ "arcfour256" => "rc4",
21
+ "arcfour512" => "rc4",
22
+ "none" => "none"
23
+ }
24
+
25
+ # Ruby's OpenSSL bindings always return a key length of 16 for RC4 ciphers
26
+ # resulting in the error: OpenSSL::CipherError: key length too short.
27
+ # The following ciphers will override this key length.
28
+ KEY_LEN_OVERRIDE = {
29
+ "arcfour256" => 32,
30
+ "arcfour512" => 64
31
+ }
32
+
33
+ # Returns true if the underlying OpenSSL library supports the given cipher,
34
+ # and false otherwise.
35
+ def self.supported?(name)
36
+ ossl_name = SSH_TO_OSSL[name] or raise NotImplementedError, "unimplemented cipher `#{name}'"
37
+ return true if ossl_name == "none"
38
+ return OpenSSL::Cipher.ciphers.include?(ossl_name)
39
+ end
40
+
41
+ # Retrieves a new instance of the named algorithm. The new instance
42
+ # will be initialized using an iv and key generated from the given
43
+ # iv, key, shared, hash and digester values. Additionally, the
44
+ # cipher will be put into encryption or decryption mode, based on the
45
+ # value of the +encrypt+ parameter.
46
+ def self.get(name, options={})
47
+ ossl_name = SSH_TO_OSSL[name] or raise NotImplementedError, "unimplemented cipher `#{name}'"
48
+ return IdentityCipher if ossl_name == "none"
49
+
50
+ cipher = OpenSSL::Cipher::Cipher.new(ossl_name)
51
+ cipher.__send__(options[:encrypt] ? :encrypt : :decrypt)
52
+
53
+ cipher.padding = 0
54
+ cipher.iv = Net::SSH::Transport::KeyExpander.expand_key(cipher.iv_len, options[:iv], options) if ossl_name != "rc4"
55
+ key_len = KEY_LEN_OVERRIDE[name] || cipher.key_len
56
+ cipher.key_len = key_len
57
+ cipher.key = Net::SSH::Transport::KeyExpander.expand_key(key_len, options[:key], options)
58
+ cipher.update(" " * 1536) if ossl_name == "rc4"
59
+
60
+ return cipher
61
+ end
62
+
63
+ # Returns a two-element array containing the [ key-length,
64
+ # block-size ] for the named cipher algorithm. If the cipher
65
+ # algorithm is unknown, or is "none", 0 is returned for both elements
66
+ # of the tuple.
67
+ def self.get_lengths(name)
68
+ ossl_name = SSH_TO_OSSL[name]
69
+ return [0, 0] if ossl_name.nil? || ossl_name == "none"
70
+
71
+ cipher = OpenSSL::Cipher::Cipher.new(ossl_name)
72
+ key_len = KEY_LEN_OVERRIDE[name] || cipher.key_len
73
+ cipher.key_len = key_len
74
+
75
+ return [key_len, ossl_name=="rc4" ? 8 : cipher.block_size]
76
+ end
77
+ end
78
+
79
+ end; end; end
@@ -0,0 +1,30 @@
1
+ module Net; module SSH; module Transport
2
+ module Constants
3
+
4
+ #--
5
+ # Transport layer generic messages
6
+ #++
7
+
8
+ DISCONNECT = 1
9
+ IGNORE = 2
10
+ UNIMPLEMENTED = 3
11
+ DEBUG = 4
12
+ SERVICE_REQUEST = 5
13
+ SERVICE_ACCEPT = 6
14
+
15
+ #--
16
+ # Algorithm negotiation messages
17
+ #++
18
+
19
+ KEXINIT = 20
20
+ NEWKEYS = 21
21
+
22
+ #--
23
+ # Key exchange method specific messages
24
+ #++
25
+
26
+ KEXDH_INIT = 30
27
+ KEXDH_REPLY = 31
28
+
29
+ end
30
+ end; end; end
@@ -0,0 +1,42 @@
1
+ require 'net/ssh/transport/key_expander'
