Skip to content

Commit 553248f

Browse files
committed
libssh2: raise lowest supported version to 1.2.8
Shipped on April 5 2011 Closes curl#16199
1 parent 3631c24 commit 553248f

File tree

4 files changed

+10
-100
lines changed

4 files changed

+10
-100
lines changed

configure.ac

+2-2
Original file line numberDiff line numberDiff line change
@@ -2329,8 +2329,8 @@ if test X"$OPT_LIBSSH2" != Xno; then
23292329
CPPFLAGS="$CPPFLAGS $CPP_SSH2"
23302330
LIBS="$LIB_SSH2 $LIBS"
23312331

2332-
dnl check for function added in libssh2 version 1.0
2333-
AC_CHECK_LIB(ssh2, libssh2_session_block_directions)
2332+
dnl check for function added in libssh2 version 1.2.8
2333+
AC_CHECK_LIB(ssh2, libssh2_free)
23342334

23352335
AC_CHECK_HEADER(libssh2.h,
23362336
curl_ssh_msg="enabled (libssh2)"

docs/INTERNALS.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ versions of libs and build tools.
2727
- OpenSSL 0.9.7
2828
- GnuTLS 3.1.10
2929
- zlib 1.2.0.4
30-
- libssh2 1.0
30+
- libssh2 1.2.8
3131
- c-ares 1.16.0
3232
- libidn2 2.0.0
3333
- wolfSSL 3.4.6

lib/vssh/libssh2.c

+1-58
Original file line numberDiff line numberDiff line change
@@ -389,8 +389,6 @@ static void state(struct Curl_easy *data, sshstate nowstate)
389389
sshc->state = nowstate;
390390
}
391391

392-
393-
#ifdef HAVE_LIBSSH2_KNOWNHOST_API
394392
static int sshkeycallback(CURL *easy,
395393
const struct curl_khkey *knownkey, /* known */
396394
const struct curl_khkey *foundkey, /* found */
@@ -405,37 +403,24 @@ static int sshkeycallback(CURL *easy,
405403
/* we only allow perfect matches, and we reject everything else */
406404
return (match != CURLKHMATCH_OK) ? CURLKHSTAT_REJECT : CURLKHSTAT_FINE;
407405
}
408-
#endif
409406

410407
/*
411408
* Earlier libssh2 versions did not have the ability to seek to 64-bit
412409
* positions with 32-bit size_t.
413410
*/
414-
#ifdef HAVE_LIBSSH2_SFTP_SEEK64
415411
#define SFTP_SEEK(x,y) libssh2_sftp_seek64(x, (libssh2_uint64_t)y)
416-
#else
417-
#define SFTP_SEEK(x,y) libssh2_sftp_seek(x, (size_t)y)
418-
#endif
419412

420413
/*
421414
* Earlier libssh2 versions did not do SCP properly beyond 32-bit sizes on
422415
* 32-bit architectures so we check of the necessary function is present.
423416
*/
424-
#ifndef HAVE_LIBSSH2_SCP_SEND64
425417
#define SCP_SEND(a,b,c,d) libssh2_scp_send_ex(a, b, (int)(c), (size_t)d, 0, 0)
426-
#else
427-
#define SCP_SEND(a,b,c,d) libssh2_scp_send64(a, b, (int)(c), \
428-
(libssh2_int64_t)d, 0, 0)
429-
#endif
430418

431419
/*
432420
* libssh2 1.2.8 fixed the problem with 32-bit ints used for sockets on win64.
433421
*/
434-
#ifdef HAVE_LIBSSH2_SESSION_HANDSHAKE
435422
#define session_startup(x,y) libssh2_session_handshake(x, y)
436-
#else
437-
#define session_startup(x,y) libssh2_session_startup(x, (int)y)
438-
#endif
423+
439424
static enum curl_khtype convert_ssh2_keytype(int sshkeytype)
440425
{
441426
enum curl_khtype keytype = CURLKHTYPE_UNKNOWN;
@@ -477,7 +462,6 @@ static CURLcode ssh_knownhost(struct Curl_easy *data)
477462
int rc = 0;
478463
CURLcode result = CURLE_OK;
479464

