@@ -389,8 +389,6 @@ static void state(struct Curl_easy *data, sshstate nowstate)
389
389
sshc -> state = nowstate ;
390
390
}
391
391
392
-
393
- #ifdef HAVE_LIBSSH2_KNOWNHOST_API
394
392
static int sshkeycallback (CURL * easy ,
395
393
const struct curl_khkey * knownkey , /* known */
396
394
const struct curl_khkey * foundkey , /* found */
@@ -405,37 +403,24 @@ static int sshkeycallback(CURL *easy,
405
403
/* we only allow perfect matches, and we reject everything else */
406
404
return (match != CURLKHMATCH_OK ) ? CURLKHSTAT_REJECT : CURLKHSTAT_FINE ;
407
405
}
408
- #endif
409
406
410
407
/*
411
408
* Earlier libssh2 versions did not have the ability to seek to 64-bit
412
409
* positions with 32-bit size_t.
413
410
*/
414
- #ifdef HAVE_LIBSSH2_SFTP_SEEK64
415
411
#define SFTP_SEEK (x ,y ) libssh2_sftp_seek64(x, (libssh2_uint64_t)y)
416
- #else
417
- #define SFTP_SEEK (x ,y ) libssh2_sftp_seek(x, (size_t)y)
418
- #endif
419
412
420
413
/*
421
414
* Earlier libssh2 versions did not do SCP properly beyond 32-bit sizes on
422
415
* 32-bit architectures so we check of the necessary function is present.
423
416
*/
424
- #ifndef HAVE_LIBSSH2_SCP_SEND64
425
417
#define SCP_SEND (a ,b ,c ,d ) libssh2_scp_send_ex(a, b, (int)(c), (size_t)d, 0, 0)
426
- #else
427
- #define SCP_SEND (a ,b ,c ,d ) libssh2_scp_send64(a, b, (int)(c), \
428
- (libssh2_int64_t)d, 0, 0)
429
- #endif
430
418
431
419
/*
432
420
* libssh2 1.2.8 fixed the problem with 32-bit ints used for sockets on win64.
433
421
*/
434
- #ifdef HAVE_LIBSSH2_SESSION_HANDSHAKE
435
422
#define session_startup (x ,y ) libssh2_session_handshake(x, y)
436
- #else
437
- #define session_startup (x ,y ) libssh2_session_startup(x, (int)y)
438
- #endif
423
+
439
424
static enum curl_khtype convert_ssh2_keytype (int sshkeytype )
440
425
{
441
426
enum curl_khtype keytype = CURLKHTYPE_UNKNOWN ;
@@ -477,7 +462,6 @@ static CURLcode ssh_knownhost(struct Curl_easy *data)
477
462
int rc = 0 ;
478
463
CURLcode result = CURLE_OK ;
479
464
480
- #ifdef HAVE_LIBSSH2_KNOWNHOST_API
481
465
if (data -> set .str [STRING_SSH_KNOWNHOSTS ]) {
482
466
/* we are asked to verify the host against a file */
483
467
struct connectdata * conn = data -> conn ;
@@ -537,7 +521,6 @@ static CURLcode ssh_knownhost(struct Curl_easy *data)
537
521
/* no check means failure! */
538
522
rc = CURLKHSTAT_REJECT ;
539
523
else {
540
- #ifdef HAVE_LIBSSH2_KNOWNHOST_CHECKP
541
524
keycheck = libssh2_knownhost_checkp (sshc -> kh ,
542
525
conn -> host .name ,
543
526
(conn -> remote_port != PORT_SSH ) ?
@@ -547,15 +530,6 @@ static CURLcode ssh_knownhost(struct Curl_easy *data)
547
530
LIBSSH2_KNOWNHOST_KEYENC_RAW |
548
531
keybit ,
549
532
& host );
550
- #else
551
- keycheck = libssh2_knownhost_check (sshc -> kh ,
552
- conn -> host .name ,
553
- remotekey , keylen ,
554
- LIBSSH2_KNOWNHOST_TYPE_PLAIN |
555
- LIBSSH2_KNOWNHOST_KEYENC_RAW |
556
- keybit ,
557
- & host );
558
- #endif
559
533
560
534
infof (data , "SSH host check: %d, key: %s" , keycheck ,
561
535
(keycheck <= LIBSSH2_KNOWNHOST_CHECK_MISMATCH ) ?