2
+ require 'net/ssh/transport/hmac/md5'
3
+ require 'net/ssh/transport/hmac/md5_96'
4
+ require 'net/ssh/transport/hmac/sha1'
5
+ require 'net/ssh/transport/hmac/sha1_96'
6
+ require 'net/ssh/transport/hmac/sha2_256'
7
+ require 'net/ssh/transport/hmac/sha2_256_96'
8
+ require 'net/ssh/transport/hmac/sha2_512'
9
+ require 'net/ssh/transport/hmac/sha2_512_96'
10
+ require 'net/ssh/transport/hmac/none'
11
+
12
+ # Implements a simple factory interface for fetching hmac implementations, or
13
+ # for finding the key lengths for hmac implementations.s
14
+ module Net::SSH::Transport::HMAC
15
+ # The mapping of SSH hmac algorithms to their implementations
16
+ MAP = {
17
+ 'hmac-md5' => MD5,
18
+ 'hmac-md5-96' => MD5_96,
19
+ 'hmac-sha1' => SHA1,
20
+ 'hmac-sha1-96' => SHA1_96,
21
+ 'none' => None
22
+ }
23
+
24
+ # add mapping to sha2 hmac algorithms if they're available
25
+ MAP['hmac-sha2-256'] = SHA2_256 if defined?(::Net::SSH::Transport::HMAC::SHA2_256)
26
+ MAP['hmac-sha2-256-96'] = SHA2_256_96 if defined?(::Net::SSH::Transport::HMAC::SHA2_256_96)
27
+ MAP['hmac-sha2-512'] = SHA2_512 if defined?(::Net::SSH::Transport::HMAC::SHA2_512)
28
+ MAP['hmac-sha2-512-96'] = SHA2_512_96 if defined?(::Net::SSH::Transport::HMAC::SHA2_512_96)
29
+
30
+ # Retrieves a new hmac instance of the given SSH type (+name+). If +key+ is
31
+ # given, the new instance will be initialized with that key.
32
+ def self.get(name, key="", parameters = {})
33
+ impl = MAP[name] or raise ArgumentError, "hmac not found: #{name.inspect}"
34
+ impl.new(Net::SSH::Transport::KeyExpander.expand_key(impl.key_length, key, parameters))
35
+ end
36
+
37
+ # Retrieves the key length for the hmac of the given SSH type (+name+).
38
+ def self.key_length(name)
39
+ impl = MAP[name] or raise ArgumentError, "hmac not found: #{name.inspect}"
40
+ impl.key_length
41
+ end
42
+ end
@@ -0,0 +1,79 @@
1
+ require 'openssl'
2
+ require 'openssl/digest'
3
+
4
+ module Net; module SSH; module Transport; module HMAC
5
+
6
+ # The base class of all OpenSSL-based HMAC algorithm wrappers.
7
+ class Abstract
8
+
9
+ class <<self
10
+ def key_length(*v)
11
+ @key_length = nil if !defined?(@key_length)
12
+ if v.empty?
13
+ @key_length = superclass.key_length if @key_length.nil? && superclass.respond_to?(:key_length)
14
+ return @key_length
15
+ elsif v.length == 1
16
+ @key_length = v.first
17
+ else
18
+ raise ArgumentError, "wrong number of arguments (#{v.length} for 1)"
19
+ end
20
+ end
21
+
22
+ def mac_length(*v)
23
+ @mac_length = nil if !defined?(@mac_length)
24
+ if v.empty?
25
+ @mac_length = superclass.mac_length if @mac_length.nil? && superclass.respond_to?(:mac_length)
26
+ return @mac_length
27
+ elsif v.length == 1
28
+ @mac_length = v.first
29
+ else
30
+ raise ArgumentError, "wrong number of arguments (#{v.length} for 1)"
31
+ end
32
+ end
33
+
34
+ def digest_class(*v)
35
+ @digest_class = nil if !defined?(@digest_class)
36
+ if v.empty?
