/[LeafOK_CVS]/lbbs/src/bbs_net.c
ViewVC logotype

Annotation of /lbbs/src/bbs_net.c

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.105 - (hide annotations)
Sat Dec 20 03:24:01 2025 UTC (2 months, 3 weeks ago) by sysadm
Branch: MAIN
Changes since 1.104: +186 -47 lines
Content type: text/x-csrc
Refine

1 sysadm 1.76 /* SPDX-License-Identifier: GPL-3.0-or-later */
2     /*
3     * bbs_net
4     * - user interactive feature of site shuttle
5     *
6 sysadm 1.77 * Copyright (C) 2004-2025 Leaflet <leaflet@leafok.com>
7 sysadm 1.76 */
8 sysadm 1.1
9 sysadm 1.81 #ifdef HAVE_CONFIG_H
10     #include "config.h"
11     #endif
12    
13 sysadm 1.1 #include "bbs.h"
14 sysadm 1.83 #include "bbs_net.h"
15 sysadm 1.1 #include "common.h"
16 sysadm 1.55 #include "io.h"
17 sysadm 1.15 #include "log.h"
18 sysadm 1.55 #include "login.h"
19     #include "menu.h"
20 sysadm 1.15 #include "screen.h"
21 sysadm 1.84 #include "str_process.h"
22 sysadm 1.55 #include <errno.h>
23     #include <fcntl.h>
24     #include <netdb.h>
25     #include <stdarg.h>
26 sysadm 1.1 #include <stdio.h>
27 sysadm 1.55 #include <stdlib.h>
28 sysadm 1.29 #include <string.h>
29     #include <time.h>
30     #include <unistd.h>
31 sysadm 1.55 #include <arpa/inet.h>
32 sysadm 1.84 #include <ctype.h>
33 sysadm 1.55 #include <libssh/libssh.h>
34     #include <libssh/server.h>
35     #include <libssh/callbacks.h>
36     #include <netinet/in.h>
37     #include <netinet/ip.h>
38 sysadm 1.29 #include <sys/select.h>
39 sysadm 1.1 #include <sys/ioctl.h>
40     #include <sys/socket.h>
41 sysadm 1.82
42     #ifdef HAVE_SYS_EPOLL_H
43 sysadm 1.38 #include <sys/epoll.h>
44 sysadm 1.82 #else
45     #include <poll.h>
46     #endif
47 sysadm 1.1
48 sysadm 1.80 static const char MENU_CONF_DELIM[] = " \t\r\n";
49 sysadm 1.26
50 sysadm 1.80 enum _bbs_net_constant_t
51     {
52     MAXSTATION = 26 * 2,
53     STATION_PER_LINE = 4,
54 sysadm 1.84 USERNAME_MAX_LEN = 20,
55     PASSWORD_MAX_LEN = 20,
56 sysadm 1.97 REMOTE_CONNECT_TIMEOUT = 10, // seconds
57     SSH_CONNECT_TIMEOUT = 5, // seconds
58     PROGRESS_BAR_LEN = 30,
59 sysadm 1.80 };
60 sysadm 1.1
61     struct _bbsnet_conf
62     {
63 sysadm 1.86 char org_name[40];
64     char site_name[40];
65     char host_name[IP_ADDR_LEN];
66 sysadm 1.93 char port[6];
67 sysadm 1.84 int8_t use_ssh;
68 sysadm 1.79 char charset[CHARSET_MAX_LEN + 1];
69 sysadm 1.1 } bbsnet_conf[MAXSTATION];
70    
71 sysadm 1.74 static MENU_SET bbsnet_menu;
72 sysadm 1.1
73 sysadm 1.89 static void unload_bbsnet_conf(void);
74    
75 sysadm 1.74 static int load_bbsnet_conf(const char *file_config)
76 sysadm 1.1 {
77 sysadm 1.14 FILE *fp;
78     MENU *p_menu;
79 sysadm 1.41 MENU_ITEM *p_menu_item;
80     MENU_ITEM_ID menu_item_id;
81 sysadm 1.86 char line[LINE_BUFFER_LEN], *t1, *t2, *t3, *t4, *t5, *t6, *saveptr;
82 sysadm 1.97 long port;
83     char *endptr;
84 sysadm 1.14
85 sysadm 1.89 unload_bbsnet_conf();
86 sysadm 1.14
87 sysadm 1.41 bbsnet_menu.p_menu_pool = calloc(1, sizeof(MENU));
88     if (bbsnet_menu.p_menu_pool == NULL)
89     {
90 sysadm 1.104 log_error("calloc(p_menu_pool) error");
91 sysadm 1.89 return -1;
92 sysadm 1.41 }
93     bbsnet_menu.menu_count = 1;
94    
95     bbsnet_menu.p_menu_item_pool = calloc(MAXSTATION, sizeof(MENU_ITEM));
96     if (bbsnet_menu.p_menu_item_pool == NULL)
97     {
98 sysadm 1.104 log_error("calloc(p_menu_item_pool) error");
99 sysadm 1.89 unload_bbsnet_conf();
100     return -1;
101 sysadm 1.41 }
102     bbsnet_menu.menu_item_count = MAXSTATION;
103    
104     p_menu = (MENU *)get_menu_by_id(&bbsnet_menu, 0);
105 sysadm 1.40
106 sysadm 1.21 strncpy(p_menu->name, "BBSNET", sizeof(p_menu->name) - 1);
107     p_menu->name[sizeof(p_menu->name) - 1] = '\0';
108 sysadm 1.14 p_menu->title.show = 0;
109 sysadm 1.41 p_menu->screen_show = 0;
110 sysadm 1.1
111 sysadm 1.89 fp = fopen(file_config, "r");
112     if (fp == NULL)
113     {
114     unload_bbsnet_conf();
115     return -2;
116     }
117    
118 sysadm 1.41 menu_item_id = 0;
119 sysadm 1.86 while (fgets(line, sizeof(line), fp) && menu_item_id < MAXSTATION)
120 sysadm 1.14 {
121 sysadm 1.86 t1 = strtok_r(line, MENU_CONF_DELIM, &saveptr);
122 sysadm 1.26 t2 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
123     t3 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
124     t4 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
125 sysadm 1.60 t5 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
126 sysadm 1.84 t6 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
127 sysadm 1.14
128 sysadm 1.84 if (t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL ||
129 sysadm 1.97 t5 == NULL || t6 == NULL || t1[0] == '#')
130 sysadm 1.18 {
131 sysadm 1.14 continue;
132 sysadm 1.18 }
133    
134 sysadm 1.86 strncpy(bbsnet_conf[menu_item_id].site_name, t2, sizeof(bbsnet_conf[menu_item_id].site_name) - 1);
135     bbsnet_conf[menu_item_id].site_name[sizeof(bbsnet_conf[menu_item_id].site_name) - 1] = '\0';
136     strncpy(bbsnet_conf[menu_item_id].org_name, t1, sizeof(bbsnet_conf[menu_item_id].org_name) - 1);
137     bbsnet_conf[menu_item_id].org_name[sizeof(bbsnet_conf[menu_item_id].org_name) - 1] = '\0';
138     strncpy(bbsnet_conf[menu_item_id].host_name, t3, sizeof(bbsnet_conf[menu_item_id].host_name) - 1);
139     bbsnet_conf[menu_item_id].host_name[sizeof(bbsnet_conf[menu_item_id].host_name) - 1] = '\0';
140 sysadm 1.97 port = strtol(t4, &endptr, 10);
141     if (*endptr != '\0' || port <= 0 || port > 65535)
142 sysadm 1.89 {
143 sysadm 1.104 log_error("Invalid port value %ld of menu item %d", port, menu_item_id);
144 sysadm 1.89 fclose(fp);
145     unload_bbsnet_conf();
146     return -3;
147     }
148 sysadm 1.93 strncpy(bbsnet_conf[menu_item_id].port, t4, sizeof(bbsnet_conf[menu_item_id].port) - 1);
149     bbsnet_conf[menu_item_id].port[sizeof(bbsnet_conf[menu_item_id].port) - 1] = '\0';
150 sysadm 1.84 bbsnet_conf[menu_item_id].use_ssh = (toupper(t5[0]) == 'Y');
151     strncpy(bbsnet_conf[menu_item_id].charset, t6, sizeof(bbsnet_conf[menu_item_id].charset) - 1);
152 sysadm 1.60 bbsnet_conf[menu_item_id].charset[sizeof(bbsnet_conf[menu_item_id].charset) - 1] = '\0';
153 sysadm 1.14
154 sysadm 1.41 p_menu_item = get_menu_item_by_id(&bbsnet_menu, menu_item_id);
155     if (p_menu_item == NULL)
156     {
157 sysadm 1.104 log_error("get_menu_item_by_id(%d) return NULL pointer", menu_item_id);
158 sysadm 1.89 fclose(fp);
159     unload_bbsnet_conf();
160     return -3;
161 sysadm 1.41 }
162 sysadm 1.14