480-
#ifdef HAVE_LIBSSH2_KNOWNHOST_API
481465
if(data->set.str[STRING_SSH_KNOWNHOSTS]) {
482466
/* we are asked to verify the host against a file */
483467
struct connectdata *conn = data->conn;
@@ -537,7 +521,6 @@ static CURLcode ssh_knownhost(struct Curl_easy *data)
537521
/* no check means failure! */
538522
rc = CURLKHSTAT_REJECT;
539523
else {
540-
#ifdef HAVE_LIBSSH2_KNOWNHOST_CHECKP
541524
keycheck = libssh2_knownhost_checkp(sshc->kh,
542525
conn->host.name,
543526
(conn->remote_port != PORT_SSH) ?
@@ -547,15 +530,6 @@ static CURLcode ssh_knownhost(struct Curl_easy *data)
547530
LIBSSH2_KNOWNHOST_KEYENC_RAW|
548531
keybit,
549532
&host);
550-
#else
551-
keycheck = libssh2_knownhost_check(sshc->kh,
552-
conn->host.name,
553-
remotekey, keylen,
554-
LIBSSH2_KNOWNHOST_TYPE_PLAIN|
555-
LIBSSH2_KNOWNHOST_KEYENC_RAW|
556-
keybit,
557-
&host);
558-
#endif
559533

560534
infof(data, "SSH host check: %d, key: %s", keycheck,
561535
(keycheck <= LIBSSH2_KNOWNHOST_CHECK_MISMATCH) ?
@@ -639,9 +613,6 @@ static CURLcode ssh_knownhost(struct Curl_easy *data)
639613
break;
640614
}
641615
}
642-
#else /* HAVE_LIBSSH2_KNOWNHOST_API */
643-
(void)data;
644-
#endif
645616
return result;
646617
}
647618

@@ -819,8 +790,6 @@ static CURLcode ssh_force_knownhost_key_type(struct Curl_easy *data)
819790
{
820791
CURLcode result = CURLE_OK;
821792

822-
#ifdef HAVE_LIBSSH2_KNOWNHOST_API
823-
824793
#ifdef LIBSSH2_KNOWNHOST_KEY_ED25519
825794
static const char * const hostkey_method_ssh_ed25519
826795
= "ssh-ed25519";
@@ -916,12 +885,10 @@ static CURLcode ssh_force_knownhost_key_type(struct Curl_easy *data)
916885
break;
917886
#endif
918887
case LIBSSH2_KNOWNHOST_KEY_SSHRSA:
919-
#ifdef HAVE_LIBSSH2_VERSION
920888
if(libssh2_version(0x010900))
921889
/* since 1.9.0 libssh2_session_method_pref() works as expected */
922890
hostkey_method = hostkey_method_ssh_rsa_all;
923891
else
924-
#endif
925892
/* old libssh2 which cannot correctly remove unsupported methods due
926893
* to bug in src/kex.c or does not support the new methods anyways.
927894
*/
@@ -956,8 +923,6 @@ static CURLcode ssh_force_knownhost_key_type(struct Curl_easy *data)
956923
}
957924
}
958925

959-
#endif /* HAVE_LIBSSH2_KNOWNHOST_API */
960-
961926
return result;
962927
}
963928

@@ -1094,12 +1059,10 @@ static CURLcode sftp_quote(struct Curl_easy *data,
10941059
state(data, SSH_SFTP_QUOTE_UNLINK);
10951060
return result;
10961061
}
1097-
#ifdef HAS_STATVFS_SUPPORT
10981062
else if(strncasecompare(cmd, "statvfs ", 8)) {
10991063
state(data, SSH_SFTP_QUOTE_STATVFS);
11001064
return result;
11011065
}
1102-
#endif
11031066

11041067
failf(data, "Unknown SFTP command");
11051068
Curl_safefree(sshc->quote_path1);
@@ -1878,7 +1841,6 @@ static CURLcode ssh_statemachine(struct Curl_easy *data, bool *block)
18781841
break;
18791842

18801843
case SSH_AUTH_AGENT_INIT:
1881-
#ifdef HAVE_LIBSSH2_AGENT_API
18821844
if((data->set.ssh_auth_types & CURLSSH_AUTH_AGENT)
18831845
&& (strstr(sshc->authlist, "publickey") != NULL)) {
18841846