37
+ @digest_class = superclass.digest_class if @digest_class.nil? && superclass.respond_to?(:digest_class)
38
+ return @digest_class
39
+ elsif v.length == 1
40
+ @digest_class = v.first
41
+ else
42
+ raise ArgumentError, "wrong number of arguments (#{v.length} for 1)"
43
+ end
44
+ end
45
+ end
46
+
47
+ def key_length
48
+ self.class.key_length
49
+ end
50
+
51
+ def mac_length
52
+ self.class.mac_length
53
+ end
54
+
55
+ def digest_class
56
+ self.class.digest_class
57
+ end
58
+
59
+ # The key in use for this instance.
60
+ attr_reader :key
61
+
62
+ def initialize(key=nil)
63
+ self.key = key
64
+ end
65
+
66
+ # Sets the key to the given value, truncating it so that it is the correct
67
+ # length.
68
+ def key=(value)
69
+ @key = value ? value.to_s[0,key_length] : nil
70
+ end
71
+
72
+ # Compute the HMAC digest for the given data string.
73
+ def digest(data)
74
+ OpenSSL::HMAC.digest(digest_class.new, key, data)[0,mac_length]
75
+ end
76
+
77
+ end
78
+
79
+ end; end; end; end
@@ -0,0 +1,12 @@
1
+ require 'net/ssh/transport/hmac/abstract'
2
+
3
+ module Net::SSH::Transport::HMAC
4
+
5
+ # The MD5 HMAC algorithm.
6
+ class MD5 < Abstract
7
+ mac_length 16
8
+ key_length 16
9
+ digest_class OpenSSL::Digest::MD5
10
+ end
11
+
12
+ end
@@ -0,0 +1,11 @@
1
+ require 'net/ssh/transport/hmac/md5'
2
+
3
+ module Net::SSH::Transport::HMAC
4
+
5
+ # The MD5-96 HMAC algorithm. This returns only the first 12 bytes of
6
+ # the digest.
7
+ class MD5_96 < MD5
8
+ mac_length 12
9
+ end
10
+
11
+ end
@@ -0,0 +1,15 @@
1
+ require 'net/ssh/transport/hmac/abstract'
2
+
3
+ module Net::SSH::Transport::HMAC
4
+
5
+ # The "none" algorithm. This has a key and mac length of 0.
6
+ class None < Abstract
7
+ key_length 0
8
+ mac_length 0
9
+
10
+ def digest(data)
11
+ ""
12
+ end
13
+ end
14
+
15
+ end
@@ -0,0 +1,13 @@
1
+ require 'net/ssh/transport/hmac/abstract'
2
+
3
+ module Net::SSH::Transport::HMAC
4
+
5
+ # The SHA1 HMAC algorithm. This has a mac and key length of 20, and
6
+ # uses the SHA1 digest algorithm.
7
+ class SHA1 < Abstract
8
+ mac_length 20
9
+ key_length 20
10
+ digest_class OpenSSL::Digest::SHA1
11
+ end
12
+
13
+ end
@@ -0,0 +1,11 @@
1
+ require 'net/ssh/transport/hmac/sha1'
2
+
3
+ module Net::SSH::Transport::HMAC
4
+
5
+ # The SHA1-96 HMAC algorithm. This returns only the first 12 bytes of
6
+ # the digest.
7
+ class SHA1_96 < SHA1
8
+ mac_length 12
9
+ end
10
+
11
+ end
@@ -0,0 +1,15 @@
1
+ require 'net/ssh/transport/hmac/abstract'
2
+
3
+ if defined?(OpenSSL::Digest::SHA256) # need openssl support
4
+ module Net::SSH::Transport::HMAC
5
+
6
+ # The SHA-256 HMAC algorithm. This has a mac and key length of 32, and
7
+ # uses the SHA-256 digest algorithm.