163 sysadm 1.41 p_menu_item->row = (int16_t)(2 + menu_item_id / STATION_PER_LINE);
164     p_menu_item->col = (int16_t)(5 + menu_item_id % STATION_PER_LINE * 20);
165     snprintf(p_menu_item->action, sizeof(p_menu_item->action), "%d", (int16_t)menu_item_id);
166     p_menu_item->submenu = 0;
167     p_menu_item->priv = 0;
168     p_menu_item->level = 0;
169     p_menu_item->name[0] =
170 sysadm 1.97 (char)(menu_item_id < MAXSTATION / 2 ? 'A' + menu_item_id : 'a' + menu_item_id - MAXSTATION / 2);
171 sysadm 1.41 p_menu_item->name[1] = '\0';
172 sysadm 1.89 snprintf(p_menu_item->text, sizeof(p_menu_item->text), "\033[1;36m%c.\033[m %s",
173 sysadm 1.86 p_menu_item->name[0], bbsnet_conf[menu_item_id].site_name);
174 sysadm 1.41
175     p_menu->items[p_menu->item_count] = menu_item_id;
176     p_menu->item_count++;
177     menu_item_id++;
178     }
179    
180     bbsnet_menu.menu_item_count = (int16_t)menu_item_id;
181     bbsnet_menu.menu_id_path[0] = 0;
182     bbsnet_menu.menu_item_pos[0] = 0;
183     bbsnet_menu.choose_step = 0;
184 sysadm 1.14
185 sysadm 1.41 fclose(fp);
186 sysadm 1.14
187     return 0;
188 sysadm 1.1 }
189    
190 sysadm 1.74 static void unload_bbsnet_conf(void)
191 sysadm 1.40 {
192 sysadm 1.41 bbsnet_menu.menu_count = 0;
193     bbsnet_menu.menu_item_count = 0;
194    
195 sysadm 1.89 if (bbsnet_menu.p_menu_pool)
196     {
197     free(bbsnet_menu.p_menu_pool);
198     bbsnet_menu.p_menu_pool = NULL;
199     }
200    
201     if (bbsnet_menu.p_menu_item_pool)
202     {
203     free(bbsnet_menu.p_menu_item_pool);
204     bbsnet_menu.p_menu_item_pool = NULL;
205     }
206 sysadm 1.40 }
207    
208 sysadm 1.97 static void progress_bar(int percent, int len)
209 sysadm 1.1 {
210 sysadm 1.97 char line[LINE_BUFFER_LEN];
211 sysadm 1.27 char buf[LINE_BUFFER_LEN];
212     char buf2[LINE_BUFFER_LEN];
213 sysadm 1.97 int pos;
214 sysadm 1.27
215 sysadm 1.98 if (len < 4)
216 sysadm 1.89 {
217 sysadm 1.98 len = 4;
218 sysadm 1.89 }
219 sysadm 1.98 else if (len + 2 > LINE_BUFFER_LEN)
220 sysadm 1.27 {
221 sysadm 1.98 len = LINE_BUFFER_LEN - 3;
222 sysadm 1.27 }
223 sysadm 1.97 if (percent < 0)
224 sysadm 1.27 {
225 sysadm 1.97 percent = 0;
226 sysadm 1.27 }
227 sysadm 1.97 else if (percent > 100)
228 sysadm 1.27 {
229 sysadm 1.97 percent = 100;
230 sysadm 1.27 }
231 sysadm 1.14
232 sysadm 1.97 pos = len * percent / 100;
233    
234     line[0] = ' ';
235     for (int i = 1; i <= len; i++)
236     {
237     line[i] = '-';
238     }
239     line[len + 1] = ' ';
240     line[len + 2] = '\0';
241    
242     snprintf(buf, sizeof(buf), "%*s%3d%%%*s",
243     (len - 4) / 2, "", percent, (len - 4 + 1) / 2, "");
244     memcpy(buf2, buf, (size_t)pos);
245     buf2[pos] = '\0';
246    
247 sysadm 1.84 moveto(4, 1);
248 sysadm 1.97 prints("%s\r\n", line);
249     prints("|\033[46m%s\033[44m%s\033[m|\r\n", buf2, buf + pos);
250     prints("%s\r\n", line);
251 sysadm 1.14 iflush();
252 sysadm 1.1 }
253    
254 sysadm 1.105 static int progress_update(struct timespec *p_ts_begin, struct timespec *p_ts_now,
255     int total_time_ms, int *p_progress_last, int bar_len)
256     {
257     int progress;
258    
259     if (clock_gettime(CLOCK_REALTIME, p_ts_now) == -1)
260     {
261     log_error("clock_gettime() error (%d)", errno);
262     return -1;
263     }
264    
265     progress = (int)((p_ts_now->tv_sec - p_ts_begin->tv_sec) * 1000 +
266     (p_ts_now->tv_nsec - p_ts_begin->tv_nsec) / 1000 / 1000) /
267     REMOTE_CONNECT_TIMEOUT / 10 +
268     1;
269     if (progress < 0)
270     {
271     progress = 0;
272     }
273     if (progress > 100)
274     {
275     progress = 100;
276     }
277    
278     if (progress != *p_progress_last)
279     {
280     *p_progress_last = progress;
281     progress_bar(progress, PROGRESS_BAR_LEN);
282     }
283    
284     return 0;
285     }
286    
287 sysadm 1.74 static int bbsnet_connect(int n)
288 sysadm 1.1 {
289 sysadm 1.89 int sock = -1;
290 sysadm 1.97 int ret = 0;
291 sysadm 1.89 int loop;
292     int error;
293 sysadm 1.38 int sock_connected = 0;
294 sysadm 1.89 int flags_sock = -1;
295     int flags_stdin = -1;
296     int flags_stdout = -1;
297 sysadm 1.14 struct sockaddr_in sin;
298 sysadm 1.36 char input_buf[LINE_BUFFER_LEN];
299     char output_buf[LINE_BUFFER_LEN];
300     int input_buf_len = 0;
301     int output_buf_len = 0;
302     int input_buf_offset = 0;
303     int output_buf_offset = 0;
304 sysadm 1.60 char input_conv[LINE_BUFFER_LEN * 2];
305     char output_conv[LINE_BUFFER_LEN * 2];
306     int input_conv_len = 0;
307     int output_conv_len = 0;
308     int input_conv_offset = 0;
309     int output_conv_offset = 0;
310 sysadm 1.89 iconv_t input_cd = (iconv_t)(-1);
311     iconv_t output_cd = (iconv_t)(-1);
312     char tocode[CHARSET_MAX_LEN + 20];
313 sysadm 1.82
314     #ifdef HAVE_SYS_EPOLL_H
315 sysadm 1.38 struct epoll_event ev, events[MAX_EVENTS];
316 sysadm 1.89 int epollfd = -1;
317 sysadm 1.82 #else
318     struct pollfd pfds[3];
319     #endif
320    
321     int nfds;
322 sysadm 1.38 int stdin_read_wait = 0;
323     int stdout_write_wait = 0;
324     int sock_read_wait = 0;
325     int sock_write_wait = 0;
326 sysadm 1.93 struct addrinfo hints, *res = NULL;
327 sysadm 1.31 int tos;
328 sysadm 1.93 char remote_addr[INET_ADDRSTRLEN];
329 sysadm 1.14 int remote_port;
330 sysadm 1.93 char local_addr[INET_ADDRSTRLEN];
331 sysadm 1.63 int local_port;
332     socklen_t sock_len;
333 sysadm 1.97 time_t t_begin, t_used;
334     struct timespec ts_begin, ts_now;
335 sysadm 1.105 int progress_last = 0;
336 sysadm 1.26 int ch;
337 sysadm 1.84 char remote_user[USERNAME_MAX_LEN + 1];
338     char remote_pass[PASSWORD_MAX_LEN + 1];
339 sysadm 1.97 ssh_session outbound_session = NULL;
340     ssh_channel outbound_channel = NULL;
341 sysadm 1.84 int ssh_process_config = 0;
342 sysadm 1.88 int ssh_log_level = SSH_LOG_NOLOG;
343 sysadm 1.14
344 sysadm 1.53 if (user_online_update("BBS_NET") < 0)
345     {
346 sysadm 1.104 log_error("user_online_update(BBS_NET) error");
347 sysadm 1.53 }
348    
349 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
350     {
351     clearscr();
352    
353     if (!SSH_v2)
354     {
355     moveto(1, 1);
356     prints("只有在以SSH方式登陆本站时,才能使用SSH站点穿梭。");
357     press_any_key();
358     return 0;
359     }
360    
361     moveto(1, 1);
362 sysadm 1.86 prints("通过SSH方式连接[%s]...", bbsnet_conf[n].site_name);
363 sysadm 1.84 moveto(2, 1);
364     prints("请输入用户名: ");
365     iflush();
366     if (str_input(remote_user, sizeof(remote_user), DOECHO) < 0)