@@ -1908,12 +1870,10 @@ static CURLcode ssh_statemachine(struct Curl_easy *data, bool *block)
19081870
}
19091871
}
19101872
else
1911-
#endif /* HAVE_LIBSSH2_AGENT_API */
19121873
state(data, SSH_AUTH_KEY_INIT);
19131874
break;
19141875

19151876
case SSH_AUTH_AGENT_LIST:
1916-
#ifdef HAVE_LIBSSH2_AGENT_API
19171877
rc = libssh2_agent_list_identities(sshc->ssh_agent);
19181878

19191879
if(rc == LIBSSH2_ERROR_EAGAIN)
@@ -1927,11 +1887,9 @@ static CURLcode ssh_statemachine(struct Curl_easy *data, bool *block)
19271887
state(data, SSH_AUTH_AGENT);
19281888
sshc->sshagent_prev_identity = NULL;
19291889
}
1930-
#endif
19311890
break;
19321891

19331892
case SSH_AUTH_AGENT:
1934-
#ifdef HAVE_LIBSSH2_AGENT_API
19351893
/* as prev_identity evolves only after an identity user auth finished we
19361894
can safely request it again as long as EAGAIN is returned here or by
19371895
libssh2_agent_userauth */
@@ -1968,7 +1926,6 @@ static CURLcode ssh_statemachine(struct Curl_easy *data, bool *block)
19681926
state(data, SSH_AUTH_KEY_INIT);
19691927
rc = 0; /* clear rc and continue */
19701928
}
1971-
#endif
19721929
break;
19731930

19741931
case SSH_AUTH_KEY_INIT:
@@ -2920,14 +2877,11 @@ static CURLcode ssh_statemachine(struct Curl_easy *data, bool *block)
29202877
break;
29212878

29222879
case SSH_SESSION_FREE:
2923-
#ifdef HAVE_LIBSSH2_KNOWNHOST_API
29242880
if(sshc->kh) {
29252881
libssh2_knownhost_free(sshc->kh);
29262882
sshc->kh = NULL;
29272883
}
2928-
#endif
29292884

2930-
#ifdef HAVE_LIBSSH2_AGENT_API
29312885
if(sshc->ssh_agent) {
29322886
rc = libssh2_agent_disconnect(sshc->ssh_agent);
29332887
if(rc == LIBSSH2_ERROR_EAGAIN) {
@@ -2948,7 +2902,6 @@ static CURLcode ssh_statemachine(struct Curl_easy *data, bool *block)
29482902
sshc->sshagent_identity = NULL;
29492903
sshc->sshagent_prev_identity = NULL;
29502904
}
2951-
#endif
29522905

29532906
if(sshc->ssh_session) {
29542907
rc = libssh2_session_free(sshc->ssh_session);
@@ -2970,12 +2923,8 @@ static CURLcode ssh_statemachine(struct Curl_easy *data, bool *block)
29702923
DEBUGASSERT(sshc->ssh_channel == NULL);
29712924
DEBUGASSERT(sshc->sftp_session == NULL);
29722925
DEBUGASSERT(sshc->sftp_handle == NULL);
2973-
#ifdef HAVE_LIBSSH2_KNOWNHOST_API
29742926
DEBUGASSERT(sshc->kh == NULL);
2975-
#endif
2976-
#ifdef HAVE_LIBSSH2_AGENT_API
29772927
DEBUGASSERT(sshc->ssh_agent == NULL);
2978-
#endif
29792928

29802929
Curl_safefree(sshc->rsa_pub);
29812930
Curl_safefree(sshc->rsa);
@@ -3332,7 +3281,6 @@ static CURLcode ssh_connect(struct Curl_easy *data, bool *done)
33323281
infof(data, "Failed to enable compression for ssh session");
33333282
}
33343283

3335-
#ifdef HAVE_LIBSSH2_KNOWNHOST_API
33363284
if(data->set.str[STRING_SSH_KNOWNHOSTS]) {
33373285
int rc;
33383286
sshc->kh = libssh2_knownhost_init(sshc->ssh_session);
@@ -3350,7 +3298,6 @@ static CURLcode ssh_connect(struct Curl_easy *data, bool *done)
33503298
infof(data, "Failed to read known hosts from %s",
33513299
data->set.str[STRING_SSH_KNOWNHOSTS]);
33523300
}
3353-
#endif /* HAVE_LIBSSH2_KNOWNHOST_API */
33543301