@@ -639,9 +613,6 @@ static CURLcode ssh_knownhost(struct Curl_easy *data)
639
613
break ;
640
614
}
641
615
}
642
- #else /* HAVE_LIBSSH2_KNOWNHOST_API */
643
- (void )data ;
644
- #endif
645
616
return result ;
646
617
}
647
618
@@ -819,8 +790,6 @@ static CURLcode ssh_force_knownhost_key_type(struct Curl_easy *data)
819
790
{
820
791
CURLcode result = CURLE_OK ;
821
792
822
- #ifdef HAVE_LIBSSH2_KNOWNHOST_API
823
-
824
793
#ifdef LIBSSH2_KNOWNHOST_KEY_ED25519
825
794
static const char * const hostkey_method_ssh_ed25519
826
795
= "ssh-ed25519" ;
@@ -916,12 +885,10 @@ static CURLcode ssh_force_knownhost_key_type(struct Curl_easy *data)
916
885
break ;
917
886
#endif
918
887
case LIBSSH2_KNOWNHOST_KEY_SSHRSA :
919
- #ifdef HAVE_LIBSSH2_VERSION
920
888
if (libssh2_version (0x010900 ))
921
889
/* since 1.9.0 libssh2_session_method_pref() works as expected */
922
890
hostkey_method = hostkey_method_ssh_rsa_all ;
923
891
else
924
- #endif
925
892
/* old libssh2 which cannot correctly remove unsupported methods due
926
893
* to bug in src/kex.c or does not support the new methods anyways.
927
894
*/
@@ -956,8 +923,6 @@ static CURLcode ssh_force_knownhost_key_type(struct Curl_easy *data)
956
923
}
957
924
}
958
925
959
- #endif /* HAVE_LIBSSH2_KNOWNHOST_API */
960
-
961
926
return result ;
962
927
}
963
928
@@ -1094,12 +1059,10 @@ static CURLcode sftp_quote(struct Curl_easy *data,
1094
1059
state (data , SSH_SFTP_QUOTE_UNLINK );
1095
1060
return result ;
1096
1061
}
1097
- #ifdef HAS_STATVFS_SUPPORT
1098
1062
else if (strncasecompare (cmd , "statvfs " , 8 )) {
1099
1063
state (data , SSH_SFTP_QUOTE_STATVFS );
1100
1064
return result ;
1101
1065
}
1102
- #endif
1103
1066
1104
1067
failf (data , "Unknown SFTP command" );
1105
1068
Curl_safefree (sshc -> quote_path1 );
@@ -1878,7 +1841,6 @@ static CURLcode ssh_statemachine(struct Curl_easy *data, bool *block)
1878
1841
break ;
1879
1842
1880
1843
case SSH_AUTH_AGENT_INIT :
1881
- #ifdef HAVE_LIBSSH2_AGENT_API
1882
1844
if ((data -> set .ssh_auth_types & CURLSSH_AUTH_AGENT )
1883
1845
&& (strstr (sshc -> authlist , "publickey" ) != NULL )) {
1884
1846
@@ -1908,12 +1870,10 @@ static CURLcode ssh_statemachine(struct Curl_easy *data, bool *block)
1908
1870
}
1909
1871
}
1910
1872
else
1911
- #endif /* HAVE_LIBSSH2_AGENT_API */
1912
1873
state (data , SSH_AUTH_KEY_INIT );
1913
1874
break ;
1914
1875
1915
1876
case SSH_AUTH_AGENT_LIST :
1916
- #ifdef HAVE_LIBSSH2_AGENT_API
1917
1877
rc = libssh2_agent_list_identities (sshc -> ssh_agent );
1918
1878
1919
1879
if (rc == LIBSSH2_ERROR_EAGAIN )
@@ -1927,11 +1887,9 @@ static CURLcode ssh_statemachine(struct Curl_easy *data, bool *block)
1927
1887
state (data , SSH_AUTH_AGENT );
1928
1888
sshc -> sshagent_prev_identity = NULL ;
1929
1889
}
1930
- #endif
1931
1890
break ;
1932
1891
1933
1892
case SSH_AUTH_AGENT :
1934
- #ifdef HAVE_LIBSSH2_AGENT_API
1935
1893
/* as prev_identity evolves only after an identity user auth finished we
1936
1894
can safely request it again as long as EAGAIN is returned here or by
1937
1895