367     {
368     return -1;
369     }
370     if (remote_user[0] == '\0')
371     {
372     return 0;
373     }
374    
375     moveto(3, 1);
376     prints("请输入密码: ");
377     iflush();
378     if (str_input(remote_pass, sizeof(remote_pass), NOECHO) < 0)
379     {
380     return -1;
381     }
382     if (remote_pass[0] == '\0')
383     {
384     return 0;
385     }
386     }
387    
388 sysadm 1.14 clearscr();
389    
390 sysadm 1.84 moveto(1, 1);
391 sysadm 1.57 prints("\033[1;32m正在测试往 %s (%s) 的连接,请稍候... \033[m\r\n",
392 sysadm 1.86 bbsnet_conf[n].site_name, bbsnet_conf[n].host_name);
393 sysadm 1.105 prints("\033[1;32m连接进行中,按\033[1;33mCtrl+C\033[1;32m中断。\033[m\r\n");
394     progress_bar(0, PROGRESS_BAR_LEN);
395    
396     if (clock_gettime(CLOCK_REALTIME, &ts_begin) == -1)
397     {
398     log_error("clock_gettime() error (%d)", errno);
399     ret = -1;
400     goto cleanup;
401     }
402     ts_now = ts_begin;
403 sysadm 1.14
404 sysadm 1.93 memset(&hints, 0, sizeof(hints));
405     hints.ai_family = AF_INET;
406     hints.ai_socktype = SOCK_STREAM;
407     hints.ai_protocol = IPPROTO_TCP;
408 sysadm 1.14
409 sysadm 1.93 if ((ret = getaddrinfo(BBS_address, NULL, &hints, &res)) != 0)
410 sysadm 1.1 {
411 sysadm 1.104 log_error("getaddrinfo() error (%d): %s", ret, gai_strerror(ret));
412 sysadm 1.97 ret = -1;
413 sysadm 1.89 goto cleanup;
414 sysadm 1.1 }
415 sysadm 1.14
416 sysadm 1.97 if (inet_ntop(AF_INET, &(((struct sockaddr_in *)res->ai_addr)->sin_addr), local_addr, sizeof(local_addr)) == NULL)
417 sysadm 1.93 {
418 sysadm 1.104 log_error("inet_ntop() error (%d)", errno);
419 sysadm 1.97 ret = -1;
420 sysadm 1.93 goto cleanup;
421     }
422     local_port = ntohs(((struct sockaddr_in *)res->ai_addr)->sin_port);
423 sysadm 1.14
424 sysadm 1.93 sock = socket(res->ai_family, res->ai_socktype, res->ai_protocol);
425 sysadm 1.14 if (sock < 0)
426 sysadm 1.1 {
427 sysadm 1.104 log_error("socket() error (%d)", errno);
428 sysadm 1.97 ret = -1;
429 sysadm 1.93 goto cleanup;
430     }
431    
432     if (bind(sock, res->ai_addr, res->ai_addrlen) < 0)
433     {
434 sysadm 1.104 log_error("bind(%s:%u) error (%d)", local_addr, local_port, errno);
435 sysadm 1.97 ret = -1;
436 sysadm 1.89 goto cleanup;
437 sysadm 1.1 }
438    
439 sysadm 1.93 freeaddrinfo(res);
440     res = NULL;
441    
442     memset(&hints, 0, sizeof(hints));
443     hints.ai_family = AF_INET;
444     hints.ai_flags = AI_NUMERICSERV;
445     hints.ai_socktype = SOCK_STREAM;
446     hints.ai_protocol = IPPROTO_TCP;
447 sysadm 1.14
448 sysadm 1.93 if ((ret = getaddrinfo(bbsnet_conf[n].host_name, bbsnet_conf[n].port, &hints, &res)) != 0)
449 sysadm 1.14 {
450 sysadm 1.104 log_error("getaddrinfo() error (%d): %s", ret, gai_strerror(ret));
451 sysadm 1.93 prints("\033[1;31m查找主机名失败!\033[m\r\n");
452     press_any_key();
453 sysadm 1.97 ret = -1;
454 sysadm 1.89 goto cleanup;
455 sysadm 1.14 }
456 sysadm 1.1
457 sysadm 1.97 if (inet_ntop(AF_INET, &(((struct sockaddr_in *)res->ai_addr)->sin_addr), remote_addr, sizeof(remote_addr)) == NULL)
458 sysadm 1.93 {
459 sysadm 1.104 log_error("inet_ntop() error (%d)", errno);
460 sysadm 1.97 ret = -1;
461 sysadm 1.93 goto cleanup;
462     }
463     remote_port = ntohs(((struct sockaddr_in *)res->ai_addr)->sin_port);
464 sysadm 1.14
465 sysadm 1.39 // Set socket as non-blocking
466 sysadm 1.89 if ((flags_sock = fcntl(sock, F_GETFL, 0)) == -1)
467     {
468 sysadm 1.104 log_error("fcntl(F_GETFL) error (%d)", errno);
469 sysadm 1.97 ret = -1;
470 sysadm 1.89 goto cleanup;
471     }
472     if ((fcntl(sock, F_SETFL, flags_sock | O_NONBLOCK)) == -1)
473     {
474 sysadm 1.104 log_error("fcntl(F_SETFL) error (%d)", errno);
475 sysadm 1.97 ret = -1;
476 sysadm 1.89 goto cleanup;
477     }
478 sysadm 1.39
479     // Set STDIN/STDOUT as non-blocking
480 sysadm 1.89 if ((flags_stdin = fcntl(STDIN_FILENO, F_GETFL, 0)) == -1)
481     {
482 sysadm 1.104 log_error("fcntl(F_GETFL) error (%d)", errno);
483 sysadm 1.97 ret = -1;
484 sysadm 1.89 goto cleanup;
485     }
486     if ((flags_stdout = fcntl(STDOUT_FILENO, F_GETFL, 0)) == -1)
487     {
488 sysadm 1.104 log_error("fcntl(F_GETFL) error (%d)", errno);
489 sysadm 1.97 ret = -1;
490 sysadm 1.89 goto cleanup;
491     }
492     if ((fcntl(STDIN_FILENO, F_SETFL, flags_stdin | O_NONBLOCK)) == -1)
493     {
494 sysadm 1.104 log_error("fcntl(F_SETFL) error (%d)", errno);
495 sysadm 1.97 ret = -1;
496 sysadm 1.89 goto cleanup;
497     }
498     if ((fcntl(STDOUT_FILENO, F_SETFL, flags_stdout | O_NONBLOCK)) == -1)
499     {
500 sysadm 1.104 log_error("fcntl(F_SETFL) error (%d)", errno);
501 sysadm 1.97 ret = -1;
502 sysadm 1.89 goto cleanup;
503     }
504 sysadm 1.39
505 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
506 sysadm 1.38 epollfd = epoll_create1(0);
507     if (epollfd < 0)
508     {
509 sysadm 1.104 log_error("epoll_create1() error (%d)", errno);
510 sysadm 1.97 ret = -1;
511 sysadm 1.89 goto cleanup;
512 sysadm 1.38 }
513    
514 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
515 sysadm 1.38 ev.data.fd = sock;
516     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, sock, &ev) == -1)
517     {
518 sysadm 1.104 log_error("epoll_ctl(socket) error (%d)", errno);
519 sysadm 1.97 ret = -1;
520 sysadm 1.39 goto cleanup;
521 sysadm 1.38 }
522    
523 sysadm 1.59 ev.events = EPOLLIN | EPOLLET;
524 sysadm 1.38 ev.data.fd = STDIN_FILENO;
525     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDIN_FILENO, &ev) == -1)
526     {
527 sysadm 1.104 log_error("epoll_ctl(STDIN_FILENO) error (%d)", errno);
528 sysadm 1.97 ret = -1;
529 sysadm 1.39 goto cleanup;
530 sysadm 1.38 }
531 sysadm 1.82 #endif
532 sysadm 1.38
533 sysadm 1.105 while ((ts_now.tv_sec - ts_begin.tv_sec) * 1000 +
534     (ts_now.tv_nsec - ts_begin.tv_nsec) / 1000 / 1000 <
535     REMOTE_CONNECT_TIMEOUT * 1000 &&
536     !SYS_server_exit)
537 sysadm 1.29 {
538 sysadm 1.105 if (clock_gettime(CLOCK_REALTIME, &ts_now) == -1)
539     {
540     log_error("clock_gettime() error (%d)", errno);
541     ret = -1;
542     goto cleanup;
543     }
544    
545 sysadm 1.97 if ((ret = connect(sock, res->ai_addr, res->ai_addrlen)) == 0)
546     {
547     sock_connected = 1;
548     break;
549     }
550     else if (ret < 0)
551 sysadm 1.29 {
552 sysadm 1.38 if (errno == EAGAIN || errno == EALREADY || errno == EINPROGRESS)
553     {
554     // Use select / epoll to check writability of the socket,
555     // then use getsockopt to check the status of the socket.