33553302
#ifdef CURL_LIBSSH2_DEBUG
33563303
libssh2_trace(sshc->ssh_session, ~0);
@@ -3761,20 +3708,16 @@ static const char *sftp_libssh2_strerror(unsigned long err)
37613708

37623709
CURLcode Curl_ssh_init(void)
37633710
{
3764-
#ifdef HAVE_LIBSSH2_INIT
37653711
if(libssh2_init(0)) {
37663712
DEBUGF(fprintf(stderr, "Error: libssh2_init failed\n"));
37673713
return CURLE_FAILED_INIT;
37683714
}
3769-
#endif
37703715
return CURLE_OK;
37713716
}
37723717

37733718
void Curl_ssh_cleanup(void)
37743719
{
3775-
#ifdef HAVE_LIBSSH2_EXIT
37763720
(void)libssh2_exit();
3777-
#endif
37783721
}
37793722

37803723
void Curl_ssh_version(char *buffer, size_t buflen)

lib/vssh/ssh.h

+6-39
Original file line numberDiff line numberDiff line change
@@ -201,17 +201,10 @@ struct ssh_conn {
201201
Curl_send *tls_send;
202202
#endif
203203

204-
#ifdef HAVE_LIBSSH2_AGENT_API
205204
LIBSSH2_AGENT *ssh_agent; /* proxy to ssh-agent/pageant */
206-
struct libssh2_agent_publickey *sshagent_identity,
207-
*sshagent_prev_identity;
208-
#endif
209-
210-
/* note that HAVE_LIBSSH2_KNOWNHOST_API is a define set in the libssh2.h
211-
header */
212-
#ifdef HAVE_LIBSSH2_KNOWNHOST_API
205+
struct libssh2_agent_publickey *sshagent_identity;
206+
struct libssh2_agent_publickey *sshagent_prev_identity;
213207
LIBSSH2_KNOWNHOSTS *kh;
214-
#endif
215208
#elif defined(USE_WOLFSSH)
216209
WOLFSSH *ssh_session;
217210
WOLFSSH_CTX *ctx;
@@ -226,39 +219,13 @@ struct ssh_conn {
226219
/* Feature detection based on version numbers to better work with
227220
non-configure platforms */
228221

229-
#if !defined(LIBSSH2_VERSION_NUM) || (LIBSSH2_VERSION_NUM < 0x001000)
230-
# error "SCP/SFTP protocols require libssh2 0.16 or later"
231-
#endif
232-
233-
#if LIBSSH2_VERSION_NUM >= 0x010000
234-
#define HAVE_LIBSSH2_SFTP_SEEK64 1
235-
#endif
236-
237-
#if LIBSSH2_VERSION_NUM >= 0x010100
238-
#define HAVE_LIBSSH2_VERSION 1
222+
#if !defined(LIBSSH2_VERSION_NUM) || (LIBSSH2_VERSION_NUM < 0x010208)
223+
# error "SCP/SFTP protocols require libssh2 1.2.8 or later"
224+
/* 1.2.8 was released on April 5 2011 */
239225
#endif
240226

241-
#if LIBSSH2_VERSION_NUM >= 0x010205
242-
#define HAVE_LIBSSH2_INIT 1
243-
#define HAVE_LIBSSH2_EXIT 1
244-
#endif
245-
246-
#if LIBSSH2_VERSION_NUM >= 0x010206
247-
#define HAVE_LIBSSH2_KNOWNHOST_CHECKP 1
248-
#define HAVE_LIBSSH2_SCP_SEND64 1
249-
#endif
250-
251-
#if LIBSSH2_VERSION_NUM >= 0x010208
252-
#define HAVE_LIBSSH2_SESSION_HANDSHAKE 1
253-
#endif
254-
255-
#ifdef HAVE_LIBSSH2_VERSION
256-
/* get it runtime if possible */
227+
/* get it at runtime */
257228
#define CURL_LIBSSH2_VERSION libssh2_version(0)
258-
#else
259-
/* use build-time if runtime not possible */
260-
#define CURL_LIBSSH2_VERSION LIBSSH2_VERSION
261-
#endif
262229

263230
#endif /* USE_LIBSSH2 */
264231

0 commit comments

Comments
 (0)