libssh2_agent_userauth */
@@ -1968,7 +1926,6 @@ static CURLcode ssh_statemachine(struct Curl_easy *data, bool *block)
1968
1926
state (data , SSH_AUTH_KEY_INIT );
1969
1927
rc = 0 ; /* clear rc and continue */
1970
1928
}
1971
- #endif
1972
1929
break ;
1973
1930
1974
1931
case SSH_AUTH_KEY_INIT :
@@ -2920,14 +2877,11 @@ static CURLcode ssh_statemachine(struct Curl_easy *data, bool *block)
2920
2877
break ;
2921
2878
2922
2879
case SSH_SESSION_FREE :
2923
- #ifdef HAVE_LIBSSH2_KNOWNHOST_API
2924
2880
if (sshc -> kh ) {
2925
2881
libssh2_knownhost_free (sshc -> kh );
2926
2882
sshc -> kh = NULL ;
2927
2883
}
2928
- #endif
2929
2884
2930
- #ifdef HAVE_LIBSSH2_AGENT_API
2931
2885
if (sshc -> ssh_agent ) {
2932
2886
rc = libssh2_agent_disconnect (sshc -> ssh_agent );
2933
2887
if (rc == LIBSSH2_ERROR_EAGAIN ) {
@@ -2948,7 +2902,6 @@ static CURLcode ssh_statemachine(struct Curl_easy *data, bool *block)
2948
2902
sshc -> sshagent_identity = NULL ;
2949
2903
sshc -> sshagent_prev_identity = NULL ;
2950
2904
}
2951
- #endif
2952
2905
2953
2906
if (sshc -> ssh_session ) {
2954
2907
rc = libssh2_session_free (sshc -> ssh_session );
@@ -2970,12 +2923,8 @@ static CURLcode ssh_statemachine(struct Curl_easy *data, bool *block)
2970
2923
DEBUGASSERT (sshc -> ssh_channel == NULL );
2971
2924
DEBUGASSERT (sshc -> sftp_session == NULL );
2972
2925
DEBUGASSERT (sshc -> sftp_handle == NULL );
2973
- #ifdef HAVE_LIBSSH2_KNOWNHOST_API
2974
2926
DEBUGASSERT (sshc -> kh == NULL );
2975
- #endif
2976
- #ifdef HAVE_LIBSSH2_AGENT_API
2977
2927
DEBUGASSERT (sshc -> ssh_agent == NULL );
2978
- #endif
2979
2928
2980
2929
Curl_safefree (sshc -> rsa_pub );
2981
2930
Curl_safefree (sshc -> rsa );
@@ -3332,7 +3281,6 @@ static CURLcode ssh_connect(struct Curl_easy *data, bool *done)
3332
3281
infof (data , "Failed to enable compression for ssh session" );
3333
3282
}
3334
3283
3335
- #ifdef HAVE_LIBSSH2_KNOWNHOST_API
3336
3284
if (data -> set .str [STRING_SSH_KNOWNHOSTS ]) {
3337
3285
int rc ;
3338
3286
sshc -> kh = libssh2_knownhost_init (sshc -> ssh_session );
@@ -3350,7 +3298,6 @@ static CURLcode ssh_connect(struct Curl_easy *data, bool *done)
3350
3298
infof (data , "Failed to read known hosts from %s" ,
3351
3299
data -> set .str [STRING_SSH_KNOWNHOSTS ]);
3352
3300
}
3353
- #endif /* HAVE_LIBSSH2_KNOWNHOST_API */
3354
3301
3355
3302
#ifdef CURL_LIBSSH2_DEBUG
3356
3303
libssh2_trace (sshc -> ssh_session , ~0 );
@@ -3761,20 +3708,16 @@ static const char *sftp_libssh2_strerror(unsigned long err)
3761
3708
3762
3709
CURLcode Curl_ssh_init (void )
3763
3710
{
3764
- #ifdef HAVE_LIBSSH2_INIT
3765
3711
if (libssh2_init (0 )) {
3766
3712
DEBUGF (fprintf (stderr , "Error: libssh2_init failed\n" ));
3767
3713
return CURLE_FAILED_INIT ;
3768
3714
}
3769
- #endif
3770
3715
return CURLE_OK ;
3771
3716
}
3772
3717
3773
3718
void Curl_ssh_cleanup (void )
3774
3719
{
3775
- #ifdef HAVE_LIBSSH2_EXIT
3776
3720
(void )libssh2_exit ();
3777
- #endif
3778
3721
}
3779
3722
3780
3723
void Curl_ssh_version (char * buffer , size_t buflen )
0 commit comments