556     // See man connect(2)
557     break;
558     }
559     else if (errno == EINTR)
560     {
561     }
562     else
563     {
564 sysadm 1.104 log_error("connect(socket) error (%d)", errno);
565 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
566 sysadm 1.38 press_any_key();
567 sysadm 1.97 ret = -1;
568 sysadm 1.39 goto cleanup;
569 sysadm 1.38 }
570 sysadm 1.105
571     if (progress_update(&ts_begin, &ts_now,
572     REMOTE_CONNECT_TIMEOUT * 1000,
573     &progress_last, PROGRESS_BAR_LEN) < 0)
574     {
575     log_error("progress_update() error");
576     ret = -1;
577     goto cleanup;
578     }
579 sysadm 1.29 }
580     }
581    
582 sysadm 1.101 while ((ts_now.tv_sec - ts_begin.tv_sec) * 1000 +
583     (ts_now.tv_nsec - ts_begin.tv_nsec) / 1000 / 1000 <
584     REMOTE_CONNECT_TIMEOUT * 1000 &&
585 sysadm 1.97 !sock_connected && !SYS_server_exit)
586 sysadm 1.1 {
587 sysadm 1.105 if (clock_gettime(CLOCK_REALTIME, &ts_now) == -1)
588     {
589     log_error("clock_gettime() error (%d)", errno);
590     ret = -1;
591     goto cleanup;
592     }
593    
594 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
595 sysadm 1.97 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 100); // 0.1 second
596 sysadm 1.82 ret = nfds;
597     #else
598     pfds[0].fd = sock;
599     pfds[0].events = POLLOUT;
600     pfds[1].fd = STDIN_FILENO;
601     pfds[1].events = POLLIN;
602     nfds = 2;
603 sysadm 1.97 ret = poll(pfds, (nfds_t)nfds, 100); // 0.1 second
604 sysadm 1.82 #endif
605 sysadm 1.29
606 sysadm 1.82 if (ret < 0)
607 sysadm 1.20 {
608 sysadm 1.29 if (errno != EINTR)
609     {
610 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
611 sysadm 1.104 log_error("epoll_wait() error (%d)", errno);
612 sysadm 1.82 #else
613 sysadm 1.104 log_error("poll() error (%d)", errno);
614 sysadm 1.82 #endif
615 sysadm 1.39 break;
616 sysadm 1.29 }
617 sysadm 1.20 }
618 sysadm 1.82 else if (ret == 0) // timeout
619 sysadm 1.38 {
620     }
621     else // ret > 0
622 sysadm 1.14 {
623 sysadm 1.38 for (int i = 0; i < nfds; i++)
624 sysadm 1.29 {
625 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
626 sysadm 1.38 if (events[i].data.fd == sock)
627 sysadm 1.82 #else
628     if (pfds[i].fd == sock && (pfds[i].revents & POLLOUT))
629     #endif
630 sysadm 1.38 {
631 sysadm 1.89 socklen_t len = sizeof(error);
632     if (getsockopt(sock, SOL_SOCKET, SO_ERROR, &error, &len) < 0)
633 sysadm 1.38 {
634 sysadm 1.104 log_error("getsockopt() error (%d) !", errno);
635 sysadm 1.97 ret = -1;
636 sysadm 1.39 goto cleanup;
637 sysadm 1.38 }
638     if (error == 0)
639     {
640     sock_connected = 1;
641 sysadm 1.97 break;
642 sysadm 1.38 }
643     }
644 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
645 sysadm 1.38 else if (events[i].data.fd == STDIN_FILENO)
646 sysadm 1.82 #else
647     else if (pfds[i].fd == STDIN_FILENO && (pfds[i].revents & POLLIN))
648     #endif
649 sysadm 1.38 {
650 sysadm 1.84 do
651     {
652     ch = igetch(0);
653     } while (ch == 0);
654 sysadm 1.45 if (ch == Ctrl('C') || ch == KEY_ESC)
655 sysadm 1.38 {
656 sysadm 1.97 ret = 0;
657 sysadm 1.39 goto cleanup;
658 sysadm 1.38 }
659     }
660 sysadm 1.29 }
661 sysadm 1.14 }
662 sysadm 1.105
663     if (progress_update(&ts_begin, &ts_now,
664     REMOTE_CONNECT_TIMEOUT * 1000,
665     &progress_last, PROGRESS_BAR_LEN) < 0)
666     {
667     log_error("progress_update() error");
668     ret = -1;
669     goto cleanup;
670     }
671 sysadm 1.12 }
672 sysadm 1.38 if (SYS_server_exit)
673     {
674 sysadm 1.97 ret = 0;
675 sysadm 1.39 goto cleanup;
676 sysadm 1.38 }
677     if (!sock_connected)
678 sysadm 1.12 {
679 sysadm 1.97 progress_bar(100, PROGRESS_BAR_LEN);
680 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
681 sysadm 1.14 press_any_key();
682 sysadm 1.97 ret = -1;
683 sysadm 1.39 goto cleanup;
684 sysadm 1.12 }
685 sysadm 1.29
686 sysadm 1.31 tos = IPTOS_LOWDELAY;
687     if (setsockopt(sock, IPPROTO_IP, IP_TOS, &tos, sizeof(tos)) < 0)
688     {
689 sysadm 1.104 log_error("setsockopt IP_TOS=%d error (%d)", tos, errno);
690 sysadm 1.31 }
691 sysadm 1.14
692 sysadm 1.63 sock_len = sizeof(sin);
693     if (getsockname(sock, (struct sockaddr *)&sin, &sock_len) < 0)
694     {
695     log_error("getsockname() error: %d", errno);
696 sysadm 1.97 ret = -1;
697 sysadm 1.63 goto cleanup;
698     }
699    
700 sysadm 1.97 if (inet_ntop(AF_INET, &(sin.sin_addr), local_addr, sizeof(local_addr)) == NULL)
701     {
702 sysadm 1.104 log_error("inet_ntop() error (%d)", errno);
703 sysadm 1.97 ret = -1;
704     goto cleanup;
705     }
706 sysadm 1.63 local_port = ntohs(sin.sin_port);
707    
708 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
709     {
710 sysadm 1.97 outbound_session = ssh_new();
711     if (outbound_session == NULL)
712 sysadm 1.84 {
713 sysadm 1.104 log_error("ssh_new() error");
714 sysadm 1.97 ret = -1;
715 sysadm 1.84 goto cleanup;
716     }
717    
718 sysadm 1.97 if (ssh_options_set(outbound_session, SSH_OPTIONS_FD, &sock) < 0 ||
719     ssh_options_set(outbound_session, SSH_OPTIONS_PROCESS_CONFIG, &ssh_process_config) < 0 ||
720     ssh_options_set(outbound_session, SSH_OPTIONS_KNOWNHOSTS, SSH_KNOWN_HOSTS_FILE) < 0 ||
721     ssh_options_set(outbound_session, SSH_OPTIONS_HOST, bbsnet_conf[n].host_name) < 0 ||
722     ssh_options_set(outbound_session, SSH_OPTIONS_USER, remote_user) < 0 ||
723     ssh_options_set(outbound_session, SSH_OPTIONS_HOSTKEYS, "+ssh-ed25519,ecdsa-sha2-nistp256,ssh-rsa") < 0 ||
724     ssh_options_set(outbound_session, SSH_OPTIONS_LOG_VERBOSITY, &ssh_log_level) < 0)
725 sysadm 1.84 {
726 sysadm 1.104 log_error("Error setting SSH options: %s", ssh_get_error(outbound_session));
727 sysadm 1.97 ret = -1;
728 sysadm 1.84 goto cleanup;
729     }
730    
731 sysadm 1.97 ssh_set_blocking(outbound_session, 0);
732 sysadm 1.85
733 sysadm 1.90 t_begin = time(NULL);
734     ret = SSH_ERROR;
735 sysadm 1.105 while ((ts_now.tv_sec - ts_begin.tv_sec) * 1000 +
736     (ts_now.tv_nsec - ts_begin.tv_nsec) / 1000 / 1000 <
737     REMOTE_CONNECT_TIMEOUT * 1000 &&
738     !SYS_server_exit)
739 sysadm 1.84 {
740 sysadm 1.105 if (clock_gettime(CLOCK_REALTIME, &ts_now) == -1)
741     {
742     log_error("clock_gettime() error (%d)", errno);
743     ret = -1;
744     goto cleanup;
745     }
746    
747 sysadm 1.97 ret = ssh_connect(outbound_session);
748 sysadm 1.84 if (ret == SSH_OK)
749     {
750     break;
751     }
752 sysadm 1.90 else if (ret == SSH_AGAIN)
753     {
754 sysadm 1.104 // log_debug("ssh_connect() error: SSH_AGAIN");
755 sysadm 1.90 }
756     else // if (ret == SSH_ERROR)
757 sysadm 1.84 {
758 sysadm 1.104 log_error("ssh_connect() error: SSH_ERROR");
759 sysadm 1.97 ret = -1;
760 sysadm 1.84 goto cleanup;
761     }
762 sysadm 1.105
763     if (progress_update(&ts_begin, &ts_now,
764     REMOTE_CONNECT_TIMEOUT * 1000,
765     &progress_last, PROGRESS_BAR_LEN) < 0)
766     {
767     log_error("progress_update() error");
768     ret = -1;
769     goto cleanup;
770     }
771 sysadm 1.84 }
772 sysadm 1.90 if (ret != SSH_OK)
773     {
774 sysadm 1.105 progress_bar(100, PROGRESS_BAR_LEN);
775 sysadm 1.90 prints("\033[1;31m连接超时!\033[m\r\n");
776     press_any_key();
777 sysadm 1.97 ret = -1;
778 sysadm 1.90 goto cleanup;
779     }
780 sysadm 1.84
781 sysadm 1.97 ret = ssh_session_is_known_server(outbound_session);