8
+ class SHA2_256 < Abstract
9
+ mac_length 32
10
+ key_length 32
11
+ digest_class OpenSSL::Digest::SHA256
12
+ end
13
+
14
+ end
15
+ end
@@ -0,0 +1,13 @@
1
+ require 'net/ssh/transport/hmac/abstract'
2
+
3
+ module Net::SSH::Transport::HMAC
4
+
5
+ if defined?(SHA2_256) # need openssl support
6
+ # The SHA256-96 HMAC algorithm. This returns only the first 12 bytes of
7
+ # the digest.
8
+ class SHA2_256_96 < SHA2_256
9
+ mac_length 12
10
+ end
11
+ end
12
+
13
+ end
@@ -0,0 +1,14 @@
1
+ require 'net/ssh/transport/hmac/abstract'
2
+
3
+ module Net::SSH::Transport::HMAC
4
+
5
+ if defined?(OpenSSL::Digest::SHA512) # need openssl support
6
+ # The SHA-512 HMAC algorithm. This has a mac and key length of 64, and
7
+ # uses the SHA-512 digest algorithm.
8
+ class SHA2_512 < Abstract
9
+ mac_length 64
10
+ key_length 64
11
+ digest_class OpenSSL::Digest::SHA512
12
+ end
13
+ end
14
+ end
@@ -0,0 +1,13 @@
1
+ require 'net/ssh/transport/hmac/abstract'
2
+
3
+ module Net::SSH::Transport::HMAC
4
+
5
+ if defined?(SHA2_512) # need openssl support
6
+ # The SHA2-512-96 HMAC algorithm. This returns only the first 12 bytes of
7
+ # the digest.
8
+ class SHA2_512_96 < SHA2_512
9
+ mac_length 12
10
+ end
11
+ end
12
+
13
+ end
@@ -0,0 +1,55 @@
1
+ module Net; module SSH; module Transport
2
+
3
+ # A cipher that does nothing but pass the data through, unchanged. This
4
+ # keeps things in the code nice and clean when a cipher has not yet been
5
+ # determined (i.e., during key exchange).
6
+ class IdentityCipher
7
+ class <<self
8
+ # A default block size of 8 is required by the SSH2 protocol.
9
+ def block_size
10
+ 8
11
+ end
12
+
13
+ # Returns an arbitrary integer.
14
+ def iv_len
15
+ 4
16
+ end
17
+
18
+ # Does nothing. Returns self.
19
+ def encrypt
20
+ self
21
+ end
22
+
23
+ # Does nothing. Returns self.
24
+ def decrypt
25
+ self
26
+ end
27
+
28
+ # Passes its single argument through unchanged.
29
+ def update(text)
30
+ text
31
+ end
32
+
33
+ # Returns the empty string.
34
+ def final
35
+ ""
36
+ end
37
+
38
+ # The name of this cipher, which is "identity".
39
+ def name
40
+ "identity"
41
+ end
42
+
43
+ # Does nothing. Returns nil.
44
+ def iv=(v)
45
+ nil
46
+ end
47
+
48
+ # Does nothing. Returns self.
49
+ def reset
50
+ self
51
+ end
52
+ end
53
+ end
54
+
55
+ end; end; end
@@ -0,0 +1,17 @@
1
+ require 'net/ssh/transport/kex/diffie_hellman_group1_sha1'
2
+ require 'net/ssh/transport/kex/diffie_hellman_group_exchange_sha1'
3
+ require 'net/ssh/transport/kex/diffie_hellman_group_exchange_sha256'
4
+
5
+ module Net::SSH::Transport
6
+ module Kex
7
+ # Maps the supported key-exchange algorithms as named by the SSH protocol
8
+ # to their corresponding implementors.
9
+ MAP = {
10
+ 'diffie-hellman-group-exchange-sha1' => DiffieHellmanGroupExchangeSHA1,
11
+ 'diffie-hellman-group1-sha1' => DiffieHellmanGroup1SHA1,
12
+ }
13
+ if defined?(DiffieHellmanGroupExchangeSHA256)
14
+ MAP['diffie-hellman-group-exchange-sha256'] = DiffieHellmanGroupExchangeSHA256
15
+ end
16
+ end
17
+ end