782 sysadm 1.85 switch (ret)
783     {
784     case SSH_KNOWN_HOSTS_NOT_FOUND:
785     case SSH_KNOWN_HOSTS_UNKNOWN:
786 sysadm 1.97 if (ssh_session_update_known_hosts(outbound_session) != SSH_OK)
787 sysadm 1.85 {
788 sysadm 1.104 log_error("ssh_session_update_known_hosts(%s) error", bbsnet_conf[n].host_name);
789 sysadm 1.90 prints("\033[1;31m无法添加服务器证书\033[m\r\n");
790 sysadm 1.85 press_any_key();
791 sysadm 1.97 ret = -1;
792 sysadm 1.85 goto cleanup;
793     }
794 sysadm 1.104 log_common("SSH key of (%s) is added into %s", bbsnet_conf[n].host_name, SSH_KNOWN_HOSTS_FILE);
795 sysadm 1.85 case SSH_KNOWN_HOSTS_OK:
796     break;
797     case SSH_KNOWN_HOSTS_CHANGED:
798     case SSH_KNOWN_HOSTS_OTHER:
799 sysadm 1.104 log_error("ssh_session_is_known_server(%s) error: %d", bbsnet_conf[n].host_name, ret);
800 sysadm 1.90 prints("\033[1;31m服务器证书已变更\033[m\r\n");
801 sysadm 1.85 press_any_key();
802 sysadm 1.97 ret = -1;
803 sysadm 1.85 goto cleanup;
804     }
805 sysadm 1.84
806 sysadm 1.90 ret = SSH_AUTH_ERROR;
807 sysadm 1.105 while ((ts_now.tv_sec - ts_begin.tv_sec) * 1000 +
808     (ts_now.tv_nsec - ts_begin.tv_nsec) / 1000 / 1000 <
809     REMOTE_CONNECT_TIMEOUT * 1000 &&
810     !SYS_server_exit)
811 sysadm 1.84 {
812 sysadm 1.105 if (clock_gettime(CLOCK_REALTIME, &ts_now) == -1)
813     {
814     log_error("clock_gettime() error (%d)", errno);
815     ret = -1;
816     goto cleanup;
817     }
818    
819 sysadm 1.97 ret = ssh_userauth_password(outbound_session, NULL, remote_pass);
820 sysadm 1.84 if (ret == SSH_AUTH_SUCCESS)
821     {
822     break;
823     }
824     else if (ret == SSH_AUTH_AGAIN)
825     {
826 sysadm 1.104 // log_debug("ssh_userauth_password() error: SSH_AUTH_AGAIN");
827 sysadm 1.84 }
828     else if (ret == SSH_AUTH_ERROR)
829     {
830 sysadm 1.104 log_error("ssh_userauth_password() error: SSH_AUTH_ERROR");
831 sysadm 1.97 ret = -1;
832 sysadm 1.84 goto cleanup;
833     }
834     else // if (ret == SSH_AUTH_DENIED)
835     {
836 sysadm 1.105 log_debug("ssh_userauth_password() error: SSH_AUTH_DENIED");
837 sysadm 1.84 prints("\033[1;31m身份验证失败!\033[m\r\n");
838 sysadm 1.90 press_any_key();
839 sysadm 1.105 ret = 0;
840     goto cleanup;
841     }
842    
843     if (progress_update(&ts_begin, &ts_now,
844     REMOTE_CONNECT_TIMEOUT * 1000,
845     &progress_last, PROGRESS_BAR_LEN) < 0)
846     {
847     log_error("progress_update() error");
848 sysadm 1.97 ret = -1;
849 sysadm 1.90 goto cleanup;
850 sysadm 1.84 }
851     }
852 sysadm 1.90 if (ret != SSH_AUTH_SUCCESS)
853     {
854 sysadm 1.105 progress_bar(100, PROGRESS_BAR_LEN);
855 sysadm 1.90 prints("\033[1;31m连接超时!\033[m\r\n");
856     press_any_key();
857 sysadm 1.97 ret = -1;
858 sysadm 1.90 goto cleanup;
859     }
860 sysadm 1.84
861 sysadm 1.97 outbound_channel = ssh_channel_new(outbound_session);
862     if (outbound_channel == NULL)
863 sysadm 1.84 {
864 sysadm 1.104 log_error("ssh_channel_new() error");
865 sysadm 1.97 ret = -1;
866 sysadm 1.84 goto cleanup;
867     }
868    
869 sysadm 1.90 ret = SSH_ERROR;
870 sysadm 1.105 while ((ts_now.tv_sec - ts_begin.tv_sec) * 1000 +
871     (ts_now.tv_nsec - ts_begin.tv_nsec) / 1000 / 1000 <
872     REMOTE_CONNECT_TIMEOUT * 1000 &&
873     !SYS_server_exit)
874 sysadm 1.84 {
875 sysadm 1.105 if (clock_gettime(CLOCK_REALTIME, &ts_now) == -1)
876     {
877     log_error("clock_gettime() error (%d)", errno);
878     ret = -1;
879     goto cleanup;
880     }
881    
882 sysadm 1.97 ret = ssh_channel_open_session(outbound_channel);
883 sysadm 1.84 if (ret == SSH_OK)
884     {
885     break;
886     }
887 sysadm 1.90 else if (ret == SSH_AGAIN)
888     {
889 sysadm 1.104 // log_debug("ssh_channel_open_session() error: SSH_AGAIN");
890 sysadm 1.90 }
891     else // if (ret == SSH_ERROR)
892 sysadm 1.84 {
893 sysadm 1.104 log_error("ssh_channel_open_session() error: SSH_ERROR");
894 sysadm 1.97 ret = -1;
895 sysadm 1.84 goto cleanup;
896     }
897 sysadm 1.105
898     if (progress_update(&ts_begin, &ts_now,
899     REMOTE_CONNECT_TIMEOUT * 1000,
900     &progress_last, PROGRESS_BAR_LEN) < 0)
901     {
902     log_error("progress_update() error");
903     ret = -1;
904     goto cleanup;
905     }
906 sysadm 1.84 }
907 sysadm 1.90 if (ret != SSH_OK)
908     {
909 sysadm 1.105 progress_bar(100, PROGRESS_BAR_LEN);
910 sysadm 1.90 prints("\033[1;31m连接超时!\033[m\r\n");
911     press_any_key();
912 sysadm 1.97 ret = -1;
913 sysadm 1.90 goto cleanup;
914     }
915 sysadm 1.84
916 sysadm 1.90 ret = SSH_ERROR;
917 sysadm 1.105 while ((ts_now.tv_sec - ts_begin.tv_sec) * 1000 +
918     (ts_now.tv_nsec - ts_begin.tv_nsec) / 1000 / 1000 <
919     REMOTE_CONNECT_TIMEOUT * 1000 &&
920     !SYS_server_exit)
921 sysadm 1.84 {
922 sysadm 1.105 if (clock_gettime(CLOCK_REALTIME, &ts_now) == -1)
923     {
924     log_error("clock_gettime() error (%d)", errno);
925     ret = -1;
926     goto cleanup;
927     }
928    
929 sysadm 1.97 ret = ssh_channel_request_pty(outbound_channel);
930 sysadm 1.84 if (ret == SSH_OK)
931     {
932     break;
933     }
934 sysadm 1.90 else if (ret == SSH_AGAIN)
935     {
936 sysadm 1.104 // log_debug("ssh_channel_request_pty() error: SSH_AGAIN");
937 sysadm 1.90 }
938     else // if (ret == SSH_ERROR)
939 sysadm 1.84 {
940 sysadm 1.104 log_error("ssh_channel_request_pty() error: SSH_ERROR");
941 sysadm 1.97 ret = -1;
942 sysadm 1.84 goto cleanup;
943     }
944 sysadm 1.105
945     if (progress_update(&ts_begin, &ts_now,
946     REMOTE_CONNECT_TIMEOUT * 1000,
947     &progress_last, PROGRESS_BAR_LEN) < 0)
948     {
949     log_error("progress_update() error");
950     ret = -1;
951     goto cleanup;
952     }
953 sysadm 1.84 }
954 sysadm 1.90 if (ret != SSH_OK)
955     {
956 sysadm 1.105 progress_bar(100, PROGRESS_BAR_LEN);
957 sysadm 1.90 prints("\033[1;31m连接超时!\033[m\r\n");
958     press_any_key();
959 sysadm 1.97 ret = -1;
960 sysadm 1.90 goto cleanup;
961     }
962 sysadm 1.84
963 sysadm 1.90 ret = SSH_ERROR;
964 sysadm 1.105 while ((ts_now.tv_sec - ts_begin.tv_sec) * 1000 +
965     (ts_now.tv_nsec - ts_begin.tv_nsec) / 1000 / 1000 <
966     REMOTE_CONNECT_TIMEOUT * 1000 &&
967     !SYS_server_exit)
968 sysadm 1.84 {
969 sysadm 1.105 if (clock_gettime(CLOCK_REALTIME, &ts_now) == -1)
970     {
971     log_error("clock_gettime() error (%d)", errno);
972     ret = -1;
973     goto cleanup;
974     }
975    
976 sysadm 1.97 ret = ssh_channel_request_shell(outbound_channel);
977 sysadm 1.84 if (ret == SSH_OK)
978     {
979     break;
980     }
981 sysadm 1.90 else if (ret == SSH_AGAIN)
982     {
983 sysadm 1.104 // log_debug("ssh_channel_request_shell() error: SSH_AGAIN");
984 sysadm 1.90 }
985     else // if (ret == SSH_ERROR)
986 sysadm 1.84 {
987 sysadm 1.104 log_error("ssh_channel_request_shell() error: SSH_ERROR");
988 sysadm 1.97 ret = -1;
989 sysadm 1.84 goto cleanup;
990     }
991 sysadm 1.105
992     if (progress_update(&ts_begin, &ts_now,
993     REMOTE_CONNECT_TIMEOUT * 1000,
994     &progress_last, PROGRESS_BAR_LEN) < 0)
995     {
996     log_error("progress_update() error");
997     ret = -1;
998     goto cleanup;
999     }
1000 sysadm 1.84 }
1001 sysadm 1.90 if (ret != SSH_OK)
1002 sysadm 1.89 {
1003 sysadm 1.105 progress_bar(100, PROGRESS_BAR_LEN);
1004 sysadm 1.90 prints("\033[1;31m连接超时!\033[m\r\n");
1005     press_any_key();
1006 sysadm 1.97 ret = -1;
1007 sysadm 1.89 goto cleanup;
1008     }
1009 sysadm 1.84 }
1010    
1011 sysadm 1.57 prints("\033[1;31m连接成功!\033[m\r\n");
1012 sysadm 1.33 iflush();
1013 sysadm 1.104 log_common("BBSNET connect to %s:%d from %s:%d by [%s]",
1014 sysadm 1.63 remote_addr, remote_port, local_addr, local_port, BBS_username);
1015 sysadm 1.14
1016 sysadm 1.71 snprintf(tocode, sizeof(tocode), "%s%s", bbsnet_conf[n].charset,
1017     (strcasecmp(stdio_charset, bbsnet_conf[n].charset) == 0 ? "" : "//IGNORE"));
1018 sysadm 1.68 input_cd = iconv_open(tocode, stdio_charset);
1019 sysadm 1.60 if (input_cd == (iconv_t)(-1))
1020     {
1021 sysadm 1.104 log_error("iconv_open(%s->%s) error: %d", stdio_charset, tocode, errno);
1022 sysadm 1.97 ret = -1;
1023 sysadm 1.60 goto cleanup;
1024     }
1025 sysadm 1.68
1026 sysadm 1.71 snprintf(tocode, sizeof(tocode), "%s%s", stdio_charset,
1027     (strcasecmp(bbsnet_conf[n].charset, stdio_charset) == 0 ? "" : "//TRANSLIT"));
1028 sysadm 1.70 output_cd = iconv_open(tocode, bbsnet_conf[n].charset);
1029 sysadm 1.67 if (output_cd == (iconv_t)(-1))
1030 sysadm 1.60 {
1031 sysadm 1.104 log_error("iconv_open(%s->%s) error: %d", bbsnet_conf[n].charset, tocode, errno);
1032 sysadm 1.97 ret = -1;
1033 sysadm 1.60 goto cleanup;
1034     }
1035    
1036 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
1037 sysadm 1.38 ev.events = EPOLLIN | EPOLLOUT | EPOLLET;
1038     ev.data.fd = sock;
1039     if (epoll_ctl(epollfd, EPOLL_CTL_MOD, sock, &ev) == -1)
1040     {
1041 sysadm 1.104 log_error("epoll_ctl(socket) error (%d)", errno);
1042 sysadm 1.97 ret = -1;
1043 sysadm 1.39 goto cleanup;
1044 sysadm 1.38 }
1045    
1046 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
1047 sysadm 1.38 ev.data.fd = STDOUT_FILENO;
1048     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDOUT_FILENO, &ev) == -1)
1049     {
1050 sysadm 1.104 log_error("epoll_ctl(STDOUT_FILENO) error (%d)", errno);
1051 sysadm 1.97 ret = -1;
1052 sysadm 1.39 goto cleanup;
1053 sysadm 1.38 }
1054 sysadm 1.82 #endif
1055 sysadm 1.38
1056 sysadm 1.97 BBS_last_access_tm = t_begin = time(NULL);
1057 sysadm 1.14 loop = 1;
1058    
1059 sysadm 1.26 while (loop && !SYS_server_exit)
1060 sysadm 1.12 {
1061 sysadm 1.47 if (SSH_v2 && ssh_channel_is_closed(SSH_channel))
1062     {
1063 sysadm 1.104 log_debug("SSH channel is closed");
1064 sysadm 1.47 loop = 0;
1065     break;
1066     }
1067    
1068 sysadm 1.97 if (bbsnet_conf[n].use_ssh && ssh_channel_is_closed(outbound_channel))
1069 sysadm 1.84 {
1070 sysadm 1.104 log_debug("Outbound channel is closed");
1071 sysadm 1.84 loop = 0;
1072     break;
1073     }
1074    
1075 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
1076 sysadm 1.38 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 100); // 0.1 second
1077 sysadm 1.82 ret = nfds;
1078     #else
1079     pfds[0].fd = STDIN_FILENO;
1080     pfds[0].events = POLLIN;
1081     pfds[1].fd = sock;
1082     pfds[1].events = POLLIN | POLLOUT;
1083     pfds[2].fd = STDOUT_FILENO;
1084     pfds[2].events = POLLOUT;
1085     nfds = 3;
1086     ret = poll(pfds, (nfds_t)nfds, 100); // 0.1 second
1087     #endif
1088 sysadm 1.33
1089 sysadm 1.82 if (ret < 0)
1090 sysadm 1.14 {
1091 sysadm 1.38 if (errno != EINTR)
1092 sysadm 1.14 {
1093 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
1094 sysadm 1.104 log_error("epoll_wait() error (%d)", errno);
1095 sysadm 1.82 #else
1096 sysadm 1.104 log_error("poll() error (%d)", errno);
1097 sysadm 1.82 #endif
1098 sysadm 1.38 break;
1099 sysadm 1.14 }
1100 sysadm 1.38 continue;
1101 sysadm 1.14 }
1102 sysadm 1.82 else if (ret == 0) // timeout
1103 sysadm 1.1 {
1104 sysadm 1.78 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
1105 sysadm 1.28 {
1106 sysadm 1.104 log_debug("User input timeout");
1107 sysadm 1.38 break;
1108 sysadm 1.28 }
1109 sysadm 1.1 }
1110 sysadm 1.38
1111     for (int i = 0; i < nfds; i++)
1112 sysadm 1.1 {
1113 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
1114 sysadm 1.96 if (events[i].events & (EPOLLHUP | EPOLLERR))
1115 sysadm 1.94 #else
1116 sysadm 1.96 if (pfds[i].revents & (POLLHUP | POLLERR))
1117 sysadm 1.94 #endif
1118     {
1119     #ifdef HAVE_SYS_EPOLL_H
1120 sysadm 1.104 log_debug("FD (%d) error events (%d)", events[i].data.fd, events[i].events);
1121 sysadm 1.94 #else
1122 sysadm 1.104 log_debug("FD (%d) error events (%d)", pfds[i].fd, pfds[i].revents);
1123 sysadm 1.94 #endif
1124     loop = 0;
1125     break;
1126     }
1127    
1128     #ifdef HAVE_SYS_EPOLL_H
1129     if (events[i].data.fd == STDIN_FILENO && (events[i].events & EPOLLIN))
1130 sysadm 1.82 #else
1131     if (pfds[i].fd == STDIN_FILENO && (pfds[i].revents & POLLIN))
1132     #endif
1133 sysadm 1.14 {
1134 sysadm 1.38 stdin_read_wait = 1;
1135 sysadm 1.59 }
1136    
1137 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
1138 sysadm 1.59 if (events[i].data.fd == sock)
1139 sysadm 1.82 #else
1140     if (pfds[i].fd == sock)
1141     #endif
1142 sysadm 1.59 {
1143 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
1144 sysadm 1.59 if (events[i].events & EPOLLIN)
1145 sysadm 1.82 #else
1146     if (pfds[i].revents & POLLIN)
1147     #endif
1148 sysadm 1.59 {
1149     sock_read_wait = 1;
1150     }
1151 sysadm 1.82
1152     #ifdef HAVE_SYS_EPOLL_H
1153 sysadm 1.59 if (events[i].events & EPOLLOUT)
1154 sysadm 1.82 #else
1155     if (pfds[i].revents & POLLOUT)
1156     #endif
1157 sysadm 1.59 {
1158     sock_write_wait = 1;
1159     }
1160     }
1161    
1162 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
1163 sysadm 1.94 if (events[i].data.fd == STDOUT_FILENO && (events[i].events & EPOLLOUT))
1164 sysadm 1.82 #else
1165     if (pfds[i].fd == STDOUT_FILENO && (pfds[i].revents & POLLOUT))
1166 sysadm 1.84 #endif
1167 sysadm 1.59 {
1168     stdout_write_wait = 1;
1169     }
1170     }
1171    
1172     if (stdin_read_wait)
1173     {
1174     while (input_buf_len < sizeof(input_buf) && !SYS_server_exit)
1175     {
1176     if (SSH_v2)
1177 sysadm 1.33 {
1178 sysadm 1.59 ret = ssh_channel_read_nonblocking(SSH_channel, input_buf + input_buf_len, sizeof(input_buf) - (uint32_t)input_buf_len, 0);
1179     if (ret == SSH_ERROR)
1180 sysadm 1.47 {
1181 sysadm 1.104 log_debug("ssh_channel_read_nonblocking() error: %s", ssh_get_error(SSH_session));
1182 sysadm 1.59 loop = 0;
1183     break;
1184 sysadm 1.47 }
1185 sysadm 1.59 else if (ret == SSH_EOF)
1186 sysadm 1.47 {
1187 sysadm 1.59 stdin_read_wait = 0;
1188     loop = 0;
1189     break;
1190 sysadm 1.47 }
1191 sysadm 1.59 else if (ret == 0)
1192 sysadm 1.33 {
1193 sysadm 1.72 // Send NO-OP to remote server
1194     input_buf[input_buf_len] = '\0';
1195     input_buf_len++;
1196 sysadm 1.97
1197 sysadm 1.73 BBS_last_access_tm = time(NULL);
1198 sysadm 1.59 stdin_read_wait = 0;
1199     break; // Check whether channel is still open
1200 sysadm 1.38 }
1201 sysadm 1.59 }
1202     else
1203     {
1204     ret = (int)read(STDIN_FILENO, input_buf + input_buf_len, sizeof(input_buf) - (size_t)input_buf_len);
1205     }
1206     if (ret < 0)
1207     {
1208     if (errno == EAGAIN || errno == EWOULDBLOCK)
1209 sysadm 1.38 {
1210     stdin_read_wait = 0;
1211     break;
1212     }
1213 sysadm 1.59 else if (errno == EINTR)
1214     {
1215     continue;
1216     }
1217 sysadm 1.38 else
1218     {
1219 sysadm 1.104 log_error("read(STDIN) error (%d)", errno);
1220 sysadm 1.59 loop = 0;
1221     break;
1222     }
1223     }
1224     else if (ret == 0) // broken pipe
1225     {
1226 sysadm 1.104 log_debug("read(STDIN) EOF");
1227 sysadm 1.59 stdin_read_wait = 0;
1228     loop = 0;
1229     break;
1230     }
1231     else
1232     {
1233     input_buf_len += ret;
1234     BBS_last_access_tm = time(NULL);
1235 sysadm 1.58
1236 sysadm 1.59 // Refresh current action while user input
1237     if (user_online_update("BBS_NET") < 0)
1238     {
1239 sysadm 1.104 log_error("user_online_update(BBS_NET) error");
1240 sysadm 1.59 }
1241 sysadm 1.58
1242 sysadm 1.59 continue;
1243 sysadm 1.33 }
1244 sysadm 1.36 }
1245 sysadm 1.59 }
1246 sysadm 1.29
1247 sysadm 1.59 if (sock_write_wait)
1248     {
1249 sysadm 1.60 if (input_buf_offset < input_buf_len)
1250 sysadm 1.36 {
1251 sysadm 1.72 // For debug
1252     #ifdef _DEBUG
1253     for (int j = input_buf_offset; j < input_buf_len; j++)
1254     {
1255 sysadm 1.104 log_debug("input: <--[%u]", (input_buf[j] + 256) % 256);
1256 sysadm 1.72 }
1257     #endif
1258    
1259 sysadm 1.66 ret = io_buf_conv(input_cd, input_buf, &input_buf_len, &input_buf_offset, input_conv, sizeof(input_conv), &input_conv_len);
1260 sysadm 1.60 if (ret < 0)
1261     {
1262 sysadm 1.104 log_error("io_buf_conv(input, %d, %d, %d) error", input_buf_len, input_buf_offset, input_conv_len);
1263 sysadm 1.71 input_buf_len = input_buf_offset; // Discard invalid sequence
1264 sysadm 1.60 }
1265 sysadm 1.72
1266     // For debug
1267     #ifdef _DEBUG
1268     for (int j = input_conv_offset; j < input_conv_len; j++)
1269     {
1270 sysadm 1.104 log_debug("input_conv: <--[%u]", (input_conv[j] + 256) % 256);
1271 sysadm 1.72 }
1272     #endif
1273 sysadm 1.60 }
1274    
1275     while (input_conv_offset < input_conv_len && !SYS_server_exit)
1276     {
1277 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
1278     {
1279 sysadm 1.97 ret = ssh_channel_write(outbound_channel, input_conv + input_conv_offset, (uint32_t)(input_conv_len - input_conv_offset));
1280 sysadm 1.84 if (ret == SSH_ERROR)
1281     {
1282 sysadm 1.104 log_debug("ssh_channel_write() error: %s", ssh_get_error(outbound_session));
1283 sysadm 1.84 loop = 0;
1284     break;
1285     }
1286     }
1287     else
1288     {
1289     ret = (int)write(sock, input_conv + input_conv_offset, (size_t)(input_conv_len - input_conv_offset));
1290     }
1291 sysadm 1.59 if (ret < 0)
1292 sysadm 1.36 {
1293 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
1294 sysadm 1.36 {
1295 sysadm 1.59 sock_write_wait = 0;
1296     break;
1297 sysadm 1.38 }
1298 sysadm 1.59 else if (errno == EINTR)
1299 sysadm 1.38 {
1300 sysadm 1.59 continue;
1301     }
1302     else
1303     {
1304 sysadm 1.104 log_debug("write(socket) error (%d)", errno);
1305 sysadm 1.36 loop = 0;
1306 sysadm 1.38 break;
1307     }
1308 sysadm 1.59 }
1309     else if (ret == 0) // broken pipe
1310     {
1311 sysadm 1.104 log_debug("write(socket) EOF");
1312 sysadm 1.59 sock_write_wait = 0;
1313     loop = 0;
1314     break;
1315     }
1316     else
1317     {
1318 sysadm 1.60 input_conv_offset += ret;
1319     if (input_conv_offset >= input_conv_len) // Output buffer complete
1320 sysadm 1.38 {
1321 sysadm 1.60 input_conv_offset = 0;
1322     input_conv_len = 0;
1323 sysadm 1.59 break;
1324 sysadm 1.36 }
1325 sysadm 1.59 continue;
1326 sysadm 1.36 }
1327 sysadm 1.14 }
1328 sysadm 1.59 }
1329 sysadm 1.36
1330 sysadm 1.59 if (sock_read_wait)
1331     {
1332     while (output_buf_len < sizeof(output_buf) && !SYS_server_exit)
1333 sysadm 1.14 {
1334 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
1335     {
1336 sysadm 1.97 ret = ssh_channel_read_nonblocking(outbound_channel, output_buf + output_buf_len,
1337 sysadm 1.84 (uint32_t)(sizeof(output_buf) - (size_t)output_buf_len), 0);
1338     if (ret == SSH_ERROR)
1339     {
1340 sysadm 1.104 log_debug("ssh_channel_read_nonblocking() error: %s", ssh_get_error(outbound_session));
1341 sysadm 1.84 loop = 0;
1342     break;
1343     }
1344     else if (ret == SSH_EOF)
1345     {
1346     sock_read_wait = 0;
1347     loop = 0;
1348     break;
1349     }
1350     else if (ret == 0)
1351     {
1352     sock_read_wait = 0;
1353     break;
1354     }
1355     }
1356     else
1357     {
1358     ret = (int)read(sock, output_buf + output_buf_len, sizeof(output_buf) - (size_t)output_buf_len);
1359     }
1360 sysadm 1.59 if (ret < 0)
1361 sysadm 1.14 {
1362 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
1363 sysadm 1.38 {
1364 sysadm 1.59 sock_read_wait = 0;
1365     break;
1366 sysadm 1.38 }
1367 sysadm 1.59 else if (errno == EINTR)
1368 sysadm 1.33 {
1369 sysadm 1.59 continue;
1370 sysadm 1.38 }
1371     else
1372     {
1373 sysadm 1.104 log_debug("read(socket) error (%d)", errno);
1374 sysadm 1.59 loop = 0;
1375     break;
1376 sysadm 1.33 }
1377     }
1378 sysadm 1.59 else if (ret == 0) // broken pipe
1379     {
1380 sysadm 1.104 log_debug("read(socket) EOF");
1381 sysadm 1.59 sock_read_wait = 0;
1382     loop = 0;
1383     break;
1384     }
1385     else
1386     {
1387     output_buf_len += ret;
1388     continue;
1389     }
1390 sysadm 1.36 }
1391 sysadm 1.59 }
1392 sysadm 1.36
1393 sysadm 1.59 if (stdout_write_wait)
1394     {
1395 sysadm 1.60 if (output_buf_offset < output_buf_len)
1396     {
1397 sysadm 1.66 ret = io_buf_conv(output_cd, output_buf, &output_buf_len, &output_buf_offset, output_conv, sizeof(output_conv), &output_conv_len);
1398 sysadm 1.60 if (ret < 0)
1399     {
1400 sysadm 1.104 log_error("io_buf_conv(output, %d, %d, %d) error", output_buf_len, output_buf_offset, output_conv_len);
1401 sysadm 1.71 output_buf_len = output_buf_offset; // Discard invalid sequence
1402 sysadm 1.60 }
1403     }
1404    
1405     while (output_conv_offset < output_conv_len && !SYS_server_exit)
1406 sysadm 1.36 {
1407 sysadm 1.59 if (SSH_v2)
1408 sysadm 1.36 {
1409 sysadm 1.60 ret = ssh_channel_write(SSH_channel, output_conv + output_conv_offset, (uint32_t)(output_conv_len - output_conv_offset));
1410 sysadm 1.59 if (ret == SSH_ERROR)
1411 sysadm 1.47 {
1412 sysadm 1.104 log_debug("ssh_channel_write() error: %s", ssh_get_error(SSH_session));
1413 sysadm 1.59 loop = 0;
1414     break;
1415 sysadm 1.47 }
1416 sysadm 1.59 }
1417     else
1418     {
1419 sysadm 1.60 ret = (int)write(STDOUT_FILENO, output_conv + output_conv_offset, (size_t)(output_conv_len - output_conv_offset));
1420 sysadm 1.59 }
1421     if (ret < 0)
1422     {
1423     if (errno == EAGAIN || errno == EWOULDBLOCK)
1424 sysadm 1.47 {
1425 sysadm 1.59 stdout_write_wait = 0;
1426     break;
1427 sysadm 1.47 }
1428 sysadm 1.59 else if (errno == EINTR)
1429 sysadm 1.38 {
1430 sysadm 1.59 continue;
1431 sysadm 1.38 }
1432 sysadm 1.59 else
1433 sysadm 1.33 {
1434 sysadm 1.104 log_debug("write(STDOUT) error (%d)", errno);
1435 sysadm 1.36 loop = 0;
1436 sysadm 1.38 break;
1437     }
1438 sysadm 1.59 }
1439     else if (ret == 0) // broken pipe
1440     {
1441 sysadm 1.104 log_debug("write(STDOUT) EOF");
1442 sysadm 1.59 stdout_write_wait = 0;
1443     loop = 0;
1444     break;
1445     }
1446     else
1447     {
1448 sysadm 1.60 output_conv_offset += ret;
1449     if (output_conv_offset >= output_conv_len) // Output buffer complete
1450 sysadm 1.38 {
1451 sysadm 1.60 output_conv_offset = 0;
1452     output_conv_len = 0;
1453 sysadm 1.59 break;
1454 sysadm 1.36 }
1455 sysadm 1.59 continue;
1456 sysadm 1.36 }
1457 sysadm 1.14 }
1458 sysadm 1.1 }
1459     }
1460    
1461 sysadm 1.97 ret = 1; // Normal disconnect
1462     BBS_last_access_tm = time(NULL);
1463     t_used = BBS_last_access_tm - t_begin;
1464 sysadm 1.104 log_common("BBSNET disconnect, %ld days %ld hours %ld minutes %ld seconds used",
1465 sysadm 1.97 t_used / 86400, t_used % 86400 / 3600, t_used % 3600 / 60, t_used % 60);
1466    
1467 sysadm 1.89 cleanup:
1468 sysadm 1.97 // Clear sensitive data
1469     memset(remote_pass, 0, sizeof(remote_pass));
1470     memset(remote_user, 0, sizeof(remote_user));
1471    
1472 sysadm 1.89 if (input_cd != (iconv_t)(-1))
1473     {
1474     iconv_close(input_cd);
1475     }
1476     if (output_cd != (iconv_t)(-1))
1477     {
1478     iconv_close(output_cd);
1479     }
1480 sysadm 1.60
1481 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
1482 sysadm 1.89 if (epollfd != -1 && close(epollfd) < 0)
1483 sysadm 1.39 {
1484 sysadm 1.104 log_error("close(epoll) error (%d)");
1485 sysadm 1.39 }
1486 sysadm 1.82 #endif
1487 sysadm 1.39
1488 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
1489     {
1490 sysadm 1.97 if (outbound_channel != NULL)
1491 sysadm 1.89 {
1492 sysadm 1.97 ssh_channel_send_eof(outbound_channel);
1493     ssh_channel_close(outbound_channel);
1494     ssh_channel_free(outbound_channel);
1495 sysadm 1.89 }
1496 sysadm 1.97 if (outbound_session != NULL)
1497 sysadm 1.89 {
1498 sysadm 1.97 ssh_disconnect(outbound_session);
1499     ssh_free(outbound_session);
1500 sysadm 1.89 }
1501 sysadm 1.84 }
1502    
1503 sysadm 1.36 // Restore STDIN/STDOUT flags
1504 sysadm 1.90 if (flags_stdin != -1 && fcntl(STDIN_FILENO, F_SETFL, flags_stdin) == -1)
1505 sysadm 1.89 {
1506 sysadm 1.104 log_error("fcntl(F_SETFL) error (%d)", errno);
1507 sysadm 1.89 }
1508     if (flags_stdout != -1 && fcntl(STDOUT_FILENO, F_SETFL, flags_stdout) == -1)
1509     {
1510 sysadm 1.104 log_error("fcntl(F_SETFL) error (%d)", errno);
1511 sysadm 1.89 }
1512 sysadm 1.36
1513 sysadm 1.89 if (sock != -1 && close(sock) == -1)
1514 sysadm 1.14 {
1515 sysadm 1.104 log_error("close(socket) error (%d)", errno);
1516 sysadm 1.14 }
1517 sysadm 1.1
1518 sysadm 1.93 if (res)
1519     {
1520     freeaddrinfo(res);
1521     }
1522    
1523 sysadm 1.97 return ret;
1524 sysadm 1.1 }
1525    
1526 sysadm 1.74 static int bbsnet_refresh()
1527 sysadm 1.1 {
1528 sysadm 1.14 clearscr();
1529 sysadm 1.84
1530     moveto(1, 1);
1531     prints(" ------------------------------------------------------------------------------ ");
1532 sysadm 1.20 for (int i = 2; i < 19; i++)
1533 sysadm 1.14 {
1534 sysadm 1.84 moveto(i, 1);
1535 sysadm 1.23 prints("|");
1536 sysadm 1.84 moveto(i, 80);
1537 sysadm 1.23 prints("|");
1538 sysadm 1.14 }
1539 sysadm 1.84 moveto(19, 1);
1540     prints("|------------------------------------------------------------------------------|");
1541     moveto(22, 1);
1542     prints(" ------------------------------------------------------------------------------ ");
1543     moveto(23, 1);
1544     prints(" [\033[1;32mCtrl+C\033[m]退出");
1545 sysadm 1.13
1546 sysadm 1.14 iflush();
1547 sysadm 1.1
1548 sysadm 1.14 return 0;
1549 sysadm 1.1 }
1550    
1551 sysadm 1.74 static int bbsnet_selchange()
1552 sysadm 1.1 {
1553 sysadm 1.43 int i = bbsnet_menu.menu_item_pos[0];
1554    
1555 sysadm 1.84 moveto(20, 1);
1556 sysadm 1.14 clrtoeol();
1557 sysadm 1.87 prints("|\033[1m单位: \033[1;33m%s\033[m%*s 站名: \033[1;33m%s\033[m%*s 类型: \033[1;33m%s\033[m",
1558     bbsnet_conf[i].org_name, 20 - str_length(bbsnet_conf[i].org_name, 1), "",
1559     bbsnet_conf[i].site_name, 20 - str_length(bbsnet_conf[i].site_name, 1), "",
1560     (bbsnet_conf[i].use_ssh ? "SSH" : "Telnet"));
1561 sysadm 1.84 moveto(20, 80);
1562 sysadm 1.23 prints("|");
1563 sysadm 1.84 moveto(21, 1);
1564 sysadm 1.14 clrtoeol();
1565 sysadm 1.93 prints("|\033[1m连往: \033[1;33m%-20s\033[m 端口: \033[1;33m%-5s\033[m 编码: \033[1;33m%s\033[m",
1566 sysadm 1.87 bbsnet_conf[i].host_name, bbsnet_conf[i].port, bbsnet_conf[i].charset);
1567 sysadm 1.84 moveto(21, 80);
1568 sysadm 1.23 prints("|");
1569 sysadm 1.14 iflush();
1570 sysadm 1.1
1571 sysadm 1.14 return 0;
1572 sysadm 1.1 }
1573    
1574 sysadm 1.83 int bbs_net()
1575 sysadm 1.1 {
1576 sysadm 1.98 int ch;
1577 sysadm 1.1
1578 sysadm 1.89 if (load_bbsnet_conf(CONF_BBSNET) < 0)
1579     {
1580     clearscr();
1581     moveto(1, 1);
1582     prints("加载穿梭配置失败!");
1583     press_any_key();
1584     return -1;
1585     }
1586 sysadm 1.1
1587 sysadm 1.14 bbsnet_refresh();
1588 sysadm 1.41 display_menu(&bbsnet_menu);
1589 sysadm 1.43 bbsnet_selchange();
1590 sysadm 1.14
1591 sysadm 1.26 while (!SYS_server_exit)
1592 sysadm 1.1 {
1593 sysadm 1.39 ch = igetch(100);
1594 sysadm 1.52
1595 sysadm 1.71 if (ch != KEY_NULL && ch != KEY_TIMEOUT)
1596     {
1597     BBS_last_access_tm = time(NULL);
1598     }
1599 sysadm 1.64
1600 sysadm 1.14 switch (ch)
1601     {
1602 sysadm 1.47 case KEY_NULL: // broken pipe
1603 sysadm 1.104 log_debug("KEY_NULL");
1604 sysadm 1.40 goto cleanup;
1605 sysadm 1.14 case KEY_TIMEOUT:
1606 sysadm 1.78 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
1607 sysadm 1.14 {
1608 sysadm 1.104 log_debug("User input timeout");
1609 sysadm 1.40 goto cleanup;
1610 sysadm 1.14 }
1611 sysadm 1.29 continue;
1612 sysadm 1.64 case KEY_ESC:
1613     case Ctrl('C'): // user cancel
1614     goto cleanup;
1615 sysadm 1.14 case CR:
1616 sysadm 1.98 if (bbsnet_connect(bbsnet_menu.menu_item_pos[0]) < 0)
1617     {
1618 sysadm 1.104 log_debug("bbsnet_connect() error");
1619 sysadm 1.98 }
1620 sysadm 1.84 // Force cleanup anything remaining in the output buffer
1621     clearscr();
1622     iflush();
1623     // Clear screen and redraw menu
1624 sysadm 1.14 bbsnet_refresh();
1625 sysadm 1.41 display_menu(&bbsnet_menu);
1626 sysadm 1.43 bbsnet_selchange();
1627 sysadm 1.14 break;
1628     case KEY_UP:
1629 sysadm 1.98 for (int i = 0; i < STATION_PER_LINE; i++)
1630 sysadm 1.20 {
1631 sysadm 1.14 menu_control(&bbsnet_menu, KEY_UP);
1632 sysadm 1.20 }
1633 sysadm 1.43 bbsnet_selchange();
1634 sysadm 1.14 break;
1635     case KEY_DOWN:
1636 sysadm 1.98 for (int i = 0; i < STATION_PER_LINE; i++)
1637 sysadm 1.20 {
1638 sysadm 1.14 menu_control(&bbsnet_menu, KEY_DOWN);
1639 sysadm 1.20 }
1640 sysadm 1.43 bbsnet_selchange();
1641 sysadm 1.14 break;
1642     case KEY_LEFT:
1643     menu_control(&bbsnet_menu, KEY_UP);
1644 sysadm 1.43 bbsnet_selchange();
1645 sysadm 1.14 break;
1646     case KEY_RIGHT:
1647     menu_control(&bbsnet_menu, KEY_DOWN);
1648 sysadm 1.43 bbsnet_selchange();
1649     break;
1650 sysadm 1.44 case KEY_HOME:
1651 sysadm 1.43 case KEY_PGUP:
1652     menu_control(&bbsnet_menu, KEY_PGUP);
1653     bbsnet_selchange();
1654 sysadm 1.14 break;
1655 sysadm 1.44 case KEY_END:
1656     case KEY_PGDN:
1657     menu_control(&bbsnet_menu, KEY_PGDN);
1658     bbsnet_selchange();
1659     break;
1660 sysadm 1.14 default:
1661     menu_control(&bbsnet_menu, ch);
1662 sysadm 1.43 bbsnet_selchange();
1663 sysadm 1.14 break;
1664     }
1665 sysadm 1.1 }
1666    
1667 sysadm 1.40 cleanup:
1668     unload_bbsnet_conf();
1669    
1670 sysadm 1.14 return 0;
1671 sysadm 1.1 }

webmaster@leafok.com
ViewVC Help
Powered by ViewVC 1.3.0-beta1